Cisco 200-201 Exam
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) (Page 6 )

Updated On: 12-Feb-2026

What is the difference between statistical detection and rule-based detection models?

  1. Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
  2. Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis
  3. Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior
  4. Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis

Answer(s): B



What is the difference between a threat and a risk?

  1. Threat represents a potential danger that could take advantage of a weakness in a system
  2. Risk represents the known and identified loss or danger in the system
  3. Risk represents the nonintentional interaction with uncertainty in the system
  4. Threat represents a state of being exposed to an attack or a compromise either physically or logically

Answer(s): A



Which attack method intercepts traffic on a switched network?

  1. denial of service
  2. ARP cache poisoning
  3. DHCP snooping
  4. command and control

Answer(s): C



What does an attacker use to determine which network ports are listening on a potential target device?

  1. man-in-the-middle
  2. port scanning
  3. SQL injection
  4. ping sweep

Answer(s): B



What is a purpose of a vulnerability management framework?

  1. identifies, removes, and mitigates system vulnerabilities
  2. detects and removes vulnerabilities in source code
  3. conducts vulnerability scans on the network
  4. manages a list of reported vulnerabilities

Answer(s): A






Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:

Join the 200-201 Discussion