Cisco 200-201 Exam
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) (Page 10 )

Updated On: 12-Feb-2026

A security incident occurred with the potential of impacting business services.
Who performs the attack?

  1. threat actor
  2. malware author
  3. direct competitor
  4. bug bounty hunter

Answer(s): A


Reference:

https://www.paubox.com/blog/what-is-threat-actor/#:~:text=The%20term%20threat%20actor%20refers,CTA)%20when%20referencing%20cybersecurity%20issues



How does a certificate authority impact security?

  1. It authenticates domain identity when requesting an SSL certificate.
  2. It validates client identity when communicating with the server.
  3. It authenticates client identity when requesting an SSL certificate.
  4. It validates the domain identity of the SSL certificate.

Answer(s): D


Reference:

https://en.wikipedia.org/wiki/Certificate_authority



Which data type is necessary to get information about source/destination ports?

  1. statistical data
  2. session data
  3. alert data
  4. connectivity data

Answer(s): D


Reference:

https://community.cisco.com/t5/application-networking/difference-between-session-connections-socket/td-p/2417074



Which event is a vishing attack?

  1. obtaining disposed documents from an organization
  2. using a vulnerability scanner on a corporate network
  3. impersonating a tech support agent during a phone call
  4. setting up a rogue access point near a public hotspot

Answer(s): C


Reference:

https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html#~types-of-phishing-attacks



DRAG DROP (Drag and Drop is not supported)
Drag and drop the security concept from the left onto the example of that concept on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:






Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:

Join the 200-201 Discussion