SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are file level permissions?
Read - write - read and execute - modify - full control
Software that protects and blocks against the IP's of known phishing sites
Malware
Set of rules that denies packets that dont meet a certain criteria
2. What are biometric devices?
Actively stops computers from accessing the PC
On a secure tunnel over an unsecure network
Devices that detect valid users with their physical characteristics.
An application that filters data packets - uses resources of the pcm potentially slowing it
3. What is a full backup?
SHA+MD5
In a locked secure room
A backup that archives all selected files regardless of if they have changed since the last backup.
An application that filters data packets - uses resources of the pcm potentially slowing it
4. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
Physical+Data security
With devices to authenticate users asking for access
A backup that archives all files that have changed since the last backup
5. What questions should you ask to determine security factors?
Read - write - list folder contents - read and execute - modify
Read - write - read and execute - modify - full control
With devices to authenticate users asking for access
At home or business - full-time internet access - laptop or desktop?
6. What does a firewall do?
Actively stops computers from accessing the PC
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
7. What is an incremental backup?
With devices to authenticate users asking for access
A backup that archives all files that have changed since the last backup
Incorrect permissions and incorrect configuration of the wireless utility
Physical+Data security
8. What is a zombie?
9. What products can be used to protect network devices?
Devices that detect valid users with their physical characteristics.
WEP
Software firewall - IDs - App and OS patches
With devices to authenticate users asking for access
10. Where should network equipment be housed?
Physical+Data security
At home or business - full-time internet access - laptop or desktop?
In a locked secure room
Read - write - list folder contents - read and execute - modify
11. When is VPN (virtual private network) used?
On a secure tunnel over an unsecure network
Software firewall - IDs - App and OS patches
WEP
Physical+Data security
12. What folder level permissions are available?
Read - write - list folder contents - read and execute - modify
Software that protects and blocks against the IP's of known phishing sites
Ensures messages are not corrupted or tampered with
With devices to authenticate users asking for access
13. What are two common security errors?
Incorrect permissions and incorrect configuration of the wireless utility
A backup that archives all files that have changed since the last backup
On a secure tunnel over an unsecure network
A backup that archives all selected files regardless of if they have changed since the last backup.
14. What is two factor security?
Physical+Data security
In a locked secure room
A backup that archives all selected files regardless of if they have changed since the last backup.
Incorrect permissions and incorrect configuration of the wireless utility
15. Which wireles tool uses a 64-bit or 128-bit incryption key?
Incorrect permissions and incorrect configuration of the wireless utility
Malware
Actively stops computers from accessing the PC
WEP
16. What is hash encoding?
Read - write - list folder contents - read and execute - modify
Ensures messages are not corrupted or tampered with
Broadcasts the networks name - can be turned off to make network 'disappear'
Physical+Data security
17. Most popular hashing algorithms?
Read - write - list folder contents - read and execute - modify
SHA+MD5
Devices that detect valid users with their physical characteristics.
Software that protects and blocks against the IP's of known phishing sites
18. What is packet filtering?
An application that filters data packets - uses resources of the pcm potentially slowing it
Set of rules that denies packets that dont meet a certain criteria
Software that protects and blocks against the IP's of known phishing sites
Incorrect permissions and incorrect configuration of the wireless utility
19. What is phishing protection software?
20. What is a software firewall?
Physical+Data security
Actively stops computers from accessing the PC
With devices to authenticate users asking for access
An application that filters data packets - uses resources of the pcm potentially slowing it
21. What is the command in a batch file to do a backup?
NT Backup
Read - write - list folder contents - read and execute - modify
Devices that detect valid users with their physical characteristics.
Read - write - read and execute - modify - full control
22. What does SSID do?
23. How can you protect your data?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Ensures messages are not corrupted or tampered with
With devices to authenticate users asking for access
Software firewall - IDs - App and OS patches