Network+ N10-008 Exam Acronyms Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following answers refers to a valid IPv6 EUI-64 format address generated from a MAC address of 29:88:68:0B:1B:CA? 2001:DB8:ABCD:12:2A88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2C88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2D88:68FF:FE0B:1BCA

2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA

Which 802.11 standard introduces MIMO? 802.11g 802.11n 802.11ac 802.11ax

802.11n

Which of the DNS database records listed below returns a 32-bit IP address? MX AAAA CNAME A PTR

A

Which DNS record returns a 128-bit IPv6 address? MX AAAA A CNAME

AAAA: authentication, authorization, accounting and auditing

What is the most common type of a DSL Internet access? VDSL ADSL SDSL UDSL

ADSL: Asymmetric digital subscriber line, a new modem technology that converts existing twisted-pair telephone lines into access paths for high-speed communications of various sorts.

Which of the cryptographic algorithms listed below is the least vulnerable to attacks? AES DES RC4 3DES

AES: Advanced Encryption Standard, a symmetric block cipher chosen by the U.S. government to protect classified information

Which part of the IPsec protocol suite provides authentication and integrity? CRC AH SIEM AES

AH: Authentication Header, provides a mechanism for authentication only.

Which of the following fiber-optic connector types features a fiber end polished at an angle? APC Flat PC UPC

APC: Angled Physical Connect, the ferrule endface radius of which is polished at an 8°angel, minimizing the back reflection as a result

Which of the answers listed below refers to a possible symptom of the exhausted DHCP scope? Duplicate IP addresses APIPA address Duplicate MAC addresses Loopback address

APIPA address: Automatic Private IP Addressing, a feature implemented in the Microsoft Windows operating system that allows devices to automatically assign IP addresses to themselves when they cannot get an IP address from a Dynamic Host Configuration Protocol (DHCP) server

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as: SLA EULA AUP BPA

AUP: acceptable use policy, a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources

A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs. crossover) and configures the connection appropriately is known as: GBIC BRI UC gateway Auto MDI-X

Auto MDI-X: auto crossover, automatically detects the required cable connection type and configures the connection appropriately,

Which of the acronyms listed below refers to a policy of permitting employees to bring personal devices and to use those devices for accessing privileged company information and applications? BSOD BYOD JBOD BYOB

BYOD: Bring your Own Device, he set of policies in a business that allows employees to use their own devices - phone, laptop, tablet or whatever - to access business applications and data, rather than forcing employees to use company-provided devices for that purpose.

A type of network that interconnects multiple LANs within a limited geographical area is known as: BAN CAN SAN RAN

CAN: campus area network, a computer network that spans a limited geographic area.

Which of the answers listed below refers to a solution that replaces the classful network design? VLAN RSTP SNAT CIDR

CIDR: Classless Inter-Domain Routing, an IP address allocation method that improves data routing efficiency on the internet.

Which of the following DNS database records allows multiple domain names to resolve to the same IP address? MX CNAME AAAA PTR

CNAME: A canonical name, a type of Domain Name System (DNS) database record that indicates that a domain name is the nickname or alias for another domain name.

Which of the following enables detecting common transmission errors? DSU CRC OID CSU

CRC: Cyclic Redundancy Check, an error-detecting code used to determine if a block of data has been corrupted

A solution that allows to control access to a shared transmission medium in 802.11 networks is known as: CWDM CSMA/CD CDMA CSMA/CA

CSMA/CA: Carrier sense multiple access/collision avoidance, a protocol for carrier transmission in 802.11 networks.

Which of the following answers refers to a vulnerability database? DBA CVE DBaaS AIS

CVE: Common Vulnerabilities and Exposures

Which of the following answers refer to multiplexing methods used in fiber-optic communication? (Select 2 answers) CDMA CWDM CSMA/CD CSMA DWDM CSMA/CA

CWDM, DWDM CWDM: course wavelength division multiplexing DWDM: dense wavelength division multiplexing

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information? DRP DHE DLP DEP

DLP: Data loss prevention, makes sure that users do not send sensitive or critical information outside the corporate network

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? TCP/IP DNS SQL DHCP

DNS: A Domain Name System, turns domain names into IP addresses, which allow browsers to get to websites and other internet resources.

Which of the following answers refers to a cloud-based VDI service? IaaS PaaS DaaS SaaS

DaaS: Desktop as a Service, a cloud computing offering where a service provider delivers virtual desktops to end users over the Internet, licensed with a per-user subscription.

LDAP is an example of: Authentication protocol Address resolution protocol Directory access protocol File exchange protocol

Directory access protocol: a computer and internet standard

Which part of IPsec provides authentication, integrity, and confidentiality? AES SHA AH ESP

ESP:Event stream processing, a software programming technique designed to process a continuous stream of device data and take action on it in real time

Which of the following enables automatic configuration of an IPv6 address? EUI-64 UEFI APIPA MAC-48

EUI-64: The 64-bit Extended Unique Identifier, a special address format that maps device hardware network addresses into IPv6 addresses.

POP3 is used for: Name resolution Sending email messages File exchange Email retrieval

Email retrieval

What are the characteristics of TACACS+? (Select 3 answers) Encrypts only the password in the access-request packet Combines authentication and authorization Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization Primarily used for network access

Encrypts the entire payload of the access-request packet, Primarily used for device administration, Separates authentication and authorization

CRC allows for collecting metrics that provide information on: Error rates Network utilization Packet drops Bandwidth/throughput

Error rates: a term that describes the degree of errors encountered during data transmission over a communication or network connection.

A type of coaxial connector commonly used for cable television and cable modems is called: RG-6 F-type DB-9 MT-RJ

F-type

High MTBF value indicates that a component or system provides low reliability and is more likely to fail. True False

False

Which of the following provides a countermeasure against SPOF? HA DLP VM AAA

HA: High availability, the elimination of single points of failure to enable applications to continue to operate even if one of the IT components it depends on, such as a server, fails.

Which protocol allows for retrieving contents of an Internet page from a web server? SNMP HTTP SMTP IMAP

HTTP: Hypertext Transfer Protocol, an application protocol for distributed, collaborative, hypermedia information systems that allows users to communicate data on the World Wide Web.

Which of the following answers illustrates the difference between passive and active network security breach response? HIPS vs. NIPS UTM vs. Firewall NIPS vs. UTM IDS vs. IPS

IDS vs. IPS IDS: Intrusion Detection System, a network security technology originally built for detecting vulnerability exploits against a target application or computer IPS: intrusion prevention system, a network security tool (which can be a hardware device or software) that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.

Examples of secure VPN tunneling protocols include: (Select 2 answers) bcrypt SCP IPsec WEP TLS

IPsec: a set of communication rules or protocols for setting up secure connections over a network, TLS: Transport Layer Security, a cryptographic protocol designed to provide communications security over a computer network.

Which of the following terms refers to a company that provides Internet access? ISP ICS IDS IPS

ISP:An internet service provider, a company that provides access to the internet

Which of the following answers refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software? SaaS DaaS PaaS IaaS

IaaS: Infrastructure as a Service, a cloud computing model that provides on-demand access to computing resources such as servers, storage, networking, and virtualization

An emerging field of new technologies, such as wearable tech or home automation is known as: SoC NFC IoT ESN

IoT: Internet of Things, the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves.

Which of the following solutions enables combining several physical ports of a switching device into a single logical channel? RSTP VRRP LACP HSRP

LACP: Link Aggregation Control Protocol, provides a method to control the bundling of several physical links together to form a single logical link.

A type of network connecting computers within a small geographical area such as a building or group of buildings is called: PAN LAN MAN WAN

LAN: local area network, a collection of devices connected together in one physical location, such as a building, office, or home

Which of the following answers refer(s) to (an) example(s) of (a) fiber-optic connector(s)? (Select all that apply) LC DB-25 ST SC MT-RJ RG-6

LC, ST, SC, MT-RJ LC: Lucent Connector, translucent/transparent connector ST: Straight Tip connector, A fiber-optic cable connector that uses a bayonet plug and socket SC: Standard Connector, Subscriber Connector, A fiber-optic cable connector that uses a push-pull latching mechanism similar to common audio and video cables. MT-RJ: Mechanical Transfer Registered Jack, a connector used for fiber optic cables.

Which of the actions listed below can be taken by an IDS? (Select 2 answers) Firewall reconfiguration Closing down connection Logging Terminating process Sending an alert

Logging, Sending an alert logging: The act of keeping a log of events that occur in a computer system, such as problems, errors or just information on current operations

Which of the following answers refers to a sublayer of the OSI data link layer? MAC TCP IP UDP

MAC: media access control, a physical address and hardware address whose number is uniquely formatted in hexadecimal format and given to each computer or network device on a computer network

An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as: MIB DCS NMS SIEM

MIB: Management Information Base, a hierarchical database that contains configuration and other vital management information of SNMP devices in the form of data objects

Which of the following terms is used to describe an average time required to repair a failed component or device? MTBF RPO MTTR SLA

MTTR: mean time to recovery or mean time to restore, the average time it takes to recover from a product or system failure

Which of the following DNS database records maps a domain name to a list of mail servers for that domain? NS SPF MX PTR

MX:mail exchange, record directs email to a mail server

A type of computer security solution that allows to define and enforce network access policies is referred to as: NAC NIDS NFC NAT

NAC: Network access control, the process of restricting unauthorized users and devices from gaining access to a corporate or private network.

A dedicated storage appliance that can be added to a local network is known as: SPS NAS SAN NFS

NAS: network-attached storage, a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.

A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as: ISA NDA BPA SLA

NDA: non-disclosure agreement, a legal document between two or more parties that outlines the conditions for sharing confidential information.

Which protocol ensures the reliability of the Kerberos authentication process? EAP NTP IPsec RTP

NTP: Network Time Protocol, a protocol that allows the synchronization of system clocks (from desktops to servers).

Which of the following answers refers to a seven-layer conceptual framework designed to describe network communication between computer systems? OSI Internet protocol suite TCP/IP IaaS

OSI:open systems interconnection model, a conceptual model created by the International Organization for Standardization which enables diverse communication systems to communicate using standard protocols.

A type of specialized cable tester that allows for locating faults and breaks in fiber-optic cabling is known as: OTDR Toner probe Loopback adapter Smart jack

OTDR: Optical Time Domain Reflectometer, a device that tests the integrity of a fiber cable and is used for the building, certifying, maintaining, and troubleshooting fiber optic systems.

A type of limited-range computer network used for data transmission among various types of personal devices is referred to as: PAN LAN SAN MAN

PAN:A personal area network, connects electronic devices close to the user, such as a wireless mouse, a keyboard, and a computer

Which of the following answers refers to a device designed to supply (and monitor the quality of) electric power to multiple outlets? PSU MDF PDU IDF

PDU: power distribution unit, a device with multiple power outlets that provides electrical protection and distributes power to IT equipment within a rack.

Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP? PSK 802.1X SAE TKIP

PSK: Phase-shift keying, a digital modulation process which conveys data by changing (modulating) the phase of a constant frequency carrier wave

Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers) PTR record creates a pointer that maps a hostname to an IP address for reverse lookups. The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address. PTR record resolves an IP address to a hostname for reverse lookups. The functionality provided by a PTR record is the opposite of A and AAAA DNS records. PTR record maps a domain name to a list of mail servers for that domain.

PTR record resolves an IP address to a hostname for reverse lookups, The functionality provided by a PTR record is the opposite of A and AAAA DNS records.

Which cloud service model would provide the best solution for a web developer intending to create a web app? XaaS SaaS PaaS IaaS

PaaS: Platform as a service

What are the characteristic features of SMB/CIFS? (Select 2 answers) Used mainly by computers running Linux distributions Provides shared access to files, directories, and devices Enables connectivity over SAN Used mainly by computers running Microsoft Windows operating systems Enables voice and multimedia communications over IP networks

Provides shared access to files, directories, and devices, Used mainly by computers running Microsoft Windows operating systems

In IPv6, a router periodically sends a special type of message to announce its presence on the network. This type of message is known as: BPDU RA SSID Beacon frame

RA:registration authority, an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.

A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is referred to as: SAN RAID NAS JBOD

RAID:redundant array of inexpensive disks/redundant array of independent disks, a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as: RDP SSH Telnet rsh

RDP: Remote Desktop Protocol, a secure network communication protocol offered by Microsoft, allows users to execute remote operations on other computers

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network? RDP SSH VNC Telnet

RDP: Remote Desktop Protocol, a secure network communication protocol offered by Microsoft, allows users to execute remote operations on other computers

Examples of distance-vector routing protocols include: (Select 2 answers EGP OSPF RIP EIGRP BGP

RIP, EIGRP RIP: Routing Information Protocol, a distance-vector routing protocol EIGRP: Enhanced Interior Gateway Routing Protocol, a network protocol that enables routers to exchange information more efficiently than earlier network protocols,

An estimated measurement of the power level that a wireless client device is receiving from an Access Point (AP), or router is referred to as: ESS RSSI SNR EIRP

RSSI: Received Signal Strength Indicator, a measurement of how well your device can hear a signal from an access point or router

A network protocol used for establishing and controlling live media broadcasts over an IP network is known as: RTSP MPLS HSRP RSTP

RTSP:Real Time Streaming Protocol, an application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data.

Which of the following answers refer(s) to SSDs? (Select all that apply) Low performance Relatively high device cost Lower capacity in comparison to magnetic drives High performance Relatively low device cost Higher capacity in comparison to magnetic drives Lack of moving parts (takes advantage of memory chips instead of magnetic platters)

Relatively high device cost, Lower capacity in comparison to magnetic drives, High performance, Lack of moving parts (takes advantage of memory chips instead of magnetic platters)

What is the purpose of a DoS attack? Code injection Resource exhaustion Malware infection Privilege escalation

Resource exhaustion

In SNMP, each node in a MIB is uniquely identified by a(n): SAN SDN SSP SEH

SDN: software-defined networking, an architecture designed to make a network more flexible and easier to manage

A network protocol for secure file transfer over Secure Shell (SSH) is called: TFTP SFTP Telnet FTPS

SFTP: Secure File Transfer Protocol, a secure file transfer protocol that uses secure shell encryption to provide a high level of security for sending and receiving file transfers.

A security solution designed to detect anomalies in the log and event data collected from multiple network devices is called: SNMP PCAP HIPS SIEM

SIEM: Security information and event management, a solution that helps organizations detect, analyze, and respond to security threats before they harm business operations.

An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is known as: SOW MSA SLA MOU

SLA: service-level agreement, sets the expectations between the service provider and the customer and describes the products or services to be delivered, the single point of contact for end-user problems, and the metrics by which the effectiveness of the process is monitored and approved

Which of the following terms refers to an agreement that specifies performance requirements for a vendor? MSA SLA MOU SOW

SLA: service-level agreement, sets the expectations between the service provider and the customer and describes the products or services to be delivered, the single point of contact for end-user problems, and the metrics by which the effectiveness of the process is monitored and approved

Which of the following allows a network node to autoconfigure an IPv6 address in the absence of a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server? APIPA CIDR NetBEUI SLAAC

SLAAC: Stateless Address Autoconfiguration, It is a mechanism that enables each host on the network to auto-configure a unique IPv6 address without any device keeping track of which address is assigned to which node.

A type of protocol used in network management systems for monitoring network-attached devices is called: SMB NTP SNMP RDP

SNMP: Simple Network Management Protocol, a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks.

A DNS record that stores administrative information about a domain or zone is known as: NS SOA CNAME SRV

SOA: Service-oriented architecture, a method of software development that uses software components called services to create business applications.

A type of LAN used in small business environments is referred to as: BAN SOHO MWN WLAN

SOHO: small office/home office, a room in someone's house with electronic equipment such as a computer and a fax machine, that is used as a place in which to work

Which of the following answers refers to a dedicated programming language used in database management? PHP C SQL JS

SQL: Structured query language, a programming language for storing and processing information in a relational database

Which of the following answers refers to a non-proprietary cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services? RDP Telnet SSH RAS

SSH:Secure Shell, a network communication protocol that enables two computers to communicate

Which of the following serves as a unique identifier for a WLAN (a wireless network name)? EUI SSID OUI CNAME

SSID: service set identifier, a sequence of characters that uniquely names a Wi-Fi network

Which of the following answers refers to a deprecated encryption protocol? SSH TLS S/MIME SSL IPsec

SSL: Secure sockets layer, a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as: NAC SSO AAA MFA

SSO:Single sign-on, an identification method that enables users to log in to multiple applications and websites with one set of credentials.

Which type of twisted-pair copper cabling takes advantage of an additional protective cover reducing signal interference from outside sources? Coax STP UTP Twinax

STP: Shielded Twisted Pair

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called: PaaS SaaS IaaS DaaS

SaaS: Software as a service, allows users to connect to and use cloud-based apps over the Internet

Which of the answers listed below refer(s) to the characteristic feature(s) of SFP? (Select all that apply) Small form factor transceiver Converts electrical signals to optical signals Data transfer of 10 Gbps Newer transceiver type that replaces GBIC Modular (hot swappable) interface Converts optical signals to electrical signals Fixed physical interface Data transfer of 1 Gbps

Small form factor transceiver, Converts electrical signals to optical signals, Newer transceiver type that replaces GBIC, Modular (hot swappable) interface, Converts optical signals to electrical signals, Data transfer of 1 Gbps

Three-way handshake, retransmission of lost packets, flow control, and sequencing are the characteristic features of: TCP IP ICMP UDP

TCP: Transmission Control Protocol, a communications standard that enables application programs and computing devices to exchange messages over a network

Which of the following answers refers to an example of a connection-oriented protocol? UDP IP ICMP TCP

TCP: Transmission Control Protocol, a communications standard that enables application programs and computing devices to exchange messages over a network

Which of the following defines how long DNS settings are stored in cache before they are updated? TTL REFRESH NULL EXPIRE

TTL: Time to live, the amount of time or "hops" that a packet is set to exist inside a network before being discarded by a router.

What are the characteristic features of FCoE? (Select all that apply) Requires separate cabling infrastructure Takes advantage of copper cabling Enables connectivity between servers and data storage devices Does not require any specialized hardware Takes advantage of fiber-optic cabling Requires specialized hardware Does not require separate cabling infrastructure

Takes advantage of copper cabling, Enables connectivity between servers and data storage devices, Does not require any specialized hardware, Does not require separate cabling infrastructure

An IP address that does not correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA). True False

True

As opposed to the simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet. True False

True

The Internet is an example of a large public WAN. True False

True

The term "CIA triad" is used to describe the basic principles of information security. True False

True

vSwitch and vNIC are emulated hardware components that enable VM-to-VM connectivity as well as connections between VMs and physical networks. True False

True

A device designed to provide emergency power during an unexpected main power source outage is called: UPS PoE SVC PSU

UPS: An uninterruptible power supply, a device that maintains power in the event of a failure.

Which of the following identifies the address of a resource on the web and the protocol used to access it? DNS URL FQDN TLD

URL: Uniform Resource Locator, A URL is nothing more than the address of a given unique resource on the Web.

A logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location is known as: VLAN DMZ UC gateway SNMP community

VLAN: virtual local area network, a virtualized connection that connects multiple devices and network nodes from different LANs into one logical network.

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called: MAN WLAN LAN VLAN

WLAN: A wireless local-area network, a group of colocated computers or other devices that form a network based on radio transmissions rather than wired connections

Which of the following wireless encryption schemes offers the highest level of protection? WEP WPA3 WAP WPA WPA2

WPA3

Which of the answers listed below refer(s) to reversed TX/RX? (Select 2 answers) Far end crosstalk Wrong TIA/EIA cable standard type used Frequency mismatch Wrong pin/pair assignments on cable ends Near end crosstalk

Wrong TIA/EIA cable standard type used, Wrong pin/pair assignments on cable ends

In telecommunications, this unit is used for measuring signal strength. dB bps Hz Bd

dB: decibel, a logarithmic unit used to measure sound level. It is also widely used in electronics, signals and communication.

Which of the following answers refers to a lower-cost alternative to Fibre Channel technology? ATM iSCSI InfiniBand MPLS

iSCSI: Internet Small Computer System Interface, a storage area networking (SAN) protocol used to send block storage from storage arrays or devices to client computers that aren't directly connected to those devices.


Ensembles d'études connexes

What is the Age of Responsibility?

View Set

econ midterm 1 textbook problems

View Set

NAVLE OTHER FOOD ANIMALS and NON-SPECIFIC QUESTIONS

View Set

Chapter 7: The Blueprint of Life, from DNA to Protein

View Set

Chapter 19- Gastrointestinal and Urologic Emergencies

View Set