CompTIA A+ 220-1101 Exam Acronyms Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following can be the source of RFI and cause disruptions in wireless network connectivity?

All of the above

Which of the following are advantages of NTFS over FAT32?

All of the above are improvements implemented in NTFS not available in FAT32

Which of the following terms refers to the process of sending and receiving data to and from a computer hardware component?

I/O

Examples of secure network protocols used for establishing VPN connections include

IPsec, TLS

Which of the following answers refers to a short distance, line-of-sight technology used for example in home remote controls?

IR

LDAP is an example of

Directory access protocol

SFTP is an extension to the FTP protocol that adds support for TLS and SSL cryptographic protocols.

False

A computer's primary storage media used for quick access to working data and code is known as

RAM

Which of the answers listed below refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network?

RDP

Which wireless technology enables identification and tracking of tags attached to objects?

RFID

A type of identification badge that can be held within a certain distance of a reader to authenticate the badge holder is called

RFID badge

A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions is referred to as

RISC, ARM

Which of the following solutions can be used to provide device authentication before decrypting an HDD?

TPM

Which of the answers listed below refer to RJ11 connector?

Telephone equipment, Dial-up networking, Twisted-pair copper cabling

The term "SMS" is used in reference to

Text messaging services

Which passive adapter types enable DVI-to-HDMI connectivity?

DVI-D to HDMI, DVI-I to HDMI

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

Authentication

In the AAA security architecture, the process of granting or denying access to resources is known as

Authorization

Which part of the AAA framework deals with granting or denying access to resources?

Authorization

Which type of firmware performs initial hardware checks after the computer is powered on?

BIOS

Which of the terms listed below refers to a specialized computer software designed for multi-dimensional modeling?

CAD

ECC RAM

Can detect and correct errors

What type of action allows an attacker to exploit the XSS vulnerability?

Code injection

Which DVI connector type does not provide support for analog signal transmission?

DVI-D

Which of the answers listed below refers to a common target of XSS?

Dynamic web pages

Which of the following is an MS Windows component that enables encryption of individual files?

EFS

The bus between the CPU and northbridge is called

FSB

Which of the acronyms listed below refers to a backup rotation scheme?

GFS

What type of programming code enables communication between software and hardware devices?

HAL

A list of computer hardware proven to be compatible with a particular OS is referred to as

HCL

An emerging field of new technologies, such as wearable tech or home automation is referred to as

IoT

Which of the answers listed below refers to a group of hardware manufacturers focused around developing standards related to short range, line-of-sight, wireless technology?

IrDA

Which of the actions listed below can be taken by an IDS?

Logging, Sending an alert

Which of the answers listed below can be used to describe the TN display technology?

Low viewing angles, Fast response times, Low color quality

A type of computer security solution that allows to define and enforce network access policies is referred to as

NAC

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?

NAT

What is the most common memory module form factor type used in laptops?

SODIMM

A technology that enables translation of printed or typed documents into a digital form is called

OCR

A type of limited-range computer network used for data transmission among various types of personal devices is referred to as

PAN

Which of the terms listed below refers to a lightweight version of MS Windows used for system deployment and recovery?

PE

Which of the answers listed below refers to an example of a security code that is used to authenticate a person to a system?

PIN

Which of the answers listed below describe the features of RDP?

Permanent remote access, Access based on local password (local user account password), Windows tool used for connecting remotely to the user's own computer

A solution that allows to supply electricity over standard Ethernet cables is referred to as

PoE

IMAP is used for

Retrieving email messages from a mail server

A dedicated local network consisting of devices providing data access is called

SAN

Which of the following solutions provide the AAA functionality?

TACACS+, RADIUS

A security protocol designed to strengthen WEP implementations is known as

TKIP

A POST card is used for

Troubleshooting computer startup problems

A local server hosting virtualized OS is an example of an on-premises VDI solution.

True

What are the characteristic features of RJ45 connector?

Used with Ethernet network cabling, Twisted-pair copper cabling connector

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called

Accounting

An MS Windows stop error is informally referred to as

BSoD

A mobile device deployment model that allows employees to use private mobile devices for accessing company's restricted data and applications is known as

BYOD

A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as

CAPTCHA

Which of the answers listed below refers to an example of optical storage media?

CD

Which of the following is a file system designed for optical media?

CDFS

STP cabling reduces what kind of interference?

Crosstalk, EMI

Which of the acronyms listed below refers to the type of electric current supplied to most of the internal PC components?

DC

Examples of connectionless protocols include

DHCP, TFTP

Which type of RAM features separate electrical contacts on each side of the module?

DIMM

Which of the answers listed below refers to an authentication method that enables signing an outbound email message with digital signature?

DKIM

What is the function of FTP?

File exchange

Which technology enables contactless payment transactions?

NFC

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

PII

Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?

RTO

Which type of RAM features redundant electrical contacts on both sides of the module?

SIMM

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called

SaaS

The SCP protocol is used for

Secure file transfer

The SMTP protocol is used for

Sending email messages between mail servers, Sending email messages from a client device

UDP is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

True

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

ACL

What is the most common type of DSL Internet access?

ADSL

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

AES

A type of networking device that allows other wireless devices to connect to a wired network is called

AP

Which of the answers listed below refers to a file system developed by Apple for its operating systems?

APFS

A package file format used by Android OS for distribution and installation of mobile apps is referred to as

APK

Which of the following answers refer(s) to (a) parallel storage media interface(s)? (Select all that apply)

ATA, IDE, PATA

Which of the answers listed below refers to a network protocol used for connecting devices on a WAN?

ATM

What is the most common motherboard type used in desktop PCs?

ATX

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as

AUP

Which of the following answers refer(s) to MSRA? (Select all that apply)

Access based on one-time password, Temporal remote access, The host and invited user can both see the host's screen, The host and invited user share control over host's mouse and keyboard, Windows tool used for assisted remote troubleshooting

Which of the following answers refer to the 2G/3G mobile telecommunications standards?

CDMA, GSM

Which of the following acronyms refers to a group of experts who respond to computer security incidents?

CERT

Which of the answers listed below refers to a command interpreter utility in Windows?

CMD

Which of the solutions listed below allows to check whether a digital certificate has been revoked?

CRL

APIPA allows a Windows host to self-configure an IPv4 address and subnet mask when DHCP is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet).

True

For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.

True

MFA systems require implementation of authentication factors from two or more distinct categories.

True

PCIe is a high-speed, serial expansion bus designed as a replacement for PCI, PCI-X, and AGP standards.

True

TCP is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. TCP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

True

The CMOS battery located on a computer's motherboard allows for maintaining the correct time and date information stored in CMOS RAM. In older computer systems, the CMOS battery also allowed for maintaining the BIOS configuration settings stored in CMOS RAM.

True

The DVI-I connector type provides support for both digital and analog video signal transmission.

True

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

True

The term "UTM" refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.

True

Which of the MS Windows features allows users to run programs with the security privileges of another user?

UAC

A type of firmware interface designed as a replacement for BIOS is referred to as

UEFI

What is the name of a device that can provide short-term emergency power during an unexpected main power source outage?

UPS

A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure, and learn about the presence and capabilities of other devices is referred to as

UPnP

Which type of network cabling is most susceptible to EMI and RFI?

UTP

Which of the answers listed below refer to the RJ11 connector?

Used with telephone cabling, Twisted-pair copper cabling connector

Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location?

VLAN

Which of the answers listed below refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of GUI?

VNC

A set of Intel CPU HAV enhancements is called

VT-x

Which of the following answers refers to a group of technologies enabling telephone calls over the Internet?

VoIP

Which of the following wireless security protocols has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

WEP

What are the characteristic features of an OLED display?

Works without backlight, Lower light output (brightness) in comparison to LCDs, Better contrast ratio and color representation in comparison to LCDs

A Microsoft-proprietary file system optimized for flash drives is known as

exFAT

Which of the following file systems was created specifically for Linux?

ext

Which type of RAM transfers data on both the rising and falling edges of the clock signal?

DDR

Which of the following are methods of storing and accessing data over a computer network?

DFS, NFS

A network protocol providing an alternative solution to the manual allocation of IP addresses is called

DHCP

An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with

DHCP

Which of the following allows the receiver of an email message to verify that the message claimed to have come from a specific domain was indeed authorized by the owner of that domain?

DKIM

A memory access method that bypasses the CPU to speed up memory operations is called

DMA

Which of the following answers refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender's mail policies?

DMARC

A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?

DNS

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS

A type of control access technology providing protection against copyright infringements is known as

DRM

Which of the following answers refer(s) to (a) video connection standard(s)? (Select all that apply)

DVI, DP, HDMI, VGA

Which DVI connector type does not provide support for digital signal transmission?

DVI-A

Which of the terms listed below refer to a product/service that no longer receives continuing support?

EOL

An electrostatic discharge that can damage integrated circuits used in computer and communications equipment is called

ESD

Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against

ESD

An agreement granting the right to use software application in a manner determined by the software vendor is known as

EULA

In a persistent VDI

Each user runs their own copy of virtual desktop, At the end of a session, user data and personal settings are saved

Which of the following answers can be used to describe the characteristics of an XSS attack?

Exploits the trust a user's web browser has in a website, A malicious script is injected into a trusted website, User's browser executes attacker's script

Adding an eSATA device to a PC can be done either by attaching the device cable directly to the motherboard's integrated I/O panel, connecting it via eSATA port on a modular bracket mounted on the back of the PC case, or attaching it directly to a dedicated slot on the motherboard.

False

SODIMM is a more compact type of computer memory designed for desktop PCs.

False

The main difference between the UTP and STP cabling is that the UTP cable takes advantage of additional protective cover reducing signal interference from outside sources.

False

Which of the following answers refer(s) to the characteristic feature(s) of SRAM? (Select all that apply)

Faster than DRAM, More expensive in comparison to DRAM, Volatile storage media type, Utilized for CPU cache memory chips

Which type of network cabling provides immunity against EMI and RFI?

Fiber optic

A mobile device's built-in functionality enabling the usage of locator applications is called

GPS

A type of visual interface consisting of buttons, icons, or menus that can be interacted with without typing in text commands is known as

GUI

Which of the answers listed below refers to a unique string of characters used to identify hardware, software, and data?

GUID

Which of the answers listed below refers to a DRM solution that prevents capturing and replaying multimedia content transmitted via DP, DVI, and HDMI links?

HDCP

S.M.A.R.T. allows for monitoring a system for anticipated

HDD/SSD failures

Which of the interfaces listed below provide the capability for transmission of both video and audio data?

HDMI, DP

Which network protocol enables retrieving contents of an Internet page from a web server?

HTTP

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

HTTPS

The VA display technology can be characterized by

High contrast ratios, Good viewing angles, Good color quality

Which of the following answers refers to a specialized character recognition technology that enables translation of handwriting into a digital form?

ICR

Which of the following answers illustrates the difference between passive and active network security breach response?

IDS vs. IPS

Which of the following terms refers to a global community focused around the development of engineering standards?

IEEE

Which of the following metrics might be of help in diagnosing the declining performance of a storage drive?

IOPS

Which of the answers listed below refers to a resolution type provided by ARP?

IP to MAC

A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as

IRP

Which of the following answers refers to a global standard development organization composed of different national standards bodies?

ISO

Which of the answers listed below refers to a proprietary line of low-power consumption small form factor motherboard types for industrial and embedded PC applications?

ITX

Which of the answers listed below refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

IaaS

SCSI ID

Identifies physical device on a SCSI chain

A type of network connecting computers within a small geographical area such as a building or group of buildings is called

LAN

Which of the following answers refer(s) to (an) example(s) of (a) fiber-optic connector(s)? (Select all that apply)

LC, ST, SC

Which of the following answers refers to a display technology most commonly used in modern laptops?

LCD

A type of backlight technology most commonly used in modern laptop devices is known as

LED

Which of the answers listed below refers to a method for identifying logical partitions on a SCSI hard drive?

LUN

Which of the statements listed below refer(s) to the characteristic feature(s) of HDDs in comparison to SSDs? (Select all that apply)

Lower device cost, Magnetic storage media, Higher power consumption, Lower read/write speeds

Which of the answers listed below refer to SSD form factors?

M.2, mSATA

An access control model that enforces the strictest set of access rules is known as

MAC

Which of the following answers refers to a unique 48-bit address assigned to every network adapter?

MAC

Which of the following answers refers to a dedicated mobile app management software?

MAM

A computer network connecting multiple LANs over an area of a city is known as

MAN

Which of the following are examples of partition styles?

MBR, GPT

Which of the following facilitates the enforcement of mobile device policies and procedures?

MDM

Which type of software enables a centralized administration of mobile devices?

MDM

Which of the terms listed below applies to the authentication process?

MFA

An office equipment that combines the functionality of multiple devices is called

MFD, MFP

A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission is referred to as

MOU

A document describing procedures for safe handling, use, storage, and disposal of potentially hazardous materials is called

MSDS

Which of the following DNS database records maps a domain name to a list of mail servers for that domain?

MX

Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

NAT

A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as

NDA

A technology implemented in modern laptops that enables data transfer and authentication features between the laptop and another portable device at a very close range is known as

NFC

A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of

NFC

What is the name of a computer's hardware component designed for enabling network access?

NIC

A logical device interface used for accessing non-volatile memory storage devices attached via PCIe is referred to as

NVMe

Examples of storage media device interfaces for SSDs include

NVMe, SATA, PCIe

Which of the answers listed below refers to an API that enables communication between hosts on a LAN?

NetBIOS

Which of the following characteristics apply to the type of RAM most commonly used as the main system memory in desktop PCs?

Non-ECC memory, Dynamic RAM

Which of the following answers refers to the most common programming language designed for website development?

None of the above

Which type of fiber-optic equipment can be found at a demarc?

ONT

A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is referred to as

PKI

Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?

POST

Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices?

PPP

A database on a mobile device containing bands, sub-bands, and service provider IDs allowing the device to establish connection with the right cell phone tower is referred to as

PRL

Examples of computer languages that describe the appearance of a printed page include

PS, PCL

An internal hardware component of a PC case used for converting AC power to DC power is referred to as

PSU

Which OS boot method takes advantage of a network interface?

PXE

Which of the following enables installation of an OS via network interface?

PXE

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable

Printing

What are the characteristic features of SMB/CIFS? (Select all that apply)

Provides shared access to files, directories, and devices, Used mainly by computers running Microsoft Windows operating systems

Which of the answers listed below describe the features of SSDs?

Relatively high device cost, Lower capacity in comparison to magnetic drives, High performance

What is the purpose of a DoS attack?

Resource exhaustion

Which of the answers listed below describes the result of a successful DoS attack?

Resource exhaustion

Examples of cabling types used for mass storage devices include: (Select all that apply)

SATA, IDE/PATA, USB, SCSI, eSATA

Which of the following answers refers to industrial and manufacturing control system?

SCADA

Which of the following requires termination?

SCSI chain

Which of the answers listed below refers to a technology designed to simplify network infrastructure management?

SDN

A type of smart card used in mobile phones to identify the client is known as

SIM

A type of protocol used in network management systems for monitoring network-attached devices is called

SNMP

Which of the answers listed below refers to a type of network protocol used for synchronizing clocks over a computer network?

SNTP

A type of LAN used in small business environments is referred to as

SOHO

Which of the answers listed below refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?

SPF

Which of the following answers refers to an open standard defining a technical method to prevent electronic mail sender address forgery?

SPF

Which DNS TXT records are used for spam management?

SPF, DKIM, DMARC

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as

SSH

Which of the answers listed below refers to a secure replacement for Telnet?

SSH

Which of the following serves as a unique identifier for a WLAN?

SSID

Which of the following answers refers to a deprecated encryption protocol?

SSL

Which of the following protocols are used for securing HTTP connections?

SSL, TLS

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as

SSO

Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?

TCP/IP

Which of the following answers refers to an internal network server used for delivering software upgrades to network devices?

TFTP server

What is the name of a hardware device that allows for administering multiple hosts with the use of a single mouse, keyboard, and computer screen?

KVM

In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is known as

MBR

Which of the following answers refers to a software that provides the functionality of a physical computer?

VM

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is called

VPN

A special-purpose memory used by graphics controllers is referred to as

VRAM

A computer network connecting multiple smaller networks over very large geographical areas is referred to as

WAN

An ISP offering Internet access to subscribers at a designated wireless hotspot is called

WISP

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called

WLAN

A type of wireless network topology in which each node has a direct connection to every other node is an example of

WMN

Which wireless encryption scheme offers the highest level of protection?

WPA3

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WWAN

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as

ACL

Which MFD/MFP feature optimizes processing of multi-page documents?

ADF

Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?

AMD-V

POP3 protocol is used for

Email retrieval

Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.

False

IPS, TN, VA, and OLED are all implementations of the LCD display technology.

False

Which of the acronyms listed below is used to describe a collection of information about a particular subject?

KB

What are the characteristic features of IPS?

High color quality, Wide viewing angles, Slow response times

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

Methods used by Microsoft Windows operating systems for organizing disk partitions include

MBR, GPT

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in MS Windows is known as

MMC

Which cloud service model would provide the best solution for a web developer intending to create a web app?

PaaS

A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is called

RAID

Which of the following enables remote control over network devices?

RMM

Which of the following answers refers to a serial storage media interface?

SATA

A network protocol for secure file transfer over SSH is called

SFTP

Which of the following answers refers to a dedicated programming language used in database management?

SQL

Which of the answers listed below refer to the characteristic features of SAS?

Serial interface, Point-to-point connection, Does not require bus termination

Which of the answers listed below refers to a dedicated microcontroller designed for conducting cryptographic operations?

TPM

As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.

True

The term "IDS" refers to a device or application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as NIDS, an IDS installed on a host monitoring only that host is called HIDS. IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.

True

UTP is a type of inexpensive and easy to install copper cabling used in Ethernet networks and telephone systems. UTP cabling is not surrounded by any shielding that would provide protection against interference from outside sources. An additional protective cover that reduces signal interference from outside sources is a feature of STP cabling.

True

Which of the answers listed below refer(s) to HSM? (Select all that apply)

Typically, in the form of an expansion card or an external device, Designed to secure hardware through cryptographic functions

What is the name of a common syntax used to describe the location of a network share?

UNC

Which of the answers listed below refers to zero-configuration networking?

UPnP

Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?

USB

A remote server hosting a virtualized user OS is an example of

VDI


Kaugnay na mga set ng pag-aaral

Walt Whitman and Emily Dickinson Test

View Set

Literary Devices, elements, and techniques

View Set

Project Management - Ch. 10 MCQ only

View Set

Ch2: Life Insurance: Life Insurance - Life Basics

View Set

Term 2: Lesson 5 - AP-Style MC Practice

View Set

Occupation& Environ Safety Mgt CH 16 & 18

View Set

CAPM Chapter 9: Project Communications Management

View Set