681 Flashcards

1
Q

The only way an application can fully utilize a dual-core processor is to support multithreading. The solution is usually as simple as______________________________________________________. You do not need to upgrade the operating system. This would only ensure that the operating system fully utilizes the dual-core processor, not the application. —

A

upgrading to a version of the application that supports multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You should not enable multithreading in the ________or in the operating system. Enabling multithreading in the ________ is only necessary if the computer does not display dual-core processors in the operating system. After enabling it in the ________, you need to upgrade the operating system to support multithreading. For an application to support multithreading, the version of the application must have this functionality built in. —

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______________________and ________________would only protect data in motion. ______________prevents unknown devices from forwarding packets. _____________________scan data as it is entering or leaving the network and may be configured to block IP address ranges, domains, or packet content. —

A

Port security /// firewalls /// Port security /// Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_________________would only protect data in use. A good way to use a _______________for DLP would be to prevent a man-in-the-middle attack by requiring the sender or recipient certificate prior to transmitting the data. —

A

Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______________________and full device encryption would provide you with the highest level of security for Android mobile devices. —

A

Biometric authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________________________matches a users uniquely identifiable physical attribute to a previously stored value. _________________is among the most secure physical security measures. Examples include fingerprints, iris or retinal scans, voice prints, and keyboard cadence. —

A

Biometric authentication /// Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____________________requires that the user provide a PIN, password, or a swipe pattern in order to activate the decryption key on the device. If the user does not provide the correct information, the data remains encrypted and inaccessible. —

A

Full device encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______________________are always a critical concern, but it doesnt address security for Android mobile devices. The Android OS is typically ______________________ by the phone manufacturer or Google, and updates may be outside the control of the organization. Ensuring that ______________________ are applied and current should be a basic component of system security. —

A

Patching/OS updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There are firewalls for Android, but they would only protect traffic_________________________. You would want to block unauthorized access to the device itself as the primary security measure. —

A

entering or exiting the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are ______ products for Android, but they would only protect traffic to and from the device. They provide no physical protection if the device is stolen. —

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You should use __________________________to ensure that all the hardware in the Windows 7 computer is compatible with Windows 8. You should not use Windows 7 Upgrade Assistant. This tool is used when you want to upgrade from Windows Vista to Windows 7. —

A

Windows 8 Upgrade Assistant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You should not use Windows Easy Transfer when upgrading from _______________. This tool is used to save your files and settings from an older version of Windows to ensure that these files and settings can be copied into the new version of Windows. It is used to transfer files and settings from XP, Vista, or Windows 7 or 8 to another installation of Windows 8 or prior. Windows Easy Transfer was discontinued in Windows 10. —

A

Windows 7 to Windows 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You should not use Microsoft Assessment and Planning Toolkit when upgrading from ____________ . This tool is an automated, multi-product planning and assessment tool for quicker and easier migrations. It provides detailed readiness assessment reports, executive proposals, and actionable recommendations. It works with Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, and Windows Server 2012 R2. —

A

Windows 7 to Windows 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If you need to upgrade to Windows 10, you should use the —

A

Windows 10 Upgrade Assistant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To provide authentication on a network that contains two servers, he should implement _____________________________. This will allow the users to authenticate before accessing resources.

A

usernames with strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Directory permissions are used to ______________to directories or folders on a server. They do not provide authentication. —

A

limit access

17
Q

_______are the actual lists that contain the permissions granted to groups and users for a particular directory or file. They are also used on firewalls to govern the flow of traffic based on IP address, port numbers, and other factors. —

A

ACLs

18
Q

__________________________ allow users to connect remotely to a private network via a public network using an encrypted tunnel. It usually relies on the authentication mechanism of the organization. It is not used for local network authentication as described in the scenario. —

A

Virtual private networks -VPNS-

19
Q

Because the performance problem occurs after the computer has been running for a while, the problem is probably with the____________________. You should tell the user to move the paging file to drive D. —

A

paging file

20
Q

You should not increase the size of the paging file. It is usually best to let Windows manage the —

A

size of your paging file.

21
Q

You should not disable the paging file. You should only disable the paging file if you have enough_______________________________. You should have at least 256 MB of RAM to do this. The minimum amount needed increases as the application and performance needs increase. —

A

RAM to manage your computer

22
Q

You should not defragment the hard drives. Your performance problem is probably not related to the ________________________because the problem occurs after the computer has been running for a while. —

A

hard drive

23
Q

Saving a new file will NOT result in a _____________________being created. —

A

restore point

24
Q

System Restore repairs computer software by periodically creating restore points that can be used. By default, restore points are created once a day. In addition, it monitors system activity and creates a new restore point if the following conditions occur: — Software installation /// Hardware driver installation —

A

Hardware driver upgrades

25
Q

___________________________is a set of business rules that protect data in use, data in motion, and data at rest. _________________________ is the general term for the technology used to protect a companys information from accidental or intentional leaks.

A

Data Loss Prevention -DLP-