1/105
Vocabulary flashcards for the CompTIA A+ 220-1102 exam, covering key concepts and definitions from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Windows 10 minimum requirements
CPU = 1 GHz; RAM = 2 GB; Free drive space = 32 GB
Windows 11 minimum requirements
CPU = 1 GHz; RAM = 4 GB; Free drive space = 64 GB; UEFI (secure boot) capable; TPM 2.0; DirectX 12; 720p resolution
Common System Tools
Device Manager, System Information, Task Manager, and msconfig
Remote Desktop Connection (RDP)
Enables a user to see and control the GUI of a remote computer
Workgroups vs. Domains
Workgroups are for small networks (20 maximum inbound sessions). Domains are for larger networks controlled by a domain controller with Active Directory
%systemroot%
C:\Windows by default
Windows DIR command
Directory command. Navigate with the CD command, including 'CD..' and 'CD\'
File manipulation commands
del (deletes), copy (copies files), robocopy (robust file copy, copies multiple files and directory trees)
Drive manipulation commands
format (writes new file system), diskpart (does everything Disk Management does in PowerShell/Command Prompt)
File checking command-line tools
chkdsk (/F fixes errors; /R locates bad sectors and recovers info) and sfc (System File Checker). sfc /scannow is common.
GPT (GUID Partition Table)
Can have 128 partitions and go beyond MBR’s 2 TB limit. Requires UEFI-compliant motherboard. GPT is stored in multiple locations
MBR (Master Boot Record)
Can have four partitions: up to four primary partitions but only one extended partition. Logical drives are sections of an extended partition. The Active partition is the one that is booted from; it usually contains the OS
Volume
Any section of a drive with a letter
NTFS
The most common file system in Windows
exFAT
Common file system for flash drives
Windows Backup Tools
File History and Windows Backup
System Restore
Fixes issues by reverting back to an earlier time
Windows Recovery Environment (WinRE)
Includes System Recovery Options such as Startup Repair, System Restore, Command Prompt, and Startup Settings
Startup Settings
Brings up options such as Safe Mode, Enable low-resolution video, and Last Known Good Configuration. Safe Mode boots the system with minimal drivers
Event Viewer
Warns about possible issues and displays errors as they occur within three main log files: System, Application, and Security. Security displays auditing information
Stop Error (Blue Screen of Death - BSOD)
Completely halts the operating system and displays a blue screen with various text and code. Can be caused by faulty hardware or bad drivers
gpresult
Displays policy information for the user/computer
gpupdate
Updates policies without having to log off and on
ipconfig
Displays current TCP/IP network configuration values; ipconfig/all shows additional Information such as MAC address
ping
Tests whether another host is available over the network (example: ping 192.168.1.1). ping 127.0.0.1 or ping ::1 to test the local computer. ping -t is continuous, ping -n is a set of pings, ping -l changes the size of each ping, ping -a resolves IP address to hostname
tracert
Sends packets to test destinations beyond the local computer’s network. pathping is similar
netstat
Shows the network statistics for the local computer. Displays TCP and UDP sessions by computer name (or IP) and port
nslookup
Used to query DNS servers to find out DNS details, including the IP address of hosts
net
Used to map network drives (net use), view computers (net view), view users (net user), start/stop services (net start and net stop), and synchronize time (net time)
macOS Dock
Icons on the bottom of the screen used for quick access to applications and files
macOS Finder
Used for locating applications and files
macOS Key Chain
Protected passwords/certificates
macOS Mission Control
Larger desktop perspective
macOS Spotlight
Search tool
macOS iCloud
Cloud storage, sync, and backup
macOS Screen Sharing
View and take control of remote systems
macOS Boot Camp
Dual-boot to Windows
macOS Time Machine
Backup program/system state
macOS Terminal
Similar to Linux terminal
Linux File System
Typically uses GPT and the ext4 file system. Paths use slashes (example: /Downloads/PDFs)
Linux Command: ip a
Linux equivalent of ipconfig
Linux Command: ls
Lists directory contents
Linux Command: chmod
Modifies permissions
Linux Command: chown
Changes file ownership
Linux Command: ps
Displays process information
Linux Command: apt-get & yum
Installs packages
Linux Command: sudo
Executes commands as admin
Linux Command: vi/Vim/nano
Opens text editor
Linux Command: passwd
Changes password
Linux Command: pwd
Displays full path/filename of working directory
Linux Command: shutdown
Brings system down
Linux Command: kill
Terminates processes
Linux Command: cat
Displays file content
Linux Command: grep
Searches for matching information
Linux Command: df
Reports disk space usage
Linux Command: man
Manual pages (help)
Linux Command: top
Analyzes running processes, CPU, and RAM
Linux Command: find
Locates files
Linux Command: dig
Finds out information related to DNS
Wireless encryption protocols
WPA (Wi-Fi Protected Access), AES (Advanced Encryption Standard), PSK (pre-shared key). Deprecated protocols include WEP, WPA (version 1), and TKIP.
Virus
Code that runs on a computer without the user’s knowledge
Trojan horse
Appears to perform desired functions but are actually performing malicious functions behind the scenes
Spyware
Downloaded unwittingly from a website or installed along with some other third-party software
Rootkit
Designed to gain administrator-level access to the core of a system without being detected
Keylogger
Captures the keystrokes of a keyboard
Ransomware
Designed to hold the computer hostage, encrypting files or locking the computer until the user pays the attacker. Often propagated by a Trojan
Cryptominer
Attempts to calculate hashes for cryptocurrency tokens. Can use up resources making a system perform sluggishly
Malware removal best practices
Social Engineering
Manipulating users into revealing confidential information or performing other actions detrimental to the user
Network Attacks
On-path attack, spoofing, zero-day, dictionary, and brute force attacks. DDoS (distributed denial of service), Evil twin
Authentication
Verification of a person’s identity; helps protect against unauthorized access. Something the user knows, has, is, or does. MFA = multi-factor authentication (Example: A password and a smart card)
Security techniques
Access control vestibule, one-time password (OTP), RFID badge, biometric reader, smart cards, and ACLs (access control lists)
Encryption
Changing information using a cipher to make it unreadable to unauthorized users
Encrypting File System (EFS)
Encrypts one or more files or folders directly within the Properties page in Windows
BitLocker
Encrypts an entire drive in Windows. Requires TPM (Trusted Platform Module). BitLocker To Go encrypts USB drives
Storage drive disposal methods
Clearing, purging (sanitizing), and destruction
BIOS/UEFI security
Administrator and user passwords, drivelock passwords, disabling removable media, UEFI Secure Boot, and setting boot device priority
Permissions (NTFS vs. Share)
The more restrictive takes effect; Inheritance/propagation: new folders inherit permissions from their parent folder
Mobile device security
Screenlocks, lockout on invalid attempts, remote wipe, remote backup, and antivirus. Disallow rooting and jailbreaking
Wireless security
Change admin password, change/disable SSID, reduce radio power, disable WPS, use WPA3/AES, enable MAC filtering, update firmware, enable firewall, enable content filtering
Safety Precautions
Do not open power supplies, test AC outlets before use, use Class C CO2-based/BC fire extinguisher on electrical fires, call 911. Employ cable management, MSDS
ESD (Electrostatic Discharge) Prevention
Antistatic strap, mat, touch chassis, antistatic bags, unplug computer, and increase humidity
UPS (Uninterruptible Power Supply)
Battery backup for protection during electrical outages
Trouble Tickets
Include user/device information, description of problems, and severity and should be clearly written
Change Management
Purpose of change, scope of change, affected systems, risk analysis, end-user acceptance, change board approvals. Should also include rollback plan and sandbox testing
Incident Response
First response, identify what happened, report through proper channels, preserve data and devices, document, and set up chain of custody
Regulated Data
PII (personally identifiable information), PHI (protected health information), personal government-issued information, PCI DSS, and GDPR. Store in a secure area with encryption and proper permissions
Professionalism
Professional appearance, punctuality, listen to customer, take notes, clarify problems, positive attitude, speak clearly, project confidence, be culturally sensitive, set and meet expectations, avoid distractions, and avoid confidential data
Basic loops
Tell a program to execute the same statement several times
PowerShell and Bash variables
Always place a $ before a variable
Remote access protocols
RDP (Remote Desktop Protocol, port 3389), SSH (Secure Shell, port 22), Virtual Network Computing (VNC)
FTP (File Transfer Protocol). Port
Port 20/21 Secure versions: FTPS on port 989/990 and SFTP on port 22
SSH (Secure Shell). Port
Port 22
Telnet. Port
Port 23 (not secure)
SMTP (Simple Mail Transfer Protocol). Port
Port 25 Secure version uses SSL/TLS on port 587 or 465
DNS (Domain Naming System). Port
Port 53
DHCP (Dynamic Host Configuration Protocol). Port
Port 67/68
HTTP (Hypertext Transfer Protocol). Port
Port 80
POP3 (Post Office Protocol). Port
Port 110 Secure version uses SSL/TLS on port 995
NetBIOS/NetBT (NetBIOS over TCP/IP). Ports
Ports 137–139