You are on page 1of 67

Mike Meyers' Comptia A+ Core 2

Certification Passport (Exam 220-1102)


Mike Meyers
Visit to download the full and correct content document:
https://ebookmass.com/product/mike-meyers-comptia-a-core-2-certification-passport-
exam-220-1102-mike-meyers-2/
About the Series Editor

Michael Meyers is the industry’s leading authority on CompTIA A+


and CompTIA Network+ certifications. He is the president and co-founder
of Total Seminars, LLC, a major provider of computer and network repair
curriculum and seminars for thousands of organizations throughout the
world, and a member of CompTIA.
Mike has written numerous popular textbooks, including the best-
selling Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting
PCs, Mike Meyers’ CompTIA Network+ Guide to Managing and
Troubleshooting Networks, and Mike Meyers’ CompTIA Security+
Certification Guide.

About the Author


Ron Gilster is a well-known best-selling author with over 40 published
books on IT career certification, technology, business, and finance. Ron’s
career has spanned over multiple decades, ranging from punched-card
equipment to senior executive and author. His books have covered
CompTIA’s A+, Network+, Server+, Security+, and Cloud+ as well as
Cisco CCNA, CCDA, and several others. He has also been an educator,
teaching IT, IS, networking, and cybersecurity at the high school,
baccalaureate, and graduate levels. Ron has always admired Mike and his
books and videos and is honored to be working directly with Mike on this
project.

About the Technical Editor


Chris Crayton is a technical consultant, trainer, author, and industry-
leading technical editor. He has worked as a computer technology and
networking instructor, information security director, network administrator,
network engineer, and PC specialist. Chris has authored several print and
online books on PC repair, CompTIA A+, CompTIA Security+, and
Microsoft Windows. He has also served as technical editor and content
contributor on numerous technical titles for several of the leading
publishing companies. He holds numerous industry certifications, has
been recognized with many professional and teaching awards, and has
served as a state-level SkillsUSA final competition judge.
Copyright © 2023 by McGraw Hill. All rights reserved. Except as
permitted under the United States Copyright Act of 1976, no part of this
publication may be reproduced or distributed in any form or by any
means, or stored in a database or retrieval system, without the prior
written permission of the publisher, with the exception that the program
listings may be entered, stored, and executed in a computer system, but
they may not be reproduced for publication.

ISBN: 978-1-26-461357-1
MHID: 1-26-461357-1

The material in this eBook also appears in the print version of this title:
ISBN: 978-1-26-461214-7, MHID: 1-26-461214-1.

eBook conversion by codeMantra


Version 1.0

All trademarks are trademarks of their respective owners. Rather than


put a trademark symbol after every occurrence of a trademarked name,
we use names in an editorial fashion only, and to the benefit of the
trademark owner, with no intention of infringement of the trademark.
Where such designations appear in this book, they have been printed with
initial caps.

McGraw Hill eBooks are available at special quantity discounts to use as


premiums and sales promotions or for use in corporate training programs.
To contact a representative, please visit the Contact Us page at
www.mhprofessional.com.

TERMS OF USE

This is a copyrighted work and McGraw-Hill Education and its licensors


reserve all rights in and to the work. Use of this work is subject to these
terms. Except as permitted under the Copyright Act of 1976 and the right
to store and retrieve one copy of the work, you may not decompile,
disassemble, reverse engineer, reproduce, modify, create derivative works
based upon, transmit, distribute, disseminate, sell, publish or sublicense
the work or any part of it without McGraw-Hill Education’s prior consent.
You may use the work for your own noncommercial and personal use; any
other use of the work is strictly prohibited. Your right to use the work may
be terminated if you fail to comply with these terms.

THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND ITS


LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE
ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE
OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION
THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR
OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-
Hill Education and its licensors do not warrant or guarantee that the
functions contained in the work will meet your requirements or that its
operation will be uninterrupted or error free. Neither McGraw-Hill
Education nor its licensors shall be liable to you or anyone else for any
inaccuracy, error or omission, regardless of cause, in the work or for any
damages resulting therefrom. McGraw-Hill Education has no responsibility
for the content of any information accessed through the work. Under no
circumstances shall McGraw-Hill Education and/or its licensors be liable for
any indirect, incidental, special, punitive, consequential or similar
damages that result from the use of or inability to use the work, even if
any of them has been advised of the possibility of such damages. This
limitation of liability shall apply to any claim or cause whatsoever whether
such claim or cause arises in contract, tort or otherwise.
Contents at a Glance

1.0 Operating Systems


2.0 Security
3.0 Software Troubleshooting
4.0 Operational Procedures
A About the Online Content
Index
Contents

Acknowledgments
Introduction
1.0 Operating Systems
Objective 1.1 Identify basic features of Microsoft
Windows editions
64-Bit vs. 32-Bit
Windows 10 Editions
Home Edition
Work Edition
Windows 10 Pro for Workstations and
Enterprise Editions
Domains and Workgroups
Joining a Computer to a Domain
Desktop Styles/User Interface
Desktop Views
Remote Desktop Protocol
RAM Support Limitations
BitLocker
BitLocker Requirements
Enabling BitLocker
The Group Policy Editor
Accessing the Group Policy Editor
Upgrade Paths and In-Place Upgrades
REVIEW
1.1 QUESTIONS
1.1 ANSWERS
Objective 1.2 Given a scenario, use the appropriate
Microsoft command-line tool
Windows Navigation Commands
Drive Navigation in Windows
Command-Line Tools
REVIEW
1.2 QUESTIONS
1.2 ANSWERS
Objective 1.3 Given a scenario, use features and tools of
the Microsoft Windows 10 operating system (OS)
Task Manager
General Display
Task Manager Tabs
Microsoft Management Console Snap-In
Opening the MMC
Adding/Removing a Snap-in with the MMC
Snap-ins on the Core 2 Exam
Additional Windows Tools
System Information
Resource Monitor
System Configuration
Disk Cleanup
Disk Defragment
Registry Editor
REVIEW
1.3 QUESTIONS
1.3 ANSWERS
Objective 1.4 Given a scenario, use the appropriate
Microsoft Windows 10 Control Panel utility
Internet Options
Devices and Printers
Programs and Features
Network and Sharing Center
System
Settings Options
Windows Defender Firewall
Mail (Microsoft Outlook)
Sound
User Accounts
Device Manager
Indexing Options
Administrative Tools
File Explorer Options
Show Hidden Files
Hide Extensions
General Options
View Options
Power Options
Sleep (Suspend), Standby, and Hibernate
Power Plans
Fast Startup
USB Selective Suspend
Ease of Access
REVIEW
1.4 QUESTIONS
1.4 ANSWERS
Objective 1.5 Given a scenario, use the appropriate
Windows settings
Time & Language
Update & Security
Windows Update
Delivery Optimization
Windows Security
Personalization
Apps
Privacy
Windows Permissions
Application Permissions
System
Devices
Network & Internet
Gaming
Accounts
REVIEW
1.5 QUESTIONS
1.5 ANSWERS
Objective 1.6 Given a scenario, configure Microsoft
Windows networking features on a client/desktop
Workgroup vs. Domain Setup
Shared Resources
Printers
File Servers
Mapped Devices
Local OS Firewall Settings
Application Restrictions and Exceptions
Client Network Configuration
Internet Protocol Addressing Schemes
Domain Name System
Static vs. Dynamic
Establish Network Connections
VPN
Wireless
Wired
Wireless Wide Area Network
Proxy Settings
Public Network vs. Private Network
File Explorer Navigation
File Explorer Navigation
File Explorer—Network Paths
Metered Connections and Limitations
REVIEW
1.6 QUESTIONS
1.6 ANSWERS
Objective 1.7 Given a scenario, apply application
installation and configuration concepts
System Requirements for Applications
32-bit vs. 64-bit Dependent Application
Requirements
Dedicated vs. Integrated Graphics Card
Video Random Access Memory
Requirements
RAM Requirements
Central Processing Unit Requirements
External Hardware Tokens
Storage Requirements
OS Requirements for Applications
Application-to-OS Compatibility
32-bit vs. 64-bit OS
Distribution Methods
Other Considerations for New Applications
REVIEW
1.7 QUESTIONS
1.7 ANSWERS
Objective 1.8 Explain common OS types and their
purposes
Workstation Operating Systems
Windows
Linux
macOS
Chrome OS
Smartphone/Tablet Operating Systems
Android
iPadOS
iOS
Various File System Types
Windows File Systems
Linux File Systems
Apple File Systems
Vendor Lifecycle Limitations
Compatibility Concerns Between OSs
REVIEW
1.8 QUESTIONS
1.8 ANSWERS
Objective 1.9 Given a scenario, perform OS installations
and upgrades in a diverse OS environment
Boot Methods
External Drive/Flash Drive (USB)
Optical Disc (CD-ROM, DVD)
Network Boot (PXE)
Solid-State/Flash Drives
Internet-Based
External/Hot-Swappable Drive
Internal Hard Drive (Partition)
Types of Installation
Upgrade
Recovery Partition
Clean Install
Image Deployment
Repair Installation
Remote Network Installation
Third-Party Drivers
Partitioning
Master Boot Record
Globally Unique Identifier Partition Table
Drive Format
Upgrade Considerations
Feature Updates—Product Lifecycle
REVIEW
1.9 QUESTIONS
1.9 ANSWERS
Objective 1.10 Identify common features and tools of the
macOS/desktop OS
macOS Applications
File Types
App Store
Installation and Uninstallation of
Applications
Apple ID and Corporate Restrictions
Best Practices
Backups
Antivirus
Updates and Patches
System Preferences
Displays
Network
Printers & Scanners
Security & Privacy
Features
REVIEW
1.10 QUESTIONS
1.10 ANSWERS
Objective 1.11 Identify common features and tools of the
Linux client/desktop OS
Common Linux Commands
Best Practices
Backups
Antivirus
Updates/Patches
Tools
Shell/Terminal
Samba
REVIEW
1.11 QUESTIONS
1.11 ANSWERS
2.0 Security
Objective 2.1 Summarize various security measures and
their purposes
Physical Security
Access Control Vestibule
Badge Reader
Video Surveillance
Alarm Systems
Motion Sensors
Locks and Applications
Guards
Bollards
Fences
Physical Security for Staff
Smart Cards and Key Fobs
Hard Tokens
Keys
Biometrics
Lighting
Magnetometers
Logical Security
Principle of Least Privilege
Access Control Lists
Multifactor Authentication
E-mail Security
Soft Tokens
Short Message Service
Voice Calls
Authenticator Application
Mobile Device Management
Active Directory
Login Script
Domain
Group Policy/Updates
Organizational Units
Home Folder
Folder Redirection
Security Groups
REVIEW
2.1 QUESTIONS
2.1 ANSWERS
Objective 2.2 Compare and contrast wireless security
protocols and authentication methods
Protocols and Encryption
WPA2
WPA3
TKIP
AES
Authentication
RADIUS
TACACS+
Kerberos
Multifactor Authentication
REVIEW
2.2 QUESTIONS
2.2 ANSWERS
Objective 2.3 Given a scenario, detect, remove, and
prevent malware using the appropriate tools and
methods
Malware
Trojan
Rootkit
Virus
Spyware
Ransomware
Keylogger
Boot Sector Virus
Cryptominers
Tools and Methods
Recovery Mode
Antivirus and Anti-Malware
Software Firewalls
Anti-Phishing Training
User Education Regarding Common
Threats
OS Reinstallation
REVIEW
2.3 QUESTIONS
2.3 ANSWERS
Objective 2.4 Explain common social-engineering
attacks, threats, and vulnerabilities
Social Engineering
Phishing
Vishing
Shoulder Surfing
Whaling
Tailgating
Impersonation
Dumpster Diving
Evil Twin
Threats
DoS and DDoS
Zero-Day Attack
Spoofing
On-Path Attack
Brute-Force Attack
Dictionary Attack
Insider Threat
SQL Injection
Cross-Site Scripting
Vulnerabilities
Noncompliant Systems
Unpatched Systems
Unprotected Systems
EOL OSs
BYOD
REVIEW
2.4 QUESTIONS
2.4 ANSWERS
Objective 2.5 Given a scenario, manage and configure
basic security settings in the Microsoft Windows OS
Defender Antivirus
Firewalls
Activate/Deactivate
Port Security
User Accounts
Groups
OS Login Options
Single Sign-On
NTFS vs. Share Permissions
File and Folder Attributes
Inheritance
Run as Administrator vs. Standard User
User Account Control
BitLocker and BitLocker To Go
EFS
REVIEW
2.5 QUESTIONS
2.5 ANSWERS
Objective 2.6 Given a scenario, configure a workstation
to meet best practices for security
Data-at-Rest Encryption
Password Best Practices
Set Strong Passwords
BIOS/UEFI Passwords
End-User Best Practices
Account Management
Restricting User Permissions
Logon Time Restrictions
Disabling Guest Account
Failed Attempts Lockout
Timeout/Screen Lock
Change Default Admin User Account/Password
Disable AutoRun and AutoPlay
REVIEW
2.6 QUESTIONS
2.6 ANSWERS
Objective 2.7 Explain common methods for securing
mobile and embedded devices
Screen Locks
Facial Recognition
PIN Codes
Fingerprints
Pattern Locks
Swipe Lock
Remote Wipe
Locator Applications
OS Updates
Device Encryption
Remote Backup Applications
Failed Login Attempts Restrictions
Antivirus/Anti-Malware
Firewalls
Policies and Procedures
BYOD vs. Corporate-Owned
Profile Security Requirements
Internet of Things
REVIEW
2.7 QUESTIONS
2.7 ANSWERS
Objective 2.8 Given a scenario, use common data
destruction and disposal methods
Physical Destruction
Drilling
Shredding
Degaussing
Incinerating
Recycling and Repurposing Best Practices
Erasing/Wiping
Low-Level Formatting vs. Standard
Formatting
Outsourcing Concepts
Third-Party Vendor
Certificate of Destruction or Recycling
REVIEW
2.8 QUESTIONS
2.8 ANSWERS
Objective 2.9 Given a scenario, configure appropriate
security settings on small office/home office (SOHO)
wireless and wired networks
Home Router Settings
Changing Default Passwords
IP Filtering
Firmware Updates
Content Filtering
Physical Placement/Secure Locations
Dynamic Host Configuration Protocol
Reservations
Static Wide Area Network IP
Universal Plug and Play
Screened Subnet
Wireless-Specific Security Settings
Changing the Service Set Identifier
Disabling SSID Broadcast
Encryption Settings
Disabling Guest Accounts
Changing Channels
Firewall Settings
Disabling Ports
Port Forwarding/Mapping
REVIEW
2.9 QUESTIONS
2.9 ANSWERS
Objective 2.10 Given a scenario, install and configure
browsers and relevant security settings
Browser Download/Installation
Trusted Sources
Untrusted Sources
Extensions and Plug-Ins
Password Managers
Secure Connections/Sites
Settings
Pop-up Blockers
Clearing Browser Data
Private Browsing Mode
Sign-in/Browser Data Synchronization
Ad Blockers
REVIEW
2.10 QUESTIONS
2.10 ANSWERS
3.0 Software Troubleshooting
Objective 3.1 Given a scenario, troubleshoot common
Windows OS problems
Common Symptoms of Windows Problems
Blue Screen of Death
Sluggish Performance
Boot Problems
Frequent Shutdowns
Services Not Starting
Applications Crashing
Low Memory Warnings
USB Controller Resource Warnings
System Instability
No Operating System Found
Slow Profile Load
Time Drift
Common Troubleshooting Steps
Reboot
Restart Services
Uninstall/Reinstall/Update Applications
Add Resources
Verify Requirements
System File Check
Repair/Restore/Reimage Windows
Roll Back Updates
Rebuild Windows Profiles
REVIEW
3.1 QUESTIONS
3.1 ANSWERS
Objective 3.2 Given a scenario, troubleshoot common
personal computer (PC) security issues
Common Symptoms
Unable to Access the Network
Desktop Alerts
False Alerts Regarding Antivirus Protection
Altered System or Personal Files
Unwanted Notifications Within the OS
OS Update Failures
Browser-Related Symptoms
Random/Frequent Pop-Ups
Certificate Warnings
Redirection
REVIEW
3.2 QUESTIONS
3.2 ANSWERS
Objective 3.3 Given a scenario, use best practice
procedures for malware removal
Best-Practice Malware-Removal Process
REVIEW
3.3 QUESTIONS
3.3 ANSWERS
Objective 3.4 Given a scenario, troubleshoot common
mobile OS and application issues
Common Symptoms
Application Fails to Launch
Application Fails to Close/Crashes
Application/OS Fails to Update
Slow to Respond
Battery Life Issues
Randomly Reboots
Connectivity Issues
Screen Does Not Autorotate
REVIEW
3.4 QUESTIONS
3.4 ANSWERS
Objective 3.5 Given a scenario, troubleshoot common
mobile OS and application security issues
Security Concerns
Android Package Source
Developer Mode
Rooting/Jailbreaking
Bootleg/Malicious Application
Common Symptoms
REVIEW
3.5 QUESTIONS
3.5 ANSWERS
4.0 Operational Procedures
Objective 4.1 Given a scenario, implement best practices
associated with documentation and support systems
information management
Ticketing Systems
Categories
Severity
Escalation Levels
Clear and Concise Written Communication
Asset Management
Database Systems
Asset Tags and IDs
Procurement Lifecycle
Warranty and Licensing
Assigned Users
Types of Documents
Acceptable Use Policy
Network Topology Diagrams
Regulatory and Compliance Requirements
Incident Reports
Standard Operating Procedures
New-User Setup Checklists
End-User Termination Checklists
Knowledge Base/Articles
REVIEW
4.1 QUESTIONS
4.1 ANSWERS
Objective 4.2 Explain basic change-management best
practices
Change Management Best Practices
Documented Business Processes
Rollback Plan
Sandbox Testing
Responsible Staff Member
Change Management
Request Forms
REVIEW
4.2 QUESTIONS
4.2 ANSWERS
Objective 4.3 Given a scenario, implement workstation
backup and recovery methods
Backup and Recovery
Backup Types
Recovery
Frequency
Backup Retention
Backup Testing
Backup Rotation Schemes
REVIEW
4.3 QUESTIONS
4.3 ANSWERS
Objective 4.4 Given a scenario, use common safety
procedures
Electrostatic Discharge Straps
Electrostatic Discharge Mats
Self-Grounding
Equipment Grounding
Proper Power Handling
Power-Handling Apps
Proper Component Handling and Storage
Electrostatic Discharge
Antistatic Bags
Compliance with Government Regulations
Personal Safety
Disconnect Power Before Repairing a PC
Lifting Techniques
Electrical Fire Safety
Safety Goggles
Air Filtration Mask
REVIEW
4.4 QUESTIONS
4.4 ANSWERS
Objective 4.5 Summarize environmental impacts and
local environmental controls
Material Safety Data Sheet/Documentation for Handling
and Disposal
Proper Battery Disposal
Proper Toner Disposal
Proper Disposal of Other Devices and
Assets
Temperature, Humidity-Level Awareness, and Proper
Ventilation
Location/Equipment Placement
Dust Cleanup
Compressed Air/Vacuums
Power Surges, Under-Voltage Events, and Power
Failures
REVIEW
4.5 QUESTIONS
4.5 ANSWERS
Objective 4.6 Explain the importance of prohibited
content/activity and privacy, licensing, and policy
concepts
Incident Response
Chain of Custody
Inform Management/Law Enforcement as
Necessary
Copy of Drive (Data Integrity and
Preservation)
Documentation of the Incident
Licensing/Digital Rights Management/End-User License
Agreement
Licensing
Digital Rights Management
Regulated Data
Data Classifications
Data Retention
REVIEW
4.6 QUESTIONS
4.6 ANSWERS
Objective 4.7 Given a scenario, use proper
communication techniques and professionalism
Professional Appearance and Attire
Communication Techniques
REVIEW
4.7 QUESTIONS
4.7 ANSWERS
Objective 4.8 Identify the basics of scripting
Script File Types
.bat
.ps1
.vbs
.sh
.js
.py
Use Cases for Scripting
Restarting Machines
Remapping Network Drives
Installation of Applications
Automated Backups
Gathering of Information/Data
Initiating Updates
Other Considerations When Using Scripts
Unintentionally Introducing Malware
Inadvertently Changing System Settings
Browser or System Crashes Due to
Mishandling of Resources
REVIEW
4.8 QUESTIONS
4.8 ANSWERS
Objective 4.9 Given a scenario, use remote access
technologies
Methods and Tools
Remote Desktop Protocol
Virtual Private Network
Virtual Network Computing
Secure Shell
Remote Monitoring and Management
Microsoft Remote Assistance
Third-Party Tools
Security Considerations of Each Access Method
REVIEW
4.9 QUESTIONS
4.9 ANSWERS
A About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Privacy Notice
Single User License Terms and Conditions
TotalTester Online
Pre-Assessment
Mike’s CompTIA A+ Video Training Sample
TotalSims Sample for CompTIA A+
Mike’s Cool Tools
Technical Support

Index
Acknowledgments

As with every book, a lot of work from a lot of people went into making
it happen.
Our acquisitions editor, Tim Green, kept us on track with kind words
and pointy sticks. Always a pleasure working with you, Tim!
Our acquisitions coordinator, Caitlin Cromley-Linn, did an outstanding
job acquiring and coordinating, with gentle yet insistent reminders for us
to get stuff to her on a timely basis. Likewise, our project manager,
Tasneem Kauser at KnowledgeWorks Global Ltd. This was a fun project,
and we look forward to the next one!
Bart Reed did great work as our copy editor. He transformed every
awkward stumble of language into a grammatical gem.
Our technical editor, Chris Crayton, took what some would describe
as gleeful delight in pointing out every technical error he found. But since
he helped us fix every error too, we won’t hold it against him. Thanks,
once again, for your technical expertise.
The layout team at KnowledgeWorks Global Ltd. did a remarkable
job, putting the prose and pictures into printable form, which you now get
to enjoy!
Finally, thanks to our proofreader, Lisa McCoy, for catching every last
error. There’s no error too big or small—she’ll find them all. Thank you.
Introduction

Your Passport to Certification


Hello! I’m Mike Meyers, series editor, co-founder of Total Seminars, and
author of many best-selling certification books. On any given day, you’ll
find me replacing a hard drive, setting up a website, or writing code. The
book you hold in your hands is part of a powerful book series called the
Mike Meyers’ Certification Passports. Every book in this series combines
easy readability with a condensed format—in other words, it’s the kind of
book I always wanted when I went for my certifications. Putting a huge
amount of information in an accessible format is an enormous challenge,
but I think we have achieved our goal and I am confident you’ll agree.
I designed this series to do one thing and only one thing—to get you
the information you need to achieve your certification. You won’t find any
fluff in here. We packed every page with nothing but the real nitty-gritty
of the CompTIA A+ Core 2 certification exam.

Your Destination: CompTIA A+


Certification
This book is your passport to CompTIA A+ Core 2 certification, the
vendor-neutral industry standard certification for PC hardware technicians,
the folks who build and fix PCs. To get fully CompTIA A+ certified, you
need to pass two exams: 220-1101 (Core 1) and 220-1102 (Core 2). To
help you prepare for the Core 1 exam, please see our companion book,
Mike Meyers’ CompTIA A+ Core 1 Certification Passport (Exam 220-1101).

The CompTIA A+ Exams


The 220-1101 Core 1 exam concentrates on five areas: Mobile Devices,
Networking, Hardware, Virtualization and Cloud Computing, and Hardware
and Network Troubleshooting. This exam focuses on your understanding
of the terminology and hardware technology used in each of the five
subject areas.
The 220-1102 Core 2 exam works the same way, covering Operating
Systems, Security, Software Troubleshooting, and Operational Procedures.
The 1102 exam is focused mainly on Windows, including installing,
updating, maintaining, troubleshooting, and more. The other operating
systems covered—macOS, Linux, iOS, and Android—get more of a big
picture view. Security and troubleshooting, in both Windows and
applications, make up half the exam questions.
Speaking of questions, each exam consists of up to 90 questions.
Each exam takes 90 minutes. You must score at least 675 on a scale of
100–900 to pass exam 220-1101 (Core 1) and at least 700 on a scale of
100–900 to pass exam 220-1102 (Core 2). Remember, you must pass
both exams to achieve your CompTIA A+ certification.

Question Types and Examples


Both of the exams are extremely practical, with little or no interest in
theory. When you take the exams, you will see three types of questions:
multiple choice, drag-and-drop matching, and performance based
(simulation).
The following is an example of the type of multiple-choice question
you will see on the exams:

A company is planning to upgrade its Fast Ethernet network to


Gigabit Ethernet. The existing network uses a mixture of Cat 5,
Cat 5e, and Cat 6 cables. Which of the following needs to be
performed during the upgrade process?
A. Replace all cables with Cat 6.
B. Keep the same cables.
C. Replace Cat 5 with Cat 5e or Cat 6.
D. Replace all cables with Cat 5e.

The best answer is C, “Replace Cat 5 with Cat 5e or 6.” The cable
standards mentioned in Answers A and D support Gigabit Ethernet, but
since some parts of the network already use these cable types, it is not
necessary to replace them. You might also see multiple-response
questions, essentially multiple choice with more than one correct answer.
Drag-and-drop questions involve dragging and dropping a picture
onto the relevant text. For example, you might see the words “HDMI” and
“DisplayPort” and then two video port illustrations next to them. You
would need to drag the HDMI illustration onto the word “HDMI” and then
drag the other illustration onto the word “DisplayPort.”
Performance-based (simulation) questions ask you to re-create a real
process used by techs when working on PCs. You might be asked to copy
a file or change a setting in Control Panel, but instead of you picking a
multiple-choice answer, your screen will look like a Windows desktop and
you will follow the provided instructions, just like you were using the real
thing.
Always read the questions very carefully, especially when dealing with
performance-based and multiple-choice questions with two or more
correct responses. Remember to look for the best answer, not just the
right answer. Check the CompTIA website for the most up-to-date exam
information, as CompTIA does make changes.

Signing Up for Your CompTIA A+ Certification


Exams
So, how do you sign up to take the CompTIA A+ certification exams?
As this book went to press, the procedure looks like this: Go to
https://home.pearsonvue.com/CompTIA. Click the Sign In button or, if
you don’t already have a Pearson VUE account, click Create Account and
create one. Then, click View Exams, select the 1101 or 1102 exam (you
must pass both to get fully certified), select your preferred language,
review the details, and click Schedule This Exam. Enter your user name
and password; choose an exam center, date, and time; and provide
payment or an exam voucher when required. Repeat this process to
schedule the other exam. Be sure to see the Pearson VUE website for the
latest details.
You can also now take your tests over the Internet. To schedule an
Internet-based exam through OnVUE, go to www.onvue.com. You’ll need
a solid Internet connection and a webcam, such as one built into most
portable computers. Pearson VUE will accommodate any special needs,
although this may limit your selection of testing locations.
A single exam voucher purchased directly from the CompTIA website
is $239. However, there are many sources, including Total Seminars, that
offer discounts. Some vendors offer bundles that include a free retest
voucher. This book comes with a coupon code you can use to purchase a
discounted exam voucher from the CompTIA Store. See the ad in the
front of the book for more information on the code and the discount. Take
it from me, you might like the opportunity to have a “mulligan” if you get
test jitters!
CompTIA A+ certification can be your ticket to a career in IT or
simply an excellent step in your certification pathway. This book is your
passport to success on the CompTIA A+ Core 2 certification exam.

Your Guides: Mike Meyers and Ron


Gilster
You get a pair of tour guides for this book—both me and Ron Gilster.
I’ve written numerous computer certification books—including the best-
selling CompTIA A+ Certification All-in-One Exam Guide and the CompTIA
Network+ Certification All-in-One Exam Guide. More to the point, I’ve
been working on PCs and teaching others how to make and fix them for a
very long time, and I love it! When I’m not lecturing or writing about PCs,
I’m working on PCs! My personal e-mail address is
michaelm@totalsem.com. Please feel free to contact me directly if you
have any questions, complaints, or compliments.
Ron has written or co-authored many books on career certification
and books on hardware and software principles and troubleshooting,
networking, and security. As an educator, he has developed and taught
courses in computer technology, information systems, cybersecurity, and
networking. He sees himself as a trainer, teacher, and guide and works to
exhibit these qualities in his writing. Ron can be contacted at
rgilster@pm.me.
About the Book
This Passport is divided into “Domains” that follow the exam domains.
Each Domain is further divided into “Objective” modules covering each of
the top-level certification objectives for the Core 2 exam. The goal is to
facilitate accelerated review of the exam objectives in a quick-review
format that will allow you to quickly gauge what you can expect to be
tested on. Whether you want a last-minute review or you have enough
experience that you don’t need full coverage of every topic, this format is
designed for you. This isn’t meant to be a course in a book, but we hope
you will find the Passport helpful as you prepare for your exam. If you
find you need more in-depth coverage of the exam topics, we suggest
using Mike’s CompTIA A+ Certification All-in-One Exam Guide, Eleventh
Edition to supplement your studies.
We’ve created a set of learning elements that call your attention to
important items, reinforce key points, and provide helpful exam-taking
hints. Take a look at what you’ll find:

• Each Domain begins with a Domain Objectives list of the official


CompTIA A+ Core 2 exam objectives, which correspond to the titles
of the individual Objective modules in that Domain. The structure of
each Objective module is based on the subobjectives listed under the
corresponding exam objective.
• The following elements highlight key information throughout the
modules:

EXAM TIP
The Exam Tip element focuses on information
that pertains directly to the exam . These
helpful hints are written by authors who have
taken the exam and received their certification
—who better to tell you what to worry about?
They know what you’re about to go through!
Cross-Reference
This element points to related topics covered in other Objective
modules or Domains .

ADDITIONAL RESOURCES
This element points to books, websites, and other
media for further assistance.

CAUTION
These cautionary notes address common
pitfalls or real-world issues.

NOTE
This element calls out any ancillary but pertinent
information.

• Tables allow for a quick reference to help quickly navigate


quantitative data or lists of technical information.
• Each Objective module ends with a brief Review. The review
begins by repeating the official exam objective number and text,
followed by a succinct and useful summary, geared toward quick
review and retention.
• Review Questions and Answers are intended to be similar to
those found on the exam. Explanations of the correct answer are
provided.

Online Content
For more information on the practice exams and other bonus materials
included with the book, please see the “About the Online Content”
appendix at the back of this book.
After you’ve read the book, complete the free online registration and
take advantage of the free practice questions! Use the full practice exam
to hone your skills, and keep the book handy to check answers.
When you’re acing the practice questions, you’re ready to take the
exam.
Go get certified!

What’s Next?
The IT industry changes and grows constantly, and so should you.
Finishing one certification is just a step in an ongoing process of gaining
more and more certifications to match your constantly changing and
growing skills. Remember, in the IT business, if you’re not moving
forward, you are way behind!
Good luck on your certification! Stay in touch.

Mike Meyers, Series Editor


Mike Meyers’ Certification Passport
Operating Systems
Domain Objectives
• 1.1 Identify basic features of Microsoft Windows editions.
• 1.2 Given a scenario, use the appropriate Microsoft
command-line tool.
• 1.3 Given a scenario, use features and tools of the
Microsoft Windows 10 operating system (OS).
• 1.4 Given a scenario, use the appropriate Microsoft
Windows 10 Control Panel utility.
• 1.5 Given a scenario, use the appropriate Windows
settings.
• 1.6 Given a scenario, configure Microsoft Windows
networking features on a client/desktop.
• 1.7 Given a scenario, apply application installation and
configuration concepts.
• 1.8 Explain common OS types and their purposes.
• 1.9 Given a scenario, perform OS installations and
upgrades in a diverse OS environment.
• 1.10 Identify common features and tools of the
macOS/desktop OS.
• 1.11 Identify common features and tools of the Linux
client/desktop OS.
Objective 1.1 Identify basic
features of Microsoft Windows
editions

The Windows operating system (OS) has evolved from the “operating
environment” of Windows 1.0 that didn’t include any networking
capabilities of 1985 to the fully featured desktop, mobile, and server OSs
of Windows 10/11 and Server 2022. In this objective, we look at the basic
features of the Windows OS and how they’re used.

64-Bit vs. 32-Bit


A 32-bit operating system (OS) can be used with either a 32-bit or 64-
bit processor. The once-common 32-bit processors are now used primarily
by very low-performance tablets. Consequently, most computers and
mobile devices use 64-bit operating systems. Software, whether system
software (such as an OS) or application software (such as a word
processor or game), runs best on the architecture for which it was
developed. A 64-bit OS version cannot run on a 32-bit CPU. However, a
64-bit OS runs on either a 64-bit or 32-bit CPU, although it runs much
better on the 64-bit CPU, with some vendor-related exceptions.

EXAM TIP
A 32-bit CPU can only address 4 gigabytes
(GB) of RAM.

All of the 64-bit versions of Windows 10 support only 64-bit device


drivers that have been “signed” (which means authenticated and
authorized) by Microsoft. Without a signed device driver, Windows won’t
support an installed or attached device. A 32-bit architecture limits 32-bit
versions of Windows to 4 GB of system memory (RAM), but a 64-bit
architecture allows the 64-bit Windows versions to support much larger
amounts of RAM, depending on the edition (see Table 1.1-2, later in this
objective).

TABLE 1.1-2 Maximum RAM Supported by Windows 10 Versions

EXAM TIP
For the CompTIA A+ Core 2 (220-1102) exam,
be sure you know the RAM limits for the
Home, Pro, Pro for Workstations, and
Enterprise editions of Windows 10.

Windows 10 Editions
Windows 10 is the ninth released graphical user interface (GUI) version
of the Windows NT operating system. Windows 10 is the most installed
version of all the Windows versions.
NOTE
Why is Windows 10 the ninth version? Some upgrade
versions have overlapped, and there was no Windows 9
version.

Version, editions, and releases all mean something different when


associated with Windows 10 (and other Microsoft products). Officially,
editions have names, such as Enterprise and Pro. Versions are associated
with builds, which have identification codes (build numbers). Another
identifier that can be added to this mix is release, which is an update to a
version or edition that is released on a periodic basis (annual mostly).
Figure 1.1-1 shows the Control Panel System About page detailing
the installed version information on a PC. To display this information,
access the Settings option on the Start menu and select the System icon.
On the System page, select the About option in the left menu pane.
FIGURE 1.1-1 The System/About page of a Windows 10 Enterprise system

Windows 10 editions can be divided into three basic groups: home


editions, work editions, and pro and enterprise editions. Each of these
groups and the editions included are described in the following sections.

Home Edition
The Windows 10 Home edition is the original equipment manufacturer
(OEM) and retail edition. Home is designed specifically for desktop,
mobile, tablet, and all-in-one PCs in home or small office/home office
(SOHO) use. The Home edition includes all core features, including
Cortana and the Edge web browser.
The Windows 10 Home edition supports multicore processes (as
many as 64), but it doesn’t have support features for multiple CPUs. Its
64-bit version supports a maximum of 128 GB of RAM.

Work Edition
The edition of Windows 10 that is considered to be the work edition is
Windows 10 Pro. Pro combines the core features of the Home edition with
the services and applications used to support the centralized installation
and management of remote network nodes. Pro adds professional and
business features to the Home version, including Active Directory,
BitLocker, the Hyper-V hypervisor, and Windows Defender Device
protection. Windows 10 Pro has features specifically for supporting local
area networks (LANs) and network users. Windows 10 Pro is typically sold
under a volume license.

Windows 10 Pro for Workstations and Enterprise


Editions
Windows 10 Pro edition is also available with volume licensing, which
grants price discounts for larger numbers of licenses as Windows Pro for
Workstations.
Windows 10 Pro for Workstations includes all the features of the base
Pro edition, plus it allows more RAM and supports newer and more
advanced software and hardware technologies, such as the Resilient File
System (ReFS), Windows Storage Spaces, and persistent RAM (NVDIMM-
N).
The Windows 10 Enterprise edition adds additional features to
support the computing needs of large corporate and enterprise-level
networks. These features include high-level protection for emerging
security threats, customizable installation, update and maintenance
procedures and processes, and robust device and application
management and control features, among many others. Enterprise also
includes several features not available in the Windows 10 Pro edition,
such as Microsoft Direct Access virtual private network (VPN) technology,
AppLocker software executive management tool, and the Microsoft
Desktop Optimization Pack.
The Windows 10 Enterprise Long-Term Servicing Channel (LTSC)
provides a long-term support and maintenance version of Windows 10
Enterprise. New releases of Windows Enterprise LTSC are issued
approximately every two years, and each release is then supported with
security and operational updates for five or ten years after its release.
Another random document with
no related content on Scribd:
The Stretcher Bed may be Stuffed with Browse or
Leaves, or Suspended from Poles and Stakes to
Make a Camp Cot
Food Bags with
Friction-Top Tins to
Fit Them, in Which
Lard, Butter, Pork,
Ham, and Other
Greasy Necessities
are Carried
A Pack Basket with a Waterproof Canvas Lid and Cover,
Having Straps to Go over the Shoulders, Is a General
Favorite with Woodsmen and Guides

The Compass Is by Far the Most


Useful Instrument for the Woods,
but Any Reliable and Inexpensive
Watch may be Carried

A Good, Tempered Knife Should be


Worn at the Belt

When Going Light the Belt Ax is Used


The Cooking Kit may be of Aluminum or Steel, All
Nesting within the Largest Pot, and may Include a
Folding Baker, or Reflector, with Bread Board in
Canvas Bag, a Wood Salt Box, and a Water-Tight
Can for Matches
Folding Candle
Lanterns are the
Most Convenient for
the Woods and They
Give Sufficient Light
for Camp Life

The Camper’s Outfit

The personal outfit should include only the most useful articles,
and each member of the party should be provided with a dunnage
bag of canvas to hold bedding and clothing, and a smaller, or “ditty,”
bag for keeping together the toilet and other personal belongings
which most everyone finds necessary for everyday comfort. A
mending kit, containing a few yards of silk, linen, and twist; a length
of mending cotton; buttons; a few needles and pins, both safety and
the common kinds, should not be overlooked. The veteran usually
stows away a bit of wire; a length of strong twine; a few nails and
tacks; rivets, etc., for emergency use, and it is surprising to the
novice how handy these several odds and ends are found while in
camp. A compact tin box will form a convenient place to keep them
and will take up little room in the dunnage bag. A medicine case and
a first-aid outfit are well worth packing; the smallest cases containing
a few of the common remedies will fully meet the camper’s needs.
When carrying food by canoe or pack basket, the canoe duffel and
provision bags are a great convenience, enabling the outer to carry
different foodstuffs in a compact and sanitary manner. Food bags
may be had in different sizes, and friction-top tins may be purchased
to fit them; and one or more of these liquid-proof containers are
desirable for transporting lard, butter, pork, ham, and other greasy
necessities. The food bags slip into the larger duffel bags, making a
very compact bundle for stowing away in a canoe or pack harness.

Carrying List for the Camp Outfit

For permanent camps, take the wall tent with fly, although the
Baker or camp-fire styles are also good. When traveling light by
canoe, the canoe or protean tents are recommended. When going
very light by pack, use the forester’s or ranger’s tent. Sod and floor
cloths and mosquito netting are optional.
The cooking kit may be of aluminum or steel, all nesting within the
largest pot. Include a folding baker, or reflector, with bread board in a
canvas bag, a wood salt box, and a water-tight can for matches.
Furniture for the permanent camp consists of a full-sized ax,
double-blade or tomahawk style with straight handle, in a protecting
case, whetstone and file for keeping the ax in shape. A shovel and
saw will be needed when a cabin is built. A canteen may be
included, but is not required on most trips. A folding candle lantern is
the best for the average trip, but an oil, or acetylene, lantern may be
used in a fixed camp. Cots, folding chairs, tables, hangers, etc., are
only useful in fixed camps.
A pack basket with a waterproof-canvas lid and cover, having
straps to go over the shoulders, is a general favorite with woodsmen
and guides. Canvas packs or dunnage bags may be used if
preferred. There are two sizes of food bags, one holding 5 lb. and
another of 10-lb. capacity, with draw-strings at the top, and these are
the best for carrying provisions.
Pack harness, with a tumpline to go across the forehead, is
needed when the outfit must be carried on portages, etc. This may
be omitted when pack baskets are used. Packing cases of fiber may
be used for shipping the outfit to the camping ground, but ordinary
trunks, or wood boxes, will answer as well.

The Personal Outfit

An old ordinary suit that is not worn too thin is sufficient. Corduroy
is too heavy for the summer and too cold for winter, and canvas is
too stiff and noisy for the woods. Cotton khaki is excellent for the
summer, and all-wool khaki, or mackinaw, coat and trousers are
comfortable for winter. Wool is the best material for undergarments
in all seasons. Two sets of garments will be sufficient, as the
washing is done at night. Be sure to have the garments large enough
to allow for shrinkage. Light-weight cashmere is the best material for
socks during summer, and heavier weight for the winter. Three pairs
of ordinary-weight and one pair of heavy-weight will be sufficient. A
medium-weight gray-flannel overshirt, with breast pockets having
button flaps, is the woodsman’s choice. On short and light trips one
shirt will do. A light-weight, all-wool gray or brown, sweater is a good
thing to carry along, it is easily wetted through and a famous brier
catcher, yet most woodsmen carry one.
The regulation army poncho is more suited to the woods than a
rubber coat or oilskins. The larger-size poncho is more bulky to pack,
but may be used as a shelter by rigging it up with poles, lean-to
fashion. A poncho makes a good ground blanket also.
A medium wide-brimmed hat, in gray or brown, is better than a
cap. A gray, or brown, silk handkerchief should be included to wear
around the neck to protect it from the sun and cold. Only few novices
will carry one, but not so with the regular woodsman, The moccasin
is the only suitable footwear for the woods. The “puckaway,” with
extra sole, is known to most woodsmen. A pair of larrigans—ankle-
high moccasins with single sole—are suitable to wear about the
camp.
Each member of the party carries his own knapsack, or ditty bag,
in which such things as brush and comb, toothbrush, razor, towel,
medicines, stationery, etc., are kept. The extra clothing is carried in
its own canvas bag.
Each member of the party carries a pair of woolen blankets. Army
blankets in tan color are serviceable and inexpensive.
A good, tempered knife should be worn at the belt, preferably one
without a hilt and having a blade 5 or 6 in. long.
A small leather pouch containing a few common remedies, such
as quinine, laxative, etc.; and a small first-aid outfit should be
included in each camper’s personal pack. Also a small leather pouch
containing an assortment of needles, darning cotton, buttons, and a
length of heavy silk twist is a handy companion.
A few sheets of paper and as many envelopes, a notebook, pencil,
and a few postal cards, are usually carried, together with an almanac
page of the months covering the intended trip.
The compass is by far the most useful instrument in the woods,
but any reliable and inexpensive watch may be carried.
Many woodsmen carry a small hatchet at the belt, and on trips
when but the few necessities are carried the belt ax takes the place
of the heavier-weight tool. The tomahawk style gives two cutting
edges and is therefore the best tool to carry. A leather or other
covering case is needed to protect the blades.
A small tin box containing an assortment of rivets; tacks; a bit of
string; brass wire; a few nails; a couple of small files; a tool holder
with tools; a sheet of sandpaper; a bit of emery cloth, and any other
small articles which the sportsman fancies will come in handy, may
be carried. It is surprising how often this “what not” is resorted to
while in the woods.
The odds and ends of personal belongings, as a jackknife; pipe
and tobacco; map of the region visited; length of fishing line and
hook; a few loose matches; match box; purse; notebook and pencil;
handkerchief, etc., are, of course, carried in the pocket of the coat.
A Camper’s Salt-and-Pepper Holder

A camper will find a very clever way to carry salt and pepper by
using a piece cut from a joint of bamboo. A piece is selected with the
joint in the center, and the ends are stoppered with corks.
A Simple Self-Contained Motor
To say that the subject of this article is the simplest motor in the
world is not to overestimate it, for the apparatus is not only a motor
reduced to its essential elements, but combines within itself its own
source of electric power, all without the use of a single piece of wire.
The experiment is very interesting and instructive and will well repay
a careful construction along the lines indicated, even though not in
strict accordance with the dimensions given.
The first step is to procure a permanent magnet, about ³⁄₈ in. in
diameter and 6 in. long. If such a magnet cannot be conveniently
secured, a piece of tool steel with flat ends should be hardened by
heating it to a dull red and plunging it in water, and then strongly
magnetized. This may be readily accomplished by slipping a coil of
insulated wire over it through which the current from a storage
battery or set of primary cells is passed. If these are not at hand,
almost any electrical supply store will magnetize the steel.
A square base block with neatly beveled corners is now in order,
which is trimmed up squarely and a hole bored centrally through it to
receive the lower end of the magnet. Procure a neat spool and make
a hole in it large enough to pass over the magnet. Glue the spool to
the base after locating it in the exact center.
The outer and larger cylinder is of copper, or of brass,
copperplated on the inside. It is cup-shaped, with a hole in the
bottom just large enough to permit the magnet to be pushed through
with a close fit, to make a good electrical contact. The magnet may
be held in place by having it closely fit the spool and the copper
cylinder, and by soldering the heads of a couple of small tacks, or
nails, to its under side and driving them into the spool. Coat the
magnet with pitch, or paraffin, from the top down, and around its
connection with the bottom of the cylinder. The small thimble shown
at the top should be of brass or copper, and while one can be easily
formed of sheet metal and soldered, it is not improbable that one
could be made in seamless form from small article of commerce. In
the exact center of the under side of the top of this thimble, make a
good mark with a prickpunch, after which a small steel thumb tack
should be filed to a fine needle point and placed, point up, exactly
central on the upper end of the magnet, to which it is held with a little
wax. The smaller cylinder is simply a piece of sheet zinc bent into a
true cylinder of such a size that it may be sprung over the lower end
of the thimble. This done, it is only necessary to slip the zinc over the
end of the magnet until the thimble rests on the thumb tack, and then
pour some dilute muriatic or sulphuric acid into the outer cylinder
after which the thimble and attached zinc will begin to rotate. The
required strength of the acid and the resulting speed will depend
upon the nicety of suspension and the trueness of the rotating zinc
cylinder. The zinc will have to be changed, but the copper undergoes
no deterioration.
The Tricks of Camping Out
By STILLMAN TAYLOR

PART II—Cooking in the Woods

Cooking in the woods requires more of a knack than equipment, and


while a camp stove is well enough in a permanent camp, its
weight and bulk makes this article of camp furniture unsuited for
transportation by canoe. Patent cooking grates are less bulky, but
the woodsman can learn to do without them very nicely. However,
the important item which few woodsmen care to do without is the
folding baker, or reflector. The baker is folded flat and carried in a
canvas case, including baking pan and a kneading board. The
largest size, with an 18-in. square pan, weighs about 5 lb., and the
smallest, with an 8 by 12-in. pan in aluminum, only 2 lb. In use, the
reflector is placed with the open side close to the fire, and cooking is
accomplished evenly and well in any kind of weather. Bread, fish,
game, or meat are easily and perfectly cooked, and the smaller size
is amply large for a party of two or three.
A Cooking Range Fashioned from Two Green Logs Laid in a V-Shape with a
Few Stones Built Up at the Wide End over Which a Fire is Made of Hard-
Wood Sticks

The camp fire is one of the charms of the open, and if it is built
right and of the best kind of wood, cooking may be done over it as
well as over a forest range. Many woodsmen prefer to build a
second and smaller fire for cooking, and although I have never found
this necessary, excepting in large camps where a considerable
quantity of food must be prepared, the camper can suit himself, for
experimenting is, after all, a large part of the fun of living in and off
the woods.
A satisfactory outdoor cooking range may be fashioned by roughly
smoothing the top and bottom sides of two green logs, and placing
them about 6 in. apart at one end and about 2 ft. apart at the
opposite end. At the wide end a few stones are built up, and across
these, hickory, ash, and other sticks of hard wood are placed. The
reflector is placed close to the coals at this end, and the fire is built
between the logs, the broiling and frying being done at the narrow-
end opening. Woods that burn slowly when green should be used for
backlogs and end logs; chestnut, red oak, butternut, red maple, and
persimmon being best adapted for this purpose.
The hard woods are best for cooking and heating, since they burn
more slowly, and give out considerable heat and burn down to a
body of glowing coals. Soft woods are quick to catch fire, burn
rapidly, and make a hot fire, but burn down to dead ashes. Hickory is
by far the best firewood of the North, in that it makes a hot fire, is
long-burning, and forms a large body of coals that gives an even and
intense heat for a considerable length of time. Next to hickory comes
chestnut; the basket oaks, ironwood, dogwood, and ash are the
woodsman’s favorites. Among the woods that are easy to split are
the red oak, basket oak, white oak, ash, and white birch. Some few
woods split more easily when green than after seasoning, and
among them are hickory, dogwood, beech, sugar maple, birch, and
elm. The most stubborn woods to split are the elder, blue ash,
cherry, sour gum, hemlock, sweet gum, and sycamore. Of the softer
woods, the birches make the best fuel; black birch in particular
makes a fine camp fire, and it is one of the few woods that burns well
when green. The dry bark of the hemlock makes a quick and hot fire,
and white birch takes fire quickly even though moist. Driftwood is
good to start a fire with, and dry pine knots—the limb stubs of a dead
pine tree—are famous kindlers. Green wood will, of course, burn
better in winter when the sap is dormant, and trees found on high
ground make better fuel than those growing in moist bottom lands.
Hard woods are more plentiful on high ground, while the softer
woods are found in abundance along the margins of streams.
A Green Pole Placed in a Forked Stick Provides a Pot Hanger for a Noonday
Meal

For cooking the noonday meal a small fire will suffice to boil the
pot and furnish the heat sufficient to make a fry. Simply drive a
forked stick in the ground and lay a green stick in the fork with the
opposite end on the ground with a rock laid on it to keep it down, and
hang the pot on the projecting stub left for this purpose. A long stick
with projecting stubs, planted in the ground to slant over the fire at
an angle, will serve as well. Let the pot hang about 2 ft. from the
ground, collect an armful of dry twigs and plenty of larger kindling
sticks. Now shave three or four of the larger sticks and leave the
shavings on the ends, stand them up beneath the pot, tripod fashion,
and place the smaller sticks around them to build a miniature
wigwam. While the pot is boiling get a couple of bed chunks, or
andirons, 4 or 5 in. in diameter, set and level these on each side of
the fire, and put the frying pan on them. When the pot has boiled
there will be a nice bed of coals for frying that will not smoke the
meal.
When the woodsman makes “one-night stands,” he will invariably
build the fire and start the kettle boiling while he or a companion
stakes the tent, and as soon as the meal is prepared, a pot of water
is started boiling for dish washing.
For roasting and baking with the reflector, a rather high fire is
needed and a few sticks, a yard or more long, resting upright against
a backlog or rock, will throw the heat forward. When glowing coals
are wanted one can take them from the camp fire, or split uniform
billets of green, or dead, wood about 2 in. thick and pile them in the
form of a hollow square, or crib. The fire is built in the center of the
crib and more parallel sticks are laid on top until it is a foot or more
higher. The crib will act as a chimney, and a roaring fire will result,
which upon burning down will give a glowing mass of coals.
Camp cookery implies the preparation of the more simple and
nutritious foods, and in making up a list it is well to include only the
more staple foodstuffs, which are known to have these qualities.
Personal ideas are certain to differ greatly, but the following list may
be depended upon and will serve as a guide.

Provision List

This list of material will be sufficient for two persons on an outing


of two weeks. Carry in a stout canvas food bag 12 lb. of common
wheat flour. The self-raising kind is good, but the common flour is
better. It is well to bring a little yellow, or white, corn meal, about 6
lb., to be served as a johnny cake, hot, cold, or fried mush. It is fine
for rolling a fish in for frying. Rice is very nutritious, easily digested,
and easy to cook. It is good when boiled with raisins. When cold, it
can be fried in slices. About 3 lb. will be sufficient. Oatmeal is less
sustaining than rice, but it is good for porridge, or sliced when cold
and fried. Take along about 3 lb. About 2 lb. of the self-raising
buckwheat flour should be taken along, as it is the favorite for
flapjacks or griddle cakes. Beans are very nutritious, and about 2 lb.
of the common baking kind will be required, to boil or bake with the
salt pork. For soups, take 2 lb. of split peas. They can also be served
as a vegetable. Salt pork is a stand-by, and 5 lb. of it is provided and
carried in friction-top tins or a grease-proof bag. It should be
parboiled before adding to the beans or when fried like bacon. The
regulation meat of the wilderness is bacon, and 5 lb. of it is carried in
a tin or bag. Carry along 3 lb. of lard in a tin or bag, for bread-making
and frying. About 3 lb. of butter is carried in a friction-top tin. For
making rice puddings, take along 1 lb. of raisins. About 1 lb. of
shredded codfish is good for making fish balls. Other small articles,
such as ¹⁄₂ lb. of tea; 1 lb. of coffee; 3 lb. of granulated sugar; 1 pt. of
molasses; 1 pt. of vinegar; 4 cans of condensed milk; 1 can of milk
powder, a good substitute for fresh milk; 1 can egg powder, good for
making omelets or can be scrambled; 1 lb. salt; 2 oz. pepper; 1
package each of evaporated potatoes, onions, and fruits, and 3
packages of assorted soup tablets.
This list is by no means complete, but it will suffice for the average
person on the average trip, since the occasional addition of a fish or
game will help to replenish the stores. When going very light by
pack, only the most compact and nutritious foods should be
selected, while on short, easy trips the addition of canned goods will
supply a greater variety.

Woodcraft
A Limb Supported at an Angle over the Fire Is Another Means of Hanging the
Pot

While shooting and fishing and camping out are chapters in the
book of woodcraft, the word is generally defined to mean the knack
of using the compass, the map, and in making use of the natural
signs of the woods when traveling in the wilderness. If the camper
keeps to the beaten paths and does not stray far from the frequently
used waterways, he needs no compass, and sufficient knowledge of
the ways of the woods may be acquired from the previous articles,
but if the outer ventures into an unknown region the value of more
intimate knowledge increases as the distance to civilization
lengthens, because it will enable him to keep traveling in the desired
direction and prevent the “insane desire to circle,” should one
discover he has lost the trail.

The Emergency “Snack” and Kit


The woodsman well knows that it is an easy matter to stray farther
from camp than he intended to when starting out, and that it is a
common enough occurrence to lose one’s bearings and become
temporarily lost. To prepare for this possible emergency and spend a
comfortable night away from the camp, he carries in his pocket a
little packet of useful articles and stows away a tiny package
containing a small amount of nutritious food. When leaving camp for
a day’s hunting and fishing, the usual lunch is, of course, included,
but in addition to this, the woodsman should carry a couple of soup
tablets, a piece of summer sausage, and some tea. Wrap this in
oiled silk, and pack it in a flat tin box. It will take up very little room in
the pocket.
The emergency kit is merely a small leather pouch containing a
short fishing line; a few fishing hooks; 1 ft. of surgeon’s adhesive
plaster; needle and thread; a few safety pins, and a small coil of
copper or brass wire. These articles, with the gun and a few spare
cartridges, or rod; a belt knife; match safe; compass; map; a little
money, pipe, and tobacco, make up the personal outfit without which
few woodsmen care to venture far from camp. In addition to the
above, I carry a double-edge, light-weight ax, or tomahawk, in a
leather sheath at the belt and a tin cup strung to the back of the belt,
where it is out of the way and unnoticed until wanted.

The Compass

A small pocket compass affixed to a leather thong should be


carried in the breast pocket and fastened to a button of the shirt. An
instrument costing $1 will be accurate enough for all purposes. Many
of the woodsmen as well as the Indians do not use a compass, but
even the expert woodsman gets lost sometimes, and it may happen
that the sun is obscured by clouds, thus making it more difficult to
read the natural signs of the wilderness. The compass is of little
value if a person does not know how to use it. It will not tell in what
direction to go, but when the needle is allowed to swing freely on its
pivot the blue end always points to the magnetic north. The true
north lies a degree or more to either side. In the West, for instance,
the needle will be attracted a trifle to the east, while on the Atlantic
coast it will swing a trifle to the west of the true north. This magnetic
variation need not be taken into account by the woodsman, who may
consider it to point to the true north, for absolute accuracy is not
required for this purpose. However, I would advise the sportsman to
take the precaution of scratching on the back of the case these
letters, B = N, meaning blue equals north. If this is done, the novice
will be certain to remember and read the compass right no matter
how confused he may become on finding that he has lost his way.
The watch may be used as a compass on a clear day by pointing the
hour hand to the sun, when the point halfway between the hour hand
and 12 will be due south.

You might also like