Comptia a + study guide for the practice tests

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

chkdsk (the command-line version of the tool)

Error checking tool is also called Check disk

ECC

Error correction code (ECC) RAM is an improvement over parity, detecting as well as correcting errors.

Tier 3

Even more regional networks

Every computer on a single LAN must have the same network ID and a unique host ID.

Every computer on the network must have a unique IP address. An IP conflict: Two computers have the same IP address; they won't be able to talk to each other; and other computers won't know where to send data. You can never have an IP address that ends with a 0 or a 255.

What are programs stored on ROM chips called?

Firmware

One of the most common uses of TPMs is _______________

Hard Disk Encryption

Winload.exe loads:

Hardware abstraction layer The system Registry Drivers for any boot devices into memory before the operating system itself takes over

Spoofing

Process of pretending to be someone or something you are not Packets containing false information

USB 3.0 Ports on motherboard a what color?

Red

UAC

User Account Control

RAID 10 (Nested, Striped Mirrors)

"Stripe of mirrors" 1 pair of mirrored disks, and another pair mirrors the first pair

What is the maximum data transfer speed that USB 3.0 can handle?

5GBPS

Lumens

A lumen is the amount of light provided by a light source. Higher lumens equates to a brighter picture.

Non-Volatile Memory Express (NVMe)

A modern SSDs technology that allows for very fast data transfer directly to the PCIe bus on the computer. reduces latency

MIDI (Musical Instrument Digital Interface)

A set of standards that are used to represent music in digital form. A MIDI port is a 5-pin DIN port that looks like a keyboard port, only larger.

ifconfig

A TCP/IP configuration and management utility used with UNIX and Linux systems.Used to change network connection settings

Windows supports four different file systems:

FAT (often called FAT16) FAT32 NTFS exFAT/FAT64 (for removable media)

File transfer protocol (FTP), using ports 20 and 21, is a great way to share files between systems.

FTP server software exists for most operating systems. To access an FTP site, you must use an FTP client such as FileZilla. FTP requires logon.A Web browser will assume you want to log on as "anonymous," which works fine for public FTP sites.User name and password are sent in clear text

Refresh rate

For an LCD monitor, this refers to how often a screen can change or update completely. The standard for the industry is 60 Hz.

Broadcast domain

Group of computers are connected by one or more switches.All nodes receive broadcasts from all other nodes.

Local area network (LAN)

Group of computers are located physically close to one another.Located in a single room, floor, or buildingAble to hear each other when one sends a broadcast

Brute force

Guess the contents of some kind of data field that isn't obvious (or is hidden) Example: dictionary attack

802.11g

Introduced in 2003 Offers transfer speeds of 802.11a with the wider range of 802.11b Runs in 2.4-GHz ISM band

Single-mode fiber optic cable

It can be used with laser light to achieve high transfer rates over long distances. Currently, it is rarely used except for long-distance links.

Which ATA revision introduced Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.)?

ATA-3

ATX12V 1.3

ATX12V 1.3First widespread update to ATX PSIntroduced a 4-pin motherboard power connector, called the P4 power connectorAlso introduced the AUX connector

ATX12V 2.0

ATX12V 2.024-pin connector that is backward compatible with older 20-pin connectorRequires two 12-V rails for any power supply rated higher than 230Rails should not draw power from each otherA dedicated 6-pin or 8-pin PCIe power connector on higher-end cards

Authorization

After a user authenticates, NTFS file system defines specific resources the user may access

Network interface controller (NIC)

An internal piece of hardware that allows a device to connect to a network. Needed by both clients and servers Defines or labels the machine on the network Breaks files into smaller units to send across network and reassembles them

Disk quotas

An option on NTFS volumes that enables administrators to limit how much disk space a user can occupy with his or her files.

Phishing

Attempts to obtain usernames and passwords Typically performed through e-mailAttacker poses as a legitimate company and asks for your login credentials. Spear phishing: a targeted attack

CompTIA A+ 220-1002 exam objectives define two areas for you to consider for scheduled maintenance:

Backups Disk maintenance

Which file is the Windows Boot Manager?

Bootmgr

Patch panel

Box with female connectors (ports) in front and permanent connections in the back Horizontal cables connect in back.

There are two different types of executable files:

Built-in Executables

A brand new system failing due to manufacturing defects is often called a(n) _______________ failure.

Burn in

By default, TCP/IP is configured to receive an IP address automatically from a DHCP server on the network (and automatically assign a corresponding subnet mask).CompTIA A+ expects you to know how to do this manually.

By default, TCP/IP is configured to receive an IP address automatically from a DHCP server on the network (and automatically assign a corresponding subnet mask).CompTIA A+ expects you to know how to do this manually.

A chipset

It serves as the electronic interface through which the CPU, RAM, and I/O devices interact. Chipsets were originally comprised of two primary chips:The Northbridge and the Southbridge

CAT Levels

CAT1, CAT3, CAT5, CAT5e, CAT6, CAT6aUTP cables come in categories that define the maximum speed at which data can be transferred (bandwidth). CAT 1Standard telephone line CAT 3Designed for 10-Mbps networks; a variant that used all four pairs of wires supported 100-Mbps speeds ;CAT 5Designed for 100-Mbps networksCAT 5eEnhanced to handle 1000-Mbps networksCAT 6Supports 1000-Mbps networks at 100-meter segments; 10-Gbps networks up to 55-meter segmentsCAT 6a Supports 10-Gbps networks at 100-meter segmentsCAT 6e A nonstandard term used by a few manufacturers for CAT 6 or CAT 6aCAT 7Supports 10-Gbps networks at 100-meter segments; shielding for individual wire pairs reduces crosstalk and noise problems. CAT 7 is not a TIA/EIA standard

DVD-ROM is the DVD-equivalent of the standard _______________ data format.

CD-ROM

Common errors with lost CMOS:

CMOS configuration mismatch CMOS date/time not set BIOS time and settings reset No boot device available CMOS battery state low

PCs and Macs originally used a_________ monitor

CRT

Data is moved from one PC to another in discrete chunks called frames. All NICs have a built-in identifier, a binary address unique to that single network card.

Called a media access control (MAC) addressThe MAC address is 48 bits long, providing more than 281 trillion MAC addresses.MAC addresses are binary, but we represent them by using 12 hexadecimal characters.MAC addresses are burned into every NIC.Some NIC makers print the MAC address on the card.

Which tool enables you to copy any Unicode character into the Clipboard and paste into your document?

Character MAP

IPv6 addresses are written like this:2001:0000:0000:3210:0800:200C:00CF:1234

Colon is a separator between groups.Each group is a hexadecimal number between 0000 and FFFF called (unofficially) a field or hextet.A complete IPv6 address always has eight groups. IPv6 still uses subnets.IPv6 uses the "/x" Classless Inter-Domain Routing (CIDR) nomenclature.The /x refers to the number of bits in the subnet mask.

hybrid hard drives.

Combine flash memory and spinning platters Fast boot times Add 20-30 more minutes of battery life for portable computers

apt-get

Command line tool for advanced packaging tool (APT) used on Linux Ubuntu and Mint Used for fetching and installing single applications Can also manage all software on the system Need to know the name of the package you want to install

Worm

Does not need to attach to other programs to replicate

DDR SDRAM

Double Data Rate SDRAM is memory that transfers data twice as fast as SDRAM. DDR SDRAM increases performance by transferring data twice per clock cycle.

Commercial licensing

End User License Agreement (EULA) stipulates requirements of the copyright holder. Digital rights management (DRM) enforces how commercial software is used.

Service set identifier (SSID) parameter

Configuring a unique SSID (or network name) and password is one security measure.Older default names and passwords are widely known and available online. Each wireless network node and access point needs to have the same unique SSID. Turning off SSID broadcasting makes it harder for unauthorized people to determine your SSID.

Contrast ratio

Contrast ratio is the difference between lightest and darkest spots that the monitor can display. Dynamic contrast ratio measures the difference between a full-on, all-white screen, and a full-off, all-black screen.

How do permissions change when files or folders are moved or copied? Four situations

Copying data within one NTFS-based volume Moving data within one NTFS-based volume Copying data between two NTFS-based volumes Moving data between two NTFS-based volumes

Some motherboards that support _______________ also support features called triple-channel architecture or quad-channel architecture, which work much like dual-channel, but with three or four sticks of RAM instead of two.

DDR3

Which are DDR3 I/O speeds related to clock speeds?

DDR3 I/O speeds are quadruple the clock speeds.

Radio Power Adjustment

Decrease power until you get reception inside but not outside the target network space

vi

Default text editor Editor is always in either insert mode or command mode

802.11 wireless Ethernet standard (Wi-Fi)

Defines methods devices may use to communicate via spread-spectrum radio waves Broadcasts in small, discrete chunks over available frequencies within certain range Uses one of two radio bands: 2.4 GHz and 5 GHz Extended to 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac variations

HKEY_CLASSES_ROOT

Defines the standard class objects used by Windows (i.e., file types and associations)

SLP

Devices use the Service Location Protocol (SLP) to advertise available services over a local network and to discover those services. You will see this most commonly with network-aware print devices, although some OSs use SLP with file shares as well.

Computers commonly connect to an ISP by using one of eight technologies that fit into four categories:

Dial-upAnalog and ISDN DedicatedDSL, cable, and fiber WirelessWi-Fi and cellular Satellite

LGA

Land Grid Array. A chip interface standard that places the pins on the circuit board instead of on the chip packaging. The pins do not insert into sockets. The chip has an array of lands or flat conductive pads that interface with the pins by surface contact only.

Because both CD-R and CD-RW drives require a powerful _______________, making a drive that could burn CD-Rs and CD-RWs became a simple process, and plain CD-R drives disappeared almost overnight.

Laser

Three methods used to secure access to the network:

MAC address filtering Authentication Data encryption

Contents of a frame

MAC address of the network card to which the data is being sent MAC address of the network card that sent the data The data itselfSize varies depending on the type of frame. A data check to verify that the data was received in good orderMost use a cyclic redundancy check (CRC).

DDR4

Memory that is faster and uses less power than DDR3.Runs at only 1.2 volts Uses 288-pin DIMM

New Technology File System (NTFS)

Microsoft's default file system. NTFS was introduced with Windows NT. The file system of choice today Major improvements/refinements include: Redundancy, Security, Compression, Encryption, Disk quotes, Cluster sizing

Automatic Private IP Addressing (APIPA)

Modern operating systems support a feature called Automatic Private IP Addressing (APIPA) that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically.The Internet Assigned Numbers Authority has set aside the range of addresses from 169.254.0.1 to 169.254.255.254 for this purpose.

regsvr32 command

Modifies the Registry in only one way—adding (or registering) dynamic link library (DLL) files as command components

A(n) _______________ enables you to use your existing folders to store more data that can fit on a single drive or partition/volume

Mount Point

Botnet

Network of infected computers (zombies) under the control of a single person or group Common use: sending spam

Ribbon( Impact Printer)

OBJ-3.11: An impact printer operates the same way as an old fashioned typewriter. It uses a film-like ribbon that sits inside between the paper and print head. The ribbon is impacted by a series of mechanical dots in the print head, and this transfers the ink from the ribbon to the paper to form the desired image or text.

Crossover Cable

OBJ-3.1: A crossover cable should be used to connected two similar devices (PC to PC, Router to Router, Switch to Switch, etc.) to create a network. For an ethernet cable, this should be a network cable with a T568A wiring standard on one end and a T568B wiring standard on the other end of the cable to create a crossover cable.

STP Cable

OBJ-3.1: A shielded twisted pair (STP) cable contains a shielded sheathing in the cable that can stop or prevent crosstalk. Cables are often clustered together with a high amount of data passing through from one device to another, causing EMI (electromagnetic interference). EMI causes signal interference and errors in the transfer of data, known as crosstalk.

Successful completion of the POST

One or two short beeps

Types of cloud networks include:

Public Private Community Hybrid

Ways that display adapters connect to a motherboard

PCI AGP PCIe Motherboard with display adapter built-in

What is the latest, fastest, and most popular expansion bus in use today?

PCLe

The _______________ program checks out the system every time the computer boots.

POST

Legacy ports

PS/2, RS-232 serial, and parallel

PCI

Peripheral Component Interconnect

open source software

Permits modifications to the original code

Quality of service (QoS)

Quality of service (QoS) enables busy networks to prioritize traffic. Support for QoS tagging (or priority) should be enabled by default on most network adapters.

Currently, only two types of RJ connectors are used for networking.

RJ-11 connects a telephone to a telephone jack in the wall of your house. RJ-45 is the standard for UTP connectors, has connections for up to four pairs, and is visibly much wider than RJ-11.

Most desktop motherboards come with one _______________ jack for attaching a network cable.

RJ-45

chkdsk (/f /r)

Runs the command-line version of error-checking Can use with switches/f switch attempts to fix file system errors/r switch attempts to locate and repair bad sectors Needs access to a drive to run successfully

More info in SATA

SATA improvements over PATAPoint-to-point connections between the SATA device and the host bus adapter (HBA)Narrower cablesMaximum cable length 1 meterHot-swappableNo drive limitTheoretically 30 times faster than PATA1.5Gbps, 3Gbps, and 6Gbps Ties capable drives directly into the PCI Express bus on motherboards Lack of overhead enhances speed of throughput Requires motherboard with SATAe support to take advantage of superfast speeds

APM and ACPI require:

SMM-capable CPU APM-compliant BIOS (so CPU can shut off peripherals) Devices that will accept being shut off ("Energy Star") A system OS that knows how to request the shutdown of a particular device

What kind of RAM comprises cache?

SRAM (Static RAM)

Parallel (PATA)

Send data in parallel on a 40- or 80-wire ribbon cable

Serial ATA (SATA)

Send data in serial on one wire

What can be typed in the Windows Search to open the Services Control Panel applet?

Services. MSc

PXE

Some BIOS have feature for preboot execution environment

Domain Name Service (DNS)

Special computers, called Domain Name Service (DNS) servers, keep databases of IP addresses and their corresponding names. The Internet has regulated domain names.

110 block

Special type of connector used on the most common type of patch panel UTP connects using a punchdown tool.

Mini PCI

Specialized form of PCI designed for use in laptops.

Two essential devices that handle spikes and sags in the AC supply:

Surge suppressor Uninterruptible power supply (UPC)

Virtual memory is a portion of an HDD or SSD set aside as a page file or _______________ file.

Swap File

Different types of RAM

Synchronous DRAM (SDRAM) Rambus DRAM (RDRAM) Double data rate SDRAM (DDR SDRAM) DDR2 and DDR3 DDR3L/DDR37 DDR4

In macOS, what launch point provides access to almost all the settings needed to administer a macOS system?

System Preferences

Where is POST located?

System ROM

HKEY_LOCAL_MACHINE

System's non-user-specific configurations

TPM

TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop). ... Trusted modules can be used in computing devices other than PCs, such as mobile phones or network equipment.

Table 18.2 UTP Cabling Color Chart Pin T568A T568BPinT568a T568b 1 White/Green White/Orange 5 White/Blue White/Blue2 Green Orange6 Orange Green3 White/Orange White/Green7White/Brown White/Brown4 Blue Blue8 Brown Brown

Table 18.2 UTP Cabling Color Chart Pin T568A T568BPinT568a T568b 1 White/Green White/Orange 5 White/Blue White/Blue2 Green Orange6 Orange Green3 White/Orange White/Green7White/Brown White/Brown4 Blue Blue8 Brown Brown

PSU

Takes AC power and transforms into electricity to power the PC. Falls in the category of a field replaceable unit (FRU)

Thunderbolt port

Tap into the PCI Express bus for up to 6 external peripherals Provide amazing bandwidthThunderbolt 1 runs full duplex at 10Gbps.Thunderbolt 2 aggregates internal data channels, enabling throughput at up to 20Gpbs.Thunderbolt 3 offers throughput at up to 40Gbps

What is the one-stop place for anything you need to do with applications, processes, or services?

Task Manager

In Windows 7, what is another name for the notification area that shows programs running in the background?

Taskbar

LDAP

The Lightweight Directory Access Protocol (LDAP) enables operating systems and applications to access distributed directories. Windows uses LDAP to work with Active Directory.

NIST

The National Institute of Standards and Technologies

msconfig

Techs use the System Configuration utility (also known by its executable name, msconfig) in Windows 7 to edit and troubleshoot operating system and program startup processes and services.

SDRAM

The _________ exchanges data with the processor synchronized to an external clock signal and running at the full speed of the processor/memory bus without imposing wait states. a. DDR-DRAM b. SDRAM(correct)Synchronized with the system clock Came on a stick called a dual inline memory module (DIMM) Came in a wide variety of pin sizes with early DIMMs168-pin version common on desktopsLaptop DIMMs in 68-pin, 144-pin, or 172-pin micro-DIMM packagesSmall-outline DIMM (SO-DIMM) of 72 pins, 144 pins, or 200 pins also for laptops c. CDRAM d. none of the above

Half-duplex means

The cable can send and receive data, but only one at a time.

cd command

The cd command brings focus to a different directory

802.11b

The first standard to be widely adopted Actual throughput of 4 to 6 Mbps on average Maximum range of 300 ft under ideal conditions Subject to interference from other devices

IPv6 subnets function like IPv4 subnets. Two new rules apply:

The last 64 bits of an IPv6 address are generated randomly or using the MAC address, leaving a maximum of 64 bits for the network ID.Therefore, no subnet is ever longer than /64. The IANA passes out /32 subnets to big ISPs.ISPs and others may pass out /48 and /64 subnets to end users. The vast majority of IPv6 subnets are between /48 and /64.

Each host connects to a central box called a switch.

The layout is called star bus topology. PCs connect via special ports on switch.

md or mkdir command

The md (or mkdir) command is used to create a directory.Example: md files will make a new directory named files.Use dir or ls to see the newly-made directory. Remember that Linux is case sensitiv

Parts of an IP address include:

The network ID portion identifies the network. The host ID, or host part identifies the local computer on the network.

nslookup command enables you to

The nslookup command enables you to determine exactly what information the DNS server is giving you about a specific host name.Type nslookup from the command prompt and press the ENTER key.

Horizontal cabling

Traverses more or less horizontally from work area to the telecommunications room Cat 5e or better UTP in most networks

Compare the subnet mask to the IP addressAny part that's all 255s is the network ID Any part that's all zeros is the host ID

The result:Network ID is 192.168.4Host ID is 33

Ultrabooks

These portable computers are thin, light, and powerful. Intel has defined maximum dimensions (20-23mm thick) and minimum battery life (6 hours of HD video playback).

QWORD value

These values are like Binary values but are limited to exactly 64 bits.

TFT

Thin film transistor (TFT) or active matrix technology is used in current LCD monitors.Uses one or more tiny transistors to control each color dot.The most common TFT displays use a technology called twisted nematic (TN).Better TFT displays use a technology called In-Plane Switching (IPS) to create a wider viewing angle and far better color re-creation than TN panels can provide.

Yagi antennas

This antennas is typically used to extend the range of outdoor hotspots in a specific direction, or to reach an outbuilding.

External optical drives often use USB or _______________ connections.

Thunderbolt

Toners

Toner is the generic term for two separate devices that are used together: a tone generator and a tone probe. The tone generator connects to the cable using alligator clips, tiny hooks, or a network jack.It sends an electrical signal along the wire at a certain frequency. The tone probe emits a sound when it is placed near a cable connected to the tone generator.

Volume Shadow Copy Service (VSS)

enables the OS to make backups of any file, even one that is in use. Windows uses VSS for its System Protection feature.Enables you to access previous versions of any data file or folder

As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a _______________.

network attached storage device

DSL providers have developed fiber-to-the-node (FTTN) and fiber-to-the-premises (FTTP) services provide Internet and more.

With FTTN, the fiber connection runs from the provider to a box somewhere in your neighborhood. This box is connected to your home or office using normal coaxial or Ethernet cabling.

Preemtive Multitasking

With preemptive multitasking, the operating system allocates each application a certain amount of processing time and then takes control away from the application forcibly. That way, an application that crashes will not stop the whole system.

Windows and other operating system networks work in one of three categories:

Workgroups Domains Homegroups These three organizations differ in:ControlNumber of machines neededCompatibilitySecurity

expansion bus

a bus on the motherboard used to connect peripheral devices

RAID 10

a combination of RaID 1 and RaID 0 that requires at least four disks to work as an array of drives and provides the best redundancy and performance also the most expensive

String value

any form of data

PATA Connector

also known as an IDE connector for floppy disk drives or legacy drives

Circuit breakers

uses an electromagnet to shut off the circuit when the current gets to high. -needs to be flipped back into place once overloaded. -protects circuits from overheating. are heat sensitive or electromagnetically-operated switches rated for a specific amperage.

Which type of wire carries no voltage?

neutral

Router

router connects LANs into a WAN.Sorts the frames and sends them to the proper LAN

The installation error message "RAID Array Not Detected" could indicate _______________.

the lack of the proper driver for the hard drive

CPU accesses memory via.

the memory controller chip (MCC).

orientation notch

the notch on a cpu that orients the right position to put the cpu on.

Inheritance is

the process of determining default NTFS permissions for newly introduced files or subfolders. The base rule of Windows inheritance:

What is the practical limit for modern CPU clock speeds?

4Ghz

RDRAM

(RDRAM) Mean? Rambus Dynamic Random Access Memory (RDRAM) is a memory subsystem designed to transfer data at faster rates. RDAM is made up of a random access memory (RAM), a RAM controller and a bus path that connect RAM to microprocessors and other PC devices.

ROM

(Read-Only Memory) One of two basic types of memory. ROM contains only permanent information put there by the manufacturer. Information in ROM cannot be altered, nor can the memory be dynamically allocated by the computer or its operator. ROM can be altered with flash ROM ROM is also known as firmware

sfc

(System File Checker)Scans, detects, and restores important Windows system files, folders, and pathsEnter sfc /scannow from a command prompt

Modern Ethernet network speeds:

10BaseT (runs at 10 Mbps) 100BaseT (runs at 100 Mbps) 1000BaseT or Gigabit Internet (runs at 1000 Mbps, or 1 Gbps) All three technologies—10/100/1000BaseT or Ethernet:Use star bus topologyConnect via unshielded twisted pair (UTP) cabling

At what speed does the SATA 1.0 specification perform?

1.5 GBPS

How much RAM can a 64-bit processor theoretically access?

4GB

How many watts of power does a typical hard drive in a PC require?

15

What is the storage capacity of a DVD-18 DVD-ROM?

15.90GB

How many watts of power does an Intel i7-4790K require at peak performance?

151

By default, what is the maximum partition size NTFS supports on a dynamic disk?

16TB

What size DIMM is used by laptop DDR SDRAMs?

200-pin SO-DIMM

What size DIMM is used by laptop DDR4 SDRAMs?

260-pin SO-DIMM

What is Microsoft's minimum system RAM requirement for 64-bit versions of Windows?

2GB

What is the minimum system RAM requirement for the latest versions of macOS?

2GB

MicroATX

30 percent smaller size than standard ATX Features standard ATX connections Fits in standard ATX case or microATX cases

An 8×4×32× CD-RW drive reads at a speed of _______________.

32X

A surge suppressor should have a rating of at least _______________.

330-V

No CPU ever made has fewer than _______________ stages, but advancements in caching have increased the number of stages over the years.

4

What is the minimum number of drives needed to implement RAID 6?

4 min and 32 max

How many wires are in the SATA interface?

7

Which early DIMM form factor applied to laptops?

72-pin SO-DIMM

PCI

800 × 600 with a refresh of 70 Hz at 8 bits (256 colors) requires 33.6 MBps bandwidth. 24 bits (16.7 million colors) requires 100.8 MBps. Not enough bandwidth is available on a shared PCI bus.

802.11a

802.11 standard on the market after 802.11b Operates in the 5-GHz frequency range Devices using 802.11a less prone to interference Throughput greater than 802.11 and 802.11b

What are the usual dimensions of a microATX motherboard?

9.6x9.6

PCIe

A 32 - for 64-bit bus standard capable of transferring data up to 4.26 Gbps in full-duplex transmission. PCI Express was introduced in 2002 and offers several advantages over traditional PCI. Its expansion cards can fit into older PCI slots with some modifications to the motherboard the latest one PCI Express (PCIe) is the latest, fastest, and most popular expansion bus in use today. PCI Express is still PCI. Uses a point-to-point serial connection instead of PCI's shared parallel communication—does not share its bus

DHCP Server

A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients.

iwconfig

A command-line utility for viewing and setting wireless interface parameters on Linux and UNIX workstations.Used to change wireless network settings

Man-in-the-middle (MITM) attack

A hacker placing himself between a client and a host to intercept network traffic; also called session hijacking.

Plasma display panels (PDPs

A popular technology for displaying movies Compete directly with LCD screens for flat-panel spaceOffer a wider viewing angleHigher-quality image than the typical LCDCost less Disadvantages of PDPs as compared to LCDs Weigh a lot more Consume much more electricity

Hidden partition

A primary partition that is hidden from the OS, often used for backup purposes—sometimes called a factory recovery partition

Rails

A single transformer takes the AC current from a wall socket and converts it into DC current split into three primary DC voltage rails:12.0 V, 5.0 V, and 3.3 V

sprite

A sprite is a bitmap graphic moved around on the screen.

DDR2

A version of SDRAM that is faster than DDR and uses less power. 240 pin DIMM

DDR3

A version of SDRAM that is faster than DDR2 memory and that can use triple channels.

AGP

AGP slot is a PCI slot that has a direct connection to the Northbridge. AGP slots are only for video cards. a specialized, video-only version of PCI called the Accelerated Graphics Port (AGP).Addressed slow, substandard graphics

AHCI (Advanced Host Controller Interface)

AHCI unlocks some of the advanced features of SATA, such as hot-swapping and native command queuing. When you plug in a SATA drive to a running Windows computer that does not have AHCI enabled, the drive doesn't appear automatically. In Windows Vista, you need to go to the Control Panel and run the Add New Hardware to make the drive appear, and in Windows 7 and later, you need to run "hdwwiz.exe" from the Start menu Search bar. With AHCI mode enabled, the drive should appear in Computer immediately. You can enable AHCI in the CMOS if you want it enabled. You need to make sure you enable it before you install the OS because if you don't you will get BSOD. There is a way to do it if you have the OS downloaded. Go to Microsoft's website to check it out.

APIPA Address

APIPA stands for Automatic Private IP Addressing (APIPA). It is a feature or characteristic in operating systems (eg. Windows) which enables computers to self-configure an IP address and subnet mask automatically when their DHCP(Dynamic Host Configuration Protocol) server isn't reachable. looks like 169.254.x.x

Wi-Fi Protected Access (WPA)

Acts as an interim security upgrade to WEP Uses the Temporal Key Integrity Protocol (TKIP)Provides a new encryption key for every sent packetProtects WPA from many of the attacks that make WEP vulnerableDeprecated due to flaws of its own Uses encryption key integrity-checking through Extensible Authentication Protocol (EAP)

Solid core versus stranded core

All UTP cables come in one of two types: solid core or stranded core. Each wire in solid core UTP uses a single solid wire. With stranded core, each wire is actually a bundle of tiny wire strands. Each of these cable types has its benefits and downsides. Solid core is a better conductor, but it is stiff and will break if handled too often or too roughly. Stranded core is not as good a conductor, but it will stand up to the handling without breaking. TIA/EIA specifies that horizontal cabling should always be solid core. Remember, this cabling is going into your walls and ceilings, safe from the harmful effects of shoes and vacuum cleaners. The ceilings and walls enable you to take advantage of the better conductivity of solid core without the risk of cable damage. Stranded core is characterized by each wire comprised of a bundle of tiny wire strands.Stands up to handling without breaking

RAID 1

Also called mirroring, this RAID array type provides fault tolerance because all the data is written identically to the two drives in the mirrored set. (2)

Which characteristic of sound refers to its loudness?

Amplitude

Video graphics array (VGA) standard

Analog video signal instead of digital Minimum display requirement typically 640 × 480 pixels and 16 colors

Malware

Any program or code designed to do something undesirable on a system or network

Advanced Technology Attachment (ATA)

Appeared around 1990, virtually monopolizes hard drive market ATA hard drives referred to as Integrated Drive Electronics (IDE) drives

AFP

Apple developed the Apple Filing Protocol (AFP) in the late 1980s to support file sharing between Macintosh computers on early LANs.

Internet Application Protocols (2 of 3) and their ports

Application ProtocolFunction Port Number HTTP Web Pages 80 HTTPS Secure Web Pages 44 FTP File transfer 20, 21 SFTP Secure File transfer 22 IMAP Incoming e-mail 143 POP3 Incoming e-mail 110 SMTP Outgoing e-mail 25 Telnet Terminal emulation 23 SSH Encrypted Terminal emulation 22 RDP Remote Desktop 3389 SIP Voice over IP 5060

How is the Registry organized?

As a tree structure

Zero-day attack

Attack on a vulnerability not already known to the software developers

Session hijacking

Attempt to intercept a valid computer session to get authentication information

Connectors for coaxial cable

BNC connector - uncommon F-type connector - on the back of all cable modems and most televisions

Built-in redundancy

Backbone routers connect to more than one other backbone router. Decentralized and interwoven nature of the Internet Alternative pathways for data if one or more of the routers fail

Wi-Fi Protected Access 2 (WPA2)

Based on the IEEE 802.11i standard Locks down wireless networks Uses Advanced Encryption Standard (AES) Upgrade to WPA2, if not already using it

Windows can create partitions using the _______________ disk.

Basic

Subnet mask distinguishes which part of the IP address identifies the network ID and which part of the address identifies the host.

Blocks out (or masks) the network portion of an IP address Typical subnet mask: 255.255.255.0

To run a program:

Change the prompt focus to the directory where the program is stored.Example: cd C:\Windows\System32

fire extiguisher

Class A Ordinary combustibles such as paper and wood Class B Flammable liquids such as gasoline Class CLive electrical equipment Class D Combustible metals: titanium or magnesium Class K Cooking oils, trans-fats, or fats

What class of fire extinguisher should be used on an electrical fire?

Class C

A named group of functions that defines what you can do with an object is called a ________________.

Class Object

Open Database Connectivity (ODBC)

Coding standard that enables programmers to write databases and the applications that use them Can query ODBC to see how to locate and access a database without any concern about what application or operating system is used

_______________ partitions are designed to support bootable operating systems.

Primary

VDI (Virtual Desktop Infrastructure)

Company provides a "thin client" to the user where the desktop resides on a centralized server.

Three things need to be in place to have network connectivity:

Connected NICThe physical hardware that connects the computer system to the network media Properly configured TCP/IPCorrect TCP/IP settings needed for device on your network Network client

Shielded Twisted Pair (STP

Consists of twisted pairs of wires surrounded by shielding to protect them from electromagnetic interference (EMI) Rare to see; used only in locations with excessive electronic noise such as shop floors

Dynamic Disks

Create dynamic disks from basic disks in Disk Management. Types of volumes include:A simple volume, which acts just like a primary partition.A spanned volume, which extends a partition on a single drive into unallocated space or extends the volume to grab extra space on completely different dynamic disks.

Wi-Fi Protected Setup (WPS)

Created to make it easier for users to configure secure connections Works either by pushing a button or by entering an eight-digit code Cracked easily by hackersShut down WPS to prevent

What type of RAM is used for main system memory?

DRAM (Dynamic RAM)

Adapters and converters

DVI to HDMI Thunderbolt to DVI HDMI to VGA DisplayPort to DVI DisplayPort to HDMI

DEP

Data Execution Prevention

Bluetooth

Designed to create small wireless networks—personal area networks (PANs)—for specific jobs Connecting input devices such as keyboards and mice Upgraded over the years to make it faster and more secure Employs classes that define maximum power usage and maximum distanceClass 1: 100mW and 100 metersClass 2: 2.5 mW and 2 metersClass 3: 1mW and 1 meter

What Windows tool finds additional space on a hard drive?

Disk Cleanup

occurs when the operating system needs to access the page file too frequently.

Disk Trashing

RAID 6 disk striping with extra parity

Disk striping with extra parity. Like RAID 5, but with more parity data. Requires five or more drives, but you can lose up to two drives at once and your data is still protected.

RAID 5 disk striping with distributed parity

Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance. Distributes data and parity information across all drives Fastest way to provide redundancy

Ad-hoc mode (or peer-to-peer mode)

Each wireless node is in direct contact with every other node in a decentralized free-for-all. Two or more wireless nodes communicating in ad hoc mode form an Independent Basic Service Set (IBSS). Ad hoc mode networks are good for:Small groups of computersTemporary networks such as a study groups or business meetings

A Virtual Private Network (VPN) allows you to connect to a private network via the Internet.

Either some software running on a computer or, in some cases, a dedicated box must act as an endpoint for a VPN. VPNs require a protocol that itself uses one of the many tunneling protocols available.Adds the capability to ask for an IP address from a local DHCP server to give the tunnel an IP address that matches the subnet of the local LAN

Direct current (DC)

Electricity provided by batteries

Wired Equivalent Privacy (WEP)

Encrypts data using 40-bit or 104-bit encryption Includes a flaw that makes it extremely vulnerable to attack

System Management Mode (SMM)

Enables the CPU to slow down or stop its clock without erasing information Enables power saving in peripherals Requires a specialized BIOS and OS

chown command

Enables you to change owner and group with which a file or folder is associated Syntax: chown <new owner> filename

Telnet is a terminal emulation program for TCP/IP networks that uses port 23.

Enables you to connect to a server or fancy router and run commands on that machine as if you were sitting in front of it

Cellular wireless network

Enables you to connect to the Internet through a network-aware smartphone, tablet, or other mobile device

grep

Enables you to search through text file or command output to find specific information or filter out unneeded information

Encrypting file system (EFS)

Encrypted files and folders are unreadable to anyone without the key. Files and folders can be encrypted or compressed.

Ransomware

Encrypts all the data it can gain access to on a system Asks for money to decrypt data

NTFS permissions

Every folder and file has a list that details every user or group with access, and specifies the level of access Can be quite detailed and powerful Can set up permissions to edit but not delete a file

To make dynamic volume bigger, right-click the volume and choose _______________.

Extend Volume

What are the four stages of the pipelining process?

Fetch, Decode, Execute, and Write

Compression

Files and folders may be compressed to save space. Windows Explorer/File Explorer displays filenames for compressed files in blue.

MAC address filtering

Filters based on each host's unique MAC address Creates a type of accepted user list

How many root keys are in the Registry?

Five

Which chip contains the system BIOS and can hold data permanently, even without electricity?

Flash ROM

What is the smallest motherboard version in the ATX standard?

Flex ATX

Which ATX form factor is essentially no longer in use?

FlexATX

On USB 1.1 and 2.0 cables, the A and B ports and connectors use _______________ pins.

Four

Fragmentation

Fragmentation occurs when files are spread across clusters.Individual files are broken into pieces that fit into a sector or cluster.The pieces are stored on the hard drive but may not be stored in contiguous clusters. Fragmentation slows down the system during hard drive reads and writes. Programs such as Disk Defragmenter and Optimize Drives can rearrange files.

Infrared wireless networking

Functions in ad hoc mode Uses the Infrared Data Association (IrDA) protocol Requires line-of-sight with maximum 1 m distance No authentication or encryption Operates at half-duplex

The Registry is organized in a tree structure similar to the folders in the PC. Once you open the Registry Editor in Windows, you will see five main subgroups, or root keys:

HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_USERS HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG

Southbridge

Handles expansion devices and mass storage drives

Connecting to an ISP requires:

Hardware for connectivity Software (protocols)Governs the connection and data flow.

Northbridge

Helps the CPU work with RAM (on older systems) Communicates with video on newer AMD systems

What technology requires that the OS and applications be written specifically to handle multiple threads?

Hyper-Threading

Cluster sizes

It is possible to adjust cluster sizes, but rare to do so. NTFS supports 16 TB on a dynamic disk but limited to 2 TB on a basic disk.

Ways to increase range(WIFI)

Install multiple WAPs to permit "roaming" between one WAP's coverage area and another's—an EBSS. Install a replacement that increases a single WAP's signal strength, thus increasing its range. Signal boosters can give you even more power. Wireless repeaters/extenders can receive and rebroadcast a Wi-Fi signal.

Joule

Joule is a unit of electrical energy.Used to rate surge suppressorsThe higher the rating, the better the protection

ps

Lists the processes running on the system

KVM switches

Keyboard, video, mouse (KVM) switch most commonly allows computers to be viewed and controlled by a single mouse, keyboard, and screen.

Access point placement

Limit risk by hiding the network from outsiders. Keep omni-directional antenna close to center of home or office.

How LCDs work

Liquid crystals take advantage of the property of polarization. Liquid crystals are composed of specially formulated liquid. Liquid is full of long, thin crystals that always orient themselves in the same direction. The crystals act like a liquid polarized filter.

What typically is used by a CPU to process memory requests to the RAM?

MCC Memory control chips

LED

Manufacturers also use several types of light-emitting diode (LED) light for backlighting, either directly illuminating pixels from behind or flooding the panel from the edges of the bezel.Directly illuminating pixels from behind produces outstanding contrast and colorCosts a lot more than the edge typesLED monitors are LCD monitors that use LEDs for backlighting

UTP is the specified cabling for 10/100/1000BaseT and is the predominant cabling system today.

Many types are available for the needs of different networks.

Power Users

Members of the Power Users group are almost as powerful as Administrators, but they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.

Users

Members of the Users group cannot edit the Registry or access critical system files. Can create groups but manage only those they create also called standard users

Windows Preinstallation Environment (WinPE or Windows PE).

Microsoft calls the installation environment

PPTP VPNs

Microsoft developed Point-to-Point Tunneling Protocol (PPTP), an advanced version of PPP (used for dial-up Internet, as discussed earlier) that handles a VPN connection right out of the box. Microsoft places the PPTP endpoints on the client and a special remote access server program called Routing and Remote Access Service (RRAS), available on Server versions of Windows.

Which connector is the most common type of connector used for devices that require 5 V or 12 V of power?

Molex

Configuration Troubleshooting (1 of 2) wifi

Most common type of problem is misconfigured hardware or software. Verify SSID configuration for any bands in use.Check access point and affected wireless nodes.Be careful not to add blank characters where they don't belong. If a client can no longer connect:WAP may be down or may have been changed. Ensure MAC address of client is on the list of accepted users.

Telephone scams

Most common type of social engineering attack

Temperature and humidity are important considerations.

Most computers are designed to operate around 22°C (72°F) with relative humidity in the 30 to 40 percent range. Colder and dryer air is better for computers. Ensure air ducts are free from obstructions. Prevent equipment from being closed off from proper ventilation.

FireWire (also known as IEEE 1394)

Much like USB but uses different connectors and is the older technology IEEE 1394a runs at 400Mbps IEEE 1394b runs at 800Mbps

During a(n) _______________ installation, the new operating system can be installed into a different subdirectory on a different drive, leaving the old operating system intact and usable.

Multiboot

Multimode fiber optic cabling

Multimode fiber transmits multiple light signals at the same time.Each signal uses different reflection angle within the core of the cable.

Windows runs many processes simultaneously, a feature known as ______________.

Multitasking

All home routers use a technology called Network Address Translation (NAT):

NAT presents an entire LAN of computers to the Internet as a single machine by showing only your public IP address. NAT acts as a firewall, protecting your internal network from probing or malicious users.

Nano-ITX and Pico-ITX

Nano-ITX measures 4.7 by 4.7 inches. Pico-ITX is 3.8 by 2.8 inches. These form factors are commonly used on embedded and specialty systems. One of greatest benefits of these SSF motherboards is very low power requirements.Produce very low heatCan use passive cooling systems, making them almost noiseless

Internet service providers (ISPs) gain access to the Internet from leased Tier 1 and Tier 2 connections. ISPs come in many sizes:

National companies such as Comcast Local shops such as Electric Power Board (EPB) of Chattanooga in Tennessee

Two technologies are NOT used on portables:

Plasma - energy needs too high Organic light-emitting diode (OLED) - too expensive

Classless Inter-Domain Routing (CIDR)

Network techs refer to the subnet mask by the number of 1s it contains. From a practical standpoint, all you have to know as a tech is how to set up a computer to accept an IP address and subnet mask combination that your network administrator tells you to use.

LCD monitors use digital signals.

New LCDs (and video cards) feature the digital video interface (DVI) standard. DVI includes three different connectors: DVI-D, DVI-A, and DVI-A/D (or DVI-I). DVI-D and DVI-I connectors have two varieties:Single-link DVI has a maximum bandwidth of 165 MHz.Dual-link DVI has higher throughput and can support higher resolutions.

Three types of batteries have been most commonly used in portable computers.

Nickel-cadmium (Ni-Cd) Nickel-metal hydride (Ni-MH) Lithium-Ion (Li-Ion)Lithium polymer (LiPo) batteries are a variation of Li-Ion.

SMTP

OBJ-1.6: You should configure SMTP since it is the only protocol used to send emails. POP3 and IMAP are used to receive emails. HTTPS is used for web browsing, not for receiving emails.

SSO

OBJ-1.7: Single Sign-on (SSO) is an authentication technology that allows users to authenticate once and receive authorizations for multiple services. The advantage of single sign-on is that each user does not have to manage multiple user accounts and passwords. The disadvantage is that compromising the account also compromises multiple services.

SODIMM

OBJ-1.1: Laptops and integrated PCs usually use SODIMM memory due to the memory module's smaller footprint. SODIMM is the Small Outline Dual Inline Memory Module, and it can be purchased in various types and sizes to fit any laptop.

LCD

OBJ-1.2: A LCD (TFT) with fluorescent backlight has been the standard display technology for the last few years. The backlight is a fluorescent bulb that illuminates the image, making it bright and clear. An inverter supplies the correct AC voltage to the backlight from the laptop's DC power circuits. More modern laptops use LED displays that replace the fluorescent backlight with an LED backlight. OLED and plasma displays do not require a backlight.

OLED

OBJ-1.2: An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and can be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a dark room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight.

Inverter

OBJ-1.2: The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop's display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight.

Digitizer

OBJ-1.2: When a laptop has a touchscreen display, it will also have a digitizer fitted. The digitizer is sandwiched between a layer of glass and the LCD. Analog signals are created when you tap or swipe the surface of the display. The digitizer is connected to the laptop with a flexible digitizer cable. A grid of sensors is activated when you tap or swipe the screen. The sensors' information is sent through the digitizer cable to a circuit that converts the analog signal to a digital signal.

Docking Station

OBJ-1.3: A docking station provides additional capability to a laptop and further expansion of its capabilities. For example, a docking station can provide power, external monitor connections, additional storage, and even CD/DVD drives in them. A port replicator, on the other hand, is simply a device that plugs into a single port, such as a USB port, and then gives you access to additional common ports like serial, USB, parallel, PS/2 (keyboard and mouse connectors), and sometimes even audio jacks. Generally, a port replicator gives you easy access to the existing functionality in a laptop, but a docking station can provide additional capabilities to the laptop, as well.

Port Replicator

OBJ-1.3: A port replicator is a device used to connect multiple peripherals to a laptop quickly. The monitor, printer, network, keyboard, and mouse are permanently plugged into the port replicator, connecting to the laptop via the USB port. A docking station provides additional capability to a laptop and further expansion of its capabilities. For example, a docking station can provide power, external monitor connections, additional storage, and even CD/DVD drives in them. A USB 4-port hub will only provide USB expansion (which doesn't support a monitor by default) and is therefore not a possible right answer to this question.

Accelerometer

OBJ-1.4: Most wearable fitness devices come with a 3-axis accelerometer to track movement in every direction. Some more advanced trackers will also use a gyroscope to measure the orientation and rotation of the device. However, the accelerometer is still the crucial component to measure the activity of the user. The data collected is then converted into steps and activity and from then into calories and sleep quality.

Port 143

OBJ-1.6: IMAP uses port 143 to connect to the server and download any received emails.

Port 25

OBJ-1.6: SMTP uses port 25 to connect to the server and send emails from a client.

HTTP

OBJ-2.1: HyperText Transfer Protocol (HTTP) is the basis for the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. A client connects to the HTTP server using its TCP port (the default is port 80) and submits a resource request using a Uniform Resource Locator (URL). HTTPS (HTTP Secure) uses port 443. In this question, it states that the user can access HTTPS but not HTTP, indicating that port 80 is blocked.

Port 21

OBJ-2.1: Port 21 is used for FTP. Port 22 is used for SSH. Port 23 is used for telnet. Port 25 is used for SMTP.

Port 23

OBJ-2.1: Port 23 is used by telnet, which administrators use to connect remotely to a server and issue commands via a command-line interface. Telnet is not commonly used in networks anymore because all of the commands sent back and forth to the server are passed without any encryption or protection. Therefore, telnet is a security risk and has been mostly replaced by SSH (Port 22). Port 25 is used by SMTP, Port 110 is used by POP3, and port 443 is used by HTTPS.

RDP

OBJ-2.1: RDP operates over port 3389 by default. The Microsoft Remote Desktop Protocol (RDP) provides remote display and input capabilities over network connections for Windows-based applications running on a server. Essentially, RDP allows users to control their remote Windows machine as if they were working on it locally.

SNMP

OBJ-2.1: SNMP works over UDP ports 161 and 162 by default. SNMP (Simple Network Management Protocol) is a protocol for monitoring and managing network devices. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event.

TCP

OBJ-2.1: TCP (Transmission Control Protocol) is a slower but more reliable data delivery protocol. TCP is responsible for ensuring that packets arrive error-free and without loss. If you are doing something that must get to the destination without errors or data loss, such as a banking transaction or stock trade, it should be sent over TCP by your web browser. Web browsing over ports 80 and 443 uses TCP.

Port 548

OBJ-2.1: The Apple File Protocol (AFP) uses port 548 by default. AFP is the native file and printer sharing protocol for Mac computers. It supports many unique Mac attributes that are not supported by other protocols.

Repeater

OBJ-2.2: A repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Repeaters may be wired or wireless, and they simply rebroadcast whatever signal is received through their transmitter.

WAP

OBJ-2.2: A wireless access point (WAP), or access point, connects directly to a wired local area network, typically Ethernet, and the AP then provides wireless connections using wireless LAN technology, typically Wi-Fi, for other devices to use that wired connection. APs support the connection of multiple wireless devices through their one wired connection. While a switch or hub could be used instead, either of these options would require the staff to run 20 cables to the conference attendees that are time-consuming and more expensive than simply offering a Wi-Fi connection using an access point.

Whitelist

OBJ-2.3: A whitelist is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied. For example, if you create an access control list that relies on whitelisting, it would block every IP address that is not found in the whitelist.

MAC Filtering

OBJ-2.3: MAC (media access control) filtering involves applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it. MAC filtering can be configured as either a whitelist (only allow those listed) or blacklist (only deny those listed). This is commonly used to block unwanted wireless clients from connecting to your wireless access points. A MAC is a unique hardware identifier for a network interface card.

QoS

OBJ-2.3: Quality of Service (QoS) means using a network protocol to prioritize certain traffic types over others. Enterprise networks can use QoS protocols to make sure traffic such as Voice over IP calling or video conferencing is given higher priority than traffic where packets' timing is less important, such as ordinary file downloads. The other options are focused on blocking traffic, not prioritizing traffic.

WEP

OBJ-2.3: The Wired Equivalent Privacy (WEP) encryption system is based on the RC4 cipher. WEP allows you to select from different key sizes (64-bit or 128-bit). A larger key makes it more difficult to attack the security system. Unfortunately, the system uses a 24-bit initialization vector, making it simple to hack and crack. You should never use WEP in your wireless networks.

802.11ac

OBJ-2.4: 802.11ac networks are the fastest wireless networks in use today. They support speeds of up to 1 Gbps using the 5.0 GHz frequency band. 802.11n can use both 2.4 GHz and 5.0 GHz frequencies but only supports 108-600 Mbps speeds. 802.11a uses the 5.0 GHz frequency and supports 54 Mbps, while 802.11g uses the 2.4 GHz frequency and supports 54 Mbps.

5G

OBJ-2.4: The 5G specification has been able to reach up to 70 Gbps under test conditions. This is the newest version of cellular data standards and can reach 100 Mbps for a fast-moving user, such as a passenger in a moving vehicle.

802.11g

OBJ-2.4: The wireless 802.11g standard supports the use of the 2.4 GHz frequency band and can reach speeds of up to 54 Mbps. Wireless 802.11g was an improvement over the 802.11b standard. It uses the same frequency (2.4 GHz) but increased the speed from 11 Mbps (802.11b) to 54 Mbps (802.11g).

Syslog server

OBJ-2.5: A Syslog server is used to capture logs from different devices. It allows for the correlation of logs to simplify log review and an analyst's ability to respond to alerts. For example, Syslog messages can be generated by Cisco routers and switches, servers and workstations, and collected in a central database for viewing and analysis.

UTM

OBJ-2.5: A Unified Threat Management (UTM) appliance is one that enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention. A UTM centralizes the threat management service, providing simpler configuration and reporting than isolated applications spread across several servers or devices.

Embedded System

OBJ-2.5: An embedded system is a computer system designed to perform a specific, dedicated function. These systems can be as small and simple as a microcontroller in an intravenous drip-rate meter or as large and complex as an industrial control system managing a water treatment plant. Embedded systems might typically have been designed to operate within a closed network. The network elements are all known to the system vendor, and there is no connectivity to wider computer data networks.

IPS

OBJ-2.5: An intrusion prevention system (IPS) is a form of network security that detects and prevents identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them. An IPS can block malicious network traffic, unlike an IDS, which can only log them.

VLAN

OBJ-2.6: A VLAN (virtual LAN) allows a single physical switch to be divided into logical networks. VLANs are only supported on managed switches, but they allow for a different logical subnetwork address to be assigned to various ports on the switch. This requires that communications between different VLANs must go through a router, just as if you had multiple switches.

Dynamic IP Address

OBJ-2.6: A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server's IP address to the workstation or device.

Cable wife connection

OBJ-2.7: A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network's high bandwidth.

MAN

OBJ-2.7: A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area. The term MAN is applied to the interconnection of local area networks (LANs) or campus area networks (CANs) across a city into a single larger network. A MAN is larger than a CAN or MAN, but smaller than a WAN.

PAN

OBJ-2.7: A personal area network (PAN) is a computer network for interconnecting devices centered on a person's workspace. A PAN provides data transmission among devices such as computers, smartphones, tablets, and personal digital assistants. PANs can be used for communication among the personal devices themselves or for connecting to a higher level network and the internet where one master device takes up the role as a gateway. PANs usually operate over Bluetooth or USB connections.

satellite network connectivity

OBJ-2.7: Satellite systems provide far bigger areas of coverage than can be achieved using other technologies. A Very Small Aperture Terminal (VSAT) microwave antenna is aligned to an orbital satellite that can either relay signals between sites directly or via another satellite. While satellite internet does have some latency issues, it is the only option that will provide coverage while crossing the ocean. Cable cannot be used since you cannot keep the ship plugged in and drag the cable behind you. Cellular won't work once you get further than about 5 miles from the coastline due to the lack of cellular towers. Dial-up won't work unless you have a phone line, which would have to be cellular if you are located in the middle of the ocean.

LAN

OBJ-2.7: Since all of the computers and switches are located in the same building, it is best described as a Local Area Network (LAN) configuration.

WMN

OBJ-2.7: The 802.11s standard defines a Wireless Mesh Network (WMN). Unlike an ad hoc network, nodes in a WMN (called Mesh Stations) can discover one another and peer, forming a Mesh Basic Service Set (MBSS). The mesh stations can perform path discovery and forwarding between peers, using a routing protocol, such as the Hybrid Wireless Mesh Protocol (HWMP).

loopback plug

OBJ-2.8: A loopback plug is used to test a port. It involves connecting pin 1 to pin 3 and pin 2 to pin 6. You can do this either by rewiring the jack or twisting the relevant pairs together on a cable stub. Alternatively, you can purchase a prefabricated loopback plug. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software.

Punchdown Tool

OBJ-2.8: A punchdown tool is used to press a wire into the terminal on the rear of a patch panel or network wall jack. The punchdown tool then cuts through the insulation to make an electrical connection with the terminal block. A 110-block is the standard patch panel used for computer networks.

Cable Tester

OBJ-2.8: Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. Devices classed as certifiers can be used to test and certify cable installations to a particular performance category.

Bonjour

OBJ-3.10: Bonjour, Apple's zero-configuration networking protocol, automates certain aspects of network configuration; the protocol enables devices connected to the local area network to discover and connect automatically. Businesses can use Bonjour to make the sharing of files and devices easier; the technology works with wired and wireless LANs. After enabling Bonjour on a workstation, other computers on the network can detect and install printers or scanners attached to the workstation or access files from shared folders.

Impact Printer

OBJ-3.11: An impact or dot-matrix printer is an older type of printer that works by pressing a ribbon of ink onto the top sheet of paper using a series of dots. This is called an impact printer because it pushes the ribbon against the paper to create the image or text using a series of dots to create the image or text. These printers are most commonly used when multiple copies of a document must be created at once (like a 3-part form or contract to be signed). As these older printers are being retired and it is harder to find impact printers to purchase, most organizations are now switching to laser printers and requiring customers to sign multiple copies of the same invoice after they are printed using a laser printer.

IDE

OBJ-3.1: An IDE (Integrated Drive Electronics) cable is an older cable interface that used to be used for the transmission of data between the motherboard and various internal devices like hard drives and CD-ROM drives. A IDE cable is a 40-pin ribbon cable that operated at relatively slow speeds (less than 50 mbps). IDE cables were also known as PATA (Parallel ATA) cables, as opposed to SATA (Serial ATA) cables. It is rare that you will come across an IDE cable in use today, but if you are working on a very old computer in an office (legacy machine), there is a chace you will have to work with one.

Plenum Cables

OBJ-3.1: Plenum-rated cable has special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. For example, most large office buildings use the space between the ceiling and the roof to return air to the AC unit. This qualifies this area as a plenum ceiling, and all the cables that go through that ceiling must be plenum rated. It is important to check your local building codes to see if you need to use plenum cable. These plenum cables cost more because the insulation material must meet the standards for plenum cables while also meeting the standards for category 5e.

Type B USB Connector

OBJ-3.1: The most common USB connector used to connect to a printer is USB Type B. This connector has a large square-shaped male connector that is connected to the rear of the printer. A USB Type A connector is often used to connect to the workstation or computer itself. This question specifically asked which connector is being attached to the printer. Therefore the answer is Type B. While some newer printers may begin to use USB-C connections, it is not commonplace as of this version of the exam.

VGA

OBJ-3.1: This port is the VGA connection. It is used for legacy monitors and is an analog format. For the exam, it is important that you can identify the different parts of a motherboard's rear port cluster by sight.

DM-9

OBJ-3.2: A DB-9 is usually used to terminate an RS-232 connection on a serial cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. An RJ-45 connector is usually used to terminate an Ethernet cable. An RJ-11 is usually used to terminate a phone line.

RJ-45

OBJ-3.2: An RJ-45 connector is usually used to terminate an Ethernet cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. A BNC connector is an older connector used in old coaxial data networks like 10BASE2 and 10BASE5 networks. RJ-11 connectors are used to terminate phone lines and cables.

What connector terminates an ethernet cable

OBJ-3.2: An RJ-45 connector is usually used to terminate an Ethernet cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. A DB-9 is usually used to terminate an RS-232 connection on a serial cable.

DB-9 connector

OBJ-3.2: DB-9 connectors are designed to work with the EIA/TIA 232 serial interface standard, which determined the function of all nine pins as a standard so that multiple companies could design them into their products. DB-9 connectors were commonly used for serial peripheral devices like keyboards, mice, joysticks, and data connectivity. Today, the DB9 has mostly been replaced by more modern interfaces such as USB, PS/2, Firewire, etc. However, there are still many legacy devices that use the DB-9 interface for serial communication.

SCSI

OBJ-3.2: Don't be mistaken by all of the extra information provided in the question about the legacy (old) server in a closed IPX network. Focus on what the question is asking: what type of hard drive uses an ID number between 0-15 that must be set. The only types of hard drives or devices that use an ID number are narrow SCSI (0-7) and wide SCSI (0-15). Therefore, the correct answer is SCSI. The Small Computer System Interface (SCSI) is a set of parallel interface standards developed by the American National Standards Institute (ANSI) for attaching printers, disk drives, scanners, and other peripherals to computers. SCSI is supported by all major operating systems and was heavily used in older servers in the late 90s and early 2000s until SATA replaced it in most applications.

RJ-45 connector

OBJ-3.2: RJ-45 (Registered Jack 45) refers to a cable termination specification that specifies physical male and female connectors and the pin assignments of data jacks that can be used for networks and VOIP telephone cables. RJ-45 is an 8-pin/8-position plug or jack commonly used to connect computers onto Ethernet-based local area networks (LAN) and consists of two wiring schemes: T568A and T568B.

SODIMM

OBJ-3.3: Small Outline Dual Inline Memory Modules (SODIMM) is a small form factor used in memory modules. SODIMM is used in nearly every laptop available. For the exam, if you see a question asking about memory and laptops, the answer will most likely be SODIMM. SODIMM is also heavily used in Micro PCs (like Mac Minis) and all-in-one computers due to their smaller size.

Hyper Threading

OBJ-3.5: Hyperthreading is a technology used to split the physical cores of a processor into multiple logical cores. This allows the system to run multiple cores for each operating system in a virtualized environment. Since the question asked about logical cores and not physical cores, the answer is hyperthreading and not a multi-core processor.

L1 Cache

OBJ-3.5: Level 1 (L1) cache is the fastest and closest memory to the processor core. A CPU cache is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory. A cache is a smaller, faster memory located closer to a processor core, storing copies of the data from frequently used main memory locations. Most CPUs have a hierarchy of multiple cache levels (L1, L2, L3, L4, etc.), with separate instruction-specific and data-specific caches at Level 1.

LoJack

OBJ-3.5: LoJack for Laptops is a proprietary laptop theft recovery software that grants remote access to lock, delete sensitive files, and locate the stolen laptop. The user will need to install a LoJack program on the laptop and create a security card with the laptop's PIN/ID. This PIN/ID can be used to track down the laptop whenever it reconnects to the internet.

Virtual Network

OBJ-4.1: A virtual machine includes a virtual NIC. A virtual NIC is a type of virtual adapter that can be configured on logical partitions to provide a network interface. This virtual NIC can be paired and mapped to a physical NIC to get the VM onto the network.

PCle

OBJ-3.5: PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity.

AGP

OBJ-3.5: The area circled indicates the AGP slot on this motherboard. The AGP slot is a legacy expansion slot for older video cards. Newer systems use PCIe x16 instead. For the exam, it is important that you can identify the different parts of the motherboard by sight.

Mini PCLe

OBJ-3.5: The area circled indicates the Mini PCIe slot. This is used to connect internal cards (like WiFi network cards), or motherboard mounted solid-state storage devices. For the exam, it is important that you can identify the different parts of the motherboard by sight.

What is the purpose for using a secure boot?

OBJ-3.5: The purpose of Secure Boot is to prevent malicious and unauthorized apps from loading into the operating system (OS) during the startup process. Secure Boot is enabled by default in Windows 10. When the PC starts, the firmware checks the signature of each piece of boot software, including UEFI firmware drivers (also known as Option ROMs), EFI applications, and the operating system. If the signatures are valid, the PC boots and the firmware gives control to the operating system. The OEM can use the firmware manufacturer's instructions to create Secure boot keys and store them in the PC firmware. When you add UEFI drivers, you'll also need to make sure these are signed and included in the Secure Boot database.

Thermal Paste

OBJ-3.5: Thermal paste is a liquid gel-like substance that is placed in between the CPU and heat sink. Thermal paste draws the heat away from the CPU and up towards the heat sink. This helps cool down the processor more quickly and increases the overall efficiency of the cooling system. In a traditional cooling system, you place the thermal paste on the CPU, then attach the heat sink, and finally connect the cooling fan on top of the heat sink.

PXE

OBJ-3.5: To configure a computer to utilize the PXE boot option, you need to configure it under the BIOS boot option. The Preboot Execution Environment (PXE) is an industry-standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

TPM

OBJ-3.5: You should check the BIOS settings to ensure that TPM (Trusted Platform Module) is enabled. TPM enables a system to encrypt the contents of the HDD/SDD and will require a password to be entered during the boot process for the HDD/SDD to be decrypted. A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.

KVM

OBJ-3.6: A KVM (or Keyboard, Video, and Mouse) is a simple and easy to use hardware switching device that allows for multitasking on a single device. A KVM gives you the ability to connect 2 to 64 physical computers to a single set of hardware devices, such as a keyboard, monitor, and mouse. KVMs can be directly connected to the systems being controlled over USB, known as local remote. Modern KVMs can also operate over the network using KVM over IP, common in large datacenter implementations.

Refresh Rate

OBJ-3.6: Refresh rate is defined by the vertical scan frequency of a monitor and how many times in one second an image can be redrawn on the screen. LCD monitors have a fixed refresh rate based on the specifications of its panel. Generally, a monitor is rated with a refresh rate of 60 Hz, 72 Hz, or 120 Hz, with the higher refresh rate being considered better quality and easier on the user's eyes. For high-performance gaming systems, a 120 Hz monitor is desired for smoother motion and graphics.

NAS

OBJ-3.8: According to CompTIA, the five main things you need to include for network-attached storage (NAS) devices are (1) media streaming capabilities, (2) file-sharing capabilities, (3) Gigabit NIC, (4) RAID array, and (5) hard drives. Based on the options provided, you should pick the RAID 5 and Gigabit NIC for this device's configuration. The RAID 5 will provide both speed and redundancy to the NAS device, whereas the RAID 0 would provide only speed without redundancy. The Gigabit NIC will provide 1 Gbps (1000 Mbps) of network speed instead of the 100 Mbps provided by a FastEthernet NIC. For a NAS device, you should use multiple hard disk drives in a RAID, not a single 1 TB HDD or 1 TB SSD. For a NAS, it is preferred to choose hard drives over solid-state drives because of the increased storage capacity and lower cost.

Computer for video editing requirements

OBJ-3.8: According to CompTIA, the two main things you need to include for a dedicated virtualization workstation are (1) maximum RAM and (2) multiple CPU cores. Based on the options provided, you should pick the 64 GB of DDR4 (maximum RAM) and the Intel i9 with 8-cores (multiple processor cores) for this workstation's configuration.

Thin Client

OBJ-3.9: A thin client is a small device that can operate with or without an operating system installed on the client device. Instead, it can boot directly from a network-based operating system on a common server and access applications on the company's application server. This type of architecture can drastically reduce the need for operating system licenses and reduce deployment costs. A thin client runs from resources stored on a central server instead of a localized hard drive. Thin clients work by connecting remotely to a server-based computing environment where most applications, sensitive data, and memory are stored.

Hybrid Cloud

OBJ-4.1: A hybrid cloud model allows for the seamless integration of both onsite and cloud services to the end-user simultaneously. Hybrid clouds can be cost-efficient, flexible, easy to migrate to a complete cloud solution in the future, and require less maintenance than completely onsite options. As with all cloud options, the contents must be properly secured due to the elastic storage nature of all cloud solutions and the possibility of data remnants.

Remote Hosted Virtual Desktop

OBJ-4.1: A remote hosted virtual desktop (HVD) is a full, thick-client user environment run as a virtual machine (VM) on a server and accessed remotely. Using a hosted virtual desktop allows a company to utilize the cloud for its desktop infrastructure, reduce its maintenance cost, and shift capital expenses (such as new desktops) to operational expenses (monthly fees to pay for virtual desktop services).

Community Cloud

OBJ-4.1: Community Cloud is another type of cloud computing in which the cloud setup is shared manually among different organizations that belong to the same community or area. A multi-tenant setup is developed using cloud among different organizations belonging to a particular community or group with similar computing concerns. For joint business organizations, ventures, research organizations, and tenders, a community cloud is an appropriate solution. Based on the description of 15 member banks coming together to create the CloudBank organization and its cloud computing environment, a community cloud model is most likely described.

I/O Bandwith

OBJ-4.1: I/O bandwidth is the measurement of the amount of input and output operations that can be performed within a given time. The higher the I/O bandwidth, the faster and more efficient a cloud file-storage synchronization application will become. Applications that rely on large amounts of reading and writing of data require a high amount of I/O bandwidth. Disk speed is not nearly as important since most cloud file-storage systems use a virtualized file system for storage and do not rely on a single disk. Instead, they rely on a storage area network or a virtualized storage solution.

PaaS

OBJ-4.1: Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves. If you want to develop a customized or specialized program, PaaS helps reduce the development time and overall costs by providing a ready to use platform.

Rapid Elasticity

OBJ-4.1: Rapid elasticity allows users to automatically request additional space in the cloud or other types of services. Because of the setup of cloud computing services, provisioning can be seamless for the client or user. Providers still need to allocate and de-allocate resources that are often irrelevant on the client or user's side. This feature allows a service to be scaled up without purchasing, installing, and configure new hardware, unlike if you had to install more physical storage into a server or datacenter.

Rapid elasticity

OBJ-4.1: Rapid elasticity can be a security threat to your organization's data due to data remanences. Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. If the data was not properly erased from the underlying storage, it could be exposed to the other organization. For this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others.

Resource Pooling

OBJ-4.1: Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.

SaaS

OBJ-4.1: Software as a Service (SaaS) is used to provide web applications to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Officer 365 are both word processing SaaS solutions. QuickBooks Online is one example of a SaaS solution for accounting.

SaaS

OBJ-4.1: Software as a service (SaaS) allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools. SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. You rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser. All of the underlying infrastructure, middleware, app software, and app data are located in the service provider's data center. The service provider manages the hardware and software, and with the appropriate service agreement, it will ensure the availability and the security of the app and your data. SaaS allows your organization to get quickly up and running with an app at minimal upfront cost.

Virtualization Support

OBJ-4.2: CPU Virtualization is a hardware feature found in all current AMD & Intel CPUs that allows a single processor to act as if it was multiple individual CPUs. This allows an operating system to more effectively & efficiently utilize the CPU power in the computer to run faster. This is enabled or disabled on supported processors within your system's BIOS.

Emulator

OBJ-4.2: Emulators emulate hardware without relying on the CPU being able to run code directly. Virtual machines use CPU self-virtualization, to whatever extent it exists, to provide a virtualized interface to the real hardware. A simulator is a limited scope that is usually used in training to mimic a real system's functionality. Emulators were created before virtualization and operate much slower than a true virtualization environment with a hypervisor.

Which of the following is a security concern when dealing with virtual machines? Rogue VM

OBJ-4.2: The process of developing, testing, and deploying images brings about the first major security concern with the virtual platform itself. This is the problem of rogue VMs. A rogue VM is one that has been installed without authorization. The uncontrolled deployment of more and more VMs is referred to as VM sprawl. After all, it is a lot easier to add a guest image to a server than it is to plug a new hardware server into the network.

Virtual Box

OBJ-4.2: Virtual Box is a Type 2 hypervisor that allows you to install the software inside your existing operating system. You can then install a virtual machine containing another guest operating system. For example, a macOS system can have Virtual Box installed and then utilize Windows as a guest operating system inside a virtual machine hosted by Virtual Box. The other options listed are all Type 1 or bare-metal hypervisors.

Distended Compacitor

OBJ-5.2: A distended capacitor on a motherboard is an indication of a fault on the motherboard. Capacitors can bulge and release a substance that has a foul smell when they fail. Capacitors are tiny electrical components that are soldered onto the motherboard and aid in the storage and use of DC voltage.

Burnt Motherboard Smell

OBJ-5.2: A foul smell is usually indicative of a distended capacitor. Capacitors are small electrical components on the motherboard. Therefore you should inspect the motherboard for replacement. If there was a burning smell, then the power supply should be the first component inspected.

F12

OBJ-5.2: F12 is the most commonly used key used to enter the boot order selection screen. The boot order is a menu that allows you to select which device you wish to boot from, such as the hard drive, DVD, or a removable USB device. If you wanted to boot to USB, you would use the up and down arrow, and press Enter to tell the boot command to boot from USB. This works for Windows and Linux machines, but not for macOS since it uses a different boot manager.

BSOD is usually due to what?

OBJ-5.2: The Blue Screen of Death (BSOD) is a "stop screen" that appears when the Windows operating system detects a critical error and literally stops the system so that the error doesn't cause any loss of data. All operating systems have some form of "stop screen," but the Windows version got the name BSOD since it was a screen with a full blue background and white text containing troubleshooting information and error codes. On a Mac (OS X) system, the BSOD is replaced by the "Pinwheel of Death," which is an endlessly spinning mouse pointer displayed on the screen. This usually occurs due to a memory failure or memory corruption in the system.

RAID 0

OBJ-5.3: RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group. Unlike other RAID levels, RAID 0 does not have parity or redundancy. It will provide faster performance and speed, as well as use 100% of the available drive space.

SATA

OBJ-5.3: Serial Advanced Technology Attachment (SATA) or Serial ATA cables are used to connect devices in computer cable assemblies, such as storage devices and internal hard drives. The other options are all external cable types.

Incorrect Display Resolution

OBJ-5.4: This is likely a screen resolution problem. Each LCD/LED has a native resolution that fits perfectly on the screen. If a resolution other than the native resolution is used, the screen could become squished, distorted, or have black vertical or horizontal lines filling up the excess space.

Corona Wire

OBJ-5.6: A corona wire is a charged wire in a laser printer that draws the toner off the drum onto the paper. It must be cleaned when the toner cartridge is replaced. A dirty corona wire can cause a portion of the drum not to be charged properly and lead to a white streak appearing on the printed image.

Symptoms of low toner

OBJ-5.6: A symptom of low toner is faded or faint colors in your printed papers. Most modern printers will also indicate the amount of toner left using their on-screen display and present a warning message for low toner and an error message when the printer is completely out of toner.

DHCP failure

OBJ-5.7: A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways, and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to clients' broadcast queries. Since you have received an APIPA address (169.254.13.52), this signifies a DHCP failure.

WIFI Analyzer

OBJ-5.7: A WiFi analyzer can determine the wireless network's signal strength, the frequencies in use, and any possible radio frequency interference. Based on the issue described in the question, the network may have dead zones that could be fixed by adding additional access points to increase the network's wireless coverage. Another possible issue could be radio frequency interference from other devices, which a WiFi analyzer could help identify.

What's an APIPA Address

OBJ-5.7: Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. Any address from 169.254.1.0 to 169.254.254.255 is considered an APIPA address.

STP more info

OBJ-5.7: STP (Shielded Twisted Pair) is a type of cabling that can help prevent electrical interferences or cross talk. A cross-talk is when electrical interference data passing through can cause CRC (Cyclic Redundancy Check) errors. A CRC is used to calculate the before and after checksum is made when transferring data. If electrical interference gets in the way, such as proximity to fluorescent light bulbs, it can cause data to be corrupted and produce an error. UTP (Unshielded Twisted Pair) is cheaper and easier to work with but is subject to interference. Coaxial and fiber are not types of CAT 5e cabling.

What command is used to test if your own network connectivity works properly, including your network card's driver?

OBJ-5.7: The IP Address 127.0.0.1 is a localhost IP for testing your own network interface card (NIC). This IP address is reserved for use with a loopback test. If there is no communication of the return packet, this indicates the network card is faulty, the cable/loopback is loose, or there is bad wiring of the loopback plug.

Which type of coolers are heat-sink and fan assemblies that are included with most Intel retail-boxed CPU?

OEM CPU coolers

Spyware

Often sneaks onto systems bundled with legitimate software

How many wires does a PCIe connection use for sending and receiving data?

One for sending and one for receiving

Modern PC beep code for bad or missing video

One long beep followed by two or three short beeps

Swap partition

Only found on Linux and UNIX systems Acts like RAM when system needs more RAM than you have installed Similar to a Windows page file, but has a dedicated partition

Software RAID

Operating system is in charge of all RAID functions. Built-in software RAID comes with Windows.

What are the three major components in a modern computer?

Operating system, data storage, and networking

HKEY_CURRENT_CONFIG

Options currently being used

Which term describes a milder error that can be caused by memory issues but not necessarily system RAM problems?

Page Fault

What Windows function is similar to a swap partition in Linux/Unix systems?

Page File

Parity RAM allows the computer to detect whether an error occurred in the reading or writing of data in memory.

Parity

Digitizers

Pen tablet enables users to paint, ink, pencil, or otherwise draw on a computer.

Access control—the process of controlling access to data, programs, and other computing resources—is composed of four interlinked areas:

Physical security Authentication Users and groups Security policies

PGA

Pin Grid Array. Type of CPU, usually AMD, that uses protruding pins.

Polarization

Polarization is an electromagnetic property of antennas and their transmitted signals.Signal has the same alignment as the antenna. For best connection between a client and a WAP, wireless signals should have the same polarization.

Benefits of Virtualization

Power saving, hardware consolidation, system management and security, and research.

Trojan horse

Pretends to do one thing while it is doing something else

dd

Primarily used to create an exact, bit-by-bit images of any form of block storage Example uses copying a hard drive backing up a removable flash drive wiping a disk

Which tab shows you every running process on your computer?

Proccesses

Authentication

Process of identifying and granting access to some user who is trying to access a system Logging on to a valid user account provides authentication

Which group would make the most use of the features in graphics workstations?

Professional Photographers

Closed source software

Prohibits modifying the source code or making it part of some other software

Super I/O chip

Provides support for legacy devices and more

The Disk Management program in Windows Server versions can configure drives for _______________, and it works with PATA or SATA.

RAID 0, 1, or 5

Video cards offer other connector types for connecting to things like television sets, camcorders, and other multimedia devices:

RCA BNC Mini-DIN

Registered and buffered memory

Registered RAM (or buffered RAM) refers to a small register installed on some memory modules to act as a buffer between the DIMM and the memory controller. The motherboard will use either buffered or unbuffered RAM (typical consumer RAM), not both.

Which command is a full-featured command-line Registry editor?

Regsrv32

Hardware RAID

Requires an intelligent controller that handles all of the work of implementing RAID Invisible to the operating system Provides needed speed along with redundancy Provides hot-swappingReplace a bad drive without disturbing the OS

Attack vector

Route taken by malware to infect the system

If you need a remote terminal that works securely across the Internet, you need Secure Shell (SSH).

SSH uses port 22, and the entire connection is encrypted (tunneling).

Common fiber optic connectors:

ST connector SC connector LC connector

What feature does Windows 8 use to takes advantage of modern widescreen monitors?

Side by side apps

Corporate/ISP solutions

Set up your client software to match the settings of the e-mail server software.The most popular client by far is Microsoft Outlook. You'll need the names of the Post Office Protocol version 3 (POP3) or Internet Message Access Protocol version 4 (IMAP4) server and the Simple Mail Transfer Protocol (SMTP) server. Use ping to determine the IP address for the device.

Tier 2

Smaller regional networks

FlexATX

Smallest motherboards in the ATX standard Mostly obsolete

The motherboard mounts to the case via small connectors called _______________.

Standoffs

Installing Expansion Cards Steps

Step 1: Knowledge Learn about the device you plan to install. See if it is compatible with your system and make sure it fits you personal needs Step 2: Physical Installation To install an expansion card successfully you need to take steps to avoid damaging the card, motherboard, or both. You need to know how to handle the card (grab it by the edges and don't touch any chips of the card) and make sure no ESD (Electro Static Discharge) occurs. Use an anti static wrist strap or a mat to put you at the same electrical potential as the PC. Also, if you need to store a component use an anti-static bag. Make sure you ALWAYS unplug the PC before touching the inside of it. You could damage parts or hurt yourself if you don't. Step 3: Device Drivers All expansion devices usually need drivers- software support programs- and they are usually loaded from an optical disc (or they can be downloaded from the manufacturers site). When installing device drivers you need to make sure you install you correct one. Step 4: Verify After you install your device, inspect the results and verify that the device works properly. Immediately after installing, you should open Device Manager and verify that Windows sees the device.

HKEY_CURRENT_USER and HKEY_USERS

Stores all of the personalized information for all users on a PC

RAID 0+1/ RAID 1+0

Striped mirroring minumum 4 disks high reliability Start with two RAID 0 striped arrays, then mirror the two arrays to each other

TCP/IP provides the basic software structure for communication on the Internet.

TCP/IP provides the framework and common language for the Internet. All the backbone routers connect redundant, high-speed backbone lines. TCP/ IP enables communication and services for building applications. Enable humans and machines to interface across vast distances

CMOS Battery

The CMOS battery powers your laptop's BIOS firmware, which is responsible for booting up your computer and configuring data flow. You can tell if your CMOS battery has died if your laptop has difficult booting up, if drivers disappear, and if your laptop's date and time are incorrect.Jun 20, 2019

If you have Dynamic Host Control Protocol (DHCP) and your computer is configured to obtain an IP address automatically, your computer boots up and will broadcast a DHCP request.

The DHCP server provides your computer with all the IP information it needs to get on the network.

Guests

The Guests group enables someone who does not have an account on the system to log on by using a guest account.

Molex connector

The Molex connector supplies 5-V and 12-V current for fans and older drives. Chamfers are notches on the connector that guide installation. Molex connectors require a firm push to plug in properly.

In today's computers, the CPU tells _______________ the clock speed it needs, and the clock chip then automatically adjusts for the CPU.

The Motherboard

PRI

The Preferred Roaming Index (PRI) contains radio settings, including ID numbers, network codes, country codes, and other important information that allows the cellphone to connect to the correct service provider's network.

PRL

The Preferred Roaming List (PRL) is a database residing in a wireless (primarily CDMA) device, such as a cellphone, that contains information used during the system selection and acquisition process.

SMB

The Server Message Block (SMB) protocol is Windows' network file and print sharing protocol. UNIX and Linux systems used a competing protocol, Network File System (NFS).NFS has declined.Today, every major OS uses SMB.

SNMP

The Simple Network Management Protocol (SNMP) enables remote query and remote configuration of just about anything on a network, including computers, switches, routers, and anything else that is SNMP-capable.

When moving data from one system to another, the TCP/IP protocol suite needs to know if the communication is connection-oriented or connectionless.

The connection-oriented protocol used with TCP/IP is called the Transmission Control Protocol (TCP). The connectionless one is called the User Datagram Protocol (UDP). Most TCP/IP applications use TCP instead of UDP.

A chipset determines:

The processor type Type and capacity of RAM The internal and external devices supported by the motherboard

Syntax

The proper way to write a command is called its syntax.

rd (rmdir) command

The rd (rmdir) command used for deleting empty directories and subdirectoriesThe rmdir works in Windows, Mac OSX, and Linux.The rd command only works in Windows.

Throw

The size of an image at a certain distance Related to aspect ratio

Infrastructure mode

This mode uses one or more WAPs to connect wireless nodes to a wired network segment. A single WAP servicing an area is called a Basic Service Set (BSS).Adding more WAPs creates an Extended Basic Service Set (EBSS). Infrastructure mode is suited to networks that need to share dedicated resources such as Internet connections and centralized databases.

802.11ac

This standard uses only the 5-GHz band. New version of MIMO called Multiuser MIMO (MU-MIMO) gives WAP ability to transmit to multiple users simultaneously.

Creating Partitions and Volumes in Disk Management

To create a new volume, right-click an allocated part of the drive and select New Simple Volume. Specify the volume and click Next. By default, Windows does not allow you to choose between a Primary and Extended partition. The first 3 volumes you create will be primary and every volume afterwards will be a logical drive in an extended partition (for MBR style drives) Partition is 4 GB format as FAT, NTFS, FAT32 Partition is 4 GB < x < 32 GB then format as FAT32 or NTFS Windows requires NTFS on any partition greater than 32 GB quick format does not test the disk clusters as part of the format process, while full format does

Internet Tiers

To keep everything running smoothly, the Internet is broken down into groups called tiers. Tier 1 (main tier)A small number of companies are Tier 1 providers, which own long-distance, high-speed fiber-optic networks called backbones.Backbones span the major cities of the earth and interconnect at network access points (NAPs).

Virus

Two jobs: replication and activation

The ping command is a great way to see if another system is connected to the network. Use the command-line tool ipconfig for a quick glance at your network settings.

Type ipconfig /all to see all of your TCP/IP settings. The ifconfig command in Mac OS X and Linux provides the same level of detail with no switches

USB Standards and Compatibility ( different types of USB's)

USB 1.1: had two speeds. 1.5 Mbps (low speed) and 12 Mbps (full speed). 5 meters maximum. USB 2.0: 480 Mbps (known as Hi-Speed). 5 Meters maximum USB 3.0: 5 Gbps (SuperSpeed), ports are blue or yellow depending on manufacturer. Keep cable length no more than 3 meters. USB 3.1: 10 Gbps. Colored teals. USB 3.0 cannot be plugged into 2.0 and 1.1 but 2.0 and 1.1 can be plugged into 3.0. Will only run as fast as device (if you plug a 2.0 in 1.1, it will only go at 1.1 speeds.)

Modern ports

USB, Thunderbolt, eSATA, and FireWire Plug and go - no reboot required

The IP address

Unique identification for your system on the network Relies on Internet Protocol version 4 (IPv4) addressing schemeFour sets of eight binary numbers, separated by periods

Any network address must provide two pieces of information:

Uniquely identify the machine Locate that machine within the larger network In a TCP/IP network, the IP address identifies the PC and the network on which it resides.

SATA power connectors

Used for serial ATA drives 15-pin connection Supports the SATA hot-swappable feature and 3.3-, 5.0-, and 12.0-V devices L-shaped; almost impossible to insert incorrectly

Coaxial cable

Used in early versions of Ethernet Still used in cable modems and satellite connections Consists of a center cable (core) surrounded by insulation and covered with shield of braided cable Rated using an RG nameTwo covered on CompTIA A+ exam: RG-59 and RG-6Standards rated by impedance, measured in ohmsBoth RG-59 and RG-6 have 75 ohm impedance

Mini connector

Used only for extinct 3.5 inch floppy disk drives Can insert incorrectly with very little effort

chmod command

Used to change permissions Uses numbering system r:4; w:2, x:1

passwd

Used to change users password-Linux

Rootkit

Uses low-level operating system functions to hide itself

Internet Application Protocols (3 of 3) and their ports

Utility ProtocolFunction Port Number DNS Allows the use of DNS naming UDP 53 DHCP Automatic IP addressing UDP 67, 68 LDAP Querying directories TCP 389 SNMP Remote management of network devices UDP 161 SMB Windows naming/folder sharing; alsoCIFS TCPUDP 445137.138.139 AFP Mac OS X file services TCP 548 SLP Services discovery protocol TCP/UDP 427 NetBIOS/NetBT NetBIOS over TCP/IPTCP 137,139 UDP 137,138

Video cards offer a variety of connections. Standard connections include:

VGA DVI DB-15 DisplayPort Thunderbolt HDMI (including Mini- and Micro- variants)

Which type of PC combines the requirements of a graphics workstation and an audio workstation?

Video editing workstation

What technology enables you to run more than one operating system at the same time on a single computer?

Virtualization

Voice over IP (VoIP)

VoIP refers to a collection of protocols that make phone calls over the data network possible. Low network latency is more important than high network speed. Latency is the amount of time a packet takes to get to its destination and is measured in milliseconds. Two popular ways to set up a VoIP system are:Using dedicated VoIP phones Or using a small VoIP phone adapter

Microsoft calls a drive structure created with a dynamic disk a _______________.

Volume

when is a partition needed

When installing a new OS When adding a new hard drive

POST

When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system

Entering the IP information

When you're configuring a computer to connect to a network, you must enter:The IP addressThe subnet maskThe default gatewayAt least one DNS server

Port 110

Which port is used to connect to a POP3 server to download an receive emails

Overcome bottlenecks in three ways:

Wider bus between video RAM and video processor Specialized super-fast RAM More RAM

Wide area network (WAN)

Widespread group of computers connected using long-distance technologies

msinfo32.

Windows comes with a built-in utility known as the System Information tool that collects information about hardware resources, components, and the software environment. Access it from the Start | Search bar

To show contents of the working directory:

Windows: dir command Linux: ls command

Wireless access point (WAP)

Wireless Ethernet devices can connect to a WAP. A WAP acts like a hub to the wireless hosts in the area. More advanced WAPs can use Power over Ethernet (PoE).

802.11n

Wireless networking standard that can operate in both the 2.4-GHz and 5-GHz bands and uses multiple in/multiple out (MIMO) to achieve a theoretical maximum throughput of 100+ Mbps. Faster speeds New antenna technology Multiple in/multiple out (MIMO)Enables devices to make multiple simultaneous connections Transmit beamforming Minimize dead spots with multiple-antenna technology Dual-band operation support

Mac OS X uses the Hierarchical File System Plus (HFS+) by default

You can read and write to several different file systems with the OS. Latest versions can read and write to FAT32 and exFAT, though only read NTFS.

What type of socket is used to hold a CPU in place?

ZIF

In Windows 8, which tool enables you to set up hard drives, manage devices, test system performance, and much more?

administrative tools

For missing or faulty RAM what beep sequence is conducted

beep that repeats indefinitely

Because CPU makers cannot make the processors run much quicker, they instead _______________.

combine multiple CPUs on a single chip

On-demand self-service

consumers can obtain computing capabilities such as server time or network storage as needed automatically on their own

Clock crystals

control CPU and chipset speeds, but the expansion slots run at a much slower speed than the frontside bus .The expansion bus crystal, which controlled the part of the external data bus connected to the expansion busMade expansion slot timing possible so a card did not have to be produced for each clock speed.

To boot from a network installation, if there is no Preboot Execution Environment (PXE), _______________.

create boot media that forces booting from network location

MBR and GPT disks use partitions and dynamic disks use volumes.

differences of partitions

Which command-line tool displays all the files and folders in a specific directory?

dir

external SATA (eSATA)

eSATA extends the SATA bus to external devices. Cable length up to 2 meters are possible. eSATA extends the SATA bus at full speed. External drives are encased in the external enclosure

Microsoft often uses the term _______________ to define an upgrade installation.

in-Place Upgrade

Resistance

is opposition to the flow of electrons.All wires have slight resistance.Resistance is measured in ohms (Ω).

Wattage

is the amount of amps and volts needed so a device will function Measured in watts (W)W = V × A

Current or Amperage

is the amount of electrons moving past a point in a wire.Measured in amperes (A)

Voltage

is the pressure of electrons in a wire.

Partitioning

is the process of electronically subdividing the physical hard drive into units called partitions.Hard drive must have at least one partition.Each is typically assigned a drive letter such as C: or D:.

DWORD value

like binary values, but limited to exactly 32-bits.

Color depth is represented as bits. Color depth of 24 bitsAny single combination of resolution and color depth you set for your system is called a mode. Number of colorsNumber of bits 2 colors 1 bit (mono) 4 colors 2 bits 16 colors 4 bits 256 colors 8 bits 64k colors 16 bits 16.7 million colors 24 bits

mode

PCs use a 12.0-V current to power

motors on devices such as hard drives and optical drives.

You can click the Windows 10 Task View button to create and manage _______________for grouping your open applications.

multiple desktops

PCIe photo

photo

Alternating current (AC)

rapid and interrupted current, flowing first in one direction and then in the opposite direction

Binary value

stores long strings of 1s and 0s

Root keys are composed of

subkeys

PCs use a 5.0-V/3.3-V current to power

support onboard electronics.

Serial Presence Detect (SPD)

technology detects and automatically sets up installed DIMM.

How many PATA drives—including hard drives, optical drives, and tape drives—can be connected to a single ATA controller?

two

How many functional failures can RAID 10 withstand and remain functional?

up to 2

1 POST beep is good

yeet

NAS and SAN are network storage devices

yes

How many failures can RAID 0 withstand and remain functional?

zero, 0

RAID 0 (striping)

• File blocks are split between physical drives • High performance • No redundancy • Minimum of 2 drives


संबंधित स्टडी सेट्स

Unit 2: Loan Types, Lender Criteria, and the Loan Application

View Set

Ch 4 Social Interaction, Social Structure, and Social Organization

View Set

Intro to Air Pollution and Smog Study Guide

View Set

Chapter 9 - Lifespan Development

View Set