Pass the Cisco CCST 100-160 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.

You need to ensure that employees’ mobile devices comply with HIPAA regulations.

Which safeguard should you develop and implement?

Options:

A.

An ownership policy for employees’ mobile devices


B.

A contingency plan


C.

A policy that requires multi-factor authentication to use the mobile device


D.

A policy to govern how ePHI is removed from mobile devices


Expert Solution
Questions # 12:

What is the primary purpose of running a vulnerability scan on your network?

Options:

A.

To identify and document the locations of customer and financial databases


B.

To automatically prioritize security weaknesses for immediate remediation


C.

To determine whether systems are subject to CVEs that could be exploited by adversaries


D.

To correlate event logs on multiple servers in order to generate intrusion alerts


Expert Solution
Questions # 13:

Which security assessment of IT systems verifies that PII data is available, accurate, confidential, and accessible only by authorized users?

Options:

A.

Risk framing


B.

Cyber Kill Chain


C.

Workflow management


D.

Information assurance


Expert Solution
Questions # 14:

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

Options:

A.

Configure the new router to filter IP addresses.


B.

Configure the SSID with broadcast disabled.


C.

Configure a higher signal strength to allow coverage in the parking lot.


D.

Configure the SSID with the same SSID used by the customer router.


Expert Solution
Questions # 15:

You need to transfer configuration files to a router across an unsecured network.

Which protocol should you use to encrypt the files in transit?

Options:

A.

Telnet


B.

HTTP


C.

TFTP


D.

SSH


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions