0%

Book Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Fully redesigned and updated to provide accelerated review of all the topics covered on the new Core 1 and Core 2 CompTIA A+ exams

Get on the fast track to becoming CompTIA A+ certified with this affordable, portable study tool. Inside, certification training guru Mike Meyers guides you on your exam preparation path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA A+ 220-1001 & 220-1002 exams, this certification passport is your ticket to success on exam day.

TECHNICAL BULLETS:
Inside:
• Quick-reference tables and illustrated laptop teardown enhance coverage of mobile devices (Exam 1001, Domain 1.0)
• Quick-reference tables help you master hardware troubleshooting (Exam 1001, Domain 5.0)
• Practice questions and content review after each objective prepare you for exam mastery
• Enhanced coverage of network hardware and protocols, desktop hardware, and hardware and software troubleshooting
• Enhanced coverage of Windows 10, macOS, and Linux
• Enhanced coverage of computer security

Covers all exam topics, including how to:
• Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components
• Install, configure, and maintain hard drives
• Manage input devices and removable media
• Set up, upgrade, and maintain all versions of Windows
• Troubleshoot and fix computer problems
• Install printers and other peripherals
• Configure and secure mobile devices
• Connect to the Internet
• Set up wired and wireless networks
• Protect your personal computer and your network
• Implement virtualization and cloud-based technologies

Online content includes:
• Practice exams for 220-1001 & 220-1002
• Free sample of online video training from Mike Meyers
• Free sample of online interactive labs from Mike Meyers
• Mike’s favorite PC tools and utilities
• CompTIA A+ Glossary

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. About the Authors
  5. Contents at a Glance
  6. Contents
  7. Acknowledgments
  8. Introduction
  9. I CompTIA A+ Exam 220-1001
    1. 1.0 Mobile Devices
      1. Objective 1.1 Given a scenario, install and configure laptop hardware and components
        1. Hardware/Device Replacement
          1. Keyboard
          2. Hard Drive
          3. Memory
          4. Smart Card Reader
          5. Optical Drive
          6. Wireless Card/Bluetooth Module
          7. Cellular Card
          8. Video Card
          9. Mini PCIe
          10. Screen
          11. DC Jack
          12. Battery
          13. Touchpad
          14. Plastics/Frames
          15. Speaker
          16. System Board
          17. CPU
        2. REVIEW
          1. 1.1 QUESTIONS
          2. 1.1 ANSWERS
      2. Objective 1.2 Given a scenario, install components within the display of a laptop
        1. Types of Laptop Displays
          1. LCD
          2. OLED
        2. Wi-Fi Antenna Connector/Placement
        3. Webcam
        4. Microphone
        5. Inverter
        6. Digitizer/Touchscreen
        7. REVIEW
          1. 1.2 QUESTIONS
          2. 1.2 ANSWERS
      3. Objective 1.3 Given a scenario, use appropriate laptop features
        1. Special Function Keys
        2. Docking Station
        3. Port Replicator
        4. Physical Laptop Lock and Cable Lock
        5. Rotating/Removable Screens
        6. REVIEW
          1. 1.3 QUESTIONS
          2. 1.3 ANSWERS
      4. Objective 1.4 Compare and contrast characteristics of various types of other mobile devices
        1. Smartphones
        2. Tablets
        3. Wearable Technology Devices
          1. Smart Watches
          2. Fitness Monitors
          3. VR/AR Headsets
        4. E-readers
        5. GPS
        6. REVIEW
          1. 1.4 QUESTIONS
          2. 1.4 ANSWERS
      5. Objective 1.5 Given a scenario, connect and configure accessories and ports of other mobile devices
        1. Connection Types
          1. Wired
          2. Wireless
        2. Accessories
          1. Headsets
          2. Speakers
          3. Game Pads
          4. Extra Battery Packs/Battery Chargers
          5. Protective Covers/Waterproofing
          6. Credit Card Readers
          7. Memory/MicroSD
        3. REVIEW
          1. 1.5 QUESTIONS
          2. 1.5 ANSWERS
      6. Objective 1.6 Given a scenario, configure basic mobile device network connectivity and application support
        1. Wireless/Cellular Data Network (Enable/Disable)
          1. Hotspot
          2. Tethering
          3. Airplane Mode
        2. Bluetooth
        3. Corporate and ISP E-mail Configuration
          1. POP3
          2. IMAP
          3. Port and SSL Settings
          4. S/MIME
        4. Integrated Commercial Provider E-mail Configuration
          1. iCloud
          2. Google/Inbox
          3. Exchange Online
          4. Yahoo
        5. PRI Updates/PRL Updates/Baseband Updates
        6. Radio Firmware
        7. IMEI vs. IMSI
        8. VPN
        9. REVIEW
          1. 1.6 QUESTIONS
          2. 1.6 ANSWERS
      7. Objective 1.7 Given a scenario, use methods to perform mobile device synchronization
        1. Synchronization Methods
          1. Synchronize to the Cloud
          2. Synchronize to the Desktop
          3. Synchronize to the Automobile
        2. Types of Data to Synchronize
        3. Mutual Authentication for Multiple Services (SSO)
        4. Software Requirements to Install the Application on the PC
        5. Connection Types to Enable Synchronization
        6. REVIEW
          1. 1.7 QUESTIONS
          2. 1.7 ANSWERS
    2. 2.0 Networking
      1. Objective 2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes
        1. Ports and Protocols
        2. TCP vs. UDP
        3. REVIEW
          1. 2.1 QUESTIONS
          2. 2.1 ANSWERS
      2. Objective 2.2 Compare and contrast common networking hardware devices
        1. Ethernet
        2. Routers
        3. Switches
          1. Managed
          2. Unmanaged
        4. Hub
        5. Access Points
        6. Cloud-based Network Controller
        7. Firewall
        8. Network Interface Card
        9. Repeater
        10. Cable/DSL Modem
          1. DSL Modem
          2. Cable Modem
        11. Bridge
        12. Patch Panel
        13. Power over Ethernet (PoE)
          1. Injectors
          2. Switch
        14. Ethernet over Power
        15. REVIEW
          1. 2.2 QUESTIONS
          2. 2.2 ANSWERS
      3. Objective 2.3 Given a scenario, install and configure a basic wired/wireless SOHO network
        1. Router/Switch Functionality
        2. Access Point Settings
        3. IP Addressing
        4. NIC Configuration
          1. Wired
          2. Wireless
        5. End-user Device Configuration
        6. IoT Device Configuration
          1. Voice-enabled, Smart Speaker/Digital Assistant
        7. Cable/DSL Modem Configuration
        8. Firewall Settings
          1. DMZ
          2. Port Forwarding
          3. NAT
          4. UPnP
          5. MAC Filtering/Whitelist/Blacklist
        9. QoS
        10. Wireless Settings
          1. Encryption
          2. Channels
        11. REVIEW
          1. 2.3 QUESTIONS
          2. 2.3 ANSWERS
      4. Objective 2.4 Compare and contrast wireless networking protocols
        1. 802.11 Standards
        2. Frequencies: 2.4 GHz, 5 GHz
        3. Channels
          1. 1–11
        4. Bluetooth
        5. NFC
        6. RFID
        7. Zigbee
        8. Z-Wave
        9. Cellular Standards: 3G, 4G, LTE, 5G
        10. REVIEW
          1. 2.4 QUESTIONS
          2. 2.4 ANSWERS
      5. Objective 2.5 Summarize the properties and purposes of services provided by networked hosts
        1. Server Roles
          1. Web Server
          2. File Server
          3. Print Server
          4. DHCP Server
          5. DNS Server
          6. Proxy Server
          7. Mail Server
          8. Authentication Server
          9. Syslog
        2. Internet Appliance
          1. IDS
          2. IPS
          3. UTM
          4. End-point Management Server
        3. Legacy/Embedded Systems
        4. REVIEW
          1. 2.5 QUESTIONS
          2. 2.5 ANSWERS
      6. Objective 2.6 Explain common network configuration concepts
        1. IP Addressing
        2. IPv4 vs. IPv6
          1. Dynamic
          2. APIPA
          3. Link Local
          4. Static
        3. DNS
        4. DHCP
          1. Reservations
        5. Subnet Mask
        6. Gateway
        7. VPN
        8. VLAN
        9. NAT
        10. REVIEW
          1. 2.6 QUESTIONS
          2. 2.6 ANSWERS
      7. Objective 2.7 Compare and contrast Internet connection types, network types, and their features
        1. Internet Connection Types
          1. Cable
          2. DSL
          3. Dial-up
          4. Fiber
          5. Satellite
          6. ISDN
          7. Cellular
          8. Line-of-sight Wireless Internet Service
        2. Network Types
          1. LAN
          2. WAN
          3. PAN
          4. MAN
          5. WMN
        3. REVIEW
          1. 2.7 QUESTIONS
          2. 2.7 ANSWERS
      8. Objective 2.8 Given a scenario, use appropriate networking tools
        1. Crimper and Cable Stripper
        2. Multimeter
        3. Tone Generator and Probe
        4. Cable Tester
        5. Loopback Plug
        6. Punchdown Tool
        7. Wi-Fi Analyzer
        8. REVIEW
          1. 2.8 QUESTIONS
          2. 2.8 ANSWERS
    3. 3.0 Hardware
      1. Objective 3.1 Explain basic cable types, features, and their purposes
      2. Objective 3.2 Identify common connector types
        1. Network Cables and Connectors
          1. Ethernet
          2. RJ-11
          3. Fiber
          4. Coaxial
        2. Video Cables and Connectors
        3. Multipurpose Cables
          1. Lightning
          2. Thunderbolt
          3. USB
        4. Serial (RS-232) Cable
        5. Hard Drive Cables
          1. SATA and eSATA
          2. IDE
          3. SCSI
          4. Molex
        6. Adapters
          1. DVI to HDMI, DVI to VGA
          2. USB to Ethernet
        7. REVIEW
          1. 3.1/3.2 QUESTIONS
          2. 3.1/3.2 ANSWERS
      3. Objective 3.3 Given a scenario, install RAM types
        1. Desktop RAM
          1. DDR2
          2. DDR3
          3. DDR4
          4. Handling and Installing DIMM Sticks
        2. Laptop RAM
          1. Handling and Installing SO-DIMM Sticks
        3. Confirming RAM Installation
        4. Performance Configurations for Desktop and Laptop
        5. Error-correcting Memory
        6. Parity vs. Non-parity RAM
        7. REVIEW
          1. 3.3 QUESTIONS
          2. 3.3 ANSWERS
      4. Objective 3.4 Given a scenario, select, install, and configure storage devices
        1. Optical Drives
          1. Optical Media Formats
          2. Optical Media Capacity
          3. Optical Speeds
        2. Magnetic Hard Drives
          1. Hard Disk Drives
          2. Hybrid Drives
        3. Solid-State Drives
          1. M.2 Drives
          2. NVMe
        4. Flash
          1. SD Card
        5. Installing Storage Devices
          1. Installing SATA Drives
          2. Installing M.2 Drives
        6. Configurations
          1. RAID 0, 1, 5, 10
          2. Hot Swappable
        7. REVIEW
          1. 3.4 QUESTIONS
          2. 3.4 ANSWERS
      5. Objective 3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards
        1. Motherboard Form Factor
          1. ATX
          2. ITX
        2. Motherboard Connectors Types
          1. PCI
          2. PCIe
          3. Riser Card
          4. Socket Types
          5. SATA
          6. IDE
          7. Front Panel Connector
          8. Internal USB Connector
        3. Installing a Motherboard
        4. BIOS/UEFI Settings
          1. BIOS/UEFI
          2. Boot Options
          3. Firmware Updates
          4. Interface Configurations
          5. Security and Security Settings
        5. CMOS Battery
        6. CPU Features
          1. Hyper-Threading
          2. Single-core and Multicore
          3. Virtualization
          4. Speeds
          5. Overclocking
          6. Integrated GPU
        7. CPU Compatibility
        8. Cooling Mechanism
          1. Installing a Heat Sink and Fan Assembly
          2. Installing a Liquid Cooling System
        9. Expansion Cards
          1. Video Cards
          2. Sound Cards
          3. Network Interface Card
          4. USB Expansion Card
          5. eSATA Card
          6. Installing Expansion Cards
        10. REVIEW
          1. 3.5 QUESTIONS
          2. 3.5 ANSWERS
      6. Objective 3.6 Explain the purposes and uses of various peripheral types
        1. Output Devices
          1. Printer
          2. Monitors
          3. VR Headset
          4. Projector
          5. Speakers
          6. Headset
        2. Input Devices
          1. Mouse
          2. Keyboard
          3. Touchpad
          4. Signature Pad
          5. Game Controllers
          6. ADF/Flatbed Scanner
          7. Barcode Scanner/QR Scanner
          8. Camera/Webcam
          9. Microphone
          10. KVM
          11. Magnetic Reader/Chip Reader
          12. NFC/Tap Pay Device
          13. Smart Card Reader
        3. Drives and Storage Devices
          1. Optical Drive Types
          2. External Storage Drives
        4. REVIEW
          1. 3.6 QUESTIONS
          2. 3.6 ANSWERS
      7. Objective 3.7 Summarize power supply types and features
        1. Input: 115 V vs. 220 V
        2. Output: 5 V vs. 12 V
        3. 24-pin Motherboard Adapter
        4. Wattage Rating
        5. Number of Devices/Types of Devices to Be Powered
        6. Power Supply Installation Notes
        7. REVIEW
          1. 3.7 QUESTIONS
          2. 3.7 ANSWERS
      8. Objective 3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs
        1. REVIEW
          1. 3.8 QUESTIONS
          2. 3.8 ANSWERS
      9. Objective 3.9 Given a scenario, install and configure common devices
        1. Desktop
          1. Thin Client, Thick Client
          2. Account Setup/Settings
        2. Laptop/Common Mobile Devices
          1. Touchpad Configuration
          2. Touchscreen Configuration
          3. Application Installations/Configurations
          4. Synchronization Settings
          5. Account Setup/Settings
          6. Wireless Settings
        3. REVIEW
          1. 3.9 QUESTIONS
          2. 3.9 ANSWERS
      10. Objective 3.10 Given a scenario, configure SOHO multifunction devices/printers and settings
        1. Use Appropriate Drivers for a Given Operating System
          1. Installing a Local Printer
          2. Installing a Network Printer
          3. Configuration Settings
        2. Device Sharing
          1. Wired
          2. Wireless
          3. Integrated Print Server (Hardware)
          4. Cloud Printing/Remote Printing
        3. Public/Shared Devices
          1. Sharing Local/Networked Device via Operating System Settings
          2. Data Privacy
        4. REVIEW
          1. 3.10 QUESTIONS
          2. 3.10 ANSWERS
      11. Objective 3.11 Given a scenario, install and maintain various print technologies
        1. Laser
          1. Laser Printer Components and Features
          2. Imaging Process
          3. Laser Printer Maintenance
        2. Inkjet
          1. Calibrate
          2. Inkjet Maintenance
        3. Thermal
          1. Thermal Printer Maintenance
        4. Impact
          1. Impact Printer Maintenance
        5. Virtual Printers
          1. Print to File
          2. Print to PDF
          3. Print to XPS
          4. Print to Image
        6. 3-D Printers
          1. 3-D Printer Maintenance
        7. REVIEW
          1. 3.11 QUESTIONS
          2. 3.11 ANSWERS
    4. 4.0 Virtualization and Cloud Computing
      1. Objective 4.1 Compare and contrast cloud computing concepts
        1. Common Cloud Models
          1. IaaS
          2. PaaS
          3. SaaS
          4. Public vs. Private vs. Hybrid vs. Community
        2. Shared Resources
          1. Internal vs. External
        3. Resource Pooling
        4. Measured Service, Metered
        5. On-demand, Rapid Elasticity
        6. Off-site E-mail Applications
        7. Cloud File Storage Services
          1. Synchronization Apps
        8. Virtual Application Streaming/Cloud-based Applications
          1. Applications for Cell Phones/Tablets
          2. Applications for Laptops/Desktops
        9. Virtual Desktop
          1. Virtual NIC
        10. REVIEW
          1. 4.1 QUESTIONS
          2. 4.1 ANSWERS
      2. Objective 4.2 Given a scenario, set up and configure client-side virtualization
        1. Purpose of Virtual Machines
        2. Resource Requirements
        3. Emulator Requirements
        4. Security Requirements
        5. Network Requirements
        6. Hypervisor
          1. Installing a Hypervisor and Creating a Virtual Machine
          2. Installing the Guest Operating System
        7. REVIEW
          1. 4.2 QUESTIONS
          2. 4.2 ANSWERS
    5. 5.0 Hardware and Network Troubleshooting
      1. Objective 5.1 Given a scenario, use the best practice methodology to resolve problems
        1. The CompTIA Troubleshooting Methodology
        2. REVIEW
          1. 5.1 QUESTIONS
          2. 5.1 ANSWERS
      2. Objective 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power
        1. Troubleshooting Core Components
        2. REVIEW
          1. 5.2 QUESTIONS
          2. 5.2 ANSWERS
      3. Objective 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
        1. Troubleshooting Storage Systems
        2. REVIEW
          1. 5.3 QUESTIONS
          2. 5.3 ANSWERS
      4. Objective 5.4 Given a scenario, troubleshoot video, projector, and display issues
        1. Troubleshooting Display Issues
        2. REVIEW
          1. 5.4 QUESTIONS
          2. 5.4 ANSWERS
      5. Objective 5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
        1. Troubleshooting Mobile Devices
          1. Disassembling Processes for Proper Reassembly
          2. REVIEW
            1. 5.5 QUESTIONS
            2. 5.5 ANSWERS
      6. Objective 5.6 Given a scenario, troubleshoot printers
        1. Troubleshooting Printing Issues
        2. REVIEW
          1. 5.6 QUESTIONS
          2. 5.6 ANSWERS
      7. Objective 5.7 Given a scenario, troubleshoot common wired and wireless network problems
        1. Troubleshooting Network Issues
        2. REVIEW
          1. 5.7 QUESTIONS
          2. 5.7 ANSWERS
          3. II CompTIA A+ Exam 220-1002
            1. 1.0 Operating Systems
              1. Objective 1.1 Compare and contrast common operating system types and their purposes
                1. 32-bit vs. 64-bit
                  1. RAM Limitations
                  2. Software Compatibility
                2. Workstation Operating Systems
                  1. Microsoft Windows
                  2. Apple Macintosh OS
                  3. Linux
                3. Cell Phone/Tablet Operating Systems
                  1. Microsoft Windows
                  2. Android
                  3. iOS
                  4. Chrome OS
                4. Vendor-specific Limitations
                  1. End-of-Life
                  2. Update Limitations
                5. Compatibility Concerns Between Operating Systems
                6. REVIEW
                  1. 1.1 QUESTIONS
                  2. 1.1 ANSWERS
              2. Objective 1.2 Compare and contrast features of Microsoft Windows versions
                1. Windows 7
                2. Windows 8
                3. Windows 8.1
                4. Windows 10
                5. Windows 7 Editions
                6. Windows 8/8.1 Editions
                7. Windows 10 Editions
                8. Windows Corporate vs. Personal Needs
                  1. Domain Access
                  2. BitLocker
                  3. Media Center
                  4. BranchCache
                  5. EFS (Encrypting File System)
                9. Desktop Styles/User Interface
                10. REVIEW
                  1. 1.2 QUESTIONS
                  2. 1.2 ANSWERS
              3. Objective 1.3 Summarize general OS installation considerations and upgrade methods
                1. Boot Methods
                  1. Optical Disc (CD-ROM, DVD)
                  2. External Drive/Flash Drive (USB/eSATA)
                  3. Network Boot (PXE)
                  4. Internal Fixed Disk (HDD/SSD)
                  5. Internal Hard Drive (Partition)
                2. Type of Installations
                  1. Creating Installation Media
                  2. Unattended Installation
                  3. In-place Upgrade
                  4. Clean Install
                  5. Repair Installation
                  6. Multiboot
                  7. Remote Network Installation
                  8. Image Deployment
                  9. Recovery Partition
                  10. Refresh/Restore
                3. Partitioning
                  1. Basic
                  2. GPT
                  3. Dynamic
                4. File System Types/Formatting
                  1. FAT32
                  2. ExFAT
                  3. NTFS
                  4. CDFS
                  5. NFS
                  6. ext3, ext4
                  7. HFS
                  8. Swap Partition
                  9. Quick Format vs. Full Format
                5. Load Alternate Third-Party Drivers When Necessary
                6. Workgroup vs. Domain Setup
                7. Time/Date/Region/Language Settings
                8. Driver Installation, Software, and Windows Updates
                9. Factory Recovery Partition
                10. Properly Formatted Boot Drive with the Correct Partitions/Format
                11. Prerequisites/Hardware Compatibility
                12. Application Compatibility
                13. OS Compatibility/Upgrade Path
                14. REVIEW
                  1. 1.3 QUESTIONS
                  2. 1.3 ANSWERS
              4. Objective 1.4 Given a scenario, use appropriate Microsoft command line tools
                1. Commands Available with Standard Privileges vs. Administrative Privileges
                2. REVIEW
                  1. 1.4 QUESTIONS
                  2. 1.4 ANSWERS
              5. Objective 1.5 Given a scenario, use Microsoft operating system features and tools
                1. Administrative
                  1. Computer Management
                  2. Device Manager
                  3. Local Users and Groups
                  4. Performance Monitor
                  5. Services
                  6. Local Security Policy
                  7. System Configuration/Msconfig
                  8. Task Scheduler
                  9. Component Services
                  10. Data Sources
                  11. Print Management
                  12. Windows Memory Diagnostics
                  13. Windows Firewall
                  14. Advanced Security
                  15. Event Viewer
                  16. User Account Management
                2. Task Manager
                  1. Task Manager Tabs in Windows 8/8.1/10
                3. Disk Management
                  1. Drive Status
                  2. Mounting
                  3. Initializing
                  4. Extending, Shrinking, Splitting Partitions
                  5. Assigning/Changing Drive Letters
                  6. Adding Drives
                  7. Adding Arrays
                  8. Storage Spaces
                4. System Utilities
                  1. Regedit
                  2. Command
                  3. Services.msc
                  4. MMC
                  5. MSTSC (Remote Desktop Connection)
                  6. Notepad
                  7. Windows Explorer/File Explorer
                  8. Msinfo32
                  9. DxDiag
                  10. Disk Defragmenter
                  11. System Restore
                  12. Windows Update
                5. REVIEW
                  1. 1.5 QUESTIONS
                  2. 1.5 ANSWERS
              6. Objective 1.6 Given a scenario, use Microsoft Windows Control Panel utilities
                1. Internet Options
                2. Display/Display Settings
                3. User Accounts
                4. Folder Options
                5. System
                  1. Performance (Virtual Memory)
                  2. Remote Settings
                  3. System Protection
                6. Windows Firewall
                7. Power Options
                  1. Power Plans
                  2. Sleep/Suspend/Standby/Hibernate
                8. Credential Manager
                9. Programs and Features
                10. HomeGroup
                11. Devices and Printers
                12. Sound
                13. Troubleshooting
                14. Network and Sharing Center
                15. Device Manager
                16. BitLocker
                17. Sync Center
                18. REVIEW
                  1. 1.6 QUESTIONS
                  2. 1.6 ANSWERS
              7. Objective 1.7 Summarize application installation and configuration concepts
                1. System Requirements
                  1. Drive Space
                  2. RAM
                2. OS Requirements
                  1. Compatibility
                3. Methods of Installation and Deployment
                4. Local User Permissions
                  1. Folder/File Access for Installation
                5. Security Considerations
                  1. Impact to Device and Impact to Network
                6. REVIEW
                  1. 1.7 QUESTIONS
                  2. 1.7 ANSWERS
              8. Objective 1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop
                1. HomeGroup vs. Workgroup
                2. Domain Setup
                3. Network Shares/Administrative Shares/Mapping Drives
                4. Printer Sharing vs. Network Printer Mapping
                5. Establish Networking Connections
                  1. VPN
                  2. Dial-ups
                  3. Wireless
                  4. Wired
                  5. WWAN (Cellular)
                6. Proxy Settings
                7. Remote Desktop Connection
                8. Remote Assistance
                9. Home vs. Work vs. Public Network Settings
                10. Firewall Settings
                11. Configuring an Alternative IP Address in Windows
                  1. IP Addressing
                  2. Subnet Mask
                  3. Gateway
                  4. DNS
                12. Network Card Properties
                  1. Half Duplex/Full Duplex/Auto/Speed
                  2. Wake-on-LAN
                  3. QoS
                  4. BIOS (on-board NIC)
                13. REVIEW
                  1. 1.8 QUESTIONS
                  2. 1.8 ANSWERS
              9. Objective 1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems
                1. Best Practices
                  1. Scheduled Backups
                  2. Scheduled Disk Maintenance
                  3. System Updates/App Store
                  4. Patch Management
                  5. Driver/Firmware Updates
                  6. Antivirus/Anti-malware Updates
                2. Tools
                  1. Backup/Time Machine
                  2. Restore/Snapshot
                  3. Image Recovery
                  4. Disk Maintenance Utilities
                  5. Shell/Terminal
                  6. Screen Sharing
                  7. Force Quit
                3. Features
                  1. Multiple Desktops/Mission Control
                  2. Key Chain
                  3. Spotlight
                  4. iCloud
                  5. Gestures
                  6. Finder
                  7. Remote Disc
                  8. Dock
                  9. Boot Camp
                4. Basic Linux Commands
                5. REVIEW
                  1. 1.9 QUESTIONS
                  2. 1.9 ANSWERS
            2. 2.0 Security
              1. Objective 2.1 Summarize the importance of physical security measures
                1. Mantrap and Entry Control Roster
                2. Badge Reader
                3. Smart Card, Key Fob, and Hardware Tokens
                4. Security Guard
                5. Lock Types and Applications
                  1. Door Lock
                  2. Biometric Locks
                  3. Cable Locks
                  4. Server Locks
                  5. USB Locks
                6. Privacy Screen
                7. REVIEW
                  1. 2.1 QUESTIONS
                  2. 2.1 ANSWERS
              2. Objective 2.2 Explain logical security concepts
                1. Active Directory
                  1. Login Script
                  2. Domain
                  3. Group Policy/Updates
                  4. Organizational Units
                  5. Home Folder
                  6. Folder Redirection
                2. Software Tokens
                3. MDM Policies
                4. Port Security
                5. MAC Address Filtering
                6. Certificates
                7. Antivirus/Anti-Malware
                8. Firewalls
                9. User Authentication/Strong Passwords
                10. Multifactor Authentication
                11. Directory Permissions
                12. VPN
                13. DLP
                14. Access Control Lists
                15. Smart Card
                16. E-mail Filtering
                17. Trusted/Untrusted Software Sources
                18. Principle of Least Privilege
                19. REVIEW
                  1. 2.2 QUESTIONS
                  2. 2.2 ANSWERS
              3. Objective 2.3 Compare and contrast wireless security protocols and authentication methods
                1. Protocols and Encryption
                  1. WEP
                  2. WPA and TKIP
                  3. WPA2 and AES
                2. Authentication
                  1. Single-Factor
                  2. Multifactor
                  3. RADIUS
                  4. TACACS
                3. REVIEW
                  1. 2.3 QUESTIONS
                  2. 2.3 ANSWERS
              4. Objective 2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
                1. Malware
                  1. Ransomware
                  2. Trojan
                  3. Keylogger
                  4. Rootkit
                  5. Virus
                  6. Botnet
                  7. Worm
                  8. Spyware
                2. Tools and Methods
                  1. Antivirus and Anti-Malware
                  2. Recovery Console
                  3. Backup/Restore
                  4. End-user Education
                  5. Software Firewalls
                  6. DNS Configuration
                3. REVIEW
                  1. 2.4 QUESTIONS
                  2. 2.4 ANSWERS
              5. Objective 2.5 Compare and contrast social engineering, threats, and vulnerabilities
                1. Social Engineering
                  1. Phishing
                  2. Impersonation
                  3. Shoulder Surfing
                  4. Tailgating
                  5. Dumpster Diving
                2. Threats and Vulnerabilities
                  1. DoS and DDoS
                  2. Zero-day
                  3. Man-in-the-Middle
                  4. Brute Force
                  5. Dictionary
                  6. Rainbow Table
                  7. Spoofing
                  8. Non-compliant Systems
                  9. Zombie
                3. REVIEW
                  1. 2.5 QUESTIONS
                  2. 2.5 ANSWERS
              6. Objective 2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings
                1. User and Groups
                  1. User and Group Types
                2. NTFS vs. Share Permissions
                  1. Allow vs. Deny
                  2. File Attributes
                3. Shared Files and Folders
                  1. Administrative Shares vs. Local Shares
                  2. Permission Propagation: Moving vs. Copying Folders and Files
                  3. Inheritance
                4. System Files and Folders
                5. User Authentication
                  1. Single Sign-On
                6. Run as Administrator vs. Standard User
                7. BitLocker and BitLocker To Go
                8. EFS
                9. REVIEW
                  1. 2.6 QUESTIONS
                  2. 2.6 ANSWERS
              7. Objective 2.7 Given a scenario, implement security best practices to secure a workstation
                1. Password Best Practices
                  1. Setting Strong Passwords
                  2. Password Expiration
                  3. Screensaver Required Password
                  4. BIOS/UEFI Passwords
                  5. Requiring Passwords
                2. Account Management
                  1. Restricting User Permissions
                  2. Logon Time Restrictions
                  3. Disabling Guest Account
                  4. Failed Attempts Lockout
                  5. Timeout/Screen Lock
                  6. Change Default Admin User Account/Password
                  7. Basic Active Directory Functions
                3. Disable Autorun
                4. Data Encryption
                5. Patch/Update Management
                6. REVIEW
                  1. 2.7 QUESTIONS
                  2. 2.7 ANSWERS
              8. Objective 2.8 Given a scenario, implement methods for securing mobile devices
                1. Screen Locks
                  1. Fingerprint Lock
                  2. Face Lock
                  3. Swipe Lock
                  4. Passcode Lock
                2. Remote Wipes
                3. Locator Applications
                4. Remote Backup Applications
                5. Failed Login Attempts Restrictions
                6. Antivirus/Anti-Malware
                7. Patching/OS Updates
                8. Biometric Authentication
                9. Full Device Encryption
                10. Multifactor Authentication
                11. Authenticator Applications
                12. Trusted Sources vs. Untrusted Sources
                13. Firewalls
                14. Policies and Procedures
                  1. BYOD vs. Corporate-owned
                  2. Profile Security Requirements
                15. REVIEW
                  1. 2.8 QUESTIONS
                  2. 2.8 ANSWERS
              9. Objective 2.9 Given a scenario, implement appropriate data destruction and disposal methods
                1. Physical Destruction
                  1. Shredder
                  2. Drill/Hammer
                  3. Electromagnetic (Degaussing)
                  4. Incineration
                  5. Certificate of Destruction
                2. Recycling or Repurposing Best Practices
                  1. Low-level Format vs. Standard Format
                  2. Overwrite
                  3. Drive Wipe
                3. REVIEW
                  1. 2.9 QUESTIONS
                  2. 2.9 ANSWERS
              10. Objective 2.10 Given a scenario, configure security on SOHO wireless and wired networks
                1. Wireless-Specific
                  1. Changing Default SSID
                  2. Setting Encryption
                  3. Disabling SSID Broadcast
                  4. Antenna and Access Point Placement
                  5. Radio Power Levels
                  6. WPS
                2. Change Default Usernames and Passwords
                3. Enable MAC Filtering
                4. Assign Static IP Addresses
                5. Firewall Settings
                6. Port Forwarding/Mapping
                7. Disabling Ports
                8. Content Filtering/Parental Controls
                9. Update Firmware
                10. Physical Security
                11. REVIEW
                  1. 2.10 QUESTIONS
                  2. 2.10 ANSWERS
            3. 3.0 Software Troubleshooting
              1. Objective 3.1 Given a scenario, troubleshoot Microsoft Windows OS problems
                1. Common Symptoms of Windows Problems
                  1. Slow Performance
                  2. Limited Connectivity
                  3. Failure to Boot, No OS Found
                  4. Application Crashes
                  5. Blue Screens
                  6. Black Screens
                  7. Printing Issues
                  8. Services Fail to Start
                  9. Slow Bootup
                  10. Slow Profile Load
                2. Common Solutions for Windows Problems
                  1. Windows Repair and Recovery
                  2. Defragment the Hard Drive
                  3. Reboot
                  4. Kill Tasks
                  5. Restart Services
                  6. Update Network Settings
                  7. Reimage/Reload OS
                  8. Roll Back Updates
                  9. Roll Back Device Drivers
                  10. Apply Updates
                  11. Repair Application
                  12. Update Boot Order
                  13. Disable Windows Services/Applications
                  14. Disable Application Startup
                  15. Safe Boot
                  16. Rebuild Windows Profiles
                3. REVIEW
                  1. 3.1 QUESTIONS
                  2. 3.1 ANSWERS
              2. Objective 3.2 Given a scenario, troubleshoot and resolve PC security issues
                1. Common Symptoms of PC Security Issues
                  1. Pop-ups
                  2. Browser Redirection
                  3. Security Alerts
                  4. Slow Performance
                  5. Internet Connectivity Issues
                  6. PC/OS Lockup
                  7. Application Crash
                  8. OS Updates Failures
                  9. Rogue Antivirus
                  10. Spam
                  11. File Issues
                  12. E-mail Issues
                  13. Access Denied
                  14. Invalid Certificate (Trusted Root CA)
                  15. System/Application Log Errors
                2. REVIEW
                  1. 3.2 QUESTIONS
                  2. 3.2 ANSWERS
              3. Objective 3.3 Given a scenario, use best practice procedures for malware removal
                1. Best Practice Malware Removal Process
                2. REVIEW
                  1. 3.3 QUESTIONS
                  2. 3.3 ANSWERS
              4. Objective 3.4 Given a scenario, troubleshoot mobile OS and application issues
                1. Common Symptoms of Mobile OS and Application Issues (with Solutions)
                  1. Dim Display
                  2. Intermittent Wireless
                  3. No Wireless Connectivity
                  4. No Bluetooth Connectivity
                  5. Cannot Broadcast to External Monitor
                  6. Touchscreen Nonresponsive or Responds Inaccurately
                  7. Apps Not Loading
                  8. Slow Performance
                  9. Unable to Decrypt E-mail
                  10. Extremely Short Battery Life
                  11. Overheating
                  12. Frozen System
                  13. No Sound from Speakers
                  14. System Lockout
                  15. App Log Errors
                2. REVIEW
                  1. 3.4 QUESTIONS
                  2. 3.4 ANSWERS
              5. Objective 3.5 Given a scenario, troubleshoot mobile OS and application security issues
                1. Common Symptoms of Mobile OS and Application Security Issues (with Solutions)
                  1. Wi-Fi, Wireless Cellular, and Bluetooth Issues
                  2. Leaked Personal Files/Data
                  3. Unauthorized Account Access
                  4. Unauthorized Location Tracking
                  5. Unauthorized Camera/Microphone Activation
                2. REVIEW
                  1. 3.5 QUESTIONS
                  2. 3.5 ANSWERS
            4. 4.0 Operational Procedures
              1. Objective 4.1 Compare and contrast best practices associated with types of documentation
                1. Network Topology Diagrams
                2. Knowledge Base/Articles
                3. Incident Documentation
                4. Regulatory and Compliance Policy
                5. Acceptable Use Policy
                6. Password Policy
                7. Inventory Management
                  1. Barcodes
                  2. Asset Tags
                8. REVIEW
                  1. 4.1 QUESTIONS
                  2. 4.1 ANSWERS
              2. Objective 4.2 Given a scenario, implement basic change management best practices
                1. Change Management Best Practices Overview
                2. Documented Business Processes
                3. Purpose of the Change
                4. Scope the Change
                5. Risk Analysis
                6. Plan for Change
                7. End-user Acceptance
                8. Change Board
                  1. Approvals
                9. Backout Plan
                10. Document Changes
                11. REVIEW
                  1. 4.2 QUESTIONS
                  2. 4.2 ANSWERS
              3. Objective 4.3 Given a scenario, implement basic disaster prevention and recovery methods
                1. Backup and Recovery
                  1. Image Level
                  2. File Level
                  3. Critical Applications
                2. Backup Testing
                3. UPS
                4. Surge Protector
                5. Cloud Storage vs. Local Storage Backups
                6. Account Recovery Options
                7. REVIEW
                  1. 4.3 QUESTIONS
                  2. 4.3 ANSWERS
              4. Objective 4.4 Explain common safety procedures
                1. Equipment Grounding
                2. Proper Component Handling and Storage
                  1. Antistatic Bags
                  2. ESD Straps
                  3. ESD Mats
                  4. Self-Grounding
                3. Toxic Waste Handling
                  1. Batteries
                  2. Toner
                  3. CRT
                  4. Cell Phones and Tablets
                4. Personal Safety
                  1. Disconnect Power Before Repairing PC
                  2. Remove Jewelry
                  3. Lifting Techniques
                  4. Weight Limitations
                  5. Electrical Fire Safety
                  6. Cable Management
                  7. Safety Goggles
                  8. Air Filter Mask
                5. Compliance with Government Regulations
                6. REVIEW
                  1. 4.4 QUESTIONS
                  2. 4.4 ANSWERS
              5. Objective 4.5 Explain environmental impacts and appropriate controls
                1. MSDS Documentation for Handling and Disposal
                2. Temperature, Humidity Level Awareness, and Proper Ventilation
                3. Power Surges, Brownouts, and Blackouts
                  1. Lightning
                  2. EMI
                4. Protection from Airborne Particles
                  1. Enclosures
                  2. Air Filters/Mask
                5. Dust and Debris
                  1. Compressed Air
                  2. Vacuums
                6. Compliance to Government Regulations
                7. REVIEW
                  1. 4.5 QUESTIONS
                  2. 4.5 ANSWERS
              6. Objective 4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
                1. Incident Response
                  1. First Response
                  2. Use of Documentation/Documentation Changes
                  3. Chain of Custody
                2. Licensing/DRM/EULA
                  1. Open-Source vs. Commercial License
                  2. Personal License vs. Enterprise Licenses
                3. Regulated Data
                4. Follow All Policies and Security Best Practices
                5. REVIEW
                  1. 4.6 QUESTIONS
                  2. 4.6 ANSWERS
              7. Objective 4.7 Given a scenario, use proper communication techniques and professionalism
                1. Communication Techniques
                2. Professionalism
                3. REVIEW
                  1. 4.7 QUESTIONS
                  2. 4.7 ANSWERS
              8. Objective 4.8 Identify the basics of scripting
                1. Script File Types
                  1. .bat
                  2. .ps1
                  3. .vbs
                  4. .sh
                  5. .py
                  6. .js
                2. Environment Variables
                3. Comment Syntax
                4. Basic Script Constructs
                  1. Basic Loops
                  2. Variables
                5. Basic Data Types
                  1. Integers
                  2. Strings
                6. REVIEW
                  1. 4.8 QUESTIONS
                  2. 4.8 ANSWERS
              9. Objective 4.9 Given a scenario, use remote access technologies
                1. RDP
                2. Telnet
                3. SSH
                4. Third-Party Tools
                  1. Screen Share Feature
                  2. File Share
                5. Security Considerations of Each Access Method
                6. REVIEW
                  1. 4.9 QUESTIONS
                  2. 4.9 ANSWERS
                  3. A About the Online Content
                    1. System Requirements
                    2. Your Total Seminars Training Hub Account
                      1. Privacy Notice
                    3. Single User License Terms and Conditions
                    4. TotalTester Online
                      1. Pre-assessment Test
                    5. Other Online Book Resources
                      1. TotalSims for A+
                      2. Mike’s Video Training
                      3. Mike’s Cool Tools
                      4. PDF Glossary
                    6. Technical Support
                  4. Index
3.141.2.96