Free Demo Questions

Test Online Free Cisco 200-201 Exam Questions and Answers

Practice a live sample before buying full access. This page keeps the free 200-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.

Updated Feb 02, 2026 53 Questions 4 Pages
Page 3 of 4
Question 31 Selectable Answer
Refer to the exhibit.



What does the output indicate about the server with the IP address 172.18.104.139?

Answer:
Question 32 Selectable Answer
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?

Answer:
Question 33 Selectable Answer
What is the difference between a threat and a risk?

Answer:
Explanation:
A threat is any potential danger to an asset. If a vulnerability exists but has not yet been exploited―or, more importantly, it is not yet publicly known―the threat is latent and not yet realized.
Question 34 Selectable Answer
What is the principle of defense-in-depth?

Answer:
Question 35 Selectable Answer
What is the difference between statistical detection and rule-based detection models?

Answer:
Question 36 Selectable Answer
What is an example of social engineering attacks?

Answer:
Question 37 Selectable Answer
Which HTTP header field is used in forensics to identify the type of browser used?

Answer:
Explanation:
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20100101 Firefox/12.0 In computing, a user agent is any software, acting on behalf of a user, which "retrieves, renders and facilitates end-user interaction with Web content".[1] A user agent is therefore a special kind of software agent.
https://en.wikipedia.org/wiki/User_agent#User_agent_identification
A user agent is a computer program representing a person, for example, a browser in a Web context. https://developer.mozilla.org/en-US/docs/Glossary/User_agent
Question 38 Selectable Answer
An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?

Answer:
Question 39 Selectable Answer
A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders.
After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?

Answer:
Question 40 Selectable Answer
During which phase of the forensic process are tools and techniques used to extract information from the collected data?

Answer:
Question 41 Selectable Answer
Refer to the exhibit.



What is the potential threat identified in this Stealthwatch dashboard?

Answer:
Question 42 Selectable Answer
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

Answer:
Question 43 Selectable Answer
What describes the concept of data consistently and readily being accessible for legitimate users?

Answer:
Question 44 Selectable Answer
Which type of evidence supports a theory or an assumption that results from initial evidence?

Answer:
Explanation:
Corroborating evidence (or corroboration) is evidence that tends to support a theory or an assumption deduced by some initial evidence. This corroborating evidence confirms the proposition. Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Question 45 Selectable Answer
An analyst is exploring the functionality of different operating systems.
What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

Answer:
Showing page 3 of 4