CompTIA A+ (A Plus - Core 2) Exam Syllabus

A+ Core 2 PDF, 220-1102 Dumps, 220-1102 PDF, A+ Core 2 VCE, 220-1102 Questions PDF, CompTIA 220-1102 VCE, CompTIA A Plus (Core 2) Dumps, CompTIA A Plus (Core 2) PDFUse this quick start guide to collect all the information about CompTIA A+ Core 2 (220-1102) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the 220-1102 CompTIA A+ (Core 2) exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA A Plus (Core 2) certification exam.

The CompTIA A+ Core 2 certification is mainly targeted to those candidates who want to build their career in Core domain. The CompTIA A+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA A Plus (Core 2).

CompTIA A+ Core 2 Exam Summary:

Exam Name CompTIA A+
Exam Code 220-1102
Exam Price $239 (USD)
Duration 90 mins
Number of Questions 90
Passing Score 700 / 900
Books / Training CertMaster Learn for A+
Schedule Exam Pearson VUE
Sample Questions CompTIA A+ Core 2 Sample Questions
Practice Exam CompTIA 220-1102 Certification Practice Exam

CompTIA 220-1102 Exam Syllabus Topics:

Topic Details

Operating Systems - 31%

Identify basic features of Microsoft Windows editions. - Windows 10 editions
  • Home
  • Pro
  • Pro for Workstations
  • Enterprise

- Feature differences

  • Domain access vs. workgroup
  • Desktop styles/user interface
  • Availability of Remote Desktop Protocol (RDP)
  • Random-access memory (RAM) support limitations
  • BitLocker
  • gpedit.msc

- Upgrade paths

  • In-place upgrade
Given a scenario, use the appropriate Microsoft command-line tool. - Navigation
  • cd
  • dir
  • rmdir
  • Drive navigation inputs:
    - C: or D: or x:

- Command-line tools

  • ipconfig
  • ping
  • hostname
  • netstat
  • nslookup
  • chkdsk
  • net user
  • net use
  • tracert
  • format
  • xcopy
  • copy
  • robocopy
  • gpupdate
  • gpresult
  • shutdown
  • sfc
  • [command name] /?
  • diskpart
  • pathping
  • winver
Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS). - Task Manager
  • Services
  • Startup
  • Performance
  • Processes
  • Users

- Microsoft Management Console (MMC) snap-in

  • Event Viewer (eventvwr.msc)
  • Disk Management (diskmgmt.msc)
  • Task Scheduler (taskschd.msc)
  • Device Manager (devmgmt.msc)
  • Certificate Manager (certmgr.msc)
  • Local Users and Groups (lusrmgr.msc)
  • Performance Monitor (perfmon.msc)
  • Group Policy Editor (gpedit.msc)

- Additional tools

  • System Information (msinfo32. exe)
  • Resource Monitor (resmon.exe)
  • System Configuration (msconfig. exe)
  • Disk Cleanup (cleanmgr.exe)
  • Disk Defragment (dfrgui.exe)
  • Registry Editor (regedit.exe)
Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility. - Internet Options
- Devices and Printers
- Programs and Features
- Network and Sharing Center
- System
- Windows Defender Firewall
- Mail
- Sound
- User Accounts
- Device Manager
- Indexing Options
- Administrative Tools
- File Explorer Options
  • Show hidden files
  • Hide extensions
  • General options
  • View options

- Power Options

  • Hibernate
  • Power plans
  • Sleep/suspend
  • Standby
  • Choose what closing the lid does
  • Turn on fast startup
  • Universal Serial Bus (USB) selective suspend

- Ease of Access

Given a scenario, use the appropriate Windows settings. - Time and Language
- Update and Security
- Personalization
- Apps
- Privacy
- System
- Devices
- Network and Internet
- Gaming
- Accounts
Given a scenario, configure Microsoft Windows networking features on a client/desktop. - Workgroup vs. domain setup
  • Shared resources
  • Printers
  • File servers
  • Mapped drives

- Local OS firewall settings

  • Application restrictions and exceptions
  • Configuration

- Client network configuration

  • Internet Protocol (IP) addressing scheme
  • Domain Name System (DNS) settings
  • Subnet mask
  • Gateway
  • Static vs. dynamic

- Establish network connections

  • Virtual private network (VPN)
  • Wireless
  • Wired
  • Wireless wide area network (WWAN)

- Proxy settings
- Public network vs. private network
- File Explorer navigation – network paths
- Metered connections and limitations

Given a scenario, apply application installation and configuration concepts. - System requirements for applications
  • 32-bit vs. 64-bit dependent application requirements
  • Dedicated graphics card vs. integrated
  • Video random-access memory (VRAM) requirements
  • RAM requirements
  • Central processing unit (CPU) requirements
  • External hardware tokens
  • Storage requirements

- OS requirements for applications

  • Application to OS compatibility
  • 32-bit vs. 64-bit OS

- Distribution methods

  • Physical media vs. downloadable
  • ISO mountable

- Other considerations for new applications

  • Impact to device
  • Impact to network
  • Impact to operation
  • Impact to business
Explain common OS types and their purposes. - Workstation OSs
  • Windows
  • Linux
  • macOS
  • Chrome OS

- Cell phone/tablet OSs

  • iPadOS
  • iOS
  • Android

- Various filesystem types

  • New Technology File System (NTFS)
  • File Allocation Table 32 (FAT32)
  • Third extended filesystem (ext3)
  • Fourth extended filesystem (ext4)
  • Apple File System (APFS)
  • Extensible File Allocation Table (exFAT)

- Vendor life-cycle limitations

  • End-of-life (EOL)
  • Update limitations

- Compatibility concerns between OSs

Given a scenario, perform OS installations and upgrades in a diverse OS environment. - Boot methods
  • USB
  • Optical media
  • Network
  • Solid-state/flash drives
  • Internet-based
  • External/hot-swappable drive
  • Internal hard drive (partition)

- Types of installations

  • Upgrade
  • Recovery partition
  • Clean install
  • Image deployment
  • Repair installation
  • Remote network installation
  • Other considerations
    - Third-party drivers

- Partitioning

  • GUID [globally unique identifier] Partition Table (GPT)
  • Master boot record (MBR)

- Drive format
- Upgrade considerations

  • Backup files and user preferences
  • Application and driver support/backward compatibility
  • Hardware compatibility

- Feature updates

  • Product life cycle
Identify common features and tools of the macOS/desktop OS. - Installation and uninstallation of applications
  • File types
    - .dmg
    - .pkg
    - .app
  • App Store
  • Uninstallation process

- Apple ID and corporate restrictions
- Best practices

  • Backups
  • Antivirus
  • Updates/patches

- System Preferences

  • Displays
  • Networks
  • Printers
  • Scanners
  • Privacy
  • Accessibility
  • Time Machine

- Features

  • Multiple desktops
  • Mission Control
  • Keychain
  • Spotlight
  • iCloud
  • Gestures
  • Finder
  • Remote Disc
  • Dock

- Disk Utility
- FileVault
- Terminal
- Force Quit

Identify common features and tools of the Linux client/desktop OS. - Common commands
  • ls
  • pwd
  • mv
  • cp
  • rm
  • chmod
  • chown
  • su/sudo
  • apt-get
  • yum
  • ip
  • df
  • grep
  • ps
  • man
  • top
  • find
  • dig
  • cat
  • nano

- Best practices

  • Backups
  • Antivirus
  • Updates/patches

- Tools

  • Shell/terminal
  • Samba

Security - 25%

Summarize various security measures and their purposes. - Physical security
  • Access control vestibule
  • Badge reader
  • Video surveillance
  • Alarm systems
  • Motion sensors
  • Door locks
  • Equipment locks
  • Guards
  • Bollards
  • Fences

- Physical security for staf

  • Key fobs
  • Smart cards
  • Keys
  • Biometrics
    - Retina scanner
    - Fingerprint scanner
    - Palmprint scanner
  • Lighting
  • Magnetometers

- Logical security

  • Principle of least privilege
  • Access control lists (ACLs)
  • Multifactor authentication (MFA)
  • Email
  • Hard token
  • Soft token
  • Short message service (SMS)
  • Voice call
  • Authenticator application

- Mobile device management (MDM)
- Active Directory

  • Login script
  • Domain
  • Group Policy/updates
  • Organizational units
  • Home folder
  • Folder redirection
  • Security groups
Compare and contrast wireless security protocols and authentication methods. - Protocols and encryption
  • WiFi Protected Access 2 (WPA2)
  • WPA3
  • Temporal Key Integrity Protocol (TKIP)
  • Advanced Encryption Standard (AES)

- Authentication

  • Remote Authentication Dial-In User Service (RADIUS)
  • Terminal Access Controller Access-Control System (TACACS+)
  • Kerberos
  • Multifactor
Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods. - Malware
  • Trojan
  • Rootkit
  • Virus
  • Spyware
  • Ransomware
  • Keylogger
  • Boot sector virus
  • Cryptominers

- Tools and methods

  • Recovery mode
  • Antivirus
  • Anti-malware
  • Software firewalls
  • Anti-phishing training
  • User education regarding common threats
  • OS reinstallation
Explain common social-engineering attacks, threats, and vulnerabilities. - Social engineering
  • Phishing
  • Vishing
  • Shoulder surfing
  • Whaling
  • Tailgating
  • Impersonation
  • Dumpster diving
  • Evil twin

- Threats

  • Distributed denial of service (DDoS)
  • Denial of service (DoS)
  • Zero-day attack
  • Spoofing
  • On-path attack
  • Brute-force attack
  • Dictionary attack
  • Insider threat
  • Structured Query Language (SQL) injection
  • Cross-site scripting (XSS)

- Vulnerabilities

  • Non-compliant systems
  • Unpatched systems
  • Unprotected systems (missing antivirus/missing firewall)
  • EOL OSs
  • Bring your own device (BYOD)
Given a scenario, manage and configure basic security settings in the Microsoft Windows OS. - Defender Antivirus
  • Activate/deactivate
  • Updated definitions

- Firewall

  • Activate/deactivate
  • Port security
  • Application security

- Users and groups

  • Local vs. Microsoft account
  • Standard account
  • Administrator
  • Guest user
  • Power user

- Login OS options

  • Username and password
  • Personal identification number (PIN)
  • Fingerprint
  • Facial recognition
  • Single sign-on (SSO)

- NTFS vs. share permissions

  • File and folder attributes
  • Inheritance

- Run as administrator vs. standard user

  • User Account Control (UAC)

- BitLocker
- BitLocker To Go
- Encrypting File System (EFS)

Given a scenario, configure a workstation to meet best practices for security. - Data-at-rest encryption
- Password best practices
  • Complexity requirements
    - Length
    - Character types
  • Expiration requirements
  • Basic input/output system (BIOS)/Unified Extensible Firmware Interface (UEFI) passwords

- End-user best practices

  • Use screensaver locks
  • Log off when not in use
  • Secure/protect critical hardware (e.g., laptops)
  • Secure personally identifiable information (PII) and passwords

- Account management

  • Restrict user permissions
  • Restrict login times
  • Disable guest account
  • Use failed attempts lockout
  • Use timeout/screen lock

- Change default administrator’s user account/password
- Disable AutoRun
- Disable AutoPlay

Explain common methods for securing mobile and embedded devices. - Screen locks
  • Facial recognition
  • PIN codes
  • Fingerprint
  • Pattern
  • Swipe

- Remote wipes
- Locator applications
- OS updates
- Device encryption
- Remote backup applications
- Failed login attempts restrictions
- Antivirus/anti-malware
- Firewalls
- Policies and procedures

  • BYOD vs. corporate owned
  • Profile security requirements

- Internet of Things (IoT)

Given a scenario, use common data destruction and disposal methods. - Physical destruction
  • Drilling
  • Shredding
  • Degaussing
  • Incinerating

- Recycling or repurposing best practices

  • Erasing/wiping
  • Low-level formatting
  • Standard formatting

- Outsourcing concepts

  • Third-party vendor
  • Certification of destruction/recycling
Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks. - Home router settings
  • Change default passwords
  • IP filtering
  • Firmware updates
  • Content filtering
  • Physical placement/secure locations
  • Dynamic Host Configuration Protocol (DHCP) reservations
  • Static wide-area network (WAN) IP
  • Universal Plug and Play (UPnP)
  • Screened subnet

- Wireless specific

  • Changing the service set identifier (SSID)
  • Disabling SSID broadcast
  • Encryption settings
  • Disabling guest access
  • Changing channels

- Firewall settings

  • Disabling unused ports
  • Port forwarding/mapping
Given a scenario, install and configure browsers and relevant security settings. - Browser download/installation
  • Trusted sources
    - Hashing
  • Untrusted sources

- Extensions and plug-ins

  • Trusted sources
  • Untrusted sources

- Password managers
- Secure connections/sites – valid certificates
- Settings

  • Pop-up blocker
  • Clearing browsing data
  • Clearing cache
  • Private-browsing mode
  • Sign-in/browser data synchronization
  • Ad blockers

Software Troubleshooting - 22%

Given a scenario, troubleshoot common Windows OS problems. - Common symptoms
  • Blue screen of death (BSOD)
  • Sluggish performance
  • Boot problems
  • Frequent shutdowns
  • Services not starting
  • Applications crashing
  • Low memory warnings
  • USB controller resource warnings
  • System instability
  • No OS found
  • Slow profile load
  • Time drift

- Common troubleshooting steps

  • Reboot
  • Restart services
  • Uninstall/reinstall/update applications
  • Add resources
  • Verify requirements
  • System file check
  • Repair Windows
  • Restore
  • Reimage
  • Roll back updates
  • Rebuild Windows profiles
Given a scenario, troubleshoot common personal computer (PC) security issues. - Common symptoms
  • Unable to access the network
  • Desktop alerts
  • False alerts regarding antivirus protection
  • Altered system or personal files
    - Missing/renamed files
  • Unwanted notifications within the OS
  • OS update failures

- Browser-related symptoms

  • Random/frequent pop-ups
  • Certificate warnings
  • Redirection
Given a scenario, use best practice procedures for malware removal. - Investigate and verify malware symptoms
- Quarantine infected systems
- Disable System Restore in Windows
- Remediate infected systems
  • Update anti-malware software
  • Scanning and removal techniques (e.g., safe mode, preinstallation environment)

- Schedule scans and run updates
- Enable System Restore and create a restore point in Windows
- Educate the end user

Given a scenario, troubleshoot common mobile OS and application issues. - Common symptoms
  • Application fails to launch
  • Application fails to close/crashes
  • Application fails to update
  • Slow to respond
  • OS fails to update
  • Battery life issues
  • Randomly reboots
  • Connectivity issues
    - Bluetooth
    - WiFi
    - Near-field communication (NFC)
    - AirDrop
  • Screen does not autorotate
Given a scenario, troubleshoot common mobile OS and application security issues. - Security concerns
  • Android package (APK) source
  • Developer mode
  • Root access/jailbreak
  • Bootleg/malicious application
    - Application spoofing

- Common symptoms

  • High network traffic
  • Sluggish response time
  • Data-usage limit notification
  • Limited Internet connectivity
  • No Internet connectivity
  • High number of ads
  • Fake security warnings
  • Unexpected application behavior
  • Leaked personal files/data

Operational Procedures - 22%

Given a scenario, implement best practices associated with documentation and support systems information management. - Ticketing systems
  • User information
  • Device information
  • Description of problems
  • Categories
  • Severity
  • Escalation levels
  • Clear, concise written communication
    - Problem description
    - Progress notes
    - Problem resolution

- Asset management

  • Inventory lists
  • Database system
  • Asset tags and IDs
  • Procurement life cycle
  • Warranty and licensing
  • Assigned users

- Types of documents

  • Acceptable use policy (AUP)
  • Network topology diagram
  • Regulatory compliance requirements
    - Splash screens
  • Incident reports
  • Standard operating procedures
    - Procedures for custom installation of software package
  • New-user setup checklist
  • End-user termination checklist

- Knowledge base/articles

Explain basic change-management best practices. - Documented business processes
  • Rollback plan
  • Sandbox testing
  • Responsible staff member

- Change management

  • Request forms
  • Purpose of the change
  • Scope of the change
  • Date and time of the change
  • Affected systems/impact
  • Risk analysis
    - Risk level
  • Change board approvals
  • End-user acceptance
Given a scenario, implement workstation backup and recovery methods. - Backup and recovery
  • Full
  • Incremental
  • Differential
  • Synthetic

- Backup testing

  • Frequency

- Backup rotation schemes

  • On site vs. off site
  • Grandfather-father-son (GFS)
  • 3-2-1 backup rule
Given a scenario, use common safety procedures. - Electrostatic discharge (ESD) straps
- ESD mats
- Equipment grounding
- Proper power handling
- Proper component handling and storage
- Antistatic bags
- Compliance with government regulations
- Personal safety
  • Disconnect power before repairing PC
  • Lifting techniques
  • Electrical fire safety
  • Safety goggles
  • Air filtration mask
Summarize environmental impacts and local environmental controls. - Material safety data sheet (MSDS)/documentation for handling and disposal
  • Proper battery disposal
  • Proper toner disposal
  • Proper disposal of other devices and assets

- Temperature, humidity-level awareness, and proper ventilation

  • Location/equipment placement
  • Dust cleanup
  • Compressed air/vacuums

- Power surges, under-voltage events, and power failures

  • Battery backup
  • Surge suppressor
Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts. - Incident response
  • Chain of custody
  • Inform management/law enforcement as necessary
  • Copy of drive (data integrity and preservation)
  • Documentation of incident

- Licensing/digital rights management (DRM)/end-user license agreement (EULA)

  • Valid licenses
  • Non-expired licenses
  • Personal use license vs. corporate use license
  • Open-source license

- Regulated data

  • Credit card transactions
  • Personal government-issued information
  • PII
  • Healthcare data
  • Data retention requirements
Given a scenario, use proper communication techniques and professionalism. - Professional appearance and attire
  • Match the required attire of the given environment
    - Formal
    - Business casual

- Use proper language and avoid jargon, acronyms, and slang, when applicable
- Maintain a positive attitude/project confidence
- Actively listen, take notes, and avoid interrupting the customer
- Be culturally sensitive

  • Use appropriate professional titles, when applicable

- Be on time (if late, contact the customer)
- Avoid distractions

  • Personal calls
  • Texting/social media sites
  • Personal interruptions

- Dealing with difficult customers or situations

  • Do not argue with customers or be defensive
  • Avoid dismissing customer problems
  • Avoid being judgmental
  • Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
  • Do not disclose experience via social media outlets

- Set and meet expectations/time line and communicate status with the customer

  • Offer repair/replacement options, as needed
  • Provide proper documentation on the services provided
  • Follow up with customer/user at a later date to verify satisfaction

- Deal appropriately with customers’ confidential and private materials

  • Located on a computer, desktop, printer, etc.
Identify the basics of scripting. - Script file types
  • .bat
  • .ps1
  • .vbs
  • .sh
  • .js
  • .py

- Use cases for scripting

  • Basic automation
  • Restarting machines
  • Remapping network drives
  • Installation of applications
  • Automated backups
  • Gathering of information/data
  • Initiating updates

- Other considerations when using scripts

  • Unintentionally introducing malware
  • Inadvertently changing system settings
  • Browser or system crashes due to mishandling of resources
Given a scenario, use remote access technologies. - Methods/tools
  • RDP
  • VPN
  • Virtual network computer (VNC)
  • Secure Shell (SSH)
  • Remote monitoring and management (RMM)
  • Microsoft Remote Assistance (MSRA)
  • Third-party tools
    - Screen-sharing software
    - Video-conferencing software
    - File transfer software
    - Desktop management software

- Security considerations of each access method

To ensure success in CompTIA A Plus (Core 2) certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA A+ (Core 2) (220-1102) exam.

Rating: 5 / 5 (60 votes)