Areas that need attention.
1.1 Compare and contrast common operating system types and their purpose 1.3 Summarize general OS installation considerations and upgrade methods 1.5 Given a scenario, use Microsoft operating system features and tools. 1.6 Given a scenario, use Windows Control Panel utilities. 1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems. 2.1 Summarize the importance of physical security measures 2.2 Explain logical security concepts 2.3 Compare and contrast wireless security protocols and authentication methods 2.6 Compare and contrast differences of basic Windows OS security settings. 2.7 Given a scenario, implement security best practices to secure a workstation. 2.8 Given a scenario, implement methods for securing mobile devices. 3.1 Given a scenario, troubleshoot Windows OS issues 3.2 Given a scenario, troubleshoot and resolve PC security issues. 3.5 Given a scenario, troubleshoot mobile OS and application security issues. 4.1 Compare and contrast best practices associated to types of documentation 4.2 Given a scenario implement basic change management best practices 4.3 Given a scenario, implement basic disaster prevention and recovery methods 4.6 Explain processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts. 4.7 Given a scenario, use proper communication techniques and professionalism. 4.8 Identify the basics of scripting 4.9 Given a scenario, use remote access technologies
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (