Cisco 200-201 Exam
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) (Page 11 )

Updated On: 12-Feb-2026

What is a difference between SIEM and SOAR?

  1. SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.
  2. SIEM’s primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.
  3. SOAR’s primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.
  4. SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.

Answer(s): B


Reference:

https://www.cisco.com/c/en/us/products/security/what-is-a-security-platform.html



What is vulnerability management?

  1. A process to identify and remediate existing weaknesses.
  2. A process to recover from service interruptions and restore business-critical applications.
  3. A security practice of performing actions rather than acknowledging the threats.
  4. A security practice focused on clarifying and narrowing intrusion points.

Answer(s): A


Reference:

https://www.brinqa.com/vulnerability-management-primer-part-2-challenges/



What is a difference between signature-based and behavior-based detection?

  1. Signature-based identifies behaviors that may be linked to attacks, while behavior-based has a predefined set of rules to match before an alert.
  2. Behavior-based identifies behaviors that may be linked to attacks, while signature-based has a predefined set of rules to match before an alert.
  3. Behavior-based uses a known vulnerability database, while signature-based intelligently summarizes existing data.
  4. Signature-based uses a known vulnerability database, while behavior-based intelligently summarizes existing data.

Answer(s): D


Reference:

https://accedian.com/blog/what-is-the-difference-between-signature-based-and-behavior-based-ids/



When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?

  1. server name, trusted subordinate CA, and private key
  2. trusted subordinate CA, public key, and cipher suites
  3. trusted CA name, cipher suites, and private key
  4. server name, trusted CA, and public key

Answer(s): D



How does an SSL certificate impact security between the client and the server?

  1. by enabling an authenticated channel between the client and the server
  2. by creating an integrated channel between the client and the server
  3. by enabling an authorized channel between the client and the server
  4. by creating an encrypted channel between the client and the server

Answer(s): D






Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:

Join the 200-201 Discussion