SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does a firewall do?
Software that protects and blocks against the IP's of known phishing sites
Actively stops computers from accessing the PC
Incorrect permissions and incorrect configuration of the wireless utility
SHA+MD5
2. What is the command in a batch file to do a backup?
Set of rules that denies packets that dont meet a certain criteria
NT Backup
A backup that archives all selected files regardless of if they have changed since the last backup.
At home or business - full-time internet access - laptop or desktop?
3. What are file level permissions?
Software firewall - IDs - App and OS patches
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Read - write - read and execute - modify - full control
Devices that detect valid users with their physical characteristics.
4. What is a software firewall?
An application that filters data packets - uses resources of the pcm potentially slowing it
Read - write - read and execute - modify - full control
Software firewall - IDs - App and OS patches
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
5. What is an incremental backup?
In a locked secure room
Software firewall - IDs - App and OS patches
A backup that archives all files that have changed since the last backup
On a secure tunnel over an unsecure network
6. How can you protect your data?
Physical+Data security
An application that filters data packets - uses resources of the pcm potentially slowing it
Incorrect permissions and incorrect configuration of the wireless utility
With devices to authenticate users asking for access
7. What products can be used to protect network devices?
Broadcasts the networks name - can be turned off to make network 'disappear'
With devices to authenticate users asking for access
Incorrect permissions and incorrect configuration of the wireless utility
Software firewall - IDs - App and OS patches
8. What is malicious software installed on a computer with the knowledge or permission of the user?
In a locked secure room
Software that protects and blocks against the IP's of known phishing sites
Malware
An application that filters data packets - uses resources of the pcm potentially slowing it
9. What questions should you ask to determine security factors?
A backup that archives all selected files regardless of if they have changed since the last backup.
Read - write - list folder contents - read and execute - modify
Broadcasts the networks name - can be turned off to make network 'disappear'
At home or business - full-time internet access - laptop or desktop?
10. Which wireles tool uses a 64-bit or 128-bit incryption key?
WEP
A backup that archives all files that have changed since the last backup
Broadcasts the networks name - can be turned off to make network 'disappear'
On a secure tunnel over an unsecure network
11. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
Broadcasts the networks name - can be turned off to make network 'disappear'
Incorrect permissions and incorrect configuration of the wireless utility
Software firewall - IDs - App and OS patches
12. Most popular hashing algorithms?
SHA+MD5
Software that protects and blocks against the IP's of known phishing sites
Actively stops computers from accessing the PC
NT Backup
13. What is hash encoding?
A backup that archives all files that have changed since the last backup
An application that filters data packets - uses resources of the pcm potentially slowing it
Ensures messages are not corrupted or tampered with
In a locked secure room
14. What is two factor security?
Software that protects and blocks against the IP's of known phishing sites
Actively stops computers from accessing the PC
An application that filters data packets - uses resources of the pcm potentially slowing it
Physical+Data security
15. Where should network equipment be housed?
NT Backup
In a locked secure room
Malware
With devices to authenticate users asking for access
16. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What is a full backup?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
A backup that archives all selected files regardless of if they have changed since the last backup.
Ensures messages are not corrupted or tampered with
Read - write - read and execute - modify - full control
19. When is VPN (virtual private network) used?
A backup that archives all files that have changed since the last backup
Broadcasts the networks name - can be turned off to make network 'disappear'
On a secure tunnel over an unsecure network
Software that protects and blocks against the IP's of known phishing sites
20. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. What are biometric devices?
Broadcasts the networks name - can be turned off to make network 'disappear'
WEP
Devices that detect valid users with their physical characteristics.
A backup that archives all selected files regardless of if they have changed since the last backup.
22. What is packet filtering?
Read - write - read and execute - modify - full control
Devices that detect valid users with their physical characteristics.
Ensures messages are not corrupted or tampered with
Set of rules that denies packets that dont meet a certain criteria
23. What are two common security errors?
Software firewall - IDs - App and OS patches
Read - write - list folder contents - read and execute - modify
Incorrect permissions and incorrect configuration of the wireless utility
NT Backup