Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 23,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 23,2025
Which of the following is an example of a private IP address?
- A . 169.254.0.1
- B . 203.0.113.0
- C . 172.16.0.0
- D . 198.51.100.0
Which of the following is a common security control measure used to protect applications from unauthorized access?
- A . File compression
- B . Biometric authentication
- C . Hard disk formatting
- D . Data anonymization
Which of the following is a common authentication protocol used in wireless networks?
- A . FTP
- B . WPA
- C . SSH
- D . SMTP
Which encryption method provides the highest level of security for a wireless SoHo network?
- A . WPA2
- B . WEP
- C . WPA
- D . TKIP
What is a digital certificate used for in the context of cybersecurity?
- A . Encrypting data
- B . Verifying the identity of an entity
- C . Creating a secure tunnel
- D . Decrypting data
Which of the following access control methods is the most secure?
- A . Biometric authentication
- B . Multi-factor authentication
- C . Single-factor authentication
- D . Password-based authentication
Which of the following is a common threat to cybersecurity?
- A . Software updates
- B . Data encryption
- C . User authentication
- D . Phishing attacks
Which protocol is used to assign IP addresses to devices on a network?
- A . ICMP
- B . DHCP
- C . UDP
- D . TCP
Which technology is responsible for managing cryptographic keys, digital certificates, and providing other security-related services?
- A . Intrusion Detection System (IDS)
- B . Virtual Private Network (VPN)
- C . Public Key Infrastructure (PKI)
- D . Firewall
What is a denial of service (DoS) attack?
- A . A technique used by attackers to obtain sensitive information through deception.
- B . A software program that is designed to damage, disrupt, or gain unauthorized access to a computer
system. - C . A form of cyber attack that attempts to gain unauthorized access to a network.
- D . An attack that overwhelms a target system with a flood of traffic or requests, rendering it inaccessible to legitimate users.