System Configuration covers essential Windows, macOS, and Linux configuration tasks tested on the CompTIA A+ Core 2 exam. You'll need to know how to configure user accounts, system settings, accessibility options, power management, network settings, and device synchronization across operating systems. This chapter focuses on the practical procedures and tools IT professionals use daily to configure workstations and troubleshoot configuration issues.
Control Panel is the legacy interface for system configuration in Windows, still heavily tested because many administrative tools remain accessible only through it. Even though Settings app has replaced many functions in Windows 10/11, you need to know both interfaces.
Key Control Panel applets:
Settings App is the modern configuration interface starting in Windows 10. Many exam scenarios will specify whether to use Settings or Control Panel.
Critical Settings categories:
System Information (msinfo32.exe) displays detailed hardware, components, and software environment information. Use this to quickly identify system specs, driver versions, and hardware resources without opening Device Manager.
Resource Monitor (resmon.exe) provides real-time monitoring of CPU, memory, disk, and network usage by process. More detailed than Task Manager for identifying resource bottlenecks.
System Configuration (msconfig.exe) controls boot options, startup programs, and services. Use Safe Boot option for troubleshooting, configure boot timeout, and selectively disable startup items.
Boot tab options:
Disk Management (diskmgmt.msc) manages drives, partitions, and volumes. You can initialize disks, create/delete partitions, assign drive letters, extend/shrink volumes, and set drives online/offline.
Registry Editor (regedit.exe) directly edits the Windows registry database. Always back up registry keys before modification. The five main registry hives are HKEY_CLASSES_ROOT (HKCR), HKEY_CURRENT_USER (HKCU), HKEY_LOCAL_MACHINE (HKLM), HKEY_USERS (HKU), and HKEY_CURRENT_CONFIG (HKCC).
Account types determine user privileges. Standard users can run applications and change personal settings but cannot install software or modify system settings. Administrator accounts have full system control.
Windows account types:
User Account Control (UAC) prompts for elevation when administrative actions are attempted. Configure UAC levels from "Always notify" to "Never notify" in User Accounts control panel. Default setting is "Notify me only when apps try to make changes" which balances security and usability.
Local Users and Groups (lusrmgr.msc) manages local accounts and group memberships on Windows Pro and higher editions. Home editions lack this tool and require Settings app or net user commands.
Important built-in groups:
Network adapter settings include IP configuration, DNS servers, gateway, and advanced properties. Configure through Network and Sharing Center → Change adapter settings → Adapter properties → IPv4 properties.
TCP/IPv4 configuration options:
Proxy settings route web traffic through an intermediary server. Configure in Internet Options → Connections → LAN settings or Settings → Network & Internet → Proxy. Proxy autoconfiguration uses PAC files, while manual configuration requires proxy server address and port.
VPN configuration creates encrypted connections to remote networks. Set up through Settings → Network & Internet → VPN → Add a VPN connection. Common protocols are IKEv2, L2TP/IPsec, PPTP, and SSTP.
Wi-Fi settings manage wireless connections and security. Configure network security type (WPA2/WPA3 Personal or Enterprise), metered connection status, and random hardware addresses for privacy.
Narrator reads screen content aloud for visually impaired users. Activated with Windows+Ctrl+Enter.
Magnifier enlarges portions of the screen. Launch with Windows++ (plus key). Configure magnification levels and tracking options.
Speech Recognition allows voice control of computer. Requires microphone setup and voice training for accuracy.
High Contrast themes increase visibility by using distinct colors. Enable with Left Alt+Left Shift+Print Screen.
Sticky Keys allows sequential pressing of key combinations instead of simultaneous. Press Shift five times to toggle.
Filter Keys ignores brief or repeated keystrokes. Hold right Shift for eight seconds to enable.
Toggle Keys plays sounds when Caps Lock, Num Lock, or Scroll Lock are pressed. Enable in Ease of Access settings.
Power plans control how the computer uses energy. Default plans are Balanced, Power Saver, and High Performance (may need to be enabled).
Power states:
Configure individual settings like display timeout, sleep timeout, and what power buttons do through Power Options → Change plan settings → Change advanced power settings.
Microsoft Account sync synchronizes settings, passwords, preferences, and files across Windows devices. Configure through Settings → Accounts → Sync your settings. Synced items include theme, passwords, language preferences, ease of access settings, and other Windows settings.
ActiveSync synchronizes email, calendar, and contacts between mobile devices and Exchange servers. Configure in Mail app or through Accounts settings for corporate email access.
Mobile Application Management (MAM) controls which apps can access corporate data without managing the entire device. Allows BYOD scenarios where personal device stays user-controlled but business data stays protected.
Mobile Device Management (MDM) provides centralized control over mobile devices including configuration, security policies, app deployment, and remote wipe capabilities. Windows supports MDM enrollment through Settings → Accounts → Access work or school.
System Preferences is the macOS equivalent of Windows Settings/Control Panel. Access through Apple menu → System Preferences or clicking gear icon in Dock.
Critical preference panes:
Keychain Access manages passwords, certificates, and encryption keys. View saved passwords, trusted certificates, and secure notes.
Spotlight provides system-wide search. Configure what Spotlight indexes and privacy exclusions in System Preferences → Spotlight.
iCloud synchronizes data across Apple devices including documents, photos, mail, contacts, calendars, and keychain passwords. Configure through System Preferences → Apple ID → iCloud.
Linux configuration varies by distribution but follows similar patterns. Most settings exist as text configuration files in /etc directory.
Network configuration files:
User management commands:
User account information stored in /etc/passwd, encrypted passwords in /etc/shadow, and group information in /etc/group.
Package managers install and update software:
1. Symptom: User reports that desktop shortcuts and personalization settings are reset every time they log out and back in on a Windows domain computer. Their documents save correctly but theme colors, desktop icons, and taskbar customizations disappear.
Likely Cause: Corrupt user profile or mandatory profile enforced by Group Policy preventing profile changes from persisting.
Fix: Check Group Policy settings for mandatory profiles. If not policy-enforced, create new local user profile by renaming C:\Users\[username] folder to [username].old while user logged out, then have user log back in to create fresh profile. Copy personal files from old profile folder to new one. If domain roaming profile is corrupt, delete cached profile from local machine and roaming profile from server share to force recreation.
2. Symptom: Windows computer takes 10 minutes to reach login screen after power on. Windows logo appears quickly but then black screen with spinning dots runs for extended period before login prompt appears.
Likely Cause: Excessive startup programs and services loading during boot process, or network location detection timeout if network cable unplugged or network unavailable.
Fix: Open msconfig.exe and navigate to Startup tab, click "Open Task Manager," disable unnecessary startup programs with high startup impact. Return to msconfig Services tab, check "Hide all Microsoft services," disable third-party services not required at startup. If network-related, check network adapter is connected and can reach network resources, or disable network location detection timeout via Group Policy or registry if appropriate for environment.
3. Symptom: macOS user cannot connect to corporate Wi-Fi network even though network appears in list and correct password is entered. Other users connect successfully to same network. Error message states "Unable to join network."
Likely Cause: Stored keychain entry for network contains outdated or corrupt credentials, or network configuration profile conflict.
Fix: Open Keychain Access, search for Wi-Fi network name, delete all entries related to that network. Open System Preferences → Network, select Wi-Fi, click Advanced, find network in preferred networks list, remove it using minus button. Reconnect to network and enter credentials fresh. If enterprise network with certificate authentication, verify correct certificate is installed and trusted in Keychain Access, and check configuration profile in System Preferences → Profiles for conflicts or expiration.
Task: Configure a Static IP Address in Windows
Q1: A user calls the help desk reporting their Windows 10 laptop screen is difficult to read in bright office lighting. They need higher contrast between text and background. Which accessibility feature should you enable?
(a) Magnifier
(b) Narrator
(c) High Contrast themes
(d) Night Light
Ans: (c)
High Contrast themes use distinct colors with sharp differences to improve visibility, which directly addresses the user's difficulty reading text against backgrounds in bright lighting conditions.
Q2: A technician needs to prevent a Windows service from starting automatically but wants to allow manual starting if needed. Which startup type should be configured in services.msc?
(a) Automatic
(b) Automatic (Delayed Start)
(c) Manual
(d) Disabled
Ans: (c)
Manual startup type prevents automatic starting but allows the service to be started manually when needed, while Disabled prevents both automatic and manual starting.
Q3: An organization wants to allow employees to use personal smartphones for email while maintaining control over corporate data and ability to remotely wipe business information without affecting personal content. Which two technologies should be implemented? (Select TWO)
(a) Mobile Device Management (MDM)
(b) Mobile Application Management (MAM)
(c) ActiveSync
(d) Full device encryption
(e) Geolocation services
Ans: (b) and (c)
Mobile Application Management (MAM) controls corporate apps and data without managing the entire device, and ActiveSync provides email synchronization with remote wipe capabilities for corporate data only, making them ideal for BYOD scenarios requiring data separation.
Q4: Which command would display all current TCP/IPv4 configuration including IP address, subnet mask, default gateway, and DNS servers on a Windows computer?
(a) ipconfig
(b) ipconfig /all
(c) netstat -a
(d) nslookup
Ans: (b)
The ipconfig /all command displays complete TCP/IP configuration details including MAC address, DHCP status, DNS servers, and lease information, while ipconfig alone shows only basic IP, subnet, and gateway information.
Q5: Performance-based task: You are configuring a new Windows 10 Pro workstation in a domain environment. The computer needs static IP 10.50.1.25 with subnet mask 255.255.255.0, gateway 10.50.1.1, primary DNS 10.50.1.10, and secondary DNS 10.50.1.11. After configuration, verify connectivity to the gateway and DNS resolution.
List the exact steps required to complete this task.
Expected steps:
Q6: According to security best practices, which User Account Control (UAC) setting provides the best balance between security and usability for standard business workstations?
(a) Always notify
(b) Notify me only when apps try to make changes to my computer (default)
(c) Notify me only when apps try to make changes (do not dim desktop)
(d) Never notify
Ans: (b)
The default UAC setting prompts only when applications attempt system changes and dims the desktop to prevent other processes from interfering, providing strong security without excessive prompts for routine Windows setting changes.
Q7: A macOS user needs to restore files accidentally deleted yesterday. The Mac has Time Machine configured with hourly backups to an external drive. What is the quickest method to restore these files?
(a) Reinstall macOS from Recovery and restore entire system
(b) Use Migration Assistant to bring files from backup
(c) Enter Time Machine from Finder and navigate to previous day snapshot
(d) Use Terminal with tmutil command to mount backup and copy files
Ans: (c)
Time Machine provides graphical interface accessed directly from Finder to browse historical snapshots and selectively restore files from any backup point, making it the fastest and most user-friendly restoration method for individual files.