IT Exam Review Summary

Jun 10, 2025

Overview

This lecture provides a comprehensive review of CompTIA A+ Core 2 exam topics, focusing on operating systems, security, troubleshooting, and support best practices essential for IT professionals.

Windows Operating Systems & Editions

  • Windows 10 editions: Home, Pro, Pro for Workstations, and Enterprise have different features and RAM limits.
  • Only Pro, Pro for Workstations, and Enterprise can join a domain and host Remote Desktop connections.
  • Home edition lacks BitLocker, Hyper-V, and Group Policy Editor (gpedit.msc).
  • Upgrading from older Windows versions retains data if done in-place; downgrades do not.

Command Line & System Tools

  • Command Prompt is for basic commands; PowerShell adds scripting and is recommended for advanced use.
  • Key navigation commands: cd (change directory), dir (list), md (make directory), rd (remove directory).
  • File commands: copy, xcopy, robocopy, del (delete), diskpart (partition management), format, defrag.
  • System repair: chkdsk, sfc, DISM, gpupdate, rsop.msc, winver, shutdown.
  • Networking: ipconfig, ping, tracert, netstat, nslookup, net use, hostname.

Windows Graphical Tools

  • Task Manager: manage processes, performance, startup, services.
  • Microsoft Management Console (MMC) hosts snap-ins like Event Viewer, Disk Management, Task Scheduler, Device Manager, and Performance Monitor.
  • Control Panel utilities: Programs and Features, Network and Sharing Center, Firewall, Device Manager, Power Options, Ease of Access, and more.

Modern Settings App & Networking

  • Settings app centralizes configuration for System, Devices, Network, Gaming, Privacy, Update, and Security.
  • Workgroup = peer-to-peer; Domain = centralized client-server.
  • Network settings: IP address, DNS, subnet mask, gateway, VPN, wired/wireless types, proxy, public/private networks, metered connections.

Application Installation & OS Types

  • Check application compatibility (32/64 bit), system requirements, and OS version.
  • Windows 10: RAM limits by edition; 32-bit CPUs limited to 4GB RAM.
  • Distribution: physical, download, ISO. Consider security, permissions, and network impact.
  • OS types: Windows, macOS, Linux, Chrome OS (workstation); iOS, Android (mobile).
  • File systems: NTFS (Windows), FAT32/xFAT (removable), ext4 (Linux), APFS/HFS+ (Mac).
  • Vendor lifecycle: be aware of end-of-life/support for OS.

OS Installation & Upgrades

  • Boot methods: USB, optical, network, external, internet.
  • Installation types: clean, upgrade, unattended, imaging, network install, reset/restore, multiboot.
  • Partition types: primary, extended, GPT vs MBR, basic vs dynamic.
  • Backup before upgrade, verify compatibility, use BIOS/UEFI to boot from USB.

Mac OS & Linux Fundamentals

  • macOS: GUI elements (menu bar, Dock), Finder, Spotlight, System Preferences, Keychain, Time Machine, Disk Utility, FileVault.
  • Linux: open-source, multiple distributions, command line essential (ls, cd, mv, cp, rm, grep, df, chmod, chown, ps, kill, sudo).
  • Package management: apt (Debian/Ubuntu), dnf/yum (Fedora/Red Hat), samba (file sharing).
  • Backup utilities, anti-malware, and system maintenance tools are essential.

Security: Physical & Logical

  • Physical: locks, key cards, biometrics, CCTV, shredding documents.
  • Logical: authentication types, least privilege, UAC, MFA, MDM, Active Directory, group policies, access control lists.
  • Wireless security: Prefer WPA3/WPA2-AES, avoid WEP/TKIP/open, use RADIUS/TACACS+/Kerberos for enterprise.
  • Malware types: virus, Trojan, spyware, ransomware, keylogger, rootkit. Use antivirus, firewalls, OS/app updates, user education.

Security Best Practices

  • Encrypt data at rest (BitLocker, EFS).
  • Enforce strong passwords, account lockout, disable guest account, manage permissions.
  • Secure mobile devices: screen locks, remote wipe, updates, encryption, MDM, secure IoT devices.

Data Disposal & Network Security

  • Data sanitization: clearing (overwriting), purging (secure erase/degauss), destroying (physical).
  • Secure SOHO routers: change defaults, update firmware, configure SSID, disable WPS, use MAC filtering, set up guest networks, firewall settings.

Troubleshooting Processes

  • Windows Recovery Environment (WinRE): reset, system restore, safe mode, startup repair.
  • Common PC issues: slow performance, BSOD, device errors, network problems—use Event Viewer, Device Manager, MSConfig, Safe Mode.
  • Malware removal: CompTIA 7-step process (identify, quarantine, disable restore, remediate, update, enable restore, educate).

Documentation, Backup, Safety, and Professionalism

  • Use diagrams, incident reports, SOPs, ticketing, asset management.
  • Change management: document, test, approve, roll back if needed.
  • Backup methods: full, incremental, differential, synthetic; rotate backups and test regularly.
  • Safety: prevent ESD, handle components safely, manage power risks, proper environmental controls.
  • Privacy, licensing, GDPR/PHI/PCI compliance.
  • Communication: clear, professional, maintain confidentiality.

Scripting & Remote Access

  • Understand data types, control structures, environment variables, comment syntax, file extensions (.ps1, .bat, .sh, .py).
  • PowerShell for Windows, Bash for Linux, Python/JavaScript for specialized scripting.
  • Remote access: RDP (TCP 3389), SSH (TCP 22), VPN protocols (PPTP, L2TP, SSTP, IKEv2).
  • Secure remote tools: use strong passwords, MFA, encryption, firewall rules.

Key Terms & Definitions

  • Domain — Network with centralized control (Active Directory).
  • Workgroup — Peer-to-peer network without central control.
  • BitLocker — Full disk encryption for Windows.
  • NTFS — New Technology File System, default for Windows.
  • Group Policy — Centralized Windows configuration management.
  • UEFI/BIOS — Firmware interfaces for booting systems.
  • MDM — Mobile Device Management for security/compliance.
  • WPA3/WPA2 — Wi-Fi encryption standards.
  • Kerberos — Ticket-based authentication protocol.
  • Malware — Malicious software (virus, worm, Trojan, etc.).

Action Items / Next Steps

  • Practice using Windows, macOS, and Linux tools and commands.
  • Explore and configure operating system security features.
  • Review and memorize CompTIA 7-step malware removal.
  • Create backup and recovery plans for systems.
  • Complete assigned readings and lab exercises on system administration and security.