Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 3

Questions 21

According to CVSS, what is a description of the attack vector score?

Options:
A.

The metric score will be larger when it is easier to physically touch or manipulate the vulnerable component

B.

It depends on how many physical and logical manipulations are possible on a vulnerable component

C.

The metric score will be larger when a remote attack is more likely.

D.

It depends on how far away the attacker is located and the vulnerable component

Cisco 200-201 Premium Access
Questions 22

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

Options:
A.

Hypertext Transfer Protocol

B.

SSL Certificate

C.

Tunneling

D.

VPN

Questions 23

A malicious file has been identified in a sandbox analysis tool.

Which piece of information is needed to search for additional downloads of this file by other hosts?

Options:
A.

file header type

B.

file size

C.

file name

D.

file hash value

Questions 24

Which security monitoring data type requires the largest storage space?

Options:
A.

transaction data

B.

statistical data

C.

session data

D.

full packet capture

Questions 25

What are two social engineering techniques? (Choose two.)

Options:
A.

privilege escalation

B.

DDoS attack

C.

phishing

D.

man-in-the-middle

E.

pharming

Questions 26

Refer to the exhibit.

Which stakeholders must be involved when a company workstation is compromised?

Options:
A.

Employee 1 Employee 2, Employee 3, Employee 4, Employee 5, Employee 7

B.

Employee 1, Employee 2, Employee 4, Employee 5

C.

Employee 4, Employee 6, Employee 7

D.

Employee 2, Employee 3, Employee 4, Employee 5

Questions 27

A member of the SOC team is checking the dashboard provided by the Cisco Firepower Manager for further Isolation actions. According to NIST SP800-61, in which phase of incident response is this action?

Options:
A.

Cost-incident activity phase

B.

Preparation phase

C.

Selection and analyze phase

D.

The radiation and recovery phase

Questions 28

Refer to the exhibit.

An engineer is reviewing a Cuckoo report of a file. What must the engineer interpret from the report?

Options:
A.

The file will appear legitimate by evading signature-based detection.

B.

The file will not execute its behavior in a sandbox environment to avoid detection.

C.

The file will insert itself into an application and execute when the application is run.

D.

The file will monitor user activity and send the information to an outside source.

Questions 29

Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?

Options:
A.

Display

B.

Man-in-the-middle

C.

Distributed denial of service

D.

Denial of service

Questions 30

What is a difference between data obtained from Tap and SPAN ports?

Options:
A.

Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.

B.

SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.

C.

SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.

D.

Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination

Exam Code: 200-201
Certification Provider: Cisco
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jul 10, 2025
Questions: 375