SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When is VPN (virtual private network) used?
On a secure tunnel over an unsecure network
Read - write - read and execute - modify - full control
Actively stops computers from accessing the PC
At home or business - full-time internet access - laptop or desktop?
2. Which wireles tool uses a 64-bit or 128-bit incryption key?
Software firewall - IDs - App and OS patches
Software that protects and blocks against the IP's of known phishing sites
Malware
WEP
3. What are file level permissions?
In a locked secure room
Set of rules that denies packets that dont meet a certain criteria
Incorrect permissions and incorrect configuration of the wireless utility
Read - write - read and execute - modify - full control
4. What products can be used to protect network devices?
Set of rules that denies packets that dont meet a certain criteria
Broadcasts the networks name - can be turned off to make network 'disappear'
Software firewall - IDs - App and OS patches
Actively stops computers from accessing the PC
5. What is a full backup?
Ensures messages are not corrupted or tampered with
A backup that archives all selected files regardless of if they have changed since the last backup.
Set of rules that denies packets that dont meet a certain criteria
Software that protects and blocks against the IP's of known phishing sites
6. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
Software that protects and blocks against the IP's of known phishing sites
WEP
With devices to authenticate users asking for access
7. What does a firewall do?
Physical+Data security
Read - write - read and execute - modify - full control
Actively stops computers from accessing the PC
A backup that archives all selected files regardless of if they have changed since the last backup.
8. Where should network equipment be housed?
NT Backup
Actively stops computers from accessing the PC
In a locked secure room
A backup that archives all selected files regardless of if they have changed since the last backup.
9. What is the command in a batch file to do a backup?
NT Backup
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
A backup that archives all selected files regardless of if they have changed since the last backup.
Physical+Data security
10. What is an incremental backup?
On a secure tunnel over an unsecure network
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
With devices to authenticate users asking for access
11. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. What is a software firewall?
Malware
In a locked secure room
An application that filters data packets - uses resources of the pcm potentially slowing it
On a secure tunnel over an unsecure network
13. What is hash encoding?
NT Backup
Read - write - list folder contents - read and execute - modify
Set of rules that denies packets that dont meet a certain criteria
Ensures messages are not corrupted or tampered with
14. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. How can you protect your data?
Ensures messages are not corrupted or tampered with
With devices to authenticate users asking for access
Actively stops computers from accessing the PC
SHA+MD5
16. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What are two common security errors?
On a secure tunnel over an unsecure network
SHA+MD5
At home or business - full-time internet access - laptop or desktop?
Incorrect permissions and incorrect configuration of the wireless utility
18. What is packet filtering?
Software that protects and blocks against the IP's of known phishing sites
Incorrect permissions and incorrect configuration of the wireless utility
Physical+Data security
Set of rules that denies packets that dont meet a certain criteria
19. What questions should you ask to determine security factors?
Read - write - list folder contents - read and execute - modify
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
A backup that archives all files that have changed since the last backup
At home or business - full-time internet access - laptop or desktop?
20. What is malicious software installed on a computer with the knowledge or permission of the user?
Software firewall - IDs - App and OS patches
At home or business - full-time internet access - laptop or desktop?
Malware
Software that protects and blocks against the IP's of known phishing sites
21. Most popular hashing algorithms?
SHA+MD5
Software firewall - IDs - App and OS patches
Ensures messages are not corrupted or tampered with
WEP
22. What is two factor security?
Read - write - read and execute - modify - full control
Software that protects and blocks against the IP's of known phishing sites
Physical+Data security
Set of rules that denies packets that dont meet a certain criteria
23. What are biometric devices?
Ensures messages are not corrupted or tampered with
Devices that detect valid users with their physical characteristics.
Software that protects and blocks against the IP's of known phishing sites
Malware