Which feature allows data to be removed from a device if it is lost or stolen quizlet?

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (38)

What is a WAN?

This connects sites in different geographic locations. They usually make use of telecommunications and service provider networks rather than being directly operated by the network administrators.

What is a packet made up of?

This consists of a number of fields contained within a header section plus a payload. The payload could be from the protocol layer above.

What are the key features of a packet switching network?

Nodes within the network can perform a forwarding function, allowing a packet to utilize any available path through the network. This makes the network robust against link failures. If is beneficial for the network to use small packets that are easy to re-send.

What protocol is usually used to provide logical addressing on networks?

Internet Protocol (IP).

What type of address identifies a network interface in the context of the local network segment only

A Media Access Control (MAC) address.

What does a router do?

This is used to transfer packets between different networks?

What is Domain Name System (DNS)?

This protocol allows people to use names/labels to address network resources rather than numeric addresses?

Which of the following parts of a web address is usually depends on a name resolution service: protocol type, host location, file path?

The host location is usually represented by a Fully Qualified Domain Name (FQDN), such as www.comptia.org, resolved to a numeric IP address by DNS.

What does HTTP stand for?

HyperText Transfer Protocol

Which email protocol(s) are used to download messages from a mail server?

Post Office Protocol (POP) or Internet Message Access Protocol (IMAP).

What does a switch do?

This device is used to connect computers together in an Ethernet network?

What is the difference between a modem and a router?

One creates a serial link between two computers over some sort of long distance media. It operates at the data link layer. The other makes forwarding decisions between logical networks.

What do these have in common: Digital Subscriber Line (DSL), cable/Hybrid Fiber Coax, Fiber to the Curb (FTTC), satellite, and cellular radio.

Internet access methods.

What is the latest Wi-Fi standard and which frequency band(s) does it use?

IEEE 802.11ac works in the 5 GHz band.

What information do you need to configure a wireless connection manually?

Service Set ID (SSID)/network name, encryption type, and authentication information.

What is the risk of using a free Wi-Fi network to make an order from an online shop?

Data on an open network may be intercepted by the person running the network or by other computers connected to the network.

What does attenuation mean?

Loss of strength of a signal the farther it has to travel.

If you use an open network, what email configuration setting should you ensure is enabled?

Enable Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption to protect the account password.

You have installed a screensaver application. Later, after updating your anti-virus software, a malicious program is found. This appears to have infected your system at the same time as the screensaver was installed. What class of malware is this?

Trojan Horse.

You want to use a website that hosts training modules in a custom media format. What type of add-on would you need to install to play this media?

You would need to install a type of browser add-on called a plugin. Plug-ins should be restricted to interacting with the media object on the web page.

What type of file might a website use to track whether you have visited it before?

Cookie.

Why are pop-up windows not definite symptoms of virus infection?

They could be a result of adware or part of the design of a particular site

You are using a computer in an Internet cafe. What should you do at the end of the session?

Clear the browsing cache.

What identifies a website as using the secure HTTPS protocol with a valid certificate?

The URL shows the "https://" protocol and the browser shows a padlock icon.

You want to restrict access to a computer on your network to a single Internet host running a particular application. What two things do you need to configure in your firewall's access control list?

The IP address of the host and the port number of the application.

Direct Attached Storage

A hard disk connected to a computer via a USB port.

What type of connection would a NAS device use?

A cabled (Ethernet) or Wi-Fi link to the network

Which admin tool or screen would you use to configure a Windows computer to join a domain?

System applet in Control Panel or via the Settings app.

What version of Windows can be used to share files with other users.

Any version or edition will work.

What does entering the UNC path: "\\TOWER1\DATA" do for you?

It lets you access a network folder on a network server using the Explorer address bar.

What is a mapped drive?

A folder shared by a network server that the client connects to via a drive letter that redirects to the network share name.

What protocol would be used to provide encrypted file downloads from a web server?

HTTPS—HyperText Transfer Protocol with Secure Sockets Layer/Transport Layer Security (SSL/TLS).

You have made a backup of system data using a removable hard disk. What should you do next?

Store the disk in a secure location—preferably in a different place to the PC.

What does the "pinch" gesture usually do on a touch screen?

Used for zooming in our out.

What is the purpose of an accelerometer, as fitted in a mobile device?

Detects how the user is moving the device around.

What feature allows data to be removed from a device if is lost or stolen?

remote wipe or a kill switch.

How can your smartphone join a Wi-Fi network if the SSID is not being broadcast?

The SSID (or network name) can be entered manually.

What function quickly toggle all wireless functionality (cellular, WiFi, and Bluetooth) on or off?

Airplane mode.

Sets with similar terms

Chapter 12

40 terms

Denzell_Johnson

Chapter 12

40 terms

aescobar19

Chapter 7 test

232 terms

zxc215

Chapter 7

48 terms

jenn4x

Other sets by this creator

Study Prep 1.2

13 terms

mevansgltsTEACHER

Study Prep IT 1.1

11 terms

mevansgltsTEACHER

ITF Module 1

25 terms

mevansgltsTEACHER

Module 5 - Review Questions

34 terms

mevansgltsTEACHER

Recommended textbook solutions

Which feature allows data to be removed from a device if it is lost or stolen quizlet?

Vocabulary for Achievement: Fourth Course

4th EditionMargaret Ann Richek

1,757 solutions

Which feature allows data to be removed from a device if it is lost or stolen quizlet?

myPerspectives: Grade 10, Volume 2 California Edition

1st EditionPrentice Hall

367 solutions

Which feature allows data to be removed from a device if it is lost or stolen quizlet?

Vocabulary for Achievement: Second Course

4th EditionMargaret Ann Richek

1,793 solutions

Which feature allows data to be removed from a device if it is lost or stolen quizlet?

Vocabulary for Achievement: Third Course

Margaret Ann Richek

1,788 solutions

Other Quizlet sets

Chapter 2: Trait Approach

28 terms

Asivmonet

Academic Vocabulary in Use: 36-39 Units

92 terms

Gorets

16. General Pharmacology

28 terms

Veronica_Burke

Insurance exam

21 terms

azar_merdaa73

What feature allows data to be removed from a device if is lost or stolen?

The device manager, also known as Find My Device, allows users to wipe their Android, as well as remotely lock or ring the device.

What free Google service is available to all Google accounts allowing them to locate their lost or stolen Android mobile devices?

Your lost Android phone must be connected to Wi-Fi or mobile data for Find My Device tracking to work. Without internet access, you can only view the phone's last known location. Open the Find My Device app on another Android phone. If it is your device, select your Google account and log in.

Which feature if available allows you to share your smartphone's cellular data connection with another device over a USB cable?

Sharing a connection this way is called tethering or using a hotspot. Some phones can share Wi-Fi connection by tethering. Most Android phones can share mobile data by Wi-Fi, Bluetooth, or USB. Important: Some mobile carriers limit or charge extra for tethering.

What is the purpose of an accelerometer as fitted in a mobile device?

Accelerometer is the devices that are used to measure acceleration, the rate of change on velocity. However, if we talk about accelerometer in smartphone, it detects changes in the orientation and accordingly rotates the mobile screen. Basically, t helps your smartphone know up form down.