Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 200-201 Topic 1 Question 103 Discussion

Actual exam question for Cisco's 200-201 exam
Question #: 103
Topic #: 1
[All 200-201 Questions]

According to CVSS, what is attack complexity?

Show Suggested Answer Hide Answer
Suggested Answer: B

In the Common Vulnerability Scoring System (CVSS), attack complexity refers to the conditions beyond the attacker's control that must exist for the vulnerability to be successfully exploited.

This includes factors such as the need for user interaction, the presence of specific configurations, or network conditions that are not easily controlled by the attacker.

A high attack complexity means that these external factors make exploitation more difficult, while a low attack complexity indicates that fewer such conditions are required.


CVSS v3.1 Specifications Document

Understanding Attack Complexity in Vulnerability Assessments

Cybersecurity Frameworks and Metrics

Contribute your Thoughts:

Lina
3 months ago
C is the clear choice here. Although, I do wonder if the exam committee has a dark sense of humor and is actually looking for 'the number of hackers required to successfully exploit the vulnerability' as the answer.
upvoted 0 times
...
Daisy
3 months ago
Ah, the age-old question of attack complexity. I'd say C is the way to go, unless the exam is trying to trick us. Better not fall for any quantum entanglement shenanigans!
upvoted 0 times
Mariko
1 months ago
I'm not sure, but D sounds plausible, number of patches available for certain attack mitigation and how complex the workarounds are.
upvoted 0 times
...
Launa
1 months ago
I believe it's A, existing exploits available in the wild exploiting the vulnerability.
upvoted 0 times
...
Willow
2 months ago
I'm leaning towards B, existing circumstances beyond the attacker's control to exploit the vulnerability.
upvoted 0 times
...
Valentin
2 months ago
I think it's C, the number of actions an attacker should perform to exploit the vulnerability.
upvoted 0 times
...
...
Hyman
3 months ago
D? Nah, that's way too specific. I'm going with C. Seems like the best fit for attack complexity.
upvoted 0 times
...
Josephine
3 months ago
Hmm, I was leaning towards B, but C makes sense too. Gotta love these tricky CVSS questions!
upvoted 0 times
Gracia
2 months ago
Yeah, that makes sense. It's all about how complex the attack process is.
upvoted 0 times
...
Goldie
3 months ago
I think it's C, the number of actions an attacker should perform to exploit the vulnerability.
upvoted 0 times
...
...
Tamekia
3 months ago
I think it's C. The number of actions an attacker should perform to exploit the vulnerability seems like the most logical answer.
upvoted 0 times
Amber
3 months ago
Actually, it's B. Existing circumstances beyond the attacker's control to exploit the vulnerability.
upvoted 0 times
...
Jess
3 months ago
I think it's C. The number of actions an attacker should perform to exploit the vulnerability seems like the most logical answer.
upvoted 0 times
...
...
Shanice
3 months ago
That makes sense, it's about how difficult it is for the attacker to carry out the attack.
upvoted 0 times
...
Mignon
4 months ago
I think it's the number of actions an attacker should perform to exploit the vulnerability.
upvoted 0 times
...
Shanice
4 months ago
What is attack complexity according to CVSS?
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77