200-201 Actual Exam Questions

Last updated on Dec. 5, 2024.
Vendor:Cisco
Exam Code:200-201
Exam Name:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Exam Questions:435
 

Topic 1 - Single Topic

Question #1 Topic 1

Which event is user interaction?

  • A. gaining root access
  • B. executing remote code
  • C. reading and writing file permission
  • D. opening a malicious file
Reveal Solution Hide Solution   Discussion   18

Correct Answer: D 🗳️

Question #2 Topic 1

Which security principle requires more than one person is required to perform a critical task?

  • A. least privilege
  • B. need to know
  • C. separation of duties
  • D. due diligence
Reveal Solution Hide Solution   Discussion   14

Correct Answer: C 🗳️

Question #3 Topic 1

How is attacking a vulnerability categorized?

  • A. action on objectives
  • B. delivery
  • C. exploitation
  • D. installation
Reveal Solution Hide Solution   Discussion   9

Correct Answer: C 🗳️

Question #4 Topic 1

What is a benefit of agent-based protection when compared to agentless protection?

  • A. It lowers maintenance costs
  • B. It provides a centralized platform
  • C. It collects and detects all traffic locally
  • D. It manages numerous devices simultaneously
Reveal Solution Hide Solution   Discussion   28

Correct Answer: C 🗳️

Question #5 Topic 1

Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?

  • A. decision making
  • B. rapid response
  • C. data mining
  • D. due diligence
Reveal Solution Hide Solution   Discussion   21

Correct Answer: D 🗳️

Question #6 Topic 1

One of the objectives of information security is to protect the CIA of information and systems.
What does CIA mean in this context?

  • A. confidentiality, identity, and authorization
  • B. confidentiality, integrity, and authorization
  • C. confidentiality, identity, and availability
  • D. confidentiality, integrity, and availability
Reveal Solution Hide Solution   Discussion   14

Correct Answer: D 🗳️

Question #7 Topic 1

What is rule-based detection when compared to statistical detection?

  • A. proof of a user's identity
  • B. proof of a user's action
  • C. likelihood of user's action
  • D. falsification of a user's identity
Reveal Solution Hide Solution   Discussion   7

Correct Answer: B 🗳️

Question #8 Topic 1

An engineer configured regular expression ".*\.([Dd][Oo][Cc]|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1.[01]" on Cisco ASA firewall. What does this regular expression do?

  • A. It captures .doc, .xls, and .pdf files in HTTP v1.0 and v1.1.
  • B. It captures documents in an HTTP network session.
  • C. It captures Word, Excel, and PowerPoint files in HTTP v1.0 and v1.1.
  • D. It captures .doc, .xls, and .ppt files extensions in HTTP v1.0.
Reveal Solution Hide Solution   Discussion   2

Correct Answer: C 🗳️

Question #9 Topic 1

Which process is used when IPS events are removed to improve data integrity?

  • A. data availability
  • B. data normalization
  • C. data signature
  • D. data protection
Reveal Solution Hide Solution   Discussion   11

Correct Answer: B 🗳️

Question #10 Topic 1

An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?

  • A. sequence numbers
  • B. IP identifier
  • C. 5-tuple
  • D. timestamps
Reveal Solution Hide Solution   Discussion   15

Correct Answer: C 🗳️

file Viewing page 1 out of 44 pages.
Viewing questions 1-10 out of 435 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago