Introduction |
|
xxxi | |
Part I: Introduction to Core 1 (220-1101) |
|
|
Core 1 (220-1101) Domains |
|
|
1 | (1) |
|
Core 1 (220-1101) Checklist |
|
|
2 | (5) |
|
Core 1 (220-1101): Domain 1.0: Mobile Devices |
|
|
|
Chapter 1 Laptop Hardware and Components |
|
|
7 | (22) |
|
|
8 | (1) |
|
|
8 | (3) |
|
|
11 | (5) |
|
|
12 | (2) |
|
Troubleshooting Keyboards |
|
|
14 | (2) |
|
|
16 | (1) |
|
Random-Access Memory (RAM) |
|
|
17 | (2) |
|
|
19 | (2) |
|
|
21 | (2) |
|
|
23 | (6) |
|
Chapter 2 Mobile Device Display Components |
|
|
29 | (10) |
|
|
30 | (1) |
|
|
31 | (2) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Digitizers and Touchscreens |
|
|
33 | (1) |
|
|
34 | (1) |
|
Wi-Fi Antenna Connector and Placement |
|
|
35 | (4) |
|
Chapter 3 Mobile Device Accessories and Ports |
|
|
39 | (10) |
|
|
40 | (3) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
43 | (6) |
|
Docking Stations and Port Replicators |
|
|
44 | (1) |
|
Drawing Pads, Touchpads, and Touch Pens |
|
|
45 | (4) |
|
Chapter 4 Mobile Device Network Connectivity and Application Support |
|
|
49 | (24) |
|
Enabling Wireless Functions |
|
|
50 | (3) |
|
|
53 | (2) |
|
|
55 | (2) |
|
Integrated Commercial Provider Email Configuration |
|
|
55 | (1) |
|
Corporate and ISP Email Configuration |
|
|
55 | (2) |
|
Cellular Radio Technologies |
|
|
57 | (2) |
|
|
59 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (4) |
|
Synchronizing to the Cloud |
|
|
62 | (1) |
|
Synchronizing to the Desktop |
|
|
63 | (1) |
|
Synchronizing to the Automobile |
|
|
64 | (1) |
|
Mobile Device Management (MDM) |
|
|
65 | (8) |
|
Core 1 (220-1101): Domain 2.0: Networking |
|
|
|
Chapter 5 TCP and UDP Ports and Protocols |
|
|
73 | (12) |
|
|
74 | (1) |
|
|
75 | (10) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (4) |
|
Chapter 6 Network Devices |
|
|
85 | (12) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (2) |
|
|
92 | (1) |
|
Network Interface Devices |
|
|
92 | (1) |
|
Software-Defined Networking |
|
|
93 | (4) |
|
Chapter 7 Wireless Protocols |
|
|
97 | (10) |
|
|
98 | (3) |
|
Long-Range Fixed Wireless |
|
|
101 | (1) |
|
|
102 | (5) |
|
Chapter 8 Networked Hosts |
|
|
107 | (14) |
|
|
108 | (2) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (3) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Internet Security Appliances |
|
|
113 | (3) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (5) |
|
|
116 | (1) |
|
|
117 | (4) |
|
Chapter 9 SOHO Network Configuration |
|
|
121 | (12) |
|
|
122 | (4) |
|
Private vs. Public Addresses |
|
|
126 | (2) |
|
|
128 | (5) |
|
Chapter 10 Network Configuration Concepts |
|
|
133 | (12) |
|
|
134 | (2) |
|
Email Authentication Methods |
|
|
136 | (2) |
|
|
138 | (3) |
|
|
138 | (2) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (3) |
|
|
145 | (10) |
|
|
146 | (3) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
Internet Connection Types |
|
|
149 | (6) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
Wireless Internet Service Provider |
|
|
152 | (3) |
|
Chapter 12 Networking Tools |
|
|
155 | (10) |
|
|
156 | (3) |
|
|
159 | (1) |
|
|
160 | (5) |
|
Core 1 (220-1101): Domain 3.0: Hardware |
|
|
|
Chapter 13 Cables and Connectors |
|
|
165 | (18) |
|
|
166 | (6) |
|
|
166 | (5) |
|
|
171 | (1) |
|
|
171 | (1) |
|
Peripheral Cables and Connectors |
|
|
172 | (4) |
|
|
173 | (2) |
|
Lightning and Thunderbolt |
|
|
175 | (1) |
|
|
176 | (1) |
|
Video Cables and Connectors |
|
|
176 | (2) |
|
Storage Drive Cables and Connectors |
|
|
178 | (1) |
|
|
179 | (4) |
|
|
183 | (14) |
|
|
184 | (3) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (3) |
|
|
190 | (7) |
|
Single-Channel vs. Multichannel Architectures |
|
|
191 | (1) |
|
|
192 | (5) |
|
Chapter 15 Storage Drives |
|
|
197 | (16) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (3) |
|
|
205 | (3) |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
208 | (5) |
|
Chapter 16 Motherboards and Add-on Cards |
|
|
213 | (20) |
|
Motherboard Form Factors and Connector Types |
|
|
214 | (5) |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (2) |
|
|
219 | (6) |
|
|
219 | (3) |
|
|
222 | (2) |
|
|
224 | (1) |
|
More Ports and Connectors |
|
|
225 | (1) |
|
|
226 | (3) |
|
|
229 | (4) |
|
|
233 | (18) |
|
|
234 | (4) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
Multithreading and Multicore |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (3) |
|
|
238 | (1) |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (2) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (7) |
|
|
251 | (12) |
|
Planning Which Power Supply to Use |
|
|
252 | (5) |
|
Types of Power Supplies and Compatibility |
|
|
252 | (2) |
|
Wattage and Capacity Requirements |
|
|
254 | (1) |
|
Number and Type of Power Connectors |
|
|
255 | (1) |
|
Modular and Redundant PSUs |
|
|
256 | (1) |
|
Installing the Power Supply |
|
|
257 | (6) |
|
Chapter 19 Multifunction Devices/Printers |
|
|
263 | (12) |
|
|
264 | (2) |
|
Printer Configuration Settings |
|
|
266 | (3) |
|
Basic Printer Configuration Settings |
|
|
267 | (1) |
|
Sharing Printers and Managing Permissions |
|
|
268 | (1) |
|
Local vs. Network Printers |
|
|
269 | (1) |
|
|
270 | (5) |
|
Chapter 20 Printer Consumables |
|
|
275 | (16) |
|
|
276 | (4) |
|
|
280 | (2) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (7) |
|
Core 1 (220-1101): Domain 4.0: Virtualization And Cloud Computing |
|
|
|
Chapter 21 Cloud Computing Concepts |
|
|
291 | (8) |
|
Introduction to Cloud Computing |
|
|
292 | (1) |
|
|
292 | (2) |
|
Cloud Computing Characteristics |
|
|
294 | (2) |
|
|
296 | (3) |
|
Chapter 22 Client-Side Virtualization |
|
|
299 | (20) |
|
Purpose of Virtual Machines |
|
|
300 | (1) |
|
|
301 | (1) |
|
Examples of Virtual Machine Software |
|
|
302 | (3) |
|
Virtual Machine Requirements |
|
|
305 | (3) |
|
Cross-Platform Virtualization |
|
|
308 | (1) |
|
|
309 | (10) |
|
OS-Level Virtualization (Containers) |
|
|
310 | (1) |
|
|
311 | (8) |
|
Core 1 (220-1101): Domain 5.0: Hardware And Network Troubleshooting |
|
|
|
Chapter 23 Computer Troubleshooting 101 |
|
|
319 | (10) |
|
The CompTIA Six-Step Troubleshooting Process |
|
|
320 | (9) |
|
Step 1: Identify the Problem |
|
|
321 | (1) |
|
Step 2: Establish a Theory of Probable Cause (Question the Obvious) |
|
|
322 | (1) |
|
Step 3: Test the Theory to Determine the Cause |
|
|
323 | (1) |
|
Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
323 | (1) |
|
Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures |
|
|
324 | (1) |
|
Step 6: Document the Findings, Actions, and Outcomes |
|
|
324 | (5) |
|
Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power |
|
|
329 | (16) |
|
Troubleshooting Motherboards |
|
|
330 | (3) |
|
|
333 | (2) |
|
|
335 | (2) |
|
Troubleshooting Power Supply Issues |
|
|
337 | (3) |
|
|
340 | (5) |
|
Chapter 25 Troubleshooting Storage Drives and RAID Arrays |
|
|
345 | (12) |
|
Preventive Maintenance and Troubleshooting of Storage Drives |
|
|
346 | (5) |
|
Storage Drive Preventive Maintenance |
|
|
346 | (2) |
|
Storage Drive Troubleshooting |
|
|
348 | (3) |
|
Troubleshooting RAID Arrays |
|
|
351 | (6) |
|
Chapter 26 Troubleshooting Video Issues |
|
|
357 | (12) |
|
|
358 | (4) |
|
External Laptop Monitors and Projectors |
|
|
362 | (7) |
|
|
362 | (2) |
|
|
364 | (5) |
|
Chapter 27 Troubleshooting Mobile Devices |
|
|
369 | (10) |
|
Mobile Device Display Troubleshooting |
|
|
370 | (1) |
|
Mobile Device Overheating |
|
|
371 | (1) |
|
More Mobile Device Troubleshooting |
|
|
372 | (2) |
|
|
374 | (5) |
|
Chapter 28 Troubleshooting Printers |
|
|
379 | (14) |
|
|
380 | (5) |
|
Print Jobs and the Print Spooler |
|
|
385 | (8) |
|
Managing Printers and Print Jobs |
|
|
385 | (1) |
|
The Windows Print Spooler |
|
|
385 | (8) |
|
Chapter 29 Troubleshooting Wired and Wireless Network Problems |
|
|
393 | (60) |
|
Troubleshooting Common Symptoms |
|
|
394 | (9) |
|
A+ Core 1 (220-1101) Practice Exam |
|
|
403 | (50) |
|
|
403 | (16) |
|
|
419 | (3) |
|
|
422 | (525) |
Part II: Introduction to Core 2 (220-1102) |
|
|
Core 2 (220-1102) Domains |
|
|
947 | |
|
Core 2 (220-1102) Checklist |
|
|
448 | (5) |
|
Core 2 (220-1102): Domain 1.0: Operating Systems |
|
|
|
Chapter 30 Comparing Windows Editions |
|
|
453 | (12) |
|
|
10 | (444) |
|
Editions and Feature Differences |
|
|
454 | (1) |
|
Windows Desktop/User Interface and Components |
|
|
455 | (5) |
|
|
460 | (1) |
|
|
461 | (4) |
|
Chapter 31 Microsoft Command-Line Tools, Part I |
|
|
465 | (16) |
|
Microsoft Command-Line Basics |
|
|
466 | (3) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
469 | (1) |
|
Navigating in the Command Line |
|
|
469 | (3) |
|
Working with Directories and Files |
|
|
472 | (1) |
|
Partitioning and File System-Based Commands |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
475 | (2) |
|
|
477 | (1) |
|
Advanced Commands: gpupdate and gpresult |
|
|
477 | (4) |
|
Chapter 32 Microsoft Command-Line Tools, Part II |
|
|
481 | (12) |
|
|
482 | (11) |
|
|
482 | (1) |
|
|
483 | (3) |
|
|
486 | (1) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (3) |
|
Chapter 33 Microsoft Operating System Features and Tools, Part I |
|
|
493 | (16) |
|
|
494 | (2) |
|
The MMC and Administrative Tools |
|
|
496 | (13) |
|
|
497 | (1) |
|
|
498 | (3) |
|
|
501 | (1) |
|
|
501 | (2) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (2) |
|
Group Policy Editor and Local Security Policy |
|
|
505 | (1) |
|
|
506 | (1) |
|
Bonus Tool: Computer Management |
|
|
506 | (3) |
|
Chapter 34 Microsoft Operating System Features and Tools, Part II |
|
|
509 | (14) |
|
|
510 | (5) |
|
The Disk Management Utility |
|
|
510 | (2) |
|
Mount Points and Mounting a Drive |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
513 | (1) |
|
Optimize Drives/Disk Defragmenter |
|
|
514 | (1) |
|
|
515 | (8) |
|
System Information/msinfo32 |
|
|
515 | (1) |
|
|
515 | (1) |
|
System Configuration/MSConfig |
|
|
516 | (2) |
|
|
518 | (5) |
|
Chapter 35 Windows Control Panel Utilities |
|
|
523 | (16) |
|
Opening and Viewing the Control Panel Utilities |
|
|
524 | (15) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
526 | (1) |
|
|
527 | (1) |
|
Windows Defender Firewall |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
528 | (2) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
531 | (2) |
|
|
533 | (3) |
|
|
536 | (3) |
|
Chapter 36 Windows Settings |
|
|
539 | (20) |
|
|
540 | (1) |
|
|
541 | (1) |
|
|
542 | (2) |
|
|
542 | (1) |
|
Windows Defender Firewall |
|
|
543 | (1) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
545 | (8) |
|
|
545 | (3) |
|
|
548 | (1) |
|
|
548 | (1) |
|
About and System Properties |
|
|
548 | (3) |
|
|
551 | (2) |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
554 | (1) |
|
|
555 | (4) |
|
Chapter 37 Windows Networking |
|
|
559 | (14) |
|
Workgroup vs. Domain Setup |
|
|
560 | (7) |
|
Sharing Resources and Making Network Connections |
|
|
561 | (4) |
|
Printer Sharing and Access |
|
|
565 | (2) |
|
Establishing Networking Connections |
|
|
567 | (1) |
|
|
568 | (5) |
|
Chapter 38 Application Installation and Configuration Concepts |
|
|
573 | (12) |
|
|
574 | (1) |
|
System and OS Requirements for Applications |
|
|
575 | (2) |
|
Scenario 1: Video Editing Program |
|
|
576 | (1) |
|
Scenario 2: Developer Program |
|
|
577 | (1) |
|
|
577 | (1) |
|
Other Considerations for New Applications |
|
|
578 | (7) |
|
|
579 | (1) |
|
|
580 | (1) |
|
|
580 | (5) |
|
Chapter 39 Common Operating Systems |
|
|
585 | (14) |
|
Workstation Operating Systems |
|
|
586 | (2) |
|
Smartphone and Tablet Operating Systems |
|
|
588 | (2) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
File System Types and Formatting |
|
|
590 | (3) |
|
Windows File System Basics |
|
|
590 | (1) |
|
|
591 | (2) |
|
|
593 | (1) |
|
Vendor Life-Cycle Limitations |
|
|
593 | (2) |
|
Compatibility Concerns Between Operating Systems |
|
|
595 | (4) |
|
Chapter 40 Operating System Installations and Upgrades |
|
|
599 | (14) |
|
|
600 | (2) |
|
|
602 | (3) |
|
|
605 | (2) |
|
Primary and Extended Partitions and Logical Drives |
|
|
605 | (1) |
|
|
605 | (1) |
|
|
606 | (1) |
|
More OS Installation and Upgrade Considerations |
|
|
607 | (6) |
|
|
613 | (14) |
|
|
614 | (1) |
|
|
615 | (1) |
|
|
616 | (3) |
|
Managing and Maintaining macOS |
|
|
619 | (2) |
|
Installation and Uninstallation of Applications |
|
|
621 | (2) |
|
|
623 | (4) |
|
|
627 | (18) |
|
|
628 | (1) |
|
Linux Desktop Distributions |
|
|
629 | (1) |
|
Linux Partition Scheme and File System |
|
|
630 | (1) |
|
|
630 | (5) |
|
|
635 | (1) |
|
|
636 | (9) |
|
|
636 | (2) |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
639 | (6) |
|
Core 2 (220-1102): Domain 2.0: Security |
|
|
|
Chapter 43 Physical Security |
|
|
645 | (8) |
|
|
646 | (1) |
|
|
647 | (1) |
|
|
648 | (1) |
|
Other Physical Security Precautions |
|
|
649 | (1) |
|
Protecting Data Physically |
|
|
650 | (3) |
|
Chapter 44 Logical Security |
|
|
653 | (16) |
|
|
654 | (1) |
|
Principle of Least Privilege |
|
|
655 | (1) |
|
|
656 | (1) |
|
|
656 | (6) |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (2) |
|
|
661 | (1) |
|
More Logical Security Concepts |
|
|
662 | (7) |
|
Authenticator Applications |
|
|
662 | (1) |
|
Hard Tokens vs. Soft Tokens |
|
|
663 | (1) |
|
|
663 | (1) |
|
|
664 | (1) |
|
|
664 | (5) |
|
Chapter 45 Wireless Security and Malware |
|
|
669 | (16) |
|
Comparing/Contrasting Wireless Security Protocols and Authentication Methods |
|
|
670 | (6) |
|
Wireless and Encryption Protocols |
|
|
670 | (2) |
|
|
672 | (2) |
|
|
674 | (2) |
|
Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods |
|
|
676 | (9) |
|
|
676 | (2) |
|
Preventing Malicious Software |
|
|
678 | (7) |
|
Chapter 46 Social Engineering |
|
|
685 | (14) |
|
|
686 | (3) |
|
|
686 | (1) |
|
|
687 | (1) |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
688 | (1) |
|
|
689 | (1) |
|
Threats and Vulnerabilities |
|
|
689 | (10) |
|
|
689 | (2) |
|
|
691 | (1) |
|
Additional Security Threats |
|
|
692 | (2) |
|
Vulnerabilities and Security Best Practices |
|
|
694 | (5) |
|
Chapter 47 Windows Security Settings |
|
|
699 | (18) |
|
The CIA of Computer Security |
|
|
700 | (1) |
|
Windows Defender Antivirus |
|
|
700 | (1) |
|
Windows Defender Firewall |
|
|
701 | (2) |
|
|
703 | (4) |
|
|
707 | (3) |
|
Permission Inheritance and Propagation |
|
|
708 | (2) |
|
Moving and Copying Folders and Files |
|
|
710 | (1) |
|
|
710 | (7) |
|
|
711 | (1) |
|
|
712 | (1) |
|
|
713 | (4) |
|
Chapter 48 Windows Best Practices |
|
|
717 | (12) |
|
|
718 | (1) |
|
|
719 | (1) |
|
Account Management and End-User Best Practices |
|
|
720 | (4) |
|
Disabling AutoPlay/AutoRun |
|
|
724 | (5) |
|
Chapter 49 Mobile Device Security |
|
|
729 | (16) |
|
|
730 | (2) |
|
Authenticator Applications |
|
|
732 | (1) |
|
Theft and Loss of Mobile Devices |
|
|
733 | (1) |
|
Compromised and Damaged Devices |
|
|
734 | (5) |
|
|
734 | (1) |
|
|
735 | (1) |
|
Antivirus/Anti-malware/Firewalls |
|
|
735 | (1) |
|
|
736 | (1) |
|
|
737 | (2) |
|
|
739 | (1) |
|
|
740 | (5) |
|
Profile Security Requirements |
|
|
741 | (4) |
|
Chapter 50 Data Destruction and Disposal |
|
|
745 | (8) |
|
|
746 | (1) |
|
|
746 | (1) |
|
|
747 | (2) |
|
|
749 | (1) |
|
|
749 | (1) |
|
|
750 | (3) |
|
|
753 | (12) |
|
Changing Default Passwords |
|
|
754 | (1) |
|
Wireless-Specific Security Settings |
|
|
754 | (3) |
|
Changing and Disabling the SSID |
|
|
755 | (1) |
|
Antennas and Radio Power Levels |
|
|
756 | (1) |
|
|
757 | (1) |
|
|
757 | (1) |
|
Enabling MAC Filtering and IP Filtering |
|
|
757 | (1) |
|
Assigning Static IP Addresses |
|
|
758 | (1) |
|
Firewall Settings and Additional Configurations |
|
|
759 | (1) |
|
Content Filtering/Parental Controls |
|
|
760 | (1) |
|
Disabling Physical Ports and More Physical Security |
|
|
761 | (1) |
|
A Final Word on SOHO Routers |
|
|
761 | (4) |
|
Chapter 52 Browser Security |
|
|
765 | (16) |
|
Browser Download/Installation |
|
|
766 | (2) |
|
|
768 | (1) |
|
|
769 | (1) |
|
|
770 | (1) |
|
|
771 | (3) |
|
|
772 | (1) |
|
Secure Sites and Tracking |
|
|
773 | (1) |
|
|
774 | (7) |
|
Core 2 (220-1102): Domain 3.0: Software Troubleshooting |
|
|
|
Chapter 53 Troubleshooting Microsoft Windows |
|
|
781 | (22) |
|
|
782 | (5) |
|
Windows Recovery Environment (Windows RE) |
|
|
782 | (3) |
|
|
785 | (2) |
|
|
787 | (2) |
|
Improper, Spontaneous, and Frequent Shutdowns |
|
|
789 | (1) |
|
|
790 | (2) |
|
|
792 | (1) |
|
Common Windows Symptoms and Solutions |
|
|
793 | (10) |
|
Chapter 54 Troubleshooting PC Security Issues |
|
|
803 | (12) |
|
The CompTIA A+ Seven-Step Malware Removal Procedure |
|
|
804 | (1) |
|
|
805 | (4) |
|
1 Investigate and Verify Malware Symptoms |
|
|
805 | (1) |
|
2 Quarantine the Infected Systems |
|
|
805 | (1) |
|
3 Disable System Restore in Windows |
|
|
806 | (1) |
|
4 Remediate the Infected Systems |
|
|
807 | (1) |
|
5 Schedule Scans and Run Updates |
|
|
808 | (1) |
|
6 Enable System Restore and Create a Restore Point (in Windows) |
|
|
808 | (1) |
|
|
809 | (1) |
|
|
809 | (1) |
|
|
810 | (1) |
|
More Symptoms of PC Security Issues and Potential Solutions |
|
|
811 | (4) |
|
Chapter 55 Troubleshooting Mobile Operating Systems and Applications |
|
|
815 | (16) |
|
|
816 | (5) |
|
|
816 | (3) |
|
Bluetooth Troubleshooting |
|
|
819 | (1) |
|
NFC and AirDrop Troubleshooting |
|
|
820 | (1) |
|
Troubleshooting Email Connections |
|
|
821 | (2) |
|
Troubleshooting and Stopping Applications |
|
|
823 | (1) |
|
|
824 | (1) |
|
More Mobile Application and OS Troubleshooting |
|
|
825 | (2) |
|
Updates: The Good and the Bad |
|
|
825 | (1) |
|
|
826 | (1) |
|
|
826 | (1) |
|
|
827 | (1) |
|
|
827 | (4) |
|
Chapter 56 Troubleshooting Mobile Operating Systems Security Issues |
|
|
831 | (10) |
|
Mobile Device Security Concerns and Symptoms |
|
|
832 | (9) |
|
Core 2 (220-1102): Domain 4.0: Operational Procedures |
|
|
|
|
841 | (16) |
|
|
842 | (6) |
|
Network Topology Diagrams |
|
|
842 | (2) |
|
Incident Report Documentation |
|
|
844 | (1) |
|
Standard Operating Procedure |
|
|
844 | (2) |
|
Compliance and Regulatory Policy |
|
|
846 | (1) |
|
|
847 | (1) |
|
User Checklists (Onboarding and Offboarding) |
|
|
848 | (1) |
|
|
848 | (3) |
|
|
851 | (1) |
|
|
852 | (5) |
|
Chapter 58 Change Management and Backup Methods |
|
|
857 | (16) |
|
Understanding Basic Change Management Best Practices |
|
|
858 | (3) |
|
Implementing Workstation Backup and Recovery Methods |
|
|
861 | (12) |
|
Using Windows File History and Recovery |
|
|
862 | (1) |
|
|
863 | (3) |
|
|
866 | (1) |
|
|
867 | (6) |
|
Chapter 59 Safety Procedures |
|
|
873 | (10) |
|
ESD Prevention and Equipment Grounding |
|
|
874 | (2) |
|
|
876 | (2) |
|
|
878 | (1) |
|
|
879 | (4) |
|
Chapter 60 Environmental Controls |
|
|
883 | (10) |
|
Temperature, Humidity, and Air |
|
|
884 | (1) |
|
|
885 | (2) |
|
|
887 | (6) |
|
|
888 | (1) |
|
Uninterruptible Power Supplies |
|
|
888 | (5) |
|
Chapter 61 Incident Response, Communication, and Professionalism |
|
|
893 | (18) |
|
Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts |
|
|
894 | (10) |
|
|
894 | (3) |
|
|
897 | (2) |
|
|
899 | (5) |
|
Using Proper Communication Techniques and Professionalism |
|
|
904 | (7) |
|
Communication Techniques and Professionalism |
|
|
905 | (6) |
|
Chapter 62 Basic Scripting, Part I |
|
|
911 | (8) |
|
|
912 | (7) |
|
|
912 | (1) |
|
|
913 | (2) |
|
|
915 | (1) |
|
|
915 | (4) |
|
Chapter 63 Basic Scripting, Part II |
|
|
919 | (18) |
|
|
920 | (4) |
|
|
924 | (5) |
|
Use Cases and Other Considerations for PowerShell and Bash |
|
|
929 | (2) |
|
|
931 | (2) |
|
|
933 | (1) |
|
Visual Basic Script and .vbs |
|
|
934 | (3) |
|
Chapter 64 Remote Access Technologies |
|
|
937 | (60) |
|
|
938 | (4) |
|
|
938 | (1) |
|
Remote Desktop Connection |
|
|
939 | (1) |
|
Connecting with Remote Desktop |
|
|
939 | (3) |
|
|
942 | (2) |
|
|
944 | (1) |
|
|
945 | (4) |
|
A+ Core 2 (220-1102) Practice Exam |
|
|
949 | (48) |
|
|
949 | (18) |
|
|
967 | (3) |
|
|
970 | (27) |
|
Chapter 65 Getting Ready for the Exams, and Farewell |
|
|
997 | (10) |
|
Getting Ready for the Exams |
|
|
998 | (2) |
|
Tips for Taking the Real Exams |
|
|
1000 | (4) |
|
General Practices for Taking Exams |
|
|
1001 | (2) |
|
Smart Methods for Difficult Questions |
|
|
1003 | (1) |
|
|
1004 | (1) |
|
Beyond the CompTIA A+ Certification |
|
|
1004 | (3) |
Index |
|
1007 | |