681 Flashcards
The only way an application can fully utilize a dual-core processor is to support multithreading. The solution is usually as simple as______________________________________________________. You do not need to upgrade the operating system. This would only ensure that the operating system fully utilizes the dual-core processor, not the application. —
upgrading to a version of the application that supports multithreading
You should not enable multithreading in the ________or in the operating system. Enabling multithreading in the ________ is only necessary if the computer does not display dual-core processors in the operating system. After enabling it in the ________, you need to upgrade the operating system to support multithreading. For an application to support multithreading, the version of the application must have this functionality built in. —
BIOS
______________________and ________________would only protect data in motion. ______________prevents unknown devices from forwarding packets. _____________________scan data as it is entering or leaving the network and may be configured to block IP address ranges, domains, or packet content. —
Port security /// firewalls /// Port security /// Firewalls
_________________would only protect data in use. A good way to use a _______________for DLP would be to prevent a man-in-the-middle attack by requiring the sender or recipient certificate prior to transmitting the data. —
Certificates
_______________________and full device encryption would provide you with the highest level of security for Android mobile devices. —
Biometric authentication
___________________________matches a users uniquely identifiable physical attribute to a previously stored value. _________________is among the most secure physical security measures. Examples include fingerprints, iris or retinal scans, voice prints, and keyboard cadence. —
Biometric authentication /// Biometrics
_____________________requires that the user provide a PIN, password, or a swipe pattern in order to activate the decryption key on the device. If the user does not provide the correct information, the data remains encrypted and inaccessible. —
Full device encryption
______________________are always a critical concern, but it doesnt address security for Android mobile devices. The Android OS is typically ______________________ by the phone manufacturer or Google, and updates may be outside the control of the organization. Ensuring that ______________________ are applied and current should be a basic component of system security. —
Patching/OS updates
There are firewalls for Android, but they would only protect traffic_________________________. You would want to block unauthorized access to the device itself as the primary security measure. —
entering or exiting the device
There are ______ products for Android, but they would only protect traffic to and from the device. They provide no physical protection if the device is stolen. —
VPN
You should use __________________________to ensure that all the hardware in the Windows 7 computer is compatible with Windows 8. You should not use Windows 7 Upgrade Assistant. This tool is used when you want to upgrade from Windows Vista to Windows 7. —
Windows 8 Upgrade Assistant
You should not use Windows Easy Transfer when upgrading from _______________. This tool is used to save your files and settings from an older version of Windows to ensure that these files and settings can be copied into the new version of Windows. It is used to transfer files and settings from XP, Vista, or Windows 7 or 8 to another installation of Windows 8 or prior. Windows Easy Transfer was discontinued in Windows 10. —
Windows 7 to Windows 8
You should not use Microsoft Assessment and Planning Toolkit when upgrading from ____________ . This tool is an automated, multi-product planning and assessment tool for quicker and easier migrations. It provides detailed readiness assessment reports, executive proposals, and actionable recommendations. It works with Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, and Windows Server 2012 R2. —
Windows 7 to Windows 8
If you need to upgrade to Windows 10, you should use the —
Windows 10 Upgrade Assistant.
To provide authentication on a network that contains two servers, he should implement _____________________________. This will allow the users to authenticate before accessing resources.
usernames with strong passwords