Muutke küpsiste eelistusi

E-raamat: CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

  • Formaat: 1088 pages
  • Ilmumisaeg: 11-Jun-2022
  • Kirjastus: Pearson IT Certification
  • Keel: eng
  • ISBN-13: 9780137637676
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 40,94 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 1088 pages
  • Ilmumisaeg: 11-Jun-2022
  • Kirjastus: Pearson IT Certification
  • Keel: eng
  • ISBN-13: 9780137637676
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams.


Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams!

* Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals
* Work effectively with mobile devices: laptops, tablets, and smartphones
* Configure Windows settings, components, and administrative tools
* Manage and troubleshoot Linux, macOS, Android, and iOS
* Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems
* Understand security features such as firewalls, multifactor authentication, permissions, and access control
* Defend against malware, network threats, and social engineering
* Learn the basics of IT documentation, change management, and incident response


Prepare for your exam with Pearson Test Prep

* Realistic practice questions and answers
* Comprehensive reporting and feedback
* Customized testing in study, practice exam, or flash card modes
* Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives


COMPANION WEBSITE

Your purchase includes access to the practice exams in multiple test modes, videos, challenges, and the CramSheet.

Introduction xxxi
Part I: Introduction to Core 1 (220-1101)
Core 1 (220-1101) Domains
1(1)
Core 1 (220-1101) Checklist
2(5)
Core 1 (220-1101): Domain 1.0: Mobile Devices
Chapter 1 Laptop Hardware and Components
7(22)
Introduction to Laptops
8(1)
Power
8(3)
Keyboards/Keys
11(5)
Special Function Keys
12(2)
Troubleshooting Keyboards
14(2)
Touchpad
16(1)
Random-Access Memory (RAM)
17(2)
Storage Drives
19(2)
Communications
21(2)
Physical Privacy
23(6)
Chapter 2 Mobile Device Display Components
29(10)
Display Types
30(1)
Inverter and Backlight
31(2)
Damaged Inverter
32(1)
Worn-Out Backlight
32(1)
Digitizers and Touchscreens
33(1)
Webcam and Microphone
34(1)
Wi-Fi Antenna Connector and Placement
35(4)
Chapter 3 Mobile Device Accessories and Ports
39(10)
Connection Types
40(3)
Wired Connections
40(2)
Wireless Connections
42(1)
Accessories
43(6)
Docking Stations and Port Replicators
44(1)
Drawing Pads, Touchpads, and Touch Pens
45(4)
Chapter 4 Mobile Device Network Connectivity and Application Support
49(24)
Enabling Wireless Functions
50(3)
Bluetooth
53(2)
Email Configuration
55(2)
Integrated Commercial Provider Email Configuration
55(1)
Corporate and ISP Email Configuration
55(2)
Cellular Radio Technologies
57(2)
Location Services
59(2)
GPS
60(1)
Cellular Location
61(1)
IMEI and IMSI
61(1)
Synchronization Methods
61(4)
Synchronizing to the Cloud
62(1)
Synchronizing to the Desktop
63(1)
Synchronizing to the Automobile
64(1)
Mobile Device Management (MDM)
65(8)
Core 1 (220-1101): Domain 2.0: Networking
Chapter 5 TCP and UDP Ports and Protocols
73(12)
TCP vs. UDP
74(1)
Ports and Protocols
75(10)
HTTP vs. HTTPS
75(2)
Email Protocols
77(1)
FTP, SSH, and Telnet
78(1)
DHCP
79(1)
DNS
80(1)
LDAP
80(1)
RDP
81(1)
More Protocols and Ports
81(4)
Chapter 6 Network Devices
85(12)
Switches
86(1)
Routers
87(1)
Wireless Access Points
87(1)
Firewalls
88(1)
Network Interface Cards
88(1)
Hubs
89(1)
Patch Panels
89(1)
Power over Ethernet
90(2)
Cable/DSL Modems
92(1)
Network Interface Devices
92(1)
Software-Defined Networking
93(4)
Chapter 7 Wireless Protocols
97(10)
802.11 Wireless
98(3)
Long-Range Fixed Wireless
101(1)
RFID
102(5)
Chapter 8 Networked Hosts
107(14)
Server Roles
108(2)
File Servers
108(1)
Web Servers
109(1)
Print Servers
109(1)
Mail Servers
109(1)
Proxy Servers
110(1)
DHCP Servers
110(3)
DNS Servers
111(1)
Syslog Servers
111(1)
AAA Servers
112(1)
Internet Security Appliances
113(3)
Network Firewall
113(1)
UTM
114(1)
Spam Gateway
114(1)
Load Balancer
115(1)
Embedded Systems and IoT
116(5)
Embedded Systems
116(1)
IoT
117(4)
Chapter 9 SOHO Network Configuration
121(12)
Configuring IPv4
122(4)
Private vs. Public Addresses
126(2)
Configuring IPv6
128(5)
Chapter 10 Network Configuration Concepts
133(12)
DNS
134(2)
Email Authentication Methods
136(2)
DHCP
138(3)
DHCP Process
138(2)
DHCP Reservations
140(1)
VLANs
141(1)
VPNs
142(3)
Chapter 11 Network Types
145(10)
Network Types
146(3)
LAN and WAN
146(1)
MAN
147(1)
SAN
147(1)
WLAN
148(1)
WMN
148(1)
PAN
148(1)
Internet Connection Types
149(6)
Cable Internet
149(1)
DSL
150(1)
Fiber
150(1)
Satellite
151(1)
Wireless Internet Service Provider
152(3)
Chapter 12 Networking Tools
155(10)
Network Cabling Tools
156(3)
Network Tap
159(1)
Wi-Fi Analyzers
160(5)
Core 1 (220-1101): Domain 3.0: Hardware
Chapter 13 Cables and Connectors
165(18)
Network Cables
166(6)
Twisted Pair
166(5)
Coaxial
171(1)
Optical
171(1)
Peripheral Cables and Connectors
172(4)
USB
173(2)
Lightning and Thunderbolt
175(1)
Serial
176(1)
Video Cables and Connectors
176(2)
Storage Drive Cables and Connectors
178(1)
Adapters
179(4)
Chapter 14 RAM
183(14)
RAM Types
184(3)
DDR3
184(1)
DDR4
185(1)
DDR5
186(1)
Installing RAM
187(3)
RAM Technologies
190(7)
Single-Channel vs. Multichannel Architectures
191(1)
ECC vs. Non-ECC
192(5)
Chapter 15 Storage Drives
197(16)
SATA
198(2)
Magnetic Hard Drives
200(1)
Solid-State Drives
201(1)
RAID
202(3)
Flash
205(3)
USB Flash Drives
205(2)
Secure Digital Cards
207(1)
Optical Drives
208(5)
Chapter 16 Motherboards and Add-on Cards
213(20)
Motherboard Form Factors and Connector Types
214(5)
ATX
214(2)
microATX
216(1)
ITX
216(1)
Expansion Buses
217(2)
Expansion Cards
219(6)
Installing Video Cards
219(3)
Sound Cards
222(2)
Other Expansion Cards
224(1)
More Ports and Connectors
225(1)
BIOS/UEFI Settings
226(3)
The POST
229(4)
Chapter 17 CPUs
233(18)
CPU Architecture
234(4)
Clock Rate
234(1)
Overclocking
235(1)
Types of CPUs
236(1)
Multithreading and Multicore
237(1)
Cache Memory
238(1)
CPU Compatibility
238(3)
Intel and AMD
238(1)
Sockets
239(2)
Power Consumption
241(1)
Cooling Mechanisms
242(2)
Heat Sinks
242(1)
Thermal Paste
242(1)
Fans
243(1)
Liquid Cooling Systems
244(1)
Installing CPUs
244(7)
Chapter 18 Power
251(12)
Planning Which Power Supply to Use
252(5)
Types of Power Supplies and Compatibility
252(2)
Wattage and Capacity Requirements
254(1)
Number and Type of Power Connectors
255(1)
Modular and Redundant PSUs
256(1)
Installing the Power Supply
257(6)
Chapter 19 Multifunction Devices/Printers
263(12)
Setup Considerations
264(2)
Printer Configuration Settings
266(3)
Basic Printer Configuration Settings
267(1)
Sharing Printers and Managing Permissions
268(1)
Local vs. Network Printers
269(1)
Basic Printer Security
270(5)
Chapter 20 Printer Consumables
275(16)
Laser Printers
276(4)
Inkjet Printers
280(2)
Thermal Printers
282(1)
Impact Printers
283(1)
3D Printers
284(7)
Core 1 (220-1101): Domain 4.0: Virtualization And Cloud Computing
Chapter 21 Cloud Computing Concepts
291(8)
Introduction to Cloud Computing
292(1)
Common Cloud Models
292(2)
Cloud Computing Characteristics
294(2)
Desktop Virtualization
296(3)
Chapter 22 Client-Side Virtualization
299(20)
Purpose of Virtual Machines
300(1)
Hypervisors
301(1)
Examples of Virtual Machine Software
302(3)
Virtual Machine Requirements
305(3)
Cross-Platform Virtualization
308(1)
Containers and Sandboxes
309(10)
OS-Level Virtualization (Containers)
310(1)
Sandboxes
311(8)
Core 1 (220-1101): Domain 5.0: Hardware And Network Troubleshooting
Chapter 23 Computer Troubleshooting 101
319(10)
The CompTIA Six-Step Troubleshooting Process
320(9)
Step 1: Identify the Problem
321(1)
Step 2: Establish a Theory of Probable Cause (Question the Obvious)
322(1)
Step 3: Test the Theory to Determine the Cause
323(1)
Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution
323(1)
Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures
324(1)
Step 6: Document the Findings, Actions, and Outcomes
324(5)
Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power
329(16)
Troubleshooting Motherboards
330(3)
Troubleshooting CPUs
333(2)
Troubleshooting RANI
335(2)
Troubleshooting Power Supply Issues
337(3)
Heating and Cooling
340(5)
Chapter 25 Troubleshooting Storage Drives and RAID Arrays
345(12)
Preventive Maintenance and Troubleshooting of Storage Drives
346(5)
Storage Drive Preventive Maintenance
346(2)
Storage Drive Troubleshooting
348(3)
Troubleshooting RAID Arrays
351(6)
Chapter 26 Troubleshooting Video Issues
357(12)
PC Video Troubleshooting
358(4)
External Laptop Monitors and Projectors
362(7)
External Laptop Monitors
362(2)
Projectors
364(5)
Chapter 27 Troubleshooting Mobile Devices
369(10)
Mobile Device Display Troubleshooting
370(1)
Mobile Device Overheating
371(1)
More Mobile Device Troubleshooting
372(2)
Disassembling Processes
374(5)
Chapter 28 Troubleshooting Printers
379(14)
Troubleshooting Printers
380(5)
Print Jobs and the Print Spooler
385(8)
Managing Printers and Print Jobs
385(1)
The Windows Print Spooler
385(8)
Chapter 29 Troubleshooting Wired and Wireless Network Problems
393(60)
Troubleshooting Common Symptoms
394(9)
A+ Core 1 (220-1101) Practice Exam
403(50)
Exam Questions
403(16)
Answers at a Glance
419(3)
Answer Explanations
422(525)
Part II: Introduction to Core 2 (220-1102)
Core 2 (220-1102) Domains
947
Core 2 (220-1102) Checklist
448(5)
Core 2 (220-1102): Domain 1.0: Operating Systems
Chapter 30 Comparing Windows Editions
453(12)
Windows
10(444)
Editions and Feature Differences
454(1)
Windows Desktop/User Interface and Components
455(5)
Windows 10 Upgrade Paths
460(1)
Windows 11
461(4)
Chapter 31 Microsoft Command-Line Tools, Part I
465(16)
Microsoft Command-Line Basics
466(3)
Command Prompt
466(1)
PowerShell
467(1)
Windows Terminal
468(1)
Ask for Help!
469(1)
Navigating in the Command Line
469(3)
Working with Directories and Files
472(1)
Partitioning and File System-Based Commands
473(1)
chkdsk and sfc
474(1)
chkdsk
474(1)
SFC
475(1)
winver and shutdown
475(2)
shutdown
477(1)
Advanced Commands: gpupdate and gpresult
477(4)
Chapter 32 Microsoft Command-Line Tools, Part II
481(12)
Networking Commands
482(11)
ipconfig
482(1)
ping
483(3)
tracert and pathping
486(1)
hostname
487(1)
netstat
488(1)
nslookup
489(1)
net
489(1)
Bonus Command: arp
490(3)
Chapter 33 Microsoft Operating System Features and Tools, Part I
493(16)
Task Manager
494(2)
The MMC and Administrative Tools
496(13)
The MMC
497(1)
Event Viewer
498(3)
Task Scheduler
501(1)
Device Manager
501(2)
Certificate Manager
503(1)
Local Users and Groups
503(1)
Performance Monitor
503(2)
Group Policy Editor and Local Security Policy
505(1)
Services
506(1)
Bonus Tool: Computer Management
506(3)
Chapter 34 Microsoft Operating System Features and Tools, Part II
509(14)
Disk Management
510(5)
The Disk Management Utility
510(2)
Mount Points and Mounting a Drive
512(1)
Storage Spaces
513(1)
Disk Cleanup
513(1)
Optimize Drives/Disk Defragmenter
514(1)
Additional Windows Tools
515(8)
System Information/msinfo32
515(1)
Resource Monitor
515(1)
System Configuration/MSConfig
516(2)
The Windows Registry
518(5)
Chapter 35 Windows Control Panel Utilities
523(16)
Opening and Viewing the Control Panel Utilities
524(15)
Internet Options
525(1)
Devices and Printers
526(1)
Programs and Features
526(1)
Program Compatibility
527(1)
Windows Defender Firewall
528(1)
Mail
528(1)
Sound
528(2)
User Accounts
530(1)
Indexing Options
530(1)
File Explorer Options
531(2)
Power Management
533(3)
Ease of Access Center
536(3)
Chapter 36 Windows Settings
539(20)
How to Access Settings
540(1)
Time & Language
541(1)
Update & Security
542(2)
Windows Update
542(1)
Windows Defender Firewall
543(1)
Personalization
544(1)
Apps
544(1)
Privacy
544(1)
System
545(8)
Display
545(3)
Power & Sleep
548(1)
Storage
548(1)
About and System Properties
548(3)
Virtual Memory
551(2)
Devices
553(1)
Network & Internet
554(1)
Gaming
554(1)
Accounts
555(4)
Chapter 37 Windows Networking
559(14)
Workgroup vs. Domain Setup
560(7)
Sharing Resources and Making Network Connections
561(4)
Printer Sharing and Access
565(2)
Establishing Networking Connections
567(1)
Proxy Settings
568(5)
Chapter 38 Application Installation and Configuration Concepts
573(12)
32-Bit vs. 64-Bit
574(1)
System and OS Requirements for Applications
575(2)
Scenario 1: Video Editing Program
576(1)
Scenario 2: Developer Program
577(1)
Distribution Methods
577(1)
Other Considerations for New Applications
578(7)
Application Impact
579(1)
User Permissions
580(1)
Security Considerations
580(5)
Chapter 39 Common Operating Systems
585(14)
Workstation Operating Systems
586(2)
Smartphone and Tablet Operating Systems
588(2)
Android
588(1)
iOS
589(1)
iPadOS
589(1)
File System Types and Formatting
590(3)
Windows File System Basics
590(1)
Linux File System Basics
591(2)
macOS File System Basics
593(1)
Vendor Life-Cycle Limitations
593(2)
Compatibility Concerns Between Operating Systems
595(4)
Chapter 40 Operating System Installations and Upgrades
599(14)
Boot Methods
600(2)
Types of Installations
602(3)
Partitioning
605(2)
Primary and Extended Partitions and Logical Drives
605(1)
Basic and Dynamic Drives
605(1)
GPT vs. MBR
606(1)
More OS Installation and Upgrade Considerations
607(6)
Chapter 41 macOS
613(14)
macOS Basics
614(1)
System Preferences
615(1)
macOS Features
616(3)
Managing and Maintaining macOS
619(2)
Installation and Uninstallation of Applications
621(2)
Apple ID
623(4)
Chapter 42 Linux
627(18)
Linux Basics
628(1)
Linux Desktop Distributions
629(1)
Linux Partition Scheme and File System
630(1)
Linux Command Line
630(5)
Samba
635(1)
Linux Best Practices
636(9)
Updates and Patches.
636(2)
Backups
638(1)
Anti-malware
639(1)
In Closing
639(6)
Core 2 (220-1102): Domain 2.0: Security
Chapter 43 Physical Security
645(8)
Physical Locks
646(1)
Entry Systems
647(1)
Biometrics
648(1)
Other Physical Security Precautions
649(1)
Protecting Data Physically
650(3)
Chapter 44 Logical Security
653(16)
Authentication
654(1)
Principle of Least Privilege
655(1)
MDM Policies
656(1)
Active Directory
656(6)
User Profiles
658(1)
Logon Script
658(1)
Home Folder
659(1)
Group Policy
659(2)
Security Groups
661(1)
More Logical Security Concepts
662(7)
Authenticator Applications
662(1)
Hard Tokens vs. Soft Tokens
663(1)
Access Control Lists
663(1)
SMS
664(1)
Email Security
664(5)
Chapter 45 Wireless Security and Malware
669(16)
Comparing/Contrasting Wireless Security Protocols and Authentication Methods
670(6)
Wireless and Encryption Protocols
670(2)
RADIUS and TACACS+
672(2)
Kerberos
674(2)
Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods
676(9)
Malicious Software Types
676(2)
Preventing Malicious Software
678(7)
Chapter 46 Social Engineering
685(14)
Social Engineering
686(3)
Phishing
686(1)
Evil Twin
687(1)
Shoulder Surfing
687(1)
Piggybacking/Tailgating
688(1)
Dumpster Diving
688(1)
Impersonation
689(1)
Threats and Vulnerabilities
689(10)
Network-Based Attacks
689(2)
Password Cracking
691(1)
Additional Security Threats
692(2)
Vulnerabilities and Security Best Practices
694(5)
Chapter 47 Windows Security Settings
699(18)
The CIA of Computer Security
700(1)
Windows Defender Antivirus
700(1)
Windows Defender Firewall
701(2)
Users and Groups
703(4)
Permissions
707(3)
Permission Inheritance and Propagation
708(2)
Moving and Copying Folders and Files
710(1)
File Security
710(7)
Administrative Shares
711(1)
Encrypting File System
712(1)
BitLocker Encryption
713(4)
Chapter 48 Windows Best Practices
717(12)
Usernames and Passwords
718(1)
Password Policies
719(1)
Account Management and End-User Best Practices
720(4)
Disabling AutoPlay/AutoRun
724(5)
Chapter 49 Mobile Device Security
729(16)
Screen Locks
730(2)
Authenticator Applications
732(1)
Theft and Loss of Mobile Devices
733(1)
Compromised and Damaged Devices
734(5)
Backups
734(1)
Updates
735(1)
Antivirus/Anti-malware/Firewalls
735(1)
MDM and MAM
736(1)
Full Device Encryption
737(2)
IoT Security
739(1)
Policies and Procedures
740(5)
Profile Security Requirements
741(4)
Chapter 50 Data Destruction and Disposal
745(8)
Data Security 101
746(1)
Formatting Drives
746(1)
Overwriting Drives
747(2)
Clear
749(1)
Purge
749(1)
Destroy
750(3)
Chapter 51 SOHO Security
753(12)
Changing Default Passwords
754(1)
Wireless-Specific Security Settings
754(3)
Changing and Disabling the SSID
755(1)
Antennas and Radio Power Levels
756(1)
Guest Networks
757(1)
Disabling WPS
757(1)
Enabling MAC Filtering and IP Filtering
757(1)
Assigning Static IP Addresses
758(1)
Firewall Settings and Additional Configurations
759(1)
Content Filtering/Parental Controls
760(1)
Disabling Physical Ports and More Physical Security
761(1)
A Final Word on SOHO Routers
761(4)
Chapter 52 Browser Security
765(16)
Browser Download/Installation
766(2)
Settings
768(1)
Extensions and Plug-ins
769(1)
Password Managers
770(1)
Secure Connections
771(3)
TLS
772(1)
Secure Sites and Tracking
773(1)
More Settings
774(7)
Core 2 (220-1102): Domain 3.0: Software Troubleshooting
Chapter 53 Troubleshooting Microsoft Windows
781(22)
Windows Recovery
782(5)
Windows Recovery Environment (Windows RE)
782(3)
Startup Settings
785(2)
System Restore
787(2)
Improper, Spontaneous, and Frequent Shutdowns
789(1)
Stop Errors
790(2)
Restoring Windows
792(1)
Common Windows Symptoms and Solutions
793(10)
Chapter 54 Troubleshooting PC Security Issues
803(12)
The CompTIA A+ Seven-Step Malware Removal Procedure
804(1)
Malware Removal Scenario
805(4)
1 Investigate and Verify Malware Symptoms
805(1)
2 Quarantine the Infected Systems
805(1)
3 Disable System Restore in Windows
806(1)
4 Remediate the Infected Systems
807(1)
5 Schedule Scans and Run Updates
808(1)
6 Enable System Restore and Create a Restore Point (in Windows)
808(1)
7 Educate the End User
809(1)
Symptoms of Viruses
809(1)
Symptoms of Spyware
810(1)
More Symptoms of PC Security Issues and Potential Solutions
811(4)
Chapter 55 Troubleshooting Mobile Operating Systems and Applications
815(16)
Wireless Troubleshooting
816(5)
Wi-Fi Troubleshooting
816(3)
Bluetooth Troubleshooting
819(1)
NFC and AirDrop Troubleshooting
820(1)
Troubleshooting Email Connections
821(2)
Troubleshooting and Stopping Applications
823(1)
Initiating Resets
824(1)
More Mobile Application and OS Troubleshooting
825(2)
Updates: The Good and the Bad
825(1)
Application Issues
826(1)
Random Reboots
826(1)
Poor Battery Life
827(1)
Video Issues
827(4)
Chapter 56 Troubleshooting Mobile Operating Systems Security Issues
831(10)
Mobile Device Security Concerns and Symptoms
832(9)
Core 2 (220-1102): Domain 4.0: Operational Procedures
Chapter 57 Documentation
841(16)
Types of Documents
842(6)
Network Topology Diagrams
842(2)
Incident Report Documentation
844(1)
Standard Operating Procedure
844(2)
Compliance and Regulatory Policy
846(1)
Acceptable Use Policy
847(1)
User Checklists (Onboarding and Offboarding)
848(1)
Knowledge Bases/Articles
848(3)
Ticketing Systems
851(1)
Asset Management
852(5)
Chapter 58 Change Management and Backup Methods
857(16)
Understanding Basic Change Management Best Practices
858(3)
Implementing Workstation Backup and Recovery Methods
861(12)
Using Windows File History and Recovery
862(1)
Backup Methods
863(3)
Backup Testing
866(1)
Backup Rotation Schemes
867(6)
Chapter 59 Safety Procedures
873(10)
ESD Prevention and Equipment Grounding
874(2)
Electrical Safety
876(2)
Electrical Fire Safety
878(1)
Physical Safety
879(4)
Chapter 60 Environmental Controls
883(10)
Temperature, Humidity, and Air
884(1)
MSDS and Disposal
885(2)
Power Devices
887(6)
Surge Protectors
888(1)
Uninterruptible Power Supplies
888(5)
Chapter 61 Incident Response, Communication, and Professionalism
893(18)
Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts
894(10)
Incident Response
894(3)
Licensing/DRM/EULA
897(2)
Regulated Data
899(5)
Using Proper Communication Techniques and Professionalism
904(7)
Communication Techniques and Professionalism
905(6)
Chapter 62 Basic Scripting, Part I
911(8)
Programming 101
912(7)
Basic Data Types
912(1)
Basic Script Constructs
913(2)
Environment Variables
915(1)
Comment Syntax
915(4)
Chapter 63 Basic Scripting, Part II
919(18)
PowerShell and .ps1
920(4)
Bash and .sh
924(5)
Use Cases and Other Considerations for PowerShell and Bash
929(2)
Python and .py
931(2)
JavaScript and .js
933(1)
Visual Basic Script and .vbs
934(3)
Chapter 64 Remote Access Technologies
937(60)
Remote Desktop
938(4)
Remote Assistance
938(1)
Remote Desktop Connection
939(1)
Connecting with Remote Desktop
939(3)
SSH
942(2)
More Third-Party Tools
944(1)
VPN
945(4)
A+ Core 2 (220-1102) Practice Exam
949(48)
Exam Questions
949(18)
Answers at a Glance
967(3)
Answer Explanations
970(27)
Chapter 65 Getting Ready for the Exams, and Farewell
997(10)
Getting Ready for the Exams
998(2)
Tips for Taking the Real Exams
1000(4)
General Practices for Taking Exams
1001(2)
Smart Methods for Difficult Questions
1003(1)
Wrapping Up the Exam
1004(1)
Beyond the CompTIA A+ Certification
1004(3)
Index 1007
David L. Prowse has more than 20 years of experience in the IT field and loves to share his knowledge with readers, viewers, and students. Dave is an advocate of lifelong learning, self-improvement, building confidence, and the sharing of knowledge, and he promotes these ideas in his books, videos, and classes. He answers questions at his websites: https://dprocomputer.com (for A+) and https://prowse.tech (for Linux).