Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 23,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 23,2025
Which security feature provides network segmentation by creating virtual networks?
- A . VLANs
- B . VLANs
- C . Intrusion Prevention System (IPS)
- D . Virtual Private Network (VPN)
Which of the following is a network security device that operates at the session layer of the OSI model?
- A . Firewall
- B . Intrusion Detection System (IDS)
- C . Intrusion Prevention System (IPS)
- D . SSL/TLS
Which of the following is a feature of cloud computing?
- A . On-premises hosting
- B . Hardware provisioning
- C . Data encryption
- D . Physical server maintenance
Which security technology uses an agent-based approach to protect endpoints and is designed to detect and prevent malicious activities?
- A . Firewall
- B . Intrusion Prevention System (IPS)
- C . Data Loss Prevention (DLP)
- D . Advanced Malware Protection (AMP)
Which of the following is true regarding secure web gateways (SWG)?
- A . SWGs provide protection against malware and advanced threats
- B . SWGs are primarily used to secure internal web applications.
- C . SWGs are no longer necessary with the advent of cloud-based applications.
- D . SWGs can only be deployed on-premises
Which feature allows endpoints to communicate directly with each other, bypassing the network?
- A . Firewall
- B . IPS
- C . VPN
- D . Peer-to-Peer
Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users?
- A . Authentication
- B . Encryption
- C . Firewall
- D . Intrusion Detection System
Which of the following protocols can be used to securely transfer files over a network?
- A . HTTP
- B . FTP
- C . SMTP
- D . DNS
Which of the following is an example of a data security principle?
- A . Least Privilege
- B . Session Management
- C . ARP Spoofing
- D . Ciphertext
Which of the following is a common security threat that targets web applications?
- A . SQL injection
- B . DNS poisoning
- C . Man-in-the-middle attack
- D . Distributed Denial of Service (DDoS)