Exam Compass Acronyms 7 Flashcards
Which of the following answers can be used to describe the characteristics of an XSS attack? (Select 3 answers)
Exploits the trust a user’s web browser has in a website
A malicious script is injected into a trusted website
User’s browser executes attacker’s script
Exploits the trust a website has in the user’s web browser
A user is tricked by an attacker into submitting unauthorized web requests
Website executes attacker’s requests
Exploits the trust a user’s web browser has in a website
A malicious script is injected into a trusted website
User’s browser executes attacker’s script
Which of the actions listed below can be taken by an IDS? (Select 2 answers)
Firewall reconfiguration
Closing down connection
Logging
Terminating process
Sending an alert
Logging
Sending an alert
Which of the following answers illustrates the difference between passive and active network security breach response?
HIPS vs. NIPS
UTM vs. Firewall
NIPS vs. UTM
IDS vs. IPS
IDS, intrusion detection system vs. IPS, intrusion prevention system
Examples of connectionless protocols include: (Select 2 answers)
TCP
DHCP
SSH
TFTP
HTTPS
DHCP
TFTP=Trivial File Transfer Protocol
Which type of firmware performs initial hardware checks after the computer is powered on?
BIOS
POST
CMOS
PROM
BIOS=basic input/output system
Which of the answers listed below refers to a DRM solution that prevents capturing and replaying multimedia content transmitted via DP, DVI, and HDMI links?
HDCP
UTM
DLP
NIPS
HDCP=High-bandwidth Digital Content Protection
Which DVI connector type does not provide support for digital signal transmission?
DVI-D
DVI-A
DVI-I
DVI-A/D
DVI-A
A memory access method that bypasses the CPU to speed up memory operations is called:
DMA
RISC
PIO
ARM
DMA=Direct Memory Access
Which of the following requires termination?
SCSI chain
ATA
SATA
PATA
SCSI chain=Small Computer System Interface
A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:
COPE
BYOD
JBOD
CYOD
BYOD=Bring your own device
Which of the answers listed below describe the features of SSDs? (Select 3 answers)
Low performance
Relatively high device cost
Lower capacity in comparison to magnetic drives
High performance
Relatively low device cost
Higher capacity in comparison to magnetic drives
Relatively high device cost
Lower capacity in comparison to magnetic drives
High performance
Which of the following answers refers to a dedicated mobile app management software?
UEM
MAM
RCS
MDM
MAM=mobile application management
Which of the answers listed below refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
SaaS
DaaS
PaaS
IaaS
IaaS
The SMTP protocol is used for: (Select 2 answers)
Sending email messages between mail servers
Name resolution services
Serving of web pages
Retrieving email messages from mail servers
Sending email messages from a client device
Sending email messages between mail servers
Sending email messages from a client device
Which of the following solutions can be used to provide device authentication before decrypting an HDD?
EFS
SCP
TPM
SSH
TPM=Trusted Platform Module