Test 3 16-18,20 Flashcards
Most android apps are weird. Using ______\ using the Android software developer kit
Java
WhT are the names of the app stores for iOS and Google Android devices
Google Play
Apple store
A device used in mobile devices to sense the physical position of the device
Accelerometer
An area where access to Wi fi is made available such as at a coffee shop, retail store, or airport
Hotspot
A device that contains a disc that is free to move and can respond to gravity as device is moved
Gyroscope
Based on Mac OS X and is currently used on the iPhone IPad and iPod touch by Apple
iOS
A feature that uses Bluetooth to detect t nearby compatible devices then creates a peer to peer network using a WiFi signal between the devices.
AirDrop
Allows a task to be started on a device such as an iPad and the. Pick up that task on another device.
Handoff
A unique number that identifies a cellular subscription for a device or subscriber along with its home country and mobile network.
IMSI
A unique number that identifies each mobile phone or tablet device worldwide
IMEI
The process of connecting with another Bluetooth device
Pairing
What software programming languages can be used for an iOS app
C++
C
Objective-C
For iOS a ______ reset is a full shutdown of the device
Hard
The iOS operating system utilizes a closed source or vendor specific commercial license. True or False
True
______ is the process of obtaining administrative privileges to an Android device
Rooting
A database file called the _______ contains the preferred service providers or radio frequencies a mobile carrier wants a device to use.
Preferred Roaming List
Where is the favorites tray on an Android Device
Above the Action Bar
A setting called airplane mode lowers the output power of the WiFi and Bluetooth antennas allowing these networks to function but at a reduced range. True or False
False
What must you do before using a new IPad or IPod touch
Activate it
CDMA carriers are likely to require that a cellular device have a ________ which is a small card similar to a SIM card
Removable User Identity Module
Outgoing mail is normally sent using what mail delivery protocol?
SMTP
What name is given to Windows 8.1 virtual assistant?
Cortana
What is the more secure alternative to the SMTP protocol?
S/MIME
Windows phones rely primarily on the ______ screen for accessing apps
Start
The official source for Android apps is called the Android ______ at play.google.com
Marketplace
A factory reset erases all data and restores a device to factory default state. True or False
True
Like desktop computers a mobile device can be configured to communicate information securely over a —————- network connection
Virtual private
A SIM card is used for what?
Holding data related to your cellular carrier
What identifies a SIM card if the card is used?
ICCID
Each android version is named after a what?
Dessert
Android offers a ________ for troubleshooting OS and device issues
Safe mode
For iOS a ________ reset puts the device in hibernation and then restarts the device
Soft reset
For Android a ______ reset aka factory reset restores the device to factory default state.
Hard reset
What port is utilized by secure IMAP
993
All parts of an adroit application are published as package of files wrapped into one file utilizing a what file extension?
.apk
A process called _________ allows users to download software from sources other than Apple
Jail breaking
Developers can write apps for iPhone but these apps must be sent to Apple for their close scrutiny. True or false
True
iOS was developed by and continues to be maintained by a consortium of companies. True or false
False
What company acquired android code in 2005?
Up to _____ apps can be pinned to favorites tray on Android phones.
7
Sprint and t mobile offer a feature called WiFi ________ which uses voIP over a WiFi connection to the internet.
Calling
For Android a _____ reset is power cycling the device
Soft
A Bluetooth pin code requires the entry of a pin that is how many digits in length?
Four
The Fire OS used by Amazons kindle fire device is based upon ______ and is deeply customized to meet the needs of Amazons e reader audience.
Android
________ your computer can use a phones cellular network connection to access the internet.
Tethering
Android apps are sold or freely _______ from any source or vendor
Distributed
What is the accelerometer used for in mobile devices?
Adjusting the screen orientation
Siri is an example of what technology?
Virtual assistant
What are two most popular web server applications?
IIS and Apache
Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.
Proxy server
To which group does windows give access to folders that you create which are not part of your user profile?
Authenticated users
The easiest method to start a remote assistance connection but only works if both computers used for the connection support the feature.
Easy Connect
If you want to share a folder but don’t want others to see it add a ____ to the end of the folder name
$
The authentication server stores user or device ______ such as usernames and passwords.
Credentials
Remote _______ gives a user access to a windows desktop from anywhere on the internet.
Desktop
Group policy is available in all versions of Windows. True or false
False
Internet explorer tab used to delete browsing history
General
Internet tab that set zone settings
Security
Internet explorer tab that blocks cookies
Privacy
Internet explorer tab that sets up parental controls
Content
Internet explorer tab that sets up proxy server settings
Connections
Internet explorer tab that manages add ones
Programs
Internet explorer tab that reset settings to default
Advanced
Windows 10 features what new web browser which is designed to replace internet explorer
Microsoft edge
If a windows computer belongs to a _______ all security is managed by the network administrator for the entire network.
Domain
An ________ is a small app or add on that can be downloaded from a web site long with a web page and is executed by IR to enchanted the web page. A ______ can sometimes hide in these but IE is designed to catch them by authenticating each it downloads
ActiveX Control
Virus
When a user logs onto a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or false
False
The principle of _________ approach means a user account assigned to a computer user should have enough rights to perform his or her job no more.
Least privilege
A ________ cloud has devices established on an organizations own servers established virtually for a single organizations use.
Private cloud
Which NTFS permissions should you assign if the user should be able to create folders and files and open files to read data but not delete files.
Read, Write
To use Remote Desktop the computer you access remotely can be running Windows 8 home or professional. True or false
False
Rights refer to the ______ an account is allowed to do in the system
Tasks
________ services have reporting policies in place to ensure transparency between customers and vendors
Measured
__________ is the technology used in Windows to create a data source which provides access to a database and includes the drivers required to interact between applications and data
Open database connectivity
If both share and NTFS permissions are used the least restrictive permission between the two applies. True or false
False
Use _____ console in business and professional editions of Windows to create and manage your own user groups.
Computer Management
When attempting to access a remote computer on which your user name and password do not exist what user group will you be placed in?
Anonymous users
If NTFS permissions conflict between a user and group the least restrictive permission applies. True or false?
True
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
Guest group
Which of the following is true about user data folders with in a workgroup
Private data for each user should be kept in their C:\Users folder
The _______ tab in Windows IE can be used to control pop up blocker
Privacy
In a _______ cloud services are provided over the internet to the general public
Public
Rapid ________ refers to a services ability to be scaled up or down as need level changes for a customer
Elasticity
What is a valid reason for wanting to configure proxy server in IE?
To connect to secured websites on a corporate VPN
Which of the following is not true about group policy?
All policies are applied before the logon screen appears
Folders that are shared by default on a network domain that administrator accounts can access
Administrative shares
Permissions assigned by windows that are attained from a parent object
Inherited permissions
A group that can back up and restore any files on a Windows system regardless of access permissions to these files?
Backup Operators
A method to control access to a folder or file and can apply to local users and network users
NTFS permissions
A group that exists on Windows 8/7/Vista for backwards compatibility purposes with XO
Power Users
A method to control access to a shared folder and can be assigned to NTFS or FAT volumes
Share permissions
A console that is used to control what users can do and how the system can be used
Gpedit.msc
Configuring a computer so that it will respond to network activity when the computer is in a sleep state
Wake on LAN
When you copy a file the file takes on the permissions of the destination folder. True or false
True
Permissions refer to which user ______ or user groups that are allowed access to data files and folders
Accounts
What type of User accounts does Windows 7/8 support?
Administrator and Standard
The default value of the security level in IE is medium high. True or false
True
When all users on a network require the same access to all resources what type of network model should you use?
Homegroup
What command launches the remote desktop client for Windows?
Mstsc
In ___________ sharing all rights and permissions are set up on each local computer so that each computer manages access to its files, folders and printers shared on this peer to peer network.
Workgroup
What protocol must be supported by routers in order to use easy connect
PNRP
What keystroke should you press to get a logon window if you don’t use the welcome screen?
CTRL+ALT+Delete
An employee or student is allowed to connect their own device to a corporate network.
Bring your own device
Software installed on a computer that produces pop up ads using your browser
Adware
A code used to identify and authenticate a person or organization sending data over a network
Digital certificate
A program that is potentially harmful or potentially unwanted
Grayware
An attack that can be used to crack a long password by trying words and word combinations
Dictionary attack
Type of spyware that tracks your keystrokes including passwords
Keylogger
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
Social engineering
When someone who is unauthorized follows the employee through a secured entrance to a room or building
Tailgating
A type of malware that tricks you into opening it by substituting itself for a legitimate program
Trojan
A computer that has been hacked and the hacker is using the computer to run repetitive software in the background without the users knowledge
Zombie
An infestation designed to copy itself repeatedly to memory on drive space or on a network.
Worm
If you don’t want to use BitLocker to protect your computer you can still configure a powerful on password using which of the following?
The BIOS
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
Smart card
__________ is a type of identity theft where the sender of an email scams you into responding with personal data
Phishing
What command can be used to take full access of a file?
Icacls
A ___________ attack tries every single combination of characters until it discovers your password
Brute force
Turn off system protection when attempting to get rid of malware. True or false
True
You can use _______ to configure several auditing policies that monitor and log security events
Gpedit.exe
Command that refreshes local group policy as well as group policies set in active directory
Gpudate.exe
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
Rootkit
What does the presence of the icy app on an iOS device indicate?
The device has been jail broken
Next generation firewall that can protect a private network
Unified threat management
Using a pin of password in addition to TPM is an example of what type of authentication?
Multi factor
If you want your computer to be protected by bitlocker encryption using. Imputes authentication what feature must your computer have?
TPM chip on the motherboard
If you decide to use BitLocker be sure to make extra copies of the ______ key and or password and keep them in a safe location
Startup
Determines what user, device, or program has access to a particular resource
Access control list
A Trojan is often embedded in the files of legitimate software that is downloaded from an ______ website
Untrustworthy
A large corporation might use a _______ firewall installed on a computer between internet and the network
Software
After initially installing windows 7 you need to disable the guest account so nobody can use it. True or false
False
Malware can sometimes display a false sign in screen to trick users into providing user account _____
Passwords
A root certificate is the original certificate issued by the CA. True or false
True
An encrypted file does not remain encrypted if you move it from an encrypted folder to an unencrypted folder on another NTFS volume. True or false
False
When using the Windows Encrypted File System what statement is accurate?
An encrypted file moved to a. Unencrypted folder remains encrypted
What technology can be used to locate a device such as a laptop after it has been stolen?
LoJack
Anti malware software relies on what sort of update in order to define or detect malware as it gets into the wild
Malware signature
A person that secretly peaks at your monitor while you work may be doing what?
Shoulder surfing
On a P2P network authentication is the responsibility of the domain. True or false
False
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
Degausser
UEFI secure boot is especially designed to catch _____ that Maich during the boot.
Root kits
A person using your computer after you step away from it is called what?
Tailgating
Windows displays a _______ screen that can be dismissed by pressing a key on the keyboard or clicking anywhere in the screen which then takes the user to the sign in screen showing Val active user accounts.
Lock
CryptoLocker is an example of what type of malware?
Ransomware
What inputs are considered biometric devices
Finger print Retina Voice Handprint Face
Windows firewall is a _________ firewall that protects a computer from intrusion
Personal
In Linux the ____ command print displays when a user has root access.
#
What methods exist to lock down a workstation running Windows such as when stepping away from the screen
CTRL ALT Delete and click lock this computer
Press Windows key + L
Using group policy you can set security policies to help secure a workstation. True or false
True
What statement regarding passwords on Windows is accurate?
By default accounts with a blank password can’t logon remotely
Don’t use numbers for letters in passwords. True or false
True
Windows Firewall is automatically configured when you set your network location in the network and sharing center. True or false
True
Use the _____ command to view and delete root certificates
Certmgr.exe
The ________ command can be used to change the way Windows Sign in works
Netplwiz.exe
What is intended to protect intellectual property rights of organizations or individuals to creative works and software
Copyright
In Linux a command prompt in the terminal is called a ______ prompt.
Shell
What command let’s you view contents of a file?
Cat
A decent ya let can serve as a thin client. True or false
True
What is the advantage of a thick client
Can be used for purposes other than server side virtualization
What two commands are used to change the permissions and ownership of a file or directory in Linux?
Chown
Chmod
macOS is the latest version of the ______ operating systems
Proprietary
Version of Linux are called distributions or _______
Flavors
______ drives contain utility software that often use Linux
Flash
What are Type 1 hypervisors called
Bare metal hypervisors
If you need to redirect the output from a command what symbol should you use?
>
After Windows is installed on a Mac computer ores and hold the _____ key to reach startup manager
Option
A bootable Linux flash drive or cd that can be used to repair system issues is known by what term?
Live CD
On Linux where are the commands required for system administration stored?
/sbin
What operating system is based on open source code?
Android
Swiping up with three fingers on macOS launches what?
Mission Control
LILO is the most commonly installed boot loader by Linux. True or false?
False
Basic versions of this OS are open source and all the underlying programming instructions called _____ code are freely distributed
Source
Navigator macOS is made easier with a few simple _________ or finger movements on the trackpad
Gestures
For a Windows VM be sure to configure windows _______ in the VM, keep windows updates current install and run antivirus software require ____________ for all user accounts in the VM and _____ data folders.
Firewall
Passwords
Encrypt
A collection of data is copied to a backup media
Dump
A personal computer that provides multiple virtual environments for applications
Client side virtualization
functions similar to file explorer in windows used to find and access Macs files
Finder
Manages virtual machines
Hypervisor
An image of the entire partition on which an operating system is installed
Clone
A remote application running on a server is controlled by a local computer
Presentation virtualization
A text editor that works in command mode or insert mode
Vi editor
Stands for Bourne again shell
Bash shell
An operating system that has little computing power and only need to support a browser used to communicate with the server
Thin client
The search app for Mac
Spotlight
Boot camp can split a partition and install windows in the new partition for a ___ boot
Dual
What Linux command below is used to test network connections by sending a request packet to a host?
Ping
The main disadvantage to thin clients is the reduced cost of the client machine. True or false
False
Mac OS built in password manager is
Keychain
It is possible to store a DMG file on a server on the network using a MAC technology called what?
NetBoot
Manages applications so the don’t install in Windows on the client computer
Application virtualization
Type 2 hypervisors are typically used on desktops and _______ when performance and security are not issues.
Laptops
Xenserver, VMware and Hyper V are examples of what type of hypervisors
Type 1
First iteration of Mac OS X was called what?
Cheetah
What might be required to set up a virtual machine?
Emulator
The UEFI should support ______ virtualization when looking to install a hypervisor
Hardware assisted
Linux utilizes what two different wildcard characters at the command line?
*
?
Key press sequence to force quit window on a Mac
Command+option+esc
What terms describe a machine that doesn’t have an operating system
Zero client
Dumb terminal
Ultra thin client
On Linux the root users home directory is /home/root. True or false
False
Type 2 hypervisor installs in a host operating system as an _______
Application
What type of virtualization should you deploy to provide a virtual desktop infrastructure
Server side
What Linux command can be used to copy and convert files, directories, partitions and evening entire dvds
DD
A variation of the _____ operating system Linux was created by Linus Torvalds
Unix
What is a typical use of a type 2 hypervisor
As a honeypot to lure hackers
By developers to test applications
What occurs when Linux encounters an error that it can’t recover from?
Kernel panic
What is the name of the macOS built in back up utility
Time machine
What Linux distribution is considered cutting edge?
Fedora
What user account is known as the system administrator or super user account?
Root