Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Cisco 100-160 Dumps

Page: 1 / 5
Total 50 questions

Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Question 1

Which two basic metrics should be taken into consideration when assigning a severity to a vulnerability during an assessment?(Choose 2.)

Options:

A.

The likelihood that an adversary can and will exploit the vulnerability

B.

The impacts that an exploit of the vulnerability will have on the organization

C.

The time involved in choosing replacement software to replace older systems

D.

The age of the hardware running the software that contains the vulnerability

Question 2

A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?

Options:

A.

Reset the affected user’s password and investigate the scope of compromise.

B.

Block all foreign IP addresses from accessing the network.

C.

Run a full vulnerability scan of the corporate network.

D.

Ignore the event unless it happens again.

Question 3

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

Options:

A.

Configure the new router to filter IP addresses.

B.

Configure the SSID with broadcast disabled.

C.

Configure a higher signal strength to allow coverage in the parking lot.

D.

Configure the SSID with the same SSID used by the customer router.

Question 4

Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?

Options:

A.

IDS

B.

IPS

C.

Proxy Server

D.

Honeypot

Question 5

Move each NIST Incident Response Lifecycle phase from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

as

Options:

Question 6

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

Options:

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Question 7

Move each definition from the list on the left to the correct CIA Triad term on the right.

Note: You will receive partial credit for each correct answer.

as

Options:

Question 8

A remote worker is visiting a branch office to attend face-to-face meetings. The worker tries to associate their company laptop with the branch wireless access point (WAP) but is unable to do so.

What is a possible cause?

Options:

A.

The SSID is not broadcasting.

B.

The WAP is configured for MAC address filtering.

C.

The IP address of the laptop is not correct.

D.

The WAP is using open authentication.

Question 9

How does a honeypot enhance network security?

Options:

A.

It monitors network traffic and sends alerts when potential threats are detected.

B.

It acts as a decoy and diverts malicious traffic away from important systems.

C.

It isolates external-facing services from the Internet and protects them from attack.

D.

It detects and prevents identified threats through real-time packet inspection.

Question 10

You are going to perform a penetration test on a company LAN. As part of your preparation, you access the company’s websites, view webpage source code, and run internet searches to uncover domain information. You also use social media to gather details about the company and its employees.

Which type of reconnaissance activities are you performing?

Options:

A.

Passive

B.

Active

C.

Offline

D.

Invasive

Question 11

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

as

Options:

Question 12

What is the primary purpose of running a vulnerability scan on your network?

Options:

A.

To identify and document the locations of customer and financial databases

B.

To automatically prioritize security weaknesses for immediate remediation

C.

To determine whether systems are subject to CVEs that could be exploited by adversaries

D.

To correlate event logs on multiple servers in order to generate intrusion alerts

Question 13

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

Options:

A.

WAN management

B.

Authorization of users

C.

Integrity of data

D.

Authentication of users

E.

Confidentiality of information

F.

Password management

Question 14

You need a software solution that performs the following tasks:

    Compiles network data

    Logs information from many sources

    Provides orchestration in the form of case management

    Automates incident response workflows

What product should you use?

Options:

A.

SIEM

B.

SOAR

C.

NextGen IPS

D.

Snort

Question 15

What should you create to prevent spoofing of the internal network?

Options:

A.

A NAT rule

B.

An ACL

C.

A record in the host file

D.

A DNS record

Page: 1 / 5
Total 50 questions