SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can you protect your data?
Actively stops computers from accessing the PC
With devices to authenticate users asking for access
Software that protects and blocks against the IP's of known phishing sites
In a locked secure room
2. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
An application that filters data packets - uses resources of the pcm potentially slowing it
NT Backup
Software firewall - IDs - App and OS patches
3. What products can be used to protect network devices?
Read - write - list folder contents - read and execute - modify
SHA+MD5
Software firewall - IDs - App and OS patches
A backup that archives all files that have changed since the last backup
4. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
Ensures messages are not corrupted or tampered with
A backup that archives all selected files regardless of if they have changed since the last backup.
Malware
5. What is two factor security?
An application that filters data packets - uses resources of the pcm potentially slowing it
Read - write - read and execute - modify - full control
WEP
Physical+Data security
6. What folder level permissions are available?
With devices to authenticate users asking for access
Read - write - list folder contents - read and execute - modify
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all files that have changed since the last backup
7. When is VPN (virtual private network) used?
NT Backup
Set of rules that denies packets that dont meet a certain criteria
Actively stops computers from accessing the PC
On a secure tunnel over an unsecure network
8. What are biometric devices?
Devices that detect valid users with their physical characteristics.
Ensures messages are not corrupted or tampered with
NT Backup
SHA+MD5
9. What is a software firewall?
Read - write - list folder contents - read and execute - modify
Software firewall - IDs - App and OS patches
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
10. What is a full backup?
A backup that archives all selected files regardless of if they have changed since the last backup.
SHA+MD5
An application that filters data packets - uses resources of the pcm potentially slowing it
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
11. What does a firewall do?
NT Backup
Incorrect permissions and incorrect configuration of the wireless utility
Actively stops computers from accessing the PC
An application that filters data packets - uses resources of the pcm potentially slowing it
12. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. What are file level permissions?
A backup that archives all selected files regardless of if they have changed since the last backup.
Read - write - read and execute - modify - full control
Read - write - list folder contents - read and execute - modify
A backup that archives all files that have changed since the last backup
14. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. What is an incremental backup?
A backup that archives all files that have changed since the last backup
Read - write - list folder contents - read and execute - modify
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Actively stops computers from accessing the PC
17. Most popular hashing algorithms?
Devices that detect valid users with their physical characteristics.
SHA+MD5
Actively stops computers from accessing the PC
Read - write - list folder contents - read and execute - modify
18. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
Set of rules that denies packets that dont meet a certain criteria
Read - write - list folder contents - read and execute - modify
Software firewall - IDs - App and OS patches
19. What is hash encoding?
Software firewall - IDs - App and OS patches
Devices that detect valid users with their physical characteristics.
Actively stops computers from accessing the PC
Ensures messages are not corrupted or tampered with
20. Where should network equipment be housed?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
In a locked secure room
Devices that detect valid users with their physical characteristics.
Actively stops computers from accessing the PC
21. Which wireles tool uses a 64-bit or 128-bit incryption key?
Physical+Data security
In a locked secure room
WEP
Ensures messages are not corrupted or tampered with
22. What questions should you ask to determine security factors?
In a locked secure room
WEP
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
23. What is the command in a batch file to do a backup?
Physical+Data security
Devices that detect valid users with their physical characteristics.
NT Backup
A backup that archives all selected files regardless of if they have changed since the last backup.