HardWare-Chapter 20 – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following is true of a Type 1 hypervisor?
answer
called bare-metal hypervisor
question
The Android OS is based on Linux.
answer
True
question
What can you do if you want to obtain administrator privileges to an Android device?
answer
root the device
question
What should you configure on an iOS device if you want your data erased after ten failed logon attempts?
answer
Passcode Lock
question
When moving a VM from one computer to another, be sure the files are secured with ______________ that allow access only to specific users.
answer
permissions
question
Which company acquired Android code in 2005 and has a leadership role in its development?
answer
Google
question
iOS was developed by and continues to be maintained by a consortium of companies
answer
False
question
Which component on a smart phone requires pairing with another device?
answer
Bluetooth
question
Apple is the sole distributor of iOS apps at its iTunes ________________.
answer
App Store
question
The mobile device OSs that together account for about 90% of the smart phone market are which of the following? (Choose all that apply.)
answer
Android iOS
question
Which of the following are physical buttons on the front of Android smart phones. (Choose all that apply.)
answer
Menu Go Back
question
Which of the following is a screen that uses electrodes that sense the conductive properties of skin?
answer
capacitive touch screen
question
What does jailbreaking do?
answer
give you root privileges to iOS
question
What is the accelerometer used for in mobile devices?
answer
adjusting the screen orientation
question
Which type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?
answer
server-side
question
Which of the following is based on open source code?
answer
Android
question
A SIM card is used for which of the following?
answer
holding data related to your cellular carrier
question
A setting called airplane mode lowers the output power of the Wi-Fi and Bluetooth antennas allowing these networks to function, but at a reduced range.
answer
False
question
VMs running under a Type 1 hypervisor are isolated from each other.
answer
True
question
The delegation of server-side virtualization to a third party is referred to as which of the following?
answer
cloud computing
question
If you want to be able to wear gloves while using a smart phone, which screen technology will work?
answer
resistive touch screen
question
________________________ is the technology used by smart phones to send text messages.
answer
Short Message Service
question
It's usually a good idea to run several anti-malware programs at the same time on your computer.
answer
False
question
Which type of malware hides in the MBR program of a hard drive?
answer
boot sector virus
question
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
answer
rootkit
question
An RFID badge is related to which type of authentication method?
answer
smart card
question
Using Group Policy, you can set security policies to help secure a workstation.
answer
True
question
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
answer
smart card
question
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
answer
a TPM chip on the motherboard
question
Which of the following is true about passwords.
answer
by default, accounts with a blank password cannot logon remotely
question
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
answer
the BIOS
question
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
answer
degausser
question
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.
answer
Guest
question
On a peer-to-peer network, authentication is the responsibility of the domain.
answer
False
question
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
answer
bootrec /fixboot
question
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network.
answer
quarantined
question
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
answer
tailgating
question
Which of the following is true about the Windows Encrypted File System?
answer
an encrypted file moved to an unencrypted folder remains encrypted
question
What keystroke should you press to get a logon window if you don't use the welcome screen?
answer
Ctrl+Alt+Delete
question
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
answer
True
question
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.
answer
locking
question
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
answer
Process Explorer
question
If a computer uses both a wireless and wired connection you can control the priority order of the connections.
answer
True
question
Group Policy (gpedit.msc) is available in all versions of Windows 7
answer
False
question
Which of the following must you do to configure Windows to provide QoS for applications?
answer
enable QoS for the network connection adapter set the QoS priority level for applications
question
Which type of permission should you set to control access to files and folders by local and network users?
answer
NTFS on NTFS volumes only
question
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional
answer
False
question
A privacy filter is used for what aspect of security?
answer
screen viewing
question
Which of the following is true about the Guest account in Windows 7?
answer
it is disabled by default
question
Which are among the ways you can use BitLocker Encryption?
answer
computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM
question
Which of the following is NOT a function provided by iTunes for iOS devices?
answer
back up data on Apple web sites
question
What must you do before using a new iPad or iPod touch?
answer
activate it
question
On Android phones, up to four apps can be pinned to the __________ at the bottom of the screen.
answer
dock
question
Which of the following is NOT true about user accounts and groups?
answer
a user account can belong to only one group at a time
question
To map a drive from the command line use the command net ___________ drive: servershare.
answer
use
question
Which of the following is true about which folders to use to hold shared data when working with a workgroup?
answer
private data for each user should be kept in their C:Users folder
question
Which of the following are true about NTFS permissions?
answer
when a subfolder is created, it is assigned the permissions of its parent folder by default, the owner of folder has full permissions to the folder
question
You usually install an OS on a mobile device using a USB device or SD-card
answer
False
question
__________ OS by Google is based on Linux.
answer
Android
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New