2.8 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Device encryption

The use of encryption to help protect sensitive data on a device.

2
New cards

Facial recognition

An authentication type that requires users to scan their face to unlock a device.

3
New cards

PIN codes

An authentication type that requires users to enter a numeric code to unlock the device and access sensitive information.

4
New cards

Fingerprint

An authentication type that requires users to provide a fingerprint to unlock a device.

5
New cards

Pattern

An authentication type that requires users to draw a specific shape or design on the screen to unlock the device.

6
New cards

Swipe

An authentication type that requires users to swipe their finger across a designated area on the screen to unlock the device, noted as very insecure.

7
New cards

Configuration profiles

XML or JSON formatted files used to manage secure devices by enforcing specific settings/policies, typically used by Mobile Device Management (MDM) software.

8
New cards

OS updates

A security best practice that ensures your operating system is kept up-to-date with security fixes.

9
New cards

Application updates

A security best practice that ensures all applications present on a device are kept up-to-date.

10
New cards

Antivirus

Software that protects a device from viruses by detecting and removing them before they can harm the system.

11
New cards

Anti-malware

Software that protects a device from malware by detecting and removing it before it can harm the system.

12
New cards

Content filtering

A security measure that restricts access to certain websites or content based on predefined criteria.

13
New cards

Locator application

Software that allows users to track the location of their mobile devices if they are lost.

14
New cards

Remote wipes

A security feature that enables users to erase all data from their mobile devices remotely.

15
New cards

Remote backup applications

Software solutions that automatically copy data from mobile devices to a secure off-site location.

16
New cards

Failed log-in attempts restrictions

Policies that limit the number of unsuccessful attempts at which a restriction will be applied to an account.

17
New cards

MDM

Software solution used to apply corporate/security policies to a device.

18
New cards

BYOD (Bring Your Own Device)

Employees use their personal devices for work-related tasks, posing security challenges.

19
New cards

Corporate-owned devices

Devices owned and managed by the organization allowing for stricter security controls.

20
New cards

Profile security requirements

Guidelines outlining necessary security measures to protect sensitive data on devices.