Professor Messer's CompTIA 220-1102 Core 2 – Key Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/106

flashcard set

Earn XP

Description and Tags

A comprehensive set of vocabulary flashcards summarizing essential terms, commands, features, and security concepts from Professor Messer’s CompTIA A+ 220-1102 Core 2 lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

107 Terms

1
New cards

Windows 10 Home

Consumer edition of Windows 10 that integrates a Microsoft account, OneDrive backup, Windows Defender, and Cortana but lacks business-class domain and BitLocker features.

2
New cards

Windows 10 Pro

Business-oriented Windows 10 edition that supports Remote Desktop host, BitLocker full-disk encryption, and domain join with Group Policy management.

3
New cards

Windows 10 Enterprise

Volume-licensed Windows 10 edition for large deployments; adds AppLocker, BranchCache, and granular UX control for kiosks and workstations.

4
New cards

Active Directory Domain Services (AD DS)

Microsoft directory service that stores user, computer, and resource information to provide centralized authentication and management across a network domain.

5
New cards

Windows Workgroup

Peer-to-peer logical grouping where each Windows device maintains its own accounts and settings without centralized authentication.

6
New cards

Windows Domain

Business network model with centralized authentication, policies, and resource access managed by domain controllers running Active Directory.

7
New cards

Remote Desktop Protocol (RDP)

Microsoft protocol that lets a client view and control a remote Windows desktop; server component available in Pro and Enterprise editions.

8
New cards

BitLocker

Windows feature that provides full-disk encryption (FDE) so every file—including the OS—is stored encrypted; unlocked with TPM or password.

9
New cards

Encrypting File System (EFS)

NTFS feature that encrypts individual files and folders using the user’s credentials rather than encrypting the entire drive.

10
New cards

Group Policy

Windows mechanism that applies centralized configuration settings to users and computers, either locally (gpedit.msc) or through Active Directory (gpmc.msc).

11
New cards

In-place upgrade

Windows installation method that keeps existing apps, files, and settings while replacing the operating system with a newer version.

12
New cards

Clean install

OS installation that wipes existing data, partitions, and applications before installing a fresh copy of Windows.

13
New cards

gpupdate

Command-line tool that forces an immediate update of Group Policy settings on a Windows computer.

14
New cards

gpresult

Windows command that displays the resultant set of policies (RSoP) applied to a user or computer.

15
New cards

ipconfig

CLI utility that shows and manages a Windows machine’s IP address, subnet mask, gateway, and DNS/DHCP information.

16
New cards

ping

ICMP-based tool that tests basic network reachability and round-trip time to another host.

17
New cards

netstat

Command that displays active TCP/UDP connections, listening ports, and routing statistics on a local computer.

18
New cards

nslookup

Diagnostic utility for querying DNS records such as A, AAAA, and MX to troubleshoot name-resolution issues.

19
New cards

net use

Windows command that maps or disconnects a network share to a local drive letter and can display user account info.

20
New cards

tracert

Windows utility that lists each router hop between a source and destination using ICMP Time-to-Live (TTL) values.

21
New cards

pathping

Hybrid Windows command that combines the functionality of ping and tracert, reporting latency and packet-loss statistics for every hop.

22
New cards

shutdown /s /t nn

Command that initiates a Windows shutdown after ‘nn’ seconds; /r restarts and /a aborts the countdown.

23
New cards

sfc /scannow

System File Checker command that verifies and repairs protected Windows system files.

24
New cards

chkdsk /f

Windows disk utility that fixes logical file-system errors; /r additionally locates and recovers bad sectors.

25
New cards

DiskPart

Powerful Windows CLI tool for advanced disk partitioning and volume management; misuse can erase data.

26
New cards

winver

Run-dialog command that opens the ‘About Windows’ box to display the exact OS version and build number.

27
New cards

Task Manager

Windows utility that shows real-time CPU, memory, disk, network, startup apps, and running processes; accessed with Ctrl-Shift-Esc.

28
New cards

Microsoft Management Console (MMC)

Framework (mmc.exe) that hosts administrative snap-ins such as Event Viewer, Device Manager, and Disk Management.

29
New cards

Event Viewer

MMC snap-in (eventvwr.msc) that records application, security, and system logs with error, warning, and information events.

30
New cards

Device Manager

Windows tool (devmgmt.msc) for viewing, updating, disabling, or uninstalling hardware drivers.

31
New cards

Disk Management

GUI utility (diskmgmt.msc) for creating, deleting, formatting, and resizing partitions and volumes.

32
New cards

Task Scheduler

Component (taskschd.msc) that automates running applications or scripts at predefined times or system events.

33
New cards

Resource Monitor

Advanced real-time monitoring tool (resmon.exe) that breaks down CPU, memory, disk, and network usage by process.

34
New cards

System Configuration (msconfig)

Utility to manage boot parameters, startup items, and Windows services for troubleshooting.

35
New cards

regedit

Registry Editor that lets administrators view and modify Windows Registry keys; mistakes can disable a system.

36
New cards

Windows Defender Firewall

Built-in Windows firewall that filters inbound and outbound traffic per network profile with customizable rules.

37
New cards

Dynamic Host Configuration Protocol (DHCP)

Service that automatically assigns IP addresses, subnet masks, gateways, and DNS servers to network clients.

38
New cards

Automatic Private IP Addressing (APIPA)

Fallback mechanism that self-assigns a 169.254.x.x address when DHCP is unavailable, allowing only local communication.

39
New cards

Loopback address

Special IPv4 address 127.0.0.1 used to test the local TCP/IP stack; always reachable.

40
New cards

Virtual Private Network (VPN)

Technology that creates an encrypted tunnel across a public network to securely connect remote users or sites.

41
New cards

Proxy Server

Intermediary device or software that forwards client requests, enforces policies, caches data, and can mask client IPs.

42
New cards

Shared Printer

Local printer configured in Windows to be accessible to other network users via SMB printing.

43
New cards

Universal Plug and Play (UPnP)

Protocol that allows devices to automatically discover and configure port-forwarding on routers; disabling increases security.

44
New cards

Screened Subnet (DMZ)

Isolated network segment that hosts public-facing services, providing an extra security layer between Internet and LAN.

45
New cards

Service Set Identifier (SSID)

Name assigned to a Wi-Fi network, broadcast in beacon frames so clients can identify and connect.

46
New cards

WPA3

Latest Wi-Fi security standard using GCMP encryption and SAE authentication to mitigate brute-force attacks.

47
New cards

Simultaneous Authentication of Equals (SAE)

WPA3 key-exchange protocol—aka the dragonfly handshake—that resists PSK brute-force by generating unique session keys.

48
New cards

Remote Authentication Dial-in User Service (RADIUS)

AAA protocol that centralizes user authentication, authorization, and accounting for network devices and VPNs.

49
New cards

TACACS+

Cisco-developed AAA protocol that separates authentication, authorization, and accounting and encrypts the entire payload.

50
New cards

Kerberos

Ticket-based network authentication protocol providing SSO and mutual authentication; core to Windows domains.

51
New cards

Multi-factor Authentication (MFA)

Login process requiring two or more of: something you know, have, are, do, or somewhere you are.

52
New cards

Malware

Umbrella term for malicious software like viruses, worms, Trojans, ransomware, spyware, and cryptominers.

53
New cards

Trojan Horse

Malware disguised as legitimate software to bypass security and deliver a payload without self-replication.

54
New cards

Rootkit

Stealth malware that modifies core OS files or kernel modules to hide processes and evade antivirus detection.

55
New cards

Ransomware

Malware that encrypts user data and demands payment, usually in cryptocurrency, for the decryption key.

56
New cards

Cryptominer

Malicious or gray-ware software that hijacks CPU/GPU resources to perform cryptocurrency mining without user consent.

57
New cards

Boot Sector Virus

Malware that infects the master boot record, loading before the OS and persisting across reinstalls unless eradicated.

58
New cards

Spyware

Software that secretly gathers user information, browsing habits, or credentials, often including keyloggers.

59
New cards

Keylogger

Program or hardware that records every keystroke to capture sensitive information such as passwords.

60
New cards

Windows Recovery Environment (WinRE)

Bootable troubleshooting environment providing tools like Startup Repair, Command Prompt, and System Restore.

61
New cards

Quarantine (Malware)

Isolation of infected files or systems to prevent malware spread during analysis and remediation.

62
New cards

System Restore

Windows feature that rolls system files and settings back to a previous restore point without affecting user data.

63
New cards

Incremental Backup

Backup type that copies only data changed since the last backup of any kind, requiring multiple sets to restore.

64
New cards

Differential Backup

Backup that stores all changes since the last full backup, requiring two sets (full + latest differential) to restore.

65
New cards

Grandfather-Father-Son (GFS)

Backup rotation scheme using daily (son), weekly (father), and monthly (grandfather) archives for long-term retention.

66
New cards

3-2-1 Backup Rule

Best practice of keeping 3 data copies on 2 different media with 1 copy stored offsite.

67
New cards

Uninterruptible Power Supply (UPS)

Device that provides temporary battery power and surge protection to keep equipment running during power interruptions.

68
New cards

Surge Suppressor

Protective device that diverts voltage spikes to ground, rated in joules and clamping voltage.

69
New cards

Material Safety Data Sheet (MSDS/SDS)

Document detailing handling, hazards, and disposal procedures for chemicals like toner, batteries, and solvents.

70
New cards

Chain of Custody

Documentation that tracks evidence handling to ensure integrity for legal or forensic purposes.

71
New cards

Payment Card Industry Data Security Standard (PCI DSS)

Mandatory security framework for organizations that process, store, or transmit credit-card information.

72
New cards

General Data Protection Regulation (GDPR)

EU law that grants individuals control over personal data and imposes strict privacy requirements on organizations.

73
New cards

Protected Health Information (PHI)

Individually identifiable medical data protected under regulations like HIPAA.

74
New cards

Acceptable Use Policy (AUP)

Document that defines how employees may use company assets such as networks, computers, and Internet access.

75
New cards

Change Management

Structured process for requesting, approving, testing, and documenting modifications to IT systems to minimize risk.

76
New cards

Sandbox Testing

Isolated environment where updates or software are evaluated without affecting production systems.

77
New cards

Rollback Plan

Predefined procedure to revert systems to their prior state if a change fails or causes issues.

78
New cards

Ticketing System

Help-desk tool for documenting, prioritizing, assigning, and tracking support requests from creation through resolution.

79
New cards

Asset Management

Process of inventorying and tracking hardware, software, and related details (location, warranty, owner).

80
New cards

Batch File (.bat)

Windows script containing command-line instructions executed sequentially by the Command Prompt interpreter.

81
New cards

PowerShell

Windows automation framework using cmdlets and scripts (.ps1) for advanced administration tasks.

82
New cards

Secure Shell (SSH)

Encrypted remote-console protocol operating on TCP port 22, replacing insecure Telnet connections.

83
New cards

Remote Monitoring and Management (RMM)

Platform used by MSPs to remotely monitor, patch, and control client systems and networks.

84
New cards

Microsoft Remote Assistance / Quick Assist

Built-in Windows tools that let a user invite a trusted technician to view or control their desktop over the Internet.

85
New cards

SSID Broadcasting

Access-point feature that announces the network name; disabling hides the SSID but does not secure the network.

86
New cards

Universal Plug and Play (UPnP)

Protocol letting internal devices automatically open ports on a router; best disabled to prevent unwanted exposure.

87
New cards

Screen Lock

Mobile or desktop security feature requiring PIN, password, biometrics, or pattern before granting access after idle.

88
New cards

Locator Application

Service (e.g., Find My) that uses GPS and network data to track, ring, or remotely wipe lost mobile devices.

89
New cards

Full-Device Encryption

Security setting that encrypts all storage (e.g., iOS default, Android’s File-Based Encryption) to protect data at rest.

90
New cards

Zero-day Attack

Exploit targeting a previously unknown vulnerability that has no official patch or public awareness.

91
New cards

On-Path Attack (Man-in-the-Middle)

Threat actor secretly intercepts and possibly alters traffic between two parties, e.g., via ARP poisoning.

92
New cards

Dictionary Attack

Password-cracking method that tries a list of common words and variants instead of exhaustive brute-force.

93
New cards

SQL Injection

Attack that inserts malicious SQL into input fields to manipulate or exfiltrate data from a database.

94
New cards

Cross-Site Scripting (XSS)

Web-app vulnerability allowing attackers to run malicious scripts in a user’s browser, either stored or reflected.

95
New cards

Ticket Escalation

Process of forwarding a support request to higher-tier or specialized staff when initial troubleshooting is insufficient.

96
New cards

User Account Control (UAC)

Windows security feature that prompts for elevated privileges when a task requires administrator rights.

97
New cards

BitLocker To Go

Extension of BitLocker that encrypts removable USB flash drives to protect portable data.

98
New cards

Quarantine (Security)

Isolation of a compromised user, device, or file to prevent a threat from spreading during investigation.

99
New cards

USB Endpoint Resources

Buffer allocations on a USB controller; exceeding available endpoints triggers “not enough controller resources” warnings.

100
New cards

Grandfather-Father-Son Rotation

Backup strategy retaining daily, weekly, and monthly archives to balance storage with restore points.