DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Latest CCNA 200-201 Exam Questions 2022/23 - Practice and Pass the CBROPS Exam

Exam NameUnderstanding Cisco Cybersecurity Operations Fundamentals
Exam Code200-201 CBROPS
Number of Questions95-105
Exam Price$300 USD
Passing Score750-850 / 1000
Exam Duration120 minutes

Earning the Cisco Certified Network Associate (CCNA) 200-201 certification validates your skills in managing modern network infrastructures featuring IoT, automation, security, virtualization and cloud services. Passing the 200-201 CBROPS exam demonstrates you have the knowledge and skills to implement basic network security solutions, manage cloud services and operational systems, and leverage various automation techniques for scalability. Quality CCNA 200-201 practice exams allow you to measure your current understanding while improving recall of key terms and concepts. Mimicking the content format of the real test, the best CCNA 200-201 practice questions cover networking fundamentals, IP services, security services, automation and programmability. Analyze your practice test results to identify knowledge gaps so you can better prioritize the remaining study time before your exam date. With focused practice using updated CCNA 200-201 exam materials and questions, you’ll gain confidence to pass on your first attempt.

Take other online exams

Question #1
What do host-based firewalls protect workstations from?
A. ero-day vulnerabilities
B. alicious web scripts
C. nwanted traffic
D. iruses
View answer
Correct Answer: D
Question #2
Which element is included in an incident response plan as stated in NIST.SP800-61?
A. pproval of senior management
B. ecurity of sensitive information
C. ndividual approach to incident response
D. onsistent threat identification
View answer
Correct Answer: D
Question #3
What is a difference between inline traffic interrogation and traffic mirroring?
A. nline inspection acts on the original traffic data flow
B. raffic mirroring passes live traffic to a tool for blocking
C. raffic mirroring inspects live traffic for analysis and mitigation
D. nline traffic copies packets for analysis and security
View answer
Correct Answer: A
Question #4
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A. apping interrogation replicates signals to a separate port for analyzing traffic
B. apping interrogations detect and block malicious traffic
C. nline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D. nline interrogation detects malicious traffic but does not block the traffic
View answer
Correct Answer: A
Question #5
During which phase of the forensic process are tools and techniques used to extract information from the collected data?
A. xamination
B. ollection
C. eporting
D. nvestigation
View answer
Correct Answer: A
Question #6
A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers. ASOC analyst checked the endpoints and discovered that they are infected and became part of the botnet. Endpoints are sending multiple DNS requests, but with spoofed IP addresses of valid external sources. What kind of attack are infected endpoints involved in?
A. NS flooding
B. NS hijacking
C. NS amplification
D. NS tunneling
View answer
Correct Answer: C
Question #7
Which statement describes patch management?
A. canning servers and workstations for missing patches and vulnerabilities
B. rocess of appropriate distribution of system or software updates
C. anaging and keeping previous patches lists documented for audit purposes
D. orkflow of distributing mitigations of newly found vulnerabilities
View answer
Correct Answer: A
Question #8
What is the difference between statistical detection and rule-based detection models?
A. ule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
B. tatistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis
C. tatistical detection involves the evaluation of an object on its intended actions before it executes that behavior
D. ule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis
View answer
Correct Answer: B
Question #9
What are the two differences between stateful and deep packet inspection? (Choose two.)
A. tateful inspection is capable of packet data inspections, and deep packet inspection is not
B. eep packet inspection is capable of malware blocking, and stateful inspection is not
C. eep packet inspection operates on Layer 3 and 4, and stateful inspection operates on Layer 3 of the OSI model
D. tateful inspection is capable of TCP state tracking, and deep packet filtering checks only TCP source and destination ports
E. eep packet inspection is capable of TCP state monitoring only, and stateful inspection can inspect TCP and UDP
View answer
Correct Answer: BE
Question #10
What is the difference between deep packet inspection and stateful inspection?
A. tateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention
B. eep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4
C. tateful inspection verifies data at the transport layer, and deep packet inspection verifies data at the application layer
D. eep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: