Cisco 200-201 Exam
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) (Page 36 )

Updated On: 1-Feb-2026

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?

  1. server name, trusted subordinate CA, and private key
  2. trusted subordinate CA, public key, and cipher suites
  3. trusted CA name, cipher suites, and private key
  4. server name, trusted CA, and public key

Answer(s): D



What is an example of social engineering attacks?

  1. receiving an unexpected email from an unknown person with an attachment from someone in the same company
  2. receiving an email from human resources requesting a visit to their secure website to update contact information
  3. sending a verbal request to an administrator who knows how to change an account password
  4. receiving an invitation to the department’s weekly WebEx meeting

Answer(s): B



Refer to the exhibit.
What is occurring in this network?

  1. ARP cache poisoning
  2. DNS cache poisoning
  3. MAC address table overflow
  4. MAC flooding attack

Answer(s): A



Which action prevents buffer overflow attacks?

  1. variable randomization
  2. using web based applications
  3. input sanitization
  4. using a Linux operating system

Answer(s): C



What is an attack surface as compared to a vulnerability?

  1. any potential danger to an asset
  2. the sum of all paths for data into and out of the application
  3. an exploitable weakness in a system or its design
  4. the individuals who perform an attack

Answer(s): B



Viewing page 36 of 70
Viewing questions 176 - 180 out of 451 questions



Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:

Join the 200-201 Discussion