change management

 

 

change management

Click to view the back
Click to view the front

The process used to prevent unauthorized changes. Unauthorized changes often result in unintended outages.

change management
PED

 

 

PED

Click to view the back
Click to view the front

Personal Electronic Device.

Small devices such as cell phones, radios, CD players, DVD players, video cameras, and MP3 players.

 

 

PED
Remember this – Trojan

 

A Trojan appears to be something useful but includes a malicious component, such as installing a backdoor on a user’s system. Many Trojans are delivered via drive-by downloads. They can also infect systems from fake antivirus software, pirated software, games, or infected USB drives.

Click to view the back
Click to view the front

Intentionally left blank

 

 

 

 

 

 

 

Remember this – Trojan
This is only a sample

Security+ Flashcards (Randomized)

These Security+ flashcards provide you with a quick reminder of many of the different Security+ related concepts in a flashcard format. These concepts are explained in greater depth in the CompTIA Security+: Get Certified Get Ahead: SY0-501 Study Guide.

Full Security+ package available here