The process used to prevent unauthorized changes. Unauthorized changes often result in unintended outages.
change management
PED
PED
Click to view the back
Click to view the front
Personal Electronic Device.
Small devices such as cell phones, radios, CD players, DVD players, video cameras, and MP3 players.
PED
Remember this – Trojan
A Trojan appears to be something useful but includes a malicious component, such as installing a backdoor on a user’s system. Many Trojans are delivered via drive-by downloads. They can also infect systems from fake antivirus software, pirated software, games, or infected USB drives.
These Security+ flashcards provide you with a quick reminder of many of the different Security+ related concepts in a flashcard format. These concepts are explained in greater depth in the CompTIA Security+: Get Certified Get Ahead: SY0-501 Study Guide.