Cisco 100-140 Cisco Certified Support Technician (CCST) IT Support Online Training
Cisco 100-140 Online Training
The questions for 100-140 were last updated at Oct 20,2025.
- Exam Code: 100-140
- Exam Name: Cisco Certified Support Technician (CCST) IT Support
- Certification Provider: Cisco
- Latest update: Oct 20,2025
When installing new hardware inside a desktop computer, which safety measure should a technician take to avoid personal injury?
- A . Install the hardware as quickly as possible to reduce exposure to the internal components
- B . Ensure all power sources are disconnected and the area is well-lit
- C . Apply lubricant to screws to make installation easier and faster
- D . Wear gloves to protect against sharp edges inside the computer casing
A technician needs to check network cables in a tight and cluttered server room.
What safety precaution is most important to prevent accidents?
- A . Move quickly through the server room to minimize time spent in a confined space
- B . Use appropriate signage to indicate maintenance is in progress and secure loose cables before beginning work
- C . Bring additional lighting to use if the server room lighting is insufficient
- D . Keep all tools in a belt to avoid leaving them on the floor
What is the most important security measure to implement when using VNC to provide remote support to an end user’s device?
- A . Ensure the VNC session is configured to allow file transfers by default
- B . Use a strong, unique password for each VNC session and ensure it is encrypted
- C . Set the VNC viewer to fullscreen mode to better observe the user’s screen
- D . Allow the user to control the VNC session to maintain their autonomy
A Linux user is setting up a home server and needs to confirm their IPv6 address for proper configuration.
What command should the IT support technician recommend they use?
- A . sudo dhclient -6
- B . hostname -I
- C . ip -6 addr
- D . netstat -rn
During a VNC session, how should a technician respond if they need to access confidential files on the user’s computer to resolve an issue?
- A . Access the files without notifying the user, as they have already consented to the session
- B . Notify the user and request permission before accessing any confidential files
- C . Avoid accessing the files and ask the user to open them instead
- D . Record the session as evidence of the necessity for accessing confidential files
What is the best practice when an employee receives an email that appears to be from their bank asking for immediate verification of their login details?
- A . Reply directly to the email with the requested information to avoid account suspension
- B . Ignore the email as banks do not contact customers via email
- C . Contact the bank using a verified phone number to check the legitimacy of the request
- D . Forward the email to a colleague to get their opinion
An employee clicks on a link in an email that they later suspect to be a phishing attempt.
What is the first action they should take?
- A . Continue working and monitor the system for any unusual activity
- B . Immediately change all their passwords
- C . Disconnect their computer from the internet and report the incident to IT security
- D . Delete the email to prevent further risk
A user’s laptop that was encrypted with BitLocker has been recovered after being lost. The user does not remember the BitLocker password but has access to their Microsoft account.
What is the best next step to regain access to the laptop?
- A . Perform a system restore to remove BitLocker
- B . Use the BitLocker recovery key linked to their Microsoft account
- C . Reinstall the Windows operating system
- D . Reset the BIOS settings
During a routine security check, a user discovers they do not have a recorded BitLocker recovery key for their device.
What should they do first to ensure they can recover their system in the event of a lockout?
- A . Encrypt the drive again with BitLocker to generate a new key
- B . Back up their data to an external drive and disable BitLocker
- C . Use the BitLocker management tool to back up the recovery key
- D . Change the BitLocker password to reset the recovery key
A user is setting up BitLocker on a new laptop and needs to choose how to back up their recovery key.
Which option provides the safest backup method?
- A . Save the recovery key to a USB drive
- B . Store the recovery key in the cloud service provided by the laptop manufacturer
- C . Print the recovery key and store it in a secure location
- D . Send the recovery key to their email account