SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cisco IT Essentials
Start Test
Study First
Subjects
:
cisco
,
it-skills
Instructions:
Answer 23 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is malicious software installed on a computer with the knowledge or permission of the user?
Malware
A backup that archives all selected files regardless of if they have changed since the last backup.
Ensures messages are not corrupted or tampered with
An application that filters data packets - uses resources of the pcm potentially slowing it
2. How can you protect your data?
Read - write - read and execute - modify - full control
Ensures messages are not corrupted or tampered with
Devices that detect valid users with their physical characteristics.
With devices to authenticate users asking for access
3. Which wireles tool uses a 64-bit or 128-bit incryption key?
Broadcasts the networks name - can be turned off to make network 'disappear'
A backup that archives all files that have changed since the last backup
Set of rules that denies packets that dont meet a certain criteria
WEP
4. What are biometric devices?
Devices that detect valid users with their physical characteristics.
An application that filters data packets - uses resources of the pcm potentially slowing it
A backup that archives all files that have changed since the last backup
Actively stops computers from accessing the PC
5. What is packet filtering?
Set of rules that denies packets that dont meet a certain criteria
An application that filters data packets - uses resources of the pcm potentially slowing it
Physical+Data security
A backup that archives all selected files regardless of if they have changed since the last backup.
6. What is hash encoding?
Broadcasts the networks name - can be turned off to make network 'disappear'
At home or business - full-time internet access - laptop or desktop?
Ensures messages are not corrupted or tampered with
A backup that archives all selected files regardless of if they have changed since the last backup.
7. When is VPN (virtual private network) used?
Software that protects and blocks against the IP's of known phishing sites
SHA+MD5
Incorrect permissions and incorrect configuration of the wireless utility
On a secure tunnel over an unsecure network
8. What does SSID do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. What is an incremental backup?
A backup that archives all files that have changed since the last backup
Set of rules that denies packets that dont meet a certain criteria
A backup that archives all selected files regardless of if they have changed since the last backup.
Software that protects and blocks against the IP's of known phishing sites
10. Where should network equipment be housed?
At home or business - full-time internet access - laptop or desktop?
Ensures messages are not corrupted or tampered with
SHA+MD5
In a locked secure room
11. What questions should you ask to determine security factors?
A backup that archives all selected files regardless of if they have changed since the last backup.
Incorrect permissions and incorrect configuration of the wireless utility
At home or business - full-time internet access - laptop or desktop?
Physical+Data security
12. Most popular hashing algorithms?
Actively stops computers from accessing the PC
Broadcasts the networks name - can be turned off to make network 'disappear'
At home or business - full-time internet access - laptop or desktop?
SHA+MD5
13. What is a software firewall?
A PC that was taken over by malware - and now sends SPAM email to other pc's unknown to the user.
Set of rules that denies packets that dont meet a certain criteria
With devices to authenticate users asking for access
An application that filters data packets - uses resources of the pcm potentially slowing it
14. What does a firewall do?
With devices to authenticate users asking for access
Physical+Data security
Incorrect permissions and incorrect configuration of the wireless utility
Actively stops computers from accessing the PC
15. What is the command in a batch file to do a backup?
Devices that detect valid users with their physical characteristics.
A backup that archives all selected files regardless of if they have changed since the last backup.
NT Backup
At home or business - full-time internet access - laptop or desktop?
16. What is two factor security?
Physical+Data security
In a locked secure room
SHA+MD5
Set of rules that denies packets that dont meet a certain criteria
17. What products can be used to protect network devices?
Physical+Data security
At home or business - full-time internet access - laptop or desktop?
Software firewall - IDs - App and OS patches
WEP
18. What are file level permissions?
At home or business - full-time internet access - laptop or desktop?
Read - write - read and execute - modify - full control
Broadcasts the networks name - can be turned off to make network 'disappear'
Read - write - list folder contents - read and execute - modify
19. What is a zombie?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. What folder level permissions are available?
Devices that detect valid users with their physical characteristics.
A backup that archives all files that have changed since the last backup
Read - write - list folder contents - read and execute - modify
On a secure tunnel over an unsecure network
21. What are two common security errors?
A backup that archives all files that have changed since the last backup
Incorrect permissions and incorrect configuration of the wireless utility
WEP
Ensures messages are not corrupted or tampered with
22. What is a full backup?
A backup that archives all selected files regardless of if they have changed since the last backup.
Malware
Set of rules that denies packets that dont meet a certain criteria
Broadcasts the networks name - can be turned off to make network 'disappear'
23. What is phishing protection software?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183