Mike Meyers' CompTIA A+ Core 2 Certification Passport (Exam 220-1102)

Book description

Accelerated coverage of every topic on the 2022 version of the A+ Core 2 exam from CompTIA

Get on the fast track to becoming CompTIA A+ certified with this affordable, portable study tool. Inside, certification training gurus Mike Meyers and Ron Gilster guide you on your exam preparation path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA A+ 220-1102 exam, this certification passport is your ticket to success on exam day.

TECHNICAL BULLETS:

    Inside:
  • Reviews and descriptions of the major features of Windows 10/11, macOS, and Linux operating systems
  • Information and tips on operating systems, networking, and feature configurations
  • Enhanced coverage of mobile device setup and troubleshooting
  • Enhanced coverage of computer security
  • Practice questions and content review after each objective prepare you for exam mastery

Covers all exam topics, including how to:

  • Configure system and application software to work with CPUs, RAM, BIOS, and other personal computer components
  • Install, configure, and maintain operating systems and apps
  • Set up, upgrade, and maintain Windows 10/11
  • Troubleshoot and fix software problems
  • Configure and secure mobile device software
  • Protect your personal computer and your network
  • Properly and safely diagnose, resolve, and document common software issues
  • Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in working in home, SOHO, and corporate environments

Online content includes:

  • Practice exam for 220-1102
  • Free sample of video training from Mike Meyers
  • Free sample of interactive labs from Mike Meyers
  • Mike Meyers’ favorite PC tools and utilities

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Contents
  6. Acknowledgments
  7. Introduction
  8. 1.0 Operating Systems
    1. Objective 1.1 Identify basic features of Microsoft Windows editions
      1. 64-Bit vs. 32-Bit
      2. Windows 10 Editions
        1. Home Edition
        2. Work Edition
        3. Windows 10 Pro for Workstations and Enterprise Editions
      3. Domains and Workgroups
        1. Joining a Computer to a Domain
      4. Desktop Styles/User Interface
        1. Desktop Views
      5. Remote Desktop Protocol
      6. RAM Support Limitations
      7. BitLocker
        1. BitLocker Requirements
        2. Enabling BitLocker
      8. The Group Policy Editor
        1. Accessing the Group Policy Editor
      9. Upgrade Paths and In-Place Upgrades
      10. REVIEW
        1. 1.1 QUESTIONS
        2. 1.1 ANSWERS
    2. Objective 1.2 Given a scenario, use the appropriate Microsoft command-line tool
      1. Windows Navigation Commands
      2. Drive Navigation in Windows
      3. Command-Line Tools
      4. REVIEW
        1. 1.2 QUESTIONS
        2. 1.2 ANSWERS
    3. Objective 1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS)
      1. Task Manager
        1. General Display
        2. Task Manager Tabs
      2. Microsoft Management Console Snap-In
        1. Opening the MMC
        2. Adding/Removing a Snap-in with the MMC
        3. Snap-ins on the Core 2 Exam
      3. Additional Windows Tools
        1. System Information
        2. Resource Monitor
        3. System Configuration
        4. Disk Cleanup
        5. Disk Defragment
        6. Registry Editor
      4. REVIEW
        1. 1.3 QUESTIONS
        2. 1.3 ANSWERS
    4. Objective 1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility
      1. Internet Options
      2. Devices and Printers
      3. Programs and Features
      4. Network and Sharing Center
      5. System
        1. Settings Options
      6. Windows Defender Firewall
      7. Mail (Microsoft Outlook)
      8. Sound
      9. User Accounts
      10. Device Manager
      11. Indexing Options
      12. Administrative Tools
      13. File Explorer Options
        1. Show Hidden Files
        2. Hide Extensions
        3. General Options
        4. View Options
      14. Power Options
        1. Sleep (Suspend), Standby, and Hibernate
        2. Power Plans
        3. Fast Startup
        4. USB Selective Suspend
      15. Ease of Access
      16. REVIEW
        1. 1.4 QUESTIONS
        2. 1.4 ANSWERS
    5. Objective 1.5 Given a scenario, use the appropriate Windows settings
      1. Time & Language
      2. Update & Security
        1. Windows Update
        2. Delivery Optimization
        3. Windows Security
      3. Personalization
      4. Apps
      5. Privacy
        1. Windows Permissions
        2. Application Permissions
      6. System
      7. Devices
      8. Network & Internet
      9. Gaming
      10. Accounts
      11. REVIEW
        1. 1.5 QUESTIONS
        2. 1.5 ANSWERS
    6. Objective 1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop
      1. Workgroup vs. Domain Setup
        1. Shared Resources
        2. Printers
        3. File Servers
        4. Mapped Devices
      2. Local OS Firewall Settings
        1. Application Restrictions and Exceptions
      3. Client Network Configuration
        1. Internet Protocol Addressing Schemes
        2. Domain Name System
        3. Static vs. Dynamic
      4. Establish Network Connections
        1. VPN
        2. Wireless
        3. Wired
        4. Wireless Wide Area Network
      5. Proxy Settings
      6. Public Network vs. Private Network
      7. File Explorer Navigation
        1. File Explorer Navigation
        2. File Explorer—Network Paths
      8. Metered Connections and Limitations
      9. REVIEW
        1. 1.6 QUESTIONS
        2. 1.6 ANSWERS
    7. Objective 1.7 Given a scenario, apply application installation and configuration concepts
      1. System Requirements for Applications
        1. 32-bit vs. 64-bit Dependent Application Requirements
        2. Dedicated vs. Integrated Graphics Card
        3. Video Random Access Memory Requirements
        4. RAM Requirements
        5. Central Processing Unit Requirements
        6. External Hardware Tokens
        7. Storage Requirements
      2. OS Requirements for Applications
        1. Application-to-OS Compatibility
        2. 32-bit vs. 64-bit OS
      3. Distribution Methods
      4. Other Considerations for New Applications
      5. REVIEW
        1. 1.7 QUESTIONS
        2. 1.7 ANSWERS
    8. Objective 1.8 Explain common OS types and their purposes
      1. Workstation Operating Systems
        1. Windows
        2. Linux
        3. macOS
        4. Chrome OS
      2. Smartphone/Tablet Operating Systems
        1. Android
        2. iPadOS
        3. iOS
      3. Various File System Types
        1. Windows File Systems
        2. Linux File Systems
        3. Apple File Systems
      4. Vendor Lifecycle Limitations
      5. Compatibility Concerns Between OSs
      6. REVIEW
        1. 1.8 QUESTIONS
        2. 1.8 ANSWERS
    9. Objective 1.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment
      1. Boot Methods
        1. External Drive/Flash Drive (USB)
        2. Optical Disc (CD-ROM, DVD)
        3. Network Boot (PXE)
        4. Solid-State/Flash Drives
        5. Internet-Based
        6. External/Hot-Swappable Drive
        7. Internal Hard Drive (Partition)
      2. Types of Installation
        1. Upgrade
        2. Recovery Partition
        3. Clean Install
        4. Image Deployment
        5. Repair Installation
        6. Remote Network Installation
        7. Third-Party Drivers
      3. Partitioning
        1. Master Boot Record
        2. Globally Unique Identifier Partition Table
        3. Drive Format
        4. Upgrade Considerations
        5. Feature Updates—Product Lifecycle
        6. REVIEW
          1. 1.9 QUESTIONS
          2. 1.9 ANSWERS
    10. Objective 1.10 Identify common features and tools of the macOS/desktop OS
      1. macOS Applications
        1. File Types
        2. App Store
        3. Installation and Uninstallation of Applications
      2. Apple ID and Corporate Restrictions
      3. Best Practices
        1. Backups
        2. Antivirus
        3. Updates and Patches
      4. System Preferences
        1. Displays
        2. Network
        3. Printers & Scanners
        4. Security & Privacy
      5. Features
      6. REVIEW
        1. 1.10 QUESTIONS
        2. 1.10 ANSWERS
    11. Objective 1.11 Identify common features and tools of the Linux client/desktop OS
      1. Common Linux Commands
      2. Best Practices
        1. Backups
        2. Antivirus
        3. Updates/Patches
      3. Tools
        1. Shell/Terminal
        2. Samba
      4. REVIEW
        1. 1.11 QUESTIONS
        2. 1.11 ANSWERS
  9. 2.0 Security
    1. Objective 2.1 Summarize various security measures and their purposes
      1. Physical Security
        1. Access Control Vestibule
        2. Badge Reader
        3. Video Surveillance
        4. Alarm Systems
        5. Motion Sensors
        6. Locks and Applications
        7. Guards
        8. Bollards
        9. Fences
      2. Physical Security for Staff
        1. Smart Cards and Key Fobs
        2. Hard Tokens
        3. Keys
        4. Biometrics
        5. Lighting
        6. Magnetometers
      3. Logical Security
        1. Principle of Least Privilege
        2. Access Control Lists
        3. Multifactor Authentication
        4. E-mail Security
        5. Soft Tokens
        6. Short Message Service
        7. Voice Calls
        8. Authenticator Application
      4. Mobile Device Management
      5. Active Directory
        1. Login Script
        2. Domain
        3. Group Policy/Updates
        4. Organizational Units
        5. Home Folder
        6. Folder Redirection
        7. Security Groups
      6. REVIEW
        1. 2.1 QUESTIONS
        2. 2.1 ANSWERS
    2. Objective 2.2 Compare and contrast wireless security protocols and authentication methods
      1. Protocols and Encryption
        1. WPA2
        2. WPA3
        3. TKIP
        4. AES
      2. Authentication
        1. RADIUS
        2. TACACS+
        3. Kerberos
        4. Multifactor Authentication
      3. REVIEW
        1. 2.2 QUESTIONS
        2. 2.2 ANSWERS
    3. Objective 2.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods
      1. Malware
        1. Trojan
        2. Rootkit
        3. Virus
        4. Spyware
        5. Ransomware
        6. Keylogger
        7. Boot Sector Virus
        8. Cryptominers
      2. Tools and Methods
        1. Recovery Mode
        2. Antivirus and Anti-Malware
        3. Software Firewalls
        4. Anti-Phishing Training
        5. User Education Regarding Common Threats
        6. OS Reinstallation
      3. REVIEW
        1. 2.3 QUESTIONS
        2. 2.3 ANSWERS
    4. Objective 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
      1. Social Engineering
        1. Phishing
        2. Vishing
        3. Shoulder Surfing
        4. Whaling
        5. Tailgating
        6. Impersonation
        7. Dumpster Diving
        8. Evil Twin
      2. Threats
        1. DoS and DDoS
        2. Zero-Day Attack
        3. Spoofing
        4. On-Path Attack
        5. Brute-Force Attack
        6. Dictionary Attack
        7. Insider Threat
        8. SQL Injection
        9. Cross-Site Scripting
      3. Vulnerabilities
        1. Noncompliant Systems
        2. Unpatched Systems
        3. Unprotected Systems
        4. EOL OSs
        5. BYOD
      4. REVIEW
        1. 2.4 QUESTIONS
        2. 2.4 ANSWERS
    5. Objective 2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS
      1. Defender Antivirus
      2. Firewalls
        1. Activate/Deactivate
        2. Port Security
        3. User Accounts
        4. Groups
      3. OS Login Options
      4. Single Sign-On
      5. NTFS vs. Share Permissions
        1. File and Folder Attributes
        2. Inheritance
        3. Run as Administrator vs. Standard User
        4. User Account Control
        5. BitLocker and BitLocker To Go
        6. EFS
        7. REVIEW
          1. 2.5 QUESTIONS
          2. 2.5 ANSWERS
    6. Objective 2.6 Given a scenario, configure a workstation to meet best practices for security
      1. Data-at-Rest Encryption
      2. Password Best Practices
        1. Set Strong Passwords
        2. BIOS/UEFI Passwords
      3. End-User Best Practices
      4. Account Management
        1. Restricting User Permissions
        2. Logon Time Restrictions
        3. Disabling Guest Account
        4. Failed Attempts Lockout
        5. Timeout/Screen Lock
      5. Change Default Admin User Account/Password
      6. Disable AutoRun and AutoPlay
      7. REVIEW
        1. 2.6 QUESTIONS
        2. 2.6 ANSWERS
    7. Objective 2.7 Explain common methods for securing mobile and embedded devices
      1. Screen Locks
        1. Facial Recognition
        2. PIN Codes
        3. Fingerprints
        4. Pattern Locks
        5. Swipe Lock
      2. Remote Wipe
      3. Locator Applications
      4. OS Updates
      5. Device Encryption
      6. Remote Backup Applications
      7. Failed Login Attempts Restrictions
      8. Antivirus/Anti-Malware
      9. Firewalls
      10. Policies and Procedures
        1. BYOD vs. Corporate-Owned
        2. Profile Security Requirements
      11. Internet of Things
      12. REVIEW
        1. 2.7 QUESTIONS
        2. 2.7 ANSWERS
    8. Objective 2.8 Given a scenario, use common data destruction and disposal methods
      1. Physical Destruction
        1. Drilling
        2. Shredding
        3. Degaussing
        4. Incinerating
      2. Recycling and Repurposing Best Practices
        1. Erasing/Wiping
        2. Low-Level Formatting vs. Standard Formatting
      3. Outsourcing Concepts
        1. Third-Party Vendor
        2. Certificate of Destruction or Recycling
      4. REVIEW
        1. 2.8 QUESTIONS
        2. 2.8 ANSWERS
    9. Objective 2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks
      1. Home Router Settings
        1. Changing Default Passwords
        2. IP Filtering
        3. Firmware Updates
        4. Content Filtering
        5. Physical Placement/Secure Locations
        6. Dynamic Host Configuration Protocol Reservations
        7. Static Wide Area Network IP
        8. Universal Plug and Play
        9. Screened Subnet
      2. Wireless-Specific Security Settings
        1. Changing the Service Set Identifier
        2. Disabling SSID Broadcast
        3. Encryption Settings
        4. Disabling Guest Accounts
        5. Changing Channels
      3. Firewall Settings
        1. Disabling Ports
        2. Port Forwarding/Mapping
      4. REVIEW
        1. 2.9 QUESTIONS
        2. 2.9 ANSWERS
    10. Objective 2.10 Given a scenario, install and configure browsers and relevant security settings
      1. Browser Download/Installation
        1. Trusted Sources
        2. Untrusted Sources
      2. Extensions and Plug-Ins
      3. Password Managers
      4. Secure Connections/Sites
      5. Settings
        1. Pop-up Blockers
        2. Clearing Browser Data
        3. Private Browsing Mode
        4. Sign-in/Browser Data Synchronization
        5. Ad Blockers
      6. REVIEW
        1. 2.10 QUESTIONS
        2. 2.10 ANSWERS
  10. 3.0 Software Troubleshooting
    1. Objective 3.1 Given a scenario, troubleshoot common Windows OS problems
      1. Common Symptoms of Windows Problems
        1. Blue Screen of Death
        2. Sluggish Performance
        3. Boot Problems
        4. Frequent Shutdowns
        5. Services Not Starting
        6. Applications Crashing
        7. Low Memory Warnings
        8. USB Controller Resource Warnings
        9. System Instability
        10. No Operating System Found
        11. Slow Profile Load
        12. Time Drift
      2. Common Troubleshooting Steps
        1. Reboot
        2. Restart Services
        3. Uninstall/Reinstall/Update Applications
        4. Add Resources
        5. Verify Requirements
        6. System File Check
        7. Repair/Restore/Reimage Windows
        8. Roll Back Updates
        9. Rebuild Windows Profiles
      3. REVIEW
        1. 3.1 QUESTIONS
        2. 3.1 ANSWERS
    2. Objective 3.2 Given a scenario, troubleshoot common personal computer (PC) security issues
      1. Common Symptoms
        1. Unable to Access the Network
        2. Desktop Alerts
        3. False Alerts Regarding Antivirus Protection
        4. Altered System or Personal Files
        5. Unwanted Notifications Within the OS
        6. OS Update Failures
      2. Browser-Related Symptoms
        1. Random/Frequent Pop-Ups
        2. Certificate Warnings
        3. Redirection
      3. REVIEW
        1. 3.2 QUESTIONS
        2. 3.2 ANSWERS
    3. Objective 3.3 Given a scenario, use best practice procedures for malware removal
      1. Best-Practice Malware-Removal Process
        1. REVIEW
          1. 3.3 QUESTIONS
          2. 3.3 ANSWERS
    4. Objective 3.4 Given a scenario, troubleshoot common mobile OS and application issues
      1. Common Symptoms
        1. Application Fails to Launch
        2. Application Fails to Close/Crashes
        3. Application/OS Fails to Update
        4. Slow to Respond
        5. Battery Life Issues
        6. Randomly Reboots
        7. Connectivity Issues
        8. Screen Does Not Autorotate
      2. REVIEW
        1. 3.4 QUESTIONS
        2. 3.4 ANSWERS
    5. Objective 3.5 Given a scenario, troubleshoot common mobile OS and application security issues
      1. Security Concerns
        1. Android Package Source
        2. Developer Mode
        3. Rooting/Jailbreaking
        4. Bootleg/Malicious Application
      2. Common Symptoms
      3. REVIEW
        1. 3.5 QUESTIONS
        2. 3.5 ANSWERS
  11. 4.0 Operational Procedures
    1. Objective 4.1 Given a scenario, implement best practices associated with documentation and support systems information management
      1. Ticketing Systems
        1. Categories
        2. Severity
        3. Escalation Levels
        4. Clear and Concise Written Communication
      2. Asset Management
        1. Database Systems
        2. Asset Tags and IDs
        3. Procurement Lifecycle
        4. Warranty and Licensing
        5. Assigned Users
      3. Types of Documents
        1. Acceptable Use Policy
        2. Network Topology Diagrams
        3. Regulatory and Compliance Requirements
        4. Incident Reports
        5. Standard Operating Procedures
        6. New-User Setup Checklists
        7. End-User Termination Checklists
        8. Knowledge Base/Articles
        9. REVIEW
          1. 4.1 QUESTIONS
          2. 4.1 ANSWERS
    2. Objective 4.2 Explain basic change-management best practices
      1. Change Management Best Practices
        1. Documented Business Processes
        2. Rollback Plan
        3. Sandbox Testing
        4. Responsible Staff Member
      2. Change Management
        1. Request Forms
      3. REVIEW
        1. 4.2 QUESTIONS
        2. 4.2 ANSWERS
    3. Objective 4.3 Given a scenario, implement workstation backup and recovery methods
      1. Backup and Recovery
        1. Backup Types
        2. Recovery
        3. Frequency
        4. Backup Retention
      2. Backup Testing
      3. Backup Rotation Schemes
      4. REVIEW
        1. 4.3 QUESTIONS
        2. 4.3 ANSWERS
    4. Objective 4.4 Given a scenario, use common safety procedures
      1. Electrostatic Discharge Straps
      2. Electrostatic Discharge Mats
        1. Self-Grounding
      3. Equipment Grounding
      4. Proper Power Handling
        1. Power-Handling Apps
      5. Proper Component Handling and Storage
        1. Electrostatic Discharge
      6. Antistatic Bags
      7. Compliance with Government Regulations
      8. Personal Safety
        1. Disconnect Power Before Repairing a PC
        2. Lifting Techniques
        3. Electrical Fire Safety
        4. Safety Goggles
        5. Air Filtration Mask
      9. REVIEW
        1. 4.4 QUESTIONS
        2. 4.4 ANSWERS
    5. Objective 4.5 Summarize environmental impacts and local environmental controls
      1. Material Safety Data Sheet/Documentation for Handling and Disposal
        1. Proper Battery Disposal
        2. Proper Toner Disposal
        3. Proper Disposal of Other Devices and Assets
      2. Temperature, Humidity-Level Awareness, and Proper Ventilation
        1. Location/Equipment Placement
        2. Dust Cleanup
        3. Compressed Air/Vacuums
      3. Power Surges, Under-Voltage Events, and Power Failures
      4. REVIEW
        1. 4.5 QUESTIONS
        2. 4.5 ANSWERS
    6. Objective 4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts
      1. Incident Response
        1. Chain of Custody
        2. Inform Management/Law Enforcement as Necessary
        3. Copy of Drive (Data Integrity and Preservation)
        4. Documentation of the Incident
      2. Licensing/Digital Rights Management/End-User License Agreement
        1. Licensing
        2. Digital Rights Management
      3. Regulated Data
        1. Data Classifications
        2. Data Retention
      4. REVIEW
        1. 4.6 QUESTIONS
        2. 4.6 ANSWERS
    7. Objective 4.7 Given a scenario, use proper communication techniques and professionalism
      1. Professional Appearance and Attire
      2. Communication Techniques
      3. REVIEW
        1. 4.7 QUESTIONS
        2. 4.7 ANSWERS
    8. Objective 4.8 Identify the basics of scripting
      1. Script File Types
        1. .bat
        2. .ps1
        3. .vbs
        4. .sh
        5. .js
        6. .py
      2. Use Cases for Scripting
        1. Restarting Machines
        2. Remapping Network Drives
        3. Installation of Applications
        4. Automated Backups
        5. Gathering of Information/Data
        6. Initiating Updates
      3. Other Considerations When Using Scripts
        1. Unintentionally Introducing Malware
        2. Inadvertently Changing System Settings
        3. Browser or System Crashes Due to Mishandling of Resources
      4. REVIEW
        1. 4.8 QUESTIONS
        2. 4.8 ANSWERS
    9. Objective 4.9 Given a scenario, use remote access technologies
      1. Methods and Tools
        1. Remote Desktop Protocol
        2. Virtual Private Network
        3. Virtual Network Computing
        4. Secure Shell
        5. Remote Monitoring and Management
        6. Microsoft Remote Assistance
        7. Third-Party Tools
      2. Security Considerations of Each Access Method
      3. REVIEW
        1. 4.9 QUESTIONS
        2. 4.9 ANSWERS
  12. A    About the Online Content
    1. System Requirements
    2. Your Total Seminars Training Hub Account
      1. Privacy Notice
    3. Single User License Terms and Conditions
    4. TotalTester Online
      1. Pre-Assessment
    5. Mike’s CompTIA A+ Video Training Sample
    6. TotalSims Sample for CompTIA A+
    7. Mike’s Cool Tools
    8. Technical Support
  13. Index

Product information

  • Title: Mike Meyers' CompTIA A+ Core 2 Certification Passport (Exam 220-1102)
  • Author(s): Mike Meyers, Mark Edward Soper
  • Release date: March 2023
  • Publisher(s): McGraw-Hill
  • ISBN: 9781264613571