Exam Compass Acronyms 8 Flashcards

1
Q

Which of the following answers refer(s) to (an) example(s) of (a) fiber-optic connector(s)? (Select all that apply)
LC
DB-25
ST
Type A
SC
RG-6

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a secure replacement for Telnet?
CHAP
FTP
SNMP
SSH

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?
DKIM
SPF
NS
DMARC

A

DMARC=Domain-based Message Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Authentication
Authorization
Accounting

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SODIMM is a more compact type of computer memory designed for desktop PCs.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Microsoft-proprietary file system optimized for flash drives is known as:
ext3
FAT32
NFS
exFAT
CDFS

A

exFAT=(Extensible File Allocation Table) is a file system introduced by Microsoft in 2006 and optimized for flash memory such as USB flash drives and SD cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the statements listed below refer(s) to the characteristic feature(s) of HDDs in comparison to SSDs? (Select all that apply)
Lower device cost
Higher read/write speeds
Magnetic storage media
Higher power consumption
No internal moving parts
Lower read/write speeds
Higher device cost
Lower power consumption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of computer security solution that allows to define and enforce network access policies is referred to as:
NAC
NIDS
NFC
NAT

A

NAC=Network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of protocol used in network management systems for monitoring network-attached devices is called:
SMB
NTP
SNMP
RDP

A

SNMP=Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which passive adapter types enable DVI-to-HDMI connectivity? (Select 2 answers)
DVI-D to HDMI
DVI-A to HDMI
DVI-I to HDMI
DVI-A/D to HDMI

A

DVI-D to HDMI
DVI-I to HDMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to a short distance, line-of-sight technology used for example in home remote controls?
WiFi
NFC
IR
Z-Wave

A

IR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to a method for identifying logical partitions on a SCSI hard drive?
Host ID
OUI
SCSI ID
LUN

A

LUN=logical unit number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which DNS TXT records are used for spam management? (Select 3 answers)
SPF
DKIM
SRV
DMARC
PTR

A

SPF= Sender Policy Framework
DKIM= Domain Keys Identified Mail
DMARC=Domain-based Message Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following file systems was created specifically for Linux?
ext
VMFS
FAT
NTFS

A

ext=EXTended file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a proprietary line of low-power consumption small form factor motherboard types for industrial and embedded PC applications?
NLX
ITX
ATX
LPX

A

ITX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PHI
PIV
PII
PKI

A

PII=Personal Identifiable Information

17
Q

Which of the answers listed below refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of GUI?
VTP
VRF
VTC
VNC

A

VNC=Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.

18
Q

Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
SCP
EFS
SSL
TLS
STP

A

SSL
TLS=Transport Layer Security

19
Q

A security protocol designed to strengthen WEP implementations is known as:
PEAP
TKIP
CCMP
WPA2

A

TKIP=Temporal Key Integrity Protocol is a security protocol used in the IEEE 802.11 wireless networking standard.

20
Q

Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices?
PSK
PTR
PKI
PPP

A

PPP=Point-to-Point Protocol

21
Q

A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is referred to as:
CA
PGP
IaaS
PKI

A

PKI=Public key infrastructure

22
Q

Which of the terms listed below applies to the authentication process?
MFA
MMC
MDM
MFD

A

MFA=Multi-factor Authentication, an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.

23
Q

The bus between the CPU and northbridge is called:
BSB
USB
ICH
FSB

A

FSB= front-side bus

24
Q

Which of the following metrics might be of help in diagnosing the declining performance of a storage drive?
PPM
I/O
RPM
IOPS

A

IOPS=(input/output operations per second)

25
An access control model that enforces the strictest set of access rules is known as: MAC RBAC DAC ABAC
MAC
26
Which OS boot method takes advantage of a network interface? VTC GPT PXE MBR
PXE=Preboot execution environment
27
SFTP is an extension to the FTP protocol that adds support for TLS and SSL cryptographic protocols. True False
False
28
Which of the terms listed below refers to a specialized computer software designed for multi-dimensional modeling? GUI CAD PaaS RAD
CAD=Computer-aided design
29
Which of the following enables installation of an OS via network interface? GPT MMC PXE KVM
PXE=Preboot execution environment
30
An internal hardware component of a PC case used for converting AC power to DC power is referred to as: UPS Inverter SVC PSU
PSU=Power Supply Unit