1/47
Flashcards covering key topics from the CompTIA A+ Core 2 (220-1102) Study Guide, focusing on operating systems, security, troubleshooting, and operational procedures.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Clean Install
Formats the disk and installs the operating system from scratch.
Upgrade (OS)
Keeps user files and applications while installing a newer operating system version.
Unattended Install
Uses a pre-configured answer file to automate the installation process.
Image Deployment
Used in enterprise settings for rapid operating system rollout.
MBR (Master Boot Record)
Supports up to 2TB drives and 4 primary partitions.
GPT (GUID Partition Table)
Supports disks over 2TB and 128 partitions on Windows.
FAT32
Legacy file system with a 4GB file size limit.
exFAT
File system with no file size limit, ideal for flash drives.
NTFS
File system used by Windows, supporting permissions, encryption, and journaling.
sfc /scannow
Command to fix system files.
chkdsk
Command to check and repair drive errors.
diskpart
Advanced partitioning tool.
robocopy
High-performance file copy tool with retry options.
Windows Firewall
Filters incoming and outgoing network traffic.
Remote Desktop Protocol (RDP)
Allows remote access to a computer for support and remote work.
User Account Control (UAC)
Prevents unauthorized changes to the system.
Task Manager
Manages applications and processes.
Disk Management
Resizes, formats, and configures partitions.
Spotlight (macOS)
Search tool in macOS.
Keychain (macOS)
Password manager in macOS.
Force Quit (macOS)
Tool to terminate unresponsive applications in macOS.
Terminal (macOS/Linux)
Command-line interface.
ls (Linux)
Command to list files and directories.
cd (Linux)
Command to change the current directory.
chmod (Linux)
Command to change file permissions.
sudo (Linux)
Command to gain administrative access.
apt (Linux)
Package manager for Debian-based systems.
yum (Linux)
Package manager for RedHat-based systems.
Virus
Type of malware that requires user action to spread.
Worm
Type of malware that spreads on its own.
Trojan
Type of malware that appears legitimate but is malicious.
Ransomware
Type of malware that encrypts files for ransom.
Rootkit
Type of malware that hides malicious processes.
Phishing
Generic email scams to deceive users.
Spear Phishing
Targeted email attacks to deceive users.
Shoulder Surfing
Watching someone type to steal information.
Tailgating
Gaining physical access by following someone without authorization.
Multi-Factor Authentication (MFA)
Combines something you know, have, and are for authentication.
VPN (Virtual Private Network)
Encrypts internet traffic, especially for remote workers.
Proxy Server
Mediator between internal users and the internet.
Safe Mode
Boots with minimal drivers for troubleshooting.
Event Viewer
Diagnose logs and errors.
System Restore
Roll back system files to a previous state.
WinRE (Windows Recovery Environment)
Access startup repair and command line tools.
Full Backup
Backup of all data.
Incremental Backup
Backup of changes since the last backup.
Differential Backup
Backup of changes since the last full backup.
ESD Protection
Anti-static wrist straps, mats, grounded equipment.