Muutke küpsiste eelistusi

E-raamat: Mike Meyers' CompTIA A+ Certification Passport, Seventh Edition (Exams 220-1001 & 220-1002)

  • Formaat: PDF+DRM
  • Ilmumisaeg: 06-Mar-2020
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781260455038
  • Formaat - PDF+DRM
  • Hind: 28,08 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 06-Mar-2020
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781260455038

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Fully redesigned and updated to provide accelerated review of all the topics covered on the new Core 1 and Core 2 CompTIA A+ exams

Get on the fast track to becoming CompTIA A+ certified with this affordable, portable study tool. Inside, certification training guru Mike Meyers guides you on your exam preparation path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA A+ 220-1001 & 220-1002 exams, this certification passport is your ticket to success on exam day.

TECHNICAL BULLETS:
Inside:
• Quick-reference tables and illustrated laptop teardown enhance coverage of mobile devices (Exam 1001, Domain 1.0)
• Quick-reference tables help you master hardware troubleshooting (Exam 1001, Domain 5.0)
• Practice questions and content review after each objective prepare you for exam mastery
• Enhanced coverage of network hardware and protocols, desktop hardware, and hardware and software troubleshooting
• Enhanced coverage of Windows 10, macOS, and Linux
• Enhanced coverage of computer security

Covers all exam topics, including how to:
• Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components
• Install, configure, and maintain hard drives
• Manage input devices and removable media
• Set up, upgrade, and maintain all versions of Windows
• Troubleshoot and fix computer problems
• Install printers and other peripherals
• Configure and secure mobile devices
• Connect to the Internet
• Set up wired and wireless networks
• Protect your personal computer and your network
• Implement virtualization and cloud-based technologies

Online content includes:
• Practice exams for 220-1001 & 220-1002
• Free sample of online video training from Mike Meyers
• Free sample of online interactive labs from Mike Meyers
• Mike’s favorite PC tools and utilities
• CompTIA A+ Glossary




Acknowledgments xxxviii
Introduction xxxix
I CompTIA A+ Exam 220-1001 1(318)
1.0 Mobile Devices
3(54)
Objective 1.1 Given a scenario, install and configure laptop hardware and components
4(13)
Hardware/Device Replacement
4(11)
Keyboard
5(1)
Hard Drive
5(3)
Memory
8(3)
Smart Card Reader
11(1)
Optical Drive
11(1)
Wireless Card/Bluetooth Module
11(1)
Cellular Card
12(1)
Video Card
12(1)
Mini PCIe
12(1)
Screen
12(1)
DC Jack
13(1)
Battery
13(1)
Touchpad
13(1)
Plastics/Frames
13(1)
Speaker
13(1)
System Board
14(1)
CPU
14(1)
Review
15(1)
Questions
15(1)
Answers
16(1)
Objective 1.2 Given a scenario, install components within the display of a laptop
17(4)
Types of Laptop Displays
17(1)
LCD
17(1)
OLED
17(1)
Wi-Fi Antenna Connector/Placement
17(1)
Webcam
18(1)
Microphone
19(1)
Inverter
19(1)
Digitizer/Touchscreen
19(1)
Review
19(1)
Questions
20(1)
Answers
20(1)
Objective 1.3 Given a scenario, use appropriate laptop features
21(6)
Special Function Keys
21(2)
Docking Station
23(1)
Port Replicator
23(1)
Physical Laptop Lock and Cable Lock
23(1)
Rotating/Removable Screens
24(1)
Review
25(1)
Questions
25(1)
Answers
26(1)
Objective 1.4 Compare and contrast characteristics of various types of other mobile devices
27(7)
Smartphones
27(1)
Tablets
28(1)
Wearable Technology Devices
29(2)
Smart Watches
29(1)
Fitness Monitors
29(1)
VR/AR Headsets
30(1)
E-readers
31(1)
GPS
32(1)
Review
32(1)
Questions
32(1)
Answers
33(1)
Objective 1.5 Given a scenario, connect and configure accessories and ports of other mobile devices
34(6)
Connection Types
34(2)
Wired
34(1)
Wireless
35(1)
Accessories
36(2)
Headsets
36(1)
Speakers
36(1)
Game Pads
36(1)
Extra Battery Packs/Battery Chargers
36(1)
Protective Covers/Waterproofing
37(1)
Credit Card Readers
37(1)
Memory/MicroSD
38(1)
Review
38(1)
Questions
39(1)
Answers
39(1)
Objective 1.6 Given a scenario, configure basic mobile device network connectivity and application support
40(11)
Wireless/Cellular Data Network (Enable/Disable)
40(2)
Hotspot
40(1)
Tethering
40(1)
Airplane Mode
41(1)
Bluetooth
42(1)
Corporate and ISP E-mail Configuration
42(2)
POP3
42(1)
IMAP
43(1)
Port and SSL Settings
43(1)
S/MIME
43(1)
Integrated Commercial Provider E-mail Configuration
44(3)
iCloud
44(1)
Google/Inbox
45(1)
Exchange Online
45(2)
Yahoo
47(1)
PRI Updates/PRL Updates/Baseband Updates
47(1)
Radio Firmware
47(1)
IMEI vs. IMSI
47(1)
VPN
48(1)
Review
49(1)
Questions
50(1)
Answers
51(1)
Objective 1.7 Given a scenario, use methods to perform mobile device synchronization
51(6)
Synchronization Methods
51(1)
Synchronize to the Cloud
51(1)
Synchronize to the Desktop
52(1)
Synchronize to the Automobile
52(1)
Types of Data to Synchronize
52(1)
Mutual Authentication for Multiple Services (SSO)
53(1)
Software Requirements to Install the Application on the PC
53(1)
Connection Types to Enable Synchronization
53(1)
Review
54(1)
Questions
55(1)
Answers
56(1)
2.0 Networking
57(74)
Objective 2.1 Compare and contrastTCP and UDP ports, protocols, and their purposes
58(3)
Ports and Protocols
58(1)
TCP vs. UDP
59(1)
Review
60(1)
Questions
60(1)
Answers
61(1)
Objective 2.2 Compare and contrast common networking hardware devices
61(12)
Ethernet
62(1)
Routers
62(1)
Switches
63(1)
Managed
63(1)
Unmanaged
63(1)
Hub
64(1)
Access Points
64(1)
Cloud-based Network Controller
65(1)
Firewall
65(1)
Network Interface Card
65(3)
Repeater
68(1)
Cable/DSL Modem
68(1)
DSL Modem
68(1)
Cable Modem
69(1)
Bridge
69(1)
Patch Panel
69(1)
Power over Ethernet (PoE)
70(1)
Injectors
70(1)
Switch
70(1)
Ethernet over Power
71(1)
Review
71(1)
Questions
72(1)
Answers
73(1)
Objective 2.3 Given a scenario, install and configure a basic wired/wireless SOHO network
73(15)
Router/Switch Functionality
74(1)
Access Point Settings
74(3)
IP Addressing
77(1)
NIC Configuration
78(2)
Wired
78(1)
Wireless
79(1)
End-user Device Configuration
80(1)
IoT Device Configuration
81(1)
Voice-enabled, Smart Speaker/Digital Assistant
81(1)
Cable/DSL Modem Configuration
81(1)
Firewall Settings
82(2)
DMZ
82(1)
Port Forwarding
82(1)
NAT
82(1)
UPnP
82(1)
MAC Filtering/Whitelist/Blacklist
83(1)
QoS
84(1)
Wireless Settings
84(2)
Encryption
84(2)
Channels
86(1)
Review
86(1)
Questions
87(1)
Answers
88(1)
Objective 2.4 Compare and contrast wireless networking protocols
88(9)
802.11 Standards
88(2)
Frequencies: 2.4 GHz, 5 GHz
90(1)
Channels
90(1)
1-11
90(1)
Bluetooth
91(1)
NFC
92(1)
RFID
92(1)
Zigbee
92(1)
Z-Wave
93(1)
Cellular Standards: 3G, 4G, LTE, 5G
93(2)
Review
95(1)
Questions
95(1)
Answers
96(1)
Objective 2.5 Summarize the properties and purposes of services provided by networked hosts
97(5)
Server Roles
97(2)
Web Server
97(1)
File Server
97(1)
Print Server
97(1)
DHCP Server
98(1)
DNS Server
98(1)
Proxy Server
98(1)
Mail Server
98(1)
Authentication Server
98(1)
Syslog
98(1)
Internet Appliance
99(1)
IDS
99(1)
IPS
99(1)
UTM
99(1)
End-point Management Server
100(1)
Legacy/Embedded Systems
100(1)
Review
100(1)
Questions
101(1)
Answers
101(1)
Objective 2.6 Explain common network configuration concepts
102(10)
IP Addressing
102(1)
IPv4 vs. IPv6
103(3)
Dynamic
104(1)
APIPA
104(1)
Link Local
105(1)
Static
105(1)
DNS
106(1)
DHCP
106(1)
Reservations
107(1)
Subnet Mask
107(1)
Gateway
108(1)
VPN
109(1)
VLAN
110(1)
NAT
110(1)
Review
111(1)
Questions
111(1)
Answers
112(1)
Objective 2.7 Compare and contrast Internet connection types, network types, and their features
112(10)
Internet Connection Types
113(6)
Cable
113(1)
DSL
113(1)
Dial-up
114(2)
Fiber
116(1)
Satellite
117(1)
ISDN
117(1)
Cellular
117(1)
Line-of-sight Wireless Internet Service
118(1)
Network Types
119(1)
LAN
119(1)
WAN
119(1)
PAN
119(1)
MAN
119(1)
WMN
119(1)
Review
120(1)
Questions
120(1)
Answers
121(1)
Objective 2.8 Given a scenario, use appropriate networking tools
122(9)
Crimper and Cable Stripper
122(1)
Multimeter
123(1)
Tone Generator and Probe
123(1)
Cable Tester
124(1)
Loopback Plug
125(1)
Punchdown Tool
125(2)
Wi-Fi Analyzer
127(1)
Review
128(1)
Questions
128(1)
Answers
129(2)
3.0 Hardware
131(122)
Objective 3.1 Explain basic cable types, features, and their purposes
132(1)
Objective 3.2 Identify common connector types
132(19)
Network Cables and Connectors
132(6)
Ethernet
132(2)
RJ-11
134(1)
Fiber
135(1)
Coaxial
136(2)
Video Cables and Connectors
138(1)
Multipurpose Cables
139(5)
Lightning
139(1)
Thunderbolt
140(1)
USB
141(3)
Serial (RS-232) Cable
144(1)
Hard Drive Cables
144(3)
SATA and eSATA
144(1)
IDE
145(1)
SCSI
146(1)
Molex
146(1)
Adapters
147(2)
DVI to HDMI, DVI to VGA
147(1)
USB to Ethernet
148(1)
Review
149(1)
Questions
150(1)
Answers
151(1)
Objective 3.3 Given a scenario, install RAM types
151(10)
Desktop RAM
152(3)
DDR2
152(1)
DDR3
153(1)
DDR4
154(1)
Handling and Installing DIMM Sticks
154(1)
Laptop RAM
155(3)
Handling and Installing SO-DIMM Sticks
157(1)
Confirming RAM Installation
158(1)
Performance Configurations for Desktop and Laptop
159(1)
Error-correcting Memory
159(1)
Parity vs. Non-parity RAM
159(1)
Review
160(1)
Questions
160(1)
Answers
161(1)
Objective 3.4 Given a scenario, select, install, and configure storage devices
161(12)
Optical Drives
162(1)
Optical Media Formats
162(1)
Optical Media Capacity
163(1)
Optical Speeds
163(1)
Magnetic Hard Drives
163(2)
Hard Disk Drives
163(2)
Hybrid Drives
165(1)
Solid-State Drives
165(1)
M.2 Drives
166(1)
NVMe
166(1)
Flash
166(1)
SD Card
166(1)
Installing Storage Devices
167(2)
Installing SATA Drives
167(1)
Installing M.2 Drives
168(1)
Configurations
169(2)
RAID 0, 1, 5, 10
169(2)
Hot Swappable
171(1)
Review
171(1)
Questions
172(1)
Answers
173(1)
Objective 3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards
173(32)
Motherboard Form Factor
173(3)
ATX
173(2)
ITX
175(1)
Motherboard Connectors Types
176(4)
PCI
176(1)
PCIe
176(1)
Riser Card
177(1)
Socket Types
178(1)
SATA
178(1)
IDE
178(1)
Front Panel Connector
178(2)
Internal USB Connector
180(1)
Installing a Motherboard
180(1)
BIOS/UEFI Settings
181(5)
BIOS/UEFI
181(2)
Boot Options
183(1)
Firmware Updates
183(1)
Interface Configurations
184(1)
Security and Security Settings
184(2)
CMOS Battery
186(1)
CPU Features
186(4)
Hyper-Threading
186(1)
Single-core and Multicore
187(1)
Virtualization
188(1)
Speeds
188(1)
Overclocking
188(1)
Integrated GPU
189(1)
CPU Compatibility
190(1)
Cooling Mechanism
191(3)
Installing a Heat Sink and Fan Assembly
191(2)
Installing a Liquid Cooling System
193(1)
Expansion Cards
194(8)
Video Cards
194(2)
Sound Cards
196(1)
Network Interface Card
197(1)
USB Expansion Card
198(1)
eSATA Card
199(1)
Installing Expansion Cards
199(3)
Review
202(2)
Questions
204(1)
Answers
205(1)
Objective 3.6 Explain the purposes and uses of various peripheral types
205(7)
Output Devices
205(2)
Printer
205(1)
Monitors
206(1)
VR Headset
206(1)
Projector
206(1)
Speakers
206(1)
Headset
206(1)
Input Devices
207(3)
Mouse
207(1)
Keyboard
207(1)
Touchpad
207(1)
Signature Pad
207(1)
Game Controllers
207(1)
ADF/Flatbed Scanner
208(1)
Barcode Scanner/QR Scanner
209(1)
Camera/Webcam
209(1)
Microphone
209(1)
KVM
210(1)
Magnetic Reader/Chip Reader
210(1)
NFC/Tap Pay Device
210(1)
Smart Card Reader
210(1)
Drives and Storage Devices
210(1)
Optical Drive Types
210(1)
External Storage Drives
210(1)
Review
211(1)
Questions
211(1)
Answers
212(1)
Objective 3.7 Summarize power supply types and features
212(8)
Input: 115 V vs. 220V
212(2)
Output: 5 V vs. 12V
214(2)
24-pin Motherboard Adapter
216(1)
Wattage Rating
216(1)
Number of Devices/Types of Devices to Be Powered
217(1)
Power Supply Installation Notes
217(1)
Review
218(1)
Questions
219(1)
Answers
220(1)
Objective 3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs
220(3)
Review
221(1)
Questions
222(1)
Answers
223(1)
Objective 3.9 Given a scenario, install and configure common devices
223(5)
Desktop
223(2)
Thin Client, Thick Client
223(1)
Account Setup/Settings
224(1)
Laptop/Common Mobile Devices
225(1)
Touchpad Configuration
225(1)
Touchscreen Configuration
225(1)
Application Installations/Configurations
225(1)
Synchronization Settings
226(1)
Account Setup/Settings
226(1)
Wireless Settings
226(1)
Review
226(1)
Questions
227(1)
Answers
228(1)
Objective 3.10 Given a scenario, configure SOHO multifunction devices/printers and settings
228(7)
Use Appropriate Drivers for a Given Operating System
228(3)
Installing a Local Printer
229(1)
Installing a Network Printer
230(1)
Configuration Settings
230(1)
Device Sharing
231(1)
Wired
231(1)
Wireless
231(1)
Integrated Print Server (Hardware)
232(1)
Cloud Printing/Remote Printing
232(1)
Public/Shared Devices
232(1)
Sharing Local/Networked Device via Operating System Settings
232(1)
Data Privacy
233(1)
Review
233(1)
Questions
234(1)
Answers
235(1)
Objective 3.11 Given a scenario, install and maintain various print technologies
235(18)
Laser
235(7)
Laser Printer Components and Features
236(1)
Imaging Process
237(4)
Laser Printer Maintenance
241(1)
Inkjet
242(4)
Calibrate
244(1)
Inkjet Maintenance
245(1)
Thermal
246(1)
Thermal Printer Maintenance
246(1)
Impact
247(1)
Impact Printer Maintenance
247(1)
Virtual Printers
248(1)
Print to File
248(1)
Print to PDF
248(1)
Print to XPS
248(1)
Print to Image
249(1)
3-D Printers
249(1)
3-D Printer Maintenance
249(1)
Review
250(1)
Questions
251(1)
Answers
252(1)
4.0 Virtualization and Cloud Computing
253(22)
Objective 4.1 Compare and contrast cloud computing concepts
254(11)
Common Cloud Models
254(4)
IaaS
255(1)
PaaS
255(1)
SaaS
256(1)
Public vs. Private vs. Hybrid vs. Community
257(1)
Shared Resources
258(2)
Internal vs. External
258(2)
Resource Pooling
260(1)
Measured Service, Metered
260(1)
On-demand, Rapid Elasticity
260(1)
Off-site E-mail Applications
261(1)
Cloud File Storage Services
261(1)
Synchronization Apps
261(1)
Virtual Application Streaming/Cloud-based Applications
261(1)
Applications for Cell Phones/Tablets
261(1)
Applications for Laptops/Desktops
262(1)
Virtual Desktop
262(1)
Virtual NIC
262(1)
Review
263(1)
Questions
264(1)
Answers
265(1)
Objective 4.2 Given a scenario, set up and configure client-side virtualization
265(10)
Purpose of Virtual Machines
266(1)
Resource Requirements
266(1)
Emulator Requirements
267(1)
Security Requirements
267(1)
Network Requirements
267(1)
Hypervisor
268(4)
Installing a Hypervisor and Creating a Virtual Machine
269(1)
Installing the Guest Operating System
270(2)
Review
272(1)
Questions
273(1)
Answers
274(1)
5.0 Hardware and Network Troubleshooting
275(44)
Objective 5.1 Given a scenario, use the best practice methodology to resolve problems
276(3)
The CompTIA Troubleshooting Methodology
276(1)
Review
277(1)
Questions
278(1)
Answers
279(1)
Objective 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power
279(6)
Troubleshooting Core Components
279(4)
Review
283(1)
Questions
284(1)
Answers
285(1)
Objective 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
285(4)
Troubleshooting Storage Systems
285(3)
Review
288(1)
Questions
288(1)
Answers
289(1)
Objective 5.4 Given a scenario, troubleshoot video, projector, and display issues
289(5)
Troubleshooting Display Issues
289(3)
Review
292(1)
Questions
292(1)
Answers
293(1)
Objective 5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
294(9)
Troubleshooting Mobile Devices
294(7)
Disassembling Processes for Proper Reassembly
300(1)
Review
301(1)
Questions
302(1)
Answers
303(1)
Objective 5.6 Given a scenario, troubleshoot printers
303(8)
Troubleshooting Printing Issues
303(6)
Review
309(1)
Questions
310(1)
Answers
311(1)
Objective 5.7 Given a scenario, troubleshoot common wired and wireless network problems
311(10)
Troubleshooting Network Issues
311(6)
Review
317(1)
Questions
317(1)
Answers
318(1)
II CompTIA A+ Exam 220-1002 319(356)
1.0 Operating Systems
321(148)
Objective 1.1 Compare and contrast common operating system types and their purposes
322(9)
32-bit vs. 64-bit
322(1)
RAM Limitations
322(1)
Software Compatibility
322(1)
Workstation Operating Systems
322(3)
Microsoft Windows
322(1)
Apple Macintosh OS
323(1)
Linux
324(1)
Cell Phone/Tablet Operating Systems
325(3)
Microsoft Windows
326(1)
Android
326(1)
iOS
327(1)
Chrome OS
328(1)
Vendor-specific Limitations
328(1)
End-of-Life
328(1)
Update Limitations
329(1)
Compatibility Concerns Between Operating Systems
329(1)
Review
330(1)
Questions
330(1)
Answers
331(1)
Objective 1.2 Compare and contrast features of Microsoft Windows versions
331(16)
Windows 7
336(1)
Windows 8
337(1)
Windows 8.1
338(1)
Windows 10
339(2)
Windows 7 Editions
341(1)
Windows 8/8.1 Editions
341(1)
Windows 10 Editions
342(1)
Windows Corporate vs. Personal Needs
343(2)
Domain Access
343(1)
BitLocker
343(1)
Media Center
344(1)
BranchCache
344(1)
EFS (Encrypting File System)
345(1)
Desktop Styles/User Interface
345(1)
Review
346(1)
Questions
346(1)
Answers
347(1)
Objective 1.3 Summarize general OS installation considerations and upgrade methods
347(24)
Boot Methods
348(3)
Optical Disc (CD-ROM, DVD)
348(1)
External Drive/Flash Drive (USB/eSATA)
348(1)
Network Boot (PXE)
349(2)
Internal Fixed Disk (HDD/SSD)
351(1)
Internal Hard Drive (Partition)
351(1)
Type of Installations
351(5)
Creating Installation Media
351(1)
Unattended Installation
352(1)
In-place Upgrade
353(1)
Clean Install
353(1)
Repair Installation
353(1)
Multiboot
354(1)
Remote Network Installation
355(1)
Image Deployment
355(1)
Recovery Partition
355(1)
Refresh/Restore
356(1)
Partitioning
356(3)
Basic
357(1)
GPT
358(1)
Dynamic
358(1)
File System Types/Formatting
359(4)
FAT32
359(1)
ExFAT
359(1)
NTFS
360(1)
CDFS
361(1)
NFS
361(1)
ext3, ext4
362(1)
HFS
362(1)
Swap Partition
362(1)
Quick Format vs. Full Format
362(1)
Load Alternate Third-Party Drivers When Necessary
363(1)
Workgroup vs. Domain Setup
363(1)
Time/Date/Region/Language Settings
364(1)
Driver Installation, Software, and Windows Updates
364(1)
Factory Recovery Partition
365(1)
Properly Formatted Boot Drive with the Correct Partitions/Format
365(1)
Prerequisites/Hardware Compatibility
366(1)
Application Compatibility
367(1)
OS Compatibility/Upgrade Path
367(1)
Review
368(2)
Questions
370(1)
Answers
371(1)
Objective 1.4 Given a scenario, use appropriate Microsoft command line tools
371(5)
Commands Available with Standard Privileges vs. Administrative Privileges
374(1)
Review
374(1)
Questions
374(1)
Answers
375(1)
Objective 1.5 Given a scenario, use Microsoft operating system features and tools
376(38)
Administrative
376(17)
Computer Management
376(1)
Device Manager
377(1)
Local Users and Groups
378(2)
Performance Monitor
380(2)
Services
382(1)
Local Security Policy
383(1)
System Configuration/Msconfig
383(2)
Task Scheduler
385(1)
Component Services
385(1)
Data Sources
386(1)
Print Management
386(2)
Windows Memory Diagnostics
388(1)
Windows Firewall
388(2)
Advanced Security
390(1)
Event Viewer
391(1)
User Account Management
392(1)
Task Manager
393(4)
Task Manager Tabs in Windows 8/8.1/10
395(2)
Disk Management
397(5)
Drive Status
397(1)
Mounting
398(1)
Initializing
398(1)
Extending, Shrinking, Splitting Partitions
398(1)
Assigning/Changing Drive Letters
399(1)
Adding Drives
400(1)
Adding Arrays
400(1)
Storage Spaces
401(1)
System Utilities
402(10)
Regedit
402(1)
Command
402(1)
Services.msc
403(1)
MMC
403(1)
MSTSC (Remote Desktop Connection)
404(1)
Notepad
404(2)
Windows Explorer/File Explorer
406(1)
Msinfo32
407(1)
DxDiag
407(1)
Disk Defragmenter
408(1)
System Restore
409(1)
Windows Update
410(2)
Review
412(1)
Questions
412(1)
Answers
413(1)
Objective 1.6 Given a scenario, use Microsoft Windows Control Panel utilities
414(17)
Internet Options
414(1)
Display/Display Settings
415(3)
User Accounts
418(1)
Folder Options
418(1)
System
419(1)
Performance (Virtual Memory)
419(1)
Remote Settings
419(1)
System Protection
420(1)
Windows Firewall
420(1)
Power Options
420(3)
Power Plans
420(2)
Sleep/Suspend/Standby/Hibernate
422(1)
Credential Manager
423(1)
Programs and Features
423(1)
HomeGroup
424(1)
Devices and Printers
425(1)
Sound
426(1)
Troubleshooting
426(2)
Network and Sharing Center
428(1)
Device Manager
428(1)
BitLocker
429(1)
Sync Center
429(1)
Review
429(1)
Questions
430(1)
Answers
431(1)
Objective 1.7 Summarize application installation and configuration concepts
431(7)
System Requirements
431(2)
Drive Space
432(1)
RAM
432(1)
OS Requirements
433(1)
Compatibility
433(1)
Methods of Installation and Deployment
434(1)
Local User Permissions
435(1)
Folder/File Access for Installation
435(1)
Security Considerations
435(1)
Impact to Device and Impact to Network
435(1)
Review
436(1)
Questions
436(1)
Answers
437(1)
Objective 1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop
438(16)
HomeGroup vs. Workgroup
438(1)
Domain Setup
438(1)
Network Shares/Administrative Shares/Mapping Drives
439(2)
Printer Sharing vs. Network Printer Mapping
441(2)
Establish Networking Connections
443(3)
VPN
443(1)
Dial-ups
444(1)
Wireless
444(1)
Wired
445(1)
WWAN (Cellular)
445(1)
Proxy Settings
446(1)
Remote Desktop Connection
446(1)
Remote Assistance
446(1)
Home vs. Work vs. Public Network Settings
447(1)
Firewall Settings
447(1)
Configuring an Alternative IP Address in Windows
448(1)
IP Addressing
448(1)
Subnet Mask
449(1)
Gateway
449(1)
DNS
449(1)
Network Card Properties
449(2)
Half Duplex/Full Duplex/Auto/Speed
450(1)
Wake-on-LAN
450(1)
QoS
450(1)
BIOS (on-board NIC)
451(1)
Review
451(1)
Questions
452(1)
Answers
453(1)
Objective 1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems
454(15)
Best Practices
454(4)
Scheduled Backups
454(1)
Scheduled Disk Maintenance
455(1)
System Updates/App Store
455(1)
Patch Management
456(1)
Driver/Firmware Updates
457(1)
Antivirus/Anti-malware Updates
458(1)
Tools
458(3)
Backup/Time Machine
458(2)
Restore/Snapshot
460(1)
Image Recovery
460(1)
Disk Maintenance Utilities
460(1)
Shell/Terminal
460(1)
Screen Sharing
461(1)
Force Quit
461(1)
Features
461(2)
Multiple Desktops/Mission Control
461(1)
Key Chain
461(1)
Spotlight
461(1)
iCloud
462(1)
Gestures
462(1)
Finder
462(1)
Remote Disc
462(1)
Dock
462(1)
Boot Camp
463(1)
Basic Linux Commands
463(2)
Review
465(1)
Questions
466(1)
Answers
467(2)
2.0 Security
469(86)
Objective 2.1 Summarize the importance of physical security measures
470(5)
Mantrap and Entry Control Roster
470(1)
Badge Reader
470(1)
Smart Card, Key Fob, and Hardware Tokens
470(1)
Security Guard
471(1)
Lock Types and Applications
471(2)
Door Lock
472(1)
Biometric Locks
472(1)
Cable Locks
472(1)
Server Locks
473(1)
USB Locks
473(1)
Privacy Screen
473(1)
Review
474(1)
Questions
474(1)
Answers
475(1)
Objective 2.2 Explain logical security concepts
475(14)
Active Directory
476(3)
Login Script
476(1)
Domain
476(1)
Group Policy/Updates
477(2)
Organizational Units
479(1)
Home Folder
479(1)
Folder Redirection
479(1)
Software Tokens
479(1)
MDM Policies
480(1)
Port Security
480(1)
MAC Address Filtering
480(1)
Certificates
481(2)
Antivirus/Anti-Malware
483(1)
Firewalls
483(1)
User Authentication/Strong Passwords
483(1)
Multifactor Authentication
484(1)
Directory Permissions
484(1)
VPN
484(1)
DLP
485(1)
Access Control Lists
485(1)
Smart Card
485(1)
E-mail Filtering
485(1)
Trusted/Untrusted Software Sources
486(1)
Principle of Least Privilege
486(1)
Review
486(2)
Questions
488(1)
Answers
489(1)
Objective 2.3 Compare and contrast wireless security protocols and authentication methods
489(4)
Protocols and Encryption
489(1)
WEP
490(1)
WPA and TKIP
490(1)
WPA2 and AES
490(1)
Authentication
490(2)
Single-Factor
491(1)
Multifactor
491(1)
RADIUS
491(1)
TACACS
491(1)
Review
492(1)
Questions
492(1)
Answers
493(1)
Objective 2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
493(9)
Malware
494(1)
Ransomware
494(1)
Trojan
494(1)
Keylogger
494(1)
Rootkit
495(1)
Virus
495(1)
Botnet
495(1)
Worm
495(1)
Spyware
495(1)
Tools and Methods
495(5)
Antivirus and Anti-Malware
496(1)
Recovery Console
496(1)
Backup/Restore
496(1)
End-user Education
497(1)
Software Firewalls
498(1)
DNS Configuration
499(1)
Review
500(1)
Questions
501(1)
Answers
502(1)
Objective 2.5 Compare and contrast social engineering, threats, and vulnerabilities
502(6)
Social Engineering
502(1)
Phishing
503(1)
Impersonation
503(1)
Shoulder Surfing
503(1)
Tailgating
503(1)
Dumpster Diving
503(1)
Threats and Vulnerabilities
503(3)
DoS and DDoS
504(1)
Zero-day
504(1)
Man-in-the-Middle
504(1)
Brute Force
504(1)
Dictionary
504(1)
Rainbow Table
504(1)
Spoofing
505(1)
Non-compliant Systems
505(1)
Zombie
505(1)
Review
506(1)
Questions
506(1)
Answers
507(1)
Objective 2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings
508(9)
User and Groups
508(1)
User and Group Types
508(1)
NTFS vs. Share Permissions
509(1)
Allow vs. Deny
509(1)
File Attributes
509(1)
Shared Files and Folders
510(2)
Administrative Shares vs. Local Shares
510(1)
Permission Propagation: Moving vs. Copying Folders and Files
510(1)
Inheritance
511(1)
System Files and Folders
512(1)
User Authentication
512(1)
Single Sign-On
512(1)
Run as Administrator vs. Standard User
513(1)
BitLocker and BitLocker To Go
513(1)
EFS
514(1)
Review
514(2)
Questions
516(1)
Answers
517(1)
Objective 2.7 Given a scenario, implement security best practices to secure a workstation
517(11)
Password Best Practices
517(2)
Setting Strong Passwords
517(1)
Password Expiration
518(1)
Screensaver Required Password
518(1)
BIOS/UEFI Passwords
518(1)
Requiring Passwords
518(1)
Account Management
519(4)
Restricting User Permissions
519(2)
Logon Time Restrictions
521(1)
Disabling Guest Account
521(1)
Failed Attempts Lockout
521(1)
Timeout/Screen Lock
521(1)
Change Default Admin User Account/Password
522(1)
Basic Active Directory Functions
522(1)
Disable Autorun
523(1)
Data Encryption
523(1)
Patch/Update Management
524(2)
Review
526(1)
Questions
526(1)
Answers
527(1)
Objective 2.8 Given a scenario, implement methods for securing mobile devices
528(11)
Screen Locks
528(2)
Fingerprint Lock
528(1)
Face Lock
528(1)
Swipe Lock
529(1)
Passcode Lock
529(1)
Remote Wipes
530(1)
Locator Applications
530(1)
Remote Backup Applications
531(1)
Failed Login Attempts Restrictions
532(1)
Antivirus/Anti-Malware
532(1)
Patching/OS Updates
532(1)
Biometric Authentication
532(1)
Full Device Encryption
533(1)
Multifactor Authentication
534(1)
Authenticator Applications
534(1)
Trusted Sources vs. Untrusted Sources
534(1)
Firewalls
534(1)
Policies and Procedures
535(2)
BYOD vs. Corporate-owned
535(1)
Profile Security Requirements
536(1)
Review
537(1)
Questions
537(1)
Answers
538(1)
Objective 2.9 Given a scenario, implement appropriate data destruction and disposal methods
539(4)
Physical Destruction
539(1)
Shredder
539(1)
Drill/Hammer
539(1)
Electromagnetic (Degaussing)
540(1)
Incineration
540(1)
Certificate of Destruction
540(1)
Recycling or Repurposing Best Practices
540(1)
Low-level Format vs. Standard Format
540(1)
Overwrite
540(1)
Drive Wipe
541(1)
Review
541(1)
Questions
541(1)
Answers
542(1)
Objective 2.10 Given a scenario, configure security on SOHO wireless and wired networks
543(12)
Wireless-Specific
543(1)
Changing Default SSID
543(1)
Setting Encryption
543(1)
Disabling SSID Broadcast
544(1)
Antenna and Access Point Placement
544(1)
Radio Power Levels
544(1)
WPS
544(1)
Change Default Usernames and Passwords
544(1)
Enable MAC Filtering
545(1)
Assign Static IP Addresses
546(1)
Firewall Settings
547(1)
Port Forwarding/Mapping
548(2)
Disabling Ports
550(1)
Content Filtering/Parental Controls
550(1)
Update Firmware
551(1)
Physical Security
551(1)
Review
552(1)
Questions
552(1)
Answers
553(2)
3.0 Software Troubleshooting
555(50)
Objective 3.1 Given a scenario, troubleshoot Microsoft Windows OS problems
556(22)
Common Symptoms of Windows Problems
556(4)
Slow Performance
556(1)
Limited Connectivity
556(1)
Failure to Boot, No OS Found
556(1)
Application Crashes
557(1)
Blue Screens
557(1)
Black Screens
558(1)
Printing Issues
559(1)
Services Fail to Start
559(1)
Slow Bootup
559(1)
Slow Profile Load
560(1)
Common Solutions for Windows Problems
560(16)
Windows Repair and Recovery
560(6)
Defragment the Hard Drive
566(1)
Reboot
566(1)
Kill Tasks
567(1)
Restart Services
567(1)
Update Network Settings
567(1)
Reimage/Reload OS
568(1)
Roll Back Updates
568(1)
Roll Back Device Drivers
569(1)
Apply Updates
569(1)
Repair Application
569(1)
Update Boot Order
570(1)
Disable Windows Services/Applications
570(1)
Disable Application Startup
571(2)
Safe Boot
573(2)
Rebuild Windows Profiles
575(1)
Review
576(1)
Questions
576(1)
Answers
577(1)
Objective 3.2 Given a scenario, troubleshoot and resolve PC security issues
578(7)
Common Symptoms of PC Security Issues
578(6)
Pop-ups
578(1)
Browser Redirection
578(1)
Security Alerts
578(2)
Slow Performance
580(1)
Internet Connectivity Issues
581(1)
PC/OS Lockup
581(1)
Application Crash
581(1)
OS Updates Failures
581(1)
Rogue Antivirus
581(1)
Spam
582(1)
File Issues
582(1)
E-mail Issues
582(1)
Access Denied
583(1)
Invalid Certificate (Trusted Root CA)
583(1)
System/Application Log Errors
583(1)
Review
584(1)
Questions
584(1)
Answers
585(1)
Objective 3.3 Given a scenario, use best practice procedures for malware removal
585(5)
Best Practice Malware Removal Process
586(2)
Review
588(1)
Questions
588(1)
Answers
589(1)
Objective 3.4 Given a scenario, troubleshoot mobile OS and application issues
590(9)
Common Symptoms of Mobile OS and Application Issues (with Solutions)
590(7)
Dim Display
590(1)
Intermittent Wireless
590(1)
No Wireless Connectivity
591(1)
No Bluetooth Connectivity
591(1)
Cannot Broadcast to External Monitor
592(1)
Touchscreen Nonresponsive or Responds Inaccurately
592(1)
Apps Not Loading
593(1)
Slow Performance
593(1)
Unable to Decrypt E-mail
594(1)
Extremely Short Battery Life
594(2)
Overheating
596(1)
Frozen System
596(1)
No Sound from Speakers
596(1)
System Lockout
597(1)
App Log Errors
597(1)
Review
597(1)
Questions
598(1)
Answers
599(1)
Objective 3.5 Given a scenario, troubleshoot mobile OS and application security issues
599(6)
Common Symptoms of Mobile OS and Application Security Issues (with Solutions)
599(4)
Wi-Fi, Wireless Cellular, and Bluetooth Issues
600(1)
Leaked Personal Files/Data
600(1)
Unauthorized Account Access
601(1)
Unauthorized Location Tracking
601(1)
Unauthorized Camera/Microphone Activation
602(1)
Review
603(1)
Questions
603(1)
Answers
604(1)
4.0 Operational Procedures
605(70)
Objective 4.1 Compare and contrast best practices associated with types of documentation
606(6)
Network Topology Diagrams
606(1)
Knowledge Base/Articles
607(1)
Incident Documentation
607(1)
Regulatory and Compliance Policy
608(1)
Acceptable Use Policy
608(1)
Password Policy
609(1)
Inventory Management
609(1)
Barcodes
609(1)
Asset Tags
610(1)
Review
610(1)
Questions
610(1)
Answers
611(1)
Objective 4.2 Given a scenario, implement basic change management best practices
612(4)
Change Management Best Practices Overview
612(1)
Documented Business Processes
612(1)
Purpose of the Change
613(1)
Scope the Change
613(1)
Risk Analysis
613(1)
Plan for Change
613(1)
End-user Acceptance
614(1)
Change Board
614(1)
Approvals
614(1)
Backout Plan
614(1)
Document Changes
615(1)
Review
615(1)
Questions
615(1)
Answers
616(1)
Objective 4.3 Given a scenario, implement basic disaster prevention and recovery methods
616(8)
Backup and Recovery
617(3)
Image Level
617(1)
File Level
617(2)
Critical Applications
619(1)
Backup Testing
620(1)
UPS
620(1)
Surge Protector
621(1)
Cloud Storage vs. Local Storage Backups
622(1)
Account Recovery Options
622(1)
Review
623(1)
Questions
623(1)
Answers
624(1)
Objective 4.4 Explain common safety procedures
624(10)
Equipment Grounding
624(1)
Proper Component Handling and Storage
625(2)
Antistatic Bags
625(1)
ESD Straps
626(1)
ESD Mats
627(1)
Self-Grounding
627(1)
Toxic Waste Handling
627(2)
Batteries
628(1)
Toner
629(1)
CRT
629(1)
Cell Phones and Tablets
629(1)
Personal Safety
629(3)
Disconnect Power Before Repairing PC
629(1)
Remove Jewelry
630(1)
Lifting Techniques
630(1)
Weight Limitations
630(1)
Electrical Fire Safety
630(1)
Cable Management
631(1)
Safety Goggles
632(1)
Air Filter Mask
632(1)
Compliance with Government Regulations
632(1)
Review
632(1)
Questions
633(1)
Answers
634(1)
Objective 4.5 Explain environmental impacts and appropriate controls
634(6)
MSDS Documentation for Handling and Disposal
634(1)
Temperature, Humidity Level Awareness, and Proper Ventilation
634(1)
Power Surges, Brownouts, and Blackouts
635(1)
Lightning
636(1)
EMI
636(1)
Protection from Airborne Particles
636(1)
Enclosures
636(1)
Air Filters/Mask
636(1)
Dust and Debris
637(1)
Compressed Air
637(1)
Vacuums
638(1)
Compliance to Government Regulations
638(1)
Review
638(1)
Questions
639(1)
Answers
640(1)
Objective 4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
640(8)
Incident Response
641(2)
First Response
641(1)
Use of Documentation/Documentation Changes
642(1)
Chain of Custody
642(1)
Licensing/DRM/EULA
643(1)
Open-Source vs. Commercial License
644(1)
Personal License vs. Enterprise Licenses
644(1)
Regulated Data
644(1)
Follow All Policies and Security Best Practices
645(1)
Review
646(1)
Questions
646(1)
Answers
647(1)
Objective 4.7 Given a scenario, use proper communication techniques and professionalism
648(6)
Communication Techniques
648(2)
Professionalism
650(2)
Review
652(1)
Questions
653(1)
Answers
654(1)
Objective 4.8 Identify the basics of scripting
654(14)
Script File Types
655(7)
.bat
655(1)
.ps1
655(2)
.vbs
657(1)
.sh
657(2)
.py
659(2)
.js
661(1)
Environment Variables
662(1)
Comment Syntax
663(1)
Basic Script Constructs
663(2)
Basic Loops
664(1)
Variables
665(1)
Basic Data Types
665(1)
Integers
665(1)
Strings
665(1)
Review
666(1)
Questions
666(1)
Answers
667(1)
Objective 4.9 Given a scenario, use remote access technologies
668(7)
RDP
668(2)
Telnet
670(1)
SSH
670(1)
Third-Party Tools
671(1)
Screen Share Feature
671(1)
File Share
672(1)
Security Considerations of Each Access Method
672(1)
Review
672(1)
Questions
673(1)
Answers
674(1)
A About the Online Content 675
System Requirements
675(1)
Your Total Seminars Training Hub Account
675(1)
Privacy Notice
675(1)
Single User License Terms and Conditions
676(1)
TotalTester Online
677(1)
Pre-assessment Test
677(1)
Other Online Book Resources
678(1)
TotalSims for A+
678(1)
Mike's Video Training
678(1)
Mike's Cool Tools
678(1)
PDF Glossary
678(1)
Technical Support
678
Index 67
Michael Meyers, MCP, CompTIA A+, CompTIA Network+, CompTIA Security+ (Houston, TX), is one of the industry's leading authorities on CompTIA certification. He is the president and founder and Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations including IBM, Lucent Technologies, GE, the FBI, the FAA and the United Nations. Mike is the best-selling author of the A+ Certification All-in-One Exam Guide.