Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 100-160 - Cisco Certified Support Technician (CCST) Cybersecurity

Page: 1 / 2
Total 50 questions

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

A client cannot connect to the corporate web server. You discover a large number of half-open TCP connections to the server.

What should you do?

A.

Take action to stop the TCP SYN flood attack.

B.

Change the connection protocol from HTTP to HTTPS.

C.

Ignore the half-open connections because this is a normal part of the TCP three-way handshake.

D.

Flush the DNS cache information.

Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?

A.

IDS

B.

IPS

C.

Proxy Server

D.

Honeypot

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

What is the primary purpose of running a vulnerability scan on your network?

A.

To identify and document the locations of customer and financial databases

B.

To automatically prioritize security weaknesses for immediate remediation

C.

To determine whether systems are subject to CVEs that could be exploited by adversaries

D.

To correlate event logs on multiple servers in order to generate intrusion alerts

Move each definition from the list on the left to the correct CIA Triad term on the right.

Note: You will receive partial credit for each correct answer.

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

A.

An ownership policy for employees’ mobile devices

B.

A contingency plan

C.

A policy that requires multi-factor authentication to use the mobile device

D.

A policy to govern how ePHI is removed from mobile devices

Which encryption type is commonly used to secure WiFi networks?

A.

Data Encryption Standard (DES)

B.

Triple Data Encryption Algorithm (Triple DES)

C.

Advanced Encryption Algorithm (AES)

D.

RSA (Rivest–Shamir–Adleman)

A remote worker is visiting a branch office to attend face-to-face meetings. The worker tries to associate their company laptop with the branch wireless access point (WAP) but is unable to do so.

What is a possible cause?

A.

The SSID is not broadcasting.

B.

The WAP is configured for MAC address filtering.

C.

The IP address of the laptop is not correct.

D.

The WAP is using open authentication.

You need to manage security risks at your company. In which order should you complete the actions?

Move all the actions to the answer area and place them in the correct order.