Errata

CompTIA A+ Training Kit (Exam 220-801 and Exam 220-802)

Errata for CompTIA A+ Training Kit (Exam 220-801 and Exam 220-802)

The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".

The following errata were submitted by our customers and approved as valid errors by the author or editor.

Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update

Version Location Description Submitted By Date submitted Date corrected
Printed, PDF, ePub
Page xl
Second heading, the second bullet

Your link to install the trial version of Windows 7 Enterprise in Windows Virtual PC leads to a landing page of Windows 8 Enterprise.

That would be minor, but Windows 8 Enterprise does not work in Windows Virtual PC, so says the Windows Engineering Team. You can find their explanation here: http://blogs.msdn.com/b/b8/archive/2011/09/16/running-windows-8-developer-preview-in-a-virtual-environment.aspx

And here is the relevant section of the above referenced doc:

"Non-functional:

Microsoft Virtual PC (all versions)
Microsoft Virtual Server (all versions)
Windows 7 XP Mode
VMWare Workstation 7.x or older"

Also perhaps noteworthy is that the buzz on the web is to use Hyper-V as an alternative to Windows Virtual PC, not VMWare or VirtualBox.

(Please advise about which Virtualization software I should switch to.)

Note from the Author or Editor:
Yes, Microsoft redirected the old link to Windows 8. However, it is still accessible here: http://technet.microsoft.com/en-US/evalcenter/dn407368.

On page xl in the Software Requirements section, please change the text for the Windows 7 (32-bit) bullet to this: Windows 7 (32-bit). You can download a 90-day trial copy of Windows 7 Enterprise here: http://technet.microsoft.com/en-US/evalcenter/dn407368. Select "32-bit" from the drop down box.

Linda Moran  Sep 22, 2013 
Printed, PDF, ePub
Page 45
Table 2-1

In the table 2-1, in page 45, Pico-ITX form factor size is given as 3.9 x 2.8 in inches in column 2 and 10mm x 7.2mm in column 3. The metric conversion is wrong, it should be 10cm x 7.2cm.

Note from the Author or Editor:
On page 45, table 2-1, please change the metric size of Pico-ITX from 10 mm x 7.2 mm to
10 cm x 7.2 cm.

Jacob Franklin  Aug 05, 2013 
Printed, PDF, ePub
Page 59
Item 10 at top third of page.

On page 59, item 10.

Please change "IEEE 1394 firewall connection" to

"IEEE 1394 Firewire connection"

Darril Gibson
 
Aug 08, 2013 
PDF
Page 67
Before the Security section

To cover the following exam objective:
1.0 PC Hardware
1.1 Configure and apply BIOS settings.
? Monitoring
o Bus speed

The following section is to be added on page 67 before the Security section:

Bus Speed
A bus is simply a circuit that connects one part of the motherboard to another. The more data a bus can handle at one time, the faster it allows information to travel. The speed of the bus, measured in megahertz (MHz), refers to how much data can move across the bus simultaneously.

Bus speed usually refers to the speed of the front side bus (FSB), which connects the CPU to the north bridge. FSB speeds can range from 66 MHz to over 800 MHz. Since the CPU reaches the memory controller though the north bridge, FSB speed can dramatically affect a computer's performance.

Here are some of the other busses found on a motherboard:
? The back side bus connects the CPU with the level 2 (L2) cache, also known as secondary or external cache. The processor determines the speed of the back side bus.
? The memory bus connects the north bridge to the memory.
? The IDE or ATA bus connects the south bridge to the disk drives.
? The AGP bus connects the video card to the memory and the CPU. The speed of the AGP bus is usually 66 MHz.
? The PCI bus connects PCI slots to the south bridge. On most systems, the speed of the PCI bus is 33 MHz. Also compatible with PCI is PCI Express, which is much faster than PCI but is still compatible with current software and operating systems. PCI Express is likely to replace both PCI and AGP busses.

The faster a computer's bus speed, the faster it will operate -- to a point. A fast bus speed cannot make up for a slow processor or chipset. You can monitor the bus speed through the mother board utilities. Additionally, many BIOS programs include tools that monitor the bus speed. For example, Figure 2-11 showed a BIOS page with the speed of the CPU and RAM based on the 133 MHz clock. Some BIOS programs also include the ability to modify the speeds and overclock the system.

O'Reilly Media
 
Jan 04, 2013 
Printed, PDF
Page 100
2nd Paragraph

Bulldozer is listed as using 22nm process, in fact it uses a 32nm process.

Note from the Author or Editor:
Please changed the following bullet in the AMD section on page100

Change
Bulldozer-22 nm process
to
Bulldozer-32 nm process

Anonymous  May 02, 2013 
PDF
Page 103
■ LGA 1155

"LGA 1,156 CPUs will work in LGA 1155, but the BIOS may need to be upgraded.

this is not correct

Note from the Author or Editor:
The following sentence on pg 103 should be deleted.

"LGA 1,156 CPUs will work in LGA 1155, but the BIOS may need to be upgraded."

Anonymous  Jan 28, 2013 
Printed, PDF, ePub
Page 132
middle of page "Quick Check" box

Quick Check answers are reversed

#1 should be 2#
#2 should be #1

Note from the Author or Editor:
Please swap the Quick Check Answers on page 132 as follows:
1. SATA 2 is 3 Gbps, and SATA 3 is6 Gbps
2. L-shaped connectors

Douglas Stolberg  Sep 16, 2013 
PDF
Page 209
United States

Last paragraph on page 209 reads:

HTMI resolutions are commonly identified as 1080 and 720.
--HDMI 1080 uses a resolution of 1920 ? 1080.
--HDMI 720 uses a resolution of 1280 ? 720.

"HTMI resolutions are commonly identified as 1080 and 720." should be changed to "HDMI resolutions are commonly identified as 1080 and 720." to reflect the proper acronym "HDMI" instead of "HTMI".

Note from the Author or Editor:
The feedback is accurate, HTMI should be changed to HDMI.

Christopher Evans  Mar 08, 2013 
PDF
Page 265
United States

The correct answer for question #4 reads 'A' instead of 'C'.

The description for each answer A-D is correctly written, but anybody who quickly checks their answers without reading the description could be mislead.

Note from the Author or Editor:
Please change "4. Correct Answer: A" to "4. Correct Answer: C"

Christopher Evans  Mar 10, 2013 
PDF
Page 292
After the System section

To cover the following exam objective:
3.0 Laptops
3.1 Install and configure laptop hardware and components.
? Hardware/device replacement
o CPU

The following section is to be added on page 292 after the System section:

How to Replace Your Laptop CPU

If you need to replace the CPU on a laptop, ensure that you refer to the manual to identify the steps required for the specific laptop. The following generic steps apply to most laptops:

1. Remove the plastic panels.
2. Detach the keyboard.
3. Lift the heat sink.
4. Remove and replace the CPU.
5. Clean off the thermal paste.
6. Add new thermal paste.
7. Replace the heat sink.
8. Re-assemble the laptop.
9. Power up the system and check out.

O'Reilly Media
 
Jan 04, 2013 
Printed
Page 383
Above Important note

Incorrect graphic added placed after step 4. The correct graphic shows the confirmation screen for UAC.

Darril Gibson
 
Apr 15, 2013 
Printed
Page 404, 405
pg 404 bottom (exam tip) pg 405 3rd paragraph

pg 404 bottom, (exam tip) states for dual boot the newer OS must be installed after the ealier OS, On page 405 3rd paragraph states for dual boot newer OS must be installed first

Note from the Author or Editor:
The word "first" should be replaced with "last" in the first sentence in the third paragraph on page 405. It should read as:

The second point to remember when creating a dual-boot system is to install the newer operating system last.

This matches the information in the exam tip on page 404.

Curtis Cropper  Feb 20, 2013 
PDF
Page 479
United States

I believe there is a word or words left out of the paragraph describing how to view known paths. The paragraph currently reads:

"You can view the known paths for your system by typing
at the prompt and pressing Enter. You?ll see something like this:"

I believe the word "path" is missing from the paragraph.

If I'm not mistaken, it should read:

"You can view the known paths for your system by typing path
at the prompt and pressing Enter. You?ll see something like this:"

Note from the Author or Editor:
Please add the word "path" back into the sentence in the third paragraph of the Default Paths topic. It should read like this with the word path bolded:

You can view the known paths for your system by typing path at the prompt and pressing Enter.

Christopher Evans  Mar 11, 2013 
PDF
Page 559
Before the Shares section

To cover the following exam objective:
4.0 Troubleshooting
4.3 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
? Tools
o FORMAT

The following section is to be added on page 559 before the Shares section:

Troubleshooting Hard Drives and RAID Arrays

The previous section covered many of the tools you can use with disks. In addition to knowing what the tools are, you should also know when to use them.

? Fdisk. If you need to install an older operating system that doesn?t include built-in tools to create partitions, you can use the fdisk program to create partitions. After the partitions are created, you need to format them. An undocumented feature with fdisk is the fdisk /mbr command that can be used to repair the master boot record on older operating systems. Newer operating systems include the Fixmbr command from the recovery console.
? Format. Use this on new disks and RAID arrays to prepare them with either the FAT32 or NTFS file system. If an existing disk is having problems, you can use chkdsk (or Check Disk) to locate bad sectors and fix errors on a disk. If there are many errors and you have a backup of the data, you can do a full format instead of using chkdsk. This will check the disk for bad sectors and mark all bad sectors so they won?t be used. While this step deletes all the data on the disk, you can restore the data from your backup.

O'Reilly Media
 
Jan 04, 2013 
PDF
Page 569

To cover the following exam objective:
4.0 Troubleshooting
4.3 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
? Tools
o FDISK

This topic is now covered by the text added to page 559, described in another errata item.

O'Reilly Media
 
Jan 04, 2013 
PDF
Page 636
United States

The following sentence:
"Primary Rate Interface (PRI). A PRI uses 23 64-Kbps data channels and one 64-Kbps data channel."

Should be changed to:
"Primary Rate Interface (PRI). A PRI uses 23 64-Kbps data channels and one 64-Kbps signal control channel."

Note from the Author or Editor:
Reader is correct. Data channel should be changed to signal control channel. The following sentence:

"Primary Rate Interface (PRI). A PRI uses 23 64-Kbps data channels and one 64-Kbps data channel."

Should be changed to:

"Primary Rate Interface (PRI). A PRI uses 23 64-Kbps data channels and one 64-Kbps signal control channel."

Christopher Evans  Mar 15, 2013 
PDF
Page 724
Top of Page

Sentence reads:
"Each hexadecimal number can be represented with four bits. For example, 8 is 1001 and F is 1111."

Should read:
"Each hexadecimal number can be represented with four bits. For example, 8 is 1000 and F is 1111."

The hexadecimal number 8 translates to binary as 1000, not 1001.

Note from the Author or Editor:
The reader is correct.
Please change:
"Each hexadecimal number can be represented with four bits. For example, 8 is 1001 and F is 1111."

to

"Each hexadecimal number can be represented with four bits. For example, 8 is 1000 and F is 1111."

Christopher Evans  Mar 17, 2013 
PDF
Page 793
Question 2

Question 2 reads that the correct answer is A, when in fact the correct answer is D. The descriptions of each answer are correct, but somebody quickly checking their answers without reading the descriptions could be mislead.

Change question 2 answer to D.

Note from the Author or Editor:
Reader is correct.

Please change
"2. Correct Answer: A"
to
"2. Correct Answer: D."

Christopher Evans  Mar 17, 2013 
PDF
Page 897
Before the "Recognizing Other Security Threats" section

To cover the following exam objectives:
4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices.
? Common symptoms
o Spam
o Renamed system files
o Files disappearing
o File permission changes
o Hijacked email

The following section is to be added on page 897 before the "Recognizing Other Security Threats" section:

Troubleshooting Common Security Issues

Once you?ve identified security issues or other problems, you need to take action to resolve them. The previous section, ?Removing Malware?, provided several steps you can take to remove known malware. However, there are times when you might need to take additional steps to overcome the problems.

? Spam. If a user is receiving an excessive amount of spam, you can show the user how to mark email as junk or spam so that it is automatically moved into the junk mail folder. Unsubscribing isn?t always effective. If the user tries to unsubscribe to email sent by an illegal spammer, the unsubscribe request confirms the email address to the spammer. The result is more spam for the user.

? Renamed system files. If malware renames system files, you need to either restore the original file, or rename it. You can also use the sfc /scannow command described in Chapter 14 to verify and repair all system files.

? Files disappearing. If files are disappearing, you need to first take steps to remove all malware on your system. Once you do, you can restore the files.

? File permission changes. Some malware attempts to protect itself by modifying permissions. For example, it might give itself full permission and block other access including the ability to delete it. One way you can resolve this is by booting into Safe Mode with the administrator account. You?ll then be able to restore the permissions from within Safe Mode.

? Hijacked email. A hijacked email account is one that is being used by an unauthorized person or by malware. In most cases, the attacker discovers the original password and starts using the email to send spam or malicious email to others. Users are typically informed by their friends that they are receiving spam from the hijacked account. The solution is to change the password of the account to something different and use a strong, complex password.

O'Reilly Media
 
Jan 04, 2013 
PDF
Page 897

To cover the following exam objectives:
4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices.
- Best practices for malware removal
o Remediate infected systems
? Update anti-virus software
? Scan and removal techniques (safe mode, pre-installation environment)

Amend item 4 (Remediate infected system) to read:

4. Remediate infected system. Update anti-virus software and remove malware from the system.
a. Update anti-virus software. Ensure that the antivirus software is up to date. If necessary, you might need to copy definition files from an uninfected system, but you
do not want to connect the infected system to the network or to the Internet.
b. Use scan and removal techniques. Next, use antivirus tools to scan and remove the malware. In some cases, the malware protects itself when the system is booted normally. If the antivirus software cannot remove the malware, boot into Safe Mode or a preinstallation environment as described earlier.

O'Reilly Media
 
Jan 04, 2013