CompTIA A+ CORE 2 Flashcards
Remote Authentication Dial-In User Service (RADIUS)
A networking protocol that provides AAA services for users accessing a network. It’s often used to authenticate users connecting through VPNs, wireless networks, or dial-up services.
Terminal Access Control Access-Control System Plus (TACACS+)
A network protocol used for centralized authentication, authorization, and accounting (AAA) services, primarily for managing access to network devices (e.g., routers, switches).
Organizational Unit (OU)
A tool to organize a domain into smaller, manageable sections. You can give specific permissions to managers and administrators
Active Directory
a directory service developed by Microsoft that provides centralized authentication, authorization, and directory services.
Screened Subnet (DMZ)
Screened subnet is that some hosts are placed in a separate network segment with a different IP subnet address range than the rest of the LAN.
Kerberos
Kerberos is a system used on Windows networks to help users log in securely and easily. It allows a user to log in once and access multiple network services without having to re-enter their password each time (calledsingle sign-onor SSO).
Port Triggering
configure your router to open a specific port only when a device on your network requests it. Like opening the door when someone knocks.
Port Forwarding
You configure your router to direct incoming traffic on a specific port to a particular device on your network. It’s like leaving a specific door open all the time.
Virus
Malware hidden within an executable file that infects a system when the file is run.
Boot Sector Virus
Infects the boot sector or partition table of a disk drive. It hijacks the bootloader to load itself to the memory.
Trojan
Malware disguised as legitimate software, often embedded in an installer.
Worm
Self-replicating malware that spreads through system memory or network vulnerabilities.
Remote Access Trojan (RAT)/Backdoor
Malware designed to give authorized remote access to a system.
Spyware
Alters browser settings like changing search providers, adding bookmarks, and enabling tracking cookies.
Keylogger
Spyware that captures keystrokes to steal sensitive data like passwords.
Rootkit
Malware that gets privilege access (root level access) to a system and conceal its presence.
Ransomware
Malware that obtains money by locking access to systems or encrypting data.
Cryptominer
Malware that hijacks system’s resources for cryptocurrency mining.
Command and Control (C2)
A computer server controlled by an attacker which acts as a central hub for malicious activity. It allows the attacker to communicate with and control infected devices on a network which are called bots or zombies.
Fileless Malware
Malware that operates without installing traditional executable files. It can use legitimate scripting environments like PowerShell or JavaScript in PDFs to execute malicious code in memory.
Secured Shell(SSH)
A protocol used to securely connect to another computer or sever over a network. You can have a secure connection even if internet connection is not safe. Can use it to run commands, transfer files, and manage computers. To connect, you need to provide a SSH key or password.
End User License Agreement (EULA)
A legal contract between a software developer (or company) and the person/organization using the software.
Computer Security Incident Response Team (CSIRT)
A group of experts responsible for handling and responding to cybersecurity incidents within an organization.
Forensics Team
A team specialized in investigating and analyzing cybercrimes or security incidents by studying digital evidence like computer logs, files, or network activity.
Degaussing
Hard disk is exposed to a powerful electromagnet that disrupts the magnetic pattern that stores data on the disk surface.
Secure Erase (SE)
Performs zero-filling on hard disk drives and marks all blocks as empty on solid state drives (SSDs).
Instant Secure Erase (ISE)/Crypto Erase
Utilizes self-encrypting drives (SEDs). The Media Encryption Key (MEK) encrypts all data. It works like a magic key that can instantly reset the lock and scramble all the documents inside, making them completely unreadable.
Occupational Safety and Health Administration (OSHA)
emphasize proper safety practices during maintenance tasks.
Standard Operating Procedure (SOP)
A set of step-by-step instructions created by organization to help employees carry out routine operations consistently and effectively.
Material Safety Data Sheet (MSDS)
A document that provides detail information about a chemical substance including hazards, storage instructions, and first-aid measures.