SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is malicious software installed on a computer with the knowledge or permission of the user?
Actively stops computers from accessing the PC
Malware
A backup that archives all selected files regardless of if they have changed since the last backup.
Set of rules that denies packets that dont meet a certain criteria
2. What is the command in a batch file to do a backup?
Ensures messages are not corrupted or tampered with
In a locked secure room
NT Backup
With devices to authenticate users asking for access
3. What questions should you ask to determine security factors?
A backup that archives all files that have changed since the last backup
Devices that detect valid users with their physical characteristics.
SHA+MD5
At home or business - full-time internet access - laptop or desktop?
4. What is a zombie?
5. Where should network equipment be housed?
SHA+MD5
Physical+Data security
Devices that detect valid users with their physical characteristics.
In a locked secure room
6. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
Physical+Data security
Devices that detect valid users with their physical characteristics.
In a locked secure room
7. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
A backup that archives all selected files regardless of if they have changed since the last backup.
Physical+Data security
8. What does SSID do?
9. What is hash encoding?
Ensures messages are not corrupted or tampered with
A backup that archives all files that have changed since the last backup
Read - write - read and execute - modify - full control
Actively stops computers from accessing the PC
10. What is packet filtering?
Devices that detect valid users with their physical characteristics.
Malware
Set of rules that denies packets that dont meet a certain criteria
NT Backup
11. What is two factor security?
Physical+Data security
Set of rules that denies packets that dont meet a certain criteria
Read - write - list folder contents - read and execute - modify
In a locked secure room
12. When is VPN (virtual private network) used?
Set of rules that denies packets that dont meet a certain criteria
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
On a secure tunnel over an unsecure network
NT Backup
13. What are file level permissions?
On a secure tunnel over an unsecure network
Devices that detect valid users with their physical characteristics.
NT Backup
Read - write - read and execute - modify - full control
14. What is a full backup?
With devices to authenticate users asking for access
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all selected files regardless of if they have changed since the last backup.
Malware
15. What is phishing protection software?
16. Which wireles tool uses a 64-bit or 128-bit incryption key?
Read - write - list folder contents - read and execute - modify
Software firewall - IDs - App and OS patches
Broadcasts the networks name - can be turned off to make network 'disappear'
WEP
17. Most popular hashing algorithms?
In a locked secure room
Physical+Data security
SHA+MD5
A backup that archives all selected files regardless of if they have changed since the last backup.
18. What is a software firewall?
An application that filters data packets - uses resources of the pcm potentially slowing it
Incorrect permissions and incorrect configuration of the wireless utility
At home or business - full-time internet access - laptop or desktop?
SHA+MD5
19. How can you protect your data?
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
Physical+Data security
A backup that archives all selected files regardless of if they have changed since the last backup.
20. What does a firewall do?
An application that filters data packets - uses resources of the pcm potentially slowing it
Read - write - read and execute - modify - full control
Actively stops computers from accessing the PC
Physical+Data security
21. What are biometric devices?
In a locked secure room
At home or business - full-time internet access - laptop or desktop?
An application that filters data packets - uses resources of the pcm potentially slowing it
Devices that detect valid users with their physical characteristics.
22. What products can be used to protect network devices?
Ensures messages are not corrupted or tampered with
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
Software firewall - IDs - App and OS patches
23. What is an incremental backup?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
A backup that archives all files that have changed since the last backup
NT Backup
Devices that detect valid users with their physical characteristics.