Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Online Training
Cisco 200-201 Online Training
The questions for 200-201 were last updated at Nov 01,2025.
- Exam Code: 200-201
 - Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
 - Certification Provider: Cisco
 - Latest update: Nov 01,2025
 
What is the difference between statistical detection and rule-based detection models?
- A . Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
 - B . Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis
 - C . Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior
 - D . Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis
 
What is the difference between a threat and a risk?
- A . Threat represents a potential danger that could take advantage of a weakness in a system
 - B . Risk represents the known and identified loss or danger in the system
 - C . Risk represents the nonintentional interaction with uncertainty in the system
 - D . Threat represents a state of being exposed to an attack or a compromise, either physically or logically.
 
Which attack method intercepts traffic on a switched network?
- A . denial of service
 - B . ARP cache poisoning
 - C . DHCP snooping
 - D . command and control
 
What does an attacker use to determine which network ports are listening on a potential target device?
- A . man-in-the-middle
 - B . port scanning
 - C . SQL injection
 - D . ping sweep
 
What is a purpose of a vulnerability management framework?
- A . identifies, removes, and mitigates system vulnerabilities
 - B . detects and removes vulnerabilities in source code
 - C . conducts vulnerability scans on the network
 - D . manages a list of reported vulnerabilities
 
A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property.
What is the threat agent in this situation?
- A . the intellectual property that was stolen
 - B . the defense contractor who stored the intellectual property
 - C . the method used to conduct the attack
 - D . the foreign government that conducted the attack
 
What is the practice of giving an employee access to only the resources needed to accomplish their job?
- A . principle of least privilege
 - B . organizational separation
 - C . separation of duties
 - D . need to know principle
 
Which metric is used to capture the level of access needed to launch a successful attack?
- A . privileges required
 - B . user interaction
 - C . attack complexity
 - D . attack vector
 
What is the difference between an attack vector and attack surface?
- A . An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.
 - B . An attack vector identifies components that can be exploited, and an attack surface identifies the potential path an attack can take to penetrate the network.
 - C . An attack surface recognizes which network parts are vulnerable to an attack; and an attack vector identifies which attacks are possible with these vulnerabilities.
 - D . An attack vector identifies the potential outcomes of an attack; and an attack surface launches an attack using several methods against the identified vulnerabilities.
 
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
- A . integrity
 - B . confidentiality
 - C . availability
 - D . scope