CompTIA A+ Test Corrections 1 >:p

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

DOS

Disk-based CLI OS from 80s-90s replaced with GUI systems

<p>Disk-based CLI OS from 80s-90s replaced with GUI systems</p>
2
New cards

Windows can be a

PC and mobile OS

<p>PC and mobile OS</p>
3
New cards

System Configuration

A Windows utility (msconfig.exe) that can identify what processes are launched at startup and can temporarily disable a process from loading.

<p>A Windows utility (msconfig.exe) that can identify what processes are launched at startup and can temporarily disable a process from loading.</p>
4
New cards

What to do if Windows Defender starts blocking software/updates?

add an exception

5
New cards

Best physical laptop threat protection

Bitlocker (or disk encryption in general)

<p>Bitlocker (or disk encryption in general)</p>
6
New cards

Implicit allow/deny

automatically denies all traffic unless explicitly permitted; minimizes unauth access

7
New cards

Explicit allow/deny

requires specific perms be set for access; more labor-intensive

8
New cards

LCD vs OLED

LCD: lightweight, low power, inexpensive, difficult to replace lights

OLED: thinner and lighter, no glass, accurate color, used on smartphones/tablets, emits light when receiving an electrical current

9
New cards

VA LCD

good color, slower response times

10
New cards

NFC

considered secure b/c of short distance and can be used to automate tasks (e.g, alarm silencing or logging into device)

11
New cards

Mobile display components

LCD, digitizer (turns physical input into electrical signals), glass cover

12
New cards

When to replace mobile display

When one component breaks

13
New cards

MAM and MDM

safeguards corporate data by managing all mobile devices on a corporate network

<p>safeguards corporate data by managing all mobile devices on a corporate network</p>
14
New cards

NFC support on iPhones

iPhone 6 and older: NFC only w/ Apple Pay

iPhone 7 and newer: 3rd party app for read/write NFC tags

iPhone12 and newer: Built-in NFC tag capabilities

15
New cards

2.4GHz vs 5GHz

5GHz: greater bandwidth, faster, more interference

2.4GHz: frequency have greater range, lower data transmission rates, 3 non-overlapping channels

16
New cards

Wireless Internet Service Provider

also called long-range fixed wireless: installed in areas with little to no wired infra (rural)

17
New cards

Default gateway/router internal address

address to the network's router

18
New cards

A router has both

an internal and external address

19
New cards

internal address

The private IP address that is translated to an external IP address by NAT (remains hidden by NAT).

20
New cards

External address

The public IP address that NAT uses to communicate with the external network.

21
New cards

What does the CPU require in order for virtualization to be enabled?

SLAT

22
New cards

Dual channel motherboard

4 memory slots, two RAM banks with two slots each

same channels are color-coded

Single RAM still works when on dual channel MB

23
New cards

Duplex fiber connectors

SC & LC

24
New cards

SC connector

- Type of connector used in fiber optic cabling.

- Snap-in with 2.5 mm ferrule.

<p>- Type of connector used in fiber optic cabling.</p><p>- Snap-in with 2.5 mm ferrule.</p>
25
New cards

LC Connector

- Type of connector used in fiber optic cabling.

- Uses a connector likened to RJ-45. It has a smaller form factor and uses 1.25 mm ferrule.

- Preferred for single mode.

<p>- Type of connector used in fiber optic cabling.</p><p>- Uses a connector likened to RJ-45. It has a smaller form factor and uses 1.25 mm ferrule.</p><p>- Preferred for single mode.</p>
26
New cards

VM Sprawl

occurs when an organization has many VMs that aren't managed properly (uncontrolled growth)

<p>occurs when an organization has many VMs that aren't managed properly (uncontrolled growth)</p>
27
New cards

VM Sprawl Avoidance

A policy for developing and deploying VMs must be established and enforced.

28
New cards

On-premises vs Cloud VDI

On-premises: hosted on local server

Cloud VDI: stored on remote server

<p>On-premises: hosted on local server</p><p>Cloud VDI: stored on remote server</p>
29
New cards

VDI (Virtualization Desktop Infrastructure)

Virtualization software designed to reproduce a desktop operating system as a virtual machine on a remote server.

30
New cards

VM Escape

An attack that allows an attacker to access the host system from within a virtual machine.

31
New cards

VM Escape Protection

The primary protection is to keep hosts and guests up to date with current patches.

32
New cards

NAT mode

VM obtains IP addressing information from its host

33
New cards

NAT Network

Can create a virtual network within the VM that has buffer to the outside world using NAT

34
New cards

Bridged Mode

- vNIC accesses physical network using host machine's NIC

- Obtains own IP address, default gateway, and netmask from DHCP server on physical LAN

35
New cards

host-only mode

VMs communicate only with each other and host.

36
New cards

Internal Network

A virtual network that can be accessed by virtual machines and the Hyper-V host.

37
New cards

Broken components that can cause ghosting

cleaning blade and erasure lamps