A+ 220-1101 Exam Acronyms Quiz - Part 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A type of backlight technology most commonly used in modern laptop devices is known as:

LED

A computer network connecting multiple LANs over an area of a city is known as:

MAN

In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is known as:

MBR

A special-purpose memory used by graphics controllers is referred to as:

VRAM

Which of the following answers refers to a group of technologies enabling telephone calls over the Internet?

VoIP

An ISP offering Internet access to subscribers at a designated wireless hotspot is called:

WISP

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called:

WLAN

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WWAN

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:

ACL

Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?

AMD-V

Which of the answers listed below refers to a file system developed by Apple for its operating systems?

APFS

Which of the answers listed below refers to a network protocol used for connecting devices on a WAN?

ATM

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as:

AUP

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

Authentication

Which part of the AAA framework deals with granting or denying access to resources?

Authorization

Which of the solutions listed below allows to check whether a digital certificate has been revoked?

CRL

What type of action allows an attacker to exploit the XSS vulnerability?

Code injection

An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with:

DHCP

Which type of RAM features separate electrical contacts on each side of the module?

DIMM

A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?

DNS

LDAP is an example of:

Directory access protocol

POP3 protocol is used for:

Email retrieval

(true or false) - Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.

False

(true or false) - IPS, TN, VA, and OLED are all implementations of the LCD display technology.

False

Which of the following answers refer(s) to the characteristic feature(s) of SRAM? (Select all that apply)

Faster than DRAM More expensive in comparison to DRAM Volatile storage media type Utilized for CPU cache memory chips

A type of visual interface consisting of buttons, icons, or menus that can be interacted with without typing in text commands is known as:

GUI

Which of the answers listed below refers to a unique string of characters used to identify hardware, software, and data?

GUID

What type of programming code enables communication between software and hardware devices?

HAL

A list of computer hardware proven to be compatible with a particular OS is referred to as:

HCL

S.M.A.R.T. allows for monitoring a system for anticipated:

HDD/SSD failures

What are the characteristic features of IPS? (Select 3 answers)

High color quality Wide viewing angles Slow response times

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in MS Windows is known as:

MMC

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?

NAT

Which of the following are methods of storing and accessing data over a computer network? (Select 2 answers)

NFS DFS

A database on a mobile device containing bands, sub-bands, and service provider IDs allowing the device to establish connection with the right cell phone tower is referred to as:

PRL

A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is called:

RAID

A dedicated local network consisting of devices providing data access is called:

SAN

Which type of RAM features redundant electrical contacts on both sides of the module?

SIMM

Which of the following answers refers to a dedicated programming language used in database management?

SQL

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:

SaaS

(true or false) - As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.

True

(true or false) - For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, or WPA2) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.

True

(true or false) - PCIe is a high-speed, serial expansion bus designed as a replacement for PCI, PCI-X, and AGP standards.

True

(true or false) - The term "IDS" refers to a device or application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as NIDS, an IDS installed on a host monitoring only that host is called HIDS. IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.

True

Which of the answers listed below refer(s) to HSM? (Select all that apply)

Typically, in the form of an expansion card or an external device Designed to secure hardware through cryptographic functions

What is the name of a common syntax used to describe the location of a network share?

UNC

Which of the answers listed below refers to zero-configuration networking?

UPnP

Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?

USB

boots

hey booty

Which of the following answers refers to the most common programming language designed for website development?

none of the above - HTML CSS XHTML HTML5 ( Your answer) XML

hats

waering hatss


Ensembles d'études connexes

Psych of Personality Final- Unit 11

View Set

高職龍騰英文 B1 (B版) L5 Three Strange Guests 單字&片語

View Set

N360 - Theory - Evolve questions

View Set

Chapter 7: Driving Safely and Studying for your Permit

View Set