Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 23,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 23,2025
Which of the following describes the purpose of a VPN (Virtual Private Network)?
- A . To improve network performance and reduce latency
- B . To segment a network into multiple smaller networks
- C . To provide secure remote access to a private network over the internet
- D . To control and filter network traffic based on predefined policies
What is the main difference between a public and a private network?
- A . Public networks are secured, while private networks are not
- B . Private networks are more expensive to set up than public networks
- C . Public networks use public IP addresses, while private networks use private IP addresses
- D . Private networks are accessible to the general public, while public networks are not
What is one of the ethical principles that guide the code of ethics for cybersecurity professionals?
- A . Impersonation
- B . Confidentiality
- C . Anonymity
- D . Discrimination
Which of the following best describes network security?
- A . Ensuring high availability and performance of the network
- B . Securing physical access to network devices
- C . Protecting data from unauthorized access or modifications
- D . Preventing network configuration errors
Which of the following is a characteristic of weak encryption algorithms?
- A . They support secure communication protocols.
- B . They are susceptible to cryptanalysis attacks.
- C . They are resistant to brute force attacks.
- D . They provide encryption keys with longer bit lengths.
What is the primary purpose of a VPN (Virtual Private Network)?
- A . To encrypt email communications
- B . To secure wireless network connections
- C . To establish a secure remote connection over a public network
- D . To protect against malware attacks
Which of the following involves dividing a network into smaller, more manageable segments?
- A . DHCP configuration
- B . IP addressing
- C . VLAN configuration
- D . Subnetting
Which of the following is a unique identifier assigned to a network interface card (NIC)?
- A . IP address
- B . Default gateway
- C . MAC address
- D . Subnet mask
Which protocol is used for communication between web browsers and web servers?
- A . ICMP
- B . TCP
- C . UDP
- D . HTTP
What is spear phishing?
- A . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.
- B . A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.
- C . A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive information.
- D . A type of phishing attack that targets specific individuals or organizations.