Exam Compass Acronyms 4 Flashcards
A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as:
AAA
CAPTCHA
SSO
NIDS
CAPTCHA=Completely Automatic Public Turing Test to Tell Computers and Humans Apart
Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?
NetBIOS
IPv4
TCP/IP
IPv6
TCP/IP
A remote server hosting a virtualized user OS is an example of:
VDI
VPN
VDU
VTC
VDI=Virtual Desk Infrastructure (computing model)
Which of the following answers refers to a software that provides the functionality of a physical computer?
GUI
SaaS
VM
API
VM=Virtual Machine
Which of the answers listed below refers to a common target of XSS?
Physical security
Alternate sites
Dynamic web pages
Removable storage
Dynamic web pages
A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as:
DLP
BCP
IRP
ERP
IRP=Information Review Process
A type of networking device that allows other wireless devices to connect to a wired network is called:
WAF
AP
RAS
NIC
AP=Access Point
UDP is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.
True
False
True
Which of the following answers refer(s) to (a) video connection standard(s)? (Select all that apply)
SCSI
DVI
DP
USB
SATA
HDMI
VGA
DVI=Digital Visual Interface (digital flat-panel displays)
DP=Data Processing
HDMI
VGA=Video Graphics Array (640 by 480 pixels; 1.33:1 aspect ratio)
Which of the answers listed below refer to the RJ11 connector? (Select 2 answers)
Used with telephone cabling
Twisted-pair copper cabling connector
Used with Ethernet network cabling
Fiber-optic cabling connector
Coaxial cabling connector
Used with telephone cabling
Twisted-pair copper cabling connector
Which of the following characteristics apply to the type of RAM most commonly used as the main system memory in desktop PCs? (Select 2 answers)
SODIMM
Non-ECC memory
Static RAM
MicroDIMM
Dynamic RAM
ECC memory
Non-ECC memory
Dynamic RAM
Which of the answers listed below refers to a type of network protocol used for synchronizing clocks over a computer network?
SNTP
VTP
NNTP
RTP
SNTP=Simple Network Time Protocol
A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as:
ISA
NDA
BPA
SLA
NDA=Non-Disclosure Agreement
Which of the following answers refers to a specialized character recognition technology that enables translation of handwriting into a digital form?
NFC
ICR
PS
PCL
ICR=Intelligent Character Recognition
Examples of cabling types used for mass storage devices include: (Select all that apply)
SATA
IDE/PATA
USB
S/PDIF
SCSI
eSATA
SATA
IDE/PATA
USB
SCSI
eSATA
The term “UTM” refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True
False
What is the purpose of a DoS, Denial Of Service (attack) attack?
Code injection
Resource exhaustion
Malware infection
Privilege escalation
Resource exhaustion
Which of the answers listed below refers to a resolution type provided by ARP-Address Resolution Protocol?
IPv6 to IPv4
MAC to IP
FQDN to IP
IP to MAC
IP to MAC
Which of the following answers refers to a global standard development organization composed of different national standards bodies?
NIST
ISO
IEEE
ANSI
ISO-International Organization for Standardization
Which of the answers listed below refers to a command interpreter utility in Windows?
CMD
MSCONFIG
MSTSC
MMC
CMD
The CMOS battery located on a computer’s motherboard allows for maintaining the correct time and date information stored in CMOS RAM. In older computer systems, the CMOS battery also allowed for maintaining the BIOS configuration settings stored in CMOS RAM.
True
False
True
What is the most common motherboard type used in desktop PCs?
ATX
mATX
LPX/NLX
ITX
mITX
ATX
Which type of software enables a centralized administration of mobile devices?
MFA
MMC
MDM
MFD
MDM=Mobile Data Management (Systems, Services and Middleware)
Which of the following facilitates the enforcement of mobile device policies and procedures?
MFA
MMC
MDM
MFD
MDM=MDM
A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission is referred to as:
SLA
MOU
SOW
MSA
MOU=Minutes of Use (telephony)
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?
AHCI
UEFI
ACPI
POST
POST=Power On Self Test
Which of the following wireless security protocols has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
EAP
AES
WPA2
WEP
WEP=Wired Equivalent Privacy (802.11 encryption protocol)
Which of the answers listed below refers to an example of a security code that is used to authenticate a person to a system?
PIN
ACL
PIV
SSO
What is the name of a computer’s hardware component designed for enabling network access?
CPU
PSU
NIC
GPU
PIN=Personal Identification Number
Which of the following answers refer(s) to (a) parallel storage media interface(s)? (Select all that apply)
ATA
IDE
PATA
SATA
ATA-Advanced Technology Attachment (IDE Interface for IBM-PC/AT & compatible computers)
IDE- integrated development environment
PATA-Parallel Advanced Technology Attachment