Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

100-160 Cisco Certified Support Technician (CCST) Cybersecurity Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 50 questions

You need to manage security risks at your company. In which order should you complete the actions?

Move all the actions to the answer area and place them in the correct order.

Which data type is protected through hard disk encryption?

A.

Data in process

B.

Data in transit

C.

Data in use

D.

Data at rest

Which two passwords follow strong password policy guidelines?(Choose 2.)

A.

Wh@tareyouDo1ngtoday4

B.

Feb121978

C.

Fluffy#

D.

1mPressm3!

An administrator wants to ensure that any files downloaded from the internet are automatically scanned for malicious code before execution. Which security control should be implemented?

A.

Host-based firewall

B.

Anti-malware with real-time protection

C.

VPN client

D.

Patch management system

Which Windows app is a command-line interface that includes a sophisticated scripting language used to automate Windows tasks?

A.

PowerShell

B.

Microsoft Management Console

C.

Vim

D.

MS-DOS

You are reviewing the Application log on a Windows computer. You see an event with an error-level message as shown.

What can you determine about the application that generated the event message?

A.

The application is currently running much slower than expected.

B.

The application experienced a significant problem that caused it to fail.

C.

The application recovered from an event without loss of functionality.

D.

The application loaded and ran successfully without issues.

You are reviewing your company’s disaster recovery plan.

Which two daily data backup actions should the plan include?(Choose 2.)

A.

Back up the data to removable media and store it off-site.

B.

Back up each department’s data to a separate local server.

C.

Back up the data by using cloud services.

D.

Back up the data by using RAID on a local external hard drive with a secondary power source.

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

You need to diagram an intrusion event by using the Diamond Model.

Move each event detail from the list on the left to the correct location in the diagram on the right.

Note: You will receive partial credit for each correct response.

Move each worm mitigation step from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

Move each definition from the list on the left to the correct CIA Triad term on the right.

Note: You will receive partial credit for each correct answer.

What is the main purpose of a disaster recovery plan as compared to a business continuity plan?

A.

Limiting operational downtime.

B.

Keeping the business open in some capacity during a disaster.

C.

Restoring data access and an IT infrastructure as quickly as possible.

D.

Allowing staff to continue to serve customers throughout a disaster.

You notice that a new CVE has been shared to an email group that you belong to.

What should you do first with the CVE?

A.

Look up details of the vulnerability to determine whether it applies to your network.

B.

Research measures to prevent the CVE from attacking the network.

C.

Record the CVE as part of the disaster recovery plan.

D.

Add the CVE to the firewall rules for your organization.

Which security assessment of IT systems verifies that PII data is available, accurate, confidential, and accessible only by authorized users?

A.

Risk framing

B.

Cyber Kill Chain

C.

Workflow management

D.

Information assurance

Which step should be performed immediately after identifying a critical vulnerability affecting internet-facing systems?

A.

Document the vulnerability in the annual security report.

B.

Apply the vendor patch or mitigation.

C.

Schedule a quarterly penetration test.

D.

Change the default administrator passwords.

Page: 1 / 1
Total 50 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved