CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram
Home > Computing and Information Technology > Computer certification > Computer certification: CompTIA > CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram
CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram

CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

This is the perfect study guide to help you pass CompTIA®’s new A+® Core 1 (220-1001) and Core 2 (220-1002) exams. It provides coverage and practice questions for every exam topic, including substantial new coverage of Windows 10, as well as new PC hardware, tablets, smartphones, macOS, Linux, cloud computing, and professional-level networking and security. Extensive prep tools include quizzes, Exam Alerts, our great last-minute Cram Sheet, two full practice exams in the print book and an additional two exams in the test engine, plus complete real-time practice and feedback through Pearson’s state-of-the-art test engine. You’ll also find 14 exclusive Real-World Scenario case studies, all linked to simulations or video on our bonus content site.   Covers the critical information you’ll need to know to score higher on your A+ Core 1 (220-1001) and Core 2 (220-1002) exams!   --Deploy and manage computers running Windows 10/8/7, macOS, Linux, iOS, and Android --Master and practice the six-step A+ troubleshooting process --Understand, install, configure, and troubleshoot motherboards, CPUs, and memory --Test and troubleshoot power-related problems --Use all forms of storage, including SSDs, optical devices, and RAID systems --Work effectively with mobile devices, including laptops, tablets, and smartphones --Configure Windows components and applications, use Windows administrative tools, and optimize Windows systems --Repair damaged Windows environments and troubleshoot Windows issues --Install and manage printers and other peripherals --Understand and work with networks, network hardware, wireless protocols, and cloud technologies --Install and configure SOHO wired/wireless networks, and troubleshoot connectivity --Secure desktops and mobile devices, implement authentication methods, prevent malware attacks, and protect data   Make sure you’re 100% ready for the real exam! --Detailed explanations of correct and incorrect answers --Multiple test modes --Random questions and order of answers --Coverage of each current A+ exam objective 

Table of Contents:
Introduction PART I: INTRODUCTION TO CORE 1 (220-1001) Core 1 (220-1001) Domain 1.0: Mobile Devices Chapter 1 Laptops, Part 1 1.1 — Given a scenario, install and configure laptop hardware and components     Keyboards     Touchpad     Hard Drives     Memory     Smart Card Readers     Optical Drives     Communications     Video     Power     Speaker     System Board and CPU     Fans Chapter 2 Laptops, Part 2 1.2 — Given a scenario, install components within the display of a laptop     Display Types     Inverter and Backlight     Digitizers and Touchscreens     Webcam and Microphone     Wi-Fi Antenna Connector and Placement 1.3 — Given a scenario, use appropriate laptop features     Special Function Keys     External Monitors     Docking Stations and Port Replicators     Rotating and Removable Screens Securing Laptops with Cable Locks Chapter 3 Smartphones, Tablets, and Other Mobile Devices, Part 1 1.4 — Compare and contrast characteristics of various types of other mobile devices     Tablets     Smartphones     Wearable Technology Devices     E-readers     GPS Devices 1.5 — Given a scenario, connect and configure accessories and ports of other mobile devices     Connection Types     Accessories Chapter 4 Smartphones, Tablets, and Other Mobile Devices, Part 2 1.6 — Given a scenario, configure basic mobile device network connectivity and application support     Enabling Wireless Functions     USB Tethering     Bluetooth     E-mail Configuration     Cellular Radio Technologies 1.7 — Given a scenario, use methods to perform mobile device synchronization     Synchronization Methods     Types of Data to Synchronize and Authentication Core 1 (220-1001) Domain 2.0: Networking Chapter 5 Ports, Protocols, and Network Devices 2.1 — Compare and contrast TCP and UDP ports, protocols, and their purpose     TCP vs. UDP     Ports and Protocols 2.2 — Compare and contrast common networking hardware devices     Switches     Routers     Wireless Access Points     Firewalls     Network Interface Cards     Cloud-based Network Controllers     Repeaters     Hubs     Cable/DSL Modems     Bridges     Patch Panels     Power over Ethernet     Ethernet over Power Chapter 6 SOHO Networks and Wireless Protocols 2.3 — Given a scenario, install and configure a basic wired/wireless SOHO network     Router Setup and Wireless     Access Point Settings     NIC and End-user Device Configuration     IoT Device Configuration     Cable/DSL Modem Configuration     Firewall Settings and Additional Configurations     Configuring Wireless Encryption 2.4 — Compare and contrast wireless networking protocols     802.11 Wireless     RFID     Zigbee and Z-Wave Chapter 7 Networked Hosts and Network Configuration 2.5 — Summarize the properties and purposes of services provided by networked hosts     Server Roles     Internet Appliances     Embedded/Legacy Systems 2.6 — Explain common network configuration concepts     Configuring IPv4     Configuring IPv6     VLANs     VPNs Chapter 8 Network Types and Networking Tools 2.7 — Compare and contrast Internet connection types, network types, and their features     Network Types     Internet Connection Types 2.8 — Given a scenario, use appropriate networking tools     Network Cabling Tools     Wi-Fi Analyzers Core 1 (220-1001) Domain 3.0: Hardware Chapter 9 Cables and Connectors 3.1 — Explain basic cable types, features, and their purposes 3.2 — Identify common connector types     Network Cables     Video Cables and Connectors     Multipurpose Cables and Connectors     Hard Drive Cables and Connectors     Adapters Chapter 10 RAM and Storage 3.3 — Given a scenario, install RAM types     RAM Types     Installing RAM     RAM Technologies 3.4 — Given a scenario, select, install and configure storage devices     SATA     Magnetic Hard Drives     Solid-State Drives     RAID     Flash     Optical Drives Chapter 11 Motherboards and Add-on Cards 3.5 — Given a scenario, install and configure motherboards, CPUs, and add-on cards Motherboard Form Factors and Connectors Expansion Cards More Ports and Connectors BIOS/UEFI Settings The POST Chapter 12 CPUs 3.5 — Given a scenario, install and configure motherboards, CPUs, and add-on cards     CPU Features     CPU Compatibility     Power Consumption     Cooling Mechanisms     Installing CPUs Chapter 13 Peripherals and Power 3.6 — Explain the purposes and uses of various peripheral types     Input Devices     Output Devices     Hybrid I/O Devices and Others 3.7 — Summarize power supply types and features     Planning Which Power Supply to Use     Installing the Power Supply Chapter 14 Custom PCs and Common Devices 3.8 — Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs     Graphic/CAD/CAM Design Workstation     Audio/Video Editing Workstation     Virtualization Workstation     Gaming PC     Network-Attached Storage Device     Thin Client     Standard Thick Client 3.9 — Given a scenario, install and configure common devices     Desktop Devices and Settings     Laptop Configurations and Settings Chapter 15 Printers and Multifunction Devices 3.10 — Given a scenario, configure SOHO multifunction devices/printers and settings     Printer Configuration Settings     Local Versus Network Printers 3.11 — Given a scenario, install and maintain various print technologies     Types of Printers     Virtual Printing     Printer Installation and Drivers Core 1 (220-1001) Domain 4.0: Virtualization and Cloud Computing Chapter 16 Cloud Computing and Client-side Virtualization 4.1 — Compare and contrast cloud computing concepts     Common Cloud Models     Cloud Computing Concerns 4.2 — Given a scenario, set up and configure client-side virtualization     Purpose of Virtual Machines     Hypervisors     Examples of Virtual Machine Software     Virtual Machine Requirements Core 1 (220-1001) Domain 5.0: Hardware and Network Troubleshooting Chapter 17 Computer Troubleshooting 101 5.1 — Given a scenario, use the best practice methodology to resolve problems     Step 1: Identify the Problem     Step 2: Establish a Theory of Probable Cause (Question the Obvious)     Step 3: Test the Theory to Determine Cause     Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution     Step 5: Verify Full System Functionality and, If Applicable, Implement Preventive Measures     Step 6: Document Findings, Actions, and Outcomes Chapter 18 Troubleshooting Motherboards, CPUs, RAM, and Power 5.2 — Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power     Troubleshooting Motherboards     Troubleshooting CPUs     Troubleshooting RAM     Troubleshooting Power Supply Issues     Heating and Cooling Chapter 19 Troubleshooting Hard Drives and RAID Arrays 5.3 — Given a scenario, troubleshoot hard drives and RAID arrays     Troubleshooting Hard Drives     Troubleshooting RAID Arrays Chapter 20 Troubleshooting Video Issues and Mobile Devices 5.4 — Given a scenario, troubleshoot video, projector, and display issues     Video Troubleshooting 5.5 — Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures     Mobile Device Display Troubleshooting     Mobile Device Overheating     More Mobile Device Troubleshooting     Disassembling Processes for Proper Reassembly Chapter 21 Troubleshooting Printers 5.6 — Given a scenario, troubleshoot printers     Troubleshooting Printers     Print Jobs and the Print Spooler Chapter 22 Troubleshooting Wired and Wireless Network Problems 5.7 — Given a scenario, troubleshoot common wired and wireless network problems     Troubleshooting Common Symptoms A+ Core 1 (220-1001) Practice Exam   PART II: INTRODUCTION TO CORE 2 (220-1002) Core 2 (220-1002) Domain 1.0: Operating Systems Chapter 23 Operating System Types and Windows Versions 1.1 — Compare and contrast common operating system types and their purposes     Workstation Operating Systems     32-Bit Versus 64-Bit     Smartphone and Tablet Operating Systems     Vendor-Specific Limitations     Compatibility Concerns Between Operating Systems 1.2 — Compare and contrast features of Microsoft Windows versions     Windows 7     Windows 8 and 8.1     Windows 10     Windows User Interfaces and Components Chapter 24 Operating System Installation 1.3 — Summarize general OS installation considerations and upgrade methods     Boot Methods     Types of Installations     Partitioning     File System Types and Formatting     More OS Installation Considerations Chapter 25 Microsoft Command Line Tools 1.4 — Given a scenario, use appropriate Microsoft command line tools     Command Prompt Basics     Navigating and Working with Directories and Files in the Command Prompt     Partitioning and File System-based Commands     Chkdsk and SFC     Networking Commands     Advanced Commands Chapter 26 Microsoft Operating System Features and Tools, Part 1 1.5 — Given a scenario, use Microsoft operating system features and tools     Administrative Tools     System Configuration/MSConfig     Task Manager Chapter 27 Microsoft Operating System Features and Tools, Part 2 1.5 — Given a scenario, use Microsoft operating system features and tools     Disk Management     System Utilities Chapter 28 Windows Control Panel Utilities 1.6 — Given a scenario, use Microsoft Windows Control Panel utilities     Internet Options     Display     User Accounts     Folder Options     Performance (Virtual Memory)     Power Management     Credential Manager     Programs and Features     Program Compatibility     Devices and Printers     Sound     Troubleshooting     Sync Center Chapter 29 Windows Networking and Application Installatio 1.8 — Given a scenario, configure Microsoft Windows networking on a client/desktop     Workgroup, HomeGroup, and Domain     Sharing Resources and Making Network Connections     Establishing Networking Connections     Proxy Settings     Configuring an Alternate IP Address in Windows     Network Card Properties 1.7 — Summarize application installation and configuration concepts     Application Requirements     Method of Installation and Deployment     User Permissions     Security Considerations Chapter 30 Linux and macOS Tools 1.9 — Given a scenario, use features and tools of the macOS and Linux client/desktop operating systems     macOS     Linux Core 2 (220-1002) Domain 2.0: Security Chapter 31 Physical and Logical Security 2.1 — Summarize the importance of physical security measures     Physical Locks     Entry Systems     Biometrics     Protecting Data Physically 2.2 — Explain logical security concepts     Authentication     Principle of Least Privilege     Active Directory     Firewalls     VPN     Additional Security Considerations in Windows Chapter 32 Wireless Security, Malware, and Social Engineering 2.3 — Compare and contrast wireless security protocols and authentication methods     Wireless and Encryption Protocols 2.4 — Given a scenario, detect, remove, and prevent malware using appropriate tools and methods     Malicious Software Types     Preventing Malicious Software 2.5 — Compare and contrast social engineering, threats, and vulnerabilities     Phishing     Shoulder Surfing     Piggybacking/Tailgating     Dumpster Diving     Impersonation     Additional Attacks and Security Vulnerabilities Chapter 33 Windows Security Settings and Best Practices 2.6 — Compare and contrast the differences of basic Microsoft Windows OS security settings     Users and Groups     Permissions     File Security 2.7 — Given a scenario, implement security best practices to secure a workstation     Usernames and Passwords     Password Policies     Account Management     Disabling AutoPlay/Autorun Chapter 34 Mobile Device Security 2.8 — Given a scenario, implement methods for securing mobile devices     Screen Locks     Authenticator Applications     Theft and Loss of Mobile Devices     Compromised and Damaged Devices     Policies and Procedures Chapter 35 Data Destruction and SOHO Security 2.9 — Given a scenario, implement appropriate data destruction and disposal methods     Formatting Drives     Overwriting Drives     Clear     Purge     Destroy 2.10 — Given a scenario, configure security on SOHO wireless and wired networks     Changing Default Passwords     Wireless-Specific Security Settings     Enabling MAC Filtering     Assigning Static IP Addresses     Disabling Physical Ports and Physical Security     Content Filtering/Parental Controls     A Final Word on SOHO Routers Core 2 (220-1002) Domain 3.0: Software Troubleshooting Chapter 36 Troubleshooting Microsoft Windows 3.1 — Given a scenario, troubleshoot Microsoft Windows OS problems     Windows Recovery     Boot Errors     Improper and Spontaneous Shutdowns     Stop Errors     Restoring Windows     Common Windows Symptoms and Solutions Chapter 37 Troubleshooting PC Security Issues and Malware Removal 3.3 — Given a scenario, use best practice procedures for malware removal 3.2 — Given a scenario, troubleshoot and resolve PC security issues     The CompTIA A+ Seven-Step Malware Removal Procedure     Malware Removal Scenario     Symptoms of Viruses     Symptoms of Spyware     Preventing and Troubleshooting Spam     Hijacked E-mail     More Symptoms of PC Security Issues and Potential Solutions Chapter 38 Troubleshooting Mobile Operating Systems 3.4 — Given a scenario, troubleshoot mobile OS and application issues 3.5 — Given a scenario, troubleshoot mobile OS and application security issues     Wi-Fi Troubleshooting     Bluetooth Troubleshooting     Troubleshooting E-mail Connections     Troubleshooting and Stopping Applications     Initiating Resets     Additional Mobile Device Troubleshooting     Mobile Device Application and OS Troubleshooting     External Monitor Issues     Troubleshooting Mobile Device Security Issues Core 2 (220-1002) Domain 4.0: Operational Procedures Chapter 39 Documentation, Change Management, and Disaster Recovery 4.1 — Compare and contrast best practices associated with types of documentation     Network Topology Diagrams     Knowledge Bases/Articles     Incident Documentation     Compliance and Regulatory Policy     Acceptable Use Policy     Password Policy     Inventory Management 4.2 — Given a scenario, implement basic change management best practices 4.3 — Given a scenario, implement basic disaster prevention and recovery methods     Backup and Recovery     Cloud Storage vs. Local Storage Backups     Account Recovery Options Chapter 40 Safety Procedures and Environmental Controls 4.4 — Explain common safety procedures     ESD Prevention and Equipment Grounding     Electrical Safety     Electrical Fire Safety     Physical Safety 4.5 — Explain environmental impacts and appropriate controls     Temperature, Humidity, and Air     MSDS and Disposal     Power Devices     Surge Protectors     Uninterruptible Power Supplies Chapter 41 Incident Response, Communication, and Professionalism 4.6 — Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts     Incident Response     Licensing/DRM/EULA     Regulated Data 4.7 — Given a scenario, use proper communication techniques and professionalism     Communication Techniques and Professionalism Chapter 42 Basic Scripting and Remote Access Technologies 4.8 — Identify the basics of scripting     Basic Data Types     Basic Script Constructs     Environment Variables     Comment Syntax     Script File Types 4.9 — Given a scenario, use remote access technologies     Remote Desktop     SSH     More Third-Party Tools   A+ Core 2 (220-1002) Practice Exam Chapter 43 Getting Ready for the Exams, and Farewell     Getting Ready for the Exams     Tips for Taking the Real Exams     General Practices for Taking Exams     Smart Methods for Difficult Questions     Wrapping Up the Exam     Beyond the CompTIA A+ Certification     9780789760579   TOC   7/8/2019 


Best Sellers


Product Details
  • ISBN-13: 9780135301241
  • Publisher: Pearson Education (US)
  • Binding: Digital download
  • No of Pages: 416
  • ISBN-10: 0135301246
  • Publisher Date: 07 Jul 2021
  • Language: English


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram
Pearson Education (US) -
CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!