CompTIA A+ Core 2 Study Notes
CompTIA A+ Core 2 Study Notes
- File Systems
storage media preparation
1. bring device online
2. initialize disk
3. partition disk
4. format partitions.
- Disk Initialization
bring and initialize disk online
partitioning and formatting disk.
IPV4
- 32-bit addresses
- Dotted decimal notation
- IP addressing standard since the 1970
IPV4 Addressing
- Four octets seperated by periods (means 8)
- Each octet falls between 0 and 255
- For example 199.126.128.190
Subnet Masks
- Define which part of the Ip address defnes the network versus the hosts address.
- Decimal notation 255.255.255.0
- Classless Interdomain Routing (CIDR) notation: /24
DHCP Process
1. DHCP Discover
2. DHCP Offer
3. DHCP Request
4. DHCP Acknowledgement
- Ipconfig /all
Command to see all the IP infomation
identity of the DHCP server
IPv4 & IPv6 information
DHCP lease
- DHCP lease time determines how long clients can keep the same IP configuration
- Clients renew leases before they expire.
- Using a short lease interval allows the reuse of IP addresses in the range for
short-term visiting client devices.
DHCP
- Servers listen on Port 67, clients listen on UDp 68.
- Vendor-class IDs can control address allocations.
- DHCP relay: DHCP relies on Local Area Network (LAN) broadcasts.
Firewall
- packet filtering
Linux IP Command
- Ip a
Physical Security
- Fencing
- Bollard posts to protect buildings from vehicle incursion.
- Lighting, locked gates.
- Access cards
- Security guards, guard dogs.
- Motion-sensing security systems
Key Fobs
- Physical token to uthenticate/allow access.
- Similar to a vehicle wireless key fob.
- Also referred to as a "hardware token" often used for VPN authentication.
Smart Cards
- Credit card sized
- Contains an embedded microchip
- Used for authentication:
* Payment
* VPN Access
* Ability to send sensitive email messages (laptop smartcard slot)
* Can contain a PKI certificate (PKI Card)
Keys
- Physical Lock keys for doors, equipment racks.
- Electronic (symmetric and asymmetric encryption keys, proximity cards)
USB Security Key
- USB device that plugs into computer, can also have a security pin.
Biometric Authentication
- Something you are
- Facial Recognition
- Voice Recognition
- Fingerprint Scanners
- Retinal Scanner
Windows 10 Sign in options
_ Hello Face
- Fingerprint
- Hello Pin
Logical Security
Logical Security
Password/credential Management
- Central location to store credentials.
- Authenticate
2 Step Verification
- Enter your verification code
Authorization
- Principle of least priviledge
- Network access comtrol lists (ACLs)
- Database/file system
Implementing physical security measures and devices
TKIP Operation
- Uses the RC4 symmetric stream encryption cipher.
- Ensures a different 128-bit RC4 encryption key is used for each packet.
- Slower performance than its successor AES.
- Vulnerable to attacks since it uses the same underlying methods as WEP standard