Cisco 100-140 Practice Exams
Last updated on Apr 01,2025- Exam Code: 100-140
- Exam Name: Cisco Certified Support Technician (CCST) IT Support
- Certification Provider: Cisco
- Latest update: Apr 01,2025
During a phone support call, a user aggressively insists on bypassing standard verification processes due to urgency.
What is the appropriate response for the help desk technician?
- A . Comply with the request to avoid conflict
- B . Politely refuse and adhere to established verification procedures
- C . Transfer the call to a supervisor without verification
- D . Ask security questions unrelated to the user verification process to confuse the caller
A company wants to reduce its IT support costs without sacrificing service quality.
Which KPI would be most helpful in identifying potential cost-saving areas while maintaining service standards?
- A . Average handle time per ticket
- B . Total number of tickets received per month
- C . Ratio of escalated versus resolved tickets
- D . Cost per ticket
What is the correct protocol for handling a situation where a technician experiences a mild electrical shock while troubleshooting a laptop?
- A . Continue working if the shock was minor to avoid work delays
- B . Document the incident, report it according to workplace safety procedures, and seek medical advice
- C . Take a short break and then resume work if there are no visible injuries
- D . Apply an anti-static wrist strap and continue working on the laptop
An IT administrator needs to map Dropbox as a network drive for multiple users in a corporate environment to streamline their workflow.
What is an essential consideration when setting this up?
- A . Ensuring all users have unlimited internet bandwidth
- B . Making sure each user has individual Dropbox accounts
- C . Setting up continuous data backup for the mapped drive
- D . Ensuring the network drive mapping persists across reboots
When configuring Google Drive for a team that requires high data transfer rates and frequently accesses large files, what feature should IT support enable to optimize performance?
- A . Enable "Offline Access" for all files in Google Drive
- B . Turn on "Stream files" in Google Drive for desktop settings
- C . Increase the cache size of the local Google Drive folder
- D . Restrict file syncing to non-business hours only
While inspecting the IT department’s storage area, a technician discovers that power strips are daisy-chained together and are showing signs of wear.
What is the most appropriate safety action to take regarding fire prevention?
- A . Ignore the issue as it is common practice in busy IT departments
- B . Replace the worn power strips and ensure no power strips are daisy-chained together
- C . Cover the worn areas with electrical tape to prevent exposure
A technician is scheduled to replace a broken LCD screen on a laptop.
What is the most important safety procedure to follow before starting the repair?
- A . Work on a metal surface to keep the tools organized
- B . Disconnect the laptop from any power source and remove the battery
- C . Start by cleaning the broken screen with a wet cloth
- D . Test the broken screen one more time to ensure it is not functioning
What should a technician do first to ensure safety from electrostatic discharge when installing a new hard drive in a desktop computer?
- A . Insulate the work area with plastic sheets to prevent static build-up
- B . Use tools with insulated handles only
- C . Connect oneself to an anti-static mat where the computer will be placed
- D . Spray the area with anti-static spray before beginning the installation
A company is integrating Amazon S3 buckets for cloud storage and requires users to map these as a network drive on their local machines.
Which tool should IT support recommend for seamless integration and mapping?
- A . AWS Command Line Interface (CLI)
- B . Amazon S3 File Gateway
- C . AWS Storage Gateway
- D . Amazon DataSync
The IT department is implementing MFA for accessing the company’s VPN. The security policy mandates the use of a physical hardware token in addition to regular passwords.
What is the primary security benefit of using a hardware token for MFA in this scenario?
- A . It eliminates the need for a password
- B . It can be remotely updated by IT at any time
- C . It provides a physical object that must be possessed in order to authenticate
- D . It allows for an unlimited number of authentication attempts