CompTIA+ Core 2 Part 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Account Management

involves rules that decide the rights and privileges each user has on a computer or network.

2
New cards

Disable AutoPlay and AutoRun

Anytime you install a new CD or DVD, it would read the contents of that disc automatically

  • Huge vulnerability

3
New cards

Data at Rest

Any data stored in memory, a hard drive, or a storage device

4
New cards

Data in Transit/Motion

Any data moving from one computer or system to another over the network or within the same computer

5
New cards

Data in Use/Processing

Any data read into memory or is currently inside the processor and being worked on or manipulated

6
New cards

Degaussing

Exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive

7
New cards

Purging(Sanitizing)

Act of removing data in such a way that it cannot be reconstructed using any known forensic techniques

8
New cards

Clearing

Removal of data with a certain amount of assurance that it cannot be reconstructed

9
New cards

Recycling or repurposing electronic method

Erasing/wiping (Standard formatting or Low-level formatting)

10
New cards

Physical destruction methods

drilling, shredding, incinerating and degaussing

11
New cards

Erasing or Wiping

The process of destroying old data by writing over the location on the hard drive or solid state device with new data

  • Not a full proof system

12
New cards

Low-level Format

Procedure provided by the manufacturer which will reset the disk back to its factory condition

13
New cards

Self-Encrypting Drive

A particular type of hardware that will encrypt and decrypt the entire disk

14
New cards

Extensions

make web browsers better by adding features

15
New cards

Plug-ins

enhance existing software by adding specific functions.

16
New cards

Transport Layer Security (TLS)

is a widely used internet security protocol ensuring privacy. TLS 1.2 is a specific version of this protocol.

17
New cards

Ticketing System

Used to manage requests, incidents, and problems submitted by users

  • Shows user information

  • Device Information

  • Problem description

  • Ticket categories

18
New cards

Standard Change

Preauthorized and can be implemented without any additional authorization

19
New cards

Normal Change

Changes where the authorization is gained

20
New cards

Emergency Change

Changes that needs to be expedited

21
New cards

Physical network diagram

shows the actual physical arrangement of the components that make up the network, including cables and hardware

22
New cards

Logical network diagram

is a visual representation that illustrates the flow of data and communication between network devices and systems, emphasizing the connections and interactions without detailing physical locations or specific hardware configurations.

23
New cards

Asset ID

should be used to uniquely identify each piece of hardware tracked in an asset management database.

24
New cards

On-site

The backup storage mechanism is located in the same located in the same location as the system they’re backing up

25
New cards

Off-site

Backing up to some system not inside the same physical building where your workstations are

26
New cards

GrandFather-Father-Son(GFS)

is a backup method that blends full and incremental backups to save time and improve storage security. It follows a three-tiered system to guarantee at least one full backup is done each month.

27
New cards

3-2-1 Backup rule

suggests having three copies of your data: one on your server, two on different types of media, and one copy stored offline and off-site.

28
New cards

Redundant Power Supply

Enclosure that provides two or more complete power supplies inside of one.

29
New cards

Surges

Unexpected increase in the amount of voltage that’s being provided

30
New cards

Spikes

Short, transient voltage that can be due to a short circuit, a trip circuit breaker, a power outage, or even a lightning strike

31
New cards

Sags

unexpected decrease in the amount of voltage provided

32
New cards

Brownouts

Occurs when the voltage drops low enough that it causes the lights to dim and can cause a computer to shut off

33
New cards

Blackouts

Total loss of power for a long period of time

34
New cards

Uninterruptible Power Supply (UPS)

Combines the functionality of a surge suppressor with a battery backup

35
New cards

Backup Generator

emergency power system used when there is an outage of the regular electric grid power

36
New cards

Equipment Grounding

Ensures every electrical device has a path to the ground, which is a path that provides the least amount of resistance for electrical current to flow away harmlessly

37
New cards

Proper Power Handling

Keeps the technician safe when working on electrical equipment