CompTIA A+ Core 1 (220-1201) and Core 2 (220-1202) Exam Cram
- Nyhet
Häftad, Engelska, 2026
569 kr
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams.
Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams!
- Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals
- Work effectively with mobile devices: laptops, tablets, and smartphones
- Configure Windows settings, components, and administrative tools
- Manage and troubleshoot Linux, macOS, Android, and iOS
- Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems
- Understand security features such as firewalls, multifactor authentication, permissions, and access control
- Defend against malware, network threats, and social engineering
- Learn the basics of IT documentation, change management, and incident response
Prepare for your exam with Pearson Test Prep:
- Realistic practice questions and answers
- Comprehensive reporting and feedback
- Customized testing in study, practice exam, or flash card modes
- Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives
Produktinformation
- Utgivningsdatum2026-01-06
- Mått224 x 147 x 46 mm
- Vikt1 429 g
- FormatHäftad
- SpråkEngelska
- SerieExam Cram
- Antal sidor1 216
- Upplaga2
- FörlagPearson Education
- ISBN9780135446904
Tillhör följande kategorier
David Bayne has spent almost 35 years teaching IT, both at the high school and community college levels, and has prepared hundreds of students for careers in IT. He currently works for the State of California as an IT specialist where he oversees technical training and special projects, and is an adjunct professor in the Business department at Woodland Community College. He holds CCNA and CompTIA A+ certifications, as well as a Master’s degree in educational technology. When David is not working, he reads (mostly mysteries and sci-fi) and spends time with family. He lives near Sacramento, California, with his wife and daughters and their three cats.John Pickard is an associate professor at East Carolina University in the College of Engineering and Technology, with more than 21 years of experience teaching information and cybersecurity technology. He also works as a subject matter expert and content developer in support of the Cisco Networking Academy. Through his career he has held various IT certifications, including Cisco Certified Network Professional, Microsoft Certified Professional, IPv6 Forum Certified Trainer, CompTIA Network +, and CompTIA A+. John is also a Cisco Certified Academy Instructor. John received his PhD in technology management at Indiana State University.Mark Smith has been teaching for the past 24 years. He has been computing since 1986 when he first started with his Commodore 128. He started his IT business in 1997, which is still going strong today. Ten years ago, he started a CTE IT Pathway at the high school in his district offering Python programming, IT Essentials, CCNA 1, CCNA 2, and Red Hat Linux. In addition, he runs a top-ranking regional cybersecurity club. Additionally, he is an adjunct at a local community college in the CIS department. He also sits on the Red Hat Academy Advisory Board as well as California State University, San Bernardino’s IDT Advisory Board. Mark earned his master’s in instructional design and technology and has CompTIA ITF+, CompTIA A+, CompTIA Network+, CCST: IT Support, CCST: Networking, and CCST: Cybersecurity certifications. When not working, he enjoys traveling domestically and internationally.
- IntroductionPart I: Introduction to Core 1 (220-1201)Core 1 (220-1201) Domain 1.0: Mobile Devices Chapter 1: Monitoring, Maintaining, and Replacing Mobile Device HardwareIntroduction to LaptopsPowerKeyboards/KeysTouchpadRandom-Access Memory (RAM) Storage Drives. Communications. Camera/Webcam and Microphone. Wi-Fi Antenna Connector and Placement Physical Privacy and Security Components Chapter 2: Mobile Device Accessories and Connectivity Options Connection Types Accessories Chapter 3: Mobile Device Network Connectivity and Application Support Enabling Wireless Functions Bluetooth Email Configuration Cellular Radio Technologies Location Services Synchronization Methods Mobile Device Management (MDM) Core 1 (220-1201) Domain 2.0: Networking Chapter 4: TCP and UDP Ports and Protocols TCP vs. UDP Ports and Protocols Chapter 5: Wireless Technologies 802.11 Wireless Long-Range Fixed Wireless RFID Chapter 6: Networked Hosts Server Roles Internet Security Appliances Embedded Systems and IoTChapter 7: Network Configuration ConceptsDNSEmail Authentication MethodsDHCPVLANsVPNsChapter 8: Network Devices SwitchesRoutersAccess Points FirewallsNetwork Interface Cards Patch PanelsPower over Ethernet Cable/DSL Modems Network Interface Devices Chapter 9: SOHO Network Configuration Configuring IPv4Private vs. Public AddressesConfiguring IPv6Chapter 10: Network TypesNetwork Types Internet Connection TypesChapter 11: Networking ToolsNetwork Cabling ToolsNetwork TapWi-Fi AnalyzersCore 1 (220-1201) Domain 3.0: Hardware Chapter 12: Device Display Components Display Types Inverter and BacklightDigitizers and Touchscreens AttributesChapter 13: Cables and Connectors Network CablesPeripheral Cables and ConnectorsVideo Cables and ConnectorsStorage Drive Cables and ConnectorsAdaptersChapter 14: RAMRAM TypesInstalling RAM RAM TechnologiesChapter 15: Storage DrivesSATAMagnetic Hard Drives Solid-State Drives RAIDFlashOptical DrivesChapter 16: Motherboards and Add-on CardsMotherboard Form Factors and Connector Types Expansion Cards More Ports and ConnectorsBIOS/UEFI Settings The POSTChapter 17: CPUsCPU Architecture CPU CompatibilityPower ConsumptionCooling Mechanisms Installing CPUsChapter 18: Power Planning Which Power Supply to Use Installing the Power SupplyChapter 19: Multifunction Devices/PrintersSetup ConsiderationsFirmware Printer Configuration SettingsLocal vs. Network PrintersBasic Printer SecurityChapter 20: Printer MaintenanceLaser PrintersInkjet PrintersThermal PrintersImpact PrintersCore 1 (220-1201) Domain 4.0: Virtualization and Cloud Computing Chapter 21: Virtualization ConceptsPurpose of Virtual MachinesDesktop VirtualizationHypervisorsExamples of Virtual Machine SoftwareVirtual Machine Requirements Cross-Platform Virtualization Containers and SandboxesChapter 22: Cloud Computing Concepts Introduction to Cloud ComputingCommon Cloud ModelsCloud Computing Characteristics Core 1 (220-1201) Domain 5.0: Hardware and Network Troubleshooting Chapter 23: Troubleshooting Motherboards, CPUs, RAM, and PowerTroubleshooting Motherboards Troubleshooting CPUsTroubleshooting RAMTroubleshooting Power Supply IssuesHeating and Cooling Chapter 24: Troubleshooting Storage Drives and RAID ArraysPreventive Maintenance and Troubleshooting of Storage DrivesTroubleshooting RAID ArraysChapter 25: Troubleshooting Video IssuesPC Video Troubleshooting External Laptop Monitors and Projectors Chapter 26: Troubleshooting Mobile DevicesMobile Device Display TroubleshootingMobile Device OverheatingMore Mobile Device TroubleshootingDisassembling ProcessesChapter 27: Troubleshooting Wired and Wireless Network ProblemsTroubleshooting Common SymptomsChapter 28: Troubleshooting PrintersTroubleshooting PrintersPrint Jobs and the Print SpoolerA+ Core 1 (220-1201) Practice ExamPart II: Introduction to Core 2 (220-1202) Core 2 (220-1202) Domain 1.0: Operating Systems Chapter 29: Common Operating SystemsWorkstation Operating SystemsMobile Operating Systems File System Types and Formatting Vendor Life-Cycle LimitationsCompatibility Concerns Between Operating SystemsChapter 30: Operating System Installations and UpgradesBoot MethodsTypes of InstallationsPartitioningMore OS Installation and Upgrade ConsiderationsChapter 31: Basic Features of Windows Editions Windows 10 Editions and Feature DifferencesWindows 11 Editions and Feature DifferencesWindows Desktop/User Interface and ComponentsWindows Upgrade PathsWindows 11Windows NWindows 10 End of Support Chapter 32: Microsoft Operating System Features and Tools, Part ITask Manager The MMC and Administrative Windows Tools Chapter 33: Microsoft Operating System Features and Tools, Part IIDisk ManagementAdditional Windows ToolsChapter 34: Microsoft Command-Line Tools, Part IMicrosoft Command-Line BasicsNavigating in the Command Line Working with Folders/Directories and Files Partitioning and File System–Based Commandschkdsk and sfc winverAdvanced Commands: gpupdate and gpresult Chapter 35: Microsoft Command-Line Tools, Part IINetworking CommandsChapter 36: Windows Control Panel UtilitiesOpening and Viewing the Control Panel UtilitiesBonus: Storage SenseChapter 37: Windows SettingsHow to Access Windows Settings Internet OptionsBluetooth & Devices SystemAccessibilityTime & LanguageWindows Update & Security PersonalizationGamingAccounts Control Panel OperationsChapter 38: Windows Networking Domain Joined vs. Workgroup SetupHow to Establish Networking ConnectionsProxy SettingsChapter 39: macOSmacOS Basics System Preferences macOS Features iCloud and ContinuitymacOS System FoldersManaging and Maintaining macOSInstallation and Uninstallation of ApplicationsApple IDChapter 40: Linux Linux BasicsLinux Desktop DistributionsLinux Partition Scheme and File SystemLinux Command LineRecovery ModeCommon Configuration Files Linux Best PracticesChapter 41: Application Installation and Configuration Concepts32-Bit vs. 64-BitSystem and OS Requirements for ApplicationsDistribution MethodsOther Considerations for New ApplicationsChapter 42: Cloud-Based Productivity ToolsEmail SystemsOnline StorageCollaboration ToolsIdentity SynchronizationLicensing AssignmentCore 2 (220-1202) Domain 2.0: Security Chapter 43: Physical SecurityPhysical LocksEntry SystemsBiometricsOther Physical Security PrecautionsProtecting Data PhysicallyChapter 44: Logical Security AuthenticationJust-in-Time AccessPrinciple of Least PrivilegeMDM PoliciesMore Logical Security Concepts Chapter 45: Windows Security Settings The CIA of Computer SecurityMicrosoft Defender AntivirusMicrosoft Defender FirewallUsers and Groups PermissionsFile SecurityActive DirectoryChapter 46: Wireless Security and MalwareComparing and Contrasting Wireless Security Protocols and Authentication MethodsDetecting, Removing, and Preventing Malware Using the Appropriate Tools and MethodsChapter 47: Social Engineering, Threats, and VulnerabilitiesSocial EngineeringThreats and VulnerabilitiesChapter 48: Workstation Best PracticesUsernames and PasswordsPassword PoliciesAccount Management and End-User Best PracticesDisabling Unused Services Disabling AutoPlay/AutoRunChapter 49: Mobile Device Security Hardening TechniquesTheft and Loss of Mobile DevicesCompromised and Damaged DevicesIoT SecurityPolicies and ProceduresChapter 50: Data Destruction and Disposal Data Security 101Formatting DrivesOverwriting Drives Physical DestructionRegulatory and Environmental Requirements Chapter 51: SOHO SecurityRemoving SOHO MalwareApplying Security Settings on SOHO Wireless and Wired NetworksChapter 52: Browser SecurityBrowser Download/InstallationSettingsExtensions and Plug-ins Password Managers Secure Connections More SettingsCore 2 (220-1202) Domain 3.0: Software Troubleshooting Chapter 53: Troubleshooting Microsoft Windows Windows RecoverySystem Restore Improper, Spontaneous, and Frequent ShutdownsBlue Screen of Death (BSOD) Stop ErrorsHow to Restore WindowsCommon Windows Symptoms and SolutionsChapter 54: Troubleshooting Mobile Operating Systems and ApplicationsWireless TroubleshootingTroubleshooting and Stopping ApplicationsInitiating ResetsMore Mobile Application and OS TroubleshootingAddressing Video Issues Chapter 55: Troubleshooting Mobile Operating Systems’ Security IssuesMobile Device Security Concerns and SymptomsChapter 56: Troubleshooting PC Security IssuesSymptoms of Viruses Symptoms of SpywareMore Symptoms of PC Security Issues and Potential Solutions Core 2 (220-1202) Domain 4.0: Operational Procedures Chapter 57: DocumentationTypes of DocumentsKnowledge Base/ArticlesTicketing Systems Asset ManagementChapter 58: Change Management and Backup MethodsUnderstanding Basic Change Management Best PracticesImplementing Workstation Backup and Recovery MethodsChapter 59: Safety ProceduresESD Prevention and Equipment GroundingElectrical SafetyElectrical Fire SafetyPhysical SafetyChapter 60: Environmental ControlsTemperature, Humidity, and AirMSDS and DisposalPower DevicesChapter 61: Incident Response, Communication, and ProfessionalismUnderstanding the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy ConceptsUsing Proper Communication Techniques and ProfessionalismChapter 62: Basic Scripting, Part IProgramming 101 When to Use Scripts Other Considerations When Using ScriptsChapter 63: Basic Scripting, Part IIPowerShell and .ps1Bash and .sh Use Cases and Other Considerations for PowerShell and BashPython and .pyJavaScript and .jsVisual Basic Script and .vbsChapter 64: Remote Access Technologies Remote Desktop SSHSimple Protocol for Independent Computing Environments (SPICE) Windows Remote Management (WinRM)More Third-Party ToolsVPN Chapter 65: Appropriate Use of Artificial IntelligenceApplication IntegrationPolicy and PrivacyLimitations of AIChapter 66: Getting Ready for the Exams, and Farewell Getting Ready for the ExamsTips for Taking the Real ExamsBeyond the CompTIA A+ CertificationA+ Core 2 (220-1202) Practice Exam The CompTIA A+ Cram Sheet