Test Online Free Cisco 200-201 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 200-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
What does the output indicate about the server with the IP address 172.18.104.139?
Answer:
Question 32Selectable Answer
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Answer:
Question 33Selectable Answer
What is the difference between a threat and a risk?
Answer: Explanation:
A threat is any potential danger to an asset. If a vulnerability exists but has not yet been exploited―or, more importantly, it is not yet publicly known―the threat is latent and not yet realized.
Question 34Selectable Answer
What is the principle of defense-in-depth?
Answer:
Question 35Selectable Answer
What is the difference between statistical detection and rule-based detection models?
Answer:
Question 36Selectable Answer
What is an example of social engineering attacks?
Answer:
Question 37Selectable Answer
Which HTTP header field is used in forensics to identify the type of browser used?
Answer: Explanation:
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20100101 Firefox/12.0 In computing, a user agent is any software, acting on behalf of a user, which "retrieves, renders and facilitates end-user interaction with Web content".[1] A user agent is therefore a special kind of software agent.
https://en.wikipedia.org/wiki/User_agent#User_agent_identification
A user agent is a computer program representing a person, for example, a browser in a Web context. https://developer.mozilla.org/en-US/docs/Glossary/User_agent
Question 38Selectable Answer
An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?
Answer:
Question 39Selectable Answer
A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders.
After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?
Answer:
Question 40Selectable Answer
During which phase of the forensic process are tools and techniques used to extract information from the collected data?
Answer:
Question 41Selectable Answer
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
Answer:
Question 42Selectable Answer
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
Answer:
Question 43Selectable Answer
What describes the concept of data consistently and readily being accessible for legitimate users?
Answer:
Question 44Selectable Answer
Which type of evidence supports a theory or an assumption that results from initial evidence?
Answer: Explanation:
Corroborating evidence (or corroboration) is evidence that tends to support a theory or an assumption deduced by some initial evidence. This corroborating evidence confirms the proposition. Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Question 45Selectable Answer
An analyst is exploring the functionality of different operating systems.
What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?