Introduction xxxi Part I CompTIA A+ Core 1 Exam 220-1001 1 Chapter 1 Mobile Devices 3 1.1 Given a scenario, install and configure laptop hardware and components 8 1.2 Given a scenario, install components within the display of a laptop 15 1.3 Given a scenario, use appropriate laptop features. 19 1.4 Compare and contrast characteristics of various types of other mobile devices. 26 1.5 Given a scenario, connect, and configure accessories and ports of other mobile devices.
31 1.6 Given a scenario, configure basic mobile device network connectivity and application support. 39 1.7 Given a scenario, use methods to perform mobile device synchronization. 50 Review Questions 54 Chapter 2 Networking 57 2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes. 62 2.2 Compare and contrast common networking hardware devices.
65 2.3 Given a scenario, install and configure a basic wired/ wireless SOHO network. 71 2.4 Compare and contrast wireless networking protocols. 82 2.5 Summarize the properties and purposes of services provided by networked hosts. 86 2.6 Explain common network configuration concepts.
90 2.7 Compare and contrast Internet connection types, network types, and their features. 99 2.8 Given a scenario, use appropriate networking tools. 102 Review Questions 106 Chapter 3 Hardware 111 3.1 Explain basic cable types, features, and their purposes. 120 3.2 Identify common connector types.
136 3.3 Given a scenario, install RAM types. 141 3.4 Given a scenario, select, install, and configure storage devices. 147 3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards. 159 3.6 Explain the purposes and uses of various peripheral types.
183 3.7 Summarize power supply types and features. 189 3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs. 194 3.9 Given a scenario, install and configure common devices. 200 3.10 Given a scenario, configure SOHO multifunction devices/printers and settings.
202 3.11 Given a scenario, install and maintain various print technologies. 208 Review Questions 228 Chapter 4 Virtualization and Cloud Computing 235 4.1 Compare and contrast cloud computing concepts. 237 4.2 Given a scenario, set up and configure client-side virtualization. 242 Review Questions 246 Chapter 5 Hardware and Network Troubleshooting 249 5.1 Given a scenario, use the best practice methodology to resolve problems.
254 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power. 258 5.3 Given a scenario, troubleshoot hard drives and RAID arrays. 268 5.4 Given a scenario, troubleshoot video, projector, and display issues. 272 5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.
278 5.6 Given a scenario, troubleshoot printers. 289 5.7 Given a scenario, troubleshoot common wired and wireless network problems. 297 Review Questions 305 Part II CompTIA A+ Core 2 Exam 220-1002 309 Chapter 6 Operating Systems 311 1.1 Compare and contrast common operating system types and their purposes. 321 1.2 Compare and contrast features of Microsoft Windows 1.
3 Summarize general OS installation considerations and 1.4 Given a scenario, use appropriate Microsoft command-line tools. 351 1.5 Given a scenario, use Microsoft operating system features and tools. 372 1.6 Given a scenario, use Microsoft Windows Control Panel utilities. 400 1.7 Summarize application installation and configuration concepts.
424 1.8 Given a scenario, configure Microsoft Windows Printer sharing vs. network printer mapping 429 1.9 Given a scenario, use features and tools of the MacOS and Linux client/desktop operating systems. 440 Review Questions 460 Chapter 7 Security 463 2.1 Summarize the importance of physical security measures. 470 2.2 Explain logical security concepts.
474 2.3 Compare and contrast wireless security protocols and authentication methods. 486 2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods. 489 2.5 Compare and contrast social engineering, threats, and vulnerabilities. 500 2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings.
505 2.7 Given a scenario, implement security best practices to secure a workstation. 514 2.8 Given a scenario, implement methods for securing mobile devices. 520 2.9 Given a scenario, implement appropriate data destruction and disposal methods. 527 2.10 Given a scenario, configure security on SOHO wireless and wired networks.
530 Review Questions 536 Chapter 8 Software Troubleshooting 541 3.1 Given a scenario, troubleshoot Microsoft Windows OS problems. 545 3.2 Given a scenario, troubleshoot and resolve PC security issues. 557 3.3 Given a scenario, use best practice procedures for malware removal. 562 3.4 Given a scenario, troubleshoot mobile OS and application issues.
564 3.5 Given a scenario, troubleshoot mobile OS and application security issues. 571 Chapter 9 Operational Procedures 577 4.1 Compare and contrast best practices associated with types of documentation. 582 4.2 Given a scenario, implement basic change management best practices. 587 4.3 Given a scenario, implement basic disaster prevention and recovery methods.
590 4.4 Explain common safety procedures. 596 4.5 Explain environmental impacts and appropriate controls. 603 4.6 Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts. 608 4.7 Given a scenario, use proper communication techniques and professionalism.
613 4.8 Identify the basics of scripting. 619 4.9 Given a scenario, use remote access technologies. 622 Review Questions 627 Appendix Answers to Review Questions 631 Chapter 1: Mobile Devices 632 Chapter 2: Networking 634 Chapter 3: Hardware 636 Chapter 4: Virtualization and Cloud Computing 640 Chapter 5: Hardware and Network Troubleshooting 641 Chapter 6: Operating Systems 642 Chapter 7: Security 645 Chapter 8: Software Troubleshooting 648 Chapter 9: Operational Procedures 649 Index 651.