Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

100-160 Exam Dumps - Cisco Certified Support Technician (CCST) Cybersecurity

Searching for workable clues to ace the Cisco 100-160 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 100-160 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Full Access
Question # 10

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

Full Access
Question # 11

Which macOS security feature encrypts the entire macOS volume?

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Full Access
Question # 12

Your supervisor tells you that you will participate in a CVSS assessment.

What will you be doing?

A.

Performing penetration tests on internal network devices and end systems

B.

Analyzing host logs to identify abnormal activities

C.

Interviewing users to determine their level of cybersecurity awareness

D.

Evaluating end system security and scoring software vulnerabilities

Full Access
Question # 13

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

A.

An ownership policy for employees’ mobile devices

B.

A contingency plan

C.

A policy that requires multi-factor authentication to use the mobile device

D.

A policy to govern how ePHI is removed from mobile devices

Full Access
Question # 14

How do threat actors launch ransomware attacks on organizations?

A.

They implant malware to collect data from the corporation’s financial system.

B.

They deface an organization’s public-facing website.

C.

They lock data and deny access to the data until they receive money.

D.

They secretly spy on employees and collect employees’ personal information.

Full Access
Question # 15

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Full Access
Go to page: