Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!
Core 2 Exam 220-1102
Taschenbuch von Mark Soper (u. a.)
Sprache: Englisch

47,35 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung
Skip the fluff and get straight to the essentials with an indispensable prep handbook for the CompTIA A+ Core 2 exam

In CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and practical roadmap to taking--and succeeding on--the CompTIA A+ Core 2 exam. You'll learn how to install, configure, and maintain computer equipment, mobile devices, and software for end users, service components based on customer requirements, understand networking basics, and apply essential cybersecurity methods. Ace the test using the proven CertMike approach:

* Prepare -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!
* Practice -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!
* Pass -- On exam day, use the critical knowledge you've learned when you're ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!

With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You'll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test--the first time around! An indispensable resource for anyone preparing for their A+ certification, CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102 is also a must-read for hardware and PC technicians seeking to upgrade their skillset.
Skip the fluff and get straight to the essentials with an indispensable prep handbook for the CompTIA A+ Core 2 exam

In CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and practical roadmap to taking--and succeeding on--the CompTIA A+ Core 2 exam. You'll learn how to install, configure, and maintain computer equipment, mobile devices, and software for end users, service components based on customer requirements, understand networking basics, and apply essential cybersecurity methods. Ace the test using the proven CertMike approach:

* Prepare -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!
* Practice -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!
* Pass -- On exam day, use the critical knowledge you've learned when you're ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!

With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You'll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test--the first time around! An indispensable resource for anyone preparing for their A+ certification, CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102 is also a must-read for hardware and PC technicians seeking to upgrade their skillset.
Über den Autor

ABOUT THE AUTHORS

Mike Chapple, PhD, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame's Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University's Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, [...].

Mark Soper, MCP, CompTIA A+, has over 30 years' experience in IT. He is the author or co-author of 40 books on technology, covering topics ranging from CompTIA A+ to Microsoft Windows, networking, and troubleshooting.

Inhaltsverzeichnis

Introduction xxiii

Part I Domain 1.0: Operating Systems 1

Chapter 1 Microsoft Windows Editions 3

Windows 10 Editions 3

Feature Differences Between Editions 7

Upgrade Paths 12

Chapter 2 Microsoft Command- Line Tools 17

Navigation 17

Command- Line Tools 20

Chapter 3 Windows 10 Operating System Tools 37

Task Manager 38

Microsoft Management Console (MMC) Snap- In 42

Additional Tools 51

Chapter 4 Windows 10 Control Panel 59

Control Panel Overview 60

Opening Control Panel 60

Internet Options 61

Devices and Printers 62

Programs and Features 63

Network and Sharing Center 64

System 64

Windows Defender Firewall 65

Mail 65

Sound 67

User Accounts 69

Device Manager 69

Indexing Options 71

Administrative Tools 72

File Explorer Options 73

Power Options 78

Ease of Access 80

Chapter 5 Windows Settings 85

Accessing Settings 86

Time & Language 87

Update & Security 88

Personalization 91

Apps 92

Privacy 93

System 94

Devices 97

Network & Internet 98

Gaming 98

Accounts 99

Chapter 6 Windows Networking 105

Workgroup vs. Domain Setup 106

Local OS Firewall Settings 109

Client Network Configuration 113

Establish Network Connections 117

Proxy Settings 120

Public Network vs. Private Network 121

File Explorer Navigation - Network Paths 122

Metered Connections and Limitations 122

Chapter 7 Application Installation and Configuration 127

System Requirements for Applications 128

OS Requirements for Applications 135

Distribution Methods 136

Physical Media vs. Downloadable 137

ISO Mountable 137

Other Considerations for New Applications 138

Chapter 8 Operating System Types 143

Workstation OSs 143

Cell Phone/Tablet OSs 148

Various Filesystem Types 150

Vendor Life- Cycle Limitations 156

Compatibility Concerns Between OSs 157

Chapter 9 Operating System Installations and Upgrades 161

Boot Methods 162

Types of Installations 167

Partitioning 170

Drive Format 171

Upgrade Considerations 172

Feature Updates 173

Chapter 10 macOS 177

Installation and Uninstallation of Applications 178

Apple ID and Corporate Restrictions 180

Best Practices 181

System Preferences 182

Features 188

Disk Utility 194

FileVault 195

Terminal 196

Force Quit 197

Chapter 11 Linux 201

Common Commands 201

Best Practices 212

Tools 214

Part II Domain 2.0: Security 219

Chapter 12 Physical Security 221

Physical Security 221

Physical Security for Staff 224

Chapter 13 Logical Security 231

Logical Security 231

Mobile Device Management (MDM) 238

Active Directory 238

Chapter 14 Wireless Security 249

Protocols and Encryption 249

Authentication 252

Chapter 15 Malware 259

Malware 260

Malware Prevention and Removal Tools and Methods 262

Chapter 16 Social Engineering and Security Threats 271

Social Engineering 271

Threats 276

Vulnerabilities 281

Chapter 17 Windows Security 289

Defender Antivirus 290

Firewall 292

Users and Groups 295

Login OS Options 297

NTFS vs. Share Permissions 299

Run As Administrator vs. Standard User 304

BitLocker 307

Bitlocker to Go 308

Encrypting File System (EFS) 308

Chapter 18 Workstation Security Configuration 313

Data- at- Rest Encryption 314

Password Best Practices 314

End- User Best Practices 318

Account Management 320

Change Default Administrator's User Account/Password 323

Disable Autorun 325

Disable Autoplay 325

Chapter 19 Mobile and Embedded Device Security 331

Screen Locks 332

Locator Apps and Remote Wipes 334

OS Updates 335

Device Encryption 336

Remote Backup Applications 336

Failed Login Attempts Restrictions 337

Antivirus/Antimalware 338

Firewalls 338

Policies and Procedures 339

Internet of Things (IoT) 340

Chapter 20 Data Destruction and Disposal 345

Physical Destruction 345

Recycling or Repurposing Best Practices 349

Outsourcing Concepts 355

Chapter 21 Network Security 359

Home Router Settings 360

Wireless Specific Settings 367

Firewall Settings 372

Chapter 22 Browser Security 379

Browser Download/Installation 379

Settings 385

Part III Domain 3.0: Software Troubleshooting 395

Chapter 23 Troubleshooting Windows 397

Common Symptoms 397

Common Troubleshooting Steps 407

Chapter 24 Troubleshooting PC Security 419

Common Symptoms 419

Browser- Related Symptoms 426

Chapter 25 Troubleshooting Malware 433

Step 1. Investigate and Verify Malware Symptoms 434

Step 2. Quarantine Infected Systems 436

Step 3. Disable System Restore in Windows 436

Step 4. Remediate Infected Systems 437

Step 5. Schedule Scans and Run Updates 441

Step 6. Enable System Restore and Create a Restore Point in Windows 443

Step 7. Educate the End User 443

Chapter 26 Troubleshooting Mobile Device OS and Applications 447

Common Mobile OS and Application Symptoms 448

Chapter 27 Troubleshooting Mobile Device Security 463

Security Concerns 464

Common Symptoms 467

Part IV Domain 4.0: Operational Procedures 477

Chapter 28 Documentation 479

Ticketing Systems 480

Asset Management 483

Types of Documents 486

Knowledge Base/Articles 491

Chapter 29 Change Management 495

Documented Business Processes 495

Change Management 497

Chapter 30 Workstation Backup and Recovery 505

Backup and Recovery 505

Backup Testing 511

Backup Rotation Schemes 513

Chapter 31 Safety 519

Electrostatic Discharge (ESD) Straps 519

ESD Mats 521

Equipment Grounding 522

Proper Power Handling 523

Proper Component Handling and Storage 524

Antistatic Bags 524

Compliance with Government Regulations 524

Personal Safety 525

Chapter 32 Environmental Protection 533

Material Safety Data Sheet (MSDS): Documentation for Handling and Disposal 533

Temperature, Humidity- Level Awareness, and Proper Ventilation 536

Power Surges, Under- Voltage Events, and Power Failures 538

Chapter 33 Privacy, Licensing, Policy, and Incident Response 543

Incident Response 544

Licensing/Digital Rights Management (DRM)/End- User License Agreement (EULA) 546

Regulated Data 548

Chapter 34 Communication and Professionalism 553

Professional Appearance and Attire 554

Use Proper Language and Avoid Jargon, Acronyms, and Slang, When Applicable 555

Maintain a Positive Attitude/Project Confidence 555

Actively Listen, Take Notes, and Avoid Interrupting the Customer 556

Be Culturally Sensitive 556

Be on Time (If Late, Contact the Customer) 557

Avoid Distractions 557

Dealing with Difficult Customers or Situations 558

Set and Meet Expectations/Time Line and Communicate Status with the Customer 559

Deal Appropriately with Customers' Confidential and Private Materials 560

Chapter 35 Scripting 565

Script File Types 565

Use Cases for Scripting 568

Other Considerations When Using Scripts 569

Chapter 36 Remote Access 575

Methods/Tools 575

Security Considerations of Each Access Method 588

Index 593

Details
Erscheinungsjahr: 2023
Fachbereich: Unterricht
Genre: Erziehung & Bildung
Rubrik: Sozialwissenschaften
Medium: Taschenbuch
Inhalt: 656 S.
ISBN-13: 9781119898122
ISBN-10: 1119898129
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Soper, Mark
Chapple, Mike
Hersteller: John Wiley & Sons Inc
Maße: 190 x 237 x 39 mm
Von/Mit: Mark Soper (u. a.)
Erscheinungsdatum: 19.06.2023
Gewicht: 0,922 kg
Artikel-ID: 121159426
Über den Autor

ABOUT THE AUTHORS

Mike Chapple, PhD, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame's Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University's Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, [...].

Mark Soper, MCP, CompTIA A+, has over 30 years' experience in IT. He is the author or co-author of 40 books on technology, covering topics ranging from CompTIA A+ to Microsoft Windows, networking, and troubleshooting.

Inhaltsverzeichnis

Introduction xxiii

Part I Domain 1.0: Operating Systems 1

Chapter 1 Microsoft Windows Editions 3

Windows 10 Editions 3

Feature Differences Between Editions 7

Upgrade Paths 12

Chapter 2 Microsoft Command- Line Tools 17

Navigation 17

Command- Line Tools 20

Chapter 3 Windows 10 Operating System Tools 37

Task Manager 38

Microsoft Management Console (MMC) Snap- In 42

Additional Tools 51

Chapter 4 Windows 10 Control Panel 59

Control Panel Overview 60

Opening Control Panel 60

Internet Options 61

Devices and Printers 62

Programs and Features 63

Network and Sharing Center 64

System 64

Windows Defender Firewall 65

Mail 65

Sound 67

User Accounts 69

Device Manager 69

Indexing Options 71

Administrative Tools 72

File Explorer Options 73

Power Options 78

Ease of Access 80

Chapter 5 Windows Settings 85

Accessing Settings 86

Time & Language 87

Update & Security 88

Personalization 91

Apps 92

Privacy 93

System 94

Devices 97

Network & Internet 98

Gaming 98

Accounts 99

Chapter 6 Windows Networking 105

Workgroup vs. Domain Setup 106

Local OS Firewall Settings 109

Client Network Configuration 113

Establish Network Connections 117

Proxy Settings 120

Public Network vs. Private Network 121

File Explorer Navigation - Network Paths 122

Metered Connections and Limitations 122

Chapter 7 Application Installation and Configuration 127

System Requirements for Applications 128

OS Requirements for Applications 135

Distribution Methods 136

Physical Media vs. Downloadable 137

ISO Mountable 137

Other Considerations for New Applications 138

Chapter 8 Operating System Types 143

Workstation OSs 143

Cell Phone/Tablet OSs 148

Various Filesystem Types 150

Vendor Life- Cycle Limitations 156

Compatibility Concerns Between OSs 157

Chapter 9 Operating System Installations and Upgrades 161

Boot Methods 162

Types of Installations 167

Partitioning 170

Drive Format 171

Upgrade Considerations 172

Feature Updates 173

Chapter 10 macOS 177

Installation and Uninstallation of Applications 178

Apple ID and Corporate Restrictions 180

Best Practices 181

System Preferences 182

Features 188

Disk Utility 194

FileVault 195

Terminal 196

Force Quit 197

Chapter 11 Linux 201

Common Commands 201

Best Practices 212

Tools 214

Part II Domain 2.0: Security 219

Chapter 12 Physical Security 221

Physical Security 221

Physical Security for Staff 224

Chapter 13 Logical Security 231

Logical Security 231

Mobile Device Management (MDM) 238

Active Directory 238

Chapter 14 Wireless Security 249

Protocols and Encryption 249

Authentication 252

Chapter 15 Malware 259

Malware 260

Malware Prevention and Removal Tools and Methods 262

Chapter 16 Social Engineering and Security Threats 271

Social Engineering 271

Threats 276

Vulnerabilities 281

Chapter 17 Windows Security 289

Defender Antivirus 290

Firewall 292

Users and Groups 295

Login OS Options 297

NTFS vs. Share Permissions 299

Run As Administrator vs. Standard User 304

BitLocker 307

Bitlocker to Go 308

Encrypting File System (EFS) 308

Chapter 18 Workstation Security Configuration 313

Data- at- Rest Encryption 314

Password Best Practices 314

End- User Best Practices 318

Account Management 320

Change Default Administrator's User Account/Password 323

Disable Autorun 325

Disable Autoplay 325

Chapter 19 Mobile and Embedded Device Security 331

Screen Locks 332

Locator Apps and Remote Wipes 334

OS Updates 335

Device Encryption 336

Remote Backup Applications 336

Failed Login Attempts Restrictions 337

Antivirus/Antimalware 338

Firewalls 338

Policies and Procedures 339

Internet of Things (IoT) 340

Chapter 20 Data Destruction and Disposal 345

Physical Destruction 345

Recycling or Repurposing Best Practices 349

Outsourcing Concepts 355

Chapter 21 Network Security 359

Home Router Settings 360

Wireless Specific Settings 367

Firewall Settings 372

Chapter 22 Browser Security 379

Browser Download/Installation 379

Settings 385

Part III Domain 3.0: Software Troubleshooting 395

Chapter 23 Troubleshooting Windows 397

Common Symptoms 397

Common Troubleshooting Steps 407

Chapter 24 Troubleshooting PC Security 419

Common Symptoms 419

Browser- Related Symptoms 426

Chapter 25 Troubleshooting Malware 433

Step 1. Investigate and Verify Malware Symptoms 434

Step 2. Quarantine Infected Systems 436

Step 3. Disable System Restore in Windows 436

Step 4. Remediate Infected Systems 437

Step 5. Schedule Scans and Run Updates 441

Step 6. Enable System Restore and Create a Restore Point in Windows 443

Step 7. Educate the End User 443

Chapter 26 Troubleshooting Mobile Device OS and Applications 447

Common Mobile OS and Application Symptoms 448

Chapter 27 Troubleshooting Mobile Device Security 463

Security Concerns 464

Common Symptoms 467

Part IV Domain 4.0: Operational Procedures 477

Chapter 28 Documentation 479

Ticketing Systems 480

Asset Management 483

Types of Documents 486

Knowledge Base/Articles 491

Chapter 29 Change Management 495

Documented Business Processes 495

Change Management 497

Chapter 30 Workstation Backup and Recovery 505

Backup and Recovery 505

Backup Testing 511

Backup Rotation Schemes 513

Chapter 31 Safety 519

Electrostatic Discharge (ESD) Straps 519

ESD Mats 521

Equipment Grounding 522

Proper Power Handling 523

Proper Component Handling and Storage 524

Antistatic Bags 524

Compliance with Government Regulations 524

Personal Safety 525

Chapter 32 Environmental Protection 533

Material Safety Data Sheet (MSDS): Documentation for Handling and Disposal 533

Temperature, Humidity- Level Awareness, and Proper Ventilation 536

Power Surges, Under- Voltage Events, and Power Failures 538

Chapter 33 Privacy, Licensing, Policy, and Incident Response 543

Incident Response 544

Licensing/Digital Rights Management (DRM)/End- User License Agreement (EULA) 546

Regulated Data 548

Chapter 34 Communication and Professionalism 553

Professional Appearance and Attire 554

Use Proper Language and Avoid Jargon, Acronyms, and Slang, When Applicable 555

Maintain a Positive Attitude/Project Confidence 555

Actively Listen, Take Notes, and Avoid Interrupting the Customer 556

Be Culturally Sensitive 556

Be on Time (If Late, Contact the Customer) 557

Avoid Distractions 557

Dealing with Difficult Customers or Situations 558

Set and Meet Expectations/Time Line and Communicate Status with the Customer 559

Deal Appropriately with Customers' Confidential and Private Materials 560

Chapter 35 Scripting 565

Script File Types 565

Use Cases for Scripting 568

Other Considerations When Using Scripts 569

Chapter 36 Remote Access 575

Methods/Tools 575

Security Considerations of Each Access Method 588

Index 593

Details
Erscheinungsjahr: 2023
Fachbereich: Unterricht
Genre: Erziehung & Bildung
Rubrik: Sozialwissenschaften
Medium: Taschenbuch
Inhalt: 656 S.
ISBN-13: 9781119898122
ISBN-10: 1119898129
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Soper, Mark
Chapple, Mike
Hersteller: John Wiley & Sons Inc
Maße: 190 x 237 x 39 mm
Von/Mit: Mark Soper (u. a.)
Erscheinungsdatum: 19.06.2023
Gewicht: 0,922 kg
Artikel-ID: 121159426
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte