Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals CBROPS Exam Practice Test

Page: 1 / 14
Total 184 questions

Question 1

Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?



Answer : C

Question 2

A developer is working on a project using a Linux tool that enables writing processes to obtain these required results:

If the process is unsuccessful, a negative value is returned.

If the process is successful, 0 value is returned to the child process, and the process ID is sent to the parent process.

Which component results from this operation?



Answer : D

Question 3

An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?



Answer : D

Question 4

What is a difference between tampered and untampered disk images?



Answer : C

Question 5

What is a difference between tampered and untampered disk images?



Answer : B

Page:    1 / 14   
Total 184 questions