Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 100-160 Practice Exam with Questions & Answers

Questions 1

You need a software solution that performs the following tasks:

    Compiles network data

    Logs information from many sources

    Provides orchestration in the form of case management

    Automates incident response workflows

What product should you use?

Options:
A.

SIEM

B.

SOAR

C.

NextGen IPS

D.

Snort

Cisco 100-160 Premium Access
Questions 2

Which security assessment of IT systems verifies that PII data is available, accurate, confidential, and accessible only by authorized users?

Options:
A.

Risk framing

B.

Cyber Kill Chain

C.

Workflow management

D.

Information assurance

Questions 3

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

Options:
A.

WAN management

B.

Authorization of users

C.

Integrity of data

D.

Authentication of users

E.

Confidentiality of information

F.

Password management

Questions 4

You need to manage security risks at your company. In which order should you complete the actions?

Move all the actions to the answer area and place them in the correct order.

100-160 Question 4

Options:
Questions 5

How do threat actors launch ransomware attacks on organizations?

Options:
A.

They implant malware to collect data from the corporation’s financial system.

B.

They deface an organization’s public-facing website.

C.

They lock data and deny access to the data until they receive money.

D.

They secretly spy on employees and collect employees’ personal information.

Questions 6

Which encryption type is commonly used to secure WiFi networks?

Options:
A.

Data Encryption Standard (DES)

B.

Triple Data Encryption Algorithm (Triple DES)

C.

Advanced Encryption Algorithm (AES)

D.

RSA (Rivest–Shamir–Adleman)

Questions 7

Which two basic metrics should be taken into consideration when assigning a severity to a vulnerability during an assessment?(Choose 2.)

Options:
A.

The likelihood that an adversary can and will exploit the vulnerability

B.

The impacts that an exploit of the vulnerability will have on the organization

C.

The time involved in choosing replacement software to replace older systems

D.

The age of the hardware running the software that contains the vulnerability

Questions 8

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

Options:
A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

Questions 9

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

Options:
A.

Configure the new router to filter IP addresses.

B.

Configure the SSID with broadcast disabled.

C.

Configure a higher signal strength to allow coverage in the parking lot.

D.

Configure the SSID with the same SSID used by the customer router.

Questions 10

Move each definition from the list on the left to the correct CIA Triad term on the right.

Note: You will receive partial credit for each correct answer.

100-160 Question 10

Options:
Exam Code: 100-160
Certification Provider: Cisco
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
Last Update: Sep 12, 2025
Questions: 50
PDF + Testing Engine
$174.99
$70
Testing Engine
$134.99
$54
PDF (Q&A)
$114.99
$46