CompTIA A+ 1001-1002
Core 1
1. Mobile Devices
2. Networking
3. Hardware
4. Virtualization and Cloud Computing
5. Hardware and Network Troubleshooting
Core 2
1. Operating Systems
2. Security
3. Software Troubleshooting
4. Operational Procedures
UpComing Classes
Full Course
CompTIA A+ Certification Exam: Core 1 Objectives
EXAM NUMBER: CORE 1 (220-1001)
About the Exam
Candidates are encouraged to use this document to help prepare for CompTIA A+ Core 1. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220- 1001) and Core 2 (220-1002). CompTIA A+ Core 1 measures the necessary skills for an entry- level IT professional. Successful candidates will have the knowledge required to:
• Assemble components based on customer requirements
• Install, configure, and maintain PCs, mobile devices, and software for end users
• Understand the basics of networking and security forensics
• Properly and safely diagnose, resolve, and document common hardware and software issues
• Apply troubleshooting skills
• Provide appropriate customer support
• Understand the basics of scripting, virtualization, desktop imaging, and deployment
These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.
EXAM ACCREDITATION
CompTIA A+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives.
EXAM DEVELOPMENT
CompTIA exams result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT professional.
CompTIA AUTHORIZED MATERIALS USE POLICY
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone utilizing any content provided by unauthorized third-party training sites (aka “brain dumps”). Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs
all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement. If a candidate has a question as to whether study materials are considered unauthorized (aka “brain dumps”), he/she should contact CompTIA at examsecurity@comptia.org to confirm.
PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of technologies, processes, or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current and the security of the questions is protected. When necessary, we will publish updated exams based on testing exam objectives. Please know that all related exam preparation materials will still be valid.
TEST DETAILS
Required exam Core 1
Number of questions Maximum of 90
Types of questions Multiple choice and performance-based Length of test 90 minutes
Recommended experience 12 months of experience as an IT support specialist Passing score 675 (on a scale of 100–900)
EXAM OBJECTIVES (DOMAINS)
The table below lists the domains measured by this examination and the extent to which they are represented:
DOMAIN PERCENTAGE OF EXAMINATION
1.0 Mobile Devices 14%
2.0 Networking 20%
3.0 Hardware 27%
4.0 Virtualization and Cloud Computing 12%
5.0 Hardware and Network Troubleshooting 27%
Total 100%
Given a scenario, install and configure laptop hardware and components.
• Hardware/device replacement
- Keyboard
- Hard drive
- SSD vs. hybrid vs. magnetic disk
- 1.8in vs. 2.5in
- Memory
- Smart card reader
- Optical drive
- Wireless card/Bluetooth module
- Cellular card
- Video card
- Mini PCIe
- Screen
- DC jack
- Battery
- Touchpad
- Plastics/frames
- Speaker
- System board
- CPU
Given a scenario, install components within the display of a laptop.
• Types
- LCD
- OLED
• WiFi antenna connector/placement
• Webcam
• Microphone
• Inverter
• Digitizer/touchscreen
Given a scenario, use appropriate laptop features.
• Special function keys
- Dual displays
- Wireless (on/off)
- Cellular (on/off)
- Volume settings
- Screen brightness
- Bluetooth (on/off)
- Keyboard backlight
- Touchpad (on/off)
- Screen orientation
- Media options (fast forward/rewind)
- GPS (on/off)
- Airplane mode
• Docking station
• Port replicator
• Physical laptop lock and cable lock
• Rotating/removable screens
Compare and contrast characteristics of various types of other mobile devices.
• Tablets
• Smartphones
• Wearable technology devices
- Smart watches
- Fitness monitors
- VR/AR headsets
• E-readers
• GPS
1.0 Mobile Devices
Given a scenario, connect and configure accessories and ports of other mobile devices.
• Connection types
- Wired
- Micro-USB/Mini-USB/USB-C
- Lightning
- Tethering
- Proprietary vendor-specific ports (communication/power)
- Wireless
- NFC
- Bluetooth
- IR
- Hotspot
• Accessories
- Headsets
- Speakers
- Game pads
- Extra battery packs/battery chargers
- Protective covers/waterproofing
- Credit card readers
- Memory/MicroSD
Given a scenario, configure basic mobile device network connectivity and application support.
• Wireless/cellular data network (enable/disable)
- Hotspot
- Tethering
- Airplane mode
• Bluetooth
- Enable Bluetooth
- Enable pairing
- Find a device for pairing
- Enter the appropriate pin code
- Test connectivity
• Corporate and ISP email configuration
- POP3
- IMAP
- Port and SSL settings
- S/MIME
• Integrated commercial provider email configuration
- iCloud
- Google/Inbox
- Exchange Online
- Yahoo
• PRI updates/PRL updates/ baseband updates
• Radio firmware
• IMEI vs. IMSI
• VPN
Given a scenario, use methods to perform mobile device synchronization.
• Synchronization methods
- Synchronize to the cloud
- Synchronize to the desktop
- Synchronize to the automobile
• Types of data to synchronize
- Contacts
- Applications
- Email
- Pictures
- Music
- Videos
- Calendar
- Bookmarks
- Documents
- Location data
- Social media data
- E-books
- Passwords
• Mutual authentication for multiple services (SSO)
• Software requirements to install the application on the PC
• Connection types to enable synchronization
Compare and contrast TCP and UDP ports, protocols, and their purposes.
• Ports and protocols
- 21 – FTP - 110 – POP3
- 143 – IMAP - 548 – AFP
- 67/68 – DHCP
- 22 – SSH - 443 – HTTPS - 389 – LDAP
- 23 – Telnet - 3389 – RDP - 161/162 – SNMP
- 25 – SMTP - 137-139 – NetBIOS/NetBT • TCP vs. UDP
- 53 – DNS - 445 – SMB/CIFS
- 80 – HTTP - 427 – SLP
Compare and contrast common networking hardware devices.
• Routers
• Switches
- Managed
- Unmanaged
• Access points
• Cloud-based network controller
• Firewall
• Network interface card
• Repeater
• Hub
• Cable/DSL modem
• Bridge
• Patch panel
• Power over Ethernet (PoE)
- Injectors
- Switch
• Ethernet over Power
Given a scenario, install and configure a basic wired/wireless SOHO network.
• Router/switch functionality
• Access point settings
• IP addressing
• NIC configuration
- Wired
- Wireless
• End-user device configuration
• IoT device configuration
- Thermostat
- Light switches
- Security cameras
- Door locks
- Voice-enabled, smart speaker/digital assistant
• Cable/DSL modem configuration
• Firewall settings
- DMZ
- Port forwarding
- NAT
- UPnP
- Whitelist/blacklist
- MAC filtering
• QoS
• Wireless settings
- Encryption
- Channels
- QoS
Compare and contrast wireless networking protocols.
• 802.11a
• 802.11b
• 802.11g
• 802.11n
• 802.11ac
• Frequencies
- 2.4Ghz
- 5Ghz
• Channels
- 1–11
• Bluetooth
• NFC
• RFID
• Zigbee
• Z-Wave
• 3G
• 4G
• 5G
• LTE
2.0 Networking
Summarize the properties and purposes of services provided by networked hosts.
• Server roles
- Web server
- File server
- Print server
- DHCP server
- DNS server
- Proxy server
- Mail server
- Authentication server
- syslog
• Internet appliance
- UTM
- IDS
- IPS
- End-point management server
• Legacy/embedded systems
Explain common network configuration concepts.
• IP addressing
- Static
- Dynamic
- APIPA
- Link local
• DNS
• DHCP
- Reservations
• IPv4 vs. IPv6
• Subnet mask
• Gateway
• VPN
• VLAN
• NAT
Compare and contrast Internet connection types, network types, and their features.
• Internet connection types
- Cable
- DSL
- Dial-up
- Fiber
- Satellite
- ISDN
- Cellular
- Tethering
- Mobile hotspot
- Line-of-sight wireless Internet service
• Network types
- LAN
- WAN
- PAN
- MAN
- WMN
Given a scenario, use appropriate networking tools.
• Crimper
• Cable stripper
• Multimeter
• Tone generator and probe
• Cable tester
• Loopback plug
• Punchdown tool
• WiFi analyzer
Explain basic cable types, features, and their purposes.
• Network cables
- Ethernet
- Cat 5
- Cat 5e
- Cat 6
- Plenum
- Shielded twisted pair
- Unshielded twisted pair
- 568A/B
- Fiber
- Coaxial
- Speed and transmission limitations
• Video cables
- VGA
- HDMI
- Mini-HDMI
- DisplayPort
- DVI ( DVI-D/DVI-I)
• Multipurpose cables
- Lightning
- Thunderbolt
- USB
- USB-C
- USB 2.0
- USB 3.0
• Peripheral cables
- Serial
• Hard drive cables
- SATA
- IDE
- SCSI
• Adapters
- DVI to HDMI
- USB to Ethernet
- DVI to VGA
Identify common connector types.
• RJ-11
• RJ-45
• RS-232
• BNC
• RG-59
• RG-6
• USB
• Micro-USB
• Mini-USB
• USB-C
• DB-9
• Lightning
• SCSI
• eSATA
• Molex
Given a scenario, install RAM types.
• RAM types
- SODIMM
- DDR2
- DDR3
- DDR4
• Single channel
• Dual channel
• Triple channel
• Error correcting
• Parity vs. non-parity
3.0 Hardware
Given a scenario, select, install and configure storage devices.
• Optical drives
- CD-ROM/CD-RW
- DVD-ROM/DVD-RW/DVD-RW DL
- Blu-ray
- BD-R
- BD-RE
• Solid-state drives
- M2 drives
- NVME
- SATA 2.5
• Magnetic hard drives
- 5,400rpm
- 7,200rpm
- 10,000rpm
- 15,000rpm
- Sizes:
-2.5
-3.5
• Hybrid drives
• Flash
- SD card
- CompactFlash
- Micro-SD card
- Mini-SD card
- xD
• Configurations
- RAID 0, 1, 5, 10
- Hot swappable
Given a scenario, install and configure motherboards, CPUs, and add-on cards.
• Motherboard form factor
- ATX
- mATX
- ITX
- mITX
• Motherboard connectors types
- PCI
- PCIe
- Riser card
- Socket types
- SATA
- IDE
- Front panel connector
- Internal USB connector
• BIOS/UEFI settings
- Boot options
- Firmware updates
- Security settings
- Interface configurations
- Security
- Passwords
- Drive encryption
- TPM
- LoJack
- Secure boot
• CMOS battery
• CPU features
- Single-core
- Multicore
- Virtualization
- Hyperthreading
- Speeds
- Overclocking
- Integrated GPU
• Compatibility
- AMD
- Intel
• Cooling mechanism
- Fans
- Heat sink
- Liquid
- Thermal paste
• Expansion cards
- Video cards
- Onboard
- Add-on card
- Sound cards
- Network interface card
- USB expansion card
- eSATA card
Explain the purposes and uses of various peripheral types.
• Printer
• ADF/flatbed scanner
• Barcode scanner/QR scanner
• Monitors
• VR headset
• Optical drive types
• Mouse
• Keyboard
• Touchpad
• Signature pad
• Game controllers
• Camera/webcam
• Microphone
• Speakers
• Headset
• Projector
- Lumens/brightness
• External storage drives
• KVM
• Magnetic reader/chip reader
• NFC/tap pay device
• Smart card reader
3.0 Hardware
Summarize power supply types and features.
• Input 115V vs. 220V
• Output 5V vs. 12V
• 24-pin motherboard adapter
• Wattage rating
• Number of devices/types of devices to be powered
Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs.
• Graphic/CAD/CAM design workstation
- SSD
- High-end video
- Maximum RAM
• Audio/video editing workstation
- Specialized audio and video card
- Large, fast hard drive
- Dual monitors
• Virtualization workstation
- Maximum RAM and CPU cores
• Gaming PC
- SSD
- High-end video/specialized GPU
- High-definition sound card
- High-end cooling
• Network attached storage device
- Media streaming
- File sharing
- Gigabit NIC
- RAID array
- Hard drive
• Standard thick client
- Desktop applications
- Meets recommended requirements for selected OS
• Thin client
- Basic applications
- Meets minimum requirements for selected OS
- Network connectivity
Given a scenario, install and configure common devices.
• Desktop
- Thin client
- Thick client
- Account setup/settings
• Laptop/common mobile devices
- Touchpad configuration
- Touchscreen configuration
- Application installations/configurations
- Synchronization settings
- Account setup/settings
- Wireless settings
3.0 Hardware
Given a scenario, configure SOHO multifunction devices/printers and settings.
• Use appropriate drivers for a given operating system
- Configuration settings
- Duplex
- Collate
- Orientation
- Quality
• Device sharing
- Wired
- USB
- Serial
- Ethernet
- Wireless
- Bluetooth
- 802.11(a, b, g, n, ac)
- Infrastructure vs. ad hoc
- Integrated print server (hardware)
- Cloud printing/remote printing
• Public/shared devices
- Sharing local/networked device via operating system settings
- TCP/Bonjour/AirPrint
- Data privacy
- User authentication on the device
- Hard drive caching
Given a scenario, install and maintain various print technologies.
• Laser
- Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads,
duplexing assembly
- Imaging process: processing, charging, exposing, developing, transferring, fusing, and cleaning
- Maintenance: Replace toner, apply maintenance kit, calibrate, clean
• Inkjet
- Ink cartridge, print head, roller, feeder, duplexing assembly, carriage, and belt
- Calibrate
- Maintenance: Clean heads, replace cartridges, calibrate, clear jams
• Thermal
- Feed assembly, heating element
- Special thermal paper
- Maintenance: Replace paper, clean heating element, remove debris
• Impact
- Print head, ribbon, tractor feed
- Impact paper
- Maintenance: Replace ribbon, replace print head, replace paper
• Virtual
- Print to file
- Print to PDF
- Print to XPS
- Print to image
• 3D printers
- Plastic filament
4.0 Virtualization and Cloud Computing
Compare and contrast cloud computing concepts.
• Common cloud models
- IaaS
- SaaS
- PaaS
- Public vs. private vs. hybrid vs. community
• Shared resources
- Internal vs. external
• Rapid elasticity
• On-demand
• Resource pooling
• Measured service
• Metered
• Off-site email applications
• Cloud file storage services
- Synchronization apps
• Virtual application streaming/ cloud-based applications
- Applications for cell phones/tablets
- Applications for laptops/desktops
• Virtual desktop
- Virtual NIC
Given a scenario, set up and configure client-side virtualization.
• Purpose of virtual machines
• Resource requirements
• Emulator requirements
• Security requirements
• Network requirements
• Hypervisor
5.0 Hardware and Network Troubleshooting
Given a scenario, use the best practice methodology to resolve problems.
• Always consider corporate policies, procedures, and impacts before implementing changes
1. Identify the problem
- Question the user and identify user changes to computer and perform backups before making changes
- Inquire regarding environmental or infrastructure changes
- Review system and application logs
2. Establish a theory of probable cause (question the obvious)
- If necessary, conduct external or internal research based on symptoms
3. Test the theory to determine cause
- Once the theory is confirmed, determine the next steps to resolve problem
- If theory is not confirmed re- establish new theory or escalate
4. Establish a plan of action to resolve the problem and implement the solution
5. Verify full system functionality and, if applicable, implement
preventive measures
6. Document findings, actions, and outcomes
Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power.
• Common symptoms
- Unexpected shutdowns
- System lockups
- POST code beeps
- Blank screen on bootup
- BIOS time and setting resets
- Attempts to boot to incorrect device
- Continuous reboots
- No power
- Overheating
- Loud noise
- Intermittent device failure
- Fans spin – no power to other devices
- Indicator lights
- Smoke
- Burning smell
- Proprietary crash screens (BSOD/pin wheel)
- Distended capacitors
- Log entries and error messages
Given a scenario, troubleshoot hard drives and RAID arrays.
• Common symptoms
- Read/write failure
- Slow performance
- Loud clicking noise
- Failure to boot
- Drive not recognized
- OS not found
- RAID not found
- RAID stops working
- Proprietary crash screens (BSOD/pin wheel)
- S.M.A.R.T. errors
5.0 Hardware and Network Troubleshooting
Given a scenario, troubleshoot video, projector, and display issues.
• Common symptoms
- VGA mode
- No image on screen
- Overheat shutdown
- Dead pixels
- Artifacts
- Incorrect color patterns
- Dim image
- Flickering image
- Distorted image
- Distorted geometry
- Burn-in
- Oversized images and icons
Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.
• Common symptoms
- No display
- Dim display
- Flickering display
- Sticking keys
- Intermittent wireless
- Battery not charging
- Ghost cursor/pointer drift
- No power
- Num lock indicator lights
- No wireless connectivity
- No Bluetooth connectivity
- Cannot display to external monitor
- Touchscreen non-responsive
- Apps not loading
- Slow performance
- Unable to decrypt email
- Extremely short battery life
- Overheating
- Frozen system
- No sound from speakers
- GPS not functioning
- Swollen battery
• Disassembling processes for proper reassembly
- Document and label cable and screw locations
- Organize parts
- Refer to manufacturer resources
- Use appropriate hand tools
Given a scenario, troubleshoot printers.
• Common symptoms
- Streaks
- Faded prints
- Ghost images
- Toner not fused to the paper
- Creased paper
- Paper not feeding
- Paper jam
- No connectivity
- Garbled characters on paper
- Vertical lines on page
- Backed-up print queue
- Low memory errors
- Access denied
- Printer will not print
- Color prints in wrong print color
- Unable to install printer
- Error codes
- Printing blank pages
- No image on printer display
- Multiple failed jobs in logs
Given a scenario, troubleshoot common wired and wireless network problems.
• Common symptoms
- Limited connectivity
- Unavailable resources
- Internet
- Local resources
- Shares
- Printers
- Email
- No connectivity
- APIPA/link local address
- Intermittent connectivity
- IP conflict
- Slow transfer speeds
- Low RF signal
- SSID not found
CompTIA A+ Acronyms
The following is a list of acronyms that appear on the CompTIA A+ exams. Candidates are encouraged to review the complete list and attain a working knowledge of all listed acronyms as a part of a comprehensive exam preparation program.
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
AC Alternating Current CGA Computer Graphics and Applications
ACL Access Control List CIDR Classless Inter-Domain Routing
ACPI Advanced Configuration Power Interface CIFS Common Internet File System
ADF Automatic Document Feeder CMOS Complementary Metal-Oxide Semiconductor
ADSL Asymmetrical Digital Subscriber Line CNR Communications and Networking Riser
AES Advanced Encryption Standard COMx Communication port (x=port number)
AHCI Advanced Host Controller Interface CPU Central Processing Unit
AP Access Point CRT Cathode-Ray Tube
APIPA Automatic Private Internet Protocol Addressing DaaS Data as a Service
APM Advanced Power Management DAC Discretionary Access Control
ARP Address Resolution Protocol DB-25 Serial Communications D-Shell Connector, 25 pins
ASR Automated System Recovery DB-9 Serial Communications D-Shell Connector, 9 pins
ATA Advanced Technology Attachment DBaaS Database as a Service
ATAPI Advanced Technology DC Direct Current
Attachment Packet Interface DDoS Distributed Denial of Service
ATM Asynchronous Transfer Mode DDR Double Data Rate
ATX Advanced Technology Extended DDR RAM Double Data Rate Random Access Memory
AUP Acceptable Use Policy DFS Distributed File System
A/V Audio Video DHCP Dynamic Host Configuration Protocol
BD-R Blu-ray Disc Recordable DIMM Dual Inline Memory Module
BIOS Basic Input/Output System DIN Deutsche Industrie Norm
BD-RE Blu-ray Disc Rewritable DLT Digital Linear Tape
BNC Bayonet-Neill-Concelman DLP Digital Light Processing or Data Loss Prevention
BSOD Blue Screen of Death DMA Direct Memory Access
BYOD Bring Your Own Device DMZ Demilitarized Zone
CAD Computer-Aided Design DNS Domain Name Service or Domain Name Server
CAPTCHA Completely Automated Public Turing test to DoS Denial of Service
tell Computers and Humans Apart DRAM Dynamic Random Access Memory
CD Compact Disc DRM Digital Rights Management
CD-ROM Compact Disc-Read-Only Memory DSL Digital Subscriber Line
CD-RW Compact Disc-Rewritable DVD Digital Versatile Disc
CDFS Compact Disc File System DVD-RAM Digital Versatile Disc-Random Access Memory
CERT Computer Emergency Response Team DVD-ROM Digital Versatile Disc-Read Only Memory
CFS Central File System, Common File System, or DVD-R Digital Versatile Disc-Recordable
Command File System DVD-RW Digital Versatile Disc-Rewritable
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
DVI Digital Visual Interface HTTP Hypertext Transfer Protocol
DVI-D Digital Visual Interface--Digital HTTPS Hypertext Transfer Protocol Secure
ECC Error Correcting Code I/O Input/Output
ECP Extended Capabilities Port IaaS Infrastructure as a Service
EEPROM Electrically Erasable Programmable ICMP Internet Control Message Protocol
Read-Only Memory ICR Intelligent Character Recognition
EFS Encrypting File System IDE Integrated Drive Electronics
EIDE Enhanced Integrated Drive Electronics IDS Intrusion Detection System
EMI Electromagnetic Interference IEEE Institute of Electrical and Electronics Engineers
EMP Electromagnetic Pulse IIS Internet Information Services
EPROM Erasable Programmable Read-Only Memory IMAP Internet Mail Access Protocol
EPP Enhanced Parallel Port IMEI International Mobile Equipment Identity
ERD Emergency Repair Disk IMSI International Mobile Subscriber Identity
eSATA External Serial Advanced Technology Attachment IP Internet Protocol
ESD Electrostatic Discharge IPConfig Internet Protocol Configuration
EULA End User License Agreement IPP Internet Printing Protocol
EVGA Extended Video Graphics Adapter/Array IPS Intrusion Prevention System
Ext2 Second Extended File System IPSec Internet Protocol Security
exFAT Extended File Allocation Table IR Infrared
FAT File Allocation Table IrDA Infrared Data Association
FAT12 12-bit File Allocation Table IRP Incident Response Plan
FAT16 16-bit File Allocation Table IRQ Interrupt Request
FAT32 32-bit File Allocation Table ISA Industry Standard Architecture
FDD Floppy Disk Drive ISDN Integrated Services Digital Network
FPM Fast Page Mode ISO International Organization for Standardization
FSB Front-Side Bus ISP Internet Service Provider
FTP File Transfer Protocol JBOD Just a Bunch of Disks
FQDN Fully Qualified Domain Name KB Knowledge Base
GDDR Graphics Double Data Rate KVM Kernel-based Virtual Machine
GDI Graphics Device Interface KVM Keyboard-Video-Mouse
GUI Graphical User Interface LAN Local Area Network
GUID Globally Unique Identifier LBA Logical Block Addressing
GPS Global Positioning System LC Lucent Connector
GPT GUID Partition Table LCD Liquid Crystal Display
GPU Graphics Processing Unit LDAP Lightweight Directory Access Protocol
GSM Global System for Mobile Communications LED Light Emitting Diode
HAL Hardware Abstraction Layer LPD/LPR Line Printer Daemon/Line Printer Remote
HAV Hardware Assisted Virtualization LPT Line Printer Terminal
HCL Hardware Compatibility List LVD Low Voltage Differential
HDCP High-Bandwidth Digital Content Protection MAC Media Access Control/Mandatory Access Control
HDD Hard Disk Drive MAN Metropolitan Area Network
HDMI High Definition Media Interface MAPI Messaging Application Programming Interface
HIPS Host Intrusion Prevention System mATX Micro Advanced Technology Extended
HPFS High Performance File System MAU Media Access Unit/Media Attachment Unit
HTML Hypertext Markup Language MBR Master Boot Record
HTPC Home Theater PC MBSA Microsoft Baseline Security Analyzer
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
MDM Mobile Device Management PCIe Peripheral Component Interconnect Express
MFA Multifactor Authentication PCIX Peripheral Component Interconnect Extended
MFD Multifunction Device PCL Printer Control Language
MFP Multifunction Product PCMCIA Personal Computer Memory
MicroDIMM Micro Dual Inline Memory Module Card International Association
MIDI Musical Instrument Digital Interface PE Preinstallation Environment
MIME Multipurpose Internet Mail Extension PGA Pin Grid Array
MIMO Multiple Input Multiple Output PGA2 Pin Grid Array 2
MMC Microsoft Management Console PGP Pretty Good Protection
MP3 Moving Picture Experts Group Layer 3 Audio PII Personally Identifiable Information
MP4 Moving Picture Experts Group Layer 4 PIN Personal Identification Number
MPEG Moving Picture Experts Group PHI Personal Health Information
MSConfig Microsoft Configuration PKI Public Key Infrastructure
MSDS Material Safety Data Sheet PnP Plug and Play
MT-RJ Mechanical Transfer Registered Jack PoE Power over Ethernet
MUI Multilingual User Interface POP3 Post Office Protocol 3
NaaS Network as a Service PoS Point of Sale
NAC Network Access Control POST Power-On Self-Test
NAS Network-Attached Storage POTS Plain Old Telephone Service
NAT Network Address Translation PPM Pages Per Minute
NetBIOS Networked Basic Input/Output System PPP Point-to-Point Protocol
NetBEUI Networked Basic Input/Output PPTP Point-to-Point Tunneling Protocol
System Extended User Interface PRI Primary Rate Interface
NFC Near Field Communication PROM Programmable Read-Only Memory
NFS Network File System PS/2 Personal System/2 connector
NIC Network Interface Card PSTN Public Switched Telephone Network
NiCd Nickel Cadmium PSU Power Supply Unit
NiMH Nickel Metal Hydride PVA Patterned Vertical Alignment
NLX New Low-profile Extended PVC Permanent Virtual Circuit
NNTP Network News Transfer Protocol PXE Preboot Execution Environment
NTFS New Technology File System QoS Quality of Service
NTLDR New Technology Loader RADIUS Remote Authentication Dial-In User Server
NTP Network Time Protocol RAID Redundant Array of
NTSC National Transmission Standards Committee Independent (or Inexpensive) Disks
NVMe Non-volatile Memory Express RAM Random Access Memory
OCR Optical Character Recognition RAS Remote Access Service
OEM Original Equipment Manufacturer RDP Remote Desktop Protocol
OLED Organic Light Emitting Diode RF Radio Frequency
OS Operating System RFI Radio Frequency Interference
PaaS Platform as a Service RFID Radio Frequency Identification
PAL Phase Alternating Line RGB Red Green Blue
PAN Personal Area Network RIP Routing Information Protocol
PAT Port Address Translation RIS Remote Installation Service
PC Personal Computer RISC Reduced Instruction Set Computer
PCI Peripheral Component Interconnect RJ-11 Registered Jack Function 11
PCI Payment Card Industry RJ-45 Registered Jack Function 45
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
RMA Returned Materials Authorization TKIP Temporal Key Integrity Protocol
ROM Read-Only Memory TLS Transport Layer Security
RPO Recovery Point Objective TN Twisted Nematic
RTC Real-Time Clock TPM Trusted Platform Module
RT Recovery Time Objective UAC User Account Control
Saas Software as a Service UDF User Defined Functions or Universal
SAN Storage Area Network Disk Format or Universal Data Format
SAS Serial Attached SCSI UDP User Datagram Protocol
SATA Serial Advanced Technology Attachment UEFI Unified Extensible Firmware Interface
SC Subscription Channel UNC Universal Naming Convention
SCP Secure Copy Protection UPnP Universal Plug and Play
SCSI Small Computer System Interface UPS Uninterruptible Power Supply
SCSI ID Small Computer System Interface Identifier URL Uniform Resource Locator
SD card Secure Digital Card USB Universal Serial Bus
SEC Single Edge Connector USMT User State Migration Tool
SFC System File Checker UTM Unified Threat Management
SFF Small Form Factor UTP Unshielded Twisted Pair
SFTP Secure File Transfer Protocol UXGA Ultra Extended Graphics Array
SIM Subscriber Identity Module VA Vertical Alignment
SIMM Single In-Line Memory Module VDC Volts DC
SLI Scalable Link Interface or System Level VDI Virtual Desktop Infrastructure
Integration or Scanline Interleave Mode VESA Video Electronics Standards Association
S.M.A.R.T. Self-Monitoring, Analysis, VFAT Virtual File Allocation Table
and Reporting Technology VGA Video Graphics Array
SMB Server Message Block VLAN Virtual LAN
SMTP Simple Mail Transfer Protocol VM Virtual Machine
SNMP Simple Network Management Protocol VNC Virtual Network Computer
SoDIMM Small Outline Dual Inline Memory Module VoIP Voice over Internet Protocol
SOHO Small Office/Home Office VPN Virtual Private Network
SP Service Pack VRAM Video Random Access Memory
SPDIF Sony-Philips Digital Interface Format WAN Wide Area Network
SPGA Staggered Pin Grid Array WAP Wireless Access Protocol/Wireless Access Point
SRAM Static Random Access Memory WEP Wired Equivalent Privacy
SSD Solid State Drive WIFI Wireless Fidelity
SSH Secure Shell WINS Windows Internet Name Service
SSID Service Set Identifier WLAN Wireless Local Area Network
SSL Secure Sockets Layer WMN Wireless Mesh Network
SSO Single Sign-on WPA Wireless Protected Access
ST Straight Tip WPA2 WiFi Protected Access 2
STP Shielded Twisted Pair WPS WiFi Protected Setup
SXGA Super Extended Graphics Array WUXGA Wide Ultra Extended Graphics Array
TACACS Terminal Access Controller Access-Control System WWAN Wireless Wide Area Network
TCP Transmission Control Protocol XGA Extended Graphics Array
TCP/IP Transmission Control Protocol/Internet Protocol ZIF Zero-Insertion-Force
TDR Time Domain Reflectometer ZIP Zigzag Inline Package
TFTP Trivial File Transfer Protocol
A+ Proposed Hardware and Software List
CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the A+ exam. This list may also be helpful for training companies that wish to create a lab component for their training offering. The bulleted lists below each topic are sample lists and not exhaustive.
EQUIPMENT
• Apple tablet/smartphone
• Android tablet/smartphone
• Windows tablet/Smartphone
• Chromebook
• Windows laptop/Mac laptop/Linux laptop
• Windows desktop/Mac desktop/Linux desktop
• Windows Server w/Active Directory and Print Management
• Monitors
• Projectors
• SOHO router/switch
• Access point
• VoIP phone
• Printer
- Laser/inkjet
- Wireless
- 3D printer
• Surge suppressor
• UPS
• VR headset
• Smart devices (IoT devices)
SPARE PARTS/HARDWARE
• Motherboards
• RAM
• Hard drives
• Power supplies
• Video cards
• Sounds cards
• Network cards
• Wireless NICs
• Fans/cooling devices/heat sink
• CPUs
• Assorted connectors/cables
- USB
- HDMI
- Etc.
• Adapters
• Network cables
• Unterminated network cables/connectors
• AC adapters
• Optical drives
• Screws/stand-offs
• Cases
• Maintenance kit
• Mice/keyboards
• KVM
• Console cable
TOOLS
• Screw drivers
• Multimeter
• Wire cutters
• Punchdown tool
• Crimper
• Power supply tester
• Cable stripper
• Standard technician toolkit
• ESD strap
• Thermal paste
• Cable tester
• Cable toner
• WiFi analyzer
• SATA to USB connectors
SOFTWARE
• Operating systems
- Linux
- Chrome OS
- Microsoft Windows
- Mac OS
- Android
- iOS
• PE Disk/Live CD
• Antivirus software
• Virtualization software
• Anti-malware
• Driver software
© 2018 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduc- tion or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 04992A-Apr2018
CompTIA A+ Certification Exam: Core 2 Objectives
EXAM NUMBER: CORE 2 (220-1002)
About the Exam
Candidates are encouraged to use this document to help prepare for CompTIA A+ Core 2. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220- 1001) and Core 2 (220-1002). CompTIA A+ Core 2 measures the necessary skills for an entry- level IT professional. Successful candidates will have the knowledge required to:
• Assemble components based on customer requirements
• Install, configure, and maintain PCs, mobile devices, and software for end users
• Understand the basics of networking and security forensics
• Properly and safely diagnose, resolve, and document common hardware and software issues
• Apply troubleshooting skills
• Provide appropriate customer support
• Understand the basics of scripting, virtualization, desktop imaging, and deployment
These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.
EXAM ACCREDITATION
CompTIA A+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives.
EXAM DEVELOPMENT
CompTIA exams result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT professional.
CompTIA AUTHORIZED MATERIALS USE POLICY
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone utilizing any content provided by unauthorized third-party training sites (aka “brain dumps”). Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs
all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement. If a candidate has a question as to whether study materials are considered unauthorized (aka “brain dumps”), he/she should contact CompTIA at examsecurity@comptia.org to confirm.
PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of technologies, processes, or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current and the security of the questions is protected. When necessary, we will publish updated exams based on testing exam objectives. Please know that all related exam preparation materials will still be valid.
TEST DETAILS
Required exam Core 2
Number of questions Maximum of 90
Types of questions Multiple choice and performance-based Length of test 90 minutes
Recommended experience 12 months of experience as an IT support specialist Passing score 700 (on a scale of 100–900)
EXAM OBJECTIVES (DOMAINS)
The table below lists the domains measured by this examination and the extent to which they are represented:
1.0 Operating Systems 27%
2.0 Security 24%
3.0 Software Troubleshooting 26%
4.0 Operational Procedures 23%
Total 100%
1.0 Operating Systems
Compare and contrast common operating system types and their purposes.
• 32-bit vs. 64-bit
- RAM limitations
- Software compatibility
• Workstation operating systems
- Microsoft Windows
- Apple Macintosh OS
- Linux
• Cell phone/tablet operating systems
- Microsoft Windows
- Android
- iOS
- Chrome OS
• Vendor-specific limitations
- End-of-life
- Update limitations
• Compatibility concerns between operating systems
Compare and contrast features of Microsoft Windows versions.
• Windows 7
• Windows 8
• Windows 8.1
• Windows 10
• Corporate vs. personal needs
- Domain access
- BitLocker
- Media center
- BranchCache
- EFS
• Desktop styles/user interface
Summarize general OS installation considerations and upgrade methods.
• Boot methods
- Optical disc(CD-ROM, DVD, Blu-ray)
- External drive/flash drive (USB/eSATA)
- Network boot (PXE)
- Internal fixed disk (HDD/SSD)
- Internal hard drive (partition)
• Type of installations
- Unattended installation
- In-place upgrade
- Clean install
- Repair installation
- Multiboot
- Remote network installation
- Image deployment
- Recovery partition
- Refresh/restore
• Partitioning
- Dynamic
- Basic
- Primary
- Extended
- Logical
- GPT
• File system types/formatting
- ExFAT
- FAT32
- NTFS
- CDFS
- NFS
- ext3, ext4
- HFS
- Swap partition
- Quick format vs. full format
• Load alternate third-party drivers when necessary
• Workgroup vs. Domain setup
• Time/date/region/language settings
• Driver installation, software, and Windows updates
• Factory recovery partition
• Properly formatted boot drive with the correct partitions/format
• Prerequisites/hardware compatibility
• Application compatibility
• OS compatibility/upgrade path
1.0 Operating Systems
Given a scenario, use appropriate Microsoft command line tools.
• Navigation
- dir
- cd
- ..
• ipconfig
• ping
• tracert
• netstat
• nslookup
• shutdown
• dism
• sfc
• chkdsk
• diskpart
• taskkill
• gpupdate
• gpresult
• format
• copy
• xcopy
• robocopy
• net use
• net user
• [command name] /?
• Commands available with standard privileges vs. administrative privileges
Given a scenario, use Microsoft operating system features and tools.
• Administrative
- Computer Management
- Device Manager
- Local Users and Groups
- Local Security Policy
- Performance Monitor
- Services
- System Configuration
- Task Scheduler
- Component Services
- Data Sources
- Print Management
- Windows Memory Diagnostics
- Windows Firewall
- Advanced Security
- Event Viewer
- User Account Management
• MSConfig
- General
- Boot
- Services
- Startup
- Tools
• Task Manager
- Applications
- Processes
- Performance
- Networking
- Users
• Disk Management
- Drive status
- Mounting
- Initializing
- Extending partitions
- Splitting partitions
- Shrink partitions
- Assigning/changing drive letters
- Adding drives
- Adding arrays
- Storage spaces
• System utilities
- Regedit
- Command
- Services.msc
- MMC
- MSTSC
- Notepad
- Explorer
- Msinfo32
- DxDiag
- Disk Defragmenter
- System Restore
- Windows Update
Given a scenario, use Microsoft Windows Control Panel utilities.
• Internet Options
- Connections
- Security
- General
- Privacy
- Programs
- Advanced
• Display/Display Settings
- Resolution
- Color depth
- Refresh rate
• User Accounts
• Folder Options
- View hidden files
- Hide extensions
- General options
- View options
• System
- Performance (virtual memory)
- Remote settings
- System protection
• Windows Firewall
• Power Options
- Hibernate
- Power plans
- Sleep/suspend
- Standby
• Credential Manager
• Programs and features
• HomeGroup
• Devices and Printers
• Sound
• Troubleshooting
• Network and Sharing Center
• Device Manager
• BitLocker
• Sync Center
1.0 Operating Systems
Summarize application installation and configuration concepts.
• System requirements
- Drive space
- RAM
• OS requirements
- Compatibility
• Methods of installation and deployment
- Local (CD/USB)
- Network-based
• Local user permissions
- Folder/file access for installation
• Security considerations
- Impact to device
- Impact to network
Given a scenario, configure Microsoft Windows networking on a client/desktop.
• HomeGroup vs. Workgroup
• Domain setup
• Network shares/administrative shares/mapping drives
• Printer sharing vs. network printer mapping
• Establish networking connections
- VPN
- Dial-ups
- Wireless
- Wired
- WWAN (Cellular)
• Proxy settings
• Remote Desktop Connection
• Remote Assistance
• Home vs. Work vs. Public network settings
• Firewall settings
- Exceptions
- Configuration
- Enabling/disabling Windows Firewall
• Configuring an alternative IP address in Windows
- IP addressing
- Subnet mask
- DNS
- Gateway
• Network card properties
- Half duplex/full duplex/auto
- Speed
- Wake-on-LAN
- QoS
- BIOS (on-board NIC)
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
• Best practices
- Scheduled backups
- Scheduled disk maintenance
- System updates/App Store
- Patch management
- Driver/firmware updates
- Antivirus/Anti-malware updates
• Tools
- Backup/Time Machine
- Restore/Snapshot
- Image recovery
- Disk maintenance utilities
- Shell/Terminal
- Screen sharing
- Force Quit
• Features
- Multiple desktops/Mission Control
- Key Chain
- Spot Light
- iCloud
- Gestures
- Finder
- Remote Disc
- Dock
- Boot Camp
• Basic Linux commands
- ls
- grep
- cd
- shutdown
- pwd vs. passwd
- mv
- cp
- rm
- chmod
- chown
- iwconfig/ifconfig
- ps
- su/sudo
- apt-get
- vi
- dd
- kill
Summarize the importance of physical security measures.
• Mantrap
• Badge reader
• Smart card
• Security guard
• Door lock
• Biometric locks
• Hardware tokens
• Cable locks
• Server locks
• USB locks
• Privacy screen
• Key fobs
• Entry control roster
Explain logical security concepts.
• Active Directory
- Login script
- Domain
- Group Policy/Updates
- Organizational Units
- Home Folder
- Folder redirection
• Software tokens
• MDM policies
• Port security
• MAC address filtering
• Certificates
• Antivirus/Anti-malware
• Firewalls
• User authentication/strong passwords
• Multifactor authentication
• Directory permissions
• VPN
• DLP
• Access control lists
• Smart card
• Email filtering
• Trusted/untrusted software sources
• Principle of least privilege
Compare and contrast wireless security protocols and authentication methods.
• Protocols and encryption
- WEP
- WPA
- WPA2
- TKIP
- AES
• Authentication
- Single-factor
- Multifactor
- RADIUS
- TACACS
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
• Malware
- Ransomware
- Trojan
- Keylogger
- Rootkit
- Virus
- Botnet
- Worm
- Spyware
• Tools and methods
- Antivirus
- Anti-malware
- Recovery console
- Backup/restore
- End user education
- Software firewalls
- DNS configuration
2.0 Security
Compare and contrast social engineering, threats, and vulnerabilities.
• Social engineering
- Phishing
- Spear phishing
- Impersonation
- Shoulder surfing
- Tailgating
- Dumpster diving
• DDoS
• DoS
• Zero-day
• Man-in-the-middle
• Brute force
• Dictionary
• Rainbow table
• Spoofing
• Non-compliant systems
• Zombie
Compare and contrast the differences of basic Microsoft Windows OS security settings.
• User and groups
- Administrator
- Power user
- Guest
- Standard user
• NTFS vs. share permissions
- Allow vs. deny
- Moving vs. copying folders and files
- File attributes
• Shared files and folders
- Administrative shares vs. local shares
- Permission propagation
- Inheritance
• System files and folders
• User authentication
- Single sign-on
• Run as administrator vs. standard user
• BitLocker
• BitLocker To Go
• EFS
Given a scenario, implement security best practices to secure a workstation.
• Password best practices
- Setting strong passwords
- Password expiration
- Screensaver required password
- BIOS/UEFI passwords
- Requiring passwords
• Account management
- Restricting user permissions
- Logon time restrictions
- Disabling guest account
- Failed attempts lockout
- Timeout/screen lock
- Change default admin user account/password
- Basic Active Directory functions
- Account creation
- Account deletion
- Password reset/unlock account
- Disable account
• Disable autorun
• Data encryption
• Patch/update management
2.0 Security
Given a scenario, implement methods for securing mobile devices.
• Screen locks
- Fingerprint lock
- Face lock
- Swipe lock
- Passcode lock
• Remote wipes
• Locator applications
• Remote backup applications
• Failed login attempts restrictions
• Antivirus/Anti-malware
• Patching/OS updates
• Biometric authentication
• Full device encryption
• Multifactor authentication
• Authenticator applications
• Trusted sources vs. untrusted sources
• Firewalls
• Policies and procedures
- BYOD vs. corporate-owned
- Profile security requirements
Given a scenario, implement appropriate data destruction and disposal methods.
• Physical destruction
- Shredder
- Drill/hammer
- Electromagnetic (Degaussing)
- Incineration
- Certificate of destruction
• Recycling or repurposing best practices
- Low-level format vs. standard format
- Overwrite
- Drive wipe
Given a scenario, configure security on SOHO wireless and wired networks.
• Wireless-specific
- Changing default SSID
- Setting encryption
- Disabling SSID broadcast
- Antenna and access point placement
- Radio power levels
- WPS
• Change default usernames and passwords
• Enable MAC filtering
• Assign static IP addresses
• Firewall settings
• Port forwarding/mapping
• Disabling ports
• Content filtering/parental controls
• Update firmware
• Physical security
3.0 Software Troubleshooting
Given a scenario, troubleshoot Microsoft Windows OS problems.
• Common symptoms
- Slow performance
- Limited connectivity
- Failure to boot
- No OS found
- Application crashes
- Blue screens
- Black screens
- Printing issues
- Services fail to start
- Slow bootup
- Slow profile load
• Common solutions
- Defragment the hard drive
- Reboot
- Kill tasks
- Restart services
- Update network settings
- Reimage/reload OS
- Roll back updates
- Roll back devices drivers
- Apply updates
- Repair application
- Update boot order
- Disable Windows services/applications
- Disable application startup
- Safe boot
- Rebuild Windows profiles
Given a scenario, troubleshoot and resolve PC security issues.
• Common symptoms
- Pop-ups
- Browser redirection
- Security alerts
- Slow performance
- Internet connectivity issues
- PC/OS lockup
- Application crash
- OS updates failures
- Rogue antivirus
- Spam
- Renamed system files
- Disappearing files
- File permission changes
- Hijacked email
- Responses from users regarding email
- Automated replies
from unknown sent email
- Access denied
- Invalid certificate (trusted root CA)
- System/application log errors
Given a scenario, use best practice procedures for malware removal.
1. Identify and research malware symptoms.
2. Quarantine the infected systems.
3. Disable System Restore (in Windows).
4. Remediate the infected systems.
a. Update the anti-malware software.
b. Scan and use removal techniques
(safe mode, pre-installation environment).
5. Schedule scans and run updates.
6. Enable System Restore and create a restore point (in Windows).
7. Educate the end user.
3.0 Software Troubleshooting
Given a scenario, troubleshoot mobile OS and application issues.
• Common symptoms
- Dim display
- Intermittent wireless
- No wireless connectivity
- No Bluetooth connectivity
- Cannot broadcast to external monitor
- Touchscreen non-responsive
- Apps not loading
- Slow performance
- Unable to decrypt email
- Extremely short battery life
- Overheating
- Frozen system
- No sound from speakers
- Inaccurate touch screen response
- System lockout
- App log errors
Given a scenario, troubleshoot mobile OS and application security issues.
• Common symptoms
- Signal drop/weak signal
- Power drain
- Slow data speeds
- Unintended WiFi connection
- Unintended Bluetooth pairing
- Leaked personal files/data
- Data transmission over limit
- Unauthorized account access
- Unauthorized location tracking
- Unauthorized camera/ microphone activation
- High resource utilization
4.0 Operational Procedures
Compare and contrast best practices associated with types of documentation.
• Network topology diagrams
• Knowledge base/articles
• Incident documentation
• Regulatory and compliance policy
• Acceptable use policy
• Password policy
• Inventory management
- Asset tags
- Barcodes
Given a scenario, implement basic change management best practices.
• Documented business processes
• Purpose of the change
• Scope the change
• Risk analysis
• Plan for change
• End-user acceptance
• Change board
- Approvals
• Backout plan
• Document changes
Given a scenario, implement basic disaster prevention and recovery methods.
• Backup and recovery
- Image level
- File level
- Critical applications
• Backup testing
• UPS
• Surge protector
• Cloud storage vs. local storage backups
• Account recovery options
Explain common safety procedures.
• Equipment grounding
• Proper component handling and storage
- Antistatic bags
- ESD straps
- ESD mats
- Self-grounding
• Toxic waste handling
- Batteries
- Toner
- CRT
- Cell phones
- Tablets
• Personal safety
- Disconnect power before repairing PC
- Remove jewelry
- Lifting techniques
- Weight limitations
- Electrical fire safety
- Cable management
- Safety goggles
- Air filter mask
• Compliance with government regulations
4.0 Operational Procedures
Explain environmental impacts and appropriate controls.
• MSDS documentation for handling and disposal
• Temperature, humidity level awareness, and proper ventilation
• Power surges, brownouts, and blackouts
- Battery backup
- Surge suppressor
• Protection from airborne particles
- Enclosures
- Air filters/mask
• Dust and debris
- Compressed air
- Vacuums
• Compliance to government regulations
Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.
• Incident response
- First response
- Identify
- Report through proper channels
- Data/device preservation
- Use of documentation/ documentation changes
- Chain of custody
- Tracking of evidence/ documenting process
• Licensing/DRM/EULA
- Open-source vs. commercial license
- Personal license vs. enterprise licenses
• Regulated data
- PII
- PCI
- GDPR
- PHI
• Follow all policies and security best practices
Given a scenario, use proper communication techniques and professionalism.
• Use proper language and avoid jargon, acronyms, and slang, when applicable
• Maintain a positive attitude/ project confidence
• Actively listen (taking notes) and avoid interrupting the customer
• Be culturally sensitive
- Use appropriate professional titles, when applicable
• Be on time (if late, contact the customer)
• Avoid distractions
- Personal calls
- Texting/social media sites
- Talking to coworkers while interacting with customers
- Personal interruptions
• Dealing with difficult customers or situations
- Do not argue with customers and/or be defensive
- Avoid dismissing customer problems
- Avoid being judgmental
- Clarify customer statements (ask open-ended questions to narrow the
scope of the problem, restate the issue, or question to verify understanding)
- Do not disclose experiences via social media outlets
• Set and meet expectations/timeline and communicate status with the customer
- Offer different repair/ replacement options, if applicable
- Provide proper documentation on the services provided
- Follow up with customer/user at a later date to verify satisfaction
• Deal appropriately with customers’ confidential and private materials
- Located on a computer, desktop, printer, etc.
4.0 Operational Procedures
Identify the basics of scripting.
• Script file types
- .bat
- .ps1
- .vbs
- .sh
- .py
- .js
• Environment variables
• Comment syntax
• Basic script constructs
- Basic loops
- Variables
• Basic data types
- Integers
- Strings
Given a scenario, use remote access technologies.
• RDP
• Telnet
• SSH
• Third-party tools
- Screen share feature
- File share
• Security considerations of each access method
CompTIA A+ Acronyms
The following is a list of acronyms that appear on the CompTIA A+ exams. Candidates are encouraged to review the complete list and attain a working knowledge of all listed acronyms as a part of a comprehensive exam preparation program.
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
AC Alternating Current CGA Computer Graphics and Applications
ACL Access Control List CIDR Classless Inter-Domain Routing
ACPI Advanced Configuration Power Interface CIFS Common Internet File System
ADF Automatic Document Feeder CMOS Complementary Metal-Oxide Semiconductor
ADSL Asymmetrical Digital Subscriber Line CNR Communications and Networking Riser
AES Advanced Encryption Standard COMx Communication port (x=port number)
AHCI Advanced Host Controller Interface CPU Central Processing Unit
AP Access Point CRT Cathode-Ray Tube
APIPA Automatic Private Internet Protocol Addressing DaaS Data as a Service
APM Advanced Power Management DAC Discretionary Access Control
ARP Address Resolution Protocol DB-25 Serial Communications D-Shell Connector, 25 pins
ASR Automated System Recovery DB-9 Serial Communications D-Shell Connector, 9 pins
ATA Advanced Technology Attachment DBaas Database as a Service
ATAPI Advanced Technology Attachment DC Direct Current
Packet Interface DDoS Distributed Denial of Service
ATM Asynchronous Transfer Mode DDR Double Data Rate
ATX Advanced Technology Extended DDR RAM Double Data Rate Random Access Memory
AUP Acceptable Use Policy DFS Distributed File System
A/V Audio Video DHCP Dynamic Host Configuration Protocol
BD-R Blu-ray Disc Recordable DIMM Dual Inline Memory Module
BIOS Basic Input/Output System DIN Deutsche Industrie Norm
BD-RE Blu-ray Disc Rewritable DLT Digital Linear Tape
BNC Bayonet-Neill-Concelman DLP Digital Light Processing or Data Loss Prevention
BSOD Blue Screen of Death DMA Direct Memory Access
BYOD Bring Your Own Device DMZ Demilitarized Zone
CAD Computer-Aided Design DNS Domain Name Service or Domain Name Server
CAPTCHA Completely Automated Public Turing test DoS Denial of Service
to tell Computers and Humans Apart DRAM Dynamic Random Access Memory
CD Compact Disc DRM Digital Rights Management
CD-ROM Compact Disc-Read-Only Memory DSL Digital Subscriber Line
CD-RW Compact Disc-Rewritable DVD Digital Versatile Disc
CDFS Compact Disc File System DVD-RAM Digital Versatile Disc-Random Access Memory
CERT Computer Emergency Response Team DVD-ROM Digital Versatile Disc-Read Only Memory
CFS Central File System, Common File System, DVD-R Digital Versatile Disc-Recordable
or Command File System DVD-RW Digital Versatile Disc-Rewritable
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
DVI Digital Visual Interface HTTP Hypertext Transfer Protocol
DVI-D Digital Visual Interface-Digital HTTPS Hypertext Transfer Protocol Secure
ECC Error Correcting Code I/O Input/Output
ECP Extended Capabilities Port IaaS Infrastructure as a Service
EEPROM Electrically Erasable Programmable ICMP Internet Control Message Protocol
Read-Only Memory ICR Intelligent Character Recognition
EFS Encrypting File System IDE Integrated Drive Electronics
EIDE Enhanced Integrated Drive Electronics IDS Intrusion Detection System
EMI Electromagnetic Interference IEEE Institute of Electrical and Electronics Engineers
EMP Electromagnetic Pulse IIS Internet Information Services
EPROM Erasable Programmable Read-Only Memory IMAP Internet Mail Access Protocol
EPP Enhanced Parallel Port IMEI International Mobile Equipment Identity
ERD Emergency Repair Disk IMSI International Mobile Subscriber Identity
eSATA External Serial Advanced Technology Attachment IP Internet Protocol
ESD Electrostatic Discharge IPConfig Internet Protocol Configuration
EULA End User License Agreement IPP Internet Printing Protocol
EVGA Extended Video Graphics Adapter/Array IPS Intrusion Prevention System
Ext2 Second Extended File System IPSec Internet Protocol Security
exFAT Extended File Allocation Table IR Infrared
FAT File Allocation Table IrDA Infrared Data Association
FAT12 12-bit File Allocation Table IRP Incident Response Plan
FAT16 16-bit File Allocation Table IRQ Interrupt Request
FAT32 32-bit File Allocation Table ISA Industry Standard Architecture
FDD Floppy Disk Drive ISDN Integrated Services Digital Network
FPM Fast Page Mode ISO International Organization for Standardization
FSB Front-Side Bus ISP Internet Service Provider
FTP File Transfer Protocol JBOD Just a Bunch of Disks
FQDN Fully Qualified Domain Name KB Knowledge Base
GDDR Graphics Double Data Rate KVM Kernel-based Virtual Machine
GDI Graphics Device Interface KVM Keyboard-Video-Mouse
GUI Graphical User Interface LAN Local Area Network
GUID Globally Unique Identifier LBA Logical Block Addressing
GPS Global Positioning System LC Lucent Connector
GPT GUID Partition Table LCD Liquid Crystal Display
GPU Graphics Processing Unit LDAP Lightweight Directory Access Protocol
GSM Global System for Mobile Communications LED Light Emitting Diode
HAL Hardware Abstraction Layer LPD/LPR Line Printer Daemon/Line Printer Remote
HAV Hardware Assisted Virtualization LPT Line Printer Terminal
HCL Hardware Compatibility List LVD Low Voltage Differential
HDCP High-Bandwidth Digital Content Protection MAC Media Access Control/Mandatory Access Control
HDD Hard Disk Drive MAN Metropolitan Area Network
HDMI High Definition Media Interface MAPI Messaging Application Programming Interface
HIPS Host Intrusion Prevention System mATX Micro Advanced Technology Extended
HPFS High Performance File System MAU Media Access Unit/Media Attachment Unit
HTML Hypertext Markup Language MBR Master Boot Record
HTPC Home Theater PC MBSA Microsoft Baseline Security Analyzer
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
MDM Mobile Device Management PCIe Peripheral Component Interconnect Express
MFA Multifactor Authentication PCIX Peripheral Component Interconnect Extended
MFD Multifunction Device PCL Printer Control Language
MFP Multifunction Product PCMCIA Personal Computer Memory Card
MicroDIMM Micro Dual Inline Memory Module International Association
MIDI Musical Instrument Digital Interface PE Preinstallation Environment
MIME Multipurpose Internet Mail Extension PGA Pin Grid Array
MIMO Multiple Input Multiple Output PGA2 Pin Grid Array 2
MMC Microsoft Management Console PGP Pretty Good Protection
MP3 Moving Picture Experts Group Layer 3 Audio PII Personally Identifiable Information
MP4 Moving Picture Experts Group Layer 4 PIN Personal Identification Number
MPEG Moving Picture Experts Group PHI Personal Health Information
MSConfig Microsoft Configuration PKI Public Key Infrastructure
MSDS Material Safety Data Sheet PnP Plug and Play
MT-RJ Mechanical Transfer Registered Jack PoE Power over Ethernet
MUI Multilingual User Interface POP3 Post Office Protocol 3
NaaS Network as a Service PoS Point of Sale
NAC Network Access Control POST Power-On sSelf-tTest
NAS Network-Attached Storage POTS Plain Old Telephone Service
NAT Network Address Translation PPM Pages Per Minute
NetBIOS Networked Basic Input/Output System PPP Point-to-Point Protocol
NetBEUI Networked Basic Input/Output PPTP Point-to-Point Tunneling Protocol
System Extended User Interface PRI Primary Rate Interface
NFC Near Field Communication PROM Programmable Read-Only Memory
NFS Network File System PS/2 Personal System/2 connector
NIC Network Interface Card PSTN Public Switched Telephone Network
NiCd Nickel Cadmium PSU Power Supply Unit
NiMH Nickel Metal Hydride PVA Patterned Vertical Alignment
NLX New Low-profile Extended PVC Permanent Virtual Circuit
NNTP Network News Transfer Protocol PXE Preboot Execution Environment
NTFS New Technology File System QoS Quality of Service
NTLDR New Technology Loader RADIUS Remote Authentication Dial-In User Server
NTP Network Time Protocol RAID Redundant Array of Independent
NTSC National Transmission Standards Committee (or inexpensive) Discs
NVMe Non-volatile Memory Express RAM Random Access Memory
OCR Optical Character Recognition RAS Remote Access Service
OEM Original Equipment Manufacturer RDP Remote Desktop Protocol
OLED Organic Light Emitting Diode RF Radio Frequency
OS Operating System RFI Radio Frequency Interference
PaaS Platform as a Service RFID Radio Frequency Identification
PAL Phase Alternating Line RGB Red Green Blue
PAN Personal Area Network RIP Routing Information Protocol
PAT Port Address Translation RIS Remote Installation Service
PC Personal Computer RISC Reduced Instruction Set Computer
PCI Peripheral Component Interconnect RJ-11 Registered Jack Function 11
PCI Payment Card Industry RJ-45 Registered Jack Function 45
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
RMA Returned Materials Authorization TKIP Temporal Key Integrity Protocol
ROM Read-Only Memory TLS Transport Layer Security
RPO Recovery Point Objective TN Twisted Nematic
RTC Real-Time Clock TPM Trusted Platform Module
RTO Recovery Time Objective UAC User Account Control
SaaS Software as a Service UDF User Defined Functions or Universal Disk Format
SAN Storage Area Network or Universal Data Format
SAS Serial Attached SCSI UDP User Datagram Protocol
SATA Serial Advanced Technology Attachment UEFI Unified Extensible Firmware Interface
SC Subscription Channel UNC Universal Naming Convention
SCP Secure Copy Protection UPnP Universal Plug and Play
SCSI Small Computer System Interface UPS Uninterruptible Power Supply
SCSI ID Small Computer System Interface Identifier URL Uniform Resource Locator
SD card Secure Digital Card USB Universal Serial Bus
SEC Single Edge Connector USMT User State Migration Tool
SFC System File Checker UTM Unified Threat Management
SFF Small Form Factor UTP Unshielded Twisted Pair
SFTP Secure File Transfer Protocol UXGA Ultra Extended Graphics Array
SIM Subscriber Identity Module VA Vertical Alignment
SIMM Single In-Line Memory Module VDC Volts DC
SLI Scalable Link Interface or System Level VDI Virtual Desktop Infrastructure
Integration or Scanline Interleave Mode VESA Video Electronics Standards Association
S.M.A.R.T. Self-Monitoring, Analysis, and VFAT Virtual File Allocation Table
Reporting Technology VGA Video Graphics Array
SMB Server Message Block VLAN Virtual LAN
SMTP Simple Mail Transfer Protocol VM Virtual Machine
SNMP Simple Network Management Protocol VNC Virtual Network Computer
SoDIMM Small Outline Dual Inline Memory Module VoIP Voice over Internet Protocol
SOHO Small Office/Home Office VPN Virtual Private Network
SP Service Pack VRAM Video Random Access Memory
SPDIF Sony-Philips Digital Interface Format WAN Wide Area Network
SPGA Staggered Pin Grid Array WAP Wireless Access Protocol/Wireless Access Point
SRAM Static Random Access Memory WEP Wired Equivalent Privacy
SSD Solid State Drive WIFI Wireless Fidelity
SSH Secure Shell WINS Windows Internet Name Service
SSID Service Set Identifier WLAN Wireless Local Area Network
SSL Secure Sockets Layer WMN Wireless Mesh Network
SSO Single Sign-on WPA Wireless Protected Access
ST Straight Tip WPA2 WiFi Protected Access 2
STP Shielded Twisted Pair WPS WiFi Protected Setup
SXGA Super Extended Graphics Array WUXGA Wide Ultra Extended Graphics Array
TACACS Terminal Access Controller Access-Control System WWAN Wireless Wide Area Network
TCP Transmission Control Protocol XGA Extended Graphics Array
TCP/IP Transmission Control Protocol/Internet Protocol ZIF Zero-Insertion-Force
TDR Time Domain Reflectometer ZIP Zigzag Inline Package
TFTP Trivial File Transfer Protocol
A+ Proposed Hardware and Software List
CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the A+ exam. This list may also be helpful for training companies that wish to create a lab component for their training offering. The bulleted lists below each topic are sample lists and not exhaustive.
EQUIPMENT
• Apple tablet/smartphone
• Android tablet/smartphone
• Windows tablet/Smartphone
• Chromebook
• Windows laptop/Mac laptop/Linux laptop
• Windows desktop/Mac desktop/Linux desktop
• Windows Server w/Active Directory and Print Management
• Monitors
• Projectors
• SOHO router/switch
• Access point
• VoIP phone
• Printer
- Laser/inkjet
- Wireless
- 3D printer
• Surge suppressor
• UPS
• VR headset
• Smart devices (IoT devices)
SPARE PARTS/HARDWARE
• Motherboards
• RAM
• Hard drives
• Power supplies
• Video cards
• Sounds cards
• Network cards
• Wireless NICs
• Fans/cooling devices/heat sink
• CPUs
• Assorted connectors/cables
- USB
- HDMI
- Etc.
• Adapters
• Network cables
• Unterminated network cables/connectors
• AC adapters
• Optical drives
• Screws/stand-offs
• Cases
• Maintenance kit
• Mice/keyboards
• KVM
• Console cable
TOOLS
• Screw drivers
• Multimeter
• Wire cutters
• Punchdown tool
• Crimper
• Power supply tester
• Cable stripper
• Standard technician toolkit
• ESD strap
• Thermal paste
• Cable tester
• Cable toner
• WiFi analyzer
• SATA to USB connectors
SOFTWARE
• Operating systems
- Linux
- Chrome OS
- Microsoft Windows
- Mac OS
- Android
- iOS
• PE Disk/Live CD
• Antivirus software
• Virtualization software
• Anti-malware
• Driver software
© 2018 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduc- tion or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 04992B-Apr2018
CompTIA A+ Certification Exam: Core 2 Objectives
EXAM NUMBER: CORE 2 (220-1002)
About the Exam
Candidates are encouraged to use this document to help prepare for CompTIA A+ Core 2. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220- 1001) and Core 2 (220-1002). CompTIA A+ Core 2 measures the necessary skills for an entry- level IT professional. Successful candidates will have the knowledge required to:
• Assemble components based on customer requirements
• Install, configure, and maintain PCs, mobile devices, and software for end users
• Understand the basics of networking and security forensics
• Properly and safely diagnose, resolve, and document common hardware and software issues
• Apply troubleshooting skills
• Provide appropriate customer support
• Understand the basics of scripting, virtualization, desktop imaging, and deployment
These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.
EXAM ACCREDITATION
CompTIA A+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives.
EXAM DEVELOPMENT
CompTIA exams result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT professional.
CompTIA AUTHORIZED MATERIALS USE POLICY
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone utilizing any content provided by unauthorized third-party training sites (aka “brain dumps”). Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs
all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement. If a candidate has a question as to whether study materials are considered unauthorized (aka “brain dumps”), he/she should contact CompTIA at examsecurity@comptia.org to confirm.
PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of technologies, processes, or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current and the security of the questions is protected. When necessary, we will publish updated exams based on testing exam objectives. Please know that all related exam preparation materials will still be valid.
TEST DETAILS
Required exam Core 2
Number of questions Maximum of 90
Types of questions Multiple choice and performance-based Length of test 90 minutes
Recommended experience 12 months of experience as an IT support specialist Passing score 700 (on a scale of 100–900)
EXAM OBJECTIVES (DOMAINS)
The table below lists the domains measured by this examination and the extent to which they are represented:
1.0 Operating Systems 27%
2.0 Security 24%
3.0 Software Troubleshooting 26%
4.0 Operational Procedures 23%
Total 100%
1.0 Operating Systems
Compare and contrast common operating system types and their purposes.
• 32-bit vs. 64-bit
- RAM limitations
- Software compatibility
• Workstation operating systems
- Microsoft Windows
- Apple Macintosh OS
- Linux
• Cell phone/tablet operating systems
- Microsoft Windows
- Android
- iOS
- Chrome OS
• Vendor-specific limitations
- End-of-life
- Update limitations
• Compatibility concerns between operating systems
Compare and contrast features of Microsoft Windows versions.
• Windows 7
• Windows 8
• Windows 8.1
• Windows 10
• Corporate vs. personal needs
- Domain access
- BitLocker
- Media center
- BranchCache
- EFS
• Desktop styles/user interface
Summarize general OS installation considerations and upgrade methods.
• Boot methods
- Optical disc(CD-ROM, DVD, Blu-ray)
- External drive/flash drive (USB/eSATA)
- Network boot (PXE)
- Internal fixed disk (HDD/SSD)
- Internal hard drive (partition)
• Type of installations
- Unattended installation
- In-place upgrade
- Clean install
- Repair installation
- Multiboot
- Remote network installation
- Image deployment
- Recovery partition
- Refresh/restore
• Partitioning
- Dynamic
- Basic
- Primary
- Extended
- Logical
- GPT
• File system types/formatting
- ExFAT
- FAT32
- NTFS
- CDFS
- NFS
- ext3, ext4
- HFS
- Swap partition
- Quick format vs. full format
• Load alternate third-party drivers when necessary
• Workgroup vs. Domain setup
• Time/date/region/language settings
• Driver installation, software, and Windows updates
• Factory recovery partition
• Properly formatted boot drive with the correct partitions/format
• Prerequisites/hardware compatibility
• Application compatibility
• OS compatibility/upgrade path
1.0 Operating Systems
Given a scenario, use appropriate Microsoft command line tools.
• Navigation
- dir
- cd
- ..
• ipconfig
• ping
• tracert
• netstat
• nslookup
• shutdown
• dism
• sfc
• chkdsk
• diskpart
• taskkill
• gpupdate
• gpresult
• format
• copy
• xcopy
• robocopy
• net use
• net user
• [command name] /?
• Commands available with standard privileges vs. administrative privileges
Given a scenario, use Microsoft operating system features and tools.
• Administrative
- Computer Management
- Device Manager
- Local Users and Groups
- Local Security Policy
- Performance Monitor
- Services
- System Configuration
- Task Scheduler
- Component Services
- Data Sources
- Print Management
- Windows Memory Diagnostics
- Windows Firewall
- Advanced Security
- Event Viewer
- User Account Management
• MSConfig
- General
- Boot
- Services
- Startup
- Tools
• Task Manager
- Applications
- Processes
- Performance
- Networking
- Users
• Disk Management
- Drive status
- Mounting
- Initializing
- Extending partitions
- Splitting partitions
- Shrink partitions
- Assigning/changing drive letters
- Adding drives
- Adding arrays
- Storage spaces
• System utilities
- Regedit
- Command
- Services.msc
- MMC
- MSTSC
- Notepad
- Explorer
- Msinfo32
- DxDiag
- Disk Defragmenter
- System Restore
- Windows Update
Given a scenario, use Microsoft Windows Control Panel utilities.
• Internet Options
- Connections
- Security
- General
- Privacy
- Programs
- Advanced
• Display/Display Settings
- Resolution
- Color depth
- Refresh rate
• User Accounts
• Folder Options
- View hidden files
- Hide extensions
- General options
- View options
• System
- Performance (virtual memory)
- Remote settings
- System protection
• Windows Firewall
• Power Options
- Hibernate
- Power plans
- Sleep/suspend
- Standby
• Credential Manager
• Programs and features
• HomeGroup
• Devices and Printers
• Sound
• Troubleshooting
• Network and Sharing Center
• Device Manager
• BitLocker
• Sync Center
1.0 Operating Systems
Summarize application installation and configuration concepts.
• System requirements
- Drive space
- RAM
• OS requirements
- Compatibility
• Methods of installation and deployment
- Local (CD/USB)
- Network-based
• Local user permissions
- Folder/file access for installation
• Security considerations
- Impact to device
- Impact to network
Given a scenario, configure Microsoft Windows networking on a client/desktop.
• HomeGroup vs. Workgroup
• Domain setup
• Network shares/administrative shares/mapping drives
• Printer sharing vs. network printer mapping
• Establish networking connections
- VPN
- Dial-ups
- Wireless
- Wired
- WWAN (Cellular)
• Proxy settings
• Remote Desktop Connection
• Remote Assistance
• Home vs. Work vs. Public network settings
• Firewall settings
- Exceptions
- Configuration
- Enabling/disabling Windows Firewall
• Configuring an alternative IP address in Windows
- IP addressing
- Subnet mask
- DNS
- Gateway
• Network card properties
- Half duplex/full duplex/auto
- Speed
- Wake-on-LAN
- QoS
- BIOS (on-board NIC)
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
• Best practices
- Scheduled backups
- Scheduled disk maintenance
- System updates/App Store
- Patch management
- Driver/firmware updates
- Antivirus/Anti-malware updates
• Tools
- Backup/Time Machine
- Restore/Snapshot
- Image recovery
- Disk maintenance utilities
- Shell/Terminal
- Screen sharing
- Force Quit
• Features
- Multiple desktops/Mission Control
- Key Chain
- Spot Light
- iCloud
- Gestures
- Finder
- Remote Disc
- Dock
- Boot Camp
• Basic Linux commands
- ls
- grep
- cd
- shutdown
- pwd vs. passwd
- mv
- cp
- rm
- chmod
- chown
- iwconfig/ifconfig
- ps
- su/sudo
- apt-get
- vi
- dd
- kill
Summarize the importance of physical security measures.
• Mantrap
• Badge reader
• Smart card
• Security guard
• Door lock
• Biometric locks
• Hardware tokens
• Cable locks
• Server locks
• USB locks
• Privacy screen
• Key fobs
• Entry control roster
Explain logical security concepts.
• Active Directory
- Login script
- Domain
- Group Policy/Updates
- Organizational Units
- Home Folder
- Folder redirection
• Software tokens
• MDM policies
• Port security
• MAC address filtering
• Certificates
• Antivirus/Anti-malware
• Firewalls
• User authentication/strong passwords
• Multifactor authentication
• Directory permissions
• VPN
• DLP
• Access control lists
• Smart card
• Email filtering
• Trusted/untrusted software sources
• Principle of least privilege
Compare and contrast wireless security protocols and authentication methods.
• Protocols and encryption
- WEP
- WPA
- WPA2
- TKIP
- AES
• Authentication
- Single-factor
- Multifactor
- RADIUS
- TACACS
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
• Malware
- Ransomware
- Trojan
- Keylogger
- Rootkit
- Virus
- Botnet
- Worm
- Spyware
• Tools and methods
- Antivirus
- Anti-malware
- Recovery console
- Backup/restore
- End user education
- Software firewalls
- DNS configuration
2.0 Security
Compare and contrast social engineering, threats, and vulnerabilities.
• Social engineering
- Phishing
- Spear phishing
- Impersonation
- Shoulder surfing
- Tailgating
- Dumpster diving
• DDoS
• DoS
• Zero-day
• Man-in-the-middle
• Brute force
• Dictionary
• Rainbow table
• Spoofing
• Non-compliant systems
• Zombie
Compare and contrast the differences of basic Microsoft Windows OS security settings.
• User and groups
- Administrator
- Power user
- Guest
- Standard user
• NTFS vs. share permissions
- Allow vs. deny
- Moving vs. copying folders and files
- File attributes
• Shared files and folders
- Administrative shares vs. local shares
- Permission propagation
- Inheritance
• System files and folders
• User authentication
- Single sign-on
• Run as administrator vs. standard user
• BitLocker
• BitLocker To Go
• EFS
Given a scenario, implement security best practices to secure a workstation.
• Password best practices
- Setting strong passwords
- Password expiration
- Screensaver required password
- BIOS/UEFI passwords
- Requiring passwords
• Account management
- Restricting user permissions
- Logon time restrictions
- Disabling guest account
- Failed attempts lockout
- Timeout/screen lock
- Change default admin user account/password
- Basic Active Directory functions
- Account creation
- Account deletion
- Password reset/unlock account
- Disable account
• Disable autorun
• Data encryption
• Patch/update management
2.0 Security
Given a scenario, implement methods for securing mobile devices.
• Screen locks
- Fingerprint lock
- Face lock
- Swipe lock
- Passcode lock
• Remote wipes
• Locator applications
• Remote backup applications
• Failed login attempts restrictions
• Antivirus/Anti-malware
• Patching/OS updates
• Biometric authentication
• Full device encryption
• Multifactor authentication
• Authenticator applications
• Trusted sources vs. untrusted sources
• Firewalls
• Policies and procedures
- BYOD vs. corporate-owned
- Profile security requirements
Given a scenario, implement appropriate data destruction and disposal methods.
• Physical destruction
- Shredder
- Drill/hammer
- Electromagnetic (Degaussing)
- Incineration
- Certificate of destruction
• Recycling or repurposing best practices
- Low-level format vs. standard format
- Overwrite
- Drive wipe
Given a scenario, configure security on SOHO wireless and wired networks.
• Wireless-specific
- Changing default SSID
- Setting encryption
- Disabling SSID broadcast
- Antenna and access point placement
- Radio power levels
- WPS
• Change default usernames and passwords
• Enable MAC filtering
• Assign static IP addresses
• Firewall settings
• Port forwarding/mapping
• Disabling ports
• Content filtering/parental controls
• Update firmware
• Physical security
3.0 Software Troubleshooting
Given a scenario, troubleshoot Microsoft Windows OS problems.
• Common symptoms
- Slow performance
- Limited connectivity
- Failure to boot
- No OS found
- Application crashes
- Blue screens
- Black screens
- Printing issues
- Services fail to start
- Slow bootup
- Slow profile load
• Common solutions
- Defragment the hard drive
- Reboot
- Kill tasks
- Restart services
- Update network settings
- Reimage/reload OS
- Roll back updates
- Roll back devices drivers
- Apply updates
- Repair application
- Update boot order
- Disable Windows services/applications
- Disable application startup
- Safe boot
- Rebuild Windows profiles
Given a scenario, troubleshoot and resolve PC security issues.
• Common symptoms
- Pop-ups
- Browser redirection
- Security alerts
- Slow performance
- Internet connectivity issues
- PC/OS lockup
- Application crash
- OS updates failures
- Rogue antivirus
- Spam
- Renamed system files
- Disappearing files
- File permission changes
- Hijacked email
- Responses from users regarding email
- Automated replies
from unknown sent email
- Access denied
- Invalid certificate (trusted root CA)
- System/application log errors
Given a scenario, use best practice procedures for malware removal.
1. Identify and research malware symptoms.
2. Quarantine the infected systems.
3. Disable System Restore (in Windows).
4. Remediate the infected systems.
a. Update the anti-malware software.
b. Scan and use removal techniques
(safe mode, pre-installation environment).
5. Schedule scans and run updates.
6. Enable System Restore and create a restore point (in Windows).
7. Educate the end user.
3.0 Software Troubleshooting
Given a scenario, troubleshoot mobile OS and application issues.
• Common symptoms
- Dim display
- Intermittent wireless
- No wireless connectivity
- No Bluetooth connectivity
- Cannot broadcast to external monitor
- Touchscreen non-responsive
- Apps not loading
- Slow performance
- Unable to decrypt email
- Extremely short battery life
- Overheating
- Frozen system
- No sound from speakers
- Inaccurate touch screen response
- System lockout
- App log errors
Given a scenario, troubleshoot mobile OS and application security issues.
• Common symptoms
- Signal drop/weak signal
- Power drain
- Slow data speeds
- Unintended WiFi connection
- Unintended Bluetooth pairing
- Leaked personal files/data
- Data transmission over limit
- Unauthorized account access
- Unauthorized location tracking
- Unauthorized camera/ microphone activation
- High resource utilization
4.0 Operational Procedures
Compare and contrast best practices associated with types of documentation.
• Network topology diagrams
• Knowledge base/articles
• Incident documentation
• Regulatory and compliance policy
• Acceptable use policy
• Password policy
• Inventory management
- Asset tags
- Barcodes
Given a scenario, implement basic change management best practices.
• Documented business processes
• Purpose of the change
• Scope the change
• Risk analysis
• Plan for change
• End-user acceptance
• Change board
- Approvals
• Backout plan
• Document changes
Given a scenario, implement basic disaster prevention and recovery methods.
• Backup and recovery
- Image level
- File level
- Critical applications
• Backup testing
• UPS
• Surge protector
• Cloud storage vs. local storage backups
• Account recovery options
Explain common safety procedures.
• Equipment grounding
• Proper component handling and storage
- Antistatic bags
- ESD straps
- ESD mats
- Self-grounding
• Toxic waste handling
- Batteries
- Toner
- CRT
- Cell phones
- Tablets
• Personal safety
- Disconnect power before repairing PC
- Remove jewelry
- Lifting techniques
- Weight limitations
- Electrical fire safety
- Cable management
- Safety goggles
- Air filter mask
• Compliance with government regulations
4.0 Operational Procedures
Explain environmental impacts and appropriate controls.
• MSDS documentation for handling and disposal
• Temperature, humidity level awareness, and proper ventilation
• Power surges, brownouts, and blackouts
- Battery backup
- Surge suppressor
• Protection from airborne particles
- Enclosures
- Air filters/mask
• Dust and debris
- Compressed air
- Vacuums
• Compliance to government regulations
Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.
• Incident response
- First response
- Identify
- Report through proper channels
- Data/device preservation
- Use of documentation/ documentation changes
- Chain of custody
- Tracking of evidence/ documenting process
• Licensing/DRM/EULA
- Open-source vs. commercial license
- Personal license vs. enterprise licenses
• Regulated data
- PII
- PCI
- GDPR
- PHI
• Follow all policies and security best practices
Given a scenario, use proper communication techniques and professionalism.
• Use proper language and avoid jargon, acronyms, and slang, when applicable
• Maintain a positive attitude/ project confidence
• Actively listen (taking notes) and avoid interrupting the customer
• Be culturally sensitive
- Use appropriate professional titles, when applicable
• Be on time (if late, contact the customer)
• Avoid distractions
- Personal calls
- Texting/social media sites
- Talking to coworkers while interacting with customers
- Personal interruptions
• Dealing with difficult customers or situations
- Do not argue with customers and/or be defensive
- Avoid dismissing customer problems
- Avoid being judgmental
- Clarify customer statements (ask open-ended questions to narrow the
scope of the problem, restate the issue, or question to verify understanding)
- Do not disclose experiences via social media outlets
• Set and meet expectations/timeline and communicate status with the customer
- Offer different repair/ replacement options, if applicable
- Provide proper documentation on the services provided
- Follow up with customer/user at a later date to verify satisfaction
• Deal appropriately with customers’ confidential and private materials
- Located on a computer, desktop, printer, etc.
4.0 Operational Procedures
Identify the basics of scripting.
• Script file types
- .bat
- .ps1
- .vbs
- .sh
- .py
- .js
• Environment variables
• Comment syntax
• Basic script constructs
- Basic loops
- Variables
• Basic data types
- Integers
- Strings
Given a scenario, use remote access technologies.
• RDP
• Telnet
• SSH
• Third-party tools
- Screen share feature
- File share
• Security considerations of each access method
CompTIA A+ Acronyms
The following is a list of acronyms that appear on the CompTIA A+ exams. Candidates are encouraged to review the complete list and attain a working knowledge of all listed acronyms as a part of a comprehensive exam preparation program.
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
AC Alternating Current CGA Computer Graphics and Applications
ACL Access Control List CIDR Classless Inter-Domain Routing
ACPI Advanced Configuration Power Interface CIFS Common Internet File System
ADF Automatic Document Feeder CMOS Complementary Metal-Oxide Semiconductor
ADSL Asymmetrical Digital Subscriber Line CNR Communications and Networking Riser
AES Advanced Encryption Standard COMx Communication port (x=port number)
AHCI Advanced Host Controller Interface CPU Central Processing Unit
AP Access Point CRT Cathode-Ray Tube
APIPA Automatic Private Internet Protocol Addressing DaaS Data as a Service
APM Advanced Power Management DAC Discretionary Access Control
ARP Address Resolution Protocol DB-25 Serial Communications D-Shell Connector, 25 pins
ASR Automated System Recovery DB-9 Serial Communications D-Shell Connector, 9 pins
ATA Advanced Technology Attachment DBaas Database as a Service
ATAPI Advanced Technology Attachment DC Direct Current
Packet Interface DDoS Distributed Denial of Service
ATM Asynchronous Transfer Mode DDR Double Data Rate
ATX Advanced Technology Extended DDR RAM Double Data Rate Random Access Memory
AUP Acceptable Use Policy DFS Distributed File System
A/V Audio Video DHCP Dynamic Host Configuration Protocol
BD-R Blu-ray Disc Recordable DIMM Dual Inline Memory Module
BIOS Basic Input/Output System DIN Deutsche Industrie Norm
BD-RE Blu-ray Disc Rewritable DLT Digital Linear Tape
BNC Bayonet-Neill-Concelman DLP Digital Light Processing or Data Loss Prevention
BSOD Blue Screen of Death DMA Direct Memory Access
BYOD Bring Your Own Device DMZ Demilitarized Zone
CAD Computer-Aided Design DNS Domain Name Service or Domain Name Server
CAPTCHA Completely Automated Public Turing test DoS Denial of Service
to tell Computers and Humans Apart DRAM Dynamic Random Access Memory
CD Compact Disc DRM Digital Rights Management
CD-ROM Compact Disc-Read-Only Memory DSL Digital Subscriber Line
CD-RW Compact Disc-Rewritable DVD Digital Versatile Disc
CDFS Compact Disc File System DVD-RAM Digital Versatile Disc-Random Access Memory
CERT Computer Emergency Response Team DVD-ROM Digital Versatile Disc-Read Only Memory
CFS Central File System, Common File System, DVD-R Digital Versatile Disc-Recordable
or Command File System DVD-RW Digital Versatile Disc-Rewritable
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
DVI Digital Visual Interface HTTP Hypertext Transfer Protocol
DVI-D Digital Visual Interface-Digital HTTPS Hypertext Transfer Protocol Secure
ECC Error Correcting Code I/O Input/Output
ECP Extended Capabilities Port IaaS Infrastructure as a Service
EEPROM Electrically Erasable Programmable ICMP Internet Control Message Protocol
Read-Only Memory ICR Intelligent Character Recognition
EFS Encrypting File System IDE Integrated Drive Electronics
EIDE Enhanced Integrated Drive Electronics IDS Intrusion Detection System
EMI Electromagnetic Interference IEEE Institute of Electrical and Electronics Engineers
EMP Electromagnetic Pulse IIS Internet Information Services
EPROM Erasable Programmable Read-Only Memory IMAP Internet Mail Access Protocol
EPP Enhanced Parallel Port IMEI International Mobile Equipment Identity
ERD Emergency Repair Disk IMSI International Mobile Subscriber Identity
eSATA External Serial Advanced Technology Attachment IP Internet Protocol
ESD Electrostatic Discharge IPConfig Internet Protocol Configuration
EULA End User License Agreement IPP Internet Printing Protocol
EVGA Extended Video Graphics Adapter/Array IPS Intrusion Prevention System
Ext2 Second Extended File System IPSec Internet Protocol Security
exFAT Extended File Allocation Table IR Infrared
FAT File Allocation Table IrDA Infrared Data Association
FAT12 12-bit File Allocation Table IRP Incident Response Plan
FAT16 16-bit File Allocation Table IRQ Interrupt Request
FAT32 32-bit File Allocation Table ISA Industry Standard Architecture
FDD Floppy Disk Drive ISDN Integrated Services Digital Network
FPM Fast Page Mode ISO International Organization for Standardization
FSB Front-Side Bus ISP Internet Service Provider
FTP File Transfer Protocol JBOD Just a Bunch of Disks
FQDN Fully Qualified Domain Name KB Knowledge Base
GDDR Graphics Double Data Rate KVM Kernel-based Virtual Machine
GDI Graphics Device Interface KVM Keyboard-Video-Mouse
GUI Graphical User Interface LAN Local Area Network
GUID Globally Unique Identifier LBA Logical Block Addressing
GPS Global Positioning System LC Lucent Connector
GPT GUID Partition Table LCD Liquid Crystal Display
GPU Graphics Processing Unit LDAP Lightweight Directory Access Protocol
GSM Global System for Mobile Communications LED Light Emitting Diode
HAL Hardware Abstraction Layer LPD/LPR Line Printer Daemon/Line Printer Remote
HAV Hardware Assisted Virtualization LPT Line Printer Terminal
HCL Hardware Compatibility List LVD Low Voltage Differential
HDCP High-Bandwidth Digital Content Protection MAC Media Access Control/Mandatory Access Control
HDD Hard Disk Drive MAN Metropolitan Area Network
HDMI High Definition Media Interface MAPI Messaging Application Programming Interface
HIPS Host Intrusion Prevention System mATX Micro Advanced Technology Extended
HPFS High Performance File System MAU Media Access Unit/Media Attachment Unit
HTML Hypertext Markup Language MBR Master Boot Record
HTPC Home Theater PC MBSA Microsoft Baseline Security Analyzer
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
MDM Mobile Device Management PCIe Peripheral Component Interconnect Express
MFA Multifactor Authentication PCIX Peripheral Component Interconnect Extended
MFD Multifunction Device PCL Printer Command Language
MFP Multifunction Product PCMCIA Personal Computer Memory Card
MicroDIMM Micro Dual Inline Memory Module International Association
MIDI Musical Instrument Digital Interface PE Preinstallation Environment
MIME Multipurpose Internet Mail Extension PGA Pin Grid Array
MIMO Multiple Input Multiple Output PGA2 Pin Grid Array 2
MMC Microsoft Management Console PGP Pretty Good Protection
MP3 Moving Picture Experts Group Layer 3 Audio PII Personally Identifiable Information
MP4 Moving Picture Experts Group Layer 4 PIN Personal Identification Number
MPEG Moving Picture Experts Group PHI Personal Health Information
MSConfig Microsoft Configuration PKI Public Key Infrastructure
MSDS Material Safety Data Sheet PnP Plug and Play
MT-RJ Mechanical Transfer Registered Jack PoE Power over Ethernet
MUI Multilingual User Interface POP3 Post Office Protocol 3
NaaS Network as a Service PoS Point of Sale
NAC Network Access Control POST Power-On sSelf-tTest
NAS Network-Attached Storage POTS Plain Old Telephone Service
NAT Network Address Translation PPM Pages Per Minute
NetBIOS Networked Basic Input/Output System PPP Point-to-Point Protocol
NetBEUI Networked Basic Input/Output PPTP Point-to-Point Tunneling Protocol
System Extended User Interface PRI Primary Rate Interface
NFC Near Field Communication PROM Programmable Read-Only Memory
NFS Network File System PS/2 Personal System/2 connector
NIC Network Interface Card PSTN Public Switched Telephone Network
NiCd Nickel Cadmium PSU Power Supply Unit
NiMH Nickel Metal Hydride PVA Patterned Vertical Alignment
NLX New Low-profile Extended PVC Permanent Virtual Circuit
NNTP Network News Transfer Protocol PXE Preboot Execution Environment
NTFS New Technology File System QoS Quality of Service
NTLDR New Technology Loader RADIUS Remote Authentication Dial-In User Server
NTP Network Time Protocol RAID Redundant Array of Independent
NTSC National Transmission Standards Committee (or inexpensive) Discs
NVMe Non-volatile Memory Express RAM Random Access Memory
OCR Optical Character Recognition RAS Remote Access Service
OEM Original Equipment Manufacturer RDP Remote Desktop Protocol
OLED Organic Light Emitting Diode RF Radio Frequency
OS Operating System RFI Radio Frequency Interference
PaaS Platform as a Service RFID Radio Frequency Identification
PAL Phase Alternating Line RGB Red Green Blue
PAN Personal Area Network RIP Routing Information Protocol
PAT Port Address Translation RIS Remote Installation Service
PC Personal Computer RISC Reduced Instruction Set Computer
PCI Peripheral Component Interconnect RJ-11 Registered Jack Function 11
PCI Payment Card Industry RJ-45 Registered Jack Function 45
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
RMA Returned Materials Authorization TKIP Temporal Key Integrity Protocol
ROM Read-Only Memory TLS Transport Layer Security
RPO Recovery Point Objective TN Twisted Nematic
RTC Real-Time Clock TPM Trusted Platform Module
RTO Recovery Time Objective UAC User Account Control
SaaS Software as a Service UDF User Defined Functions or Universal Disk Format
SAN Storage Area Network or Universal Data Format
SAS Serial Attached SCSI UDP User Datagram Protocol
SATA Serial Advanced Technology Attachment UEFI Unified Extensible Firmware Interface
SC Subscription Channel UNC Universal Naming Convention
SCP Secure Copy Protection UPnP Universal Plug and Play
SCSI Small Computer System Interface UPS Uninterruptible Power Supply
SCSI ID Small Computer System Interface Identifier URL Uniform Resource Locator
SD card Secure Digital Card USB Universal Serial Bus
SEC Single Edge Connector USMT User State Migration Tool
SFC System File Checker UTM Unified Threat Management
SFF Small Form Factor UTP Unshielded Twisted Pair
SFTP Secure File Transfer Protocol UXGA Ultra Extended Graphics Array
SIM Subscriber Identity Module VA Vertical Alignment
SIMM Single In-Line Memory Module VDC Volts DC
SLI Scalable Link Interface or System Level VDI Virtual Desktop Infrastructure
Integration or Scanline Interleave Mode VESA Video Electronics Standards Association
S.M.A.R.T. Self-Monitoring, Analysis, and VFAT Virtual File Allocation Table
Reporting Technology VGA Video Graphics Array
SMB Server Message Block VLAN Virtual LAN
SMTP Simple Mail Transfer Protocol VM Virtual Machine
SNMP Simple Network Management Protocol VNC Virtual Network Computer
SoDIMM Small Outline Dual Inline Memory Module VoIP Voice over Internet Protocol
SOHO Small Office/Home Office VPN Virtual Private Network
SP Service Pack VRAM Video Random Access Memory
SPDIF Sony-Philips Digital Interface Format WAN Wide Area Network
SPGA Staggered Pin Grid Array WAP Wireless Access Protocol/Wireless Access Point
SRAM Static Random Access Memory WEP Wired Equivalent Privacy
SSD Solid State Drive WIFI Wireless Fidelity
SSH Secure Shell WINS Windows Internet Name Service
SSID Service Set Identifier WLAN Wireless Local Area Network
SSL Secure Sockets Layer WMN Wireless Mesh Network
SSO Single Sign-on WPA Wireless Protected Access
ST Straight Tip WPA2 WiFi Protected Access 2
STP Shielded Twisted Pair WPS WiFi Protected Setup
SXGA Super Extended Graphics Array WUXGA Wide Ultra Extended Graphics Array
TACACS Terminal Access Controller Access-Control System WWAN Wireless Wide Area Network
TCP Transmission Control Protocol XGA Extended Graphics Array
TCP/IP Transmission Control Protocol/Internet Protocol ZIF Zero-Insertion-Force
TDR Time Domain Reflectometer ZIP Zigzag Inline Package
TFTP Trivial File Transfer Protocol
A+ Proposed Hardware and Software List
CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the A+ exam. This list may also be helpful for training companies that wish to create a lab component for their training offering. The bulleted lists below each topic are sample lists and not exhaustive.
EQUIPMENT
• Apple tablet/smartphone
• Android tablet/smartphone
• Windows tablet/Smartphone
• Chromebook
• Windows laptop/Mac laptop/Linux laptop
• Windows desktop/Mac desktop/Linux desktop
• Windows Server w/Active Directory and Print Management
• Monitors
• Projectors
• SOHO router/switch
• Access point
• VoIP phone
• Printer
- Laser/inkjet
- Wireless
- 3D printer
• Surge suppressor
• UPS
• VR headset
• Smart devices (IoT devices)
SPARE PARTS/HARDWARE
• Motherboards
• RAM
• Hard drives
• Power supplies
• Video cards
• Sounds cards
• Network cards
• Wireless NICs
• Fans/cooling devices/heat sink
• CPUs
• Assorted connectors/cables
- USB
- HDMI
- Etc.
• Adapters
• Network cables
• Unterminated network cables/connectors
• AC adapters
• Optical drives
• Screws/stand-offs
• Cases
• Maintenance kit
• Mice/keyboards
• KVM
• Console cable
TOOLS
• Screw drivers
• Multimeter
• Wire cutters
• Punchdown tool
• Crimper
• Power supply tester
• Cable stripper
• Standard technician toolkit
• ESD strap
• Thermal paste
• Cable tester
• Cable toner
• WiFi analyzer
• SATA to USB connectors
SOFTWARE
• Operating systems
- Linux
- Chrome OS
- Microsoft Windows
- Mac OS
- Android
- iOS
• PE Disk/Live CD
• Antivirus software
• Virtualization software
• Anti-malware
• Driver software
© 2018 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduc- tion or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 04992B-Apr2018