Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

200-201 Exam Dumps - Cisco CyberOps Associate Questions and Answers

Question # 44

What is used to maintain persistent control of an exploited device?

Options:

A.

rootkit

B.

ARP spoof

C.

DDoS

D.

encryption

Buy Now
Question # 45

Refer to the exhibit. A network engineer received a report that a host is communicating with unknown domains on the internet. The network engineer collected packet capture but could not determine the technique or the payload used. What technique is the attacker using?

Options:

A.

amplification

B.

teardrop

C.

session hijacking

D.

tunneling

Buy Now
Question # 46

Refer to the exhibit.

What is depicted in the exhibit?

Options:

A.

Windows Event logs

B.

Apache logs

C.

IIS logs

D.

UNIX-based syslog

Buy Now
Question # 47

An engineer is investigating a case of the unauthorized usage of the “Tcpdump” tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?

Options:

A.

tagged protocols being used on the network

B.

all firewall alerts and resulting mitigations

C.

tagged ports being used on the network

D.

all information and data within the datagram

Buy Now
Question # 48

What is a disadvantage of the asymmetric encryption system?

Options:

A.

It is slow compared to the symmetric encryption system.

B.

Asymmetric encryption is used to transfer the data, and symmetric is used to encrypt small chunks of data.

C.

Asymmetric encryption is an old technique, and symmetric encryption is the newer one.

D.

It is less secure because it uses a single key for encryption.

Buy Now
Question # 49

How does TOR alter data content during transit?

Options:

A.

It spoofs the destination and source information protecting both sides.

B.

It encrypts content and destination information over multiple layers.

C.

It redirects destination traffic through multiple sources avoiding traceability.

D.

It traverses source traffic through multiple destinations before reaching the receiver

Buy Now
Question # 50

Which type of evasion technique is accomplished by separating the traffic into smaller segments before transmitting across the network?

Options:

A.

tunneling

B.

fragmentation

C.

encryption

D.

proxies

Buy Now
Question # 51

What specific type of analysis is assigning values to the scenario to see expected outcomes?

Options:

A.

deterministic

B.

exploratory

C.

probabilistic

D.

descriptive

Buy Now
Question # 52

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.

Options:

Buy Now
Question # 53

A user reports difficulties accessing certain external web pages. When an engineer examines traffic to and from the external domain in full packet captures, they notice that many SYNs have the same sequence number, source, and destination IP address, but they have different payloads. What is causing this situation?

Options:

A.

TCP injection

B.

misconfiguration of a web filter

C.

Failure of the full packet capture solution

D.

insufficient network resources

Buy Now
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Mar 15, 2026
Questions: 476
200-201 pdf

200-201 PDF

$28.5  $94.99
200-201 Engine

200-201 Testing Engine

$33  $109.99
200-201 PDF + Engine

200-201 PDF + Testing Engine

$43.5  $144.99