Practice Free 100-160 Exam Online Questions
Which encryption method uses two different keys, a public key and a private key?
- A . SSL/TLS
- B . Hashing
- C . Asymmetric encryption
- D . Symmetric encryption
C
Explanation:
Asymmetric encryption, also known as public-key encryption, uses two different keys: a public key for encryption and a private key for decryption. The public key can be freely distributed, allowing anyone to encrypt messages that only the recipient with the corresponding private key can decrypt. This method is commonly used for secure communication and establishing secure connections.
What is the primary goal of program deployment in a cybersecurity context?
- A . Facilitating collaboration between different teams
- B . Ensuring software compatibility across diverse platforms
- C . Implementing security controls to protect applications
- D . Tracking and managing software licenses effectively
C
Explanation:
Program deployment in a cybersecurity context involves implementing security controls to protect applications during the installation or update process. It includes ensuring that proper security measures are in place, such as encryption, access controls, and secure configurations, to safeguard applications from potential threats and attacks.
During a cybersecurity investigation, a log entry states, "Unauthorized access attempt blocked from IP address 123.45.67.89." What can be inferred from this log entry?
- A . The system was compromised due to an unauthorized access attempt from IP address 123.45.67.89.
- B . The system detected suspicious traffic from IP address 123.45.67.89 for further investigation.
- C . The system successfully prevented an unauthorized access attempt from a specific IP address.
- D . The system experienced a denial-of-service attack from IP address 123.45.67.89.
C
Explanation:
The log entry clearly states that the system blocked an unauthorized access attempt from a specific IP address, indicating that a security measure or mechanism successfully prevented the unauthorized access. This is a positive outcome for the system as it shows effective defense against potential threats.
Which of the following is an element of an incident response plan?
- A . Installing antivirus software
- B . Conducting regular backups
- C . Developing security policies
- D . Identifying vulnerabilities
C
Explanation:
An incident response plan outlines the steps and procedures to be followed when a cybersecurity incident occurs. One of the elements of an incident response plan is developing security policies. These policies serve as a framework for managing and responding to security incidents.
What should you create to prevent spoofing of the internal network?
- A . A NAT rule
- B . An ACL
- C . A record in the host file
- D . A DNS record
B
Explanation:
The CCST Cybersecurity Study Guide states that Access Control Lists (ACLs) can be used to filter traffic based on IP addresses and block packets that appear to originate from the internal network but arrive from external interfaces (IP spoofing).
"ACLs can prevent spoofing by dropping traffic from external sources that claim to have an internal source address. Configuring ACLs on the perimeter firewall or router is a common countermeasure for IP spoofing."
(CCST Cybersecurity, Basic Network Security Concepts, ACLs and Traffic Filtering section, Cisco Networking Academy)
A (NAT rule) changes IP addresses but does not inherently prevent spoofing.
B (ACL) is correct because it can enforce anti-spoofing filters.
C (host file) only affects name resolution locally.
D (DNS record) is for domain mapping, not spoofing prevention.
Which of the following is an example of a human-caused disaster?
- A . Tornado
- B . Flood
- C . Earthquake
- D . Cyberattack
D
Explanation:
Cyberattacks, such as hacking, malware, or ransomware attacks, are considered human-caused disasters. They are intentional actions carried out by individuals or groups with malicious intent and can result in significant disruption, data loss, and financial damage if proper cybersecurity measures are not in place.
What is an insider threat?
- A . A threat posed by an individual with authorized access to an organization’s systems and data.
- B . A vulnerability in an organization’s network infrastructure.
- C . The accidental disclosure of sensitive information.
- D . A security breach caused by an external attacker.
A
Explanation:
Insider threats refer to risks and vulnerabilities that arise from individuals who have authorized access to an organization’s systems, networks, or data. These individuals may intentionally or unintentionally cause harm, such as stealing confidential information, sabotaging systems, or disclosing sensitive data to unauthorized entities.
Which wireless security protocol provides the strongest protection for a home or small business network?
- A . WEP
- B . WPA
- C . WPA2 with AES
- D . WPA3
D
Explanation:
The CCST Cybersecurity Study Guide explains that WPA3 is the most current and secure Wi-Fi Protected Access protocol, offering stronger encryption and better protection against brute-force attacks compared to earlier versions.
"WPA3 improves wireless security by using more robust encryption methods and protections against offline password guessing, making it the recommended protocol for securing modern Wi-Fi networks."
(CCST Cybersecurity, Basic Network Security Concepts, Wireless Security Protocols section, Cisco Networking Academy)
How can vulnerabilities be discovered in a network or system?
- A . By conducting penetration testing.
- B . By using firewalls and antivirus software.
- C . By implementing strong cryptographic protocols.
- D . By monitoring network traffic.
A
Explanation:
Penetration testing, also known as ethical hacking, is a method used to discover vulnerabilities in a network or system. It involves simulating an attack on the system to identify weaknesses and potential entry points for attackers. Penetration testing can help organizations uncover vulnerabilities before they can be exploited by malicious actors.
Which of the following is an example of a corrective control?
- A . Antivirus software
- B . User awareness training
- C . Intrusion prevention system
- D . Backup and recovery
D
Explanation:
Backup and recovery is a corrective control that enables organizations to restore systems, data, and services after an incident or a failure. It helps to recover from various incidents such as data loss, hardware failure, or a security breach, restoring operations to a functional state.
