Cisco 100-160 Exam (page: 2)
Cisco Certified Support Technician (CCST) Cybersecurity
Updated on: 12-Feb-2026

Viewing Page 2 of 8

Why is it necessary to update firmware to the latest version?

  1. To support the latest operating systems and applications
  2. To patch firmware in the kernel of the operating system
  3. To correct security holes and weaknesses
  4. To explore new hardware features

Answer(s): C

Explanation:

According to the CCST Cybersecurity Study Guide, firmware updates are a critical security maintenance task because vulnerabilities in firmware can be exploited by attackers to gain persistent control over hardware.
"Keeping firmware up to date is necessary to patch security vulnerabilities and weaknesses that could be exploited by threat actors. Vendors release firmware updates to correct security flaws, enhance stability, and ensure compatibility with updated security protocols." (CCST Cybersecurity, Endpoint Security Concepts, System and Firmware Maintenance section, Cisco Networking Academy)
A is partially true but not the primary security reason for updates. B is incorrect because firmware is not part of the OS kernel; it's embedded in the hardware. C is correct: patching vulnerabilities in firmware is essential for endpoint protection. D may occur as a side benefit, but it's not the main reason from a cybersecurity perspective.



How do threat actors launch ransomware attacks on organizations?

  1. They implant malware to collect data from the corporation's financial system.
  2. They deface an organization's public-facing website.
  3. They lock data and deny access to the data until they receive money.
  4. They secretly spy on employees and collect employees' personal information.

Answer(s): C

Explanation:

The CCST Cybersecurity course describes ransomware as a form of malicious software that encrypts or locks access to an organization's data, demanding payment for its release. "Ransomware is a type of malware that denies access to data by encrypting it and demands payment from the victim to restore access. Threat actors may deliver ransomware through phishing emails, malicious downloads, or exploiting vulnerabilities in exposed systems." (CCST Cybersecurity, Essential Security Principles, Malware Types and Threats section, Cisco Networking Academy)
A describes spyware or information-stealing malware. B is website defacement, which is vandalism, not ransomware. C is correct: locking/encrypting data and demanding payment is the defining behavior of ransomware.
D is more aligned with insider threat or espionage activities.



Which macOS security feature encrypts the entire macOS volume?

  1. FileVault
  2. Gatekeeper
  3. System Integrity Protection (SIP)
  4. XProtect

Answer(s): A

Explanation:

The CCST Cybersecurity Study Guide highlights FileVault as the macOS full-disk encryption tool. "FileVault is macOS's built-in full-disk encryption feature. It encrypts the contents of the entire startup disk to help prevent unauthorized access to the information stored on the drive, even if the device is lost or stolen."
(CCST Cybersecurity, Endpoint Security Concepts, Disk Encryption section, Cisco Networking Academy)
A is correct: FileVault provides complete volume encryption. B (Gatekeeper) controls app installation by verifying code signatures. C (System Integrity Protection) protects system files from modification.

D (XProtect) is macOS's built-in malware detection system.



You are reviewing your company's disaster recovery plan.
Which two daily data backup actions should the plan include? (Choose 2.)

  1. Back up the data to removable media and store it off-site.
  2. Back up each department's data to a separate local server.
  3. Back up the data by using cloud services.
  4. Back up the data by using RAID on a local external hard drive with a secondary power source.

Answer(s): A,C

Explanation:

The CCST Cybersecurity Study Guide emphasizes that backups should be stored off-site or in the cloud to ensure recovery even if the primary location is damaged or compromised. "A comprehensive disaster recovery plan includes performing regular backups and ensuring copies are stored in locations not subject to the same physical risks as the primary site. Off-site storage and cloud-based backups provide resilience against local disasters." (CCST Cybersecurity, Essential Security Principles, Backup and Disaster Recovery section, Cisco Networking Academy)
A is correct: Off-site removable media ensures recovery even if the main site is destroyed. B is incorrect: Local-only backups are vulnerable to the same risks as production systems. C is correct: Cloud services provide geographically separate storage with automated redundancy. D is incorrect: RAID is for hardware fault tolerance, not a complete backup solution.



Which two passwords follow strong password policy guidelines? (Choose 2.)

  1. Wh@tareyouDo1ngtoday4
  2. Feb121978
  3. Fluffy#
  4. 1mPressm3!

Answer(s): A,D

Explanation:

The CCST Cybersecurity course defines a strong password as one that:
Is at least 8­12 characters long
Uses a mix of uppercase, lowercase, numbers, and symbols Avoids dictionary words, personal information, and predictable patterns

"Strong passwords combine length, complexity, and unpredictability, making them resistant to brute force and dictionary attacks."
(CCST Cybersecurity, Essential Security Principles, Authentication and Access Control section, Cisco Networking Academy)
A is correct: It's long, mixed case, includes numbers and symbols, and is not easily guessable. B is incorrect: It's based on a date, which is predictable. C is incorrect: Short and based on a dictionary word. D is correct: Uses complexity and length with leetspeak for added unpredictability.



Your home network seems to have slowed down considerably. You look at the home router GUI and notice that an unknown host is attached to the network.
What should you do to prevent this specific host from attaching to the network again?

  1. Create an IP access control list.
  2. Implement MAC address filtering.
  3. Block the host IP address.
  4. Change the network SSI

Answer(s): B

Explanation:

The CCST Cybersecurity course explains that MAC address filtering is a network access control method that allows only approved device hardware addresses to connect.
While not foolproof against spoofing, it can block a specific device from reconnecting to a small home network. "MAC address filtering restricts network access to devices whose unique hardware addresses are explicitly allowed. This can be used to block known unauthorized devices from reconnecting." (CCST Cybersecurity, Basic Network Security Concepts, Wireless Security Controls section, Cisco Networking Academy)
A is incorrect: IP ACLs are better for controlling traffic types, not blocking specific devices at the router level.
B is correct: It prevents the device's hardware address from reconnecting. C is temporary since the host can get a new IP via DHCP.

D may hide the network but will not stop a determined attacker who can still detect it.



HOTSPOT
For each statement, select True if it is a common motivation to commit cyber attacks or False if it is not.
Note: You will receive partial credit for each correct selection.

  1. See Explanation for the Answer.

Answer(s): A

Explanation:



The CCST Cybersecurity Study Guide outlines common motivations for cyberattacks, which include:
Financial gain
Revenge or personal grievance (e.g., disgruntled employees) Ideological or political purposes (hacktivism)
Espionage and intelligence gathering
"Cyberattack motivations range from financial and competitive advantage to personal vendettas and advancing political or social causes. Disgruntled insiders may misuse access privileges to harm an organization, while hacktivists target systems to promote social or political messages." (CCST Cybersecurity, Essential Security Principles, Threat Actor Motivations section, Cisco Networking Academy)
Being disgruntled at work common insider threat motivation (True) Wanting to protect personal data defensive action, not a reason to commit an attack (False) Wanting to advance a social agenda hacktivist motivation (True)



What should you create to prevent spoofing of the internal network?

  1. A NAT rule
  2. An ACL
  3. A record in the host file
  4. A DNS record

Answer(s): B

Explanation:

The CCST Cybersecurity Study Guide states that Access Control Lists (ACLs) can be used to filter traffic based on IP addresses and block packets that appear to originate from the internal network but arrive from external interfaces (IP spoofing).
"ACLs can prevent spoofing by dropping traffic from external sources that claim to have an internal source address. Configuring ACLs on the perimeter firewall or router is a common countermeasure for IP spoofing."
(CCST Cybersecurity, Basic Network Security Concepts, ACLs and Traffic Filtering section, Cisco Networking Academy)
A (NAT rule) changes IP addresses but does not inherently prevent spoofing. B (ACL) is correct because it can enforce anti-spoofing filters.
C (host file) only affects name resolution locally.
D (DNS record) is for domain mapping, not spoofing prevention.



Viewing Page 2 of 8



Share your comments for Cisco 100-160 exam with other users:

Luis Manuel 7/13/2023 9:30:00 PM

could you post the link
UNITED STATES


vijendra 8/18/2023 7:54:00 AM

hello send me dumps
Anonymous


Simeneh 7/9/2023 8:46:00 AM

it is very nice
Anonymous


john 11/16/2023 5:13:00 PM

i gave the amazon dva-c02 tests today and passed. very helpful.
Anonymous


Tao 11/20/2023 8:53:00 AM

there is an incorrect word in the problem statement. for example, in question 1, there is the word "speci c". this is "specific. in the other question, there is the word "noti cation". this is "notification. these mistakes make this site difficult for me to use.
Anonymous


patricks 10/24/2023 6:02:00 AM

passed my az-120 certification exam today with 90% marks. studied using the dumps highly recommended to all.
Anonymous


Ananya 9/14/2023 5:17:00 AM

i need it, plz make it available
UNITED STATES


JM 12/19/2023 2:41:00 PM

q47: intrusion prevention system is the correct answer, not patch management. by definition, there are no patches available for a zero-day vulnerability. the way to prevent an attacker from exploiting a zero-day vulnerability is to use an ips.
UNITED STATES


Ronke 8/18/2023 10:39:00 AM

this is simple but tiugh as well
Anonymous


CesarPA 7/12/2023 10:36:00 PM

questão 4, segundo meu compilador local e o site https://www.jdoodle.com/online-java-compiler/, a resposta correta é "c" !
UNITED STATES


Jeya 9/13/2023 7:50:00 AM

its very useful
INDIA


Tracy 10/24/2023 6:28:00 AM

i mastered my skills and aced the comptia 220-1102 exam with a score of 920/1000. i give the credit to for my success.
Anonymous


James 8/17/2023 4:33:00 PM

real questions
UNITED STATES


Aderonke 10/23/2023 1:07:00 PM

very helpful assessments
UNITED KINGDOM


Simmi 8/24/2023 7:25:00 AM

hi there, i would like to get dumps for this exam
AUSTRALIA


johnson 10/24/2023 5:47:00 AM

i studied for the microsoft azure az-204 exam through it has 100% real questions available for practice along with various mock tests. i scored 900/1000.
GERMANY


Manas 9/9/2023 1:48:00 AM

please upload 1z0-1072-23 exam dups
UNITED STATES


SB 9/12/2023 5:15:00 AM

i was hoping if you could please share the pdf as i’m currently preparing to give the exam.
Anonymous


Jagjit 8/26/2023 5:01:00 PM

i am looking for oracle 1z0-116 exam
UNITED STATES


S Mallik 11/27/2023 12:32:00 AM

where we can get the answer to the questions
Anonymous


PiPi Li 12/12/2023 8:32:00 PM

nice questions
NETHERLANDS


Dan 8/10/2023 4:19:00 PM

question 129 is completely wrong.
UNITED STATES


gayathiri 7/6/2023 12:10:00 AM

i need dump
UNITED STATES


Deb 8/15/2023 8:28:00 PM

love the site.
UNITED STATES


Michelle 6/23/2023 4:08:00 AM

can you please upload it back?
Anonymous


Ajay 10/3/2023 12:17:00 PM

could you please re-upload this exam? thanks a lot!
Anonymous


him 9/30/2023 2:38:00 AM

great about shared quiz
Anonymous


San 11/14/2023 12:46:00 AM

goood helping
Anonymous


Wang 6/9/2022 10:05:00 PM

pay attention to questions. they are very tricky. i waould say about 80 to 85% of the questions are in this exam dump.
UNITED STATES


Mary 5/16/2023 4:50:00 AM

wish you would allow more free questions
Anonymous


thomas 9/12/2023 4:28:00 AM

great simulation
Anonymous


Sandhya 12/9/2023 12:57:00 AM

very g inood
Anonymous


Agathenta 12/16/2023 1:36:00 PM

q35 should be a
Anonymous


MD. SAIFUL ISLAM 6/22/2023 5:21:00 AM

sap c_ts450_2021
Anonymous