CompTIA A+ Core 2 Competency Benchmark (Intermediate Level)

  • 27m
  • 27 questions
The CompTIA A+ Core 2 Competency Benchmark (Intermediate Level) benchmark measures your ability to identify core computing and mobile technologies and participate in conversations about said technologies as an experienced professional. Learners who score high on this benchmark demonstrate that they have a deeper and more sophisticated working knowledge of computing.

Topics covered

  • demonstrate how to install and configure internet browser password managers
  • describe common internet browsing security features and techniques including pop-up blockers, clearing browsing data, clearing cache, private-browsing mode, sign-in/browser data synchronization, and ad blockers
  • describe firewall security features such as disabling unused ports and port forwarding or mapping
  • describe security considerations as they relate to internet browser extensions and plug-ins
  • detail wireless security considerations including changing the service set identifier (SSID), disabling SSID broadcast, encryption settings, disabling guest access, and changing channels
  • differentiate between Master Boot Record (MBR) and GUID Partition Table (GPT) disks
  • differentiate between phishing and vishing social engineering attacks
  • discuss how the NTFS, FAT32, exFAT, ext3 and ext4, and APFS file systems work
  • identify common physical security devices such as key fobs, smart cards, keys, biometrics, lighting, and magnetometers
  • list common home router security settings to configure on small office/home office (SOHO) wireless and wired networks
  • list security login options such as usernames and passwords, personal identification number (pin), fingerprint, facial recognition and single sign-on (SSO)
  • list steps to ensure secure internet browser downloads and installations
  • list Windows OS requirements, Windows edition features, and end-of-life (EOL) support
  • outline Chrome and Android OS requirements and features
  • outline iOS and iPadOS requirements and features
  • outline Linux OS requirements and features
  • outline macOS requirements and features
  • outline what computer viruses are and how they are designed to spread
  • outline what trojan malware is and how it can mislead users regarding its true intent
  • provide an overview of the wi-fi protected access 2 (WPA2) wireless protocol
  • recall how IPv4 and IPv6 addressing works
  • recall various methods that can be used to install operating systems
  • recognize how DHCP and DNS are used to provide IP network connectivity
  • recognize how to confirm whether or not a website is secure and provide an overview of certificates
  • recognize how to implement traditional physical security measures including video surveillance, alarm systems, and motion sensors
  • recognize key features of the wi-fi protected access 3 (WPA3) wireless protocol
  • recognize the benefits of mobile device encryption features