Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

200-201 Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 8
Total 476 questions

Which type of attack is a blank email with the subject "price deduction" that contains a malicious attachment?

A.

man-in-the-middle attack

B.

smishing

C.

phishing attack

D.

integrity violation

An analyst received a ticket about degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed disabled antivirus software and could not determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

A.

Detection

B.

Analysis

C.

Eradication

D.

Recovery

Drag and drop the event term from the left onto the description on the right.

A security engineer must protect the company from known issues that trigger adware. Recently new incident has been raised that could harm the system. Which security concepts are present in this scenario?

A.

exploit and patching

B.

risk and evidence

C.

analysis and remediation

D.

vulnerability and threat

Refer to the exhibit.

An engineer received an event log file to review. Which technology generated the log?

A.

NetFlow

B.

proxy

C.

firewall

D.

IDS/IPS

What is the difference between a vulnerability and an attack surface?

A.

A vulnerability is the risk of exploiting a weakness in the application, and the target application itself is the attack surface

B.

The attack surface is the SQL injection targeted on the database, and the database is the vulnerability that might be exploited.

C.

The attack surface is a sum of measured risks for a particular asset, and the vulnerability is an unmeasured exploitable risk

D.

A vulnerability is unsanitized user input sent to exploit a web application and the browser is the attack surface for the web application

Refer to the exhibit. Where is the executable file?

A.

info

B.

tags

C.

MIME

D.

name

What is the relationship between a vulnerability and a threat?

A.

A threat exploits a vulnerability

B.

A vulnerability is a calculation of the potential loss caused by a threat

C.

A vulnerability exploits a threat

D.

A threat is a calculation of the potential loss caused by a vulnerability

Which management concept best describes developing, operating, maintaining, upgrading, and disposing of all resources?

A.

configuration

B.

vulnerability

C.

asset

D.

patch

What describes the public key infrastructure (PKI)?

A.

PKI verifies the identity of the user and sender and creates secure communication channels using asymmetric encryption.

B.

PKI ensures packet loss prevention and creates secure communication channels using symmetric encryption.

C.

PKI verifies the identity of the user and sender and creates secure communication channels using symmetric encryption.

D.

PKI ensures packet loss prevention and creates secure communication channels using asymmetric encryption.

What is a difference between signature-based and behavior-based detection?

A.

Signature-based identifies behaviors that may be linked to attacks, while behavior-based has a predefined set of rules to match before an alert.

B.

Behavior-based identifies behaviors that may be linked to attacks, while signature-based has a predefined set of rules to match before an alert.

C.

Behavior-based uses a known vulnerability database, while signature-based intelligently summarizes existing data.

D.

Signature-based uses a known vulnerability database, while behavior-based intelligently summarizes existing data.

Which security principle requires more than one person is required to perform a critical task?

A.

least privilege

B.

need to know

C.

separation of duties

D.

due diligence

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.

Which testing method did the intruder use?

A.

social engineering

B.

eavesdropping

C.

piggybacking

D.

tailgating

What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?

A.

DAC requires explicit authorization for a given user on a given object, and RBAC requires specific conditions.

B.

RBAC access is granted when a user meets specific conditions, and in DAC, permissions are applied on user and group levels.

C.

RBAC is an extended version of DAC where you can add an extra level of authorization based on time.

D.

DAC administrators pass privileges to users and groups, and in RBAC, permissions are applied to specific groups

Which technique is a low-bandwidth attack?

A.

social engineering

B.

session hijacking

C.

evasion

D.

phishing

What is a description of "phishing" as a social engineering attack"?

A.

Someone without the proper authentication follows an authenticated employee into a restricted area The attacker might impersonate a delivery driver and wait outside a building to get things started

B.

A hacker masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message The recipient is then tricked into clicking a malicious link.

C.

The attacker focuses on creating a good pretext or a fabricated scenario that is used to try and steal victims' personal information

D.

Fake Social Security Administration personnel contact random individuals inform them that there has been a computer problem on their end and ask that those individuals confirm their Social Security Number, all for the purpose of committing identity theft.

An analyst is using the SIEM platform and must extract a custom property from a Cisco device and capture the phrase, "File: Clean." Which regex must the analyst import?

A.

File: Clean

B.

^Parent File Clean$

C.

File: Clean (.*)

D.

^File: Clean$

An engineer is working on the implementation of digital certificates for new cntical web applications One of the requirements is that the https connection must be validated and protected against malicious network impersonators The server will be exposed externally from the DMZ network Which certificate must be used?

A.

SSLv3

B.

TLS 1.1

C.

private CA

D.

X.509

What is the impact of false positive alerts on business compared to true positive?

A.

True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

B.

True positive alerts are blocked by mistake as potential attacks affecting application availability.

C.

False positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

D.

False positive alerts are blocked by mistake as potential attacks affecting application availability.

Refer to the exhibit. An attacker scanned the server using Nmap. What did the attacker obtain from this scan?

A.

Identified a firewall device preventing the pert state from being returned.

B.

Identified open SMB ports on the server

C.

Gathered information on processes running on the server

D.

Gathered a list of Active Directory users

Page: 6 / 8
Total 476 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved