Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

100-160 Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Questions 4

A client cannot connect to the corporate web server. You discover a large number of half-open TCP connections to the server.

What should you do?

Options:

A.

Take action to stop the TCP SYN flood attack.

B.

Change the connection protocol from HTTP to HTTPS.

C.

Ignore the half-open connections because this is a normal part of the TCP three-way handshake.

D.

Flush the DNS cache information.

Buy Now
Questions 5

How do threat actors launch ransomware attacks on organizations?

Options:

A.

They implant malware to collect data from the corporation’s financial system.

B.

They deface an organization’s public-facing website.

C.

They lock data and deny access to the data until they receive money.

D.

They secretly spy on employees and collect employees’ personal information.

Buy Now
Questions 6

What should you create to prevent spoofing of the internal network?

Options:

A.

A NAT rule

B.

An ACL

C.

A record in the host file

D.

A DNS record

Buy Now
Questions 7

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

Options:

A.

Object access failure

B.

Account logon failure

C.

Account lockout success

D.

Account logoff success

Buy Now
Questions 8

A remote worker is visiting a branch office to attend face-to-face meetings. The worker tries to associate their company laptop with the branch wireless access point (WAP) but is unable to do so.

What is a possible cause?

Options:

A.

The SSID is not broadcasting.

B.

The WAP is configured for MAC address filtering.

C.

The IP address of the laptop is not correct.

D.

The WAP is using open authentication.

Buy Now
Questions 9

Move each NIST Incident Response Lifecycle phase from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

Options:

Buy Now
Questions 10

Which macOS security feature encrypts the entire macOS volume?

Options:

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Buy Now
Questions 11

Move each worm mitigation step from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

Options:

Buy Now
Questions 12

An employee accidentally sends an email containing sensitive corporate information to an external email address.

Which type of threat does this scenario describe?

Options:

A.

Logic bomb

B.

Malware

C.

Phishing

D.

Insider

Buy Now
Questions 13

For each statement, selectTrueif it is a common motivation to commit cyber attacks orFalseif it is not.

Note: You will receive partial credit for each correct selection.

Options:

Buy Now
Questions 14

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

Options:

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Buy Now
Questions 15

Which encryption type is commonly used to secure WiFi networks?

Options:

A.

Data Encryption Standard (DES)

B.

Triple Data Encryption Algorithm (Triple DES)

C.

Advanced Encryption Algorithm (AES)

D.

RSA (Rivest–Shamir–Adleman)

Buy Now

CCST |

Exam Code: 100-160
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
Last Update: Aug 17, 2025
Questions: 50
100-160 pdf

100-160 PDF

$33.25  $94.99
100-160 Engine

100-160 Testing Engine

$38.5  $109.99
100-160 PDF + Engine

100-160 PDF + Testing Engine

$50.75  $144.99