IT Exam Key Topics

Aug 20, 2025

Overview

This lecture covers key objectives of the CompTIA A+ Core 2 exam, focusing on operating systems, security, troubleshooting, documentation, scripting, and remote access best practices.

Windows Editions & Features

  • Windows 10/11 editions: Home (128 GB RAM/client RDP), Pro (2 TB RAM/BitLocker/Domain), Pro for Workstations & Enterprise (6 TB RAM/client & server RDP).
  • Only Pro, Workstations, Enterprise can join domains; Home edition cannot.
  • RDP: All editions support client-side, only Pro/Workstations/Enterprise support incoming connections.
  • BitLocker and Group Policy Editor (gpedit.msc) available in Pro editions and above.
  • Hyper-V virtualization not available on Home edition.
  • Upgrade paths maintain data; in-place upgrades preserve apps/settings, downgrades do not.

Windows Command Line & Tools

  • Key commands: cd, dir, md, rmdir, copy, xcopy, robocopy, del, diskpart, format, defrag, chkdsk, sfc, gpupdate, rsop, winver, shutdown.
  • Networking: ipconfig, ping, tracert, pathping, netstat, nslookup, net use, hostname.
  • MMC snap-ins: eventvwr, diskmgmt, taskschd, devmgmt, perfmon, certmgr, lusrmgr.

Windows Graphical Tools & Settings

  • Task Manager: manage processes, performance, startup, services (Ctrl+Shift+Esc).
  • Control Panel: access Internet Options, Devices/Printers, Programs/Features, Firewall, User Accounts, Indexing Options, Power, Accessibility.
  • Settings App: manage system, devices, network, personalization, apps, accounts, privacy, updates.

Networking Fundamentals

  • Workgroup: peer-to-peer, no central authority.
  • Domain: centralized control, common in businesses.
  • IP configuration: static vs. DHCP, DNS, subnet mask, gateway.
  • VPN: secure connections; wireless/wired/WAN options.
  • Proxy servers: mediate/secure/filter internet access.
  • Network types: public (restrictive), private (sharing enabled).

Application Installation & OS Types

  • Check system/OS requirements, 32/64-bit compatibility, RAM/CPU/OS support.
  • Distribution: physical media, downloads, ISO mounting.
  • Windows RAM limits: Home 128GB; Pro 2TB; Workstation/Enterprise 6TB; 32-bit CPUs 4GB.
  • OS Types: Windows, macOS, Linux, Chrome OS, Android, iOS.
  • File systems: NTFS, FAT32, exFAT (Windows); ext4, ext3, NFS, swap (Linux); APFS, HFS+ (macOS).
  • Vendor lifecycle: plan upgrades before EOL.

Installing & Partitioning Operating Systems

  • Boot/install methods: USB, optical, PXE, internal/external drive, internet.
  • Installation types: clean, upgrade, unattended, image, reset/restore, multiboot.
  • Partitions: GPT (modern/UEFI/many partitions), MBR (old/BIOS/2TB/4 partitions).
  • Back up before upgrades; select drive format (NTFS for Windows).

macOS & Linux Essentials

  • macOS: closed source, Unix-based, key featuresβ€”Finder, Spotlight, System Preferences, Keychain, Time Machine, Disk Utility, FileVault.
  • Linux: open source, command line via terminal/bash, package management (apt, yum/dnf), ext4 file system, swap, common commands (ls, cd, mv, cp, rm, grep).
  • Samba: enables Linux-Windows file sharing.

Security Fundamentals

  • Physical security: locks, smart cards, biometrics, CCTV, alarms.
  • Logical security: authentication factors, MFA, least privilege, UAC, MDM, Active Directory, group policies.
  • Wireless security: WPA2/WPA3 (AES), RADIUS/TACACS+/Kerberos (know ports), avoid WEP/TKIP.
  • Malware types: virus, worm, Trojan, spyware, rootkit, ransomware, keylogger, cryptominer.
  • Malware defense: antivirus, OS updates, firewall, user education.

Software & Mobile Troubleshooting

  • Windows Recovery Environment (WinRE): system restore, startup repair, safe mode.
  • Troubleshoot: slow performance, app crashes, update failures, device/printing issues.
  • Security issues: malware symptoms, browser redirection, invalid certificates, remote control, ransomware hoax.
  • Mobile: troubleshoot app failures, connectivity, battery issues, update problems, reset (soft/hard).

Data & Device Security

  • Encryption: BitLocker/EFS (Windows), FileVault (macOS), full drive encryption (recommended).
  • Password best practices: complex, long, enforce via policies.
  • Mobile device security: screen lock, timeout, remote wipe, locator apps, updates, encryption, antivirus.
  • IoT security: strong passwords, updates, network segmentation.

Data Destruction & Disposal

  • Overwrite, full format, diskpart/clean, Linux dd command, NIST 800-88: clear, purge, destroy.
  • Certificates of destruction and chain of custody for compliance.

SOHO Network & Browser Security

  • Router: change default passwords, update firmware, WPA2/3, MAC filtering, DHCP scope, disable WPS/UPnP, firewall, guest network, physical security.
  • Browser: download from official sources, manage extensions, password manager, TLS/HTTPS, clear browsing data, use private browsing.

Documentation & Support

  • Key docs: topology diagrams, incident reports, SOPs, compliance policies, AUPs, user checklists, ticketing systems, asset management.
  • Change management: document purpose, scope, risk, rollback/backup plans, test in sandbox, get approvals.

Backup & Safety Procedures

  • Backup types: full, incremental, differential, synthetic; 3-2-1 rule; backup rotation (GFS), on/offsite.
  • Safety: use ESD prevention, anti-static tools, disconnect power, fire safety (Class C extinguisher), ergonomics, MSDS, recycling/battery disposal.

Scripting & Remote Access

  • Data types: integer, string; constructs: if statements, loops; environment variables; comment syntax; script types/extensions (.ps1, .bat, .sh, .py, .js, .vbs).
  • Remote access: RDP (port 3389), SSH (port 22), VPN, VNC, TeamViewer; use MFA, encryption, firewall settings.

Key Terms & Definitions

  • Domain β€” Centralized computer network for businesses.
  • Workgroup β€” Peer-to-peer network with no central control.
  • NTFS β€” Windows file system supporting permissions/encryption.
  • BitLocker β€” Full disk encryption for Windows.
  • Active Directory (AD) β€” Microsoft directory service for management of users and computers.
  • VPN β€” Secure, encrypted remote connection to a private network.
  • RADIUS β€” Centralized authentication protocol (UDP 1812/1813).
  • WPA2/WPA3 β€” Secure Wi-Fi protocols.
  • Group Policy β€” Centralized management of Windows settings.
  • Malware β€” Malicious software like virus, Trojan, ransomware, etc.
  • Restore Point β€” Snapshot of Windows system state for recovery.
  • Sandbox Testing β€” Safe, isolated environment for software changes.
  • 3-2-1 Backup Rule β€” 3 copies, 2 media types, 1 off-site.

Action Items / Next Steps

  • Review and practice key Windows/Linus/macOS commands and utilities.
  • Explore Control Panel, Settings App, and MMC tools on a test system.
  • Practice upgrade, backup, and restore procedures.
  • Memorize security protocols, authentication ports, and practical malware removal steps.
  • Develop sample documentation (SOP, incident report, backup plan).
  • Practice safe browser and SOHO network configurations.