The 100-160 dumps available at DumpsBase offer the latest questions and answers for your Cisco Certified Support Technician (CCST) Cybersecurity exam preparation. Our 100-160 exam dumps (V8.02), endorsed by experts, facilitate a seamless journey toward your Cisco certification objectives. Benefit f...
Cisco Certified Support Technician (CCST)
Cybersecurity
,1.What is a common security threat in which an attacker attempts to overwhelm a
targeted system by flooding it with Internet traffic?
A. Ransomware
B. Distributed Denial of Service (DDoS) attack
C. Phishing
D. SQL injection
Answer: B
Explanation:
Option 1: Ransomware is a type of malicious software that encrypts a victim's files
and demands a ransom in exchange for the decryption key. While it can cause
damage to systems, it is not specifically designed to overwhelm a system with
Internet traffic.
Option 2: Correct. A Distributed Denial of Service (DDoS) attack is a common security
m
xa
threat in which an attacker attempts to overwhelm a targeted system by flooding it
E
with Internet traffic. This can result in a loss of service availability for legitimate users.
0
16
0-
Option 3: Phishing is a type of social engineering attack in which an attacker
10
masquerades as a trustworthy entity to trick individuals into providing sensitive
co
is
information. It does not involve overwhelming a system with Internet traffic.
C
g
Option 4: SQL injection is a type of web application attack in which an attacker
n
si
as
manipulates a SQL query to gain unauthorized access to a database. It does not
P
involve overwhelming a system with Internet traffic.
r
fo
es
rc
ou
es
2.Which of the following statements about multi-factor authentication (MFA) is
R
e
correct?
bl
ia
A. MFA is a security measure that requires users to provide two or more forms of
el
-R
identification to gain access to a system or application.
)
02
B. MFA is a security measure that requires users to provide only one form of
8.
(V
identification to gain access to a system or application
ps
um
C. MFA is a security measure that is no longer recommended due to its complexity
D
and potential for user errors.
0
16
D. MFA is a security measure that only applies to physical access control systems.
0-
10
Answer: A
Explanation:
Option 1: This is the correct statement. MFThis is a security measure that requires
users to provide two or more forms of identification to gain access to a system or
application. It adds an extra layer of security by combining multiple credentials, such
as passwords, one-time passcodes, biometrics, or smart cards, to verify a user's
identity.
Option 2: This statement is incorrect. MFA requires users to provide two or more
forms of identification, not just one.
Option 3: This statement is incorrect. MFThis is still recommended as an effective
security measure and is widely used in many industries.
,Option 4: This statement is incorrect. MFA can be used for both physical and logical
access control systems.
3.Which of the following services or protocols can be used to ensure the security and
compliance of an organization's network?
A. NTP (Network Time Protocol)
B. SNMP (Simple Network Management Protocol)
C. DHCP (Dynamic Host Configuration Protocol)
D. DNS (Domain Name System)
Answer: B
Explanation:
Option 1: NTP is a protocol used to synchronize the clocks of computers in a network.
m
xa
While it is important for maintaining accurate time, it does not directly contribute to
E
network security and compliance. This makes it an incorrect answer.
0
16
0-
Option 2: SNMP is a protocol used for managing and monitoring network devices. It
10
allows for centralized monitoring, troubleshooting, and configuration of devices.
co
is
SNMP can play a crucial role in security and compliance by providing real-time
C
g
information about network devices and their behaviors. This makes it a correct
n
si
as
answer.
P
Option 3: DHCP is a protocol used to assign IP addresses and network configuration
r
fo
es
parameters to devices on a network. While DHCP is essential for network
rc
connectivity, it does not directly contribute to security and compliance. This makes it
ou
es
an incorrect answer.
R
e
Option 4: DNS is a protocol used to translate domain names into IP addresses. While
bl
ia
DNS is critical for internet connectivity, it does not directly contribute to security and
el
-R
compliance. This makes it an incorrect answer.
)
02
8.
(V
ps
um
4.Which network security feature helps protect against unauthorized data access and
D
ensures confidentiality of sensitive information?
0
16
A. Firewall
0-
10
B. VPN
C. Intrusion Detection System
D. Antivirus
Answer: B
Explanation:
Option 1: Incorrect. A firewall is responsible for controlling incoming and outgoing
network traffic based on predetermined security rules. While it can help protect
against unauthorized access, it does not specifically ensure confidentiality of sensitive
information.
Option 2: Correct. A VPN (Virtual Private Network) creates a secure, encrypted
connection between a user's device and a private network, such as a corporate
, network, over the internet. This helps protect against unauthorized data access and
ensures the confidentiality of sensitive information.
Option 3: Incorrect. An Intrusion Detection System (IDS) monitors network traffic for
suspicious activity or known attack patterns.
While it can help detect and alert to potential unauthorized access attempts, it does
not specifically ensure confidentiality of sensitive information.
Option 4: Incorrect. An antivirus software is used to detect, prevent, and remove
malware infections. While it can help protect against unauthorized access, it does not
specifically ensure confidentiality of sensitive information.
5.What is a key principle of securing data in the cloud?
A. Implementing strong physical security measures
m
xa
B. Encrypting data at rest and in transit
E
C. Using complex passwords for all cloud users
0
16
0-
D. Limiting access to the cloud from specific IP addresses
10
Answer: B
co
is
Explanation:
C
g
Option 1: Incorrect. Implementing strong physical security measures is important, but
n
si
as
it is not the key principle of securing data in the cloud.
P
Option 2: Correct. Encrypting data at rest and in transit is a key principle of securing
r
fo
es
data in the cloud. This ensures that even if the data is compromised, it cannot be
rc
accessed without the decryption key.
ou
es
Option 3: Incorrect. Using complex passwords is a good security practice, but it is not
R
e
the key principle of securing data in the cloud.
bl
ia
Option 4: Incorrect. Limiting access to the cloud from specific IP addresses is a
el
-R
security measure, but it is not the key principle of securing data in the cloud.
)
02
8.
(V
ps
um
6.What is the purpose of a firewall in a network security system?
D
A. To prevent unauthorized access to or from private networks
0
16
B. To scan and filter network traffic for potential threats
0-
10
C. To encrypt data transmitted over the network
D. To provide secure remote access to the network
Answer: A
Explanation:
Option 1: Correct. A firewall is designed to prevent unauthorized access to or from
private networks by monitoring and controlling network traffic based on predetermined
security rules.
Option 2: Incorrect. While a firewall can scan and filter network traffic for potential
threats, this is not its primary purpose.
Option 3: Incorrect. While encryption may be a feature of some firewalls, it is not the
primary purpose of a firewall in a network security system.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller greencheryl. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $0.00. You're not tied to anything after your purchase.