JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
Gallery
Comptia A+ 1002:
Comptia A+ 1002
1.1 Compare and contrast common operating system types and their purpose
1.3 Summarize general OS installation and upgrade methods
1.5 Given a scenario, use microsoft operating systems features and tools
1.6 Given a scenario, use Windows Control Panel utilities
1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
2.1 Summarize the importance of physical security measures
2.3 Compare and Contrast Wireless Security Protocols and Authentication methods
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings.
2.7 Given a scenario, implement security best practices to secure a workstation.
2.8 Given a scenario, implement methods for securing mobile devices.
Jason Dion's Practice Tests
3.1 Given a scenario, troubleshoot Microsoft Windows OS Problems
3.2 Given a scenario, troubleshoot and resolve PC security issues
3.5 Given a scenario, troubleshoot mobile OS and application security issues
4.1 Compare and Contrast best practices associated with types of documentations
4.2 Given a scenario, implement basic change management best practices
4.3 Given a scenario, implement basic disaster prevention and recovery methods
4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
4.8 Identify the basics of scripting
4.9 Given a scenario, use remote access technologies
More
Share
Explore
Comptia A+ 1002
Areas that need attention.
1.1 Compare and contrast common operating system types and their purpose
1.3 Summarize general OS installation considerations and upgrade methods
1.5 Given a scenario, use Microsoft operating system features and tools.
1.6 Given a scenario, use Windows Control Panel utilities.
1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
2.1 Summarize the importance of physical security measures
2.2 Explain logical security concepts
2.3 Compare and contrast wireless security protocols and authentication methods
2.6 Compare and contrast differences of basic Windows OS security settings.
2.7 Given a scenario, implement security best practices to secure a workstation.
2.8 Given a scenario, implement methods for securing mobile devices.
3.1 Given a scenario, troubleshoot Windows OS issues
3.2 Given a scenario, troubleshoot and resolve PC security issues.
3.5 Given a scenario, troubleshoot mobile OS and application security issues.
4.1 Compare and contrast best practices associated to types of documentation
4.2 Given a scenario implement basic change management best practices
4.3 Given a scenario, implement basic disaster prevention and recovery methods
4.6 Explain processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts.
4.7 Given a scenario, use proper communication techniques and professionalism.
4.8 Identify the basics of scripting
4.9 Given a scenario, use remote access technologies
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.