
CompTIA A+ CertMike
Beschreibung
In CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and practical roadmap to taking--and succeeding on--the CompTIA A+ Core 2 exam. You'll learn how to install, configure, and maintain computer equipment, mobile devices, and software for end users, service components based on customer requirements, understand networking basics, and apply essential cybersecurity methods. Ace the test using the proven CertMike approach:
* Prepare -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!
* Practice -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!
* Pass -- On exam day, use the critical knowledge you've learned when you're ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!
With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You'll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test--the first time around!
An indispensable resource for anyone preparing for their A+ certification, CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102 is also a must-read for hardware and PC technicians seeking to upgrade their skillset.
Weitere Details
Weitere Ausgaben
Personen
Mike Chapple, PhD, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame's Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University's Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com.
Mark Soper, MCP, CompTIA A+, has over 30 years' experience in IT. He is the author or co-author of 40 books on technology, covering topics ranging from CompTIA A+ to Microsoft Windows, networking, and troubleshooting.
Inhalt
- Intro
- TABLE OF CONTENTS
- WILEY BOOKS IN THE CERTMIKE SERIES
- TITLE PAGE
- COPYRIGHT
- DEDICATION
- ACKNOWLEDGMENTS
- ABOUT THE AUTHORS
- ABOUT THE TECHNICAL EDITOR
- INTRODUCTION
- THE A+ PROGRAM
- WHAT DOES THIS BOOK COVER?
- CORE 1 EXAM 220-1102 EXAM OBJECTIVES
- CORE 2 EXAM 220-1102 CERTIFICATION EXAM OBJECTIVE MAP
- HOW TO CONTACT THE PUBLISHER
- PART I: Domain 1.0: Operating Systems
- CHAPTER 1: Microsoft Windows Editions
- WINDOWS 10 EDITIONS
- FEATURE DIFFERENCES BETWEEN EDITIONS
- UPGRADE PATHS
- CHAPTER 2: Microsoft Command-Line Tools
- NAVIGATION
- COMMAND-LINE TOOLS
- CHAPTER 3: Windows 10 Operating System Tools
- TASK MANAGER
- MICROSOFT MANAGEMENT CONSOLE (MMC) SNAP-IN
- ADDITIONAL TOOLS
- CHAPTER 4: Windows 10 Control Panel
- CONTROL PANEL OVERVIEW
- OPENING CONTROL PANEL
- INTERNET OPTIONS
- DEVICES AND PRINTERS
- PROGRAMS AND FEATURES
- NETWORK AND SHARING CENTER
- SYSTEM
- WINDOWS DEFENDER FIREWALL
- SOUND
- USER ACCOUNTS
- DEVICE MANAGER
- INDEXING OPTIONS
- ADMINISTRATIVE TOOLS
- FILE EXPLORER OPTIONS
- POWER OPTIONS
- EASE OF ACCESS
- CHAPTER 5: Windows Settings
- ACCESSING SETTINGS
- TIME & LANGUAGE
- UPDATE & SECURITY
- PERSONALIZATION
- APPS
- PRIVACY
- SYSTEM
- DEVICES
- NETWORK & INTERNET
- GAMING
- ACCOUNTS
- CHAPTER 6: Windows Networking
- WORKGROUP VS. DOMAIN SETUP
- LOCAL OS FIREWALL SETTINGS
- CLIENT NETWORK CONFIGURATION
- ESTABLISH NETWORK CONNECTIONS
- PROXY SETTINGS
- PUBLIC NETWORK VS. PRIVATE NETWORK
- FILE EXPLORER NAVIGATION - NETWORK PATHS
- METERED CONNECTIONS AND LIMITATIONS
- CHAPTER 7: Application Installation and Configuration
- SYSTEM REQUIREMENTS FOR APPLICATIONS
- OS REQUIREMENTS FOR APPLICATIONS
- DISTRIBUTION METHODS
- PHYSICAL MEDIA VS. DOWNLOADABLE
- ISO MOUNTABLE
- OTHER CONSIDERATIONS FOR NEW APPLICATIONS
- CHAPTER 8: Operating System Types
- WORKSTATION OSs
- CELL PHONE/TABLET OSs
- VARIOUS FILESYSTEM TYPES
- VENDOR LIFE-CYCLE LIMITATIONS
- COMPATIBILITY CONCERNS BETWEEN OSs
- CHAPTER 9: Operating System Installations and Upgrades
- BOOT METHODS
- TYPES OF INSTALLATIONS
- PARTITIONING
- DRIVE FORMAT
- UPGRADE CONSIDERATIONS
- FEATURE UPDATES
- CHAPTER 10: macOS
- INSTALLATION AND UNINSTALLATION OF APPLICATIONS
- APPLE ID AND CORPORATE RESTRICTIONS
- BEST PRACTICES
- SYSTEM PREFERENCES
- FEATURES
- DISK UTILITY
- FILEVAULT
- TERMINAL
- FORCE QUIT
- CHAPTER 11: Linux
- COMMON COMMANDS
- BEST PRACTICES
- TOOLS
- PART II: Domain 2.0: Security
- CHAPTER 12: Physical Security
- PHYSICAL SECURITY
- PHYSICAL SECURITY FOR STAFF
- CHAPTER 13: Logical Security
- LOGICAL SECURITY
- MOBILE DEVICE MANAGEMENT (MDM)
- ACTIVE DIRECTORY
- CHAPTER 14: Wireless Security
- PROTOCOLS AND ENCRYPTION
- AUTHENTICATION
- CHAPTER 15: Malware
- MALWARE
- MALWARE PREVENTION AND REMOVAL TOOLS AND METHODS
- CHAPTER 16: Social Engineering and Security Threats
- SOCIAL ENGINEERING
- THREATS
- VULNERABILITIES
- CHAPTER 17: Windows Security
- DEFENDER ANTIVIRUS
- FIREWALL
- USERS AND GROUPS
- LOGIN OS OPTIONS
- NTFS VS. SHARE PERMISSIONS
- RUN AS ADMINISTRATOR VS. STANDARD USER
- BitLocker
- BITLOCKER TO GO
- ENCRYPTING FILE SYSTEM (EFS)
- CHAPTER 18: Workstation Security Configuration
- DATA-AT-REST ENCRYPTION
- PASSWORD BEST PRACTICES
- END-USER BEST PRACTICES
- ACCOUNT MANAGEMENT
- CHANGE DEFAULT ADMINISTRATOR'S USER ACCOUNT/PASSWORD
- DISABLE AutoRun
- DISABLE AutoPlay
- CHAPTER 19: Mobile and Embedded Device Security
- SCREEN LOCKS
- LOCATOR APPS AND REMOTE WIPES
- OS UPDATES
- DEVICE ENCRYPTION
- REMOTE BACKUP APPLICATIONS
- FAILED LOGIN ATTEMPTS RESTRICTIONS
- ANTIVIRUS/ANTIMALWARE
- FIREWALLS
- POLICIES AND PROCEDURES
- INTERNET OF THINGS (IoT)
- CHAPTER 20: Data Destruction and Disposal
- PHYSICAL DESTRUCTION
- RECYCLING OR REPURPOSING BEST PRACTICES
- OUTSOURCING CONCEPTS
- CHAPTER 21: Network Security
- HOME ROUTER SETTINGS
- WIRELESS SPECIFIC SETTINGS
- FIREWALL SETTINGS
- CHAPTER 22: Browser Security
- BROWSER DOWNLOAD/INSTALLATION
- SETTINGS
- PART III: Domain 3.0: Software Troubleshooting
- CHAPTER 23: Troubleshooting Windows
- COMMON SYMPTOMS
- COMMON TROUBLESHOOTING STEPS
- CHAPTER 24: Troubleshooting PC Security
- COMMON SYMPTOMS
- BROWSER-RELATED SYMPTOMS
- CHAPTER 25: Troubleshooting Malware
- STEP 1. INVESTIGATE AND VERIFY MALWARE SYMPTOMS
- STEP 2. QUARANTINE INFECTED SYSTEMS
- STEP 3. DISABLE SYSTEM RESTORE IN WINDOWS
- STEP 4. REMEDIATE INFECTED SYSTEMS
- STEP 5. SCHEDULE SCANS AND RUN UPDATES
- STEP 6. ENABLE SYSTEM RESTORE AND CREATE A RESTORE POINT IN WINDOWS
- STEP 7. EDUCATE THE END USER
- CHAPTER 26: Troubleshooting Mobile Device OS and Applications
- COMMON MOBILE OS AND APPLICATION SYMPTOMS
- CHAPTER 27: Troubleshooting Mobile Device Security
- SECURITY CONCERNS
- COMMON SYMPTOMS
- PART IV: Domain 4.0: Operational Procedures
- CHAPTER 28: Documentation
- TICKETING SYSTEMS
- ASSET MANAGEMENT
- TYPES OF DOCUMENTS
- KNOWLEDGE BASE/ARTICLES
- CHAPTER 29: Change Management
- DOCUMENTED BUSINESS PROCESSES
- CHANGE MANAGEMENT
- CHAPTER 30: Workstation Backup and Recovery
- BACKUP AND RECOVERY
- BACKUP TESTING
- BACKUP ROTATION SCHEMES
- CHAPTER 31: Safety
- ELECTROSTATIC DISCHARGE (ESD) STRAPS
- ESD MATS
- EQUIPMENT GROUNDING
- PROPER POWER HANDLING
- PROPER COMPONENT HANDLING AND STORAGE
- ANTISTATIC BAGS
- COMPLIANCE WITH GOVERNMENT REGULATIONS
- PERSONAL SAFETY
- CHAPTER 32: Environmental Protection
- MATERIAL SAFETY DATA SHEET (MSDS): DOCUMENTATION FOR HANDLING AND DISPOSAL
- TEMPERATURE, HUMIDITY-LEVEL AWARENESS, AND PROPER VENTILATION
- POWER SURGES, UNDER-VOLTAGE EVENTS, AND POWER FAILURES
- CHAPTER 33: Privacy, Licensing, Policy, and Incident Response
- INCIDENT RESPONSE
- LICENSING/DIGITAL RIGHTS MANAGEMENT (DRM)/END-USER LICENSE AGREEMENT (EULA)
- REGULATED DATA
- CHAPTER 34: Communication and Professionalism
- PROFESSIONAL APPEARANCE AND ATTIRE
- USE PROPER LANGUAGE AND AVOID JARGON, ACRONYMS, AND SLANG, WHEN APPLICABLE
- MAINTAIN A POSITIVE ATTITUDE/PROJECT CONFIDENCE
- ACTIVELY LISTEN, TAKE NOTES, AND AVOID INTERRUPTING THE CUSTOMER
- BE CULTURALLY SENSITIVE
- BE ON TIME (IF LATE, CONTACT THE CUSTOMER)
- AVOID DISTRACTIONS
- DEALING WITH DIFFICULT CUSTOMERS OR SITUATIONS
- SET AND MEET EXPECTATIONS/TIME LINE AND COMMUNICATE STATUS WITH THE CUSTOMER
- DEAL APPROPRIATELY WITH CUSTOMERS' CONFIDENTIAL AND PRIVATE MATERIALS
- CHAPTER 35: Scripting
- SCRIPT FILE TYPES
- USE CASES FOR SCRIPTING
- OTHER CONSIDERATIONS WHEN USING SCRIPTS
- CHAPTER 36: Remote Access
- METHODS/TOOLS
- SECURITY CONSIDERATIONS OF EACH ACCESS METHOD
- INDEX
- END USER LICENSE AGREEMENT
INTRODUCTION
We live in an exciting time. The information age is exploding around us, giving us access to dizzying amounts of data the instant it becomes available. Smartphones and tablets provide an untethered experience that offers streaming video, audio, and other media formats to just about any place on the planet. Even people who are not "computer literate" use Facebook to catch up with friends and family, use Google to research a new restaurant choice and get directions to drive there, or tweet their reactions once they have sampled the fare. The budding Internet of Things will only catalyze this data eruption. The infrastructure supporting these services is also growing exponentially, and the technology that facilitates this rapid growth is virtualization.
On one hand, virtualization is nothing more than an increasingly efficient use of existing resources that delivers huge cost savings in a brief amount of time. On the other, virtualization offers organizations new models of application deployment for greater uptime to meet user expectations, modular packages to provide new services in minutes instead of weeks, and advanced features that bring automatic load balancing, scalability without downtime, self-healing, self-service provisioning, and many other capabilities to support business-critical applications that improve on traditional architecture. Large companies have been using this technology for more than 15 years, while smaller and medium-sized businesses also now rely on these solutions. Newer companies may skip the movement altogether and jump directly to cloud computing, the next evolution of application deployment. Virtualization is the foundation for cloud computing as well.
This quantum change in our world echoes similar trends from our recent history as electrical power and telephony capabilities spread and then changed our day-to-day lives. During those periods, whole industries sprang up out of nothing, providing employment and opportunity to people who had the foresight and chutzpah to seize the moment. That same spirit and opportunity is available today as this area is still being defined and created right before our eyes. If not virtualization vendors, there are hardware partners that provide servers, networking vendors for connectivity, storage partners for data storage, and everyone provides services. Software vendors are designing and deploying new applications specifically for these new architectures. Third parties are creating tools to monitor and manage these applications and infrastructure areas. As cloud computing becomes the de facto model for development, deployment, and maintaining application services, this area will expand even further.
The first generation of virtualization specialists acquired their knowledge out of necessity: they were server administrators who needed to understand the new infrastructure being deployed in their data centers. Along the way, they picked up some networking knowledge to manage the virtual networks, storage knowledge to connect to storage arrays, and application information to better interface with the application teams. Few people have experience in all of those areas. Whether you have some virtualization experience or none at all, this text will give you the foundation to understand what virtualization is, why it is a crucial portion of today's and tomorrow's information technology infrastructure, and the opportunity to explore and experience one of the most exciting and key areas in technology today.
Good reading and happy virtualizing!
Who Should Read This Book
This text is designed to provide the basics of virtualization technology to someone who has little or no prior knowledge of the subject. This book will be of interest to you if you are an IT student looking for information about virtualization or if you are an IT manager who needs a better understanding of virtualization fundamentals as part of your role. Virtualization Essentials might also be of interest if you are an IT professional who specializes in a particular discipline (such as server administration, networking, or storage) and are looking for an introduction into virtualization or cloud computing as a way to advance inside your organization.
The expectation is that you have the following:
- Some basic PC experience
- An understanding of what an operating system is and does
- Conceptual knowledge of computing resources (CPU, memory, storage, and network)
- A high-level understanding of how programs use resources
This text would not be of interest if you are already a virtualization professional and you are looking for a guidebook or reference.
What You Need
The exercises and illustrations used in this text were created on a system with Windows 11 as the operating system. VMware Workstation Player version 16 is used as the virtualization platform. It is available as a free download from downloads.vmware.com/d. It is recommended that you have at least 2 GB of memory, though more will be better. The installation requires a minimum of 1.5 GB of disk storage, but virtual machines will require more. Also used is Oracle VirtualBox version 7. It is available as a free download from www.virtualbox.org. It is recommended that you have at least 2 GB of memory. VirtualBox itself requires only about 30 MB of disk storage, but virtual machines will require more.
The examples demonstrate the creation and use of two virtual machines: one running Windows 11, the other running Ubuntu Linux. You will need the installation media for those as well. Each of the virtual machines requires about 60 GB of disk space.
What Is Covered in This Book
Here's a glance at what is in each chapter.
- Chapter 1: Understanding Virtualization
Introduces the basic concepts of computer virtualization beginning with mainframes and continues with the computing trends that have led to current technologies.
- Chapter 2: Understanding Hypervisors
Focuses on hypervisors, the software that provides the virtualization layer, and compares some of the current offerings in today's marketplace.
- Chapter 3: Understanding Virtual Machines
Describes what a virtual machine is composed of, explains how it interacts with the hypervisor that supports its existence, and provides an overview of managing virtual machine resources.
- Chapter 4: Creating a Virtual Machine
Begins with the topic of converting existing physical servers into virtual machines and provides a walkthrough of installing VMware Workstation Player and Oracle VirtualBox, the virtualization platforms used in this text, and a walkthrough of the creation of a virtual machine.
- Chapter 5: Installing Windows on a Virtual Machine
Provides a guide for loading Microsoft Windows in the created virtual machine and then describes configuration and tuning options.
- Chapter 6: Installing Linux on a Virtual Machine
Provides a guide for loading Ubuntu Linux in a virtual machine and then walks through a number of configuration and optimization options.
- Chapter 7: Managing CPUs for a Virtual Machine
Discusses how CPU resources are virtualized and then describes various tuning options and optimizations. Included topics are hyperthreading and Intel versus AMD.
- Chapter 8: Managing Memory for a Virtual Machine
Covers how memory is managed in a virtual environment and the configuration options available. It concludes with a discussion of various memory optimization technologies that are available and how they work.
- Chapter 9: Managing Storage for a Virtual Machine
Examines how virtual machines access storage arrays and the different connection options they can utilize. Included are virtual machine storage options and storage optimization technologies such as deduplication.
- Chapter 10: Managing Networking for a Virtual Machine
Begins with a discussion of virtual networking and how virtual machines use virtual switches to communicate with each other and the outside world. It concludes with virtual network configuration options and optimization practices.
- Chapter 11: Copying a Virtual Machine
Discusses how virtual machines are backed up and provisioned through techniques such as cloning and using templates. It finishes with a powerful feature called snapshots that can preserve a virtual machine state.
- Chapter 12: Managing Additional Devices in Virtual Machines
Begins by discussing virtual machine tools, vendor-provided application packages that optimize a virtual machine's performance, and concludes with individual discussions of virtual support for other peripheral devices like CD/DVD drives and USB devices.
- Chapter 13: Understanding Availability
Positions the importance of availability in the virtual environment and then discusses various availability technologies that protect individual virtual machines, virtualization servers, and entire data centers from planned and unplanned downtime.
- Chapter 14: Understanding Applications in a Virtual Machine
Focuses on the methodology and practices for deploying applications in a virtual environment. Topics include application performance, using resource pools, and deploying virtual...
Systemvoraussetzungen
Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.