CompTIA A+ Exam  >  CompTIA A+ Notes  >   Core 2  >  System Configuration

System Configuration

Overview

System Configuration covers essential Windows, macOS, and Linux configuration tasks tested on the CompTIA A+ Core 2 exam. You'll need to know how to configure user accounts, system settings, accessibility options, power management, network settings, and device synchronization across operating systems. This chapter focuses on the practical procedures and tools IT professionals use daily to configure workstations and troubleshoot configuration issues.

Core Concepts

Windows System Configuration

Control Panel is the legacy interface for system configuration in Windows, still heavily tested because many administrative tools remain accessible only through it. Even though Settings app has replaced many functions in Windows 10/11, you need to know both interfaces.

Key Control Panel applets:

  • Internet Options - Configure proxy settings, security zones, privacy settings, and manage certificates
  • Devices and Printers - Add, remove, and troubleshoot printers and connected devices
  • Programs and Features - Uninstall applications and turn Windows features on/off
  • Network and Sharing Center - View network status, change adapter settings, configure sharing options
  • System - View computer name, domain/workgroup settings, Remote Desktop configuration, system protection
  • Windows Defender Firewall - Configure firewall rules and allow apps through firewall
  • Mail - Configure Outlook email profiles (32-bit version)
  • Sound - Configure playback and recording devices, set default audio devices
  • User Accounts - Change account types, manage credentials, configure UAC settings
  • Device Manager - Manage hardware drivers, disable devices, view resource conflicts
  • Indexing Options - Configure what Windows Search indexes for faster searches
  • Administrative Tools - Access advanced system tools like Event Viewer, Performance Monitor, Services
  • File Explorer Options - Show hidden files, configure folder views, change default programs
  • Power Options - Configure sleep settings, create custom power plans, set button actions

Settings App is the modern configuration interface starting in Windows 10. Many exam scenarios will specify whether to use Settings or Control Panel.

Critical Settings categories:

  • System - Display settings, notifications, power, storage, multitasking, remote desktop
  • Devices - Bluetooth, printers, mouse, typing, AutoPlay settings
  • Network & Internet - Wi-Fi, Ethernet, VPN, airplane mode, proxy settings
  • Personalization - Background, colors, lock screen, themes, taskbar configuration
  • Apps - Uninstall apps, default apps, startup apps, optional features
  • Accounts - User account info, sign-in options, access work/school, family settings, sync settings
  • Time & Language - Date/time, region, language packs, speech settings
  • Gaming - Game Mode, Xbox Game Bar, captures, broadcasting
  • Ease of Access - Narrator, Magnifier, high contrast, closed captions, keyboard settings
  • Privacy - Location services, camera permissions, microphone access, diagnostic data
  • Update & Security - Windows Update, Activation, Backup, Recovery, Windows Security

System Utilities and Administrative Tools

System Information (msinfo32.exe) displays detailed hardware, components, and software environment information. Use this to quickly identify system specs, driver versions, and hardware resources without opening Device Manager.

Resource Monitor (resmon.exe) provides real-time monitoring of CPU, memory, disk, and network usage by process. More detailed than Task Manager for identifying resource bottlenecks.

System Configuration (msconfig.exe) controls boot options, startup programs, and services. Use Safe Boot option for troubleshooting, configure boot timeout, and selectively disable startup items.

Boot tab options:

  • Safe boot: Minimal - Boots with minimal drivers and services
  • Safe boot: Network - Safe boot with network drivers
  • Safe boot: Active Directory repair - Safe boot for domain controller repairs
  • No GUI boot - Doesn't show Windows logo during boot
  • Boot log - Creates ntbtlog.txt with all drivers loaded during boot

Disk Management (diskmgmt.msc) manages drives, partitions, and volumes. You can initialize disks, create/delete partitions, assign drive letters, extend/shrink volumes, and set drives online/offline.

Registry Editor (regedit.exe) directly edits the Windows registry database. Always back up registry keys before modification. The five main registry hives are HKEY_CLASSES_ROOT (HKCR), HKEY_CURRENT_USER (HKCU), HKEY_LOCAL_MACHINE (HKLM), HKEY_USERS (HKU), and HKEY_CURRENT_CONFIG (HKCC).

User Account Configuration

Account types determine user privileges. Standard users can run applications and change personal settings but cannot install software or modify system settings. Administrator accounts have full system control.

Windows account types:

  • Standard User - Cannot install software, modify system files, or change settings affecting other users
  • Administrator - Full control over system, can install software, create users, modify any settings
  • Guest - Temporary access with very limited permissions, disabled by default in modern Windows

User Account Control (UAC) prompts for elevation when administrative actions are attempted. Configure UAC levels from "Always notify" to "Never notify" in User Accounts control panel. Default setting is "Notify me only when apps try to make changes" which balances security and usability.

Local Users and Groups (lusrmgr.msc) manages local accounts and group memberships on Windows Pro and higher editions. Home editions lack this tool and require Settings app or net user commands.

Important built-in groups:

  • Administrators - Full system control
  • Users - Standard user permissions
  • Power Users - Legacy group, limited use in modern Windows
  • Remote Desktop Users - Can connect via Remote Desktop
  • Backup Operators - Can backup and restore files regardless of permissions

Network Configuration

Network adapter settings include IP configuration, DNS servers, gateway, and advanced properties. Configure through Network and Sharing Center → Change adapter settings → Adapter properties → IPv4 properties.

TCP/IPv4 configuration options:

  • Obtain an IP address automatically - Uses DHCP to get IP, subnet mask, gateway, DNS
  • Use the following IP address - Manual static IP configuration
  • Obtain DNS server address automatically - Gets DNS from DHCP
  • Use the following DNS server addresses - Manual DNS server configuration

Proxy settings route web traffic through an intermediary server. Configure in Internet Options → Connections → LAN settings or Settings → Network & Internet → Proxy. Proxy autoconfiguration uses PAC files, while manual configuration requires proxy server address and port.

VPN configuration creates encrypted connections to remote networks. Set up through Settings → Network & Internet → VPN → Add a VPN connection. Common protocols are IKEv2, L2TP/IPsec, PPTP, and SSTP.

Wi-Fi settings manage wireless connections and security. Configure network security type (WPA2/WPA3 Personal or Enterprise), metered connection status, and random hardware addresses for privacy.

Accessibility Options

Narrator reads screen content aloud for visually impaired users. Activated with Windows+Ctrl+Enter.

Magnifier enlarges portions of the screen. Launch with Windows++ (plus key). Configure magnification levels and tracking options.

Speech Recognition allows voice control of computer. Requires microphone setup and voice training for accuracy.

High Contrast themes increase visibility by using distinct colors. Enable with Left Alt+Left Shift+Print Screen.

Sticky Keys allows sequential pressing of key combinations instead of simultaneous. Press Shift five times to toggle.

Filter Keys ignores brief or repeated keystrokes. Hold right Shift for eight seconds to enable.

Toggle Keys plays sounds when Caps Lock, Num Lock, or Scroll Lock are pressed. Enable in Ease of Access settings.

Power Management

Power plans control how the computer uses energy. Default plans are Balanced, Power Saver, and High Performance (may need to be enabled).

Power states:

  • Sleep (S3) - RAM stays powered, other components off, quick resume
  • Hibernate (S4) - RAM contents saved to disk, complete power off, slower resume than sleep
  • Hybrid Sleep - Combines sleep and hibernate, saves RAM to disk then enters sleep
  • Fast Startup - Hibernates kernel session for faster boot, enabled by default in Windows 10/11

Configure individual settings like display timeout, sleep timeout, and what power buttons do through Power Options → Change plan settings → Change advanced power settings.

Synchronization and Mobile Device Management

Microsoft Account sync synchronizes settings, passwords, preferences, and files across Windows devices. Configure through Settings → Accounts → Sync your settings. Synced items include theme, passwords, language preferences, ease of access settings, and other Windows settings.

ActiveSync synchronizes email, calendar, and contacts between mobile devices and Exchange servers. Configure in Mail app or through Accounts settings for corporate email access.

Mobile Application Management (MAM) controls which apps can access corporate data without managing the entire device. Allows BYOD scenarios where personal device stays user-controlled but business data stays protected.

Mobile Device Management (MDM) provides centralized control over mobile devices including configuration, security policies, app deployment, and remote wipe capabilities. Windows supports MDM enrollment through Settings → Accounts → Access work or school.

macOS System Preferences

System Preferences is the macOS equivalent of Windows Settings/Control Panel. Access through Apple menu → System Preferences or clicking gear icon in Dock.

Critical preference panes:

  • Displays - Resolution, arrangement, Night Shift, color profiles
  • Network - Configure Ethernet, Wi-Fi, VPN, proxies, DNS
  • Printers & Scanners - Add printers, manage print queues, set default printer
  • Privacy & Security - Location services, contacts, calendar, photos, camera, microphone permissions
  • Accessibility - VoiceOver, Zoom, display accommodations, speech, keyboard, mouse options
  • Time Machine - Configure backup disk, schedule backups, restore files
  • Users & Groups - Create users, set account types, configure login items, change passwords
  • FileVault - Full disk encryption, enable/disable, recovery key management
  • Firewall - Enable/disable, configure application exceptions

Keychain Access manages passwords, certificates, and encryption keys. View saved passwords, trusted certificates, and secure notes.

Spotlight provides system-wide search. Configure what Spotlight indexes and privacy exclusions in System Preferences → Spotlight.

iCloud synchronizes data across Apple devices including documents, photos, mail, contacts, calendars, and keychain passwords. Configure through System Preferences → Apple ID → iCloud.

Linux System Configuration

Linux configuration varies by distribution but follows similar patterns. Most settings exist as text configuration files in /etc directory.

Network configuration files:

  • /etc/network/interfaces - Debian/Ubuntu static IP configuration
  • /etc/sysconfig/network-scripts/ - Red Hat/CentOS network scripts
  • /etc/resolv.conf - DNS server configuration
  • /etc/hostname - System hostname
  • /etc/hosts - Static hostname to IP mappings

User management commands:

  • useradd - Create new user account
  • usermod - Modify existing user account
  • userdel - Delete user account
  • passwd - Change user password
  • groupadd - Create new group
  • groups - Display user's group memberships

User account information stored in /etc/passwd, encrypted passwords in /etc/shadow, and group information in /etc/group.

Package managers install and update software:

  • apt/apt-get - Debian/Ubuntu package manager
  • yum - Red Hat/CentOS package manager (older versions)
  • dnf - Red Hat/CentOS/Fedora package manager (newer versions)

Troubleshooting

1. Symptom: User reports that desktop shortcuts and personalization settings are reset every time they log out and back in on a Windows domain computer. Their documents save correctly but theme colors, desktop icons, and taskbar customizations disappear.

Likely Cause: Corrupt user profile or mandatory profile enforced by Group Policy preventing profile changes from persisting.

Fix: Check Group Policy settings for mandatory profiles. If not policy-enforced, create new local user profile by renaming C:\Users\[username] folder to [username].old while user logged out, then have user log back in to create fresh profile. Copy personal files from old profile folder to new one. If domain roaming profile is corrupt, delete cached profile from local machine and roaming profile from server share to force recreation.

2. Symptom: Windows computer takes 10 minutes to reach login screen after power on. Windows logo appears quickly but then black screen with spinning dots runs for extended period before login prompt appears.

Likely Cause: Excessive startup programs and services loading during boot process, or network location detection timeout if network cable unplugged or network unavailable.

Fix: Open msconfig.exe and navigate to Startup tab, click "Open Task Manager," disable unnecessary startup programs with high startup impact. Return to msconfig Services tab, check "Hide all Microsoft services," disable third-party services not required at startup. If network-related, check network adapter is connected and can reach network resources, or disable network location detection timeout via Group Policy or registry if appropriate for environment.

3. Symptom: macOS user cannot connect to corporate Wi-Fi network even though network appears in list and correct password is entered. Other users connect successfully to same network. Error message states "Unable to join network."

Likely Cause: Stored keychain entry for network contains outdated or corrupt credentials, or network configuration profile conflict.

Fix: Open Keychain Access, search for Wi-Fi network name, delete all entries related to that network. Open System Preferences → Network, select Wi-Fi, click Advanced, find network in preferred networks list, remove it using minus button. Reconnect to network and enter credentials fresh. If enterprise network with certificate authentication, verify correct certificate is installed and trusted in Keychain Access, and check configuration profile in System Preferences → Profiles for conflicts or expiration.

Step-by-Step Procedures

Task: Configure a Static IP Address in Windows

  1. Open Control Panel and navigate to Network and Sharing Center
  2. Click "Change adapter settings" in left pane
  3. Right-click the network adapter you want to configure and select Properties
  4. Select "Internet Protocol Version 4 (TCP/IPv4)" and click Properties button
  5. Select "Use the following IP address" radio button
  6. Enter IP address in format xxx.xxx.xxx.xxx (e.g., 192.168.1.100)
  7. Enter subnet mask (typically 255.255.255.0 for Class C networks)
  8. Enter default gateway (router IP address, typically 192.168.1.1)
  9. Select "Use the following DNS server addresses" radio button
  10. Enter preferred DNS server address (internal DNS or public like 8.8.8.8)
  11. Enter alternate DNS server address if available (e.g., 8.8.4.4)
  12. Click OK to close TCP/IPv4 properties
  13. Click OK to close adapter properties
  14. Open Command Prompt and run "ipconfig /all" to verify configuration
  15. Run "ping [gateway IP]" to test local connectivity
  16. Run "ping [external IP like 8.8.8.8]" to test internet connectivity
  17. Run "nslookup google.com" to verify DNS resolution

Practice Questions

Q1: A user calls the help desk reporting their Windows 10 laptop screen is difficult to read in bright office lighting. They need higher contrast between text and background. Which accessibility feature should you enable?
(a) Magnifier
(b) Narrator
(c) High Contrast themes
(d) Night Light

Ans: (c)
High Contrast themes use distinct colors with sharp differences to improve visibility, which directly addresses the user's difficulty reading text against backgrounds in bright lighting conditions.

Q2: A technician needs to prevent a Windows service from starting automatically but wants to allow manual starting if needed. Which startup type should be configured in services.msc?
(a) Automatic
(b) Automatic (Delayed Start)
(c) Manual
(d) Disabled

Ans: (c)
Manual startup type prevents automatic starting but allows the service to be started manually when needed, while Disabled prevents both automatic and manual starting.

Q3: An organization wants to allow employees to use personal smartphones for email while maintaining control over corporate data and ability to remotely wipe business information without affecting personal content. Which two technologies should be implemented? (Select TWO)
(a) Mobile Device Management (MDM)
(b) Mobile Application Management (MAM)
(c) ActiveSync
(d) Full device encryption
(e) Geolocation services

Ans: (b) and (c)
Mobile Application Management (MAM) controls corporate apps and data without managing the entire device, and ActiveSync provides email synchronization with remote wipe capabilities for corporate data only, making them ideal for BYOD scenarios requiring data separation.

Q4: Which command would display all current TCP/IPv4 configuration including IP address, subnet mask, default gateway, and DNS servers on a Windows computer?
(a) ipconfig
(b) ipconfig /all
(c) netstat -a
(d) nslookup

Ans: (b)
The ipconfig /all command displays complete TCP/IP configuration details including MAC address, DHCP status, DNS servers, and lease information, while ipconfig alone shows only basic IP, subnet, and gateway information.

Q5: Performance-based task: You are configuring a new Windows 10 Pro workstation in a domain environment. The computer needs static IP 10.50.1.25 with subnet mask 255.255.255.0, gateway 10.50.1.1, primary DNS 10.50.1.10, and secondary DNS 10.50.1.11. After configuration, verify connectivity to the gateway and DNS resolution.
List the exact steps required to complete this task.

Expected steps:

  1. Navigate to Network and Sharing Center via Control Panel
  2. Click Change adapter settings
  3. Right-click Ethernet adapter, select Properties
  4. Select Internet Protocol Version 4 (TCP/IPv4), click Properties
  5. Select "Use the following IP address"
  6. Enter IP: 10.50.1.25, Subnet: 255.255.255.0, Gateway: 10.50.1.1
  7. Select "Use the following DNS server addresses"
  8. Enter Preferred: 10.50.1.10, Alternate: 10.50.1.11
  9. Click OK twice to close dialogs
  10. Open Command Prompt
  11. Execute "ping 10.50.1.1" to verify gateway connectivity
  12. Execute "nslookup google.com" to verify DNS resolution

Q6: According to security best practices, which User Account Control (UAC) setting provides the best balance between security and usability for standard business workstations?
(a) Always notify
(b) Notify me only when apps try to make changes to my computer (default)
(c) Notify me only when apps try to make changes (do not dim desktop)
(d) Never notify

Ans: (b)
The default UAC setting prompts only when applications attempt system changes and dims the desktop to prevent other processes from interfering, providing strong security without excessive prompts for routine Windows setting changes.

Q7: A macOS user needs to restore files accidentally deleted yesterday. The Mac has Time Machine configured with hourly backups to an external drive. What is the quickest method to restore these files?
(a) Reinstall macOS from Recovery and restore entire system
(b) Use Migration Assistant to bring files from backup
(c) Enter Time Machine from Finder and navigate to previous day snapshot
(d) Use Terminal with tmutil command to mount backup and copy files

Ans: (c)
Time Machine provides graphical interface accessed directly from Finder to browse historical snapshots and selectively restore files from any backup point, making it the fastest and most user-friendly restoration method for individual files.

Quick Review

  • Control Panel and Settings app both provide system configuration - know which tasks require which interface for exam scenarios
  • msconfig.exe controls boot options and startup programs; use Safe Boot for troubleshooting and Startup tab to disable startup items
  • Standard users cannot install software or modify system settings; Administrator accounts have full system control
  • UAC default setting prompts only when apps try to make system changes and dims desktop; "Never notify" disables all security prompts
  • Static IP configuration requires IP address, subnet mask, default gateway, and DNS servers; verify with ipconfig /all
  • Sleep (S3) keeps RAM powered for quick resume; Hibernate (S4) saves RAM to disk and powers off completely
  • High Contrast improves visibility with distinct colors; Magnifier enlarges screen portions; Narrator reads screen content aloud
  • ActiveSync synchronizes email, calendar, contacts between devices and Exchange; MAM manages corporate apps without controlling entire device
  • macOS System Preferences accessed through Apple menu; FileVault provides full disk encryption; Time Machine handles backups
  • Linux network configuration files in /etc directory; user accounts in /etc/passwd; encrypted passwords in /etc/shadow; apt/yum/dnf manage packages
The document System Configuration is a part of the CompTIA A+ Course CompTIA A+ Core 2.
All you need of CompTIA A+ at this link: CompTIA A+

Top Courses for CompTIA A+

Related Searches
Previous Year Questions with Solutions, Free, Summary, study material, MCQs, System Configuration, Viva Questions, past year papers, ppt, pdf , Exam, Important questions, practice quizzes, Sample Paper, System Configuration, Semester Notes, System Configuration, Objective type Questions, mock tests for examination, shortcuts and tricks, video lectures, Extra Questions;