SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What products can be used to protect network devices?
Broadcasts the networks name - can be turned off to make network 'disappear'
At home or business - full-time internet access - laptop or desktop?
NT Backup
Software firewall - IDs - App and OS patches
2. What are biometric devices?
Devices that detect valid users with their physical characteristics.
A backup that archives all selected files regardless of if they have changed since the last backup.
With devices to authenticate users asking for access
Incorrect permissions and incorrect configuration of the wireless utility
3. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. What is two factor security?
Physical+Data security
Broadcasts the networks name - can be turned off to make network 'disappear'
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
An application that filters data packets - uses resources of the pcm potentially slowing it
5. Which wireles tool uses a 64-bit or 128-bit incryption key?
A backup that archives all files that have changed since the last backup
A backup that archives all selected files regardless of if they have changed since the last backup.
In a locked secure room
WEP
6. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Where should network equipment be housed?
Read - write - read and execute - modify - full control
Malware
Actively stops computers from accessing the PC
In a locked secure room
8. What is malicious software installed on a computer with the knowledge or permission of the user?
Devices that detect valid users with their physical characteristics.
WEP
Malware
Broadcasts the networks name - can be turned off to make network 'disappear'
9. How can you protect your data?
NT Backup
Read - write - list folder contents - read and execute - modify
With devices to authenticate users asking for access
Malware
10. What is an incremental backup?
A backup that archives all files that have changed since the last backup
Broadcasts the networks name - can be turned off to make network 'disappear'
Physical+Data security
At home or business - full-time internet access - laptop or desktop?
11. What questions should you ask to determine security factors?
Actively stops computers from accessing the PC
Physical+Data security
A backup that archives all selected files regardless of if they have changed since the last backup.
At home or business - full-time internet access - laptop or desktop?
12. What is packet filtering?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Set of rules that denies packets that dont meet a certain criteria
NT Backup
Software that protects and blocks against the IP's of known phishing sites
13. What does a firewall do?
Set of rules that denies packets that dont meet a certain criteria
Actively stops computers from accessing the PC
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
14. What is the command in a batch file to do a backup?
Physical+Data security
NT Backup
Broadcasts the networks name - can be turned off to make network 'disappear'
Software that protects and blocks against the IP's of known phishing sites
15. Most popular hashing algorithms?
Devices that detect valid users with their physical characteristics.
SHA+MD5
A backup that archives all selected files regardless of if they have changed since the last backup.
Software that protects and blocks against the IP's of known phishing sites
16. What are file level permissions?
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
In a locked secure room
17. What is a software firewall?
Devices that detect valid users with their physical characteristics.
An application that filters data packets - uses resources of the pcm potentially slowing it
SHA+MD5
Physical+Data security
18. What is a full backup?
Malware
With devices to authenticate users asking for access
A backup that archives all selected files regardless of if they have changed since the last backup.
An application that filters data packets - uses resources of the pcm potentially slowing it
19. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
A backup that archives all selected files regardless of if they have changed since the last backup.
Devices that detect valid users with their physical characteristics.
Malware
20. What is hash encoding?
A backup that archives all files that have changed since the last backup
Read - write - list folder contents - read and execute - modify
Devices that detect valid users with their physical characteristics.
Ensures messages are not corrupted or tampered with
21. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
NT Backup
SHA+MD5
WEP
22. When is VPN (virtual private network) used?
Read - write - read and execute - modify - full control
On a secure tunnel over an unsecure network
With devices to authenticate users asking for access
Software that protects and blocks against the IP's of known phishing sites
23. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183