CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 2 Exam 220-1102

  • 7h 22m
  • Mark Soper, Mike Chapple
  • Sybex
  • 2023

Skip the fluff and get straight to the essentials with an indispensable prep handbook for the CompTIA A+ Core 2 exam

In CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and practical roadmap to taking—and succeeding on—the CompTIA A+ Core 2 exam. You’ll learn how to install, configure, and maintain computer equipment, mobile devices, and software for end users, service components based on customer requirements, understand networking basics, and apply essential cybersecurity methods. Ace the test using the proven CertMike approach:

  • Prepare -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!
  • Practice -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!
  • Pass -- On exam day, use the critical knowledge you've learned when you’re ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!

With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You’ll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test—the first time around!

An indispensable resource for anyone preparing for their A+ certification, CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102 is also a must-read for hardware and PC technicians seeking to upgrade their skillset.

About the Author

Mike Chapple, PhD, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com.

Mark Soper, MCP, CompTIA A+, has over 30 years’ experience in IT. He is the author or co-author of 40 books on technology, covering topics ranging from CompTIA A+ to Microsoft Windows, networking, and troubleshooting.

In this Book

  • Introduction
  • Microsoft Windows Editions—Core 2 Objective 1.1—Identify Basic Features of Microsoft Windows Editions
  • Microsoft Command-Line Tools—Core 2 Objective 1.2—Given a Scenario, Use the Appropriate Microsoft Command-Line Tool
  • Windows 10 Operating System Tools—Core 2 Objective 1.3—Given a Scenario, Use Features and Tools of the Microsoft Windows 10 Operating System (OS)
  • Windows 10 Control Panel—Core 2 Objective 1.4—Given a Scenario, Use the Appropriate Microsoft Windows 10 Control Panel Utility
  • Windows Settings—Core 2 Objective 1.5—Given a Scenario, Use the Appropriate Windows Settings
  • Windows Networking—Core 2 Objective 1.6—Given a Scenario, Configure Microsoft Windows Networking Features on a Client/Desktop
  • Application Installation and Configuration—Core 2 Objective 1.7—Given a Scenario, Apply Application Installation and Configuration Concepts
  • Operating System Types—Core 2 Objective 1.8—Explain Common OS Types and Their Purposes
  • Operating System Installations and Upgrades—Core 2 Objective 1.9—Given a Scenario, Perform OS Installations and Upgrades in a Diverse OS Environment
  • macOS—Core 2 Objective 1.10—Identify Common Features and Tools of the macOS/Desktop OS
  • Linux—Core 2 Objective 1.11—Identify Common Features and Tools of the Linux Client/Desktop OS
  • Physical Security—Core 2 Objective 2.1—Summarize Various Security Measures and Their Purposes
  • Logical Security—Core 2 Objective 2.1—Summarize Various Security Measures and Their Purposes
  • Wireless Security—Core 2 Objective 2.2—Compare and Contrast Wireless Security Protocols and Authentication Methods
  • Malware—Core 2 Objective 2.3—Given a Scenario, Detect, Remove, and Prevent Malware Using the Appropriate Tools and Methods
  • Social Engineering and Security Threats—Core 2 Objective 2.4—Explain Common Social-Engineering Attacks, Threats, and Vulnerabilities
  • Windows Security—Core 2 Objective 2.5—Given a Scenario, Manage and Configure Basic Security Settings in the Microsoft Windows OS
  • Workstation Security Configuration—Core 2 Objective 2.6—Given a Scenario, Configure a Workstation to Meet Best Practices for Security
  • Mobile and Embedded Device Security—Core 2 Objective 2.7—Explain Common Methods for Securing Mobile and Embedded Devices
  • Data Destruction and Disposal—Core 2 Objective 2.8—Given a Scenario, Use Common Data Destruction and Disposal Methods
  • Network Security—Core 2 Objective 2.9—Given a Scenario, Configure Appropriate Security Settings on Small Office/Home Office (SOHO) Wireless and Wired Networks
  • Browser Security—Core 2 Objective 2.10—Given a Scenario, Install and Configure Browsers and Relevant Security Settings
  • Troubleshooting Windows—Core 2 Objective 3.1—Given a Scenario, Troubleshoot Common Windows OS Problems
  • Troubleshooting PC Security—Core 2 Objective 3.2—Given a Scenario, Troubleshoot Common Personal Computer (PC) Security Issues
  • Troubleshooting Malware—Core 2 Objective 3.3—Given a Scenario, Use Best Practice Procedures for Malware Removal
  • Troubleshooting Mobile Device OS and Applications—Core 2 Objective 3.4—Given a Scenario, Troubleshoot Common Mobile OS and Application Issues
  • Troubleshooting Mobile Device Security—Core 2 Objective 3.5—Given a Scenario, Troubleshoot Common Mobile OS and Application Security Issues
  • Documentation—Core 2 Objective 4.1—Given a Scenario, Implement Best Practices Associated with Documentation and Support Systems Information Management
  • Change Management—Core 2 Objective 4.2—Explain Basic Change-Management Best Practices
  • Workstation Backup and Recovery—Core 2 Objective 4.3—Given a Scenario, Implement Workstation Backup and Recovery Methods
  • Safety—Core 2 Objective 4.4—Given a Scenario, Use Common Safety Procedures
  • Environmental Protection—Core 2 Objective 4.5—Summarize Environmental Impacts and Local Environmental Controls
  • Privacy, Licensing, Policy, and Incident Response—Core 2 Objective 4.6—Explain the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts
  • Communication and Professionalism—Core 2 Objective 4.7—Given a Scenario, Use Proper Communication Techniques and Professionalism
  • Scripting—Core 2 Objective 4.8—Identify the Basics of Scripting
  • Remote Access—Core 2 Objective 4.9—Given a Scenario, Use Remote Access Technologies
SHOW MORE
FREE ACCESS