Cisco CyberOps Professional 350-201 Question # 4 Topic 1 Discussion
350-201 Exam Topic 1 Question 4 Discussion:
Question #: 4
Topic #: 1
Refer to the exhibit.
Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?
A.
An attacker can initiate a DoS attack.
B.
An attacker can read or change data.
C.
An attacker can transfer data to an external server.
The threat model for the SQL database, given that it manages transactions, access control, and atomicity, is primarily concerned with the confidentiality and integrity of the data. An attacker who gains access to the database could potentially read sensitive information or modify data, which could lead to unauthorized transactions, access control breaches, or compromise the atomicity of database operations. Therefore, the most pertinent threat is that an attacker can read or change data within the database.
References:
Understanding Cisco CyberOps Using Core Security Technologies (CBRCOR) course material would cover the various threats to databases and the importance of securing them against unauthorized access or modification.
The Cisco Certified CyberOps Associate certification includes knowledge about identifying and protecting against threats to critical infrastructure, such as SQL databases.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit