Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 23,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 23,2025
What is the purpose of encryption in network security?
- A . To monitor and detect network attacks
- B . To authenticate and authorize users
- C . To protect the confidentiality and integrity of data during transmission
- D . To prevent unauthorized physical access to network devices
Which cryptographic technique is used to ensure the integrity of data without the ability to reverse the process?
- A . Hashing algorithm
- B . Digital signature
- C . Asymmetric encryption
- D . Symmetric encryption
What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?
- A . Honeypot
- B . Virtualization
- C . DMZ
- D . Proxy
Which of the following is an example of a web application vulnerability that can be exploited by an attacker?
- A . Network latency
- B . Disk fragmentation
- C . Buffer overflow
- D . Cross-site scripting (XSS)
What is encryption?
- A . A process of converting plaintext into binary code to enhance data accessibility
- B . A process of converting binary code into plaintext to improve data reliability
- C . A process of converting plaintext into ciphertext to protect data confidentiality
- D . A process of converting ciphertext into plaintext to secure data integrity
Which of the following is NOT a component of AAA?
- A . Authorization
- B . Accountability
- C . Authentication
- D . Accurate accounting
What is the purpose of implementing a firewall in a network?
- A . To scan and remove malware from network traffic
- B . To prevent unauthorized physical access to network devices
- C . To control and filter network traffic based on predetermined security policies
- D . To monitor network performance and troubleshoot issues
Which statement accurately describes the concept of a code of ethics in the cybersecurity field?
- A . A document that articulates ethical standards for cybersecurity professionals.
- B . A set of laws and regulations governing cybersecurity practices.
- C . A framework outlining the steps of a cybersecurity attack.
- D . A compilation of open-source tools for network security.
Which notation is used by IPv6?
- A . Decimal notation
- B . Octal notation
- C . Hexadecimal notation
- D . Binary notation
What are botnets?
- A . An attack that manipulates individuals into revealing sensitive information or performing certain actions.
- B . A network of compromised computers controlled by a central entity to carry out malicious activities.
- C . A form of cyber attack that attempts to gain unauthorized access to a network.
- D . A software program that is designed to damage, disrupt, or gain unauthorized access to a computer
system.