2.1 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Bollards

Used to limit access by vehicles to a particular area and channel pedestrian traffic, avoiding injuries.

2
New cards

Access control vestibule

Space serving as an entryway to limit access to secured areas, typically includes a biometric scanner or badge reader.

3
New cards

Badge reader

A device allowing authorized users access by scanning an identification badge, uses magnetic stripes, barcodes, or RFID.

4
New cards

Video surveillance

CCTV that allows observation of activity in a specific area without physical presence.

5
New cards

Alarm systems

Devices designed to alert to events requiring attention, like security breaches.

6
New cards

Circuit-based alarm systems

Alarms designed to ring when a circuit is opened or closed. Placed on doors, windows, or fences, and useful on the perimeter of a secured area.

7
New cards

Duress alarm

A specialized alarm system that is triggered by a user in distress, typically requiring only a discreet action or button press, often used in situations such as bank tellers or emergency service personnel to signal for immediate assistance.

8
New cards

Motion sensors

Devices designed to alert when motion is detected within a specific area.

9
New cards

Door lock

A security device that ensures a door stays in a closed position.

10
New cards

Conventional door lock

A door lock that uses a traditional lock and key to open.

11
New cards

Deadbolt

A door lock that uses a thumb turn/second key mechanism to provide enhanced security and prevent unauthorized access.

12
New cards

Electronic door lock

A door lock that uses a keyless/PIN mechanism to open.

13
New cards

Biometric lock

Locks that use biometric/physical features to provide access (e.g., fingerprints, retina/facial scans).

14
New cards

Equipment locks

Used to secure sensitive hardware, ensuring only authorized personnel can manage it.

15
New cards

Security guards

Personnel responsible for the physical protection of a facility and identification of access.

16
New cards

ID badge

A card or credential issued to employees that allows access to secured areas and systems within the facility. Contains the person’s name, picture, and other details - must be worn at all times.

17
New cards

Access list

Physical list of names/credentials that can enter a secured building - enforced by a security guard.

18
New cards

Fences

Barriers used to mark boundaries or control access, designed to be robust and difficult to cross.

19
New cards

Key fobs

Small devices for granting access to secured areas, often using RFID technology.

20
New cards

Smart cards

Plastic cards with embedded digital circuits used for authentication based on digital certificates.

21
New cards

Mobile digital key

Uses a phone to replace digital keys for unlocking doors and accessing systems.

22
New cards

Keys

Shaped metal with incisions designed to insert into a lock to open or close it. Used to secure areas that should not be locked electronically for power loss risks (e.g., safes).

23
New cards

Biometrics

Authentication based on unique physical or biological characteristics.

24
New cards

Retina scanner

A device that reads and analyzes the unique capillary (blood vessel) patterns in the retina, helping to verify the identity of an individual accurately and securely.

25
New cards

Fingerprint scanner

A device that analyzes the ridge patterns of fingerprints to provide authentication.

26
New cards

Palm print scanner

A device that scans the shape of a person’s hand and fingers to provide authentication.

27
New cards

Facial recognition technology (FRT)

Technology that creates a digital “key” from facial features and uses that to provide authentication. Relatively secure method - 1/1,000,000 false positive rate.

28
New cards

Voice recognition technology

Technology that uses an individual’s voice to provide authentication - the system is typically “trained” by speaking phrases, then the results are evaluated and stored to create a biometric pattern of the user’s voice (i.e., mannerisms, pace, accents).

29
New cards

Lighting

Ensures adequate visibility for surveillance and acts as a psychological deterrent.

30
New cards

Magnetometers

Devices that measure magnetic fields to detect metal objects for security.

31
New cards

Logical security

Encompasses the safeguards put in place to protect digital data and resources from unauthorized access and exploitation.

32
New cards

Principle of least privilege

Concept stating users should have only the minimal access rights necessary.

33
New cards

Zero Trust model

Security model where no entity is trusted by default and every access must be verified.

34
New cards

Access Control Lists (ACLs)

Technology used to allow or deny traffic on a network based on predefined filters.

35
New cards

Multifactor authentication (MFA)

Use of two or more methods to verify a user's identity.

36
New cards

Email-based MFA

MFA method used to associate a person with a particular email address, often requiring verification through a one-time code sent to the email before access is granted.

37
New cards

Hardware token

A physical device that generates a one-time code for user authentication, ensuring that only the individual with the hardware token can access the application or service. Typically attached to a keychain for easy access.

38
New cards

Authenticator application

Application that provides a pseudo-random number token to log into an app/service.

39
New cards

Short Message Service (SMS)

Use of a stored phone number to send a login factor via a text message, allowing users to receive a one-time code that must be entered for authentication.

40
New cards

Voice call MFA

Provision of a security token via a phone call - the user receives a numeric code given from a phone call and enters it to provide authentication.

41
New cards

Time-based one-time password (TOTP)

A temporary numeric code generated based on the current time and a shared secret key, providing an additional layer of security for two-factor authentication.

42
New cards

One-time password/passcode (OTP)

One-time authentication code - can only be used once per session/authentication attempt.

43
New cards

Security Assertions Markup Language (SAML)

An open standard for authentication/authorization in third-party applications.

44
New cards

Single sign-on (SSO)

Authentication process allowing access to multiple applications with one set of credentials.

45
New cards

Just-in-time access

Granting temporary access privileges to minimize security risks.

46
New cards

Privileged access management (PAM)

Security approach for managing root/privileged account access - stores privileged account credentials in a digital vault, and these temporary account credentials are released from the vault by request.

47
New cards

Mobile device management (MDM)

Centralized management of company-owned and user-owned devices.

48
New cards

Data loss prevention (DLP)

Managing sensitive personal data to prevent unauthorized leakage or acquisition.

49
New cards

Identity access management (IAM)

Framework ensuring authorized access to data at the correct time.

50
New cards

Directory services

Database of network entities, primarily Windows-based using Active Directory for access control.