SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
Read - write - read and execute - modify - full control
SHA+MD5
Software firewall - IDs - App and OS patches
2. What is a full backup?
Broadcasts the networks name - can be turned off to make network 'disappear'
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all selected files regardless of if they have changed since the last backup.
Actively stops computers from accessing the PC
3. What is packet filtering?
Actively stops computers from accessing the PC
Read - write - list folder contents - read and execute - modify
Set of rules that denies packets that dont meet a certain criteria
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
4. Where should network equipment be housed?
With devices to authenticate users asking for access
In a locked secure room
WEP
A backup that archives all files that have changed since the last backup
5. What is an incremental backup?
A backup that archives all files that have changed since the last backup
Actively stops computers from accessing the PC
An application that filters data packets - uses resources of the pcm potentially slowing it
WEP
6. What is a software firewall?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Malware
At home or business - full-time internet access - laptop or desktop?
An application that filters data packets - uses resources of the pcm potentially slowing it
7. What does SSID do?
8. Most popular hashing algorithms?
Devices that detect valid users with their physical characteristics.
SHA+MD5
Read - write - list folder contents - read and execute - modify
In a locked secure room
9. What products can be used to protect network devices?
WEP
Software firewall - IDs - App and OS patches
NT Backup
Devices that detect valid users with their physical characteristics.
10. Which wireles tool uses a 64-bit or 128-bit incryption key?
WEP
NT Backup
On a secure tunnel over an unsecure network
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
11. When is VPN (virtual private network) used?
On a secure tunnel over an unsecure network
Read - write - read and execute - modify - full control
A backup that archives all files that have changed since the last backup
Devices that detect valid users with their physical characteristics.
12. What are biometric devices?
Software firewall - IDs - App and OS patches
Devices that detect valid users with their physical characteristics.
With devices to authenticate users asking for access
Actively stops computers from accessing the PC
13. What are file level permissions?
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
14. What is hash encoding?
NT Backup
A backup that archives all files that have changed since the last backup
Software that protects and blocks against the IP's of known phishing sites
Ensures messages are not corrupted or tampered with
15. What are two common security errors?
Read - write - list folder contents - read and execute - modify
Devices that detect valid users with their physical characteristics.
Software firewall - IDs - App and OS patches
Incorrect permissions and incorrect configuration of the wireless utility
16. What is the command in a batch file to do a backup?
With devices to authenticate users asking for access
NT Backup
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Physical+Data security
17. What questions should you ask to determine security factors?
Malware
Software that protects and blocks against the IP's of known phishing sites
On a secure tunnel over an unsecure network
At home or business - full-time internet access - laptop or desktop?
18. What is a zombie?
19. How can you protect your data?
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
Devices that detect valid users with their physical characteristics.
A backup that archives all files that have changed since the last backup
20. What is two factor security?
Malware
An application that filters data packets - uses resources of the pcm potentially slowing it
Physical+Data security
Broadcasts the networks name - can be turned off to make network 'disappear'
21. What does a firewall do?
Actively stops computers from accessing the PC
Physical+Data security
Software firewall - IDs - App and OS patches
NT Backup
22. What is phishing protection software?
23. What folder level permissions are available?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
An application that filters data packets - uses resources of the pcm potentially slowing it
Read - write - list folder contents - read and execute - modify