CompTIA A+ Exam Cram Core 1 (220-1001) and Core 2 (220-1002) Premium Edition and Practice Test
Pearson IT Certification
978-0-13-661319-0 (ISBN)
- Nur im Set erhältlich (Einzelband nicht lieferbar)
- Artikel merken
Covers the critical information you'll need to know to score higher on your A+ Core 1 (220-1001) and Core 2 (220-1002) exams!
--Deploy and manage computers running Windows 10/8/7, macOS, Linux, iOS, and Android
--Master and practice the six-step A+ troubleshooting process
--Understand, install, configure, and troubleshoot motherboards, CPUs, and memory
--Test and troubleshoot power-related problems
--Use all forms of storage, including SSDs, optical devices, and RAID systems
--Work effectively with mobile devices, including laptops, tablets, and smartphones
--Configure Windows components and applications, use Windows administrative tools, and optimize Windows systems
--Repair damaged Windows environments and troubleshoot Windows issues
--Install and manage printers and other peripherals
--Understand and work with networks, network hardware, wireless protocols, and cloud technologies
--Install and configure SOHO wired/wireless networks, and troubleshoot connectivity
--Secure desktops and mobile devices, implement authentication methods, prevent malware attacks, and protect data
EXCLUSIVE STATE-OF-THE-ART WEB-BASED TEST ENGINE WITH 320 PRACTICE QUESTIONS!
Make sure you're 100% ready for the real exam!
--Detailed explanations of correct and incorrect answers
--Multiple test modes
--Random questions and order of answers
--Coverage of each current A+ exam objective
David L. Prowse is an author, a computer network specialist, and a technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. Over the past decade, he has also taught CompTIA A+, Network+, and Security+ certification courses, both in the classroom and via the Internet. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.
Table of Contents Introduction
PART I: INTRODUCTION TO CORE 1 (220-1001)
Core 1 (220-1001) Domain 1.0: Mobile Devices
Chapter 1 Laptops, Part 1
1.1 - Given a scenario, install and configure laptop hardware and components
Keyboards
Touchpad
Hard Drives
Memory
Smart Card Readers
Optical Drives
Communications
Video
Power
Speaker
System Board and CPU
Fans
Chapter 2 Laptops, Part 2
1.2 - Given a scenario, install components within the display of a laptop
Display Types
Inverter and Backlight
Digitizers and Touchscreens
Webcam and Microphone
Wi-Fi Antenna Connector and Placement
1.3 - Given a scenario, use appropriate laptop features
Special Function Keys
External Monitors
Docking Stations and Port Replicators
Rotating and Removable Screens
Securing Laptops with Cable Locks
Chapter 3 Smartphones, Tablets, and Other Mobile Devices, Part 1
1.4 - Compare and contrast characteristics of various types of other mobile devices
Tablets
Smartphones
Wearable Technology Devices
E-readers
GPS Devices
1.5 - Given a scenario, connect and configure accessories and ports of other mobile devices
Connection Types
Accessories
Chapter 4 Smartphones, Tablets, and Other Mobile Devices, Part 2
1.6 - Given a scenario, configure basic mobile device network connectivity and application support
Enabling Wireless Functions
USB Tethering
Bluetooth
E-mail Configuration
Cellular Radio Technologies
1.7 - Given a scenario, use methods to perform mobile device synchronization
Synchronization Methods
Types of Data to Synchronize and Authentication
Core 1 (220-1001) Domain 2.0: Networking
Chapter 5 Ports, Protocols, and Network Devices
2.1 - Compare and contrast TCP and UDP ports, protocols, and their purpose
TCP vs. UDP
Ports and Protocols
2.2 - Compare and contrast common networking hardware devices
Switches
Routers
Wireless Access Points
Firewalls
Network Interface Cards
Cloud-based Network Controllers
Repeaters
Hubs
Cable/DSL Modems
Bridges
Patch Panels
Power over Ethernet
Ethernet over Power
Chapter 6 SOHO Networks and Wireless Protocols
2.3 - Given a scenario, install and configure a basic wired/wireless SOHO network
Router Setup and Wireless
Access Point Settings
NIC and End-user Device Configuration
IoT Device Configuration
Cable/DSL Modem Configuration
Firewall Settings and Additional Configurations
Configuring Wireless Encryption
2.4 - Compare and contrast wireless networking protocols
802.11 Wireless
RFID
Zigbee and Z-Wave
Chapter 7 Networked Hosts and Network Configuration
2.5 - Summarize the properties and purposes of services provided by networked hosts
Server Roles
Internet Appliances
Embedded/Legacy Systems
2.6 - Explain common network configuration concepts
Configuring IPv4
Configuring IPv6
VLANs
VPNs
Chapter 8 Network Types and Networking Tools
2.7 - Compare and contrast Internet connection types, network types, and their features
Network Types
Internet Connection Types
2.8 - Given a scenario, use appropriate networking tools
Network Cabling Tools
Wi-Fi Analyzers
Core 1 (220-1001) Domain 3.0: Hardware
Chapter 9 Cables and Connectors
3.1 - Explain basic cable types, features, and their purposes
3.2 - Identify common connector types
Network Cables
Video Cables and Connectors
Multipurpose Cables and Connectors
Hard Drive Cables and Connectors
Adapters
Chapter 10 RAM and Storage
3.3 - Given a scenario, install RAM types
RAM Types
Installing RAM
RAM Technologies
3.4 - Given a scenario, select, install and configure storage devices
SATA
Magnetic Hard Drives
Solid-State Drives
RAID
Flash
Optical Drives
Chapter 11 Motherboards and Add-on Cards
3.5 - Given a scenario, install and configure motherboards, CPUs, and add-on cards
Motherboard Form Factors and Connectors
Expansion Cards
More Ports and Connectors
BIOS/UEFI Settings
The POST
Chapter 12 CPUs
3.5 - Given a scenario, install and configure motherboards, CPUs, and add-on cards
CPU Features
CPU Compatibility
Power Consumption
Cooling Mechanisms
Installing CPUs
Chapter 13 Peripherals and Power
3.6 - Explain the purposes and uses of various peripheral types
Input Devices
Output Devices
Hybrid I/O Devices and Others
3.7 - Summarize power supply types and features
Planning Which Power Supply to Use
Installing the Power Supply
Chapter 14 Custom PCs and Common Devices
3.8 - Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs
Graphic/CAD/CAM Design Workstation
Audio/Video Editing Workstation
Virtualization Workstation
Gaming PC
Network-Attached Storage Device
Thin Client
Standard Thick Client
3.9 - Given a scenario, install and configure common devices
Desktop Devices and Settings
Laptop Configurations and Settings
Chapter 15 Printers and Multifunction Devices
3.10 - Given a scenario, configure SOHO multifunction devices/printers and settings
Printer Configuration Settings
Local Versus Network Printers
3.11 - Given a scenario, install and maintain various print technologies
Types of Printers
Virtual Printing
Printer Installation and Drivers
Core 1 (220-1001) Domain 4.0: Virtualization and Cloud Computing
Chapter 16 Cloud Computing and Client-side Virtualization
4.1 - Compare and contrast cloud computing concepts
Common Cloud Models
Cloud Computing Concerns
4.2 - Given a scenario, set up and configure client-side virtualization
Purpose of Virtual Machines
Hypervisors
Examples of Virtual Machine Software
Virtual Machine Requirements
Core 1 (220-1001) Domain 5.0: Hardware and Network Troubleshooting
Chapter 17 Computer Troubleshooting 101
5.1 - Given a scenario, use the best practice methodology to resolve problems
Step 1: Identify the Problem
Step 2: Establish a Theory of Probable Cause (Question the Obvious)
Step 3: Test the Theory to Determine Cause
Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution
Step 5: Verify Full System Functionality and, If Applicable, Implement Preventive Measures
Step 6: Document Findings, Actions, and Outcomes
Chapter 18 Troubleshooting Motherboards, CPUs, RAM, and Power
5.2 - Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power
Troubleshooting Motherboards
Troubleshooting CPUs
Troubleshooting RAM
Troubleshooting Power Supply Issues
Heating and Cooling
Chapter 19 Troubleshooting Hard Drives and RAID Arrays
5.3 - Given a scenario, troubleshoot hard drives and RAID arrays
Troubleshooting Hard Drives
Troubleshooting RAID Arrays
Chapter 20 Troubleshooting Video Issues and Mobile Devices
5.4 - Given a scenario, troubleshoot video, projector, and display issues
Video Troubleshooting
5.5 - Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
Mobile Device Display Troubleshooting
Mobile Device Overheating
More Mobile Device Troubleshooting
Disassembling Processes for Proper Reassembly
Chapter 21 Troubleshooting Printers
5.6 - Given a scenario, troubleshoot printers
Troubleshooting Printers
Print Jobs and the Print Spooler
Chapter 22 Troubleshooting Wired and Wireless Network Problems
5.7 - Given a scenario, troubleshoot common wired and wireless network problems
Troubleshooting Common Symptoms
A+ Core 1 (220-1001) Practice Exam
PART II: INTRODUCTION TO CORE 2 (220-1002)
Core 2 (220-1002) Domain 1.0: Operating Systems
Chapter 23 Operating System Types and Windows Versions
1.1 - Compare and contrast common operating system types and their purposes
Workstation Operating Systems
32-Bit Versus 64-Bit
Smartphone and Tablet Operating Systems
Vendor-Specific Limitations
Compatibility Concerns Between Operating Systems
1.2 - Compare and contrast features of Microsoft Windows versions
Windows 7
Windows 8 and 8.1
Windows 10
Windows User Interfaces and Components
Chapter 24 Operating System Installation
1.3 - Summarize general OS installation considerations and upgrade methods
Boot Methods
Types of Installations
Partitioning
File System Types and Formatting
More OS Installation Considerations
Chapter 25 Microsoft Command Line Tools
1.4 - Given a scenario, use appropriate Microsoft command line tools
Command Prompt Basics
Navigating and Working with Directories and Files in the Command Prompt
Partitioning and File System-based Commands
Chkdsk and SFC
Networking Commands
Advanced Commands
Chapter 26 Microsoft Operating System Features and Tools, Part 1
1.5 - Given a scenario, use Microsoft operating system features and tools
Administrative Tools
System Configuration/MSConfig
Task Manager
Chapter 27 Microsoft Operating System Features and Tools, Part 2
1.5 - Given a scenario, use Microsoft operating system features and tools
Disk Management
System Utilities
Chapter 28 Windows Control Panel Utilities
1.6 - Given a scenario, use Microsoft Windows Control Panel utilities
Internet Options
Display
User Accounts
Folder Options
Performance (Virtual Memory)
Power Management
Credential Manager
Programs and Features
Program Compatibility
Devices and Printers
Sound
Troubleshooting
Sync Center
Chapter 29 Windows Networking and Application Installation
1.8 - Given a scenario, configure Microsoft Windows networking on a client/desktop
Workgroup, HomeGroup, and Domain
Sharing Resources and Making Network Connections
Establishing Networking Connections
Proxy Settings
Configuring an Alternate IP Address in Windows
Network Card Properties
1.7 - Summarize application installation and configuration concepts
Application Requirements
Method of Installation and Deployment
User Permissions
Security Considerations
Chapter 30 Linux and macOS Tools
1.9 - Given a scenario, use features and tools of the macOS and Linux client/desktop operating systems
macOS
Linux
Core 2 (220-1002) Domain 2.0: Security
Chapter 31 Physical and Logical Security
2.1 - Summarize the importance of physical security measures
Physical Locks
Entry Systems
Biometrics
Protecting Data Physically
2.2 - Explain logical security concepts
Authentication
Principle of Least Privilege
Active Directory
Firewalls
VPN
Additional Security Considerations in Windows
Chapter 32 Wireless Security, Malware, and Social Engineering
2.3 - Compare and contrast wireless security protocols and authentication methods
Wireless and Encryption Protocols
2.4 - Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
Malicious Software Types
Preventing Malicious Software
2.5 - Compare and contrast social engineering, threats, and vulnerabilities
Phishing
Shoulder Surfing
Piggybacking/Tailgating
Dumpster Diving
Impersonation
Additional Attacks and Security Vulnerabilities
Chapter 33 Windows Security Settings and Best Practices
2.6 - Compare and contrast the differences of basic Microsoft Windows OS security settings
Users and Groups
Permissions
File Security
2.7 - Given a scenario, implement security best practices to secure a workstation
Usernames and Passwords
Password Policies
Account Management
Disabling AutoPlay/Autorun
Chapter 34 Mobile Device Security
2.8 - Given a scenario, implement methods for securing mobile devices
Screen Locks
Authenticator Applications
Theft and Loss of Mobile Devices
Compromised and Damaged Devices
Policies and Procedures
Chapter 35 Data Destruction and SOHO Security
2.9 - Given a scenario, implement appropriate data destruction and disposal methods
Formatting Drives
Overwriting Drives
Clear
Purge
Destroy
2.10 - Given a scenario, configure security on SOHO wireless and wired networks
Changing Default Passwords
Wireless-Specific Security Settings
Enabling MAC Filtering
Assigning Static IP Addresses
Disabling Physical Ports and Physical Security
Content Filtering/Parental Controls
A Final Word on SOHO Routers
Core 2 (220-1002) Domain 3.0: Software Troubleshooting
Chapter 36 Troubleshooting Microsoft Windows
3.1 - Given a scenario, troubleshoot Microsoft Windows OS problems
Windows Recovery
Boot Errors
Improper and Spontaneous Shutdowns
Stop Errors
Restoring Windows
Common Windows Symptoms and Solutions
Chapter 37 Troubleshooting PC Security Issues and Malware Removal
3.3 - Given a scenario, use best practice procedures for malware removal
3.2 - Given a scenario, troubleshoot and resolve PC security issues
The CompTIA A+ Seven-Step Malware Removal Procedure
Malware Removal Scenario
Symptoms of Viruses
Symptoms of Spyware
Preventing and Troubleshooting Spam
Hijacked E-mail
More Symptoms of PC Security Issues and Potential Solutions
Chapter 38 Troubleshooting Mobile Operating Systems
3.4 - Given a scenario, troubleshoot mobile OS and application issues
3.5 - Given a scenario, troubleshoot mobile OS and application security issues
Wi-Fi Troubleshooting
Bluetooth Troubleshooting
Troubleshooting E-mail Connections
Troubleshooting and Stopping Applications
Initiating Resets
Additional Mobile Device Troubleshooting
Mobile Device Application and OS Troubleshooting
External Monitor Issues
Troubleshooting Mobile Device Security Issues
Core 2 (220-1002) Domain 4.0: Operational Procedures
Chapter 39 Documentation, Change Management, and Disaster Recovery
4.1 - Compare and contrast best practices associated with types of documentation
Network Topology Diagrams
Knowledge Bases/Articles
Incident Documentation
Compliance and Regulatory Policy
Acceptable Use Policy
Password Policy
Inventory Management
4.2 - Given a scenario, implement basic change management best practices
4.3 - Given a scenario, implement basic disaster prevention and recovery methods
Backup and Recovery
Cloud Storage vs. Local Storage Backups
Account Recovery Options
Chapter 40 Safety Procedures and Environmental Controls
4.4 - Explain common safety procedures
ESD Prevention and Equipment Grounding
Electrical Safety
Electrical Fire Safety
Physical Safety
4.5 - Explain environmental impacts and appropriate controls
Temperature, Humidity, and Air
MSDS and Disposal
Power Devices
Surge Protectors
Uninterruptible Power Supplies
Chapter 41 Incident Response, Communication, and Professionalism
4.6 - Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
Incident Response
Licensing/DRM/EULA
Regulated Data
4.7 - Given a scenario, use proper communication techniques and professionalism
Communication Techniques and Professionalism
Chapter 42 Basic Scripting and Remote Access Technologies
4.8 - Identify the basics of scripting
Basic Data Types
Basic Script Constructs
Environment Variables
Comment Syntax
Script File Types
4.9 - Given a scenario, use remote access technologies
Remote Desktop
SSH
More Third-Party Tools
A+ Core 2 (220-1002) Practice Exam
Chapter 43 Getting Ready for the Exams, and Farewell
Getting Ready for the Exams
Tips for Taking the Real Exams
General Practices for Taking Exams
Smart Methods for Difficult Questions
Wrapping Up the Exam
Beyond the CompTIA A+ Certification
9780789760579 TOC 7/8/2019
Erscheint lt. Verlag | 9.9.2019 |
---|---|
Verlagsort | Upper Saddle River |
Sprache | englisch |
Themenwelt | Informatik ► Weitere Themen ► Zertifizierung |
ISBN-10 | 0-13-661319-5 / 0136613195 |
ISBN-13 | 978-0-13-661319-0 / 9780136613190 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich