Comptia a + study guide for the practice tests
chkdsk (the command-line version of the tool)
Error checking tool is also called Check disk
ECC
Error correction code (ECC) RAM is an improvement over parity, detecting as well as correcting errors.
Tier 3
Even more regional networks
Every computer on a single LAN must have the same network ID and a unique host ID.
Every computer on the network must have a unique IP address. An IP conflict: Two computers have the same IP address; they won't be able to talk to each other; and other computers won't know where to send data. You can never have an IP address that ends with a 0 or a 255.
What are programs stored on ROM chips called?
Firmware
One of the most common uses of TPMs is _______________
Hard Disk Encryption
Winload.exe loads:
Hardware abstraction layer The system Registry Drivers for any boot devices into memory before the operating system itself takes over
Spoofing
Process of pretending to be someone or something you are not Packets containing false information
USB 3.0 Ports on motherboard a what color?
Red
UAC
User Account Control
RAID 10 (Nested, Striped Mirrors)
"Stripe of mirrors" 1 pair of mirrored disks, and another pair mirrors the first pair
What is the maximum data transfer speed that USB 3.0 can handle?
5GBPS
Lumens
A lumen is the amount of light provided by a light source. Higher lumens equates to a brighter picture.
Non-Volatile Memory Express (NVMe)
A modern SSDs technology that allows for very fast data transfer directly to the PCIe bus on the computer. reduces latency
MIDI (Musical Instrument Digital Interface)
A set of standards that are used to represent music in digital form. A MIDI port is a 5-pin DIN port that looks like a keyboard port, only larger.
ifconfig
A TCP/IP configuration and management utility used with UNIX and Linux systems.Used to change network connection settings
Windows supports four different file systems:
FAT (often called FAT16) FAT32 NTFS exFAT/FAT64 (for removable media)
File transfer protocol (FTP), using ports 20 and 21, is a great way to share files between systems.
FTP server software exists for most operating systems. To access an FTP site, you must use an FTP client such as FileZilla. FTP requires logon.A Web browser will assume you want to log on as "anonymous," which works fine for public FTP sites.User name and password are sent in clear text
Refresh rate
For an LCD monitor, this refers to how often a screen can change or update completely. The standard for the industry is 60 Hz.
Broadcast domain
Group of computers are connected by one or more switches.All nodes receive broadcasts from all other nodes.
Local area network (LAN)
Group of computers are located physically close to one another.Located in a single room, floor, or buildingAble to hear each other when one sends a broadcast
Brute force
Guess the contents of some kind of data field that isn't obvious (or is hidden) Example: dictionary attack
802.11g
Introduced in 2003 Offers transfer speeds of 802.11a with the wider range of 802.11b Runs in 2.4-GHz ISM band
Single-mode fiber optic cable
It can be used with laser light to achieve high transfer rates over long distances. Currently, it is rarely used except for long-distance links.
Which ATA revision introduced Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.)?
ATA-3
ATX12V 1.3
ATX12V 1.3First widespread update to ATX PSIntroduced a 4-pin motherboard power connector, called the P4 power connectorAlso introduced the AUX connector
ATX12V 2.0
ATX12V 2.024-pin connector that is backward compatible with older 20-pin connectorRequires two 12-V rails for any power supply rated higher than 230Rails should not draw power from each otherA dedicated 6-pin or 8-pin PCIe power connector on higher-end cards
Authorization
After a user authenticates, NTFS file system defines specific resources the user may access
Network interface controller (NIC)
An internal piece of hardware that allows a device to connect to a network. Needed by both clients and servers Defines or labels the machine on the network Breaks files into smaller units to send across network and reassembles them
Disk quotas
An option on NTFS volumes that enables administrators to limit how much disk space a user can occupy with his or her files.
Phishing
Attempts to obtain usernames and passwords Typically performed through e-mailAttacker poses as a legitimate company and asks for your login credentials. Spear phishing: a targeted attack
CompTIA A+ 220-1002 exam objectives define two areas for you to consider for scheduled maintenance:
Backups Disk maintenance
Which file is the Windows Boot Manager?
Bootmgr
Patch panel
Box with female connectors (ports) in front and permanent connections in the back Horizontal cables connect in back.
There are two different types of executable files:
Built-in Executables
A brand new system failing due to manufacturing defects is often called a(n) _______________ failure.
Burn in
By default, TCP/IP is configured to receive an IP address automatically from a DHCP server on the network (and automatically assign a corresponding subnet mask).CompTIA A+ expects you to know how to do this manually.
By default, TCP/IP is configured to receive an IP address automatically from a DHCP server on the network (and automatically assign a corresponding subnet mask).CompTIA A+ expects you to know how to do this manually.
A chipset
It serves as the electronic interface through which the CPU, RAM, and I/O devices interact. Chipsets were originally comprised of two primary chips:The Northbridge and the Southbridge
CAT Levels
CAT1, CAT3, CAT5, CAT5e, CAT6, CAT6aUTP cables come in categories that define the maximum speed at which data can be transferred (bandwidth). CAT 1Standard telephone line CAT 3Designed for 10-Mbps networks; a variant that used all four pairs of wires supported 100-Mbps speeds ;CAT 5Designed for 100-Mbps networksCAT 5eEnhanced to handle 1000-Mbps networksCAT 6Supports 1000-Mbps networks at 100-meter segments; 10-Gbps networks up to 55-meter segmentsCAT 6a Supports 10-Gbps networks at 100-meter segmentsCAT 6e A nonstandard term used by a few manufacturers for CAT 6 or CAT 6aCAT 7Supports 10-Gbps networks at 100-meter segments; shielding for individual wire pairs reduces crosstalk and noise problems. CAT 7 is not a TIA/EIA standard
DVD-ROM is the DVD-equivalent of the standard _______________ data format.
CD-ROM
Common errors with lost CMOS:
CMOS configuration mismatch CMOS date/time not set BIOS time and settings reset No boot device available CMOS battery state low
PCs and Macs originally used a_________ monitor
CRT
Data is moved from one PC to another in discrete chunks called frames. All NICs have a built-in identifier, a binary address unique to that single network card.
Called a media access control (MAC) addressThe MAC address is 48 bits long, providing more than 281 trillion MAC addresses.MAC addresses are binary, but we represent them by using 12 hexadecimal characters.MAC addresses are burned into every NIC.Some NIC makers print the MAC address on the card.
Which tool enables you to copy any Unicode character into the Clipboard and paste into your document?
Character MAP
IPv6 addresses are written like this:2001:0000:0000:3210:0800:200C:00CF:1234
Colon is a separator between groups.Each group is a hexadecimal number between 0000 and FFFF called (unofficially) a field or hextet.A complete IPv6 address always has eight groups. IPv6 still uses subnets.IPv6 uses the "/x" Classless Inter-Domain Routing (CIDR) nomenclature.The /x refers to the number of bits in the subnet mask.
hybrid hard drives.
Combine flash memory and spinning platters Fast boot times Add 20-30 more minutes of battery life for portable computers
apt-get
Command line tool for advanced packaging tool (APT) used on Linux Ubuntu and Mint Used for fetching and installing single applications Can also manage all software on the system Need to know the name of the package you want to install
Worm
Does not need to attach to other programs to replicate
DDR SDRAM
Double Data Rate SDRAM is memory that transfers data twice as fast as SDRAM. DDR SDRAM increases performance by transferring data twice per clock cycle.
Commercial licensing
End User License Agreement (EULA) stipulates requirements of the copyright holder. Digital rights management (DRM) enforces how commercial software is used.
Service set identifier (SSID) parameter
Configuring a unique SSID (or network name) and password is one security measure.Older default names and passwords are widely known and available online. Each wireless network node and access point needs to have the same unique SSID. Turning off SSID broadcasting makes it harder for unauthorized people to determine your SSID.
Contrast ratio
Contrast ratio is the difference between lightest and darkest spots that the monitor can display. Dynamic contrast ratio measures the difference between a full-on, all-white screen, and a full-off, all-black screen.
How do permissions change when files or folders are moved or copied? Four situations
Copying data within one NTFS-based volume Moving data within one NTFS-based volume Copying data between two NTFS-based volumes Moving data between two NTFS-based volumes
Some motherboards that support _______________ also support features called triple-channel architecture or quad-channel architecture, which work much like dual-channel, but with three or four sticks of RAM instead of two.
DDR3
Which are DDR3 I/O speeds related to clock speeds?
DDR3 I/O speeds are quadruple the clock speeds.
Radio Power Adjustment
Decrease power until you get reception inside but not outside the target network space
vi
Default text editor Editor is always in either insert mode or command mode
802.11 wireless Ethernet standard (Wi-Fi)
Defines methods devices may use to communicate via spread-spectrum radio waves Broadcasts in small, discrete chunks over available frequencies within certain range Uses one of two radio bands: 2.4 GHz and 5 GHz Extended to 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac variations
HKEY_CLASSES_ROOT
Defines the standard class objects used by Windows (i.e., file types and associations)
SLP
Devices use the Service Location Protocol (SLP) to advertise available services over a local network and to discover those services. You will see this most commonly with network-aware print devices, although some OSs use SLP with file shares as well.
Computers commonly connect to an ISP by using one of eight technologies that fit into four categories:
Dial-upAnalog and ISDN DedicatedDSL, cable, and fiber WirelessWi-Fi and cellular Satellite
LGA
Land Grid Array. A chip interface standard that places the pins on the circuit board instead of on the chip packaging. The pins do not insert into sockets. The chip has an array of lands or flat conductive pads that interface with the pins by surface contact only.
Because both CD-R and CD-RW drives require a powerful _______________, making a drive that could burn CD-Rs and CD-RWs became a simple process, and plain CD-R drives disappeared almost overnight.
Laser
Three methods used to secure access to the network:
MAC address filtering Authentication Data encryption
Contents of a frame
MAC address of the network card to which the data is being sent MAC address of the network card that sent the data The data itselfSize varies depending on the type of frame. A data check to verify that the data was received in good orderMost use a cyclic redundancy check (CRC).
DDR4
Memory that is faster and uses less power than DDR3.Runs at only 1.2 volts Uses 288-pin DIMM
New Technology File System (NTFS)
Microsoft's default file system. NTFS was introduced with Windows NT. The file system of choice today Major improvements/refinements include: Redundancy, Security, Compression, Encryption, Disk quotes, Cluster sizing
Automatic Private IP Addressing (APIPA)
Modern operating systems support a feature called Automatic Private IP Addressing (APIPA) that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically.The Internet Assigned Numbers Authority has set aside the range of addresses from 169.254.0.1 to 169.254.255.254 for this purpose.
regsvr32 command
Modifies the Registry in only one way—adding (or registering) dynamic link library (DLL) files as command components
A(n) _______________ enables you to use your existing folders to store more data that can fit on a single drive or partition/volume
Mount Point
Botnet
Network of infected computers (zombies) under the control of a single person or group Common use: sending spam
Ribbon( Impact Printer)
OBJ-3.11: An impact printer operates the same way as an old fashioned typewriter. It uses a film-like ribbon that sits inside between the paper and print head. The ribbon is impacted by a series of mechanical dots in the print head, and this transfers the ink from the ribbon to the paper to form the desired image or text.
Crossover Cable
OBJ-3.1: A crossover cable should be used to connected two similar devices (PC to PC, Router to Router, Switch to Switch, etc.) to create a network. For an ethernet cable, this should be a network cable with a T568A wiring standard on one end and a T568B wiring standard on the other end of the cable to create a crossover cable.
STP Cable
OBJ-3.1: A shielded twisted pair (STP) cable contains a shielded sheathing in the cable that can stop or prevent crosstalk. Cables are often clustered together with a high amount of data passing through from one device to another, causing EMI (electromagnetic interference). EMI causes signal interference and errors in the transfer of data, known as crosstalk.
Successful completion of the POST
One or two short beeps
Types of cloud networks include:
Public Private Community Hybrid
Ways that display adapters connect to a motherboard
PCI AGP PCIe Motherboard with display adapter built-in
What is the latest, fastest, and most popular expansion bus in use today?
PCLe
The _______________ program checks out the system every time the computer boots.
POST
Legacy ports
PS/2, RS-232 serial, and parallel
PCI
Peripheral Component Interconnect
open source software
Permits modifications to the original code
Quality of service (QoS)
Quality of service (QoS) enables busy networks to prioritize traffic. Support for QoS tagging (or priority) should be enabled by default on most network adapters.
Currently, only two types of RJ connectors are used for networking.
RJ-11 connects a telephone to a telephone jack in the wall of your house. RJ-45 is the standard for UTP connectors, has connections for up to four pairs, and is visibly much wider than RJ-11.
Most desktop motherboards come with one _______________ jack for attaching a network cable.
RJ-45
chkdsk (/f /r)
Runs the command-line version of error-checking Can use with switches/f switch attempts to fix file system errors/r switch attempts to locate and repair bad sectors Needs access to a drive to run successfully
More info in SATA
SATA improvements over PATAPoint-to-point connections between the SATA device and the host bus adapter (HBA)Narrower cablesMaximum cable length 1 meterHot-swappableNo drive limitTheoretically 30 times faster than PATA1.5Gbps, 3Gbps, and 6Gbps Ties capable drives directly into the PCI Express bus on motherboards Lack of overhead enhances speed of throughput Requires motherboard with SATAe support to take advantage of superfast speeds
APM and ACPI require:
SMM-capable CPU APM-compliant BIOS (so CPU can shut off peripherals) Devices that will accept being shut off ("Energy Star") A system OS that knows how to request the shutdown of a particular device
What kind of RAM comprises cache?
SRAM (Static RAM)
Parallel (PATA)
Send data in parallel on a 40- or 80-wire ribbon cable
Serial ATA (SATA)
Send data in serial on one wire
What can be typed in the Windows Search to open the Services Control Panel applet?
Services. MSc
PXE
Some BIOS have feature for preboot execution environment
Domain Name Service (DNS)
Special computers, called Domain Name Service (DNS) servers, keep databases of IP addresses and their corresponding names. The Internet has regulated domain names.
110 block
Special type of connector used on the most common type of patch panel UTP connects using a punchdown tool.
Mini PCI
Specialized form of PCI designed for use in laptops.
Two essential devices that handle spikes and sags in the AC supply:
Surge suppressor Uninterruptible power supply (UPC)
Virtual memory is a portion of an HDD or SSD set aside as a page file or _______________ file.
Swap File
Different types of RAM
Synchronous DRAM (SDRAM) Rambus DRAM (RDRAM) Double data rate SDRAM (DDR SDRAM) DDR2 and DDR3 DDR3L/DDR37 DDR4
In macOS, what launch point provides access to almost all the settings needed to administer a macOS system?
System Preferences
Where is POST located?
System ROM
HKEY_LOCAL_MACHINE
System's non-user-specific configurations
TPM
TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop). ... Trusted modules can be used in computing devices other than PCs, such as mobile phones or network equipment.
Table 18.2 UTP Cabling Color Chart Pin T568A T568BPinT568a T568b 1 White/Green White/Orange 5 White/Blue White/Blue2 Green Orange6 Orange Green3 White/Orange White/Green7White/Brown White/Brown4 Blue Blue8 Brown Brown
Table 18.2 UTP Cabling Color Chart Pin T568A T568BPinT568a T568b 1 White/Green White/Orange 5 White/Blue White/Blue2 Green Orange6 Orange Green3 White/Orange White/Green7White/Brown White/Brown4 Blue Blue8 Brown Brown
PSU
Takes AC power and transforms into electricity to power the PC. Falls in the category of a field replaceable unit (FRU)
Thunderbolt port
Tap into the PCI Express bus for up to 6 external peripherals Provide amazing bandwidthThunderbolt 1 runs full duplex at 10Gbps.Thunderbolt 2 aggregates internal data channels, enabling throughput at up to 20Gpbs.Thunderbolt 3 offers throughput at up to 40Gbps
What is the one-stop place for anything you need to do with applications, processes, or services?
Task Manager
In Windows 7, what is another name for the notification area that shows programs running in the background?
Taskbar
LDAP
The Lightweight Directory Access Protocol (LDAP) enables operating systems and applications to access distributed directories. Windows uses LDAP to work with Active Directory.
NIST
The National Institute of Standards and Technologies
msconfig
Techs use the System Configuration utility (also known by its executable name, msconfig) in Windows 7 to edit and troubleshoot operating system and program startup processes and services.
SDRAM
The _________ exchanges data with the processor synchronized to an external clock signal and running at the full speed of the processor/memory bus without imposing wait states. a. DDR-DRAM b. SDRAM(correct)Synchronized with the system clock Came on a stick called a dual inline memory module (DIMM) Came in a wide variety of pin sizes with early DIMMs168-pin version common on desktopsLaptop DIMMs in 68-pin, 144-pin, or 172-pin micro-DIMM packagesSmall-outline DIMM (SO-DIMM) of 72 pins, 144 pins, or 200 pins also for laptops c. CDRAM d. none of the above
Half-duplex means
The cable can send and receive data, but only one at a time.
cd command
The cd command brings focus to a different directory
802.11b
The first standard to be widely adopted Actual throughput of 4 to 6 Mbps on average Maximum range of 300 ft under ideal conditions Subject to interference from other devices
IPv6 subnets function like IPv4 subnets. Two new rules apply:
The last 64 bits of an IPv6 address are generated randomly or using the MAC address, leaving a maximum of 64 bits for the network ID.Therefore, no subnet is ever longer than /64. The IANA passes out /32 subnets to big ISPs.ISPs and others may pass out /48 and /64 subnets to end users. The vast majority of IPv6 subnets are between /48 and /64.
Each host connects to a central box called a switch.
The layout is called star bus topology. PCs connect via special ports on switch.
md or mkdir command
The md (or mkdir) command is used to create a directory.Example: md files will make a new directory named files.Use dir or ls to see the newly-made directory. Remember that Linux is case sensitiv
Parts of an IP address include:
The network ID portion identifies the network. The host ID, or host part identifies the local computer on the network.
nslookup command enables you to
The nslookup command enables you to determine exactly what information the DNS server is giving you about a specific host name.Type nslookup from the command prompt and press the ENTER key.
Horizontal cabling
Traverses more or less horizontally from work area to the telecommunications room Cat 5e or better UTP in most networks
Compare the subnet mask to the IP addressAny part that's all 255s is the network ID Any part that's all zeros is the host ID
The result:Network ID is 192.168.4Host ID is 33
Ultrabooks
These portable computers are thin, light, and powerful. Intel has defined maximum dimensions (20-23mm thick) and minimum battery life (6 hours of HD video playback).
QWORD value
These values are like Binary values but are limited to exactly 64 bits.
TFT
Thin film transistor (TFT) or active matrix technology is used in current LCD monitors.Uses one or more tiny transistors to control each color dot.The most common TFT displays use a technology called twisted nematic (TN).Better TFT displays use a technology called In-Plane Switching (IPS) to create a wider viewing angle and far better color re-creation than TN panels can provide.
Yagi antennas
This antennas is typically used to extend the range of outdoor hotspots in a specific direction, or to reach an outbuilding.
External optical drives often use USB or _______________ connections.
Thunderbolt
Toners
Toner is the generic term for two separate devices that are used together: a tone generator and a tone probe. The tone generator connects to the cable using alligator clips, tiny hooks, or a network jack.It sends an electrical signal along the wire at a certain frequency. The tone probe emits a sound when it is placed near a cable connected to the tone generator.
Volume Shadow Copy Service (VSS)
enables the OS to make backups of any file, even one that is in use. Windows uses VSS for its System Protection feature.Enables you to access previous versions of any data file or folder
As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a _______________.
network attached storage device
DSL providers have developed fiber-to-the-node (FTTN) and fiber-to-the-premises (FTTP) services provide Internet and more.
With FTTN, the fiber connection runs from the provider to a box somewhere in your neighborhood. This box is connected to your home or office using normal coaxial or Ethernet cabling.
Preemtive Multitasking
With preemptive multitasking, the operating system allocates each application a certain amount of processing time and then takes control away from the application forcibly. That way, an application that crashes will not stop the whole system.
Windows and other operating system networks work in one of three categories:
Workgroups Domains Homegroups These three organizations differ in:ControlNumber of machines neededCompatibilitySecurity
expansion bus
a bus on the motherboard used to connect peripheral devices
RAID 10
a combination of RaID 1 and RaID 0 that requires at least four disks to work as an array of drives and provides the best redundancy and performance also the most expensive
String value
any form of data
PATA Connector
also known as an IDE connector for floppy disk drives or legacy drives
Circuit breakers
uses an electromagnet to shut off the circuit when the current gets to high. -needs to be flipped back into place once overloaded. -protects circuits from overheating. are heat sensitive or electromagnetically-operated switches rated for a specific amperage.
Which type of wire carries no voltage?
neutral
Router
router connects LANs into a WAN.Sorts the frames and sends them to the proper LAN
The installation error message "RAID Array Not Detected" could indicate _______________.
the lack of the proper driver for the hard drive
CPU accesses memory via.
the memory controller chip (MCC).
orientation notch
the notch on a cpu that orients the right position to put the cpu on.
Inheritance is
the process of determining default NTFS permissions for newly introduced files or subfolders. The base rule of Windows inheritance:
What is the practical limit for modern CPU clock speeds?
4Ghz
RDRAM
(RDRAM) Mean? Rambus Dynamic Random Access Memory (RDRAM) is a memory subsystem designed to transfer data at faster rates. RDAM is made up of a random access memory (RAM), a RAM controller and a bus path that connect RAM to microprocessors and other PC devices.
ROM
(Read-Only Memory) One of two basic types of memory. ROM contains only permanent information put there by the manufacturer. Information in ROM cannot be altered, nor can the memory be dynamically allocated by the computer or its operator. ROM can be altered with flash ROM ROM is also known as firmware
sfc
(System File Checker)Scans, detects, and restores important Windows system files, folders, and pathsEnter sfc /scannow from a command prompt
Modern Ethernet network speeds:
10BaseT (runs at 10 Mbps) 100BaseT (runs at 100 Mbps) 1000BaseT or Gigabit Internet (runs at 1000 Mbps, or 1 Gbps) All three technologies—10/100/1000BaseT or Ethernet:Use star bus topologyConnect via unshielded twisted pair (UTP) cabling
At what speed does the SATA 1.0 specification perform?
1.5 GBPS
How much RAM can a 64-bit processor theoretically access?
4GB
How many watts of power does a typical hard drive in a PC require?
15
What is the storage capacity of a DVD-18 DVD-ROM?
15.90GB
How many watts of power does an Intel i7-4790K require at peak performance?
151
By default, what is the maximum partition size NTFS supports on a dynamic disk?
16TB
What size DIMM is used by laptop DDR SDRAMs?
200-pin SO-DIMM
What size DIMM is used by laptop DDR4 SDRAMs?
260-pin SO-DIMM
What is Microsoft's minimum system RAM requirement for 64-bit versions of Windows?
2GB
What is the minimum system RAM requirement for the latest versions of macOS?
2GB
MicroATX
30 percent smaller size than standard ATX Features standard ATX connections Fits in standard ATX case or microATX cases
An 8×4×32× CD-RW drive reads at a speed of _______________.
32X
A surge suppressor should have a rating of at least _______________.
330-V
No CPU ever made has fewer than _______________ stages, but advancements in caching have increased the number of stages over the years.
4
What is the minimum number of drives needed to implement RAID 6?
4 min and 32 max
How many wires are in the SATA interface?
7
Which early DIMM form factor applied to laptops?
72-pin SO-DIMM
PCI
800 × 600 with a refresh of 70 Hz at 8 bits (256 colors) requires 33.6 MBps bandwidth. 24 bits (16.7 million colors) requires 100.8 MBps. Not enough bandwidth is available on a shared PCI bus.
802.11a
802.11 standard on the market after 802.11b Operates in the 5-GHz frequency range Devices using 802.11a less prone to interference Throughput greater than 802.11 and 802.11b
What are the usual dimensions of a microATX motherboard?
9.6x9.6
PCIe
A 32 - for 64-bit bus standard capable of transferring data up to 4.26 Gbps in full-duplex transmission. PCI Express was introduced in 2002 and offers several advantages over traditional PCI. Its expansion cards can fit into older PCI slots with some modifications to the motherboard the latest one PCI Express (PCIe) is the latest, fastest, and most popular expansion bus in use today. PCI Express is still PCI. Uses a point-to-point serial connection instead of PCI's shared parallel communication—does not share its bus
DHCP Server
A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients.
iwconfig
A command-line utility for viewing and setting wireless interface parameters on Linux and UNIX workstations.Used to change wireless network settings
Man-in-the-middle (MITM) attack
A hacker placing himself between a client and a host to intercept network traffic; also called session hijacking.
Plasma display panels (PDPs
A popular technology for displaying movies Compete directly with LCD screens for flat-panel spaceOffer a wider viewing angleHigher-quality image than the typical LCDCost less Disadvantages of PDPs as compared to LCDs Weigh a lot more Consume much more electricity
Hidden partition
A primary partition that is hidden from the OS, often used for backup purposes—sometimes called a factory recovery partition
Rails
A single transformer takes the AC current from a wall socket and converts it into DC current split into three primary DC voltage rails:12.0 V, 5.0 V, and 3.3 V
sprite
A sprite is a bitmap graphic moved around on the screen.
DDR2
A version of SDRAM that is faster than DDR and uses less power. 240 pin DIMM
DDR3
A version of SDRAM that is faster than DDR2 memory and that can use triple channels.
AGP
AGP slot is a PCI slot that has a direct connection to the Northbridge. AGP slots are only for video cards. a specialized, video-only version of PCI called the Accelerated Graphics Port (AGP).Addressed slow, substandard graphics
AHCI (Advanced Host Controller Interface)
AHCI unlocks some of the advanced features of SATA, such as hot-swapping and native command queuing. When you plug in a SATA drive to a running Windows computer that does not have AHCI enabled, the drive doesn't appear automatically. In Windows Vista, you need to go to the Control Panel and run the Add New Hardware to make the drive appear, and in Windows 7 and later, you need to run "hdwwiz.exe" from the Start menu Search bar. With AHCI mode enabled, the drive should appear in Computer immediately. You can enable AHCI in the CMOS if you want it enabled. You need to make sure you enable it before you install the OS because if you don't you will get BSOD. There is a way to do it if you have the OS downloaded. Go to Microsoft's website to check it out.
APIPA Address
APIPA stands for Automatic Private IP Addressing (APIPA). It is a feature or characteristic in operating systems (eg. Windows) which enables computers to self-configure an IP address and subnet mask automatically when their DHCP(Dynamic Host Configuration Protocol) server isn't reachable. looks like 169.254.x.x
Wi-Fi Protected Access (WPA)
Acts as an interim security upgrade to WEP Uses the Temporal Key Integrity Protocol (TKIP)Provides a new encryption key for every sent packetProtects WPA from many of the attacks that make WEP vulnerableDeprecated due to flaws of its own Uses encryption key integrity-checking through Extensible Authentication Protocol (EAP)
Solid core versus stranded core
All UTP cables come in one of two types: solid core or stranded core. Each wire in solid core UTP uses a single solid wire. With stranded core, each wire is actually a bundle of tiny wire strands. Each of these cable types has its benefits and downsides. Solid core is a better conductor, but it is stiff and will break if handled too often or too roughly. Stranded core is not as good a conductor, but it will stand up to the handling without breaking. TIA/EIA specifies that horizontal cabling should always be solid core. Remember, this cabling is going into your walls and ceilings, safe from the harmful effects of shoes and vacuum cleaners. The ceilings and walls enable you to take advantage of the better conductivity of solid core without the risk of cable damage. Stranded core is characterized by each wire comprised of a bundle of tiny wire strands.Stands up to handling without breaking
RAID 1
Also called mirroring, this RAID array type provides fault tolerance because all the data is written identically to the two drives in the mirrored set. (2)
Which characteristic of sound refers to its loudness?
Amplitude
Video graphics array (VGA) standard
Analog video signal instead of digital Minimum display requirement typically 640 × 480 pixels and 16 colors
Malware
Any program or code designed to do something undesirable on a system or network
Advanced Technology Attachment (ATA)
Appeared around 1990, virtually monopolizes hard drive market ATA hard drives referred to as Integrated Drive Electronics (IDE) drives
AFP
Apple developed the Apple Filing Protocol (AFP) in the late 1980s to support file sharing between Macintosh computers on early LANs.
Internet Application Protocols (2 of 3) and their ports
Application ProtocolFunction Port Number HTTP Web Pages 80 HTTPS Secure Web Pages 44 FTP File transfer 20, 21 SFTP Secure File transfer 22 IMAP Incoming e-mail 143 POP3 Incoming e-mail 110 SMTP Outgoing e-mail 25 Telnet Terminal emulation 23 SSH Encrypted Terminal emulation 22 RDP Remote Desktop 3389 SIP Voice over IP 5060
How is the Registry organized?
As a tree structure
Zero-day attack
Attack on a vulnerability not already known to the software developers
Session hijacking
Attempt to intercept a valid computer session to get authentication information
Connectors for coaxial cable
BNC connector - uncommon F-type connector - on the back of all cable modems and most televisions
Built-in redundancy
Backbone routers connect to more than one other backbone router. Decentralized and interwoven nature of the Internet Alternative pathways for data if one or more of the routers fail
Wi-Fi Protected Access 2 (WPA2)
Based on the IEEE 802.11i standard Locks down wireless networks Uses Advanced Encryption Standard (AES) Upgrade to WPA2, if not already using it
Windows can create partitions using the _______________ disk.
Basic
Subnet mask distinguishes which part of the IP address identifies the network ID and which part of the address identifies the host.
Blocks out (or masks) the network portion of an IP address Typical subnet mask: 255.255.255.0
To run a program:
Change the prompt focus to the directory where the program is stored.Example: cd C:\Windows\System32
fire extiguisher
Class A Ordinary combustibles such as paper and wood Class B Flammable liquids such as gasoline Class CLive electrical equipment Class D Combustible metals: titanium or magnesium Class K Cooking oils, trans-fats, or fats
What class of fire extinguisher should be used on an electrical fire?
Class C
A named group of functions that defines what you can do with an object is called a ________________.
Class Object
Open Database Connectivity (ODBC)
Coding standard that enables programmers to write databases and the applications that use them Can query ODBC to see how to locate and access a database without any concern about what application or operating system is used
_______________ partitions are designed to support bootable operating systems.
Primary
VDI (Virtual Desktop Infrastructure)
Company provides a "thin client" to the user where the desktop resides on a centralized server.
Three things need to be in place to have network connectivity:
Connected NICThe physical hardware that connects the computer system to the network media Properly configured TCP/IPCorrect TCP/IP settings needed for device on your network Network client
Shielded Twisted Pair (STP
Consists of twisted pairs of wires surrounded by shielding to protect them from electromagnetic interference (EMI) Rare to see; used only in locations with excessive electronic noise such as shop floors
Dynamic Disks
Create dynamic disks from basic disks in Disk Management. Types of volumes include:A simple volume, which acts just like a primary partition.A spanned volume, which extends a partition on a single drive into unallocated space or extends the volume to grab extra space on completely different dynamic disks.
Wi-Fi Protected Setup (WPS)
Created to make it easier for users to configure secure connections Works either by pushing a button or by entering an eight-digit code Cracked easily by hackersShut down WPS to prevent
What type of RAM is used for main system memory?
DRAM (Dynamic RAM)
Adapters and converters
DVI to HDMI Thunderbolt to DVI HDMI to VGA DisplayPort to DVI DisplayPort to HDMI
DEP
Data Execution Prevention
Bluetooth
Designed to create small wireless networks—personal area networks (PANs)—for specific jobs Connecting input devices such as keyboards and mice Upgraded over the years to make it faster and more secure Employs classes that define maximum power usage and maximum distanceClass 1: 100mW and 100 metersClass 2: 2.5 mW and 2 metersClass 3: 1mW and 1 meter
What Windows tool finds additional space on a hard drive?
Disk Cleanup
occurs when the operating system needs to access the page file too frequently.
Disk Trashing
RAID 6 disk striping with extra parity
Disk striping with extra parity. Like RAID 5, but with more parity data. Requires five or more drives, but you can lose up to two drives at once and your data is still protected.
RAID 5 disk striping with distributed parity
Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance. Distributes data and parity information across all drives Fastest way to provide redundancy
Ad-hoc mode (or peer-to-peer mode)
Each wireless node is in direct contact with every other node in a decentralized free-for-all. Two or more wireless nodes communicating in ad hoc mode form an Independent Basic Service Set (IBSS). Ad hoc mode networks are good for:Small groups of computersTemporary networks such as a study groups or business meetings
A Virtual Private Network (VPN) allows you to connect to a private network via the Internet.
Either some software running on a computer or, in some cases, a dedicated box must act as an endpoint for a VPN. VPNs require a protocol that itself uses one of the many tunneling protocols available.Adds the capability to ask for an IP address from a local DHCP server to give the tunnel an IP address that matches the subnet of the local LAN
Direct current (DC)
Electricity provided by batteries
Wired Equivalent Privacy (WEP)
Encrypts data using 40-bit or 104-bit encryption Includes a flaw that makes it extremely vulnerable to attack
System Management Mode (SMM)
Enables the CPU to slow down or stop its clock without erasing information Enables power saving in peripherals Requires a specialized BIOS and OS
chown command
Enables you to change owner and group with which a file or folder is associated Syntax: chown <new owner> filename
Telnet is a terminal emulation program for TCP/IP networks that uses port 23.
Enables you to connect to a server or fancy router and run commands on that machine as if you were sitting in front of it
Cellular wireless network
Enables you to connect to the Internet through a network-aware smartphone, tablet, or other mobile device
grep
Enables you to search through text file or command output to find specific information or filter out unneeded information
Encrypting file system (EFS)
Encrypted files and folders are unreadable to anyone without the key. Files and folders can be encrypted or compressed.
Ransomware
Encrypts all the data it can gain access to on a system Asks for money to decrypt data
NTFS permissions
Every folder and file has a list that details every user or group with access, and specifies the level of access Can be quite detailed and powerful Can set up permissions to edit but not delete a file
To make dynamic volume bigger, right-click the volume and choose _______________.
Extend Volume
What are the four stages of the pipelining process?
Fetch, Decode, Execute, and Write
Compression
Files and folders may be compressed to save space. Windows Explorer/File Explorer displays filenames for compressed files in blue.
MAC address filtering
Filters based on each host's unique MAC address Creates a type of accepted user list
How many root keys are in the Registry?
Five
Which chip contains the system BIOS and can hold data permanently, even without electricity?
Flash ROM
What is the smallest motherboard version in the ATX standard?
Flex ATX
Which ATX form factor is essentially no longer in use?
FlexATX
On USB 1.1 and 2.0 cables, the A and B ports and connectors use _______________ pins.
Four
Fragmentation
Fragmentation occurs when files are spread across clusters.Individual files are broken into pieces that fit into a sector or cluster.The pieces are stored on the hard drive but may not be stored in contiguous clusters. Fragmentation slows down the system during hard drive reads and writes. Programs such as Disk Defragmenter and Optimize Drives can rearrange files.
Infrared wireless networking
Functions in ad hoc mode Uses the Infrared Data Association (IrDA) protocol Requires line-of-sight with maximum 1 m distance No authentication or encryption Operates at half-duplex
The Registry is organized in a tree structure similar to the folders in the PC. Once you open the Registry Editor in Windows, you will see five main subgroups, or root keys:
HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_USERS HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG
Southbridge
Handles expansion devices and mass storage drives
Connecting to an ISP requires:
Hardware for connectivity Software (protocols)Governs the connection and data flow.
Northbridge
Helps the CPU work with RAM (on older systems) Communicates with video on newer AMD systems
What technology requires that the OS and applications be written specifically to handle multiple threads?
Hyper-Threading
Cluster sizes
It is possible to adjust cluster sizes, but rare to do so. NTFS supports 16 TB on a dynamic disk but limited to 2 TB on a basic disk.
Ways to increase range(WIFI)
Install multiple WAPs to permit "roaming" between one WAP's coverage area and another's—an EBSS. Install a replacement that increases a single WAP's signal strength, thus increasing its range. Signal boosters can give you even more power. Wireless repeaters/extenders can receive and rebroadcast a Wi-Fi signal.
Joule
Joule is a unit of electrical energy.Used to rate surge suppressorsThe higher the rating, the better the protection
ps
Lists the processes running on the system
KVM switches
Keyboard, video, mouse (KVM) switch most commonly allows computers to be viewed and controlled by a single mouse, keyboard, and screen.
Access point placement
Limit risk by hiding the network from outsiders. Keep omni-directional antenna close to center of home or office.
How LCDs work
Liquid crystals take advantage of the property of polarization. Liquid crystals are composed of specially formulated liquid. Liquid is full of long, thin crystals that always orient themselves in the same direction. The crystals act like a liquid polarized filter.
What typically is used by a CPU to process memory requests to the RAM?
MCC Memory control chips
LED
Manufacturers also use several types of light-emitting diode (LED) light for backlighting, either directly illuminating pixels from behind or flooding the panel from the edges of the bezel.Directly illuminating pixels from behind produces outstanding contrast and colorCosts a lot more than the edge typesLED monitors are LCD monitors that use LEDs for backlighting
UTP is the specified cabling for 10/100/1000BaseT and is the predominant cabling system today.
Many types are available for the needs of different networks.
Power Users
Members of the Power Users group are almost as powerful as Administrators, but they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.
Users
Members of the Users group cannot edit the Registry or access critical system files. Can create groups but manage only those they create also called standard users
Windows Preinstallation Environment (WinPE or Windows PE).
Microsoft calls the installation environment
PPTP VPNs
Microsoft developed Point-to-Point Tunneling Protocol (PPTP), an advanced version of PPP (used for dial-up Internet, as discussed earlier) that handles a VPN connection right out of the box. Microsoft places the PPTP endpoints on the client and a special remote access server program called Routing and Remote Access Service (RRAS), available on Server versions of Windows.
Which connector is the most common type of connector used for devices that require 5 V or 12 V of power?
Molex
Configuration Troubleshooting (1 of 2) wifi
Most common type of problem is misconfigured hardware or software. Verify SSID configuration for any bands in use.Check access point and affected wireless nodes.Be careful not to add blank characters where they don't belong. If a client can no longer connect:WAP may be down or may have been changed. Ensure MAC address of client is on the list of accepted users.
Telephone scams
Most common type of social engineering attack
Temperature and humidity are important considerations.
Most computers are designed to operate around 22°C (72°F) with relative humidity in the 30 to 40 percent range. Colder and dryer air is better for computers. Ensure air ducts are free from obstructions. Prevent equipment from being closed off from proper ventilation.
FireWire (also known as IEEE 1394)
Much like USB but uses different connectors and is the older technology IEEE 1394a runs at 400Mbps IEEE 1394b runs at 800Mbps
During a(n) _______________ installation, the new operating system can be installed into a different subdirectory on a different drive, leaving the old operating system intact and usable.
Multiboot
Multimode fiber optic cabling
Multimode fiber transmits multiple light signals at the same time.Each signal uses different reflection angle within the core of the cable.
Windows runs many processes simultaneously, a feature known as ______________.
Multitasking
All home routers use a technology called Network Address Translation (NAT):
NAT presents an entire LAN of computers to the Internet as a single machine by showing only your public IP address. NAT acts as a firewall, protecting your internal network from probing or malicious users.
Nano-ITX and Pico-ITX
Nano-ITX measures 4.7 by 4.7 inches. Pico-ITX is 3.8 by 2.8 inches. These form factors are commonly used on embedded and specialty systems. One of greatest benefits of these SSF motherboards is very low power requirements.Produce very low heatCan use passive cooling systems, making them almost noiseless
Internet service providers (ISPs) gain access to the Internet from leased Tier 1 and Tier 2 connections. ISPs come in many sizes:
National companies such as Comcast Local shops such as Electric Power Board (EPB) of Chattanooga in Tennessee
Two technologies are NOT used on portables:
Plasma - energy needs too high Organic light-emitting diode (OLED) - too expensive
Classless Inter-Domain Routing (CIDR)
Network techs refer to the subnet mask by the number of 1s it contains. From a practical standpoint, all you have to know as a tech is how to set up a computer to accept an IP address and subnet mask combination that your network administrator tells you to use.
LCD monitors use digital signals.
New LCDs (and video cards) feature the digital video interface (DVI) standard. DVI includes three different connectors: DVI-D, DVI-A, and DVI-A/D (or DVI-I). DVI-D and DVI-I connectors have two varieties:Single-link DVI has a maximum bandwidth of 165 MHz.Dual-link DVI has higher throughput and can support higher resolutions.
Three types of batteries have been most commonly used in portable computers.
Nickel-cadmium (Ni-Cd) Nickel-metal hydride (Ni-MH) Lithium-Ion (Li-Ion)Lithium polymer (LiPo) batteries are a variation of Li-Ion.
SMTP
OBJ-1.6: You should configure SMTP since it is the only protocol used to send emails. POP3 and IMAP are used to receive emails. HTTPS is used for web browsing, not for receiving emails.
SSO
OBJ-1.7: Single Sign-on (SSO) is an authentication technology that allows users to authenticate once and receive authorizations for multiple services. The advantage of single sign-on is that each user does not have to manage multiple user accounts and passwords. The disadvantage is that compromising the account also compromises multiple services.
SODIMM
OBJ-1.1: Laptops and integrated PCs usually use SODIMM memory due to the memory module's smaller footprint. SODIMM is the Small Outline Dual Inline Memory Module, and it can be purchased in various types and sizes to fit any laptop.
LCD
OBJ-1.2: A LCD (TFT) with fluorescent backlight has been the standard display technology for the last few years. The backlight is a fluorescent bulb that illuminates the image, making it bright and clear. An inverter supplies the correct AC voltage to the backlight from the laptop's DC power circuits. More modern laptops use LED displays that replace the fluorescent backlight with an LED backlight. OLED and plasma displays do not require a backlight.
OLED
OBJ-1.2: An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and can be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a dark room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight.
Inverter
OBJ-1.2: The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop's display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight.
Digitizer
OBJ-1.2: When a laptop has a touchscreen display, it will also have a digitizer fitted. The digitizer is sandwiched between a layer of glass and the LCD. Analog signals are created when you tap or swipe the surface of the display. The digitizer is connected to the laptop with a flexible digitizer cable. A grid of sensors is activated when you tap or swipe the screen. The sensors' information is sent through the digitizer cable to a circuit that converts the analog signal to a digital signal.
Docking Station
OBJ-1.3: A docking station provides additional capability to a laptop and further expansion of its capabilities. For example, a docking station can provide power, external monitor connections, additional storage, and even CD/DVD drives in them. A port replicator, on the other hand, is simply a device that plugs into a single port, such as a USB port, and then gives you access to additional common ports like serial, USB, parallel, PS/2 (keyboard and mouse connectors), and sometimes even audio jacks. Generally, a port replicator gives you easy access to the existing functionality in a laptop, but a docking station can provide additional capabilities to the laptop, as well.
Port Replicator
OBJ-1.3: A port replicator is a device used to connect multiple peripherals to a laptop quickly. The monitor, printer, network, keyboard, and mouse are permanently plugged into the port replicator, connecting to the laptop via the USB port. A docking station provides additional capability to a laptop and further expansion of its capabilities. For example, a docking station can provide power, external monitor connections, additional storage, and even CD/DVD drives in them. A USB 4-port hub will only provide USB expansion (which doesn't support a monitor by default) and is therefore not a possible right answer to this question.
Accelerometer
OBJ-1.4: Most wearable fitness devices come with a 3-axis accelerometer to track movement in every direction. Some more advanced trackers will also use a gyroscope to measure the orientation and rotation of the device. However, the accelerometer is still the crucial component to measure the activity of the user. The data collected is then converted into steps and activity and from then into calories and sleep quality.
Port 143
OBJ-1.6: IMAP uses port 143 to connect to the server and download any received emails.
Port 25
OBJ-1.6: SMTP uses port 25 to connect to the server and send emails from a client.
HTTP
OBJ-2.1: HyperText Transfer Protocol (HTTP) is the basis for the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. A client connects to the HTTP server using its TCP port (the default is port 80) and submits a resource request using a Uniform Resource Locator (URL). HTTPS (HTTP Secure) uses port 443. In this question, it states that the user can access HTTPS but not HTTP, indicating that port 80 is blocked.
Port 21
OBJ-2.1: Port 21 is used for FTP. Port 22 is used for SSH. Port 23 is used for telnet. Port 25 is used for SMTP.
Port 23
OBJ-2.1: Port 23 is used by telnet, which administrators use to connect remotely to a server and issue commands via a command-line interface. Telnet is not commonly used in networks anymore because all of the commands sent back and forth to the server are passed without any encryption or protection. Therefore, telnet is a security risk and has been mostly replaced by SSH (Port 22). Port 25 is used by SMTP, Port 110 is used by POP3, and port 443 is used by HTTPS.
RDP
OBJ-2.1: RDP operates over port 3389 by default. The Microsoft Remote Desktop Protocol (RDP) provides remote display and input capabilities over network connections for Windows-based applications running on a server. Essentially, RDP allows users to control their remote Windows machine as if they were working on it locally.
SNMP
OBJ-2.1: SNMP works over UDP ports 161 and 162 by default. SNMP (Simple Network Management Protocol) is a protocol for monitoring and managing network devices. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event.
TCP
OBJ-2.1: TCP (Transmission Control Protocol) is a slower but more reliable data delivery protocol. TCP is responsible for ensuring that packets arrive error-free and without loss. If you are doing something that must get to the destination without errors or data loss, such as a banking transaction or stock trade, it should be sent over TCP by your web browser. Web browsing over ports 80 and 443 uses TCP.
Port 548
OBJ-2.1: The Apple File Protocol (AFP) uses port 548 by default. AFP is the native file and printer sharing protocol for Mac computers. It supports many unique Mac attributes that are not supported by other protocols.
Repeater
OBJ-2.2: A repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Repeaters may be wired or wireless, and they simply rebroadcast whatever signal is received through their transmitter.
WAP
OBJ-2.2: A wireless access point (WAP), or access point, connects directly to a wired local area network, typically Ethernet, and the AP then provides wireless connections using wireless LAN technology, typically Wi-Fi, for other devices to use that wired connection. APs support the connection of multiple wireless devices through their one wired connection. While a switch or hub could be used instead, either of these options would require the staff to run 20 cables to the conference attendees that are time-consuming and more expensive than simply offering a Wi-Fi connection using an access point.
Whitelist
OBJ-2.3: A whitelist is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied. For example, if you create an access control list that relies on whitelisting, it would block every IP address that is not found in the whitelist.
MAC Filtering
OBJ-2.3: MAC (media access control) filtering involves applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it. MAC filtering can be configured as either a whitelist (only allow those listed) or blacklist (only deny those listed). This is commonly used to block unwanted wireless clients from connecting to your wireless access points. A MAC is a unique hardware identifier for a network interface card.
QoS
OBJ-2.3: Quality of Service (QoS) means using a network protocol to prioritize certain traffic types over others. Enterprise networks can use QoS protocols to make sure traffic such as Voice over IP calling or video conferencing is given higher priority than traffic where packets' timing is less important, such as ordinary file downloads. The other options are focused on blocking traffic, not prioritizing traffic.
WEP
OBJ-2.3: The Wired Equivalent Privacy (WEP) encryption system is based on the RC4 cipher. WEP allows you to select from different key sizes (64-bit or 128-bit). A larger key makes it more difficult to attack the security system. Unfortunately, the system uses a 24-bit initialization vector, making it simple to hack and crack. You should never use WEP in your wireless networks.
802.11ac
OBJ-2.4: 802.11ac networks are the fastest wireless networks in use today. They support speeds of up to 1 Gbps using the 5.0 GHz frequency band. 802.11n can use both 2.4 GHz and 5.0 GHz frequencies but only supports 108-600 Mbps speeds. 802.11a uses the 5.0 GHz frequency and supports 54 Mbps, while 802.11g uses the 2.4 GHz frequency and supports 54 Mbps.
5G
OBJ-2.4: The 5G specification has been able to reach up to 70 Gbps under test conditions. This is the newest version of cellular data standards and can reach 100 Mbps for a fast-moving user, such as a passenger in a moving vehicle.
802.11g
OBJ-2.4: The wireless 802.11g standard supports the use of the 2.4 GHz frequency band and can reach speeds of up to 54 Mbps. Wireless 802.11g was an improvement over the 802.11b standard. It uses the same frequency (2.4 GHz) but increased the speed from 11 Mbps (802.11b) to 54 Mbps (802.11g).
Syslog server
OBJ-2.5: A Syslog server is used to capture logs from different devices. It allows for the correlation of logs to simplify log review and an analyst's ability to respond to alerts. For example, Syslog messages can be generated by Cisco routers and switches, servers and workstations, and collected in a central database for viewing and analysis.
UTM
OBJ-2.5: A Unified Threat Management (UTM) appliance is one that enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention. A UTM centralizes the threat management service, providing simpler configuration and reporting than isolated applications spread across several servers or devices.
Embedded System
OBJ-2.5: An embedded system is a computer system designed to perform a specific, dedicated function. These systems can be as small and simple as a microcontroller in an intravenous drip-rate meter or as large and complex as an industrial control system managing a water treatment plant. Embedded systems might typically have been designed to operate within a closed network. The network elements are all known to the system vendor, and there is no connectivity to wider computer data networks.
IPS
OBJ-2.5: An intrusion prevention system (IPS) is a form of network security that detects and prevents identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them. An IPS can block malicious network traffic, unlike an IDS, which can only log them.
VLAN
OBJ-2.6: A VLAN (virtual LAN) allows a single physical switch to be divided into logical networks. VLANs are only supported on managed switches, but they allow for a different logical subnetwork address to be assigned to various ports on the switch. This requires that communications between different VLANs must go through a router, just as if you had multiple switches.
Dynamic IP Address
OBJ-2.6: A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server's IP address to the workstation or device.
Cable wife connection
OBJ-2.7: A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network's high bandwidth.
MAN
OBJ-2.7: A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area. The term MAN is applied to the interconnection of local area networks (LANs) or campus area networks (CANs) across a city into a single larger network. A MAN is larger than a CAN or MAN, but smaller than a WAN.
PAN
OBJ-2.7: A personal area network (PAN) is a computer network for interconnecting devices centered on a person's workspace. A PAN provides data transmission among devices such as computers, smartphones, tablets, and personal digital assistants. PANs can be used for communication among the personal devices themselves or for connecting to a higher level network and the internet where one master device takes up the role as a gateway. PANs usually operate over Bluetooth or USB connections.
satellite network connectivity
OBJ-2.7: Satellite systems provide far bigger areas of coverage than can be achieved using other technologies. A Very Small Aperture Terminal (VSAT) microwave antenna is aligned to an orbital satellite that can either relay signals between sites directly or via another satellite. While satellite internet does have some latency issues, it is the only option that will provide coverage while crossing the ocean. Cable cannot be used since you cannot keep the ship plugged in and drag the cable behind you. Cellular won't work once you get further than about 5 miles from the coastline due to the lack of cellular towers. Dial-up won't work unless you have a phone line, which would have to be cellular if you are located in the middle of the ocean.
LAN
OBJ-2.7: Since all of the computers and switches are located in the same building, it is best described as a Local Area Network (LAN) configuration.
WMN
OBJ-2.7: The 802.11s standard defines a Wireless Mesh Network (WMN). Unlike an ad hoc network, nodes in a WMN (called Mesh Stations) can discover one another and peer, forming a Mesh Basic Service Set (MBSS). The mesh stations can perform path discovery and forwarding between peers, using a routing protocol, such as the Hybrid Wireless Mesh Protocol (HWMP).
loopback plug
OBJ-2.8: A loopback plug is used to test a port. It involves connecting pin 1 to pin 3 and pin 2 to pin 6. You can do this either by rewiring the jack or twisting the relevant pairs together on a cable stub. Alternatively, you can purchase a prefabricated loopback plug. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software.
Punchdown Tool
OBJ-2.8: A punchdown tool is used to press a wire into the terminal on the rear of a patch panel or network wall jack. The punchdown tool then cuts through the insulation to make an electrical connection with the terminal block. A 110-block is the standard patch panel used for computer networks.
Cable Tester
OBJ-2.8: Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. Devices classed as certifiers can be used to test and certify cable installations to a particular performance category.
Bonjour
OBJ-3.10: Bonjour, Apple's zero-configuration networking protocol, automates certain aspects of network configuration; the protocol enables devices connected to the local area network to discover and connect automatically. Businesses can use Bonjour to make the sharing of files and devices easier; the technology works with wired and wireless LANs. After enabling Bonjour on a workstation, other computers on the network can detect and install printers or scanners attached to the workstation or access files from shared folders.
Impact Printer
OBJ-3.11: An impact or dot-matrix printer is an older type of printer that works by pressing a ribbon of ink onto the top sheet of paper using a series of dots. This is called an impact printer because it pushes the ribbon against the paper to create the image or text using a series of dots to create the image or text. These printers are most commonly used when multiple copies of a document must be created at once (like a 3-part form or contract to be signed). As these older printers are being retired and it is harder to find impact printers to purchase, most organizations are now switching to laser printers and requiring customers to sign multiple copies of the same invoice after they are printed using a laser printer.
IDE
OBJ-3.1: An IDE (Integrated Drive Electronics) cable is an older cable interface that used to be used for the transmission of data between the motherboard and various internal devices like hard drives and CD-ROM drives. A IDE cable is a 40-pin ribbon cable that operated at relatively slow speeds (less than 50 mbps). IDE cables were also known as PATA (Parallel ATA) cables, as opposed to SATA (Serial ATA) cables. It is rare that you will come across an IDE cable in use today, but if you are working on a very old computer in an office (legacy machine), there is a chace you will have to work with one.
Plenum Cables
OBJ-3.1: Plenum-rated cable has special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. For example, most large office buildings use the space between the ceiling and the roof to return air to the AC unit. This qualifies this area as a plenum ceiling, and all the cables that go through that ceiling must be plenum rated. It is important to check your local building codes to see if you need to use plenum cable. These plenum cables cost more because the insulation material must meet the standards for plenum cables while also meeting the standards for category 5e.
Type B USB Connector
OBJ-3.1: The most common USB connector used to connect to a printer is USB Type B. This connector has a large square-shaped male connector that is connected to the rear of the printer. A USB Type A connector is often used to connect to the workstation or computer itself. This question specifically asked which connector is being attached to the printer. Therefore the answer is Type B. While some newer printers may begin to use USB-C connections, it is not commonplace as of this version of the exam.
VGA
OBJ-3.1: This port is the VGA connection. It is used for legacy monitors and is an analog format. For the exam, it is important that you can identify the different parts of a motherboard's rear port cluster by sight.
DM-9
OBJ-3.2: A DB-9 is usually used to terminate an RS-232 connection on a serial cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. An RJ-45 connector is usually used to terminate an Ethernet cable. An RJ-11 is usually used to terminate a phone line.
RJ-45
OBJ-3.2: An RJ-45 connector is usually used to terminate an Ethernet cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. A BNC connector is an older connector used in old coaxial data networks like 10BASE2 and 10BASE5 networks. RJ-11 connectors are used to terminate phone lines and cables.
What connector terminates an ethernet cable
OBJ-3.2: An RJ-45 connector is usually used to terminate an Ethernet cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. A DB-9 is usually used to terminate an RS-232 connection on a serial cable.
DB-9 connector
OBJ-3.2: DB-9 connectors are designed to work with the EIA/TIA 232 serial interface standard, which determined the function of all nine pins as a standard so that multiple companies could design them into their products. DB-9 connectors were commonly used for serial peripheral devices like keyboards, mice, joysticks, and data connectivity. Today, the DB9 has mostly been replaced by more modern interfaces such as USB, PS/2, Firewire, etc. However, there are still many legacy devices that use the DB-9 interface for serial communication.
SCSI
OBJ-3.2: Don't be mistaken by all of the extra information provided in the question about the legacy (old) server in a closed IPX network. Focus on what the question is asking: what type of hard drive uses an ID number between 0-15 that must be set. The only types of hard drives or devices that use an ID number are narrow SCSI (0-7) and wide SCSI (0-15). Therefore, the correct answer is SCSI. The Small Computer System Interface (SCSI) is a set of parallel interface standards developed by the American National Standards Institute (ANSI) for attaching printers, disk drives, scanners, and other peripherals to computers. SCSI is supported by all major operating systems and was heavily used in older servers in the late 90s and early 2000s until SATA replaced it in most applications.
RJ-45 connector
OBJ-3.2: RJ-45 (Registered Jack 45) refers to a cable termination specification that specifies physical male and female connectors and the pin assignments of data jacks that can be used for networks and VOIP telephone cables. RJ-45 is an 8-pin/8-position plug or jack commonly used to connect computers onto Ethernet-based local area networks (LAN) and consists of two wiring schemes: T568A and T568B.
SODIMM
OBJ-3.3: Small Outline Dual Inline Memory Modules (SODIMM) is a small form factor used in memory modules. SODIMM is used in nearly every laptop available. For the exam, if you see a question asking about memory and laptops, the answer will most likely be SODIMM. SODIMM is also heavily used in Micro PCs (like Mac Minis) and all-in-one computers due to their smaller size.
Hyper Threading
OBJ-3.5: Hyperthreading is a technology used to split the physical cores of a processor into multiple logical cores. This allows the system to run multiple cores for each operating system in a virtualized environment. Since the question asked about logical cores and not physical cores, the answer is hyperthreading and not a multi-core processor.
L1 Cache
OBJ-3.5: Level 1 (L1) cache is the fastest and closest memory to the processor core. A CPU cache is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory. A cache is a smaller, faster memory located closer to a processor core, storing copies of the data from frequently used main memory locations. Most CPUs have a hierarchy of multiple cache levels (L1, L2, L3, L4, etc.), with separate instruction-specific and data-specific caches at Level 1.
LoJack
OBJ-3.5: LoJack for Laptops is a proprietary laptop theft recovery software that grants remote access to lock, delete sensitive files, and locate the stolen laptop. The user will need to install a LoJack program on the laptop and create a security card with the laptop's PIN/ID. This PIN/ID can be used to track down the laptop whenever it reconnects to the internet.
Virtual Network
OBJ-4.1: A virtual machine includes a virtual NIC. A virtual NIC is a type of virtual adapter that can be configured on logical partitions to provide a network interface. This virtual NIC can be paired and mapped to a physical NIC to get the VM onto the network.
PCle
OBJ-3.5: PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity.
AGP
OBJ-3.5: The area circled indicates the AGP slot on this motherboard. The AGP slot is a legacy expansion slot for older video cards. Newer systems use PCIe x16 instead. For the exam, it is important that you can identify the different parts of the motherboard by sight.
Mini PCLe
OBJ-3.5: The area circled indicates the Mini PCIe slot. This is used to connect internal cards (like WiFi network cards), or motherboard mounted solid-state storage devices. For the exam, it is important that you can identify the different parts of the motherboard by sight.
What is the purpose for using a secure boot?
OBJ-3.5: The purpose of Secure Boot is to prevent malicious and unauthorized apps from loading into the operating system (OS) during the startup process. Secure Boot is enabled by default in Windows 10. When the PC starts, the firmware checks the signature of each piece of boot software, including UEFI firmware drivers (also known as Option ROMs), EFI applications, and the operating system. If the signatures are valid, the PC boots and the firmware gives control to the operating system. The OEM can use the firmware manufacturer's instructions to create Secure boot keys and store them in the PC firmware. When you add UEFI drivers, you'll also need to make sure these are signed and included in the Secure Boot database.
Thermal Paste
OBJ-3.5: Thermal paste is a liquid gel-like substance that is placed in between the CPU and heat sink. Thermal paste draws the heat away from the CPU and up towards the heat sink. This helps cool down the processor more quickly and increases the overall efficiency of the cooling system. In a traditional cooling system, you place the thermal paste on the CPU, then attach the heat sink, and finally connect the cooling fan on top of the heat sink.
PXE
OBJ-3.5: To configure a computer to utilize the PXE boot option, you need to configure it under the BIOS boot option. The Preboot Execution Environment (PXE) is an industry-standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.
TPM
OBJ-3.5: You should check the BIOS settings to ensure that TPM (Trusted Platform Module) is enabled. TPM enables a system to encrypt the contents of the HDD/SDD and will require a password to be entered during the boot process for the HDD/SDD to be decrypted. A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
KVM
OBJ-3.6: A KVM (or Keyboard, Video, and Mouse) is a simple and easy to use hardware switching device that allows for multitasking on a single device. A KVM gives you the ability to connect 2 to 64 physical computers to a single set of hardware devices, such as a keyboard, monitor, and mouse. KVMs can be directly connected to the systems being controlled over USB, known as local remote. Modern KVMs can also operate over the network using KVM over IP, common in large datacenter implementations.
Refresh Rate
OBJ-3.6: Refresh rate is defined by the vertical scan frequency of a monitor and how many times in one second an image can be redrawn on the screen. LCD monitors have a fixed refresh rate based on the specifications of its panel. Generally, a monitor is rated with a refresh rate of 60 Hz, 72 Hz, or 120 Hz, with the higher refresh rate being considered better quality and easier on the user's eyes. For high-performance gaming systems, a 120 Hz monitor is desired for smoother motion and graphics.
NAS
OBJ-3.8: According to CompTIA, the five main things you need to include for network-attached storage (NAS) devices are (1) media streaming capabilities, (2) file-sharing capabilities, (3) Gigabit NIC, (4) RAID array, and (5) hard drives. Based on the options provided, you should pick the RAID 5 and Gigabit NIC for this device's configuration. The RAID 5 will provide both speed and redundancy to the NAS device, whereas the RAID 0 would provide only speed without redundancy. The Gigabit NIC will provide 1 Gbps (1000 Mbps) of network speed instead of the 100 Mbps provided by a FastEthernet NIC. For a NAS device, you should use multiple hard disk drives in a RAID, not a single 1 TB HDD or 1 TB SSD. For a NAS, it is preferred to choose hard drives over solid-state drives because of the increased storage capacity and lower cost.
Computer for video editing requirements
OBJ-3.8: According to CompTIA, the two main things you need to include for a dedicated virtualization workstation are (1) maximum RAM and (2) multiple CPU cores. Based on the options provided, you should pick the 64 GB of DDR4 (maximum RAM) and the Intel i9 with 8-cores (multiple processor cores) for this workstation's configuration.
Thin Client
OBJ-3.9: A thin client is a small device that can operate with or without an operating system installed on the client device. Instead, it can boot directly from a network-based operating system on a common server and access applications on the company's application server. This type of architecture can drastically reduce the need for operating system licenses and reduce deployment costs. A thin client runs from resources stored on a central server instead of a localized hard drive. Thin clients work by connecting remotely to a server-based computing environment where most applications, sensitive data, and memory are stored.
Hybrid Cloud
OBJ-4.1: A hybrid cloud model allows for the seamless integration of both onsite and cloud services to the end-user simultaneously. Hybrid clouds can be cost-efficient, flexible, easy to migrate to a complete cloud solution in the future, and require less maintenance than completely onsite options. As with all cloud options, the contents must be properly secured due to the elastic storage nature of all cloud solutions and the possibility of data remnants.
Remote Hosted Virtual Desktop
OBJ-4.1: A remote hosted virtual desktop (HVD) is a full, thick-client user environment run as a virtual machine (VM) on a server and accessed remotely. Using a hosted virtual desktop allows a company to utilize the cloud for its desktop infrastructure, reduce its maintenance cost, and shift capital expenses (such as new desktops) to operational expenses (monthly fees to pay for virtual desktop services).
Community Cloud
OBJ-4.1: Community Cloud is another type of cloud computing in which the cloud setup is shared manually among different organizations that belong to the same community or area. A multi-tenant setup is developed using cloud among different organizations belonging to a particular community or group with similar computing concerns. For joint business organizations, ventures, research organizations, and tenders, a community cloud is an appropriate solution. Based on the description of 15 member banks coming together to create the CloudBank organization and its cloud computing environment, a community cloud model is most likely described.
I/O Bandwith
OBJ-4.1: I/O bandwidth is the measurement of the amount of input and output operations that can be performed within a given time. The higher the I/O bandwidth, the faster and more efficient a cloud file-storage synchronization application will become. Applications that rely on large amounts of reading and writing of data require a high amount of I/O bandwidth. Disk speed is not nearly as important since most cloud file-storage systems use a virtualized file system for storage and do not rely on a single disk. Instead, they rely on a storage area network or a virtualized storage solution.
PaaS
OBJ-4.1: Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves. If you want to develop a customized or specialized program, PaaS helps reduce the development time and overall costs by providing a ready to use platform.
Rapid Elasticity
OBJ-4.1: Rapid elasticity allows users to automatically request additional space in the cloud or other types of services. Because of the setup of cloud computing services, provisioning can be seamless for the client or user. Providers still need to allocate and de-allocate resources that are often irrelevant on the client or user's side. This feature allows a service to be scaled up without purchasing, installing, and configure new hardware, unlike if you had to install more physical storage into a server or datacenter.
Rapid elasticity
OBJ-4.1: Rapid elasticity can be a security threat to your organization's data due to data remanences. Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. If the data was not properly erased from the underlying storage, it could be exposed to the other organization. For this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others.
Resource Pooling
OBJ-4.1: Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.
SaaS
OBJ-4.1: Software as a Service (SaaS) is used to provide web applications to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Officer 365 are both word processing SaaS solutions. QuickBooks Online is one example of a SaaS solution for accounting.
SaaS
OBJ-4.1: Software as a service (SaaS) allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools. SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. You rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser. All of the underlying infrastructure, middleware, app software, and app data are located in the service provider's data center. The service provider manages the hardware and software, and with the appropriate service agreement, it will ensure the availability and the security of the app and your data. SaaS allows your organization to get quickly up and running with an app at minimal upfront cost.
Virtualization Support
OBJ-4.2: CPU Virtualization is a hardware feature found in all current AMD & Intel CPUs that allows a single processor to act as if it was multiple individual CPUs. This allows an operating system to more effectively & efficiently utilize the CPU power in the computer to run faster. This is enabled or disabled on supported processors within your system's BIOS.
Emulator
OBJ-4.2: Emulators emulate hardware without relying on the CPU being able to run code directly. Virtual machines use CPU self-virtualization, to whatever extent it exists, to provide a virtualized interface to the real hardware. A simulator is a limited scope that is usually used in training to mimic a real system's functionality. Emulators were created before virtualization and operate much slower than a true virtualization environment with a hypervisor.
Which of the following is a security concern when dealing with virtual machines? Rogue VM
OBJ-4.2: The process of developing, testing, and deploying images brings about the first major security concern with the virtual platform itself. This is the problem of rogue VMs. A rogue VM is one that has been installed without authorization. The uncontrolled deployment of more and more VMs is referred to as VM sprawl. After all, it is a lot easier to add a guest image to a server than it is to plug a new hardware server into the network.
Virtual Box
OBJ-4.2: Virtual Box is a Type 2 hypervisor that allows you to install the software inside your existing operating system. You can then install a virtual machine containing another guest operating system. For example, a macOS system can have Virtual Box installed and then utilize Windows as a guest operating system inside a virtual machine hosted by Virtual Box. The other options listed are all Type 1 or bare-metal hypervisors.
Distended Compacitor
OBJ-5.2: A distended capacitor on a motherboard is an indication of a fault on the motherboard. Capacitors can bulge and release a substance that has a foul smell when they fail. Capacitors are tiny electrical components that are soldered onto the motherboard and aid in the storage and use of DC voltage.
Burnt Motherboard Smell
OBJ-5.2: A foul smell is usually indicative of a distended capacitor. Capacitors are small electrical components on the motherboard. Therefore you should inspect the motherboard for replacement. If there was a burning smell, then the power supply should be the first component inspected.
F12
OBJ-5.2: F12 is the most commonly used key used to enter the boot order selection screen. The boot order is a menu that allows you to select which device you wish to boot from, such as the hard drive, DVD, or a removable USB device. If you wanted to boot to USB, you would use the up and down arrow, and press Enter to tell the boot command to boot from USB. This works for Windows and Linux machines, but not for macOS since it uses a different boot manager.
BSOD is usually due to what?
OBJ-5.2: The Blue Screen of Death (BSOD) is a "stop screen" that appears when the Windows operating system detects a critical error and literally stops the system so that the error doesn't cause any loss of data. All operating systems have some form of "stop screen," but the Windows version got the name BSOD since it was a screen with a full blue background and white text containing troubleshooting information and error codes. On a Mac (OS X) system, the BSOD is replaced by the "Pinwheel of Death," which is an endlessly spinning mouse pointer displayed on the screen. This usually occurs due to a memory failure or memory corruption in the system.
RAID 0
OBJ-5.3: RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group. Unlike other RAID levels, RAID 0 does not have parity or redundancy. It will provide faster performance and speed, as well as use 100% of the available drive space.
SATA
OBJ-5.3: Serial Advanced Technology Attachment (SATA) or Serial ATA cables are used to connect devices in computer cable assemblies, such as storage devices and internal hard drives. The other options are all external cable types.
Incorrect Display Resolution
OBJ-5.4: This is likely a screen resolution problem. Each LCD/LED has a native resolution that fits perfectly on the screen. If a resolution other than the native resolution is used, the screen could become squished, distorted, or have black vertical or horizontal lines filling up the excess space.
Corona Wire
OBJ-5.6: A corona wire is a charged wire in a laser printer that draws the toner off the drum onto the paper. It must be cleaned when the toner cartridge is replaced. A dirty corona wire can cause a portion of the drum not to be charged properly and lead to a white streak appearing on the printed image.
Symptoms of low toner
OBJ-5.6: A symptom of low toner is faded or faint colors in your printed papers. Most modern printers will also indicate the amount of toner left using their on-screen display and present a warning message for low toner and an error message when the printer is completely out of toner.
DHCP failure
OBJ-5.7: A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways, and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to clients' broadcast queries. Since you have received an APIPA address (169.254.13.52), this signifies a DHCP failure.
WIFI Analyzer
OBJ-5.7: A WiFi analyzer can determine the wireless network's signal strength, the frequencies in use, and any possible radio frequency interference. Based on the issue described in the question, the network may have dead zones that could be fixed by adding additional access points to increase the network's wireless coverage. Another possible issue could be radio frequency interference from other devices, which a WiFi analyzer could help identify.
What's an APIPA Address
OBJ-5.7: Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. Any address from 169.254.1.0 to 169.254.254.255 is considered an APIPA address.
STP more info
OBJ-5.7: STP (Shielded Twisted Pair) is a type of cabling that can help prevent electrical interferences or cross talk. A cross-talk is when electrical interference data passing through can cause CRC (Cyclic Redundancy Check) errors. A CRC is used to calculate the before and after checksum is made when transferring data. If electrical interference gets in the way, such as proximity to fluorescent light bulbs, it can cause data to be corrupted and produce an error. UTP (Unshielded Twisted Pair) is cheaper and easier to work with but is subject to interference. Coaxial and fiber are not types of CAT 5e cabling.
What command is used to test if your own network connectivity works properly, including your network card's driver?
OBJ-5.7: The IP Address 127.0.0.1 is a localhost IP for testing your own network interface card (NIC). This IP address is reserved for use with a loopback test. If there is no communication of the return packet, this indicates the network card is faulty, the cable/loopback is loose, or there is bad wiring of the loopback plug.
Which type of coolers are heat-sink and fan assemblies that are included with most Intel retail-boxed CPU?
OEM CPU coolers
Spyware
Often sneaks onto systems bundled with legitimate software
How many wires does a PCIe connection use for sending and receiving data?
One for sending and one for receiving
Modern PC beep code for bad or missing video
One long beep followed by two or three short beeps
Swap partition
Only found on Linux and UNIX systems Acts like RAM when system needs more RAM than you have installed Similar to a Windows page file, but has a dedicated partition
Software RAID
Operating system is in charge of all RAID functions. Built-in software RAID comes with Windows.
What are the three major components in a modern computer?
Operating system, data storage, and networking
HKEY_CURRENT_CONFIG
Options currently being used
Which term describes a milder error that can be caused by memory issues but not necessarily system RAM problems?
Page Fault
What Windows function is similar to a swap partition in Linux/Unix systems?
Page File
Parity RAM allows the computer to detect whether an error occurred in the reading or writing of data in memory.
Parity
Digitizers
Pen tablet enables users to paint, ink, pencil, or otherwise draw on a computer.
Access control—the process of controlling access to data, programs, and other computing resources—is composed of four interlinked areas:
Physical security Authentication Users and groups Security policies
PGA
Pin Grid Array. Type of CPU, usually AMD, that uses protruding pins.
Polarization
Polarization is an electromagnetic property of antennas and their transmitted signals.Signal has the same alignment as the antenna. For best connection between a client and a WAP, wireless signals should have the same polarization.
Benefits of Virtualization
Power saving, hardware consolidation, system management and security, and research.
Trojan horse
Pretends to do one thing while it is doing something else
dd
Primarily used to create an exact, bit-by-bit images of any form of block storage Example uses copying a hard drive backing up a removable flash drive wiping a disk
Which tab shows you every running process on your computer?
Proccesses
Authentication
Process of identifying and granting access to some user who is trying to access a system Logging on to a valid user account provides authentication
Which group would make the most use of the features in graphics workstations?
Professional Photographers
Closed source software
Prohibits modifying the source code or making it part of some other software
Super I/O chip
Provides support for legacy devices and more
The Disk Management program in Windows Server versions can configure drives for _______________, and it works with PATA or SATA.
RAID 0, 1, or 5
Video cards offer other connector types for connecting to things like television sets, camcorders, and other multimedia devices:
RCA BNC Mini-DIN
Registered and buffered memory
Registered RAM (or buffered RAM) refers to a small register installed on some memory modules to act as a buffer between the DIMM and the memory controller. The motherboard will use either buffered or unbuffered RAM (typical consumer RAM), not both.
Which command is a full-featured command-line Registry editor?
Regsrv32
Hardware RAID
Requires an intelligent controller that handles all of the work of implementing RAID Invisible to the operating system Provides needed speed along with redundancy Provides hot-swappingReplace a bad drive without disturbing the OS
Attack vector
Route taken by malware to infect the system
If you need a remote terminal that works securely across the Internet, you need Secure Shell (SSH).
SSH uses port 22, and the entire connection is encrypted (tunneling).
Common fiber optic connectors:
ST connector SC connector LC connector
What feature does Windows 8 use to takes advantage of modern widescreen monitors?
Side by side apps
Corporate/ISP solutions
Set up your client software to match the settings of the e-mail server software.The most popular client by far is Microsoft Outlook. You'll need the names of the Post Office Protocol version 3 (POP3) or Internet Message Access Protocol version 4 (IMAP4) server and the Simple Mail Transfer Protocol (SMTP) server. Use ping to determine the IP address for the device.
Tier 2
Smaller regional networks
FlexATX
Smallest motherboards in the ATX standard Mostly obsolete
The motherboard mounts to the case via small connectors called _______________.
Standoffs
Installing Expansion Cards Steps
Step 1: Knowledge Learn about the device you plan to install. See if it is compatible with your system and make sure it fits you personal needs Step 2: Physical Installation To install an expansion card successfully you need to take steps to avoid damaging the card, motherboard, or both. You need to know how to handle the card (grab it by the edges and don't touch any chips of the card) and make sure no ESD (Electro Static Discharge) occurs. Use an anti static wrist strap or a mat to put you at the same electrical potential as the PC. Also, if you need to store a component use an anti-static bag. Make sure you ALWAYS unplug the PC before touching the inside of it. You could damage parts or hurt yourself if you don't. Step 3: Device Drivers All expansion devices usually need drivers- software support programs- and they are usually loaded from an optical disc (or they can be downloaded from the manufacturers site). When installing device drivers you need to make sure you install you correct one. Step 4: Verify After you install your device, inspect the results and verify that the device works properly. Immediately after installing, you should open Device Manager and verify that Windows sees the device.
HKEY_CURRENT_USER and HKEY_USERS
Stores all of the personalized information for all users on a PC
RAID 0+1/ RAID 1+0
Striped mirroring minumum 4 disks high reliability Start with two RAID 0 striped arrays, then mirror the two arrays to each other
TCP/IP provides the basic software structure for communication on the Internet.
TCP/IP provides the framework and common language for the Internet. All the backbone routers connect redundant, high-speed backbone lines. TCP/ IP enables communication and services for building applications. Enable humans and machines to interface across vast distances
CMOS Battery
The CMOS battery powers your laptop's BIOS firmware, which is responsible for booting up your computer and configuring data flow. You can tell if your CMOS battery has died if your laptop has difficult booting up, if drivers disappear, and if your laptop's date and time are incorrect.Jun 20, 2019
If you have Dynamic Host Control Protocol (DHCP) and your computer is configured to obtain an IP address automatically, your computer boots up and will broadcast a DHCP request.
The DHCP server provides your computer with all the IP information it needs to get on the network.
Guests
The Guests group enables someone who does not have an account on the system to log on by using a guest account.
Molex connector
The Molex connector supplies 5-V and 12-V current for fans and older drives. Chamfers are notches on the connector that guide installation. Molex connectors require a firm push to plug in properly.
In today's computers, the CPU tells _______________ the clock speed it needs, and the clock chip then automatically adjusts for the CPU.
The Motherboard
PRI
The Preferred Roaming Index (PRI) contains radio settings, including ID numbers, network codes, country codes, and other important information that allows the cellphone to connect to the correct service provider's network.
PRL
The Preferred Roaming List (PRL) is a database residing in a wireless (primarily CDMA) device, such as a cellphone, that contains information used during the system selection and acquisition process.
SMB
The Server Message Block (SMB) protocol is Windows' network file and print sharing protocol. UNIX and Linux systems used a competing protocol, Network File System (NFS).NFS has declined.Today, every major OS uses SMB.
SNMP
The Simple Network Management Protocol (SNMP) enables remote query and remote configuration of just about anything on a network, including computers, switches, routers, and anything else that is SNMP-capable.
When moving data from one system to another, the TCP/IP protocol suite needs to know if the communication is connection-oriented or connectionless.
The connection-oriented protocol used with TCP/IP is called the Transmission Control Protocol (TCP). The connectionless one is called the User Datagram Protocol (UDP). Most TCP/IP applications use TCP instead of UDP.
A chipset determines:
The processor type Type and capacity of RAM The internal and external devices supported by the motherboard
Syntax
The proper way to write a command is called its syntax.
rd (rmdir) command
The rd (rmdir) command used for deleting empty directories and subdirectoriesThe rmdir works in Windows, Mac OSX, and Linux.The rd command only works in Windows.
Throw
The size of an image at a certain distance Related to aspect ratio
Infrastructure mode
This mode uses one or more WAPs to connect wireless nodes to a wired network segment. A single WAP servicing an area is called a Basic Service Set (BSS).Adding more WAPs creates an Extended Basic Service Set (EBSS). Infrastructure mode is suited to networks that need to share dedicated resources such as Internet connections and centralized databases.
802.11ac
This standard uses only the 5-GHz band. New version of MIMO called Multiuser MIMO (MU-MIMO) gives WAP ability to transmit to multiple users simultaneously.
Creating Partitions and Volumes in Disk Management
To create a new volume, right-click an allocated part of the drive and select New Simple Volume. Specify the volume and click Next. By default, Windows does not allow you to choose between a Primary and Extended partition. The first 3 volumes you create will be primary and every volume afterwards will be a logical drive in an extended partition (for MBR style drives) Partition is 4 GB format as FAT, NTFS, FAT32 Partition is 4 GB < x < 32 GB then format as FAT32 or NTFS Windows requires NTFS on any partition greater than 32 GB quick format does not test the disk clusters as part of the format process, while full format does
Internet Tiers
To keep everything running smoothly, the Internet is broken down into groups called tiers. Tier 1 (main tier)A small number of companies are Tier 1 providers, which own long-distance, high-speed fiber-optic networks called backbones.Backbones span the major cities of the earth and interconnect at network access points (NAPs).
Virus
Two jobs: replication and activation
The ping command is a great way to see if another system is connected to the network. Use the command-line tool ipconfig for a quick glance at your network settings.
Type ipconfig /all to see all of your TCP/IP settings. The ifconfig command in Mac OS X and Linux provides the same level of detail with no switches
USB Standards and Compatibility ( different types of USB's)
USB 1.1: had two speeds. 1.5 Mbps (low speed) and 12 Mbps (full speed). 5 meters maximum. USB 2.0: 480 Mbps (known as Hi-Speed). 5 Meters maximum USB 3.0: 5 Gbps (SuperSpeed), ports are blue or yellow depending on manufacturer. Keep cable length no more than 3 meters. USB 3.1: 10 Gbps. Colored teals. USB 3.0 cannot be plugged into 2.0 and 1.1 but 2.0 and 1.1 can be plugged into 3.0. Will only run as fast as device (if you plug a 2.0 in 1.1, it will only go at 1.1 speeds.)
Modern ports
USB, Thunderbolt, eSATA, and FireWire Plug and go - no reboot required
The IP address
Unique identification for your system on the network Relies on Internet Protocol version 4 (IPv4) addressing schemeFour sets of eight binary numbers, separated by periods
Any network address must provide two pieces of information:
Uniquely identify the machine Locate that machine within the larger network In a TCP/IP network, the IP address identifies the PC and the network on which it resides.
SATA power connectors
Used for serial ATA drives 15-pin connection Supports the SATA hot-swappable feature and 3.3-, 5.0-, and 12.0-V devices L-shaped; almost impossible to insert incorrectly
Coaxial cable
Used in early versions of Ethernet Still used in cable modems and satellite connections Consists of a center cable (core) surrounded by insulation and covered with shield of braided cable Rated using an RG nameTwo covered on CompTIA A+ exam: RG-59 and RG-6Standards rated by impedance, measured in ohmsBoth RG-59 and RG-6 have 75 ohm impedance
Mini connector
Used only for extinct 3.5 inch floppy disk drives Can insert incorrectly with very little effort
chmod command
Used to change permissions Uses numbering system r:4; w:2, x:1
passwd
Used to change users password-Linux
Rootkit
Uses low-level operating system functions to hide itself
Internet Application Protocols (3 of 3) and their ports
Utility ProtocolFunction Port Number DNS Allows the use of DNS naming UDP 53 DHCP Automatic IP addressing UDP 67, 68 LDAP Querying directories TCP 389 SNMP Remote management of network devices UDP 161 SMB Windows naming/folder sharing; alsoCIFS TCPUDP 445137.138.139 AFP Mac OS X file services TCP 548 SLP Services discovery protocol TCP/UDP 427 NetBIOS/NetBT NetBIOS over TCP/IPTCP 137,139 UDP 137,138
Video cards offer a variety of connections. Standard connections include:
VGA DVI DB-15 DisplayPort Thunderbolt HDMI (including Mini- and Micro- variants)
Which type of PC combines the requirements of a graphics workstation and an audio workstation?
Video editing workstation
What technology enables you to run more than one operating system at the same time on a single computer?
Virtualization
Voice over IP (VoIP)
VoIP refers to a collection of protocols that make phone calls over the data network possible. Low network latency is more important than high network speed. Latency is the amount of time a packet takes to get to its destination and is measured in milliseconds. Two popular ways to set up a VoIP system are:Using dedicated VoIP phones Or using a small VoIP phone adapter
Microsoft calls a drive structure created with a dynamic disk a _______________.
Volume
when is a partition needed
When installing a new OS When adding a new hard drive
POST
When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system
Entering the IP information
When you're configuring a computer to connect to a network, you must enter:The IP addressThe subnet maskThe default gatewayAt least one DNS server
Port 110
Which port is used to connect to a POP3 server to download an receive emails
Overcome bottlenecks in three ways:
Wider bus between video RAM and video processor Specialized super-fast RAM More RAM
Wide area network (WAN)
Widespread group of computers connected using long-distance technologies
msinfo32.
Windows comes with a built-in utility known as the System Information tool that collects information about hardware resources, components, and the software environment. Access it from the Start | Search bar
To show contents of the working directory:
Windows: dir command Linux: ls command
Wireless access point (WAP)
Wireless Ethernet devices can connect to a WAP. A WAP acts like a hub to the wireless hosts in the area. More advanced WAPs can use Power over Ethernet (PoE).
802.11n
Wireless networking standard that can operate in both the 2.4-GHz and 5-GHz bands and uses multiple in/multiple out (MIMO) to achieve a theoretical maximum throughput of 100+ Mbps. Faster speeds New antenna technology Multiple in/multiple out (MIMO)Enables devices to make multiple simultaneous connections Transmit beamforming Minimize dead spots with multiple-antenna technology Dual-band operation support
Mac OS X uses the Hierarchical File System Plus (HFS+) by default
You can read and write to several different file systems with the OS. Latest versions can read and write to FAT32 and exFAT, though only read NTFS.
What type of socket is used to hold a CPU in place?
ZIF
In Windows 8, which tool enables you to set up hard drives, manage devices, test system performance, and much more?
administrative tools
For missing or faulty RAM what beep sequence is conducted
beep that repeats indefinitely
Because CPU makers cannot make the processors run much quicker, they instead _______________.
combine multiple CPUs on a single chip
On-demand self-service
consumers can obtain computing capabilities such as server time or network storage as needed automatically on their own
Clock crystals
control CPU and chipset speeds, but the expansion slots run at a much slower speed than the frontside bus .The expansion bus crystal, which controlled the part of the external data bus connected to the expansion busMade expansion slot timing possible so a card did not have to be produced for each clock speed.
To boot from a network installation, if there is no Preboot Execution Environment (PXE), _______________.
create boot media that forces booting from network location
MBR and GPT disks use partitions and dynamic disks use volumes.
differences of partitions
Which command-line tool displays all the files and folders in a specific directory?
dir
external SATA (eSATA)
eSATA extends the SATA bus to external devices. Cable length up to 2 meters are possible. eSATA extends the SATA bus at full speed. External drives are encased in the external enclosure
Microsoft often uses the term _______________ to define an upgrade installation.
in-Place Upgrade
Resistance
is opposition to the flow of electrons.All wires have slight resistance.Resistance is measured in ohms (Ω).
Wattage
is the amount of amps and volts needed so a device will function Measured in watts (W)W = V × A
Current or Amperage
is the amount of electrons moving past a point in a wire.Measured in amperes (A)
Voltage
is the pressure of electrons in a wire.
Partitioning
is the process of electronically subdividing the physical hard drive into units called partitions.Hard drive must have at least one partition.Each is typically assigned a drive letter such as C: or D:.
DWORD value
like binary values, but limited to exactly 32-bits.
Color depth is represented as bits. Color depth of 24 bitsAny single combination of resolution and color depth you set for your system is called a mode. Number of colorsNumber of bits 2 colors 1 bit (mono) 4 colors 2 bits 16 colors 4 bits 256 colors 8 bits 64k colors 16 bits 16.7 million colors 24 bits
mode
PCs use a 12.0-V current to power
motors on devices such as hard drives and optical drives.
You can click the Windows 10 Task View button to create and manage _______________for grouping your open applications.
multiple desktops
PCIe photo
photo
Alternating current (AC)
rapid and interrupted current, flowing first in one direction and then in the opposite direction
Binary value
stores long strings of 1s and 0s
Root keys are composed of
subkeys
PCs use a 5.0-V/3.3-V current to power
support onboard electronics.
Serial Presence Detect (SPD)
technology detects and automatically sets up installed DIMM.
How many PATA drives—including hard drives, optical drives, and tape drives—can be connected to a single ATA controller?
two
How many functional failures can RAID 10 withstand and remain functional?
up to 2
1 POST beep is good
yeet
NAS and SAN are network storage devices
yes
How many failures can RAID 0 withstand and remain functional?
zero, 0
RAID 0 (striping)
• File blocks are split between physical drives • High performance • No redundancy • Minimum of 2 drives