Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Exam Questions in PDF

Free Cisco 100-160 Dumps Questions (page: 2)

Why is it necessary to update firmware to the latest version?

  1. To support the latest operating systems and applications
  2. To patch firmware in the kernel of the operating system
  3. To correct security holes and weaknesses
  4. To explore new hardware features

Answer(s): C

Explanation:

According to the CCST Cybersecurity Study Guide, firmware updates are a critical security maintenance task because vulnerabilities in firmware can be exploited by attackers to gain persistent control over hardware.
"Keeping firmware up to date is necessary to patch security vulnerabilities and weaknesses that could be exploited by threat actors. Vendors release firmware updates to correct security flaws, enhance stability, and ensure compatibility with updated security protocols." (CCST Cybersecurity, Endpoint Security Concepts, System and Firmware Maintenance section, Cisco Networking Academy)
A is partially true but not the primary security reason for updates. B is incorrect because firmware is not part of the OS kernel; it's embedded in the hardware. C is correct: patching vulnerabilities in firmware is essential for endpoint protection. D may occur as a side benefit, but it's not the main reason from a cybersecurity perspective.



How do threat actors launch ransomware attacks on organizations?

  1. They implant malware to collect data from the corporation's financial system.
  2. They deface an organization's public-facing website.
  3. They lock data and deny access to the data until they receive money.
  4. They secretly spy on employees and collect employees' personal information.

Answer(s): C

Explanation:

The CCST Cybersecurity course describes ransomware as a form of malicious software that encrypts or locks access to an organization's data, demanding payment for its release. "Ransomware is a type of malware that denies access to data by encrypting it and demands payment from the victim to restore access. Threat actors may deliver ransomware through phishing emails, malicious downloads, or exploiting vulnerabilities in exposed systems." (CCST Cybersecurity, Essential Security Principles, Malware Types and Threats section, Cisco Networking Academy)
A describes spyware or information-stealing malware. B is website defacement, which is vandalism, not ransomware. C is correct: locking/encrypting data and demanding payment is the defining behavior of ransomware.
D is more aligned with insider threat or espionage activities.



Which macOS security feature encrypts the entire macOS volume?

  1. FileVault
  2. Gatekeeper
  3. System Integrity Protection (SIP)
  4. XProtect

Answer(s): A

Explanation:

The CCST Cybersecurity Study Guide highlights FileVault as the macOS full-disk encryption tool. "FileVault is macOS's built-in full-disk encryption feature. It encrypts the contents of the entire startup disk to help prevent unauthorized access to the information stored on the drive, even if the device is lost or stolen."
(CCST Cybersecurity, Endpoint Security Concepts, Disk Encryption section, Cisco Networking Academy)
A is correct: FileVault provides complete volume encryption. B (Gatekeeper) controls app installation by verifying code signatures. C (System Integrity Protection) protects system files from modification.

D (XProtect) is macOS's built-in malware detection system.



You are reviewing your company's disaster recovery plan.
Which two daily data backup actions should the plan include? (Choose 2.)

  1. Back up the data to removable media and store it off-site.
  2. Back up each department's data to a separate local server.
  3. Back up the data by using cloud services.
  4. Back up the data by using RAID on a local external hard drive with a secondary power source.

Answer(s): A,C

Explanation:

The CCST Cybersecurity Study Guide emphasizes that backups should be stored off-site or in the cloud to ensure recovery even if the primary location is damaged or compromised. "A comprehensive disaster recovery plan includes performing regular backups and ensuring copies are stored in locations not subject to the same physical risks as the primary site. Off-site storage and cloud-based backups provide resilience against local disasters." (CCST Cybersecurity, Essential Security Principles, Backup and Disaster Recovery section, Cisco Networking Academy)
A is correct: Off-site removable media ensures recovery even if the main site is destroyed. B is incorrect: Local-only backups are vulnerable to the same risks as production systems. C is correct: Cloud services provide geographically separate storage with automated redundancy. D is incorrect: RAID is for hardware fault tolerance, not a complete backup solution.



Which two passwords follow strong password policy guidelines? (Choose 2.)

  1. Wh@tareyouDo1ngtoday4
  2. Feb121978
  3. Fluffy#
  4. 1mPressm3!

Answer(s): A,D

Explanation:

The CCST Cybersecurity course defines a strong password as one that:
Is at least 8­12 characters long
Uses a mix of uppercase, lowercase, numbers, and symbols Avoids dictionary words, personal information, and predictable patterns

"Strong passwords combine length, complexity, and unpredictability, making them resistant to brute force and dictionary attacks."
(CCST Cybersecurity, Essential Security Principles, Authentication and Access Control section, Cisco Networking Academy)
A is correct: It's long, mixed case, includes numbers and symbols, and is not easily guessable. B is incorrect: It's based on a date, which is predictable. C is incorrect: Short and based on a dictionary word. D is correct: Uses complexity and length with leetspeak for added unpredictability.



Your home network seems to have slowed down considerably. You look at the home router GUI and notice that an unknown host is attached to the network.
What should you do to prevent this specific host from attaching to the network again?

  1. Create an IP access control list.
  2. Implement MAC address filtering.
  3. Block the host IP address.
  4. Change the network SSI

Answer(s): B

Explanation:

The CCST Cybersecurity course explains that MAC address filtering is a network access control method that allows only approved device hardware addresses to connect.
While not foolproof against spoofing, it can block a specific device from reconnecting to a small home network. "MAC address filtering restricts network access to devices whose unique hardware addresses are explicitly allowed. This can be used to block known unauthorized devices from reconnecting." (CCST Cybersecurity, Basic Network Security Concepts, Wireless Security Controls section, Cisco Networking Academy)
A is incorrect: IP ACLs are better for controlling traffic types, not blocking specific devices at the router level.
B is correct: It prevents the device's hardware address from reconnecting. C is temporary since the host can get a new IP via DHCP.

D may hide the network but will not stop a determined attacker who can still detect it.



HOTSPOT
For each statement, select True if it is a common motivation to commit cyber attacks or False if it is not.
Note: You will receive partial credit for each correct selection.

  1. See Explanation for the Answer.

Answer(s): A

Explanation:



The CCST Cybersecurity Study Guide outlines common motivations for cyberattacks, which include:
Financial gain
Revenge or personal grievance (e.g., disgruntled employees) Ideological or political purposes (hacktivism)
Espionage and intelligence gathering
"Cyberattack motivations range from financial and competitive advantage to personal vendettas and advancing political or social causes. Disgruntled insiders may misuse access privileges to harm an organization, while hacktivists target systems to promote social or political messages." (CCST Cybersecurity, Essential Security Principles, Threat Actor Motivations section, Cisco Networking Academy)
Being disgruntled at work common insider threat motivation (True) Wanting to protect personal data defensive action, not a reason to commit an attack (False) Wanting to advance a social agenda hacktivist motivation (True)



What should you create to prevent spoofing of the internal network?

  1. A NAT rule
  2. An ACL
  3. A record in the host file
  4. A DNS record

Answer(s): B

Explanation:

The CCST Cybersecurity Study Guide states that Access Control Lists (ACLs) can be used to filter traffic based on IP addresses and block packets that appear to originate from the internal network but arrive from external interfaces (IP spoofing).
"ACLs can prevent spoofing by dropping traffic from external sources that claim to have an internal source address. Configuring ACLs on the perimeter firewall or router is a common countermeasure for IP spoofing."
(CCST Cybersecurity, Basic Network Security Concepts, ACLs and Traffic Filtering section, Cisco Networking Academy)
A (NAT rule) changes IP addresses but does not inherently prevent spoofing. B (ACL) is correct because it can enforce anti-spoofing filters.
C (host file) only affects name resolution locally.
D (DNS record) is for domain mapping, not spoofing prevention.



Share your comments for Cisco 100-160 exam with other users:

O
OLERATO
7/1/2025 5:44:14 AM

great dumps to practice for the exam

A
Adekunle willaims
6/9/2025 7:37:29 AM

How reliable and relevant are these questions?? also i can see the last update here was January and definitely new questions would have emerged.

A
Alex
5/24/2025 12:54:15 AM

Can I trust to this source?

S
SPriyak
3/17/2025 11:08:37 AM

can you please provide the CBDA latest test preparation

C
Chandra
11/28/2024 7:17:38 AM

This is the best and only way of passing this exam as it is extremely hard. Good questions and valid dump.

S
Sunak
1/25/2025 9:17:57 AM

Can I use this dumps when I am taking the exam? I mean does somebody look what tabs or windows I have opened ?

F
Frank
2/15/2024 11:36:57 AM

Finally got a change to write this exam and pass it! Valid and accurate!

A
Anonymous User
2/2/2024 6:42:12 PM

Upload this exam please!

N
Nicholas
2/2/2024 6:17:08 PM

Thank you for providing these questions. It helped me a lot with passing my exam.

T
Timi
8/19/2023 5:30:00 PM

my first attempt

B
Blessious Phiri
8/13/2023 10:32:00 AM

very explainable

M
m7md ibrahim
5/26/2023 6:21:00 PM

i think answer of q 462 is variance analysis

T
Tehu
5/25/2023 12:25:00 PM

hi i need see questions

A
Ashfaq Nasir
1/17/2024 1:19:00 AM

best study material for exam

R
Roberto
11/27/2023 12:33:00 AM

very interesting repository

N
Nale
9/18/2023 1:51:00 PM

american history 1

T
Tanvi
9/27/2023 4:02:00 AM

good level of questions

B
Boopathy
8/17/2023 1:03:00 AM

i need this dump kindly upload it

S
s_123
8/12/2023 4:28:00 PM

do we need c# coding to be az204 certified

B
Blessious Phiri
8/15/2023 3:38:00 PM

excellent topics covered

M
Manasa
12/5/2023 3:15:00 AM

are these really financial cloud questions and answers, seems these are basic admin question and answers

N
Not Robot
5/14/2023 5:33:00 PM

are these comments real

K
kriah
9/4/2023 10:44:00 PM

please upload the latest dumps

E
ed
12/17/2023 1:41:00 PM

a company runs its workloads on premises. the company wants to forecast the cost of running a large application on aws. which aws service or tool can the company use to obtain this information? pricing calculator ... the aws pricing calculator is primarily used for estimating future costs

M
Muru
12/29/2023 10:23:00 AM

looks interesting

T
Tech Lady
10/17/2023 12:36:00 PM

thanks! that’s amazing

M
Mike
8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.

N
Nobody
9/18/2023 6:35:00 PM

q 14 should be dmz sever1 and notepad.exe why does note pad have a 443 connection

M
Muhammad Rawish Siddiqui
12/4/2023 12:17:00 PM

question # 108, correct answers are business growth and risk reduction.

E
Emmah
7/29/2023 9:59:00 AM

are these valid chfi questions

M
Mort
10/19/2023 7:09:00 PM

question: 162 should be dlp (b)

E
Eknath
10/4/2023 1:21:00 AM

good exam questions

N
Nizam
6/16/2023 7:29:00 AM

I have to say this is really close to real exam. Passed my exam with this.

P
poran
11/20/2023 4:43:00 AM

good analytics question

AI Tutor 👋 I’m here to help!