Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 23,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 23,2025
Which network infrastructure component allows for the translation of domain names to IP addresses?
- A . Firewall
- B . Router
- C . DNS server
- D . DHCP server
What is malware?
- A . A form of cyber attack that attempts to gain unauthorized access to a network.
- B . A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system.
- C . A technique used by attackers to obtain sensitive information through deception.
- D . A network of compromised computers used to carry out coordinated attacks.
Which of the following encryption algorithms is considered strong?
- A . RSA
- B . MD5
- C . ROT13
- D . DES
Which of the following password policies is considered a best practice?
- A . Requiring passwords to be changed every 5 years
- B . Allowing users to set easily guessable passwords
- C . Enforcing a minimum password length and complexity requirements
- D . Storing passwords in plain text format
What does hardening mean in the context of cybersecurity?
- A . Removing all vulnerabilities from a system or network
- B . Implementing cybersecurity policies and regulations
- C . Creating a backup of critical data and configurations
- D . Making a system more resistant to threats and attacks
Which encryption method is used to secure data while it is being actively used and processed by an application?
- A . Asymmetric encryption
- B . Homomorphic encryption
- C . Secure Sockets Layer (SSL)
- D . Hash encryption
What type of encryption is used to secure data that is stored on a hard drive or other storage media?
- A . File-based encryption
- B . Hash encryption
- C . Symmetric encryption
- D . Public Key Infrastructure (PKI)
Which of the following is a characteristic of cloud-based applications in the context of cybersecurity?
- A . They provide enhanced flexibility and scalability for organizations.
- B . They are not widely used and are considered a less secure option.
- C . They require physical installation and maintenance, limiting their accessibility.
- D . They are typically more susceptible to cyber attacks compared to traditional on-premises
applications.
Which of the following is a characteristic of an IPv6 address?
- A . Uses colons as separators
- B . Can be represented by both decimal and binary notation
- C . Supports a maximum of 4.3 billion unique addresses
- D . Consists of 32 bits
Which of the following represents a technique used in Classless Inter-Domain Routing (CIDR)?
- A . Variable-length subnet masks
- B . Compressed MAC addresses
- C . Binary notation for IP addresses
- D . 32-bit IP addresses