681 Flashcards
The only way an application can fully utilize a dual-core processor is to support multithreading. The solution is usually as simple as______________________________________________________. You do not need to upgrade the operating system. This would only ensure that the operating system fully utilizes the dual-core processor, not the application. —
upgrading to a version of the application that supports multithreading
You should not enable multithreading in the ________or in the operating system. Enabling multithreading in the ________ is only necessary if the computer does not display dual-core processors in the operating system. After enabling it in the ________, you need to upgrade the operating system to support multithreading. For an application to support multithreading, the version of the application must have this functionality built in. —
BIOS
______________________and ________________would only protect data in motion. ______________prevents unknown devices from forwarding packets. _____________________scan data as it is entering or leaving the network and may be configured to block IP address ranges, domains, or packet content. —
Port security /// firewalls /// Port security /// Firewalls
_________________would only protect data in use. A good way to use a _______________for DLP would be to prevent a man-in-the-middle attack by requiring the sender or recipient certificate prior to transmitting the data. —
Certificates
_______________________and full device encryption would provide you with the highest level of security for Android mobile devices. —
Biometric authentication
___________________________matches a users uniquely identifiable physical attribute to a previously stored value. _________________is among the most secure physical security measures. Examples include fingerprints, iris or retinal scans, voice prints, and keyboard cadence. —
Biometric authentication /// Biometrics
_____________________requires that the user provide a PIN, password, or a swipe pattern in order to activate the decryption key on the device. If the user does not provide the correct information, the data remains encrypted and inaccessible. —
Full device encryption
______________________are always a critical concern, but it doesnt address security for Android mobile devices. The Android OS is typically ______________________ by the phone manufacturer or Google, and updates may be outside the control of the organization. Ensuring that ______________________ are applied and current should be a basic component of system security. —
Patching/OS updates
There are firewalls for Android, but they would only protect traffic_________________________. You would want to block unauthorized access to the device itself as the primary security measure. —
entering or exiting the device
There are ______ products for Android, but they would only protect traffic to and from the device. They provide no physical protection if the device is stolen. —
VPN
You should use __________________________to ensure that all the hardware in the Windows 7 computer is compatible with Windows 8. You should not use Windows 7 Upgrade Assistant. This tool is used when you want to upgrade from Windows Vista to Windows 7. —
Windows 8 Upgrade Assistant
You should not use Windows Easy Transfer when upgrading from _______________. This tool is used to save your files and settings from an older version of Windows to ensure that these files and settings can be copied into the new version of Windows. It is used to transfer files and settings from XP, Vista, or Windows 7 or 8 to another installation of Windows 8 or prior. Windows Easy Transfer was discontinued in Windows 10. —
Windows 7 to Windows 8
You should not use Microsoft Assessment and Planning Toolkit when upgrading from ____________ . This tool is an automated, multi-product planning and assessment tool for quicker and easier migrations. It provides detailed readiness assessment reports, executive proposals, and actionable recommendations. It works with Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, and Windows Server 2012 R2. —
Windows 7 to Windows 8
If you need to upgrade to Windows 10, you should use the —
Windows 10 Upgrade Assistant.
To provide authentication on a network that contains two servers, he should implement _____________________________. This will allow the users to authenticate before accessing resources.
usernames with strong passwords
Directory permissions are used to ______________to directories or folders on a server. They do not provide authentication. —
limit access
_______are the actual lists that contain the permissions granted to groups and users for a particular directory or file. They are also used on firewalls to govern the flow of traffic based on IP address, port numbers, and other factors. —
ACLs
__________________________ allow users to connect remotely to a private network via a public network using an encrypted tunnel. It usually relies on the authentication mechanism of the organization. It is not used for local network authentication as described in the scenario. —
Virtual private networks -VPNS-
Because the performance problem occurs after the computer has been running for a while, the problem is probably with the____________________. You should tell the user to move the paging file to drive D. —
paging file
You should not increase the size of the paging file. It is usually best to let Windows manage the —
size of your paging file.
You should not disable the paging file. You should only disable the paging file if you have enough_______________________________. You should have at least 256 MB of RAM to do this. The minimum amount needed increases as the application and performance needs increase. —
RAM to manage your computer
You should not defragment the hard drives. Your performance problem is probably not related to the ________________________because the problem occurs after the computer has been running for a while. —
hard drive
Saving a new file will NOT result in a _____________________being created. —
restore point
System Restore repairs computer software by periodically creating restore points that can be used. By default, restore points are created once a day. In addition, it monitors system activity and creates a new restore point if the following conditions occur: — Software installation /// Hardware driver installation —
Hardware driver upgrades
___________________________is a set of business rules that protect data in use, data in motion, and data at rest. _________________________ is the general term for the technology used to protect a companys information from accidental or intentional leaks.
Data Loss Prevention -DLP-