Security, Privacy & Best Practices (CCST IT Support) Flashcards
Cisco CCST IT Support 100-140 Flashcards

| Front | Back |
| Compare full differential and incremental backups | Full captures all data; Differential captures changes since last full; Incremental captures changes since last backup |
| Define endpoint detection and response EDR | Tools that monitor endpoints for suspicious behavior and provide investigation and response capabilities |
| Define hashing | One way transformation of data into fixed length digest used for integrity checks |
| Define least privilege | Granting users and services the minimum access needed to perform tasks |
| Describe a basic patch management workflow | Scan for vulnerabilities; test patches; deploy in phases; verify and document |
| Describe the principle of separation of duties | Splitting critical tasks among multiple users to prevent fraud and errors |
| Differentiate symmetric and asymmetric encryption | Symmetric uses one shared secret key for encrypt and decrypt; Asymmetric uses public private key pair |
| Give two mitigation steps for ransomware | Regular backups and patching; user training to avoid phishing |
| Give two user facing privacy best practices | Use strong unique passwords and enable MFA; avoid sharing sensitive data over insecure channels |
| How should IT handle a request to access user PII | Verify identity and authorization then provide only the minimum data required according to policy |
| List common malware types | Ransomware; Trojan; Worm; Virus; Spyware; Rootkit |
| List the first three steps in an incident response process | Identify; Contain; Eradicate |
| Name a common disk encryption tool for macOS | FileVault |
| Name a common disk encryption tool for Windows | BitLocker |
| Name a secure wipe standard or method | Use full disk overwrite or hardware degaussing or physical destruction as appropriate |
| Name one benchmark for secure configuration | CIS Benchmarks |
| Name the three factor types used in MFA | Knowledge factor something you know Password or PIN; Possession factor something you have Token or phone; Inherence factor something you are Biometrics |
| What is a host based firewall | Firewall running on an endpoint to filter traffic that reaches the device |
| What is a vulnerability patch | Update that fixes security flaws in software or firmware |
| What is anti malware software | Software that detects prevents and removes viruses spyware ransomware and other malicious code |
| What is data minimization | Collect and retain only the data necessary for a stated purpose |
| What is encryption at rest | Protecting stored data by encrypting files disks or volumes |
| What is end to end encryption | E2E encryption where only communicating endpoints can read the plaintext |
| What is full disk encryption | Encrypting the entire storage device to protect data if device is lost or stolen |
| What is multi factor authentication? | Authentication using two or more independent factor types like something you know something you have or something you are |
| What is network firewall basic purpose | Control incoming and outgoing network traffic based on policies |
| What is PII | Personally Identifiable Information that can identify or contact an individual |
| What is ransomware | Malware that encrypts files and demands payment for decryption |
| What is role based access control RBAC | Access control model that assigns permissions to roles and then assigns users to roles |
| What is secure configuration hardening | Removing default accounts disabling unused services and applying secure settings |
| What is secure disposal of data | Ensuring media and data are destroyed or wiped so data cannot be recovered |
| What is single sign on SSO | Authentication method that lets users access multiple services with one set of credentials |
| What is social engineering in security | Manipulative techniques to trick people into revealing credentials or taking insecure actions |
| What is the 3 2 1 backup rule | Keep three copies of data on two different media with one copy off site |
| What is TLS used for | Encrypting data in transit and ensuring server identity |
| Why disable unnecessary services | Reduce attack surface and limit potential vulnerabilities |
| Why is logging and monitoring important | Detect suspicious activity and support incident response and forensics |
| Why salts are used with hashes | To prevent rainbow table attacks by adding unique random data to each input before hashing |
| Why test backups regularly | To ensure backups can be restored and data integrity is preserved |
Related Study Materials
About the Flashcards
Flashcards for the Cisco CCST IT Support exam provide concise definitions and side-by-side comparisons of core security controls and concepts. The deck reviews authentication (MFA, SSO), access control models (RBAC, least privilege, separation of duties), encryption and cryptography fundamentals (symmetric vs asymmetric keys, TLS, end-to-end encryption, hashing and salts, encryption at rest, full-disk tools), and endpoint protections including anti-malware, EDR, and common malware types.
Cards also emphasize practical workflows and exam-ready terminology: patch and backup strategies (3-2-1 rule, full/differential/incremental), secure configuration and hardening (CIS benchmarks), network and host firewalls, logging and monitoring, basic incident response steps (identify, contain, eradicate), plus PII handling, secure disposal, and user-facing best practices like strong passwords and MFA.
Topics covered in this flashcard deck:
- Multi-factor authentication
- Access control models
- Encryption and hashing
- Endpoint security and malware
- Backup and patch management
- Incident response and logging