Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 5

Questions 41

How does statistical detection differ from rule-based detection?

Options:
A.

Statistical detection involves the evaluation of events, and rule-based detection requires an evaluated set of events to function.

B.

Statistical detection defines legitimate data over time, and rule-based detection works on a predefined set of rules

C.

Rule-based detection involves the evaluation of events, and statistical detection requires an evaluated set of events to function Rule-based detection defines

D.

legitimate data over a period of time, and statistical detection works on a predefined set of rules

Cisco 200-201 Premium Access
Questions 42

What is data encapsulation?

Options:
A.

Browsing history is erased automatically with every session.

B.

The protocol of the sending host adds additional data to the packet header.

C.

Data is encrypted backwards, which makes it unusable.

D.

Multiple hosts can be supported with only a few public IP addresses.

Questions 43

According to CVSS, what is attack complexity?

Options:
A.

existing exploits available in the wild exploiting the vulnerability

B.

existing circumstances beyond the attacker's control to exploit the vulnerability

C.

number of actions an attacker should perform to exploit the vulnerability

D.

number of patches available for certain attack mitigation and how complex the workarounds are

Questions 44

An engineer must compare NIST vs ISO frameworks The engineer deeded to compare as readable documentation and also to watch a comparison video review. Using Windows 10 OS. the engineer started a browser and searched for a NIST document and then opened a new tab in the same browser and searched for an ISO document for comparison

The engineer tried to watch the video, but there 'was an audio problem with OS so the engineer had to troubleshoot it At first the engineer started CMD and looked fee a driver path then locked for a corresponding registry in the registry editor The engineer enabled "Audiosrv" in task manager and put it on auto start and the problem was solved Which two components of the OS did the engineer touch? (Choose two)

Options:
A.

permissions

B.

PowerShell logs

C.

service

D.

MBR

E.

process and thread

Questions 45

Which action prevents buffer overflow attacks?

Options:
A.

variable randomization

B.

using web based applications

C.

input sanitization

D.

using a Linux operating system

Questions 46

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.

What is the initial event called in the NIST SP800-61?

Options:
A.

online assault

B.

precursor

C.

trigger

D.

instigator

Questions 47

Which type of data collection requires the largest amount of storage space?

Options:
A.

alert data

B.

transaction data

C.

session data

D.

full packet capture

Questions 48

Refer to the exhibit.

What is shown in this PCAP file?

Options:
A.

Timestamps are indicated with error.

B.

The protocol is TCP.

C.

The User-Agent is Mozilla/5.0.

D.

The HTTP GET is encoded.

Questions 49

Which type of data consists of connection level, application-specific records generated from network traffic?

Options:
A.

transaction data

B.

location data

C.

statistical data

D.

alert data

Questions 50

Which process is used when IPS events are removed to improve data integrity?

Options:
A.

data availability

B.

data normalization

C.

data signature

D.

data protection

Exam Code: 200-201
Certification Provider: Cisco
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jul 9, 2025
Questions: 375