Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

100-160 Exam Dumps - Cisco CCST Questions and Answers

Question # 4

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

Options:

A.

WAN management

B.

Authorization of users

C.

Integrity of data

D.

Authentication of users

E.

Confidentiality of information

F.

Password management

Buy Now
Question # 5

You are reviewing your company’s disaster recovery plan.

Which two daily data backup actions should the plan include?(Choose 2.)

Options:

A.

Back up the data to removable media and store it off-site.

B.

Back up each department’s data to a separate local server.

C.

Back up the data by using cloud services.

D.

Back up the data by using RAID on a local external hard drive with a secondary power source.

Buy Now
Question # 6

A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?

Options:

A.

Reset the affected user’s password and investigate the scope of compromise.

B.

Block all foreign IP addresses from accessing the network.

C.

Run a full vulnerability scan of the corporate network.

D.

Ignore the event unless it happens again.

Buy Now
Question # 7

Which encryption type is commonly used to secure WiFi networks?

Options:

A.

Data Encryption Standard (DES)

B.

Triple Data Encryption Algorithm (Triple DES)

C.

Advanced Encryption Algorithm (AES)

D.

RSA (Rivest–Shamir–Adleman)

Buy Now
Question # 8

You need to design your company’s password policy to adhere to the National Institute of Standards and Technology (NIST) guidelines for user password security.

What is the minimum password length that you should require to be consistent with the NIST guidelines?

Options:

A.

4 characters

B.

8 characters

C.

16 characters

D.

No minimum length

Buy Now
Question # 9

A client cannot connect to the corporate web server. You discover a large number of half-open TCP connections to the server.

What should you do?

Options:

A.

Take action to stop the TCP SYN flood attack.

B.

Change the connection protocol from HTTP to HTTPS.

C.

Ignore the half-open connections because this is a normal part of the TCP three-way handshake.

D.

Flush the DNS cache information.

Buy Now
Question # 10

An employee accidentally sends an email containing sensitive corporate information to an external email address.

Which type of threat does this scenario describe?

Options:

A.

Logic bomb

B.

Malware

C.

Phishing

D.

Insider

Buy Now
Question # 11

You need to manage security risks at your company. In which order should you complete the actions?

Move all the actions to the answer area and place them in the correct order.

Options:

Buy Now
Question # 12

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Buy Now
Question # 13

You are going to perform a penetration test on a company LAN. As part of your preparation, you access the company’s websites, view webpage source code, and run internet searches to uncover domain information. You also use social media to gather details about the company and its employees.

Which type of reconnaissance activities are you performing?

Options:

A.

Passive

B.

Active

C.

Offline

D.

Invasive

Buy Now
Exam Code: 100-160
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
Last Update: Aug 17, 2025
Questions: 50
100-160 pdf

100-160 PDF

$33.25  $94.99
100-160 Engine

100-160 Testing Engine

$38.5  $109.99
100-160 PDF + Engine

100-160 PDF + Testing Engine

$50.75  $144.99