Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

200-201 Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 7
Total 409 questions

Refer to the exhibit.

Which application-level protocol is being targeted?

A.

HTTPS

B.

FTP

C.

HTTP

D.

TCP

What is the communication channel established from a compromised machine back to the attacker?

A.

man-in-the-middle

B.

IDS evasion

C.

command and control

D.

port scanning

A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?

A.

reconnaissance

B.

delivery

C.

weaponization

D.

exploitation

Which of these describes volatile evidence?

A.

registers and cache

B.

logs

C.

usernames

D.

disk and removable drives

An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigate this resource usage?

A.

Run "ps -d" to decrease the priority state of high load processes to avoid resource exhaustion.

B.

Run "ps -u" to find out who executed additional processes that caused a high load on a server.

C.

Run "ps -ef" to understand which processes are taking a high amount of resources.

D.

Run "ps -m" to capture the existing state of daemons and map required processes to find the gap.

An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?

A.

phishing email

B.

sender

C.

HR

D.

receiver

What are two differences of deep packet inspection compared to stateful firewall inspection? (Choose two.)

A.

static lists for maintaining a strict access control level

B.

offers application-level monitoring

C.

inspection of only the first packet during a connection attempt

D.

different rule configurations based on payload pattern

E.

quality of service capabilities based on list definitions

Refer to the exhibit. A SOC engineer is analyzing Cuckoo Sandbox report for a file that has been identified as suspicious by the endpoint security system. What is the state of the file?

A.

The file was identified as PE32 executable with a high level of entropy to bypass AV via encryption.

B.

The file was detected as an executable binary file, but no suspicious activity was detected and it is false positive.

C.

The file was detected as executable and was marked by the SSDeep hashing algorithm as suspicious.

D.

The file identified as an executable binary for Microsoft Word with macros creating hidden process via PowerShell.

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

A.

NetScout

B.

tcpdump

C.

SolarWinds

D.

netsh

An analyst discovers that a legitimate security alert has been dismissed. Which signature caused this impact on network traffic?

A.

true negative

B.

false negative

C.

false positive

D.

true positive

Which evasion method involves performing actions slower than normal to prevent detection?

A.

timing attack

B.

traffic fragmentation

C.

resource exhaustion

D.

tunneling

What are the two differences between vulnerability and exploit? (Choose two.)

A.

Known vulnerabilities are assigned special CVE numbers, and exploits are using process to take advantage of vulnerabilities.

B.

Vulnerabilities can be found in hardware and software, and exploits can be used only for software-based vulnerabilities.

C.

Zero-day exploit can be used to take advantage of a vulnerability until the vulnerable software or hardware is patched.

D.

Vulnerabilities are usually populated in the dark web, and exploit tools and methods can be found in the public web.

E.

Zero-day exploit can be used for taking advantage of a known vulnerability, and cyber-attack can be performed on company assets.

Developers must implement tasks on remote Windows environments. They decided to use scripts for enterprise applications through PowerShell. Why does the functionality not work?

A.

WMI must be configured.

B.

Symlinks must be enabled.

C.

Ext4 must be implemented.

D.

MBR must be set up.

Refer to the exhibit. A network engineer received a report that a host is communicating with unknown domains on the internet. The network engineer collected packet capture but could not determine the technique or the payload used. What technique is the attacker using?

A.

amplification

B.

teardrop

C.

session hijacking

D.

tunneling

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

A.

Firepower

B.

Email Security Appliance

C.

Web Security Appliance

D.

Stealthwatch

Drag and drop the data source from the left onto the data type on the right.

Which classification of cross-site scripting attack executes the payload without storing it for repeated use?

A.

stored

B.

reflective

C.

DOM

D.

CSRF

What is the difference between inline traffic interrogation and traffic mirroring?

A.

Inline interrogation is less complex as traffic mirroring applies additional tags to data.

B.

Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools

C.

Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.

D.

Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.

Refer to the exhibit.

Which technology produced the log?

A.

antivirus

B.

IPS/IDS

C.

proxy

D.

firewall

What is the virtual address space for a Windows process?

A.

physical location of an object in memory

B.

set of pages that reside in the physical memory

C.

system-level memory protection feature built into the operating system

D.

set of virtual memory addresses that can be used

Page: 1 / 7
Total 409 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved