Free Practice Test

Free 200-201 CBROPS Practice Test – 2025 Updated

Prepare smarter for your 200-201 exam with our free, accurate, and 2025-updated questions.

At Cert Empire, we are committed to providing the best and the latest exam questions to the aspiring students who are preparing for CISCO 200-201 Exam. To help the students prepare better, we have made sections of our 200-201 exam preparation resources free for all. You can practice as much as you can with Free 200-201 Practice Test.

CISCO 200-201 Free Exam Questions

Disclaimer

Please keep a note that the demo questions are not frequently updated. You may as well find them in open communities around the web. However, this demo is only to depict what sort of questions you may find in our original files.

Nonetheless, the premium exam dumps files are frequently updated and are based on the latest exam syllabus and real exam questions.

1 / 60

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

2 / 60

What is the relationship between a vulnerability and a threat?

3 / 60

Which security principle is violated by running all processes as root or administrator?

4 / 60

An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise.
Which kind of evidence is this IP address?

5 / 60

cisco 200-201 exam demo question

 

 

Refer to the exhibit. Which event is occurring?

6 / 60

When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?

7 / 60

What does the Zero Trust security model signify?

8 / 60

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

9 / 60

At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?

10 / 60

Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?

11 / 60

cisco 200-201 exam demo question

 

 

 

Refer to the exhibit. What is occurring in this network?

12 / 60

Which type of data consists of connection level, application-specific records generated from network traffic?

13 / 60

What is the difference between the ACK flag and the RST flag in the NetFlow log session?

14 / 60

What is vulnerability management?

15 / 60

How does a certificate authority impact security?

16 / 60

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within
48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?

17 / 60

What specific type of analysis is assigning values to the scenario to see expected outcomes?

18 / 60

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

19 / 60

What is the practice of giving an employee access to only the resources needed to accomplish their job?

20 / 60

What is the virtual address space for a Windows process?

21 / 60

What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?

22 / 60

Which event is user interaction?

23 / 60

Which security principle requires more than one person is required to perform a critical task?

24 / 60

cisco 200-201 exam demo question

 

 

 

Refer to the exhibit. In which Linux log file is this output found?

25 / 60

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?

26 / 60

An engineer is investigating a case of the unauthorized usage of the `Tcpdump` tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?

27 / 60

Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?

28 / 60

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

29 / 60

Which data type is necessary to get information about source/destination ports?

30 / 60

An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts. What is causing the lack of data visibility needed to detect the attack?

31 / 60

What is a purpose of a vulnerability management framework?

32 / 60

What is a difference between SOAR and SIEM?

33 / 60

What is a benefit of agent-based protection when compared to agentless protection?

34 / 60

What causes events on a Windows system to show Event Code 4625 in the log messages?

35 / 60

A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions.
Which identifier tracks an active program?

36 / 60

What is an attack surface as compared to a vulnerability?

37 / 60

cisco 200-201 exam demo question

 

 

 

 

 

 

Refer to the exhibit. What does the output indicate about the server with the IP address 172.18.104.139?

38 / 60

What is indicated by an increase in IPv4 traffic carrying protocol 41?

39 / 60

cisco 200-201 exam demo question

 

 

 

 

 

 

 

 

 

 

 

Refer to the exhibit. What is occurring in this network traffic?

40 / 60

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

41 / 60

Which security monitoring data type requires the largest storage space?

42 / 60

cisco 200-201 exam demo question

 

Refer to the exhibit. Which kind of attack method is depicted in this string?

43 / 60

What is an example of social engineering attacks?

44 / 60

cisco 200-201 exam demo question

 

 

 

 

 

 

 

 

 

 

Refer to the exhibit. What should be interpreted from this packet capture?

45 / 60

cisco 200-201 exam demo question

 

 

 

 

 

 

 

 

 

 

 

Refer to the exhibit. An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?

46 / 60

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

47 / 60

cisco 200-201 exam demo question

 

 

 

Refer to the exhibit. Which type of log is displayed?

48 / 60

cisco 200-201 exam demo question

 

 

Refer to the exhibit. Which type of log is displayed?

49 / 60

What makes HTTPS traffic difficult to monitor?

50 / 60

A security incident occurred with the potential of impacting business services. Who performs the attack?

51 / 60

Which event is a vishing attack?

52 / 60

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?

53 / 60

Why is encryption challenging to security monitoring?

54 / 60

What is the principle of defense-in-depth?

55 / 60

What does an attacker use to determine which network ports are listening on a potential target device?

56 / 60

What is the difference between an attack vector and an attack surface?

57 / 60

What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?

58 / 60

Which evasion technique is a function of ransomware?

59 / 60

What is rule-based detection when compared to statistical detection?

60 / 60

Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?

Your score is

The average score is 78%

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE