CompTIA’s A+ Certification exam: Core 2 (220-1202)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
full-widthPodcast
1
Card Sorting

1/807

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

808 Terms

1
New cards

Which Linux command is used to print the full contents of a file to the screen at once?

cat

2
New cards

Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?

dd

3
New cards

The customer service manager at Dion Training is having issues with her Windows 10 laptop. A technician believes that the operating system may have been corrupted by a piece of malware. The technician has removed the malware and wants to perform an installation or upgrade that will recopy the system files and revert most of the system settings to their default configurations while still preserving the user’s personalization settings, data files, and any applications installed through the Windows store. The technician has been told that they may delete any applications installed by the user, though, since they may have been infected by the malware. Which of the following types of upgrades or installations should the technician use?

Refresh installation

4
New cards

Which of the following is required for evidence to be admissible in a court of law?

Chain of custody

5
New cards

Strongest Wi-Fi encryption standard and should be enabled for better wireless security

WPA3 encryption

6
New cards

Limits Wi-Fi signal range so neighbors cannot detect or connect to the network

Reduce transmission power

7
New cards

Hides the network name so nearby users cannot easily locate it

Disable SSID broadcast

8
New cards

9
New cards

Most important action before granting remote access to a server to prevent infection

Install latest security updates and patches

10
New cards

Document showing the physical layout of cables, ports, and hardware

Physical network diagram

11
New cards

Protocol that allows devices like game consoles or VoIP handsets to automatically configure firewall ports

UPnP

12
New cards

Key fob device generating time-synchronized one-time passwords for authentication

Hardware token

13
New cards

Recommended workaround for a cracked laptop screen when internal hardware keys prevent replacement

External 15" tablet/monitor

14
New cards

Best action when a customer needs immediate smartphone functionality after water damage

Offer replacement phone

15
New cards

Best method to prevent malware that spreads using stolen credentials

Anti-virus with heuristic analysis

16
New cards

Not required in a DHCP scope for clients to access the internet

Reservations

17
New cards

Windows tool used to import and manage x.509 digital certificates

Certificate manager

18
New cards

Command used to rebuild Boot Configuration Data when Windows installation is missing

bootrec /rebuildbcd

19
New cards

Reason an offsite backup facility cannot destroy old tapes during a forensic investigation

Legal hold

20
New cards

Best way to isolate an internet-accessible FTP server to protect the internal network

Screened subnet

21
New cards
Private IP addresses in the Class A range are from 10.0.0.0 to 10.255.255.255. They are not routable over the Internet and are used within local networks
10.5.34.15
22
New cards
The command used to repair a partition boot sector in Windows is bootrec /fixboot, which addresses “BOOTMGR is missing” errors during startup
bootrec /fixboot
23
New cards
A local text file mapping hostnames to IP addresses that can be modified by attackers to redirect traffic
Check the host.ini file
24
New cards
On an MBR-partitioned system, only four primary partitions are allowed
Primary
25
New cards
When an application requires more RAM than installed, the system uses part of the storage drive as virtual memory, which slows performance
If an application needs more RAM than is available, the system uses part of the storage drive as virtual memory
26
New cards
A command-line utility that shows current TCP connections, routing tables, and network statistics
netstat
27
New cards
A DHCP reservation works by linking a specific MAC address to a specific IP address within the DHCP scope
By matching a MAC address to an IP address within the DHCP scope
28
New cards
To repair the boot sector on a Windows 10 disk, the command bootrec /fixboot is used
bootrec /fixboot
29
New cards
A targeted email attack aimed at specific individuals to steal sensitive information
Spear phishing
30
New cards
A unique identifier assigned to each piece of hardware in an organization’s asset management system
Asset ID
31
New cards
The Linux command dd can overwrite an entire hard disk with zeros, useful for wiping data
dd
32
New cards
A Windows 10 power state that saves the current session to memory with minimal power usage
Sleep
33
New cards
On Linux, the yum command is used to install, remove, or update software packages
yum
34
New cards
Grandfather-father-son (GFS)
Backup rotation scheme using daily (son), weekly (father), and monthly (grandfather) backups.
35
New cards
3-2-1 backup rule
Maintain 3 copies of data, on 2 different media types, with 1 copy off-site.
36
New cards
Tower of Hanoi
Backup rotation scheme rotating media sets to minimize wear; uses exponential rotation.
37
New cards
FIFO Backup
Backup scheme using a set number of tapes, overwriting the oldest with the newest.
38
New cards
shutdown +11
Linux command to shut down the system in 11 minutes.
39
New cards
shutdown 11:00
Linux command to shut down the system at 11:00 AM.
40
New cards
shutdown now
Linux command to shut down the system immediately.
41
New cards
Insider threat
Threat from current/former employees or partners misusing authorized access.
42
New cards
Zero-day
Attack exploiting a software vulnerability that hasn't been patched yet.
43
New cards
Known threat
Threat identifiable by basic signature or pattern matching.
44
New cards
Advanced Persistent Threat (APT)
Attacker with ability to obtain and maintain long-term access using exploits and malware.
45
New cards
Task Manager
Windows tool to monitor processes, performance, and services; used to kill unresponsive tasks.
46
New cards
Processes Tab
Task Manager tab to view system resource utilization and troubleshoot applications.
47
New cards
Mobile App Troubleshooting
If an app is slow/buggy, uninstall it, reboot the device, and reinstall the app.
48
New cards
IoT Security Best Practices
Use WPA2 encryption and place devices in a DMZ/screened subnet.
49
New cards
Data Wiping
Overwriting disk data with software to destroy it while allowing hardware reuse.
50
New cards
Degaussing
Demagnetizing a hard drive to erase data; renders the drive unusable.
51
New cards
Purging
Removing sensitive data via internal electronics, degaussing, or cryptographic erase.
52
New cards
Shredding
Physical destruction of a hard drive preventing reuse.
53
New cards
Low-level formatting
Disk operation making data recovery impossible; allows drive reuse.
54
New cards
Standard formatting
High-level formatting that may allow data recovery.
55
New cards
Character data type
Stores a single character (e.g., 'A'); consumes 1 byte.
56
New cards
String data type
Stores a group of characters; consumes variable storage.
57
New cards
Boolean data type
Stores TRUE/FALSE; consumes 1 bit.
58
New cards
Integer data type
Stores whole numbers; usually consumes 8 bytes.
59
New cards
Repair installation
Replaces OS files with new copies of the same version; fixes boot issues without deleting user data.
60
New cards
Clean install
Installing OS on a new/formatted drive; deletes all user data and settings.
61
New cards
In-place upgrade
Installing newer OS on top of existing one; preserves apps, settings, and data.
62
New cards
Refresh installation
Reinstalls OS files and resets settings; preserves user data and Store apps but deletes others.
63
New cards
ip command
Linux command to display wired network connection info (IP, subnet, MAC).
64
New cards
nslookup
Command to display and troubleshoot DNS records.
65
New cards
netstat
Command to display network statistics like active TCP connections and ports.
66
New cards
ipconfig
Windows command to display TCP/IP network configuration.
67
New cards
chmod
Linux command to change file or directory permissions.
68
New cards
chown
Linux command to change the owner of a file or directory.
69
New cards
pwd
Linux command to display the present working directory path.
70
New cards
sudo
Linux command to execute programs as superuser (root).
71
New cards
Encrypting File System (EFS)
Windows NTFS feature to encrypt individual files/folders for user privacy.
72
New cards
BitLocker
Windows feature for full disk encryption of the internal drive.
73
New cards
BitLocker to Go
Windows feature for full disk encryption of external drives (USB).
74
New cards
FileVault
macOS full disk encryption program.
75
New cards
Incident Response Step 1
Identify the issue.
76
New cards
Troubleshooting Service Failure
Reboot into Safe Mode to check for driver/service conflicts.
77
New cards
APIPA
Windows feature assigning 169.254.x.x IP when DHCP fails.
78
New cards
Private IP Address Ranges
10.x.x.x, 172.16-31.x.x, 192.168.x.x.
79
New cards
MAC Allow List
Security measure allowing only specific MAC addresses to connect to the network.
80
New cards
Swap partition
Linux hard disk section used as virtual memory when RAM is full.
81
New cards
ext3
Linux journaled file system supporting up to 32 TB.
82
New cards
ext4
Modern Linux journaled file system supporting up to 1 EB.
83
New cards
NFS (Network File System)
Protocol to mount remote storage as local file system on Linux.
84
New cards
Port Security
Switch feature limiting the number of MAC addresses allowed on a port.
85
New cards
Firewall
Security system preventing unauthorized access from external networks.
86
New cards
Single Sign-On (SSO)
Authentication method allowing one set of credentials for multiple services.
87
New cards
Login Script
Script running at user login to configure the environment.
88
New cards
pathping
Windows tool identifying network latency/loss spots by pinging nodes over time.
89
New cards
ping
Tool to test host reachability on an IP network.
90
New cards
net use
Windows command to connect/configure shared network resources.
91
New cards
Invalid Credentials Loop
Likely caused by Multi-factor authentication (MFA) requirement despite correct password.
92
New cards
ls
Linux command to list the files or directories in the current path.
93
New cards
pwd
Linux command to display the present working directory (current directory) path to the terminal.
94
New cards
chkdsk
Windows command to check the file system and file system metadata of a volume for logical and physical errors.
95
New cards
System File Checker (SFC)
Windows utility to scan for and restore corrupted Windows system files from the command line.
96
New cards
CRT monitor
Older-style monitor containing large capacitors that retain high levels of electricity, presenting a large risk of electrical shock.
97
New cards
Printer Troubleshooting First Step
Check the status of the print server queue to determine if the print job has become stuck.
98
New cards
Biometric lock
Physical security feature using identifying features like facial or fingerprint patterns to authenticate a user.
99
New cards
Badge reader
Physical security feature that reads a security badge (using RFID, smart card, or barcode) to authenticate a user.
100
New cards
Cable locks
Security device used for laptops, not servers or server rooms.