CompTIA® A+ 220-902 Exam Objectives Chapters Domain 1.0 Windows Operating Systems 1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1). 1, 2, 3, 4, 10 1.2 Given a scenario, install Windows PC operating systems using appropriate methods. 1, 2, 3, 6, 9, 11 1.3 Given a scenario, apply appropriate Microsoft command line tools. 3, 5, 6, 9 1.4 Given a scenario, use appropriate Microsoft operating system features and tools. 1, 2, 3, 4, 5, 9, 10 1.5 Given a scenario, use Windows Control Panel utilities. 1, 2, 3, 4, 9, 10 1.6 Given a scenario, install and conigure Windows networking on a client/desktop. 1, 7, 9, 10 1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools. 3, 6 Domain 2.0 Other Operating Systems and Technologies 2.1 Identify common features and functionality of the Mac OS and Linux operating systems. 11 2.2 Given a scenario, setup and use client-side virtualization. 11 2.3 Identify basic cloud concepts. 9 2.4 Summarize the properties and purpose of services provided by networked hosts. 9, 10 2.5 Identify basic features of mobile operating systems. 8 2.6 Install and conigure basic mobile device network connectivity and email. 8 2.7 Summarize methods and data related to mobile device synchronization. 8, 10 Domain 3.0 Security 3.1 Identify common security threats and vulnerabilities. 10 3.2 Compare and contrast common prevention methods. 7, 9, 10 3.3 Compare and contrast differences of basic Windows OS security settings. 1, 3, 9, 10 3.4 Given a scenario, deploy and enforce security best practices to secure a workstation. 3, 9, 10 3.5 Compare and contrast various methods for securing mobile devices. 10 3.6 Given a scenario, use appropriate data destruction and disposal methods. 10 3.7 Given a scenario, secure SOHO wireless and wired networks. 7 Domain 4.0 Software Troubleshooting 4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools. 3, 4, 5, 6, 11 4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices. 6, 10, 11 4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools. 8, 10 4.4 Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools. 8, 10 Domain 5.0 Operational Procedures 5.1 Given a scenario, use appropriate safety procedures. Appendix A 5.2 Given a scenario with potential environmental impacts, apply the appropriate controls. Appendix A 5.3 Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts. 10 5.4 Demonstrate proper communication techniques and professionalism. 5 5.5 Given a scenario, explain the troubleshooting theory. 5 Want to turn C’s into A’s? Obviously, right? But the right way to go about it isn’t always so obvious. Go digital to get the grades. MindTap’s customizable study tools and eTextbook give you everything you need all in one place. Engage with your course content, enjoy the flexibility of studying anytime and anywhere, stay connected to assignment due dates and instructor notifications with the MindTap Mobile app... and most of all…EARN BETTER GRADES. TO GET STARTED VISIT WWW.CENGAGE.COM/STUDENTS/MINDTAP CompTIA A+ Guide to Software: Managing, Maintaining, and Troubleshooting NiNth EditioN Jean Andrews, Joy Dark, Jill West Australia • Canada • Mexico • Singapore • Spain • United Kingdom • United States This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version. CompTIA A+ Guide to Software: Managing, © 2017, 2013 Cengage Learning Maintaining, and Troubleshooting, WCN: 02-200-203 Ninth Edition, Jean Andrews, Joy Dark, Jill West SVP, GM Skills & Global Product Management: Dawn ALL RIGHTS RESERVED. No part of this work covered by the copy- Gerrain right herein may be reproduced or distributed in any form or by any Product Director: Kathleen McMahon means, except as permitted by U.S. copyright law, without the prior written permission of the copyright owner. Product Team Manager: Kristin McNary Senior Director, Development: Marah Bellegarde For product information and technology assistance, contact us at Product Development Manager: Leigh Heferon Cengage Learning Customer & Sales Support, 1-800-354-9706 Senior Content Developer: Michelle Ruelos For permission to use material from this text or product, Cannistraci submit all requests online at www.cengage.com/permissions Further permissions questions can be e-mailed to Product Assistant: Abigail Pufpaf [email protected] Vice President, Marketing Services: Jennifer Ann Baker Marketing Director: Michele McTighe Library of Congress Control Number: 2015957525 Senior Production Director: Wendy Troeger ISBN: 978-1-305-26650-6 Production Director: Patty Stephan Cengage Learning 20 Channel Center Street Senior Content Project Manager: Brooke Greenhouse Boston, MA 02210 Managing Art Director: Jack Pendleton USA Cover image(s): Cengage Learning is a leading provider of customized learning ©iStockphoto.com/traffic_analyzer solutions with employees residing in nearly 40 diferent countries ©iStockphoto.com/simon2579 and sales in more than 125 countries around the world. Find your local representative at www.cengage.com. Cengage Learning products are represented in Canada by Nelson All screenshots, unless otherwise noted, are used Education, Ltd. with permission from Microsoft Corporation. Microsoft® is a registered trademark of the To learn more about Cengage Learning, visit www.cengage.com Microsoft Corporation. Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com Notice to the Reader Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection with any of the product information contained herein. Publisher does not assume, and expressly dis- claims, any obligation to obtain and include information other than that pro- vided to it by the manufacturer. The reader is expressly warned to consider and adopt all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following the instructions con- tained herein, the reader willingly assumes all risks in connection with such instructions. The publisher makes no representations or warranties of any kind, including but not limited to, the warranties of itness for particular purpose or merchantability, nor are any such representations implied with respect to the material set forth herein, and the publisher takes no responsibility with respect to such material. The publisher shall not be liable for any special, consequen- tial, or exemplary damages resulting, in whole or part, from the readers’ use of, or reliance upon, this material. Printed in the United States of America Print Number: 01 Print Year: 2016 Table of Contents CompTIA A+ 220-902 Exam Mapped to Installing Windows 8.1 and Windows 7........ 66 Chapters . . . . . . . . . . . . . . . . . . . . . .vii Steps to Perform a Windows 8.1 In-Place Upgrade .......................... 66 Windows 8.1 Upgrade from Microsoft Website .......................... 71 Chapter 1 Windows 7 In-Place Upgrade ............. 72 Steps to Perform a Windows 8.1 Survey of Windows Features and Support Clean Install ....................... 74 Tools . . . . . . . . . . . . . . . . . . . . . . . . . .1 Steps to Perform a Windows 7 Clean Install... 76 Windows Interfaces ......................2 Steps to Set Up a Windows Multiboot....... 78 Windows 8 Modern Interface ..............3 Using an Upgrade Product Key on a New Windows 8 Desktop.....................7 Hard Drive ........................ 80 Windows Tools for Users and Technicians ...... 11 What to Do After a Windows Installation ...... 84 Windows 8 File Explorer and Windows 7 Verify You Have Network Access........... 85 Windows Explorer ................... 11 Activate Windows..................... 86 Control Panel........................ 18 Install Windows Updates and Service Packs . . . 86 Folder Options ....................... 20 Install Hardware...................... 88 Power Options ....................... 21 Install Applications ................... 95 System Window ...................... 23 Set Up User Accounts and Transfer User System Information Window ............. 25 Data............................. 95 Action Center........................ 26 Turn Windows Features On or Off.......... 96 Windows Network Connections.............. 28 Special Concerns When Working in a Large Windows Workgroup and Homegroup ....... 28 Enterprise .......................... 96 Windows Domain ..................... 29 Deployment Strategies for Windows ........ 97 Public and Private Networks ............. 30 Using the USMT Software................ 99 Make a Windows 8 Network Connection...... 31 Domain Setup ....................... 34 Windows User Accounts .................. 35 Chapter 3 Using a Microsoft Account with Windows 8 ... 38 Maintaining Windows. . . . . . . . . . . . .107 User Account Control Dialog Box .......... 41 Schedule Preventive Maintenance........... 108 Verify Critical Windows Settings.......... 108 Chapter 2 Update Drivers and Firmware............ 108 Patch Management ................... 109 Installing Windows. . . . . . . . . . . . . . . .49 Clean Up the Hard Drive ............... 110 How to Plan a Windows Installation.......... 50 Backup Procedures..................... 117 Choose the Edition, License, and Version Planning for Disaster Recovery........... 118 of Windows........................ 50 Back Up User Data with Windows 8 File Verify Your System Qualiies for History.......................... 119 Windows.......................... 51 Back Up Windows System Files........... 124 Installations with Special Considerations..... 57 Windows 8 Custom Refresh Image......... 126 Choose the Type of Installation: In-Place Managing Files, Folders, and Storage Devices... 129 Upgrade, Clean Install, or Dual Boot ...... 62 How Partitions and File Systems Work...... 129 Understand the Choices You’ll Make during Commands to Manage Files and Folders..... 133 the Installation..................... 63 Use Disk Management to Manage Final Checklist before Beginning the Hard Drives....................... 144 Installation........................ 64 Windows Storage Spaces ............... 151 iv table of Contents Chapter 4 Step 3: Test Your Theory............... 231 Step 4: Plan Your Solution and Then Fix the Optimizing Windows . . . . . . . . . . . . .159 Problem ......................... 232 Step 5: Verify the Fix and Take Windows Utilities and Tools to Support Preventive Action .................. 233 the OS............................ 160 Step 6: Document What Happened........ 233 What are the Shell and the Kernel? ....... 160 Troubleshooting Applications ............. 235 How Windows Manages Applications....... 161 General Steps for Solving Application Errors.. 235 Task Manager....................... 162 Memory Diagnostics .................. 238 Administrative Tools.................. 169 System File Checker .................. 240 System Coniguration ................. 170 Responding to Speciic Error Messages ..... 241 Services Console..................... 174 Computer Management ................ 175 Microsoft Management Console (MMC)...... 175 Chapter 6 Event Viewer ....................... 177 Print Management ................... 181 Troubleshooting Windows Startup. . . .251 Task Scheduler...................... 182 Understanding the Boot Process............ 252 Performance Monitor.................. 184 Different Ways to Boot ................ 252 Registry Editor...................... 186 Startup UEFI/BIOS Controls the Beginning Display Settings and Graphics Software..... 191 of the Boot....................... 253 Improving Windows Performance ........... 193 Steps to Boot the Computer and Start Step 1: Perform Routine Maintenance...... 194 Windows......................... 254 Step 2: Clean Windows Startup........... 194 Tools for Troubleshooting Windows Startup Step 3: Check If the Hardware Can Problems .......................... 261 Support the OS .................... 196 What to Do before a Problem Occurs....... 262 Step 4: Check for a History of Problems .... 197 Tools for Least Invasive Solutions......... 266 Step 5: Consider Using ReadyBoost........ 197 Tools That Can Affect Windows System Files Manually Removing Software.............. 199 and Settings . . . . . . . . . . . . . . . . . . . . . . 276 Step 1: First Try the Uninstall Routine ..... 200 Tools for Reinstalling Windows........... 280 Step 2: Delete Program Files ............ 200 Troubleshooting Windows Startup .......... 286 Step 3: Delete Registry Entries........... 201 Important Data on the Hard Drive ........ 286 Step 4: Remove Program Shortcuts........ 202 Error Messages and Problems ............ 287 Step 5: Remove Startup Processes......... 203 Chapter 7 Chapter 5 Connecting To and Setting Up a Supporting Customers and Network . . . . . . . . . . . . . . . . . . . . .297 Troubleshooting Windows . . . . . . . .209 Understanding TCP/IP and Windows What Customers Want: Beyond Technical Networking......................... 298 Know-How ......................... 210 Layers of Network Communication ........ 298 Becoming a Competent and Helpful Support How IP Addresses Get Assigned .......... 302 Technician ....................... 210 How IPv4 Addresses are Used............ 302 Planning for Good Service.............. 214 How IPv6 Addresses are Used............ 306 Strategies to Troubleshoot Any Computer View IP Address Settings............... 309 Problem........................... 225 Character-Based Names Identify Computers Step 1: Interview the User and Back and Networks ..................... 310 Up Data ......................... 227 TCP/IP Protocol Layers ................ 312 Step 2: Examine the System and Make Connecting a Computer to a Network........ 317 Your Best Guess.................... 229 table of Contents v Connect to an Ethernet Wired or Wireless Update and Restore Windows Phone from Wi-Fi Local Network................. 317 Backup.......................... 410 Connect to a Wireless WAN (Cellular) Troubleshoot Windows Mobile Devices...... 410 Network ......................... 320 Create a Dial-Up Connection ............ 323 Chapter 9 Create a VPN Connection............... 325 Dynamic and Static IP Conigurations...... 328 Windows Resources on a Network. . . .417 Alternate IP Address Coniguration........ 329 Manage Network Adapters.............. 330 Supporting Client/Server Applications ....... 418 Setting Up a Multifunction Router for a SOHO Network Servers..................... 418 Network........................... 334 Internet Explorer .................... 419 Functions of a SOHO Router............. 334 Remote Desktop Connection (RDC)........ 427 Install and Conigure a Router on the Local Remote Assistance ................... 432 Network ......................... 336 Use Group Policy to Improve QoS for Limit Internet Trafic on Your Network..... 342 Applications ...................... 434 Set Up a Wireless Network.............. 347 ODBC Data Sources ................... 435 Controlling Access to Folders and Files....... 437 Classify User Accounts and User Groups .... 437 Chapter 8 Methods to Assign Permissions to Folders and Files......................... 440 Supporting Mobile Operating How to Share Folders and Files........... 442 Systems. . . . . . . . . . . . . . . . . . . . . .359 How to Map a Network Drive or Network Operating Systems Used on Mobile Devices .... 360 Printer.......................... 454 Android by the Open Handset Alliance Hidden Network Resources and and Google . . . . . . . . . . . . . . . . . . . . . . . 360 Administrative Shares ............... 456 iOS by Apple ....................... 363 Cloud Computing ...................... 458 Windows Phone by Microsoft ............ 367 Cloud Computing Categories............. 459 Comparing Open Source and Closed Source Deployment Models for Cloud Computing.... 461 Operating Systems.................. 371 Conigure, Sync, and Troubleshoot Chapter 10 iOS Devices......................... 371 Conigure iOS Network Connections ....... 372 Security Strategies. . . . . . . . . . . . . . .467 Conigure iOS Email .................. 375 Sync, Back Up, and Restore from Backup Securing a Windows Personal Computer ...... 468 in iOS........................... 380 Use Windows to Authenticate Users ....... 468 Troubleshoot iOS Devices............... 388 File and Folder Encryption.............. 473 Conigure, Sync, and Troubleshoot Windows Firewall Settings.............. 474 Android Devices ..................... 393 Local Security Policies Using Group Policy... 477 Conigure Android Network Connections .... 393 Use BitLocker Encryption .............. 481 Conigure Android Email ............... 398 Use UEFI/BIOS Features to Protect the System 482 Sync, Update, Back Up, and Restore from Securing a Mobile Device................. 483 Backup with Android................ 399 Device Access Controls ................ 483 Troubleshoot Android Devices ........... 402 Software Security.................... 486 Conigure, Sync, and Troubleshoot Windows Mobile Security in Corporate Environments .. 488 Mobile Devices ...................... 406 Additional Methods to Protect Resources ..... 489 Conigure Windows Phone Network Authenticate Users for Large Networks ..... 489 Connections ...................... 407 Physical Security Methods and Devices ..... 492 Conigure Windows Phone Email, Sync, Digital Security Methods and Resources .... 493 and Backup....................... 407 Uniied Threat Management (UTM) Appliance 493 vi table of Contents Data Destruction and Disposal ........... 494 Assigning Permissions to Files Educate Users....................... 495 or Directories ..................... 542 Dealing with Malicious Software on Personal Dual-Boot Systems and a Live CD......... 544 Computers ......................... 497 Backups and Updates ................. 546 What are We Up Against? .............. 497 Mac OS X Operating System............... 548 Step-by-Step Attack Plan .............. 499 Use the Mac........................ 548 Dealing with Malicious Software on Mobile Maintain and Support a Mac ............ 561 Devices ........................... 510 Troubleshoot OS X Startup.............. 570 Common Mobile Device Malware Symptoms .. 510 Boot Camp......................... 572 Mobile Device Tools and Malware Removal... 512 Software Licensing and Prohibited Content or Activity ......................... 515 appendix a Software Licensing ................... 515 Safety Procedures and Environmental Corporate Policies for Dealing with Prohibited Concerns . . . . . . . . . . . . . . . . . . . . . .579 Content or Activity ................. 516 Chapter 11 appendix B Virtualization, Linux, and Mac OS X. .523 Entry Points for Startup Processes . . .595 Virtualization Basics.................... 524 Server-Side Virtualization .............. 524 Client-Side Virtualization .............. 525 appendix C Virtual Machines and Hypervisors......... 525 CompTIA A+ Acronyms . . . . . . . . . . . .599 Linux Operating System ................. 530 Directory and File Layout .............. 533 Root Account and User Accounts ......... 535 Glossary. . . . . . . . . . . . . . . . . . . . . . .607 Linux Commands .................... 536 The Vi Editor ....................... 539 Index. . . . . . . . . . . . . . . . . . . . . . . . .637