CompTIA A+ (220-1202) glossary
Terms selected for CompTIA A+ (220-1202) based on common objective language and practice focus.
MDM
Mobile Device Management used to enforce policy on mobile endpoints.
Read full term ->TPM
Trusted Platform Module for secure key storage and attestation.
Read full term ->Troubleshooting Methodology
Structured process to identify, test, fix, verify, and document issues.
Read full term ->UEFI
Modern firmware standard replacing legacy BIOS with expanded capabilities.
Read full term ->GUI
Graphical user interface enabling interaction via windows, icons, and menus.
Read full term ->Operating System
Core software managing hardware resources and providing services to applications.
Read full term ->Password Manager
Tool that securely stores and generates complex credentials.
Read full term ->Browser Cache
Locally stored web content used to speed up page loading.
Read full term ->Least Privilege
Grant only the minimum permissions needed to perform a task.
Read full term ->Acceptable Use Policy (AUP)
Policy that defines permitted and prohibited use of company systems and data.
Read full term ->Account Disable
Administrative action that blocks sign-in without deleting the user account.
Read full term ->Active Directory
Microsoft directory service for centralized identity and policy management.
Read full term ->AES
Advanced Encryption Standard used to protect data confidentiality.
Read full term ->Anti-malware
Security software designed to detect, block, and remove malicious code.
Read full term ->Authentication
Process of verifying a user or system identity.
Read full term ->Authorization
Process of granting permissions after identity is authenticated.
Read full term ->Backup Rotation
Planned schedule for cycling backup media or backup sets over time.
Read full term ->BitLocker
Windows feature that encrypts drives to protect data at rest.
Read full term ->Blue Screen of Death (BSOD)
Critical Windows stop error screen caused by severe system failure.
Read full term ->bootrec
Windows recovery command-line utility for repairing boot records.
Read full term ->Brute-force Attack
Attack method that repeatedly attempts many credential combinations.
Read full term ->Change Management
Formal process for reviewing, approving, implementing, and documenting system changes.
Read full term ->chkdsk
Windows utility that checks file system integrity and disk errors.
Read full term ->Command Prompt
Windows command-line interface used for administration and troubleshooting.
Read full term ->Continuous Backup
Backup approach that captures data changes frequently or in near real time.
Read full term ->Data Encryption
Converting readable data into protected ciphertext using cryptographic methods.
Read full term ->Differential Backup
Backup containing all changes since the most recent full backup.
Read full term ->Disk Cleanup
Windows utility that removes temporary and unnecessary files.
Read full term ->Disk Management
Windows tool for partitioning, formatting, and managing storage volumes.
Read full term ->Domain Join
Process of enrolling a device into a directory-managed domain.
Read full term ->EDR
Endpoint Detection and Response platform for endpoint telemetry and threat response.
Read full term ->exFAT
File system optimized for flash storage and cross-platform compatibility.
Read full term ->FAT32
Legacy file system with broad compatibility but file size limitations.
Read full term ->File Permissions
Access rights that control who can read, write, or modify files.
Read full term ->Full Backup
A complete copy of all selected data at a point in time.
Read full term ->gpupdate
Command-line utility that refreshes Group Policy settings.
Read full term ->Group Policy
Windows policy framework for centralized configuration and security controls.
Read full term ->Host Firewall
Software firewall running on an endpoint to filter inbound and outbound traffic.
Read full term ->Incremental Backup
Backup containing changes since the most recent backup of any type.
Read full term ->Incident Response
Structured process for detection, containment, eradication, recovery, and lessons learned.
Read full term ->Linux Shell
Command interpreter used to run Linux commands and scripts.
Read full term ->Local Security Policy
Windows settings that define local authentication and security behavior.
Read full term ->Malware Quarantine
Isolation state where suspicious files are blocked from execution pending analysis.
Read full term ->MBR
Master Boot Record partitioning format used by legacy BIOS systems.
Read full term ->GPT
GUID Partition Table format supporting larger disks and modern boot workflows.
Read full term ->MFA
Multi-factor authentication requiring two or more verification factors.
Read full term ->NTFS
Windows file system supporting permissions, encryption, and journaling.
Read full term ->Patch Management
Process of testing, deploying, and verifying updates to fix vulnerabilities and bugs.
Read full term ->Phishing
Social engineering attack that tricks users into revealing credentials or running malware.
Read full term ->Principle of Least Functionality
Security approach that disables unnecessary services, ports, and software.
Read full term ->Ransomware
Malware that encrypts data and demands payment for decryption.
Read full term ->RDP
Remote Desktop Protocol for remote graphical access to Windows systems.
Read full term ->Restore Point
Saved Windows system state used to roll back problematic changes.
Read full term ->Safe Mode
Diagnostic startup mode loading minimal drivers and services.
Read full term ->sfc
System File Checker utility that verifies and repairs Windows system files.
Read full term ->Social Engineering
Manipulation techniques that exploit human behavior to bypass controls.
Read full term ->Task Manager
Windows tool for viewing processes, performance, and startup applications.
Read full term ->Ticketing System
Service management platform used to track incidents, requests, and resolution notes.
Read full term ->UAC
User Account Control mechanism that prompts before elevated actions in Windows.
Read full term ->VPN
Virtual private network that encrypts traffic between endpoint and remote network.
Read full term ->Workgroup
Peer-to-peer Windows network model without centralized domain control.
Read full term ->Single Sign-On (SSO)
Authentication model allowing users to access multiple services with one login session.
Read full term ->Bash
Common Linux shell used for command execution and scripting.
Read full term ->
