SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
SHA+MD5
Read - write - list folder contents - read and execute - modify
In a locked secure room
2. Which wireles tool uses a 64-bit or 128-bit incryption key?
WEP
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
An application that filters data packets - uses resources of the pcm potentially slowing it
Software that protects and blocks against the IP's of known phishing sites
3. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
In a locked secure room
NT Backup
Ensures messages are not corrupted or tampered with
4. When is VPN (virtual private network) used?
Software that protects and blocks against the IP's of known phishing sites
On a secure tunnel over an unsecure network
SHA+MD5
Incorrect permissions and incorrect configuration of the wireless utility
5. What folder level permissions are available?
Broadcasts the networks name - can be turned off to make network 'disappear'
With devices to authenticate users asking for access
A backup that archives all files that have changed since the last backup
Read - write - list folder contents - read and execute - modify
6. What is hash encoding?
A backup that archives all selected files regardless of if they have changed since the last backup.
With devices to authenticate users asking for access
Broadcasts the networks name - can be turned off to make network 'disappear'
Ensures messages are not corrupted or tampered with
7. What is a software firewall?
An application that filters data packets - uses resources of the pcm potentially slowing it
SHA+MD5
With devices to authenticate users asking for access
NT Backup
8. What is an incremental backup?
A backup that archives all selected files regardless of if they have changed since the last backup.
Software firewall - IDs - App and OS patches
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all files that have changed since the last backup
9. How can you protect your data?
With devices to authenticate users asking for access
Physical+Data security
At home or business - full-time internet access - laptop or desktop?
On a secure tunnel over an unsecure network
10. What is a full backup?
SHA+MD5
On a secure tunnel over an unsecure network
A backup that archives all selected files regardless of if they have changed since the last backup.
With devices to authenticate users asking for access
11. What products can be used to protect network devices?
Read - write - list folder contents - read and execute - modify
An application that filters data packets - uses resources of the pcm potentially slowing it
Incorrect permissions and incorrect configuration of the wireless utility
Software firewall - IDs - App and OS patches
12. What is two factor security?
Physical+Data security
Ensures messages are not corrupted or tampered with
WEP
Read - write - read and execute - modify - full control
13. What is the command in a batch file to do a backup?
NT Backup
A backup that archives all selected files regardless of if they have changed since the last backup.
SHA+MD5
An application that filters data packets - uses resources of the pcm potentially slowing it
14. What does SSID do?
15. What are biometric devices?
Malware
Incorrect permissions and incorrect configuration of the wireless utility
Devices that detect valid users with their physical characteristics.
A backup that archives all selected files regardless of if they have changed since the last backup.
16. Where should network equipment be housed?
In a locked secure room
At home or business - full-time internet access - laptop or desktop?
Malware
With devices to authenticate users asking for access
17. What does a firewall do?
Actively stops computers from accessing the PC
Ensures messages are not corrupted or tampered with
A backup that archives all files that have changed since the last backup
With devices to authenticate users asking for access
18. What is a zombie?
19. Most popular hashing algorithms?
Incorrect permissions and incorrect configuration of the wireless utility
Software firewall - IDs - App and OS patches
SHA+MD5
Set of rules that denies packets that dont meet a certain criteria
20. What questions should you ask to determine security factors?
At home or business - full-time internet access - laptop or desktop?
A backup that archives all files that have changed since the last backup
Malware
Software that protects and blocks against the IP's of known phishing sites
21. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
Software that protects and blocks against the IP's of known phishing sites
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Software firewall - IDs - App and OS patches
22. What is phishing protection software?
23. What are file level permissions?
Read - write - read and execute - modify - full control
At home or business - full-time internet access - laptop or desktop?
NT Backup
Software that protects and blocks against the IP's of known phishing sites