Core 2 comptia a+ 1202

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

64 Terms

1
New cards

SPICE

.specifically for remote access to virtualized desktops, providing a seamless user experience with features such as audio support, USB redirection, and high-quality video. It is commonly used with Linux-based hypervisors like KV

2
New cards

Remote Desktop Protocol (RDP)

.proprietary Microsoft protocol mainly used for Windows remote desktop connections, making it less suitable for a Linux-based environment

3
New cards

Secure Shell (SSH)

a command-line protocol used for secure remote management rather than graphical desktop access.

4
New cards

virus

malicious software designed to infect computer files or disks when it is activated. A virus may be programmed to carry out other malicious actions, such as deleting files or changing system settings

5
New cards

trojan

malware that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network. The most common form of a trojan is a Remote Access Trojan (RAT), which allows an attacker to control a workstation or steal information remotel

6
New cards

worm

standalone malware computer program that replicates itself to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. A worm can spread on its own, whereas a virus needs a host program or user interaction to propagate itself.

7
New cards

rootkit

clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. A rootkit is generally a collection of tools that enabled administrator-level access to a computer or network. They can often disguise themselves from detection by the operating system and anti-malware solutions

8
New cards

repair installation

installation is a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted. A repair installation will only affect the system files and not any of the user's settings, customizations, or applications.

9
New cards

clean installation

installation of the new operating system on a new computer or a computer that has been recently formatted. A clean install will completely replace the operating system software on the computer with the new operating system. During a clean install, all of the user's data, settings, and applications will be deleted

10
New cards

in place upgrade

installation of the new operating system on top of an existing version of the operating system. An in-place upgrade will preserve the applications, user settings, and data files that already exist on the computer.

11
New cards

refresh install

installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store. Any applications installed outside of the Windows Store, though, will be deleted if you use a refresh installation.

12
New cards

constant

specific identifier that contains a value that cannot be changed within the program. For example, the value to convert a number from F to C is always 5/9 because the formula is C = (F -32) * 5/9. A comment is written into the code to help a human understand the initial programmer's logic.

13
New cards

character

stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.

14
New cards

string

stores a group of characters, such as Hello, PYTHON, or JasonDion. A string data type usually consumes as much storage as necessary. Each character in the string usually requires 1 byte of storage.

15
New cards

Boolean

Istores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).

16
New cards

integer

.stores a whole number, such as 21, 143, or 1024. An integer data type usually consumes 8 bytes of storage.

17
New cards

application integration

enables different software applications to communicate and share data, ensuring that systems such as CRM, billing, and inventory management work together seamlessly. This reduces the need for manual data entry and improves workflow automation. Virtualization allows multiple operating systems to run on a single physical machine but does not facilitate communication between different applications.

18
New cards

software patch management

ensures applications remain up-to-date and secure but does not integrate them

19
New cards

endpoint protection

focuses on securing devices against threats and is unrelated to linking business applications

20
New cards

RADIUS

.used to manage credentials for network devices centrally

21
New cards

.TACACS+

older username and login system that uses authentication to determine access, while RADIUS combines authorization AND authentication

22
New cards

Kerberos

.used in Windows Active Directory domains for authentication.

23
New cards

domain name system (DNS)

.protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21

24
New cards

WPS

created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered

25
New cards

chain of custody

chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.

26
New cards

SQL injection

most direct and more impactful threat to an organization's database. A SQL injection could allow the attacker to execute remote commands on the database server and lead to sensitive information disclosure

27
New cards

buffer overflow attack

attack attempts to overwrite the memory buffer to send additional data into adjacent memory locations. A buffer overflow attack might target a database server, but it isn't intended to disclose information directly. Instead, a buffer overflow attack may be used to gain initial access to a server and allow for other malicious code running

28
New cards

denial of service

targets the availability of the information by attempting to take the server offline

29
New cards

cross-site scripting attack

typically is focused on the user, not the server or database.

30
New cards

acceptable use policy (AUP)

governs employees' use of company equipment and Internet services. Enforcing an acceptable use policy is important to protect the organization from the security and legal implications of employees (or customers) misusing its equipment. Typically, the policy will forbid the use of equipment to defraud, defame, or obtain illegal material

31
New cards

local security policy

set of policies relating to log on, passwords, and other security issues that can be enforced or disabled on the local machine.

32
New cards

password policy

set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training. It contains items like password complexity, password age, and password history requirements

33
New cards

Group Policy

primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization. In an active directory environment, Group Policy is applied to users or computers based on their membership in sites, domains, or organizational units

34
New cards

Rogue anti-virus

form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer). It is a form of scareware that manipulates users through fear and a form of ransomware

35
New cards

fast startup

mode in between a full shutdown and a hibernation mode. With a fast startup, the computer will log out of the computer close all of its open files when being shut down. Before the system powers off, though, a small hibernation file is created to help speed up the bootup process when the computer is powered on again.

36
New cards

USB selective suspend

feature allows the hub driver to suspend an individual port without affecting the operation of the other ports on the hub. Selective suspension of USB devices is helpful when using a laptop computer as it helps to conserve battery power by powering off USB ports that are not needed at the time.

37
New cards

sleep or stanby

used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used. The computer takes less time to start up again from the sleep or standby mode than it does from the hibernate mode.

38
New cards

lock

.secure the desktop with a password while leaving programs running.

39
New cards

Network File System (NFS)

used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system

40
New cards

The extensible file allocation table (exFAT)

file system optimized for external flash memory storage devices such as USB flash drives and SD cards. exFAT supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability.

41
New cards

Apple File System(APFS)

default file system for Mac computers using macOS 10.13 or later and features strong encryption, space sharing, snapshots, fast directory sizing, and improved file system fundamentals.

42
New cards

New Technology file system(NTFS)

Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas. NTFS can support a maximum volume size of up to 8 PB.

43
New cards

Firewall

integral part of creating a screened subnet. If configured correctly, it can regulate exactly what traffic and users are allowed to access the server. This is different from a content filter because a content filter denies traffic to a user based on content, but not access to a server. If the firewall ruleset was not configured to allow external users to access the application remotely, the default condition is to "deny by default".

44
New cards

Thin Client

small device that can operate with or without an operating system installed on the client device. Instead, it can boot directly from a network-based operating system on a common server and access applications on the company's application server. This type of architecture can drastically reduce the need for operating system licenses and reduce deployment costs

45
New cards

Grandfather-father-son

uses daily, weekly, and monthly backups, with the monthly version usually kept off-site for extra protection.

46
New cards

Tower of Hanoi

rotation pattern but doesn't include off-site or monthly backups by default

47
New cards

3-2-1 backup

not a rotation schedule, and while it includes off-site storage, it doesn't specify how often backups happen.

48
New cards

FIFO backup

replaces the oldest backup with the newest and doesn't include long-term or off-site storage.

49
New cards

brute force attack

consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. In a traditional brute-force attack, the passcode or password is incrementally increased by one letter/number each time until the right passcode/password is found.

50
New cards

Dictionary Attack

technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary

51
New cards

Rainbow table attack

precomputed list of possible hashes used when trying to speed up the process of password cracking

52
New cards

WPA2 with AES encryption

most secure wireless network configuration utilizes

53
New cards

RFC change's scope

defines the area, number, size, or scale of a particular change. The change request documentation should define the exact scope of the change. In this example, only some of the Windows 2019 servers will receive the patch. If 50% of them are listed by their asset tracking number will receive the patch, this would clearly define this change's scop

54
New cards

RFC Plan

Ihow the change or installation will occur. The change request documentation should define the 5 W's (who, what, when, where, why, and how), with the plan documentation covering how the change is implemented. For example, the plan might say that the installation will be performed manually or through an automated patching process.

55
New cards

RFC risk analysis

portion of the change request documentation provides the risk levels of carrying out the change, or not performing the requested change at this time. Risk is the likelihood and impact (or consequence) of a given action. It is important to understand the risk involved with a change before deciding to proceed with implementing the change

56
New cards

RFC purpose of change

defines why the change or installation will occur. The change request documentation should define the 5 W's (who, what, when, where, why, and how) to define the why behind the change. For example, the purpose might be "to remediate several category one vulnerabilities so that our security is improved."

57
New cards

Captive portals

usually rely on 802.1x, and 802.1x uses RADIUS for authentication

58
New cards

domain-based email filter

all emails from the spamyou.com domain could be blocked and prevented from being delivered to the user

59
New cards

Wi-Fi protected access version 3 (WPA3)

replaced WPA2 as the most secure wireless encryption method. WPA3 uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys. WPA3 provides the enhanced open mode that encrypts transmissions from a client to the access point when using an open network.

60
New cards

cross-site scripting (XSS)

website's HTML code does not perform input validation to remove scripts that may be entered by a user, then an attacker can create a popup window that collects passwords and uses that information to compromise other accounts further.

61
New cards

standard operating procedure (SOP)

62
New cards

.standard operating procedure (SOP)

scope of work, is a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines

63
New cards

.Material Safety Data Sheet (MSDS)

.contains information on the potential hazards (health, fire, reactivity, and environmental) and how to work safely with the chemical product. The MSDS is an essential starting point for the development of a complete health and safety program that includes the directions for proper handling and disposal of the chemicals.

64
New cards

Configuration Management Database (CMDB)

solution because it provides a centralized repository for tracking IT assets, configurations, and relationships, ensuring that all changes are documented and can be reviewed for compliance and troubleshooting.