SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is hash encoding?
Devices that detect valid users with their physical characteristics.
A backup that archives all files that have changed since the last backup
Ensures messages are not corrupted or tampered with
Software that protects and blocks against the IP's of known phishing sites
2. When is VPN (virtual private network) used?
On a secure tunnel over an unsecure network
NT Backup
Software that protects and blocks against the IP's of known phishing sites
With devices to authenticate users asking for access
3. What products can be used to protect network devices?
Software firewall - IDs - App and OS patches
Incorrect permissions and incorrect configuration of the wireless utility
With devices to authenticate users asking for access
NT Backup
4. What are two common security errors?
In a locked secure room
Incorrect permissions and incorrect configuration of the wireless utility
Software firewall - IDs - App and OS patches
WEP
5. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
WEP
A backup that archives all files that have changed since the last backup
Incorrect permissions and incorrect configuration of the wireless utility
6. What is an incremental backup?
On a secure tunnel over an unsecure network
Actively stops computers from accessing the PC
A backup that archives all files that have changed since the last backup
Software firewall - IDs - App and OS patches
7. Where should network equipment be housed?
A backup that archives all files that have changed since the last backup
NT Backup
Read - write - read and execute - modify - full control
In a locked secure room
8. What is two factor security?
NT Backup
Set of rules that denies packets that dont meet a certain criteria
Physical+Data security
On a secure tunnel over an unsecure network
9. What are biometric devices?
Devices that detect valid users with their physical characteristics.
Malware
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all files that have changed since the last backup
10. What does a firewall do?
On a secure tunnel over an unsecure network
In a locked secure room
Software firewall - IDs - App and OS patches
Actively stops computers from accessing the PC
11. What is the command in a batch file to do a backup?
NT Backup
With devices to authenticate users asking for access
Actively stops computers from accessing the PC
Malware
12. Most popular hashing algorithms?
Actively stops computers from accessing the PC
SHA+MD5
An application that filters data packets - uses resources of the pcm potentially slowing it
Software firewall - IDs - App and OS patches
13. What questions should you ask to determine security factors?
A backup that archives all selected files regardless of if they have changed since the last backup.
At home or business - full-time internet access - laptop or desktop?
Devices that detect valid users with their physical characteristics.
With devices to authenticate users asking for access
14. What is malicious software installed on a computer with the knowledge or permission of the user?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
Malware
15. What is phishing protection software?
16. Which wireles tool uses a 64-bit or 128-bit incryption key?
WEP
SHA+MD5
A backup that archives all files that have changed since the last backup
Physical+Data security
17. What is a full backup?
NT Backup
Malware
A backup that archives all selected files regardless of if they have changed since the last backup.
Read - write - read and execute - modify - full control
18. What is a zombie?
19. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
Malware
Read - write - list folder contents - read and execute - modify
A backup that archives all files that have changed since the last backup
20. What are file level permissions?
Read - write - read and execute - modify - full control
NT Backup
Broadcasts the networks name - can be turned off to make network 'disappear'
Set of rules that denies packets that dont meet a certain criteria
21. How can you protect your data?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
With devices to authenticate users asking for access
Ensures messages are not corrupted or tampered with
SHA+MD5
22. What does SSID do?
23. What is a software firewall?
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all files that have changed since the last backup
With devices to authenticate users asking for access
WEP