Exam Compass Acronyms 8 Flashcards

1
Q

Which of the following answers refer(s) to (an) example(s) of (a) fiber-optic connector(s)? (Select all that apply)
LC
DB-25
ST
Type A
SC
RG-6

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a secure replacement for Telnet?
CHAP
FTP
SNMP
SSH

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?
DKIM
SPF
NS
DMARC

A

DMARC=Domain-based Message Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Authentication
Authorization
Accounting

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SODIMM is a more compact type of computer memory designed for desktop PCs.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Microsoft-proprietary file system optimized for flash drives is known as:
ext3
FAT32
NFS
exFAT
CDFS

A

exFAT=(Extensible File Allocation Table) is a file system introduced by Microsoft in 2006 and optimized for flash memory such as USB flash drives and SD cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the statements listed below refer(s) to the characteristic feature(s) of HDDs in comparison to SSDs? (Select all that apply)
Lower device cost
Higher read/write speeds
Magnetic storage media
Higher power consumption
No internal moving parts
Lower read/write speeds
Higher device cost
Lower power consumption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of computer security solution that allows to define and enforce network access policies is referred to as:
NAC
NIDS
NFC
NAT

A

NAC=Network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of protocol used in network management systems for monitoring network-attached devices is called:
SMB
NTP
SNMP
RDP

A

SNMP=Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which passive adapter types enable DVI-to-HDMI connectivity? (Select 2 answers)
DVI-D to HDMI
DVI-A to HDMI
DVI-I to HDMI
DVI-A/D to HDMI

A

DVI-D to HDMI
DVI-I to HDMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to a short distance, line-of-sight technology used for example in home remote controls?
WiFi
NFC
IR
Z-Wave

A

IR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to a method for identifying logical partitions on a SCSI hard drive?
Host ID
OUI
SCSI ID
LUN

A

LUN=logical unit number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which DNS TXT records are used for spam management? (Select 3 answers)
SPF
DKIM
SRV
DMARC
PTR

A

SPF= Sender Policy Framework
DKIM= Domain Keys Identified Mail
DMARC=Domain-based Message Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following file systems was created specifically for Linux?
ext
VMFS
FAT
NTFS

A

ext=EXTended file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a proprietary line of low-power consumption small form factor motherboard types for industrial and embedded PC applications?
NLX
ITX
ATX
LPX

A

ITX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PHI
PIV
PII
PKI

A

PII=Personal Identifiable Information

17
Q

Which of the answers listed below refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of GUI?
VTP
VRF
VTC
VNC

A

VNC=Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.

18
Q

Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
SCP
EFS
SSL
TLS
STP

A

SSL
TLS=Transport Layer Security

19
Q

A security protocol designed to strengthen WEP implementations is known as:
PEAP
TKIP
CCMP
WPA2

A

TKIP=Temporal Key Integrity Protocol is a security protocol used in the IEEE 802.11 wireless networking standard.

20
Q

Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices?
PSK
PTR
PKI
PPP

A

PPP=Point-to-Point Protocol

21
Q

A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is referred to as:
CA
PGP
IaaS
PKI

A

PKI=Public key infrastructure

22
Q

Which of the terms listed below applies to the authentication process?
MFA
MMC
MDM
MFD

A

MFA=Multi-factor Authentication, an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.

23
Q

The bus between the CPU and northbridge is called:
BSB
USB
ICH
FSB

A

FSB= front-side bus

24
Q

Which of the following metrics might be of help in diagnosing the declining performance of a storage drive?
PPM
I/O
RPM
IOPS

A

IOPS=(input/output operations per second)

25
Q

An access control model that enforces the strictest set of access rules is known as:
MAC
RBAC
DAC
ABAC

A

MAC

26
Q

Which OS boot method takes advantage of a network interface?
VTC
GPT
PXE
MBR

A

PXE=Preboot execution environment

27
Q

SFTP is an extension to the FTP protocol that adds support for TLS and SSL cryptographic protocols.
True
False

A

False

28
Q

Which of the terms listed below refers to a specialized computer software designed for multi-dimensional modeling?
GUI
CAD
PaaS
RAD

A

CAD=Computer-aided design

29
Q

Which of the following enables installation of an OS via network interface?
GPT
MMC
PXE
KVM

A

PXE=Preboot execution environment

30
Q

An internal hardware component of a PC case used for converting AC power to DC power is referred to as:
UPS
Inverter
SVC
PSU

A

PSU=Power Supply Unit