CompTIA A+ Core 2
CompTIA A+ Core 2
Started :
4/25/21
•
90 questions 90
,
minutes , 700 passing score (100-900)
1. 0 Operating systems -
271 .
Pg 3-12
2. 0
Security -24% Pg 13-19
3. 0 Software troubleshooting -
261 .
Pg 20-23
4. 0 Operational Procedures -
23%
Pg 24-28
1. 1 Operating Types { Purposes
32 bit vs . 64 bit
think of lanes on more lanes > more traffic
highway more cars >
•
•
RAM limitations
-
32 =
up to 4GB ,
64 =
Over 4GB space
-
depends on OS
software compatibility
•
Apple Macintosh OS -
not free , not compatible w/ other hw , User friendly
•
Linux -
, , ,
•
Android google baby , most popular based off linux open source 32464 bit
-
, , ,
•
10s apple , based macos { darwin , not proprietary , 64 bit
-
•
Chrome OS google , not open source , web based app based linux 32464
-
, ,
render -
specific limitations
•
end of life
-
eoi
CPU =
1GHz ,
H D= 16 -20GB , RAM =
I -2GB , graphics -
direct ✗ 9 W/ WDDM 1.0 higher
•
req .
•
Cortana
•
edge extensions -
browser extensions
•
Ink API -
Domain access
domain vs workgroup
-
.
,
Dc and servers
•
Bit locker
-
for security , encrypts data ,
•
Media center
longer
-
no in windows 10
'
Branch cache
-
EFS
Encrypting File System
•
-
windows 10 both
Boot Methods
•
Optical drive ,
external drive , network boot internal fixed drive ( HDB
,
upgrade
•
not recommended
•
7 to 8 or 8.1 to 10
if data stored on
separate drive works
great
•
Repair installation
•
Something wrong w/
went OS
-
Multi boot
dont want to use virtualization , multi boot
your system
•
•
need a server in place for
addressing
-
BOOTP / DHCP ,
MAC > IP address
Image deployment
•
Recovery Partition
'
•
area of hard drive set aside to hold files that can be
Used to recover the 0s in event of a failure
#2.
Refresh / Restore
to the back into the condition it took it out of the
get system was when
•
you
box .
Uninstall { reinstall all apps and media
•
Partitioning
breaking
•
up a disk in a
logical manner , create spaces for OS , data
Dynamic
•
•
Can hold simple volumes , spanned mirrored , striped volume
,
Extended
extended partition subdivised into
logical partitions
•
Logical
•
•
a volume created within an extended partition on basic disk
•
Partition table
basic disk GPT partition style can have 128 partitions
using
•
NTFS
•
de facto for Ms 05
4 permissions
Compression encryption
•
•
CDFS
•
on
•
NFS
network file
system
•
ext 3 , ext 4
•
ext 4 hold
64,000 Subdirectories , ext 3--32.000
•
'
HFS
•
Swap partition
Swaps from HD to RAM to increase virtual memory
•
•
Quick format us full format .
•
centralized system ,
client-server relationship
Factory Recovery partition
•
part of install process
Properly format
•
partition for { system
boot
0s / Upgrade path
compatibility
•
Windows 7 RTM =/ windows 10
7 SPI = 10
8 =/ 10
8 RTM =/ 10
8.1514 = 10
Navigation
folder
dir
*
everything in
directory
• -
•
Cd -
Change directory
i
Cd . .
-
go back a level
•
settings
*
Use tall for more details
•
netstat -
see all Tcp / UDP connections to our system
•
NS lookup -
dism -
corruptions beforedeployme.int#
-
•
taskkill -
gpresult group policy result Shows Resultant set of policy tells what take
• - -
' '"em
robo options
copy replace ✗
copy w/
•
-
more
•
netuse -
connect , remove , config shared resources
•
net user -
add ,
remove user accounts
"
•
help / ? -
find any command
use to
1. 5 Microsoft OS { Tools
computer management
for information
everything system mmc snap
in
•
-
, . .
Device manager
•
see how the hardware is doing
Local users and Groups
create users and
groups
•
Local
security policy
like but only for this machine
group policy
•
on
component services
•
Print Management
local print jobs
manages on
system
•
Windows memory diagnostics
defected physical
memory BSOD , crashing freezing
•
-
you ,
user acc .
management
•
, , ,
Disk management
•
system utilities :
reg edit make changes to
system registry
• -
•
Command -
takes to command prompt
•
Services . Msc -
takes you to services MMC snap -
in
Ms info 32 -
all Sys . info about current device youre on
•
DXDiag -
, ,
and driver configuration
•
windows update
1. 6 Windows Control Panel
Internet options
Connections advanced
security general privacy programs
-
, , ,
, ,
Display / settings
resolution , refresh rate , color depth
•
user accounts
create local accounts
•
Folder options
hidden files hide extensions view options general
•
, ,
,
system
•
pre for Mance , remote settings system protections
,
Windows Firewall
-
Programs features
•
What is installed on
system
Home
group
•
only in windows 7
•
Troubleshooting
good place to start
Network and
sharing center
•
Subnet mask , adapter , VPN
Bitlocker
based
encryption hardware encryption
•
,
1. 7 Application install { Config
System Requirements
Drive space have enough space for partitions
• -
05 Requirements
•
Compatibility
Methods for installation and Deployment
10cal (RD / OSB) all files are local
• -
link or
browsing
client /
1. 8 Windows Networking on
desktop
Home group V5 .
Workgroup
•
home group protected w/ password
Workgroup just have to be on network
•
Domain setup
•
•
network printers connected directly to network w/ IP & NIC { drivers
proxy settings
behalf , filter out questionable websites
Working on
your
•
Remote Assistance
get an invitation so
you can remote desktop and Use their PC
•
Alternative IP address
Control panel > Network and Internet
>
> Network connections
Network card properties
half duplex send / relieve at
•
time -
any
•
•
Auto -
let it decide (both sides need to be Auto)
LAN have Nlc wake comp up
Wake on
.
-
•
1. 9 Features of Mac Osh Linux
Scheduled Backups
network / Cloud { test
Copy files onto EHD or
•
Patch management
third party apps •
to help
Anti-virus
•
macs still need anti virus / malware
-
Restore snapshot
Migration Assistant
•
On Linux -
du -
disk space , df -
see free space ,
fsck check { repair disk
-
multiple desktops
•
On Mac , Mission control =
multiple desktop
Remote disk
•
access remote CD/DVD in another machine
Boot camp
•
Linux commands
subn-et.IS
workgroups require same
list (dir)
COPY
-
MAC Of files - Time Machine
Cd -
Change directory
Shutdown Shut off
system
• -
•
passwd -
Changes password
•
MV -
rename and move file to another directory
•
Cp -
copy
•
rm -
remove (deletes files
chmod Change file perm
•
-
.
•
1W Config / if config network/wireless settings -
SU / Sudo -
starts a new shell as a new user
-
apt -
get
-
•
Kill -
Mantrap
•
between 2 Security areas , like Sandy house from Spongebob
Badge reader
•
RFID or NFC to scan a badge
Door lock
card swipe , biometric , proximity lock , punch code
-
key code ,
Hardware token
•
server lock
•
USB lock
•
dont want anyone to use USB
Privacy screen
•
organization
login script Folder redirection Domain Group policy / updating Home folder , a ' unit
•
, , , ,
software Token
•
Port Security
netword ad mins control who physically plug into
•
switch
What happens once violation has occurd shutdown or blocking
•
-
state
MAC Address Filtering
great line of defense for network /System admires
•
•
Who has access to network based on hardware address
Digital certificate
•
Use to authenticate yourself
-
helps you
find and
get rid of viruses and
against
Firewalls
•
filters traffic coming in /out of a network Cor )
pc
-
,
software firewall -
built into OS
packet Stateful Application layer , NGFW WAF
filtering
•
. , ,
web firewall
layer 3 {
Source Where it block content combines app
attack
destination came from de packet all 3 protects web
, on .
, ,
Directory permissions
•
access control list
•
need permissions to access smthng
VPN
allows use private network
•
by a tunnel .
Algorithm ,
IV weakness
•
WPA -
Wifi protected access , better against IV attacks , use TKIP
•
WPAZ -
current , best system , use CCMP w/ AES
TKIP Temporal Key Integrity protocol rotation of keys
•
-
,
•
AES Advanced
-
Authentication
Singlefactor , multi factor
•
•
Radius server dial in access , auth , centralized
- server talk to access point
-
UDP ,
2 factor
•
Tacacs -
Access control Service , more secure , Central manage for auth config .
TCP , 3 profiles
or
-
•
Rootkit -
virus -
,
•
Spyware way -
for advertisers to
spy on
you and benefit from it . evolved now
Tools and methods capture data
•
Anti -
virus
Anti-malware
goes against younger malware
-
Software Firewalls -
filter out some traffic
DNS configuration DNS compromised , not actual website verify DNS t static ARP
•
-
.
Social
2. 5 Engineering ,
Threats Vulnerabilities
,
Social Engineering
phishing trying to get you to click on things
• -
DDOS -
Distributed service Denial of
•
attacker → command handler → multiple zombies → victim
DOS -
denial of service
system overloading
one another system
-
Zero Day -
Man -
in -
the -
middle
between communication stream to get your data that youre sending
'
Brute-force
•
tries
every password combination
to
guess
Dictionary
•
spoofing
•
Admin Power ,
user ,
guest .
Standard user
standard
beyond
not admin
Allow us deny
•
permission propagation
inheritance
System files and folders
•
hidden for security or deletion
SSO -
single sign on
sign on
only and have to
once access
everything else
•
Bit Locker
encryption
•
Used to
encrypt a bunch of files , w/ NTFS ,
transparent public key
2. 7 Secure a workstation
Password best practice
•
Strong passphrase
-
7pm -
from Cmd line
•
disable guest acc
•
failed attempts lockout Account - lockout in local Sec .
policy
•
timeout / screen lock
default admin user / Pass cant be locked out
change
• -
password reset /
-
Unlock account
Data Encryption
•
data at rest ,
on HD ,
needs to be
encrypted
•
data in transit also needs to be encrypted
2. 8 Mobile Devices
Securing
Methods of securing mobile device
•
Remote wipe
-
Locator Application
•
Remote backup application
•
Biometrics authentication
Full device
encryption
•
•
Multi factor authentication
•
authenticator applications
•
Trusted sources vs. Untrusted sources
-
Firewalls
•
policies { procedures
Shredder
•
Electromagnetic ( Degaussing)
•
Incineration
•
Hot Hot Hot
-
Certificate of destruction
-
Send them off and get certificate
Recyclingorrepurposing
•
low level format - us .
Standard format
factory format vs
everyday format
'
Overwrite
•
write a bunch of 0 's and 1 's (binary)
•
Drive wipe
Wireless Specific
Change default SSID router name
•
-
Set encryption -
WPAZ personal us . enterprise
auth on router doesnt have pre shared key ,
auth on server
•
disable SSID broadcast
•
Antenna and access point placement
-
,
be tricked w/ spoofing
static IP Addresses
or
done w/ either WAN or LAN on WAN the ISP might overwrite you
,
Firewall settings
•
run web server from private IP , forwards it to specific port inside system
* minecraft Java server
Content Filtering /Parent controls
•
little peice of software for specific device that tells it how to function
Quiz questions :
, ,
•
Failure to Boot / no 05 found
hardware issue no 0s bad driver HD not prop formatted wrong
•
, , , .
,
Boot device
Application crash
-
black screen
•
hardware monitor / mb , driver ,
overheat, labeling , power
•
printer issues
•
not installed wrong driver, permissions , Cabe / ing jamed
, ,
offline
•
Services failed to start
•
Slow Bootup
too many start processes Hardware ,
-
malware , boot time scan , update install
,
•
Slow profile load
from domain , too AD
loading roaming profile many logon scripts through
•
active directory
•
Reboot
•
Always
•
Kill task
•
Kill Specific process
•
Restart services
.sc in Cmd
-
Apply updates
patch bug { vulnerabilities
•
Repair Application
•
if keeps crashing
•
no 05 ,
make sure cables plugged in
Disable windows services / applications
disable starting at boot
•
, Task Manager
•
, up
•
Safe Boot
Change
•
Driver , F8 function
•
Rebuild windows profile
something corrupt
-
COMMptrns
•
Pop -
ups
•
a window w/ an ad that
gets you to click on
something
-
Browser Redirection
lets you that leaving the
know
youre webpage
•
Security alerts
•
anti virus -
or anti-malware alerts
•
DHCP / DNS Mi TM
rogue
-
,
•
Rogue Anti-virus
•
Disappearing Files
•
'
Hijacked Email
3. 3 Malware Removal
1.
Identify and Researching malware symptoms
Whats going on to make you think you have malware ?
-
,
install scanner in safe mode
,
,
•
What to do , what not to do ,
not IT people ,
what to look for
3. 4 Mobile 05 App issues
Ctmmonsymptoms
•
Wireless connectivity
battery too low
•
•
Cant broadcast ext monitor
•
wireless int 05 graphics card , cable , extended or duplicate screen in settings
, ,
-
Apps not
loading
need network connectivity , malware
-
,
•
Frozen system
•
Overheated ,
Overuse ,
Malware, bad update, app hanging
-
NO sound from speakers
•
water , driver issue , bluetooth paired ?
•
•
Data transmission over limit
, ,
Quiz questions :
online
library of info abt product , topic ,
etc .
Incident documentation
document from beginning date / time who reported , when noticed , who took report
'
, ,
Acceptable use
policy
-
password policy
•
how the password should be
, , ,
Inventory management
asset tags barcodes track inventory
•
, ,
4.2 Basic Change Management
Documented Business Processes
•
a business is a
group of interrelated processes .
, ,
communicate to stakeholders
End-user Acceptance
communication is
key training important
-
change Board
•
Backup testing
Make sure backup is
working
•
UPS
•
•
antistatic bag ,
ESD Straps / mats , self grounding
Toxic waste handling
•
Take to recycle center
•
Personal safety
disconnect power before
opening up , remove jewellery lift tech , weight limit ,
•
Power surges ,
brownouts ,
blackouts
•
have UPS / surge protector Backup services . . Generators
4. 6 Addressing Stuff
Incident Response
First report data /device preservation
response identify
•
-
,
,
'
process
-
End User
•
Pcl / Dss
payment card industry how youu protect credit cards
• -
-
•
GDPR General Data protection regulation if you resell data
-
-
not
acronyms
•
•
have confidence
be culturally sensitive -
use titles Sir dr .
be on time -
let them know
•
Avoid distractions dont , look at phone , have convo , dont talk w/ coworker
, , , ,
4. 8 Basics Of Scripting
Script File
Types
-
bat -
batch file w/ dos -
execute Comm at cmd (Cmd .
)
exe
•
PSI -
powershell script -
Sh -
•
JS -
javascript functions , to open close windows
-
Vbs -
Visual basic script ,
AD folders move
copy files
environment variables
•
Variables defined for current shell ,
inherited by child shells
pass info into processes
'
comment syntax
add comments for
why
•
rem
-
-
Variables
"
hello world
defining temporary for data
"
•
-
holders ✗=
•
Integers -
Whole # 's ,
+ or -
, start at 0
•
Strings -
3389
Telnet
•
remote
connectivity to config switches ,
routers , plain text , txt based
•
23 -
un secure
SSH
•
secure shell secure
,
telnet
•
22 authentication = 21
Third tools
party
•
screen share feature ,
file share ,
PUTTY
4.x quiz
: