CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902
5/5
()
About this ebook
The CompTIA A+ Complete Review Guide, 3rd Edition is your ideal solution for preparing for exams 220-901 and 220-902. The perfect companion to the CompTIA A+ Complete Study Guide, 3rd Edition this book provides you with extra review and reinforcement of key topics you'll see on the exam. The material is broken into two parts that each focus on a single exam, then organized by domain objective so you can quickly find the information you need most. This new third edition has been updated to reflect the revised exams, with the latest best practices and an emphasis on Windows 8/8.1 and mobile OSes. You also get access to the exclusive Sybex online learning environment featuring over 170 review questions, four bonus exams, 150 electronic flashcards, and a glossary of key terms — over 500 practice questions in all!
The CompTIA A+ certification is the essential computer technician credential, and is required by over 100 leading employers. This book gives you the review and practice you need to approach the exam with confidence.
- Brush up on PC hardware, laptops, printers, and mobile devices
- Review the fundamentals of networking and security
- Delve into the latest operating systems and operating procedures
- Troubleshoot common IT issues, and learn the latest best practices
Read more from Troy Mc Millan
CompTIA A+ Complete Review Guide: Exam Core 1 220-1001 and Exam Core 2 220-1002 Rating: 5 out of 5 stars5/5CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5CompTIA Server+ Study Guide: Exam SK0-005 Rating: 5 out of 5 stars5/5Cisco Networking Essentials Rating: 0 out of 5 stars0 ratingsCCNA Security Study Guide: Exam 210-260 Rating: 0 out of 5 stars0 ratingsCompTIA Server+ Study Guide: Exam SK0-004 Rating: 0 out of 5 stars0 ratings
Related to CompTIA A+ Complete Review Guide
Related ebooks
CompTIA Network+ Review Guide: Exam N10-007 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-007 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-501 Rating: 4 out of 5 stars4/5CompTIA A+ Practice Tests: Exam 220-901 and Exam 220-902 Rating: 0 out of 5 stars0 ratingsCompTIA IT Fundamentals Study Guide: Exam FC0-U51 Rating: 0 out of 5 stars0 ratingsUnderstanding Cisco Networking Technologies, Volume 1: Exam 200-301 Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Practice Tests: Exam Core 1 220-1001 and Exam Core 2 220-1002 Rating: 0 out of 5 stars0 ratingsCompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsCCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsCASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA A+ Certification All-in-One For Dummies Rating: 3 out of 5 stars3/5CompTIA Linux+ Practice Tests: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsSubnetting Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5LPI Linux Essentials Study Guide: Exam 010 v1.6 Rating: 0 out of 5 stars0 ratingsCompTIA Linux+ Study Guide: Exam XK0-004 Rating: 0 out of 5 stars0 ratingsCompTIA Server+ Study Guide: Exam SK0-004 Rating: 0 out of 5 stars0 ratingsCompTIA PenTest+ Practice Tests: Exam PT0-001 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-501 Rating: 0 out of 5 stars0 ratingsLPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-500 and Exam 102-500 Rating: 0 out of 5 stars0 ratingsCCNA Routing and Switching Practice Tests: Exam 100-105, Exam 200-105, and Exam 200-125 Rating: 0 out of 5 stars0 ratingsMCA Modern Desktop Administrator Practice Tests: Exam MD-100 and MD-101 Rating: 0 out of 5 stars0 ratingsCompTIA PenTest+ Study Guide: Exam PT0-001 Rating: 0 out of 5 stars0 ratingsWindows Server Administration Fundamentals Rating: 0 out of 5 stars0 ratingsCompTIA Project+ Study Guide: Exam PK0-004 Rating: 0 out of 5 stars0 ratingsComptia A+ 220-902 Q & A Study Guide: Comptia 21 Day 900 Series, #4 Rating: 0 out of 5 stars0 ratings
Hardware For You
Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/53D Printing For Dummies Rating: 4 out of 5 stars4/5Samsung Galaxy S23 Ultra User Guide for Beginners and Seniors Rating: 3 out of 5 stars3/5Windows 365 For Dummies Rating: 0 out of 5 stars0 ratingsWindows 11 For Seniors For Dummies Rating: 0 out of 5 stars0 ratingsRaspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5iPhone 14 Pro Max User Guide for Beginners and Seniors Rating: 0 out of 5 stars0 ratingsMastering ChatGPT Rating: 0 out of 5 stars0 ratingsiPhone For Seniors For Dummies: Updated for iPhone 12 models and iOS 14 Rating: 4 out of 5 stars4/5Raspberry Pi for Secret Agents - Second Edition Rating: 3 out of 5 stars3/5iPhone Photography: A Ridiculously Simple Guide To Taking Photos With Your iPhone Rating: 0 out of 5 stars0 ratingsDebugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems Rating: 4 out of 5 stars4/5TI-84 Plus CE Graphing Calculator For Dummies Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Programming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Upgrading and Fixing Computers Do-it-Yourself For Dummies Rating: 4 out of 5 stars4/5Build Your Own PC Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5Chip War: The Fight for the World's Most Critical Technology Rating: 4 out of 5 stars4/5Dancing with Qubits: How quantum computing works and how it can change the world Rating: 5 out of 5 stars5/5Macs All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsRaspberry Pi Cookbook for Python Programmers Rating: 0 out of 5 stars0 ratingsFitbit For Dummies Rating: 0 out of 5 stars0 ratingsArduino: A Quick-Start Beginner's Guide Rating: 4 out of 5 stars4/5Teach Yourself VISUALLY Computers Rating: 0 out of 5 stars0 ratingsComputer Organization and Design: The Hardware / Software Interface Rating: 4 out of 5 stars4/5Tor Darknet Bundle: Master the Art of Invisibility Rating: 0 out of 5 stars0 ratingsGetting Started With MacBook Air (2020 Model): A Guide For New MacOS Users Rating: 0 out of 5 stars0 ratings
Reviews for CompTIA A+ Complete Review Guide
1 rating0 reviews
Book preview
CompTIA A+ Complete Review Guide - Troy McMillan
Introduction
The A+ certification program was developed by the Computing Technology Industry Association (CompTIA) to provide an industry-wide means of certifying the competency of computer service technicians. The A+ certification is granted to those who have attained the level of knowledge and troubleshooting skills that are needed to provide capable support in the field of personal computers. CompTIA is a widely respected industry leader in this area.
CompTIA’s A+ exam objectives are periodically updated to keep the certification applicable to the most recent hardware and software. This is necessary because a technician must be able to work on the latest equipment. The most recent revisions to the objectives—and to the whole program—were introduced in 2015 and are reflected in this book.
This book and the Sybex CompTIA A+ Complete Study Guide (both the Standard and Deluxe Editions) are tools to help you prepare for this certification—and for the new areas of focus of a modern computer technician’s job.
What Is A+ Certification?
The A+ certification program was created to offer a wide-ranging certification, in the sense that it’s intended to certify competence with personal computers from many different makers/vendors. Everyone must take and pass two exams: 220-901 and 220-902.
You don’t have to take the 220-901 exam and the 220-902 exam at the same time. The A+ certification isn’t awarded until you’ve passed both tests. For the latest pricing on the exams and updates to the registration procedures, call Pearson VUE at (877) 551-7587. You can also go to Pearson VUE for additional information or to register online at www.pearsonvue.com/comptia. If you have further questions about the scope of the exams or related CompTIA programs, refer to the CompTIA website at www.comptia.org.
Who Should Buy This Book?
If you want to acquire a solid foundation in personal-computer basics and your goal is to prepare for the exams by filling in any gaps in your knowledge, this book is for you. You’ll find clear explanations of the concepts you need to grasp and plenty of help to achieve the high level of professional competency you need in order to succeed in your chosen field.
If you want to become certified as an A+ holder, this book is definitely what you need. However, if you just want to attempt to pass the exam without really understanding the basics of personal computers, this guide isn’t for you. It’s written for people who want to acquire skills and knowledge of personal-computer basics.
How to Use This Book
We’ve included several learning tools in the book. These tools will help you retain vital exam content as well as prepare to sit for the actual exams.
Exam Essentials Each chapter includes a number of exam essentials. These are the key topics that you should take from the chapter in terms of areas on which you should focus when preparing for the exam.
Chapter Review Questions To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers are in the Appendix. You can go back to reread the section that deals with each question you got wrong to ensure that you answer correctly the next time you’re tested on the material.
Interactive Online Learning Environment and Test Bank
The interactive online learning environment that accompanies CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902, Third Edition, provides a test bank with study tools to help you prepare for the certification exam—and increase your chances of passing it the first time! The test bank includes the following:
Sample Tests All the questions in this book are provided, including the Chapter Tests that include the review questions at the end of each chapter. In addition, there are four Practice Exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.
Flashcards One set of questions is provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.
Other Study Tools A glossary of key terms from this book and their definitions are available as a fully searchable PDF.
Go to http://sybextestbanks.wiley.com to register and gain access to this interactive online learning environment and test bank with study tools.
Tips for Taking the A+ Exams
Here are some general tips for taking your exams successfully:
Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.
Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information.
Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what the question is asking.
Don’t leave any unanswered questions. Unanswered questions are scored against you.
There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either Choose two
or Choose all that apply.
Be sure to read the messages displayed to know how many correct answers you must choose.
When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.
On form-based tests (nonadaptive), because the hard questions will eat up the most time, save them for last. You can move forward and backward through the exam.
For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at www.comptia.org.
Performance-Based Questions
CompTIA has introduced performance-based questions on the latest A+ exams. These are not the traditional multiple-choice questions with which you’re probably familiar. These questions require the candidate to know how to perform a specific task or series of tasks. More than likely the candidate will be presented with a scenario and will be asked to complete a task. They will be taken to a simulated environment where they will have to perform a series of steps and will be graded on how well they complete the task.
CompTIA A+ 900 Series Exam Objectives
CompTIA goes to great lengths to ensure that its certification programs accurately reflect the IT industry’s best practices. The company does this by establishing Cornerstone Committees for each of its exam programs. Each committee comprises a small group of IT professionals, training providers, and publishers who are responsible for establishing the exam’s baseline competency level and who determine the appropriate target audience level.
Once these factors are determined, CompTIA shares this information with a group of hand-selected subject-matter experts (SMEs). These folks are the true brainpower behind the certification program. They review the committee’s findings, refine them, and shape them into the objectives you see before you. CompTIA calls this process a Job Task Analysis (JTA).
Finally, CompTIA conducts a survey to ensure that the objectives and weightings truly reflect the job requirements. Only then can the SMEs go to work writing the hundreds of questions needed for the exam. And, in many cases, they have to go back to the drawing board for further refinements before the exam is ready to go live in its final state. So, rest assured, the content you’re about to learn will serve you long after you take the exam.
Exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit the certification page of CompTIA’s website at www.comptia.org for the most current listing of exam objectives.
CompTIA also publishes relative weightings for each of the exam’s objectives. The following tables list the objective domains and the extent to which they’re represented on each exam.
The following sections show the objectives beneath each of these in more detail.
CompTIA 220-901 Exam Objectives
1.0 Hardware
1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
Firmware upgrades – flash BIOS
BIOS component information
RAM
Hard drive
Optical drive
CPU
BIOS configurations
Boot sequence
Enabling and disabling devices
Date/time
Clock speeds
Virtualization support
BIOS security (passwords, drive encryption: TPM, LoJack, secure boot)
Built-in diagnostics
Monitoring
Temperature monitoring
Fan speeds
Intrusion detection/notification
Voltage
Clock
Bus speed
1.2 Explain the importance of motherboard components, their purpose, and properties.
Sizes
ATX
Micro-ATX
Mini-ITX
ITX
Expansion slots
PCI
PCI-X
PCIe
miniPCI
RAM slots
CPU sockets
Chipsets
North bridge
South bridge
CMOS battery
Power connections and types
Fan connectors
Front/Top-panel connectors
USB
Audio
Power button
Power light
Drive activity lights
Reset button
Bus speeds
1.3 Compare and contrast various RAM types and their features.
Types
DDR
DDR2
DDR3
SODIMM
DIMM
Parity vs. non-parity
ECC vs. non-ECC
RAM configurations
Single channel vs. dual channel vs. triple channel
Single-sided vs. double-sided
Buffered vs. unbuffered
RAM compatibility
1.4 Install and configure PC expansion cards.
Sound cards
Video cards
Network cards
USB cards
FireWire cards
Thunderbolt cards
Storage cards
Modem cards
Wireless/cellular cards
TV tuner cards
Video capture cards
Riser cards
1.5 Install and configure storage devices and use appropriate media.
Optical drives
CD-ROM/CD-RW
DVD-ROM/DVD-RW/DVD-RW DL
Blu-ray
BD-R
BD-RE
Magnetic hard disk drives
5,400 rpm
7,200 rpm
10,000 rpm
Hot-swappable drives
Solid-state/flash drives
Compact flash
SD
Micro-SD
Mini-SD
xD
SSD
Hybrid
eMMC
RAID types
0
1
5
10
Tape drive
Media capacity
CD
CD-RW
DVD-RW
DVD
Blu-ray
Tape
DVD DL
1.6 Install various types of CPUs and apply the appropriate cooling methods.
Socket types
Intel: 775, 1155, 1156, 1366, 1150, 2011
AMD: AM3, AM3+, FM1, FM2, FM2+
Characteristics
Speeds
Cores
Cache size/type
Hyperthreading
Virtualization support
Architecture (32-bit vs. 64-bit)
Integrated GPU
Disable execute bit
Cooling
Heat sink
Fans
Thermal paste
Liquid-based
Fanless/passive
1.7 Compare and contrast various PC connection interfaces, their characteristics, and purpose.
Physical connections
USB 1.1 vs. 2.0 vs. 3.0
Connector types: A, B, mini, micro
FireWire 400 vs. FireWire 800
SATA1 vs. SATA2 vs. SATA3, eSATA
Other connector types
VGA
HDMI
DVI
Audio
Analog
Digital (optical connector)
RJ-45
RJ-11
Thunderbolt
Wireless connections
Bluetooth
RF
IR
NFC
Characteristics
Analog
Digital
Distance limitations
Data transfer speeds
Quality
DRM
Frequencies
1.8 Install a power supply based on given specifications.
Connector types and their voltages
SATA
Molex
4/8-pin 12v
PCIe 6/8-pin
20-pin
24-pin
Specifications
Wattage
Dual rail
Size
Number of connectors
ATX
Micro-ATX
Dual-voltage options
1.9 Given a scenario, select the appropriate components for a custom PC configuration to meet customer specifications or needs.
Graphic/CAD/CAM design workstation
Multicore processor
High-end video
Maximum RAM
Audio/video-editing workstation
Specialized audio and video card
Large fast hard drive
Dual monitors
Virtualization workstation
Maximum RAM and CPU cores
Gaming PC
Multicore processor
High-end video/specialized GPU
High-definition sound card
High-end cooling
Home Theater PC
Surround sound audio
HDMI output
HTPC compact form factor
TV tuner
Standard thick client
Desktop applications
Meets recommended requirements for selected OS
Thin client
Basic applications
Meets minimum requirements for selected OS
Network connectivity
Home Server PC
Media streaming
File sharing
Print sharing
Gigabit NIC
RAID array
1.10 Compare and contrast types of display devices and their features.
Types
LCD
TN vs. IPS
Fluorescent vs. LED backlighting
Plasma
Projector
OLED
Refresh/frame rates
Resolution
Native resolution
Brightness/lumens
Analog vs. digital
Privacy/antiglare filters
Multiple displays
Aspect ratios
16:9
16:10
4:3
1.11 Identify common PC connector types and associated cables.
Display connector types
DVI-D
DVI-I
DVI-A
DisplayPort
RCA
HD15 (i.e., DE15 or DB15)
BNC
miniHDMI
miniDin-6
Display cable types
HDMI
DVI
VGA
Component
Composite
Coaxial
Device cables and connectors
SATA
eSATA
USB
FireWire (IEEE 1394)
PS/2
Audio
Adapters and convertors
DVI to HDMI
USB A to USB B
USB to Ethernet
DVI to VGA
Thunderbolt to DVI
PS/2 to USB
HDMI to VGA
1.12 Install and configure common peripheral devices.
Input devices
Mouse
Keyboard
Scanner
Barcode reader
Biometric devices
Game pads
Joysticks
Digitizer
Motion sensor
Touch pads
Smart card readers
Digital cameras
Microphone
Webcam
Camcorder
MIDI-enabled devices
Output devices
Printers
Speakers
Display devices
Input & Output devices
Touchscreen
KVM
Smart TV
Set-Top Box
1.13 Install SOHO multifunction device/printers and configure appropriate settings.
Use appropriate drivers for a given operating system
Configuration settings
Duplex
Collate
Orientation
Quality
Device sharing
Wired
USB
Serial
Ethernet
Wireless
Bluetooth
802.11 (a,b,g,n,ac)
Infrastructure vs. ad hoc
Integrated print server (hardware)
Cloud printing/remote printing
Public/shared devices
Sharing local/networked device via operating system settings
TCP/Bonjour/AirPrint
Data privacy
User authentication on the device
Hard drive caching
1.14 Compare and contrast differences between the various print technologies and the associated imaging process.
Laser
Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing assembly
Imaging process: processing, charging, exposing, developing, transferring, fusing and cleaning
Inkjet
Ink cartridge, print head, roller, feeder, duplexing assembly, carriage and belt
Calibration
Thermal
Feed assembly, heating element
Special thermal paper
Impact
Print head, ribbon, tractor feed
Impact paper
Virtual
Print to file
Print to PDF
Print to XPS
Print to image
1.15 Given a scenario, perform appropriate printer maintenance.
Laser
Replacing toner, applying maintenance kit, calibration, cleaning
Thermal
Replace paper, clean heating element, remove debris
Impact
Replace ribbon, replace print head, replace paper
Inkjet
Clean heads, replace cartridges, calibration, clear jams
2.0 Networking
2.1 Identify the various types of network cables and connectors.
Fiber
Connectors: SC, ST and LC
Twisted Pair
Connectors: RJ-11, RJ-45
Wiring standards: T568A, T568B
Coaxial
Connectors: BNC, F-connector
2.2 Compare and contrast the characteristics of connectors and cabling.
Fiber
Types (single-mode vs. multi-mode)
Speed and transmission limitations
Twisted pair
Types: STP, UTP, CAT3, CAT5, CAT5e, CAT6, CAT6e, CAT7, plenum, PVC
Speed and transmission limitations
Splitters and effects on signal quality
Coaxial
Types: RG-6, RG-59
Speed and transmission limitations
Splitters and effects on signal quality
2.3 Explain the properties and characteristics of TCP/IP.
IPv4 vs. IPv6
Public vs. private vs. APIPA/link local
Static vs. dynamic
Client-side DNS settings
Client-side DHCP
Subnet mask vs. CIDR
Gateway
2.4 Explain common TCP and UDP ports, protocols, and their purpose.
Ports
21 – FTP
22 – SSH
23 – TELNET
25 – SMTP
53 – DNS
80 – HTTP
110 – POP3
143 – IMAP
443 – HTTPS
3389 – RDP
137-139, 445 - SMB
548 or 427 - AFP
Protocols
DHCP
DNS
LDAP
SNMP
SMB
CIFS
SSH
AFP
TCP vs. UDP
2.5 Compare and contrast various Wi-Fi networking standards and encryption types.
Standards
802.11 a/b/g/n/ac
Speeds, distances, and frequencies
Encryption types
WEP, WPA, WPA2, TKIP, AES
2.6 Given a scenario, install and configure SOHO wireless/wired router and apply appropriate settings.
Channels
Port forwarding, port triggering
DHCP (on/off)
DMZ
NAT/DNAT
Basic QoS
Firmware
UPnP
2.7 Compare and contrast Internet connection types, network types, and their features.
Internet connection types
Cable
DSL
Dial-up
Fiber
Satellite
ISDN
Cellular
Tethering
Mobile hotspot
Line-of-sight wireless Internet service
Network types
LAN
WAN
PAN
MAN
2.8 Compare and contrast network architecture devices, their functions, and features.
Hub
Switch
Router
Access point
Bridge
Modem
Firewall
Patch panel
Repeaters/extenders
Ethernet over Power
Power over Ethernet injector
2.9 Given a scenario, use appropriate networking tools.
Crimper
Cable stripper
Multimeter
Tone generator & probe
Cable tester
Loopback plug
Punchdown tool
Wi-Fi analyzer
3.0 Mobile Devices
3.1 Install and configure laptop hardware and components.
Expansion options
Express card/34
Express card/54
SODIMM
Flash
Ports/adapters
Thunderbolt
DisplayPort
USB to RJ-45 dongle
USB to Wi-Fi dongle
USB to Bluetooth
USB optical drive
Hardware/device replacement
Keyboard
Hard drive
SSD vs. hybrid vs. magnetic disk
1.8in vs. 2.5in
Memory
Smart card reader
Optical drive
Wireless card
Mini-PCIe
Screen
DC jack
Battery
Touchpad
Plastics/frames
Speaker
System board
CPU
3.2 Explain the function of components within the display of a laptop.
Types
LCD
TTL vs. IPS
Fluorescent vs. LED backlighting
OLED
Wi-Fi antenna connector/placement
Webcam
Microphone
Inverter
Digitizer
3.3 Given a scenario, use appropriate laptop features.
Special function keys
Dual displays
Wireless (on/off)
Cellular (on/off)
Volume settings
Screen brightness
Bluetooth (on/off)
Keyboard backlight
Touch pad (on/off)
Screen orientation
Media options (fast forward/rewind)
GPS (on/off)
Airplane mode
Docking station
Physical laptop lock and cable lock
Rotating/removable screens
3.4 Explain the characteristics of various types of other mobile devices.
Tablets
Smartphones
Wearable technology devices
Smart watches
Fitness monitors
Glasses and headsets
Phablets
e-Readers
Smart camera
GPS
3.5 Compare and contrast accessories and ports of other mobile devices.
Connection types
NFC
Proprietary vendor-specific ports (communication/power)
microUSB/miniUSB
Lightning
Bluetooth
IR
Hotspot/tethering
Accessories
Headsets
Speakers
Game pads
Docking stations
Extra battery packs/battery chargers
Protective covers/water proofing
Credit card readers
Memory/MicroSD
4.0 Hardware and Network Troubleshooting
4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU, and power with appropriate tools.
Common symptoms
Unexpected shutdowns
System lockups
POST code beeps
Blank screen on bootup
BIOS time and settings resets
Attempts to boot to incorrect device
Continuous reboots
No power
Overheating
Loud noise
Intermittent device failure
Fans spin – no power to other devices
Indicator lights
Smoke
Burning smell
Proprietary crash screens (BSOD/pin wheel)
Distended capacitors
Tools
Multimeter
Power supply tester
Loopback plugs
POST card/USB
4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
Common symptoms
Read/write failure
Slow performance
Loud clicking noise
Failure to boot
Drive not recognized
OS not found
RAID not found
RAID stops working
Proprietary crash screens (BSOD/pin wheel)
S.M.A.R.T. errors
Tools
Screwdriver
External enclosures
CHKDSK
FORMAT
File recovery software
Bootrec
Diskpart
Defragmentation tool
4.3 Given a scenario, troubleshoot common video, projector, and display issues.
Common symptoms
VGA mode
No image on screen
Overheat shutdown
Dead pixels
Artifacts
Color patterns incorrect
Dim image
Flickering image
Distorted image
Distorted geometry
Burn-in
Oversized images and icons
4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
Common symptoms
No connectivity
APIPA/link local address
Limited connectivity
Local connectivity
Intermittent connectivity
IP conflict
Slow transfer speeds
Low RF signal
SSID not found
Hardware tools
Cable tester
Loopback plug
Punchdown tools
Tone generator and probe
Wire strippers
Crimper
Wireless locator
Command-line tools
PING
IPCONFIG/IFCONFIG
TRACERT
NETSTAT
NBTSTAT
NET
NETDOM
NSLOOKUP
4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
Common symptoms
No display
Dim display
Flickering display
Sticking keys
Intermittent wireless
Battery not charging
Ghost cursor/pointer drift
No power
Num lock indicator lights
No wireless connectivity
No Bluetooth connectivity
Cannot display to external monitor
Touchscreen non-responsive
Apps not loading
Slow performance
Unable to decrypt e-mail
Extremely short battery life
Overheating
Frozen system
No sound from speakers
GPS not functioning
Swollen battery
Disassembling processes for proper re-assembly
Document and label cable and screw locations
Organize parts
Refer to manufacturer resources
Use appropriate hand tools
4.6 Given a scenario, troubleshoot printers with appropriate tools.
Common symptoms
Streaks
Faded prints
Ghost images
Toner not fused to the paper
Creased paper
Paper not feeding
Paper jam
No connectivity
Garbled characters on paper
Vertical lines on page
Backed up print queue
Low memory errors
Access denied
Printer will not print
Color prints in wrong print color
Unable to install printer
Error codes
Printing blank pages
No image on printer display
Tools
Maintenance kit
Toner vacuum
Compressed air
Printer spooler
CompTIA 220-902 Exam Objectives
1.0 Windows Operating Systems
1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
Features:
32-bit vs. 64-bit
Aero, gadgets, user account control, BitLocker, shadow copy, system restore, ready boost, sidebar, compatibility mode, virtual XP mode, easy transfer, administrative tools, defender, Windows firewall, security center, event viewer, file structure and paths, category view vs. classic view, previous versions.
Side-by-side apps, Metro UI, Pinning, One Drive, Windows store, Multimonitor task bars, Charms, Start Screen, Power Shell, Live sign in, Action Center.
Upgrade paths – differences between in-place upgrades, compatibility tools, Windows upgrade OS advisor
1.2 Given a scenario, install Windows PC operating systems using appropriate methods.
Boot methods
USB
CD-ROM
DVD
PXE
Solid-state/flash drives
Netboot
External/hot-swappable drive
Internal hard drive (partition)
Type of installations
Unattended installation
Upgrade
Clean install
Repair installation
Multiboot
Remote network installation
Image deployment
Recovery partition
Refresh/restore
Partitioning
Dynamic
Basic
Primary
Extended
Logical
GPT
Filesystem types/formatting
ExFAT
FAT32
NTFS
CDFS
NFS
ext3, ext4
Quick format vs. full format
Load alternate third-party drivers when necessary
Workgroup vs. domain setup
Time/date/region/language settings
Driver installation, software, and windows updates
Factory recovery partition
Properly formatted boot drive with the correct partitions/format
1.3 Given a scenario, apply appropriate Microsoft command-line tools.
TASKKILL
BOOTREC
SHUTDOWN
TASKLIST
MD
RD
CD
DEL
FORMAT
COPY
XCOPY
ROBOCOPY
DISKPART
SFC
CHKDSK
GPUPDATE
GPRESULT
DIR
EXIT
HELP
EXPAND
[command name] /?
Commands available with standard privileges vs. administrative privileges.
1.4 Given a scenario, use appropriate Microsoft operating system features and tools.
Administrative
Computer management
Device manager
Users and groups
Local security policy
Performance monitor
Services
System configuration
Task scheduler
Component services
Data sources
Print management
Windows memory diagnostics
Windows firewall
Advanced security
MSCONFIG
General
Boot
Services
Startup
Tools
Task Manager
Applications
Processes
Performance
Networking
Users
Disk management
Drive status
Mounting
Initializing
Extending partitions
Splitting partitions
Shrink partitions
Assigning/changing drive letters
Adding drives
Adding arrays
Storage spaces
Other
User State Migration tool (USMT)
Windows Easy Transfer
Windows Upgrade Advisor
System utilities
REGEDIT
COMMAND
SERVICES.MSC
MMC
MSTSC
NOTEPAD
EXPLORER
MSINFO32
DXDIAG
DEFRAG
System restore
Windows Update
1.5 Given a scenario, use Windows Control Panel utilities.
Internet options
Connections
Security
General
Privacy
Programs
Advanced
Display/display settings
Resolution
Color depth
Refresh rate
User accounts
Folder options
View hidden files
Hide extensions
General options
View options
System
Performance (virtual memory)
Remote settings
System protection
Windows firewall
Power options
Hibernate
Power plans
Sleep/suspend
Standby
Programs and features
HomeGroup
Devices and Printers
Sound
Troubleshooting
Network and Sharing Center
Device Manager
1.6 Given a scenario, install and configure Windows networking on a client/desktop.
HomeGroup vs. WorkGroup
Domain setup
Network shares/administrative shares/mapping drives
Printer sharing vs. network printer mapping
Establish networking connections
VPN
Dialups
Wireless
Wired
WWAN (Cellular)
Proxy settings
Remote Desktop Connection
Remote Assistance
Home vs. Work vs. Public network settings
Firewall settings
Exceptions
Configuration
Enabling/disabling Windows firewall
Configuring an alternative IP address in Windows
IP addressing
Subnet mask
DNS
Gateway
Network card properties
Half duplex/full duplex/auto
Speed
Wake-on-LAN
QoS
BIOS (on-board NIC)
1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools.
Best practices
Scheduled backups
Scheduled disk maintenance
Windows updates
Patch management
Driver/firmware updates
Antivirus/antimalware updates
Tools
Backup
System restore
Recovery image
Disk maintenance utilities
2.0 Other Operating Systems and Technologies
2.1 Identify common features and functionality of the Mac OS and Linux operating systems.
Best practices
Scheduled backups
Scheduled disk maintenance
System updates/App store
Patch management
Driver/firmware updates
Antivirus/antimalware updates
Tools
Backup/Time Machine
Restore/snapshot
Image recovery
Disk maintenance utilities
Shell/terminal
Screen sharing
Force Quit
Features
Multiple desktops/Mission Controls
Keychain
Spot Light
iCloud
Gestures
Finder
Remote disk
Dock
Boot Camp
Basic Linux commands
ls
grep
cd
shutdown
pwd vs. passwd
mw
cp
rm
chmod
cmkdir
chown
iwconfig/ifconfig
ps
q
su/sudo
apt-get
vi
dd
2.2 Given a scenario, set up and use client-side virtualization.
Purpose of virtual machines
Resource requirements
Emulator requirements
Security requirements
Network requirements
Hypervisor
2.3 Identify basic cloud concepts.
SaaS
IaaS
PaaS
Public vs. Private vs. Hybrid vs. Community
Rapid elasticity
On-demand
Resource pooling
Measured service
2.4 Summarize the properties and purpose of services provided by networked hosts.
Server roles
Web server
File server
Print server
DHCP server
DNS server
Proxy server
Mail server
Authentication server
Internet appliance
UTM
IDS
IPS
Legacy/embedded systems
2.5 Identify basic features of mobile operating systems.
Android vs. iOS vs. Windows
Open source vs. closed source/vendor specific
App source (play store, app store and store)
Screen orientation (accelerometer/gyroscope)
Screen calibration
GPS and geotracking
Wi-Fi calling
Launcher/GUI
Virtual assistant
SDK/APK
Emergency notification
Mobile payment service
2.6 Install and configure basic mobile device network connectivity and e-mail
Wireless/cellular data network (enable/disable)
Hotspot
Tethering
Airplane mode
Bluetooth
Enable Bluetooth
Enable pairing
Find device for pairing
Enter appropriate pin code
Test connectivity
Corporate and ISP e-mail configuration
POP3
IMAP
Port and SSL settings
Exchange, S/MIME
Integrated commercial provider e-mail configuration
Google/Inbox
Yahoo
Outlook.com
iCloud
PRI updates/PRL updates/baseband updates
Radio firmware
IMEI vs. IMSI
VPN
2.7 Summarize methods and data related to mobile device synchronization.
Types of data to synchronize
Contacts
Programs
Pictures
Music
Videos
Calendar
Bookmarks
Documents
Location data
Social media data
eBooks
Synchronization methods
Synchronize to the cloud
Synchronize to the desktop
Mutual authentication for multiple services
Software requirements to install the application on the PC
Connection types to enable synchronization
3.0 Security
3.1 Identify common security threats and vulnerabilities.
Malware
Spyware
Viruses
Worms
Trojans
Rootkits
Ransomware
Phishing
Spear phishing
Spoofing
Social engineering
Shoulder surfing
Zero-day attack
Zombie/botnet
Brute forcing
Dictionary attacks
Non-compliant systems
Violations of security best practices
Tailgating
Man-in-the-middle
3.2 Compare and contrast common prevention methods.
Physical security
Lock doors
Mantrap
Cable locks
Securing physical documents/passwords/shredding
Biometrics
ID badges
Key fobs
RFID badge
Smart card
Tokens
Privacy filters
Entry control roster
Digital security
Antivirus/antimalware
Firewalls
User authentication/strong passwords
Multifactor authentication
Directory permissions
VPN
DLP
Disabling ports
Access control lists
Smart card
E-mail filtering
Trusted/untrusted software sources
User education/AUP
Principle of least privilege
3.3 Compare and contrast differences of basic Windows OS security settings.
User and groups
Administrator
Power user
Guest
Standard user
NTFS vs. share permissions
Allow vs. deny
Moving vs. copying folders and files
File attributes
Shared files and folders
Administrative shares vs. local shares
Permission propagation
Inheritance
System files and folders
User authentication
Single sign-on
Run as administrator vs. standard user
BitLocker
BitLocker-To-Go
EFS
3.4 Given a scenario, deploy and enforce security best practices to secure a workstation.
Password best practices
Setting strong passwords
Password expiration
Changing default usernames/passwords
Screensaver required password
BIOS/UEFI passwords
Requiring passwords
Account management
Restricting user permissions
Login time restrictions
Disabling guest account
Failed attempts lockout
Timeout/screen lock
Disable autorun
Data encryption
Patch/update management
3.5 Compare and contrast various methods for securing mobile devices.
Screen locks
Fingerprint lock
Face lock
Swipe lock
Passcode lock
Remote wipes
Locator applications
Remote backup applications
Failed login attempts restrictions
Antivirus/antimalware
Patching/OS updates
Biometric authentication
Full device encryption
Multifactor authentication
Authenticator applications
Trusted sources vs. untrusted sources
Firewalls
Policies and procedures
BYOD vs. corporate owned
Profile security requirements
3.6 Given a scenario, use appropriate data destruction and disposal methods.
Physical destruction
Shredder
Drill/Hammer
Electromagnetic (degaussing)
Incineration
Certificate of destruction
Recycling or repurposing best practices
Low level format vs. standard format
Overwrite
Drive wipe
3.7 Given a scenario, secure SOHO wireless and wired networks.
Wireless specific
Changing default SSID
Setting encryption
Disabling SSID broadcast
Antenna and access point placement
Radio power levels
WPS
Change default usernames and passwords
Enable MAC filtering
Assign static IP addresses
Firewall settings
Port forwarding/mapping
Disabling ports
Content filtering/parental controls
Update firmware
Physical security
4.0 Software Troubleshooting
4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools.
Common symptoms
Proprietary crash screens (BSOD/pin wheel)
Failure to boot
Improper shutdown
Spontaneous shutdown/restart
Device fails to start/detected
Missing dll message
Services fails to start
Compatibility error
Slow system performance
Boots to safe mode
File fails to open
Missing NTLDR
Missing Boot.ini
Missing operating system
Missing Graphical Interface
Missing GRUB/LILO
Kernel panic
Graphical Interface fails to load
Multiple monitor misalignment/orientation
Tools
BIOS/UEFI
SFC
Logs
Recovery console
Repair disks
Pre-installation environments
MSCONFIG
DEFRAG
REGSRV32
REGEDIT
Event viewer
Safe mode
Command prompt
Emergency repair disk
Automated system recovery
Uninstall/reinstall/repair
4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.
Common symptoms
Pop-ups
Browser redirection
Security alerts
Slow performance
Internet connectivity issues
PC/OS lock up
Application crash
OS updates failures
Rogue antivirus
Spam
Renamed system files
Files disappearing
File permission changes
Hijacked e-mail
Responses from users regarding e-mail
Automated replies from unknown sent e-mail
Access denied
Invalid certificate (trusted root CA)
Tools
Antivirus software
Antimalware software
Recovery console
Terminal
System restore/snapshot
Pre-installation environments
Event viewer
Refresh/restore
MSCONFIG/safe boot
Best practice procedure for malware removal
Identify malware symptoms
Quarantine infected system
Disable system restore (in Windows)
Remediate infected systems
Update antimalware software
Scan and removal techniques (safe mode, pre-installation environment)
Schedule scans and run updates
Enable system restore and create restore point (in Windows)
Educate end user
4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.
Common symptoms
Dim display
Intermittent wireless
No wireless connectivity
No Bluetooth connectivity
Cannot broadcast to external monitor
Touchscreen non-responsive
Apps not loading
Slow performance
Unable to decrypt e-mail
Extremely short battery life
Overheating
Frozen system
No sound from speakers
Inaccurate touchscreen response
System lockout
Tools
Hard reset
Soft reset
Close running applications
Reset to factory default
Adjust configurations/settings
Uninstall/reinstall apps
Force stop
4.4 Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools.
Common symptoms
Signal drop/weak signal
Power drain
Slow data speeds
Unintended Wi-Fi connection
Unintended Bluetooth pairing
Leaked personal files/data
Data transmission overlimit
Unauthorized account access
Unauthorized root access
Unauthorized location tracking
Unauthorized camera/microphone activation
High resource utilization
Tools
Antimalware
App scanner
Factory reset/clean install
Uninstall/reinstall apps
Wi-Fi analyzer
Force stop
Cell tower analyzer
Backup/restore
iTunes/iCloud/Apple Configurator
Google sync
One Drive
5.0 Operational Procedures
5.1 Given a scenario, use appropriate safety procedures.
Equipment grounding
Proper component handling and storage
Antistatic bags
ESD straps
ESD mats
Self-grounding
Toxic waste handling
Batteries
Toner
CRT
Personal safety
Disconnect power before repairing PC
Remove jewelry
Lifting techniques
Weight limitations
Electrical fire safety
Cable management
Safety goggles
Air filter mask
Compliance with local government regulations
5.2 Given a scenario with potential environmental impacts, apply the appropriate controls.
MSDS documentation for handling and disposal
Temperature, humidity-level awareness, and proper ventilation
Power surges, brownouts, blackouts
Battery backup
Surge suppressor
Protection from airborne particles
Enclosures
Air filters/mask
Dust and debris
Compressed air
Vacuums
Compliance to local government regulations
5.3 Summarize the process of addressing prohibited content/activity and explain privacy, licensing, and policy concepts.
Incident response
First response
Identify
Report through proper channels
Data/device preservation
Use of documentation/documentation changes
Chain of custody
Tracking of evidence/documenting process
Licensing/DRM/EULA
Open source vs. commercial license
Personal license vs. enterprise licenses
Personally Identifiable Information
Follow corporate end-user policies and security best practices
5.4 Demonstrate proper communication techniques and professionalism.
Use proper language – avoid jargon, acronyms, slang when applicable
Maintain a positive attitude/project confidence
Actively listen (taking notes) and avoid interrupting the customer
Be culturally sensitive
Use appropriate professional titles, when applicable
Be on time (if late contact the customer)
Avoid distractions
Personal calls
Texting/social media sites
Talking to co-workers while interacting with customers
Personal interruptions
Dealing with difficult customer or situation
Do not argue with customers and/or be defensive
Avoid dismissing customer problems
Avoid being judgmental
Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue or question to verify understanding)
Do not disclose experiences via social media outlets
Set and meet expectations/timeline and communicate status with the customer
Offer different repair/replacement options if applicable
Provide proper documentation on the services provided
Follow up with customer/user at a later date to verify satisfaction
Deal appropriately with customer’s confidential and private materials
Located on a computer, desktop, printer, etc.
5.5 Given a scenario, explain the troubleshooting theory.
Always consider corporate policies, procedures, and impacts before implementing changes.
Identify the problem
Question the user and identify user changes to computer and perform backups before making changes
Establish a theory of probable cause (question the obvious)
If necessary, conduct external or internal research based on symptoms
Test the theory to determine cause
Once theory is confirmed, determine next steps to resolve problem
If theory is not confirmed, re-establish new theory or escalate
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and if applicable implement preventive measures
Document findings, actions, and outcomes
PART I
CompTIA A+ 220-901
Chapter 1: Hardware
Chapter 2: Networking
Chapter 3: Mobile Devices
Chapter 4: Hardware and Network Troubleshooting
CHAPTER 1
Hardware
CompTIA A+ Essentials Exam Objectives Covered in This Chapter:
√ 1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
Firmware upgrades – flash BIOS
BIOS component information (RAM, hard drive, optical drive, CPU)
BIOS configurations (boot sequence, enabling and disabling devices, date/time, clock speeds, virtualization support, BIOS security [passwords, drive encryption: TPM, LoJack, secure boot])
Built-in diagnostics
Monitoring (temperature monitoring, fan speeds, intrusion detection/notification, voltage, clock, bus speed)
√ 1.2 Explain the importance of motherboard components, their purpose, and properties.
Sizes (ATX, micro-ATX, mini-ATX, ITX)
Expansion slots (PCI, PCI-X, PCIe, miniPCI)
RAM slots
CPU sockets
Chipsets (north bridge, south bridge)
CMOS battery
Power connections and types
Fan connectors
Front/top-panel connectors (USB, audio, power button, power light, drive activity lights, reset button)
Bus speeds
1.3 Compare and contrast various RAM types and their features.
Types (DDR, DDR2, DDR3, SODIMM, DIMM, parity vs. non-parity, ECC vs. non-ECC)
RAM configurations (single channel vs. dual channel vs. triple channel)
Single-sided vs. double-sided
Buffered vs. unbuffered
RAM compatibility
√ 1.4 Install and configure PC expansion cards.
Sound cards
Video cards
Network cards
USB cards
FireWire cards
Thunderbolt cards
Storage cards
Modem cards
Wireless/cellular cards
TV tuner cards
Video capture cards
Riser cards
√ 1.5 Install and configure storage devices and use appropriate media.
Optical drives (CD-ROM/CD-RW, DVD-ROM/DVD-RW/DVD-RW DL, Blu-ray, BD-R, BD-RE)
Magnetic hard drive drives (5,400 rpm, 7,200 rpm, 10,000 rpm, 15,000 rpm)
Hot-swappable drives
Solid-state/flash drives (Compact Flash, SD, micro-SD, mini-SD, xD, SSD, hybrid, eMMC)
RAID types (0, 1, 5, 10)
Tape drive
Media capacity (CD, CD-RW, DVD-RW, DVD, Blu-ray, tape, DVD DL)
1.6 Install various types of CPUs and apply the appropriate cooling methods.
Socket types (Intel: 775, 1155, 1156, 1366, 1150, 2011, AMD: AM3, AM3+, FM1, FM2, FM2+)
Characteristics (speeds, cores, cache size/type, hyperthreading, virtualization support, architecture [32-bit vs. 64-bit])
Integrated GPU
Disable execute bit
Cooling (heat sink, fans, thermal paste, liquid-based, fanless/passive)
√ 1.7 Compare and contrast various PC connection interfaces, their characteristics, and purpose.
Physical connections (USB 1.1 vs. 2.0 vs. 3.0, connector types [A, B, mini, micro])
Firewire 400 vs. Firewire 800
SATA1 vs. SATA2 vs. SATA3, eSATA
Other connector types (serial, parallel, VGA, HDMI, DVI, audio [analog, digital/optical connector], RJ-45, RJ-11, Thunderbolt)
Wireless connections (Bluetooth, RF, IR, NFC)
Characteristics (analog, digital, distance limitations, data transfer speeds, quality, DRM, frequencies)
√ 1.8 Install a power supply based on given specifications.
Connector types and their voltages (SATA, Molex, 4/8-pin 12v, PCIe 6/8-pin, 20-pin, 24-pin)
Specifications (wattage, dual rail, size, number of connectors, ATX, micro-ATX, dual voltage options)
√ 1.9 Given a scenario, select the appropriate components for a custom PC configuration to meet customer specifications or needs.
Graphic/CAD/CAM design workstation (multicore processor, high-end video, maximum RAM)
Audio/video-editing workstation (specialized audio and video card, large fast hard drive, dual monitors)
Virtualization workstation (maximum RAM and CPU cores)
Gaming PC (multicore processor, high-end video/specialized GPU, high-definition sound card, high-end cooling)
Home theater PC (surround sound audio, HDMI, output, HTPC compact form factor, TV tuner)
Standard thick client (desktop applications, meets recommended requirements for selected OS)
Thin client (basic applications, meets minimum requirements for selected OS, network connectivity)
Home server PC (media streaming, file sharing, print sharing, Gigabit NIC, RAID array)
√ 1.10 Compare and contrast types of display devices and their features.
Types (LCD [TN vs. IPS, fluorescent vs. LED backlighting], plasma, projector, OLED)
Refresh/frame rates
Resolution
Native resolution
Brightness/lumens
Analog vs. digital
Privacy/antiglare filters
Multiple displays
Aspect ratios (16:9, 16:10, 4:3)
√ 1.11 Identify common PC connector types and associated cables.
Display connector types (DVI-D, DVI-I, DVI-A, DisplayPort, RCA, HD-15 [i.e., DE-15 or DB-15], BNC, miniHDMI, miniDIN-6)
Display cable types (HDMI, DVI, VGA, component, composite, coaxial)
Device cables and connectors (SATA, eSATA, USB, FireWire [IEEE 1394], PS/2, audio)
Adaptors and convertors (DVI to HDMI, USB A to USB B, USB to Ethernet, DVI to VGA, Thunderbolt to DVI, PS/2 to USB, HDMI to VGA)
1.12 Install and configure common peripheral devices.
Input devices (mouse, keyboard, scanner, barcode reader, biometric devices, game pads, joysticks, digitizer, motion sensor, touch pads, smart card readers, digital cameras, microphone, webcam, camcorder, MIDI-enabled devices)
Output devices (printers, speakers, display devices)
Input and output devices (touchscreen, KVM, smart TV, set-top box)
√ 1.13 Install SOHO multifunction devices/printers and configure appropriate settings.
Using appropriate drivers for a given operating system
Configuration settings (duplex, collate, orientation, quality)
Device sharing (wired [USB, serial, Ethernet], wireless [Bluetooth, 802.11, infrastructure vs. ad hoc])
Integrated print server (hardware)
Cloud printing/remote printing
Public/shared devices (sharing local/networked device via operating system settings [TCP/Bonjour/AirPrint], data privacy, user authentication on the device, hard drive caching)
√ 1.14 Compare and contrast differences between the various print technologies and the associated imaging process.
Laser (imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing assembly)
Inkjet (ink cartridge, print head, roller, feeder, duplexing assembly, carriage and belt, calibration)
Thermal (feed assembly, heating element, special thermal paper)
Impact (print head, ribbon, tractor feed, impact paper)
Virtual (print to file, print to PDF, print to XPS, print to image)
√ 1.15 Given a scenario, perform appropriate printer maintenance.
Laser (replacing toner, applying maintenance kit, calibration, cleaning)
Thermal (replace paper, clean heating element, remove debris)
Impact (replace ribbon, replace print head, replace paper)
Inkjet (clean heads, replace cartridges, calibration, clear jams)
This chapter will focus on the exam topics related to PC hardware. It will follow the structure of the CompTIA A+ 220-901 exam blueprint, objective 1, and it will explore the 15 subobjectives that you will need to master before taking the exam.
1.1 Given a Scenario, Configure Settings and Use BIOS/UEFI Tools on a PC
PCs and other devices that use an operating system usually also contain firmware that provides low-level instructions to the device even in the absence of an operating system. This firmware, called either the Basic Input/Output System (BIOS) or the Unified Extensible Firmware Interface (UEFI), contains settings that can be manipulated as well as diagnostic utilities that can be used to monitor the device. This section discusses those settings and utilities. The topics addressed in objective 1.1 include the following:
Firmware upgrades—flash BIOS
BIOS component information
BIOS configurations
Built-in diagnostics
Monitoring
Firmware Upgrades—Flash BIOS
Computer BIOSs don’t go bad; they just become out of date or contain bugs. In the case of a bug, an upgrade will correct the problem. An upgrade may also be necessary when the BIOS doesn’t support some component that you would like to install—a larger hard drive or a different type of processor, for instance.
Most of today’s BIOSs are written to an electrically erasable programmable read-only memory (EEPROM) chip and can be updated through the use of software. Each manufacturer has its own method for accomplishing this. Check out the documentation for complete details. Regardless of the exact procedure, the process is referred to as flashing the BIOS. It means the old instructions are erased from the EEPROM chip and the new instructions are written to the chip.
UEFI is a standard firmware interface for PCs, designed to replace BIOS. Some advantages of UEFI include the following:
Better security, which protects the pre-boot process
Faster startup times and resuming from hibernation
Support for drives larger than 2.2 TB
Support for 64-bit firmware device drivers
Capability to use BIOS with UEFI hardware
UEFI can also be updated by using an update utility from the motherboard vendor. In many cases, the steps are as follows:
Download the update file to a flash drive.
Insert the flash drive and reboot the machine.
Use the specified key sequence to enter the BIOS settings.
If necessary, disable secure boot.
Save the changes and reboot.
Reenter the BIOS settings.
Choose boot options, and boot from the flash drive.
Follow the specific directions with the update to locate the upgrade file on the flash drive.
Execute the file (usually by typing flash).
While the update is completing, ensure you maintain power to the device.
BIOS Component
At startup, the BIOS will attempt to detect the devices and components at its disposal. The information that it gathers, along with the current state of the components, will be available for review in the BIOS settings. Some of the components and the types of information available with respect to these devices and components are covered in this section.
You can view and adjust a computer’s base-level settings through the CMOS Setup program, which you access by pressing a certain key at startup, such as F1 or Delete (depending on the system). The most common settings to adjust in CMOS include port settings (parallel, serial, USB), drive types, boot sequence, date and time, and virus/security protections. The variable settings that are made through the CMOS Setup program are stored in nonvolatile random access memory (NVRAM), while the base instructions that cannot be changed (the BIOS) are stored on an EEPROM chip. NVRAM is memory that does not lose its content when power is lost to the machine. Figure 1.1 shows an example of NVRAM on a motherboard.
FIGURE 1.1 NVRAM
RAM
Most systems today detect the random access memory (RAM) amount and speed automatically. Some motherboards can use different types of RAM, such as parity and nonparity, or different speeds, and the CMOS Setup program may provide the opportunity to change those settings. Increasingly, however, RAM settings are becoming a read-only part of CMOS Setup programs because the system will detect additional memory added or a change in memory type. This does not preclude you from ensuring you are installing the correct type of memory for the system.
Hard Drive
Some CMOS Setup programs have a feature that polls the IDE channels and provides information about the IDE devices attached to them. You can use this feature to gather the settings for a hard disk. However, most hard disks these days are fully Plug and Play, so they automatically report themselves to the CMOS Setup.
Hard drives can be autodetected by most systems if the IDE setting is set to Auto. The settings detected may include the drive’s capacity; its geometry, meaning cylinders, heads, and sectors (CHS); and its preferred programmed input/output (PIO), direct memory access (DMA), or UltraDMA operating mode. You can also configure a hard drive by entering its CHS values manually, but doing so is almost never necessary anymore.
CHS is also called the drive geometry because together these three numbers determine how much data the disk can hold. Most CMOS Setup programs are able to automatically detect the CHS values.
Optical Drive
Optical drives, such as CD, CD-R, CD-RW, and DVD players, are also detected and reported by the BIOS. You can even set the computer to boot from one of these drives if desired (see the section Boot Sequence
later in this chapter). When you do that, in most cases the drives will be listed as CD-ROM or CD-ROM/DVD.
CPU
In most modern systems, the BIOS detects the CPU type and speed automatically, so any CPU settings in CMOS Setup are likely to be read-only. Most operating systems provide utilities for gathering information about the CPU in the computer, but if the computer will not boot or there is no operating system, then viewing the CPU information in the BIOS can be a valuable option.
BIOS Configurations
When any of the changes listed in the following section are made to any of the BIOS configurations, it is important that the program be exited properly to save the changes. The CMOS Setup program includes an Exit command, with options that include Save Changes and Discard Changes. In most programs, Esc is a shortcut for exiting and discarding changes, and F10 is a common shortcut for exiting and saving changes.
Boot Sequence
Each system has a default boot order, which is the order in which it checks the drives for a valid operating system to which it can boot. Usually, this order is set for the hard disk and then CD-ROM, but these components can be placed in any boot order. For example, you might set CD-ROM first to boot from a Windows 7 Setup disk on a system that already contains an operating system. If you receive an error message when booting, always check the CD-ROM, and if a nonsystem disk is present, remove it and reboot.
Enabling and Disabling Devices
In CMOS Setup, you can enable or disable integrated components, such as built-in video cards, sound cards, or network cards. You may disable them in order to replace them with different models on expansion boards, for example.
You can also disable the onboard I/O ports for the motherboard, including parallel, serial, and USB. Depending on the utility, there may also be settings that enable or disable USB keyboard usage, Wake on LAN, or other special features.
In addition to enabling or disabling legacy parallel ports, you can assign an operational mode to the port. Table 1.1 lists the common modes for a parallel port. When you’re troubleshooting parallel port problems, sometimes trying a different mode will help. Some legacy systems do not allow onboard devices to be disabled. If this is the case, if an onboard device fails, the entire motherboard may need to be replaced.
TABLE 1.1 Parallel port settings
Date/Time
One of the most basic things you can change in CMOS Setup is the system date and time. You can also change this from within the operating system. When the PC is not keeping correct time or date when turned off, it is usually a CMOS battery issue and may include a warning that the battery is soon going to die. In the absence of the PC receiving time and date updates from a time server such as a Network Time Protocol (NTP) server, the time kept in the CMOS is the time source for the computer.
Clock Speeds
Clock speed is a measurement of the rate at which the clock signal oscillates; it is expressed in millions of cycles per second or megahertz. The motherboard must be set to utilize the proper clock settings for the CPU installed in the computer. The BIOS usually detects the type of CPU and automatically sets the proper timings. In some older systems, you may have to use jumpers to set the correct clock speed and CPU.
External Speed (Clock Speed) The clock speed, or external speed, which is usually expressed in megahertz or gigahertz, is the speed at which the motherboard communicates with the CPU. It’s determined by the motherboard, and its cadence is set by a quartz crystal (the system crystal) that generates regular electrical pulses.
Internal Speed The internal speed is the maximum speed at which the CPU can perform its internal operations. This may be the same as the motherboard’s speed (the external speed), but it’s more likely to be a multiple of it. For example, a CPU may have an internal speed of 1.3 GHz but an external speed of 133 MHz. That means for every tick of the system crystal’s clock, the CPU has 10 internal ticks of its own clock.
When the proper CPU speed is known, you must make sure the relationship between the speed of the CPU and that of the motherboard bus is correct. This is done with a value called the multiplier. Although the bus speed can also be manipulated, usually it is set to accommodate the required speed of the memory to be used, and so it is more likely you will be using the multiplier to achieve the proper relationship between the CPU speed and the bus speed.
For example, if you have a processor that has a CPU speed of 1.82 GHz, the proper settings for the BIOS would be a bus speed of 166 MHz and a multiplier of 11 (166 MHz × 11 = 1.826 GHz). So if the bus needed to be 166 MHz, you would set the multiplier for 11. On the other hand, if you changed the bus speed to 332 MHz (just a random example), the closest multiplier would be 5.5 to maintain 1.826 GHz (332 MHz × 5.5 = 1.826 GHz). When setting the speed of either is required, refer to the documentation from the CPU and motherboard.
Virtualization Support
Many computers, especially servers, host virtual machines (VMs). These are fully functional operating systems running in their own environment. In many cases, the motherboard and associated BIOS settings need no alteration to provide services to these VMs.
However, some of the newer virtualization products, for example, Microsoft Hyper-V, require that the motherboard support hardware-assisted virtualization. This is because in these cases the virtualization product is not installed on top of a regular operating system but is installed directly on bare metal—that is, as an integral part of the operating system, as in Windows Server 2012 R2.
The benefit derived from the virtualization product (also called a hypervisor) using hardware-assisted virtualization is it allows the hypervisor to dynamically allocate memory and CPU to the VMs as required. When the motherboard and the BIOS support this technology, you must ensure that it is enabled. Figure 1.2 shows an example of the settings.
FIGURE 1.2 BIOS virtualization
BIOS Security
A number of security features are built into most BIOSs. They include BIOS passwords, drive encryption, Trusted Platform Module (TPM), and LoJack. These items are discussed in this section.
BIOS Passwords In most CMOS Setup programs, you can set a supervisor password. Doing so requires a password to be entered in order to use the CMOS Setup program, effectively locking out users from making changes to it. You may also be able to set a user password, which restricts the PC from booting unless the password is entered.
To reset a forgotten password, you can remove the CMOS battery to reset everything. There also may be a Reset jumper on the motherboard.
Drive Encryption Many operating systems provide the ability to encrypt an entire volume or drive, protecting a mobile device’s data in the event of theft. A good example of this is BitLocker, which is available in Windows Vista and Windows 7. The drives are encrypted with encryption keys, and the proper keys are required to boot the device and access the data.
BitLocker can be used with a TPM chip (discussed in the next section), but it is not required. When this feature is in effect with no TPM chip, the keys are stored on a USB drive that must be presented during startup to allow access to the drives. Without the USB drive holding the key, the device will not boot.
TPM Chips When the device has a TPM chip present on the motherboard, additional security and options become available. First the chip contains the keys that unlock the drives. When the computer boots, the TPM chip unlocks the drive only after it compares hashes of the drive to snapshots of the drive taken earlier. If any changes have been made or tampering has been done to the Windows installation, the TPM chip will not unlock the drives.
Moreover, you can (and should) combine this with a PIN entered at startup or a key located in a USB drive. In this scenario, the computer will not start unless the hashes pass the test and the PIN or key is provided.
LoJack LoJack is a product made by Absolute Software that allows you to remotely locate, lock, and delete the data on a mobile device when it is stolen. It is a small piece of software that embeds itself on the computer and is difficult to detect. Once activated, it stays in contact with a monitoring center, allowing you to send the commands to lock and delete data via the center. Not only can you protect the data in this fashion, but also it will gather forensic data that can help to locate the device and aid in its recovery.
Secure Boot Secure Boot is a standard adopted by many venders that requires the operating system to check the integrity of all system files before allowing the boot process to proceed. By doing so, it protects against the alteration or corruption of these system files. As with any emerging technology, issues have already been discovered that can enable a hacker to not only bypass Secure Boot but to also change a key value in the settings that will brick
the device (render it useless).
Built-in Diagnostics
Although you may not realize it, every time you start the computer, built-in diagnostics are at work. Every computer has a diagnostic program built into its BIOS called the power-on self-test (POST). When you turn on the computer, it executes this set of diagnostics. Many steps are involved in the POST, but they happen quickly, they’re invisible to the user, and they vary among BIOS versions. The steps include checking the CPU, checking the RAM, checking for the presence of a video card, and so on. The main reason to be aware of the POST’s existence is that if it encounters a problem, the boot process stops. Being able to determine at what point the problem occurred can help you troubleshoot.
One way to determine the source of a problem is to listen for a beep code. This is a series of beeps from the computer’s speaker. The number, duration, and pattern of the beeps can sometimes tell you what component is causing the problem. However, the beeps differ depending on the BIOS manufacturer and version, so you must look up the beep code in a chart for your particular BIOS. Different BIOS manufacturers use the beeping differently. AMI BIOS, for example, relies on a raw number of beeps and uses patterns of short and long beeps.
Another way to determine a problem during the POST routine is to use a POST card. This is a circuit board that fits into an Industry Standard Architecture (ISA) or Peripheral Component Interconnect (PCI) expansion slot in the motherboard and reports numeric codes as the boot process progresses. Each of those codes corresponds to a particular component being checked. If the POST card stops at a certain number, you can look up that number in the manual that came with the card to determine the problem.
BIOS Central is a website containing charts detailing the beep codes and POST error codes for many different BIOS manufacturers.
Monitoring
By viewing the information provided in the BIOS, basic monitoring of the many items can be done with varying degrees of certainty. It is simply a matter of navigating the menu-based BIOS program and locating the proper screen that provides the information. Examples are provided in the following sections.
Temperature Monitoring
Temperature is probably the most important item to monitor. When components like the CPU overheat, bad things start to occur, such as repeated reboots. Figure 1.3 shows an example of the values for the CPU. Technicians should retain baseline temperatures for these items. Baseline temperatures should include idle temperature and load temperature baselines. Intel processors run at a cooler temperature than AMD.
FIGURE 1.3 Temperature monitoring
Fan Speeds
The speed at which various fans are operating can also be displayed in the BIOS. There can be a CPU fan, as well as one or more system fans. (See Figure 1.3.) Programs are available that monitor this for you and can send alerts. This is particularly important for servers in a data center.
Intrusion Detection/Notification
It is also possible to enable intrusion detection, which will indicate to you whether the chassis has been opened. This may be referred to as the chassis intrusion detection or possibly the case open status, as shown in Figure 1.3, where this function has been disabled.
Voltage
You can also monitor and change the voltage settings in the BIOS. Be cautious in changing these settings because improper settings can damage the system or shorten the life of the CPU. Possible settings include the following:
CPU voltage
Memory voltage, which will typically be 1.5 volts
Motherboard voltage
Voltage of the graphics card
These are just a few examples. Figure 1.4 shows an example of these and many more voltage settings.
FIGURE 1.4 Voltage settings
Clock
The CMOS clock is located on the computer’s motherboard and keeps time when the computer is off. The operating system gets its time from the BIOS clock at boot time. This clock can be set using the BIOS if it is not correct. Figure 1.5 shows the time setting.
FIGURE 1.5 Clock
Bus Speed
The processor’s ability to communicate with the rest of the system’s components relies on the supporting circuitry. Part of the system board’s underlying circuitry is called the bus. The computer’s bus moves information into and out of the processor and other devices. A bus allows all devices to communicate with one another. The motherboard has several buses. The external data bus carries information to and from the CPU and is the