Practice Free 100-160 Exam Online Questions
Which of the following options is not an example of a subscription service in cybersecurity?
- A . Anti-malware software
- B . Intrusion detection system (IDS) signatures updates
- C . Threat intelligence feeds
- D . Vulnerability scanning tools
A
Explanation:
Anti-malware software is not typically considered a subscription service in cybersecurity. It is a security tool that detects, prevents, and removes malware from systems, but it is usually purchased as a one-time product rather than a subscription. On the other hand, threat intelligence feeds, vulnerability scanning tools, and IDS signatures updates are examples of subscription services that provide regular updates and information to enhance security against evolving threats.
Which protocol uses encryption for secure remote access to network resources?
- A . Point-to-Point Protocol (PPP)
- B . Wireless Equivalent Privacy (WEP)
- C . Internet Protocol Security (IPSec)
- D . Secure Shell (SSH)
D
Explanation:
Secure Shell (SSH) is a cryptographic network protocol that provides secure remote access and control of network resources. It employs encryption to protect data exchanged between the client and the server, ensuring the confidentiality and integrity of the communication. SSH is commonly used for remote administration and secure file transfers.
Which of the following log file entries would most likely indicate a successful brute-force attack on an authentication system?
- A . "Password reset request from user ‘jane’ received and processed."
- B . "Successful login attempt from user ‘admin’ at 10:15:32."
- C . "Multiple failed login attempts from IP address 192.168.1.100 within a short time."
- D . "Failed login attempt from user ‘bob’ at 11:23:45 due to incorrect password."
C
Explanation:
A brute-force attack involves continuously and systematically attempting various combinations of passwords until the correct one is found. Thus, multiple failed login attempts from a specific IP address within a short time frame is a strong indication of a brute-force attack. This log entry suggests that an attacker is repeatedly attempting to gain unauthorized access to the system by systematically cycling through different passwords.
What is the highest level of risk for a cybersecurity vulnerability that poses an immediate and significant threat to critical assets, systems, or data?
- A . Extremely high risk
- B . Medium risk
- C . High risk
- D . Low risk
A
Explanation:
The highest level of risk for a cybersecurity vulnerability that poses an immediate and significant threat to critical assets, systems, or data is categorized as an extremely high risk. Vulnerabilities at this level represent a severe and imminent danger to an organization’s key resources and require immediate attention and mitigation efforts to minimize potential harm or losses.
Which of the following is a characteristic of cloud-based applications in the context of cybersecurity?
- A . They provide enhanced flexibility and scalability for organizations.
- B . They are not widely used and are considered a less secure option.
- C . They require physical installation and maintenance, limiting their accessibility.
- D . They are typically more susceptible to cyber attacks compared to traditional on-premises
applications.
A
Explanation:
Cloud-based applications offer numerous benefits, one of which is enhanced flexibility and scalability. These applications allow organizations to easily adjust their usage and storage needs without the need for physical hardware upgrades. This flexibility often contributes to improved productivity and cost-effectiveness. However, it’s important to note that the cybersecurity of cloud-based applications depends on the implementation and security measures taken by the provider and user.
What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?
- A . Honeypot
- B . Virtualization
- C . DMZ
- D . Proxy
A
Explanation:
A honeypot is a security technique that involves setting up a decoy system or network to attract potential attackers. The purpose of a honeypot is to gather information about attackers’ tactics, techniques, and intentions, allowing organizations to learn more about the threats they face and improve their defenses.
By monitoring the activities within a honeypot, organizations can gain valuable insights into emerging attack methods and enhance their overall cybersecurity strategy.
Which of the following is a recommended practice for securing a wireless SoHo network?
- A . Disabling encryption for ease of use
- B . Regularly updating the router’s firmware
- C . Sharing Wi-Fi passwords with neighbors
- D . Using the default network name (SSID)
B
Explanation:
Regularly updating the router’s firmware is a recommended practice for securing a wireless SoHo network. Router manufacturers often release firmware updates to address security vulnerabilities and improve performance. By installing the latest firmware updates, you can ensure that your router has the latest security patches. Disabling encryption (A) would make the network vulnerable to unauthorized access. Sharing Wi-Fi passwords with neighbors (C) may compromise security. Using the default network name (D) (SSID) can make it easier for attackers to identify and target your network.
What is the primary objective of identifying vulnerabilities in cybersecurity?
- A . To enhance the performance of a network or system.
- B . To keep the existence of vulnerabilities hidden from attackers.
- C . To fix and eliminate weaknesses in a network or system.
- D . To develop efficient attack methods.
C
Explanation:
The primary objective of identifying vulnerabilities in cybersecurity is to identify weaknesses or flaws in a network or system in order to fix and eliminate them. By addressing vulnerabilities, organizations can enhance the security of their networks and systems, reducing the risk of unauthorized access or data breaches.
A remote worker is visiting a branch office to attend face-to-face meetings. The worker tries to associate their company laptop with the branch wireless access point (WAP) but is unable to do so.
What is a possible cause?
- A . The SSID is not broadcasting.
- B . The WAP is configured for MAC address filtering.
- C . The IP address of the laptop is not correct.
- D . The WAP is using open authentication.
B
Explanation:
The CCST Cybersecurity material explains that MAC address filtering is a wireless security measure that allows only devices with approved hardware addresses to connect. If the laptop’s MAC address is not on the allow list, the connection will be blocked even if the SSID is correct.
"Wireless access points can be configured with MAC address filters to limit network access to authorized devices. If a device’s MAC address is not on the permitted list, the connection will fail regardless of credentials."
(CCST Cybersecurity, Basic Network Security Concepts, Wireless Security section, Cisco Networking Academy)
A is unlikely because non-broadcast SSIDs can still be manually connected to.
B is correct: MAC address filtering would block an unregistered device.
C would cause IP issues after association, not prevent initial connection.
D (open authentication) would allow connection, so it’s not the cause here.
Which of the following is an example of a passive vulnerability identification technique?
- A . Penetration testing
- B . Intrusion detection system (IDS)
- C . Vulnerability scanning
- D . Incident response
C
Explanation:
Vulnerability scanning is a passive technique used to identify vulnerabilities in a system or network. It involves the use of automated tools that scan the system for known vulnerabilities without actively exploiting them.
