Nov 23, 2024
HEP 456 Module 6 Section 14 Communication and Dissemination of The Findings Arizona State University
HEP 456 Module 6 Section 14 Communication and Dissemination of The Findings HEP 456: Health Promotion Program ā¦
IT fundamentals
Pr
o
fi
Terms in this set (158)
| ______management involves installing and updating operating system features, applications, and drivers, as well as obtaining the appropriate licenses. | software |
|---|---|
| The term ___ is sometimes used to refer to as a hacker or an attacker. | cracker |
| Computers function best in a relative humidity of 50 to 60 percent | true |
| User___is a network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources. | authentication |
IT fundamentals
| Which backup storage solution is popular for small-to-mid-size companies that need to share network storage with dozens of employees in an efficient manner? | network attached storage (NAS) |
|---|---|
| Which option is not an example of PII infromation? | telephone# |
| A bank ATM card is a common example of Multifactor authentication. | true |
| is any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition. | malware |
| SSO stands for? | single sign on |
| Avoid using the autofill feature of web browsers. | true |
| ___updates is a feature of an operating system or a software application that enables updates to be downloaded and installed automatically on a system at a scheduled time or a certain frequency. | automatic |
| IT fundamentals | |
| Software updates can be disabled. | true |
| Which backup storage solution allows companies to cut cost but has major security issues? | cloud solution |
| ___protect against data loss due to disasters such as file corruption or hardware failure. | backups |
| If you are a computer administrator, create a new administrator account other than the normal login for security purposes. | true |
| device___is a collection of security tasks used to reduce the scope of the device’s vulnerability and attack surface. | hardening |
| Whaling is a form of phishing that targets individuals who are known to possess a good deal of wealth. | true |
| Dumpster diving can be prevented by properly disposing of paper and hardware. | true |
| IT fundamentals | |
| is a method used by attackers to send out unwanted Bluetooth signals from mobile phones and laptops to other Bluetooth-enabled devices. |
bluejacking |
| Which Device hardening technique prevents Bluesnarfing? | disable bluetooth |
| Backups need to be consistently tested to verify that your data is intact and not corrupted. | true |
| Energy Star is a U.S. government (Department of Energy and EPA) program to help individuals and businesses increase energy usage. |
false |
| Before disposing of equipment, you should be sure that any storage devices have been removed or wiped clean to prevent data theft. | true |
| discharge occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge. | electrostatic |
IT fundamentals
| Which backup storage solution is the most cost-effective for home users? | local attached storage |
|---|---|
| Scheduled backups run the risk of corrupting data at a higher rate than real-time backups | false |
| A UPS or generator mitigates the risk of losing external power. | true |
| Which option is not considered to a Natural threat? | cut fiber cables |
| Extreme temperature conditions could cause computers to malfunction or break down. | true |
| Which option is not a Windows built-in account? | root |
| Which option does not reduce the amount of power and energy your electronics consume? | plasma screen |
| Which option is not used as an authentication factor? | something you need |
IT fundamentals
| a___ hat is a hacker who discovers and exposes security flaws in applications and operating systems so that manufacturers can fix them before they become widespread problems. | white |
|---|---|
| Temporary cookies are saved on the hard drive and remain there even after the browsing session ends. | false |
| Which option is not a common tool used for preventing ESD? | steeled toe boots |
| an internet ___ is a local storage area that holds the files saved by a web browser to decrease the time it takes to reload a web page. | cache |
| a ___ hat is a hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose. | black |
| a digital ___ is an electronic document that provides for the secure exchange of information over a network. | certificate |
IT fundamentals
| Which option is not a recommended password management best practice? | If you are replacing a previously created password, make sure that your new password is the same as the last one. |
|---|---|
| is the study of a person’s efficiency at the workplace as it relates to his or her health, safety, and productivity. | ergonomics |
| Which attack is not considered a social engineering attack? | ip spoofing |
| There are no risks associated with upgrading software. | false |
| Setting a password to your screen saver is a security measure that allows unauthorized access to confidential information and passwords associated with your user account. | false |
| the ___ .exe command improves disk performance by defragmenting disk space. | dfrgui |
| Power strips alone do not provide any sort of protection against surges, outages, or any other anomalous electrical behavior. | true |
| IT fundamentals | |
| the ___ .exe command verifies the logical integrity of a file system. | chkdsk |
| Which Device hardening option offers stateful inspection? | softwall firewall |
| use the ___ mode setting to quickly disconnect a mobile device from Wi-Fi and cellular connections, disabling the ability to send and receive calls, email, and text messages. | airplane |
| ___is a wireless technology that facilitates short-range wireless communication between devices. | bluetooth |
| Non-Windows devices such as Mac, Linux, and Android⢠devices also use letters to identify different drives on which content is stored. | false |
| NFC is most often used for inperson transactions or data exchange, What does NFC stand for? | near field communication |
IT fundamentals
| data ___ is the process of automatically merging and updating common data that is stored on multiple devices. | backup |
|---|---|
| Which option is not recommended when naming folders? | Use special characters such as the backslash ( \ ), the forward slash ( / ), the vertical bar ( | ), the colon ( : ), the asterisk ( * ), the question mark ( ? ), the quotation mark ( " ), the less than ( < ), and the greater than ( > ) characters |
| Files are classified as___ and ___ files | system and user |
| Microsoft’s synchronization protocol is called? | exchange activesync |
| the ___ is a container object located on the desktop that temporarily stores deleted files. | recycle bin |
| To select contiguous objects, select the first one and then press _ when you select the last object. | shift |
| Which file attribute indicates a hidden file in the file management tools? | Hidden (H) |
als
| You can compress multiple files and folders into a single compressed file. | true |
|---|---|
| Which security configuration setting is not recommended for mobile devices? | disable remote backup |
| Shortcut icons can be recognized by the arrow in the lower-left corner of the icon. | true |
| On a mobile device, you can access email in one of two ways: web-based or clientbased. | true |
| Deleting a shortcut deletes the item to which it is pointing. | false |
| a ___ is a container object that can store your files in an organized manner. | folder |
| By using Bluetooth technology, mobile devices can establish a connection through a process called | pairing |
| A folder within a folder is called a | subfolder |
| IT fundamentals | |
| a ___ is s an object that stores information on a computer. It can contain user data, in the case of document files, or it can contain program code, in the case of application files. | file |
| the ___ button allows you to see the latest changes in the folder window. | refresh |
| The Recycle Bin stores folders and files that were deleted from removable media such as USB drives or network drives. | false |
| ___key combinations enable users to perform the same actions that are normally performed by using the mouse, but instead by using the keyboard. | shortcut |
| Which file management system is used on Mac computers? | finder |
| Airplane mode reduces battery life on your mobile device. | false |
| To select everything in a container, select Ctrl + _. | A |
als
| Shortcut keys are sometimes referred to as hot keys. | true |
|---|---|
| Two folders that you should strictly avoid deleting are the___ and the ___ folders | program and system |
| Creating new files and folders within existing folders is called___ folders | nesting |
| Which file attribute indicates that a file has not been backed up? | Archive(A) |
| Deleting or modifying system files has no adverse impact to their functionality. | false |
| You can manage user access to files and folder objects on a computer by modifying their permissions. | true |
| Which file attribute indicates that a file is used by the operating system? | System (s) |
| file ___ is a Windows utility application that offers a single view of all the resources and information that you can | explorer |
| access from a computer | |
| IT fundamentals | |
| Which option indicates a file’s type? | extension |
| Which option is not a default Windows' folder type? | sports |
| Screen orientation changes automatically with the position of the mobile devices. This function is possible due to advanced mobile OS technology that includes an _ and a _. | accelerometer and gyroscope |
| ___ a file is the process of reducing the size of a file. | compressing |
| .docx identifies which application? | word |
| Restoring a compressed file to its original size is called___ | extracting |
| Which key combination can also create active window screen captures? | ALT+PRINT+SCREEN |
| a ___ is a link or pointer to a program, file, or folder that is represented by a small icon. | shortcut |
als
| Which characteristic of a connection method describes the ability to transport a device from one physical location to another without interrupting the connection? | mobility |
|---|---|
| Which characteristic of a connection method describes the actual amount of data that is transmitted over a medium in a given time? | throughput |
| Voice data files are smaller in size when compared to text, so upgrading to a VoIP service requires lower bandwidth. | false |
| Wired networks support higher throughput levels than wireless networks. | true |
| A wired networks availability depends upon the health of its network devices and its cabling infrastructure. | true |
| What is the benefit of a cloud computing infrastructure? | only pay for what you use |
| Which characteristic of a connection method describes how safe the network is from | security |
| IT fundamentattack? als | |
| ___software allows for one physical device, such as a server operating system, to host multiple logical operating systems. | virtualization |
| Which protocol is most commonly associated with browser-based file sharing? | HTTP |
| a ___ network is a group of computers that are connected together to communicate and share network resources such as files, applications, and devices. | computer |
| Wireless connections transmit data by using radio frequency waves. | true |
| Which is an example of local storage? | an internal optic drive |
| Select the correct option that describes the common"Network Operating System" component. |
Software that controls network traffic and access to common network resources |
| You cannot configure a wireless peer-to-peer network. | false |
als
| ___ networks have the lowest bandwidth and throughput rates. | cellular |
|---|---|
| The most common wireless computer networking protocol is | wifi |
| Wired networks have the highlest level of reliability. | true |
| Cellular networks are the most secure. | false |
| SOHO stands for? | small office home office |
| a ___ is a 32-bit alphanumeric string that identifies a WAP and all the devices attached to it. | SSID |
| a ___ network is known as a mobile network. | cellular |
| a ___ station, along with all other cell sites put together allow for communication over a very large geographic area. | base |
| A Wireless Access Point typically broadcasts an SSID in | true |
| plaintext IT fundamentals |
|
| Instead of accepting the device’s default SSID, you should manually specify an SSID to more clearly identify the device. | true |
|---|---|
| A major concern with cloud computing is the security of data | true |
| Select the correct option that describes the common"Network Adapter" component. | Hardware that translates data between the network and a device |
| file ___ is a type of file protection that disguises the data within a file or message so that the information can not be read or understood by eavesdroppers. | encryption |
| Which method is not used for network connectivity? | smoke signals |
| Which of the following encryption types is the most secure for the SOHO wireless router? | WPA2 |
| Wired networks are more | false |
| mobile than cellular networks. IT fundamentals |
|
| Wireless networks are more mobile than wired networks. | true |
| ___is specialized software that is stored on a hardware device’s read-only memory (ROM) whether or not the device is powered. | firmware |
| Which characteristic of a connection method describes the maximum amount of data that is possible to transmit over a medium in a given time? | bandwidth |
| Which characteristic of a connection method describes how many users or devices can be connected to the same network at one time? | concurrent sessions |
| Wired computer networks use a technology called___ | ethernet |
| ___is the key to maintaining the availabilty of the network. | resilliance |
| Which wireless encryption protocol is considered obsolete? | Wep |
als
| the ____ is a metaphor for the Internet and the complexity of its infrastructure. | cloud |
|---|---|
| Wired networks support the high number of concurrent connections. | false |
| Wireless networks support connectivity to computers without wireless network adapters. | flase |
| Which cloud service supports the transmission of media files by a provider over the Internet and viewed by the end user in real time? | streaming |
| Cloud computing is an approach that allows companies to improve their efficiency by paying for only the resources usedāmuch like paying for utilities. | true |
| a ___networking device broadcasts data in the form of signals to all connected computers. | hub |
als
| a ___ is a networking device used to send data among multiple networks that use the same protocol. | router |
|---|---|
| What is a group of computer and associated devices that share the same resources within a small geographic area? | LAN |
| Google Docs is an example of a ___ application | web |
| Wireless connectivity devices such as a WAP or other wireless routers do not come with a default SSID. | false |
| ___ is the transmission of voice communications over IP networks, such as the Internet. | VOIP |
| What is a network of computers that are spread across a large geographic area? | WAN |
| Which basic SOHO router configuration option is not recommended? | Do not upgrade the Wi-Fi router firmware to ensure you have the latest security patches and critical fixes |
als
| ___ software is a program that provides specific functionality such as word processing, graphics creation, or database management. | application |
|---|---|
| Which operating system is for a mobile device? | Apple IOS |
| Which option is not a benefit from registering software? | software piracy |
| Periods are used to separate the extension from the file name itself. | true |
| Which collaboration software allows a user to share contacts and calendar information? | |
| Which utility software detects and eliminates malicious software that resides on a computer? | Anti-malware |
| Which productivity software is used to communicate with others? | |
| Video conferencing is a type of collaboration software. | true |
| IT fundamentals | |
| Which function is not performed by the operating system software? | preforms specific tasks |
| Anti-malware is an example of productivity software. | false |
| a ___ is specialized software that controls a device attached to a computer. | driver |
HEP 456 Module 6 Section 14 Communication and Dissemination of The Findings HEP 456: Health Promotion Program ā¦
HEP 456 Module 5 Section 12 and 13 Planning for Analysis and Interpretation and Gantt chartĀ Name HEP 456: ā¦
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦