Comptia A+ Core 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Domain-based Authentication, Reporting, and Conformance (DMARC) framework utilizes the Sender Policy Framework (SPF) or the DomainKeys Identified Mail (DKIM), or both, to provide what?

A more robust policy mechanism for senders

sound cards

A basic sound chip may be provided as part of the motherboard chipset, but better-quality audio functions can be provided as a PCIe or PCI expansion card. audio playback is achieved via speakers or headphones, which are connected to a sound card via an audio jack. Sound cards are also used to record input from a microphone. Most audio jacks are 3.5 mm (⅛ inch) mono or stereo jacks. These are also referred to as phone plugs or mini tip, ring, sleeve (TRS) connectors. Sound cards supporting multiple output channels with an appropriate speaker system can provide various levels of playback, from mono (on legacy systems) or stereo to some type of surround sound. Surround sound uses multiple speakers positioned around the listener to provide a "cinematic" audio experience. Pro-level cards may also feature onboard memory, flash memory storing sound samples (wavetables), and additional jack types for different input sources.

A cyber architect is capturing the various proprietary crash screens across various operating systems. What will the displays present when a crash has occurred

A blue screen appears on the display The screen displays a kernel panic or "Something has gone wrong" message The screen freezes with a spinning pinwheel cursor

You need to connect permanent cable to the back of a patch panel. Which networking tool might help you?

A cable stripper to remove the jacket insulation and a punchdown tool to terminate the wire pairs into insulation displacement connector (IDC) blocks.

ipx phone case ratings

A case or device will have a label with two digits. The second number is for liquids, with a 7 protecting against immersion up to 1 m. The IP number will be IPX7 or IPX8 if not rating dust protection. The second rating is for liquids, with an 8 providing superior protection against immersion beyond 1 m. A casing or device will have two numbers labeled on it. The first is a rating for solids repellency. The second number refers to liquids. The IP number will be IPX7 or IPX8 if not rating dust protection. The second rating is for liquids, with a 7 protecting against immersion up to 1 m.

Which of the following describes a strategic advantage of moving to a private cloud?

A cloud architecture is maintained and managed within an enterprise data center. Organizations can exercise greater control over the privacy and security of their services.

A computer operator has an x8 PCIe but plugs it into an x16 connector. The operator notices that performance seems to be a bit sluggish. What is the most likely cause?

An x8 card will fit in an x8 or x16 socket. Therefore, the card should work at x8, but in some circumstances, it may only work at x1.

Most mobile devices use a flat-panel screen technology based on a type of ?

Liquid crystal display (LCD) A liquid crystal is a compound whose properties change with the application of voltage.

You are assisting another customer with a full fiber connection terminated to an optical network terminal (ONT). The customer's router was disconnected while some building work was being completed, and the patch cable is now missing. The customer thinks that the cable should be a fiber optic one because the service is "full fiber." What type of cable do you need to locate?

An RJ45 unshielded twisted pair (UTP) patch cable. The ONT converts the optical signal over the external fiber optic cable to an electrical one to connect to the local router.

beep codes

A power-on self-test (POST) error occurs when a technician hears two short beeps. The monitor would present an error code to troubleshoot further. One long and three short beeps would indicate a video adapter error. Resolve this by updating the video drivers or checking internal connections. Three long beeps would indicate a keyboard issue. First, check that a key is not depressed. Then, tap on every key or re-insert the keyboard USB into the computer to resolve. One short beep indicates a normal power-on self-test (POST), meaning the system is OK. Computer technicians configure most modern PCs to boot silently, however. A continuous beep indicates a problem with system memory modules or the memory controller. Replacing the memory modules or reseating them can help to resolve this issue. No beep may indicate a problem with the power supply, the motherboard problem, or a faulty onboard speaker. The technician should narrow down the issue by checking each component to rule it out, moving on to the next one until discovering the component causing the problem. Repeating short beeps would indicate a power supply fault or a motherboard problem. Check power cord connections to internal components, especially to the motherboard itself

network prefixes

A prefix is a 32-bit value with a given number of contiguous bits all set to 1. For example, a prefix with 24 bits is the following binary value: 11111111 11111111 11111111 00000000 This can be written in slash notation in the form /24. The prefix can also be expressed in dotted decimal as a subnet mask: 255.255.255.0 Slash notation is used to refer to network IDs, while the subnet mask is typically used in host configuration dialogs. For example, 192.168.0.0/24 refers to an IP network, while 192.168.0.1/255.255.255.0 refers to a host address on that IP network. sends over ethernet (arp) if local/same subnet. sends to router if for a different network Most hosts are configured with a default gateway parameter. The default gateway is the IP address of a router interface that the host can use to forward packets to other networks. The default gateway must be in the same IP network as the host.

What is the main security requirement of a virtualization workstation configured to operate VMs within a sandbox?

A sandbox means that the VM environment should be isolated from the host and from other VM environments. A sandbox is often used to investigate malware. If the sandbox is secure, the malware can be executed and observed without the risk of it spreading to other systems (VM escaping).

hardware security module (HSM)

A secure USB key or thumb drive used to store cryptographic material

A technician is building out a new desktop PC and is trying to connect the hard drive and ensure it has power. In a more modern system, which cable will provide power?

A separate 15-pin serial advanced technology attachment (SATA) power connector connects the device to the PC's power supply. The 7-pin data connector does not supply power. Instead, SATA uses cables of up to 1 m (39 in.) terminated with compact 7-pin connectors. Each SATA host adapter port supports a single device.

CPU Cores

A single-core CPU has a single execution unit and set of registers implemented on a single package. A dual-core CPU is essentially two processors combined in the same package. This means that there are two execution units and sets of registers. Each core will also have its own cache plus access to a shared cache. This is referred to as chip level multiprocessing (CMP). The market has quickly moved beyond dual-core CPUs to multicore packages with eight or more processors. Multicore and multithreading features are designated by n C/ n T notation. For example, an 8C/16T CPU with multithreading support has eight cores but processes double that number of simultaneous threads.

Accessed by only servers, a network uses Fiber Channel adapters to implement connections. What type of network is this?

A storage area network (SAN).

A host is configured with the IP address 172.16.1.100 in the 172.16.1.0/16 IP network. What value should be entered as the subnet mask?

A subnet mask field uses dotted decimal format. The /16 network prefix means that the first 16 bits in the mask are set to one: 11111111 11111111 00000000 00000000. A whole octet of ones converts to 255 in decimal. Therefore, the dotted decimal mask is 255.255.0.0.

[] networking hardware

A switch is a hardware networking appliance acting as a concentrator or connector for cable segments to a patch panel or router port. The digital subscriber line (DSL) modem or small office or home office (SOHO) router is a separate hardware device that can be embedded into a system to connect to the Ethernet. A firewall is a network security system or shielding layer/barrier to protect a computer system from unwanted data/viruses. It can be both a hardware device and a software program. A software-defined networking (SDN) controller is a virtual device inserted as a control layer between a software-defined networking model's application and infrastructure layers. A small office or home office (SOHO) will generally use a single wireless router, which combines the functions of a router, DSL/cable modem, Ethernet switch, and Wi-Fi access point to provide connectivity. A cable modem forwards data traffic via the fiber backbone to the ISP's point of presence and then to the internet via several access ports. An NIC adapter card will support other types of Ethernet, such as fiber optic. Motherboards have a built-in 1000BASE-T compatible adapter. The patch panel terminates cabling and does not establish any connections between the cable segments to any networks or internet to provide connectivity. previous

simultaneous multithreading (SMT) (hyperthreading)

A thread is a stream of instructions generated by a software application. Most applications run a single process in a single thread; software that runs multiple parallel threads within a process is said to be multithreaded. SMT allows the threads to run through the CPU at the same time. This reduces the amount of "idle time" the CPU spends waiting for new instructions to process. To the OS, it seems as though there are two or more CPUs installed.

utm benefits

A unified threat management (UTM) appliance consolidates the configuration, monitoring, and reporting of multiple security functions to a single console or dashboard. A UTM can provide additional functionality not currently available together, such as intrusion detection, spam filtering, or data loss prevention. A UTM does not replace a basic network address translation (NAT) function performed by a SOHO router with a device that can work as a proxy. Spam gateways installed on a network server use Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) to verify the authenticity of mail servers. In addition, the administrator configures them with filters to identify spoofed, misleading, malicious, or unwanted messages.

You are recommending that a small business owner replace separate firewall and antimalware appliances with a UTM. What is the principal advantage of doing this?

A unified threat management (UTM) appliance consolidates the configuration, monitoring, and reporting of multiple security functions to a single console or dashboard. You might also mention that the UTM might provide additional functionality not currently available, such as intrusion detection, spam filtering, or data loss prevention.

Why must a vendor account usually be configured on a smartphone?

A vendor account, such as an Apple, Google, or Samsung account, is required to use the app store.

What type of network has no specific geographical restrictions?

A wide area network (WAN) can span any geographical distance.

A network uses an IEEE 802.11 standard to establish connections. What type of network is this?

A wireless local area network (WLAN).

What type of value would you expect a query for an AAAA resource record to return?

An IPv6 address.

CompTIA Troubleshooting Step 4 - implement of plan of action

There are typically three generic approaches to resolving an IT problem: 1. Repair—You need to determine whether the cost of repair makes this the best option. 2. Replace—Often more expensive and may be time-consuming if a part is not available. There may also be an opportunity to upgrade the part or software. 3. Workaround—Not all problems are critical. If neither repair nor replacement is cost-effective, it may be best either to find a workaround or just to document the issue and move on. plan of action to put the solution in place test after each change may need to escalate if you do not have authorization to implement a solution refer to vendor instructions

Troubleshoot OS errors / BSOD

This typically indicates that there is a system memory fault, a hardware device/driver fault, or corruption of operating system files. Once the machine has booted it is usually not hardware related (ssd/ram/gpu/psu/cpu/etc)

fully qualified domain name (FQDN)

To avoid the possibility of duplicate host names on the Internet, the host name can be combined with a domain name and suffix

An open-loop, liquid-based cooling system uses the following components:

The water loop/tubing and pump push the coolant added via the reservoir around the system. Water blocks and brackets are attached to each device to remove heat by convection. These are attached in a similar way to heat sink/fan assemblies and then connected to the water loop. Radiators and fans are positioned at air vents to dispel the excess heat. (There are also simpler closed-loop systems that install to a single component (CPU or GPU) only.) An open-loop system will usually need draining, cleaning, and refilling periodically. The system should also be drained prior to moving the PC to a different location.

wi-fi analyzer

To determine the best channel layout and troubleshoot wireless network performance, you need to measure the signal strength of the different networks using each channel. This is what this tool is for. (software)

plain old telephone system (POTS)

See Public Switched Telephone Network (PSTN).

CAT Standards

See photo

patch panel front

See photo

Why can cache improve performance?

A CPU tends to repeat the same routines and access the same data over and over again. If these routines are stored in fast cache RAM, they can be accessed more quickly than instructions and data stored in system memory.

The original SD memory cards have a

2 GB maximum capacity

SDXC memory cards have a

2 TB capacity

IEEE 802.11n

2.4 GHz and 5 GHz channel bonding - 40 multiple input multiple output (mimo) marketed with Nxxx designations, where xxx is the nominal bandwidth wifi 4

IEEE 802.11b standard uses

2.4 GHz frequency band

P1 Form Factors

20 pin, 24 pin, or 20 + 4 pin connector that powers the motherboard Most systems are now based on the ATX12V version 2 specification. This defines a 24-pin (2x12) P1 form factor. 20 pin is old, and 20+4 is meant to support old and new psu options

requests/security

(AAA) server consolidates authentication services across multiple access devices containing directory information. Supplicants are the devices that request access, such as a user's workstation, laptop, and printer in AAA systems. Supplicants, combined with the AAA server and network access appliances, consolidate authentication services. Syslog is a network management tool and an example of a protocol and supporting software that facilitates log collection. Syslog and SNMP can centralize logs and network appliance status information. Proxy servers can operate as a transparent or nontransparent service, providing security when acting as a content filter and blocking inappropriate sites. fulfills requests for internet resources and configures or converts a private address to a public address so a client can access the internet directly. The AAA server, combined with the supplicant and network access appliances, consolidates authentication services across multiple access devices. A mail server enables a person to compose a message and send it to another person worldwide via the internet, but the mail server does not translate IP addresses. A print server has the core network functions to provide shared access to disk and print resources, but it does not translate IP addresses. A web server provides client access using HTTP or HTTPS but does not translate IP addresses.

usb transfer rates

****pay attention to bit (first value) and byte (second value) usb 1.0 (low speed) - 1.5mbps usb 1.1 (full speed) - 12mbps/1.5MBps usb 2.0 (hi speed) - 480mbps/60MBps usb 3.2 gen1 - 5gbps/500MBps usb 3.2 gen2 - 10gbps/1212MBps usb 3.2 gen2x2 - 2x10gbps usb4 - 40gbps/4GBps

Comptia Troubleshooting Model

1. Identify the problem: -Gather information from the user, identify user changes, and, if applicable, perform backups before making changes. Begin documentation. -Inquire regarding environmental or infrastructure changes. 2. Establish a theory of probable cause (question the obvious): If necessary, conduct external or internal research based on symptoms. 3. Test the theory to determine the cause: Once the theory is confirmed, determine the next steps to resolve the problem. If the theory is not confirmed, re-establish a new theory or escalate. 4. Establish a plan of action to resolve the problem and implement the solution: Refer to the vendor's instructions for guidance. 5. Verify full-system functionality and, if applicable, implement preventive measures. 6. Document the findings, actions, and outcomes.

procedure to install a motherboard

1. check documentation. jumper clip adjustment if needed (jumper clips go over header pins) 2. orient mobo with i/o cutout, orient the blanking plate, and fit the blanking plate into the case by snapping it into the cutout 3. insert standoffs to line with mobo. don't add unnecessary standoffs 4. add cpu and ram (optionally) 5. check alignment and verify standoffs are secure. if so, place motherboard on standoffs 6. screw in standoffs, but do not overtighten 7. add power supply/disks as well as any adapter cards, data/power connectors.

troubleshooting performance issues

1. check for overheating with temp sensors and fan speeds, reduce performance level to prevent heat issues if present (throttling) 2. check for misconfigurations - esp for new builds or upgraded machines - compatibility of new components, etc 3. verify the issue - there are compute, storage, and networking functions. Any three of these may be the source of sluggish performance. If possible, use diagnostic tests to compare performance of the CPU, system memory, fixed disk, and network adapter/speed tests to known performance baselines 4. Rule out operating system/app/configuration/networking issues that may not apply to the actual machine itself

troubleshoot missing video issues

1. check power, video, and adapter cables. substitute with known good products to test further 2. ensure the monitor is turned on 3. use controls to select the appropriate data source 4. projectors and monitors with backlight may have a burnt out bulb and requires replacement

internet access can be provided for hosts using a private addressing scheme in two ways:

1. nat 2. proxy server that fulfills request of internet resources on behalf of clients

A help desk analyst is looking at a computer that has PC-1600 RAM in it. What is the maximum data transfer rate?

1.6 GBps

A help desk analyst is looking at a computer that has PC-1600 RAM in it. What is the maximum data transfer rate?

1.6GBps

A database administrator reviews servers in the company's environment and comes across an older server with which the administrator is unfamiliar. The system has set the server for redundancies and load input/output operations per second (IOPs) load balancing. Which Redundant Array of Independent Disk (RAID) configuration is the server using?

10

What is the nominal data rate of a USB port supporting Gen 3.2 2x1?

10 gbps

High-performance drives are rated at

10-15k

Transfer rates are expressed in units per second of the following multiples of bits and bytes:

1000—Kilobits (Kb/s or Kbps) and kilobytes (KB/s and KBps). 1000x1000—Megabits (Mb/s) or megabytes (MB/s). 1000x1000x1000—Gigabits (Gb/s) and gigabytes (GB/s). To calculate, divide the amount of data sent by the amount of time sent to complete the transfer. if it takes 2 seconds to send a 50gigabit file, the rate would be 50Gb/2 seconds = 25Gbps

ipv6

128 bit address in hexadecimal notation 2001:0db8:0000:0000:0abc:0000:def0:1234 shorten by ignoring leading zeroes in a byte and simply adding a double colon for the case where two bytes in a row is all zeroes 2001:db8::abc:0:def0:1234

A computer engineer is designing a custom new gaming laptop and is currently designing power output and connections. Which rail is the most important to consider?

12v

A retired penetration tester devotes time to helping and teaching people. The pen tester acquires older technology to help with teaching, and as the years go by, the pen tester swaps components to keep costs low. Unfortunately, some of the power supply units (PSUs) are starting to die out, and the tester finds that the newer units do not connect properly with the motherboard. What is the best option to buy for compatibility?

20+4-pin P1 adapter cable Some power supply units (PSUs) have a 20+4-pin P1 adapter cable for compatibility with older motherboards with a 20-pin port.

Which power connection provides main power to the motherboard?

24 pin ATX

External SATA (eSATA)

2m cable. must use an eSATA cable to connect to an external eSATA port; you cannot use an internal SATA cable. eSATAp is a nonstandard powered port used by some vendors that is compatible with both USB and SATA (with an eSATAp cable). The USB interface dominates the external drive market, however.

A gamer primarily uses a desktop computer set up to handle the most resource-intensive games without experiencing any lag. However, the hard drive went bad and needed replacing. What form factor should the gamer buy for it?

3.5"

An IPv4 address is ________ bits long

32

Secure Digital High Capacity (SDHC) memory cards have a

32 GB capacity

You are configuring four 120 GB drives in a RAID 5 array. How much space will be available?

360 GB

nibble

4 bits

unshielded twisted pair (UTP)

4 wired pairs that have electrical signals sent over them each wire carries an equal but opposite signal to its pair

wifi 5 is designed to work in the ____ ghz band

5

Standard storage device widths

5.25, 3.5, 2.5

A network administrator can configure a small office home office (SOHO) router to provide an IPv4 address configuration to hosts without further administrator attention. A technician wrote some notes about IPv4 addresses used in various networks associated with the company support tickets. The technician assigned one of the addresses to the WAN interface of a SOHO router that requires troubleshooting. Which of these addresses must it be? 224.100.100.1 169.254.1.121 52.165.16.254 192.168.100.52

52.165.16.254 reasoning: The WAN interface of the router must use an IPv4 address from a valid public range, so 52.165.16.254 is the only one to use on a SOHO router. The address 192.168.100.52 is in the class B and class C private ranges. Hosts with IP addresses from these ranges are not allowed to route traffic over the public internet. Address 169.254.1.121 is in the range reserved for APIPA (automatic private IP addressing). Therefore, it can communicate with other hosts on the same network that uses APIPA but not hosts with a valid DHCP lease. Address 224.100.100.1 is outside the range of valid public addresses and is part of class D, which is for a type of addressing called "multicasting."

Wi-Fi 5 (or 802.11ac) and Wi-Fi 6 ( 802.11ax )

5ghz wider channel bonding 80-160 wifi 6 - introduces orthogonal frequency division multiple access" (OFDMA)

An avid technical enthusiast recently purchased a newly upgraded ENERGY STAR 80 PLUS mining rig, which operates on a 500W supply. The technical enthusiast wants to calculate the cost of power consumption, compare it to the value of bitcoin mined, and see how long it takes to break even. How much power should the enthusiast estimate the mining rig to use?

625 An ENERGY STAR 80 PLUS compliant power supply unit (PSU) must be 80% efficient at 20-100% of the load. Dividing 0.80 into 500W would give an expected output of 625W.

What is the bandwidth of a PCIe v2.0 x16 graphics adapter?

8 GBps in each direction (full-duplex). PCIe v2 supports 500 MBps per lane.

byte (B)

8 bits

100BASE-T

802.3 Ethernet standard. refers to Fast Ethernet over copper twisted pair cabling. Fast Ethernet works at 100 Mbps.

1000BASE-T

802.3 Ethernet standard. refers to Gigabit Ethernet over copper twisted pair cabling. Gigabit Ethernet works at 1000 Mbps (or 1 Gbps). 1000BASE-T is the mainstream choice of standard for most LANs.

10GBASE-T

802.3 Ethernet standard. refers to a copper cabling standard working at 10 Gbps.

RJ45 connectors

8P8C two methods for terminating twisted pair: T568A/T568B

default port for the secure POP3/IMAP

993 995

A computer repair specialist diagnoses an issue with a peripheral component interconnect (PCI) card for a user. The user has a much older computer but is replacing parts to improve the overall computer operations without paying the cost of a brand new computer. However, the specialist notices that the keying does not quite line up. What is the reason it is not working?

A 3.3V card was inserted in a 5V slot. To prevent a user from inserting an incompatible PCI card into a motherboard slot (for example, a 3.3V card in a 5V PCI slot), the keying for the three types of cards is different.

[]dsl router/modem cables

A 300 m ADSL RJ11-terminated patch cord can connect to the phone line to support 52 Mbps downstream/6 Mbps upstream. A symmetric link only supports 26 Mbps in both directions. incorrect: A rewired RJ45 patch panel cord connects to a port from the patch panel to a port on the Ethernet switch and will not work properly with an ADSL router. Although very-high speed DSL (VDSL) modems can support asymmetrical DSL (ADSL), an ADSL will not support VDSL. VDSL specifies a very short range (100 m) but supports up to 100 Mbps bi-directionally. The USB connects most peripheral devices, with the maximum cable length for low-speed devices being 3 m and a limit of 5 m for full-speed and high-speed

host controller

A USB is managed by a host controller. Each host controller supports multiple ports attached to the same bus. In theory, there could be up to 127 connected devices per controller, but to overcome the limitations of sharing bandwidth, most PC motherboards provision multiple USB controllers, each of which has three or four ports. bandwidth sharing isnt true for hubs but is for daisy chaining

You receive a support call from a user of one of the company's computer-aided design (CAD) workstations. The user reports that a notification "RAID utility reports that the volume is degraded" is being displayed. A recent backup has been made. What should you do to try to restore the array?

A degraded volume is still working but has lost one of its disks. In most RAID configurations, another disk failure would cause the volume to fail, so you should add a new disk as soon as possible (though do note that rebuilding the array will reduce performance).

logical security control

A firewall is a logical security control that manages network communications by allowing traffic that a sysadmin or an authorized individual only permits. A switch is a hardware networking appliance acting as a concentrator or connector for cable segments to a modem, patch panel, or router port. A switch is not involved in the security controls of the network. An injector is a device to connect to a switch port or modem if the switch does not support Power over Ethernet (PoE) and is not involved in the security controls of the network. Patch panels are hardwired wall ports with cables running through the walls and terminated to an insulation displacement connector (IDC). They are not involved in the security controls of the network. previous

Troubleshoot drive availablility

A fixed disk that is failing might display the following symptoms: Unusual noise (HDD only) grinding noise, or any sort of clicking sound, is a sign of a mechanical problem. LED status indicator inactivity Constant LED activity—Constant activity, often referred to as disk thrashing, can be a sign that there is not enough system RAM so that the disk is being used continually for paging (virtual memory). It could also be a sign of a faulty software process or that the system is infected with malware. Bootable device not found—If the PC fails to boot from the fixed disk, it is either faulty or there is file corruption. Missing drives in OS—If the system boots, but a second fixed disk or removable drive does not appear in tools such as File Explorer or cannot be accessed via the command-line, first check that it has been initialized and formatted with a partition structure and file system. If not detected by a configuration tool such as Windows Disk Management, likely hardware or cable/connector fault. Read/write failure—This means that when you are trying to open or save a file, an error message such as "Cannot read from the source disk" is displayed. On an HDD, this is typically caused by bad sectors . A sector can be damaged through power failure or a mechanical fault. If you run a test utility, such as chkdsk, and more bad sectors are located each time the test is run, it is a sign that the disk is about to fail. On an SSD, the cause will be one or more bad blocks. SSD circuitry degrades over the course of many write operations. An SSD is manufactured with "spare" blocks and uses wear leveling routines to compensate for this. If the spare blocks are all used up, the drive firmware will no longer be able to compensate for ones that have failed. Blue screen of death (BSOD)—A failing fixed disk and file corruption may cause a particularly severe read/write failure, resulting in a system stop error (a crash screen). When experiencing any of these symptoms, try to make a data backup and replace the disk as soon as possible to minimize the risk of data loss.

A company deploys a new cloud service for its customers and its salespeople. Depending on the login access, users of the service will either shift to a resource center internal to the organization or to a forum where customers can freely collaborate. What cloud model does the company deploy?

A hybrid cloud type is a cloud computing solution that implements some sort of hybrid public/private/community.

A network owner has configured three web servers to host a website. What device can be deployed to allow them to work together to service client requests more quickly?

A load balancer.

The network supervisor plans to predominantly use the 5 GHz band for an open plan office network. However, the business owner has heard that this has a shorter range and thinks the network supervisor should use the 2.4 GHz band. Why should the 5 GHz band be preferred over the 2.4 GHz band in this case? (Select all that apply.) A. On a 2.4 GHz network, there is not enough space for separate networks. B. The chances of overlap are high on a 2.4 GHz band, increasing the risk of interference from other products. C. Regulations on power and dynamic frequency selection (DFS) prevent signals from interfering with other nearby installations in a 5 GHz band. D. Despite the open floor plan, 2.4 GHz has a shorter range than 5 GHz and would not work as well.

A, B, CIn a 2.4 GHz network, each channel is only 5 MHz wide. Wi-Fi requires 20 MHz. The 5 GHz band is subdivided into 23 non-overlapping channels, each 20 MHz wide, reducing the risk of interference. In a 2.4 GHz band, there is no room for separate networks. Therefore, the chances of overlap/interference are high using the 2.4 GHz band products. There are regulatory limits on power output constraining ranges of Wi-Fi devices. The 5 GHz band must use DFS to prevent Wi-Fi signals from interfering with radar/satellite signals. An open plan does not have solid walls or building features to block signals. The slightly reduced range of 5 GHz (not 2.4 GHz) should not be a significant drawback.

Remote Authentication Dial-in User Service (RADIUS)

AAA protocol used to manage remote and wireless authentication infrastructures

ActiveSync

ActiveSync is a technology that allows email applications to connect to an Exchange server or Office 365 service. Unlike the Outlook application that uses the Autodiscover record to populate settings automatically, many mail apps will rely on the manual configuration of the ActiveSync settings.

An employee is preparing a printer share for professional desktop publishing and wants a printer driver that will work best for graphical design output. What should the employee use?

Adobe PostScript (PS) is a device-independent page description language (PDL) often used for professional desktop publishing and graphical design output.

choosing ecc vs non ecc ram:

All these factors must be considered when selecting memory for a system: Both the motherboard and CPU must support ECC operation for it to be enabled. Most motherboards support either UDIMMs or RDIMMs, but not both. If a motherboard does support both, UDIMM and RDIMM modules cannot be mixed on the same motherboard. The system will not boot if there are different types. Mixing non-ECC UDIMMs and ECC UDIMMs is unlikely to work.

Following some past issues with faults arising in print devices because of improper setup procedures, you are updating the company's work instructions for printer installation. You have noted that technicians must refer to the product instructions, use safe lifting techniques, and ensure removal of packing strips. What additional guidance should you include?

Allow the print device to acclimate for a few hours after unboxing to avoid risks from condensation.

decibels isotropic (dBi)

Antenna gain is the amount that a signal is boosted by directionality—focusing the signal in a single direction rather than spreading it over a wide area. Gain is measured in decibels isotropic (dBi).

In a virtual desktop infrastructure, what client functionality does a server handle?

Application processing Data storage

A company has contracted the use of a remote datacenter to offer exclusive access to platform as a service resources to its internal business users. How would such a cloud solution be classed?

As a private deployment model.

What cause might you suspect if a PC experiences intermittent lockups?

Assuming the cause is not related to software or device drivers, then thermal or power problems are most likely. Loose connections, faulty system components (motherboard, CPU, and memory), and corruption of OS files due to bad sectors/blocks are also possibilities.

A technician is looking at SATA interface specifications and notices a particular key associated with it. A technician usually keys a SATA interface SSD as what?

B Serial advanced technology attachment (SATA) interface SSDs are usually B keyed. An M.2 socket may support both types of drive or only one on the motherboard. The technician should check the documentation.

Power via USB

Basic USB ports can supply up to about 4.5 watts, depending on the version. A power delivery (PD)-capable port can supply up to 100 watts, given suitable connectors and cabling.

disc record/rewrite formats

Basic recordable media can be written to once only in a single session. Multisession recordable media can be written to in more than one session, but data cannot be erased. Rewritable media can be written and erased in multiple sessions, up to a given number of write cycles. Optical drives are rated according to their data transfer speed. An optical drive that can perform recording/rewriting is marketed with three speeds, always expressed as the record/rewrite/read speed (for example, 24x/16x/52x).

Computers process _______ data

Binary

Symptoms of overheating

Blank screen Intermittent shutdown Unusual odor

If a system overheats from time to time, what symptoms would a user notice when using the affected desktop computer?

Blank screen Unusual odor Intermittent shutdown

motherboard connectors

CPU connector- use different socket designs. chipset (soldered/not upgradable) determines choice in processor. When the CPU has been installed, it is covered by a thermal paste, heat sink, and fan. Interfaces that are not supported by the chipset can be installed or upgraded as an adapter card. Memory connector - normally dual inline memory module (DIMM). has catches at either end, is located close to the CPU socket, and is numbered and often color-coded. DDR3, DDR4, and DDR5. A DIMM form factor is specific to its DDR version disk connectors - motherboard will contain several Serial Advanced Technology Attachment (SATA) ports to connect fixed drives, removable drives (tape/optical cd dvd). install in drive bay in the chassis, connect to data port and power supply(SATA power or Molex). M.2 may also be available, can be 42/60/80/110m in length, and has no need for power cable. There is also an external SATA (eSATA) standard for external drives, with a 2 m cable. must use an eSATA cable specifically i/o connectors - pending? they didnt cover it and moved on? adapter connectors - pci/pcie. individual definitions on separate cards

plenum

Cable for use in building voids designed to be fire-resistant and to produce a minimal amount of smoke if burned. general cabling uses PVC jackets and insulation. Plenum-rated cable uses treated PVC or fluorinated ethylene polymer (FEP). This can make the cable less flexible, but the different materials used have no effect on bandwidth. rated for plenum use under the US National Electrical Code (NEC) -CMP/MMP on the jacket. General purpose cables - CMG/MMG or CM/MP.

cable modem

Cable-Internet-access digital modem that uses a coaxial connection to the service provider's fiber-optic core network.

Some traditional artists decide to expand their skillset into digital art. After some training and experimenting, they feel ready to start selling their digital art, so they purchase a printer. Unfortunately, the printer color does not match what the artists see on the computer screen. What should they do to fix this?

Calibrate the display.

Unfortunately, the printer color does not match what the artists see on the computer screen. What should they do to fix this?

Calibrate the display.

patch cabling

Cat 5 cable supports the older 100 Mbps Fast Ethernet standard. It is no longer commercially available. A technician will probably need to rewire the network cabled with Cat 5 to support Gigabit Ethernet. Cat 5e would still be an acceptable choice for providing Gigabit Ethernet links for client computers, but most sites now opt to install Cat 6 cable. The improved construction standards for Cat 6 mean that it is more reliable than Cat 5e for Gigabit Ethernet, and it can also support 10 Gbps over a reduced range. Cat 6A supports 10 Gbps over 100 m, but the cable is bulkier and heavier than Cat 5e and Cat 6, and the installation requirements are more stringent.

service set identifier (SSID)

Character string that identifies a particular wireless LAN (WLAN). 32 bytes in length

benefit of smart

Check performance issues. Check for physical damage can not check raid

troubleshooting incorrect color display

Color calibration (or workflow) refers to a process of adjusting screen and scanner settings so that color input and output are balanced. Color settings should be configured with the assistance of a color profile. You can use the Color Management applet in Control Panel along with test card color patterns and spectrophotometers to define a color profile and verify that the display matches it.

operational technology (OT)

Communications network designed to implement an industrial control system rather than data networking.

optical drives

Compact Discs (CDs), Digital Versatile Discs (DVDs), and Blu-ray Discs (BDs) All types of optical media use a laser to read the data encoded on the disc surface. The discs are marketed as being hard-wearing, but scratches can render them unreadable.

motherboard headers

Components on the front and rear panels of the case connect to headers on the motherboard: Power button (soft power)—Sends a signal that can be interpreted by the OS as a command to shut down rather than switching the PC off. Holding down the power button for a few seconds will cut the power, however. Drive (HDD) activity lights—Show when an internal hard disk is being accessed. Audio ports—Allow speakers and/or headphones and a microphone to be connected to the computer. USB ports—Internal USB 2 connections are made via 9-pin headers, which accept up to two 4-pin port connections (the 9th pin is to orient the cable correctly). USB 3 headers use a 2x10 format and can be cabled to two ports.

bought dvd/bluray outside country

Consumer DVDs and Blu-rays feature digital rights management (DRM) and region-coding copy-protection mechanisms.

copper vs fiber

Copper cabling uses electrical signaling to communicate data. Fiber optics uses pulses of light to communicate data.

What tests software applications under different OSs and resource constraints?

Cross-platform virtualization

Modern Day CPU socket designs (desktops)

Current Intel desktop socket designs include LGA 2011, LGA 1151, LGA 2066, LGA 1200, and LGA 1700. Most current AMD CPUs use the PGA form factor socket AM4.

software-defined network (sdn)

DN model defined by IETF network functions are divided into three layers top - application - applies business logic to make decisions about how traffic should be prioritized and secured and where it should be switched middle - sdn controller. principal innovation of SDN is to insert a control layer between the application and infrastructure layers bottom - infrastructure - contains the devices (physical or virtual) that handle the actual forwarding (switching and routing) of traffic each layer has an application programming interface (API)

optical network terminal (ONT)

Device that converts between optical (fiber) and electrical (copper) signaling deployed

Internet of Things (IoT)

Devices that can report state and configuration data and be remotely managed over IP networks.

drive heights

Devices with 2.5-inch form factors can vary in height, with 15 mm, 9.5 mm, 7 mm, and 5 mm form factors available. However, 5.5 mm is not a standard size.

troubleshooting dead pixels

Digital display panels for bright pixels, if the panel cannot be replaced under warranty, there are software utilities to cycle the pixel through a series of extreme color states to try to reactivate it. can also sometimes be reactivated by gently pressing or tapping the affected area of the screen with a stylus or pencil eraser Dead pixels (solid black) cannot usually be fixed.

A user has just printed a document and retrieved it but noticed black lines. What are black lines usually indicative of?

Dirty charge roller Black stripes or a whole black page indicate that the primary charge roller is dirty or damaged or that the high voltage power supply to the developer unit is malfunctioning. Try printing with a known good toner cartridge.

A human resources manager is preparing for a presentation and has printed out their presentation, but it is showing vertical lines. What does this probably indicate?

Dirty feed roller Vertical or horizontal line marks that appear in the same place (referred to as repetitive defects) are often due to dirty feed rollers.

no power

Disconnect extra devices. Plug in a known-good basic electrical equipment, such as a lamp into the wall socket. Check that other equipment in the area is working.

Optical Drive

Disk drive - CD or DVD

dns

Domain Name System (DNS) is a global hierarchy of distributed name server databases that contain information about each domain and the hosts within those domains. DNS servers provide resolution of host and domain names to their IP addresses and are essential for locating resources on the internet. The name server hosting domain resource records on the internet is for support and is usually configured as the primary DNS server entry in the IP configuration of all clients, not just locally. To avoid the possibility of duplicate host names, the top-level domains (TLDs) require assigning and managing a fully qualified domain name (FQDN) using DNS. The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a fully qualified domain name (FQDN), ensuring a unique host name.

The business needs printers that can automatically print on both sides of the pages since manually feeding paper through would not be cost-effective. What type of item should the editor ensure that the printers have?

Duplexing assembly

beep code

During POST, errors in hardware or the system firmware data can be brought to the attention of the user by beep noises.

what laser toner consists of

Dyestuff

DDR versions

Each DDR generation sets an upper limit on the maximum possible capacity The notches (keys) on the module's edge connector identify the DDR generation (DDR3/DDR4/DDR5) and prevent it from being inserted into an incompatible slot or inserted the wrong way around.

MAC address

Each Ethernet NIC port has a unique hardware/physical address, called the "media access control" (MAC) address Each frame of Ethernet data identifies the source MAC address and destination MAC address in fields in a header. A MAC address consists of 48 binary digits, making it six bytes in size. A MAC address is typically represented as 12 digits of hexadecimal. The 12 digits of a MAC address might be written with colon or hyphen separators or no separators at all—for example, 00:60:8c:12:3a:bc or 00608c123abc .

Organic LED (OLED)

Each pixel provides its own light source In an organic LED (OLED) display, a separate LED generates each pixel. OLED allows much better contrast ratios and allows the display to be thinner, lighter, and consume less power. Twisted nematic (TN) crystals twist or untwist in response to the voltage level. TN is the earliest type of TFT technology, and users may still find it in budget displays. low viewing angle In-plane switching (IPS) uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles. Vertical alignment (VA) uses crystals that tilt rather than twist or rotate. This technology supports a wide color gamut and the best contrast-ratio performance.

PCIe links

Each point-to-point connection is referred to as a link. Each link can make use of one or more lanes. The raw transfer rate of each lane depends on the PCIe version supported. Transfer rates are measured in gigatransfers per second (GT/s). Throughput in GB/s is the rate achieved after loss through encoding is accounted for. See photo for version/speed

embedded system

Electronic system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.

Encryption/Hashing

Encryption encodes data using a key to give it the property of confidentiality. Many cryptographic processes also make use of hashing. A secure hash is a unique code that could only have been generated from the input. Hashes can be used to compare two copies of data to verify that they are the same. Unlike encryption, the original data cannot be recovered from the hash code.

data loss / corruption

Extended read/write times can also occur because particular sectors (HDDs) or blocks (SSDs) fail (go "bad"). Data loss/corruption means that files stored in these locations cannot be opened or simply disappear. When bad sectors or blocks are detected, the disk firmware marks them as unavailable for use. If there is file corruption on a hard disk and no backup, you can attempt to recover data from the device using a recovery utility.

datacenter

Facility dedicated to the provisioning of reliable power, environmental controls, and network fabric to server computers.

metered utilization

Feature of cloud service models that allows customers to track and pay for precise compute, storage, and network resource units.

usb permissions

Feature of system setup allowing USB ports to be disabled.

A user is experiencing a paper jam in a printer that loads paper through friction. The user opens the printer up to try and find the part that will fix the problem. The user should check on which assembly part?

Feed assembly

DDR memory modules are labeled using the max theoretical bandwidth. Explain how this value is derived

First consider the internal memory device clock speed and memory bus speeds (100 MHz for example) Then take the data rate (double in the case of DDR2) - so 200MT/s (megatransfers per second) Finally, you can derive the peak transfer rate would be 1600mbps in this case as 200MT/s multiplied by 8 bytes or 64 bits will set the ram to 1600mbps. This gives a name convention of PC-1600. Subsequent generations of DDR technology—DDR2, DDR3, DDR4, and DDR5—increase bandwidth by multiplying the bus speed

RAID 0 (Striping without Parity)

Function: divides data into blocks and stores alternating blocks on each drive Advantage: speed / performance Disadvantage: redundancy Minimum Disks: 2

RAID 1 (Mirroring)

Function: write data is copied onto both drives Advantage: full redundancy. A read operation can use either disk, boosting performance somewhat Disadvantage: write operations copied to two disks, which increases performance overhead. additionally disk mirroring is more expensive than other forms of fault tolerance because disk space utilization is only 50% Minimum Disks: 2

Raid 10 (Stripe of Mirrors)

Functionality: logical striped volume (RAID 0) configured with two mirrored arrays (RAID 1). Advantage: excellent fault tolerance, as one disk in each mirror can fail, and the volume will still be available Disadvantage: same as raid 1. write operations copied to two disks, which increases performance overhead. additionally disk mirroring is more expensive than other forms of fault tolerance because disk space utilization is only 50% Minimum disk: 4

gsm vs cdma

GSM vs CDMA. GSM allows subscriber identity module (SIM) card. Code Division Multiple Access (CDMA)-no removable sim

CompTIA Troubleshooting Step 1 - Identify the Problem

Gather Information from the User - some questions you might ask What are the exact error messages appearing on the screen or coming from the speaker? Is anyone else experiencing the same problem? How long has the problem been occurring? What changes have been made recently to the system?Were these changes initiated by you or via another support request? If something worked previously, then experiences mechanical failures, it is likely that the problem has arisen because of some user-initiated change or some environmental or infrastructure change. Has anything been tried to solve the problem. PERFORM BACKUPS if local storage is critical and a backup is not being made already

public switched telephone network (PSTN)

Global network connecting national telecommunications systems.

long ranged fixed wireless

Ground-based microwave transmission that supports long distances over precisely aligned directional antennas. can be licensed (permission to shut down interference on the same channel) or unlicensed (risk of interference)

legacy system

Hardware or software product that is no longer supported by its vendor and therefore no longer provided with security updates and patches. eol

the cloud provides high availability, scalability, and elasticity. describe this

High availability (HA) means that the service experiences very little downtime Scalability means that the costs involved in supplying the service to more users are linear. if the number of users doubles, costs to maintain the same level of service would also double Rapid elasticity - system's ability to handle changes to demand in real time. high elasticity will not experience loss of service or performance if demand suddenly doubles or halves

DNS is operated by

ICANN

5ghz channel layout

IEEE 802.11a standard uses the 5 GHz frequency band only maximum data rate of 54 Mbps. 5 GHz band is subdivided into 23 non-overlapping channels, each of which is 20 MHz wide.

troubleshoot fuzzy image

If the output resolution does not match the display device's native resolution, the image will appear fuzzy. This typically happens if the video card's driver is faulty or incorrectly configured. Use the OS to change the output resolution or update the driver.

page file (swap space)

If there is not enough system RAM, the memory space can be extended by using disk storage The total amount of addressable memory (system RAM plus swap space) is referred to as virtual memory or virtual RAM

Troubleshoot boot sector issues

If you can rule out issues with power and cabling, suspect an issue with the device's boot sector and files. Corruption due to faults in the disk unit, power failure, incorrect installation of multiple operating systems, or malware will prevent the disk from working as a boot device. There are two ways of formatting the boot information: MBR and GPT. Damage to MBR or GPT can result in boot device not found/invalid drive spec/etc If you don't have the option of using a recovery disk created by the antivirus software, you can try to use the repair options that come with the OS setup disk.

LED

Light Emitting Diode

volatile

In the context of IT means that the memory device can only store data when it is powered on.

preferred roaming list (prl)

Information that the cellular radio needs to connect to the network is provided as a preferred roaming list (PRL) update. A PRL update can be triggered from the device's Settings menu or by dialing a special code, such as *228.

common cloud service models

Infrastructure as a Service (IaaS) - provisioning IT resources, such as servers, load balancers, and storage area network (SAN) components, quickly. deploy them as needed from the service provider's datacenter Software as a service (SaaS) - rather than purchasing software licenses for a given number of seats, a business would access software hosted on a supplier's servers on a pay-as-you-go arrangement Platform as a service (PaaS) - provides resources somewhere between SaaS and IaaS

I/O

Input/Output

storage volatility

Instructions and data require storage. The CPU can only store a limited number of instructions internally at any one time. Additional storage for running programs and open data files is provided through system memory. This random-access memory (RAM) storage technology is nonpersistent. Nonpersistent means that the RAM devices can only hold data when the PC is powered on. Mass storage devices are used to preserve data when the computer is turned off.

modern day cpu socket designs (server/workstation)

Intel's recent Xeon models use LGA 1150, LGA 1151, and LGA 2011 sockets. AMD's Epyc CPU uses the LGA Socket SP3 form factor. Note that in this definition workstation is considered a very intense high performance pc for heavy graphics/editing, whereas a "desktop" as defined above is pointed more toward general home and business pcs without advanced specs.

NVM Express (NVMe)

Internal interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI.

subnet

Internet services are placed in protected screened subnets, which represent a border between the private LAN and the public Internet. Traffic to and from this zone is strictly filtered and monitored. Network border services provide Internet access for employees, email and communications, remote access and WAN branch office links via virtual private networks (VPNs), and web services for external clients and customers.

Hub/control system

IoT devices usually require a communications hub to facilitate wireless networking must also be a control system, as many IoT devices are headless, meaning they cannot be operated directly using input and output devices

Intel processors use

Land Grid Array (LGA) socket form factor CPUs

troubleshooting voip issues

Latency is the time it takes for a signal to reach the recipient, measured in milliseconds (ms). Latency increases with distance Jitter is the amount of variation in delay over time and is measured by sampling the elapsed time between packets arriving VoIP call quality can only really be established by using a quality of service (QoS) mechanism across the network. switches, aps, routers are configured to id voip data and prioritize it. soho - can configure this on the router

Basic Input/Output System (BIOS)

Legacy 32-bit firmware type that initializes hardware and provides a system setup interface for configuring boot devices and other hardware settings.

A curious child is watching a printer technician perform maintenance on a laser printer and sees the technician rocking a component back and forth. What maintenance task is the technician working on?

Low printer ink Removing a printer ink cartridge and rocking it gently from front to back can help get the most out of the cartridge. Frugal departments may continue printing until the actual output starts to dip in quality.

MBR (Master Boot Record)

MBR is in the first sector of the first partition a partition allows a single disk device to be divided into multiple logical drives. The first sector of the first partition is the MBR, and contains information about the partitions on the disk plus some code that points to the location of the active boot sector. The boot sector is located either on the sector after the MBR or the first sector of each other partition. It describes the partition file system and contains the code that points to the method of booting the OS. Typically, this will be the Boot Configuration Data (BCD) store for a Windows system or GRUB or LILO Linux boot managers. Each primary partition can contain a boot sector, but only one of them can be marked active.

hard disk drive (HDD)

Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).

An IT administrator at a large company receives an alert that disk usage for a cloud-based service is over an established data transfer quota. Which service does the company utilize that triggers such an alert?

Metered utilization

Remote Desktop Protocol (RDP)

Microsoft's protocol for operating remote GUI connections to a Windows machine. RDP uses port TCP/3389. The administrator can specify permissions to connect to the server via RDP and can configure encryption on the connection. there are also open-source RDP server products, such as xrdp (xrdp.org).

802.3 Ethernet

Most cabled LANs are based on the 802.3 Ethernet standards maintained by the Institute of Electrical and Electronics Engineers (IEEE). The IEEE 802.3 standards are designated x BASE- Y , where x is the nominal data rate and Y is the cable type.

Why would hosts NOT need to be configured with a default gateway in an IPv6 implementation with Stateless Address Auto Configuration (SLAAC)?

ND allows hosts to discover a router and perform interface address querying functions. IPv6 uses a protocol called neighbor discovery (ND), implementing SLAAC and allowing a host to discover a router and perform interface address querying functions.

Near Field Communications (NFC)

NFC device can work as both tag and reader to exchange information with other NFC devices

Transmission Control Protocol/Internet Protocol (TCP/IP)

Network protocol suite used to implement the Internet and most WANs and LANs. uses a four-layer network model that corresponds roughly to the OSI model as follows: Network Interface (Physical/Data Link), Internet (Network), Transport (Transport), Application (Session, Presentation, Application).

storage area network (SAN)

Network within a lan or datacenter dedicated to provisioning storage resources, typically consisting of storage devices and servers connected to switches via host bus adapters. A SAN is isolated from the main network. It is only accessed by servers, not by client PCs and laptops. SAN clients are servers running databases or applications. Provisioning a shared storage pool as a SAN is more flexible and reliable than using local disks on each server machine. SANs use connectivity technologies such as Fiber Channel and Internet SCSI (iSCSI).

Small Form Factor (SFF)

Often seen as Mini-ITX (Information Technology Expanded) - used by many at home or for small servers. 6.7x6.7. still could be mounted in an atx case. There are also nano, pico, and mobile-itx form factors for portable devices

ports

One of the functions of the Transport layer is to identify each type of network application. It does this by assigning each application a port number between 0 and 65535. For example, data addressed to the HTTP web browsing application can be identified as port 80, while data requesting an email transmission service can be identified as port 25.

DP VS HDMI

One of the main advantages of DisplayPort over HDMI is support for daisy-chaining multiple monitors to the same video source. Using multiple monitors with HDMI requires one video card port for each monitor.

The motherboard's power port is referred to as the

P1 connector

software technician is conducting a help desk procedure with a correctly attached power supply, and the computer fans are running, yet the screen remains blank. What is likely causing the screen to remain blank?

POST procedure not executing blank screen can occur on a display when it is faulty, meaning that an internal issue keeps it from powering on and displaying information. A faulty display A blank screen can also occur when the power-on self-test (POST) procedure is not executing correctly.

What on-demand cloud computing feature does metered utilization provide?

Per-use billing for resources consumed

input/output operations per second (IOPS)

Performance indicator that measures the time taken to complete read/write operations. Run if read write issues/slowness if speed is reduced from vendor's baseline measurements in a testing environment then it is likely the device is faulty and needs to be replaced

PCIe

Peripheral Component Interconnect Express (PCIe) bus is the mainstream interface for modern adapter cards PCIe is backward compatible. v2 would work on a V4 mobo, v3 would work on a v2 mobo, etc. the bus link will work at the speed of the lowest version PCIe can supply up to 75W to a graphics card via a dedicated graphics adapter slot and up to 25W over other slots. An extra 75W power can be supplied via a PCIe power connector.

PC

Personal Computer input process store output

up-plugging

Plugging a pcie card into a slot with more lanes than is needed. typically due to availability issues. a card will fit in any port with an equal or greater number of lanes. the reverse, downplugging, is also possible as long as it does not obstruct other pc components

A network administrator plans to install a network of wireless access points with power supplied over data cabling. Each access point requires a 20W power supply. What version of Power over Ethernet (PoE) must the switch support to fulfill this requirement?

PoE-power injector Power over Ethernet (PoE) 802.3at (PoE+) allows powered devices to draw up to about 25W, with a maximum current of 600 mA. Power over Ethernet (PoE) 802.3bt (PoE++ or 4PPoE) supplies up to about 51W (Type 3) or 73W (Type 4) usable power. Power over Ethernet (PoE) 802.3af allows powered devices to draw up to about 13W supplied as 350mA@48V, limited to 15.4 W, so the voltage drops over the maximum 100 feet of cable, resulting in usable power of only around 13W. The administrator can use a "power injector" or "midspan" with one port on the injector connected to a switch port and the other port connected to the device. However, the overall cable length cannot exceed 100m.

boot password

Prevents boot until password is supplied. There are typically two boot passwords: Supervisor/Administrator/Setup: Protects against access to system setup User/System: Simply prevents boot _______________________________________________________________ This option would be used only on workstations and servers that aren't used for interactive logon, such as computers running monitoring or management software.

A manager wants to print copies of their monthly budget report using the office's laser printer. A 600V electrical charge occurs across the imaging drum's surface as the printer starts making the copies. Which specific component caused this electrical spike?

Primary charge roller

dynamic host configuration protocol (DHCP)

Protocol used to automatically assign IP addressing information to hosts that have not been configured manually a host can receive its IP address, subnet mask, default gateway, and DNS server addresses from this

Internet service providers (ISPs)

Provides Internet connectivity and web services to its customers

cloud deployment models

Public (multitenant) offered by cloud service providers (CSPs) to tenants. subscriptions or pay-as-you-go financing or even provide lower-tier services free of charge. risks regarding performance and security. Private - completely private to and owned by the organization. likely to be one business unit dedicated to managing the cloud, while other business units make use of it. greater control over the privacy and security. Community - several organizations share the costs of either a hosted private or fully private cloud. done to pool resources for a common concern, such as standardization and security policies Hybrid - cloud computing solution that implements some sort of hybrid public/private/community

hardware vs software raid

RAID can be implemented using features of the operating system, referred to as software RAID. Hardware RAID uses a dedicated controller, installed as an adapter card. The RAID disks are connected to SATA ports on the RAID controller adapter card, rather than to the motherboard.

redundant array of independent disks (RAID)

Redundancy sacrifices some disk capacity but provides fault tolerance. To the OS, the RAID array appears as a single storage resource, or volume, and can be partitioned and formatted like any other drive.

dynamic frequency selection (DFS)

Regulatory feature of wireless access points that prevents use of certain 5 GHz channels when in range of a facility that uses radar

factors in choosing mass storage devices

Reliability—both the risk of total device failure and the risk of partial data corruption Performance— consider type of data transfer that the device will use. For example, read and write performance have different characteristics. There are differences between sequential access (reading data from the same "block" as might happen when transferring a large file) and random access (reading data from different locations on the drive or transferring lots of small fiterm-111les). Along with the data throughput measured in MB/s or GB/s, you may need to consider the number of input/output operations per second (IOPS) that can be achieved by a device for different kinds of data transfer operations. Use—how storage is used include running an OS, hosting a database application, streaming audio/video data, as removable media, and for data backup and archiving. These use cases have different cost, reliability, and performance considerations.

Uniform Resource Locators

Resources on the Internet are accessed using an addressing scheme known as a url contains all the information necessary to identify and access an item

A company that processes personal loans allows its employees to work from home but must still coordinate and work collaboratively with various other teams that handle different aspects of the loan. Since the company saves money by employees working at home, they have opted to buy low-cost multifunction devices for each employee to use and need to preconfigure settings before distribution. Which option would be the best setting for their situation?

Scanning to the cloud would be ideal for users spread apart and working from home. Cloud services, such as OneDrive or Dropbox will generally be available as options on the device.

types of txt records

Sender Policy Framework (SPF) - published via DNS by an organization hosting email service. one per domain. identifies hosts authorized to send email from that domain. can also indicate what to do with mail from servers not on the list, such as rejecting them (-all), flagging them (~all), or accepting them (+all). DomainKeys Identified Mail (DKIM) uses cryptography to validate the source server for a given email message. can replace or supplement SPF. To configure, the organization uploads a public encryption key as a TXT record in the DNS server. Organizations receiving messages can use this key to verify that a message derives from an authentic server. The Domain-Based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that SPF and DKIM are being utilized effectively. A DMARC policy is published as a DNS TXT record. can use SPF or DKIM or both

Domain Name System (DNS) server IPv4 addresses

Similar to default gateway in that it is not required for ipv4 but is recommended. these servers provide resolution of host and domain names to their IP addresses and are essential for locating resources on the Internet. Most local networks also use DNS for name resolution. Typically, the primary DNS server address would be configured as the same as the gateway address. The router would be configured to forward DNS queries to a secure resolver. Often two DNS server addresses (preferred and alternate like 8.8.8.8) are specified for redundancy.

CPU

Software works by running instructions in the central processing unit (CPU). This can be referred to as the compute or processing function of a PC.

CompTIA Troubleshooting Step 3 - Establish a new theory or escalate

Some generic escalation routes include: Senior technical and administrative staff, subject matter experts (SMEs), and developers/programmers within your company. Suppliers and manufacturers via warranty and support contracts and helplines or web contact portals. Other support contractors/consultants, websites, and social media.

An Italian artisan is experimenting with printing digital artwork and has recently purchased a thermal printer. What special specific consideration will thermal printers need?

Special paper Most direct thermal print devices require special thermal paper containing chemicals designed to react and change color as heated by the heating element within the printer to create images.

While it is possible to configure IPv6 addresses statically, most hosts obtain a global and link-local address via the local router. This process is referred to as

StateLess Address Auto Configuration (SLAAC)

fiber optic connectors

Straight tip (ST) - push-and-twist locking mechanism. mostly old Subscriber connector (SC) - push/pull design for simpler insertion and removal. simplex and duplex versions, though the duplex version is just two connectors clipped together. can be used for single- or multi-mode. Lucent connector (LC) - small form factor connector with a tabbed push/pull design. similar to SC, but the smaller size allows for higher port density

fiber connections

Straight tip (ST) is a bayonet-style connector that uses a push-and-twist locking mechanism, mostly for multi-mode networks. Subscriber connector (SC) has a push/pull design that allows for simpler insertion and removal than a fiber channel (FC) connector. There are simplex and duplex versions, though the duplex version is just two connectors clipped together. A lucent connector (LC) is a small form factor connector with a tabbed push/pull design. LC is similar to SC, but the smaller size allows for higher port density. Coax for CATV installations is typically terminated using a screw-down F-type connector. Coax is now mostly used for CCTV installations and as a patch cable for Cable Access TV (CATV) and broadband cable modems. previous

network clients - authentication, authorization, accounting

Supplicant—The device requesting access, such as a user's PC or laptop. Network access server (NAS) or network access point (NAP)—Network access appliances, such as switches, access points, and VPN gateways. These are also referred to as "AAA clients" or "authenticators." AAA server—The authentication server, positioned within the local network.

port 21

TCP File Transfer Protocol (FTP)—Control connection Make files available for download across a network (control connection port)

port 443

TCP HTTP Secure (HTTPS) Provision secure websites and services

port 80

TCP HyperText Transfer Protocol (HTTP) Provision unsecure websites and web services

port 143

TCP Internet Mail Access Protocol (IMAP) Read and manage mail messages on a server mailbox

port 389

TCP Lightweight Directory Access Protocol (LDAP) Query information about network users and resources

port 110

TCP Post Office Protocol (POP) Retrieve email messages from a server mailbox

port 3389

TCP Remote Desktop Protocol (RDP) Make a secure connection to the graphical desktop of a computer

port 22

TCP Secure Shell (SSH) Make a secure connection to the command-line interface of a server

port 445

TCP Server Message Block (SMB) Implement Windows-compatible file and printer sharing services on a local network (also sometimes referred to as Common Internet File System [CIFS])

port 25

TCP Simple Mail Transfer Protocol (SMTP) Transfer email messages across a network

port 23

TCP Telnet Make an unsecure connection to the command-line interface of a server

Lightweight Directory Access Protocol (LDAP)

TCP/IP protocol used to query and update an X.500 directory uses TCP and UDP port 389 by default

port 53

TCP/UDP Domain Name System (DNS) Facilitate identification of hosts by name alongside IP addressing

IPv4 Addressing

The 32 bits can be arranged into four groups of eight bits (one byte) known as "octets." 11000000 10101000 00000000 00000001 converting this to dotted decimal notation makes this easier to read and use If all the bits in an octet are set to 1, the number obtained is 255 (the maximum possible value). Similarly, if all the bits are set to 0, the number obtained is 0 (the minimum possible value). Therefore, theoretically an IPv4 address may be any value between 0.0.0.0 and 255.255.255.255. However, some addresses are not permitted or are reserved for special use.

A helpdesk technician checks a computer for a developer who complains that the computer is running relatively slow and needs a fast computer. Which of the following will help the technician see if the system is a multi-socket?

The CPU page in Task Manager shows whether the system is multi-socket and the number of cores and logical processors (HyperThreading), plus whether virtualization is enabled.

set static ipv4 address

The IPv4 address is entered as four decimal numbers separated by periods, such as 192.168.0.100. The subnet mask is entered in dotted decimal notation, such as 255.255.255.0. When used with the IP address 192.168.0.100 , this mask identifies 192.168.0.0 as the network ID and means that the last octet ( .100 ) is the host ID. Alternatively, this parameter might be entered as the mask length in bits.

email connection types

The Internet Message Access Protocol (IMAP) is a mail retrieval protocol that supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously. In Simple Mail Transfer Protocol (SMTP), the SMTP server of the sender discovers the IP address of the recipient SMTP server by using the domain name part of the recipient's email address. The Post Office Protocol (POP) is an early example of a mailbox access protocol. POP is generally known as POP3 because the active version of the protocol is version 3.

The artist purchases Energy Star 80 plus rated laser printers and wants to ensure that the power circuits can handle the load. The artist knows that the largest spike in power consumption is when the primary charge roller (PCR) applies a 600W electrical charge across the imaging drum's surface. What should the artist use for energy consumption calculations for each printer?

The PCR applies a 750W charge to the imaging drum. An Energy Star 80 Plus compliant power supply unit (PSU) must be 80% efficient at 20-100% load. This means that 0.80 divided into 600 W would give an expected output of 750W.

[]ont cable

The RJ45 unshielded twisted pair (UTP) patch cable will allow the ONT to convert the optical signal over the external fiber optic cable to an electrical one to connect to the local router.

network protocols *****

The Server Message Block (SMB) protocol that implements Windows File/Printer Sharing is specifically for use on local networks only. nas The network administrator could implement a file server or fileshare protocol using TCP/IP protocols, like File Transfer Protocol (FTP), but it only allows a client to upload and download files from a network server and websites. The Simple Network Management Protocol (SNMP) provides a means for devices to report operational statistics to a management server, not for file sharing. provides a means for devices to report operational statistics to a management server, but it does not communicate with the directory service. The Lightweight Directory Access Protocol (LDAP) is a TCP/IP protocol used only to query and update an X.500 directory. The AAA server uses ldap to communicate with the directory service (Active Directory) from an access point with no configured user account credentials, and it cannot decrypt any authentication traffic. NetBIOS is obsolete and should be disabled if the network must support file sharing for Windows versions earlier than Windows 2000. A Secure Shell (SSH) connection is the principal means of obtaining secure remote access to UNIX and Linux servers and to most types of network appliances (switches, routers, and firewalls). The most widely used SSH is OpenSSH. Therefore, a common secure shell connection is considered OpenSSH. Including encrypted terminal emulations, SFTP can use SSH to achieve many other network configurations. However, it is not the principal means of obtaining a secure connection to another system. An SSH server listens on port TCP/22 by default, which is the next port after FTP ports 20 & 21, used by the unsecure File Transfer Protocol (FTP). However, it is not the principal means of obtaining a secure connection. previous Telnet opens a plain-text, unsecured, remote console connection. Telnet uses TCP port 23.

A cyber architect reviews the differences between resource and security requirements associated with virtualization. What should the architect consider regarding resource requirements?

The amount of memory required by the host/hypervisor. The amount of available disk space. The ability to create a virtual network environment.

address space

The bus between the CPU, memory controller, and memory devices consists of a data pathway and an address pathway. The width of the data pathway determines how much information can be transferred per clock cycle. In a single channel memory controller configuration, the data bus is usually 64 bits wide. The width of the address bus determines how many memory locations the CPU can keep track of and consequently limits to the maximum possible amount of physical and virtual memory. A 32-bit CPU with a 32-bit address bus can access a 4 GB address space. In theory, a 64-bit CPU could implement a 64-bit address space (16 exabytes), but most 64-bit CPUs actually use a 48-bit address bus, allowing up to 256 terabytes of memory.

An IT administrator at a large company receives an alert that disk usage for a cloud-based service is over an established data transfer quota. Which service does the company utilize that triggers such an alert?

The end-user is interested in and pays for only the services provided by the cloud. The per-use billing for resources consumed by the cloud is metered utilization. not Rapid elasticity- refers to the system's ability to handle changes to demand in real-time. A system with high elasticity will not experience loss of service or performance if demand suddenly doubles.

frame rate vs hertz

The frame rate in fps is used to describe the video source, while hertz is the refresh rate of the display device and video interface. To avoid display artifacts such as ghosting and tearing, the refresh rate should match the frame rate or be evenly divisible by it. For example, if the frame rate is 60 fps and the refresh rate is 120 Hz, the video should play smoothly.

A technician is evaluating the security requirements associated with virtualization. What tenets apply to security requirement considerations?

The host must be protected from natural (loss of power) and technological (virus) influences. Each guest OS must be patched and protected against malware like any other OS. The hypervisor must also be monitored for security vulnerabilities and exploits.

motherboard power connectors

The main P1 motherboard power connector is a distinctive 2-pin x 12-pin block with square pin receptacles. Fan connectors are 3- or 4-pin Molex KK format. There will be one for the CPU and one or more for the case fans and components such as memory and video adapters. 4-pin fan connectors support precise fan-speed control via a pulse width modulation (PWM) signal carried by the blue wire. 3-pin fans are controlled by varying the voltage. Fans with a 3-pin connector can usually be used with 4-pin headers, but the system may not be able to vary the fan speed (or may need special configuration to be able to do so). A fan with a 4-pin connector will usually work with a 3-pin header but will not be able to use PWM.

USB Cable Length

The maximum cable length for LowSpeed devices is 3 meters, while for FullSpeed and HighSpeed the limit is 5 meters. Vendors may provide longer cables, however, results might be limited past the max recommended length. Although SuperSpeed-capable cables do not have an official maximum length, up to about 3 meters is recommended.

routers and modems

The modem establishes the physical connection to the WAN interface, but when interconnecting networks, there must also be a means of identifying each network and forwarding data between them. This function is performed by a router that implements the Internet Protocol (IP).

IPv4 addresses contain two pieces of information:

The network number (network ID) - common to all hosts on the same IP network. The host number (host ID) - identifies a host within a particular IP network.

5 types of DVI

The pin configuration of the connectors identifies what type of DVI is supported by a particular port DVI-I supports both analog equipment and digital outputs. DVI-A supports only analog output and DVI-D supports only digital.

Video cable bandwidth is determined by two main factors:

The resolution of the image, measured in horizontal pixels by vertical pixels. For example, 1920x1200 is the typical format of high-definition (HD) video and 3840x2160 is typical of 4K video. The speed at which the image is redrawn, measured in hertz (Hz) or frames per second (fps). As examples, uncompressed HD video at 60 fps requires 4.5 Gbps, while 4K at 60 fps requires 8.91 Gbps.

[]A network administrator is expanding the company network with new settings and requirements for switches, VLANs, and IP subsets. What is the purpose of what the administrator is doing?

To divide the VLAN into multiple secure broadcast domains through managed switches, allowing additional remote access via VPNs

[]purpose of sdn

To insert a control layer between the application and infrastructure layers

dns queries

To resolve a host name or FQDN to an IP address, the client must obtain the appropriate record from a DNS server. The client communicates with a DNS server over port 53. The resolution process then takes place as follows (see photo)

While a toner probe sends a signal through a wire bundle to identify a cable and may come as part of a cable tester, what ability would the cable tester provide the user?

To test patch cords

To enable printer sharing via Windows, what should the print device connect to on the Windows PC?

To the print server via the Ethernet or on a Wi-Fi link, Bluetooth, USB, or other share service

[]T568A or T568B - explain what these standards are for

To use the same termination method consistently to support a Gigabit Ethernet or an upgrade to an optical network terminal

cable stripper

Tool for stripping cable jacket or wire insulation.

tld

Top-level domain .com, .org, .net, .info, .biz, .gov, .edu, .uk, .ca, .de

(True/False) - Each motherboard is designed to support a particular range of CPUs.

True

three main types of TFT technology

Twisted nematic (TN) In-plane switching (IPS) Vertical alignment (VA)

USB Connector Types

Type A—For connection to the host and some types of peripheral device. Type B—For connection to large devices such as printers. Type B Mini—A smaller peripheral device connector. This type of connector was seen on early digital cameras but is no longer widely used. Type B Micro—An updated connector for smaller devices, such as smartphones and tablets.

patch cord

Type of flexible network cable. Ethernet patch cords cannot be longer than five meters. terminated using RJ45 plugs crimped to the end of the cable.

permanent cable

Type of solid network cable typically terminated to punchdown blocks that is run through wall and ceiling spaces. terminated to wall ports and patch panels using insulation displacement connectors (IDC), aka "punchdown blocks"

Unified Extensible Firmware Interface (UEFI)

Type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security.

port 68

UDP DHCP Client Request a dynamic IP address configuration from a server

port 67

UDP Dynamic Host Configuration Protocol (DHCP) Server Provision an IP address configuration to clients

port 162

UDP SNMP trap operation Report status information to a management server

port 161

UDP Simple Network Management Protocol (SNMP) Query status information from network devices

SNMP device queries take place over port

UDP/161; traps are communicated over port UDP/162

port 137-139

UDP/TCP NetBIOS over TCP/IP Support networking features of legacy Windows versions

secure boot

UEFI feature designed to prevent a computer from being hijacked by malware

USB 3.x Connector Types

USB 2 and 3 type a are interchangeable with the limitation of the speed that is the lower of the two. usb 2 and 3 type b/etc are not compatible however.

connector for new phone lines

Unlike the four-pair cable used with Ethernet, RJ11 typically terminates two-pair cable and is widely used in telephone systems.

troubleshoot dim image

Use the OSD to check the brightness and contrast controls Check power saving mode and adaptive brightness/eyesaver mode If the image is almost invisible, the display's backlight likely failed, and the unit will have to be repaired under warranty or replaced

IPv6, designed to replace IPv4, has proven challenging to implement in transition. Hosts and routers that can operate on IPv4 and IPv6 simultaneously are called what?

dual stack

users connect to the network with basic hardware terminal to access a desktop hosted on a server

VDI virtual desktop infrastructure low spec thin client computers in a typical desktop virtualization solution Note that if this was in the cloud instead of hosted on a server then it would be DaaS

troubleshooting burn in

When the same static image is displayed for an extended period, the monitor's picture elements can be damaged, and a ghost image is "burned" permanently onto the display. Devices such as plasma screens and organic LED (OLED) displays can be more vulnerable to burn-in than ordinary TFT/LED displays. Always ensure that a display is set to turn off, or use an animated screen saver when no user input is detected.

CompTIA Troubleshooting Step 5/6 - Verify and Document

When you apply a solution, test that it fixes the reported problem and that the system as a whole continues to function normally. Example: -try performing the activity that prompted the issue -inspect a component to see if it is properly connected/lighting indicators -consult logs and software tools preventative measures where able document findings, actions, and outcomes

wifi standards

Wi-Fi 6 (802.11ax) Wi-Fi 5 (or 802.11b/g/n) IEEE standard 802.11a Wi-Fi 4 (802.11n) Most mobile devices use the 2.4 GHz frequency. Wi-Fi 6 with access points will support 802.11b/g/n clients wifi 5 - Wi-Fi 5 (802.11ac) works only at 5 GHz. Standard 802.11b/g/n are the legacy standards for Wi-Fi 6 and Wi-Fi- 4. can work over both 2.4 GHz and 5 GHz but usually require adapter

GPT

With the modern globally unique ID (GUID) partition table (GPT) boot scheme, the boot information is not restricted to a single sector but still serves the same basic purpose of identifying partitions and OS boot loaders.

You receive a support call from a lecturer. A projector is only displaying a very dim image. Which component should you prioritize for investigation?

You should rule out a simple configuration issue, such as the brightness control being turned all the way down.

power draw vs power output

a PSU draws more power than it outputs to a pc. most of the energy is lost as heat. If a PSU works at around 75% efficiency, a 300 W supply would draw 400 W from the outlet.

bit (b)

a binary digit that can have/store the value of 1 or 0

small office home office (SOHO) LAN

a business-oriented network possibly using a centralized server, in addition to client devices and printers, but often using a single networking appliance to provide LAN and Internet connectivity. This is often referred to as a "SOHO router," "Internet router," or "broadband router."

dual inline memory module (DIMM)

a ddr form factor

power-on self-test (POST)

a diagnostic program implemented in the system firmware that checks the hardware to ensure the components required to boot the PC are present and functioning correctly Once the CPU has been given the power good signal, the system firmware performs this.

A RAID level represents

a drive configuration with a given type of fault tolerance. Basic RAID levels are numbered from 0 to 6. There are also nested RAID solutions, such as RAID 10 (RAID 1 + RAID 0).

Cellular radio

a form of broadcast radio that is used widely for mobile communications 3G - makes a connection to the closest base station. gsm and cdma 4G Long-Term Evolution (LTE), supported by both the GSM and CDMA - must have a SIM card issued 5G involves installing many smaller antennas to form an array that can take advantage of multipath and beamforming. This technology is referred to as massive multiple input multiple output (MIMO). 4G and 5G can be used as a fixed-access wireless broadband solution

local area network (LAN)

a group of computers connected by cabling and one or more network switches that are all installed at a single geographical location might span a single floor in a building, a whole building, or multiple nearby buildings (a campus)

troubleshooting limited connectivity

a limited connectivity message means host can connect but has not received an ip from dhcp. establish scope of issue - if multiple users, the problem is likely dhcp server. dhcp leases take time to expire so problems could manifest over a few hours check patch cords - make sure wall port is connected to a port on a switch via patch panel check vlan configuration - if not correct vlan id, can have the same effect as wrong switch port as mentioned above. Windows may report network adapter has no Internet access. adapter has obtained an IP configuration (or is configured statically) but cannot reach msftncsi.com to download a test file. indicates issue with Internet access at the gateway router or name resolution. On a SOHO network, access the router management interface and verify the Internet connection via a status update page. If the link is down, contact your ISP. The router may also have tools to test connectivity. Verify that it can connect to the servers configured for DNS.

Radio Frequency ID (RFID)

a means of identifying and tracking objects using specially encoded tags bluetooth

hdd transfer rates

a measure of how fast read/write operations are performed on the disk platters. A 15 K drive should support an internal transfer rate of up to about 180 MBps, while 7.2 K drives will be around 110 MBps. Most HDDs use a SATA interface, though you may come across legacy devices using EIDE/PATA or SCSI interfaces

Hex

a numbering system often used to represent network addresses of different types. A hex digit can be one of sixteen values: 0-9 and then A, B, C, D, E, F. Each hex digit represents half a byte (or four bits or a nibble).

memory module

a printed circuit board that holds a group of RAM devices that act as a single unit

file server

a server that stores and manages files for network users can be implemented with ftp or other tcp/ip protocols

cloud computing

a service that provides on-demand resources—server instances, file storage, databases, or applications—over a network

cpu cache

a small block of memory that works at the speed of the CPU or close to it, depending on the cache level

Metropolitan area network (MAN)

a specific network type covering an area equivalent to a city or other municipality. It could mean a company with multiple connected networks within the same metropolitan area—so, larger than a LAN but smaller than a WAN.

Trusted platform module (TPM)

a specification for hardware-based storage of digital certificates, cryptographic keys, and hashed passwords. The TPM establishes a root of trust. Each TPM microprocessor is hard coded with an endorsement key. on boot TPM compares hashes of key system state data to ensure they have not been tampered with. The TPM chip has a secure storage area that a disk encryption program such as Windows BitLocker can write its keys to. can be managed from system setup

electrostatic discharge (ESD)

a static charge stored on you that is suddenly released into a circuit by touching it. Handle components by their edges or plastic parts, store them in antistatic bags, use an anti-ESD wrist strap and other protective equipment and procedures.ff

liquid-based cooling system

a system of pumping water around the chassis. Water is a more effective coolant than air convection, and a good pump can run more quietly than numerous fans

Client devices do not store credentials that need authentication when connecting to an enterprise network. Where would these credentials be found so the system can authenticate clients when connected?

aaa server

expansion cards

add functions or ports not supported by integrated features of the motherboard. fitted to a pci or pcie slot. can be sound, video, capture, network, etc

dns records

address (a) record - resolve a host name to ipv4 address (aaaa) record - resolve a host name to ipv6 Mail Exchanger (MX) record - used to identify an email server for the domain so that other servers can send messages to it. multiple servers installed to provide redundancy, and each one will be represented by an MX record. each server given a preference value. host name must have an associated A or AAAA record txt record - store any free-form text that may be needed to support other network services. A single domain name may have many TXT records, but they are most commonly used to verify email services and block the transmission of spoofed/spam mail. types of txt include spf, dkim, dmarc

Internet Message Access Protocol (IMAP)

addresses limitations of pop supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously allows a client to manage the mailbox on the server (to organize messages in folders and to control when they are deleted, for instance) port TCP/143, unsecure but can be secured using TLS. default port for IMAP-Secure (IMAPS) is TCP/993

digitize physical files

adf

A PC technician looks at how a SATA drive communicates with the bus. What will the technician find?

ahci Serial advanced technology attachment (SATA) uses the advanced host controller interface (AHCI) to communicate with the bus. Consequently, modern solid-state drives (SSDs) often directly use the peripheral component interconnect express (PCIe) bus.

onboard graphics

aka onboard adapter, low end graphics don't need a card and can be built into mobo chipset/cpu.

access time

aka seek time. the delay that occurs as the read/write head locates a particular track position. impacted by rpm and sector location process (rotational latency)

unified threat management (UTM)

all-in-one security appliances and agents that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data-loss prevention, content filtering, and so on centralizes threat mgmt

public ip address

allocated by isp. private addresses (rfc1918) are how the limited available public addresses are accounted for.

Network Basic Input/Output System (NetBIOS)

earlier protocol stack before tcp/ip re-engineered to work over the TCP and UDP protocols, referred to as NetBIOS over TCP/IP (NetBT) port 137/139 for udp and tcp respectively

Expansion card slot

allow cables to be connected to any I/O ports on the cards. slots should either be covered by an adapter card or a metal strip known as a blanking plate. uncovered slots can disrupt the proper flow of air around components in the PC and cause overheating and increase the amount of dust in the system

File Transfer Protocol (FTP)

allows a client to upload and download files from a network server port TCP/21 to establish a connection port TCP/20 to transfer data in "active" mode or a server-assigned port in "passive" mode.

input/output (I/O) port

allows a device to be connected to the PC via a peripheral cable. they can be provided on the motherboard or as an expansion card. HDMI, DVI, SATA, USB, RJ45, Audio, etc

Address Resolution Protocol (ARP)

allows a host to query which MAC address is associated with an IP address.

Multiuser MIMO

allows the access point to use its multiple antennas to send data to up to four clients simultaneously

proxy servers

alternative to nat does not just translate IP addresses - takes a whole HTTP request from a client, checks it, then forwards it to the destination server on the Internet when the reply comes back, it checks it and then shuttles it back to the LAN compute can perform a security function by acting as a content filter to block access to sites can apply rules to access requests, such as restricting overall time limits or imposing time-of-day restrictions can be configured to cache content to improve performance and reduce bandwidth consumption

ARM CPU Architecture

alternative to the standard x86/x64 CPU. created by Advanced RISC Machines (ARM) instead of intel or AMD implements a system-on-chip (SoC) which means that all the controllers—video, sound, networking, and storage—are part of the CPU. ARM designs use fewer, less complex instructions than is typical of x86. allows much better power and thermal efficiency. longer battery life and the use of passive (fanless) cooling. many mobile devices use this type of processor. usually soldered and not replaceable/upgradeable

switches

an Ethernet switch can decode each frame and identify the source and destination MAC addresses. It can track which MAC source addresses are associated with each port. When it receives an incoming frame, the switch forwards it to the port that is a match for the destination MAC address instead of sending on all ports. full duplex - can send and receive simultaneously at the full speed supported by the network cabling and NIC.

distribution system (DS)

an access point can establish a wireless-only network, but it can also work as a bridge to forward communications between the wireless stations and a wired network. The wired network is referred to as the "distribution system" (DS) access point will be joined to the network in much the same way as a host computer is—via a wall port and cabling to an Ethernet switch. likely to use poe

terminal emulator

any kind of software that emulates tty (teletype, which is terminal text input and output between user and shell) may support multiple types of shells

A technician is reviewing the various aspects of virtualization. What type of virtualization enables programmers to ensure that the application continuously updates with the latest code?

application virtualization

infrastructure mode

aps and ethernet work together

system-on-chip

arm

troubleshoot cable/network adapter issues

assumes only one machine is affected make sure patch cords are properly terminated and connected to network ports. substitute with known good to test test transceivers with loopback tool to test for bad port if no loopback tool, substitute known good hosts (connect a different pc or swap ports on the switch) discount faulty patch cords and bad nics. use a cable tester to verify cabling. certifier - advanced cable tester verify ethernet speed/dupliex config on the switch interface/nic. should be set to autonegotiate. try update nic device driver

crimper

attaches patch cable to rj45 RJ45 plug oriented with tab latch is underneath. Pin 1 is the first pin on the left. Arrange the wire pairs in T568A/B, push them into the RJ45 plug. Place the plug in the crimper tool, close it tightly to pierce the wire insulation at the pins, and seal the jack to the outer cable jacket

Once the POST tests are complete, the firmware searches for devices as specified in the boot sequence. If the first device in the sequence is not found, the system

attempts to boot from the next device in the boot sequence

cold cathode fluorescent (CCFL) bulb

backlight. The bulb requires AC power, so an inverter component is used to convert from the DC power supplied by the motherboard to the AC power for the bulb. This type of panel is no longer in mainstream production, but you might come across older laptop models that use it.

Which optical media offers the largest storage capacity?

blu ray

personal area network (PAN)

bluetooth

telnet

both a protocol and a terminal emulation software tool that transmits shell commands and output between a client and the remote host. A Telnet server listens on port TCP/23 by default

Assuming there are case fan locations in the top, bottom, front, and back of a PC case, where would you place fans to draw cool air into the case?

bottom and front

Often described as a hybrid fiber coax (HFC) broadband connection, what type of service combines a fiber optic core network with copper coaxial links to the customer premises?

cable Cable internet connections, usually offered as part of a cable TV service, are often described as hybrid fiber coax (HFC). HFC combines a fiber optic core network with copper coaxial cable links to the customer site.

What network communication type, which often utilizes fiber or coaxial, supports downlink speeds of up to 38 Mbps in North America and 50 Mbps in Europe, with uplink speeds of up to 27 Mbps?

cable Usually offered as part of a cable TV service, cable internet is often described as hybrid fiber coax (HFC) and supports downlink speeds of up to 38 Mbps in North America and 50 Mbps in Europe, with uplinks speeds of up to 27 Mbps.

Outside plant (OSP)

cable run on the external walls of a building or between two buildings. This makes the cable vulnerable to different types of weathering can be strung (aerial cable) between poles conduit can provide more protection for buried cables. direct burial cable is laid and then covered in earth or cement/concrete

the system administrator finds exposed wire pairs, likely creating crosstalk or signal disruptions. After snipping the RJ45 cable, what tool would the sysadmin use to remove a small section of the outer jacket to expose the wire pairs?

cable stripper

To ensure the wire is conducting signals, a network technician needs to evaluate a patch cord connected to a wall port and patch panel port. What device could the technician use to ensure its connection is correct?

cable tester

What tool would validate proper assembly to ensure the patch cables operate correctly?

cable tester

Thunderbolt (v1-v4)

can be used as a display interface (similar to hdmi or dp). v1 and v2 use the same physical interface as minidp and is compatible with displayport, but are distinguished with a flash icon. v2 supports up to 20gbps links. Like DisplayPort multiple monitors can be connected to a single port by daisy-chaining. v3/4 changes the physical interface to match a usbc port/connector. supports up to 40gbps over a short high quality cable (up to .5m/1.6ft). note not all usbc ports support thunderbolt 3 and flash icon should indicate this, but all thunderbolt supports usbc

removable storage

can refer either to a storage device that can be moved from computer to computer without having to open the case or to storage media that is removable from its drive. HDDs and SSDs can be packaged in a protective case, with a power connector if needed as well as a data interface (thunderbolt/SATA/usb)

mail servers

can use mail transfer or mailbox access protocols

Smart device

capable of compute, storage, and network functions that are all potentially vulnerable to malicious code

A cinematography student wants to record video input and save it as a movie or streaming media file. What should the student use?

capture card

older video interfaces were used when computer monitors/projectors were of the type:

cathode ray tube (crt) type, driven by an analog signal

A vulnerability manager is looking at the overall posture of an organization. Which of the following presents a unique challenge that can be harder to patch than traditional enterprise devices since they are often not connected?

cell phone

An organization has tasked a network administrator with establishing a means of communicating with the new Internet of Things (IoT) smart meters. These IoT devices cover a large area with a limited line of sight. What would be the best solution for the network administrator to implement?

cellular Cellular radio networking communications will reach further distances, regardless of line-of-sight issues, using mobile devices. It also enables the connectivity of the Internet of Things (IoT) devices, such as smart energy meters.

troubleshooting power issues

check if the LEDs on the front panel of the system case are lit up and whether you can hear the fans. If not, try the following 1. Check that other equipment in the area is working (power outage) 2. try another known-good piece of equipment in the same outlet 3. check psu cabling and wall socket, as well as set all switches to on 4. try a different power cable. check fuse resistance or test a different one 5. disconnect extra devices, psu may be underpowered 6. test psu with multimeter or psu tester if able If you still cannot identify the fault, then the problem is likely to be a faulty motherboard or power supply.

troubleshooting flashing screen

check power, video, adapter cables backlight or circuitry may be failing - other symptoms of this include bright or dim bands or lines and bright spots at the edge of the screen. Any of these symptoms will typically require the display to be repaired under warranty or replaced

If a fixed disk is not detected at boot, try

checking to make sure it is powered up. Drive activity is usually indicated by an LED on the front panel of the case. Check that data cables are not damaged and that they are correctly connected to the drive. If the drives are connected to a motherboard port, check that it has not been disabled by a jumper or via system setup.

Application Virtualization

client either accesses a particular application hosted on a server or streams the application from the server for local processing. ensure that the application used by clients is updated

An organization with limited resources would like to upgrade its small network to increase its security. However, the organization requires a few legacy applications running on two older, none-supported operating systems. With only one desktop to spare, what solution would meet the organization's needs?

client side virt

An audiovisual support professional is setting up a conference room that contains an F-type connector. What type of cable will the support professional need to set up the equipment?

coax

Telnet and SSH provide terminal emulation for ____

command line shells

configuring soho router

connect a pc to an rj45 or join it wirelessly based on sticker wait for it to be allocated an ip navigate to ip/address in browser enter user and pass and reset to a different password/document public ip and dsl/cable link usually self configure, otherwise reach to isp can uncheck dhcp, set to bridge mode, set up port forwarding, etc from the settings once you are logged in

User Datagram Protocol (UDP)

connectionless, non-guaranteed method of communication with no sequencing or acknowledgements no guarantee regarding the delivery of messages or the sequence in which packets are received replacement for tcp when speed matters more than integrity used by dhcp and tftp

A SCADA system takes the place of what device in a large-scale, multiple-site ICS?

control server

chipset

controllers that handle the transfer of data between the CPU and various devices

ont

converts fiber to eth

optical cabling

core of glass to convey the light pulses core is surrounded by glass or plastic cladding, which guides the light pulses along the core cladding has a protective coating called the buffer the fiber optic cable is contained in a protective jacket and terminated by a connector light pulses generated by lasers and LEDs - not susceptible to interference and suffer less from attenuation

after stripping the outer shielding, what tool do you need next when terminating cat5

crimper

UEFI-based systems provide built-in secure storage for

cryptographic keys

A service desk operator is looking at an older computer. The service desk operator attempts to plug in a keyboard and mouse, but there are no USB ports. What type of cable do the keyboard and mouse need?

db9

A data analyst is looking at a system with four 32-bit channels. The data analyst is most likely looking at what type of memory? (Select all that apply.)

ddr5 dual channel Double data rate 5 (DDR5) introduces a different type of data bus. Each memory module has two channels of 32 bits. When installed in a dual-channel memory controller configuration, this becomes four 32-bit channels. The DDR5 memory would have to be in a dual-channel memory for four 32-bit channels. There are effectively two pathways through the bus to the CPU with a dual-channel memory controller. DDR4 would not be correct. Also, one cannot install DDR5 modules in DDR4 slots since DDR5 introduces a different data bus. The quadruple channel is possible, although DDR5 memory in a dual-channel slot is the most likely scenario.

Wireless signal strength is measured in

decibel (dB) units dBm values closer to zero represent better performance -65 dBm represents a good signal anything over -80 dBm is likely to suffer packet loss or be dropped

An IT helpdesk technician has received a service call for a small home office worker experiencing network connectivity issues. The IPv4 network host can communicate with other local hosts but fails to reach the internet. What should the technician check?

default gateway The default gateway in an IPv4 network is the address of the router. While the default gateway setting is not required, failure to enter the default gateway would limit the hosts to local network communication only.

power supply unit (PSU)

delivers direct current (DC) low voltage power to the PC components contains a rectifier to convert alternating current (AC ) building power to DC voltage output, transformers to step down to lower voltages, and filters and regulators to ensure consistent output voltage levels. The other important component in the PSU is the fan, which dissipates the heat generated make sure psu is designed for voltage (120 VAC (low-line) in the US, will not work in the UK, where the voltage is 230 VAC (high-line) most are autoswitching

Server-Side Virtualization

deploying a server role as a virtual machine main use is better hardware utilization through server consolidation

motherboard form factor

describes its shape, layout, and the type of case and power supply that can be used, plus the number of adapter cards that can be installed

Self-Monitoring, Analysis, and Reporting Technology (SMART)

designed to alert the user to an error condition in a mass-storage device before the disk becomes unusable if a drive is suspected to be failing or extended read write times are occurring, run diagnostic tests like these

Digital Visual Interface (DVI)

designed to support both analog and digital outputs, no longer in active development

TCP/IP Transport Layer

determines how each host manages multiple connections for different application layer protocols at the same time Protocol Option 1: Transmission Control Protocol (TCP) - most common. guarantees reliable connection-oriented forwarding of packets. can identify and recover from lost or out-of-order packets, mitigating the inherent unreliability of IP. User Datagram Protocol (UDP) provides unreliable, connectionless forwarding. faster because it does not need to send extra information to establish reliable connections

Some products are known to use the combined throughput of all radios. For example, the AX6000 claims nominal rates of 1,148 Mbps on the 2.4 GHz radio and 4,804 Mbps over 5 GHz. This type is an example of what?

device for wifi 6 that can operate in both bands explanation: A 2.4 GHz band allows legacy connections with WPA2-Personal security, while the 5 GHz network is for 802.11ax or Wi-Fi 6-capable devices using WPA3-SAE authentication. Wi-Fi 5 works only in the 5 GHz band. A dual-band access point can use its 2.4 GHz radio to support clients on legacy standards (802.11g/n) but is an unusual connection. The legacy standard 802.11n is now officially designated as Wi-Fi 4. There have been improvements to keep it viable, but it cannot operate on both bands. WPA2 uses a 4-way handshake to allow an access point, authentication, and data encryption; however, neither WEP nor WPA are secure enough for continued use.

Mass storage

devices that use magnetic, optical, or solid-state technology to store data

Outside of static addressing, what option will allow hosts to use the same IP address configurations

dhcp reservations

HDMI and DisplayPort video interfaces only support:

digital flat-panel displays

A network associate is selecting cable that will need protection from the weather as much as possible. Which type should the associate use?

direct burial

Container Virtualization

discards hypervisor approach and enforces resource separation at the OS level Docker (docker.com) containerization

constant led activity on hdd means

disk thrashing or low system memory

load balancer

distribute client requests across server nodes in a farm or pool for any situation where you have multiple servers providing the same function

What type of TXT record uses cryptography to validate the source server of a given email to help recipient servers reject spoofed messages and spam?

dkim

FQDNs are assigned and managed using _______

dns

Post Office Protocol (POP)

early example of a mailbox access protocol POP client application, such as Microsoft Outlook® or Mozilla Thunderbird®, establishes a connection to the POP server on port TCP/110 or over the secure port TCP/995 The user is authenticated (by username and password) contents of the mailbox are downloaded for processing on the local PC messages are typically deleted from the mailbox server when they are downloaded

dkim, spf, dmarc

email/spam management

virtual private network (vpn)

enables hosts to connect to the LAN without being physically installed at the site uses special connection protocols and encryption technology to ensure that the tunnel is protected against snooping and that the user is properly authenticated

A PoE-enabled switch is referred to as

endspan power sourcing equipment (PSE).

An organization has asked a security analyst to review the contents of an external drive to see if the drive is reusable or if the organization needs to destroy it. However, the drive does not have a cable that connects to a USB. After finding an older computer that supports the cable type, it still does not seem to connect. The analyst notices that there appears to be a cable for what looks like power to the device. What type of cable should the analyst try using?

esatap

typical boot keys for bios

esc, del, f1, f2, f10, f12

troubleshooting slow network speeds

establish exactly what network activity they are performing. link speed problem- check the nominal link speed. use a utility to measure transfer rate independent of specific apps or network services isolated speed issue to a single cable segment - cabling could be affected by interference. external interference and crosstalk. Check the ends of cables for untwisting of the wire or improper termination. network tap - the analyzer software is likely to report high numbers of damaged frames network adapter driver. Install an update if available. If the latest driver is installed, check whether the issue affects other hosts using the same NIC and driver version. malware or have faulty software installed. Consider removing the host from the network for scanning. If you can install a different host to the same network port and that solves the issue, identify what is different about the original host. Establish the scope of the problem: are network speeds an issue for a single user, for all users connected to the same switch, or for all users connecting to the Internet, for instance? There may be congestion at a switch or router or some other network-wide problem. This might be caused by a fault or by user behavior, such as transferring a very large amount of data over the network.

central processing unit (CPU)

executes program instruction code when a software program runs (whether it be system firmware, an operating system, antivirus utility, or word-processing application), it is assembled into instructions utilizing the fundamental instruction set of the CPU platform and loaded into system memory. The CPU then performs the following basic operations on each instruction: 1. The control unit fetches the next instruction in sequence from system memory to the pipeline. 2. The control unit decodes each instruction in turn and either executes it itself or passes it to the arithmetic logic unit (ALU) or floating-point unit (FPU) for execution. 3. The result of the executed instruction is written back to a register, to cache, or to system memory. A register is a temporary storage area available to the different units within the CPU working at the same clock speed as the CPU.

fiber to the curb (FTTC)

extends fiber closer to the customer supported by vdsl (higher bit rates)

hardware port

external connection point for a particular type of bus interface. a bus allows the transfer of data to and from devices. Each bus interface type might use multiple connector form factors

Automatic Private IP Addressing (APIPA)

failover for dhcp when there are no IPs left to lease. will default to a random address between 169.254.0.1 to 169.254.255.254 it can then communicate with other hosts on the same network that are using APIPA but cannot reach other networks or communicate with hosts that have managed to obtain a valid DHCP lease.

t/f - a soho router uses an embedded modem and ethernet adapter to forward traffic between public and private network segments over a single hardware port

false - modem and ethernet interfaces use separate ports

t/f - IPv6 hosts need to be configured with a default gateway

false. IPv6 hosts do not need to be configured with a default gateway. uses a protocol called Neighbor Discovery (ND). ND is used to implement SLAAC, allows a host to discover a router, and performs the interface address querying functions performed by ARP in IPv4.

testing if there is physical damage to a motherboard by swapping components on it is a good troubleshooting step

false. If there is physical damage to the motherboard, you will almost certainly need diagnostic software to run tests that confirm whether there is a problem. Testing by substituting "known good" components would be too time consuming and expensive.

true/false The majority of PC motherboards today don't have a built-in 1000BASE-T compatible adapter.

false. most boards WILL have this adapter if a board doesnt come with what you need, you can purchase adapter cards

identify the common methods of powering a case fan

fan controller or 4 pin molex

random-access memory (RAM)

faster than the flash memory used for SSDs and much faster than an HDD, but it is volatile.

no led indicates

faulty disk

highest speed for memory card

fd624 UHS-III specifies two full-duplex rates; the fastest is 624 MBps (FD624). There are also four-speed variants. The original specification is up to 25 MBps, and UHS allows 108 MBps.

cloud characteristics

features that distinguish a cloud provisioning model from on-premises or hosted client/server network architecture

what part to check for paper jam in a printer that loads paper with friction?

feed assembly

The company administrator wants to provision IT resources, such as servers, load balancers, and storage area network (SAN) components, to deploy when they need them rather than purchase these components separately. Which service model would be best?

iaas

Users at an organization would like to have access to their work data when not connected to the internet. What type of service should IT configure for the users?

file sync allows users to have a mirrored copy of their data on any number of devices. Data synchronization can occur across the cloud for files, email, contacts, and more.

A server disk configured to allow clients to access it over the network is a _____

fileshare

A cable runner needs to run cable in a plenum space. What consideration does a runner need to account for with plenum spaces?

fire

A mass storage device installed as an internal component is referred to as a

fixed disk

flash drive

flash memory board with a USB connector and protective cover

Transmission Control Protocol (TCP)

focuses on providing reliable ordered and error checked pakcets connection oriented because it does the following: 1. Establishes a connection between the sender and recipient using a handshake sequence of SYN, SYN/ACK, and ACK packets. 2. Assigns each packet a sequence number so that it can be tracked. 3. Allows the receiver to acknowledge (ACK) that a packet has been received. 4. Allows the receiver to send a negative acknowledgement (NACK) to force retransmission of a missing or damaged packet. 5. Allows the graceful termination of a session using a FIN handshake can add 20 bytes or more to the size of each packet https and ssh use this

error correcting code (ECC) RAM

for each transfer, performs a hash calculation on the data value and stores it as an 8-bit checksum. checksum requires an extra processor chip on the module and a 72-bit data bus rather than the regular 64 bits. The memory controller performs the same calculation and should derive the same checksum. This system can detect and correct single-bit errors and allow the PC to continue functioning normally. ECC can also detect errors of 2, 3, or 4 bits but cannot correct them. Instead, it will generate an error message and halt the system. typically are registered DIMMs (RDIMMs), which use an extra component to reduce electrical load on the memory controller. regular ram is unbuffered (udimm)

video cards

for more powerful graphic requirements. features: GPU - microprocessor to render 2/3d images. frame rate it can produce and support for levels of texture/lighting effects graphics memory - a dedicated card can have 4-12GB RAM. low end cards use system ram. others mix dedicated and shared ram video ports - type and number of connectors

Small Outline DIMM (SODIMM)

form factor for laptop RAM typically fitted into slots that pop-up at a 45º angle to allow the chips to be inserted or removed

memory card

form factor is used in consumer digital imaging products A PC can be fitted with a memory card reader device. Smaller form factor microSD, microSDHC, and microSDXC cards are also available.

mSATA (m.2)

form factor that allows an SSD packaged as an adapter card to be plugged into a combined data and power port on the motherboard 600 MBps SATA interface can be a bottleneck to the best performing SSDs, which can achieve transfer rates of up to 6.7 GB/s. M.2 is a physical form factor. You can obtain M.2 SSDs that use the SATA/AHCI bus. These will typically not perform as well as NVMe-based M.2 SSDs. On the motherboard, an M.2 socket may be able to support both types of drive or only one; check the documentation. SATA interface SSDs are usually B keyed, 2-lane PCIe SSDs are usually B/M keyed, and 4-lane SSDs are usually M keyed.

An administrator sets up a shared printer that enables secure printing. However, the administrator has concerns about users using secure printing instead of just sending a regular job to the printer where anyone can pick up sensitive information. What best practice should the administrator implement to monitor usage?

forward syslog

In a desktop PC case, where are the drive bays typically located?

front of the case

Where do you connect the power button, reset button, and power LED to the motherboard?

front panel header

global vs link local (ipv6)

global address is one that is unique on the Internet (equivalent to public addresses in IPv4) - starts w 2 or 3 in hex notation link-local addresses - used on the local segment to communicate with neighbor hosts. In hex notation, link-local addresses start with fe80::

wireless internet service provider (WISP)

ground-based long-range fixed access wireless technology. installs and maintains a directional antenna to work as a bridge between the customer's network and the service provider disadvantage - unobstructed line of sight between the two antennas can be difficult to maintain

A cyber architect is reviewing the organization's policy on virtualization security requirements. What would the architect discuss within these security requirements?

guest os security hypervisor security host security

Blu-ray Capacity and Transfer Rate:

has a capacity of 25 GB per layer. The base speed for Blu-ray is 4.5 MBps, and the maximum theoretical rate is 16x (72 MBps).

DVD Capacity and Transfer Rate:

has a capacity of 4.7 GB for a single layer, single-sided disc up to about 17 GB for a dual-layer, double-sided disc. At launch, there were competing DVD+R/RW and DVD-R/RW recordable and rewritable formats, but most drives can use either, designated by the ± symbol. The base transfer rate for DVD is 1.32 MBps, equivalent to 9x CD speed.

CD Capacity and Transfer Rate:

has a maximum capacity of 700 MB and is available in recordable (CD-R) and rewritable (CD-RW) formats. The base transfer rate of a CD is 150 KBps.

modular psu

has power connector cables that are detachable from the unit removes unnecessary cabling

vendor promises to maintain a level of service equal to Five Nines. What does the vendor offer to fulfill this promise?

high availability

A PC technician is helping out a nonprofit organization who has older laptops. They want to implement data at rest encryption, but the laptops are older and do not support a trusted platform module (TPM). What should the technician use?

hsm A secure USB key or thumb drive used to store cryptographic material can be a hardware security module (HSM), which is useful if the computer does not support TPM.

what type of cloud service allows members of an organization to interact with the organizations resources?

iaas - means of provisioning IT resources, such as servers, load balancers, and storage area network (SAN) components, quickly.

In what standard will client devices connect to an access point in infrastructure mode?

ieee 802.11

Wireless communication utilizes air as its data transfer medium. When communicating with electrical signals or pulses of light, what standard do cable-based copper and fiber local area networks (LANs) use?

ieee 802.3

troubleshooting post issues (pre-boot issues)

if power is on (fans spinning) but black screen/won't boot/no post error beeps, then try the following: 1. Ask what has changed. System firmware update? reset procedure 2. Check cabling and connections, especially if maintenance work has just been performed on the PC. reset any adapter cards. 3. Check for faulty devices - adapter cards, all nonessential devices 4. check PSU 5. replace the cpu with a different one to test if able, or try updating system firmware If POST runs but detects a problem, it generates an error message (typically a beep code)

A computer operator is setting up memory in a computer and is curious how speed improvements occur to DDR RAM. So the operator begins researching. What will the computer operator find?

increased bus speeds

what kind of printer has a carriage belt

inkjet printer

troubleshooting wireless signal issues

interference - adjust channel check for motors or microwave blockers - metal or dense objects, concrete, etc - angle / reposition around these

troubleshoot wireless issues

intermittent issues - move devices closer together, check security and authentication Received Signal Strength Indicator (RSSI) - index level calculated from the signal strength level. a wireless adapter will reduce connection if this is not at required level. if rssi is too low, network will reduce speed, drop the connection and move to a different network, or in the case of two weak networks will flop back and forth

core protocol in TCP/IP is the

internet protocol (IP) - provides network and host addressing and packet forwarding between networks

each host must be configured with a _________ and ________ at minimum to communicate on an ipv4 network.

ip address and subnet mask

When planning to set up a virtual LAN (VLAN), the network administrator must prepare for each VLAN, configuring them with their own what?

ip address range and subnet address

clean roller

ipa (ispropyl alcohol)

A user sent a secured print to a server to mitigate the risk of someone intercepting confidential information from the output tray. Which of the following is NOT an option for the user to authenticate?

kerberos ticket The user cannot use a Kerberos ticket for a secured print since users must present something when they physically walk up to the printer.

Multi-mode fiber (MMF)

larger core 50-62 microns designed to carry a shorter wavelength infrared light uses less expensive and less coherent LEDs or vertical cavity surface emitting lasers (VCSELs) less expensive to deploy than SMF. does not support such high signaling speeds or long distances as single-mode and so is more suitable for LANs than WANs.

managed switch

larger than unmanaged switches will work as an unmanaged switch out-of-the-box, but an administrator can connect to it over a management port, configure security settings, and then choose options for the switch's more advanced functionality configuring a managed switch can be performed over either a web or command line interface

What is a drawback of high geostationary orbit satellite internet access that is NOT a drawback of cellular service?

latency

Molex Power Connectors

legacy alternative to sata power connector. The color coding of the wire insulation represents the DC voltage: red (5 VDC), yellow (12 VDC), and black (ground).

serial

legacy connection interface where data is transmitted over one wire one bit at a time. Start, stop, and parity bits are used to format and verify data transmission. aka Recommended Standard #232 (RS-232). supports data rates up to about 115 Kbps only. com port

hub

legacy network device to implement 10BASE-T and 100BASE-T "star topology" circuitry in hub repeats an incoming transmission from a computer attached to one port across all the other ports. a computer receives (but ignores) any frames that do not match its MAC address (collision domain). when lots of collision occurs, performance is reduced, as only one computer can send a frame at any one time. all communications are half-duplex. the computer can send or receive, but not at the same time. no hubs that are compatible with Gigabit Ethernet

Small computer system interface (SCSI)

legacy parallel bus One SCSI host bus adapter (HBA) can control multiple devices. also defines its own language for commands used for both internal and external peripherals but today only internal hard drives allowed devices to be daisy chained SCSI could support data rates up to 320 MBps only likely to come across high density (HD) 68-pin connectors or single connector attachment (SCA) 80-pin connectors. SCA incorporates a power connector, while HD-68 is used with Molex power connectors. devices must be configured with a unique ID, from 0 to 15. host adapter is usually set to 7 or 15. A bootable hard disk is usually allocated ID 0. The first and last devices on a SCSI bus must be terminated while parallel SCSI as a physical interface has almost completely disappeared, the software interface and command set are used in many other storage technologies, including serial attached SCSI (SAS) which is popular

A cyber consultant is evaluating the various security requirements associated with virtualization. What is NOT considered a security requirement?

legacy software

Peripheral Component Interconnect (PCI)

legacy, replaced by pcie. PCIe is software-compatible with PCI, meaning that PCI ports can be included on a PCIe motherboard to support legacy adapter cards, but PCI cards cannot be fitted into PCIe slots. parallel communications. Most are 32-bit at 33.3 MHz, w/ transfer rate of up to 133 MBps (32 bits divided by 8 to get 4 bytes, multiplied by the clock rate of 33.3).

LCD TFT

liquid crystal display thin film transistor. each pixel has a combination of red green and blue and is addressed by a transistor to vary intensity of each sell, creating a gamut (range of colors). Panel is illuminated by a LED (light emitting diode) array or a backlight.

troubleshooting wireless configuration issues

looking for a wifi not available - could be out of range or ssid broadcast might be suppressed (latter - connection to network name must be configured manually on the client) potentially could be standards mismatch (ap not in compatibility mode), check for 802.11b clients, an 802.11b/g/n access point must transmit legacy frame preamble and collision avoidance frames, adding overhead to the whole network - upgrade 802.11b devices rather than letting them join dual band radios

A printer reported that a tray ran out of paper. What considerations should a user take when loading new paper?

maintain climate control position at the edges

A PC technician is researching why memory is not performing as expected. The technician tried installing quadruple channel memory, but it does not seem to be working as it should. What should the technician also check?

make sure the full complement is installed check for flex mode check for mismatched module

virtual machine escaping (VM escaping)

malware running on a guest OS jumping to another guest or to the host as with any other type of software, it is vital to keep the hypervisor code up to date with patches for critical vulnerabilities

CPU Architectures

many different internal CPU architectures have been developed to optimize the process of fetch, decode, execute, and writeback Processing modes referring to the size of each instruction processed by the CPU x84 cpu architecture - 32 bit instruction set x64 cpu architecture - 64 bit instruction set software can be compiled as 32-bit or 64-bit. a x64 cpu can run 32 bit software, but x84 cpu cannot run 64 bit software

integrated drive electronics (IDE)

mass storage interface for desktop PCs for many years aka parallel advanced technology attachment (PATA) ribbon cable A motherboard supporting IDE may come with one or two host adapters, called the IDE1 channel and the IDE2 channel.

Infrastructure mode

means that each client device (station) is configured to connect to the network via an access point (AP) "Basic Service Set" (BSS).

benefits of the cloud

metered utilization scalability high availability elasticity file sync

Double Data Rate Synchronous Dynamic Random Access Memory (DDR SDRAM)

modern standard for RAM. breaking down these terms: Dynamic RAM stores each data bit as an electrical charge within a single bit cell. A bit cell consists of a capacitor to hold a charge (the cell represents 1 if there is a charge and 0 if there is not) and a transistor to read the contents of the capacitor. Synchronous DRAM (SDRAM) is so-called because its speed is synchronized to the motherboard system clock. Double Data Rate SDRAM (DDR SDRAM) makes two data transfers per clock cycle.

Shielded twisted pair (STP)

more reliable than UTP types of shielding and screening - 1. screened/foiled (F/UTP) 2. fully shielded - braided outer screen (S/FTP) and potentially additional foil (F/FTP)

network interface cards

most pcs alread have an ethernet adapter. but, a network interface card (nic) can provide upgrades, different cabling support, or additional ports. a wifi adapter can also be added to connect to wireless netwroks. adapters are developed to 802.11 standards. there are also cards to connect to cellular data networks.

Micro-ATX (mATX)

motherboard form factor. 9.6x9.6 board, max of 4 expansion slots

PC components

motherboard, central processing unit (CPU), system memory modules, adapter cards, fixed disks, and power supply unit

A user accidentally entered the Unified Extensible Firmware Interface (UEFI) setup program. How can the user generally get out?

mouse UEFI setup programs use a graphical interface and have mouse support, though advanced menus may still require keyboard navigation.

Virtualization

multiple OSs can be installed and run simultaneously on one computer In a guest OS (or host-based) system, the hypervisor application is itself installed onto a host OS (VMware Workstation™, Oracle® Virtual Box, and Parallels® Workstation) A bare metal virtual platform means that a Type 1 hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS (VMware ESXi® Server, Microsoft's Hyper-V®, and Citrix's XEN Server)

a computer can be made more efficient and useful by configuring it to run:

multiple operating systems at the same time. This is achieved through virtualization software. Second Level Address Translation (SLAT) - a feature of virtualization software designed to improve the management of virtual memory

A class B IPv4 host configured with a private IP address will use what mechanisms to facilitate access to the internet?

nat and proxy device Hosts configured with a private address cannot access the internet directly. A host must use some mechanism to allow it to forward packets. Network address translation (NAT) is one. It shuttles traffic between the private and public addresses. A proxy device can fulfill requests for internet resources on behalf of clients configured with a private IP address, facilitating internet access.

a router uses ____ to convert between private and public IP addresses

network address translation (NAT)

A helpdesk technician is installing a printer at a remote office. Which of the following is the least to consider for setup?

network data port

A marketing director purchased a printer for their office and is currently setting it up. Which of the following is the least of considerations for placement?

network data port

An IPv6 address is 128-bits, divided into two main parts. The first 64 bits and the second 64 bits are known as what?

network id, interface id

Ethernet communications are established by either electrical signaling over copper twisted pair cable or pulses of light transmitted over fiber optic cable. The physical connection to the cable is made using a transceiver port in the computer's

network interface card (NIC)

An employee occasionally needs to scan signed documents relating to purchasing agreements. The employee wants to scan directly to a network location without emailing themselves and then saving it. What configurations will they need to use? (Select all that apply.)

network path user permission

While validating the Ethernet network efficiency, the network administrator finds many lost or damaged frames. What tool does the network administrator use to identify the dropped or damaged frames?

network tap

TCP/IP Application Layer

numerous application protocols in the TCP/IP suite. These are used to configure and manage network hosts and to operate services, such as the web and email. Each application protocol uses a TCP or UDP port to allow a client to connect to a server.

A librarian is trying to digitize old documents into their archive system. The librarian wants to scan text into digital documents so that scholars and researchers can search them easily. What should the librarian use?

ocr Optical character recognition (OCR) software can convert scanned text into digital documents, ready for editing.

bottleneck

one underpowered component slows down an entire machine

troubleshooting monitor audio issues

only HDMI and DisplayPort can deliver a combined video and audio signal if that is supported by the video card. If there is no sound from built-in or separate speakers, check power, cables/connectors, and any physical volume control on the speaker device If you can discount these issues, use the OS to verify that the audio output is set to the correct device and check the OS volume control.

lightning

only for apple devices.

wire colors

orange 3.3 red 5 yellow 12 black ground

An editor at a book publishing company wants to ensure the printer settings are set correctly for print jobs that align the binding to the right edge. What setting should they set?

orientation

memory card speed variants

original specification is up to 25 MBps UHS allows up to 108 MBps UHS-II is rated at up to 156 MBps full-duplex or 312 MBps half-duplex UHS-III specifies two full-duplex rates of 312 MBps (FD312) and 624 MBps (FD624).

symptoms of disk failure

os loads slow smart alert

three main types of software

os, application, drivers

When specifying a PSU for a system with high power requirements, it is also important to assess the power distribution for its

output voltages (3.3 VDC, 5 VDC, and 12 VDC)

Which type of cloud model provides a scaffold for a business to develop, deploy, and run applications without having to run and maintain the underlying foundation?

paas provides resources somewhere between SaaS and IaaS and deploys unconfigured servers, storage network infrastructure, and multitier web/database platforms on top.

cloud service for a back end database server for an online application

paas - typically deploys servers and network infrastructure per iaas and provides a multi-tier web app/database platform (per saas) - basically an in between of saas and iaas.

A Windows administrator sets up a SQL server that is very resource-intensive on memory and never deallocates room in memory. They want to set up an area in case all the system RAM is eaten up. What should they set up?

pagefile In a Windows system, the extended memory space on a disk is a pagefile. The memory controller moves static memory pages to the swap space to free up physical RAM and retrieves pages from the swap space to physical RAM when process execution requires it.

cable tester

pair of devices designed to attach to each end of a cable. tests a patch cord or to test between a wall port and a patch panel port functionality: energizes each wire. if LED does not activate, the wire is not conducting a signal. if the LEDs do not activate in the same sequence, the wires have been terminated to different pins at each end

signs for maintenance needed on thermal printers

paper debris

optical drive wont eject

paperclip

heat sink

passive cooling device, with copper or aluminum fins Passive cooling means that it does not require extra energy (electricity) to work thermal paste goes between the component and the heat sink most heat sinks are fitted with fans (require extra power) to improve cooling efficiency

Virtualization - Guest OS Security

patches to images and then to production environment to minimize risk

unmanaged switch

performs its function without requiring configuration. power it on and connect hosts, it establishes Ethernet connectivity between the network interfaces without any more intervention.

CompTIA Troubleshooting Step 2 - Establish and Test a Theory

physical inspection / senses try to reproduce the error check documentation, event logs, and diagnostic tools consult others, esp who may have worked the system recently or might be working on a related issue consider environmental changes consult vendor documentation and internet forums/search STEPS: 1. Decide whether the problem is hardware or software related (hardware) 2. Decide which hardware subsystem is affected (disk) 3. Decide whether the problem is in the disk unit or connectors and cabling 4. Test your theory.

AMD processors use

pin grid array (PGA)

Intermittent connectivity might manifest as

port flapping NIC or switch interface transitions continually between up and down state

factors that impact raid choice

required level of fault tolerance, read/write performance characteristics, required capacity, and cost

frequency band

portion of the microwave radio-frequency spectrum in which wireless products operate, such as 2.4 GHz band or 5 GHz band performance characteristics of the two main frequency bands: 2.4GHz -better at propagating through solid surfaces, longest signal range -does not support a high number of individual channels and is often congested -potential microwave oven interference 5GHz -less effective at penetrating solid surfaces and does not support the max ranges achieved with 2.4 -band supports more individual channels and suffers less from congestion and interference -higher data rates at shorter ranges

If the switch does not support PoE, a device called a _________ can be used.

power injector / midspan

Power over Ethernet (PoE)

powering a switch port over ordinary data cabling to a powered device (PD), such as a voice over IP (VoIP) handset, camera, or wireless access point. PoE is defined in several IEEE standards : 802.3af allows powered devices to draw up to about 13 W. Power is supplied as 350mA@48V and limited to 15.4 W, but the voltage drop over the maximum 100m (328 feet) of cable results in usable power of around 13 W. 802.3at (PoE+) allows powered devices to draw up to about 25 W, with a maximum current of 600 mA. 802.3bt (PoE++ or 4PPoE) supplies up to about 51 W (Type 3) or 73 W (Type 4) usable power.

what makes laser printers electrical charge spike?

primary charge roller

low end 3d printer needs to manually calibrate per print job

print bed

cloud services for internal use only

private model

Syslog

protocol and supporting software that facilitates log collection syslog collector usually listens on port UDP/514 pri code

Transport Layer Security (TLS)

protocol based off ssl uses certificates for authentication and encryption to protect web communications and other application protocols

ssh

protocol used to access the command-line interface of a computer from across the network uses encryption to authenticate the server and user and protect the information that is being transmitted requires tcp to ensure packet integrity primary way to connect to unix, linux, and network appliances

modular switches

provide a power supply and fast communications backplane to interconnect multiple switch units enables the provisioning of hundreds of access ports via a single compact appliance

satellite-based microwave radio system

provides bigger areas of coverage than can be achieved using other technologies like dsl transfer rates vary 2-6 Mbps up and 30 Mbps down increased latency - drawback. round trip time (RTT) delay on the link - issue for video conferencing, VoIP, and multiplayer gaming. vsat dish to implement

web server

provides client access using HTTP or its secure version (HTTPS)

access point

provides connection between wireless devices and can connect to wired networks, implementing an infrastructure mode WLAN MAC address of the AP's radio is used as the Basic Service Set Identifier (BSSID).

Digital subscriber line (DSL)

provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines symmetric or asymmetric can be part of soho router or its own device (splitter)

TCP/IP Internet Layer

provides packet addressing and routing within a network of networks. Address Resolution Protocol (ARP)

A host configured with a private address cannot access the internet directly; therefore, a router uses a Network Address Translation (NAT) to convert the private and public addresses through what?

proxy server

To communicate on the internet, a network administrator must configure hosts with what type of unique IP address?

public ip address

When the network installers install permanent cable, what tool will terminate wall ports and patch panels using insulation displacement connectors (IDCs)?

punchdown tool

A systems administrator sets up dual-channel memory in a system to increase performance. Which of the following does NOT require support?

ram devices

A systems technician builds a graphics system with the best possible parts. The RAM appears to be the same, but what could the technician use to differentiate between the best ones?

ram type

DHCP Scope

range of addresses that a DHCP server can offer to client hosts in a particular subnet should exclude any addresses that have been configured statically

adapts to changing service levels

rapid elasticity - system's ability to handle changes to demand in real-time.

A network administrator is setting up a server to manage their routers and switches throughout the environment and push standardized configurations. The administrator wants to use memory which performs a hash calculation on the data value. What should the network administrator use?

rdimm Error correction code (ECC) RAM performs a hash calculation on the data value for each transfer and stores it as an 8-bit checksum. Most types of ECC supply as registered Dual Inline Memory Modules (RDIMMs). A registered DIMM uses an extra component to reduce electrical load on the memory controller.

troubleshoot inaccurate time/date

real time clock (RTC) is a part of the chipset that keeps track of the calendar date and time. runs on battery power when the computer is turned off. The RTC battery (CMOS battery) is a coin cell lithium battery. if the time and date is off, the coin cell will typically need replacement. the type is usually CR2032, but check the motherboard documentation

Client-side virtualization

refers to any solution designed to run on "ordinary" desktops or workstations. uses: Sandbox creates isolated environment in which to analyze viruses legacy software applications and OS - OS can be installed as a VM, and the application software accessed using the VM Cross-platform virtualization—Test software applications under different OSs and/or resource constraints Training—Lab environments can be set up for practice using a live OS and software without impacting the production environment

A board game enthusiast wants to print characters for the next campaign to bring an element of realism to the gameplay. The enthusiast uses an SLA 3-D printer but ran out of 3-D "ink." What should the enthusiast order for replacement?

resin

TCP/IP Link Layer

responsible for putting frames onto the physical network does not contain TCP/IP protocols different local networking products and media can be used, such as Ethernet or Wi-Fi. WAN interfaces, such as DSL and cable modems, also work at the Link layer. Communications take place only on a local network segment and not between different networks. On an Ethernet or Wi-Fi segment, data at the link layer is packaged in a unit called a frame and node interfaces are identified by a MAC address.

fiber to the curb (FTTC)

retains some sort of copper wiring to the customer premises while extending the fiber link to a communications cabinet servicing multiple subscribers

Which system works out a device's location by triangulating its proximity to other radio sources through identifying and tracking objects using special tags?

rfid explanation Radio-frequency ID (RFID) identifies and tracks objects using specially encoded tags that can be unpowered and passive, responding when scanned at close range or from a powered, active device within 100 m. Global Positioning System (GPS) determines a device's latitude and longitude based on information received from orbital satellites via a GPS sensor and does not use special tags. Near-field communication (NFC) is a peer-to-peer version of RFID. The device can work as both tag and reader to exchange information with other NFC devices, like digital payments. An indoor positioning system (IPS) determines a device's location by triangulating its proximity to other radio sources, such as cellular radio towers, Wi-Fi access points, and Bluetooth/RFID beacons without special tags.

Which of the following does the technician most likely see on a patch panel?

rj11 punchdown block rj45

The default gateway parameter is the IPv4 address of a

router for example, 192.168.0.1 . This is the IP address to which packets destined for a remote network should be sent by default. The default gateway is not required like an ip and subnet, but failure to enter a gateway would limit the host to communication on the local network only.

dual stack

running ipv4 and ipv6 traffic at the same time

what type of cloud service does email as a cloud subscription service provide?

saas - model of provisioning software apps. rather than purchasing licenses the business has access to software on hosted pay as you go arrangement

An administrator is troubleshooting a control server, typically run as software on ordinary computers in a large-scale, multiple-site Internet Control System (ICS). What system is the administrator troubleshooting?

scada

A server technician sets up a new server in their data center and opens the case to view the insides. The technician notices several hard drives inside. What type of setup does the server most likely have?

scsi

1tb sd card

sdxc Secure digital extended capacity (SDXC) has a maximum capacity of up to 2 TB. In addition, there are several proprietary types of memory cards, each of which also has different sizes and performance ratings. Secure digital high capacity (SDHC) has a maximum capacity of 32 GB. Most memory card readers work with multiple card types. The original SD cards have a 2 GB maximum capacity. Smaller form factor microSD, microSDHC, and microSDXC cards are also available. CompactFlash is a different type of memory card larger than an SD card. Cameras use CompactFlash, but the photographer was specifically using an SD card in this scenario.

When planning to deploy a client-side virtualization solution for malware analysis where no network connectivity is needed, what are some of the issues that a technician must consider?

security requirements resource requirements

coax connector

see photo

patch panel back

see photo

subnet default masks

see photo

Modern bus interfaces such as USB and Thunderbolt use:

serial communications serial links can achieve Mbps and Gbps speeds through the use of improved signaling and encoding methods when serial interfaces were slower, PC vendors used parallel data transmission to support better transfer rates. While a serial interface transfers 1 bit at a time, a parallel interface transfers 8 bits (1 byte) or more. This requires more wires in the cable and more pins in the connectors, meaning parallel interfaces are bulky.

A curious IT student is looking at a piece of hardware in class with redundant power supplies. What type of hardware is the student most likely looking at?

server

A large corporation has concerns about the cost of ink and printing and wants to manage it more efficiently. What type of printer setup would be optimal to support this?

server

the manager wants to restrict printer access through authentication. Which of the following methods can the manager use to do so

server sharing and security tabs badges The manager can configure the Sharing and Security tabs with a list of users or groups permitted to submit print jobs. Badging means the print device gets fitted with a smart card reader. Employees must present their ID badge to the reader to start the print job. Ordinary users can connect to a network printer if the print server administrator has permitted them to use it. An audit log does not restrict access but could allow a user to identify printed documents that have gone missing or identify the unauthorized release of information.

fiber to the premises (FTTP)

service provider's fiber optic cable runs all the way to the customer's building

One of the core network functions is to provide ________

shared access to disk and print resources

A web hosting company is home to many company websites. The model is such that a single server can host roughly five small low-traffic websites without changing the configuration. What service type does the web hosting company offer with these sites?

shared resources hardware making up cloud providers data center is not dedicated to a single customer acct

Wi-Fi analyzer software is designed to identify the

signal strength of nearby networks on each channel. It shows the signal strength, measured in dBm, and expressed as a negative value, where values close to zero represent a stronger signal. The analyzer will show how many networks are utilizing each channel. Setting the network to use a less congested channel can improve performance

The comparative strength of the data signal to the background noise is called the

signal-to-noise ratio (SNR)

thermal pad

similar to thermal paste but is a compound solid at room temperature that softens at higher temperatures easier to apply but may not perform as well as thermal paste

most reliable type of ssd

slc The NOT AND (NAND) flash memory used in solid-state drives (SSDs) comes in different types. Single-level cell (SLC) is more reliable and more expensive. There is also a multi-level cell (MLC) which is not as reliable and less expensive. Flash chips are also susceptible to a type of degradation over the course of many write operations. The triple-level cell (TLC) type is also less reliable and less expensive. The drive firmware and operating system use wear-leveling routines that evenly distribute writing on all blocks of an SSD to optimize the life of the device. SSDs are vulnerable to electrostatic discharge (ESD).

Single-mode fiber (SMF)

small core 8-10 microns designed to carry a long wavelength infrared signal generated by a high-power, highly coherent laser diode supports 10 Gbps+ supports cable runs of many kilometers

firmware

software stored on a chip today, upgradable with flashing

wide area network (WAN)

spans multiple geographic locations A company dedicated to facilitating access to the Internet from local networks is called an Internet Service Provider (ISP). Most private or enterprise WANs use cabling and equipment leased from an ISP to interconnect two or more LAN sites. For example, a company might use a WAN to connect branch office sites to the LAN at its head office.

content delivery networks (CDNs)

specialize in provisioning media and resources for websites to multiple Internet exchange points (IXPs) where they are close to ISP networks and can be downloaded more quickly by customers storage backing the various XaaS models is offered in cost tiers that represent how quickly it can be replicated to datacenter availability zones and between different geographical areas

Simple Mail Transfer Protocol (SMTP)

specifies how email is delivered from one mail domain to another port TCP/25 - message relay between SMTP servers, or message transfer agents (MTAs) - usually unsecure port TCP/587 - mail clients. message submission agents (MSAs) to submit messages for delivery by an SMTP server. encryption

bootable devices

ssd/hdd optical drive usb network/pxe (Uses the network adapter to obtain boot settings from a specially configured server)

Serial Advanced Technology Attachment (SATA)

standard means of connecting internal storage drives. cables of up to 1 m terminated with compact 7-pin connectors 7-pin data connector does not supply power. a separate 15-pin SATA power connector is used to connect the device to the PC's power supply v1-1500mbps v2-3000mbps v3-6000mbps

Advanced Technology Extended (ATX)

standard motherboard form factor for most desktop PCs. 12wx9.6d

motherboard is attached to the case by using

standoffs

dns

starts with root (.) and then has tld's including com, org, net, and so on

RAID 5 (Striping with Distributed Parity)

striping (like RAID 0) but with distributed parity. Distributed parity means that error correction information is spread across all the disks in the array. If a single disk fails, enough information is spread across the remaining disks to allow the data to be reconstructed. The level of fault tolerance and available disk space is inverse. As you add disks to the set, fault tolerance decreases but usable disk space increases. If you configure a RAID 5 set using three disks, a third of each disk is set aside for parity. If four are used, one-quarter is reserved on each disk. Advantage: best performance for read operations Disadvantage: normal write operations suffer reduced performance due to the parity calculation Minimum Disks: 3

each PSU has power connectors that

supply DC voltage to the motherboard and devices at 3.3 VDC, 5 VDC, and 12 VDC Voltage regulators are used to correct the voltage supplied from the PSU to the voltage required by the component Wires with black insulation are ground, yellow are +12 V, red are +5 V, and orange are +3.3 V.

High-Definition Multimedia Interface (HDMI)

supports both video and audio (the video card must have an audio chipset for this to work) remote control and digital content protection (HDCP) supports many including these resolutions: HD (standard) 1080p - 1920 x 1080 4K 8K refresh rates: 60hz 120hz 144hz ability to vary the monitor refresh rate to match the frame rate of the video source category 1 - standard speed (1080p / 60hz) category 2 - high speed - supports longer lengths and the higher resolutions HDMI versions 2.0 and 2.1 specify Premium High Speed for data xfer (18 and 48 gbps respectivley) regular - type a mini - type c micro - type d

DisplayPort (DP)

supports similar features to HDMI, such as 4K, audio, and content protection. standard or mini port size. Bandwidth can be allocated in bonded lanes (up to four). The bitrate of each lane was originally 2.7 Gbps but is now (with version 2.0) up to 20 Gbps mdp - mini displayport

A Linux administrator sets up a database server that consumes much memory and never deallocates space from memory, so the administrator wants to set up a spillover area in case there is insufficient system RAM. What should the administrator configure?

swap space If there is insufficient system RAM, the administrator can extend memory space by using disk storage, known as called swap space in a Linux system.

What device uses an embedded adapter to forward traffic through hardware ports between public and private network segments? soho router switch firewall patch panel

switch, firewall, soho router reason: A small office or home office (SOHO) will generally use a single wireless router, which combines the functions of a router, DSL/cable modem, Ethernet switch, and Wi-Fi access point to provide connectivity. A cable modem forwards data traffic via the fiber backbone to the ISP's point of presence and then to the internet via several access ports. An Ethernet switch provisions one port for each device that needs to connect to the network. The patch panel terminates cabling and does not establish any connections between the cable segments to any networks or internet to provide connectivity.

besides a tap, network sniffing can be facilitated using a:

switched port analyzer (SPAN)/mirror port. This means that the sensor is attached to a specially configured port on a network switch. The mirror port receives copies of frames addressed to nominated access ports (or all the other ports).

troubleshooting component issues

symptoms: locking up intermittent shutdowns continuous reboots blue screen app crashes steps: 1. first rule out software, disk/file corruption, malware 2. establish if the problem is sporadic or occurs regularly (every day at a certain time, every hour, etc) 3. ensure the psu is good - ample power, stable voltages 4. turn to memory, cpu, or motherboard - diagnostic tests to identify hardware errors. can be run from firmware setup utility rather than os ______________________________ potential issues: 1. overheating - check for burning smell, check internal temp sensors, cpu fan functionality, is the fan clogged or too small? heat sink fitted, blanking plates to cover holes in pc, verify if the room itself is warm and dusty 2. physical damage - broken/dirty connectors, mobo soldered chips could have electrostatic or heat damage, loose adapter, spilled cooling liquid, "blown" component with scorch marks or capacitator swelling

system clock

synchronizes the operation of all parts of the PC and provides the basic timing signal for the CPU. Clock speeds are measured in megahertz (MHz) or gigahertz (GHz). Clock multipliers take the timing signal produced by the generator and apply a multiplication factor to produce different timing signals for different types of buses. This means that one type of bus can work at a different speed (or frequency) to another type of bus.

A server administrator considers installing error correction code (ECC) RAM into the critical server to help with integrity but is concerned about multiple bit errors. What can happen when the administrator installs ECC RAM?

system halt ECC can detect errors of 2, 3, or 4 bits but cannot correct them. Instead, it will generate an error message and halt the system.

t f Check performance issues. Check for physical damage

t

What type of connector could the operator use to transfer files directly from computer to computer?

t568a t568b Using T568A at one end and T568B at the other creates a crossover cable. Crossover cables once connected computers directly, but Gigabit Ethernet interfaces can perform the crossover automatically, even if using a standard cable.

supervisory control and data acquisition (SCADA)

takes the place of a control server in large-scale, multiple-site ICSs. typically run as software on ordinary computers, gathering data from and managing plant devices and equipment with embedded PLCs, referred to as "field devices." embedded systems typically use WAN communications, such as cellular or satellite, to link the SCADA server to field devices

port 20

tcp ftp - data connection makes files available for download across a network (data connection port)

A firm has asked a forensics expert to review the contents of an older SCSI system. However, before acquiring the system, the components were separated to obscure the information on the system. What should the forensics expert do to the first device on the SCSI bus?

terminate

Client-side virtualization, typically based on a guest operating system hypervisor, is a solution ordinally suited for desktop or workstation computers commonly used for what?

testing and dev

A disadvantage of fixed access wireless (such as a WISP) is that

the actual unobstructed line of sight between the two antennas can be challenging to maintain.

gain

the amount of boost that occurs in a focused antenna signal, measured in dBi Effective isotropic radiated power (EIRP) is the sum of transmit power and gain, expressed in decibel per milliwatt (dBm). Transmit power is the basic strength of the radio, measured in decibel per milliwatt (dBm). Point-to-point wireless antenna frequencies working over longer ranges are not gain. Gain is the amount of boost an antenna signal receives by directionality and is measured in decibels isotropic (dBi).

Server Message Block (SMB)

the application protocol underpinning file and printer sharing on Windows networks. SMB usually runs directly over the TCP/445 port smb3 is current version, v1 is disabled due to security problems

patch panel

the computer is connected to a wall port the wall port goes to the back of the patch panel at the back of the patch panel it is terminated to insulation displacement connector (IDC) punchdown blocks The frontside of the patch panel has prewired RJ45 ports. Whichever port you want to provide internet to, you plug ethernet cables into the matching port that is punched down in the back ideally wall ports next to the user will be labelled with their specific port number on the patch panel.

connector

the part of a peripheral cable that can be inserted into a port/bus with the same shape or form factor. an asymmetric design called keying prevents them from being inserted the wrong way around or are reversible

motherboard compatibility is limited to

the same generation of CPUs The CPU must be supported by both the physical form factor of the motherboard's CPU socket and by the motherboard's chipset

When planning to deploy a client-side virtualization solution for malware analysis where no network connectivity is needed, what are some of the issues that a technician must consider?

the security requirements and the resource requirements

the performance of an HDD is determined by

the speed at which the disks spin, measured in revolutions per minute (RPM). High performance drives are rated at 15,000 or 10,000 rpm; average performance is 7,200 or 5,400 rpm. sector location process (rotational latency) on the drive. A high-performance drive will have an access time below 3 ms; a typical drive might have an access time of around 6 ms.

EIRP (Effective Isotropic Radiated Power)

the sum of transmit power and gain, expressed in dBm

A user's machine recently traveled abroad, and the computer will not start up properly after returning from the trip. Which of the following is the most likely cause?

the user plugged a 120v adapter into a 240v supply

virtual lans

there can be 100s or 100s of machines on the same broadcast domain - ports can be divided into groups using a feature of managed switches called virtual LAN (VLAN) When hosts are placed in separate VLANs, they can no longer communicate with one another directly, even though they might be connected to the same switch. Each VLAN must be configured with its own subnet address and IP address range. from a security point of view, each VLAN can represent a separate zone good for voip

Single-channel memory

there is one 64-bit data bus between the CPU, memory controller, and RAM devices

what is the likely cause of a monitor with color glitches, such as purple or green horizontal lines or colors changing unexpectedly

these are usually caused by a faulty or loose connector or cabling that is either faulty or insufficient quality for the current image resolution. Try replacing the cable. If this does not fix the issue, there could be a hardware fault in either the monitor or graphics adapter

Which of the following would support 8k

thunderbolt high speed hdmi ultra high speed hdmi

An audio-visual support technician assists a customer who normally uses a USB 3.0 display cable to connect, but the cable seems to have gone bad. What else could the technician likely use?

thunderbolt 3

A graphics artist wants to put together the best possible machine since the plan is to do graphics-intensive processing. Which of the following can the graphics artist use to distinguish between memory that appears to be the same?

timing use timings to differentiate the performance of RAM modules that are an identical double data rate (DDR) type and speed. Lower timing values are an indicator of better performance.

In a network domain, the DNS server responsible for a zone will contain resource records. Why would a DNS server have AAAA and A resource records?

to resolve ipv4 and ipv6 client queries

A loopback plug is a simple tool that a technician could quickly build using a scrap cable and a connector, enabling an administrator to create a looped data signal. Why would a network technician want to use a loopback plug?

to test a nic

toner probe

tone generator is connected to the cable using an RJ45 jack and applies a continuous audio signal on the cable the probe is used to detect the signal and follow the cable over ceilings and through ducts or identify it from within the rest of the bundle

digitizer

touch screens can be referred to as digitizers because of the way they convert analo touch input to the digital software instructions digitizer is between glass and display capacitive digitizers support multitouch, so pinching and sweeping and be interpreted as events

A security technician reviews the posture of client machines and finds that the core operating system is not protected. What can the technician do to protect it?

tpm

paper options for impact printers

tractor fed plain carbon

A local company is beginning to print multi-part stationery and wants to ensure there is less chance of skewing or slippage. What should they use?

tractor fed paper

paper with less chance of slippage/skewing

tractor fed paper

what is each pixel in an lcd monitor addressed by to vary the intensity of rgb values

transistor

A network technician can utilize a Wi-Fi analyzer to determine the best wireless channel layout, collect network statistics, and what else?

troubleshoot wifi performance

Non-volatile storage devices hold data when the system is powered off (true/false)

true

t/f: Digital modems, ONTs, and cellular radios transmit data over DSL, cable, fiber, satellite, and cellular links to connect a local network or device to an ISP

true

t/f: In IPv4, hosts generally have a single IP address per interface. IPv6 interfaces are more likely to be configured with multiple addresses.

true

true/false - Any network where the nodes are within about 1 or 2 km (or about 1 mile) of one another can be thought of as "local."

true

true/false - Wi-Fi and Ethernet technologies complement one another and are often used together as segments within the same local network. This allows computers with wired and wireless networking adapters to communicate with one another.

true

t/f - The Dynamic Host Configuration Protocol (DHCP) uses broadcast addressing, which is not supported by the connection-oriented Transmission Control Protocol (TCP)

true consequently, DHCP uses the connectionless User Datagram Protocol (UDP)

t/f - A host cannot be assigned either the first or last address in an IP network

true - the first (192.168.0.0) is how the network identifies itself. The last, 192.168.0.255, is used to broadcast all hosts. This puts the valid range at 192.168.0.1-.192.168.0.254

t/f - when configuring an AP you can choose to name all the frequency bands the same name

true. if you do opt to do this, the device will automatically connect to the highest band

dual-channel memory

two 64-bit pathways through the bus to the CPU, meaning that 128 bits of data can be sent per transfer rather than 64 bits with a single channel This feature requires support from the CPU, memory controller, and motherboard but not from the RAM devices. Ordinary RAM modules are used. There are no "dual-channel" DDR memory modules. DDR5 introduces a different type of data bus. Each memory module has two channels of 32 bits. When installed in a dual channel memory controller configuration, this becomes four 32-bit channels.

redundant power supplies

two PSUs are installed in a machine, with one as a failover in case the first dies requires a compatible motherboard and more common on servers. on a server, each PSU plugs into a backplane and is hot-swappable. This allows a faulty unit to be removed and replaced without having to open the case and without the server ever losing power.

IPv6 Network Prefixes

two main parts: the first 64 bits are used as a network ID the second 64 bits designate a specific interface no need for a subnet mask

troubleshoot Redundant Array of Independent Disks (RAID) failure

two primary reasons for failure are failure of a device within the array and failure of the whole array or volume If device failure - replace - if the array supports hot swapping, new disk can be inserted If a volume is not available: 1. more than the tolerated number of disks has failed 2. the controller has failed. If the boot volume is affected, then the operating system will not start. If too many disks have failed, you will have to turn to the latest backup or try to use file recovery solutions. If the issue is controller failure, then data on the volume should be recoverable, though there may be file corruption if a write operation was interrupted by the failure. Either install a new controller or import the disks into another system. If the failure affects the boot process, use the RAID configuration utility to verify its status. If you cannot access the configuration utility, then the controller itself is likely to have failed.

coaxial cable

type of copper cabling, also carrying electrical signals uses two conductors that share the same axis. core signal conductor is enclosed by plastic insulation (dielectric) a second wire mesh conductor serves both as shielding from EMI and as a ground used for cctv/broadband cable modems typically terminated using a screw-down F-type connector

intermittent projector shutdown

typically due to overheating check fan is working and vent is free from dust/not obstructed make sure room temp is not too high and check for loose cabling verify bulb is secured properly

Peripheral devices

typically perform the function of input (keyboard, mouse, microphone, and camera), output (monitor and speakers), or external storage

Trivial File Transfer Protocol (TFTP)

typically used by network devices to obtain a configuration file uses its own acknowledgement messaging, so it does not require TCP

An avid gamer receives a new rig that should handle games at their most intensive graphics settings. The gamer starts immediately and finds that the desktop runs quite warm, but the fans have not started kicking in yet. What is the first thing the gamer should check?

uefi System settings can control most cooling fans, typically under a cooling, power, or advanced menu. The Unified Extensible Firmware Interface (UEFI) can control this.System settings can control most cooling fans, typically under a cooling, power, or advanced menu. The Unified Extensible Firmware Interface (UEFI) can control this.

When comparing bus interfaces, it is important to use appropriate _____

units

USB

universal serial bus. standard means of connecting most types of peripheral device to a computer usb 2 is half duplex meaning it can only send or receive usb 3 is full duplex and can send/receive at the same time

A marketing analyst is trying to connect an Apple device to a corporate PC, but the cable will not fit into the PC connections. What type of adapter should the analyst use?

usb

A helpdesk operator sets up printers and looks at speeds with different connections. Which of the following operates at full-duplex?

usb3

A parent has purchased an older laptop for their young child to do school work but finds the laptop has USB 1.1 connections. Which of the following should the parent use to be compatible?

usb3 type a

The administrator uses a hard drive running USB 3.2 that supports 10 Gbps speeds but must ensure the legacy server can support connectors. Which of the following are supported connectors?

usba usbc usb micro

symmetric multiprocessing (SMP)

use two or more physical CPUs in a system a multi-socket motherboard is significantly more costly more common in servers CPUs used in each socket must be identical models and specifications and must be models that support SMP.

http/https

used to deliver web pages and other resources secure version uses encryption to authenticate the server and protect the information that is being transmitted missing packets would cause this to fail, tcp required

punchdown tool

used to fix each conductor into an IDC untwist the wire pairs, lay them in the color-coded terminals in the IDC in the appropriate termination order (T568A or T568B). use the punchdown tool to press each wire into the terminal. Blades in the terminal cut through the insulation to make an electrical contact with the wire

network tap

used to intercept the signals passing over a cable and send them to a packet or protocol analyzer. either powered or unpowered passive test access point (TAP) is a box with ports for incoming and outgoing network cabling and an inductor or optical splitter that physically copies the signal from the cabling to a monitor port. No logic decisions are made, so the monitor port receives every frame—corrupt or malformed or not—and the copying is unaffected by load. An active TAP is a powered device that performs signal regeneration, which may be necessary in some circumstances. Gigabit signaling over copper wire is too complex for a passive tap to monitor, and some types of fiber links may be adversely affected by optical splitting. Because it performs an active function, the TAP becomes a point of failure for the links during power loss.

Capture Cards

used to record video input and save it as a type of movie or streaming media file. Many designed to record footage from computer games, work with PC games, , record from game console HDMI sources or from a live camera HDMI source, such as a camcorder or security camera. Another class of capture card can act as a TV tuner and record video from broadcast TV sources. can be fitted as an internal PCIe or as an external unit connected via USB/Thunderbolt.

Loopback Plug

used to test a NIC or switch port wires connect pin 1 to pin 3 and pin 2 to pin 6 When you connect a loopback plug to a port, you should see a solid link LED showing that the port can send and receive

Low Earth Orbital Satellite Internet Access

uses an array of satellites positioned in low Earth orbit (LEO) better bandwidth (70-100 Mbps) and lower latency (100-200 ms RTT) satellites move relative to the surface of the Earth. premises antenna realign with the array - "phased array" - to connect to different satellites as they pass overhead and minimize the amount of mechanical realignment required. The antenna must have a clear view of the whole sky.

solid-state drive (SSD)

uses flash memory technology to implement persistent mass storage Risks from total failure of the device due to mechanical shock and wear are generally lower. however, ssds are susceptible to a type of degradation over the course of many write operation

wireless local area network (WLAN)

uses radios and antennas for data transmission and reception. Most WLANs are based on the IEEE 802.11 series of standards. IEEE 802.11 is better known as wifi

Virtual desktop infrastructure (VDI)

using VMs as a means of provisioning corporate desktops desktop computers are replaced by low-spec thin client computer the thin client starts, it boots a minimal OS, allowing the user to log on to a VM stored on the company server or cloud infrastructure can be on premise or cloud referred to as desktop as a service (DaaS)

A company has tasked a network administrator with running Ethernet cabling in an enterprise and is told to use the most popular type of network cable with an insulated jacket. Which of the following should the administrator use?

utp

The helpdesk professional notices that the display connector has 15 pins. What type of cable will the computer need?

vga

uncontrolled deployment of more and more VMs is referred to as

virtual machine sprawl (VM sprawl)

watts are calculated for electrical components as

voltage multiplied by current (V*I)

While a local area network (LAN) is a group of computers connected by cabling and one or more network switches located at a single geographical location, what type of network spans multiple geographic locations, such as states in the U.S.?

wan

Video Graphics Array (VGA)

was the standard analog video interface for PC devices for a very long time (15 pin) VGA will usually support resolutions up to HD (1920x1080), depending on cable quality

When picking a psu, what are the primary things you should look for?

wattage and form factor

The PSU's output capability is measured as its

wattage rating

power is measured in

watts (W)

A network segment is

where hosts can send frames to one another using their MAC addresses

An operations manager for a transportation company works out of an office with several workers that come and go. The manager wants to install a printer for multiple shared devices, but no network drops are available in the building. What options does the operations manager have for installation?

wifi bluetooth

An access point (AP) is configured as a bridge to forward communications between new wireless clients and the existing wired network. The network security technician needs to ensure no unauthorized APs are in the vicinity. What tool could the technician use to validate that no other APs are in the area?

wifi analyzer

rail

wire providing power at a particular voltage from a psu

A marketing manager reviews a printer configuration and finds that someone set up the printer in infrastructure mode. What medium will the marketing manager need to connect to the printer?

wireless

A server administrator assesses various types of server hardware, specifically chipsets. The administrator plans to run a hypervisor on the hardware, which will run several hundred virtual machines. What would be the best chip type to use?

x64


Set pelajaran terkait

Unit 8 - Review Questions Real Estate Brokerage

View Set

Art History - Chapter 8 - Late Antiquity, Byzantium and The Middle Ages: The Byzantine Empire, ART HISTORY: CHAPTER 9: BYZANTINE, Art History-Byzantium Empire, Survey of Art I - Day 19 - Quiz 3 Study Guide (Days 15-18), Pompeii and Herculaneum, class...

View Set

R:Chapter 69: The High-Risk Newborn

View Set

Biology 1406- Final @ Lee College

View Set

Ch.4 - How to retrieve data from two or more tables

View Set

software engineering collection 1

View Set

Chapter 23 Study Guide - Shorter Answers

View Set

Chapter 4: Documentation and Interprofessional Communication

View Set

Week 12 Day 6 문자 text message PHRASE

View Set