Published by Pearson IT Certification (July 28, 2022) © 2022

Dave Prowse
    VitalSource eTextbook (Lifetime access)
    €39,99
    Adding to cart… The item has been added
    ISBN-13: 9780137637713

    CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram ,1st edition

    Language: English

    Prepare for CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exam success with this Exam Cram from Pearson IT Certification, a leader in IT certification.


    This is the eBook edition of the CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram. This eBook does not include access to the Pearson Test Prep practice exams that comes with the print edition.


    CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet.


    Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams! 

    * Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals
    * Work effectively with mobile devices: laptops, tablets, and smartphones
    * Configure Windows settings, components, and administrative tools
    * Manage and troubleshoot Linux, macOS, Android, and iOS
    * Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems
    * Understand security features such as firewalls, multifactor authentication, permissions, and access control
    * Defend against malware, network threats, and social engineering
    * Learn the basics of IT documentation, change management, and incident response

    Introduction
    Part I: Introduction to Core 1 (220-1101)
    CORE 1 (220-1101): DOMAIN 1.0: MOBILE DEVICES
    Chapter 1
    Laptop Hardware and Components
    Introduction to Laptops
    Power
    Keyboards/Keys
        Special Function Keys
        Troubleshooting Keyboards
    Touchpad
    Random-Access Memory (RAM)
    Storage Drives
    Communications
    Physical Privacy
    Chapter 2 Mobile Device Display Components
    Display Types
    Inverter and Backlight
        Damaged Inverter
        Worn-Out Backlight
    Digitizers and Touchscreens
    Webcam and Microphone
    Wi-Fi Antenna Connector and Placement
    Chapter 3 Mobile Device Accessories and Ports
    Connection Types
        Wired Connections
        Wireless Connections
    Accessories
        Docking Stations and Port Replicators
        Drawing Pads, Touchpads, and Touch Pens
    Chapter 4 Mobile Device Network Connectivity and Application Support
    Enabling Wireless Functions
    Bluetooth
    Email Configuration
        Integrated Commercial Provider Email Configuration
        Corporate and ISP Email Configuration
    Cellular Radio Technologies
    Location Services
        GPS
        Cellular Location
        IMEI and IMSI
    Synchronization Methods
        Synchronizing to the Cloud
        Synchronizing to the Desktop
        Synchronizing to the Automobile
    Mobile Device Management (MDM)
    CORE 1 (220-1101): DOMAIN 2.0: NETWORKING
    Chapter 5
    TCP and UDP Ports and Protocols
    TCP vs. UDP
    Ports and Protocols
        HTTP vs. HTTPS
        Email Protocols
        FTP, SSH, and Telnet
        DHCP
        DNS
        LDAP
        RDP
        More Protocols and Ports
    Chapter 6 Network Devices
    Switches
    Routers
    Wireless Access Points
    Firewalls
    Network Interface Cards
        Hubs
    Patch Panels
    Power over Ethernet
    Cable/DSL Modems
    Network Interface Devices
    Software-Defined Networking
    Chapter 7 Wireless Protocols
    802.11 Wireless
    Long-Range Fixed Wireless
    RFID
    Chapter 8 Networked Hosts
    Server Roles
        File Servers
        Web Servers
        Print Servers
        Mail Servers
        Proxy Servers
    DHCP Servers
        DNS Servers
        Syslog Servers
        AAA Servers
    Internet Security Appliances
        Network Firewall
        UTM
        Spam Gateway
        Load Balancer
    Embedded Systems and IoT
        Embedded Systems
        IoT
    Chapter 9 SOHO Network Configuration
    Configuring IPv4
    Private vs. Public Addresses
    Configuring IPv6
    Chapter 10 Network Configuration Concepts
    DNS
    Email Authentication Methods
    DHCP
        DHCP Process
        DHCP Reservations
    VLANs
    VPNs
    Chapter 11 Network Types
    Network Types
        LAN and WAN
        MAN
        SAN
        WLAN
        WMN
        PAN
    Internet Connection Types
        Cable Internet
        DSL
        Fiber
        Satellite
        Wireless Internet Service Provider
    Chapter 12 Networking Tools
    Network Cabling Tools
    Network Tap
    Wi-Fi Analyzers
    CORE 1 (220-1101): DOMAIN 3.0: HARDWARE
    Chapter 13
    Cables and Connectors
    Network Cables
        Twisted Pair
        Coaxial
        Optical
    Peripheral Cables and Connectors
        USB
        Lightning and Thunderbolt
        Serial
    Video Cables and Connectors
    Storage Drive Cables and Connectors
    Adapters
    Chapter 14 RAM
    RAM Types
        DDR3
        DDR4
        DDR5
    Installing RAM
    RAM Technologies
        Single-Channel vs. Multichannel Architectures
        ECC vs. Non-ECC
    Chapter 15 Storage Drives
    SATA
    Magnetic Hard Drives
    Solid-State Drives
    RAID
    Flash
        USB Flash Drives
        Secure Digital Cards
    Optical Drives
    Chapter 16 Motherboards and Add-on Cards
    Motherboard Form Factors and Connector Types
        ATX
        microATX
        ITX
        Expansion Buses
    Expansion Cards
        Installing Video Cards
        Sound Cards
        Other Expansion Cards
    More Ports and Connectors
    BIOS/UEFI Settings
    The POST
    Chapter 17 CPUs
    CPU Architecture
        Clock Rate
        Overclocking
        Types of CPUs
        Multithreading and Multicore
        Cache Memory
    CPU Compatibility
        Intel and AMD
        Sockets
    Power Consumption
    Cooling Mechanisms
        Heat Sinks
        Thermal Paste
        Fans
        Liquid Cooling Systems
    Installing CPUs
    Chapter 18 Power
    Planning Which Power Supply to Use
        Types of Power Supplies and Compatibility
        Wattage and Capacity Requirements
        Number and Type of Power Connectors
        Modular and Redundant PSUs
    Installing the Power Supply
    Chapter 19 Multifunction Devices/Printers
    Setup Considerations
    Printer Configuration Settings
        Basic Printer Configuration Settings
        Sharing Printers and Managing Permissions
    Local vs. Network Printers
    Basic Printer Security
    Chapter 20 Printer Consumables
    Laser Printers
    Inkjet Printers
    Thermal Printers
    Impact Printers
    3D Printers
    CORE 1 (220-1101): DOMAIN 4.0: VIRTUALIZATION AND CLOUD COMPUTING
    Chapter 21 Cloud Computing Concepts
    Introduction to Cloud Computing
    Common Cloud Models
    Cloud Computing Characteristics
    Desktop Virtualization
    Chapter 22 Client-Side Virtualization
    Purpose of Virtual Machines
    Hypervisors
    Examples of Virtual Machine Software
    Virtual Machine Requirements
    Cross-Platform Virtualization
    Containers and Sandboxes
        OS-Level Virtualization (Containers)
        Sandboxes
    CORE 1 (220-1101): DOMAIN 5.0: HARDWARE AND NETWORK TROUBLESHOOTING
    Chapter 23
    Computer Troubleshooting 101
    The CompTIA Six-Step Troubleshooting Process
        Step 1: Identify the Problem
        Step 2: Establish a Theory of Probable Cause (Question the Obvious)
        Step 3: Test the Theory to Determine the Cause
        Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution
        Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures
        Step 6: Document the Findings, Actions, and Outcomes
    Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power
    Troubleshooting Motherboards
    Troubleshooting CPUs
    Troubleshooting RAM
    Troubleshooting Power Supply Issues
    Heating and Cooling
    Chapter 25 Troubleshooting Storage Drives and RAID Arrays
    Preventive Maintenance and Troubleshooting of Storage Drives
    Storage Drive Preventive Maintenance
    Storage Drive Troubleshooting
    Troubleshooting RAID Arrays
    Chapter 26 Troubleshooting Video Issues
    PC Video Troubleshooting
    External Laptop Monitors and Projectors
        External Laptop Monitors
        Projectors
    Chapter 27 Troubleshooting Mobile Devices
    Mobile Device Display Troubleshooting
    Mobile Device Overheating
    More Mobile Device Troubleshooting
    Disassembling Processes
    Chapter 28 Troubleshooting Printers
    Troubleshooting Printers
    Print Jobs and the Print Spooler
    Managing Printers and Print Jobs
    The Windows Print Spooler
    Chapter 29 Troubleshooting Wired and Wireless Network Problems
    Troubleshooting Common Symptoms
    A+ Core 1 (220-1101) Practice Exam
    Part II: Introduction to Core 2 (220-1102)
    CORE 2 (220-1102): DOMAIN 1.0: OPERATING SYSTEMS
    Chapter 30 Comparing Windows Editions
    Windows 10 Editions and Feature Differences
    Windows Desktop/User Interface and Components
    Windows 10 Upgrade Paths
    Windows 11
    Chapter 31 Microsoft Command-Line Tools, Part I
    Microsoft Command-Line Basics
        Command Prompt
        PowerShell
        Windows Terminal
        Ask for Help!
    Navigating in the Command Line
    Working with Directories and Files
    Partitioning and File System-Based Commands
    chkdsk and sfc
        chkdsk
        SFC
    winver and shutdown
        shutdown
    Advanced Commands: gpupdate and gpresult
    Chapter 32 Microsoft Command-Line Tools, Part II
    Networking Commands
        ipconfig
        ping
        tracert and pathping
        hostname
        netstat
        nslookup
        net
        Bonus Command: arp
    Chapter 33 Microsoft Operating System Features and Tools, Part I
    Task Manager
    The MMC and Administrative Tools
        The MMC
        Event Viewer
        Task Scheduler
        Device Manager
        Certificate Manager
        Local Users and Groups
        Performance Monitor
        Group Policy Editor and Local Security Policy
        Services
        Bonus Tool: Computer Management
    Chapter 34 Microsoft Operating System Features and Tools, Part II
    Disk Management
        The Disk Management Utility
        Mount Points and Mounting a Drive
        Storage Spaces
        Disk Cleanup
        Optimize Drives/Disk Defragmenter
    Additional Windows Tools
        System Information/msinfo32
        Resource Monitor
        System Configuration/MSConfig
        The Windows Registry
    Chapter 35 Windows Control Panel Utilities
    Opening and Viewing the Control Panel Utilities
        Internet Options
        Devices and Printers
        Programs and Features
        Program Compatibility
        Windows Defender Firewall
        Mail
        Sound
        User Accounts
        Indexing Options
        File Explorer Options
        Power Management
        Ease of Access Center
    Chapter 36 Windows Settings
    How to Access Settings
    Time & Language
    Update & Security
        Windows Update
        Windows Defender Firewall
    Personalization
    Apps
    Privacy
    System
        Display
        Power & Sleep
        Storage
        About and System Properties
        Virtual Memory
    Devices
    Network & Internet
    Gaming
    Accounts
    Chapter 37 Windows Networking
    Workgroup vs. Domain Setup
        Sharing Resources and Making Network Connections
        Printer Sharing and Access
    Establishing Networking Connections
    Proxy Settings
    Chapter 38 Application Installation and Configuration Concepts
    32-Bit vs. 64-Bit
    System and OS Requirements for Applications
        Scenario 1: Video Editing Program
        Scenario 2: Developer Program
    Distribution Methods
    Other Considerations for New Applications
        Application Impact
        User Permissions
        Security Considerations
    Chapter 39 Common Operating Systems
    Workstation Operating Systems
    Smartphone and Tablet Operating Systems
        Android
        iOS
        iPadOS
    File System Types and Formatting
        Windows File System Basics
        Linux File System Basics
        macOS File System Basics
    Vendor Life-Cycle Limitations
    Compatibility Concerns Between Operating Systems
    Chapter 40 Operating System Installations and Upgrades
    Boot Methods
    Types of Installations
    Partitioning
        Primary and Extended Partitions and Logical Drives
        Basic and Dynamic Drives
        GPT vs. MBR
    More OS Installation and Upgrade Considerations
    Chapter 41 macOS
    macOS Basics
    System Preferences
    macOS Features
    Managing and Maintaining macOS
    Installation and Uninstallation of Applications
    Apple ID
    Chapter 42 Linux
    Linux Basics
    Linux Desktop Distributions
    Linux Partition Scheme and File System
    Linux Command Line
    Samba
    Linux Best Practices
        Updates and Patches
        Backups
        Anti-malware
        In Closing
    CORE 2 (220-1102): DOMAIN 2.0: SECURITY
    Chapter 43
    Physical Security
    Physical Locks
    Entry Systems
    Biometrics
    Other Physical Security Precautions
    Protecting Data Physically
    Chapter 44 Logical Security
    Authentication
    Principle of Least Privilege
    MDM Policies
    Active Directory
        User Profiles
        Logon Script
        Home Folder
        Group Policy
        Security Groups
    More Logical Security Concepts
        Authenticator Applications
        Hard Tokens vs. Soft Tokens
        Access Control Lists
        SMS
        Email Security
    Chapter 45 Wireless Security and Malware
    Comparing/Contrasting Wireless Security Protocols and Authentication Methods
        Wireless and Encryption Protocols
        RADIUS and TACACS+
        Kerberos
    Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods
        Malicious Software Types
        Preventing Malicious Software
    Chapter 46 Social Engineering
    Social Engineering
        Phishing
        Evil Twin
        Shoulder Surfing
        Piggybacking/Tailgating
        Dumpster Diving
        Impersonation
    Threats and Vulnerabilities
        Network-Based Attacks
        Password Cracking
        Additional Security Threats
        Vulnerabilities and Security Best Practices
    Chapter 47 Windows Security Settings
    The CIA of Computer Security
    Windows Defender Antivirus
    Windows Defender Firewall
    Users and Groups
    Permissions
        Permission Inheritance and Propagation
        Moving and Copying Folders and Files
    File Security
        Administrative Shares
        Encrypting File System
        BitLocker Encryption
    Chapter 48 Windows Best Practices
    Usernames and Passwords
    Password Policies
    Account Management and End-User Best Practices
    Disabling AutoPlay/AutoRun
    Chapter 49 Mobile Device Security
    Screen Locks
    Authenticator Applications
    Theft and Loss of Mobile Devices
    Compromised and Damaged Devices
        Backups
        Updates
        Antivirus/Anti-malware/Firewalls
        MDM and MAM
        Full Device Encryption
    IoT Security
    Policies and Procedures
        Profile Security Requirements
    Chapter 50 Data Destruction and Disposal
    Data Security 101
    Formatting Drives
    Overwriting Drives
    Clear
    Purge
    Destroy
    Chapter 51 SOHO Security
    Changing Default Passwords
    Wireless-Specific Security Settings
        Changing and Disabling the SSID
        Antennas and Radio Power Levels
        Guest Networks
        Disabling WPS
    Enabling MAC Filtering and IP Filtering
    Assigning Static IP Addresses
    Firewall Settings and Additional Configurations
    Content Filtering/Parental Controls
    Disabling Physical Ports and More Physical Security
    A Final Word on SOHO Routers
    Chapter 52 Browser Security
    Browser Download/Installation
    Settings
    Extensions and Plug-ins
    Password Managers
    Secure Connections
        TLS
        Secure Sites and Tracking
    More Settings
    CORE 2 (220-1102): DOMAIN 3.0: SOFTWARE TROUBLESHOOTING
    Chapter 53
    Troubleshooting Microsoft Windows
    Windows Recovery
        Windows Recovery Environment (Windows RE)
        Startup Settings
    System Restore
    Improper, Spontaneous, and Frequent Shutdowns
    Stop Errors
    Restoring Windows
    Common Windows Symptoms and Solutions
    Chapter 54 Troubleshooting PC Security Issues
    The CompTIA A+ Seven-Step Malware Removal Procedure
    Malware Removal Scenario
        1. Investigate and Verify Malware Symptoms
        2. Quarantine the Infected Systems
        3. Disable System Restore in Windows
        4. Remediate the Infected Systems
        5. Schedule Scans and Run Updates
        6. Enable System Restore and Create a Restore Point (in Windows)
        7. Educate the End User
    Symptoms of Viruses
    Symptoms of Spyware
    More Symptoms of PC Security Issues and Potential Solutions
    Chapter 55 Troubleshooting Mobile Operating Systems and Applications
    Wireless Troubleshooting
        Wi-Fi Troubleshooting
        Bluetooth Troubleshooting
        NFC and AirDrop Troubleshooting
    Troubleshooting Email Connections
    Troubleshooting and Stopping Applications
    Initiating Resets
    More Mobile Application and OS Troubleshooting
        Updates: The Good and the Bad
        Application Issues
        Random Reboots
        Poor Battery Life
    Video Issues
    Chapter 56 Troubleshooting Mobile Operating Systems Security Issues
    Mobile Device Security Concerns and Symptoms
    CORE 2 (220-1102): DOMAIN 4.0: OPERATIONAL PROCEDURES
    Chapter 57
    Documentation
    Types of Documents
        Network Topology Diagrams
        Incident Report Documentation
        Standard Operating Procedure
        Compliance and Regulatory Policy
        Acceptable Use Policy
        User Checklists (Onboarding and Offboarding)
    Knowledge Bases/Articles
    Ticketing Systems
    Asset Management
    Chapter 58 Change Management and Backup Methods
    Understanding Basic Change Management Best Practices
    Implementing Workstation Backup and Recovery Methods
        Using Windows File History and Recovery
        Backup Methods
        Backup Testing
        Backup Rotation Schemes
    Chapter 59 Safety Procedures
    ESD Prevention and Equipment Grounding
    Electrical Safety
    Electrical Fire Safety
    Physical Safety
    Chapter 60 Environmental Controls
    Temperature, Humidity, and Air
    MSDS and Disposal
    Power Devices
        Surge Protectors
        Uninterruptible Power Supplies
    Chapter 61 Incident Response, Communication, and Professionalism
    Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts
        Incident Response
        Licensing/DRM/EULA
        Regulated Data
    Using Proper Communication Techniques and Professionalism
        Communication Techniques and Professionalism
    Chapter 62 Basic Scripting, Part I
    Programming 101
        Basic Data Types
        Basic Script Constructs
        Environment Variables
        Comment Syntax
    Chapter 63 Basic Scripting, Part II
    PowerShell and .ps1
    Bash and .sh
    Use Cases and Other Considerations for PowerShell and Bash
    Python and .py
    JavaScript and .js
    Visual Basic Script and .vbs
    Chapter 64 Remote Access Technologies
    Remote Desktop
        Remote Assistance
        Remote Desktop Connection
        Connecting with Remote Desktop
    SSH
    More Third-Party Tools
    VPN
    A+ Core 2 (220-1102) Practice Exam
    Chapter 65 Getting Ready for the Exams, and Farewell
    Getting Ready for the Exams
    Tips for Taking the Real Exams
        General Practices for Taking Exams
        Smart Methods for Difficult Questions
        Wrapping Up the Exam
    Beyond the CompTIA A+ Certification


    9780137637546   TOC    4/12/2022