Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

100-160 Exam Dumps - Cisco Certified Support Technician (CCST) Cybersecurity

Searching for workable clues to ace the Cisco 100-160 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 100-160 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 4

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

A.

Object access failure

B.

Account logon failure

C.

Account lockout success

D.

Account logoff success

Full Access
Question # 5

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

Full Access
Question # 6

What is the primary purpose of running a vulnerability scan on your network?

A.

To identify and document the locations of customer and financial databases

B.

To automatically prioritize security weaknesses for immediate remediation

C.

To determine whether systems are subject to CVEs that could be exploited by adversaries

D.

To correlate event logs on multiple servers in order to generate intrusion alerts

Full Access
Question # 7

You need to diagram an intrusion event by using the Diamond Model.

Move each event detail from the list on the left to the correct location in the diagram on the right.

Note: You will receive partial credit for each correct response.

Full Access
Question # 8

An administrator wants to ensure that any files downloaded from the internet are automatically scanned for malicious code before execution. Which security control should be implemented?

A.

Host-based firewall

B.

Anti-malware with real-time protection

C.

VPN client

D.

Patch management system

Full Access
Go to page: