Cisco 200-201 Exam
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) (Page 13 )

Updated On: 15-Feb-2026

Refer to the exhibit.
Which type of log is displayed?

  1. proxy
  2. NetFlow
  3. IDS
  4. sys

Answer(s): B



How is NetFlow different than traffic mirroring?

  1. NetFlow collects metadata and traffic mirroring clones data
  2. Traffic mirroring impacts switch performance and NetFlow does not
  3. Traffic mirroring costs less to operate than NetFlow
  4. NetFlow generates more data than traffic mirroring

Answer(s): A



What makes HTTPS traffic difficult to monitor?

  1. SSL interception
  2. packet header size
  3. signature detection time
  4. encryption

Answer(s): D



How does an attacker observe network traffic exchanged between two users?

  1. port scanning
  2. man-in-the-middle
  3. command injection
  4. denial of service

Answer(s): B



Which type of data consists of connection level, application-specific records generated from network traffic?

  1. transaction data
  2. location data
  3. statistical data
  4. alert data

Answer(s): A






Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:

Join the 200-201 Discussion