SKILL BENCHMARK
CompTIA A+ Core 2 Proficiency Benchmark (Advanced Level)
- 27m
- 27 questions
The CompTIA A+ Core 2 Proficiency Benchmark (Advanced Level) benchmark measures your ability to identify, explain, and solution-design core mobile and desktop computing technologies and participate in conversations about said technologies. Learners who score high on this benchmark demonstrate that they have an advanced understanding and awareness of computing and are generally considered subject matter experts on the topic.
Topics covered
- describe common internet browsing security features and techniques including pop-up blockers, clearing browsing data, clearing cache, private-browsing mode, sign-in/browser data synchronization, and ad blockers
- detail wireless security considerations including changing the service set identifier (SSID), disabling SSID broadcast, encryption settings, disabling guest access, and changing channels
- differentiate between full, incremental, differential, and synthetic backups
- differentiate between Master Boot Record (MBR) and GUID Partition Table (GPT) disks
- differentiate between on-site and off-site backup rotation schemes
- differentiate between phishing and vishing social engineering attacks
- discuss how the NTFS, FAT32, exFAT, ext3 and ext4, and APFS file systems work
- identify common physical security devices such as key fobs, smart cards, keys, biometrics, lighting, and magnetometers
- list common backup frequency timelines
- list common home router security settings to configure on small office/home office (SOHO) wireless and wired networks
- list security concerns when working with Android mobiles
- list security login options such as usernames and passwords, personal identification number (pin), fingerprint, facial recognition and single sign-on (SSO)
- outline common network traffic issues including high network traffic and sluggish response times
- outline common personal safety measures including disconnecting power before repairing PC, lifting techniques, electrical fire safety, safety goggles, and using air filtration masks
- outline how to gain root access on a mobile device
- outline what computer viruses are and how they are designed to spread
- outline what trojan malware is and how it can mislead users regarding its true intent
- recall how IPv4 and IPv6 addressing works
- recall various methods that can be used to install operating systems
- recognize compliance and government regulations
- recognize how DHCP and DNS are used to provide IP network connectivity
- recognize how to confirm whether or not a website is secure and provide an overview of certificates
- recognize how to identify malicious applications on a mobile device and outline application spoofing
- recognize how to implement traditional physical security measures including video surveillance, alarm systems, and motion sensors
- recognize material safety data sheet (MSDS) handling and disposal recommendations, including proper battery disposal, proper toner disposal, and proper disposal of other devices and assets
- recognize the benefits of mobile device encryption features
- recognize when to use the 3-2-1 backup rule