Free Resources

AI 900 Mock Test Study Materials

AI 900 Full Mock Test 1


Time: 60 minutes    |    No of Qs: 53    |    Passing Score: 700


Question 1: 

Whether a person is suffering from a particular disease or not can be termed as a ______________.


Answer: B.


Explanation

Whether a person is suffering from a disease or Not can be termed as a classification problem.


Question 2: 

Azure Machine Learning provides the following features. Choose the correct option.


Answer: A, C, D.


Explanation

Azure Machine Learning provides the following features and capabilities:


Question 3: 

What is the foundation for most AI solutions?


Answer: A.


Explanation

Machine Learning is the foundation for most AI solutions.


Question 4: 

A graphical interface enabling no-code development of machine learning solutions. Choose the correct option.


Answer: C.


Explanation

Azure Machine Learning designer is a graphical interface enabling no-code development of machine learning solutions.


Question 5: 

Microsoft Azure provides the ___________ service - a cloud-based platform for creating, managing, and publishing machine learning models.


Answer: A.


Explanation

Microsoft Azure provides the Azure Machine Learning service - a cloud-based platform for creating, managing, and publishing machine learning models.


Question 6: 

What is used to orchestrate model training, deployment, and management tasks?


Answer: D.


Explanation

Data scientists, software engineers, and IT operations professionals can define pipelines to orchestrate model training, deployment, and management tasks.


Question 7: 

Which feature enables non-experts to quickly create an effective machine learning model from data?


Answer: B.


Explanation

Automated machine learning features enable non-experts to quickly create an effective machine learning model from data.


Question 8: 

A racing car telemetry system that uses sensors to proactively warn engineers about potential mechanical failures before they happen. Choose the correct option.


Answer: A.


Explanation

By using anomaly detection - a machine learning based technique that analyzes data over time and identifies unusual changes.


Question 9: 

What is AI?


Answer: D.


Explanation

AI is the creation of software that imitates human behaviors and capabilities. Key elements include: 


Question 10: 

Which service provides an application programming interface (API) that developers can use to create anomaly detection solutions?


Answer: A.


Explanation

In Microsoft Azure, the Anomaly Detector service provides an application programming interface (API) that developers can use to create anomaly detection solutions.


Question 11: 

You want to create a model to predict sales of ice cream based on historic data that includes daily ice cream sales totals and weather measurements. Which Azure service should you use?


Answer: A.


Explanation

Azure Machine Learning enables you to train a predictive model from the existing data. Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/2-understand-machine-learn


Question 12: 

You want to train a model that classifies images of dogs and cats based on a collection of your own digital photographs. Which Azure service should you use?


Answer: B.


Explanation

Custom Vision enables you to train an image classification model based on your own images. Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 13: 

You are designing an AI application that uses computer vision to detect cracks in car windshields, and warns drivers when a windshield should be repaired or replaced. When tested in good lighting conditions, the application successfully detects 99% of dangerously damaged glass. Which of the following statements should you include in the application's user interface?


Answer: A.


Explanation

You should be transparent about the limitations of the application. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 14: 

Define the sequence of steps performed by Azure Machine Learning. Choose the correct options from the following.


Answer: A, B, C.


Explanation

Azure Machine Learning is a cloud-based service that helps simplify some of the tasks and reduce the time it takes to prepare data, train a model, and deploy a predictive service. Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/what-is-ml


Question 15: 

A cloud service that you can use to train and manage machine learning models. Choose the correct option.


Answer: C.


Explanation

Azure Machine Learning is a cloud service that you can use to train and manage machine learning models. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/introduction


Question 16: 

To use Azure Machine Learning, you create ___________ in your Azure subscription. Choose the correct option.


Answer: A.


Explanation

To use Azure Machine Learning, you create a workspace in your Azure subscription. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace


Question 17: 

True or False. Your Azure subscription will never be charged any amount for data storage as long as the Azure Machine Learning workspace exists in your subscription.


Answer: B.


Explanation

Your Azure subscription will be charged a small amount for data storage as long as the Azure Machine Learning workspace exists in your subscription. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace


Question 18: 

Cloud-based resources on which you can run model training and data exploration processes. Choose the correct option.


Answer: A.


Explanation

Compute targets are cloud-based resources on which you can run model training and data exploration processes. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 19: 

Where do you manage the compute targets? Choose the correct option.


Answer: C.


Explanation

In Azure Machine Learning studio, view the Compute page (under Manage). This is where you manage the compute targets for your data science activities. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 20: 

Which compute resources are development workstations that data scientists can use to work with data and models?


Answer: A.


Explanation

Compute Instances: Development workstations that data scientists can use to work with data and models. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 21: 

A User can use the workspace to manage data, _________, code, __________, and other artifacts related to your machine learning workloads. Choose the correct option.


Answer: B, D.


Explanation

A User can use this workspace to manage data, compute resources, code, models, and other artifacts related to your machine learning workloads. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace


Question 22: 

Which compute resources are scalable clusters of virtual machines for on-demand processing of experiment code?


Answer: C.


Explanation

Compute Clusters: Scalable clusters of virtual machines for on-demand processing of experiment code. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 23: 

Which compute resources are deployment targets for predictive services that use your trained model?


Answer: D.


Explanation

Inference Clusters: Deployment targets for predictive services that use your trained models. Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 24: 

What are the compute resources you can create in Azure ML Studio? Choose the correct options.


Answer: A, C.


Explanation

There are four kinds of compute resources you can create: Compute Instances, Attached Compute, Compute Clusters, Inference Clusters.

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 25: 

What all details are required for creating a new Machine Learning resource? Choose the correct options.


Answer: A, C, D.


Explanation

Subscription, Resource group, Key vault are required for creating a new Machine Learning resource. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace

AI 900 Full Mock Test 2


Time: 60 minutes    |    No of Qs: 53    |    Passing Score: 700


Question 1: 

To classify images based on the type of vehicle they contain, such as taxis, buses, cyclists, and so on is an example of _____________.


Answer: D.


Explanation

In a traffic monitoring solution you might use an image classification model to classify images based on the type of vehicle they contain, such as taxis, buses, cyclists, and so on. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 2: 

Which solution will be used to identify the location of different classes of vehicle in a traffic monitoring?


Answer: B.


Explanation

A traffic monitoring solution might use object detection to identify the location of different classes of vehicle. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 3: 

An advanced machine learning technique in which individual pixels in the image are classified according to the object to which they belong.


Answer: A.


Explanation

Semantic segmentation is an advanced machine learning technique in which individual pixels in the image are classified according to the object to which they belong. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 4: 

Machine learning models are trained to classify individual objects within an image, and identify their location with a bounding box. Choose the correct option.


Answer: B.


Explanation

Object detection machine learning models are trained to classify individual objects within an image, and identify their location with a bounding box. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 5: 

Most computer vision solutions are based on machine learning models that can be applied to __________ from cameras, videos, or images.


Answer: D.


Explanation

Most computer vision solutions are based on machine learning models that can be applied to visual input from cameras, videos, or images. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 6: 

Which compute resources link to existing Azure compute resources, such as Virtual Machines or Azure Databricks clusters?


Answer: B.


Explanation

Attached Compute: Links to existing Azure compute resources, such as Virtual Machines or Azure Databricks clusters. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 7: 

In automated ML, which virtual machine image is recommended to achieve the optimal balance of cost and performance?


Answer: A.


Explanation

In automated ML, the Standard_DS11_v2 image is recommended to achieve the optimal balance of cost and performance. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 8: 

True or False. Machine learning models must be trained with live data.


Answer: B.


Explanation

Machine learning models must be trained with existing data. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 9: 

A User can use automated machine learning to train models for below problems. Choose the correct option.


Answer: A, C, D.


Explanation

A User can use automated machine learning to train models for: Classification (predicting categories or classes) Regression (predicting numeric values) Time series forecasting (regression with a time-series element, enabling you to predict numeric values at a future point in time). 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 10: 

In Azure Machine Learning, data for model training and other operations is usually encapsulated in an object called a __________.


Answer: B.


Explanation

In Azure Machine Learning, data for model training and other operations is usually encapsulated in an object called a dataset. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 11: 

Which machine learning model is suitable for predicting categories or classes?


Answer: C.


Explanation

Classification is used for predicting categories or classes. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 12: 

Which option in Automated ML can calculate feature importance for the best model? Choose the correct option.


Answer: D.


Explanation

Option D: This option causes automated machine learning to calculate feature importance for the best model; making it possible to determine the influence of each feature on the predicted label. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 13: 

This causes Azure Machine Learning to automatically preprocess the features before training in Automated ML. Choose the correct option.


Answer: A.


Explanation

In Featurization settings. Enable featurization must be Selected which causes Azure Machine Learning to automatically preprocess the features before training. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 14: 

A machine learning based technique that analyzes data over time and identifies unusual changes. Choose the correct option.


Answer: B.


Explanation

By using anomaly detection - a machine learning based technique that analyzes data over time and identifies unusual changes. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/3-understand-anomaly-detection


Question 15: 

Sensors in the car collect _________, such as engine revolutions, brake temperature, and so on.


Answer: B.


Explanation

Sensors in the car collect telemetry, such as engine revolutions, brake temperature, and so on. Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/3-understand-anomaly-detection


Question 16: 

The _____________ app is a great example of the power of computer vision.


Answer: C.


Explanation

The Seeing AI app is a great example of the power of computer vision. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 17: 

Seeing AI apps harnesses the power of AI to open up the visual world and describe nearby ___________, ___________and __________.


Answer: A, B, C.


Explanation

The Seeing AI app is a great example of the power of computer vision. Designed for the blind and low vision community, the Seeing AI app harnesses the power of AI to open up the visual world and describe nearby people, text and objects. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 18: 

Which classification involves training a machine learning model to classify images based on their contents?


Answer: A.


Explanation

Image classification involves training a machine learning model to classify images based on their contents. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision


Question 19: 

Normalized root mean squared error metric is a part of _______________.


Answer: D.


Explanation

Normalized root mean squared error metric is a part of Regression.


Question 20: 

To identify the best model, the training process used some of the data to train the model, and applied a technique called __________ to iteratively test the trained model with data it wasn't trained with and compare the predicted value with the actual known value.


Answer: B.


Explanation

The best model is identified based on the evaluation metric you specified (Normalized root mean squared error). To calculate this metric, the training process used some of the data to train the model, and applied a technique called cross-validation to iteratively test the trained model with data it wasn't trained with and compare the predicted value with the actual known value. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 21: 

What compute resources are based on standard Azure virtual machine images? Choose the correct option.


Answer: A, C.


Explanation

Compute instances and clusters are based on standard Azure virtual machine images. Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute


Question 22: 

The difference between the predicted and actual value is known as __________ in the model.


Answer: C.


Explanation

The difference between the predicted and actual value (known as the residuals) indicates the amount of error in the model. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 23: 

In Azure Machine Learning, operations that you run are called ___________.


Answer: A.


Explanation

In Azure Machine Learning, operations that you run are called experiments. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 24: 

In Azure Machine Learning, you can deploy a service as an __________ or to an _____________ cluster.


Answer: A, D.


Explanation

In Azure Machine Learning, you can deploy a service as an Azure Container Instances (ACI) or to an Azure Kubernetes Service (AKS) cluster. 

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data


Question 25: 

What information is required to connect to your deployed service from a client application? Choose the correct option.


Answer: B, C.


Explanation

You need below information to connect to your deployed service from a client application. The REST endpoint for your service is the Primary Key for your service.

Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/deploy-model

Microsoft AZURE® AZ 900 Mock Tests 

Microsoft AZURE® AZ 900 Mock Tests 1

Question 1: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. A platform as a service (PaaS) solution that hosts web apps in Azure provides the ability to scale the platform automatically.


Answer: A. 


Question 2: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. A platform as a service (PaaS) solution that hosts web apps in Azure provides full control over the operating system that hosts applications.


Answer: B. 


Question 3: 

You are running Windows Server VM-01 in Azure, located in the West Europe region. Which Azure service should you use from the Azure portal to view service failure notifications that can affect the availability of VM-01?


Answer: C. 


Question 4: 

You plan to extend your company’s network to Azure. The network contains a VPN appliance that uses an IP address of 128.8.8.8. You need to create an Azure resource that identifies the VPN appliance in Azure. Which Azure resource should you create?


Answer: B. 


Question 5: 

An Azure availability zone can be used to protect the availability of your services running in Azure. Which of the following types of failures can you avoid by using availability zones?


Answer: D. 


Question 6: 

Which URL should you use to connect to Azure cloud and manage your Azure resources?


Answer: C. 


Question 7: 

You plan to store 20 TB of data in Azure. The data will be accessed infrequently and visualized by using Microsoft Power BI. You need to recommend a storage solution for the data. Which two solutions should you recommend? (SELECT TWO)


Answer: A,C. 



Question 8: 

This question requires that you evaluate the italic text to determine if it is correct.

One of the benefits of Azure Synapse Analytics is that high availability is built into the platform.

Please review the italic text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.


Answer: A. 


Question 9: 

A team of developers at your company plans to deploy, and then remove, 50 customized virtual machines each week. Thirty of the virtual machines run Windows Server 2016 and 20 of the virtual machines run Ubuntu Linux.

You need to recommend which Azure service will minimize the administrative effort required to deploy and remove the virtual machines. What should you recommend?


Answer: C. 


Question 10: 

You received a new task to delegate permissions to several Azure virtual machines simultaneously. What should you do?


Answer: C. 


Question 11: 

You plan to deploy 35 virtual machines to an Azure environment. You need to ensure that a virtual machine named VM-01 can't connect to the other virtual machines. What should you do in this case?


Answer: A. 


Question 12: 

Which of the following statements is true regarding Azure regions?


Answer: A. 


Question 13: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure availability zones are available to be configured in each and every Azure region.


Answer: B. 


Question 14: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Only virtual machines that run Ubuntu Linux operating systems can be created in availability zones.


Answer: B. 


Question 15: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Availability zones are used to replicate data and applications to multiple regions.


Answer: B. 


Question 16: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Data that is copied to an Azure Storage account is maintained automatically in at least three copies.


Answer: A.


Question 17: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. All data copied to an Azure Storage account is backed up automatically to another Azure data center.


Answer: B. 


Question 18: 

Your company plans to automate the deployment of servers to Azure. The company Chief Technology Officer(CTO) is concerned that administrative credentials may get exposed during the deployment. You need to recommend an Azure solution that encrypts the administrative credentials during the deployment. What should you include in the recommendation?


Answer: A. 


Question 19: 

Azure Key Vault is used to store secrets for __________ . Which of the following options completes the statement correctly?


Answer: D. 


Question 20: 

Your manager has asked you to identify whether Azure complies with the company’s regional requirements. What should you use to fulfill this request?


Answer: D.


Question 21: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. From Azure Service Health, you can view the health of all the services deployed in your Azure environment and all the other services available in Azure.


Answer: A. 


Question 22: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. From Azure Service Health, an administrator can create a rule to be alerted if an Azure service fails.


Answer: A. 


Question 23: 

Which Azure service would you use to monitor threats in your Azure environment by using sensors?


Answer: D. 


Question 24: 

Which Azure service would you use to enforce Azure MFA based on a condition?


Answer: C. 


Question 25: 

You need to configure an Azure solution that is able to secure your websites from attacks and generate reports that contain details of attempted attacks. What should you include in your architecture?


Answer: D.

Microsoft AZURE® AZ 900 Mock Tests 2


Question 1:

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. An Azure service is fault tolerant if it remains available after a failure occurs.


Answer: A. 


Question 2: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. An Azure service has disaster recovery capabilities if it can recover after a failure occurs.


Answer: A. 


Quick Preview:


Question 3: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. An Azure service is scalable if it can't adapt to traffic demand changes, up or down.


Answer: B. 


Question 4: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure provides low latency access to its services, which means services can be accessed quickly from the Internet.


Answer: A. 


Question 5: 

You are preparing to migrate all your company's virtual machines to a pay-as-you-go subscription in Azure cloud. The company CFO asks you what expenditure model Azure uses. What will you answer?


Answer: A. 


Question 6: 

Your company is running the business on an on-premises network that contains around 80 servers. You need to identify a solution to provide more resources to your users, but also to minimize capital and operational expenditure costs. What should you recommend?


Answer: D. 


Question 7: 

Which cloud deployment solution is used for Azure virtual machines and Azure SQL databases? (SELECT TWO)


Answer: A,E. 


Question 8: 

You plan to migrate a web application to Azure. The web application is accessed by external users. You need to recommend a cloud deployment solution to minimize the amount of administrative effort used to manage the web application. What should you include in the recommendation?


Answer: B


Question 9: 

The company’s compliance policy states that a server named Azure_on_Udemy_Server must be on a separate network segment. Which Azure solution should you recommend?


Answer: B. 


Question 10: 

Which of the following Azure storage services must be used to store the unmanaged data disks of a virtual machine?


Answer: A. 


Question 11: 

You want to monitor the health of your Azure services. Which of the following Azure blades (menus) would you navigate to for this task?


Answer: A. 


Question 12: 

You want to search and browse the available virtual machine images. Which of the following Azure blades (menus) would you navigate to for this task?


Answer: C. 


Question 13: 

You want to view the available Azure security recommendations. Which of the following Azure blades (menus) would you navigate to for this task?


Answer: D. 


Question 14: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure SQL Database is a managed relational cloud database service.


Answer: A.


Question 15: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Synapse Analytics is a cloud based service that leverages massively parallel processing (MPP) to quickly run complex queries across petabytes of data in a relational database.


Answer: A. 


Question 16: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Data Lake Analytics can run massively parallel data transformation and processing programs across petabytes of data.


Answer: A. 


Question 17: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure HDInsight is an open source framework for the distributed processing and analysis of big data sets in clusters.


Answer: A. 


Question 18: 

You plan to implement a solution that allows users in your on-premises network to communicate to virtual machines in Azure cloud. Which two Azure resources should you include in your architecture?


Answer: A,E. 


Question 19: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure DevOps represents an integrated solution for the deployment of code.


Answer: A.


Question 20: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Advisor represents an Azure tool that provides guidance and recommendations to improve an Azure environment.


Answer: A. 


Question 21: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Cognitive Services is a simplified tool that you can use in Azure to build intelligent Artificial Intelligence (AI) applications.


Answer: A. 


Question 22: 

Please evaluate the following statement and select Yes if the statement is true, otherwise select No. You can use Azure Application Insights to monitor web applications.


Answer: A. 


Question 23: 

You want to connect through HTTPS to a brand new web server VM that you deployed to Azure. You open a browser, try to connect to the web server's Public IP, but your connection gets denied. What configuration should you modify so that you can connect to the web server?


Answer: C. 


Question 24: 

Which of the following statements is true regarding Azure Germany?


Answer: D. 


Question 25: 

You have finished the project and you now want to delete the AZ900 resource group. It seems that you can't delete it, because a delete lock is applied to the AZ900 resource group. What should you do next in order to delete the AZ900 resource group?


Answer: B. 

Cisco Certified CyberOps Associate CBROPS 200-201 Mock Tests 

CBROPS 200-201 Mock Tests 1


Question 1: 

For what purpose would a network administrator use the Nmap tool?


Answer: D.


Question 2: 

What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?


Answer: A.


Question 3: 

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?


Answer: C.


Question 4: 

A person coming to a cafe for the first time wants to gain wireless access to the Internet using a laptop. What is the first step the wireless client will do in order to communicate over the network using a wireless management frame?


Answer: C.


Question 5: 

A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the network identifier of the device?


Answer: D.


Question 6: 

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second usable subnet?


Answer: A.


Question 7: 

What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?


Answer: B.


Question 8: 

The IT security personnel of an organization notice that the web server deployed in the DMZ is frequently targeted by threat actors. The decision is made to implement a patch management system to manage the server. Which risk management strategy method is being used to respond to the identified risk?


Answer: C.


Question 9: 

What are three characteristics of an information security management system? (Choose three.)


Answer: B, D, E.


Question 10: 

Which three technologies should be included in a SOC security information and event management system? (Choose three.)


Answer: A, B, F.


Question 11: 

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?


Answer: C.


Question 12: 

What best describes the security threat of spoofing?


Answer: D.


Question 13: 

A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?


Answer: C.


Question 14: 

Which statement defines the difference between session data and transaction data in logs?

Session data analyzes network traffic and predicts network behavior, whereas transaction data records network sessions.

Session data is used to make predictions on network behaviors, whereas transaction data is used to detect network anomalies.

Session data records a conversation between hosts, whereas transaction data focuses on the result of network sessions.

Session data shows the result of a network session, whereas transaction data is in response to network threat traffic.


Answer: C.


Question 15: 

Which device supports the use of SPAN to enable monitoring of malicious activity?


Answer: A.


Question 16: 

Which term is used for describing automated queries that are useful for adding efficiency to the cyberoperations workflow?


Answer: B.


Question 17: 

When ACLs are configured to block IP address spoofing and DoS flood attacks, which ICMP message should be allowed both inbound and outbound?


Answer: C.


Question 18: 

After a security monitoring tool identifies a malware attachment entering the network, what is the benefit of performing a retrospective analysis?


Answer: B.


Question 19: 

Which two data types would be classified as personally identifiable information (PII)? (Choose two.)


Answer: C, E.


Question 20: 

A help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are the two purposes of botnets? (Choose two.)


Answer: A, C.


Question 21: 

Which meta-feature element in the Diamond Model classifies the general type of intrusion event?


Answer: A.


Question 22: 

Which Linux command is used to manage processes?


Answer: D.


Question 23: 

What Cisco management system is used to analyze application analysis data into dashboard reports?


Answer: C.


Question 24: 

Which Windows Event Viewer log includes events regarding the operation of drivers, processes, and hardware?


Answer: A.


Question 25: 

Which method is used to make data unreadable to unauthorized users?


Answer: A.



CBROPS 200-201 Mock Tests 2


Question 1: 

What is the purpose of entering the nslookup cisco.com command on a Windows PC?


Answer: C.


Question 2: 

How is the event ID assigned in Sguil?


Answer: D.


Question 3: 

Which two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.)


Answer: A, D.


Question 4: 

What are two elements that form the PRI value in a syslog message? (Choose two.)


Answer: A, C.


Question 5: 

Which three pieces of information are found in session data? (Choose three.)


Answer: B, C, F.


Question 6: 

What kind of ICMP message can be used by threat actors to perform network reconnaissance and scanning attacks?


Answer: C.


Question 7: 

A flood of packets with invalid source IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack has occurred?


Answer: B.


Question 8: 

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?


Answer: C.


Question 9: 

What is the most common goal of search engine optimization (SEO) poisoning?


Answer: A.


Question 10: 

Users report that a database file on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?


Answer: C.


Question 11: 

What two kinds of personal information can be sold on the dark web by cybercriminals? (Choose two.)


Answer: C, E.


Question 12: 

What three services are offered by FireEye? (Choose three.)


Answer: C, D, F.


Question 13: 

After containment, what is the first step of eradicating an attack?


Answer: D.


Question 14: 

Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?


Answer: A.


Question 15: 

When dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)


Answer: C, E.


Question 16: 

How might corporate IT professionals deal with DNS-based cyber threats?


Answer: B.


Question 17: 

How does using HTTPS complicate network security monitoring?


Answer: A.


Question 18: 

What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)


Answer: B, D.


Question 19: 

Which three algorithms are designed to generate and verify digital signatures? (Choose three.)


Answer: C, E, F.


Question 20: 

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?


Answer: B.


Question 21: 

What kind of message is sent by a DHCPv4 client requesting an IP address?


Answer: A.


Question 22: 

What is the responsibility of the human resources department when handling a security incident?


Answer: A.


Question 23: 

How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?


Answer: C.


Question 24: 

At which OSI layer is a source IP address added to a PDU during the encapsulation process?


Answer: A.


Question 25: 

What is the purpose of CSMA/CA?


Answer: D.