CompTIA A+ 220-1101 Exam Acronyms Quiz
Which of the following can be the source of RFI and cause disruptions in wireless network connectivity?
All of the above
Which of the following are advantages of NTFS over FAT32?
All of the above are improvements implemented in NTFS not available in FAT32
Which of the following terms refers to the process of sending and receiving data to and from a computer hardware component?
I/O
Examples of secure network protocols used for establishing VPN connections include
IPsec, TLS
Which of the following answers refers to a short distance, line-of-sight technology used for example in home remote controls?
IR
LDAP is an example of
Directory access protocol
SFTP is an extension to the FTP protocol that adds support for TLS and SSL cryptographic protocols.
False
A computer's primary storage media used for quick access to working data and code is known as
RAM
Which of the answers listed below refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network?
RDP
Which wireless technology enables identification and tracking of tags attached to objects?
RFID
A type of identification badge that can be held within a certain distance of a reader to authenticate the badge holder is called
RFID badge
A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions is referred to as
RISC, ARM
Which of the following solutions can be used to provide device authentication before decrypting an HDD?
TPM
Which of the answers listed below refer to RJ11 connector?
Telephone equipment, Dial-up networking, Twisted-pair copper cabling
The term "SMS" is used in reference to
Text messaging services
Which passive adapter types enable DVI-to-HDMI connectivity?
DVI-D to HDMI, DVI-I to HDMI
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication
In the AAA security architecture, the process of granting or denying access to resources is known as
Authorization
Which part of the AAA framework deals with granting or denying access to resources?
Authorization
Which type of firmware performs initial hardware checks after the computer is powered on?
BIOS
Which of the terms listed below refers to a specialized computer software designed for multi-dimensional modeling?
CAD
ECC RAM
Can detect and correct errors
What type of action allows an attacker to exploit the XSS vulnerability?
Code injection
Which DVI connector type does not provide support for analog signal transmission?
DVI-D
Which of the answers listed below refers to a common target of XSS?
Dynamic web pages
Which of the following is an MS Windows component that enables encryption of individual files?
EFS
The bus between the CPU and northbridge is called
FSB
Which of the acronyms listed below refers to a backup rotation scheme?
GFS
What type of programming code enables communication between software and hardware devices?
HAL
A list of computer hardware proven to be compatible with a particular OS is referred to as
HCL
An emerging field of new technologies, such as wearable tech or home automation is referred to as
IoT
Which of the answers listed below refers to a group of hardware manufacturers focused around developing standards related to short range, line-of-sight, wireless technology?
IrDA
Which of the actions listed below can be taken by an IDS?
Logging, Sending an alert
Which of the answers listed below can be used to describe the TN display technology?
Low viewing angles, Fast response times, Low color quality
A type of computer security solution that allows to define and enforce network access policies is referred to as
NAC
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?
NAT
What is the most common memory module form factor type used in laptops?
SODIMM
A technology that enables translation of printed or typed documents into a digital form is called
OCR
A type of limited-range computer network used for data transmission among various types of personal devices is referred to as
PAN
Which of the terms listed below refers to a lightweight version of MS Windows used for system deployment and recovery?
PE
Which of the answers listed below refers to an example of a security code that is used to authenticate a person to a system?
PIN
Which of the answers listed below describe the features of RDP?
Permanent remote access, Access based on local password (local user account password), Windows tool used for connecting remotely to the user's own computer
A solution that allows to supply electricity over standard Ethernet cables is referred to as
PoE
IMAP is used for
Retrieving email messages from a mail server
A dedicated local network consisting of devices providing data access is called
SAN
Which of the following solutions provide the AAA functionality?
TACACS+, RADIUS
A security protocol designed to strengthen WEP implementations is known as
TKIP
A POST card is used for
Troubleshooting computer startup problems
A local server hosting virtualized OS is an example of an on-premises VDI solution.
True
What are the characteristic features of RJ45 connector?
Used with Ethernet network cabling, Twisted-pair copper cabling connector
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called
Accounting
An MS Windows stop error is informally referred to as
BSoD
A mobile device deployment model that allows employees to use private mobile devices for accessing company's restricted data and applications is known as
BYOD
A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as
CAPTCHA
Which of the answers listed below refers to an example of optical storage media?
CD
Which of the following is a file system designed for optical media?
CDFS
STP cabling reduces what kind of interference?
Crosstalk, EMI
Which of the acronyms listed below refers to the type of electric current supplied to most of the internal PC components?
DC
Examples of connectionless protocols include
DHCP, TFTP
Which type of RAM features separate electrical contacts on each side of the module?
DIMM
Which of the answers listed below refers to an authentication method that enables signing an outbound email message with digital signature?
DKIM
What is the function of FTP?
File exchange
Which technology enables contactless payment transactions?
NFC
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PII
Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?
RTO
Which type of RAM features redundant electrical contacts on both sides of the module?
SIMM
A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called
SaaS
The SCP protocol is used for
Secure file transfer
The SMTP protocol is used for
Sending email messages between mail servers, Sending email messages from a client device
UDP is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.
True
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
What is the most common type of DSL Internet access?
ADSL
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES
A type of networking device that allows other wireless devices to connect to a wired network is called
AP
Which of the answers listed below refers to a file system developed by Apple for its operating systems?
APFS
A package file format used by Android OS for distribution and installation of mobile apps is referred to as
APK
Which of the following answers refer(s) to (a) parallel storage media interface(s)? (Select all that apply)
ATA, IDE, PATA
Which of the answers listed below refers to a network protocol used for connecting devices on a WAN?
ATM
What is the most common motherboard type used in desktop PCs?
ATX
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as
AUP
Which of the following answers refer(s) to MSRA? (Select all that apply)
Access based on one-time password, Temporal remote access, The host and invited user can both see the host's screen, The host and invited user share control over host's mouse and keyboard, Windows tool used for assisted remote troubleshooting
Which of the following answers refer to the 2G/3G mobile telecommunications standards?
CDMA, GSM
Which of the following acronyms refers to a group of experts who respond to computer security incidents?
CERT
Which of the answers listed below refers to a command interpreter utility in Windows?
CMD
Which of the solutions listed below allows to check whether a digital certificate has been revoked?
CRL
APIPA allows a Windows host to self-configure an IPv4 address and subnet mask when DHCP is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet).
True
For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.
True
MFA systems require implementation of authentication factors from two or more distinct categories.
True
PCIe is a high-speed, serial expansion bus designed as a replacement for PCI, PCI-X, and AGP standards.
True
TCP is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. TCP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
True
The CMOS battery located on a computer's motherboard allows for maintaining the correct time and date information stored in CMOS RAM. In older computer systems, the CMOS battery also allowed for maintaining the BIOS configuration settings stored in CMOS RAM.
True
The DVI-I connector type provides support for both digital and analog video signal transmission.
True
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True
The term "UTM" refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True
Which of the MS Windows features allows users to run programs with the security privileges of another user?
UAC
A type of firmware interface designed as a replacement for BIOS is referred to as
UEFI
What is the name of a device that can provide short-term emergency power during an unexpected main power source outage?
UPS
A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure, and learn about the presence and capabilities of other devices is referred to as
UPnP
Which type of network cabling is most susceptible to EMI and RFI?
UTP
Which of the answers listed below refer to the RJ11 connector?
Used with telephone cabling, Twisted-pair copper cabling connector
Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location?
VLAN
Which of the answers listed below refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of GUI?
VNC
A set of Intel CPU HAV enhancements is called
VT-x
Which of the following answers refers to a group of technologies enabling telephone calls over the Internet?
VoIP
Which of the following wireless security protocols has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
WEP
What are the characteristic features of an OLED display?
Works without backlight, Lower light output (brightness) in comparison to LCDs, Better contrast ratio and color representation in comparison to LCDs
A Microsoft-proprietary file system optimized for flash drives is known as
exFAT
Which of the following file systems was created specifically for Linux?
ext
Which type of RAM transfers data on both the rising and falling edges of the clock signal?
DDR
Which of the following are methods of storing and accessing data over a computer network?
DFS, NFS
A network protocol providing an alternative solution to the manual allocation of IP addresses is called
DHCP
An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with
DHCP
Which of the following allows the receiver of an email message to verify that the message claimed to have come from a specific domain was indeed authorized by the owner of that domain?
DKIM
A memory access method that bypasses the CPU to speed up memory operations is called
DMA
Which of the following answers refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender's mail policies?
DMARC
A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?
DNS
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
DNS
A type of control access technology providing protection against copyright infringements is known as
DRM
Which of the following answers refer(s) to (a) video connection standard(s)? (Select all that apply)
DVI, DP, HDMI, VGA
Which DVI connector type does not provide support for digital signal transmission?
DVI-A
Which of the terms listed below refer to a product/service that no longer receives continuing support?
EOL
An electrostatic discharge that can damage integrated circuits used in computer and communications equipment is called
ESD
Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against
ESD
An agreement granting the right to use software application in a manner determined by the software vendor is known as
EULA
In a persistent VDI
Each user runs their own copy of virtual desktop, At the end of a session, user data and personal settings are saved
Which of the following answers can be used to describe the characteristics of an XSS attack?
Exploits the trust a user's web browser has in a website, A malicious script is injected into a trusted website, User's browser executes attacker's script
Adding an eSATA device to a PC can be done either by attaching the device cable directly to the motherboard's integrated I/O panel, connecting it via eSATA port on a modular bracket mounted on the back of the PC case, or attaching it directly to a dedicated slot on the motherboard.
False
SODIMM is a more compact type of computer memory designed for desktop PCs.
False
The main difference between the UTP and STP cabling is that the UTP cable takes advantage of additional protective cover reducing signal interference from outside sources.
False
Which of the following answers refer(s) to the characteristic feature(s) of SRAM? (Select all that apply)
Faster than DRAM, More expensive in comparison to DRAM, Volatile storage media type, Utilized for CPU cache memory chips
Which type of network cabling provides immunity against EMI and RFI?
Fiber optic
A mobile device's built-in functionality enabling the usage of locator applications is called
GPS
A type of visual interface consisting of buttons, icons, or menus that can be interacted with without typing in text commands is known as
GUI
Which of the answers listed below refers to a unique string of characters used to identify hardware, software, and data?
GUID
Which of the answers listed below refers to a DRM solution that prevents capturing and replaying multimedia content transmitted via DP, DVI, and HDMI links?
HDCP
S.M.A.R.T. allows for monitoring a system for anticipated
HDD/SSD failures
Which of the interfaces listed below provide the capability for transmission of both video and audio data?
HDMI, DP
Which network protocol enables retrieving contents of an Internet page from a web server?
HTTP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
HTTPS
The VA display technology can be characterized by
High contrast ratios, Good viewing angles, Good color quality
Which of the following answers refers to a specialized character recognition technology that enables translation of handwriting into a digital form?
ICR
Which of the following answers illustrates the difference between passive and active network security breach response?
IDS vs. IPS
Which of the following terms refers to a global community focused around the development of engineering standards?
IEEE
Which of the following metrics might be of help in diagnosing the declining performance of a storage drive?
IOPS
Which of the answers listed below refers to a resolution type provided by ARP?
IP to MAC
A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as
IRP
Which of the following answers refers to a global standard development organization composed of different national standards bodies?
ISO
Which of the answers listed below refers to a proprietary line of low-power consumption small form factor motherboard types for industrial and embedded PC applications?
ITX
Which of the answers listed below refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
IaaS
SCSI ID
Identifies physical device on a SCSI chain
A type of network connecting computers within a small geographical area such as a building or group of buildings is called
LAN
Which of the following answers refer(s) to (an) example(s) of (a) fiber-optic connector(s)? (Select all that apply)
LC, ST, SC
Which of the following answers refers to a display technology most commonly used in modern laptops?
LCD
A type of backlight technology most commonly used in modern laptop devices is known as
LED
Which of the answers listed below refers to a method for identifying logical partitions on a SCSI hard drive?
LUN
Which of the statements listed below refer(s) to the characteristic feature(s) of HDDs in comparison to SSDs? (Select all that apply)
Lower device cost, Magnetic storage media, Higher power consumption, Lower read/write speeds
Which of the answers listed below refer to SSD form factors?
M.2, mSATA
An access control model that enforces the strictest set of access rules is known as
MAC
Which of the following answers refers to a unique 48-bit address assigned to every network adapter?
MAC
Which of the following answers refers to a dedicated mobile app management software?
MAM
A computer network connecting multiple LANs over an area of a city is known as
MAN
Which of the following are examples of partition styles?
MBR, GPT
Which of the following facilitates the enforcement of mobile device policies and procedures?
MDM
Which type of software enables a centralized administration of mobile devices?
MDM
Which of the terms listed below applies to the authentication process?
MFA
An office equipment that combines the functionality of multiple devices is called
MFD, MFP
A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission is referred to as
MOU
A document describing procedures for safe handling, use, storage, and disposal of potentially hazardous materials is called
MSDS
Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
MX
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
NAT
A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as
NDA
A technology implemented in modern laptops that enables data transfer and authentication features between the laptop and another portable device at a very close range is known as
NFC
A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of
NFC
What is the name of a computer's hardware component designed for enabling network access?
NIC
A logical device interface used for accessing non-volatile memory storage devices attached via PCIe is referred to as
NVMe
Examples of storage media device interfaces for SSDs include
NVMe, SATA, PCIe
Which of the answers listed below refers to an API that enables communication between hosts on a LAN?
NetBIOS
Which of the following characteristics apply to the type of RAM most commonly used as the main system memory in desktop PCs?
Non-ECC memory, Dynamic RAM
Which of the following answers refers to the most common programming language designed for website development?
None of the above
Which type of fiber-optic equipment can be found at a demarc?
ONT
A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is referred to as
PKI
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?
POST
Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices?
PPP
A database on a mobile device containing bands, sub-bands, and service provider IDs allowing the device to establish connection with the right cell phone tower is referred to as
PRL
Examples of computer languages that describe the appearance of a printed page include
PS, PCL
An internal hardware component of a PC case used for converting AC power to DC power is referred to as
PSU
Which OS boot method takes advantage of a network interface?
PXE
Which of the following enables installation of an OS via network interface?
PXE
IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable
Printing
What are the characteristic features of SMB/CIFS? (Select all that apply)
Provides shared access to files, directories, and devices, Used mainly by computers running Microsoft Windows operating systems
Which of the answers listed below describe the features of SSDs?
Relatively high device cost, Lower capacity in comparison to magnetic drives, High performance
What is the purpose of a DoS attack?
Resource exhaustion
Which of the answers listed below describes the result of a successful DoS attack?
Resource exhaustion
Examples of cabling types used for mass storage devices include: (Select all that apply)
SATA, IDE/PATA, USB, SCSI, eSATA
Which of the following answers refers to industrial and manufacturing control system?
SCADA
Which of the following requires termination?
SCSI chain
Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
SDN
A type of smart card used in mobile phones to identify the client is known as
SIM
A type of protocol used in network management systems for monitoring network-attached devices is called
SNMP
Which of the answers listed below refers to a type of network protocol used for synchronizing clocks over a computer network?
SNTP
A type of LAN used in small business environments is referred to as
SOHO
Which of the answers listed below refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?
SPF
Which of the following answers refers to an open standard defining a technical method to prevent electronic mail sender address forgery?
SPF
Which DNS TXT records are used for spam management?
SPF, DKIM, DMARC
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as
SSH
Which of the answers listed below refers to a secure replacement for Telnet?
SSH
Which of the following serves as a unique identifier for a WLAN?
SSID
Which of the following answers refers to a deprecated encryption protocol?
SSL
Which of the following protocols are used for securing HTTP connections?
SSL, TLS
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as
SSO
Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?
TCP/IP
Which of the following answers refers to an internal network server used for delivering software upgrades to network devices?
TFTP server
What is the name of a hardware device that allows for administering multiple hosts with the use of a single mouse, keyboard, and computer screen?
KVM
In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is known as
MBR
Which of the following answers refers to a software that provides the functionality of a physical computer?
VM
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is called
VPN
A special-purpose memory used by graphics controllers is referred to as
VRAM
A computer network connecting multiple smaller networks over very large geographical areas is referred to as
WAN
An ISP offering Internet access to subscribers at a designated wireless hotspot is called
WISP
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called
WLAN
A type of wireless network topology in which each node has a direct connection to every other node is an example of
WMN
Which wireless encryption scheme offers the highest level of protection?
WPA3
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?
WWAN
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as
ACL
Which MFD/MFP feature optimizes processing of multi-page documents?
ADF
Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?
AMD-V
POP3 protocol is used for
Email retrieval
Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.
False
IPS, TN, VA, and OLED are all implementations of the LCD display technology.
False
Which of the acronyms listed below is used to describe a collection of information about a particular subject?
KB
What are the characteristic features of IPS?
High color quality, Wide viewing angles, Slow response times
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
IP
Methods used by Microsoft Windows operating systems for organizing disk partitions include
MBR, GPT
A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in MS Windows is known as
MMC
Which cloud service model would provide the best solution for a web developer intending to create a web app?
PaaS
A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is called
RAID
Which of the following enables remote control over network devices?
RMM
Which of the following answers refers to a serial storage media interface?
SATA
A network protocol for secure file transfer over SSH is called
SFTP
Which of the following answers refers to a dedicated programming language used in database management?
SQL
Which of the answers listed below refer to the characteristic features of SAS?
Serial interface, Point-to-point connection, Does not require bus termination
Which of the answers listed below refers to a dedicated microcontroller designed for conducting cryptographic operations?
TPM
As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.
True
The term "IDS" refers to a device or application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as NIDS, an IDS installed on a host monitoring only that host is called HIDS. IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.
True
UTP is a type of inexpensive and easy to install copper cabling used in Ethernet networks and telephone systems. UTP cabling is not surrounded by any shielding that would provide protection against interference from outside sources. An additional protective cover that reduces signal interference from outside sources is a feature of STP cabling.
True
Which of the answers listed below refer(s) to HSM? (Select all that apply)
Typically, in the form of an expansion card or an external device, Designed to secure hardware through cryptographic functions
What is the name of a common syntax used to describe the location of a network share?
UNC
Which of the answers listed below refers to zero-configuration networking?
UPnP
Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?
USB
A remote server hosting a virtualized user OS is an example of
VDI