Skip to main content

Recently Updated Pages

Denial of Service

Documentation

aliases: DoS DDoS A type of web server threat that overwhelms the target server with loads of...

Updated 1 month ago by table!

Vishing

Documentation

A type of social engineering attack where the attacker attempts to gain secured data or informati...

Updated 1 month ago by table!

Evil Twin Attack

Documentation

A type of social engineering attack where the attacker configures a rogue access point designed t...

Updated 1 month ago by table!

Impersonation

Documentation

A social engineering attack where the attacker attempts to gain access to secured data by pretend...

Updated 1 month ago by table!

Shoulder Surfing

Documentation

A type of social engineering that allows the attacker to gain critical and/or sensitive informati...

Updated 1 month ago by table!

Tailgating

Documentation

A social engineering attack where the attacker gains access to a secured place simply by closely ...

Updated 1 month ago by table!

Remote Desktop Protocol

Documentation

aliases: RDP An application protocol for operating remote connections to a host using a graph...

Updated 1 month ago by table!

IEEE 802.11w

Documentation

aliases: Management Frame Protection 802.11w MFP Management Frame Protection: a security feat...

Updated 1 month ago by table!

Dynamic Rate Selection

Documentation

A mechanism used in wireless networks to select the data transmission rate at the physical layer ...

Updated 1 month ago by table!

Attestation Report

Documentation

A secure report that proves that a client is running an authorized OS and has up-to-date patches ...

Updated 1 month ago by table!

Separation of Duties

Documentation

A means of establishing checks and balances against the possibility that critical systems or proc...

Updated 1 month ago by table!

Syslog

Documentation

Application protocol and event logging format enabling different appliances and software applicat...

Updated 1 month ago by table!

Logging Levels

Documentation

An enumeration of the eight logging levels commonly used in computers. Name Description Level ...

Updated 1 month ago by table!

Secure Erase

Documentation

A command that sanitizes storage drives. SE has been a part of the SATA and SAS specifications si...

Updated 1 month ago by table!

14.2.1 Incident Responses

CompTIA A+ Unit XIV

Learn how to properly respond to security or privacy incidents in enterprise settings. Data theft...

Updated 1 month ago by table!

3.3.1 Cases & Form Factors

CompTIA A+ Unit III

Learn how computer cases and motherboards interact. Motherboards Using the form factor specificat...

Updated 1 month ago by table!

3.14.3 Troubleshooting Power Supplies

CompTIA A+ Unit III

Raw Lesson Content Following are tips for troubleshooting power supplies. Familiarize yourself w...

Updated 1 month ago by table!

3.4.1 Motherboard Issues

CompTIA A+ Unit III

Learn the common issues with motherboards, CPUs, and system memory. Power Issues Power supplies w...

Updated 1 month ago by table!

13.1.1 Printers

CompTIA A+ Unit XIII

Learn the printing process Print Spooler As soon as a print command is received by the system fro...

Updated 1 month ago by table!

6.1.3 Windows 11 Installation Methods

CompTIA A+ Unit VI

Learn the different ways to install Windows 11 on a system with Windows 10 already installed. The...

Updated 1 month ago by table!