Skip to content

Latest commit

 

History

History
805 lines (704 loc) · 29.6 KB

CompTIA A+ 1102.md

File metadata and controls

805 lines (704 loc) · 29.6 KB

CompTIA A+ Core 2 (220-1102)

These objectives are copied from CompTIA's objectives PDF. Read more about the A+ or see what resources I used.

1.0 Operating Systems

1.1 Identify basic features of Microsoft Windows editions.

  • Windows 10 editions ⟹ 3 out of 4 desktops today run Windows; Win10 was released 2015, Win11 in 2021; support for Win7 and 8.1 has just ended in Jan 2023; that being said, Win8 and 8.1, Win7, Vista, XP, and even Win95 are all still being used today to control old equipment, older trains, etc. and make up 15% of all the Windows versions used today; Win10 was made to be an OS for all platforms; 14 versions have been released with the last one being 22H2 in Oct 2022
    • Home ⟹ default edition if you buy computer at the store for home, not office work; integration with Microsoft account; OneDrive backups; Windows Defender antivirus and anti-malware; Cortana voice assistant but because usage by customers is declining, Microsoft is removing it from recent versions
    • Pro ⟹ for business; ability to set up device as Remote Desktop host for others to be able to remotely control it, good for WFH or support environments; BitLocket full disk encryption, or FDE; joining Windows domain to connect to Active Directory server to allow IT to manage and control configurations of all devices via Group Policy
    • Pro for Workstations ⟹ for high-end desktops and people who need to push the OS capabilities; up to 4 CPUs; up to 6 TB of RAM; support for ReFS (Resilient File System) like in Windows Server
    • Enterprise ⟹ large implementations with many desktops in an enterprise environment; volume licensing to deploy all systems at a reasonable cost; with large environments you need additonal management capabilities, which AppLocker lets administrators control which apps can run in enterprise environment; many enterprises have remote sites, and BranchCache allows you to cache files at the remote site instead of pulling them across slower WAN connections; Granular User Experience (UX) control allows complete customization of UX—for a kiosk, for example, or setting very specific configuration for user's desktop
  • Hardware requirements
  • Feature differences ⟹ see image
    • Domain access vs. workgroup
    • Desktop styles/user interface
    • Availability of Remote Desktop Protocol (RDP)
  • Random-access memory (RAM) support limitations
  • BitLocker
  • gpedit.msc
  • Upgrade paths
    • In-place upgrade

1.1 Compare and contrast common operating system types and their purposes.

  • Bit widths

    • RAM limitations
    • Software compatibility
  • Workstation operating systems

    • Microsoft Windows ==> most prevalent, most targeted
    • Apple Macintosh OS ==> less vulnerable, hardware is expensive
    • Linux ==> open source, under nobody's authority, helpful community
  • Cell phone/tablet operating systems

    • Microsoft Windows ==> (Windows Mobile) now deprecated with tablets today running full-blown Windows
    • Android ==> based on Linux, standards are developed by the Open Handset Alliance, apps are developed with the Android SDK on any workstation
    • iOS ==> closed source, apps are developed with the iOS SDK on macOS and must be approved
    • Chrome OS ==> many manufacturers, also based on the Linux kernel, apps are web-based, good internet recommended, also it's more of a workstation OS
  • Vendor-specific limitations

    • End-of-life ==> EOL policies and philosophies vary based on expectations about how often users will upgrade their device
    • Update limitations ==> iOS, Android, and Windows prompt you for updates while Chrome OS is automatic (rolling release update method)
  • Compatibility concerns between operating systems ==> web-based is the most compatible

1.3 Summarize general OS installation considerations and upgrade methods.

  • Boot methods

    • Optical disc (CD-ROM, DVD, Blu-ray)
    • External drive/flash drive (USB/eSATA)
    • Network boot (PXE)
    • Internal fixed disk (HDD/SSD)
    • Internal hard drive (partition)
  • Types of installations

    • Unattended installation
    • In-place upgrade
    • Clean install
    • Repair installation
    • Multiboot
    • Remote network installation
    • Image deployment
    • Recovery partition
    • Refresh/restore
  • Partitioning

    • Dynamic
    • Basic
    • Primary
    • Extended
    • Logical
    • GPT
  • File system types/formatting ==> Formatting

    • ExFAT
    • FAT32
    • NTFS
    • CDFS
    • NFS
    • ext3, ext4
    • HFS
    • Swap partition
    • Quick format vs. full format
  • Load alternate third-party drivers when necessary ==> More on installing

  • Workgroup vs. Domain setup ==> if you're setting up for a Domain then you need the proper credentials to connect to that network

  • Time/date/region/language settings

  • Driver installation, software, and Windows updates ==> perform an update after install to make sure you have the latest security patches

  • Factory recovery partition ==> Partitioning

  • Properly formatted boot drive with the correct partitions/format

  • Prerequisites/hardware compatibility ==> use Windows 10 Upgrade Checker to ensure the hardware is compatible and you meet the minimum OS requirements

  • Application compatibility

  • OS compatibility/upgrade path ==> you can't upgrade from 32-bit to 64-bit or vice versa, you must migrate

1.4 Given a scenario, use appropriate Microsoft command line tools.

1.5 Given a scenario, use Microsoft operating system features and tools.

1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

1.7 Summarize application installation and configuration concepts.

1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop.

1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.

2.0 Security

2.1 Summarize the importance of physical security measures.

2.2 Explain logical security concepts.

  • Active Directory

    • Login script
    • Domain
    • Group Policy/Updates
    • Organizational Units
    • Home Folder
    • Folder redirection
  • Software tokens

  • MDM policies ==> MDM

  • Port security

  • MAC address filtering ==> MAC filtering

  • Certificates

  • Antivirus/Anti-malware ==> Security admin

  • Firewalls

  • User authentication/strong passwords

  • Multifactor authentication

  • Directory permissions

  • VPN

  • DLP

  • Access control lists

  • Smart card

  • Email filtering

  • Trusted/untrusted software sources

  • Principle of least privilege

2.3 Compare and contrast wireless security protocols and authentication methods.

  • Protocols and encryption
    • WEP
    • WPA
    • WPA2
    • TKIP
    • AES
  • Authentication
    • Single-factor
    • Multifactor
    • RADIUS
    • TACACS

2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.

  • Malware
    • Ransomware
    • Trojan
    • Keylogger
    • Rootkit
    • Virus
    • Botnet
    • Worm
    • Spyware
  • Tools and methods
    • Antivirus
    • Anti-malware
    • Recovery console
    • Backup/restore
    • End user education
    • Software firewalls
    • DNS configuration

2.5 Compare and contrast social engineering, threats, and vulnerabilities.

  • Social engineering
    • Phishing
      • Spear phishing
    • Impersonation
    • Shoulder surfing
    • Tailgating
    • Dumpster diving
  • DDoS
  • DoS
  • Zero-day
  • On-path attack (previously known as man-in-the-middle attack)
  • Brute force
  • Dictionary
  • Rainbow table
  • Spoofing
  • Non-compliant systems
  • Zombie

2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings.

  • User and groups
    • Administrator
    • Power user
    • Guest
    • Standard user
  • NTFS vs. share permissions
    • Allow vs. deny
    • Moving vs. copying folders and files
    • File attributes
  • Shared files and folders
    • Administrative shares vs. local shares
    • Permission propagation
    • Inheritance
  • System files and folders
  • User authentication
    • Single sign-on
  • Run as administrator vs. standard user
  • BitLocker
  • BitLocker To Go
  • EFS

2.7 Given a scenario, implement security best practices to secure a workstation.

  • Password best practices
    • Setting strong passwords
    • Password expiration
    • Screensaver required password
    • BIOS/UEFI passwords
    • Requiring passwords
  • Account management
    • Restricting user permissions
    • Logon time restrictions
    • Disabling guest account
    • Failed attempts lockout
    • Timeout/screen lock
    • Change default admin user account/password
    • Basic Active Directory functions
      • Account creation
      • Account deletion
      • Password reset/unlock account
      • Disable account
  • Disable autorun
  • Data encryption
  • Patch/update management

2.8 Given a scenario, implement methods for securing mobile devices.

  • Screen locks
    • Fingerprint lock
    • Face lock
    • Swipe lock
    • Passcode lock
  • Remote wipes
  • Locator applications
  • Remote backup applications
  • Failed login attempts restrictions
  • Antivirus/Anti-malware
  • Patching/OS updates
  • Biometric authentication
  • Full device encryption
  • Multifactor authentication
  • Authenticator applications
  • Trusted sources vs. untrusted sources
  • Firewalls
  • Policies and procedures
    • BYOD vs. corporate-owned
    • Profile security requirements

2.9 Given a scenario, implement appropriate data destruction and disposal methods.

  • Physical destruction
    • Shredder
    • Drill/hammer
    • Electromagnetic (Degaussing)
    • Incineration
    • Certificate of destruction
  • Recycling or repurposing best practices
    • Low-level format vs. standard format
    • Overwrite
    • Drive wipe

2.10 Given a scenario, configure security on SOHO wireless and wired networks.

  • Wireless-specific
    • Changing default SSID
    • Setting encryption
    • Disabling SSID broadcast
    • Antenna and access point placement
    • Radio power levels
    • WPS
  • Change default usernames and passwords
  • Enable MAC filtering
  • Assign static IP addresses
  • Firewall settings
  • Port forwarding/mapping
  • Disabling ports
  • Content filtering/parental controls
  • Update firmware
  • Physical security

3.0 Software Troubleshooting

3.1 Given a scenario, troubleshoot Microsoft Windows OS problems.

  • Common symptoms
    • Slow performance
    • Limited connectivity
    • Failure to boot
    • No OS found
    • Application crashes
    • Blue screens
    • Blank screens
    • Printing issues
    • Services fail to start
    • Slow bootup
    • Slow profile load
  • Common solutions
    • Defragment the hard drive
    • Reboot
    • Kill tasks
    • Restart services
    • Update network settings
    • Reimage/reload OS
    • Roll back updates
    • Roll back devices drivers
    • Apply updates
    • Repair application
    • Update boot order
    • Disable Windows services/applications
    • Disable application startup
    • Safe boot
    • Rebuild Windows profiles

3.2 Given a scenario, troubleshoot and resolve PC security issues.

  • Common symptoms
    • Pop-ups
    • Browser redirection
    • Security alerts
    • Slow performance
    • Internet connectivity issues
    • PC/OS lockup
    • Application crash
    • OS updates failures
    • Rogue antivirus
    • Spam
    • Renamed system files
    • Disappearing files
    • File permission changes
    • Hijacked email
      • Responses from users regarding email
      • Automated replies from unknown sent email
    • Access denied
    • Invalid certificate (trusted root CA)
    • System/application log errors

3.3 Given a scenario, use best practice procedures for malware removal.

  1. Identify and research malware symptoms.
  2. Quarantine the infected systems.
  3. Disable System Restore (in Windows).
  4. Remediate the infected systems.
    1. Update the anti-malware software.
    2. Scan and use removal techniques (safe mode, pre-installation environment).
  5. Schedule scans and run updates.
  6. Enable System Restore and create a restore point (in Windows).
  7. Educate the end user.

3.4 Given a scenario, troubleshoot mobile OS and application issues.

  • Common symptoms
    • Dim display
    • Intermittent wireless
    • No wireless connectivity
    • No Bluetooth connectivity
    • Cannot broadcast to external monitor
    • Touchscreen non-responsive
    • Apps not loading
    • Slow performance
    • Unable to decrypt email
    • Extremely short battery life
    • Overheating
    • Frozen system
    • No sound from speakers
    • Inaccurate touch screen response
    • System lockout
    • App log errors

3.5 Given a scenario, troubleshoot mobile OS and application security issues.

  • Common symptoms
    • Signal drop/weak signal
    • Power drain
    • Slow data speeds
    • Unintended WiFi connection
    • Unintended Bluetooth pairing
    • Leaked personal files/data
    • Data transmission over limit
    • Unauthorized account access
    • Unauthorized location tracking
    • Unauthorized camera/microphone activation
    • High resource utilization

4.0 Operational Procedures

4.1 Compare and contrast best practices associated with types of documentation.

  • Network topology diagrams
  • Knowledge base/articles
  • Incident documentation
  • Regulatory and compliance policy
  • Acceptable use policy
  • Password policy
  • Inventory management
    • Asset tags
    • Barcodes

4.2 Given a scenario, implement basic change management best practices.

  • Documented business processes
  • Purpose of the change
  • Scope the change
  • Risk analysis
  • Plan for change
  • End-user acceptance
  • Change board
    • Approvals
  • Backout plan
  • Document changes

4.3 Given a scenario, implement basic disaster prevention and recovery methods.

  • Backup and recovery
    • Image level
    • File level
    • Critical applications
  • Backup testing
  • UPS
  • Surge protector
  • Cloud storage vs. local storage backups
  • Account recovery options

4.4 Explain common safety procedures.

  • Equipment grounding
  • Proper component handling and storage
    • Antistatic bags
    • ESD straps
    • ESD mats
    • Self-grounding
  • Toxic waste handling
    • Batteries
    • Toner
    • CRT
    • Cell phones
    • Tablets
  • Personal safety
    • Disconnect power before repairing PC
    • Remove jewelry
    • Lifting techniques
    • Weight limitations
    • Electrical fire safety
    • Cable management
    • Safety goggles
    • Air filter mask
  • Compliance with government regulations

4.5 Explain environmental impacts and appropriate controls.

  • MSDS documentation for handling and disposal
  • Temperature, humidity level awareness, and proper ventilation
  • Power surges, under-voltage events, and power loss
    • Battery backup
    • Surge suppressor
  • Protection from airborne particles
    • Enclosures
    • Air filters/mask
  • Dust and debris
    • Compressed air
    • Vacuums
  • Compliance to government regulations

4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts.

  • Incident response
    • First response
      • Identify
      • Report through proper channels
      • Data/device preservation
    • Use of documentation/documentation changes
    • Chain of custody
      • Tracking of evidence/ documenting process
  • Licensing/DRM/EULA
    • Open-source vs. commercial license
    • Personal license vs. enterprise licenses
  • Regulated data
    • PII
    • PCI
    • GDPR
    • PHI
  • Follow all policies and security best practices

4.7 Given a scenario, use proper communication techniques and professionalism.

  • Use proper language and avoid jargon, acronyms, and slang, when applicable
  • Maintain a positive attitude/ project confidence
  • Actively listen (taking notes) and avoid interrupting the customer
  • Be culturally sensitive
    • Use appropriate professional titles, when applicable
  • Be on time (if late, contact the customer)
  • Avoid distractions
    • Personal calls
    • Texting/social media sites
    • Talking to coworkers while interacting with customers
    • Personal interruptions
  • Dealing with difficult customers or situations
    • Do not argue with customers and/or be defensive
    • Avoid dismissing customer problems
    • Avoid being judgmental
    • Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
    • Do not disclose experiences via social media outlets
  • Set and meet expectations/timeline and communicate status with the customer
    • Offer different repair/replacement options, if applicable
    • Provide proper documentation on the services provided
    • Follow up with customer/user at a later date to verify satisfaction
  • Deal appropriately with customers’ confidential and private materials
    • Located on a computer, desktop, printer, etc.

4.8 Identify the basics of scripting.

  • Script file types
    • .bat
    • .ps1
    • .vbs
    • .sh
    • .py
    • .js
  • Environment variables
  • Comment syntax
  • Basic script constructs
    • Basic loops
    • Variables
  • Basic data types
    • Integers
    • Strings

4.9 Given a scenario, use remote access technologies.