Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 100-160 - Cisco Certified Support Technician (CCST) Cybersecurity

Page: 2 / 2
Total 50 questions

You need to diagram an intrusion event by using the Diamond Model.

Move each event detail from the list on the left to the correct location in the diagram on the right.

Note: You will receive partial credit for each correct response.

You are reviewing the Application log on a Windows computer. You see an event with an error-level message as shown.

What can you determine about the application that generated the event message?

A.

The application is currently running much slower than expected.

B.

The application experienced a significant problem that caused it to fail.

C.

The application recovered from an event without loss of functionality.

D.

The application loaded and ran successfully without issues.

Which data type is protected through hard disk encryption?

A.

Data in process

B.

Data in transit

C.

Data in use

D.

Data at rest

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

A.

WAN management

B.

Authorization of users

C.

Integrity of data

D.

Authentication of users

E.

Confidentiality of information

F.

Password management

A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP.

Which type of attack does this scenario describe?

A.

Reconnaissance

B.

Man-in-the-middle

C.

DDoS

D.

Ransomware