Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 23,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 23,2025
What is a common security threat in which an attacker attempts to overwhelm a targeted system by flooding it with Internet traffic?
- A . Ransomware
- B . Distributed Denial of Service (DDoS) attack
- C . Phishing
- D . SQL injection
Which of the following statements about multi-factor authentication (MFA) is correct?
- A . MFA is a security measure that requires users to provide two or more forms of identification to gain access to a system or application.
- B . MFA is a security measure that requires users to provide only one form of identification to gain access to a system or application
- C . MFA is a security measure that is no longer recommended due to its complexity and potential for user errors.
- D . MFA is a security measure that only applies to physical access control systems.
Which of the following services or protocols can be used to ensure the security and compliance of an organization’s network?
- A . NTP (Network Time Protocol)
- B . SNMP (Simple Network Management Protocol)
- C . DHCP (Dynamic Host Configuration Protocol)
- D . DNS (Domain Name System)
Which network security feature helps protect against unauthorized data access and ensures confidentiality of sensitive information?
- A . Firewall
- B . VPN
- C . Intrusion Detection System
- D . Antivirus
What is a key principle of securing data in the cloud?
- A . Implementing strong physical security measures
- B . Encrypting data at rest and in transit
- C . Using complex passwords for all cloud users
- D . Limiting access to the cloud from specific IP addresses
What is the purpose of a firewall in a network security system?
- A . To prevent unauthorized access to or from private networks
- B . To scan and filter network traffic for potential threats
- C . To encrypt data transmitted over the network
- D . To provide secure remote access to the network
Which of the following is true regarding the incident response process?
- A . It is a reactive process that is only initiated after an incident has occurred.
- B . It is a proactive process that focuses on preventing incidents from occurring.
- C . It is an iterative process that involves continuous improvement based on lessons learned.
- D . It is a one-time process that is only performed when an organization first establishes its security program.
Which of the following is true about security policies and procedures?
- A . They should be regularly reviewed and updated to reflect changing threats and technologies
- B . They should only be accessible to the IT department.
- C . They should be documented once and never changed.
- D . They should be kept confidential and not shared with employees.
Which of the following is a key requirement for conducting a security compliance audit?
- A . A comprehensive understanding of security compliance standards and regulations
- B . A certified auditor with expertise in security compliance
- C . Compliance monitoring tools and systems
- D . A detailed audit plan and checklist
Which of the following is a characteristic of a network-based firewall?
- A . Inspects and filters traffic at the application layer
- B . Operates at the data link layer
- C . Provides protection against external threats only
- D . Requires software installed on client devices