SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the command in a batch file to do a backup?
NT Backup
Broadcasts the networks name - can be turned off to make network 'disappear'
Set of rules that denies packets that dont meet a certain criteria
Read - write - list folder contents - read and execute - modify
2. What is hash encoding?
Incorrect permissions and incorrect configuration of the wireless utility
Ensures messages are not corrupted or tampered with
Actively stops computers from accessing the PC
Read - write - read and execute - modify - full control
3. What products can be used to protect network devices?
Software firewall - IDs - App and OS patches
SHA+MD5
Read - write - list folder contents - read and execute - modify
Actively stops computers from accessing the PC
4. What is two factor security?
Physical+Data security
Read - write - list folder contents - read and execute - modify
An application that filters data packets - uses resources of the pcm potentially slowing it
NT Backup
5. Most popular hashing algorithms?
On a secure tunnel over an unsecure network
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
SHA+MD5
Devices that detect valid users with their physical characteristics.
6. What questions should you ask to determine security factors?
In a locked secure room
At home or business - full-time internet access - laptop or desktop?
Actively stops computers from accessing the PC
Ensures messages are not corrupted or tampered with
7. What is an incremental backup?
SHA+MD5
Devices that detect valid users with their physical characteristics.
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
8. What are two common security errors?
Malware
Incorrect permissions and incorrect configuration of the wireless utility
On a secure tunnel over an unsecure network
A backup that archives all selected files regardless of if they have changed since the last backup.
9. When is VPN (virtual private network) used?
On a secure tunnel over an unsecure network
Actively stops computers from accessing the PC
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all files that have changed since the last backup
10. Where should network equipment be housed?
With devices to authenticate users asking for access
Software firewall - IDs - App and OS patches
In a locked secure room
SHA+MD5
11. What is phishing protection software?
12. Which wireles tool uses a 64-bit or 128-bit incryption key?
On a secure tunnel over an unsecure network
WEP
A backup that archives all files that have changed since the last backup
An application that filters data packets - uses resources of the pcm potentially slowing it
13. What is a software firewall?
Malware
Read - write - list folder contents - read and execute - modify
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all files that have changed since the last backup
14. What is malicious software installed on a computer with the knowledge or permission of the user?
Software that protects and blocks against the IP's of known phishing sites
At home or business - full-time internet access - laptop or desktop?
Malware
SHA+MD5
15. What does a firewall do?
Read - write - read and execute - modify - full control
NT Backup
A backup that archives all selected files regardless of if they have changed since the last backup.
Actively stops computers from accessing the PC
16. What are biometric devices?
Incorrect permissions and incorrect configuration of the wireless utility
Ensures messages are not corrupted or tampered with
Set of rules that denies packets that dont meet a certain criteria
Devices that detect valid users with their physical characteristics.
17. What does SSID do?
18. What is a zombie?
19. What folder level permissions are available?
In a locked secure room
Read - write - list folder contents - read and execute - modify
With devices to authenticate users asking for access
Read - write - read and execute - modify - full control
20. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
At home or business - full-time internet access - laptop or desktop?
In a locked secure room
Read - write - read and execute - modify - full control
21. What is a full backup?
At home or business - full-time internet access - laptop or desktop?
A backup that archives all files that have changed since the last backup
Actively stops computers from accessing the PC
A backup that archives all selected files regardless of if they have changed since the last backup.
22. What are file level permissions?
WEP
On a secure tunnel over an unsecure network
An application that filters data packets - uses resources of the pcm potentially slowing it
Read - write - read and execute - modify - full control
23. How can you protect your data?
On a secure tunnel over an unsecure network
Actively stops computers from accessing the PC
Devices that detect valid users with their physical characteristics.
With devices to authenticate users asking for access