Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Cisco Certified Support Technician (CCST) Cybersecurity

Last Update 21 hours ago Total Questions : 50

The Cisco Certified Support Technician (CCST) Cybersecurity content is now fully updated, with all current exam questions added 21 hours ago. Deciding to include 100-160 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 100-160 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 100-160 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Cisco Certified Support Technician (CCST) Cybersecurity practice test comfortably within the allotted time.

Question # 1

Move each scenario from the list on the left to the correct type of attacker on the right.

Note: You will receive partial credit for each correct answer.

Question # 2

A remote worker is visiting a branch office to attend face-to-face meetings. The worker tries to associate their company laptop with the branch wireless access point (WAP) but is unable to do so.

What is a possible cause?

A.

The SSID is not broadcasting.

B.

The WAP is configured for MAC address filtering.

C.

The IP address of the laptop is not correct.

D.

The WAP is using open authentication.

Question # 3

An administrator wants to ensure that any files downloaded from the internet are automatically scanned for malicious code before execution. Which security control should be implemented?

A.

Host-based firewall

B.

Anti-malware with real-time protection

C.

VPN client

D.

Patch management system

Question # 4

Which two basic metrics should be taken into consideration when assigning a severity to a vulnerability during an assessment? (Choose 2.)

A.

The likelihood that an adversary can and will exploit the vulnerability

B.

The impacts that an exploit of the vulnerability will have on the organization

C.

The time involved in choosing replacement software to replace older systems

D.

The age of the hardware running the software that contains the vulnerability

Question # 5

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities? (Choose 2.)

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Question # 6

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

Question # 7

Which macOS security feature encrypts the entire macOS volume?

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Question # 8

How does sandboxing help with the analysis of malware?

A.

It defines the suspicious or malicious applications that should be blocked.

B.

It specifies the applications that are authorized for use on the network.

C.

It allows suspicious applications to run in a safe and isolated testing environment.

D.

It restricts traffic from passing from one network to another.

Question # 9

You need to transfer configuration files to a router across an unsecured network.

Which protocol should you use to encrypt the files in transit?

A.

Telnet

B.

HTTP

C.

TFTP

D.

SSH

Question # 10

An employee accidentally sends an email containing sensitive corporate information to an external email address.

Which type of threat does this scenario describe?

A.

Logic bomb

B.

Malware

C.

Phishing

D.

Insider

Go to page: