CompTIA A+ CORE 2 Flashcards
Remote Authentication Dial-In User Service (RADIUS)
A networking protocol that provides AAA services for users accessing a network. It’s often used to authenticate users connecting through VPNs, wireless networks, or dial-up services.
Terminal Access Control Access-Control System Plus (TACACS+)
A network protocol used for centralized authentication, authorization, and accounting (AAA) services, primarily for managing access to network devices (e.g., routers, switches).
Organizational Unit (OU)
A tool to organize a domain into smaller, manageable sections. You can give specific permissions to managers and administrators
Active Directory
a directory service developed by Microsoft that provides centralized authentication, authorization, and directory services.
Screened Subnet (DMZ)
Screened subnet is that some hosts are placed in a separate network segment with a different IP subnet address range than the rest of the LAN.
Kerberos
Kerberos is a system used on Windows networks to help users log in securely and easily. It allows a user to log in once and access multiple network services without having to re-enter their password each time (calledsingle sign-onor SSO).
Port Triggering
configure your router to open a specific port only when a device on your network requests it. Like opening the door when someone knocks.
Port Forwarding
You configure your router to direct incoming traffic on a specific port to a particular device on your network. It’s like leaving a specific door open all the time.
Virus
Malware hidden within an executable file that infects a system when the file is run.
Boot Sector Virus
Infects the boot sector or partition table of a disk drive. It hijacks the bootloader to load itself to the memory.
Trojan
Malware disguised as legitimate software, often embedded in an installer.
Worm
Self-replicating malware that spreads through system memory or network vulnerabilities.
Remote Access Trojan (RAT)/Backdoor
Malware designed to give authorized remote access to a system.
Spyware
Alters browser settings like changing search providers, adding bookmarks, and enabling tracking cookies.
Keylogger
Spyware that captures keystrokes to steal sensitive data like passwords.