CompTIA A+ 220-1101 Exam Acronyms Quiz

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/249

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

250 Terms

1
New cards

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as

AUP

2
New cards

IPS, TN, VA, and OLED are all implementations of the LCD display technology.

False

3
New cards

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called

SaaS

4
New cards

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WWAN

5
New cards

Which type of RAM features redundant electrical contacts on both sides of the module?

SIMM

6
New cards

S.M.A.R.T. allows for monitoring a system for anticipated

HDD/SSD failures

7
New cards

LDAP is an example of

Directory access protocol

8
New cards

In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is known as

MBR

9
New cards

A list of computer hardware proven to be compatible with a particular OS is referred to as

HCL

10
New cards

Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?

AMD-V

11
New cards

Which of the following are methods of storing and accessing data over a computer network?

DFS, NFS

12
New cards

A dedicated local network consisting of devices providing data access is called

SAN

13
New cards

What type of programming code enables communication between software and hardware devices?

HAL

14
New cards

A type of visual interface consisting of buttons, icons, or menus that can be interacted with without typing in text commands is known as

GUI

15
New cards

Which of the answers listed below refers to a unique string of characters used to identify hardware, software, and data?

GUID

16
New cards

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

Authentication

17
New cards

Which of the following answers refers to a group of technologies enabling telephone calls over the Internet?

VoIP

18
New cards

A database on a mobile device containing bands, sub-bands, and service provider IDs allowing the device to establish connection with the right cell phone tower is referred to as

PRL

19
New cards

POP3 protocol is used for

Email retrieval

20
New cards

An ISP offering Internet access to subscribers at a designated wireless hotspot is called

WISP

21
New cards

A type of backlight technology most commonly used in modern laptop devices is known as

LED

22
New cards

Which of the answers listed below refers to zero-configuration networking?

UPnP

23
New cards

Which of the following answers refers to a dedicated programming language used in database management?

SQL

24
New cards

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as

ACL

25
New cards

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called

WLAN

26
New cards

What are the characteristic features of IPS?

High color quality, Wide viewing angles, Slow response times

27
New cards

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

28
New cards

As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.

True

29
New cards

Which of the answers listed below refers to a file system developed by Apple for its operating systems?

APFS

30
New cards

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in MS Windows is known as

MMC

31
New cards

PCIe is a high-speed, serial expansion bus designed as a replacement for PCI, PCI-X, and AGP standards.

True

32
New cards

Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?

USB

33
New cards

A special-purpose memory used by graphics controllers is referred to as

VRAM

34
New cards

Which of the answers listed below refers to a network protocol used for connecting devices on a WAN?

ATM

35
New cards

Which of the following answers refers to the most common programming language designed for website development?

None of the above

36
New cards

A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?

DNS

37
New cards

Which of the answers listed below refer(s) to HSM? (Select all that apply)

Typically, in the form of an expansion card or an external device, Designed to secure hardware through cryptographic functions

38
New cards

A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is called

RAID

39
New cards

Which of the following answers refer(s) to the characteristic feature(s) of SRAM? (Select all that apply)

Faster than DRAM, More expensive in comparison to DRAM, Volatile storage media type, Utilized for CPU cache memory chips

40
New cards

Which part of the AAA framework deals with granting or denying access to resources?

Authorization

41
New cards

What type of action allows an attacker to exploit the XSS vulnerability?

Code injection

42
New cards

The term "IDS" refers to a device or application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as NIDS, an IDS installed on a host monitoring only that host is called HIDS. IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.

True

43
New cards

Which type of RAM features separate electrical contacts on each side of the module?

DIMM

44
New cards

Which of the solutions listed below allows to check whether a digital certificate has been revoked?

CRL

45
New cards

Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.

False

46
New cards

An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with

DHCP

47
New cards

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?

NAT

48
New cards

For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.

True

49
New cards

What is the name of a common syntax used to describe the location of a network share?

UNC

50
New cards

A computer network connecting multiple LANs over an area of a city is known as

MAN

51
New cards

A type of wireless network topology in which each node has a direct connection to every other node is an example of

WMN

52
New cards

Adding an eSATA device to a PC can be done either by attaching the device cable directly to the motherboard's integrated I/O panel, connecting it via eSATA port on a modular bracket mounted on the back of the PC case, or attaching it directly to a dedicated slot on the motherboard.

False

53
New cards

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable

Printing

54
New cards

A package file format used by Android OS for distribution and installation of mobile apps is referred to as

APK

55
New cards

A technology that enables translation of printed or typed documents into a digital form is called

OCR

56
New cards

What are the characteristic features of an OLED display?

Works without backlight, Lower light output (brightness) in comparison to LCDs, Better contrast ratio and color representation in comparison to LCDs

57
New cards

Which of the following serves as a unique identifier for a WLAN?

SSID

58
New cards

A type of firmware interface designed as a replacement for BIOS is referred to as

UEFI

59
New cards

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is called

VPN

60
New cards

What is the name of a hardware device that allows for administering multiple hosts with the use of a single mouse, keyboard, and computer screen?

KVM

61
New cards

In the AAA security architecture, the process of granting or denying access to resources is known as

Authorization

62
New cards

Which type of network cabling is most susceptible to EMI and RFI?

UTP

63
New cards

Which of the interfaces listed below provide the capability for transmission of both video and audio data?

HDMI, DP

64
New cards

Which wireless technology enables identification and tracking of tags attached to objects?

RFID

65
New cards

Which of the following terms refers to the process of sending and receiving data to and from a computer hardware component?

I/O

66
New cards

The SCP protocol is used for

Secure file transfer

67
New cards

Which of the answers listed below describe the features of RDP?

Permanent remote access, Access based on local password (local user account password), Windows tool used for connecting remotely to the user's own computer

68
New cards

Which of the following answers refer(s) to MSRA? (Select all that apply)

Access based on one-time password, Temporal remote access, The host and invited user can both see the host's screen, The host and invited user share control over host's mouse and keyboard, Windows tool used for assisted remote troubleshooting

69
New cards

ECC RAM

Can detect and correct errors

70
New cards

A logical device interface used for accessing non-volatile memory storage devices attached via PCIe is referred to as

NVMe

71
New cards

The term "SMS" is used in reference to

Text messaging services

72
New cards

Which of the answers listed below refers to an example of optical storage media?

CD

73
New cards

Which cloud service model would provide the best solution for a web developer intending to create a web app?

PaaS

74
New cards

Which of the following answers refers to a serial storage media interface?

SATA

75
New cards

What is the function of FTP?

File exchange

76
New cards

Which of the answers listed below refer to RJ11 connector?

Telephone equipment, Dial-up networking, Twisted-pair copper cabling

77
New cards

A network protocol for secure file transfer over SSH is called

SFTP

78
New cards

Which MFD/MFP feature optimizes processing of multi-page documents?

ADF

79
New cards

Methods used by Microsoft Windows operating systems for organizing disk partitions include

MBR, GPT

80
New cards

Which of the following are advantages of NTFS over FAT32?

All of the above are improvements implemented in NTFS not available in FAT32

81
New cards

A type of control access technology providing protection against copyright infringements is known as

DRM

82
New cards

Which of the answers listed below refer to the characteristic features of SAS?

Serial interface, Point-to-point connection, Does not require bus termination

83
New cards

Which of the following enables remote control over network devices?

RMM

84
New cards

Which of the answers listed below refers to a dedicated microcontroller designed for conducting cryptographic operations?

TPM

85
New cards

A computer network connecting multiple smaller networks over very large geographical areas is referred to as

WAN

86
New cards

Which wireless encryption scheme offers the highest level of protection?

WPA3

87
New cards

An electrostatic discharge that can damage integrated circuits used in computer and communications equipment is called

ESD

88
New cards

Which of the acronyms listed below is used to describe a collection of information about a particular subject?

KB

89
New cards

Which of the following answers refers to a unique 48-bit address assigned to every network adapter?

MAC

90
New cards

UTP is a type of inexpensive and easy to install copper cabling used in Ethernet networks and telephone systems. UTP cabling is not surrounded by any shielding that would provide protection against interference from outside sources. An additional protective cover that reduces signal interference from outside sources is a feature of STP cabling.

True

91
New cards

Which type of network cabling provides immunity against EMI and RFI?

Fiber optic

92
New cards

A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as

CAPTCHA

93
New cards

Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?

TCP/IP

94
New cards

A remote server hosting a virtualized user OS is an example of

VDI

95
New cards

Which of the following answers refers to a software that provides the functionality of a physical computer?

VM

96
New cards

Which of the answers listed below refers to a common target of XSS?

Dynamic web pages

97
New cards

A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as

IRP

98
New cards

A type of networking device that allows other wireless devices to connect to a wired network is called

AP

99
New cards

UDP is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

True

100
New cards

Which of the following answers refer(s) to (a) video connection standard(s)? (Select all that apply)

DVI, DP, HDMI, VGA