Knowdirect [CompTIA A+] 220-1001

¡Supera tus tareas y exámenes ahora con Quizwiz!

This is the default IMAP non-encrypted port:

Port 143

SMTP (Simple Mail Transfer Protocol)

Port 25

A user phones the help desk and tells you that he needs to ban internet access to keep his staff from perusing the web. He's connected to his firewall and wants to know which port he should block to restrict just HTTP traffic during business hours. What port should he use?

Port 80

Ethernet port

Primarily used with wired networks using a 8-pin RJ-45 connector

S/MIME (Secure/Multipurpose Internet Mail Extensions)

Protocol for sending digitally signed encrypted messages. allows you to encrypt emails and digitally sign them. When you use ________ with an email message, it helps the people who receive that message to be certain that what they see in their inbox is the exact message that started with the sender.

RAID 10

RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data. It requires a minimum of four disks and stripes data across mirrored pairs. RAID 10 provides data redundancy and improves performance, and is a good option for I/O-intensive applications — including email, web servers, databases, and operations that require high disk performance — and organizations that require little to no downtime.

S.M.A.R.T.

Self-Monitoring, Analysis and Reporting Technology is a monitoring system included in computer hard disk drives (HDDs), solid-state drives (SSDs), and eMMC drives. Its primary function is to detect and report various indicators of drive reliability with the intent of anticipating imminent hardware failures.

Micro-usb

Smallest type of USB, commonly used for mobile Phones and tablets.

Your friend came to you to provide him a solution to his problem. He needs a device that allows him to see his email notifications and instant messages from Messenger and WhatsApp on the go. What device would you recommend to your friend? Smartwatch

Smartwatch

This is the phrase used to refer to a single endpoint of a network communication session

Socket Number

Port 3389

Remote Desk Protocol (RDP)

AFP (Apple Filing Protocol)

TCP 548 Works with SLP (Service Location Protocol) Can work with tcp/427 udp/427

What tcp does Telnet use?

TCP/23

What does Telnet stand for?

Telecommunication Network

Port 23

Telnet

apt-get

This command is used on Debian-based Linux distributions. It allows users to install new software packages on a Linux system. It is currently not deprecated and is still being used in activities like scripting.

passwd

This is the command used to change passwords in Linux.

S/PDIF

This port is supported by fiber optic cabling, occasionally by a coaxial-type connector that screws on. It is used for audio transfer.

cd ../..

Use this command to move up two directories from where she started while in the command line mode, a user can use this to move down two directories to view the contents of the subdirectory.

eSATA port

Used almost exclusively with external hard drives

DVI port

Used for monitors or projectors

5th step of the troubleshooting methodology

Verify full system functionality and, if applicable, implement preventive measures

Check the power supply supply from the workstation

When a computer keeps rebooting itself means there is a symptom of a faulty power supply or the computer is overheating. If the power supply is faulty, the computer will reboot itself. Therefore, you should _______________________ first to determine if that is the root cause of the issue, and then replace the power supply, if required.

Check the digitizer settings

When the touch screen of the laptop doesn't function properly what do you need to check first in order to troubleshoot the issue?

Nancy's client wants a new graphics workstation. The client's small business has ten current workstations connected in a Windows domain, and the client wants the new graphics workstation to be part of that domain. What edition of Windows 10 should Nancy install on the new computer to accomplish this goal and provide the best value?

Windows 10 Pro

You've just replaced Nancy's Windows 7 PC with a new Windows 10 machine. What post-installation tool should you run to make the transition as painless as possible?

Windows Easy Transfer

Wi-Fi

Wireless local area network that uses radio signals to transmit data

Port replicator

an external device that provides connections to peripheral devices through ports built into the device. The monitor, printer, network, keyboard and muse are permanently plugged into this. Provides some/all functionality of a docking station. Generally provides a universal solution for all laptaps via USB

fiber-optic cable

connection type that uses light instead of electricity to transmit signals

Molex

connectors bring DC power to the drives inside a PC case. The large one on the right is used for disk, CD-ROM, and DVD drives, while the small connector is used for floppy drives and other devices.

A network switch

connects devices within a network (often a local area network) and forwards data packets to and from those devices. Unlike a router, a switch only sends data to the single device it is intended for (which may be another switch, a router, or a user's computer), not to networks of multiple devices.

PAN (Personal Area Network)

connects electronic devices within a user's immediate area. The size of a ______ranges from a few centimeters to a few meters. One of the most common real-world examples of a ____ is the connection between a Bluetooth earpiece and a smartphone. ____ can also connect laptops, tablets, printers, keyboards, and other computerized devices.

Switches

facilitate the sharing of resources by connecting together all the devices, including computers, printers, and servers, in a small business network. These connected devices can share information and talk to each other, regardless of where they are in a building or on a campus.

Class C networks

have: The first octet in the range of 192-223, inclusive, and their network IDs have a 0 in the last three octets.

VR Headsets

head-mounted device that provides virtual reality for the wearer. Virtual reality headsets are widely used with video games but they are also used in other applications, including simulators and trainers.

LAN (Local Area Network)

is a collection of devices connected together in one physical location, such as a building, office, or home. A ____can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school. Regardless of size, a ______ single defining characteristic is that it connects devices that are in a single, limited area.

MAN (Metropolitan Area Network)

is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A ___ is larger than a local area network (LAN) but smaller than a wide area network (WAN).

E-readers

is a device for reading content, such as e-books, newspapers and documents.

Router

is a device that communicates between the internet and the devices in your home that connects to the internet. As its name implies, it "routes" traffic between the devices and the internet.

Access point

is a device that creates a wireless local area network, or WLAN, usually in an office or large building. An _________ connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.

A network bridge

is a device that divides a network into segments. Each segment represent a separate collision domain, so the number of collisions on the network is reduced. Each collision domain has its own separate bandwidth, so a bridge also improves the network performance. The bridge is considered a correct answer but we need the most advanced device which is the switch.

Smart card reader

is a device that is used to read a smart card. A____________is a plastic badge that incorporates an installed coordinated circuit that can be either a safe micro-controller or a memory chip. These cards have the capacity to store a lot of information, do encryption and validation as well. These cards include your credit/debit card, medical insurance among others.

barcode reader

is a device used to capture and read information contained in a barcode. Barcodes are generally used to help track inventory, but there are many more possibilities and interesting ways to use them.

Crimper

is a device used to conjoin two pieces of metal by deforming one or both of them to hold each other. The result of the tool's work is called a crimp. An example of crimping is affixing a connector to the end of a cable. For instance, network cables and phone cables are created using a crimping tool to join RJ-45 and RJ-11 connectors to both ends of phone or Cat 5 cable.

DSL (Digital subscriber line)

is a family of technologies that are used to transmit digital data over telephone lines. In telecommunications marketing, it is widely understood to mean asymmetric _______, the most commonly installed ______technology, for Internet access.

Automatic Private IP Addressing (APIPA)

is a feature in operating systems (such as Windows) that enables computers to automatically self-configure an IP address and subnet mask when their DHCP server isn't reachable. The IP address range for APIPA is 169.254.0.1-169.254.255.254, with the subnet mask of 255.255.0.0.

RS-232

is a form of serial data transmission. It formally defines signals connecting between a DTE such as a computer terminal, and a DCE, such as a modem

LAN

is a group of computers and devices that share a communications line or wireless link to a server within the same geographical area.

Network Interface Card (NIC)

is a hardware component without which a computer cannot be connected over a network. It is a circuit board installed in a computer that provides a dedicated network connection to the computer.

Hyper threading

is a hardware innovation that allows more than one thread to run on each core. More threads means more work can be done in parallel.

WAN (Wide Area Network)

is a large computer network that connects groups of computers over large distances. ______are often used by large businesses to connect their office networks; each office typically has its own local area network, or LAN, and these LANs connect via a WAN. These long connections may be formed in several different ways, including leased lines, VPNs, or IP tunnels.

IMAP (Internet Message Access Protocol)

is a mail protocol used for accessing email on a remote web server from a local client.

A multimeter

is a measurement tool absolutely necessary in electronics. It combines three essential features: a voltmeter, ohmmeter, and ammeter, and in some cases continuity. allows you to understand what is going on in your circuits. Whenever something in your circuit isn't working, the multimeter will help you troubleshooting.

Dynamic Host Configuration Protocol (DHCP)

is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP. dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.

Dynamic Host Configuration Protocol (DHCP)

is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP. A DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.

Firewall

is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

RAID 5

is a redundant array of independent disks configuration that uses disk striping with parity. Because data and parity are striped evenly across all of the disks, no single disk is a bottleneck. Striping also allows users to reconstruct data in case of a disk failure. It has more usable storage than RAID 1 and RAID 10 configurations and provides performance equivalent to RAID 0.

VPN

is a service that allows you to connect to the Internet via an encrypted tunnel to ensure your online privacy and protect your sensitive data

Thin client

is a simple computer that has been optimized for establishing a remote connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data.

multicore processor

is a single integrated circuit (a.k.a., chip multiprocessor or CMP) that contains multiple core processing units, more commonly known as cores. This is typically a commonplace because it offers advantages such as energy effficiency, concurrency, performance and isolation.

Intrusion Detection System (IDS)

is a software application or hardware appliance that monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds such items. Itdoesn't alter the network packets in any way, whereas IPS prevents the packet from delivery based on the contents of the packet, much like how a firewall prevents traffic by IP address.

RG-59

is a specific type of coaxial cable, often used for low-power video and RF signal connections often used at baseband video frequencies, such as composite video. It may also be used for broadcast frequencies, but its high-frequency losses are too high to allow its use over long distances; in these applications, RG-6 or RG-11 is used instead.

IDE (Integrated Drive Electronics)

is a standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices.

POP3 (Post Office Protocol version 3)

is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

VLAN (Virtual lan)

is a subnetwork that can group together collections of devices on separate physical local area networks (LANs). Makes work easier for network administrators.

Tethering

is a technology that uses your phone or other data enabled device as a modem or router so that you can access the internet with devices that aren't able to, such as your tablet or laptop.

Public Cloud

is a type of computing in which a service provider makes resources available to the public via the internet. Resources vary by provider but may include storage capabilities, applications or virtual machines. allows for scalability and resource sharing that would not otherwise be possible for a single organization to achieve.

A power supply tester

is an electronic device used to test how well a computer power supply is functioning. This type of testing is often performed as part of maintenance on a computer and can be used to try to determine the source of a computer problem. (Burning smells, overheating)

IaaS (Infrastructure as a Service)

is an instant computing infrastructure, provisioned and managed over the internet. It's one of the four types of cloud services, along with software as a service (SaaS), platform as a service (PaaS), and serverless. quickly scales up and down with demand, letting you pay only for what you use. It helps you avoid the expense and complexity of buying and managing your own physical servers and other datacenter infrastructure.

PCIe (peripheral component interconnect express)

is an interface standard for connecting high-speed components. Every desktop PC motherboard has a number of PCIe slots you can use to add GPUs (aka video cards aka graphics cards), RAID cards, Wi-Fi cards or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on the motherboard you buy.

Speaker

is an output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card.

Virtualized workstation

is another term for a client device connecting to a virtual machine (VM) that hosts desktops and applications. These virtual machines work on top of hypervisor software that lies on a single powerful hardware.

Network address translation (NAT)

is designed for IP address conservation. It enables private IP networks that use unregistered IP addresses to connect to the Internet. Operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses before packets are forwarded to another network.

Dial-up connection

is established when two or more communication devices use a public switched telephone network (PSTN) to connect to an Internet service provider (ISP)

DNS syntax

is just a string of characters used as commands which tell the DNS server what to do.

RG-6

is primarily used for cable and satellite signal transmission for residential or commercial installations. This coax cable is thin and easy to bend for wall or ceiling installations and remains the preferred choice to relay cable television signals.

Simple Mail Transfer Protocol (SMTP)

is the standard protocol for sending emails across the Internet.

PTR

is used for the Reverse DNS (Domain Name System) lookup.

Collision Domain

is used to describe a part of a network where packet collisions can occur. Packet collisions occur when two devices on a shared network segment send packets simultaneously. The colliding packets must be discarded and sent again, which reduces network efficency. ____________ occur often in a hub environment because all devices connected to the hub are in the same collision domain.

MX

is used to help route emails.

SRV

is used to identify computers that host specific services.

A

is used to map hostnames to an IPv4 address of the host.

AAAA

is used to map hostnames to an IPv6 address of the host.

CNAME

is used to point a domain or subdomain to another hostname.

TXT

is used to provide the ability to associate text with a zone.

NFC (Near Field Communication)

it enables short-range communication between compatible devices. This requires at least one transmitting device, and another to receive the signal.

Laptop lock

looks like a physical lock that helps in securing your laptop.

The IP address range 127.0.0.0 - 127.255.255.255 is reserved for:

loopback and they are used for testing purposes.

VLANs

make it easy for network administrators to partition a single switched network to match the functional and security requirements of their systems without having to run new cables or make major changes in their current network infrastructure.

Port replicator

provides some or all of the functionality of a docking station, and the two terms are used interchangeably. Provides a universal solution for all laptops via USB

Optical drive

refers to a computer system that allows users to use DVDs, CDs and Blu-ray optical drives.

Cable internet

runs through an underground coaxial cable network. It's usually faster than DSL and a better option if you have a lot of streaming on multiple devices, video calls, large file uploads, or online gaming going on in your home.

SMTP (Simple Mail Transfer Protocol)

server is an application that's primary purpose is to send, receive, and/or relay outgoing mail between email senders and receivers. When you send an email, the ____ server processes your email, decides which server to send the message to, and relays the message to that server.

When S.M.A.R.T. data indicates a possible imminent drive failure:

software running on the host system may notify the user so preventive action can be taken to prevent data loss, and the failing drive can be replaced and data integrity maintained.

HTTPS (Hypertext Transfer Protocol Secure)

tcp 443- uses encrypted Web server communication

POP3 (Post Office Protocol version 3)

tcp/110 - basic mail transfer functionality

IMAP4 (Internet Message Access Protocol, version 4)

tcp/143 - Includes management of email inbox from multiple clients

LDAP (Lightweight Directory Access Protocol)

tcp/389 & udp/389 - Store and retrieve info in a network directory Protocol for reading and writing directories over an IP network. Think of it as a database of everybody that is in your organization.

HTTP (Hypertext Transfer Protocol)

tcp/80 - Uses "in-the-clear" Web Server Communication Nearly used by all web servers and clients

WPA2 and AES

the latest Wi-Fi encryption standard, and the latest AES encryption protocol. You should be using this option. WPA2 is the most secure wireless encryption standard, as it has replaced both WPA and WEP. AES is an extremely strong encryption algorithm, and it used by default in the WPA2 standard.

SMB (Server Message Block)

udp/137 udp 138 tcp 139 Tcp/145 Protocol uses by Microsoft Windows. Uses file sharing, printer sharing. Also called (CIFS) Common Internet file system.

DHCP (Dynamic Host Configuration Protocol)

udp/67-68 Automate the IP address configuration process client/ server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration such as the subnet mask and default getaway.

Task Manager Utility

use to check on the program or to exit the nonresponsive program. If a program is taking too long to boot, you would usually open this at startup to deactivate

RJ-11

used to terminate a phone line. (6 pins)

Telnet

used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines. In addition, telnet is a type of client-server protocol that can be used to open a command line on a remote computer, typically a server.

PaaS (Platform as a Service)

vendor provides hardware and software tools over the internet, and people use these tools to develop applications.___ users tend to be developers. This means developers don't need to start from scratch when creating applications, saving them a lot of time (and money) on writing extensive code. examples: AWS Elastic Beanstalk, Heroku, Windows Azure (mostly used as PaaS), Force.com, OpenShift, Apache Stratos, Magento Commerce Cloud.

Collate

when printing more than one copy of a multi-page document, the copies will print all pages of each copy before printing the second copy. They are sorted into a correctly assembled sequence - and so if you are printing multiple copies it will then print them as sets of documents, not as single pages.

Bluetooth

wireless technology standard used for exchanging data between fixed and mobile devices over short distances.

X.500 Distinguished Names

• attribute=value pairs • Most specific attribute is listed first • This may be similar to the way you already think

USB-C

-The newest, and most versatile, type of USB connector. -24-pin double sided USB Connector (used for both hosts and devices)

Class B networks

128-191 as their first octet and use a default subnet mask of 255.255.0.0.

a SATA power connector has this many pins.

15

Firewall

1st line of defense in network security. is a network security device that monitors incoming and outgoing network traffic decides whether to allow or block specific traffic based on a defined set of security rules. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. Can be hardware, software or both.

Valid Class C network IDs are:

222.0.0.0 195.0.0.0

What voltages does an ATX12V P1 connector provide for the motherboard?

3.3V,5V,12V

Hi-Speed USB (USB 2.0) runs at

480 Mbps

Most common types of DNS syntax or commands are:

A AAAA CNAME SRV MX TXT NS PTR

4TB NAS and 10TB SAN

A NAS is a single storage device that serves files over Ethernet and is relatively inexpensive and easy to set up, while a SAN is a tightly coupled network of multiple devices that work with block-based data and is more expensive and complex to set up and manage. These options aren't internal storage solutions to meet your need.

FireWire

A declining connector, this plug is mainly used in camcorders for video/audio transfer.

Fitness monitors

A fitness tracker, is a device or application for monitoring and tracking fitness-related metrics such as distance walked or run, calorie consumption, and in some cases heartbeat.

4TB HDD

A hard disk drive (HDD) is an old-school storage device that uses mechanical platters and a moving read/write head to access data.

Installing an operating system alongside an existing operating system, creates this

A multi-boot installation

I TB SSD

A solid-state drive (SSD) is a newer, faster type of device that stores data on instantly-accessible memory chips. So, the SSD is the best storage solution to meet your need to store more data while maintaining fast data access speeds.

Coaxial cable

A type of copper cable specially built with a metal shield and other components engineered to block signal interference. It is primarily used by cable TV companies to connect their satellite antenna facilities to customer homes and businesses. It is also sometimes used by telephone companies to connect central offices to telephone poles near customers.

Standard that supports magnetic SATA drives most efficiently

AHCI

Ifconfig

Also known as "interface configuration". This Linux command will display the requested IP address information if a user calls the help desk asking how he/she can find the IP address that has been assigned to his/her Linux system.

rd (rmdir) command

Command in the command-line interface used to remove directories. This command erases a directory.

Run CHKDSK /R

Command that includes /F, but also scans the entire disk surface for physical errors and attempts to repair them as well. Repairs are often successful, but not guaranteed.

Run CHKDSK/ F

Command that scans and attempts to repair errors in the file system overhead information stored on a disk.

This is the feature of Windows ultimate & Windows enterprise versions, along with Windows 8 & 8.1. This allows encryption of the entire drive (while disk) to ensure the data is secure, safeguarding the data from loss or theft.

Bitlocker

Port 143, Port 993

By default, the IMAP protocol works on these two ports: ______________- this is the default IMAP non-encrypted port; _____________- this is the port you need to use if you want to connect using IMAP securely.

Port 110, Port 995

By default, the POP3 protocol works on two ports: ________ - this is the default POP3 non-encrypted port; ________- this is the port you need to use if you want to connect using POP3 securely.

Port 25, Port 2525 and Port 465

By default, the SMTP protocol works on three ports: ___________- this is the default SMTP non-encrypted port; ___________-this port is opened on all SiteGround servers in case port 25 is filtered (by your ISP for example) and you want to send non-encrypted emails with SMTP; ___________-- this is the port used if you want to send messages using SMTP securely.

Wi-fi connector

Are the antenna/RF connection, that goes between a WIFI Access Point, Router, Client or other Wifi device with an external antenna and with the proper Wifi Cable, allows you to install a low cost cable between your WIfI device and your antenna.

netstat command

Can display a variety of information about IP-based connections on a Windows or UNIX host.

Dynamic Host Configuration Protocol (DHCP)

Commonly Uses udp/67 & udp/68 Automatically connects you to a IP address, Subnet Mask, Default gateway & other of the other IP settings. Uses Static & dynamic.

Your workstation just stops working and displays a BSOD (Blue screen of death) error on the screen like the image below. Which of the following is the most likely cause of this error?

Corruption of the memory an error screen displayed on Windows computers following a fatal system error. It indicates a system crash, in which the operating system has reached a condition where it can no longer operate safely. This is caused by many different problems, such as a corruption of memory or a crucial process terminating unexpectedly.

Whaling

Form of malware that is similar to phishing and targets high-level corporate users

255.255.255.0

Full class-C address. This is the default subnet mask.

"All Linux applications can be run on macOS"

False An application designed for one operating system may not always operate on another.

This form factor connects directly to a motherboard socket

M.2 (and mSATA) SSD has a dedicated motherboard socket

The maximum cable length of an internal SATA device

I meter

First step of the troubleshooting methodology

Identify the problem - Question the user and identify user changes to computer and perform backups before making changes - Inquire regarding environmental or infrastructure changes - Review system and application logs

Mac address

Is a 48-bit number (expressed as a six 2-digit hexadecimal numbers) that uniquely identifies a device on a local area network.

BitLocker

Is a complete disk encrypted solution that comes standard. This is also included with Microsoft Windows operating systems.

Access Point

Is a device that creates a wireless local area network, or WLAN, usually in an office or large building. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.

Access point

Is a device, such as a wireless router, that allows wireless devices to connect to a network. This creates a (WLAN) [Wireless Area Network]. Usually used in an office or a small building. Connects to a wired router, switch or hun via. Ethernet cable, R projects a wired less signal to a designated area.

Duplex

Is a feature of some computer printers and multi-function printers (MFPs) that allows the printing of a sheet of paper on both sides automatically. Print devices without this capability can only print on a single side of paper, sometimes called single-sided printing or simplex printing.

Android

Is a mobile operating system.

Lightening

Is a proprietary computer bus and power connector created and designed by Apple. This connector is used to connect Apple mobile devices like iPhones, iPads, and iPods to host computers, external monitors, cameras, USB battery chargers, and other peripherals.

VLAN (virtual LAN)

Is a subnetwork that can group together collections of devices on separate physical local area networks (LANs). A LAN is a group of computers and devices that share a communications line or wireless link to a server within the same geographical area. VLANs make it easy for network administrators to partition a single switched network to match the functional and security requirements of their systems without having to run new cables or make major changes in their current network infrastructure.

Port number

Is a way to identify the specific process to which an Internet or other network message is to be forwarded when it arrives at a server

Network Address Translation (NAT)

Is designed for IP address conservation. It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses before packets are forwarded to another network.

TCP

Is regarded as a trustworthy oriented protocol. Before data is delivered, a link is formed, allowing for the retransmission of missed packets.

mkdir

Is the Linux command to create a new directory (folder) while in the command line.

chkdsk

Is the system tool used to verify disk integrity. This is run from the system command prompt.

Collate printing

It's frustrating when you need to print a document 20 times so that you can share a copy with 20 people for example, only for the printer to put 20 page one's into a pile, then 20 pages two's and so on. This would mean that afterwards you would need to sort them all into order so that you could hand them out. ___________________printing would do this job for you.

The address 127.0.0.0 is a:

Loopback address

Port 993

this is the port you need to use if you want to connect using IMAP securely.

Repeater

(also called wireless range extender) is a device that takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network. _____________ are commonly used to improve signal range and strength within homes and small offices.

Mini DIN

A legacy connector, this connector is used for mouse and keyboard inputs. May also be referred to as PS/2 connector, named after the first PC that used them.

Virtualization

CPU virtualization emphasizes performance and runs directly on the processor whenever possible. The underlying physical resources are used whenever possible and the virtualization layer runs instructions only as needed to make virtual machines operate as if they were running directly on a physical machine.

The address 191.255.255.0 is a:

Class B network

You can ping the IP address of 1.2.3.4 and 195.46.2.4 but you are unable to access knowdirect.org and comptia.org. Which of the following services is malfunctioning; causing the issue?

DNS doesn't work is the correct answer. The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like examsdigest.com or youtube.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources. Each device connected to the Internet has a unique IP address that other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2100:bb22:3272:1::2133:b1a4 (in IPv6). DNS records are instructions that live in authoritative DNS servers and provide information about a domain including what IP address is associated with that domain and how to handle requests for that domain. These records consist of a series of text files written in what is known as DNS syntax. DNS syntax is just a string of characters used as commands which tell the DNS server what to do. The most common types of DNS are: A is used to map hostnames to an IPv4 address of the host. AAAA is used to map hostnames to an IPv6 address of the host. CNAME is used to point a domain or subdomain to another hostname. SRV is used to identify computers that host specific services. MX is used to help route emails. TXT is used to provide the ability to associate text with a zone. NS indicates which DNS server is authoritative for that domain. PTR is used for the Reverse DNS (Domain Name System) lookup.

6th step of the troubleshooting methodology

Document findings, actions, and outcomes

EFS (Encrypting File System)

Encrypts individual files.

4th step of the troubleshooting methodology

Establish a plan of action to resolve the problem and implement the solution

2nd step of the Troubleshooting methodology

Establish a theory of probable cause (question the obvious) - If necessary, conduct external or internal research based on symptoms

You have been asked to install a network cable inside a conduit that will be placed underground and used to connect two buildings that are located about 2 km apart. What is the best cable type for this?

Fiber optic cable contains strands of glass fibers inside an insulated casing. They're designed for long-distance, high-performance data networking, and telecommunications. Compared to wired cables, fiber optic cables provide higher bandwidth and transmit data over longer distances.

App Store

Mac OS X program users manage application updates

Mini-usb

Most commonly used to charge mobile devices, but can also be used to transfer data between computers with at least one USB port.

Tool that enables installing Windows over a network

PXE (the pre-boot execute environment)

SATA

Stands for "Serial Advanced Technology Attachment," or "Serial ATA." It is an interface used to connect ATA hard drives to a computer's motherboard. SATA transfer rates start at 150MBps, which is significantly faster than even the fastest 100MBps ATA/100 drives.

3rd Step of the troubleshooting methodology

Test the theory to determine cause - Once the theory is confirmed, determine the next steps to resolve problem

Paul ordered a new power supply but was surprised when it arrived because it had an extra 4-wire connector. What is that connector?

The P4 connector goes into the motherboard to support more power-hungry chips.

The router doesn't function properly

The accounting department complaining they aren't able to connect to the internet. You connect your laptop to the accounting department's network and open the command prompt to type the command ipconfig/all. The command provides your IPv4 address which is 192.168.1.10, your subnet mask 255.255.255.0, and your default gateway 192.168.1.1. Next, you run the command ping 145.3.5.87 but you don't get any successful reply back, you just get the message "Request timed out". Next, you ping one of the workstations on the same network by typing the command ping 192.168.1.11 and you receive four successful replies. What is MOST likely the issue in the accounting department?

What happens to bus speed and power usage when you plug multiple devices into a USB hub?

The bus speed decreases because all devices share the same total bandwidth; power usage increases

255.255.0.0

The default subnet mask for a Class B network. Full class B subnet mask.

Remove the hard drive from your co-worker's laptop, place it in an external USB enclosure, and connect it as a secondary drive to your desktop computer in order to get the PowerPoint.

The laptop from your co-worker has stopped working, it does not power on or respond to any action. During the troubleshooting process, you have realized that the motherboard has failed and needs to be replaced. In the meantime, your co-worker needs to get some of his PowerPoint documents from the laptop because tomorrow he has a product presentation. Which of the following actions should you perform to give your co-worker access to the files he needs for his presentation?

DNS (Domain Name Service)

The network service that converts domain names into IP addresses. Can transform a domain name into a public IP address such as: 199.181.132.250

If you cable a PATA drive incorrectly

The system will not be able to communicate with that hard drive

All protocols

These are all in A+

Secure Shell (SSH) Protocol

Uses TCP/22 Sends all information as encrypted data, including your username and your password. A protocol for remote access to computers. Acts & looks exactly like Telnet. SSH ALWAYS uses an encrypted communication link.

Domain Name System (DNS)

Uses UDP/53 It converts names to IP addresses. For example: www.professormesser.com=162.159.246.164 Is mainly phonebook of the Internet. Humans access information online through domain names, like examsdigest.com or jobsdigest.io. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources. Each device connected to the Internet has a unique IP address that other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

Telnet

Uses tcp/23. uses in-the-clear communication. Meaning if you type in your password & username, anyone can view them in the clear text. This makes SSH a better protocol to use. It's more secure because it uses encrypted data.

SNMP (Simple Network Management Protocol)

Uses udp/161 Gathers statistics from network devices. 3 SNMP versions exist

RJ-11

Usually used to terminate a phone line

RJ-45

Usually used to terminate an Ethernet cable

I/O bandwidth

Which of the following cloud computing resources are MOST important when determining the performance of a cloud file-storage synchronization application?

The DHCP isn't configured properly as it doesn't provide the IP address of the DNS server.

You are setting up a new wireless network for the new department. After finishing the installation of the wireless access points and the configuration of the DHCP server, you need to test if everything works as expected, so you turn on the laptop and connect to the network. Your laptop is automatically assigned an IP address of 192.168.1.2 from the DHCP server. On the terminal, you type the command ping 192.168.1.1 to check if the default gateway responds, and sure enough, it works. You open Google Chrome and attempt to connect to knowdirect.org, but you cannot connect, instead, you get an error. Afterward, you attempt to ping the IP address for the KnowDirect web server (87.2.5.99) and it responded successfully. Which of the following is MOST likely the cause of this issue?

Firewall

You have been tasked to implement a security policy at your organization by configuring an ACL rule. The ACL (Access Control Rule) should prevent users with IPs 145.167.255.0 - 145.167.255.254 from accessing the network 2.2.2.2. What device is BEST suited for this?

USB to Ethernet

You have just bought the new MacBook Pro that comes without a wired network slot. It has only type-c ports and one USB port. Which of the following devices will you buy to connect to the internet using a cable? Reason: Ethernet ports are used to connect computers to a wired local area network or to a modem that provides a broadband Internet connection. While most computers used in a business environment have one or more Ethernet ports available, some lighter notebook and tablet computers are designed for wireless connectivity with no Ethernet port included to save on system space. When you require a Ethernet connection and have no available ports, a USB to Ethernet adapter can be plugged into the USB port to provide you with Ethernet connectivity. These adapters are plug-and-play-ready and, when connected, provide for full-speed Ethernet data transfers. All that's required to complete the network connection is to plug an Ethernet cable into the adapter and then into a network hub, router or modem.

Access Point

You just joined a team of 2x network designers and 2x network engineers for the new project, the project is to design and implement a solution for a newly opened hotel to allow guests to connect (wirelessly) to the internet after the check-in process. Which of the following devices would allow the guests to connect their laptops to the hotel's network after the check-in?

If windows locks up during the installation

You should unplug the computer and restart the installation process

Run the disk repair tool

Your co-worker opened a trouble ticket stating his computer is experiencing slow performance when reading or writing to the hard drive. After a quick inspection, you realized that it is not a system performance issue, and the system is not overheating. Which of the following would be the BEST action to take in attempting to fix this problem?

Metropolitan Area Network (MAN)

Your company has several campuses located across the city. Within each campus, the buildings are interconnected with a campus area network. If you connect each of the campuses to each other across the city, what type of network would this become?

Document findings, actions and outcomes

Your manager's computer was hacked. After many hours of work, you identify all the affected files and successfully remove the malware from his system. What is the NEXT step you should perform according to the CompTIA troubleshooting methodology?

Cellular and Bluetooth

Your mobile data on your phone is enabled and you are browsing the web, watching videos on Youtube. Suddenly, you enable the airplane mode and find out that the internet connection has been lost. What signals are disabled by airplane mode?

Intrusion Prevention System (IPS)

also known as intrusion detection prevention system (IDPS), is a technology that keeps an eye on a network for any malicious activities attempting to exploit a The main function is to identify any suspicious activity and either detect and allow (IDS) or prevent (IPS) the threat.

Cable toner

an electronic device used to verify the electrical connections in a signal cable or other wired assembly. Basic cable testers are continuity testers that verify the existence of a conductive path between ends of the cable, and verify the correct wiring of connectors on the cable.

Magnetic reader

also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge. Magnetic stripe readers can be read by a computer program through a serial port , USB connection, or keyboard wedge , and are generally categorized by the way they read a badge. For instance, insertion readers require that the badge be inserted into the reader and then pulled out. Swipe readers require that the badge pass completely through the reader.

SaaS (Software as a Service)

allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. You rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser. All of the underlying infrastructure, middleware, app software, and app data are located in the service provider's data center. The service provider manages the hardware and software, and with the appropriate service agreement, will ensure the availability and the security of the app and your data as well.

USB expansion card

allow users to expand the number of USB ports on a computer through an available PCI Express port.

Overclocking

allows your computer components to behave faster and better than how the manufacturer initially created them to be

Punch down tool

also called a krone tool, is a hand tool used to connect telecommunications and network wires to a patch panel, punch down block, keystone module, or surface mount box

IaaS

an instant computing infrastructure, provisioned and managed over the internet. It's one of the four types of cloud services, along with software as a service (SaaS), platform as a service (PaaS), and serverless. Letting you pay for only what you use. It helps you avoid the expense and complexity of buying and managing your own physical servers and other datacenter infrastructure. Each resource is offered as a separate service component, and you only need to rent a particular one for as long as you need it.

Thick client

are full-featured computers that are connected to a network. Unlike thin clients, which lack hard drives and other features, ______________are functional whether they are connected to a network or not. Specifically, it is a networked computer system with most resources installed locally, rather than distributed over a network.

DNS records

are instructions that live in authoritative DNS servers and provide information about a domain including what IP address is associated with that domain and how to handle requests for that domain. consist of a series of text files written in what is known as DNS syntax.

Single sign-on (SSO)

authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.

IaaS (Infrastructure as a Service)

businesses offer services such as pay-as-you-go storage, networking, and virtualization. ____ gives users cloud-based alternatives to on-premise infrastructure, so businesses can avoid investing in expensive on-site resources. Examples: AWS EC2, Rackspace, Google Compute Engine (GCE), Digital Ocean.

Orientation

can change the page orientation to landscape or portrait.

Quality

changes the printing quality.

PaaS (Platform as a Service)

cloud computing model used to develop a new app using pre-coded application components (workflow, security features, and search) in order to cut the development process in the half. Platform as a service (PaaS) is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications. By delivering infrastructure as a service, PaaS offers the same advantages as IaaS. But its additional features—middleware, development tools, and other business tools—give you more advantages: 1. Cut coding time. PaaS development tools can cut the time it takes to code new apps with pre-coded application components built into the platform, such as workflow, directory services, security features, search, and so on. 2. Add development capabilities without adding staff. Platform as a Service components can give your development team new capabilities without needing to add staff having the required skills.

Run diskpart

command interpreter helps you manage your computer's drives (disks, partitions, volumes, or virtual hard disks).

Use DHCP to assign the IP addresses on the network dynamically to avoid duplication. (Change the way she receives the IP address from static to dynamic using DHCP)

common error that occurs when two network devices are assigned the same IP address on a network. This is happening when static IP addresses are used, so the easiest way to avoid this issue is to:

RAID 1

configuration provides only data protection by copying data from one drive to another. Data is fully protected as the mirror copy is available if the originating drive is disabled or unavailable. Because it makes a full duplicate of the data, requires twice as much storage capacity as required by the original data.

Inverter

converts the DC voltage to an AC voltage. These voltages are also known as currents. usually input DC voltage lower while the output AC is equal to the grid supply voltage of either 120 volts or 240 volts. ex. direct current to alternating current. (DC to AC) Built as a standalone equipment for applications such as solar power, or to work as a backup power supply from batteries which are charged separately.

RAID 0

doesn't provide any data protection; its sole purpose is to enhance drive access performance. It does that by spreading the data out across two or more drives so that multiple read/write heads on the drives can write or access portions of data simultaneously, thus speeding up overall processing.

Docking station

for laptops are meant to bridge the gap between portability and having a stationary place to work and play. With a docking station, you can get the best of both worlds with a system that allows your laptop to work for both purposes. (If more advanced) it may include space for additional PC monitors, keyboards, and computer speakers. It can also have additional USB-C ports to connect to printers, add external hard drives, and connect microphones and audio.

NS

indicates which DNS server is authoritative for that domain.

eSATA card

is a SATA connector accessible from outside the computer, to provide a signal (but not power) connection for external storage devices. eSATAp combines the functionality of an eSATA and a USB port, and a source of power in a single connector.

Riser card

is a board that plugs into the system board and provides additional slots for adapter cards. Because it rises above the system board, it enables you to connect additional adapters to the system in an orientation that is parallel to the system board and save space within the system case.

Riser card

is a board that plugs into the system board and provides additional slots for adapter cards. Because it rises above the system board, it enables you to connect additional adapters to the system in an orientation that is parallel to the system board and save space within the system case. are used in rack-mount server and industrial computer applications. In 1U and 2U rack-mount computer systems, ___________ are integrated into the system to allow the addition of feature cards in a horizontal position (instead of a standard vertical position). This is due to the height limitations of a 1U and 2U system which are 1.75″ and 3.5″ respectively.

On-Premise

means that a company keeps all of this IT infrastructure onsite, which is either managed by themselves or a third-party. So they don't use any cloud model.

Hybrid Cloud

mixed computing, storage, and services environment made up of on-premises infrastructure, private cloud services, and a public cloud

SaaS (Software as a Service)

platforms make software available to users over the internet, usually for a monthly subscription fee. With _____ you don't need to install and run software applications on your computer (or any computer). Everything is available over the internet when you log in to your account online. examples: BigCommerce, Google Apps, Salesforce, Dropbox, MailChimp, ZenDesk, DocuSign, Slack, Hubspot.


Conjuntos de estudio relacionados

Business Essentials quiz 2.03/2.04

View Set

Exam 1: Introduction to Ethical Theory

View Set

NOBCChE Science Bowl: MATH Set 1

View Set

EMT Chapter 2: Workforce Safety and Wellness

View Set

Zybooks 11.6 Using Scanner in methods

View Set