A+ Core 2 (220-1102)

Articles covering CompTIA A+ Core 2 (220-1102) exam objectives. These guides focus on operating systems, security, software troubleshooting, and operational procedures essential for the second part of your A+ certification.

Objective 1.1: Operating System Types and Their Purposes

Comprehensive guide covering workstation OSs (Windows, Linux, macOS, Chrome OS), mobile OSs (iPadOS, iOS, Android), filesystem types, vendor life-cycle limitations, and compatibility concerns.

Objective 1.2: OS Installations and Upgrades in Diverse Environments

Detailed coverage of boot methods, installation types, third-party drivers, partitioning (GPT vs MBR), drive formatting, upgrade considerations, and hardware requirements including TPM and UEFI.

Objective 1.3: Compare and Contrast Basic Features of Microsoft Windows Editions

Complete comparison of Windows 10/11 editions (Home, Pro, Enterprise), N versions, feature differences, upgrade paths, and hardware requirements including TPM and UEFI specifications.

Objective 1.4: Use Microsoft Windows Operating System Features and Tools

Comprehensive guide to Windows system tools including Task Manager, MMC snap-ins (Event Viewer, Disk Management, Task Scheduler, Device Manager, etc.), and additional utilities for system administration.

Objective 1.5: Use the Appropriate Microsoft Command-Line Tools

Complete guide to Windows command-line tools including navigation (cd, dir), network (ipconfig, ping, netstat, nslookup), disk management (chkdsk, format, diskpart), file management (md, rmdir, robocopy), and OS management (gpupdate, gpresult, sfc) commands.

Objective 1.6: Configure Microsoft Windows Settings

Comprehensive guide to Windows settings configuration including Internet Options, Devices and Printers, Programs and Features, Network and Sharing Center, System, Windows Defender Firewall, Power Options, Ease of Access, and all modern Windows 10/11 settings categories.

Objective 1.7: Configure Microsoft Windows Networking Features

Complete guide to Windows networking configuration including domain vs. workgroup environments, shared resources, firewall settings, network configuration, connection types, proxy settings, and network security concepts.

Objective 1.8: Common Features and Tools of the macOS/Desktop Operating System

Comprehensive coverage of macOS features including application installation (.dmg, .pkg, .app), system folders, Apple ID management, security features, system settings, and essential utilities like Disk Utility and Terminal.

Objective 1.9: Common Features and Tools of the Linux Client/Desktop Operating System

Essential Linux command-line tools and system components including file management (ls, cp, mv, rm), system administration (sudo, su), package management (apt, dnf), networking commands, and configuration files.

Objective 1.10: Install Applications According to Requirements

Complete guide to application installation covering system requirements (32/64-bit, hardware specs), distribution methods (physical media, downloads, image deployment), and impact considerations for device, network, and operations.

Objective 1.11: Install and Configure Cloud-Based Productivity Tools

Comprehensive guide to cloud productivity tools including email systems, cloud storage, collaboration tools (spreadsheets, videoconferencing, presentations), identity synchronization, and licensing management for modern business environments.

Objective 2.1: Summarize Various Security Measures and Their Purposes

Comprehensive coverage of security measures including physical security (bollards, access control, surveillance), physical access security (biometrics, smart cards, key fobs), and logical security (MFA, SSO, Zero Trust, IAM, DLP).

Objective 2.2: Configure and Apply Basic Microsoft Windows OS Security Settings

Complete guide to Windows security configuration including Defender Antivirus, firewall settings, user account management, authentication methods (PIN, biometrics, Windows Hello), file permissions, encryption (BitLocker, EFS), and Active Directory integration.

Objective 2.3: Compare and Contrast Wireless Security Protocols and Authentication Methods

Comprehensive comparison of wireless security protocols (WPA2, WPA3, TKIP, AES) and authentication methods (RADIUS, TACACS+, Kerberos, MFA) with detailed analysis of security features, vulnerabilities, and implementation scenarios.

Objective 2.4: Summarize Types of Malware and Tools/Methods for Detection, Removal, and Prevention

Complete guide to malware types (trojan, rootkit, virus, spyware, ransomware, keylogger, cryptominer, fileless) and comprehensive coverage of detection tools (EDR, MDR, XDR), removal methods, and prevention strategies including user education and security best practices.

Objective 2.5: Compare and Contrast Common Social Engineering Attacks, Threats, and Vulnerabilities

Comprehensive coverage of social engineering attacks (phishing, vishing, smishing, spear phishing, whaling, shoulder surfing, tailgating, impersonation, dumpster diving), security threats (DoS/DDoS, evil twin, zero-day, spoofing, on-path attacks, brute-force, insider threats, SQL injection, XSS, BEC, supply chain), and system vulnerabilities (non-compliant systems, unpatched systems, unprotected systems, EOL, BYOD).

Objective 2.6: Given a Scenario, Implement Procedures for Basic Small Office/Home Office (SOHO) Malware Removal

Complete step-by-step guide to SOHO malware removal including investigation and verification of malware symptoms, system quarantine procedures, disabling System Restore in Windows Home, system remediation techniques, antimalware software updates, scanning and removal techniques (safe mode, preinstallation environment), reimaging/reinstalling procedures, automated scanning and update scheduling, System Restore management, and comprehensive user education strategies.

Objective 2.7: Given a Scenario, Apply Workstation Security Options and Hardening Techniques

Comprehensive guide to workstation security hardening including data-at-rest encryption (BitLocker, FileVault, EFS), password considerations (length, character types, uniqueness, complexity, expiration), BIOS/UEFI passwords and security features, end-user best practices (screensaver locks, log off procedures, hardware protection, PII security, password managers), account management (permission restrictions, login time limits, guest account disable, failed attempts lockout, timeout/screen lock, account expiration), default administrator account/password changes, AutoRun disable, and unused service management.

Objective 2.8: Given a Scenario, Apply Common Methods for Securing Mobile Devices

Complete guide to mobile device security including hardening techniques (device encryption, screen locks - facial recognition, PIN codes, fingerprint, pattern, swipe, configuration profiles), patch management (OS updates, application updates), endpoint security software (antivirus, anti-malware, content filtering), locator applications, remote wipes, remote backup applications, failed login attempt restrictions, and policies and procedures (MDM, BYOD vs. corporate-owned device management).

Objective 2.9: Compare and Contrast Common Data Destruction and Disposal Methods

Comprehensive guide to data destruction and disposal including physical destruction methods (drilling, shredding, degaussing, incineration), recycling and repurposing best practices (erasing/wiping, low-level formatting, standard formatting), outsourcing concepts (third-party vendors, certification of destruction/recycling), and regulatory and environmental requirements (data protection regulations, e-waste regulations, industry standards).

Objective 2.10: Given a Scenario, Apply Security Settings on SOHO Wireless and Wired Networks

Complete guide to SOHO network security including router settings (default passwords, IP filtering, firmware updates, content filtering, physical placement, UPnP, screened subnet, secure management access), wireless security (SSID management, encryption settings, guest access), and firewall configuration (unused ports, port forwarding/mapping).

Objective 2.11: Given a Scenario, Configure Relevant Security Settings in a Browser

Comprehensive guide to browser security settings including download/installation security (trusted sources, hashing, untrusted sources), browser patching, extensions and plug-ins management (trusted/untrusted sources), password managers, secure connections and valid certificates, browser settings (pop-up blocker, data clearing, cache management, private browsing, synchronization, ad blockers, proxy, secure DNS), and browser feature management (enable/disable plug-ins, extensions, features).

Objective 3.1: Given a Scenario, Troubleshoot Common Windows OS Issues

Complete guide to Windows OS troubleshooting including Blue Screen of Death (BSOD) analysis and resolution, degraded performance diagnosis and optimization, boot issues and recovery methods, frequent shutdowns troubleshooting, services not starting diagnosis, applications crashing resolution, low memory warnings and optimization, USB controller resource warnings, system instability diagnosis, no OS found errors, slow profile load optimization, and time drift correction.

Objective 3.2: Given a Scenario, Troubleshoot Common Mobile OS and Application Issues

Comprehensive guide to mobile OS and application troubleshooting including application failures (launch, close/crashes, update, install), performance problems (slow response), OS update failures, battery life issues, random reboots, connectivity problems (Bluetooth, Wi-Fi, NFC), and screen autorotation issues. Covers systematic troubleshooting approaches, common causes, and effective solutions for mobile device problems.

Objective 3.3: Given a Scenario, Troubleshoot Common Mobile OS and Application Security Issues

Comprehensive guide to mobile OS and application security issues including security concerns (application source/unofficial stores, developer mode, root access/jailbreak, unauthorized/malicious applications, application spoofing) and common symptoms (high network traffic, degraded response time, data usage notifications, connectivity issues, excessive ads, fake security warnings, unexpected behavior, data leaks). Covers detection methods, remediation techniques, and prevention strategies.

Objective 3.4: Given a Scenario, Troubleshoot Common Personal Computer (PC) Security Issues

Comprehensive guide to PC security issues including common symptoms (unable to access network, desktop alerts, false antivirus alerts, altered system/personal files, missing/renamed files, inability to access files, unwanted notifications, OS update failures) and browser-related symptoms (random/frequent pop-ups, certificate warnings, redirection, degraded browser performance). Covers detection methods, remediation techniques, and prevention strategies for desktop security threats.

Objective 4.1: Given a Scenario, Implement Best Practices Associated with Documentation and Support Systems Information Management

Comprehensive guide to documentation and support systems including ticketing systems (user information, device information, issue descriptions, categories, severity, escalation levels, clear communication), asset management (inventory lists, CMDB, asset tags, procurement lifecycle, warranty/licensing, assigned users), and document types (incident reports, SOPs, installation procedures, onboarding/offboarding checklists, SLAs, knowledge base articles). Covers best practices for IT documentation and support operations management.

Objective 4.2: Given a Scenario, Apply Change Management Procedures

Comprehensive guide to change management procedures including documented business processes (rollback plan, backup plan, sandbox testing, responsible staff members) and change management (request forms, purpose/scope of change, change types - standard/normal/emergency, date/time considerations, affected systems/impact, risk analysis, change board approvals, implementation, peer review, end-user acceptance). Covers best practices for implementing changes safely and efficiently in IT environments.

Objective 4.3: Given a Scenario, Implement Workstation Backup and Recovery Methods

Comprehensive guide to workstation backup and recovery methods including backup types (full, incremental, differential, synthetic full), recovery methods (in-place/overwrite, alternative location), backup testing (frequency), backup rotation schemes, onsite vs. offsite storage, Grandfather-Father-Son (GFS) rotation, and the 3-2-1 backup rule. Covers best practices for data protection and disaster recovery in workstation environments.

Objective 4.4: Given a Scenario, Use Common Safety Procedures

Comprehensive guide to common safety procedures including ESD protection (ESD straps, ESD mats), electrical safety (equipment grounding), proper component handling and storage, cable management, antistatic bags, compliance with government regulations, and personal safety (disconnect power before repairing PC, lifting techniques, fire safety, safety goggles, air filter mask). Covers best practices for safe IT work environments and equipment handling.

Objective 4.5: Summarize Environmental Impacts and Local Environment Controls

Comprehensive guide to environmental impacts and local environment controls including MSDS documentation for handling and disposal (proper battery disposal, proper toner disposal, proper disposal of other devices and assets), temperature and humidity awareness with proper ventilation (location/equipment placement, dust cleanup, compressed air/vacuums), and power protection (power surges, under-voltage events, power losses, UPS, surge suppressors). Covers environmental management best practices and regulatory compliance.

Objective 4.6: Explain the Importance of Prohibited Content/Activity and Privacy, Licensing, and Policy Concepts

Comprehensive guide to prohibited content/activity and privacy, licensing, and policy concepts including incident response (chain of custody, informing management/law enforcement, copy of drive, incident documentation, order of volatility), licensing/digital rights management/end-user license agreements (valid licenses, perpetual license agreements, personal-use vs. corporate-use licenses, open-source licenses), non-disclosure agreements, regulated data (credit card information, government-issued information, PII, healthcare data, data retention requirements), acceptable use policies, and regulatory/business compliance requirements (splash screens). Covers legal and policy frameworks for IT professionals.

Objective 4.7: Given a Scenario, Use Proper Communication Techniques and Professionalism

Comprehensive guide to professional communication techniques and professionalism including professional appearance and attire (matching environment requirements, formal vs. business casual), proper language and communication (avoiding jargon and slang, maintaining positive attitude, projecting confidence), active listening and customer interaction (avoiding interruptions, cultural sensitivity, appropriate professional titles), punctuality and professional conduct (being on time, avoiding distractions), handling difficult customers and situations (not arguing or being defensive, avoiding dismissal of issues, being non-judgmental, clarifying customer statements, using discretion and professionalism), setting and meeting expectations (timeline management, status communication, offering repair/replacement options, providing proper documentation, following up for satisfaction), and appropriately handling customers' confidential and private materials. Covers essential soft skills for IT professionals.

Objective 4.8: Explain the Basics of Scripting

Comprehensive guide to scripting fundamentals including script file types (.bat for Windows batch files, .ps1 for PowerShell scripts, .vbs for VBScript files, .sh for shell scripts, .js for JavaScript files, .py for Python scripts), common use cases for scripting (basic automation, restarting machines, remapping network drives, installation of applications, automated backups, gathering of information/data, initiating updates), and important considerations when using scripts (unintentionally introducing malware, inadvertently changing system settings, browser or system crashes due to mishandling of resources). Covers essential automation and scripting concepts for IT professionals.

Objective 4.9: Given a Scenario, Use Remote Access Technologies

Comprehensive guide to remote access technologies including methods and tools (RDP for Windows remote desktop access, VPN for secure network tunneling, VNC for cross-platform remote access, SSH for secure command-line access, RMM for comprehensive remote management, SPICE for virtual machine remote access, WinRM for Windows remote management, and third-party tools including screen-sharing software, videoconferencing software, file transfer software, and desktop management software), and security considerations for each access method. Covers essential remote access concepts and security best practices for IT professionals.

Objective 4.10: Explain Basic Concepts Related to Artificial Intelligence (AI)

Comprehensive guide to basic AI concepts including application integration (API integration, SDK integration, embedded AI, cloud AI services, hybrid integration), policy considerations (appropriate use guidelines, plagiarism prevention strategies, ethical standards, legal compliance), limitations (bias types and mitigation, hallucinations and prevention, accuracy factors and improvement), and private vs. public AI considerations (data security differences, data source control, data privacy implications). Covers essential AI concepts and ethical considerations for IT professionals.