Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers
Which two basic metrics should be taken into consideration when assigning a severity to a vulnerability during an assessment?(Choose 2.)
A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?
A restaurant installs a second wireless router that only employees can use.
Which statement describes how to securely configure the new router?
Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?
Move each NIST Incident Response Lifecycle phase from the list on the left to the correct description on the right.
Note: You will receive partial credit for each correct answer.
Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.
Which three requirements are commonly included in a BYOD policy?(Choose 3.)
Move each definition from the list on the left to the correct CIA Triad term on the right.
Note: You will receive partial credit for each correct answer.
A remote worker is visiting a branch office to attend face-to-face meetings. The worker tries to associate their company laptop with the branch wireless access point (WAP) but is unable to do so.
What is a possible cause?
How does a honeypot enhance network security?
You are going to perform a penetration test on a company LAN. As part of your preparation, you access the company’s websites, view webpage source code, and run internet searches to uncover domain information. You also use social media to gather details about the company and its employees.
Which type of reconnaissance activities are you performing?
Move each framework from the list on the left to the correct purpose on the right.
Note: You will receive partial credit for each correct answer.
What is the primary purpose of running a vulnerability scan on your network?
You are planning to work from home. Your company requires that you connect to the company network through a VPN.
Which three critical functions do VPNs provide to remote workers?(Choose 3.)
You need a software solution that performs the following tasks:
Compiles network data
Logs information from many sources
Provides orchestration in the form of case management
Automates incident response workflows
What product should you use?
What should you create to prevent spoofing of the internal network?