Cisco 200-201 Exam
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) (Page 3 )

Updated On: 12-Feb-2026

One of the objectives of information security is to protect the CIA of information and systems.
What does CIA mean in this context?

  1. confidentiality, identity, and authorization
  2. confidentiality, integrity, and authorization
  3. confidentiality, identity, and availability
  4. confidentiality, integrity, and availability

Answer(s): D



What is rule-based detection when compared to statistical detection?

  1. proof of a user's identity
  2. proof of a user's action
  3. likelihood of user's action
  4. falsification of a user's identity

Answer(s): B



A user received a malicious attachment but did not run it.
Which category classifies the intrusion?

  1. weaponization
  2. reconnaissance
  3. installation
  4. delivery

Answer(s): D



Which process is used when IPS events are removed to improve data integrity?

  1. data availability
  2. data normalization
  3. data signature
  4. data protection

Answer(s): B



An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?

  1. sequence numbers
  2. IP identifier
  3. 5-tuple
  4. timestamps

Answer(s): C






Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:

Join the 200-201 Discussion