Download Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS).200-201.ExamTopics.2025-08-09.321q.tqb

Vendor: Cisco
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Date: Aug 09, 2025
File Size: 21 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
What are two categories of DDoS attacks? (Choose two.)
  1. direct
  2. reflected
  3. split brain
  4. scanning
  5. phishing
Correct answer: AB
Explanation:
AB: 5 - Mosted
AB: 5 - Mosted
Question 2
The SOC team has confirmed a potential indicator of compromise on an isolated endpoint. The team has narrowed the potential malware type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling the event?
  1. Perform an AV scan on the infected endpoint.
  2. Isolate the infected endpoint from the network.
  3. Prioritize incident handling based on the impact.
  4. Analyze the malware behavior.
Correct answer: D
Explanation:
B: 4C: 1D: 12 - Mosted
B: 4C: 1D: 12 - Mosted
Question 3
Refer to the exhibit. A company employee is connecting to mail.google.com from an endpoint device. The website is loaded but with an error. What is occurring?
  1. man-in-the-middle attack
  2. Certificate is not in trusted roots.
  3. DNS hijacking attack.
  4. Endpoint local time is invalid.
Correct answer: B
Explanation:
B: 3 - Mosted
B: 3 - Mosted
Question 4
What is the difference between deep packet inspection and stateful inspection?
  1. Stateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention.
  2. Deep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention.
  3. Deep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4.
  4. Stateful inspection verifies data at the transport layer, and deep packet inspection verifies data at the application layer.
Correct answer: C
Explanation:
C: 4 - MostedD: 2
C: 4 - MostedD: 2
Question 5
How does agentless monitoring differ from agent-based monitoring?
  1. Agentless can access the data via API, while agent-based uses a less efficient method and accesses log data through WMI.
  2. Agent-based monitoring has a lower initial cost for deployment, while agentless requires resource-intensive deployment.
  3. Agent-based monitoring is less intrusive in gathering log data, while agentless requires open ports to fetch the logs.
  4. Agent-based has a possibility to locally filter and transmit only valuable data, while agentless has much higher network utilization.
Correct answer: D
Explanation:
C: 1D: 6 - Mosted
C: 1D: 6 - Mosted
Question 6
What is the difference between inline traffic interrogation and traffic mirroring?
  1. Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.
  2. Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.
  3. Inline interrogation is less complex as traffic mirroring applies additional tags to data.
  4. Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools.
Correct answer: D
Explanation:
D: 4 - Mosted
D: 4 - Mosted
Question 7
What is threat hunting?
  1. Focusing on proactively detecting possible signs of intrusion and compromise.
  2. Managing a vulnerability assessment report to mitigate potential threats.
  3. Attempting to deliberately disrupt servers by altering their availability.
  4. Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.
Correct answer: A
Explanation:
A: 1 - Mosted
A: 1 - Mosted
Question 8
According to the September 2020 threat intelligence feeds, a new malware called Egregor was introduced and used in many attacks. Distribution of Egregor is primarily through a Cobalt Strike that has been installed on victim's workstations using RDP exploits. Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
  1. malware attack
  2. insider threat
  3. ransomware attack
  4. whale-phishing
Correct answer: C
Explanation:
C: 3 - Mosted
C: 3 - Mosted
Question 9
How does TOR alter data content during transit?
  1. It encrypts content and destination information over multiple layers.
  2. It traverses source traffic through multiple destinations before reaching the receiver.
  3. It redirects destination traffic through multiple sources avoiding traceability.
  4. It spoofs the destination and source information protecting both sides.
Correct answer: A
Explanation:
A: 3 - MostedC: 1
A: 3 - MostedC: 1
Question 10
Which information must an organization use to understand the threats currently targeting the organization?
  1. vendor suggestions
  2. threat intelligence
  3. risk scores
  4. vulnerability exposure
Correct answer: B
Explanation:
B: 1 - Mosted
B: 1 - Mosted
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!