Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

100-160 Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Questions 4

Which security assessment of IT systems verifies that PII data is available, accurate, confidential, and accessible only by authorized users?

Options:

A.

Risk framing

B.

Cyber Kill Chain

C.

Workflow management

D.

Information assurance

Buy Now
Questions 5

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

Options:

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Buy Now
Questions 6

How does a honeypot enhance network security?

Options:

A.

It monitors network traffic and sends alerts when potential threats are detected.

B.

It acts as a decoy and diverts malicious traffic away from important systems.

C.

It isolates external-facing services from the Internet and protects them from attack.

D.

It detects and prevents identified threats through real-time packet inspection.

Buy Now
Questions 7

Why is it necessary to update firmware to the latest version?

Options:

A.

To support the latest operating systems and applications

B.

To patch firmware in the kernel of the operating system

C.

To correct security holes and weaknesses

D.

To explore new hardware features

Buy Now
Questions 8

Which step should be performed immediately after identifying a critical vulnerability affecting internet-facing systems?

Options:

A.

Document the vulnerability in the annual security report.

B.

Apply the vendor patch or mitigation.

C.

Schedule a quarterly penetration test.

D.

Change the default administrator passwords.

Buy Now
Questions 9

Your home network seems to have slowed down considerably. You look at the home router GUI and notice that an unknown host is attached to the network.

What should you do to prevent this specific host from attaching to the network again?

Options:

A.

Create an IP access control list.

B.

Implement MAC address filtering.

C.

Block the host IP address.

D.

Change the network SSID.

Buy Now
Questions 10

Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?

Options:

A.

IDS

B.

IPS

C.

Proxy Server

D.

Honeypot

Buy Now
Questions 11

A client cannot connect to the corporate web server. You discover a large number of half-open TCP connections to the server.

What should you do?

Options:

A.

Take action to stop the TCP SYN flood attack.

B.

Change the connection protocol from HTTP to HTTPS.

C.

Ignore the half-open connections because this is a normal part of the TCP three-way handshake.

D.

Flush the DNS cache information.

Buy Now
Questions 12

A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?

Options:

A.

Reset the affected user’s password and investigate the scope of compromise.

B.

Block all foreign IP addresses from accessing the network.

C.

Run a full vulnerability scan of the corporate network.

D.

Ignore the event unless it happens again.

Buy Now
Questions 13

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Buy Now
Questions 14

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

Options:

A.

Object access failure

B.

Account logon failure

C.

Account lockout success

D.

Account logoff success

Buy Now
Questions 15

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

Options:

A.

WAN management

B.

Authorization of users

C.

Integrity of data

D.

Authentication of users

E.

Confidentiality of information

F.

Password management

Buy Now
Exam Code: 100-160
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
Last Update: Aug 17, 2025
Questions: 50
100-160 pdf

100-160 PDF

$33.25  $94.99
100-160 Engine

100-160 Testing Engine

$38.5  $109.99
100-160 PDF + Engine

100-160 PDF + Testing Engine

$50.75  $144.99