CompTIA A+ CORE 2 Flashcards

1
Q

Remote Authentication Dial-In User Service (RADIUS)

A

A networking protocol that provides AAA services for users accessing a network. It’s often used to authenticate users connecting through VPNs, wireless networks, or dial-up services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Terminal Access Control Access-Control System Plus (TACACS+)

A

A network protocol used for centralized authentication, authorization, and accounting (AAA) services, primarily for managing access to network devices (e.g., routers, switches).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Organizational Unit (OU)

A

A tool to organize a domain into smaller, manageable sections. You can give specific permissions to managers and administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active Directory

A

a directory service developed by Microsoft that provides centralized authentication, authorization, and directory services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Screened Subnet (DMZ)

A

Screened subnet is that some hosts are placed in a separate network segment with a different IP subnet address range than the rest of the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos

A

Kerberos is a system used on Windows networks to help users log in securely and easily. It allows a user to log in once and access multiple network services without having to re-enter their password each time (calledsingle sign-onor SSO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port Triggering

A

configure your router to open a specific port only when a device on your network requests it. Like opening the door when someone knocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port Forwarding

A

You configure your router to direct incoming traffic on a specific port to a particular device on your network. It’s like leaving a specific door open all the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

Malware hidden within an executable file that infects a system when the file is run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Boot Sector Virus

A

Infects the boot sector or partition table of a disk drive. It hijacks the bootloader to load itself to the memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan

A

Malware disguised as legitimate software, often embedded in an installer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worm

A

Self-replicating malware that spreads through system memory or network vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remote Access Trojan (RAT)/Backdoor

A

Malware designed to give authorized remote access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spyware

A

Alters browser settings like changing search providers, adding bookmarks, and enabling tracking cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Keylogger

A

Spyware that captures keystrokes to steal sensitive data like passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rootkit

A

Malware that gets privilege access (root level access) to a system and conceal its presence.

17
Q

Ransomware

A

Malware that obtains money by locking access to systems or encrypting data.

18
Q

Cryptominer

A

Malware that hijacks system’s resources for cryptocurrency mining.

19
Q

Command and Control (C2)

A

A computer server controlled by an attacker which acts as a central hub for malicious activity. It allows the attacker to communicate with and control infected devices on a network which are called bots or zombies.

20
Q

Fileless Malware

A

Malware that operates without installing traditional executable files. It can use legitimate scripting environments like PowerShell or JavaScript in PDFs to execute malicious code in memory.

21
Q

Secured Shell(SSH)

A

A protocol used to securely connect to another computer or sever over a network. You can have a secure connection even if internet connection is not safe. Can use it to run commands, transfer files, and manage computers. To connect, you need to provide a SSH key or password.

22
Q

End User License Agreement (EULA)

A

A legal contract between a software developer (or company) and the person/organization using the software.

23
Q

Computer Security Incident Response Team (CSIRT)

A

A group of experts responsible for handling and responding to cybersecurity incidents within an organization.

24
Q

Forensics Team

A

A team specialized in investigating and analyzing cybercrimes or security incidents by studying digital evidence like computer logs, files, or network activity.

25
Q

Degaussing

A

Hard disk is exposed to a powerful electromagnet that disrupts the magnetic pattern that stores data on the disk surface.

26
Q

Secure Erase (SE)

A

Performs zero-filling on hard disk drives and marks all blocks as empty on solid state drives (SSDs).

27
Q

Instant Secure Erase (ISE)/Crypto Erase

A

Utilizes self-encrypting drives (SEDs). The Media Encryption Key (MEK) encrypts all data. It works like a magic key that can instantly reset the lock and scramble all the documents inside, making them completely unreadable.

28
Q

Occupational Safety and Health Administration (OSHA)

A

emphasize proper safety practices during maintenance tasks.

29
Q

Standard Operating Procedure (SOP)

A

A set of step-by-step instructions created by organization to help employees carry out routine operations consistently and effectively.

30
Q

Material Safety Data Sheet (MSDS)

A

A document that provides detail information about a chemical substance including hazards, storage instructions, and first-aid measures.