Muutke küpsiste eelistusi

CompTIA Aplus CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 2 Exam 220-1102 [Pehme köide]

, (University of Notre Dame)
  • Formaat: Paperback / softback, 656 pages, kõrgus x laius x paksus: 234x188x41 mm, kaal: 885 g
  • Sari: CertMike Get Certified
  • Ilmumisaeg: 19-Jun-2023
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119898129
  • ISBN-13: 9781119898122
Teised raamatud teemal:
  • Pehme köide
  • Hind: 45,97 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 54,09 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 656 pages, kõrgus x laius x paksus: 234x188x41 mm, kaal: 885 g
  • Sari: CertMike Get Certified
  • Ilmumisaeg: 19-Jun-2023
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119898129
  • ISBN-13: 9781119898122
Teised raamatud teemal:

Skip the fluff and get straight to the essentials with an indispensable prep handbook for the CompTIA A+ Core 2 exam

In CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and practical roadmap to taking—and succeeding on—the CompTIA A+ Core 2 exam. You’ll learn how to install, configure, and maintain computer equipment, mobile devices, and software for end users, service components based on customer requirements, understand networking basics, and apply essential cybersecurity methods. Ace the test using the proven CertMike approach:

  • Prepare -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!
  • Practice -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!
  • Pass -- On exam day, use the critical knowledge you've learned when you’re ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!

With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You’ll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test—the first time around!

An indispensable resource for anyone preparing for their A+ certification, CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102 is also a must-read for hardware and PC technicians seeking to upgrade their skillset.
Introduction xxiii
PART I DOMAIN 1.0: OPERATING SYSTEMS
1(218)
Chapter 1 Microsoft Windows Editions
3(14)
Windows 10 Editions
3(4)
Feature Differences Between Editions
7(5)
Upgrade Paths
12(5)
Chapter 2 Microsoft Command-Line Tools
17(20)
Navigation
17(3)
Command-Line Tools
20(17)
Chapter 3 Windows 10 Operating System Tools
37(22)
Task Manager
38(4)
Microsoft Management Console (MMC) Snap-In
42(9)
Additional Tools
51(8)
Chapter 4 Windows 10 Control Panel
59(26)
Control Panel Overview
60(1)
Opening Control Panel
60(1)
Internet Options
61(1)
Devices and Printers
62(1)
Programs and Features
63(1)
Network and Sharing Center
64(1)
System
64(1)
Windows Defender Firewall
65(1)
Mail
65(2)
Sound
67(2)
User Accounts
69(1)
Device Manager
69(2)
Indexing Options
71(1)
Administrative Tools
72(1)
File Explorer Options
73(5)
Power Options
78(2)
Ease of Access
80(5)
Chapter 5 Windows Settings
85(20)
Accessing Settings
86(1)
Time & Language
87(1)
Update & Security
88(3)
Personalization
91(1)
Apps
92(1)
Privacy
93(1)
System
94(3)
Devices
97(1)
Network & Internet
98(1)
Gaming
98(1)
Accounts
99(6)
Chapter 6 Windows Networking
105(22)
Workgroup vs. Domain Setup
106(3)
Local OS Firewall Settings
109(4)
Client Network Configuration
113(4)
Establish Network Connections
117(3)
Proxy Settings
120(1)
Public Network vs. Private Network
121(1)
File Explorer Navigation - Network Paths
122(1)
Metered Connections and Limitations
122(5)
Chapter 7 Application Installation and Configuration
127(16)
System Requirements for Applications
128(7)
OS Requirements for Applications
135(1)
Distribution Methods
136(1)
Physical Media vs. Downloadable
137(1)
ISO Mountable
137(1)
Other Considerations for New Applications
138(5)
Chapter 8 Operating System Types
143(18)
Workstation OSs
143(5)
Cell Phone/Tablet OSs
148(2)
Various Filesystem Types
150(6)
Vendor Life-Cycle Limitations
156(1)
Compatibility Concerns Between OSs
157(4)
Chapter 9 Operating System Installations and Upgrades
161(16)
Boot Methods
162(5)
Types of Installations
167(3)
Partitioning
170(1)
Drive Format
171(1)
Upgrade Considerations
172(1)
Feature Updates
173(4)
Chapter 10 macOS
177(24)
Installation and Uninstallation of Applications
178(2)
Apple ID and Corporate Restrictions
180(1)
Best Practices
181(1)
System Preferences
182(6)
Features
188(6)
Disk Utility
194(1)
FileVault
195(1)
Terminal
196(1)
Force Quit
197(4)
Chapter 11 Linux
201(18)
Common Commands
201(11)
Best Practices
212(2)
Tools
214(5)
PART II DOMAIN 2.0: SECURITY
219(176)
Chapter 12 Physical Security
221(10)
Physical Security
221(3)
Physical Security for Staff
224(7)
Chapter 13 Logical Security
231(18)
Logical Security
231(7)
Mobile Device Management (MDM)
238(1)
Active Directory
238(11)
Chapter 14 Wireless Security
249(22)
Protocols and Encryption
249(3)
Authentication
252(7)
Chapter 15 Malware
259(1)
Malware
260(2)
Malware Prevention and Removal Tools and Methods
262(9)
Chapter 16 Social Engineering and Security Threats
271(18)
Social Engineering
271(5)
Threats
276(5)
Vulnerabilities
281(8)
Chapter 17 Windows Security
289(24)
Defender Antivirus
290(2)
Firewall
292(3)
Users and Groups
295(2)
Login OS Options
297(2)
NTFS vs. Share Permissions
299(5)
Run As Administrator vs. Standard User
304(3)
BitLocker
307(1)
Bitlocker To Go
308(1)
Encrypting File System (EFS)
308(5)
Chapter 18 Workstation Security Configuration
313(18)
Data-at-Rest Encryption
314(1)
Password Best Practices
314(4)
End-User Best Practices
318(2)
Account Management
320(3)
Change Default Administrator's User Account/Password
323(2)
Disable Autorun
325(1)
Disable Autoplay
325(6)
Chapter 19 Mobile and Embedded Device Security
331(14)
Screen Locks
332(2)
Locator Apps and Remote Wipes
334(1)
OS Updates
335(1)
Device Encryption
336(1)
Remote Backup Applications
336(1)
Failed Login Attempts Restrictions
337(1)
Antivirus/Antimalware
338(1)
Firewalls
338(1)
Policies and Procedures
339(1)
Internet of Things (IoT)
340(5)
Chapter 20 Data Destruction and Disposal
345(14)
Physical Destruction
345(4)
Recycling or Repurposing Best Practices
349(6)
Outsourcing Concepts
355(4)
Chapter 21 Network Security
359(20)
Home Router Settings
360(7)
Wireless Specific Settings
367(5)
Firewall Settings
372(7)
Chapter 22 Browser Security
379(16)
Browser Download/Installation
379(6)
Settings
385(10)
PART III DOMAIN 3.0: SOFTWARE TROUBLESHOOTING
395(82)
Chapter 23 Troubleshooting Windows
397(22)
Common Symptoms
397(10)
Common Troubleshooting Steps
407(12)
Chapter 24 Troubleshooting PC Security
419(14)
Common Symptoms
419(7)
Browser-Related Symptoms
426(7)
Chapter 25 Troubleshooting Malware
433(14)
Step 1 Investigate and Verify Malware Symptoms
434(2)
Step 2 Quarantine Infected Systems
436(1)
Step 3 Disable System Restore in Windows
436(5)
Step 5 Schedule Scans and Run Updates
441(2)
Step 6 Enable System Restore and Create a Restore Point in Windows
443(1)
Step 7 Educate the End User
443(4)
Chapter 26 Troubleshooting Mobile Device OS and Applications
447(16)
Common Mobile OS and Application Symptoms
448(15)
Chapter 27 Troubleshooting Mobile Device Security
463(14)
Security Concerns
464(3)
Common Symptoms
467(10)
PART IV DOMAIN 4.0: OPERATIONAL PROCEDURES
477(116)
Chapter 28 Documentation
479(16)
Ticketing Systems
480(3)
Asset Management
483(3)
Types of Documents
486(5)
Knowledge Base/Articles
491(4)
Chapter 29 Change Management
495(10)
Documented Business Processes
495(2)
Change Management
497(8)
Chapter 30 Workstation Backup and Recovery
505(14)
Backup and Recovery
505(6)
Backup Testing
511(2)
Backup Rotation Schemes
513(6)
Chapter 31 Safety
519(14)
Electrostatic Discharge (ESD) Straps
519(2)
ESD Mats
521(1)
Equipment Grounding
522(1)
Proper Power Handling
523(1)
Proper Component Handling and Storage
524(1)
Antistatic Bags
524(1)
Compliance with Government Regulations
524(1)
Personal Safety
525(8)
Chapter 32 Environmental Protection
533(10)
Material Safety Data Sheet (MSDS): Documentation for Handling and Disposal
533(3)
Temperature, Humidity-Level Awareness, and Proper Ventilation
536(2)
Power Surges, Under-Voltage Events, and Power Failures
538(5)
Chapter 33 Privacy, Licensing, Policy, and Incident Response
543(10)
Incident Response
544(2)
Licensing/Digital Rights Management (DRM)/End-User License Agreement (EULA)
546(2)
Regulated Data
548(5)
Chapter 34 Communication and Professionalism
553(12)
Professional Appearance and Attire
554(1)
Use Proper Language and Avoid Jargon, Acronyms, and Slang, When Applicable
555(1)
Maintain a Positive Attitude/Project Confidence
555(1)
Actively Listen, Take Notes, and Avoid Interrupting the Customer
556(1)
Be Culturally Sensitive
556(1)
Be on Time (If Late, Contact the Customer)
557(1)
Avoid Distractions
557(1)
Dealing with Difficult Customers or Situations
558(1)
Set and Meet Expectations/Time Line and Communicate Status with the Customer
559(1)
Deal Appropriately with Customers' Confidential and Private Materials
560(5)
Chapter 35 Scripting
565(10)
Script File Types
565(3)
Use Cases for Scripting
568(1)
Other Considerations When Using Scripts
569(6)
Chapter 36 Remote Access
575(18)
Methods/Tools
575(13)
Security Considerations of Each Access Method
588(5)
Index 593
ABOUT THE AUTHORS

Mike Chapple, PhD, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dames Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the Universitys Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com.

Mark Soper, MCP, CompTIA A+, has over 30 years experience in IT. He is the author or co-author of 40 books on technology, covering topics ranging from CompTIA A+ to Microsoft Windows, networking, and troubleshooting.