220-902 Acronyms Flashcards
Which of the following terms refers to an environment that allows to boot a PC through a network interface?
PXE (Preboot Execution Environment)
Methods used by Microsoft Windows operating systems for organizing disk partitions include: (2 Answers)
MBR (Master Boot Record)
GPT (GUID Partition Table)
Which of the answers listed below refers to a file system designed for optical media?
CDFS (Compact Disc File System)
Which of the following terms refer to methods of storing and accessing data over computer network? (2 Answers)
DFS (Distributed File System)
NFS (Network File System)
An MS Windows tool used for migrating user data and user information to a new computer is called:
USMT (User State Migration Tool)
A system that uses public network (such as Internet) as a means for creating private encrypted connections between remote locations is called:
VPN (Virtual Private Network)
A type of wireless network providing high-speed Internet access through mobile telecommunication cellular network technologies is known as:
WWAN (Wireless Wide Area Network)
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DHCP (Dynamic Host Configuration Protocol)
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?
DHCP (Dynamic Host Configuration Protocol)
Which of the following is an example of an APIPA address?
- 0.0.1
- 168.0.3
- 254.10.20
- 55.57.27
169.254.10.20
A system containing mappings of domain names to various types of data, such as for example numerical IP addresses is known as:
DNS (Domain Name Service or Domain Name Server)
Which of the solutions listed below allows network administrators to prioritize certain types of network traffic?
QoS (Quality of Service)
Which of the following answers refers to a type of software embedded into hardware device?
BIOS (Basic Input/Output System)
A cloud computing service model offering remote access to applications based on monthly pricing or annual subscription fee is called:
SaaS (Software as a Service)
In which of the cloud computing service models clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
IaaS (Infrastructure as a Service)
Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?
PaaS (Platform as a Service)
Which of the acronyms listed below refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?
UTM (Unified Threat Management)
Which of the following actions can be taken by an IDS? (2 Answers)
Logging
Sending an alert
Which of the answers listed below illustrates the difference between passive and active security breach response?
IDS (Intrusion Detection System) vs. IPS (In-Plane Switching)
A mobile device’s built-in functionality enabling the usage of locator applications is called:
GPS (Global Positioning System)
A Windows command used for launching a GUI system utility for managing HDDs is called:
DISKMGMT.MSC
A set of tools used for developing applications for a specific platform is referred to as:
SDK (Software Development Kit)
A package file format used by Android OS for distribution and installation of mobile apps is known as:
APK (Android Package Kit)
A type of limited-range computer network used for data transmission among various types of personal devices centered around a single workstation is known as:
PAN (Personal Area Network)
What is the function of POP3?
(Post Office Protocol 3) Retrieving email messages from a mail server
IMAP4 is used for:
(Internet Messaging Access Protocol 4)Retrieving email messages from a mail server
Mobile device email configuration settings required for retrieval of messages from a mail server include: (2 Answers)
IMAP (Internet Messaging Access Protocol)
POP (Post Office Protocol)
Which of the following protocols are used for securing HTTP connections? (2 Answers)
SSL (Secure Sockets Layer)
TLS (Transport Layer Security)