Exam Logo

Cisco (200-201-CBROPS) Exam Questions And Answers page 2


Refer to the exhibit. An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?
Security Monitoring and Analysis
What is the impact of false positive alerts on business compared to true positive?
Security Monitoring and Analysis Data and Event Analysis
What specific type of analysis is assigning values to the scenario to see expected outcomes?
Data and Event Analysis

Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?
Security Operations and Technology Security Monitoring and Analysis
What is the relationship between a vulnerability and a threat?
Security Operations and Technology Security Monitoring and Analysis
An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)
Security Monitoring and Analysis Data and Event Analysis
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.

Which type of evidence is this?
Security Operations and Technology Security Monitoring and Analysis
An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?
Security Monitoring and Analysis Incident Response
What are two denial of service attacks? (Choose two.)
Security Operations and Technology Security Monitoring and Analysis
What is a difference between signature-based and behavior-based detection?
Security Operations and Technology Security Monitoring and Analysis