Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cisco > CCST > 100-160

100-160 Cisco Certified Support Technician (CCST) Cybersecurity Question and Answers

Question # 4

A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP.

Which type of attack does this scenario describe?

A.

Reconnaissance

B.

Man-in-the-middle

C.

DDoS

D.

Ransomware

Full Access
Question # 5

For each statement, selectTrueif it is a common motivation to commit cyber attacks orFalseif it is not.

Note: You will receive partial credit for each correct selection.

Full Access
Question # 6

How do threat actors launch ransomware attacks on organizations?

A.

They implant malware to collect data from the corporation’s financial system.

B.

They deface an organization’s public-facing website.

C.

They lock data and deny access to the data until they receive money.

D.

They secretly spy on employees and collect employees’ personal information.

Full Access
Question # 7

Why is it necessary to update firmware to the latest version?

A.

To support the latest operating systems and applications

B.

To patch firmware in the kernel of the operating system

C.

To correct security holes and weaknesses

D.

To explore new hardware features

Full Access
Question # 8

You are reviewing the Application log on a Windows computer. You see an event with an error-level message as shown.

What can you determine about the application that generated the event message?

A.

The application is currently running much slower than expected.

B.

The application experienced a significant problem that caused it to fail.

C.

The application recovered from an event without loss of functionality.

D.

The application loaded and ran successfully without issues.

Full Access
Question # 9

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Full Access
Question # 10

How does sandboxing help with the analysis of malware?

A.

It defines the suspicious or malicious applications that should be blocked.

B.

It specifies the applications that are authorized for use on the network.

C.

It allows suspicious applications to run in a safe and isolated testing environment.

D.

It restricts traffic from passing from one network to another.

Full Access
Question # 11

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

Full Access
Question # 12

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

A.

Object access failure

B.

Account logon failure

C.

Account lockout success

D.

Account logoff success

Full Access
Question # 13

Which macOS security feature encrypts the entire macOS volume?

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Full Access
Question # 14

What is the primary purpose of running a vulnerability scan on your network?

A.

To identify and document the locations of customer and financial databases

B.

To automatically prioritize security weaknesses for immediate remediation

C.

To determine whether systems are subject to CVEs that could be exploited by adversaries

D.

To correlate event logs on multiple servers in order to generate intrusion alerts

Full Access
Question # 15

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

Full Access