Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Cisco CCST 100-160 Questions and answers with ValidTests

Exam 100-160 All Questions
Exam 100-160 Premium Access

View all detail and faqs for the 100-160 exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are collecting data after a suspected intrusion on the local LAN.

You need to capture incoming IP packets to a file for an investigator to analyze.

Which two tools should you use?(Choose 2.)

Options:

A.

Wireshark

B.

tcpdump

C.

Nmap

D.

netstat

Expert Solution
Questions # 2:

Move each scenario from the list on the left to the correct type of attacker on the right.

Note: You will receive partial credit for each correct answer.

Question # 2

Options:

Expert Solution
Questions # 3:

What should you create to prevent spoofing of the internal network?

Options:

A.

A NAT rule

B.

An ACL

C.

A record in the host file

D.

A DNS record

Expert Solution
Questions # 4:

How does sandboxing help with the analysis of malware?

Options:

A.

It defines the suspicious or malicious applications that should be blocked.

B.

It specifies the applications that are authorized for use on the network.

C.

It allows suspicious applications to run in a safe and isolated testing environment.

D.

It restricts traffic from passing from one network to another.

Expert Solution
Questions # 5:

During an incident response, the security team needs to isolate a compromised server from the rest of the network but still allow forensic analysis. Which action should they take?

Options:

A.

Power off the server immediately.

B.

Disconnect the server from the network and connect it to an isolated forensic network.

C.

Delete suspicious files from the server.

D.

Reset all user passwords on the server.

Expert Solution
Questions # 6:

You notice that a new CVE has been shared to an email group that you belong to.

What should you do first with the CVE?

Options:

A.

Look up details of the vulnerability to determine whether it applies to your network.

B.

Research measures to prevent the CVE from attacking the network.

C.

Record the CVE as part of the disaster recovery plan.

D.

Add the CVE to the firewall rules for your organization.

Expert Solution
Questions # 7:

A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP.

Which type of attack does this scenario describe?

Options:

A.

Reconnaissance

B.

Man-in-the-middle

C.

DDoS

D.

Ransomware

Expert Solution
Questions # 8:

You need to design your company’s password policy to adhere to the National Institute of Standards and Technology (NIST) guidelines for user password security.

What is the minimum password length that you should require to be consistent with the NIST guidelines?

Options:

A.

4 characters

B.

8 characters

C.

16 characters

D.

No minimum length

Expert Solution
Questions # 9:

Move each framework from the list on the left to the correct purpose on the right.

Note: You will receive partial credit for each correct answer.

Question # 9

Options:

Expert Solution
Questions # 10:

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

Options:

A.

Configure the new router to filter IP addresses.

B.

Configure the SSID with broadcast disabled.

C.

Configure a higher signal strength to allow coverage in the parking lot.

D.

Configure the SSID with the same SSID used by the customer router.

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions