1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is a common security threat in which an attacker attempts to overwhelm a targeted system by flooding it with Internet traffic?A. RansomwareB. Distributed Denial of Service (DDoS) attackC. PhishingD. SQL injection
Answer: B
Which of the following is a common security threat that targets web applications?A. SQL injectionB. DNS poisoningC. Man-in-the-middle attackD. Distributed Denial of Service (DDoS)
Answer: A
Which of the following is a key principle of data security?A. Accessible by everyoneB. Running on outdated softwareC. Encrypted during transmissionD. Stored in clear text
Answer: C
A company needs to implement a security policy that restricts employee access to certain websites during work hours. Which option should the company choose to enforce this policy?A. Virtual Private Network (VPN)B. Intrusion Detection System (IDS)C. FirewallD. Antivirus software
Answer: C
Which of the following is a best practice for implementing security policies and procedures in a network?A. Allowing all users unrestricted access to the network.B. Implementing strong password policies and enforcing regular password changes.C. Sharing administrator credentials among IT staff to streamline access.D. Allowing users to install any software on their devices.
Answer: B
Which cybersecurity feature helps detect and prevent unauthorized access to a network by analyzing network traffic and creating security policies based on observed patterns?A. FirewallB. AntivirusC. Intrusion Detection SystemD. Virtual Private Network
Answer: C
Which feature provides automatic threat detection and response for a network?A. Intrusion Detection SystemB. FirewallsC. Virtual Private NetworkD. Web Application Firewall
Answer: A
In a company's Identity and Access Management system, what is the purpose of implementing Multi-Factor Authentication (MFA)?A. To provide a centralized directory for user authentication and authorization.B. To ensure that only authorized users can access protected resourcesC. To enhance the security of user authentication by requiring multiple forms of verification.D. To simplify the user authentication process by reducing the number of steps.
Answer: C
Which of the following is a best practice for securing IoT devices?A. Regularly update the firmwareB. Disable all security featuresC. Use default login credentialsD. Connect IoT devices directly to the internet without any firewall
Answer: A
Which security feature in a firewall is used to prevent unauthorized access to an internal network by filtering incoming and outgoing traffic based on a set of predefined rules?A. Intrusion Detection System (IDS)B. Intrusion Prevention System (IPS)C. Virtual Private Network (VPN)D. Access Control List (ACL)
Answer: D
https://www.passquestion.com/100-160.html
One resource to help you prepare effectively is the latest Cisco 100-160 CCST Cybersecurity Exam Questions from PassQuestion.