2.2 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Windows Defender

Built-in anti-malware/anti-virus for Windows, found via the Windows Security app.

2
New cards

Real-time protection

A feature of Windows Defender Antivirus that operates continuously to protect against malware.

3
New cards

Update definitions

Refers to updating AV signatures to allow Windows Defender to identify new malicious software.

4
New cards

Windows Firewall

A security feature that monitors ingress/egress network traffic on a Windows machine for malicious activity.

5
New cards

Port security

Windows Firewall rules that allow or deny traffic on a specific port.

6
New cards

Application security

Refers to Windows Firewall rules that allow/deny traffic related to a specific application

7
New cards

Local account

A user account associated with a specific Windows device.

8
New cards

Microsoft account

A user account that allows settings to be synced between devices and integrates with Microsoft applications.

9
New cards

Domain account

Windows account centrally managed via Active Directory, commonly used in business environments.

10
New cards

Administrator

The Windows super-user account with full access and privileges on the system.

11
New cards

Standard account

A typical user account within Windows

12
New cards

User Account Control (UAC)

Windows utility that notifies the user when a program attempts to make changes that require administrative privileges.

13
New cards

Power user

A standard account with elevated privileges that allows slightly more control over the system settings than a typical user account. Permissions are removed for Windows Vista and later.

14
New cards

Username/password login

Common method to authenticate or log-in to a Windows OS. Includes a name, and a unique character string associated with an account.

15
New cards

Personal identification number (PIN)

Authentication/log-in method that involves the use of a 4-digit number.

16
New cards

Fingerprint

A biometric authentication method that scans and compares the ridges on someone’s fingers to a stored template.

17
New cards

Facial recognition

A biometric authentication method that scans a person’s face.

18
New cards

Single-sign on (SSO)

A user authentication process that allows a user to access multiple applications (or in this case, the OS), with one set of login credentials - typically Windows Domain/AD credentials.

19
New cards

Passwordless authentication

A secure method that allows users to log in without traditional passwords, often using biometrics such as facial recognition or PIN codes, exemplified by Windows Hello.

20
New cards

NTFS permissions

File system permissions that provide fine-grained control over access to files and folders - apply from both local and network connections. NTFS permissions also exhibit inheritance for files regulated by their parent folder.

21
New cards

Share permissions

Permissions that are applied when a user accesses a shared folder over a network - only applies for network connections.

22
New cards

NTFS vs. network share perms contrast

If there is a contrast between access settings (e.g, Deny for Shares and allow for NTFS - or vice versa), the most restrictive setting wins.

23
New cards

Explicit permission

Default permissions for a file/folder.

24
New cards

Inherited permissions

Permissions taken from the parent object (e.g., a folder) to the child object (sub-files, sub-folders). A permission is set once, and it applies to everything underneath

25
New cards

Explicit vs. inherited permissions conflict

Explicit permissions take precedence over inherited permissions.

26
New cards

Run as administrator vs. standard user

Standard users face limitations in accessing system files and settings that administrators do not. To bypass this, they must select "Run as administrator" for certain applications, even if they are in the Administrators group.

27
New cards

BitLocker

A feature that helps protect data through full disk encryption, requiring authentication for access.

28
New cards

BitLocker-To-Go

A feature that extends BitLocker encryption to removable drives for securing data on USBs.

29
New cards

Encrypting File System (EFS)

Allows for encryption of data with filesystems, requiring NTFS to operate.

30
New cards

Active Directory (AD)

A centralized database of everything on a network provided by Windows, allowing authentication and access control.

31
New cards

Domain

Logical group of users, computers, and resources - every domain has a name.

32
New cards

Domain controller (DC)

Centralized server that stores all information related to the AD domain database.

33
New cards

Joining a domain (process)

Navigate to your computer’s information in Windows Settings: (System → About). Click on “Domain or workgroup”: Enter the domain name you wish to join, then click OK to proceed with the authentication process and follow any on-screen prompts

34
New cards

Organizational units (OU)

Logical sections for organizing objects/devices in Active Directory.

35
New cards

Log-in script

A script that automates a series of tasks at login. Can be assigned to a specific user, group, or OU.

36
New cards

Assigning a log-in script (process)

Access the Domain Controller for the relevant domain, and select “Group Policy Management Editor” from the “Tools” drop-down. Right-click the relevant OU, and then select the “Create a GPO in this domain” option.

37
New cards

Moving objects within organizational units

Requires the Active Directory Users and Computers (ADUC) tool. Within ADUC, right-click on the object, click the “Move” option, and select the OU to which the object will be relocated.

38
New cards

Home folders

Networked folders designed to be alternative storage for users’ local drives.

39
New cards

Assigning home folders (process)

In ADUC, right-click the relevant OU, select all users, then click “Properties.” Go to the “Profile” tab, under “Home folder,” choose “Connect,” select a drive letter (e.g., “H:”), and specify the share location (e.g., \\SERVER\home\%username%).

40
New cards

Group Policy

A tool managed within Windows that provides a central console for login scripts, network configs, and security parameters.

41
New cards

Applying Group Policy (process)

Access the Domain Controller, select “Group Policy Management Editor” from the “Tools” menu. Right-click the relevant OU, choose “Create a GPO in this domain,” and enable the desired policy by double-clicking it. Finally, run gpupdate /force to update the Group Policy settings.

42
New cards

Security group

Groups used to assign permissions to shared resources.

43
New cards

Selecting security groups (process)

Go to Active Directory Users and Computers, find the user, right-click, select “Properties,” then the “Member Of” tab. Click “Add…,” type the group name, and select the security group.

44
New cards

Folder redirection

Redirects user folders to a networked share, allowing interaction as if they were local.

45
New cards

Configuring folder redirection

Go to Group Policy Management Editor → User Configuration → Folder Redirection. Select folders, set “Setting:” to Basic, and enter the redirected path (e.g., \\SERVER\home\%username%\Documents).