Exam Number: CORE 2 (220-1002)

Candidates are encouraged to use this document to help prepare for CompTIA A+ Core 2. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220- 1001) and Core 2 (220-1002). CompTIA A+ Core 2 measures the necessary skills for an entry- level IT professional. Successful candidates will have the knowledge required to:

  • Assemble components based on customer requirements
  • Install, configure, and maintain PCs, mobile devices, and software for end users
  • Understand the basics of networking and security forensics
  • Properly and safely diagnose, resolve, and document common hardware and software issues
  • Apply troubleshooting skills
  • Provide appropriate customer support
  • Understand the basics of scripting, virtualization, desktop imaging, and deployment

These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.

Course Objectives

1.0 Operating Systems
-Compare and contrast common operating system types and their purposes.
-Compare and contrast features of Microsoft Windows versions.
-Summarize general OS installation considerations and upgrade methods.
-Given a scenario, use appropriate Microsoft command line tools.
-Given a scenario, use Microsoft operating system features and tools.
-Given a scenario, use Microsoft Windows Control Panel utilities.
-Summarize application installation and configuration concepts.
-Given a scenario, configure Microsoft Windows networking on a client/desktop.
-Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
-Summarize the importance of physical security measures.
-Explain logical security concepts.
-Compare and contrast wireless security protocols and authentication methods.
-Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.

2.0 Security
-Compare and contrast social engineering, threats, and vulnerabilities.
-Compare and contrast the differences of basic Microsoft Windows OS security settings.
-Given a scenario, implement security best practices to secure a workstation.
-Given a scenario, implement methods for securing mobile devices.
-Given a scenario, implement appropriate data destruction and disposal methods.
-Given a scenario, configure security on SOHO wireless and wired networks.

3.0 Software Troubleshooting
-Given a scenario, troubleshoot Microsoft Windows OS problems.
-Given a scenario, troubleshoot and resolve PC security issues.
-Given a scenario, use best practice procedures for malware removal.
-Given a scenario, troubleshoot mobile OS and application issues.
-Given a scenario, troubleshoot mobile OS and application security issues.

4.0 Operational Procedures
-Compare and contrast best practices associated with types of documentation.
-Given a scenario, implement basic change management best practices.
-Given a scenario, implement basic disaster prevention and recovery methods.
-Explain common safety procedures.
-Explain environmental impacts and appropriate controls.
-Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.
-Given a scenario, use proper communication techniques and professionalism.
-Identify the basics of scripting.
-Given a scenario, use remote access technologies.

Register Today