SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What questions should you ask to determine security factors?
At home or business - full-time internet access - laptop or desktop?
Ensures messages are not corrupted or tampered with
In a locked secure room
With devices to authenticate users asking for access
2. Which wireles tool uses a 64-bit or 128-bit incryption key?
Actively stops computers from accessing the PC
With devices to authenticate users asking for access
WEP
On a secure tunnel over an unsecure network
3. When is VPN (virtual private network) used?
Software firewall - IDs - App and OS patches
At home or business - full-time internet access - laptop or desktop?
An application that filters data packets - uses resources of the pcm potentially slowing it
On a secure tunnel over an unsecure network
4. What is the command in a batch file to do a backup?
SHA+MD5
NT Backup
WEP
Read - write - list folder contents - read and execute - modify
5. How can you protect your data?
Software firewall - IDs - App and OS patches
With devices to authenticate users asking for access
An application that filters data packets - uses resources of the pcm potentially slowing it
Ensures messages are not corrupted or tampered with
6. Most popular hashing algorithms?
On a secure tunnel over an unsecure network
An application that filters data packets - uses resources of the pcm potentially slowing it
SHA+MD5
Devices that detect valid users with their physical characteristics.
7. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
A backup that archives all files that have changed since the last backup
Set of rules that denies packets that dont meet a certain criteria
Physical+Data security
9. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
Malware
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
10. What products can be used to protect network devices?
In a locked secure room
Software firewall - IDs - App and OS patches
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
11. Where should network equipment be housed?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
On a secure tunnel over an unsecure network
In a locked secure room
Software firewall - IDs - App and OS patches
12. What is hash encoding?
Incorrect permissions and incorrect configuration of the wireless utility
Read - write - read and execute - modify - full control
Ensures messages are not corrupted or tampered with
Software firewall - IDs - App and OS patches
13. What are two common security errors?
NT Backup
Incorrect permissions and incorrect configuration of the wireless utility
On a secure tunnel over an unsecure network
Physical+Data security
14. What are file level permissions?
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
Set of rules that denies packets that dont meet a certain criteria
Ensures messages are not corrupted or tampered with
15. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
Software firewall - IDs - App and OS patches
At home or business - full-time internet access - laptop or desktop?
NT Backup
17. What is an incremental backup?
A backup that archives all files that have changed since the last backup
With devices to authenticate users asking for access
At home or business - full-time internet access - laptop or desktop?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
18. What is a full backup?
WEP
Software that protects and blocks against the IP's of known phishing sites
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
19. What is a software firewall?
Ensures messages are not corrupted or tampered with
Actively stops computers from accessing the PC
NT Backup
An application that filters data packets - uses resources of the pcm potentially slowing it
20. What is two factor security?
Set of rules that denies packets that dont meet a certain criteria
An application that filters data packets - uses resources of the pcm potentially slowing it
Physical+Data security
WEP
21. What does a firewall do?
Actively stops computers from accessing the PC
Physical+Data security
Devices that detect valid users with their physical characteristics.
Set of rules that denies packets that dont meet a certain criteria
22. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. What are biometric devices?
Devices that detect valid users with their physical characteristics.
Read - write - read and execute - modify - full control
An application that filters data packets - uses resources of the pcm potentially slowing it
Ensures messages are not corrupted or tampered with