Dion Training CompTIA A+ Core 1 Flashcards

1
Q

Personal Computers

Workstation

A

Computer desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personal Computers

Server

A

Used to host a file and print sharing server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personal Computers

Laptop

A

Mobile version of a workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tablet

A

Portable computer that consists of a touchscreen and computing
hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smartphone

A

Smaller version of tablets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smart Device

A

Device that can compute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet Of Things (IOT) Devices

A

Devices that connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hardware

A

Parts of the computer that can be picked up, moved around, opened, and
closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Storage

A

Saving the data for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software

A

Provides the instructions for the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operating System

A

Provides a method for saving, retrieving, changing, printing, and
transmitting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application System

A

Used to create, store, modify, and view information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Driver

A

Used to translate commands from the operating system to hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firmware

A

Specialized type of software on a chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

o Personal Safety

A

▪ Trip hazard avoidance
▪ Proper lifting techniques
▪ Safety gear usage
● Trip hazard occurs when there is an object where people walk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Component Safety

A

▪ Actions taken to prevent damage to components
● Electrostatic discharge (ESD) occurs when electrons rush from the
body to a component
o Antistatic bag
o ESD wrist strap
o ESD mat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chemical Safety

A

Chemical safety includes proper handling and disposal of hazardous
materials and chemicals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Use these six steps to answer the questions on test day

A

▪ Identify the problem
▪ Establish a theory of probable cause
▪ Test the theory to determine the cause
● If the theory is not confirmed, re-establish a new theory
▪ Establish a plan of action to resolve the problem and implement the
solution
▪ Verify full system functionality
▪ Document the findings, actions, and outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cable Types

Common measurements

A

▪ A single “bit” can store one of two values: 1 or 0
▪ “Nibble” is 4 bits
▪ “Byte” is 8 bits
▪ 1000 bits
● 1Kilobit (1Kb)
▪ 1Kbps
● (8bits per byte)
● 125KB
▪ b = bits
▪ B = bytes
▪ 1,000,000 bits = 1 Megabit (Mb)
▪ 1,000,000 bytes = 1 Megabyte (MB)
▪ 1,000,000,000 bits = 1 Gigabit (Gb)
▪ 1,000,000,000 bytes = 1 Gigabyte (GB)
▪ 1,000,000,000,000 bits = 1 Terabit (Tb)
▪ 1,000,000,000,000 bytes = 1 Terabyte (TB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

o CD Drive

A

The ability to read and write information to the system using an optical
device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Power Button

A

A physical button, that when pushed, sends an electrical signal from a
cable directly to the motherboard that tells the computer to turn on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Audio Jack

A

Used to connect headphones and microphones to the computer using a
1/8th inch Mini-Jack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SuperSpeed USB Connectors

A

Used to connect other peripherals, like a mouse, a keyboard, a webcam,
a printer, or other devices to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

o Cooling Fan

A

Blows hot air out of the CPU, the motherboard, and the case which
expels the extra heat out of the system to keep the component insides
cool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

HDMI Connector

A

Used to connect a monitor, TV, or another device for a video output
display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RJ 45 Connector

A

Provides net access to local area networks over a wired connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SPDIF Connector

A

▪ An optical connector that allows high quality audio to a surround sound
system
▪ USB 2.0 speeds are good for a microphone, a mouse, or a keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Kensington Lock

A

▪ Allows the ability to place a metal cable from the desk to the computer
tower to ensure the computer tower is not stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DB 25 Connector

A

A D-shaped sub miniature pin that goes into the back of a computer and
has two thumb screws on the side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Serial Cable

A

A cable that sends data in ones and zeros in a straight line, but it can only
send one bit at a time, which is measured at the speed of cables in bits
per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DB9 Connector

A

▪ A slow speed connection for much older mice keyboards and other
external modems
▪ A USB 1 and a USB 2 run at a much slower speed and should be split
across a hub
▪ A USB 1.0 has the slowest speed out of a USB with a maximum speed of
1.5 megabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

USB 1.1

A

Known as full speed and runs at 12 megabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

USB 2.0

A

▪ Known as high speed and runs at 480 megabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

USB 3.0

A

▪ Known as super speed and is at least 5 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

USB 3.1 Gen One

A

▪ Runs at 5 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

o USB 3.1 Gen Two

A

▪ Runs at 10 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

USB 3.2 Gen 2x2

A

▪ Runs at 20 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

USB 4

A

▪ The most modern version of USB and can run at 40 gigabits per second
▪ A USB 4 and a USB 3.2 gen 2x2 must have a shorter cable because that is
going to give the best performance
▪ The longer a cable, the more likelihood that the cable would not work as
efficiently, or even at all
● Type A
● Type C
● Type B
● Type B Mini
● Type B Micro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

HDMI

A

Known as high-definition multimedia interface and it is the most widely
used video interface in the world
▪ Lower resolution HDMI can support HD standard, but higher resolution
HDMI can support up to 4k
● Full-Size (Type A Connector)
● Mini Connector (Type C)
● Micro Connector (Type D)
▪ Category 1
● The standard HDMI that is used for video content
▪ Category 2
● The high-speed HDMI that uses higher resolutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

HDMI Version 2

A

▪ Higher speeds that are specified for data transfer using HDMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Display Port Interface

A

▪ Used for digital displays with a high-performance replacement
● Full-Size Display Port
● Mini Display Port
▪ Display Ports can support high speed data transfer over its cables starting
off with 2.7 gigabits per second, but can go up to 20 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

o DVI

A

Used to support both analog and digital outputs
● DVI A
● DVI D
● DVI I
▪ DVI A only supports analog signals, DVI D only supports digital signals,
and DVI I support both signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

VGA

A

▪ The graphic standard that used a 15-pin standard analog video interface
port that would connect to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Thunderbolt

A

▪ A display interface that is used for data transfer
● Thunderbolt version 1 and 2 used a physical connector that
were backwards compatible
● All thunderbolt version 3 will support USB-C, but not all USB-C
we’ll support Thunderbolt 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

o Thunderbolt

A

Supports speeds of up to 40 gigabits per second for data transfer over
cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Lightning Cable

A

A specific proprietary connector that was created by apple their mobile
devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

SATA Cable

A

▪ The standard cables that are the main method of connecting a storage
device to a motherboard inside of a desktop computer
▪ The SATA cable has two cables, one is a seven-pin data cable, which does
not supply any power, and the other is a 15-pin SATA power connector to
provide the power to the device
▪ SATA version 1 can support speeds of up to 1.5 gigabits per second,
version 2 can support speeds of up 3 gigabits per second, and version 3
can support speeds of up to 6 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

External SATA

A

A SATA cable on the outside of the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

o PATA

A

▪ The old IDE connectors with the exact same cables and connectors and
standards but renamed for branding
▪ Parallel devices have each cable support up to two devices and they both
can communicate at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Molex Power Connector

A

A 4-pin connector that would attach from the power supply directly to a
device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

SCIS

A

▪ A legacy parallel bus connector that allows multiple devices to be Daisy
chained together
▪ A narrow SCIS can support up to 7 devices, but a wide SCIS can support
up to 15 devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

o Motherboard

A

▪ Printed circuit board that contains computer components and provides
connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Input

A

▪ Process of accepting data in a form that the computer can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Output

A

Process of displaying the processed data or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

o Processing

A

▪ Actions performed by the CPU when receiving information
▪ Processing is conducted by the CPU or GPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

o Storage

A

▪ Process of saving or retaining digital data, temporarily or permanently
● Temporary storage
o Non-persistent
● Permanent storage
o Persistent

▪ Data transferred across the motherboard measures the speed of data in
MHz or GHz
● Volatile storage
o Speed is fast
● Non-volatile storage
o Speed decreases rapidly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Advanced Technology eXtended (ATX)

A

Full-size motherboard and measures 12” x 9.6” in size (305mm x 244 mm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Mini-ATX

A

▪ Smaller than ATX but contains the same features (11.2” x 8.2” / 284mm x
208 mm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Micro-ATX (mATX)

A

▪ Measures 9.6 inches squared (244mm x 244mm)
▪ Micro-ATX is the same as ATX but only has 4 expansion card slots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

o Information Technology eXtended (ITX)

A

▪ Designed as a replacement for the ATX but never produced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

o Mini-ITX

A

▪ Measures 6.7” x 6.7” with only one expansion slot (170 x 170mm
squared)
● Nano-ITX
● Pico-ITX
● Mobile-ITX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Form Factor

A

▪ Shape, layout, and type of case in a power supply
● ATX
o Full-size ATX
o Mini-ATX
o Micro-ATX
● ITX
o Mini-ITX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

o CPU

A

▪ The brains of the computer that execute the different programing codes
in the software and firmware
▪ The CPU is performing the basic operations for every instruction in the
computer
▪ Once the processor has done the execution of the instruction, it will send
that information back to the memory so that it can be stored and used
for later use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

o X86

A

▪ Can support a maximum of 4 gigabytes of Ram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

o X64

A

▪ An extension of the X86 instruction set to be able to support 64-bit
operations
▪ 32-bit systems can only run 32-bit programs, but 64-bit processors can
run 64-bit programs and 32-bit programs because they are fully
backwards compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Advanced RISC Machine (ARM)

A

▪ Used for low-power devices (tablets and cell phones)
● Extended battery life
● Produces less heat
▪ RISC systems use code to do tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

o ZIF

A

▪ The ability to insert the CPU without pressing down and applying
pressure to it
▪ If you bend, snap, or break a pin from a processor, the entire processor is
no longer functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

o LGA Socket

A

▪ A form factor that positions all the pins to be able to connect the CPU
processor into the socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

o PGA Form Factor

A

▪ The processor has the pins and the socket have holes which allows the
holes to align when installing the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

o Multi-Socket

A

▪ Multiple CPU’s or processors installed on a motherboard
▪ You cannot upgrade or change out the processor on a mobile device
▪ The two main types of CPU sockets are LGA, which is made by Intel, and
we have PGA, which has made by AMD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

● CPU Features

A

▪ Single stream of instructions is being sent by a software application to a
processor
▪ Manufacturers developed a way to allow software to run multiple parallel
threads at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

o Symmetric Multiprocessing (SMP)

A

▪ Traditional workstation and servers have multiple processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

o Multi-core Processors

A

▪ Single CPU with multiple processors inside
▪ Multiple processors have multiple cores inside the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Dual-core Processor

A

▪ Two CPUs inside a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

o Quad-core Processor

A

Four CPUs inside a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Hexa-core Processor

A

Six CPUs inside a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Octa-core Processor

A

▪ Eight CPUs inside a single chip
● Hyper-threading / SMT
● Symmetric Multiprocessing
● Multi-core Processors
● Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

o VT and AMD-V

A

provide processor extensions to support virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

o Virtualization allows running multiple systems on a single physical host

A

▪ Extended Page Table (EPT)
● Intel
▪ Rapid Virtualization Indexing (RVI)
● AMD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Second Level Address Translation (SLAT)

A

Features of software virtualization are underlying and supported by the
hardware processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Installing the Motherboard & CPU

A
  1. Review the motherboard’s documentation
  2. Place the motherboard aligned at the rear of the case
  3. Insert standoffs that match the hole in the motherboard
  4. Install the processor and memory modules before installing the motherboard
  5. Verify the standoffs are properly aligned prior to installing the motherboard
  6. Secure the standoffs using the appropriate screw type
  7. Install the power supply, disk drives, and add-on cards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

o PCI

A

▪ 32-bit expansion card
● PCI 32-bit cards support only a maximum bus speed of 33 MHz or 133 MBps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

PCI-X

A

▪ 64-bit expansion card (133 MHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

o PCI-X 2.0

A

▪ 266 MHz up to 533 MHz
● PCI and PCI-X are used for networking cards and audio cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

o Accelerated Graphics Port (AGP)

A

▪ Used for video graphics cards
● AGP 1x
● AGP 2x
● AGP 4x
● AGP 8x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

o PCIe (PCI Express) replaces PCI, PCI-X, and AGP

A

▪ PCIe x1
▪ PCIe x4
▪ PCIe x8
▪ PCIe x16
● PCIe x1 is used for modems, network cards, wireless cards,
input/output devices, and audio cards
● PCIe x16 is used for graphics cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Peripheral Component Interconnect Express (PCIe)

A

▪ Connects to the bus to get data to and from the motherboard for external devices
▪ PCIe bus is determined by the motherboard and its form factor
● 16 PCIe lanes
● 24 PCIe lanes
● 32 PCIe lanes
▪ PCIe x16 and PCIe x1 maximize the number of lanes used on a
motherboard
● PCIe 1.0
● PCIe 2.0
● PCIe 3.0
● PCIe 4.0
● PCIe 5.0
▪ All PCIe slots provide 25 watts of power
▪ PCIe x16 card slot provides up to 75 watts of power
● Up-plugging
o Putting smaller card in a larger slot
● Down-plugging
o Putting larger card in a smaller slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Mini PCIe

A

▪ Standard PCIe card with smaller form factor
▪ Mini PCIe cards are used inside of laptops, specifically for wireless networking
● PCIe x1
o Modems
o Networking cards
o Wireless cards
o Audio cards
● PCIe x16
o Graphics and video cards (3D)
o Gaming systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Video Card/Graphic Adapter

A

▪ Gives quality signal for monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Graphics Processing Unit (GPU)

A

▪ A specialized processor designed to accelerate graphics rendering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

High Speed Memory

A

▪ Embeds the memory to give additional capability to offload from the
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Graphical Ports

A

▪ Installed outside of the card (Thunderbolt, DisplayPort, and HDMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

o Video Capture Card

A

▪ Takes video signals and processes them inside the computer
▪ used for recording footage and for security devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

TV Capture Card

A

▪ Cables are plugged into a computer to get all cable TV channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

o Sound/Audio Card

A

▪ Gives better output through audio
● RJ45 Port
o 1 Gbps
● Install NIC into PCIe x1 slot
o 10 Gbps
● ST / SC / MT-RJ connector
o Supports fiber card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Riser Card

A

▪ Special type of expansion card on a motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Thermal Load

A

▪ Heat from different components inside the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

o Passive Cooling

A

▪ Type of cooling that doesn’t rely on moving parts or power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

o Heat Sink

A

▪ Finned metal device that radiates heat away from the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

o Thermal Paste

A

▪ Compound that ensures heat transfer by eliminating air gaps
● Passive cooling requires no power to operate and is silent when operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

o Active Cooling

A

▪ Uses a fan to cool down the heat from the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

● Liquid Cooling

A

o Closed Loop System
▪ Cooling of a single component
o Open Loop System
▪ Liquid cooling-based system of different components
o Liquid Cooling
▪ High performance systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Alternating current (AC)

A

▪ Cycled between positives and negatives repeatedly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

The main purpose of power supply

A

is to deliver DC to all components inside the
PC when receiving an AC power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Modular PSU / Modular Power Supply Unit

A

▪ Allows to unhook the connectors and detach from the unit
▪ Modular power supply frees up space inside of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Main Board / Motherboard Adapter

A

Provides power to the motherboard
● ATX Standard
o 20-pin connector
● ATX 12V
o 24-pin connector
● 20+4 Pin
o Two connectors are coupled together before plugging into
a 24-pin connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

o Processor Power/ CPU Power

A

▪ Has a four, six, or eight-pin connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

o Molex Connector

A

▪ Used for IDE and PATA hard disks, CDs, and DVD drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

o Y Connector

A

▪ One connector that can support multiple devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

o 120V AC (Low Line Power)

A

▪ US-based power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

230V AC (High Line Power)

A

▪ Europe and Asia power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

o Most power supplies

A

will support multi-voltage outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

o Voltage Sensing / Dual Voltage Power Supplies

A

▪ Detects the outlet and converts it into the voltage of DC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Rail

A

Wire that provides current at a particular voltage
● 12 VDC Rail
o Cable or wire that provides 12 VDC
o The 12 VDC rail is the most used voltage in the PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

o Wattage Rating

A

▪ Power supply’s output capacity or capability
▪ The devices inside a computer require power from a power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Amperage to Wattage

A

A x V
▪ I x V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

o The power supply has increments of 50 or 100 Watts

A

▪ Buy a power supply that is bigger than calculated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

How much power is being drawn out of a wall outlet?

A

▪ A 500-watt power supply that is 70% efficient will draw 714 watts
▪ A 500-watt power supply that is 80% efficient will draw 625 watts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Power supplies are not

A

100% efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

o Random Access Memory (RAM)

A

▪ Used to load applications and files into a non-persistent and fast storage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Cache

A

High-speed memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Storage

A

Mass storage device that holds more data but is slower than a cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Mass Storage Devices

A

▪ Permanent storage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

o Random Access Memory (RAM) / System Memory

A

▪ Temporary storage area/non-persistent storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Disk Cache

A

Pulls the files from the disc into memory and replaces the old file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Mechanical system

A

Uses an electronic system that can access the RAM with instant speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Addressing Memory

A

▪ Processor reaching the files inside RAM
● Single Channel Memory Controller
o 32 or 64 bits
● x86
o 32-bit
● x64
o 64-bit
▪ An x86 or 32-bit processor can address a maximum
of 4 GB of RAM
▪ An x64 or 64-bit processor can access more than 4
GB of RAM (8, 16, 32, or 64 GB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

o Single Bank

A

▪ Can put any size of module in any slot
● Dual Inline Memory Module (DIMM)
o With 240 or 184-pin connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Dual Data Rate (DDR)

A

▪ Most common type of memory
● PC133
o 133 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

o Throughput

A

▪ Calculated based on the bus speed and the width of the data bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

o Dynamic RAM (DRAM)

A

▪ Oldest type of memory that requires frequent refreshing
● DRAM storage cell is dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Synchronous DRAM (SDRAM)

A

▪ First memory module that operates at the same speed as the
motherboard bus (168-pin connector)
● PC66 (66 MHz bus)
● PC133 (133 MHz bus)
● PC266 (266 MHz bus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

o Double Data Rate Synchronous Dynamic Random-Access Memory (DDR SDRAM)

A

▪ Doubles the transfer speed of an SRAM module (184-pin connector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

o Double Data Rate 2 Synchronous Dynamic Random-Access Memory (DDR2
SDRAM)

A

▪ Higher latency and has faster access to the external bus (240-pin
connector)
● PC2-4200
o 4200 MB/s or 4.2 GB/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Double Data Rate 3 Synchronous Dynamic Random-Access Memory (DDR3
SDRAM)

A

▪ Runs at a lower voltage and at a higher speed than DDR2 (240 keyed pin
connector)
● PC3-10600
o 10600 MB/s or 10.6 GB/s
▪ DDR3 throughput is 6.4 to 17 GB/s with a maximum module size of 8GB per memory module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Small Outline Dual In-line Memory Module (SODIMM)

A

▪ Classified as DDR3, DDR4, or DDR5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

o Multi-Channel Memory

A

▪ Uses two different memory modules to increase the performance and
throughput
● Single-channel Memory
o 64-bit data bus
● Dual-channel Memory
o 128-bit data bus
▪ Interleaving
● Provides increased performance
● In multi-channel configurations, use the same model, speed, and throughput of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

▪ Single-Channel

A

● Uses one memory module on one bus (64-bit data bus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

▪ Dual-Channel

A

● Requires two memory modules and two memory slots on the
motherboard (128-bit data bus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Triple-Channel

A

● Uses three memory modules and three memory slots (192-bit
data bus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

▪ Quad-Channel

A

● Uses four memory modules and four memory slots (256-bit data
bus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

▪ Multiple modules

A

● Give faster speeds and add memory for storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Non-Parity Memory

A

▪ Standard memory that does not check for errors and allows data to be
put in or taken out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Parity Memory

A

Performs basic error checking and ensures the memory contents are
reliable
● A parity check does basic calculation
o Every bit has an associated parity bit
▪ Bits can only be a zero or one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Error Correcting Code (ECC)

A

▪ Detects and corrects an error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Buffered / Registered Memory

A

▪ Additional hardware (register) between memory and CPU
● The system requires buffering or registering the data to reduce the electrical load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Motherboard

A

▪ Supports ECC modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

o DDR5

A

▪ Has an internal error checking for its modules
● DDR5 modules can still be sold as ECC or non-ECC modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Virtual Memory/Page File

A

▪ Space on a hard drive that is allocated by the OS and pretends to be
memory
● Check the available memory and the free memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Page File or Swap Space

A

▪ A file that is hidden on a storage device and pretend as system memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

o Basic Input/Output System (BIOS)

A

▪ Program that a CPU uses to start the computer system
▪ BIOS serves as a method of configuring the motherboard using a textbased interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

o Firmware

A

▪ Software on a chip and contains BIOS program code in the flash memory
of a motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

o Unified Extensible Firmware Interface (UEFI)

A

▪ Supports 64-bit processors and provides a GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

o Basic Input/Output System (BIOS)

A

▪ Program a computer’s microprocessor uses to start and boot after being
turned on
▪ BIOS is an example of firmware
● Power-on self-test
● Hardware configuration
● Boot order setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Read-Only Memory (ROM)

A

▪ Type of chip embedded in the motherboard and can be upgraded
through flashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

o The new CMOS uses an

A

internal lithium-ion battery that can last up to 10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Power-On Self-Test (POST)

A

▪ Diagnostic testing sequence to check the computer’s basic input/output
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Variable beeps are used to tell what is wrong with the system

A

▪ Keyboard is not detected
● Two short beeps and one long beep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

The BIOS has a low-level OS which allows to take input and give output to
the basic components

A

▪ To configure the settings inside CMOS, enter the BIOS configuration
environment
▪ BIOS relied on a text-based menu system and a keyboard as its system of
input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Unified Extensible Firmware Interface (UEFI)

A

▪ Updated form of BIOS that allows keyboard and mouse as input and
provides a GUI
● Supports 64-bit systems
● Supports larger HDDs and SSDs (9.4 zettabytes ~ 9.4 x 10^21
bytes)
● Supports the new GUID Partition Table (GPT) format
● Faster boot-up system
● Uses a larger ROM size
▪ Disable booting from an optical drive or USB drive
▪ Configure the system to boot from the installed hard drive using the
installed OS
▪ Boot the OS using PXE as the primary option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Flashing

A

▪ Performed during upgrades, security fixes, or feature improvements
● Back up the configuration and information
● Use a USB flash drive to flash the firmware
● The BIOS or UEFI will copy the firmware to the system and
overwrite the old code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

o BIOS and UEFI are used during

A

loading and booting up the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

o Computers that rely on BIOS

A

use MBR to hold the boot information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Computers that rely on UEFI

A

use GPT to hold the boot information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Supervisor/Administrator/Setup Password

A

▪ Used to protect access to the BIOS or UEFI configuration program and
prevents access from unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

o User/System Password

A

▪ Used to lock access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Storage/Hard Drive Password

A

▪ Password that locks access to a hard drive connected to the system and
requires the end user’s password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Secure Boot

A

▪ Enabled in the UEFI interface and settings and is not supported by BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

o Root kit

A

▪ a special type of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Modern systems are configured to enable or disable

A

the USB ports on the
motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

o Disable the ability of USB to read and write from mass storage devices

A

▪ Set passwords
▪ Enable secure boot
▪ Restrict or disable USB ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

o Hardware RoT is the foundation

A

of all secure operations of a computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Hardware Root of Trust (RoT)

A

▪ Cryptographic module embedded in a computer system that endorses
trusted execution and attests to boot settings and metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

o A hardware RoT

A

is used to scan the boot metrics in the OS files to
verify signatures and then use them to sign the report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Trusted Platform Module (TPM)

A

▪ Specification for hardware-based storage of digital certificates, keys,
hashed passwords, and other user and platform identification
information
● TPM is a hardware RoT
● Secured boot-up
● Provides encryption
▪ A TPM can be managed in Windows via tpm.msc console
or through group policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

o Hardware Security Module (HSM)

A

▪ Appliance for generating and storing cryptographic keys that
is less susceptible to tampering and insider threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

o BIOS and UEFI can configure fans

A

▪ Quiet mode
● Reduces the fan speed and allows higher temperatures to occur
▪ Balanced mode
● Normal setting on most computers by default
▪ Cool mode
● Able to run the fans harder and faster to create more air flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

o Overclocking

A

the processor generates excess heat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

o The motherboard has built-in temperature sensors

A

▪ Temperature is rising
● Speed up
▪ Temperature is lower than set point
● Turn off or slow down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Hard Disk Drive (HDD)

A

▪ Form of mass storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

o Mass Storage Device

A

▪ Non-volatile storage device that holds the data when the system
is powered down (GB or TB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

o Internal Device

A

▪ Device that is placed inside the computer case or tower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

o External Device

A

▪ Device that is placed outside the computer case or tower and connected
to an external port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

o Solid State Drive

A

▪ Uses flash memory technology to implement mass storage
▪ Faster and more durable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Main Form Factors

A

▪ 2.5 inch
● Used when replacing an HDD inside a laptop or a small desktop
▪ 1.8 inch
● Used inside of small laptops
▪ M2
● Like a memory chip, small, sleek, and light
● Used in a laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

o Connections

A

▪ Older SSDs rely on SATA connectors (7+15 pin SATA)
● Used in both 2.5- and 1.8-inch SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

▪ mSATA

A

● Allows the SSD to be used as an adapter card that can be plugged
into a combined data and power port on the motherboard
● SSDs are faster than SATA speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

▪ NVMe (Non-Volatile Memory Express)

A

● A communication protocol used with the M2 form factor to plug
directly into the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

▪ PCIe (Peripheral Component Interconnect Express)

A

● Use PCIe slots on the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

o A combination of SSDs and HDDs can be advantageous

A

▪ Higher speed from the SSD
▪ Larger and cheaper storage from the HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Hybrid Drive

A

▪ Created as a transitional technology
▪ Less common today
▪ Looks like a hard drive (2.5-inch form factor)
▪ Has both an SSD and an HDD in it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

o Redundant Array of Independent Disks (RAID)

A

Combination of multiple physical hard disks that is recognized by the
operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

● RAID 0

A

RAID 0 is great for speed but provides no data redundancy
o RAID 0 has no loss of space on the disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

● RAID 1

A

RAID 1 provides full redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

● RAID 5

A

Striping with parity
o One disk can be lost without losing any data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

● RAID 6

A

o Double striping with parity
o Two disks can be lost without losing any data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

● RAID 10

A

o Redundancy and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

o Failure Resistant

A

▪ Protection against the loss of erased data (RAID 1/RAID 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

o Fault Tolerant

A

▪ Raid can function even when a component fails (RAID 1/RAID 5/RAID 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Disaster Tolerant

A

▪ RAID with two independent zones with full data access (RAID 10)
▪ RAIDs provide redundancy and high availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Hot-Swappable

A

▪ Capable of being removed or replaced without disruption or powering off
the device
▪ Hot-swappable drives are safe to remove without losing the data
● This feature gives the ability to add/remove additional storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

o Advanced Host Controller Interface (AHCI)

A

▪ Technical standard developed by Intel that allows hot-swappable
capability with SATA devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

SATA was developed as a

A

replacement for PATA as an internal connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

The newest versions of USB have speeds

A

of 10, 20, or 40 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

o Drive Enclosure

A

▪ Takes an internal hard drive and puts it in an enclosure
● Memory Stick
o Proprietary protocol that is used on Sony devices
● The original secure digital (SD) cards had a maximum capacity of 2 GB
o Original (Up to 25 MB/s)
o UHS-1 (Up to 108 MB/s)
o UHS-2 (Up to 312 MB/s)
o UHS-3 (Up to 624 MB/s)
● A tape drive uses a magnetic tape and is placed into a reader
o Standard Tape
▪ 140 GB data
o LTO Ultrium Tape
▪ 3 TB data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

A removable mass storage device

A

is any device that can store data and can be
carried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

o An external hard drive or SSD

A

is the same type of device that is used inside a
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

CD (Compact Disc)

A

▪ Oldest form of optical drive that stores 74 to 80 minutes of music (650-
700 MB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

DVD (Digital Versatile Disc)

A

▪ Stores 4.7 GB or 8.4 GB (DL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

BD (Blu-ray Disc)

A

▪ Stores 25 GB or 50 GB (DL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

Categories of Optical Drives

A

▪ Read-only (ROM)
▪ Write-once (R)
▪ Write-many/Erasable (RW/RAM/RE)
▪ The CD-ROM, DVD-ROM, or BD-ROM is a read-only disc
● Write-once (R)
o Writing that cannot be erased (CD-R, DVD-R, DVD+R, and BD-R)
▪ CD-RW allows to write and erase the file to create a new one
● DVD-RW versions are like the CD-RW versions
● The DVD-RAM discs are like DVD-RW but have a different type of form factor
● Blu-ray Disc (BD-RE)
o Has write-many type of disc called erasable disc
o BD-RE is like CD-RW or DVD-RW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

o The optical drive speeds are measured using the X-rating

A

CD (1X = 150 KB/s)
● 1X = Music
● 2X/44X/16X/24X =Data
● 52X drive is 150 KB/s multiplied by 52 (7800 KB/s or 7.6 MB/s)
▪ DVD (1X = 1.385 MB/s)
▪ Blu-ray (1X = 4.5 MB/s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

o Virtualization

A

▪ Host computer installed with a hypervisor that can be used to install and
manage multiple guest operating systems or virtual machines (VMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

● Type I Hypervisor (Bare Metal)

A

o Runs directly on the host hardware and functions as the
operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

● Type II Hypervisor

A

o Runs within the normal operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

▪ Ensure that each virtual machine runs its own copy of an operating
system

A

● Server-based (Terminal services)
o Server-based solution that runs the application on servers
in a centralized location
● Client-based (Application streaming)
o Client-based solution that allows an application to be
packaged up and streamed directly to a user’s PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

o Containerization

A

▪ Type of virtualization applied by a host operating system to provision an
isolated execution environment for an application
● Docker
● Parallels Virtuozzo
● OpenVZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q
  1. When a physical server crashes,
A

all the organizations hosted on that same server
are affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q
  1. An organization’s failure to secure the virtual environments hosted on a shared
    server poses a security risk for the other organizations
A

▪ Set up virtual servers in the cloud with proper failover, redundancy, and
elasticity
▪ Hosting all VMs on the same type of hypervisor can also be exploited
● Proper configurations
● Patched and up-to-date hypervisor
● Tight access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

o Hypervisor

A

▪ Manages the distribution of the physical resources of a server to the VMs
● Type I
o Bare metal
● Type II
o Hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

o Container-Based Virtualization (Containerization)

A

▪ Each container relies on a common host OS as the base for each
container
▪ Container-based virtualization has less resources because it doesn’t
require its own copy of the OS for individual container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

Hyperconverged Infrastructure

A

▪ Allows for the full integration of the storage, network, and servers
without hardware changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

o Application Virtualization

A

▪ Encapsulates computer programs from the underlying OS on which they
are executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

o Virtual Desktop Infrastructure (VDI)

A

▪ Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

o Sandbox

A

▪ An isolated environment for analyzing pieces of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

o Cross-Platform Virtualization

A

▪ Allows for the testing and running of software applications for different
operating systems
● Emulation
o System imitation
● Virtualization
o New “physical” machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

o Second Level Address Translation (SLAT)

A

▪ Improves the performance of virtual memory when running multiple
virtual machines on a single physical host
● Intel
o Extended Page Table (EPT)
● AMD
o Rapid Virtualization Indexing (RVI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

▪ x86

A

● 32-bit processor
● 32-bit operating system can only access 4GB of RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

▪ x64

A

● 16 exabytes of RAM
● 32-bit processor cannot run a 64-bit application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

o ARM

A

▪ Reduced instruction set and computer architecture in a computer
processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

o System Memory

A

▪ Amount of physical memory installed on a physical server
▪ Barebones Windows installation takes 20-50 gigabytes of space
▪ Linux installation takes 4-8 gigabytes of space
▪ Mac environment takes 20-40 gigabytes of space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

o NIC teaming configuration allows multiple cards for higher speeds

A

▪ CPU, processor, and capabilities
▪ System memory
▪ Networking
▪ Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

VM Escape

A

▪ Threat attempts to get out of an isolated VM and send commands to the
underlying hypervisor
▪ VM escape is easier to perform on a Type II hypervisor than a Type I
hypervisor
● Patched
● Up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

o VM Hopping

A

▪ Threat attempts to move from one VM to another on the same host
● VM Hopping
o VM to VM
● VM Escape
o VM to hypervisor or host OS
▪ Up to date
▪ Patched
▪ Securely configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

o Sandbox

A

▪ Separates running processes and programs to mitigate system failures or
software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

o Sandbox Escape

A

▪ Occurs when an attacker circumvents sandbox protections to gain access
to the protected OS or other privileged processes
o Patched
o Up to date
o Strong endpoint software protection
o Limited extensions or add-ons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

o Live Migration

A

▪ Migrates the virtual machine from one host to another while it is running
▪ Ensure that live migration only occurs on a trusted network or utilizes
encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

o Data Remnants

A

▪ Leftover pieces of data that may exist in the hard drive which are no
longer needed
● Encrypt virtual machine storage location
● Destroy encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

o VM Sprawl

A

▪ Uncontrolled deployment of virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

o Cloud Computing

A

▪ The practice of using a network of remote servers hosted on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

High Availability

A

▪ Services experience very little downtime when using the cloud
▪ Availability is the percentage of uptime versus downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

o Scalability

A

▪ Ability to increase the number of items in a system at a linear rate or less
than a linear rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

o Vertical Scaling (Scaling Up)

A

▪ Increasing the power of the existing resources in the working
environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

o Horizontal Scaling (Scaling Out)

A

▪ Adding additional resources to help handle the extra load being
experienced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

o Rapid Elasticity

A

▪ The ability to quickly scale up or down
● Elasticity is the system’s ability to handle changes to demand in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

o Metered Utilization

A

▪ Being charged for a service on a pay per use basis
The benefit of using the cloud is that most things are done on a metered
basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

o Measured Services

A

▪ Charging is based upon the actual usage of the service being consumed
▪ Measured services are charged based on the actual usage of the service
being consumed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

o Shared Resources

A

▪ The ability to minimize the costs by putting VMs on other servers
▪ Shared resources is pooling together all the hardware to make a cloud
provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

o File Synchronization

A

▪ The ability to store data that can spread to other places depending on the
configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

o Public Cloud

A

▪ Systems and users interact with devices on public networks, such as the
Internet and other clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

Private Cloud

A

▪ Systems and users that only have access with other devices inside the
same private cloud or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

o Hybrid Cloud

A

▪ Combination of private and public clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

Community Cloud

A

▪ Collaborative effort where infrastructure is shared between several
organizations from a specific community with common concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

Multitenancy

A

▪ The ability for customers to share computing resources in a public or
private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

o Single-Tenancy

A

▪ Assigns a particular resource to a single organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

On-Premise Solution

A

▪ The need to procure hardware, software, and personnel necessary to run
the organization’s cloud
▪ On-premise solution allows the ability to control all the physical and
logical access to servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

o Hosted Solution

A

▪ Third-party service provider that provides all the hardware and facilities
needed to maintain a cloud solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

● Virtual Desktop Infrastructure (VDI)

A

Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

o Server

A

▪ Performs all the application processing and data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

o Centralized Model

A

▪ Hosts all the desktop instances on a single server or server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

o Hosted Model/ Desktop as a Service (DAAS)

A

▪ Maintained by a service provider and provided to the end user as a
service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

o Remote Virtual Desktop Model

A

▪ Copies the desktop image to a local machine prior to being used by the
end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

o Cloud Storage Application

A

▪ Amount of space on a cloud-based server as file storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

o File Synchronization

A

▪ The ability to synchronize from different devices using a single account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

o Content Delivery Network (CDN)

A

▪ Network of servers that locates the nearest server to minimize delay or
download time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

o Software-Defined Networking (SDN)

A

▪ Enables the network to be intelligently and centrally controlled, or
programmed, using software applications
● Can be changed automatically by the network itself using automation and orchestration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

o Application Layer

A

▪ Focuses on the communication resource requests or information about
the network as a whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

o Control Layer

A

▪ Uses the information from the applications and decides how to route a
data packet on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

o Infrastructure Layer

A

▪ Contains the network devices that receive information about where to
move the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

Management Plane

A

▪ Used to monitor traffic conditions and the status of the network
● Provides a layer of abstraction between the devices and the control and data flow that happen on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

o Network Interface Card (NIC)

A

▪ Provides an ethernet connection to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

o Hub

A

▪ Has several different ports between 4 and 48 ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

o Switches

A

▪ Smart hubs that remember the ports that are connected to them
● Switches can have multiple people talking at one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

o Unmanaged Switch

A

▪ Performs its functions without requiring a configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

Managed Switch

A

▪ Performs its functions with configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

o Wireless Access Point

A

▪ Device that allows wireless devices to connect to a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

o Router

A

▪ Used to connect different networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

o Firewall

A

▪ Scans and blocks traffic that enters or leaves a network
● Unified threat management (UTM) contains firewall features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

o Patch Panel

A

▪ Device that allows cable network jacks from a wall into a central area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

Power Over Ethernet (PoE)

A

▪ Supplies electrical power from a switch port over an ordinary data cable
to a power device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

o Power Injector

A

▪ Plugs into a wall outlet to get power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

o Cable Modem

A

▪ Device that translates coaxial cable signals into radio frequency waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

Digital Subscriber Line (DSL modem)

A

▪ Device that translates coaxial cable signals into phone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

o Optical Network Terminal (ONT)

A

▪ Terminates fiber connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

o Software Defined Networking (SDN)

A

▪ Way of virtualizing the network hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

o Personal Area Network (PAN)

A

▪ Smallest type of wired or wireless network and covers
the least amount of area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

o Local Area Network (LAN)

A

▪ Connects components within a limited distance
● Up to a few hundred feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

o Campus Area Network (CAN)

A

▪ Connects LANs that are building-centric across a university, industrial
park, or business park
● Up to a few miles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

o Metropolitan Area Network (MAN)

A

▪ Connects scattered locations across a city or metro area
● Up to about 25 miles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

Wide Area Network (WAN)

A

▪ Connects geographically disparate internal networks and consists of
leased lines or VPNs
● Worldwide coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

o Wireless Local Area Network (WLAN)

A

▪ A wireless distribution method for two or more devices that creates a
local area network using wireless frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

o Storage Area Network (SAN)

A

▪ Provisions access to configurable pools of storage devices that can be
used by application servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

Small Office, Home Office (SoHo) LAN

A

▪ Uses a centralized server or simply provides clients access to local
devices like printers, file storage, or the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

o Internet of Things

A

▪ A global network of appliances and personal devices that have been
equipped with sensors, software, and network connectivity to report
state and configuration
● Segregation of IoT devices is critically important for the business network’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

o STP and UTP

A

operate about the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

o Keep cable runs under 70 meters

A

from the IDF to the office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

Registered Jack (RJ)

A

▪ Carries voice or data which specifies the standards a device needs to
meet to connect to the phone or data network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

o Bandwidth

A

▪ The theoretical measure of how much data could be transferred from a
source to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

Throughput

A

▪ The actual measure of how much data is successfully transferred from a
source to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

o Ethernet Standard

A

▪ A designation given to a particular category that provides the ability to
understand the bandwidth and the cable type to be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

o Straight-Through Cable (Patch Cable)

A

▪ Contains the exact same pinouts on both ends of the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

o 568b

A

▪ The standard that’s preferred when wiring jacks inside of buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

Crossover Cable

A

▪ The ability to take send and receive pins from one cable and swap those
on the other end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

o MDIX

A

▪ A medium dependent interface crossover (MDIX) is an automated way to
electronically simulate using a crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

o Direct Burial

A

▪ A cable rating that specifies that a cable has a stronger sheathing and
jacket that can withstand more extreme weather conditions
● A plenum rated cable is more fire resistant and it minimizes the amount of dangerous fumes that are released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

o Fiber Optic Cable

A

▪ Uses light from an LED or laser to transmit information through a thin
glass fiber
● Greater usable range
● Greater data capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

o Switches, routers, and end-user devices

A

can become a limitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

o Single Mode Fiber (SMF)

A

▪ Used for longer distances and has smaller core size which allows for only
a single mode of travel for the light signal
● SMF’s core size is 8.3-10µ in diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

o Multimode Fiber (MMF)

A

▪ Used for shorter distances and has larger core size which allows for
multiple modes of travel for the light signal
● MMF’s core size is 50-100µ in diameter
● Up to 2 kilometers or less

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

o Coaxial Cable (Coax)

A

▪ One of the oldest categories of copper media that is still used in
networking today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

o Twinaxial Cable

A

▪ Like coaxial cable but uses two inner conductors to carry the data instead
of just one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

o Snip/Cutter

A

▪ Used to cut a piece of cable off a larger spool or run of cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

Cable Stripper

A

▪ Used to strip off the end of the cable and prepare it for attachment to a
connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

Cable Crimper

A

▪ Used to attach the connector to the end of the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

o Wire Mapping Tool

A

▪ Works like a cable tester, but specifically for twisted pair ethernet cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

Cable Certifier

A

▪ Used to determine a cable’s category or data throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

o Punch-Down Block

A

▪ Terminates the wires and strips off excess installation and extra wires
that are no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

o Tone Generator/Toner Probe

A

▪ Used to generate a tone on one end of the connection and use the probe
to audibly detect the wire connected on the other side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

Loopback Adapter/Device

A

▪ Facilitates the testing of simple networking issues

318
Q

o Tap

A

▪ Connects directly to the cable infrastructure and splits or copies those
packets for analysis, security, or general network management

319
Q

o Wireless Analyzer

A

▪ Ensures proper coverage and prevents overlap between wireless access
point coverage zones and channels

320
Q

o Direct-Sequence Spread Spectrum (DSSS)

A

▪ Modulates data over an entire range of frequencies using a series of
signals known as chips

321
Q

Frequency-Hopping Spread Spectrum (FHSS)

A

▪ Allows devices to hop between predetermined frequencies

322
Q

o Orthogonal Frequency Division Multiplexing (OFDM)

A

▪ Uses a slow modulation rate with simultaneous transmissions over 52
different data streams

323
Q

o Each band has specific frequencies/channels

A

to avoid overlapping with other
signals

324
Q

o Channel

A

▪ A virtual medium through which wireless networks can send and receive
data
● For the 2.4 GHz spectrum, there can be 11 or 14 channels
● Channels 1, 6, and 11 avoid overlapping frequencies in the 2.4
GHz band
● We can use 5.725-5.875 GHz to run our wireless networks in the 5
GHz band
● There are 24 non-overlapping channels in the 5 GHz band

325
Q

o Channel Bonding

A

▪ Allows for the creation of a wider channel by merging neighboring
channels into one
● The standard channel size for both 2.4 GHz and 5 GHz networks is
20 MHz

326
Q

o Multiple-Input and Multiple-Output (MIMO)

A

▪ Uses multiple antennas to send and receive data than it could with a
single antenna

327
Q

Multiple User Multiple Input Multiple Output (MU-MIMO)

A

▪ Allows multiple users to access the wireless network and access point at
the same time

328
Q

o Radio Frequency Interference (RFI)

A

▪ Occurs when there are similar frequencies to wireless networks in the
area

329
Q

o As signal decreases in strength or interference increases,

A

the signal-to-noise ratio
worsens

330
Q

o Pre-Shared Key

A

▪ Both the access point and the client use the same encryption key
▪ It’s not a good idea to use pre-shared keys in large environments

331
Q

o Wired Equivalent Privacy (WEP)

A

▪ Original 802.11 wireless security standard which is an insecure security
protocol
▪ WEP uses 24-bit Initialization Vector (IV) sent in clear text

332
Q

Wi-Fi Protected Access (WPA)

A

▪ Replaced WEP and follows the Temporal Key Integrity Protocol (TKIP)
▪ WPA uses 48-bit Initialization Vector (IV) instead of 24-bit
● Rivest Cipher 4 (RC4)
o For encryption
● Message Integrity Check (MIC)
o To confirm data was not modified in transit
● Enterprise Mode
o To authenticate users before exchanging keys

333
Q

o Wi-Fi Protected Access 2 (WPA2)

A

▪ Created as part of IEEE 802.11i standard and requires stronger encryption
and integrity checking through CCMP
● Advanced Encryption Standard (AES)
o To provide additional security by using a 128-bit key or higher
● Personal Mode
o Pre-shared key
● Enterprise Mode
o Centralized authentication

334
Q

o MAC Address Filtering

A

▪ Configures an access point with a listing of permitted MAC addresses (like
an ACL)

335
Q

o Disabling SSID Broadcast

A

Configures an access point not to broadcast the name of the wireless LAN

336
Q

Wi-Fi (802.11)

A

▪ Creates point to point connections from one building to another over a
relatively short distance

337
Q

o Cellular

A

▪ Uses a larger antenna and a larger hotspot powered by a power outlet
within an office or home

338
Q

o Microwave

A

▪ Creates point to point connection between two or more buildings that
have longer distances
▪ A traditional microwave link can cover about 40 miles of distance

339
Q

o Satellite

A

▪ A long range and fixed wireless solution that can go for miles
● Low Earth Orbit
o Requires more satellites to cover the entire planet but gives lower latency speeds
● Geosynchronous Orbit
o One satellite can cover a large portion of the Earth
o Geosynchronous orbit gives higher latency and lower
quality

340
Q

o Near Field Communication (NFC)

A

▪ Uses radio frequency to send electromagnetic charge containing the
transaction data over a short distance

341
Q

o Radio Frequency dentification (RFID)

A

▪ A form of radio frequency transmission modified for use in authentication
systems

342
Q

o Infrared Data (IrDA)

A

▪ Allows two devices to communicate using line of sight communication
in the infrared spectrum

343
Q

o Bluetooth

A

▪ Creates a personal area network over 2.4 GHz to allow for wireless connectivity
● Bluejacking
o Sending unsolicited messages to a Bluetooth device
● Bluesnarfing
o Making unauthorized access to a device via Bluetooth
connection
● BlueBorne
o Allows the attacker to gain complete control over a device without even being connected to the target device

344
Q

o Tethering

A

▪ Sharing cellular data Internet connection from a smartphone to multiple other devices
▪ Only connect to trusted wireless networks

345
Q

o Internet Service Provider (ISP)

A

▪ Establishes high speed links between their network and clients

346
Q

o Plain Old Telephone Service (POTS)

A

▪ Runs as a dial-up connection and is used on the public switched
telephone network (PSTN)
▪ Analog connections can be voice or data converted from ones and zeros
▪ Dial-up modems have a maximum bandwidth of 53.3 kb/s

347
Q

o Legacy System

A

▪ Old system that is still used in some critical functions

348
Q

Integrated Services Digital Network (ISDN)

A

▪ Supports multiple 64 Kbps channels
▪ ISDN is an older technology designed to carry voice, video, or data over B
(bearer) channels

349
Q

Asymmetric DSL (ADSL)

A

▪ Has different speeds of download and upload
● Maximum Download Speed
o 8 Mbps
● Maximum Upload Speed
o 1.544 Mbps
▪ ADSL maximizes the download and minimizes the uploads

350
Q

Symmetric DSL (SDSL)

A

▪ Has equal speeds of download and upload

351
Q

Very High Bit-Rate DSL (VDSL)

A

▪ Has high speeds of download and upload
● Download Speed
o 50 Mbps or more
● Upload Speed
o 10 Mbps or more
▪ ADSL Maximum Distance to DSLAM
● 18,000 ft.
▪ VDSL Maximum Distance to DSLAM
● 4,000 ft.

352
Q

o Cable Modems

A

▪ Uses a cable TV network that is made up of a hybrid fiber-coaxial (HFC)
distribution network

353
Q

Data-Over-Cable Service Interface Specifications (DOCSIS)

A

▪ Specific frequency ranges used for upstream and downstream
transmissions
● Upstream
o 5 MHz to 42 MHz
● Downstream
o 50 MHz to 860 MHz

354
Q

o Cable modems transmit and receive

A

over cable television infrastructure

355
Q

o Fiber To The Curb (FTTC)

A

▪ Runs a fiber optic cable from an internet provider access point to a curb

356
Q

Fiber To The Premises (FTTP)

A

▪ Fiber optic that connects directly to a building and connects to an optical
network terminal (ONT)

357
Q

o Optical Network Terminal (ONT)

A

▪ Physical devices that convert optical signals to electrical signals

358
Q

o The G refers to the generation of cellular technology being used

A

▪ SMS and text messaging
▪ International roaming
▪ Conference calling
▪ Use of internet
▪ Introduction to EDGE

359
Q

o Wideband Code Division Multiple Access (WCDMA)

A

▪ Used by the UMTS standard and could reach data speeds of up to 2 Mbps

360
Q

o High Speed Packet Access (HSPA)

A

▪ Reaches speeds of up to 14.4 Mbps and is sometimes referred to as 3.5G

361
Q

High Speed Packet Access Evolution (HSPA+)

A

▪ Reaches speeds of up to 50 Mbps and is sometimes referred to as 3.75G

362
Q

4G Long-term Evolution (4G LTE)

A

▪ 100 Mbps

363
Q

LTE Advanced (LTE-A)

A

▪ 1 Gbps

364
Q

Frequencies are operated

A

in the millimeter wave band

365
Q

o The higher the G,

A

the newer standard, it has increased in speeds

366
Q

o Microwave

A

▪ Uses a beam of radio waves in the microwave frequency range to
transmit information between two fixed locations
● Ultra-high frequency (UHF)
● Super high frequency (SHF)
● Extremely high frequency (EHF)
▪ Both antennas must maintain a line of sight

367
Q

o Satellite

A

▪ A method of using communication satellites located in space to connect a
user to the Internet
● Slow
● Expensive
● High latency

368
Q

o Link/Network Interface Layer

A

▪ Responsible for putting frames in the physical network’s transmission
media
▪ In the link/network interface layer, the data can only travel through the
local area network

369
Q

Internet Layer

A

▪ Used to address packets and route them across the network

370
Q

o Transport Layer

A

▪ Shows how to send the packets
● TCP
o Transmission Control Protocol
● UDP
o User Datagram Protocol

371
Q

o Application Layer

A

▪ Contains all the protocols that perform higher-level functions

372
Q

Multicast Address

A

▪ A logical identifier for a group of hosts in a computer network

373
Q

o Classful Mask

A

▪ Default subnet mask for a given class of IP addresses

374
Q

o Classless Inter-Domain Routing (CIDR)

A

▪ Allows for borrowing some of the host bits and reassigning them to the
network portion

375
Q

Public (Routable)

A

Can be accessed over the Internet and is assigned to the network by an
Internet service provider

376
Q

o Private (Non-Routable)

A

▪ Can be used by anyone any time, but only within their own local area
network
▪ Private IP ranges include those that start with either 10, 172, or 192

377
Q

o Network Address Translation (NAT)

A

allows for routing of private IPs through a
public IP

378
Q

o Loopback Address (127.0.0.1)

A

▪ Creates a loopback to the host and is often used in troubleshooting and
testing network protocols on a system

379
Q

o Automatic Private IP Addresses (APIPA)

A

▪ Used when a device does not have a static IP address or cannot reach a
DHCP server
● 169.254.0.0 to 169.254.255.255
D iscover
O ffer
R equest
A cknowledge

380
Q

o Static Assignment

A

▪ Manually type the IP address for the host, its subnet mask, default
gateway, and DNS server
▪ Static assignment of IP addresses is impractical on large enterprise
networks

381
Q

o Dynamic Assignment

A

▪ Dynamic allocation of IP addresses

382
Q

o Domain Name System (DNS)

A

▪ Converts the domain names used by a website to the IP address of its
server
▪ DNS is the internet version of a phone book

383
Q

o Windows Internet Name Service (WINS)

A

▪ Identifies NetBIOS systems on a TCP/IP network and converts those
NetBIOS names to IP addresses

384
Q

o Bootstrap Protocol (BOOTP)

A

▪ Dynamically assigns IP addresses and allows a workstation to load a copy
of boot image to the network

385
Q

Dynamic Host Control Protocol (DHCP)

A

▪ Assigns an IP based on an assignable scope or addresses and provides the
ability to configure other options
▪ 192.168.1.100 through 192.168.1.200
● Each IP is leased for a period of time and returns to the pool when the lease expires

386
Q

IP Address Management

A

▪ Manages the IPs being assigned and returned over time

387
Q

o DHCP is the modern

A

implementation of BOOTP

388
Q

o Automatic Private IP Addressing (APIPA)

A

▪ Used when a device does not have a static IP address or cannot reach a
DHCP server
▪ Allows for the quick configuration of a LAN without the need for a DHCP
server
▪ APIPA-assigned devices cannot communicate outside the LAN
or with non-APIPA devices

389
Q

o Zero Configuration (ZeroConf)

A

▪ New technology that provides the same features as APIPA
▪ Assign an IPv4 link-local address to a client
▪ Resolve computer names to IP addresses without the need for DNS by
using mDNS (multicast domain name service)
▪ Perform service discovery on a network
● Windows
o Link-Local Multicast Name Resolution (LLMNR)
● Linux
o SystemD

390
Q

o Dynamic Host Configuration Protocol (DHCP)

A

▪ Provides an IP address to every machine on the network and eliminates
configuration errors

391
Q

o Scope

A

▪ List of valid IP addresses available for assignment or lease to a client
computer or endpoint device on a given subnet
▪ 254 available Ips

392
Q

o DHCP Reservation

A

▪ Excludes some IP addresses from being handed to devices unless they
meet a certain condition
Discover
Offer
Request
Acknowledge

393
Q

IP addresses can

A

also be statically assigned

394
Q

o Domain Name System (DNS)

A

▪ Helps network clients find a website using human-readable hostnames
instead of numeric IP addresses

395
Q

o Fully Qualified Domain Name (FQDN)

A

▪ Domain name under a top-level provider

396
Q

Uniform Resource Locator (URL)

A

▪ Contains the FQDN with the method of accessing information

397
Q

o CNAME records can only be used

A

to point to another domain or subdomain, not
to an IP address

398
Q

o Sender Policy Framework (SPF)

A

▪ DNS record that identifies the host authorized to send mail for the
domain

399
Q

o DomainKeys Identified Mail (DKIM)

A

▪ provides the cryptographic authentication mechanism for mail using a
public key published as a DNS record

400
Q

o Domain-based Message Authentication, Reporting & Conformance (DMARC)

A

▪ Framework that is used for proper application of SPF and DKIM, utilizing a
policy that’s published as a DNS record

401
Q

o Nameserver

A

▪ Type of DNS server that stores all the DNS records for a given domain

402
Q

o Internal DNS

A

▪ Allows cloud instances on the same network access each other using
internal DNS names

403
Q

External DNS

A

▪ Records created around the domain names from a central authority and
used on the public Internet

404
Q

o Time to Live (TTL)

A

▪ Tells the DNS resolver how long to cache a query before requesting a new
one

405
Q

o DNS Resolver/DNS Cache

A

▪ Makes a local copy of every DNS entry it resolves as connected to
websites

406
Q

o Recursive Lookup

A

▪ DNA server communicates with several other DNS servers to hunt down
the IP address and return to the client

407
Q

Iterative Lookup

A

▪ Each DNS server responds directly to the client with an address for
another DNS server that may have the correct IP address

408
Q

o Virtual Local Area Network (VLAN)

A

▪ Allows different logical networks to share the same physical hardware
and provides added security and efficiency

409
Q

4-byte Identifier

A

▪ Tag Protocol Identifier (TPI)
▪ Tag Control Identifier (TCI)

410
Q

o Virtual Private Network (VPN)

A

▪ Extends a private network across a public network and enables sending
and receiving data across shared or public networks

411
Q

Full Tunnel VPN

A

▪ Routes and encrypts all network requests through the VPN connection
back to the headquarters

412
Q

o Split Tunnel VPN

A

▪ Routes and encrypts only the traffic bound for the headquarters over the
VPN, and sends the rest of the traffic to the regular Internet

413
Q

Clientless VPN

A

▪ Creates a secure remote-access VPN tunnel using a web browser without
requiring a software or hardware client

414
Q

o Secure Socket Layer (SSL)

A

▪ Provides cryptography and reliability using the upper layers of the OSI
model (Layers 5, 6, and 7)

415
Q

Transport Layer Security (TLS)

A

▪ Provides secure web browsing over HTTPS

416
Q

o IPv4 = 2³²

A

▪ 4.2 billion addresses

417
Q

o Address Exhaustion

A

▪ Running out of network addresses in IPv4
● IPv4 = 2³²
o 4.2 billion addresses
● IPv6 = 2128
o 340 undecillion addresses

418
Q

o IPv5 was an experimental protocol but some of its concepts have been
incorporated into IPv6

A

● Larger address space
● No broadcasts
● No fragmentation
● Can coexist with IPv4
● Simplified header

419
Q

o Dual Stack

A

▪ Simultaneously runs both the IPv4 and IPv6 protocols on the same
network devices

420
Q

Tunneling

A

▪ Allows an existing IPv4 router to carry IPv6 traffic

421
Q

An IPv6 address uses

A

hexadecimal digits and allows the use of shorthand
notation

422
Q

o Unicast Address

A

▪ Used to identify a single interface
● Globally Routed
o Like IPv4’s unicast class A, B, and C addresses
and begins with 2000-3999
● Link-Local/Local Use
o Used like a private IP in IPv4 that can only be used on the
local area network and begins with FE80

423
Q

o Stateless Address Autoconfiguration (SLAAC)

A

▪ Eliminates the need to obtain addresses or other configuration
information from a central server

424
Q

o Multicast Address

A

▪ Used to identify a set of interfaces and begins with FF

425
Q

o Anycast Address

A

▪ Used to identify a set of interfaces so that a packet can be sent to any
member of a set

426
Q

Extended Unique Identifier (EUI)

A

▪ Allows a host to assign itself a unique 64-bit IPv6 interface identifier
called EUI-64

427
Q

o DHCPv6 Protocol

A

▪ Allows DHCP to automatically assign addresses from a DHCPv6 server

428
Q

Neighbor Discovery Protocol (NDP)

A

Used to determine the Layer 2 addresses that are on a given network

429
Q

o Port

A

▪ Logical communication endpoint that exists on a computer or server

430
Q

o Inbound Port

A

Logical communication opening on a server that is listening for a
connection from a client

431
Q

Outbound Port

A

▪ Logical communication opening created on a client to call out to a server
that is listening for a connection

432
Q

Ports can be any number between

A

0 and 65,535

433
Q

o Well-Known Ports

A

▪ Ports 0 to 1023 are considered well-known and are assigned by the
Internet Assigned Numbers Authority (IANA)

434
Q

o Registered Ports

A

▪ Ports 1024 to 49151 are considered registered and are usually assigned
to proprietary protocols

435
Q

▪ Ports 49152 to 65535 can be used

A

by any application without being
registered with IANA

436
Q

▪ Dynamic or Private Ports are commonly used

A

for gaming, instant
messaging, and chat

437
Q

● File Transfer Protocol (FTP)

A

o Ports 20, 21
o Provides insecure file transfers

438
Q

● Secure Shell (SSH)

A

o Port 22
o Provides secure remote control of another machine using
a text-based environment

439
Q

● Secure File Transfer Protocol (SFTP)

A

o Port 22
o Provides secure file transfers

440
Q

● Telnet

A

o Port 23
o Provides insecure remote control of another machine
using a text-based environment

441
Q

● Simple Mail Transfer Protocol (SMTP)

A

o Port 25
o Provides the ability to send emails over the network

442
Q

● Domain Name Service (DNS)

A

o Port 53
o Converts domain names to IP addresses, and IP address
to domain names

443
Q

● Dynamic Host Control Protocol (DHCP)

A

o Ports 67, 68
o Automatically provides network parameters such as
assigned IP address, subnet mask, default gateway, and
the DNS server

444
Q

● Hypertext Transfer Protocol (HTTP)

A

o Port 80
o Used for insecure web browsing

445
Q

● Post Office Protocol Version Three (POP3)

A

o Port 110
o Used for receiving incoming emails

446
Q

● Network Basic Input/Output System (NetBIOS)

A

o Ports 137, 139
o Used for file or printer sharing in a Windows network

447
Q

● Internet Mail Application Protocol (IMAP)

A

o Port 143
o A newer method of retrieving incoming emails which
improves upon the older POP3

448
Q

● Simple Network Management Protocol (SNMP)

A

o Ports 161, 162
o Used to collect data about network devices and monitor
their status

449
Q

● Lightweight Directory Access Protocol (LDAP)

A

o Port 389
o Used to provide directory services to your network

450
Q

● Hypertext Transfer Protocol – Secure (HTTPS)

A

o Port 443
o Used as a secure and encrypted version of web browsing
▪ SSL (Secure Socket Layer)
▪ TLS (Transport Layer Security)

451
Q

● Server Message Block (SMB)

A

o Port 445
o Used for Windows file and printer sharing services

452
Q

● Remote Desktop Protocol (RDP)

A

o Port 3389
o Provides graphical remote control of another client or
server
o RDP provides a full graphical user interface

453
Q

o Transmission Control Protocol (TCP)

A

▪ Connection-oriented protocol, which means it’s a reliable way to
transport segments across the network

454
Q

o User Datagram Protocol (UDP)

A

▪ Unreliable and it transmits segments called data grams
● TCP (Connection-Oriented)
o SSH, HTTP or HTTPS
● UDP (Connectionless)
o Audio, video streaming, DHCP, and TFTP
▪ Dynamic Host Control Protocol (DHCP)
● Ports 67, 68
● Automatically provides network parameters
such as assigned IP address, subnet mask,
default gateway, and the DNS server
▪ Trivial File Transfer Protocol (TFTP)
● Ports 69
● a connectionless protocol that uses UDP as
its transport

455
Q

o Server

A

▪ Can be configured to allow the clients on the network to access the
network and be able to read and write to its disk (file share)

456
Q

o Print Server

A

▪ Another server that could be a physical workstation or network
infrastructure that provides printing functionality

457
Q

o Windows-based file and print server

A

▪ Relies on the NetBIOS protocol or SMB
● Network Basic Input/Output System (NetBIOS)
o Ports 137, 139
o Used for file or printer sharing in a Windows network
● Server Message Block (SMB)
o Port 445
o Used for Windows file and printer sharing services

458
Q

o Samba

A

▪ Provides the ability for a Linux or Unix server to be able to host files or
printers that can then be used by Windows clients running the SMB
protocol

459
Q

Linux or Unix-based file and print server

A

▪ Supports windows machines known as Samba
● File Transfer Protocol (FTP)
o Ports 20, 21
▪ Provides insecure file transfers
o IP-based File and Print Server / Cloud Printing
▪ Allows for printing anywhere in the world

460
Q

o Web Servers

A

▪ Any server that provides access to a website
● HTTP
o Port 80
● HTTPS
o Port 443

461
Q

o Internet Information Services (IIS)

A

▪ Extensible web server software, created by Microsoft (HTTP, HTTP/2, and
HTTPS)

462
Q

o Apache

A

▪ Most popular way to run a web server these days

463
Q

o NGINX

A

▪ Reverse proxy, load balancer, mail proxy, and HTTP cache

464
Q

o Uniform Resource Locator (URL)

A

▪ Combines the fully qualified domain name with a protocol at the
beginning

465
Q

o When a web browser connects to a server,

A

it will be able to see a digital
certificate to create a random code

466
Q

o Email Server

A

▪ Servers that are set up to compose a message and send it to another user

467
Q

● Simple Mail Transfer Protocol (SMTP)

A

o Specifies how emails should be delivered from one mail
domain to another
o Send mail transfer protocol
o SMTP operates over port 25

468
Q

● Post Office Protocol 3 (POP3)

A

o Older email protocol which operates over port 110

469
Q

● Post Office Protocol 3 (POP3)

A

Older email protocol which operates over port 110

470
Q

● Internet Message Access Protocol (IMAP)

A

o Mail retrieval protocol
o IMAP operates over port 143 and can connect to a server
and receive and read messages

471
Q

● Microsoft Exchange

A

o Mailbox server environment designed for Windows-based
domain environments
o Microsoft Exchange Server is widely used in many
corporate environments

472
Q

o 802.1x

A

▪ Standardized framework used for port-based authentication on wired
and wireless networks

473
Q

o Authentication

A

▪ Occurs when a person’s identity is established with proof and is
confirmed by the system
● Something you know
● Something you are
● Something you have
● Something you do
● Somewhere you are

474
Q

Lightweight Directory Access Protocol (LDAP)

A

A database used to centralize information about clients and objects on
the network

475
Q

o Active Directory (AD)

A

Used to organize and manage the network, including clients, servers,
devices, users, and groups

476
Q

o Remote Authentication Dial-In User Service (RADIUS)

A

▪ Provides centralized administration of dial-up, VPN, and wireless
authentication services for 802.1x and the EAP
● RADIUS operates at the application layer
● RADIUS utilizes UDP for making connections

477
Q

o Terminal Access Controller Access-Control System Plus (TACACS+)

A

▪ Proprietary version of RADIUS that can perform the role of an
authenticator in 802.1x networks

478
Q

o Authorization

A

▪ Occurs when a user is given access to a certain piece of data or certain
areas of a building

479
Q

o Kerberos

A

▪ Authentication protocol used by Windows to provide for two-way
(mutual) authentication using a system of tickets
▪ A domain controller can be a single point of failure for Kerberos

480
Q

o Accounting

A

▪ Ensures the tracking of data, computer usage, and network resources is
maintained

481
Q

Non-repudiation

A

▪ Occurs when you have proof that someone has taken an action

482
Q

o Telnet Port 23

A

▪ Sends text-based commands to remote devices and is a very old
networking protocol
▪ Telnet should never be used to connect to secure devices

483
Q

o Secure Shell (SSH) Port 22

A

▪ Encrypts everything that is being sent and received between the
client and the server

484
Q

Remote Desktop Protocol (RDP) Port 3389

A

▪ Provides graphical interface to connect to another computer over a
network connection
▪ Remote desktop gateway (RDG) creates a secure connection to tunnel
into the RDP

485
Q

o Virtual Network Computing (VNC) Port 5900

A

▪ Designed for thin client architectures

486
Q

o Terminal Emulator (TTY)

A

▪ Any kind of software that replicates the TTY I/O functionality to remotely
connect to a device
▪ TTY is the terminal or end point of the communication between the
computer and the end-user

487
Q

o Syslog

A

▪ Enables different appliances and software applications to transmit logs to
a centralized server
▪ Syslog is the de facto standard for logging events
● PRI code (Priority code)
● Header
● Message

488
Q

o Simple Network Management Protocol (SNMP)

A

▪ TCP/IP protocol that aids in monitoring network-attached devices and
computers

489
Q

o Managed Devices

A

▪ Computers and other network-attached devices monitored using agents
by a network management system

490
Q

o Agents

A

▪ Software that is loaded on a managed device to redirect information to
the network management system

491
Q

o Network Management System (NMS)

A

▪ Software running on one or more servers to control the monitoring of
network-attached devices and computers

492
Q

o Management should be conducted on

A

an out-of-band network to increase
security

493
Q

o Proxy Server

A

▪ Devices that create a network connection between an end user’s client
machine and a remote resource (web server)
● Increased network speed and efficiency
● Increased security
● Additional auditing capabilities

494
Q

o Load Balancer/ Content Switch

A

▪ Distributes incoming requests across several servers inside a server farm
or a cloud infrastructure
▪ A load balancer is one of the key things to help defend against a DoS
attack or a DDoS attack

495
Q

● Denial of Service (DoS)

A

o Involves a continual flooding of victim systems with
requests for services, causing the system to crash (single
attacker)

496
Q

● Distributed Denial of Service (DDoS)

A

Multiple machines simultaneously launch attacks on the
server to force it offline (multiple attackers)

497
Q

● Blackholing/Sinkholing

A

Identifies any attacking IP addresses and routes their
traffic through a Knoll interface

498
Q

● Intrusion Prevention System (IPS)

A

o Works for small-scale attacks against DoS

499
Q

● Elastic Cloud

A

o Allows to scale up the demand as needed

500
Q

Access Control List (ACL)

A

▪ Rule sets placed on the firewalls, routers, and other network devices that
permit or allow traffic through a particular interface
▪ The actions are performed top-down inside of an ACL
● Top
o Specific rules
● Bottom
o Generic rules

501
Q

o Firewall

A

Inspects and controls the traffic that is trying to enter or leave a
network’s boundary
● Packet-filtering
● Stateful
● Proxy
● Dynamic packet-filtering
● Kernel proxy

502
Q

o Unified Threat Management (UTM)

A

▪ Provides the ability to conduct security functions within a single device or
network appliance

503
Q

Information Technology (IT)

A

▪ Includes computers, servers, networks, and cloud platforms

504
Q

Operational Technology (OT)

A

▪ Communications network designed to implement an ICS
▪ Technology that interacts with the real world

505
Q

o Industrial Control System (ICS)

A

▪ Provides the mechanisms for workflow and process automation by
controlling machinery using embedded devices
▪ Multiple ICSs can create a distributed control system (DCS)

506
Q

o Fieldbus

A

▪ Digital serial data communication protocol used in OT networks
to link different PLCs

507
Q

Programmable Logic Controller (PLC)

A

▪ Type of digital computer used in industrial settings that enables
automation and assembly lines, autonomous field operations, robotics,
and other applications

508
Q

Human-Machine Interface (HMI)

A

▪ Can be a local control panel or software that runs on a computer

509
Q

Supervisory Control and Data Acquisition (SCADA)

A

▪ Type of ICS used to manage large scale multi-site devices and equipment
in a geographic region from a host computer
● Cellular
● Microwave
● Satellite
● Fiber
● VPN-based LAN

510
Q

o Embedded Systems

A

▪ Computer system that is designed to perform specific and dedicated
functions
▪ These systems are considered static environments, where frequent
changes are not allowed

511
Q

o Programmable Logic Controller (PLC)

A

▪ Type of digital computer used in industrial or outdoor settings
▪ The PLC patch is every six months or two years

512
Q

o Real-time Operating System (RTOS)

A

▪ Type of OS that prioritizes deterministic execution of operations that
ensure consistent response for time-critical tasks
▪ Embedded systems in critical applications

513
Q

o System-on-a-Chip

A

▪ Processor integrates the platform functionality of multiple logical
controllers onto a single chip
● Processor
● Memory
● Storage
● Graphics processor
● Peripherals

514
Q

o Legacy System

A

▪ Computer system that is no longer supported by its vendor and no longer
provided with security updates and patches
▪ Identify legacy systems and put mitigations in place to keep operating
such systems

515
Q

o Proprietary System

A

▪ System that is owned by its developer or vendor

516
Q

Mobile Device

A

▪ Any device that makes it portable and easy to use

517
Q

o Capacitive Touch Screen

A

Any touchscreen that works by seeing the distortion in an electrostatic
field
▪ A single tactile input is one touch at a time

518
Q

o Multi-Touch Screen

A

▪ Can process two or more contact points simultaneously

519
Q

o Liquid-Crystal Display (LCD)

A

▪ Uses liquid crystal where the properties can change with the application
of voltage

520
Q

o Pixel (Picture Element)

A

▪ Individual point on a screen inside of a display
▪ A thin-film transistor (TFT) is referred to as an LCD panel

521
Q

o Twisted Nematic (TN)

A

▪ Contains crystals that twist or untwist in response to the voltage being
applied or removed
▪ TN supports fast response time in comparison to other TFT technologies
and displays

522
Q

o In-Plane Switching (IPS)

A

▪ Uses crystals that rotate to be able to deliver color
▪ IPS panels can support 178° horizontal and vertical viewing angles

523
Q

o Vertical Alignment (VA)

A

▪ Crystals are tilted to be able to deliver color
▪ A VA display has a contrast ratio of two to three times better than a
standard IPS display

524
Q

o Cold Cathode Fluorescent Lamp (CCFL)

A

▪ Lamp that sits behind the display and lights up the liquid crystal display to
show the colors and images properly on the screen
▪ CCFL requires AC voltage

525
Q

o Light-Emitting Diode (LED)

A

▪ Newer form of light that uses direct current (DC)
▪ The use of LEDs uses less power, leading to longer battery life and better
performance

526
Q

Organic LED (OLED)

A

o Organic LED (OLED)
▪ Each pixel has its own separate LED that provides the light
▪ OLEDs can be made from plastic
▪ OLEDs can be folded, rolled up, or manipulated to create different shapes
and sizes of displays

527
Q

o Digitizer

A

o Digitizer
▪ Layer sandwiched between a layer of protective glass and the display
panel inside of a touchscreen display
▪ Haptic feedback provides a form of touch responsiveness from the
display back to the end-user

528
Q

Accelerometer

A

▪ Combination device that uses hardware and software to measure the
velocity, rotation, and shaking of a mobile device
▪ The accelerometer works when dealing with the X (horizontal) and Y
(vertical) axis

529
Q

o Gyroscope

A

▪ An improved version of the basic accelerometer
● Detects pitch (Y), roll (X), and yaw (Z)
● Performs actions
● Stabilizes images

530
Q

o Track Pad

A

▪ Device that can be used to manipulate the cursor on the screen

531
Q

Drawing Pad

A

▪ Large format touch device attached as a peripheral to a laptop,
smartphone, or tablet
▪ A drawing pad uses a touch pen

532
Q

o Microphone

A

▪ Any device used to record audio or capture voice when making a phone
call

533
Q

o Speaker

A

▪ Allows to hear things that are coming out from devices, such as music or
videos

534
Q

o Headset

A

▪ Combines both the microphone and speaker into one device

535
Q

Digital Camera

A

▪ Provides the ability to capture a live image in a still format

536
Q

o Wi-Fi (Wireless Network)

A

▪ Comes in different types of Wi-Fi, including wireless a, b, g, n, ac, and ax
▪ Wireless connectivity on smaller devices is slower than it is on larger
devices
▪ Larger antennas pick up signals with more strength and faster speeds

537
Q

Cellular

A

▪ Network that allows to connect to the Internet using cellular radio inside
the handset and connect to a network service provider

538
Q

o Global System for Mobile Communication (GSM)

A

▪ Cellular technology that takes the voice during a call and converts it into a
digital format

539
Q

o Code-Division Multiple Access (CDMA)

A

▪ Cellular technology that uses code division to split up the channel
▪ CDMA is a more powerful and flexible technology than GSM
● W-CDMA
o Wideband CDMA
● UMTS
o Universal Mobile Telecommunications System
▪ An electronic SIM is a cheaper way of getting a data service when
overseas

540
Q

o Preferred Roaming List (PRL)

A

▪ Contains all the information about different cellular towers
▪ Restrictions vary from model to model and depends on the device’s
country of origin

541
Q

o Bluetooth

A

▪ Used as a short-range point-to-point network connection between a
mobile device and an accessory

542
Q

o Near-Field Communication (NFC)

A

▪ Allows a device to receive and send information in the NFC format
▪ The pairing process can be done automatically by using NFC connection

543
Q

o Lightning Cable

A

▪ Proprietary cable that is only used by Apple devices

544
Q

o USB-C

A

▪ Modern version of USB that operates at USB 3.0 speeds and can provide
data

545
Q

DB9 Cable

A

▪ D-shaped connector with 9 pins that is used to connect external serial
devices like modems

546
Q

o Universal Asynchronous Receiver-Transmitter (UART)

A

▪ Device that allows to connect to a device and get information from it

547
Q

o Port Replicator

A

▪ Uses the exact same features as a laptop
▪ Port replicator makes life easier by providing easier access to all the ports

548
Q

Docking Station

A

▪ Advanced type of port replicator that provides all the capabilities and
features of a laptop
● Port Replicator
o Port mirror
● Docking Station
o Additional ports

549
Q

Mobile Applications

A

Used to provide different features and functionality to a mobile device

550
Q

o Android

A

▪ Offers an open-source code base

551
Q

o iOS

A

▪ Developed by Apple for use on iPhones and iPads
▪ iOS relies on closed-source code

552
Q

o Open-Source

A

▪ The software and the original source code are available to download,
modify, and redistribute
▪ Android OS has a lower cost of services by using an open-source platform
as a code base

553
Q

o Closed-Source Software

A

▪ Proprietary software that is licensed under the exclusive legal rights of
the copyright holder
● Open-Source Software
o Creativity and change
● Closed-Source Software
o Change is not allowed

554
Q

o App Store

A

▪ Application on an iOS device to access a store to purchase and download
applications
● iOS Application
o Swift and Xcode
● Android Application
o Java and Android Studio

555
Q

o Microsoft 365

A

▪ Provides the ability to have office productivity software and a large
amount of storage space in the cloud (OneDrive)

556
Q

o Mobile Device Synchronization/Sync

A

▪ Act of copying data back and forth between different devices

557
Q

o Contact

A

Record inside of an address book that contains fields of names,
addresses, emails, phone numbers, notes, etc.

558
Q

o vCard

A

▪ Standard format and is widely supported by most address books and
software applications

559
Q

Calendar Information

A

▪ Any record with fields for appointments or tasks with their corresponding
subject, date, location, and attendees
▪ Cloud-based service is easier and more synchronized

560
Q

o POP3

A

▪ Oldest format and does not support the synchronization across devices

561
Q

o IMAP and Exchange can

A

manage the state of an email

562
Q

o When buying an application,

A

consider what apps are supported on which devices

563
Q

o Third-party password managers provide

A

the ability to generate strong, random
passwords when signing up for a new account

564
Q

o Synchronization to the Cloud

A

▪ Provides the access to the cloud from all devices and becomes the central
repository of all data
▪ Encrypted data that is stored in the cloud is relatively safe
▪ Synchronization to the cloud requires a large amount of data

565
Q

o Synchronization to the Computer

A

▪ Synchronizes directly to the desktop or laptop using a USB or Bluetooth
connection
▪ Install the iTunes app on the Windows PC to transfer the data from the
iPhone

566
Q

o Enterprise Mobility Management (EMM)

A

▪ Class of software designed to apply security policies for use on mobile
devices

567
Q

o Mobile Device Management (MDM)

A

▪ Sets device-level policies for authentication, feature use, and conductivity
▪ MDM is a type of software that allows to control the device

568
Q

o Mobile Application Management (MAM)

A

▪ Sets forth policies for apps that can process corporate data and prevent
data transfer to personal apps

569
Q

o Sandbox Solution

A

▪ Configures an enterprise-managed container or workspace where the
company’s data is stored

570
Q

o Data Loss Prevention (DLP)

A

Detects when data is being taken from a device, ensuring it’s only being
used in the proper way

571
Q

o Apple Business Manager (ABM)

A

▪ MAM suite that allows applications from a private repository to devices
that are part of the corporate network

572
Q

o Managed Google Play

A

▪ Managed version of the Google Play store that contains apps that are
distributed to employees’ devices

573
Q

o Knowledge Factor

A

▪ Simplest form of authentication and refers to something you know

574
Q

Possession Factor

A

▪ Refers to something you have

575
Q

o Inherence Factor

A

▪ Refers to something you are

576
Q

Behavior Factor

A

▪ Refers as something you do
▪ Voice recognition systems are not looking at what is said, but at how it is
said

577
Q

Location Factor

A

▪ Refers to somewhere you are

578
Q

Authenticator

A

▪ Application that serves as a possession factor inside of a mobile device

579
Q

o Multi-factor authentication has

A

two or more factors

580
Q

Course Positioning

A

▪ Oldest method of positioning using mobile phones

581
Q

o Global Positioning System (GPS)

A

▪ Space-based radio navigation system, consisting of satellites and
networks of ground stations

582
Q

o Indoor Positioning System (IPS)

A

Allows a device to be used indoors to figure out the location

583
Q

Change the location service

A

as a privacy aspect

584
Q

o Geo-Tracking

A

▪ Tracking of a location for a given amount of time
▪ Disable GPS and IPS to block geo-tracking
▪ Geotagging is the GPS coordinates inside photos

585
Q

o Configure SSL or TLS

A

when connecting to the email servers

586
Q

POP3/IMAP

A

▪ Receiving email/Inbound mail

587
Q

STMP

A

▪ Sending/Outbound mail
▪ Major providers like Gmail, Outlook, or Yahoo use auto configuration
▪ Small or medium-sized businesses use their own institutional email server

588
Q

o Transport Layer Security (TLS)

A

▪ New and advanced secure version of encryption

589
Q

o Biometric Sensor

A

Allows users to create a template of a feature of the laptop’s body
(fingerprint, facial scan, or voice recognition)

590
Q

o Near-Field Communication Scanner (NFC scanner)

A

▪ Used to pair peripheral devices to a smartphone or tablet

591
Q

o Kensington Lock (K-Slot/ Kensington Security Slot)

A

▪ Small port on the side of a laptop that able to connect a metal braided
cable to lock

592
Q

● Replacing the Keyboard

A

o Entire keyboard
o Particular key
o Touch pad
o When replacing the keyboard or touch pad, use one from the manufacturer

593
Q

Check the manufacturer’s

A

instructions before starting the process

594
Q

o During the unboxing, look for extra pieces, cables, documentation, or driver disks

A

▪ Printhead
● Inkjet printer
▪ Drum and toner cartridges
● Laser printer

595
Q

o The hot temperature causes

A

condensation and moisture inside the printer

596
Q

o The location of the printer

A

should be well-ventilated

597
Q

o The location of the printer should be convenient

A

▪ Print queuing system
▪ Print authentication system

598
Q

USB Connection

A

▪ Found in a home environment
▪ Windows has the ability to detect a printer using plug and play

599
Q

o Ethernet Connection

A

▪ Network cable that uses an RJ45 port
▪ A printer with Ethernet capability supports DHCP

600
Q

o Wireless Connection

A

▪ Comes with either Wi-Fi or Bluetooth
● Infrastructure Mode
o Printer is connected to the access point
● Wi-Fi Direct Mode
o Allows the printer to act as an access point

601
Q

o Bluetooth

A

▪ Uses a wireless point-to-point connection from the printer
to the computer

602
Q

Printer

A

▪ Program that controls physical printers

603
Q

o Printer Driver

A

▪ Integrated into a printer
▪ You must have administrative rights to install print drivers

604
Q

Windows 11

A

▪ Start > Settings > Bluetooth & devices > Printers & scanners

605
Q

Windows 10

A

▪ Start > Settings > Devices > Printers & scanners

606
Q

o MacOS

A

▪ Settings > Printers & scanners

607
Q

o Page Description Language (PDL)

A

▪ Used to create a raster file from the print commands that are sent by a
software application

608
Q

o Scalable Font

A

▪ Capable of being resized to any size

609
Q

Vector Graphic

A

▪ Size can be changed before printing
● Bitmap
o Distorted
● Vector
o Clear
● Additive
o Display
● Subtractive
o Printer

610
Q

o Printer Control Language (PCL)

A

▪ Developed by HP and is closely tied to the features of different printer
models

611
Q

o Postscript

A

Created by Adobe and is designed to be a device-independent PDL

612
Q

o XML Paper Specification (XPS)

A

Microsoft’s page description language (PDL)

613
Q

o Portable Document Format (PDF)

A

▪ Created by Adobe which keeps a file’s original look when viewed or
printed on different systems
▪ PDF is larger in size than XPS format files
1. When installing a printer, also install the appropriate driver
2. Two generic formats: PCL and Postscript
3. Virtual printers: XPS and PDF

614
Q

o Print Server

A

▪ Software application or hardware device that manages print requests and
printer queue status information
▪ Centralized print server allows to control, to configure, and to
troubleshoot the devices remotely from a network
▪ Print servers are suitable for small and home offices with up to fifty
servers
▪ Embedded print servers support one printer

615
Q

o Microsoft Management Console (MMC)

A

▪ Allows to share network printers and centralize the print server from the
centralized window server

616
Q

o Printer Share

A

▪ Allows to connect a printer using Bluetooth or USB

617
Q

Print Spooler

A

▪ Service built into the Windows OS and exists to help print jobs

618
Q

User Authentication

A

▪ Sets permissions for the printer that require a log in with a username or
password

619
Q

o Audit Log

A

▪ Record of jobs that have been sent and printed on a particular device

620
Q

o Secured Print

A

▪ Device held on the printer until the user’s authentication

621
Q

Scanning

A

▪ Allows the printer to be used as a copy machine or a scanner

622
Q

o Scanner

A

▪ Digital imaging device

623
Q

o Optical Character Recognition (OCR)

A

▪ Convert scanned text into digital documents that can be manipulated
using a word processing program

624
Q

Laser Printer

A

▪ Creates an entire page at one time during the printing process

625
Q

o Image Drum

A

Main component that creates the image to be applied to the paper

626
Q

Fuser Assembly

A

▪ Heats up and melts the toner onto the page to adhere properly to the
page

627
Q

o Transfer Belt/Roller

A

▪ Used to transfer the image from the image drum and become fused

628
Q

Pickup Roller

A

▪ Used to pick up the paper from the feed tray and feed it through the
system

629
Q

Paper Separation Pad

A

▪ Helps the pickup rollers to ensure they only pick up a single piece of
paper at a time

630
Q

o Duplexing Assembly

A

▪ Moves the paper from the front to the back

631
Q

o A toner cartridge is a

A

a plastic housing that contains toner powder

632
Q

o The drums

A

last longer than the toner

633
Q

Processing

A

▪ The OS uses a print driver to translate what’s on the screen to print

634
Q

o Most laser printers support

A

memory upgrading using a SODIMM module

635
Q

Charging

A

▪ The imaging drum is conditioned with the primary charge roller

636
Q

Exposing

A

▪ The surface coding of the photosensitive imaging drum is losing its charge
when exposed to light

637
Q

o Developing

A

▪ The laser printer takes the toner and applies it to a developer roller

638
Q

o Transferring

A

Moving the toner from the imaging drum into the print media

639
Q

Fusing

A

▪ The fuser squeezes the paper between a hot roller and a pressure roller

640
Q

Cleaning

A

▪ The photosensitive drum needed to be cleaned and get all the remaining
toner particles cleaned off

641
Q

Charging voltage is

A

-600 VDC (negative 600 volts DC)

642
Q

Most laser printers have

A

a duplexing assembly installed

643
Q

Turn off the laser printer

A

and allow it to cool down

644
Q

Loading paper

A

Buy laser paper that is rated for the type of printer
▪ Store the paper in a nice dry area that does not have high humidity or
excessive dust

645
Q

o Toner cartridges replacement

A

▪ Standard toner cartridge has 2500 pages
▪ High-yield cartridge has 6000 pages

646
Q

o Use of maintenance kit

A

▪ Feed rollers pull up one sheet at a time and feed it through the system
▪ Transfer rollers are used to take the toner off the imaging drum and
apply it to the paper
▪ Fuser unit is responsible for heating up the toner and making it bond to
the page
▪ Page count indicates when to change the feed roller, transfer roller, or
the fuse unit

647
Q

o Calibration

A

▪ Process by which the printer determines the print density or color
balance to use

648
Q

Cleaning the printer

A

▪ If toner gets on the skin, wash it with cold water
▪ Do not use compressed air
▪ Some printers with filters must be kept free from dust and dirt

649
Q

o Inkjet printer creates an image on the paper through

A

a nozzle or jet on a print
head onto the paper

650
Q

High-end inkjet printers have

A

seven different cartridges

651
Q

o Printhead

A

▪ Device that takes the droplets of ink and directs into the paper

652
Q

o Piezoelectric/Charge Method

A

▪ Uses a nozzle that reacts to changes in voltage

653
Q

Thermal Method

A

▪ Used by HP, Canon, and Lexmark printers, and relies on heating up the
ink in the nozzle of the printhead

654
Q

o Thermal method replaces the printhead when

A

replacing
the ink cartridge

655
Q

Piezoelectric method does not require

A

to replace the printhead when replacing
the ink cartridge

656
Q

o Roller

A

▪ Responsible for advancing the paper through the inkjet printer

657
Q

Feeder

A

▪ Allows multiple pieces of paper in a tray to be selected one piece of
paper at a time and passes it to the roller

658
Q

o Duplexing Assembly

A

▪ Allows an inkjet printer to print on both sides of a piece of paper

659
Q

o Carriage Belt/Carriage System

A

▪ Allows the printhead to move back and forth across the page

660
Q

o Unidirectional Printing

A

▪ Printhead will only apply ink from left to right

661
Q

Bi-directional Printing/Two-Directional Printing

A

▪ Apply ink from left to right and from right to left

662
Q

o Thermal Printer

A

▪ Type of printer that uses a heating element to create an image

663
Q

o Thermal paper works in

A

high-speed environments

664
Q

Thermal ribbon has a mixture of colors

A

(CMYK) and is used to create the heat
transfer

665
Q

The number of pins on the thermal printhead determines the quality of the
printout

A

▪ Laser Printer
● 300 - 600 dpi
▪ Thermal Printer
● 100 - 300 dpi

666
Q

o Color Thermal Printer

A

▪ Uses thermal ribbon to create images

667
Q

o Replacing the paper

A

▪ Open the printer case
▪ Insert the role (shiny part facing outward)
▪ Place the end of the paper by the printhead and close again

668
Q

Cleaning the heating element

A

▪ Use isopropyl alcohol with cotton swab to clean the printhead

669
Q

o Removing debris

A

▪ Unplug the thermal printer
▪ Take out the paper role
▪ Clean the feed mechanism

670
Q

o Impact printers are measured based on

A

the quality of the dots

671
Q

o Impact printer has the highest resolution of

A

240 dpi

672
Q

o Tracks

A

▪ Series of holes going down the side of the paper with a perforation
between the regular paper and tracks

673
Q

o Printhead

A

▪ Device that has a series of pins that make up the dot matrix that forms
the image

674
Q

o Ribbon

A

▪ Fabric or material held within a plastic housing in front of the printhead

675
Q

o Tractor Feed

A

▪ Exists on both sides of the printer and pulls the paper through the printer
using tractor fed paper

676
Q

Power off the printer and let it

A

cool down for 30 to 60 minutes

677
Q

3D Printer

A

▪ Type of printer that creates images in three dimensions (height, width,
and depth)

678
Q

o A slice is one layer

A

of the overall 3D model

679
Q

o Print bed/Build plate

A

▪ Flat plate where the material will be extruded and built

680
Q

o Bed/Build Surface

A

▪ Sheet placed on top of the base plate that hold the object into position
while printing

681
Q

o Extruder

A

▪ Printhead for 3D printers

682
Q

o Fan

A

Helps to cool down the melted filament to retain the consistency

683
Q

o Filament

A

Ink for 3D printers (1.75 mm or 3 mm)

684
Q

● Troubleshooting Methodology

A
  1. Identify the problem
  2. Establish a theory of probable cause
  3. Test the theory to determine the cause
  4. Establish a plan of action to resolve the problem and implement the solution
  5. Verify full system functionality
  6. Document the findings, actions, and outcome
685
Q

Identify the Problem

A

o What happened?
o What was the status before?
o What is the status after that?
o Are there any changes in the system?

686
Q

o Probable Cause

A

▪ Different possible causes that may have happened

687
Q

Burning smell

A

▪ Damaged processor or motherboard components

688
Q

Clicking or grinding sound

A

▪ Hard drive

689
Q

No spinning fan

A

▪ Power issue or broken fan

690
Q

● Test the Theory

A

o Theory is confirmed
o Theory is not confirmed
o Lack skills or authority
o Unable to solve
o Escalate when there is an issue

691
Q

● Establish a Plan of Action

A

o Repair
o Replace
o Workaround
o How many are the resources
o How much time does it take
o How much is the cost
o Impact on the users and system
o A change of plan needs to get the authorization again

692
Q

● Verify System Functionality

A

o Identify the problem
o Establish a theory
o Test the theory
o Establish a plan of action
o Verify system functionality
o Check that the problem has been solved
o Inspect the other components to ensure nothing else is damaged, broken, or
disconnected
o Check the logs and diagnostic tools to confirm everything is working the way
they should
o Verify system functionality
o Implement preventative measures

693
Q

● Documentation

A

Documentation
▪ Document the findings, actions, and outcomes
o The trouble ticketing system allows to do the trend analysis
o The trouble ticketing system can document the amount of work

694
Q

● Power Issues

A

o Power button is not connected properly to the motherboard

695
Q

Wall outlet is faulty

A

▪ Use a multimeter or voltmeter to test the power outlet
● 110-120V/60Hz
US or Canada
● 220-240V/50Hz
Europe or Asia

696
Q

o Power cable to the computer is faulty

A

▪ Positive pin
▪ Negative pin
▪ Grounding pin

697
Q

Power supply is faulty

A

▪ 12V DC
▪ 5V DC
▪ 3.3V DC
▪ A power supply tester has a small variation or tolerance
● Bottom
Largest connector
● Top
4,6,8 Pin connectors/SATA/Molex

698
Q

o Power cables from power supply to components are faulty

A

▪ When testing detachable cables, check each pin on each side of the cable
to verify full continuity

699
Q

Incorrect voltage setting on power supply unit

A

● Power Issues

700
Q

o Power-On Self-Test (POST)

A

▪ Diagnostic program inside the system firmware
▪ POST beep codes are specific to the motherboard’s manufacturer
▪ POST-test expansion card identifies which component on the
motherboard is faulty and needs to be replaced

701
Q

o Crash Screen

A

▪ Displays an error whenever the operating system has issue

702
Q

● Windows

A

o Blue Screen of Death (BSOD)
▪ Indicates that there is a problem with the
underlying hardware that Windows cannot solve
● CRITICAL_PROCESS_DIED
● SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
● IRQL_NOT_LESS_OR_EQUAL
● VIDEO_TDR_TIMEOUT_DETECTED
● PAGE_FAULT_IN_NONPAGED_AREA
● SYSTEM_SERVICE_EXCEPTION
● DPC_WATCHDOG_VIOLATION

703
Q

● MAC

A

o Pinwheel of Death
▪ macOS (OS X)
● Made by Apple and it runs on Apple
hardware (desktops and laptops)

704
Q

● Linux

A

o Kernel Panic
▪ In kernel panic, the system display gives an exit
code

705
Q

o When the system is operating,

A

all the components are generating heat that
builds up a thermal load

706
Q

When it comes to cooling, make sure that all cooling components are working

A
  1. Shut down the system
  2. Boot into the UEFI or BIOS
707
Q

o In UEFI or BIOS,

A

look at the temperature sensors inside of the system

708
Q

o A thermal issue causes

A

intermittent shutdowns or continual rebooting

709
Q

o Excessive exposure to thermal loads

A

can cause permanent damage

710
Q

Plugging or unplugging cables can cause

A

wearing out, and pins getting bent or
damaged

711
Q

The rancid smell comes from

A

a blown or burst capacitor

712
Q

o When a capacitor starts emitting internal chemicals,

A

it loses the ability to
regulate electricity

713
Q

Modern systems can protect against

A

overheating

714
Q

Overheating systems could

A

reboot or shut down

715
Q

o Increasing the page size in Windows or the swap space in Linux

A

● Performance Issues

716
Q

Motherboards have a battery to keep

A

the real-time clock (RTC) in sync

717
Q

o Most modern operating systems set the date and time automatically

A

▪ Complementary Metal–Oxide–Semiconductor (CMOS)
● Non-volatile type of memory that stores the BIOS settings and is
built into the motherboard
▪ Non-Volatile RAM (NVRAM)
● Stores data without being constantly refreshed
o CMOS
o Real-time clock

718
Q

● Boot Issues

A

o SSD/Hard drive
o Removable media
o Network

719
Q

o Master Boot Record (MBR)

A

▪ Legacy method of providing the boot information
▪ A partition on a storage device is the logical part of an entire drive
● Windows
Single partition
● Linux
Multiple partitions
● Boot Configuration Data (BCD)
Windows
● GRUB/LILO
Linux

720
Q

o GUID Partition Table (GPT)

A

▪ Specialized boot scheme with modern advantages
▪ Inability to find a bootable device indicates a problem with MBR or GPT
● Bootable device not found
● Operating system not found
● Invalid drive specification
▪ The UEFI and BIOS set prioritized boot order based on their configurations
▪ Check if the internal storage device is working properly by looking, listening, and feeling

721
Q

o Hard Disk Drive (HDD)

A

▪ Older storage devices that spin and move the read/write head across the
platter
▪ Low-cost, slower speed

722
Q

o Solid-State Device

A

▪ Non-volatile memory that stores data and can access data from the
device
▪ High cost, less storage, faster speed
▪ Solid-state devices have a limit on the amount of time to read and write
data

723
Q

o Clicking sounds or grinding noises

A

are signs of a hard disk drive mechanical
problem

724
Q

o The light is not blinking during read or write from the device

A

▪ The LED activity light is constantly blinking

725
Q

Adding physical memory will stop the disk from

A

being used as a swap file or page
file

726
Q

o Use disk management tools to see

A

if the device is detected

727
Q

o Sector

A

▪ Allows to read and write on the hard drive by identifying the sector
▪ Use disk utility to identify which sectors are bad and try to recover them
● Sectors
Windows/Linux
● Blocks
Solid-state device

728
Q

o It is always a best practice to

A

have a good backup drive

729
Q

o Self-Monitoring, Analysis, and Reporting Technology (SMART)

A

▪ Self-diagnostic program that alerts the OS if there is a failure

730
Q

▪ SMART monitors the hard drive and understands the health status of the
drive

A

● Read Error Rate
● Spin-Up Time
● Reallocated Sector Count
● Seek Error Rate
● Power-On Hours
● Temperature

731
Q

▪ SMART utility is monitoring input/output operations per second (IOPS)

A

● A hard disk drive has a lower IOPS than a solid-state device
● Cloud can measure performance by using IOPS
● Low IOPS can be an issue with the hardware or the software

732
Q

▪ The defragmentation tool can put files back together and reduce read
and write times

A

● Deleting and rewriting causes fragmentation

733
Q

o RAID protects data against

A

the risk of data loss

734
Q

o Single disk failure

A

▪ If a RAID loses a disk, it will continue to operate as normal but at a slower
speed
▪ RAID rebuild is the utility used to rebuild the RAID

735
Q

o Full Raid Failure

A

▪ Entire array or volume stops working
▪ When the RAID fails, restore from backup, reconfigure, and rebuild using
new disks

736
Q

o Physical Cables That Carry Digital Signals

A

▪ HDMI
▪ DisplayPort
▪ Thunderbolt
▪ DVI-D
▪ DVI-I

737
Q

Cables are not properly inserted

A

▪ Check both ends of the cable are properly connected

738
Q

o Cheap cable

A

▪ Use high-speed rated HDMI cable that supports higher bandwidth
▪ HDMI, DisplayPort, and Thunderbolt carry audio
▪ VGA or DVI cables do not carry sound

739
Q

o High-Bandwidth Digital Content Protection (HDCP)

A

▪ Protects the audio and video signals between the systems over HDMI and
DisplayPort
▪ Upgrade the quality of the HDMI cable

740
Q

Cable Problems

A

o Broken cable
o Incorrect data source selected
o HDMI device issue

741
Q

● Projector Issues

A

o Dim images
o No images
o Shut down or restart
o Burned-out bulb is when the projector bulb has no light and cannot send an
image
o Projector bulb has a lifespan of about 500-2000 hours
o Use gloves to protect the life of the bulb
o Cool down the projector for 15 to 30 minutes before removing the bulb
o The projector without the source input will shut down

742
Q

Dim images

A

▪ Dim image occurs when there is no brightness or color contrast control
set for displays

743
Q

Fuzzy images

A

▪ Fuzzy image occurs when the output resolution from the computer is
lower

744
Q

o Flashing screens

A

▪ Flashing screen means the cable is not properly connected

745
Q

o Dead pixels

A

▪ There is no fix for a dead pixel

746
Q

o Burn-in

A

▪ Burn-in occurs when the same static picture is displayed on a screen for a
long time
▪ Animated screensaver
▪ Turn on inactivity

747
Q

o Color Bit

A

▪ Actual number of colors displayed
● 8-bit color palette
o (256 color variations)
● 16-bit color palette
o (32,768 color variations)
● 24-bit color palette
o (True color display)
o (16,777,216 color variations)
● 32-bit color palette
o (Deep color display)
o (1B color variations)
● Adobe RGB
● sRGB IEC
● Display P3

748
Q

● Wired Connectivity Issues

A

o Physical connection
o Cable length
o Interference
o Port flapping
o The link light shows a valid link
o A repeater is used to increase the connectivity signal
o The network cables near power lines use fiber optic connections

749
Q

o The activity light blinks when sending or receiving data

A

▪ 10 Mbps (Off)
▪ 100 Mbps (Orange)
▪ 1000 Mbps (Green)

750
Q

o Interference with wired connections is coming from an external interference
source

A

▪ Power lines
▪ Fluorescent lighting
▪ Motors
▪ Generators

751
Q

o Port Flapping

A

▪ Caused by an intermittent connectivity issue between the client and the
network switch
▪ Port flapping status is from upstate to downstate

752
Q

o Network Performance Issues

A

▪ Manifesting the slowdown of network

753
Q

o Half Duplex

A

▪ Network that sends or receives information
▪ Half duplex is the standard in hubs and network

754
Q

o Full Duplex

A

▪ Network that sends or receives information at the same time
▪ Network interface cards are set to auto negotiation

755
Q

o Data exfiltration is sending data in the background without the user seeing it

A
  1. Mismatch in the duplex setting
  2. Mismatch in the speed setting
  3. Network adapter drivers are out of date
  4. Malware infection
756
Q

● Wireless Connectivity Issues

A

o Intermittent wireless connectivity
o Signal interference
o Low signal strength
o Signal interference is causing signal issues
o Channels 1, 6, and 11 spread out the network and avoid interference
o Wireless a, n, ac, and ax are less prone to signal interference
o What frequency is being used?
o What is the maximum speed of that frequency?
o Which versions of wireless networking are being used?
o Configure the wireless access points to support the modern versions of the
protocols

757
Q

o Standards mismatch

A

▪ Intermittent Wireless Connectivity
Connected or disconnected network
▪ Intermittent Wired Connectivity
Upstate to a downstate of switch port

758
Q

o Received Signal Strength Indicator (RSSI)

A

▪ Used to measure the signal strength based on an index level and gives a
value in decibels (dB)

759
Q

o RSSI is displayed in negative decibels

A

▪ Increase the power of transmission
▪ Increase the antenna size
▪ Move closer to the source
▪ Wireless a, n, ac, and ax
5 GHz
▪ Wireless b, g, or n
2.4 GHz

760
Q

o Voice Over Internet Protocol (VoIP)

A

▪ Set of protocols that are used to send streaming voice and video in real
time

761
Q

o Latency

A

▪ Time it takes for a signal to reach the intended client
▪ Keep latency under 50 to 100 milliseconds

762
Q

o Jitter

A

▪ Measurement of the variation in delay over time
▪ When latency increases by up to 30-50 milliseconds, it starts to have jitter
▪ Increase network performance
▪ Implement quality of service

763
Q

● VoIP Issues

A

o The set settings for quality of service only affect things inside the network
o Setting the quality of service (QoS) allows prioritization of voice traffic

764
Q

o Limited Connectivity

A

▪ Specialized message to receive within the operating system
1. Affects one network client
2. VLAN is properly configured

765
Q

o Limited connectivity issue is having a DHCP issue

A

▪ IP address
▪ Subnet
▪ Default gateway
▪ DNS server IPs

766
Q

● Mobile Power Issues

A

o Poor battery health
o Charging issues
o Swollen batteries
o As batteries age, the maximum charge they can hold decreases
o Swollen batteries are caused by overcharging

767
Q

o Overheating damage

A

▪ Any device that’s unable to properly cool itself down

768
Q

o Liquid damage

A

▪ Dry off excess liquid
▪ Power off the device
▪ Disassemble the device
▪ Clean the circuit boards and contacts
▪ Replace the battery

769
Q

o Physical port damage

A

▪ To fix the damaged port is to remove the port and replace it

770
Q

o Broken screens

A

▪ Glass
▪ Digitizer
▪ Screen
▪ Backlight

771
Q

o Dim images

A

▪ Backlight
▪ Inverter

772
Q

o Digitizer issues

A

▪ Digitizer
● Device underneath the glass that responds to the input of the user
▪ The digitizers fail because of shock damage from dropping or liquid
damage

773
Q

o Calibration issues

A

▪ When troubleshooting a cursor issue, check the touch pad sensitivity and
observe the user

774
Q

Physical issues

A

▪ Connected to the right SSID
▪ Connected using the right password
▪ Move closer to the wireless access point
▪ Put the higher gain antenna on
▪ Operate 30 to 50 meters away from the wireless access point to maintain
a good connection

775
Q

o Software configuration issues

A

▪ Bluetooth enabled
▪ Properly paired
▪ Adequate battery
▪ Right range
▪ Bluetooth is a personal area network and used at up to 10 meters
▪ The wireless NIC is properly connected to the antennas

776
Q

● Mobile Malware Infections

A

o Antivirus or anti-malware solution
o Excessive power drain
o Significant data transmission
o Camera and microphone
o Asking for additional permissions
o Back up the data
o Format the device and re-install the base operating system

777
Q

● Printer Connectivity Issues

A

o Locally connected printer
o Printer not found
o Printer has an online or offline status
o Assign the printer a valid IP address, subnet mask, gateway, and DNS server
o Use the right SSID and password to ensure the printer joins the correct network
o To bring the printer back online, turn off the printer, wait ten seconds, and
power it on again
o Power Cycling
▪ Printer is turned on and off to release printing memory
● Local connections
● Wired connections
● Wireless connections

778
Q

● Print Feed Issues

A

o Paper jam
o Grinding noise
o Check the printer for debris and paper tracks
o Inkjet and dot matrix printers are easier to detect a jam
o Paper feed issue is when the printer selects more than one piece of paper
through the printer
▪ Thin Paper - Low weight
▪ Thick Paper - High weight
o The pickup rollers are designed to pick up one piece of paper at a time
o Carriage mechanism brings the printhead across the page in an inkjet or impact
printer
▪ Toner cartridge
▪ Fuser
▪ Gears and rollers

779
Q

o Faded printout

A

▪ Draft output mode uses less ink and toner
▪ Faded printout is caused by the running out of ink inside of a printer ink
cartridge or toner

780
Q

o Blank pages

A

▪ Blank page is caused by a software issue

781
Q

o White stripes

A

▪ White stripes in laser printers are caused by an issue with the toner
cartridge or the drum
▪ The uniform white stripe on the page indicates a problem with the drum

782
Q

o Black stripes

A

▪ Indicates the primary charge roller is dirty or damaged, or the high
voltage power supply to the developer unit is malfunctioning
▪ To fix the black stripes issue, troubleshoot the corona wire
or replace the drum and the toner cartridge

783
Q

o Speckling output

A

▪ Clean the printer using an approved toner vacuum

784
Q

o Vertical or horizontal lines

A

▪ The vertical or horizontal line is caused by dirty feed rollers
▪ Dirty photosensitive drum can create vertical or horizontal lines

785
Q

o Toner does not fuse

A

▪ Check the voltage of the fuser and get the proper input voltage

786
Q

o Double or echo image

A

▪ A double/echo/ghost/shadow image indicates a drum issue

787
Q

o Incorrect chroma display

A

▪ Software or printer driver issue could be causing the incorrect color

788
Q

o Missing color

A

▪ Use rubbing alcohol to clean the contacts between the printer and the
cartridge
▪ Consistent white line indicates a blocked or clogged inkjet nozzle
▪ Replace the printhead and this will replace the dots inside of it
▪ Platen adjusts the gap between the paper and the printhead
to different paper sizes

789
Q

● Print Finishing Issues

A

o Incorrect page sizes
o Incorrect page orientations
o Issues with stapling
o Issues with hole punching
o Use the right paper size to print
o Word processor sets portrait as the default
o Slide presentation sets landscape as the default
o To solve staple jams, remove the staple cartridge and replace it

790
Q

o Print monitor

A

▪ Software program used to transmit the print job and provide status
information
▪ Print monitors look at toner and ink cartridge levels and notify when they
get low

791
Q

o Print queue

A

▪ Software that collects all the print jobs and manages them

792
Q

o Print spooler

A

▪ Manages the paper printing jobs sent from a computer or a printer server
● Print Queue
Pending
● Print Spooler
Active

793
Q

o Print driver

A

▪ Garbled Print Job
● Any output that is scrambled or encrypted
● Garbled printouts are a driver issue
● A font can cause a garbled printout