Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 10

Questions 91

Which two elements are used for profiling a network? (Choose two.)

Options:
A.

session duration

B.

total throughput

C.

running processes

D.

listening ports

E.

OS fingerprint

Cisco 200-201 Premium Access
Questions 92

Refer to the exhibit.

200-201 Question 92

An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?

Options:
A.

indirect

B.

circumstantial

C.

corroborative

D.

best

Questions 93

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.

Which information is available on the server certificate?

Options:
A.

server name, trusted subordinate CA, and private key

B.

trusted subordinate CA, public key, and cipher suites

C.

trusted CA name, cipher suites, and private key

D.

server name, trusted CA, and public key

Questions 94

A user reports difficulties accessing certain external web pages. When an engineer examines traffic to and from the external domain in full packet captures, they notice that many SYNs have the same sequence number, source, and destination IP address, but they have different payloads. What is causing this situation?

Options:
A.

TCP injection

B.

misconfiguration of a web filter

C.

Failure of the full packet capture solution

D.

insufficient network resources

Questions 95

An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?

Options:
A.

The computer has a HIPS installed on it.

B.

The computer has a NIPS installed on it.

C.

The computer has a HIDS installed on it.

D.

The computer has a NIDS installed on it.

Questions 96

An engineer is working on a ticket for an incident from the incident management team A week ago. an external web application was targeted by a DDoS attack Server resources were exhausted and after two hours it crashed. An engineer was able to identify the attacker and technique used Three hours after the attack, the server was restored and the engineer recommended implementing mitigation by Blackhole filtering and transferred the incident ticket back to the IR team According to NIST SP800-61, at which phase of the incident response did the engineer finish work?

Options:
A.

preparation

B.

post-incident activity

C.

containment eradication and recovery

D.

detection and analysis

Questions 97

According to the NIST SP 800-86. which two types of data are considered volatile? (Choose two.)

Options:
A.

swap files

B.

temporary files

C.

login sessions

D.

dump files

E.

free space

Questions 98

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

Options:
A.

Firepower

B.

Email Security Appliance

C.

Web Security Appliance

D.

Stealthwatch

Questions 99

What is a collection of compromised machines that attackers use to carry out a DDoS attack?

Options:
A.

subnet

B.

botnet

C.

VLAN

D.

command and control

Exam Code: 200-201
Certification Provider: Cisco
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jul 19, 2025
Questions: 375