Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

200-201 Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 8
Total 476 questions

After a large influx of network traffic to externally facing devices, a security engineer begins investigating what appears to be a denial of service attack When the packet capture data is reviewed, the engineer notices that the traffic is a single SYN packet to each port Which type of attack is occurring?

A.

traffic fragmentation

B.

port scanning

C.

host profiling

D.

SYN flood

A security analyst received a ticket about suspicious traffic from one of the workstations. During the investigation, the analyst discovered that the workstation was communicating with an external IP. The analyst could not investigate further and escalated the case to a T2 security analyst. What are the two data visibility challenges that the security analyst should identify? (Choose two.)

A.

A default user agent is present in the headers.

B.

Traffic is not encrypted.

C.

HTTP requests and responses are sent in plaintext.

D.

POST requests have a "Microsoft-IIS/7.5" server header.

E.

Encrypted data is being transmitted.

What is the function of a command and control server?

A.

It enumerates open ports on a network device

B.

It drops secondary payload into malware

C.

It is used to regain control of the network after a compromise

D.

It sends instruction to a compromised system

What is a difference between tampered and untampered disk images?

A.

Tampered images have the same stored and computed hash.

B.

Tampered images are used as evidence.

C.

Untampered images are used for forensic investigations.

D.

Untampered images are deliberately altered to preserve as evidence

Refer to the exhibit. What occurred on this system based on this output?

A.

A user connected to the system using remote access VPN.

B.

A user created a new HTTP session using the SHA256 hashing algorithm.

C.

A user connected to the system after 450 attempts.

D.

A user connected to the system using SSH using source port 55796.

How does an SSL certificate impact security between the client and the server?

A.

by enabling an authenticated channel between the client and the server

B.

by creating an integrated channel between the client and the server

C.

by enabling an authorized channel between the client and the server

D.

by creating an encrypted channel between the client and the server

Which type of verification consists of using tools to compute the message digest of the original and copied data, then comparing the similarity of the digests?

A.

evidence collection order

B.

data integrity

C.

data preservation

D.

volatile data collection

A security engineer must determine why a new core application does not work as desired The client can send requests toward the application server but receives no response One of the requirements is to gather all packets Data needs to be reliable without any delay or packet drops Which solution best meets this need?

A.

3 device logs

B.

span port

C.

port mirroring

D.

tap device

A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?

A.

total throughput on the interface of the router and NetFlow records

B.

output of routing protocol authentication failures and ports used

C.

running processes on the applications and their total network usage

D.

deep packet captures of each application flow and duration

What is a ransomware attack?

A.

It is a component of a malware attack used to establish a remote covert channel.

B.

It is malicious software that steals confidential data.

C.

It encrypts a victim’s data and prevents access to it.

D.

The volume of data exceeds storage capacity.

Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?

A.

syslog messages

B.

full packet capture

C.

NetFlow

D.

firewall event logs

Which regular expression matches loopback IP address (127.0.0.1)?

A.

&127%0%0%1

B.

%127.0.0.1%

C.

127\.0\.0\.1

D.

127[.0.].0.\

An engineer must verify vulnerabilities found in the scanning process The engineer checks the impact of those findings to the organization and compares the results with known threats inside organization What is the benefit of knowing this information?

A.

A pcap file can be prepared

B.

An exploit can be built.

C.

Risk can be calculated

D.

Logs can be gathered

What is data tunneling?

A.

Encrypted information is returned to its original format.

B.

Data is split into packets and transported to the destination.

C.

Packets are transformed into bytes and assembled by a receiver.

D.

Malicious data is hidden within legitimate system processes.

How is NetFlow different from traffic mirroring?

A.

NetFlow collects metadata and traffic mirroring clones data.

B.

Traffic mirroring impacts switch performance and NetFlow does not.

C.

Traffic mirroring costs less to operate than NetFlow.

D.

NetFlow generates more data than traffic mirroring.

The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?

A.

Isolate the infected endpoint from the network.

B.

Perform forensics analysis on the infected endpoint.

C.

Collect public information on the malware behavior.

D.

Prioritize incident handling based on the impact.

Which process represents the application-level allow list?

A.

allowing everything and denying specific applications protocols

B.

allowing everything and denying specific executable files

C.

allowing specific format files and deny executable files

D.

allowing specific files and deny everything else

Drag and drop the elements from the left into the correct order for incident handling on the right.

What is the difference between tampered and untampered disk images?

A.

Untampered images are not secure.

B.

Tampered images are secure.

C.

Untampered images store hidden items inside.

D.

Tampered images store hidden items inside.

Which regex matches only on all lowercase letters?

A.

[a−z]+

B.

[^a−z]+

C.

a−z+

D.

a*z+

Page: 2 / 8
Total 476 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved