Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Exactprep 200-201 Questions

Page: 7 / 36
Total 476 questions

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers

Question 25

What is the name of the technology that searches for and reports on known weaknesses and flaws present in an organization’s IT infrastructure?

Options:

A.

vulnerability scanner

B.

identity and access management

C.

configuration management

D.

mobile device management

Question 26

A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?

Options:

A.

total throughput on the interface of the router and NetFlow records

B.

output of routing protocol authentication failures and ports used

C.

running processes on the applications and their total network usage

D.

deep packet captures of each application flow and duration

Question 27

Which system monitors local system operation and local network access for violations of a security policy?

Options:

A.

host-based intrusion detection

B.

systems-based sandboxing

C.

host-based firewall

D.

antivirus

Question 28

A data privacy officer at a marketing firm has received a request from a former client to delete all personally sensitive information held by the company. The firm operates globally and follows international data protection standards. The only information retained about the client is a unique customer ID, "051473912", which is not directly tied to the name, address, or any other identifiable details. Which action should the data privacy officer take?

Options:

A.

Delete the data immediately to comply with all global privacy regulations.

B.

Retain the data, as a customer ID by itself does not qualify as PSI under international standards.

C.

Consult the legal team, as customer IDs are always considered PSI and cannot be retained.

D.

Delete the data if the customer ID is stored alongside additional information that can identify the client.

Page: 7 / 36
Total 476 questions