CompTIA A+ Complete Practice Tests |
|
|
|
xi | |
|
|
1 | (154) |
|
|
3 | (26) |
|
|
29 | (26) |
|
|
55 | (54) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
109 | (8) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
117 | (38) |
|
|
155 | (152) |
|
Chapter 6 Operating Systems |
|
|
157 | (60) |
|
|
217 | (34) |
|
Chapter 8 Software Troubleshooting |
|
|
251 | (32) |
|
Chapter 9 Operational Procedures |
|
|
283 | (24) |
|
|
307 | (42) |
|
Chapter 10 Practice Exam 1 (220-1001) |
|
|
309 | (20) |
|
Chapter 11 Practice Exam 2 (220-1002) |
|
|
329 | (20) |
|
Appendix Answers and Explanations |
|
|
349 | (134) |
|
Chapter 1: Mobile Devices |
|
|
350 | (9) |
|
|
359 | (9) |
|
|
368 | (16) |
|
Chapter 4: Virtualization and Cloud Computing |
|
|
384 | (4) |
|
Chapter 5: Hardware and Network Troubleshooting |
|
|
388 | (15) |
|
Chapter 6: Operating Systems |
|
|
403 | (24) |
|
|
427 | (14) |
|
Chapter 8: Software Troubleshooting |
|
|
441 | (14) |
|
Chapter 9: Operational Procedures |
|
|
455 | (9) |
|
Chapter 10: Practice Exam 1 (220-1001) |
|
|
464 | (8) |
|
Chapter 11: Practice Exam 2 (220-1002) |
|
|
472 | (11) |
|
|
483 | |
CompTIA A+ Complete Review Guide |
|
|
|
xxxi | |
|
Part I CompTIA A+ Core 1 Exam 220-1001 |
|
|
1 | (308) |
|
|
3 | (54) |
|
1.1 Given a scenario, install and configure laptop hardware and components |
|
|
8 | (7) |
|
Hardware/device replacement |
|
|
8 | (7) |
|
|
15 | (1) |
|
1.2 Given a scenario, install components within the display of a laptop |
|
|
15 | (4) |
|
|
16 | (1) |
|
WiFi antenna connector/placement |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
1.3 Given a scenario, use appropriate laptop features |
|
|
19 | (7) |
|
|
19 | (5) |
|
|
24 | (1) |
|
|
25 | (1) |
|
Physical laptop lock and cable lock |
|
|
25 | (1) |
|
Rotating/removable screens |
|
|
26 | (1) |
|
|
26 | (1) |
|
1.4 Compare and contrast characteristics of various types of other mobile devices |
|
|
26 | (5) |
|
|
27 | (1) |
|
|
27 | (1) |
|
Wearable technology devices |
|
|
27 | (3) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
1.5 Given a scenario, connect, and configure accessories and ports of other mobile devices |
|
|
31 | (8) |
|
|
31 | (5) |
|
|
36 | (3) |
|
|
39 | (1) |
|
1.6 Given a scenario, configure basic mobile device network connectivity and application support |
|
|
39 | (11) |
|
Wireless/cellular data network (enable/disable) |
|
|
39 | (1) |
|
|
40 | (2) |
|
Corporate and ISP email configuration |
|
|
42 | (3) |
|
Integrated commercial provider email configuration |
|
|
45 | (2) |
|
PRI updates/PRL updates/Baseband updates |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
1.7 Given a scenario, use methods to perform mobile device synchronization |
|
|
50 | (7) |
|
|
50 | (1) |
|
Types of data to synchronize |
|
|
51 | (2) |
|
Mutual authentication for multiple services (SSO) |
|
|
53 | (1) |
|
Software requirements to install the application on the PC |
|
|
53 | (1) |
|
Connection types to enable synchronization |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (3) |
|
|
57 | (54) |
|
2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes |
|
|
62 | (3) |
|
|
62 | (3) |
|
|
65 | (1) |
|
|
65 | (1) |
|
2.2 Compare and contrast common networking hardware devices |
|
|
65 | (6) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
Cloud-based network controller |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
Power over Ethernet (PoE) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
2.3 Given a scenario, install and configure a basic wired/ wireless SOHO network |
|
|
71 | (11) |
|
Router/switch functionality |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
End-user device configuration |
|
|
74 | (1) |
|
|
75 | (1) |
|
Cable/DSL modem configuration |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
2.4 Compare and contrast wireless networking protocols |
|
|
82 | (4) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
2.5 Summarize the properties and purposes of services provided by networked hosts |
|
|
86 | (4) |
|
|
86 | (2) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
90 | (1) |
|
2.6 Explain common network configuration concepts |
|
|
90 | (9) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
2.7 Compare and contrast Internet connection types, network types, and their features |
|
|
99 | (3) |
|
Internet connection types |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
102 | (1) |
|
2.8 Given a scenario, use appropriate networking tools |
|
|
102 | (9) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (5) |
|
|
111 | (124) |
|
3.1 Explain basic cable types, features, and their purposes |
|
|
120 | (16) |
|
|
120 | (4) |
|
|
124 | (3) |
|
|
127 | (3) |
|
|
130 | (1) |
|
|
131 | (3) |
|
|
134 | (2) |
|
|
136 | (1) |
|
3.2 Identify common connector types |
|
|
136 | (5) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
3.3 Given a scenario, install RAM types |
|
|
141 | (6) |
|
|
142 | (2) |
|
Single channel/dual channel/triple channel |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (2) |
|
|
147 | (1) |
|
3.4 Given a scenario, select, install, and configure storage devices |
|
|
147 | (12) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (2) |
|
|
151 | (1) |
|
|
152 | (3) |
|
|
155 | (4) |
|
|
159 | (1) |
|
3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards |
|
|
159 | (24) |
|
|
160 | (2) |
|
Motherboard connectors types |
|
|
162 | (5) |
|
|
167 | (4) |
|
|
171 | (1) |
|
|
172 | (2) |
|
|
174 | (4) |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
182 | (1) |
|
3.6 Explain the purposes and uses of various peripheral types |
|
|
183 | (6) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Barcode scanner/QR scanner |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
Magnetic reader/chip reader |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
3.7 Summarize power supply types and features |
|
|
189 | (5) |
|
|
189 | (1) |
|
|
190 | (1) |
|
24-pin motherboard adapter |
|
|
190 | (1) |
|
|
191 | (1) |
|
Number of devices/types of devices to be powered |
|
|
191 | (3) |
|
|
194 | (1) |
|
3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs |
|
|
194 | (6) |
|
Graphic/CAD/CAM design workstation |
|
|
194 | (1) |
|
Audio/Video editing workstation |
|
|
195 | (1) |
|
Virtualization workstation |
|
|
196 | (1) |
|
|
196 | (2) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Network-attached storage device |
|
|
199 | (1) |
|
|
200 | (1) |
|
3.9 Given a scenario, install and configure common devices |
|
|
200 | (2) |
|
|
200 | (1) |
|
Laptop/common mobile devices |
|
|
201 | (1) |
|
|
202 | (1) |
|
3.10 Given a scenario, configure SOHO multifunction devices/printers and settings |
|
|
202 | (6) |
|
Use appropriate drivers for a given operating system |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
205 | (3) |
|
|
208 | (1) |
|
3.11 Given a scenario, install and maintain various print technologies |
|
|
208 | (27) |
|
|
210 | (10) |
|
|
220 | (3) |
|
|
223 | (1) |
|
|
224 | (2) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (7) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
235 | (14) |
|
4.1 Compare and contrast cloud computing concepts |
|
|
237 | (5) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
Off-site email applications |
|
|
240 | (1) |
|
Cloud file storage services |
|
|
240 | (1) |
|
Virtual application streaming/cloud-based applications |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
4.2 Given a scenario, set up and configure client-side virtualization |
|
|
242 | (7) |
|
Purpose of virtual machines |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (3) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
249 | (60) |
|
5.1 Given a scenario, use the best practice methodology to resolve problems |
|
|
254 | (4) |
|
Always consider corporate policies, procedures, and impacts before implementing changes |
|
|
254 | (1) |
|
|
255 | (1) |
|
2 Establish a theory of probable cause (question the obvious) |
|
|
256 | (1) |
|
3 Test the theory to determine cause |
|
|
256 | (1) |
|
4 Establish a plan of action to resolve the problem and implement the solution |
|
|
257 | (1) |
|
5 Verify full system functionality and, if applicable, implement preventive measures |
|
|
257 | (1) |
|
6 Document findings, actions, and outcomes |
|
|
257 | (1) |
|
|
257 | (1) |
|
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power |
|
|
258 | (10) |
|
|
258 | (10) |
|
|
268 | (1) |
|
5.3 Given a scenario, troubleshoot hard drives and RAID arrays |
|
|
268 | (4) |
|
|
269 | (3) |
|
|
272 | (1) |
|
5.4 Given a scenario, troubleshoot video, projector, and display issues |
|
|
272 | (6) |
|
|
273 | (5) |
|
|
278 | (1) |
|
5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures |
|
|
278 | (11) |
|
|
279 | (9) |
|
Disassembling processes for proper reassembly |
|
|
288 | (1) |
|
|
289 | (1) |
|
5.6 Given a scenario, troubleshoot printers |
|
|
289 | (8) |
|
|
290 | (6) |
|
|
296 | (1) |
|
5.7 Given a scenario, troubleshoot common wired and wireless network problems |
|
|
297 | (14) |
|
|
297 | (7) |
|
|
304 | (1) |
|
|
305 | (4) |
|
Part II CompTIA A+ Core 2 Exam 220-1002 |
|
|
309 | (322) |
|
Chapter 6 Operating Systems |
|
|
311 | (152) |
|
1.1 Compare and contrast common operating system types and their purposes |
|
|
321 | (3) |
|
|
321 | (1) |
|
Workstation operating systems |
|
|
322 | (1) |
|
Cell phone/tablet operating systems |
|
|
323 | (1) |
|
Vendor-specific limitations |
|
|
323 | (1) |
|
Compatibility concerns between operating systems |
|
|
324 | (1) |
|
|
324 | (1) |
|
1.2 Compare and contrast features of Microsoft Windows versions |
|
|
324 | (8) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Corporate vs. personal needs |
|
|
327 | (1) |
|
Desktop styles/user interface |
|
|
328 | (4) |
|
|
332 | (1) |
|
1.3 Summarize general OS installation considerations and upgrade methods |
|
|
332 | (19) |
|
|
332 | (7) |
|
|
339 | (1) |
|
|
340 | (4) |
|
|
344 | (2) |
|
File system types/formatting |
|
|
346 | (2) |
|
Load alternate third-party drivers when necessary |
|
|
348 | (1) |
|
Workgroup vs. domain setup |
|
|
349 | (1) |
|
Time/date/region/language settings |
|
|
349 | (1) |
|
Driver installation, software, and Windows updates |
|
|
349 | (1) |
|
Factory recovery partition |
|
|
350 | (1) |
|
Properly formatted boot drive with the correct partitions/format |
|
|
350 | (1) |
|
Prerequisites/hardware compatibility |
|
|
350 | (1) |
|
Application compatibility |
|
|
350 | (1) |
|
OS compatibility/upgrade path |
|
|
350 | (1) |
|
|
350 | (1) |
|
1.4 Given a scenario, use appropriate Microsoft command- line tools |
|
|
351 | (21) |
|
|
352 | (2) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
356 | (2) |
|
|
358 | (1) |
|
|
359 | (2) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
Commands available with standard privileges vs. administrative privileges |
|
|
371 | (1) |
|
|
372 | (1) |
|
1.5 Given a scenario, use Microsoft operating system features and tools |
|
|
372 | (28) |
|
|
373 | (5) |
|
|
378 | (4) |
|
|
382 | (8) |
|
|
390 | (8) |
|
|
398 | (2) |
|
|
400 | (1) |
|
1.6 Given a scenario, use Microsoft Windows Control Panel utilities |
|
|
400 | (24) |
|
|
400 | (6) |
|
|
406 | (2) |
|
|
408 | (1) |
|
|
408 | (3) |
|
|
411 | (3) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (1) |
|
Network and Sharing Center |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
1.7 Summarize application installation and configuration concepts |
|
|
424 | (2) |
|
|
425 | (1) |
|
|
425 | (1) |
|
Methods of installation and deployment |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (1) |
|
1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop |
|
|
426 | (14) |
|
|
427 | (1) |
|
|
427 | (2) |
|
Network shares/administrative shares/mapping drives |
|
|
429 | (1) |
|
Printer sharing vs. network printer mapping |
|
|
429 | (2) |
|
Establish networking connections |
|
|
431 | (1) |
|
|
432 | (1) |
|
Remote Desktop Connection |
|
|
433 | (1) |
|
|
434 | (1) |
|
Home vs. Work vs. Public network settings |
|
|
435 | (1) |
|
|
436 | (1) |
|
Configuring an alternative IP address in Windows |
|
|
437 | (2) |
|
|
439 | (1) |
|
|
440 | (1) |
|
1.9 Given a scenario, use features and tools of the MacOS and Linux client/desktop operating systems |
|
|
440 | (23) |
|
|
441 | (4) |
|
|
445 | (5) |
|
|
450 | (4) |
|
|
454 | (5) |
|
|
459 | (1) |
|
|
460 | (3) |
|
|
463 | (78) |
|
2.1 Summarize the importance of physical security measures |
|
|
470 | (4) |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
473 | (1) |
|
|
473 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
2.2 Explain logical security concepts |
|
|
474 | (12) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
478 | (3) |
|
User authentication/strong passwords |
|
|
481 | (1) |
|
Multifactor authentication |
|
|
482 | (1) |
|
|
482 | (2) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
Trusted/Untrusted software sources |
|
|
485 | (1) |
|
Principle of least privilege |
|
|
485 | (1) |
|
|
485 | (1) |
|
2.3 Compare and contrast wireless security protocols and authentication methods |
|
|
486 | (3) |
|
|
486 | (1) |
|
|
487 | (2) |
|
|
489 | (1) |
|
2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods |
|
|
489 | (11) |
|
|
489 | (7) |
|
|
496 | (3) |
|
|
499 | (1) |
|
2.5 Compare and contrast social engineering, threats, and vulnerabilities |
|
|
500 | (5) |
|
|
500 | (2) |
|
|
502 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
504 | (1) |
|
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings |
|
|
505 | (9) |
|
|
505 | (1) |
|
NTFS vs. share permissions |
|
|
506 | (4) |
|
|
510 | (2) |
|
|
512 | (1) |
|
|
512 | (1) |
|
Run as administrator vs. standard user |
|
|
512 | (1) |
|
BitLocker/BitLocker To Go |
|
|
513 | (1) |
|
|
513 | (1) |
|
|
514 | (1) |
|
2.7 Given a scenario, implement security best practices to secure a workstation |
|
|
514 | (6) |
|
|
514 | (2) |
|
|
516 | (3) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
2.8 Given a scenario, implement methods for securing mobile devices |
|
|
520 | (7) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
Remote backup applications |
|
|
522 | (1) |
|
Failed login attempts restrictions |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
Multifactor authentication |
|
|
524 | (1) |
|
Authenticator applications |
|
|
524 | (1) |
|
Trusted sources vs. untrusted sources |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
526 | (1) |
|
2.9 Given a scenario, implement appropriate data destruction and disposal methods |
|
|
527 | (3) |
|
|
527 | (2) |
|
Recycling or repurposing best practices |
|
|
529 | (1) |
|
|
530 | (1) |
|
2.10 Given a scenario, configure security on SOHO wireless and wired networks |
|
|
530 | (11) |
|
|
531 | (1) |
|
Change default usernames and passwords |
|
|
532 | (1) |
|
|
533 | (1) |
|
Assign static IP addresses |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
Content filtering/parental controls |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (5) |
|
Chapter 8 Software Troubleshooting |
|
|
541 | (36) |
|
3.1 Given a scenario, troubleshoot Microsoft Windows OS problems |
|
|
545 | (12) |
|
|
546 | (5) |
|
|
551 | (6) |
|
|
557 | (1) |
|
3.2 Given a scenario, troubleshoot and resolve PC security issues |
|
|
557 | (5) |
|
|
558 | (3) |
|
|
561 | (1) |
|
3.3 Given a scenario, use best practice procedures for malware removal |
|
|
562 | (2) |
|
1 Identify and research malware symptoms |
|
|
562 | (1) |
|
2 Quarantine the infected systems |
|
|
562 | (1) |
|
3 Disable System Restore (in Windows) |
|
|
562 | (1) |
|
4 Remediate the infected systems |
|
|
562 | (1) |
|
5 Schedule scans and run updates |
|
|
563 | (1) |
|
6 Enable System Restore and create a restore point (in Windows) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
3.4 Given a scenario, troubleshoot mobile OS and application issues |
|
|
564 | (7) |
|
|
564 | (6) |
|
|
570 | (1) |
|
3.5 Given a scenario, troubleshoot mobile OS and application security issues |
|
|
571 | (6) |
|
|
571 | (2) |
|
|
573 | (1) |
|
|
574 | (3) |
|
Chapter 9 Operational Procedures |
|
|
577 | (54) |
|
4.1 Compare and contrast best practices associated with types of documentation |
|
|
582 | (5) |
|
Network topology diagrams |
|
|
582 | (1) |
|
|
583 | (1) |
|
|
583 | (1) |
|
Regulatory and compliance policy |
|
|
584 | (1) |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
586 | (1) |
|
|
587 | (1) |
|
4.2 Given a scenario, implement basic change management best practices |
|
|
587 | (3) |
|
Documented business processes |
|
|
588 | (1) |
|
|
588 | (1) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
590 | (1) |
|
4.3 Given a scenario, implement basic disaster prevention and recovery methods |
|
|
590 | (6) |
|
|
590 | (3) |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
594 | (1) |
|
Cloud storage vs. local storage backups |
|
|
595 | (1) |
|
|
595 | (1) |
|
|
596 | (1) |
|
4.4 Explain common safety procedures |
|
|
596 | (7) |
|
|
596 | (1) |
|
Proper component handling and storage |
|
|
597 | (2) |
|
|
599 | (2) |
|
|
601 | (2) |
|
Compliance with government regulations |
|
|
603 | (1) |
|
|
603 | (1) |
|
4.5 Explain environmental impacts and appropriate controls |
|
|
603 | (5) |
|
MSDS documentation for handling and disposal |
|
|
604 | (1) |
|
Temperature, humidity level awareness, and proper ventilation |
|
|
604 | (1) |
|
Power surges, brownouts, and blackouts |
|
|
605 | (1) |
|
Protection from airborne particles |
|
|
605 | (1) |
|
|
606 | (1) |
|
Compliance to government regulations |
|
|
607 | (1) |
|
|
608 | (1) |
|
4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts |
|
|
608 | (5) |
|
|
608 | (2) |
|
|
610 | (1) |
|
|
611 | (1) |
|
Follow all policies and security best practices |
|
|
612 | (1) |
|
|
612 | (1) |
|
4.7 Given a scenario, use proper communication techniques and professionalism |
|
|
613 | (6) |
|
Use proper language and avoid jargon, acronyms, and slang, when applicable |
|
|
613 | (1) |
|
Maintain a positive attitude/project confidence |
|
|
614 | (1) |
|
Actively listen (taking notes) and avoid interrupting the customer |
|
|
614 | (1) |
|
|
614 | (1) |
|
Be on time (if late, contact the customer) |
|
|
615 | (1) |
|
|
615 | (2) |
|
Set and meet expectations/timeline and communicate status with the customer |
|
|
617 | (1) |
|
Deal appropriately with customers' confidential and private materials |
|
|
618 | (1) |
|
|
619 | (1) |
|
4.8 Identify the basics of scripting |
|
|
619 | (3) |
|
|
619 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
621 | (1) |
|
|
621 | (1) |
|
4.9 Given a scenario, use remote access technologies |
|
|
622 | |
|
|
622 | (1) |
|
|
623 | (2) |
|
|
625 | (1) |
|
|
625 | (1) |
|
Security considerations of each access method |
|
|
626 | (1) |
|
|
626 | (1) |
|
|
627 | (4) |
|
Appendix Answers to Review Questions |
|
|
631 | (20) |
|
Chapter 1: Mobile Devices |
|
|
632 | (2) |
|
|
634 | (2) |
|
|
636 | (4) |
|
Chapter 4: Virtualization and Cloud Computing |
|
|
640 | (1) |
|
Chapter 5: Hardware and Network Troubleshooting |
|
|
641 | (1) |
|
Chapter 6: Operating Systems |
|
|
642 | (3) |
|
|
645 | (3) |
|
Chapter 8: Software Troubleshooting |
|
|
648 | (1) |
|
Chapter 9: Operational Procedures |
|
|
649 | (2) |
|
|
651 | |
CompTIA A+ Complete Study Guide |
|
|
|
xxxiii | |
|
Assessment Test for Exam 220-1001 |
|
|
lxxvi | |
|
Assessment Test for Exam 220-1002 |
|
|
lxxxvii | |
|
|
1 | (826) |
|
Chapter 1 Motherboards, Processors, and Memory |
|
|
3 | (72) |
|
Understanding Motherboards |
|
|
5 | (33) |
|
System Board Form Factors |
|
|
6 | (3) |
|
|
9 | (29) |
|
|
38 | (6) |
|
|
44 | (15) |
|
|
45 | (3) |
|
|
48 | (7) |
|
|
55 | (4) |
|
Understanding Cooling Systems |
|
|
59 | (9) |
|
|
59 | (3) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (5) |
|
|
68 | (1) |
|
|
68 | (2) |
|
|
70 | (4) |
|
Performance-Based Question 1 |
|
|
74 | (1) |
|
Performance-Based Question 2 |
|
|
74 | (1) |
|
Chapter 2 Internal Expansion, Storage Devices, and Power Supplies |
|
|
75 | (56) |
|
Installing and Configuring Expansion Cards |
|
|
77 | (7) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
83 | (1) |
|
Understanding Storage Devices |
|
|
84 | (29) |
|
|
84 | (8) |
|
|
92 | (5) |
|
|
97 | (6) |
|
|
103 | (2) |
|
Removable Storage and Media |
|
|
105 | (5) |
|
Installing, Removing, and Configuring Storage Devices |
|
|
110 | (3) |
|
Understanding Power Supplies |
|
|
113 | (11) |
|
|
115 | (1) |
|
Power and Voltage Ratings |
|
|
115 | (1) |
|
|
116 | (6) |
|
|
122 | (1) |
|
AC Adapters as Power Supplies |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (2) |
|
|
126 | (4) |
|
Performance-Based Question |
|
|
130 | (1) |
|
Chapter 3 Peripherals and Connectors |
|
|
131 | (72) |
|
Understanding Cables and Connectors |
|
|
133 | (28) |
|
Video Cables and Connectors |
|
|
133 | (8) |
|
Hard Drive Cables and Connectors |
|
|
141 | (7) |
|
Multipurpose Cables and Connectors |
|
|
148 | (8) |
|
Other Peripheral Cables and Connectors |
|
|
156 | (5) |
|
Understanding Uses of Peripheral Devices |
|
|
161 | (33) |
|
|
162 | (17) |
|
|
179 | (2) |
|
|
181 | (12) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (4) |
|
Performance-Based Question |
|
|
201 | (2) |
|
Chapter 4 Custom PC Configurations |
|
|
203 | (32) |
|
Exploring Custom Configurations |
|
|
205 | (16) |
|
|
206 | (1) |
|
Graphic and CAD/CAM Design Workstations |
|
|
207 | (3) |
|
Audio/Video Editing Workstations |
|
|
210 | (4) |
|
Virtualization Workstations |
|
|
214 | (3) |
|
|
217 | (4) |
|
|
221 | (7) |
|
Network-Attached Storage Devices |
|
|
221 | (7) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (4) |
|
Performance-Based Question |
|
|
234 | (1) |
|
Chapter 5 Installing and Configuring Printers |
|
|
235 | (74) |
|
Understanding Print Technologies and Imaging Processes |
|
|
237 | (30) |
|
|
238 | (2) |
|
|
240 | (9) |
|
|
249 | (11) |
|
|
260 | (1) |
|
|
261 | (2) |
|
|
263 | (4) |
|
Installing and Maintaining Printers |
|
|
267 | (36) |
|
Printer Interface Components |
|
|
267 | (5) |
|
Installing and Sharing Local Printers |
|
|
272 | (11) |
|
Installing and Sharing Networked Printers |
|
|
283 | (9) |
|
Performing Printer Maintenance |
|
|
292 | (6) |
|
Installing Printer Upgrades |
|
|
298 | (5) |
|
|
303 | (1) |
|
|
303 | (2) |
|
|
305 | (3) |
|
Performance-Based Question |
|
|
308 | (1) |
|
Chapter 6 Networking Fundamentals |
|
|
309 | (54) |
|
Understanding Networking Principles |
|
|
311 | (22) |
|
Understanding Networking Fundamentals |
|
|
312 | (21) |
|
Identifying Common Network Hardware |
|
|
333 | (24) |
|
|
333 | (4) |
|
|
337 | (13) |
|
|
350 | (7) |
|
|
357 | (1) |
|
|
357 | (2) |
|
|
359 | (3) |
|
Performance-Based Question |
|
|
362 | (1) |
|
Chapter 7 Introduction to TCP/IP |
|
|
363 | (40) |
|
|
365 | (30) |
|
|
366 | (10) |
|
Understanding IP Addressing |
|
|
376 | (16) |
|
Understanding Virtual Networks |
|
|
392 | (3) |
|
|
395 | (1) |
|
|
396 | (2) |
|
|
398 | (4) |
|
Performance-Based Question |
|
|
402 | (1) |
|
Chapter 8 Installing Wireless and SOHO Networks |
|
|
403 | (82) |
|
Understanding Wireless Networking Technologies |
|
|
406 | (20) |
|
802.11 Networking Standards |
|
|
407 | (8) |
|
|
415 | (3) |
|
Cellular Networking Standards |
|
|
418 | (3) |
|
Home Automation Standards |
|
|
421 | (2) |
|
Radio Frequency Networking Standards |
|
|
423 | (3) |
|
Installing and Configuring SOHO Networks |
|
|
426 | (52) |
|
Choosing an Internet Connection |
|
|
427 | (14) |
|
Choosing Internal Network Connections |
|
|
441 | (4) |
|
Keys to Planning a Network |
|
|
445 | (1) |
|
|
446 | (11) |
|
Configuring Wireless Routers and Access Points |
|
|
457 | (16) |
|
Configuring End-User Devices |
|
|
473 | (5) |
|
|
478 | (1) |
|
|
478 | (2) |
|
|
480 | (4) |
|
Performance-Based Question |
|
|
484 | (1) |
|
Chapter 9 Network Services, Virtualization, and Cloud Computing |
|
|
485 | (56) |
|
Understanding Network Services |
|
|
487 | (24) |
|
|
488 | (18) |
|
|
506 | (3) |
|
Legacy and Embedded Systems |
|
|
509 | (2) |
|
Understanding Virtualization and Cloud Computing |
|
|
511 | (22) |
|
Concepts of Cloud Computing |
|
|
511 | (10) |
|
Concepts of Virtualization |
|
|
521 | (12) |
|
|
533 | (1) |
|
|
534 | (2) |
|
|
536 | (3) |
|
Performance-Based Question |
|
|
539 | (2) |
|
Chapter 10 Understanding Laptops |
|
|
541 | (60) |
|
|
543 | (23) |
|
|
544 | (1) |
|
Disassembling and Reassembling Laptops |
|
|
545 | (4) |
|
|
549 | (4) |
|
Motherboards and Processors |
|
|
553 | (5) |
|
|
558 | (3) |
|
|
561 | (5) |
|
|
566 | (9) |
|
|
566 | (4) |
|
|
570 | (5) |
|
|
575 | (5) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
576 | (2) |
|
|
578 | (2) |
|
|
580 | (11) |
|
|
580 | (1) |
|
|
581 | (1) |
|
|
581 | (1) |
|
|
582 | (1) |
|
|
583 | (1) |
|
|
583 | (1) |
|
|
584 | (1) |
|
Replacing Components Within a Laptop Display |
|
|
584 | (2) |
|
Other Internal Components |
|
|
586 | (5) |
|
|
591 | (4) |
|
|
591 | (1) |
|
Docking Stations and Port Replicators |
|
|
592 | (1) |
|
|
593 | (2) |
|
|
595 | (1) |
|
|
595 | (2) |
|
|
597 | (3) |
|
Performance-Based Question |
|
|
600 | (1) |
|
Chapter 11 Understanding Mobile Devices |
|
|
601 | (40) |
|
Understanding Mobile Devices |
|
|
603 | (32) |
|
Characteristics of Mobile Devices |
|
|
604 | (3) |
|
|
607 | (3) |
|
|
610 | (6) |
|
|
616 | (1) |
|
|
617 | (5) |
|
Wearable Technology Devices |
|
|
622 | (4) |
|
|
626 | (6) |
|
Mobile Device Accessories |
|
|
632 | (3) |
|
|
635 | (1) |
|
|
635 | (2) |
|
|
637 | (3) |
|
Performance-Based Question |
|
|
640 | (1) |
|
Chapter 12 Mobile Device Connectivity and Synchronization |
|
|
641 | (66) |
|
Understanding Network Connectivity and Email |
|
|
643 | (44) |
|
Using Cellular Data Connections |
|
|
645 | (9) |
|
Establishing Wi-Fi Connectivity |
|
|
654 | (12) |
|
Establishing Bluetooth Connectivity |
|
|
666 | (9) |
|
Configuring Email Accounts |
|
|
675 | (12) |
|
Configuring Mobile Device Synchronization |
|
|
687 | (12) |
|
Syncing Apple iOS Devices |
|
|
688 | (6) |
|
|
694 | (2) |
|
|
696 | (1) |
|
Software Installation Requirements |
|
|
696 | (3) |
|
|
699 | (1) |
|
|
700 | (2) |
|
|
702 | (4) |
|
Performance-Based Question |
|
|
706 | (1) |
|
Chapter 13 Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
707 | (36) |
|
Using the Troubleshooting Best Practice Methodology |
|
|
710 | (11) |
|
|
710 | (5) |
|
|
715 | (1) |
|
|
716 | (2) |
|
Establish a Plan of Action |
|
|
718 | (2) |
|
|
720 | (1) |
|
|
720 | (1) |
|
Troubleshooting Core Hardware Issues |
|
|
721 | (14) |
|
Troubleshooting Motherboards, CPUs, RAM, and Power Problems |
|
|
722 | (5) |
|
|
727 | (1) |
|
Identifying BIOS/UEFI Issues |
|
|
728 | (1) |
|
Identifying Motherboard and CPU Problems |
|
|
729 | (2) |
|
Identifying Memory Issues |
|
|
731 | (1) |
|
Identifying Power Supply Problems |
|
|
732 | (1) |
|
Identifying Cooling Issues |
|
|
733 | (2) |
|
|
735 | (1) |
|
|
736 | (1) |
|
|
737 | (4) |
|
Performance-Based Question |
|
|
741 | (2) |
|
Chapter 14 Hardware and Network Troubleshooting |
|
|
743 | (84) |
|
Troubleshooting Storage and Video Problems |
|
|
748 | (10) |
|
Troubleshooting Storage Device Problems |
|
|
749 | (7) |
|
Troubleshooting Video Issues |
|
|
756 | (2) |
|
Troubleshooting Common Mobile Device Issues |
|
|
758 | (14) |
|
|
759 | (2) |
|
|
761 | (1) |
|
|
762 | (2) |
|
|
764 | (4) |
|
|
768 | (4) |
|
Troubleshooting Printer Problems |
|
|
772 | (25) |
|
|
773 | (3) |
|
|
776 | (3) |
|
|
779 | (14) |
|
|
793 | (4) |
|
Troubleshooting Networking Problems |
|
|
797 | (22) |
|
Resolving Connectivity Issues |
|
|
798 | (5) |
|
Using Network Troubleshooting Tools |
|
|
803 | (16) |
|
|
819 | (1) |
|
|
820 | (3) |
|
|
823 | (3) |
|
Performance-Based Question |
|
|
826 | (1) |
|
|
827 | (644) |
|
Chapter 15 Operating System Basics |
|
|
829 | (46) |
|
Understanding Operating Systems |
|
|
831 | (35) |
|
Operating System Terms and Concepts |
|
|
833 | (2) |
|
|
835 | (3) |
|
Minimum System Requirements |
|
|
838 | (4) |
|
|
842 | (14) |
|
|
856 | (3) |
|
|
859 | (1) |
|
|
860 | (1) |
|
|
861 | (5) |
|
|
866 | (3) |
|
|
869 | (1) |
|
|
869 | (2) |
|
|
871 | (3) |
|
Performance-Based Question |
|
|
874 | (1) |
|
Chapter 16 Operating System Administration |
|
|
875 | (76) |
|
Interacting with Operating Systems |
|
|
877 | (40) |
|
|
877 | (24) |
|
|
901 | (11) |
|
|
912 | (3) |
|
|
915 | (2) |
|
|
917 | (21) |
|
|
917 | (4) |
|
Microsoft Management Console |
|
|
921 | (8) |
|
Windows Memory Diagnostics Tool |
|
|
929 | (1) |
|
|
929 | (1) |
|
|
930 | (1) |
|
Windows System Configuration Tools |
|
|
931 | (6) |
|
|
937 | (1) |
|
|
938 | (7) |
|
Getting Disks Ready to Store Files and Programs |
|
|
938 | (6) |
|
Checking the Health of Hard Disks and Optimizing Their Performance |
|
|
944 | (1) |
|
|
945 | (1) |
|
|
945 | (2) |
|
|
947 | (3) |
|
Performance-Based Question |
|
|
950 | (1) |
|
Chapter 17 Working with Windows 10 |
|
|
951 | (66) |
|
Introduction to Windows 10 |
|
|
953 | (15) |
|
|
956 | (9) |
|
|
965 | (1) |
|
|
966 | (2) |
|
|
968 | (27) |
|
Windows Installation Options |
|
|
970 | (1) |
|
|
971 | (16) |
|
|
987 | (6) |
|
|
993 | (1) |
|
Side-by-Side Upgrading Windows 10 |
|
|
993 | (1) |
|
Upgrading Editions of Windows 10 |
|
|
994 | (1) |
|
Installation/Upgrade Boot Options |
|
|
994 | (1) |
|
Booting the Windows 10 Operating System |
|
|
995 | (4) |
|
|
995 | (2) |
|
|
997 | (2) |
|
|
999 | (4) |
|
|
999 | (2) |
|
|
1001 | (2) |
|
|
1003 | (1) |
|
|
1003 | (8) |
|
|
1003 | (4) |
|
|
1007 | (2) |
|
|
1009 | (2) |
|
|
1011 | (1) |
|
|
1012 | (1) |
|
|
1013 | (3) |
|
Performance-Based Question |
|
|
1016 | (1) |
|
Chapter 18 Working with Windows 8/8.1 |
|
|
1017 | (24) |
|
|
1018 | (7) |
|
|
1025 | (7) |
|
|
1028 | (1) |
|
Unattended Installation/Image Deployment |
|
|
1028 | (1) |
|
Remote Network Installation |
|
|
1029 | (1) |
|
|
1029 | (1) |
|
Repair Installation/Refresh/Restore |
|
|
1030 | (1) |
|
|
1031 | (1) |
|
|
1032 | (3) |
|
Internal Hard Drive (Partition) |
|
|
1032 | (1) |
|
External/Hot-Swappable Drive |
|
|
1033 | (1) |
|
|
1033 | (1) |
|
|
1034 | (1) |
|
|
1034 | (1) |
|
|
1035 | (1) |
|
|
1035 | (1) |
|
|
1036 | (4) |
|
Performance-Based Question |
|
|
1040 | (1) |
|
Chapter 19 Working with Windows 7 |
|
|
1041 | (54) |
|
|
1043 | (7) |
|
|
1050 | (6) |
|
|
1051 | (4) |
|
Upgrading Editions of Windows 7 |
|
|
1055 | (1) |
|
Installation/Upgrade Boot Options |
|
|
1055 | (1) |
|
Booting the Windows 7 Operating System |
|
|
1056 | (3) |
|
|
1057 | (1) |
|
|
1058 | (1) |
|
|
1059 | (7) |
|
|
1059 | (1) |
|
|
1060 | (1) |
|
|
1060 | (4) |
|
|
1064 | (2) |
|
Windows 7 Administrative Tools |
|
|
1066 | (7) |
|
|
1066 | (1) |
|
|
1067 | (2) |
|
|
1069 | (1) |
|
|
1070 | (1) |
|
|
1071 | (1) |
|
|
1071 | (1) |
|
Windows Memory Diagnostic |
|
|
1072 | (1) |
|
Windows 7 Control Panel Utilities |
|
|
1073 | (8) |
|
|
1073 | (2) |
|
RemoteApp and Desktop Connections |
|
|
1075 | (1) |
|
|
1076 | (2) |
|
Windows 7 User Account Control |
|
|
1078 | (3) |
|
|
1081 | (9) |
|
|
1083 | (1) |
|
Configuring an Alternative IP Address in Windows |
|
|
1084 | (2) |
|
|
1086 | (4) |
|
|
1090 | (1) |
|
|
1090 | (1) |
|
|
1091 | (3) |
|
Performance-Based Question |
|
|
1094 | (1) |
|
Chapter 20 Working with macOS and Linux |
|
|
1095 | (32) |
|
|
1096 | (6) |
|
|
1096 | (3) |
|
Scheduled Disk Maintenance |
|
|
1099 | (1) |
|
|
1099 | (1) |
|
|
1100 | (1) |
|
|
1101 | (1) |
|
Antivirus/Anti-Malware Updates |
|
|
1102 | (1) |
|
|
1102 | (2) |
|
|
1104 | (5) |
|
|
1109 | (11) |
|
Understanding the Syntax of Shell Commands |
|
|
1110 | (2) |
|
Discovering and Using Linux Commands |
|
|
1112 | (1) |
|
Becoming root (Superuser) |
|
|
1113 | (1) |
|
|
1114 | (1) |
|
|
1115 | (1) |
|
|
1116 | (1) |
|
Changing Permissions and Ownership |
|
|
1117 | (1) |
|
|
1118 | (1) |
|
|
1119 | (1) |
|
|
1120 | (1) |
|
|
1120 | (1) |
|
|
1121 | (1) |
|
|
1122 | (4) |
|
Performance-Based Question |
|
|
1126 | (1) |
|
Chapter 21 Scripting and Remote Access |
|
|
1127 | (30) |
|
|
1128 | (18) |
|
|
1130 | (4) |
|
|
1134 | (12) |
|
|
1146 | (5) |
|
|
1146 | (1) |
|
Virtual Network Computing |
|
|
1147 | (1) |
|
|
1147 | (1) |
|
|
1148 | (1) |
|
|
1149 | (2) |
|
|
1151 | (1) |
|
|
1151 | (1) |
|
|
1151 | (1) |
|
|
1152 | (3) |
|
Performance-Based Question |
|
|
1155 | (2) |
|
Chapter 22 Security Concepts |
|
|
1157 | (74) |
|
Physical Security Concepts |
|
|
1161 | (10) |
|
|
1161 | (1) |
|
Multifactor Authentication |
|
|
1162 | (1) |
|
Layered Approach to Physical Security |
|
|
1162 | (1) |
|
|
1163 | (1) |
|
|
1164 | (1) |
|
|
1164 | (1) |
|
|
1165 | (1) |
|
|
1165 | (1) |
|
|
1166 | (1) |
|
|
1167 | (1) |
|
|
1167 | (1) |
|
Smart Cards and RFID Badges |
|
|
1168 | (1) |
|
|
1169 | (2) |
|
|
1171 | (14) |
|
Antivirus and Anti-Malware Software |
|
|
1171 | (1) |
|
|
1172 | (4) |
|
|
1176 | (1) |
|
|
1176 | (1) |
|
|
1177 | (1) |
|
User Authentication/Strong Passwords |
|
|
1177 | (1) |
|
|
1178 | (1) |
|
|
1179 | (1) |
|
|
1180 | (5) |
|
|
1185 | (2) |
|
|
1185 | (1) |
|
Trusted/Untrusted Software Sources |
|
|
1186 | (1) |
|
|
1186 | (1) |
|
Principle of Least Privilege |
|
|
1186 | (1) |
|
|
1187 | (9) |
|
Social Engineering Attacks |
|
|
1187 | (3) |
|
Denial-of-Service Attacks |
|
|
1190 | (2) |
|
Exploits vs. Vulnerabilities |
|
|
1192 | (1) |
|
|
1193 | (1) |
|
Man-in-the-Middle Attacks |
|
|
1193 | (1) |
|
|
1194 | (1) |
|
|
1195 | (1) |
|
|
1196 | (1) |
|
|
1196 | (1) |
|
|
1196 | (7) |
|
|
1197 | (1) |
|
|
1197 | (1) |
|
|
1198 | (1) |
|
|
1198 | (1) |
|
|
1198 | (5) |
|
|
1203 | (1) |
|
|
1203 | (1) |
|
|
1203 | (1) |
|
Mitigating Software Threats |
|
|
1203 | (9) |
|
|
1203 | (1) |
|
|
1204 | (1) |
|
|
1205 | (2) |
|
|
1207 | (1) |
|
|
1208 | (1) |
|
|
1209 | (2) |
|
|
1211 | (1) |
|
Destruction and Disposal Methods |
|
|
1212 | (4) |
|
Recycling or Repurposing Best Practices |
|
|
1212 | (2) |
|
|
1214 | (2) |
|
Securing a SOHO Network (Wireless) |
|
|
1216 | (5) |
|
Changing Default Usernames and Passwords |
|
|
1216 | (1) |
|
|
1217 | (1) |
|
|
1217 | (1) |
|
|
1218 | (1) |
|
|
1218 | (1) |
|
Antenna and Access Point Placement |
|
|
1218 | (1) |
|
|
1219 | (1) |
|
Assign Static IP Addresses |
|
|
1219 | (1) |
|
|
1219 | (1) |
|
|
1220 | (1) |
|
Securing a SOHO Network (Wired) |
|
|
1221 | (4) |
|
Changing Default Usernames and Passwords |
|
|
1221 | (1) |
|
Assigning Static IP Addresses |
|
|
1222 | (1) |
|
|
1222 | (1) |
|
|
1222 | (1) |
|
Wired and Wireless Security |
|
|
1223 | (2) |
|
|
1225 | (1) |
|
|
1225 | (2) |
|
|
1227 | (3) |
|
Performance-Based Question |
|
|
1230 | (1) |
|
Chapter 23 Securing Operating Systems |
|
|
1231 | (50) |
|
Workstation Security Best Practices |
|
|
1233 | (14) |
|
|
1233 | (1) |
|
|
1234 | (1) |
|
|
1235 | (1) |
|
|
1236 | (5) |
|
|
1241 | (4) |
|
|
1245 | (1) |
|
|
1245 | (1) |
|
|
1246 | (1) |
|
Working with Windows OS Security Settings |
|
|
1247 | (18) |
|
|
1247 | (1) |
|
NTFS vs. Share Permissions |
|
|
1248 | (8) |
|
|
1256 | (3) |
|
|
1259 | (1) |
|
|
1260 | (3) |
|
|
1263 | (1) |
|
|
1264 | (1) |
|
|
1265 | (9) |
|
|
1266 | (1) |
|
Remote Wipes and Locator Applications |
|
|
1267 | (3) |
|
|
1270 | (1) |
|
Failed Login Attempts Restrictions |
|
|
1270 | (1) |
|
Viruses and Malware on Mobile Devices |
|
|
1271 | (1) |
|
|
1271 | (1) |
|
|
1272 | (1) |
|
Multifactor Authentication |
|
|
1272 | (1) |
|
Authenticator Applications |
|
|
1272 | (1) |
|
|
1273 | (1) |
|
|
1273 | (1) |
|
|
1274 | (1) |
|
|
1275 | (1) |
|
|
1276 | (4) |
|
Performance-Based Question |
|
|
1280 | (1) |
|
Chapter 24 Troubleshooting Operating Systems and Security |
|
|
1281 | (86) |
|
Troubleshooting Microsoft Windows OS Problems |
|
|
1283 | (46) |
|
|
1284 | (24) |
|
|
1308 | (21) |
|
Troubleshooting Security Issues |
|
|
1329 | (10) |
|
|
1331 | (1) |
|
|
1331 | (1) |
|
|
1332 | (1) |
|
|
1333 | (1) |
|
Internet Connectivity Issues |
|
|
1333 | (1) |
|
|
1333 | (1) |
|
|
1334 | (1) |
|
|
1335 | (1) |
|
|
1335 | (1) |
|
|
1336 | (1) |
|
Renamed System Files/Disappearing Files/Permission Changes/Access Denied |
|
|
1336 | (1) |
|
|
1337 | (1) |
|
|
1337 | (1) |
|
|
1338 | (1) |
|
Best Practices for Malware Removal |
|
|
1339 | (7) |
|
1 Identify and Research Malware Symptoms |
|
|
1340 | (1) |
|
2 Quarantine Infected Systems |
|
|
1341 | (1) |
|
3 Disable System Restore (in Windows) |
|
|
1341 | (1) |
|
4 Remediate the Infected Systems |
|
|
1342 | (3) |
|
5 Schedule Scans and Run Updates |
|
|
1345 | (1) |
|
6 Enable System Restore and Create a Restore Point (in Windows) |
|
|
1346 | (1) |
|
|
1346 | (1) |
|
Troubleshooting Mobile Issues |
|
|
1346 | (9) |
|
|
1347 | (1) |
|
|
1347 | (1) |
|
|
1347 | (1) |
|
No Bluetooth Connectivity |
|
|
1348 | (1) |
|
Cannot Broadcast to an External Monitor |
|
|
1349 | (1) |
|
Touch Screen Non-Responsive |
|
|
1349 | (1) |
|
|
1350 | (1) |
|
|
1350 | (1) |
|
|
1351 | (1) |
|
Extremely Short Battery Life |
|
|
1351 | (1) |
|
|
1352 | (1) |
|
|
1352 | (1) |
|
|
1353 | (1) |
|
Inaccurate Touch Screen Response |
|
|
1354 | (1) |
|
|
1354 | (1) |
|
Troubleshooting Mobile Security Issues |
|
|
1355 | (5) |
|
|
1356 | (1) |
|
|
1356 | (1) |
|
|
1356 | (1) |
|
Unintended Wi-Fi Connection |
|
|
1357 | (1) |
|
Unintended Bluetooth Pairing |
|
|
1358 | (1) |
|
Leaked Personal Files/Data |
|
|
1358 | (1) |
|
Data Transmission Over Limit |
|
|
1358 | (1) |
|
Unauthorized Account Access |
|
|
1359 | (1) |
|
Unauthorized Location Tracking |
|
|
1359 | (1) |
|
Unauthorized Camera/Microphone Activation |
|
|
1359 | (1) |
|
High Resource Utilization |
|
|
1360 | (1) |
|
|
1360 | (1) |
|
|
1360 | (2) |
|
|
1362 | (4) |
|
Performance-Based Question |
|
|
1366 | (1) |
|
Chapter 25 Documentation and Professionalism |
|
|
1367 | (46) |
|
Documentation and Change Management |
|
|
1370 | (14) |
|
Network Topology Diagrams |
|
|
1371 | (3) |
|
|
1374 | (1) |
|
|
1375 | (1) |
|
Regulatory and Compliance Policy |
|
|
1376 | (2) |
|
|
1378 | (1) |
|
|
1378 | (1) |
|
|
1379 | (1) |
|
Change Management Documentation |
|
|
1379 | (5) |
|
Disaster Prevention and Recovery |
|
|
1384 | (11) |
|
|
1384 | (6) |
|
|
1390 | (1) |
|
|
1391 | (1) |
|
|
1392 | (1) |
|
|
1393 | (2) |
|
Demonstrating Professionalism |
|
|
1395 | (13) |
|
Communicating with Customers |
|
|
1396 | (4) |
|
Using Appropriate Behavior |
|
|
1400 | (6) |
|
Putting It All in Perspective |
|
|
1406 | (2) |
|
|
1408 | (1) |
|
|
1408 | (1) |
|
|
1409 | (3) |
|
Performance-Based Question |
|
|
1412 | (1) |
|
Chapter 26 Safety and Environmental Concerns |
|
|
1413 | (58) |
|
Understanding Safety Procedures |
|
|
1416 | (21) |
|
Identifying Potential Safety Hazards |
|
|
1416 | (11) |
|
Creating a Safe Workplace |
|
|
1427 | (10) |
|
Understanding Environmental Controls |
|
|
1437 | (16) |
|
Managing the Physical Environment |
|
|
1438 | (6) |
|
Handling and Disposing of Computer Equipment |
|
|
1444 | (9) |
|
Understanding Policies, Licensing, and Privacy |
|
|
1453 | (11) |
|
Dealing with Prohibited Content/Activity |
|
|
1453 | (1) |
|
|
1454 | (4) |
|
Managing Software Licenses |
|
|
1458 | (3) |
|
Managing Sensitive Information |
|
|
1461 | (2) |
|
Policies and Security Best Practices |
|
|
1463 | (1) |
|
|
1464 | (1) |
|
|
1464 | (2) |
|
|
1466 | (4) |
|
Performance-Based Question |
|
|
1470 | (1) |
|
Appendix A Answers to Review Questions |
|
|
1471 | (54) |
|
Chapter 1: Motherboards, Processors, and Memory |
|
|
1472 | (2) |
|
Chapter 2: Internal Expansion, Storage Devices, and Power Supplies |
|
|
1474 | (2) |
|
Chapter 3: Peripherals and Connectors |
|
|
1476 | (2) |
|
Chapter 4: Custom PC Configurations |
|
|
1478 | (2) |
|
Chapter 5: Installing and Configuring Printers |
|
|
1480 | (1) |
|
Chapter 6: Networking Fundamentals |
|
|
1481 | (2) |
|
Chapter 7: Introduction to TCP/IP |
|
|
1483 | (1) |
|
Chapter 8: Installing Wireless and SOHO Networks |
|
|
1484 | (2) |
|
Chapter 9: Network Services, Virtualization, and Cloud Computing |
|
|
1486 | (2) |
|
Chapter 10: Understanding Laptops |
|
|
1488 | (2) |
|
Chapter 11: Understanding Mobile Devices |
|
|
1490 | (2) |
|
Chapter 12: Mobile Device Connectivity and Synchronization |
|
|
1492 | (2) |
|
Chapter 13: Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
1494 | (2) |
|
Chapter 14: Hardware and Network Troubleshooting |
|
|
1496 | (2) |
|
Chapter 15: Operating System Basics |
|
|
1498 | (1) |
|
Chapter 16: Operating System Administration |
|
|
1499 | (2) |
|
Chapter 17: Working with Windows 10 |
|
|
1501 | (2) |
|
Chapter 18: Working with Windows 8/8.1 |
|
|
1503 | (2) |
|
Chapter 19: Working with Windows 7 |
|
|
1505 | (2) |
|
Chapter 20: Working with macOS and Linux |
|
|
1507 | (2) |
|
Chapter 21: Scripting and Remote Access |
|
|
1509 | (2) |
|
Chapter 22: Security Concepts |
|
|
1511 | (3) |
|
Chapter 23: Securing Operating Systems |
|
|
1514 | (2) |
|
Chapter 24: Troubleshooting Operating Systems and Security |
|
|
1516 | (2) |
|
Chapter 25: Documentation and Professionalism |
|
|
1518 | (3) |
|
Chapter 26: Safety and Environmental Concerns |
|
|
1521 | (4) |
|
Appendix B Answers to Performance-Based Questions |
|
|
1525 | (28) |
|
Chapter 1: Motherboards, Processors, and Memory |
|
|
1526 | (1) |
|
Answer to Performance-Based Question 1 |
|
|
1526 | (1) |
|
Answer to Performance-Based Question 2 |
|
|
1526 | (1) |
|
Chapter 2: Internal Expansion, Storage Devices, and Power Supplies |
|
|
1527 | (1) |
|
Chapter 3: Peripherals and Connectors |
|
|
1527 | (1) |
|
Chapter 4: Custom PC Configurations |
|
|
1528 | (1) |
|
Chapter 5: Installing and Configuring Printers |
|
|
1529 | (1) |
|
Chapter 6: Networking Fundamentals |
|
|
1529 | (2) |
|
Chapter 7: Introduction to TCP/IP |
|
|
1531 | (1) |
|
Chapter 8: Installing Wireless and SOHO Networks |
|
|
1532 | (1) |
|
Chapter 9: Network Services, Virtualization, and Cloud Computing |
|
|
1532 | (1) |
|
Chapter 10: Understanding Laptops |
|
|
1533 | (1) |
|
Chapter 11: Understanding Mobile Devices |
|
|
1533 | (1) |
|
Chapter 12: Mobile Device Connectivity and Synchronization |
|
|
1534 | (1) |
|
Chapter 13: Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
1534 | (1) |
|
Chapter 14: Hardware and Network Troubleshooting |
|
|
1535 | (1) |
|
Chapter 15: Operating System Basics |
|
|
1535 | (2) |
|
Chapter 16: Operating System Administration |
|
|
1537 | (1) |
|
Chapter 17: Working with Windows 10 |
|
|
1538 | (3) |
|
Chapter 18: Working with Windows 8/8.1 |
|
|
1541 | (2) |
|
Chapter 19: Working with Windows 7 |
|
|
1543 | (3) |
|
Chapter 20: Working with macOS and Linux |
|
|
1546 | (2) |
|
Chapter 21: Scripting and Remote Access |
|
|
1548 | (1) |
|
Chapter 22: Security Concepts |
|
|
1548 | (1) |
|
Chapter 23: Securing Operating Systems |
|
|
1549 | (1) |
|
Chapter 24: Troubleshooting Operating Systems and Security |
|
|
1549 | (1) |
|
Chapter 25: Documentation and Professionalism |
|
|
1550 | (1) |
|
Chapter 26: Safety and Environmental Concerns |
|
|
1551 | (2) |
|
|
1553 | |