Muutke küpsiste eelistusi

E-raamat: Mike Meyers' CompTIA A+ Core 2 Certification Passport (Exam 220-1102)

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 03-Mar-2023
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781264613571
  • Formaat - EPUB+DRM
  • Hind: 31,20 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 03-Mar-2023
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781264613571

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Accelerated coverage of every topic on the 2022 version of the A+ Core 2 exam from CompTIA

 Get on the fast track to becoming CompTIA A+ certified with this affordable, portable study tool. Inside, certification training gurus Mike Meyers and Ron Gilster guide you on your exam preparation path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA A+ 220-1102 exam, this certification passport is your ticket to success on exam day.

TECHNICAL BULLETS:





Inside:







Reviews and descriptions of the major features of Windows 10/11, macOS, and Linux operating systems Information and tips on operating systems, networking, and feature configurations Enhanced coverage of mobile device setup and troubleshooting Enhanced coverage of computer security Practice questions and content review after each objective prepare you for exam mastery





Covers all exam topics, including how to:





Configure system and application software to work with CPUs, RAM, BIOS, and other personal computer components Install, configure, and maintain operating systems and apps Set up, upgrade, and maintain Windows 10/11 Troubleshoot and fix software problems Configure and secure mobile device software Protect your personal computer and your network Properly and safely diagnose, resolve, and document common software issues Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in working in home, SOHO, and corporate environments





Online content includes:





Practice exam for 220-1102 Free sample of video training from Mike Meyers Free sample of interactive labs from Mike Meyers Mike Meyers favorite PC tools and utilities
Acknowledgments xxv
Introduction xxvii
1.0 Operating Systems
1(184)
Objective 1.1 Identify basic features of Microsoft Windows editions
2(16)
64-Bit vs. 32-Bit
2(1)
Windows 10 Editions
2(2)
Home Edition
4(1)
Work Edition
4(1)
Windows 10 Pro for Workstations and Enterprise Editions
4(1)
Domains and Workgroups
5(1)
Joining a Computer to a Domain
6(2)
Desktop Styles/User Interface
8(4)
Desktop Views
Remote Desktop Protocol
12(1)
RAM Support Limitations
13(1)
BitLocker
14(1)
BitLocker Requirements
14(1)
Enabling BitLocker
15(1)
The Group Policy Editor
16(1)
Accessing the Group Policy Editor
16(1)
Upgrade Paths and In-Place Upgrades
17(1)
Review
18(2)
1.1 Questions
19(1)
1.1 Answers
20(1)
Objective 1.2 Given a scenario, use the appropriate Microsoft command-line tool
20(4)
Windows Navigation Commands
20(2)
Drive Navigation in Windows
22(1)
Command-Line Tools
22(2)
Review
24(2)
1.2 Questions
25(1)
1.2 Answers
26(1)
Objective 1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS)
26(32)
Task Manager
27(1)
General Display
27(3)
Task Manager Tabs
30(3)
Microsoft Management Console Snap-In
33(1)
Opening the MMC
33(1)
Adding/Removing a Snap-in with the MMC
33(1)
Snap-ins on the Core 2 Exam
34(17)
Additional Windows Tools
51(1)
System Information
51(1)
Resource Monitor
52(1)
System Configuration
53(1)
Disk Cleanup
54(1)
Disk Defragment
55(2)
Registry Editor
57(1)
Review
58(2)
1.3 Questions
59(1)
1.3 Answers
59(1)
Objective 1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility
60(23)
Internet Options
61(1)
Devices and Printers
62(1)
Programs and Features
63(3)
Network and Sharing Center
66(1)
System
67(1)
Settings Options
68(1)
Windows Defender Firewall
69(1)
Mail (Microsoft Outlook)
70(1)
Sound
71(1)
User Accounts
72(1)
Device Manager
72(1)
Indexing Options
72(1)
Administrative Tools
73(2)
File Explorer Options
75(1)
Show Hidden Files
75(1)
Hide Extensions
75(1)
General Options
75(1)
View Options
76(1)
Power Options
77(1)
Sleep (Suspend), Standby, and Hibernate
78(1)
Power Plans
79(2)
Fast Startup
81(1)
USB Selective Suspend
82(1)
Ease of Access
82(1)
Review
83(2)
1.4 Questions
84(1)
1.4 Answers
85(1)
Objective 1.5 Given a scenario, use the appropriate Windows settings
85(15)
Time & Language
85(1)
Update & Security
86(1)
Windows Update
87(1)
Delivery Optimization
88(1)
Windows Security
88(2)
Personalization
90(1)
Apps
91(1)
Privacy
92(1)
Windows Permissions
93(1)
Application Permissions
94(1)
System
94(3)
Devices
97(1)
Network & Internet
98(2)
Gaming
100(1)
Accounts
100(1)
Review
100(3)
1.5 Questions
102(1)
1.5 Answers
103(1)
Objective 1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop
103(25)
Workgroup vs. Domain Setup
103(1)
Shared Resources
104(1)
Printers
105(2)
File Servers
107(1)
Mapped Devices
107(2)
Local OS Firewall Settings
109(1)
Application Restrictions and Exceptions
109(4)
Client Network Configuration
113(1)
Internet Protocol Addressing Schemes
113(4)
Domain Name System
117(1)
Static vs. Dynamic
118(1)
Establish Network Connections
119(1)
VPN
119(1)
Wireless
120(1)
Wired
121(1)
Wireless Wide Area Network
122(1)
Proxy Settings
123(1)
Public Network vs. Private Network
124(1)
File Explorer Navigation
125(1)
File Explorer Navigation
125(1)
File Explorer---Network Paths
126(1)
Metered Connections and Limitations
127(1)
Review
128(3)
1.6 Questions
129(1)
1.6 Answers
130(1)
Objective 1.7 Given a scenario, apply application installation and configuration concepts
131(9)
System Requirements for Applications
131(1)
32-bit vs. 64-bit Dependent Application Requirements
132(1)
Dedicated vs. Integrated Graphics Card
133(1)
Video Random Access Memory Requirements
133(1)
RAM Requirements
134(1)
Central Processing Unit Requirements
135(1)
External Hardware Tokens
136(1)
Storage Requirements
137(1)
OS Requirements for Applications
137(1)
Application-to-OS Compatibility
137(2)
32-bit vs. 64-bit OS
139(1)
Distribution Methods
139(1)
Other Considerations for New Applications
140(1)
Review
140(2)
1.7 Questions
141(1)
1.7 Answers
142(1)
Objective 1.8 Explain common OS types and their purposes
142(8)
Workstation Operating Systems
143(1)
Windows
143(1)
Linux
143(2)
macOS
145(1)
Chrome OS
145(1)
Smartphone/Tablet Operating Systems
145(1)
Android
146(1)
iPadOS
146(1)
iOS
146(1)
Various File System Types
147(1)
Windows File Systems
147(1)
Linux File Systems
148(1)
Apple File Systems
148(1)
Vendor Lifecycle Limitations
149(1)
Compatibility Concerns Between OSs
149(1)
Review
150(3)
1.8 Questions
151(1)
1.8 Answers
152(1)
Objective 1.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment
153(10)
Boot Methods
153(1)
External Drive/Flash Drive (USB)
153(1)
Optical Disc (CD-ROM, DVD)
153(1)
Network Boot (PXE)
154(2)
Solid-State/Flash Drives
156(1)
Internet-Based
156(1)
External/Hot-Swappable Drive
156(1)
Internal Hard Drive (Partition)
157(1)
Types of Installation
157(1)
Upgrade
157(1)
Recovery Partition
158(1)
Clean Install
158(1)
Image Deployment
158(1)
Repair Installation
159(1)
Remote Network Installation
160(1)
Third-Party Drivers
160(1)
Partitioning
160(1)
Master Boot Record
161(1)
Globally Unique Identifier Partition Table
162(1)
Drive Format
162(1)
Upgrade Considerations
162(1)
Feature Updates---Product Lifecycle
163(1)
Review
163(2)
1.9 Questions
164(1)
1.9 Answers
165(1)
Objective 1.10 Identify common features and tools of the macOS/desktop OS
165(10)
macOS Applications
166(1)
File Types
166(1)
App Store
166(1)
Installation and Uninstallation of Applications
166(1)
Apple ID and Corporate Restrictions
167(1)
Best Practices
167(1)
Backups
167(1)
Antivirus
168(1)
Updates and Patches
168(1)
System Preferences
169(1)
Displays
169(1)
Network r
169(2)
Printers & Scanners
171(1)
Security & Privacy
171(2)
Features
173(2)
Review
175(2)
1.10 Questions
175(1)
1.10 Answers
176(1)
Objective 1.11 Identify common features and tools of the Linux client/desktop OS
177(4)
Common Linux Commands
177(2)
Best Practices
179(1)
Backups
179(1)
Antivirus
179(1)
Updates/Patches
179(1)
Tools
180(1)
Shell/Terminal
180(1)
Samba
181(1)
Review
181(4)
1.11 Questions
182(1)
1.11 Answers
183(2)
2.0 Security
185(126)
Objective 2.1 Summarize various security measures and their purposes
186(16)
Physical Security
186(1)
Access Control Vestibule
186(1)
Badge Reader
187(1)
Video Surveillance
187(1)
Alarm Systems
188(1)
Motion Sensors
188(1)
Locks and Applications
189(1)
Guards
190(1)
Bollards
190(1)
Fences
191(1)
Physical Security for Staff
191(1)
Smart Cards and Key Fobs
191(1)
Hard Tokens
192(1)
Keys
193(1)
Biometrics
193(1)
Lighting
194(1)
Magnetometers
194(1)
Logical Security
194(1)
Principle of Least Privilege
194(1)
Access Control Lists
195(3)
Multifactor Authentication
198(1)
E-mail Security
198
Soft Tokens
196(2)
Short Message Service
198
Voice Calls
197(1)
Authenticator Application
197(1)
Mobile Device Management
197(1)
Active Directory
198(1)
Login Script
199(1)
Domain
199(1)
Group Policy/Updates
200(1)
Organizational Units
200(1)
Home Folder
201(1)
Folder Redirection
202(1)
Security Groups
202(1)
Review
202(4)
2.1 Questions
204(1)
2.1 Answers
205(1)
Objective 2.2 Compare and contrast wireless security protocols and authentication methods
206(4)
Protocols and Encryption
206(1)
WPA2
206(1)
WPA3
207(1)
TKIP
208(1)
AES
208(1)
Authentication
208(1)
RADIUS
208(1)
TACACS+
208(1)
Kerberos
209(1)
Multifactor Authentication
209(1)
Review
210(2)
2.2 Questions
211(1)
2.2 Answers
211(1)
Objective 2.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods
212(6)
Malware
212(1)
Trojan
212(1)
Rootkit
213(1)
Virus
213(1)
Spyware
213(1)
Ransomware
213(1)
Keylogger
213(1)
Boot Sector Virus
214(1)
Cryptominers
214(1)
Tools and Methods
214(1)
Recovery Mode
214(1)
Antivirus and Anti-Malware
215(1)
Software Firewalls
215(1)
Anti-Phishing Training
216(1)
User Education Regarding Common Threats
216(1)
OS Reinstallation
217(1)
Review
218(2)
2.3 Questions
219(1)
2.3 Answers
220(1)
Objective 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
220(7)
Social Engineering
220(1)
Phishing
220(1)
Vishing
221(1)
Shoulder Surfing
221(1)
Whaling
221(1)
Tailgating
221(1)
Impersonation
222(1)
Dumpster Diving
222(1)
Evil Twin
222(1)
Threats
223(1)
DoS and DDoS
223(1)
Zero-Day Attack
224(1)
Spoofing
224(1)
On-Path Attack
224(1)
Brute-Force Attack
224(1)
Dictionary Attack
224(1)
Insider Threat
225(1)
SQL Injection
225(1)
Cross-Site Scripting
225(1)
Vulnerabilities
226(1)
Noncompliant Systems
226(1)
Unpatched Systems
226(1)
Unprotected Systems
227(1)
EOLOSs
227(1)
BYQD
227(1)
Review
227(3)
2.4 Questions
228(1)
2.4 Answers
229(1)
Objective 2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS
230(20)
Defender Antivirus
230(3)
Firewalls
233(1)
Activate/Deactivate
233(1)
Port Security
234(5)
User Accounts
239(1)
Groups
239(2)
OS Login Options
241(1)
Single Sign-On
242(1)
NTFS vs. Share Permissions
242(1)
File and Folder Attributes
243(2)
Inheritance
245(1)
Run as Administrator vs. Standard User
246(1)
User Account Control
246(2)
BitLocker and BitLocker To Go
248(1)
EFS
249(1)
Review
250(3)
2.5 Questions
251(1)
2.5 Answers
252(1)
Objective 2.6 Given a scenario, configure a workstation to meet best practices for security
253(16)
Data-at-Rest Encryption
253(3)
Password Best Practices
256(1)
Set Strong Passwords
256(3)
BIOS/UEFI Passwords
259(2)
End-User Best Practices
261(1)
Account Management
262(1)
Restricting User Permissions
263(2)
Logon Time Restrictions
265(1)
Disabling Guest Account
266(1)
Failed Attempts Lockout
266(1)
Timeout/Screen Lock
266(1)
Change Default Admin User Account/Password
267(1)
Disable AutoRun and AutoPlay
267(2)
Review
269(2)
2.6 Questions
269(1)
2.6 Answers
270(1)
Objective 2.7 Explain common methods for securing mobile and embedded devices
271(10)
Screen Locks
271(1)
Facial Recognition
271(2)
PIN Codes
273(1)
Fingerprints
274(1)
Pattern Locks
274(1)
Swipe Lock
275(1)
Remote Wipe
275(1)
Locator Applications
275(1)
OS Updates
276(1)
Device Encryption
277(1)
Remote Backup Applications
277(1)
Failed Login Attempts Restrictions
277(1)
Antivirus/Anti-Malware
278(1)
Firewalls
278(1)
Policies and Procedures
279(1)
BYOD vs. Corporate-Owned
279(1)
Profile Security Requirements
279(1)
Internet of Things
280(1)
Review
281(2)
2.7 Questions
281(1)
2.7 Answers
282(1)
Objective 2.8 Given a scenario, use common data destruction and disposal methods
283(3)
Physical Destruction
283(1)
Drilling
283(1)
Shredding
283(1)
Degaussing
284(1)
Incinerating
284(1)
Recycling and Repurposing Best Practices
284(1)
Erasing/Wiping
284(1)
Low-Level Formatting vs. Standard Formatting
285(1)
Outsourcing Concepts
285(1)
Third-Party Vendor
285(1)
Certificate of Destruction or Recycling
285(1)
Review
286(1)
2.8 Questions
286(1)
2.8 Answers
287(1)
Objective 2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks
287(9)
Home Router Settings
288(1)
Changing Default Passwords
288(1)
IP Filtering
288(1)
Firmware Updates
289(1)
Content Filtering
290(1)
Physical Placement/Secure Locations
290(1)
Dynamic Host Configuration Protocol Reservations
291(1)
Static Wide Area Network IP
291(1)
Universal Plug and Play
292(1)
Screened Subnet
292(1)
Wireless-Specific Security Settings
292(1)
Changing the Service Set Identifier
292(1)
Disabling SSID Broadcast
293(1)
Encryption Settings
293(1)
Disabling Guest Accounts
293(1)
Changing Channels
293(1)
Firewall Settings
294(1)
Disabling Ports
294(1)
Port Forwarding/Mapping
295(1)
Review
296(2)
2.9 Questions
296(1)
2.9 Answers
297(1)
Objective 2.10 Given a scenario, install and configure browsers and relevant security settings
298(9)
Browser Download/Installation
298(1)
Trusted Sources
298(1)
Untrusted Sources
299(1)
Extensions and Plug-Ins
300(1)
Password Managers
300(1)
Secure Connections/Sites
301(1)
Settings
302(1)
Pop-up Blockers
302(3)
Clearing Browser Data
305(1)
Private Browsing Mode
306(1)
Sign-in/Browser Data Synchronization
306(1)
Ad Blockers
307(1)
Review
307(4)
2.10 Questions
308(91)
2.10 Answers
399
3.0 Software Troubleshooting
311(44)
Objective 3.1 Given a scenario, troubleshoot common Windows OS problems
312(15)
Common Symptoms of Windows Problems
312(1)
Blue Screen of Death
312(1)
Sluggish Performance
313(1)
Boot Problems
313(1)
Frequent Shutdowns
314(1)
Services Not Starting
315(1)
Applications Crashing
315(1)
Low Memory Warnings
316(1)
USB Controller Resource Warnings
316(1)
System Instability
317(1)
No Operating System Found
317(1)
Slow Profile Load
317(1)
Time Drift
318(1)
Common Troubleshooting Steps
319(1)
Reboot
319(1)
Restart Services
320(1)
Uninstall/Reinstall/Update Applications
320(1)
Add Resources
320(1)
Verify Requirements
321(1)
System File Check
321(1)
Repair/Restore/Reimage Windows
321(4)
Roll Back Updates
325(1)
Rebuild Windows Profiles
326(1)
Review
327(2)
3.1 Questions
328(1)
3.1 Answers
328(1)
Objective 3.2 Given a scenario, troubleshoot common personal computer (PC) security issues
329(5)
Common Symptoms
329(1)
Unable to Access the Network
329(1)
Desktop Alerts
330(1)
False Alerts Regarding Antivirus Protection
331(1)
Altered System or Personal Files
331(1)
Unwanted Notifications Within the OS
331(1)
OS Update Failures
331(1)
Browser-Related Symptoms
332(1)
Random/Frequent Pop-Ups
333(1)
Certificate Warnings
333(1)
Redirection
333(1)
Review
334(1)
3.2 Questions
334(1)
3.2 Answers
335(1)
Objective 3.3 Given a scenario, use best practice procedures for malware removal
335(4)
Best-Practice Malware-Removal Process
336(3)
Review
339(2)
3.3 Questions
340(1)
3.3 Answers
340(1)
Objective 3.4 Given a scenario, troubleshoot common mobile OS and application issues
341(7)
Common Symptoms
341(1)
Application Fails to Launch
341(1)
Application Fails to Close/Crashes
341(1)
Application/OS Fails to Update
342(1)
Slow to Respond
342(1)
Battery Life Issues
343(1)
Randomly Reboots
344(1)
Connectivity Issues
345(2)
Screen Does Not Autorotate
347(1)
Review
348(1)
3.4 Questions
348(1)
3.4 Answers
349(1)
Objective 3.5 Given a scenario, troubleshoot common mobile OS and application security issues
349(3)
Security Concerns
350(1)
Android Package Source
350(1)
Developer Mode
350(1)
Rooting/Jailbreaking
350(1)
Bootleg/Malicious Application
351(1)
Common Symptoms
351(1)
Review
352(3)
3.5 Questions
353(1)
3.5 Answers
354(1)
4.0 Operational Procedures
355(82)
Objective 4.1 Given a scenario, implement best practices associated with documentation and support systems information management
356(8)
Ticketing Systems
356(1)
Categories
356(1)
Severity
357(1)
Escalation Levels
357(1)
Clear and Concise Written Communication
358(1)
Asset Management
359(1)
Database Systems
359(1)
Asset Tags and IDs
359(1)
Procurement Lifecycle
360(1)
Warranty and Licensing
360(1)
Assigned Users
360(1)
Types of Documents
360(1)
Acceptable Use Policy
360(1)
Network Topology Diagrams
361(1)
Regulatory and Compliance Requirements
361(1)
Incident Reports
361(1)
Standard Operating Procedures
362(1)
New-User Setup Checklists
363(1)
End-User Termination Checklists
363(1)
Knowledge Base/Articles
363(1)
Review
364(2)
4.1 Questions
365(1)
4.1 Answers
366(1)
Objective 4.2 Explain basic change-management best practices
366(4)
Change Management Best Practices
366(1)
Documented Business Processes
367(1)
Rollback Plan
367(1)
Sandbox Testing
368(1)
Responsible Staff Member
368(1)
Change Management
368(1)
Request Forms
368(2)
Review
370(2)
4.2 Questions
371(1)
4.2 Answers
372(1)
Objective 4.3 Given a scenario, implement workstation backup and recovery methods
372(7)
Backup and Recovery
373(1)
Backup Types
373(2)
Recovery
375(1)
Frequency
376(1)
Backup Retention
376(1)
Backup Testing
377(1)
Backup Rotation Schemes
377(2)
Review
379(2)
4.3 Questions
379(1)
4.3 Answers
380(1)
Objective 4.4 Given a scenario, use common safety procedures
381(8)
Electrostatic Discharge Straps
381(1)
Electrostatic Discharge Mats
382(1)
Self-Grounding
382(1)
Equipment Grounding
383(1)
Proper Power Handling
383(1)
Power-Handling Apps
384(1)
Proper Component Handling and Storage
385(1)
Electrostatic Discharge
386(1)
Antistatic Bags
386(1)
Compliance with Government Regulations
387(1)
Personal Safety
387(1)
Disconnect Power Before Repairing a PC
387(1)
Lifting Techniques
388(1)
Electrical Fire Safety
388(1)
Safety Goggles
389(1)
Air Filtration Mask
389(1)
Review
389(2)
4.4 Questions
390(1)
4.4 Answers
391(1)
Objective 4.5 Summarize environmental impacts and local environmental controls
391(5)
Material Safety Data Sheet/Documentation for Handling and Disposal
391(1)
Proper Battery Disposal
392(1)
Proper Toner Disposal
392(1)
Proper Disposal of Other Devices and Assets
393(1)
Temperature, Humidity-Level Awareness, and Proper Ventilation
393(1)
Location/Equipment Placement
393(1)
Dust Cleanup
394(1)
Compressed Air/Vacuums
394(1)
Power Surges, Under-Voltage Events, and Power Failures
395(1)
Review
396(1)
4.5 Questions
396(1)
4.5 Answers
397(1)
Objective 4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts
397(8)
Incident Response
398(1)
Chain of Custody
398(1)
Inform Management/Law Enforcement as Necessary
399(1)
Copy of Drive (Data Integrity and Preservation)
400(1)
Documentation of the Incident
400(1)
Licensing/Digital Rights Management/End-User License Agreement
401(1)
Licensing
402(1)
Digital Rights Management
403(1)
Regulated Data
403(1)
Data Classifications
403(2)
Data Retention
405(1)
Review
405(2)
4.6 Questions
406(1)
4.6 Answers
407(1)
Objective 4.7 Given a scenario, use proper communication techniques and professionalism
407(4)
Professional Appearance and Attire
407(1)
Communication Techniques
408(3)
Review
411(3)
4.7 Questions
412(1)
4.7 Answers
413(1)
Objective 4.8 Identify the basics of scripting
414(11)
Script File Types
414(1)
.bat
414(1)
.ps1
414(1)
.vbs
415(2)
.sh
417(1)
.js
418(2)
.py
420(1)
Use Cases for Scripting
421(1)
Restarting Machines
421(1)
Remapping Network Drives
421(1)
Installation of Applications
422(1)
Automated Backups
423(1)
Gathering of Information/Data
423(1)
Initiating Updates
423(1)
Other Considerations When Using Scripts
424(1)
Unintentionally Introducing Malware
424(1)
Inadvertently Changing System Settings
424(1)
Browser or System Crashes Due to Mishandling of Resources
424(1)
Review
425(2)
4.8 Questions
426(1)
4.8 Answers
427(1)
Objective 4.9 Given a scenario, use remote access technologies
427(8)
Methods and Tools
427(1)
Remote Desktop Protocol
427(2)
Virtual Private Network
429(1)
Virtual Network Computing
430(1)
Secure Shell
430(2)
Remote Monitoring and Management
432(1)
Microsoft Remote Assistance
432(1)
Third-Party Tools
433(1)
Security Considerations of Each Access Method
434(1)
Review
435(2)
4.9 Questions
435(1)
4.9 Answers
436(1)
A About the Online Content
437(4)
System Requirements
437(1)
Your Total Seminars Training Hub Account
437(1)
Privacy Notice
437(1)
Single User License Terms and Conditions
438(1)
TotalTester Online
439(1)
Pre-Assessment
439(1)
Mike's CompTIAA+ Video Training Sample
440(1)
TotalSims Sample for CompTIAA+
440(1)
Mike's Cool Tools
440(1)
Technical Support
440(1)
Index 441
Michael Meyers, MCP, CompTIA A+, CompTIA Network+, CompTIA Security+ (Houston, TX), is one of the industry's leading authorities on CompTIA certification. He is the president and founder and Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations including IBM, Lucent Technologies, GE, the FBI, the FAA and the United Nations. Mike is the best-selling author of the A+ Certification All-in-One Exam Guide.





Ron Gilster is the author of several best-selling books on networking, PC hardware, and IT career certifications. Ron holds a variety of IT certifications and has worked in networking and computing for over 25 years. Ron has served in a variety of small business and corporate technical, management, and executive positions and is currently a university instructor at several universities and colleges in the Spokane, Washington area.