Exam Compass Acronyms 8 Flashcards
Which of the following answers refer(s) to (an) example(s) of (a) fiber-optic connector(s)? (Select all that apply)
LC
DB-25
ST
Type A
SC
RG-6
Which of the answers listed below refers to a secure replacement for Telnet?
CHAP
FTP
SNMP
SSH
SSH
Which of the following answers refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?
DKIM
SPF
NS
DMARC
DMARC=Domain-based Message Authentication
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Authentication
Authorization
Accounting
Accounting
SODIMM is a more compact type of computer memory designed for desktop PCs.
True
False
False
A Microsoft-proprietary file system optimized for flash drives is known as:
ext3
FAT32
NFS
exFAT
CDFS
exFAT=(Extensible File Allocation Table) is a file system introduced by Microsoft in 2006 and optimized for flash memory such as USB flash drives and SD cards.
Which of the statements listed below refer(s) to the characteristic feature(s) of HDDs in comparison to SSDs? (Select all that apply)
Lower device cost
Higher read/write speeds
Magnetic storage media
Higher power consumption
No internal moving parts
Lower read/write speeds
Higher device cost
Lower power consumption
A type of computer security solution that allows to define and enforce network access policies is referred to as:
NAC
NIDS
NFC
NAT
NAC=Network access control
A type of protocol used in network management systems for monitoring network-attached devices is called:
SMB
NTP
SNMP
RDP
SNMP=Simple Network Management Protocol
Which passive adapter types enable DVI-to-HDMI connectivity? (Select 2 answers)
DVI-D to HDMI
DVI-A to HDMI
DVI-I to HDMI
DVI-A/D to HDMI
DVI-D to HDMI
DVI-I to HDMI
Which of the following answers refers to a short distance, line-of-sight technology used for example in home remote controls?
WiFi
NFC
IR
Z-Wave
IR
Which of the answers listed below refers to a method for identifying logical partitions on a SCSI hard drive?
Host ID
OUI
SCSI ID
LUN
LUN=logical unit number
Which DNS TXT records are used for spam management? (Select 3 answers)
SPF
DKIM
SRV
DMARC
PTR
SPF= Sender Policy Framework
DKIM= Domain Keys Identified Mail
DMARC=Domain-based Message Authentication
Which of the following file systems was created specifically for Linux?
ext
VMFS
FAT
NTFS
ext=EXTended file system
Which of the answers listed below refers to a proprietary line of low-power consumption small form factor motherboard types for industrial and embedded PC applications?
NLX
ITX
ATX
LPX
ITX
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PHI
PIV
PII
PKI
PII=Personal Identifiable Information
Which of the answers listed below refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of GUI?
VTP
VRF
VTC
VNC
VNC=Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.
Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
SCP
EFS
SSL
TLS
STP
SSL
TLS=Transport Layer Security
A security protocol designed to strengthen WEP implementations is known as:
PEAP
TKIP
CCMP
WPA2
TKIP=Temporal Key Integrity Protocol is a security protocol used in the IEEE 802.11 wireless networking standard.
Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices?
PSK
PTR
PKI
PPP
PPP=Point-to-Point Protocol
A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is referred to as:
CA
PGP
IaaS
PKI
PKI=Public key infrastructure
Which of the terms listed below applies to the authentication process?
MFA
MMC
MDM
MFD
MFA=Multi-factor Authentication, an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.
The bus between the CPU and northbridge is called:
BSB
USB
ICH
FSB
FSB= front-side bus
Which of the following metrics might be of help in diagnosing the declining performance of a storage drive?
PPM
I/O
RPM
IOPS
IOPS=(input/output operations per second)
An access control model that enforces the strictest set of access rules is known as:
MAC
RBAC
DAC
ABAC
MAC
Which OS boot method takes advantage of a network interface?
VTC
GPT
PXE
MBR
PXE=Preboot execution environment
SFTP is an extension to the FTP protocol that adds support for TLS and SSL cryptographic protocols.
True
False
False
Which of the terms listed below refers to a specialized computer software designed for multi-dimensional modeling?
GUI
CAD
PaaS
RAD
CAD=Computer-aided design
Which of the following enables installation of an OS via network interface?
GPT
MMC
PXE
KVM
PXE=Preboot execution environment
An internal hardware component of a PC case used for converting AC power to DC power is referred to as:
UPS
Inverter
SVC
PSU
PSU=Power Supply Unit