Cisco 100-160 Cisco Certified Support Technician (CCST) Cybersecurity Online Training
Cisco 100-160 Online Training
The questions for 100-160 were last updated at Oct 24,2025.
- Exam Code: 100-160
- Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
- Certification Provider: Cisco
- Latest update: Oct 24,2025
What is an Advanced Persistent Threat (APT)?
- A . A vulnerability in network communication protocols.
- B . A cyberattack that compromises multiple devices simultaneously.
- C . A sophisticated and targeted attack that aims to gain unauthorized access and maintain persistence over a long period.
- D . A type of malware that spreads rapidly through a network.
What is an insider threat?
- A . A threat posed by an individual with authorized access to an organization’s systems and data.
- B . A vulnerability in an organization’s network infrastructure.
- C . The accidental disclosure of sensitive information.
- D . A security breach caused by an external attacker.
What is tailgating in the context of cybersecurity?
- A . A type of phishing attack that targets specific individuals or organizations.
- B . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.
- C . A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.
- D . A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive
information.
Which protocol uses encryption for secure remote access to network resources?
- A . Point-to-Point Protocol (PPP)
- B . Wireless Equivalent Privacy (WEP)
- C . Internet Protocol Security (IPSec)
- D . Secure Shell (SSH)
What is the purpose of using an application firewall in a cybersecurity setup?
- A . To encrypt network traffic between applications
- B . To perform vulnerability scanning of applications
- C . To increase the speed and performance of applications
- D . To block malicious incoming requests and attacks aimed at the application
Which of the following network technologies is commonly used to connect devices within a local area network (LAN)?
- A . Wi-Fi
- B . Ethernet
- C . DSL
- D . VPN
Which of the following is a key advantage of multifactor authentication?
- A . It allows for anonymous access to systems and resources.
- B . It simplifies the authentication process.
- C . It eliminates the need for strong passwords.
- D . It provides enhanced security by requiring multiple proofs of identity.
What is the primary characteristic of an Advanced Persistent Threat (APT) compared to traditional attacks?
- A . APTs are easily detectable by conventional security measures
- B . APTs involve persistent and prolonged attacks on specific targets
- C . APTs are random and indiscriminate in their targets
- D . APTs are primarily aimed at causing immediate damage to systems
What is smishing?
- A . A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.
- B . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.
- C . A type of phishing attack that targets specific individuals or organizations.
- D . A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive
information.
Which of the following represents a strong passphrase for securing a wireless SoHo network?
- A . 12345678
- B . P@ssword!
- C . CorrectHorseBatteryStaple
- D . jumpr0pe