Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 6

Questions 51

Which information must an organization use to understand the threats currently targeting the organization?

Options:
A.

threat intelligence

B.

risk scores

C.

vendor suggestions

D.

vulnerability exposure

Cisco 200-201 Premium Access
Questions 52

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.

Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

Options:
A.

signatures

B.

host IP addresses

C.

file size

D.

dropped files

E.

domain names

Questions 53

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

Options:
A.

integrity

B.

confidentiality

C.

availability

D.

scope

Questions 54

According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?

Options:
A.

malware attack

B.

ransomware attack

C.

whale-phishing

D.

insider threat

Questions 55

Which data type is necessary to get information about source/destination ports?

Options:
A.

statistical data

B.

session data

C.

connectivity data

D.

alert data

Questions 56

A security engineer must investigate a recent breach within the organization. An engineer noticed that a breached workstation is trying to connect to the domain "Ranso4730-mware92-647". which is known as malicious. In which step of the Cyber Kill Chain is this event?

Options:
A.

Vaporization

B.

Delivery

C.

reconnaissance

D.

Action on objectives

Questions 57

A user received an email attachment named "Hr405-report2609-empl094.exe" but did not run it. Which category of the cyber kill chain should be assigned to this type of event?

Options:
A.

installation

B.

reconnaissance

C.

weaponization

D.

delivery

Questions 58

What is the difference between the rule-based detection when compared to behavioral detection?

Options:
A.

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

B.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

C.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

D.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Questions 59

How does an SSL certificate impact security between the client and the server?

Options:
A.

by enabling an authenticated channel between the client and the server

B.

by creating an integrated channel between the client and the server

C.

by enabling an authorized channel between the client and the server

D.

by creating an encrypted channel between the client and the server

Questions 60

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?

Options:
A.

company assets that are threatened

B.

customer assets that are threatened

C.

perpetrators of the attack

D.

victims of the attack

Exam Code: 200-201
Certification Provider: Cisco
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jul 12, 2025
Questions: 375