A comprehensive step-by-step review for A+ certification, revised for the latest exams
The CompTIA A+ Complete Review Guide: Exam 220-1001 and Exam 220-1002, Fourth Edition is an ideal preparation tool to help you ace the exam and get certified. The must-have companion to the CompTIA A+ Complete Study Guide, this book provides a streamlined review of vital exam topics, helping you reinforce comprehension and strengthen retention. Now in its fourth edition, this review guide has been fully updated to focus on the latest best practices and new exam objectives. A clear and concise review structure helps you to focus on problem areas while logically organized topics allow for quick reference and flexible study. Covering both A+ exams, this book covers topics including PC hardware, networking, operating systems and procedures, security, troubleshooting, and more. Access to the Sybex online learning environment includes practice test questions, bonus exams, electronic flashcards, and a searchable glossary of key terms. Organize your exam prep to focus on challenging areas and reinforce your understanding of essential exam objectives.
A+ certification is a vital step for careers in information technology, allowing current and prospective computer technicians to validate or recertify their skills. An essential component to any A+ exam strategy, this valuable review will help you:
- Learn to install and configure modern hardware and peripherals such as network switches, firewalls, and Bluetooth modules
- Keep updated on current software, including Windows, Linux, and mobile operating systems
- Integrate exam reviews with other Sybex learning resources to provide a comprehensive study plan
The CompTIA A+ Complete Review Guide: Exam 220-1001 and Exam 220-1002, Fourth Edition is an integral part of your overall exam prep strategy, allowing you to focus your study on what matters most.
Table of Contents
Introduction xxxi
Part I CompTIA A+ Core 1 Exam 220-1001 1
Chapter 1 Mobile Devices 3
1.1 Given a scenario, install and configure laptop hardware and components 8
1.2 Given a scenario, install components within the display of a laptop 15
1.3 Given a scenario, use appropriate laptop features. 19
1.4 Compare and contrast characteristics of various types of other mobile devices. 26
1.5 Given a scenario, connect, and configure accessories and ports of other mobile devices. 31
1.6 Given a scenario, configure basic mobile device network connectivity and application support. 39
1.7 Given a scenario, use methods to perform mobile device synchronization. 50
Review Questions 54
Chapter 2 Networking 57
2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes. 62
2.2 Compare and contrast common networking hardware devices. 65
2.3 Given a scenario, install and configure a basic wired/ wireless SOHO network. 71
2.4 Compare and contrast wireless networking protocols. 82
2.5 Summarize the properties and purposes of services provided by networked hosts. 86
2.6 Explain common network configuration concepts. 90
2.7 Compare and contrast Internet connection types, network types, and their features. 99
2.8 Given a scenario, use appropriate networking tools. 102
Review Questions 106
Chapter 3 Hardware 111
3.1 Explain basic cable types, features, and their purposes. 120
3.2 Identify common connector types. 136
3.3 Given a scenario, install RAM types. 141
3.4 Given a scenario, select, install, and configure storage devices. 147
3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards. 159
3.6 Explain the purposes and uses of various peripheral types. 183
3.7 Summarize power supply types and features. 189
3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs. 194
3.9 Given a scenario, install and configure common devices. 200
3.10 Given a scenario, configure SOHO multifunction devices/printers and settings. 202
3.11 Given a scenario, install and maintain various print technologies. 208
Review Questions 228
Chapter 4 Virtualization and Cloud Computing 235
4.1 Compare and contrast cloud computing concepts. 237
4.2 Given a scenario, set up and configure client-side virtualization. 242
Review Questions 246
Chapter 5 Hardware and Network Troubleshooting 249
5.1 Given a scenario, use the best practice methodology to resolve problems. 254
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power. 258
5.3 Given a scenario, troubleshoot hard drives and RAID arrays. 268
5.4 Given a scenario, troubleshoot video, projector, and display issues. 272
5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures. 278
5.6 Given a scenario, troubleshoot printers. 289
5.7 Given a scenario, troubleshoot common wired and wireless network problems. 297
Review Questions 305
Part II CompTIA A+ Core 2 Exam 220-1002 309
Chapter 6 Operating Systems 311
1.1 Compare and contrast common operating system types and their purposes. 321
1.2 Compare and contrast features of Microsoft Windows
1.3 Summarize general OS installation considerations and
1.4 Given a scenario, use appropriate Microsoft command-line tools. 351
1.5 Given a scenario, use Microsoft operating system features and tools. 372
1.6 Given a scenario, use Microsoft Windows Control Panel utilities. 400
1.7 Summarize application installation and configuration concepts. 424
1.8 Given a scenario, configure Microsoft Windows Printer sharing vs. network printer mapping 429
1.9 Given a scenario, use features and tools of the MacOS and Linux client/desktop operating systems. 440
Review Questions 460
Chapter 7 Security 463
2.1 Summarize the importance of physical security measures. 470
2.2 Explain logical security concepts. 474
2.3 Compare and contrast wireless security protocols and authentication methods. 486
2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods. 489
2.5 Compare and contrast social engineering, threats, and vulnerabilities. 500
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings. 505
2.7 Given a scenario, implement security best practices to secure a workstation. 514
2.8 Given a scenario, implement methods for securing mobile devices. 520
2.9 Given a scenario, implement appropriate data destruction and disposal methods. 527
2.10 Given a scenario, configure security on SOHO wireless and wired networks. 530
Review Questions 536
Chapter 8 Software Troubleshooting 541
3.1 Given a scenario, troubleshoot Microsoft Windows OS problems. 545
3.2 Given a scenario, troubleshoot and resolve PC security issues. 557
3.3 Given a scenario, use best practice procedures for malware removal. 562
3.4 Given a scenario, troubleshoot mobile OS and application issues. 564
3.5 Given a scenario, troubleshoot mobile OS and application security issues. 571
Chapter 9 Operational Procedures 577
4.1 Compare and contrast best practices associated with types of documentation. 582
4.2 Given a scenario, implement basic change management best practices. 587
4.3 Given a scenario, implement basic disaster prevention and recovery methods. 590
4.4 Explain common safety procedures. 596
4.5 Explain environmental impacts and appropriate controls. 603
4.6 Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts. 608
4.7 Given a scenario, use proper communication techniques and professionalism. 613
4.8 Identify the basics of scripting. 619
4.9 Given a scenario, use remote access technologies. 622
Review Questions 627
Appendix Answers to Review Questions 631
Chapter 1: Mobile Devices 632
Chapter 2: Networking 634
Chapter 3: Hardware 636
Chapter 4: Virtualization and Cloud Computing 640
Chapter 5: Hardware and Network Troubleshooting 641
Chapter 6: Operating Systems 642
Chapter 7: Security 645
Chapter 8: Software Troubleshooting 648
Chapter 9: Operational Procedures 649
Index 651