Exam Compass Acronyms 4 Flashcards

1
Q

A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as:
AAA
CAPTCHA
SSO
NIDS

A

CAPTCHA=Completely Automatic Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?
NetBIOS
IPv4
TCP/IP
IPv6

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A remote server hosting a virtualized user OS is an example of:
VDI
VPN
VDU
VTC

A

VDI=Virtual Desk Infrastructure (computing model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to a software that provides the functionality of a physical computer?
GUI
SaaS
VM
API

A

VM=Virtual Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the answers listed below refers to a common target of XSS?
Physical security
Alternate sites
Dynamic web pages
Removable storage

A

Dynamic web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as:
DLP
BCP
IRP
ERP

A

IRP=Information Review Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of networking device that allows other wireless devices to connect to a wired network is called:
WAF
AP
RAS
NIC

A

AP=Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UDP is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following answers refer(s) to (a) video connection standard(s)? (Select all that apply)
SCSI
DVI
DP
USB
SATA
HDMI
VGA

A

DVI=Digital Visual Interface (digital flat-panel displays)
DP=Data Processing
HDMI
VGA=Video Graphics Array (640 by 480 pixels; 1.33:1 aspect ratio)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refer to the RJ11 connector? (Select 2 answers)
Used with telephone cabling
Twisted-pair copper cabling connector
Used with Ethernet network cabling
Fiber-optic cabling connector
Coaxial cabling connector

A

Used with telephone cabling
Twisted-pair copper cabling connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following characteristics apply to the type of RAM most commonly used as the main system memory in desktop PCs? (Select 2 answers)
SODIMM
Non-ECC memory
Static RAM
MicroDIMM
Dynamic RAM
ECC memory

A

Non-ECC memory
Dynamic RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to a type of network protocol used for synchronizing clocks over a computer network?
SNTP
VTP
NNTP
RTP

A

SNTP=Simple Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as:
ISA
NDA
BPA
SLA

A

NDA=Non-Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to a specialized character recognition technology that enables translation of handwriting into a digital form?
NFC
ICR
PS
PCL

A

ICR=Intelligent Character Recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of cabling types used for mass storage devices include: (Select all that apply)
SATA
IDE/PATA
USB
S/PDIF
SCSI
eSATA

A

SATA
IDE/PATA
USB
SCSI
eSATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term “UTM” refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True
False

A
17
Q

What is the purpose of a DoS, Denial Of Service (attack) attack?
Code injection
Resource exhaustion
Malware infection
Privilege escalation

A

Resource exhaustion

18
Q

Which of the answers listed below refers to a resolution type provided by ARP-Address Resolution Protocol?
IPv6 to IPv4
MAC to IP
FQDN to IP
IP to MAC

A

IP to MAC

19
Q

Which of the following answers refers to a global standard development organization composed of different national standards bodies?
NIST
ISO
IEEE
ANSI

A

ISO-International Organization for Standardization

20
Q

Which of the answers listed below refers to a command interpreter utility in Windows?
CMD
MSCONFIG
MSTSC
MMC

A

CMD

21
Q

The CMOS battery located on a computer’s motherboard allows for maintaining the correct time and date information stored in CMOS RAM. In older computer systems, the CMOS battery also allowed for maintaining the BIOS configuration settings stored in CMOS RAM.
True
False

A

True

22
Q

What is the most common motherboard type used in desktop PCs?
ATX
mATX
LPX/NLX
ITX
mITX

A

ATX

23
Q

Which type of software enables a centralized administration of mobile devices?
MFA
MMC
MDM
MFD

A

MDM=Mobile Data Management (Systems, Services and Middleware)

24
Q

Which of the following facilitates the enforcement of mobile device policies and procedures?
MFA
MMC
MDM
MFD

A

MDM=MDM

25
Q

A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission is referred to as:
SLA
MOU
SOW
MSA

A

MOU=Minutes of Use (telephony)

26
Q

Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?
AHCI
UEFI
ACPI
POST

A

POST=Power On Self Test

27
Q

Which of the following wireless security protocols has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
EAP
AES
WPA2
WEP

A

WEP=Wired Equivalent Privacy (802.11 encryption protocol)

28
Q

Which of the answers listed below refers to an example of a security code that is used to authenticate a person to a system?
PIN
ACL
PIV
SSO

A
29
Q

What is the name of a computer’s hardware component designed for enabling network access?
CPU
PSU
NIC
GPU

A

PIN=Personal Identification Number

30
Q

Which of the following answers refer(s) to (a) parallel storage media interface(s)? (Select all that apply)
ATA
IDE
PATA
SATA

A

ATA-Advanced Technology Attachment (IDE Interface for IBM-PC/AT & compatible computers)
IDE- integrated development environment
PATA-Parallel Advanced Technology Attachment