SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which wireles tool uses a 64-bit or 128-bit incryption key?
An application that filters data packets - uses resources of the pcm potentially slowing it
WEP
Read - write - list folder contents - read and execute - modify
Broadcasts the networks name - can be turned off to make network 'disappear'
2. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
Read - write - read and execute - modify - full control
3. What are two common security errors?
An application that filters data packets - uses resources of the pcm potentially slowing it
With devices to authenticate users asking for access
A backup that archives all files that have changed since the last backup
Incorrect permissions and incorrect configuration of the wireless utility
4. What does SSID do?
5. What does a firewall do?
Set of rules that denies packets that dont meet a certain criteria
Read - write - list folder contents - read and execute - modify
Actively stops computers from accessing the PC
NT Backup
6. What is a full backup?
At home or business - full-time internet access - laptop or desktop?
A backup that archives all selected files regardless of if they have changed since the last backup.
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
7. What is an incremental backup?
A backup that archives all files that have changed since the last backup
With devices to authenticate users asking for access
Read - write - list folder contents - read and execute - modify
Malware
8. What questions should you ask to determine security factors?
An application that filters data packets - uses resources of the pcm potentially slowing it
At home or business - full-time internet access - laptop or desktop?
Software that protects and blocks against the IP's of known phishing sites
Read - write - list folder contents - read and execute - modify
9. Where should network equipment be housed?
Software that protects and blocks against the IP's of known phishing sites
Incorrect permissions and incorrect configuration of the wireless utility
In a locked secure room
Set of rules that denies packets that dont meet a certain criteria
10. What is a zombie?
11. When is VPN (virtual private network) used?
On a secure tunnel over an unsecure network
With devices to authenticate users asking for access
SHA+MD5
Broadcasts the networks name - can be turned off to make network 'disappear'
12. What are file level permissions?
On a secure tunnel over an unsecure network
NT Backup
Read - write - read and execute - modify - full control
Incorrect permissions and incorrect configuration of the wireless utility
13. What is phishing protection software?
14. How can you protect your data?
A backup that archives all selected files regardless of if they have changed since the last backup.
Devices that detect valid users with their physical characteristics.
With devices to authenticate users asking for access
WEP
15. What is the command in a batch file to do a backup?
A backup that archives all files that have changed since the last backup
NT Backup
Physical+Data security
Actively stops computers from accessing the PC
16. What are biometric devices?
At home or business - full-time internet access - laptop or desktop?
NT Backup
A backup that archives all selected files regardless of if they have changed since the last backup.
Devices that detect valid users with their physical characteristics.
17. What is malicious software installed on a computer with the knowledge or permission of the user?
Software firewall - IDs - App and OS patches
Actively stops computers from accessing the PC
Read - write - list folder contents - read and execute - modify
Malware
18. What is two factor security?
Read - write - list folder contents - read and execute - modify
Physical+Data security
Devices that detect valid users with their physical characteristics.
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
19. Most popular hashing algorithms?
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
SHA+MD5
A backup that archives all files that have changed since the last backup
20. What products can be used to protect network devices?
SHA+MD5
Incorrect permissions and incorrect configuration of the wireless utility
Software firewall - IDs - App and OS patches
At home or business - full-time internet access - laptop or desktop?
21. What is hash encoding?
On a secure tunnel over an unsecure network
Software firewall - IDs - App and OS patches
Read - write - list folder contents - read and execute - modify
Ensures messages are not corrupted or tampered with
22. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
Read - write - list folder contents - read and execute - modify
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Software that protects and blocks against the IP's of known phishing sites
23. What is a software firewall?
Ensures messages are not corrupted or tampered with
At home or business - full-time internet access - laptop or desktop?
An application that filters data packets - uses resources of the pcm potentially slowing it
Incorrect permissions and incorrect configuration of the wireless utility