Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

200-201 Exam Dumps - Cisco CyberOps Associate Questions and Answers

Question # 124

What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?

Options:

A.

DAC requires explicit authorization for a given user on a given object, and RBAC requires specific conditions.

B.

RBAC access is granted when a user meets specific conditions, and in DAC, permissions are applied on user and group levels.

C.

RBAC is an extended version of DAC where you can add an extra level of authorization based on time.

D.

DAC administrators pass privileges to users and groups, and in RBAC, permissions are applied to specific groups

Buy Now
Question # 125

What is a benefit of using asymmetric cryptography?

Options:

A.

decrypts data with one key

B.

fast data transfer

C.

secure data transfer

D.

encrypts data with one key

Buy Now
Question # 126

Refer to the exhibit.

What is occurring?

Options:

A.

ARP flood

B.

DNS amplification

C.

ARP poisoning

D.

DNS tunneling

Buy Now
Question # 127

Which regex matches only on all lowercase letters?

Options:

A.

[a−z]+

B.

[^a−z]+

C.

a−z+

D.

a*z+

Buy Now
Question # 128

What describes the public key infrastructure (PKI)?

Options:

A.

PKI verifies the identity of the user and sender and creates secure communication channels using asymmetric encryption.

B.

PKI ensures packet loss prevention and creates secure communication channels using symmetric encryption.

C.

PKI verifies the identity of the user and sender and creates secure communication channels using symmetric encryption.

D.

PKI ensures packet loss prevention and creates secure communication channels using asymmetric encryption.

Buy Now
Question # 129

What is the difference between a threat and a risk?

Options:

A.

Threat represents a potential danger that could take advantage of a weakness in a system

B.

Risk represents the known and identified loss or danger in the system

C.

Risk represents the nonintentional interaction with uncertainty in the system

D.

Threat represents a state of being exposed to an attack or a compromise, either physically or logically.

Buy Now
Question # 130

An engineer is working with the compliance teams to identify the data passing through the network. During analysis, the engineer informs the compliance team that external penmeter data flows contain records, writings, and artwork Internal segregated network flows contain the customer choices by gender, addresses, and product preferences by age. The engineer must identify protected data. Which two types of data must be identified'? (Choose two.)

Options:

A.

SOX

B.

PII

C.

PHI

D.

PCI

E.

copyright

Buy Now
Question # 131

Which items is an end-point application greylist used?

Options:

A.

Items that have been established as malicious

B.

Items that have been established as authorized

C.

Items that have been installed with a baseline

D.

Items before being established as harmful or malicious

Buy Now
Question # 132

What is a ransomware attack?

Options:

A.

It is a component of a malware attack used to establish a remote covert channel.

B.

It is malicious software that steals confidential data.

C.

It encrypts a victim’s data and prevents access to it.

D.

The volume of data exceeds storage capacity.

Buy Now
Question # 133

Refer to the exhibit. An engineer received a ticket to analyze unusual network traffic. What is occurring?

Options:

A.

denial-of-service attack

B.

data exfiltration

C.

regular network traffic; no suspicious activity

D.

cookie poisoning

Buy Now
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Mar 15, 2026
Questions: 476
200-201 pdf

200-201 PDF

$28.5  $94.99
200-201 Engine

200-201 Testing Engine

$33  $109.99
200-201 PDF + Engine

200-201 PDF + Testing Engine

$43.5  $144.99