Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 15 questions
Exam Code: 100-160                Update: Sep 14, 2025
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity

Cisco Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

You need to transfer configuration files to a router across an unsecured network.

Which protocol should you use to encrypt the files in transit?

A.

Telnet

B.

HTTP

C.

TFTP

D.

SSH

Question # 2

Which Windows app is a command-line interface that includes a sophisticated scripting language used to automate Windows tasks?

A.

PowerShell

B.

Microsoft Management Console

C.

Vim

D.

MS-DOS

Question # 3

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

A.

An ownership policy for employees’ mobile devices

B.

A contingency plan

C.

A policy that requires multi-factor authentication to use the mobile device

D.

A policy to govern how ePHI is removed from mobile devices

Question # 4

Which two passwords follow strong password policy guidelines?(Choose 2.)

A.

Wh@tareyouDo1ngtoday4

B.

Feb121978

C.

Fluffy#

D.

1mPressm3!

Question # 5

Which macOS security feature encrypts the entire macOS volume?

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Question # 6

Which encryption type is commonly used to secure WiFi networks?

A.

Data Encryption Standard (DES)

B.

Triple Data Encryption Algorithm (Triple DES)

C.

Advanced Encryption Algorithm (AES)

D.

RSA (Rivest–Shamir–Adleman)

Question # 7

Move each worm mitigation step from the list on the left to the correct description on the right.

Note: You will receive partial credit for each correct answer.

Question # 8

You are reviewing the Application log on a Windows computer. You see an event with an error-level message as shown.

What can you determine about the application that generated the event message?

A.

The application is currently running much slower than expected.

B.

The application experienced a significant problem that caused it to fail.

C.

The application recovered from an event without loss of functionality.

D.

The application loaded and ran successfully without issues.

Question # 9

You need to diagram an intrusion event by using the Diamond Model.

Move each event detail from the list on the left to the correct location in the diagram on the right.

Note: You will receive partial credit for each correct response.

Question # 10

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

A.

WAN management

B.

Authorization of users

C.

Integrity of data

D.

Authentication of users

E.

Confidentiality of information

F.

Password management

Page: 1 / 2
Total 15 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 14 Sep 2025