Introduction |
|
xxiii | |
Part I: Introduction to Core 1. (220-1001) |
|
|
Core 1. (220-1001) Domain 1.0 Mobile Devices |
|
|
|
Chapter 1 Laptops, Part 1 |
|
|
7 | (22) |
|
1.1 Given a scenario, install and configure laptop hardware and components |
|
|
7 | (22) |
|
|
8 | (2) |
|
|
10 | (1) |
|
|
11 | (2) |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (2) |
|
|
18 | (1) |
|
|
19 | (4) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (3) |
|
Chapter 2 Laptops, Part 2 |
|
|
29 | (18) |
|
1.2 Given a scenario, install components within the display of a laptop |
|
|
29 | (10) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Digitizers and Touchscreens |
|
|
32 | (1) |
|
|
33 | (1) |
|
Wi-Fi Antenna Connector and Placement |
|
|
34 | (3) |
|
|
37 | (2) |
|
1.3 Given a scenario, use appropriate laptop features |
|
|
39 | (8) |
|
|
39 | (2) |
|
|
41 | (1) |
|
Docking Stations and Port Replicators |
|
|
42 | (1) |
|
Rotating and Removable Screens |
|
|
42 | (1) |
|
Securing Laptops with Cable Locks |
|
|
43 | (1) |
|
|
44 | (3) |
|
Chapter 3 Smartphones, Tablets, and Other Mobile Devices, Part 1 |
|
|
47 | (18) |
|
1.4 Compare and contrast characteristics of various types of other mobile devices |
|
|
47 | (9) |
|
|
48 | (1) |
|
|
49 | (3) |
|
Wearable Technology Devices |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (2) |
|
1.5 Given a scenario, connect and configure accessories and ports of other mobile devices |
|
|
56 | (9) |
|
|
56 | (4) |
|
|
60 | (1) |
|
|
61 | (4) |
|
Chapter 4 Smartphones, Tablets, and Other Mobile Devices, Part 2 |
|
|
65 | (24) |
|
1.6 Given a scenario, configure basic mobile device network connectivity and application support |
|
|
65 | (14) |
|
Enabling Wireless Functions |
|
|
66 | (3) |
|
|
69 | (1) |
|
|
69 | (2) |
|
|
71 | (3) |
|
Cellular Radio Technologies |
|
|
74 | (3) |
|
|
77 | (2) |
|
1.7 Given a scenario, use methods to perform mobile device synchronization |
|
|
79 | (10) |
|
|
79 | (4) |
|
Types of Data to Synchronize and Authentication |
|
|
83 | (1) |
|
|
84 | (5) |
|
Core 1. (220-1001) Domain 2.0 Networking |
|
|
|
Chapter 5 Ports, Protocols, and Network Devices |
|
|
89 | (22) |
|
2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes |
|
|
89 | (12) |
|
|
90 | (1) |
|
|
91 | (8) |
|
|
99 | (2) |
|
2.2 Compare and contrast common networking hardware devices |
|
|
101 | (10) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
Cloud-based Network Controllers |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (4) |
|
Chapter 6 SOHO Networks and Wireless Protocols |
|
|
111 | (22) |
|
2.3 Given a scenario, install and configure a basic wired/wireless SOHO network |
|
|
111 | (15) |
|
Router Setup and Wireless |
|
|
112 | (3) |
|
|
115 | (1) |
|
MC and End-user Device Configuration |
|
|
116 | (2) |
|
|
118 | (2) |
|
Cable/DSL Modem Configuration |
|
|
120 | (1) |
|
Firewall Settings and Additional Configurations |
|
|
120 | (3) |
|
Configuring Wireless Encryption |
|
|
123 | (1) |
|
|
124 | (2) |
|
2.4 Compare and contrast wireless networking protocols |
|
|
126 | (7) |
|
|
126 | (3) |
|
|
129 | (1) |
|
|
129 | (2) |
|
|
131 | (2) |
|
Chapter 7 Networked Hosts and Network Configuration |
|
|
133 | (18) |
|
2.5 Summarize the properties and purposes of services provided by networked hosts |
|
|
133 | (9) |
|
|
134 | (4) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (2) |
|
2.6 Explain common network configuration concepts |
|
|
142 | (9) |
|
|
142 | (4) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (2) |
|
Chapter 8 Network Types and Networking Tools |
|
|
151 | (18) |
|
2.7 Compare and contrast Internet connection types, network types, and their features |
|
|
151 | (9) |
|
|
152 | (2) |
|
Internet Connection Types |
|
|
154 | (4) |
|
|
158 | (2) |
|
2.8 Given a scenario, use appropriate networking tools |
|
|
160 | (9) |
|
|
160 | (3) |
|
|
163 | (1) |
|
|
164 | (5) |
|
Core 1. (220-1001) Domain 3.0 Hardware |
|
|
|
Chapter 9 Cables and Connectors |
|
|
169 | (18) |
|
3.1 Explain basic cable types, features, and their purposes |
|
|
169 | (1) |
|
3.2 Identify common connector types |
|
|
170 | (17) |
|
|
170 | (6) |
|
Video Cables and Connectors |
|
|
176 | (2) |
|
Multipurpose Cables and Connectors |
|
|
178 | (4) |
|
Hard Drive Cables and Connectors |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (4) |
|
Chapter 10 RAM and Storage |
|
|
187 | (28) |
|
3.3 Given a scenario, install RAM types |
|
|
187 | (11) |
|
|
188 | (3) |
|
|
191 | (3) |
|
|
194 | (2) |
|
|
196 | (2) |
|
3.4 Given a scenario, select, install and configure storage devices |
|
|
198 | (17) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (4) |
|
|
208 | (5) |
|
|
213 | (2) |
|
Chapter 11 Motherboards and Add-on Cards |
|
|
215 | (18) |
|
3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards |
|
|
215 | (18) |
|
Motherboard Form Factors and Connectors |
|
|
216 | (4) |
|
|
220 | (6) |
|
More Ports and Connectors |
|
|
226 | (1) |
|
|
226 | (3) |
|
|
229 | (1) |
|
|
229 | (4) |
|
|
233 | (16) |
|
3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards |
|
|
233 | (16) |
|
|
233 | (3) |
|
|
236 | (3) |
|
|
239 | (1) |
|
|
239 | (3) |
|
|
242 | (3) |
|
|
245 | (4) |
|
Chapter 13 Peripherals and Power |
|
|
249 | (22) |
|
3.6 Explain the purposes and uses of various peripheral types |
|
|
249 | (13) |
|
|
250 | (6) |
|
|
256 | (3) |
|
Hybrid I/O Devices and Others |
|
|
259 | (1) |
|
|
260 | (2) |
|
3.7 Summarize power supply types and features |
|
|
262 | (9) |
|
Planning Which Power Supply to Use |
|
|
262 | (4) |
|
Installing the Power Supply |
|
|
266 | (2) |
|
|
268 | (3) |
|
Chapter 14 Custom PCs and Common Devices |
|
|
271 | (16) |
|
3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs |
|
|
271 | (11) |
|
Graphic/CAD/CAM Design Workstation |
|
|
272 | (1) |
|
Audio/Video Editing Workstation |
|
|
272 | (1) |
|
Virtualization Workstation |
|
|
273 | (2) |
|
|
275 | (2) |
|
Network-Attached Storage Device |
|
|
277 | (1) |
|
|
278 | (2) |
|
|
280 | (1) |
|
|
280 | (2) |
|
3.9 Given a scenario, install and configure common devices |
|
|
282 | (5) |
|
Desktop Devices and Settings |
|
|
282 | (1) |
|
Laptop Configurations and Settings |
|
|
283 | (3) |
|
|
286 | (1) |
|
Chapter 15 Printers and Multifunction Devices |
|
|
287 | (24) |
|
3.10 Given a scenario, configure SOHO multifunction devices/printers and settings |
|
|
287 | (7) |
|
Printer Configuration Settings |
|
|
288 | (3) |
|
Local Versus Network Printers |
|
|
291 | (1) |
|
|
292 | (2) |
|
3.11 Given a scenario, install and maintain various print technologies |
|
|
294 | (17) |
|
|
294 | (8) |
|
|
302 | (3) |
|
Printer Installation and Drivers |
|
|
305 | (1) |
|
|
306 | (5) |
|
Core 1. (220-1001) Domain 4.0 Virtualization and Cloud Computing |
|
|
|
Chapter 16 Cloud Computing and Client-side Virtualization |
|
|
311 | (18) |
|
4.1 Compare and contrast cloud computing concepts |
|
|
312 | (6) |
|
|
312 | (2) |
|
|
314 | (2) |
|
|
316 | (2) |
|
4.2 Given a scenario, set up and configure client-side virtualization |
|
|
318 | (11) |
|
Purpose of Virtual Machines |
|
|
318 | (1) |
|
|
319 | (1) |
|
Examples of Virtual Machine Software |
|
|
320 | (2) |
|
Virtual Machine Requirements |
|
|
322 | (3) |
|
|
325 | (4) |
|
Core 1. (220-1001) Domain 5.0 Hardware and Network Troubleshooting |
|
|
|
Chapter 17 Computer Troubleshooting 101 |
|
|
329 | (8) |
|
5.1 Given a scenario, use the best practice methodology to resolve problems |
|
|
329 | (8) |
|
Step 1 Identify the Problem |
|
|
330 | (2) |
|
Step 2 Establish a Theory of Probable Cause (Question the Obvious) |
|
|
332 | (1) |
|
Step 3 Test the Theory to Determine Cause |
|
|
333 | (1) |
|
Step 4 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
333 | (1) |
|
Step 5 Verify Full System Functionality and, If Applicable, Implement Preventive Measures |
|
|
333 | (1) |
|
Step 6 Document Findings, Actions, and Outcomes |
|
|
334 | (1) |
|
|
335 | (2) |
|
Chapter 18 Troubleshooting Motherboards, CPUs, RAM, and Power |
|
|
337 | (16) |
|
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power |
|
|
337 | (16) |
|
Troubleshooting Motherboards |
|
|
338 | (2) |
|
|
340 | (2) |
|
|
342 | (2) |
|
Troubleshooting Power Supply Issues |
|
|
344 | (3) |
|
|
347 | (1) |
|
|
348 | (5) |
|
Chapter 19 Troubleshooting Hard Drives and RAID Arrays |
|
|
353 | (12) |
|
5.3 Given a scenario, troubleshoot hard drives and RAID arrays |
|
|
353 | (12) |
|
Troubleshooting Hard Drives |
|
|
354 | (5) |
|
Troubleshooting RAID Arrays |
|
|
359 | (2) |
|
|
361 | (4) |
|
Chapter 20 Troubleshooting Video Issues and Mobile Devices |
|
|
365 | (16) |
|
5.4 Given a scenario, troubleshoot video, projector, and display issues |
|
|
366 | (6) |
|
|
366 | (4) |
|
|
370 | (2) |
|
5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures |
|
|
372 | (9) |
|
Mobile Device Display Troubleshooting |
|
|
372 | (1) |
|
Mobile Device Overheating |
|
|
373 | (2) |
|
More Mobile Device Troubleshooting |
|
|
375 | (1) |
|
Disassembling Processes for Proper Reassembly |
|
|
376 | (2) |
|
|
378 | (3) |
|
Chapter 21 Troubleshooting Printers |
|
|
381 | (12) |
|
5.6 Given a scenario, troubleshoot printers |
|
|
381 | (12) |
|
|
381 | (4) |
|
Print Jobs and the Print Spooler |
|
|
385 | (4) |
|
|
389 | (4) |
|
Chapter 22 Troubleshooting Wired and Wireless Network Problems |
|
|
393 | (6) |
|
5.7 Given a scenario, troubleshoot common wired and wireless network problems |
|
|
393 | (56) |
|
Troubleshooting Common Symptoms |
|
|
394 | (3) |
|
|
397 | (2) |
|
A+ Core 1. (220-1001) Practice Exam |
|
|
399 | (50) |
|
|
400 | (18) |
|
|
418 | (1) |
|
|
419 | (30) |
Part II: Introduction to Core 2. (220-1002) |
|
|
Core 2. (220-1002) Domain 1.0 Operating Systems |
|
|
|
Chapter 23 Operating System Types and Windows Versions |
|
|
449 | (22) |
|
1.1 Compare and contrast common operating system types and their purposes |
|
|
449 | (12) |
|
Workstation Operating Systems |
|
|
450 | (1) |
|
|
451 | (2) |
|
Smartphone and Tablet Operating Systems |
|
|
453 | (4) |
|
Vendor-Specific Limitations |
|
|
457 | (1) |
|
Compatibility Concerns Between Operating Systems |
|
|
458 | (1) |
|
|
459 | (2) |
|
1.2 Compare and contrast features of Microsoft Windows versions |
|
|
461 | (10) |
|
|
461 | (1) |
|
|
462 | (2) |
|
|
464 | (1) |
|
Windows User Interfaces and Components |
|
|
465 | (4) |
|
|
469 | (2) |
|
Chapter 24 Operating System Installation |
|
|
471 | (16) |
|
1.3 Summarize general OS installation considerations and upgrade methods |
|
|
471 | (16) |
|
|
472 | (1) |
|
|
473 | (3) |
|
|
476 | (2) |
|
File System Types and Formatting |
|
|
478 | (3) |
|
More OS Installation Considerations |
|
|
481 | (4) |
|
|
485 | (2) |
|
Chapter 25 Microsoft Command Line Tools |
|
|
487 | (24) |
|
1.4 Given a scenario, use appropriate Microsoft command line tools |
|
|
488 | (23) |
|
|
488 | (2) |
|
Navigating and Working with Directories and Files in the Command Prompt |
|
|
490 | (3) |
|
Partitioning and File System-based Commands |
|
|
493 | (1) |
|
|
494 | (2) |
|
|
496 | (8) |
|
|
504 | (3) |
|
|
507 | (4) |
|
Chapter 26 Microsoft Operating System Features and Tools, Part 1 |
|
|
511 | (18) |
|
1.5 Given a scenario, use Microsoft operating system features and tools |
|
|
511 | (18) |
|
|
511 | (12) |
|
System Configuration/MSConfig |
|
|
523 | (1) |
|
|
524 | (2) |
|
|
526 | (3) |
|
Chapter 27 Microsoft Operating System Features and Tools, Part 2 |
|
|
529 | (18) |
|
1.5 Given a scenario, use Microsoft operating system features and tools |
|
|
529 | (18) |
|
|
529 | (6) |
|
|
535 | (9) |
|
|
544 | (3) |
|
Chapter 28 Windows Control Panel Utilities |
|
|
547 | (20) |
|
1.6 Given a scenario, use Microsoft Windows Control Panel utilities |
|
|
547 | (20) |
|
|
548 | (2) |
|
|
550 | (4) |
|
|
554 | (1) |
|
|
554 | (2) |
|
Performance (Virtual Memory) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
|
559 | (1) |
|
|
560 | (1) |
|
|
561 | (1) |
|
|
561 | (2) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
564 | (3) |
|
Chapter 29 Windows Networking and Application Installation |
|
|
567 | (18) |
|
1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop |
|
|
568 | (12) |
|
Workgroup, HomeGroup, and Domain |
|
|
568 | (2) |
|
Sharing Resources and Making Network Connections |
|
|
570 | (4) |
|
Establishing Networking Connections |
|
|
574 | (2) |
|
|
576 | (1) |
|
Configuring an Alternate IP Address in Windows |
|
|
577 | (1) |
|
|
578 | (2) |
|
1.7 Summarize application installation and configuration concepts |
|
|
580 | (5) |
|
|
580 | (1) |
|
Method of Installation and Deployment |
|
|
581 | (1) |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
583 | (2) |
|
Chapter 30 Linux and macOS Tools |
|
|
585 | (18) |
|
1.9 Given a scenario, use features and tools of the macOS and Linux client/desktop operating systems |
|
|
585 | (18) |
|
|
585 | (5) |
|
|
590 | (6) |
|
|
596 | (7) |
|
Core 2. (220-1002) Domain 2.0 Security |
|
|
|
Chapter 31 Physical and Logical Security |
|
|
603 | (20) |
|
2.1 Summarize the importance of physical security measures |
|
|
604 | (4) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
605 | (1) |
|
Protecting Data Physically |
|
|
606 | (1) |
|
|
607 | (1) |
|
2.2 Explain logical security concepts |
|
|
608 | (15) |
|
|
608 | (1) |
|
Principle of Least Privilege |
|
|
609 | (1) |
|
|
610 | (5) |
|
|
615 | (1) |
|
|
616 | (1) |
|
Additional Security Considerations in Windows |
|
|
617 | (3) |
|
|
620 | (3) |
|
Chapter 32 Wireless Security, Malware, and Social Engineering |
|
|
623 | (22) |
|
2.3 Compare and contrast wireless security protocols and authentication methods |
|
|
624 | (4) |
|
Wireless and Encryption Protocols |
|
|
624 | (3) |
|
|
627 | (1) |
|
2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods |
|
|
628 | (9) |
|
|
628 | (1) |
|
Preventing Malicious Software |
|
|
629 | (6) |
|
|
635 | (2) |
|
2.5 Compare and contrast social engineering, threats, and vulnerabilities |
|
|
637 | (8) |
|
|
637 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
639 | (1) |
|
Additional Attacks and Security Vulnerabilities |
|
|
640 | (2) |
|
|
642 | (3) |
|
Chapter 33 Windows Security Settings and Best Practices |
|
|
645 | (24) |
|
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings |
|
|
645 | (14) |
|
|
646 | (2) |
|
|
648 | (4) |
|
|
652 | (4) |
|
|
656 | (3) |
|
2.7 Given a scenario, implement security best practices to secure a workstation |
|
|
659 | (10) |
|
|
659 | (1) |
|
|
660 | (2) |
|
|
662 | (2) |
|
Disabling AutoPlay/Autorun |
|
|
664 | (1) |
|
|
665 | (4) |
|
Chapter 34 Mobile Device Security |
|
|
669 | (14) |
|
2.8 Given a scenario, implement methods for securing mobile devices |
|
|
669 | (14) |
|
|
670 | (2) |
|
Authenticator Applications |
|
|
672 | (1) |
|
Theft and Loss of Mobile Devices |
|
|
672 | (1) |
|
Compromised and Damaged Devices |
|
|
673 | (4) |
|
|
677 | (3) |
|
|
680 | (3) |
|
Chapter 35 Data Destruction and SOHO Security |
|
|
683 | (20) |
|
2.9 Given a scenario, implement appropriate data destruction and disposal methods |
|
|
683 | (8) |
|
|
684 | (1) |
|
|
685 | (2) |
|
|
687 | (1) |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
689 | (2) |
|
2.10 Given a scenario, configure security on SOHO wireless and wired networks |
|
|
691 | (12) |
|
Changing Default Passwords |
|
|
691 | (1) |
|
Wireless-Specific Security Settings |
|
|
692 | (3) |
|
|
695 | (1) |
|
Assigning Static IP Addresses |
|
|
695 | (1) |
|
Disabling Physical Ports and Physical Security |
|
|
696 | (1) |
|
Content Filtering/Parental Controls |
|
|
697 | (1) |
|
A Final Word on SOHO Routers |
|
|
697 | (1) |
|
|
698 | (5) |
|
Core 2. (220-1002) Domain 3.0 Software Troubleshooting |
|
|
|
Chapter 36 Troubleshooting Microsoft Windows |
|
|
703 | (20) |
|
3.1 Given a scenario, troubleshoot Microsoft Windows OS problems |
|
|
704 | (19) |
|
|
704 | (6) |
|
|
710 | (2) |
|
Improper and Spontaneous Shutdowns |
|
|
712 | (1) |
|
|
713 | (2) |
|
|
715 | (1) |
|
Common Windows Symptoms and Solutions |
|
|
716 | (3) |
|
|
719 | (4) |
|
Chapter 37 Troubleshooting PC Security Issues and Malware Removal |
|
|
723 | (14) |
|
3.3 Given a scenario, use best practice procedures for malware removal |
|
|
724 | (1) |
|
3.2 Given a scenario, troubleshoot and resolve PC security issues |
|
|
724 | (13) |
|
The CompTIA A+ Seven-Step Malware Removal Procedure |
|
|
724 | (1) |
|
|
725 | (4) |
|
|
729 | (1) |
|
|
730 | (1) |
|
Preventing and Troubleshooting Spam |
|
|
730 | (1) |
|
|
731 | (1) |
|
More Symptoms of PC Security Issues and Potential Solutions |
|
|
732 | (2) |
|
|
734 | (3) |
|
Chapter 38 Troubleshooting Mobile Operating Systems |
|
|
737 | (18) |
|
3.4 Given a scenario, troubleshoot mobile OS and application issues |
|
|
737 | (1) |
|
3.5 Given a scenario, troubleshoot mobile OS and application security issues |
|
|
737 | (18) |
|
|
738 | (2) |
|
Bluetooth Troubleshooting |
|
|
740 | (1) |
|
Troubleshooting E-mail Connections |
|
|
741 | (2) |
|
Troubleshooting and Stopping Applications |
|
|
743 | (1) |
|
|
744 | (2) |
|
Additional Mobile Device Troubleshooting |
|
|
746 | (1) |
|
Mobile Device Application and OS Troubleshooting |
|
|
747 | (1) |
|
|
748 | (1) |
|
Troubleshooting Mobile Device Security Issues |
|
|
748 | (3) |
|
|
751 | (4) |
|
Core 2. (220-1002) Domain 4.0 Operational Procedures |
|
|
|
Chapter 39 Documentation, Change Management, and Disaster Recovery |
|
|
755 | (24) |
|
4.1 Compare and contrast best practices associated with types of documentation |
|
|
756 | (10) |
|
Network Topology Diagrams |
|
|
756 | (2) |
|
|
758 | (2) |
|
|
760 | (1) |
|
Compliance and Regulatory Policy |
|
|
760 | (1) |
|
|
761 | (1) |
|
|
762 | (1) |
|
|
763 | (1) |
|
|
764 | (2) |
|
4.2 Given a scenario, implement basic change management best practices |
|
|
766 | (3) |
|
4.3 Given a scenario, implement basic disaster prevention and recovery methods |
|
|
769 | (10) |
|
|
769 | (4) |
|
Cloud Storage vs. Local Storage Backups |
|
|
773 | (1) |
|
|
774 | (2) |
|
|
776 | (3) |
|
Chapter 40 Safety Procedures and Environmental Controls |
|
|
779 | (18) |
|
4.4 Explain common safety procedures |
|
|
779 | (9) |
|
ESD Prevention and Equipment Grounding |
|
|
780 | (2) |
|
|
782 | (1) |
|
|
783 | (1) |
|
|
784 | (2) |
|
|
786 | (2) |
|
4.5 Explain environmental impacts and appropriate controls |
|
|
788 | (9) |
|
Temperature, Humidity, and Air |
|
|
788 | (1) |
|
|
789 | (2) |
|
|
791 | (1) |
|
|
792 | (1) |
|
Uninterruptible Power Supplies |
|
|
792 | (2) |
|
|
794 | (3) |
|
Chapter 41 Incident Response, Communication, and Professionalism |
|
|
797 | (16) |
|
4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts |
|
|
797 | (11) |
|
|
798 | (3) |
|
|
801 | (2) |
|
|
803 | (3) |
|
|
806 | (2) |
|
4.7 Given a scenario, use proper communication techniques and professionalism |
|
|
808 | (5) |
|
Communication Techniques and Professionalism |
|
|
808 | (3) |
|
|
811 | (2) |
|
Chapter 42 Basic Scripting and Remote Access Technologies |
|
|
813 | (24) |
|
4.8 Identify the basics of scripting |
|
|
813 | (16) |
|
|
814 | (1) |
|
|
815 | (2) |
|
|
817 | (1) |
|
|
817 | (1) |
|
|
818 | (9) |
|
|
827 | (2) |
|
4.9 Given a scenario, use remote access technologies |
|
|
829 | (50) |
|
|
829 | (2) |
|
|
831 | (2) |
|
|
833 | (1) |
|
|
834 | (3) |
|
A+ Core 2. (220-1002) Practice Exam |
|
|
837 | (50) |
|
|
855 | (1) |
|
|
856 | (23) |
|
Chapter 43 Getting Ready for the Exams, and Farewell |
|
|
879 | (8) |
|
Getting Ready for the Exams |
|
|
879 | (3) |
|
Tips for Taking the Real Exams |
|
|
882 | (1) |
|
General Practices for Taking Exams |
|
|
882 | (2) |
|
Smart Methods for Difficult Questions |
|
|
884 | (1) |
|
|
885 | (1) |
|
Beyond the CompTIA A+ Certification |
|
|
885 | (2) |
Index |
|
887 | |