Computer Tech Tutor

  • Best Books to Help You Pass the Comptia A+ 220-1001 and 220-1002 Exams
  • Best CompTIA A+ Online Video Courses
  • Comptia A Plus 220-1001 Study Guide and Exam Preparation
  • Comptia A Plus 220-1002 Study Guide
  • Comptia A+ (Plus) Acronyms
  • CompTIA A+ 220-1001 & 220-1002 Overview
  • CompTIA A+ Money Saving Tips
  • How to Study
  • Privacy Policy
  • Welcome
✕

Month: January 2002

2.4 Malware: Virus

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 150 of 278 in the series Comptia A+ (Plus) 220-1002 Series

Virus is a general term for malware that is able to reproduce itself with the help of the user. The user needs to take some action to execute the virus….

Read More →

2.4 Malware: Rootkit

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 149 of 278 in the series Comptia A+ (Plus) 220-1002 Series

The term rootkit is based on the Unix system where the root user is a super user of the system and has the most access and control of a system….

Read More →

2.4 Malware: Keylogger

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 148 of 278 in the series Comptia A+ (Plus) 220-1002 Series

A keylogger is a type of malware that captures your keyboard keystrokes. Keyloggers allow hackers to learn your passwords, credit card numbers, authentication credentials as you visit sensitive websites such…

Read More →

2.4 Malware: Trojan

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 147 of 278 in the series Comptia A+ (Plus) 220-1002 Series

Trojan malware is something that pretends to be something else to mask its true nature of gaining access to your computer for ill intent. For example, you might think you’re…

Read More →

2.4 Malware: Ransomware

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 146 of 278 in the series Comptia A+ (Plus) 220-1002 Series

Ransomeware is a type of malware in which hackers lock you out of your data until you pay the hackers a fee. Security professionals may be able to retrieve your…

Read More →

2.3 Wireless Authentication Methods

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 145 of 278 in the series Comptia A+ (Plus) 220-1002 Series

Single-factor Multifactor RADIUS RADIUS stands for Remote Authentication Dial in User Service. It’s a common AAA (Authentication, Authorization, Accounting) protocol. RADIUS allows for centralized authentication of users. For example, multiple…

Read More →

2.3 Wireless Security Protocols

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 144 of 278 in the series Comptia A+ (Plus) 220-1002 Series

WEP WEP stands for Wired Equivalent Privacy Uses standard 40 bit encryption to scramble data packets. Some vendors support 104 bit encryption.  WEP was found to be vulnerable to attack…

Read More →

2.2 Principle of Least Privilege

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 143 of 278 in the series Comptia A+ (Plus) 220-1002 Series

The principle of least privilege refers to the concept that users should only be granted to the bare minimum of rights and permissions that are needed to perform their job….

Read More →

2.2 Trusted / Untrusted Software Sources

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 142 of 278 in the series Comptia A+ (Plus) 220-1002 Series

It’s important to know the source of an application. Applications of unknown origins may have malicious code which once installed on your computer, can basically have access to your entire…

Read More →

2.2 Email Filtering

2. Security (220-1002), Comptia A+ (Plus), Comptia A+ (Plus) 220-1002

This entry is part 141 of 278 in the series Comptia A+ (Plus) 220-1002 Series

Email filtering can be used to stop unsolicited or potentially harmful email from ever reaching the intended user. Organizations can choose to have a centralized mail gateway on premise or…

Read More →
1 2 Next →

Recent Posts

  • Storage Area Network (SAN)
  • APM and ACPI
  • Acceptable Use Policy
  • SRAM
  • Electromagnetic Pulse (EMP)

Archives

  • August 2019
  • May 2019
  • April 2019
  • July 2002
  • June 2002
  • May 2002
  • April 2002
  • March 2002
  • February 2002
  • January 2002
  • December 2001
  • November 2001
  • October 2001
  • September 2001
  • August 2001
  • July 2001
  • June 2001
  • May 2001
  • April 2001
  • March 2001
  • February 2001
  • January 2001
  • December 2000
  • November 2000
  • October 2000
  • September 2000
  • August 2000
  • July 2000
  • June 2000
  • May 2000
  • April 2000
  • March 2000
  • February 2000
  • January 2000

Categories

  • 1. Mobile Devices (220-1001)
  • 1. Operating Systems (220-1002)
  • 2. Networking (220-1001)
  • 2. Security (220-1002)
  • 3. Hardware (220-1001)
  • 3. Software Troubleshooting (220-1002)
  • 4. Virtualization and Cloud Computing (220-1001)
  • 5. Hardware and Network Troubleshooting (220-1001)
  • Comptia A+ (Plus)
  • Comptia A+ (Plus) 220-1001
  • Comptia A+ (Plus) 220-1002
  • Uncategorized
Arba WordPress Theme by XstreamThemes.