|
CompTIA® A+® Complete Review Guide Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Fifth Edition |
|
|
Introduction |
|
xxiii | |
|
Part I CompTIA A+ Core 1 Exam 220-1101 |
|
|
1 | (2) |
|
|
3 | (2) |
|
1.1 Given a scenario, install and configure laptop hardware and components |
|
|
5 | (5) |
|
Hardware/device replacement |
|
|
5 | (4) |
|
Physical privacy and security components |
|
|
9 | (1) |
|
|
10 | (1) |
|
1.2 Compare and contrast the display components of mobile devices |
|
|
10 | (4) |
|
|
11 | (2) |
|
Mobile display components |
|
|
13 | (1) |
|
|
14 | (1) |
|
1.3 Given a scenario, set up and configure accessories and ports of mobile devices |
|
|
14 | (12) |
|
|
15 | (5) |
|
|
20 | (6) |
|
|
26 | (1) |
|
1.4 Given a scenario, configure basic mobile-device network connectivity and application support |
|
|
26 | (15) |
|
Wireless/cellular data network (enable/disable) |
|
|
27 | (2) |
|
|
29 | (3) |
|
|
32 | (1) |
|
Mobile device management (MDM)/mobile application management (MAM) |
|
|
32 | (4) |
|
Mobile device synchronization |
|
|
36 | (4) |
|
|
40 | (1) |
|
|
41 | (4) |
|
|
45 | (50) |
|
2.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes |
|
|
50 | (4) |
|
|
50 | (3) |
|
|
53 | (1) |
|
|
54 | (1) |
|
2.2 Compare and contrast common networking hardware |
|
|
54 | (7) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
Power over Ethernet (PoE) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
58 | (1) |
|
Digital subscriber line (DSL) |
|
|
58 | (1) |
|
Optical network terminal (ONT) |
|
|
59 | (1) |
|
Network interface card (NIC) |
|
|
59 | (1) |
|
Software-defined networking (SDN) |
|
|
60 | (1) |
|
|
61 | (1) |
|
2.3 Compare and contrast protocols for wireless networking |
|
|
61 | (5) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Long-range fixed wireless |
|
|
64 | (1) |
|
|
65 | (1) |
|
Radio-frequency identification (RFID) |
|
|
65 | (1) |
|
|
65 | (1) |
|
2.4 Summarize services provided by networked hosts |
|
|
66 | (5) |
|
|
66 | (2) |
|
|
68 | (1) |
|
|
69 | (1) |
|
Internet of Things (IoT) devices |
|
|
70 | (1) |
|
|
70 | (1) |
|
2.5 Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks |
|
|
71 | (8) |
|
Internet Protocol (IP) addressing |
|
|
71 | (8) |
|
|
79 | (1) |
|
2.6 Compare and contrast common network configuration concepts |
|
|
79 | (5) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
82 | (1) |
|
Virtual private network (VPN) |
|
|
83 | (1) |
|
|
83 | (1) |
|
2.7 Compare and contrast Internet connection types, network types, and their features |
|
|
84 | (3) |
|
Internet connection types |
|
|
84 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
2.8 Given a scenario, use networking tools |
|
|
87 | (3) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (5) |
|
|
95 | (102) |
|
3.1 Explain basic cable types and their connectors, features, and purposes |
|
|
102 | (22) |
|
|
102 | (5) |
|
|
107 | (1) |
|
|
108 | (3) |
|
|
111 | (6) |
|
|
117 | (2) |
|
|
119 | (5) |
|
|
124 | (1) |
|
3.2 Given a scenario, install the appropriate RAM |
|
|
124 | (5) |
|
|
124 | (3) |
|
Single-channel/Dual-channel |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
3.3 Given a scenario, select and install storage devices |
|
|
129 | (10) |
|
|
129 | (2) |
|
|
131 | (1) |
|
|
132 | (2) |
|
|
134 | (5) |
|
|
139 | (1) |
|
3.4 Given a scenario, install and configure motherboards, central processing units (CPUs), and add-on cards |
|
|
139 | (21) |
|
|
139 | (3) |
|
Motherboard connector types |
|
|
142 | (6) |
|
Motherboard compatibility |
|
|
148 | (5) |
|
Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) settings |
|
|
153 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (3) |
|
|
159 | (1) |
|
|
160 | (1) |
|
3.5 Given a scenario, install or replace the appropriate power supply |
|
|
160 | (3) |
|
|
161 | (1) |
|
Output 3.3V vs. 5V vs. 12V |
|
|
161 | (1) |
|
20-pin to 24-pin motherboard adapter |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
3.6 Given a scenario, deploy and configure multifunction devices/printers and settings |
|
|
163 | (7) |
|
Properly unboxing a device -- setup location considerations |
|
|
163 | (1) |
|
Use appropriate drivers for a given OS |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
Automatic document feeder (ADF)/flatbed scanner |
|
|
169 | (1) |
|
|
170 | (1) |
|
3.7 Given a scenario, install and replace printer consumables |
|
|
170 | (20) |
|
|
170 | (11) |
|
|
181 | (3) |
|
|
184 | (2) |
|
|
186 | (2) |
|
|
188 | (2) |
|
|
190 | (7) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
197 | (12) |
|
4.1 Summarize cloud computing concepts |
|
|
199 | (3) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
4.2 Summarize aspects of client-side virtualization |
|
|
202 | (4) |
|
Purpose of virtual machines |
|
|
202 | (3) |
|
|
205 | (1) |
|
|
206 | (3) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
209 | (42) |
|
5.1 Given a scenario, apply the best practice methodology to resolve problems |
|
|
213 | (3) |
|
Always consider corporate policies, procedures, and impacts before implementing changes |
|
|
213 | (1) |
|
|
214 | (1) |
|
2 Establish a theory of probable cause (question the obvious) |
|
|
214 | (1) |
|
3 Test the theory to determine cause |
|
|
215 | (1) |
|
4 Establish a plan of action to resolve the problem and implement the solution |
|
|
215 | (1) |
|
5 Verify full system functionality and, if applicable, implement preventive measures |
|
|
216 | (1) |
|
6 Document the findings, actions, and outcomes |
|
|
216 | (1) |
|
|
216 | (1) |
|
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power |
|
|
216 | (9) |
|
|
217 | (7) |
|
|
224 | (1) |
|
5.3 Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays |
|
|
225 | (4) |
|
|
225 | (3) |
|
|
228 | (1) |
|
5.4 Given a scenario, troubleshoot video, projector, and display issues |
|
|
229 | (3) |
|
|
229 | (3) |
|
|
232 | (1) |
|
5.5 Given a scenario, troubleshoot common issues with mobile devices |
|
|
232 | (6) |
|
|
233 | (4) |
|
|
237 | (1) |
|
5.6 Given a scenario, troubleshoot and resolve printer issues |
|
|
238 | (6) |
|
|
238 | (6) |
|
|
244 | (1) |
|
5.7 Given a scenario, troubleshoot problems with wired and wireless networks |
|
|
244 | (4) |
|
|
244 | (3) |
|
|
247 | (1) |
|
|
248 | (3) |
|
Part II CompTIA A+ Core 2 Exam 220-1102 |
|
|
251 | (336) |
|
Chapter 6 Operating Systems |
|
|
253 | (166) |
|
1.1 Identify basic features of Microsoft Windows editions |
|
|
263 | (5) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
267 | (1) |
|
1.2 Given a scenario, use the appropriate Microsoft command-line tool |
|
|
268 | (22) |
|
|
268 | (3) |
|
|
271 | (19) |
|
|
290 | (1) |
|
1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) |
|
|
290 | (30) |
|
|
291 | (5) |
|
Microsoft Management Console (MMC) snap-in |
|
|
296 | (16) |
|
|
312 | (8) |
|
|
320 | (1) |
|
1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility |
|
|
320 | (29) |
|
|
320 | (7) |
|
|
327 | (2) |
|
|
329 | (2) |
|
Network and Sharing Center |
|
|
331 | (1) |
|
|
331 | (4) |
|
Windows Defender Firewall |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (2) |
|
|
342 | (4) |
|
|
346 | (2) |
|
|
348 | (1) |
|
|
349 | (1) |
|
1.5 Given a scenario, use the appropriate Windows settings |
|
|
349 | (15) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (3) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (2) |
|
|
359 | (2) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (2) |
|
1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop |
|
|
364 | (10) |
|
Workgroup vs. domain setup |
|
|
364 | (4) |
|
Local OS firewall settings |
|
|
368 | (1) |
|
Client network configuration |
|
|
369 | (1) |
|
Establish network connections |
|
|
370 | (1) |
|
|
371 | (2) |
|
|
373 | (1) |
|
1.7 Given a scenario, apply application installation and configuration concepts |
|
|
374 | (4) |
|
System requirements for applications |
|
|
374 | (1) |
|
OS requirements for applications |
|
|
375 | (1) |
|
|
376 | (1) |
|
Other considerations for new applications |
|
|
377 | (1) |
|
|
378 | (1) |
|
1.8 Explain common OS types and their purposes |
|
|
378 | (4) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
Vendor life-cycle limitations |
|
|
381 | (1) |
|
Compatibility concerns between OSs |
|
|
381 | (1) |
|
|
382 | (1) |
|
1.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment |
|
|
382 | (9) |
|
|
382 | (2) |
|
|
384 | (4) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
1.10 Identify common features and tools of the macOS/desktop OS |
|
|
391 | (13) |
|
Installation and uninstallation of applications |
|
|
391 | (1) |
|
Apple ID and corporate restrictions |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
394 | (4) |
|
|
398 | (3) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
1.11 Identify common features and tools of the Linux client/desktop OS |
|
|
404 | (12) |
|
|
404 | (7) |
|
|
411 | (3) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (3) |
|
|
419 | (82) |
|
2.1 Summarize various security measures and their purposes |
|
|
427 | (12) |
|
|
427 | (5) |
|
Physical security for staff |
|
|
432 | (3) |
|
|
435 | (1) |
|
Mobile device management (MDM) |
|
|
436 | (1) |
|
|
437 | (2) |
|
|
439 | (1) |
|
2.2 Compare and contrast wireless security protocols and authentication methods |
|
|
439 | (4) |
|
|
439 | (2) |
|
|
441 | (1) |
|
|
442 | (1) |
|
2.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods |
|
|
443 | (9) |
|
|
443 | (6) |
|
|
449 | (3) |
|
|
452 | (1) |
|
2.4 Explain common social-engineering attacks, threats, and vulnerabilities |
|
|
452 | (7) |
|
|
452 | (3) |
|
|
455 | (3) |
|
|
458 | (1) |
|
|
459 | (1) |
|
2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS |
|
|
459 | (12) |
|
|
459 | (2) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
NTFS vs. share permissions |
|
|
464 | (3) |
|
|
467 | (1) |
|
Run as administrator vs. standard user |
|
|
468 | (2) |
|
|
470 | (1) |
|
|
470 | (1) |
|
Encrypting File System (EFS) |
|
|
470 | (1) |
|
|
471 | (1) |
|
2.6 Given a scenario, configure a workstation to meet best practices for security |
|
|
471 | (5) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
Change default administrator's user account/password |
|
|
475 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
2.7 Explain common methods for securing mobile and embedded devices |
|
|
476 | (5) |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
479 | (1) |
|
Remote backup applications |
|
|
479 | (1) |
|
Failed login attempts restrictions |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
2.8 Given a scenario, use common data destruction and disposal methods |
|
|
481 | (4) |
|
|
481 | (1) |
|
Recycling or repurposing best practices |
|
|
482 | (2) |
|
|
484 | (1) |
|
|
484 | (1) |
|
2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks |
|
|
485 | (7) |
|
|
485 | (3) |
|
|
488 | (3) |
|
|
491 | (1) |
|
|
491 | (1) |
|
2.10 Given a scenario, install and configure browsers and relevant security settings |
|
|
492 | (5) |
|
Browser download/installation |
|
|
492 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
Secure connections/sites -- valid certificates |
|
|
493 | (1) |
|
|
493 | (3) |
|
|
496 | (1) |
|
|
497 | (4) |
|
Chapter 8 Software Troubleshooting |
|
|
501 | (30) |
|
3.1 Given a scenario, troubleshoot common Windows OS problems |
|
|
505 | (9) |
|
|
505 | (5) |
|
Common troubleshooting steps |
|
|
510 | (4) |
|
|
514 | (1) |
|
3.2 Given a scenario, troubleshoot common personal computer (PC) security issues |
|
|
514 | (4) |
|
|
514 | (3) |
|
|
517 | (1) |
|
|
518 | (1) |
|
3.3 Given a scenario, use best practice procedures for malware removal |
|
|
518 | (2) |
|
1 Investigate and verify malware symptoms |
|
|
518 | (1) |
|
2 Quarantine infected systems |
|
|
519 | (1) |
|
3 Disable System Restore in Windows |
|
|
519 | (1) |
|
4 Remediate infected systems |
|
|
519 | (1) |
|
5 Schedule scans and run updates |
|
|
519 | (1) |
|
6 Enable System Restore and create a restore point in Windows |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
3.4 Given a scenario, troubleshoot common mobile OS and application issues |
|
|
520 | (4) |
|
|
521 | (3) |
|
|
524 | (1) |
|
3.5 Given a scenario, troubleshoot common mobile OS and application security issues |
|
|
524 | (4) |
|
|
524 | (2) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
528 | (3) |
|
Chapter 9 Operational Procedures |
|
|
531 | (56) |
|
4.1 Given a scenario, implement best practices associated with documentation and support systems information management |
|
|
538 | (7) |
|
|
538 | (2) |
|
|
540 | (2) |
|
|
542 | (3) |
|
|
545 | (1) |
|
|
545 | (1) |
|
4.2 Explain basic change-management best practices |
|
|
545 | (3) |
|
Documented business processes |
|
|
546 | (1) |
|
|
546 | (2) |
|
|
548 | (1) |
|
4.3 Given a scenario, implement workstation backup and recovery methods |
|
|
548 | (4) |
|
|
548 | (2) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
4.4 Given a scenario, use common safety procedures |
|
|
552 | (5) |
|
Electrostatic discharge (ESD) straps |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
555 | (1) |
|
Proper component handling and storage |
|
|
555 | (1) |
|
|
555 | (1) |
|
Compliance with government regulations |
|
|
555 | (1) |
|
|
555 | (2) |
|
|
557 | (1) |
|
4.5 Summarize environmental impacts and local environmental controls |
|
|
557 | (8) |
|
Material safety data sheet (MSDS)/documentation for handling and disposal |
|
|
557 | (2) |
|
Temperature, humidity-level awareness, and proper ventilation |
|
|
559 | (3) |
|
Power surges, brownouts, and blackouts |
|
|
562 | (2) |
|
|
564 | (1) |
|
4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts |
|
|
565 | (4) |
|
|
565 | (2) |
|
Licensing/digital rights management (DRM)/end-user license agreement (EULA) |
|
|
567 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
4.7 Given a scenario, use proper communication techniques and professionalism |
|
|
569 | (7) |
|
Professional appearance and attire |
|
|
570 | (1) |
|
Use proper language and avoid jargon, acronyms, and slang, when applicable |
|
|
570 | (1) |
|
Maintain a positive attitude/project confidence |
|
|
571 | (1) |
|
Actively listen, take notes, and avoid interrupting the customer |
|
|
571 | (1) |
|
|
571 | (1) |
|
Be on time (if late, contact the customer) |
|
|
572 | (1) |
|
|
572 | (1) |
|
Dealing with difficult customers or situations |
|
|
573 | (1) |
|
Set and meet expectations/time line and communicate status with the customer |
|
|
574 | (1) |
|
Deal appropriately with customers' confidential and private materials |
|
|
575 | (1) |
|
|
576 | (1) |
|
4.8 Identify the basics of scripting |
|
|
576 | (3) |
|
|
576 | (1) |
|
|
577 | (1) |
|
Other considerations when using scripts |
|
|
578 | (1) |
|
|
579 | (1) |
|
4.9 Given a scenario, use remote access technologies |
|
|
579 | (4) |
|
|
579 | (3) |
|
Security considerations of each access method |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
583 | (4) |
|
Appendix Answers to the Review Questions |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | (2) |
|
|
591 | (4) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
595 | (1) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
596 | (2) |
|
Chapter 6 Operating Systems |
|
|
598 | (1) |
|
|
599 | (3) |
|
Chapter 8 Software Troubleshooting |
|
|
602 | (1) |
|
Chapter 9 Operational Procedures |
|
|
603 | (4) |
Index |
|
607 | |
|
CompTIA® A+® Complete Study Guide Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Fifth Edition |
|
|
Introduction |
|
xxvii | |
Assessment Test |
|
lxxxii | |
|
|
1 | (2) |
|
Chapter 1 Motherboards, Processors, and Memory |
|
|
3 | (4) |
|
Understanding Motherboards |
|
|
7 | (1) |
|
|
7 | (3) |
|
|
10 | (32) |
|
|
42 | (7) |
|
|
43 | (2) |
|
|
45 | (4) |
|
|
49 | (14) |
|
|
50 | (4) |
|
|
54 | (5) |
|
|
59 | (4) |
|
Understanding Cooling Systems |
|
|
63 | (8) |
|
|
63 | (3) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (4) |
|
|
71 | (1) |
|
|
71 | (2) |
|
|
73 | (4) |
|
Performance-Based Question 1 |
|
|
77 | (1) |
|
Performance-Based Question 2 |
|
|
78 | (1) |
|
Chapter 2 Expansion Cards, Storage Devices, and Power Supplies |
|
|
79 | (60) |
|
Installing and Configuring Expansion Cards |
|
|
81 | (8) |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
88 | (1) |
|
Understanding Storage Devices |
|
|
89 | (29) |
|
|
90 | (6) |
|
|
96 | (8) |
|
|
104 | (3) |
|
Removable Storage and Media |
|
|
107 | (7) |
|
Installing, Removing, and Configuring Storage Devices |
|
|
114 | (4) |
|
Understanding Power Supplies |
|
|
118 | (13) |
|
|
119 | (1) |
|
Power Supply Output and Ratings |
|
|
120 | (1) |
|
|
121 | (4) |
|
|
125 | (1) |
|
|
126 | (3) |
|
|
129 | (1) |
|
AC Adapters as Power Supplies |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
133 | (4) |
|
Performance-Based Question |
|
|
137 | (2) |
|
Chapter 3 Peripherals, Cables, and Connectors |
|
|
139 | (52) |
|
Understanding Cables and Connectors |
|
|
140 | (20) |
|
|
141 | (13) |
|
|
154 | (2) |
|
|
156 | (3) |
|
|
159 | (1) |
|
Understanding Cables and Connectors |
|
|
160 | (24) |
|
Peripheral Cables and Connectors |
|
|
160 | (9) |
|
|
169 | (1) |
|
Video Cables and Connectors |
|
|
170 | (8) |
|
Hard Drive Cables and Connectors |
|
|
178 | (6) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (4) |
|
Performance-Based Question |
|
|
190 | (1) |
|
Chapter 4 Printers and Multifunction Devices |
|
|
191 | (78) |
|
Understanding Print Technologies and Imaging Processes |
|
|
193 | (30) |
|
|
194 | (2) |
|
|
196 | (9) |
|
|
205 | (12) |
|
|
217 | (1) |
|
|
218 | (5) |
|
Installing and Maintaining Printers |
|
|
223 | (39) |
|
Printer Interface Components |
|
|
224 | (5) |
|
Installing and Sharing Local Printers |
|
|
229 | (12) |
|
Installing and Sharing Networked Printers |
|
|
241 | (10) |
|
Performing Printer Maintenance |
|
|
251 | (6) |
|
Installing Printer Upgrades |
|
|
257 | (5) |
|
|
262 | (1) |
|
|
262 | (2) |
|
|
264 | (4) |
|
Performance-Based Question |
|
|
268 | (1) |
|
Chapter 5 Networking Fundamentals |
|
|
269 | (64) |
|
Understanding Networking Principles |
|
|
271 | (24) |
|
|
272 | (7) |
|
Primary Network Components |
|
|
279 | (4) |
|
Network Operating Systems |
|
|
283 | (1) |
|
|
283 | (3) |
|
|
286 | (4) |
|
|
290 | (5) |
|
Identifying Common Network Hardware |
|
|
295 | (29) |
|
|
295 | (4) |
|
|
299 | (15) |
|
|
314 | (10) |
|
|
324 | (1) |
|
|
324 | (3) |
|
|
327 | (4) |
|
Performance-Based Question |
|
|
331 | (2) |
|
Chapter 6 Introduction to TCP/IP |
|
|
333 | (46) |
|
|
335 | (33) |
|
|
336 | (10) |
|
Understanding IP Addressing |
|
|
346 | (10) |
|
Understanding DHCP and DNS |
|
|
356 | (9) |
|
|
365 | (3) |
|
Understanding Virtual Networks |
|
|
368 | (4) |
|
Virtual Local Area Networks |
|
|
368 | (2) |
|
|
370 | (2) |
|
|
372 | (1) |
|
|
372 | (2) |
|
|
374 | (4) |
|
Performance-Based Question |
|
|
378 | (1) |
|
Chapter 7 Wireless and SOHO Networks |
|
|
379 | (78) |
|
Understanding Wireless Networking Technologies |
|
|
381 | (21) |
|
802.11 Networking Standards |
|
|
382 | (11) |
|
|
393 | (3) |
|
Long-Range Fixed Wireless |
|
|
396 | (2) |
|
Radio Frequency Networking Standards |
|
|
398 | (4) |
|
Installing and Configuring SOHO Networks |
|
|
402 | (47) |
|
Keys to Planning a Network |
|
|
402 | (2) |
|
Choosing an Internet Connection |
|
|
404 | (14) |
|
Choosing Internal Network Connections |
|
|
418 | (4) |
|
Installing the Network Infrastructure |
|
|
422 | (11) |
|
Configuring Wireless Routers and Access Points |
|
|
433 | (16) |
|
|
449 | (1) |
|
|
449 | (2) |
|
|
451 | (4) |
|
Performance-Based Question |
|
|
455 | (2) |
|
Chapter 8 Network Services, Virtualization, and Cloud Computing |
|
|
457 | (66) |
|
Understanding Network Services |
|
|
459 | (28) |
|
|
460 | (13) |
|
|
473 | (7) |
|
|
480 | (2) |
|
Internet of Things Devices |
|
|
482 | (5) |
|
Understanding Virtualization and Cloud Computing |
|
|
487 | (28) |
|
Concepts of Cloud Computing |
|
|
488 | (11) |
|
Concepts of Virtualization |
|
|
499 | (16) |
|
|
515 | (1) |
|
|
516 | (2) |
|
|
518 | (4) |
|
Performance-Based Question |
|
|
522 | (1) |
|
Chapter 9 Laptop and Mobile Device Hardware |
|
|
523 | (68) |
|
Working with Laptop and Mobile Device Hardware |
|
|
526 | (58) |
|
Understanding the Differences between Device Types |
|
|
526 | (5) |
|
Disassembling and Reassembling Laptops |
|
|
531 | (4) |
|
Installing and Configuring Laptop Hardware |
|
|
535 | (45) |
|
Setting Up and Configuring Accessories and Ports |
|
|
580 | (4) |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
586 | (4) |
|
Performance-Based Question |
|
|
590 | (1) |
|
Chapter 10 Mobile Connectivity and Application Support |
|
|
591 | (84) |
|
Understanding Mobile Connectivity |
|
|
593 | (42) |
|
Understanding Cellular Networking Standards |
|
|
595 | (2) |
|
Using Cellular Data Connections |
|
|
597 | (11) |
|
Establishing Wi-Fi Connectivity |
|
|
608 | (14) |
|
Establishing Bluetooth Connectivity |
|
|
622 | (13) |
|
Understanding Mobile App Support |
|
|
635 | (33) |
|
Understanding Location Services |
|
|
635 | (6) |
|
Understanding Mobile Device and App Management |
|
|
641 | (13) |
|
Configuring Mobile Device Synchronization |
|
|
654 | (12) |
|
|
666 | (2) |
|
|
668 | (1) |
|
|
668 | (2) |
|
|
670 | (4) |
|
Performance-Based Question |
|
|
674 | (1) |
|
Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
675 | (42) |
|
Using the Troubleshooting Best Practice Methodology |
|
|
678 | (12) |
|
Step 1 Identify the Problem |
|
|
678 | (5) |
|
Step 2 Establish a Theory |
|
|
683 | (1) |
|
|
684 | (3) |
|
Step 4 Establish a Plan of Action |
|
|
687 | (1) |
|
Step 5 Verify Functionality |
|
|
688 | (1) |
|
|
689 | (1) |
|
Troubleshooting Motherboards, CPUs, RAM, and Power Problems |
|
|
690 | (18) |
|
Identifying General Hardware Symptoms and Causes |
|
|
691 | (5) |
|
Identifying BIOS/UEFI and POST Routine Problems |
|
|
696 | (4) |
|
Identifying Motherboard and CPU Problems |
|
|
700 | (2) |
|
Identifying Memory Issues |
|
|
702 | (3) |
|
Identifying Power Supply Problems |
|
|
705 | (3) |
|
|
708 | (1) |
|
|
709 | (2) |
|
|
711 | (4) |
|
Performance-Based Question |
|
|
715 | (2) |
|
Chapter 12 Hardware and Network Troubleshooting |
|
|
717 | (98) |
|
Troubleshooting Storage Drives and RAID Arrays |
|
|
721 | (10) |
|
|
722 | (1) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
725 | (4) |
|
|
729 | (1) |
|
|
730 | (1) |
|
Troubleshooting Video, Projector, and Display Issues |
|
|
731 | (6) |
|
|
731 | (1) |
|
|
732 | (3) |
|
|
735 | (2) |
|
Troubleshooting Common Mobile Device Issues |
|
|
737 | (14) |
|
|
738 | (3) |
|
|
741 | (2) |
|
|
743 | (5) |
|
Physical Damage and Malware |
|
|
748 | (3) |
|
Troubleshooting Printer Problems |
|
|
751 | (28) |
|
|
752 | (3) |
|
|
755 | (4) |
|
|
759 | (13) |
|
|
772 | (7) |
|
Troubleshooting Networking Problems |
|
|
779 | (27) |
|
Using Network Troubleshooting Tools |
|
|
779 | (20) |
|
Resolving Connectivity Issues |
|
|
799 | (7) |
|
|
806 | (1) |
|
|
806 | (3) |
|
|
809 | (4) |
|
Performance-Based Question |
|
|
813 | (2) |
|
|
815 | (700) |
|
Chapter 13 Operating System Basics |
|
|
817 | (62) |
|
Understanding Operating Systems |
|
|
819 | (11) |
|
Operating System Terms and Concepts |
|
|
821 | (2) |
|
|
823 | (5) |
|
Minimum System Requirements |
|
|
828 | (2) |
|
Understanding Applications |
|
|
830 | (6) |
|
System Requirements for Applications |
|
|
830 | (2) |
|
|
832 | (3) |
|
|
835 | (1) |
|
Other Considerations for New Applications |
|
|
835 | (1) |
|
Introduction to Windows 10 |
|
|
836 | (35) |
|
|
836 | (4) |
|
|
840 | (11) |
|
|
851 | (13) |
|
|
864 | (3) |
|
|
867 | (4) |
|
|
871 | (1) |
|
|
872 | (1) |
|
|
872 | (2) |
|
|
874 | (4) |
|
Performance-Based Question |
|
|
878 | (1) |
|
Chapter 14 Windows Configuration |
|
|
879 | (98) |
|
Interacting with Operating Systems |
|
|
882 | (78) |
|
|
882 | (6) |
|
Microsoft Management Console |
|
|
888 | (11) |
|
|
899 | (6) |
|
|
905 | (32) |
|
|
937 | (23) |
|
|
960 | (2) |
|
|
962 | (8) |
|
Getting Disks Ready to Store Files and Programs |
|
|
963 | (6) |
|
Checking the Health of Hard Disks and Optimizing Their Performance |
|
|
969 | (1) |
|
|
970 | (1) |
|
|
970 | (2) |
|
|
972 | (4) |
|
Performance-Based Question |
|
|
976 | (1) |
|
Chapter 15 Windows Administration |
|
|
977 | (80) |
|
Installing and Upgrading Windows |
|
|
980 | (33) |
|
Windows Installation Options |
|
|
982 | (2) |
|
|
984 | (18) |
|
|
1002 | (4) |
|
|
1006 | (1) |
|
|
1007 | (1) |
|
Side-by-Side Upgrading Windows 10/11 |
|
|
1007 | (1) |
|
|
1008 | (1) |
|
Upgrading Editions of Windows |
|
|
1008 | (1) |
|
Security and Feature Updates |
|
|
1008 | (3) |
|
Installation/Upgrade Boot Options |
|
|
1011 | (1) |
|
|
1012 | (1) |
|
|
1013 | (17) |
|
|
1030 | (20) |
|
|
1030 | (4) |
|
|
1034 | (2) |
|
Establishing a Network Connection |
|
|
1036 | (5) |
|
|
1041 | (3) |
|
|
1044 | (2) |
|
Client Network Configuration |
|
|
1046 | (4) |
|
|
1050 | (1) |
|
|
1050 | (2) |
|
|
1052 | (4) |
|
Performance-Based Question |
|
|
1056 | (1) |
|
Chapter 16 Working with macOS and Linux |
|
|
1057 | (58) |
|
|
1060 | (1) |
|
|
1061 | (4) |
|
Installing Applications from the App Store |
|
|
1061 | (1) |
|
Installing Downloadable Applications |
|
|
1062 | (2) |
|
|
1064 | (1) |
|
|
1065 | (1) |
|
|
1065 | (6) |
|
|
1065 | (3) |
|
Scheduled Disk Maintenance |
|
|
1068 | (1) |
|
|
1068 | (1) |
|
|
1069 | (1) |
|
|
1070 | (1) |
|
Antivirus/Antimalware Updates |
|
|
1071 | (1) |
|
|
1071 | (2) |
|
|
1073 | (9) |
|
|
1082 | (5) |
|
|
1087 | (19) |
|
Understanding the Syntax of Shell Commands |
|
|
1088 | (1) |
|
Discovering and Using Linux Commands |
|
|
1089 | (2) |
|
Becoming root (Super User) |
|
|
1091 | (1) |
|
Maintaining the Operating System |
|
|
1092 | (3) |
|
|
1095 | (2) |
|
|
1097 | (1) |
|
|
1098 | (1) |
|
Changing Permissions and Ownership |
|
|
1099 | (1) |
|
|
1100 | (3) |
|
|
1103 | (1) |
|
|
1104 | (2) |
|
|
1106 | (1) |
|
|
1106 | (2) |
|
|
1108 | (1) |
|
|
1109 | (1) |
|
|
1110 | (4) |
|
Performance-Based Question |
|
|
1114 | (1) |
|
Chapter 17 Security Concepts |
|
|
1115 | (80) |
|
Physical Security Concepts |
|
|
1121 | (7) |
|
|
1121 | (1) |
|
|
1122 | (1) |
|
|
1122 | (1) |
|
|
1123 | (1) |
|
|
1124 | (1) |
|
|
1124 | (1) |
|
|
1125 | (2) |
|
|
1127 | (1) |
|
|
1127 | (1) |
|
|
1128 | (1) |
|
Physical Security for Staff |
|
|
1128 | (4) |
|
|
1129 | (1) |
|
Smartcards and RFID Badges |
|
|
1129 | (1) |
|
|
1130 | (1) |
|
|
1131 | (1) |
|
|
1132 | (1) |
|
|
1132 | (1) |
|
|
1132 | (11) |
|
Principle of Least Privilege |
|
|
1133 | (1) |
|
|
1133 | (2) |
|
|
1135 | (1) |
|
Multifactor Authentication |
|
|
1135 | (2) |
|
Mobile Device Management (MDM) |
|
|
1137 | (1) |
|
|
1138 | (5) |
|
|
1143 | (8) |
|
|
1144 | (1) |
|
|
1144 | (1) |
|
|
1145 | (1) |
|
|
1145 | (1) |
|
|
1145 | (1) |
|
|
1146 | (1) |
|
|
1146 | (4) |
|
Virus Transmission in a Network |
|
|
1150 | (1) |
|
|
1151 | (1) |
|
|
1151 | (1) |
|
Mitigating Software Threats |
|
|
1151 | (8) |
|
|
1152 | (1) |
|
|
1153 | (1) |
|
|
1154 | (1) |
|
|
1154 | (2) |
|
|
1156 | (2) |
|
|
1158 | (1) |
|
Social Engineering Attacks, Threats, and Vulnerabilities |
|
|
1159 | (4) |
|
|
1160 | (1) |
|
|
1161 | (1) |
|
|
1161 | (1) |
|
|
1162 | (1) |
|
|
1162 | (1) |
|
|
1162 | (1) |
|
|
1163 | (7) |
|
Denial-of-Service Attacks |
|
|
1163 | (2) |
|
|
1165 | (1) |
|
|
1166 | (1) |
|
On-Path Attack (Previously Known as Man-in-the-Middle Attack) |
|
|
1167 | (1) |
|
|
1167 | (1) |
|
|
1168 | (1) |
|
|
1169 | (1) |
|
Cross-Site Scripting (XSS) |
|
|
1169 | (1) |
|
Exploits and Vulnerabilities |
|
|
1170 | (2) |
|
|
1170 | (1) |
|
|
1170 | (1) |
|
Operating Systems Life Cycle |
|
|
1171 | (1) |
|
|
1171 | (1) |
|
|
1171 | (1) |
|
|
1172 | (11) |
|
|
1172 | (1) |
|
|
1173 | (1) |
|
|
1174 | (1) |
|
|
1175 | (1) |
|
|
1176 | (1) |
|
|
1177 | (4) |
|
|
1181 | (2) |
|
Destruction and Disposal Methods |
|
|
1183 | (4) |
|
Recycling or Repurposing Best Practices |
|
|
1183 | (2) |
|
|
1185 | (2) |
|
|
1187 | (1) |
|
|
1187 | (3) |
|
|
1190 | (4) |
|
Performance-Based Question |
|
|
1194 | (1) |
|
Chapter 18 Securing Operating Systems |
|
|
1195 | (76) |
|
Working with Windows OS Security Settings |
|
|
1199 | (29) |
|
|
1199 | (4) |
|
|
1203 | (5) |
|
NTFS vs. Share Permissions |
|
|
1208 | (7) |
|
|
1215 | (3) |
|
|
1218 | (2) |
|
Windows Security Features |
|
|
1220 | (8) |
|
|
1228 | (11) |
|
Browser Download and Installation |
|
|
1228 | (2) |
|
|
1230 | (2) |
|
|
1232 | (1) |
|
|
1233 | (1) |
|
|
1234 | (5) |
|
Securing a SOHO Network (Wireless) |
|
|
1239 | (8) |
|
Changing Default Usernames and Passwords |
|
|
1240 | (1) |
|
|
1240 | (1) |
|
|
1240 | (1) |
|
|
1241 | (1) |
|
|
1242 | (1) |
|
|
1242 | (1) |
|
|
1243 | (1) |
|
|
1244 | (1) |
|
Antenna and Access Point Placement |
|
|
1245 | (1) |
|
Assign Static IP Addresses |
|
|
1245 | (1) |
|
|
1246 | (1) |
|
|
1246 | (1) |
|
Securing a SOHO Network (Wired) |
|
|
1247 | (6) |
|
Changing Default Credentials |
|
|
1247 | (1) |
|
|
1248 | (1) |
|
|
1248 | (4) |
|
|
1252 | (1) |
|
|
1252 | (1) |
|
|
1253 | (10) |
|
|
1254 | (2) |
|
Remote Wipes and Locator Applications |
|
|
1256 | (2) |
|
|
1258 | (1) |
|
Failed Login Attempts Restrictions |
|
|
1258 | (1) |
|
Viruses and Malware on Mobile Devices |
|
|
1259 | (1) |
|
|
1260 | (1) |
|
|
1260 | (1) |
|
Multifactor Authentication |
|
|
1260 | (1) |
|
Authenticator Applications |
|
|
1261 | (1) |
|
|
1261 | (1) |
|
|
1261 | (2) |
|
|
1263 | (1) |
|
|
1263 | (1) |
|
|
1264 | (1) |
|
|
1265 | (4) |
|
Performance-Based Question |
|
|
1269 | (2) |
|
Chapter 19 Troubleshooting Operating Systems and Security |
|
|
1271 | (76) |
|
Troubleshooting Common Microsoft Windows OS Problems |
|
|
1275 | (34) |
|
|
1275 | (22) |
|
Common Troubleshooting Steps |
|
|
1297 | (12) |
|
Troubleshooting Security Issues |
|
|
1309 | (9) |
|
|
1310 | (5) |
|
|
1315 | (3) |
|
Best Practices for Malware Removal |
|
|
1318 | (7) |
|
1 Identify and Verify Malware Symptoms |
|
|
1318 | (1) |
|
2 Quarantine Infected Systems |
|
|
1319 | (1) |
|
3 Disable System Restore in Windows |
|
|
1320 | (1) |
|
4 Remediate Infected Systems |
|
|
1321 | (2) |
|
5 Schedule Scans and Run Updates |
|
|
1323 | (1) |
|
6 Enable System Restore and Create a Restore Point in Windows |
|
|
1324 | (1) |
|
|
1325 | (1) |
|
Troubleshooting Mobile OS Issues |
|
|
1325 | (10) |
|
|
1325 | (2) |
|
|
1327 | (2) |
|
|
1329 | (1) |
|
Extremely Short Battery Life |
|
|
1330 | (1) |
|
|
1331 | (3) |
|
|
1334 | (1) |
|
Troubleshooting Mobile Security Issues |
|
|
1335 | (6) |
|
|
1336 | (2) |
|
|
1338 | (3) |
|
|
1341 | (1) |
|
|
1342 | (1) |
|
|
1343 | (3) |
|
Performance-Based Question |
|
|
1346 | (1) |
|
Chapter 20 Scripting and Remote Access |
|
|
1347 | (46) |
|
|
1349 | (26) |
|
|
1351 | (4) |
|
|
1355 | (11) |
|
|
1366 | (7) |
|
|
1373 | (2) |
|
|
1375 | (12) |
|
|
1375 | (1) |
|
Virtual Private Network (VPN) |
|
|
1376 | (3) |
|
Virtual Network Computing |
|
|
1379 | (1) |
|
|
1379 | (1) |
|
|
1380 | (1) |
|
Remote Monitoring and Management |
|
|
1381 | (1) |
|
|
1382 | (5) |
|
|
1387 | (1) |
|
|
1387 | (1) |
|
|
1388 | (1) |
|
|
1389 | (3) |
|
Performance-Based Question |
|
|
1392 | (1) |
|
Chapter 21 Safety and Environmental Concerns |
|
|
1393 | (60) |
|
Understanding Safety Procedures |
|
|
1395 | (22) |
|
Identifying Potential Safety Hazards |
|
|
1395 | (12) |
|
Creating a Safe Workplace |
|
|
1407 | (10) |
|
Understanding Environmental Controls |
|
|
1417 | (16) |
|
Managing the Physical Environment |
|
|
1418 | (6) |
|
Handling and Disposing of Computer Equipment |
|
|
1424 | (9) |
|
Understanding Policies, Licensing, and Privacy |
|
|
1433 | (13) |
|
Dealing with Prohibited Content/Activity |
|
|
1434 | (1) |
|
|
1435 | (5) |
|
Managing Software Licenses |
|
|
1440 | (3) |
|
Managing Sensitive Information |
|
|
1443 | (3) |
|
|
1446 | (1) |
|
|
1446 | (2) |
|
|
1448 | (4) |
|
Performance-Based Question |
|
|
1452 | (1) |
|
Chapter 22 Documentation and Professionalism |
|
|
1453 | (62) |
|
Documentation and Support |
|
|
1457 | (19) |
|
|
1458 | (4) |
|
|
1462 | (4) |
|
|
1466 | (9) |
|
|
1475 | (1) |
|
Change Management Best Practices |
|
|
1476 | (6) |
|
Disaster Prevention and Recovery |
|
|
1482 | (12) |
|
|
1483 | (6) |
|
|
1489 | (1) |
|
|
1490 | (1) |
|
|
1491 | (1) |
|
|
1492 | (2) |
|
Demonstrating Professionalism |
|
|
1494 | (14) |
|
|
1495 | (1) |
|
Communicating with Customers |
|
|
1496 | (4) |
|
Using Appropriate Behavior |
|
|
1500 | (7) |
|
Putting It All in Perspective |
|
|
1507 | (1) |
|
|
1508 | (1) |
|
|
1508 | (2) |
|
|
1510 | (4) |
|
Performance-Based Question |
|
|
1514 | (1) |
|
Appendix A Answers to the Review Questions |
|
|
1515 | (46) |
|
Chapter 1 Motherboards, Processors, and Memory |
|
|
1516 | (2) |
|
Chapter 2 Expansion Cards, Storage Devices, and Power Supplies |
|
|
1518 | (2) |
|
Chapter 3 Peripherals, Cables, and Connectors |
|
|
1520 | (1) |
|
Chapter 4 Printers and Multifunction Devices |
|
|
1521 | (2) |
|
Chapter 5 Networking Fundamentals |
|
|
1523 | (2) |
|
Chapter 6 Introduction to TCP/IP |
|
|
1525 | (2) |
|
Chapter 7 Wireless and SOHO Networks |
|
|
1527 | (2) |
|
Chapter 8 Network Services, Virtualization, and Cloud Computing |
|
|
1529 | (2) |
|
Chapter 9 Laptop and Mobile Device Hardware |
|
|
1531 | (2) |
|
Chapter 10 Mobile Connectivity and Application Support |
|
|
1533 | (2) |
|
Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
1535 | (2) |
|
Chapter 12 Hardware and Network Troubleshooting |
|
|
1537 | (2) |
|
Chapter 13 Operating System Basics |
|
|
1539 | (1) |
|
Chapter 14 Windows Configuration |
|
|
1540 | (3) |
|
Chapter 15 Windows Administration |
|
|
1543 | (2) |
|
Chapter 16 Working with macOS and Linux |
|
|
1545 | (2) |
|
Chapter 17 Security Concepts |
|
|
1547 | (2) |
|
Chapter 18 Securing Operating Systems |
|
|
1549 | (2) |
|
Chapter 19 Troubleshooting Operating Systems and Security |
|
|
1551 | (3) |
|
Chapter 20 Scripting and Remote Access |
|
|
1554 | (2) |
|
Chapter 21 Safety and Environmental Concerns |
|
|
1556 | (2) |
|
Chapter 22 Documentation and Professionalism |
|
|
1558 | (3) |
|
Appendix B Answers to Performance-Based Questions |
|
|
1561 | (1) |
|
Chapter 1 Motherboards, Processors, and Memory |
|
|
1562 | (1) |
|
Chapter 2 Expansion Cards, Storage Devices, and Power Supplies |
|
|
1563 | (1) |
|
Chapter 3 Peripherals, Cables, and Connectors |
|
|
1563 | (1) |
|
Chapter 4 Printers and Multifunction Devices |
|
|
1564 | (1) |
|
Chapter 5 Networking Fundamentals |
|
|
1565 | (1) |
|
Chapter 6 Introduction to TCP/IP |
|
|
1566 | (1) |
|
Chapter 7 Wireless and SOHO Networks |
|
|
1566 | (1) |
|
Chapter 8 Network Services, Virtualization, and Cloud Computing |
|
|
1567 | (1) |
|
Chapter 9 Laptop and Mobile Device Hardware |
|
|
1568 | (1) |
|
Chapter 10 Mobile Connectivity and Application Support |
|
|
1568 | (1) |
|
Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
1569 | (1) |
|
Chapter 12 Hardware and Network Troubleshooting |
|
|
1569 | (1) |
|
Chapter 13 Operating System Basics |
|
|
1570 | (1) |
|
Chapter 14 Windows Configuration |
|
|
1570 | (1) |
|
Chapter 15 Windows Administration |
|
|
1571 | (4) |
|
Chapter 16 Working with macOS and Linux |
|
|
1575 | (2) |
|
Chapter 17 Security Concepts |
|
|
1577 | (1) |
|
Chapter 18 Securing Operating Systems |
|
|
1577 | (1) |
|
Chapter 19 Troubleshooting Operating Systems and Security |
|
|
1578 | (1) |
|
Chapter 20 Scripting and Remote Access |
|
|
1578 | (1) |
|
Chapter 21 Safety and Environmental Concerns |
|
|
1579 | (1) |
|
Chapter 22 Documentation and Professionalism |
|
|
1579 | (2) |
Index |
|
1581 | |
|
CompTIA® A® Complete Practice Tests Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Third Edition |
|
|
Introduction |
|
xi | |
|
Part I COMPTIA A+ CORE 1 EXAM 220-1101 |
|
|
1 | (2) |
|
|
3 | (26) |
|
|
29 | (32) |
|
|
61 | (54) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
115 | (10) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
125 | (48) |
|
Part II COMPTIA A® CORE 2 EXAM 220-1102 |
|
|
173 | (210) |
|
Chapter 6 Operating Systems |
|
|
175 | (62) |
|
|
237 | (44) |
|
Chapter 8 Software Troubleshooting |
|
|
281 | (28) |
|
Chapter 9 Operational Procedures |
|
|
309 | (30) |
|
Chapter 10 Practice Exam 1 (220-1101) |
|
|
339 | (22) |
|
Chapter 11 Practice Exam 2 (220-1102) |
|
|
361 | (22) |
|
Appendix Answers to the Review Questions |
|
|
383 | (220) |
|
|
384 | (13) |
|
|
397 | (20) |
|
|
417 | (20) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
437 | (5) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
442 | (24) |
|
Chapter 6 Operating Systems |
|
|
466 | (44) |
|
|
510 | (30) |
|
Chapter 8 Software Troubleshooting |
|
|
540 | (18) |
|
Chapter 9 Operational Procedures |
|
|
558 | (16) |
|
Chapter 10 Practice Exam 1 (220-1101) |
|
|
574 | (14) |
|
Chapter 11 Practice Exam 2 (220-1102) |
|
|
588 | (15) |
Index |
|
603 | |