quiz 2 Flashcards
Geotracking is NOT a ___________for mobile devices. —
security measure
Geotracking occurs when a mobile device records the___________________________________. This is actually a security concern for many mobile —
location of the device periodically and stores the information in a central location
Screen locks (including passcode locks, fingerprint locks, PIN locks, face locks, and swipe locks), patching/updates, anti-virus, and failed login attempt restrictions are all considered to be ___________________for mobile devices. —
security measures
OS updates ensure that the _____________has the latest updates from the vendor. —
operating system
Security patches and operating system updates are as important for mobile devices as they are for_______________________. —
desktop and laptop computers
Because the shared folder ends with a dollar sign, you should know it has the following qualities: —-
It is hidden. / It requires administrative privileges to access.
The Terminal Access Controller Access-Control System (TACACS) protocol suite separates ___________and _______________into two different processes, with accounting as a third process. —
authentication and authorization
Remote Authentication Dial-In User Server (RADIUS), which was originally designed to authenticate____________, combines the authentication and authorization steps into a single process. —
dial-up users
Single-factor authentication validates a user through a _____________credentials. —
single set of
The most common type of single-factor authentication is _______________authentication. —
password-based
Single-factor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —
authorization
Multifactor authentication employs the use of two or more of the following authentication methods: —
something you have, something you know, something you are, somewhere you are, and something you do.
Multifactor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —
authorization
You should use Windows 8 Upgrade Assistant to ensure that all the hardware in the _____________computer is compatible with Windows 8. —
Windows 7
You should not use Windows 7 Upgrade Assistant. This tool is used when you want to upgrade from Windows _______ to Windows 7. —
Vista
You should not use Windows Easy Transfer. This tool is used ______________________from an older version of Windows to ensure that these files and settings can be copied into the new version of Windows. It is used to transfer files and settings from XP, Vista, or Windows 7 or 8 to another installation of Windows 8 or prior. Windows Easy Transfer was discontinued in Windows 10. —
to save your files and settings
Microsoft Assessment and Planning Toolkit. This tool is an automated, multi-product planning and_ _______________________. It provides detailed readiness assessment reports, executive proposals, and actionable recommendations. It works with Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, and Windows Server 2012 R2. —
assessment tool for quicker and easier migrations
A _________printer is one that is attached to a local machine. The local machine owner can choose with whom to _______ the printer. This is an ideal situation for printing in a workgroup. —
shared / Share
Connecting a network shared printer would not be appropriate in a workgroup where a co-worker has a printer ___________________and others can already print to it. —
attached to her computer
To be able to establish a Remote Assistance session, your user account must be a member of the _____________ group on the user’s computer or be configured as a member of the Remote Assistance Helpers group in Group Policy —
Administrators
Proxy settings identify a __________on the local network that is used to access the Internet. —
proxy server
Firewall settings are configured in the Windows Firewall console, which is located in —
Control Panel.
An alternate IP address is particularly useful to ensure that you can connect to a network in the event that the first choice for —..
connection is not available
Network card properties can be used to optimize the performance of the network card. These properties that you should understand include —
duplexing, speed, Power over Ethernet (PoE), and Quality of Service (QoS).
Duplexing is how communication takes place. There are three duplexing options: —
full duplexing, half duplexing, and auto duplexing.
Full duplexing allows a network card to _______________at the same time. —
send and receive
Half duplexing allows a network card to _____________in only one direction at a time. —
send or receive
Full-duplex mode is ___________as fast as half-duplex mode. —
twice
Auto duplexing means that the network card will ________________ to the mode of the network device that is operating at the lowest capacity. —
configure itself
The speed of the network card is different from duplexing. The speed is determined by the ________ used on the network. —
media
A workgroup is recommended when five computers need to be networked, and the users need to _________________________________ of their shared resources.
share files and print services and manage the administration
Windows 7, Windows 8, Windows 8.1, and Windows 10 use the _____________to display two side-by-side applications, which are also referred to as side-by-side apps. —
snap function
The Metro User Interface (Metro UI) also allows you to _______ applications.—
snap function
Error-checking, defragmentation, and backup are all utilities that can be accessed in the —
Tools tab,
This occurs when settings are changed or purchases made that you did not initiate. If this occurs, you should immediately change your account password. —
Unauthorized account access
Unauthorized root access usually results in settings changes that are not normally under regular user control —
Unauthorized root access
The camera and microphone can be remotely activated by a hacker, allowing them to spy on you when apps are open. —
Unauthorized camera/microphone activation -
A low disk space warning alert is __________a symptom of malware infection. —
not generally
Junk email is _____________ a sign of malware infection. —
not usually
Acceptable behavior for customer service include the following
- Use proper language. Avoid jargon, acronyms, and slang.
- Maintain a positive attitude.
- Listen and do not interrupt the customer.
- Be culturally sensitive.
- Be on time. If you will be late, contact the customer.
- Avoid distractions.
- do not take personal calls.
- Avoid talking to co-workers while interacting with customers unless it is an emergency.
- Keep personal interruptions to a minimum.
Deal appropriately with difficult customers or situations. Avoid —
arguing with customers. // Do not become defensive. // Do not minimize the customer’s problems. // Avoid being judgmental. // Clarify the customer’s statements by asking open-ended questions to narrow the scope of the problem. // Restate the issue or question to verify that you understand.
Do not disclose experiences via —
social media outlets.
A computer’s UPS is designed to provide _____________power to a computer when its normal power source becomes unavailable. —
short-term backup
A UPS also protects the computer from ___________in the amplitude of its power source signal that occur normally during daily operation. —
surges
Furthermore, a UPS can send a signal through a computer’s serial port to indicate that power levels are —
below acceptable levels.
If a UPS emits a high-pitched sound, it indicates that the UPS ____________________________to the UPS. —
is unplugged or no power is available