Brainscape
Find Flashcards
Make Flashcards
Why It Works
More
Educators
Businesses
Tutors & resellers
Content partnerships
Academy
About
Educators
Teachers & professors
Content partnerships
Tutors & resellers
Businesses
Employee training
Content partnerships
Tutors & resellers
Academy
About
Log In
Get Started
Brainscape's Knowledge Genome
TM
Browse over 1 million classes created by top students, professors, publishers, and experts.
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
See full index
QRS A+ Core 2
> pm images for d 3 > Flashcards
pm images for d 3 Flashcards
Study These Flashcards
1
Q
A
imag
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
QRS A+ Core 2
(24 decks)
3.0 Software Troubleshooting QRS
4.0 Operational Proceedures
1.1 Compare and contrast common operating system types and their purposes.
1.2 Compare and contrast features of Microsoft Windows versions- manual
1.3 Summarize general OS installation considerations and upgrade methods.
1.4 Given a scenario, use appropriate Microsoft command line tools.
1.5 1.5 Given a scenario, use Microsoft operating system features and tools.
1.6 Given a scenario, use Microsoft Windows Control Panel utilities.
1.7 Summarize application installation and configuration concepts.
1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop.
1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
2.1 Summarize the importance of physical security measures
2.2 - Explain logical security concepts
2.5 Compare and contrast social engineering, threats, and vulnerabilities.
2.3 Compare and contrast wireless security protocols and authentication methods.
2.8 2.8 Given a scenario, implement methods for securing mobile devices.
2.9 Given a Scenario, implement appropriate data destruction and disposal methods
2.10 Given a scenario, configure security on SOHO wireless and wired networks.
Glossary Core 2 Student Guide
Book
2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings.
2.7 Given a scenario, implement security best practices to secure a workstation.
pm images for d 3