3.3 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Unofficial application stores

Platforms where users can download apps not vetted by official developers, increasing risks of malware and data breaches.

2
New cards

Developer mode

Enables developer-specific settings for mobile devices, such as USB debugging and memory statistics.

3
New cards

Rooting

The process of gaining root access to the core of an Android OS, allowing modification of files and system settings.

4
New cards

Jailbreaking

The process of removing software restrictions imposed by Apple on iOS and related devices.

5
New cards

Application spoofing

Installation of apps that appear legitimate but are actually malicious; always verify the source.

6
New cards

High network traffic

Refers to higher than normal network use, which may indicate problems or malware.

7
New cards

Data-usage limit notification

Alerts users when they approach or exceed their data cap, potentially leading to reduced speeds or additional charges.

8
New cards

Limited/no internet connectivity

Occurs when a device cannot establish a stable connection to the network, often due to router or ISP issues.

9
New cards

High number of ads

Large number of advertisements - a symptom of potential malware; running an anti-malware utility can help remove the source.

10
New cards

Fake security warnings

Legitimate-looking alerts that trick users into installing additional malware; users should avoid downloading prompted software.

11
New cards

Unexpected application behavior

Manifestations include crashing, slow performance, or unusual error messages; updating or reinstalling the app is recommended.

12
New cards

Leaked personal files/data

Loss of data that indicates potential security breaches; remediation involves performing scans, factory resets, and changing passwords.