Quiz-summary
0 of 250 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
Information
Free CompTIA A+ 220-1101 Exam Acronyms Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 250 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- Answered
- Review
-
Question 1 of 250
1. Question
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as:
-
Question 2 of 250
2. Question
IPS, TN, VA, and OLED are all implementations of the LCD display technology.
-
Question 3 of 250
3. Question
A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:
-
Question 4 of 250
4. Question
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?
-
Question 5 of 250
5. Question
Which type of RAM features redundant electrical contacts on both sides of the module?
-
Question 6 of 250
6. Question
S.M.A.R.T. allows for monitoring a system for anticipated:
-
Question 7 of 250
7. Question
LDAP is an example of:
-
Question 8 of 250
8. Question
In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is known as:
-
Question 9 of 250
9. Question
A list of computer hardware proven to be compatible with a particular OS is referred to as:
-
Question 10 of 250
10. Question
Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?
-
Question 11 of 250
11. Question
Which of the following are methods of storing and accessing data over a computer network? (Select 2 answers)
-
Question 12 of 250
12. Question
A dedicated local network consisting of devices providing data access is called:
-
Question 13 of 250
13. Question
What type of programming code enables communication between software and hardware devices?
-
Question 14 of 250
14. Question
A type of visual interface consisting of buttons, icons, or menus that can be interacted with without typing in text commands is known as:
-
Question 15 of 250
15. Question
Which of the answers listed below refers to a unique string of characters used to identify hardware, software, and data?
-
Question 16 of 250
16. Question
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
-
Question 17 of 250
17. Question
Which of the following answers refers to a group of technologies enabling telephone calls over the Internet?
-
Question 18 of 250
18. Question
A database on a mobile device containing bands, sub-bands, and service provider IDs allowing the device to establish connection with the right cell phone tower is referred to as:
-
Question 19 of 250
19. Question
POP3 protocol is used for:
-
Question 20 of 250
20. Question
An ISP offering Internet access to subscribers at a designated wireless hotspot is called:
-
Question 21 of 250
21. Question
A type of backlight technology most commonly used in modern laptop devices is known as:
-
Question 22 of 250
22. Question
Which of the answers listed below refers to zero-configuration networking?
-
Question 23 of 250
23. Question
Which of the following answers refers to a dedicated programming language used in database management?
-
Question 24 of 250
24. Question
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
-
Question 25 of 250
25. Question
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called:
-
Question 26 of 250
26. Question
What are the characteristic features of IPS? (Select 3 answers)
-
Question 27 of 250
27. Question
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
-
Question 28 of 250
28. Question
As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.
-
Question 29 of 250
29. Question
Which of the answers listed below refers to a file system developed by Apple for its operating systems?
-
Question 30 of 250
30. Question
A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in MS Windows is known as:
-
Question 31 of 250
31. Question
PCIe is a high-speed, serial expansion bus designed as a replacement for PCI, PCI-X, and AGP standards.
-
Question 32 of 250
32. Question
Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?
-
Question 33 of 250
33. Question
A special-purpose memory used by graphics controllers is referred to as:
-
Question 34 of 250
34. Question
Which of the answers listed below refers to a network protocol used for connecting devices on a WAN?
-
Question 35 of 250
35. Question
Which of the following answers refers to the most common programming language designed for website development?
-
Question 36 of 250
36. Question
A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?
-
Question 37 of 250
37. Question
Which of the answers listed below refer(s) to HSM? (Select all that apply)
-
Question 38 of 250
38. Question
A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is called:
-
Question 39 of 250
39. Question
Which of the following answers refer(s) to the characteristic feature(s) of SRAM? (Select all that apply)
-
Question 40 of 250
40. Question
Which part of the AAA framework deals with granting or denying access to resources?
-
Question 41 of 250
41. Question
What type of action allows an attacker to exploit the XSS vulnerability?
-
Question 42 of 250
42. Question
The term “IDS” refers to a device or application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as NIDS, an IDS installed on a host monitoring only that host is called HIDS. IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.
-
Question 43 of 250
43. Question
Which type of RAM features separate electrical contacts on each side of the module?
-
Question 44 of 250
44. Question
Which of the solutions listed below allows to check whether a digital certificate has been revoked?
-
Question 45 of 250
45. Question
Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.
-
Question 46 of 250
46. Question
An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with:
-
Question 47 of 250
47. Question
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?
-
Question 48 of 250
48. Question
For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.
-
Question 49 of 250
49. Question
What is the name of a common syntax used to describe the location of a network share?
-
Question 50 of 250
50. Question
A computer network connecting multiple LANs over an area of a city is known as:
-
Question 51 of 250
51. Question
A type of wireless network topology in which each node has a direct connection to every other node is an example of:
-
Question 52 of 250
52. Question
Adding an eSATA device to a PC can be done either by attaching the device cable directly to the motherboard’s integrated I/O panel, connecting it via eSATA port on a modular bracket mounted on the back of the PC case, or attaching it directly to a dedicated slot on the motherboard.
-
Question 53 of 250
53. Question
IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable:
-
Question 54 of 250
54. Question
A package file format used by Android OS for distribution and installation of mobile apps is referred to as:
-
Question 55 of 250
55. Question
A technology that enables translation of printed or typed documents into a digital form is called:
-
Question 56 of 250
56. Question
What are the characteristic features of an OLED display? (Select 3 answers)
-
Question 57 of 250
57. Question
Which of the following serves as a unique identifier for a WLAN?
-
Question 58 of 250
58. Question
A type of firmware interface designed as a replacement for BIOS is referred to as:
-
Question 59 of 250
59. Question
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is called:
-
Question 60 of 250
60. Question
What is the name of a hardware device that allows for administering multiple hosts with the use of a single mouse, keyboard, and computer screen?
-
Question 61 of 250
61. Question
In the AAA security architecture, the process of granting or denying access to resources is known as:
-
Question 62 of 250
62. Question
Which type of network cabling is most susceptible to EMI and RFI?
-
Question 63 of 250
63. Question
Which of the interfaces listed below provide the capability for transmission of both video and audio data? (Select 2 answers)
-
Question 64 of 250
64. Question
Which wireless technology enables identification and tracking of tags attached to objects?
-
Question 65 of 250
65. Question
Which of the following terms refers to the process of sending and receiving data to and from a computer hardware component?
-
Question 66 of 250
66. Question
The SCP protocol is used for:
-
Question 67 of 250
67. Question
Which of the answers listed below describe the features of RDP? (Select 3 answers)
-
Question 68 of 250
68. Question
Which of the following answers refer(s) to MSRA? (Select all that apply)
-
Question 69 of 250
69. Question
ECC RAM:
-
Question 70 of 250
70. Question
A logical device interface used for accessing non-volatile memory storage devices attached via PCIe is referred to as:
-
Question 71 of 250
71. Question
The term “SMS” is used in reference to:
-
Question 72 of 250
72. Question
Which of the answers listed below refers to an example of optical storage media?
-
Question 73 of 250
73. Question
Which cloud service model would provide the best solution for a web developer intending to create a web app?
-
Question 74 of 250
74. Question
Which of the following answers refers to a serial storage media interface?
-
Question 75 of 250
75. Question
What is the function of FTP?
-
Question 76 of 250
76. Question
Which of the answers listed below refer to RJ11 connector? (Select 3 answers)
-
Question 77 of 250
77. Question
A network protocol for secure file transfer over SSH is called:
-
Question 78 of 250
78. Question
Which MFD/MFP feature optimizes processing of multi-page documents?
-
Question 79 of 250
79. Question
Methods used by Microsoft Windows operating systems for organizing disk partitions include: (Select 2 answers)
-
Question 80 of 250
80. Question
Which of the following are advantages of NTFS over FAT32?
-
Question 81 of 250
81. Question
A type of control access technology providing protection against copyright infringements is known as:
-
Question 82 of 250
82. Question
Which of the answers listed below refer to the characteristic features of SAS? (Select 3 answers)
-
Question 83 of 250
83. Question
Which of the following enables remote control over network devices?
-
Question 84 of 250
84. Question
Which of the answers listed below refers to a dedicated microcontroller designed for conducting cryptographic operations?
-
Question 85 of 250
85. Question
A computer network connecting multiple smaller networks over very large geographical areas is referred to as:
-
Question 86 of 250
86. Question
Which wireless encryption scheme offers the highest level of protection?
-
Question 87 of 250
87. Question
An electrostatic discharge that can damage integrated circuits used in computer and communications equipment is called:
-
Question 88 of 250
88. Question
Which of the acronyms listed below is used to describe a collection of information about a particular subject?
-
Question 89 of 250
89. Question
Which of the following answers refers to a unique 48-bit address assigned to every network adapter?
-
Question 90 of 250
90. Question
UTP is a type of inexpensive and easy to install copper cabling used in Ethernet networks and telephone systems. UTP cabling is not surrounded by any shielding that would provide protection against interference from outside sources. An additional protective cover that reduces signal interference from outside sources is a feature of STP cabling.
-
Question 91 of 250
91. Question
Which type of network cabling provides immunity against EMI and RFI?
-
Question 92 of 250
92. Question
A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as:
-
Question 93 of 250
93. Question
Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?
-
Question 94 of 250
94. Question
A remote server hosting a virtualized user OS is an example of:
-
Question 95 of 250
95. Question
Which of the following answers refers to a software that provides the functionality of a physical computer?
-
Question 96 of 250
96. Question
Which of the answers listed below refers to a common target of XSS?
-
Question 97 of 250
97. Question
A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as:
-
Question 98 of 250
98. Question
A type of networking device that allows other wireless devices to connect to a wired network is called:
-
Question 99 of 250
99. Question
UDP is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.
-
Question 100 of 250
100. Question
Which of the following answers refer(s) to (a) video connection standard(s)? (Select all that apply)
-
Question 101 of 250
101. Question
Which of the answers listed below refer to the RJ11 connector? (Select 2 answers)
-
Question 102 of 250
102. Question
Which of the following characteristics apply to the type of RAM most commonly used as the main system memory in desktop PCs? (Select 2 answers)
-
Question 103 of 250
103. Question
Which of the answers listed below refers to a type of network protocol used for synchronizing clocks over a computer network?
-
Question 104 of 250
104. Question
A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as:
-
Question 105 of 250
105. Question
Which of the following answers refers to a specialized character recognition technology that enables translation of handwriting into a digital form?
-
Question 106 of 250
106. Question
Examples of cabling types used for mass storage devices include: (Select all that apply)
-
Question 107 of 250
107. Question
The term “UTM” refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
-
Question 108 of 250
108. Question
What is the purpose of a DoS attack?
-
Question 109 of 250
109. Question
Which of the answers listed below refers to a resolution type provided by ARP?
-
Question 110 of 250
110. Question
Which of the following answers refers to a global standard development organization composed of different national standards bodies?
-
Question 111 of 250
111. Question
Which of the answers listed below refers to a command interpreter utility in Windows?
-
Question 112 of 250
112. Question
The CMOS battery located on a computer’s motherboard allows for maintaining the correct time and date information stored in CMOS RAM. In older computer systems, the CMOS battery also allowed for maintaining the BIOS configuration settings stored in CMOS RAM.
-
Question 113 of 250
113. Question
What is the most common motherboard type used in desktop PCs?
-
Question 114 of 250
114. Question
Which type of software enables a centralized administration of mobile devices?
-
Question 115 of 250
115. Question
Which of the following facilitates the enforcement of mobile device policies and procedures?
-
Question 116 of 250
116. Question
A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission is referred to as:
-
Question 117 of 250
117. Question
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?
-
Question 118 of 250
118. Question
Which of the following wireless security protocols has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
-
Question 119 of 250
119. Question
Which of the answers listed below refers to an example of a security code that is used to authenticate a person to a system?
-
Question 120 of 250
120. Question
What is the name of a computer’s hardware component designed for enabling network access?
-
Question 121 of 250
121. Question
Which of the following answers refer(s) to (a) parallel storage media interface(s)? (Select all that apply)
-
Question 122 of 250
122. Question
A type of network connecting computers within a small geographical area such as a building or group of buildings is called:
-
Question 123 of 250
123. Question
Which of the acronyms listed below refers to a backup rotation scheme?
-
Question 124 of 250
124. Question
Which of the following is a file system designed for optical media?
-
Question 125 of 250
125. Question
Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?
-
Question 126 of 250
126. Question
Which of the following terms refers to a global community focused around the development of engineering standards?
-
Question 127 of 250
127. Question
A local server hosting virtualized OS is an example of an on-premises VDI solution.
-
Question 128 of 250
128. Question
A type of limited-range computer network used for data transmission among various types of personal devices is referred to as:
-
Question 129 of 250
129. Question
MFA systems require implementation of authentication factors from two or more distinct categories.
-
Question 130 of 250
130. Question
A mobile device’s built-in functionality enabling the usage of locator applications is called:
-
Question 131 of 250
131. Question
Which of the terms listed below refers to a lightweight version of MS Windows used for system deployment and recovery?
-
Question 132 of 250
132. Question
An agreement granting the right to use software application in a manner determined by the software vendor is known as:
-
Question 133 of 250
133. Question
Which of the following acronyms refers to a group of experts who respond to computer security incidents?
-
Question 134 of 250
134. Question
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
-
Question 135 of 250
135. Question
A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions is referred to as: (Select 2 answers)
-
Question 136 of 250
136. Question
Which of the following answers refers to industrial and manufacturing control system?
-
Question 137 of 250
137. Question
Which network protocol enables retrieving contents of an Internet page from a web server?
-
Question 138 of 250
138. Question
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
-
Question 139 of 250
139. Question
What are the characteristic features of SMB/CIFS? (Select all that apply)
-
Question 140 of 250
140. Question
Which of the following answers refers to a display technology most commonly used in modern laptops?
-
Question 141 of 250
141. Question
A set of Intel CPU HAV enhancements is called:
-
Question 142 of 250
142. Question
What are the characteristic features of RJ45 connector? (Select 2 answers)
-
Question 143 of 250
143. Question
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:
-
Question 144 of 250
144. Question
What is the name of a device that can provide short-term emergency power during an unexpected main power source outage?
-
Question 145 of 250
145. Question
Which of the answers listed below refers to a group of hardware manufacturers focused around developing standards related to short range, line-of-sight, wireless technology?
-
Question 146 of 250
146. Question
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
-
Question 147 of 250
147. Question
A type of LAN used in small business environments is referred to as:
-
Question 148 of 250
148. Question
TCP is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. TCP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
-
Question 149 of 250
149. Question
A document describing procedures for safe handling, use, storage, and disposal of potentially hazardous materials is called:
-
Question 150 of 250
150. Question
IMAP is used for:
-
Question 151 of 250
151. Question
Which of the following are examples of partition styles? (Select 2 answers)
-
Question 152 of 250
152. Question
Which of the answers listed below describes the result of a successful DDoS attack?
-
Question 153 of 250
153. Question
A type of smart card used in mobile phones to identify the client is known as:
-
Question 154 of 250
154. Question
Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against:
-
Question 155 of 250
155. Question
Which of the MS Windows features allows users to run programs with the security privileges of another user?
-
Question 156 of 250
156. Question
Examples of computer languages that describe the appearance of a printed page include: (Select 2 answers)
-
Question 157 of 250
157. Question
Which of the answers listed below refers to an authentication method that enables signing an outbound email message with digital signature?
-
Question 158 of 250
158. Question
Which type of RAM transfers data on both the rising and falling edges of the clock signal?
-
Question 159 of 250
159. Question
Which of the following answers refers to an internal network server used for delivering software upgrades to network devices?
-
Question 160 of 250
160. Question
Which type of fiber-optic equipment can be found at a demarc?
-
Question 161 of 250
161. Question
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
-
Question 162 of 250
162. Question
A solution that allows to supply electricity over standard Ethernet cables is referred to as
-
Question 163 of 250
163. Question
Which of the following answers refers to a deprecated encryption protocol?
-
Question 164 of 250
164. Question
The VA display technology can be characterized by: (Select 3 answers)
-
Question 165 of 250
165. Question
Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location?
-
Question 166 of 250
166. Question
Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
-
Question 167 of 250
167. Question
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
-
Question 168 of 250
168. Question
Which of the answers listed below refer to SSD form factors? (Select 2 answers)
-
Question 169 of 250
169. Question
Which of the following solutions provide the AAA functionality? (Select 2 answers)
-
Question 170 of 250
170. Question
Examples of secure network protocols used for establishing VPN connections include: (Select 2 answers)
-
Question 171 of 250
171. Question
Which DVI connector type does not provide support for analog signal transmission?
-
Question 172 of 250
172. Question
Which of the acronyms listed below refers to the type of electric current supplied to most of the internal PC components?
-
Question 173 of 250
173. Question
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
-
Question 174 of 250
174. Question
Which of the following is an MS Windows component that enables encryption of individual files?
-
Question 175 of 250
175. Question
A network protocol providing an alternative solution to the manual allocation of IP addresses is called:
-
Question 176 of 250
176. Question
Which of the answers listed below refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?
-
Question 177 of 250
177. Question
A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of:
-
Question 178 of 250
178. Question
A technology implemented in modern laptops that enables data transfer and authentication features between the laptop and another portable device at a very close range is known as:
-
Question 179 of 250
179. Question
Which technology enables contactless payment transactions?
-
Question 180 of 250
180. Question
STP cabling reduces what kind of interference? (Select 2 answers)
-
Question 181 of 250
181. Question
A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure, and learn about the presence and capabilities of other devices is referred to as:
-
Question 182 of 250
182. Question
Which of the following answers can be used to describe the characteristics of an XSS attack? (Select 3 answers)
-
Question 183 of 250
183. Question
Which of the actions listed below can be taken by an IDS? (Select 2 answers)
-
Question 184 of 250
184. Question
Which of the following answers illustrates the difference between passive and active network security breach response?
-
Question 185 of 250
185. Question
Examples of connectionless protocols include: (Select 2 answers)
-
Question 186 of 250
186. Question
Which type of firmware performs initial hardware checks after the computer is powered on?
-
Question 187 of 250
187. Question
Which of the answers listed below refers to a DRM solution that prevents capturing and replaying multimedia content transmitted via DP, DVI, and HDMI links?
-
Question 188 of 250
188. Question
Which DVI connector type does not provide support for digital signal transmission?
-
Question 189 of 250
189. Question
A memory access method that bypasses the CPU to speed up memory operations is called:
-
Question 190 of 250
190. Question
Which of the following requires termination?
-
Question 191 of 250
191. Question
A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:
-
Question 192 of 250
192. Question
Which of the answers listed below describe the features of SSDs? (Select 3 answers)
-
Question 193 of 250
193. Question
Which of the following answers refers to a dedicated mobile app management software?
-
Question 194 of 250
194. Question
Which of the answers listed below refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
-
Question 195 of 250
195. Question
The SMTP protocol is used for: (Select 2 answers)
-
Question 196 of 250
196. Question
Which of the following solutions can be used to provide device authentication before decrypting an HDD?
-
Question 197 of 250
197. Question
APIPA allows a Windows host to self-configure an IPv4 address and subnet mask when DHCP is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet).
-
Question 198 of 250
198. Question
An emerging field of new technologies, such as wearable tech or home automation is referred to as:
-
Question 199 of 250
199. Question
A type of identification badge that can be held within a certain distance of a reader to authenticate the badge holder is called:
-
Question 200 of 250
200. Question
SCSI ID:
-
Question 201 of 250
201. Question
Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
-
Question 202 of 250
202. Question
Which of the following answers refer to the 2G/3G mobile telecommunications standards? (Select 2 answers)
-
Question 203 of 250
203. Question
A POST card is used for: