Cisco 200-201 Answers

Page:    1 / 96   
Total 480 questions | Updated On: Apr 01, 2026
Question 1

What does an attacker use to determine which network ports are listening on a potential target device?


Answer: B
Question 2

An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario? 


Answer: B
Question 3

An organization that develops high-end technology is going through an internal audit The organization uses two databases The main database stores patent information and a secondary database stores employee names and contact information A compliance team is asked to analyze the infrastructure and identify protected data Which two types of protected data should be identified? (Choose two)


Answer: A,D
Question 4

Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)


Answer: C,D
Question 5

An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN. What is causing this issue?


Answer: A
Page:    1 / 96   
Total 480 questions | Updated On: Apr 01, 2026

Quickly grab our 200-201 product now and kickstart your exam preparation today!

Name: Understanding Cisco Cybersecurity Operations Fundamentals v1.2 (CCNACBR)
Exam Code: 200-201
Certification: Cisco Cybersecurity Specialist
Vendor: Cisco
Total Questions: 480
Last Updated: Apr 01, 2026