Test Online Free Cisco 200-201 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 200-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
What are the two characteristics of the full packet captures? (Choose two.)
Answer:
Question 19Selectable Answer
1.An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
What is the impact of this traffic?
Answer:
Question 20Selectable Answer
Which metric is used to capture the level of access needed to launch a successful attack?
Answer: Explanation:
Attack Vector ( AV) represents the level of access an attacker needs to have to exploit a vulnerability. It can assume four values: Network, Adjacent, Local and Physical.
Source: Official cert Guide Cisco CyberOps Associate CBROPS 200-201 Chapter7:
Introduction to Security Operations Management.
Question 21Selectable Answer
A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays.
Which information must the engineer obtain for this analysis?
Answer:
Question 22Selectable Answer
The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?
What specific type of analysis is assigning values to the scenario to see expected outcomes?
Answer:
Question 24Selectable Answer
An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN.
What is causing this issue?
Which type of data consists of connection level, application-specific records generated from network traffic?
Answer:
Question 26Selectable Answer
A threat actor penetrated an organization's network.
Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events.
Which technology provided these logs?
Answer:
Question 28Selectable Answer
What are the two differences between stateful and deep packet inspection? (Choose two)
Answer:
Question 29Selectable Answer
Refer to the exhibit.
Which type of log is displayed?
Answer: Explanation:
You also see the 5-tuple in IPS events, NetFlow records, and other event data. In fact, on the exam you may need to differentiate between a firewall log versus a traditional IPS or IDS event. One of the things to remember is that traditional IDS and IPS use signatures, so an easy way to differentiate is by looking for a signature ID (SigID). If you see a signature ID, then most definitely the event is a traditional IPS or IDS event.