Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

100-160 Sample Questions Answers

Questions 4

Move each definition from the list on the left to the correct CIA Triad term on the right.

Note: You will receive partial credit for each correct answer.

Options:

Buy Now
Questions 5

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Options:

Buy Now
Questions 6

What is the main purpose of a disaster recovery plan as compared to a business continuity plan?

Options:

A.

Limiting operational downtime.

B.

Keeping the business open in some capacity during a disaster.

C.

Restoring data access and an IT infrastructure as quickly as possible.

D.

Allowing staff to continue to serve customers throughout a disaster.

Buy Now
Questions 7

Which encryption type is commonly used to secure WiFi networks?

Options:

A.

Data Encryption Standard (DES)

B.

Triple Data Encryption Algorithm (Triple DES)

C.

Advanced Encryption Algorithm (AES)

D.

RSA (Rivest–Shamir–Adleman)

Buy Now
Questions 8

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

Options:

A.

An ownership policy for employees’ mobile devices

B.

A contingency plan

C.

A policy that requires multi-factor authentication to use the mobile device

D.

A policy to govern how ePHI is removed from mobile devices

Buy Now
Questions 9

Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?

Options:

A.

IDS

B.

IPS

C.

Proxy Server

D.

Honeypot

Buy Now
Questions 10

Which macOS security feature encrypts the entire macOS volume?

Options:

A.

FileVault

B.

Gatekeeper

C.

System Integrity Protection (SIP)

D.

XProtect

Buy Now
Questions 11

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

Options:

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Buy Now
Questions 12

How do threat actors launch ransomware attacks on organizations?

Options:

A.

They implant malware to collect data from the corporation’s financial system.

B.

They deface an organization’s public-facing website.

C.

They lock data and deny access to the data until they receive money.

D.

They secretly spy on employees and collect employees’ personal information.

Buy Now
Questions 13

Which two passwords follow strong password policy guidelines?(Choose 2.)

Options:

A.

Wh@tareyouDo1ngtoday4

B.

Feb121978

C.

Fluffy#

D.

1mPressm3!

Buy Now
Questions 14

An employee accidentally sends an email containing sensitive corporate information to an external email address.

Which type of threat does this scenario describe?

Options:

A.

Logic bomb

B.

Malware

C.

Phishing

D.

Insider

Buy Now
Questions 15

Your company is creating a BYOD policy to allow employees to join their personal smartphones to the company network.

Which three requirements are commonly included in a BYOD policy?(Choose 3.)

Options:

A.

Deletion of all personal data from the phone

B.

Synchronization of phone lock screen password with network access password

C.

Encryption of stored confidential corporate data

D.

Configuration of a strong password

E.

Upgrade of data plan to maximum available

F.

Installation of secure apps only

Buy Now
Exam Code: 100-160
Exam Name: Cisco Certified Support Technician (CCST) Cybersecurity
Last Update: Aug 14, 2025
Questions: 50
$61.25  $174.99
$47.25  $134.99
$40.25  $114.99
buy now 100-160