SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. What is a software firewall?
A backup that archives all files that have changed since the last backup
Actively stops computers from accessing the PC
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all selected files regardless of if they have changed since the last backup.
3. What are biometric devices?
Malware
Devices that detect valid users with their physical characteristics.
Incorrect permissions and incorrect configuration of the wireless utility
Software that protects and blocks against the IP's of known phishing sites
4. What is two factor security?
Physical+Data security
In a locked secure room
Devices that detect valid users with their physical characteristics.
NT Backup
5. Most popular hashing algorithms?
Actively stops computers from accessing the PC
Broadcasts the networks name - can be turned off to make network 'disappear'
SHA+MD5
A backup that archives all files that have changed since the last backup
6. What questions should you ask to determine security factors?
At home or business - full-time internet access - laptop or desktop?
Ensures messages are not corrupted or tampered with
Incorrect permissions and incorrect configuration of the wireless utility
WEP
7. What is an incremental backup?
A backup that archives all files that have changed since the last backup
At home or business - full-time internet access - laptop or desktop?
Physical+Data security
Broadcasts the networks name - can be turned off to make network 'disappear'
8. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
At home or business - full-time internet access - laptop or desktop?
SHA+MD5
Physical+Data security
9. What is hash encoding?
In a locked secure room
WEP
Malware
Ensures messages are not corrupted or tampered with
10. What are file level permissions?
Read - write - read and execute - modify - full control
At home or business - full-time internet access - laptop or desktop?
Broadcasts the networks name - can be turned off to make network 'disappear'
NT Backup
11. What is a full backup?
Read - write - list folder contents - read and execute - modify
Set of rules that denies packets that dont meet a certain criteria
In a locked secure room
A backup that archives all selected files regardless of if they have changed since the last backup.
12. What is malicious software installed on a computer with the knowledge or permission of the user?
Actively stops computers from accessing the PC
At home or business - full-time internet access - laptop or desktop?
With devices to authenticate users asking for access
Malware
13. How can you protect your data?
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
Ensures messages are not corrupted or tampered with
Software that protects and blocks against the IP's of known phishing sites
14. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
On a secure tunnel over an unsecure network
Set of rules that denies packets that dont meet a certain criteria
SHA+MD5
15. What does a firewall do?
On a secure tunnel over an unsecure network
A backup that archives all selected files regardless of if they have changed since the last backup.
Devices that detect valid users with their physical characteristics.
Actively stops computers from accessing the PC
16. Which wireles tool uses a 64-bit or 128-bit incryption key?
Software that protects and blocks against the IP's of known phishing sites
Software firewall - IDs - App and OS patches
WEP
Ensures messages are not corrupted or tampered with
17. What products can be used to protect network devices?
Incorrect permissions and incorrect configuration of the wireless utility
Software firewall - IDs - App and OS patches
A backup that archives all files that have changed since the last backup
WEP
18. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
Broadcasts the networks name - can be turned off to make network 'disappear'
A backup that archives all selected files regardless of if they have changed since the last backup.
Software that protects and blocks against the IP's of known phishing sites
20. Where should network equipment be housed?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
NT Backup
Read - write - list folder contents - read and execute - modify
In a locked secure room
21. What is the command in a batch file to do a backup?
A backup that archives all files that have changed since the last backup
Software that protects and blocks against the IP's of known phishing sites
Incorrect permissions and incorrect configuration of the wireless utility
NT Backup
22. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. When is VPN (virtual private network) used?
In a locked secure room
On a secure tunnel over an unsecure network
Physical+Data security
Set of rules that denies packets that dont meet a certain criteria
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests