Free Cisco 200-201 Exam Actual Questions

The questions for 200-201 were last updated On Jan 17, 2025

Question No. 2

What describes the concept of data consistently and readily being accessible for legitimate users?

Show Answer Hide Answer
Correct Answer: B

Availability is one of the three pillars of the CIA triad, a model that defines the principles of information security. Availability describes the concept of data consistently and readily being accessible for legitimate users. Availability ensures that the network and systems are operational and resilient to disruptions, such as denial-of-service attacks, hardware failures, or natural disasters. Availability also involves maintaining backup and recovery procedures, load balancing, and redundancy mechanisms.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, Module 1: Security Concepts, Lesson 1.1: Security Principles

200-201 CBROPS - Cisco, Exam Topics, 1.0 Security Concepts, 1.1 Explain the CIA triad

Cisco Certified CyberOps Associate Overview - Cisco Learning Network, Videos, 1.1 Explain the CIA triad


Question No. 3

Refer to the exhibit.

Which kind of attack method is depicted in this string?

Show Answer Hide Answer
Correct Answer: A

The image shows a piece of code within a bordered rectangular area.

It is a string of HTML code that appears to be an example of an attack, specifically ''<IMG SRC=j%41vascript:alert('attack')>''.

The code suggests an attempt to execute JavaScript within an image source attribute, indicative of a cross-site scripting attack.


Question No. 4

What is personally identifiable information that must be safeguarded from unauthorized access?

Show Answer Hide Answer
Correct Answer: B

Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual. Safeguarding PII is critical to protect individuals' privacy and prevent identity theft. A driver's license number (B) is considered PII because it is unique to an individual and can be used to confirm their identity. Other examples of PII include social security numbers, passport numbers, and financial account numbers. It is important to protect such information from unauthorized access to maintain personal privacy and security.


Question No. 5

What is the communication channel established from a compromised machine back to the attacker?

Show Answer Hide Answer
Correct Answer: C

The communication channel established from a compromised machine back to the attacker is known as a command and control (C2) channel. This channel allows attackers to maintain communication with the compromised system, issue commands, and potentially exfiltrate data. The C2 channel can be established using various protocols and methods to evade detection and maintain persistence.