Book Image

CompTIA A+ Complete Practice Tests: Exam Core 1 220-1001 and Exam Core 2 220-1002 - Second Edition

By : Jeff T. Parker, Quentin Docter
Book Image

CompTIA A+ Complete Practice Tests: Exam Core 1 220-1001 and Exam Core 2 220-1002 - Second Edition

By: Jeff T. Parker, Quentin Docter

Overview of this book

The CompTIA A+ certification is the most popular entry-level IT certification, with over 1 million A+ certified professionals to date. A+ certification is a crucial step in your IT career. Many businesses require this accreditation when hiring computer technicians or validating the skills of current employees. CompTIA A+ Complete Practice Tests, Second Edition is an indispensable part of any study plan for A+ certification. It enables you to hone your test-taking skills, focus on challenging areas, and be thoroughly prepared to ace the exam and earn your A+ certification. The book presents nine unique practice tests and two 90-question bonus tests covering all the objective domains for both the 220-1001 and 220-1002 exams. Comprehensive coverage of every essential exam topic ensures that you will know what to expect on the exam day. Over 1200 practice questions on topics including hardware, networking, mobile devices, operating systems and procedures, troubleshooting, and more, enable you to assess your performance and gain the confidence you need to pass the exam with flying colors. By the end of the book, you would have thoroughly prepared for the A+ certification and will be confident to ace the exam.
Table of Contents (12 chapters)

Chapter 7


  • 2.1 Summarize the importance of physical security measures.
    • Mantrap
    • Badge reader
    • Smart card
    • Security guard
    • Door lock
    • Biometric locks
    • Hardware tokens
    • Cable locks
    • Server locks
    • USB locks
    • Privacy screen
    • Key fobs
    • Entry control roster
  • 2.2 Explain logical security concepts.
    • Active Directory
      • Login script
      • Domain
      • Group Policy/Updates
      • Organizational Units
      • Home Folder
      • Folder redirection
    • Software tokens
    • MDM policies
    • Port security
    • MAC address filtering
    • Certificates
    • Antivirus/Anti-malware
    • Firewalls
    • User authentication/strong passwords
    • Multifactor authentication
    • Directory permissions
    • VPN
    • DLP
    • Access control lists
    • Smart card
    • Email filtering
    • Trusted/untrusted software sources
    • Principle of least privilege
  • 2.3 Compare and contrast wireless security protocols and authentication methods.
    • Protocols and encryption
      • WEP
      • WPA
      • WPA2
      • TKIP
      • AES
    • Authentication
      • Single-factor
      • Multifactor...