Core 1 videos

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

IMEI

International Mobile Equipment Identity

IMEI

International Mobile Equipment Identity. Is uniquely assigned to the device itself.

IMSI

International Mobile Subscriber Identity. is uniquely assigned to the user.

A Records

"A" stands for address "AAAA" used for IPv6 records

RAID 1

- Mirroring

RAID 1+0

--- Stripe of Mirrors

Batch files are used to simplify and automate tasks. Which of the following extension is used to create a batch file? .vbs .js .bat .ps1 .py

.bat

Satellite Key Features

1 - 100 Mbps download speeds and 1 - 4 Mbps upload speeds Leased monthly and can be expensive Requires a satellite dish Data provided by ISPs operating earth-orbiting stations Not as fast as other network provider links

Place the 6 steps of the troubleshooting methodology in the correct sequence. Test theory to determine cause Establish plan of action Establish theory of probable cause Document findings Verify system functionality Identify the problem

1. Identify the problem 2. Establish theory of probable cause 3. Test theory to determine cause 4. Establish plan of action 5. Verify system functionality 6. Document findings

T-568A wire sequence

1. White/Green Green White/Orange Blue White/Blue Orange White/Brown Brown

Low Speed USB 1.1 can handle what

1.5 megabits per sec and is 3 meter in length

Typical pin sizes

1.57 mm (0.062 in) 2.3 mm (0.084 in) 2.36 mm (0.093 in)

How is USB 3.2 different from other USBs

10 Gbps or 20 Gbps and uses USB-C

Cat 5 Transmission Limitations

100 megabits per second Not ideal for large corporate environments Prone to electromagnetic interference from other devices Prone to crosstalk

High speed USB 1.1 can handle what

12 megabites per set and is 5 meters in length

DD-50 Connector

17-16-17 pin layout. Fast-SCSI equipment

Bus width

192 bits wider pathway Simultaneous access Dedicated chips in dedicated channels

Bluetooth

2.4 GHz frequency band 79 channels Chanels are 1 Mhz wide Frequency . hopping Weaker signal than Wi-Fi Common in wireless devices

Channels

2.4 GHz is divided into fourteen channels Each channel overlaps with the adjacent channel, but channels 1,6, and 11 do not overlap

Laptop SSD form factors

2.5 inch form mSATA M.2

how are UBS-C connectors different from others

24 pins, double-sided, uses host and device, can't be plugged in upside down, Does not necessarily indicates USB 3.1 or 3.2

Universal Serial Bus Type-C

24-pin USB connector USB 3.1 Superspeed transfer mode Superspeed+ transfer mode USB 3.2 10/20 Gbps for SuperSpeed and Superspeed+

Lightning connector adapters attributes

30-pin. USB. HDMI. VGA. SD cards

IP address Features

32 bit logical address 4 "octets" of 8 bits Network ID and Host ID Determined by subnet mask

Peripheral Component Interconnect (PCI)

32-bit PCI slots White and approximately 3 inches long 3.3V and 5V

LCD screens

32-bit color Pixels Dots per inch (DPI)

Cellular networks support what in GSM networks?

3G, 4G, and 5G

For a GPS device to reliably and accurately report its location, how many satellite signals must be acquired?

4

How is USB 3.0 different from USB 2.0 and 1.1

5 gigabits per sec and is 3 meters in length

Mini PCI Express

54- pin edge connector REctangular

Punch Down Block Types

66 block BIX block Krone block 110 Block

802.11 Infrastructure mode

802.11 a/b/g/n/ac Common connection type Utilizes an access point Many device connected Devices can communicate

PoE Upgrades

802.3at was released in 2009. Also known as PoE+. Increase maximum power delivery to 30W 802.3bt was released 2018. Contain Type 3 and Type 4. Type 3 supports 60W Type 4 supports 100W

A DSL modem operates over which physical medium? A. Phone Cabling B. Wireless C. Ethernet cabling D. Coaxial cabling E. Fiber optic cabling

A

Crimping refers to which process? A. Installing a physical connector onto bare wire ends B. Connecting bare wire ends to a patch panel C. Removing the individual jacket of each wire inside a cable D. Plugging a cable into a receptacle E. Removing the outer protective casing of a cable

A

If a byte is written to an ECC memory module that has four-bit values set to 1, and four set to 0, which type to parity information will be used? A. Even parity B. Split parity C. Odd parity D. No parity

A

In which scenario would you be most likely to use a loopback plug tool? A. When you need to test if the physical interface of a switch is functioning B. When you need to identify unknown endpoints of a cable run C. When you need to test if a cable is broken D. When you need to connect two bare wire ends to each other E. When you need to install a connector on the end of a cable

A

Long-range fixed wireless networking is commonly implemented in which configurations? A. Point-to-point B. Host-to-Host C Ground-to-satellite D. host-to-site E. Satellite-to-ground

A

Other than replacing the filament in a 3-D printer, which maintenance task will likely be performed most often? A. Cleaning the nozzles B. Changing the cooling fans C. Adjusting belt tension D. Leveling the print bed E. Checking guides

A

Routers operate at which layer of the OSI model? A. 3 - Network B. 4 - Transport C. 1 - Physical D. 2- Data link E. 5 - Session

A

What is the most common platter rotation speed for a hard drive found in a desktop computer? A. 7200 RPM B. 5400 RPM C. 20000 RPM D. 10000 RPM E. 15000 RPM

A

Which component or feature refers to the type of paper typically required for an impact printer? A. Tractor feed B. Dot-matrix C. Ribbon D. Photographic E. Thermal

A

Which feature, or service can be used to allocate more network bandwidth to Voice over IP applications? A. Quality of Service (QoS) B. A faster Inernet connection C. Packet loss D. Latency E. Jitter buffer

A

Which motherboard form factor was offered in four different sizes of Mini, Nano, Pico and Mobile? A. ITX B. ATX C. Micro ATX D. Mini ATX

A

Which part of the Active Directory structure houses all the users, computers, and other objects in the active directory controlled by the administrator? A. Domain B. Forest C. Organizational Unit D. Tree

A

Which printing component is most commonly responsible for finishing issues such as inaccurate folding, tearing, curling, or improper trimming? A. Incorrect paper type B. Too many pages loaded C. Incorrect tray settings D. Incorrect binding edge specified E. Too may pages accumulated in an exit tray

A

Which type of CPU socket used flat metal contacts and a removable chip? A. LGA B. PGA C. BGA D. ZIF

A

Which type of DNS record can be used to associate more than one host name to a single IP address? A. CNAME B. A C. AAAA D. MX E. NS

A

Which type of display issue can temporarily leave traces of an image behind after the image has changed? A. Artifact B. Burn-in C. Faded light D. Corrupted color E. Distortion

A

Which type of fiber optic cabling is best suited to very long runs with very few bends or turns? A. Single-mode --- step index B. Multi-mode --- graded index C. Single-mode --- graded index D. Multi-mode ----- step index

A

Which type of heat sink would generally provide the most effective level of cooling? A. Refrigerated B. Active heat sink C. Liquid cooled D. Air conditioning E. Passive heat sink

A

Which type of internet appliance or device might be implemented for a service that is becoming overwhelmed by client requests? A. Load balancer B. IDS C. IPS D. Firewall E. Proxy server

A

Which type of report can provide a break-down of both usage and billing when using measured and metered services? A. Chargeback and show back B. Licensing C. Application usage D. Storage resources E. Server resources

A

Which type of wireless networking device creates a new SSID in addition to the original? A. Extender B. Access point C. Router D. Repeater

A

What is the reason for encrypting a mobile device's hard drive? [Choose all that apply] A. Prevent unauthorized access to the data on the device B. Prevent the device's hard drive from being accessed when lost or stolen C. the device from being unlocked with a password or PIN D. Prevent the access to the location of the device when lost or stolen

A and B

Cable Strippers

A cable first needs to be stripped of its jacket before crimping a connector to the end of the cable Once stripped, the exposed wires need to be aligned and put into the connector

Socket Types

A category, not a model Intel uses number of pins AMD uses a custom naming structure

What is a SIM card

A chip inserted inside a mobile devices. Used to connect mobile devices to GSM networks. Identifies devices on a network

Patch Panels

A collection of ports on a panel Cables are terminated at patch panel Allow connections from different locations Patch cables are used to create connections

Resiliency

A system's ability to recover Availability measured in 9s

Bluetooth transmissions generally tend not to interfere with Wi-Fi communications for which reasons? A. Bluetooth uses frequency hopping B. Bluetooth signals are typically much weaker than Wi-Fi C. Bluetooth uses microwave transmission instead of radio D. Bluetooth uses the 5GHz band E. Bluetooth signals are typically much stronger than Wi-Fi

A, B

Which types of resources would be at the level of Software as a Service? A. Human resources management applications B. Customer relationship management applications C. Development studios D. Virtual networks E. Virtual appliances

A, B

Which of the following methods are used by organizations to allow the use of mobile phones? A. Corporate-Owned, Personally Enabled B. Choose Your Own Device C. Corporate-Owned, Personal Use D. -Owned, Business Only E. Bring Your Own Device

A, B, D, and E

Which processes are most likely to be performed by multifunction devices? A. Copying B. Scanning C. Folding D. Stapling E. Printing

A, B, E

Which statements are generally applicable to intel processors when compared to AMD processors? A. Produce less heat B. More compatible with other components C. Consume less power D. Usually less expensive E. Can result in a higher operating cost

A, B, E

Which statements correctly differentiate the 2.4GHz transmission band from the 5GHz band? A. 2.4GHZ transmission can penetrate through obstacles more easily than 5 Ghz B. 2.4 GHz transmission carry farther than 2.4Ghz C. 5 GHz transmission carry farther than 2.4Ghz D. 5 GHz transmission can penetrate through obstacles more easily than 2.4 Ghz E. 2.4 GHz transmissions are more susceptible to interference T. 5 GHz transmissions are more susceptible to interference

A, B, E

Which statements correctly identify reasons why the image on your display monitor may not match the image or a print job? A. Monitors don't truly produce black as a color B. Printers don't truly produce white as a color C. Monitors use the CMYK color palette, while printers use the RGB color palette D. Printers don't truly produce black as a color E. Monitors don't truly produce white as a color F. Monitors use the RGB color palette, while printers use the CMYK color palette

A, B, F

Which statements correctly apply to a cloud-based resource that is shared externally? A. The resource resides within the cloud subscription of the sharing organization B. The resource can be accessed only be external users C. The resource can be accessed by internal or External users D. The resource will only reside on the external user's premises E. The resource will only reside on the external user devices

A, C

Which 802.11 standards used the 5GHz band to transmit and receive? A. a B. g C. n D. ac E. b

A, C, D

a knowledge base is typically constructed from which general components? A. Actions B. Plans C. Outcomes D. Escalations E. Findings

A, C, E

Which types of resources would be at the level of infrastructure as a Service? A. Virtual networks B. Web sites C. Virtual machines D. Mobile apps E. Software applications F. Virtual appliances

A, C, F

Decide which of these statements about SATA and SAS data storage interfaces are true. (Choose all that are true.) A. The SAS interface is more than three times faster than the SATA interface. B. SAS interfaces are expected to replace SATA interfaces for home use. C. The SATA interface is better suited than the SAS interface for use in servers where many users will be using the data at the same time. : D. Because SATA drives are less expensive, higher-volume drives are more common in small offices.

A, D The SAS interface is too expensive to expect that they would replace SATA interfaces for typical home use. The SAS interface is best suited for use in servers because it is able to handle the load of many users accessing data at the same time.

Which issues may cause a web page only to produce a print job in the incorrect orientation? A. Large page elements B. Incorrect driver C. Printer default orientation setting D. Application default orientation setting E. Zoom or scale settings

A, E

Which types of video cables and connectors are also capable of carrying audio signals? B. VGA A. DisplayPort C. DVI-A D. DVI-I E. HDMI

A, E

Which statement correctly applies to a stateful firewall? A. A firewall capable of inspecting packets to intelligently determine context B. A software application that helps to secure individual computers C. A firewall that uses pre-configured rules only D. A hardware device that helps to secure a network E. A firewall capable of detecting and preventing intrusions

A.

Which statement correctly identifies what will happen to a packet that enters a hub? A. It will be forwarded out every other port B. It will be boosted in strength only C. It will be examined for a destination IP address and be passed to another network if required D. It will be forwarded to only the intended recipient E. It will be examined for a destination MSC address and be passed to another segment if required

A.

Internal Resources

Access defined in the cloud Consumed only by other internal resources or users No public access

Proxy Servers

Access server on behalf of clients Coaching, filtering, security Can also be caching servers Dedicated caching servers Can filter content HTTP requests travel through proxy Only device connected to firewall External network connection

External Resources

Accessed by outside applications and services Consumed by internal or external resources Public and Private access

ABS

Acrylonitrile butadiene styrene

Active vs. Passive Heatsinks

Active Uses power supply and fan Often referred to as heat sink and fan (HSF) Liquid cooling Passive No mechanical components 100% reliable Dissipates heat through convection Requires steady airflow

High Availability Models

Active-active deployment Active-standby deployment

Which mobile device synchronization method is proprietary to Microsoft?

ActiveSync

Connection Considerations

Adapter management software Router

Text (TXT) Record

Additional information about a named service Sender Policy Framework DomainKeys Identified Mail (DKIM)

Virtual Memory

Additional memory without adding physical RAM Simulates memory using storage devices Useful when RAM is insufficient Hardware and software implementations Utilizes disk drive to store memory

DNS Records

Address mapping record (a) Ip version 6 address record (AAAA) Canonical Name record (CNAME)

USB Expansion Card

Adds USB ports to a computer Useful when you're running out of ports

VGA mode

Advanced Boot Options (F8) on startup Useful for troubleshooting display issues

AMD

Advanced Micro Devices

ARM

Advanced RISC Machine

ATX

Advanced Technology Extended Motherboard

Printing a Test Page

After initial installation Install included software first

Quad channel memory

All four modules required for full functionality Same capacity and speed When two modules installed, will operate in dual channel mode When three modules installed, will operate in triple channel mode Relies on number of installed modules Depends on system specifications Number of modules will determine channels

How automatic Document Feeders work

All original pages loaded Automatic documents rollers feed pages to be read Pages are fed to an exit tray

Which of the following are advantages of File Servers? [Choose all that apply] A. Backup B. Access Control C. Remote Access D. File sharing E. Security

All the above

Unmanaged switches

Allow for more devices to be physically connected to LAN

Managed Switches

Allow more control over traffic Allow VLANs to be created

Wi-fi NIC

Allows computer to connect to 802.11 wireless networks Utilizes one of the Wi-Fi standards Wi-Fi 5 (802.11ac) Wi-Fi 6 (802.11ax) Commonly integrated into mobile devices

Ethernet NIC

Allows computer to connect to Ethernet based network Often integrated into motherboard Common speeds include 100 Mbps 1Gbps, 2.5 Gbps, and 10 Gbps

Power over Ethernet

Allows power delivery over Ethernet cables Encapsulates the following standards 802.3af 802.3at 802.3bt

Hyper-Threading

Also known as Simultaneous Multi-Threading (SMT) CPU cores split into virtual cores

Punch Down Tool

Also referred to as krone tool Hand tool used to connect network cables to Patch panels Punch down blocks Keystone modules Surface mount boxes

Loopback Plug

Also referred to as loopback adapter Device used to test ports Network USB Serial Parallel

Straight Tip (ST) Connector

Among the most commonly used connector in fiber-optic cabling Uses a Bayonet-style plug and socket Enables unidirectional communication Bidirectional communication requires: Two fiber cables Two ST connectors Design ensures proper alignment for termination and interconnections Suitable for both and multi-module communications

Digital Subscriber Line (DSL)

Amongst the first widely used broadband services Uses existing copper phone lines Download speeds 1 to 500 Mbps Uploads speeds 384 Kbps to 10 Mbps

Upgrading a Laptop HDD to SDD

An effective performance upgrade Most laptops do not have multiple bays Some laptops come with an empty SSD slot Consider the amount of required time Tools and adapters

Which of the following Windows PowerShell cmdlets shows the list of devices which InstanceID contains "ACPI"? Get-PnpDevice -InstanceId *acpi* Get-PnpDevice -Class *acpi* Get-PnpDevice -Class acpi* Get-PnpDevice -InterfaceId acpi*

Answer: Get-PnpDevice -InstanceId *acpi* The Get-PnpDevice PowerShell cmdlet returns the list of installed devices in Windows 10. You have to run Get-PnpDevice -InstanceID *acpi* to get a complete list of devices with "ACPI" in its InstanceID property.

Which is the orientation of the antenna concerning the surface of the earth? Received signal strength indication (RSSI) signal strength Channel Throughput Channel Capacity Antenna Polarization

Antenna Polarization

Dealing with Poor Wi-Fi Performance

Antenna booster Range extender Location

Wireless Connectivity

Antenna types Transmission frequency Environmental considerations

LoJack

Anti-theft security in BIOS Permits electronic tracking

Cellular Connections

Anywhere high-speed access Built in mobile broadband USB stick

Common Web Serves

Apache Internet information services (IIS) NGINX

Ports of protocols

Are associated with a service or program Allow one computer to send and receive many different types of traffic Aid in understanding what to do with received data Allows protocol to be reasonable deduced if sent to a well-known port

Batteries on a laptop

Are easy to replace but refer to manufacturer's specifications

Location of a Patch Panel

Are often rack mounted Commonly 1U or 2U Centrally located

Other troubleshooting considerations

Assess topology OEM specific settings

Riser Cards

Assists in space limitations Permits orientation of cards to be changed Supports up to four cards per slot

Thunderbolt Support

Audio Data Power Video

Cat6a

Augmented version of Cat 6 Less crosstalk Less signal loss Double the frequency of Cat 6 500MHz

AAA Security Framework

Authentication Authorization Accounting

Network Access Control

Authentication and authorization Role-based VLAN assignment

Load Balancing and High Availability

Automatic redistribution of resources Tiered architecture Multiple points of failure

Satellite Merits

Available to businesses without access to landline internet Suitable speed of limited audio and/or video conferencing Provides global coverage

A SODIMM is most likely to be found in which type of system? A. Mobile phone B. Laptop C. Desktop client D. Tablet E. Network server

B

At which voltage does DDR5 memory operate? A. 1.8V B. 1.1V C. 2.5V D. 2.0V E. 1.2V

B

If your wireless network is experiencing interference from another wireless in close proximity, which option is most likely to reduce the level of interference? A. Moving your wireless router closer to the other network B. Changing the transmission channel or frequency of your router C. Moving your wireless router father from the other network D. Placing barriers between your networks E. Changing the security settings of your router

B

Implementing an action plan to resolve a problem should ideally be performed at which time? A. at night b. During maintenance windows C. After approval D. Immediately E. The next day

B

In which use cases would you most likely benefit from using virtual memory? A. When your system has several hard drives installed B. When your system does not have enough RAM installed C. When your system has too much RAM installed D. When you're working on a virtual machine E. When your system is using a multi-boot configuration

B

Over which port does the hyper-text transfer protocol (HTTP) operate? A. 53 B. 80 C. 21 D. 22 E. 25

B

The Platform as a Service cloud computing model would be best suited to which type of environment? A. A large datacenter with enterprise level infrastructure already in place B. A development environment with minimal infrastructure in place C. a team of very mobile users who need centralized access to customer management applications D. A start-up sales-based environment with no infrastructure in place E. A mid-sized environment looking to add more servers without purchasing new hardware

B

What is the main reason for the introduction of IPv6 addressing? A. It is required by Windows 11 B. Number exhaustion in IPv4 D. Use of 32-bit binary addressing system E. Hexidecimal is easier to use than binary

B

What is the maximum bandwidth for DDR4 memory? A. 25600 Mbps B. 25600 MBps C. 12000 Mbps D. 12800 MBps E. 6400 MBps

B

What is the minimum category of twisted pair cabling required to support 1 Gbps bandwidth? A. 5a B. 5e C. 5 D. 6a E. 6

B

What is the overall bus width for a system that uses triple channel memory? A. 32 bits B. 192 bits C. 256 bits D. 128 bits E. 64 bits

B

What is the standard number of wire pairs supported in a single block, of bank of a 110 punchdown block? A. 16 B. 25 C. 8 D. 110 E. 100

B

Which action or operation is not performed by an optical network terminal (ONT)? A. Terminating incoming cable connections B. Modulating or demodulating signals C. Providing ethernet connections to client systems D. Providing wireless connections to client systems E. Providing internet access to client systems.

B

Which diagnostic method can provide a sequence of beeps to help resolve a problem? A. BSOD B. POST C. Failed capacitors D. Overheating E. BIOS

B

Which disk utility of method can be used to restore or repair critical boot files on a storage drive? A. Format B. Bootrec C. Diskpart D. chkdsk E. smart

B

Which system component or process represents a diagnostic routine that is performed each time a system boots up? A. TPM B. POST C. BIOS D. UEFI E. CMOS

B

Which type of DNS record used to specify which email server will accept incoming messages? A. TXT B. MX C. A D. NS E. AAAA

B

Which type of USB connector does not differentiate between the computer end, and the device end? A. Mini B. Type C C. Type B D. Type A E. Micro

B

Which type of USB connector was most commonly used on the device end of a printer? A. Mini B B. Type B C. Micro A D. Micro B E. Mini A F. Type A

B

Which type of VDI model is being used if a user always receives the same virtual desktop when they establish their connection? A. Stateless B. Dedicated C. Pooled D. Non-persistent E. Shared

B

Which type of cloud model would be most appropriate for an enterprise-level organization with a large datacenter, considering expansion by implementing additional but smaller branch offices? A. Community B. Hybrid C. Private D. Public

B

Which type of motherboard connector supported throughput speeds of up to 64 GBps? A. PCI B. PCIe x16 C. PCI-X D. PCIe x4 E. PCIe x8

B

Which type of wiring standard completely reverses the pin configuration from one end of the cable to the other, so that wires 1 to 8, connect respectively to pins 8 to 1? A. T-568A B. Rollover C. T-568B D Crossover E. Straight-through

B

You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. Which of the following command will you use on the global configuration mode? A. terminal voice vlan 10 name VOICE B. configure terminal vlan 10 name VOICE C. configure terminal vlan-voice 10 name VOICE D. terminal vlan voice 10 name VOICE

B

Which statements are false about the GPT partitioning system? (Choose all that apply.) A. It supports up to 128 partitions. B. It can only be installed on drives that are larger than 2 TB. C. It keeps a backup copy of the GPT table. D. contains the legacy MBR system for backward compatibility.

B and D GPT can support up to 128 partitions and keeps a backup copy of the GPT table. Although it is equipped to handle the situation when BIOS is expecting an MBR system, GPT does not actually support MBR. GPT can be installed on any size hard drive, but it is more expensive than the MBR system.

Which printer cleaning and maintenance tasks should be performed most often to ensure optimal printing results? A. Visual calibration B. Print head alignment C. Cleaning print heads D. Monitor calibration E. Resetting the device to factory default

B, C

Which statements are true about TCP and UDP? (Choose all that apply.) A. TCP is generally faster than UPD. B. establishes a session between source and destination before it sends data, and UDP sends data without first establishing a session. C. TCP guarantees delivery and UDP does not. D. UDP is used on the local network but not on the Internet; TCP works on both the local network and the Internet.

B, C TCP is the protocol to use when guaranteed delivery is important—but speed is sacrificed to guarantee that delivery. Data delivery is guaranteed with TCP because a session between source and destination is first established so the source can verify the data was received and resend if necessary. Both UDP and TCP can work on local networks and the Internet.

Which common printer issues would be considered to be mechanical problems? A. Incorrect driver B. Paper jam C. Power adapter failure D. Paper tray E. Cable issues

B, D

Which type of expansion cards would likely be found in professional situations where the integrated components would not be sufficient? A. Network interface card B. Video card C. USB expansion D. Sound card E. Modem

B, D

What are the advantages of using a Windows Workgroup? [Choose two that apply] A. Permissions are managed by group policy B. Users decide who shares a resource C. Requires a Windows Domain Controller server : D. Easy to setup E. Central control of user profiles

B, D Windows Workgroups are popular with small businesses and home networks. They are easy to setup, and resources are shared at the discretion of the owner or creator of the resource, not of a central authority or network administrator. Workgroups do not require extensive use of permissions and do not require a domain controller.

At which layers of the OSI model do network interface cards operate? (Choose two) A. Network B. Data Link C. Application D. Transport E. Physical

B, E

Automatic document feeders can be used to enhance the performance of which processes other than feeding in multiple sheets of paper to a multifunction device? A. Scanning to a shared folder B. Rapid collection of information C. Scanning to email D. Scanning to the cloud E. Rapidly digitizing information

B, E

What is the maximum wattage that can be supplied to a device using Power over Ethernet? A. 30 B. 100 C. 7 D. 60. E. 4

B.

Which characteristic about a wireless signal would you be unable to determine by using a WiFi analyzer? A. The effective coverage area B. The password or passphrase C. The channels being used D. The network name E. The frequency being used

B.

Preparing to Replace a System Drive

Back up data Create recovery disk Have the right tools

storage Resiliency

Backup Replication Recovery

BGA

Ball grid array

Terminology

Bandwidth Throughput Latency

802.11b

Bandwidth up to 11 Mbps 2.4 Ghz frequency Susceptible to interference

802.11a (wireless networking)

Bandwidth up to 54 Mbps 5.725 to 58.850 Ghz frequency Less effective penetrating solid objects also referred to as Wi-Fi 2

BIOS

Basic Input/Output System

Dynamic Host Configuration Protocol (DHCP)

Basic information IP address Subnet mask Default gateway DNS server IP address Lease duration alternative to static configuration

Complementary Metal-Oxide-Semiconductor (CMOS)

Battery power for stored settings Provides power when the system is off

When is a site survey done for a wireless network? During deployment Before deployment At each step of deployment Post deployment

Before deployment A wireless site survey is conducted before you deploy a wireless network. You want to deploy an optimized wireless network that provides good throughput and speed with minimum interference. Without a wireless site survey, it is not possible to achieve this. With the help of a site survey application or a hardware analyzer, you can determine the best location for your wireless routers and access points. A site survey should never be done during, post, or at each step of deployment. It should always be done before wireless network deployment.

Understanding Performance Comparisons

Benchmarks measure performance Not necessarily noticeable in real-world applications

Solid State Drives (SSDs)

Better access time Greater reliability Less power More quite Smaller footprint

Using What was learned

Better focus Future problems Documentation Steps taken to resolve problem

Accounting Uses

Billing Usage analysis Control of authorization Planning

Which of the following are power issues that you may need to consider? Surges Purges Blackouts Brownouts

Blackouts Brownouts Surges

What type of communication requires that devices be paired with each other before thy can communicate?

Bluetooth

BIOS/UEFI Configuration Options

Boot from other devices Secure boot Fan speed or temperature monitoring options Boot password

Bridge vs router

Bridge Works on OSI layer 2 MAC address Will always forward packets to same destination over same routers Transparent to the network devices Router Works on OSI layer 3 IP addresses Will intelligently select route for packet Visible to network devices

Causes of Wireless Interference

Building materials and objects Router location Distance People

Types of Touch screens

Built-in standalone

Integrated Print Servers

Built-in capabilities Print directly to device Job queuing Job management

An integrated Wi-Fi antenna in a laptop is typically implemented in which manner?

Built-in to the display

Community cloud

Business communities Infrastructure sharing Private cloud space Ideal for joint projects

A print server component allows or enables a multifunction device to perform which tasks? A. It enables the multiple functions of print, scan, copy and fax B. It allows users to connect to the device wirelessly C. It allows for multiple jobs from multiple users to be submitted and managed D. It allows for the device to connect to the network using an IP address E. Print local jobs for the print server only

C

After Identifying all probable causes of a problem, which step should you follow? A. Consider infrastructure changes B. Escalate the problem. C. Rank probable causes D. Brek the problem down into smaller steps E. Consider environmental changes

C

An image is produced b a thermal printer in which manner? A. Toner is fused to the paper B. A print head strikes a ribbon C. Heat sensitive pigments are embedded in the paper D. Ink is sprayed on the paper E. Filaments are applied to the paper

C

In which scenario would you be most likely to use a toner and probe? A. When you need to verify the internal wiring of a cable B. When you need to connect bare wires to a patch panel C. When you need to identify unknown endpoints of a cable run D. When you need to verify if a cable is broken E. When you need to install a connector on the end of a cable

C

Other than changing ink cartridges, which component will most likely require servicing or maintenance on an Inkjet printer? A. Belt B. Stepper motor C. Print heads D. Imaging drum E. Stabilizer bar

C

The printer control language format is generally not supported by which operating system? A. Unix B. Microsoft C. Mac E. Linux

C

Which RAID configuration is typically implemented with 2, and only 2 disks? A. 0 B. 2 C. 1 D. 5 E. 1+0(10)

C

Which component of feature of a CPU will allow an operating system to perceive virtual or logical processors? A. Single core B. Dual core C. Hyper-threading D. Over-clocking E. Multi core

C

Which factor would be considered to represent the most significant risk to an organization's network when using a legacy system or device? A. Cost B. Maintaining compliance C. Maintain security D. Lack of support E. Migrating data

C

Which feature of a multifunction device can allow an administrator to determine the details of a particular print job such as the identity of the user who submitted the job, and the date and time? A. Basic user authentication B. Secured print jobs C. Print job logs D. Print reports E. Advanced user authentication

C

Which print quality issue is indicated by lines appearing on the page? A. Color mismatch B. Blurring C. Banding D. Outdated driver E. Smearing

C

Which security feature was more commonly implemented in devices such as vehicles to allow them to be tracked if stolen? A. TPM B. Secure Boot C. LoJack D. BIOS security E. BIOS password

C

Which service should be restarted on a Windows computer if you suspect the print queue has stalled? A. The log service B. File and print services C. The spooler service D. The queue service E. The printer service

C

Which statement correctly aligns with how virtual machine resource requirements should be determined? A. Virtual machines require minimal resources, allocate only what the physical host system requires B. Allocate only what the physical host system requires, plus enough to run the virtualization software C. Virtual machines require the same resources as physical systems D. Virtual machines require fewer resources that physical systems E. Virtual machines require more resources than physical systems

C

Which statement correctly applies to a trusted platform module (TPM)? A. A method of protecting the boot integrity of a system B. A method of ensuring that unauthorized users do not make changes to BIOS/UEFI configuration C. An integrated component used to provide encryption and security D. A method of being able to track a device if stolen E. An external device used to provide encryption and security

C

Which type of VPN would be best suited when two branch offices with many users need to maintain a persistent connection to each other? A. Host-to-site B. Host-to-host C. Site-to-site D. Site-to-host

C

Which type of test page will provide information such as the driver version and date being used? A. An alignment page from the device B. A page produced directly from the device C. a page from within the printer interface of the operating system D. A document from within a software application such as a word processor

C

Which utility can be used to help locate or troubleshoot the cause of an IP conflict in a networked environment? A. SSID B. DHCP C. Ping D. Tracert E. DNS

C

Which value represents the threshold for an acceptable level of network jitter? A. Below 10 ms B. Below 50 ms C. Below 30 ms D. Below 40 ms E. Below 20 ms

C

Which of these are NOT used in IPv4 addressing? A. Name Server B. Default Gateway C. MAC Address D. IP Address F. Subnet Mask

C IPv4 addressing happens at Layer 3, the Network layer of the OSI model. MAC addressing happen at Layer 2, the Data Link Layer, in the Media Access control sub-layer. While every computer that has an IP address also has a MAC address, the MAC address is not part of IPv4.

Which statements are correct about TCP vs. UDP? A. TCP is fast and reliable, UDP is slow and unreliable B. UDP uses a three-way handshake and acknowledgments C. UDP is faster, but less reliable D. TCP is slower, but more reliable E. TCP uses a three-way handshake and acknowledgments

C, D, E

Which steps of resolving a problem would be external research? A. Considering the most obvious cause B. Determining possible links C. Consulting industry or academic literature D. Considering other possible causes E. Consulting a vender knowledge base

C, E

Software defined networking is conceptually similar to which other type of computing architecture? A. Network security B. Wireless networking C. Virtual machines D. Cloud computing E. Virtual private networks

C.

Which group is necessary to impose permissions and rights onto users? A. Power Users B. Cryptographic Group C. Security Group D. Distribution Group

C.

CDV

CD for Video

Common CD types

CD-Read-Only CD-Recordable CD-Rewritable CD-ROM extended Architecture CD for Video (CDV)

Diagnostic/Recovery tools

CHKDSK DISKPART FORMAT Bootrec File recovery tools

Causes of Latency

Cabling Propagation Congestion Routers

Hardware Security Modules (HSM) Security

Can be added to a system External device Network connection RSA key

Stateless Firewall

Can be performed quickly Generally cheaper Use present rules based upon source addresses, destination addresses, and ports Unable to determine context

TPM Security

Can't be installed in older systems Trust manager for a system RSA key Can protect other keys

Which type of portal is used for wireless client authentication? Authentication RADIUS Captive Acceptable Usage

Captive A captive portal is an authentication method for a wireless network. If you have ever attempted to connect to a wireless network in a hotel or at the airport, you can connect to the wireless network without any authentication. Even though you are connected, when you attempt to browse the Internet, you are redirected to a captive portal, which requires authentication to browse the Internet. You do not have an Authentication portal. RADIUS is a centralized authentication method used in WPA2-Enterprise. Acceptable Usage is a type of document or policy that is typically used in Captive Portals.

Document Findings

Capture results Determine probability of reoccurrence Docement thoroughly Successful and failed actions The more information collected the better Problem and root causes Users affected History of equipment Corrective measures Preventative measure Record positive and negative outcomes Make available to others Centralized knowledge base Searchable database Wiki

Enabling Informed Decisions

Capture the bigger picture Correlate use to business needs Adjust resource utilization

Cat 6 Transmission Limitations

Cat 6/6a Length limited to 55 meters in normal conditions Length limited to 33 meters in adverse conditions

CRT

Cathode Ray Tube

Cellular

Cellular networks are the networks over which mobiles phones operate Referred to as 'cellular' as the network is split into cells Provides voice and data Good coverage area High-speed

Device Setup and Management

Centralized device Management Implementing secure protocols

Two chips

Channel A and B Improved performance

Wireless Considerations

Channels Security protocol Network SSID Range extenders Interference

IP Address

Check NIC IP address Check for APIPA address (169.254) --- always begins with this

Identifying Port Flapping

Check system logs Review up and down entries

Maintaining Printers

Cleaning print heads Print head alignment

Common applications

Client relationship management Financial management Human resources management

File Servers

Client/server model Central storage and file management Files can be accessed by computers on same network

Web Servers

Client/server model Deliver content over Hypertext Transfer Protocol (HTTP)

Use case for a Protocol

Clients that need to communicate to a web server. Must have the same protocol installed

Desktop Vs. Laptop CPUs

Clock speed Power consumption Cooling Cores

Key Considerations with Thermal Bubble method

Clogged heads Automatic and manual cleaning process Print heads are very delicate

Using a Cloning Toll

Clone old drive to an external or network dr Replace old drive with new drive Restore cloned image to new drive

Scan to Cloud

Cloud based documents are easily sharable and accessible Requires network connected multifunction device Device must support intended cloud service

Infrastructure-as-a-service (laaS)

Cloud provided infrastructure Hosted components Low-level reources Little or no on-premises hardware

CDMA

Code division Multiple Accuse

CCFL

Cold Cathode Fluorescent Lamp

Fluorescent LED backlighting

Cold cathode fluorescent light (CCFL) or Light emitting diodes (LEDs)

Supervisory Control and Data Acquisition (SCADA)

Collects and analyzes real-time data Monitoring and controlling operations

Color Settings

Color Greyscale Color saving

Color Issues and Blocked Nozzles

Color issues Poor color representation Missing colors Clean print head nozzles Replace ink cartridges Blocked nozzles Use lower capacity ink cartridges Clean print head

Monitor Calibration

Color on-screen vs. printed Monitor and image color won't match Factory settings colors don't render properly What you see Glossy vs. Matte display Monitor settings May need manual calibration

Inkjet Printers

Color/B&W Ink cartridge Quality Print nozzles

Laser Printers

Color/B&W Toner Drum/fuser

Sockets

Columns and rows of holes Zero insertion force (ZIF) sockets

Hybrid cloud

Combination of public and private clouds Supplements existing resources

Diagnosing Network issues

Command line interface (CLI) tools GUI-based tools

3.5 inch HDD

Common in desktop systems Easy to install cost-effective Increased capacity Available interface

2.5 Inch HDD

Common in laptops Can be used in desktops Lower capacity Slower data transfer rates Less heat and noise

Liquid Crystal display (LCD)

Common in laptops and flat panels Replaced older, bulkier cathode ray tubes (CRT) Produces clear color images

Router

Common issue with VoIP Purchase a VoIP router

USB to Ethernet

Commonly found in newer laptops equipped with: SSD drives Thin profiles Eliminates the need to have a port for an RJ-45 cable on the laptop itself

Category 5 Cable

Commonly referred to as Cat 5 Twisted pair cable Provides speeds up to 100 Mbps Also carries telephone and video signals Replaced by the 5e

DB-25 Connector

Communication ports, Printers, Audio Connections, Broadcast and Video

DE9 (DB-9) Connector

Communications Ports. Token Ring network connectivity. Legacy Computer mouse connector

Patch panel types

Comon amount of ports includes 12 24 48 Potentially more! Specifications CAT5e CAT6 CAT6A CAT7 Fiber

CD

Compact Discs

Potential Issues with legacy Systems

Compatibility Integration with modern systems Compliance

Web Server Considerations

Compatibility Security Integrated tools

CMOS

Complementary Metal-Oxide-Semiconductor

LGA and PGA CPUs

Compression force Zero insertion force (ZIF) Spring-loaded lands

Overclocking

Configure CPU to run at higher than official clock speeds Not recommended

DHCP scopes

Configured on the DHCP server to specify the range of available IP addresses that cab be allocated to clients Configure scope to allow or deny clients from IP addresses Filter based on Name MAC address Operating system

Network Interface Cards (NIC)

Connect computer to network Unique hardware address (MAC)

Passive Hub

Connect computers together on a physical level Do not strengthen signal Will not increase range of network

What are switches

Connect devices on a network together Receive and forward data between devices are used with a LAN

Routers

Connect networks together Forward data based upon destination IP address Allow multiple device to use same internet connection

Network Traffic Access Point (TAP)

Connect to a specific point in a network Access data for testing or troubleshooting Monitoring of Network traffic between two points

Display port

Connect video source to display Video Electronics Standards Association Packetized data transmission Capable of carrying audio signals

Mobile Hotspot (Tethering)

Connecting to mobile device. Enables a network connection. Process Connect the laptop using a USB/charging cable Enable hotspot on the mobile device Laptop recognizes phone as a modem

DSL Features

Connection had to be established Uses local or wireless connections Provider infrastructure

Transmission Control Protocol (TCP)

Connection-oriented protocol A three-way handshake is completed before any data is transferred Delivery is guaranteed, lost packets are retransmitted Used by protocols such as HTTPS, SSH, and SMB

User Datagram Protocol (UPD)

Connectionless

Local Area Networks (LAN)

Connects devices to enable data and resource sharing Uses private addressing scheme Connected by switches Very fast data transmission Easy design and maintenance

Wireless Access Point

Connects to a wired network device such as a switch or router Allows wireless clients to connect to the wired network and access resources Handles large numbers of wireless clients Can be powered by Power over Ethernet (PoE)

Long-range Fixed Wireless Access

Connects two fixed locations Enables data communications Alternative to installing cables between sites

Memory Upgrade Considerations

Consult motherboard user guide Determine how much memory you're using Modules from different vendors can be mixed

Near Field Communication (NFC)

Contactless communication Common in smartphones and tablets Devices exchange data automatically Limited range Device's must be close Security

What are some features of lightning cables

Contains 8 pins per side. Cant be inserted upside down

How GPS works

Contains internal atomic clock. Sends time-stamped frequency signal. Receiver chip determines satellites. Gathers data from strongest signal

High Availability

Continuous operation without failure Implementing redundancy Amount of time a service is available Amount of time a system takes to respond Percentage of uptime Recovery time Maintenance Single point of failure (SPOF) Failover Failure detection

What aspect of picture quality is always higher with an OLED screen, due to the inability of an LCD screen to produce this feature?

Contrast ---- producing true black

Firewalls

Control inbound and/or outbound network or host traffic Use rules to allow or deny traffic Are implemented with hardware or software Can store session state for stateful filtering Can packet filter based upon ports or IP address

Key considerations for measured services

Control resource usage Metering capabilities and measurement tools Usage details Service charge tracking

An inverter provides which functionality for an LCD screen?

Converts power for a cold cathode fluorescent light (CCFL)

Cleaning Laser Printers

Corana wires Toner guard Paper feed rollers Fan vent

Resolving Problems

Corporate policies Corporate procedures Possible impact Changes Formal process Change management Develop a change plan Determine risks Develop backup and rollback plan Test changes in sandbox Ensure steps are documented

Advantages of Optical Fiber

Cost Capacity Lifespan Speed

Disadvantages of SSDs

Costly Lower capacity Little warning of impending failure Shorter lifecycle than HDD Not suitable for archiving

Wi-Fi Analysis

Coverage Bandwidth and speed Connectivity Security

Metropolitan Area Networks (MAN)

Covers area larger than LAN, but smaller than WAN Covers a regional geographic area Designed for high-speed connectivity Hard to design and maintain Lower fault tolerance

Wide Area Networks (WAN)

Covers large geographic area supports high speed Relatively expensive to implement Two types -- switched WAN and point-to-point WAN Challenging to design and maintain

You have several visitors who come to your office every day and connect to the corporate wireless network. You want to secure the wireless network and limit wireless network access for the visitors. They should not be able to connect to the systems on the corporate wireless network. Which method should you use? Restrict the visitors from connecting to the wireless network Segment the wireless network Create a guest wireless network Install antivirus on each wireless client

Create a guest wireless network

What is the first step of replacing a hard disk drive, or a solid-state drive should be performed during the preparation stage?

Create a recovery disk Back up data

Scan to Shard Folder Workflow

Create a shard folder Set SMB server settings Register SMB server to the device Send the scanned documents to the SMB server

Extender

Creates a new wireless network Can be wired to the existing network More complex to install

If a DDR3 memory module is labelled "DDR3-1600", to which value does the 1600 refer? A. Physical size B. Version C. Bandwidth D. Million transfers per second (MT\s) E. Clock speed

D

If every user connected to your network is reporting very slow speeds and poor connectivity, which step should you attempt first to resolve the problem? A. Replace the router B. Update the router firmware C. Run a speed test D. Reboot the router E. Reboot all client systems

D

If your system supports dual channel memory, and has four physical slots, in which configuration should the memory modules be installed if you only have two modules? A. Both in channel A B. Only one in channel A C. Both in channel B D. One in channel A, and one in channel B E. Only one in channel B

D

In which scenario would you be most likely to use a punchdown tool? A. When you need to remove the protective jacket of a cable B. When you need to identify unknown endpoints of a cable run C. When you need to install a connector on the end of a cable D. When you need to connect bare wires to a patch panel E. When you need to verify if a cable is broken

D

Security consideration for a virtualized environment should be approached from which perspective? A. Treat the host system as the only security concern B. Treat the host system and all virtual machines as a single security concern C. Treat all virtual machines as a single security concern D. Treat each virtual machine, and the host system as independent security concerns E. Treat each virtual machine as an independent security concern

D

What is the most likely cause of a mobile device losing all connectivity to other devices and/or networks? A. Unresponsive touchscreen B. Overheating C. Battery issue D. Accidental activation of airplane mode E. Too many running apps

D

What is the primary benefit of using shielding in twisted pair cabling? A. Increased bandwidth B. Less prone to damage C. Decreased cost D. Less susceptible to interference E. Extended cable length

D

What is the typical transmission rage of devices using NFC? A. 400 meters B. A few kilometers C. 30 feet D. A few inches E. A few feet

D

Which channels are recommended to use for a wireless device using the 2.4GHz transmission band? A. 36 B. 40 C. 2, 7, and 12 D. 1, 6, and 11 E. 100

D

Which device setting determines the overall quality of a print job? A. Collate B. Orientation C. Greyscale D. Dots per inch E. Duplex

D

Which platform does not natively support the use of Syslog server? A. Unix B. Linux C. Mac OS D. Microsoft

D

Which setting for a system running Windows may allow a legacy printer to have an extended lifespan? A. Reinstalling the original driver after updating Windows B. Updating Windows C. Updating the driver D. Compatibility mode E. Using the driver from the OEM website

D

Which statement best describes the functionality of a patch panel? A. A device used to extend the range of a wireless network B. A device used to connect individual computers together C. A device used to connect networks together D. A device used to terminate network cables in a central location E. A device that provides network security

D

Which statement most accurately defines the configuration, or the features of a virtual local area network? A. A private connection between two points using the internet as the means to connect B. A method of automatically distributing IP addresses to client systems C. A means to connect an internal network to an external network such as the internet D. Network divisions configured by using software on switches E. A means to resolve IP addresses to names

D

Which type of connector may have been more expensive to implement on a fiber optic cable itself, but could result in cost savings due to its more efficient size? A. Subscriber connector B. Straight tip C. Square connector D. Lucent connector

D

Which type of internet connection currently supports the fastest speeds and most combined services? A. Satellite B. DSL C. Cable D. Fiber Optic E. Cellular

D

Which type of signal is not supported by a Thunderbolt cable? A. Video B. audio C. Data D. Network E. Power

D

Which type, or specification of cabling must be used if the cable is being run between the celling of one level, and the floor of another? A. Cat 5 B. Cat 6 C. Coaxial D. Plenum E. Cat 5e

D

Which of the following addresses have a slash notation of /24? A. Class B B. Class D C. Class A D. Class C

D Class C addresses have a slash notation of /24. Class A addresses have the slash notation, /8. Class B addresses have the slash notation, /16. Class D was used for multicast addressing.

Which components or configuration options need to be in place to enable the scan to email feature of a multifunction device? A. A cloud services subscription B. SMB to be enabled between the device and the server C. A shared folder D. Port 25 to be enabled between the device and the server E. an SMTP server

D, E

Which scenarios may increase the frequency of paper jams? A. Misaligned print heads B. Incorrect driver C. Too many jobs in the print queue D. Incorrect paper size E. Damp paper

D, E

An RJ-11 connector would likely be found in use with which devices or services? A. DSL internet B. Cable internet C. Fiber optic networks D. Ethernet networks E. Modems F. Phones

D, E, F

DB9 Characteristics

DB = D-Subminiature, or D-Sub, or DB Uses a 9-pin configuration in two rows (5x4) Serial data transfer Rarely used with modern devices Largely superseded by USB and other interfaces

Video Graphics Array

DB-15 connector type 15 pins/sockets in 3 row or 5 Characteristics: Analog signal Distance Degradation

SODIMM Versions

DDR DDR2 DDR3 DDR4 DDR5

DHCP

DHCP discover DHCP server DHCP scope, subnet, mask, options DHCP reservations DHCP request DdHCP lease

DDR4

DIMM and SODIMM Twice the speed of DDR3 288-pin DIMM or 256-pin SODIMM Incompatible with previous versions Bus clock speed between 1066 and 2133 MHz Bandwidth between 12800 and 25600 MB\s MT\s from 1600 to 3200

Protocols that utilize UDP

DNS Real-life transport protocol (RTP) Dynamic host configuration protocol (DHCP) Voice over internet protocol(VoLP) Trivial file transfer protocol (TFTP)

Cable vs DSL Modems

DSL Runs over phone lines Speeds highly dependent on distance Commonly available with speeds between 5-100 Mbps Cable Runs over coaxial cables Speeds between 50 Mbps and 1 Gbps Often has a hybrid of fiber and copper coaxial on backend

Bus Pathways

Data Control Address

Single Channel RAM

Data flow between CPU and RAM (memory bus) 64-bit memory bus or channel if one channel and two chips, channel is shared Chips must share single channel Memory addressed separately

ECC Memory

Data integrity vs. processing speed Sometimes it's better to slow things down

Fiber Optic Cabling

Data is transmitted by using pulses of light Transmission over great distances Highly secure data transmission Not affected by electrical or radio interference

Syslog Considerations

Data management Different than Simple Network Management Protocol (SNMP) Syslog versions

Advantages of Virtual Desktops

Data resides on server or in cloud Enhanced security Ideal for application testing Issues or problems are contained Compatibility for legacy systems

Near-Field Communication (NFC)

Data sharing, Short distance. Radio-frequency identification

Examples of Internal Resources

Data used only by cloud-based virtual machines Cloud database that drives cloud-based applications

Common Symptoms with display devices

Dead pixels Artifacts Blank screen Corrupted color Overheating Flickering screen Faded light Burn-in Distortion

Removing Residue within the Thermal Printer

Debris collects from moving paper and dust Use of compressed air and damp cloth Use of special vacuum cleaners

Types of Print Servers

Dedicated Network Devices Client computers

Types of File Servers

Dedicated Non-dedicated

Hardware Firewall

Dedicated hardware Runs specialized software Placed between your network and an untrusted network

Storage Are Network (SAN)

Dedicated high-speed network Allows network access to high-performance storage Composed of devices connected with assorted technologies, protocols, and topologies Storage appears local to the host Can span multiple sites

Types of Authentication Servers

Dedicated server Ethernet switch Wireless access point Network access server

Data Privacy Considerations

Defining users and/or groups Users versus administrators Setting rights and permissions

Network Jitter

Delay in sending packets Network congestion Changing routes Real-time communications VoIP, video conferencing

Freeing up space

Delete unnecessary files Reinstall OS Use old HDD as a secondary drive

cipher /w:E:\ What does this command do on a Windows computer?

Deletes data on a NTFS drive

Disadvantages SaaS

Dependence on third party Data security Potential billing issues Changes to services

Serial Cables

Designed for low-speed telephone modem communication Also used for; Keyboard mouse Mainly replaced by USB

USB Connector Characteristics

Designed to carry both data and power over a single connection Currently three generations 1.x, 2.0, 3.x Hot-pluggable, any device can use any receptacle, with little to no device configuration

Dual Core CPUs

Designed to improve performance A 2nd processing core added One physical chip

DaaS

Desktop-as-a-Service

Replacing a Wireless card

Detach antenna Install new card Install driver if needed

Supplementary Services

Detailed billing Monitoring Log access Security Load balancing High availability

Identifying Causes

Determine most likely cause Identify all possible causes Rnak probability Escalate problems

Troubleshooting Intermittent Wireless Connectivity

Determine the scope Try a known working device or address Determine resource availability

Test the Theory to Determine Cause

Develop theory based on most likely cause If cause is confirmed, move on If cause can't be confirmed, start over Don't jump to conclusions Consider alternatives Test until correct cause is identified Address the correct problem Avoid addressing things that aren't the problem Verify your results Submit plan for approval Escalate if necessary IF problem persists, start again Reevaluate the problems and causes Develop new theories Escalate to form a complete plan Ongoing process

Information Technology Extended (ITX) Motherboards

Developed by VIA Technologies Family of motherboards

Which Control Panel utility allows users to add hardware to the computer, disable hardware and update drivers? System Device Manager Network Sharing Center Devices and Printers

Device Manager Devices and Printers

Which of the following tools have the capability to disable and enable a device in Windows 10? Select two answers. Programs and components snap-in System Configuration Manager Device Manager System Information snap-in Windows PowerShell

Device Manager Windows PowerShell

Location Services

Device actively calculating current location. Commonly using satellites. Often using a combination of internet connectivity and cellular data

A lightning cable uses which process to determine that it is being used with a genuine Apple product?

Device authentication

Mobile Device Management Features

Device configuration Remote wipe Password enforcement Device tracking Data encryption Allowlist/blocklist

How PCL works

Device dependent Utilizes printer hardware Print job is processed quickly Printer is responsible for processing data

Heatsinks

Device for cooling system components Many use fans Required for most systems Overheating can permanently damage components

How PostScript Works

Device independent Does not utilize printer hardware Print job is processed more consistently Can produce higher quality than PCL

Check log files

Device logs Operating system logs

Connecting to Networks

Different types of networking standards Ethernet 802.11 Wi-Fi Computers require a way to connect to network The NIC provide the means

Biometrics Security Devices

Difficult to compromise Fingerprint scanners Facial reignition Iris scanners Voice recognition

Screen Display and Color Output

Difficult to match How accurate you need to be Text vs. graphics Calibration and adjustments

DSL

Digital Subscriber Line

DSL

Digital Subscriber Line Modem

DVD

Digital Versatile Disc

Digital Versatile Disc (DVD)

Digital optical storage Introduced in 1995 Common formats Movies and gaming early adopters

High Definition Multimedia Interface (HDMI)

Digital video and audio interface Connectors Type A (19 pins) Type C (19 pins) Mini-HDM Smaller devices

Common symptoms of Mobile Devices

Dimly lit display Flicking display No display Power/battery issues No/weak wireless connection Unresponsive touchscreen Apps won't load No Bluetooth No GPS Slow performance No sound System freezing

Troubleshooting Latency

Disconnect devices Restart systems Use network monitoring tools Check destination

DHCP Process

Discover Offer Request Acknowledge

Wi-Fi Analyzer

Discover Wi-Fi problems and optimize performance Test antenna location and device configuration

Error Correcting Code (ECC) Memory

Discover and correct single-bit memory errors More reliable from non-ECC memory Requires more processing power

Power-On Self-Test (POST)

Disk Drives Display CPU Memory

Factors Affecting Wi-Fi Range

Distance from access point Traveling through solid objects Amount of power

Synchronization

Documents stored in the cloud Local copies can be saved on user devices User can make changes to local cope offline Changes are synchronized when user is online

802.11 Adhoc mode

Does not use an access point Direct device-to-device link

DMARC

Domain-based Message Authentication, Reporting & Conformance (DMARC) Protects against Phishing and spoofing Uses SPF and DKIM to check message authenticity Helps mail systems to identify what to do with email that fail SPF/DKIM checks

Overview of Impact Printers

Dot-matrix printers Pins strike an ink saturated ribbon Paper is marked by the pin strike Ideal for making copies Better suited for text Cost effective

DPI

Dots per inch

DDR

Double Data Rate

A stylus is most likely to be used with which type of device?

Drawing pad

Test Page information

Driver version and data Printer model and configuration settings Printing styles and fonts

Printer Firmware

Drivers Firmware

External Microphones

Drivers/Apps USB connection PC audio jack Mini-plug adapter

Packets

Dropped packets Delayed packets Errors in packets

Other key settings considerations

Duplex versus collate Portrait versus landscape orientation Printing quality

DHCP

Dynamic Host Configuration Protocol

DHCP

Dynamic host configuration protocol

255.255.255.0 would represent which value of a complete IP address configuration? A. DNS server B. IP address C. APIPA address D. Default gateway E. Subnet mask

E

A 20-pin Molex connector would be used to supply power to which component of a desktop computer? A. Optical drive B. Graphics card C. Hard drive D. CPU E. Motherboard

E

A firmware update might be able to address or correct issues with which components of the printing process? A. The operating system of the host computer B. The printer software applications supplied by the vender C. The diver D. The software applications being used to submit print jobs E. The printing device

E

After testing a theory and evaluating the results, the issue is not resolved, what is the next course of action? A. Escalate the issue B. Verify your results C. Submit your play for approval D. Develop a plan of action E. Develop a new theory

E

An F connector would likely be used with which device? A. iPad B. Portable speaker C. iPhone D. UPS E. Video surveillance camera

E

During your investigation of a device that has lost its connectivity to your wireless network, you discover the adapter has been assigned an IP address of 169.254.50.80. What does this indicate about the status of your network device? A. The equipment from the service provider has failed B. The adapter on the device is being managed by conflicting applications C. The device and the access point are set to use different frequencies D. The signal strength is too low E. There is a problem with the DHCP server

E

For which purpose would the implementation of virtual machines typically not be used? A. System backup B. Running multiple operating systems C. Business continuity D. Testing new software E. data backup

E

If a user indicates that they are not able to access a resource, but you as a tech support member are able to access the same resource, in which state should you consider this issue? A. Resolved B. Escalated C. Verified D. Tested E. Unresolved

E

If your system supports quad channel memory, and you have six physical memory modules, which is the optimal channel configuration that should be used? A. Not supported B. Single channel C. Quad channel D. Double channel E. Triple channel

E

What is the maximum storage capacity for a typical compact disc (CD)? A. 4.7 gigabytes B. 1.44 megabytes C. 25 gigabytes D. 17 gigabytes E. 650-700 megabytes

E

What is the overall bus width for a system that uses single channel memory? A. 32 bits B. 128 bits C. 192 bits D. 16 bits E. 64 bits

E

What level of frequency and duration indicates that port flapping is happening on a networking device? A. Three times a minute, for at least one hour B. Three times a second, for at least one minute C. Three times an hour D. Three times a day E. Three times a second, for at least ten seconds

E

What would be a primary consideration if you are using a USB to ethernet adapter on a network that provides 1 Gbps bandwidth? A. if the adapter uses a shielded cable B. The connector type for the ethernet cable C. The USB connector type D. The power rating of the USB interface E. The version of the USB interface

E

Which component of a HCP implementation determines the validity period of an IP address configuration? A. Scope B. Reservation C. Discover D. Request E. Lease

E

Which component of a laser printer will most commonly require replacement? A. Laser scanning unit B. Corona wire C. Imaging drum D. Fusing rollers E. Toner cartridge

E

Which component of virtualization separates the virtual machines from the underlying hardware of the host system? A. Host operating system B. Guest operating system C. Virtualization software D. Host server E. Hypervisor

E

Which component or characteristic of a service or a solution is addressed and/or removed when a high-availability solution is implemented? A. Failover B. Resilency C. Failure detection D. Recovery E. Single point of failure

E

Which connectivity method would be most suitable for a wireless printer that is being connected to an existing network environment? A. 802.11 ad-hoc mode B. Ethernet C. Bluetooth D. USB E. 802.11 infrastructure mode

E

Which latency value indicated the amount of time it takes before a server receives a request from a client device? A. RTT B. QoS C. Congestion D. Propagation E. TTFB

E

Which statement correctly describes the characteristics or rapid elasticity? A. An administrator provisioning additional resources to a system or service based on usage history B. A resource that can survive the loss of any given component C. A resource that can send alerts to an administrator when resources are low D. An administrator deprovisioning additional resources to a system or service based on usage history E. A resource that can dynamically and automatically adjust its resource configuration based on demand

E

Which type of device would generally not be regarded as an IoT device? A. Refrigerator B. Light switch C. Television D. Laptop computer E. Thermostat

E

Which type of hard drive cable was not commonly used in desktop systems, but was often used in network servers? A. EIDE B. SATA2 C. SATA1 D. IDE E. SCSI

E

Which type of network configuration would be comprised of only a few devices used by an individual? A. WAN B. LAN C. MAN D. WLAN E. PAN

E

Which type of packet is the last one issued between a DHCP client and a server when an IP address configuration is being negotiated? A. Request B. Select C. Offer D. Discover E. Ack

E

Which types of server roles are often combined on the same server? A. Web and file B. Mail and print C. Mail and file D. Web and mail E. File and print

E

You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory count shows only 4 GB. Which of the following is most likely the source of the problem? What can you do to fix it? A. The new DIMM you installed is faulty. B. Windows is displaying an error because it likely became corrupted while the computer was disassembled. C. The new DIMM is not properly seated. D. The DIMM is installed in the wrong slot. E. The new DIMM is not properly seated.

E Turn off the PC and reseat the DIMM. Check that the DIMM is standing in the slot at the same height of the other installed DIMM.

You need to install a customized console on 10 Windows 10 computers. What is the best way to do that? A. When installing the console on the first computer, write down each step to make it easier to do the same chore on the other nine. B. Make sure all computers are using Windows 10 Pro because Windows Home does not support MMC. Then create a console on each Windows 10 Pro computer. D. Create the console on one computer, and copy the .mmc file to the other nine. E. Create the console on one computer, and copy the .msc file to the other nine.

E You don't want to redo your work at each computer, and a console can easily be copied to another computer. A console has a .msc file extension. Windows 10 Pro and Windows 10 Home both support MMC.

The need for segments

Each segment has its own collision domain Allow for increased bandwidth Allow for a larger practical number of hosts

Which Control Panel utility is used to configure help for users who need special assistance to use the device? Administrative Tools Ease of Access System File Explorer Options

Ease of Access

Benefits of DNS

Easy to remember names Flexible and easy to use Consistent naming structure Server security Easily scalable and fault tolerant

RJ-45 characteristics

Eight position, eight connector configuration - known as 8P8C Primarily used for data applications Ethernet networks Gbps maximum bandwidth

EEPROM

Electrically erasable programmable read-only memory

Flash drives

Electrically erasable programmable read-only memory (EEPROM) Non-volatile memory Rapid access times Shock resistant durable Relatively inexpensive

Hard Disk Drives (HDDs)

Electromechanical data storage Rapidly rotating magnetic platters Actuator arm reads and writes data Data is randomly accessed

Which of the following does ESD stand for? Electrostatic Discharge Electrostatic Disable Electrostatic Discourse Electrostatic Disarm

Electrostatic Discharge

Fadio Frequency Identification (RFID)

Embedded chip and antenna Tracking Automatic Identification and Data Capture (AIDC) Tags and readers Active/passive Various applications

Intergrated Microphones

Embedded in case More sensitive Moise and quality External options

Bluetooth Connection

Enables printing from a mobile device Has limited range, adequate for a SOHO environment

Virtual Private Network Overview

Encrypted connection Safely transmits sensitive data Prevents unauthorized eavesdropping Enables remote work

PCI-eXtended (PCI-X)

Enhanced speeds 3.3V PCI slot 64-bit connections

Replacing the Filament spool

Ensure the nozzle is free An angled cut at the end of the filament may be helpful Insert the filament into the extruder Ensure the material has reached the nozzle

Secure Boot

Ensures PCs boot using trusted firmware Enabled/disabled through BIOS May need to be disabled in certain circumstances

Mobile Application Management Features

Enterprise app offering self-service poral Automatic app distribution Seamless installation, updating, and deleting, App installation blocking Policy based access

Authentication Server

Entity providing authentication Provides ability to identify and access

Understanding System changes

Environmental changes Infrastructure changes

Eliminating Obvious Sources

Equipment Service Provider

ECC

Error Correcting Code

RJ-45

Ethernet Standard connector for all current versions of Ethernet cables Contains eight wires in four sets of twisted pair

Troubleshooting Tips

Ethernet cables Hardware indicator lights

Refrigerated Cooling Systems

Evaporator Condenser Compressor Flow Control device Insulated tubing

Implementing the Action Plan

Execute action plan Pay attention to maintenance windows Determine whether to escalate Internal support External support Be mindful of the time frame Ensure there are sufficient resources to meet deadline

Sound Cards

Expansion card used to produce sound Connect using PCIe or PCI cards3

Near Field Communication (NFC)

Extension of RFID Very short range Quick sync Payment apps (tap)

External Serial AT Attachment (eSATA)

External SATA connections Cable lengths up to 2 meters

eSATA

External Serial AT Attachment

Universal Serial Bus (USB)

External serial bus interface Used for connecting devices to a computer

Migrating Data from Legacy Systems

Extraction Transformation and cleansing Validation Transferring to new system

Organic Light-emitting Diodes (OLEDs)

Extremely thin No need for backlighting Organic compounds Thin film transistor (TFT) Anode/cathode

Enhanced IDE

Fast ATA Ultra ATA Expanded IDE

Cloning a Hard Disk Drive (HDD) to SSD

Fast and simple. SSD must be at least same size

Cat 5 vs Cat 5e

Faster Fore reliable Less crosstalk

Key Benefits of Automatic Document Feeders

Faster scanning, copying, and faxing Quick collection of information Rapidly digitizing documents

Wi-Fi 6E Standard (6 GHz)

Faster than 2.4 GHz and 5 GHz Exclusive to Wi-Fi 6E devices Twice as many channels as 5 GHz

Rapid Elasticity

Feature of the cloud service provider Web applications, databases, storage services Web applications, databases, storage services Eliminates the need to estimate resource usage Scalable resource provisioning Resources are automatically adjusted Configuration Thresholds Seamless process Resources are effectively limitless More responsive services Flexibility Additional cost

`Overview of Automatic Document Feeders

Feed multiple sheets of paper Found on high-level multifunction devices Faster copying, scanning, and faxing

Unified Threat Management (UTM)

Firewall Proxy server Anti-virus/anti-spam Content filter

Micro ATX (mATX) Motherboards

Fits in standard ATX and smaller cases 9.6" x 9.6" Fewer slots and components

Developing the Plan

Fix issues with minimal operational impact Some issues may be addressed during work hours Other issues may be addressed after hours

Advantages of SaaS

Flexibility and scalability Pay-as-you-go billing Less in-house management New features and updates applied automatically High accessibility

What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames? Link aggression Spanning tree Flow control Port security Stop and wait mechanism

Flow Control Flow control is a switch feature that you can enable and prevent frame drop in case of congestion. On a Cisco switch, you can enable flow control only for the received frame (input flow control). Spanning tree keeps the environment free from switching loops. Link aggregation is a feature that aggregates two or more physical ports into one logical port. Stop and wait mechanism is a type of flow control switching feature. Port security is a security switching feature that enables MAC filtering on a port.

How DNS works

Forward DNS lookup Reverse DNS lookup Database stores host address information Database servers DNS resolver DNS server hierarchy

Quad Channel RAM

Four channels Supports four memory modules in dedicated channels

Four chips

Four chips still benefit Two chips sharing each channel Still better performance

DDR5 enhancements

Four times capacity of DDR4 Single DIMM maximum of 128 GB Die stacking LRDIMM up to 4 TB

2.4 GHz Channels

Fourteen channels defined for use Depending on the country, not all channels are allowed

What performance indicator of a webcam refers to how rapidly it can capture images?

Frame rate

Cat 6 Cables

Frequency of 240 Mhz Speeds up to 10 Gbps

Printing a Test page

From printer control panel From operating system

Other common Printer Errors

Fuser failure Laser unit failure Laser diode failure Motor failure Fan failure Rollers and pads have reached end of life Image rate error Slow printing time Resolution errors

Identifying Problems

Gather relevant information Symptoms vs change Question users Recreate issues

802.11ac (WiFi 5)

Gbps speed 5 GHz only Bo backward compatibility

Factors Affecting Long-range Fixed Wireless

Geographical interference 2.4 Ghz interference Tidal fading

Considerations for Using Long-range Fixed Wireless

Geography Licensing Antennas Power

GSM

Global system for mobile communication

OLED

Good reproduction of colors Expensive Limited use in laptops

Virtualization Security Measures

Granular security controls Granular security procedures Granular control and authority Protecting against physical system vulnerabilities Setting security policies

Common Thunderbolt Use Cases

Graphics Compression Buring Data

High Availability Clusters

Group of computers All systems provide the same service

HDD VS Solid-state Drive (SSD)

HDD underperforms SSD HDD has larger capacity than SSD

Lucent Connector

Half the size of an SC connector (1.25mm)

HDD

Hard Disk Drive

Molex Connectors Use Cases

Hard drives Optical drives Floppy drives Motherboards CPU or graphics

HSM

Hardware Security Modules Security

Wi-Fi Analyzer Categories

Hardware Wi-fi signal analyzers Wi-Fi analyzer apps

Networking without SDN

Hardware and software are tied together Difficult to centrally manage network devices Vender specific protocols

Additional Features of Hardware Firewalls

Hardware firewalls can contain additional functionality VPN concentrator Web filtering

Laptop HDDs

Has no cables Recessed compartment Insert and slide to connect Mounting screws

Alternatives to built-in microphones

Headsets USB microphones

Removing an old filament spool

Heat nozzle to appropriate temperature Release the handle on the filament Pull out the filament spool

Thermal paper features

Heat sensitive paper is relatively costly Cannot be substituted for other paper types Comes in different sizes

Maintaining the Heating Elements

Heating elements require periodic cleaning Can be done with isopropyl alcohol Cleaning pen Cleaning card

HDMI

High Definition Multimedia Interface Replaces analog standards

Thermal Paste

High heat conductive paste Better conduction between components

HIPS

High impact polystyrene

Thunderbolt Cables

High resolution displays High performance data

What is a lightning cables advantages over Micro-USB

Higher power, Better durability, and simpler to connect

Secured Print Jobs

Hold and release queue Avoid printing on unattended printers Owner of print job present at the device

Which of the following should you generally think about when considering the environment in which your computer will operate? [Choose all that apply] Humidity-Level Temperature Time of day Ventilation

Humidity-Level Temperature Ventilation

Dynamic Host Configuration Protocol (DHCP)

IP address configuration Alternative to static configuration Automated IP addressing

STP Implementations

Ideal for environments that are susceptible to electromagnetic interference (EMI) Airports Industrial Medical centers

Facial recongnition

Identify a person's face Requires a device with a camera Verification based on mathematical data aging, eyeglasses, hats may affect reliability

Useful Activities

Identify changes Break down large problems Perform a backup Examine log files

The 6 steps of troubleshooting

Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action Verify system functionallity Document findings

Verify System Functionality

If it works, all is well If possible, use what was learned for future-proof If it doesn't work, start over Verify system post-change Testing should be included in action plan Some things simply can't be prevented Hardware fails for various reasons Poorly implemented processes Issue documented Problem identified Plan implemented

DVI to VGA Considerations

Image quality Video output is only as good as weakest link DVI supports full 1080p HD at 1920x1080 However, once converted, the quality may be reduced to 1024x768

Benefits of Fiber Optics

Immune to EMI Long distance very fast

Key Benefits of Scanning to Shard Folder

Import and save large volumes of data Data transferred more securely than email Does not require a full-scale FTP server

Firmware Upgrades

Improve performance Fix bugs Add features Improve compatibility Fix printer support issues

How is USB 2.0 better than USB 1.1

Improved performance and can do 480 megabits per sec. is 5 meters in length

Paper Jams

In feeder or past it Open case Maintenance or paper feed button

IPS

In-Plane Switching

Which type of LCD technology is generally considered to have the highest overall picture quality?

In-plane switching (IPS)

LCD Technologies

In-plane switching (IPS) Super plane to line switching (PLS) Vertical alignment (VA) Twisted nematic (TN) Transistor translator logic (TTL)

Jitter

Inconsistent packet delivery Common issue with VoIP Jitter buffers

Which Control Panel utility can increase the accuracy of searches on the device by cataloging the information in the drive? Internet Options System Network and Sharing Center Indexing Options

Indexing Options

ITX

Information Technology Extended Motherboards

SCADA Benefits

Information reliability and accuracy Real-time notifications Trend analysis Proactive maintenance Increased equipment lifespan Informed decisions

laaS

Infrastructure-as-a-service

SCADA disadvantages

Initial investment is significant Adaption to new system Training on new technology Support offer purchase Maintenance time and costs

Troubleshooting Considerations

Input cables Monitor controls Computer Graphics card Connection type Display driver Refresh rate Resolution OS configuration

Stateful Firewalls

Inspect contents and state of packets Better at detecting unusual/potentially malicious traffic Able to more intelligently filter traffic based upon context Require more memory and computational power

Inspecting the wires

Inspect each wire to ensure there is no overhang Wires should be securely in place Trim any excess on wires

Upgrading to a Solid State Drive

Install SSD Connect cables Reinstall OS

IDE

Integrated Drive Electronics

Built in Microphones

Integrated into laptop cases Good for general purpose activities like teleconferencing Audio quality not suitable for creating content

Synchronize to cloud

Integrated into mail system Microsoft Exchange/Outlook Android Google account Apple iOS iCloud account

Shared Resources

Internal External

Video Capture Card

Internal expansion device Capture video from camera or other source

ICMP

Internet Control Message Protocol

IPsec

Internet Protocol Security

Webcam use and what to consider

Internet video communication Image quality Frame rate

D-subminiature Serial Connectors

Introduced in 1952. D-shaped electrical connector. Typically used for RS-232 serial communications. Contains two or more rows of pins or sockets

Compact Discs (CD)

Introduced in 1980s Most read-only data Increased capacity Prone to damage

Advanced Technology Extended Motherboard (ATX)

Introduced in 1995 12.0" x 9.6" Allows full-length expansion cards

Lightning Connector Characteristics

Introduced in 2012 8-pin connector introduced with iPhone 5 and iPad 4 as a replacement for the 30-pin predecessor Significantly smaller than previous connector Reversible connection Not backward compatible

IDS

Intrusion Detection System

IPS

Intrusion Prevention System

Internal Symptom-based Research

Investigate the most obvious causes Consider other possible causes Links may not always be apparent Relatively complex relationships may exist

.js

Java Script

Print Queue Problems

Jobs won't print Print queue paused Possibly many jobs waiting

You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance? Jumbo frames Change the MTU to 1300 Spanning tree Flow control Link aggregation

Jumbo Frames Leaving the default MTU of 1500 bytes (for an environment with 40 Gbps speed and higher) is not good practice. To improve performances, you need to enable a jumbo (giant) frame. In a Cisco switch, you can set the jumbo frame up to 9000 bytes. Spanning tree is a switching feature that keeps the environment free from switching loops. Flow control is another feature that prevents frame dropping in case of congestion by pausing sending frames. Changing the MTU to 1300 can cause even more performance issues. Link aggregation is a feature that aggregates two or more physical ports into one logical port.

Coaxial Cable

Key benefits Multiple channel support Lower error rates High capacity Rigid design Key limitations Signal leakage Noise from external fields Difficult to work with

Placement

Key placement considerations

Laser Printer Maintenance Kit

Kit contents Fuser unit Transfer roller Feed rollers Pickup rollers Separation rollers Separation pads

Contrast

LCD Measured in contrast ratio OLED offers higher contrast

Color

LCD color recreation depends on the technology used IPS and VA offer better color than TN Early OLED tended to province poor color accuracy OLED can have problems with volume

Cold Cathode Fluorescent Light (CCFL)

LCD monitors Neon signs Computer case lighting Is made out of small tubes to prevent damage Diffuser Bottom or top of screen or both More than two

Brightness

LED and LCD are brighter Important when outdoors or viewing HDR video

Which of the following are common interfaces using for installation of printers nowadays? Select three answers. LPT USB Serial IEEE 1394 IP

LPT USB IP

Disadvantages of IaaS

Lack of transparency Billing granularity Multi-tenant architecture

LGA

Land grid array

CPU Socket Types

Land grid array (LGA) Pin grid array (PGA) Ball grid array (BGA)

Page Orientation Problems

Large page elements Zoom or scale settings Printer driver overrides software Corrupted printer driver Operating system issues

Driver Compatibility

Latest drivers OEM website OS version Printer model

OSI layers

Layer 2 Data link Forward data based upon the MAC address Switches Layer 3 Network Forward data based upon the IP address Routers

What sort of Internet connection is preferred to provide guaranteed uptime to customers? Leased Line Satellite Metro-Optical Cable Connection

Leased Line Leased lines are preferred to provide guaranteed uptime to customers. Leased connections are dedicated lines set up for the business and hence enable the service providers to guarantee uptime. Satellite Internet Service Providers provide services to Airlines because it is not possible to have any of the wired connections on air. Cable connection uses TV Cable connection to provide Internet services. Cable Internet is able to provide high-speed Internet, but one of the disadvantages is shared bandwidth among the neighbors, which can degrade the performance if multiple users are connected at the same time. Metro-Optical connection is primarily used by major Internet providers having multiple locations within a given area. Using Metro-Optical connection, they are able to connect their different locations creating a bigger network.

Voice Recognition

Less common Easier to hack Computer matches user voice

Cat 5e Transmission Limitations

Less prone to crosstalk Price considerations Lower performance than new generation cables

LED

Light Emitting Diode

Common IoT Devices

Light switches and outlets Thermostats Televisions Refrigerators Smart watches or health monitors

Advantages of LCD

Lightweight Low power consumption Inexpensive

Digital Subscriber Line(DSL) Modem

Like dial-up modem, uses phone lines Utilizes RJ-11 connector Uses normally unused frequencies for faster speeds Requires DSL filter if phone service is required

LCD

Liquid Crystal Display

LCD design

Liquid crystal material Between plastic Light source Divided into time squares (pixel of image)

Establish a Theory of Probable Cause

List probable causes Leverage knowledge to prioritize Consider the obvious Escalate if necessary

Name Server Records

List servers for domain Permit other name servers More than one name server

LAN

Local Area Networks

LAN

Local area network

SCADA Applications

Local or remote control Monitor, bather, and process real-time data Device interaction Record events

Maintaining Impact Printer Ink Ribbons

Long circular piece Cartridge contains ink Requires replacement when print quality deteriorates Is easily replaced Snap out ribbon cartridge Replace with new cartridge

Changing the Printing Paper

Long continuous piece of paper Tractor feed Ensure holes line up perfectly to feeder Give special care to forms with predefined print areas Ensure paper feed is unobstructed

Next Generation Firewall (NGFW)

Looks to provide additional functionality on top of standard firewalls Ability to filter traffic based upon applications Intrusion prevention system detects and prevents attacks Gathers up-to-date threat information from an external source

Disadvantages of Optical Fiber

Low Power Distance Fragile

Advantages of PaaS

Low infrastructure management Services accessible through browser Per-use model

Light Emitting Diode (LED) Advantages

Low power requirement Highly efficient Minimal heat produced Long life Quality

DDR5

Lower power consumption Twice the speed of DDR4 Lower voltage at 1.1V Voltage regulators Additional cost 51.2 GB/s MT/s from 3200 to 6400

LC

Lucent Connector

How MDM works

MDM agent MDM server Policy configuration Applications deployment

What does MFi certification stand for?

Made for iPhone/iPod/iPad

MX Records

Mail exchanger record Servers configured to accept mail

DNS Records

Mail exchanger record (MX) Name server record (NS) Reverse lookup pointer record (PTR)

DNS Servers

Maintain a directory of domain names Names are translated to IP addresses similar to phone book Central registry Updated DNS information

Print Servers

Manage print requests Provide printer queue information Large enterprise networks Small office or home networks

Connecting and Organizing Cables

Many devices require network connectivity Modern enterprises can have thousands of network cables running throughout There is a need for cables to be manageable, neat, and centralized

SCADA Systems

Master Terminal Unit (MTU) Remote Terminal Unit (RTU) Human Machine Interface (HMI)

MBR

Master boot record

Key Characteristics of HDDS

Mature technology Highly reliable Cost effective High capacity Serial ATA interface

Common Factors Affecting Speed

Maxed out bandwidth Devices, connectors, and cables Cable length Power adapters

Jitter Levels

Measured in milliseconds (ms) Below 30 ms packet loss

Measuring vs. Metering

Measuring is about how much is used Metering is about how much you pay

Printer Calibration

Mechanical calibration Visual calibration

Examples of External Services

Media content delivered to customers Business intelligence consumed by analysis applications

MMU

Memory Management unit

How Virtual Memory Works

Memory Management unit (MMU) Unneeded data in RAM moved to hard disk Swap file or page file Slower than RAM, although SSDs are better than hard disks

MAN

Metropolitan Area Networks

mATX

Micro ATX Motherboards

Lightning cables device authentication

Microchip for device authentication. Compatible with approved devices only. Non-apple lightning cables

Single Core CPUs

Microprocessor with a single chip Capable of processing multiple threads Standard of the ARM (Advanced RISC Machines) and x86/x64 architectures

Mail Servers

Microsoft Exchange IBM Lotus/domino Open Source

MT/s

Million transfers per second

Which type of architecture or connection method uses a 54-pin edge connector to host devices?

Mini PCI Express

mSATA

Mini Serial Advanced Technology Attachment

MAM

Mobile Application Management

MDM

Mobile Device Management

Fiber Optic Key FEatures

Modem or gateway device used to connect offices/devices Fiber uses light beams to transmit data Faster and more reliable than DSL or cable Similar upload and download speeds

Why use Virtual Memory?

Modern operating systems require a lot of memory Not enough physical RAM to run multiple apps

The Importance of Methodology

Modern systems are complex Starting point Logical sequence Avoid wasted time

The Difficulty of Calibration

Monitor makes and models Printer makes and models Complicated and time-consuming

Advantages of Syslog

Monitor numerous events Extensive view of entire network

accounting

Monitor resources accessed by users Session logging

Screen Display and Color Printers

Monitors use RGB Printers use CMYK

Virtualization

More efficient resource utilization Software abstraction Creation of virtual machines Behave like any other computer Multiple OS instances on a single computer Not simulated Virtual machines are isolated from each other Each virtual machine has its own resources Hypervisors

Determining VM Resource Requirements

More memory can improve performance OS might not recognize it Inefficient resource utilization Operating system limits

Fingerprint Scanners

Most common method scanning pad fingerprints stored in secure database

DB9 Connector

Most commonly implemented with simple, serial devices Mouse Early PDAs Management interface for comm ports on: UPS Routers Diagnostic equipment

20-pin connector

Mostly commonly used for motherboards

MFD

Multifunction Devices

Diagnostic Tools

Multimeter Power supply tester Logs and error Messages POST card/USB Loopback plugs

Small Computer System Interface (SCSI)

Multiple devices supported per cable 8 total in the original release, increased to 16 in later revisions Internal cables 50, 68, and 80 pins External cables 50 and 68 pins Support for hot-swapping

Host Requirements

Multiple instances Large memory requirements

NFC vs Bluetooth

NFC doesn't require pairing NFC safer due to short range NFC less prone to interference

MX Parameters

Name of mail server Preference

Clearing the Spooler in windows

Navigate My Computer (C:) drive Windows folder System32 folder Spool folder Printers folder delete files

NFC

Near Field Communication

What does NFC stand for?

Near-Field Communication

Causes of Frequency Interference

Nearby Wi-Fi networks Other wireless devices Satellite dishes Microwaves Monitors and cabling Consumer appliances Hearing aids

NIC

Network Interface Cards

TAP

Network Traffic Access Point

Syslog

Network devices send messages to logging server Most network devices can send Syslog messages

Analyzer Data Collection

Network name Band and channel Signal strength Security protocols Wi-Fi standard Noise level

Intrusion Prevention System (IPS)

Network security/threat prevention Detect vulnerability exploits Prevent vulnerability exploits

Personal Area Networks (PAN)

Network specific to an individual Generally includes a variety of devices Typically managed from one computer Can be accessed by any device Bluetooth devices

Intrusion Detection System (IDS)

Network-based (NIDS) Host-based (HIDS)

USB Type C

Newest USB interface Symmetric oval shape is reversable Comparable in size to that of Mini Supports the highest speeds currently available (up to 10 Gbps)

NGFW

Next Generation Firewall

USB Wi-Fi Adapter

No cables No need to install internal hardware No need to upgrade a system

Memory Addressing

No conflicts Simultaneous operations Improved performance with multitasking

Key Features of NFC

No deceive discovery. No pairing. Instant communication if near each other. Secure Data Transfer. Can be used to make tap transactions with cards. Encryption support.

Advantages of SSDs

No defragmentation required Quiet operation More compact that HDDs Lower power requirements

BIOS Passwords

No identity Ensure you know the passwords

What are the limitations of a Windows 10 Pro computer when configured as a network print server? Only clients running Windows 10 can connect to print server deployed on Windows 10 Pro. No more than 5 printers can be installed. No more than 20 incoming connections are supported. Printers installed on this server cannot be combined into a pool.

No more than 20 incoming connections are supported.

Advantages of IaaS

No procurement No management No support requirements Flexibility and scalability

Disadvantages of LCD

No true black Color matching Losing backlight

Internet of Things (IoT)

Non-traditional internet devices From the very small to the very large Collect and transmit data

NVMe

Non-volatile memory express

SSD Communication Interfaces

Non-volatile memory express (NVMe) Peripheral component interconnect express (PCIe) Serial advanced technology attachment (SATA)

Solid-state Drives (SSD)

Non-volatile storage NO moving parts Increased performance Less prone to wear and tear associated with HDD More durable over time

Loopback Plug Characterization

Not a crossover cable Device is classified as both male and female

Slow Network Speeds

Number of users Connection speed Unnecessary apps

What component, or type of mobile display would commonly be found in devices such as smartphones and tablets, as opposed to laptop computers?

OLED display

Viewing Angles

OLED generally offers better viewing angles LCD can vary IPS improves angles in LCD displays

OLED vs. LED LCD

OLED light controlled on a pixel-by-pixel basis LED LCD typically use back or edge lighting

How is an ONT Different from a Modem

ONT connects to a fiber connection Cable/DSL modems utilize copper wires ONTs are often standalone units

Limited Network Connectivity

OS selects connection Only a single connection can be used at one time Prioritizes which to use Verify IP configuration Verify wi-fi connection properties

Internet Protocol Security (IPsec)

OSI layer 3 Packet-level authentication and encryption Packet signing Confidentiality Anti replay IPsec protocols authentication header Encapsulation security payload protocol

Authorization

Occurs after authentication Access system resources and perform tasks Policy enforcement Individual permissions Authenticated users may be granted access to different activities

Patch Panel Cables

Often just long enough to connect to a switch Can come in a variety of colors for color-coding Shorter cables are cheaper than long cables Easy to swap out a bad cable

Mini PCI

Older laptops Square shape 124-pin edge connector

Wi-Fi and Laptops

Older laptops require external adapter Integrated Wi-Fi

Dial-up modem

Older method of sending/receiving data Uses phone lines connects by dialing ISP or destination slow by modern standards

Coaxial Cables

Oldest types of network cabling Single wire conductor Uses a wire mesh to insulate the core Commonly used for home internet services prior to fiber optics

Basic Input/Output System (BIOS)

One of the most important motherboard components Contains the lowest level system software Succeeded by Unified Extensible Firmware Interface (UEFI)

Ownership considerations

Ongoing costs Metting your needs Setup and servicing

USB Micro B - 3.0

Only available with USB 3.0 devices Not backward compatible with 2 or 1.x devices Designed for the current high-speed requirements of newer devices

Molex Characteristics

Only used for power, no data Almost always used internally only Molex connections are extended directly from the main power supply of the PC

Replacing Thermal paper

Open printer Remove spent roll Replace with new roll Ensure paper is fed in

Replacing Cartridges

Open printer access panel Remove cartridge from its holder Replace with a new cartridge

Hubs

Operate on level 1 of OSI model Any received signal is sent to all other ports Produce more traffic Simpler and cheaper Not often used anymore

Network Bridge

Operates on Layer 2 of OSI model Divides network into segments Traffic is inspected for destination MAC address If destination is on another segment, frame is forwarded

Printer Drivers

Operating system operating system version

ONT

Optical Network Terminal

OLED

Organic Light Emitting Diode

Bring Your Own Device (BYOD)

Organizations might allow you to bring your own device for official use. However, organizations need to ensure that any corporate data on the mobile phone is secure. To safeguard the data, mobile phones must be encrypted.

Mobile Application Management (MAM)

Overlap with Mobile Device Management. Mobile app lifecycle management Installing, updating, and deleting apps Managing licenses, permissions, and configurations Defining app policies

You do not have a Corporate

Owned, Personal Use method.

Functionality

PC checks operating system It the verifies other hardware Compares information with information on TPM chip

PCI-X

PCI-eXtended

Video Cards

PCIe AGP PCI

Common Symptoms with hardware

POST beep codes System locks up Sudden shutdown Blank screen on boot Blue screen of death (BSOD) No power Continuous reboots BIOS time and settings reset Black error screen during boot Failed to locate a bootable device Overheating Noisy fans or not spinning smoke or Buring smell Failed capacitors

Causes of Poor VoIP Quality

Packet loss Router Network connection

Banding

Pages have bands Light or dark lines across page

Paper Size

Paper doesn't fully eject or is wrinkled Check paper size Clear jam if necessary Use correct paper size

Paper and mechanical issues

Paper jam Paper mismatch Paper tray Verify ink type

Paper Jam Errors

Paper stuck in printer Lid must be opened and closed Media size, quality, paper tray

Printer Error Considerations

Paper support Understand error codes Review documentation

Paper Out Error

Paper tray empty Check paper tray

Head alignment

Perform after new cartridge installation Printer calibration

The Purpose of Virtual Machines

Perform tasks like a separate computer Guest VMs are created within host A host can service multiple guest VMs VMs have access to physical resources Resources allocated separately to each VM

PCI

Peripheral Component Interconnect

PCLe

Peripheral component interconnect express

DHCP Reservations

Permanent IP addresses Used for specific DHCP clients Applicable for DHCP-enabled devices Use client MAC addresses

DHCP Reservations

Permanent IP assignment Specific DHCP Client DHCP-enabled devices Media access control (MAC) address

PAN

Personal Area Networks

PAN

Personal area network

Bluetooth Adapters

Personal area network (PAN) PC card PCMCIA slot ExpressCard slot USB dongle

Secure sockets Layer ((SSL) VPN

Personal devices Implemented through: VPN client, or HTML-5 capable browser Username and password

Poor image quality

Photos and graphics Correct paper driver or configuration settings Ink levels Toner cartridge

Key Differences between USB

Physical layout Data transfer rate Backward compatibility

Port Flapping

Physical switch interface Cycles up and down Three or more times a second Ten seconds or longer Cables Speed or duplex mismatch Link synchronization

PGA

Pin grid array

Testing for Jitter

Ping Measurement

Testing Latency

Ping Traceroute Third-party tools

Headers

Pins on motherboard for various connection types Pin assignment and numbers vary Must be oriented correctly

Resolution Settings

Pixels per inch Dots per inch Print mediums

PaaS

Platform-as-a-Service

HDD Performance

Platter rotation speed (5400, 7200, 10,000, 15,000 RPM) Internal cache Interface type

Po 802.3af

PoE was introduced in 2003 Has multiple power classes for delivery 4W, 7W and 15.4 W Power loss over the cable reduces wattage for end device 3.8W, 6.49W, 12.95W

Long-range Fixed Wireless

Point-to-point configurations Terrestrial microwave Does not require satellites Connect users in remote areas

PETG

Polyethylene terephthalate glycol

PLA

Polylactic acid

3D Printing Materials

Polylactic acid (PLA) Acrylonitrile butadiene styrene (ABS) Polyethylene terephthalate glycol (PETG) High impact polystyrene (HIPS) Metal composite

Advanced Micro Devices (AMD) CPUs

Popular in game and hobbyist markets Generally, less expensive than intel CPUs Use different socket types than intel

Requirements for Scan to email

Port 25 Static IP address Licensing

You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports? Jumbo frames Flow control Port mirroring MAC address filtering Port security

Port security Port security is a switch feature that provides MAC address filtering. When enabled on the port with the default setting, it will allow only one MAC address on that port. In case you plug in another host on the other end of that port, the port will go into an err-disabled state and will be disabled. Port mirroring is a switching feature that enables you to send a copy of traffic received or transmitted on that port to another port where a log analyzer software can be installed. MAC address filtering is not a valid name for s switching feature. Flow control is another feature that prevents frame dropping in case of congestion by pausing sending frames. Jumbo frames are used in high speed environment to improve the performance of data transfer.

USB Webcams positives

Portability Compatibility Attachments

Troubleshooting Printers

Power Availability

Troubleshooting power and availability

Power adapter Cables Network Drivers

Molex Connectors

Power connectors for internal PC components

Removing a drive

Power down and unplug computer Use anti-static mat and wristband Open computer case Disconnect cables and remove mounting screws

Replace Toner Cartridge

Power down the printer Access toner cartridge Remove spent cartridge Put replacement cartridge in Close access panels

Setting up PoE

Power sourcing equipment sends power and data Some switches support PoE Endspan power PoE injectors can be used Midspan power

POST

Power-On Self-Test

D-subminiature Naming Convention

Prefixed by the letter D. Shell size denoted by letters A, B, C, D, or e. Number of pins or sockets. Suffixed with P for pins or S for sockets

Terminating the wires Using the Punch Down Tool

Press down on the wires, this will also cut any excess wire Ensure the punch is not performed on an angle Tool should make a clicking sound

BIOS Security

Prevent unauthorized changes Supervisor password User password

Default settings

Print Driver default Software default

Key Components of 3D Printers

Print bed and bed leveling Filaments Plastic Extruder and nozzle Thermal sensors Laser curing Cooling fan Motion control motors

Printing Correct Orientation

Print driver interface Software page setup interface

Audit Logs and Print Reports

Print job logs Print reports

Blurs and Smears

Print output is blurry or smeared Media type

Troubleshooting Errors

Print queue Calibrate the printer

Operating System Considerations

Print troubleshooter Windows updates Compatibility mode

A USB Standard-B Plug would most commonly be found plugged into which device?

Printer

PCL

Printer Control Language

Laser Printer Calibration

Printer diagnostics Image consistent with monitor Software calibration

Troubleshooting Considerations

Printer may not be working at all Appears to be online Uninstall and reinstall print drivers Reinstall printer Typically restores printer operation

Printer Open Error

Printer not properly closed Toner cartridge seating Cooling fan may not be working Power connection

PostScript

Printing language Used by various printer manufacturers Used commonly in Mac environments

Printer Control Language (PCL)

Printing language Used by various printer manufacturers Supported by many operating systems Operates in various environments

Private Cloud

Privately shared resources Accessible to other users Resource access controlled internally Accessed over the internet or private network

Pros and cons of Quad channel RAM

Pro Improved system performance Four times memory bandwidth as single channel Higher capacity Cons Cost

Authentication

Process of determining whether someone or something is true, genuine, or valid Most commonly a username and password

Common PaaS offerings

Processing infrastructure Storage infrastructure Version control Compiling and testing

A digitizer performs what task in image processing?

Produces digital output, from analog input

Latency

Propagation delay Handling delay Queuing delay Prioritize traffic

Lightning Connector

Proprietary Apple connector Primarily used to charge devices Also supports data transfer and audio

Wi-Fi 6 Considerations

Pros Backward compatible Greater range than 5 GHz Better performance at longer distances Efficient use of bandwidth Lower power consumption Cons Still a new standard Cost vs. performance Physical infrastructure an issue

802.11ax Pros and Cons

Pros Better range Dual band Higher speeds Lower power consumption Cons Still a nascent technology Fewer 802.11ax devices currently available

AMD Pros and Cons

Pros Cheaper than intel CPUs Superior graphic performance Better 64-bit application handling Cons Generate more heat than intel CPUs Considered slower than intel CPUs

NFC Pros and Cons

Pros Convenient Seamless Broad support No pairing Cons Cost Security

802.11n Pros and cons

Pros Fast (300 Mbps) Good signal range More resistant interference Cons Older standard Interference

802.11g pros and cons

Pros Fast maximum speed Good signal range Not easily obstructed Cons Older standard Interference

802.11a Pros and cons

Pros Fast maximum speed Regulated frequencies Reduced interference Cons Older standard Shorter signal Easily obstructed

PCL Merits

Pros Fast processing of print jobs Broad operating system support Cons Inconsistent output across printers Graphics quality is greatly affected by printer

802.11b Pros and Cons

Pros Good signal range Less prone to obstructions Cons Older standard Slower than 802.11a Easily obstructed

2.4 Ghz Considerations

Pros Greater coverage area than 5 Ghz Better penetration of solid objects Cons Lower data rate Susceptible to interference

PostScript Merits

Pros Greater detail graphics Consistent printing quality across devices Supported on Mac Cons Slower print job processing Not as broadly supported as PCL Requires more computing resources

5 GHz Considerations

Pros Higher data rate Less susceptible to interference Cons Smaller coverage area Less successful penetrating solid objects

802.11ac Pros and Cons

Pros Improved bandwidth Wider channels Beamforming Dual-band transmission Cons No backward compatibility

Intel Pros and Cons

Pros Performance Compatibility Less heat generation Cons Generally, more expensive Power consumption Higher operating costs

Wi-Fi 6E considerations

Pros Significantly higher data transfer rate Performs best indoors Cons Short range Shard 6 GHz spectrum Requires dedicated hardware Confusion between Wi-Fi 6 and 6E

RFID pros and cons

Pros global standard Multiple items Speed No line of sight required Cons Scanning issues Security

Pros and Cons of Virtual Memory

Pros. Can improve system performance Increases capacity for multitasking Useful for large, memory-intensice applications Cons Slower than physical RAM Consumes disk space Can result in frequent hard disk access Leads to poor performance if incorrectly used

Software-as-a-Service (SaaS)

Provider hosted applications Software on demand Clients access applications over the internet End users receive same features and updates Service-level agreements (SLAs) No local licenses required

Satellite

Provides internet access in rural and remote areas where landline internet connectivity isn't available

Public Cloud

Publicly shard resources Multiple tenants Resources accessed over the internet

.py

Python

Which type of connection is initiated by the technician with a code that is given to the user to input? A series of permissions checks occur, and the user and technician will be connected. VNC Quick Assist Remote Assistant RDP

Quick Assist Quick Assist is an update to Remote Assistance that allows a technician the ability to give a code to users to help. The user enters it on their machine, and a series of permission checks are done before the connection is made. Remote Assistance allows a user to request help from a technician. An email will be sent to the technician, and a password will have to be provided to secure the connection. Remote Desktop Protocol (RDP) is a built-in graphical remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated.

Advantages of Virualization

Quick and easy Reduced hardware costs Scalability Reliability Performance

Repeater

RE-broadcasts existing wireless network Cost-effective option to increase wireless range Easy to install

Coaxial Cable implementations

RG-6 75-ohm resistance 18-gauge center conductor Quad-shielded versions available Newer HDTV signals RG-59 Commonly used in older cable, satellite or closed circuit TV installations 22-gauge center conductor 75-ohm resistance single outer shield

RJ-11 Characteristics

RJ = Registered Jack Six position, four connector configuration - known as 6P4C Primarily used for Phones Modems DSL lines 24 Mbps maximum bandwidth

Comparison between RJ-11 and RJ-45

RJ-11 Usage: phones, modems, DSL cables Bandwidth: up to 24 Mbps Shape: compact, square (6-pins) RJ-45 Usage: ethernet networking Bandwidth: 10 Gbps over Ethernet Shape: longer, rectangular (8 pins)

Patch Panel Connectors

RJ-45 Subscriber connector (SC) Lucent Connector (LC)

Types of Connectors

RJ-45 Type F coaxial SC LC

Ethernet Connectors

RJ45 connection Network connection

Example Serial Cables

RS-232 RS-422 RS-485

Round trip time

RTT

Ram

Random Access Memory

Locating an Antenna on Top of the Lid

Range Performance

IDE Speeds

Read 100 MBps 133MBps Write 66MBps 33MBps 16MBps

RTP

Real-life transport protocol

Troubleshooting Tips

Reboot router Router firmware update Modify Wi-Fi configuration Replace old router

What is the purpose of twists in a Twisted Pair cable? Increase the cable length per unit of distance Tying two cables together Reduce Noise (Crosstalk) Increase the cable strength

Reduce Noise (Crosstalk) Twisting the cables brings them closer to each other. This makes them cancel out each other's magnetic fields, thereby reducing the noise produced

Reducing Latency

Reducing network usage Reduce running applications Subnetting Prioritize bandwidth allocation (QoS) Load balancers

RAID

Redundant Arry of Independent Disks

Redundant Arry of Independent Disks (RAID)

Redundant and non-redundant Reliable data storage Low cost Common in network servers

Error Codes

Refer to documentation Codes may not reveal the issue

Implementation

Reference documentation Path for change management Familiarity with processes Avoid immediate reaction

Small Outline Dual In-line Memory Module (SODIMM)

Refers to its smaller footprint Performs similarly to larger DIMMs

DDR5

Released in 2020 Maximum DIMM size of 128GB Lower voltage at 1.1v 51.2 GB/s

In which of the following remote connection will a user request help from a technician with an invitation and a password to help secure the connection? Remote Desktop Protocol OpenSSH Quick Assist Remote Assistance

Remote Assistance Remote Assistance allows a user to request help from a technician. An email will be sent to the technician, and a password will have to be provided to secure the connection. Quick Assist is an update to Remote Assistance that allows a technician the ability to give a code to users to help. The user enters it on their machine, and a series of permission checks are done before the connection is made. OpenSSH is an open-source connection tool for creating SSH connections. Remote Desktop Protocol (RDP) is a built-in graphical remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it.

Which of the following is a built-in Windows tool that allows a user to connect to a computer remotely as if they were sitting right in front of it, and only one connection can be made at a time? VNC Remote Desktop Protocol Quick Assist Remote Assistant

Remote Desktop Protocol Remote Desktop Protocol (RDP) is a built-in remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it. Only one user can be signed in at a time. Remote Assistance allows a user to request help from a technician. An email will be sent to the technician, and a password will have to be provided to secure the connection. Quick Assist is an update to Remote Assistance that allows a technician the ability to give a code to users to help. The user enters it on their machine, and a series of permission checks are done before the connection is made. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated.

Installing a New Drive

Remove old drive Insert new drive Mount with screws Attach power and data cables Close computer case

preparing the cable

Remove the cable jacket to expose the wires Fan out the cable pairs Straighten the pairs and place the wires in the slots

Unified Extensible Firmware Interface (UEFI)

Replaced BIOS Larger hard drive support Faster boot times Better security features Uses a graphical user interface (GUI) User friendly Can access network card

Blu-ray Discs

Replaced DVDs Blue laser HD and Ultra HD content Movies and video games Same dimensions as CD and DVD

Serial AT Attachment (SATA)

Replacement for the parallel ATA interface

Capturing Insights

Reports on server resources Reports on storage resources Reports on licensing Reports on application metering Chargeback and show back reports

Digitizer

Representation from analog information Process of digitization Stylus or finger position produces input

Rapid Elasticity Considerations

Requests from multiple sources Allocation and de-allocation of resources Management overhead Monitoring resource requests Audit trail for billing

IP Address

Required for network communication Unique for every device

Desktop Synchronization

Requirement considerations Device management software Low memory requirement High storage requirement

Internet Connection

Requires fast internet Consider upgrading connection

Changing DC Jack on a laptop

Requires soldering and the motherboard can be damaged

Other maintenance Considerations

Reset page counter Test page printout Recommended cleaning agents

Advanced Cable Testers

Resistance Signal attenuation Noise/interference

Advantages of Using a Metered Service

Resource management Resource optimization Reporting

LCD Performance

Response time is measured in milliseconds (ms)

Other troubleshooting Considerations

Restart router or Wi-Fi device Change DNS settings Check antivirus/firewall settings Run OS troubleshooter Set manual IP address, reset TCP/IP

Dealing with Failed Antennas

Result in connection failure Generally will not break, but leads can become disconnected Reseat cable leads An external USB adapter might be easier

Key Benefits

Reveal's specific data Useful for Wi-Fi optimization

Advanced Automatic Document Feeders

Reversing automatic document feeder Dual-scan document feeder

DVD Features

Rewritable Cannot store high-definition video Manufacturing costs dropped Cheaper than newer technologies Same dimensions as CD

Other key components

Ribbon Tractor feed Impact paper

Measuring Latency

Round trip time (RTT) Time to first byte (TTFB)

Default Gateway

Router IP address Provides internet access Subnet mask determines if a request should be sent to the default gateway

Protocols in Networking

Rules for the format of data and how to work with it Allows for communication across disparate systems Serve as a language common to one or more computers

Testing a Connection

Run a speed test Use cable connection to establish a bench mark

Common Uses for Virtual Machines

Running different operating systems Testing new software Disaster recovery System backup Business continuity Legacy Systems Physical-to-virtual conversion

Software firewall

Runs on a host Only as secure as the underlying OS Controls access per application Works on a port level

Wi-Fi 6 standard (802.11ax)

Runs on both 2.4Ghz and 5 Ghz Better speed and range More efficient use of bandwidth Lower power consumption

Which of the following regulations should you follow to safely dispose of the components in your computer? Safety Data Sheet (SDS) Safety Awareness Sheet (SAS) Safety Regulations Sheet (SRS) Safety Waste Sheet (SWS)

SDS

Key considerations for scan to email

SMTP server configuration Email client Recipients

What type of physical component would be used for the Random-Access Memory for a laptop?

SODIMM

Hybrid Drives

SSD speed HDD capacity Cost

Which of the following remote access technology allows administrators the ability to remotely administer computers via the command line? SSH Telnet RDP VNC

SSH Secure Shell, or SSH, is a command-line interface that allows you to connect to a remote computer in a secure manner. It's a secure alternative to insecure methods like Telnet. Through encryption, SSH enables safe communication and preserves the integrity of data. Telnet is similar to SSH in that it is a command line tool for remote administration but does not have any security and sends information in plain text. Remote Desktop Protocol (RDP) is a built-in graphical remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated.

SSID Issues

SSID mismatch Wireless network standards Encryption settings

What sort of Internet Service Providers are used by Airlines to provide Internet services to customers in transit? Satellite Cable Connection Leased Line Metro-Optical

Satellite Satellite Internet Service Providers provide services to Airlines because it is not possible to have any of the wired connections on air. Metro-Optical connection is primarily used by major Internet providers having multiple locations within a given area. Using Metro-Optical connection, they are able to connect their different locations creating a bigger network. Leased line is a leased dedicated circuit between two endpoints (locations). It is mostly used in situations where guaranteed SLA is required or in business-critical environments where lesser speed, downtime or poor quality will impact the business productivity. Cable connection uses TV Cable connection to provide Internet services.

SD

Secure digital card

Trusted Platform Module (TPM)

Security chip Originally a removable chip, now built in Cryptographic vault

Multi-factor Authentication

Security token Biometric verification Security questions

Light Emitting Diode (LED)

Semiconductor that emits light LED panel backlighting Fier optics Indicatior lights

How IoT works

Sensors Communication chips Collect and transmit data IoT gateway

Key VM Security Considerations

Separate security context Separate authentication and authorization Isolation rules Disk images Physical security

Software-defined Networking (SDN)

Separates software from hardware Allows software to control the network Provisioning Configuration Management

resource segregation

Separates switch ports into subnets Segregates functional groups

SATA

Serial AT Attachment

SATA

Serial advanced technology attachment

Virtual Desktops

Server-based virtual machines Accessed through remote connection Interaction with local device Accessible by a broad variety of devices

Resource Considerations

Serves Resources Storage Processing power Network bandwidth

Optical Network Terminal (ONT)

Serves as a termination point for a fiber connection Allows client devices to connect to ethernet of Wi-Fi More expensive than cable

Disadvantages of PaaS

Service availability Service lock-in Service resiliency Ongoing support

SLAs

Service-level agreements

Key features of PaaS

Services complement existing resources Focus remains on development No additional local infrastructure required

Bluetooth Pairing

Set to discoverable mode List discoverable devices Nearby devices Select desired device Enter pin code Pair to synchronize devices

Considerations for Fresh Installs

Setting up OS Reinstalling apps Copying files and folders

Hypervisors

Sharing resources Manages everything

Sharing devices from an operating System

Sharing via the Transmission Control Protocol Sharing via the Bonjour Protocol Sharing via AirPrint

STP

Shielded Twisted Pair

Key Uses for Flash Memory

Short term data storage Data portability Random access memory enhancement Multi-boot systems

Key Considerations with Location services

Should location be broadcast to everyone? Location of adults and children. When you are home. Where home is. Sharing real-time location information. Patterns of movement.

Common Wireless Factors

Signal strength Frequency Line of sight

The complexity of plans

Simple action plans Complex action plans

Establish a plan of Action

Simple problems typically require simple solutions Complex problems should be well documented Escalate if necessary

SMT

Simultaneous Multi-Threading

Virtualization and Security

Singel Physical host system Hosting multiple virtual machines A compromised host can result in al VMs becoming compromised A compromised VM can result in other VMs or the host becoming compromised

Digital Visual Interface

Single link - 3.7 Gbps at 60 fps Dual link - 7.4 Gbps at 85 fps DVI-A supports analog signals DVI-D digital signals only DVI-I integrated (both)

SPOF

Single point of failure

4-pin Molex Connectors

Single row Standard peripheral power connectors 4-pin connectors are most commonly used for hard drives or optical drives Two Rows 4-pin Connector (2 row) most commonly used for CPU or graphics card

Wireless Interference

Slow connection Signal strength (Low bars/no bars) Slow file transfers Frequent connection drops Inability to pair devices

Impact of Jitter

Slow or dropped calls Distorted audio or video Static and echo

SODIMM

Small Outline DIMM

Laptop memory

Small Outline DIMM (SODIMM) Smaller than desktop dual-in-line memory modules (DIMMs) 2.5 to 3 feet Pins and notches

SODIMM

Small Outline Dual In-line Memory Module

Advantages of Multifunction Devices

Small and portable Well suited to SOHO environment Cost effective

SOHO

Small-office/Home-office

Multifunction Devices (MFDs)

Small-office/Home-office (SOHO) Printer, Scanner, fax, and network connection

LC Connector Benefits

Smaller size Cost savings Reliability

Triangulation

Smartphone GPS receiver. Determine location and time. Four satellites are required.

Broad Device Support for MDM

Smartphones/tablets IOS Android Windows 10 device macOS computers Internet-of-things devices

Troubleshooting Considerations

Soft reset Hard reset Force stop apps Check configuration settings Exercise caution if disassembling Wireless consumes battery Airplane mode Disable unused wireless Heat Application usage Overall volume vs. app volume Check sound with headphones Update to latest OS

Platform-as-a-Service (PaaS)

Software and hardware services Development environment Servers, networking, operating systems Applications and services Significant local investment Delivered by a cloud provider Combines IaaS and SaaS Clients access services through internet Places focus on application development

Troubleshooting Printing Issues

Software applications Error messages

SaaS

Software-as-a-Service

What are the two types of RAID

Software-based and Hardware-based

SDN

Software-defined Networking

SSD

Solid State Drives

What two factors would be advantageous for migrating from a hard disk drive to a solid-state drive?

Solid-state drives perform better Solid-state drives produce less noise

Advanced NIC Features

Some NICs have features to help improve host systems performance Multi-queue NICs can help distribute network traffic to multiple CPU cores NICs can also run TCP/IP network protocol stack to reduce load on the host

Powering Network Devices

Some network devices are in areas with no easy-to-reach power Running new power lines may be costly Already a ethernet cable provided to that device

Updates and cartridge compatibility

Some users opt for non-OEM cartridges Firmware update may reject them Disable automatic updates

USB to Ethernet Considerations

Speed of Ethernet adapter depends on USB standard USB 2.0 = 480 Mbps max USB 3.0 = 1000 Mbps

Airplane Mode

Standard feature on mobile devices. Turns off wireless antenna including the following services. GSM Wi-Fi Global Positioning System (GPS)

Built in Webcam

Standard with laptops Include video and sound Software driver required

SAS

Statistical Analysis System

ST

Straight Tip

ST

Straight tip

Active Hub

Strengthen received signal Can extend range of network Have a higher power requirement

MFi certification

Stringent manufacturers' certification. Made for iPhone/iPad/iPod. Guarentes safety standards towards device

Crimpers

Strip, align, and cut cables Commonly used for attaching connectors to various cables

RAID 0

Striping

RAID 5

Striping with Parity

Crimping

Stripping the network cable jacket Aligning and placing wires in a connector

SC

Subscriber Connector

Fiber Connector Types

Subscriber Connector (SC) Lucent Connector (LC) Straight tip (ST)

SIM

Subscriber Identity Module

SIM

Subscriber identity module

UEFI

Succeeded by Unified Extensible Firmware Interface

UTP Implementations

Suitable for both offices and home environments Ideally, environments where crosstalk is not a concern Commonly used for telephone connections

Fiber Optic Merits

Suitable for heavy file sharing, streaming, and backup to could Frequent use of VoIP services or video conferencing Capacity for server hosting and complex cloud services

DSL Merits

Suitable for light to moderate file sharing, streaming, and backup to cloud Capacity for audio and video conferencing Fast download speeds, but slower than fiber or cable

Cable Merits

Suitable for moderate file sharing, streaming, and backup to cloud Use of VoIP services or video conferencing Fast download speeds moderate upload speeds

Syslog message format

Sunt using UDP port 514 Typically, human readable (But doesn't have to be) Severity levels from 0 to 7

How is USB 3.1 different from other USBs

Superspeed +, 10 Gbps, Type A or USB-C

SCADA

Supervisory Control and Data Acquisition

Advantages of PoE

Supports up to 100W over existing wiring Supports distances up to 100 meters Prevents need for an electrician to install new power

Replacing the Print head

Susceptible to wear and tear Allow to cool down before changing Usually has a release mechanism Replace with new unit

Advanced user Authentication

Swipe card authentication Two-factor authentication Biometric authentication

ActiveSync

Synchronizes data between mobile devices and desktop computers. Only used in work areas File transfer and backup App installation and uninstallation

Syslog Server Components

Syslog listener Data base Management software

In which Control Panel utility can you change the name of the PC, adjust performance settings, and configure system restore points? Device Manager Administrative Tools Ease of Access System

System

Random Access Memory (RAM)

System memory Physical hardware Fast-access Volatile

Time to first byte

TTFB

LC Commentor Applications

Telecommunication networks Cable television service Fiber-to-the-home Local area networks Data processing networks

RJ-11

Telecommunications Traditional connector for a phone cable Contains four internal wires in two sets of twisted pairs

110 Punch down Block

Telephone systems Data network wiring Low voltage wiring

Which protocol is used for generating preshared keys? Advanced Encryption Standard (AES) Wi-Fi Protected Access 2 (WPA2) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Temporal Key Integrity Protocol (TKIP)

Temporal Key Integrity Protocol (TKIP) Preshared Keys or PSKs is a client authentication method that is mainly used in wireless networks. It is most commonly used at home or in smaller wireless networks. The wireless clients and the wireless access point must be configured with a 64 hexadecimal digits string or 8 to 63 ASCII characters. Using these along with the wireless network's SSID, an encryption key is generated using Temporal Key Integrity Protocol (TKIP). Advanced Encryption Standard or AES is a symmetric encryption algorithm. AES supports different encryption keys, which can go up to 256 bits. It can perform 128-bit encryption and encrypt data using 192-bit or 256-bit keys that are considered highly confidential and sensitive. WPA2 is currently mandatory on all Wi-Fi devices and provides CCMP and AES encryption support. WPA2-AES is the standard for newer wireless routers where all clients support AES. CCMP is an AES encryption-based protocol that is used in the 802.11i network. It is mainly designed to provide confidentiality, data origin authentication, and integrity that must be transmitted from one endpoint to another. However, it is important to note that CCMP does not provide fault tolerance and reliability.

Troubleshooting Jitter

Test internet connection Switch to wired connection Consider a better router Configure QoS Wi-Fi frequency bandwidth usage Jitter buffers

Troubleshooting Quality and Availability

Test page Network settings Security settings

Which device or process allows a laptop to use the cellular connection of a smartphone to gain access to the internet?

Tethering

TXT

Text Record

Basic Required Settings for a IP address

The IP address itself Subnet mask Default gateway

On a test lab computer, you installed Microsoft KM-TEST Loopback Adapter, after which you configured a static IP address 192.168.0.25 on the said network interface. Using another workstation, you tried to map a network drive located at 192.168.0.25 and was unsuccessful. You tried pinging 192.168.0.25, but you received "Request timeout" responses. What is the cause of this issue? The outbound rules of the test lab computer blocks File and Printer Sharing ICMPv4-out port. File and Printer Sharing is not bound to the Microsoft KM-TEST Loopback Adapter. The inbound rules of the test lab computer blocks File and Printer Sharing ICMPv4-in port. The Microsoft KM-Test Loopback Adapter is not a real network interface card. The Microsoft KM-TEST Loopback Adapter is at the bottom of the network bindings list of the test lab computer.

The Microsoft KM-Test Loopback Adapter is not a real network interface card.

The number expressed after the two letters in the name of a D-sub miniature connector indicates which characteristic?

The number of pins or sockets

When troubleshooting a lost Bluetooth connection between a smartphone a portable speaker, a user reports that the connection was working, but when they went to another room in the house with their smartphone the connection was lost. What is the most likely cause of the dropped connection?

The user roamed too far from the speaker

Overview of Inkjet Printers

Thermal bubble vs. piezoelectric Components Print head Ink cartridges Stepper motor Belt Stabilizer bar

Which characteristics of a port replicator would typically be considered as advantageous as compared to a docking station?

They are more universal They are lighter and more portable They can convert connection types

TFT

Thin Film Transistor

Multiple pages feeding

Thin paper Damp paper Fan pages and reload Pickups and rollers

Determine the Possible Effects of change

Things don't always go as planned Have a backup plan

Triple Channel RAM

Three separate 64-bit buses If three chips, each has own channel if six chips, they operate in pairs Chips vs. slots Consider leaving one channel empty

General Preventative Maintenance

Tools to have on hand Cleaning and inspection Guide checks Belt tension adjustments Nozzle maintenance and replacement Calibration

Replacing Laptop Memory

Torn off laptop and disconnect power Remove memory compartment door Insert memory into slot Press down until memory clicks into place Replace memory compartment door

Which phenomenon is used by light waves within Fiber Optic cables to travel from one point to another? Reflection Guided Light Flow Total Internal Reflection Refraction

Total Internal Reflection Total Internal Reflection causes the light waves to travel from one point to another within the glass core of fiber optic cables. The refraction index of the cladding is lower as compared to that of the core to achieve the phenomenon of total internal reflection.

Cable internet

Traditionally uses coaxial cable 20 Mbps - 1 Gbps download speeds 5-100 Mbps upload speeds Combined with TV services

Load Balancers

Traffic distribution increase capacity Improve application reliability

Overview of Serial Peripheral Cables

Transfer of data between devices Serial communication protocol Transmits data one bit at a time Primarily used For lower bandwidth devices Over longer distances Communication standards Varying transmission properties

TTL

Transistor translator logic

TCP

Transmission Control Protocol

TCP

Transmission control protocol

Tray Settings

Tray mode settings Tray availability Settings Tray priority settings Other tray settings

TFTP

Trivial file transfer protocol

Subscriber Connector Characteristics

Trouble-free, inexpensive, robust, precise

TPM

Trusted Platform Module

VLAN trucking

Tunneled VLAN 802.1Q standard VLAN tagging Native VLAN

Replacing a Wireless Card

Turn off laptop Remove battery Remove wireless card computer component door Remove screws and adaptor

Double Data Rate 3 (DDR3)

Twice the speed of DDR2 240-pin DIMM or 204-pin SODIMM Incompatible with previous generations Bus clock speed between 400 and 1066 MHz Cycles four times per bus cycle Transfers data twice per clock cycle Bandwidth between 6400 and 17066 MB/s

F Connectors Types

Twist-on Crimp-on Compression

TN

Twisted nematic

Dual Channel RAM

Two dedicated 64-bit buses If two physical chips, each has own channel If four chips, they operate pins

IP conflicts

Two devices using same IP address No connection for at least one device

USB Standard types

Type A - Computer interface Type B - device interface Most commonly found in printers/scanners/multi-function

USB Micro

Types Micro A Micro B Physically smaller connectors than Mini Most commonly found in newer mobile devices (cellphones, GPS, or PDA)

USB Mini

Types Mini A Mini B Physically smaller connectors Most commonly found in cameras or smaller devices where space is limited

Iris scanners

Typically an external device Computer scans user's eye to grant or deny access

Cable Considerations

USB 2.0 or USB 3.0

USB to Ethernet Mobile Use Cases

USB Ethernet adapters can be used on mobile devices as well Different devices have different requirements

Common Flash Devices

USB flash drives CompactFlash Secure digital (SD) card MiniSD and MicroSD card xD-Picture card

Synchronization Connections

USB wired connections 802.11 Wireless connections Bluetooth

Data Rates and installation

UTP Easier to install as cables are Flexible Smaller Lighter Slower data rates STP Installation of cables can be more challenging compared to UTP Provides higher data rates

Cable Comparison

UTP vs. STP Both are cables with wires that are twisted together Shielded twisted pair uses a foil or mesh shield to reduce noise and crosstalk Also requires the use of an electrical ground

Direct Burial STP

Underground installations Direct burial rated shielded cabling is ideal for outdoor implementations or installs directly in the ground With or without the use of conduit

UEFI

Unified Extensible Firmware Interface Safer to update

UTM

Unified Threat Management

Driver Considerations

Unique to printer model Ensure up-to-date driver Operating system compatibility

Syslog compatibility

Unix/Linux Mac OS Windows (non-native)

UTP

Unshielded Twisted Pair

Twisted Pair Cabling

Unshielded Twisted Pair (UTP) Shielded Twisted Pair (STP)

Thunderbolt Connectivity

Up to 40 Gbps data throughput Bidirectional Can transmit and receive data at the same time

Troubleshooting Quality

Update drivers Use high-resolution source files Align print heads Lower print speed Environmental considerations Handling supplies Perform regular maintenance

Troubleshooting queue problems

Use GUI print interface Restart spooler service Power cycle printer Check memory Cancel print jobs

Which of the following are antistatic protection measures that you could implement? [Choose all that apply] Use an antistatic bag Use an ESD strap Use an electronic vacuum Use an ESD mat

Use an antistatic bag Use an ESD strap Use an electronic vacuum Use an ESD mat

External Symptom-based Research

Use external sources to capture information Vendor knowledge base Third-party knowledge base Internet search Industry or academic literature

How location information is used

Used by device's operating system and apps. Checking into a location Logging of real-time movement Mapping services Determine correct date and time

What is TCP used for?

Used for large transfers Zone Transfers Synchronizing

Integrated Drive Electronics (IDE)

Used for storage devices Connections made to motherboard IDE ribbon cable Three connection points Two device connections Types of IDE cables 34 pin (Floppy disk drive) 40-pin (hard disk drive)

Mobile Device Management (MDM)

Used in businesses. Optimize the functionality and security of mobile devices. Protect the corporate network

Plenum Cabling

Used in plenum spaces Fire hazard Fire-retardant plastic Low smoke polyvinyl chloride and fluorinated ethylene Less flexible

Punch Down Block

Used to connect one set of wires to another set of wires

Tone Generator

Used to identify end points or cable runs Allows a tone to be placed on one end of the cable The tone is used to locate the other end of the cable

What is CDMA Cellular Connectivity

Used to provide multiple devices simultaneous access. This is a form of multiplexing. Each device is assigned a code. Allows numerous signals on a single transmission channel

What is UDP used for?

Used to return smaller amounts of data A records Canonical names (CNAMEs)

Probe

Used to trace the tone Once the cable has been identified, it will play a tone Each cable end must be probed individually Also used to identify continuity in a cable

HTML5 VPN

Used with compliant web browsers No need to install a VPN application Comprehensive support for APIs

UDP

User Datagram Protocol

UPD

User Datagram Protocol Speeds up communication Delivedry and order is not

Common Protocols

User Datagram Protocol (UDP), Transmission Control Protocol (TCP), Internet Control Message Protocol (ICMP)

Basic User Authentication

User name and password RFID card tap

Global Positioning System (GPS)

Uses Radio navigation system. Geolocation satellites. Incoming data. Location and time

Touchscreen displays

Uses a finger and stylus as a input

GUI

Uses a graphical user interface

Subscriber Connector (SC)

Uses a push-pull latching mechanism Bidirectional communication requires: Two fiber cables Two SC connectors

ECC Error Correction

Uses parity For every 8 bits written, 9th parity bit stored For each byte, total of 1s are summed up Value of parity bit compared to data It parity bit matches bit count, data assumed to be correct Error correcting memory will attempt repair Less common in modern systems ECC memory considered reliable Modern technology negates need Limited to single bit errors in a byte

Wireless Internet Service Provider (WISP)

Uses wireless technology to provide internet service Also referred to as long-range wireless network Relatively inexpensive wat to provide internet to certain communities

Mobile Device Synchronization

Using multiple devices Access anytime and anywhere Access different types of data

Cable Modem

Utilizes coaxial cables Medium allows for high frequencies Faster than DSL

Fiber Optics

Utilizes light to send data Multiple wirelengths can be used to increase throughput Cables made of ultra-fine glass or plastic fibers More expensive then cooper cable

Virtual Machine Requirements

VMs still perform like independent computers They require the same resources Determine requirements for each VM Physical host requires resources too

DHCP Scopes

Valid range of IP addresses Configured on DHCP server Configure scope to allow or deny

Benefits of a Test page

Verifies printer function Verifies connectivity

Basic Cable TEsters

Verify conductive path Verify correct wiring of connectors

Dealing with IP Conflicts

Verify manual vs dynamic configuration Use ping Neighboring devices, default gateway

VA

Vertical alignment

F Connectors

Very common connection for video distribution

BIOS Limitations

Very old (1980s) Not compatible with large modern hard drives or large amount of memory Runs in 16-bit CPU mode Only 1 MB of execution space

DVI to VGA

Video scenarios Note the gender of each connector Backward compatibility Analog VGA signals

VLAN

Virtual Local Area Network

Which of the following is a secure connection with encryption and authentication that encapsulates packets and creates tunnels? Virtual Private Network SSH VNC OpenSSH

Virtual Private Network Virtual Private Networks (VPNs) are used to keep information private over unsecure networks. VPNs can be used to connect remote users to their offices, secure shopping and banking data, use public Wi-Fi, or maintain anonymity while browsing the Internet. The data remains hidden using encapsulation, tunneling and encryption. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated. Secure Shell, or SSH, is a command-line interface that allows you to connect to a remote computer in a secure manner. OpenSSH is an open-source connection tool for creating SSH connections.

VDI

Virtual desktop infrastructure

Low-Level resources

Virtual machines Virtual networks Virtual appliances

Key features of Virtual desktops

Virtualization software Multiple desktop Virtual desktop infrastructure (VDI) Desktop-as-a-Service (DaaS) Remote connectivity client

.vbs

Visual Basic

Network Connection

VoIP requires additional bandwidth Can be an issue if voice and data used on some network Modify network settings

VoLP

Voice over internet protocol

Which method of biometric security is typically considered to be the easiest to circumvent?

Voice recognition

What does W in RJ11W indicate? Width Wall Wavelength Wire

Wall RJ11W represents a wall mount female jack for the RJ11 connector.

Water-based Microprocessor Coolers

Water reservoir Water pump Condenser call radiator

Cold Cathode Fluorescent Light (CCFL) disadvantages

Weighs more Uses more power Inverter for every CCFL Ambient temperature

Micro-B plug

What is this

Mini-8 Plug

What is this

Standard-A plug

What is this

Standard-B Plug

What is this

USB 3.0 micro-B plug

What is this

USB 3.0 standard-B plug

What is this

DVI to HDMI use cases

When a PC only has DVI out but the monitor only has HDMI

802.11ax

Wi-Fi 6 Bandwidth up to 10 Gpbs Dual-band wireless 2.4/5 Ghz

Troubleshooting Interference

Wi-Fi channel/frequency Trial and error Wi-Fi scanning tools Mesh networks and extenders

WAN

Wide Area Networks

WAN

Wide area network

Which Control Panel utility manages inbound and outbound traffic based upon a defined set of rules? Windows Defender Firewall Device Manager Administrative Tools Programs and Features

Windows Defender Firewall

WISP

Wireless Internet Service Provider

WLAN

Wireless Local Area Network

WMN

Wireless Mesh Network Technology

Types of Wireless Networking Hardware

Wireless access point Extender Repeater

Wireless Local Area Network (WLAN)

Wireless connectivity for devices Uses high frequency radio waves Generally includes internet access point Allows user mobility

Bluetooth

Wireless data transmission standard. Used for short distances. Wireless Personal Area Network (PAN). Connects different devices. Automatic connection and disconnection

802.11n

Wireless n Multiple signals and antennas Better range Backward compatible with 802.11b/g

Using a Performance Monitoring Application

Works well for memory usage Not Ideal for CPU and I/O usage Can assist with VM planning Doesn't capture host data when running in the VM Measurements can be skewed

Subnet mask

Works with IP address Determines network size SOHO default configuration 255.255.255.0

Lightning Functionality

Works with many other newer Apple devices Magic mouse/keyboard/trackpad/pencil Airpod charging Beats headphones/speakers

Intel Corporation

World's largest processor manufacturer Inventor of x86 series of CPU

Wi-Fi Antennas in laptops

Wrapped around laptop display More durable

ZIF

Zero insertion force

A Domain is

a collection of users, computers, and other items that are controlled by the Active Directory administrators. They are grouped together regardless of their physical position.

Cryptographic Group members

are authorized to perform cryptographic operations.

Power Users

are included for backward compatibility and possess limited administrative powers.

Distribution Groups

are only meant for communication purposes. These are email lists that allow for communication with the users in the active directory. Distribution Groups can't affect policy.

Security groups

are the types of groups that allow administrators to apply rights and permissions, control access to shares, and apply overall controls to the system.

You work for a company that provides the same smartphone model for dozens of its employees. While troubleshooting one smartphone that won't connect to the cellular network, you call the provider's tech support number for some assistance. The technician asks for the device's IMEI. What is she trying to determine? A. The IP address of the phone on the cellular provider's data network B. The OS version on the phone C. The specific device you're calling about D. The SIM card installed in the device

c The IMEI identifies a device. It does not identify the OS version, the SIM card, or the IP address of the phone.

Antennas

can be In-screen Multiple types

A Tree is a

collection of Domains that have formed a trust relationship with each other.

Common Symptoms for drivers and RAID array

drive not recognized Slow HDD performance Operating system not found Crash screens RAID not found S.M.A.R.T.

DIMMs

dual in-line memory modules

802.11g

emerged in 2002 Draws from 802.22a and 802.11b Bandwidth up to 54 Mbps 2.4 Ghz frequency Backward compatible with 802.11b

Fiber Optic

fast and reliable 25 Mbps to 1-5 Gbps download speeds 5-880 Mbps upload speeds Can be combined with both TV and phone Servies

HSF

heat sink and fan

Automobile Synchronization with Bluetooth

iOS CarPlay and Android Auto

SSD Form Factors

mSATA M.2

Organizational Units are a

necessary component of Active Directory's operation. Users, groups, and other group policy objects are stored in Organizational Units.

Legacy systems

old outdated, unsupported systems Networks can be a mix of old and new hardware/software Expensive to maintain Run proprietary software May require specialized programming Specific purpose Does what it's supposed to Security

PLS

plane to line switching

What is the key drawback of STP or per VLAN STP - PVST? Complicated configuration Fast convergence Slow convergence They do not have any drawbacks and are mostly used today They cannot provide loop free environment link RSTP or RPSTP

slow convergence STP and PVST do provide loop-free environments and are still used on older equipment. But they are considered legacy STP because of slow convergence. The port will go through a listening and a learning state (30 seconds and more), thus causing slow convergence.

Modems

stands for modulation and demodulation Transmit digital signals over an analog medium Are used by computers to send and receive data

Task Scheduler is a program

that allows you to create and manage tasks that your computer will perform automatically at the times you specify. Predefined tasks are saved in Task Scheduler Library folders. Alternatively, users can create custom tasks as well.

A key component to using the GSM on your device is

the SIMs card

The Forest is at

the top level in the active directory structure. Forests are separate from one another. They each have their own boundaries for security and have a single database and global address for each.

Task Manager is a

tool that allows users to stop processes, get system information, and adjust logon applications and services.

Logon scripts can be

used for several purposes, such as including the mapping of network drives to users and computers, installing applications, setting up printers, creating log files, and many other tasks. Once the script is written, it will need to be saved in a batch file. The batch file is used to automate a process. When the user signs in, any logon scripts will be executed.

DA-15 connector

8-7 pin layout and the key users for this type of connector are for gaming controllers

Which of the following can be enabled when the user signs in? It helps administrators with automating tasks, connecting shares and other useful processes. A. Logon Script B. Task Scheduler C. Task Manager D. BIOS

A

How to enable Bluetooth

Access setting on a mobile device Apple devices Android devices Enabling Bluetooth on a laptop. Allow Bluetooth devices to find computer.

As an IT technician, you arrive at a customer's home office to troubleshoot problems they are experiencing with their printer. While questioning the customer to get an understanding of their network, you find they have a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. They also have several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with? A. WAN B. LAN C.WMN D. PAN

B A LAN can have a variety of several devices, but it is always limited to a single router that creates the boundary for the network. A single router indicates a LAN.

BIOS is the

Basic input/ output system and is essential for starting the computer once it's powered on.

Preferred Roaming Lists (PRL) Updates

Changes to provider network configuration. Connecting to the right tower. Updating over-the-air

Which mobile security feature ensures that the device will not be vulnerable to attacks? A.Encryption B. Location C. Lock Screen D. Security Update

D

Which one of the following Screen lock options is not secure? A. Pattern B. PIN C. Password D. Swipe

D

DIMM

Dual in-line memory module

What do GSM Networks allow cellular phones to do

Enable voice calls and transfer data

GPT

GUID Partition Table

GSM Communication is a network of what

Gateways, Repeaters, Relays and all mobile devices comment to cell towers.

GPS

Global Positioning System

.ps1

Powershell

PRL

Preferred Roaming List Updates

Lightning cable

Proprietary to apple products. Introduced in 2012. Used for power and data

Corporate-Owned, Personally Enabled (COPE)

The organization provides the mobile device to the user. However, as a user, you are only allowed to install pre-approved apps.

Corporate-Owned, Business Only (COBO)

The organization provides, controls, and manages the devices. The applications and the data belong to the organization.

DC-37 Connector

used in aerospace industrial, defense, and healthcare

.bat extension is

used to create a Windows batch file.


Ensembles d'études connexes

Med surg Ch 29 Assessment of Hematologic System, Chapter 32: Assessment of Hematologic Function

View Set

Management & Organization Final Review

View Set

Chapter 9 - Nontaxable Exchanges

View Set

Chapter 2, Strategy and Human Resources Planning

View Set

1 Angelina and Vasily - good expressions

View Set