CORRESPONDENCE COURSES
CompTIA 220-1002 A+ Exam Objectives
Author: Professor Messer
Go to Source
About 20% of these objectives are new since the 220-902 A+ exam.
All of the new or modified objectives since the 220-902 A+ exam are highlighted.
CompTIA 220-1002 A+ Exam Domains
Domain 1.0 – Operating Systems
Domain 2.0 – Security
Domain 3.0 – Software Troubleshooting
Domain 4.0 – Operational Procedures
Domain 1.0 – Operating Systems
- 1.1 – Compare and contrast common operating system types and their purposes.
- 32-bit vs. 64-bit
- RAM limitations
- Software compatibility
- Workstation operating systems
- Microsoft Windows
- Apple Macintosh OS
- Linux
- Cell phone/tablet operating systems
- Microsoft Windows
- Android
- iOS
- Chrome OS
- Vendor-specific limitations
- End-of-life
- Update limitations
- Compatibility concerns between operating systems
- 1.2 – Compare and contrast features of Microsoft Windows versions.
- Windows 7
- Windows 8
- Windows 8.1
- Windows 10
- Corporate vs. personal needs
- Domain access
- BitLocker
- Media center
- Branchcache
- EFS
- Desktop styles/user interface
- 1.3 – Summarize general OS installation considerations and upgrade methods.
- Boot methods
- USB
- CD-ROM
- DVD
- PXE
- Solid state/flash drives
- Netboot
- External/hot-swappable drive
- Internal hard drive (partition)
- Type of installations
- Unattended installation
- In-place upgrade
- Clean install
- Repair installation
- Multiboot
- Remote network installation
- Image deployment
- Recovery partition
- Refresh/restore
- Partitioning
- Dynamic
- Basic
- Primary
- Extended
- Logical
- GPT
- File system types/formatting
- ExFAT
- FAT32
- NTFS
- CDFS
- NFS
- ext3, ext4
- HFS
- Swap partition
- Quick format vs. full format
- Load alternate third-party drivers when necessary
- Workgroup vs. Domain setup
- Time/date/region/language settings
- Driver installation, software, and Windows updates
- Factory recovery partition
- Properly formatted boot drive with the correct partitions/format
- Prerequisites/hardware compatibility
- Application compatibility
- OS compatibility/upgrade path
- 1.4 – Given a scenario, use appropriate Microsoft command line tools.
- Navigation
- dir
- cd
- ..
- ipconfig
- ping
- tracert
- netstat
- nslookup
- shutdown
- dism
- sfc
- chkdsk
- diskpart
- taskkill
- gpupdate
- gpresult
- format
- copy
- xcopy
- robocopy
- net use
- net user
- [command name] /?
- Commands available with standard privileges vs. administrative privileges
- 1.5 – Given a scenario, use Microsoft operating system features and tools.
- Administrative
- Computer Management
- Device Manager
- Local Users and Groups
- Local Security Policy
- Performance Monitor
- Services
- System Configuration
- Task Scheduler
- Component Services
- Data Sources
- Print Management
- Windows Memory Diagnostics
- Windows Firewall
- Advanced Security
- Event Viewer
- User Account Management
- MSConfig
- General
- Boot
- Services
- Startup
- Tools
- Task Manager
- Applications
- Processes
- Performance
- Networking
- Users
- Disk Management
- Drive status
- Mounting
- Initializing
- Extending partitions
- Splitting partitions
- Shrink partitions
- Assigning/changing drive letters
- Adding drives
- Adding arrays
- Storage spaces
- System utilities
- Regedit
- Command
- Services.msc
- MMC
- MSTSC
- Notepad
- Explorer
- Msinfo32
- DxDiag
- Disk Defragmenter
- System Restore
- Windows Update
- 1.6 – Given a scenario, use Microsoft Windows Control Panel utilities.
- Internet Options
- Connections
- Security
- General
- Privacy
- Programs
- Advanced
- Display/Display Settings
- Resolution
- Color depth
- Refresh rate
- User Accounts
- Folder Options
- View hidden files
- Hide extensions
- General options
- View options
- System
- Performance (virtual memory)
- Remote settings
- System protection
- Windows Firewall
- Power Options
- Hibernate
- Power plans
- Sleep/suspend
- Standby
- Credential Manager
- Programs and features
- HomeGroup
- Devices and Printers
- Sound
- Troubleshooting
- Network and Sharing Center
- Device Manager
- BitLocker
- Sync Center
- 1.7 – Summarize application installation and configuration concepts.
- System requirements
- Drive space
- RAM
- OS requirements
- Compatibility
- Methods of installation and deployment
- Local (CD/USB)
- Network-based
- Local user permissions
- Folder/file access for installation
- Security considerations
- Impact to device
- Impact to network
- 1.8 – Given a scenario, configure Microsoft Windows networking on a client/desktop.
- HomeGroup vs. Workgroup
- Domain setup
- Network shares/administrative shares/mapping drives
- Printer sharing vs. network printer mapping
- Establish networking connections
- VPN
- Dial-up
- Wireless
- Wired
- WWAN (Cellular)
- Proxy settings
- Remote Desktop Connection
- Remote Assistance
- Home vs. Work vs. Public network settings
- Firewall settings
- Exceptions
- Configuration
- Enabling/disabling Windows Firewall
- Configuring an alternative IP address in Windows
- IP addressing
- Subnet mask
- DNS
- Gateway
- Network card properties
- Half duplex/full duplex/auto
- Speed
- Wake-on-LAN
- QoS
- BIOS (on-board NIC)
- 1.9 – Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
- Best practices
- Scheduled backups
- Scheduled disk maintenance
- System updates/App Store
- Patch management
- Driver/firmware updates
- Antivirus/Anti-malware updates
- Tools
- Backup/Time Machine
- Restore/Snapshot
- Image recovery
- Disk maintenance utilities
- Shell/Terminal
- Screen sharing
- Force Quit
- Features
- Multiple desktops/Mission Control
- Key Chain
- Spot Light
- iCloud
- Gestures
- Finder
- Remote Disc
- Dock
- Boot Camp
- Basic Linux commands
- ls
- grep
- cd
- shutdown
- pwd vs. passwd
- mv
- cp
- rm
- chmod
- chown
- iwconfig/ifconfig
- ps
- su/sudo
- apt-get
- vi
- dd
- kill
Domain 2.0 – Security
- 2.1 – Summarize the importance of physical security measures.
- Mantrap
- Badge reader
- Smart card
- Security guard
- Door lock
- Biometric locks
- Hardware tokens
- Cable locks
- Server locks
- USB locks
- Privacy screen
- Key fobs
- Entry control roster
- 2.2 – Explain logical security concepts.
- Active Directory
- Login script
- Domain
- Group Policy/Updates
- Organizational Units
- Home Folder
- Folder redirection
- Software tokens
- MDM policies
- Port security
- MAC address filtering
- Certificates
- Antivirus/Anti-malware
- Firewalls
- User authentication/strong passwords
- Multifactor authentication
- Directory permissions
- VPN
- DLP
- Access control lists
- Smart card
- Email filtering
- Trusted/untrusted software sources
- Principle of least privilege
- 2.3 – Compare and contrast wireless security protocols and authentication methods.
- Protocols and Encryption
- WEP
- WPA
- WPA2
- TKIP
- AES
- Authentication
- Single-factor
- Multifactor
- RADIUS
- TACACS
- 2.4 – Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
- Malware
- Ransomware
- Trojan
- Keylogger
- Rootkit
- Virus
- Botnet
- Worm
- Spyware
- Tools and methods
- Antivirus
- Anti-malware
- Recovery console
- Backup/restore
- End user education
- Software firewalls
- Secure DNS
- 2.5 – Compare and contrast social engineering, threats, and vulnerabilities.
- Social Engineering
- Phishing
- Spear phishing
- Impersonation
- Shoulder surfing
- Tailgating
- Dumpster diving
- DDoS
- DoS
- Zero-day
- Man-in-the-middle
- Brute force
- Dictionary
- Rainbow table
- Spoofing
- Non-compliant systems
- Zombie
- 2.6 – Compare and contrast the differences of basic Microsoft Windows OS security settings.
- User and groups
- Administrator
- Power user
- Guest
- Standard user
- NTFS vs. Share permissions
- Allow vs. deny
- Moving vs. copying folders and files
- File attributes
- Shared files and folders
- Administrative shares vs. local shares
- Permission propagation
- Inheritance
- System files and folders
- User authentication
- Single sign-on
- Run as administrator vs. standard user
- BitLocker
- BitLocker to Go
- EFS
- 2.7 – Given a scenario, implement security best practices to secure a workstation.
- Password best practices
- Setting strong passwords
- Password expiration
- Screensaver required password
- BIOS/UEFI passwords
- Requiring passwords
- Account management
- Restricting user permissions
- Logon time restrictions
- Disabling guest account
- Failed attempts lockout
- Timeout/screen lock
- Change default admin user account/password
- Basic Active Directory functions
- Account creation
- Account deletion
- Password reset/unlock account
- Disable account
- Disable autorun
- Data encryption
- Patch/update management
- 2.8 – Given a scenario, implement methods for securing mobile devices.
- Screen locks
- Fingerprint lock
- Face lock
- Swipe lock
- Passcode lock
- Remote wipes
- Locator applications
- Remote backup applications
- Failed login attempts restrictions
- Antivirus/Anti-malware
- Patching/OS updates
- Biometric authentication
- Full device encryption
- Multifactor authentication
- Authenticator applications
- Trusted sources vs. untrusted sources
- Firewalls
- Policies and procedures
- BYOD vs. corporate-owned
- Profile security requirements
- 2.9 – Given a scenario, implement appropriate data destruction and disposal methods.
- Physical destruction
- Shredder
- Drill/hammer
- Electromagnetic (Degaussing)
- Incineration
- Certificate of destruction
- Recycling or repurposing best practices
- Low-level format vs. standard format
- Overwrite
- Drive wipe
- 2.10 – Given a scenario, configure security on SOHO wireless and wired networks.
- Wireless-specific
- Changing default SSID
- Setting encryption
- Disabling SSID broadcast
- Antenna and access point placement
- Radio power levels
- WPS
- Change default usernames and passwords
- Enable MAC filtering
- Assign static IP addresses
- Firewall settings
- Port forwarding/mapping
- Disabling ports
- Content filtering/parental controls
- Update firmware
- Physical security
Domain 3.0 – Software Troubleshooting
- 3.1 – Given a scenario, troubleshoot Microsoft Windows OS problems.
- Common symptoms
- Slow performance
- Limited connectivity
- Failure to boot
- No OS found
- Application crashes
- Blue screens
- Black screens
- Printing issues
- Services fail to start
- Slow bootup
- Slow profile load
- Common solutions
- Defragment the hard drive
- Reboot
- Kill tasks
- Restart services
- Update network settings
- Reimage/reload OS
- Roll back updates
- Roll back devices drivers
- Apply updates
- Repair application
- Update boot order
- Disable Windows services/applications
- Disable application startup
- Safe boot
- Rebuild Windows profiles
- 3.2 – Given a scenario, troubleshoot and resolve PC security issues.
- Common symptoms
- Pop-ups
- Browser redirection
- Security alerts
- Slow performance
- Internet connectivity issues
- PC/OS lockup
- Application crash
- OS updates failures
- Rogue antivirus
- Spam
- Renamed system files
- Disappearing files
- File permission changes
- Hijacked email
- Responses from users regarding email
- Automated replies from unknown sent email
- Access denied
- Invalid certificate (trusted root CA)
- System/application log errors
- 3.3 – Given a scenario, use best practice procedures for malware removal.
- 1. Identify and research malware symptoms.
- 2. Quarantine the infected systems.
- 3. Disable System Restore (in Windows).
- 4. Remediate the infected systems.
- a. Update the anti-malware software.
- b. Scan and use removal techniques (safe mode, pre-installation environment).
- 5. Schedule scans and run updates.
- 6. Enable System Restore and create a restore point (in Windows).
- 7. Educate the end user.
- 3.4 – Given a scenario, troubleshoot mobile OS and application issues.
- Common symptoms
- Dim display
- Intermittent wireless
- No wireless connectivity
- No Bluetooth connectivity
- Cannot broadcast to external monitor
- Touchscreen non-responsive
- Apps not loading
- Slow performance
- Unable to decrypt email
- Extremely short battery life
- Overheating
- Frozen system
- No sound from speakers
- Inaccurate touch screen response
- System lockout
- App log errors
- 3.5 – Given a scenario, troubleshoot mobile OS and application security issues.
- Common symptoms
- Signal drop/weak signal
- Power drain
- Slow data speeds
- Unintended WiFi connection
- Unintended Bluetooth pairing
- Leaked personal files/data
- Data transmission over limit
- Unauthorized account access
- Unauthorized location tracking
- Unauthorized camera/microphone activation
- High resource utilization
- 4.1 – Compare and contrast best practices associated with types of documentation.
- Network topology diagrams
- Knowledge base/articles
- Incident documentation
- Regulatory and compliance policy
- Acceptable use policy
- Password policy
- Inventory management
- Asset tags
- Barcodes
- 4.2 – Given a scenario, implement basic change management best practices.
- Documented business processes
- Purpose of the change
- Scope the change
- Risk analysis
- Plan for change
- End-user acceptance
- Change board
- Approvals
- Backout plan
- Document changes
- 4.3 – Given a scenario, implement basic disaster prevention and recovery methods.
- Backup and recovery
- Image level
- File level
- Critical applications
- Backup testing
- UPS
- Surge protector
- Cloud storage vs. local storage backups
- Account recovery options
- 4.4 – Explain common safety procedures.
- Equipment grounding
- Proper component handling and storage
- Antistatic bags
- ESD straps
- ESD mats
- Self-grounding
- Toxic waste handling
- Batteries
- Toner
- CRT
- Cell phones
- Tablets
- Personal safety
- Disconnect power before repairing PC
- Remove jewelry
- Lifting techniques
- Weight limitations
- Electrical fire safety
- Cable management
- Safety goggles
- Air filter mask
- Compliance with government regulations
- 4.5 – Explain environmental impacts and appropriate controls.
- MSDS documentation for handling and disposal
- Temperature, humidity level awareness, and proper ventilation
- Power surges, brownouts, and blackouts
- Battery backup
- Surge suppressor
- Protection from airborne particles
- Enclosures
- Air filters/mask
- Dust and debris
- Compressed air
- Vacuums
- Compliance to government regulations
- 4.6 – Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts.
- Incident response
- First response
- Identify
- Report through proper channels
- Data/device preservation
- Use of documentation/documentation changes
- Chain of custody
- Tracking of evidence/ documenting process
- Licensing/DRM/EULA
- Open-source vs. commercial license
- Personal license vs. enterprise licenses
- Regulated data
- PII
- PCI
- GDPR
- PHI
- Follow all policies and security best practices
- 4.7 – Given a scenario, use proper communication techniques and professionalism.
- Use proper language and avoid jargon, acronyms, and slang, when applicable
- Maintain a positive attitude/ project confidence
- Actively listen (taking notes) and avoid interrupting the customer
- Be culturally sensitive
- Use appropriate professional titles, when applicable
- Be on time (if late, contact the customer)
- Avoid distractions
- Enclosures
- Air filters/mask
- Dust and debris
- Personal calls
- Texting/social media sites
- Talking to coworkers while interacting with customers
- Personal interruptions
- Dealing with difficult customers or situations
- Do not argue with customers and/or be defensive
- Avoid dismissing customer problems
- Avoid being judgmental
- Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
- Do not disclose experiences via social media outlets
- Set and meet expectations/timeline and communicate status with the customer
- Offer different repair/ replacement options, if applicable
- Provide proper documentation on the services provided
- Follow up with customer/user at a later date to verify satisfaction
- Deal appropriately with customers’ confidential and private materials
- Located on a computer, desktop, printer, etc.
- 4.8 – Identify the basics of scripting.
- Script file types
- .bat
- .ps1
- .vbs
- .sh
- .py
- .js
- Environment variables
- Comment syntax
- Basic script constructs
- Basic loops
- Variables
- Basic data types
- Integers
- Strings
Domain 4.0 – Operational Procedures
- 4.9 – Given a scenario, use remote access technologies.
- RDP
- Telnet
- SSH
- Third-party tools
- Screen share feature
- File share
- Security considerations of each access method