Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

100-160 Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Questions 4

Which wireless security protocol provides the strongest protection for a home or small business network?

Options:

A.

WEP

B.

WPA

C.

WPA2 with AES

D.

WPA3

Buy Now
Questions 5

Move each scenario from the list on the left to the correct type of attacker on the right.

Note: You will receive partial credit for each correct answer.

100-160 Question 5

Options:

Buy Now
Questions 6

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

Options:

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

Buy Now
Questions 7

Move each NIST Incident Response Lifecycle phase from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

100-160 Question 7

Options:

Buy Now
Questions 8

Which data type is protected through hard disk encryption?

Options:

A.

Data in process

B.

Data in transit

C.

Data in use

D.

Data at rest

Buy Now
Questions 9

You are collecting data after a suspected intrusion on the local LAN.

You need to capture incoming IP packets to a file for an investigator to analyze.

Which two tools should you use?(Choose 2.)

Options:

A.

Wireshark

B.

tcpdump

C.

Nmap

D.

netstat

Buy Now
Questions 10

What is the main purpose of a disaster recovery plan as compared to a business continuity plan?

Options:

A.

Limiting operational downtime.

B.

Keeping the business open in some capacity during a disaster.

C.

Restoring data access and an IT infrastructure as quickly as possible.

D.

Allowing staff to continue to serve customers throughout a disaster.

Buy Now
Questions 11

You need to design your company’s password policy to adhere to the National Institute of Standards and Technology (NIST) guidelines for user password security.

What is the minimum password length that you should require to be consistent with the NIST guidelines?

Options:

A.

4 characters

B.

8 characters

C.

16 characters

D.

No minimum length

Buy Now
Questions 12

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Buy Now
Questions 13

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

Options:

A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

Buy Now
Questions 14

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

Options:

A.

Object access failure

B.

Account logon failure

C.

Account lockout success

D.

Account logoff success

Buy Now
Questions 15

For each statement, selectTrueif it is a common motivation to commit cyber attacks orFalseif it is not.

Note: You will receive partial credit for each correct selection.

100-160 Question 15

Options:

Buy Now
Exam Code: 100-160
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
Last Update: Oct 16, 2025
Questions: 50

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99