Exam Compass Acronyms 7 Flashcards

1
Q

Which of the following answers can be used to describe the characteristics of an XSS attack? (Select 3 answers)
Exploits the trust a user’s web browser has in a website
A malicious script is injected into a trusted website
User’s browser executes attacker’s script
Exploits the trust a website has in the user’s web browser
A user is tricked by an attacker into submitting unauthorized web requests
Website executes attacker’s requests

A

Exploits the trust a user’s web browser has in a website

A malicious script is injected into a trusted website

User’s browser executes attacker’s script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the actions listed below can be taken by an IDS? (Select 2 answers)
Firewall reconfiguration
Closing down connection
Logging
Terminating process
Sending an alert

A

Logging

Sending an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers illustrates the difference between passive and active network security breach response?
HIPS vs. NIPS
UTM vs. Firewall
NIPS vs. UTM
IDS vs. IPS

A

IDS, intrusion detection system vs. IPS, intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of connectionless protocols include: (Select 2 answers)
TCP
DHCP
SSH
TFTP
HTTPS

A

DHCP
TFTP=Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of firmware performs initial hardware checks after the computer is powered on?
BIOS
POST
CMOS
PROM

A

BIOS=basic input/output system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to a DRM solution that prevents capturing and replaying multimedia content transmitted via DP, DVI, and HDMI links?
HDCP
UTM
DLP
NIPS

A

HDCP=High-bandwidth Digital Content Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which DVI connector type does not provide support for digital signal transmission?
DVI-D
DVI-A
DVI-I
DVI-A/D

A

DVI-A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A memory access method that bypasses the CPU to speed up memory operations is called:
DMA
RISC
PIO
ARM

A

DMA=Direct Memory Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following requires termination?
SCSI chain
ATA
SATA
PATA

A

SCSI chain=Small Computer System Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:
COPE
BYOD
JBOD
CYOD

A

BYOD=Bring your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below describe the features of SSDs? (Select 3 answers)
Low performance
Relatively high device cost
Lower capacity in comparison to magnetic drives
High performance
Relatively low device cost
Higher capacity in comparison to magnetic drives

A

Relatively high device cost

Lower capacity in comparison to magnetic drives

High performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers refers to a dedicated mobile app management software?
UEM
MAM
RCS
MDM

A

MAM=mobile application management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the answers listed below refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
SaaS
DaaS
PaaS
IaaS

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The SMTP protocol is used for: (Select 2 answers)
Sending email messages between mail servers
Name resolution services
Serving of web pages
Retrieving email messages from mail servers
Sending email messages from a client device

A

Sending email messages between mail servers

Sending email messages from a client device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following solutions can be used to provide device authentication before decrypting an HDD?
EFS
SCP
TPM
SSH

A

TPM=Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

APIPA allows a Windows host to self-configure an IPv4 address and subnet mask when DHCP is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet).
True
False

A

True

17
Q

An emerging field of new technologies, such as wearable tech or home automation is referred to as:
SoC
NFC
IoT
ESN

A

IoT

18
Q

A type of identification badge that can be held within a certain distance of a reader to authenticate the badge holder is called:
SIM card
ID badge
SSH key
RFID badge

A

RFID badge

19
Q

SCSI ID:
Identifies SCSI devices on a network
Identifies device embedded in the physical device on a SCSI chain
Serves as an interchangeable term for LUN
Identifies physical device on a SCSI chain

A

Identifies physical device on a SCSI chain

20
Q

Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
SAN
SDN
SSP
SEH

A

SDN=Software-Defined Networking

21
Q

Which of the following answers refer to the 2G/3G mobile telecommunications standards? (Select 2 answers)
CDMA
NFC
CWDM
GSM
CSMA

A

CDMA=Code-division multiple access

GSM =global system for mobile communications

22
Q

A POST card is used for:
Biometric authentication
Troubleshooting computer startup problems
Terminating SCSI chains
Testing connector pins on the NIC port

A

Troubleshooting computer startup problems

23
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
TFTP
SSH
Telnet
RDP

A

SSH

24
Q

The main difference between the UTP and STP cabling is that the UTP cable takes advantage of additional protective cover reducing signal interference from outside sources.
True
False

A

False

25
Q

In a persistent VDI: (Select 2 answers)
Each user runs their own copy of virtual desktop
At the end of a session, user desktop reverts to its original state
Virtual desktop is shared among multiple users
At the end of a session, user data and personal settings are saved

A

Each user runs their own copy of virtual desktop

At the end of a session, user data and personal settings are saved

26
Q

An MS Windows stop error is informally referred to as:
JBOD
BYOD
BSoD
DDOS

A

BSoD=blue screen of death

27
Q

What is the most common type of DSL Internet access?
VDSL
ADSL
SDSL
UDSL

A

ADSL=Asymmetric Digital Subscriber Line

28
Q

Which of the terms listed below refer to a product/service that no longer receives continuing support?
EOF
ERP
EOL
ETL

A

EOL=end-of-life

29
Q

The DVI-I connector type provides support for both digital and analog video signal transmission.
True
False

A

True

30
Q

What is the most common memory module form factor type used in laptops?
ECC RAM
DIMM
SODIMM
CRIMM

A

SODIMM