Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-201 Practice Exam with Questions & Answers

Questions 1

What is the virtual address space for a Windows process?

Options:
A.

physical location of an object in memory

B.

set of pages that reside in the physical memory

C.

system-level memory protection feature built into the operating system

D.

set of virtual memory addresses that can be used

Cisco 200-201 Premium Access
Questions 2

A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?

Options:
A.

application identification number

B.

active process identification number

C.

runtime identification number

D.

process identification number

Questions 3

Which action matches the weaponization step of the Cyber Kill Chain Model?

Options:
A.

Develop a specific malware to exploit a vulnerable server, i

B.

Match a known script to a vulnerability.

C.

Construct a trojan and deliver l! to the victim.

D.

Scan open services and ports on a server.

Questions 4

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.

200-201 Question 4

Which obfuscation technique is the attacker using?

Options:
A.

Base64 encoding

B.

TLS encryption

C.

SHA-256 hashing

D.

ROT13 encryption

Questions 5

How does agentless monitoring differ from agent-based monitoring?

Options:
A.

Agentless can access the data via API. While agent-base uses a less efficient method and accesses log data through WMI.

B.

Agent-based monitoring is less intrusive in gathering log data, while agentless requires open ports to fetch the logs

C.

Agent-based monitoring has a lower initial cost for deployment, while agentless monitoring requires resource-intensive deployment.

D.

Agent-based has a possibility to locally filter and transmit only valuable data, while agentless has much higher network utilization

Questions 6

What ate two categories of DDoS attacks? (Choose two.)

Options:
A.

split brain

B.

scanning

C.

phishing

D.

reflected

E.

direct

Questions 7

When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?

Options:
A.

full packet capture

B.

NetFlow data

C.

session data

D.

firewall logs

Questions 8

What is a difference between SIEM and SOAR?

Options:
A.

SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.

B.

SlEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.

C.

SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.

D.

SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.

Questions 9

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.

Which testing method did the intruder use?

Options:
A.

social engineering

B.

eavesdropping

C.

piggybacking

D.

tailgating

Questions 10

Which tool provides a full packet capture from network traffic?

Options:
A.

Nagios

B.

CAINE

C.

Hydra

D.

Wireshark

Exam Code: 200-201
Certification Provider: Cisco
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jul 10, 2025
Questions: 375