Description
Exam Name: Understanding Cisco Cybersecurity Operations Fundamentals
Exam Code: 200-201 CBROPS
Related Certification(s): Cisco Certified CyberOps Associate Certification
Certification Provider: Cisco
Actual Exam Duration: 120 Minutes
Number of 200-201 practice questions in our database:
Expected 200-201 Exam Topics, as suggested by Cisco :
- Module 1: Security Concepts: This topic explains the CIA triad, security terms, and principles of the defense-in-depth strategy. The topic also compares security deployments, access control models, behavioral and statistical detection, and rule-based detection. Moreover, the topic also delves into sub-topics which point out the challenges of data visibility. Lastly, the topic focuses on identifying potential data loss from traffic profiles.
- Module 2: Security Monitoring: It identifies the certificate components in a given scenario, describes the impact of certificates on security, and compares attack surface and vulnerability. The topic also focuses on the impact of technologies on data visibility, network attacks, web application attacks, endpoint-based attacks, evasion and obfuscation techniques.
- Module 3: Host-Based Analysis: This topic explains the functionality of endpoint technologies and the role of attribution in an investigation. It also identifies different components of an operating system and types of evidence used based on provided logs. Explanation of the role of attribution in an investigation, tampered and untampered disk image, and interpretation of operating system, application, or command line logs are also available in this topic.
- Module 4: Network Intrusion Analysis: Interpretation of basic regular expressions, common artifact elements, and fields in protocol headers is given in this topic. It also identifies key elements in an intrusion from a given PCAP file. Extraction of different files from a TCP stream is also discussed. The topic also compares the characteristics of data obtained from taps or traffic monitoring, and deep packet inspection. Lastly, the topic discusses mapping the events to source technologies.
- Module 5: Security Policies and Procedures: It describes management concepts, different elements in an incident response plan, and the relationship of SOC metrics to scope analysis. The topic also identifies different elements for network profiling, server profiling, as well as identification of secured data in a network. Application of the incident handling process is also discussed. Lastly, the topic focuses on mapping the organization stakeholders against the NIST IR categories.
Reviews
There are no reviews yet.