Atnaujinkite slapukų nuostatas

El. knyga: CompTIA Aplus Complete Review Guide - Exam 220-1001 and Exam 220-1002 4e: Exam Core 1 220-1001 and Exam Core 2 220-1002 4th Edition [Wiley Online]

  • Formatas: 704 pages
  • Išleidimo metai: 21-May-2019
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1119575907
  • ISBN-13: 9781119575900
Kitos knygos pagal šią temą:
  • Wiley Online
  • Kaina: 31,72 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Formatas: 704 pages
  • Išleidimo metai: 21-May-2019
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1119575907
  • ISBN-13: 9781119575900
Kitos knygos pagal šią temą:

A comprehensive step-by-step review for A+ certification, revised for the latest exams

The CompTIA A+ Complete Review Guide: Exam 220-1001 and Exam 220-1002, Fourth Edition is an ideal preparation tool to help you ace the exam and get certified. The must-have companion to the CompTIA A+ Complete Study Guide, this book provides a streamlined review of vital exam topics, helping you reinforce comprehension and strengthen retention. Now in its fourth edition, this review guide has been fully updated to focus on the latest best practices and new exam objectives. A clear and concise review structure helps you to focus on problem areas while logically organized topics allow for quick reference and flexible study. Covering both A+ exams, this book covers topics including PC hardware, networking, operating systems and procedures, security, troubleshooting, and more. Access to the Sybex online learning environment includes practice test questions, bonus exams, electronic flashcards, and a searchable glossary of key terms. Organize your exam prep to focus on challenging areas and reinforce your understanding of essential exam objectives.

A+ certification is a vital step for careers in information technology, allowing current and prospective computer technicians to validate or recertify their skills. An essential component to any A+ exam strategy, this valuable review will help you:

  • Learn to install and configure modern hardware and peripherals such as network switches, firewalls, and Bluetooth modules
  • Keep updated on current software, including Windows, Linux, and mobile operating systems
  • Integrate exam reviews with other Sybex learning resources to provide a comprehensive study plan

The CompTIA A+ Complete Review Guide: Exam 220-1001 and Exam 220-1002, Fourth Edition is an integral part of your overall exam prep strategy, allowing you to focus your study on what matters most.

Introduction xxxi
Part I CompTIA A+ Core 1 Exam 220-1001 1(308)
Chapter 1 Mobile Devices
3(54)
1.1 Given a scenario, install and configure laptop hardware and components
8(7)
Hardware/device replacement
8(7)
Exam essential
15(1)
1.2 Given a scenario, install components within the display of a laptop
15(4)
Types
16(1)
WiFi antenna connector/placement
17(1)
Webcam
18(1)
Microphone
18(1)
Inverter
18(1)
Digitizer/touchscreen
18(1)
Exam essentials
19(1)
1.3 Given a scenario, use appropriate laptop features
19(7)
Special function keys
19(5)
Docking station
24(1)
Port replicator
25(1)
Physical laptop lock and cable lock
25(1)
Rotating/removable screens
26(1)
Exam essentials
26(1)
1.4 Compare and contrast characteristics of various types of other mobile devices
26(5)
Tablets
27(1)
Smartphones
27(1)
Wearable technology devices
27(3)
E-readers
30(1)
GPS
31(1)
Exam essentials
31(1)
1.5 Given a scenario, connect, and configure accessories and ports of other mobile devices
31(8)
Connection types
31(5)
Accessories
36(3)
Exam essentials
39(1)
1.6 Given a scenario, configure basic mobile device network connectivity and application support
39(11)
Wireless/cellular data network (enable/disable)
39(1)
Bluetooth
40(2)
Corporate and ISP email configuration
42(3)
Integrated commercial provider email configuration
45(2)
PRI updates/PRL updates/baseband updates
47(1)
Radio firmware
48(1)
IMEI vs. IMSI
49(1)
VPN
49(1)
Exam essentials
49(1)
1.7 Given a scenario, use methods to perform mobile device synchronization
50(7)
Synchronization methods
50(1)
Types of data to synchronize
51(2)
Mutual authentication for multiple services (SSO)
53(1)
Software requirements to install the application on the PC
53(1)
Connection types to enable synchronization
53(1)
Exam essentials
53(1)
Review Questions
54(3)
Chapter 2 Networking
57(54)
2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes
62(3)
Ports and protocols
62(3)
TCP vs. UDP
65(1)
Exam essentials
65(1)
2.2 Compare and contrast common networking hardware devices
65(6)
Routers
66(1)
Switches
66(1)
Access points
67(1)
Cloud-based network controller
67(1)
Firewall
67(1)
Network interface card
67(1)
Repeater
68(1)
Hub
68(1)
Cable/DSL modem
68(1)
Bridge
69(1)
Patch panel
69(1)
Power over Ethernet (PoE)
70(1)
Ethernet over Power
70(1)
Exam essentials
71(1)
2.3 Given a scenario, install and configure a basic wired/wireless SOHO network
71(11)
Router/switch functionality
72(1)
Access point settings
72(1)
IP addressing
73(1)
NIC configuration
73(1)
End-user device configuration
74(1)
IoT device configuration
75(1)
Cable/DSL modem configuration
76(1)
Firewall settings
77(2)
QoS
79(1)
Wireless settings
80(1)
Exam essentials
81(1)
2.4 Compare and contrast wireless networking protocols
82(4)
802.11a
82(1)
802.11b
83(1)
802.11g
83(1)
802.11n
83(1)
802.11ac
83(1)
Frequencies: 2.4, 5.0
84(1)
Channels (1-11)
84(1)
Bluetooth
84(1)
NFC
84(1)
RFID
84(1)
Zigbee
85(1)
Z-Wave
85(1)
3G
85(1)
4G
85(1)
LTE
85(1)
5G
86(1)
Exam essentials
86(1)
2.5 Summarize the properties and purposes of services provided by networked hosts
86(4)
Server roles
86(2)
Internet appliances
88(2)
Legacy/embedded systems
90(1)
Exam essentials
90(1)
2.6 Explain common network configuration concepts
90(9)
IP addressing
90(3)
DNS
93(1)
DHCP
93(1)
IPv4 vs. IPv6
94(1)
Subnet mask
95(1)
Gateway
96(1)
VPN
96(1)
VLAN
97(1)
NAT
97(1)
Exam essentials
98(1)
2.7 Compare and contrast Internet connection types, network types, and their features
99(3)
Internet connection types
99(2)
Network types
101(1)
Exam essentials
102(1)
2.8 Given a scenario, use appropriate networking tools
102(9)
Crimper
103(1)
Cable stripper
103(1)
Multimeter
103(1)
Tone generator and probe
103(1)
Cable tester
104(1)
Loopback plug
104(1)
Punchdown tool
104(1)
WiFi analyzer
104(1)
Exam essentials
105(1)
Review Questions
106(5)
Chapter 3 Hardware
111(124)
3.1 Explain basic cable types, features, and their purposes
120(16)
Network cables
120(4)
Video cables
124(3)
Multipurpose cables
127(3)
Peripheral cables
130(1)
Hard drive cables
131(3)
Adapters
134(2)
Exam essentials
136(1)
3.2 Identify common connector types
136(5)
RJ-11
137(1)
RJ-45
137(1)
RS-232
138(1)
BNC
138(1)
RG-59
139(1)
RG-6
139(1)
USB
139(1)
Micro-USB/Mini-USB
139(1)
USB-C
139(1)
DB-9
139(1)
Lightning
139(1)
SCSI
140(1)
eSATA
140(1)
Molex
140(1)
Exam essentials
141(1)
3.3 Given a scenario, install RAM types
141(6)
RAM types
142(2)
Single channel/dual channel/triple channel
144(1)
Error correcting
145(1)
Installation/RAM slots
145(2)
Exam essentials
147(1)
3.4 Given a scenario, select, install, and configure storage devices
147(12)
Optical drives
147(2)
Solid-state drives
149(1)
Magnetic hard drives
149(2)
Hybrid drives
151(1)
Flash
152(3)
Configurations
155(4)
Exam essentials
159(1)
3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards
159(24)
Motherboard form factor
160(2)
Motherboard connectors types
162(5)
BIOS/UEFI settings
167(4)
CMOS battery
171(1)
CPU features
172(2)
Compatibility
174(4)
Cooling mechanism
178(1)
Expansion cards
179(3)
Exam essentials
182(1)
3.6 Explain the purposes and uses of various peripheral types
183(6)
Printer
184(1)
ADF/flatbed scanner
184(1)
Barcode scanner/QR scanner
184(1)
Monitors
184(1)
VR headset
184(1)
Optical
185(1)
DVD drive
185(1)
Mouse
185(1)
Keyboard
185(1)
Touchpad
185(1)
Signature pad
186(1)
Game controllers
186(1)
Camera/webcam
187(1)
Microphone
187(1)
Speakers
187(1)
Headset
187(1)
Projector
187(1)
External storage drives
188(1)
KVM
188(1)
Magnetic reader/chip reader
188(1)
NFC/tap pay device
188(1)
Smart card reader
188(1)
Exam essentials
189(1)
3.7 Summarize power supply types and features
189(5)
Input 115V vs. 220V
189(1)
Output 5.5V vs. 12V
190(1)
24-pin motherboard adapter
190(1)
Wattage rating
191(1)
Number of devices/types of devices to be powered
191(3)
Exam essentials
194(1)
3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs
194(6)
Graphic/CAD/CAM design workstation
194(1)
Audio/video editing workstation
195(1)
Virtualization workstation
196(1)
Gaming PC
196(2)
Standard thick client
198(1)
Thin client
198(1)
Network-attached storage device
199(1)
Exam essentials
200(1)
3.9 Given a scenario, install and configure common devices
200(2)
Desktop
200(1)
Laptop/common mobile devices
201(1)
Exam essentials
202(1)
3.10 Given a scenario, configure SOHO multifunction devices/printers and settings
202(6)
Use appropriate drivers for a given operating system
202(1)
Device sharing
203(2)
Public/shared devices
205(3)
Exam essentials
208(1)
3.11 Given a scenario, install and maintain various print technologies
208(27)
Laser
210(10)
Inkjet
220(3)
Thermal
223(1)
Impact
224(2)
Virtual
226(1)
3D printers
227(1)
Exam essentials
227(1)
Review Questions
228(7)
Chapter 4 Virtualization and Cloud Computing
235(14)
4.1 Compare and contrast cloud computing concepts
237(5)
Common cloud models
237(1)
Shared resources
238(1)
Rapid elasticity
239(1)
On-demand
239(1)
Resource pooling
239(1)
Measured service
239(1)
Metered
240(1)
Off-site email applications
240(1)
Cloud file storage services
240(1)
Virtual application streaming/cloud-based applications
240(1)
Virtual desktop
241(1)
Exam essentials
242(1)
4.2 Given a scenario, set up and configure client-side virtualization
242(7)
Purpose of virtual machines
242(1)
Resource requirements
243(1)
Emulator requirements
243(1)
Security requirements
243(1)
Network requirements
244(1)
Hypervisor
244(1)
Exam essentials
245(1)
Review Questions
246(3)
Chapter 5 Hardware and Network Troubleshooting
249(60)
5.1 Given a scenario, use the best practice methodology to resolve problems
254(4)
Always consider corporate policies, procedures, and impacts before implementing changes
254(1)
1 Identify the problem
255(1)
2 Establish a theory of probable cause (question the obvious)
256(1)
3 Test the theory to determine cause
256(1)
4 Establish a plan of action to resolve the problem and implement the solution
257(1)
5 Verify full system functionality and, if applicable, implement preventive measures
257(1)
6 Document findings, actions, and outcomes
257(1)
Exam Essentials
257(1)
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power
258(10)
Common symptoms
258(10)
Exam Essentials
268(1)
5.3 Given a scenario, troubleshoot hard drives and RAID arrays
268(4)
Common symptoms
269(3)
Exam Essentials
272(1)
5.4 Given a scenario, troubleshoot video, projector, and display issues
272(6)
Common symptoms
273(5)
Exam essentials
278(1)
5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
278(11)
Common symptoms
279(9)
Disassembling processes for proper reassembly
288(1)
Exam essentials
289(1)
5.6 Given a scenario, troubleshoot printers
289(8)
Common symptoms
290(6)
Exam Essentials
296(1)
5.7 Given a scenario, troubleshoot common wired and wireless network problems
297(14)
Common symptoms
297(7)
Exam essentials
304(1)
Review Questions
305(4)
Part II CompTIA A+ Core 2 Exam 220-1002 309(322)
Chapter 6 Operating Systems
311(152)
1.1 Compare and contrast common operating system types and their purposes
321(3)
32-bit vs. 64-bit
321(1)
Workstation operating systems
322(1)
Cell phone/tablet operating systems
323(1)
Vendor-specific limitations
323(1)
Compatibility concerns between operating systems
324(1)
Exam essentials
324(1)
1.2 Compare and contrast features of Microsoft Windows versions
324(8)
Windows 7
325(1)
Windows 8
325(1)
Windows 8.1
326(1)
Windows 10
326(1)
Corporate vs. personal needs
327(1)
Desktop styles/user interface
328(4)
Exam essentials
332(1)
1.3 Summarize general OS installation considerations and upgrade methods
332(19)
Upgrade paths
332(7)
Boot methods
339(1)
Types of installations
340(4)
Partitioning
344(2)
File system types/formatting
346(2)
Load alternate third-party drivers when necessary
348(1)
Workgroup vs. domain setup
349(1)
Time/date/region/language settings
349(1)
Driver installation, software, and Windows updates
349(1)
Factory recovery partition
350(1)
Properly formatted boot drive with the correct partitions/format
350(1)
Prerequisites/hardware compatibility
350(1)
Application compatibility
350(1)
OS compatibility/upgrade path
350(1)
Exam essentials
350(1)
1.4 Given a scenario, use appropriate Microsoft command-line tools
351(21)
Navigation
352(2)
ipconfig
354(1)
ping
355(1)
tracert
356(2)
netstat
358(1)
nslookup
359(2)
shutdown
361(1)
dism
361(1)
sfc
361(1)
chkdsk
362(1)
diskpart
363(1)
taskkill
363(1)
gpupdate
364(1)
gpresult
364(1)
format
365(1)
copy
366(1)
xcopy
367(1)
robocopy
368(1)
net use
369(1)
net user
370(1)
[ command name]/?
371(1)
Commands available with standard privileges vs. administrative privileges
371(1)
Exam essentials
372(1)
1.5 Given a scenario, use Microsoft operating system features and tools
372(28)
Administrative
373(5)
MSConfig
378(4)
Task Manager
382(8)
Disk Management
390(8)
System utilities
398(2)
Exam essentials
400(1)
1.6 Given a scenario, use Microsoft Windows Control Panel utilities
400(24)
Internet Options
400(6)
Display/Display Settings
406(2)
User Accounts
408(1)
Folder Options
408(3)
System
411(3)
Windows Firewall
414(1)
Power Options
415(1)
Credential Manager
416(1)
Programs and features
417(1)
HomeGroup
418(1)
Devices and Printers
418(1)
Sound
419(1)
Troubleshooting
420(1)
Network and Sharing Center
421(1)
Device Manager
422(1)
Bitlocker
423(1)
Sync Center
424(1)
Exam essentials
424(1)
1.7 Summarize application installation and configuration concepts
424(2)
System requirements
425(1)
OS requirements
425(1)
Methods of installation and deployment
425(1)
Local user permissions
425(1)
Security considerations
426(1)
Exam essentials
426(1)
1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop
426(14)
HomeGroup vs. Workgroup
427(1)
Domain setup
427(2)
Network shares/administrative shares/mapping drives
429(1)
Printer sharing vs. network printer mapping
429(2)
Establish networking connections
431(1)
Proxy settings
432(1)
Remote Desktop Connection
433(1)
Remote Assistance
434(1)
Home vs. Work vs. Public network settings
435(1)
Firewall settings
436(1)
Configuring an alternative IP address in Windows
437(2)
Network card properties
439(1)
Exam essentials
440(1)
1.9 Given a scenario, use features and tools of the MacOS and Linux client/desktop operating systems
440(23)
Best practices
441(4)
Tools
445(5)
Features
450(4)
Basic Linux commands
454(5)
Exam essentials
459(1)
Review Questions
460(3)
Chapter 7 Security
463(78)
2.1 Summarize the importance of physical security measures
470(4)
Mantrap
470(1)
Badge reader
471(1)
Smart card
471(1)
Security guard
472(1)
Door lock
472(1)
Biometric locks
472(1)
Hardware tokens
473(1)
Cable locks
473(1)
Server locks
473(1)
USB locks
473(1)
Privacy screen
474(1)
Key fobs
474(1)
Entry control roster
474(1)
Exam essentials
474(1)
2.2 Explain logical security concepts
474(12)
Active Directory
475(1)
Software tokens
476(1)
MDM policies
476(1)
Port security
476(1)
MAC address filtering
477(1)
Certificates
477(1)
Antivirus/Anti-malware
478(1)
Firewalls
478(3)
User authentication/strong passwords
481(1)
Multifactor authentication
482(1)
Directory permissions
482(2)
VPN
484(1)
DLP
484(1)
Access control lists
484(1)
Smart card
484(1)
Email filtering
484(1)
Trusted/untrusted software sources
485(1)
Principle of least privilege
485(1)
Exam essentials
485(1)
2.3 Compare and contrast wireless security protocols and authentication methods
486(3)
Protocols and encryption
486(1)
Authentication
487(2)
Exam essentials
489(1)
2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
489(11)
Ma lware
489(7)
Tools and methods
496(3)
Exam essentials
499(1)
2.5 Compare and contrast social engineering, threats, and vulnerabilities
500(5)
Social engineering
500(2)
DDoS
502(1)
DoS
503(1)
Zero-day
503(1)
Man-in-the-middle
503(1)
Brute force
503(1)
Dictionary
503(1)
Rainbow table
504(1)
Spoofing
504(1)
Non-compliant systems
504(1)
Zombie/botnet
504(1)
Exam essentials
504(1)
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings
505(9)
User and groups
505(1)
NTFS vs. share permissions
506(4)
Shared files and folders
510(2)
System files and folders
512(1)
User authentication
512(1)
Run as administrator vs. standard user
512(1)
BitLocker/BitLocker To Go
513(1)
EFS
513(1)
Exam essentials
514(1)
2.7 Given a scenario, implement security best practices to secure a workstation
514(6)
Password best practices
514(2)
Account management
516(3)
Disable autorun
519(1)
Data encryption
519(1)
Patch/update management
520(1)
Exam essentials
520(1)
2.8 Given a scenario, implement methods for securing mobile devices
520(7)
Screen locks
521(1)
Remote wipes
522(1)
Locator applications
522(1)
Remote backup applications
522(1)
Failed login attempts restrictions
523(1)
Antivirus/Anti-malware
523(1)
Patching/OS updates
523(1)
Biometric authentication
523(1)
Full device encryption
524(1)
Multifactor authentication
524(1)
Authenticator applications
524(1)
Trusted sources vs. untrusted sources
524(1)
Firewalls
525(1)
Policies and procedures
526(1)
Exam essentials
526(1)
2.9 Given a scenario, implement appropriate data destruction and disposal methods
527(3)
Physical destruction
527(2)
Recycling or repurposing best practices
529(1)
Exam essentials
530(1)
2.10 Given a scenario, configure security on SOHO wireless and wired networks
530(11)
Wireless specific
531(1)
Change default usernames and passwords
532(1)
Enable MAC filtering
533(1)
Assign static IP addresses
533(1)
Firewall settings
533(1)
Port forwarding/mapping
534(1)
Disabling ports
534(1)
Content filtering/parental controls
534(1)
Update Firmware
534(1)
Physical security
535(1)
Exam essentials
535(1)
Review Questions
536(5)
Chapter 8 Software Troubleshooting
541(36)
3.1 Given a scenario, troubleshoot Microsoft Windows OS problems
545(12)
Common symptoms
546(5)
Common solutions
551(6)
Exam essentials
557(1)
3.2 Given a scenario, troubleshoot and resolve PC security issues
557(5)
Common symptoms
558(3)
Exam essentials
561(1)
3.3 Given a scenario, use best practice procedures for malware removal
562(2)
1 Identify and research malware symptoms
562(1)
2 Quarantine the infected systems
562(1)
3 Disable System Restore (in Windows)
562(1)
4 Remediate the infected systems
562(1)
5 Schedule scans and run updates
563(1)
6 Enable System Restore and create a restore point (in Windows)
563(1)
7 Educate the end user
563(1)
Exam essentials
563(1)
3.4 Given a scenario, troubleshoot mobile OS and application issues
564(7)
Common symptoms
564(6)
Exam essentials
570(1)
3.5 Given a scenario, troubleshoot mobile OS and application security issues
571(6)
Common symptoms
571(2)
Exam essentials
573(1)
Review Questions
574(3)
Chapter 9 Operational Procedures
577(54)
4.1 Compare and contrast best practices associated with types of documentation
582(5)
Network topology diagrams
582(1)
Knowledge base/articles
583(1)
Incident documentation
583(1)
Regulatory and compliance policy
584(1)
Acceptable use policy
584(1)
Password policy
585(1)
Inventory management
586(1)
Exam essentials
587(1)
4.2 Given a scenario, implement basic change management best practices
587(3)
Documented business processes
588(1)
Purpose of the change
588(1)
Scope the change
588(1)
Risk analysis
589(1)
Plan for change
589(1)
End-user acceptance
589(1)
Change board
589(1)
Backout plan
589(1)
Document changes
589(1)
Exam essentials
590(1)
4.3 Given a scenario, implement basic disaster prevention and recovery methods
590(6)
Backup and recovery
590(3)
Backup testing
593(1)
UPS
593(1)
Surge protector
594(1)
Cloud storage vs. local storage backups
595(1)
Account recovery options
595(1)
Exam essentials
596(1)
4.4 Explain common safety procedures
596(7)
Equipment grounding
596(1)
Proper component handling and storage
597(2)
Toxic waste handling
599(2)
Personal safety
601(2)
Compliance with government regulations
603(1)
Exam essentials
603(1)
4.5 Explain environmental impacts and appropriate controls
603(5)
MSDS documentation for handling and disposal
604(1)
Temperature, humidity level awareness, and proper ventilation
604(1)
Power surges, brownouts, and blackouts
605(1)
Protection from airborne particles
605(1)
Dust and debris
606(1)
Compliance to government regulations
607(1)
Exam essentials
608(1)
4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
608(5)
Incident response
608(2)
Licensing/DRM/EULA
610(1)
Regulated data
611(1)
Follow all policies and security best practices
612(1)
Exam essentials
612(1)
4.7 Given a scenario, use proper communication techniques and professionalism
613(6)
Use proper language and avoid jargon, acronyms, and slang, when applicable
613(1)
Maintain a positive attitude/project confidence
614(1)
Actively listen (taking notes) and avoid interrupting the customer
614(1)
Be culturally sensitive
614(1)
Be on time (if late, contact the customer)
615(1)
Avoid distractions
615(2)
Set and meet expectations/timeline and communicate status with the customer
617(1)
Deal appropriately with customers' confidential and private materials
618(1)
Exam essentials
619(1)
4.8 Identify the basics of scripting
619(3)
Script file types
619(1)
Environment variables
620(1)
Comment syntax
620(1)
Basic script constructs
620(1)
Basic data types
621(1)
Exam essentials
621(1)
4.9 Given a scenario, use remote access technologies
622(9)
RDP
622(1)
Telnet
623(2)
SSH
625(1)
Third-party tools
625(1)
Security considerations of each access method
626(1)
Exam essentials
626(1)
Review Questions
627(4)
Appendix Answers to Review Questions 631(20)
Chapter 1: Mobile Devices
632(2)
Chapter 2: Networking
634(2)
Chapter 3: Hardware
636(4)
Chapter 4: Virtualization and Cloud Computing
640(1)
Chapter 5: Hardware and Network Troubleshooting
641(1)
Chapter 6: Operating Systems
642(3)
Chapter 7: Security
645(3)
Chapter 8: Software Troubleshooting
648(1)
Chapter 9: Operational Procedures
649(2)
Index 651
TROY MCMILLAN holds more than 30 IT certifications, including A+ and Network+. He is a ProductDeveloper and Technical Editor for CyberVista and a full-time trainer, teaching Cisco, Microsoft,CompTIA, EC Council and (ISC)2 courses.