Practice Free 100-160 Exam Online Questions
Which network security feature helps protect against unauthorized data access and ensures confidentiality of sensitive information?
- A . Firewall
- B . VPN
- C . Intrusion Detection System
- D . Antivirus
B
Explanation:
Option 1: Incorrect. A firewall is responsible for controlling incoming and outgoing network traffic based on predetermined security rules. While it can help protect against unauthorized access, it does not specifically ensure confidentiality of sensitive information.
Option 2: Correct. A VPN (Virtual Private Network) creates a secure, encrypted connection between a user’s device and a private network, such as a corporate network, over the internet. This helps protect against unauthorized data access and ensures the confidentiality of sensitive information.
Option 3: Incorrect. An Intrusion Detection System (IDS) monitors network traffic for suspicious activity or known attack patterns.
While it can help detect and alert to potential unauthorized access attempts, it does not specifically ensure confidentiality of sensitive information.
Option 4: Incorrect. An antivirus software is used to detect, prevent, and remove malware infections. While it can help protect against unauthorized access, it does not specifically ensure confidentiality of sensitive information.
Which of the following is an important aspect of ensuring that endpoint systems meet security policies and standards?
- A . Implementing software firewalls
- B . Enforcing strong password policies
- C . Conducting periodic software audits
- D . Regularly updating firmware
B
Explanation:
Enforcing strong password policies is an important aspect of ensuring that endpoint systems meet security policies and standards. Strong passwords help prevent unauthorized access to the system and protect sensitive information. While firmware updates, software firewalls, and software audits are also important for overall cybersecurity, enforcing strong password policies directly relates to the security of endpoints and their compliance with policies and standards.
What is the primary characteristic of an Advanced Persistent Threat (APT) compared to traditional attacks?
- A . APTs are easily detectable by conventional security measures
- B . APTs involve persistent and prolonged attacks on specific targets
- C . APTs are random and indiscriminate in their targets
- D . APTs are primarily aimed at causing immediate damage to systems
B
Explanation:
The primary characteristic of an APT is its persistent and prolonged nature. Unlike traditional attacks, which may be brief and target multiple entities, APTs specifically focus on a particular target for an extended period of time. This allows the attackers to gather more information and potentially cause significant damage.
What does the term "system logs" refer to in cybersecurity?
- A . Files containing network traffic data
- B . Records of user activity on a computer system
- C . Logs generated by operating systems that record events and activities
- D . Information relating to the hardware components of a computer system
C
Explanation:
System logs, also known as event logs, are generated by operating systems and capture various events and activities that occur within a computer system. These logs provide valuable information for troubleshooting, detecting security incidents, and monitoring system health. They can include details about user logins, system errors, successful and failed login attempts, file access, network connections, and much more. Analyzing system logs is an essential part of cybersecurity, as it helps identify security breaches, anomalies, and potential threats.
What is smishing?
- A . A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.
- B . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.
- C . A type of phishing attack that targets specific individuals or organizations.
- D . A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive
information.
A
Explanation:
Smishing, short for SMS phishing, is a social engineering attack that utilizes SMS or text messages to deceive individuals into disclosing sensitive information or performing certain actions. These messages often mimic legitimate sources, such as banks or service providers, and typically contain links or phone numbers that, when accessed or called, lead to malicious activities. Smishing takes advantage of the ubiquity of mobile devices and users’ tendency to trust text messages.
What does the term "data classification" refer to in the context of cybersecurity?
- A . Protecting data from unauthorized access
- B . Sorting data based on its importance and sensitivity
- C . Backing up data to prevent data loss
- D . Encrypting data to ensure confidentiality
B
Explanation:
Data classification is the process of categorizing data based on its importance, sensitivity, and the level of protection required. This helps ensure that appropriate security measures are applied to protect different types of data.
What does hardening mean in the context of cybersecurity?
- A . Removing all vulnerabilities from a system or network
- B . Implementing cybersecurity policies and regulations
- C . Creating a backup of critical data and configurations
- D . Making a system more resistant to threats and attacks
D
Explanation:
Hardening refers to the process of securing a system by reducing its vulnerability to potential threats and attacks. It involves implementing security best practices, such as disabling unnecessary services, applying patches and updates, configuring access controls, strengthening passwords, and employing additional security measures like firewalls or intrusion detection systems. Hardening helps ensure systems are less susceptible to exploitation.
Which technology actively inspects incoming and outgoing network traffic and takes immediate action to prevent security threats?
- A . Firewall
- B . IPS
- C . Server
- D . IDS
B
Explanation:
An Intrusion Prevention System (IPS) is a technology that actively inspects network traffic, both incoming and outgoing, and takes immediate action to prevent security threats. It not only identifies potential threats but also actively blocks or mitigates them in real-time.
Which of the following is a key role of a Cisco Certified Support Technician (CCST) in cybersecurity?
- A . Managing network infrastructure
- B . Designing user interfaces
- C . Conducting penetration testing
- D . Developing software applications
A
Explanation:
A CCST in cybersecurity is primarily responsible for managing and maintaining network infrastructure to ensure the security of data and systems. They handle tasks such as monitoring network traffic, configuring firewalls, implementing security protocols, and troubleshooting network vulnerabilities.
What is the purpose of a Virtual Private Network (VPN)?
- A . To secure wireless networks from unauthorized access.
- B . To monitor and analyze network traffic for potential security threats.
- C . To protect against viruses and malware.
- D . To provide secure and encrypted remote access to a private network over a public network, such as
the internet.
D
Explanation:
A Virtual Private Network (VPN) is a network technology that allows users to securely connect to a private network from a remote location over a public network, such as the internet. It establishes a secure tunnel between the user’s device and the private network, encrypting the data and ensuring confidentiality and integrity.