CompTIA A+ (220-1202) Core 2


Course Description:
The CompTIA A+ Core 2 (220-1202) course is designed to prepare students for the second exam required to earn the CompTIA A+ certification, one of the most globally recognized entry-level IT certifications. This course focuses on the software, security, troubleshooting, and operational skills needed by modern IT support professionals.

While Core 1 (220-1201) focuses mainly on hardware and networking basics, Core 2 builds the real-world skills required to support users, secure systems, troubleshoot operating systems, and follow professional IT procedures in workplace environments.

This course follows CompTIA’s official Exam Objectives Version 3.0 (V15) to ensure students are fully aligned with the current exam blueprint.


Why This Course Is Needed

Modern IT support roles require more than just hardware knowledge. Organizations expect IT professionals to:

  • Secure systems against malware and cyber threats
  • Troubleshoot Windows, macOS, Linux, and mobile operating systems
  • Support end users professionally and efficiently
  • Follow operational, safety, documentation, and compliance procedures

The CompTIA A+ Core 2 course provides these essential skills, making it a critical step for anyone starting or growing a career in IT support.


What Students Will Learn

By completing this course, students will gain knowledge and hands-on understanding of:

  • Operating Systems
    • Windows 10 and Windows 11 configuration and management
    • macOS and Linux fundamentals
    • Command-line tools and system utilities
  • Security
    • Physical and logical security concepts
    • Malware types, removal techniques, and prevention
    • User account management, encryption, and authentication
    • Mobile device and wireless security
  • Software Troubleshooting
    • Diagnosing and resolving OS and application issues
    • Mobile device troubleshooting
    • Security-related software problems
  • Operational Procedures
    • Professional communication and customer support
    • Documentation, ticketing systems, and change management
    • Backup and recovery methods
    • Safety, compliance, licensing, and privacy concepts
    • Basic scripting, automation, and remote access tools
    • Introduction to AI concepts and responsible use

How This Course Helps Students

This course helps students:

  • Prepare confidently for the CompTIA A+ Core 2 (220-1202) exam
  • Build job-ready skills for roles such as:
    • IT Support Specialist
    • Help Desk Technician
    • Desktop Support Technician
    • Technical Support Analyst
  • Understand real-world IT environments, not just exam theory
  • Develop professional behavior and troubleshooting methodologies expected by employers

Who Should Take This Course

This course is ideal for:

  • Beginners entering the IT field
  • Students preparing for CompTIA A+ certification
  • Help desk and technical support professionals
  • Career changers looking for an entry point into IT

Recommended experience:
Approximately 12 months of hands-on experience in an IT support or help desk role (not mandatory but helpful).


Certification, Validity, and Renewal

  • Certification Earned: CompTIA A+ (after passing Core 1 and Core 2 exams)
  • Certification Validity: 3 years from the date of certification
  • Renewal Options:
    • Continuing Education Units (CEUs)
    • Passing a higher-level CompTIA certification
    • Completing CompTIA CertMaster CE

CompTIA A+ is part of CompTIA’s Continuing Education (CE) program, ensuring certified professionals stay current with evolving technologies.


Exam Information (Core 2 – 220-1202)

  • Number of Questions: Maximum 90
  • Question Types: Multiple-choice and performance-based
  • Exam Duration: 90 minutes
  • Passing Score: 700 (on a scale of 100–900)
  • Exam Weighting:
    • Operating Systems – 28%
    • Security – 28%
    • Software Troubleshooting – 23%
    • Operational Procedures – 21%

Summary

The CompTIA A+ 220-1202 Exam Objectives (3.0) course equips students with essential IT support, security, troubleshooting, and professional skills required in today’s technology-driven workplaces. It serves as a strong foundation for an IT career and is widely trusted by employers across the globe.



1.0 Operating Systems (28%)

1.1 Explain common operating system (OS) types and their purposes

1.2 Given a scenario, perform OS installations and upgrades in a diverse environment.

1.3 Compare and contrast basic features of Microsoft Windows editions.

  • Windows 10 editions
    −Home
    −Pro
    −Pro for Workstations
    −Enterprise
  • Windows 11 editions
    −Home
    −Pro
    −Enterprise
  • N versions
  • Feature differences
    −Domain vs. workgroup
    −Desktop styles/user interface
    −Availability of Remote
    Desktop Protocol (RDP)
    −Random-access memory
    (RAM) support limitations
    −BitLocker
    −gpedit.msc
  • Upgrade paths
    −In-place upgrade
    −Clean install
  • Hardware requirements
    −Trusted Platform Module (TPM)
    −Unified Extensible Firmware
    Interface (UEFI)

1.4 Given a scenario, use Microsoft Windows operating system features and tools.

  • Task Manager
    −Services
    −Startup
    −Performance
    −Processes
    −Users
  • Microsoft Management
    Console (MMC) snap-in
    −Event Viewer (eventvwr.msc)
    −Disk Management (diskmgmt.msc)
    −Task Scheduler (taskschd.msc)
    −Device Manager (devmgmt.msc)
    −Certificate Manager (certmgr.msc)
    −Local User and Groups
    (lusrmgr.msc)
    −Performance Monitor (perfmon.msc)
    −Group Policy Editor (gpedit.msc)
  • Additional tools
    −System Information (msinfo32. exe)
    −Resource Monitor (resmon.exe)
    −System Configuration
    (msconfig. exe)
    −Disk Cleanup (cleanmgr.exe)
    −Disk Defragment (dfrgui.exe)
    −Registry Editor (regedit.exe)

1.5 Given a scenario, use the appropriate Microsoft command-line tools.

  • Navigation
    −cd
    −dir
  • Network
    −ipconfig
    −ping
    −netstat
    −nslookup
    −net use
    −tracert
    −pathping
  • Disk management
    −chkdsk
    −format
    −diskpart
  • File management
    −md
    −rmdir
    −robocopy
  • Informational
    −hostname
    −net user
    −winver
    −whoami
    −[command name] /?
  • OS management
    −gpupdate
    −gpresult
    −sfc

1.6 Given a scenario, configure Microsoft Windows settings

  • Internet Options
  • Devices and Printers
  • Program and Features
  • Network and Sharing Center
  • System
  • Windows Defender Firewall
  • Mail
  • Sound
  • User Accounts
  • Device Manager
  • Indexing Options
  • Administrative Tools
  • File Explorer Options
    −View hidden files
    −Hide extensions
    −General options
    −View options
  • Power Options
    −Hibernate
    −Power plans
    −Sleep/suspend
    −Standby
    −Choose what closing the lid does
    −Turn on fast startup
    −USB selective suspend
  • Ease of Access
  • Time and Language
  • Update and Security
  • Personalization
  • Apps
  • Privacy
  • System
  • Devices
  • Network and Internet
  • Gaming
  • Accounts

1.7 Given a scenario, configure Microsoft Windows networking features on a client/desktop.

  • Domain joined vs. workgroup
    −Shared resources
    −Printers
    −File servers
    −Mapped drives
  • Local OS firewall settings
    −Application restrictions and exceptions
    −Configuration
  • Client network configuration
    −Internet Protocol (IP) addressing scheme
    −Domain Name System (DNS) settings
    −Subnet mask
    −Gateway
    −Static vs. dynamic
  • Establish network connections
    −Virtual private network (VPN)
    −Wireless
    −Wired
    −Wireless wide area network (WWAN)/cellular network
  • Proxy settings
  • Public network vs. private network
  • File Explorer navigation–network paths
  • Metered connections and limitations

1.8 Explain common features and tools of the macOS/desktop operating system.

  • Installation and uninstallation
  • of applications
  • −File types
  • գ .dmg
  • գ .pkg
  • գ .app
  • −App Store
  • −Uninstallation process
  • System folders
    −/Applications
    −/Users
    −/Library
    −/System
    −/Users/Library
  • Apple ID and corporate restrictions
  • Best practices
    −Backups
    −Antivirus
    −Updates/patches
    −Rapid Security Response (RSR)
  • System Preferences
    −Displays
    −Networks
    −Printers
    −Scanners
    −Privacy
    −Accessibility
    −Time Machine
  • Features
    −Multiple desktops
    −Mission Control
    −Keychain
    −Spotlight
    −iCloud
    գ iMessage
    գFaceTime
    գDrive
    −Gestures
    −Finder
    −Dock
    −Continuity
  • Disk Utility
  • FileVault
  • Terminal
  • Force Quit

1.9 Identify common features and tools of the Linux client/desktop operating system.

  • File management
    −ls
    −pwd
    −mv
    −cp
    −rm
    −chmod
    −chown
    −grep
    −find
  • Filesystem management
    −fsck
    −mount
  • Administrative
    −su
    −sudo
  • Package management
    −apt
    −dnf
  • Network
    −ip
    −ping
    −curl
    −dig
    −traceroute
  • Informational
    −man
    −cat
    −top
    −ps
    −du
    −df
  • Text editors
    −nano
  • Common configuration files
    −/etc/passwd
    −/etc/shadow
    −/etc/hosts
    −/etc/fstab
    −/etc/resolv.conf
  • OS components
    −systemd
    −kernel
    −bootloader
  • Root account

1.10 Given a scenario, install applications according to requirements.

  • System requirements
    for applications
    −32-bit vs. 64-bit dependent
    application requirements
    −Dedicated vs. integrated
    graphics card
    −Video random-access memory
    (VRAM) requirements
    −RAM requirements
    −Central processing unit
    (CPU) requirements
    −External hardware tokens
    −Storage requirements
    −Application to OS compatibility
  • Distribution methods
    −Physical media vs.
    mountable ISO file
    −Downloadable package
    −Image deployment
  • Impact considerations
    for new applications
    −Device
    −Network
    −Operation
    −Business

1.11 Given a scenario, install applications and cloud-based productivity tools

  • Email systems
  • Storage
    −Sync/folder settings
  • Collaboration tools
    −Spreadsheets
    −Videoconferencing
    −Presentation tools
    −Word processing tools
    −Instant messaging
  • Identity synchronization
  • Licensing assignment

2.0 Security (28%)

2.1 Summarize physical and logical security measures

  • Physical security
    −Bollards
    −Access control vestibule
    −Badge reader
    −Video surveillance
    −Alarm systems
    −Motion sensors
    −Door locks
    −Equipment locks
    −Security guards
    −Fences
  • Physical access security
    −Key fobs
    −Smart cards
    −Mobile digital key
    −Keys
    −Biometrics
    գRetina scanner
    գFingerprint scanner
    գPalm print scanner
    գFacial recognition
    technology (FRT)
    գVoice recognition technology
    −Lighting
    −Magnetometers
  • Logical security
    −Principle of least privilege
    −Zero Trust model
    −Access control lists (ACLs)
    −Multifactor authentication (MFA)
    գEmail
    գHardware token
    գ Authenticator application
    գ Short Message Service (SMS)
    գVoice call
    գTime-based one-time
    password (TOTP)
    գOne-time password/
    passcode (OTP)
    −Security Assertions Markup
    Language (SAML)
    −Single sign-on (SSO)
    −Just-in-time access
    գPrivileged access
    management (PAM)
    −Mobile device management (MDM)
    −Data loss prevention (DLP)
    −Identity access management (IAM)
    −Directory services

2.2 Given a scenario, configure and apply basic Microsoft Windows OS security settings.

  • Defender Antivirus
    −Activate/deactivate
    −Update definitions
  • Firewall
    −Activate/deactivate
    −Port security
    −Application security
  • User and groups
    −Local vs. Microsoft account
    −Standard account
    −Administrator
    −Guest user
    −Power user
  • Log-in OS options
    −Username and password
    −Personal identification number (PIN)
    −Fingerprint
    −Facial recognition
    −SSO
    −Passwordless/Windows Hello
  • NTFS vs. share permissions
    −File and folder attributes
    −Inheritance
  • Run as administrator
    vs. standard user
  • User Account Control (UAC)
  • BitLocker
  • BitLocker-To-Go
  • Encrypting File System (EFS)
  • Active Directory
    −Joining domain
    −Assigning log-in script
    −Moving objects within
    organizational units
    −Assigning home folders
    −Applying Group Policy
    −Selecting security groups
    −Configuring folder redirection

2.3 Compare and contrast wireless security protocols and authentication methods.

  • Protocols and encryption
    −Wi-Fi Protected Access 2 (WPA2)
    −WPA3
    −Temporal Key Integrity
    Protocol (TKIP)
    −Advanced Encryption
    Standard (AES)
  • Authentication
    −Remote Authentication Dial
    in User Service (RADIUS)
    −Terminal Access Controller Access
    control System (TACACS+)
    −Kerberos
    −Multifactor

2.4 Summarize types of malware and tools/methods for detection, removal, and prevention.

  • Malware
    −Trojan
    −Rootkit
    −Virus
    −Spyware
    −Ransomware
    −Keylogger
    −Boot sector virus
    −Cryptominer
    −Stalkerware
    −Fileless
  • Adware
    −Potentially unwanted program (PUP)
  • Tools and methods
    −Recovery console
    −Endpoint detection and
    response (EDR)
    −Managed detection and
    response (MDR)
    −Extended detection and
    response (XDR)
    −Antivirus
    −Anti-malware
    −Email security gateway
    −Software firewalls
    −User education regarding
    common threats
    գAntiphishing training
    −OS reinstallation

2.5 Compare and contrast social engineering attacks, threats, and vulnerabilities

  • Social engineering
    −Phishing
    գVishing
    գSmishing
    գ QR code phishing
    գ Spear phishing
    գ Whaling
    −Shoulder surfing
    −Tailgating
    −Impersonation
    −Dumpster diving
  • Threats
    −Denial of service (DoS)
    −Distributed denial of service (DDoS)
    −Evil twin
    −Zero-day attack
    −Spoofing
    −On-path attack
    −Brute-force attack
    −Dictionary attack
    −Insider threat
    −Structured Query Language
    (SQL) injection
    −Cross-site scripting (XSS)
    −Business email compromise (BEC)
    −Supply chain/pipeline attack
  • Vulnerabilities
    −Non-compliant systems
    −Unpatched systems
    −Unprotected systems (missing
    antivirus/missing firewall)
    −EOL
    −Bring your own device (BYOD)

2.6 Given a scenario, implement procedures for basic small office/home office (SOHO) malware
removal.

  1. Investigate and verify
    malware symptoms.
  2. Quarantine infected system.
  3. Disable System Restore in Windows
    Home.
  4. Remediate infected systems.
  5. Update anti-malware software.
  6. Scan and removal techniques
    (e.g., safe mode, preinstallation
    environment)
  7. Reimage/reinstall.
  8. Schedule scans and run updates.
  9. Enable System Restore and create
    a restore point in Windows Home.
  10. Educate the end user.

2.7 Given a scenario, apply workstation security options and hardening techniques.

  • Data-at-rest encryption
  • Password considerations
    −Length
    −Character types
    −Uniqueness
    −Complexity
    −Expiration
  • Basic input/output system (BIOS)/
    Unified Extensible Firmware
    Interface (UEFI) passwords
  • End-user best practices
    −Use screensaver locks
    −Log off when not in use
    −Secure/protect critical
    hardware (e.g., laptops)
    −Secure personally identifiable
    information (PII) and passwords
    −Use password managers
  • Account management
    −Restrict user permissions
    −Restrict log-in times
    −Disable guest account
    −Use failed attempts lockout
    −Use timeout/screen lock
    −Apply account expiration dates
  • Change default administrator’s
    user account/password
  • Disable AutoRun
  • Disable unused services

2.8 Given a scenario, apply common methods for securing mobile devices.

  • Hardening techniques
    −Device encryption
    −Screen locks
    գ Facial recognition
    գPIN codes
    գ Fingerprint
    գ Pattern
    գ Swipe
    −Configuration profiles
  • Patch management
    −OS updates
    −Application updates
  • Endpoint security software
    −Antivirus
    −Anti-malware
    −Content filtering
  • Locator applications
  • Remote wipes
  • Remote backup applications
  • Failed log-in attempts restrictions
  • Policies and procedures
    −MDM
    −BYOD vs. corporate-owned devices
    −Profile security requirements

2.9 Compare and contrast data destruction and disposal methods

  • Physical destruction of hard drives
    −Drilling
    −Shredding
    −Degaussing
    −Incineration
  • Recycling or repurposing
    best practices
    −Erasing/wiping
    −Low-level formatting
    −Standard formatting
  • Outsourcing concepts
    −Third-party vendor
    −Certification of destruction/recycling
  • Regulatory and environmental
    requirements

2.10Given a scenario, apply security settings on SOHO wireless and wired networks.

  • Router settings
    − Change default passwords
    − IP filtering
    − Firmware updates
    − Content filtering
    − Physical placement/secure locations
    − Universal Plug and Play (UPnP)
    − Screened subnet
    − Configure secure
    management access
  • Wireless specific
    − Changing the service
    set identifier (SSID)
    − Disabling SSID broadcast
    − Encryption settings
    − Configuring guest access
  • Firewall settings
    − Disabling unused ports
    − Port forwarding/mapping

2.11 Given a scenario, configure relevant security settings in a browser.

  • Browser download/installation
    − Trusted sources
    գ Hashing
    − Untrusted sources
  • Browser patching
  • Extensions and plug-ins
    − Trusted sources
    − Untrusted sources
    CompTIA A+ Core 2 (220-1202) V15 Certification Exam
    Exam Objectives Document Version 3.0
    Copyright © 2024 CompTIA, Inc. All rights reserved.
  • Password managers
  • Secure connections/
    sites–valid certificates
  • Settings
    − Pop-up blocker
    − Clearing browsing data
    − Clearing cache
    − Private-browsing mode
    − Sign-in/browser data
    synchronization
    − Ad blockers
    − Proxy
    − Secure DNS
  • Browser feature management
    − Enable/disable
    գ Plug-ins
    գ Extensions
    գ Features

3.0 Software Troubleshooting (23%)

3.1 Given a scenario, troubleshoot common Windows OS issues.

  • Blue screen of death (BSOD)
  • Degraded performance
  • Boot issues
  • Frequent shutdowns
  • Services not starting
  • Applications crashing
  • Low memory warnings
  • USB controller resource warnings
  • System instability
  • No OS found
  • Slow profile load
  • Time drift

3.2 Given a scenario, troubleshoot mobile OS and application security issues

  • Application fails to launch
  • Application fails to close/crashes
  • Application fails to update
  • Application fails to install
  • Slow to respond
  • OS fails to update
  • Battery life issues
  • Random reboots
  • Connectivity issues
    −Bluetooth
    −Wi-Fi
    −Near-field communication (NFC)
  • Screen does not autorotate

3.3 Given a scenario, troubleshoot common mobile OS and application security issues.

  • Security concerns
    −Application source/unofficial
    application stores
    −Developer mode
    −Root access/jailbreak
    −Unauthorized/malicious application
    գ Application spoofing
  • Common symptoms
    −High network traffic
    −Degraded response time
    −Data-usage limit notification
    −Limited internet connectivity
    −No internet connectivity
    −High number of ads
    −Fake security warnings
    −Unexpected application behavior
    −Leaked personal files/data

3.4 Given a scenario, troubleshoot common personal computer (PC) security issues.

  • Common symptoms
    −Unable to access the network
    −Desktop alerts
    −False alerts regarding
    antivirus protection
    −Altered system or personal files
    գ Missing/renamed files
    գ Inability to access files
    −Unwanted notifications
    within the OS
    −OS updates failures
  • Browser-related symptoms
    −Random/frequent pop-ups
    −Certificate warnings
    −Redirection
    −Degraded browser performance

4.0 Operational Procedures (21%)

4.1 Given a scenario, implement best practices associated with documentation and support
systems information management.

  • Ticketing systems
    −User information
    −Device information
    −Description of issues
    −Categories
    −Severity
    −Escalation levels
    −Clear, concise written
    communication
    գ Issue description
    գProgress notes
    գ Issue resolution
  • Asset management
    −Inventory lists
    −Configuration management
    database (CMDB)
    −Asset tags and IDs
    −Procurement life cycle
    −Warranty and licensing
    −Assigned users
  • Types of documents
    −Incident reports
    −Standard operating
    procedures (SOPs)
    գ Software package custom
    installation procedure
    −New user/onboarding
    setup checklist
    −User off-boarding checklist
    −Service-level agreements (SLAs)
    գ Internal
    գExternal/third-party
    −Knowledge base/articles

4.2 Given a scenario, apply change management procedures.

  • Documented business processes
    −Rollback plan
    −Backup plan
    −Sandbox testing
    −Responsible staff members
  • Change management
    −Request forms
    −Purpose of the change
    −Scope of the change
    −Change type
    գStandard change
    գNormal change
    գEmergency change
    −Date and time of change
    գChange freeze
    գMaintenance windows
    −Affected systems/impact
    −Risk analysis
    գRisk level
    −Change board approvals
    −Implementation
    −Peer review
    −End-user acceptance

4.3 Given a scenario, implement workstation backup and recovery methods.

  • Backup
    −Full
    −Incremental
    −Differential
    −Synthetic full
  • Recovery
    −In-place/overwrite
    −Alternative location
  • Backup testing
    −Frequency
  • Backup rotation schemes
    −Onsite vs. offsite
    −Grandfather-father-son (GFS)
    −3-2-1 backup rule

4.4 Given a scenario, use proper safety procedures

  • Electrostatic discharge (ESD) straps
  • ESD mats
  • Electrical safety
    − Equipment grounding
  • Proper component
    handling and storage
  • Cable management
  • Antistatic bags
  • Compliance with
    government regulations
  • Personal safety
    − Disconnect power
    before repairing PC
    − Lifting techniques
    − Fire safety
    − Safety goggles
    − Air filter mask

4.5 Summarize environmental impacts and local environment controls.

  • Material safety data sheet (MSDS)
    documentation for handling and disposal
    − Proper battery disposal
    − Proper toner disposal
    − Proper disposal of other devices and assets
  • Temperature, humidity-level awareness,
    and proper ventilation
    − Location/equipment placement
    − Dust cleanup
    − Compressed air/vacuums
  • Power surges, brownouts, and blackouts
    − Uninterruptible power supply (UPS)
    − Surge suppressor

4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.

  • Incident response
    − Chain of custody
    − Informing management/law enforcement as necessary
    − Copy of drive (data integrity and preservation)
    − Incident documentation
    − Order of volatility
  • Licensing/digital rights management (DRM)/
    end-user license agreement (EULA)
    − Valid licenses
    − Perpetual license agreement
    − Personal-use license vs. corporate-use license
    − Open-source license
    CompTIA A+ Core 2 (220-1202) V15 Certification Exam
    Exam Objectives Document Version 3.0
    Copyright © 2024 CompTIA, Inc. All rights reserved.
  • Non-disclosure agreement (NDA)/mutual
    non-disclosure agreement (MNDA)
  • Regulated data
    − Credit card payment information
    − Personal government-issued information
    − PII
    − Healthcare data
    − Data retention requirements
  • Acceptable use policy (AUP)
  • Regulatory and business compliance requirements
    − Splash screens

4.7 Given a scenario, use proper communication techniques and professionalism.

  • Present a professional appearance
    and wear appropriate attire.
    −Match the required attire of
    the given environment.
    գ Formal
    գ Business casual
  • Use proper language and
    avoid jargon, acronyms, and
    slang, when applicable.
  • Maintain a positive attitude/
    project confidence.
  • Actively listen and avoid
    interrupting the customer.
  • Be culturally sensitive.
    −Use appropriate professional titles
    and designations, when applicable.
  • Be on time (if late, contact
    the customer).
  • Avoid distractions.
    −Personal calls
    −Texting/social media sites
    −Personal interruptions
  • Appropriately deal with difficult
    customers or situations.
    −Do not argue with customer
    and/or be defensive.
    −Avoid dismissing customer issues.
    −Avoid being judgmental.
    −Clarify customer statements (i.e.,
    ask open-ended questions to
    narrow the scope of the issue,
    restate the issue, or question
    to verify understanding).
    −Use discretion and
    professionalism when discussing
    experiences/encounters.
  • Set and meet expectations/
    timeline and communicate
    status with the customer.
    −Offer repair/replacement
    options, as needed.
    −Provide proper documentation
    on the services provided.
    −Follow up with customer/user at a
    later date to verify satisfaction.
  • Appropriately handle customers’
    confidential and private materials.
    −Located on a computer,
    desktop, printer, etc

4.8 Explain the basics of scripting.

  • Script file types
    −.bat
    −.ps1
    −.vbs
    −.sh
    −.js
    −.py
  • Use cases for scripting
    −Basic automation
    −Restarting machines
    −Remapping network drives
    −Installation of applications
    −Automated backups
    −Gathering of information/data
    −Initiating updates
  • Other considerations
    when using scripts
    −Unintentionally introducing malware
    −Inadvertently changing
    system settings
    −Browser or system crashes due
    to mishandling of resources

4.9 Given a scenario, use remote access technologies.

  • Methods/tools
    −RDP
    −VPN
    −Virtual network computer (VNC)
    −Secure Shell (SSH)
    −Remote monitoring and
    management (RMM)
    −Simple Protocol for Independent
    Computing Environments (SPICE)
    −Windows Remote
    Management (WinRM)
    −Third-party tools
    գ Screen-sharing software
    գVideoconferencing software
    գ File transfer software
    գ Desktop management software
  • Security considerations of
    each access method

4.10 Explain basic concepts related to artificial intelligence (AI).

  • Application integration
  • Policy
    −Appropriate use
    −Plagiarism
  • Limitations
    −Bias
    −Hallucinations
    −Accuracy
  • Private vs. public
    −Data security
    −Data source
    −Data privacy
Buy Me a Coffee