Module 6 OS deployment methods Flashcards
when is cloning often used?
when an Enterprise company purchases are large number of identical computers for company use.
What does disk cloning software provide
the original and target media can be different from each other.
what’s a cloud based cloning backup in data recovery service designed for managed service providers and remote workplaces
NinjaOne Backup
what is a desktop and mobile device cloning software that works with windows, apple, and android systems. Designed for end users. Supports backup, recovery, data migration, and dis replication. Includes an anti malware service that can overcome ran somewhere attacks
Acronis Cyber Protect Home Office
what is a cloud base cloning and backup service on a software as a service platform. Designed for managed service providers, msp, who support small to midsized businesses. Can integrate with professional services automation, psa, and remote monitoring and management, rmm, packages
barracuda intronis backup
what’s a software for replications, migrations, standardizing system configurations, security, and more. Can create images of windows, macOS, and Linux operating systems with all drivers system configurations and user profiles. These images can be saved to a locally stored library. the library is available to deploy operating systems to new, migrated, or recovered systems as needed
ManageEngine OS Deployer
what’s a free windows compatible software for differential, incremental, and full backups as well as disaster recovery which supports copying from NAS, RAID, and USB drives
EaseUS Todo Backup
How are most items treated on Unix/Linux based OS?
files. Even block devices are treated as files.
what makes it possible for the dd command to clone and wipe disks?
the treatment of most things, including storage devices, as files.
When would you factory reset a mobile device
before getting the mobile device out to another end user than the one it had previously, before sending it out for repair, As a last resort when troubleshooting a misbehaving device, when trying use a stolen device
What does a factory reset do
put the device in the state it was on when it shipped out from the factory
When is an operating system installed in a mobile device
at the factory
What should you do before you factory reset a mobile device
make sure that the mobile device has had all of its data backed up and or synced to the cloud
What are some things you might consider removing before doing a factory reset
SD cards or usb drives. You don’t want to repurpose or decommission a device that has personal or proprietary data still attached to it
What do you need in order to perform a factory reset in android and iOS?
primary credentials, So that stolen devices can’t be easily factory reset and resold