1/249
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as
AUP
IPS, TN, VA, and OLED are all implementations of the LCD display technology.
False
A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called
SaaS
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?
WWAN
Which type of RAM features redundant electrical contacts on both sides of the module?
SIMM
S.M.A.R.T. allows for monitoring a system for anticipated
HDD/SSD failures
LDAP is an example of
Directory access protocol
In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is known as
MBR
A list of computer hardware proven to be compatible with a particular OS is referred to as
HCL
Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?
AMD-V
Which of the following are methods of storing and accessing data over a computer network?
DFS, NFS
A dedicated local network consisting of devices providing data access is called
SAN
What type of programming code enables communication between software and hardware devices?
HAL
A type of visual interface consisting of buttons, icons, or menus that can be interacted with without typing in text commands is known as
GUI
Which of the answers listed below refers to a unique string of characters used to identify hardware, software, and data?
GUID
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication
Which of the following answers refers to a group of technologies enabling telephone calls over the Internet?
VoIP
A database on a mobile device containing bands, sub-bands, and service provider IDs allowing the device to establish connection with the right cell phone tower is referred to as
PRL
POP3 protocol is used for
Email retrieval
An ISP offering Internet access to subscribers at a designated wireless hotspot is called
WISP
A type of backlight technology most commonly used in modern laptop devices is known as
LED
Which of the answers listed below refers to zero-configuration networking?
UPnP
Which of the following answers refers to a dedicated programming language used in database management?
SQL
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as
ACL
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called
WLAN
What are the characteristic features of IPS?
High color quality, Wide viewing angles, Slow response times
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
IP
As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.
True
Which of the answers listed below refers to a file system developed by Apple for its operating systems?
APFS
A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in MS Windows is known as
MMC
PCIe is a high-speed, serial expansion bus designed as a replacement for PCI, PCI-X, and AGP standards.
True
Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?
USB
A special-purpose memory used by graphics controllers is referred to as
VRAM
Which of the answers listed below refers to a network protocol used for connecting devices on a WAN?
ATM
Which of the following answers refers to the most common programming language designed for website development?
None of the above
A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?
DNS
Which of the answers listed below refer(s) to HSM? (Select all that apply)
Typically, in the form of an expansion card or an external device, Designed to secure hardware through cryptographic functions
A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is called
RAID
Which of the following answers refer(s) to the characteristic feature(s) of SRAM? (Select all that apply)
Faster than DRAM, More expensive in comparison to DRAM, Volatile storage media type, Utilized for CPU cache memory chips
Which part of the AAA framework deals with granting or denying access to resources?
Authorization
What type of action allows an attacker to exploit the XSS vulnerability?
Code injection
The term "IDS" refers to a device or application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as NIDS, an IDS installed on a host monitoring only that host is called HIDS. IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.
True
Which type of RAM features separate electrical contacts on each side of the module?
DIMM
Which of the solutions listed below allows to check whether a digital certificate has been revoked?
CRL
Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.
False
An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with
DHCP
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?
NAT
For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.
True
What is the name of a common syntax used to describe the location of a network share?
UNC
A computer network connecting multiple LANs over an area of a city is known as
MAN
A type of wireless network topology in which each node has a direct connection to every other node is an example of
WMN
Adding an eSATA device to a PC can be done either by attaching the device cable directly to the motherboard's integrated I/O panel, connecting it via eSATA port on a modular bracket mounted on the back of the PC case, or attaching it directly to a dedicated slot on the motherboard.
False
IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable
Printing
A package file format used by Android OS for distribution and installation of mobile apps is referred to as
APK
A technology that enables translation of printed or typed documents into a digital form is called
OCR
What are the characteristic features of an OLED display?
Works without backlight, Lower light output (brightness) in comparison to LCDs, Better contrast ratio and color representation in comparison to LCDs
Which of the following serves as a unique identifier for a WLAN?
SSID
A type of firmware interface designed as a replacement for BIOS is referred to as
UEFI
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is called
VPN
What is the name of a hardware device that allows for administering multiple hosts with the use of a single mouse, keyboard, and computer screen?
KVM
In the AAA security architecture, the process of granting or denying access to resources is known as
Authorization
Which type of network cabling is most susceptible to EMI and RFI?
UTP
Which of the interfaces listed below provide the capability for transmission of both video and audio data?
HDMI, DP
Which wireless technology enables identification and tracking of tags attached to objects?
RFID
Which of the following terms refers to the process of sending and receiving data to and from a computer hardware component?
I/O
The SCP protocol is used for
Secure file transfer
Which of the answers listed below describe the features of RDP?
Permanent remote access, Access based on local password (local user account password), Windows tool used for connecting remotely to the user's own computer
Which of the following answers refer(s) to MSRA? (Select all that apply)
Access based on one-time password, Temporal remote access, The host and invited user can both see the host's screen, The host and invited user share control over host's mouse and keyboard, Windows tool used for assisted remote troubleshooting
ECC RAM
Can detect and correct errors
A logical device interface used for accessing non-volatile memory storage devices attached via PCIe is referred to as
NVMe
The term "SMS" is used in reference to
Text messaging services
Which of the answers listed below refers to an example of optical storage media?
CD
Which cloud service model would provide the best solution for a web developer intending to create a web app?
PaaS
Which of the following answers refers to a serial storage media interface?
SATA
What is the function of FTP?
File exchange
Which of the answers listed below refer to RJ11 connector?
Telephone equipment, Dial-up networking, Twisted-pair copper cabling
A network protocol for secure file transfer over SSH is called
SFTP
Which MFD/MFP feature optimizes processing of multi-page documents?
ADF
Methods used by Microsoft Windows operating systems for organizing disk partitions include
MBR, GPT
Which of the following are advantages of NTFS over FAT32?
All of the above are improvements implemented in NTFS not available in FAT32
A type of control access technology providing protection against copyright infringements is known as
DRM
Which of the answers listed below refer to the characteristic features of SAS?
Serial interface, Point-to-point connection, Does not require bus termination
Which of the following enables remote control over network devices?
RMM
Which of the answers listed below refers to a dedicated microcontroller designed for conducting cryptographic operations?
TPM
A computer network connecting multiple smaller networks over very large geographical areas is referred to as
WAN
Which wireless encryption scheme offers the highest level of protection?
WPA3
An electrostatic discharge that can damage integrated circuits used in computer and communications equipment is called
ESD
Which of the acronyms listed below is used to describe a collection of information about a particular subject?
KB
Which of the following answers refers to a unique 48-bit address assigned to every network adapter?
MAC
UTP is a type of inexpensive and easy to install copper cabling used in Ethernet networks and telephone systems. UTP cabling is not surrounded by any shielding that would provide protection against interference from outside sources. An additional protective cover that reduces signal interference from outside sources is a feature of STP cabling.
True
Which type of network cabling provides immunity against EMI and RFI?
Fiber optic
A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as
CAPTCHA
Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?
TCP/IP
A remote server hosting a virtualized user OS is an example of
VDI
Which of the following answers refers to a software that provides the functionality of a physical computer?
VM
Which of the answers listed below refers to a common target of XSS?
Dynamic web pages
A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as
IRP
A type of networking device that allows other wireless devices to connect to a wired network is called
AP
UDP is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.
True
Which of the following answers refer(s) to (a) video connection standard(s)? (Select all that apply)
DVI, DP, HDMI, VGA