final 2 Flashcards

1
Q

You could install Windows 7 Professional or Enterprise on computers that have dual 1-GHz processors and 2 GB of RAM. Computers with dual processors can only run Windows 7 —

A

Professional, Enterprise, or Ultimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Biometric authentication and ________________________ would provide you with the highest level of security for Android mobile devices.

A

full device encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Before you go to the change board, you need to discuss the post-implementation impact on the workforce. The proposed change would have a significant initial impact on the technical support team. In which portion of the change request would you address this? —

A

Documented Business Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Documented business processes include items such as technical support procedures, customer service, ordering procedures. In general, this deals with company policies and procedures. The change request should thoroughly address the effect on —

A

documented business processes already in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user reports that his computer locks up when he inserts a Secure Digital High Capacity (SDHC) memory card into his memory card reader. You use the Safely Remove Hardware icon to eject the memory card. You then insert a Secure Digital (SD) memory card that the reader successfully accessed yesterday. However, you cannot access any data on the SD card either. You need to ensure that the memory card reader is functioning. What should you do? —

A

reboot the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You should turn on the SmartScreen filter to prevent fraudulent Web sites from gaining access to your personal information through Microsoft Edge. Enabling the filter provides protection against threats of accessing your —

A

personal information such as your passwords without your consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____was created to fix core problems with WEP. _____ is designed to work with older wireless clients while implementing the 802.11i standard.

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ________________________ feature is tied closely to the Volume Shadow Copy Service -VSS- in Windows 7 and above —

A

System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To change the date format in Windows 7, Windows 8, Windows 8.1, and Windows 10, you should click —

A

Clock, Language, and Region in Control Panel Category View and select Region and Language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You should rename both the Administrator and Guest accounts because these accounts are created by default. Renaming the accounts provides an added level of security for these accounts. You should also disable the Guest account. The Guest account should only be enabled in certain instances and should only be enabled temporarily. By default, the Guest account in Windows 7 and later is —

A

disabled, but you should always confirm this is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Folder redirection would protect a user’s data in the event of a —

A

hard drive crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dry chemicals can be used for multiple types of fires. The chemical helps to extinguish the fire, along with a —

A

non-flammable gas propellant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CO2 should be used on Class B and —

A

Class C fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You should complete all of the following steps to protect against war-driving attacks: —

A

Change the default SSID. // Disable SSID broadcast. // Configure the network to use authenticated access only. // Configure the WEP protocol to WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You have been sent to clean up a computer that has been infected with malware. When you arrive at the computer, you identify the symptoms that are occurring, quarantine the system, and disable System Restore. Now you must remediate the computer. Which steps are parts of this process? —

A

Use scan and removal techniques to clean up the computer. // Schedule automatic system scans and updates in the anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly