Quiz 12 Flashcards
______ maintains a controlled environment. They have strict control over what apps can be installed, and they reserve the right to refuse any app that doesn’t measure up. This is called a ______ system
Apple, Closed source
_____ can be considered the opposite of Apple. Manufacturers can customize the OS as they see fit and apps are availableto purchase and download through various app stores. This is called an ____ system
Android, Open source
A _____ protects an internal network from unauthorized access to and from the Internet by hiding addresses and blocking ports`
Firewall
Current laptops typically use what kind of RAM?
204 pin DDR3 SO-DIMM
Most laptops today have either ______ or M.2 expansion slots for internal cards such as wireless NICs
Mini-PCIe
What mobile device feature allows a user to rotate a tablet and have the screen rotate with the device?
Accelerometer
A room that requires one door to be closed in order to access a second door (mantrap) is a security measure to prevent against what kind of infiltration?
Tailgaiting
What kind of technology uses an inherence factor to establish identity?
Biometrics
What are the seven steps of the laser printing process?
1) Processing
2) Charging
3) Exposing
4) Developing
5) Transferring
6) Fusing
7) Cleaning
Laptops can be easily stolen. One of the best ways to protect your laptop from this is to use a _____
Cable lock
After installing a printer, it only prints garbled text. What is the most likely cause of this issue?
Incorrect or corrupt print drivers
What type of malware takes control of your computer, encrypts your data, and asks for cash to remediate the issue?
Ransomware
What type of authentication factor is this?
Somewhere you are, which can be pinpointed by GPS
Location factor
What type of authentication factor is this?
Something you posses, such as a smart card
Ownership factor
What type of authentication factor is this?
Time based factor which may require logging on at a certain time of day
Temporal factor