CompTIA A+ 220–1002 Certification Practice Test and Syllabus covered

Started by indigo, October 21, 2019, 06:57:51 AM

Previous topic - Next topic

indigo

The A+ 200–1002 exam is one of the exams that could help you in escalating your IT career. The 220–1002 exam focuses on the candidates' knowledge related to installing and configuring PCs and mobile devices, troubleshooting, resolving and documenting software and hardware issues, and network infrastructure concepts. If you successfully pass the CompTIA A+ 220–1002 exam then you can get your dream job in any IT firm you want, but the 220–1002 exam is not easy to pass in the first try. You need good learning material, practice tests to prepare for the 220–1002 exam.

So now a question may be raised in your mind where can I find a good practice test for A+ 220–1002 preparation. The simple solution to your question is SimulationExams.com. The practice exams from simulationexams are prepared by experts in the field which helps you in understanding the deep subject of the A+ 1002 exam. The practice exam offers one of the best exam environment with the time laps and progress report for your better improvement.
Well, If you want to try the demo version of the CompTIA A+ 220–1002 Practice test you can try with a maximum of 25 A+ practice questions. The demo version completely describes the features of the software.

More features of A+ Practice Test:
•   Include 325+ highly relevant questions
•   Flashcards
•   Integrated Test Engine with online feedback
•   Category wise scoring, and reporting
•   The question types include Multiple Choice, True/False, Exhibit, etc.
•   Conforms to the latest exam objectives
•   Instant online activation using program interface

The question types include multiple-choice questions, drag-n-drop and exhibit based. The exam objectives covered for the CompTIA A+ core2 practice test include Operating Systems, Security, Software Troubleshooting, and Operational Procedures. You can also check A+ core2 cram notes which is completely free.

Disclaimer: Simulationexams.com is neither associated nor affiliated with CompTIA® or any other company. A+™, Network+™, Security+™, Server+™ are trademarks of CompTIA® and duly acknowledged.

certforumz


certforumz

The CompTIA A+ Core 1 certification is mainly targeted to those candidates who want to build their career in Core domain. The CompTIA A+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA A Plus (Core 1).

1.0 Mobile Devices 14%
2.0 Networking 20%
3.0 Hardware 27%
4.0 Virtualization and Cloud Computing 12%
5.0 Hardware and Network Troubleshooting 27%
Total:   100%


CompTIA A+ Core 1 Exam Summary:
Exam Name   CompTIA A+
Exam Code   220-1001
Exam Price   $246 (USD)
Duration   90 mins
Number of Questions   90
Passing Score   675 / 900

Sample Questions:   CompTIA A+ Core 1 Sample Questions
Practice Exam   CompTIA 220-1001 Certification Practice Exam

CompTIA 220-1001 Exam Syllabus Topics:

Mobile Devices - 14%
I. Given a scenario, install and configure laptop hardware and components.   
1. Hardware/device replacement
Keyboard
Hard drive
- SSD vs. hybrid vs. magnetic disk
- 1.8in vs. 2.5in
Memory
Smart card reader
Optical drive
Wireless card/Bluetooth module
Cellular card
Video card
Mini PCIe
Screen
DC jack
Battery
Touchpad
Plastics/frames
Speaker
System board
CPU

1.2 Given a scenario, install components within the display of a laptop.   

1. Types
LCD
OLED
2. WiFi antenna connector/placement
3. Webcam
4. Microphone
5. Inverter
6. Digitizer/touchscreen

1.2 Given a scenario, use appropriate laptop features.   

Special function keys
Dual displays
Wireless (on/off)
Cellular (on/off)
Volume settings
Screen brightness
Bluetooth (on/off)
Keyboard backlight
Touchpad (on/off)
Screen orientation
Media options (fast forward/rewind)
GPS (on/off)
Airplane mode
2. Docking station
3. Port replicator
4. Physical laptop lock and cable lock
5. Rotating/removable screens

1.3 Compare and contrast characteristics of various types of other mobile devices.   
1. Tablets
2. Smartphones
3. Wearable technology devices
Smart watches
Fitness monitors
VR/AR headsets
4. E-readers
5. GPS

1.4 Given a scenario, connect and configure accessories and ports of other mobile devices.   
1. Connection types
Wired
- Micro-USB/Mini-USB/USB-C
- Lightning
- Tethering
- Proprietary vendor-specific ports (communication/power)
Wireless
- NFC
- Bluetooth
- IR
- Hotspot

2. Accessories

Headsets
Speakers
Game pads
Extra battery packs/battery chargers
Protective covers/waterproofing
Credit card readers
Memory/MicroSD

Given a scenario, configure basic mobile device network connectivity and application support.

1. Wireless/cellular data network (enable/disable)
Hotspot
Tethering
Airplane mode

2. Bluetooth

Enable Bluetooth
Enable pairing
Find a device for pairing
Enter the appropriate pin code
Test connectivity
3. Corporate and ISP email configuration

POP3
IMAP
Port and SSL settings
S/MIME
4. Integrated commercial provider email configuration

iCloud
Google/Inbox
Exchange Online
Yahoo
5. PRI updates/PRL updates/ baseband updates
6. Radio firmware
7. IMEI vs. IMSI
8. VPN

Given a scenario, use methods to perform mobile device synchronization.

1. Synchronization methods
Synchronize to the cloud
Synchronize to the desktop
Synchronize to the automobile
2. Types of data to synchronize

Contacts
Applications
Email
Pictures
Music
Videos
Calendar
Bookmarks
Documents
Location data
Social media data
E-books
Passwords
3. Mutual authentication for multiple services (SSO)
4. Software requirements to install the application on the PC
5. Connection types to enable synchronization

Networking - 20%
Compare and contrast TCP and UDP ports, protocols, and their purposes.   1. Ports and protocols
21 – FTP
22 – SSH
23 – Telnet
25 – SMTP
53 – DNS
80 – HTTP
110 – POP3
143 – IMAP
443 – HTTPS
3389 – RDP
137-139 – NetBIOS/NetBT
445 – SMB/CIFS
427 – SLP
548 – AFP
67/68 – DHCP
389 – LDAP
161/162 – SNMP
2. TCP vs. UDP

Compare and contrast common networking hardware devices.   
1. Routers
2. Switches
Managed
Unmanaged
3. Access points
4. Cloud-based network controller
5. Firewall
6. Network interface card
7. Repeater
8. Hub
9. Cable/DSL modem
10. Bridge
11. Patch panel

12. Power over Ethernet (PoE)

Injectors
Switch
13. Ethernet over Power

Given a scenario, install and configure a basic wired/wireless SOHO network.   
1. Router/switch functionality
2. Access point settings
3. IP addressing
4. NIC configuration
Wired
Wireless
5. End-user device configuration
6. IoT device configuration

Thermostat
Light switches
Security cameras
Door locks
Voice-enabled, smart speaker/digital assistant
7. Cable/DSL modem configuration
8. Firewall settings

Screened subnet (previously known as demilitarized zone)
Port forwarding
NAT
UPnP
Allow list/deny list
MAC filtering
9. QoS
10. Wireless settings

Encryption
Channels
Compare and contrast wireless networking protocols.   1. 802.11a
2. 802.11b
3. 802.11g
4. 802.11n
5. 802.11ac
6. Frequencies
2.4Ghz
5Ghz
7. Channels

1–11
8. Bluetooth
9. NFC
10. RFID
11. Zigbee
12. Z-Wave
13. 3G
14. 4G
15. 5G
16. LTE

Summarize the properties and purposes of services provided by networked hosts.   1. Server roles
Web server
File server
Print server
DHCP server
DNS server
Proxy server
Mail server
Authentication server
syslog
2. Internet appliance

UTM
IDS
IPS
End-point management server
3. Legacy/embedded systems

Explain common network configuration concepts.   1. IP addressing
Static
Dynamic
APIPA
Link local
2. DNS
3. DHCP

Reservations
4. IPv4 vs. IPv6
5. Subnet mask
6. Gateway
7. VPN
8. VLAN
9. NAT

Compare and contrast Internet connection types, network types, and their features.   1. Internet connection types
Cable
DSL
Dial-up
Fiber
Satellite
ISDN
Cellular
- Tethering
- Mobile hotspot
Line-of-sight wireless Internet service
2. Network types

LAN
WAN
PAN
MAN
WMN

Given a scenario, use appropriate networking tools.   

1. Crimper
2. Cable stripper
3. Multimeter
4. Tone generator and probe
5. Cable tester
6. Loopback plug
7. Punchdown tool
8. WiFi analyzer

Hardware - 27%

Explain basic cable types, features, and their purposes.   1. Network cables
Ethernet
- Cat 5
- Cat 5e
- Cat 6
- Plenum
- Shielded twisted pair
- Unshielded twisted pair
- 568A/B
Fiber
Coaxial
Speed and transmission limitations
2. Video cables

VGA
HDMI
Mini-HDMI
DisplayPort
DVI (DVI-D/DVI-I)
3. Multipurpose cables

Lightning
Thunderbolt
USB
USB-C
USB 2.0
USB 3.0
4. Peripheral cables

Serial
5. Hard drive cables

SATA
IDE
SCSI
6. Adapters

DVI to HDMI
USB to Ethernet
DVI to VGA
Identify common connector types.   1. RJ-11
2. RJ-45
3. RS-232
4. BNC
5. RG-59
6. RG-6
7. USB
8. Micro-USB
9. Mini-USB
10. USB-C
11. DB-9
12. Lightning
13. SCSI
14. eSATA
15. Molex

Given a scenario, install RAM types.   
1. RAM types
SODIMM
DDR2
DDR3
DDR4
2. Single channel
3. Dual channel
4. Triple channel
5. Error correcting
6. Parity vs. non-parity

Given a scenario, select, install and configure storage devices.   

1. Optical drives
CD-ROM/CD-RW
DVD-ROM/DVD-RW/DVD-RW DL
Blu-ray
BD-R
BD-RE
2. Solid-state drives

M2 drives
NVME
SATA 2.5
3. Magnetic hard drives

5,400rpm
7,200rpm
10,000rpm
15,000rpm
Sizes:
- 2.5
- 3.5
4. Hybrid drives
5. Flash

SD card
CompactFlash
Micro-SD card
Mini-SD card
xD
6. Configurations

RAID 0, 1, 5, 10
Hot swappable

Given a scenario, install and configure motherboards, CPUs, and add-on cards.   

1. Motherboard form factor

ATX
mATX
ITX
mITX
2. Motherboard connectors types

PCI
PCIe
Riser card
Socket types
SATA
IDE
Front panel connector
Internal USB connector
3. BIOS/UEFI settings

Boot options
Firmware updates
Security settings
Interface configurations
Security
1. Passwords
2. Drive encryption
- TPM
- LoJack
- Secure boot
4. CMOS battery
5. CPU features

Single-core
Multicore
Virtualization
Hyperthreading
Speeds
Overclocking
Integrated GPU
6. Compatibility

AMD
Intel
7. Cooling mechanism

Fans
Heat sink
Liquid
Thermal paste
8. Expansion cards

Video cards
- Onboard
- Add-on card
Sound cards
Network interface card
USB expansion card
eSATA card
Explain the purposes and uses of various peripheral types.   1. Printer
2. ADF/flatbed scanner
3. Barcode scanner/QR scanner
4. Monitors
5. VR headset
6. Optical drive types
7. Mouse
8. Keyboard
9. Touchpad
10. Signature pad
11. Game controllers
12. Camera/webcam
13. Microphone
14. Speakers
15. Headset
16. Projector
Lumens/brightness
17. External storage drives
18. KVM
19. Magnetic reader/chip reader
20. NFC/tap pay device
21. Smart card reader

Summarize power supply types and features.   1. Input 115V vs. 220V
2. Output 5V vs. 12V
3. 24-pin motherboard adapter
4. Wattage rating
5. Number of devices/types of devices to be powered

Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs.   

1. Graphic/CAD/CAM design workstation
SSD
High-end video
Maximum RAM
2. Audio/video editing workstation

Specialized audio and video card
Large, fast hard drive
Dual monitors
3. Virtualization workstation

Maximum RAM and CPU cores
4. Gaming PC

SSD
High-end video/specialized GPU
High-definition sound card
High-end cooling
5. Network attached storage device

Media streaming
File sharing
Gigabit NIC
RAID array
Hard drive
6. Standard thick client

Desktop applications
Meets recommended requirements for selected OS
7. Thin client

Basic applications
Meets minimum requirements for selected OS
Network connectivity

Given a scenario, install and configure common devices.   

1. Desktop
Thin client
Thick client
Account setup/settings
2. Laptop/common mobile devices

Touchpad configuration
Touchscreen configuration
Application installations/configurations
Synchronization settings
Account setup/settings
Wireless settings

Given a scenario, configure SOHO multifunction devices/printers and settings.   

1. Use appropriate drivers for a given operating system
Configuration settings
- Duplex
- Collate
- Orientation
- Quality
2. Device sharing

Wired
- USB
- Serial
- Ethernet
Wireless
- Bluetooth
- 802.11(a, b, g, n, ac)
- Infrastructure vs. ad hoc
Integrated print server (hardware)
Cloud printing/remote printing
3. Public/shared devices

Sharing local/networked device via operating system settings
- TCP/Bonjour/AirPrint
Data privacy
- User authentication on the device
- Hard drive caching

Given a scenario, install and maintain various print technologies.   

1. Laser
Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing assembly
Imaging process: processing, charging, exposing, developing, transferring, fusing, and cleaning
Maintenance: Replace toner, apply maintenance kit, calibrate, clean
2. Inkjet

Ink cartridge, print head, roller, feeder, duplexing assembly, carriage, and belt
Calibrate
Maintenance: Clean heads, replace cartridges, calibrate, clear jams
3. Thermal

Feed assembly, heating element
Special thermal paper
Maintenance: Replace paper, clean heating element, remove debris
4. Impact

Print head, ribbon, tractor feed
Impact paper
Maintenance: Replace ribbon, replace print head, replace paper
5. Virtual

Print to file
Print to PDF
Print to XPS
Print to image
6. 3D printers

Plastic filament

Virtualization and Cloud Computing - 12%

Compare and contrast cloud computing concepts.   1. Common cloud models
IaaS
SaaS
PaaS
Public vs. private vs. hybrid vs. community
2. Shared resources

Internal vs. external
3. Rapid elasticity
4. On-demand
5. Resource pooling
6. Measured service
7. Metered
8. Off-site email applications
9. Cloud file storage services

Synchronization apps
10. Virtual application streaming/cloud-based applications

Applications for cell phones/tablets
Applications for laptops/desktops
11. Virtual desktop

Virtual NIC

Given a scenario, set up and configure client-side virtualization.   

1. Purpose of virtual machines
2. Resource requirements
3. Emulator requirements
4. Security requirements
5. Network requirements
6. Hypervisor

Hardware and Network Troubleshooting - 27%

Given a scenario, use the best practice methodology to resolve problems.   - Always consider corporate policies, procedures, and impacts before implementing changes
1. Identify the problem
Question the user and identify user changes to computer and perform backups before making changes
Inquire regarding environmental or infrastructure changes
Review system and application logs
2. Establish a theory of probable cause (question the obvious)

If necessary, conduct external or internal research based on symptoms
3. Test the theory to determine cause

Once the theory is confirmed, determine the next steps to resolve problem
If theory is not confirmed re-establish new theory or escalate
4. Establish a plan of action to resolve the problem and implement the solution
5. Verify full system functionality and, if applicable, implement preventive measures
6. Document findings, actions, and outcomes

Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power.

1. Common symptoms
Unexpected shutdowns
System lockups
POST code beeps
Blank screen on bootup
BIOS time and setting resets
Attempts to boot to incorrect device
Continuous reboots
No power
Overheating
Loud noise
Intermittent device failure
Fans spin – no power to other devices
Indicator lights
Smoke
Burning smell
Proprietary crash screens (BSOD/pin wheel)
Distended capacitors
Log entries and error messages

Given a scenario, troubleshoot hard drives and RAID arrays.   

1. Common symptoms
Read/write failure
Slow performance
Loud clicking noise
Failure to boot
Drive not recognized
OS not found
RAID not found
RAID stops working
Proprietary crash screens (BSOD/pin wheel)
S.M.A.R.T. errors

Given a scenario, troubleshoot video, projector, and display issues.   

1. Common symptoms
VGA mode
No image on screen
Overheat shutdown
Dead pixels
Artifacts
Incorrect color patterns
Dim image
Flickering image
Distorted image
Distorted geometry
Burn-in
Oversized images and icons

Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.

1. Common symptoms
No display
Dim display
Flickering display
Sticking keys
Intermittent wireless
Battery not charging
Ghost cursor/pointer drift
No power
Num lock indicator lights
No wireless connectivity
No Bluetooth connectivity
Cannot display to external monitor
Touchscreen non-responsive
Apps not loading
Slow performance
Unable to decrypt email
Extremely short battery life
Overheating
Frozen system
No sound from speakers
GPS not functioning
Swollen battery
2. Disassembling processes for proper reassembly

Document and label cable and screw locations
Organize parts
Refer to manufacturer resources
Use appropriate hand tools

Given a scenario, troubleshoot printers.   

1. Common symptoms
Streaks
Faded prints
Ghost images
Toner not fused to the paper
Creased paper
Paper not feeding
Paper jam
No connectivity
Garbled characters on paper
Vertical lines on page
Backed-up print queue
Low memory errors
Access denied
Printer will not print
Color prints in wrong print color
Unable to install printer
Printing blank pages
No image on printer display
Multiple failed jobs in logs

Given a scenario, troubleshoot common wired and wireless network problems.   

1. Common symptoms
Limited connectivity
Unavailable resources
1. Internet
2. Local resources
- Shares
- Printers
- Email
No connectivity
APIPA/link local address
Intermittent connectivity
IP conflict
Slow transfer speeds
Low RF signal
SSID not found
To ensure success in CompTIA A Plus (Core 1) certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA A+ (Core 1) (220-1001) exam.

certforumz

Comptia A+ Core 2 exam topics:

1.0 Operating Systems 27%
2.0 Security 24%
3.0 Software Troubleshooting 26%
4.0 Operational Procedures 23%
Total 100%


CompTIA A+ Core 2 Exam Summary:

Exam Name   CompTIA A+
Exam Code   220-1002
Exam Price   $246 (USD)
Duration   90 mins
Number of Questions   90
Passing Score   700 / 900
Books / Training    A+ Exam Notes
Schedule Exam   CompTIA Marketplace
Pearson VUE

Sample Questions   CompTIA A+ Core 2 Sample Questions
Practice Exam   CompTIA 220-1002 Certification Practice Exam

CompTIA 220-1002 Exam Syllabus Topics:

Operating Systems - 27%


Compare and contrast common operating system types and their purposes.   1. 32-bit vs. 64-bit
RAM limitations
Software compatibility
2. Workstation operating systems

Microsoft Windows
Apple Macintosh OS
Linux
3. Cell phone/tablet operating systems

Microsoft Windows
Android
iOS
Chrome OS
4. Vendor-specific limitations

End-of-life
Update limitations
5. Compatibility concerns between operating systems

Compare and contrast features of Microsoft Windows versions.   1. Windows 7
2. Windows 8
3. Windows 8.1
4. Windows 10
5. Corporate vs. personal needs
Domain access
BitLocker
Media center
BranchCache
EFS
6. Desktop styles/user interface

Summarize general OS installation considerations and upgrade methods.   1. Boot methods
Optical disc(CD-ROM, DVD, Blu-ray)
External drive/flash drive (USB/eSATA)
Network boot (PXE)
Internal fixed disk (HDD/SSD)
Internal hard drive (partition)
2. Type of installations

Unattended installation
In-place upgrade
Clean install
Repair installation
Multiboot
Remote network installation
Image deployment
Recovery partition
Refresh/restore
3. Partitioning

Dynamic
Basic
Primary
Extended
Logical
GPT
4. File system types/formatting

ExFAT
FAT32
NTFS
CDFS
NFS
ext3, ext4
HFS
Swap partition
Quick format vs. full format
5. Load alternate third-party drivers when necessary
6. Workgroup vs. Domain setup
7. Time/date/region/language settings
8. Driver installation, software, and Windows updates
9. Factory recovery partition
10. Properly formatted boot drive with the correct partitions/format
11. Prerequisites/hardware compatibility
12. Application compatibility
13. OS compatibility/upgrade path

Given a scenario, use appropriate Microsoft command line tools.   1. Navigation
dir
cd
..
2. ipconfig
3. ping
4. tracert
5. netstat
6. nslookup
7. shutdown
8. dism
9. sfc
10. chkdsk
11. diskpart
12. taskkill
13. gpupdate
14. gpresult
15. format
16. copy
17. xcopy
18. robocopy
19. net use
20. net user
21. [command name] /?
22. Commands available with standard privileges vs. administrative privileges

Given a scenario, use Microsoft operating system features and tools.   1. Administrative
Computer Management
Device Manager
Local Users and Groups
Local Security Policy
Performance Monitor
Services
System Configuration
Task Scheduler
Component Services
Data Sources
Print Management
Windows Memory Diagnostics
Windows Firewall
Advanced Security
Event Viewer
User Account Management
2. MSConfig

General
Boot
Services
Startup
Tools
3. Task Manager

Applications
Processes
Performance
Networking
Users
4. Disk Management

Drive status
Mounting
Initializing
Extending partitions
Splitting partitions
Shrink partitions
Assigning/changing drive letters
Adding drives
Adding arrays
Storage spaces
5. System utilities

Regedit
Command
Services.msc
MMC
MSTSC
Notepad
Explorer
Msinfo32
DxDiag
Disk Defragmenter
System Restore
Windows Update
Given a scenario, use Microsoft Windows Control Panel utilities.   1. Internet Options
Connections
Security
General
Privacy
Programs
Advanced
2. Display/Display Settings

Resolution
Color depth
Refresh rate
3. User Accounts
4. Folder Options

View hidden files
Hide extensions
General options
View options
5. System

Performance (virtual memory)
Remote settings
System protection
6. Windows Firewall
7. Power Options

Hibernate
Power plans
Sleep/suspend
Standby
8. Credential Manager
9. Programs and features
10. HomeGroup
11. Devices and Printers
12. Sound
13. Troubleshooting
14. Network and Sharing Center
15. Device Manager
16. BitLocker
17. Sync Center

Summarize application installation and configuration concepts.   1. System requirements
Drive space
RAM
2. OS requirements

Compatibility
3. Methods of installation and deployment

Local (CD/USB)
Network-based
4. Local user permissions

Folder/file access for installation
5. Security considerations

Impact to device
Impact to network
Given a scenario, configure Microsoft Windows networking on a client/desktop.   1. HomeGroup vs. Workgroup
2. Domain setup
3. Network shares/administrative shares/mapping drives
4. Printer sharing vs. network printer mapping
5. Establish networking connections
VPN
Dial-ups
Wireless
Wired
WWAN (Cellular)
6. Proxy settings
7. Remote Desktop Connection
8. Remote Assistance
9. Home vs. Work vs. Public network settings
10. Firewall settings

Exceptions
Configuration
Enabling/disabling Windows Firewall
11. Configuring an alternative IP address in Windows

IP addressing
Subnet mask
DNS
Gateway
12. Network card properties

Half duplex/full duplex/auto
Speed
Wake-on-LAN
QoS
BIOS (on-board NIC)
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.   1. Best practices
Scheduled backups
Scheduled disk maintenance
System updates/App Store
Patch management
Driver/firmware updates
Antivirus/Anti-malware updates
2. Tools

Backup/Time Machine
Restore/Snapshot
Image recovery
Disk maintenance utilities
Shell/Terminal
Screen sharing
Force Quit
3. Features

Multiple desktops/Mission Control
Key Chain
Spot Light
iCloud
Gestures
Finder
Remote Disc
Dock
Boot Camp
4. Basic Linux commands

ls
grep
cd
shutdown
pwd vs. passwd
mv
cp
rm
chmod
chown
iwconfig/ifconfig
ps
su/sudo
apt-get
vi
dd
kill

Security - 24%

Summarize the importance of physical security measures.   1. Access control vestibule
2. Badge reader
3. Smart card
4. Security guard
5. Door lock
6. Biometric locks
7. Hardware tokens
8. Cable locks
9. Server locks
10. USB locks
11. Privacy screen
12. Key fobs
13. Entry control roster
Explain logical security concepts.   1. Active Directory
Login script
Domain
Group Policy/Updates
Organizational Units
Home Folder
Folder redirection
2. Software tokens
3. MDM policies
4. Port security
5. MAC address filtering
6. Certificates
7. Antivirus/Anti-malware
8. Firewalls
9. User authentication/strong passwords
10. Multifactor authentication
11. Directory permissions
12. VPN
13. DLP
14. Access control lists
15. Smart card
16. Email filtering
17. Trusted/untrusted software sources
18. Principle of least privilege

Compare and contrast wireless security protocols and authentication methods.   1. Protocols and encryption
WEP
WPA
WPA2
TKIP
AES
2. Authentication

Single-factor
Multifactor
RADIUS
TACACS
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.   1. Malware
Ransomware
Trojan
Keylogger
Rootkit
Virus
Botnet
Worm
Spyware
2. Tools and methods

Antivirus
Anti-malware
Recovery console
Backup/restore
End user education
Software firewalls
DNS configuration
Compare and contrast social engineering, threats, and vulnerabilities.   1. Social engineering
Phishing
Spear phishing
Impersonation
Shoulder surfing
Tailgating
Dumpster diving
2. DDoS
3. DoS
4. Zero-day
5. On-path attack (previously known as man-in-the-middle attack)
6. Brute force
7. Dictionary
8. Rainbow table
9. Spoofing
10. Non-compliant systems
11. Zombie

Compare and contrast the differences of basic Microsoft Windows OS security settings.   1. User and groups
Administrator
Power user
Guest
Standard user
2. NTFS vs. share permissions

Allow vs. deny
Moving vs. copying folders and files
File attributes
3. Shared files and folders

Administrative shares vs. local shares
Permission propagation
Inheritance
4. System files and folders
5. User authentication

Single sign-on
6. Run as administrator vs. standard user
7. BitLocker
8. BitLocker To Go
9. EFS

Given a scenario, implement security best practices to secure a workstation.   1. Password best practices
Setting strong passwords
Password expiration
Screensaver required password
BIOS/UEFI passwords
Requiring passwords
2. Account management

Restricting user permissions
Logon time restrictions
Disabling guest account
Failed attempts lockout
Timeout/screen lock
Change default admin user account/password
Basic Active Directory functions
1. Account creation
2. Account deletion
3. Password reset/unlock account
4. Disable account
3. Disable autorun
4. Data encryption
5. Patch/update management

Given a scenario, implement methods for securing mobile devices.   1. Screen locks
Fingerprint lock
Face lock
Swipe lock
Passcode lock
2. Remote wipes
3. Locator applications
4. Remote backup applications
5. Failed login attempts restrictions
6. Antivirus/Anti-malware
7. Patching/OS updates
8. Biometric authentication
9. Full device encryption
10. Multifactor authentication
11. Authenticator applications
12. Trusted sources vs. untrusted sources
13. Firewalls
14. Policies and procedures

BYOD vs. corporate-owned
Profile security requirements
Given a scenario, implement appropriate data destruction and disposal methods.   1. Physical destruction
Shredder
Drill/hammer
Electromagnetic (Degaussing)
Incineration
Certificate of destruction
2. Recycling or repurposing best practices

Low-level format vs. standard format
Overwrite
Drive wipe
Given a scenario, configure security on SOHO wireless and wired networks.   1. Wireless-specific
Changing default SSID
Setting encryption
Disabling SSID broadcast
Antenna and access point placement
Radio power levels
WPS
2. Change default usernames and passwords
3. Enable MAC filtering
4. Assign static IP addresses
5. Firewall settings
6. Port forwarding/mapping
7. Disabling ports
8. Content filtering/parental controls
9. Update firmware
10. Physical security

Software Troubleshooting - 26%

Given a scenario, troubleshoot Microsoft Windows OS problems.   1. Common symptoms
Slow performance
Limited connectivity
Failure to boot
No OS found
Application crashes
Blue screens
Blank screens
Printing issues
Services fail to start
Slow bootup
Slow profile load
2. Common solutions

Defragment the hard drive
Reboot
Kill tasks
Restart services
Update network settings
Reimage/reload OS
Roll back updates
Roll back devices drivers
Apply updates
Repair application
Update boot order
Disable Windows services/applications
Disable application startup
Safe boot
Rebuild Windows profiles
Given a scenario, troubleshoot and resolve PC security issues.   1. Common symptoms
Pop-ups
Browser redirection
Security alerts
Slow performance
Internet connectivity issues
PC/OS lockup
Application crash
OS updates failures
Rogue antivirus
Spam
Renamed system files
Disappearing files
File permission changes
Hijacked email
- Responses from users regarding email
- Automated replies from unknown sent email
Access denied
Invalid certificate (trusted root CA)
System/application log errors
Given a scenario, use best practice procedures for malware removal.   1. Identify and research malware symptoms.
2. Quarantine the infected systems.
3. Disable System Restore (in Windows).
4. Remediate the infected systems.
Update the anti-malware software.
Scan and use removal techniques (safe mode, pre-installation environment).
5. Schedule scans and run updates.
6. Enable System Restore and create a restore point (in Windows).
7. Educate the end user.

Given a scenario, troubleshoot mobile OS and application issues.   1. Common symptoms
Dim display
Intermittent wireless
No wireless connectivity
No Bluetooth connectivity
Cannot broadcast to external monitor
Touchscreen non-responsive
Apps not loading
Slow performance
Unable to decrypt email
Extremely short battery life
Overheating
Frozen system
No sound from speakers
Inaccurate touch screen response
System lockout
App log errors
Given a scenario, troubleshoot mobile OS and application security issues.   1. Common symptoms
Signal drop/weak signal
Power drain
Slow data speeds
Unintended WiFi connection
Unintended Bluetooth pairing
Leaked personal files/data
Data transmission over limit
Unauthorized account access
Unauthorized location tracking
Unauthorized camera/microphone activation
High resource utilization

Operational Procedures - 23%

Compare and contrast best practices associated with types of documentation.   1. Network topology diagrams
2. Knowledge base/articles
3. Incident documentation
4. Regulatory and compliance policy
5. Acceptable use policy
6. Password policy
7. Inventory management
Asset tags
Barcodes
Given a scenario, implement basic change management best practices.   1. Documented business processes
2. Purpose of the change
3. Scope the change
4. Risk analysis
5. Plan for change
6. End-user acceptance
7. Change board
Approvals
8. Backout plan
9. Document changes

Given a scenario, implement basic disaster prevention and recovery methods.   1. Backup and recovery
Image level
File level
Critical applications
2. Backup testing
3. UPS
4. Surge protector
5. Cloud storage vs. local storage backups
6. Account recovery options

Explain common safety procedures.   1. Equipment grounding
2. Proper component handling and storage
Antistatic bags
ESD straps
ESD mats
Self-grounding
3. Toxic waste handling

Batteries
Toner
CRT
Cell phones
Tablets
4. Personal safety

Disconnect power before repairing PC
Remove jewelry
Lifting techniques
Weight limitations
Electrical fire safety
Cable management
Safety goggles
Air filter mask
5. Compliance with government regulations

Explain environmental impacts and appropriate controls.   1. MSDS documentation for handling and disposal
2. Temperature, humidity level awareness, and proper ventilation
3. Power surges, under-voltage events, and power loss
Battery backup
Surge suppressor
4. Protection from airborne particles

Enclosures
Air filters/mask
5. Dust and debris

Compressed air
Vacuums
6. Compliance to government regulations

Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.   1. Incident response
First response
- Identify
- Report through proper channels
- Data/device preservation
Use of documentation/documentation changes
Chain of custody
Tracking of evidence/documenting process
2. Licensing/DRM/EULA

Open-source vs. commercial license
Personal license vs. enterprise licenses
3. Regulated data

PII
PCI
GDPR
PHI
4. Follow all policies and security best practices

Given a scenario, use proper communication techniques and professionalism.   1. Use proper language and avoid jargon, acronyms, and slang, when applicable
2. Maintain a positive attitude/project confidence
3. Actively listen (taking notes) and avoid interrupting the customer
4. Be culturally sensitive
Use appropriate professional titles, when applicable
5. Be on time (if late, contact the customer)
6. Avoid distractions

Personal calls
Texting/social media sites
Talking to coworkers while interacting with customers
Personal interruptions
7. Dealing with difficult customers or situations

Do not argue with customers and/or be defensive
Avoid dismissing customer problems
Avoid being judgmental
Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
Do not disclose experiences via social media outlets
8. Set and meet expectations/timeline and communicate status with the customer

Offer different repair/replacement options, if applicable
Provide proper documentation on the services provided
Follow up with customer/user at a later date to verify satisfaction
9. Deal appropriately with customers' confidential and private materials

Located on a computer, desktop, printer, etc.
Identify the basics of scripting.   1. Script file types
.bat
.ps1
.vbs
.sh
.py
.js
2. Environment variables
3. Comment syntax
4. Basic script constructs

Basic loops
Variables
5. Basic data types

Integers
Strings
Given a scenario, use remote access technologies.   1. RDP
2. Telnet
3. SSH
4. Third-party tools
Screen share feature
File share
5. Security considerations of each access method

To ensure success in CompTIA A Plus (Core 2) certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA A+ (Core 2) (220-1002) exam.