Exam Compass Acronyms 6 Flashcards
Which of the answers listed below describes the result of a successful DoS attack?
Code injection
Resource exhaustion
Identity theft
Privilege escalation
Resource exhaustion
Which of the following are examples of partition styles? (Select 2 answers)
ext3
MBR
ext4
GPT
NTF
MBR= master boot record
GPT=GUID Partition Table
A type of smart card used in mobile phones to identify the client is known as:
IMSI
SIM
IMEI
SoC
SIM=Subscriber Identity Module
Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against:
RFI
ESD
SVC
EMI
ESD
Which of the MS Windows features allows users to run programs with the security privileges of another user?
sudo
UAC
Disk quotas
ACLs
UAC=User Account Control
Examples of computer languages that describe the appearance of a printed page include: (Select 2 answers)
LPR
PS
IPP
PCL
LPD
PS=Postscript
PCL=Printer Command Language
Which of the answers listed below refers to an authentication method that enables signing an outbound email message with digital signature?
SPF
DKIM
SRV
DMARC
DKIM=Domain Keys Identified Mail
Which type of RAM transfers data on both the rising and falling edges of the clock signal?
SDR
DDR
QDR
ODR
DDR
Which of the following answers refers to an internal network server used for delivering software upgrades to network devices?
TFTP server
C2 server
HTTP server
MX server
TFTP server=Trivial File Transfer Protocol server
Which type of fiber-optic equipment can be found at a demarc= marks the point where communications facilities owned by one organization interface with that of another organization?
MDI
IDF
ONT
MDF
ONT=Optical Network Terminal
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES
DES
RC4
3DES
AES=Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information
A solution that allows to supply electricity over standard Ethernet cables is referred to as:
PLC
ECP
PoE
EPP
PoE
Which of the following answers refers to a deprecated encryption protocol?
SSH
TLS
S/MIME
SSL
IPsec
PGP
SSL
Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location?
VLAN
DMZ
SNMP community
VPN
VLAN= virtual local area network
Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
NS
SPF
MX
PTR
MX=Mail eXchange-record
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True
False
True
Which of the answers listed below refer to SSD form factors? (Select 2 answers)
PCIe
M.2
mSATA
NVMe
SATA
M.2= Next Generation Form Factor (NGFF)
mSATA=
Which of the following solutions provide the AAA functionality? (Select 2 answers)
CHAP
TACACS+
PAP
RADIUS
MS-CHAP
TACACS+= sets up a TCP connection to the TACACS+ host and sends a Start packet. The TACACS+ host responds with a Reply packet, which either grants or denies access, reports an error, or challenges the user.
RADIUS=Remote Authentication Dial-In User Service
Examples of secure network protocols used for establishing VPN connections include: (Select 2 answers)
IPP
WEP
IPsec
HTTP
TLS
IPsec=Internet Protocol Security
TLS=Transport Layer Security
Which DVI connector type does not provide support for analog signal transmission?
DVI-D
DVI-A
DVI-I
DVI-A/D
DVI-D=Digital Visual Interface
Which of the acronyms listed below refers to the type of electric current supplied to most of the internal PC components?
AC
HVDC
DC
PFC
DC
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
SFTP
HTTPS
FTPS
SNMP
HTTPS=Hypertext Transfer Protocol Secure
Which of the following is an MS Windows component that enables encryption of individual files?
EFS
AES
TPM
SCP
EFS=Encrypting File System
A network protocol providing an alternative solution to the manual allocation of IP addresses is called:
DNS
SNMP
NAT
DHCP
DHCP
Which of the answers listed below refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?
DKIM
SRV
CNAME
SPF
SPF=Sender Policy Framework
A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of:
RFID
NFC
IR
Bluetooth
NFC
A technology implemented in modern laptops that enables data transfer and authentication features between the laptop and another portable device at a very close range is known as:
NFC
WiFi
IoT
WiMAX
NFC
Which technology enables contactless payment transactions?
NFC
SDN
PED
WAP
NFC
STP cabling reduces what kind of interference? (Select 2 answers)
Jitter
Signal attenuation
Crosstalk
EMI
Signal latency
Crosstalk
EMI=ElectroMagnetic Interference
A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure, and learn about the presence and capabilities of other devices is referred to as:
DHCP
UPnP
S.M.A.R.T.
UEFI
UPnP