Exam Code | 200-201 |
Exam Name | Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) |
Questions | 331 |
Update Date | November 01,2024 |
Price |
Was : |
This exam is a key step towards achieving your Cisco certification in the service provider domain. At Prep4Cisco, we are dedicated to providing you with the most comprehensive study materials and resources to ensure your success in this important certification exam.
Take the first step towards becoming a certified Cisco service provider professional. With Prep4Cisco's comprehensive study materials and 100% passing guarantee, you'll be well-prepared to excel on the Cisco 200-201 exam. Start your journey today and unlock exciting career opportunities in the world of service provider networking.
Choose Prep4Cisco and let's achieve your Cisco certification goals together!
What is the function of a command and control server?
A. It enumerates open ports on a network device
B. It drops secondary payload into malware
C. It is used to regain control of the network after a compromise
D. It sends instruction to a compromised system
Which technology on a host is used to isolate a running application from otherapplications?
A. sandbox
B. application allow list
C. application block list
D. host-based firewall
An employee received an email from a colleague’s address asking for the password for thedomain controller. The employee noticed a missing letter within the sender’s address. Whatdoes this incident describe?
A. brute-force attack
B. insider attack
C. shoulder surfing
D. social engineering
During which phase of the forensic process are tools and techniques used to extractinformation from the collected data?
A. investigation
B. examination
C. reporting
D. collection
What should an engineer use to aid the trusted exchange of public keys between usertom0411976943 and dan1968754032?
A. central key management server
B. web of trust
C. trusted certificate authorities
D. registration authority data
Why is HTTPS traffic difficult to screen?
A. HTTPS is used internally and screening traffic (or external parties is hard due toisolation.
B. The communication is encrypted and the data in transit is secured.
C. Digital certificates secure the session, and the data is sent at random intervals.
D. Traffic is tunneled to a specific destination and is inaccessible to others except for thereceiver.
Which tool gives the ability to see session data in real time?
A. tcpdstat
B. trafdump
C. tcptrace
D. trafshow
What are two denial-of-service (DoS) attacks? (Choose two)
A. port scan
B. SYN flood
C. man-in-the-middle
D. phishing
E. teardrop
According to the NIST SP 800-86. which two types of data are considered volatile?(Choose two.)
A. swap files
B. temporary files
C. login sessions
D. dump files
E. free space
What is the difference between discretionary access control (DAC) and role-based accesscontrol (RBAC)?
A. DAC requires explicit authorization for a given user on a given object, and RBACrequires specific conditions.
B. RBAC access is granted when a user meets specific conditions, and in DAC,permissions are applied on user and group levels.
C. RBAC is an extended version of DAC where you can add an extra level of authorizationbased on time.
D. DAC administrators pass privileges to users and groups, and in RBAC, permissions areapplied to specific groups