CompTIA A+ (220-1202) glossary
Terms selected for CompTIA A+ (220-1202) based on common objective language and practice focus.
MDM
Mobile Device Management used to enforce policy on mobile endpoints.
Read full term ->TPM
Trusted Platform Module for secure key storage and attestation.
Read full term ->Troubleshooting Methodology
Structured process to identify, test, fix, verify, and document issues.
Read full term ->UEFI
Modern firmware standard replacing legacy BIOS with expanded capabilities.
Read full term ->Acceptable Use Policy (AUP)
Policy that defines permitted and prohibited use of company systems and data.
Read full term ->Access Control List (ACL)
A list of permissions attached to an object that specifies which users or system processes can access it and what operations they can perform.
Read full term ->Account Disable
Administrative action that blocks sign-in without deleting the user account.
Read full term ->Active Directory
Microsoft directory service for centralized identity and policy management.
Read full term ->AES
Advanced Encryption Standard used to protect data confidentiality.
Read full term ->Anti-malware
Security software designed to detect, block, and remove malicious code.
Read full term ->Application Error Resolution
The process of diagnosing and fixing problems that prevent an application from functioning correctly.
Read full term ->Authentication
Process of verifying a user or system identity.
Read full term ->Authorization
Process of granting permissions after identity is authenticated.
Read full term ->Backup Rotation
Planned schedule for cycling backup media or backup sets over time.
Read full term ->Bash
Common Linux shell used for command execution and scripting.
Read full term ->BitLocker
Windows feature that encrypts drives to protect data at rest.
Read full term ->Blue Screen of Death (BSOD)
Critical Windows stop error screen caused by severe system failure.
Read full term ->bootrec
Windows recovery command-line utility for repairing boot records.
Read full term ->Brute-force Attack
Attack method that repeatedly attempts many credential combinations.
Read full term ->Change Management
A systematic approach to dealing with the transition or transformation of an organization's goals, processes, or technologies.
Read full term ->chkdsk
Windows utility that checks file system integrity and disk errors.
Read full term ->Command Prompt
Windows command-line interface used for administration and troubleshooting.
Read full term ->Continuous Backup
Backup approach that captures data changes frequently or in near real time.
Read full term ->Data Encryption
Data encryption involves converting data into a coded format to prevent unauthorized access and ensure confidentiality.
Read full term ->Differential Backup
Backup containing all changes since the most recent full backup.
Read full term ->Disk Cleanup
Windows utility that removes temporary and unnecessary files.
Read full term ->Disk Management
Windows tool for partitioning, formatting, and managing storage volumes.
Read full term ->Documentation Best Practices
Guidelines for creating and maintaining accurate and comprehensive records of system configurations and changes.
Read full term ->Domain Join
Process of enrolling a device into a directory-managed domain.
Read full term ->EDR
Endpoint Detection and Response platform for endpoint telemetry and threat response.
Read full term ->Encryption Protocols
Encryption protocols secure data by converting it into a coded format, preventing unauthorized access during transmission.
Read full term ->exFAT
File system optimized for flash storage and cross-platform compatibility.
Read full term ->FAT32
Legacy file system with broad compatibility but file size limitations.
Read full term ->File Permissions
File permissions in Linux determine the access level users have to files and directories, including read, write, and execute rights.
Read full term ->File System Management
The process of organizing, storing, and accessing files on a computer's storage devices using a file system.
Read full term ->Full Backup
A complete copy of all selected data at a point in time.
Read full term ->GPT
GUID Partition Table format supporting larger disks and modern boot workflows.
Read full term ->gpupdate
Command-line utility that refreshes Group Policy settings.
Read full term ->Group Policy
Windows policy framework for centralized configuration and security controls.
Read full term ->GUI
Graphical user interface enabling interaction via windows, icons, and menus.
Read full term ->Host Firewall
Software firewall running on an endpoint to filter inbound and outbound traffic.
Read full term ->Incident Response
Incident response is the process of identifying, managing, and mitigating security incidents to minimize their impact on an organization.
Read full term ->Incremental Backup
Backup containing changes since the most recent backup of any type.
Read full term ->Least Privilege
A security principle that restricts user access rights to the minimum necessary to perform their job functions.
Read full term ->Linux Package Manager
A tool used to install, update, and remove software packages in Linux operating systems.
Read full term ->Linux Shell
Command interpreter used to run Linux commands and scripts.
Read full term ->Local Security Policy
Windows settings that define local authentication and security behavior.
Read full term ->macOS Configuration
The process of setting preferences and system settings on a macOS device to optimize performance and usability.
Read full term ->Malware Detection
The process of identifying and mitigating malicious software that can harm a computer system.
Read full term ->Malware Quarantine
Isolation state where suspicious files are blocked from execution pending analysis.
Read full term ->MBR
Master Boot Record partitioning format used by legacy BIOS systems.
Read full term ->Multi-Factor Authentication (MFA)
MFA is a security process that requires users to provide multiple forms of identification before granting access to resources.
Read full term ->Mobile Connectivity Troubleshooting
Identifying and resolving issues that affect a mobile device's ability to connect to networks and services.
Read full term ->Mobile OS Upgrade
The process of updating the operating system on a mobile device to a newer version to improve features and security.
Read full term ->NTFS
Windows file system supporting permissions, encryption, and journaling.
Read full term ->Operating System
Core software managing hardware resources and providing services to applications.
Read full term ->OS Troubleshooting
The process of diagnosing and resolving issues within an operating system to restore normal functionality.
Read full term ->OS Updates and Patches
Software updates provided by the operating system manufacturer to fix bugs, close security vulnerabilities, and enhance functionality.
Read full term ->Password Manager
Tool that securely stores and generates complex credentials.
Read full term ->Patch Management
Patch management is the process of acquiring, testing, and installing patches to update software and fix vulnerabilities.
Read full term ->Phishing
A cyber attack method where attackers impersonate legitimate entities to trick individuals into providing sensitive information.
Read full term ->Principle of Least Functionality
Security approach that disables unnecessary services, ports, and software.
Read full term ->Professional Communication
The practice of effectively exchanging information with colleagues and clients in a business environment.
Read full term ->Ransomware
A type of malicious software that encrypts a victim's data and demands payment for the decryption key.
Read full term ->RDP
Remote Desktop Protocol for remote graphical access to Windows systems.
Read full term ->Recovery Process
Steps taken to restore a system or data to a previous state after a failure or data loss incident.
Read full term ->Restore Point
Saved Windows system state used to roll back problematic changes.
Read full term ->Safe Mode
Diagnostic startup mode loading minimal drivers and services.
Read full term ->Safety Protocols
Procedures and guidelines designed to ensure the physical safety of individuals working with computer hardware and systems.
Read full term ->sfc
System File Checker utility that verifies and repairs Windows system files.
Read full term ->Single Sign-On (SSO)
Authentication model allowing users to access multiple services with one login session.
Read full term ->Social Engineering
Manipulation techniques that exploit human psychology to trick individuals into revealing sensitive information or performing insecure actions.
Read full term ->Task Manager
Windows tool for viewing processes, performance, and startup applications.
Read full term ->Ticketing System
Service management platform used to track incidents, requests, and resolution notes.
Read full term ->UAC
User Account Control mechanism that prompts before elevated actions in Windows.
Read full term ->Unauthorized Access Prevention
Implementing security measures to protect systems and data from being accessed by unauthorized users.
Read full term ->VPN
Virtual private network that encrypts traffic between endpoint and remote network.
Read full term ->Browser Cache
Locally stored web content used to speed up page loading.
Read full term ->Windows Installation
The process of setting up the Windows operating system on a computer, which involves configuring system settings and installing necessary drivers.
Read full term ->Wireless Security
Wireless security involves measures to protect wireless networks and communications, including encryption protocols like WPA2 and WPA3.
Read full term ->Workgroup
Peer-to-peer Windows network model without centralized domain control.
Read full term ->Workstation Backup Process
The method of creating copies of data from a computer to prevent data loss in case of hardware failure or other issues.
Read full term ->
