Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Exam Practice Test

Page: 1 / 5
Total 50 questions

Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Question 1

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

Options:

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

Question 2

An administrator wants to ensure that any files downloaded from the internet are automatically scanned for malicious code before execution. Which security control should be implemented?

Options:

A.

Host-based firewall

B.

Anti-malware with real-time protection

C.

VPN client

D.

Patch management system

Question 3

You need a software solution that performs the following tasks:

    Compiles network data

    Logs information from many sources

    Provides orchestration in the form of case management

    Automates incident response workflows

What product should you use?

Options:

A.

SIEM

B.

SOAR

C.

NextGen IPS

D.

Snort

Question 4

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

Options:

A.

Configure the new router to filter IP addresses.

B.

Configure the SSID with broadcast disabled.

C.

Configure a higher signal strength to allow coverage in the parking lot.

D.

Configure the SSID with the same SSID used by the customer router.

Question 5

You need to manage security risks at your company. In which order should you complete the actions?

Move all the actions to the answer area and place them in the correct order.

Question # 5

Options:

Question 6

Which wireless security protocol provides the strongest protection for a home or small business network?

Options:

A.

WEP

B.

WPA

C.

WPA2 with AES

D.

WPA3

Question 7

How do threat actors launch ransomware attacks on organizations?

Options:

A.

They implant malware to collect data from the corporation’s financial system.

B.

They deface an organization’s public-facing website.

C.

They lock data and deny access to the data until they receive money.

D.

They secretly spy on employees and collect employees’ personal information.

Question 8

Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?

Options:

A.

IDS

B.

IPS

C.

Proxy Server

D.

Honeypot

Question 9

You are reviewing the Application log on a Windows computer. You see an event with an error-level message as shown.

What can you determine about the application that generated the event message?

Question # 9

Options:

A.

The application is currently running much slower than expected.

B.

The application experienced a significant problem that caused it to fail.

C.

The application recovered from an event without loss of functionality.

D.

The application loaded and ran successfully without issues.

Question 10

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Question # 10

Options:

Question 11

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

Options:

A.

Object access failure

B.

Account logon failure

C.

Account lockout success

D.

Account logoff success

Question 12

Move each definition from the list on the left to the correct CIA Triad term on the right.

Note: You will receive partial credit for each correct answer.

Question # 12

Options:

Question 13

Why is it necessary to update firmware to the latest version?

Options:

A.

To support the latest operating systems and applications

B.

To patch firmware in the kernel of the operating system

C.

To correct security holes and weaknesses

D.

To explore new hardware features

Question 14

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Question 15

Move each NIST Incident Response Lifecycle phase from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

Question # 15

Options:

Page: 1 / 5
Total 50 questions