Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Online Training
Cisco 200-201 Online Training
The questions for 200-201 were last updated at Sep 15,2025.
- Exam Code: 200-201
- Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
- Certification Provider: Cisco
- Latest update: Sep 15,2025
What is the difference between statistical detection and rule-based detection models?
- A . Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
- B . Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis
- C . Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior
- D . Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis
What is the difference between a threat and a risk?
- A . Threat represents a potential danger that could take advantage of a weakness in a system
- B . Risk represents the known and identified loss or danger in the system
- C . Risk represents the nonintentional interaction with uncertainty in the system
- D . Threat represents a state of being exposed to an attack or a compromise, either physically or logically.
Which attack method intercepts traffic on a switched network?
- A . denial of service
- B . ARP cache poisoning
- C . DHCP snooping
- D . command and control
What does an attacker use to determine which network ports are listening on a potential target device?
- A . man-in-the-middle
- B . port scanning
- C . SQL injection
- D . ping sweep
What is a purpose of a vulnerability management framework?
- A . identifies, removes, and mitigates system vulnerabilities
- B . detects and removes vulnerabilities in source code
- C . conducts vulnerability scans on the network
- D . manages a list of reported vulnerabilities
A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property.
What is the threat agent in this situation?
- A . the intellectual property that was stolen
- B . the defense contractor who stored the intellectual property
- C . the method used to conduct the attack
- D . the foreign government that conducted the attack
What is the practice of giving an employee access to only the resources needed to accomplish their job?
- A . principle of least privilege
- B . organizational separation
- C . separation of duties
- D . need to know principle
Which metric is used to capture the level of access needed to launch a successful attack?
- A . privileges required
- B . user interaction
- C . attack complexity
- D . attack vector
What is the difference between an attack vector and attack surface?
- A . An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.
- B . An attack vector identifies components that can be exploited, and an attack surface identifies the potential path an attack can take to penetrate the network.
- C . An attack surface recognizes which network parts are vulnerable to an attack; and an attack vector identifies which attacks are possible with these vulnerabilities.
- D . An attack vector identifies the potential outcomes of an attack; and an attack surface launches an attack using several methods against the identified vulnerabilities.
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
- A . integrity
- B . confidentiality
- C . availability
- D . scope