Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

200-201 Exam Dumps - Cisco CyberOps Associate Questions and Answers

Question # 34

A security specialist is investigating an incident regarding a recent major breach in the organization. The accounting data from a 24-month period is affected due to a trojan detected in a department's critical server. A security analyst investigates the incident and discovers that an incident response team member who detected a trojan during regular AV scans had made an image of the server for evidence purposes. The security analyst made animage again to compare the hashes of the two images, and they appeared to differ and do not match. Which type of evidence is the security analyst dealing with?

Options:

A.

checksum violated image

B.

integrity violated image

C.

untampered image

D.

tampered image

Buy Now
Question # 35

Refer to the exhibit.

What must be interpreted from this packet capture?

Options:

A.

IP address 192.168.88 12 is communicating with 192 168 88 149 with a source port 74 to destination port 49098 using TCP protocol

B.

IP address 192.168.88.12 is communicating with 192 168 88 149 with a source port 49098 to destination port 80 using TCP protocol.

C.

IP address 192.168.88.149 is communicating with 192.168 88.12 with a source port 80 to destination port 49098 using TCP protocol.

D.

IP address 192.168.88.149 is communicating with 192.168.88.12 with a source port 49098 to destination port 80 using TCP protocol.

Buy Now
Question # 36

Refer to the exhibit. An engineer must map these events to the source technology that generated the event logs. To which technology do the generated logs belong?

Options:

A.

proxy

B.

antivirus

C.

IPS

D.

firewall

Buy Now
Question # 37

Which attack represents the evasion technique of resource exhaustion?

Options:

A.

SQL injection

B.

man-in-the-middle

C.

bluesnarfing

D.

denial-of-service

Buy Now
Question # 38

According to CVSS, what is attack complexity?

Options:

A.

existing exploits available in the wild exploiting the vulnerability

B.

existing circumstances beyond the attacker's control to exploit the vulnerability

C.

number of actions an attacker should perform to exploit the vulnerability

D.

number of patches available for certain attack mitigation and how complex the workarounds are

Buy Now
Question # 39

What is the purpose of a host-based intrusion detection system (HIDS)?

Options:

A.

A HIDS protects against threats via known denylisted hash databases of malware and ransomware.

B.

A HIDS filters traffic according to configured firewall access control rules.

C.

A HIDS detects threats using a combination of signature-based and anomaly-based detection methods.

D.

A HIDS blocks potential anomalous user activity.

Buy Now
Question # 40

A security engineer must implement an Intrusion Prevention System (IPS) inside an organization’s DMZ. One of the requirements is the ability to block suspicious traffic in real time based on a triggered signature. The IPS will be connected behind the DMZ firewalls directly to the core switches. Which traffic integration method must be implemented to complete this project?

Options:

A.

mirroring

B.

tap

C.

inline

D.

passive

Buy Now
Question # 41

What is the difference between vulnerability and risk?

Options:

A.

A vulnerability is a sum of possible malicious entry points, and a risk represents the possibility of the unauthorized entry itself.

B.

A risk is a potential threat that an exploit applies to, and a vulnerability represents the threat itself

C.

A vulnerability represents a flaw in a security that can be exploited, and the risk is the potential damage it might cause.

D.

A risk is potential threat that adversaries use to infiltrate the network, and a vulnerability is an exploit

Buy Now
Question # 42

Which data capture includes payload and header information?

Options:

A.

frame check sequence

B.

full packet

C.

alert data

D.

session logs

Buy Now
Question # 43

Refer to the exhibit.

What does the output indicate about the server with the IP address 172.18.104.139?

Options:

A.

open ports of a web server

B.

open port of an FTP server

C.

open ports of an email server

D.

running processes of the server

Buy Now
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Mar 15, 2026
Questions: 476
200-201 pdf

200-201 PDF

$28.5  $94.99
200-201 Engine

200-201 Testing Engine

$33  $109.99
200-201 PDF + Engine

200-201 PDF + Testing Engine

$43.5  $144.99