Free Demo Questions

Test Online Free Cisco 200-201 Exam Questions and Answers

Practice a live sample before buying full access. This page keeps the free 200-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.

Updated Feb 02, 2026 53 Questions 4 Pages
Page 1 of 4
Next Page
Question 1 Selectable Answer
What is the impact of false positive alerts on business compared to true positive?

Answer:
Question 2 Selectable Answer
Which event is a vishing attack?

Answer:
Explanation:
Reference: https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html#~types-of-phishing-attacks
Question 3 Selectable Answer
Refer to the exhibit.



A security analyst is investigating unusual activity from an unknown IP address Which type of evidence is this file1?

Answer:
Question 4 Selectable Answer
Why is HTTPS traffic difficult to screen?

Answer:
Question 5 Selectable Answer
Refer to the exhibit.



What is the potential threat identified in this Stealthwatch dashboard?

Answer:
Explanation:
"EX" = exfiltration
And there are three.
Also the "suspect long flow" and "suspect data heading" suggest, for example, DNS exfiltration
https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/management_console/sm
c_users_guide/SW_6_9_0_SMC_Users_Guide_DV_1_2.pdf page 177.
Question 6 Selectable Answer
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
Which type of evidence is this?

Answer:
Explanation:
There are three general types of evidence:
--> Best evidence: can be presented in court in the original form (for example, an exact copy of a hard disk drive).
--> Corroborating evidence: tends to support a theory or an assumption deduced by some initial evidence. This corroborating evidence confirms the proposition.
--> Indirect or circumstantial evidence: extrapolation to a conclusion of fact (such as fingerprints, DNA evidence, and so on).
Question 7 Selectable Answer
Which vulnerability type is used to read, write, or erase information from a database?

Answer:
Question 8 Selectable Answer
What ate two categories of DDoS attacks? (Choose two.)

Answer:
Question 9 Selectable Answer
Refer to the exhibit.



Which two elements in the table are parts of the 5-tuple? (Choose two.)

Answer:
Question 10 Selectable Answer
What is the difference between an attack vector and attack surface?

Answer:
Question 11 Selectable Answer
Which security technology allows only a set of pre-approved applications to run on a system?

Answer:
Question 12 Selectable Answer
Refer to the exhibit.



An engineer is reviewing a Cuckoo report of a file.
What must the engineer interpret from the report?

Answer:
Question 13 Selectable Answer
Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?

Answer:
Explanation:
Resource exhaustion is a type of denial-of-service attack; however, it can also be used to evade detection by security defenses. A simple definition of resource exhaustion is “consuming the resources necessary to perform an action.” Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Question 14 Selectable Answer
Refer to the exhibit.



An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command.
How must the engineer interpret the results?

Answer:
Question 15 Selectable Answer
Which technology on a host is used to isolate a running application from other applications?

Answer:
Explanation:
Reference: https://searchsecurity.techtarget.com/definition/sandbox#:~:text=Sandboxes%20can%20be%20used%20to,be%20run%20inside%20a%20sandbox
Showing page 1 of 4
Next Page