TIA A Core 2 Course Notes
TIA A Core 2 Course Notes
TIA A Core 2 Course Notes
CompTIA Core 2
220-1102
Instructor: Andrew Ramdayal
www.tiaedu.com 1
CompTIA A+ Core 2 220-1102 Course Notes
CompTIA A+ CORE 1
(220-1102) Exam
• 90-minute time limit
• Maximum of 90 Questions
• Multiple choice
• Pick one or many answers.
• Drag & Drop
• Match objects to a diagram.
• Performance-based
(Simulators)
• These are hands-on troubleshooting
scenarios where you’ll have to
perform a series of steps/commands
% of
Domain
Exam
www.tiaedu.com 3
CompTIA A+ Core 2 220-1102 Course Notes
Operating Systems
www.tiaedu.com 4
CompTIA A+ Core 2 220-1102 Course Notes
1.1
www.tiaedu.com 5
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 6
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 7
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 8
CompTIA A+ Core 2 220-1102 Course Notes
User Interfaces
• Command Line Interface (CLI):
This kind of OS is controlled by
typing commands into a prompt.
The most commonly known
Command Line OS is DOS and
Cisco’s IOS.
www.tiaedu.com 9
CompTIA A+ Core 2 220-1102 Course Notes
User Interfaces
• Graphical User Interface (GUI):
• This OS uses graphics.
• provides the icons we click on and
the mouse pointer that lets us
click on them.
• Every version of Windows has a
GUI that we use to interact with it.
www.tiaedu.com 10
CompTIA A+ Core 2 220-1102 Course Notes
User Interfaces
• Graphical User Interface (GUI):
• This OS uses graphics.
• provides the icons we click on and
the mouse pointer that lets us
click on them.
• Every version of Windows has a
GUI that we use to interact with it.
www.tiaedu.com 11
CompTIA A+ Core 2 220-1102 Course Notes
Windows 10
• Released in 2015 and will be
supported till 2035
www.tiaedu.com 12
CompTIA A+ Core 2 220-1102 Course Notes
Windows 10
Editions
• It is essential to pick an edition
of Windows that is appropriate
for the user not just the one
with the most features.
• This minimizes the waste or
system resources and money.
www.tiaedu.com 13
CompTIA A+ Core 2 220-1102 Course Notes
Windows 10 Editions
Feature Windows 10 Home
www.tiaedu.com 14
CompTIA A+ Core 2 220-1102 Course Notes
Windows 10 Editions
Feature Windows 10 Pro
www.tiaedu.com 15
CompTIA A+ Core 2 220-1102 Course Notes
Windows 10 Editions
Windows 10 Pro for
Feature
Workstations / Enterprise
Target group Corporate users
Network support Domain and Workgroup
NTFS Encryption
Remote Desktop Client and server
Hyper-V
BitLocker
Group Policy
Physical CPU Limit 4
RAM Limit 6 TB
www.tiaedu.com 16
CompTIA A+ Core 2 220-1102 Course Notes
Upgrade Installation
(In Place Upgrade)
• Replace Windows but keep all your
data and compatible applications in
place.
• Requirements
• A previous bootable version of
Windows already installed
• Installation media on removable
media or stored locally.
• Upgrade considerations
• Backup files and user preferences
• Application and driver
support/backward compatibility
• Hardware compatibility
www.tiaedu.com 17
CompTIA A+ Core 2 220-1102 Course Notes
Upgrade Installation
(In Place Upgrade)
• In-place upgrade to Windows 10
• Windows 7
• Windows 8.1 (Upgrade 8.0 to
8.1)
• In-place upgrade to Windows 11
• Windows 10
www.tiaedu.com 18
CompTIA A+ Core 2 220-1102 Course Notes
Upgrade Installation
(In Place Upgrade)
• Upgrade considerations
• Backup files and user preferences
• Application and driver
support/backward compatibility
• Hardware compatibility
• Downgrade from a Pro 7 to a
home 10 will result in losing
certain setting.
www.tiaedu.com 19
CompTIA A+ Core 2 220-1102 Course Notes
1.2
www.tiaedu.com 20
CompTIA A+ Core 2 220-1102 Course Notes
Navigating Commands
• help : is used to list commands
• dir : list files and folders
• /?: Give help on the command
• cd(chdir) : is used to move from one folder to
another
• md(mkdir) : is used to make new folders
• rd(rmdir) : is used to delete empty folders
• del : is used to delete files
• tree : list files and folder within the current
folder and all sub folders
• Drive navigation inputs: C: or D:
• Winver : Shows what version of windows you
are on
• cls : Clear screen
www.tiaedu.com 21
CompTIA A+ Core 2 220-1102 Course Notes
Copy Commands
• copy : is used to copy files from
one folder to another
• xcopy : it can copy folders,
subfolders, and all the files with
them
• robocopy : more advanced copy
task than xcopy
www.tiaedu.com 22
CompTIA A+ Core 2 220-1102 Course Notes
Copy Commands
• copy : is used to copy files from
one folder to another
• xcopy : it can copy folders,
subfolders, and all the files with
them
• robocopy : more advanced copy
task than xcopy
www.tiaedu.com 23
CompTIA A+ Core 2 220-1102 Course Notes
Networking Commands
• ping: Uses ICMP to return the
status of a unicast.
• ping –n: change the number of
pings sent.
• ping –l: change the size of the ping
packets.
• ping –t: pings continuously
• ping –4: force an IPv4 ping
• ping –6: force an IPv6 ping
www.tiaedu.com 24
CompTIA A+ Core 2 220-1102 Course Notes
Networking Commands
• ipconfig: Displays interface
configurations.
• ipconfig /all: displays more
detailed information.
• ipconfig /renew: request
configurations from a DHCP server.
• ipconfig /release: removes
configurations obtained through
DHCP.
• ipconfig /displaydns: displays the
local DNS cache.
• ipconfig /flushdns: clears the local
DNS cache.
www.tiaedu.com 25
CompTIA A+ Core 2 220-1102 Course Notes
Networking Commands
• net use: Used to connect to a
network share
• net use x: \\servername\sharename
• netstat: Displays active network
connections
• netstat –a: displays all connections,
including listening ports
• tracert: Uses ICMP to return a hop
count.
• net user: Used to manage user
accounts
www.tiaedu.com 26
CompTIA A+ Core 2 220-1102 Course Notes
Networking Commands
• pathping: Performs a ping and a
traceroute at the same time
• nslookup: Identifies the current
DNS server and displays IP
Addresses for a provided name.
• hostname: displays a computer’s
hostname
www.tiaedu.com 27
CompTIA A+ Core 2 220-1102 Course Notes
Storage Commands
• Chkdsk : scans a disk in hopes of
recovering corrupted files
• chkdsk /f Fixes errors on the disk
• chkdsk /r Fixes errors and Locates
bad sectors
• Format : erases a disk file applying
a file system
• format /fs Specifies the type of the
file system (FAT, FAT32, exFAT, NTFS)
• format d: /fs:ntfs will format the D
drive as ntfs
• format /q Performs a quick format
• format d: /fs:fat32 /q will quick format
the D drive as fat32
www.tiaedu.com 28
CompTIA A+ Core 2 220-1102 Course Notes
Storage Commands
• Convert : changes FAT/FAT32
filesystem to NTFS without
erasing files
• convert /fs Specifies that the
volume will be converted to NTFS
• Cannot convert NTFS to any other
file system
• Diskpart : is a command line
partition management tool
www.tiaedu.com 29
CompTIA A+ Core 2 220-1102 Course Notes
Administration
Commands
• sfc is the system file checker used
to repair system files.
• sfc /SCANNOW Scans integrity of all
protected system files and repairs
files.
• sfc /VERIFYONLY Scans system files
but does not repair them.
• shutdown will send a signal to turn
off the sytem
• shutdown /p Turn off the local
computer with no time-out or
warning.
• shutdown /r Full shutdown and
restart the computer.
www.tiaedu.com 30
CompTIA A+ Core 2 220-1102 Course Notes
Administration
Commands
• Gpupdate : Updates the latest
group policy setting
• Gpresult : shows what group
policy is applied to the computer
www.tiaedu.com 31
CompTIA A+ Core 2 220-1102 Course Notes
1.3
www.tiaedu.com 32
CompTIA A+ Core 2 220-1102 Course Notes
Task Manager
• Task Manager
• Processes
• Displays all running processes including
background processes.
• Non-responsive processes can be
closed here.
• Performance
• Displays performance graphs
• Users
• Displays currently logged-in users
• It is possible to log out users in this tab
• Startup
• Disable or enable auto-starting
applications
• taskmgr can be used to launch the
task manager via a run box
www.tiaedu.com 33
CompTIA A+ Core 2 220-1102 Course Notes
Microsoft Management
console (mmc)
• Microsoft Management Console
• Create a custom toolbox of useful
utilities referred to as “Snap-ins”.
• Snap-ins are other consoles that
are available elsewhere like the
Device Manager or Disk
Management.
• mmc command can be used to
launch the Microsoft Management
Console.
www.tiaedu.com 34
CompTIA A+ Core 2 220-1102 Course Notes
Useful Snap-in’s
• Event Viewer (eventvwr.msc)
• display logs of timestamped
events which can be used to assist
with troubleshooting.
• Windows Logs
• System: list operating system events
• Security: list security events
• Application: list application events
• Icons
• Red = Error
• Yellow = Warning
• White = Informational
www.tiaedu.com 35
CompTIA A+ Core 2 220-1102 Course Notes
Useful Snap-in’s
• Disk Management (diskmgmt.msc)
• Manage Disk partitions
• Task Scheduler (taskschd.msc)
• Create and schedule tasks to run
• Device Manager (devmgmt.msc)
• Check, update and install device drivers
• Certificate Manager (certmgr.msc)
• Check and manage certificates installed
on a computer
www.tiaedu.com 36
CompTIA A+ Core 2 220-1102 Course Notes
Useful Snap-in’s
• Local Users and Groups (lusrmgr.msc)
• Create, change and delete users on local
computer
• Performance Monitor (perfmon.msc)
• Monitor computer performance
• Group Policy Editor (gpedit.msc)
• Edit local group policy
www.tiaedu.com 37
CompTIA A+ Core 2 220-1102 Course Notes
System Information
• System Information
• View detailed information on
system hardware and software.
• msinfo32 command can be used
to launch the System Information
utility.
• Sections
• Hardware Resources
• Identify hardware conflicts and
addresses
• Components
• Identify driver details and hardware
capabilities
• Software Environment
• Identify software details.
www.tiaedu.com 38
CompTIA A+ Core 2 220-1102 Course Notes
Additional Tools
• System Configuration
(msconfig.exe)
• General
• Change startup type between Normal,
Selective, or Diagnostic types.
• Boot
• Change multiboot boot order
• Services
• Enable or disable services
• Startup
• Links to the Startup tab in the task
manager
• Tools
• Collection of useful tools
www.tiaedu.com 39
CompTIA A+ Core 2 220-1102 Course Notes
Additional Tools
• Disk Cleanup (cleanmgr.exe)
• Files in the Recycle Bin
• Temporary Internet files
• Downloaded program files
• Temporary files
• Disk Defragment(dfrgui.exe)
• Optimize and Defragment Drives
(Windows 10)
• Defragmenting (HDD)
• Bits on a hard disk drive are rearranged
so files can be loaded faster.
• Defragging a drive too frequently can
decrease its lifespan.
• Trimming (SSD)
• Makes sure that the NAND memory
chips on an SSD are worn evenly to
maximize the lifespan of the drive.
www.tiaedu.com 40
CompTIA A+ Core 2 220-1102 Course Notes
Additional Tools
• Registry Editor (regedit.exe)
• a database that stores all the settings and
configurations for Windows and it’s applications.
• The regedit command can be used to launch
the Registry Editor
• Registry Keys
• HKEY_CLASSES_ROOT: Stores file association
information.
• HKEY_USERS: Stores settings that apply to all
users.
• HKEY_CURRENT_USER: Stores settings for the
individual users.
• HKEY_LOCAL_MACHINE: Stores settings for all
devices that have been installed or removed
from the system.
• HKEY_CURRENT_CONFIG: Stores settings for
individual devices when multiple of the same
type of device have been installed.
www.tiaedu.com 41
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 42
CompTIA A+ Core 2 220-1102 Course Notes
1.4
www.tiaedu.com 43
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 44
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 45
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 46
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 47
CompTIA A+ Core 2 220-1102 Course Notes
1.5
www.tiaedu.com 48
CompTIA A+ Core 2 220-1102 Course Notes
Windows settings
• Time and Language
• Configure time and date, and
language used on the computer.
• Update and Security
• Set when updates will be applied to
the computer.
• Personalization
• Personalization of the system for to
the user likening such as background
• Apps
• Uninstall applications, change
windows defaults, and enable or
disable windows features.
• Privacy
• Set what can be tracked on the
system.
www.tiaedu.com 49
CompTIA A+ Core 2 220-1102 Course Notes
Windows settings
• System
• Allows you to change display
information, sound, and notification
setting.
• Devices
• Manage Bluetooth, printers, and a
mouse.
• Network and Internet
• Manage and connect new NIC
• Gaming
• Connect Xbox gaming accounts
• Accounts
• Create and link new accounts to the
system
www.tiaedu.com 50
CompTIA A+ Core 2 220-1102 Course Notes
1.6
www.tiaedu.com 51
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 52
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 53
CompTIA A+ Core 2 220-1102 Course Notes
Firewall Settings
• Firewalls
• Block all incoming traffic
• Allows all outgoing traffic
• Configure and manage with rules
• Will need to make an exception to
allow certain traffic such as ftp
through the firewall
www.tiaedu.com 55
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 56
CompTIA A+ Core 2 220-1102 Course Notes
Network connections
• Establish network connections
• Virtual private network (VPN)
• Allows you to access a remote network
over the internet
• Wireless
• Connects to a local network using a
wireless connection
• Wired
• Connects to a local network using an
ethernet cable
• Wireless wide area network
(WWAN)
• Internet access using a wireless
connections. Done by using an adapter
from a mobile cellular network using
technologies such as 4G or 5G.
www.tiaedu.com 57
CompTIA A+ Core 2 220-1102 Course Notes
Network connections
• Proxy settings
• A server used to control and monitor
internet access
• Configuration is given by the
administrator
• Public network vs. private network
• When connecting to a network you will
select either setting.
• Public will offer more protection while
private will allow shares and discovery of
the computer.
• File Explorer navigation – network
paths
• Allows you to map a network drive from
file explore
• Metered connections and limitations
• Limits the amount of data that can be
sent and receive on an interface
www.tiaedu.com 58
CompTIA A+ Core 2 220-1102 Course Notes
1.7
www.tiaedu.com 59
CompTIA A+ Core 2 220-1102 Course Notes
Installing Applications
• 32-Bit vs. 64-Bit Requirements
• 32 bit processors can handle large
amounts of RAM vs. 32-bit.
• 32-bit can use only about 4GB of
RAM
• 64-Bit can use 16 exabytes of
RAM.
• 64-Bit will require a 64-bit
processor and operation system
• Check Windows to check if you are
running a 64-bit OS.
• 64-Bit operating system can run
32-bit application
• 32-bit operating systems cannot
run a 64-bit application
www.tiaedu.com 60
CompTIA A+ Core 2 220-1102 Course Notes
Installing Applications
• Requirements when installing
Applications
• Dedicated graphics card vs.
integrated
• Some application will require more
higher end graphics to run such as
games
• Video random-access memory
(VRAM) requirements
• Memory build into the graphics
cards.
www.tiaedu.com 61
CompTIA A+ Core 2 220-1102 Course Notes
Installing Applications
• Requirements when installing
Applications
• RAM requirements
• Check the RAM requirements before
purchasing the application
www.tiaedu.com 62
CompTIA A+ Core 2 220-1102 Course Notes
Installing Applications
• Requirements when installing
Applications
• Central processing unit (CPU)
requirements
• Check the CPU requirements before
purchasing the application
www.tiaedu.com 63
CompTIA A+ Core 2 220-1102 Course Notes
Installing Applications
• Requirements when installing
Applications
• External hardware tokens
• USB stick used to access the
application.
www.tiaedu.com 64
CompTIA A+ Core 2 220-1102 Course Notes
Installing Applications
• Distribution methods
• Physical media vs. downloadable
• Physical media uses DVD or USB’s.
• Downloadable are EXE files
downloaded from a site
• ISO mountable
• An image of a disk.
• Single file that stores all the
necessary files for the application
www.tiaedu.com 65
CompTIA A+ Core 2 220-1102 Course Notes
Installing Applications
• Considerations for applications
• Impact to device
• Impact to network
• Impact to operation
• Impact to business
www.tiaedu.com 66
CompTIA A+ Core 2 220-1102 Course Notes
1.8
www.tiaedu.com 67
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 68
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 69
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 70
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 71
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 72
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 73
CompTIA A+ Core 2 220-1102 Course Notes
Concerns
• Compatibility concerns between
Oss
• Application are developed to run
on a specific OS.
• Some application has different
version for Windows or Mac and
some don’t
www.tiaedu.com 74
CompTIA A+ Core 2 220-1102 Course Notes
1.9
www.tiaedu.com 75
CompTIA A+ Core 2 220-1102 Course Notes
Installing an OS
• Check the following before
attempting to Install Windows:
• CPU
• RAM
• Storage Requirement
www.tiaedu.com 76
CompTIA A+ Core 2 220-1102 Course Notes
Installing an OS
• Boot methods
• USB
• OS files stored on a USB Stick
• Optical media
• OS files stored on a DVD or Blue Ray
• Network
• Files are stored on a network server
and download to the compute when
installing. Used on large
deployments.
• WDS (Windows Deployment Service)
running on a Windows Server
• The target computer must support
network booting often noted as PXE
(Preboot Execution Environment).
www.tiaedu.com 77
CompTIA A+ Core 2 220-1102 Course Notes
Installing an OS
• Boot methods
• Solid-state/flash drives
• OS files stored on a USB Stick
• Internet-based
• Files are downloaded from the
internet when installing.
• Mostly used on linux.
• External/hot-swappable drive
• OS files stored on an external Hard
drive.
• Internal hard drive (partition)
• OS files stored on an internal drive
www.tiaedu.com 78
CompTIA A+ Core 2 220-1102 Course Notes
Types of installations
• Clean Installation
• This is the most common way to
install Windows onto a single PC.
Requirements
• An empty hard drive
• Bootable installation media
(DVD/USB)
www.tiaedu.com 79
CompTIA A+ Core 2 220-1102 Course Notes
Types of installations
• Upgrade Installation (In Place
Upgrade)
• This is the easiest option if you just
want to replace Windows but keep all
your data and compatible
applications in place.
• Requirements
• A previous bootable version of
Windows already installed
• Installation media on removable media
or stored locally.
• Upgrade considerations
• Backup files and user preferences
• Application and driver
support/backward compatibility
• Hardware compatibility
www.tiaedu.com 80
CompTIA A+ Core 2 220-1102 Course Notes
Types of installations
• Network Install/Deployment (OS
Deployment)
• This is the fastest way to install
Windows on many computers
since you’re doing over the
network.
• Requirements
• WDS (Windows Deployment Service)
running on a Windows Server
• The target computer must support
network booting often noted as PXE
(Preboot Execution Environment).
www.tiaedu.com 81
CompTIA A+ Core 2 220-1102 Course Notes
Types of installations
• Cloning / Imaging (Ghosting)
• Duplicates the entire software installation
of a system. This includes the operating
system, drivers, applications, and
configurations.
• This can be done by directly connecting a
hard drive or over the network.
• Before you clone the drive, you must run
“SysPrep” to remove security IDs that are
generated for activation purposes.
• Recovery Partition Installation
• Pre-Built systems sold with an operating
system already installed will either
include a recovery partition with the
operating system, drivers, and other
bundled software.
• Repair Installation
www.tiaedu.com 82
CompTIA A+ Core 2 220-1102 Course Notes
Types of installations
• Cloning / Imaging (Ghosting)
• Duplicates the entire software
installation of a system. This
includes the operating system,
drivers, applications, and
configurations.
• This can be done by directly
connecting a hard drive or over
the network.
• Before you clone the drive, you
must run “SysPrep” to remove
security IDs that are generated for
activation purposes.
www.tiaedu.com 83
CompTIA A+ Core 2 220-1102 Course Notes
Post-Installation
• Install OS Updates to assure the
system has the latest features and
security updates.
• Upgrade Drivers to manufactures
latest drivers is required.
• Microsoft has greatly improved
relationships with hardware
manufactures so they can deliver
updated drivers.
• Restoring User Data files that are
required for their work from their
older system or a backup.
• Feature updates
• Product life cycle
www.tiaedu.com 84
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 85
CompTIA A+ Core 2 220-1102 Course Notes
Partition
• Primary Partitions
• These partition are used to boot an
operating system. If you have multiple
operating systems on one disk they each
will require their own primary partitions.
• Extended Partitions
• These partition are used to overcome the
four primary partition limit.
• A single extended partition can contain
many logical drives, each logical drive
appears as a partition but can not be
used to store the OS.
• Hidden partition
• Often used by OEMs to store system
recovery data (recovery partitions).
• Swap partition
• Used a virtual memory by some
operating systems.
www.tiaedu.com 86
CompTIA A+ Core 2 220-1102 Course Notes
Drive format
• Full Format
• Runs an additional step that
checks the hard drive for any bad
sectors.
• Quick Format
• Drive is not checked for bad
sectors
www.tiaedu.com 87
CompTIA A+ Core 2 220-1102 Course Notes
1.10
www.tiaedu.com 88
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 89
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 90
CompTIA A+ Core 2 220-1102 Course Notes
System Preferences
• Displays
• Configure display setting such as resolution
or multiple monitors
• Networks
• Set network configuration
• Printers
• Add, manage or remove printers
• Scanners
• Add, manage or remove Scanners
• Privacy
• Manage privacy settings
• Accessibility
• Configure the system for people with
disabilities
• Time Machine
• Backup mechanism of macOS,
www.tiaedu.com 91
CompTIA A+ Core 2 220-1102 Course Notes
Features
• Multiple desktops
• Use Mission Control to create
additional desktops, called
spaces, to organize the windows
• Mission Control
• View and manage all open
application windows
• Keychain
• Stores your passwords and account
information, and reduces the number
of passwords you have to remember
and manage.
• Spotlight
• Finds items on your Mac, like apps,
files, and emails
www.tiaedu.com 92
CompTIA A+ Core 2 220-1102 Course Notes
Features
• iCloud
• Backup and synchronize your photos,
files, backups, and more across all your
devices
• Gestures
• Apple trackpad or a Magic Mouse with
your Mac, you can use gestures.
• Click, tap, pinch, and swipe
• Finder
• Default file manager and graphical user
interface shell used on all
• Remote Disc
• Allows the Mac user access to a CD or DVD
disc loaded into a separate computer
• Dock
• Convenient place to access apps and
features that you're likely to use every day
www.tiaedu.com 93
CompTIA A+ Core 2 220-1102 Course Notes
Features
• Disk Utility
• Can be used to partition and initialize
storage devices.
• It also is used to access First Aid
which can repair permissions and
recover corrupted files.
• FileVault
• disk encryption program
• Terminal
• Unix command line for MacOS
• Force Quit
• Press these three keys together:
Option, Command, and Esc
(Escape) or
• Choose Force Quit from the Apple
menu in the corner of your screen.
www.tiaedu.com 94
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 95
CompTIA A+ Core 2 220-1102 Course Notes
1.11
www.tiaedu.com 96
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 97
CompTIA A+ Core 2 220-1102 Course Notes
Linux Commands
www.tiaedu.com 98
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 99
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 100
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 101
CompTIA A+ Core 2 220-1102 Course Notes
Best practices
• Backups
• As often as data is changing or as
must as you are will to lose
• Antivirus
• Should have 3rd party antivirus
installed
• Updates/patches
• Install updates as apple releases
them
www.tiaedu.com 102
CompTIA A+ Core 2 220-1102 Course Notes
Best practices
• Backups
• As often as data is changing or as
must as you are will to lose
• Antivirus
• Should have 3rd party antivirus
installed
• Updates/patches
• Install updates as apple releases
them
www.tiaedu.com 103
CompTIA A+ Core 2 220-1102 Course Notes
2.0
www.tiaedu.com 104
CompTIA A+ Core 2 220-1102 Course Notes
2.1
www.tiaedu.com 105
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Access control vestibule
• Controls access so only one person can
enter at a time
• Prevents tailgating and piggybacking
www.tiaedu.com 106
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Badge reader
• are used to read the data from
authentication cards
• RFID cards are commonly used
www.tiaedu.com 107
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Video surveillance and
• IP Cameras have replaced the older
analog video surveillance systems
• NVR (Network Video Recorder) is used
to aggregate all the IP camera feeds into
a single interface
• CCTVs are older analog video surveillance
systems
www.tiaedu.com 108
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Alarm systems
• Uses sensors to check if door or
windows are open.
• Checks for motion
www.tiaedu.com 109
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Motion sensors
• Detects physical movements
• types of motion sensors that are
used frequently:
• Passive Infrared (PIR)
• Microwave
• Dual Tech/Hybrid
www.tiaedu.com 110
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Door locks
• Use to lock doors
www.tiaedu.com 111
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Equipment locks
• Construction equipment, trailer,
and cargo theft prevention
www.tiaedu.com 112
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Guards
• Human security guards
www.tiaedu.com 113
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Bollards
• A bollard is a sturdy, short, vertical
post.
• Prevent automotive vehicles from
colliding or crashing into
pedestrians and structures
www.tiaedu.com 114
CompTIA A+ Core 2 220-1102 Course Notes
Physical security
• Fences
• a barrier, railing, or other upright
structure made of any material enclosing
an area of ground to control or prevent
unauthorized access to the front of the
qualified residence.
www.tiaedu.com 115
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 116
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 117
CompTIA A+ Core 2 220-1102 Course Notes
Logical security
• Principle of least privilege
• Users should only be given access
to the level required for their work
• Access control lists (ACLs)
• List of rules on a device that
defines who can access that
device
www.tiaedu.com 118
CompTIA A+ Core 2 220-1102 Course Notes
Logical security
○Multifactor Authentication (MFA/2FA) requires users to provide 2 or
more types of authentication factors to gain access.
www.tiaedu.com 119
CompTIA A+ Core 2 220-1102 Course Notes
Logical security
• Hard token
• Hardware device used to generate
a number used to login.
• Soft token
• Same as a physical token but just
an app on a mobile phone
www.tiaedu.com 120
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 121
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 123
CompTIA A+ Core 2 220-1102 Course Notes
Active Directory
• Domain refers to the entire network under the
control of the domain controller
• The network is identified by its domain name
• Login scripts are used to automate actions when
users log in
• Group Policies can be applied to all users and
devices from the server
• Organizational units are used to group users and
devices to simplify management
• Users are grouped by Role (Sales, HR, Account)
• Home folders are private folders users can use to
store personal files
• Roaming profiles are downloaded to any system
the user logins to and then any changes are
uploaded back to the server when a user logs out
• Folder redirection allows a user’s profile data to be
accessible when they login to a system without the
need to download files. This can speed up the
process of login in and out for large profiles
www.tiaedu.com 124
CompTIA A+ Core 2 220-1102 Course Notes
2.2
www.tiaedu.com 125
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 126
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 127
CompTIA A+ Core 2 220-1102 Course Notes
Authentication
• Centralized Authentication
Protocols used in businesses to
authenticate users to WIFI, VPN,
and other network resources:
• Remote Authentication Dial-In User
Service (RADIUS)
• Terminal Access Controller Access-
Control System (TACACS+) (Cisco)
• Kerberos
• Used on Windows to authenticate
users in Active directory
• Multifactor
• Combine multiple methods to
increase security of loggin.
www.tiaedu.com 128
CompTIA A+ Core 2 220-1102 Course Notes
2.3
www.tiaedu.com 129
CompTIA A+ Core 2 220-1102 Course Notes
Malware
• Viruses
• Malware that can self-copy and self-
replicate but requires human interaction
to spread
• Virus Types
• Memory resident viruses, remain in
memory while running
• Boot sector viruses, reside in the first
sector of storage media, which stores boot
data
• Macro viruses, take advantage of
automation features in productivity
software and spread through files
associated with them.
• Email viruses, spread either as attachments
or scripts that are part of the email.
• Worms
• Malware that can spread without human
interaction.
• Worms can spread from one device in a
network to another
www.tiaedu.com 130
CompTIA A+ Core 2 220-1102 Course Notes
Malware
• Ransomware
• A kind of malware that encrypts a
victim's data and holds the
decryption key for ransom
• An effective backup system that
stores data offline.
• Air gapped data is data that is NOT
connected (offline)
• Cryptominers
• Uses a victim's system to mine for
cryptocurrency without their
permissions
• Doesn’t get aggressive to avoid
detection
www.tiaedu.com 131
CompTIA A+ Core 2 220-1102 Course Notes
Malware
• Trojans
• A type of malware that is typically
disguised as legitimate software.
Software should only be installed
from trusted sources.
• Rootkits
• Allows an attacker to execute
commands at an elevated privilege
• The best ways to prevent rootkits are
normal security practices, including
patching, using secure configurations,
and ensuring that privilege
management is used.
• Tools like secure boot and techniques
that can validate the integrity of live
systems and files can help prevent
rootkits from being successfully
installed or remaining resident.
www.tiaedu.com 132
CompTIA A+ Core 2 220-1102 Course Notes
Malware
• Spyware
• Obtains information about an
individual, organization, or system
and then sends it to a malicious actor.
• Spyware is most frequently combated
using anti-malware tools
• User awareness training can help
prevent the installation of spyware
that is included in trojans
• Keyloggers
• Are programs that capture keystrokes
usually to steal personal data like
passwords and financial information
• Antimalware tools should be able to
detect know keylogger malware
www.tiaedu.com 133
CompTIA A+ Core 2 220-1102 Course Notes
Prevent Malware
• Recovery mode
• Microsoft Windows Recovery
Environment (Windows RE) is a
simplified, scaled-back version of
the Windows operating system.
• OS reinstallation
• Reinstalls the OS completely
• This will remove all malware but
you will lose all files and settings
www.tiaedu.com 134
CompTIA A+ Core 2 220-1102 Course Notes
Prevent Malware
• Use software to detect, clean
and prevent malware:
• Antivirus
• Anti-malware
• Must be kept updated with new
signature
• Software firewalls
• Windows Defender Firewalls can
prevent worms or virus from
entering open ports on a
computer.
www.tiaedu.com 135
CompTIA A+ Core 2 220-1102 Course Notes
Prevent Malware
• User Training
• Anti-phishing training
• User education regarding
• common threats
• Can be done to large groups or
one-on-one
• Can use video or live training
www.tiaedu.com 136
CompTIA A+ Core 2 220-1102 Course Notes
2.4
www.tiaedu.com 137
CompTIA A+ Core 2 220-1102 Course Notes
Social Engineering
• Uses social tactics to trick users
into giving up information or
performing actions they
wouldn’t usually take.
• Social engineering attacks can
occur in person, over the phone,
while browsing the net, or via
email.
• Social engineers take advantage of
normal social behaviors and trust
www.tiaedu.com 138
CompTIA A+ Core 2 220-1102 Course Notes
Social Engineering
• Phishing is the practice of sending emails
to users with the purpose of tricking
them into revealing personal information
or performing a compromising action.
• Phishing does NOT target a specific group
or user which can make it easier to detect
• Spear Phishing targets specific groups of
users.
• More dangerous than standard phishing as the
attack can be highly customized
• Whaling targets high-level executives.
• The individuals being targeted generally have
access to very sensitive data
• Vishing is a form of phishing that uses
voice.
• Always verify the identity and contact
information of any caller
• Caller-ID is NOT reliable as it can be spoofed
• Smishing uses SMS (text) messages
• Includes instant messaging and social
messages
www.tiaedu.com 139
CompTIA A+ Core 2 220-1102 Course Notes
Social Engineering
• In-Person techniques
• Dumpster diving is when a threat
actor searches through trash
looking for information. Shredding
or burning documents mitigates
this threat.
• Shoulder Surfing is looking over
someone’s shoulder either in
person or with a camera in hopes
of viewing sensitive information.
• Tailgating is the practice of one
person following closely behind
another to enter a secure area
without showing credentials.
www.tiaedu.com 140
CompTIA A+ Core 2 220-1102 Course Notes
Social Engineering
• Impersonation
• Pretends to be someone else
• Usually they impersonate tech
support personal or company
executives
• Evil Twin
• Fraudulent Wi-Fi access point that
appears to be legitimate but is set up
to eavesdrop on wireless
communications.
• The evil twin is the wireless LAN
equivalent of the phishing scam.
• This type of attack may be used to
steal the passwords of unsuspecting
users, either by monitoring their
connections or by phishing, which
involves setting up a fraudulent web
site and luring people there.
www.tiaedu.com 141
CompTIA A+ Core 2 220-1102 Course Notes
Threats
• DoS (Denial of Service) is an
attack that sends a large number
of packets in hopes of
overwhelming a system so it can
no longer provide its service. A
DoS is one to one attack.
• Ping of Death when large
fragmented ICMP is used to
overwhelm a host.
www.tiaedu.com 142
CompTIA A+ Core 2 220-1102 Course Notes
Threats
• DDoS (Distributed Denial of Service)
is just like a DoS except there are
many attackers and one victim. A
traffic spike is usually the sign that a
network is undergoing a DDoS attack.
• Botnet: Network of victim computers
under the control of the attacker.
• This network is usually made of malware
victims (Trojans) that are unaware that
their systems are part of an attack.
• Coordinated Attack: A command and
control server is used to command a
Botnet to coordinate the DDoS attack.
• Friendly/Unintentional DoS: Sometimes
users may bring down service just by
sharing a link on social media. If the link
goes viral and the server can’t handle the
load, it will come down.
www.tiaedu.com 143
CompTIA A+ Core 2 220-1102 Course Notes
Threats
• Zero-day Attack
• A zero-day is a vulnerability being
exploited out in the wild but there is
no known fix for
• Spoofing
• Spoofing is a technique an attacker
uses to hide their identity
• ARP Spoofing
• Attacker spoofs the IP to MAC mapping
usually to perform a man-in-the-
middle attack
• IP Spoofing
• Attackers impersonate a device by IP
address
• Email Spoofing
• Attackers send email messages using
email addresses that a target might
trust
www.tiaedu.com 144
CompTIA A+ Core 2 220-1102 Course Notes
Threats
• On-Path Attack (aka Man-in-
the-Middle Attack)
• Network traffic is intercepted
• DNS Poisoning
• False DNS information
• ARP Spoofing
• Attacker spoofs the IP to MAC mapping
usually to perform a man-in-the-middle attack
www.tiaedu.com 145
CompTIA A+ Core 2 220-1102 Course Notes
Threats
• Brute-Force attacks attempt to
defeat a password using
automated random guessing
• Long and complex passwords will
increase the amount of time it will
take the attacker to guess the
password
• Can be prevented by limiting the
number of consecutive attempts
• Can always succeed given enough
time
• Dictionary attacks use a list of
known passwords
• Not using common words and
phrases will make this attack more
difficult
• Avoid reusing passwords to limit the
effectiveness of this attack
www.tiaedu.com 146
CompTIA A+ Core 2 220-1102 Course Notes
Threats
• Insider Threat
• An insider threat is a trusted person
(employee, contractor, partner) who
commits a malicious act
• Cross-Site Scripting (XSS)
• An attacker injects malicious code
into a website through an insecure
form
• SQL Injection Attacks
• An attacker compromises a SQL
database usually through cross-site
scripting
• Structured Query Language (SQL) is
used to create, store, and retrieve
information from a database
www.tiaedu.com 147
CompTIA A+ Core 2 220-1102 Course Notes
Vulnerabilities
• Non-compliant systems
• Unpatched systems
• Unprotected systems
• missing antivirus/missing firewall
• EOL OSs
• Bring your own device (BYOD)
www.tiaedu.com 148
CompTIA A+ Core 2 220-1102 Course Notes
2.5
www.tiaedu.com 149
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 150
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 151
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 152
CompTIA A+ Core 2 220-1102 Course Notes
Opening Apps
• Run as administrator vs.
standard user
• Certain applications will require an
admin login
• User Account Control (UAC)
www.tiaedu.com 153
CompTIA A+ Core 2 220-1102 Course Notes
Encryption Setting
• BitLocker
• Full volume encryption feature
included with Microsoft Windows
• Protect data by providing
encryption for entire volumes.
• BitLocker To Go
• Drive Encryption on removable data
drives
• Encrypting File System (EFS)
• Provides filesystem-level
encryption.
• Enables files to be transparently
encrypted to protect confidential
data from attackers with physical
access to the computer
www.tiaedu.com 154
CompTIA A+ Core 2 220-1102 Course Notes
2.6
www.tiaedu.com 155
CompTIA A+ Core 2 220-1102 Course Notes
Workstation Security
• Data-at-rest encryption
• Use bitlocker or EFS to encrypt
data stored on the computer
• Password best practices
• Complexity requirements
• Length – 8-10 Min
• Character types – Mix of all character
on keyboard
• Expiration requirements
• Should expire every 60-90 days
• Should set a BIOS or UEFI
Password
• This must be entered before
windows boot.
www.tiaedu.com 156
CompTIA A+ Core 2 220-1102 Course Notes
Workstation Security
• End-user best practices
• Use screensaver locks
• Log off when not in use
• Secure/protect critical hardware
• (e.g., laptops)
• Secure personally identifiable
information (PII) and passwords
• Disable AutoRun and AutoPlay
www.tiaedu.com 157
CompTIA A+ Core 2 220-1102 Course Notes
Workstation Security
• Account management
• Restrict user permissions
• Give Min permission to do the job
• No one should have an admin
account
• Restrict login times
• Should only be able to login during
work hours
• Disable guest account
• Use failed attempts lockout
• Use timeout/screen lock
• Change default administrator’s
user account/password
www.tiaedu.com 158
CompTIA A+ Core 2 220-1102 Course Notes
2.7
www.tiaedu.com 159
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 160
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 162
CompTIA A+ Core 2 220-1102 Course Notes
2.8
www.tiaedu.com 163
CompTIA A+ Core 2 220-1102 Course Notes
Data Destruction
• Physical destruction
• Drilling
• Using a drill to break the platter in
the drive
• Shredding
• Uses a device to physically shred the
drives into small pieces
• Degaussing
• Using a large magnetic to remove
data from the disk
• Incinerating
• Melts the drive
www.tiaedu.com 164
CompTIA A+ Core 2 220-1102 Course Notes
Data Destruction
• Recycling or repurposing best
practices
• Erasing/wiping
• Low-level formatting
• Standard formatting
• Outsourcing concepts
• Third-party vendor
• Certification of
destruction/recycling
www.tiaedu.com 165
CompTIA A+ Core 2 220-1102 Course Notes
2.9
www.tiaedu.com 166
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 167
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 168
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 169
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 170
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 171
CompTIA A+ Core 2 220-1102 Course Notes
2.10
www.tiaedu.com 172
CompTIA A+ Core 2 220-1102 Course Notes
Browsers Security
• Browser download/installation
• Trusted sources
• Hashing
• Untrusted sources
• Extensions and plug-ins
• Trusted sources
• Untrusted sources
• Password managers
• Secure connections/sites –valid
certificates
www.tiaedu.com 173
CompTIA A+ Core 2 220-1102 Course Notes
Browsers Security
• Settings
• Pop-up blocker
• Clearing browsing data
• Clearing cache
• Private-browsing mode
• Sign-in/browser data
synchronization
• Ad blockers
www.tiaedu.com 174
CompTIA A+ Core 2 220-1102 Course Notes
3.0
www.tiaedu.com 175
CompTIA A+ Core 2 220-1102 Course Notes
3.1
www.tiaedu.com 176
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 179
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 180
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 181
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 182
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 183
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 184
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 185
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 186
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 187
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 188
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 189
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 190
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 191
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 192
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 193
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 194
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 195
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 196
CompTIA A+ Core 2 220-1102 Course Notes
3.2
www.tiaedu.com 197
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 198
CompTIA A+ Core 2 220-1102 Course Notes
Browser-related symptoms
• Certificate warnings
• Certificate from site is expired or
not trusted
• Don’t visit site that gives this error
• Redirection
• Going to bad website it will
redirect you to another site that
has malware
www.tiaedu.com 200
CompTIA A+ Core 2 220-1102 Course Notes
3.3
www.tiaedu.com 201
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 202
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 203
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 204
CompTIA A+ Core 2 220-1102 Course Notes
3.4
www.tiaedu.com 205
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 206
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 207
CompTIA A+ Core 2 220-1102 Course Notes
3.5
www.tiaedu.com 209
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 210
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 211
CompTIA A+ Core 2 220-1102 Course Notes
4.0
www.tiaedu.com 212
CompTIA A+ Core 2 220-1102 Course Notes
4.1
www.tiaedu.com 213
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 214
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 215
CompTIA A+ Core 2 220-1102 Course Notes
Asset management
• Asset management
• Inventory lists
• Database system
• Asset tags and IDs
• Procurement life cycle
• Warranty and licensing
• Assigned users
www.tiaedu.com 216
CompTIA A+ Core 2 220-1102 Course Notes
Asset management
• Asset management
• Barcodes can make it easier to
track items, like how retailers
maintain their inventory
• Asset Tags can be used to track
misplaced devices by using RFID
(radio frequency identification)
www.tiaedu.com 217
CompTIA A+ Core 2 220-1102 Course Notes
Types of documents
• Acceptable use policies (AUP) define
how the employees are allowed to use
the services they have access to.
• Regulatory compliance requirements
• Will influence how an organization has to
operate which means IT must also follow
the rules of the regulatory bodies
• Splash screens
• Incident Documentation helps create
documentation of what kind of issues
are occurring and how they were
handled.
www.tiaedu.com 218
CompTIA A+ Core 2 220-1102 Course Notes
Types of documents
• Standard operating procedures (SOP)
provide a series of steps to accomplish
a certain task
• Procedures for custom installation of
software package
• New-user setup checklist
• End-user termination checklist
www.tiaedu.com 219
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 220
CompTIA A+ Core 2 220-1102 Course Notes
4.2
www.tiaedu.com 221
CompTIA A+ Core 2 220-1102 Course Notes
Change Management
• Documented business processes
• Rollback plan
• Sandbox testing
• Responsible staff member
www.tiaedu.com 222
CompTIA A+ Core 2 220-1102 Course Notes
Change Management
• Change management
• Request forms
• Purpose of the change
• Scope of the change
• Date and time of the change
• Affected systems/impact
• Risk analysis
• Risk level
• Change board approvals
• End-user acceptance
www.tiaedu.com 223
CompTIA A+ Core 2 220-1102 Course Notes
4.3
www.tiaedu.com 224
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 225
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 226
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 228
CompTIA A+ Core 2 220-1102 Course Notes
4.4
www.tiaedu.com 229
CompTIA A+ Core 2 220-1102 Course Notes
Safety Procedures
• Electrostatic discharge (ESD) is
when you discharge the static
electricity that naturally builds up
in body onto and electronic
component. This can be very
harmful to the component and
can damage it beyond repair.
www.tiaedu.com 230
CompTIA A+ Core 2 220-1102 Course Notes
Safety Procedures
• Anti-Static Protection Methods
www.tiaedu.com 231
CompTIA A+ Core 2 220-1102 Course Notes
Safety Procedures
• Anti-Static Protection Methods
www.tiaedu.com 232
CompTIA A+ Core 2 220-1102 Course Notes
Safety Procedures
• Anti-Static Protection Methods
www.tiaedu.com 233
CompTIA A+ Core 2 220-1102 Course Notes
Safety Procedures
• Personal safety
• Disconnect power before
repairing PC
• Lifting techniques
• Electrical fire safety
• Safety goggles
• Air filtration mask
www.tiaedu.com 234
CompTIA A+ Core 2 220-1102 Course Notes
4.5
www.tiaedu.com 235
CompTIA A+ Core 2 220-1102 Course Notes
Environmental Controls
• Material safety data sheet
(MSDS)/documentation for handling and
disposal
• Proper battery disposal
• Proper toner disposal
• Proper disposal of other devices and assets
www.tiaedu.com 236
CompTIA A+ Core 2 220-1102 Course Notes
Environmental Controls
www.tiaedu.com 237
CompTIA A+ Core 2 220-1102 Course Notes
Environmental Controls
• Temperature, humidity-level
awareness, and proper
ventilation
• Location/equipment placement
• Dust cleanup
• Compressed air/vacuums
www.tiaedu.com 238
CompTIA A+ Core 2 220-1102 Course Notes
Environmental Controls
• Power surges, under-voltage
events, and power failures
• Battery backup
• Surge suppressor
www.tiaedu.com 239
CompTIA A+ Core 2 220-1102 Course Notes
4.6
www.tiaedu.com 240
CompTIA A+ Core 2 220-1102 Course Notes
Incident response
• Chain of custody
• Is the chronological documentation or
paper trail that records the sequence of
custody, control, transfer, analysis, and
disposition of materials, including physical
or electronic evidence.
• Inform management/law enforcement
as necessary
• Copy of drive (data integrity and
preservation)
• Bit by bit copy
• Documentation of incident
• Information about the incident
www.tiaedu.com 241
CompTIA A+ Core 2 220-1102 Course Notes
Licensing
• Licensing/digital rights management
(DRM)/end-user license agreement
(EULA)
• Valid licenses
• Non-expired licenses
• Personal use license vs. corporate use
license
• Open-source license
www.tiaedu.com 242
CompTIA A+ Core 2 220-1102 Course Notes
Regulations
• Regulated data
• Credit card transactions
• Payment Card Industry Data Security Standard
is an information security standard for
organizations that handle branded credit cards
from the major card schemes.
• Personal government-issued information
• PII (personally Identifiable Information)
• Personal information about you
• Address, credit number, social security
numbers
• General Data Protection Regulation (GDPR) is a
regulation in EU law on data protection and
privacy in the European Union and the
European Economic Area
www.tiaedu.com 243
CompTIA A+ Core 2 220-1102 Course Notes
Regulations
• Healthcare data
• Medicine you take and/or disease
• Health Insurance Portability and
Accountability Act (HIPAA)
• healthcare information, stipulates
how personally identifiable
information maintained by the
healthcare and healthcare
insurance industries should be
protected
• Data retention requirements
• How long to hold the data, usually
define by law
www.tiaedu.com 244
CompTIA A+ Core 2 220-1102 Course Notes
4.7
www.tiaedu.com 245
CompTIA A+ Core 2 220-1102 Course Notes
Professionalism
• Professional appearance and
attire
• Match the required attire of the given
environment
• Formal
• Business casual
• Use proper language and avoid
jargon, acronyms, and slang, when
applicable
• Maintain a positive
attitude/project confidence
• Actively listen, take notes, and
avoid interrupting the customer
www.tiaedu.com 246
CompTIA A+ Core 2 220-1102 Course Notes
Professionalism
• Be culturally sensitive
• Use appropriate professional titles,
when applicable
• Be on time (if late, contact the
customer)
• Avoid distractions
• Personal calls
• Texting/social media sites
• Personal interruptions
www.tiaedu.com 247
CompTIA A+ Core 2 220-1102 Course Notes
Difficult Customers
• Dealing with difficult customers or
situations
• Do not argue with customers or be
defensive
• Avoid dismissing customer problems
• Avoid being judgmental
• Clarify customer statements (ask
open-ended questions to narrow the
scope of the problem, restate the
issue, or question to verify
understanding)
• Do not disclose experience via social
media outlets
www.tiaedu.com 248
CompTIA A+ Core 2 220-1102 Course Notes
Difficult Customers
• Set and meet
expectations/timeline and
communicate status with the
customer
• Offer repair/replacement options, as
needed
• Provide proper documentation on the
services provided
• Follow up with customer/user at a
later date to verify satisfaction
• Deal appropriately with
customers’ confidential and
private materials
• Located on a computer, desktop,
printer, etc.
www.tiaedu.com 249
CompTIA A+ Core 2 220-1102 Course Notes
4.8
www.tiaedu.com 250
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 251
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 252
CompTIA A+ Core 2 220-1102 Course Notes
4.9
www.tiaedu.com 253
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 254
CompTIA A+ Core 2 220-1102 Course Notes
www.tiaedu.com 256