Comptia a+ study guide
Use command xcopy
A technician wants to copy the continent of a fixed hard disk to a removable hard disk for back up
iCloud Keychain
Saves usernames and passwords, credit card information and Wi-Fi information and makes it available to every Apple device that you enable.
terminal
Terminal emulator command line interface for macOS
fingerprint scanner
The most common type of biometric security
Wi-Fi protected assets three(WPA3)
The most recent generation of Wi-Fi security. It aims to improve some security aspects that WPA two lacks, such as securing open networks, protecting simple, passwords, and simplifying device configuration.
sfc (System File Checker)
Verify the integrity, a protected system files, including device, driver files and replace incorrect versions of the files with correct versions
proxy server
A computer that acts as an intermediary between a computer and the Internet
format
A customer wants to convert a disk partition that is currently formatted as NTFS to FAT32
Degaussing
A data destruction method that uses a strong magnetic field to erase all data from a disk Drive
RADIUS
A de facto industry standard authentication protocol that provides for authentication to a centralized server
Windows Defender Firewall
A free and easy to use firewall for a Windows PC
Rainbow Table Attack
A massive database of precomputed password hashes
WLAN (Wireless Local Area Network)
A mobile broadband network that uses Wi-Fi connections
Dictionary
A network monitor detects a series of random words sent to a server as password attempts
Samba
A program that allows Linux systems to share files and printers with Windows systems over a Network
spotlight
A search feature in the macOS operating system that allows users to search the computer for files folders applications contacts and more
Zero-day
An attack targets a previously unknown vulnerability in a data processing application
Piggybacking or tailgating
An unauthorized user follows an authorized user into a restricted area.
Tailgating
Also known as piggybacking, is a means used to gain entry to areas protected by locked doors
REGEDIT
Edit the registry
Firewall filtering
IP filtering techniques
Route Filtering
IP filtering techniques
433
Port number for HTTPS
Security measure involves an inner door that opens only when outer door closes completely?
Access Control Vestibule
chmod command
Allows you to configure permissions in Linux
Windows EOL
Security updates are no longer received
File Explorer Options
Allows a user to customize the way in which windows file explorer works
Worm
A self-replicating program, typically designed as a network threat, that copies itself to network clients
Rootkit
Back door into a infected computer
Group Policy
Centralized Active Directory object management and configuration infrastructure
Performance Monitor
Check memory usage overtime
fingerprint scanner
Common type of biometric security
DMG file
Disk image file used on Apple computers
gpresult command
Displays resultant set a policy information for a remote user in computer
df (disk free space) command
Displays the amount of free disk space on a Linux file system
DDoS Attack
Distributed denial of service
Go to devices and printers, then devices
Enable Bluetooth in windows 10
Mobile device options should administrators enable to protect sensitive data on lost or stolen smartphones
Encryption of data-at-rest and remote wipe
Wired Equivalent Privacy (WEP)
Encrypts information packets as they are sent out from the access point or wireless network card using the RC4 stream cipher algorithm.
Wi-Fi Protected Access (WPA)
Encrypts information packets as they are sent out from the access point or wireless network card using the Temporel G integrity protocol (TKIP)
Wi-Fi protected access 2 (WPA2)
Encrypts information packets as they are sent out from the access point or wireless network card using the advanced encryption standard (AES) algorithm
Multitasking and Apple pencil support
Features exclusive to iPad OS when compared with iOS
APFS (Apple File System) and NTFS
File systems that support native encryption
The technician needs to ensure that these are applied to the clients. They want to avoid restarting the client computers.
Gpupdate
Organizational Unit
Hierarchical container that can hold Active Directory objects
Tailgating
I meant trap is most effective against which security threat?
Email filtering
IP filtering techniques
The hybrid sleep option is turned on
If the hibernate option is not available
The feature is turned off through system BIOS
If the hybrid option is not available
Checked the application's system requirements.
Insufficient disk space error when attempting to install an application on a computer that runs windows 10. What should the technician have done before starting the installation?
Network authentication protocol is used by Microsoft Active Directory
Kerberos
shell
Linux equivalent of the command prompt on the windows operating systems
Domain
Logical group of network objects stored in the same Active Directory database
chkdsk (CheckDisk)
Wants to verify that the hard disk on a windows 10 computer does not have any bad sectors
WWAN (Wireless Wide Area Network)
Mobile broadband Network for factory and warehouse sites
shoulder surfing
One employee tried to discover another employee password by watching them as they type it in
Chrome OS
Optimized for use with web apps
389
Port number Lightweight directory assess protocol(LDAP)
143
Port number for Internet, Mail access protocol (IMAP)
80
Port number for hypertext transfer protocol (HTTP)
22
Port number for secure shell (SSH)
gpupdate command
Refreshes group policy settings for both local in active directories
Magnetometer
Scan individuals enter and leaving the company's premises to detect if the person is care unauthorized objects.
What does Windows EOL mean?
Security updates are no longer recieved
UPnP (Universal Plug and Play)
Set of protocols and technologies, that enable devices to discover and connect to one another automatically.
Samba
Should be used on a Linux system to share files and printers with Windows systems over a net work
Spyware
Spyware is a type of malware that collects information and sends it to a third party
Windows 8.1 update
Supports an in place upgrade to windows 10
robocopy
Supports several options for filtering the files copied, including file attributes
Spoofing
Technicians discover that an unauthorized device is using another computer's IP address to access the network.
VPN
Technology for creating and maintaining a secure encrypted path across a less secure network
xcopy command
This command can copy all files, directories, and subdirectories to another disc all at once
chmod command
This command means change mode
Radio Frequency Identification (RFID)
This key fob is commonly used as an easy way to manage entry control
Eye
This part of the body is scanned when using a Retina Scanner
msinfo32.exe
To collect detailed information about the configuration of a computers hardware and software
Gpfixup command
To fix domain name, dependencies in group policy
Linux apt-get command
To manage packages on a system
A recovery partition
To return a computer to its original factory settings
Secedit
Update group policy settings, refresh policy , has been deprecated, and is no longer supported
DNS (Domain Name System)
Use the translate domain names into IP addresses
grep command
Used in conjunction with other commands, such as pipe (|) and sort to filter and manipulate command output
PXE (preboot execution environment)
Used in corporate environment to install new operating systems, or software on multiple machines without having to visit each one individually.
chmod command
Used to change the permissions of a file on a Linux operating system
Motion Sensors and Alarm Systems
Used to detect unauthorized entry to specific areas
cat command
Used to display the contents of a text file
TASKKILL command
Used to end, one or more processes running on a computer
sfc (System File Checker)
Used to scan for and correct corrupted system files
grep command
Used to search for text patterns and fouls or output from other commands
Badge reader
Used to verify a person's identity
Nestat -o command
Used to view the state of all TCP connections with each connections process ID (PID)
The combinations constitute multi factor authentication
Username, PKI certificate and password for private key
Windows end of life
What does Windows EOL mean?
4GB
What is the maximum amount of physical RAM that a 32 bit operating a system can address?
Press option, command, ESC simultaneously
What method can be used to force an app to quit on Mac OS?
Access Control List (ACL)
Where is information about file and folder permissions that are assigned to users and groups maintained on a windows system
Access Control List
Where is information about file and folder permissions that are assigned to users and groups maintained on a windows system?
RDP (Remote Desktop Protocol)
Which windows 10 pro and windows 10 enterprise feature provides a user with a graphical interface to connect to another computer over a net work?
Access Control Vestibule
Will prevent tailgating of an unauthorized person into a restricted area
How to uninstall Microsoft office on a windows 10 computer
Windows settings> apps and control panel> programs and features
System Restore
allows users to create point-in-time configuration snapshots that can be used to return a Windows machine to an early configuration?