Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

100-160 Exam Dumps - Cisco Certified Support Technician (CCST) Cybersecurity

Go to page:
Question # 9

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Full Access
Question # 10

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

Full Access
Question # 11

Which macOS security feature encrypts the entire macOS volume?

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Full Access
Question # 12

Your supervisor tells you that you will participate in a CVSS assessment.

What will you be doing?

A.

Performing penetration tests on internal network devices and end systems

B.

Analyzing host logs to identify abnormal activities

C.

Interviewing users to determine their level of cybersecurity awareness

D.

Evaluating end system security and scoring software vulnerabilities

Full Access
Question # 13

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

A.

An ownership policy for employees’ mobile devices

B.

A contingency plan

C.

A policy that requires multi-factor authentication to use the mobile device

D.

A policy to govern how ePHI is removed from mobile devices

Full Access
Question # 14

How do threat actors launch ransomware attacks on organizations?

A.

They implant malware to collect data from the corporation’s financial system.

B.

They deface an organization’s public-facing website.

C.

They lock data and deny access to the data until they receive money.

D.

They secretly spy on employees and collect employees’ personal information.

Full Access
Question # 15

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Full Access
Go to page: