Introduction |
|
xliii | |
|
|
1 | (430) |
|
|
3 | (52) |
|
"Do I Know This Already?" Quiz |
|
|
3 | (3) |
|
|
6 | (1) |
|
Installing and Configuring Laptop Hardware and Components |
|
|
6 | (17) |
|
|
6 | (3) |
|
|
9 | (2) |
|
|
11 | (3) |
|
|
14 | (1) |
|
|
14 | (3) |
|
|
17 | (1) |
|
|
18 | (2) |
|
USB Travel Routers and Wireless WAN Cards |
|
|
20 | (1) |
|
|
20 | (2) |
|
Physical Privacy and Security Components |
|
|
22 | (1) |
|
|
22 | (1) |
|
Near-field Scanner Features |
|
|
22 | (1) |
|
Display Components of Mobile Devices |
|
|
23 | (4) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
Wi-Fi Antenna Connector/Placement |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Setting Up and Configuring Accessories and Ports of Mobile Devices |
|
|
27 | (6) |
|
Connection Methods: Wired |
|
|
27 | (1) |
|
Micro-USB/Mini-USB for Android and Windows |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
Proprietary Vendor-Specific Ports (Communication/Power) |
|
|
28 | (1) |
|
Connection Types: Wireless |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (2) |
|
|
33 | (1) |
|
Configuring Basic Mobile Device Network Connectivity and Application Support |
|
|
33 | (15) |
|
Wireless/Cellular Data Network Connectivity for Mobile Devices |
|
|
33 | (1) |
|
Enabling and Disabling 2G/3G/4G(LTE)/5G |
|
|
34 | (1) |
|
Enabling/Disabling Hotspots |
|
|
34 | (5) |
|
Enabling/Disabling Tethering |
|
|
39 | (1) |
|
|
39 | (1) |
|
PRL Updates/Baseband Updates |
|
|
39 | (1) |
|
|
40 | (1) |
|
Steps to Configure a Bluetooth Headset on an Android-Based Device |
|
|
41 | (2) |
|
Steps to Configure a Bluetooth Headset on an iOS Device |
|
|
43 | (1) |
|
GPS and Cellular Location Services |
|
|
44 | (1) |
|
Mobile Device Management (MDM) |
|
|
45 | (1) |
|
Mobile Application Management (MAM) |
|
|
45 | (1) |
|
Mobile Device Synchronization |
|
|
45 | (1) |
|
Types of Data to Synchronize |
|
|
46 | (1) |
|
|
46 | (1) |
|
Commercial Mail Synchronization |
|
|
47 | (1) |
|
|
48 | (1) |
|
Review All the Key Topics |
|
|
48 | (1) |
|
Complete the Tables and Lists from Memory |
|
|
49 | (1) |
|
|
49 | (6) |
|
|
55 | (76) |
|
"Do I Know This Already?" Quiz |
|
|
55 | (5) |
|
|
60 | (1) |
|
TCP and UDP Ports, Protocols, and Their Purposes |
|
|
60 | (7) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (6) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Optical Network Terminal (ONT) |
|
|
72 | (1) |
|
|
72 | (1) |
|
Software-Defined Networking |
|
|
72 | (1) |
|
Compare and Contrast Wireless Networking Protocols |
|
|
73 | (9) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (2) |
|
|
78 | (2) |
|
Long-Range Fixed Wireless |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
Services Provided by Networked Hosts |
|
|
82 | (7) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Authentication, Authorization, and Accounting (AAA) Server |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Legacy and Embedded Systems |
|
|
86 | (1) |
|
Internet of Things (IoT) Devices |
|
|
87 | (2) |
|
Install and Configure a Basic Wired/Wireless SOHO Network |
|
|
89 | (12) |
|
|
89 | (1) |
|
|
89 | (1) |
|
Public and Private IP Addresses |
|
|
90 | (1) |
|
|
91 | (2) |
|
Viewing IP Address Information |
|
|
93 | (3) |
|
APIPA IP Addresses/Link Local Addresses |
|
|
96 | (1) |
|
Dynamic vs. Static IP Addresses |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
End-User Device Configuration |
|
|
101 | (1) |
|
|
101 | (1) |
|
Network Configuration Concepts |
|
|
101 | (3) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
Internet Connection Types, Network Types, and Their Features |
|
|
104 | (10) |
|
Internet Connection Types |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (3) |
|
Wireless Internet Service Provider |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (7) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
Review All the Key Topics |
|
|
121 | (1) |
|
Complete the Tables and Lists from Memory |
|
|
121 | (1) |
|
|
122 | (9) |
|
|
131 | (192) |
|
"Do I Know This Already?" Quiz |
|
|
131 | (5) |
|
|
136 | (1) |
|
|
136 | (30) |
|
|
136 | (1) |
|
|
136 | (4) |
|
|
140 | (2) |
|
|
142 | (3) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (2) |
|
|
153 | (7) |
|
Peripheral Cables: Serial |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
166 | (12) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
DDR5 SDRAM: The Current Standard |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Error Correction: ECC vs. non-ECC Memory |
|
|
174 | (1) |
|
|
175 | (1) |
|
Preparations for Installing DIMM Memory |
|
|
175 | (3) |
|
Installing Storage Devices |
|
|
178 | (23) |
|
|
179 | (1) |
|
|
179 | (1) |
|
DVD Recordable and Rewritable Standards |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Recording Files to Optical Discs |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (6) |
|
Magnetic Hard Disk Drives |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
Flash Drives/Memory Cards |
|
|
190 | (3) |
|
|
193 | (1) |
|
Storage Device Configurations |
|
|
194 | (1) |
|
|
194 | (2) |
|
Creating a SA TA RAID Array |
|
|
196 | (3) |
|
|
199 | (2) |
|
Installing Motherboards, CPUs, and Add-on Cards |
|
|
201 | (58) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (2) |
|
Comparing ATX, micro ATX, and Mini-TTX Motherboards |
|
|
204 | (1) |
|
Motherboard Connector Types |
|
|
205 | (1) |
|
Peripheral Component Interconnect (PCI) Slots |
|
|
206 | (1) |
|
|
206 | (3) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
Motherboard Compatibility |
|
|
210 | (1) |
|
|
210 | (2) |
|
Central Processing Unit (CPU) Socket Types |
|
|
212 | (5) |
|
|
217 | (1) |
|
|
217 | (1) |
|
Basic Input/Output System (BlOSVUnified Extensible Firmware Interface (UEFI) Settings |
|
|
218 | (1) |
|
|
218 | (1) |
|
Accessing the BIOS/UEFI Setup Program |
|
|
219 | (1) |
|
UEFI and Traditional BIOS |
|
|
220 | (1) |
|
BIOS/UEFI Settings Overview |
|
|
221 | (4) |
|
Boot Options: Settings and Boot Sequence |
|
|
225 | (1) |
|
|
226 | (3) |
|
|
229 | (1) |
|
|
230 | (4) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Trusted Platform Module (TPM) |
|
|
235 | (1) |
|
Hardware Security Module (HSM) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
Advanced RISC Machine (ARM) |
|
|
238 | (1) |
|
CPU Cores: Single Core and Multicore |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (2) |
|
External USB Audio Sound Cards |
|
|
243 | (2) |
|
|
245 | (6) |
|
Integrated Graphics Processing Unit (GPU) |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
Fanless/Passive Heat Sinks |
|
|
256 | (1) |
|
|
256 | (1) |
|
Phase-Change Material/Thermal Paste |
|
|
257 | (2) |
|
|
259 | (1) |
|
|
259 | (12) |
|
|
261 | (2) |
|
Input 115V vs. 220V Multivoltage Power Supplies |
|
|
263 | (2) |
|
20-Pin-to-24-Pin Motherboard Adapter |
|
|
265 | (2) |
|
Output 3.3V vs. 5Vvs. 12V |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
269 | (2) |
|
Multifunction Devices/Printers and Settings |
|
|
271 | (9) |
|
Unboxing a Device/Setup Location Considerations |
|
|
272 | (1) |
|
Appropriate Drivers for the Office Environment |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
Integrated Ethernet Print/Multifunction Device Sharing |
|
|
274 | (1) |
|
Wireless Device Sharing Options |
|
|
275 | (2) |
|
Using Public and Shared Devices |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
Scanning to an SMB Folder |
|
|
279 | (1) |
|
Cloud and Remote Printing |
|
|
279 | (1) |
|
Automatic Document Feeder/Flatbed Scanner |
|
|
280 | (1) |
|
|
280 | (25) |
|
|
80 | (201) |
|
|
281 | (1) |
|
|
281 | (3) |
|
Color Laser Printing Differences |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (3) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
289 | (2) |
|
|
291 | (1) |
|
|
291 | (4) |
|
|
295 | (1) |
|
Thermal Feed Assembly and Heating Element |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
Impact Components and Print Process |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
Impact Printer Paper Types |
|
|
301 | (1) |
|
Impact Printer Maintenance |
|
|
301 | (1) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
305 | (1) |
|
Review All the Key Topics |
|
|
305 | (2) |
|
Complete the Tables and Lists from Memory |
|
|
307 | (1) |
|
|
307 | (16) |
|
Chapter 4 Virtualization and Cloud Computing |
|
|
323 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
324 | (3) |
|
|
327 | (1) |
|
|
327 | (7) |
|
|
327 | (1) |
|
|
327 | (2) |
|
|
329 | (1) |
|
Public vs. Private vs. Hybrid vs. Community |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Client-Side Virtualization Overview |
|
|
334 | (7) |
|
Host/Guest Virtualization |
|
|
335 | (1) |
|
Purpose of Virtual Machines |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
339 | (2) |
|
|
341 | (1) |
|
Review All the Key Topics |
|
|
341 | (1) |
|
|
341 | (6) |
|
Chapter 5 Hardware and Network Troubleshooting |
|
|
347 | (84) |
|
"Do I Know This Already?" Quiz |
|
|
347 | (6) |
|
|
353 | (1) |
|
Troubleshooting Methodology |
|
|
353 | (2) |
|
Troubleshooting Motherboard, RAM, CPU, and Power Issues |
|
|
355 | (26) |
|
|
355 | (1) |
|
|
356 | (1) |
|
Proprietary Crash Screens (BSOD/Pinwheel) |
|
|
357 | (1) |
|
|
357 | (3) |
|
|
360 | (1) |
|
|
361 | (3) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
Inadequate Airflow Outside the System |
|
|
366 | (1) |
|
Inadequate Airflow Inside the System |
|
|
366 | (2) |
|
|
368 | (2) |
|
Installing/Replacing Case Fans |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (2) |
|
Step-by-Step Power Supply Troubleshooting |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
Log Entries and Error Messages |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
Inaccurate System Date/Time |
|
|
379 | (2) |
|
Troubleshooting Storage Drives and RAID Arrays |
|
|
381 | (11) |
|
Light-Emitting Diode (LED) Status Indicators |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (2) |
|
Grinding and Clicking Noises |
|
|
384 | (1) |
|
|
385 | (1) |
|
Bootable Device Not Found |
|
|
385 | (2) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
Extended Read/Write Times |
|
|
389 | (1) |
|
Input/Output Operations per Second (IOPS) |
|
|
390 | (1) |
|
|
390 | (2) |
|
Troubleshooting Video, Projector, and Display Issues |
|
|
392 | (6) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
Intermittent Projector Shutdown |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Mobile Device Troubleshooting |
|
|
398 | (6) |
|
Poor Battery Health and Improper Charging |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
Nonresponsive Touchscreen |
|
|
403 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
Cursor Drift/Touch Calibration |
|
|
404 | (1) |
|
|
404 | (13) |
|
Lines Down the Printed Pages |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
Double/Echo Images on the Print |
|
|
407 | (1) |
|
Toner Not Fusing to the Paper |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
Paper Loading, Paper Type, and Media Thickness Issues |
|
|
408 | (1) |
|
Media Caught Inside the Printer |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
Multiple Prints Pending in a Queue |
|
|
410 | (1) |
|
|
410 | (1) |
|
Clearing Select Print Jobs or All Print Jobs in a Queue |
|
|
411 | (1) |
|
Speckling on Printed Pages |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
414 | (1) |
|
Incorrect Page Orientation |
|
|
414 | (1) |
|
|
415 | (2) |
|
|
417 | (4) |
|
|
417 | (1) |
|
External Interference and Intermittent Wireless Connectivity |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
Poor Voice over Internet Protocol (VoIP) Quality |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
Review All the Key Topics |
|
|
421 | (1) |
|
Complete the Tables and Lists from Memory |
|
|
422 | (1) |
|
|
423 | (8) |
|
|
|
Chapter 6 Operating Systems |
|
|
431 | (138) |
|
"Do I Know This Already?" Quiz |
|
|
431 | (4) |
|
|
435 | (1) |
|
Basic Features of Microsoft Windows Editions |
|
|
435 | (3) |
|
|
435 | (1) |
|
|
436 | (1) |
|
Domain Access vs. Workgroup |
|
|
436 | (1) |
|
Desktop Styles/User Interface |
|
|
436 | (1) |
|
Remote Desktop Connection and Remote Assistance |
|
|
436 | (1) |
|
Random Access Memory (RAM) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
Microsoft Command-Line Tools |
|
|
438 | (13) |
|
Starting a Command Prompt Session with Windows PowerShell |
|
|
438 | (1) |
|
Commands Available with Standard Privileges vs. Administrative Privileges |
|
|
439 | (1) |
|
Windows Command-Line Commands |
|
|
440 | (3) |
|
|
443 | (2) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
Microsoft Windows 10 Operating System (OS) Features and Tools |
|
|
451 | (20) |
|
|
451 | (1) |
|
Microsoft Management Console (MMC) Snap-in |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
453 | (1) |
|
|
454 | (2) |
|
|
456 | (5) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
System Information (msinfo32) |
|
|
464 | (1) |
|
|
465 | (2) |
|
System Configuration Utility |
|
|
467 | (1) |
|
|
468 | (1) |
|
Disk Defragment/Optimize Drives |
|
|
469 | (1) |
|
|
469 | (2) |
|
Windows 10 Control Panel Utilities |
|
|
471 | (9) |
|
|
471 | (1) |
|
|
471 | (2) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
474 | (2) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
476 | (2) |
|
|
478 | (1) |
|
Standby, Lid, and Fast Startup Options |
|
|
478 | (1) |
|
Universal Serial Bus (USB) Selective Suspend |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
480 | (4) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
Microsoft Windows Networking Features on a Client/Desktop |
|
|
484 | (16) |
|
Workgroup vs. Domain Setup |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
487 | (2) |
|
Printer Sharing vs. Network Printer Mapping |
|
|
489 | (1) |
|
Local OS Firewall Settings |
|
|
489 | (2) |
|
Client Network Configuration |
|
|
491 | (2) |
|
Internet Protocol (IP) Addressing Scheme |
|
|
493 | (1) |
|
|
493 | (1) |
|
Domain Name System (DNS) Settings |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
Establish Networking Connections |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
497 | (1) |
|
WW AN (Cellular) Connections |
|
|
497 | (1) |
|
|
497 | (1) |
|
Public Network vs. Private Network |
|
|
498 | (1) |
|
File Explorer Navigation: Network Paths |
|
|
499 | (1) |
|
Metered Connections and Limitations |
|
|
500 | (1) |
|
Installation and Configuration Concepts |
|
|
500 | (8) |
|
System Requirements for Applications |
|
|
501 | (1) |
|
32-Bit vs. 64-Bit File Systems |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
32-Bit vs. 64-Bit Dependent Application Requirements |
|
|
503 | (1) |
|
Dedicated Graphics Card vs. Integrated Graphics Card |
|
|
504 | (1) |
|
Video Random Access Memory (VRAM) Requirements |
|
|
504 | (1) |
|
|
505 | (1) |
|
Central Processing Unit (CPU) Requirements |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
OS Requirements for Applications |
|
|
506 | (1) |
|
Application-to-OS Compatibility |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
Physical Media vs. Downloadable |
|
|
507 | (1) |
|
Other Considerations for New Applications |
|
|
507 | (1) |
|
Understanding Common OS Types |
|
|
508 | (10) |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
511 | (1) |
|
Cellphone/Tablet Operating Systems |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (2) |
|
Various File System Types |
|
|
514 | (3) |
|
Vendor Life-Cycle Limitations |
|
|
517 | (1) |
|
|
517 | (1) |
|
|
517 | (1) |
|
Vendor-Specific Limitations/Compatibility Concerns Between OSs |
|
|
518 | (1) |
|
OS Installations and Upgrades in a Diverse OS Environment |
|
|
518 | (16) |
|
|
518 | (2) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (2) |
|
|
523 | (1) |
|
Remote Network Installation |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
Other Considerations/Third-Party Drivers |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
MBR vs. GPT Partition Types |
|
|
528 | (1) |
|
Disk Preparation Using MBR |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
529 | (1) |
|
Creating Partitions During Windows Installation |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
Backup Files and User Preferences |
|
|
530 | (1) |
|
Application and Driver Support/Backward Compatibility |
|
|
531 | (1) |
|
Hardware and Application Prerequisites and Compatibility |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
534 | (1) |
|
Common Features and Tools of the macOS/Desktop OS |
|
|
534 | (12) |
|
Installation and Uninstallation of Applications |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
Apple ID and Corporate Restrictions |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
536 | (3) |
|
Antivirus/Anti-malware Updates |
|
|
539 | (1) |
|
|
539 | (1) |
|
|
540 | (2) |
|
|
542 | (2) |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
Common Features and Tools of the Linux Client/Desktop OS |
|
|
546 | (10) |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
Yum (Yellowdog Updater, Modified) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
553 | (1) |
|
Dig (Domain Information Groper) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (2) |
|
|
555 | (1) |
|
|
555 | (1) |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
557 | (1) |
|
Review All the Key Topics |
|
|
557 | (1) |
|
Complete the Tables and Lists from Memory |
|
|
558 | (1) |
|
|
559 | (10) |
|
|
569 | (78) |
|
"Do I Know This Already?" Quiz |
|
|
570 | (3) |
|
|
573 | (1) |
|
|
573 | (9) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
576 | (1) |
|
Physical Security for Staff |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
Logical Security Concepts |
|
|
578 | (1) |
|
Principle of Least Privilege |
|
|
578 | (1) |
|
|
579 | (1) |
|
Multifactor Authentication |
|
|
579 | (1) |
|
|
579 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
Authentication Application |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
581 | (1) |
|
Wireless Security Protocols and Authentication |
|
|
582 | (2) |
|
|
582 | (1) |
|
|
583 | (1) |
|
|
583 | (1) |
|
|
583 | (1) |
|
|
583 | (1) |
|
|
583 | (1) |
|
|
584 | (1) |
|
Malware Removal and Prevention |
|
|
584 | (6) |
|
|
584 | (1) |
|
|
584 | (1) |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
585 | (1) |
|
|
586 | (1) |
|
|
586 | (1) |
|
|
586 | (1) |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
587 | (1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
590 | (1) |
|
Social Engineering Threats and Vulnerabilities |
|
|
590 | (7) |
|
|
590 | (1) |
|
|
591 | (1) |
|
|
592 | (1) |
|
|
592 | (1) |
|
|
592 | (1) |
|
|
592 | (1) |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
595 | (1) |
|
Structured Query Language (SQL) Injection |
|
|
595 | (1) |
|
Cross-Site Scripting (XSS) |
|
|
595 | (1) |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
596 | (1) |
|
Bring Your Own Device (BYOD) |
|
|
596 | (1) |
|
Microsoft Windows OS Security Settings |
|
|
597 | (11) |
|
|
597 | (1) |
|
|
597 | (1) |
|
|
598 | (1) |
|
|
599 | (1) |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
600 | (2) |
|
NTFS vs. Share Permissions |
|
|
602 | (1) |
|
Run as Administrator vs. Standard User |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
606 | (1) |
|
|
606 | (2) |
|
Security Best Practices to Secure a Workstation |
|
|
608 | (7) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
Screensaver Required Password |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (2) |
|
|
611 | (1) |
|
|
611 | (1) |
|
|
611 | (1) |
|
Secure/Protect Critical Hardware |
|
|
611 | (1) |
|
Secure Personally Identifiable Information (PIT) |
|
|
611 | (1) |
|
|
612 | (1) |
|
Restricting User Permissions |
|
|
612 | (1) |
|
|
612 | (1) |
|
|
612 | (1) |
|
|
612 | (1) |
|
Changing Default Usernames and Passwords |
|
|
612 | (1) |
|
Disabling Autorun/AutoPlay |
|
|
612 | (3) |
|
|
615 | (6) |
|
|
615 | (2) |
|
|
617 | (1) |
|
|
617 | (1) |
|
Remote Backup Applications |
|
|
617 | (1) |
|
Failed Login Attempts Restrictions |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
619 | (1) |
|
|
619 | (1) |
|
|
619 | (1) |
|
Byod vs. Corporate-Owned Devices |
|
|
620 | (1) |
|
Profile Security Requirements |
|
|
620 | (1) |
|
|
620 | (1) |
|
Data Destruction and Disposal |
|
|
621 | (2) |
|
Physical Destruction Methods |
|
|
621 | (1) |
|
Recycling or Repurposing Best Practices |
|
|
622 | (1) |
|
|
623 | (1) |
|
Configuring Security on SOHO Networks |
|
|
623 | (7) |
|
|
623 | (1) |
|
|
623 | (1) |
|
|
624 | (1) |
|
|
624 | (1) |
|
|
624 | (1) |
|
Physical Placement/Secure Locations |
|
|
625 | (1) |
|
Dynamic Host Configuration Protocol (DHCP) Reservations |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
626 | (1) |
|
|
626 | (1) |
|
Wireless-Specific Security |
|
|
626 | (1) |
|
Changing the Service Set Identifier (SSID) |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
628 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
630 | (1) |
|
Configuring Browser and Relevant Security Settings |
|
|
630 | (9) |
|
Browser Download and Installation |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
632 | (1) |
|
|
632 | (1) |
|
|
633 | (1) |
|
Secure Connection/Sites---Valid Certificates |
|
|
633 | (1) |
|
Transport Layer Security (TLS) |
|
|
633 | (1) |
|
Hypertext Transfer Protocol Secure (HTTPS) |
|
|
634 | (1) |
|
|
634 | (1) |
|
|
635 | (1) |
|
|
635 | (1) |
|
|
636 | (1) |
|
|
636 | (1) |
|
Sign-in/Browser Data Synchronization |
|
|
637 | (1) |
|
|
638 | (1) |
|
|
639 | (1) |
|
Review All the Key Topics |
|
|
639 | (1) |
|
|
640 | (7) |
|
Chapter 8 Software Troubleshooting |
|
|
647 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
647 | (3) |
|
|
650 | (1) |
|
Troubleshooting Common Windows OS Problems |
|
|
650 | (14) |
|
|
650 | (1) |
|
|
650 | (2) |
|
|
652 | (1) |
|
|
653 | (1) |
|
|
654 | (1) |
|
|
655 | (2) |
|
|
657 | (1) |
|
|
657 | (2) |
|
|
659 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
661 | (1) |
|
Common Troubleshooting Steps |
|
|
662 | (1) |
|
|
663 | (1) |
|
Troubleshooting Common PC Security Issues |
|
|
664 | (3) |
|
|
664 | (2) |
|
|
666 | (1) |
|
Best Practice Procedures for Malware Removal |
|
|
667 | (1) |
|
Troubleshoot Common Mobile OS and Application Issues |
|
|
668 | (2) |
|
Troubleshoot Common Mobile OS and Application Security Issues |
|
|
670 | (5) |
|
|
670 | (1) |
|
Android Package (APK) Source |
|
|
670 | (1) |
|
|
671 | (1) |
|
|
671 | (1) |
|
Bootleg/Malicious Application Spoofing |
|
|
671 | (1) |
|
|
672 | (1) |
|
|
672 | (1) |
|
Leaked Personal Files/Data |
|
|
673 | (1) |
|
Data Transmission Over Limit |
|
|
673 | (1) |
|
|
673 | (1) |
|
Factory Reset/Clean Install |
|
|
674 | (1) |
|
|
675 | (1) |
|
Review All the Key Topics |
|
|
675 | (1) |
|
Complete the Tables and Lists from Memory |
|
|
675 | (1) |
|
|
675 | (6) |
|
Chapter 9 Operational Procedures |
|
|
681 | (66) |
|
"Do I Know This Already?" Quiz |
|
|
681 | (5) |
|
|
686 | (1) |
|
Best Practices and Documentation |
|
|
686 | (7) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
687 | (1) |
|
|
687 | (1) |
|
|
687 | (1) |
|
|
687 | (1) |
|
Clear, Concise, Written Communication |
|
|
688 | (1) |
|
|
688 | (1) |
|
|
689 | (1) |
|
Acceptable Use Policy (AUP) |
|
|
689 | (1) |
|
Network Topology Diagrams |
|
|
690 | (1) |
|
Regulatory and Compliance Policy |
|
|
691 | (1) |
|
Knowledge Base and Articles |
|
|
692 | (1) |
|
|
693 | (4) |
|
Documented Business Processes and Practices |
|
|
693 | (1) |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
695 | (1) |
|
|
695 | (1) |
|
Date and Time of the Change |
|
|
695 | (1) |
|
|
695 | (1) |
|
|
695 | (1) |
|
|
696 | (1) |
|
|
696 | (1) |
|
Workstation Backup and Recovery Methods |
|
|
697 | (7) |
|
|
697 | (1) |
|
|
698 | (1) |
|
|
698 | (1) |
|
|
699 | (1) |
|
|
700 | (1) |
|
|
700 | (1) |
|
|
700 | (1) |
|
Onsite vs. Offsite Backups |
|
|
700 | (4) |
|
Grandfather-Father-Son (GFS) Backup Rotational Scheme |
|
|
704 | (1) |
|
3-2-1 Backup Rotational Rule |
|
|
704 | (1) |
|
Explain Common Safety Procedures |
|
|
704 | (11) |
|
Equipment Grounding/Proper Power Handling |
|
|
705 | (2) |
|
Proper Component Handling and Storage |
|
|
707 | (1) |
|
|
708 | (1) |
|
|
709 | (2) |
|
|
711 | (1) |
|
|
711 | (1) |
|
Compliance with Local Government Regulations |
|
|
712 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
714 | (1) |
|
|
714 | (1) |
|
|
715 | (1) |
|
Environmental Impacts and Appropriate Controls |
|
|
715 | (6) |
|
Material Safety Data Sheet (MSDS) |
|
|
715 | (2) |
|
Toxic Waste Handling/Disposal |
|
|
717 | (1) |
|
|
717 | (1) |
|
|
718 | (1) |
|
|
718 | (1) |
|
Temperature and Humidity Level Awareness and Proper Ventilation |
|
|
718 | (1) |
|
|
719 | (1) |
|
Compressed Air and Vacuum Systems |
|
|
719 | (1) |
|
Power Surges, Under-voltage Events, and Power Failures |
|
|
719 | (1) |
|
|
720 | (1) |
|
|
720 | (1) |
|
Addressing Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts |
|
|
721 | (6) |
|
|
722 | (1) |
|
|
722 | (1) |
|
|
723 | (1) |
|
|
723 | (1) |
|
Licensing/Digital Rights Management (DRM)/End-User License Agreement (EULA) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
724 | (1) |
|
Understanding Open Source and Commercial Licenses |
|
|
724 | (1) |
|
Personal vs. Enterprise Licenses |
|
|
725 | (1) |
|
Valid Licenses and Non-expired Licenses |
|
|
726 | (1) |
|
|
726 | (1) |
|
Communication Techniques and Professionalism |
|
|
727 | (4) |
|
Professional Appearance and Attire |
|
|
727 | (1) |
|
Use Proper Language and Avoid Jargon, Acronyms, and Slang When Applicable |
|
|
728 | (1) |
|
Maintain a Positive Attitude/Project Confidence |
|
|
728 | (1) |
|
Actively Listen, Take Notes, and Avoid Interrupting the Customer |
|
|
728 | (1) |
|
|
728 | (1) |
|
|
729 | (1) |
|
|
729 | (1) |
|
Dealing with Difficult Customers or Situations |
|
|
729 | (1) |
|
Set and Meet Expectations/Timeline and Communicate Status with the Customer |
|
|
730 | (1) |
|
Dealing Appropriately with Customers' Confidential and Private Materials |
|
|
730 | (1) |
|
|
730 | (1) |
|
|
731 | (3) |
|
|
732 | (1) |
|
Other Scripting Considerations |
|
|
733 | (1) |
|
Remote Access Technologies |
|
|
734 | (1) |
|
|
734 | (5) |
|
|
735 | (1) |
|
|
735 | (1) |
|
Virtual Network Computing |
|
|
736 | (1) |
|
|
736 | (1) |
|
Remote Monitoring and Management |
|
|
736 | (1) |
|
Microsoft Remote Assistance |
|
|
736 | (1) |
|
|
736 | (1) |
|
Screen-Sharing and Videoconferencing Software |
|
|
737 | (1) |
|
|
737 | (1) |
|
Desktop Management Software |
|
|
737 | (1) |
|
Security Considerations of Each Access Method |
|
|
738 | (1) |
|
|
739 | (1) |
|
Review All the Key Topics |
|
|
739 | (1) |
|
Complete the Tables and Lists from Memory |
|
|
740 | (1) |
|
|
740 | (7) |
|
Part III Final Preparation |
|
|
|
Chapter 10 Final Preparation |
|
|
747 | (10) |
|
|
748 | (2) |
|
Core 1 (220-1101) Exam Domains and Objectives |
|
|
750 | (1) |
|
Core 2 (220-1102) Exam Domains and Objectives |
|
|
750 | (1) |
|
|
750 | (1) |
|
Tools for Final Preparation |
|
|
751 | (5) |
|
Pearson Cert Practice Test Engine and Questions on the Website |
|
|
752 | (1) |
|
Accessing the Pearson Test Prep Software Online |
|
|
752 | (1) |
|
Accessing the Pearson Test Prep Software Offline |
|
|
752 | (1) |
|
|
753 | (1) |
|
|
754 | (1) |
|
|
755 | (1) |
|
|
755 | (1) |
|
Chapter-Ending Review Tools |
|
|
756 | (1) |
|
Suggested Plan for Final Review/Study |
|
|
756 | (1) |
|
|
756 | (1) |
Appendix A Answers to the "Do I Know This Already?" Quizzes and Review Questions |
|
757 | (26) |
Appendix B CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide Exam Updates |
|
783 | (2) |
Glossary |
|
785 | (36) |
Index |
|
821 | |