COMPTIA A+ 1101-1102

COMPTIA A+ 1101-1102

Core 1

1.0 Mobile Devices
2.0 Networking
3.0 Hardware
4.0 Virtualization and Cloud Computing
5.0 Hardware and Network Troubleshooting

Core 2

1..0 Operating Systems
2.0 Security
3..0 Software Troubleshooting
4.0 Operational Procedur

 

UpComing Classes

Full Course

CompTIA A+ Certification Exam Core 1 Objectives
EXAM NUMBER: CORE 1 (220-1101)

About the Exam


Candidates are encouraged to use this document to help prepare for the CompTIA A+ Core 1 (220-1101) certification exam. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220-1101) and Core 2 (220-1102). The CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) certification exams will verify the successful candidate has the knowledge and skills required to:

•    Install, configure, and maintain computer equipment, mobile devices, and software for end users
•    Service components based on customer requirements
•    Understand networking basics and apply basic cybersecurity methods to mitigate threats
•    Properly and safely diagnose, resolve, and document common hardware and software issues
•    Apply troubleshooting skills and provide customer support using appropriate communication skills
•    Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments

This is equivalent to 12 months of hands-on experience working in a help desk support technician, desktop support technician, or field service technician job role. These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.

EXAM ACCREDITATION
The CompTIA A+ Core 1 (220-1101) exam is accredited by ANSI to show compliance with the ISO 17024 standard and, as such, undergoes regular reviews and updates to the exam objectives.

EXAM DEVELOPMENT
CompTIA exams result from subject-matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT professional.

CompTIA AUTHORIZED MATERIALS USE POLICY
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse, or condone utilizing any content provided by unauthorized third-party training sites (aka “brain dumps”). Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement. If a candidate has a question as to whether study materials are considered unauthorized (aka “brain dumps”), he/she should contact CompTIA at examsecurity@comptia.org to confirm.

PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of technologies, processes, or tasks pertaining to each objective may also be included on the exam, although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current, and the security of the questions is protected. When necessary, we will publish updated exams based on existing exam objectives. Please know that all related exam preparation materials will still be valid.
 


TEST DETAILS
Required exam    A+ Core 1 (220-1101)
Number of questions    Maximum of 90
Types of questions    Multiple-choice and performance-based Length of test    90 minutes
Recommended experience    12 months of hands-on experience in a help
desk support technician, desktop support technician, or field service technician job role
Passing score    675 (on a scale of 100–900)

EXAM OBJECTIVES (DOMAINS)
The table below lists the domains measured by this examination and the extent to which they are represented.

1.0    Mobile Devices    15%
2.0    Networking    20%
3.0    Hardware    25%
4.0    Virtualization and Cloud Computing    11%
5.0    Hardware and Network Troubleshooting    29%
Total        100%
 
 

Given a scenario, install and configure laptop hardware and components.
 
•    Hardware/device replacement
-    Battery
-    Keyboard/keys
-    Random-access memory (RAM)
 
-    Hard disk drive (HDD)/solid- state drive (SSD) migration
-    HDD/SSD replacement
-    Wireless cards
 
•    Physical privacy and security components
-    Biometrics
-    Near-field scanner features
 

 


Compare and contrast the display components of mobile devices.

 
•    Types
-    Liquid crystal display (LCD)
M In-plane switching (IPS)
M Twisted nematic (TN)
M Vertical alignment (VA)
-    Organic light-emitting diode (OLED)
 
•    Mobile display components
•    WiFi antenna connector/ placement
•    Camera/webcam
•    Microphone
 
•    Touch screen/digitizer
•    Inverter
 

 


Given a scenario, set up and configure accessories and ports of mobile devices.
 
•    Connection methods
-    Universal Serial Bus (USB)/ USB-C/microUSB/miniUSB
-    Lightning
-    Serial interfaces
-    Near-field communication (NFC)
-    Bluetooth
-    Hotspot
 
•    Accessories
-    Touch pens
-    Headsets
-    Speakers
-    Webcam
 
•    Docking station
•    Port replicator
•    Trackpad/drawing pad
 
1.0 | Mobile Devices

Given a scenario, configure basic mobile-device network connectivity and application support.

 
•    Wireless/cellular data network (enable/disable)
- 2G/3G/4G/5G
-    Hotspot
-    Global System for Mobile Communications (GSM) vs. code-division multiple access (CDMA)
-    Preferred Roaming List (PRL) updates
•    Bluetooth
-    Enable Bluetooth
-    Enable pairing
-    Find a device for pairing
-    Enter the appropriate PIN code
-    Test connectivity
 
•    Location services
-    Global Positioning System (GPS) services
-    Cellular location services
•    Mobile device management (MDM)/mobile application management (MAM)
-    Corporate email configuration
-    Two-factor authentication
-    Corporate applications
 
•    Mobile device synchronization
-    Account setup
M Microsoft 365
M Google Workspace
M iCloud
-    Data to synchronize
M Mail
M Photos
M Calendar
M Contacts
M Recognizing data caps
 
 

Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes.

 
•    Ports and protocols
-    20/21 – File Transfer Protocol (FTP)
-    22 – Secure Shell (SSH)
-    23 – Telnet
-    25 – Simple Mail Transfer Protocol (SMTP)
-    53 – Domain Name System (DNS)
-    67/68 – Dynamic Host Configuration Protocol (DHCP)
-    80 – Hypertext Transfer Protocol (HTTP)
-    110 – Post Office Protocol 3 (POP3)
 
-    137/139 – Network Basic Input/ Output System (NetBIOS)/ NetBIOS over TCP/IP (NetBT)
-    143 – Internet Mail Access Protocol (IMAP)
-    161/162 – Simple Network Management Protocol (SNMP)
-    389 – Lightweight Directory Access Protocol (LDAP)
-    443 – Hypertext Transfer Protocol Secure (HTTPS)
-    445 – Server Message Block (SMB)/Common Internet File System (CIFS)
 
- 3389 – Remote Desktop Protocol (RDP)
•    TCP vs. UDP
-    Connectionless
M DHCP
M Trivial File Transfer Protocol (TFTP)
-    Connection-oriented
M HTTPS
M SSH
 

 


Compare and contrast common networking hardware.

 
•    Routers
•    Switches
-    Managed
-    Unmanaged
•    Access points
•    Patch panel
 
•    Firewall
•    Power over Ethernet (PoE)
-    Injectors
-    Switch
-    PoE standards
•    Hub
 
•    Cable modem
•    Digital subscriber line (DSL)
•    Optical network terminal (ONT)
•    Network interface card (NIC)
•    Software-defined networking (SDN)
 


Compare and contrast protocols for wireless networking.

 
•    Frequencies
-    2.4GHz
-    5GHz
•    Channels
-    Regulations
-    2.4GHz vs. 5GHz
•    Bluetooth
 
•    802.11
-    a
-    b
-    g
-    n
-    ac (WiFi 5)
-    ax (WiFi 6)
 
•    Long-range fixed wireless
-    Licensed
-    Unlicensed
-    Power
-    Regulatory requirements for wireless power
•    NFC
•    Radio-frequency identification (RFID)
 

 


Summarize services provided by networked hosts.
 
•    Server roles
-    DNS
-    DHCP
-    Fileshare
-    Print servers
-    Mail servers
-    Syslog
-    Web servers
-    Authentication, authorization, and accounting (AAA)
 
•    Internet appliances
-    Spam gateways
-    Unified threat management (UTM)
-    Load balancers
-    Proxy servers
 
•    Legacy/embedded systems
-    Supervisory control and data acquisition (SCADA)
•    Internet of Things (IoT) devices
 


 


Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks.
•    Internet Protocol (IP) addressing
-    IPv4
M Private addresses
M Public addresses
-    IPv6
-    Automatic Private IP Addressing (APIPA)
-    Static
-    Dynamic
-    Gateway
 


Compare and contrast common network configuration concepts.
 
•    DNS
-    Address
M A
M AAAA
-    Mail exchanger (MX)
-    Text (TXT)
M Spam management
(i)    DomainKeys Identified Mail (DKIM)
(ii)    Sender Policy Framework (SPF)
(iii)    Domain-based Message Authentication, Reporting, and Conformance (DMARC)
 
•    DHCP
-    Leases
-    Reservations
-    Scope
•    Virtual LAN (VLAN)
•    Virtual private network (VPN)
 

 


Compare and contrast Internet connection types, network types, and their features.

 
•    Internet connection types
-    Satellite
-    Fiber
-    Cable
-    DSL
-    Cellular
-    Wireless Internet service provider (WISP)
 
•    Network types
-    Local area network (LAN)
-    Wide area network (WAN)
-    Personal area network (PAN)
-    Metropolitan area network (MAN)
-    Storage area network (SAN)
-    Wireless local area network (WLAN)
 


 


Given a scenario, use networking tools.

 
•    Crimper
•    Cable stripper
•    WiFi analyzer
 
•    Toner probe
•    Punchdown tool
•    Cable tester
 
•    Loopback plug
•    Network tap
 
 

Explain basic cable types and their connectors, features, and purposes.

 
•    Network cables
-    Copper M Cat 5 M Cat 5e M Cat 6 M Cat 6a
M Coaxial
M Shielded twisted pair
(i)    Direct burial
M Unshielded twisted pair
-    Plenum
-    Optical
M Fiber
- T568A/T568B
•    Peripheral cables
-    USB 2.0
-    USB 3.0
-    Serial
-    Thunderbolt
•    Video cables
 
-    High-Definition Multimedia Interface (HDMI)
-    DisplayPort
-    Digital Visual Interface (DVI)
-    Video Graphics Array (VGA)
•    Hard drive cables
-    Serial Advanced Technology Attachment (SATA)
-    Small Computer System Interface (SCSI)
-    External SATA (eSATA)
-    Integrated Drive Electronics (IDE)
 
•    Adapters
•    Connector types
-    RJ11
-    RJ45
-    F type
-    Straight tip (ST)
-    Subscriber connector (SC)
-    Lucent connector (LC)
-    Punchdown block
-    microUSB
-    miniUSB
-    USB-C
-    Molex
-    Lightning port
-    DB9
 

 


Given a scenario, install the appropriate RAM.
 
•    RAM types
-    Virtual RAM
-    Small outline dual inline memory module (SODIMM)
-    Double Data Rate 3 (DDR3)
-    Double Data Rate 4 (DDR4)
-    Double Data Rate 5 (DDR5)
-    Error correction code (ECC) RAM
 
•    Single-channel
•    Dual-channel
•    Triple-channel
•    Quad-channel
 


Given a scenario, select and install storage devices.

 
•    Hard drives
-    Speeds
M 5,400rpm M 7,200rpm M 10,000rpm M 15,000rpm
-    Form factor
M 2.5
M 3.5
 
•    SSDs
-    Communications interfaces
M Non-volatile Memory Express (NVMe)
M SATA
M Peripheral Component Interconnect Express (PCIe)
-    Form factors
M M.2
M mSATA
 
•    Drive configurations
-    Redundant Array of Independent (or Inexpensive) Disks (RAID) 0, 1, 5, 10
•    Removable storage
-    Flash drives
-    Memory cards
-    Optical drives
 

 


Given a scenario, install and configure motherboards, central processing units (CPUs), and add-on cards.

 
•    Motherboard form factor
-    Advanced Technology eXtended (ATX)
-    Information Technology eXtended (ITX)
•    Motherboard connector types
-    Peripheral Component Interconnect (PCI)
-    PCI Express (PCIe)
-    Power connectors
-    SATA
-    eSATA
-    Headers
- M.2
•    Motherboard compatibility
-    CPU sockets
M Advanced Micro Devices, Inc. (AMD)
M Intel
-    Server
-    Multisocket
 
-    Desktop
-    Mobile
•    Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) settings
-    Boot options
-    USB permissions
-    Trusted Platform Module (TPM) security features
-    Fan considerations
-    Secure Boot
-    Boot password
•    Encryption
-    TPM
-    Hardware security module (HSM)
•    CPU architecture
- x64/x86
-    Advanced RISC Machine (ARM)
-    Single-core
-    Multicore
 
-    Multithreading
-    Virtualization support
•    Expansion cards
-    Sound card
-    Video card
-    Capture card
-    NIC
•    Cooling
-    Fans
-    Heat sink
-    Thermal paste/pads
-    Liquid
 


Given a scenario, install or replace the appropriate power supply.

 
•    Input 110-120 VAC vs. 220-240 VAC
•    Output 3.3V vs. 5V vs. 12V
•    20-pin to 24-pin motherboard adapter
 
•    Redundant power supply
•    Modular power supply
•    Wattage rating
 

 


Given a scenario, deploy and configure multifunction devices/ printers and settings.

 
•    Properly unboxing a device – setup location considerations
•    Use appropriate drivers for a given OS
-    Printer Control Language (PCL) vs. PostScript
•    Device connectivity
-    USB
-    Ethernet
-    Wireless
 
•    Public/shared devices
-    Printer share
-    Print server
•    Configuration settings
-    Duplex
-    Orientation
-    Tray settings
-    Quality
 
•    Security
-    User authentication
-    Badging
-    Audit logs
-    Secured prints
•    Network scan services
-    Email
-    SMB
-    Cloud services
•    Automatic document feeder (ADF)/flatbed scanner
 

 


Given a scenario, install and replace printer consumables.

 
•    Laser
-    Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separation pads, duplexing assembly
-    Imaging process: processing, charging, exposing, developing, transferring, fusing, and cleaning
-    Maintenance: Replace toner, apply maintenance kit, calibrate, clean
 
•    Inkjet
-    Ink cartridge, print head, roller, feeder, duplexing assembly, carriage belt
-    Calibration
-    Maintenance: Clean heads, replace cartridges, calibrate, clear jams
•    Thermal
-    Feed assembly, heating element
-    Special thermal paper
-    Maintenance: Replace paper, clean heating element, remove debris
-    Heat sensitivity of paper
 
•    Impact
-    Print head, ribbon, tractor feed
-    Impact paper
-    Maintenance: Replace ribbon, replace print head, replace paper
•    3-D printer
-    Filament
-    Resin
-    Print bed
 


4.0 Virtualization and Cloud Computing

Summarize cloud-computing concepts.

 
•    Common cloud models
-    Private cloud
-    Public cloud
-    Hybrid cloud
-    Community cloud
-    Infrastructure as a service (IaaS)
-    Software as a service (SaaS)
-    Platform as a service (PaaS)
 
•    Cloud characteristics
-    Shared resources
-    Metered utilization
-    Rapid elasticity
-    High availability
-    File synchronization
 
•    Desktop virtualization
-    Virtual desktop infrastructure (VDI) on premises
-    VDI in the cloud
 

 


Summarize aspects of client-side virtualization.
•    Purpose of virtual machines
-    Sandbox
-    Test development
-    Application virtualization
M Legacy software/OS
M Cross-platform virtualization
•    Resource requirements
•    Security requirements
 


5.0    Hardware and Network Troubleshooting


Given a scenario, apply the best practice methodology to resolve problems.
 
•    Always consider corporate policies, procedures, and impacts before implementing changes
1.    Identify the problem
-    Gather information from the user, identify user changes, and, if applicable, perform backups before making changes
-    Inquire regarding environmental or infrastructure changes
 
2.    Establish a theory of probable cause (question the obvious)
-    If necessary, conduct external or internal research based on symptoms
3.    Test the theory to determine the cause
-    Once the theory is confirmed, determine the next steps to resolve the problem
-    If the theory is not confirmed, re-establish a new theory or escalate
 
4.    Establish a plan of action to resolve the problem and implement the solution
-    Refer to the vendor’s instructions for guidance
5.    Verify full system functionality and, if applicable, implement preventive measures
6.    Document the findings, actions, and outcomes
 

 


Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power.

 
•    Common symptoms
-    Power-on self-test (POST) beeps
-    Proprietary crash screens (blue screen of death [BSOD]/ pinwheel)
 
-    Black screen
-    No power
-    Sluggish performance
-    Overheating
-    Burning smell
 
-    Intermittent shutdown
-    Application crashes
-    Grinding noise
-    Capacitor swelling
-    Inaccurate system date/time
 


Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays.
 

•    Common symptoms
-    Light-emitting diode (LED) status indicators
-    Grinding noises
-    Clicking sounds
 

-    Bootable device not found
-    Data loss/corruption
-    RAID failure
-    Self-monitoring, Analysis, and Reporting Technology
 

(S.M.A.R.T.) failure
-    Extended read/write times
-    Input/output operations per second (IOPS)
-    Missing drives in OS
 

 


Given a scenario, troubleshoot video, projector, and display issues.

 
•    Common symptoms
-    Incorrect data source
-    Physical cabling issues
-    Burned-out bulb
 
-    Fuzzy image
-    Display burn-in
-    Dead pixels
-    Flashing screen
 
-    Incorrect color display
-    Audio issues
-    Dim image
-    Intermittent projector shutdown
 

 


Given a scenario, troubleshoot common issues with mobile devices.
 
•    Common symptoms
-    Poor battery health
-    Swollen battery
-    Broken screen
 
-    Improper charging
-    Poor/no connectivity
-    Liquid damage
-    Overheating
 
-    Digitizer issues
-    Physically damaged ports
-    Malware
-    Cursor drift/touch calibration
 


Given a scenario, troubleshoot and resolve printer issues.

 
•    Common symptoms
-    Lines down the printed pages
-    Garbled print
-    Toner not fusing to paper
-    Paper jams
-    Faded print
-    Incorrect paper size
 
-    Paper not feeding
-    Multipage misfeed
-    Multiple prints pending in queue
-    Speckling on printed pages
-    Double/echo images on the print
-    Incorrect color settings
-    Grinding noise
 
-    Finishing issues
M Staple jams
M Hole punch
-    Incorrect page orientation
 

 


Given a scenario, troubleshoot problems with wired and wireless networks.

 
•    Common symptoms
-    Intermittent wireless connectivity
-    Slow network speeds
 
-    Limited connectivity
-    Jitter
-    Poor Voice over Internet Protocol (VoIP) quality
 
-    Port flapping
-    High latency
-    External interference
 


CompTIA A+ Core 1 (220-1101) Acronym List
The following is a list of acronyms that appear on the CompTIA A+
Core 1 (220-1101) exam. Candidates are encouraged to review the complete list and attain a working knowledge of all listed acronyms as part of a comprehensive exam preparation program.

 
Acronym    Definition
AAA    Authentication, Authorization, and Accounting
AC    Alternating Current
ACL    Access Control List
ADF    Automatic Document Feeder AES    Advanced Encryption Standard AP    Access Point
APFS    Apple File System
APIPA    Automatic Private Internet Protocol Addressing
APK    Android Package
ARM    Advanced RISC [Reduced Instruction Set Computer] Machine
ARP    Address Resolution Protocol
ATA    Advanced Technology Attachment ATM    Asynchronous Transfer Mode
ATX    Advanced Technology Extended AUP    Acceptable Use Policy
BIOS    Basic Input/Output System BSOD    Blue Screen of Death BYOD    Bring Your Own Device CAD    Computer-aided Design
CAPTCHA Completely Automated Public Turing Test to Tell Computers and Humans Apart
CD    Compact Disc
CDFS    Compact Disc File System CDMA    Code-Division Multiple Access
CERT    Computer Emergency Response Team CIFS    Common Internet File System
CMD    Command Prompt
CMOS    Complementary Metal-Oxide Semiconductor
CPU    Central Processing Unit
CRL    Certificate Revocation List
DC    Direct Current
DDoS    Distributed Denial of Service DDR    Double Data Rate
DHCP    Dynamic Host Configuration Protocol
 
Acronym     Definition
DIMM Dual Inline Memory Module DKIM   DomainKeys Identified Mail DMA Direct Memory Access
DMARC Domain-based Message Authentication, Reporting, and Conformance
DNS    Domain Name System
DoS    Denial of Service
DRAM    Dynamic Random-Access Memory DRM    Digital Rights Management
DSL    Digital Subscriber Line
DVI    Digital Visual Interface
DVI-D    Digital Visual Interface-Digital ECC    Error Correcting Code
EFS    Encrypting File System
EMI    Electromagnetic Interference
EOL    End-of-Life
eSATA    External Serial Advanced Technology Attachment
ESD    Electrostatic Discharge EULA    End-User License Agreement
exFAT    Extensible File Allocation Table ext    Extended File System
FAT    File Allocation Table FAT12    12-bit File Allocation Table FAT16    16-bit File Allocation Table
FAT32    32-bit File Allocation Table FSB    Front-Side Bus
FTP    File Transfer Protocol
GFS    Grandfather-Father-Son
GPS    Global Positioning System
GPT    GUID [Globally Unique Identifier] Partition Table
GPU    Graphics Processing Unit
GSM    Global System for Mobile Communications GUI    Graphical User Interface
GUID    Globally Unique Identifier HAL    Hardware Abstraction Layer
HAV    Hardware-assisted Virtualization
 

Acronym    Definition    Acronym    Definition
HCL    Hardware Compatibility List    MX    Mail Exchange
HDCP    High-bandwidth Digital Content Protection    NAC    Network Access Control
HDD    Hard Disk Drive    NAT    Network Address Translation
HDMI    High-Definition Multimedia Interface    NDA    Non-disclosure Agreement
HSM    Hardware Security Module    NetBIOS    Networked Basic Input/Output System
HTML    Hypertext Markup Language    NetBT    NetBIOS over TCP/IP [Transmission Control
HTTP    Hypertext Transfer Protocol        Protocol/Internet Protocol]
HTTPS    Hypertext Transfer Protocol Secure    NFC    Near-field Communication
I/O    Input/Output    NFS    Network File System
IaaS    Infrastructure as a Service    NIC    Network Interface Card
ICR    Intelligent Character Recognition    NTFS    New Technology File System
IDE    Integrated Drive Electronics    NVMe    Non-volatile Memory Express
IDS    Intrusion Detection System    OCR    Optical Character Recognition
IEEE    Institute of Electrical and Electronics    OLED    Organic Light-emitting Diode
    Engineers    ONT    Optical Network Terminal
IMAP    Internet Mail Access Protocol    OS    Operating System
IOPS    Input/Output Operations Per Second    PaaS    Platform as a Service
IoT    Internet of Things    PAN    Personal Area Network
IP    Internet Protocol    PC    Personal Computer
IPS    Intrusion Prevention System    PCIe    Peripheral Component Interconnect Express
IPS    In-plane Switching    PCL    Printer Command Language
IPSec    Internet Protocol Security    PE    Preinstallation Environment
IR    Infrared    PII    Personally Identifiable Information
IrDA    Infrared Data Association    PIN    Personal Identification Number
IRP    Incident Response Plan    PKI    Public Key Infrastructure
ISO    International Organization for    PoE    Power over Ethernet
    Standardization    POP3    Post Office Protocol 3
ISP    Internet Service Provider    POST    Power-on Self-Test
ITX    Information Technology eXtended    PPP    Point-to-Point Protocol
KB    Knowledge Base    PRL    Preferred Roaming List
KVM    Keyboard-Video-Mouse    PSU    Power Supply Unit
LAN    Local Area Network    PXE    Preboot Execution Environment
LC    Lucent Connector    RADIUS    Remote Authentication Dial-in User Service
LCD    Liquid Crystal Display    RAID    Redundant Array of Independent (or
LDAP    Lightweight Directory Access Protocol        Inexpensive) Disks
LED    Light-emitting Diode    RAM    Random-access Memory
MAC    Media Access Control/Mandatory Access    RDP    Remote Desktop Protocol
    Control    RF    Radio Frequency
MAM    Mobile Application Management    RFI    Radio-Frequency Interference
MAN    Metropolitan Area Network    RFID    Radio-Frequency Identification
MBR    Master Boot Record    RJ11    Registered Jack Function 11
MDM    Mobile Device Management    RJ45    Registered Jack Function 45
MFA    Multifactor Authentication    RMM    Remote Monitoring and Management
MFD    Multifunction Device    RTO    Recovery Time Objective
MFP    Multifunction Printer    SaaS    Software as a Service
MMC    Microsoft Management Console    SAN    Storage Area Network
MOU    Memorandum of Understanding    SAS    Serial Attached SCSI [Small Computer
MSDS    Material Safety Data Sheet        System Interface]
MSRA    Microsoft Remote Assistance    SATA    Serial Advanced Technology Attachment
 


Acronym    Definition    Acronym    Definition
SC    Subscriber Connector    TLS    Transport Layer Security
SCADA    Supervisory Control and Data Acquisition    TN    Twisted Nematic
SCP    Secure Copy Protection    TPM    Trusted Platform Module
SCSI    Small Computer System Interface    UAC    User Account Control
SDN    Software-defined Networking    UDP    User Datagram Protocol
SFTP    Secure File Transfer Protocol    UEFI    Unified Extensible Firmware Interface
SIM    Subscriber Identity Module    UNC    Universal Naming Convention
SIMM    Single Inline Memory Module    UPnP    Universal Plug and Play
S.M.A.R.T.    Self-monitoring Analysis and Reporting    UPS    Uninterruptible Power Supply
    Technology    USB    Universal Serial Bus
SMB    Server Message Block    UTM    Unified Threat Management
SMS    Short Message Service    UTP    Unshielded Twisted Pair
SMTP    Simple Mail Transfer Protocol    VA    Vertical Alignment
SNMP    Simple Network Management Protocol    VDI    Virtual Desktop Infrastructure
SNTP    Simple Network Time Protocol    VGA    Video Graphics Array
SODIMM    Small Outline Dual Inline Memory Module    VLAN    Virtual LAN [Local Area Network]
SOHO    Small Office/Home Office    VM    Virtual Machine
SPF    Sender Policy Framework    VNC    Virtual Network Computer
SQL    Structured Query Language    VoIP    Voice over Internet Protocol
SRAM    Static Random-access Memory    VPN    Virtual Private Network
SSD    Solid-State Drive    VRAM    Video Random-access Memory
SSH    Secure Shell    WAN    Wide Area Network
SSID    Service Set Identifier    WEP    Wired Equivalent Privacy
SSL    Secure Sockets Layer    WISP    Wireless Internet Service Provider
SSO    Single Sign-on    WLAN    Wireless LAN [Local Area Network]
ST    Straight Tip    WMN    Wireless Mesh Network
STP    Shielded Twisted Pair    WPA    WiFi Protected Access
TACACS    Terminal Access Controller Access-Control    WWAN    Wireless Wide Area Network
    System    XSS    Cross-site Scripting
TCP    Transmission Control Protocol        
TCP/IP    Transmission Control Protocol/Internet        
    Protocol        
TFTP    Trivial File Transfer Protocol        
TKIP    Temporal Key Integrity Protocol        
 


CompTIA A+ Core 1 (220-1101)
Proposed Hardware and Software List
**CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the A+ Core 1 (220-1101) exam. This list may also be helpful for training companies that wish to create a lab component to their training offering. The bulleted lists below each topic are sample lists and are not exhaustive.

 
Equipment
•    Apple tablet/smartphone
•    Android tablet/smartphone
•    Windows tablet
•    Chromebook
•    Windows laptop/Mac laptop/Linux laptop
•    Windows desktop/Mac desktop/ Linux desktop
•    Windows server with Active Directory and Print Management
•    Monitors
•    Projectors
•    SOHO router/switch
•    Access point
•    VoIP phone
•    Printer
-    Laser/inkjet
-    Wireless
-    3-D printer
-    Thermal
•    Surge suppressor
•    Uninterruptible power supply (UPS)
•    Smart devices (IoT devices)
•    Server with a hypervisor
•    Punchdown block
•    Patch panel
•    Webcams
•    Speakers
•    Microphones
 
Spare parts/hardware
•    Motherboards
•    RAM
•    Hard drives
•    Power supplies
•    Video cards
•    Sound cards
•    Network cards
•    Wireless NICs
•    Fans/cooling devices/heat sink
•    CPUs
•    Assorted connectors/cables
-    USB
-    HDMI
-    DisplayPort
-    DVI
-    VGA
•    Adapters
-    Bluetooth adapter
•    Network cables
•    Unterminated network cable/ connectors
•    Alternating current (AC) adapters
•    Optical drives
•    Screws/standoffs
•    Cases
•    Maintenance kit
•    Mice/keyboards
•    Keyboard-video-mouse (KVM)
•    Console cable
•    SSD
 
Tools
•    Screwdriver
•    Multimeter
•    Wire cutters
•    Punchdown tool
•    Crimper
•    Power supply tester
•    Cable stripper
•    Standard technician toolkit
•    Electrostatic discharge (ESD) strap
•    Thermal paste
•    Cable tester
•    Cable toner
•    WiFi analyzer
•    SATA to USB connectors

Software
•    Operating systems
-    Linux
-    Chrome OS
-    Microsoft Windows
-    macOS
-    Android
-    iOS
•    Preinstallation environment (PE) disk/live compact disc (CD)
•    Antivirus software
•    Virtualization software
•    Anti-malware
•    Driver software
 


© 2021 CompTIA, Inc., used under license by CompTIA, Inc. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA, Inc. CompTIA is a registered trademark of CompTIA, Inc. in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA, Inc. or of their respective owners. Reproduc- tion or dissemination prohibited without the written consent of CompTIA, Inc. Printed in the U.S. 08301-Nov2020
 

 


CompTIA A+ Certification Exam Core 2 Objectives
EXAM NUMBER: CORE 1 (220-1102)

 


About the Exam


Candidates are encouraged to use this document to help prepare for the CompTIA A+ 220-1102 certification exam. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220-1101) and Core 2 (220-1102). The CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) certification exams will verify the successful candidate has the knowledge and skills required to:

•    Install, configure, and maintain computer equipment, mobile devices, and software for end users
•    Service components based on customer requirements
•    Understand networking basics and apply basic cybersecurity methods to mitigate threats
•    Properly and safely diagnose, resolve, and document common hardware and software issues
•    Apply troubleshooting skills and provide customer support using appropriate communication skills
•    Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments

This is equivalent to 12 months of hands-on experience working in a help desk support, desktop support technician, or field service technician job role. These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.

EXAM ACCREDITATION
The CompTIA A+ Core 2 (220-1102) exam is accredited by ANSI to show compliance with the ISO 17024 standard and, as such, undergoes regular reviews and updates to the exam objectives.

EXAM DEVELOPMENT
CompTIA exams result from subject-matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT professional.

CompTIA AUTHORIZED MATERIALS USE POLICY
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse, or condone utilizing any content provided by unauthorized third-party training sites (aka “brain dumps”). Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement. If a candidate has a question as to whether study materials are considered unauthorized (aka “brain dumps”), he/she should contact CompTIA at examsecurity@comptia.org to confirm.

PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of technologies, processes, or tasks pertaining to each objective may also be included on the exam, although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current, and the security of the questions is protected. When necessary, we will publish updated exams based on existing exam objectives. Please know that all related exam preparation materials will still be valid.
 


TEST DETAILS
Required exam    A+ Core 2 (220-1102)
Number of questions    Maximum of 90
Types of questions    Multiple-choice and performance-based Length of test    90 minutes
Recommended experience    12 months of hands-on experience in a help
desk support technician, desktop support technician, or field service technician job role
Passing score    700 (on a scale of 100-900)

EXAM OBJECTIVES (DOMAINS)
The table below lists the domains measured by this examination and the extent to which they are represented.

1.0    Operating Systems    31%
2.0    Security    25%
3.0    Software Troubleshooting    22%
4.0    Operational Procedures    22%
Total        100%

NOTE ON WINDOWS 11
Versions of Microsoft® Windows® that are not end of Mainstream Support (as determined by Microsoft), up to and including Windows 11, are intended content areas of the certification. As such, objectives in which a specific version of Microsoft Windows is not indicated in the main objective title can include content related to Windows 10 and Windows 11, as it relates to the job role.
 


1.0 Operating Systems
Identify basic features of Microsoft Windows editions.

 
•    Windows 10 editions
-    Home
-    Pro
-    Pro for Workstations
-    Enterprise
 
•    Feature differences
-    Domain access vs. workgroup
-    Desktop styles/user interface
-    Availability of Remote Desktop Protocol (RDP)
-    Random-access memory (RAM) support limitations
-    BitLocker
-    gpedit.msc
 
•    Upgrade paths
-    In-place upgrade
 

 


Given a scenario, use the appropriate Microsoft command-line tool.

 
•    Navigation
-    cd
-    dir
-    md
-    rmdir
-    Drive navigation inputs:
M C: or D: or x:
 
•    Command-line tools
-    ipconfig
-    ping
-    hostname
-    netstat
-    nslookup
-    chkdsk
-    net user
-    net use
-    tracert
-    format
 
-    xcopy
-    copy
-    robocopy
-    gpupdate
-    gpresult
-    shutdown
-    sfc
-    [command name] /?
-    diskpart
-    pathping
-    winver
 

Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS).
 
•    Task Manager
-    Services
-    Startup
-    Performance
-    Processes
-    Users
 
•    Microsoft Management Console (MMC) snap-in
-    Event Viewer (eventvwr.msc)
-    Disk Management (diskmgmt.msc)
-    Task Scheduler (taskschd.msc)
-    Device Manager (devmgmt.msc)
-    Certificate Manager (certmgr.msc)
-    Local Users and Groups (lusrmgr.msc)
-    Performance Monitor (perfmon.msc)
-    Group Policy Editor (gpedit.msc)
 
•    Additional tools
-    System Information (msinfo32. exe)
-    Resource Monitor (resmon.exe)
-    System Configuration (msconfig. exe)
-    Disk Cleanup (cleanmgr.exe)
-    Disk Defragment (dfrgui.exe)
-    Registry Editor (regedit.exe)
 

 


Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility.

 
•    Internet Options
•    Devices and Printers
•    Programs and Features
•    Network and Sharing Center
•    System
•    Windows Defender Firewall
•    Mail
•    Sound
•    User Accounts
 
•    Device Manager
•    Indexing Options
•    Administrative Tools
•    File Explorer Options
-    Show hidden files
-    Hide extensions
-    General options
-    View options
 
•    Power Options
-    Hibernate
-    Power plans
-    Sleep/suspend
-    Standby
-    Choose what closing the lid does
-    Turn on fast startup
-    Universal Serial Bus (USB) selective suspend
•    Ease of Access
 


Given a scenario, use the appropriate Windows settings.

 
•    Time and Language
•    Update and Security
•    Personalization
•    Apps
 
•    Privacy
•    System
•    Devices
•    Network and Internet
 
•    Gaming
•    Accounts
 

 


Given a scenario, configure Microsoft Windows networking features on a client/desktop.
 
•    Workgroup vs. domain setup
-    Shared resources
-    Printers
-    File servers
-    Mapped drives
•    Local OS firewall settings
-    Application restrictions and exceptions
-    Configuration
 
•    Client network configuration
-    Internet Protocol (IP) addressing scheme
-    Domain Name System (DNS) settings
-    Subnet mask
-    Gateway
-    Static vs. dynamic
 
•    Establish network connections
-    Virtual private network (VPN)
-    Wireless
-    Wired
-    Wireless wide area network (WWAN)
•    Proxy settings
•    Public network vs. private network
•    File Explorer navigation – network paths
•    Metered connections and limitations
 

 


Given a scenario, apply application installation and configuration concepts.

 
•    System requirements for applications
-    32-bit vs. 64-bit dependent application requirements
-    Dedicated graphics card vs. integrated
-    Video random-access memory (VRAM) requirements
-    RAM requirements
-    Central processing unit (CPU) requirements
-    External hardware tokens
-    Storage requirements
 
•    OS requirements for applications
-    Application to OS compatibility
-    32-bit vs. 64-bit OS
•    Distribution methods
-    Physical media vs. downloadable
-    ISO mountable
 
•    Other considerations for new applications
-    Impact to device
-    Impact to network
-    Impact to operation
-    Impact to business
 


Explain common OS types and their purposes.
 
•    Workstation OSs
-    Windows
-    Linux
-    macOS
-    Chrome OS
•    Cell phone/tablet OSs
-    iPadOS
-    iOS
-    Android
 
•    Various filesystem types
-    New Technology File System (NTFS)
-    File Allocation Table 32 (FAT32)
-    Third extended filesystem (ext3)
-    Fourth extended filesystem (ext4)
-    Apple File System (APFS)
-    Extensible File Allocation Table (exFAT)
 
•    Vendor life-cycle limitations
-    End-of-life (EOL)
-    Update limitations
•    Compatibility concerns between OSs
 

 


Given a scenario, perform OS installations and upgrades in a diverse OS environment.

 
•    Boot methods
-    USB
-    Optical media
-    Network
-    Solid-state/flash drives
-    Internet-based
-    External/hot-swappable drive
-    Internal hard drive (partition)
 
•    Types of installations
-    Upgrade
-    Recovery partition
-    Clean install
-    Image deployment
-    Repair installation
-    Remote network installation
-    Other considerations
M Third-party drivers
•    Partitioning
-    GUID [globally unique identifier] Partition Table (GPT)
-    Master boot record (MBR)
 
•    Drive format
•    Upgrade considerations
-    Backup files and user preferences
-    Application and driver support/ backward compatibility
-    Hardware compatibility
•    Feature updates
-    Product life cycle
 


Identify common features and tools of the macOS/desktop OS.

 
•    Installation and uninstallation of applications
-    File types
M .dmg M .pkg M .app
-    App Store
-    Uninstallation process
•    Apple ID and corporate restrictions
 
•    Best practices
-    Backups
-    Antivirus
-    Updates/patches
•    System Preferences
-    Displays
-    Networks
-    Printers
-    Scanners
-    Privacy
-    Accessibility
-    Time Machine
 
•    Features
-    Multiple desktops
-    Mission Control
-    Keychain
-    Spotlight
-    iCloud
-    Gestures
-    Finder
-    Remote Disc
-    Dock
•    Disk Utility
•    FileVault
•    Terminal
•    Force Quit
 

 


Identify common features and tools of the Linux client/desktop OS.

•    Common commands    - ip    •    Best practices
- ls    - df    - Backups
- pwd    - grep    - Antivirus
- mv    - ps    - Updates/patches
- cp    - man    •    Tools
- rm    - top    - Shell/terminal
- chmod    - find    - Samba
- chown    - dig    
- su/sudo    - cat    
- apt-get    - nano    
- yum        
 
 


Summarize various security measures and their purposes.

 
•    Physical security
-    Access control vestibule
-    Badge reader
-    Video surveillance
-    Alarm systems
-    Motion sensors
-    Door locks
-    Equipment locks
-    Guards
-    Bollards
-    Fences
•    Physical security for staff
-    Key fobs
-    Smart cards
-    Keys
-    Biometrics
 
M Retina scanner
M Fingerprint scanner
M Palmprint scanner
-    Lighting
-    Magnetometers
•    Logical security
-    Principle of least privilege
-    Access control lists (ACLs)
-    Multifactor authentication (MFA)
-    Email
-    Hard token
-    Soft token
-    Short message service (SMS)
-    Voice call
-    Authenticator application
 
•    Mobile device management (MDM)
•    Active Directory
-    Login script
-    Domain
-    Group Policy/updates
-    Organizational units
-    Home folder
-    Folder redirection
-    Security groups
 

 


Compare and contrast wireless security protocols and authentication methods.
 
•    Protocols and encryption
-    WiFi Protected Access 2 (WPA2)
-    WPA3
-    Temporal Key Integrity Protocol (TKIP)
-    Advanced Encryption Standard (AES)
 
•    Authentication
-    Remote Authentication Dial-In User Service (RADIUS)
-    Terminal Access Controller Access-Control System (TACACS+)
 
-    Kerberos
-    Multifactor
 


Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods.

 
•    Malware
-    Trojan
-    Rootkit
-    Virus
-    Spyware
-    Ransomware
-    Keylogger
-    Boot sector virus
-    Cryptominers
 
•    Tools and methods
-    Recovery mode
-    Antivirus
-    Anti-malware
-    Software firewalls
-    Anti-phishing training
-    User education regarding common threats
-    OS reinstallation
 

 


Explain common social-engineering attacks, threats, and vulnerabilities.
 
•    Social engineering
-    Phishing
-    Vishing
-    Shoulder surfing
-    Whaling
-    Tailgating
-    Impersonation
-    Dumpster diving
-    Evil twin
 
•    Threats
-    Distributed denial of service (DDoS)
-    Denial of service (DoS)
-    Zero-day attack
-    Spoofing
-    On-path attack
-    Brute-force attack
-    Dictionary attack
-    Insider threat
-    Structured Query Language (SQL) injection
-    Cross-site scripting (XSS)
 
•    Vulnerabilities
-    Non-compliant systems
-    Unpatched systems
-    Unprotected systems (missing antivirus/missing firewall)
-    EOL OSs
-    Bring your own device (BYOD)
 

Given a scenario, manage and configure basic security settings in the Microsoft Windows OS.
 
•    Defender Antivirus
-    Activate/deactivate
-    Updated definitions
•    Firewall
-    Activate/deactivate
-    Port security
-    Application security
•    Users and groups
-    Local vs. Microsoft account
-    Standard account
-    Administrator
 
-    Guest user
-    Power user
•    Login OS options
-    Username and password
-    Personal identification number (PIN)
-    Fingerprint
-    Facial recognition
-    Single sign-on (SSO)
 
•    NTFS vs. share permissions
-    File and folder attributes
-    Inheritance
•    Run as administrator vs. standard user
-    User Account Control (UAC)
•    BitLocker
•    BitLocker To Go
•    Encrypting File System (EFS)
 

 


Given a scenario, configure a workstation to meet best practices for security.
 
•    Data-at-rest encryption
•    Password best practices
-    Complexity requirements
M Length
M Character types
-    Expiration requirements
-    Basic input/output system (BIOS)/ Unified Extensible Firmware Interface (UEFI) passwords
•    End-user best practices
 
-    Use screensaver locks
-    Log off when not in use
-    Secure/protect critical hardware (e.g., laptops)
-    Secure personally identifiable information (PII) and passwords
•    Account management
-    Restrict user permissions
-    Restrict login times
-    Disable guest account
 
-    Use failed attempts lockout
-    Use timeout/screen lock
•    Change default administrator’s user account/password
•    Disable AutoRun
•    Disable AutoPlay
 


 


Explain common methods for securing mobile and embedded devices.
 
•    Screen locks
-    Facial recognition
-    PIN codes
-    Fingerprint
-    Pattern
-    Swipe
 
•    Remote wipes
•    Locator applications
•    OS updates
•    Device encryption
•    Remote backup applications
•    Failed login attempts restrictions
•    Antivirus/anti-malware
 
• Firewalls
• Policies and procedures
-    BYOD vs. corporate owned
-    Profile security requirements
• Internet of Things (IoT)
 

Given a scenario, use common data destruction and disposal methods.
 
• Physical destruction
- Drilling
- Shredding
- Degaussing
- Incinerating
 
• Recycling or repurposing best practices
- Erasing/wiping
- Low-level formatting
- Standard formatting
 
• Outsourcing concepts
- Third-party vendor
- Certification of destruction/ recycling
 

 


Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.
 
• Home router settings
- Change default passwords
- IP filtering
- Firmware updates
- Content filtering
- Physical placement/secure locations
- Dynamic Host Configuration Protocol (DHCP) reservations
- Static wide-area network (WAN) IP
- Universal Plug and Play (UPnP)
- Screened subnet
 
•    Wireless specific
-    Changing the service set identifier (SSID)
-    Disabling SSID broadcast
-    Encryption settings
-    Disabling guest access
-    Changing channels
 
•    Firewall settings
-    Disabling unused ports
-    Port forwarding/mapping
 

 


Given a scenario, install and configure browsers and relevant security settings.
 
•    Browser download/installation
-    Trusted sources
M Hashing
-    Untrusted sources
•    Extensions and plug-ins
-    Trusted sources
-    Untrusted sources
 
•    Password managers
•    Secure connections/sites – valid certificates
 
•    Settings
-    Pop-up blocker
-    Clearing browsing data
-    Clearing cache
-    Private-browsing mode
-    Sign-in/browser data synchronization
-    Ad blockers
 


3.0 Software Troubleshooting
Given a scenario, troubleshoot common Windows OS problems.

 
•    Common symptoms
-    Blue screen of death (BSOD)
-    Sluggish performance
-    Boot problems
-    Frequent shutdowns
-    Services not starting
-    Applications crashing
-    Low memory warnings
-    USB controller resource warnings
-    System instability
-    No OS found
-    Slow profile load
-    Time drift
 
•    Common troubleshooting steps
-    Reboot
-    Restart services
-    Uninstall/reinstall/update applications
-    Add resources
-    Verify requirements
-    System file check
-    Repair Windows
-    Restore
-    Reimage
-    Roll back updates
-    Rebuild Windows profiles
 

 


Given a scenario, troubleshoot common personal computer (PC) security issues.
 
•    Common symptoms
-    Unable to access the network
-    Desktop alerts
-    False alerts regarding antivirus protection
-    Altered system or personal files
M Missing/renamed files
-    Unwanted notifications within the OS
-    OS update failures
 
•    Browser-related symptoms
-    Random/frequent pop-ups
-    Certificate warnings
-    Redirection
 
3.0 | Software Troubleshooting  

Given a scenario, use best practice procedures for malware removal.

 
1.    Investigate and verify malware symptoms
2.    Quarantine infected systems
3.    Disable System Restore in Windows
 
4.    Remediate infected systems
a.    Update anti-malware software
b.    Scanning and removal techniques (e.g., safe mode, preinstallation environment)
 
5.    Schedule scans and run updates
6.    Enable System Restore and create a restore point in Windows
7.    Educate the end user
 

 


Given a scenario, troubleshoot common mobile OS and application issues.

 
•    Common symptoms
-    Application fails to launch
-    Application fails to close/crashes
-    Application fails to update
-    Slow to respond
-    OS fails to update
-    Battery life issues
 
-    Randomly reboots
-    Connectivity issues
M Bluetooth
M WiFi
M Near-field communication (NFC)
M AirDrop
 
- Screen does not autorotate
 

 


Given a scenario, troubleshoot common mobile OS and application security issues.

 
•    Security concerns
-    Android package (APK) source
-    Developer mode
-    Root access/jailbreak
-    Bootleg/malicious application
M Application spoofing
 
•    Common symptoms
-    High network traffic
-    Sluggish response time
-    Data-usage limit notification
-    Limited Internet connectivity
-    No Internet connectivity
-    High number of ads
-    Fake security warnings
-    Unexpected application behavior
-    Leaked personal files/data
 


4.0 Operational Procedures


Given a scenario, implement best practices associated with documentation and support systems information management.

 
•    Ticketing systems
-    User information
-    Device information
-    Description of problems
-    Categories
-    Severity
-    Escalation levels
-    Clear, concise written communication
M Problem description
M Progress notes
M Problem resolution
 
•    Asset management
-    Inventory lists
-    Database system
-    Asset tags and IDs
-    Procurement life cycle
-    Warranty and licensing
-    Assigned users
•    Types of documents
-    Acceptable use policy (AUP)
-    Network topology diagram
-    Regulatory compliance requirements
M Splash screens
 
-    Incident reports
-    Standard operating procedures
M Procedures for custom installation of software package
-    New-user setup checklist
-    End-user termination checklist
•    Knowledge base/articles
 

 


Explain basic change-management best practices.

 
•    Documented business processes
-    Rollback plan
-    Sandbox testing
-    Responsible staff member
 
•    Change management
-    Request forms
-    Purpose of the change
-    Scope of the change
-    Date and time of the change
-    Affected systems/impact
-    Risk analysis
M Risk level
-    Change board approvals
-    End-user acceptance
 


Given a scenario, implement workstation backup and recovery methods.
 
•    Backup and recovery
-    Full
-    Incremental
-    Differential
-    Synthetic
 
•    Backup testing
-    Frequency
 
•    Backup rotation schemes
-    On site vs. off site
-    Grandfather-father-son (GFS)
-    3-2-1 backup rule
 

 


Given a scenario, use common safety procedures.

 
•    Electrostatic discharge (ESD) straps
•    ESD mats
•    Equipment grounding
•    Proper power handling
 
•    Proper component handling and storage
•    Antistatic bags
•    Compliance with government regulations
 
•    Personal safety
-    Disconnect power before repairing PC
-    Lifting techniques
-    Electrical fire safety
-    Safety goggles
-    Air filtration mask
 

 


Summarize environmental impacts and local environmental controls.

 
•    Material safety data sheet (MSDS)/documentation for handling and disposal
-    Proper battery disposal
-    Proper toner disposal
-    Proper disposal of other devices and assets
 
•    Temperature, humidity-level awareness, and proper ventilation
-    Location/equipment placement
-    Dust cleanup
-    Compressed air/vacuums
 
•    Power surges, under-voltage events, and power failures
-    Battery backup
-    Surge suppressor
 


Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.

 
•    Incident response
-    Chain of custody
-    Inform management/law enforcement as necessary
-    Copy of drive (data integrity and preservation)
-    Documentation of incident
 
•    Licensing/digital rights management (DRM)/end-user license agreement (EULA)
-    Valid licenses
-    Non-expired licenses
-    Personal use license vs. corporate use license
-    Open-source license
 
•    Regulated data
-    Credit card transactions
-    Personal government-issued information
-    PII
-    Healthcare data
-    Data retention requirements
 

 


Given a scenario, use proper communication techniques and professionalism.

 
•    Professional appearance and attire
-    Match the required attire of the given environment
M Formal
M Business casual
•    Use proper language and avoid jargon, acronyms, and slang, when applicable
•    Maintain a positive attitude/ project confidence
•    Actively listen, take notes, and avoid interrupting the customer
•    Be culturally sensitive
-    Use appropriate professional titles, when applicable
•    Be on time (if late, contact the customer)
 
•    Avoid distractions
-    Personal calls
-    Texting/social media sites
-    Personal interruptions
•    Dealing with difficult customers or situations
-    Do not argue with customers or be defensive
-    Avoid dismissing customer problems
-    Avoid being judgmental
-    Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
-    Do not disclose experience via social media outlets
 
•    Set and meet expectations/time line and communicate status with the customer
-    Offer repair/replacement options, as needed
-    Provide proper documentation on the services provided
-    Follow up with customer/user at a later date to verify satisfaction
•    Deal appropriately with customers’ confidential and private materials
-    Located on a computer, desktop, printer, etc.
 


Identify the basics of scripting.

 
•    Script file types
-    .bat
-    .ps1
-    .vbs
-    .sh
-    .js
-    .py
 
•    Use cases for scripting
-    Basic automation
-    Restarting machines
-    Remapping network drives
-    Installation of applications
-    Automated backups
-    Gathering of information/data
-    Initiating updates
 
•    Other considerations when using scripts
-    Unintentionally introducing malware
-    Inadvertently changing system settings
-    Browser or system crashes due to mishandling of resources
 

 


Given a scenario, use remote access technologies.

 
•    Methods/tools
-    RDP
-    VPN
-    Virtual network computer (VNC)
-    Secure Shell (SSH)
-    Remote monitoring and management (RMM)
-    Microsoft Remote Assistance (MSRA)
-    Third-party tools
M Screen-sharing software
M Video-conferencing software
M File transfer software
M Desktop management software
 
•    Security considerations of each access method
 


CompTIA A+ Core 2 (220-1102) Acronym List
The following is a list of acronyms that appear on the CompTIA A+
Core 2 (220-1102) exam. Candidates are encouraged to review the complete list and attain a working knowledge of all listed acronyms as part of a comprehensive exam preparation program.

Acronym    Definition    Acronym    Definition
AAA    Authentication, Authorization, and    DHCP    Dynamic Host Configuration Protocol
    Accounting    DIMM    Dual Inline Memory Module
AC    Alternating Current    DKIM    DomainKeys Identified Mail
ACL    Access Control List    DMA    Direct Memory Access
ADF    Automatic Document Feeder    DMARC    Domain-based Message Authentication,
AES    Advanced Encryption Standard        Reporting, and Conformance
AP    Access Point    DNS    Domain Name System
APFS    Apple File System    DoS    Denial of Service
APIPA    Automatic Private Internet Protocol    DRAM    Dynamic Random-Access Memory
    Addressing    DRM    Digital Rights Management
APK    Android Package    DSL    Digital Subscriber Line
ARM    Advanced RISC [Reduced Instruction Set    DVI    Digital Visual Interface
    Computer] Machine    DVI-D    Digital Visual Interface-Digital
ARP    Address Resolution Protocol    ECC    Error Correcting Code
ATA    Advanced Technology Attachment    EFS    Encrypting File System
ATM    Asynchronous Transfer Mode    EMI    Electromagnetic Interference
ATX    Advanced Technology Extended    EOL    End-of-Life
AUP    Acceptable Use Policy    eSATA    External Serial Advanced Technology
BIOS    Basic Input/Output System        Attachment
BSOD    Blue Screen of Death    ESD    Electrostatic Discharge
BYOD    Bring Your Own Device    EULA    End-User License Agreement
CAPTCHA    Completely Automated Public Turing Test    exFAT    Extensible File Allocation Table
    to Tell Computers and Humans Apart    ext    Extended File System
CD    Compact Disc    FAT    File Allocation Table
CDFS    Compact Disc File System    FAT12    12-bit File Allocation Table
CDMA    Code-Division Multiple Access    FAT16    16-bit File Allocation Table
CERT    Computer Emergency Response Team    FAT32    32-bit File Allocation Table
CIFS    Common Internet File System    FSB    Front-Side Bus
CMD    Command Prompt    FTP    File Transfer Protocol
CMOS    Complementary Metal-Oxide    GFS    Grandfather-Father-Son
    Semiconductor    GPS    Global Positioning System
CPU    Central Processing Unit    GPT    GUID [Globally Unique Identifier] Partition
CRL    Certificate Revocation List        Table
DC    Direct Current    GPU    Graphics Processing Unit
DDoS    Distributed Denial of Service    GSM    Global System for Mobile Communications
DDR    Double Data Rate    GUI    Graphical User Interface
 

Acronym    Definition    Acronym    Definition
GUID    Globally Unique Identifier    MOU    Memorandum of Understanding
HAL    Hardware Abstraction Layer    MSDS    Material Safety Data Sheet
HAV    Hardware-assisted Virtualization    MSRA    Microsoft Remote Assistance
HCL    Hardware Compatibility List    MX    Mail Exchange
HDCP    High-bandwidth Digital Content Protection    NAC    Network Access Control
HDD    Hard Disk Drive    NAT    Network Address Translation
HDMI    High-Definition Multimedia Interface    NDA    Non-disclosure Agreement
HSM    Hardware Security Module    NetBIOS    Networked Basic Input/Output System
HTML    Hypertext Markup Language    NetBT    NetBIOS over TCP/IP [Transmission Control
HTTP    Hypertext Transfer Protocol        Protocol/Internet Protocol]
HTTPS    Hypertext Transfer Protocol Secure    NFC    Near-field Communication
I/O    Input/Output    NFS    Network File System
IaaS    Infrastructure as a Service    NIC    Network Interface Card
ICR    Intelligent Character Recognition    NTFS    New Technology File System
IDE    Integrated Drive Electronics    NVMe    Non-volatile Memory Express
IDS    Intrusion Detection System    OCR    Optical Character Recognition
IEEE    Institute of Electrical and Electronics    OLED    Organic Light-emitting Diode
    Engineers    ONT    Optical Network Terminal
IMAP    Internet Mail Access Protocol    OS    Operating System
IOPS    Input/Output Operations Per Second    PaaS    Platform as a Service
IoT    Internet of Things    PAN    Personal Area Network
IP    Internet Protocol    PC    Personal Computer
IPS    Intrusion Prevention System    PCIe    Peripheral Component Interconnect Express
IPS    In-plane Switching    PCL    Printer Command Language
IPSec    Internet Protocol Security    PE    Preinstallation Environment
IR    Infrared    PII    Personally Identifiable Information
IrDA    Infrared Data Association    PIN    Personal Identification Number
IRP    Incident Response Plan    PKI    Public Key Infrastructure
ISO    International Organization for    PoE    Power over Ethernet
    Standardization    POP3    Post Office Protocol 3
ISP    Internet Service Provider    POST    Power-on Self-Test
ITX    Information Technology eXtended    PPP    Point-to-Point Protocol
KB    Knowledge Base    PRL    Preferred Roaming List
KVM    Keyboard-Video-Mouse    PSU    Power Supply Unit
LAN    Local Area Network    PXE    Preboot Execution Environment
LC    Lucent Connector    RADIUS    Remote Authentication Dial-in User Service
LCD    Liquid Crystal Display    RAID    Redundant Array of Independent (or
LDAP    Lightweight Directory Access Protocol        Inexpensive) Disks
LED    Light-emitting Diode    RAM    Random-access Memory
MAC    Media Access Control/Mandatory Access    RDP    Remote Desktop Protocol
    Control    RF    Radio Frequency
MAM    Mobile Application Management    RFI    Radio Frequency Interference
MAN    Metropolitan Area Network    RFID    Radio Frequency Identification
MBR    Master Boot Record    RJ11    Registered Jack Function 11
MDM    Mobile Device Management    RJ45    Registered Jack Function 45
MFA    Multifactor Authentication    RMM    Remote Monitoring and Management
MFD    Multifunction Device    RTO    Recovery Time Objective
MFP    Multifunction Printer    SaaS    Software as a Service
MMC    Microsoft Management Console    SAN    Storage Area Network
 

Acronym    Definition    Acronym    Definition
SAS    Serial Attached SCSI [Small Computer    TFTP    Trivial File Transfer Protocol
    System Interface]    TKIP    Temporal Key Integrity Protocol
SATA    Serial Advanced Technology Attachment    TLS    Transport Layer Security
SC    Subscriber Connector    TN    Twisted Nematic
SCADA    Supervisory Control and Data Acquisition    TPM    Trusted Platform Module
SCP    Secure Copy Protection    UAC    User Account Control
SCSI    Small Computer System Interface    UDP    User Datagram Protocol
SDN    Software-defined Networking    UEFI    Unified Extensible Firmware Interface
SFTP    Secure File Transfer Protocol    UNC    Universal Naming Convention
SIM    Subscriber Identity Module    UPnP    Universal Plug and Play
SIMM    Single Inline Memory Module    UPS    Uninterruptible Power Supply
S.M.A.R.T.    Self-monitoring Analysis and Reporting    USB    Universal Serial Bus
    Technology    UTM    Unified Threat Management
SMB    Server Message Block    UTP    Unshielded Twisted Pair
SMS    Short Message Service    VA    Vertical Alignment
SMTP    Simple Mail Transfer Protocol    VDI    Virtual Desktop Infrastructure
SNMP    Simple Network Management Protocol    VGA    Video Graphics Array
SNTP    Simple Network Time Protocol    VLAN    Virtual LAN [Local Area Network]
SODIMM    Small Outline Dual Inline Memory Module    VM    Virtual Machine
SOHO    Small Office/Home Office    VNC    Virtual Network Computer
SPF    Sender Policy Framework    VoIP    Voice over Internet Protocol
SQL    Structured Query Language    VPN    Virtual Private Network
SRAM    Static Random-access Memory    VRAM    Video Random-access Memory
SSD    Solid-State Drive    WAN    Wide Area Network
SSH    Secure Shell    WEP    Wired Equivalent Privacy
SSID    Service Set Identifier    WISP    Wireless Internet Service Provider
SSL    Secure Sockets Layer    WLAN    Wireless LAN [Local Area Network]
SSO    Single Sign-on    WMN    Wireless Mesh Network
ST    Straight Tip    WPA    WiFi Protected Access
STP    Shielded Twisted Pair    WWAN    Wireless Wide Area Network
TACACS    Terminal Access Controller Access-Control    XSS    Cross-site Scripting
    System        
TCP    Transmission Control Protocol        
TCP/IP    Transmission Control Protocol/Internet        
    Protocol        
 
CompTIA A+ Core 2 (220-1102)
Proposed Hardware and Software List
**CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the A+ Core 2 (220-1102) exam. This list may also be helpful for training companies that wish to create a lab component to their training offering. The bulleted lists below each topic are sample lists and are not exhaustive.
 
Equipment
•    Apple tablet/smartphone
•    Android tablet/smartphone
•    Windows tablet
•    Chromebook
•    Windows laptop/Mac laptop/Linux laptop
•    Windows desktop/Mac desktop/ Linux desktop
•    Windows server with Active Directory and Print Management
•    Monitors
•    Projectors
•    SOHO router/switch
•    Access point
•    Voice over Internet Protocol (VoIP) phone
•    Printer
-    Laser/inkjet
-    Wireless
-    3-D printer
-    Thermal
•    Surge suppressor
•    Uninterruptible power supply (UPS)
•    Smart devices (Internet of Things [IoT] devices)
•    Server with a hypervisor
•    Punchdown block
•    Patch panel
•    Webcams
•    Speakers
•    Microphones

Spare parts/hardware
•    Motherboards
•    RAM
•    Hard drives
 
•    Power supplies
•    Video cards
•    Sound cards
•    Network cards
•    Wireless network interface cards (NICs)
•    Fans/cooling devices/heat sink
•    CPUs
•    Assorted connectors/cables
-    USB
-    High-Definition Multimedia Interface (HDMI)
-    DisplayPort
-    Digital visual interface (DVI)
-    Video graphics array (VGA)
•    Adapters
-    Bluetooth adapter
•    Network cables
•    Unterminated network cable/ connectors
•    Alternating current (AC) adapters
•    Optical drives
•    Screws/standoffs
•    Cases
•    Maintenance kit
•    Mice/keyboards
•    Keyboard-video-mouse (KVM)
•    Console cable
•    Solid-state drive (SSD)

Tools
•    Screwdriver
•    Multimeter
•    Wire cutters
•    Punchdown tool
•    Crimper
•    Power supply tester
•    Cable stripper
 
•    Standard technician toolkit
•    Electrostatic discharge (ESD) strap
•    Thermal paste
•    Cable tester
•    Cable toner
•    WiFi analyzer
•    Serial advanced technology attachment (SATA) to USB connectors

Software
•    OSs
-    Linux
-    Chrome OS
-    Microsoft Windows
-    macOS
-    Android
-    iOS
•    Preinstallation environment (PE) disk/live compact disc (CD)
•    Antivirus software
•    Virtualization software
•    Anti-malware
•    Driver software
 


© 2021 CompTIA, Inc., used under license by CompTIA, Inc. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA, Inc. CompTIA is a registered trademark of CompTIA, Inc. in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA, Inc. or of their respective owners. Reproduc- tion or dissemination prohibited without the written consent of CompTIA, Inc. Printed in the U.S. 08301-Nov2020
 

Pre-Requisite

Back to top