CertNova
Menu
<- Back to glossary

CompTIA A+ (220-1202) glossary

Terms selected for CompTIA A+ (220-1202) based on common objective language and practice focus.

MDM

Mobile Device Management used to enforce policy on mobile endpoints.

Read full term ->

TPM

Trusted Platform Module for secure key storage and attestation.

Read full term ->

Troubleshooting Methodology

Structured process to identify, test, fix, verify, and document issues.

Read full term ->

UEFI

Modern firmware standard replacing legacy BIOS with expanded capabilities.

Read full term ->

Acceptable Use Policy (AUP)

Policy that defines permitted and prohibited use of company systems and data.

Read full term ->

Access Control List (ACL)

A list of permissions attached to an object that specifies which users or system processes can access it and what operations they can perform.

Read full term ->

Account Disable

Administrative action that blocks sign-in without deleting the user account.

Read full term ->

Active Directory

Microsoft directory service for centralized identity and policy management.

Read full term ->

AES

Advanced Encryption Standard used to protect data confidentiality.

Read full term ->

Anti-malware

Security software designed to detect, block, and remove malicious code.

Read full term ->

Application Error Resolution

The process of diagnosing and fixing problems that prevent an application from functioning correctly.

Read full term ->

Authentication

Process of verifying a user or system identity.

Read full term ->

Authorization

Process of granting permissions after identity is authenticated.

Read full term ->

Backup Rotation

Planned schedule for cycling backup media or backup sets over time.

Read full term ->

Bash

Common Linux shell used for command execution and scripting.

Read full term ->

BitLocker

Windows feature that encrypts drives to protect data at rest.

Read full term ->

Blue Screen of Death (BSOD)

Critical Windows stop error screen caused by severe system failure.

Read full term ->

bootrec

Windows recovery command-line utility for repairing boot records.

Read full term ->

Brute-force Attack

Attack method that repeatedly attempts many credential combinations.

Read full term ->

Change Management

A systematic approach to dealing with the transition or transformation of an organization's goals, processes, or technologies.

Read full term ->

chkdsk

Windows utility that checks file system integrity and disk errors.

Read full term ->

Command Prompt

Windows command-line interface used for administration and troubleshooting.

Read full term ->

Continuous Backup

Backup approach that captures data changes frequently or in near real time.

Read full term ->

Data Encryption

Data encryption involves converting data into a coded format to prevent unauthorized access and ensure confidentiality.

Read full term ->

Differential Backup

Backup containing all changes since the most recent full backup.

Read full term ->

Disk Cleanup

Windows utility that removes temporary and unnecessary files.

Read full term ->

Disk Management

Windows tool for partitioning, formatting, and managing storage volumes.

Read full term ->

Documentation Best Practices

Guidelines for creating and maintaining accurate and comprehensive records of system configurations and changes.

Read full term ->

Domain Join

Process of enrolling a device into a directory-managed domain.

Read full term ->

EDR

Endpoint Detection and Response platform for endpoint telemetry and threat response.

Read full term ->

Encryption Protocols

Encryption protocols secure data by converting it into a coded format, preventing unauthorized access during transmission.

Read full term ->

exFAT

File system optimized for flash storage and cross-platform compatibility.

Read full term ->

FAT32

Legacy file system with broad compatibility but file size limitations.

Read full term ->

File Permissions

File permissions in Linux determine the access level users have to files and directories, including read, write, and execute rights.

Read full term ->

File System Management

The process of organizing, storing, and accessing files on a computer's storage devices using a file system.

Read full term ->

Full Backup

A complete copy of all selected data at a point in time.

Read full term ->

GPT

GUID Partition Table format supporting larger disks and modern boot workflows.

Read full term ->

gpupdate

Command-line utility that refreshes Group Policy settings.

Read full term ->

Group Policy

Windows policy framework for centralized configuration and security controls.

Read full term ->

GUI

Graphical user interface enabling interaction via windows, icons, and menus.

Read full term ->

Host Firewall

Software firewall running on an endpoint to filter inbound and outbound traffic.

Read full term ->

Incident Response

Incident response is the process of identifying, managing, and mitigating security incidents to minimize their impact on an organization.

Read full term ->

Incremental Backup

Backup containing changes since the most recent backup of any type.

Read full term ->

Least Privilege

A security principle that restricts user access rights to the minimum necessary to perform their job functions.

Read full term ->

Linux Package Manager

A tool used to install, update, and remove software packages in Linux operating systems.

Read full term ->

Linux Shell

Command interpreter used to run Linux commands and scripts.

Read full term ->

Local Security Policy

Windows settings that define local authentication and security behavior.

Read full term ->

macOS Configuration

The process of setting preferences and system settings on a macOS device to optimize performance and usability.

Read full term ->

Malware Detection

The process of identifying and mitigating malicious software that can harm a computer system.

Read full term ->

Malware Quarantine

Isolation state where suspicious files are blocked from execution pending analysis.

Read full term ->

MBR

Master Boot Record partitioning format used by legacy BIOS systems.

Read full term ->

Multi-Factor Authentication (MFA)

MFA is a security process that requires users to provide multiple forms of identification before granting access to resources.

Read full term ->

Mobile Connectivity Troubleshooting

Identifying and resolving issues that affect a mobile device's ability to connect to networks and services.

Read full term ->

Mobile OS Upgrade

The process of updating the operating system on a mobile device to a newer version to improve features and security.

Read full term ->

NTFS

Windows file system supporting permissions, encryption, and journaling.

Read full term ->

Operating System

Core software managing hardware resources and providing services to applications.

Read full term ->

OS Troubleshooting

The process of diagnosing and resolving issues within an operating system to restore normal functionality.

Read full term ->

OS Updates and Patches

Software updates provided by the operating system manufacturer to fix bugs, close security vulnerabilities, and enhance functionality.

Read full term ->

Password Manager

Tool that securely stores and generates complex credentials.

Read full term ->

Patch Management

Patch management is the process of acquiring, testing, and installing patches to update software and fix vulnerabilities.

Read full term ->

Phishing

A cyber attack method where attackers impersonate legitimate entities to trick individuals into providing sensitive information.

Read full term ->

Principle of Least Functionality

Security approach that disables unnecessary services, ports, and software.

Read full term ->

Professional Communication

The practice of effectively exchanging information with colleagues and clients in a business environment.

Read full term ->

Ransomware

A type of malicious software that encrypts a victim's data and demands payment for the decryption key.

Read full term ->

RDP

Remote Desktop Protocol for remote graphical access to Windows systems.

Read full term ->

Recovery Process

Steps taken to restore a system or data to a previous state after a failure or data loss incident.

Read full term ->

Restore Point

Saved Windows system state used to roll back problematic changes.

Read full term ->

Safe Mode

Diagnostic startup mode loading minimal drivers and services.

Read full term ->

Safety Protocols

Procedures and guidelines designed to ensure the physical safety of individuals working with computer hardware and systems.

Read full term ->

sfc

System File Checker utility that verifies and repairs Windows system files.

Read full term ->

Single Sign-On (SSO)

Authentication model allowing users to access multiple services with one login session.

Read full term ->

Social Engineering

Manipulation techniques that exploit human psychology to trick individuals into revealing sensitive information or performing insecure actions.

Read full term ->

Task Manager

Windows tool for viewing processes, performance, and startup applications.

Read full term ->

Ticketing System

Service management platform used to track incidents, requests, and resolution notes.

Read full term ->

UAC

User Account Control mechanism that prompts before elevated actions in Windows.

Read full term ->

Unauthorized Access Prevention

Implementing security measures to protect systems and data from being accessed by unauthorized users.

Read full term ->

VPN

Virtual private network that encrypts traffic between endpoint and remote network.

Read full term ->

Browser Cache

Locally stored web content used to speed up page loading.

Read full term ->

Windows Installation

The process of setting up the Windows operating system on a computer, which involves configuring system settings and installing necessary drivers.

Read full term ->

Wireless Security

Wireless security involves measures to protect wireless networks and communications, including encryption protocols like WPA2 and WPA3.

Read full term ->

Workgroup

Peer-to-peer Windows network model without centralized domain control.

Read full term ->

Workstation Backup Process

The method of creating copies of data from a computer to prevent data loss in case of hardware failure or other issues.

Read full term ->
Start practice for 220-1202