Free Demo Questions

Test Online Free Cisco 200-201 Exam Questions and Answers

Practice a live sample before buying full access. This page keeps the free 200-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.

Updated Feb 02, 2026 53 Questions 4 Pages
Page 2 of 4
Question 16 Selectable Answer
Refer to the exhibit.



What is occurring in this network traffic?

Answer:
Question 17 Selectable Answer
Refer to the exhibit.



Which type of attack is being executed?

Answer:
Explanation:
Reference: https://www.w3schools.com/sql/sql_injection.asp
Question 18 Selectable Answer
What are the two characteristics of the full packet captures? (Choose two.)

Answer:
Question 19 Selectable Answer
1.An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
What is the impact of this traffic?

Answer:
Question 20 Selectable Answer
Which metric is used to capture the level of access needed to launch a successful attack?

Answer:
Explanation:
Attack Vector ( AV) represents the level of access an attacker needs to have to exploit a vulnerability. It can assume four values: Network, Adjacent, Local and Physical.
Source: Official cert Guide Cisco CyberOps Associate CBROPS 200-201 Chapter7:
Introduction to Security Operations Management.
Question 21 Selectable Answer
A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays.
Which information must the engineer obtain for this analysis?

Answer:
Question 22 Selectable Answer
The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?

Answer:
Explanation:
refence: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
Question 23 Selectable Answer
What specific type of analysis is assigning values to the scenario to see expected outcomes?

Answer:
Question 24 Selectable Answer
An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN.
What is causing this issue?

Answer:
Explanation:
Reference: https://www.sciencedirect.com/topics/computer-science/three-way-handshake#:~:text=The%20TCP%20handshake,as%20shown%20in%20Figure%203.8
Question 25 Selectable Answer
Which type of data consists of connection level, application-specific records generated from network traffic?

Answer:
Question 26 Selectable Answer
A threat actor penetrated an organization's network.
Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?

Answer:
Explanation:
Reference: https://blogs.cisco.com/security/the-dreaded-5-tuple
Question 27 Selectable Answer
Refer to the exhibit.



During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events.
Which technology provided these logs?

Answer:
Question 28 Selectable Answer
What are the two differences between stateful and deep packet inspection? (Choose two)

Answer:
Question 29 Selectable Answer
Refer to the exhibit.



Which type of log is displayed?

Answer:
Explanation:
You also see the 5-tuple in IPS events, NetFlow records, and other event data. In fact, on the exam you may need to differentiate between a firewall log versus a traditional IPS or IDS event. One of the things to remember is that traditional IDS and IPS use signatures, so an easy way to differentiate is by looking for a signature ID (SigID). If you see a signature ID, then most definitely the event is a traditional IPS or IDS event.
Question 30 Selectable Answer
Which event is user interaction?

Answer:
Showing page 2 of 4