Exam

220-902

CompTIA A+ Certification Exam Objectives

comptia logo

EXAM NUMBER: 220-902 ( pdf )

os
os
Untitled-2
lock
softwarets
trouble_3

1.0 Windows Operating Systems


1.1

Compare and contrast various features and requirements of Microsoft Operating Systems.


1.2

Given a scenario, install Windows PC operating systems using appropriate methods. (Planning a Windows Installation)


1.3

Given a scenario, apply appropriate Microsoft command line tools.

  • TASKKILL
  • BOOTREC
  • SHUTDOWN
  • TASKLIST
  • MD
  • RD
  • CD
  • DEL
  • FORMAT
  • COPY
  • XCOPY
  • ROBOCOPY
  • DISKPART
  • SFC
  • CHKDSK
  • GPUPDATE
  • GUPRESULT
  • DIR
  • EXIT
  • HELP
  • EXPAND
  • [command name] /?
  • Commands available with standard privileges vs. administrative privileges

1.4

Given a scenario, use appropriate Microsoft operating system features and tools.

  • Administrative
    • Computer management, Device manager
    • Local users and groups, Local security policty
    • Performance monitor, Services, System configuration
    • Task scheduler, Component services, Data sources, Print Management
    • Windows memory diagnostics, Windows firewall, Advaned Security
  • MSCONFIG
    • General
    • Boot
    • Services
    • Startup
    • Tools
  • Task Manager
    • Applications
    • Processes
    • Performance
    • Networking
    • Users
  • Disk management
    • Drive status, Mounting
    • Initializing, Extending partitions
    • Splitting partitions, shrink partitions
    • Assigning/changing drive letters, Adding drives
    • Adding arrays, Storage spaces
  • Other
    • User State Migration tool (USMT)
    • Windows Easy Transfer
    • Windows UPgrade Advisor
  • System utilities
    • REGEDIT, COMMAND
    • SERVICES MSC, MMC, MSTSC
    • NOTEPAD, EXPLORER
    • DXDIAG, DEFRAG, MSINFO32
    • System restore, Windows Update

1.5

Given a scenario, use Windows Control Panel utilities.

  • Internet options
    • Connections, Security
    • General, Privacy
    • Programs, Advanced
  • Display/display settings
    • Resolution
    • Color depth
    • Refresh rate
  • Folder options
    • View hidden files
    • Hide extensions, General options
    • View options
  • System
    • Performance (virtual memory)
    • Remote settings
    • System protection
  • Power options
    • Hibernate, Power plans
    • Sleep/suspend
    • Standby
  • User accounts
  • Windows firewall
  • Programs and features
  • HomeGroup
  • Devices and printers
  • Sound
  • Troubleshooting
  • Network and Sharing Center
  • Device Manager

1.6

Given a scenario, install and configure Windows networking on a client/desktop.


1.7

Perform common preventive maintenance procedures using the appropriate Windows OS tools.

  • Best Practices
    • Scheduled backups, Scheduled disk maintenance
    • Windows updates, Patch management
    • Drive/firmware updates, Antivirus/Anti-malware updates
  • Tools
    • Backup
    • System Restore, Recovery image
    • Disk maintenance utilities
2.1

Identify common features and functionality of the Mac OS and Linux operating systems.


2.2

Given a scenario, set up and use client-side virtualization.

  • Purpose of virtual machines
  • Resource requirements
  • Emulator requirements
  • Security requirements
  • Network requirements
  • Hypervisor

2.3

Identify basic cloud concepts.

  • SaaS
  • IaaS
  • PaaS
  • Public vs. Private vs. Hybrid vs. Community
  • Rapid Elasticity
  • On-demand
  • Resource pooling
  • Measured service

2.4

Summarize the properties and purpose of services provided by networked hosts.

  • Server roles
    • Web server, File server, Printer server
    • DHCP server, DNS server, Proxy server
    • Mail server, Authentication server
  • Internet appliance
    • UTM
    • IDS
    • IPS
  • Legacy/embedded systems

2.5

Identify basic features of mobile operating systems.


2.6

Install and configure basic mobile device network connectivity and email.

  • Wireless/cellular data network (enable/disable)
    • Hotspot
    • Tethering
    • Airplane mode
  • Bluetooth
    • Enable Bluetooth, Enable pairing
    • Find device for pairing
    • Enter appropriate pin code, Test connectivity
  • Corporate and ISP email configuration
    • POP3, IMAP
    • Port and SSL settings
    • Exchange, S/MIME
  • Integrated commercial provider email configuration
    • Google/Inbox, Yahoo
    • Outlook.com
    • iCloud
  • PRI updates/PRL updates/Baseband updates
  • Radio firmware
  • IMEI vs. IMSI
  • VPN

2.7

Summarize methods and data related to mobile device synchronization.

  • Types of data to synchronize
    • Contacts, Programs, Email, Pictures
    • Music, Videos, Calendar, Bookmarks,
    • Documents, Location data, social media data, eBooks
  • Synchronization methods
    • Synchronize to the Cloud
    • Synchronize to the Desktop
  • Mututal authentication for multiple services (SSO)
  • Software requirements to install the application on the PC
  • Connection types to enable synchronization
3.1

Identify common security threats and vulnerabilities


3.2

Compare and contrast common prevention methods.


3.3

Compare and contrast differences of basic Windows OS security settings.

  • User and groups
    • Administrator, Power user
    • Guest
    • Standard user
  • NTFS vs. Share permissions
    • Allow vs. deny
    • Moving vs. copying folders and files
    • File attributes
  • Shared files and folders
    • Administrative shares vs. local shares
    • Permission propagation
    • Inheritance
  • User authentication
    • Single sign-on
  • System files and folders
  • Run as administrator vs. standard user
  • BitLocker
  • BitLocker-To-Go
  • EFS

3.4

Given a scenario, deploy and enforce security best practices to secure a workstation.


3.5

Compare and contrast various methods for securing mobile devices.

  • Screen locks
    • Fingerprint lock, Face lock
    • Swipte lock, Passcode Lock
  • Policies and procedures
    • BYOD vs corporate owned
    • Profile security requirements
  • Remote wipes
  • Locator applications
  • Remote backup applications
  • Failed login attempt restrictions
  • Antivirus/anti-malware
  • Patching/OS updates
  • Biometric authentication
  • Full device encryption
  • Multifactor authentication
  • Authenticator applications
  • Trusted sources vs. untrusted sources
  • Firewalls

3.6

Given a scenario, use appropriate data destruction and disposal methods.

  • Physical destruction
    • Shredder, Drill/hammer
    • Electromagnetic (Degaussing)
    • Incineration, Certificate of destruction
  • Recycling or repurposing best practices
    • Low level format vs. standard format
    • Overwrite
    • Drive-wipe

4.1

Given a scenario, troubleshoot PC operating system problems with appropriate tools.


4.2

Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.

  • Common symptoms
    • Pop-ups, Browser redirection
    • Security alerts, Slow performance
    • Internet connectivity issues, PC/OS lock up
    • Application crash, OS updates failures
    • Rogue antivirus, Spam
    • Renamed system files, Files disappearing
    • File permission changes
    • Hijacked email
      • Responses from users regarding email
      • Automated replies form unknown sent email
    • Access denied, Inavalid certificate (trusted root CA
  • Tools
    • Antivirus software
    • Anti-malware software
    • Recovery console
    • Terminal
    • System restore/Snapshot
    • Pre-installation environments
    • Event viewer
    • Refresh/restore
    • MSCONFIG/Safe boot
  • Best practice procedure for malware removal
    • Identify malware symptoms
    • Quarantine infected system
    • Disable system restore (in Windows)
    • Remediate infected systems
      • Update anti-malware software
      • Scan and removal techniques (safe mode, pre-installation environment
    • Schedule scans and run updates
    • Enable system restore and create restore point (in Windows)
    • Educate end user

4.3

Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.

  • Common symptoms
    • Dim display, Intermittent wireless
    • No wireless connectivity, No Bluetooth connectivity
    • Cannot broadcast to external monitor
    • Touchscreen non-responsive, Apps not loading, Slow performance
    • Unable to decrypt email, Extremely short battery life, Overheating
    • Frozen system, No sound from speakers
    • Inaccurate touch screen response, System lockout
  • Tools
    • Hard reset
    • Soft reset
    • Close running applications
    • Reset to factory default
    • Adjust configurations/settings
    • Uninstall/reinstall apps
    • Force stop

4.4

Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools.

  • Common symptoms
    • Signal drop/weak signal, Power drain
    • Slow data speeds, Unintended WiFi connection
    • Unintended Bluetooth pairing, Leaked personal files/data
    • Data transmission overlimit, Unauthorized account access
    • Unauthroized account access
    • Unauthroized root access, Unauthorized location tracking
    • Unauthorized camera/microphone activation
    • High resource utilization
  • Tools
    • Anti-malware
    • App scanner
    • Factory reset/clean install
    • Uninstall/reinstall apps
    • WiFi analyzer
    • Force stop
    • Cell tower analyzer
    • Backup/restore
      • iTunes/iCloud/Apple Configurator
      • Google Sync
      • One Drive
5.1

Given a scenario, use appropriate safety procedures.

  • Equipment grounding
  • Compliance with local government regulations
  • Proper component handling and storage
    • Anti-static bags
    • ESD straps, ESD mats
    • Self-grounding
  • Toxic waste handling
    • Batteries
    • Toner
    • CRT
  • Personal safety
    • Disconnect power before repairing PC
    • Remove jewelry, Lifting techniques
    • Weight limitations, Electrical fire safety
    • Cable management, Safety goggles
    • Air filter mask

5.2

Given a scenario with potential environmental impacts, apply the appropriate controls.

  • MSDS documentation for handling and disposal
  • Temperatur, humidity level awareness and proper ventilation
  • Compliance to local government regulations
  • Power surges, brownouts, blackouts
    • Battery backup
    • Surge suppresor
  • Protection from airborne particles
    • Enclosures
    • SAir filters/mask
  • Dust and debris
    • Compressed air
    • Vacuums

5.3

Summarize the process of addressing prohibited content/ activity, and explain privacy, licensing and policy concepts.

  • Incident Response
    • First response
      • Identify
      • Report through proper channels
      • Data/device preservation
    • User of documentation/documentation changes
    • Chain of custody
      • Tracking of evidence/documenting process
  • Licensing/DRM/EULA
    • Open source vs. commercial license
    • Personal license vs. enterprise licenses
  • Personally Identifiable Information
  • Follow corporate end-user policies and security best practices

5.4

Demonstrate proper communication techniques and professionalism.

  • Use proper language - avoid jargon, acronyms and slang when applicable
  • Maintain a positive attitude/project confidence
  • Actively listen (taking notes) and avoid interrupting the customer
  • Be on time (if late contact the customer)
  • Be culturally sensitive
    • Use appropriate professional titles, when applicable
  • Deal appropriately with customers confidential and private materials
    • Located on a computer, desktop, printer, etc
  • Avoid distractions
    • Personal calls, Texting/social media sites
    • Talking to co-workers while interacting with customers
    • Personal interruptions
  • Set and meet expectations/timeline and community status with the customer
    • Offer different repair/replacement options if applicable
    • Provide proper documentation on the services provided
    • Follow up with customer/user at a later date to verify satisfaction
  • Dealing with difficult customer or situation
    • Do not argue with customers and/or be defensive
    • Avoid dismissing customer problems
    • Avoid being judgmental
    • Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue or question to verify understanding)
    • Do not disclose experiences via socila media outlets

5.5

Given a scenario, explain the troubleshooting theory.

  • Always consider corporate policies, procedures and impacts before implementing changes
    • Identify the problem
      • Question the user and identify user changes to computer and perform backups before making changes
    • Establish a theory of probable cause (question the obvious)
      • If necessary, conduct external or internal research based on symptoms
    • Test the theory to determine cause
      • Once theory is confirmed, determine next steps to resolve problem
      • If theory is not confirmed, re-establish new theory or escalate
    • Establish a plan of action to resolve the problem and implement the solution
    • Verify full system functionality and if applicable implement preventive measures
    • Document findings, actions and outcomes