Bash, the Crucial Exams Chat Bot
AI Bot

Security, Privacy & Best Practices (CCST IT Support) Flashcards

Cisco CCST IT Support 100-140 Flashcards

Study our Security, Privacy & Best Practices (CCST IT Support) flashcards for the Cisco CCST IT Support 100-140 exam with 39+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCST IT Support 100-140 Course Header Image
FrontBack
Compare full differential and incremental backupsFull captures all data; Differential captures changes since last full; Incremental captures changes since last backup
Define endpoint detection and response EDRTools that monitor endpoints for suspicious behavior and provide investigation and response capabilities
Define hashingOne way transformation of data into fixed length digest used for integrity checks
Define least privilegeGranting users and services the minimum access needed to perform tasks
Describe a basic patch management workflowScan for vulnerabilities; test patches; deploy in phases; verify and document
Describe the principle of separation of dutiesSplitting critical tasks among multiple users to prevent fraud and errors
Differentiate symmetric and asymmetric encryptionSymmetric uses one shared secret key for encrypt and decrypt; Asymmetric uses public private key pair
Give two mitigation steps for ransomwareRegular backups and patching; user training to avoid phishing
Give two user facing privacy best practicesUse strong unique passwords and enable MFA; avoid sharing sensitive data over insecure channels
How should IT handle a request to access user PIIVerify identity and authorization then provide only the minimum data required according to policy
List common malware typesRansomware; Trojan; Worm; Virus; Spyware; Rootkit
List the first three steps in an incident response processIdentify; Contain; Eradicate
Name a common disk encryption tool for macOSFileVault
Name a common disk encryption tool for WindowsBitLocker
Name a secure wipe standard or methodUse full disk overwrite or hardware degaussing or physical destruction as appropriate
Name one benchmark for secure configurationCIS Benchmarks
Name the three factor types used in MFAKnowledge factor something you know Password or PIN; Possession factor something you have Token or phone; Inherence factor something you are Biometrics
What is a host based firewallFirewall running on an endpoint to filter traffic that reaches the device
What is a vulnerability patchUpdate that fixes security flaws in software or firmware
What is anti malware softwareSoftware that detects prevents and removes viruses spyware ransomware and other malicious code
What is data minimizationCollect and retain only the data necessary for a stated purpose
What is encryption at restProtecting stored data by encrypting files disks or volumes
What is end to end encryptionE2E encryption where only communicating endpoints can read the plaintext
What is full disk encryptionEncrypting the entire storage device to protect data if device is lost or stolen
What is multi factor authentication?Authentication using two or more independent factor types like something you know something you have or something you are
What is network firewall basic purposeControl incoming and outgoing network traffic based on policies
What is PIIPersonally Identifiable Information that can identify or contact an individual
What is ransomwareMalware that encrypts files and demands payment for decryption
What is role based access control RBACAccess control model that assigns permissions to roles and then assigns users to roles
What is secure configuration hardeningRemoving default accounts disabling unused services and applying secure settings
What is secure disposal of dataEnsuring media and data are destroyed or wiped so data cannot be recovered
What is single sign on SSOAuthentication method that lets users access multiple services with one set of credentials
What is social engineering in securityManipulative techniques to trick people into revealing credentials or taking insecure actions
What is the 3 2 1 backup ruleKeep three copies of data on two different media with one copy off site
What is TLS used forEncrypting data in transit and ensuring server identity
Why disable unnecessary servicesReduce attack surface and limit potential vulnerabilities
Why is logging and monitoring importantDetect suspicious activity and support incident response and forensics
Why salts are used with hashesTo prevent rainbow table attacks by adding unique random data to each input before hashing
Why test backups regularlyTo ensure backups can be restored and data integrity is preserved

About the Flashcards

Flashcards for the Cisco CCST IT Support exam provide concise definitions and side-by-side comparisons of core security controls and concepts. The deck reviews authentication (MFA, SSO), access control models (RBAC, least privilege, separation of duties), encryption and cryptography fundamentals (symmetric vs asymmetric keys, TLS, end-to-end encryption, hashing and salts, encryption at rest, full-disk tools), and endpoint protections including anti-malware, EDR, and common malware types.

Cards also emphasize practical workflows and exam-ready terminology: patch and backup strategies (3-2-1 rule, full/differential/incremental), secure configuration and hardening (CIS benchmarks), network and host firewalls, logging and monitoring, basic incident response steps (identify, contain, eradicate), plus PII handling, secure disposal, and user-facing best practices like strong passwords and MFA.

Topics covered in this flashcard deck:

  • Multi-factor authentication
  • Access control models
  • Encryption and hashing
  • Endpoint security and malware
  • Backup and patch management
  • Incident response and logging
Share on...
Follow us on...