Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Last Update 22 hours ago Total Questions : 476

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) content is now fully updated, with all current exam questions added 22 hours ago. Deciding to include 200-201 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 200-201 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 200-201 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) practice test comfortably within the allotted time.

Question # 4

Refer to the exhibit.

Which type of attack is represented?

A.

TCP/SYN flooding

B.

UDP flooding

C.

IP flooding

D.

MAC flooding

Question # 5

Which statement describes indicators of attack?

A.

internal hosts communicate with countries outside of the business range.

B.

Phishing attempts on an organization are blocked by mall AV.

C.

Critical patches are missing.

D.

A malicious file is detected by the AV software.

Question # 6

How does an attacker observe network traffic exchanged between two users?

A.

port scanning

B.

man-in-the-middle

C.

command injection

D.

denial of service

Question # 7

Refer to the exhibit. A SOC engineer is analyzing Cuckoo Sandbox report for a file that has been identified as suspicious by the endpoint security system. What is the state of the file?

A.

The file was identified as PE32 executable with a high level of entropy to bypass AV via encryption.

B.

The file was detected as an executable binary file, but no suspicious activity was detected and it is false positive.

C.

The file was detected as executable and was marked by the SSDeep hashing algorithm as suspicious.

D.

The file identified as an executable binary for Microsoft Word with macros creating hidden process via PowerShell.

Question # 8

Exhibit.

An engineer received a ticket about a slowdown of a web application, Drug analysis of traffic, the engineer suspects a possible attack on a web server. How should the engineer interpret the Wiresharat traffic capture?

A.

10.0.0.2 sends GET/ HTTP/1.1 And Post request and the target responds with HTTP/1.1. 200 OC and HTTP/1.1 403 accordingly. This is an HTTP flood attempt.

B.

10.0.0.2 sends HTTP FORBIDDEN /1.1 And Post request, while the target responds with HTTP/1.1 200 Get and HTTP/1.1 403. This is an HTTP GET flood attack.

C.

10.128.0.2 sends POST/1.1 And POST requests, and the target responds with HTTP/1.1 200 Ok and HTTP/1.1 403 accordingly. This is an HTTP Reserve Bandwidth flood.

D.

10.128.0.2 sends HTTP/FORBIDDEN/ 1.1 and Get requests, and the target responds with HTTP/1.1 200 OK and HTTP/1.1 403. This is an HTTP cache bypass attack.

Question # 9

What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?

A.

least privilege

B.

need to know

C.

integrity validation

D.

due diligence

Question # 10

Refer to the exhibit.

An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?

A.

indirect

B.

circumstantial

C.

corroborative

D.

best

Go to page: