Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Exam Practice Test

Demo: 8 questions
Total 50 questions

Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Question 1

Which wireless security protocol provides the strongest protection for a home or small business network?

Options:

A.

WEP

B.

WPA

C.

WPA2 with AES

D.

WPA3

Question 2

Your supervisor tells you that you will participate in a CVSS assessment.

What will you be doing?

Options:

A.

Performing penetration tests on internal network devices and end systems

B.

Analyzing host logs to identify abnormal activities

C.

Interviewing users to determine their level of cybersecurity awareness

D.

Evaluating end system security and scoring software vulnerabilities

Question 3

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

Options:

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Question 4

Move each worm mitigation step from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

Options:

Question 5

Your home network seems to have slowed down considerably. You look at the home router GUI and notice that an unknown host is attached to the network.

What should you do to prevent this specific host from attaching to the network again?

Options:

A.

Create an IP access control list.

B.

Implement MAC address filtering.

C.

Block the host IP address.

D.

Change the network SSID.

Question 6

You are collecting data after a suspected intrusion on the local LAN.

You need to capture incoming IP packets to a file for an investigator to analyze.

Which two tools should you use?(Choose 2.)

Options:

A.

Wireshark

B.

tcpdump

C.

Nmap

D.

netstat

Question 7

What is the primary purpose of running a vulnerability scan on your network?

Options:

A.

To identify and document the locations of customer and financial databases

B.

To automatically prioritize security weaknesses for immediate remediation

C.

To determine whether systems are subject to CVEs that could be exploited by adversaries

D.

To correlate event logs on multiple servers in order to generate intrusion alerts

Question 8

You notice that a new CVE has been shared to an email group that you belong to.

What should you do first with the CVE?

Options:

A.

Look up details of the vulnerability to determine whether it applies to your network.

B.

Research measures to prevent the CVE from attacking the network.

C.

Record the CVE as part of the disaster recovery plan.

D.

Add the CVE to the firewall rules for your organization.

Demo: 8 questions
Total 50 questions