cisco 200-201 online test

Understanding Cisco Cybersecurity Operations Fundamentals

What students need to know about the 200-201 exam

  • Total 153 Questions & Answers

Question 1 Topic 1

Topic 1
Which event is user interaction?

  • A. gaining root access
  • B. executing remote code
  • C. reading and writing file permission
  • D. opening a malicious file
Answer:

D

Discussions

Question 2 Topic 1

Topic 1
Which security principle requires more than one person is required to perform a critical task?

  • A. least privilege
  • B. need to know
  • C. separation of duties
  • D. due diligence
Answer:

C

Discussions

Question 3 Topic 1

Topic 1
How is attacking a vulnerability categorized?

  • A. action on objectives
  • B. delivery
  • C. exploitation
  • D. installation
Answer:

C

Discussions

Question 4 Topic 1

Topic 1
What is a benefit of agent-based protection when compared to agentless protection?

  • A. It lowers maintenance costs
  • B. It provides a centralized platform
  • C. It collects and detects all traffic locally
  • D. It manages numerous devices simultaneously
Answer:

B

Discussions

Question 5 Topic 1

Topic 1
Which principle is being followed when an analyst gathers information relevant to a security incident to determine the
appropriate course of action?

  • A. decision making
  • B. rapid response
  • C. data mining
  • D. due diligence
Answer:

A

Discussions

Question 6 Topic 1

Topic 1
One of the objectives of information security is to protect the CIA of information and systems.
What does CIA mean in this context?

  • A. confidentiality, identity, and authorization
  • B. confidentiality, integrity, and authorization
  • C. confidentiality, identity, and availability
  • D. confidentiality, integrity, and availability
Answer:

D

Discussions

Question 7 Topic 1

Topic 1
What is rule-based detection when compared to statistical detection?

  • A. proof of a user's identity
  • B. proof of a user's action
  • C. likelihood of user's action
  • D. falsification of a user's identity
Answer:

B

Discussions

Question 8 Topic 1

Topic 1
A user received a malicious attachment but did not run it.
Which category classifies the intrusion?

  • A. weaponization
  • B. reconnaissance
  • C. installation
  • D. delivery
Answer:

D

Discussions

Question 9 Topic 1

Topic 1
Which process is used when IPS events are removed to improve data integrity?

  • A. data availability
  • B. data normalization
  • C. data signature
  • D. data protection
Answer:

B

Discussions

Question 10 Topic 1

Topic 1
An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?

  • A. sequence numbers
  • B. IP identifier
  • C. 5-tuple
  • D. timestamps
Answer:

C

Discussions
To page 2