Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 24,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 24,2025
Which of the following features help to secure a wireless SoHo network from unauthorized access?
- A . Default admin credentials
- B . Weak encryption
- C . MAC filtering
- D . SSID broadcast
What is the primary function of a server in a network infrastructure?
- A . Monitor network traffic
- B . Filter incoming and outgoing traffic
- C . Detect and prevent intrusions
- D . Store and manage files
Which encryption method uses a single key to both encrypt and decrypt data?
- A . SSL/TLS
- B . Symmetric encryption
- C . Hashing
- D . Asymmetric encryption
What is an attack vector in cybersecurity?
- A . The method used by an attacker to gain unauthorized access
- B . A vulnerability in a system that can be exploited
- C . The path or means through which an attacker can exploit vulnerabilities
- D . The likelihood of a cyber attack taking place
Which of the following is an example of a network vulnerability?
- A . Encrypting sensitive data
- B . Running outdated and unpatched software
- C . Using a strong password
- D . Implementing a firewall
Which of the following is NOT an essential security principle?
- A . Complexity
- B . Confidentiality
- C . Availability
- D . Integrity
Which technology is responsible for monitoring network traffic and identifying potential threats?
- A . IDS
- B . Firewall
- C . Server
- D . IPS
Which of the following best describes the concept of defense in depth in cybersecurity?
- A . Utilizing multiple layers of security controls to protect against different types of threats
- B . Running regular vulnerability scans to maintain the integrity of the system
- C . Implementing access controls to ensure availability of critical resources
- D . Encrypting sensitive data to maintain confidentiality
What is the general motivation behind an Advanced Persistent Threat (APT)?
- A . Publicity
- B . Random disruption
- C . Financial gain
- D . Revenge
What is a vulnerability in the context of cybersecurity?
- A . An advanced encryption algorithm
- B . A software bug that causes system crashes
- C . A weakness in a system that can be exploited by threats
- D . A security measure that prevents unauthorized access