Cisco
100-160
Q1:
Which step should be performed immediately after identifying a critical vulnerability affecting internet-facing systems?
○
A
Document the vulnerability in the annual security report.○
B
Apply the vendor patch or mitigation.○
C
Schedule a quarterly penetration test.○
D
Change the default administrator passwords.
Cisco
100-160
Q2:
What is the main purpose of a disaster recovery plan as compared to a business continuity plan?
○
A
Limiting operational downtime.○
B
Keeping the business open in some capacity during a disaster.○
C
Restoring data access and an IT infrastructure as quickly as possible.○
D
Allowing staff to continue to serve customers throughout a disaster.
Cisco
100-160
Q3:
How does sandboxing help with the analysis of malware?
○
A
It defines the suspicious or malicious applications that should be blocked.○
B
It specifies the applications that are authorized for use on the network.○
C
It allows suspicious applications to run in a safe and isolated testing environment.○
D
It restricts traffic from passing from one network to another.
Cisco
100-160
Q4:
A client cannot connect to the corporate web server. You discover a large number of half-open TCP connections to the server.
What should you do?
○
A
Take action to stop the TCP SYN flood attack.○
B
Change the connection protocol from HTTP to HTTPS.○
C
Ignore the half-open connections because this is a normal part of the TCP three-way handshake.○
D
Flush the DNS cache information.
Cisco
100-160
Q5:
Which wireless security protocol provides the strongest protection for a home or small business network?
○
A
WEP○
B
WPA○
C
WPA2 with AES○
D
WPA3