CompTIA a+ Certmike prepare. practice. pass the test! get certified! core 2 exam 220-1102

Skip the fluff and get straight to the essentials with an indispensable prep handbook for the CompTIA A+ Core 2 exam In CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and pr...

Descripción completa

Detalles Bibliográficos
Otros Autores: Chapple, Mike, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc [2023]
Colección:CertMike Get Certified Series
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009755210006719
Tabla de Contenidos:
  • Intro
  • TABLE OF CONTENTS
  • WILEY BOOKS IN THE CERTMIKE SERIES
  • TITLE PAGE
  • COPYRIGHT
  • DEDICATION
  • ACKNOWLEDGMENTS
  • ABOUT THE AUTHORS
  • ABOUT THE TECHNICAL EDITOR
  • INTRODUCTION
  • THE A+ PROGRAM
  • WHAT DOES THIS BOOK COVER?
  • CORE 1 EXAM 220-1102 EXAM OBJECTIVES
  • CORE 2 EXAM 220-1102 CERTIFICATION EXAM OBJECTIVE MAP
  • HOW TO CONTACT THE PUBLISHER
  • PART I: Domain 1.0: Operating Systems
  • CHAPTER 1: Microsoft Windows Editions
  • WINDOWS 10 EDITIONS
  • FEATURE DIFFERENCES BETWEEN EDITIONS
  • UPGRADE PATHS
  • CHAPTER 2: Microsoft Command-Line Tools
  • NAVIGATION
  • COMMAND-LINE TOOLS
  • CHAPTER 3: Windows 10 Operating System Tools
  • TASK MANAGER
  • MICROSOFT MANAGEMENT CONSOLE (MMC) SNAP-IN
  • ADDITIONAL TOOLS
  • CHAPTER 4: Windows 10 Control Panel
  • CONTROL PANEL OVERVIEW
  • OPENING CONTROL PANEL
  • INTERNET OPTIONS
  • DEVICES AND PRINTERS
  • PROGRAMS AND FEATURES
  • NETWORK AND SHARING CENTER
  • SYSTEM
  • WINDOWS DEFENDER FIREWALL
  • MAIL
  • SOUND
  • USER ACCOUNTS
  • DEVICE MANAGER
  • INDEXING OPTIONS
  • ADMINISTRATIVE TOOLS
  • FILE EXPLORER OPTIONS
  • POWER OPTIONS
  • EASE OF ACCESS
  • CHAPTER 5: Windows Settings
  • ACCESSING SETTINGS
  • TIME &amp
  • LANGUAGE
  • UPDATE &amp
  • SECURITY
  • PERSONALIZATION
  • APPS
  • PRIVACY
  • SYSTEM
  • DEVICES
  • NETWORK &amp
  • INTERNET
  • GAMING
  • ACCOUNTS
  • CHAPTER 6: Windows Networking
  • WORKGROUP VS. DOMAIN SETUP
  • LOCAL OS FIREWALL SETTINGS
  • CLIENT NETWORK CONFIGURATION
  • ESTABLISH NETWORK CONNECTIONS
  • PROXY SETTINGS
  • PUBLIC NETWORK VS. PRIVATE NETWORK
  • FILE EXPLORER NAVIGATION - NETWORK PATHS
  • METERED CONNECTIONS AND LIMITATIONS
  • CHAPTER 7: Application Installation and Configuration
  • SYSTEM REQUIREMENTS FOR APPLICATIONS
  • OS REQUIREMENTS FOR APPLICATIONS
  • DISTRIBUTION METHODS
  • PHYSICAL MEDIA VS. DOWNLOADABLE
  • ISO MOUNTABLE.
  • OTHER CONSIDERATIONS FOR NEW APPLICATIONS
  • CHAPTER 8: Operating System Types
  • WORKSTATION OSs
  • CELL PHONE/TABLET OSs
  • VARIOUS FILESYSTEM TYPES
  • VENDOR LIFE-CYCLE LIMITATIONS
  • COMPATIBILITY CONCERNS BETWEEN OSs
  • CHAPTER 9: Operating System Installations and Upgrades
  • BOOT METHODS
  • TYPES OF INSTALLATIONS
  • PARTITIONING
  • DRIVE FORMAT
  • UPGRADE CONSIDERATIONS
  • FEATURE UPDATES
  • CHAPTER 10: macOS
  • INSTALLATION AND UNINSTALLATION OF APPLICATIONS
  • APPLE ID AND CORPORATE RESTRICTIONS
  • BEST PRACTICES
  • SYSTEM PREFERENCES
  • FEATURES
  • DISK UTILITY
  • FILEVAULT
  • TERMINAL
  • FORCE QUIT
  • CHAPTER 11: Linux
  • COMMON COMMANDS
  • BEST PRACTICES
  • TOOLS
  • PART II: Domain 2.0: Security
  • CHAPTER 12: Physical Security
  • PHYSICAL SECURITY
  • PHYSICAL SECURITY FOR STAFF
  • CHAPTER 13: Logical Security
  • LOGICAL SECURITY
  • MOBILE DEVICE MANAGEMENT (MDM)
  • ACTIVE DIRECTORY
  • CHAPTER 14: Wireless Security
  • PROTOCOLS AND ENCRYPTION
  • AUTHENTICATION
  • CHAPTER 15: Malware
  • MALWARE
  • MALWARE PREVENTION AND REMOVAL TOOLS AND METHODS
  • CHAPTER 16: Social Engineering and Security Threats
  • SOCIAL ENGINEERING
  • THREATS
  • VULNERABILITIES
  • CHAPTER 17: Windows Security
  • DEFENDER ANTIVIRUS
  • FIREWALL
  • USERS AND GROUPS
  • LOGIN OS OPTIONS
  • NTFS VS. SHARE PERMISSIONS
  • RUN AS ADMINISTRATOR VS. STANDARD USER
  • BitLocker
  • BITLOCKER TO GO
  • ENCRYPTING FILE SYSTEM (EFS)
  • CHAPTER 18: Workstation Security Configuration
  • DATA-AT-REST ENCRYPTION
  • PASSWORD BEST PRACTICES
  • END-USER BEST PRACTICES
  • ACCOUNT MANAGEMENT
  • CHANGE DEFAULT ADMINISTRATOR'S USER ACCOUNT/PASSWORD
  • DISABLE AutoRun
  • DISABLE AutoPlay
  • CHAPTER 19: Mobile and Embedded Device Security
  • SCREEN LOCKS
  • LOCATOR APPS AND REMOTE WIPES
  • OS UPDATES
  • DEVICE ENCRYPTION
  • REMOTE BACKUP APPLICATIONS
  • FAILED LOGIN ATTEMPTS RESTRICTIONS.
  • ANTIVIRUS/ANTIMALWARE
  • FIREWALLS
  • POLICIES AND PROCEDURES
  • INTERNET OF THINGS (IoT)
  • CHAPTER 20: Data Destruction and Disposal
  • PHYSICAL DESTRUCTION
  • RECYCLING OR REPURPOSING BEST PRACTICES
  • OUTSOURCING CONCEPTS
  • CHAPTER 21: Network Security
  • HOME ROUTER SETTINGS
  • WIRELESS SPECIFIC SETTINGS
  • FIREWALL SETTINGS
  • CHAPTER 22: Browser Security
  • BROWSER DOWNLOAD/INSTALLATION
  • SETTINGS
  • PART III: Domain 3.0: Software Troubleshooting
  • CHAPTER 23: Troubleshooting Windows
  • COMMON SYMPTOMS
  • COMMON TROUBLESHOOTING STEPS
  • CHAPTER 24: Troubleshooting PC Security
  • COMMON SYMPTOMS
  • BROWSER-RELATED SYMPTOMS
  • CHAPTER 25: Troubleshooting Malware
  • STEP 1. INVESTIGATE AND VERIFY MALWARE SYMPTOMS
  • STEP 2. QUARANTINE INFECTED SYSTEMS
  • STEP 3. DISABLE SYSTEM RESTORE IN WINDOWS
  • STEP 4. REMEDIATE INFECTED SYSTEMS
  • STEP 5. SCHEDULE SCANS AND RUN UPDATES
  • STEP 6. ENABLE SYSTEM RESTORE AND CREATE A RESTORE POINT IN WINDOWS
  • STEP 7. EDUCATE THE END USER
  • CHAPTER 26: Troubleshooting Mobile Device OS and Applications
  • COMMON MOBILE OS AND APPLICATION SYMPTOMS
  • CHAPTER 27: Troubleshooting Mobile Device Security
  • SECURITY CONCERNS
  • COMMON SYMPTOMS
  • PART IV: Domain 4.0: Operational Procedures
  • CHAPTER 28: Documentation
  • TICKETING SYSTEMS
  • ASSET MANAGEMENT
  • TYPES OF DOCUMENTS
  • KNOWLEDGE BASE/ARTICLES
  • CHAPTER 29: Change Management
  • DOCUMENTED BUSINESS PROCESSES
  • CHANGE MANAGEMENT
  • CHAPTER 30: Workstation Backup and Recovery
  • BACKUP AND RECOVERY
  • BACKUP TESTING
  • BACKUP ROTATION SCHEMES
  • CHAPTER 31: Safety
  • ELECTROSTATIC DISCHARGE (ESD) STRAPS
  • ESD MATS
  • EQUIPMENT GROUNDING
  • PROPER POWER HANDLING
  • PROPER COMPONENT HANDLING AND STORAGE
  • ANTISTATIC BAGS
  • COMPLIANCE WITH GOVERNMENT REGULATIONS
  • PERSONAL SAFETY
  • CHAPTER 32: Environmental Protection.
  • MATERIAL SAFETY DATA SHEET (MSDS): DOCUMENTATION FOR HANDLING AND DISPOSAL
  • TEMPERATURE, HUMIDITY-LEVEL AWARENESS, AND PROPER VENTILATION
  • POWER SURGES, UNDER-VOLTAGE EVENTS, AND POWER FAILURES
  • CHAPTER 33: Privacy, Licensing, Policy, and Incident Response
  • INCIDENT RESPONSE
  • LICENSING/DIGITAL RIGHTS MANAGEMENT (DRM)/END-USER LICENSE AGREEMENT (EULA)
  • REGULATED DATA
  • CHAPTER 34: Communication and Professionalism
  • PROFESSIONAL APPEARANCE AND ATTIRE
  • USE PROPER LANGUAGE AND AVOID JARGON, ACRONYMS, AND SLANG, WHEN APPLICABLE
  • MAINTAIN A POSITIVE ATTITUDE/PROJECT CONFIDENCE
  • ACTIVELY LISTEN, TAKE NOTES, AND AVOID INTERRUPTING THE CUSTOMER
  • BE CULTURALLY SENSITIVE
  • BE ON TIME (IF LATE, CONTACT THE CUSTOMER)
  • AVOID DISTRACTIONS
  • DEALING WITH DIFFICULT CUSTOMERS OR SITUATIONS
  • SET AND MEET EXPECTATIONS/TIME LINE AND COMMUNICATE STATUS WITH THE CUSTOMER
  • DEAL APPROPRIATELY WITH CUSTOMERS' CONFIDENTIAL AND PRIVATE MATERIALS
  • CHAPTER 35: Scripting
  • SCRIPT FILE TYPES
  • USE CASES FOR SCRIPTING
  • OTHER CONSIDERATIONS WHEN USING SCRIPTS
  • CHAPTER 36: Remote Access
  • METHODS/TOOLS
  • SECURITY CONSIDERATIONS OF EACH ACCESS METHOD
  • INDEX
  • END USER LICENSE AGREEMENT.