1.7 Summarize application installation and configuration concepts. Flashcards

1
Q

• System requirements

A

System requirements This refers to the PC specification that is required to run the application. Refers to issues like RAM, Drive Space, speakers, or others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

System requirements

  • Drive space
A

Drive Space Some applications require high disk space requirements. Like the installation of Microsoft Office (3GB), it is important to understand these limitations for the purposes of a thick client but also for VMs and other real-world applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System requirements

  • RAM
A

RAM Random access memory is a pretty heavy requirement for OS configuration. Most applications require at least 2 GB of system memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• OS requirements - Compatibility

A

OS requirements Compatibility Operating systems need to run on minimum required systems configurations.

A windows OS runs on whatever hardware it takes to run it and the same applies to Apple.

Mac OS can only be run on Apple’s proprietary hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

• Methods of installation and deployment

  • Local (CD/USB)
A

Methods of installation and deployment Local (CD/USB) When performing installations, the main ways to go about doing this are via CD or USB.

Preferably a USB will be the most applicable way of performing a local install. This may also require adjusting BIOS configurations for boot method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• Methods of installation and deployment

  • Network-based
A

Network Based When performing a Network Based install/deployment, using a network-based installer, a setup file is copied to a shared folder on the network and client computers run the setup file from this folder. In Windows, we can use Group Policy Objects (GPO) to set a computer to remotely install an application from a network folder without any manual intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

• Local user permissions

A

Local user permissions Folder/file access for installation With group policy, it’s very simple to monitor and push installations.

With local user permissions, the user is required to make or change permissions settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Folder/file access for installation
A

Local user permissions Folder/file access for installation With group policy, it’s very simple to monitor and push installations.

With local user permissions, the user is required to make or change permissions settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• Security considerations

A

Security considerations Messer states that the reasons we give security considerations is because applications have the same rights and permissions as users.

Therefore, installing an unknown application can cause major issues and possible damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

• Security considerations -

Impact to device

A

Impact to device Due to an upgrade, applications may stop working or become degraded on the device. There may be slowdowns and deleted files.

Opportunities for threats can become more likely when the target is softer and more well-known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• Security considerations -

Impact to network

A

Impact to network The impact to the network may be that access to internal services may be compromised or degraded. Also, rights and permissions may be altered or reconfigured in a way not designed for the best outcome or optimization. It’s imperative to maintain security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly