CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram
Home > Computing and Information Technology > Computer certification > Computer certification: CompTIA > CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

|
     0     
5
4
3
2
1




International Edition


About the Book

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams. Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams! * Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals * Work effectively with mobile devices: laptops, tablets, and smartphones * Configure Windows settings, components, and administrative tools * Manage and troubleshoot Linux, macOS, Android, and iOS * Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems * Understand security features such as firewalls, multifactor authentication, permissions, and access control * Defend against malware, network threats, and social engineering * Learn the basics of IT documentation, change management, and incident response Prepare for your exam with Pearson Test Prep * Realistic practice questions and answers * Comprehensive reporting and feedback * Customized testing in study, practice exam, or flash card modes * Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives COMPANION WEBSITE Your purchase includes access to the practice exams in multiple test modes, videos, challenges, and the CramSheet.

Table of Contents:
Introduction Part I: Introduction to Core 1 (220-1101) CORE 1 (220-1101): DOMAIN 1.0: MOBILE DEVICES Chapter 1 Laptop Hardware and Components Introduction to Laptops Power Keyboards/Keys     Special Function Keys     Troubleshooting Keyboards Touchpad Random-Access Memory (RAM) Storage Drives Communications Physical Privacy Chapter 2 Mobile Device Display Components Display Types Inverter and Backlight     Damaged Inverter     Worn-Out Backlight Digitizers and Touchscreens Webcam and Microphone Wi-Fi Antenna Connector and Placement Chapter 3 Mobile Device Accessories and Ports Connection Types     Wired Connections     Wireless Connections Accessories     Docking Stations and Port Replicators     Drawing Pads, Touchpads, and Touch Pens Chapter 4 Mobile Device Network Connectivity and Application Support Enabling Wireless Functions Bluetooth Email Configuration     Integrated Commercial Provider Email Configuration     Corporate and ISP Email Configuration Cellular Radio Technologies Location Services     GPS     Cellular Location     IMEI and IMSI Synchronization Methods     Synchronizing to the Cloud     Synchronizing to the Desktop     Synchronizing to the Automobile Mobile Device Management (MDM) CORE 1 (220-1101): DOMAIN 2.0: NETWORKING Chapter 5 TCP and UDP Ports and Protocols TCP vs. UDP Ports and Protocols     HTTP vs. HTTPS     Email Protocols     FTP, SSH, and Telnet     DHCP     DNS     LDAP     RDP     More Protocols and Ports Chapter 6 Network Devices Switches Routers Wireless Access Points Firewalls Network Interface Cards     Hubs Patch Panels Power over Ethernet Cable/DSL Modems Network Interface Devices Software-Defined Networking Chapter 7 Wireless Protocols 802.11 Wireless Long-Range Fixed Wireless RFID Chapter 8 Networked Hosts Server Roles     File Servers     Web Servers     Print Servers     Mail Servers     Proxy Servers DHCP Servers     DNS Servers     Syslog Servers     AAA Servers Internet Security Appliances     Network Firewall     UTM     Spam Gateway     Load Balancer Embedded Systems and IoT     Embedded Systems     IoT Chapter 9 SOHO Network Configuration Configuring IPv4 Private vs. Public Addresses Configuring IPv6 Chapter 10 Network Configuration Concepts DNS Email Authentication Methods DHCP     DHCP Process     DHCP Reservations VLANs VPNs Chapter 11 Network Types Network Types     LAN and WAN     MAN     SAN     WLAN     WMN     PAN Internet Connection Types     Cable Internet     DSL     Fiber     Satellite     Wireless Internet Service Provider Chapter 12 Networking Tools Network Cabling Tools Network Tap Wi-Fi Analyzers CORE 1 (220-1101): DOMAIN 3.0: HARDWARE Chapter 13 Cables and Connectors Network Cables     Twisted Pair     Coaxial     Optical Peripheral Cables and Connectors     USB     Lightning and Thunderbolt     Serial Video Cables and Connectors Storage Drive Cables and Connectors Adapters Chapter 14 RAM RAM Types     DDR3     DDR4     DDR5 Installing RAM RAM Technologies     Single-Channel vs. Multichannel Architectures     ECC vs. Non-ECC Chapter 15 Storage Drives SATA Magnetic Hard Drives Solid-State Drives RAID Flash     USB Flash Drives     Secure Digital Cards Optical Drives Chapter 16 Motherboards and Add-on Cards Motherboard Form Factors and Connector Types     ATX     microATX     ITX     Expansion Buses Expansion Cards     Installing Video Cards     Sound Cards     Other Expansion Cards More Ports and Connectors BIOS/UEFI Settings The POST Chapter 17 CPUs CPU Architecture     Clock Rate     Overclocking     Types of CPUs     Multithreading and Multicore     Cache Memory CPU Compatibility     Intel and AMD     Sockets Power Consumption Cooling Mechanisms     Heat Sinks     Thermal Paste     Fans     Liquid Cooling Systems Installing CPUs Chapter 18 Power Planning Which Power Supply to Use     Types of Power Supplies and Compatibility     Wattage and Capacity Requirements     Number and Type of Power Connectors     Modular and Redundant PSUs Installing the Power Supply Chapter 19 Multifunction Devices/Printers Setup Considerations Printer Configuration Settings     Basic Printer Configuration Settings     Sharing Printers and Managing Permissions Local vs. Network Printers Basic Printer Security Chapter 20 Printer Consumables Laser Printers Inkjet Printers Thermal Printers Impact Printers 3D Printers CORE 1 (220-1101): DOMAIN 4.0: VIRTUALIZATION AND CLOUD COMPUTING Chapter 21 Cloud Computing Concepts Introduction to Cloud Computing Common Cloud Models Cloud Computing Characteristics Desktop Virtualization Chapter 22 Client-Side Virtualization Purpose of Virtual Machines Hypervisors Examples of Virtual Machine Software Virtual Machine Requirements Cross-Platform Virtualization Containers and Sandboxes     OS-Level Virtualization (Containers)     Sandboxes CORE 1 (220-1101): DOMAIN 5.0: HARDWARE AND NETWORK TROUBLESHOOTING Chapter 23 Computer Troubleshooting 101 The CompTIA Six-Step Troubleshooting Process     Step 1: Identify the Problem     Step 2: Establish a Theory of Probable Cause (Question the Obvious)     Step 3: Test the Theory to Determine the Cause     Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution     Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures     Step 6: Document the Findings, Actions, and Outcomes Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power Troubleshooting Motherboards Troubleshooting CPUs Troubleshooting RAM Troubleshooting Power Supply Issues Heating and Cooling Chapter 25 Troubleshooting Storage Drives and RAID Arrays Preventive Maintenance and Troubleshooting of Storage Drives Storage Drive Preventive Maintenance Storage Drive Troubleshooting Troubleshooting RAID Arrays Chapter 26 Troubleshooting Video Issues PC Video Troubleshooting External Laptop Monitors and Projectors     External Laptop Monitors     Projectors Chapter 27 Troubleshooting Mobile Devices Mobile Device Display Troubleshooting Mobile Device Overheating More Mobile Device Troubleshooting Disassembling Processes Chapter 28 Troubleshooting Printers Troubleshooting Printers Print Jobs and the Print Spooler Managing Printers and Print Jobs The Windows Print Spooler Chapter 29 Troubleshooting Wired and Wireless Network Problems Troubleshooting Common Symptoms A+ Core 1 (220-1101) Practice Exam Part II: Introduction to Core 2 (220-1102) CORE 2 (220-1102): DOMAIN 1.0: OPERATING SYSTEMS Chapter 30 Comparing Windows Editions Windows 10 Editions and Feature Differences Windows Desktop/User Interface and Components Windows 10 Upgrade Paths Windows 11 Chapter 31 Microsoft Command-Line Tools, Part I Microsoft Command-Line Basics     Command Prompt     PowerShell     Windows Terminal     Ask for Help! Navigating in the Command Line Working with Directories and Files Partitioning and File System-Based Commands chkdsk and sfc     chkdsk     SFC winver and shutdown     shutdown Advanced Commands: gpupdate and gpresult Chapter 32 Microsoft Command-Line Tools, Part II Networking Commands     ipconfig     ping     tracert and pathping     hostname     netstat     nslookup     net     Bonus Command: arp Chapter 33 Microsoft Operating System Features and Tools, Part I Task Manager The MMC and Administrative Tools     The MMC     Event Viewer     Task Scheduler     Device Manager     Certificate Manager     Local Users and Groups     Performance Monitor     Group Policy Editor and Local Security Policy     Services     Bonus Tool: Computer Management Chapter 34 Microsoft Operating System Features and Tools, Part II Disk Management     The Disk Management Utility     Mount Points and Mounting a Drive     Storage Spaces     Disk Cleanup     Optimize Drives/Disk Defragmenter Additional Windows Tools     System Information/msinfo32     Resource Monitor     System Configuration/MSConfig     The Windows Registry Chapter 35 Windows Control Panel Utilities Opening and Viewing the Control Panel Utilities     Internet Options     Devices and Printers     Programs and Features     Program Compatibility     Windows Defender Firewall     Mail     Sound     User Accounts     Indexing Options     File Explorer Options     Power Management     Ease of Access Center Chapter 36 Windows Settings How to Access Settings Time & Language Update & Security     Windows Update     Windows Defender Firewall Personalization Apps Privacy System     Display     Power & Sleep     Storage     About and System Properties     Virtual Memory Devices Network & Internet Gaming Accounts Chapter 37 Windows Networking Workgroup vs. Domain Setup     Sharing Resources and Making Network Connections     Printer Sharing and Access Establishing Networking Connections Proxy Settings Chapter 38 Application Installation and Configuration Concepts 32-Bit vs. 64-Bit System and OS Requirements for Applications     Scenario 1: Video Editing Program     Scenario 2: Developer Program Distribution Methods Other Considerations for New Applications     Application Impact     User Permissions     Security Considerations Chapter 39 Common Operating Systems Workstation Operating Systems Smartphone and Tablet Operating Systems     Android     iOS     iPadOS File System Types and Formatting     Windows File System Basics     Linux File System Basics     macOS File System Basics Vendor Life-Cycle Limitations Compatibility Concerns Between Operating Systems Chapter 40 Operating System Installations and Upgrades Boot Methods Types of Installations Partitioning     Primary and Extended Partitions and Logical Drives     Basic and Dynamic Drives     GPT vs. MBR More OS Installation and Upgrade Considerations Chapter 41 macOS macOS Basics System Preferences macOS Features Managing and Maintaining macOS Installation and Uninstallation of Applications Apple ID Chapter 42 Linux Linux Basics Linux Desktop Distributions Linux Partition Scheme and File System Linux Command Line Samba Linux Best Practices     Updates and Patches     Backups     Anti-malware     In Closing CORE 2 (220-1102): DOMAIN 2.0: SECURITY Chapter 43 Physical Security Physical Locks Entry Systems Biometrics Other Physical Security Precautions Protecting Data Physically Chapter 44 Logical Security Authentication Principle of Least Privilege MDM Policies Active Directory     User Profiles     Logon Script     Home Folder     Group Policy     Security Groups More Logical Security Concepts     Authenticator Applications     Hard Tokens vs. Soft Tokens     Access Control Lists     SMS     Email Security Chapter 45 Wireless Security and Malware Comparing/Contrasting Wireless Security Protocols and Authentication Methods     Wireless and Encryption Protocols     RADIUS and TACACS+     Kerberos Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods     Malicious Software Types     Preventing Malicious Software Chapter 46 Social Engineering Social Engineering     Phishing     Evil Twin     Shoulder Surfing     Piggybacking/Tailgating     Dumpster Diving     Impersonation Threats and Vulnerabilities     Network-Based Attacks     Password Cracking     Additional Security Threats     Vulnerabilities and Security Best Practices Chapter 47 Windows Security Settings The CIA of Computer Security Windows Defender Antivirus Windows Defender Firewall Users and Groups Permissions     Permission Inheritance and Propagation     Moving and Copying Folders and Files File Security     Administrative Shares     Encrypting File System     BitLocker Encryption Chapter 48 Windows Best Practices Usernames and Passwords Password Policies Account Management and End-User Best Practices Disabling AutoPlay/AutoRun Chapter 49 Mobile Device Security Screen Locks Authenticator Applications Theft and Loss of Mobile Devices Compromised and Damaged Devices     Backups     Updates     Antivirus/Anti-malware/Firewalls     MDM and MAM     Full Device Encryption IoT Security Policies and Procedures     Profile Security Requirements Chapter 50 Data Destruction and Disposal Data Security 101 Formatting Drives Overwriting Drives Clear Purge Destroy Chapter 51 SOHO Security Changing Default Passwords Wireless-Specific Security Settings     Changing and Disabling the SSID     Antennas and Radio Power Levels     Guest Networks     Disabling WPS Enabling MAC Filtering and IP Filtering Assigning Static IP Addresses Firewall Settings and Additional Configurations Content Filtering/Parental Controls Disabling Physical Ports and More Physical Security A Final Word on SOHO Routers Chapter 52 Browser Security Browser Download/Installation Settings Extensions and Plug-ins Password Managers Secure Connections     TLS     Secure Sites and Tracking More Settings CORE 2 (220-1102): DOMAIN 3.0: SOFTWARE TROUBLESHOOTING Chapter 53 Troubleshooting Microsoft Windows Windows Recovery     Windows Recovery Environment (Windows RE)     Startup Settings System Restore Improper, Spontaneous, and Frequent Shutdowns Stop Errors Restoring Windows Common Windows Symptoms and Solutions Chapter 54 Troubleshooting PC Security Issues The CompTIA A+ Seven-Step Malware Removal Procedure Malware Removal Scenario     1. Investigate and Verify Malware Symptoms     2. Quarantine the Infected Systems     3. Disable System Restore in Windows     4. Remediate the Infected Systems     5. Schedule Scans and Run Updates     6. Enable System Restore and Create a Restore Point (in Windows)     7. Educate the End User Symptoms of Viruses Symptoms of Spyware More Symptoms of PC Security Issues and Potential Solutions Chapter 55 Troubleshooting Mobile Operating Systems and Applications Wireless Troubleshooting     Wi-Fi Troubleshooting     Bluetooth Troubleshooting     NFC and AirDrop Troubleshooting Troubleshooting Email Connections Troubleshooting and Stopping Applications Initiating Resets More Mobile Application and OS Troubleshooting     Updates: The Good and the Bad     Application Issues     Random Reboots     Poor Battery Life Video Issues Chapter 56 Troubleshooting Mobile Operating Systems Security Issues Mobile Device Security Concerns and Symptoms CORE 2 (220-1102): DOMAIN 4.0: OPERATIONAL PROCEDURES Chapter 57 Documentation Types of Documents     Network Topology Diagrams     Incident Report Documentation     Standard Operating Procedure     Compliance and Regulatory Policy     Acceptable Use Policy     User Checklists (Onboarding and Offboarding) Knowledge Bases/Articles Ticketing Systems Asset Management Chapter 58 Change Management and Backup Methods Understanding Basic Change Management Best Practices Implementing Workstation Backup and Recovery Methods     Using Windows File History and Recovery     Backup Methods     Backup Testing     Backup Rotation Schemes Chapter 59 Safety Procedures ESD Prevention and Equipment Grounding Electrical Safety Electrical Fire Safety Physical Safety Chapter 60 Environmental Controls Temperature, Humidity, and Air MSDS and Disposal Power Devices     Surge Protectors     Uninterruptible Power Supplies Chapter 61 Incident Response, Communication, and Professionalism Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts     Incident Response     Licensing/DRM/EULA     Regulated Data Using Proper Communication Techniques and Professionalism     Communication Techniques and Professionalism Chapter 62 Basic Scripting, Part I Programming 101     Basic Data Types     Basic Script Constructs     Environment Variables     Comment Syntax Chapter 63 Basic Scripting, Part II PowerShell and .ps1 Bash and .sh Use Cases and Other Considerations for PowerShell and Bash Python and .py JavaScript and .js Visual Basic Script and .vbs Chapter 64 Remote Access Technologies Remote Desktop     Remote Assistance     Remote Desktop Connection     Connecting with Remote Desktop SSH More Third-Party Tools VPN A+ Core 2 (220-1102) Practice Exam Chapter 65 Getting Ready for the Exams, and Farewell Getting Ready for the Exams Tips for Taking the Real Exams     General Practices for Taking Exams     Smart Methods for Difficult Questions     Wrapping Up the Exam Beyond the CompTIA A+ Certification 9780137637546   TOC    4/12/2022


Best Sellers


Product Details
  • ISBN-13: 9780137637546
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson IT Certification
  • Height: 26 mm
  • No of Pages: 1088
  • Spine Width: 60 mm
  • Width: 152 mm
  • ISBN-10: 0137637543
  • Publisher Date: 05 Aug 2022
  • Binding: SA
  • Language: English
  • Returnable: Y
  • Weight: 1560 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram
Pearson Education (US) -
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!