This chapter covers Microsoft Windows operating systems tested on the CompTIA A+ Core 2 exam, including Windows 10 and Windows 11 editions, features, system requirements, installation methods, and core administrative tools. You'll learn how to navigate Windows interfaces, configure system settings, manage user accounts, and use built-in utilities for system maintenance and troubleshooting. Mastering Windows OS fundamentals is essential because most exam scenarios involve Windows-based environments.
Windows comes in different editions, each designed for specific use cases. Windows 10 Home is the basic consumer edition with core features. Windows 10 Pro adds business features like domain joining, BitLocker encryption, Group Policy management, and Remote Desktop Protocol (RDP) host capabilities. Windows 10 Pro for Workstations supports high-end hardware and ReFS file system. Windows 10 Enterprise includes advanced security and management features for large organizations, available only through volume licensing. Windows 11 follows similar edition structures but requires TPM 2.0, UEFI firmware, and Secure Boot.
Key feature differences by edition:
Windows 10 minimum requirements include a 1 GHz processor, 1 GB RAM for 32-bit or 2 GB for 64-bit, 16 GB storage for 32-bit or 32 GB for 64-bit, and DirectX 9 graphics. Windows 11 requires a compatible 64-bit processor (1 GHz with 2+ cores), 4 GB RAM, 64 GB storage, UEFI firmware with Secure Boot capability, TPM version 2.0, and a DirectX 12 compatible graphics card. The TPM 2.0 requirement is a major change from Windows 10.
The Desktop displays icons, taskbar, and system tray. The Start Menu provides access to programs, settings, and power options. The Taskbar shows running applications and pinned programs. The Action Center (Windows 10) or Notification Center displays system notifications and quick settings. File Explorer manages files and folders with navigation pane, ribbon interface, and quick access. Task View enables virtual desktop management and timeline viewing. Settings app replaced many Control Panel functions for modern system configuration.
Computer Management (compmgmt.msc) consolidates system tools, storage, services, and applications into one console. It includes Task Scheduler, Event Viewer, Shared Folders, Local Users and Groups, Performance Monitor, Device Manager, and Disk Management.
Task Manager (Ctrl+Shift+Esc or taskmgr.exe) shows running processes, performance metrics, startup programs, and services. The Processes tab displays active applications and background processes with CPU, memory, disk, and network usage. The Performance tab graphs real-time system resource utilization. The Startup tab manages programs that launch at boot. The Services tab shows Windows services status.
Event Viewer (eventvwr.msc) logs system events in categories: Application (program events), Security (audit events), Setup (installation events), and System (Windows component events). Events have severity levels: Information, Warning, Error, and Critical. Use Custom Views to filter specific event types.
Services (services.msc) manages Windows background processes. Service startup types include Automatic (starts at boot), Automatic (Delayed Start) (starts after boot completes), Manual (starts when needed), and Disabled (cannot start). Service states are Running, Stopped, or Paused. Critical services like Windows Update, Print Spooler, and DHCP Client require specific startup configurations.
Device Manager (devmgmt.msc) manages hardware devices and drivers. Yellow exclamation marks indicate device problems. Red X marks show disabled devices. Unknown devices appear when drivers are missing. You can update, roll back, disable, or uninstall drivers. Scan for hardware changes detects newly connected devices.
Disk Management (diskmgmt.msc) configures storage devices, creates partitions, formats volumes, assigns drive letters, and manages dynamic disks. You can shrink, extend, or delete volumes. Disk types include Basic (standard partitions) and Dynamic (supports software RAID).
Registry Editor (regedit.exe) accesses the Windows registry database. Five root keys: HKEY_LOCAL_MACHINE (HKLM) stores computer-wide settings, HKEY_CURRENT_USER (HKCU) stores current user settings, HKEY_USERS contains all user profiles, HKEY_CLASSES_ROOT holds file associations, and HKEY_CURRENT_CONFIG stores hardware profile data. Always backup registry before modifications.
Group Policy Editor (gpedit.msc) configures security and system policies. Only available in Pro and Enterprise editions. Policies apply to Computer Configuration (affects all users) or User Configuration (affects specific users). Common policy locations include Windows Settings, Administrative Templates, and Security Settings.
System Configuration (msconfig.exe) manages startup options and boot settings. The General tab selects startup type: Normal, Diagnostic (minimal drivers), or Selective. The Boot tab configures boot options like Safe Mode, No GUI boot, and Boot log. The Services tab enables/disables services, with "Hide all Microsoft services" option. The Startup tab redirects to Task Manager in Windows 10/11. The Tools tab provides quick access to administrative utilities.
System Information (msinfo32.exe) displays detailed hardware, software, and system component information. Shows OS version, processor, BIOS version, RAM, and loaded drivers. Use for hardware inventory and troubleshooting compatibility issues.
Resource Monitor (resmon.exe) provides detailed real-time monitoring of CPU, memory, disk, and network resource usage by processes. More granular than Task Manager for identifying resource bottlenecks.
Performance Monitor (perfmon.msc) collects performance data using counters. Create Data Collector Sets to log performance metrics over time. Use for baseline establishment and long-term performance analysis.
FAT32 has maximum file size of 4 GB and maximum partition size of 32 GB (Windows formatting limit). Compatible with most operating systems but lacks security features and journaling.
NTFS is the primary Windows file system supporting encryption (EFS), compression, disk quotas, file permissions, and large files/partitions. Includes journaling for crash recovery. Required for system drives and BitLocker encryption.
exFAT designed for flash drives and external storage. Supports large files (no 4 GB limit) with better compatibility than NTFS for non-Windows devices. No journaling or built-in security features.
ReFS (Resilient File System) available in Pro for Workstations and Enterprise. Designed for fault tolerance, large volumes, and data integrity. Not bootable in most configurations.
NTFS permissions control access to files and folders. Full Control allows all actions including permission changes. Modify permits read, write, delete, and execute. Read & Execute allows viewing and running files. Read permits viewing only. Write allows creating files and folders. Permissions are Allow or Deny, with Deny overriding Allow. Permissions accumulate from group memberships, except when Deny is present.
Inheritance flows permissions from parent folders to child objects. You can disable inheritance or convert inherited permissions to explicit permissions. Effective permissions show the actual access a user has after combining all group memberships and inheritance.
Share permissions apply only over the network. They include Full Control, Change, and Read. When combining NTFS and share permissions, the most restrictive permission applies.
UAC prevents unauthorized changes by prompting for approval when administrative tasks occur. Standard users see a credential prompt requiring administrator password. Administrators see a consent prompt requiring confirmation. UAC levels range from Always Notify to Never Notify (not recommended). Disable UAC only in isolated lab environments, never in production.
Windows Update downloads and installs operating system patches, driver updates, and security fixes. Quality updates include security patches and bug fixes, released monthly on Patch Tuesday (second Tuesday). Feature updates add new capabilities, released semi-annually for Windows 10 and annually for Windows 11. Update channels include General Availability Channel (standard release) and Long-Term Servicing Channel (LTSC, Enterprise only, minimal feature updates).
Configure update settings through Settings > Update & Security > Windows Update. Options include active hours, pause updates (up to 35 days), and defer feature updates. Windows Update for Business provides additional controls in Pro and Enterprise editions through Group Policy.
Windows activation verifies genuine software installation. Retail licenses transfer between computers. OEM licenses tie to original hardware and don't transfer. Volume licenses use Key Management Service (KMS) or Multiple Activation Key (MAK) for enterprise deployments. Check activation status in Settings > Update & Security > Activation or run slmgr.vbs /xpr from elevated command prompt.
Windows 10/11 transition many Control Panel functions to the Settings app. Control Panel still contains advanced configurations like Device Manager, Programs and Features, and System Properties. Settings app handles most user-facing configurations: displays, personalization, accounts, network, and updates. Some functions appear in both interfaces. For exam purposes, know both access methods.
Clean installation erases existing data and installs fresh OS. Requires bootable media (USB or DVD). Use when replacing OS or removing persistent malware.
Upgrade installation preserves files, settings, and applications while updating Windows version. Requires compatible edition upgrade path (e.g., Home to Pro, Windows 10 to Windows 11).
In-place upgrade repairs Windows installation while keeping personal files and applications. Use when system files are corrupted but data needs preservation.
Network installation deploys Windows over network using Windows Deployment Services (WDS) or Microsoft Deployment Toolkit (MDT). Requires PXE boot support.
Image deployment uses pre-configured system images (.wim files) deployed via tools like DISM (Deployment Image Servicing and Management). Common in enterprise environments.
Unattended installation automates setup using answer files (unattend.xml). Eliminates manual configuration during deployment.
Safe Mode loads minimal drivers and services for troubleshooting. Access by holding Shift while clicking Restart, then Troubleshoot > Advanced options > Startup Settings. Three Safe Mode variants: Safe Mode (basic), Safe Mode with Networking (includes network drivers), and Safe Mode with Command Prompt (text interface only).
Windows Recovery Environment (WinRE) provides troubleshooting tools when Windows won't boot. Includes System Restore, System Image Recovery, Startup Repair, Command Prompt, and UEFI Firmware Settings. Access by interrupting boot three times, using bootable media, or Settings > Update & Security > Recovery > Restart now.
Advanced Boot Options accessed through Startup Settings in WinRE. Options include Enable Boot Logging (creates ntbtlog.txt), Enable low-resolution video, Last Known Good Configuration (older Windows versions), Disable driver signature enforcement, and Disable automatic restart on system failure.
cmd.exe opens Command Prompt. powershell.exe launches PowerShell with advanced scripting capabilities. Run with administrative privileges when needed (right-click > Run as administrator).
Essential commands for Core 2 exam:
Workgroup is a peer-to-peer network where each computer manages its own security. Default workgroup name is WORKGROUP. Suitable for small networks (fewer than 10 computers).
Domain is centralized network managed by Active Directory Domain Services. Requires Windows Server. Provides centralized authentication, Group Policy management, and resource sharing. Computers must join domain using Pro or Enterprise editions.
HomeGroup simplified home network sharing in Windows 7-10 (removed in Windows 10 version 1803). Use standard file sharing instead.
Network Discovery allows computer to find other network devices. File and Printer Sharing enables sharing resources. Configure through Network and Sharing Center or Settings > Network & Internet > Sharing options.
Network profiles include Public (restrictive security), Private (trusted network, enables discovery and sharing), and Domain (managed by domain policies). Choose appropriate profile based on network trust level.
Configure security settings through secpol.msc (Pro and Enterprise editions). Key policy areas include:
Common password policy settings: minimum password length, password complexity requirements, maximum password age, minimum password age, and password history enforcement.
Windows Defender Antivirus provides real-time malware protection. Configure through Windows Security app. Features include real-time protection, cloud-delivered protection, automatic sample submission, and controlled folder access (ransomware protection).
Windows Defender Firewall filters inbound and outbound traffic. Configure per network profile (Domain, Private, Public). Create rules to allow/block specific programs or ports.
Windows Security (formerly Windows Defender Security Center) centralizes security management: virus protection, firewall status, device security, app/browser control, and device performance.
1. Symptom: User receives "Windows is not activated" watermark in bottom-right corner of desktop, and personalization features are disabled.
Likely Cause: Windows activation failed or expired, often due to hardware changes, invalid product key, or KMS server connectivity issues in enterprise environments.
Fix: Open Settings > Update & Security > Activation and verify activation status; if using retail key, click "Change product key" and enter valid key; if domain-joined, ensure connectivity to KMS server and run slmgr.vbs /ato from elevated command prompt to force activation; if hardware changed significantly, may need to contact Microsoft support or reactivate.
2. Symptom: Application fails to launch with error stating it requires administrator privileges, even though user is logged in as administrator.
Likely Cause: User Account Control (UAC) is blocking elevated execution because the application wasn't launched with explicit administrative rights.
Fix: Right-click the application executable or shortcut and select "Run as administrator"; alternatively, open Properties of the executable, go to Compatibility tab, check "Run this program as an administrator," click Apply, then launch normally; verify UAC is enabled through Control Panel > User Accounts > Change User Account Control settings.
3. Symptom: Computer boots to black screen with cursor visible but desktop never loads; Safe Mode boots successfully.
Likely Cause: Third-party startup program or service is crashing Explorer.exe or preventing desktop from loading; recently installed software or driver may be incompatible.
Fix: Boot to Safe Mode, open Task Manager (Ctrl+Shift+Esc), navigate to Startup tab and disable all non-Microsoft startup items; open Services (services.msc) and disable recently installed non-Microsoft services; restart normally and if desktop loads, re-enable startup items one at a time to identify culprit; if issue persists, run System Restore from WinRE to restore to previous working state.
Task: Creating a New Local User Account and Configuring Permissions
Q1: A user reports that their Windows 10 laptop cannot join the corporate domain. Upon investigation, you discover the laptop is running Windows 10 Home edition. What is the most appropriate solution?
(a) Upgrade to Windows 10 Pro or Enterprise edition
(b) Configure the laptop to use a workgroup instead
(c) Enable domain join through Group Policy
(d) Install Active Directory services on the laptop
Ans: (a)
Windows 10 Home edition does not support domain join functionality; only Pro, Enterprise, and Education editions can join Active Directory domains, requiring an edition upgrade.
Q2: A technician needs to identify which process is using the most CPU resources and terminate it. Which two tools can accomplish this task? (Select TWO)
(a) Event Viewer
(b) Task Manager
(c) System Information
(d) Command Prompt with tasklist and taskkill commands
(e) Disk Management
Ans: (b) and (d)
Task Manager displays CPU usage by process with ability to end tasks; tasklist command shows running processes and taskkill terminates them, providing command-line alternative to Task Manager.
Q3: Which command would you run from an elevated command prompt to repair corrupted Windows system files?
(a) chkdsk /f
(b) sfc /scannow
(c) diskpart
(d) gpupdate /force
Ans: (b)
System File Checker (sfc /scannow) scans and repairs corrupted Windows system files using cached copies from the component store.
Q4: Performance-Based Task - Configure Windows Update to pause updates for 14 days:
Environment: You are working on a Windows 10 Pro computer. The Settings app is open to the home screen. The computer is connected to the internet.
Expected steps:
Q5: An organization requires that all workstations prevent users from changing their passwords and force password changes every 90 days. Which tool should be used to configure this policy on standalone workstations?
(a) User Account Control settings
(b) Local Security Policy (secpol.msc)
(c) Computer Management
(d) Registry Editor
Ans: (b)
Local Security Policy (secpol.msc) configures password policies including maximum password age and user rights; navigate to Account Policies > Password Policy to set these requirements.
Q6: A user accidentally deleted important files from their Documents folder two days ago. The files are not in Recycle Bin. What Windows feature could recover these files if it was previously enabled?
(a) Windows Defender
(b) File History or System Restore
(c) Disk Cleanup
(d) Storage Spaces
Ans: (b)
File History creates backup copies of files in user libraries and can restore previous versions; alternatively, System Restore can return system to previous state if restore point exists from before deletion.
Q7: A technician needs to determine the exact Windows version, build number, and edition installed on a computer. Which command provides this information in a graphical window?
(a) msinfo32
(b) winver
(c) systeminfo
(d) msconfig
Ans: (b)
Winver command opens "About Windows" dialog displaying Windows version, edition, build number, and installation date in user-friendly graphical format.