Introduction |
|
xv | |
Part I CompTIA A+ 220-901 |
|
1 | (286) |
|
|
3 | (134) |
|
1.1 Given a Scenario, Configure Settings and Use BIOS/UEFI Tools on a PC |
|
|
8 | (10) |
|
1.2 Explain the Importance of Motherboard Components, Their Purpose, and Properties |
|
|
18 | (14) |
|
1.3 Compare and Contrast Various RAM Types and Their Features |
|
|
32 | (5) |
|
1.4 Install and Configure PC Expansion Cards |
|
|
37 | (7) |
|
1.5 Install and Configure Storage Devices and Use Appropriate Media |
|
|
44 | (15) |
|
1.6 Install Various Types of CPUs and Apply the Appropriate Cooling Methods |
|
|
59 | (5) |
|
1.7 Compare and Contrast Various PC Connection Interfaces, Their Characteristics, and Purpose |
|
|
64 | (10) |
|
1.8 Install a Power Supply Based on Given Specifications |
|
|
74 | (5) |
|
1.9 Given a Scenario, Select the Appropriate Components for a Custom PC Configuration to Meet Customer Specifications or Needs |
|
|
79 | (8) |
|
1.10 Compare and Contrast Types of Display Devices and Their Features |
|
|
87 | (5) |
|
1.11 Identify Common PC Connector Types and Associated Cables |
|
|
92 | (10) |
|
1.12 Install and Configure Common Peripheral Devices |
|
|
102 | (6) |
|
1.13 Install SOHO Multifunction Devices/Printers and Configure Appropriate Settings |
|
|
108 | (6) |
|
1.14 Compare and Contrast Differences Between the Various Print Technologies and the Associated Imaging Process |
|
|
114 | (14) |
|
1.15 Given a Scenario, Perform Appropriate Printer Maintenance |
|
|
128 | (7) |
|
|
135 | (2) |
|
|
137 | (48) |
|
2.1 Identify the Various Types of Network Cables and Connectors |
|
|
140 | (7) |
|
2.2 Compare and Contrast the Characteristics of Connectors and Cabling |
|
|
147 | (5) |
|
2.3 Explain the Properties and Characteristics of TCP/IP |
|
|
152 | (6) |
|
2.4 Explain Common TCP and UDP Ports, Protocols, and Their Purpose |
|
|
158 | (3) |
|
2.5 Compare and Contrast Various Wi-Fi Networking Standards and Encryption Types |
|
|
161 | (3) |
|
2.6 Given a Scenario, Install and Configure a SOHO Wireless/Wired Router and Apply Appropriate Settings |
|
|
164 | (6) |
|
2.7 Compare and Contrast Internet Connection Types, Network Types, and Their Features |
|
|
170 | (4) |
|
2.8 Compare and Contrast Network Architecture Devices, Their Functions, and Features |
|
|
174 | (4) |
|
2.9 Given a Scenario, Use Appropriate Networking Tools |
|
|
178 | (4) |
|
|
182 | (3) |
|
|
185 | (40) |
|
3.1 Install and Configure Laptop Hardware and Components |
|
|
187 | (12) |
|
3.2 Explain the Function of Components Within the Display of a Laptop |
|
|
199 | (3) |
|
3.3 Given a Scenario, Use Appropriate Laptop Features |
|
|
202 | (7) |
|
3.4 Explain the Characteristics of Various Types of Other Mobile Devices |
|
|
209 | (6) |
|
3.5 Compare and Contrast Accessories and Ports of Other Mobile Devices |
|
|
215 | (7) |
|
|
222 | (3) |
|
Chapter 4 Hardware and Network Troubleshooting |
|
|
225 | (62) |
|
4.1 Given a Scenario, Troubleshoot Common Problems Related to Motherboards, RAM, CPU, and Power with Appropriate Tools |
|
|
227 | (11) |
|
4.2 Given a Scenario, Troubleshoot Hard Drives and RAID Arrays with Appropriate Tools |
|
|
238 | (7) |
|
4.3 Given a Scenario, Troubleshoot Common Video, Projector, and Display Issues |
|
|
245 | (5) |
|
4.4 Given a Scenario, Troubleshoot Wired and Wireless Networks with Appropriate Tools |
|
|
250 | (14) |
|
4.5 Given a Scenario, Troubleshoot and Repair Common Mobile Device Issues While Adhering to the Appropriate Procedures |
|
|
264 | (11) |
|
4.6 Given a Scenario, Troubleshoot Printers with Appropriate Tools |
|
|
275 | (9) |
|
|
284 | (3) |
Part II CompTIA A+ 220-902 |
|
287 | (310) |
|
Chapter 5 Windows Operating Systems |
|
|
289 | (122) |
|
1.1 Compare and Contrast Various Features and Requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, and Windows 8.1) |
|
|
293 | (22) |
|
1.2 Given a Scenario, Install Windows PC Operating Systems Using Appropriate Methods |
|
|
315 | (10) |
|
1.3 Given a Scenario, Apply Appropriate Microsoft Command-Line Tools |
|
|
325 | (13) |
|
1.4 Given a Scenario, Use Appropriate Microsoft Operating System Features and Tools |
|
|
338 | (25) |
|
1.5 Given a Scenario, Use Windows Control Panel Utilities |
|
|
363 | (20) |
|
1.6 Given a Scenario, Install and Configure Windows Networking on a Client/Desktop |
|
|
383 | (14) |
|
1.7 Perform Common Preventive Maintenance Procedures Using the Appropriate Windows OS Tools |
|
|
397 | (11) |
|
|
408 | (3) |
|
Chapter 6 Other Operating Systems and Technologies |
|
|
411 | (52) |
|
2.1 Identify Common Features and Functionality of the Mac OS and Linux Operating Systems |
|
|
414 | (19) |
|
2.2 Given a Scenario, Set Up and Use Client-Side Virtualization |
|
|
433 | (2) |
|
2.3 Identify Basic Cloud Concepts |
|
|
435 | (3) |
|
2.4 Summarize the Properties and Purpose of Services Provided by Networked Hosts |
|
|
438 | (3) |
|
2.5 Identify Basic Features of Mobile Operating Systems |
|
|
441 | (4) |
|
2.6 Install and Configure Basic Mobile Device Network Connectivity and E-mail |
|
|
445 | (11) |
|
2.7 Summarize Methods and Data Related to Mobile Device Synchronization |
|
|
456 | (5) |
|
|
461 | (2) |
|
|
463 | (58) |
|
3.1 Identify Common Security Threats and Vulnerabilities |
|
|
466 | (11) |
|
3.2 Compare and Contrast Common Prevention Methods |
|
|
477 | (12) |
|
3.3 Compare and Contrast Differences of Basic Windows OS Security Settings |
|
|
489 | (9) |
|
3.4 Given a Scenario, Deploy and Enforce Security Best Practices to Secure a Workstation |
|
|
498 | (4) |
|
3.5 Compare and Contrast Various Methods for Securing Mobile Devices |
|
|
502 | (7) |
|
3.6 Given a Scenario, Use Appropriate Data Destruction and Disposal Methods |
|
|
509 | (3) |
|
3.7 Given a Scenario, Secure SOHO Wireless and Wired Networks |
|
|
512 | (6) |
|
|
518 | (3) |
|
Chapter 8 Software Troubleshooting |
|
|
521 | (44) |
|
4.1 Given a Scenario, Troubleshoot PC Operating System Problems with Appropriate Tools |
|
|
523 | (17) |
|
4.2 Given a Scenario, Troubleshoot Common PC Security Issues with Appropriate Tools and Best Practices |
|
|
540 | (9) |
|
4.3 Given a Scenario, Troubleshoot Common Mobile OS and Application Issues with Appropriate Tools |
|
|
549 | (7) |
|
4.4 Given a Scenario, Troubleshoot Common Mobile OS and Application Security Issues with Appropriate Tools |
|
|
556 | (6) |
|
|
562 | (3) |
|
Chapter 9 Operational Procedures |
|
|
565 | (32) |
|
5.1 Given a Scenario, Use Appropriate Safety Procedures |
|
|
567 | (7) |
|
5.2 Given a Scenario with Potential Environmental Impacts, Apply the Appropriate Controls |
|
|
574 | (7) |
|
5.3 Summarize the Process of Addressing Prohibited Content/Activity and Explain Privacy, Licensing, and Policy Concepts |
|
|
581 | (4) |
|
5.4 Demonstrate Proper Communication Techniques and Professionalism |
|
|
585 | (6) |
|
5.5 Given a Scenario, Explain the Troubleshooting Theory |
|
|
591 | (4) |
|
|
595 | (2) |
Appendix Answers to Review Questions |
|
597 | (12) |
Index |
|
609 | |