Pass4Future also provide interactive practice exam software for preparing Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Exam effectively. You are welcome to explore sample free Cisco 100-160 Exam questions below and also try Cisco 100-160 Exam practice test software.
Do you know that you can access more real Cisco 100-160 exam questions via Premium Access? ()
You are reviewing your company's disaster recovery plan.
Which two daily data backup actions should the plan include? (Choose 2.)
Answer : A, C
The CCST Cybersecurity Study Guide emphasizes that backups should be stored off-site or in the cloud to ensure recovery even if the primary location is damaged or compromised.
'A comprehensive disaster recovery plan includes performing regular backups and ensuring copies are stored in locations not subject to the same physical risks as the primary site. Off-site storage and cloud-based backups provide resilience against local disasters.'
(CCST Cybersecurity, Essential Security Principles, Backup and Disaster Recovery section, Cisco Networking Academy)
A is correct: Off-site removable media ensures recovery even if the main site is destroyed.
B is incorrect: Local-only backups are vulnerable to the same risks as production systems.
C is correct: Cloud services provide geographically separate storage with automated redundancy.
D is incorrect: RAID is for hardware fault tolerance, not a complete backup solution.
Which step should be performed immediately after identifying a critical vulnerability affecting internet-facing systems?
Answer : B
The CCST Cybersecurity Study Guide states that after confirming a vulnerability is relevant and critical, the next step is to apply available patches or mitigations as soon as possible to reduce the attack surface.
'When a critical vulnerability is identified, remediation steps such as applying patches or configuration changes should be implemented immediately to prevent exploitation.'
(CCST Cybersecurity, Vulnerability Assessment and Risk Management, Vulnerability Remediation section, Cisco Networking Academy)
The company web server collects information through a form. The form is accessed by using port 80. The form content is transferred to an encrypted database for storage. You are investigating a complaint that the form content has been compromised.
What is the cause of the security breach?
Answer : C
The CCST Cybersecurity Study Guide explains that HTTP (port 80) transmits data in cleartext, making it susceptible to interception. Even if data is stored securely in an encrypted database, sensitive information can be compromised during transmission if HTTPS (port 443) is not used.
'When HTTP is used instead of HTTPS, all form inputs and transmitted data are sent in plaintext over the network, where they can be intercepted by attackers.'
(CCST Cybersecurity, Basic Network Security Concepts, Secure Protocols section, Cisco Networking Academy)
Which two passwords follow strong password policy guidelines? (Choose 2.)
Answer : A, D
The CCST Cybersecurity course defines a strong password as one that:
Is at least 8--12 characters long
Uses a mix of uppercase, lowercase, numbers, and symbols
Avoids dictionary words, personal information, and predictable patterns
'Strong passwords combine length, complexity, and unpredictability, making them resistant to brute force and dictionary attacks.'
(CCST Cybersecurity, Essential Security Principles, Authentication and Access Control section, Cisco Networking Academy)
A is correct: It's long, mixed case, includes numbers and symbols, and is not easily guessable.
B is incorrect: It's based on a date, which is predictable.
C is incorrect: Short and based on a dictionary word.
D is correct: Uses complexity and length with leetspeak for added unpredictability.
Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.
Which two findings should you report for further investigation as potential security vulnerabilities? (Choose 2.)
Answer : B, C
The CCST Cybersecurity course teaches that vulnerability scan results should be reviewed for misconfigurations and exposures that can be exploited by attackers.
'Disabled firewalls expose systems to direct network attacks and should be treated as critical findings. Open ports can indicate unnecessary or unsecured services running, which may provide entry points for attackers. These findings should be escalated for remediation or further security hardening.'
(CCST Cybersecurity, Vulnerability Assessment and Risk Management, Analyzing and Responding to Scan Results section, Cisco Networking Academy)
Encrypted passwords (A) are good practice, not a vulnerability.
Disabled firewalls (B) leave systems defenseless against incoming attacks.
Open ports (C) can be exploited if the services they expose are vulnerable or misconfigured.
SSH packets (D) are normal in secure remote administration and are not inherently a vulnerability.