Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

200-201 Exam Dumps - Cisco CyberOps Associate Questions and Answers

Question # 64

Which of these is a defense-in-depth strategy principle?

Options:

A.

identify the minimum resource required per employee.

B.

Assign the least network privileges to segment network permissions.

C.

Provide the minimum permissions needed to perform Job functions.

D.

Disable administrative accounts to avoid unauthorized changes.

Buy Now
Question # 65

Refer to the exhibit.

What is occurring?

Options:

A.

ARP flood

B.

DNS amplification

C.

ARP poisoning

D.

DNS tunneling

Buy Now
Question # 66

According to CVSS, what is attack complexity?

Options:

A.

existing exploits available in the wild exploiting the vulnerability

B.

existing circumstances beyond the attacker's control to exploit the vulnerability

C.

number of actions an attacker should perform to exploit the vulnerability

D.

number of patches available for certain attack mitigation and how complex the workarounds are

Buy Now
Question # 67

An employee received an email from a colleague’s address asking for the password for the domain controller. The employee noticed a missing letter within the sender’s address. What does this incident describe?

Options:

A.

brute-force attack

B.

insider attack

C.

shoulder surfing

D.

social engineering

Buy Now
Question # 68

Which technique is a low-bandwidth attack?

Options:

A.

social engineering

B.

session hijacking

C.

evasion

D.

phishing

Buy Now
Question # 69

A security engineer must protect the company from known issues that trigger adware. Recently new incident has been raised that could harm the system. Which security concepts are present in this scenario?

Options:

A.

exploit and patching

B.

risk and evidence

C.

analysis and remediation

D.

vulnerability and threat

Buy Now
Question # 70

What is a benefit of agent-based protection when compared to agentless protection?

Options:

A.

It lowers maintenance costs

B.

It provides a centralized platform

C.

It collects and detects all traffic locally

D.

It manages numerous devices simultaneously

Buy Now
Question # 71

Drag and drop the elements from the left into the correct order for incident handling on the right.

Options:

Buy Now
Question # 72

Which attack represents the evasion technique of resource exhaustion?

Options:

A.

SQL injection

B.

man-in-the-middle

C.

bluesnarfing

D.

denial-of-service

Buy Now
Question # 73

A malicious file has been identified in a sandbox analysis tool.

Which piece of information is needed to search for additional downloads of this file by other hosts?

Options:

A.

file header type

B.

file size

C.

file name

D.

file hash value

Buy Now
Exam Code: 200-201
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Last Update: Feb 23, 2025
Questions: 331
200-201 pdf

200-201 PDF

$28.5  $94.99
200-201 Engine

200-201 Testing Engine

$33  $109.99
200-201 PDF + Engine

200-201 PDF + Testing Engine

$43.5  $144.99