CompTIA a+ Certmike prepare. practice. pass the test! get certified! core 2 exam 220-1102
Skip the fluff and get straight to the essentials with an indispensable prep handbook for the CompTIA A+ Core 2 exam In CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and pr...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons, Inc
[2023]
|
Colección: | CertMike Get Certified Series
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009755210006719 |
Tabla de Contenidos:
- Intro
- TABLE OF CONTENTS
- WILEY BOOKS IN THE CERTMIKE SERIES
- TITLE PAGE
- COPYRIGHT
- DEDICATION
- ACKNOWLEDGMENTS
- ABOUT THE AUTHORS
- ABOUT THE TECHNICAL EDITOR
- INTRODUCTION
- THE A+ PROGRAM
- WHAT DOES THIS BOOK COVER?
- CORE 1 EXAM 220-1102 EXAM OBJECTIVES
- CORE 2 EXAM 220-1102 CERTIFICATION EXAM OBJECTIVE MAP
- HOW TO CONTACT THE PUBLISHER
- PART I: Domain 1.0: Operating Systems
- CHAPTER 1: Microsoft Windows Editions
- WINDOWS 10 EDITIONS
- FEATURE DIFFERENCES BETWEEN EDITIONS
- UPGRADE PATHS
- CHAPTER 2: Microsoft Command-Line Tools
- NAVIGATION
- COMMAND-LINE TOOLS
- CHAPTER 3: Windows 10 Operating System Tools
- TASK MANAGER
- MICROSOFT MANAGEMENT CONSOLE (MMC) SNAP-IN
- ADDITIONAL TOOLS
- CHAPTER 4: Windows 10 Control Panel
- CONTROL PANEL OVERVIEW
- OPENING CONTROL PANEL
- INTERNET OPTIONS
- DEVICES AND PRINTERS
- PROGRAMS AND FEATURES
- NETWORK AND SHARING CENTER
- SYSTEM
- WINDOWS DEFENDER FIREWALL
- SOUND
- USER ACCOUNTS
- DEVICE MANAGER
- INDEXING OPTIONS
- ADMINISTRATIVE TOOLS
- FILE EXPLORER OPTIONS
- POWER OPTIONS
- EASE OF ACCESS
- CHAPTER 5: Windows Settings
- ACCESSING SETTINGS
- TIME &
- LANGUAGE
- UPDATE &
- SECURITY
- PERSONALIZATION
- APPS
- PRIVACY
- SYSTEM
- DEVICES
- NETWORK &
- INTERNET
- GAMING
- ACCOUNTS
- CHAPTER 6: Windows Networking
- WORKGROUP VS. DOMAIN SETUP
- LOCAL OS FIREWALL SETTINGS
- CLIENT NETWORK CONFIGURATION
- ESTABLISH NETWORK CONNECTIONS
- PROXY SETTINGS
- PUBLIC NETWORK VS. PRIVATE NETWORK
- FILE EXPLORER NAVIGATION - NETWORK PATHS
- METERED CONNECTIONS AND LIMITATIONS
- CHAPTER 7: Application Installation and Configuration
- SYSTEM REQUIREMENTS FOR APPLICATIONS
- OS REQUIREMENTS FOR APPLICATIONS
- DISTRIBUTION METHODS
- PHYSICAL MEDIA VS. DOWNLOADABLE
- ISO MOUNTABLE.
- OTHER CONSIDERATIONS FOR NEW APPLICATIONS
- CHAPTER 8: Operating System Types
- WORKSTATION OSs
- CELL PHONE/TABLET OSs
- VARIOUS FILESYSTEM TYPES
- VENDOR LIFE-CYCLE LIMITATIONS
- COMPATIBILITY CONCERNS BETWEEN OSs
- CHAPTER 9: Operating System Installations and Upgrades
- BOOT METHODS
- TYPES OF INSTALLATIONS
- PARTITIONING
- DRIVE FORMAT
- UPGRADE CONSIDERATIONS
- FEATURE UPDATES
- CHAPTER 10: macOS
- INSTALLATION AND UNINSTALLATION OF APPLICATIONS
- APPLE ID AND CORPORATE RESTRICTIONS
- BEST PRACTICES
- SYSTEM PREFERENCES
- FEATURES
- DISK UTILITY
- FILEVAULT
- TERMINAL
- FORCE QUIT
- CHAPTER 11: Linux
- COMMON COMMANDS
- BEST PRACTICES
- TOOLS
- PART II: Domain 2.0: Security
- CHAPTER 12: Physical Security
- PHYSICAL SECURITY
- PHYSICAL SECURITY FOR STAFF
- CHAPTER 13: Logical Security
- LOGICAL SECURITY
- MOBILE DEVICE MANAGEMENT (MDM)
- ACTIVE DIRECTORY
- CHAPTER 14: Wireless Security
- PROTOCOLS AND ENCRYPTION
- AUTHENTICATION
- CHAPTER 15: Malware
- MALWARE
- MALWARE PREVENTION AND REMOVAL TOOLS AND METHODS
- CHAPTER 16: Social Engineering and Security Threats
- SOCIAL ENGINEERING
- THREATS
- VULNERABILITIES
- CHAPTER 17: Windows Security
- DEFENDER ANTIVIRUS
- FIREWALL
- USERS AND GROUPS
- LOGIN OS OPTIONS
- NTFS VS. SHARE PERMISSIONS
- RUN AS ADMINISTRATOR VS. STANDARD USER
- BitLocker
- BITLOCKER TO GO
- ENCRYPTING FILE SYSTEM (EFS)
- CHAPTER 18: Workstation Security Configuration
- DATA-AT-REST ENCRYPTION
- PASSWORD BEST PRACTICES
- END-USER BEST PRACTICES
- ACCOUNT MANAGEMENT
- CHANGE DEFAULT ADMINISTRATOR'S USER ACCOUNT/PASSWORD
- DISABLE AutoRun
- DISABLE AutoPlay
- CHAPTER 19: Mobile and Embedded Device Security
- SCREEN LOCKS
- LOCATOR APPS AND REMOTE WIPES
- OS UPDATES
- DEVICE ENCRYPTION
- REMOTE BACKUP APPLICATIONS
- FAILED LOGIN ATTEMPTS RESTRICTIONS.
- ANTIVIRUS/ANTIMALWARE
- FIREWALLS
- POLICIES AND PROCEDURES
- INTERNET OF THINGS (IoT)
- CHAPTER 20: Data Destruction and Disposal
- PHYSICAL DESTRUCTION
- RECYCLING OR REPURPOSING BEST PRACTICES
- OUTSOURCING CONCEPTS
- CHAPTER 21: Network Security
- HOME ROUTER SETTINGS
- WIRELESS SPECIFIC SETTINGS
- FIREWALL SETTINGS
- CHAPTER 22: Browser Security
- BROWSER DOWNLOAD/INSTALLATION
- SETTINGS
- PART III: Domain 3.0: Software Troubleshooting
- CHAPTER 23: Troubleshooting Windows
- COMMON SYMPTOMS
- COMMON TROUBLESHOOTING STEPS
- CHAPTER 24: Troubleshooting PC Security
- COMMON SYMPTOMS
- BROWSER-RELATED SYMPTOMS
- CHAPTER 25: Troubleshooting Malware
- STEP 1. INVESTIGATE AND VERIFY MALWARE SYMPTOMS
- STEP 2. QUARANTINE INFECTED SYSTEMS
- STEP 3. DISABLE SYSTEM RESTORE IN WINDOWS
- STEP 4. REMEDIATE INFECTED SYSTEMS
- STEP 5. SCHEDULE SCANS AND RUN UPDATES
- STEP 6. ENABLE SYSTEM RESTORE AND CREATE A RESTORE POINT IN WINDOWS
- STEP 7. EDUCATE THE END USER
- CHAPTER 26: Troubleshooting Mobile Device OS and Applications
- COMMON MOBILE OS AND APPLICATION SYMPTOMS
- CHAPTER 27: Troubleshooting Mobile Device Security
- SECURITY CONCERNS
- COMMON SYMPTOMS
- PART IV: Domain 4.0: Operational Procedures
- CHAPTER 28: Documentation
- TICKETING SYSTEMS
- ASSET MANAGEMENT
- TYPES OF DOCUMENTS
- KNOWLEDGE BASE/ARTICLES
- CHAPTER 29: Change Management
- DOCUMENTED BUSINESS PROCESSES
- CHANGE MANAGEMENT
- CHAPTER 30: Workstation Backup and Recovery
- BACKUP AND RECOVERY
- BACKUP TESTING
- BACKUP ROTATION SCHEMES
- CHAPTER 31: Safety
- ELECTROSTATIC DISCHARGE (ESD) STRAPS
- ESD MATS
- EQUIPMENT GROUNDING
- PROPER POWER HANDLING
- PROPER COMPONENT HANDLING AND STORAGE
- ANTISTATIC BAGS
- COMPLIANCE WITH GOVERNMENT REGULATIONS
- PERSONAL SAFETY
- CHAPTER 32: Environmental Protection.
- MATERIAL SAFETY DATA SHEET (MSDS): DOCUMENTATION FOR HANDLING AND DISPOSAL
- TEMPERATURE, HUMIDITY-LEVEL AWARENESS, AND PROPER VENTILATION
- POWER SURGES, UNDER-VOLTAGE EVENTS, AND POWER FAILURES
- CHAPTER 33: Privacy, Licensing, Policy, and Incident Response
- INCIDENT RESPONSE
- LICENSING/DIGITAL RIGHTS MANAGEMENT (DRM)/END-USER LICENSE AGREEMENT (EULA)
- REGULATED DATA
- CHAPTER 34: Communication and Professionalism
- PROFESSIONAL APPEARANCE AND ATTIRE
- USE PROPER LANGUAGE AND AVOID JARGON, ACRONYMS, AND SLANG, WHEN APPLICABLE
- MAINTAIN A POSITIVE ATTITUDE/PROJECT CONFIDENCE
- ACTIVELY LISTEN, TAKE NOTES, AND AVOID INTERRUPTING THE CUSTOMER
- BE CULTURALLY SENSITIVE
- BE ON TIME (IF LATE, CONTACT THE CUSTOMER)
- AVOID DISTRACTIONS
- DEALING WITH DIFFICULT CUSTOMERS OR SITUATIONS
- SET AND MEET EXPECTATIONS/TIME LINE AND COMMUNICATE STATUS WITH THE CUSTOMER
- DEAL APPROPRIATELY WITH CUSTOMERS' CONFIDENTIAL AND PRIVATE MATERIALS
- CHAPTER 35: Scripting
- SCRIPT FILE TYPES
- USE CASES FOR SCRIPTING
- OTHER CONSIDERATIONS WHEN USING SCRIPTS
- CHAPTER 36: Remote Access
- METHODS/TOOLS
- SECURITY CONSIDERATIONS OF EACH ACCESS METHOD
- INDEX
- END USER LICENSE AGREEMENT.