SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is malicious software installed on a computer with the knowledge or permission of the user?
At home or business - full-time internet access - laptop or desktop?
Software that protects and blocks against the IP's of known phishing sites
NT Backup
Malware
2. What are two common security errors?
A backup that archives all files that have changed since the last backup
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Incorrect permissions and incorrect configuration of the wireless utility
In a locked secure room
3. Most popular hashing algorithms?
Devices that detect valid users with their physical characteristics.
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
SHA+MD5
In a locked secure room
4. What is hash encoding?
Broadcasts the networks name - can be turned off to make network 'disappear'
On a secure tunnel over an unsecure network
Ensures messages are not corrupted or tampered with
A backup that archives all files that have changed since the last backup
5. What questions should you ask to determine security factors?
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
At home or business - full-time internet access - laptop or desktop?
Malware
6. Where should network equipment be housed?
Read - write - read and execute - modify - full control
Ensures messages are not corrupted or tampered with
In a locked secure room
Read - write - list folder contents - read and execute - modify
7. What is an incremental backup?
Devices that detect valid users with their physical characteristics.
Ensures messages are not corrupted or tampered with
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all files that have changed since the last backup
8. How can you protect your data?
Devices that detect valid users with their physical characteristics.
NT Backup
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
With devices to authenticate users asking for access
9. What is a zombie?
10. What does SSID do?
11. What is the command in a batch file to do a backup?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Malware
NT Backup
A backup that archives all files that have changed since the last backup
12. Which wireles tool uses a 64-bit or 128-bit incryption key?
Actively stops computers from accessing the PC
WEP
Malware
Software firewall - IDs - App and OS patches
13. What does a firewall do?
Read - write - list folder contents - read and execute - modify
Actively stops computers from accessing the PC
A backup that archives all selected files regardless of if they have changed since the last backup.
Software firewall - IDs - App and OS patches
14. What products can be used to protect network devices?
In a locked secure room
A backup that archives all files that have changed since the last backup
Software firewall - IDs - App and OS patches
NT Backup
15. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
Actively stops computers from accessing the PC
With devices to authenticate users asking for access
A backup that archives all files that have changed since the last backup
16. When is VPN (virtual private network) used?
SHA+MD5
Devices that detect valid users with their physical characteristics.
On a secure tunnel over an unsecure network
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
17. What are biometric devices?
Devices that detect valid users with their physical characteristics.
Software firewall - IDs - App and OS patches
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
On a secure tunnel over an unsecure network
18. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
Read - write - read and execute - modify - full control
Devices that detect valid users with their physical characteristics.
In a locked secure room
19. What is two factor security?
Physical+Data security
Broadcasts the networks name - can be turned off to make network 'disappear'
A backup that archives all selected files regardless of if they have changed since the last backup.
WEP
20. What are file level permissions?
Read - write - read and execute - modify - full control
Set of rules that denies packets that dont meet a certain criteria
Incorrect permissions and incorrect configuration of the wireless utility
With devices to authenticate users asking for access
21. What is a software firewall?
Software firewall - IDs - App and OS patches
An application that filters data packets - uses resources of the pcm potentially slowing it
Actively stops computers from accessing the PC
Ensures messages are not corrupted or tampered with
22. What is a full backup?
Software that protects and blocks against the IP's of known phishing sites
A backup that archives all selected files regardless of if they have changed since the last backup.
Ensures messages are not corrupted or tampered with
Actively stops computers from accessing the PC
23. What is phishing protection software?