SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does a firewall do?
Devices that detect valid users with their physical characteristics.
Actively stops computers from accessing the PC
Read - write - read and execute - modify - full control
With devices to authenticate users asking for access
2. What is two factor security?
Ensures messages are not corrupted or tampered with
Physical+Data security
WEP
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
3. What is the command in a batch file to do a backup?
Incorrect permissions and incorrect configuration of the wireless utility
In a locked secure room
Devices that detect valid users with their physical characteristics.
NT Backup
4. What is hash encoding?
Devices that detect valid users with their physical characteristics.
Ensures messages are not corrupted or tampered with
NT Backup
Broadcasts the networks name - can be turned off to make network 'disappear'
5. What is phishing protection software?
6. When is VPN (virtual private network) used?
Set of rules that denies packets that dont meet a certain criteria
On a secure tunnel over an unsecure network
Software that protects and blocks against the IP's of known phishing sites
WEP
7. What are two common security errors?
An application that filters data packets - uses resources of the pcm potentially slowing it
Software firewall - IDs - App and OS patches
Broadcasts the networks name - can be turned off to make network 'disappear'
Incorrect permissions and incorrect configuration of the wireless utility
8. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all files that have changed since the last backup
Read - write - list folder contents - read and execute - modify
Devices that detect valid users with their physical characteristics.
9. How can you protect your data?
Actively stops computers from accessing the PC
A backup that archives all selected files regardless of if they have changed since the last backup.
Physical+Data security
With devices to authenticate users asking for access
10. What folder level permissions are available?
SHA+MD5
Devices that detect valid users with their physical characteristics.
Read - write - list folder contents - read and execute - modify
Incorrect permissions and incorrect configuration of the wireless utility
11. Which wireles tool uses a 64-bit or 128-bit incryption key?
Software that protects and blocks against the IP's of known phishing sites
WEP
Broadcasts the networks name - can be turned off to make network 'disappear'
Incorrect permissions and incorrect configuration of the wireless utility
12. What are biometric devices?
Devices that detect valid users with their physical characteristics.
A backup that archives all selected files regardless of if they have changed since the last backup.
NT Backup
Actively stops computers from accessing the PC
13. What is malicious software installed on a computer with the knowledge or permission of the user?
Set of rules that denies packets that dont meet a certain criteria
Malware
With devices to authenticate users asking for access
Read - write - read and execute - modify - full control
14. What is an incremental backup?
Software that protects and blocks against the IP's of known phishing sites
A backup that archives all files that have changed since the last backup
NT Backup
On a secure tunnel over an unsecure network
15. What does SSID do?
16. What is a software firewall?
A backup that archives all selected files regardless of if they have changed since the last backup.
Read - write - list folder contents - read and execute - modify
Malware
An application that filters data packets - uses resources of the pcm potentially slowing it
17. Most popular hashing algorithms?
Incorrect permissions and incorrect configuration of the wireless utility
SHA+MD5
Malware
Software that protects and blocks against the IP's of known phishing sites
18. What is a full backup?
A backup that archives all selected files regardless of if they have changed since the last backup.
With devices to authenticate users asking for access
Read - write - read and execute - modify - full control
NT Backup
19. What products can be used to protect network devices?
Software that protects and blocks against the IP's of known phishing sites
With devices to authenticate users asking for access
Software firewall - IDs - App and OS patches
SHA+MD5
20. Where should network equipment be housed?
In a locked secure room
Set of rules that denies packets that dont meet a certain criteria
SHA+MD5
NT Backup
21. What are file level permissions?
Malware
Incorrect permissions and incorrect configuration of the wireless utility
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
22. What is a zombie?
23. What questions should you ask to determine security factors?
Devices that detect valid users with their physical characteristics.
Broadcasts the networks name - can be turned off to make network 'disappear'
At home or business - full-time internet access - laptop or desktop?
Software that protects and blocks against the IP's of known phishing sites