SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
NT Backup
Software firewall - IDs - App and OS patches
Devices that detect valid users with their physical characteristics.
2. What is a full backup?
Devices that detect valid users with their physical characteristics.
A backup that archives all selected files regardless of if they have changed since the last backup.
In a locked secure room
SHA+MD5
3. What products can be used to protect network devices?
A backup that archives all selected files regardless of if they have changed since the last backup.
Actively stops computers from accessing the PC
Malware
Software firewall - IDs - App and OS patches
4. What is the command in a batch file to do a backup?
Broadcasts the networks name - can be turned off to make network 'disappear'
Read - write - read and execute - modify - full control
Actively stops computers from accessing the PC
NT Backup
5. What is a software firewall?
A backup that archives all selected files regardless of if they have changed since the last backup.
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
An application that filters data packets - uses resources of the pcm potentially slowing it
NT Backup
6. What questions should you ask to determine security factors?
Software that protects and blocks against the IP's of known phishing sites
At home or business - full-time internet access - laptop or desktop?
Malware
Incorrect permissions and incorrect configuration of the wireless utility
7. Where should network equipment be housed?
A backup that archives all selected files regardless of if they have changed since the last backup.
Ensures messages are not corrupted or tampered with
Physical+Data security
In a locked secure room
8. What does SSID do?
9. What is a zombie?
10. What is phishing protection software?
11. What is two factor security?
In a locked secure room
Physical+Data security
A backup that archives all files that have changed since the last backup
At home or business - full-time internet access - laptop or desktop?
12. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
In a locked secure room
13. What are file level permissions?
SHA+MD5
Software that protects and blocks against the IP's of known phishing sites
Read - write - read and execute - modify - full control
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
14. Which wireles tool uses a 64-bit or 128-bit incryption key?
Malware
Read - write - read and execute - modify - full control
At home or business - full-time internet access - laptop or desktop?
WEP
15. What does a firewall do?
On a secure tunnel over an unsecure network
Set of rules that denies packets that dont meet a certain criteria
Actively stops computers from accessing the PC
An application that filters data packets - uses resources of the pcm potentially slowing it
16. Most popular hashing algorithms?
Software that protects and blocks against the IP's of known phishing sites
SHA+MD5
Set of rules that denies packets that dont meet a certain criteria
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
17. What is malicious software installed on a computer with the knowledge or permission of the user?
Read - write - list folder contents - read and execute - modify
Physical+Data security
A backup that archives all files that have changed since the last backup
Malware
18. How can you protect your data?
With devices to authenticate users asking for access
Read - write - read and execute - modify - full control
Read - write - list folder contents - read and execute - modify
Incorrect permissions and incorrect configuration of the wireless utility
19. What is hash encoding?
Software firewall - IDs - App and OS patches
A backup that archives all files that have changed since the last backup
Ensures messages are not corrupted or tampered with
Actively stops computers from accessing the PC
20. What is an incremental backup?
A backup that archives all files that have changed since the last backup
Ensures messages are not corrupted or tampered with
Read - write - list folder contents - read and execute - modify
Devices that detect valid users with their physical characteristics.
21. When is VPN (virtual private network) used?
Malware
Software firewall - IDs - App and OS patches
SHA+MD5
On a secure tunnel over an unsecure network
22. What are biometric devices?
Devices that detect valid users with their physical characteristics.
Read - write - read and execute - modify - full control
Read - write - list folder contents - read and execute - modify
Incorrect permissions and incorrect configuration of the wireless utility
23. What folder level permissions are available?
Software that protects and blocks against the IP's of known phishing sites
On a secure tunnel over an unsecure network
Malware
Read - write - list folder contents - read and execute - modify