SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. What is two factor security?
Physical+Data security
NT Backup
A backup that archives all files that have changed since the last backup
Read - write - list folder contents - read and execute - modify
3. What is an incremental backup?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
NT Backup
Malware
4. What is hash encoding?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Ensures messages are not corrupted or tampered with
Software that protects and blocks against the IP's of known phishing sites
With devices to authenticate users asking for access
5. What is the command in a batch file to do a backup?
NT Backup
Set of rules that denies packets that dont meet a certain criteria
Read - write - list folder contents - read and execute - modify
Devices that detect valid users with their physical characteristics.
6. What does a firewall do?
Read - write - read and execute - modify - full control
At home or business - full-time internet access - laptop or desktop?
WEP
Actively stops computers from accessing the PC
7. What are two common security errors?
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
In a locked secure room
Incorrect permissions and incorrect configuration of the wireless utility
8. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. What are biometric devices?
Ensures messages are not corrupted or tampered with
Devices that detect valid users with their physical characteristics.
In a locked secure room
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
10. What is packet filtering?
Read - write - read and execute - modify - full control
Set of rules that denies packets that dont meet a certain criteria
WEP
Read - write - list folder contents - read and execute - modify
11. What is a software firewall?
WEP
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Physical+Data security
An application that filters data packets - uses resources of the pcm potentially slowing it
12. Most popular hashing algorithms?
At home or business - full-time internet access - laptop or desktop?
SHA+MD5
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
13. Which wireles tool uses a 64-bit or 128-bit incryption key?
Actively stops computers from accessing the PC
WEP
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
In a locked secure room
14. What are file level permissions?
Physical+Data security
Read - write - read and execute - modify - full control
Software that protects and blocks against the IP's of known phishing sites
In a locked secure room
15. What is a full backup?
Software firewall - IDs - App and OS patches
A backup that archives all selected files regardless of if they have changed since the last backup.
Software that protects and blocks against the IP's of known phishing sites
Actively stops computers from accessing the PC
16. What questions should you ask to determine security factors?
At home or business - full-time internet access - laptop or desktop?
Software firewall - IDs - App and OS patches
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
17. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What is malicious software installed on a computer with the knowledge or permission of the user?
An application that filters data packets - uses resources of the pcm potentially slowing it
With devices to authenticate users asking for access
Malware
Devices that detect valid users with their physical characteristics.
19. What products can be used to protect network devices?
NT Backup
Software firewall - IDs - App and OS patches
An application that filters data packets - uses resources of the pcm potentially slowing it
Devices that detect valid users with their physical characteristics.
20. How can you protect your data?
NT Backup
Devices that detect valid users with their physical characteristics.
With devices to authenticate users asking for access
An application that filters data packets - uses resources of the pcm potentially slowing it
21. What folder level permissions are available?
With devices to authenticate users asking for access
A backup that archives all files that have changed since the last backup
Set of rules that denies packets that dont meet a certain criteria
Read - write - list folder contents - read and execute - modify
22. Where should network equipment be housed?
With devices to authenticate users asking for access
In a locked secure room
A backup that archives all selected files regardless of if they have changed since the last backup.
Devices that detect valid users with their physical characteristics.
23. When is VPN (virtual private network) used?
Malware
On a secure tunnel over an unsecure network
Ensures messages are not corrupted or tampered with
Read - write - list folder contents - read and execute - modify