Cisco 100-160 Practice Exams
Last updated on Apr 01,2025- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Apr 01,2025
What does the term "ad hoc" mean in the context of cybersecurity?
- A . A security assessment conducted by external auditors.
- B . A security incident response plan that is predefined and well-documented.
- C . A method of threat detection through continuous monitoring and analysis.
- D . A temporary or improvised solution in response to a specific situation or problem.
What is an Advanced Persistent Threat (APT)?
- A . A vulnerability in network communication protocols.
- B . A cyberattack that compromises multiple devices simultaneously.
- C . A sophisticated and targeted attack that aims to gain unauthorized access and maintain persistence over a long period.
- D . A type of malware that spreads rapidly through a network.
Which of the following involves dividing a network into smaller, more manageable segments?
- A . DHCP configuration
- B . IP addressing
- C . VLAN configuration
- D . Subnetting
Which technology is responsible for monitoring network traffic and identifying potential threats?
- A . IDS
- B . Firewall
- C . Server
- D . IPS
What is the purpose of vulnerability management in cybersecurity?
- A . To identify and address vulnerabilities in a timely manner.
- B . To transfer ownership of cybersecurity risks to third-party vendors.
- C . To assess the level of cybersecurity risk associated with a system or network.
- D . To mitigate the impact of cybersecurity incidents within an organization.
What is the primary advantage of using reputation-based detection as a threat intelligence technique?
- A . It provides real-time detection of zero-day threats.
- B . It helps block threats based on their historical behavior or reputation.
- C . It requires less computational resources compared to other techniques.
- D . It can detect new or emerging threats based on their behaviors.
Which of the following protocols can be used to securely transfer files over a network?
- A . HTTP
- B . FTP
- C . SMTP
- D . DNS
What is the purpose of multi-factor authentication?
- A . To provide multiple layers of security by requiring users to provide more than one form of identification
- B . To simplify the login process by only requiring one form of identification
- C . To restrict access to certain users by requiring additional authorization
- D . To prevent unauthorized access by encrypting user credentials
What term refers to the process of creating a virtual version of a device or resource, such as a server or a network?
- A . Virtualization
- B . DMZ
- C . Cloud
- D . Proxy
What is the primary reason for isolating an infected system from the network during malware removal?
- A . To prevent further spread of the malware
- B . To avoid interference with malware removal tools
- C . To stop the infected system from collecting sensitive information
- D . To prevent unauthorized access to the system