Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

100-160 Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Questions 4

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

100-160 Question 4

Options:

Buy Now
Questions 5

You are collecting data after a suspected intrusion on the local LAN.

You need to capture incoming IP packets to a file for an investigator to analyze.

Which two tools should you use?(Choose 2.)

Options:

A.

Wireshark

B.

tcpdump

C.

Nmap

D.

netstat

Buy Now
Questions 6

Move each NIST Incident Response Lifecycle phase from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

100-160 Question 6

Options:

Buy Now
Questions 7

A remote worker is visiting a branch office to attend face-to-face meetings. The worker tries to associate their company laptop with the branch wireless access point (WAP) but is unable to do so.

What is a possible cause?

Options:

A.

The SSID is not broadcasting.

B.

The WAP is configured for MAC address filtering.

C.

The IP address of the laptop is not correct.

D.

The WAP is using open authentication.

Buy Now
Questions 8

You are reviewing the Application log on a Windows computer. You see an event with an error-level message as shown.

What can you determine about the application that generated the event message?

100-160 Question 8

Options:

A.

The application is currently running much slower than expected.

B.

The application experienced a significant problem that caused it to fail.

C.

The application recovered from an event without loss of functionality.

D.

The application loaded and ran successfully without issues.

Buy Now
Questions 9

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Buy Now
Questions 10

You need a software solution that performs the following tasks:

    Compiles network data

    Logs information from many sources

    Provides orchestration in the form of case management

    Automates incident response workflows

What product should you use?

Options:

A.

SIEM

B.

SOAR

C.

NextGen IPS

D.

Snort

Buy Now
Questions 11

You need to design your company’s password policy to adhere to the National Institute of Standards and Technology (NIST) guidelines for user password security.

What is the minimum password length that you should require to be consistent with the NIST guidelines?

Options:

A.

4 characters

B.

8 characters

C.

16 characters

D.

No minimum length

Buy Now
Questions 12

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

Options:

A.

Configure the new router to filter IP addresses.

B.

Configure the SSID with broadcast disabled.

C.

Configure a higher signal strength to allow coverage in the parking lot.

D.

Configure the SSID with the same SSID used by the customer router.

Buy Now
Questions 13

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

Options:

A.

An ownership policy for employees’ mobile devices

B.

A contingency plan

C.

A policy that requires multi-factor authentication to use the mobile device

D.

A policy to govern how ePHI is removed from mobile devices

Buy Now
Questions 14

A client cannot connect to the corporate web server. You discover a large number of half-open TCP connections to the server.

What should you do?

Options:

A.

Take action to stop the TCP SYN flood attack.

B.

Change the connection protocol from HTTP to HTTPS.

C.

Ignore the half-open connections because this is a normal part of the TCP three-way handshake.

D.

Flush the DNS cache information.

Buy Now
Questions 15

The company web server collects information through a form. The form is accessed by using port 80. The form content is transferred to an encrypted database for storage. You are investigating a complaint that the form content has been compromised.

What is the cause of the security breach?

Options:

A.

The database was compromised.

B.

The data was transferred to the database using a nonsecure protocol.

C.

The website was accessed using HTTP, which is an unencrypted protocol.

D.

The web browser used to access the site was not updated to the latest version.

Buy Now
Exam Code: 100-160
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
Last Update: Aug 14, 2025
Questions: 50

PDF + Testing Engine

$74.6  $186.49

Testing Engine

$59.8  $149.49
buy now 100-160 testing engine

PDF (Q&A)

$55  $137.49
buy now 100-160 pdf