200-201 Online Practice Questions

Home / Cisco / 200-201

Latest 200-201 Exam Practice Questions

The practice questions for 200-201 exam was last updated on 2025-06-03 .

Viewing page 1 out of 23 pages.

Viewing questions 1 out of 117 questions.

Question#1

According to CVSS, what is a description of the attack vector score?

A. The metric score will be larger when it is easier to physically touch or manipulate the vulnerable component
B. It depends on how many physical and logical manipulations are possible on a vulnerable component
C. The metric score will be larger when a remote attack is more likely.
D. It depends on how far away the attacker is located and the vulnerable component

Explanation:
The attack vector score in the Common Vulnerability Scoring System (CVSS) reflects how a vulnerability can be exploited. A higher score is given when the attack can be conducted remotely, making it easier for an attacker to exploit the vulnerability without physical access to the vulnerable component3.
Reference: The CVSS specification document provides a detailed explanation of how the attack vector score is determined, emphasizing the impact of the ease of exploitation on the score

Question#2

Which security principle is violated by running all processes as root or administrator?

A. principle of least privilege
B. role-based access control
C. separation of duties
D. trusted computing base

Explanation:
Running all processes as root or administrator violates the principle of least privilege, which states that users and processes should be granted only the minimum permissions necessary to perform their specific role or function within an organization. Running all processes as root or administrator gives them full access and control over the system, which increases the risk of unauthorized actions, malicious attacks, and accidental errors. It also makes it easier for attackers to escalate their privileges and compromise the system.
Reference: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.2: Security Principles
Cisco Certified CyberOps Associate Overview, Exam Topics, 1.1 Explain the CIA triad

Question#3

What is vulnerability management?

A. A security practice focused on clarifying and narrowing intrusion points.
B. A security practice of performing actions rather than acknowledging the threats.
C. A process to identify and remediate existing weaknesses.
D. A process to recover from service interruptions and restore business-critical applications

Explanation:
Vulnerability management is a proactive approach to securing systems by identifying and fixing vulnerabilities before they can be exploited by attackers. It involves scanning systems for known weaknesses, prioritizing and assessing the risks of those vulnerabilities, and applying patches or other remediation measures to mitigate them. Vulnerability management helps reduce the attack surface and prevent potential breaches.
Reference: = Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 11.
Reference: https://www.brinqa.com/vulnerability-management-primer-part-2-challenges/

Question#4

What is a scareware attack?

A. using the spoofed email addresses to trick people into providing login credentials
B. overwhelming a targeted website with fake traffic
C. gaming access to your computer and encrypting data stored on it
D. inserting malicious code that causes popup windows with flashing colors

Explanation:
Scareware is a type of malware attack that tricks users into believing their computer is infected with a virus, prompting them to download and pay for fake antivirus software. The attack often uses popup windows with flashing colors (D) to create a sense of urgency and scare the user into taking
immediate action.
Reference: Cisco Certified CyberOps Associate certification materials

Question#5

Which system monitors local system operation and local network access for violations of a security policy?

A. host-based intrusion detection
B. systems-based sandboxing
C. host-based firewall
D. antivirus

Explanation:
A host-based intrusion detection system (HIDS) monitors a computer system for suspicious activity by analyzing events occurring within that host. It can detect malicious activities and security policy violations by examining system calls, application logs, file-system modifications (such as rootkit installations), and other host activities. HIDS is an essential component in safeguarding the IT infrastructure against unauthorized access and security breaches.
Reference: = The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course material covers the monitoring of alerts and breaches, and the understanding and following of established procedures for response to alerts converted to incidents, which includes the use of host-based intrusion detection systems

Exam Code: 200-201Q & A: 375 Q&AsUpdated:  2025-06-03

 Get All 200-201 Q&As