Exam Compass Acronyms 7 Flashcards
Which of the following answers can be used to describe the characteristics of an XSS attack? (Select 3 answers)
Exploits the trust a user’s web browser has in a website
A malicious script is injected into a trusted website
User’s browser executes attacker’s script
Exploits the trust a website has in the user’s web browser
A user is tricked by an attacker into submitting unauthorized web requests
Website executes attacker’s requests
Exploits the trust a user’s web browser has in a website
A malicious script is injected into a trusted website
User’s browser executes attacker’s script
Which of the actions listed below can be taken by an IDS? (Select 2 answers)
Firewall reconfiguration
Closing down connection
Logging
Terminating process
Sending an alert
Logging
Sending an alert
Which of the following answers illustrates the difference between passive and active network security breach response?
HIPS vs. NIPS
UTM vs. Firewall
NIPS vs. UTM
IDS vs. IPS
IDS, intrusion detection system vs. IPS, intrusion prevention system
Examples of connectionless protocols include: (Select 2 answers)
TCP
DHCP
SSH
TFTP
HTTPS
DHCP
TFTP=Trivial File Transfer Protocol
Which type of firmware performs initial hardware checks after the computer is powered on?
BIOS
POST
CMOS
PROM
BIOS=basic input/output system
Which of the answers listed below refers to a DRM solution that prevents capturing and replaying multimedia content transmitted via DP, DVI, and HDMI links?
HDCP
UTM
DLP
NIPS
HDCP=High-bandwidth Digital Content Protection
Which DVI connector type does not provide support for digital signal transmission?
DVI-D
DVI-A
DVI-I
DVI-A/D
DVI-A
A memory access method that bypasses the CPU to speed up memory operations is called:
DMA
RISC
PIO
ARM
DMA=Direct Memory Access
Which of the following requires termination?
SCSI chain
ATA
SATA
PATA
SCSI chain=Small Computer System Interface
A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:
COPE
BYOD
JBOD
CYOD
BYOD=Bring your own device
Which of the answers listed below describe the features of SSDs? (Select 3 answers)
Low performance
Relatively high device cost
Lower capacity in comparison to magnetic drives
High performance
Relatively low device cost
Higher capacity in comparison to magnetic drives
Relatively high device cost
Lower capacity in comparison to magnetic drives
High performance
Which of the following answers refers to a dedicated mobile app management software?
UEM
MAM
RCS
MDM
MAM=mobile application management
Which of the answers listed below refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
SaaS
DaaS
PaaS
IaaS
IaaS
The SMTP protocol is used for: (Select 2 answers)
Sending email messages between mail servers
Name resolution services
Serving of web pages
Retrieving email messages from mail servers
Sending email messages from a client device
Sending email messages between mail servers
Sending email messages from a client device
Which of the following solutions can be used to provide device authentication before decrypting an HDD?
EFS
SCP
TPM
SSH
TPM=Trusted Platform Module
APIPA allows a Windows host to self-configure an IPv4 address and subnet mask when DHCP is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet).
True
False
True
An emerging field of new technologies, such as wearable tech or home automation is referred to as:
SoC
NFC
IoT
ESN
IoT
A type of identification badge that can be held within a certain distance of a reader to authenticate the badge holder is called:
SIM card
ID badge
SSH key
RFID badge
RFID badge
SCSI ID:
Identifies SCSI devices on a network
Identifies device embedded in the physical device on a SCSI chain
Serves as an interchangeable term for LUN
Identifies physical device on a SCSI chain
Identifies physical device on a SCSI chain
Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
SAN
SDN
SSP
SEH
SDN=Software-Defined Networking
Which of the following answers refer to the 2G/3G mobile telecommunications standards? (Select 2 answers)
CDMA
NFC
CWDM
GSM
CSMA
CDMA=Code-division multiple access
GSM =global system for mobile communications
A POST card is used for:
Biometric authentication
Troubleshooting computer startup problems
Terminating SCSI chains
Testing connector pins on the NIC port
Troubleshooting computer startup problems
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
TFTP
SSH
Telnet
RDP
SSH
The main difference between the UTP and STP cabling is that the UTP cable takes advantage of additional protective cover reducing signal interference from outside sources.
True
False
False
In a persistent VDI: (Select 2 answers)
Each user runs their own copy of virtual desktop
At the end of a session, user desktop reverts to its original state
Virtual desktop is shared among multiple users
At the end of a session, user data and personal settings are saved
Each user runs their own copy of virtual desktop
At the end of a session, user data and personal settings are saved
An MS Windows stop error is informally referred to as:
JBOD
BYOD
BSoD
DDOS
BSoD=blue screen of death
What is the most common type of DSL Internet access?
VDSL
ADSL
SDSL
UDSL
ADSL=Asymmetric Digital Subscriber Line
Which of the terms listed below refer to a product/service that no longer receives continuing support?
EOF
ERP
EOL
ETL
EOL=end-of-life
The DVI-I connector type provides support for both digital and analog video signal transmission.
True
False
True
What is the most common memory module form factor type used in laptops?
ECC RAM
DIMM
SODIMM
CRIMM
SODIMM