CompTIA A+ Core 1 (220-1001) and A+ Core 2 (220-1002) Exam Objectives Mapped to Chapters |
|
ix | |
Chapter 1 Taking a Computer Apart and Putting It Bac: Together |
|
1 | (66) |
|
Exploring a Desktop Computer |
|
|
2 | (35) |
|
Step 1: Planning and Organizing Your Work and Gathering Your Tools |
|
|
2 | (3) |
|
|
5 | (16) |
|
Step 3: Removing Expansion Cards |
|
|
21 | (2) |
|
Step 4: Removing the Motherboard |
|
|
23 | (4) |
|
Step 5: Removing the Power Supply |
|
|
27 | (1) |
|
Step 6: Removing the Drives |
|
|
28 | (3) |
|
Steps to Put a Computer Back Together |
|
|
31 | (6) |
|
First Look at Laptop Components |
|
|
37 | (30) |
|
Special Keys, Buttons, and Input Devices on a Laptop |
|
|
40 | (2) |
|
Docking Stations and Port Replicators |
|
|
42 | (1) |
|
Special Considerations When Supporting Laptops |
|
|
43 | (4) |
|
Working Inside a Laptop Computer |
|
|
47 | (5) |
|
Exploring Laptop Internal Components |
|
|
52 | (4) |
|
Exploring Inside an All-in-One Computer |
|
|
56 | (2) |
|
|
58 | (9) |
Chapter 2 All About Motherboards |
|
67 | (50) |
|
Motherboard Types and Features |
|
|
68 | (16) |
|
|
68 | (2) |
|
Intel and AMD Chipsets and Processor Sockets |
|
|
70 | (4) |
|
Buses and Expansion Slots |
|
|
74 | (4) |
|
Onboard Ports and Connectors |
|
|
78 | (6) |
|
Using BIOS/UEFI Setup to Configure a Motherboard |
|
|
84 | (10) |
|
Accessing the BIOS/UEFI Setup Program |
|
|
85 | (1) |
|
Viewing and Monitoring Information |
|
|
85 | (2) |
|
|
87 | (3) |
|
Configuring Onboard Devices |
|
|
90 | (1) |
|
Configuring Security Features |
|
|
91 | (2) |
|
BIOS Support for Virtualization |
|
|
93 | (1) |
|
Exiting the BIOS/UEFI Setup Menus |
|
|
93 | (1) |
|
Updating Motherboard Drivers and BIOS/UEFI |
|
|
94 | (5) |
|
Installing or Updating Motherboard Drivers |
|
|
95 | (1) |
|
|
96 | (1) |
|
Using Jumpers to Clear BIOS/UEFI Settings |
|
|
97 | (1) |
|
Replacing the CMOS Battery |
|
|
98 | (1) |
|
Installing or Replacing a Motherboard |
|
|
99 | (18) |
|
How to Select a Desktop Motherboard |
|
|
99 | (1) |
|
How to Install or Replace a Motherboard |
|
|
100 | (3) |
|
Replacing a Laptop System Board |
|
|
103 | (14) |
Chapter 3 Supporting Processors and Upgrading Memory |
|
117 | (46) |
|
Types and Characteristics of Processors |
|
|
118 | (5) |
|
|
121 | (1) |
|
|
122 | (1) |
|
Selecting and Installing a Processor |
|
|
123 | (14) |
|
Selecting a Processor to Match System Needs |
|
|
123 | (2) |
|
Installing a Processor and Cooler Assembly |
|
|
125 | (9) |
|
Replacing the Processor in a Laptop |
|
|
134 | (3) |
|
|
137 | (8) |
|
DIMM and SO-DIMM Technologies |
|
|
139 | (6) |
|
|
145 | (18) |
|
How Much Memory Do I Need and How Much Is Currently Installed? |
|
|
146 | (1) |
|
What Type of Memory Is Already Installed? |
|
|
147 | (1) |
|
How Many and What Kind of Modules Can Fit on My Motherboard? |
|
|
148 | (2) |
|
How Do I Select and Purchase the Right Memory Modules? |
|
|
150 | (1) |
|
How Do I Install the New Modules? |
|
|
151 | (2) |
|
How to Upgrade Memory on a Laptop |
|
|
153 | (10) |
Chapter 4 Supporting the Power System and Troubleshooting Computers |
|
163 | (50) |
|
Cooling Methods and Devices |
|
|
164 | (3) |
|
Processor Coolers, Fans, and Heat Sinks |
|
|
164 | (1) |
|
Case Fans, Other Fans, and Heat Sinks |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (4) |
|
Types and Characteristics of Power Supplies |
|
|
168 | (1) |
|
How to Calculate Wattage Capacity |
|
|
169 | (2) |
|
Strategies to Troubleshoot Any Computer Problem |
|
|
171 | (14) |
|
Step 1: Interviewing the User and Backing Up Data |
|
|
174 | (2) |
|
Step 2: Examining the System and Making Your Best Guess |
|
|
176 | (3) |
|
Step 3: Testing Your Theory |
|
|
179 | (4) |
|
Step 4: Planning Your Solution and Then Fixing the Problem |
|
|
183 | (1) |
|
Step 5: Verifying the Fix and Taking Preventive Action |
|
|
184 | (1) |
|
Step 6: Documenting What Happened |
|
|
184 | (1) |
|
Troubleshooting the Electrical System |
|
|
185 | (10) |
|
Problems That Come and Go |
|
|
186 | (1) |
|
Power Problems with the Motherboard |
|
|
187 | (1) |
|
Problems with Overheating |
|
|
188 | (5) |
|
Problems with Laptop Power Systems |
|
|
193 | (2) |
|
Troubleshooting the Motherboard, Processor, and RAM |
|
|
195 | (18) |
|
|
200 | (13) |
Chapter 5 Supporting Hard Drives and Other Storage Devices |
|
213 | (52) |
|
Hard Drive Technologies and Interface Standards |
|
|
214 | (9) |
|
Technologies and Form Factors of Hard Drives |
|
|
214 | (3) |
|
Interface Standards Used by Hard Drives |
|
|
217 | (6) |
|
How to Select and Install Hard Drives |
|
|
223 | (18) |
|
|
224 | (1) |
|
Steps to Install a SATA Drive |
|
|
225 | (5) |
|
Installing a Drive in a Removable Bay |
|
|
230 | (1) |
|
Installing a Small Drive in a Wide Bay |
|
|
231 | (1) |
|
|
.2 | |
|
|
232 | (1) |
|
Installing a Hard Drive in a Laptop |
|
|
233 | (1) |
|
|
234 | (6) |
|
NAS Devices and External Storage |
|
|
240 | (1) |
|
Supporting Other Types of Storage Devices |
|
|
241 | (9) |
|
File Systems Used by Storage Devices |
|
|
241 | (1) |
|
Standards Used by Optical Discs and Drives |
|
|
242 | (3) |
|
Installing an Optical Drive |
|
|
245 | (1) |
|
Replacing an Optical Drive on a Laptop |
|
|
246 | (1) |
|
|
247 | (3) |
|
Troubleshooting Hard Drives |
|
|
250 | (15) |
|
|
251 | (1) |
|
Hard Drive Problems During the Boot |
|
|
252 | (13) |
Chapter 6 Supporting I/O Devices |
|
265 | (56) |
|
Basic Principles for Supporting Devices |
|
|
266 | (8) |
|
Wired and Wireless Connection Standards Used by Peripheral Devices |
|
|
266 | (1) |
|
Connectors and Ports Used by Peripheral Devices |
|
|
267 | (7) |
|
Identifying and Installing I/O Peripheral Devices |
|
|
274 | (9) |
|
|
276 | (2) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
Installing and Configuring Adapter Cards |
|
|
283 | (6) |
|
Sound Cards and Onboard Sound |
|
|
287 | (1) |
|
Replacing Expansion Cards in a Laptop |
|
|
287 | (2) |
|
Supporting the Video Subsystem |
|
|
289 | (6) |
|
Monitor Technologies and Features |
|
|
290 | (3) |
|
Changing Monitor Settings |
|
|
293 | (2) |
|
Troubleshooting I/O Devices |
|
|
295 | (13) |
|
|
296 | (1) |
|
|
296 | (1) |
|
Troubleshooting Video, Monitors, and Projectors |
|
|
297 | (8) |
|
|
305 | (3) |
|
Customizing Computer Systems |
|
|
308 | (13) |
|
Graphics or CAD/CAM Design Workstation |
|
|
309 | (1) |
|
Audio and Video Editing Workstation |
|
|
310 | (2) |
|
|
312 | (1) |
|
NAS (Network Attached Storage) Device |
|
|
312 | (9) |
Chapter 7 Setting Up a Local Network |
|
321 | (58) |
|
Types of Networks and Network Connections |
|
|
322 | (7) |
|
Internet Connection Technologies |
|
|
322 | (7) |
|
Connecting a Computer to a Local Network |
|
|
329 | (15) |
|
Connecting to an Ethernet Wired or Wi-Fi Wireless Local Network |
|
|
329 | (3) |
|
Creating a VPN Connection |
|
|
332 | (3) |
|
Creating a Dial-Up Connection |
|
|
335 | (2) |
|
Dynamic and Static IP Configurations |
|
|
337 | (3) |
|
Alternate IP Address Configuration |
|
|
340 | (1) |
|
Managing Network Adapters |
|
|
340 | (4) |
|
Setting Up a Multifunction Router for a SOHO Network |
|
|
344 | (20) |
|
Functions of a SOHO Router |
|
|
345 | (1) |
|
Installing and Configuring a Router on the Local Network |
|
|
346 | (8) |
|
Limiting Internet Traffic on Your Network |
|
|
354 | (4) |
|
Setting Up a Wireless Network |
|
|
358 | (6) |
|
Troubleshooting Network Connections |
|
|
364 | (15) |
|
ping [ -a] [ -t] [ TargetName] |
|
|
364 | (1) |
|
ipconfig [ /all] [ /release] [ /renew] [ /displaydns] [ /flushdns] |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
netstat [ -a] [ -b] [ -o] |
|
|
369 | (10) |
Chapter 8 Network Infrastructure and Troubleshooting |
|
379 | (60) |
|
Understanding TCP/IP and Windows Networking |
|
|
380 | (17) |
|
Layers of Network Communication |
|
|
380 | (5) |
|
|
v4 | |
|
|
385 | (4) |
|
|
v6 | |
|
|
389 | (2) |
|
Viewing IP Address Settings |
|
|
391 | (1) |
|
Character-Based Names Identify Computers and Networks |
|
|
392 | (1) |
|
TCP and UDP Delivery Methods |
|
|
393 | (1) |
|
TCP/IP Protocols Used by Applications |
|
|
394 | (3) |
|
Local Network Infrastructure |
|
|
397 | (11) |
|
|
397 | (3) |
|
Wireless Access Points and Bridges |
|
|
400 | (1) |
|
|
401 | (1) |
|
Unified Threat Management (UTM) Appliance |
|
|
402 | (2) |
|
Ethernet Cables and Connectors |
|
|
404 | (2) |
|
Powerline Networking or Ethernet Over Power (EoP) |
|
|
406 | (1) |
|
Power Over Ethernet (PoE) |
|
|
407 | (1) |
|
Setting Up and Troubleshooting Network Wiring |
|
|
408 | (12) |
|
Designing a Wired Network |
|
|
408 | (1) |
|
Tools Used by Network Technicians |
|
|
409 | (5) |
|
How Twisted-Pair Cables and Connectors Are Wired |
|
|
414 | (6) |
|
Troubleshooting Network Connections |
|
|
420 | (19) |
|
Problems with No Connectivity or Intermittent Connectivity |
|
|
423 | (2) |
|
Problems with Internet Connectivity |
|
|
425 | (1) |
|
Using TCP/IP Utilities to Solve Connectivity Problems |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
428 | (11) |
Chapter 9 Supporting Mobile Devices |
|
439 | (66) |
|
|
440 | (2) |
|
Mobile Device Operating Systems |
|
|
442 | (11) |
|
Android Managed by Google |
|
|
443 | (3) |
|
|
446 | (3) |
|
Windows Mobile by Microsoft |
|
|
449 | (1) |
|
|
450 | (3) |
|
Comparing Open Source and Closed Source Operating Systems |
|
|
453 | (1) |
|
Configuring and Syncing a Mobile Device |
|
|
453 | (16) |
|
Mobile Device LAN/WAN Connections |
|
|
454 | (3) |
|
Mobile Device Accessories and Their PAN Connections |
|
|
457 | (3) |
|
Configuring Mobile Device Email |
|
|
460 | (1) |
|
Syncing and Backing Up Mobile Devices |
|
|
461 | (8) |
|
|
469 | (7) |
|
|
470 | (1) |
|
|
471 | (2) |
|
Mobile Security in Corporate Environments |
|
|
473 | (1) |
|
Common Mobile Device Malware Symptoms |
|
|
474 | (1) |
|
Mobile Device Malware Removal |
|
|
474 | (2) |
|
The Internet of Things (IoT) |
|
|
476 | (7) |
|
IoT Wireless Technologies |
|
|
476 | (1) |
|
|
477 | (6) |
|
Troubleshooting Mobile Devices |
|
|
483 | (22) |
|
Troubleshooting Techniques |
|
|
484 | (3) |
|
Common Problems and Solutions |
|
|
487 | (18) |
Chapter 10 Virtualization, Cloud Computing, and Printers |
|
505 | (62) |
|
Client-Side Virtualization |
|
|
506 | (6) |
|
Type 1 And Type 2 Hypervisors |
|
|
506 | (1) |
|
Setting Up Client-Side Virtualization |
|
|
507 | (4) |
|
Securing a Virtual Machine |
|
|
511 | (1) |
|
|
512 | (5) |
|
Deployment Models for Cloud Computing |
|
|
512 | (1) |
|
Elements of Cloud Computing |
|
|
512 | (1) |
|
Cloud Computing Service Models |
|
|
513 | (1) |
|
Application Virtualization |
|
|
514 | (1) |
|
Setting Up Client Computers to Use Cloud Resources |
|
|
515 | (2) |
|
Printer Types and Features |
|
|
517 | (8) |
|
|
518 | (2) |
|
|
520 | (2) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
Using Windows to Install, Share, and Manage Printers |
|
|
525 | (13) |
|
|
525 | (1) |
|
Wired or Wireless Printer Connections |
|
|
526 | (1) |
|
Installing a Local or Network Printer |
|
|
527 | (4) |
|
Sharing a Printer on a Network |
|
|
531 | (4) |
|
|
535 | (1) |
|
|
536 | (1) |
|
Configuring Printer Features and Add-on Devices |
|
|
537 | (1) |
|
|
538 | (7) |
|
Online Support for Printers |
|
|
538 | (1) |
|
|
539 | (1) |
|
|
539 | (1) |
|
|
540 | (5) |
|
|
545 | (22) |
|
|
545 | (6) |
|
|
551 | (16) |
Chapter 11 Windows Versions and Customer Service |
|
567 | (60) |
|
|
568 | (14) |
|
|
569 | (12) |
|
Choosing a Windows Edition |
|
|
581 | (1) |
|
Windows Tools for Users and Technicians |
|
|
582 | (18) |
|
Windows 10/8 File Explorer and Windows 7 Windows Explorer |
|
|
582 | (7) |
|
|
589 | (1) |
|
Windows 10 File Explorer Options or Windows 8/7 Folder Options |
|
|
590 | (2) |
|
|
592 | (2) |
|
|
594 | (1) |
|
System Information Window |
|
|
595 | (1) |
|
|
596 | (4) |
|
How Windows Controls Access to Network Resources |
|
|
600 | (6) |
|
Windows Workgroup and Homegroup |
|
|
600 | (1) |
|
|
601 | (3) |
|
|
604 | (1) |
|
Public and Private Networks |
|
|
605 | (1) |
|
What Customers Want: Beyond Technical Know-How |
|
|
606 | (21) |
|
Becoming a Competent and Helpful Support Technician |
|
|
607 | (3) |
|
Planning for Good Service |
|
|
610 | (17) |
Chapter 12 Installing Windows |
|
627 | (64) |
|
How to Plan a Windows Installation |
|
|
628 | (14) |
|
Choosing the Edition, License, and Version of Windows |
|
|
628 | (1) |
|
Verifying That Your System Qualifies for Windows |
|
|
629 | (6) |
|
Choosing the Type of Installation: In-Place Upgrade, Clean Install, or Dual Boot |
|
|
635 | (1) |
|
Understanding the Choices You'll Make During the Installation |
|
|
636 | (1) |
|
Final Checklist Before Beginning the Installation |
|
|
637 | (5) |
|
Installing Windows 10, Windows 8.1, and Windows 7 |
|
|
642 | (14) |
|
Windows 10 In-Place Upgrade |
|
|
642 | (3) |
|
|
645 | (6) |
|
|
651 | (2) |
|
Solving Problems with Installations |
|
|
653 | (3) |
|
What to Do After a Windows Installation |
|
|
656 | (24) |
|
|
657 | (1) |
|
|
657 | (3) |
|
Installing Windows Updates |
|
|
660 | (4) |
|
|
664 | (3) |
|
|
667 | (5) |
|
|
672 | (2) |
|
Turning Windows Features On or Off |
|
|
674 | (1) |
|
Installations in a Virtual Machine |
|
|
675 | (5) |
|
Special Concerns When Working in a Large Enterprise |
|
|
680 | (11) |
|
Methods to Deploy a Standard Image |
|
|
681 | (2) |
|
|
683 | (8) |
Chapter 13 Maintaining Windows |
|
691 | (66) |
|
Scheduling Preventive Maintenance |
|
|
692 | (1) |
|
Verifying Critical Windows Settings |
|
|
692 | (1) |
|
|
693 | (1) |
|
|
693 | (10) |
|
Planning for Disaster Recovery |
|
|
694 | (2) |
|
Backing Up User Data and the System Image |
|
|
696 | (6) |
|
Backing Up Windows System Files with System Protection |
|
|
702 | (1) |
|
Managing Files, Folders, and Storage Devices |
|
|
703 | (16) |
|
How Partitions and File Systems Work |
|
|
703 | (3) |
|
Using Disk Management to Manage Hard Drives |
|
|
706 | (11) |
|
Improving Hard Drive Performance |
|
|
717 | (2) |
|
Using a Command-Line Interface (CLI) |
|
|
719 | (16) |
|
Commands to Manage Files and Folders |
|
|
721 | (4) |
|
Commands to Manage Hard Drives |
|
|
725 | (2) |
|
Windows 10 PowerShell and Ubuntu Bash Interfaces |
|
|
727 | (8) |
|
|
735 | (22) |
|
Remote Desktop Connection (RDC) |
|
|
735 | (6) |
|
|
741 | (4) |
|
Third-Party Remote Access |
|
|
745 | (12) |
Chapter 14 Troubleshooting Windows After Startup |
|
757 | (68) |
|
Concepts and Windows Tools for Solving Problems with Windows, Applications, and Hardware |
|
|
758 | (8) |
|
What Are the Shell and the Kernel? |
|
|
758 | (1) |
|
|
759 | (1) |
|
How Windows Manages Applications |
|
|
760 | (1) |
|
Survey of Windows Tools and Techniques |
|
|
761 | (5) |
|
Best Practices to Troubleshoot Windows-Related Problems |
|
|
766 | (19) |
|
Step 1: Interview the User and Back Up Data |
|
|
766 | (1) |
|
Step 2: Error Messages, the Web, Coworkers, and Logs Might Help |
|
|
767 | (2) |
|
Step 3: Consider That the Data or the Application Might Be Corrupted |
|
|
769 | (1) |
|
Step 4: Consider Outside Interference |
|
|
769 | (13) |
|
Step 5: Consider That Windows Might Be the Problem |
|
|
782 | (3) |
|
Slow Startup and Slow Performance |
|
|
785 | (5) |
|
|
785 | (1) |
|
Step 2: Back Up User Data |
|
|
785 | (1) |
|
Step 3: Perform Routine Maintenance |
|
|
785 | (1) |
|
Step 4: Investigate and Eliminate Startup Programs |
|
|
786 | (1) |
|
Step 5: Check for Unwanted Scheduled Tasks |
|
|
787 | (2) |
|
Step 6: Check for Low System Resources |
|
|
789 | (1) |
|
Application Errors and Crashes |
|
|
790 | (8) |
|
|
791 | (1) |
|
Slow-Performing Application |
|
|
791 | (1) |
|
|
792 | (1) |
|
|
793 | (1) |
|
Missing DLL or Component Not Registered |
|
|
794 | (1) |
|
Application Has Never Worked |
|
|
795 | (3) |
|
An Application Fails to Uninstall |
|
|
798 | (9) |
|
|
799 | (3) |
|
Manually Removing Software |
|
|
802 | (5) |
|
Troubleshooting Hardware Problems in Windows |
|
|
807 | (18) |
|
Display Settings and Graphics Software |
|
|
807 | (4) |
|
|
811 | (2) |
|
|
813 | (12) |
Chapter 15 Troubleshooting Windows Startup |
|
825 | (54) |
|
Understanding the Boot Process |
|
|
826 | (9) |
|
|
826 | (1) |
|
Steps to Boot the Computer and Start Windows |
|
|
827 | (8) |
|
What to Do Before a Problem Occurs |
|
|
835 | (5) |
|
Windows 10/7 System Repair Disc |
|
|
837 | (1) |
|
Windows 10/8 Recovery Drive |
|
|
837 | (2) |
|
Windows 10 Media Creation Tool |
|
|
839 | (1) |
|
Tools for Least Invasive Solutions |
|
|
840 | (11) |
|
|
845 | (1) |
|
Changing Startup Settings |
|
|
845 | (4) |
|
|
849 | (1) |
|
The Command Prompt Window in Windows RE |
|
|
850 | (1) |
|
Options to Reinstall Windows |
|
|
851 | (11) |
|
Windows 10 Previous Version |
|
|
852 | (1) |
|
Windows 10 Repair Upgrade |
|
|
853 | (2) |
|
|
855 | (1) |
|
|
855 | (2) |
|
Applying a Windows 10/7 System Image |
|
|
857 | (3) |
|
OEM Factory Recovery Partition |
|
|
860 | (2) |
|
Installing Windows Over the Network |
|
|
862 | (1) |
|
Troubleshooting Specific Windows Startup Problems |
|
|
862 | (17) |
|
Important Data on the Hard Drive |
|
|
862 | (1) |
|
Error Messages and Problems |
|
|
863 | (16) |
Chapter 16 Securing and Sharing Windows Resources |
|
879 | (66) |
|
Securing a Windows Personal Computer |
|
|
880 | (17) |
|
Using Windows to Authenticate Users |
|
|
880 | (7) |
|
Using BIOS/UEFI Passwords to Authenticate Users |
|
|
887 | (1) |
|
Securing Internet Explorer |
|
|
887 | (5) |
|
File and Folder Encryption |
|
|
892 | (1) |
|
|
893 | (1) |
|
Windows Firewall Settings |
|
|
894 | (3) |
|
Controlling Access to Folders and Files |
|
|
897 | (25) |
|
Classifying User Accounts and User Groups |
|
|
898 | (3) |
|
Methods to Assign Permissions to Folders and Files |
|
|
901 | (2) |
|
How to Share Folders and Files |
|
|
903 | (12) |
|
How to Map a Network Drive or Network Printer |
|
|
915 | (3) |
|
Sync Center and Offline Files |
|
|
918 | (2) |
|
Hidden Network Resources and Administrative Shares |
|
|
920 | (2) |
|
Using Active Directory Domain Services |
|
|
922 | (23) |
|
Creating and Managing User Accounts in AD |
|
|
923 | (8) |
|
|
931 | (14) |
Chapter 17 Security Strategies and Documentation |
|
945 | (42) |
|
Protecting Network Resources |
|
|
946 | (10) |
|
Physical Security and Access Controls |
|
|
946 | (2) |
|
Logical Security and Access Controls |
|
|
948 | (2) |
|
|
950 | (4) |
|
|
954 | (2) |
|
Dealing with Malicious Software on Personal Computers |
|
|
956 | (15) |
|
|
956 | (3) |
|
|
959 | (1) |
|
Step 1: Identifying and Researching Malware Symptoms |
|
|
959 | (3) |
|
Step 2: Quarantining an Infected System |
|
|
962 | (1) |
|
Step 3: Disabling System Restore |
|
|
963 | (1) |
|
Step 4: Remediating the Infected System |
|
|
963 | (7) |
|
Step 5: Protecting the System with Scheduled Scans and Updates |
|
|
970 | (1) |
|
Step 6: Enabling System Protection and Creating a Restore Point |
|
|
971 | (1) |
|
Step 7: Educating the End User |
|
|
971 | (1) |
|
Best Practices for Documentation and Security Policies |
|
|
971 | (16) |
|
|
971 | (2) |
|
|
973 | (2) |
|
Regulated Data, Licensing, and Security Policies |
|
|
975 | (3) |
|
Data Destruction and Disposal |
|
|
978 | (9) |
Chapter 18 macOS, Linux, and Scripting |
|
987 | (62) |
|
macOS for Macintosh Computers |
|
|
988 | (25) |
|
Getting to Know the macOS Desktop |
|
|
988 | (13) |
|
Maintaining and Supporting macOS |
|
|
1001 | (8) |
|
Troubleshooting macOS Startup |
|
|
1009 | (4) |
|
|
1013 | (22) |
|
Linux Installs, Updates, and Backups |
|
|
1016 | (2) |
|
Installing and Exploring Ubuntu Server |
|
|
1018 | (16) |
|
Telnet and SSH for Remote Access |
|
|
1034 | (1) |
|
Comparing Windows, macOS, and Linux |
|
|
1034 | (1) |
|
Scripting Software and Techniques |
|
|
1035 | (14) |
|
|
1035 | (1) |
|
|
1036 | (13) |
Appendix A: Safety Procedures and Environmental Concerns |
|
1049 | (18) |
Appendix B: Entry Points for Startup Processes |
|
1067 | (4) |
Appendix C: CompTIA Acronyms |
|
1071 | (10) |
Glossary |
|
1081 | (54) |
Index |
|
1135 | |