Introduction |
|
xxiii | |
Part I CompTIA A+ Core 1 Exam 220-1101 |
|
1 | (250) |
|
|
3 | (42) |
|
1.1 Given a scenario, install and configure laptop hardware and components |
|
|
5 | (5) |
|
Hardware/device replacement |
|
|
5 | (4) |
|
Physical privacy and security components |
|
|
9 | (1) |
|
|
10 | (1) |
|
1.2 Compare and contrast the display components of mobile devices |
|
|
10 | (4) |
|
|
11 | (2) |
|
Mobile display components |
|
|
13 | (1) |
|
|
14 | (1) |
|
1.3 Given a scenario, set up and configure accessories and ports of mobile devices |
|
|
14 | (12) |
|
|
15 | (5) |
|
|
20 | (6) |
|
|
26 | (1) |
|
1.4 Given a scenario, configure basic mobile-device network connectivity and application support |
|
|
26 | (19) |
|
Wireless/cellular data network (enable/disable) |
|
|
27 | (2) |
|
|
29 | (3) |
|
|
32 | (1) |
|
Mobile device management (MDM)/mobile application management (MAM) |
|
|
32 | (4) |
|
Mobile device synchronization |
|
|
36 | (4) |
|
|
40 | (1) |
|
|
41 | (4) |
|
|
45 | (50) |
|
2.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes |
|
|
50 | (4) |
|
|
50 | (3) |
|
|
53 | (1) |
|
|
54 | (1) |
|
2.2 Compare and contrast common networking hardware |
|
|
54 | (7) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
Power over Ethernet (PoE) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
58 | (1) |
|
Digital subscriber line (DSL) |
|
|
58 | (1) |
|
Optical network terminal (ONT) |
|
|
59 | (1) |
|
Network interface card (NIC) |
|
|
59 | (1) |
|
Software-defined networking (SDN) |
|
|
60 | (1) |
|
|
61 | (1) |
|
2.3 Compare and contrast protocols for wireless networking |
|
|
61 | (5) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Long-range fixed wireless |
|
|
64 | (1) |
|
|
65 | (1) |
|
Radio-frequency identification (RFID) |
|
|
65 | (1) |
|
|
65 | (1) |
|
2.4 Summarize services provided by networked hosts |
|
|
66 | (5) |
|
|
66 | (2) |
|
|
68 | (1) |
|
|
69 | (1) |
|
Internet of Things (IoT) devices |
|
|
70 | (1) |
|
|
70 | (1) |
|
2.5 Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks |
|
|
71 | (8) |
|
Internet Protocol (IP) addressing |
|
|
71 | (8) |
|
|
79 | (1) |
|
2.6 Compare and contrast common network configuration concepts |
|
|
79 | (5) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
82 | (1) |
|
Virtual private network (VPN) |
|
|
83 | (1) |
|
|
83 | (1) |
|
2.7 Compare and contrast Internet connection types, network types, and their features |
|
|
84 | (3) |
|
Internet connection types |
|
|
84 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
2.8 Given a scenario, use networking tools |
|
|
87 | (8) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (5) |
|
|
95 | (102) |
|
3.1 Explain basic cable types and their connectors, features, and purposes |
|
|
102 | (22) |
|
|
102 | (5) |
|
|
107 | (1) |
|
|
108 | (3) |
|
|
111 | (6) |
|
|
117 | (2) |
|
|
119 | (5) |
|
|
124 | (1) |
|
3.2 Given a scenario, install the appropriate RAM |
|
|
124 | (5) |
|
|
124 | (3) |
|
Single-channel/Dual-channel |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
3.3 Given a scenario, select and install storage devices |
|
|
129 | (10) |
|
|
129 | (2) |
|
|
131 | (1) |
|
|
132 | (2) |
|
|
134 | (5) |
|
|
139 | (1) |
|
3.4 Given a scenario, install and configure motherboards, central processing units (CPUs), and add-on cards |
|
|
139 | (21) |
|
|
139 | (3) |
|
Motherboard connector types |
|
|
142 | (6) |
|
Motherboard compatibility |
|
|
148 | (5) |
|
Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) settings |
|
|
153 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (3) |
|
|
159 | (1) |
|
|
160 | (1) |
|
3.5 Given a scenario, install or replace the appropriate power supply |
|
|
160 | (3) |
|
|
161 | (1) |
|
Output 3.3V vs. 5V vs. 12V |
|
|
161 | (1) |
|
20-pin to 24-pin motherboard adapter |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
3.6 Given a scenario, deploy and configure multifunction devices/printers and settings |
|
|
163 | (7) |
|
Properly unboxing a device - setup location considerations |
|
|
163 | (1) |
|
Use appropriate drivers for a given OS |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
Automatic document feeder (ADF)/flatbed scanner |
|
|
169 | (1) |
|
|
170 | (1) |
|
3.7 Given a scenario, install and replace printer consumables |
|
|
170 | (27) |
|
|
170 | (11) |
|
|
181 | (3) |
|
|
184 | (2) |
|
|
186 | (2) |
|
|
188 | (2) |
|
|
190 | (7) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
197 | (12) |
|
4.1 Summarize cloud computing concepts |
|
|
199 | (3) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
4.2 Summarize aspects of client-side virtualization |
|
|
202 | (7) |
|
Purpose of virtual machines |
|
|
202 | (3) |
|
|
205 | (1) |
|
|
206 | (3) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
209 | (42) |
|
5.1 Given a scenario, apply the best practice methodology to resolve problems |
|
|
213 | (3) |
|
Always consider corporate policies, procedures, and impacts before implementing changes |
|
|
213 | (3) |
|
|
214 | (1) |
|
2 Establish a theory of probable cause (question the obvious) |
|
|
214 | (1) |
|
3 Test the theory to determine cause |
|
|
215 | (1) |
|
4 Establish a plan of action to resolve the problem and implement the solution |
|
|
215 | (1) |
|
5 Verify full system functionality and, if applicable, implement preventive measures |
|
|
216 | (1) |
|
6 Document the findings, actions, and outcomes |
|
|
216 | (1) |
|
|
216 | (1) |
|
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power |
|
|
216 | (9) |
|
|
217 | (7) |
|
|
224 | (1) |
|
5.3 Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays |
|
|
225 | (4) |
|
|
225 | (3) |
|
|
228 | (1) |
|
5.4 Given a scenario, troubleshoot video, projector, and display issues |
|
|
229 | (3) |
|
|
229 | (3) |
|
|
232 | (1) |
|
5.5 Given a scenario, troubleshoot common issues with mobile devices |
|
|
232 | (6) |
|
|
233 | (4) |
|
|
237 | (1) |
|
5.6 Given a scenario, troubleshoot and resolve printer issues |
|
|
238 | (6) |
|
|
238 | (6) |
|
|
244 | (1) |
|
5.7 Given a scenario, troubleshoot problems with wired and wireless networks |
|
|
244 | (9) |
|
|
244 | (3) |
|
|
247 | (1) |
|
|
248 | (3) |
Part II CompTIA A+ Core 2 Exam 220-1102 |
|
251 | (336) |
|
Chapter 6 Operating Systems |
|
|
253 | (166) |
|
1.1 Identify basic features of Microsoft Windows editions |
|
|
263 | (5) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
267 | (1) |
|
1.2 Given a scenario, use the appropriate Microsoft command-line tool |
|
|
268 | (22) |
|
|
268 | (3) |
|
|
271 | (19) |
|
|
290 | (1) |
|
1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) |
|
|
290 | (30) |
|
|
291 | (5) |
|
Microsoft Management Console (MMC) snap-in |
|
|
296 | (16) |
|
|
312 | (8) |
|
|
320 | (1) |
|
1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility |
|
|
320 | (29) |
|
|
320 | (7) |
|
|
327 | (2) |
|
|
329 | (2) |
|
Network and Sharing Center |
|
|
331 | (1) |
|
|
331 | (4) |
|
Windows Defender Firewall |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (2) |
|
|
342 | (4) |
|
|
346 | (2) |
|
|
348 | (1) |
|
|
349 | (1) |
|
1.5 Given a scenario, use the appropriate Windows settings |
|
|
349 | (15) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (3) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (2) |
|
|
359 | (2) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (2) |
|
1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop |
|
|
364 | (10) |
|
Workgroup vs. domain setup |
|
|
364 | (4) |
|
Local OS firewall settings |
|
|
368 | (1) |
|
Client network configuration |
|
|
369 | (1) |
|
Establish network connections |
|
|
370 | (1) |
|
|
371 | (2) |
|
|
373 | (1) |
|
1.7 Given a scenario, apply application installation and configuration concepts |
|
|
374 | (4) |
|
System requirements for applications |
|
|
374 | (1) |
|
OS requirements for applications |
|
|
375 | (1) |
|
|
376 | (1) |
|
Other considerations for new applications |
|
|
377 | (1) |
|
|
378 | (1) |
|
1.8 Explain common OS types and their purposes |
|
|
378 | (4) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
Vendor life-cycle limitations |
|
|
381 | (1) |
|
Compatibility concerns between OSs |
|
|
381 | (1) |
|
|
382 | (1) |
|
1.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment |
|
|
382 | (9) |
|
|
382 | (2) |
|
|
384 | (4) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
1.10 Identify common features and tools of the macOS/desktop OS |
|
|
391 | (13) |
|
Installation and uninstallation of applications |
|
|
391 | (1) |
|
Apple ID and corporate restrictions |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
394 | (4) |
|
|
398 | (3) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
1.11 Identify common features and tools of the Linux client/desktop OS |
|
|
404 | (15) |
|
|
404 | (7) |
|
|
411 | (3) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (3) |
|
|
419 | (82) |
|
2.1 Summarize various security measures and their purposes |
|
|
427 | (12) |
|
|
427 | (5) |
|
Physical security for staff |
|
|
432 | (3) |
|
|
435 | (1) |
|
Mobile device management (MDM) |
|
|
436 | (1) |
|
|
437 | (2) |
|
|
439 | (1) |
|
2.2 Compare and contrast wireless security protocols and authentication methods |
|
|
439 | (4) |
|
|
439 | (2) |
|
|
441 | (1) |
|
|
442 | (1) |
|
2.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods |
|
|
443 | (9) |
|
|
443 | (6) |
|
|
449 | (3) |
|
|
452 | (1) |
|
2.4 Explain common social-engineering attacks, threats, and vulnerabilities |
|
|
452 | (7) |
|
|
452 | (3) |
|
|
455 | (3) |
|
|
458 | (1) |
|
|
459 | (1) |
|
2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS |
|
|
459 | (12) |
|
|
459 | (2) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
NTFS vs. share permissions |
|
|
464 | (3) |
|
|
467 | (1) |
|
Run as administrator vs. standard user |
|
|
468 | (2) |
|
|
470 | (1) |
|
|
470 | (1) |
|
Encrypting File System (EFS) |
|
|
470 | (1) |
|
|
471 | (1) |
|
2.6 Given a scenario, configure a workstation to meet best practices for security |
|
|
471 | (5) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
Change default administrator's user account/password |
|
|
475 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
2.7 Explain common methods for securing mobile and embedded devices |
|
|
476 | (5) |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
479 | (1) |
|
Remote backup applications |
|
|
479 | (1) |
|
Failed login attempts restrictions |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
2.8 Given a scenario, use common data destruction and disposal methods |
|
|
481 | (4) |
|
|
481 | (1) |
|
Recycling or repurposing best practices |
|
|
482 | (2) |
|
|
484 | (1) |
|
|
484 | (1) |
|
2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks |
|
|
485 | (7) |
|
|
485 | (3) |
|
|
488 | (3) |
|
|
491 | (1) |
|
|
491 | (1) |
|
2.10 Given a scenario, install and configure browsers and relevant security settings |
|
|
492 | (9) |
|
Browser download/installation |
|
|
492 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
Secure connections/sites - valid certificates |
|
|
493 | (1) |
|
|
493 | (3) |
|
|
496 | (1) |
|
|
497 | (4) |
|
Chapter 8 Software Troubleshooting |
|
|
501 | (30) |
|
3.1 Given a scenario, troubleshoot common Windows OS problems |
|
|
505 | (9) |
|
|
505 | (5) |
|
Common troubleshooting steps |
|
|
510 | (4) |
|
|
514 | (1) |
|
3.2 Given a scenario, troubleshoot common personal computer (PC) security issues |
|
|
514 | (4) |
|
|
514 | (3) |
|
|
517 | (1) |
|
|
518 | (1) |
|
3.3 Given a scenario, use best practice procedures for malware removal |
|
|
518 | (2) |
|
1 Investigate and verify malware symptoms |
|
|
518 | (1) |
|
2 Quarantine infected systems |
|
|
519 | (1) |
|
3 Disable System Restore in Windows |
|
|
519 | (1) |
|
4 Remediate infected systems |
|
|
519 | (1) |
|
5 Schedule scans and run updates |
|
|
519 | (1) |
|
6 Enable System Restore and create a restore point in Windows |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
3.4 Given a scenario, troubleshoot common mobile OS and application issues |
|
|
520 | (4) |
|
|
521 | (3) |
|
|
524 | (1) |
|
3.5 Given a scenario, troubleshoot common mobile OS and application security issues |
|
|
524 | (7) |
|
|
524 | (2) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
528 | (3) |
|
Chapter 9 Operational Procedures |
|
|
531 | (56) |
|
4.1 Given a scenario, implement best practices associated with documentation and support systems information management |
|
|
538 | (7) |
|
|
538 | (2) |
|
|
540 | (2) |
|
|
542 | (3) |
|
|
545 | (1) |
|
|
545 | (1) |
|
4.2 Explain basic change-management best practices |
|
|
545 | (3) |
|
Documented business processes |
|
|
546 | (1) |
|
|
546 | (2) |
|
|
548 | (1) |
|
4.3 Given a scenario, implement workstation backup and recovery methods |
|
|
548 | (4) |
|
|
548 | (2) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
4.4 Given a scenario, use common safety procedures |
|
|
552 | (5) |
|
Electrostatic discharge (ESD) straps |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
555 | (1) |
|
Proper component handling and storage |
|
|
555 | (1) |
|
|
555 | (1) |
|
Compliance with government regulations |
|
|
555 | (1) |
|
|
555 | (2) |
|
|
557 | (1) |
|
4.5 Summarize environmental impacts and local environmental controls |
|
|
557 | (8) |
|
Material safety data sheet (MSDS)/documentation for handling and disposal |
|
|
557 | (2) |
|
Temperature, humidity-level awareness, and proper ventilation |
|
|
559 | (3) |
|
Power surges, brownouts, and blackouts |
|
|
562 | (2) |
|
|
564 | (1) |
|
4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts |
|
|
565 | (4) |
|
|
565 | (2) |
|
Licensing/digital rights management (DRM)/end-user license agreement (EULA) |
|
|
567 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
4.7 Given a scenario, use proper communication techniques and professionalism |
|
|
569 | (7) |
|
Professional appearance and attire |
|
|
570 | (1) |
|
Use proper language and avoid jargon, acronyms, and slang, when applicable |
|
|
570 | (1) |
|
Maintain a positive attitude/project confidence |
|
|
571 | (1) |
|
Actively listen, take notes, and avoid interrupting the customer |
|
|
571 | (1) |
|
|
571 | (1) |
|
Be on time (if late, contact the customer) |
|
|
572 | (1) |
|
|
572 | (1) |
|
Dealing with difficult customers or situations |
|
|
573 | (1) |
|
Set and meet expectations/time line and communicate status with the customer |
|
|
574 | (1) |
|
Deal appropriately with customers' confidential and private materials |
|
|
575 | (1) |
|
|
576 | (1) |
|
4.8 Identify the basics of scripting |
|
|
576 | (3) |
|
|
576 | (1) |
|
|
577 | (1) |
|
Other considerations when using scripts |
|
|
578 | (1) |
|
|
579 | (1) |
|
4.9 Given a scenario, use remote access technologies |
|
|
579 | (8) |
|
|
579 | (3) |
|
Security considerations of each access method |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
583 | (4) |
Appendix Answers to the Review Questions |
|
587 | (20) |
|
Chapter 1: Mobile Devices |
|
|
588 | (1) |
|
|
589 | (2) |
|
|
591 | (4) |
|
Chapter 4: Virtualization and Cloud Computing |
|
|
595 | (1) |
|
Chapter 5: Hardware and Network Troubleshooting |
|
|
596 | (2) |
|
Chapter 6: Operating Systems |
|
|
598 | (1) |
|
|
599 | (3) |
|
Chapter 8: Software Troubleshooting |
|
|
602 | (1) |
|
Chapter 9: Operational Procedures |
|
|
603 | (4) |
Index |
|
607 | |