Cisco 100-160 Practice Exams
Last updated on Apr 07,2025- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Apr 07,2025
When ranking risks, which of the following factors should be considered?
- A . All of the above.
- B . The cost associated with mitigating a risk.
- C . The potential impact or consequences of a risk.
- D . The likelihood of a risk occurring.
What is a common vulnerability in Internet of Things (IoT) devices?
- A . All of the above.
- B . Lack of user access controls and authentication mechanisms.
- C . Weak encryption protocols used for data transmission.
- D . Insufficient physical security measures.
Which network security concept focuses on limiting network access based on user roles and responsibilities?
- A . Intrusion detection
- B . Access control
- C . Vulnerability scanning
- D . Network segmentation
Which of the following log file entries would most likely indicate a successful brute-force attack on an authentication system?
- A . "Password reset request from user ‘jane’ received and processed."
- B . "Successful login attempt from user ‘admin’ at 10:15:32."
- C . "Multiple failed login attempts from IP address 192.168.1.100 within a short time."
- D . "Failed login attempt from user ‘bob’ at 11:23:45 due to incorrect password."
Which of the following elements are part of cybersecurity incident response?
- A . Prevention, Monitoring, Compliance, Remediation
- B . Assessment, Authorization, Authentication, Accounting
- C . Identification, Recovery, Mitigation, Restoration
- D . Detection, Analysis, Containment, Eradication
Why is it important to regularly update software and firmware in a network or system?
- A . To patch known vulnerabilities and security flaws.
- B . To improve the performance of the network or system.
- C . To ensure compatibility with different devices.
- D . To prevent vulnerabilities from being discovered.
Which logging mechanism is associated with network devices such as routers, switches, and firewalls?
- A . Syslog
- B . Event Viewer
- C . System and application logs
- D . Audit logs
Which of the following best describes the concept of defense in depth in cybersecurity?
- A . Utilizing multiple layers of security controls to protect against different types of threats
- B . Running regular vulnerability scans to maintain the integrity of the system
- C . Implementing access controls to ensure availability of critical resources
- D . Encrypting sensitive data to maintain confidentiality
What is the primary goal of a threat actor in a cyber attack?
- A . To exploit vulnerabilities in a system
- B . To gain unauthorized access to a network
- C . To cause damage or disruption to a target
- D . To identify and mitigate security risks
Which of the following is the most secure and recommended method for storing sensitive user data in a database?
- A . Storing the data in plain text
- B . Using symmetric encryption
- C . Using hashing algorithms
- D . Using asymmetric encryption