O'Reilly logo

CCNA Cyber Ops SECOPS - Certification Guide 210-255 by Andrew Chu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1: Classifying Threats

  1. (1)The attack vector relates to the physical and logical pathway and distance from which an attack can be launched. The further away a potential attacker can be from the vulnerability, the more potential attackers there are, and the more dangerous the vulnerability is.Attack complexity is described in question 2.
  2. (2)  A high attack complexity describes a situation where there are many conditions beyond the attacker's control that are required to successfully exploit a vulnerability. The lower the attack complexity, the more dangerous the threat. Privileges Required refers to the level of privileges an attacker must possess before successfully exploiting the vulnerability. Obtaining these privileges is within ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required