CertNova
Menu
<- Back to glossary

CompTIA A+ (220-1202) glossary

Terms selected for CompTIA A+ (220-1202) based on common objective language and practice focus.

MDM

Mobile Device Management used to enforce policy on mobile endpoints.

Read full term ->

TPM

Trusted Platform Module for secure key storage and attestation.

Read full term ->

Troubleshooting Methodology

Structured process to identify, test, fix, verify, and document issues.

Read full term ->

UEFI

Modern firmware standard replacing legacy BIOS with expanded capabilities.

Read full term ->

GUI

Graphical user interface enabling interaction via windows, icons, and menus.

Read full term ->

Operating System

Core software managing hardware resources and providing services to applications.

Read full term ->

Password Manager

Tool that securely stores and generates complex credentials.

Read full term ->

Browser Cache

Locally stored web content used to speed up page loading.

Read full term ->

Least Privilege

Grant only the minimum permissions needed to perform a task.

Read full term ->

Acceptable Use Policy (AUP)

Policy that defines permitted and prohibited use of company systems and data.

Read full term ->

Account Disable

Administrative action that blocks sign-in without deleting the user account.

Read full term ->

Active Directory

Microsoft directory service for centralized identity and policy management.

Read full term ->

AES

Advanced Encryption Standard used to protect data confidentiality.

Read full term ->

Anti-malware

Security software designed to detect, block, and remove malicious code.

Read full term ->

Authentication

Process of verifying a user or system identity.

Read full term ->

Authorization

Process of granting permissions after identity is authenticated.

Read full term ->

Backup Rotation

Planned schedule for cycling backup media or backup sets over time.

Read full term ->

BitLocker

Windows feature that encrypts drives to protect data at rest.

Read full term ->

Blue Screen of Death (BSOD)

Critical Windows stop error screen caused by severe system failure.

Read full term ->

bootrec

Windows recovery command-line utility for repairing boot records.

Read full term ->

Brute-force Attack

Attack method that repeatedly attempts many credential combinations.

Read full term ->

Change Management

Formal process for reviewing, approving, implementing, and documenting system changes.

Read full term ->

chkdsk

Windows utility that checks file system integrity and disk errors.

Read full term ->

Command Prompt

Windows command-line interface used for administration and troubleshooting.

Read full term ->

Continuous Backup

Backup approach that captures data changes frequently or in near real time.

Read full term ->

Data Encryption

Converting readable data into protected ciphertext using cryptographic methods.

Read full term ->

Differential Backup

Backup containing all changes since the most recent full backup.

Read full term ->

Disk Cleanup

Windows utility that removes temporary and unnecessary files.

Read full term ->

Disk Management

Windows tool for partitioning, formatting, and managing storage volumes.

Read full term ->

Domain Join

Process of enrolling a device into a directory-managed domain.

Read full term ->

EDR

Endpoint Detection and Response platform for endpoint telemetry and threat response.

Read full term ->

exFAT

File system optimized for flash storage and cross-platform compatibility.

Read full term ->

FAT32

Legacy file system with broad compatibility but file size limitations.

Read full term ->

File Permissions

Access rights that control who can read, write, or modify files.

Read full term ->

Full Backup

A complete copy of all selected data at a point in time.

Read full term ->

gpupdate

Command-line utility that refreshes Group Policy settings.

Read full term ->

Group Policy

Windows policy framework for centralized configuration and security controls.

Read full term ->

Host Firewall

Software firewall running on an endpoint to filter inbound and outbound traffic.

Read full term ->

Incremental Backup

Backup containing changes since the most recent backup of any type.

Read full term ->

Incident Response

Structured process for detection, containment, eradication, recovery, and lessons learned.

Read full term ->

Linux Shell

Command interpreter used to run Linux commands and scripts.

Read full term ->

Local Security Policy

Windows settings that define local authentication and security behavior.

Read full term ->

Malware Quarantine

Isolation state where suspicious files are blocked from execution pending analysis.

Read full term ->

MBR

Master Boot Record partitioning format used by legacy BIOS systems.

Read full term ->

GPT

GUID Partition Table format supporting larger disks and modern boot workflows.

Read full term ->

MFA

Multi-factor authentication requiring two or more verification factors.

Read full term ->

NTFS

Windows file system supporting permissions, encryption, and journaling.

Read full term ->

Patch Management

Process of testing, deploying, and verifying updates to fix vulnerabilities and bugs.

Read full term ->

Phishing

Social engineering attack that tricks users into revealing credentials or running malware.

Read full term ->

Principle of Least Functionality

Security approach that disables unnecessary services, ports, and software.

Read full term ->

Ransomware

Malware that encrypts data and demands payment for decryption.

Read full term ->

RDP

Remote Desktop Protocol for remote graphical access to Windows systems.

Read full term ->

Restore Point

Saved Windows system state used to roll back problematic changes.

Read full term ->

Safe Mode

Diagnostic startup mode loading minimal drivers and services.

Read full term ->

sfc

System File Checker utility that verifies and repairs Windows system files.

Read full term ->

Social Engineering

Manipulation techniques that exploit human behavior to bypass controls.

Read full term ->

Task Manager

Windows tool for viewing processes, performance, and startup applications.

Read full term ->

Ticketing System

Service management platform used to track incidents, requests, and resolution notes.

Read full term ->

UAC

User Account Control mechanism that prompts before elevated actions in Windows.

Read full term ->

VPN

Virtual private network that encrypts traffic between endpoint and remote network.

Read full term ->

Workgroup

Peer-to-peer Windows network model without centralized domain control.

Read full term ->

Single Sign-On (SSO)

Authentication model allowing users to access multiple services with one login session.

Read full term ->

Bash

Common Linux shell used for command execution and scripting.

Read full term ->
Start practice for 220-1202