SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What questions should you ask to determine security factors?
Physical+Data security
NT Backup
At home or business - full-time internet access - laptop or desktop?
Software that protects and blocks against the IP's of known phishing sites
2. What is two factor security?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
On a secure tunnel over an unsecure network
Devices that detect valid users with their physical characteristics.
Physical+Data security
3. What does a firewall do?
Incorrect permissions and incorrect configuration of the wireless utility
An application that filters data packets - uses resources of the pcm potentially slowing it
On a secure tunnel over an unsecure network
Actively stops computers from accessing the PC
4. What is packet filtering?
With devices to authenticate users asking for access
Ensures messages are not corrupted or tampered with
Set of rules that denies packets that dont meet a certain criteria
Actively stops computers from accessing the PC
5. What is hash encoding?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Devices that detect valid users with their physical characteristics.
A backup that archives all selected files regardless of if they have changed since the last backup.
Ensures messages are not corrupted or tampered with
6. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Where should network equipment be housed?
Devices that detect valid users with their physical characteristics.
NT Backup
Read - write - list folder contents - read and execute - modify
In a locked secure room
8. What is a full backup?
Set of rules that denies packets that dont meet a certain criteria
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Read - write - read and execute - modify - full control
A backup that archives all selected files regardless of if they have changed since the last backup.
9. What is an incremental backup?
Malware
With devices to authenticate users asking for access
Read - write - list folder contents - read and execute - modify
A backup that archives all files that have changed since the last backup
10. What is a software firewall?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
11. When is VPN (virtual private network) used?
Actively stops computers from accessing the PC
On a secure tunnel over an unsecure network
Incorrect permissions and incorrect configuration of the wireless utility
Physical+Data security
12. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
Physical+Data security
Ensures messages are not corrupted or tampered with
Software firewall - IDs - App and OS patches
13. What is the command in a batch file to do a backup?
Software firewall - IDs - App and OS patches
NT Backup
Incorrect permissions and incorrect configuration of the wireless utility
Read - write - list folder contents - read and execute - modify
14. How can you protect your data?
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
With devices to authenticate users asking for access
15. Most popular hashing algorithms?
SHA+MD5
Incorrect permissions and incorrect configuration of the wireless utility
Physical+Data security
Software that protects and blocks against the IP's of known phishing sites
16. What are biometric devices?
With devices to authenticate users asking for access
Software that protects and blocks against the IP's of known phishing sites
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Devices that detect valid users with their physical characteristics.
17. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
WEP
In a locked secure room
On a secure tunnel over an unsecure network
18. What products can be used to protect network devices?
With devices to authenticate users asking for access
Software firewall - IDs - App and OS patches
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all selected files regardless of if they have changed since the last backup.
19. What folder level permissions are available?
Actively stops computers from accessing the PC
Set of rules that denies packets that dont meet a certain criteria
Incorrect permissions and incorrect configuration of the wireless utility
Read - write - list folder contents - read and execute - modify
20. What are file level permissions?
Malware
With devices to authenticate users asking for access
Read - write - read and execute - modify - full control
Devices that detect valid users with their physical characteristics.
21. Which wireles tool uses a 64-bit or 128-bit incryption key?
Incorrect permissions and incorrect configuration of the wireless utility
An application that filters data packets - uses resources of the pcm potentially slowing it
WEP
Software that protects and blocks against the IP's of known phishing sites
22. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183