compTIA A+ Exam Flashcards

studied byStudied by 8 people
0.0(0)
get a hint
hint

Motherboard

1 / 75

76 Terms

1

Motherboard

A component that connects all other components in a computer system, with different form factors and expansion buses.

New cards
2

Central processing unit (CPU)

Handles most calculations in a computer system, with multiple cores and cache levels.

New cards
3

Random Access Memory (RAM)

Memory modules with different types and channels, used for temporary storage of data.

New cards
4

Serial Advanced Technology Attachment (SATA)

A data connection for storage devices, with different revisions and form factors.

New cards
5

Hard disk drive (HDD)

Storage devices with different speeds and form factors.

New cards
6

Solid-state drive (SSD)

Storage devices with different communication interfaces and form factors.

New cards
7

Redundant Array of Independent/Inexpensive Disks (RAID)

Different RAID levels for data storage and fault tolerance.

New cards
8

Small Computer Systems Interface (SCSI)

Modern SCSI standards for storage devices.

New cards
9

IPS

In-Plane Switching, a display technology with a wider viewing angle.

New cards
10

TN

Twisted Nematic, a display technology.

New cards
11

Optical media

Different types of optical discs used for data storage.

New cards
12

Compact Disc (CD)

Optical discs with a capacity of 650-700 MB.

New cards
13

Digital video/versatile disc (DVD)

Optical discs with special formats and capacities.

New cards
14

Blu-ray disc (BD)

Optical discs for games and HD movies with higher capacities.

New cards
15

Laptop

Portable miniaturized versions of desktop computers with replaceable components.

New cards
16

Heat sink

A component used for cooling the CPU, with different cooling methods.

New cards
17

Sound card

A component for audio input and output in a computer system.

New cards
18

Video card

A component for video output, with different connector types and resolutions.

New cards
19

Image processing of laser printing

The steps involved in laser printing.

New cards
20

Printer configuration settings

Different settings for printer functions and quality.

New cards
21

BIOS/UEFI

Firmware that initializes components and boots the computer system.

New cards
22

Networking

Different types of networks and network security components.

New cards
23

Network Cables

Different types of cables used for networking.

New cards
24

Wiring Pattern

Different wiring patterns for network cables.

New cards
25

Connection Methods

Different connection methods for devices like Thunderbolt and USB.

New cards
26

Bluetooth

Short-range wireless technology for device connectivity.

New cards
27

Internet Protocol (IP)

Different versions and classes of IP addresses.

New cards
28

Wireless Ethernet

Different versions and data transmission rates of wireless networks.

New cards
29

Ports & Protocols

Common ports and protocols used in networking.

New cards
30

Virtualization and Cloud Computing

Different types of virtualization and cloud computing services.

New cards
31

Samba

File- and printer-sharing service

New cards
32

EOL

End-of-life

New cards
33

CDFS

Compact disc file system

New cards
34

NFS

Network file system

New cards
35

NTFS

New Technology File System

New cards
36

FAT32

File Allocation Table 32

New cards
37

ext3, ext4

Third and fourth extended file systems

New cards
38

APFS

Apple File System

New cards
39

ExFAT

Extensible File Allocation Table

New cards
40

Command Prompt

Command-line program

New cards
41

Control Panel

View/change settings

New cards
42

Registry

Store settings

New cards
43

Task Manager

Monitor and start/end processes

New cards
44

Device Manager

Monitor and (dis)connect devices

New cards
45

Remote Desktop software

View/control a remote computer

New cards
46

User State Migration Tool (USMT)

Move user data

New cards
47

System Restore

Revert to earlier system configuration ("restore point")

New cards
48

WPA

Wi-Fi Protected Access

New cards
49

TKIP

Temporal Key Integrity Protocol

New cards
50

AES

Advanced Encryption Standard

New cards
51

RADIUS

Remote Authentication Dial-In User Service

New cards
52

TACACS+

Terminal Access Controller Access-Control System

New cards
53

Phishing

Attack by email; single target

New cards
54

Vishing

Attack by telephone or voicemail

New cards
55

Shoulder surfing

Look over someone's shoulder, often with a recording device

New cards
56

Whaling

Phishing that targets high-ranking people, such as C-suite executives

New cards
57

Tailgating

Unauthorized entity follows authorized party into secured premises

New cards
58

Impersonation

Attacks using stolen credentials or personal information

New cards
59

Dumpster diving

Recover information from trash

New cards
60

Evil twin

Setting up a fake Wi-Fi access point, hoping people choose it over the genuine one

New cards
61

Denial of service (DoS)

Overwhelming a target using a single machine

New cards
62

Distributed denial of service (DDoS)

DoS using multiple machines

New cards
63

Zero-day attack

Vulnerability unbeknownst to developers

New cards
64

Spoofing

Gain unauthorized access by pretending to be authorized

New cards
65

On-path attack

Setting up Wi-Fi networks to trap unsuspecting users

New cards
66

Brute-force attack

Trying character combinations

New cards
67

Dictionary attack

Using lists of probable passwords

New cards
68

Insider threat

Potential for an insider to use their authorized access or understanding of an organization to harm that organization

New cards
69

SQL injection

Manipulating SQL to modify remote database (such as by using SQL map)

New cards
70

Cross-site scripting (XSS)

Injecting malicious scripts into normal websites

New cards
71

Virus

Runs on a computer without the user's knowledge

New cards
72

Worm

Replicates itself across a network

New cards
73

Trojan Horse

Performs useful functions superficially but runs malicious programs covertly

New cards
74

Spyware

Spies on a computer and records its activities

New cards
75

Rootkit

Gains administrator-level access to the system core undetected

New cards
76

Ransomware

Holds a computer hostage until the user pays

New cards

Explore top notes

note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 34 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 60 people
Updated ... ago
5.0 Stars(4)
note Note
studied byStudied by 66 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 131292 people
Updated ... ago
4.8 Stars(623)

Explore top flashcards

flashcards Flashcard62 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard77 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard357 terms
studied byStudied by 68 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard57 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard200 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard35 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard34 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard452 terms
studied byStudied by 5899 people
Updated ... ago
4.6 Stars(19)