2.7 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Data-at-rest encryption

Technique that encrypts data stored on physical devices to secure sensitive information.

2
New cards

Length (passwords)

Strong passwords should be a minimum of 12 to 16 characters.

3
New cards

Character types (passwords)

Strong passwords should include a mixture of lowercase letters, uppercase letters, numbers, and symbols.

4
New cards

Uniqueness (passwords)

Using different strong passwords on multiple sites to avoid using the same password.

5
New cards

Complexity (passwords)

Strong passwords possess a high degree of entropy, making them difficult to guess.

6
New cards

Expiration (passwords)

Passwords should expire after a set period to reduce unauthorized access risks.

7
New cards

Administrator BIOS password

Password required to make changes to UEFI BIOS configurations.

8
New cards

User BIOS password

Password that prevents the boot process until entered.

9
New cards

Good BIOS password practices

Include no blank passwords, always require passwords, and avoid automatic logins.

10
New cards

Use screensaver logs

Set a password requirement to unlock a device after inactivity.

11
New cards

Log off when not in use

Encourages users to log out to prevent unauthorized access.

12
New cards

Secure/protect critical hardware

Utilize locking mechanisms to safeguard devices like laptops.

13
New cards

Secure personally identifiable information (PII)

Protect information that identifies a person, use privacy filters, and monitor placement.

14
New cards

Use password managers

Organize and protect passwords in a centralized location.

15
New cards

Restrict user permissions

Limit access rights to users based on their job functions.

16
New cards

Restrict log-in times

Limit user log-in access to specific times to prevent unauthorized access.

17
New cards

Disable guest accounts

Turn off unnecessary accounts that pose a risk to network security.

18
New cards

User failed attempts lockout

Locks accounts after a number of failed login attempts to prevent brute force attacks.

19
New cards

Use timeout/screen lock

Prompts credential re-entry after a period of inactivity.

20
New cards

Apply account expiration dates

Set a time when accounts become inactive for temporary access management.

21
New cards

Change the default administrator’s user account/password

Modify default credentials to prevent unauthorized access.

22
New cards

Disable AutoRun

Prevents automatic execution of programs from removable media to mitigate malware risk.

23
New cards

Disable unused services

Turn off non-essential services to reduce vulnerabilities and free up resources.