Comptia 1102

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/125

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

126 Terms

1
New cards

Windows 10 Processor Requirements

1GHx or a faster

2
New cards

Windows 10 Ram Requirements

1 gb for 32 bit 2 gb for 64

3
New cards

Windows 10 Storage Requirements

16 gb for 32, 20 gb for 64

4
New cards

Windows 10 Graphics Requirements

DirectX 9 or later, 800x600 , wddm 1.0 driver

5
New cards

Windows 10 64 home edition

supports 128 gbs of ram, can rdp into others, but can't be rdp'd to, client only. 

6
New cards

Domain Accounts

Managed by a server, limited user changes.

7
New cards

Workgroup Accounts

No central management, full user control.

8
New cards

BitLocker

Encrypts drives using 128 or 256-bit AES.

9
New cards

Group Policy Editor

Creates policies for local domains.

10
New cards

Get-ChildItem Command

Lists all files and folders in location.

11
New cards

SFC Command

Scans and repairs protected system files, File integrity checks

12
New cards

Change Directory Command

CD command

13
New cards

Disk Check Command

Finds and repairs disk errors with /f and /r.

14
New cards

Gpupdate Command

Updates group policy settings immediately.

15
New cards

MBR vs GPT

1 supports 4 partitions, 2 supports 128.

16
New cards

Winver Command

Displays the current Windows version.

17
New cards

Ipconfig Command

Troubleshoots network issues and displays settings.

18
New cards

Ping Command

Tests network connectivity with optional infinite run.

19
New cards

Hostname Command

Displays the name of the computer.

20
New cards

Netstat Command

Displays detailed network connections and traffic.

21
New cards

Nslookup Command

Diagnoses DNS issues.

22
New cards

Tracert Command

Shows each hop to a destination.

23
New cards

Task Manager Tabs

Includes Processes, Performance, Users, Services, Setup.

24
New cards

Microsoft Management Console (MMC)

Houses management tools called snap-ins.

25
New cards

Event Viewer (EVENTVWR)

Stores logs of errors and warnings.

26
New cards

Disk Management (DISKMGMT.msc)

Creates partitions and formats disks.

27
New cards

Task Scheduler (TASKSCHD.msc)

Creates automated tasks.

28
New cards

Device Manager (DEVMGMT.msc)

Manages hardware and drivers.

29
New cards

Performance Monitor (PERFMON)

Views real-time performance data.

30
New cards

MSINFO32

Displays detailed system information.

31
New cards

WOW64

Windows subsystem for running 32-bit applications.

32
New cards

32-bit OS

Max RAM 4 GB, slower performance.

33
New cards

64-bit OS

Max RAM 16 EB, faster performance.

34
New cards

Dedicated GPU

Standalone, more powerful, uses dedicated VRAM.

35
New cards

Robocopy

Command-line tool for robust file copying.

36
New cards

Boot Methods

USB, optical media, network (PXE) boot.

37
New cards

Image Deployment

Installs OS from a customized image.

38
New cards

Repair Installation

Attempts to fix current OS installation.

39
New cards

In-place Upgrade

Upgrades OS while keeping apps and files.

40
New cards

Refresh Installation

Reinstalls Windows, keeps personal files.

41
New cards

Restore Points

Automatic backups created during system changes.

42
New cards

MBR

Legacy partition manager, max 2 TB size.

43
New cards

GPT

Modern partition manager, max 9.4 ZB size.

44
New cards

NTFS

Default Windows file system with encryption support.

45
New cards

ReFS

Resilient file system for high data integrity.

46
New cards

APFS

Apple file system optimized for macOS.

47
New cards

.app File

Application bundle containing necessary files.

48
New cards

.dmg File

macOS disk image that needs mounting.

49
New cards

.pkg File

Installation package requiring no mounting.

50
New cards

Time Machine

macOS backup tool that deletes oldest backups.

51
New cards

Mission Control

Manages multiple desktops on macOS.

52
New cards

Keychain

macOS credential management system.

53
New cards

Finder

macOS GUI for file system interaction.

54
New cards

File Vault

Full disk encryption for macOS.

55
New cards

Terminal

Text-based access to macOS operating system.

56
New cards

LS Command

Lists all files in current directory.

57
New cards

Chmod Command

Sets user access rights to files, Linux

58
New cards

Apt

Package manager for Debian-based Linux distros.

59
New cards

MFA

Multi-factor authentication for enhanced security.

60
New cards

WPA2

Introduced in 2004, uses CCMP with AES encryption.

61
New cards

WPA3

Introduced in 2018, uses GCMP with AES encryption.

62
New cards

WEP

Legacy protocol, not secure, has two versions.

63
New cards

Personal WPA

Designed for SOHO, uses user-defined password.

64
New cards

Enterprise WPA

Uses AAA server, stronger encryption, complex setup.

65
New cards

TKIP

Legacy encryption protocol, less secure than AES.

66
New cards

CCMP

Encryption protocol using AES, part of WPA2.

67
New cards

GCMP

More efficient encryption protocol in WPA3.

68
New cards

PSK

Pre-shared key for WPA2 authentication.

69
New cards

EAP

Extensible Authentication Protocol for network access.

70
New cards

WPS

Wi-Fi Protected Setup for easy device connection.

71
New cards

KRACK

Vulnerability affecting WPA2 protocol security.

72
New cards

RADIUS

Remote Authentication Dial-In User Service protocol.

73
New cards

TACACS+

Cisco protocol for secure network device access.

74
New cards

Kerberos

Authentication protocol using tickets for access.

75
New cards

Rootkits

Malicious software for remote access and data theft.

76
New cards

Antimalware

Software designed to detect and remove malware.

77
New cards

SQL Injection

Attack exploiting unprotected databases via input fields.

78
New cards

XSS

Cross-Site Scripting, injecting scripts into trusted sites.

79
New cards

Encryption

Process of converting data into a secure format.

80
New cards

Asymmetric Encryption

Uses two related keys for secure communication.

81
New cards

Hash Algorithm

Generates a unique fingerprint for data.

82
New cards

PKI

Infrastructure for identity validation.

83
New cards

User Account Types

Standard, Administrator, Power User, Guest accounts.

84
New cards

NTFS Permissions

Access control for files and folders in Windows.

85
New cards

BitLocker

Drive encryption requiring TPM for security.

86
New cards

EFS

Encrypting File System for file-level encryption.

87
New cards

BYOD

Bring Your Own Device policy for employees.

88
New cards

COBO

Corporate Owned, Business Only device policy.

89
New cards

Data Destruction

//Methods include shredding, degaussing, and incinerating.

90
New cards

DHCP Reservations

Assign static IP based on MAC address.

91
New cards

SSID

Service Set Identifier for Wi-Fi networks.

92
New cards

Screened Subnet

Divides LAN into separate network areas.

93
New cards

BSOD

//Blue Screen of Death indicating system failure.

94
New cards

/SCANNOW

Command to scan and repair system files.

95
New cards

/VerifyOnly

Checks integrity of protected system files only.

96
New cards

/SCANFILE

Scans and repairs a specific selected file.

97
New cards

Clean boot

Starts Windows with minimal drivers and startup programs.

98
New cards

USB controller warning

Indicates issues with USB device connectivity.

99
New cards

System instability

Frequent crashes or performance issues in Windows.

100
New cards

No OS Found

Indicates that the operating system is not detected.