Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals CBROPS Exam Practice Test

Page: 1 / 14
Total 311 questions
Question 1

Refer to the exhibit.

What is the outcome of the command?



Answer : B


Question 2

Refer to the exhibit.

A company's user HTTP connection to a malicious site was blocked according to configured policy What is the source technology used for this measure'?



Answer : B


Question 3

An engineer must configure network systems to detect command-and-control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology must be used to accomplish this task?



Answer : C


Question 4

Which action matches the weaponization step of the Cyber Kill Chain model?



Answer : B


Question 5

Which technique is a low-bandwidth attack?



Answer : C


Question 6

Which type of data must an engineer capture to analyze payload and header information?



Answer : C


Question 7

An engineer received an alert affecting the degraded performance of a critical server Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigate this resource usage?



Answer : A


Page:    1 / 14   
Total 311 questions