SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What folder level permissions are available?
Software that protects and blocks against the IP's of known phishing sites
Actively stops computers from accessing the PC
Physical+Data security
Read - write - list folder contents - read and execute - modify
2. What are biometric devices?
Devices that detect valid users with their physical characteristics.
On a secure tunnel over an unsecure network
Set of rules that denies packets that dont meet a certain criteria
Physical+Data security
3. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. What is a software firewall?
NT Backup
Physical+Data security
An application that filters data packets - uses resources of the pcm potentially slowing it
Actively stops computers from accessing the PC
5. What are file level permissions?
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
Devices that detect valid users with their physical characteristics.
On a secure tunnel over an unsecure network
6. What products can be used to protect network devices?
Software firewall - IDs - App and OS patches
NT Backup
Actively stops computers from accessing the PC
An application that filters data packets - uses resources of the pcm potentially slowing it
7. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. What questions should you ask to determine security factors?
At home or business - full-time internet access - laptop or desktop?
With devices to authenticate users asking for access
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all files that have changed since the last backup
10. What is two factor security?
NT Backup
Physical+Data security
Incorrect permissions and incorrect configuration of the wireless utility
At home or business - full-time internet access - laptop or desktop?
11. What is the command in a batch file to do a backup?
Incorrect permissions and incorrect configuration of the wireless utility
Set of rules that denies packets that dont meet a certain criteria
NT Backup
At home or business - full-time internet access - laptop or desktop?
12. How can you protect your data?
Software that protects and blocks against the IP's of known phishing sites
NT Backup
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
With devices to authenticate users asking for access
13. Which wireles tool uses a 64-bit or 128-bit incryption key?
WEP
SHA+MD5
On a secure tunnel over an unsecure network
Physical+Data security
14. What is an incremental backup?
With devices to authenticate users asking for access
A backup that archives all files that have changed since the last backup
NT Backup
On a secure tunnel over an unsecure network
15. Most popular hashing algorithms?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all selected files regardless of if they have changed since the last backup.
SHA+MD5
Malware
16. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
A backup that archives all files that have changed since the last backup
NT Backup
On a secure tunnel over an unsecure network
17. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
Software that protects and blocks against the IP's of known phishing sites
On a secure tunnel over an unsecure network
WEP
18. When is VPN (virtual private network) used?
With devices to authenticate users asking for access
Software firewall - IDs - App and OS patches
On a secure tunnel over an unsecure network
Software that protects and blocks against the IP's of known phishing sites
19. What is a full backup?
A backup that archives all selected files regardless of if they have changed since the last backup.
Broadcasts the networks name - can be turned off to make network 'disappear'
Set of rules that denies packets that dont meet a certain criteria
WEP
20. Where should network equipment be housed?
Malware
Incorrect permissions and incorrect configuration of the wireless utility
In a locked secure room
With devices to authenticate users asking for access
21. What does a firewall do?
Software that protects and blocks against the IP's of known phishing sites
A backup that archives all files that have changed since the last backup
Actively stops computers from accessing the PC
Software firewall - IDs - App and OS patches
22. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
In a locked secure room
Ensures messages are not corrupted or tampered with
A backup that archives all selected files regardless of if they have changed since the last backup.
23. What is hash encoding?
A backup that archives all files that have changed since the last backup
SHA+MD5
An application that filters data packets - uses resources of the pcm potentially slowing it
Ensures messages are not corrupted or tampered with