,

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

Paperback Engels 2022 9780137637546
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams.

Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams!
* Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals
* Work effectively with mobile devices: laptops, tablets, and smartphones
* Configure Windows settings, components, and administrative tools
* Manage and troubleshoot Linux, macOS, Android, and iOS
* Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems
* Understand security features such as firewalls, multifactor authentication, permissions, and access control
* Defend against malware, network threats, and social engineering
* Learn the basics of IT documentation, change management, and incident response

Prepare for your exam with Pearson Test Prep
* Realistic practice questions and answers
* Comprehensive reporting and feedback
* Customized testing in study, practice exam, or flash card modes
* Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives

COMPANION WEBSITE
Your purchase includes access to the practice exams in multiple test modes, videos, challenges, and the CramSheet.

Specificaties

ISBN13:9780137637546
Taal:Engels
Bindwijze:paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Introduction <br> Part I: Introduction to Core 1 (220-1101)<br>CORE 1 (220-1101): DOMAIN 1.0: MOBILE DEVICES<br>Chapter 1 Laptop Hardware and Components <br>Introduction to Laptops <br>Power <br>Keyboards/Keys <br>&nbsp;&nbsp;&nbsp; Special Function Keys <br>&nbsp;&nbsp;&nbsp; Troubleshooting Keyboards <br>Touchpad <br>Random-Access Memory (RAM) <br>Storage Drives <br>Communications <br>Physical Privacy <br> Chapter 2 Mobile Device Display Components <br>Display Types <br>Inverter and Backlight <br>&nbsp;&nbsp;&nbsp; Damaged Inverter <br>&nbsp;&nbsp;&nbsp; Worn-Out Backlight <br>Digitizers and Touchscreens <br>Webcam and Microphone <br>Wi-Fi Antenna Connector and Placement <br> Chapter 3 Mobile Device Accessories and Ports <br>Connection Types <br>&nbsp;&nbsp;&nbsp; Wired Connections <br>&nbsp;&nbsp;&nbsp; Wireless Connections <br>Accessories <br>&nbsp;&nbsp;&nbsp; Docking Stations and Port Replicators <br>&nbsp;&nbsp;&nbsp; Drawing Pads, Touchpads, and Touch Pens <br> Chapter 4 Mobile Device Network Connectivity and Application Support <br>Enabling Wireless Functions <br>Bluetooth <br>Email Configuration <br>&nbsp;&nbsp;&nbsp; Integrated Commercial Provider Email Configuration <br>&nbsp;&nbsp;&nbsp; Corporate and ISP Email Configuration <br>Cellular Radio Technologies <br>Location Services <br>&nbsp;&nbsp;&nbsp; GPS <br>&nbsp;&nbsp;&nbsp; Cellular Location <br>&nbsp;&nbsp;&nbsp; IMEI and IMSI <br>Synchronization Methods <br>&nbsp;&nbsp;&nbsp; Synchronizing to the Cloud <br>&nbsp;&nbsp;&nbsp; Synchronizing to the Desktop <br>&nbsp;&nbsp;&nbsp; Synchronizing to the Automobile <br>Mobile Device Management (MDM) <br> CORE 1 (220-1101): DOMAIN 2.0: NETWORKING<br>Chapter 5 TCP and UDP Ports and Protocols <br>TCP vs. UDP <br>Ports and Protocols <br>&nbsp;&nbsp;&nbsp; HTTP vs. HTTPS <br>&nbsp;&nbsp;&nbsp; Email Protocols <br>&nbsp;&nbsp;&nbsp; FTP, SSH, and Telnet <br>&nbsp;&nbsp;&nbsp; DHCP <br>&nbsp;&nbsp;&nbsp; DNS <br>&nbsp;&nbsp;&nbsp; LDAP <br>&nbsp;&nbsp;&nbsp; RDP <br>&nbsp;&nbsp;&nbsp; More Protocols and Ports <br> Chapter 6 Network Devices <br>Switches <br>Routers <br>Wireless Access Points <br>Firewalls <br>Network Interface Cards <br>&nbsp;&nbsp;&nbsp; Hubs <br>Patch Panels <br>Power over Ethernet <br>Cable/DSL Modems <br>Network Interface Devices <br>Software-Defined Networking <br> Chapter 7 Wireless Protocols <br>802.11 Wireless <br>Long-Range Fixed Wireless <br>RFID <br> Chapter 8 Networked Hosts <br>Server Roles <br>&nbsp;&nbsp;&nbsp; File Servers <br>&nbsp;&nbsp;&nbsp; Web Servers <br>&nbsp;&nbsp;&nbsp; Print Servers <br>&nbsp;&nbsp;&nbsp; Mail Servers <br>&nbsp;&nbsp;&nbsp; Proxy Servers <br>DHCP Servers <br>&nbsp;&nbsp;&nbsp; DNS Servers <br>&nbsp;&nbsp;&nbsp; Syslog Servers <br>&nbsp;&nbsp;&nbsp; AAA Servers <br>Internet Security Appliances <br>&nbsp;&nbsp;&nbsp; Network Firewall <br>&nbsp;&nbsp;&nbsp; UTM <br>&nbsp;&nbsp;&nbsp; Spam Gateway <br>&nbsp;&nbsp;&nbsp; Load Balancer <br>Embedded Systems and IoT <br>&nbsp;&nbsp;&nbsp; Embedded Systems <br>&nbsp;&nbsp;&nbsp; IoT <br> Chapter 9 SOHO Network Configuration <br>Configuring IPv4 <br>Private vs. Public Addresses <br>Configuring IPv6 <br> Chapter 10 Network Configuration Concepts <br>DNS <br>Email Authentication Methods <br>DHCP <br>&nbsp;&nbsp;&nbsp; DHCP Process <br>&nbsp;&nbsp;&nbsp; DHCP Reservations <br>VLANs <br>VPNs <br> Chapter 11 Network Types <br>Network Types <br>&nbsp;&nbsp;&nbsp; LAN and WAN <br>&nbsp;&nbsp;&nbsp; MAN <br>&nbsp;&nbsp;&nbsp; SAN <br>&nbsp;&nbsp;&nbsp; WLAN <br>&nbsp;&nbsp;&nbsp; WMN <br>&nbsp;&nbsp;&nbsp; PAN <br>Internet Connection Types <br>&nbsp;&nbsp;&nbsp; Cable Internet <br>&nbsp;&nbsp;&nbsp; DSL <br>&nbsp;&nbsp;&nbsp; Fiber <br>&nbsp;&nbsp;&nbsp; Satellite <br>&nbsp;&nbsp;&nbsp; Wireless Internet Service Provider <br> Chapter 12 Networking Tools <br>Network Cabling Tools <br>Network Tap <br>Wi-Fi Analyzers <br> CORE 1 (220-1101): DOMAIN 3.0: HARDWARE<br>Chapter 13 Cables and Connectors <br>Network Cables <br>&nbsp;&nbsp;&nbsp; Twisted Pair <br>&nbsp;&nbsp;&nbsp; Coaxial <br>&nbsp;&nbsp;&nbsp; Optical <br>Peripheral Cables and Connectors <br>&nbsp;&nbsp;&nbsp; USB <br>&nbsp;&nbsp;&nbsp; Lightning and Thunderbolt <br>&nbsp;&nbsp;&nbsp; Serial <br>Video Cables and Connectors <br>Storage Drive Cables and Connectors <br>Adapters <br> Chapter 14 RAM <br>RAM Types <br>&nbsp;&nbsp;&nbsp; DDR3 <br>&nbsp;&nbsp;&nbsp; DDR4 <br>&nbsp;&nbsp;&nbsp; DDR5 <br>Installing RAM <br>RAM Technologies <br>&nbsp;&nbsp;&nbsp; Single-Channel vs. Multichannel Architectures <br>&nbsp;&nbsp;&nbsp; ECC vs. Non-ECC <br> Chapter 15 Storage Drives <br>SATA <br>Magnetic Hard Drives <br>Solid-State Drives <br>RAID <br>Flash <br>&nbsp;&nbsp;&nbsp; USB Flash Drives <br>&nbsp;&nbsp;&nbsp; Secure Digital Cards <br>Optical Drives <br> Chapter 16 Motherboards and Add-on Cards <br>Motherboard Form Factors and Connector Types <br>&nbsp;&nbsp;&nbsp; ATX <br>&nbsp;&nbsp;&nbsp; microATX <br>&nbsp;&nbsp;&nbsp; ITX <br>&nbsp;&nbsp;&nbsp; Expansion Buses <br>Expansion Cards <br>&nbsp;&nbsp;&nbsp; Installing Video Cards <br>&nbsp;&nbsp;&nbsp; Sound Cards <br>&nbsp;&nbsp;&nbsp; Other Expansion Cards <br>More Ports and Connectors <br>BIOS/UEFI Settings <br>The POST <br> Chapter 17 CPUs <br>CPU Architecture <br>&nbsp;&nbsp;&nbsp; Clock Rate <br>&nbsp;&nbsp;&nbsp; Overclocking <br>&nbsp;&nbsp;&nbsp; Types of CPUs <br>&nbsp;&nbsp;&nbsp; Multithreading and Multicore <br>&nbsp;&nbsp;&nbsp; Cache Memory <br>CPU Compatibility <br>&nbsp;&nbsp;&nbsp; Intel and AMD <br>&nbsp;&nbsp;&nbsp; Sockets <br>Power Consumption <br>Cooling Mechanisms <br>&nbsp;&nbsp;&nbsp; Heat Sinks <br>&nbsp;&nbsp;&nbsp; Thermal Paste <br>&nbsp;&nbsp;&nbsp; Fans <br>&nbsp;&nbsp;&nbsp; Liquid Cooling Systems <br>Installing CPUs <br> Chapter 18 Power <br>Planning Which Power Supply to Use <br>&nbsp;&nbsp;&nbsp; Types of Power Supplies and Compatibility <br>&nbsp;&nbsp;&nbsp; Wattage and Capacity Requirements <br>&nbsp;&nbsp;&nbsp; Number and Type of Power Connectors <br>&nbsp;&nbsp;&nbsp; Modular and Redundant PSUs <br>Installing the Power Supply <br> Chapter 19 Multifunction Devices/Printers <br>Setup Considerations <br>Printer Configuration Settings <br>&nbsp;&nbsp;&nbsp; Basic Printer Configuration Settings <br>&nbsp;&nbsp;&nbsp; Sharing Printers and Managing Permissions <br>Local vs. Network Printers <br>Basic Printer Security <br> Chapter 20 Printer Consumables <br>Laser Printers <br>Inkjet Printers <br>Thermal Printers <br>Impact Printers <br>3D Printers <br> CORE 1 (220-1101): DOMAIN 4.0: VIRTUALIZATION AND CLOUD COMPUTING <br> Chapter 21 Cloud Computing Concepts <br>Introduction to Cloud Computing <br>Common Cloud Models <br>Cloud Computing Characteristics <br>Desktop Virtualization <br> Chapter 22 Client-Side Virtualization <br>Purpose of Virtual Machines <br>Hypervisors <br>Examples of Virtual Machine Software <br>Virtual Machine Requirements <br>Cross-Platform Virtualization <br>Containers and Sandboxes <br>&nbsp;&nbsp;&nbsp; OS-Level Virtualization (Containers) <br>&nbsp;&nbsp;&nbsp; Sandboxes <br> CORE 1 (220-1101): DOMAIN 5.0: HARDWARE AND NETWORK TROUBLESHOOTING<br>Chapter 23 Computer Troubleshooting 101 <br>The CompTIA Six-Step Troubleshooting Process <br>&nbsp;&nbsp;&nbsp; Step 1: Identify the Problem <br>&nbsp;&nbsp;&nbsp; Step 2: Establish a Theory of Probable Cause (Question the Obvious) <br>&nbsp;&nbsp;&nbsp; Step 3: Test the Theory to Determine the Cause <br>&nbsp;&nbsp;&nbsp; Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution <br>&nbsp;&nbsp;&nbsp; Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures <br>&nbsp;&nbsp;&nbsp; Step 6: Document the Findings, Actions, and Outcomes <br> Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power <br>Troubleshooting Motherboards <br>Troubleshooting CPUs <br>Troubleshooting RAM <br>Troubleshooting Power Supply Issues <br>Heating and Cooling <br> Chapter 25 Troubleshooting Storage Drives and RAID Arrays <br>Preventive Maintenance and Troubleshooting of Storage Drives <br>Storage Drive Preventive Maintenance <br>Storage Drive Troubleshooting <br>Troubleshooting RAID Arrays <br> Chapter 26 Troubleshooting Video Issues <br>PC Video Troubleshooting <br>External Laptop Monitors and Projectors <br>&nbsp;&nbsp;&nbsp; External Laptop Monitors <br>&nbsp;&nbsp;&nbsp; Projectors <br> Chapter 27 Troubleshooting Mobile Devices <br>Mobile Device Display Troubleshooting <br>Mobile Device Overheating <br>More Mobile Device Troubleshooting <br>Disassembling Processes <br> Chapter 28 Troubleshooting Printers <br>Troubleshooting Printers <br>Print Jobs and the Print Spooler <br>Managing Printers and Print Jobs <br>The Windows Print Spooler <br> Chapter 29 Troubleshooting Wired and Wireless Network Problems <br>Troubleshooting Common Symptoms <br> A+ Core 1 (220-1101) Practice Exam <br> Part II: Introduction to Core 2 (220-1102) <br> CORE 2 (220-1102): DOMAIN 1.0: OPERATING SYSTEMS <br> Chapter 30 Comparing Windows Editions <br>Windows 10 Editions and Feature Differences <br>Windows Desktop/User Interface and Components <br>Windows 10 Upgrade Paths <br>Windows 11 <br> Chapter 31 Microsoft Command-Line Tools, Part I <br>Microsoft Command-Line Basics <br>&nbsp;&nbsp;&nbsp; Command Prompt <br>&nbsp;&nbsp;&nbsp; PowerShell <br>&nbsp;&nbsp;&nbsp; Windows Terminal <br>&nbsp;&nbsp;&nbsp; Ask for Help! <br>Navigating in the Command Line <br>Working with Directories and Files <br>Partitioning and File System-Based Commands <br>chkdsk and sfc <br>&nbsp;&nbsp;&nbsp; chkdsk <br>&nbsp;&nbsp;&nbsp; SFC <br>winver and shutdown <br>&nbsp;&nbsp;&nbsp; shutdown <br>Advanced Commands: gpupdate and gpresult <br> Chapter 32 Microsoft Command-Line Tools, Part II <br>Networking Commands <br>&nbsp;&nbsp;&nbsp; ipconfig <br>&nbsp;&nbsp;&nbsp; ping <br>&nbsp;&nbsp;&nbsp; tracert and pathping <br>&nbsp;&nbsp;&nbsp; hostname <br>&nbsp;&nbsp;&nbsp; netstat <br>&nbsp;&nbsp;&nbsp; nslookup <br>&nbsp;&nbsp;&nbsp; net <br>&nbsp;&nbsp;&nbsp; Bonus Command: arp <br> Chapter 33 Microsoft Operating System Features and Tools, Part I <br>Task Manager <br>The MMC and Administrative Tools <br>&nbsp;&nbsp;&nbsp; The MMC <br>&nbsp;&nbsp;&nbsp; Event Viewer <br>&nbsp;&nbsp;&nbsp; Task Scheduler <br>&nbsp;&nbsp;&nbsp; Device Manager <br>&nbsp;&nbsp;&nbsp; Certificate Manager <br>&nbsp;&nbsp;&nbsp; Local Users and Groups <br>&nbsp;&nbsp;&nbsp; Performance Monitor <br>&nbsp;&nbsp;&nbsp; Group Policy Editor and Local Security Policy <br>&nbsp;&nbsp;&nbsp; Services <br>&nbsp;&nbsp;&nbsp; Bonus Tool: Computer Management <br> Chapter 34 Microsoft Operating System Features and Tools, Part II <br>Disk Management <br>&nbsp;&nbsp;&nbsp; The Disk Management Utility <br>&nbsp;&nbsp;&nbsp; Mount Points and Mounting a Drive <br>&nbsp;&nbsp;&nbsp; Storage Spaces <br>&nbsp;&nbsp;&nbsp; Disk Cleanup <br>&nbsp;&nbsp;&nbsp; Optimize Drives/Disk Defragmenter <br>Additional Windows Tools <br>&nbsp;&nbsp;&nbsp; System Information/msinfo32 <br>&nbsp;&nbsp;&nbsp; Resource Monitor <br>&nbsp;&nbsp;&nbsp; System Configuration/MSConfig <br>&nbsp;&nbsp;&nbsp; The Windows Registry <br> Chapter 35 Windows Control Panel Utilities <br>Opening and Viewing the Control Panel Utilities <br>&nbsp;&nbsp;&nbsp; Internet Options <br>&nbsp;&nbsp;&nbsp; Devices and Printers <br>&nbsp;&nbsp;&nbsp; Programs and Features <br>&nbsp;&nbsp;&nbsp; Program Compatibility <br>&nbsp;&nbsp;&nbsp; Windows Defender Firewall <br>&nbsp;&nbsp;&nbsp; Mail <br>&nbsp;&nbsp;&nbsp; Sound <br>&nbsp;&nbsp;&nbsp; User Accounts <br>&nbsp;&nbsp;&nbsp; Indexing Options <br>&nbsp;&nbsp;&nbsp; File Explorer Options <br>&nbsp;&nbsp;&nbsp; Power Management <br>&nbsp;&nbsp;&nbsp; Ease of Access Center <br> Chapter 36 Windows Settings <br>How to Access Settings <br>Time &amp; Language <br>Update &amp; Security <br>&nbsp;&nbsp;&nbsp; Windows Update <br>&nbsp;&nbsp;&nbsp; Windows Defender Firewall <br>Personalization <br>Apps <br>Privacy <br>System <br>&nbsp;&nbsp;&nbsp; Display <br>&nbsp;&nbsp;&nbsp; Power &amp; Sleep <br>&nbsp;&nbsp;&nbsp; Storage <br>&nbsp;&nbsp;&nbsp; About and System Properties <br>&nbsp;&nbsp;&nbsp; Virtual Memory <br>Devices <br>Network &amp; Internet <br>Gaming <br>Accounts <br> Chapter 37 Windows Networking <br>Workgroup vs. Domain Setup <br>&nbsp;&nbsp;&nbsp; Sharing Resources and Making Network Connections <br>&nbsp;&nbsp;&nbsp; Printer Sharing and Access <br>Establishing Networking Connections <br>Proxy Settings <br> Chapter 38 Application Installation and Configuration Concepts <br>32-Bit vs. 64-Bit <br>System and OS Requirements for Applications <br>&nbsp;&nbsp;&nbsp; Scenario 1: Video Editing Program <br>&nbsp;&nbsp;&nbsp; Scenario 2: Developer Program <br>Distribution Methods <br>Other Considerations for New Applications <br>&nbsp;&nbsp;&nbsp; Application Impact <br>&nbsp;&nbsp;&nbsp; User Permissions <br>&nbsp;&nbsp;&nbsp; Security Considerations <br> Chapter 39 Common Operating Systems <br>Workstation Operating Systems <br>Smartphone and Tablet Operating Systems <br>&nbsp;&nbsp;&nbsp; Android <br>&nbsp;&nbsp;&nbsp; iOS <br>&nbsp;&nbsp;&nbsp; iPadOS <br>File System Types and Formatting <br>&nbsp;&nbsp;&nbsp; Windows File System Basics <br>&nbsp;&nbsp;&nbsp; Linux File System Basics <br>&nbsp;&nbsp;&nbsp; macOS File System Basics <br>Vendor Life-Cycle Limitations <br>Compatibility Concerns Between Operating Systems <br> Chapter 40 Operating System Installations and Upgrades <br>Boot Methods <br>Types of Installations <br>Partitioning <br>&nbsp;&nbsp;&nbsp; Primary and Extended Partitions and Logical Drives <br>&nbsp;&nbsp;&nbsp; Basic and Dynamic Drives <br>&nbsp;&nbsp;&nbsp; GPT vs. MBR <br>More OS Installation and Upgrade Considerations <br> Chapter 41 macOS <br>macOS Basics <br>System Preferences <br>macOS Features <br>Managing and Maintaining macOS <br>Installation and Uninstallation of Applications <br>Apple ID <br> Chapter 42 Linux <br>Linux Basics <br>Linux Desktop Distributions <br>Linux Partition Scheme and File System <br>Linux Command Line <br>Samba <br>Linux Best Practices <br>&nbsp;&nbsp;&nbsp; Updates and Patches <br>&nbsp;&nbsp;&nbsp; Backups <br>&nbsp;&nbsp;&nbsp; Anti-malware <br>&nbsp;&nbsp;&nbsp; In Closing <br> CORE 2 (220-1102): DOMAIN 2.0: SECURITY<br>Chapter 43 Physical Security <br>Physical Locks <br>Entry Systems <br>Biometrics <br>Other Physical Security Precautions <br>Protecting Data Physically <br> Chapter 44 Logical Security <br>Authentication <br>Principle of Least Privilege <br>MDM Policies <br>Active Directory <br>&nbsp;&nbsp;&nbsp; User Profiles <br>&nbsp;&nbsp;&nbsp; Logon Script <br>&nbsp;&nbsp;&nbsp; Home Folder <br>&nbsp;&nbsp;&nbsp; Group Policy <br>&nbsp;&nbsp;&nbsp; Security Groups <br>More Logical Security Concepts <br>&nbsp;&nbsp;&nbsp; Authenticator Applications <br>&nbsp;&nbsp;&nbsp; Hard Tokens vs. Soft Tokens <br>&nbsp;&nbsp;&nbsp; Access Control Lists <br>&nbsp;&nbsp;&nbsp; SMS <br>&nbsp;&nbsp;&nbsp; Email Security <br> Chapter 45 Wireless Security and Malware <br>Comparing/Contrasting Wireless Security Protocols and Authentication Methods <br>&nbsp;&nbsp;&nbsp; Wireless and Encryption Protocols <br>&nbsp;&nbsp;&nbsp; RADIUS and TACACS+ <br>&nbsp;&nbsp;&nbsp; Kerberos <br>Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods <br>&nbsp;&nbsp;&nbsp; Malicious Software Types <br>&nbsp;&nbsp;&nbsp; Preventing Malicious Software <br> Chapter 46 Social Engineering <br>Social Engineering <br>&nbsp;&nbsp;&nbsp; Phishing <br>&nbsp;&nbsp;&nbsp; Evil Twin <br>&nbsp;&nbsp;&nbsp; Shoulder Surfing <br>&nbsp;&nbsp;&nbsp; Piggybacking/Tailgating <br>&nbsp;&nbsp;&nbsp; Dumpster Diving <br>&nbsp;&nbsp;&nbsp; Impersonation <br>Threats and Vulnerabilities <br>&nbsp;&nbsp;&nbsp; Network-Based Attacks <br>&nbsp;&nbsp;&nbsp; Password Cracking <br>&nbsp;&nbsp;&nbsp; Additional Security Threats <br>&nbsp;&nbsp;&nbsp; Vulnerabilities and Security Best Practices <br> Chapter 47 Windows Security Settings <br>The CIA of Computer Security <br>Windows Defender Antivirus <br>Windows Defender Firewall <br>Users and Groups <br>Permissions <br>&nbsp;&nbsp;&nbsp; Permission Inheritance and Propagation <br>&nbsp;&nbsp;&nbsp; Moving and Copying Folders and Files <br>File Security <br>&nbsp;&nbsp;&nbsp; Administrative Shares <br>&nbsp;&nbsp;&nbsp; Encrypting File System <br>&nbsp;&nbsp;&nbsp; BitLocker Encryption <br> Chapter 48 Windows Best Practices <br>Usernames and Passwords <br>Password Policies <br>Account Management and End-User Best Practices <br>Disabling AutoPlay/AutoRun <br> Chapter 49 Mobile Device Security <br>Screen Locks <br>Authenticator Applications <br>Theft and Loss of Mobile Devices <br>Compromised and Damaged Devices <br>&nbsp;&nbsp;&nbsp; Backups <br>&nbsp;&nbsp;&nbsp; Updates <br>&nbsp;&nbsp;&nbsp; Antivirus/Anti-malware/Firewalls <br>&nbsp;&nbsp;&nbsp; MDM and MAM <br>&nbsp;&nbsp;&nbsp; Full Device Encryption <br>IoT Security <br>Policies and Procedures <br>&nbsp;&nbsp;&nbsp; Profile Security Requirements <br> Chapter 50 Data Destruction and Disposal <br>Data Security 101 <br>Formatting Drives <br>Overwriting Drives <br>Clear <br>Purge <br>Destroy <br> Chapter 51 SOHO Security <br>Changing Default Passwords <br>Wireless-Specific Security Settings <br>&nbsp;&nbsp;&nbsp; Changing and Disabling the SSID <br>&nbsp;&nbsp;&nbsp; Antennas and Radio Power Levels <br>&nbsp;&nbsp;&nbsp; Guest Networks <br>&nbsp;&nbsp;&nbsp; Disabling WPS <br>Enabling MAC Filtering and IP Filtering <br>Assigning Static IP Addresses <br>Firewall Settings and Additional Configurations <br>Content Filtering/Parental Controls <br>Disabling Physical Ports and More Physical Security <br>A Final Word on SOHO Routers <br> Chapter 52 Browser Security <br>Browser Download/Installation <br>Settings <br>Extensions and Plug-ins <br>Password Managers <br>Secure Connections <br>&nbsp;&nbsp;&nbsp; TLS <br>&nbsp;&nbsp;&nbsp; Secure Sites and Tracking <br>More Settings <br> CORE 2 (220-1102): DOMAIN 3.0: SOFTWARE TROUBLESHOOTING<br>Chapter 53 Troubleshooting Microsoft Windows <br>Windows Recovery <br>&nbsp;&nbsp;&nbsp; Windows Recovery Environment (Windows RE) <br>&nbsp;&nbsp;&nbsp; Startup Settings <br>System Restore <br>Improper, Spontaneous, and Frequent Shutdowns <br>Stop Errors <br>Restoring Windows <br>Common Windows Symptoms and Solutions <br> Chapter 54 Troubleshooting PC Security Issues <br>The CompTIA A+ Seven-Step Malware Removal Procedure <br>Malware Removal Scenario <br>&nbsp;&nbsp;&nbsp; 1. Investigate and Verify Malware Symptoms <br>&nbsp;&nbsp;&nbsp; 2. Quarantine the Infected Systems <br>&nbsp;&nbsp;&nbsp; 3. Disable System Restore in Windows <br>&nbsp;&nbsp;&nbsp; 4. Remediate the Infected Systems <br>&nbsp;&nbsp;&nbsp; 5. Schedule Scans and Run Updates <br>&nbsp;&nbsp;&nbsp; 6. Enable System Restore and Create a Restore Point (in Windows) <br>&nbsp;&nbsp;&nbsp; 7. Educate the End User <br>Symptoms of Viruses <br>Symptoms of Spyware <br>More Symptoms of PC Security Issues and Potential Solutions <br> Chapter 55 Troubleshooting Mobile Operating Systems and Applications <br>Wireless Troubleshooting <br>&nbsp;&nbsp;&nbsp; Wi-Fi Troubleshooting <br>&nbsp;&nbsp;&nbsp; Bluetooth Troubleshooting <br>&nbsp;&nbsp;&nbsp; NFC and AirDrop Troubleshooting <br>Troubleshooting Email Connections <br>Troubleshooting and Stopping Applications <br>Initiating Resets <br>More Mobile Application and OS Troubleshooting <br>&nbsp;&nbsp;&nbsp; Updates: The Good and the Bad <br>&nbsp;&nbsp;&nbsp; Application Issues <br>&nbsp;&nbsp;&nbsp; Random Reboots <br>&nbsp;&nbsp;&nbsp; Poor Battery Life <br>Video Issues <br> Chapter 56 Troubleshooting Mobile Operating Systems Security Issues <br>Mobile Device Security Concerns and Symptoms <br> CORE 2 (220-1102): DOMAIN 4.0: OPERATIONAL PROCEDURES<br>Chapter 57 Documentation <br>Types of Documents <br>&nbsp;&nbsp;&nbsp; Network Topology Diagrams <br>&nbsp;&nbsp;&nbsp; Incident Report Documentation <br>&nbsp;&nbsp;&nbsp; Standard Operating Procedure <br>&nbsp;&nbsp;&nbsp; Compliance and Regulatory Policy <br>&nbsp;&nbsp;&nbsp; Acceptable Use Policy <br>&nbsp;&nbsp;&nbsp; User Checklists (Onboarding and Offboarding) <br>Knowledge Bases/Articles <br>Ticketing Systems <br>Asset Management <br> Chapter 58 Change Management and Backup Methods <br>Understanding Basic Change Management Best Practices <br>Implementing Workstation Backup and Recovery Methods <br>&nbsp;&nbsp;&nbsp; Using Windows File History and Recovery <br>&nbsp;&nbsp;&nbsp; Backup Methods <br>&nbsp;&nbsp;&nbsp; Backup Testing <br>&nbsp;&nbsp;&nbsp; Backup Rotation Schemes <br> Chapter 59 Safety Procedures <br>ESD Prevention and Equipment Grounding <br>Electrical Safety <br>Electrical Fire Safety <br>Physical Safety <br> Chapter 60 Environmental Controls <br>Temperature, Humidity, and Air <br>MSDS and Disposal <br>Power Devices <br>&nbsp;&nbsp;&nbsp; Surge Protectors <br>&nbsp;&nbsp;&nbsp; Uninterruptible Power Supplies <br> Chapter 61 Incident Response, Communication, and Professionalism <br>Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts <br>&nbsp;&nbsp;&nbsp; Incident Response <br>&nbsp;&nbsp;&nbsp; Licensing/DRM/EULA <br>&nbsp;&nbsp;&nbsp; Regulated Data <br>Using Proper Communication Techniques and Professionalism <br>&nbsp;&nbsp;&nbsp; Communication Techniques and Professionalism <br> Chapter 62 Basic Scripting, Part I <br>Programming 101 <br>&nbsp;&nbsp;&nbsp; Basic Data Types <br>&nbsp;&nbsp;&nbsp; Basic Script Constructs <br>&nbsp;&nbsp;&nbsp; Environment Variables <br>&nbsp;&nbsp;&nbsp; Comment Syntax <br> Chapter 63 Basic Scripting, Part II <br>PowerShell and .ps1 <br>Bash and .sh <br>Use Cases and Other Considerations for PowerShell and Bash <br>Python and .py <br>JavaScript and .js <br>Visual Basic Script and .vbs <br> Chapter 64 Remote Access Technologies <br>Remote Desktop <br>&nbsp;&nbsp;&nbsp; Remote Assistance <br>&nbsp;&nbsp;&nbsp; Remote Desktop Connection <br>&nbsp;&nbsp;&nbsp; Connecting with Remote Desktop <br>SSH <br>More Third-Party Tools <br>VPN <br> A+ Core 2 (220-1102) Practice Exam <br> Chapter 65 Getting Ready for the Exams, and Farewell <br>Getting Ready for the Exams <br>Tips for Taking the Real Exams <br>&nbsp;&nbsp;&nbsp; General Practices for Taking Exams <br>&nbsp;&nbsp;&nbsp; Smart Methods for Difficult Questions <br>&nbsp;&nbsp;&nbsp; Wrapping Up the Exam <br>Beyond the CompTIA A+ Certification <br> <br> <br>9780137637546&nbsp;&nbsp; TOC&nbsp;&nbsp;&nbsp; 4/12/2022 <br> <br> <br>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram