Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 8

Questions 71

Which signature impacts network traffic by causing legitimate traffic to be blocked?

Options:
A.

false negative

B.

true positive

C.

true negative

D.

false positive

Cisco 200-201 Premium Access
Questions 72

Drag and drop the security concept from the left onto the example of that concept on the right.

Options:
Questions 73

Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?

Options:
A.

Biba

B.

Object-capability

C.

Take-Grant

D.

Zero Trust

Questions 74

What is the principle of defense-in-depth?

Options:
A.

Agentless and agent-based protection for security are used.

B.

Several distinct protective layers are involved.

C.

Access control models are involved.

D.

Authentication, authorization, and accounting mechanisms are used.

Questions 75

What is a difference between a threat and a risk?

Options:
A.

A threat is a sum of risks and a risk itself represents a specific danger toward the asset

B.

A threat can be people property, or information, and risk is a probability by which these threats may bring harm to the business

C.

A risk is a flaw or hole in security, and a threat is what is being used against that flaw

D.

A risk is an intersection between threat and vulnerabilities, and a threat is what a security engineer is trying to protect against

Questions 76

What specific type of analysis is assigning values to the scenario to see expected outcomes?

Options:
A.

deterministic

B.

exploratory

C.

probabilistic

D.

descriptive

Questions 77

Which evasion technique is a function of ransomware?

Options:
A.

extended sleep calls

B.

encryption

C.

resource exhaustion

D.

encoding

Questions 78

The security team has detected an ongoing spam campaign targeting the organization. The team's approach is to push back the cyber kill chain and mitigate ongoing incidents. At which phase of the cyber kill chain should the security team mitigate this type of attack?

Options:
A.

actions

B.

delivery

C.

reconnaissance

D.

installation

Questions 79

Which vulnerability type is used to read, write, or erase information from a database?

Options:
A.

cross-site scripting

B.

cross-site request forgery

C.

buffer overflow

D.

SQL injection

Questions 80

Refer to the exhibit.

What is depicted in the exhibit?

Options:
A.

Windows Event logs

B.

Apache logs

C.

IIS logs

D.

UNIX-based syslog

Exam Code: 200-201
Certification Provider: Cisco
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Jul 10, 2025
Questions: 375