Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 4

Questions 31

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?

Options:
A.

AWS

B.

IIS

C.

Load balancer

D.

Proxy server

Cisco 200-201 Premium Access
Questions 32

What is a comparison between rule-based and statistical detection?

Options:
A.

Statistical is based on measured data while rule-based uses the evaluated probability approach.

B.

Rule-based Is based on assumptions and statistical uses data Known beforehand.

C.

Rule-based uses data known beforehand and statistical is based on assumptions.

D.

Statistical uses the probability approach while rule-based Is based on measured data.

Questions 33

A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?

Options:
A.

DNS hijacking

B.

DNS tunneling

C.

DNS flooding

D.

DNS amplification

Questions 34

Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)

Options:
A.

detection and analysis

B.

post-incident activity

C.

vulnerability scoring

D.

vulnerability management

E.

risk assessment

Questions 35

Which security technology allows only a set of pre-approved applications to run on a system?

Options:
A.

application-level blacklisting

B.

host-based IPS

C.

application-level whitelisting

D.

antivirus

Questions 36

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

Options:
A.

X 509 certificates

B.

RADIUS server

C.

CA server

D.

web application firewall

Questions 37

An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?

Options:
A.

sequence numbers

B.

IP identifier

C.

5-tuple

D.

timestamps

Questions 38

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

Options:
A.

examination

B.

investigation

C.

collection

D.

reporting

Questions 39

Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?

Options:
A.

command injection

B.

man in the middle attack

C.

evasion methods

D.

phishing

Questions 40

What is the impact of false positive alerts on business compared to true positive?

Options:
A.

True positives affect security as no alarm is raised when an attack has taken place, while false positives are alerts raised appropriately to detect and further mitigate them.

B.

True-positive alerts are blocked by mistake as potential attacks, while False-positives are actual attacks Identified as harmless.

C.

False-positive alerts are detected by confusion as potential attacks, while true positives are attack attempts identified appropriately.

D.

False positives alerts are manually ignored signatures to avoid warnings that are already acknowledged, while true positives are warnings that are not yet acknowledged.

Exam Code: 200-201
Certification Provider: Cisco
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jul 10, 2025
Questions: 375