Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 24,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 24,2025
Which of the following best describes social engineering?
- A . A method of manipulating individuals to disclose sensitive information
- B . A type of malware attack
- C . A physical security control
- D . A network security protocol
Which of the following is an integral part of the CIA triad in cybersecurity?
- A . Data loss prevention (DLP)
- B . Two-factor authentication (2FA)
- C . Intrusion Detection System (IDS)
- D . Firewall
What term refers to the process of creating a virtual version of a device or resource, such as a server or a network?
- A . Virtualization
- B . DMZ
- C . Cloud
- D . Proxy
Which of the following best describes the concept of data integrity in cybersecurity?
- A . Ensuring data is available for authorized users when needed
- B . Encrypting data to prevent unauthorized modifications
- C . Protecting data from unauthorized access or disclosure
- D . Ensuring data is accurate, consistent, and trustworthy
Which malicious activity is NOT typically associated with cyber attacks?
- A . Phishing
- B . Malware
- C . Data encryption
- D . Denial of Service (DoS)
What is a man-in-the-middle attack?
- A . An attack that intercepts and manipulates communication between two parties.
- B . An attack that exploits vulnerabilities in a device’s software.
- C . An attack that targets Internet of Things devices.
- D . An attack where an insider intentionally releases sensitive information.
Which of the following best describes an Advanced Persistent Threat (APT)?
- A . An unintentional and harmless interaction with a computer system
- B . A security incident caused by human error or negligence
- C . A targeted cyber attack that aims to gain unauthorized access to sensitive information
- D . A type of malware designed to disrupt computer networks
Which of the following is an example of multifactor authentication?
- A . Using a fingerprint scan only
- B . Using a biometric scan and a passcode
- C . Using a username and password only
- D . Using a smart card and a PIN
Which type of encryption protects data while it is being transmitted over a network?
- A . Transport Layer Security (TLS)
- B . Asymmetric encryption
- C . Symmetric encryption
- D . Hash encryption
Which network security concept focuses on limiting network access based on user roles and responsibilities?
- A . Intrusion detection
- B . Access control
- C . Vulnerability scanning
- D . Network segmentation