Cisco® 200-201 Exam (page: 8)
Cisco® Understanding Cybersecurity Operations Fundamentals (CBROPS)
Updated on: 25-Dec-2025

Viewing Page 8 of 54

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information.
What is the threat actor in this incident?

  1. company assets that are threatened
  2. customer assets that are threatened
  3. perpetrators of the attack
  4. victims of the attack

Answer(s): B



What is the relationship between a vulnerability and a threat?

  1. A threat exploits a vulnerability
  2. A vulnerability is a calculation of the potential loss caused by a threat
  3. A vulnerability exploits a threat
  4. A threat is a calculation of the potential loss caused by a vulnerability

Answer(s): A



What is the principle of defense-in-depth?

  1. Agentless and agent-based protection for security are used.
  2. Several distinct protective layers are involved.
  3. Access control models are involved.
  4. Authentication, authorization, and accounting mechanisms are used.

Answer(s): B



DRAG DROP (Drag and Drop is not supported) (Drag and Drop is not supported)

Drag and drop the uses on the left onto the type of security system on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



What is the difference between the rule-based detection when compared to behavioral detection?

  1. Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.
  2. Rule-Based systems have established patterns that do not change with new data, while behavioral changes.
  3. Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.
  4. Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Answer(s): D



Viewing Page 8 of 54



Share your comments for Cisco® 200-201 exam with other users:

sushant 6/28/2023 4:52:00 AM

good questions
EUROPEAN UNION


A\MAM 6/27/2023 5:17:00 PM

q-6 ans-b correct. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-cli-quick-start/use-the-cli/commit-configuration-changes
UNITED STATES


unanimous 12/15/2023 6:38:00 AM

very nice very nice
Anonymous


akminocha 9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps
INDIA


Jefi 9/4/2023 8:15:00 AM

please upload the practice questions
Anonymous


Thembelani 5/30/2023 2:45:00 AM

need this dumps
Anonymous


Abduraimov 4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.
UNITED KINGDOM


Puneeth 10/5/2023 2:06:00 AM

new to this site but i feel it is good
EUROPEAN UNION


Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA