Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

200-201 Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 7 / 8
Total 476 questions

A suspicious user opened a connection from a compromised host inside an organization. Traffic was going through a router and the network administrator was able to identify this flow. The admin was following 5-tuple to collect needed data. Which information was gathered based on this approach?

A.

direct path

B.

user name

C.

protocol

D.

NAT

Refer to the exhibit.

Which technology produced the log?

A.

antivirus

B.

IPS/IDS

C.

proxy

D.

firewall

Developers must implement tasks on remote Windows environments. They decided to use scripts for enterprise applications through PowerShell. Why does the functionality not work?

A.

WMI must be configured.

B.

Symlinks must be enabled.

C.

Ext4 must be implemented.

D.

MBR must be set up.

Which type of evasion technique is accomplished by separating the traffic into smaller segments before transmitting across the network?

A.

tunneling

B.

fragmentation

C.

encryption

D.

proxies

What is the difference between the rule-based detection when compared to behavioral detection?

A.

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

B.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

C.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

D.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.

Refer to the exhibit.

A SOC analyst received a message from SIEM about abnormal activity on the Windows server The analyst checked the Windows event log and saw numerous Audit Failures logs. What is occurring?

A.

Windows failed to audit the logs

B.

regular Windows log

C.

brute-force attack

D.

DoS attack

Drag and drop the data source from the left onto the data type on the right.

Which classification of cross-site scripting attack executes the payload without storing it for repeated use?

A.

stored

B.

reflective

C.

DOM

D.

CSRF

What is the difference between a threat and an exploit?

A.

A threat is a result of utilizing flow in a system, and an exploit is a result of gaining control over the system.

B.

A threat is a potential attack on an asset and an exploit takes advantage of the vulnerability of the asset

C.

An exploit is an attack vector, and a threat is a potential path the attack must go through.

D.

An exploit is an attack path, and a threat represents a potential vulnerability

Refer to the exhibit.

Which stakeholders must be involved when a company workstation is compromised?

A.

Employee 1 Employee 2, Employee 3, Employee 4, Employee 5, Employee 7

B.

Employee 1, Employee 2, Employee 4, Employee 5

C.

Employee 4, Employee 6, Employee 7

D.

Employee 2, Employee 3, Employee 4, Employee 5

Refer to the exhibit.

During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events Which technology provided these logs?

A.

antivirus

B.

proxy

C.

IDS/IPS

D.

firewall

Refer to the exhibit.

Which technology generates this log?

A.

NetFlow

B.

IDS

C.

web proxy

D.

firewall

Which attack method is being used when an attacker tries to compromise a network with an authentication system that uses only 4-digit numeric passwords and no username?

A.

SQL injection

B.

dictionary

C.

replay

D.

cross-site scripting

Which step in the incident response process researches an attacking host through logs in a SIEM?

A.

detection and analysis

B.

preparation

C.

eradication

D.

containment

An analyst must choose one source of information for further troubleshooting. A key requirement is to use low storage space over the next 12 months while being able to quickly determine the source and scope of an attack to effectively mitigate it. Which source of information should the analyst choose?

A.

SPAN port

B.

NetFlow

C.

.pcap file

D.

traffic mirroring

Refer to the exhibit. A SOC engineer is analyzing Cuckoo Sandbox report for a file that has been identified as suspicious by the endpoint security system. What is the state of the file?

A.

The file was identified as PE32 executable with a high level of entropy to bypass AV via encryption.

B.

The file was detected as an executable binary file, but no suspicious activity was detected and it is false positive.

C.

The file was detected as executable and was marked by the SSDeep hashing algorithm as suspicious.

D.

The file identified as an executable binary for Microsoft Word with macros creating hidden process via PowerShell.

Which of these is a defense-in-depth strategy principle?

A.

identify the minimum resource required per employee.

B.

Assign the least network privileges to segment network permissions.

C.

Provide the minimum permissions needed to perform Job functions.

D.

Disable administrative accounts to avoid unauthorized changes.

How is SQL injection prevented?

A.

Address space layout randomization

B.

Validate and sanitize user input

C.

...in the web server as a nonprivileged user

D.

...cost profiling

What are the two characteristics of the full packet captures? (Choose two.)

A.

Identifying network loops and collision domains.

B.

Troubleshooting the cause of security and performance issues.

C.

Reassembling fragmented traffic from raw data.

D.

Detecting common hardware faults and identify faulty assets.

E.

Providing a historical record of a network transaction.

Page: 7 / 8
Total 476 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved