Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Cisco 100-160 Dumps Questions Answers

Page: 1 / 4
Total 50 questions

Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Question 1

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Buy Now
Question 2

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

Options:

A.

Configure the new router to filter IP addresses.

B.

Configure the SSID with broadcast disabled.

C.

Configure a higher signal strength to allow coverage in the parking lot.

D.

Configure the SSID with the same SSID used by the customer router.

Question 3

Your home network seems to have slowed down considerably. You look at the home router GUI and notice that an unknown host is attached to the network.

What should you do to prevent this specific host from attaching to the network again?

Options:

A.

Create an IP access control list.

B.

Implement MAC address filtering.

C.

Block the host IP address.

D.

Change the network SSID.

Question 4

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

Options:

A.

Object access failure

B.

Account logon failure

C.

Account lockout success

D.

Account logoff success

Question 5

You need to manage security risks at your company. In which order should you complete the actions?

Move all the actions to the answer area and place them in the correct order.

Options:

Question 6

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

Options:

A.

WAN management

B.

Authorization of users

C.

Integrity of data

D.

Authentication of users

E.

Confidentiality of information

F.

Password management

Question 7

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Options:

Question 8

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

Options:

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

Question 9

Why is it necessary to update firmware to the latest version?

Options:

A.

To support the latest operating systems and applications

B.

To patch firmware in the kernel of the operating system

C.

To correct security holes and weaknesses

D.

To explore new hardware features

Question 10

Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?

Options:

A.

IDS

B.

IPS

C.

Proxy Server

D.

Honeypot

Question 11

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

Options:

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Question 12

You are reviewing your company’s disaster recovery plan.

Which two daily data backup actions should the plan include?(Choose 2.)

Options:

A.

Back up the data to removable media and store it off-site.

B.

Back up each department’s data to a separate local server.

C.

Back up the data by using cloud services.

D.

Back up the data by using RAID on a local external hard drive with a secondary power source.

Question 13

How does sandboxing help with the analysis of malware?

Options:

A.

It defines the suspicious or malicious applications that should be blocked.

B.

It specifies the applications that are authorized for use on the network.

C.

It allows suspicious applications to run in a safe and isolated testing environment.

D.

It restricts traffic from passing from one network to another.

Question 14

You need to diagram an intrusion event by using the Diamond Model.

Move each event detail from the list on the left to the correct location in the diagram on the right.

Note: You will receive partial credit for each correct response.

Options:

Question 15

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

Options:

A.

An ownership policy for employees’ mobile devices

B.

A contingency plan

C.

A policy that requires multi-factor authentication to use the mobile device

D.

A policy to govern how ePHI is removed from mobile devices

Page: 1 / 4
Total 50 questions