Cisco 200-201 Exam Dumps

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
850 Reviews

Exam Code 200-201
Exam Name Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Questions 331
Update Date November 01,2024
Price Was : $81 Today : $45 Was : $99 Today : $55 Was : $117 Today : $65

Prepare Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

This exam is a key step towards achieving your Cisco certification in the service provider domain. At Prep4Cisco, we are dedicated to providing you with the most comprehensive study materials and resources to ensure your success in this important certification exam.

Start Your Cisco 200-201 Journey Today

Take the first step towards becoming a certified Cisco service provider professional. With Prep4Cisco's comprehensive study materials and 100% passing guarantee, you'll be well-prepared to excel on the Cisco 200-201 exam. Start your journey today and unlock exciting career opportunities in the world of service provider networking.

Choose Prep4Cisco and let's achieve your Cisco certification goals together!


Cisco 200-201 Sample Questions

Question # 1

What is the function of a command and control server?

A. It enumerates open ports on a network device
B. It drops secondary payload into malware
C. It is used to regain control of the network after a compromise
D. It sends instruction to a compromised system



Question # 2

Which technology on a host is used to isolate a running application from otherapplications?

A. sandbox
B. application allow list
C. application block list
D. host-based firewall



Question # 3

An employee received an email from a colleague’s address asking for the password for thedomain controller. The employee noticed a missing letter within the sender’s address. Whatdoes this incident describe?

A. brute-force attack
B. insider attack
C. shoulder surfing
D. social engineering



Question # 4

During which phase of the forensic process are tools and techniques used to extractinformation from the collected data?

A. investigation
B. examination
C. reporting
D. collection



Question # 5

What should an engineer use to aid the trusted exchange of public keys between usertom0411976943 and dan1968754032?

A. central key management server
B. web of trust
C. trusted certificate authorities
D. registration authority data



Question # 6

Why is HTTPS traffic difficult to screen?

A. HTTPS is used internally and screening traffic (or external parties is hard due toisolation.
B. The communication is encrypted and the data in transit is secured.
C. Digital certificates secure the session, and the data is sent at random intervals.
D. Traffic is tunneled to a specific destination and is inaccessible to others except for thereceiver.



Question # 7

Which tool gives the ability to see session data in real time?

A. tcpdstat
B. trafdump
C. tcptrace
D. trafshow



Question # 8

What are two denial-of-service (DoS) attacks? (Choose two)

A. port scan
B. SYN flood
C. man-in-the-middle
D. phishing
E. teardrop



Question # 9

According to the NIST SP 800-86. which two types of data are considered volatile?(Choose two.)

A. swap files
B. temporary files
C. login sessions
D. dump files
E. free space



Question # 10

What is the difference between discretionary access control (DAC) and role-based accesscontrol (RBAC)?

A. DAC requires explicit authorization for a given user on a given object, and RBACrequires specific conditions.
B. RBAC access is granted when a user meets specific conditions, and in DAC,permissions are applied on user and group levels.
C. RBAC is an extended version of DAC where you can add an extra level of authorizationbased on time.
D. DAC administrators pass privileges to users and groups, and in RBAC, permissions areapplied to specific groups