CompTIA A+ Core 2 (220-1102) (personal)

0.0(0)
studied byStudied by 2 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/90

flashcard set

Earn XP

Description and Tags

Personal flash cards based on what I got wrong and need to study more

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

91 Terms

1
New cards

Windows 11 Minimum Requirements

  • 64-bit only

  • dual-core 1 GHz processor

  • 4 GB of RAM.

2
New cards

Full backup

  • Copies all selected data

  • Longest time to back up
    fastest restore

  • archive bit reset.

3
New cards

Incremental Backup

  • Copies only data changed since last backup

  • fastest backup

  • slowest restore

  • archive bit reset.

4
New cards

Differential Backup

  • Copies data changed since last full backup

  • longer backups each day

  • faster restore

  • archive bit not reset.

5
New cards

Synthetic Full Backup

Creates a new full backup from previous full + incrementals, without re-copying data from source.

6
New cards

Grandfather–Father–Son Backup

  • Rotates 3 backup sets

  • Daily = son

  • Weekly = father

  • Monthly = grandfather for long-term data retention.

7
New cards

3-2-1 Backup Rule

  • Keep 3 copies of data,

  • on 2 media types,

  • with 1 copy stored off-site for disaster recovery.

8
New cards

cat command

Displays, combines, or creates text files in Linux/Unix. Can output file contents to screen or another file.

9
New cards

cd . and cd ..

  • cd . stays in current directory

  • cd .. moves up one directory level

  • cd ~ return’s to home directory on Linux

10
New cards

Credential Manager

  • Stores and manages saved credentials (usernames, passwords, certificates) for websites, apps, and network resources in Windows.

11
New cards

Partitioning

  • Splits a disk into logical sections

  • Each partition can have its own file system (NTFS, FAT32, exFAT, etc.)

  • Can’t store data until formatted

12
New cards

Formatting

  • Prepares a partition for use (data storage) by applying a file system

  • Erases existing data during the process

13
New cards

Visual Basic Script (.vbs)

  • Windows-only scripting, mainly for admin tasks.

  • Syntax: Set var = value (uses Set for objects).

  • Can automate via Windows Script Host.

14
New cards

Basic Character Data Types

  • Character – 1 letter/number/symbol

  • String – Sequence of characters (e.g., "Hello")

  • Integer – Whole number (positive/negative)

  • Float/Double – Decimal number

  • Boolean – True/False

15
New cards

PII

  • Data that identifies a person (e.g., name, SSN, address, phone, email, DOB).

  • Must be handled securely.

16
New cards

PHI

  • Medical PII protected under HIPAA (e.g., records, labs, insurance).

  • Must be securely stored and transmitted.

17
New cards

Python (.py)

Used in cross-platform scripting.
Syntax: var = 4, print(var)

18
New cards

Script Types

  • Batch (Windows)

  • PowerShell (Windows)

  • VBS (Windows

  • Bash (Linux/macOS)

  • JavaScript (Neutral)

  • Python (Neutral)

19
New cards

Batch (.bat/.cmd):

  • Uses set

  • No $ in variables

  • Windows-only

20
New cards

PowerShell (.ps1)

  • Variables start with $

  • Cmdlets use verb-noun format: Get-Process

  • Admin tasks on Windows

21
New cards

Bash (.sh)

  • Variables: var=4 (no $ when assigning)

  • $var used when referencing

  • Runs on Linux/macOS

22
New cards

JavaScript

  • let, var, or const

  • Ends lines with ;

  • Used in web dev, not system admin

23
New cards

Hard Reset vs Soft Reset

  • Soft reset: Restart OS without cutting power (for unresponsive apps)

  • Hard reset: Force power cycle (for frozen/unresponsive system)

24
New cards

ARP Poisoning Mitigation

  • Can involve IP spoofing but less common in ARP

  • Mitigation: Static ARP, VLANs, DAI (Dynamic ARP Inspection)

25
New cards

Change Documentation (Written Record of Completed or Approved Change)

Contains:

  • Description

  • Purpose

  • Date/time

  • Approval

  • Affected systems

  • Rollback plan

  • Who made Change

26
New cards

Change Documentation Does NOT Include

Belong in Change Management Process:

  • Risk analysis

  • business justification

  • planning steps

  • Detailed Implementation steps

27
New cards

Physical Network Diagram

  • Shows actual hardware (routers, switches, cables, servers) and physical layout.

  • Used for installation and troubleshooting.

28
New cards

Logical Network Diagram

  • Shows IP addresses, subnets, VLANs, and data flow (not physical layout).

  • Used to understand traffic and segmentation.

29
New cards

Disk-to-Disk Backup

Backup to another local/network hard drive.

  • Fastest backup & recovery

  • Susceptible to same-site disasters

30
New cards

Disk-to-Tape Backup

Backup Method

  • Long-term storage, durable, cost-effective

  • Slower recovery, sequential access

31
New cards

Disk-to-Cloud Backup

Backup Method

  • Offsite, scalable, automated

  • Slowest recovery (network-dependent), subscription cost

32
New cards

Tape Backup – Pros & Cons

  • Cheap for large data sets

  • Good for archiving

  • Slow access (must spin/scan tape)

  • Physical handling risks

33
New cards

Cloud Backup – Pros & Cons

  • Accessible anywhere, disaster-proof

  • Easy automation/scheduling

  • Bandwidth-dependent

  • May cost more over time

34
New cards

Effective Permissions

  • Access = MOST RESTRICTIVE between NTFS and Share permissions (when accessing over network)

  • NTFS still limits even if share has more permissions

35
New cards

Multiple Group Permissions

  • User in multiple groups gets most permissive permission from all group memberships.

36
New cards

/etc/passwd

  • Linux file storing user account info (username, UID, home dir, shell)

  • Not actual passwords

37
New cards

Token (Authentication)

  • Generates temporary code valid for one session or short time

  • Used in MFA (e.g., TOTP apps, RSA key fobs).

38
New cards

Certificate (Authentication)

  • Digital credential stored on a device; used to verify identity

  • Not limited to one session or short time window

39
New cards

Preemptive Multitasking

  • OS controls CPU time

  • Assigns time slices to tasks

  • Can interrupt tasks

  • Used in modern OSes

40
New cards

Cooperative Multitasking

Tasks control CPU time; must voluntarily yield control to others. (Less stable)

41
New cards

Windows Boot Process

  1. POST

  2. Bootloader (boot manager)

  3. Winload.exe (OS loader)

  4. Kernel Initialization

  5. Logon

42
New cards

Bootloader step in Windows boot process

Bootmgr; loads from system partition, selects OS, starts winload.exe (OS Loader).

43
New cards

BCD

Boot Configuration Data; contains boot settings and OS selection list/info.

44
New cards

Winload.exe step in boot process

Loads Windows kernel (ntoskrnl.exe), HAL, and essential drivers.

45
New cards

Kernel initialization step in boot process

Starts ntoskrnl.exe; initializes core services and hardware abstraction layer (HAL).

46
New cards

Logon step in boot process

User authentication via winlogon.exe.

47
New cards

POST Step in Boot Process

Power-On Self-Test

BIOS/UEFI checks CPU, memory, and other hardware before OS boot.

48
New cards

Sensitive Information Handling

  • PII (Personally Identifiable Information):
    Info that can identify a person, e.g., name, SSN, address, phone, email, DOB.

  • PHI (Protected Health Information):
    Medical PII protected under HIPAA (e.g., medical records, lab results, insurance info). Must be securely stored and transmitted.

49
New cards

Fire Extinguisher Classes

  • A – Ordinary combustibles (wood, paper, cloth)

  • B – Flammable liquids (gasoline, oil)

  • C – Electrical fires (computers, wiring)
      → Use CO₂ or dry chemical (non-conductive)

Don’t use water on Class C

50
New cards

GDPR

  • EU law protecting personal data & privacy of EU citizens

  • Applies to organizations handling EU customer data

51
New cards

HIPAA

  • U.S. law protecting health info (PHI)

  • Applies to healthcare and IT systems managing patient data

52
New cards

PCI DSS

  • Industry standard (not a law) for protecting payment card data

  • Used in retail, e-commerce, or anywhere cards are processed

53
New cards

EULA

  • End User License Agreement

  • Legal contract outlining how software can be used

54
New cards

Software Licensing

  • Defines software usage rights

  • Includes personal, enterprise, open source, etc.

55
New cards

DRM

  • Digital Rights Management

  • Prevents unauthorized use, copying, or distribution of media/software

56
New cards

WPA3

  • Replaces WPA2; uses SAE (not PSK)

  • Prevents offline dictionary attacks

  • Encrypts open Wi-Fi networks (Enhanced Open)

  • Stronger encryption than WPA2

57
New cards

Primary Partition

  • Main MBR partition for OS or data

  • Max 4 per disk (3 if extended used)

  • One must be active to boot OS

  • BIOS-accessible at startup

58
New cards

Extended Partition

  • Special container on MBR disks

  • Only stores logical partitions, up to 23

  • Only 1 type per disk.

  • Used to bypass 4-partition limit

59
New cards

Logical Partition

  • Sub-partition inside extended partition

  • Not bootable via BIOS, but OS can load from it

Used for: storage or secondary OS

60
New cards
61
New cards

On-Access Scan (Real-Time Scan)

  • Scans files as they are opened, saved, or executed.

  • Best for continuous, real-time protection.

62
New cards

Scheduled Scans (Daily/Weekly)

  • Scans all files on a set schedule.

  • Daily: For high-risk environments.

  • Weekly: For lower-risk or performance-sensitive systems.

63
New cards

Safe Mode Scan

  • Scan performed while booted into Safe Mode.

  • Best for removing persistent malware that hides during normal operation.

64
New cards

Best practices to secure forward-facing to the internet servers and services

  • Place in screened subnet/DMZ instead of internal trusted portion

  • Block unused ports on switch, router, & firewall

65
New cards

Security Group (OBJ 3.2)

  • Group of users for assigning permissions

  • More efficient than per-user assignment

  • Controls access to shares and network resources

66
New cards

Group Policy (OBJ 3.2)

  • Centralized management of user/computer settings via Active Directory.

  • Enforces consistent config and security across systems.

67
New cards

7 Steps of Malware Removal (OBJ 3.3)

  1. Identify/verify

  2. Quarantine

  3. Disable Restore

  4. Remediate

  5. Update/Schedule Scan

  6. Enable Restore

  7. Educate

68
New cards

Windows Update Service (OBJ 3.1)

  • Security patches

  • Bug fixes

  • Driver updates

  • New features

69
New cards

Linux Octal Notation (OBJ 2.6)

  • R (Read-only) = 4

  • W (Write) = 2

  • X (Execute) = 1

  • 3 groups (Owner | Group | Others) → each gets a digit

  • Add values per group

  • Combine group digits for full number

  • e.g. 7 = rwx, 6 = rw-, 5 = r-x → Result: 765

70
New cards

How to repair boot sector (OBJ 3.1)

use "bootrec /fixboot" command and reboot computer

71
New cards

“bootrec /fixmbr” command (OBJ 3.1)

  • Rewrites MBR (not partition table) to fix corruption

  • Doesn’t affect partitions or OS

  • Use when:
     • System won’t boot
     • MBR is damaged

72
New cards

"bootrec /rebuildbcd" command (OBJ 3.1)

Adds missing Windows installations to the Boot Configuration Database (BCD)

73
New cards

diskpart command (OBJ 3.1)

  • Windows command

  • Used to view, create, delete, mark, and modify a computer's disk partitions

74
New cards

What to do when a Windows service fails to start (OBJ 3.1)

  • Reboot into Safe Mode

  • non-Microsoft services or Drivers can interfere with System Services

75
New cards

APK file

  • Android Package Kit

  • Used by Android operating system

  • Used to distribute and install apps

  • Compressed archive

76
New cards

IPA file

  • iOS App Store Package

  • Used on Apple devices

  • Compressed archive

  • Used to distribute and install app store apps

77
New cards

Microsoft Workgroup network model

  • Peer-to-peer network model

  • Computers are connected together for access to shared resources for organizational purposes.

78
New cards

Microsoft Domain Network Model

  • Uses a client/server network model

  • Groups computers together for security and to centralize administration

  • Members have access to a central user account database so that users can log on to any computer within the network

79
New cards

chkdsk command

  • Checks file system & metadata for logical/physical errors

  • No parameters = read-only
      • /f: fix errors
      • /r: find bad sectors, recover data (implies /f)

80
New cards

ping command

  • Tests IP connectivity via ICMP Echo Request

    • Measures round-trip time

  • If IP works but hostname fails → DNS issue

81
New cards

netstat command

  • Displays active connections, listening ports, and protocol stats.

  • Used to detect open or suspicious network activity.

82
New cards

nslookup command

  • Queries DNS servers to find IP-to-name or name-to-IP

  • Useful for troubleshooting DNS resolution issues

83
New cards

tracert command

  • Shows the path (hops) packets take to reach a destination.

  • Identifies each router along the route and measures latency to each hop.

  • Helps troubleshoot network routing and latency issues.

84
New cards

Minimum requirements for Windows 10

32-bit:

  • 1 GHz processor

  • 1 GB of RAM.

64-bit:

  • 1 GHz processor

  • 2 GB of RAM.

85
New cards

Cross-Site Scripting (XSS) Definition

  • Injects malicious scripts into trusted websites.

  • Runs in victim’s browser → steals cookies, sessions, or data.

86
New cards

Zero-Day Attack

  • Exploits unknown software vulnerability

  • No patch available

  • High risk—bypasses standard security protections.

87
New cards

SQL Injection

  • Attacker inserts malicious type of commands into input fields.

  • Can access, modify, or delete database data.

  • Common in poorly secured web applications.

  • Mitigation: Input validation and parameterized queries.

88
New cards

On-Path Attack (Man-in-the-Middle)

  • Attacker secretly intercepts or alters communication between two parties

  • Can capture sensitive info (e.g passwords, financial data)

89
New cards

ARP Poisoning (ARP Spoofing)

  • Attacker sends fake ARP replies to map their MAC to a real IP

  • Redirects LAN traffic thru attacker (On-Path).

90
New cards

IP Spoofing

  • Forwards packets with a forged source IP address.

  • Hides sender identity or impersonates another device.

  • Often used in:

    • On-Path attacks

    • DoS/DDoS attacks

91
New cards

Change Management (Change Approval Process)

  • Formal process to approve & document IT changes

  • Change Board Reviews:

    • Purpose

    • Scope

    • Affected systems/impact

    • Risk analysis

    • Proposed date/time (documented after approval)