SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a full backup?
Software firewall - IDs - App and OS patches
SHA+MD5
A backup that archives all files that have changed since the last backup
A backup that archives all selected files regardless of if they have changed since the last backup.
2. What is a software firewall?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all selected files regardless of if they have changed since the last backup.
An application that filters data packets - uses resources of the pcm potentially slowing it
Software firewall - IDs - App and OS patches
3. What is packet filtering?
Malware
Read - write - list folder contents - read and execute - modify
Devices that detect valid users with their physical characteristics.
Set of rules that denies packets that dont meet a certain criteria
4. How can you protect your data?
On a secure tunnel over an unsecure network
With devices to authenticate users asking for access
Set of rules that denies packets that dont meet a certain criteria
Ensures messages are not corrupted or tampered with
5. What is two factor security?
NT Backup
An application that filters data packets - uses resources of the pcm potentially slowing it
Read - write - read and execute - modify - full control
Physical+Data security
6. What is hash encoding?
Ensures messages are not corrupted or tampered with
Broadcasts the networks name - can be turned off to make network 'disappear'
WEP
With devices to authenticate users asking for access
7. What is phishing protection software?
8. Where should network equipment be housed?
Broadcasts the networks name - can be turned off to make network 'disappear'
With devices to authenticate users asking for access
At home or business - full-time internet access - laptop or desktop?
In a locked secure room
9. What is the command in a batch file to do a backup?
NT Backup
With devices to authenticate users asking for access
Broadcasts the networks name - can be turned off to make network 'disappear'
A backup that archives all files that have changed since the last backup
10. What folder level permissions are available?
SHA+MD5
An application that filters data packets - uses resources of the pcm potentially slowing it
Physical+Data security
Read - write - list folder contents - read and execute - modify
11. What are file level permissions?
Incorrect permissions and incorrect configuration of the wireless utility
WEP
Read - write - read and execute - modify - full control
In a locked secure room
12. What is a zombie?
13. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
WEP
Ensures messages are not corrupted or tampered with
At home or business - full-time internet access - laptop or desktop?
14. Which wireles tool uses a 64-bit or 128-bit incryption key?
Set of rules that denies packets that dont meet a certain criteria
Software firewall - IDs - App and OS patches
Read - write - read and execute - modify - full control
WEP
15. What does SSID do?
16. What are biometric devices?
Ensures messages are not corrupted or tampered with
Software firewall - IDs - App and OS patches
Devices that detect valid users with their physical characteristics.
Malware
17. Most popular hashing algorithms?
Incorrect permissions and incorrect configuration of the wireless utility
Broadcasts the networks name - can be turned off to make network 'disappear'
In a locked secure room
SHA+MD5
18. What questions should you ask to determine security factors?
Physical+Data security
With devices to authenticate users asking for access
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
19. What is an incremental backup?
Malware
Software firewall - IDs - App and OS patches
On a secure tunnel over an unsecure network
A backup that archives all files that have changed since the last backup
20. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
At home or business - full-time internet access - laptop or desktop?
A backup that archives all selected files regardless of if they have changed since the last backup.
Actively stops computers from accessing the PC
21. What does a firewall do?
A backup that archives all files that have changed since the last backup
Devices that detect valid users with their physical characteristics.
Actively stops computers from accessing the PC
NT Backup
22. What products can be used to protect network devices?
Software firewall - IDs - App and OS patches
Devices that detect valid users with their physical characteristics.
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
23. When is VPN (virtual private network) used?
With devices to authenticate users asking for access
Software firewall - IDs - App and OS patches
Physical+Data security
On a secure tunnel over an unsecure network