Pass the Cisco CCST 100-160 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are reviewing your company’s disaster recovery plan.

Which two daily data backup actions should the plan include?(Choose 2.)

Options:

A.

Back up the data to removable media and store it off-site.


B.

Back up each department’s data to a separate local server.


C.

Back up the data by using cloud services.


D.

Back up the data by using RAID on a local external hard drive with a secondary power source.


Expert Solution
Questions # 2:

How does a honeypot enhance network security?

Options:

A.

It monitors network traffic and sends alerts when potential threats are detected.


B.

It acts as a decoy and diverts malicious traffic away from important systems.


C.

It isolates external-facing services from the Internet and protects them from attack.


D.

It detects and prevents identified threats through real-time packet inspection.


Expert Solution
Questions # 3:

Which macOS security feature encrypts the entire macOS volume?

Options:

A.

FileVault


B.

Gatekeeper


C.

System Integrity Protection (SIP)


D.

XProtect


Expert Solution
Questions # 4:

You need to design your company’s password policy to adhere to the National Institute of Standards and Technology (NIST) guidelines for user password security.

What is the minimum password length that you should require to be consistent with the NIST guidelines?

Options:

A.

4 characters


B.

8 characters


C.

16 characters


D.

No minimum length


Expert Solution
Questions # 5:

You are planning to work from home. Your company requires that you connect to the company network through a VPN.

Which three critical functions do VPNs provide to remote workers?(Choose 3.)

Options:

A.

WAN management


B.

Authorization of users


C.

Integrity of data


D.

Authentication of users


E.

Confidentiality of information


F.

Password management


Expert Solution
Questions # 6:

Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.

Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)

Note: You will receive partial credit for each correct selection.

Options:

A.

Object access failure


B.

Account logon failure


C.

Account lockout success


D.

Account logoff success


Expert Solution
Questions # 7:

You are reviewing the Application log on a Windows computer. You see an event with an error-level message as shown.

What can you determine about the application that generated the event message?

Question # 7

Options:

A.

The application is currently running much slower than expected.


B.

The application experienced a significant problem that caused it to fail.


C.

The application recovered from an event without loss of functionality.


D.

The application loaded and ran successfully without issues.


Expert Solution
Questions # 8:

You notice that a new CVE has been shared to an email group that you belong to.

What should you do first with the CVE?

Options:

A.

Look up details of the vulnerability to determine whether it applies to your network.


B.

Research measures to prevent the CVE from attacking the network.


C.

Record the CVE as part of the disaster recovery plan.


D.

Add the CVE to the firewall rules for your organization.


Expert Solution
Questions # 9:

A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?

Options:

A.

Reset the affected user’s password and investigate the scope of compromise.


B.

Block all foreign IP addresses from accessing the network.


C.

Run a full vulnerability scan of the corporate network.


D.

Ignore the event unless it happens again.


Expert Solution
Questions # 10:

For each statement, selectTrueif it is a common motivation to commit cyber attacks orFalseif it is not.

Note: You will receive partial credit for each correct selection.

Question # 10


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions