Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Cisco CCST 100-160 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 100-160 Premium Access

View all detail and faqs for the 100-160 exam


375 Students Passed

86% Average Score

97% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two basic metrics should be taken into consideration when assigning a severity to a vulnerability during an assessment?(Choose 2.)

Options:

A.

The likelihood that an adversary can and will exploit the vulnerability

B.

The impacts that an exploit of the vulnerability will have on the organization

C.

The time involved in choosing replacement software to replace older systems

D.

The age of the hardware running the software that contains the vulnerability

Questions # 2:

Which two passwords follow strong password policy guidelines?(Choose 2.)

Options:

A.

Wh@tareyouDo1ngtoday4

B.

Feb121978

C.

Fluffy#

D.

1mPressm3!

Questions # 3:

Which wireless security protocol provides the strongest protection for a home or small business network?

Options:

A.

WEP

B.

WPA

C.

WPA2 with AES

D.

WPA3

Questions # 4:

You need to transfer configuration files to a router across an unsecured network.

Which protocol should you use to encrypt the files in transit?

Options:

A.

Telnet

B.

HTTP

C.

TFTP

D.

SSH

Questions # 5:

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Question # 5

Options:

Questions # 6:

A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?

Options:

A.

Reset the affected user’s password and investigate the scope of compromise.

B.

Block all foreign IP addresses from accessing the network.

C.

Run a full vulnerability scan of the corporate network.

D.

Ignore the event unless it happens again.

Questions # 7:

For each statement, selectTrueif it is a common motivation to commit cyber attacks orFalseif it is not.

Note: You will receive partial credit for each correct selection.

Question # 7

Options:

Questions # 8:

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

Options:

A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

Questions # 9:

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

Options:

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Questions # 10:

How does sandboxing help with the analysis of malware?

Options:

A.

It defines the suspicious or malicious applications that should be blocked.

B.

It specifies the applications that are authorized for use on the network.

C.

It allows suspicious applications to run in a safe and isolated testing environment.

D.

It restricts traffic from passing from one network to another.

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.