You are on page 1of 2

8.

Floppy drives use 1.44 MB 3.5" disks and 17. LAN = local area network. WAN = wide 25. Wireless Ethernet versions, including 5. Verify full system functionality and
connect to the motherboard via 34-pin area network. MAN = metropolitan (mu- their name, data transfer rate, frequency if applicable implement preventative
data cable and 4-pin mini (Berg) power nicipal) area network. PAN = personal area used measures.
connector. network. u 802.11a, 54 Mbps, 5 GHz 6. Document findings, actions, and
9. Solid-state media includes solid-state hard 18. Switches connect computers together in a u 802.11b, 11 Mbps, 2.4 GHz outcomes.
drives, USB flash drives, CompactFlash, LAN. Routers connect two or more LANs 2. Power is good, but no display? Check
u 802.11g, 54 Mbps, 2.4 GHz
and Secure Digital (SD) cards. and connect LANs to the Internet. Firewalls the big four: video, CPU, RAM, and
protect individual computers and networks u 802.11n, 600 Mbps, 5 and 2.4 GHz
10. Laptops are smaller versions of desktop motherboard.
from unwanted intrusion. 26. Bluetooth is a short-range technology
The CompTIA A+ Cram Sheet PCs. They have replaceable items such as
keyboards, SODIMM RAM, displays, in-
verters, optical discs, and 2.5" hard drives.
19. Network topologies include star (most
common), ring, bus, mesh, and hybrids:
aimed at simplifying communications
and synchronization among network
3. Time/Date resets to Jan 1st, 2000?
Check lithium battery.
devices. 4. Trouble with CPU? Check if CPU is
This cram sheet contains the distilled, key facts about the CompTIA A+ 220-801 and 220-802 Laptops use PC Card (PCMCIA), CardBus, star-bus and hierarchical star.
Bluetooth is divided into three classes. secure, CPU fan, heat sink and thermal
exams. Review this information as the last step before you enter the testing center, paying special and ExpressCard technologies. They have 20. IPv4 addresses are 32-bit dotted-decimal
Class I has a maximum transmission compound, and overclocking setting in
a Fn key for implementing secondary key numbers, for example, 192.168.1.1, and
attention to those areas in which you think that you need the most review. range of 100 meters, Class II (the most BIOS.
functions. can be statically (manually) inputed or
common) has a range of 10 meters, 5. Noisy computer? Check CPU fan, case
11. Video cards connect to motherboards by dynamically assigned (DHCP). IP Classes
and Class III is short range and hardly fan, power supply fan, and use com-
220-801 way of x16 PCIe (most common, typically include
used at 1 meter. Bluetooth version 1 has pressed air and vacuum.
black), AGP (brown), or PCI (white) expan- u Class A range: 1–126, subnet mask:
1. Motherboards connect everything together. 5. Hard disk drives are nonvolatile devices sion slots. Video connector types include a maximum data transfer rate of 721 6. RAM issue? Reseat modules; clean
255.0.0.0. Private: 10.x.x.x Kbps, and version 2 is 2.1 Mbps.
Typical form factors include ATX (most that store data, generally 3.5". Types of DVI, VGA, HDMI, DisplayPort, S-Video, with compressed air. Overheating? Try
hard disks include u Class B range: 128–191, subnet mask: 27. Port forwarding forwards an external RAM heat sinks. BIOS beep codes or
common), microATX, ITX, and BTX. AMD and Component Video/RGB. Common
255.255.0.0. Private: 172.16.0.0– displayed errors? Consult motherboard
and older Intel chipsets include a north- u SATA: Serial ATA drives come in color depths include 16-bit, 24-bit, and network port to an internal IP address
172.31.255.255 docs and use POST card tester.
bridge that connects the CPU, RAM, and 150, 300, and 600 MB/s versions 32-bit. Common resolutions include XGA and port.
x16 PCIe devices, and southbridge that (1.5/3.0/6.0 Gb/s), use a 15-pin power (1024x768), WXGA (1280x720), SXGA+ u Class C range: 192–223, subnet mask: 7. Power issues? Test AC outlet with
28. Port triggering enables you to specify
connects secondary systems such as USB, connector and 7-pin data connector. (1280x1024), UXGA (1600x1200), WSXGA+ 255.255.255.0. Private: 192.168.x.x receptacle tester or multimeter. Test
outgoing ports that your computer uses
SATA, IDE, and sound. Types of expan- u PATA: Parallel ATA drives range (1680x1050), and WUXGA (1920x1200). 21. IPv6 addresses are 128-bit hexadecimal for special applications; their corre- power supply with PSU tester or multi-
sion buses include PCI, AGP, PCI Express between 33 MHz and 133 MHz (Ultra 12. Sound cards connect as x1 PCIe or PCI numbers, for example: 2001:7120:0000:8 sponding inbound ports open automati- meter. Do not open power supply; it is a
(PCIe), AMR, CNR, and PC Card (PCMCIA). ATA/33 through /133), use a 4-pin cards and normally have PC 99 color-coded 001:0000:0000:0000:1F10. ::1 is the loop- cally when the sessions are established. FRU (field replaceable unit).
Newer Intel chipset designs incorporate Molex power connector, 40-pin IDE 1/8" mini-jacks for I/O and speakers, and back address. Unicast IPv6 addresses are 29. Safety: Do not open power supplies, 8. Slow hard drive? Defrag it, use disk
northbridge functionality into the CPU that ribbon cable for data, and can be optical I/Os known as S/PDIF (ex. TOSLINK). assigned to a single interface and are the cleanup, and scan drive with AV soft-
test AC outlets before use, use CO2-
connects to a single-chip chipset via DMI jumpered as single, master, slave, or most common type. ware. Drive isn’t recognized? Check
13. USB (Universal Serial Bus) can have up based BC fire extinguisher on electri-
or QPI. AMD CPU to chipset connection is cable select. 22. Common network speeds are 1000 Mbps cal fires, and call 911. Employ cable connections, check in BIOS, initialize,
to 127 devices. USB 1.1 (full speed) runs
HyperTransport. (gigabit Ethernet) and 100 Mbps (fast management, MSDS = material safety partition, and format in Disk Manage-
u S CSI: Small Computer System Inter- at 12 Mbps with a max cable length of 3
BIOS (Basic Input/Output System) identi- face drives range in transfer rates from meters; USB 2.0 (high-speed) runs at 480 Ethernet). datasheets, and consult when encoun- ment. Noisy drive? If not SCSI, replace
fies, tests, and initializes components and 160 MB/s to 640 MB/s and use 68-pin, Mbps, max cable length: 5 meters. USB 23. Networking protocols include tering a product with chemicals (toner it! Floppy LED stays on? Check for
boots to hard drive. CMOS (complementa- 80-pin, or serial connectors. 3.0 (Superspeed) runs at 5 Gbps. Comput- cartridges, cleaners). upside-down data cable.
u FTP (File Transfer Protocol). Port 21
ry metal-oxide semiconductor) stores time/ ers usually have Type A connectors built in. 30. ESD is electro-static discharge. Prevent 9. No second screen on laptop? Check
6. RAID stands for Redundant Array of Inex- u SSH (Secure Shell). Port 22
date, passwords. CR2032 lithium battery with antistatic strap, mat, touch chassis, Fn key. Laptop display blank? Check
pensive Disks. RAID 0 is striping, RAID 1 is 14. IEEE 1394a (FireWire 400) runs at 400 u Telnet. Port 23
provides power to CMOS. antistatic bags, unplug computer, and resolution settings, inverter, backlight,
mirroring, and RAID 5 is striping with parity. Mbps. IEEE 1394b (FireWire 800) runs at
In BIOS configure: time/date, boot device u SMTP (Simple Mail Transfer Protocol). increase humidity. or damage to LCD.
RAID 10 is mirrored sets in a striped set. 800 Mbps. IEEE 1394b also specifies 1600
priority (boot order), passwords, power RAID 0 is not fault-tolerant. If RAID 1 uses Mbps and 3200 Mbps. IEEE 1394 chains Port 25 (can use port 587) 31. Incident response: First response, 10. Printer paper jam? Power cycle, check
management, WOL, monitoring. two disk controllers, it is disk duplexing. can have up to 63 devices. u DNS (Domain Naming System). identify what happened, document, and paper tray, rollers, paper type, fuser,
To update BIOS, flash it with new firmware. 7. Optical disc drives use removable media to 15. Printers include laser, inkjet, thermal, and Port 53 set up chain of custody (chronological and entire paper path. Blank paper?
2. The central processing unit (CPU) or pro- store and retrieve data, typically 5.25". impact (dot-matrix). The six main steps in paper trail). Check toner cartridge and transfer
u HTTP (Hypertext Transfer Protocol).
cessor takes care of all calculations. the laser printing process are Cleaning, corona wire. Lines or smearing? Check
Types of optical discs include Port 80 32. Professionalism: Punctuality, listen to
Conditioning (charging), Writing (exposing), drum, primary corona wire, and replace
Intel CPUs (Core i3/i5/i7) use LGA 1155 u C D-ROM: Data CDs can typically hold customer, clarify problems, positive
u POP3 (Post Office Protocol). Port 110 toner cartridge. Toner not staying on pa-
sockets. Older Intel CPUs (Core 2) use 700 MB, can read and write at up to Developing, Transferring, and Fusing. (Pro- attitude, speak clearly, set and meet
cessing is considered another step before u IMAP (Internet Message Access Proto- per? Check fusing assembly. Garbage
LGA 775 sockets. AMD Phenom II CPUs 52x (7.8 MB/s), and rewrite at up to expectations, avoid distractions, and
printing begins.) col). Port 143 printout? Check driver. Ghosted image?
use AM2+ and AM3 sockets. AMD FX CPU 32x (4.8 MB/s). avoid confidential data.
u HTTPS (HTTP Secure). Port 443 Check drum and toner cartridge. No
uses AM3+ socket. L1/L2 cache in each 16. Custom PCs include: audio/video work-
u D VD-ROM: DVDs have a capacity connectivity? Check power, network
core. L3 cache is shared among entire
ranging from 4.7 GB (DVD-5) to 17 GB stations (need special A/V cards, fast u RDP (Remote Desktop Protocol). Port 220-802 connection, if printer is shared, proper
CPU. Thermal compound required when- hard drives, multiple monitors); CAD/
(DVD-18 dual-sided and dual-layered). 3389 1. CompTIA 6-Step Troubleshooting IP address, and if printer is set up as
ever heat sink is installed. CAM workstations (need powerful CPUs,
Recording technologies include DVD+R, 24. Cabling standards include Process default in Windows.
3. Random Access Memory (RAM) types video cards, and lots of RAM); thin clients
DVD-R, DVD+RW, and DVD-RW. (low resources, relies on server, diskless, u Category 3: 10 Mbps 1. Identify the problem. 11. Test network connections with patch
include SDRAM, DDR, DDR2, DDR3,
u B lu-ray: Blu-rays are used for HD and embedded OS); home server PC (fast NIC, u Category 5: 100 Mbps 2. Establish a theory of probable tester, LAN cable tester, tone and probe.
RDRAM, and SODIMMs. Ex. of DDR3-800
games and have a capacity of 50 GB RAID arrays, HomeGroup); HTPC (small cause. (Question the obvious.) Test NIC with loopback plug.
data transfer calculation: 800 MT/s x 8 = u Category 5e: Rated for 100 Mbps and
6,400 MB/s. Dual channel is double width, and a write speed of between 1x and form factor, surround sound, HDMI output, gigabit networks 3. Test the theory to determine cause. 12. Windows 7 min. requirements: CPU =
128-bit bus. Latency measured as CL or 12x (36 Mbps—432 Mbps). Blu-ray TV tuner); Gaming PC (powerful CPU and 1 GHz, RAM = 1 GB (2 GB for 64-bit),
u Category 6: Rated for 100 Mbps and 4. Establish a plan of action to resolve
CAS. drives connect via SATA only. video card); (virtualization workstation Free disk space = 16 GB (20 GB for
gigabit networks the problem and implement the
(powerful CPU and lots of RAM). Type 1 solution. 64-bit)
4. ATX 12V 2.x Power Supplies connect to
the motherboard by way of 24-pin cable + hypervisor is native or bare metal. Type 2 is
4-pin for CPU and 6 or 8-pin for video. hosted, runs on top of OS.
13. Windows Vista min. requirements: 27. File checking command-line tools u Ping: Tests whether another host is u Trojan horses: Appear to perform 49. Mobile devices use: ARM CPUs, flash
CPU = 800 MHz, RAM = 512 MB, and that can be used in Windows include available over the network (example: desired functions but are actually memory, common OSs: Android (open-
Free disk space=15 GB. Chkdsk (/F fixes errors; /R locates bad ping 192.168.1.1). Ping 127.0.0.1 or performing malicious functions behind source) and iOS (closed-source), multi-
14. Windows XP min. requirements: sectors and recovers info) and SFC ping ::1 to test the local computer. the scenes. touch displays. Applications downloaded
CPU = 233 MHz, RAM = 64 MB, Free (System File Checker); SFC /scannow Ping –t is continuous, ping –n is a set from Google Play (Android Market) and
u Spyware: Type of malicious software
disk space =1.5 GB. Media Center is common. amount of pings; ping –l changes the App Store.
that is either downloaded unwittingly
CPU = 1.6 GHz, RAM = 256 MB. 28. A hard disk can have four partitions: size of each ping. from a website or is installed along 50. GPS and Geotracking provide location
15. Setuperr.log contains setup errors up to four primary partitions, but only u Tracert: Sends packets to test desti- with some other third-party software. information about mobile devices.
during an installation of Windows. one extended partition. Logical drives nations beyond the local computer’s 51. Mobile devices connect to Internet via
u Rootkit: Software designed to gain
are sections of an extended partition. network. GPRS (cellular WWAN), Wi-Fi (WLAN).
16. Graphical User Interface (GUI) includes administrator-level access to the core
The Active partition is the one that is
the desktop, icons, taskbar, Start u Netstat: Shows the network statistics of a system without being detected. 52. Mobile device security: screenlocks
booted from; it usually contains the OS.
menu, Quick Launch, Notification Area, for the local computer. Displays TCP 43. Social engineering: The act of (pattern, PIN, password), invalid attempts
Any section of a hard drive with a letter
application windows and dialog boxes, and UDP sessions by computer name manipulating users into revealing lockout, remote wipe, remote backup, and
is called a volume.
and gadgets. (or IP) and port. confidential information or performing antivirus. Rooting and Jailbreaking: remov-
29. A service pack (SP) is a group of up- ing limitations of Android and iOS to gain
17. Command Prompt is the command-line u Nbtstat: Shows network protocol other actions detrimental to the user. Know
dates, bug fixes, updated drivers, and super-user capabilities.
utility in Windows. To run in elevated statistics that use NetBIOS over TCP/ phishing, shoulder surfing, and tailgating!
security fixes installed from one down-
mode: Click Start > All Programs IP connections. Shows core services 44. Authentication: The verification of a
loadable package or from one disc.
> Accessories; then right-click running on local or remote machines. person’s identity, it helps protect against Student Area
Command Prompt and select Run as 30. Windows Update can be accessed
u Nslookup: Used to query DNS servers unauthorized access. Fill in anything else you think will be valuable to
Administrator. from Start > All Programs > Windows
to find out DNS details including the IP u Broken down into: 1. Something you here.
Update.
18. Snap-ins are console windows that can address of hosts. the user knows (password or PIN);
be added to a Microsoft Management 31. Backups can be accomplished in Win-
u Net: Used to map network drives (net 2. Something the user has (a smart
Console (MMC). Ex. Computer Man- dows 7 with Backup and Restore, in
use), view computers (net view), start/ card or other security token); 3.
agement and Performance Monitor. Vista with Backup Status and Configu-
stop services (net start and net stop), Something the user is (biometric
ration, and in XP with NTBackup.
19. Libraries in Windows 7 logically repre- and synchronize time (net time). reading: fingerprint or retina scan); or
sent user-defined collections of folders. 32. System Restore can fix issues caused 4. Something a user does (signature or
40. No network connectivity? Check link light,
by defective hardware or software by voice print).
20. Common system tools include Device patch cable, disabled NIC, wireless switch
reverting back to an earlier time.
Manager, System Information tool, Task is off, IP configuration, and Windows u UAC (User Account Control)
Manager, and Msconfig. 33. F8 brings up the Advanced Boot Network Diagnostics. Limited connectiv- in Windows 7/Vista requires
Options Menu (ABOM) that includes ity? Ping localhost; then move outward, administrative login to perform higher
21. User data can be migrated using Win-
options such as Safe Mode, Enable and use ipconfig/all. Poor wireless signal? tasks.
dows Easy Transfer (Windows 7 and
low-resolution video, and Last Known Check distance, placement, antennas, and
Vista only), User State Migration Tool 45. Encryption: The act of changing informa-
Good Configuration. Safe Mode boots update hardware and software. APIPA?
(USMT), and Files and Settings Transfer tion using an algorithm known as a cipher
the system with minimal drivers. Ipconfig/release and /renew; check DHCP
Wizard (XP). to make it unreadable to anyone except
34. The Windows 7/Vista Windows Recov- server. users who possess the proper “key” to the
22. The Registry is a database that stores
ery Environment (WinRE) includes Sys- 41. Wireless encryption protocols include data.
the settings for Windows. It can be
tem Recovery Options such as Startup
accessed by opening the Run prompt u WEP (Wired Equivalent Privacy), 64-bit u Encrypting File System (EFS):
Repair, System Restore, and Command
and typing regedit.exe. Hives store key size, deprecated Encrypts one or more files or folders
Prompt.
settings; a commonly modified hive is u WPA (Wi-Fi Protected Access), version directly within the Properties page.
HKEY_LOCAL_MACHINE. 35. Windows XP uses the Recovery Con- Makes files appear green.
2 is 256-bit
sole as its repair environment.
23. Remote Desktop software enables a u TKIP (Temporal Key Integrity Protocol), u BitLocker: Encrypts an entire disk,
user to see and control the GUI of a 36. The Event Viewer warns about possible available only on Windows 7 Ultimate/
128-bit, deprecated
remote computer. issues and displays errors as they oc- Enterprise and Vista Ultimate/Enter-
cur within three main log files: System, u CCMP (addresses vulnerabilities with
24. The %windir% (or %systemroot%) in prise. Requires TPM.
Application, and Security. Security TKIP), 128-bit
Windows 7/Vista/XP is C:\Windows by 46. Hard drive disposal: Clearing (drive to
displays auditing information. u AES (Advanced Encryption Standard),
default. be reused in house), purging (sanitizing,
37. A stop error (also known as a Blue 128-bit, 192-bit, and 256-bit.
25. Windows 7/Vista boot files include Ex. DoD 5220.22-M seven pass standard,
Screen of Death or BSOD) completely u Best combination is WPA2 with AES degaussing), and destruction (pulverizing,
Bootmgr, Winload.exe. BCD. Windows
halts the operating system and displays (as of writing of this book.) drilling holes in platters).
XP boot files include NTLDR, Boot.ini,
a blue screen with various text and 42. Malicious software: Known as malware,
and NTdetect.com. 47. BIOS security includes supervisor and user
code. Can be caused by faulty hard- this includes the following:
In Windows 7/Vista: Bootrec/fixboot re- passwords, drivelock passwords, disabling
ware or bad drivers. u Virus: Code that runs on a computer
pairs Bootmgr, Bootrec/fixmbr rewrites removable media, and setting the boot
38. Processes can be stopped in the Task without the user’s knowledge; it infects device priority to hard drive first.
the master boot record, and Bootrec/
Manager or with the taskkill command the computer when the code is ac-
rebuildbcd rebuilds the boot configura- 48. Permission inheritance: If you create
in the Command Prompt. cessed and executed.
tion data store. In Windows XP: fixmbr a folder, the default action it takes is to
repairs the MBR; fixboot writes new 39. Common networking command-line u Worms: Much like viruses except that inherit permissions from the parent folder.
boot sector information. tools include the following: they self-replicate whereas a virus If you move a folder within the same parti-
26. Directories can be added with the MD u Ipconfig: Displays current TCP/ does not. tion, it retains the permissions. If you move
command, removed with the RD com- IP network configuration values; or copy a folder to another partition, the
mand, and navigated to with the CD Ipconfig/all shows additional Infor- (new) folder inherits from the new parent.
command. mation such as MAC address.

You might also like