📚

CompTIA A+ Core 2 Exam Study Guide

May 14, 2025

CompTIA A+ Core 2 Exam Review

Operating Systems

Windows Editions

  • Windows 10 Home: Basic edition, suitable for general home use. Supports up to 128 GB RAM.
  • Windows 10 Pro: Supports domain access, BitLocker encryption, and up to 2 TB RAM.
  • Windows 10 Pro for Workstations/Enterprise: Designed for high-performance, supports up to 6 TB RAM, includes server-side remote desktop capabilities.
  • Key Differences: Domain access, RDP capabilities, RAM limits, BitLocker, Hyper-V, Group Policy Editor.

Upgrading Windows

  • Upgrading from Windows 7/8.1 to Windows 10 involves retaining data/settings.
  • Windows 11 is a redesigned version of Windows 10 with similar core functionalities.

Command Line Basics

  • Command Prompt, PowerShell, Windows Terminal.
  • Navigation commands (cd, dir, md, rmdir).
  • File manipulation (copy, xcopy, robocopy).
  • Disk management (diskpart, format, defrag).
  • System repair (chkdsk, sfc).
  • Network tools (ipconfig, ping, tracert, netstat).

Windows 10 Features and Tools

  • Task Manager: Manage processes, performance, startup, and services.
  • Microsoft Management Console (MMC): Customizable toolbox for administrative tools.
  • Control Panel: Traditional settings hub for advanced configurations.
  • Settings App: Modern configuration center for Windows.
  • Networking: Workgroup vs Domain, Firewall settings, VPN, Proxy settings, Metered connections.

Application Installation

  • Check system requirements: 32-bit vs 64-bit, compatibility.
  • Distribution methods: Physical media, downloads, ISO files.

Types of Operating Systems

  • Workstation OS: Windows, MacOS, Linux, Chrome OS.
  • Mobile OS: iOS, Android.
  • Open Source vs Closed Source.
  • File Systems: NTFS, FAT32, xFAT, ext4, APFS.

Installing/Upgrading OS

  • Boot methods: USB, Optical, Network PXE.
  • Installation types: Clean install, Upgrade, Image deployment.
  • Partitioning: GPT vs MBR.

MacOS Basics

  • Interface elements: Menu bar, Dock, System Preferences.
  • Core features: Finder, Spotlight, Keychain, Time Machine.
  • Application management: App Store, DMG files, Package installers.

Linux Basics

  • Open-source OS with different distributions.
  • Common commands (ls, cd, mv, cp, rm).
  • Package management (apt, dnf, yum).
  • System maintenance, Samba for interoperability.

Security

Security Measures

  • Physical security: Locks, biometrics, access control.
  • Logical security: Authentication factors, MFA, Active Directory.

Wireless Security

  • WLAN protocols: WPA2, WPA3.
  • Authentication: RADIUS, TACACS+, Kerberos.

Malware

  • Types: Virus, Trojan, Spyware, Rootkit, Ransomware.
  • Prevention: Antivirus, updates, firewalls, user education.

Social Engineering & Threats

  • Social engineering techniques: Phishing, Whaling, Vishing.
  • Threats: Spoofing, DDoS, Password cracking.

Windows Security Features

  • Windows Defender: Antivirus, firewall, user account control.
  • BitLocker: Full disk encryption.

Workstation Security Best Practices

  • Data encryption, password policies, user education.

Mobile & IoT Security

  • Screen locks, remote wipe, updates, encryption.
  • IoT security measures: Strong passwords, encryption, segmentation.

Data Destruction

  • Methods: Overwriting, degaussing, physical destruction.

SOHO Network Security

  • Router settings: Change default passwords, disable WPS, configure firewalls.

Browser Security

  • Download from trusted sources.
  • Manage extensions and plugins.
  • Use privacy settings, block pop-ups, use secure connections.

Troubleshooting

Windows OS Problems

  • WINRE tools: System restore, startup repair.
  • Fixing boot issues, app crashes, device errors.

Security Issues

  • Malware symptoms: Browser redirection, invalid certificates.
  • Anti-malware steps: Quarantine, disable restore, scan.

Mobile Device Problems

  • Connection issues: Wi-Fi, Bluetooth.
  • Battery and performance troubleshooting.

Mobile Security Issues

  • Unauthorized access, data compromise.
  • Best practices: Update software, use strong passwords.

Documentation & Support

Documentation

  • Types: Network diagrams, incident reports, SOPs.
  • Ticketing systems: Tracking issues and solutions.

Change Management

  • Documentation, sandbox testing, change boards.

Backup & Recovery

  • Methods: Full, incremental, differential.
  • Testing and rotation strategies.

Safety Procedures

  • ESD prevention, electrical safety.

Environmental Impacts

  • Proper temperature, humidity, and air quality for IT environments.

Incident Response

  • Steps: Preparation, detection, containment, recovery.

Communication & Professionalism

  • Techniques: Active listening, clarifying concerns, professionalism.

Scripting & Remote Access

Scripting Basics

  • Data types, control structures, environment variables.
  • File extensions for scripting languages.

Remote Access

  • RDP, SSH, VPNs.
  • Security considerations for remote access.

Prepare thoroughly and practice these concepts to excel in the CompTIA A+ Core 2 Exam. Visit techvaultacademy.com for additional resources and practice.