Month End Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Cisco Certified Support Technician (CCST) Cybersecurity Question and Answers

Cisco Certified Support Technician (CCST) Cybersecurity

Last Update Sep 26, 2025
Total Questions : 50

We are offering FREE 100-160 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 100-160 free exam questions and then go for complete pool of Cisco Certified Support Technician (CCST) Cybersecurity test questions that will help you more.

100-160 pdf

100-160 PDF

$40.25  $114.99
100-160 Engine

100-160 Testing Engine

$47.25  $134.99
100-160 PDF + Engine

100-160 PDF + Testing Engine

$61.25  $174.99
Questions 1

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

Options:

A.  

An ownership policy for employees’ mobile devices

B.  

A contingency plan

C.  

A policy that requires multi-factor authentication to use the mobile device

D.  

A policy to govern how ePHI is removed from mobile devices

Discussion 0
Questions 2

A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?

Options:

A.  

Reset the affected user’s password and investigate the scope of compromise.

B.  

Block all foreign IP addresses from accessing the network.

C.  

Run a full vulnerability scan of the corporate network.

D.  

Ignore the event unless it happens again.

Discussion 0
Questions 3

Which step should be performed immediately after identifying a critical vulnerability affecting internet-facing systems?

Options:

A.  

Document the vulnerability in the annual security report.

B.  

Apply the vendor patch or mitigation.

C.  

Schedule a quarterly penetration test.

D.  

Change the default administrator passwords.

Discussion 0
Questions 4

Which macOS security feature encrypts the entire macOS volume?

Options:

A.  

FileVault

B.  

Gatekeeper

C.  

System Integrity Protection (SIP)

D.  

XProtect

Discussion 0
Questions 5

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Options:

Discussion 0
Questions 6

Which two passwords follow strong password policy guidelines?(Choose 2.)

Options:

A.  

Wh@tareyouDo1ngtoday4

B.  

Feb121978

C.  

Fluffy#

D.  

1mPressm3!

Discussion 0
Questions 7

Which two basic metrics should be taken into consideration when assigning a severity to a vulnerability during an assessment?(Choose 2.)

Options:

A.  

The likelihood that an adversary can and will exploit the vulnerability

B.  

The impacts that an exploit of the vulnerability will have on the organization

C.  

The time involved in choosing replacement software to replace older systems

D.  

The age of the hardware running the software that contains the vulnerability

Discussion 0
Questions 8

You need to design your company’s password policy to adhere to the National Institute of Standards and Technology (NIST) guidelines for user password security.

What is the minimum password length that you should require to be consistent with the NIST guidelines?

Options:

A.  

4 characters

B.  

8 characters

C.  

16 characters

D.  

No minimum length

Discussion 0
Questions 9

You are reviewing your company’s disaster recovery plan.

Which two daily data backup actions should the plan include?(Choose 2.)

Options:

A.  

Back up the data to removable media and store it off-site.

B.  

Back up each department’s data to a separate local server.

C.  

Back up the data by using cloud services.

D.  

Back up the data by using RAID on a local external hard drive with a secondary power source.

Discussion 0
Questions 10

What is the main purpose of a disaster recovery plan as compared to a business continuity plan?

Options:

A.  

Limiting operational downtime.

B.  

Keeping the business open in some capacity during a disaster.

C.  

Restoring data access and an IT infrastructure as quickly as possible.

D.  

Allowing staff to continue to serve customers throughout a disaster.

Discussion 0
Questions 11

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

Options:

A.  

Port security

B.  

VLAN trunking

C.  

NAT

D.  

VPN

Discussion 0
Questions 12

Which data type is protected through hard disk encryption?

Options:

A.  

Data in process

B.  

Data in transit

C.  

Data in use

D.  

Data at rest

Discussion 0
Questions 13

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

Options:

A.  

Object access failure

B.  

Account logon failure

C.  

Account lockout success

D.  

Account logoff success

Discussion 0
Questions 14

You are going to perform a penetration test on a company LAN. As part of your preparation, you access the company’s websites, view webpage source code, and run internet searches to uncover domain information. You also use social media to gather details about the company and its employees.

Which type of reconnaissance activities are you performing?

Options:

A.  

Passive

B.  

Active

C.  

Offline

D.  

Invasive

Discussion 0
Questions 15

Move each scenario from the list on the left to the correct type of attacker on the right.

Note: You will receive partial credit for each correct answer.

Options:

Discussion 0