Here's a list of the differences between the older Core 2, 220-1102 exam objectives and the newer Core 2, 220-1202 objectives. Scroll down for additions and removals.
Domain | 1102 | 1202 |
---|---|---|
Operating Systems | 31% | 28% |
Security | 25% | 28% |
Software Troubleshooting | 22% | 23% |
Operational Procedures | 22% | 21% |
Added Content
1.3 - Windows 11 editions:
- Enterprise
N versions
Hardware requirements
1.5 - Informational
- whoami
1.10 - Distribution Methods
- Downloadable package
- Image deployment
1.1 - File System types
- Extended filesystem (XFS)
1.2 - Boot Methods
- Multiboot
1.2 - Installation types
- Zero-touch deployment
1.8 - macOS System folders
- /Applications
- /Users
- /Library
- /System
- /Users/Library
1.8 - macOS Features
- iCloud
- iMessage
- FaceTime
- Drive
- Continuity
1.9 - Linux Filesystem management
- fsck
- mount
1.9 - Linux Common configuration files
- /etc/passwd
- /etc/shadow
- /etc/hosts
- /etc/fstab
- /etc/resolv.conf
1.9 - Linux OS components
- systemd
- kernel
- bootloader
1.9 - Linux Root account
1.11 - Storage
- Sync/folder settings
1.11 - Collaboration tools
- Spreadsheets
- Videoconferencing
- Presentation tools
- Word processing tools
- Instant messaging
1.11 - Identity synchronization
1.11 - Licensing assignment
2.1 - Physical Access Security
- Mobile digital key
- Facial recognition technology (FRT)
- Voice recognition technology
2.1 - Logical Security
- Zero Trust model
- Time-based one-time password (TOTP)
- One time password (OTP)
- Security Assertions Markup Language SAML
- Single Sign On (SSO)
- Just in time Access
- Privileged access management (PAM)
- Data loss prevention (DLP)
- Identity access management (IAM)
2.4 - Malware
- Stalkerware
- Fileless Adware
- Potentially unwanted program (PUP)
2.4 - Tools and Methods
- Email security gateway
- Software firewalls
- Managed detection and response (MDR)
- Extended detection and response (XDR)
- Endpoint detection and response (EDR)
2.5 - Social Engineering
- Smishing
- QR code phishing
- Spear phishing
2.5 - Threats
- Business email compromise (BEC)
- Supply chain/pipeline attack
2.2 - Login OS options
- Passwordless/Windows Hello
2.2 - Active Directory (taken from previous 2.1 in the 1102) - Joining domain
- Assigning log-in script
- Moving objects within
organizational units - Assigning home folders
- Applying Group Policy
- Selecting security groups
- Configuring folder redirection
2.7 - Password Considerations
- Uniqueness
- Complexity
2.8 - Failed Log-in attempts restrictions
2.8 - Endpoint Security software
- Content Filtering
2.8 - Policies and procedures
- MDM
- Profile Security Requirements
2.9 - Regulatory and environmental requirements
2.10 - Router Settings
- Configure secure management access
2.10 - Wireless specific
- Configuring guest access
2.11 - Browser patching Settings
- Proxy
- Secure DNS
2.11 - Browser feature management
- Enable/disable
- Plug-ins
- Extensions
- Features
3.4 - Common Symptoms
- Inability to access files
3.4 - Browser-Related Symptoms
- Degraded browser performance
3.2 - Application fails to install
3.3 - Security Concerns
- Application source/unofficial application stores
- Unauthorized/malicious application
4.1 - Asset Management
- Configuration management database (CMDB)
4.1 - Types of Documentation
- Service-level agreements (SLAs)
- Internal
- External/third-party
4.2 - Documented business processes
- Backup plan
4.2 - Change Management
- Change type
- standard
- normal
- emergency
- Change freeze
- Maintenance windows Approvals
- Implementation
- Peer review
4.3 - Recovery
- In-place/overwrite
- Alternative location
4.4 - Cable management
4.5 - Uninterruptible power supply (UPS)
4.6 - Order of volatility
4.6 - Non-disclosure agreement
4.9 - Methods and Tools
- Simple Protocol for Independent Computing Environments (SPICE)
- Windows Remote Management (WinRM)
4.10 - Application Integration Policy
- Appropriate use
- Plagiarism
4.10 - Limitations
- Bias
- Hallucinations
- Accuracy
4.10 - Private vs. public
- Data security
- Data source
- Data privacy
Removed Content
old 1.2 - Drive navigation inputs: M 'C': or D: or x:
old 1.2 - Command-line Tools: xcopy, copy,shutdown
old 1.7 - OS requirements for applications
- Application to OS compatibility
- 32-bit vs. 64-bit OS
old 1.8 - File System types
- Third extended filesystem
(ext3)
old 1.11 - Common Commands
- yum
old 1.11 - Best practices
- Backups
- Antivirus
- Updates/patches
old 1.11 - Tools
- Shell/terminal
- Samba
old 2.9:
- Dynamic Host Configuration Protocol (DHCP) reservations
- Static wide-area network (WAN) IP
- Disabling guest access
- Changing channels
old 3.1: Common troubleshooting steps
- Reboot
- Restart services
- Uninstall/reinstall/update
applications - Add resources
- Verify requirements
- System file check
- Repair Windows
- Restore
- Reimage
- Roll back updates
- Rebuild Windows profiles
old 3.4 - Connectivity Issue
- AirDrop
old 3.5 - Security Concerns
- Android package (APK) source
old 4.1:
Asset Management
- Database system
Types of Documentation
- Network topology diagram
(Moved to 4.6) - Acceptable use policy (AUP)
- Regulatory compliance
requirements - Splash screens
old 4.5 - Proper power handling, battery backup
old 4.9 - Microsoft Remote Assistance (MSRA)