Cisco 200-201 Exam
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) (Page 12 )

Updated On: 12-Feb-2026

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

  1. forgery attack
  2. plaintext-only attack
  3. ciphertext-only attack
  4. meet-in-the-middle attack

Answer(s): C



Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

  1. ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
  2. ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods
  3. ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods
  4. ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

Answer(s): C



Refer to the exhibit.
Which type of log is displayed?

  1. IDS
  2. proxy
  3. NetFlow
  4. sys

Answer(s): D



Refer to the exhibit.
What information is depicted?

  1. IIS data
  2. NetFlow data
  3. network discovery event
  4. IPS event data

Answer(s): B



What is the difference between the ACK flag and the RST flag in the NetFlow log session?

  1. The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete
  2. The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete
  3. The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection
  4. The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection

Answer(s): D






Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:

Join the 200-201 Discussion