CompTIA A+ Core 2 Mastery Benchmark (Expert Level)

  • 31m
  • 31 questions
The CompTIA A+ Core 2 Mastery Benchmark (Expert Level) benchmark measures your ability to identify, explain, and solution-design core mobile and desktop computing technologies and participate in conversations about said technologies. Learners who score high on this benchmark demonstrate that they have a mastery of computing, are subject matter experts on the topic, and generally do not require any remediation. They can proceed directly to the exam.

Topics covered

  • describe common internet browsing security features and techniques including pop-up blockers, clearing browsing data, clearing cache, private-browsing mode, sign-in/browser data synchronization, and ad blockers
  • differentiate between different script file types, including .bat, .ps1, .vbs, .sh, .js, and .py
  • differentiate between full, incremental, differential, and synthetic backups
  • differentiate between Master Boot Record (MBR) and GUID Partition Table (GPT) disks
  • differentiate between on-site and off-site backup rotation schemes
  • differentiate between phishing and vishing social engineering attacks
  • list common backup frequency timelines
  • list common home router security settings to configure on small office/home office (SOHO) wireless and wired networks
  • list security concerns when working with Android mobiles
  • list security login options such as usernames and passwords, personal identification number (pin), fingerprint, facial recognition and single sign-on (SSO)
  • list the considerations for using scripts, including unintentionally introducing malware, inadvertently changing system settings, and causing crashes by mishandling resources
  • name use cases for Secure Shell (SSH)
  • outline common network traffic issues including high network traffic and sluggish response times
  • outline common personal safety measures including disconnecting power before repairing PC, lifting techniques, electrical fire safety, safety goggles, and using air filtration masks
  • outline how to gain root access on a mobile device
  • outline how to set and meet expectations and timelines and communicate status with the customer
  • outline virtual private network (VPN) technology
  • outline what trojan malware is and how it can mislead users regarding its true intent
  • recall various methods that can be used to install operating systems
  • recognize compliance and government regulations
  • recognize how to confirm whether or not a website is secure and provide an overview of certificates
  • recognize how to deal with difficult customers or situations
  • recognize how to identify malicious applications on a mobile device and outline application spoofing
  • recognize how to implement traditional physical security measures including video surveillance, alarm systems, and motion sensors
  • recognize how to match the required attire of the given environment
  • recognize material safety data sheet (MSDS) handling and disposal recommendations, including proper battery disposal, proper toner disposal, and proper disposal of other devices and assets
  • recognize scenarios for scripting, including automation, remapping network drives, updating, and gathering information
  • recognize scenarios where you would use Remote Desktop Protocol (RDP)
  • recognize the benefits of mobile device encryption features
  • recognize the importance of using proper language and avoiding jargon, acronyms, and slang, when applicable
  • recognize when to use the 3-2-1 backup rule