CompTIA A+ 220-1102 Exam Notes

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/105

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards for the CompTIA A+ 220-1102 exam, covering key concepts and definitions from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

106 Terms

1
New cards

Windows 10 minimum requirements

CPU = 1 GHz; RAM = 2 GB; Free drive space = 32 GB

2
New cards

Windows 11 minimum requirements

CPU = 1 GHz; RAM = 4 GB; Free drive space = 64 GB; UEFI (secure boot) capable; TPM 2.0; DirectX 12; 720p resolution

3
New cards

Common System Tools

Device Manager, System Information, Task Manager, and msconfig

4
New cards

Remote Desktop Connection (RDP)

Enables a user to see and control the GUI of a remote computer

5
New cards

Workgroups vs. Domains

Workgroups are for small networks (20 maximum inbound sessions). Domains are for larger networks controlled by a domain controller with Active Directory

6
New cards

%systemroot%

C:\Windows by default

7
New cards

Windows DIR command

Directory command. Navigate with the CD command, including 'CD..' and 'CD\'

8
New cards

File manipulation commands

del (deletes), copy (copies files), robocopy (robust file copy, copies multiple files and directory trees)

9
New cards

Drive manipulation commands

format (writes new file system), diskpart (does everything Disk Management does in PowerShell/Command Prompt)

10
New cards

File checking command-line tools

chkdsk (/F fixes errors; /R locates bad sectors and recovers info) and sfc (System File Checker). sfc /scannow is common.

11
New cards

GPT (GUID Partition Table)

Can have 128 partitions and go beyond MBR’s 2 TB limit. Requires UEFI-compliant motherboard. GPT is stored in multiple locations

12
New cards

MBR (Master Boot Record)

Can have four partitions: up to four primary partitions but only one extended partition. Logical drives are sections of an extended partition. The Active partition is the one that is booted from; it usually contains the OS

13
New cards

Volume

Any section of a drive with a letter

14
New cards

NTFS

The most common file system in Windows

15
New cards

exFAT

Common file system for flash drives

16
New cards

Windows Backup Tools

File History and Windows Backup

17
New cards

System Restore

Fixes issues by reverting back to an earlier time

18
New cards

Windows Recovery Environment (WinRE)

Includes System Recovery Options such as Startup Repair, System Restore, Command Prompt, and Startup Settings

19
New cards

Startup Settings

Brings up options such as Safe Mode, Enable low-resolution video, and Last Known Good Configuration. Safe Mode boots the system with minimal drivers

20
New cards

Event Viewer

Warns about possible issues and displays errors as they occur within three main log files: System, Application, and Security. Security displays auditing information

21
New cards

Stop Error (Blue Screen of Death - BSOD)

Completely halts the operating system and displays a blue screen with various text and code. Can be caused by faulty hardware or bad drivers

22
New cards

gpresult

Displays policy information for the user/computer

23
New cards

gpupdate

Updates policies without having to log off and on

24
New cards

ipconfig

Displays current TCP/IP network configuration values; ipconfig/all shows additional Information such as MAC address

25
New cards

ping

Tests whether another host is available over the network (example: ping 192.168.1.1). ping 127.0.0.1 or ping ::1 to test the local computer. ping -t is continuous, ping -n is a set of pings, ping -l changes the size of each ping, ping -a resolves IP address to hostname

26
New cards

tracert

Sends packets to test destinations beyond the local computer’s network. pathping is similar

27
New cards

netstat

Shows the network statistics for the local computer. Displays TCP and UDP sessions by computer name (or IP) and port

28
New cards

nslookup

Used to query DNS servers to find out DNS details, including the IP address of hosts

29
New cards

net

Used to map network drives (net use), view computers (net view), view users (net user), start/stop services (net start and net stop), and synchronize time (net time)

30
New cards

macOS Dock

Icons on the bottom of the screen used for quick access to applications and files

31
New cards

macOS Finder

Used for locating applications and files

32
New cards

macOS Key Chain

Protected passwords/certificates

33
New cards

macOS Mission Control

Larger desktop perspective

34
New cards

macOS Spotlight

Search tool

35
New cards

macOS iCloud

Cloud storage, sync, and backup

36
New cards

macOS Screen Sharing

View and take control of remote systems

37
New cards

macOS Boot Camp

Dual-boot to Windows

38
New cards

macOS Time Machine

Backup program/system state

39
New cards

macOS Terminal

Similar to Linux terminal

40
New cards

Linux File System

Typically uses GPT and the ext4 file system. Paths use slashes (example: /Downloads/PDFs)

41
New cards

Linux Command: ip a

Linux equivalent of ipconfig

42
New cards

Linux Command: ls

Lists directory contents

43
New cards

Linux Command: chmod

Modifies permissions

44
New cards

Linux Command: chown

Changes file ownership

45
New cards

Linux Command: ps

Displays process information

46
New cards

Linux Command: apt-get & yum

Installs packages

47
New cards

Linux Command: sudo

Executes commands as admin

48
New cards

Linux Command: vi/Vim/nano

Opens text editor

49
New cards

Linux Command: passwd

Changes password

50
New cards

Linux Command: pwd

Displays full path/filename of working directory

51
New cards

Linux Command: shutdown

Brings system down

52
New cards

Linux Command: kill

Terminates processes

53
New cards

Linux Command: cat

Displays file content

54
New cards

Linux Command: grep

Searches for matching information

55
New cards

Linux Command: df

Reports disk space usage

56
New cards

Linux Command: man

Manual pages (help)

57
New cards

Linux Command: top

Analyzes running processes, CPU, and RAM

58
New cards

Linux Command: find

Locates files

59
New cards

Linux Command: dig

Finds out information related to DNS

60
New cards

Wireless encryption protocols

WPA (Wi-Fi Protected Access), AES (Advanced Encryption Standard), PSK (pre-shared key). Deprecated protocols include WEP, WPA (version 1), and TKIP.

61
New cards

Virus

Code that runs on a computer without the user’s knowledge

62
New cards

Trojan horse

Appears to perform desired functions but are actually performing malicious functions behind the scenes

63
New cards

Spyware

Downloaded unwittingly from a website or installed along with some other third-party software

64
New cards

Rootkit

Designed to gain administrator-level access to the core of a system without being detected

65
New cards

Keylogger

Captures the keystrokes of a keyboard

66
New cards

Ransomware

Designed to hold the computer hostage, encrypting files or locking the computer until the user pays the attacker. Often propagated by a Trojan

67
New cards

Cryptominer

Attempts to calculate hashes for cryptocurrency tokens. Can use up resources making a system perform sluggishly

68
New cards

Malware removal best practices

  1. Identify and verify malware symptoms 2. Quarantine infected systems 3. Disable System Restore in Windows 4. Remediate infected systems 5. Schedule scans and run updates 6. Enable System Restore and create a restore point 7. Educate the end user
69
New cards

Social Engineering

Manipulating users into revealing confidential information or performing other actions detrimental to the user

70
New cards

Network Attacks

On-path attack, spoofing, zero-day, dictionary, and brute force attacks. DDoS (distributed denial of service), Evil twin

71
New cards

Authentication

Verification of a person’s identity; helps protect against unauthorized access. Something the user knows, has, is, or does. MFA = multi-factor authentication (Example: A password and a smart card)

72
New cards

Security techniques

Access control vestibule, one-time password (OTP), RFID badge, biometric reader, smart cards, and ACLs (access control lists)

73
New cards

Encryption

Changing information using a cipher to make it unreadable to unauthorized users

74
New cards

Encrypting File System (EFS)

Encrypts one or more files or folders directly within the Properties page in Windows

75
New cards

BitLocker

Encrypts an entire drive in Windows. Requires TPM (Trusted Platform Module). BitLocker To Go encrypts USB drives

76
New cards

Storage drive disposal methods

Clearing, purging (sanitizing), and destruction

77
New cards

BIOS/UEFI security

Administrator and user passwords, drivelock passwords, disabling removable media, UEFI Secure Boot, and setting boot device priority

78
New cards

Permissions (NTFS vs. Share)

The more restrictive takes effect; Inheritance/propagation: new folders inherit permissions from their parent folder

79
New cards

Mobile device security

Screenlocks, lockout on invalid attempts, remote wipe, remote backup, and antivirus. Disallow rooting and jailbreaking

80
New cards

Wireless security

Change admin password, change/disable SSID, reduce radio power, disable WPS, use WPA3/AES, enable MAC filtering, update firmware, enable firewall, enable content filtering

81
New cards

Safety Precautions

Do not open power supplies, test AC outlets before use, use Class C CO2-based/BC fire extinguisher on electrical fires, call 911. Employ cable management, MSDS

82
New cards

ESD (Electrostatic Discharge) Prevention

Antistatic strap, mat, touch chassis, antistatic bags, unplug computer, and increase humidity

83
New cards

UPS (Uninterruptible Power Supply)

Battery backup for protection during electrical outages

84
New cards

Trouble Tickets

Include user/device information, description of problems, and severity and should be clearly written

85
New cards

Change Management

Purpose of change, scope of change, affected systems, risk analysis, end-user acceptance, change board approvals. Should also include rollback plan and sandbox testing

86
New cards

Incident Response

First response, identify what happened, report through proper channels, preserve data and devices, document, and set up chain of custody

87
New cards

Regulated Data

PII (personally identifiable information), PHI (protected health information), personal government-issued information, PCI DSS, and GDPR. Store in a secure area with encryption and proper permissions

88
New cards

Professionalism

Professional appearance, punctuality, listen to customer, take notes, clarify problems, positive attitude, speak clearly, project confidence, be culturally sensitive, set and meet expectations, avoid distractions, and avoid confidential data

89
New cards

Basic loops

Tell a program to execute the same statement several times

90
New cards

PowerShell and Bash variables

Always place a $ before a variable

91
New cards

Remote access protocols

RDP (Remote Desktop Protocol, port 3389), SSH (Secure Shell, port 22), Virtual Network Computing (VNC)

92
New cards

 FTP (File Transfer Protocol). Port

Port 20/21 Secure versions: FTPS on port 989/990 and SFTP on port 22

93
New cards

SSH (Secure Shell). Port

Port 22

94
New cards

Telnet. Port

Port 23 (not secure)

95
New cards

SMTP (Simple Mail Transfer Protocol). Port

Port 25 Secure version uses SSL/TLS on port 587 or 465

96
New cards

DNS (Domain Naming System). Port

Port 53

97
New cards

DHCP (Dynamic Host Configuration Protocol). Port

Port 67/68

98
New cards

HTTP (Hypertext Transfer Protocol). Port

Port 80

99
New cards

POP3 (Post Office Protocol). Port

Port 110 Secure version uses SSL/TLS on port 995

100
New cards

NetBIOS/NetBT (NetBIOS over TCP/IP). Ports

Ports 137–139