Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

David Prowse

1088 pages, parution le 13/09/2022

Résumé

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams. Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams! * Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals * Work effectively with mobile devices: laptops, tablets, and smartphones * Configure Windows settings, components, and administrative tools * Manage and troubleshoot Linux, macOS, Android, and iOS * Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems * Understand security features such as firewalls, multifactor authentication, permissions, and access control * Defend against malware, network threats, and social engineering * Learn the basics of IT documentation, change management, and incident response Prepare for your exam with Pearson Test Prep * Realistic practice questions and answers * Comprehensive reporting and feedback * Customized testing in study, practice exam, or flash card modes * Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives COMPANION WEBSITE Your purchase includes access to the practice exams in multiple test modes, videos, challenges, and the CramSheet.Introduction Part I: Introduction to Core 1 (220-1101) CORE 1 (220-1101): DOMAIN 1.0: MOBILE DEVICES Chapter 1 Laptop Hardware and Components Introduction to Laptops Power Keyboards/Keys Special Function Keys Troubleshooting Keyboards Touchpad Random-Access Memory (RAM) Storage Drives Communications Physical Privacy Chapter 2 Mobile Device Display Components Display Types Inverter and Backlight Damaged Inverter Worn-Out Backlight Digitizers and Touchscreens Webcam and Microphone Wi-Fi Antenna Connector and Placement Chapter 3 Mobile Device Accessories and Ports Connection Types Wired Connections Wireless Connections Accessories Docking Stations and Port Replicators Drawing Pads, Touchpads, and Touch Pens Chapter 4 Mobile Device Network Connectivity and Application Support Enabling Wireless Functions Bluetooth Email Configuration Integrated Commercial Provider Email Configuration Corporate and ISP Email Configuration Cellular Radio Technologies Location Services GPS Cellular Location IMEI and IMSI Synchronization Methods Synchronizing to the Cloud Synchronizing to the Desktop Synchronizing to the Automobile Mobile Device Management (MDM) CORE 1 (220-1101): DOMAIN 2.0: NETWORKING Chapter 5 TCP and UDP Ports and Protocols TCP vs. UDP Ports and Protocols HTTP vs. HTTPS Email Protocols FTP, SSH, and Telnet DHCP DNS LDAP RDP More Protocols and Ports Chapter 6 Network Devices Switches Routers Wireless Access Points Firewalls Network Interface Cards Hubs Patch Panels Power over Ethernet Cable/DSL Modems Network Interface Devices Software-Defined Networking Chapter 7 Wireless Protocols 802.11 Wireless Long-Range Fixed Wireless RFID Chapter 8 Networked Hosts Server Roles File Servers Web Servers Print Servers Mail Servers Proxy Servers DHCP Servers DNS Servers Syslog Servers AAA Servers Internet Security Appliances Network Firewall UTM Spam Gateway Load Balancer Embedded Systems and IoT Embedded Systems IoT Chapter 9 SOHO Network Configuration Configuring IPv4 Private vs. Public Addresses Configuring IPv6 Chapter 10 Network Configuration Concepts DNS Email Authentication Methods DHCP DHCP Process DHCP Reservations VLANs VPNs Chapter 11 Network Types Network Types LAN and WAN MAN SAN WLAN WMN PAN Internet Connection Types Cable Internet DSL Fiber Satellite Wireless Internet Service Provider Chapter 12 Networking Tools Network Cabling Tools Network Tap Wi-Fi Analyzers CORE 1 (220-1101): DOMAIN 3.0: HARDWARE Chapter 13 Cables and Connectors Network Cables Twisted Pair Coaxial Optical Peripheral Cables and Connectors USB Lightning and Thunderbolt Serial Video Cables and Connectors Storage Drive Cables and Connectors Adapters Chapter 14 RAM RAM Types DDR3 DDR4 DDR5 Installing RAM RAM Technologies Single-Channel vs. Multichannel Architectures ECC vs. Non-ECC Chapter 15 Storage Drives SATA Magnetic Hard Drives Solid-State Drives RAID Flash USB Flash Drives Secure Digital Cards Optical Drives Chapter 16 Motherboards and Add-on Cards Motherboard Form Factors and Connector Types ATX microATX ITX Expansion Buses Expansion Cards Installing Video Cards Sound Cards Other Expansion Cards More Ports and Connectors BIOS/UEFI Settings The POST Chapter 17 CPUs CPU Architecture Clock Rate Overclocking Types of CPUs Multithreading and Multicore Cache Memory CPU Compatibility Intel and AMD Sockets Power Consumption Cooling Mechanisms Heat Sinks Thermal Paste Fans Liquid Cooling Systems Installing CPUs Chapter 18 Power Planning Which Power Supply to Use Types of Power Supplies and Compatibility Wattage and Capacity Requirements Number and Type of Power Connectors Modular and Redundant PSUs Installing the Power Supply Chapter 19 Multifunction Devices/Printers Setup Considerations Printer Configuration Settings Basic Printer Configuration Settings Sharing Printers and Managing Permissions Local vs. Network Printers Basic Printer Security Chapter 20 Printer Consumables Laser Printers Inkjet Printers Thermal Printers Impact Printers 3D Printers CORE 1 (220-1101): DOMAIN 4.0: VIRTUALIZATION AND CLOUD COMPUTING Chapter 21 Cloud Computing Concepts Introduction to Cloud Computing Common Cloud Models Cloud Computing Characteristics Desktop Virtualization Chapter 22 Client-Side Virtualization Purpose of Virtual Machines Hypervisors Examples of Virtual Machine Software Virtual Machine Requirements Cross-Platform Virtualization Containers and Sandboxes OS-Level Virtualization (Containers) Sandboxes CORE 1 (220-1101): DOMAIN 5.0: HARDWARE AND NETWORK TROUBLESHOOTING Chapter 23 Computer Troubleshooting 101 The CompTIA Six-Step Troubleshooting Process Step 1: Identify the Problem Step 2: Establish a Theory of Probable Cause (Question the Obvious) Step 3: Test the Theory to Determine the Cause Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution Step 5: Verify Full System Functionality and, if Applicable, Implement Preventive Measures Step 6: Document the Findings, Actions, and Outcomes Chapter 24 Troubleshooting Motherboards, CPUs, RAM, and Power Troubleshooting Motherboards Troubleshooting CPUs Troubleshooting RAM Troubleshooting Power Supply Issues Heating and Cooling Chapter 25 Troubleshooting Storage Drives and RAID Arrays Preventive Maintenance and Troubleshooting of Storage Drives Storage Drive Preventive Maintenance Storage Drive Troubleshooting Troubleshooting RAID Arrays Chapter 26 Troubleshooting Video Issues PC Video Troubleshooting External Laptop Monitors and Projectors External Laptop Monitors Projectors Chapter 27 Troubleshooting Mobile Devices Mobile Device Display Troubleshooting Mobile Device Overheating More Mobile Device Troubleshooting Disassembling Processes Chapter 28 Troubleshooting Printers Troubleshooting Printers Print Jobs and the Print Spooler Managing Printers and Print Jobs The Windows Print Spooler Chapter 29 Troubleshooting Wired and Wireless Network Problems Troubleshooting Common Symptoms A+ Core 1 (220-1101) Practice Exam Part II: Introduction to Core 2 (220-1102) CORE 2 (220-1102): DOMAIN 1.0: OPERATING SYSTEMS Chapter 30 Comparing Windows Editions Windows 10 Editions and Feature Differences Windows Desktop/User Interface and Components Windows 10 Upgrade Paths Windows 11 Chapter 31 Microsoft Command-Line Tools, Part I Microsoft Command-Line Basics Command Prompt PowerShell Windows Terminal Ask for Help! Navigating in the Command Line Working with Directories and Files Partitioning and File System-Based Commands chkdsk and sfc chkdsk SFC winver and shutdown shutdown Advanced Commands: gpupdate and gpresult Chapter 32 Microsoft Command-Line Tools, Part II Networking Commands ipconfig ping tracert and pathping hostname netstat nslookup net Bonus Command: arp Chapter 33 Microsoft Operating System Features and Tools, Part I Task Manager The MMC and Administrative Tools The MMC Event Viewer Task Scheduler Device Manager Certificate Manager Local Users and Groups Performance Monitor Group Policy Editor and Local Security Policy Services Bonus Tool: Computer Management Chapter 34 Microsoft Operating System Features and Tools, Part II Disk Management The Disk Management Utility Mount Points and Mounting a Drive Storage Spaces Disk Cleanup Optimize Drives/Disk Defragmenter Additional Windows Tools System Information/msinfo32 Resource Monitor System Configuration/MSConfig The Windows Registry Chapter 35 Windows Control Panel Utilities Opening and Viewing the Control Panel Utilities Internet Options Devices and Printers Programs and Features Program Compatibility Windows Defender Firewall Mail Sound User Accounts Indexing Options File Explorer Options Power Management Ease of Access Center Chapter 36 Windows Settings How to Access Settings Time & Language Update & Security Windows Update Windows Defender Firewall Personalization Apps Privacy System Display Power & Sleep Storage About and System Properties Virtual Memory Devices Network & Internet Gaming Accounts Chapter 37 Windows Networking Workgroup vs. Domain Setup Sharing Resources and Making Network Connections Printer Sharing and Access Establishing Networking Connections Proxy Settings Chapter 38 Application Installation and Configuration Concepts 32-Bit vs. 64-Bit System and OS Requirements for Applications Scenario 1: Video Editing Program Scenario 2: Developer Program Distribution Methods Other Considerations for New Applications Application Impact User Permissions Security Considerations Chapter 39 Common Operating Systems Workstation Operating Systems Smartphone and Tablet Operating Systems Android iOS iPadOS File System Types and Formatting Windows File System Basics Linux File System Basics macOS File System Basics Vendor Life-Cycle Limitations Compatibility Concerns Between Operating Systems Chapter 40 Operating System Installations and Upgrades Boot Methods Types of Installations Partitioning Primary and Extended Partitions and Logical Drives Basic and Dynamic Drives GPT vs. MBR More OS Installation and Upgrade Considerations Chapter 41 macOS macOS Basics System Preferences macOS Features Managing and Maintaining macOS Installation and Uninstallation of Applications Apple ID Chapter 42 Linux Linux Basics Linux Desktop Distributions Linux Partition Scheme and File System Linux Command Line Samba Linux Best Practices Updates and Patches Backups Anti-malware In Closing CORE 2 (220-1102): DOMAIN 2.0: SECURITY Chapter 43 Physical Security Physical Locks Entry Systems Biometrics Other Physical Security Precautions Protecting Data Physically Chapter 44 Logical Security Authentication Principle of Least Privilege MDM Policies Active Directory User Profiles Logon Script Home Folder Group Policy Security Groups More Logical Security Concepts Authenticator Applications Hard Tokens vs. Soft Tokens Access Control Lists SMS Email Security Chapter 45 Wireless Security and Malware Comparing/Contrasting Wireless Security Protocols and Authentication Methods Wireless and Encryption Protocols RADIUS and TACACS+ Kerberos Detecting, Removing, and Preventing Malware Using the Appropriate Tools and Methods Malicious Software Types Preventing Malicious Software Chapter 46 Social Engineering Social Engineering Phishing Evil Twin Shoulder Surfing Piggybacking/Tailgating Dumpster Diving Impersonation Threats and Vulnerabilities Network-Based Attacks Password Cracking Additional Security Threats Vulnerabilities and Security Best Practices Chapter 47 Windows Security Settings The CIA of Computer Security Windows Defender Antivirus Windows Defender Firewall Users and Groups Permissions Permission Inheritance and Propagation Moving and Copying Folders and Files File Security Administrative Shares Encrypting File System BitLocker Encryption Chapter 48 Windows Best Practices Usernames and Passwords Password Policies Account Management and End-User Best Practices Disabling AutoPlay/AutoRun Chapter 49 Mobile Device Security Screen Locks Authenticator Applications Theft and Loss of Mobile Devices Compromised and Damaged Devices Backups Updates Antivirus/Anti-malware/Firewalls MDM and MAM Full Device Encryption IoT Security Policies and Procedures Profile Security Requirements Chapter 50 Data Destruction and Disposal Data Security 101 Formatting Drives Overwriting Drives Clear Purge Destroy Chapter 51 SOHO Security Changing Default Passwords Wireless-Specific Security Settings Changing and Disabling the SSID Antennas and Radio Power Levels Guest Networks Disabling WPS Enabling MAC Filtering and IP Filtering Assigning Static IP Addresses Firewall Settings and Additional Configurations Content Filtering/Parental Controls Disabling Physical Ports and More Physical Security A Final Word on SOHO Routers Chapter 52 Browser Security Browser Download/Installation Settings Extensions and Plug-ins Password Managers Secure Connections TLS Secure Sites and Tracking More Settings CORE 2 (220-1102): DOMAIN 3.0: SOFTWARE TROUBLESHOOTING Chapter 53 Troubleshooting Microsoft Windows Windows Recovery Windows Recovery Environment (Windows RE) Startup Settings System Restore Improper, Spontaneous, and Frequent Shutdowns Stop Errors Restoring Windows Common Windows Symptoms and Solutions Chapter 54 Troubleshooting PC Security Issues The CompTIA A+ Seven-Step Malware Removal Procedure Malware Removal Scenario 1. Investigate and Verify Malware Symptoms 2. Quarantine the Infected Systems 3. Disable System Restore in Windows 4. Remediate the Infected Systems 5. Schedule Scans and Run Updates 6. Enable System Restore and Create a Restore Point (in Windows) 7. Educate the End User Symptoms of Viruses Symptoms of Spyware More Symptoms of PC Security Issues and Potential Solutions Chapter 55 Troubleshooting Mobile Operating Systems and Applications Wireless Troubleshooting Wi-Fi Troubleshooting Bluetooth Troubleshooting NFC and AirDrop Troubleshooting Troubleshooting Email Connections Troubleshooting and Stopping Applications Initiating Resets More Mobile Application and OS Troubleshooting Updates: The Good and the Bad Application Issues Random Reboots Poor Battery Life Video Issues Chapter 56 Troubleshooting Mobile Operating Systems Security Issues Mobile Device Security Concerns and Symptoms CORE 2 (220-1102): DOMAIN 4.0: OPERATIONAL PROCEDURES Chapter 57 Documentation Types of Documents Network Topology Diagrams Incident Report Documentation Standard Operating Procedure Compliance and Regulatory Policy Acceptable Use Policy User Checklists (Onboarding and Offboarding) Knowledge Bases/Articles Ticketing Systems Asset Management Chapter 58 Change Management and Backup Methods Understanding Basic Change Management Best Practices Implementing Workstation Backup and Recovery Methods Using Windows File History and Recovery Backup Methods Backup Testing Backup Rotation Schemes Chapter 59 Safety Procedures ESD Prevention and Equipment Grounding Electrical Safety Electrical Fire Safety Physical Safety Chapter 60 Environmental Controls Temperature, Humidity, and Air MSDS and Disposal Power Devices Surge Protectors Uninterruptible Power Supplies Chapter 61 Incident Response, Communication, and Professionalism Understanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts Incident Response Licensing/DRM/EULA Regulated Data Using Proper Communication Techniques and Professionalism Communication Techniques and Professionalism Chapter 62 Basic Scripting, Part I Programming 101 Basic Data Types Basic Script Constructs Environment Variables Comment Syntax Chapter 63 Basic Scripting, Part II PowerShell and .ps1 Bash and .sh Use Cases and Other Considerations for PowerShell and Bash Python and .py JavaScript and .js Visual Basic Script and .vbs Chapter 64 Remote Access Technologies Remote Desktop Remote Assistance Remote Desktop Connection Connecting with Remote Desktop SSH More Third-Party Tools VPN A+ Core 2 (220-1102) Practice Exam Chapter 65 Getting Ready for the Exams, and Farewell Getting Ready for the Exams Tips for Taking the Real Exams General Practices for Taking Exams Smart Methods for Difficult Questions Wrapping Up the Exam Beyond the CompTIA A+ Certification 9780137637546 TOC 4/12/2022David L. Prowse has more than 20 years of experience in the IT field and loves to share his knowledge with readers, viewers, and students. Dave is an advocate of lifelong learning, self-improvement, building confidence, and the sharing of knowledge, and he promotes these ideas in his books, videos, and classes. He answers questions at his websites: https://dprocomputer.com (for A+) and https://prowse.tech (for Linux).

Caractéristiques techniques

  PAPIER
Éditeur(s) Prentice
Auteur(s) David Prowse
Parution 13/09/2022
Nb. de pages 1088
EAN13 9780137637546

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription