Banco de preguntas CCNA Cybersecurity 200-201


Banco de preguntas CCNA Cybersecurity 200-201 actualizado 15 de diciembre 2025

Si ya estudiaste para tu examen de certificación y crees que dominas todos los temas, solo te queda practicar y practicar. Ponemos a tu disposición el banco de preguntas oficial. Respondiendo a estas preguntas, ten la certeza que conseguirás la certificación. Este banco de preguntas se actualiza de manera periódica.

NOTA: Accede a este contenido a través de la compra de la membresía anual, o a través de una membresía mensual de 30 USD.


474 preguntas
Soporte incluido para cualquier duda que tengas




Preguntas

1. Refer to the exhibit. What is occurring?



A. ARP spoofing attack
B. man-in-the-middle attack
C. brute-force attack
D. denial-of-service attack


2. The SOC team detected an ongoing port scan. After investigation, the team concluded that the scan was targeting the company servers. According to the Cyber Kill Chain model, which step must be assigned to this type of event?


A. delivery
B. exploitation
C. reconnaissance
D. actions on objectives


3. Which type of data is used to monitor and detect anomalies within the organization’s network?


A. statistical
B. metadata
C. transaction
D. alert


4. Which statement describes threat hunting?


A. It is an activity by an entity to deliberately bring down critical internal servers.
B. It includes any activity that might go after competitors and adversaries to infiltrate their systems.
C. It is a vulnerability assessment conducted by cyber professionals.
D. It is a prevention activity to detect signs of intrusion, compromise, data theft, abnormalities, or malicious activity.


5. According to NIST, at which step of the incident response process should an organization apply lessons learned from practice?


A. preparation
B. detection and analysis
C. containment
D. post-incident activity


6. Which type of attack involves executing arbitrary commands on the operating system to escalate privileges?


A. Apache log
B. cross-site scripting
C. command injection
D. SQL injection


7. What describes the usage of a rootkit in endpoint-based attacks?


A. remote code execution that causes a denial-of-service on the system
B. exploit that can be used to perform remote code execution
C. set of vulnerabilities used by an attacker to disable root access on the system
D. set of tools used by an attacker to maintain control of a compromised system while avoiding detection


 
logo
SI QUIERES DISFRUTAR DE ESTE CONTENIDO, TE INVITAMOS A QUE TE SUSCRIBAS.
30 dólares/mes

NUESTROS CURSOS Foros Consultas examen de certificación CCNA Cybersecurity 200-201

Viendo 4 entradas - de la 1 a la 4 (de un total de 4)
Viendo 4 entradas - de la 1 a la 4 (de un total de 4)
  • Debes estar registrado para responder a este debate.