Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

200-201 Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 8
Total 476 questions

What is the advantage of agent-based protection compared to agentless protection?

A.

easier to manage due to the centralized platform

B.

monitors and detects traffic locally

C.

manages unlimited devices simultaneously

D.

lower resource requirements during implementation

Exhibit.

An engineer received a ticket about a slowdown of a web application, Drug analysis of traffic, the engineer suspects a possible attack on a web server. How should the engineer interpret the Wiresharat traffic capture?

A.

10.0.0.2 sends GET/ HTTP/1.1 And Post request and the target responds with HTTP/1.1. 200 OC and HTTP/1.1 403 accordingly. This is an HTTP flood attempt.

B.

10.0.0.2 sends HTTP FORBIDDEN /1.1 And Post request, while the target responds with HTTP/1.1 200 Get and HTTP/1.1 403. This is an HTTP GET flood attack.

C.

10.128.0.2 sends POST/1.1 And POST requests, and the target responds with HTTP/1.1 200 Ok and HTTP/1.1 403 accordingly. This is an HTTP Reserve Bandwidth flood.

D.

10.128.0.2 sends HTTP/FORBIDDEN/ 1.1 and Get requests, and the target responds with HTTP/1.1 200 OK and HTTP/1.1 403. This is an HTTP cache bypass attack.

Which metric is used to capture the level of access needed to launch a successful attack?

A.

privileges required

B.

user interaction

C.

attack complexity

D.

attack vector

A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format. Which type of evidence is this file?

A.

CD data copy prepared in Windows

B.

CD data copy prepared in Mac-based system

C.

CD data copy prepared in Linux system

D.

CD data copy prepared in Android-based system

A multinational organization uses a complex network infrastructure incorporating multiple cloud services, diverse endpoints, and distributed networks with several security devices. Which challenge will the security team face when ensuring robust data visibility for effective threat detection and response?

A.

inconsistent data aggregation from different technologies used within the organization

B.

different protocols used through different technologies across the organization

C.

duplicate logs and alerts from different platforms

D.

limited data retention policies across different platforms

An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

A.

Recovery

B.

Detection

C.

Eradication

D.

Analysis

An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)

A.

management and reporting

B.

traffic filtering

C.

adaptive AVC

D.

metrics collection and exporting

E.

application recognition

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?

A.

ransomware communicating after infection

B.

users downloading copyrighted content

C.

data exfiltration

D.

user circumvention of the firewall

How does the approach of a behavioral detection system to identifying security threats compare to that of a rule-based detection system?

A.

Rule-based detection is effective with fewer false positives, and behavioral adapts over time.

B.

Behavioral detection is easier to deploy without rules, and rule-based needs historical data.

C.

Behavioral detection is adaptive to deviations, and rule-based detection uses static rules.

D.

Rule-based detection excels at APT hunts with updates, and behavioral focuses on anomalies.

Which attack method intercepts traffic on a switched network?

A.

denial of service

B.

ARP cache poisoning

C.

DHCP snooping

D.

command and control

An engineer is sharing folders and files with different departments and got this error: "No such file or directory". What must the engineer verify next?

A.

memory allocation

B.

symlinks

C.

permission

D.

disk space

Which signature impacts network traffic by causing legitimate traffic to be blocked?

A.

false negative

B.

true positive

C.

true negative

D.

false positive

A security engineer must investigate a recent breach within the organization. An engineer noticed that a breached workstation is trying to connect to the domain "Ranso4730-mware92-647". which is known as malicious. In which step of the Cyber Kill Chain is this event?

A.

Vaporization

B.

Delivery

C.

reconnaissance

D.

Action on objectives

Refer to the exhibit.

Which tool was used to generate this data?

A.

NetFlow

B.

dnstools

C.

firewall

D.

tcpdump

Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?

A.

Biba

B.

Object-capability

C.

Take-Grant

D.

Zero Trust

An analyst is exploring the functionality of different operating systems.

What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

A.

queries Linux devices that have Microsoft Services for Linux installed

B.

deploys Windows Operating Systems in an automated fashion

C.

is an efficient tool for working with Active Directory

D.

has a Common Information Model, which describes installed hardware and software

Drag and drop the security concept from the left onto the example of that concept on the right.

Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)

A.

UDP port to which the traffic is destined

B.

TCP port from which the traffic was sourced

C.

source IP address of the packet

D.

destination IP address of the packet

E.

UDP port from which the traffic is sourced

Which CVSS metric group identifies other components that are affected by a successful security attack?

A.

scope

B.

attack vector

C.

integrity

D.

privileges required

Refer to the exhibit.

What does the output indicate about the server with the IP address 172.18.104.139?

A.

open ports of a web server

B.

open port of an FTP server

C.

open ports of an email server

D.

running processes of the server

Page: 4 / 8
Total 476 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved