CompTIA A+ 220-1002 Exam overview

Operating Systems 27%
Firstly, Compare and contrast common operating system types and their purposes.
Compare and contrast features of Microsoft Windows versions.
Also, general OS installation considerations and upgrade methods.
Given a scenario, use appropriate Microsoft command-line tools.
Given a scenario, use Microsoft operating system features and tools.
Also, Given a scenario, use Microsoft Windows Control Panel utilities.
Summarize application installation and configuration concepts.
Given a scenario, configure Microsoft Windows networking on a client/desktop.
Also, Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
Security 24%
Firstly, Summarize the importance of physical security measures.
Also, Explain logical security concepts.
Compare and contrast wireless security protocols and authentication methods.
Also, Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
Subsequently, Compare and contrast social engineering, threats, and vulnerabilities.
Also, Compare and contrast the differences of basic Microsoft Windows OS security settings.
Given a scenario, implement security best practices to secure a workstation.
Also, Given a scenario, implement methods for securing mobile devices.
Subsequently, Given a scenario, implement appropriate data destruction and disposal methods.
Also, Given a scenario, configure security on SOHO wireless and wired networks.
Software Troubleshooting 26%
Firstly, Given a scenario, troubleshoot Microsoft Windows OS problems.
Given a scenario, troubleshoot and resolve PC security issues.
Also, Given a scenario, use best practice procedures for malware removal.
Subsequently, Given a scenario, troubleshoot mobile OS and application issues.
Also, Given a scenario, troubleshoot mobile OS and application security issues.

More Info: comptia a+ job

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis