A+ 220-1101 Exam Acronyms

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A type of backlight technology most commonly used in modern laptop devices is known as: CCFL CRT OLED LED

LED - Light emitting diode

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices? SDN WWAN ATM WLAN

WWAN Wireless Wide Area Network

A special-purpose memory used by graphics controllers is referred to as: SRAM PROM DRAM VRAM

VRAM - Video Random Access Memory. Dual-ported variant of dynamic RAM; once commonly used to store the framebuffer in some graphics adapters. VRAM is no longer widely used, though many VRAM concepts such as on-chip buffering and organization are still used in modern graphics adapters.

Which of the following answers refers to a group of technologies enabling telephone calls over the Internet? VoIP PSTN VPN POTS

VoIP - Voice over IP

An ISP offering Internet access to subscribers at a designated wireless hotspot is called: NSP WISP TSP NaaS

WISP - Wireless Internet Service Provider

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called: MAN WLAN LAN VLAN

WLAN - Wireless Local Area Network

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as: ACL CSR DLP AUP

ACL - In computer security, an access-control list (ACL) is a list of permissions[a] associated with a system resource (object or facility). An ACL specifies which users or system processes are granted access to resources, as well as what operations are allowed on given resourcess.[1] Each entry in a typical ACL specifies a subject and an operation. For instance, If a file object has an ACL that contains (Alice: read,write; Bob: read), this would give Alice permission to read and write the file and give Bob permission only to read it. If the RACF profile CONSOLE CLASS(TSOAUTH) has an ACL that contains (ALICE:READ), this would give ALICE permission to use the TSO CONSOLE command.

Which of the answers listed below refers to the file system developed by Apple for its operating system? APFS FAT NTFS exFAT

APFS - Apple File System

Which of the answers listed below refers to a network protocol used for connecting devices on a WAN? Wi-Fi ARP NetBT ATM

ATM - Asynchronous Transfer Mode. A telecommunications concept defined by ANSI and ITU standards for carrying a complete range of user traffic (voice, data and video signals). Designed to unify telecommunication and computer networks. Encodes data into small (fixed-size) cells. (IP and Ethernet use variable sized packets or frames.)

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as: SLA EULA AUP BPA

AUP Acceptable Use Policy

Which part of the AAA security architecture deals with the verification of the identity of a person or process? Authentication Authorization Accounting

Authentication

Which part of the AAA framework deals with granting or denying access to resources? Authentication Identification Accounting Authorization

Authorization

Which of the solutions listed below allows to check whether a digital certificate has been revoked? CIRT CRL CSR OSPF

CRL - In cryptography, a certificate revocation list (or CRL) is "a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted". CRLs are no longer required by the CA/Browser forum, as alternate certificate revocation technologies (such as OCSP) are increasingly used instead. Nevertheless, CRLs are still widely used by the CAs.

What type of action allows an attacker to exploit the XSS vulnerability? Code injection Banner grabbing PIN recovery Input validation

Code injection

Which of the following are methods of storing and accessing data over a computer network? (Select 2 answers) ext3 DFS ext4 FAT32 NFS exFAT

DFS ------ Distributed File System. Any file system that allows access to files from multiple hosts sharing via a computer network. NFS ------ Network File System. Distributed file system protocol that allows a user on a client computer to access files over a network in a manner similar to how local storage is accessed.

Which type of RAM features separate electrical contacts on each side of the module? SRAM DIMM DRAM SIMM

DIMM Dual Inline Memory Module

A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem? ICMP DNS HTTP DHCP

DNS

LDAP is an example: Authentication protocol Address resolution protocol Directory access protocol File exchange protocol

Directory access protocol LDAP stands for Lightweight Directory Access Protocol

POP3 protocol is used for: Name resolution Sending email messages File exchange Email retrieval

Email retrieval

IPS, TN, VA, and OLED are all implementations of the LCD display technology. True or False

False IPS - IPS stands for In Plane Switching and it's the type of display technology that you'll see most commonly on your smartphone. TN - TN stands for Twisted Nematic and these are the most commonly used panels in PC monitors. Two of the biggest benefits of TN panels are lightning fast response times and a low cost. Oldest form VA - Vertical alignment: Also referred to as "super vertical alignment" (SVA) by Samsung and "advanced multi-domain vertical alignment" (AMVA) by AU Optronics. All share similar characteristics. OLED - Organic light-emitting diode: Display technology where an organic compound provides the light for the screen, thus eliminating the need for a backlight or inverter. Used in high-end TVs and small devices such as smart watches, smart phones, and VR headsets. -- NOT LCD technology but LED tech The names relate to the alignment of molecules within the LCD (liquid crystal display), and how they change when voltage is applied. All LCD monitors change the alignment of these molecules to work, but the manner in which they do so can drastically affect the image and response time.

Which of the following answers refer(s) to the characteristic feature(s) of SRAM? (Select all that apply) Non-volatile storage media type Faster than DRAM Widely used as the primary storage media (regular RAM modules installed in memory slots on the motherboard) More expensive in comparison to DRAM Slower than DRAM Volatile storage media type Utilized for CPU cache memory chips Less expensive in comparison to DRAM

Faster than DRAM More expensive in comparison to DRAM Volatile storage media type Utilized for CPU cache memory chips

A type of visual interface consisting of buttons, icons, or menus that can be interacted with - without typing in text commands is known as: GUI CLI TUI VDI

GUI - Graphical User Interface. Allows users to interact with electronic devices using images rather than only text commands.

Which of the answers listed below refers to a unique string of characters used to identify hardware, software, and data? OID GUID URI OUI

GUID - A Universally Unique Identifier (UUID) is a 128-bit label used for information in computer systems. The term Globally Unique Identifier (GUID) is also used, mostly in Microsoft systems

What type of programming code enables communication between software and hardware devices? HAL HCL HSM DLL

HAL - Hardware Abstraction Layer. Lower level language that interacts directly with hardware instead of a system kernel. Requires less processing time than Application Programming Interfaces (APIs), though both are often used by higher level languages to communicate with lower level components.

A list of computer hardware proven to be compatible with a particular OS is referred to as: CRL HCL PRL HAL

HCL ------ Hardware Compatibility List. List of computer hardware that is compatible with a particular OS or device management software.

S.M.A.R.T. allows for monitoring a system for anticipated: HDD/SSD failures Network Interface problems Video adapter failures Power spikes

HDD/SSD failures

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP IP TCP NetBIOS

IP - Internet Protocol

What are the characteristic features of IPS? (Select 3 answers) High color quality Fast response times Wide viewing angles Low color quality Slow response times Low viewing angles

IPS - IPS (in-plane switching) is a screen technology for liquid-crystal displays (LCDs). In IPS, a layer of liquid crystals is sandwiched between two glass surfaces. The liquid crystal molecules are aligned parallel to those surfaces in predetermined directions (in-plane). The molecules are reoriented by an applied electric field, whilst remaining essentially parallel to the surfaces to produce an image. It was designed to solve the strong viewing angle dependence and low-quality color reproduction of the twisted nematic field effect (TN) matrix LCDs prevalent in the late 1980s. High color quality Wide viewing angles Slow response times

In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is known as: MBR GPT PXE GUID

MBR ------ Master Boot Record. Special type of boot sector at the very beginning of partitioned mass storage devices. Holds information on how the logical partitions are organized on that medium

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in MS Windows is known as: MDM MFA MMC MAM

MMC - Microsoft Management Console. Component of Windows 2000 and onward that enables system admins and advanced users to configure and monitor the system.

Which of the following answers refers to the most common programming language designed for website development? HTML CSS XHTML HTML5 XML None of the above

None of the above JavaScript might be the most common

A database on a mobile device containing bands, sub-bands, and service provider IDs allowing the device to establish connection with the right cell phone tower is referred to as: PRL RIS PRI PII

PRL - Preferred Roaming List The Preferred Roaming List (PRL) is a database residing in a wireless (primarily CDMA) device, such as a cellphone, that contains information used during the system selection and acquisition process. In the case of R-UIM-based CDMA devices, the PRL resides on the R-UIM. The PRL indicates which bands, sub bands, and service provider identifiers will be scanned and in what priority order.[1][2] Without a PRL, the device may not be able to roam, i.e. obtain service outside of the home area. There may be cases where missing or corrupt PRLs can lead to a customer not having service at all.

A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is called: SAN RAID NAS JBOD

RAID

A dedicated local network consisting of devices providing data access is called: SDN NAS iSCSI SAN

SAN - Storage Area Network A storage area network (SAN) or storage network is a computer network which provides access to consolidated, block-level data storage. SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage. A SAN typically is a dedicated network of storage devices not accessible through the local area network (LAN). Although a SAN provides only block-level access, file systems built on top of SANs do provide file-level access and are known as shared-disk file systems. Newer SAN configurations enable hybrid SAN[1] and allow traditional block storage that appears as local storage but also object storage for web services through APIs.

Which type of RAM features redundant electrical contacts on both sides of the module? SIMM DRAM SRAM DIMM

SIMM - Single In-Line Memory Module DRAM - Dynamic Random Access Memory SRAM - Static Random Access Memory DIMM - Dual In-Line Memory Module

Which of the following answers refers to a dedicated programming language used in database management? PHP C SQL JS

SQL

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called: PaaS SaaS IaaS DaaS

SaaS Software as a Service

As opposed to simple Denial of Service (DoS) attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack. True or False

True

PCIe is a high-speed, serial expansion bus designed as a replacement for PCI, PCI-X, and AGP standards. True or False

True

The term "IDS" refers to a device or application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as NIDS, an IDS installed on a host monitoring only that host is called HIDS. IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs. True or False

True

What is dynamic and static? Dynamic means "energetic or forceful," while static means "stationary." In computer terminology, however, dynamic usually means "capable of action or change," while static means "fixed."

True

Which of the answers listed below refer(s) to HSM? (Select all that apply) Typically, in the form of an expansion card or an external device Designed to secure hardware through cryptographic functions Typically, in the form of a chip embedded into computer motherboard International standard for a secure cryptoprocessor

Typically, in the form of an expansion card or an external device Designed to secure hardware through cryptographic functions

Which of the answers listed below refers to zero-configuration networking: WAP UPnP TKIP PnP

UPnP - Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services. UPnP is intended primarily for residential networks without enterprise-class devices.

Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices? IDE PCIe USB eSATA

USB

Which of the answers listed below refers to HAV (hardware-assisted virtualization) enhancements developed by AMD for its CPUs? Hyper-V AMD Catalyst VT-x AMD-V

What is AMD Virtualization (AMD-V)? AMD-V (AMD Virtualization) technology refers to a set of hardware extensions and on-chip features for the AMD family of x86 microprocessors. Advanced Micro Devices (AMD) designed the technology to perform the repetitive tasks that software normally performs and to improve resource use and virtual machine (VM) performance. First announced in 2004 and introduced in 2006, AMD-V technology added VM capability via VM instructions in AMD's x86 CPU chips. The technology uses hardware to simplify the tasks that VM managers normally perform via software emulation. It does this by incorporating hardware virtualization extensions in the processor's instruction set, thus enhancing the instruction set and simplifying VM tasks.


Kaugnay na mga set ng pag-aaral

MindTap: Worksheet 12.5: Third Party Rights

View Set

Australia, New Zealand, Oceania, and Antarctica

View Set

French Revolution- Napoleon period

View Set

Prep U for cardiovascular test one review questions

View Set

PET/KET Vocabulary: Sports (with Pictures)

View Set

Review Questions for Chapter 17: Methods of Persuasion

View Set