Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Exam Practice Test

Page: 1 / 5
Total 50 questions

Cisco Certified Support Technician (CCST) Cybersecurity Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$49  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$42  $119.99
Question 1

Your supervisor tells you that you will participate in a CVSS assessment.

What will you be doing?

Options:

A.

Performing penetration tests on internal network devices and end systems

B.

Analyzing host logs to identify abnormal activities

C.

Interviewing users to determine their level of cybersecurity awareness

D.

Evaluating end system security and scoring software vulnerabilities

Question 2

Move each definition from the list on the left to the correct CIA Triad term on the right.

Note: You will receive partial credit for each correct answer.

Options:

Question 3

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

Options:

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

Question 4

The company web server collects information through a form. The form is accessed by using port 80. The form content is transferred to an encrypted database for storage. You are investigating a complaint that the form content has been compromised.

What is the cause of the security breach?

Options:

A.

The database was compromised.

B.

The data was transferred to the database using a nonsecure protocol.

C.

The website was accessed using HTTP, which is an unencrypted protocol.

D.

The web browser used to access the site was not updated to the latest version.

Question 5

Which two basic metrics should be taken into consideration when assigning a severity to a vulnerability during an assessment?(Choose 2.)

Options:

A.

The likelihood that an adversary can and will exploit the vulnerability

B.

The impacts that an exploit of the vulnerability will have on the organization

C.

The time involved in choosing replacement software to replace older systems

D.

The age of the hardware running the software that contains the vulnerability

Question 6

You need to diagram an intrusion event by using the Diamond Model.

Move each event detail from the list on the left to the correct location in the diagram on the right.

Note: You will receive partial credit for each correct response.

Options:

Question 7

A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP.

Which type of attack does this scenario describe?

Options:

A.

Reconnaissance

B.

Man-in-the-middle

C.

DDoS

D.

Ransomware

Question 8

An employee accidentally sends an email containing sensitive corporate information to an external email address.

Which type of threat does this scenario describe?

Options:

A.

Logic bomb

B.

Malware

C.

Phishing

D.

Insider

Question 9

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Question 10

Which macOS security feature encrypts the entire macOS volume?

Options:

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Question 11

Which Windows app is a command-line interface that includes a sophisticated scripting language used to automate Windows tasks?

Options:

A.

PowerShell

B.

Microsoft Management Console

C.

Vim

D.

MS-DOS

Question 12

Move each NIST Incident Response Lifecycle phase from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

Options:

Question 13

An administrator wants to ensure that any files downloaded from the internet are automatically scanned for malicious code before execution. Which security control should be implemented?

Options:

A.

Host-based firewall

B.

Anti-malware with real-time protection

C.

VPN client

D.

Patch management system

Question 14

You notice that a new CVE has been shared to an email group that you belong to.

What should you do first with the CVE?

Options:

A.

Look up details of the vulnerability to determine whether it applies to your network.

B.

Research measures to prevent the CVE from attacking the network.

C.

Record the CVE as part of the disaster recovery plan.

D.

Add the CVE to the firewall rules for your organization.

Question 15

You need a software solution that performs the following tasks:

    Compiles network data

    Logs information from many sources

    Provides orchestration in the form of case management

    Automates incident response workflows

What product should you use?

Options:

A.

SIEM

B.

SOAR

C.

NextGen IPS

D.

Snort

Page: 1 / 5
Total 50 questions