Switch content of the page by the Role togglethe content would be changed according to the role
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, 1st edition
Published by Pearson IT Certification (July 2, 2022) © 2022
- Dave Prowse Best-selling CompTIA author and expert trainer
eTextbook
$47.99
- Available for purchase from all major ebook resellers, including InformIT.com.
- To request a review copy, click on the "Request a Review Copy" button.
$43.99
- A print text (hardcover or paperback)Â
- Free shipping
- Also available for purchase as an ebook from all major ebook resellers, including InformIT.com
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams.
Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams!
* Configure Windows settings, components, and administrative tools* Manage and troubleshoot Linux, macOS, Android, and iOS
* Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems* Understand security features such as firewalls, multifactor authentication, permissions, and access control
* Defend against malware, network threats, and social engineering
* Learn the basics of IT documentation, change management, and incident response
Prepare for your exam with Pearson Test Prep
* Customized testing in study, practice exam, or flash card modes
* Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives
COMPANION WEBSITE
- Chapters that map directly to the exam objectives
- Comprehensive foundational learning on all topics covered on the exam
- An extensive collection of practice questions
- The Cram Sheet tear-out card including tips, acronyms, and memory joggers not available anywhere else—perfect for last-minute study
Revised for the new exam.
What is a VitalSource eTextbook?
The full text downloaded to your computer.
With VitalSource eTextbooks you can:
- search for key concepts, words and phrases
- make highlights and notes as you study
- share your notes with friends
eTextbooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.
Upon purchase, you'll gain instant access.
Introduction
Part I: Introduction to Core 1 (220-1101)
CORE 1 (220-1101): DOMAIN 1.0: MOBILE DEVICES
Chapter 1 Laptop Hardware and Components
Introduction to Laptops
Power
Keyboards/Keys
   Special Function Keys
   Troubleshooting Keyboards
Touchpad
Random-Access Memory (RAM)
Storage Drives
Communications
Physical Privacy
Chapter 2 Mobile Device Display Components
Display Types
Inverter and Backlight
   Damaged Inverter
   Worn-Out Backlight
Digitizers and Touchscreens
Webcam and Microphone
Wi-Fi Antenna Connector and Placement
Chapter 3 Mobile Device Accessories and Ports
Connection Types
   Wired Connections
   Wireless Connections
Accessories
   Docking Stations and Port Replicators
   Drawing Pads, Touchpads, and Touch Pens
Chapter 4 Mobile Device Network Connectivity and Application Support
Enabling Wireless Functions
Bluetooth
Email Configuration
   Integrated Commercial Provider Email Configuration
   Corporate and ISP Email Configuration
Cellular Radio Technologies
Location Services
   GPS
   Cellular Location
   IMEI and IMSI
Synchronization Methods
   Synchronizing to the Cloud
   Synchronizing to the Desktop
   Synchronizing to the Automobile
Mobile Device Management (MDM)
CORE 1 (220-1101): DOMAIN 2.0: NETWORKING
Chapter 5 TCP and UDP Ports and Protocols
TCP vs. UDP
Ports and Protocols
   HTTP vs. HTTPS
   Email Protocols
   FTP, SSH, and Telnet
   DHCP
   DNS
   LDAP
   RDP
   More Protocols and Ports
Chapter 6 Network Devices
Switches
Routers
Wireless Access Points
Firewalls
Network Interface Cards
   Hubs
Patch Panels
Power over Ethernet
Cable/DSL Modems
Network Interface Devices
Software-Defined Networking
Chapter 7 Wireless Protocols
802.11 Wireless
Long-Range Fixed Wireless
RFID
Chapter 8 Networked Hosts
Server Roles
   File Servers
   Web Servers
   Print Servers
   Mail Servers
   Proxy Servers
DHCP Servers
   DNS Servers
   Syslog Servers
   AAA Servers
Internet Security Appliances
   Network Firewall
   UTM
   Spam Gateway
   Load Balancer
Embedded Systems and IoT
   Embedded Systems
   IoT
Chapter 9 SOHO Network Configuration
Configuring IPv4
Private vs. Public Addresses
Configuring IPv6
Chapter 10 Network Configuration Concepts
DNS
Email Authentication Methods
DHCP
   DHCP Process
   DHCP Reservations
VLANs
VPNs
Chapter 11 Network Types
Network Types
   LAN and WAN
   MAN
   SAN
   WLAN
   WMN
   PAN
Internet Connection Types
   Cable Internet
   DSL
   Fiber
   Satellite
   Wireless Internet Service Provider
Chapter 12 Networking Tools
Network Cabling Tools
Network Tap
Wi-Fi Analyzers
CORE 1 (220-1101): DOMAIN 3.0: HARDWARE
Chapter 13 Cables and Connectors
Network Cables
   Twisted Pair
   Coaxial
   Optical
Peripheral Cables and Connectors
   USB
   Lightning and Thunderbolt
   Serial
Video Cables and Connectors
Storage Drive Cables and Connectors
Adapters
Chapter 14 RAM
RAM Types
   DDR3
   DDR4
   DDR5
Installing RAM
RAM Technologies
   Single-Channel vs. Multichannel Architectures
   ECC vs. Non-ECC
Chapter 15 Storage Drives
SATA
Magnetic Hard Drives
Solid-State Drives
RAID
Flash
   USB Flash Drives
   Secure Digital Cards
Optical Drives
Chapter 16 Motherboards and Add-on Cards
Motherboard Form Factors and Connector Types
   ATX
   microATX
   ITX
   Expansion Buses
Expansion Cards
   Installing Video Cards
   Sound Cards
   Other Expansion Cards
More Ports and Connectors
BIOS/UEFI Settings
The POST
Chapter 17 CPUs
CPU Architecture
   Clock Rate
   Overclocking
   Types of CPUs
   Multithreading and Multicore
   Cache Memory
CPU Compatibility
   Intel and AMD
   Sockets
Power Consumption
Cooling Mechanisms
   Heat Sinks
   Thermal Paste
   Fans
   Liquid Cooling Systems
Installing CPUs
Chapter 18 Power
Planning Which Power Supply to Use
   Types of Power Supplies and Compatibility
   Wattage and Capacity Requirements
   Number and Type of Power Connectors
   Modular and Redundant PSUs
Installing the Power Supply
Chapter 19 Multifunction Devices/Printers
Setup Considerations
Printer Configuration Settings
   Basic Printer Configuration Settings
   Sharing Printers and Managing Permissions
Local vs. Network Printers
Basic Printer Security
Chapter 20 Printer Consumables
Laser Printers
Inkjet Printers
Thermal Printers
Impact Printers
3D Printers
CORE 1 (220-1101): DOMAIN 4.0: VIRTUALIZATION AND CLOUD COMPUTING
Chapter 21 Cloud Computing Concepts
Introduction to Cloud Computing
Common Cloud Models
Cloud Computing Characteristics
Desktop Virtualization
Chapter 22 Client-Side Virtualization
Purpose of Virtual Machines
Hypervisors
Examples of Virtual Machine Software
Virtual Machine Requirements
Cross-Platform Virtualization
Containers and Sandboxes
   OS-Level Virtualization (Containers)
   Sandboxes
CORE 1 (220-1101): DOMAIN 5.0: HARDWARE AND NETWORK TROUBLESHOOTING
Chapter 23 Computer Troubleshooting 101
The CompTIA Six-Step Troubleshooting Process
   Step 1: Identify the Problem
   Step 2: Establish a Theory of Probable Cause (Question the Obvious)
   Step 3: Test the Theory to Determine the Cause
   Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution
   Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures
   Step 6: Document the Findings, Actions, and Outcomes
Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power
Troubleshooting Motherboards
Troubleshooting CPUs
Troubleshooting RAM
Troubleshooting Power Supply Issues
Heating and Cooling
Chapter 25 Troubleshooting Storage Drives and RAID Arrays
Preventive Maintenance and Troubleshooting of Storage Drives
Storage Drive Preventive Maintenance
Storage Drive Troubleshooting
Troubleshooting RAID Arrays
Chapter 26 Troubleshooting Video Issues
PC Video Troubleshooting
External Laptop Monitors and Projectors
   External Laptop Monitors
   Projectors
Chapter 27 Troubleshooting Mobile Devices
Mobile Device Display Troubleshooting
Mobile Device Overheating
More Mobile Device Troubleshooting
Disassembling Processes
Chapter 28 Troubleshooting Printers
Troubleshooting Printers
Print Jobs and the Print Spooler
Managing Printers and Print Jobs
The Windows Print Spooler
Chapter 29 Troubleshooting Wired and Wireless Network Problems
Troubleshooting Common Symptoms
A+ Core 1 (220-1101) Practice Exam
Part II: Introduction to Core 2 (220-1102)
CORE 2 (220-1102): DOMAIN 1.0: OPERATING SYSTEMS
Chapter 30 Comparing Windows Editions
Windows 10 Editions and Feature Differences
Windows Desktop/User Interface and Components
Windows 10 Upgrade Paths
Windows 11
Chapter 31 Microsoft Command-Line Tools, Part I
Microsoft Command-Line Basics
   Command Prompt
   PowerShell
   Windows Terminal
   Ask for Help!
Navigating in the Command Line
Working with Directories and Files
Partitioning and File System-Based Commands
chkdsk and sfc
   chkdsk
   SFC
winver and shutdown
   shutdown
Advanced Commands: gpupdate and gpresult
Chapter 32 Microsoft Command-Line Tools, Part II
Networking Commands
   ipconfig
   ping
   tracert and pathping
   hostname
   netstat
   nslookup
   net
   Bonus Command: arp
Chapter 33 Microsoft Operating System Features and Tools, Part I
Task Manager
The MMC and Administrative Tools
   The MMC
   Event Viewer
   Task Scheduler
   Device Manager
   Certificate Manager
   Local Users and Groups
   Performance Monitor
   Group Policy Editor and Local Security Policy
   Services
   Bonus Tool: Computer Management
Chapter 34 Microsoft Operating System Features and Tools, Part II
Disk Management
   The Disk Management Utility
   Mount Points and Mounting a Drive
   Storage Spaces
   Disk Cleanup
   Optimize Drives/Disk Defragmenter
Additional Windows Tools
   System Information/msinfo32
   Resource Monitor
   System Configuration/MSConfig
   The Windows Registry
Chapter 35 Windows Control Panel Utilities
Opening and Viewing the Control Panel Utilities
   Internet Options
   Devices and Printers
   Programs and Features
   Program Compatibility
   Windows Defender Firewall
   Mail
   Sound
   User Accounts
   Indexing Options
   File Explorer Options
   Power Management
   Ease of Access Center
Chapter 36 Windows Settings
How to Access Settings
Time & Language
Update & Security
   Windows Update
   Windows Defender Firewall
Personalization
Apps
Privacy
System
   Display
   Power & Sleep
   Storage
   About and System Properties
   Virtual Memory
Devices
Network & Internet
Gaming
Accounts
Chapter 37 Windows Networking
Workgroup vs. Domain Setup
   Sharing Resources and Making Network Connections
   Printer Sharing and Access
Establishing Networking Connections
Proxy Settings
Chapter 38 Application Installation and Configuration Concepts
32-Bit vs. 64-Bit
System and OS Requirements for Applications
   Scenario 1: Video Editing Program
   Scenario 2: Developer Program
Distribution Methods
Other Considerations for New Applications
   Application Impact
   User Permissions
   Security Considerations
Chapter 39 Common Operating Systems
Workstation Operating Systems
Smartphone and Tablet Operating Systems
   Android
   iOS
   iPadOS
File System Types and Formatting
   Windows File System Basics
   Linux File System Basics
   macOS File System Basics
Vendor Life-Cycle Limitations
Compatibility Concerns Between Operating Systems
Chapter 40 Operating System Installations and Upgrades
Boot Methods
Types of Installations
Partitioning
   Primary and Extended Partitions and Logical Drives
   Basic and Dynamic Drives
   GPT vs. MBR
More OS Installation and Upgrade Considerations
Chapter 41 macOS
macOS Basics
System Preferences
macOS Features
Managing and Maintaining macOS
Installation and Uninstallation of Applications
Apple ID
Chapter 42 Linux
Linux Basics
Linux Desktop Distributions
Linux Partition Scheme and File System
Linux Command Line
Samba
Linux Best Practices
   Updates and Patches
   Backups
   Anti-malware
   In Closing
CORE 2 (220-1102): DOMAIN 2.0: SECURITY
Chapter 43 Physical Security
Physical Locks
Entry Systems
Biometrics
Other Physical Security Precautions
Protecting Data Physically
Chapter 44 Logical Security
Authentication
Principle of Least Privilege
MDM Policies
Active Directory
   User Profiles
   Logon Script
   Home Folder
   Group Policy
   Security Groups
More Logical Security Concepts
   Authenticator Applications
   Hard Tokens vs. Soft Tokens
   Access Control Lists
   SMS
   Email Security
Chapter 45 Wireless Security and Malware
Comparing/Contrasting Wireless Security Protocols and Authentication Methods
   Wireless and Encryption Protocols
   RADIUS and TACACS+
   Kerberos
Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods
   Malicious Software Types
   Preventing Malicious Software
Chapter 46 Social Engineering
Social Engineering
   Phishing
   Evil Twin
   Shoulder Surfing
   Piggybacking/Tailgating
   Dumpster Diving
   Impersonation
Threats and Vulnerabilities
   Network-Based Attacks
   Password Cracking
   Additional Security Threats
   Vulnerabilities and Security Best Practices
Chapter 47 Windows Security Settings
The CIA of Computer Security
Windows Defender Antivirus
Windows Defender Firewall
Users and Groups
Permissions
   Permission Inheritance and Propagation
   Moving and Copying Folders and Files
File Security
   Administrative Shares
   Encrypting File System
   BitLocker Encryption
Chapter 48 Windows Best Practices
Usernames and Passwords
Password Policies
Account Management and End-User Best Practices
Disabling AutoPlay/AutoRun
Chapter 49 Mobile Device Security
Screen Locks
Authenticator Applications
Theft and Loss of Mobile Devices
Compromised and Damaged Devices
   Backups
   Updates
   Antivirus/Anti-malware/Firewalls
   MDM and MAM
   Full Device Encryption
IoT Security
Policies and Procedures
   Profile Security Requirements
Chapter 50 Data Destruction and Disposal
Data Security 101
Formatting Drives
Overwriting Drives
Clear
Purge
Destroy
Chapter 51 SOHO Security
Changing Default Passwords
Wireless-Specific Security Settings
   Changing and Disabling the SSID
   Antennas and Radio Power Levels
   Guest Networks
   Disabling WPS
Enabling MAC Filtering and IP Filtering
Assigning Static IP Addresses
Firewall Settings and Additional Configurations
Content Filtering/Parental Controls
Disabling Physical Ports and More Physical Security
A Final Word on SOHO Routers
Chapter 52 Browser Security
Browser Download/Installation
Settings
Extensions and Plug-ins
Password Managers
Secure Connections
   TLS
   Secure Sites and Tracking
More Settings
CORE 2 (220-1102): DOMAIN 3.0: SOFTWARE TROUBLESHOOTING
Chapter 53 Troubleshooting Microsoft Windows
Windows Recovery
   Windows Recovery Environment (Windows RE)
   Startup Settings
System Restore
Improper, Spontaneous, and Frequent Shutdowns
Stop Errors
Restoring Windows
Common Windows Symptoms and Solutions
Chapter 54 Troubleshooting PC Security Issues
The CompTIA A+ Seven-Step Malware Removal Procedure
Malware Removal Scenario
   1. Investigate and Verify Malware Symptoms
   2. Quarantine the Infected Systems
   3. Disable System Restore in Windows
   4. Remediate the Infected Systems
   5. Schedule Scans and Run Updates
   6. Enable System Restore and Create a Restore Point (in Windows)
   7. Educate the End User
Symptoms of Viruses
Symptoms of Spyware
More Symptoms of PC Security Issues and Potential Solutions
Chapter 55 Troubleshooting Mobile Operating Systems and Applications
Wireless Troubleshooting
   Wi-Fi Troubleshooting
   Bluetooth Troubleshooting
   NFC and AirDrop Troubleshooting
Troubleshooting Email Connections
Troubleshooting and Stopping Applications
Initiating Resets
More Mobile Application and OS Troubleshooting
   Updates: The Good and the Bad
   Application Issues
   Random Reboots
   Poor Battery Life
Video Issues
Chapter 56 Troubleshooting Mobile Operating Systems Security Issues
Mobile Device Security Concerns and Symptoms
CORE 2 (220-1102): DOMAIN 4.0: OPERATIONAL PROCEDURES
Chapter 57 Documentation
Types of Documents
   Network Topology Diagrams
   Incident Report Documentation
   Standard Operating Procedure
   Compliance and Regulatory Policy
   Acceptable Use Policy
   User Checklists (Onboarding and Offboarding)
Knowledge Bases/Articles
Ticketing Systems
Asset Management
Chapter 58 Change Management and Backup Methods
Understanding Basic Change Management Best Practices
Implementing Workstation Backup and Recovery Methods
   Using Windows File History and Recovery
   Backup Methods
   Backup Testing
   Backup Rotation Schemes
Chapter 59 Safety Procedures
ESD Prevention and Equipment Grounding
Electrical Safety
Electrical Fire Safety
Physical Safety
Chapter 60 Environmental Controls
Temperature, Humidity, and Air
MSDS and Disposal
Power Devices
   Surge Protectors
   Uninterruptible Power Supplies
Chapter 61 Incident Response, Communication, and Professionalism
Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts
   Incident Response
   Licensing/DRM/EULA
   Regulated Data
Using Proper Communication Techniques and Professionalism
   Communication Techniques and Professionalism
Chapter 62 Basic Scripting, Part I
Programming 101
   Basic Data Types
   Basic Script Constructs
   Environment Variables
   Comment Syntax
Chapter 63 Basic Scripting, Part II
PowerShell and .ps1
Bash and .sh
Use Cases and Other Considerations for PowerShell and Bash
Python and .py
JavaScript and .js
Visual Basic Script and .vbs
Chapter 64 Remote Access Technologies
Remote Desktop
   Remote Assistance
   Remote Desktop Connection
   Connecting with Remote Desktop
SSH
More Third-Party Tools
VPN
A+ Core 2 (220-1102) Practice Exam
Chapter 65 Getting Ready for the Exams, and Farewell
Getting Ready for the Exams
Tips for Taking the Real Exams
   General Practices for Taking Exams
   Smart Methods for Difficult Questions
   Wrapping Up the Exam
Beyond the CompTIA A+ Certification
9780137637546Â Â TOCÂ Â Â 4/12/2022
Part I: Introduction to Core 1 (220-1101)
CORE 1 (220-1101): DOMAIN 1.0: MOBILE DEVICES
Chapter 1 Laptop Hardware and Components
Introduction to Laptops
Power
Keyboards/Keys
   Special Function Keys
   Troubleshooting Keyboards
Touchpad
Random-Access Memory (RAM)
Storage Drives
Communications
Physical Privacy
Chapter 2 Mobile Device Display Components
Display Types
Inverter and Backlight
   Damaged Inverter
   Worn-Out Backlight
Digitizers and Touchscreens
Webcam and Microphone
Wi-Fi Antenna Connector and Placement
Chapter 3 Mobile Device Accessories and Ports
Connection Types
   Wired Connections
   Wireless Connections
Accessories
   Docking Stations and Port Replicators
   Drawing Pads, Touchpads, and Touch Pens
Chapter 4 Mobile Device Network Connectivity and Application Support
Enabling Wireless Functions
Bluetooth
Email Configuration
   Integrated Commercial Provider Email Configuration
   Corporate and ISP Email Configuration
Cellular Radio Technologies
Location Services
   GPS
   Cellular Location
   IMEI and IMSI
Synchronization Methods
   Synchronizing to the Cloud
   Synchronizing to the Desktop
   Synchronizing to the Automobile
Mobile Device Management (MDM)
CORE 1 (220-1101): DOMAIN 2.0: NETWORKING
Chapter 5 TCP and UDP Ports and Protocols
TCP vs. UDP
Ports and Protocols
   HTTP vs. HTTPS
   Email Protocols
   FTP, SSH, and Telnet
   DHCP
   DNS
   LDAP
   RDP
   More Protocols and Ports
Chapter 6 Network Devices
Switches
Routers
Wireless Access Points
Firewalls
Network Interface Cards
   Hubs
Patch Panels
Power over Ethernet
Cable/DSL Modems
Network Interface Devices
Software-Defined Networking
Chapter 7 Wireless Protocols
802.11 Wireless
Long-Range Fixed Wireless
RFID
Chapter 8 Networked Hosts
Server Roles
   File Servers
   Web Servers
   Print Servers
   Mail Servers
   Proxy Servers
DHCP Servers
   DNS Servers
   Syslog Servers
   AAA Servers
Internet Security Appliances
   Network Firewall
   UTM
   Spam Gateway
   Load Balancer
Embedded Systems and IoT
   Embedded Systems
   IoT
Chapter 9 SOHO Network Configuration
Configuring IPv4
Private vs. Public Addresses
Configuring IPv6
Chapter 10 Network Configuration Concepts
DNS
Email Authentication Methods
DHCP
   DHCP Process
   DHCP Reservations
VLANs
VPNs
Chapter 11 Network Types
Network Types
   LAN and WAN
   MAN
   SAN
   WLAN
   WMN
   PAN
Internet Connection Types
   Cable Internet
   DSL
   Fiber
   Satellite
   Wireless Internet Service Provider
Chapter 12 Networking Tools
Network Cabling Tools
Network Tap
Wi-Fi Analyzers
CORE 1 (220-1101): DOMAIN 3.0: HARDWARE
Chapter 13 Cables and Connectors
Network Cables
   Twisted Pair
   Coaxial
   Optical
Peripheral Cables and Connectors
   USB
   Lightning and Thunderbolt
   Serial
Video Cables and Connectors
Storage Drive Cables and Connectors
Adapters
Chapter 14 RAM
RAM Types
   DDR3
   DDR4
   DDR5
Installing RAM
RAM Technologies
   Single-Channel vs. Multichannel Architectures
   ECC vs. Non-ECC
Chapter 15 Storage Drives
SATA
Magnetic Hard Drives
Solid-State Drives
RAID
Flash
   USB Flash Drives
   Secure Digital Cards
Optical Drives
Chapter 16 Motherboards and Add-on Cards
Motherboard Form Factors and Connector Types
   ATX
   microATX
   ITX
   Expansion Buses
Expansion Cards
   Installing Video Cards
   Sound Cards
   Other Expansion Cards
More Ports and Connectors
BIOS/UEFI Settings
The POST
Chapter 17 CPUs
CPU Architecture
   Clock Rate
   Overclocking
   Types of CPUs
   Multithreading and Multicore
   Cache Memory
CPU Compatibility
   Intel and AMD
   Sockets
Power Consumption
Cooling Mechanisms
   Heat Sinks
   Thermal Paste
   Fans
   Liquid Cooling Systems
Installing CPUs
Chapter 18 Power
Planning Which Power Supply to Use
   Types of Power Supplies and Compatibility
   Wattage and Capacity Requirements
   Number and Type of Power Connectors
   Modular and Redundant PSUs
Installing the Power Supply
Chapter 19 Multifunction Devices/Printers
Setup Considerations
Printer Configuration Settings
   Basic Printer Configuration Settings
   Sharing Printers and Managing Permissions
Local vs. Network Printers
Basic Printer Security
Chapter 20 Printer Consumables
Laser Printers
Inkjet Printers
Thermal Printers
Impact Printers
3D Printers
CORE 1 (220-1101): DOMAIN 4.0: VIRTUALIZATION AND CLOUD COMPUTING
Chapter 21 Cloud Computing Concepts
Introduction to Cloud Computing
Common Cloud Models
Cloud Computing Characteristics
Desktop Virtualization
Chapter 22 Client-Side Virtualization
Purpose of Virtual Machines
Hypervisors
Examples of Virtual Machine Software
Virtual Machine Requirements
Cross-Platform Virtualization
Containers and Sandboxes
   OS-Level Virtualization (Containers)
   Sandboxes
CORE 1 (220-1101): DOMAIN 5.0: HARDWARE AND NETWORK TROUBLESHOOTING
Chapter 23 Computer Troubleshooting 101
The CompTIA Six-Step Troubleshooting Process
   Step 1: Identify the Problem
   Step 2: Establish a Theory of Probable Cause (Question the Obvious)
   Step 3: Test the Theory to Determine the Cause
   Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution
   Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures
   Step 6: Document the Findings, Actions, and Outcomes
Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power
Troubleshooting Motherboards
Troubleshooting CPUs
Troubleshooting RAM
Troubleshooting Power Supply Issues
Heating and Cooling
Chapter 25 Troubleshooting Storage Drives and RAID Arrays
Preventive Maintenance and Troubleshooting of Storage Drives
Storage Drive Preventive Maintenance
Storage Drive Troubleshooting
Troubleshooting RAID Arrays
Chapter 26 Troubleshooting Video Issues
PC Video Troubleshooting
External Laptop Monitors and Projectors
   External Laptop Monitors
   Projectors
Chapter 27 Troubleshooting Mobile Devices
Mobile Device Display Troubleshooting
Mobile Device Overheating
More Mobile Device Troubleshooting
Disassembling Processes
Chapter 28 Troubleshooting Printers
Troubleshooting Printers
Print Jobs and the Print Spooler
Managing Printers and Print Jobs
The Windows Print Spooler
Chapter 29 Troubleshooting Wired and Wireless Network Problems
Troubleshooting Common Symptoms
A+ Core 1 (220-1101) Practice Exam
Part II: Introduction to Core 2 (220-1102)
CORE 2 (220-1102): DOMAIN 1.0: OPERATING SYSTEMS
Chapter 30 Comparing Windows Editions
Windows 10 Editions and Feature Differences
Windows Desktop/User Interface and Components
Windows 10 Upgrade Paths
Windows 11
Chapter 31 Microsoft Command-Line Tools, Part I
Microsoft Command-Line Basics
   Command Prompt
   PowerShell
   Windows Terminal
   Ask for Help!
Navigating in the Command Line
Working with Directories and Files
Partitioning and File System-Based Commands
chkdsk and sfc
   chkdsk
   SFC
winver and shutdown
   shutdown
Advanced Commands: gpupdate and gpresult
Chapter 32 Microsoft Command-Line Tools, Part II
Networking Commands
   ipconfig
   ping
   tracert and pathping
   hostname
   netstat
   nslookup
   net
   Bonus Command: arp
Chapter 33 Microsoft Operating System Features and Tools, Part I
Task Manager
The MMC and Administrative Tools
   The MMC
   Event Viewer
   Task Scheduler
   Device Manager
   Certificate Manager
   Local Users and Groups
   Performance Monitor
   Group Policy Editor and Local Security Policy
   Services
   Bonus Tool: Computer Management
Chapter 34 Microsoft Operating System Features and Tools, Part II
Disk Management
   The Disk Management Utility
   Mount Points and Mounting a Drive
   Storage Spaces
   Disk Cleanup
   Optimize Drives/Disk Defragmenter
Additional Windows Tools
   System Information/msinfo32
   Resource Monitor
   System Configuration/MSConfig
   The Windows Registry
Chapter 35 Windows Control Panel Utilities
Opening and Viewing the Control Panel Utilities
   Internet Options
   Devices and Printers
   Programs and Features
   Program Compatibility
   Windows Defender Firewall
   Mail
   Sound
   User Accounts
   Indexing Options
   File Explorer Options
   Power Management
   Ease of Access Center
Chapter 36 Windows Settings
How to Access Settings
Time & Language
Update & Security
   Windows Update
   Windows Defender Firewall
Personalization
Apps
Privacy
System
   Display
   Power & Sleep
   Storage
   About and System Properties
   Virtual Memory
Devices
Network & Internet
Gaming
Accounts
Chapter 37 Windows Networking
Workgroup vs. Domain Setup
   Sharing Resources and Making Network Connections
   Printer Sharing and Access
Establishing Networking Connections
Proxy Settings
Chapter 38 Application Installation and Configuration Concepts
32-Bit vs. 64-Bit
System and OS Requirements for Applications
   Scenario 1: Video Editing Program
   Scenario 2: Developer Program
Distribution Methods
Other Considerations for New Applications
   Application Impact
   User Permissions
   Security Considerations
Chapter 39 Common Operating Systems
Workstation Operating Systems
Smartphone and Tablet Operating Systems
   Android
   iOS
   iPadOS
File System Types and Formatting
   Windows File System Basics
   Linux File System Basics
   macOS File System Basics
Vendor Life-Cycle Limitations
Compatibility Concerns Between Operating Systems
Chapter 40 Operating System Installations and Upgrades
Boot Methods
Types of Installations
Partitioning
   Primary and Extended Partitions and Logical Drives
   Basic and Dynamic Drives
   GPT vs. MBR
More OS Installation and Upgrade Considerations
Chapter 41 macOS
macOS Basics
System Preferences
macOS Features
Managing and Maintaining macOS
Installation and Uninstallation of Applications
Apple ID
Chapter 42 Linux
Linux Basics
Linux Desktop Distributions
Linux Partition Scheme and File System
Linux Command Line
Samba
Linux Best Practices
   Updates and Patches
   Backups
   Anti-malware
   In Closing
CORE 2 (220-1102): DOMAIN 2.0: SECURITY
Chapter 43 Physical Security
Physical Locks
Entry Systems
Biometrics
Other Physical Security Precautions
Protecting Data Physically
Chapter 44 Logical Security
Authentication
Principle of Least Privilege
MDM Policies
Active Directory
   User Profiles
   Logon Script
   Home Folder
   Group Policy
   Security Groups
More Logical Security Concepts
   Authenticator Applications
   Hard Tokens vs. Soft Tokens
   Access Control Lists
   SMS
   Email Security
Chapter 45 Wireless Security and Malware
Comparing/Contrasting Wireless Security Protocols and Authentication Methods
   Wireless and Encryption Protocols
   RADIUS and TACACS+
   Kerberos
Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods
   Malicious Software Types
   Preventing Malicious Software
Chapter 46 Social Engineering
Social Engineering
   Phishing
   Evil Twin
   Shoulder Surfing
   Piggybacking/Tailgating
   Dumpster Diving
   Impersonation
Threats and Vulnerabilities
   Network-Based Attacks
   Password Cracking
   Additional Security Threats
   Vulnerabilities and Security Best Practices
Chapter 47 Windows Security Settings
The CIA of Computer Security
Windows Defender Antivirus
Windows Defender Firewall
Users and Groups
Permissions
   Permission Inheritance and Propagation
   Moving and Copying Folders and Files
File Security
   Administrative Shares
   Encrypting File System
   BitLocker Encryption
Chapter 48 Windows Best Practices
Usernames and Passwords
Password Policies
Account Management and End-User Best Practices
Disabling AutoPlay/AutoRun
Chapter 49 Mobile Device Security
Screen Locks
Authenticator Applications
Theft and Loss of Mobile Devices
Compromised and Damaged Devices
   Backups
   Updates
   Antivirus/Anti-malware/Firewalls
   MDM and MAM
   Full Device Encryption
IoT Security
Policies and Procedures
   Profile Security Requirements
Chapter 50 Data Destruction and Disposal
Data Security 101
Formatting Drives
Overwriting Drives
Clear
Purge
Destroy
Chapter 51 SOHO Security
Changing Default Passwords
Wireless-Specific Security Settings
   Changing and Disabling the SSID
   Antennas and Radio Power Levels
   Guest Networks
   Disabling WPS
Enabling MAC Filtering and IP Filtering
Assigning Static IP Addresses
Firewall Settings and Additional Configurations
Content Filtering/Parental Controls
Disabling Physical Ports and More Physical Security
A Final Word on SOHO Routers
Chapter 52 Browser Security
Browser Download/Installation
Settings
Extensions and Plug-ins
Password Managers
Secure Connections
   TLS
   Secure Sites and Tracking
More Settings
CORE 2 (220-1102): DOMAIN 3.0: SOFTWARE TROUBLESHOOTING
Chapter 53 Troubleshooting Microsoft Windows
Windows Recovery
   Windows Recovery Environment (Windows RE)
   Startup Settings
System Restore
Improper, Spontaneous, and Frequent Shutdowns
Stop Errors
Restoring Windows
Common Windows Symptoms and Solutions
Chapter 54 Troubleshooting PC Security Issues
The CompTIA A+ Seven-Step Malware Removal Procedure
Malware Removal Scenario
   1. Investigate and Verify Malware Symptoms
   2. Quarantine the Infected Systems
   3. Disable System Restore in Windows
   4. Remediate the Infected Systems
   5. Schedule Scans and Run Updates
   6. Enable System Restore and Create a Restore Point (in Windows)
   7. Educate the End User
Symptoms of Viruses
Symptoms of Spyware
More Symptoms of PC Security Issues and Potential Solutions
Chapter 55 Troubleshooting Mobile Operating Systems and Applications
Wireless Troubleshooting
   Wi-Fi Troubleshooting
   Bluetooth Troubleshooting
   NFC and AirDrop Troubleshooting
Troubleshooting Email Connections
Troubleshooting and Stopping Applications
Initiating Resets
More Mobile Application and OS Troubleshooting
   Updates: The Good and the Bad
   Application Issues
   Random Reboots
   Poor Battery Life
Video Issues
Chapter 56 Troubleshooting Mobile Operating Systems Security Issues
Mobile Device Security Concerns and Symptoms
CORE 2 (220-1102): DOMAIN 4.0: OPERATIONAL PROCEDURES
Chapter 57 Documentation
Types of Documents
   Network Topology Diagrams
   Incident Report Documentation
   Standard Operating Procedure
   Compliance and Regulatory Policy
   Acceptable Use Policy
   User Checklists (Onboarding and Offboarding)
Knowledge Bases/Articles
Ticketing Systems
Asset Management
Chapter 58 Change Management and Backup Methods
Understanding Basic Change Management Best Practices
Implementing Workstation Backup and Recovery Methods
   Using Windows File History and Recovery
   Backup Methods
   Backup Testing
   Backup Rotation Schemes
Chapter 59 Safety Procedures
ESD Prevention and Equipment Grounding
Electrical Safety
Electrical Fire Safety
Physical Safety
Chapter 60 Environmental Controls
Temperature, Humidity, and Air
MSDS and Disposal
Power Devices
   Surge Protectors
   Uninterruptible Power Supplies
Chapter 61 Incident Response, Communication, and Professionalism
Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts
   Incident Response
   Licensing/DRM/EULA
   Regulated Data
Using Proper Communication Techniques and Professionalism
   Communication Techniques and Professionalism
Chapter 62 Basic Scripting, Part I
Programming 101
   Basic Data Types
   Basic Script Constructs
   Environment Variables
   Comment Syntax
Chapter 63 Basic Scripting, Part II
PowerShell and .ps1
Bash and .sh
Use Cases and Other Considerations for PowerShell and Bash
Python and .py
JavaScript and .js
Visual Basic Script and .vbs
Chapter 64 Remote Access Technologies
Remote Desktop
   Remote Assistance
   Remote Desktop Connection
   Connecting with Remote Desktop
SSH
More Third-Party Tools
VPN
A+ Core 2 (220-1102) Practice Exam
Chapter 65 Getting Ready for the Exams, and Farewell
Getting Ready for the Exams
Tips for Taking the Real Exams
   General Practices for Taking Exams
   Smart Methods for Difficult Questions
   Wrapping Up the Exam
Beyond the CompTIA A+ Certification
9780137637546Â Â TOCÂ Â Â 4/12/2022
David L. Prowse has more than 20 years of experience in the IT field and loves to share his knowledge with readers, viewers, and students. Dave is an advocate of lifelong learning, self-improvement, building confidence, and the sharing of knowledge, and he promotes these ideas in his books, videos, and classes. He answers questions at his websites: https://dprocomputer.com (for A+) and https://prowse.tech (for Linux).
Need help? Get in touch
Play
Privacy and cookies
By watching, you agree Pearson can share your viewership data for marketing and analytics for one year, revocable upon changing cookie preferences. Disabling cookies may affect video functionality. More info...