IT Essentials - Fundamental Security - Chapter 9

25 Questions | Total Attempts: 2676

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

This quiz is for Cisco IT Essentials Chapter 9, and will aid you in progression to the final exam.


Questions and Answers
  • 1. 
    A   .........   ........, just like a worm, does not need to be attached to other software to infect a computer. (2 words)
  • 2. 
    Web tools that can be used by attackers to install a program on a computer are:- (pick 2)
    • A. 

      Spam

    • B. 

      Java

    • C. 

      SYN flood

    • D. 

      Active X

  • 3. 
    .................., also known as junk mail is a form of unsolicited mail.
  • 4. 
    How can you ensure data on a hard drive that has been removed from a computer is non recoverable?
    • A. 

      Smash with a hammer

    • B. 

      Format the drive

    • C. 

      Re-install the file system

    • D. 

      Delete all files

  • 5. 
    How can you physically protect computer equipment? (pick 2)
    • A. 

      Control access to facilities

    • B. 

      Install antivirus software

    • C. 

      Ensure software patches are up to date

    • D. 

      Password protect all equipment

    • E. 

      Use security cages around equipment

  • 6. 
    A ............. is an encryption system that protects data as though it resides on a private network. (1 or 3 words)
  • 7. 
    Passwords should contain:-
    • A. 

      A mixture of uppercase and lowercase letters and numbers

    • B. 

      A mixture of numbers, special characters, uppercase and lowercase letters

    • C. 

      A mixture of numbers, special characters and letters

    • D. 

      A mixture of special characters and upper and lower case letters

  • 8. 
    Is it possible to reverse the file structure NTFS back to FAT 32? (Answer 'yes' or 'no')
  • 9. 
    WEP stands for ........... (3 words)
  • 10. 
    What is it advisable to create before you update a virus signature file? (2 words)
  • 11. 
    Updates do not need to be installed once they have been downloaded? ('true' or 'false')
  • 12. 
    What types of WEP's are there? (pick 3)
    • A. 

      36 bit

    • B. 

      64 bit

    • C. 

      104 bit

    • D. 

      128 bit

    • E. 

      256 bit

  • 13. 
    What are the two types of security threat? (pick 2)
    • A. 

      Computer

    • B. 

      Data

    • C. 

      Virus

    • D. 

      Malicious

    • E. 

      Physical

  • 14. 
    Phishing is a form of ...............   ............................... (2 words)
  • 15. 
    What form of attack prevents users from accessing normal services, such as e-mail or web server?
    • A. 

      Ping of death

    • B. 

      DoS (Denial of Service)

    • C. 

      E-mail bomb

    • D. 

      DDOS (Distributed Denial of Service)

  • 16. 
    Which threat to security uses traffic from zombie computers to overwhelm servers? (1 or 4 words)
  • 17. 
    This type of program displays advertising on your computer and is usually distributed with downloaded software
    • A. 

      Malware

    • B. 

      Grayware

    • C. 

      Adware

    • D. 

      Worm

  • 18. 
    Where is the safest place to store backups?
    • A. 

      Secure cabinet

    • B. 

      Locked desk drawer

    • C. 

      Central administrator in the same building as the server/s

    • D. 

      An offsite secure facility

  • 19. 
    .............. is a wireless security protocol created by Cisco to dress the weakness in WEP and WPA (1 or 4 words)
  • 20. 
    Many organisations establish a written .....................    ....................... stating that employees are not permitted to install any software not provided by the company. (2 words)
  • 21. 
    A fingerprint reader is an example of which security technology?
    • A. 

      Card key

    • B. 

      Biometric

    • C. 

      Posted security guard

    • D. 

      Sensors

  • 22. 
    With ................   ..............., the user can control the type of data sent to a computer by selecting which ports will be open and which will be secure.  (2 words)
  • 23. 
    ..............   ....................... are when an employee intends to cause damage. (2 words)
  • 24. 
    An employee of a company writes her password and username in her diary.  At home her partner, who works for a rival company, takes this information and uses it to hack into the company network.  What type of attack is this?
    • A. 

      Spoofing

    • B. 

      Social engineering

    • C. 

      Man-in-the-middle

    • D. 

      DDoS

  • 25. 
    Which TCP/IP attack randomly opens TCP ports?
    • A. 

      SYN flood

    • B. 

      DNS poisoning

    • C. 

      Ping of death

    • D. 

      Spyware

    • E. 

      Malware

Back to Top Back to top