SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which wireles tool uses a 64-bit or 128-bit incryption key?
WEP
At home or business - full-time internet access - laptop or desktop?
Software firewall - IDs - App and OS patches
SHA+MD5
2. What folder level permissions are available?
Set of rules that denies packets that dont meet a certain criteria
On a secure tunnel over an unsecure network
Read - write - list folder contents - read and execute - modify
Software that protects and blocks against the IP's of known phishing sites
3. What are biometric devices?
WEP
A backup that archives all files that have changed since the last backup
On a secure tunnel over an unsecure network
Devices that detect valid users with their physical characteristics.
4. When is VPN (virtual private network) used?
Broadcasts the networks name - can be turned off to make network 'disappear'
With devices to authenticate users asking for access
Malware
On a secure tunnel over an unsecure network
5. What is malicious software installed on a computer with the knowledge or permission of the user?
Read - write - list folder contents - read and execute - modify
Software firewall - IDs - App and OS patches
Malware
A backup that archives all selected files regardless of if they have changed since the last backup.
6. What is the command in a batch file to do a backup?
In a locked secure room
NT Backup
An application that filters data packets - uses resources of the pcm potentially slowing it
Broadcasts the networks name - can be turned off to make network 'disappear'
7. How can you protect your data?
A backup that archives all selected files regardless of if they have changed since the last backup.
NT Backup
With devices to authenticate users asking for access
Devices that detect valid users with their physical characteristics.
8. What is a full backup?
Physical+Data security
A backup that archives all selected files regardless of if they have changed since the last backup.
Devices that detect valid users with their physical characteristics.
Set of rules that denies packets that dont meet a certain criteria
9. What products can be used to protect network devices?
Software firewall - IDs - App and OS patches
WEP
In a locked secure room
A backup that archives all selected files regardless of if they have changed since the last backup.
10. What questions should you ask to determine security factors?
With devices to authenticate users asking for access
On a secure tunnel over an unsecure network
At home or business - full-time internet access - laptop or desktop?
Software firewall - IDs - App and OS patches
11. Most popular hashing algorithms?
SHA+MD5
Set of rules that denies packets that dont meet a certain criteria
At home or business - full-time internet access - laptop or desktop?
Actively stops computers from accessing the PC
12. What is a zombie?
13. What is packet filtering?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Devices that detect valid users with their physical characteristics.
Read - write - read and execute - modify - full control
Set of rules that denies packets that dont meet a certain criteria
14. What is phishing protection software?
15. What is hash encoding?
Malware
Ensures messages are not corrupted or tampered with
Devices that detect valid users with their physical characteristics.
At home or business - full-time internet access - laptop or desktop?
16. What does a firewall do?
WEP
Actively stops computers from accessing the PC
An application that filters data packets - uses resources of the pcm potentially slowing it
NT Backup
17. What is a software firewall?
Ensures messages are not corrupted or tampered with
An application that filters data packets - uses resources of the pcm potentially slowing it
Software firewall - IDs - App and OS patches
Physical+Data security
18. What does SSID do?
19. Where should network equipment be housed?
WEP
Actively stops computers from accessing the PC
In a locked secure room
NT Backup
20. What is two factor security?
A backup that archives all files that have changed since the last backup
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
Physical+Data security
21. What is an incremental backup?
Software that protects and blocks against the IP's of known phishing sites
At home or business - full-time internet access - laptop or desktop?
A backup that archives all files that have changed since the last backup
Software firewall - IDs - App and OS patches
22. What are two common security errors?
SHA+MD5
Broadcasts the networks name - can be turned off to make network 'disappear'
Incorrect permissions and incorrect configuration of the wireless utility
On a secure tunnel over an unsecure network
23. What are file level permissions?
A backup that archives all files that have changed since the last backup
Read - write - list folder contents - read and execute - modify
SHA+MD5
Read - write - read and execute - modify - full control