quiz 2 Flashcards
Geotracking is NOT a ___________for mobile devices. —
security measure
Geotracking occurs when a mobile device records the___________________________________. This is actually a security concern for many mobile —
location of the device periodically and stores the information in a central location
Screen locks (including passcode locks, fingerprint locks, PIN locks, face locks, and swipe locks), patching/updates, anti-virus, and failed login attempt restrictions are all considered to be ___________________for mobile devices. —
security measures
OS updates ensure that the _____________has the latest updates from the vendor. —
operating system
Security patches and operating system updates are as important for mobile devices as they are for_______________________. —
desktop and laptop computers
Because the shared folder ends with a dollar sign, you should know it has the following qualities: —-
It is hidden. / It requires administrative privileges to access.
The Terminal Access Controller Access-Control System (TACACS) protocol suite separates ___________and _______________into two different processes, with accounting as a third process. —
authentication and authorization
Remote Authentication Dial-In User Server (RADIUS), which was originally designed to authenticate____________, combines the authentication and authorization steps into a single process. —
dial-up users
Single-factor authentication validates a user through a _____________credentials. —
single set of
The most common type of single-factor authentication is _______________authentication. —
password-based
Single-factor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —
authorization
Multifactor authentication employs the use of two or more of the following authentication methods: —
something you have, something you know, something you are, somewhere you are, and something you do.
Multifactor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —
authorization
You should use Windows 8 Upgrade Assistant to ensure that all the hardware in the _____________computer is compatible with Windows 8. —
Windows 7
You should not use Windows 7 Upgrade Assistant. This tool is used when you want to upgrade from Windows _______ to Windows 7. —
Vista
You should not use Windows Easy Transfer. This tool is used ______________________from an older version of Windows to ensure that these files and settings can be copied into the new version of Windows. It is used to transfer files and settings from XP, Vista, or Windows 7 or 8 to another installation of Windows 8 or prior. Windows Easy Transfer was discontinued in Windows 10. —
to save your files and settings
Microsoft Assessment and Planning Toolkit. This tool is an automated, multi-product planning and_ _______________________. It provides detailed readiness assessment reports, executive proposals, and actionable recommendations. It works with Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, and Windows Server 2012 R2. —
assessment tool for quicker and easier migrations
A _________printer is one that is attached to a local machine. The local machine owner can choose with whom to _______ the printer. This is an ideal situation for printing in a workgroup. —
shared / Share