Book description
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of specialization.
As with other O'Reilly Nutshell books for certification exams, A+, Network+ and Security + in a Nutshell follows a proven style and approach. It reviews all of the topics needed to master each exam in a remarkably concise format, with required knowledge boiled down to the core. Instead of plowing through 500 to 700 pages to prepare for each exam, this book covers each one in approximately 150 pages. And because the objectives for the three elective A+ exams are redundant, and the book covers them in one section.
The exams covered include:
- A+ Essentials: Required for A+ 2006 certification
- EXAM 220-602: For the A+ IT Technician specialization
- EXAM 220-603: For the A+ Remote Support Technician specialization
- EXAM 220-604: For the A+ IT Depot specialization
- EXAM N10-003: For Network+ Certification
- EXAM SYO-101: For Security+ Certification
Each exam is covered in three parts: Exam Overview, Study Guide and Prep and Practice. Plenty of detailed tables and screen shots are included, along with study notes and practice questions. Once you have completed the exams successfully, you will find this all-in-one book to be a valuable reference to core administration and security skills.
Publisher resources
Table of contents
- A+, Network+, Security+ Exams in a Nutshell
- Preface
-
I. A+ Essentials
- 1. Overview of A+ Essentials Exam
-
2. A+ Essentials Study Guide
-
2.1. Personal Computer Components
- 2.1.1. Components of Motherboards
- 2.1.2. Installing, Configuring, and Optimizing Personal Computer Components
- 2.1.3. Troubleshooting Tools and Procedures
-
2.1.4. Preventive Maintenance (PM)
- 2.1.4.1. Scheduling preventive maintenance
- 2.1.4.2. Visual and audio inspection
- 2.1.4.3. Driver and firmware updates
- 2.1.4.4. Heat and temperature
- 2.1.4.5. Humidity
- 2.1.4.6. PM for display devices
- 2.1.4.7. PM for power supply
- 2.1.4.8. PM for input devices
- 2.1.4.9. PM for storage devices
- 2.1.4.10. PM for motherboards, memory, and adapters
-
2.2. Laptops and Portable Devices
- 2.2.1. Overview of Laptop Components
- 2.2.2. Power Management and Device Removal
- 2.2.3. Troubleshooting Laptops
- 2.2.4. Preventive Maintenance (PM)
-
2.3. Operating Systems
- 2.3.1. Overview of Operating Systems
-
2.3.2. Installing and Configuring Operating Systems
- 2.3.2.1. Installing the operating system
- 2.3.2.2. Installing Windows XP Professional
- 2.3.2.3. Installing Windows 2000 Professional
-
2.3.2.4. Upgrading an operating system
- 2.3.2.4.1. Available upgrade paths
- 2.3.2.4.2. Checking hardware compatibility
- 2.3.2.4.3. Checking application compatibility
- 2.3.2.4.4. Installing additional Windows components
- 2.3.2.4.5. Network compatibility
- 2.3.2.4.6. Upgrade utility
- 2.3.2.4.7. Backing up user data
- 2.3.2.4.8. Performing the upgrade
-
2.3.2.5. Installing devices and drivers
- 2.3.2.5.1. Identifying the PnP and non-PnP devices
- 2.3.2.5.2. Permissions and rights
- 2.3.2.5.3. Driver signing
- 2.3.2.5.4. Obtaining device drivers
- 2.3.2.5.5. Connecting the device
- 2.3.2.5.6. Installing and configuring the driver
- 2.3.2.5.7. Adding devices in Windows 2000
- 2.3.2.5.8. Adding devices in Windows XP
- 2.3.2.5.9. Verifying device driver installation
- 2.3.2.6. Optimizing performance
-
2.3.3. Troubleshooting Techniques
- 2.3.3.1. Understanding boot sequence
- 2.3.3.2. Understanding the Advanced Boot Options
- 2.3.3.3. Recovery Console
- 2.3.3.4. System Restore (Windows XP)
- 2.3.3.5. Automated System Recovery (Windows XP)
- 2.3.3.6. Emergency Repair Disk (Windows 2000)
- 2.3.3.7. Troubleshooting procedures
- 2.3.3.8. Operational problems
- 2.3.3.9. Common error messages
- 2.3.3.10. Troubleshooting utilities
- 2.3.4. Preventive Maintenance (PM)
-
2.4. Printers and Scanners
-
2.4.1. Printer and Scanner Technologies
- 2.4.1.1. Laser printers
- 2.4.1.2. Inkjet printers
- 2.4.1.3. Impact printers
- 2.4.1.4. Thermal printers
- 2.4.1.5. Solid ink printers
- 2.4.1.6. Printer interfaces
- 2.4.1.7. Printer software
- 2.4.1.8. Printer memory
- 2.4.1.9. Printer supplies
- 2.4.1.10. Types of scanners
- 2.4.1.11. Components of a scanner
- 2.4.1.12. Scanner interfaces
- 2.4.2. Installing, Configuring, and Upgrading Printers and Scanners
- 2.4.3. Troubleshooting Printers and Scanners
-
2.4.1. Printer and Scanner Technologies
-
2.5. Networks
-
2.5.1. Networking Fundamentals
- 2.5.1.1. Types of networks
- 2.5.1.2. Networking models
- 2.5.1.3. Network topologies
- 2.5.1.4. Network cabling
- 2.5.1.5. Connectors
- 2.5.1.6. Network devices
- 2.5.1.7. Switches
- 2.5.1.8. Routers
- 2.5.1.9. Networking protocols
- 2.5.1.10. Host naming and addressing
- 2.5.1.11. Bandwidth
- 2.5.1.12. LAN technologies
- 2.5.1.13. WAN technologies
- 2.5.1.14. Infrared
- 2.5.2. Installing and Maintaining Networks
- 2.5.3. Troubleshooting Techniques
-
2.5.1. Networking Fundamentals
-
2.6. Security
- 2.6.1. Principles of Security
- 2.6.2. Security Problems and Preventive Maintenance
- 2.7. Safety and Environmental Issues
- 2.8. Communications and Professionalism
-
2.1. Personal Computer Components
-
3. Prep and Practice for the A+ Essentials Exam
- 3.1. Preparing for the A+ Essentials Exam
-
3.2. Suggested Exercises for the A+ Essentials Exam
- 3.2.1. Examine the Motherboard
- 3.2.2. BIOS/Firmware
- 3.2.3. Identify Processor and Memory
- 3.2.4. I/O Ports and Expansion Bus Slots
- 3.2.5. Power Supply and Its Connectors
- 3.2.6. Memory Modules
- 3.2.7. Hard Disk Drive
- 3.2.8. Input Devices
- 3.2.9. Common Ports on a PC
- 3.2.10. Cooling Fans
- 3.2.11. Software Diagnostic Utilities
- 3.2.12. Troubleshooting
- 3.2.13. Preventive Maintenance
- 3.2.14. Laptop Motherboard, Processor, and Memory
- 3.2.15. Laptop Display
- 3.2.16. Safely Removing Hardware
- 3.2.17. Configuring Power Options
- 3.2.18. Configuring Windows Desktop
- 3.2.19. Configuring Taskbar
- 3.2.20. Control Panel
- 3.2.21. Changing the Computer Name
- 3.2.22. Exploring Windows Registry
- 3.2.23. Creating a Disk Partition
- 3.2.24. Using Windows Explorer
- 3.2.25. Changing File Attributes
- 3.2.26. Configuring File Permissions
- 3.2.27. Configuring Paging File
- 3.2.28. Examining Advanced Boot Options
- 3.2.29. Preparing an ASR
- 3.2.30. Creating System Restore Point (Windows XP)
- 3.2.31. Configuring Automatic Updates
- 3.2.32. Laser Printing Process
- 3.2.33. Inkjet Printers
- 3.2.34. Scanners
- 3.2.35. Printing Problems
- 3.2.36. Network Topologies
- 3.2.37. Network Cables and Connectors
- 3.2.38. Network Protocols, Services, and Addressing
- 3.2.39. WAN/Internet Connectivity
- 3.2.40. Network Troubleshooting
- 3.2.41. Authentication Methods
- 3.2.42. Protection from Malicious Software
- 3.2.43. Password Management
- 3.2.44. Preventive Maintenance for Security
- 3.3. Highlighters Index
- 3.4. Practice Questions for the A+ Essentials Exam
-
II. A+ Exams 220–602, 220–603, and 220–604
- 4. Overview of the A+ Exams 220–602, 220–603, and 220–604
-
5. Study Guide for A+ Exams 220–602, 220–603, and 220–604
-
5.1. Personal Computer Components
- 5.1.1. Adding, Removing, and Upgrading Computer Components
- 5.1.2. Troubleshooting Tools and Techniques
- 5.1.3. Preventive Maintenance (PM)
- 5.2. Laptops and Portable Devices
-
5.3. Operating Systems
- 5.3.1. Fundamental Principles
- 5.3.2. Optimize Operating Systems
- 5.3.3. Diagnostic Tools and Troubleshooting Techniques
- 5.3.4. Preventive Maintenance (PM)
-
5.4. Printers and Scanners
- 5.4.1. Fundamentals of Printers and Scanners
- 5.4.2. Installing and Configuring Printers and Scanners
- 5.4.3. Troubleshooting Printers and Scanners
- 5.4.4. Preventive Maintenance (PM)
-
5.5. Networks
-
5.5.1. Network Fundamentals
- 5.5.1.1. OSI model
-
5.5.1.2. Networking protocols
- 5.5.1.2.1. TCP/IP
- 5.5.1.2.2. Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
- 5.5.1.2.3. NetBEUI/NetBIOS
- 5.5.1.2.4. Simple Mail Transfer Protocol (SMTP)
- 5.5.1.2.5. Internet Message Access Protocol 4 (IMAP4)
- 5.5.1.2.6. Internet Control Message Protocol (ICMP)
- 5.5.1.2.7. Address Resolution Protocol (ARP)
- 5.5.1.2.8. HyperText Transfer Protocol (HTTP)
- 5.5.1.2.9. HTTP Secure (HTTPS)
- 5.5.1.2.10. Secure Socket Layer (SSL)
- 5.5.1.2.11. Telnet
- 5.5.1.2.12. File Transfer Protocol (FTP)
- 5.5.1.2.13. DNS
- 5.5.1.2.14. Windows Internet Naming System (WINS)
- 5.5.1.3. Connectivity technologies
- 5.5.1.4. LAN technologies
- 5.5.1.5. WAN technologies
- 5.5.1.6. Infrared (IrDA)
- 5.5.2. Installing, Configuring, and Optimizing Networks
-
5.5.3. Troubleshooting Network Problems
- 5.5.3.1. Troubleshooting tools
- 5.5.3.2. Cable-testing devices
- 5.5.3.3. Configuration problems
-
5.5.3.4. Preventive maintenance for networks
- 5.5.3.4.1. Securing network cables
- 5.5.3.4.2. Restricting physical access
- 5.5.3.4.3. Server and desktop hardening
- 5.5.3.4.4. Data backups and recovery
- 5.5.3.4.5. Power redundancy
- 5.5.3.4.6. Link redundancy
- 5.5.3.4.7. Server clusters
- 5.5.3.4.8. Hot, warm, and cold sites
- 5.5.3.4.9. Hot and cold spares
-
5.5.1. Network Fundamentals
-
5.6. Security
- 5.6.1. Principles of Security
- 5.6.2. Install, Configure, and Upgrade Security
- 5.6.3. Diagnostic and Troubleshooting Techniques
- 5.6.4. Preventive Maintenance for Security
-
5.1. Personal Computer Components
-
6. Prep and Practice for the A+ Exams 220–602, 220–603, and 220–604
- 6.1. Preparing for the A+ Exams
-
6.2. Suggested Exercises for the Exams
- 6.2.1. Installing a Hard Drive
- 6.2.2. Upgrading Memory
- 6.2.3. Installing an Adapter Card
- 6.2.4. Visual Inspection of Internal Components
- 6.2.5. Audible Codes
- 6.2.6. Testing the Power Supply DC Output Voltages
- 6.2.7. Starting the Computer with Minimum Configuration
- 6.2.8. Adding/Removing Laptop-Specific Components
- 6.2.9. Connecting External Devices
- 6.2.10. Connecting a Laptop to a Wireless Network
- 6.2.11. Using the Windows Command Prompt
- 6.2.12. Creating New Folders
- 6.2.13. Changing File/Folder Attributes
- 6.2.14. Disk Partitioning and Formatting
- 6.2.15. Converting a Disk from FAT to NTFS
- 6.2.16. Using Disk Maintenance Tools
- 6.2.17. Examining System Startup Environment
- 6.2.18. Configuring Virtual Memory
- 6.2.19. Changing the System Startup Settings
- 6.2.20. Using Event Viewer
- 6.2.21. Using Task Manager
- 6.2.22. Using Device Manager
- 6.2.23. Accessing Advanced Boot Options
- 6.2.24. Enabling Automatic Updates
- 6.2.25. Connecting the Printer to a Local Port
- 6.2.26. Configuring and Verifying TCP/IP Properties
- 6.2.27. Testing Network Connectivity
- 6.2.28. Configuring Share Permissions
- 6.2.29. Enabling and Configuring Windows Firewall
- 6.2.30. Viewing Access Permissions
- 6.2.31. Configuring Auditing and Logging
- 6.2.32. Viewing the Local Security Policy
- 6.3. Highlighters Index
- 6.4. Practice Questions for the A+ Exams
-
III. Network+
- 7. Overview of the Network+ Exam
-
8. Network+ Exam Study Guide
-
8.1. Media and Topologies
- 8.1.1. Overview of Networks
- 8.1.2. Physical Network Topologies
- 8.1.3. Networking Standards
- 8.1.4. Types of Cables
- 8.1.5. Networking and Cable Standards
- 8.1.6. Media Connectors
-
8.1.7. Network Devices
- 8.1.7.1. Hubs
- 8.1.7.2. Switches
- 8.1.7.3. Media Access Unit (MAU)
- 8.1.7.4. Bridges
- 8.1.7.5. Routers
- 8.1.7.6. Gateways
- 8.1.7.7. Channel Service Unit (CSU)/Data Service Unit (DSU)
- 8.1.7.8. Network Interface Card (NIC)
- 8.1.7.9. ISDN adapters
- 8.1.7.10. Wireless Access Point (WAP)
- 8.1.7.11. Modems
- 8.1.7.12. Transceivers and media converters
- 8.1.7.13. Firewalls
- 8.1.8. Wireless Technologies
-
8.2. Protocols and Standards
- 8.2.1. Media Access Control (MAC) Address
- 8.2.2. The OSI Networking Model
- 8.2.3. Network Protocols
-
8.2.4. IP Addressing
- 8.2.4.1. IPv4 addresses
- 8.2.4.2. Public and private IP addresses
- 8.2.4.3. Subnetting
- 8.2.4.4. IPv6 addresses
- 8.2.4.5. Address assignment
- 8.2.4.6. Automatic Private IP Addressing (APIPA)
- 8.2.4.7. TCP/IP protocols
- 8.2.4.8. Port assignments in TCP/IP
-
8.2.4.9. Network services
- 8.2.4.9.1. Domain Name Service (DNS)
- 8.2.4.9.2. Windows Internet Name Service (WINS)
- 8.2.4.9.3. Network Address Translation (NAT)
- 8.2.4.9.4. Internet Connection Sharing (ICS)
- 8.2.4.9.5. Simple Network Management Protocol (SNMP)
- 8.2.4.9.6. Network File System (NFS)
- 8.2.4.9.7. Zero Configuration (ZeroConf)
- 8.2.4.9.8. Server Message Block (SMB)
- 8.2.4.9.9. Apple File Protocol (AFP)
- 8.2.4.9.10. Line Printer Daemon (LPD)
- 8.2.4.9.11. Samba
- 8.2.5. WAN Technologies
- 8.2.6. Internet Access Technologies
- 8.2.7. Remote Access Protocols and Services
- 8.2.8. Security Protocols
- 8.2.9. Authentication Protocols
-
8.3. Network Implementation
- 8.3.1. Network Operating Systems (NOS)
- 8.3.2. Network Wiring Tools
- 8.3.3. Components of Network Security
- 8.3.4. Implementing Network Security
- 8.3.5. Fault Tolerance and Disaster Recovery
-
8.4. Network Support
- 8.4.1. Troubleshooting Utilities
- 8.4.2. Visual Indicators
- 8.4.3. Troubleshooting Remote Connectivity
-
8.4.4. Troubleshooting Network Connectivity Problems
- 8.4.4.1. Troubleshooting network services
- 8.4.4.2. Troubleshooting physical topologies
- 8.4.4.3. Troubleshooting network infrastructure
-
8.4.4.4. Troubleshooting strategy
- 8.4.4.4.1. Identify the symptoms and potential causes
- 8.4.4.4.2. Identify the affected area
- 8.4.4.4.3. Establish what has changed
- 8.4.4.4.4. Select the most probable cause
- 8.4.4.4.5. Implement an action plan and solution including potential effects
- 8.4.4.4.6. Test the results
- 8.4.4.4.7. Identify the results and effects of the solution
- 8.4.4.4.8. Document the solution and process
-
8.1. Media and Topologies
-
9. Network+ Exam Prep and Practice
- 9.1. Preparing for the Network+ Exam
-
9.2. Network+ Exam Suggested Exercises
- 9.2.1. Network Topologies
- 9.2.2. Network Media
- 9.2.3. Wireless Network
- 9.2.4. Cable Types
- 9.2.5. Media Devices
- 9.2.6. MAC Address
- 9.2.7. Networking Protocols
- 9.2.8. IP Addressing
- 9.2.9. TCP/IP Services
- 9.2.10. WAN and Internet Technologies
- 9.2.11. Remote Access Protocols and Services
- 9.2.12. Network Operating Systems
- 9.2.13. Interoperability of Network Operating Systems
- 9.2.14. Network Wiring Tools
- 9.2.15. Network Security
- 9.2.16. Fault Tolerance
- 9.2.17. Disaster Recovery
- 9.2.18. Troubleshooting Utilities
- 9.2.19. Troubleshooting Network Connectivity
- 9.2.20. Troubleshooting Network Devices
- 9.2.21. Using the arp Command
- 9.2.22. Using the netstat Command
- 9.3. Network+ Exam Highlighters Index
- 9.4. Network+ Exam Practice Questions
-
IV. Security+
- 10. Overview of Security+ Exam
-
11. Security+ Exam Study Guide
-
11.1. General Security Concepts
- 11.1.1. Access Control Models
- 11.1.2. Authentication Methods
- 11.1.3. Auditing and Logging
- 11.1.4. System Scanning
-
11.1.5. Types of Attacks
- 11.1.5.1. Denial of Service (DoS)
- 11.1.5.2. Distributed Denial of Service (DDoS)
- 11.1.5.3. SYN flood
- 11.1.5.4. IP spoofing
- 11.1.5.5. Man-in-the-Middle Attacks (MITM)
- 11.1.5.6. Replay attacks
- 11.1.5.7. TCP/IP hijacking
- 11.1.5.8. Weak keys
- 11.1.5.9. Password attacks
- 11.1.5.10. Buffer overflow
- 11.1.5.11. Software exploitation
- 11.1.5.12. Back door
- 11.1.6. Types of Malicious Codes
- 11.1.7. Risks Involved in Social Engineering
- 11.1.8. Identifying and Disabling Nonessential Services and Protocols
-
11.2. Communication Security
-
11.2.1. Remote Access
- 11.2.1.1. 802.1x
- 11.2.1.2. Virtual Private Networking
- 11.2.1.3. Remote Authentication Dial-in User Service (RADIUS)
- 11.2.1.4. Terminal Access Controller Access Control System (TACACS)
- 11.2.1.5. TACACS+
- 11.2.1.6. Point-to-Point Tunneling Protocol (PPTP)
- 11.2.1.7. Layer 2 Tunneling Protocol (L2TP)
- 11.2.1.8. Internet Protocol Security (IPSec)
- 11.2.1.9. Secure Shell (SSH)
- 11.2.1.10. Vulnerabilities in Remote Access Services (RAS)
- 11.2.2. Email
-
11.2.3. Internet Security Concepts
- 11.2.3.1. Securing web servers
- 11.2.3.2. Securing web browsers
- 11.2.3.3. Secure Socket Layer/Transport Layer Security (SSL/TSL)
- 11.2.3.4. HTTP/HTTPS
- 11.2.3.5. Instant Messaging (IM)
-
11.2.3.6. Vulnerabilities in Internet services
- 11.2.3.6.1. Java Applets and JavaScript
- 11.2.3.6.2. ActiveX
- 11.2.3.6.3. Protecting the Internet client
- 11.2.3.6.4. Protecting the web server
- 11.2.3.6.5. Cookies
- 11.2.3.6.6. Buffer overflows
- 11.2.3.6.7. Signed applets
- 11.2.3.6.8. Problems with signed applets
- 11.2.3.6.9. Common Gateway Interface (CGI)
- 11.2.4. Directory Services Security
- 11.2.5. File Transfer Protocols (FTP)
-
11.2.6. Wireless Communications
- 11.2.6.1. Wireless local area networks
- 11.2.6.2. Wireless Application Protocol (WAP)
- 11.2.6.3. Wireless Transport Layer Security (WTLS)
- 11.2.6.4. IEEE 802.11
- 11.2.6.5. Wired Equivalent Privacy (WEP)
- 11.2.6.6. Authentication in wireless networks
- 11.2.6.7. Types of attacks on wireless networks
- 11.2.6.8. Protecting wireless networks from attacks
-
11.2.1. Remote Access
-
11.3. Infrastructure Security
- 11.3.1. Device-based Security
- 11.3.2. Media Security
- 11.3.3. Security Topologies
- 11.3.4. Intrusion Detection System (IDS)
- 11.3.5. Operating System Hardening
- 11.3.6. Network Hardening
- 11.3.7. Application Hardening
-
11.4. Basics of Cryptography
- 11.4.1. Encryption Algorithms
- 11.4.2. Concepts of Cryptography
- 11.4.3. Public Key Infrastructure (PKI)
-
11.5. Operational and Organizational Security
- 11.5.1. Physical Security
- 11.5.2. Disaster Recovery
-
11.5.3. Security Policies and Procedures
-
11.5.3.1.
- 11.5.3.1.1. Acceptable use policy
- 11.5.3.1.2. Due care policy
- 11.5.3.1.3. Privacy policy
- 11.5.3.1.4. Separation of duties policy
- 11.5.3.1.5. Need-to-know policy
- 11.5.3.1.6. Password management policy
- 11.5.3.1.7. Service Level Agreements (SLA)
- 11.5.3.1.8. Disposal and destruction policy
- 11.5.3.1.9. Human resources policies
- 11.5.3.1.10. Code of ethics
- 11.5.3.2. Incident response policy
-
11.5.3.1.
- 11.5.4. Privilege Management
- 11.5.5. Computer Forensics
- 11.5.6. Education and Training
- 11.5.7. Risk Identification
-
11.1. General Security Concepts
-
12. Security+ Exam Prep and Practice
- 12.1. Preparing for the Security+ Exam
-
12.2. Security+ Exam Suggested Exercises
- 12.2.1. Access Control
- 12.2.2. Authentication
- 12.2.3. Auditing and Logging
- 12.2.4. System Scanning
- 12.2.5. Disabling Non-Essential Services and Protocols
- 12.2.6. Social Engineering Attack
- 12.2.7. Remote Access and VPN
- 12.2.8. Email Security
- 12.2.9. Wireless Security
- 12.2.10. Web Server Security
- 12.2.11. Web Browser Security
- 12.2.12. Demilitarized Zones
- 12.2.13. System Hardening
- 12.2.14. Data Backup
- 12.2.15. Disaster Recover Plan
- 12.3. Security+ Exam Highlighters Index
- 12.4. Security+ Exam Practice Questions
- Index
- About the Author
- Colophon
- Copyright
Product information
- Title: A+, Network+, Security+ Exams in a Nutshell
- Author(s):
- Release date: March 2007
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596528249
You might also like
book
Infrastructure as Code, 2nd Edition
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other …
book
Cybersecurity – Attack and Defense Strategies - Second Edition
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats …
book
Threat Modeling: Designing for Security
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of …
book
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
The perfect introduction to pen testing for all IT professionals and students · Clearly explains key …