quiz 2 Flashcards

1
Q

Geotracking is NOT a ___________for mobile devices. —

A

security measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Geotracking occurs when a mobile device records the___________________________________. This is actually a security concern for many mobile —

A

location of the device periodically and stores the information in a central location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Screen locks (including passcode locks, fingerprint locks, PIN locks, face locks, and swipe locks), patching/updates, anti-virus, and failed login attempt restrictions are all considered to be ___________________for mobile devices. —

A

security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OS updates ensure that the _____________has the latest updates from the vendor. —

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security patches and operating system updates are as important for mobile devices as they are for_______________________. —

A

desktop and laptop computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Because the shared folder ends with a dollar sign, you should know it has the following qualities: —-

A

It is hidden. / It requires administrative privileges to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Terminal Access Controller Access-Control System (TACACS) protocol suite separates ___________and _______________into two different processes, with accounting as a third process. —

A

authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote Authentication Dial-In User Server (RADIUS), which was originally designed to authenticate____________, combines the authentication and authorization steps into a single process. —

A

dial-up users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Single-factor authentication validates a user through a _____________credentials. —

A

single set of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The most common type of single-factor authentication is _______________authentication. —

A

password-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Single-factor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multifactor authentication employs the use of two or more of the following authentication methods: —

A

something you have, something you know, something you are, somewhere you are, and something you do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multifactor authentication will authorize you to connect to certain devices but does not really provide _____________as a second process. —

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You should use Windows 8 Upgrade Assistant to ensure that all the hardware in the _____________computer is compatible with Windows 8. —

A

Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You should not use Windows 7 Upgrade Assistant. This tool is used when you want to upgrade from Windows _______ to Windows 7. —

A

Vista

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You should not use Windows Easy Transfer. This tool is used ______________________from an older version of Windows to ensure that these files and settings can be copied into the new version of Windows. It is used to transfer files and settings from XP, Vista, or Windows 7 or 8 to another installation of Windows 8 or prior. Windows Easy Transfer was discontinued in Windows 10. —

A

to save your files and settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Microsoft Assessment and Planning Toolkit. This tool is an automated, multi-product planning and_ _______________________. It provides detailed readiness assessment reports, executive proposals, and actionable recommendations. It works with Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, and Windows Server 2012 R2. —

A

assessment tool for quicker and easier migrations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _________printer is one that is attached to a local machine. The local machine owner can choose with whom to _______ the printer. This is an ideal situation for printing in a workgroup. —

A

shared / Share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Connecting a network shared printer would not be appropriate in a workgroup where a co-worker has a printer ___________________and others can already print to it. —

A

attached to her computer

20
Q

To be able to establish a Remote Assistance session, your user account must be a member of the _____________ group on the user’s computer or be configured as a member of the Remote Assistance Helpers group in Group Policy —

A

Administrators

21
Q

Proxy settings identify a __________on the local network that is used to access the Internet. —

A

proxy server

22
Q

Firewall settings are configured in the Windows Firewall console, which is located in —

A

Control Panel.

23
Q

An alternate IP address is particularly useful to ensure that you can connect to a network in the event that the first choice for —..

A

connection is not available

24
Q

Network card properties can be used to optimize the performance of the network card. These properties that you should understand include —

A

duplexing, speed, Power over Ethernet (PoE), and Quality of Service (QoS).

25
Q

Duplexing is how communication takes place. There are three duplexing options: —

A

full duplexing, half duplexing, and auto duplexing.

26
Q

Full duplexing allows a network card to _______________at the same time. —

A

send and receive

27
Q

Half duplexing allows a network card to _____________in only one direction at a time. —

A

send or receive

28
Q

Full-duplex mode is ___________as fast as half-duplex mode. —

A

twice

29
Q

Auto duplexing means that the network card will ________________ to the mode of the network device that is operating at the lowest capacity. —

A

configure itself

30
Q

The speed of the network card is different from duplexing. The speed is determined by the ________ used on the network. —

A

media

31
Q

A workgroup is recommended when five computers need to be networked, and the users need to _________________________________ of their shared resources.

A

share files and print services and manage the administration

32
Q

Windows 7, Windows 8, Windows 8.1, and Windows 10 use the _____________to display two side-by-side applications, which are also referred to as side-by-side apps. —

A

snap function

33
Q

The Metro User Interface (Metro UI) also allows you to _______ applications.—

A

snap function

34
Q

Error-checking, defragmentation, and backup are all utilities that can be accessed in the —

A

Tools tab,

35
Q

This occurs when settings are changed or purchases made that you did not initiate. If this occurs, you should immediately change your account password. —

A

Unauthorized account access

36
Q

Unauthorized root access usually results in settings changes that are not normally under regular user control —

A

Unauthorized root access

37
Q

The camera and microphone can be remotely activated by a hacker, allowing them to spy on you when apps are open. —

A

Unauthorized camera/microphone activation -

38
Q

A low disk space warning alert is __________a symptom of malware infection. —

A

not generally

39
Q

Junk email is _____________ a sign of malware infection. —

A

not usually

40
Q

Acceptable behavior for customer service include the following

A
  1. Use proper language. Avoid jargon, acronyms, and slang.
  2. Maintain a positive attitude.
  3. Listen and do not interrupt the customer.
  4. Be culturally sensitive.
  5. Be on time. If you will be late, contact the customer.
  6. Avoid distractions.
  7. do not take personal calls.
  8. Avoid talking to co-workers while interacting with customers unless it is an emergency.
  9. Keep personal interruptions to a minimum.
41
Q

Deal appropriately with difficult customers or situations. Avoid —

A

arguing with customers. // Do not become defensive. // Do not minimize the customer’s problems. // Avoid being judgmental. // Clarify the customer’s statements by asking open-ended questions to narrow the scope of the problem. // Restate the issue or question to verify that you understand.

42
Q

Do not disclose experiences via —

A

social media outlets.

43
Q

A computer’s UPS is designed to provide _____________power to a computer when its normal power source becomes unavailable. —

A

short-term backup

44
Q

A UPS also protects the computer from ___________in the amplitude of its power source signal that occur normally during daily operation. —

A

surges

45
Q

Furthermore, a UPS can send a signal through a computer’s serial port to indicate that power levels are —

A

below acceptable levels.

46
Q

If a UPS emits a high-pitched sound, it indicates that the UPS ____________________________to the UPS. —

A

is unplugged or no power is available