quiz 2 Flashcards
Geotracking is NOT a ___________for mobile devices. —
security measure
Geotracking occurs when a mobile device records the___________________________________. This is actually a security concern for many mobile —
location of the device periodically and stores the information in a central location
Screen locks (including passcode locks, fingerprint locks, PIN locks, face locks, and swipe locks), patching/updates, anti-virus, and failed login attempt restrictions are all considered to be ___________________for mobile devices. —
security measures
OS updates ensure that the _____________has the latest updates from the vendor. —
operating system
Security patches and operating system updates are as important for mobile devices as they are for_______________________. —
desktop and laptop computers
Because the shared folder ends with a dollar sign, you should know it has the following qualities: —-
It is hidden. / It requires administrative privileges to access.
The Terminal Access Controller Access-Control System (TACACS) protocol suite separates ___________and _______________into two different processes, with accounting as a third process. —
authentication and authorization
Remote Authentication Dial-In User Server (RADIUS), which was originally designed to authenticate____________, combines the authentication and authorization steps into a single process. —
dial-up users
Single-factor authentication validates a user through a _____________credentials. —
single set of
The most common type of single-factor authentication is _______________authentication. —
password-based
Single-factor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —
authorization
Multifactor authentication employs the use of two or more of the following authentication methods: —
something you have, something you know, something you are, somewhere you are, and something you do.
Multifactor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —
authorization
You should use Windows 8 Upgrade Assistant to ensure that all the hardware in the _____________computer is compatible with Windows 8. —
Windows 7
You should not use Windows 7 Upgrade Assistant. This tool is used when you want to upgrade from Windows _______ to Windows 7. —
Vista
You should not use Windows Easy Transfer. This tool is used ______________________from an older version of Windows to ensure that these files and settings can be copied into the new version of Windows. It is used to transfer files and settings from XP, Vista, or Windows 7 or 8 to another installation of Windows 8 or prior. Windows Easy Transfer was discontinued in Windows 10. —
to save your files and settings
Microsoft Assessment and Planning Toolkit. This tool is an automated, multi-product planning and_ _______________________. It provides detailed readiness assessment reports, executive proposals, and actionable recommendations. It works with Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, and Windows Server 2012 R2. —
assessment tool for quicker and easier migrations
A _________printer is one that is attached to a local machine. The local machine owner can choose with whom to _______ the printer. This is an ideal situation for printing in a workgroup. —
shared / Share
Connecting a network shared printer would not be appropriate in a workgroup where a co-worker has a printer ___________________and others can already print to it. —
attached to her computer
To be able to establish a Remote Assistance session, your user account must be a member of the _____________ group on the user’s computer or be configured as a member of the Remote Assistance Helpers group in Group Policy —
Administrators
Proxy settings identify a __________on the local network that is used to access the Internet. —
proxy server
Firewall settings are configured in the Windows Firewall console, which is located in —
Control Panel.
An alternate IP address is particularly useful to ensure that you can connect to a network in the event that the first choice for —..
connection is not available
Network card properties can be used to optimize the performance of the network card. These properties that you should understand include —
duplexing, speed, Power over Ethernet (PoE), and Quality of Service (QoS).