Vcehome > Cisco > CyberOps Associate > 200-201 > 200-201 Online Practice Questions and Answers

200-201 Online Practice Questions and Answers

Questions 4

What is the difference between an attack vector and attack surface?

A. An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.

B. An attack vector identifies components that can be exploited, and an attack surface identifies the potential path an attack can take to penetrate the network.

C. An attack surface recognizes which network parts are vulnerable to an attack; and an attack vector identifies which attacks are possible with these vulnerabilities.

D. An attack vector identifies the potential outcomes of an attack; and an attack surface launches an attack using several methods against the identified vulnerabilities.

Browse 406 Q&As
Questions 5

At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?

A. Phishing attack

B. Password Revelation Strategy

C. Piggybacking

D. Social Engineering

Browse 406 Q&As
Questions 6

What is a difference between a threat and a risk?

A. A threat can be people, property, or information, and risk is a probability by which these threats may bring harm to the business.

B. A risk is a flaw or hole in security, and a threat is what is being used against that flaw.

C. A risk is an intersection between threat and vulnerabilities, and a threat is what a security engineer is trying to protect against.

D. A threat is a sum of risks, and a risk itself represents a specific danger toward the asset.

Browse 406 Q&As
Questions 7

Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP. Which type of attack is occurring?

A. evasion methods

B. phishing

C. man in the middle attack

D. command injection

Browse 406 Q&As
Questions 8

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?

A. AWS

B. IIS

C. Load balancer

D. Proxy server

Browse 406 Q&As
Questions 9

Refer to the exhibit.

What should be interpreted from this packet capture?

A. 81.179.179.69 is sending a packet from port 80 to port 50272 of IP address 192.168.122.100 using UDP protocol.

B. 192.168.122.100 is sending a packet from port 50272 to port 80 of IP address 81.179.179.69 using TCP protocol.

C. 192.168.122.100 is sending a packet from port 80 to port 50272 of IP address 81.179.179.69 using UDP protocol.

D. 81.179.179.69 is sending a packet from port 50272 to port 80 of IP address 192.168.122.100 using TCP UDP protocol.

Browse 406 Q&As
Questions 10

Refer to the exhibit.

An employee received an email from an unknown sender with an attachment and reported it as a phishing attempt. An engineer uploaded the file to Cuckoo for further analysis. What should an engineer interpret from the provided Cuckoo report?

A. Win32.polip.a.exe is an executable file and should be flagged as malicious.

B. The file is clean and does not represent a risk.

C. Cuckoo cleaned the malicious file and prepared it for usage.

D. MD5 of the file was not identified as malicious.

Browse 406 Q&As
Questions 11

An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?

A. digital certificates

B. static IP addresses

C. signatures

D. cipher suite

Browse 406 Q&As
Questions 12

What is the difference between vulnerability and risk?

A. A vulnerability is a sum of possible malicious entry points, and a risk represents the possibility of the unauthorized entry itself.

B. A risk is a potential threat that an exploit applies to, and a vulnerability represents the threat itself

C. A vulnerability represents a flaw in a security that can be exploited, and the risk is the potential damage it might cause.

D. A risk is potential threat that adversaries use to infiltrate the network, and a vulnerability is an exploit

Browse 406 Q&As
Questions 13

What should an engineer use to aid the trusted exchange of public keys between user tom0411976943 and dan1968754032?

A. central key management server

B. web of trust

C. trusted certificate authorities

D. registration authority data

Browse 406 Q&As
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: May 13, 2024
Questions: 406 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99