220-902 Acronyms Flashcards

1
Q

Which of the following terms refers to an environment that allows to boot a PC through a network interface?

A

PXE (Preboot Execution Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Methods used by Microsoft Windows operating systems for organizing disk partitions include: (2 Answers)

A

MBR (Master Boot Record)

GPT (GUID Partition Table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the answers listed below refers to a file system designed for optical media?

A

CDFS (Compact Disc File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following terms refer to methods of storing and accessing data over computer network? (2 Answers)

A

DFS (Distributed File System)

NFS (Network File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An MS Windows tool used for migrating user data and user information to a new computer is called:

A

USMT (User State Migration Tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system that uses public network (such as Internet) as a means for creating private encrypted connections between remote locations is called:

A

VPN (Virtual Private Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of wireless network providing high-speed Internet access through mobile telecommunication cellular network technologies is known as:

A

WWAN (Wireless Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network protocol providing an alternative solution to the manual assignment of IP addresses is called:

A

DHCP (Dynamic Host Configuration Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?

A

DHCP (Dynamic Host Configuration Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an example of an APIPA address?

  1. 0.0.1
  2. 168.0.3
  3. 254.10.20
  4. 55.57.27
A

169.254.10.20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A system containing mappings of domain names to various types of data, such as for example numerical IP addresses is known as:

A

DNS (Domain Name Service or Domain Name Server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the solutions listed below allows network administrators to prioritize certain types of network traffic?

A

QoS (Quality of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following answers refers to a type of software embedded into hardware device?

A

BIOS (Basic Input/Output System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A cloud computing service model offering remote access to applications based on monthly pricing or annual subscription fee is called:

A

SaaS (Software as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which of the cloud computing service models clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

A

IaaS (Infrastructure as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?

A

PaaS (Platform as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the acronyms listed below refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?

A

UTM (Unified Threat Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following actions can be taken by an IDS? (2 Answers)

A

Logging

Sending an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the answers listed below illustrates the difference between passive and active security breach response?

A

IDS (Intrusion Detection System) vs. IPS (In-Plane Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A mobile device’s built-in functionality enabling the usage of locator applications is called:

A

GPS (Global Positioning System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A Windows command used for launching a GUI system utility for managing HDDs is called:

A

DISKMGMT.MSC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A set of tools used for developing applications for a specific platform is referred to as:

A

SDK (Software Development Kit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A package file format used by Android OS for distribution and installation of mobile apps is known as:

A

APK (Android Package Kit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A type of limited-range computer network used for data transmission among various types of personal devices centered around a single workstation is known as:

A

PAN (Personal Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the function of POP3?

A

(Post Office Protocol 3) Retrieving email messages from a mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IMAP4 is used for:

A

(Internet Messaging Access Protocol 4)Retrieving email messages from a mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Mobile device email configuration settings required for retrieval of messages from a mail server include: (2 Answers)

A

IMAP (Internet Messaging Access Protocol)

POP (Post Office Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following protocols are used for securing HTTP connections? (2 Answers)

A

SSL (Secure Sockets Layer)

TLS (Transport Layer Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A secure version of the HTTP protocol offering traffic encryption is known as: (3 Ansers)

A

HTTP (Hyper Text Transfer Protocol) over SSL (Secure Sockets Layer)
HTTP (Hyper Text Transfer Protocol) over TLS (Transport Layer Security)
HTTPS (Hypertext Transfer Protocol Secure)

30
Q

Which of the following answers refer to S/MIME? (2 Answers)

A

(Secure/Multipurpose Internet Mail Extensions)
Digital signatures
Encryption

31
Q

Which of the answers listed below refers to the default configuration settings a mobile device is shipped with?

A

PRI (Preferred Roaming Index)

32
Q

A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:

A

PRL (Preferred Roaming List)

33
Q

Which of the following answers refers to a unique number used for identification of a physical mobile device?

A

IMEI (International Mobile Equipment Identity)

34
Q

A unique number used for identification of a mobile network phone user is known as:

A

IMSI (International Mobile Subscriber Identity)

35
Q

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is known as:

A

SSO (Single Sign-On)

36
Q

Which security measure is in place when a client is denied access to the network due to an outdated antivirus software?

A

NAC (Network Access Control)

37
Q

Which of the following is an example of active eavesdropping?

A

MITM (Man-in-the-middle)

38
Q

Which of the following prevention methods fall(s) into the category of physical security controls? (4 Answers)

A

Key fob
Door lock
Biometrics
RFID badge

39
Q

Which of the acronyms listed below refers to software or hardware based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

A

DLP (Digital Light Processing)

40
Q

Which of the following functionalities allows a DLP system to fulfill its role?

A

Content inspection

41
Q

A set of rules enforced in a network that restricts the use to which the network may be put is known as:

A

AUP (Acceptable Use Policy)

42
Q

A Windows built-in component that allows for encryption of individual files is called:

A

EFS (Encrypting File System)

43
Q

A firmware interface designed as a replacement for BIOS is known as:

A

UEFI (Unified Extensible Firmware Interface)

44
Q

Which of the answers listed below refers to a policy that allows employees to use their own mobile devices on a corporate network?

A

BYOD (Bring Your Own Device)

45
Q

A wireless network name is referred to as:

A

SSID (Service Set Identifier)

46
Q

A solution that simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network is known as:

A

WPS (WiFi Protected Setup)

47
Q

Which of the following wireless technologies are not recommended and should not be used due to their known vulnerabilities? (2 Answers)

A

WPS (WiFi Protected Setup)

WEP (Wired Equivalent Privacy)

48
Q

Which of the access control models listed below enforces the strictest set of access rules?

A

MAC (Media Access Control/Mandatory Access Control)

49
Q

ARP is used to perform what kind of resolution?

A

IP (Internet Protocol) to MAC (Media Access Control/Mandatory Access Control)

50
Q

A network access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is called:

A

MAC (Media Access Control/Mandatory Access Control) filter

51
Q

An MS Windows stop error is informally referred to as:

A

BSoD (Blue Screen of Death)

52
Q

Which of the following answers list(s) example(s) of boot loader software used in Linux operating systems? (2 Answers))

A

GRUB (GRand Unified Bootloader)

LILO (Linux Loader)

53
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously in order to save system resources is known as:

A

DLL (Dynamic-link Library)

54
Q

Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against:

A

ESD (Electrostatic Discharge)

55
Q

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (3 Answers)

A

Batteries
CRTs
Toner cartridges

56
Q

A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:

A

MSDS (Material Safety Data Sheet)

57
Q

Which of the terms listed below refers to an environmental control system?

A

HVAC (Heating, Ventilation and Air Conditioning)

58
Q

A device designed to provide emergency power during an unexpected main power source outage is referred to as:

A

UPS (Uninterruptible Power Supply)

59
Q

What is the name of a control access technology providing protection against copyright infringement?

A

DRM (Digital Rights Management)

60
Q

A type of agreement granting a user the right to use software application in a manner determined by the software vendor is known as:

A

EULA (End-User License Agreement)

61
Q

Which of the following tools can be used to create a backup copy of critical Windows system and boot files? (2 Answers)

A

ASR (Automated System Recovery)

ERD (Emergency Repair Disk)

62
Q

An access control method based on the identity of subjects and/or groups to which they belong is called:

A

DAC (Discretionary Access Control)

63
Q

Which of the following attacks uses multiple compromised computer systems against its target?

A

DDoS (Distributed Denial of Service)

64
Q

A dedicated file server is also referred to as:

A

FTP (File Transfer Protocol) server

65
Q

A network admin is able to ping remote host by its IP address, but not by FQDN. Which of the following is the most probable source of the problem?

A

DNS (Domain Name Service or Domain Name Server)

66
Q

A list of computer hardware that is compatible with a particular operating system or device management software is referred to as:

A

HCL (Hardware Compatibility List)

67
Q

What is the function of an HTTP server?

A

Serving of web pages

68
Q

A framework providing access to a collection of tools that can be used by administrators and advanced users to manage networks, computers, services, and other system components in MS Windows is known as:

A

MMC (Microsoft Management Console)

69
Q

The SFC utility in Windows:

A

Scans for and restores corrupted system files

70
Q

A Microsoft-proprietary file system optimized for flash drives is known as:

A

exFAT (Extended File Allocation Table)