Comptia a+ study guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

Use command xcopy

A technician wants to copy the continent of a fixed hard disk to a removable hard disk for back up

iCloud Keychain

Saves usernames and passwords, credit card information and Wi-Fi information and makes it available to every Apple device that you enable.

terminal

Terminal emulator command line interface for macOS

fingerprint scanner

The most common type of biometric security

Wi-Fi protected assets three(WPA3)

The most recent generation of Wi-Fi security. It aims to improve some security aspects that WPA two lacks, such as securing open networks, protecting simple, passwords, and simplifying device configuration.

sfc (System File Checker)

Verify the integrity, a protected system files, including device, driver files and replace incorrect versions of the files with correct versions

proxy server

A computer that acts as an intermediary between a computer and the Internet

format

A customer wants to convert a disk partition that is currently formatted as NTFS to FAT32

Degaussing

A data destruction method that uses a strong magnetic field to erase all data from a disk Drive

RADIUS

A de facto industry standard authentication protocol that provides for authentication to a centralized server

Windows Defender Firewall

A free and easy to use firewall for a Windows PC

Rainbow Table Attack

A massive database of precomputed password hashes

WLAN (Wireless Local Area Network)

A mobile broadband network that uses Wi-Fi connections

Dictionary

A network monitor detects a series of random words sent to a server as password attempts

Samba

A program that allows Linux systems to share files and printers with Windows systems over a Network

spotlight

A search feature in the macOS operating system that allows users to search the computer for files folders applications contacts and more

Zero-day

An attack targets a previously unknown vulnerability in a data processing application

Piggybacking or tailgating

An unauthorized user follows an authorized user into a restricted area.

Tailgating

Also known as piggybacking, is a means used to gain entry to areas protected by locked doors

REGEDIT

Edit the registry

Firewall filtering

IP filtering techniques

Route Filtering

IP filtering techniques

433

Port number for HTTPS

Security measure involves an inner door that opens only when outer door closes completely?

Access Control Vestibule

chmod command

Allows you to configure permissions in Linux

Windows EOL

Security updates are no longer received

File Explorer Options

Allows a user to customize the way in which windows file explorer works

Worm

A self-replicating program, typically designed as a network threat, that copies itself to network clients

Rootkit

Back door into a infected computer

Group Policy

Centralized Active Directory object management and configuration infrastructure

Performance Monitor

Check memory usage overtime

fingerprint scanner

Common type of biometric security

DMG file

Disk image file used on Apple computers

gpresult command

Displays resultant set a policy information for a remote user in computer

df (disk free space) command

Displays the amount of free disk space on a Linux file system

DDoS Attack

Distributed denial of service

Go to devices and printers, then devices

Enable Bluetooth in windows 10

Mobile device options should administrators enable to protect sensitive data on lost or stolen smartphones

Encryption of data-at-rest and remote wipe

Wired Equivalent Privacy (WEP)

Encrypts information packets as they are sent out from the access point or wireless network card using the RC4 stream cipher algorithm.

Wi-Fi Protected Access (WPA)

Encrypts information packets as they are sent out from the access point or wireless network card using the Temporel G integrity protocol (TKIP)

Wi-Fi protected access 2 (WPA2)

Encrypts information packets as they are sent out from the access point or wireless network card using the advanced encryption standard (AES) algorithm

Multitasking and Apple pencil support

Features exclusive to iPad OS when compared with iOS

APFS (Apple File System) and NTFS

File systems that support native encryption

The technician needs to ensure that these are applied to the clients. They want to avoid restarting the client computers.

Gpupdate

Organizational Unit

Hierarchical container that can hold Active Directory objects

Tailgating

I meant trap is most effective against which security threat?

Email filtering

IP filtering techniques

The hybrid sleep option is turned on

If the hibernate option is not available

The feature is turned off through system BIOS

If the hybrid option is not available

Checked the application's system requirements.

Insufficient disk space error when attempting to install an application on a computer that runs windows 10. What should the technician have done before starting the installation?

Network authentication protocol is used by Microsoft Active Directory

Kerberos

shell

Linux equivalent of the command prompt on the windows operating systems

Domain

Logical group of network objects stored in the same Active Directory database

chkdsk (CheckDisk)

Wants to verify that the hard disk on a windows 10 computer does not have any bad sectors

WWAN (Wireless Wide Area Network)

Mobile broadband Network for factory and warehouse sites

shoulder surfing

One employee tried to discover another employee password by watching them as they type it in

Chrome OS

Optimized for use with web apps

389

Port number Lightweight directory assess protocol(LDAP)

143

Port number for Internet, Mail access protocol (IMAP)

80

Port number for hypertext transfer protocol (HTTP)

22

Port number for secure shell (SSH)

gpupdate command

Refreshes group policy settings for both local in active directories

Magnetometer

Scan individuals enter and leaving the company's premises to detect if the person is care unauthorized objects.

What does Windows EOL mean?

Security updates are no longer recieved

UPnP (Universal Plug and Play)

Set of protocols and technologies, that enable devices to discover and connect to one another automatically.

Samba

Should be used on a Linux system to share files and printers with Windows systems over a net work

Spyware

Spyware is a type of malware that collects information and sends it to a third party

Windows 8.1 update

Supports an in place upgrade to windows 10

robocopy

Supports several options for filtering the files copied, including file attributes

Spoofing

Technicians discover that an unauthorized device is using another computer's IP address to access the network.

VPN

Technology for creating and maintaining a secure encrypted path across a less secure network

xcopy command

This command can copy all files, directories, and subdirectories to another disc all at once

chmod command

This command means change mode

Radio Frequency Identification (RFID)

This key fob is commonly used as an easy way to manage entry control

Eye

This part of the body is scanned when using a Retina Scanner

msinfo32.exe

To collect detailed information about the configuration of a computers hardware and software

Gpfixup command

To fix domain name, dependencies in group policy

Linux apt-get command

To manage packages on a system

A recovery partition

To return a computer to its original factory settings

Secedit

Update group policy settings, refresh policy , has been deprecated, and is no longer supported

DNS (Domain Name System)

Use the translate domain names into IP addresses

grep command

Used in conjunction with other commands, such as pipe (|) and sort to filter and manipulate command output

PXE (preboot execution environment)

Used in corporate environment to install new operating systems, or software on multiple machines without having to visit each one individually.

chmod command

Used to change the permissions of a file on a Linux operating system

Motion Sensors and Alarm Systems

Used to detect unauthorized entry to specific areas

cat command

Used to display the contents of a text file

TASKKILL command

Used to end, one or more processes running on a computer

sfc (System File Checker)

Used to scan for and correct corrupted system files

grep command

Used to search for text patterns and fouls or output from other commands

Badge reader

Used to verify a person's identity

Nestat -o command

Used to view the state of all TCP connections with each connections process ID (PID)

The combinations constitute multi factor authentication

Username, PKI certificate and password for private key

Windows end of life

What does Windows EOL mean?

4GB

What is the maximum amount of physical RAM that a 32 bit operating a system can address?

Press option, command, ESC simultaneously

What method can be used to force an app to quit on Mac OS?

Access Control List (ACL)

Where is information about file and folder permissions that are assigned to users and groups maintained on a windows system

Access Control List

Where is information about file and folder permissions that are assigned to users and groups maintained on a windows system?

RDP (Remote Desktop Protocol)

Which windows 10 pro and windows 10 enterprise feature provides a user with a graphical interface to connect to another computer over a net work?

Access Control Vestibule

Will prevent tailgating of an unauthorized person into a restricted area

How to uninstall Microsoft office on a windows 10 computer

Windows settings> apps and control panel> programs and features

System Restore

allows users to create point-in-time configuration snapshots that can be used to return a Windows machine to an early configuration?


Conjuntos de estudio relacionados

LAP: Can you relate? - Student Guide

View Set

Chapter 8 Intro To Business Study Guide

View Set

Chapter 27: Patient Safety and Quality

View Set

Database Concepts Test #1 chapter 1 & 2

View Set

LUOA English 12 Module 1-10 Taken

View Set