Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

200-201 Exam Dumps - Cisco CyberOps Associate Questions and Answers

Question # 84

What is a key difference between a tampered and an untampered disk image during a forensic investigation?

Options:

A.

An untampered image is encrypted, and a tampered one is not encrypted.

B.

A tampered image has a different hash value, and an untampered image has an unchanged hash value.

C.

A tampered image is accessible only by administrators, and an untampered one is accessible by all users.

D.

An untampered image is compressed, and a tampered one is left uncompressed.

Buy Now
Question # 85

Drag and drop the uses on the left onto the type of security system on the right.

Options:

Buy Now
Question # 86

A user received a targeted spear-phishing email and identified it as suspicious before opening the content. To which category of the Cyber Kill Chain model does to this type of event belong?

Options:

A.

weaponization

B.

delivery

C.

exploitation

D.

reconnaissance

Buy Now
Question # 87

Refer to the exhibit.

Which type of attack is represented?

Options:

A.

TCP/SYN flooding

B.

UDP flooding

C.

IP flooding

D.

MAC flooding

Buy Now
Question # 88

Which technology prevents end-device to end-device IP traceability?

Options:

A.

encryption

B.

load balancing

C.

NAT/PAT

D.

tunneling

Buy Now
Question # 89

What are two denial of service attacks? (Choose two.)

Options:

A.

MITM

B.

TCP connections

C.

ping of death

D.

UDP flooding

E.

code red

Buy Now
Question # 90

The SOC team detected an ongoing port scan. After investigation, the team concluded that the scan was targeting the company servers. According to the Cyber Kill Chain model, which step must be assigned to this type of event?

Options:

A.

actions on objectives

B.

delivery

C.

reconnaissance

D.

exploitation

Buy Now
Question # 91

Which category relates to improper use or disclosure of PII data?

Options:

A.

legal

B.

compliance

C.

regulated

D.

contractual

Buy Now
Question # 92

Refer to the exhibit.

Which tool was used to generate this data?

Options:

A.

NetFlow

B.

dnstools

C.

firewall

D.

tcpdump

Buy Now
Question # 93

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.

Which testing method did the intruder use?

Options:

A.

social engineering

B.

eavesdropping

C.

piggybacking

D.

tailgating

Buy Now
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Mar 15, 2026
Questions: 476
200-201 pdf

200-201 PDF

$28.5  $94.99
200-201 Engine

200-201 Testing Engine

$33  $109.99
200-201 PDF + Engine

200-201 PDF + Testing Engine

$43.5  $144.99