Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

200-201 Exam Dumps - Cisco CyberOps Associate Questions and Answers

Question # 94

According to CVSS, which condition is required for attack complexity metrics?

Options:

A.

man-in-the-middle attack

B.

attackers altering any file

C.

complete loss of protection

D.

total loss of availability

Buy Now
Question # 95

Refer to the exhibit.

What is occurring?

Options:

A.

Cross-Site Scripting attack

B.

XML External Entitles attack

C.

Insecure Deserialization

D.

Regular GET requests

Buy Now
Question # 96

Drag and drop the event term from the left onto the description on the right.

Options:

Buy Now
Question # 97

What is data tunneling?

Options:

A.

Encrypted information is returned to its original format.

B.

Data is split into packets and transported to the destination.

C.

Packets are transformed into bytes and assembled by a receiver.

D.

Malicious data is hidden within legitimate system processes.

Buy Now
Question # 98

Refer to the exhibit.

A company employee is connecting to mail google.com from an endpoint device. The website is loaded but with an error. What is occurring?

Options:

A.

DNS hijacking attack

B.

Endpoint local time is invalid.

C.

Certificate is not in trusted roots.

D.

man-m-the-middle attack

Buy Now
Question # 99

Refer to the exhibit.

What kind of activity occurs in the network?

Options:

A.

TCP reset attack

B.

DNS redirect attack

C.

DNS flood

D.

UDP flood

Buy Now
Question # 100

A security analyst received a ticket about suspicious traffic from one of the workstations. During the investigation, the analyst discovered that the workstation was communicating with an external IP. The analyst could not investigate further and escalated the case to a T2 security analyst. What are the two data visibility challenges that the security analyst should identify? (Choose two.)

Options:

A.

A default user agent is present in the headers.

B.

Traffic is not encrypted.

C.

HTTP requests and responses are sent in plaintext.

D.

POST requests have a "Microsoft-IIS/7.5" server header.

E.

Encrypted data is being transmitted.

Buy Now
Question # 101

Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)

Options:

A.

detection and analysis

B.

post-incident activity

C.

vulnerability management

D.

risk assessment

E.

vulnerability scoring

Buy Now
Question # 102

Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)

Options:

A.

detection and analysis

B.

post-incident activity

C.

vulnerability scoring

D.

vulnerability management

E.

risk assessment

Buy Now
Question # 103

Why is encryption challenging to security monitoring?

Options:

A.

Encryption analysis is used by attackers to monitor VPN tunnels.

B.

Encryption is used by threat actors as a method of evasion and obfuscation.

C.

Encryption introduces additional processing requirements by the CPU.

D.

Encryption introduces larger packet sizes to analyze and store.

Buy Now
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Mar 15, 2026
Questions: 476
200-201 pdf

200-201 PDF

$28.5  $94.99
200-201 Engine

200-201 Testing Engine

$33  $109.99
200-201 PDF + Engine

200-201 PDF + Testing Engine

$43.5  $144.99