These objectives are copied from CompTIA's objectives PDF. Read more about the A+ or see what resources I used.
- Windows 10 editions ⟹ 3 out of 4 desktops today run Windows; Win10 was released 2015, Win11 in 2021; support for Win7 and 8.1 has just ended in Jan 2023; that being said, Win8 and 8.1, Win7, Vista, XP, and even Win95 are all still being used today to control old equipment, older trains, etc. and make up 15% of all the Windows versions used today; Win10 was made to be an OS for all platforms; 14 versions have been released with the last one being 22H2 in Oct 2022
- Home ⟹ default edition if you buy computer at the store for home, not office work; integration with Microsoft account; OneDrive backups; Windows Defender antivirus and anti-malware; Cortana voice assistant but because usage by customers is declining, Microsoft is removing it from recent versions
- Pro ⟹ for business; ability to set up device as Remote Desktop host for others to be able to remotely control it, good for WFH or support environments; BitLocket full disk encryption, or FDE; joining Windows domain to connect to Active Directory server to allow IT to manage and control configurations of all devices via Group Policy
- Pro for Workstations ⟹ for high-end desktops and people who need to push the OS capabilities; up to 4 CPUs; up to 6 TB of RAM; support for ReFS (Resilient File System) like in Windows Server
- Enterprise ⟹ large implementations with many desktops in an enterprise environment; volume licensing to deploy all systems at a reasonable cost; with large environments you need additonal management capabilities, which AppLocker lets administrators control which apps can run in enterprise environment; many enterprises have remote sites, and BranchCache allows you to cache files at the remote site instead of pulling them across slower WAN connections; Granular User Experience (UX) control allows complete customization of UX—for a kiosk, for example, or setting very specific configuration for user's desktop
- Hardware requirements
- Feature differences ⟹ see image
- Domain access vs. workgroup
- Desktop styles/user interface
- Availability of Remote Desktop Protocol (RDP)
- Random-access memory (RAM) support limitations
- BitLocker
- gpedit.msc
- Upgrade paths
- In-place upgrade
- CompTIA 1002 features:
- Windows 8.x
- Windows 8.x
- Windows 10
- Corporate vs. personal needs ==> Corporate vs personal needs
- Domain access
- BitLocker
- Media center
- BranchCache
- EFS
- Desktop styles/user interface
-
- RAM limitations
- Software compatibility
-
Workstation operating systems
- Microsoft Windows ==> most prevalent, most targeted
- Apple Macintosh OS ==> less vulnerable, hardware is expensive
- Linux ==> open source, under nobody's authority, helpful community
-
Cell phone/tablet operating systems
- Microsoft Windows ==> (Windows Mobile) now deprecated with tablets today running full-blown Windows
- Android ==> based on Linux, standards are developed by the Open Handset Alliance, apps are developed with the Android SDK on any workstation
- iOS ==> closed source, apps are developed with the iOS SDK on macOS and must be approved
- Chrome OS ==> many manufacturers, also based on the Linux kernel, apps are web-based, good internet recommended, also it's more of a workstation OS
-
Vendor-specific limitations
- End-of-life ==> EOL policies and philosophies vary based on expectations about how often users will upgrade their device
- Update limitations ==> iOS, Android, and Windows prompt you for updates while Chrome OS is automatic (rolling release update method)
-
Compatibility concerns between operating systems ==> web-based is the most compatible
-
- Optical disc (CD-ROM, DVD, Blu-ray)
- External drive/flash drive (USB/eSATA)
- Network boot (PXE)
- Internal fixed disk (HDD/SSD)
- Internal hard drive (partition)
-
- Unattended installation
- In-place upgrade
- Clean install
- Repair installation
- Multiboot
- Remote network installation
- Image deployment
- Recovery partition
- Refresh/restore
-
- Dynamic
- Basic
- Primary
- Extended
- Logical
- GPT
-
File system types/formatting ==> Formatting
- ExFAT
- FAT32
- NTFS
- CDFS
- NFS
- ext3, ext4
- HFS
- Swap partition
- Quick format vs. full format
-
Load alternate third-party drivers when necessary ==> More on installing
-
Workgroup vs. Domain setup ==> if you're setting up for a Domain then you need the proper credentials to connect to that network
-
Time/date/region/language settings
-
Driver installation, software, and Windows updates ==> perform an update after install to make sure you have the latest security patches
-
Factory recovery partition ==> Partitioning
-
Properly formatted boot drive with the correct partitions/format
-
Prerequisites/hardware compatibility ==> use Windows 10 Upgrade Checker to ensure the hardware is compatible and you meet the minimum OS requirements
-
Application compatibility
-
OS compatibility/upgrade path ==> you can't upgrade from 32-bit to 64-bit or vice versa, you must migrate
- Navigation
dir
is the Windowsls
cd
Windows isn't case sensitive socd \users
orcd \Users
..
move up (or if Seinfeld, move down)
cls
is the Windowsclear
ipconfig
==> Commands introping
==> ping and tracerttracert
==> ping and tracertnetstat
==> netstat and nslookupnslookup
==> netstat and nslookupshutdown
==> 108. shutdown- dism
sfc
==> sfc and chkdskchkdsk
==> sfc and chkdskdiskpart
==> format and diskparttaskkill
==> Commands introgpupdate
==> gpupdate and gpresultgpresult
==> gpupdate and gpresultformat
==> format and diskpartcopy
==> copyxcopy
==> copyrobocopy
==> copynet use
==> netnet user
==> net[command name] /?
orhelp [command name]
- Commands available with standard privileges vs. administrative privileges ==> Commands intro
-
Administrative
- Computer Management ==> mmc
- Device Manager ==> devmgmt.msc
- Local Users and Groups
- Local Security Policy
- Performance Monitor ==> perfmon
- Services ==> services.msc
- System Configuration ==> MSConfig
- Task Scheduler
- Component Services
- Data Sources
- Print Management
- Windows Memory Diagnostics ==> Memory Diagnostics
- Windows Firewall ==> Firewall
- Advanced Security ==> Firewall
- Event Viewer
- User Account Management
-
- General
- Boot
- Services
- Startup
- Tools
-
- Applications
- Processes
- Performance
- Networking
- Users
-
- Drive status
- Mounting
- Initializing
- Extending partitions
- Splitting partitions
- Shrink partitions
- Assigning/changing drive letters
- Adding drives
- Adding arrays
- Storage spaces
-
System utilities
- Regedit ==> regedit
- Command
- Services.msc ==> services.msc
- MMC ==> mmc
- MSTSC ==> mstsc
- Notepad ==> text editor where you can view and edit log files for example
- Explorer ==> Windows Explorer renamed to File Explorer in Windows 10; change permissions, access network resources/modify files in a share...
- Msinfo32 ==> msinfo32
- DxDiag ==> dxdiag
- Disk Defragmenter ==> defrag
- System Restore
- Windows Update
-
- Connections
- Security
- General
- Privacy
- Programs
- Advanced
-
Display/Display Settings ==> Display
- Resolution
- Color depth
- Refresh rate
-
- View hidden files
- Hide extensions
- General options
- View options
-
- Performance (virtual memory)
- Remote settings
- System protection
-
Windows Firewall ==> Firewall
-
- Hibernate
- Power plans
- Sleep/suspend
- Standby
-
Sound ==> settings for output and input options, and you can configure the line levels for each individual device
-
System requirements ==> App install requirements
- Drive space
- RAM
-
OS requirements ==> App install requirements
- Compatibility
-
Methods of installation and deployment ==> Install methods
- Local (CD/USB)
- Network-based
-
- Folder/file access for installation
-
- Impact to device
- Impact to network
-
Domain setup ==> Domain
-
Network shares/administrative shares/mapping drives ==> Network shares and Mapping drives
-
Printer sharing vs. network printer mapping ==> Printer sharing
-
Establish networking connections ==> Network and Sharing Center
-
Proxy settings ==> Proxy settings
-
Remote Desktop Connection ==> Remote Desktop Connection
-
Remote Assistance ==> Remote Assistance
-
Home vs. Work vs. Public network settings ==> Home vs. Work vs. Public
-
Firewall settings ==> Firewall advanced
- Exceptions
- Configuration
- Enabling/disabling Windows Firewall
-
Configuring an alternative IP address in Windows ==> IP address
- IP addressing
- Subnet mask
- DNS
- Gateway
-
Network card properties
- Half duplex/full duplex/auto ==> Link speed and duplex
- Speed ==> Link speed and duplex
- Wake-on-LAN ==> Wake-on-LAN
- QoS ==> QoS
- BIOS (on-board NIC) ==> BIOS
1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
-
Best practices
- Scheduled backups ==> Time Machine
- Scheduled disk maintenance ==> Disk Utility and Disk maintenance
- System updates/App Store ==> App Store and apt-get and yum
- Patch management ==> App Store and apt-get and yum
- Driver/firmware updates ==> System Information and apt-get and yum
- Antivirus/Anti-malware updates ==> Antivirus
-
Tools
- Backup/Time Machine ==> Time Machine
- Restore/Snapshot ==> Time Machine
- Image recovery ==> Disk Utility
- Disk maintenance utilities ==> Disk Utility
- Shell/Terminal ==> Terminal
- Screen sharing
- Force Quit
-
Features
- Multiple desktops/Mission Control ==> Mission Control
- Keychain
- Spotlight
- iCloud
- Gestures ==> Mission Control
- Finder
- Remote Disc
- Dock
- Boot Camp
-
Basic Linux commands
- ls ==> Unix commands intro
- grep ==> Unix commands intro
- cd ==> Unix commands intro
- shutdown
- pwd vs. passwd ==> Unix commands intro vs. passwd
- mv ==> Files and folders
- cp ==> Files and folders
- rm ==> Files and folders
- chmod
- chown
- iwconfig and ifconfig
- ps
- su and sudo
- apt-get
- vi
- dd
- kill
- Access control vestibule ==> Entrance security
- Badge reader ==> Entrance security
- Smart card ==> Tokens
- Security guard ==> Entrance security
- Door lock ==> Door locks
- Biometric locks ==> Door locks
- Hardware tokens ==> Tokens
- Cable locks ==> Other physical measures
- Server locks ==> Other physical measures
- USB locks ==> Other physical measures
- Privacy screen ==> Other physical measures
- Key fobs ==> Door locks
- Entry control roster ==> Entrance security
-
- Login script
- Domain
- Group Policy/Updates
- Organizational Units
- Home Folder
- Folder redirection
-
Software tokens
-
MDM policies ==> MDM
-
MAC address filtering ==> MAC filtering
-
Antivirus/Anti-malware ==> Security admin
-
Firewalls
-
User authentication/strong passwords
-
Multifactor authentication
-
Directory permissions
-
VPN
-
DLP
-
Access control lists
-
Smart card
-
Email filtering
-
Trusted/untrusted software sources
-
Principle of least privilege
- Protocols and encryption
- WEP
- WPA
- WPA2
- TKIP
- AES
- Authentication
- Single-factor
- Multifactor
- RADIUS
- TACACS
- Malware
- Ransomware
- Trojan
- Keylogger
- Rootkit
- Virus
- Botnet
- Worm
- Spyware
- Tools and methods
- Antivirus
- Anti-malware
- Recovery console
- Backup/restore
- End user education
- Software firewalls
- DNS configuration
- Social engineering
- Phishing
- Spear phishing
- Impersonation
- Shoulder surfing
- Tailgating
- Dumpster diving
- Phishing
- DDoS
- DoS
- Zero-day
- On-path attack (previously known as man-in-the-middle attack)
- Brute force
- Dictionary
- Rainbow table
- Spoofing
- Non-compliant systems
- Zombie
- User and groups
- Administrator
- Power user
- Guest
- Standard user
- NTFS vs. share permissions
- Allow vs. deny
- Moving vs. copying folders and files
- File attributes
- Shared files and folders
- Administrative shares vs. local shares
- Permission propagation
- Inheritance
- System files and folders
- User authentication
- Single sign-on
- Run as administrator vs. standard user
- BitLocker
- BitLocker To Go
- EFS
- Password best practices
- Setting strong passwords
- Password expiration
- Screensaver required password
- BIOS/UEFI passwords
- Requiring passwords
- Account management
- Restricting user permissions
- Logon time restrictions
- Disabling guest account
- Failed attempts lockout
- Timeout/screen lock
- Change default admin user account/password
- Basic Active Directory functions
- Account creation
- Account deletion
- Password reset/unlock account
- Disable account
- Disable autorun
- Data encryption
- Patch/update management
- Screen locks
- Fingerprint lock
- Face lock
- Swipe lock
- Passcode lock
- Remote wipes
- Locator applications
- Remote backup applications
- Failed login attempts restrictions
- Antivirus/Anti-malware
- Patching/OS updates
- Biometric authentication
- Full device encryption
- Multifactor authentication
- Authenticator applications
- Trusted sources vs. untrusted sources
- Firewalls
- Policies and procedures
- BYOD vs. corporate-owned
- Profile security requirements
- Physical destruction
- Shredder
- Drill/hammer
- Electromagnetic (Degaussing)
- Incineration
- Certificate of destruction
- Recycling or repurposing best practices
- Low-level format vs. standard format
- Overwrite
- Drive wipe
- Wireless-specific
- Changing default SSID
- Setting encryption
- Disabling SSID broadcast
- Antenna and access point placement
- Radio power levels
- WPS
- Change default usernames and passwords
- Enable MAC filtering
- Assign static IP addresses
- Firewall settings
- Port forwarding/mapping
- Disabling ports
- Content filtering/parental controls
- Update firmware
- Physical security
- Common symptoms
- Slow performance
- Limited connectivity
- Failure to boot
- No OS found
- Application crashes
- Blue screens
- Blank screens
- Printing issues
- Services fail to start
- Slow bootup
- Slow profile load
- Common solutions
- Defragment the hard drive
- Reboot
- Kill tasks
- Restart services
- Update network settings
- Reimage/reload OS
- Roll back updates
- Roll back devices drivers
- Apply updates
- Repair application
- Update boot order
- Disable Windows services/applications
- Disable application startup
- Safe boot
- Rebuild Windows profiles
- Common symptoms
- Pop-ups
- Browser redirection
- Security alerts
- Slow performance
- Internet connectivity issues
- PC/OS lockup
- Application crash
- OS updates failures
- Rogue antivirus
- Spam
- Renamed system files
- Disappearing files
- File permission changes
- Hijacked email
- Responses from users regarding email
- Automated replies from unknown sent email
- Access denied
- Invalid certificate (trusted root CA)
- System/application log errors
- Identify and research malware symptoms.
- Quarantine the infected systems.
- Disable System Restore (in Windows).
- Remediate the infected systems.
- Update the anti-malware software.
- Scan and use removal techniques (safe mode, pre-installation environment).
- Schedule scans and run updates.
- Enable System Restore and create a restore point (in Windows).
- Educate the end user.
- Common symptoms
- Dim display
- Intermittent wireless
- No wireless connectivity
- No Bluetooth connectivity
- Cannot broadcast to external monitor
- Touchscreen non-responsive
- Apps not loading
- Slow performance
- Unable to decrypt email
- Extremely short battery life
- Overheating
- Frozen system
- No sound from speakers
- Inaccurate touch screen response
- System lockout
- App log errors
- Common symptoms
- Signal drop/weak signal
- Power drain
- Slow data speeds
- Unintended WiFi connection
- Unintended Bluetooth pairing
- Leaked personal files/data
- Data transmission over limit
- Unauthorized account access
- Unauthorized location tracking
- Unauthorized camera/microphone activation
- High resource utilization
- Network topology diagrams
- Knowledge base/articles
- Incident documentation
- Regulatory and compliance policy
- Acceptable use policy
- Password policy
- Inventory management
- Asset tags
- Barcodes
- Documented business processes
- Purpose of the change
- Scope the change
- Risk analysis
- Plan for change
- End-user acceptance
- Change board
- Approvals
- Backout plan
- Document changes
- Backup and recovery
- Image level
- File level
- Critical applications
- Backup testing
- UPS
- Surge protector
- Cloud storage vs. local storage backups
- Account recovery options
- Equipment grounding
- Proper component handling and storage
- Antistatic bags
- ESD straps
- ESD mats
- Self-grounding
- Toxic waste handling
- Batteries
- Toner
- CRT
- Cell phones
- Tablets
- Personal safety
- Disconnect power before repairing PC
- Remove jewelry
- Lifting techniques
- Weight limitations
- Electrical fire safety
- Cable management
- Safety goggles
- Air filter mask
- Compliance with government regulations
- MSDS documentation for handling and disposal
- Temperature, humidity level awareness, and proper ventilation
- Power surges, under-voltage events, and power loss
- Battery backup
- Surge suppressor
- Protection from airborne particles
- Enclosures
- Air filters/mask
- Dust and debris
- Compressed air
- Vacuums
- Compliance to government regulations
4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts.
- Incident response
- First response
- Identify
- Report through proper channels
- Data/device preservation
- Use of documentation/documentation changes
- Chain of custody
- Tracking of evidence/ documenting process
- First response
- Licensing/DRM/EULA
- Open-source vs. commercial license
- Personal license vs. enterprise licenses
- Regulated data
- PII
- PCI
- GDPR
- PHI
- Follow all policies and security best practices
- Use proper language and avoid jargon, acronyms, and slang, when applicable
- Maintain a positive attitude/ project confidence
- Actively listen (taking notes) and avoid interrupting the customer
- Be culturally sensitive
- Use appropriate professional titles, when applicable
- Be on time (if late, contact the customer)
- Avoid distractions
- Personal calls
- Texting/social media sites
- Talking to coworkers while interacting with customers
- Personal interruptions
- Dealing with difficult customers or situations
- Do not argue with customers and/or be defensive
- Avoid dismissing customer problems
- Avoid being judgmental
- Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
- Do not disclose experiences via social media outlets
- Set and meet expectations/timeline and communicate status with the customer
- Offer different repair/replacement options, if applicable
- Provide proper documentation on the services provided
- Follow up with customer/user at a later date to verify satisfaction
- Deal appropriately with customers’ confidential and private materials
- Located on a computer, desktop, printer, etc.
- Script file types
- .bat
- .ps1
- .vbs
- .sh
- .py
- .js
- Environment variables
- Comment syntax
- Basic script constructs
- Basic loops
- Variables
- Basic data types
- Integers
- Strings
- RDP ⟹ https://www.cyberlinkasp.com/wp-content/uploads/2014/03/how-does-remote-desktop-work-what-is-rdp-1024x478.png
- Telnet
- SSH
- Third-party tools
- Screen share feature
- File share
- Security considerations of each access method