Core 1 videos
IMEI
International Mobile Equipment Identity
IMEI
International Mobile Equipment Identity. Is uniquely assigned to the device itself.
IMSI
International Mobile Subscriber Identity. is uniquely assigned to the user.
A Records
"A" stands for address "AAAA" used for IPv6 records
RAID 1
- Mirroring
RAID 1+0
--- Stripe of Mirrors
Batch files are used to simplify and automate tasks. Which of the following extension is used to create a batch file? .vbs .js .bat .ps1 .py
.bat
Satellite Key Features
1 - 100 Mbps download speeds and 1 - 4 Mbps upload speeds Leased monthly and can be expensive Requires a satellite dish Data provided by ISPs operating earth-orbiting stations Not as fast as other network provider links
Place the 6 steps of the troubleshooting methodology in the correct sequence. Test theory to determine cause Establish plan of action Establish theory of probable cause Document findings Verify system functionality Identify the problem
1. Identify the problem 2. Establish theory of probable cause 3. Test theory to determine cause 4. Establish plan of action 5. Verify system functionality 6. Document findings
T-568A wire sequence
1. White/Green Green White/Orange Blue White/Blue Orange White/Brown Brown
Low Speed USB 1.1 can handle what
1.5 megabits per sec and is 3 meter in length
Typical pin sizes
1.57 mm (0.062 in) 2.3 mm (0.084 in) 2.36 mm (0.093 in)
How is USB 3.2 different from other USBs
10 Gbps or 20 Gbps and uses USB-C
Cat 5 Transmission Limitations
100 megabits per second Not ideal for large corporate environments Prone to electromagnetic interference from other devices Prone to crosstalk
High speed USB 1.1 can handle what
12 megabites per set and is 5 meters in length
DD-50 Connector
17-16-17 pin layout. Fast-SCSI equipment
Bus width
192 bits wider pathway Simultaneous access Dedicated chips in dedicated channels
Bluetooth
2.4 GHz frequency band 79 channels Chanels are 1 Mhz wide Frequency . hopping Weaker signal than Wi-Fi Common in wireless devices
Channels
2.4 GHz is divided into fourteen channels Each channel overlaps with the adjacent channel, but channels 1,6, and 11 do not overlap
Laptop SSD form factors
2.5 inch form mSATA M.2
how are UBS-C connectors different from others
24 pins, double-sided, uses host and device, can't be plugged in upside down, Does not necessarily indicates USB 3.1 or 3.2
Universal Serial Bus Type-C
24-pin USB connector USB 3.1 Superspeed transfer mode Superspeed+ transfer mode USB 3.2 10/20 Gbps for SuperSpeed and Superspeed+
Lightning connector adapters attributes
30-pin. USB. HDMI. VGA. SD cards
IP address Features
32 bit logical address 4 "octets" of 8 bits Network ID and Host ID Determined by subnet mask
Peripheral Component Interconnect (PCI)
32-bit PCI slots White and approximately 3 inches long 3.3V and 5V
LCD screens
32-bit color Pixels Dots per inch (DPI)
Cellular networks support what in GSM networks?
3G, 4G, and 5G
For a GPS device to reliably and accurately report its location, how many satellite signals must be acquired?
4
How is USB 3.0 different from USB 2.0 and 1.1
5 gigabits per sec and is 3 meters in length
Mini PCI Express
54- pin edge connector REctangular
Punch Down Block Types
66 block BIX block Krone block 110 Block
802.11 Infrastructure mode
802.11 a/b/g/n/ac Common connection type Utilizes an access point Many device connected Devices can communicate
PoE Upgrades
802.3at was released in 2009. Also known as PoE+. Increase maximum power delivery to 30W 802.3bt was released 2018. Contain Type 3 and Type 4. Type 3 supports 60W Type 4 supports 100W
A DSL modem operates over which physical medium? A. Phone Cabling B. Wireless C. Ethernet cabling D. Coaxial cabling E. Fiber optic cabling
A
Crimping refers to which process? A. Installing a physical connector onto bare wire ends B. Connecting bare wire ends to a patch panel C. Removing the individual jacket of each wire inside a cable D. Plugging a cable into a receptacle E. Removing the outer protective casing of a cable
A
If a byte is written to an ECC memory module that has four-bit values set to 1, and four set to 0, which type to parity information will be used? A. Even parity B. Split parity C. Odd parity D. No parity
A
In which scenario would you be most likely to use a loopback plug tool? A. When you need to test if the physical interface of a switch is functioning B. When you need to identify unknown endpoints of a cable run C. When you need to test if a cable is broken D. When you need to connect two bare wire ends to each other E. When you need to install a connector on the end of a cable
A
Long-range fixed wireless networking is commonly implemented in which configurations? A. Point-to-point B. Host-to-Host C Ground-to-satellite D. host-to-site E. Satellite-to-ground
A
Other than replacing the filament in a 3-D printer, which maintenance task will likely be performed most often? A. Cleaning the nozzles B. Changing the cooling fans C. Adjusting belt tension D. Leveling the print bed E. Checking guides
A
Routers operate at which layer of the OSI model? A. 3 - Network B. 4 - Transport C. 1 - Physical D. 2- Data link E. 5 - Session
A
What is the most common platter rotation speed for a hard drive found in a desktop computer? A. 7200 RPM B. 5400 RPM C. 20000 RPM D. 10000 RPM E. 15000 RPM
A
Which component or feature refers to the type of paper typically required for an impact printer? A. Tractor feed B. Dot-matrix C. Ribbon D. Photographic E. Thermal
A
Which feature, or service can be used to allocate more network bandwidth to Voice over IP applications? A. Quality of Service (QoS) B. A faster Inernet connection C. Packet loss D. Latency E. Jitter buffer
A
Which motherboard form factor was offered in four different sizes of Mini, Nano, Pico and Mobile? A. ITX B. ATX C. Micro ATX D. Mini ATX
A
Which part of the Active Directory structure houses all the users, computers, and other objects in the active directory controlled by the administrator? A. Domain B. Forest C. Organizational Unit D. Tree
A
Which printing component is most commonly responsible for finishing issues such as inaccurate folding, tearing, curling, or improper trimming? A. Incorrect paper type B. Too many pages loaded C. Incorrect tray settings D. Incorrect binding edge specified E. Too may pages accumulated in an exit tray
A
Which type of CPU socket used flat metal contacts and a removable chip? A. LGA B. PGA C. BGA D. ZIF
A
Which type of DNS record can be used to associate more than one host name to a single IP address? A. CNAME B. A C. AAAA D. MX E. NS
A
Which type of display issue can temporarily leave traces of an image behind after the image has changed? A. Artifact B. Burn-in C. Faded light D. Corrupted color E. Distortion
A
Which type of fiber optic cabling is best suited to very long runs with very few bends or turns? A. Single-mode --- step index B. Multi-mode --- graded index C. Single-mode --- graded index D. Multi-mode ----- step index
A
Which type of heat sink would generally provide the most effective level of cooling? A. Refrigerated B. Active heat sink C. Liquid cooled D. Air conditioning E. Passive heat sink
A
Which type of internet appliance or device might be implemented for a service that is becoming overwhelmed by client requests? A. Load balancer B. IDS C. IPS D. Firewall E. Proxy server
A
Which type of report can provide a break-down of both usage and billing when using measured and metered services? A. Chargeback and show back B. Licensing C. Application usage D. Storage resources E. Server resources
A
Which type of wireless networking device creates a new SSID in addition to the original? A. Extender B. Access point C. Router D. Repeater
A
What is the reason for encrypting a mobile device's hard drive? [Choose all that apply] A. Prevent unauthorized access to the data on the device B. Prevent the device's hard drive from being accessed when lost or stolen C. the device from being unlocked with a password or PIN D. Prevent the access to the location of the device when lost or stolen
A and B
Cable Strippers
A cable first needs to be stripped of its jacket before crimping a connector to the end of the cable Once stripped, the exposed wires need to be aligned and put into the connector
Socket Types
A category, not a model Intel uses number of pins AMD uses a custom naming structure
What is a SIM card
A chip inserted inside a mobile devices. Used to connect mobile devices to GSM networks. Identifies devices on a network
Patch Panels
A collection of ports on a panel Cables are terminated at patch panel Allow connections from different locations Patch cables are used to create connections
Resiliency
A system's ability to recover Availability measured in 9s
Bluetooth transmissions generally tend not to interfere with Wi-Fi communications for which reasons? A. Bluetooth uses frequency hopping B. Bluetooth signals are typically much weaker than Wi-Fi C. Bluetooth uses microwave transmission instead of radio D. Bluetooth uses the 5GHz band E. Bluetooth signals are typically much stronger than Wi-Fi
A, B
Which types of resources would be at the level of Software as a Service? A. Human resources management applications B. Customer relationship management applications C. Development studios D. Virtual networks E. Virtual appliances
A, B
Which of the following methods are used by organizations to allow the use of mobile phones? A. Corporate-Owned, Personally Enabled B. Choose Your Own Device C. Corporate-Owned, Personal Use D. -Owned, Business Only E. Bring Your Own Device
A, B, D, and E
Which processes are most likely to be performed by multifunction devices? A. Copying B. Scanning C. Folding D. Stapling E. Printing
A, B, E
Which statements are generally applicable to intel processors when compared to AMD processors? A. Produce less heat B. More compatible with other components C. Consume less power D. Usually less expensive E. Can result in a higher operating cost
A, B, E
Which statements correctly differentiate the 2.4GHz transmission band from the 5GHz band? A. 2.4GHZ transmission can penetrate through obstacles more easily than 5 Ghz B. 2.4 GHz transmission carry farther than 2.4Ghz C. 5 GHz transmission carry farther than 2.4Ghz D. 5 GHz transmission can penetrate through obstacles more easily than 2.4 Ghz E. 2.4 GHz transmissions are more susceptible to interference T. 5 GHz transmissions are more susceptible to interference
A, B, E
Which statements correctly identify reasons why the image on your display monitor may not match the image or a print job? A. Monitors don't truly produce black as a color B. Printers don't truly produce white as a color C. Monitors use the CMYK color palette, while printers use the RGB color palette D. Printers don't truly produce black as a color E. Monitors don't truly produce white as a color F. Monitors use the RGB color palette, while printers use the CMYK color palette
A, B, F
Which statements correctly apply to a cloud-based resource that is shared externally? A. The resource resides within the cloud subscription of the sharing organization B. The resource can be accessed only be external users C. The resource can be accessed by internal or External users D. The resource will only reside on the external user's premises E. The resource will only reside on the external user devices
A, C
Which 802.11 standards used the 5GHz band to transmit and receive? A. a B. g C. n D. ac E. b
A, C, D
a knowledge base is typically constructed from which general components? A. Actions B. Plans C. Outcomes D. Escalations E. Findings
A, C, E
Which types of resources would be at the level of infrastructure as a Service? A. Virtual networks B. Web sites C. Virtual machines D. Mobile apps E. Software applications F. Virtual appliances
A, C, F
Decide which of these statements about SATA and SAS data storage interfaces are true. (Choose all that are true.) A. The SAS interface is more than three times faster than the SATA interface. B. SAS interfaces are expected to replace SATA interfaces for home use. C. The SATA interface is better suited than the SAS interface for use in servers where many users will be using the data at the same time. : D. Because SATA drives are less expensive, higher-volume drives are more common in small offices.
A, D The SAS interface is too expensive to expect that they would replace SATA interfaces for typical home use. The SAS interface is best suited for use in servers because it is able to handle the load of many users accessing data at the same time.
Which issues may cause a web page only to produce a print job in the incorrect orientation? A. Large page elements B. Incorrect driver C. Printer default orientation setting D. Application default orientation setting E. Zoom or scale settings
A, E
Which types of video cables and connectors are also capable of carrying audio signals? B. VGA A. DisplayPort C. DVI-A D. DVI-I E. HDMI
A, E
Which statement correctly applies to a stateful firewall? A. A firewall capable of inspecting packets to intelligently determine context B. A software application that helps to secure individual computers C. A firewall that uses pre-configured rules only D. A hardware device that helps to secure a network E. A firewall capable of detecting and preventing intrusions
A.
Which statement correctly identifies what will happen to a packet that enters a hub? A. It will be forwarded out every other port B. It will be boosted in strength only C. It will be examined for a destination IP address and be passed to another network if required D. It will be forwarded to only the intended recipient E. It will be examined for a destination MSC address and be passed to another segment if required
A.
Internal Resources
Access defined in the cloud Consumed only by other internal resources or users No public access
Proxy Servers
Access server on behalf of clients Coaching, filtering, security Can also be caching servers Dedicated caching servers Can filter content HTTP requests travel through proxy Only device connected to firewall External network connection
External Resources
Accessed by outside applications and services Consumed by internal or external resources Public and Private access
ABS
Acrylonitrile butadiene styrene
Active vs. Passive Heatsinks
Active Uses power supply and fan Often referred to as heat sink and fan (HSF) Liquid cooling Passive No mechanical components 100% reliable Dissipates heat through convection Requires steady airflow
High Availability Models
Active-active deployment Active-standby deployment
Which mobile device synchronization method is proprietary to Microsoft?
ActiveSync
Connection Considerations
Adapter management software Router
Text (TXT) Record
Additional information about a named service Sender Policy Framework DomainKeys Identified Mail (DKIM)
Virtual Memory
Additional memory without adding physical RAM Simulates memory using storage devices Useful when RAM is insufficient Hardware and software implementations Utilizes disk drive to store memory
DNS Records
Address mapping record (a) Ip version 6 address record (AAAA) Canonical Name record (CNAME)
USB Expansion Card
Adds USB ports to a computer Useful when you're running out of ports
VGA mode
Advanced Boot Options (F8) on startup Useful for troubleshooting display issues
AMD
Advanced Micro Devices
ARM
Advanced RISC Machine
ATX
Advanced Technology Extended Motherboard
Printing a Test Page
After initial installation Install included software first
Quad channel memory
All four modules required for full functionality Same capacity and speed When two modules installed, will operate in dual channel mode When three modules installed, will operate in triple channel mode Relies on number of installed modules Depends on system specifications Number of modules will determine channels
How automatic Document Feeders work
All original pages loaded Automatic documents rollers feed pages to be read Pages are fed to an exit tray
Which of the following are advantages of File Servers? [Choose all that apply] A. Backup B. Access Control C. Remote Access D. File sharing E. Security
All the above
Unmanaged switches
Allow for more devices to be physically connected to LAN
Managed Switches
Allow more control over traffic Allow VLANs to be created
Wi-fi NIC
Allows computer to connect to 802.11 wireless networks Utilizes one of the Wi-Fi standards Wi-Fi 5 (802.11ac) Wi-Fi 6 (802.11ax) Commonly integrated into mobile devices
Ethernet NIC
Allows computer to connect to Ethernet based network Often integrated into motherboard Common speeds include 100 Mbps 1Gbps, 2.5 Gbps, and 10 Gbps
Power over Ethernet
Allows power delivery over Ethernet cables Encapsulates the following standards 802.3af 802.3at 802.3bt
Hyper-Threading
Also known as Simultaneous Multi-Threading (SMT) CPU cores split into virtual cores
Punch Down Tool
Also referred to as krone tool Hand tool used to connect network cables to Patch panels Punch down blocks Keystone modules Surface mount boxes
Loopback Plug
Also referred to as loopback adapter Device used to test ports Network USB Serial Parallel
Straight Tip (ST) Connector
Among the most commonly used connector in fiber-optic cabling Uses a Bayonet-style plug and socket Enables unidirectional communication Bidirectional communication requires: Two fiber cables Two ST connectors Design ensures proper alignment for termination and interconnections Suitable for both and multi-module communications
Digital Subscriber Line (DSL)
Amongst the first widely used broadband services Uses existing copper phone lines Download speeds 1 to 500 Mbps Uploads speeds 384 Kbps to 10 Mbps
Upgrading a Laptop HDD to SDD
An effective performance upgrade Most laptops do not have multiple bays Some laptops come with an empty SSD slot Consider the amount of required time Tools and adapters
Which of the following Windows PowerShell cmdlets shows the list of devices which InstanceID contains "ACPI"? Get-PnpDevice -InstanceId *acpi* Get-PnpDevice -Class *acpi* Get-PnpDevice -Class acpi* Get-PnpDevice -InterfaceId acpi*
Answer: Get-PnpDevice -InstanceId *acpi* The Get-PnpDevice PowerShell cmdlet returns the list of installed devices in Windows 10. You have to run Get-PnpDevice -InstanceID *acpi* to get a complete list of devices with "ACPI" in its InstanceID property.
Which is the orientation of the antenna concerning the surface of the earth? Received signal strength indication (RSSI) signal strength Channel Throughput Channel Capacity Antenna Polarization
Antenna Polarization
Dealing with Poor Wi-Fi Performance
Antenna booster Range extender Location
Wireless Connectivity
Antenna types Transmission frequency Environmental considerations
LoJack
Anti-theft security in BIOS Permits electronic tracking
Cellular Connections
Anywhere high-speed access Built in mobile broadband USB stick
Common Web Serves
Apache Internet information services (IIS) NGINX
Ports of protocols
Are associated with a service or program Allow one computer to send and receive many different types of traffic Aid in understanding what to do with received data Allows protocol to be reasonable deduced if sent to a well-known port
Batteries on a laptop
Are easy to replace but refer to manufacturer's specifications
Location of a Patch Panel
Are often rack mounted Commonly 1U or 2U Centrally located
Other troubleshooting considerations
Assess topology OEM specific settings
Riser Cards
Assists in space limitations Permits orientation of cards to be changed Supports up to four cards per slot
Thunderbolt Support
Audio Data Power Video
Cat6a
Augmented version of Cat 6 Less crosstalk Less signal loss Double the frequency of Cat 6 500MHz
AAA Security Framework
Authentication Authorization Accounting
Network Access Control
Authentication and authorization Role-based VLAN assignment
Load Balancing and High Availability
Automatic redistribution of resources Tiered architecture Multiple points of failure
Satellite Merits
Available to businesses without access to landline internet Suitable speed of limited audio and/or video conferencing Provides global coverage
A SODIMM is most likely to be found in which type of system? A. Mobile phone B. Laptop C. Desktop client D. Tablet E. Network server
B
At which voltage does DDR5 memory operate? A. 1.8V B. 1.1V C. 2.5V D. 2.0V E. 1.2V
B
If your wireless network is experiencing interference from another wireless in close proximity, which option is most likely to reduce the level of interference? A. Moving your wireless router closer to the other network B. Changing the transmission channel or frequency of your router C. Moving your wireless router father from the other network D. Placing barriers between your networks E. Changing the security settings of your router
B
Implementing an action plan to resolve a problem should ideally be performed at which time? A. at night b. During maintenance windows C. After approval D. Immediately E. The next day
B
In which use cases would you most likely benefit from using virtual memory? A. When your system has several hard drives installed B. When your system does not have enough RAM installed C. When your system has too much RAM installed D. When you're working on a virtual machine E. When your system is using a multi-boot configuration
B
Over which port does the hyper-text transfer protocol (HTTP) operate? A. 53 B. 80 C. 21 D. 22 E. 25
B
The Platform as a Service cloud computing model would be best suited to which type of environment? A. A large datacenter with enterprise level infrastructure already in place B. A development environment with minimal infrastructure in place C. a team of very mobile users who need centralized access to customer management applications D. A start-up sales-based environment with no infrastructure in place E. A mid-sized environment looking to add more servers without purchasing new hardware
B
What is the main reason for the introduction of IPv6 addressing? A. It is required by Windows 11 B. Number exhaustion in IPv4 D. Use of 32-bit binary addressing system E. Hexidecimal is easier to use than binary
B
What is the maximum bandwidth for DDR4 memory? A. 25600 Mbps B. 25600 MBps C. 12000 Mbps D. 12800 MBps E. 6400 MBps
B
What is the minimum category of twisted pair cabling required to support 1 Gbps bandwidth? A. 5a B. 5e C. 5 D. 6a E. 6
B
What is the overall bus width for a system that uses triple channel memory? A. 32 bits B. 192 bits C. 256 bits D. 128 bits E. 64 bits
B
What is the standard number of wire pairs supported in a single block, of bank of a 110 punchdown block? A. 16 B. 25 C. 8 D. 110 E. 100
B
Which action or operation is not performed by an optical network terminal (ONT)? A. Terminating incoming cable connections B. Modulating or demodulating signals C. Providing ethernet connections to client systems D. Providing wireless connections to client systems E. Providing internet access to client systems.
B
Which diagnostic method can provide a sequence of beeps to help resolve a problem? A. BSOD B. POST C. Failed capacitors D. Overheating E. BIOS
B
Which disk utility of method can be used to restore or repair critical boot files on a storage drive? A. Format B. Bootrec C. Diskpart D. chkdsk E. smart
B
Which system component or process represents a diagnostic routine that is performed each time a system boots up? A. TPM B. POST C. BIOS D. UEFI E. CMOS
B
Which type of DNS record used to specify which email server will accept incoming messages? A. TXT B. MX C. A D. NS E. AAAA
B
Which type of USB connector does not differentiate between the computer end, and the device end? A. Mini B. Type C C. Type B D. Type A E. Micro
B
Which type of USB connector was most commonly used on the device end of a printer? A. Mini B B. Type B C. Micro A D. Micro B E. Mini A F. Type A
B
Which type of VDI model is being used if a user always receives the same virtual desktop when they establish their connection? A. Stateless B. Dedicated C. Pooled D. Non-persistent E. Shared
B
Which type of cloud model would be most appropriate for an enterprise-level organization with a large datacenter, considering expansion by implementing additional but smaller branch offices? A. Community B. Hybrid C. Private D. Public
B
Which type of motherboard connector supported throughput speeds of up to 64 GBps? A. PCI B. PCIe x16 C. PCI-X D. PCIe x4 E. PCIe x8
B
Which type of wiring standard completely reverses the pin configuration from one end of the cable to the other, so that wires 1 to 8, connect respectively to pins 8 to 1? A. T-568A B. Rollover C. T-568B D Crossover E. Straight-through
B
You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. Which of the following command will you use on the global configuration mode? A. terminal voice vlan 10 name VOICE B. configure terminal vlan 10 name VOICE C. configure terminal vlan-voice 10 name VOICE D. terminal vlan voice 10 name VOICE
B
Which statements are false about the GPT partitioning system? (Choose all that apply.) A. It supports up to 128 partitions. B. It can only be installed on drives that are larger than 2 TB. C. It keeps a backup copy of the GPT table. D. contains the legacy MBR system for backward compatibility.
B and D GPT can support up to 128 partitions and keeps a backup copy of the GPT table. Although it is equipped to handle the situation when BIOS is expecting an MBR system, GPT does not actually support MBR. GPT can be installed on any size hard drive, but it is more expensive than the MBR system.
Which printer cleaning and maintenance tasks should be performed most often to ensure optimal printing results? A. Visual calibration B. Print head alignment C. Cleaning print heads D. Monitor calibration E. Resetting the device to factory default
B, C
Which statements are true about TCP and UDP? (Choose all that apply.) A. TCP is generally faster than UPD. B. establishes a session between source and destination before it sends data, and UDP sends data without first establishing a session. C. TCP guarantees delivery and UDP does not. D. UDP is used on the local network but not on the Internet; TCP works on both the local network and the Internet.
B, C TCP is the protocol to use when guaranteed delivery is important—but speed is sacrificed to guarantee that delivery. Data delivery is guaranteed with TCP because a session between source and destination is first established so the source can verify the data was received and resend if necessary. Both UDP and TCP can work on local networks and the Internet.
Which common printer issues would be considered to be mechanical problems? A. Incorrect driver B. Paper jam C. Power adapter failure D. Paper tray E. Cable issues
B, D
Which type of expansion cards would likely be found in professional situations where the integrated components would not be sufficient? A. Network interface card B. Video card C. USB expansion D. Sound card E. Modem
B, D
What are the advantages of using a Windows Workgroup? [Choose two that apply] A. Permissions are managed by group policy B. Users decide who shares a resource C. Requires a Windows Domain Controller server : D. Easy to setup E. Central control of user profiles
B, D Windows Workgroups are popular with small businesses and home networks. They are easy to setup, and resources are shared at the discretion of the owner or creator of the resource, not of a central authority or network administrator. Workgroups do not require extensive use of permissions and do not require a domain controller.
At which layers of the OSI model do network interface cards operate? (Choose two) A. Network B. Data Link C. Application D. Transport E. Physical
B, E
Automatic document feeders can be used to enhance the performance of which processes other than feeding in multiple sheets of paper to a multifunction device? A. Scanning to a shared folder B. Rapid collection of information C. Scanning to email D. Scanning to the cloud E. Rapidly digitizing information
B, E
What is the maximum wattage that can be supplied to a device using Power over Ethernet? A. 30 B. 100 C. 7 D. 60. E. 4
B.
Which characteristic about a wireless signal would you be unable to determine by using a WiFi analyzer? A. The effective coverage area B. The password or passphrase C. The channels being used D. The network name E. The frequency being used
B.
Preparing to Replace a System Drive
Back up data Create recovery disk Have the right tools
storage Resiliency
Backup Replication Recovery
BGA
Ball grid array
Terminology
Bandwidth Throughput Latency
802.11b
Bandwidth up to 11 Mbps 2.4 Ghz frequency Susceptible to interference
802.11a (wireless networking)
Bandwidth up to 54 Mbps 5.725 to 58.850 Ghz frequency Less effective penetrating solid objects also referred to as Wi-Fi 2
BIOS
Basic Input/Output System
Dynamic Host Configuration Protocol (DHCP)
Basic information IP address Subnet mask Default gateway DNS server IP address Lease duration alternative to static configuration
Complementary Metal-Oxide-Semiconductor (CMOS)
Battery power for stored settings Provides power when the system is off
When is a site survey done for a wireless network? During deployment Before deployment At each step of deployment Post deployment
Before deployment A wireless site survey is conducted before you deploy a wireless network. You want to deploy an optimized wireless network that provides good throughput and speed with minimum interference. Without a wireless site survey, it is not possible to achieve this. With the help of a site survey application or a hardware analyzer, you can determine the best location for your wireless routers and access points. A site survey should never be done during, post, or at each step of deployment. It should always be done before wireless network deployment.
Understanding Performance Comparisons
Benchmarks measure performance Not necessarily noticeable in real-world applications
Solid State Drives (SSDs)
Better access time Greater reliability Less power More quite Smaller footprint
Using What was learned
Better focus Future problems Documentation Steps taken to resolve problem
Accounting Uses
Billing Usage analysis Control of authorization Planning
Which of the following are power issues that you may need to consider? Surges Purges Blackouts Brownouts
Blackouts Brownouts Surges
What type of communication requires that devices be paired with each other before thy can communicate?
Bluetooth
BIOS/UEFI Configuration Options
Boot from other devices Secure boot Fan speed or temperature monitoring options Boot password
Bridge vs router
Bridge Works on OSI layer 2 MAC address Will always forward packets to same destination over same routers Transparent to the network devices Router Works on OSI layer 3 IP addresses Will intelligently select route for packet Visible to network devices
Causes of Wireless Interference
Building materials and objects Router location Distance People
Types of Touch screens
Built-in standalone
Integrated Print Servers
Built-in capabilities Print directly to device Job queuing Job management
An integrated Wi-Fi antenna in a laptop is typically implemented in which manner?
Built-in to the display
Community cloud
Business communities Infrastructure sharing Private cloud space Ideal for joint projects
A print server component allows or enables a multifunction device to perform which tasks? A. It enables the multiple functions of print, scan, copy and fax B. It allows users to connect to the device wirelessly C. It allows for multiple jobs from multiple users to be submitted and managed D. It allows for the device to connect to the network using an IP address E. Print local jobs for the print server only
C
After Identifying all probable causes of a problem, which step should you follow? A. Consider infrastructure changes B. Escalate the problem. C. Rank probable causes D. Brek the problem down into smaller steps E. Consider environmental changes
C
An image is produced b a thermal printer in which manner? A. Toner is fused to the paper B. A print head strikes a ribbon C. Heat sensitive pigments are embedded in the paper D. Ink is sprayed on the paper E. Filaments are applied to the paper
C
In which scenario would you be most likely to use a toner and probe? A. When you need to verify the internal wiring of a cable B. When you need to connect bare wires to a patch panel C. When you need to identify unknown endpoints of a cable run D. When you need to verify if a cable is broken E. When you need to install a connector on the end of a cable
C
Other than changing ink cartridges, which component will most likely require servicing or maintenance on an Inkjet printer? A. Belt B. Stepper motor C. Print heads D. Imaging drum E. Stabilizer bar
C
The printer control language format is generally not supported by which operating system? A. Unix B. Microsoft C. Mac E. Linux
C
Which RAID configuration is typically implemented with 2, and only 2 disks? A. 0 B. 2 C. 1 D. 5 E. 1+0(10)
C
Which component of feature of a CPU will allow an operating system to perceive virtual or logical processors? A. Single core B. Dual core C. Hyper-threading D. Over-clocking E. Multi core
C
Which factor would be considered to represent the most significant risk to an organization's network when using a legacy system or device? A. Cost B. Maintaining compliance C. Maintain security D. Lack of support E. Migrating data
C
Which feature of a multifunction device can allow an administrator to determine the details of a particular print job such as the identity of the user who submitted the job, and the date and time? A. Basic user authentication B. Secured print jobs C. Print job logs D. Print reports E. Advanced user authentication
C
Which print quality issue is indicated by lines appearing on the page? A. Color mismatch B. Blurring C. Banding D. Outdated driver E. Smearing
C
Which security feature was more commonly implemented in devices such as vehicles to allow them to be tracked if stolen? A. TPM B. Secure Boot C. LoJack D. BIOS security E. BIOS password
C
Which service should be restarted on a Windows computer if you suspect the print queue has stalled? A. The log service B. File and print services C. The spooler service D. The queue service E. The printer service
C
Which statement correctly aligns with how virtual machine resource requirements should be determined? A. Virtual machines require minimal resources, allocate only what the physical host system requires B. Allocate only what the physical host system requires, plus enough to run the virtualization software C. Virtual machines require the same resources as physical systems D. Virtual machines require fewer resources that physical systems E. Virtual machines require more resources than physical systems
C
Which statement correctly applies to a trusted platform module (TPM)? A. A method of protecting the boot integrity of a system B. A method of ensuring that unauthorized users do not make changes to BIOS/UEFI configuration C. An integrated component used to provide encryption and security D. A method of being able to track a device if stolen E. An external device used to provide encryption and security
C
Which type of VPN would be best suited when two branch offices with many users need to maintain a persistent connection to each other? A. Host-to-site B. Host-to-host C. Site-to-site D. Site-to-host
C
Which type of test page will provide information such as the driver version and date being used? A. An alignment page from the device B. A page produced directly from the device C. a page from within the printer interface of the operating system D. A document from within a software application such as a word processor
C
Which utility can be used to help locate or troubleshoot the cause of an IP conflict in a networked environment? A. SSID B. DHCP C. Ping D. Tracert E. DNS
C
Which value represents the threshold for an acceptable level of network jitter? A. Below 10 ms B. Below 50 ms C. Below 30 ms D. Below 40 ms E. Below 20 ms
C
Which of these are NOT used in IPv4 addressing? A. Name Server B. Default Gateway C. MAC Address D. IP Address F. Subnet Mask
C IPv4 addressing happens at Layer 3, the Network layer of the OSI model. MAC addressing happen at Layer 2, the Data Link Layer, in the Media Access control sub-layer. While every computer that has an IP address also has a MAC address, the MAC address is not part of IPv4.
Which statements are correct about TCP vs. UDP? A. TCP is fast and reliable, UDP is slow and unreliable B. UDP uses a three-way handshake and acknowledgments C. UDP is faster, but less reliable D. TCP is slower, but more reliable E. TCP uses a three-way handshake and acknowledgments
C, D, E
Which steps of resolving a problem would be external research? A. Considering the most obvious cause B. Determining possible links C. Consulting industry or academic literature D. Considering other possible causes E. Consulting a vender knowledge base
C, E
Software defined networking is conceptually similar to which other type of computing architecture? A. Network security B. Wireless networking C. Virtual machines D. Cloud computing E. Virtual private networks
C.
Which group is necessary to impose permissions and rights onto users? A. Power Users B. Cryptographic Group C. Security Group D. Distribution Group
C.
CDV
CD for Video
Common CD types
CD-Read-Only CD-Recordable CD-Rewritable CD-ROM extended Architecture CD for Video (CDV)
Diagnostic/Recovery tools
CHKDSK DISKPART FORMAT Bootrec File recovery tools
Causes of Latency
Cabling Propagation Congestion Routers
Hardware Security Modules (HSM) Security
Can be added to a system External device Network connection RSA key
Stateless Firewall
Can be performed quickly Generally cheaper Use present rules based upon source addresses, destination addresses, and ports Unable to determine context
TPM Security
Can't be installed in older systems Trust manager for a system RSA key Can protect other keys
Which type of portal is used for wireless client authentication? Authentication RADIUS Captive Acceptable Usage
Captive A captive portal is an authentication method for a wireless network. If you have ever attempted to connect to a wireless network in a hotel or at the airport, you can connect to the wireless network without any authentication. Even though you are connected, when you attempt to browse the Internet, you are redirected to a captive portal, which requires authentication to browse the Internet. You do not have an Authentication portal. RADIUS is a centralized authentication method used in WPA2-Enterprise. Acceptable Usage is a type of document or policy that is typically used in Captive Portals.
Document Findings
Capture results Determine probability of reoccurrence Docement thoroughly Successful and failed actions The more information collected the better Problem and root causes Users affected History of equipment Corrective measures Preventative measure Record positive and negative outcomes Make available to others Centralized knowledge base Searchable database Wiki
Enabling Informed Decisions
Capture the bigger picture Correlate use to business needs Adjust resource utilization
Cat 6 Transmission Limitations
Cat 6/6a Length limited to 55 meters in normal conditions Length limited to 33 meters in adverse conditions
CRT
Cathode Ray Tube
Cellular
Cellular networks are the networks over which mobiles phones operate Referred to as 'cellular' as the network is split into cells Provides voice and data Good coverage area High-speed
Device Setup and Management
Centralized device Management Implementing secure protocols
Two chips
Channel A and B Improved performance
Wireless Considerations
Channels Security protocol Network SSID Range extenders Interference
IP Address
Check NIC IP address Check for APIPA address (169.254) --- always begins with this
Identifying Port Flapping
Check system logs Review up and down entries
Maintaining Printers
Cleaning print heads Print head alignment
Common applications
Client relationship management Financial management Human resources management
File Servers
Client/server model Central storage and file management Files can be accessed by computers on same network
Web Servers
Client/server model Deliver content over Hypertext Transfer Protocol (HTTP)
Use case for a Protocol
Clients that need to communicate to a web server. Must have the same protocol installed
Desktop Vs. Laptop CPUs
Clock speed Power consumption Cooling Cores
Key Considerations with Thermal Bubble method
Clogged heads Automatic and manual cleaning process Print heads are very delicate
Using a Cloning Toll
Clone old drive to an external or network dr Replace old drive with new drive Restore cloned image to new drive
Scan to Cloud
Cloud based documents are easily sharable and accessible Requires network connected multifunction device Device must support intended cloud service
Infrastructure-as-a-service (laaS)
Cloud provided infrastructure Hosted components Low-level reources Little or no on-premises hardware
CDMA
Code division Multiple Accuse
CCFL
Cold Cathode Fluorescent Lamp
Fluorescent LED backlighting
Cold cathode fluorescent light (CCFL) or Light emitting diodes (LEDs)
Supervisory Control and Data Acquisition (SCADA)
Collects and analyzes real-time data Monitoring and controlling operations
Color Settings
Color Greyscale Color saving
Color Issues and Blocked Nozzles
Color issues Poor color representation Missing colors Clean print head nozzles Replace ink cartridges Blocked nozzles Use lower capacity ink cartridges Clean print head
Monitor Calibration
Color on-screen vs. printed Monitor and image color won't match Factory settings colors don't render properly What you see Glossy vs. Matte display Monitor settings May need manual calibration
Inkjet Printers
Color/B&W Ink cartridge Quality Print nozzles
Laser Printers
Color/B&W Toner Drum/fuser
Sockets
Columns and rows of holes Zero insertion force (ZIF) sockets
Hybrid cloud
Combination of public and private clouds Supplements existing resources
Diagnosing Network issues
Command line interface (CLI) tools GUI-based tools
3.5 inch HDD
Common in desktop systems Easy to install cost-effective Increased capacity Available interface
2.5 Inch HDD
Common in laptops Can be used in desktops Lower capacity Slower data transfer rates Less heat and noise
Liquid Crystal display (LCD)
Common in laptops and flat panels Replaced older, bulkier cathode ray tubes (CRT) Produces clear color images
Router
Common issue with VoIP Purchase a VoIP router
USB to Ethernet
Commonly found in newer laptops equipped with: SSD drives Thin profiles Eliminates the need to have a port for an RJ-45 cable on the laptop itself
Category 5 Cable
Commonly referred to as Cat 5 Twisted pair cable Provides speeds up to 100 Mbps Also carries telephone and video signals Replaced by the 5e
DB-25 Connector
Communication ports, Printers, Audio Connections, Broadcast and Video
DE9 (DB-9) Connector
Communications Ports. Token Ring network connectivity. Legacy Computer mouse connector
Patch panel types
Comon amount of ports includes 12 24 48 Potentially more! Specifications CAT5e CAT6 CAT6A CAT7 Fiber
CD
Compact Discs
Potential Issues with legacy Systems
Compatibility Integration with modern systems Compliance
Web Server Considerations
Compatibility Security Integrated tools
CMOS
Complementary Metal-Oxide-Semiconductor
LGA and PGA CPUs
Compression force Zero insertion force (ZIF) Spring-loaded lands
Overclocking
Configure CPU to run at higher than official clock speeds Not recommended
DHCP scopes
Configured on the DHCP server to specify the range of available IP addresses that cab be allocated to clients Configure scope to allow or deny clients from IP addresses Filter based on Name MAC address Operating system
Network Interface Cards (NIC)
Connect computer to network Unique hardware address (MAC)
Passive Hub
Connect computers together on a physical level Do not strengthen signal Will not increase range of network
What are switches
Connect devices on a network together Receive and forward data between devices are used with a LAN
Routers
Connect networks together Forward data based upon destination IP address Allow multiple device to use same internet connection
Network Traffic Access Point (TAP)
Connect to a specific point in a network Access data for testing or troubleshooting Monitoring of Network traffic between two points
Display port
Connect video source to display Video Electronics Standards Association Packetized data transmission Capable of carrying audio signals
Mobile Hotspot (Tethering)
Connecting to mobile device. Enables a network connection. Process Connect the laptop using a USB/charging cable Enable hotspot on the mobile device Laptop recognizes phone as a modem
DSL Features
Connection had to be established Uses local or wireless connections Provider infrastructure
Transmission Control Protocol (TCP)
Connection-oriented protocol A three-way handshake is completed before any data is transferred Delivery is guaranteed, lost packets are retransmitted Used by protocols such as HTTPS, SSH, and SMB
User Datagram Protocol (UPD)
Connectionless
Local Area Networks (LAN)
Connects devices to enable data and resource sharing Uses private addressing scheme Connected by switches Very fast data transmission Easy design and maintenance
Wireless Access Point
Connects to a wired network device such as a switch or router Allows wireless clients to connect to the wired network and access resources Handles large numbers of wireless clients Can be powered by Power over Ethernet (PoE)
Long-range Fixed Wireless Access
Connects two fixed locations Enables data communications Alternative to installing cables between sites
Memory Upgrade Considerations
Consult motherboard user guide Determine how much memory you're using Modules from different vendors can be mixed
Near Field Communication (NFC)
Contactless communication Common in smartphones and tablets Devices exchange data automatically Limited range Device's must be close Security
What are some features of lightning cables
Contains 8 pins per side. Cant be inserted upside down
How GPS works
Contains internal atomic clock. Sends time-stamped frequency signal. Receiver chip determines satellites. Gathers data from strongest signal
High Availability
Continuous operation without failure Implementing redundancy Amount of time a service is available Amount of time a system takes to respond Percentage of uptime Recovery time Maintenance Single point of failure (SPOF) Failover Failure detection
What aspect of picture quality is always higher with an OLED screen, due to the inability of an LCD screen to produce this feature?
Contrast ---- producing true black
Firewalls
Control inbound and/or outbound network or host traffic Use rules to allow or deny traffic Are implemented with hardware or software Can store session state for stateful filtering Can packet filter based upon ports or IP address
Key considerations for measured services
Control resource usage Metering capabilities and measurement tools Usage details Service charge tracking
An inverter provides which functionality for an LCD screen?
Converts power for a cold cathode fluorescent light (CCFL)
Cleaning Laser Printers
Corana wires Toner guard Paper feed rollers Fan vent
Resolving Problems
Corporate policies Corporate procedures Possible impact Changes Formal process Change management Develop a change plan Determine risks Develop backup and rollback plan Test changes in sandbox Ensure steps are documented
Advantages of Optical Fiber
Cost Capacity Lifespan Speed
Disadvantages of SSDs
Costly Lower capacity Little warning of impending failure Shorter lifecycle than HDD Not suitable for archiving
Wi-Fi Analysis
Coverage Bandwidth and speed Connectivity Security
Metropolitan Area Networks (MAN)
Covers area larger than LAN, but smaller than WAN Covers a regional geographic area Designed for high-speed connectivity Hard to design and maintain Lower fault tolerance
Wide Area Networks (WAN)
Covers large geographic area supports high speed Relatively expensive to implement Two types -- switched WAN and point-to-point WAN Challenging to design and maintain
You have several visitors who come to your office every day and connect to the corporate wireless network. You want to secure the wireless network and limit wireless network access for the visitors. They should not be able to connect to the systems on the corporate wireless network. Which method should you use? Restrict the visitors from connecting to the wireless network Segment the wireless network Create a guest wireless network Install antivirus on each wireless client
Create a guest wireless network
What is the first step of replacing a hard disk drive, or a solid-state drive should be performed during the preparation stage?
Create a recovery disk Back up data
Scan to Shard Folder Workflow
Create a shard folder Set SMB server settings Register SMB server to the device Send the scanned documents to the SMB server
Extender
Creates a new wireless network Can be wired to the existing network More complex to install
If a DDR3 memory module is labelled "DDR3-1600", to which value does the 1600 refer? A. Physical size B. Version C. Bandwidth D. Million transfers per second (MT\s) E. Clock speed
D
If every user connected to your network is reporting very slow speeds and poor connectivity, which step should you attempt first to resolve the problem? A. Replace the router B. Update the router firmware C. Run a speed test D. Reboot the router E. Reboot all client systems
D
If your system supports dual channel memory, and has four physical slots, in which configuration should the memory modules be installed if you only have two modules? A. Both in channel A B. Only one in channel A C. Both in channel B D. One in channel A, and one in channel B E. Only one in channel B
D
In which scenario would you be most likely to use a punchdown tool? A. When you need to remove the protective jacket of a cable B. When you need to identify unknown endpoints of a cable run C. When you need to install a connector on the end of a cable D. When you need to connect bare wires to a patch panel E. When you need to verify if a cable is broken
D
Security consideration for a virtualized environment should be approached from which perspective? A. Treat the host system as the only security concern B. Treat the host system and all virtual machines as a single security concern C. Treat all virtual machines as a single security concern D. Treat each virtual machine, and the host system as independent security concerns E. Treat each virtual machine as an independent security concern
D
What is the most likely cause of a mobile device losing all connectivity to other devices and/or networks? A. Unresponsive touchscreen B. Overheating C. Battery issue D. Accidental activation of airplane mode E. Too many running apps
D
What is the primary benefit of using shielding in twisted pair cabling? A. Increased bandwidth B. Less prone to damage C. Decreased cost D. Less susceptible to interference E. Extended cable length
D
What is the typical transmission rage of devices using NFC? A. 400 meters B. A few kilometers C. 30 feet D. A few inches E. A few feet
D
Which channels are recommended to use for a wireless device using the 2.4GHz transmission band? A. 36 B. 40 C. 2, 7, and 12 D. 1, 6, and 11 E. 100
D
Which device setting determines the overall quality of a print job? A. Collate B. Orientation C. Greyscale D. Dots per inch E. Duplex
D
Which platform does not natively support the use of Syslog server? A. Unix B. Linux C. Mac OS D. Microsoft
D
Which setting for a system running Windows may allow a legacy printer to have an extended lifespan? A. Reinstalling the original driver after updating Windows B. Updating Windows C. Updating the driver D. Compatibility mode E. Using the driver from the OEM website
D
Which statement best describes the functionality of a patch panel? A. A device used to extend the range of a wireless network B. A device used to connect individual computers together C. A device used to connect networks together D. A device used to terminate network cables in a central location E. A device that provides network security
D
Which statement most accurately defines the configuration, or the features of a virtual local area network? A. A private connection between two points using the internet as the means to connect B. A method of automatically distributing IP addresses to client systems C. A means to connect an internal network to an external network such as the internet D. Network divisions configured by using software on switches E. A means to resolve IP addresses to names
D
Which type of connector may have been more expensive to implement on a fiber optic cable itself, but could result in cost savings due to its more efficient size? A. Subscriber connector B. Straight tip C. Square connector D. Lucent connector
D
Which type of internet connection currently supports the fastest speeds and most combined services? A. Satellite B. DSL C. Cable D. Fiber Optic E. Cellular
D
Which type of signal is not supported by a Thunderbolt cable? A. Video B. audio C. Data D. Network E. Power
D
Which type, or specification of cabling must be used if the cable is being run between the celling of one level, and the floor of another? A. Cat 5 B. Cat 6 C. Coaxial D. Plenum E. Cat 5e
D
Which of the following addresses have a slash notation of /24? A. Class B B. Class D C. Class A D. Class C
D Class C addresses have a slash notation of /24. Class A addresses have the slash notation, /8. Class B addresses have the slash notation, /16. Class D was used for multicast addressing.
Which components or configuration options need to be in place to enable the scan to email feature of a multifunction device? A. A cloud services subscription B. SMB to be enabled between the device and the server C. A shared folder D. Port 25 to be enabled between the device and the server E. an SMTP server
D, E
Which scenarios may increase the frequency of paper jams? A. Misaligned print heads B. Incorrect driver C. Too many jobs in the print queue D. Incorrect paper size E. Damp paper
D, E
An RJ-11 connector would likely be found in use with which devices or services? A. DSL internet B. Cable internet C. Fiber optic networks D. Ethernet networks E. Modems F. Phones
D, E, F
DB9 Characteristics
DB = D-Subminiature, or D-Sub, or DB Uses a 9-pin configuration in two rows (5x4) Serial data transfer Rarely used with modern devices Largely superseded by USB and other interfaces
Video Graphics Array
DB-15 connector type 15 pins/sockets in 3 row or 5 Characteristics: Analog signal Distance Degradation
SODIMM Versions
DDR DDR2 DDR3 DDR4 DDR5
DHCP
DHCP discover DHCP server DHCP scope, subnet, mask, options DHCP reservations DHCP request DdHCP lease
DDR4
DIMM and SODIMM Twice the speed of DDR3 288-pin DIMM or 256-pin SODIMM Incompatible with previous versions Bus clock speed between 1066 and 2133 MHz Bandwidth between 12800 and 25600 MB\s MT\s from 1600 to 3200
Protocols that utilize UDP
DNS Real-life transport protocol (RTP) Dynamic host configuration protocol (DHCP) Voice over internet protocol(VoLP) Trivial file transfer protocol (TFTP)
Cable vs DSL Modems
DSL Runs over phone lines Speeds highly dependent on distance Commonly available with speeds between 5-100 Mbps Cable Runs over coaxial cables Speeds between 50 Mbps and 1 Gbps Often has a hybrid of fiber and copper coaxial on backend
Bus Pathways
Data Control Address
Single Channel RAM
Data flow between CPU and RAM (memory bus) 64-bit memory bus or channel if one channel and two chips, channel is shared Chips must share single channel Memory addressed separately
ECC Memory
Data integrity vs. processing speed Sometimes it's better to slow things down
Fiber Optic Cabling
Data is transmitted by using pulses of light Transmission over great distances Highly secure data transmission Not affected by electrical or radio interference
Syslog Considerations
Data management Different than Simple Network Management Protocol (SNMP) Syslog versions
Advantages of Virtual Desktops
Data resides on server or in cloud Enhanced security Ideal for application testing Issues or problems are contained Compatibility for legacy systems
Near-Field Communication (NFC)
Data sharing, Short distance. Radio-frequency identification
Examples of Internal Resources
Data used only by cloud-based virtual machines Cloud database that drives cloud-based applications
Common Symptoms with display devices
Dead pixels Artifacts Blank screen Corrupted color Overheating Flickering screen Faded light Burn-in Distortion
Removing Residue within the Thermal Printer
Debris collects from moving paper and dust Use of compressed air and damp cloth Use of special vacuum cleaners
Types of Print Servers
Dedicated Network Devices Client computers
Types of File Servers
Dedicated Non-dedicated
Hardware Firewall
Dedicated hardware Runs specialized software Placed between your network and an untrusted network
Storage Are Network (SAN)
Dedicated high-speed network Allows network access to high-performance storage Composed of devices connected with assorted technologies, protocols, and topologies Storage appears local to the host Can span multiple sites
Types of Authentication Servers
Dedicated server Ethernet switch Wireless access point Network access server
Data Privacy Considerations
Defining users and/or groups Users versus administrators Setting rights and permissions
Network Jitter
Delay in sending packets Network congestion Changing routes Real-time communications VoIP, video conferencing
Freeing up space
Delete unnecessary files Reinstall OS Use old HDD as a secondary drive
cipher /w:E:\ What does this command do on a Windows computer?
Deletes data on a NTFS drive
Disadvantages SaaS
Dependence on third party Data security Potential billing issues Changes to services
Serial Cables
Designed for low-speed telephone modem communication Also used for; Keyboard mouse Mainly replaced by USB
USB Connector Characteristics
Designed to carry both data and power over a single connection Currently three generations 1.x, 2.0, 3.x Hot-pluggable, any device can use any receptacle, with little to no device configuration
Dual Core CPUs
Designed to improve performance A 2nd processing core added One physical chip
DaaS
Desktop-as-a-Service
Replacing a Wireless card
Detach antenna Install new card Install driver if needed
Supplementary Services
Detailed billing Monitoring Log access Security Load balancing High availability
Identifying Causes
Determine most likely cause Identify all possible causes Rnak probability Escalate problems
Troubleshooting Intermittent Wireless Connectivity
Determine the scope Try a known working device or address Determine resource availability
Test the Theory to Determine Cause
Develop theory based on most likely cause If cause is confirmed, move on If cause can't be confirmed, start over Don't jump to conclusions Consider alternatives Test until correct cause is identified Address the correct problem Avoid addressing things that aren't the problem Verify your results Submit plan for approval Escalate if necessary IF problem persists, start again Reevaluate the problems and causes Develop new theories Escalate to form a complete plan Ongoing process
Information Technology Extended (ITX) Motherboards
Developed by VIA Technologies Family of motherboards
Which Control Panel utility allows users to add hardware to the computer, disable hardware and update drivers? System Device Manager Network Sharing Center Devices and Printers
Device Manager Devices and Printers
Which of the following tools have the capability to disable and enable a device in Windows 10? Select two answers. Programs and components snap-in System Configuration Manager Device Manager System Information snap-in Windows PowerShell
Device Manager Windows PowerShell
Location Services
Device actively calculating current location. Commonly using satellites. Often using a combination of internet connectivity and cellular data
A lightning cable uses which process to determine that it is being used with a genuine Apple product?
Device authentication
Mobile Device Management Features
Device configuration Remote wipe Password enforcement Device tracking Data encryption Allowlist/blocklist
How PCL works
Device dependent Utilizes printer hardware Print job is processed quickly Printer is responsible for processing data
Heatsinks
Device for cooling system components Many use fans Required for most systems Overheating can permanently damage components
How PostScript Works
Device independent Does not utilize printer hardware Print job is processed more consistently Can produce higher quality than PCL
Check log files
Device logs Operating system logs
Connecting to Networks
Different types of networking standards Ethernet 802.11 Wi-Fi Computers require a way to connect to network The NIC provide the means
Biometrics Security Devices
Difficult to compromise Fingerprint scanners Facial reignition Iris scanners Voice recognition
Screen Display and Color Output
Difficult to match How accurate you need to be Text vs. graphics Calibration and adjustments
DSL
Digital Subscriber Line
DSL
Digital Subscriber Line Modem
DVD
Digital Versatile Disc
Digital Versatile Disc (DVD)
Digital optical storage Introduced in 1995 Common formats Movies and gaming early adopters
High Definition Multimedia Interface (HDMI)
Digital video and audio interface Connectors Type A (19 pins) Type C (19 pins) Mini-HDM Smaller devices
Common symptoms of Mobile Devices
Dimly lit display Flicking display No display Power/battery issues No/weak wireless connection Unresponsive touchscreen Apps won't load No Bluetooth No GPS Slow performance No sound System freezing
Troubleshooting Latency
Disconnect devices Restart systems Use network monitoring tools Check destination
DHCP Process
Discover Offer Request Acknowledge
Wi-Fi Analyzer
Discover Wi-Fi problems and optimize performance Test antenna location and device configuration
Error Correcting Code (ECC) Memory
Discover and correct single-bit memory errors More reliable from non-ECC memory Requires more processing power
Power-On Self-Test (POST)
Disk Drives Display CPU Memory
Factors Affecting Wi-Fi Range
Distance from access point Traveling through solid objects Amount of power
Synchronization
Documents stored in the cloud Local copies can be saved on user devices User can make changes to local cope offline Changes are synchronized when user is online
802.11 Adhoc mode
Does not use an access point Direct device-to-device link
DMARC
Domain-based Message Authentication, Reporting & Conformance (DMARC) Protects against Phishing and spoofing Uses SPF and DKIM to check message authenticity Helps mail systems to identify what to do with email that fail SPF/DKIM checks
Overview of Impact Printers
Dot-matrix printers Pins strike an ink saturated ribbon Paper is marked by the pin strike Ideal for making copies Better suited for text Cost effective
DPI
Dots per inch
DDR
Double Data Rate
A stylus is most likely to be used with which type of device?
Drawing pad
Test Page information
Driver version and data Printer model and configuration settings Printing styles and fonts
Printer Firmware
Drivers Firmware
External Microphones
Drivers/Apps USB connection PC audio jack Mini-plug adapter
Packets
Dropped packets Delayed packets Errors in packets
Other key settings considerations
Duplex versus collate Portrait versus landscape orientation Printing quality
DHCP
Dynamic Host Configuration Protocol
DHCP
Dynamic host configuration protocol
255.255.255.0 would represent which value of a complete IP address configuration? A. DNS server B. IP address C. APIPA address D. Default gateway E. Subnet mask
E
A 20-pin Molex connector would be used to supply power to which component of a desktop computer? A. Optical drive B. Graphics card C. Hard drive D. CPU E. Motherboard
E
A firmware update might be able to address or correct issues with which components of the printing process? A. The operating system of the host computer B. The printer software applications supplied by the vender C. The diver D. The software applications being used to submit print jobs E. The printing device
E
After testing a theory and evaluating the results, the issue is not resolved, what is the next course of action? A. Escalate the issue B. Verify your results C. Submit your play for approval D. Develop a plan of action E. Develop a new theory
E
An F connector would likely be used with which device? A. iPad B. Portable speaker C. iPhone D. UPS E. Video surveillance camera
E
During your investigation of a device that has lost its connectivity to your wireless network, you discover the adapter has been assigned an IP address of 169.254.50.80. What does this indicate about the status of your network device? A. The equipment from the service provider has failed B. The adapter on the device is being managed by conflicting applications C. The device and the access point are set to use different frequencies D. The signal strength is too low E. There is a problem with the DHCP server
E
For which purpose would the implementation of virtual machines typically not be used? A. System backup B. Running multiple operating systems C. Business continuity D. Testing new software E. data backup
E
If a user indicates that they are not able to access a resource, but you as a tech support member are able to access the same resource, in which state should you consider this issue? A. Resolved B. Escalated C. Verified D. Tested E. Unresolved
E
If your system supports quad channel memory, and you have six physical memory modules, which is the optimal channel configuration that should be used? A. Not supported B. Single channel C. Quad channel D. Double channel E. Triple channel
E
What is the maximum storage capacity for a typical compact disc (CD)? A. 4.7 gigabytes B. 1.44 megabytes C. 25 gigabytes D. 17 gigabytes E. 650-700 megabytes
E
What is the overall bus width for a system that uses single channel memory? A. 32 bits B. 128 bits C. 192 bits D. 16 bits E. 64 bits
E
What level of frequency and duration indicates that port flapping is happening on a networking device? A. Three times a minute, for at least one hour B. Three times a second, for at least one minute C. Three times an hour D. Three times a day E. Three times a second, for at least ten seconds
E
What would be a primary consideration if you are using a USB to ethernet adapter on a network that provides 1 Gbps bandwidth? A. if the adapter uses a shielded cable B. The connector type for the ethernet cable C. The USB connector type D. The power rating of the USB interface E. The version of the USB interface
E
Which component of a HCP implementation determines the validity period of an IP address configuration? A. Scope B. Reservation C. Discover D. Request E. Lease
E
Which component of a laser printer will most commonly require replacement? A. Laser scanning unit B. Corona wire C. Imaging drum D. Fusing rollers E. Toner cartridge
E
Which component of virtualization separates the virtual machines from the underlying hardware of the host system? A. Host operating system B. Guest operating system C. Virtualization software D. Host server E. Hypervisor
E
Which component or characteristic of a service or a solution is addressed and/or removed when a high-availability solution is implemented? A. Failover B. Resilency C. Failure detection D. Recovery E. Single point of failure
E
Which connectivity method would be most suitable for a wireless printer that is being connected to an existing network environment? A. 802.11 ad-hoc mode B. Ethernet C. Bluetooth D. USB E. 802.11 infrastructure mode
E
Which latency value indicated the amount of time it takes before a server receives a request from a client device? A. RTT B. QoS C. Congestion D. Propagation E. TTFB
E
Which statement correctly describes the characteristics or rapid elasticity? A. An administrator provisioning additional resources to a system or service based on usage history B. A resource that can survive the loss of any given component C. A resource that can send alerts to an administrator when resources are low D. An administrator deprovisioning additional resources to a system or service based on usage history E. A resource that can dynamically and automatically adjust its resource configuration based on demand
E
Which type of device would generally not be regarded as an IoT device? A. Refrigerator B. Light switch C. Television D. Laptop computer E. Thermostat
E
Which type of hard drive cable was not commonly used in desktop systems, but was often used in network servers? A. EIDE B. SATA2 C. SATA1 D. IDE E. SCSI
E
Which type of network configuration would be comprised of only a few devices used by an individual? A. WAN B. LAN C. MAN D. WLAN E. PAN
E
Which type of packet is the last one issued between a DHCP client and a server when an IP address configuration is being negotiated? A. Request B. Select C. Offer D. Discover E. Ack
E
Which types of server roles are often combined on the same server? A. Web and file B. Mail and print C. Mail and file D. Web and mail E. File and print
E
You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory count shows only 4 GB. Which of the following is most likely the source of the problem? What can you do to fix it? A. The new DIMM you installed is faulty. B. Windows is displaying an error because it likely became corrupted while the computer was disassembled. C. The new DIMM is not properly seated. D. The DIMM is installed in the wrong slot. E. The new DIMM is not properly seated.
E Turn off the PC and reseat the DIMM. Check that the DIMM is standing in the slot at the same height of the other installed DIMM.
You need to install a customized console on 10 Windows 10 computers. What is the best way to do that? A. When installing the console on the first computer, write down each step to make it easier to do the same chore on the other nine. B. Make sure all computers are using Windows 10 Pro because Windows Home does not support MMC. Then create a console on each Windows 10 Pro computer. D. Create the console on one computer, and copy the .mmc file to the other nine. E. Create the console on one computer, and copy the .msc file to the other nine.
E You don't want to redo your work at each computer, and a console can easily be copied to another computer. A console has a .msc file extension. Windows 10 Pro and Windows 10 Home both support MMC.
The need for segments
Each segment has its own collision domain Allow for increased bandwidth Allow for a larger practical number of hosts
Which Control Panel utility is used to configure help for users who need special assistance to use the device? Administrative Tools Ease of Access System File Explorer Options
Ease of Access
Benefits of DNS
Easy to remember names Flexible and easy to use Consistent naming structure Server security Easily scalable and fault tolerant
RJ-45 characteristics
Eight position, eight connector configuration - known as 8P8C Primarily used for data applications Ethernet networks Gbps maximum bandwidth
EEPROM
Electrically erasable programmable read-only memory
Flash drives
Electrically erasable programmable read-only memory (EEPROM) Non-volatile memory Rapid access times Shock resistant durable Relatively inexpensive
Hard Disk Drives (HDDs)
Electromechanical data storage Rapidly rotating magnetic platters Actuator arm reads and writes data Data is randomly accessed
Which of the following does ESD stand for? Electrostatic Discharge Electrostatic Disable Electrostatic Discourse Electrostatic Disarm
Electrostatic Discharge
Fadio Frequency Identification (RFID)
Embedded chip and antenna Tracking Automatic Identification and Data Capture (AIDC) Tags and readers Active/passive Various applications
Intergrated Microphones
Embedded in case More sensitive Moise and quality External options
Bluetooth Connection
Enables printing from a mobile device Has limited range, adequate for a SOHO environment
Virtual Private Network Overview
Encrypted connection Safely transmits sensitive data Prevents unauthorized eavesdropping Enables remote work
PCI-eXtended (PCI-X)
Enhanced speeds 3.3V PCI slot 64-bit connections
Replacing the Filament spool
Ensure the nozzle is free An angled cut at the end of the filament may be helpful Insert the filament into the extruder Ensure the material has reached the nozzle
Secure Boot
Ensures PCs boot using trusted firmware Enabled/disabled through BIOS May need to be disabled in certain circumstances
Mobile Application Management Features
Enterprise app offering self-service poral Automatic app distribution Seamless installation, updating, and deleting, App installation blocking Policy based access
Authentication Server
Entity providing authentication Provides ability to identify and access
Understanding System changes
Environmental changes Infrastructure changes
Eliminating Obvious Sources
Equipment Service Provider
ECC
Error Correcting Code
RJ-45
Ethernet Standard connector for all current versions of Ethernet cables Contains eight wires in four sets of twisted pair
Troubleshooting Tips
Ethernet cables Hardware indicator lights
Refrigerated Cooling Systems
Evaporator Condenser Compressor Flow Control device Insulated tubing
Implementing the Action Plan
Execute action plan Pay attention to maintenance windows Determine whether to escalate Internal support External support Be mindful of the time frame Ensure there are sufficient resources to meet deadline
Sound Cards
Expansion card used to produce sound Connect using PCIe or PCI cards3
Near Field Communication (NFC)
Extension of RFID Very short range Quick sync Payment apps (tap)
External Serial AT Attachment (eSATA)
External SATA connections Cable lengths up to 2 meters
eSATA
External Serial AT Attachment
Universal Serial Bus (USB)
External serial bus interface Used for connecting devices to a computer
Migrating Data from Legacy Systems
Extraction Transformation and cleansing Validation Transferring to new system
Organic Light-emitting Diodes (OLEDs)
Extremely thin No need for backlighting Organic compounds Thin film transistor (TFT) Anode/cathode
Enhanced IDE
Fast ATA Ultra ATA Expanded IDE
Cloning a Hard Disk Drive (HDD) to SSD
Fast and simple. SSD must be at least same size
Cat 5 vs Cat 5e
Faster Fore reliable Less crosstalk
Key Benefits of Automatic Document Feeders
Faster scanning, copying, and faxing Quick collection of information Rapidly digitizing documents
Wi-Fi 6E Standard (6 GHz)
Faster than 2.4 GHz and 5 GHz Exclusive to Wi-Fi 6E devices Twice as many channels as 5 GHz
Rapid Elasticity
Feature of the cloud service provider Web applications, databases, storage services Web applications, databases, storage services Eliminates the need to estimate resource usage Scalable resource provisioning Resources are automatically adjusted Configuration Thresholds Seamless process Resources are effectively limitless More responsive services Flexibility Additional cost
`Overview of Automatic Document Feeders
Feed multiple sheets of paper Found on high-level multifunction devices Faster copying, scanning, and faxing
Unified Threat Management (UTM)
Firewall Proxy server Anti-virus/anti-spam Content filter
Micro ATX (mATX) Motherboards
Fits in standard ATX and smaller cases 9.6" x 9.6" Fewer slots and components
Developing the Plan
Fix issues with minimal operational impact Some issues may be addressed during work hours Other issues may be addressed after hours
Advantages of SaaS
Flexibility and scalability Pay-as-you-go billing Less in-house management New features and updates applied automatically High accessibility
What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames? Link aggression Spanning tree Flow control Port security Stop and wait mechanism
Flow Control Flow control is a switch feature that you can enable and prevent frame drop in case of congestion. On a Cisco switch, you can enable flow control only for the received frame (input flow control). Spanning tree keeps the environment free from switching loops. Link aggregation is a feature that aggregates two or more physical ports into one logical port. Stop and wait mechanism is a type of flow control switching feature. Port security is a security switching feature that enables MAC filtering on a port.
How DNS works
Forward DNS lookup Reverse DNS lookup Database stores host address information Database servers DNS resolver DNS server hierarchy
Quad Channel RAM
Four channels Supports four memory modules in dedicated channels
Four chips
Four chips still benefit Two chips sharing each channel Still better performance
DDR5 enhancements
Four times capacity of DDR4 Single DIMM maximum of 128 GB Die stacking LRDIMM up to 4 TB
2.4 GHz Channels
Fourteen channels defined for use Depending on the country, not all channels are allowed
What performance indicator of a webcam refers to how rapidly it can capture images?
Frame rate
Cat 6 Cables
Frequency of 240 Mhz Speeds up to 10 Gbps
Printing a Test page
From printer control panel From operating system
Other common Printer Errors
Fuser failure Laser unit failure Laser diode failure Motor failure Fan failure Rollers and pads have reached end of life Image rate error Slow printing time Resolution errors
Identifying Problems
Gather relevant information Symptoms vs change Question users Recreate issues
802.11ac (WiFi 5)
Gbps speed 5 GHz only Bo backward compatibility
Factors Affecting Long-range Fixed Wireless
Geographical interference 2.4 Ghz interference Tidal fading
Considerations for Using Long-range Fixed Wireless
Geography Licensing Antennas Power
GSM
Global system for mobile communication
OLED
Good reproduction of colors Expensive Limited use in laptops
Virtualization Security Measures
Granular security controls Granular security procedures Granular control and authority Protecting against physical system vulnerabilities Setting security policies
Common Thunderbolt Use Cases
Graphics Compression Buring Data
High Availability Clusters
Group of computers All systems provide the same service
HDD VS Solid-state Drive (SSD)
HDD underperforms SSD HDD has larger capacity than SSD
Lucent Connector
Half the size of an SC connector (1.25mm)
HDD
Hard Disk Drive
Molex Connectors Use Cases
Hard drives Optical drives Floppy drives Motherboards CPU or graphics
HSM
Hardware Security Modules Security
Wi-Fi Analyzer Categories
Hardware Wi-fi signal analyzers Wi-Fi analyzer apps
Networking without SDN
Hardware and software are tied together Difficult to centrally manage network devices Vender specific protocols
Additional Features of Hardware Firewalls
Hardware firewalls can contain additional functionality VPN concentrator Web filtering
Laptop HDDs
Has no cables Recessed compartment Insert and slide to connect Mounting screws
Alternatives to built-in microphones
Headsets USB microphones
Removing an old filament spool
Heat nozzle to appropriate temperature Release the handle on the filament Pull out the filament spool
Thermal paper features
Heat sensitive paper is relatively costly Cannot be substituted for other paper types Comes in different sizes
Maintaining the Heating Elements
Heating elements require periodic cleaning Can be done with isopropyl alcohol Cleaning pen Cleaning card
HDMI
High Definition Multimedia Interface Replaces analog standards
Thermal Paste
High heat conductive paste Better conduction between components
HIPS
High impact polystyrene
Thunderbolt Cables
High resolution displays High performance data
What is a lightning cables advantages over Micro-USB
Higher power, Better durability, and simpler to connect
Secured Print Jobs
Hold and release queue Avoid printing on unattended printers Owner of print job present at the device
Which of the following should you generally think about when considering the environment in which your computer will operate? [Choose all that apply] Humidity-Level Temperature Time of day Ventilation
Humidity-Level Temperature Ventilation
Dynamic Host Configuration Protocol (DHCP)
IP address configuration Alternative to static configuration Automated IP addressing
STP Implementations
Ideal for environments that are susceptible to electromagnetic interference (EMI) Airports Industrial Medical centers
Facial recongnition
Identify a person's face Requires a device with a camera Verification based on mathematical data aging, eyeglasses, hats may affect reliability
Useful Activities
Identify changes Break down large problems Perform a backup Examine log files
The 6 steps of troubleshooting
Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action Verify system functionallity Document findings
Verify System Functionality
If it works, all is well If possible, use what was learned for future-proof If it doesn't work, start over Verify system post-change Testing should be included in action plan Some things simply can't be prevented Hardware fails for various reasons Poorly implemented processes Issue documented Problem identified Plan implemented
DVI to VGA Considerations
Image quality Video output is only as good as weakest link DVI supports full 1080p HD at 1920x1080 However, once converted, the quality may be reduced to 1024x768
Benefits of Fiber Optics
Immune to EMI Long distance very fast
Key Benefits of Scanning to Shard Folder
Import and save large volumes of data Data transferred more securely than email Does not require a full-scale FTP server
Firmware Upgrades
Improve performance Fix bugs Add features Improve compatibility Fix printer support issues
How is USB 2.0 better than USB 1.1
Improved performance and can do 480 megabits per sec. is 5 meters in length
Paper Jams
In feeder or past it Open case Maintenance or paper feed button
IPS
In-Plane Switching
Which type of LCD technology is generally considered to have the highest overall picture quality?
In-plane switching (IPS)
LCD Technologies
In-plane switching (IPS) Super plane to line switching (PLS) Vertical alignment (VA) Twisted nematic (TN) Transistor translator logic (TTL)
Jitter
Inconsistent packet delivery Common issue with VoIP Jitter buffers
Which Control Panel utility can increase the accuracy of searches on the device by cataloging the information in the drive? Internet Options System Network and Sharing Center Indexing Options
Indexing Options
ITX
Information Technology Extended Motherboards
SCADA Benefits
Information reliability and accuracy Real-time notifications Trend analysis Proactive maintenance Increased equipment lifespan Informed decisions
laaS
Infrastructure-as-a-service
SCADA disadvantages
Initial investment is significant Adaption to new system Training on new technology Support offer purchase Maintenance time and costs
Troubleshooting Considerations
Input cables Monitor controls Computer Graphics card Connection type Display driver Refresh rate Resolution OS configuration
Stateful Firewalls
Inspect contents and state of packets Better at detecting unusual/potentially malicious traffic Able to more intelligently filter traffic based upon context Require more memory and computational power
Inspecting the wires
Inspect each wire to ensure there is no overhang Wires should be securely in place Trim any excess on wires
Upgrading to a Solid State Drive
Install SSD Connect cables Reinstall OS
IDE
Integrated Drive Electronics
Built in Microphones
Integrated into laptop cases Good for general purpose activities like teleconferencing Audio quality not suitable for creating content
Synchronize to cloud
Integrated into mail system Microsoft Exchange/Outlook Android Google account Apple iOS iCloud account
Shared Resources
Internal External
Video Capture Card
Internal expansion device Capture video from camera or other source
ICMP
Internet Control Message Protocol
IPsec
Internet Protocol Security
Webcam use and what to consider
Internet video communication Image quality Frame rate
D-subminiature Serial Connectors
Introduced in 1952. D-shaped electrical connector. Typically used for RS-232 serial communications. Contains two or more rows of pins or sockets
Compact Discs (CD)
Introduced in 1980s Most read-only data Increased capacity Prone to damage
Advanced Technology Extended Motherboard (ATX)
Introduced in 1995 12.0" x 9.6" Allows full-length expansion cards
Lightning Connector Characteristics
Introduced in 2012 8-pin connector introduced with iPhone 5 and iPad 4 as a replacement for the 30-pin predecessor Significantly smaller than previous connector Reversible connection Not backward compatible
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
Internal Symptom-based Research
Investigate the most obvious causes Consider other possible causes Links may not always be apparent Relatively complex relationships may exist
.js
Java Script
Print Queue Problems
Jobs won't print Print queue paused Possibly many jobs waiting
You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance? Jumbo frames Change the MTU to 1300 Spanning tree Flow control Link aggregation
Jumbo Frames Leaving the default MTU of 1500 bytes (for an environment with 40 Gbps speed and higher) is not good practice. To improve performances, you need to enable a jumbo (giant) frame. In a Cisco switch, you can set the jumbo frame up to 9000 bytes. Spanning tree is a switching feature that keeps the environment free from switching loops. Flow control is another feature that prevents frame dropping in case of congestion by pausing sending frames. Changing the MTU to 1300 can cause even more performance issues. Link aggregation is a feature that aggregates two or more physical ports into one logical port.
Coaxial Cable
Key benefits Multiple channel support Lower error rates High capacity Rigid design Key limitations Signal leakage Noise from external fields Difficult to work with
Placement
Key placement considerations
Laser Printer Maintenance Kit
Kit contents Fuser unit Transfer roller Feed rollers Pickup rollers Separation rollers Separation pads
Contrast
LCD Measured in contrast ratio OLED offers higher contrast
Color
LCD color recreation depends on the technology used IPS and VA offer better color than TN Early OLED tended to province poor color accuracy OLED can have problems with volume
Cold Cathode Fluorescent Light (CCFL)
LCD monitors Neon signs Computer case lighting Is made out of small tubes to prevent damage Diffuser Bottom or top of screen or both More than two
Brightness
LED and LCD are brighter Important when outdoors or viewing HDR video
Which of the following are common interfaces using for installation of printers nowadays? Select three answers. LPT USB Serial IEEE 1394 IP
LPT USB IP
Disadvantages of IaaS
Lack of transparency Billing granularity Multi-tenant architecture
LGA
Land grid array
CPU Socket Types
Land grid array (LGA) Pin grid array (PGA) Ball grid array (BGA)
Page Orientation Problems
Large page elements Zoom or scale settings Printer driver overrides software Corrupted printer driver Operating system issues
Driver Compatibility
Latest drivers OEM website OS version Printer model
OSI layers
Layer 2 Data link Forward data based upon the MAC address Switches Layer 3 Network Forward data based upon the IP address Routers
What sort of Internet connection is preferred to provide guaranteed uptime to customers? Leased Line Satellite Metro-Optical Cable Connection
Leased Line Leased lines are preferred to provide guaranteed uptime to customers. Leased connections are dedicated lines set up for the business and hence enable the service providers to guarantee uptime. Satellite Internet Service Providers provide services to Airlines because it is not possible to have any of the wired connections on air. Cable connection uses TV Cable connection to provide Internet services. Cable Internet is able to provide high-speed Internet, but one of the disadvantages is shared bandwidth among the neighbors, which can degrade the performance if multiple users are connected at the same time. Metro-Optical connection is primarily used by major Internet providers having multiple locations within a given area. Using Metro-Optical connection, they are able to connect their different locations creating a bigger network.
Voice Recognition
Less common Easier to hack Computer matches user voice
Cat 5e Transmission Limitations
Less prone to crosstalk Price considerations Lower performance than new generation cables
LED
Light Emitting Diode
Common IoT Devices
Light switches and outlets Thermostats Televisions Refrigerators Smart watches or health monitors
Advantages of LCD
Lightweight Low power consumption Inexpensive
Digital Subscriber Line(DSL) Modem
Like dial-up modem, uses phone lines Utilizes RJ-11 connector Uses normally unused frequencies for faster speeds Requires DSL filter if phone service is required
LCD
Liquid Crystal Display
LCD design
Liquid crystal material Between plastic Light source Divided into time squares (pixel of image)
Establish a Theory of Probable Cause
List probable causes Leverage knowledge to prioritize Consider the obvious Escalate if necessary
Name Server Records
List servers for domain Permit other name servers More than one name server
LAN
Local Area Networks
LAN
Local area network
SCADA Applications
Local or remote control Monitor, bather, and process real-time data Device interaction Record events
Maintaining Impact Printer Ink Ribbons
Long circular piece Cartridge contains ink Requires replacement when print quality deteriorates Is easily replaced Snap out ribbon cartridge Replace with new cartridge
Changing the Printing Paper
Long continuous piece of paper Tractor feed Ensure holes line up perfectly to feeder Give special care to forms with predefined print areas Ensure paper feed is unobstructed
Next Generation Firewall (NGFW)
Looks to provide additional functionality on top of standard firewalls Ability to filter traffic based upon applications Intrusion prevention system detects and prevents attacks Gathers up-to-date threat information from an external source
Disadvantages of Optical Fiber
Low Power Distance Fragile
Advantages of PaaS
Low infrastructure management Services accessible through browser Per-use model
Light Emitting Diode (LED) Advantages
Low power requirement Highly efficient Minimal heat produced Long life Quality
DDR5
Lower power consumption Twice the speed of DDR4 Lower voltage at 1.1V Voltage regulators Additional cost 51.2 GB/s MT/s from 3200 to 6400
LC
Lucent Connector
How MDM works
MDM agent MDM server Policy configuration Applications deployment
What does MFi certification stand for?
Made for iPhone/iPod/iPad
MX Records
Mail exchanger record Servers configured to accept mail
DNS Records
Mail exchanger record (MX) Name server record (NS) Reverse lookup pointer record (PTR)
DNS Servers
Maintain a directory of domain names Names are translated to IP addresses similar to phone book Central registry Updated DNS information
Print Servers
Manage print requests Provide printer queue information Large enterprise networks Small office or home networks
Connecting and Organizing Cables
Many devices require network connectivity Modern enterprises can have thousands of network cables running throughout There is a need for cables to be manageable, neat, and centralized
SCADA Systems
Master Terminal Unit (MTU) Remote Terminal Unit (RTU) Human Machine Interface (HMI)
MBR
Master boot record
Key Characteristics of HDDS
Mature technology Highly reliable Cost effective High capacity Serial ATA interface
Common Factors Affecting Speed
Maxed out bandwidth Devices, connectors, and cables Cable length Power adapters
Jitter Levels
Measured in milliseconds (ms) Below 30 ms packet loss
Measuring vs. Metering
Measuring is about how much is used Metering is about how much you pay
Printer Calibration
Mechanical calibration Visual calibration
Examples of External Services
Media content delivered to customers Business intelligence consumed by analysis applications
MMU
Memory Management unit
How Virtual Memory Works
Memory Management unit (MMU) Unneeded data in RAM moved to hard disk Swap file or page file Slower than RAM, although SSDs are better than hard disks
MAN
Metropolitan Area Networks
mATX
Micro ATX Motherboards
Lightning cables device authentication
Microchip for device authentication. Compatible with approved devices only. Non-apple lightning cables
Single Core CPUs
Microprocessor with a single chip Capable of processing multiple threads Standard of the ARM (Advanced RISC Machines) and x86/x64 architectures
Mail Servers
Microsoft Exchange IBM Lotus/domino Open Source
MT/s
Million transfers per second
Which type of architecture or connection method uses a 54-pin edge connector to host devices?
Mini PCI Express
mSATA
Mini Serial Advanced Technology Attachment
MAM
Mobile Application Management
MDM
Mobile Device Management
Fiber Optic Key FEatures
Modem or gateway device used to connect offices/devices Fiber uses light beams to transmit data Faster and more reliable than DSL or cable Similar upload and download speeds
Why use Virtual Memory?
Modern operating systems require a lot of memory Not enough physical RAM to run multiple apps
The Importance of Methodology
Modern systems are complex Starting point Logical sequence Avoid wasted time
The Difficulty of Calibration
Monitor makes and models Printer makes and models Complicated and time-consuming
Advantages of Syslog
Monitor numerous events Extensive view of entire network
accounting
Monitor resources accessed by users Session logging
Screen Display and Color Printers
Monitors use RGB Printers use CMYK
Virtualization
More efficient resource utilization Software abstraction Creation of virtual machines Behave like any other computer Multiple OS instances on a single computer Not simulated Virtual machines are isolated from each other Each virtual machine has its own resources Hypervisors
Determining VM Resource Requirements
More memory can improve performance OS might not recognize it Inefficient resource utilization Operating system limits
Fingerprint Scanners
Most common method scanning pad fingerprints stored in secure database
DB9 Connector
Most commonly implemented with simple, serial devices Mouse Early PDAs Management interface for comm ports on: UPS Routers Diagnostic equipment
20-pin connector
Mostly commonly used for motherboards
MFD
Multifunction Devices
Diagnostic Tools
Multimeter Power supply tester Logs and error Messages POST card/USB Loopback plugs
Small Computer System Interface (SCSI)
Multiple devices supported per cable 8 total in the original release, increased to 16 in later revisions Internal cables 50, 68, and 80 pins External cables 50 and 68 pins Support for hot-swapping
Host Requirements
Multiple instances Large memory requirements
NFC vs Bluetooth
NFC doesn't require pairing NFC safer due to short range NFC less prone to interference
MX Parameters
Name of mail server Preference
Clearing the Spooler in windows
Navigate My Computer (C:) drive Windows folder System32 folder Spool folder Printers folder delete files
NFC
Near Field Communication
What does NFC stand for?
Near-Field Communication
Causes of Frequency Interference
Nearby Wi-Fi networks Other wireless devices Satellite dishes Microwaves Monitors and cabling Consumer appliances Hearing aids
NIC
Network Interface Cards
TAP
Network Traffic Access Point
Syslog
Network devices send messages to logging server Most network devices can send Syslog messages
Analyzer Data Collection
Network name Band and channel Signal strength Security protocols Wi-Fi standard Noise level
Intrusion Prevention System (IPS)
Network security/threat prevention Detect vulnerability exploits Prevent vulnerability exploits
Personal Area Networks (PAN)
Network specific to an individual Generally includes a variety of devices Typically managed from one computer Can be accessed by any device Bluetooth devices
Intrusion Detection System (IDS)
Network-based (NIDS) Host-based (HIDS)
USB Type C
Newest USB interface Symmetric oval shape is reversable Comparable in size to that of Mini Supports the highest speeds currently available (up to 10 Gbps)
NGFW
Next Generation Firewall
USB Wi-Fi Adapter
No cables No need to install internal hardware No need to upgrade a system
Memory Addressing
No conflicts Simultaneous operations Improved performance with multitasking
Key Features of NFC
No deceive discovery. No pairing. Instant communication if near each other. Secure Data Transfer. Can be used to make tap transactions with cards. Encryption support.
Advantages of SSDs
No defragmentation required Quiet operation More compact that HDDs Lower power requirements
BIOS Passwords
No identity Ensure you know the passwords
What are the limitations of a Windows 10 Pro computer when configured as a network print server? Only clients running Windows 10 can connect to print server deployed on Windows 10 Pro. No more than 5 printers can be installed. No more than 20 incoming connections are supported. Printers installed on this server cannot be combined into a pool.
No more than 20 incoming connections are supported.
Advantages of IaaS
No procurement No management No support requirements Flexibility and scalability
Disadvantages of LCD
No true black Color matching Losing backlight
Internet of Things (IoT)
Non-traditional internet devices From the very small to the very large Collect and transmit data
NVMe
Non-volatile memory express
SSD Communication Interfaces
Non-volatile memory express (NVMe) Peripheral component interconnect express (PCIe) Serial advanced technology attachment (SATA)
Solid-state Drives (SSD)
Non-volatile storage NO moving parts Increased performance Less prone to wear and tear associated with HDD More durable over time
Loopback Plug Characterization
Not a crossover cable Device is classified as both male and female
Slow Network Speeds
Number of users Connection speed Unnecessary apps
What component, or type of mobile display would commonly be found in devices such as smartphones and tablets, as opposed to laptop computers?
OLED display
Viewing Angles
OLED generally offers better viewing angles LCD can vary IPS improves angles in LCD displays
OLED vs. LED LCD
OLED light controlled on a pixel-by-pixel basis LED LCD typically use back or edge lighting
How is an ONT Different from a Modem
ONT connects to a fiber connection Cable/DSL modems utilize copper wires ONTs are often standalone units
Limited Network Connectivity
OS selects connection Only a single connection can be used at one time Prioritizes which to use Verify IP configuration Verify wi-fi connection properties
Internet Protocol Security (IPsec)
OSI layer 3 Packet-level authentication and encryption Packet signing Confidentiality Anti replay IPsec protocols authentication header Encapsulation security payload protocol
Authorization
Occurs after authentication Access system resources and perform tasks Policy enforcement Individual permissions Authenticated users may be granted access to different activities
Patch Panel Cables
Often just long enough to connect to a switch Can come in a variety of colors for color-coding Shorter cables are cheaper than long cables Easy to swap out a bad cable
Mini PCI
Older laptops Square shape 124-pin edge connector
Wi-Fi and Laptops
Older laptops require external adapter Integrated Wi-Fi
Dial-up modem
Older method of sending/receiving data Uses phone lines connects by dialing ISP or destination slow by modern standards
Coaxial Cables
Oldest types of network cabling Single wire conductor Uses a wire mesh to insulate the core Commonly used for home internet services prior to fiber optics
Basic Input/Output System (BIOS)
One of the most important motherboard components Contains the lowest level system software Succeeded by Unified Extensible Firmware Interface (UEFI)
Ownership considerations
Ongoing costs Metting your needs Setup and servicing
USB Micro B - 3.0
Only available with USB 3.0 devices Not backward compatible with 2 or 1.x devices Designed for the current high-speed requirements of newer devices
Molex Characteristics
Only used for power, no data Almost always used internally only Molex connections are extended directly from the main power supply of the PC
Replacing Thermal paper
Open printer Remove spent roll Replace with new roll Ensure paper is fed in
Replacing Cartridges
Open printer access panel Remove cartridge from its holder Replace with a new cartridge
Hubs
Operate on level 1 of OSI model Any received signal is sent to all other ports Produce more traffic Simpler and cheaper Not often used anymore
Network Bridge
Operates on Layer 2 of OSI model Divides network into segments Traffic is inspected for destination MAC address If destination is on another segment, frame is forwarded
Printer Drivers
Operating system operating system version
ONT
Optical Network Terminal
OLED
Organic Light Emitting Diode
Bring Your Own Device (BYOD)
Organizations might allow you to bring your own device for official use. However, organizations need to ensure that any corporate data on the mobile phone is secure. To safeguard the data, mobile phones must be encrypted.
Mobile Application Management (MAM)
Overlap with Mobile Device Management. Mobile app lifecycle management Installing, updating, and deleting apps Managing licenses, permissions, and configurations Defining app policies
You do not have a Corporate
Owned, Personal Use method.
Functionality
PC checks operating system It the verifies other hardware Compares information with information on TPM chip
PCI-X
PCI-eXtended
Video Cards
PCIe AGP PCI
Common Symptoms with hardware
POST beep codes System locks up Sudden shutdown Blank screen on boot Blue screen of death (BSOD) No power Continuous reboots BIOS time and settings reset Black error screen during boot Failed to locate a bootable device Overheating Noisy fans or not spinning smoke or Buring smell Failed capacitors
Causes of Poor VoIP Quality
Packet loss Router Network connection
Banding
Pages have bands Light or dark lines across page
Paper Size
Paper doesn't fully eject or is wrinkled Check paper size Clear jam if necessary Use correct paper size
Paper and mechanical issues
Paper jam Paper mismatch Paper tray Verify ink type
Paper Jam Errors
Paper stuck in printer Lid must be opened and closed Media size, quality, paper tray
Printer Error Considerations
Paper support Understand error codes Review documentation
Paper Out Error
Paper tray empty Check paper tray
Head alignment
Perform after new cartridge installation Printer calibration
The Purpose of Virtual Machines
Perform tasks like a separate computer Guest VMs are created within host A host can service multiple guest VMs VMs have access to physical resources Resources allocated separately to each VM
PCI
Peripheral Component Interconnect
PCLe
Peripheral component interconnect express
DHCP Reservations
Permanent IP addresses Used for specific DHCP clients Applicable for DHCP-enabled devices Use client MAC addresses
DHCP Reservations
Permanent IP assignment Specific DHCP Client DHCP-enabled devices Media access control (MAC) address
PAN
Personal Area Networks
PAN
Personal area network
Bluetooth Adapters
Personal area network (PAN) PC card PCMCIA slot ExpressCard slot USB dongle
Secure sockets Layer ((SSL) VPN
Personal devices Implemented through: VPN client, or HTML-5 capable browser Username and password
Poor image quality
Photos and graphics Correct paper driver or configuration settings Ink levels Toner cartridge
Key Differences between USB
Physical layout Data transfer rate Backward compatibility
Port Flapping
Physical switch interface Cycles up and down Three or more times a second Ten seconds or longer Cables Speed or duplex mismatch Link synchronization
PGA
Pin grid array
Testing for Jitter
Ping Measurement
Testing Latency
Ping Traceroute Third-party tools
Headers
Pins on motherboard for various connection types Pin assignment and numbers vary Must be oriented correctly
Resolution Settings
Pixels per inch Dots per inch Print mediums
PaaS
Platform-as-a-Service
HDD Performance
Platter rotation speed (5400, 7200, 10,000, 15,000 RPM) Internal cache Interface type
Po 802.3af
PoE was introduced in 2003 Has multiple power classes for delivery 4W, 7W and 15.4 W Power loss over the cable reduces wattage for end device 3.8W, 6.49W, 12.95W
Long-range Fixed Wireless
Point-to-point configurations Terrestrial microwave Does not require satellites Connect users in remote areas
PETG
Polyethylene terephthalate glycol
PLA
Polylactic acid
3D Printing Materials
Polylactic acid (PLA) Acrylonitrile butadiene styrene (ABS) Polyethylene terephthalate glycol (PETG) High impact polystyrene (HIPS) Metal composite
Advanced Micro Devices (AMD) CPUs
Popular in game and hobbyist markets Generally, less expensive than intel CPUs Use different socket types than intel
Requirements for Scan to email
Port 25 Static IP address Licensing
You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports? Jumbo frames Flow control Port mirroring MAC address filtering Port security
Port security Port security is a switch feature that provides MAC address filtering. When enabled on the port with the default setting, it will allow only one MAC address on that port. In case you plug in another host on the other end of that port, the port will go into an err-disabled state and will be disabled. Port mirroring is a switching feature that enables you to send a copy of traffic received or transmitted on that port to another port where a log analyzer software can be installed. MAC address filtering is not a valid name for s switching feature. Flow control is another feature that prevents frame dropping in case of congestion by pausing sending frames. Jumbo frames are used in high speed environment to improve the performance of data transfer.
USB Webcams positives
Portability Compatibility Attachments
Troubleshooting Printers
Power Availability
Troubleshooting power and availability
Power adapter Cables Network Drivers
Molex Connectors
Power connectors for internal PC components
Removing a drive
Power down and unplug computer Use anti-static mat and wristband Open computer case Disconnect cables and remove mounting screws
Replace Toner Cartridge
Power down the printer Access toner cartridge Remove spent cartridge Put replacement cartridge in Close access panels
Setting up PoE
Power sourcing equipment sends power and data Some switches support PoE Endspan power PoE injectors can be used Midspan power
POST
Power-On Self-Test
D-subminiature Naming Convention
Prefixed by the letter D. Shell size denoted by letters A, B, C, D, or e. Number of pins or sockets. Suffixed with P for pins or S for sockets
Terminating the wires Using the Punch Down Tool
Press down on the wires, this will also cut any excess wire Ensure the punch is not performed on an angle Tool should make a clicking sound
BIOS Security
Prevent unauthorized changes Supervisor password User password
Default settings
Print Driver default Software default
Key Components of 3D Printers
Print bed and bed leveling Filaments Plastic Extruder and nozzle Thermal sensors Laser curing Cooling fan Motion control motors
Printing Correct Orientation
Print driver interface Software page setup interface
Audit Logs and Print Reports
Print job logs Print reports
Blurs and Smears
Print output is blurry or smeared Media type
Troubleshooting Errors
Print queue Calibrate the printer
Operating System Considerations
Print troubleshooter Windows updates Compatibility mode
A USB Standard-B Plug would most commonly be found plugged into which device?
Printer
PCL
Printer Control Language
Laser Printer Calibration
Printer diagnostics Image consistent with monitor Software calibration
Troubleshooting Considerations
Printer may not be working at all Appears to be online Uninstall and reinstall print drivers Reinstall printer Typically restores printer operation
Printer Open Error
Printer not properly closed Toner cartridge seating Cooling fan may not be working Power connection
PostScript
Printing language Used by various printer manufacturers Used commonly in Mac environments
Printer Control Language (PCL)
Printing language Used by various printer manufacturers Supported by many operating systems Operates in various environments
Private Cloud
Privately shared resources Accessible to other users Resource access controlled internally Accessed over the internet or private network
Pros and cons of Quad channel RAM
Pro Improved system performance Four times memory bandwidth as single channel Higher capacity Cons Cost
Authentication
Process of determining whether someone or something is true, genuine, or valid Most commonly a username and password
Common PaaS offerings
Processing infrastructure Storage infrastructure Version control Compiling and testing
A digitizer performs what task in image processing?
Produces digital output, from analog input
Latency
Propagation delay Handling delay Queuing delay Prioritize traffic
Lightning Connector
Proprietary Apple connector Primarily used to charge devices Also supports data transfer and audio
Wi-Fi 6 Considerations
Pros Backward compatible Greater range than 5 GHz Better performance at longer distances Efficient use of bandwidth Lower power consumption Cons Still a new standard Cost vs. performance Physical infrastructure an issue
802.11ax Pros and Cons
Pros Better range Dual band Higher speeds Lower power consumption Cons Still a nascent technology Fewer 802.11ax devices currently available
AMD Pros and Cons
Pros Cheaper than intel CPUs Superior graphic performance Better 64-bit application handling Cons Generate more heat than intel CPUs Considered slower than intel CPUs
NFC Pros and Cons
Pros Convenient Seamless Broad support No pairing Cons Cost Security
802.11n Pros and cons
Pros Fast (300 Mbps) Good signal range More resistant interference Cons Older standard Interference
802.11g pros and cons
Pros Fast maximum speed Good signal range Not easily obstructed Cons Older standard Interference
802.11a Pros and cons
Pros Fast maximum speed Regulated frequencies Reduced interference Cons Older standard Shorter signal Easily obstructed
PCL Merits
Pros Fast processing of print jobs Broad operating system support Cons Inconsistent output across printers Graphics quality is greatly affected by printer
802.11b Pros and Cons
Pros Good signal range Less prone to obstructions Cons Older standard Slower than 802.11a Easily obstructed
2.4 Ghz Considerations
Pros Greater coverage area than 5 Ghz Better penetration of solid objects Cons Lower data rate Susceptible to interference
PostScript Merits
Pros Greater detail graphics Consistent printing quality across devices Supported on Mac Cons Slower print job processing Not as broadly supported as PCL Requires more computing resources
5 GHz Considerations
Pros Higher data rate Less susceptible to interference Cons Smaller coverage area Less successful penetrating solid objects
802.11ac Pros and Cons
Pros Improved bandwidth Wider channels Beamforming Dual-band transmission Cons No backward compatibility
Intel Pros and Cons
Pros Performance Compatibility Less heat generation Cons Generally, more expensive Power consumption Higher operating costs
Wi-Fi 6E considerations
Pros Significantly higher data transfer rate Performs best indoors Cons Short range Shard 6 GHz spectrum Requires dedicated hardware Confusion between Wi-Fi 6 and 6E
RFID pros and cons
Pros global standard Multiple items Speed No line of sight required Cons Scanning issues Security
Pros and Cons of Virtual Memory
Pros. Can improve system performance Increases capacity for multitasking Useful for large, memory-intensice applications Cons Slower than physical RAM Consumes disk space Can result in frequent hard disk access Leads to poor performance if incorrectly used
Software-as-a-Service (SaaS)
Provider hosted applications Software on demand Clients access applications over the internet End users receive same features and updates Service-level agreements (SLAs) No local licenses required
Satellite
Provides internet access in rural and remote areas where landline internet connectivity isn't available
Public Cloud
Publicly shard resources Multiple tenants Resources accessed over the internet
.py
Python
Which type of connection is initiated by the technician with a code that is given to the user to input? A series of permissions checks occur, and the user and technician will be connected. VNC Quick Assist Remote Assistant RDP
Quick Assist Quick Assist is an update to Remote Assistance that allows a technician the ability to give a code to users to help. The user enters it on their machine, and a series of permission checks are done before the connection is made. Remote Assistance allows a user to request help from a technician. An email will be sent to the technician, and a password will have to be provided to secure the connection. Remote Desktop Protocol (RDP) is a built-in graphical remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated.
Advantages of Virualization
Quick and easy Reduced hardware costs Scalability Reliability Performance
Repeater
RE-broadcasts existing wireless network Cost-effective option to increase wireless range Easy to install
Coaxial Cable implementations
RG-6 75-ohm resistance 18-gauge center conductor Quad-shielded versions available Newer HDTV signals RG-59 Commonly used in older cable, satellite or closed circuit TV installations 22-gauge center conductor 75-ohm resistance single outer shield
RJ-11 Characteristics
RJ = Registered Jack Six position, four connector configuration - known as 6P4C Primarily used for Phones Modems DSL lines 24 Mbps maximum bandwidth
Comparison between RJ-11 and RJ-45
RJ-11 Usage: phones, modems, DSL cables Bandwidth: up to 24 Mbps Shape: compact, square (6-pins) RJ-45 Usage: ethernet networking Bandwidth: 10 Gbps over Ethernet Shape: longer, rectangular (8 pins)
Patch Panel Connectors
RJ-45 Subscriber connector (SC) Lucent Connector (LC)
Types of Connectors
RJ-45 Type F coaxial SC LC
Ethernet Connectors
RJ45 connection Network connection
Example Serial Cables
RS-232 RS-422 RS-485
Round trip time
RTT
Ram
Random Access Memory
Locating an Antenna on Top of the Lid
Range Performance
IDE Speeds
Read 100 MBps 133MBps Write 66MBps 33MBps 16MBps
RTP
Real-life transport protocol
Troubleshooting Tips
Reboot router Router firmware update Modify Wi-Fi configuration Replace old router
What is the purpose of twists in a Twisted Pair cable? Increase the cable length per unit of distance Tying two cables together Reduce Noise (Crosstalk) Increase the cable strength
Reduce Noise (Crosstalk) Twisting the cables brings them closer to each other. This makes them cancel out each other's magnetic fields, thereby reducing the noise produced
Reducing Latency
Reducing network usage Reduce running applications Subnetting Prioritize bandwidth allocation (QoS) Load balancers
RAID
Redundant Arry of Independent Disks
Redundant Arry of Independent Disks (RAID)
Redundant and non-redundant Reliable data storage Low cost Common in network servers
Error Codes
Refer to documentation Codes may not reveal the issue
Implementation
Reference documentation Path for change management Familiarity with processes Avoid immediate reaction
Small Outline Dual In-line Memory Module (SODIMM)
Refers to its smaller footprint Performs similarly to larger DIMMs
DDR5
Released in 2020 Maximum DIMM size of 128GB Lower voltage at 1.1v 51.2 GB/s
In which of the following remote connection will a user request help from a technician with an invitation and a password to help secure the connection? Remote Desktop Protocol OpenSSH Quick Assist Remote Assistance
Remote Assistance Remote Assistance allows a user to request help from a technician. An email will be sent to the technician, and a password will have to be provided to secure the connection. Quick Assist is an update to Remote Assistance that allows a technician the ability to give a code to users to help. The user enters it on their machine, and a series of permission checks are done before the connection is made. OpenSSH is an open-source connection tool for creating SSH connections. Remote Desktop Protocol (RDP) is a built-in graphical remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it.
Which of the following is a built-in Windows tool that allows a user to connect to a computer remotely as if they were sitting right in front of it, and only one connection can be made at a time? VNC Remote Desktop Protocol Quick Assist Remote Assistant
Remote Desktop Protocol Remote Desktop Protocol (RDP) is a built-in remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it. Only one user can be signed in at a time. Remote Assistance allows a user to request help from a technician. An email will be sent to the technician, and a password will have to be provided to secure the connection. Quick Assist is an update to Remote Assistance that allows a technician the ability to give a code to users to help. The user enters it on their machine, and a series of permission checks are done before the connection is made. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated.
Installing a New Drive
Remove old drive Insert new drive Mount with screws Attach power and data cables Close computer case
preparing the cable
Remove the cable jacket to expose the wires Fan out the cable pairs Straighten the pairs and place the wires in the slots
Unified Extensible Firmware Interface (UEFI)
Replaced BIOS Larger hard drive support Faster boot times Better security features Uses a graphical user interface (GUI) User friendly Can access network card
Blu-ray Discs
Replaced DVDs Blue laser HD and Ultra HD content Movies and video games Same dimensions as CD and DVD
Serial AT Attachment (SATA)
Replacement for the parallel ATA interface
Capturing Insights
Reports on server resources Reports on storage resources Reports on licensing Reports on application metering Chargeback and show back reports
Digitizer
Representation from analog information Process of digitization Stylus or finger position produces input
Rapid Elasticity Considerations
Requests from multiple sources Allocation and de-allocation of resources Management overhead Monitoring resource requests Audit trail for billing
IP Address
Required for network communication Unique for every device
Desktop Synchronization
Requirement considerations Device management software Low memory requirement High storage requirement
Internet Connection
Requires fast internet Consider upgrading connection
Changing DC Jack on a laptop
Requires soldering and the motherboard can be damaged
Other maintenance Considerations
Reset page counter Test page printout Recommended cleaning agents
Advanced Cable Testers
Resistance Signal attenuation Noise/interference
Advantages of Using a Metered Service
Resource management Resource optimization Reporting
LCD Performance
Response time is measured in milliseconds (ms)
Other troubleshooting Considerations
Restart router or Wi-Fi device Change DNS settings Check antivirus/firewall settings Run OS troubleshooter Set manual IP address, reset TCP/IP
Dealing with Failed Antennas
Result in connection failure Generally will not break, but leads can become disconnected Reseat cable leads An external USB adapter might be easier
Key Benefits
Reveal's specific data Useful for Wi-Fi optimization
Advanced Automatic Document Feeders
Reversing automatic document feeder Dual-scan document feeder
DVD Features
Rewritable Cannot store high-definition video Manufacturing costs dropped Cheaper than newer technologies Same dimensions as CD
Other key components
Ribbon Tractor feed Impact paper
Measuring Latency
Round trip time (RTT) Time to first byte (TTFB)
Default Gateway
Router IP address Provides internet access Subnet mask determines if a request should be sent to the default gateway
Protocols in Networking
Rules for the format of data and how to work with it Allows for communication across disparate systems Serve as a language common to one or more computers
Testing a Connection
Run a speed test Use cable connection to establish a bench mark
Common Uses for Virtual Machines
Running different operating systems Testing new software Disaster recovery System backup Business continuity Legacy Systems Physical-to-virtual conversion
Software firewall
Runs on a host Only as secure as the underlying OS Controls access per application Works on a port level
Wi-Fi 6 standard (802.11ax)
Runs on both 2.4Ghz and 5 Ghz Better speed and range More efficient use of bandwidth Lower power consumption
Which of the following regulations should you follow to safely dispose of the components in your computer? Safety Data Sheet (SDS) Safety Awareness Sheet (SAS) Safety Regulations Sheet (SRS) Safety Waste Sheet (SWS)
SDS
Key considerations for scan to email
SMTP server configuration Email client Recipients
What type of physical component would be used for the Random-Access Memory for a laptop?
SODIMM
Hybrid Drives
SSD speed HDD capacity Cost
Which of the following remote access technology allows administrators the ability to remotely administer computers via the command line? SSH Telnet RDP VNC
SSH Secure Shell, or SSH, is a command-line interface that allows you to connect to a remote computer in a secure manner. It's a secure alternative to insecure methods like Telnet. Through encryption, SSH enables safe communication and preserves the integrity of data. Telnet is similar to SSH in that it is a command line tool for remote administration but does not have any security and sends information in plain text. Remote Desktop Protocol (RDP) is a built-in graphical remote management tool in Windows 10. Using the Remote Desktop Protocol, you can connect to another computer's desktop. This allows you to work on the device remotely like you were sitting in front of it. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated.
SSID Issues
SSID mismatch Wireless network standards Encryption settings
What sort of Internet Service Providers are used by Airlines to provide Internet services to customers in transit? Satellite Cable Connection Leased Line Metro-Optical
Satellite Satellite Internet Service Providers provide services to Airlines because it is not possible to have any of the wired connections on air. Metro-Optical connection is primarily used by major Internet providers having multiple locations within a given area. Using Metro-Optical connection, they are able to connect their different locations creating a bigger network. Leased line is a leased dedicated circuit between two endpoints (locations). It is mostly used in situations where guaranteed SLA is required or in business-critical environments where lesser speed, downtime or poor quality will impact the business productivity. Cable connection uses TV Cable connection to provide Internet services.
SD
Secure digital card
Trusted Platform Module (TPM)
Security chip Originally a removable chip, now built in Cryptographic vault
Multi-factor Authentication
Security token Biometric verification Security questions
Light Emitting Diode (LED)
Semiconductor that emits light LED panel backlighting Fier optics Indicatior lights
How IoT works
Sensors Communication chips Collect and transmit data IoT gateway
Key VM Security Considerations
Separate security context Separate authentication and authorization Isolation rules Disk images Physical security
Software-defined Networking (SDN)
Separates software from hardware Allows software to control the network Provisioning Configuration Management
resource segregation
Separates switch ports into subnets Segregates functional groups
SATA
Serial AT Attachment
SATA
Serial advanced technology attachment
Virtual Desktops
Server-based virtual machines Accessed through remote connection Interaction with local device Accessible by a broad variety of devices
Resource Considerations
Serves Resources Storage Processing power Network bandwidth
Optical Network Terminal (ONT)
Serves as a termination point for a fiber connection Allows client devices to connect to ethernet of Wi-Fi More expensive than cable
Disadvantages of PaaS
Service availability Service lock-in Service resiliency Ongoing support
SLAs
Service-level agreements
Key features of PaaS
Services complement existing resources Focus remains on development No additional local infrastructure required
Bluetooth Pairing
Set to discoverable mode List discoverable devices Nearby devices Select desired device Enter pin code Pair to synchronize devices
Considerations for Fresh Installs
Setting up OS Reinstalling apps Copying files and folders
Hypervisors
Sharing resources Manages everything
Sharing devices from an operating System
Sharing via the Transmission Control Protocol Sharing via the Bonjour Protocol Sharing via AirPrint
STP
Shielded Twisted Pair
Key Uses for Flash Memory
Short term data storage Data portability Random access memory enhancement Multi-boot systems
Key Considerations with Location services
Should location be broadcast to everyone? Location of adults and children. When you are home. Where home is. Sharing real-time location information. Patterns of movement.
Common Wireless Factors
Signal strength Frequency Line of sight
The complexity of plans
Simple action plans Complex action plans
Establish a plan of Action
Simple problems typically require simple solutions Complex problems should be well documented Escalate if necessary
SMT
Simultaneous Multi-Threading
Virtualization and Security
Singel Physical host system Hosting multiple virtual machines A compromised host can result in al VMs becoming compromised A compromised VM can result in other VMs or the host becoming compromised
Digital Visual Interface
Single link - 3.7 Gbps at 60 fps Dual link - 7.4 Gbps at 85 fps DVI-A supports analog signals DVI-D digital signals only DVI-I integrated (both)
SPOF
Single point of failure
4-pin Molex Connectors
Single row Standard peripheral power connectors 4-pin connectors are most commonly used for hard drives or optical drives Two Rows 4-pin Connector (2 row) most commonly used for CPU or graphics card
Wireless Interference
Slow connection Signal strength (Low bars/no bars) Slow file transfers Frequent connection drops Inability to pair devices
Impact of Jitter
Slow or dropped calls Distorted audio or video Static and echo
SODIMM
Small Outline DIMM
Laptop memory
Small Outline DIMM (SODIMM) Smaller than desktop dual-in-line memory modules (DIMMs) 2.5 to 3 feet Pins and notches
SODIMM
Small Outline Dual In-line Memory Module
Advantages of Multifunction Devices
Small and portable Well suited to SOHO environment Cost effective
SOHO
Small-office/Home-office
Multifunction Devices (MFDs)
Small-office/Home-office (SOHO) Printer, Scanner, fax, and network connection
LC Connector Benefits
Smaller size Cost savings Reliability
Triangulation
Smartphone GPS receiver. Determine location and time. Four satellites are required.
Broad Device Support for MDM
Smartphones/tablets IOS Android Windows 10 device macOS computers Internet-of-things devices
Troubleshooting Considerations
Soft reset Hard reset Force stop apps Check configuration settings Exercise caution if disassembling Wireless consumes battery Airplane mode Disable unused wireless Heat Application usage Overall volume vs. app volume Check sound with headphones Update to latest OS
Platform-as-a-Service (PaaS)
Software and hardware services Development environment Servers, networking, operating systems Applications and services Significant local investment Delivered by a cloud provider Combines IaaS and SaaS Clients access services through internet Places focus on application development
Troubleshooting Printing Issues
Software applications Error messages
SaaS
Software-as-a-Service
What are the two types of RAID
Software-based and Hardware-based
SDN
Software-defined Networking
SSD
Solid State Drives
What two factors would be advantageous for migrating from a hard disk drive to a solid-state drive?
Solid-state drives perform better Solid-state drives produce less noise
Advanced NIC Features
Some NICs have features to help improve host systems performance Multi-queue NICs can help distribute network traffic to multiple CPU cores NICs can also run TCP/IP network protocol stack to reduce load on the host
Powering Network Devices
Some network devices are in areas with no easy-to-reach power Running new power lines may be costly Already a ethernet cable provided to that device
Updates and cartridge compatibility
Some users opt for non-OEM cartridges Firmware update may reject them Disable automatic updates
USB to Ethernet Considerations
Speed of Ethernet adapter depends on USB standard USB 2.0 = 480 Mbps max USB 3.0 = 1000 Mbps
Airplane Mode
Standard feature on mobile devices. Turns off wireless antenna including the following services. GSM Wi-Fi Global Positioning System (GPS)
Built in Webcam
Standard with laptops Include video and sound Software driver required
SAS
Statistical Analysis System
ST
Straight Tip
ST
Straight tip
Active Hub
Strengthen received signal Can extend range of network Have a higher power requirement
MFi certification
Stringent manufacturers' certification. Made for iPhone/iPad/iPod. Guarentes safety standards towards device
Crimpers
Strip, align, and cut cables Commonly used for attaching connectors to various cables
RAID 0
Striping
RAID 5
Striping with Parity
Crimping
Stripping the network cable jacket Aligning and placing wires in a connector
SC
Subscriber Connector
Fiber Connector Types
Subscriber Connector (SC) Lucent Connector (LC) Straight tip (ST)
SIM
Subscriber Identity Module
SIM
Subscriber identity module
UEFI
Succeeded by Unified Extensible Firmware Interface
UTP Implementations
Suitable for both offices and home environments Ideally, environments where crosstalk is not a concern Commonly used for telephone connections
Fiber Optic Merits
Suitable for heavy file sharing, streaming, and backup to could Frequent use of VoIP services or video conferencing Capacity for server hosting and complex cloud services
DSL Merits
Suitable for light to moderate file sharing, streaming, and backup to cloud Capacity for audio and video conferencing Fast download speeds, but slower than fiber or cable
Cable Merits
Suitable for moderate file sharing, streaming, and backup to cloud Use of VoIP services or video conferencing Fast download speeds moderate upload speeds
Syslog message format
Sunt using UDP port 514 Typically, human readable (But doesn't have to be) Severity levels from 0 to 7
How is USB 3.1 different from other USBs
Superspeed +, 10 Gbps, Type A or USB-C
SCADA
Supervisory Control and Data Acquisition
Advantages of PoE
Supports up to 100W over existing wiring Supports distances up to 100 meters Prevents need for an electrician to install new power
Replacing the Print head
Susceptible to wear and tear Allow to cool down before changing Usually has a release mechanism Replace with new unit
Advanced user Authentication
Swipe card authentication Two-factor authentication Biometric authentication
ActiveSync
Synchronizes data between mobile devices and desktop computers. Only used in work areas File transfer and backup App installation and uninstallation
Syslog Server Components
Syslog listener Data base Management software
In which Control Panel utility can you change the name of the PC, adjust performance settings, and configure system restore points? Device Manager Administrative Tools Ease of Access System
System
Random Access Memory (RAM)
System memory Physical hardware Fast-access Volatile
Time to first byte
TTFB
LC Commentor Applications
Telecommunication networks Cable television service Fiber-to-the-home Local area networks Data processing networks
RJ-11
Telecommunications Traditional connector for a phone cable Contains four internal wires in two sets of twisted pairs
110 Punch down Block
Telephone systems Data network wiring Low voltage wiring
Which protocol is used for generating preshared keys? Advanced Encryption Standard (AES) Wi-Fi Protected Access 2 (WPA2) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP) Preshared Keys or PSKs is a client authentication method that is mainly used in wireless networks. It is most commonly used at home or in smaller wireless networks. The wireless clients and the wireless access point must be configured with a 64 hexadecimal digits string or 8 to 63 ASCII characters. Using these along with the wireless network's SSID, an encryption key is generated using Temporal Key Integrity Protocol (TKIP). Advanced Encryption Standard or AES is a symmetric encryption algorithm. AES supports different encryption keys, which can go up to 256 bits. It can perform 128-bit encryption and encrypt data using 192-bit or 256-bit keys that are considered highly confidential and sensitive. WPA2 is currently mandatory on all Wi-Fi devices and provides CCMP and AES encryption support. WPA2-AES is the standard for newer wireless routers where all clients support AES. CCMP is an AES encryption-based protocol that is used in the 802.11i network. It is mainly designed to provide confidentiality, data origin authentication, and integrity that must be transmitted from one endpoint to another. However, it is important to note that CCMP does not provide fault tolerance and reliability.
Troubleshooting Jitter
Test internet connection Switch to wired connection Consider a better router Configure QoS Wi-Fi frequency bandwidth usage Jitter buffers
Troubleshooting Quality and Availability
Test page Network settings Security settings
Which device or process allows a laptop to use the cellular connection of a smartphone to gain access to the internet?
Tethering
TXT
Text Record
Basic Required Settings for a IP address
The IP address itself Subnet mask Default gateway
On a test lab computer, you installed Microsoft KM-TEST Loopback Adapter, after which you configured a static IP address 192.168.0.25 on the said network interface. Using another workstation, you tried to map a network drive located at 192.168.0.25 and was unsuccessful. You tried pinging 192.168.0.25, but you received "Request timeout" responses. What is the cause of this issue? The outbound rules of the test lab computer blocks File and Printer Sharing ICMPv4-out port. File and Printer Sharing is not bound to the Microsoft KM-TEST Loopback Adapter. The inbound rules of the test lab computer blocks File and Printer Sharing ICMPv4-in port. The Microsoft KM-Test Loopback Adapter is not a real network interface card. The Microsoft KM-TEST Loopback Adapter is at the bottom of the network bindings list of the test lab computer.
The Microsoft KM-Test Loopback Adapter is not a real network interface card.
The number expressed after the two letters in the name of a D-sub miniature connector indicates which characteristic?
The number of pins or sockets
When troubleshooting a lost Bluetooth connection between a smartphone a portable speaker, a user reports that the connection was working, but when they went to another room in the house with their smartphone the connection was lost. What is the most likely cause of the dropped connection?
The user roamed too far from the speaker
Overview of Inkjet Printers
Thermal bubble vs. piezoelectric Components Print head Ink cartridges Stepper motor Belt Stabilizer bar
Which characteristics of a port replicator would typically be considered as advantageous as compared to a docking station?
They are more universal They are lighter and more portable They can convert connection types
TFT
Thin Film Transistor
Multiple pages feeding
Thin paper Damp paper Fan pages and reload Pickups and rollers
Determine the Possible Effects of change
Things don't always go as planned Have a backup plan
Triple Channel RAM
Three separate 64-bit buses If three chips, each has own channel if six chips, they operate in pairs Chips vs. slots Consider leaving one channel empty
General Preventative Maintenance
Tools to have on hand Cleaning and inspection Guide checks Belt tension adjustments Nozzle maintenance and replacement Calibration
Replacing Laptop Memory
Torn off laptop and disconnect power Remove memory compartment door Insert memory into slot Press down until memory clicks into place Replace memory compartment door
Which phenomenon is used by light waves within Fiber Optic cables to travel from one point to another? Reflection Guided Light Flow Total Internal Reflection Refraction
Total Internal Reflection Total Internal Reflection causes the light waves to travel from one point to another within the glass core of fiber optic cables. The refraction index of the cladding is lower as compared to that of the core to achieve the phenomenon of total internal reflection.
Cable internet
Traditionally uses coaxial cable 20 Mbps - 1 Gbps download speeds 5-100 Mbps upload speeds Combined with TV services
Load Balancers
Traffic distribution increase capacity Improve application reliability
Overview of Serial Peripheral Cables
Transfer of data between devices Serial communication protocol Transmits data one bit at a time Primarily used For lower bandwidth devices Over longer distances Communication standards Varying transmission properties
TTL
Transistor translator logic
TCP
Transmission Control Protocol
TCP
Transmission control protocol
Tray Settings
Tray mode settings Tray availability Settings Tray priority settings Other tray settings
TFTP
Trivial file transfer protocol
Subscriber Connector Characteristics
Trouble-free, inexpensive, robust, precise
TPM
Trusted Platform Module
VLAN trucking
Tunneled VLAN 802.1Q standard VLAN tagging Native VLAN
Replacing a Wireless Card
Turn off laptop Remove battery Remove wireless card computer component door Remove screws and adaptor
Double Data Rate 3 (DDR3)
Twice the speed of DDR2 240-pin DIMM or 204-pin SODIMM Incompatible with previous generations Bus clock speed between 400 and 1066 MHz Cycles four times per bus cycle Transfers data twice per clock cycle Bandwidth between 6400 and 17066 MB/s
F Connectors Types
Twist-on Crimp-on Compression
TN
Twisted nematic
Dual Channel RAM
Two dedicated 64-bit buses If two physical chips, each has own channel If four chips, they operate pins
IP conflicts
Two devices using same IP address No connection for at least one device
USB Standard types
Type A - Computer interface Type B - device interface Most commonly found in printers/scanners/multi-function
USB Micro
Types Micro A Micro B Physically smaller connectors than Mini Most commonly found in newer mobile devices (cellphones, GPS, or PDA)
USB Mini
Types Mini A Mini B Physically smaller connectors Most commonly found in cameras or smaller devices where space is limited
Iris scanners
Typically an external device Computer scans user's eye to grant or deny access
Cable Considerations
USB 2.0 or USB 3.0
USB to Ethernet Mobile Use Cases
USB Ethernet adapters can be used on mobile devices as well Different devices have different requirements
Common Flash Devices
USB flash drives CompactFlash Secure digital (SD) card MiniSD and MicroSD card xD-Picture card
Synchronization Connections
USB wired connections 802.11 Wireless connections Bluetooth
Data Rates and installation
UTP Easier to install as cables are Flexible Smaller Lighter Slower data rates STP Installation of cables can be more challenging compared to UTP Provides higher data rates
Cable Comparison
UTP vs. STP Both are cables with wires that are twisted together Shielded twisted pair uses a foil or mesh shield to reduce noise and crosstalk Also requires the use of an electrical ground
Direct Burial STP
Underground installations Direct burial rated shielded cabling is ideal for outdoor implementations or installs directly in the ground With or without the use of conduit
UEFI
Unified Extensible Firmware Interface Safer to update
UTM
Unified Threat Management
Driver Considerations
Unique to printer model Ensure up-to-date driver Operating system compatibility
Syslog compatibility
Unix/Linux Mac OS Windows (non-native)
UTP
Unshielded Twisted Pair
Twisted Pair Cabling
Unshielded Twisted Pair (UTP) Shielded Twisted Pair (STP)
Thunderbolt Connectivity
Up to 40 Gbps data throughput Bidirectional Can transmit and receive data at the same time
Troubleshooting Quality
Update drivers Use high-resolution source files Align print heads Lower print speed Environmental considerations Handling supplies Perform regular maintenance
Troubleshooting queue problems
Use GUI print interface Restart spooler service Power cycle printer Check memory Cancel print jobs
Which of the following are antistatic protection measures that you could implement? [Choose all that apply] Use an antistatic bag Use an ESD strap Use an electronic vacuum Use an ESD mat
Use an antistatic bag Use an ESD strap Use an electronic vacuum Use an ESD mat
External Symptom-based Research
Use external sources to capture information Vendor knowledge base Third-party knowledge base Internet search Industry or academic literature
How location information is used
Used by device's operating system and apps. Checking into a location Logging of real-time movement Mapping services Determine correct date and time
What is TCP used for?
Used for large transfers Zone Transfers Synchronizing
Integrated Drive Electronics (IDE)
Used for storage devices Connections made to motherboard IDE ribbon cable Three connection points Two device connections Types of IDE cables 34 pin (Floppy disk drive) 40-pin (hard disk drive)
Mobile Device Management (MDM)
Used in businesses. Optimize the functionality and security of mobile devices. Protect the corporate network
Plenum Cabling
Used in plenum spaces Fire hazard Fire-retardant plastic Low smoke polyvinyl chloride and fluorinated ethylene Less flexible
Punch Down Block
Used to connect one set of wires to another set of wires
Tone Generator
Used to identify end points or cable runs Allows a tone to be placed on one end of the cable The tone is used to locate the other end of the cable
What is CDMA Cellular Connectivity
Used to provide multiple devices simultaneous access. This is a form of multiplexing. Each device is assigned a code. Allows numerous signals on a single transmission channel
What is UDP used for?
Used to return smaller amounts of data A records Canonical names (CNAMEs)
Probe
Used to trace the tone Once the cable has been identified, it will play a tone Each cable end must be probed individually Also used to identify continuity in a cable
HTML5 VPN
Used with compliant web browsers No need to install a VPN application Comprehensive support for APIs
UDP
User Datagram Protocol
UPD
User Datagram Protocol Speeds up communication Delivedry and order is not
Common Protocols
User Datagram Protocol (UDP), Transmission Control Protocol (TCP), Internet Control Message Protocol (ICMP)
Basic User Authentication
User name and password RFID card tap
Global Positioning System (GPS)
Uses Radio navigation system. Geolocation satellites. Incoming data. Location and time
Touchscreen displays
Uses a finger and stylus as a input
GUI
Uses a graphical user interface
Subscriber Connector (SC)
Uses a push-pull latching mechanism Bidirectional communication requires: Two fiber cables Two SC connectors
ECC Error Correction
Uses parity For every 8 bits written, 9th parity bit stored For each byte, total of 1s are summed up Value of parity bit compared to data It parity bit matches bit count, data assumed to be correct Error correcting memory will attempt repair Less common in modern systems ECC memory considered reliable Modern technology negates need Limited to single bit errors in a byte
Wireless Internet Service Provider (WISP)
Uses wireless technology to provide internet service Also referred to as long-range wireless network Relatively inexpensive wat to provide internet to certain communities
Mobile Device Synchronization
Using multiple devices Access anytime and anywhere Access different types of data
Cable Modem
Utilizes coaxial cables Medium allows for high frequencies Faster than DSL
Fiber Optics
Utilizes light to send data Multiple wirelengths can be used to increase throughput Cables made of ultra-fine glass or plastic fibers More expensive then cooper cable
Virtual Machine Requirements
VMs still perform like independent computers They require the same resources Determine requirements for each VM Physical host requires resources too
DHCP Scopes
Valid range of IP addresses Configured on DHCP server Configure scope to allow or deny
Benefits of a Test page
Verifies printer function Verifies connectivity
Basic Cable TEsters
Verify conductive path Verify correct wiring of connectors
Dealing with IP Conflicts
Verify manual vs dynamic configuration Use ping Neighboring devices, default gateway
VA
Vertical alignment
F Connectors
Very common connection for video distribution
BIOS Limitations
Very old (1980s) Not compatible with large modern hard drives or large amount of memory Runs in 16-bit CPU mode Only 1 MB of execution space
DVI to VGA
Video scenarios Note the gender of each connector Backward compatibility Analog VGA signals
VLAN
Virtual Local Area Network
Which of the following is a secure connection with encryption and authentication that encapsulates packets and creates tunnels? Virtual Private Network SSH VNC OpenSSH
Virtual Private Network Virtual Private Networks (VPNs) are used to keep information private over unsecure networks. VPNs can be used to connect remote users to their offices, secure shopping and banking data, use public Wi-Fi, or maintain anonymity while browsing the Internet. The data remains hidden using encapsulation, tunneling and encryption. Virtual Network Computing (VNC) is another type of Remote Desktop Connection. The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated. Secure Shell, or SSH, is a command-line interface that allows you to connect to a remote computer in a secure manner. OpenSSH is an open-source connection tool for creating SSH connections.
VDI
Virtual desktop infrastructure
Low-Level resources
Virtual machines Virtual networks Virtual appliances
Key features of Virtual desktops
Virtualization software Multiple desktop Virtual desktop infrastructure (VDI) Desktop-as-a-Service (DaaS) Remote connectivity client
.vbs
Visual Basic
Network Connection
VoIP requires additional bandwidth Can be an issue if voice and data used on some network Modify network settings
VoLP
Voice over internet protocol
Which method of biometric security is typically considered to be the easiest to circumvent?
Voice recognition
What does W in RJ11W indicate? Width Wall Wavelength Wire
Wall RJ11W represents a wall mount female jack for the RJ11 connector.
Water-based Microprocessor Coolers
Water reservoir Water pump Condenser call radiator
Cold Cathode Fluorescent Light (CCFL) disadvantages
Weighs more Uses more power Inverter for every CCFL Ambient temperature
Micro-B plug
What is this
Mini-8 Plug
What is this
Standard-A plug
What is this
Standard-B Plug
What is this
USB 3.0 micro-B plug
What is this
USB 3.0 standard-B plug
What is this
DVI to HDMI use cases
When a PC only has DVI out but the monitor only has HDMI
802.11ax
Wi-Fi 6 Bandwidth up to 10 Gpbs Dual-band wireless 2.4/5 Ghz
Troubleshooting Interference
Wi-Fi channel/frequency Trial and error Wi-Fi scanning tools Mesh networks and extenders
WAN
Wide Area Networks
WAN
Wide area network
Which Control Panel utility manages inbound and outbound traffic based upon a defined set of rules? Windows Defender Firewall Device Manager Administrative Tools Programs and Features
Windows Defender Firewall
WISP
Wireless Internet Service Provider
WLAN
Wireless Local Area Network
WMN
Wireless Mesh Network Technology
Types of Wireless Networking Hardware
Wireless access point Extender Repeater
Wireless Local Area Network (WLAN)
Wireless connectivity for devices Uses high frequency radio waves Generally includes internet access point Allows user mobility
Bluetooth
Wireless data transmission standard. Used for short distances. Wireless Personal Area Network (PAN). Connects different devices. Automatic connection and disconnection
802.11n
Wireless n Multiple signals and antennas Better range Backward compatible with 802.11b/g
Using a Performance Monitoring Application
Works well for memory usage Not Ideal for CPU and I/O usage Can assist with VM planning Doesn't capture host data when running in the VM Measurements can be skewed
Subnet mask
Works with IP address Determines network size SOHO default configuration 255.255.255.0
Lightning Functionality
Works with many other newer Apple devices Magic mouse/keyboard/trackpad/pencil Airpod charging Beats headphones/speakers
Intel Corporation
World's largest processor manufacturer Inventor of x86 series of CPU
Wi-Fi Antennas in laptops
Wrapped around laptop display More durable
ZIF
Zero insertion force
A Domain is
a collection of users, computers, and other items that are controlled by the Active Directory administrators. They are grouped together regardless of their physical position.
Cryptographic Group members
are authorized to perform cryptographic operations.
Power Users
are included for backward compatibility and possess limited administrative powers.
Distribution Groups
are only meant for communication purposes. These are email lists that allow for communication with the users in the active directory. Distribution Groups can't affect policy.
Security groups
are the types of groups that allow administrators to apply rights and permissions, control access to shares, and apply overall controls to the system.
You work for a company that provides the same smartphone model for dozens of its employees. While troubleshooting one smartphone that won't connect to the cellular network, you call the provider's tech support number for some assistance. The technician asks for the device's IMEI. What is she trying to determine? A. The IP address of the phone on the cellular provider's data network B. The OS version on the phone C. The specific device you're calling about D. The SIM card installed in the device
c The IMEI identifies a device. It does not identify the OS version, the SIM card, or the IP address of the phone.
Antennas
can be In-screen Multiple types
A Tree is a
collection of Domains that have formed a trust relationship with each other.
Common Symptoms for drivers and RAID array
drive not recognized Slow HDD performance Operating system not found Crash screens RAID not found S.M.A.R.T.
DIMMs
dual in-line memory modules
802.11g
emerged in 2002 Draws from 802.22a and 802.11b Bandwidth up to 54 Mbps 2.4 Ghz frequency Backward compatible with 802.11b
Fiber Optic
fast and reliable 25 Mbps to 1-5 Gbps download speeds 5-880 Mbps upload speeds Can be combined with both TV and phone Servies
HSF
heat sink and fan
Automobile Synchronization with Bluetooth
iOS CarPlay and Android Auto
SSD Form Factors
mSATA M.2
Organizational Units are a
necessary component of Active Directory's operation. Users, groups, and other group policy objects are stored in Organizational Units.
Legacy systems
old outdated, unsupported systems Networks can be a mix of old and new hardware/software Expensive to maintain Run proprietary software May require specialized programming Specific purpose Does what it's supposed to Security
PLS
plane to line switching
What is the key drawback of STP or per VLAN STP - PVST? Complicated configuration Fast convergence Slow convergence They do not have any drawbacks and are mostly used today They cannot provide loop free environment link RSTP or RPSTP
slow convergence STP and PVST do provide loop-free environments and are still used on older equipment. But they are considered legacy STP because of slow convergence. The port will go through a listening and a learning state (30 seconds and more), thus causing slow convergence.
Modems
stands for modulation and demodulation Transmit digital signals over an analog medium Are used by computers to send and receive data
Task Scheduler is a program
that allows you to create and manage tasks that your computer will perform automatically at the times you specify. Predefined tasks are saved in Task Scheduler Library folders. Alternatively, users can create custom tasks as well.
A key component to using the GSM on your device is
the SIMs card
The Forest is at
the top level in the active directory structure. Forests are separate from one another. They each have their own boundaries for security and have a single database and global address for each.
Task Manager is a
tool that allows users to stop processes, get system information, and adjust logon applications and services.
Logon scripts can be
used for several purposes, such as including the mapping of network drives to users and computers, installing applications, setting up printers, creating log files, and many other tasks. Once the script is written, it will need to be saved in a batch file. The batch file is used to automate a process. When the user signs in, any logon scripts will be executed.
DA-15 connector
8-7 pin layout and the key users for this type of connector are for gaming controllers
Which of the following can be enabled when the user signs in? It helps administrators with automating tasks, connecting shares and other useful processes. A. Logon Script B. Task Scheduler C. Task Manager D. BIOS
A
How to enable Bluetooth
Access setting on a mobile device Apple devices Android devices Enabling Bluetooth on a laptop. Allow Bluetooth devices to find computer.
As an IT technician, you arrive at a customer's home office to troubleshoot problems they are experiencing with their printer. While questioning the customer to get an understanding of their network, you find they have a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. They also have several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with? A. WAN B. LAN C.WMN D. PAN
B A LAN can have a variety of several devices, but it is always limited to a single router that creates the boundary for the network. A single router indicates a LAN.
BIOS is the
Basic input/ output system and is essential for starting the computer once it's powered on.
Preferred Roaming Lists (PRL) Updates
Changes to provider network configuration. Connecting to the right tower. Updating over-the-air
Which mobile security feature ensures that the device will not be vulnerable to attacks? A.Encryption B. Location C. Lock Screen D. Security Update
D
Which one of the following Screen lock options is not secure? A. Pattern B. PIN C. Password D. Swipe
D
DIMM
Dual in-line memory module
What do GSM Networks allow cellular phones to do
Enable voice calls and transfer data
GPT
GUID Partition Table
GSM Communication is a network of what
Gateways, Repeaters, Relays and all mobile devices comment to cell towers.
GPS
Global Positioning System
.ps1
Powershell
PRL
Preferred Roaming List Updates
Lightning cable
Proprietary to apple products. Introduced in 2012. Used for power and data
Corporate-Owned, Personally Enabled (COPE)
The organization provides the mobile device to the user. However, as a user, you are only allowed to install pre-approved apps.
Corporate-Owned, Business Only (COBO)
The organization provides, controls, and manages the devices. The applications and the data belong to the organization.
DC-37 Connector
used in aerospace industrial, defense, and healthcare
.bat extension is
used to create a Windows batch file.