Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Cisco > CyberOps Associate > 200-201 > 200-201 Online Practice Questions and Answers

200-201 Online Practice Questions and Answers

Questions 4

Which type of data consists of connection level, application-specific records generated from network traffic?

A. transaction data

B. location data

C. statistical data

D. alert data

Buy Now

Correct Answer: A

Questions 5

What is an incident response plan?

A. an organizational approach to events that could lead to asset loss or disruption of operations

B. an organizational approach to security management to ensure a service lifecycle and continuous improvements

C. an organizational approach to disaster recovery and timely restoration of operational services

D. an organizational approach to system backup and data archiving aligned to regulations

Buy Now

Correct Answer: C

Questions 6

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group. What is the initial event called in the NIST SP800-61?

A. online assault

B. precursor

C. trigger

D. instigator

Buy Now

Correct Answer: B

A precursor is a sign that a cyber-attack is about to occur on a system or network. An indicator is the actual alerts that are generated as an attack is happening. Therefore, as a security professional, it's important to know where you can find

both precursor and indicator sources of information.

The following are common sources of precursor and indicator information:

Security Information and Event Management (SIEM) Anti-virus and anti-spam software

File integrity checking applications/software

Logs from various sources (operating systems, devices, and applications) People who report a security incident

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf

Questions 7

What describes the defense-m-depth principle?

A. defining precise guidelines for new workstation installations

B. categorizing critical assets within the organization

C. isolating guest Wi-Fi from the focal network

D. implementing alerts for unexpected asset malfunctions

Buy Now

Correct Answer: C

Questions 8

What are the two characteristics of the full packet captures? (Choose two.)

A. Identifying network loops and collision domains.

B. Troubleshooting the cause of security and performance issues.

C. Reassembling fragmented traffic from raw data.

D. Detecting common hardware faults and identify faulty assets.

E. Providing a historical record of a network transaction.

Buy Now

Correct Answer: CE

Questions 9

Which option describes indicators of attack?

A. blocked phishing attempt on a company

B. spam emails on an employee workstation

C. virus detection by the AV software

D. malware reinfection within a few minutes of removal

Buy Now

Correct Answer: D

Questions 10

Refer to the exhibit.

A security analyst received a ticket about suspicious traffic from one of the workstations. During the investigation, the analyst discovered that the workstation is communicating with an external IP The analyst was not able to investigate further and escalated the case to a T2 security analyst. What are the two data visibility challenges that the security analyst should identify? (Choose two.)

A. A default user agent is present in the headers.

B. Traffic is not encrypted.

C. Encrypted data is being transmitted.

D. POST requests have a "Microsoft-IIS/7.5" server header.

E. HTTP requests and responses are sent in plaintext.

Buy Now

Correct Answer: BE

Questions 11

An engineer must create a SIEM rule to test events and traffic for spikes and changes that occur in regular patterns to detect irregularities. Which rules achieve the desired results?

A. anomaly

B. behavioral

C. threshold

D. availability

Buy Now

Correct Answer: B

Questions 12

Which type of attack involves executing arbitrary commands on the operating system to escalate privileges?

A. Apache log

B. cross-site scripting

C. command injection

D. SQL injection

Buy Now

Correct Answer: C

Questions 13

What is the impact of false negative alerts when compared to true negative alerts?

A. A false negative is someone trying to hack into the system and no alert is raised, and a true negative is an event that never happened and an alert was not raised.

B. A true negative is an alert for an exploit attempt when no attack was detected, and a false negative is when no attack happens and an alert is still raised.

C. A true negative is a legitimate attack that triggers a brute force alert, and a false negative is when no alert and no attack is occurring.

D. A false negative is an event that alerts for injection attack when no attack is happening, and a true negative is an attack that happens and an alert that is appropriately raised.

Buy Now

Correct Answer: A

Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jun 07, 2025
Questions: 438

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.