Professional Documents
Culture Documents
CompTIA A+ Essentials
CompTIA A+ Essentials
CompTIA A+ Essentials
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 1
Course Outline (Slide 2 of 2)
• Managing Users, Workstations, and Shared Resources
• Implementing Client Virtualization and Cloud Computing
• Security Concepts
• Securing Workstations and Data
• Troubleshooting Workstation Security Issues
• Supporting and Troubleshooting Laptops
• Supporting and Troubleshooting Mobile Devices
• Installing, Configuring, and Troubleshooting Print Devices
• Implementing Operational Procedures
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Supporting Operating Systems
Supporting Operating Systems
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Identify Common Operating Systems
Exam Objectives::
• 1002-1.1 Compare and contrast common operating system types and
their purposes.
• 1002-1.2 Compare and contrast features of Microsoft Windows versions.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
What Is an Operating System?
Operating system: A software package that enables a PC to
function by performing tasks such as recognizing keyboard input,
sending output to a monitor, and controlling peripherals.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
OS Types
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Compatibility Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Microsoft Windows
Microsoft Windows: A GUI-based OS for home and business
users that has been developed into client and server versions.
Shell: An OS component that interacts directly with users and
functions as the command interpreter for operating systems.
• Dominant OS for commercial PCs.
• Different versions provide different features or user interface elements.
• Interface components for:
• General use.
• Technical configuration.
• Troubleshooting.
• The desktop is the top level of the interface.
• Can contain icons for opening apps and data files.
• Contains app launch and control tools (Start Menu/Screen and the taskbar).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Microsoft Windows Versions (Slide 1 of 3)
• Windows 10
• Current version
• Combines legacy and touch-
enabled controls
• Start button
• Feature updates
• Quality updates
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Microsoft Windows Versions (Slide 2 of 3)
• Windows 10 Mobile
• Consistent user interface and code
base for all devices.
• Ships on Windows 10 Mobile smart-
phones and Surface tablets.
• Windows 8/8.1
• First version to support touch-
screens.
• Start Screen and charms.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Microsoft Windows Versions (Slide 3 of 3)
• Windows 7
• Start Menu interface
• Windows Vista
• Windows XP
• No longer supported
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Windows Editions
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Windows for Personal Use
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
32-Bit and 64-Bit Windows
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Windows System Limits (Slide 1 of 3)
Multicore
Yes Yes Yes Yes
processors
32-bit memory 4 GB 4 GB 4 GB 4 GB
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Windows System Limits (Slide 2 of 3)
Multicore
Yes Yes Yes
processors
32-bit memory 4 GB 4 GB 4 GB
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Windows System Limits (Slide 3 of 3)
Multicore
Yes Yes Yes Yes Yes
processors
32-bit memory 4 GB 4 GB 4 GB 4 GB 4 GB
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
OS Lifecycles
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Apple Operating Systems (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Apple Operating Systems (Slide 2 of 2)
• Apple iOS.
• iPhone and iPad.
• Closed source OS based on UNIX.
• Not compatible with macOS.
• Touch interface.
• Fingers or stylus.
• Gestures.
• Update limitations
for new versions
(support.apple.com).
• No end of life.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
UNIX-Based Operating Systems (Slide 1 of 2)
UNIX: Family of OSs typically running mission critical applications
and infrastructure.
Linux: An open-source operating system supported by a wide
range of hardware and software vendors.
• UNIX is portable to different hardware platforms.
• Several versions/flavors of UNIX.
• Often not compatible.
• Not always open source.
• Linux was designed to be open source.
• Many distributions/distros of Linux.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
UNIX-Based Operating Systems (Slide 2 of 2)
Discussing OS Types
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 1-1: Discussing OS Types
• You receive a call from a customer who is confused after upgrading his
Windows 7 Home Premium edition computer to Windows 10. The user
cannot find the All Programs menu. What should you advise?
• ANSWER:
• Users often need assistance when an OS version changes the desktop style or user
interface. In Windows 10, the Start Menu and the All Programs submenu have been
replaced by the Start Screen. The user can scroll in the Start Screen or use Instant
Search to find any app. To use Instant Search, press the Windows key and type the
app name.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 1-1: Discussing OS Types
• ANSWER:
• Support for more than 4 GB RAM.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity 1-1: Discussing OS Types
• You are advising a customer whose business is expanding. The business owner needs to
provision an additional 30 desktop computers, some of which will be installed at a second
office location. The business is currently run with a workgroup network of five Windows 7
Home Premium desktop computers and one file server. Why might you suggest licenses for an
edition of Windows 10 that supports corporate needs for the new computer and has upgrades
for the old computers? Which specific edition(s) could you recommend?
• ANSWER:
• Without a domain, accounts must be configured on each computer individually. With over 30 computers to manage
at two locations, this would be a substantial task so switching to a domain network, where the accounts can be
configured on the server, is likely to save costs in the long term. The BranchCache feature would also allow
computers at the second office to minimize bandwidth usage when downloading documents (Enterprise edition
only) and updates from the main office. You can suggest either Windows 10 Pro or Windows 10 Enterprise for use
on a domain. As Windows moves towards a service model, subscription-based licensing of the Enterprise edition is
becoming the mainstream choice.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 1-1: Discussing OS Types
• A customer asks whether an iOS app that your company developed will
also work on her Apple macOS computer. What issue does this raise and
what answer might you give?
• ANSWER:
• The issue here is compatibility between different operating systems. Even though both
are produced by Apple, iOS and macOS use different environments so the iOS app
cannot be installed directly. Your company might make a macOS version. Also (and do
not worry if you did not include this in your answer), with the latest version of macOS
(Mojave), support for native iOS apps is being provisioned so this might be something
you can offer in the future.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 1-1: Discussing OS Types
• Apart from Windows and macOS, what operating system options are
there for client PCs?
• ANSWER:
• The other main choice is one of the distributions of Linux. A company might also use
some sort of UNIX. Finally, Chrome OS is installed on Chromebox PCs. These are
often used by educational institutions and businesses who rely primarily on web
applications, rather than locally installed desktop software.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Activity 1-1: Discussing OS Types
• You are advising a customer with an older model Android smartphone.
The customer wants to update to the latest version of Android, but using
the update option results in a No updates available message. What type of
issue is this, and what advice can you provide?
• ANSWER:
• This is an issue with update limitations. Android is quite a fragmented market, and
customers must depend on the handset vendor to implement OS updates for a
particular model. The customer can only check the handset vendor's website or
helpline to find out if a version update will ever be supported for that model.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Topic B: Troubleshooting Methodology
Exam Objectives:
• 1001-5.1 Given a scenario, use the best practice methodology to
resolve problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Troubleshooting Basics
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Problem Management
Problem management: A method of identifying, prioritizing, and
establishing ownership of incidents.
Incident: Something that is not normal and disrupts regular
operations in the computing environment.
1. User contacts Help Desk.
• Operator or technician is assigned, and trouble ticket is generated.
2. User describes the problem.
• Operator asks clarifying questions, and categorizes the problem, assesses urgency, and
estimates time to resolve.
3. Operator might walk user through some initial troubleshooting steps.
• Ticket might be escalated to another support person.
4. Troubleshooting continues until the problem is resolved.
• Operator confirms user satisfaction and records details on trouble ticket and closes it.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
The CompTIA A+ Troubleshooting Model (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
The CompTIA A+ Troubleshooting Model (Slide 2 of 2)
4. Establish a plan of action to resolve the problem and implement the solution.
5. Verify full system functionality, and if applicable, implement preventive
measures.
6. Document findings, actions, and outcomes.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Customer Service and Communication Skills
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Problem Identification (Slide 1 of 2)
• Work methodically to ensure you diagnose the correct problem and select the
best resolution.
• Troubleshooting combines problem-solving with decision-making.
• Be prepared before starting the process.
• Gather tools, documentation, and other necessities.
• Use clear, concise, and accurate instructions when asking users to perform tasks.
• Schedule downtime as needed, but be sensitive to the user’s needs.
• Back up locally stored data.
• Consider imaging the drive before changing any configuration parameters.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Problem Identification (Slide 2 of 2)
• Elicit factual information from the user or technician who reports the issue:
• What are the exact error messages on the screen or coming from the speaker?
• Has anyone else experienced the same issue?
• How long has the problem been occurring?
• What has changed? Did you change things, or did someone else?
• Has anything been tried to solve the problem?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Sources of Information
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Determination of Probable Causes
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Problem Escalation
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Solution Implementation and Testing
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Verification and Documentation
• Tests:
• Try to use a component.
• Swap component out for a known good one.
• Inspect component for proper connection, damage, and indicator lights.
• Disable or uninstall a component.
• Check documentation and software diagnostic tools.
• Update software or device drivers.
• Be sure you are satisfied the problem is solved.
• Be sure the user is satisfied the problem is solved.
• Implement preventive measures.
• Document findings, actions, and outcomes.
• Helps immensely with future troubleshooting.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Activity 1-2: Discussing Troubleshooting Methodology
• You are dealing with a support request and think that you have identified
the probable cause of the reported problem. What should be your next
troubleshooting step?
• ANSWER:
• Test the theory to determine the cause.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Activity 1-2: Discussing Troubleshooting Methodology
• ANSWER:
• That data on the PC has been backed up. You should always verify that you have a
backup before beginning any troubleshooting activities.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity 1-2: Discussing Troubleshooting Methodology
• You receive a support call from a user. What should be your first
troubleshooting step?
• ANSWER:
• Question the user to establish all the circumstances surrounding the problem.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity 1-2: Discussing Troubleshooting Methodology
• ANSWER:
• A step-by-step analysis of the problem helps by making sure you approach it
methodically and troubleshooting within a more limited area is simpler.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Activity 1-2: Discussing Troubleshooting Methodology
• If another technician says to you, "We'll have to strip this back to base?",
what do they mean, and at which specific step of troubleshooting are you
likely to be?
• ANSWER:
• Bringing a system "back to base" means re-building a troublesome system from its
core components. You can then add extra devices one by one until the source of the
fault is revealed. This can be time-consuming so is likely to be something you would
try if you are testing a theory of probable cause unsuccessfully, and you need to
establish a new theory.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Activity 1-2: Discussing Troubleshooting Methodology
• ANSWER:
• You could consult a colleague, refer to product documentation, or search the web. It
might also be appropriate to escalate the problem to more senior support staff.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Activity 1-2: Discussing Troubleshooting Methodology
• ANSWER:
• Identify any negative consequences in applying the software patch, then devise an
implementation plan to install the file. You need to schedule the work so as to
minimize disruption. You should also make a plan to rollback the installation, should
that prove necessary.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Activity 1-2: Discussing Troubleshooting Methodology
• ANSWER:
• Test that the fix works and that the system as a whole is functional. You might also
implement preventative measures to reduce the risk of the problem occurring again.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Activity 1-2: Discussing Troubleshooting Methodology
• What is the last step in the best practice methodology for troubleshooting
and how might it be implemented?
• ANSWER:
• Document findings, actions, and outcomes. You can use spreadsheet or database
tools, but using ticket-based management system software to create incident logs is
best.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Topic C: Use Windows Features and Tools
Exam Objectives::
• 1002-1.4 Given a scenario, use appropriate Microsoft command line
tools.
• 1002-1.5 Given a scenario, use Microsoft operating system features and
tools.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
• 1002-2.6 Compare and contrast the differences of basic Microsoft
Windows OS security settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Windows Settings and Control Panel (Slide 1 of 2)
Control Panel: Management interface for configuring Windows
settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Windows Settings and Control Panel (Slide 2 of 2)
• Windows Settings:
• Touchscreen enabled
• Most (but not all) configuration
settings are here
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
User Accounts (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
User Accounts (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
User Accounts (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
UAC (Slide 1 of 2)
• Confirmation of administrative
rights usage.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
UAC (Slide 2 of 2)
• UAC configuration
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Administrative Tools (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Administrative Tools (Slide 2 of 3)
• Component Services
• Computer Management
• Data Sources
• Event Viewer
• Local Security Policy
• Print Management
• Reliability and
Performance
Monitoring
• Services
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Administrative Tools (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Access Options for System Tools (Slide 1 of 2)
• Computer or This PC
• WinX/Power Users menu
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Access Options for System Tools (Slide 2 of 2)
• Management consoles:
• devmgmt.msc
• diskmgmt.msc
• compmgmt.msc
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Command Line Tools (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Command Line Tools (Slide 2 of 4)
• Run as administrator
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Command Line Tools (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Command Line Tools (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Windows Shutdown Options
• Shut down
• Standby/Sleep
• Hibernate
• Log off
• Switch user
• Lock
• Restart
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
The Windows Registry (Slide 1 of 2)
• The Registry
• Stores configuration
information for hardware,
OS, and apps.
• Structure:
• Root keys
• Subkeys
• Values
• Hives
• Registry Editor (regedit)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
The Windows Registry (Slide 2 of 2)
• Registration files
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Activity 1-3: Discussing Windows Features and Tools
• A user asks you how they can change Ease of Access settings. In which
management interface(s) are these settings located in the different
versions of Windows?
• ANSWER:
• User-level features like this are configured via the Control Panel in Windows 7. In
Windows 8 and Windows 10, there are Ease of Access settings in both the Control
Panel and in the PC Settings/Windows Settings app but don't worry if you just
answered "Settings app." It is also worth remembering that you can use Instant
Search to return a list of user configuration options quickly.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Activity 1-3: Discussing Windows Features and Tools
• You receive a call from a Windows 7 user who wants to "speed his
computer up." After questioning him, you find that he is actually getting
frustrated at having to click through UAC authorizations. He asks how to
turn them off. Explain how this is done. Should you offer any other
advice?
• ANSWER:
• There are several ways to disable User Account Control (UAC) but the simplest is via
the User Accounts applet in Control Panel. You can also just search for "UAC" to open
the dialog box. You should advise the customer that UAC is an important security
feature and that by disabling it, his computer will be more vulnerable to malware.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Activity 1-3: Discussing Windows Features and Tools
• ANSWER:
• True—the contents do vary from version to version though.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Activity 1-2: Discussing Windows Features and Tools
• ANSWER:
• A Microsoft Management Console (MMC) is used for Windows administration.
Running mmc opens an empty console. You would do this to create a custom toolkit of
the snap-ins used to configure advanced features of Windows. You can save the
custom console for future use.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Activity 1-3: Discussing Windows Features and Tools
• You are attempting to run a command but receive the message The
requested operation requires elevation. What must you do to run the
command?
• ANSWER:
• Open a new command prompt window with sufficient privileges. You can right-click the
Command Prompt icon and select Run as administrator or press Ctrl+Shift+Enter with
the icon selected.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Activity 1-3: Discussing Windows Features and Tools
• Why might you run the shutdown command with the /t switch?
• ANSWER:
• To specify a delay between running the command and shutdown starting. You might
do this to give users a chance to save work or to ensure that a computer is restarted
overnight.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Activity 1-3: Discussing Windows Features and Tools
• ANSWER:
• This tool allows you to make manual changes to the Window Registry database. You
can also use it to export and back up portions of the registry. You might also import
registry files to apply a suggested fix.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Topic D: Manage Files in Windows
Exam Objectives:
• 1002-1.4 Given a scenario, use appropriate Microsoft command line
tools.
• 1002-1.5 Given a scenario, use Microsoft operating system features and
tools.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
• 1002-2.6 Compare and contrast the differences of basic Microsoft
Windows OS security settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Windows File and Folder Management Tools
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
System Hierarchies in Windows Versions (Slide 1 of 3)
• Windows 7
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
System Hierarchies in Windows Versions (Slide 2 of 3)
• Windows 8
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
System Hierarchies in Windows Versions (Slide 3 of 3)
• Windows 10
• Quick access
• Desktop
• OneDrive
• User account
• This PC
• Libraries
• Network
• Control Panel
• Recycle Bin
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Drives, Folders, and Files
Root directory: Top of the file directory structure on a drive.
File extension: Characters at the end of a file name; used by an
OS to identify the application that is associated with a file.
• Local drives.
• Folder creation rules:
• Unique names within a folder.
• No reserved characters
\/:*?<>|
• Full path: no more than 260
characters.
• File creation.
• Text or binary data.
• File name extensions.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
System Files
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
File Attributes
Attribute: A characteristic that can be associated with a file or folder
that provides the operating system with important information about
the file or folder and how it is intended to be used by system users.
Attribute Usage
Prevents changes being saved back to the file. The user will be
Read-only (R)
prompted to create another file containing the modified data.
Specifies whether the file is visible in the default view (it is possible to
Hidden (H)
adjust Windows to display hidden files and folders, though).
System (S) Specifies that the file should not be accessible to ordinary users.
Archive (A) Shows whether a file has changed since the last backup.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
Permissions
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Folder Options (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Folder Options (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Folder Options (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Directory Navigation at the Command Prompt (Slide 1 of
3)
• Command prompt shows your location in the directory structure.
• If you are at C:\, the command prompt is C:\>
• Default drives:
• Standard user: C:\%HomePath%
• Administrator: C:\Windows\System32
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Directory Navigation at the Command Prompt (Slide 2 of
3)
• Changing the current directory with the cd command.
• Full path
• Subdirectory
• Parent directory
• Drive root
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Directory Navigation at the Command Prompt (Slide 3 of
3)
Wildcard: A special character that is used to substitute characters
in a string.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
File Management at the Command Prompt
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Activity 1-5: Discussing File Management In Windows
• ANSWER:
• The Windows folder (or system root) contains the files used to run Windows itself.
Program Files contains the executable and settings files installed by desktop
applications. You might also mention that the Users folder contains user settings files,
user-specific application data, and user-generated data files. There are also some
additional hidden folders (notably ProgramData) but do not worry if you have not
included these.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Activity 1-5: Discussing File Management In Windows
• ANSWER:
• False—this is one of the main reasons for using libraries. They can consolidate a
"view" of files stored in different locations on different file systems. This includes
shared folders on network servers and removable drives.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Activity 1-5: Discussing File Management In Windows
• You receive a call from a user trying to save a file and receiving an
"Access Denied" error. Assuming a normal configuration with no
underlying file corruption, encryption, or malware issue, what is the cause
and what do you suggest?
• ANSWER:
• The user does not have "Write" or "Modify" permission to that folder. If there is no
configuration issue, you should advise the user about the storage locations permitted
for user-generated files. If there were a configuration issue, you would investigate why
the user had not been granted the correct permissions for the target folder.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Activity 1-5: Discussing File Management In Windows
• ANSWER:
• The user must first show file extensions, using the View tab in the Folder Options
applet. In Windows 8/10, extensions can be shown through a check box on the View
menu ribbon. The user can then right-click the file and select Rename or press F2 and
overtype the extension part.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Activity 1-5: Discussing File Management In Windows
• ANSWER:
• Change the directory focus to the parent directory (equivalent of Up One Folder).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Activity 1-5: Discussing File Management In Windows
• ANSWER:
• The robocopy command offers more options than xcopy so will usually be the better
choice. The copy command is quite basic and probably not suitable.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Topic E: Manage Disks in Windows
Exam Objectives:
• 1002-1.3 Summarize general OS installation considerations and upgrade
methods.
• 1002-1.4 Given a scenario, use appropriate Microsoft command line
tools.
• 1002-1.5 Given a scenario, use Microsoft operating system features and
tools.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
Disk Partitions
Partitioning: The act of dividing a physical disk into logically
separate storage areas, often referred to as drives.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
File Systems (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
The Windows Disk Management Console (Slide 2 of 6)
• Disk initialization
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
The Windows Disk Management Console (Slide 3 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111
The Windows Disk Management Console (Slide 4 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
The Windows Disk Management Console (Slide 5 of 6)
• Drive formatting
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 113
The Windows Disk Management Console (Slide 6 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 114
Disk Arrays (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 115
Disk Arrays (Slide 2 of 2)
• Volume management
• Breaking the mirror.
• Removing the mirror.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 116
Drive Status Indicators
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 118
Storage Spaces (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 119
Mount Points and Disk Images
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 120
Disk and Volume Management at the Command Prompt
(Slide 1 of 2)
• The diskpart command
• Basic process:
• Run diskpart
• Enter select disk 0
• Enter detail disk
• Enter select partition
(volume) 0
• Enter detail partition
(volume)
• Enter exit
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 121
Disk and Volume Management at the Command Prompt
(Slide 2 of 2)
• The format command:
• Formats a drive and removes all existing data.
• Syntax: format volume switches
Switch Use
/fs: Specify the file system (NTFS, FAT, or FAT32).
Specify the size of allocation units (512, 1024, 2048, 4096, 8192, 16K,
/a: 32K, 64K).
Force the volume to dismount. This will cause file errors for users with
/x files open on the volume.
Enable file compression if using NTFS. Avoid enabling compression on
/c the drive root, especially if the drive contains system files.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 122
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 123
Activity 1-6: Discussing Windows Disk Management
• ANSWER:
• Three—each partition can use a different file system.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 124
Activity 1-6: Discussing Windows Disk Management
• What is the difference between the boot partition and the system
partition?
• ANSWER:
• The system partition contains the boot files; the boot partition contains the system root
(OS files).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 125
Activity 1-6: Discussing Windows Disk Management
• ANSWER:
• GPT-style partitioning.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 126
Activity 1-6: Discussing Windows Disk Management
• ANSWER:
• False—assigning a drive letter is common practice, but a partition can be mounted to
any point in the file system.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 127
Activity 1-6: Discussing Windows Disk Management
• ANSWER:
• The disk was configured as dynamic under a different computer then installed in this
one. You need to import the disk to make it usable.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 128
Activity 1-6: Discussing Windows Disk Management
• A customer with a Windows 10 Home computer contacts you. She stores family
photos on the computer's hard disk, but says she has read about disk failure and
worries that they might be at risk. Is she right to be concerned and what solutions
can you suggest?
• ANSWER:
• The customer is right to consider the risk and take steps to mitigate it. One option is to make a
backup of the files so that they are always stored on at least two devices. You could also suggest
configuring the RAID-like functionality available with the Storage Spaces feature of Windows 10.
Note that you cannot recommend Dynamic Disks as that is not available with the Home edition.
Using both Storage Spaces and an offsite backup method, such as copying to a cloud drive, will
give the best protection.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 129
Activity 1-6: Discussing Windows Disk Management
• Is the command format d: /fs:exfat /q valid? If so, what is its effect, and
what precaution might you need to take before running it?
• ANSWER:
• Yes, it is valid. It formats drive D with the exFAT file system by using a quick format
(does not scan for bad sectors). This will delete the file table on the drive so existing
data files can be overwritten—the formatted drive will appear to be empty in Explorer.
If there are existing files that need to be preserved, they should be backed up before
running the format command.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 130
Activity 1-6: Discussing Windows Disk Management
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 131
Activity 1-6: Discussing Windows Disk Management
• ANSWER:
• You should be able to identify that a mirrored volume has been configured using the
Dynamic Disks feature. One of the disks is missing—you cannot tell why from the
screenshot, but it could have been physically removed or is damaged. You might also
be able to identify from the Failed redundancy message that the volume has been
reactivated, so data files are still accessible. The volume is at risk though, as failure of
the remaining disk would result in complete data loss. You need to back up files on the
volume as a matter of urgency. You should then either repair the mirror with the old
drive or a new drive. If it is not possible to repair the mirror, you should recreate it with
a new disk and restore files from backup.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 132
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 133
Topic F: Manage Devices in Windows
Exam Objectives:
• 1002-1.5 Given a scenario, use Microsoft operating system features
and tools.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 134
Power Options
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 135
Display and Sound Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 136
Hardware Device Configuration and Management
(Slide 1 of 4)
Plug and Play: Universal Plug-and-Play (UPnP) is a protocol
framework allowing network devices to autoconfigure services,
such as allowing a games console to request appropriate settings
from a firewall.
• Windows automatically detects new or changed hardware, finds drivers, and
installs and configures the device.
• Minimal user input includes installing vendor’s driver.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 137
Hardware Device Configuration and Management (Slide 2
of 4)
• Add Hardware Wizard
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 138
Hardware Device Configuration and Management (Slide 3
of 4)
• Devices and Printers:
• Windows 7 and 8
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 139
Hardware Device Configuration and Management (Slide 4
of 4)
• Devices page in Windows
Settings:
• Windows 10
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 140
Device Manager (Slide 1 of 3)
• Device Manager:
• Verification of
installation
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 141
Device Manager (Slide 2 of 3)
• Device Manager:
• Troubleshooting
• Updates
• Device properties
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 142
Device Manager (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 143
Hardware Diagnostics (Slide 1 of 3)
• Troubleshooting app
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 144
Hardware Diagnostics (Slide 2 of 3)
• System Information
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 145
Hardware Diagnostics (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 146
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 147
Activity 1-8: Discussing Windows Device Management
• You are supporting a user with a Windows 10 Home PC. The user has installed a
computer game, but the game will not run. The computer is fitted with a dedicated
graphics adapter. You determine that the adapter driver should be updated, but
there is no newer driver available via Windows Update. How should you proceed?
• ANSWER:
• Browse the graphics adapter vendor's website and use the card's model number in the driver
search tool to look for the latest version. Compare the version information for the driver on the
website to the installed version (use Device Manager to check the installed version number). If the
website driver is newer, download and run the setup file to install and configure it. You should
ensure that the setup file is digitally signed by the vendor. If the driver is only provided as a
compressed archive, extract the driver files then use the Update Driver button in Device Manager
to select it for use with the adapter.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 148
Activity 1-8: Discussing Windows Device Management
• You are supporting a user who has installed a vendor keyboard driver.
The keyboard no longer functions correctly. Under Windows 10, what are
the steps to revert to the previous driver?
• ANSWER:
• Open Device Manager from the WinX menu, Instant Search, or the Computer
Management console. Expand Keyboards then right-click the device and select
Properties. On the Driver tab, select Rollback Driver.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 149
Activity 1-8: Discussing Windows Device Management
• ANSWER:
• There is an automated Windows Troubleshooting tool for diagnosing and correcting
problems with audio playback. You should advise the customer to open the
Troubleshooting applet in Control Panel and select the troubleshooter for audio
playback.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 150
Activity 1-8: Discussing Windows Device Management
• You are troubleshooting an issue with a wireless adapter. When you open
Device Manager, you find the device's icon is shown with a down arrow
superimposed. What does this mean and why might this configuration
have been imposed?
• ANSWER:
• The icon indicates that the device has been disabled. It could be that there was a fault
or there may be a network configuration or security reason for disabling the adapter. In
this sort of situation, use incident logs and device documentation to establish the
reason behind the configuration change.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 151
Activity 1-8: Discussing Windows Device Management
• Identify how to open the tool shown in this exhibit. (Screenshot used with
permission from Microsoft.) What single word command can you use to
open the tool shown in the exhibit? For what sort of troubleshooting task
might you need to use the information shown?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 152
Activity 1-8: Discussing Windows Device Management
• ANSWER:
• Run the System Information tool using the msinfo32 command. Each hardware device
uses hardware resources such as an Interrupt Request (IRQ) line to communicate
with the processor. You might need to investigate these if using devices that are not
Plug-and-Play compatible.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 153
Activity 1-8: Discussing Windows Device Management
• You are assisting a laptop user. While she was away from her desk, the
laptop has powered off. The user was in the middle of working on a file
and had forgotten to save changes. Can you reassure her and advise on
the best course of action?
• ANSWER:
• When a computer goes into a power saving mode, it will either maintain a small
amount of power to the memory modules or write the contents of memory to a
hibernation file on disk. Consequently, the user should be able to start the laptop again
and the desktop will resume with the open file still there. You should advise the
customer to save changes to files regularly however.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 154
Reflective Questions
2. Which Windows features and tools do you think you will use most often and
why?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 155
Installing and Configuring PC
Components
Topic A: Use Appropriate Safety Procedures
Exam Objectives:
• 1002-4.4 Explain common safety procedures.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Installing and Configuring PC Components
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Local Government Regulations
• Types of regulations:
• Health and safety laws.
• Building codes.
• Environmental regulations.
• OSHA is a prime example of safety regulations for US-based operations.
• Workplace free from recognized hazards.
• Personal protective equipment.
• Communication (labels, MSDSs, and hazmat training).
• Employers and employees both have responsibilities.
• Employers provide a safe workplace.
• Employee actions promote safety of themselves and others.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Health and Safety Procedures
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
General Emergency Procedures
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Electrical Hazards
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Fuses
Fuse: A circuit breaker designed to protect the device and users of
the device from faulty wiring or supply of power (overcurrent
protection).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Equipment Grounding (Slide 1 of 2)
Ground: A safe path for electrical current to flow away in the event
that a device or cable is faulty.
• Creates a path of least resistance for electrical current to flow away and cause
no damage.
• Ground achieved for most PCs by connecting the power cord to an electrical
outlet.
• You might need to establish ground for equipment racks or
other systems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Equipment Grounding (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
High Voltage Device Safety
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Electrical Fire Safety
• When excessive current flows through a cable, the cable gets hot.
• Adjacent flammable materials could ignite.
• Use fire extinguishers designed for electrical fires.
• CO2 extinguishers with a black label are optimal.
• Dry powder extinguishers can damage electronic equipment.
• Be sure to cut the power supply.
• Know where the master switches are for the buildings
you work in.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Guidelines for Working Safely with Electrical Systems
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Environmental Safety
Category Description
Trip hazards • Caused by objects being placed in pathways where people walk.
• Cables, boxes, furniture, etc.
Lifting and carrying • Lifting heavy objects can cause back injuries.
risks • Dropped objects can cause leg or foot injuries.
• Bulky objects can also cause problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Toxic Waste Handling
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Guidelines for Working Safely Among Environmental
Hazards (Slide 1 of 2)
• Secure cables with ties or other cable management products.
• Keep devices and other objects out of walkways and away from desk edges.
• Consider weight limitations as you lift or carry items.
• If necessary, use protective clothing.
• To lift heavy objects:
• Plant your feet around the object with one foot slightly toward your destination.
• Bend at the knees while keeping your back straight and chin up.
• Get a firm grip and lift smoothly by straightening your legs.
• As you carry the object, keep your back straight.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Guidelines for Working Safely Among Environmental
Hazards (Slide 2 of 2)
• To lower heavy objects, reverse the lifting process. Don’t trap your fingers or
lower the object onto your feet.
• Ask a colleague for assistance or use a cart for bulky or excessively heavy
items.
• To work with toxic materials:
• Don’t disassemble or stack CRT monitors.
• Use gloves and goggles when working with corrosive materials.
• Use air filter masks when working with toner.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
ESD
Electrostatic discharge (ESD): A situation that occurs when
electrons rush from one statically charged body to another with an
unequal charge, following the path of least resistance.
• Caused by excessive static electricity.
• High voltage, but low current.
• Less dangerous to humans than to electronics.
• People feel ESD at 2,500V; equipment can be damaged by as little as 100V.
• ESD generators:
• Synthetic clothing.
• Low humidity.
• Cooler temperatures.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Component Handling (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Component Handling (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Component Handling (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Guidelines for Protecting Components from ESD
Damage
• Use proper component handling and storage procedures whenever you are
performing PC maintenance work.
• To protect components and equipment from ESD damage:
• Drain your body and clothing of static electricity before you start work.
• If possible, work in an uncarpeted area.
• The simplest (but least effective) means of self-grounding is to touch an unpainted
metal part of the PC.
• Try to handle vulnerable components by their edges, and avoid touching the surfaces
of the chips themselves.
• Use ESD wrist or ankle straps and dissipative floor mats.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 2-1: Implementing an Anti-ESD Service Kit
• ANSWER:
• An anti-ESD service kit comprising an anti-ESD wrist strap, grounding cord and plug,
and a conductive mat. The grounding plug should be connected to an earthed point.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 2-1: Implementing an Anti-ESD Service Kit
• True or False? If you are using an anti-static floor mat, you do not need
any other anti-ESD service equipment.
• ANSWER:
• False. A mat should be used with a wrist strap. You may also need ESD-safe
packaging for storing components.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity 2-1: Implementing an Anti-ESD Service Kit
• ANSWER:
• During cool, dry conditions when humidity is low. When humidity is high, the static
electricity can dissipate through the moisture present in the air.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 2-1: Implementing an Anti-ESD Service Kit
• ANSWER:
• Yes, you could receive a thermal burn from the head of an electric arc or electric
equipment. Your clothes can catch on fire, or your skin can be burned.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 2-1: Implementing an Anti-ESD Service Kit
• ANSWER:
• Power supplies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Activity 2-1: Implementing an Anti-ESD Service Kit
• ANSWER:
• Fuse
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Activity 2-1: Implementing an Anti-ESD Service Kit
• ANSWER:
• The main concern is damaging your back. Lift slowly using your legs for power not
your back muscles.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Activity 2-1: Implementing an Anti-ESD Service Kit
• ANSWER:
• Check that there is a clear path to the destination point. If you cannot carry the object
safely, get help or use a cart.
Use Appropriate Safety Procedures
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Topic B: PC Components
Exam Objectives:
• 1001-3.5 Given a scenario, install and configure motherboards, CPUs,
and add-on cards.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
System Case Types (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
System Case Types (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
System Case Types (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Parts of the System Case (Slide 1 of 4)
Cover: The removable portion of the system case that allows
access to the motherboard and internal components.
Front panel: The portion of the system case that provides access
to removable media drives, power switch, and LEDs to indicate
driver operation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Parts of the System Case (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Parts of the System Case (Slide 3 of 4)
Rear panel: The portion of the system case with cut-out slots
aligned with the position of adapter card slots.
Adapter card: Circuit board providing additional functionality to the
computer system.
Blanking plate: Metal strips that cover unused adapter slots in the
case so that proper air flow is maintained within the system case.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Parts of the System Case (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Repair or Replace?
Field replaceable unit (FRU): An adapter or other component that can
be replaced by a technician on-site. Most PC and laptop components are
FRUs, whereas the components of smartphones are not.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Guidelines for PC Disassembly
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Motherboards
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Motherboard Form Factors
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Motherboard Connector Types
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
CPU Sockets
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Memory Slots
Random access memory (RAM): The principal storage space for
computer data and program instructions. Volatile memory that loses
data when there is no power.
• Volatile memory.
• Normally packaged as DIMMs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Chipset and Memory Architecture
• Controller types:
• System memory.
• I/O.
• Integrated video, sound, and network interfaces.
• Chipsets are not upgradeable.
• CPU/memory link determines performance.
• Northbridge/Southbridge is legacy architecture.
• Different architectures now used, including on-die controllers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
CMOS and RTC Batteries (Slide 1 of 2)
Complementary metal-oxide semiconductor (CMOS): A type of
integrated circuit with a wide range of applications, including static
RAM (for firmware and flash memory) and imaging sensors.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
CMOS and RTC Batteries (Slide 2 of 2)
CMOS battery: Battery that powers the chipset that keeps track of
date and time for the system. Also referred to as RTC battery or
clock battery.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Bus Architecture
Bus: Connections between components on the motherboard and
peripheral devices attached to the computer.
Traces: Wires etched on to the motherboard to provide electrical
pathways.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Internal and External Buses
Local bus: The internal bus that links components directly to the
processor, resulting in the highest possible data speed as required
by components such as the video display.
Expansion bus: The external bus that allows additional
components to be connected to the computer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Expansion Slots (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Expansion Slots (Slide 2 of 2)
Riser card: A space-saving feature of some motherboards that puts
the PC's expansion slots on a separate board installed at right
angles to the main board, allowing system components to fit within a
slimline case.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
System Clock and Bus Speed
System clock: The computer's timing mechanism that
synchronizes the operation of all parts of the computer and
provides the basic timing signal for the CPU.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
PCI Bus (Slide 1 of 3)
Peripheral Component Interconnect (PCI) bus: Introduced in
1995, it connects the CPU, memory, and peripherals. It supports
bus mastering, IRQ steering, and PnP. 32-bit works at 33 MHz. 64-
bit works at 66 MHz.
• Slowly being replaced by PCI Express.
• First commercial version was 2.0.
• Several revisions to the standard since then.
• Standards information: pcisig.com/specifications.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
PCI Bus (Slide 2 of 3)
Feature Description
Bus width and clock • Supports up to 5 devices via Plug-and-Play.
speed • Shared bandwidth.
• Supports bus mastering.
• Architecture:
• 32-bit bus operating at 33.3 or 66 MHz (133 or 266 MBps).
• 64-bit bus operating at 33.3 or 66 MHz (266 or 533 MBps).
Adapter card and • 5V, 3.3V, and dual voltage supported by different form factors and keying.
slot form factors • 5V cards are keyed at pins 50 and 51.
• 3.3V cards are keyed at pins 12 and 13.
• Dual-voltage cards are keyed at both.
• 64-bit cards and adapters have 60 more pins.
• All PCI slots deliver up to 25W of power.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
PCI Bus (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
PCI Express Bus (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
PCI Express Bus (Slide 2 of 3)
• Power features:
• Up to 75W supplied per device via motherboard slot.
• Another 75W available through a PCIe power connector.
• Power management functions available.
• Hot swap and hot plug adapters supported.
• Versions:
• PCIe 2: 500 MBps transfer rates possible.
• PCIe 2.1: Power draw up to 150W, plus 150W via connector.
• PCIe 3: Transfer rates near 1 GBps per lane.
• PCIe 4: Transfer rates near 2 GBps per lane.
• PCIe 5: In development; projected transfer rates near 4 GBps per lane.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
PCI Express Bus (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Storage Bus (SATA and IDE) (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Storage Bus (SATA and IDE) (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Other Motherboard Connectors (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Other Motherboard Connectors (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Activity
Discussing PC Components
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Activity 2-2: Discussing PC Components
• Describe how you would open a PC case to access the motherboard.
• ANSWER:
• Power down the PC and remove the power cable. With the power cable removed,
hold the power button down for a few seconds to ensure PC is completely de-
energized. Then, remove any screws holding the case cover in place, and slide the
cover out from the retaining clips. This should expose the motherboard. You would
usually need to remove other panels only to access storage devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Activity 2-2: Discussing PC Components
• At the rear of a system case are slots for adapter card ports. Why should
these be covered with blanking plates if not in use?
• ANSWER:
• The fan system is designed to draw cool air across the motherboard and blow out
warm air. Large holes in the chassis disrupt this air flow. Also dust will be able to settle
on the system components more easily.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Activity 2-2: Discussing PC Components
• You have been servicing a computer but when you have finished you find
that it will not turn on. There was no power problem before and you have
verified that the computer is connected to a working electrical outlet.
What is the most likely explanation?
• ANSWER:
• The cable connecting the power button to the motherboard could have been
disconnected and either not reconnected or not properly reconnected.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Activity 2-2: Discussing PC Components
• What is the main function of the chipset?
• ANSWER:
• Provides controllers for the CPU to interface with other components (memory and
expansion bus for instance) and adapters to provide functions such as video and
audio, and Ethernet and wireless networking on the motherboard.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Activity 2-2: Discussing PC Components
• True or false? The Real Time Clock controls the timing of signals between
the CPU and other components.
• ANSWER:
• False. The system clock controls timing; the Real Time Clock keeps track of the
calendar date and time.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Activity 2-2: Discussing PC Components
• What type of socket is used to install system memory?
• ANSWER:
• Dual Inline Memory Module (DIMM).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Activity 2-2: Discussing PC Components
• You have a x8 PCIe storage adapter card—can you fit this in a x16 slot?
• ANSWER:
• Yes—this is referred to as up-plugging. On some motherboards it may only function as
a x1 device though.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Activity 2-2: Discussing PC Components
• What is the bandwidth of a PCIe v2.0 x16 graphics adapter?
• ANSWER:
• 8 GBps in each direction (full duplex). PCIe v2 supports 500 MBps per lane.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Activity 2-2: Discussing PC Components
• You also need to help new hires identify the different types of
motherboards used in computers deployed throughout the company.
What type of motherboard is displayed here, and what characteristics did
you use to help you identify the board type? (slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Activity 2-2: Discussing PC Components
• You also need to help new hires identify the different types of
motherboards used in computers deployed throughout the company.
What type of motherboard is displayed here, and what characteristics did
you use to help you identify the board type? (slide 2 of 2)
• ANSWER:
• Based on its small size dimensions and compact component design, this motherboard
is a mini-ITX.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Activity 2-2: Discussing PC Components
• What type of motherboard is displayed here, and what characteristics did
you use to help you identify the board type? (slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Activity 2-2: Discussing PC Components
• What type of motherboard is displayed here, and what characteristics did
you use to help you identify the board type? (slide 2 of 2)
• ANSWER:
• You can tell by the large size and large number of available components and slots that
this motherboard is an ATX.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Topic C: Common Connection Interfaces
Exam Objectives:
• 1001-3.1 Explain basic cable types, features, and their purposes.
• 1001-3.2 Identify common connector types.
• 1001-3.5 Given a scenario, install and configure motherboards, CPUs,
and add-on cards.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Interfaces, Ports, and Connections (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Interfaces, Ports, and Connections (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
I/O Ports and Cables
I/O port: A hardware connection interface on a personal computer that
enables devices to be connected to the computer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
USB Connectors (Slide 1 of 4)
Universal Serial Bus (USB): A hardware interface standard
designed to provide high performance connections for numerous
peripherals with minimal device configuration.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
USB Connectors (Slide 2 of 4)
• Standards:
• USB 2.0: Data rate of 480 Mbps shared among all devices attached to a host.
• USB 3.0:
• SuperSpeed Mode provides bandwidth of 5 Gbps and a full duplex link.
• Introduces dual subcontrollers to split SuperSpeed and legacy devices.
• USB 3.1: SuperSpeed+ Mode provides bandwidth of 10 Gbps.
• USB 3.2: 20 Gbps possible when using USB-C ports and cables.
• Power supplied by host:
• USB 2: 2.5 W per device.
• USB 3: 4.5 W per device.
• USB OTG
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
USB Connectors (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
USB Connectors (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Other Peripheral Connector Types
Port & Connector
Description
Type
Thunderbolt • Primarily used on Apple systems.
• Display or general peripheral interface.
• Lightning bolt icon.
• TB 2 supports links of up to 20 Gbps and allows up to 6 devices to a
port.
• TB 3 uses same interface as USB-C.
Lightning
• Used on iPhone and iPad.
• Reversible connector.
• Restricted to mobile devices, so adapter cables needed to connect to a
PC.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Storage Connector Types (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
Network Connector Types
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
Expansion Cards
Expansion card: A printed circuit board that is installed in a slot on
a system board to provide special functions for customizing or
extending a computer’s capabilities. Also referred to as adapter
card, I/O card, add-in, add-on, or board.
• I/O adapters and storage cards
• NICs and adapters.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Activity 2-3: Identifying Connection Interfaces
• In this graphic, identify the (A) audio ports, (B) video ports, and (C) USB
ports. (slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Activity 2-3: Identifying Connection Interfaces
• In this graphic, identify the (A) audio ports, (B) video ports, and (C) USB
ports. (slide 2 of 2)
• ANSWER:
• Moving from left to right, the components should be labeled: C, B, C, A.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Activity 2-3: Identifying Connection Interfaces
• You are speaking with a junior technician. He is not sure what is meant by
a "keyed" connector. Can you tell him?
• ANSWER:
• A keyed connector has a catch or slot to ensure that it cannot be inserted the wrong
way round or used with an incompatible port.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Activity 2-3: Identifying Connection Interfaces
• What is the nominal data rate of a USB port supporting SuperSpeed+?
• ANSWER:
• Normally 10 Gbps, but devices supporting USB 3.2 can use up to 20 Gbps over USB-
C cabling.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Activity 2-3: Identifying Connection Interfaces
• True or false? USB-C ports and cables are compatible with Apple
Lightning ports and cables.
• ANSWER:
• False.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Activity 2-3: Identifying Connection Interfaces
• What type of device would you connect a Molex cable to?
• ANSWER:
• A Molex cable is a power cable. Normally, devices such as disk drives and optical
drives require more power than can be delivered over the data bus. Note that most
drives actually use SATA power connectors these days.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Activity 2-3: Identifying Connection Interfaces
• Why would you install an I/O adapter card?
• ANSWER:
• To make more or different kinds of ports available (SCSI, USB, or SATA typically).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Topic D: Install Peripheral Devices
Exam Objectives:
• 1001-3.6 Explain the purposes and uses of various peripheral types.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Input Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Keyboards (Slide 1 of 2)
Extended Ergonomic
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Keyboards (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Pointing Devices (Slide 1 of 2)
Mouse
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Pointing Devices (Slide 2 of 2)
Game Controller
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
KVM Switches
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
Security Input Devices (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
Security Input Devices (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
Security Input Devices (Slide 3 of 3)
• Signature pads.
• Used with database of approved signatures.
• Comparison with stored signature verifies
identity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
Installation and Configuration Considerations (Slide 1 of
2)
Plug-and-Play: A protocol framework allowing network devices to
autoconfigure services.
System resources: Settings that enable a device to communicate
with the CPU and memory without the device conflicting with other
devices.
Resource Description
Memory Ranges/ • I/O address map defines each device’s memory addresses.
I/O Addresses • Port addresses range from 0000 to FFFF.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
Installation and Configuration Considerations (Slide 2 of
2)
• Hot swap enables devices to be added or removed without shutting down the
PC.
• Drivers might need to be installed or updated.
• Connections made by plugging devices into the correct port.
• Configuration after installation.
• Device Manager
• Control Panel
• Windows Settings
• Vendor software
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111
Guidelines for Installing Peripheral Devices
• Always read the manufacturer's instructions and check that the device is
compatible with the PC and operating system.
• Hold the connector, not the cable, when removing a lead.
• Inspect the connector and port for damage (notably broken or bent pins) before
attaching a lead.
• Take care to align the connector carefully and do not use excessive force, to
avoid damaging the pins.
• Check whether the device requires an external power source.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 113
Activity 2-5: Discussing Peripheral Device Installation
• A remote user has requested a Dvorak keyboard for use with her
Windows 10 computer. The device has arrived and the user connected it
to a USB port. She contacts support saying that the keyboard "isn't typing
properly.“ What is the likely cause of this issue?
• ANSWER:
• The appropriate keyboard layout has not been selected in Settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 114
Activity 2-5: Discussing Peripheral Device Installation
• You are contacted by another remote user. The user has a laptop and
desktop computer. The user wants to know if there is a device that would
allow them to use the same peripheral devices with both systems without
having to switch cables over all the time. What is your answer?
• ANSWER:
• Yes, you can use a Keyboard Video Mouse (KVM) switch for this purpose.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 115
Activity 2-5: Discussing Peripheral Device Installation
• You are supporting a client setting up a Point of Sale system. Which
peripheral device types or functions should she consider?
• ANSWER:
• A POS system reads the information stored on the customer's payment card or digital
wallet. Historically, this information was stored in the card's magnetic strip. Most POS
devices retain a magnetic reader as a backup mechanism. The majority of bank cards
now also store the account information in an embedded chip, which can be read by
inserting the card into the reader. This chip may also support contactless use or Near
Field Communications (NFC). A customer can also store the card details in a
smartphone and use the smartphone's NFC chip to make payments. Not all POS
readers support contactless
and it would carry a slight price premium, so your client should
decide whether it is important to offer this payment method
to her customers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 116
Activity 2-5: Discussing Peripheral Device Installation
• You have finished copying some files to a USB memory stick. What
should you do before unplugging the stick?
• ANSWER:
• Use the Safely Remove Hardware icon to stop the device.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 117
Reflective Questions
1. Will there be any specialty input devices that you will need to install or configure
at your workplace? How might this affect your day-to-day activities as an IT
professional?
2. Have you encountered situations where appropriate safety procedures were not
followed? Which safety precautions do you think will be most important to
follow?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 118
Installing, Configuring, and
Troubleshooting Display and
Multimedia Devices
Installing, Configuring, and Troubleshooting Display and
Multimedia Devices
• Install and Configure Display Devices
• Troubleshoot Display Devices
• Install and Configure Multimedia Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Install and Configure Display Devices
Exam Objectives:
• 1001-3.1 Explain basic cable types, features, and their purposes.
• 1001-3.5 Given a scenario, install and configure motherboards, CPUs,
and add-on cards.
• 1001-3.6 Explain the purposes and uses of various peripheral types.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Display Device Types
• Monitors
• Projectors
• Virtual reality (VR) headsets
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Monitors
• CRT
• LCD
• DLP
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
VR Headsets
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Display Device Settings and Features
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
VGA Standards
HD 1366x768 16:9
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Display Device Connections and Cables
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
VGA Ports and Connectors
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
HDMI Ports and Connectors (Slide 1 of 2)
• Cable ratings:
• Standard (Category 1)
• High Speed (Category 2)
• Premium High Speed
• Ultra High Speed
• Backwards compatible with DVI-D
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
DisplayPort Ports and Connectors (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
DisplayPort Ports and Connectors (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Thunderbolt and USB-C Ports and Connectors
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Video Adapters and Converters (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Video Adapters and Converters (Slide 2 of 2)
Thunderbolt to DVI
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Video Cards
• Might use system CPU and memory; might have onboard processor and
memory.
• Integrated cards: onboard adapter.
• Usually on low-end PCs.
• Add-on cards in PCIe slots.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Adapter Components
Graphics Processing Unit (GPU): Type of microprocessor used on
dedicated video adapter cards or within a CPU with integrated
graphics capability.
• Clock speed
• Shader units
• Frame rate
• 3D cards need more memory
• Onboard AM: from 2 to 12 GB
• PCIe x16 interface
• At least 1 digital video interface
supported
• Graphics APIs: DirectX and OpenGL
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Configuration Tools for Display Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Multiple Displays (Slide 1 of 2)
• Configuration options:
• Graphics adapter with multiple display ports.
• Multiple graphics adapters.
• Daisy-chaining DP or Thunderbolt monitors.
• Windows display modes:
• Duplicated display.
• Extended display.
• Show only on 1/2.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Multiple Displays (Slide 2 of 2)
Duplicated
Extended
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 3-1: Discussing Display Device Installation and
Configuration
• Look at the following exhibit. What two types of display cabling can be
connected to this laptop? (slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 3-1: Discussing Display Device Installation and
Configuration
• Look at the following exhibit. What two types of display cabling can be
connected to this laptop? (slide 2 of 2)
• ANSWER:
• The image shows a VGA port and an HDMI port (with an RJ-45 network port between
them). The USB ports could be used for a portable monitor.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Activity 3-1: Discussing Display Device Installation and
Configuration
• Which ports are present on the graphics card shown below?
(slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Activity 3-1: Discussing Display Device Installation and
Configuration
• Which ports are present on the graphics card shown below?
(slide 2 of 2)
• ANSWER:
• The port on the left is DVI-I and the one on the right is DisplayPort.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Activity 3-1: Discussing Display Device Installation and
Configuration
• Which interfaces does the adapter cable shown below support?
(slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Activity 3-1: Discussing Display Device Installation and
Configuration
• Which interfaces does the adapter cable shown below support?
(slide 2 of 2)
• ANSWER:
• DVI-I (left) and HDMI.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Activity 3-1: Discussing Display Device Installation and
Configuration
• A customer is shopping for a computer game for her daughter and wants
to know if you can explain the reference to "DirectX" on the packaging?
• ANSWER:
• DirectX is Microsoft's API (Application Programming Interface) for 3D and multimedia
applications. Software such as a computer game will specify a minimum DirectX
version. The graphics card must support this version to run the game. Vendors often
provide support through driver updates, even for older card models.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Activity 3-1: Discussing Display Device Installation and
Configuration
• You are configuring two monitors in extended desktop mode. What
should you configure in the Display dialog box?
• ANSWER:
• Ensure the layout of the displays in the dialog box matches their physical location.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Topic B: Troubleshoot Display Devices
Exam Objectives:
• 1001-5.4 Given a scenario, troubleshoot video, projector, and display
issues.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Common Display Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Guidelines for Troubleshooting Display Devices (Slide 1
of 3)
• Display configuration issues:
• For no image:
• Verify power to the monitor, and make sure it’s not in standby mode.
• Verify connection between video card and monitor.
• Use OSD controls to verify display input.
• Try using the monitor with another PC.
• For a dim image, adjust brightness and contrast controls, and check for power-save
mode.
• For image quality issues:
• Check the video cable and connector.
• Adjust hardware acceleration.
• Adjust resolution.
• Adjust refresh rate.
• Adjust image controls.
• Verify no physical damage
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Guidelines for Troubleshooting Display Devices (Slide 2
of 3)
• Display configuration issues (continued):
• For low resolution or color depth, verify
that the driver is current.
• For oversized images and icons:
• Increase resolution.
• Increase DPI scaling.
• Verify no zoom tool in use.
• For color quality issues:
• Calibrate to scanners and printers.
• Check connectors and cabling.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Guidelines for Troubleshooting Display Devices (Slide 3
of 3)
• Adapter and monitor faults:
• For dead pixels, try software utilities designed to reactivate them, or gently tapping the
affected area of the screen.
• Use screen savers and power-saving modes to avoid burn-in.
• For unexpected objects or patterns being displayed:
• Static artifacts are often caused by a faulty adapter.
• For persistent images on TFT monitors, try shutting off the monitor for several hours.
• Verify the graphics card, driver, and API version support the application or game.
• Try disabling video effects or adjusting to a lower resolution.
• Check for and install updated device drivers.
• For unexpected shutdowns:
• Check the display adapter and driver if you experience BSoD.
• Verify that the graphics adapter is adequately cooled.
• For unauthorized content or HDCP errors:
• Verify that DRM and HDCP are not disabling the display subsystem.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Activity 3-3: Discussing Display Device Troubleshooting
• Imagine that the display you installed is not showing the color blue.
Which component(s) would you prioritize for fault-finding?
• ANSWER:
• The first thing to test is the display cable. If the original cable is properly inserted at the
computer and monitor ends, try replacing it with a known good version. If this does not
fix the problem, inspect the ports for signs of damage.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Activity 3-3: Discussing Display Device Troubleshooting
• ANSWER:
• On a CRT, flickering can occur if the refresh rate is set too low. On a TFT it could
indicate a problem with the backlight. You should also verify that the connectors are
secure and rule out other potential cabling problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Activity 3-3: Discussing Display Device Troubleshooting
• What would you do if the image from a projector appeared narrower at the
top than at the bottom?
• ANSWER:
• Ensure the projector lens is lined up with the whiteboard. You might be able to adjust
the lens position using a knob or have to move the projector. If the projector or lens
cannot be repositioned, there may be a digital keystone correction control.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Activity 3-3: Discussing Display Device Troubleshooting
• ANSWER:
• DVI, HDMI, DisplayPort, and Thunderbolt.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Topic C: Install and Configure Multimedia Devices
Exam Objectives:
• 1001-3.6 Explain the purposes and uses of various peripheral types.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Audio Subsystems (Slide 3 of 4)
Jack Description
Audio in (light A low-level (1V) stereo signal as supplied by most tape decks, video players,
blue) tuners, CD players, and so on.
Mic in (pink) A mono-only analog input.
Audio out (lime) A low-level (1V) analog stereo signal suitable for feeding into amplified
speakers or headphones.
Audio out (black) Carries the signal for rear speakers in a surround sound system.
Audio out (orange) Carries the signal for the subwoofer in a surround sound system.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Audio Subsystems (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Audio Output Devices (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Audio Output Devices (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
MIDI Equipment
Musical Instrument Digital Interface (MIDI): Allows a computer
with a sound card to drive MIDI-compatible musical instruments, or
for a synthesizer to drive a computer audio application
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Sound Recording Equipment
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Headsets
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Audio Settings
• OS tools:
• Windows Sound Control Panel
• Windows Sound Settings
• Hardware volume controls:
• MM keyboards
• Laptop buttons and function keys
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Webcams (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Webcams (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Digital Cameras (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Digital Cameras (Slide 2 of 2)
Resolution Uses
Less than 1 MP Onscreen viewing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Activity 3-5: Discussing Multimedia Device Installation and
Configuration
• What size and color connector would you look for to plug a basic
microphone into a PC?
• ANSWER:
• 3.5mm jack, which is often color coded pink.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Activity 3-5: Discussing Multimedia Device Installation and
Configuration
• You have installed a new sound card in a computer designed for home
entertainment. What type of connector would you use to connect a digital
surround sound speaker system to the new card?
• ANSWER:
• S/PDIF—optical or coax. Coax for audio uses RCA connectors. An optical S/PDIF
connector is also sometimes referred to as TOSLINK. Note that a lot of home
entertainment setups might just output audio over HDMI with the signal from the
graphics adapter.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Activity 3-5: Discussing Multimedia Device Installation and
Configuration
• What type of speaker unit is the ".1" in a 5.1 or 7.1 surround sound
system and where do you suggest this speaker be placed?
• ANSWER:
• Subwoofer for bass (low frequency) response. Start with placing it in the front of the
room, but consider trying other locations to see where you get the best base response
for the space in which the surround sound system is set up.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Activity 3-5: Discussing Multimedia Device Installation and
Configuration
• What type of interface would allow a software program running on the PC
to operate a synthesizer connected as a peripheral device?
• ANSWER:
• MIDI (Musical Instrument Digital Interface).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Activity 3-5: Discussing Multimedia Device Installation and
Configuration
• What sampling rate from a sound card would you require if you want to be
able to record CD-quality sound?
• ANSWER:
• 16-bit @ 44.1 KHz.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Reflective Questions
2. In your current job role, have you had to troubleshoot display device problems?
If so, what did you do and how did you resolve the issues?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Installing, Configuring, and
Troubleshooting Storage Devices
Installing, Configuring, and Troubleshooting Storage
Devices
• Install System Memory
• Install and Configure Mass Storage Devices
• Install and Configure Removable Storage
• Configure RAID
• Troubleshoot Storage Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
System Memory (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
System Memory (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
RAM Types
DRAM: A type of volatile memory that stores each bit of data as
a charge within a single transistor.
SDRAM: A variant on the DRAM chip designed to run at the
speed of the system clock, thus accelerating the periodic refresh
cycle times.
• DRAM:
• Stores each data bit as an electrical charge within a single bit cell.
• Bit cell composed of a capacitor and a transistor.
• Charge dissipates, causing memory to lose information.
• Dynamic memory has to be refreshed to keep the information.
• SDRAM:
• Older technology.
• Synchronized to the system clock.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
DDR SDRAM
RAM Type Memory Clock Bus Clock Data Rate Transfer Rate
(MHz) (MHz) (MT/s) (Gbps)
DDR-200/PC-1600 100 100 200 1.6
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
DDR2/DDR3/DDR4 SDRAM (Slide 1 of 3)
RAM Type Memory Clock Bus Clock Data Rate Transfer Rate
(MHz) (MHz) (MT/s) (Gbps)
DDR2 100 to 266 200 to 533 400 to 1066 3.2 to 8.533
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
DDR2/DDR3/DDR4 SDRAM (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
DDR2/DDR3/DDR4 SDRAM (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Memory Modules (Slide 1 of 3)
Memory module: A printed circuit board that holds a group of
memory chips that act as a single unit.
DIMM: (dual inline memory module) Standard packaging for
system memory. There are different pin configurations for
different RAM types.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Memory Modules (Slide 2 of 3)
RAM Type Pins Voltage
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Memory Modules (Slide 3 of 3)
SODIMM: Memory that is half the size of DIMMs, is available in
32- or 64-bit data paths, and is commonly found in laptops and
iMac systems.
• Laptop RAM.
• DDR and DDR2 have the same number of pins, but the key position is
different.
• Typically fits into slots that pop up at a
45º angle to allow the chips to be inserted or removed.
• Pins:
• DDR 200 pin packages.
• DDR2 200 pin packages.
• DDR3 204 pin packages.
• DDR4 260 pin packages.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Dual-Channel Memory (Slide 1 of 2)
Single-channel memory: Memory with one 64-bit bus between
the CPU and RAM.
Dual-channel memory: Memory controller with two pathways
to the CPU, enabling 128 bits of data transferred per transaction.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Parity and ECC RAM
Parity checking: An error-checking method where each byte of
data in memory is accompanied by a ninth bit used to check for
corrupted data.
Nonparity: System memory that does not perform error
checking.
ECC memory: RAM with built-in error correction security.
• Parity checking:
• Uses 8 bits for memory and 1 bit to check parity.
• Old technology rarely if ever used now.
• Most desktops now use non-parity memory.
• Systems that require a high level of reliability use ECC memory.
• ECC memory has an extra chip and a 72-bit data bus.
• Motherboard must support the use of ECC memory modules.
• Cannot mix ECC and non-ECC modules.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Memory Installation and Upgrade
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Memory Compatibility Issues (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Memory Compatibility Issues (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity
Upgrading Memory
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Storage Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Hard Disk Drives (Slide 1 of 2)
• HDD up to 8 TB.
• Data is stored on metal or glass platters coated with magnetic substance.
• Each platter has:
• Top and bottom read/write heads.
• Heads that float above platters.
• Form factors include 3.5” and 2.5”.
• Height varies: 15 mm , 9.5 mm, 7 mm, and 5 mm.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
HDD Performance Factors (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
HDD Performance Factors (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Storage Adapters and Cables
HBA: (host bus adapter) A component that allows storage
devices to exchange data with a computer system by using a
particular interface.
Drive controller: The circuitry in the disk unit that allows it to
put data on the bus, which the HBA shuttles to the CPU or RAM.
• Connection point for internal mass storage devices.
• Interface between drive, HBA, rest of the system is a type of bus.
• Old technology included PATA and SCSI.
• Most systems now use SATA.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
SATA (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
SATA (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
SATA (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Solid State Drives
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
SSD Interfaces and Form Factors (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
SSD Interfaces and Form Factors (Slide 2 of 2)
• Often used for the OS and applications.
• HDD used for user data files.
• Some SDDs are connected using SATA interface.
• 6 Gbps capacity can be a bottleneck over AHCI logical interface.
• SDDs often communicate directly to the PCIe bus using NVMe.
• PCIe-based SSD:
• Can be implemented as regular PCIe adapter card or AiC.
• Uses the M.2 adapter interface.
• M.2 adapters:
• Are not hot-swappable or hot-pluggable.
• Are smaller than a PCIe adapter.
• Supply the power over the bus.
• Can use up to 4 PCIe lanes.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
SSD Performance Factors (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
SSD Performance Factors (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Hybrid Drives
Hybrid drive: A drive that contains an SSD portion, which
functions as a large cache, containing frequently accessed data;
and a magnetic disk portion, which is spun up only when non-
cached data is accessed.
Host-hinted mode: A SATA standard (version 3.2) that defines a
set of commands to allow the host computer to specify how the
cache should be used.
• SATA 3.2 standard allows host to specify how to use the cache.
• Drive firmware can run self-optimizing routines.
• User does not have direct control over which files are stored in cache.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Dual-Drive Configurations
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Legacy Storage Technologies (Slide 1 of 8)
PATA: Older drive technology that supported two devices per
channel: master and slave. Also referred to as IDE or EIDE.
Channels: Paths between PATA drives and motherboard, called
IDE1 and IDE2 or primary (PRI IDE) and secondary (SEC IDE).
• Uses parallel data transfers, with 6 bits transferred per clock tick.
• Motherboards supporting PATA include 1 or 2 host adapters (“channels”).
• IDE1 or PRI IDE and IDE2 or SEC IDE
• Each PATA channel supports 2 devices.
• 01 and 1.
• Master and slave.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Legacy Storage Technologies (Slide 2 of 8)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Legacy Storage Technologies (Slide 3 of 8)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Legacy Storage Technologies (Slide 4 of 8)
ATA/ATAPI-6 UDMA 5 (Ultra ATA/100) 100 48-bit LBA expansion, and disk
noise reduction
ATA/ATAPI-7 UDMA 6 (Ultra ATA/133) 133 Multimedia streaming
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Legacy Storage Technologies (Slide 5 of 8)
SCSI: (Small Computer Systems Interface) An older personal
computer connection standard that provides high-performance
data transfer between the SCSI device and the other
components of the computer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Legacy Storage Technologies (Slide 8 of 8)
Term Description
SCSI Host adapter • Must be installed and recognized for devices to be detected.
• May require third-party driver to be installed.
Bus width • Originally supported 8 devices.
• Wide SCSI supports up to 16 devices.
• HBA is counted as a device.
Signaling • Most buses and devices use LVD.
• SE devices can be added to an LVD bus.
• HVD is incompatible with LVD and SE devices.
Termination • Bus must be terminated at both ends.
• Termination can be enabled on the device by a switch or by connecting a
terminator pack to the device or HBA.
ID • Each device is allocated a unique ID from 0 to 7 (to 15 for Wide SCSI).
• Can be automatically allocated or set using jumpers or click-wheel on the
device.
• Priority goes 7 to 0, then 15 to 8.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Guidelines for Installing Mass Storage Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Removable Storage
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Optical Media (Slide 1 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Optical Media (Slide 2 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Optical Media (Slide 3 of 9)
• CDs (continued):
• Composed of aluminum foil encased in protective plastic.
• Standard CD is 120 mm diameter.
• 1.2 mm thick.
• Foil layer contains pits and lands arranged in a spiral.
• Changes between pits and lands used to encode data bits.
• CD-R contains photosensitive dye.
• Laser transforms the dye to mimic pits and lands of premastered CDs.
• A type of WORM media.
• After an area has been written to, it cannot be overwritten.
• If space is available, a new session can be started on the disc.
• CD-RW
• Uses a heat sensitive compound to change properties between crystalline and
amorphous by a laser.
• CDs and DVDs have a tendency to degrade and become unusable.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Optical Media (Slide 4 of 9)
• DVDs:
• Higher density than CDs.
• Thinner than CDs.
• Can be dual-layer and/or double-sided.
• Double-sided discs have to be turned over to access the other side.
• Higher transfer rate than CDs.
• Multiples of 1.32 MBps.
• Fastest models are 24x read and write speeds.
• DVD-R/DVD-RW versus DVD+R/DVD+RW versus DVD±R discs.
• Most drives can read all formats.
• Most drives write in either + or – format.
• DVD±R supports dual layer and double-sided media.
• DVD±RW supports double-sided media only.
• DVD-RAM is not widely supported, but is optimized for multiple write operations.
• Well suited to data storage.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Optical Media (Slide 5 of 9)
BD: (Blu-ray disc) Latest generation of optical drive technology,
with disc capacity of 25 GB per layer. Transfer rates are
measured in multiples of 36 MBps.
CD Standard CD Type
Yellow book Data CDs with error correction (Mode 1) or without (Mode 2). Mode 2 makes more
space available but is only suitable for use where small errors can be tolerated.
Orange book Defines the unused CD-MO and the more popular CD-R and CD-RW.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Optical Media (Slide 7 of 9)
DVD-Video Up to 17.1 • Commercially produced DVDs using mpeg encoding and chapters for
navigation.
• Can be single or dual layer and single or double-sided.
DVD-Audio 8.5 • Format for high quality audio.
• Superior sampling rates and 5.1 surround sound, for instance.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Optical Media (Slide 8 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Optical Drives (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Optical Drives (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Flash Memory Devices (Slide 1 of 3)
Solid state storage: Any type of persistent digital storage
technology that does not use mechanical parts.
Flash memory: Similar to a ROM chip in that it retains
information even when power is removed, but it adds flexibility
in that it can be reprogrammed with new contents quickly.
Memory card: Flash drives typically used for digital cameras
and smartphones; typically small and flat.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Flash Memory Devices (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Flash Memory Devices (Slide 3 of 3)
Type of Memory Description
Card
Secure Digital (SD) Maximum capacity
• Original SD cards up to 2 GB.
• SDHC is up to 32 GB.
• SDXC is up to 2 TB.
Speed
• Original specification is up to 25 MBps.
• UHS allows up to 108 MBps.
• UHS-II is rated at up to 312 MBps.
Mini-SD Smaller version of SD cards, with the same capacity and speed designations.
Micro-SD Smallest version of SD cards, using the same capacity and speed designations.
Compact Flash (CF) • Supports up to 512 GB, but no cards were created larger than 256 GB.
• Speed is multiples of 150 Kbps (the same rating as CDs).
• Fastest devices work at 1066x read speeds (160 MBps).
xD Format for Olympus cameras that has been discontinued.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Memory Card Readers (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Memory Card Readers (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
External Storage Drives
Drive enclosure: An external case that holds one or more disks
and typically connects to the computer through USB or
Thunderbolt ports.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
RAID
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
RAID Levels (Slide 1 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
RAID Levels (Slide 2 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
RAID Levels (Slide 3 of 9)
• RAID 1 (Mirroring):
• Requires two hard disks, one being a duplicate of the other.
• Each write operation is duplicated on the second disk, creating a small
performance overhead.
• Read operations can use either disk, which boosts performance slightly.
• If one disk fails, the other takes over.
• When a failed disk is replaced, performance suffers during the resync operation.
• More expensive per gigabyte than other RAID levels (only 50% of space is
available for storage).
• Total volume size cannot exceed available disk capacity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
RAID Levels (Slide 4 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
RAID Levels (Slide 5 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
RAID Levels (Slide 6 of 9)
• RAID 5 (continued):
• Level of fault tolerance and available disk space is inverse.
• Adding disks to the set, fault tolerance decreases.
• Usable disk space increases.
• Parity requirements vary with the number of disks.
• RAID 5 with 3 disks requires 1/3 of each disk for parity, so using three 80-GB disks
provides 160 GB usable disk space.
• RAID 5 with 4 disks requires ¼ of each disk for parity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
RAID Levels (Slide 7 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
RAID Levels (Slide 8 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
RAID Levels (Slide 9 of 9)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
RAID Configuration Options (Slide 1 of 4)
Hardware RAID solution: A method of creating volumes from
an array of physical disks by using a plug-in controller card or
the motherboard, independently of the installed operating
system.
• Entry-level controllers typically support only RAID 0 or RAID 1.
• Typically use SATA drives.
• Mid-level controllers might add support for RAID 5 or RAID 10.
• Hot swap features are typically only available with high-end hardware.
• Requires compatible controllers and disk units.
• New disks are transparently synchronized with other disks in the set.
• Typically uses SCSI (SAS).
• More expensive than a software RAID solution.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
RAID Configuration Options (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
RAID Configuration Options (Slide 3 of 4)
• Software RAID:
• Windows provides options to set up software RAID.
• Uses standard disks and controllers.
• Windows Server and Windows Professional/Enterprise editions support RAID 1
and RAID 5.
• Can use internal disks on varying interfaces.
• Typically cannot use external disks connected through USB or Thunderbolt.
• Windows 10 Storage Spaces feature provides RAID-like functionality for external disks.
• Linux uses Logical Volume Manager to implement various RAID levels.
• Software RAID is typically less expensive than hardware RAID controller cards.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
RAID Configuration Options (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Disk Failures
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Disk Integrity Testing (Slide 1 of 2)
• Disk Integrity Tools
• chkdsk
• S.M.A.R.T.
wmic /node:localhost diskdrive get status
• Run advanced diagnostic tests
• Obtain from hard drive vendor or PC
manufacturer
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Disk Integrity Testing (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Boot Failures (Slide 1 of 2)
• If the hard drive is not detected at boot (or if a second hard drive is not
shown under Windows):
• Verify that the storage device is powering up.
• If inactive, check that the drive has a power connector attached.
• If drive is powered up:
• Check that the boot sequence is set correctly in the PC firmware system setup program.
• Check that there are no removable disks in floppy or optical drives.
• Check the data cables.
• Check that it has not been disabled by a jumper or via system setup.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Boot Failures (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Boot Block Repair (Slide 1 of 2)
MBR: (master boot record) Sector on a hard disk storing
information about partitions configured on the disk.
GPT: (globally unique ID partition table) Modern disk partitioning
system allowing large numbers of partitions and very large
partition sizes.
• Drive not detected at bootup.
• Second drive not recognized or shown in Windows File Explorer.
• Malware:
• Damage to the boot information on the drive.
• Two methods of formatting boot information:
• MBR
• GPT
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Boot Block Repair (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
File Recovery Options (Slide 1 of 2)
• Remove the hard disk from the computer and insert into an external
enclosure.
• Connect external enclosure to a PC via a USB port.
• Mount the externally connected drive through Disk Management or
analyze through file recovery software.
• Try using chkdsk to restore file fragments from bad sectors.
• Files saved as file####.chk files on the root of the volume.
• file####.chk files are rarely directly usable.
• Third-party software might be more successful in accessing the data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
File Recovery Options (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Disk Performance Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Guidelines for Troubleshooting Optical Drives (Slide 1
of 2)
• Troubleshooting read problems in optical drives:
• Most problems related to dirt are caused by dirt on the disc itself. Special
cleaning kits are available for cleaning optical drives.
• If the CD drive is not able to read any CDs, it is likely a hardware problem.
• DVD-Video requires MPEG decoding hardware or software (codecs) to be
installed for playback (included in Windows 7, except Starter and Home Basic).
• A DVD-ROM cannot be read from a CD-ROM drive.
• There is currently no native support for Blu-ray in any version of Windows.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Guidelines for Troubleshooting Optical Drives (Slide 2
of 2)
• Troubleshooting write errors in optical drives:
• Where Windows does not support a particular recordable or rewritable format
directly, third-party software is required.
• Check that you are using the write speed recommended for the brand of discs
you have purchased.
• Most problems are connected to buffer underruns. To prevent these:
• Burn discs at a lower write speed.
• Copy source files to the local hard disk (rather than removable or network drives).
• Avoid using other applications when burning a disc.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Common RAID Configuration Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Guidelines for Troubleshooting RAID Issues (Slide 1 of
2)
• If Windows doesn’t detect RAID during setup or at boot:
• Verify RAID controller drivers are installed.
• Use the RAID configuration utility to verify the status.
• If the configuration utility cannot be accessed, the controller may have failed.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Guidelines for Troubleshooting RAID Issues (Slide 2 of
2)
• If RAID stops working:
• Volume is listed as degraded, but the data on the volume is still accessible.
• Examine event logs in the OS system log.
• Replace failed disks as soon as possible.
• If the volume is unavailable, too many disks may have failed or the controller may
have failed.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Reflective Questions
1. Which types of storage devices have you worked with? Have you installed
additional hard drives or replaced hard drives?
2. What sorts of issues have you experienced with storage devices? How will
the troubleshooting tools and guidelines presented in this lesson help with
future issues?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Installing, Configuring, and
Troubleshooting Internal System
Components
Installing, Configuring, and Troubleshooting Internal
System Components
• Install and Upgrade CPUs
• Configure and Upgrade BIOS/UEFI
• Install Power Supplies
• Troubleshoot Internal System Components
• Configure a Custom PC
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Install and Upgrade CPUs
Exam Objectives:
• 1001-3.5 Given a scenario, install and configure motherboards, CPUs,
and add-on cards.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
CPU
CPU: (central processing unit) The main chip on the system board,
it performs software instructions and mathematical and logical
calculations. Also referred to as the microprocessor or processor.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
CPU Architectures
Instruction set: The machine language code and commands the
CPU can process.
ALU: (arithmetic logic unit) A CPU circuit that performs integer-
based calculations and performs bit-wise logical calculations.
FPU: (floating point unit) A math co-processor built into the CPU that
performs calculations on floating point numbers.
1. Software is assembled into instructions and loaded into system memory.
2. The control unit fetches instructions in sequence from system memory to the
pipeline.
3. The control unit decodes each instruction and either executes it itself or
passes it to the ALU or FPU for execution.
4. The result of the executed instruction is written back to a register or to system
memory.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Instruction Sets
• x86-32 or IA-32
• x64
• Intel IA-64
• AMD AMD64
• Intel EM64T, also known as x86-64 or x64
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Addressing
• System bus between CPU and memory consists of:
• Data bus determines how much data can be transferred per clock cycle.
• Address bus determines how many memory locations the PC can access.
• On modern PCs, the data bus is 64 bits wide.
• Address bus for 32-bit CPUs is 32 or 36 bits wide.
• 32-bit bus can access 4 GB of address space.
• 36-bit bus can access 64 GB of address space.
• Address bus for 64-bit CPUs is usually 48 bits wide.
• 48-bit bus can access 256 TB of address space.
• Done to reduce complexity in compatibility with 32-bit software.
• Theoretically could be 64-bits wide and access 16 Exabytes of address space.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Cache
Cache: A small block of high-speed memory that enhances
performance by preloading instructions and data from system RAM
that the CPU uses regularly.
• Originally implemented as a second chip on the motherboard.
• Now implemented almost exclusively on-die (on the CPU itself).
• Levels
• Level 1 cache is closest to CPU and is smallest and fastest.
• Level 2 cache is a bit larger, and a bit slower than Level 1.
• Levels 3 and 4 are larger and possibly slower than Level 2.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Hyperthreading
Multitasking: The ability of an operating system to run multiple programs,
or tasks, at one time.
Thread: A stream of instructions generated by a software application. Most
applications run a single process in a single thread.
• Superpiplining:
• CPUs process multiple instructions at once.
• Considered superscalar architecture as multiple execution units are required.
• Multithreading:
• Also known as SMT, HT, or HTT.
• Allows multiple threads to run through the CPU at the same time.
• Duplicates many registers of the CPU.
• Reduces amount of CPU idle time.
• The OS thinks more CPUs are installed.
• Works best with multithreaded software (usually runs on servers).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Multiprocessing and Multicore Processors
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Clock Speed
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Overclocking
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Power Management (Throttling)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Other CPU Features (Slide 1 of 2)
• Virtualization extensions.
• Integrated GPU.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
CPU Packaging and Compatibility (Slide 1 of 2)
CPU form factor: CPU packaging and how it connects to the
motherboard.
LGA: (Land Grid Array) Intel technology in which pins that connect
the CPU and socket are located on the socket.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
CPU Packaging and Compatibility (Slide 2 of 2)
PGA: (Pin Grid Array) AMD technology in which pins that connect
the CPU and socket are located on the underside of the processor.
ZIF: (Zero Insertion Force) A processor socket type allowing the
chip to be placed in the socket with as little risk of damaging the
pins on the processor chip as possible.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Cooling Mechanisms (Slide 2 of 3)
• CPU heat sink and fan assembly
• Case fans
• GPU fans
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Cooling Mechanisms (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
CPU Installation Considerations
• Make sure processor matches the type of socket on the system board.
• When upgrading the CPU, check that the new model is supported by the
motherboard.
• On a processor, Pin 1 may be indicated with:
• A beveled corner or a white dot printed in one corner of the processor.
• A square, rather than round, joint where one of the pins is connected to the underside
of the processor.
• A "spur" on one corner of the gold patch on the underside of the processor.
• On a processor socket, Pin 1 may be indicated with:
• A difference in the pattern of pin holes in one corner.
• A "1" printed on the motherboard next to one corner.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 5-1: Discussing CPU Upgrades
• ANSWER:
• The type of CPU socket and chipset provided on the motherboard.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 5-1: Discussing CPU Upgrades
• ANSWER:
• Overclocking—setting the processor to run at a higher clock speed than it was
designed for.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 5-1: Discussing CPU Upgrades
• ANSWER:
• A CPU tends to repeat the same routines and access the same data over-and-over
again. If these routines are stored in fast cache RAM, they can be accessed more
quickly than instructions and data stored in system memory.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity 5-1: Discussing CPU Upgrades
• ANSWER:
• Symmetric Multiprocessing—installing more than one CPU. This requires a
motherboard with multiple CPU sockets.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 5-1: Discussing CPU Upgrades
• How is the heat sink and fan assembly attached, and what problems can
occur releasing it?
• ANSWER:
• The heat sink is attached to the motherboard via a clip or push pins. There will also be
a power connector for the fan. Clip mechanisms can be difficult to release; push pins
are now more common and just require a half turn on each pin with a screwdriver to
release. Another issue can arise where too much thermal paste has been applied,
causing the heat sink to stick to the processor.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 5-1: Discussing CPU Upgrades
• ANSWER:
• That pin 1 is aligned properly and that the pins on the package are aligned with the
holes in the socket. Otherwise, you risk damaging the pins when the ZIF lever is
lowered.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Activity 5-1: Discussing CPU Upgrades
• ANSWER:
• A heat sink uses solid metal fins to dissipate heat through convection (often assisted
by using fans to move air across the fins). A heat pipe contains fluid that evaporates in
the area over the CPU, cools and condenses in another part of the pipe, and then
flows back to the area over the CPU to continue the cycle.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Topic B: Configure and Update BIOS/UEFI
Exam Objectives:
• 1001-3.5 Given a scenario, install and configure motherboards, CPUs,
and add-on cards.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
System Firmware
Firmware: Software stored in memory chips that stores information
whether the computer is turned on or not.
System firmware: Provides low-level code that allows computer
components to be initialized and load the main OS software.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
UEFI
UEFI: (Unified Extensible Firmware Interface) A standard firmware
interface for PCs designed to improve software interoperability and
address the limitations in BIOSs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
System Firmware Setup Programs
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
System Component Settings (Slide 1 of 3)
• CPU features
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
System Component Settings (Slide 2 of 3)
• RAM
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
System Component Settings (Slide 3 of 3)
• Power management
• Date, time, and daylight savings
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Boot Options (Slide 1 of 2)
• Hard drive
• Floppy drive
• Optical drive
• USB
• Network/PXE
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Boot Options (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Interface Configuration Settings
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Security Settings (Slide 1 of 2)
• Authentication:
• Supervisor/Administrator/Setup
• User/System
• Drive locks:
• Password stored in PC firmware
• Password stored in disk firmware
• Full Disk Encryption
• Drive encryption
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Security Settings (Slide 2 of 2)
• TPM
• LoJack
• Intrusion detection
• Secure boot
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Firmware Updates
• Fix bugs.
• Solve incompatibilities.
• Check websites for updates:
• Only apply to resolve specific issues.
• Install critical updates.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• What advantages does UEFI have over BIOS?
• ANSWER:
• UEFI supports 64-bit CPU operation and better hardware support at boot. UEFI also
allows for full GUI system utilities and mouse support plus better system startup
security options (such as pre-OS boot authentication).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• Name three keys commonly used to run a PC's BIOS/UEFI system setup
program.
• ANSWER:
• Esc, Del, F1, F2, F10.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• What widely supported boot method is missing from the following list?
HDD, FDD, Optical, USB.
• ANSWER:
• Network/PXE (Pre-eXecution Environment)—obtaining boot information from a
specially configured server over the network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• Where should you launch a typical firmware upgrade utility—from system
setup or from Windows?
• ANSWER:
• If the option is available, it is safer to run a firmware upgrade from the system setup
program as it reduces the risk of some other process interfering with the update.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• If you want to enforce TPM system security, what other BIOS feature
should you enable?
• ANSWER:
• A supervisor password to prevent the TPM keys from being accessed or cleared.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• True or false? Processor extensions such as VT are set by the vendor
depending on the CPU model and cannot be enabled or disabled by the
user.
• ANSWER:
• Mostly false. A feature such as VT is sometimes disabled on some low-end models,
but if it is available as a feature of that model, the user can choose whether it is
enabled or disabled.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• A user's computer was recently installed with a new optical drive. The
user now reports a "chassis" error message after the POST sequence.
What might be the cause?
• ANSWER:
• Intrusion detection is enabled in the BIOS.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• When you are configuring BIOS security, what is the difference between a
supervisor password and a user password?
• ANSWER:
• The user password allows the boot sequence to continue, while a supervisor
password controls access to the firmware setup program.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Activity 5-3: Discussing BIOS/UEFI Configuration and
Updates
• What security system allows system boot to be disabled if the computer
is reported stolen?
• ANSWER:
• LoJack for Laptops (other tracking software suites are available).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Topic C: Install Power Supplies
Exam Objectives:
• 1001-3.7 Summarize power supply types and features.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Electrical Circuits (Slide 1 of 3)
Voltage: The potential difference between two points measured in
Volts (V).
Current: The actual flow of electrons, measured in Amps (I).
Resistance: A degree of opposition to the current caused by
characteristics of the conductor, measured in Ohms (Ω or R).
Power: The rate at which electricity is drawn from the supply by the
device using it, measured in Watts.
Energy: The amount of power consumed by a device over time,
measured in Kilowatt-hours.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Electrical Circuits (Slide 2 of 3)
DC: (Direct Current) The charge flows in one direction from the
positive to negative terminals of the power source at a constant
voltage.
AC: (Alternating Current) The current flows in both directions
around the circuit and the voltage alternates between low and high
values.
Conductor: A material that is good at conducting electricity, such as
gold, copper, or tin.
Insulator: A material that does not conduct electricity, such as
rubber or plastic.
Semiconductor: A material that can act as both a conductor and an
insulator.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Electrical Circuits (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
PSU
PSU: (Power Supply Unit) An internal hardware component that
delivers Direct Current (DC) low voltage power to the PC
components.
• Contains:
• Transformers
• Filters
• Regulators
• Fan
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
PSU Form Factors
• ATX
• Most common
• EPS12V
• Server class
• Micro-ATX
• SFX12V
• TFX12V
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Input Voltage
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
PSU Power Ratings
Power rating: The maximum power output available from a PC
power supply, measured in watts, calculated as voltage multiplied
by current.
• Calculated as V*I
• Desktop PC typically 200-300 W
• Slimline Desktop PC typically 100-200 W
• Tower systems and servers often over 300 W
• Gaming PCs often over 500 W
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Output Voltages
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
PSU Adapter Types (Slide 1 of 3)
Voltage regulator: A module that ensures the motherboard delivers
the voltage required by the CPU.
Main connector: The adapter from the power supply that supplies
power to the motherboard.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
PSU Adapter Types (Slide 2 of 3)
Molex connector: A power connector that is used to supply power
to Parallel Advanced Technology Attachment (PATA) drives, optical
drives, and SCSI drives.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
PSU Adapter Types (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Power Needs Calculation (Slide 1 of 2)
1. List the devices that need to have power served by the PSU. Be sure to
include the following:
• Motherboard
• CPU
• RAM
• Hard drives
• CD drives
• DVD drives
• Floppy drives (if any)
• Expansion cards
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Power Needs Calculation (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Activity 5-4: Discussing Power Supply Installation
• ANSWER:
• Multiply its voltage by the current it draws (W=V*I).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Activity 5-4: Discussing Power Supply Installation
• ANSWER:
• Excess current.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Activity 5-4: Discussing Power Supply Installation
• What is the significance of a PSU's power output when you are designing
a custom build PC?
• ANSWER:
• It determines the number of drives, expansion cards, and peripherals that the PC can
support (assuming the peripherals do not have their own power supplies).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Activity 5-4: Discussing Power Supply Installation
• Are you able to use a standard ATX12V PSU with a Mini-ITX motherboard?
• ANSWER:
• Yes (assuming it fits in the case you have chosen).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Activity 5-4: Discussing Power Supply Installation
• You have a power supply with an 8-pin connector on it. What is this for?
• ANSWER:
• It supplies power to a PCI Express graphics card.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Activity 5-4: Discussing Power Supply Installation
• You are connecting a new PSU. The PSU has a square 4-pin P4 cable but
there is no square 4-pin receptacle on the motherboard. Should you leave
the cable disconnected?
• ANSWER:
• No; it will plug into an 8-pin EPS12V receptacle near the CPU. You should check the
motherboard documentation for advice about which pins to plug the cable into.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Activity 5-4: Discussing Power Supply Installation
• ANSWER:
• That the voltage selector is set to the correct voltage (or if there is no selector, that the
PSU is suitable for the voltage used by the building power).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Activity 5-4: Discussing Power Supply Installation
• Another technician replaced the PSU on a PC. Later the same day the
PC's owner contacts you to say that the system has been displaying
numerous alerts about high temperature. What do you think might be the
cause?
• ANSWER:
• You would need to open the case to investigate the problem. Perhaps when the
upgrade was performed, one of the fan power connectors was not attached properly. If
the PSU cabling was not secured with cable ties, it could disrupt air flow within the
case, reducing the effectiveness of fans.
There could be a fault with the fan on the new PSU.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Topic D: Troubleshoot Internal System Components
Exam Objectives:
• 1001-5.2 Given a scenario, troubleshoot problems related to
motherboards, RAM, CPUs, and power.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Basic Hardware Problems
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Power Problems (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Power Problems (Slide 2 of 2)
No Power
• Check that other equipment in the area is working; there may be a blackout.
• Check that the PSU cabling is connected to the PC and the wall socket
correctly and that all switches are in the "on" position.
• Try another power cable—there may be a problem with the plug or fuse.
• Check that all of the wires are connected to the correct terminals in the plug.
• Check the fuse resistance with a multimeter.
• Try plugging another piece of "known-good" equipment (such as a lamp) into
the wall socket.
• Try disconnecting extra devices, such as optical drives.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Multimeter Use (Slide 1 of 3)
Multimeter: An electrical meter capable of measuring voltage,
resistance, and current.
• To test a fuse, set the multimeter to measure resistance and touch the probes
to each end of the fuse.
• A good fuse should have virtually zero Ohms of resistance.
• A blown fuse will have virtually infinite resistance.
• Power supply problems can be indicated by otherwise inexplicable system lockups or
unprompted reboots.
• PC power supplies are NOT user-serviceable.
• Do NOT attempt any maintenance beyond the simple tests described.
• Never remove the cover of a power supply.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Multimeter Use (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Multimeter Use (Slide 2 of 3)
Ground Black - - -
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Power Supply Tester
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
POST and Boot Problems (Slide 1 of 6)
Power-On Self-Test (POST): A hardware checking routine built into
the PC firmware. This test sequentially monitors the state of the
memory chips, the processor, system clock, display, and firmware
itself.
1. POST locates video card firmware at memory address C000.
• If found, card is initialized from its own firmware.
2. Startup screen is displayed.
• More tests are performed, including RAM.
• Any errors are indicated by displaying text messages.
3. If desired, access system setup routine at this point.
4. Most computers boot silently, but some may emit a single beep to indicate
system checks have been successfully completed.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
POST and Boot Problems (Slide 2 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
POST and Boot Problems (Slide 3 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
POST and Boot Problems (Slide 6 of 6)
Operating System Search/Boots to Incorrect Device
• After POST tests, firmware searches devices in specified boot sequence.
• If first drive is not found, it moves to the next drive.
• If no disk-based boot device is found, it might try to boot from a network.
• If no boot device is found, an error message is displayed, and the boot process
is halted.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
OS Boot Troubleshooting and Log Entries (Slide 1 of 2)
• When boot device is located, code from boot sector is loaded into memory.
• Code from boot sectors takes over from system firmware to load the rest of the
OS into system memory.
• Error messages after this point are usually software or driver problems.
OS Boot Issues
• If system tries to boot to the wrong device, verify removable media is not in a
drive or connected that might interfere with the boot process.
• Verify boot device order is correctly configured.
• Examine log entries:
• In Windows, use Event Viewer to analyze System and Applications logs.
• In Linux, review boot messages using dmesg | less command.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
OS Boot Troubleshooting and Log Entries (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Motherboard Component Problems (Slide 1 of 4)
Distended capacitors: Capacitors that are swollen or bulging or
emitting residue indicates that they have been damaged or could
have failed due to a manufacturing defect.
Chip creep: Cards can work free from a slot over time, though this
is not common.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Motherboard Component Problems (Slide 2 of 4)
• For intermittent device failure, determine that it is not caused by software, disk
problems, or malware.
• See if there is a pattern to the failure.
• If the PC has been on for some time, it could be a thermal or power issue.
• For physical damage, use diagnostic software to run tests.
• Insufficient cooling is the main cause of processor, memory, and motherboard
issues.
• Thermal faults are often cyclic as powering down allows processors and components
to cool down.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Motherboard Component Problems (Slide 3 of 4)
• Visually inspect for physical damage.
• Pins are not bent.
• Dirty contacts on connectors.
• Chips and boards are properly
seated.
• Scorch marks and distended
capacitors.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Motherboard Component Problems (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Activity 5-6: Discussing System Component
Troubleshooting
• What cause might you suspect if a PC experiences intermittent lockups?
• ANSWER:
• Assuming the cause is not recent installation of faulty software or hardware, then
thermal or power problems are most likely. Loose connections or faulty memory or
CPU are also possibilities.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Activity 5-6: Discussing System Component
Troubleshooting
• How might you diagnose a thermal problem?
• ANSWER:
• Feel if the system is hot to touch, check temperature gauges, watch for cyclic
lockup/reboot problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Activity 5-6: Discussing System Component
Troubleshooting
• What measurement would you expect from a multimeter if a fuse is good?
• ANSWER:
• Zero ohms.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Activity 5-6: Discussing System Component
Troubleshooting
• What might stop a POST from executing?
• ANSWER:
• Faulty cabling and connections, poorly-seated chips, faulty interfaces and devices,
logic errors, faulty CPU, motherboard, or PSU.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
Topic E: Configure a Custom PC
Exam Objectives:
• 1001-3.8 Given a scenario, select and configure appropriate
components for a custom PC configuration to meet customer
specifications or needs.
• 1001-3.9 Given a scenario, install and configure common devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
Client Personal Computers (Slide 1 of 2)
Standard (thick) client: A business computer that performs most or all
computing functions on its own. Also referred to as a standard client or
a fat client
User accounts: Each user who wishes to access a Windows computer
will need a logon ID, referred to as a user account.
Thin client: A business computer that relies heavily on another
system, typically a server, to run most of its programs, processes, and
services.
VDI: (Virtual Desktop Infrastructure) Hosting user desktops as virtual
machines on a centralized server or cloud infrastructure. The desktop
OS plus applications software is delivered to the client device (often a
thin client) over the network as an image.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
Client Personal Computers (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
Business Workstations (Slide 1 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
Business Workstations (Slide 2 of 5)
IDE: (Integrated Development Environment) A GUI programming
environment that includes features such as a code editor, code
interpreter or compiler, and the ability to find coding errors.
Virtualization: Software allowing a single computer (the host) to run
multiple guest OSs or VMs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
Business Workstations (Slide 3 of 5)
DTP: (Desktop Publishing) An application similar to word
processing but with more emphasis on the formatting and layout of
documents than on editing the text.
CAD: (Computer Aided Design) Software that makes technical
drawings and schematics easier to produce and revise.
CAM: (Computer Aided Manufacturing) Software that can control
machine tools found in manufacturing environments.
• Design workstations:
• Configured to support graphic design, engineering, and other design-driven jobs.
• High CPU, GPU, and RAM requirements.
• Fast storage and retrieval also needed, so SSDs are commonly used.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111
Business Workstations (Slide 4 of 5)
• Applications include:
• Image editing and illustration tools.
• DTP
• CAD
• CAM
• Peripheral hardware might include digitizer and stylus.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
Business Workstations (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 113
Computers for Home Use (Slide 1 of 6)
Media center: A computer used for media streaming, often
connected to surround sound speakers, and capable of recording
TV shows.
Gaming rig: A computer used for standalone or online gaming,
often connected to surround sound speakers or headphones,
sometimes integrated with virtual reality goggles. May use
specialized gaming equipment such as gaming controllers,
joysticks, gaming mouse and keyboard.
• Fast video, storage, and network connections needed for streaming media and
for gaming.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 114
Computers for Home Use (Slide 2 of 6)
HTPC: (home theater PC) A PC used in place of consumer
appliances such as a PVR to watch and record TV broadcasts and
play movies and music.
PVR: (personal video recorder) Software installed on a home
theater PC (HTPC) to record and watch TV broadcasts.
• HTPC:
• Replaces PVR.
• Watch and record TV broadcasts.
• Requires a TV tuner card to be installed.
• Play music and movies from local files or streaming Internet services.
• Typically controlled with wireless keyboard, mouse, and remote control.
• Computer is typically located near the TV and has an aesthetically pleasing form
factor.
• Often designed to run more quietly than other computers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 115
Computers for Home Use (Slide 3 of 6)
Home server PC: Either a HTPC with a slightly expanded role or a
repurposed desktop or low-end PC server used primarily for file
storage, media streaming, and printer sharing.
• NAS appliance:
• Hard drive or RAID array with reduced functionality server board.
• Often runs a version of Linux.
• Has network access with various file-sharing protocols.
• Typically uses a web-based management interface.
• Can use a wired Ethernet port or Wi-Fi.
• Can often share printers as well as files.
• Can be used to make files available over the Internet:
• Uses HTTP or FTP.
• Be sure to secure devices and the router/firewall.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 117
Computers for Home Use (Slide 5 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 118
Computers for Home Use (Slide 6 of 6)
• Gaming PCs:
• Built around latest graphics adapter technology.
• PC games feature media assets that are loaded to memory, so require fast drives
such as SSD.
• Typically have surround sound audio and high quality display.
• Fast systems used for long periods, so consider one with liquid cooling systems.
• Hardware peripherals can include:
• Specialized gaming mouse and keyboard.
• Steering wheel.
• 3D glasses.
• Specialized mouse pads.
• Specialized audio systems.
• PC video camera.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 119
Guidelines for Selecting Components for a Custom PC
(Slide 1 of 2)
• Verify that the computer meets or exceeds the OS and application
requirements, including the fastest and most reliable:
• RAM
• CPU
• Storage subsystem
• Video subsystem, including a fast refresh rate on the monitor
• Verify you know what the main use of the computer will be. Different
requirements for:
• CAD/CAM
• A/V editing
• Watching TV and movies
• Gaming
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 120
Guidelines for Selecting Components for a Custom PC
(Slide 2 of 2)
• Custom computers require better performance than the average PC.
• Each type of custom PC will likely have specific requirements that should be
verified with the end user.
• Consider installing additional cooling mechanisms to keep the system from
overheating.
• Verify that the network card, the router, and the network cabling or Wi-Fi signal
are all capable of the highest possible speed.
• Consider purchasing specialized devices for the work that will be performed on
the custom computer.
• Implement a RAID system to help ensure data is not lost. This should be in
addition to performing regular backups that are securely stored off site.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 121
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 122
Activity 5-9: Discussing Custom PC Configuration
• ANSWER:
• The disk subsystem is most likely to cause the performance bottleneck. The files will
be too large to be stored completely in system memory and so must be streamed from
the disk, which will need to be both large and fast.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 123
Activity 5-9: Discussing Custom PC Configuration
• ANSWER:
• Multiple cores benefit software that can take advantage of multi-threading. Examples
include virtualization software and Rapid Application Development (RAD) tools.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 124
Activity 5-9: Discussing Custom PC Configuration
• ANSWER:
• Surround sound audio outputs to the speaker system and HDMI to the TV screen.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 125
Activity 5-9: Discussing Custom PC Configuration
• Which factors are most likely to make a PC used for gaming require high-
end cooling?
• ANSWER:
• These PCs use at least two heavyweight processors: the CPU and GPU. Also, gamers
are more likely than most other users to overclock components to improve
performance. Overclocking requires very effective thermal management solutions.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 126
Activity 5-9: Discussing Custom PC Configuration
• ANSWER:
• Thin clients do not need much permanent storage at all—some can make do without
any mass storage. They do not generate that much network traffic either but that said,
the NIC is the more important component here.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 127
Activity 5-9: Discussing Custom PC Configuration
• ANSWER:
• These devices need to operate as quietly as possible and using high-spec
components means heat, heat requires cooling, cooling usually means fans, and fans
mean noise.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 128
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 129
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 130
Reflective Questions
1. Which system firmware have you worked with, if any? What types of
configuration did you perform?
2. What types of custom client setups do you think you will encounter the most in
your role as an A+ technician?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 131
Installing, Configuring, and
Maintaining Operating Systems
Installing, Configuring, and Maintaining Operating
Systems
• Configure and Use Linux
• Configure and Use macOS
• Install and Upgrade Operating Systems
• Maintain OSs
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Configure and Use Linux
Exam Objectives:
• 1002-1.3 Summarize general OS installation considerations and
upgrade methods.
• 1002-1.9 Given a scenario, use features and tools of the Mac OS and
Linux client/desktop operating systems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
The Linux Operating System
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Distributions (Slide 1 of 4)
Distributions (distros): A complete Linux implementation,
including kernel, shell, applications, and utilities, that is packaged,
distributed, and supported by a software vendor.
• Red Hat/CentOS
• SUSE
• Debian/Ubuntu
• Knoppix
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Distributions (Slide 2 of 4)
CLI: Text interface where commands are entered to the OS.
Shell: An OS component that interacts directly with users and
functions as the command interpreter for operating systems.
UNIX: A well-known operating system originally developed by
AT&T's Bell Labs in the 1970s.
Terminal window: A computer interface for text entry and display,
where information is displayed.
Shells:
• bash
• Bourne (sh)
• C Shell (csh)
• Korn (ksh)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Distributions (Slide 3 of 4)
GNU: A recursive acronym standing for "GNU is Not UNIX."
Gnome: A popular Linux GUI desktop.
Virtual desktop: Copy of the desktop with separate icons,
background, and programs if desired.
Popular Linux GUIs:
• Gnome
• KDE
• Cinnamon
• Xfce
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Distributions (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Linux Commands (Slide 1 of 2)
Wildcards: A special character that is used to substitute characters in a
string.
Options (switches): The modifiers used with Linux commands to make
a command more versatile.
Arguments: Values supplied to the command for it to operate on,
supplied in the correct order required by the command syntax.
Pipe: A vertical bar typed between commands to pipe or redirect the
results or output of one command as the input to another command.
Tab completion: A feature in Linux that facilitates auto completion of
commands and file names by pressing the Tab key.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Linux Commands (Slide 2 of 2)
• Case sensitive
• Getting help on a command
• --help
• man command
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Linux Disk and File Management (Slide 1 of 5)
File System Hierarchy: In Linux, the directory structure starting
with the root directory (/) with directories and subdirectories below it
to store files.
Unified file system: Everything available to the Linux OS is
represented as a file in the file system, including devices.
System kernel: A low-level piece of code responsible for controlling
the rest of the operating system.
Virtual file system: A layer that sits between the actual file system
and the kernel. It identifies the location of the persistent root
partition from the appropriate storage device and loads the file
system stored on the disk.
• Root of the file system is represented by /
• Everything in Linux is represented as a file, including devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Linux Disk and File Management (Slide 2 of 5)
• The command:
mount /dev/sda1 /mnt/diskC
• Mounts partition 1 on the mass storage device named sda to the directory /mnt/diskC.
• Mountable file systems are listed in the /etc/fstab file.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Linux Disk and File Management (Slide 3 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Linux Disk and File Management (Slide 4 of 5)
Swap partition: A portion of the hard disk that is formatted with a
minimal kind of file system and used in situations when Linux runs
out of physical memory.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Linux Disk and File Management (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Navigation in the Linux Directory Structure
Command Used To
ls List files.
cd Change directory.
cp Copy files.
mv Move files.
rm Remove files.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Linux File Editors (Slide 1 of 2)
Command mode: In Linux vi editor, the mode that allows users to
perform different editing actions using single keystrokes.
Insert mode: In Linux vi editor, the mode that allows users to insert
text by typing.
• vi or vim
• o inserts a new line below the current line
• O inserts a new line above the current line
• dd deletes the current line
• 5dd deletes five lines including the current line
• Esc key switches from command mode to insert mode
• : switches from insert mode to command mode
• :w writes a file
• :wq writes a file and closes the editor
• :q! closes the editor without saving file changes
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Linux File Editors (Slide 2 of 2)
• Other editors
• mcedit
• nano
• pico
• joe
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Linux User Accounts (Slide 1 of 2)
root user: A user who has access rights to all files and resources
on the system and is the default administrative account on a Linux
system.
superuser: Another term for the root user.
primary group: In Linux, users can be members of one primary
group and multiple supplemental groups.
effective group ID: In Linux, the group ID used by the kernel in
determining the group permissions a process has when accessing
files and shared resources.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Linux User Accounts (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Linux File System Permissions (Slide 1 of 2)
−rwxrwxrwx.
1 2 3 4 5
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Linux File System Permissions (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Linux Software Management (Slide 1 of 2)
MD5 hash: A 128-bit bash value.
rpm: A tool for maintaining packages in Red Hat Linux systems.
apt: A tool for maintaining packages in Debian-based Linux systems.
yum: A tool for maintaining packages in Fedora-based Linux systems.
• apt-get update
• apt-get upgrade
• apt-get install PackageName
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Linux Software Management (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Linux System Commands
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 6-1: Discussing Linux Configuration and Use
• What type of file system is usually used for the Linux boot partition?
• ANSWER:
• A version of ext (ext4 or ext3).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 6-1: Discussing Linux Configuration and Use
• What command would you normally need to run in order to access the
contents of a USB memory stick inserted into Linux?
• ANSWER:
• mount
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Activity 6-1: Discussing Linux Configuration and Use
• Which Linux command will display detailed information about all files and
directories in the current directory, including system files?
• ANSWER:
• ls -la
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Activity 6-1: Discussing Linux Configuration and Use
• ANSWER:
• Either | more or | less.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Activity 6-1: Discussing Linux Configuration and Use
• What command would allow you to use delete the contents of the folder
/home/fred/junk and all its subdirectories?
• ANSWER:
• rm -r /home/fred/junk
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Activity 6-1: Discussing Linux Configuration and Use
• What command could you use to move a file names.doc from your current
directory to the USB stick linked to folder /mnt/usb?
• ANSWER:
• mv names.doc /mnt/usb
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Activity 6-1: Discussing Linux Configuration and Use
• A file is secured with the numeric permissions 0774. What rights does
another user account have over the file?
• ANSWER:
• Read-only.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Activity 6-1: Discussing Linux Configuration and Use
• ANSWER:
• chmod
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Activity 6-1: Discussing Linux Configuration and Use
• ANSWER:
• sudo
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Activity 6-1: Discussing Linux Configuration and Use
• ANSWER:
• /etc/passwd.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Activity 6-1: Discussing Linux Configuration and Use
• ANSWER:
• shutdown -h 21:00
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Topic B: Configure and Use macOS
Exam Objectives:
• 1002-1.3 Summarize general OS installation considerations and
upgrade methods.
• 1002-1.9 Given a scenario, use features and tools of the Mac OS and
Linux client/desktop operating systems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Apple Macs and macOS (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Apple Macs and macOS (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
macOS Features (Slide 1 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
macOS Features (Slide 2 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
macOS Features (Slide 3 of 6)
• Status menu
• Quick access to key apps and features
• Keyboard Preferences
• Day/Time
• Spotlight Search
• Notification Center
Status Menu
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
macOS Features (Slide 4 of 6)
The Dock
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
macOS Features (Slide 5 of 6)
• System Preferences
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
macOS Features (Slide 6 of 6)
Multiple desktops: A feature that enables users to set up one or
more desktops with different sets of apps, backgrounds.
Mission Control: App facilitating multiple desktops in macOS.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
macOS File Management (Slide 1 of 3)
Finder Icon
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
macOS File Management (Slide 2 of 3)
Extended Hierarchical File System (HFS Plus): The file system
used by Apple Mac workstations and laptops.
iCloud: Cloud storage service operated by Apple and closely
integrated with macOS and iOS.
Keychain password cache: macOS app for managing passwords
cached by the OS and supported browser/web applications
• HFS Plus
• APFS
• Remote Disc
• iCloud
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
macOS File Management (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
macOS Users and Passwords (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
macOS Users and Passwords (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
macOS Users and Passwords (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
macOS Software Management (Slide 1 of 4)
The App Store Disk Image File
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
macOS Software Management (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
macOS Software Management (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
macOS Software Management (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
macOS Diagnostic Utilities (Slide 1 of 3)
• System Information
• Screen Sharing
• Activity Monitor
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
macOS Diagnostic Utilities (Slide 2 of 3)
• Console
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
macOS Diagnostic Utilities (Slide 3 of 3)
• Terminal
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
macOS Recovery
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Activity 6-3: Discussing macOS Features and Tools
• Where would you look for the option to view and configure wireless
adapter status in macOS?
• ANSWER:
• In the Status menu on the Menu bar, in the top-right of the screen.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Activity 6-3: Discussing macOS Features and Tools
• ANSWER:
• Command+Spacebar.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Activity 6-3: Discussing macOS Features and Tools
• ANSWER:
• Under System Preferences→Trackpad.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Activity 6-3: Discussing macOS Features and Tools
• ANSWER:
• Mission Control.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Activity 6-3: Discussing macOS Features and Tools
• ANSWER:
• The Finder.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Activity 6-3: Discussing macOS Features and Tools
• ANSWER:
• Boot Camp Assistant lets you create a new partition and install a fresh version of
Windows.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Activity 6-3: Discussing macOS Features and Tools
• What is the correct name for the spinning beach ball of death?
• ANSWER:
• Spinning wait cursor.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Topic C: Install and Upgrade Operating Systems
Exam Objectives:
• 1002-1.3 Summarize general OS installation considerations and
upgrade methods.
• 1002-1.4 Given a scenario, use appropriate Microsoft command-line
tools.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
OS Installation Types (Slide 1 of 3)
OS Installation Overview:
• Select an installation method.
• Clean install or in-place upgrade.
• Check compatibility.
• Hardware, peripherals, and applications.
• If you are upgrading, back up existing data and settings.
• Choose a boot method for loading the OS setup files.
• Prepare the fixed disk, and copy the setup files to the target.
• Configure installation options.
• Verify the installation was successful.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
OS Installation Types (Slide 2 of 3)
Attended installation: A software or operating system installation
where the installer inputs the configuration information in response
to prompts from a setup program.
Unattended installation: A software or operating system
installation where the configuration information is derived from an
input file.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
OS Installation Types (Slide 3 of 3)
Clean install: Installing the OS, replacing the OS software on a
computer, and in the process, deleting existing applications, user
settings, and data files.
In-place upgrade: Installing the OS on top of an existing version of
the OS, retaining applications, user settings, and data files.
• Clean install:
• Install OS to a new computer.
• Replace existing OS on a computer.
• Generally more reliable than upgrading.
• In mid- to large-size organizations, usually performed using images.
• In-place upgrade:
• Installs on top of existing OS.
• Retains applications, user settings, data files.
• Be sure to back up first!
• Usually performed on home systems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Compatibility Considerations
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Installation Boot Methods (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Installation Boot Methods (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Disk Formatting and Partitioning (Slide 1 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Disk Formatting and Partitioning (Slide 2 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Disk Formatting and Partitioning (Slide 3 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Disk Formatting and Partitioning (Slide 4 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Disk Formatting and Partitioning (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Locale Settings and Software Selection (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Locale Settings and Software Selection (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Networking Considerations (Slide 1 of 2)
Workgroup: A small group of computers on a network that share
resources in a peer-to-peer fashion.
Domain: A group of computers that share a common accounts
database, referred to as the directory.
Microsoft account: The type of account required to get apps from
the Microsoft Store, to sync data between devices, access
OneDrive, and work with parental controls for a Child account.
Local account: An account that is only associated with the
computer on which it was created.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Networking Considerations (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Post-Installation Tasks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Repair Installations
• Factory recovery partitions (rescue disks).
• Refresh or restore installations.
• Different options depending on Windows version.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Unattended Installations (Slide 1 of 2)
Unattended installation: A software or operating system
installation where the configuration information is derived from an
input file.
• Image deployment
• XML text answer files
• Windows System Image Manager
• Configure answer files
• Drive cloning and sysprep
• Dism tool
• Run sysprep before imaging
• Windows Deployment Services
• .WIM images and answer files
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
Unattended Installations (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
Activity
Discussing OS Installation
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Activity 6-4: Discussing OS Installation
• ANSWER:
• When using UEFI system firmware, the EFI system partition should be formatted with
a FAT file system. Another scenario is when you are configuring a multiboot system
with an older version of Windows or with Linux.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Activity 6-4: Discussing OS Installation
• ANSWER:
• Network adapter/NIC and system firmware support.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Activity 6-4: Discussing OS Installation
• ANSWER:
• You can install images larger than will fit on a DVD. This might be useful if you want to
install multiple software applications at the same time as Windows itself.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Activity 6-4: Discussing OS Installation
• ANSWER:
• A partition containing a backup of the system configuration at a particular point in time.
These are often used on OEM PCs to enable the PC to be restored to its factory
settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Activity 6-4: Discussing OS Installation
• ANSWER:
• An answer file containing the setup configuration.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Activity 6-4: Discussing OS Installation
• ANSWER:
• Cloning an installation from one PC to another.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Activity 6-4: Discussing OS Installation
• ANSWER:
• Use an answer file with the appropriate settings, and ensure that a domain controller
is available to the PC during setup. You cannot join a domain during attended setup
(though you could immediately after setup finishes).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Topic D: Maintain OSs
Exam Objectives:
• 1002-1.4 Given a scenario, use appropriate Microsoft command-line tools.
• 1002-1.5 Given a scenario, use Microsoft operating system features and tools.
• 1002-1.9 Given a scenario, use features and tools of the Mac OS and Linux
client/desktop operating systems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Disk Maintenance
Fragmentation: Occurs when a data file is not saved to contiguous
sectors on a disk. This decreases performance by making the disk
read/write heads move between fragments.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Windows Disk Maintenance Tools
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Linux and macOS Disk Maintenance Tools
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Patch Management (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Patch Management (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
OS Updates (Slide 1 of 5)
• Windows Update.
• Website hosts maintenance updates for many Windows versions.
• BITS protocol supports automation of updates.
• “Patch Tuesday.”
• Critical updates, security patches, and optional updates.
• Configure automatic check for updates:
• During installation.
• Windows Update app in Control Panel.
• For Windows 10, Windows Settings, Update & Security.
• %SystemRoot%/WindowsUpdate.txt records update activity.
• Uninstall updates that cause problems.
• Use Programs and Features applet.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
OS Updates (Slide 2 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
OS Updates (Slide 3 of 5)
• Application updates:
• Browsers and plug-ins
• Each vendor provides autoupdate
software
• Linux package management
• yum
• apt-get
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
OS Updates (Slide 4 of 5)
Update Types apt script running as cron job
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
OS Updates (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
Anti-Malware Updates (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111
Anti-Malware Updates (Slide 3 of 3)
• Linux:
• Multiple distros make it harder to write viruses that infect all Linux systems
• Different CLIs
• Different GUIs
• Simpler security system
• Software package managers with authorized software repositories
• Not risk free, though
• Assess systems for security control vulnerabilities
• Configure appropriate security controls, especially for customer-facing systems
• Use ClamAV and Snort IPS to block malware threats and attempts to counteract security
systems
• Install Linux anti-malware to detect infected data files received via email or file transfer
from Windows systems
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
Driver and Firmware Updates (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 113
Driver and Firmware Updates (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 114
Scheduled Backups (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 115
Scheduled Backups (Slide 2 of 4)
• Windows Backup
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 116
Scheduled Backups (Slide 3 of 4)
• Restoring a file
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 117
Scheduled Backups (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 118
Task Schedulers (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 119
Task Schedulers (Slide 2 of 2)
• cron
• Scheduling service for commands, scripts, and maintenance tasks.
• crontab entry
15 02 * * 5 /usr/bin/rsync –av --delete /home/fred /mount/rsync
1 2 3
1: At 2:15 am on Friday
2: Run the rsync program
3: To synchronize the /home/fred directory with the /mount/sync directory
• macOS
• cron
• launchd
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 120
Activity
Discussing OS Maintenance
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 121
Activity 6-6: Discussing OS Maintenance
• ANSWER:
• In the GUI tool, simply do not select an option to fix errors automatically. Alternatively,
at a command prompt, run chkdsk without any switches.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 122
Activity 6-6: Discussing OS Maintenance
• ANSWER:
• fsck
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 123
Activity 6-6: Discussing OS Maintenance
• Which Windows tool would you use if you want the defragmenter to run
more frequently?
• ANSWER:
• Task Scheduler.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 124
Activity 6-6: Discussing OS Maintenance
• ANSWER:
• Firmware updates
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 125
Activity 6-6: Discussing OS Maintenance
• How would you update an app purchased from the Mac App Store?
• ANSWER:
• Open the Mac App Store and select the Updates button.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 126
Activity 6-6: Discussing OS Maintenance
• What Windows utility would you use to back up data files in Windows 10?
• ANSWER:
• File History. You could also consider OneDrive as a type of backup solution.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 127
Activity 6-6: Discussing OS Maintenance
• What principal restriction would you face if using the backup tool
included with Windows 7 Home Premium?
• ANSWER:
• It only supports backing up to local drives or removable media, not to network shares.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 128
Activity 6-6: Discussing OS Maintenance
• ANSWER:
• Time Machine.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 129
Activity 6-6: Discussing OS Maintenance
• ANSWER:
• crontab -l
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 130
Reflective Questions
1. Do you have experience installing operating systems? Do you feel you will be
able to perform installations more efficiently as a result of the information
presented in this lesson?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 131
Maintaining and Troubleshooting
Microsoft Windows
Maintaining and Troubleshooting Microsoft Windows
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Install and Manage Windows Applications
Exam Objectives:
• 1002-1.4 Given a scenario, use appropriate Microsoft command-
line tools.
• 1002-1.5 Given a scenario, use Microsoft operating system
features and tools.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
• 1002-1.7 Summarize application installation and configuration
concepts.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Application Installation and Configuration
• OS requirements:
• Software build for macOS will not run on Windows.
• Some applications might not be supported in newer operating systems.
• System requirements:
• CPU speed
• GPU speed
• RAM
• Disk space
• Installation and deployment:
• Distribute on CD/DVD, run from a USB drive, or download from the Internet.
• Permissions and other security considerations:
• To run an application, the user needs to be granted read/execute permission.
• Ensure that software is only installed from trusted sources.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Windows Programs and Features (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Windows Programs and Features (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Windows Programs and Features (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Software Configuration (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Software Configuration (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Software Configuration (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Application and Print Services (Slide 1 of 4)
Service: Windows machines run services to provide functions.
Background: A process that runs without a window and does not
require any sort of user interaction.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Application and Print Services (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Application and Print Services (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Task Manager (Slide 1 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Task Manager (Slide 2 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Task Manager (Slide 3 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Task Manager (Slide 4 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Task Manager (Slide 5 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Task Manager (Slide 6 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Task Manager (Slide 7 of 7)
• tasklist
• tasklist /fi “memusage gt 150000”
• Shows processes using more than 150 MB
• tasklist /sv
• Shows list of services within each process
• taskkill
• taskkill /pid process_id
• taskkill /im image_name
• Use /t option to halt all child processes
• Use /f option to terminate without user notification
• Open an administrative level command prompt to terminate Explorer
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 7-1: Discussing Windows Application
Management
• You need to install a desktop application across a network of 500 Windows PCs.
What is the most efficient means of doing this, and what security considerations
should you make?
• ANSWER:
• Rather than try to install the application by logging on locally to each PC to run the setup file, you
can put the installer file on a network share and use Windows Group Policy Objects (GPO) or
some sort of script to "push" deploy the application. You can use a service account with
appropriate permissions to install the software on the local machine. You should test this process
and the application first in a lab environment to identify potential impacts to the local device and/or
network. You must also ensure that the application vendor provides a digitally signed installer file,
to prove that the code has not been tampered with.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 7-1: Discussing Windows Application
Management
• An installer program may present up to three options in Programs and
Features. Two are Uninstall and Change. What is the third?
• ANSWER:
• Repair
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 7-1: Discussing Windows Application
Management
• How would you configure a legacy Windows 98 application to work with
Windows 10?
• ANSWER:
• Open the application's property sheet and select the Compatibility tab to select the
appropriate mode. You can also run the Program Compatibility Troubleshooter.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity 7-1: Discussing Windows Application
Management
• You take a support call where the user doesn't understand why a program
runs at startup when the Startup folder is empty. What is the likely cause
and how could you verify this?
• ANSWER:
• The program has added a registry entry to run at startup. You could check this (and
optionally disable the program) by using Task Manager.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 7-1: Discussing Windows Application
Management
• What additional information is shown on the Users tab in Windows 10
Task Manager compared to Windows 7?
• ANSWER:
• It shows user-initiated processes and resource utilization.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 7-1: Discussing Windows Application
Management
• You are watching CPU Usage and notice that it often jumps to 100% and
then falls back. Does this indicate a problem?
• ANSWER:
• Probably not—CPU Usage usually peaks and falls. If it stays over 80-90%, the system
could require a faster CPU or if it spikes continually, there could be a faulty
application.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Topic B: Manage Windows Performance
Exam Objectives:
• 1002-1.5 Given a scenario, use Microsoft operating system features and
tools.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel utilities.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
System Properties (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
System Properties (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Advanced System Properties (Slide 1 of 3)
Remote Assistance: A Windows remote support feature allowing a
user to invite a technical support professional to help them over a
network using chat.
Remote Desktop: A Windows feature that allows a remote user to
initiate a connection at any time.
• Remote settings
• System protection
• Advanced settings
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Advanced System Properties (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Advanced System Properties (Slide 3 of 3)
• Performance options:
• Configure desktop visual effects
• Virtual Memory
• Foreground/Background processing
priority
• Startup and recovery options
• Environment variables
• User Profiles
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Virtual Memory (Slide 1 of 2)
Virtual memory or Pagefile: An area on the hard disk allocated to
contain pages of memory that is used when there is not sufficient
physical RAM available.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Virtual Memory (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Windows Performance Management Tools (Slide 1 of 4)
• Task Manager
• Resource Monitor
• Reliability Monitor
• Performance Monitor
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Windows Performance Management Tools (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Windows Performance Management Tools (Slide 3 of
4)
Objects: A data structure in Windows that represents system
resources.
• Objects:
• Processor
• Physical Disk
• Memory
• Paging File
• Counters for each object
• Instances for multiple objects
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Windows Performance Management Tools (Slide 4 of 4)
Data Collector Sets: Windows log files that record information for
viewing in real time or at a later date.
Counter logs: Windows log files that allow you to collect statistics
about resources and can be used to determine system health and
performance.
Trace logs: Windows log files that allow you to collect statistics
about services, including extensions to Event Viewer to log data that
would otherwise be inaccessible.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Activity 7-3: Discussing Windows Performance
Management
• How do you enable a Windows 7 computer to function as a Remote
Desktop Server?
• ANSWER:
• Open System properties, select Change settings, then select the Remote tab and
check the Allow remote connections to this computer option on the Remote tab. You
can also specify the user accounts permitted to connect to the server.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Activity 7-3: Discussing Windows Performance
Management
• Why isn't the System Protection feature a substitute for making a
backup?
• ANSWER:
• System Protection restore points are stored on the local disk and so would not allow
recovery from the failure, loss, or destruction of the disk. System Protection is
designed only to allow the rollback of configuration changes.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Activity 7-3: Discussing Windows Performance
Management
• What is the advantage of setting the pagefile to the same minimum and
maximum sizes?
• ANSWER:
• The pagefile will not become fragmented (assuming you defragmented the disk before
doing this).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity 7-3: Discussing Windows Performance
Management
• You have a computer with two SATA disks. You want to evaluate the
performance of the primary disk. How would you select this in
Performance Monitor and what might be appropriate counters to use?
• ANSWER:
• Open the Add Counter dialog box, select the Physical Disk object, select the counter,
then select the 0 C: instance. Useful counters to use to evaluate performance include
% Disk Time and Average Disk Queue Length.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity 7-3: Discussing Windows Performance
Management
• You are monitoring system performance and notice that a substantial
number of page faults are occurring. Does this indicate that a memory
module is faulty?
• ANSWER:
• No—it shows the system is using the pagefile intensively and could benefit from more
system RAM being installed.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Topic C: Troubleshoot Windows
Exam Objectives:
• 1002-1.4 Given a scenario, use appropriate Microsoft command-line
tools.
• 1002-1.5 Given a scenario, use Microsoft operating system features
and tools.
• 1002-3.1 Given a scenario, troubleshoot Microsoft Windows OS
problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Event Viewer (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Event Viewer (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
The System Configuration Utility (Slide 1 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
The System Configuration Utility (Slide 2 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
The System Configuration Utility (Slide 3 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
The System Configuration Utility (Slide 4 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
The System Configuration Utility (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Troubleshooting Tips for Windows System Issues (Slide
1 of 3)
• For slow performance check:
• Wait for these processes to complete.
• If the process or system continues to be unresponsive, you can either restart the
service or kill the task process.
• If killing the process doesn't restore system performance, try restarting the computer.
• If the service or process becomes unresponsive again after restarting, disable it and
check with the software vendor for any known problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Troubleshooting Tips for Windows System Issues (Slide
2 of 3)
• Consider these troubleshooting techniques and solutions:
• Apply updates.
• Defragment the hard drive.
• Examine power management issues.
• Check for underpowered components.
• Disable application startup.
• Disable Windows services and/or applications.
• Perform a security scan.
• Check the configuration of anti-virus software.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Troubleshooting Tips for Windows System Issues (Slide
3 of 3)
• If a service fails to start:
• Try to start the service manually.
• Verify the service has sufficient privileges.
• Verify any dependent services are started.
• Check system files and scan for malware.
• Try reinstalling affected application.
• Re-register software component using regsvr32.
• Check whether the service is supposed to run.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Troubleshooting Tips for Application Issues (Slide 1 of 2)
• If an application crashes:
• Try to preserve any data being processed.
• Give the process time to become responsive again.
• If necessary, kill the process.
• Try to recover data from temporary files or folders if necessary.
• Attempt to identify whether the cause is in the data file.
• If you can’t determine the cause, try to uninstall then reinstall the application.
• If available, in Programs and Features, use the Repair option.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Troubleshooting Tips for Application Issues (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Blue Screens and Spontaneous Shutdowns (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Blue Screens and Spontaneous Shutdowns (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Troubleshooting Tips for File and Memory Corruption
(Slide 1 of 3)
Windows Resource Protection: A Windows feature that prevents
essential system files, folders, and registry keys from being
replaced to help prevent application and OS failure.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Troubleshooting Tips for File and Memory Corruption
(Slide 2 of 3)
• System File Checker
• sfc /scannow
• sfc /scanonce
• sfc /scanboot
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Troubleshooting Tips for File and Memory Corruption
(Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Troubleshooting Tips for Boot Problems (Slide 1 of 2)
POST: A hardware checking routine built into the PC firmware.
MBR: Sector on a hard disk storing information about partitions
configured on the disk.
Boot sector or VBR: Loads the boot manager, which for Windows
is bootmgr.exe.
BCD: Windows stores information about operating systems
installed on the computer in a boot configuration data store.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Troubleshooting Tips for Boot Problems (Slide 2 of 2)
• Boot process
• Verify the boot process is functioning normally
• Failure to boot/Invalid boot disk
• No OS Found
• bootrec /fixmbt
• bootrec /fixboot
• bootrec /rebuildbcd
• Graphical interface fails to load/Black screen
• Try pressing Windows+Ctrl+Shift+B to test whether the system is responsive
• Slow boot/Slow profile load
• Check for corrupt profile
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Safe Boot (Slide 1 of 4)
• Safe Mode loads only basic drivers and services needed to start the system.
• You can add in drivers and app services one by one to see where a problem
occurs.
• It’s also helpful when you are running analysis and recovery tools.
• Default display resolution for Safe Mode is SVGA (800x600).
• Different ways to access Safe Mode:
• System Configuration utility if you can sign on to Windows.
• Advanced Boot Options menu in Windows 7.
• Power→Shift + Restart in Windows 8 and 10.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Safe Boot (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Safe Boot (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Safe Boot (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
WinRE and Startup Repair (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
WinRE and Startup Repair (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
System Restore (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
System Restore (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
System Restore (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
System Restore (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
System Repair and Reinstall (Slide 1 of 4)
Image: A duplicate of an operating system installation (including
installed software, settings, and user data).
• System Restore
• System Repair
• Recovery Image
• Removable hard drive
• 2:1 compression is ideal but may be lower
• Keep image up-to-date or use with separate data backup
• Use with Advanced Boot Option or System Image Recovery
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
System Repair and Reinstall (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
System Repair and Reinstall (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
System Repair and Reinstall (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Guidelines for Troubleshooting Windows Issues (Slide 1
of 6)
• Examine log files and Event Viewer to get information about what has
happened on the system.
• Use the System Configuration Utility to modify system settings and files that
affect the way the computer boots and loads Windows.
• Use Task Manager to attempt to locate a reason for slow system performance.
• Use Event Viewer to attempt to determine why a service fails to start.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Guidelines for Troubleshooting Windows Issues (Slide 2
of 6)
• If an application crashes:
• Try to preserve any data that was being processed.
• See if the process will become responsive again or if you need to kill the process.
• Attempt to recover data from temporary files or folders if the process was killed.
• Examine Event Viewer logs.
• If the application repeatedly crashes, uninstall then reinstall the application or if
available, use the Repair option in Programs and Features.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Guidelines for Troubleshooting Windows Issues (Slide 3
of 6)
• If there are printing issues not related to printer hardware or network
connectivity, examine Windows settings and check the following:
• Use the printer's property dialog box to try printing a test page. If this is successful,
there must be an application or file-specific problem.
• Open the print queue and check for stalled print jobs.
• Restart the print spooler service.
• Check for any driver updates or known issues.
• Check permissions configured on the printer.
• Check for disk problems on the partition hosting the spool folder.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Guidelines for Troubleshooting Windows Issues (Slide 4
of 6)
• If the user experiences frequent BSoDs:
• Use System Restore or, (if you can boot to Safe Mode), Rollback Driver.
• Remove a recently added hardware device or uninstall a recently installed program.
• Check seating of hardware components and cables.
• Run hardware diagnostics, chkdsk, and scan for malware.
• Make a note of the stop error code and search the Microsoft Knowledge Base for
known fixes and troubleshooting tips.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Guidelines for Troubleshooting Windows Issues (Slide 5
of 6)
• If the user experiences file or memory corruption:
• Use sfc to verify system files and restore them from cache if corrupt or damaged.
• Use the Windows Memory Diagnostics tool to test memory chips for errors.
• If the user is experiencing boot problems, determine the failure point.
• Try booting into Safe Mode to troubleshoot by loading only minimal required
components.
• Try booting from the product media, a repair disc, or a recovery partition.
• Use System Restore to rollback system configuration changes.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Guidelines for Troubleshooting Windows Issues (Slide 6
of 6)
• Rollback updates that are causing issues by uninstalling them.
• Open Programs and Features.
• Select View installed updates.
• Select the update that is causing the problem, then select the Uninstall button.
• Rollback troublesome device drivers.
• Open Device Manager.
• Right-click the device having the problem and select Properties.
• Select the Driver tab.
• Select the Roll Back Driver button.
• If all else fails, determine whether you need to perform a system restore or
reinstall Windows.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• %SystemRoot%\System32\Winevt\Logs\System.evtx
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
Activity 7-4: Discussing Windows Troubleshooting
• What are the tab headings in msconfig, and which tab is not in the
Windows 8/10 version?
• ANSWER:
• General, Boot, Services, Startup, and Tools. In Windows 8/10, the functionality of the
Startup tab has moved to Task Manager.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• Defragment the hard disk, and ensure there is sufficient free space. Verify that the
power management configuration is not throttling components such as the CPU or
GPU. You can also use performance monitoring to check device utilization and
determine whether upgrades are required.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Activity 7-4: Discussing Windows Troubleshooting
• A user calls saying that her screen occasionally goes blue and the system
shuts down. What should you advise her to do?
• ANSWER:
• Record as much information from the blue screen, especially the STOP error number,
as she can so that you can research the particular error.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• Try to end the application or the process using Task Manager, then contact the
application vendor to find out why the problem is occurring.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• Check the event log for more information.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• Using Safe Mode boots with a minimal set of drivers and services. If Safe Mode boot
is successful but normal boot is not, the issue is likely to be with driver software. Re-
enable each driver in turn to identify the culprit. If the problem also manifests in Safe
Mode, it is more likely to have an underlying hardware cause.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Activity 7-4: Discussing Windows Troubleshooting
• You are assisting a user whose application is in the state shown in the
exhibit. How would you troubleshoot this problem? (slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Activity 7-4: Discussing Windows Troubleshooting
(slide 2 of 2)
• ANSWER:
• The user will be concerned about losing any unsaved work. Ask the user to describe
what he or she was doing at the time of the crash to try to diagnose what might have
caused it. Give the program a few minutes to finish processing—check Task Manager
for ongoing disk activity. If the application does not start responding, check autosave
and temp folders for a recent copy of the file data. Use Task Manager to end the
process. Restart the application and try to open any file data you might have
recovered. Check the log files and online resources to try to diagnose the cause of the
crash. If the problem persists, consider solutions such as disabling add-ons or
reinstalling. Demonstrate to the user how to set up autosave (if it is not already
configured) and how to save regularly.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• Run diagnostic software to rule out a disk problem. Recurrent file errors/corruption are
a sign the disk is failing. You might also consider malware as a cause.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• Boot using a recovery tool, such as the product disc, and attempt startup repair.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Activity 7-4: Discussing Windows Troubleshooting
• ANSWER:
• Run a Memory Diagnostic. This tests each RAM cell and so should uncover any fault.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Reflective Questions
1. Which Windows performance management tools would you expect to use most
in your workplace?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Network Infrastructure Concepts
Network Infrastructure Concepts
• Wired Networks
• Network Hardware Devices
• Wireless Networks
• Internet Connection Types
• Network Configuration Concepts
• Network Services
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Wired Networks
Exam Objectives:
• 1001-2.7 Compare and contrast Internet connection types, network
types, and their features.
• 1001-2.8 Given a scenario, use appropriate networking tools.
• 1001-3.1 Explain basic cable types, features, and their purposes.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Network Types (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Network Types (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Network Types (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Network Types (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Ethernet Types and Standards
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Common Ethernet Network Implementations (Slide 1 of
3)
• SOHO: business network with server and clients, using single Internet
appliance as access point, Ethernet switch, Internet modem, Internet router.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Common Ethernet Network Implementations (Slide 2 of
3)
• Enterprise network: usually dedicated single-function connectivity appliances.
• Small and Medium (SME): tens of users; multiple switches, access points, routers.
• Enterprise LAN: hundreds or thousands of servers and clients; multiple enterprise-
class switches, access points, and routers.
• Campus Area Network (CAN) = LAN spanning multiple nearby buildings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Common Ethernet Network Implementations (Slide 3 of
3)
• Positioning network components in
an enterprise LAN
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Twisted Pair Cabling and Connectors (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Twisted Pair Cabling and Connectors (Slide 2 of 4)
• Cat standards:
Network
Cat Frequency Capacity Max. Distance
Applications
5 100 MHz 100 Mpbs 100 m (328 ft) 100BASE-TX
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Twisted Pair Cabling and Connectors (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Twisted Pair Cabling and Connectors (Slide 4 of 4)
• Plenum space:
• Typically a false ceiling, may be raised floor.
• May be used for communications wiring.
• Can be conduit for fire.
• General purpose non-plenum cable uses PVC; marked CMG/MMG or CM/MP
• Plenum cable:
• Must not emit smoke, must self-extinguish, meet other fire safety standards.
• Uses treated PVC or FEP; can be less flexible, does not affect bandwidth.
• Marked CMP/MMP.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Wiring Standards for Twisted Pair (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Wiring Standards for Twisted Pair (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Patch Panels and Structured Cabling (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Patch Panels and Structured Cabling (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Cable Installation and Testing Tools (Slide 1 of 7)
• Wire stripper/cutter: for cutting wire and stripping insulation and cable jackets.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Cable Installation and Testing Tools (Slide 2 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Cable Installation and Testing Tools (Slide 3 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Cable Installation and Testing Tools (Slide 4 of 7)
• Cable testing:
• Verify wiring installation and termination just after making connections, with access to
cable runs.
• Simpler than during user device setup.
• Consider:
• Patch cord between PC and wall.
• Wall port and wall cabling.
• Port on patch panel and patch cord to switch port.
• Test with a known good cable.
• Various troubleshooting devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Cable Installation and Testing Tools (Slide 5 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Cable Installation and Testing Tools (Slide 6 of 7)
• Tone generator and probe (aka “fox and hound” ; “tone and probe”): traces
cable from end to end.
• Connect generator to wires, move locator over cable group until beep is
loudest.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Cable Installation and Testing Tools (Slide 7 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Fiber Optic Cabling and Connectors (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Fiber Optic Cabling and Connectors (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Fiber Optic Cabling and Connectors (Slide 3 of 3)
• Connector types:
• Straight Tip (ST), Subscriber Connector (SC), Lucent/Local Connector (LC).
• Patch cords can have same or mixed connectors.
• Connectors damage easily; plug/unplug only when needed.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Coaxial Cabling and Connectors (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Coaxial Cabling and Connectors (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Coaxial Cabling and Connectors (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Coaxial Cabling and Connectors (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Activity 8-1: Discussing Wired Networks
• Your company has a global presence, and all locations can communicate.
At each site, there is a network, and that network connects to the overall
organizational network. In some locations, there are multiple sites within
a city. Identify each type of network described here.
• ANSWER:
• The global network is a WAN. The network at each site is a LAN. The sites within a
city comprise a MAN.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Activity 8-1: Discussing Wired Networks
• You are performing a wiring job, but the company wants to purchase the
media and components from another preferred supplier. The plan is to
install a network using copper cabling that will support Gigabit Ethernet.
The customer is about to purchase Cat5e cable spools. Is this the best
choice?
• ANSWER:
• Cat5e will meet the requirement and will cost the least. Cat6 might offer better
performance without adding too much cost. Cat6A would be the best choice for
supporting future requirements, but it is likely to cost more than the
customer is budgeting for. You should also notify the customer if
plenum-rated cabling will be required.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Activity 8-1: Discussing Wired Networks
• What is the significance of network cabling marked "CMP/MMP"?
• ANSWER:
• The cable is plenum cable, rated for use in plenum spaces (building voids used with
HVAC systems).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Activity 8-1: Discussing Wired Networks
• You need to connect cable wires to a patch panel. Which networking tool
might help you?
• ANSWER:
• A punch down tool. Remember that punch down tools are used to terminate solid core
cabling to Insulation Displacement Connector (IDC) blocks in patch panels and wall
plates, while crimpers are used to attach RJ-45 jacks to stranded patch cord cabling.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Activity 8-1: Discussing Wired Networks
• What type of tool provides comprehensive information about the
properties of a network cable installation?
• ANSWER:
• A cable certifier.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Activity 8-1: Discussing Wired Networks
• What features of fiber optic cable make it more suitable for WANs than
copper cabling?
• ANSWER:
• It suffers less attenuation (and therefore longer range) and is immune to EMI and
eavesdropping.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Activity 8-1: Discussing Wired Networks
• What types of connector are often used with coaxial cable?
• ANSWER:
• BNC connectors and F-connectors.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Topic B: Network Hardware Devices
Exam Objectives:
• 1001-2.2 Compare and contrast common networking hardware devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Network Interface Cards (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Network Interface Cards (Slide 2 of 2)
• Construction of a frame:
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Ethernet NIC Features (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Ethernet NIC Features (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Ethernet NIC Features (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Ethernet NIC Features (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Legacy Networking Devices (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Legacy Networking Devices (Slide 2 of 2)
• Bridge operation:
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Switches (Slide 1 of 3)
• Ethernet switch in modern network acts like hub, repeater, and bridge.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Switches (Slide 2 of 3)
• Microsegmentation:
• Switches have up to 48 ports.
• Multiple switches can connect into switched fabric with thousands of ports.
• Each port is separate collision domain.
• Establishes point-to-point link (virtual circuit) between any two nodes.
• Collisions only occur if port is half-duplex (attached to a legacy card or node).
• Collisions only affect that segment, not the whole network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Switches (Slide 3 of 3)
• Switch operation:
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Managed and Unmanaged Switches (Slide 1 of 3)
• Unmanaged switch:
• Performs microsegmentation without configuration.
• May be found in small networks (4 or 8 port switches).
• Embedded in most ISP’s Internet routers/modems.
• Managed switch:
• For larger workgroups and corporate networks.
• Unmanaged out of the box, but can be configured administratively.
• Can provide thousands of access ports by linking switches.
• Can divide into virtual LANs (VLANs).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Managed and Unmanaged Switches (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Managed and Unmanaged Switches (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Power Over Ethernet
• Supplies power from a switch port over Cat 5 or better to a powered device.
• Two IEEE standards (both now in 802.3-2012):
• 802.3af
• 802.3at (PoE+)
• PoE-enabled switches called end-span/end-point PSE.
• Power injector can be used if switch does not support PoE.
• Switch detects if connected device is PoE-enabled.
• More efficient than powering each device through a wall socket.
• Network-management software can control devices, apply power schemes.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Ethernet Over Power (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Ethernet Over Power (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Activity 8-2: Discussing Network Hardware Devices
• What is a MAC address?
• ANSWER:
• A unique 48-bit identifier coded into every network interface. This is also referred to as
the physical or hardware address. A MAC address is expressed as 12 hex digits,
usually with colon or hyphen delimiters between each byte value. For example:
aa:bb:cc:00:11:22. Each hex digit expresses a 4-bit value using the characters 0 to 9
plus A, B, C, D, E, and F.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Activity 8-2: Discussing Network Hardware Devices
• What feature(s) should you check when ordering an Ethernet network
card?
• ANSWER:
• That it supports the correct speed (for example, Gigabit or 10GbE) and media
type/connector (for example, RJ-45 for copper cabling or LC for fiber optic).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Activity 8-2: Discussing Network Hardware Devices
• A technician has discovered an 8-port Ethernet hub appliance in a store.
Can this device be usefully deployed on a modern network?
• ANSWER:
• No. Hubs support only half duplex mode and limited speed. There could be very
specific circumstances in which you need to deploy a hub (to support some sort of
legacy server equipment, for instance) but in general terms, using a hub along with
modern switches and network adapters is likely to cause configuration errors and
performance problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Activity 8-2: Discussing Network Hardware Devices
• Your manager is resisting the use of an unmanaged switch to support a
network of up to a dozen computers at a branch office. What are the
arguments for and against proceeding?
• ANSWER:
• As it requires no configuration, an unmanaged switch should be simpler (and cheaper)
to deploy. An unmanaged switch will not support configuration features such as Virtual
LANs (VLANs), but these would not be required on such a small network. A managed
switch would support a remote configuration and monitoring interface and security
features that might be useful, however.
You might also mention traffic prioritization as a good reason
to deploy a managed switch (though the scenario does not specify
supporting VoIP handsets).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Activity 8-2: Discussing Network Hardware Devices
• You are assisting a customer looking to purchase switches that support
powering VoIP handset devices directly. The customer is confused
between Power over Ethernet and Ethernet over Power. Can you explain
the difference and identify which technology the customer needs?
• ANSWER:
• The customer needs a switch supporting Power over Ethernet (PoE). This means that
the switch sends power over the data cabling and RJ-45 port to the device. Ethernet
over Power (or Powerline) is a means of networking devices by using building power
outlets and circuits, rather than data cabling.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Topic C: Wireless Networks
Exam Objectives:
• 1001-2.2 Compare and contrast common networking hardware devices.
• 1001-2.4 Compare and contrast wireless networking protocols.
• 1001-2.7 Compare and contrast Internet connection types, network
types, and their features.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
What is Wireless Networking?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Wireless Frequencies and Channels (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Wireless Frequencies and Channels (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Wireless Frequencies and Channels (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Wireless Frequencies and Channels (Slide 4 of 4)
• Range:
• 2.4 GHz: maximum indoor range ~30-45 m (100–150 ft).
• 5 GHz: maximum indoor range up to ~30 m.
• Absolute range less important than number of clients to support and wall/ceiling
construction.
• Channels:
• 2.4 GHz: up to 14 channels, considerable overlap, co-channel interference.
• Special codes distinguish pattern of each node.
• Channel can become saturated.
• 5 GHz: 23 non-overlapping channels:
• More WANs in same area or access points closer together, higher client device density.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Wireless Network Standards (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Wireless Network Standards (Slide 2 of 2)
Standard Description
• More bandwidth than legacy standards.
• Multiplexes 2-4 antennas using MIMO.
• AxB:C notation (transmit antennas, receive antennas, simultaneous streams).
802.11n
• Can use 2.4 GHz or 5 GHz band (preferred).
• Can use channel bonding in 5 GHz band to deliver more bandwidth.
• Nominal data rates 288.8 Mbps (single channel) and 600 Mbps (bonded channels).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Access Points and Wireless Network Modes (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Access Points and Wireless Network Modes (Slide 3 of 3)
Configuration Description
• Stations configured to make direct peer-to-peer connections.
Ad-hoc and Wi-Fi Direct • Older standards: ad-hoc mode.
• Modern approach: Wi-Fi Direct.
• Part of 802.11s standard.
• Nodes (Mesh Stations) can discover each other and make peer
Wireless Mesh Network connections to form Mesh Basic Service Set.
(MSN)
• Mesh stations perform path discovery and forwarding.
• Routing protocol such as Hybrid Wireless Mesh Protocol (HWMP).
Personal Area Network • Using wireless connectivity to connect to devices with a few meters.
(PAN) • Printers, smartphones, headsets, etc.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Wireless Network Cards
• Each Wi-Fi network station needs network adapter compatible with 802.11
standard in use on network.
• Onboard adapters; expansion boards; USB-connected adapters.
• Link-layer MAC address like Ethernet cards.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Activity 8-3: Discussing Wireless Networks
• What is the maximum transfer rate of an 802.11g Wi-Fi adapter?
• ANSWER:
• 54 Mbps.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Activity 8-3: Discussing Wireless Networks
• Why are 2.4 GHz networks more susceptible to interference than 5 GHz
networks?
• ANSWER:
• Each channel in a 2.4 GHz network is only 5 MHz wide while Wi-Fi requires about 20
MHz. Consequently, there is not much "space" for separate networks and the chances
of overlap are high. There are also numerous other product types that work in the 2.4
GHz band.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Activity 8-3: Discussing Wireless Networks
• How does 802.11n achieve greater speeds than previous Wi-Fi standards?
• ANSWER:
• Largely through using multiple reception and transmission antennas (MIMO) and
channel bonding.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Activity 8-3: Discussing Wireless Networks
• Can 802.11ac achieve higher throughput by multiplexing the signals from
both 2.4 and 5 GHz frequency bands? Why or why not?
• ANSWER:
• No, because 802.11ac works only at 5 GHz.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Activity 8-3: Discussing Wireless Networks
• Why might a wireless mesh network topology be used?
• ANSWER:
• Each station in a wireless mesh can be made capable of discovering other nodes on
the network and forwarding traffic. This can be used to create a network that covers a
wide area without deploying numerous access points or extenders.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Topic D: Internet Connection Types
Exam Objectives:
• 1001-2.2 Compare and contrast common networking hardware devices.
• 1001-2.4 Compare and contrast wireless networking protocols.
• 1001-2.7 Compare and contrast Internet connection types, network
types, and their features.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Internet Connections
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Internet Service Providers (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Internet Service Providers (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Broadband Internet Access
• A range of technologies
• “Always on”
• Data transfer rates much higher than dial-up
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
DSL (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
DSL (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Fiber Optic Internet Access (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Fiber Optic Internet Access (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Fiber Optic Internet Access (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Dial-Up Internet Access (Slide 1 of 2)
• Telephone connection
between computers.
• Uses entire frequency range;
not efficient, low bandwidth.
• Phone charges apply; line
cannot be used for voice at
same time.
• Modems at each end convert
digital analog
(MOdulation/DEModulation).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Dial-Up Internet Access (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
ISDN Internet Access
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Fixed Wireless Internet Access (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Fixed Wireless Internet Access (Slide 2 of 2)
Solution Description
• Large coverage area with VSAT microwave antenna aligned to orbital satellite.
• Super High Frequency range (3-30 GHz).
• Satellite television receivers for domestic use; use growing for businesses, especially rural.
Satellite
• Transfer rates vary: 6 Mbps / 15-20 Mbps down typical.
• Can be severe latency problems.
• Dish at customer aligned with satellite; connects via coax to DVB-S modem.
• Ground-based microwave antennas aligned with each other; transmit if no physical obstruction
(usually atop tall buildings).
• Spans great distances; no cabling infrastructure; lower latency than satellite.
LoS WISP
• Hard to maintain line of sight; expensive.
• WISP may use Wi-Fi or proprietary equipment.
• Range of frequencies; may be affected by 5G cellular phone service deployment.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Cellular Radio Networks (Slide 1 of 2)
• Wi-Fi bands have restricted range; fixed wireless requires large antenna.
• Cellular radio wireless networking allows long-distance communications over
smartphone devices.
• Also used by IoT devices.
• Connects to nearest transmitter; base station range of up to 5 miles.
• Transmitter connects phone to mobile/landline networks.
• 850 / 1900 MHz bands (Americas); 900 / 1800 MHz bands (rest of world).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Cellular Radio Networks (Slide 2 of 2)
Generation Description
• GSM phones using a SIM card; international, and AT&T in US
• TIA/EIA IS-95 (cdmaOne) handsets managed by provider with CDMA; Sprint and Verizon
2G
• Data access built on top of existing voice network using CSD
• Must establish data connection to base station, incurring charges; maximum ~14.4 Kpbs
• Deployed packet-switched technology to mobiles
3G
• GPRS/EDGE; HSPA+; CDMA2000/Evolution Data Optimized (EV-DO)
• LTE: converged 4G standard supported by all network providers, requires a SIM. Maximum
4G 150 Mbps down; 20 Mpbs real-world
• LTE-A: Intended to provide 300 Mbps down; 40 Mbps current real-world
• Target is for 1 Gbps if stationary or slow-moving; 100 Mbps if fast-moving
5G • Available in trial areas; commercially in ~2020
• 70 Gpbs in test conditions
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Activity 8-4: Discussing Internet Connection Types
• If you have remote employees who need to connect to the corporate
network but they are located in a remote area with no access to high-
speed Internet service, what do you think is the best Internet connection
method to use?
• ANSWER:
• Satellite is the most likely option. A dial-up link is unlikely to provide sufficient
bandwidth for a remote access VPN. In some cases, tethering to a cell phone or
connecting to a wireless network device is an option, but this will depend on how
remote the employees' location is and if they can get a strong cellular signal.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Activity 8-4: Discussing Internet Connection Types
• True or false? Analog modems are required for dial-up and ISDN Internet
access services.
• ANSWER:
• False. Dial-up uses an analog modem but Integrated Services Digital Network (ISDN)
uses digital not analog transmissions. The link is created via an adapter called an
NT1. This may loosely be referred to as an "ISDN modem," but it is not an analog
modem.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Activity 8-4: Discussing Internet Connection Types
• What type of SOHO Internet access method offers the best bandwidth?
• ANSWER:
• Fiber to the Premises is the best, but it is not always available. Fiber to the Curb and
Hybrid Fiber Coax (cable) are the best options for the majority of residential
subscribers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Activity 8-4: Discussing Internet Connection Types
• Which protocol enables a dial-up user to exchange frames of data with an
ISP's access server?
• ANSWER:
• Point-to-Point Protocol (PPP).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
Activity 8-4: Discussing Internet Connection Types
• What type of cabling is used with the WAN port of a cable modem?
• ANSWER:
• Coax.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
Activity 8-4: Discussing Internet Connection Types
• What Internet access method would be suitable for a business requiring a
high bandwidth connection where no cabled options exist?
• ANSWER:
• Line-of-sight microwave radio from a Wireless Internet Service Provider (WISP).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
Topic E: Network Configuration Concepts
Exam Objectives:
• 1001-2.2 Compare and contrast common networking hardware devices.
• 1001-2.6 Explain common network configuration concepts.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
Routers (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
The TCP/IP Protocol Suite (Slide 1 of 3)
Protocol: Rules and formats enabling systems to exchange data.
Protocol Suite: A collection of several protocols used for
networking are designed to work together.
Layer Description
• Puts frames on physical network
• Not TCP/IP protocols as such; networking products and media (Ethernet, Wi-Fi)
Link/Network
• Communications on local network
Interface Layer
• Data packaged in frames
• Nodes identified by MAC address
• Numerous protocols for network configuration, management, services; use TCP/UDP ports
Application
• ARP: Finds MAC address associated with IP address
Layer
• ICMP: delivers status and error messages (used by ping and tracert)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
The TCP/IP Protocol Suite (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 113
Internet Protocol and IP Addressing (Slide 1 of 4)
IPv4 Frame
Description
Field
Source IP
Identifies the sender of the datagram by IP address.
Address
Destination IP
Identifies the destination of the datagram by IP address.
Address
Protocol Indicates whether data should be passed to TCP or UDP at the destination.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 114
Internet Protocol and IP Addressing (Slide 2 of 4)
32 binary digits:
11000110001010010001000000001001
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 115
Internet Protocol and IP Addressing (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 116
Internet Protocol and IP Addressing (Slide 4 of 4)
199 =
Decimal value: 128 + 64 + 0 + 0 + 0 + 4 + 2 + 1
Place value: 128 64 32 16 8 4 2 1
Conversion: 128*1 64*1 32*0 16*0 8*0 4*1 2*1 1*1
Binary equivalent: 1 1 0 0 0 1 1 1
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 117
Subnet Masks (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 118
Subnet Masks (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 119
Subnet Masks (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 120
Subnet Masks (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 121
Host IP Configuration
• Host must have IP address and subnet mask; should have other parameters for
proper network/Internet communication.
Parameter Description
• Both required for every interface; can be set manually.
IPv4 address
• Address: dotted-decimal notation; identifies host and network.
Subnet mask
• Subnet mask determines if other hosts are local or remote.
• IP address of DNS server to provide host/domain name resolution and locate Internet
resources.
Client DNS
• DNS also used on most local networks.
• Often the gateway address; often a second server address provided for redundancy.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 122
Static and Dynamic IP Addresses (Slide 1 of 3)
• Static addressing:
• Administrator manually configures each host.
• Must update manually if host changes subnet.
• Must track address allocations to avoid duplication.
• Can be time consuming and error-prone.
• Only used for systems with dedicated functionality.
• Dynamic addressing:
• DHCP server allocates addresses.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 123
Static and Dynamic IP Addresses (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 124
Static and Dynamic IP Addresses (Slide 3 of 3)
Dynamic
Addressing Description
Method
• DHCP client contacts server on boot and requests address.
• Also provides other parameters (subnet mask, default gateway) .
DHCP
• Limited time leases.
• Information configured on server; client updated when lease renewed.
• Fallback mechanism for DHCP client if DHCP server is unavailable.
Link local • Host self-configures with address on 169.254.x.x network.
APIPA • “Link local” is generic term; “APIPA” is Microsoft term.
• Communication with other APIPA hosts on same network only.
• For hosts that need same address each time.
DHCP
• Configure DHCP server with reserved host address per MAC address.
reservation
• Centralized, easier to implement than static addressing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 125
Public and Private IP Addresses (Slide 1 of 4)
• On the Internet, each host address must be unique; usually allocated by ISP.
• Few organizations have enough individual addresses; various methods to
overcome this issue.
• Internal hosts can use addresses in a Class A, B, or C private range defined by
RFC 1918 (10.0.0.0 to 10.255.255.255; 172.16.0.0 to 172.31.255.255;
192.168.0.0 to 192.168.255.255).
• Internet access provided for private-address hosts through:
• A router using NAT.
• A proxy server.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 126
Public and Private IP Addresses (Slide 2 of 4)
• In NAT, router converts the internal private IP address to a valid public address.
• IP configuration is simpler and internal clients are not directly accessible from
the Internet.
• NAT address pool itself will be limited; multiple private addresses will use a
single public address.
• Mapping provided by NAPT, aka PAT, aka NAT overloading.
• Each outgoing connection assigned TCP or UDP port.
• Returning traffic mapped back to address/client port.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 127
Public and Private IP Addresses (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 128
Public and Private IP Addresses (Slide 4 of 4)
• VPN: connects two private networks over a public network (the Internet).
• Internet is cost-effective way to connect users and networks, but is not private.
• VPN protocols create tunnels through the public network to authenticate,
encrypt, and secure private communications.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 129
IPv6 (Slide 1 of 5)
• Binary IPv6 address divided into eight double-byte values using hex notation:
2001:0db8:0000:0000:0abc:0000:def0:1234
2001:db8::abc:0:def0:1234
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 131
IPv6 (Slide 3 of 5)
• First 64 bits are network ID, second 64 bits designate the interface
• Fixed size = no subnet mask; /nn = length of routing prefix in bits
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 132
IPv6 (Slide 4 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 133
IPv6 (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 134
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 135
Activity 8-5: Discussing Network Configuration Concepts
• What is the difference between a router and a modem?
• ANSWER:
• A router is a device that can forward traffic between different logical networks. These
networks might use different media and different ways of transporting frames across
links. In an Ethernet network, a host interfaces with the local network (LAN) using a
network adapter. When a link is point-to-point, using media such as a telephone line, a
modem is used to convert the signals that can be carried over the media from the LAN
format to the WAN format. Where a router is connected to such links, it may be
installed with a modem, but the functions of the devices are separate. The modem
makes a physical
network link with the ISP network, functioning at the same level
as a switch. The router can make decisions about forwarding
between logical networks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 136
Activity 8-5: Discussing Network Configuration Concepts
• Protocols within the TCP/IP suite (and products supporting TCP/IP
networks) are conceived as working at one of four layers. What are those
four layers called?
• ANSWER:
• Link/Network Interface, Internet, Transport, and Application.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 137
Activity 8-5: Discussing Network Configuration Concepts
• What is meant by dotted decimal notation?
• ANSWER:
• An IPv4 address is a 32-bit number expressed as four octets (bytes). A byte can be
expressed as the decimal values 0 to 255, and these are used to represent the IP
address, with dots between each decimal number. This scheme is easier for people to
read than a binary number and reduces configuration errors.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 138
Activity 8-5: Discussing Network Configuration Concepts
• When is a default gateway required?
• ANSWER:
• When a host needs to communicate with hosts located outside its own IP network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 139
Activity 8-5: Discussing Network Configuration Concepts
• A host is configured with the IP address 192.168.1.10/24. What is the
host's subnet mask?
• ANSWER:
• 255.255.255.0.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 140
Activity 8-5: Discussing Network Configuration Concepts
• What is the purpose of a DHCP server?
• ANSWER:
• A Dynamic Host Configuration Protocol (DHCP) server automatically allocates a
TCP/IP configuration (IP address, subnet mask, default gateway, and DNS servers) to
hosts when they join the network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 141
Activity 8-5: Discussing Network Configuration Concepts
• What is special about an IP address that starts 169.254?
• ANSWER:
• It is an APIPA address—that is, one automatically selected if the interface is
configured to use DHCP but cannot contact a DHCP server.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 142
Activity 8-5: Discussing Network Configuration Concepts
• A host is configured with the IP address 172.29.0.101. What is significant
about this address?
• ANSWER:
• It is a private address and cannot be reached directly over the Internet. The host must
use a router with address translation or a proxy service to communicate on the
Internet.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 143
Activity 8-5: Discussing Network Configuration Concepts
• What is the function of NAT?
• ANSWER:
• Network Address Translation (NAT) enables a router to map private network IP
addresses onto a public IP address. Private addressing keeps the local network more
secure and reduces the demand for unique IP addresses.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 144
Activity 8-5: Discussing Network Configuration Concepts
• Apart from its length, what is the main difference between the structure of
an IPv4 address and an IPv6 address?
• ANSWER:
• Both types of IP address identify a host within a specific logical network. In an IPv4
address, the network ID portion is determined by applying a mask to the whole
address. In an IPv6 address, the host portion is always the last 64 bits of the address.
The first 64 bits are used with network prefixes to identify networks and subnetworks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 145
Topic F: Network Services
Exam Objectives:
• 1001-2.1 Compare and contrast TCP and UDP ports, protocols, and
their purposes.
• 1001-2.5 Summarize the properties and purposes of services provided
by networked hosts.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 146
TCP and UDP Ports (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 147
TCP and UDP Ports (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 148
Well-Known Ports
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 149
DNS (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 150
DNS (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 151
DNS (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 152
DNS (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 153
Web Servers and HTTP/HTTPS (Slide 1 of 3)
Web server: A server that provides client access using HTTP
(defaults to port 80) or its secure version HTTPS (defaults to port
443).
• Organizations may lease from ISP; host directly; use private servers (intranets)
• Provides HTML pages (text files with tags), interpreted by browsers
• Extended by scripts and web applications
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 154
Web Servers and HTTP/HTTPS (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 155
Web Servers and HTTP/HTTPS (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 156
Mail Servers (Slide 1 of 3)
• Email can send text and file attachments encoded using MIME.
• Can use multiple protocols; typical process:
1. Client sends message to server; server queues message for an SMTP session (port
25).
2. SMTP server uses DNS to resolve address of recipient’s mail server.
3. SMTP delivers message; usually several “hops.”
4. Message placed in store on recipient’s server; client software connects with mailbox
using POP3 (port 110) or IMAP (port 143).
• POP3 more widely used; IMAP has more features.
• Email account requires username, password, email address, incoming and
outgoing server addresses, and protocol types.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 157
Mail Servers (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 158
Mail Servers (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 159
File and Printer Sharing (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 160
File and Printer Sharing (Slide 2 of 3)
Protocol Description
• Underpins file and printer sharing on Windows networks; currently SMB2, but legacy clients are
SMB (aka supported.
CIFS) • TCP port 445; also NetBIOS over TCP/IP (UDP and TCP port range 137-139).
• Implemented as Samba on Linux.
• Performs similar function to SMB for Apple/Mac OS.
AFP • UDP or TCP port 427 (Service Location Protocol)—not required by OS X or later.
• TCP port 548.
• Early TCP/IP protocol; widely used for file transfers; flexible; easy to maintain.
• TCP port 21 for connection; port 20 for active transfer or server-assigned port if passive.
• Client options:
FTP
• Command line
• Dedicated GUI
• Browsers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 161
File and Printer Sharing (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 162
Network Host Services
Service Description
• Used on enterprise networks to ensure only authorized users can access accounts.
Authentication • On Windows domain, Active Directory provides authentication based on Kerberos.
Server • AAA server consolidates authentication across multiple devices.
• RADIUS is an AAA protocol.
Service Description
• Framework for managing/monitoring network devices.
• Management system and agents.
SNMP • Agent process runs on network device; maintains MIB; can initiate trap for a notable event.
• System software provides oversight location, monitors agents, displays information.
• Device queries=UDP 161; traps=UDP 162.
• Facilitates Defense in Depth security policies that require hardening to workstation level.
Endpoint • Can apply OS and anti-virus updates; catalog software; apply security policies; analyze logs;
Management monitor performance and alerts.
• Example: Microsoft’s SCCM.
• Helpful to consolidate separate device logs.
• Prior to Windows 7, Windows logs were local; 3rd-party tools used to consolidate.
syslog • Windows event subscription can forward log events to central system.
• UNIX and Linux equivalent is syslog.
• Client-server model for event collection; open format; de facto standard.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 164
Inventory Management Servers (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 165
Legacy and Embedded Systems
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 166
Internet Security Appliances and Software
• Software and/or hardware that monitors for and quickly detects malicious behavior.
• Can also analyze and alert administrators to infrastructure problems.
IDS/NIDS
• Can comprise sensors, detection software, and management software; each implementation is
unique.
• Inline security device that monitors for and blocks suspicious network and system traffic.
• May drop packets, reset connections, sound alerts; at times quarantine intruders.
IPS/NIDS
• Examines packet contents.
• UTM appliance combines firewall, A-V scanner, and IDS.
• Used on enterprise networks as alternative to NAT.
• Checks and forwards HTTP, email, or other requests from internal hosts to Internet; returns reply
Proxy Server to the client.
• May be transparent (no client configuration) or non-transparent (client must be configured with
proxy’s IP address and port, typically 8080).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 167
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 168
Activity 8-6: Discussing Network Services
• If a network application cannot tolerate a missing packet, what type of
transport protocol should it use?
• ANSWER:
• Transmission Control Protocol (TCP).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 169
Activity 8-6: Discussing Network Services
• True or false? Protocols that stream video and audio over the Internet are
likely to be based on UDP.
• ANSWER:
• True. UDP carries less overhead compared to Transmission Control Protocol (TCP),
so is better suited to playing media files where small glitches due to lost packets are
less of a problem than the whole video freezing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 170
Activity 8-6: Discussing Network Services
• What is DNS?
• ANSWER:
• Domain Name System—servers that map host and domain names to IP addresses.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 171
Activity 8-6: Discussing Network Services
• What configuration parameter must be entered to enable a client to use
DNS?
• ANSWER:
• The IP address of a DNS server on the local network or network reachable by the
client.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 172
Activity 8-6: Discussing Network Services
• True or false? An HTTP application secured using the SSL/TLS protocol
should use a different port to unencrypted HTTP.
• ANSWER:
• True. By default HTTPS uses port 443. It is possible in theory to apply SSL/TLS to port
80 but most browsers would not support this configuration.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 173
Activity 8-6: Discussing Network Services
• What protocol would a mail client use to access the message store on a
remote mail server?
• ANSWER:
• Typically Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP). A
proprietary protocol such as MAPI (Microsoft Exchange) might also be used.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 174
Activity 8-6: Discussing Network Services
• A firewall filters applications based on their port number. If you want to
configure a firewall on the mail server to allow clients to download email
messages, which port(s) might you have to open?
• ANSWER:
• Either TCP port 993 (IMAPS) or 995 (POP3S), depending on the mail access protocol
in use (IMAP or POP). These are the default ports for secure connections. Unsecure
default ports are TCP port 143 and TCP port 110. Port 25 (SMTP) is used to send mail
between servers, not to access messages stored on a server. Port 587 is often used
by a client to submit messages for delivery by an SMTP server.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 175
Activity 8-6: Discussing Network Services
• You are configuring a Network Attached Storage (NAS) appliance. What
file sharing protocol(s) could you use to allow access to Windows, Linux,
and Apple macOS clients?
• ANSWER:
• Most clients should support Server Message Block (SMB)/Common Internet File
System (CIFS). You might want to configure Apple Filing Protocol to support older
macOS clients. Another option is to configure File Transfer Protocol (FTP).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 176
Activity 8-6: Discussing Network Services
• What is the difference between SNMP and syslog?
• ANSWER:
• The Simple Network Management Protocol (SNMP) provides a means for devices to
report statistics to a management server. Syslog provides a means for devices to send
log entries to a remote server.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 177
Activity 8-6: Discussing Network Services
• You are advising a customer about types of security appliance. What are
the principal types and configuration options?
• ANSWER:
• A network Intrusion Detection System (IDS) scans packet contents for signs of traffic
that could violate security policies. An Intrusion Protection System (IPS) can effect
some sort of action to block such traffic. An IPS is usually provisioned as a Unified
Threat Management (UTM) appliance to include firewall, antimalware, and other
security functionality. Appliances with blocking functionality are typically deployed
inline with the network, so that all traffic passes
through the appliance. Alternatively, a tap or sensor can be attached
to the network so that traffic is copied for the appliance to read.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 178
Reflective Questions
1. What do you think are the most important network concepts covered in this
lesson?
2. What experience do you have with any of the technologies discussed in this
lesson?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 179
Configuring and Troubleshooting
Networks
Configuring and Troubleshooting Networks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Configure Network Connection Settings
Exam Objectives:
• 1001-2.3 Given a scenario, install and configure a basic wired/wireless
SOHO network.
• 1002-1.8 Given a scenario, configure Microsoft Windows networking on
a client/desktop.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
NIC Properties
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Wired Network Cards
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
QoS
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Onboard Network Cards
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Wireless Network Cards
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Wake on LAN
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Network Connections in Windows 7 and Windows 8
(Slide 1 of 4)
• Configure network card with
client software and protocol
• Use Network and Sharing Center
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Network Connections in Windows 7 and Windows 8
(Slide 2 of 4)
• Access adapter properties
• Wired/wireless adapter names vary
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Network Connections in Windows 7 and Windows 8
(Slide 3 of 4)
• Change properties or view status
• Configure client, protocol, service
• Default bindings include
Microsoft clients, IPv4 and IPv6,
and link-layer discovery
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Network Connections in Windows 7 and Windows 8
(Slide 4 of 4)
• To join WLAN, select network
from list in notification area
• Can connect automatically
• Can configure manually if
network not broadcasting
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Network Connections in Windows 10
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
IP Address Configuration (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
IP Address Configuration (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Other Network Connections (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Other Network Connections (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Other Network Connections (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Activity 9-1: Discussing Network Connection
Configuration Settings
• You need to configure duplex settings on a network adapter manually.
What steps do you need to follow?
• ANSWER:
• Open Device Manager and the adapter's Property sheet. Select the Advanced tab
and select the Duplex property (or Speed and Duplex). Change the value as
required, and select OK.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity 9-1: Discussing Network Connection
Configuration Settings
• True or false? If you want a computer to be available through Wake-on-
LAN, you can disconnect it from the power supply but must leave it
connected to the network data port.
• ANSWER:
• False. The network adapter must be connected to standby power, and the computer
could not start anyway if it were disconnected from the power supply.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 9-1: Discussing Network Connection
Configuration Settings
• A Windows computer is configured to use DHCP, but no DHCP server is
available. The computer is not using an APIPA address either. Why is
this?
• ANSWER:
• It has been configured with an Alternate Configuration static IP address.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 9-1: Discussing Network Connection
Configuration Settings
• Why are IP addresses entered under DNS, and why should there be two of
them?
• ANSWER:
• These are the IP addresses of DNS servers that will process client requests to resolve
host and domain names to IP addresses. DNS is a critical service on Windows
networks and on the Internet, so a second server should always be specified for
redundancy.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 9-1: Discussing Network Connection
Configuration Settings
• What parameters do you need to specify to connect to a VPN?
• ANSWER:
• Assuming you have a remote host topology, you need to establish a connection to a
server over a public network such as the Internet. The VPN server then facilitates a
connection to a local network. You need to specify the location of the VPN server as
an IP address or Fully Qualified Domain Name (FQDN). If the VPN type is not
detected automatically, you might need to configure extra settings or use third-party
VPN client software. To connect to the VPN, the user must submit credentials, such as
a user name and password.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Topic B: Install and Configure SOHO Networks
Exam Objectives:
• 1001-2.3 Given a scenario, install and configure a basic wired/wireless
SOHO network.
• 1002-2.3 Compare and contrast wireless security protocols and
authentication methods.
• 1002-2.10 Given a scenario, configure security on SOHO wireless and
wired networks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
SOHO Networks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Common SOHO Network Hardware (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Common SOHO Network Hardware (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
SOHO Network Configuration (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
SOHO Network Configuration (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Wireless Settings
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
DHCP and IP Address Configuration
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
WPS
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Access Point Placement
• Correct antenna and access point placement helps ensure robust network.
• AP placement may be constrained by provider’s cabling location.
• Can use extenders.
• Site survey can help identify dead zones.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Channel Selection
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Radio Power Levels
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Wi-Fi Security Protocols (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Wi-Fi Security Protocols (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Wi-Fi Authentication
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Common SOHO Security Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Latency and Jitter
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Activity 9-3: Discussing SOHO Network Installation
and Configuration
• What type of cable and connectors are used to connect a modem to a
phone port?
• ANSWER:
• Twisted pair with RJ-11 connectors. In the UK, the phone port might use a BT-style
connector though.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity 9-3: Discussing SOHO Network Installation
and Configuration
• What is the function of a microfilter?
• ANSWER:
• It screens noise from data signals on jacks for voice or fax devices if DSL equipment is
connected.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity 9-3: Discussing SOHO Network Installation
and Configuration
• To configure a router/modem, what type of IP interface configuration
should you apply to the computer you are using to access the device
administration web app?
• ANSWER:
• Set the adapter to obtain an IP address automatically. The router/modem will be
running a Dynamic Host Configuration Protocol (DHCP) server that will allocate an
appropriate IP address and DNS server.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Activity 9-3: Discussing SOHO Network Installation
and Configuration
• What is the effect of reducing transmit power when you are configuring
an access point?
• ANSWER:
• It reduces the supported range of the access point. You might do this to prevent
interference between two access points in close proximity. You might also reduce
power to prevent the network being accessible outside a particular area (such as
making the network accessible to indoor users only).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Activity 9-3: Discussing SOHO Network Installation
and Configuration
• Which standard represents the best available wireless network security?
• ANSWER:
• Wi-Fi Protected Access version 2 (WPA2). It is also worth noting that this can be
configured in personal mode (using a passphrase shared between all users) or
enterprise mode. Enterprise mode is more secure. Each user connects with his or her
network credential, which is validated by an authentication server (typically RADIUS).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Activity 9-3: Discussing SOHO Network Installation
and Configuration
• How can QoS improve performance for SOHO Internet access?
• ANSWER:
• A Quality of Service (QoS) mechanism allows you to elevate certain types of traffic to
a higher priority to be processed by the router/modem. For example, you could create
a rule reserving 80% of bandwidth for a Voice over IP (VoIP) protocol. This means that
whenever the VoIP application is active, other protocols can use only 20% of the
router's link bandwidth, making it less likely that ordinary file downloads or web
browsing will interfere with a call.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Topic C: Configure SOHO Network Security
Exam Objectives:
• 1001-2.2 Compare and contrast common networking hardware devices.
• 1001-2.3 Given a scenario, install and configure a basic wired/wireless SOHO
network.
• 1002-1.5 Given a scenario, use Microsoft operating system features and tools.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel utilities.
• 1002-1.8 Given a scenario, configure Microsoft Windows networking on a
client/desktop.
• 1002-2.10 Given a scenario, configure security on SOHO wireless and wired
networks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Firewalls (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Firewalls (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Firewall Settings (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Firewall Settings (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
NAT
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Port Forwarding and Port Triggering
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
DMZ
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Windows Firewall (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Windows Firewall (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Windows Firewall with Advanced Security (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Windows Firewall with Advanced Security (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Location Awareness (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Location Awareness (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Browser Configuration (Slide 1 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Browser Configuration (Slide 2 of 7)
• Configure connections:
• Dial-up
• Router
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Browser Configuration (Slide 3 of 7)
• Configure proxy:
• User machines send requests to proxy
server, which sends to Internet.
• May also perform caching for improved
performance.
• Use LAN Settings to configure proxy
address.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Browser Configuration (Slide 4 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Browser Configuration (Slide 5 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Browser Configuration (Slide 6 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Browser Configuration (Slide 7 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Activity 9-5: Discussing SOHO Network Security
• True or false? A firewall can be configured to block hosts with selected IP
address ranges from connecting to a particular TCP port on a server that
is available to hosts in other IP address ranges.
• ANSWER:
• True. A firewall's access control entry ruleset can combine any supported criteria.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Activity 9-5: Discussing SOHO Network Security
• What sort of configuration options are available to apply parental
controls, as opposed to packet filtering via a firewall?
• ANSWER:
• You can set restrictions to block access at times of the day or night. You can blacklist
web addresses (URLs), optionally on the basis of site rating schemes. You may also
be able to block access on the basis of keyword filtering.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Activity 9-5: Discussing SOHO Network Security
• What security method could you use to allow only specific hosts to
connect to a SOHO router/modem?
• ANSWER:
• You could configure a whitelist of permitted Media Access Control (MAC) addresses.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Activity 9-5: Discussing SOHO Network Security
• A user wants to be able to access an FTP server installed on a computer
on their home network from the Internet. The home network is connected
to the Internet by a DSL router. How would you enable access?
• ANSWER:
• Configure port forwarding on the router to send incoming connections on port 21 to the
LAN computer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Activity 9-5: Discussing SOHO Network Security
• You are setting up a games console on a home network. What feature on
the router will simplify configuration of online multiplayer gaming?
• ANSWER:
• Universal Plug and Play (UPnP).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Activity 9-5: Discussing SOHO Network Security
• True or false? To allow a PC game to accept incoming connections over a
custom port you need to configure the Advanced Security Firewall.
• ANSWER:
• False. You can allow a process to connect via the basic firewall interface.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Activity 9-5: Discussing SOHO Network Security
• What option on the General tab of the Internet Options dialog box is most
relevant to user privacy?
• ANSWER:
• Delete browsing history.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Activity 9-5: Discussing SOHO Network Security
• How would you configure a Windows 7 computer to use a proxy server for
web browsing?
• ANSWER:
• Open the Internet Options dialog box, and select the Connections tab. Select LAN
Settings and enter the address of the proxy.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Topic D: Configure Remote Access
Exam Objectives:
• 1001-2.1 Compare and contrast TCP and UDP ports, protocols, and
their purposes.
• 1002-1.5 Given a scenario, use Microsoft operating system features and
tools.
• 1002-1.8 Given a scenario, configure Microsoft Windows networking on
a client/desktop.
• 1002-4.9 Given a scenario, use remote access technologies.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Windows Remote Access Tools
Tool Description
• Allows user to connect to desktop remotely
• Desktop machine = terminal server; connecting machine = Windows terminal
Remote Desktop • Good for home workers
• Can also be used for troubleshooting
• TCP port 3389
• Allows user to request help from technician
• Helper can join user session, take control of desktop
Remote Assistance
• Port assigned dynamically from ephemeral range; intended for local support, not to
pass through firewalls
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Remote Settings Configuration
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Remote Credential Guard
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
The Remote Assistance Process
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Remote Desktop
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
Remote Access Technologies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
Telnet (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Telnet (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
SSH (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
SSH (Slide 2 of 2)
• Server’s host key used to set up secure channel for SSH client authentication
• Various authentication methods possible; can be enabled/disabled as needed:
• Username/password
• Kerberos
• Host-based
• Public key
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Screen Sharing and VNC
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
File Share
• Network file sharing can be complex (file sharing protocol; permissions; user
accounts)
• Vendors offer simple file sharing options:
• AirDrop (Apple iOS/macOS)
• NearShare (Microsoft)
• Third-party and open-source alternatives
• Products include security, but always potential for misuse
• Only accept requests from known contacts
• Security vulnerabilities may allow unsolicited transfers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Activity 9-6: Discussing Remote Access Configuration
• ANSWER:
• The Remote Desktop server functionality is available in Professional, Enterprise, and
Ultimate editions.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Activity 9-6: Discussing Remote Access Configuration
• What is the goal of RDP Restricted Admin (RDPRA) Mode and Remote
Credential Guard?
• ANSWER:
• If the local machine is compromised, malware may be able to obtain the credentials of
a user account connecting to the machine over Remote Desktop. RDPRA Mode and
Remote Credential Guard are designed to mitigate this risk.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Activity 9-6: Discussing Remote Access Configuration
• ANSWER:
• False. Support for an SSH client and server is being included in feature updates to
Windows 10, and there are numerous commercial and open source products.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Activity 9-6: Discussing Remote Access Configuration
• How can you confirm that you are connecting to a legitimate SSH server?
• ANSWER:
• The server displays its host key on connection. You need to keep a record of valid
host keys and compare the key presented by the server to the record you have.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Topic E: Troubleshoot Network Connections
Exam Objectives:
• 1001-2.8 Given a scenario, use appropriate networking tools.
• 1001-5.7 Given a scenario, troubleshoot common wired and wireless
network problems.
• 1002-1.4 Given a scenario, use appropriate Microsoft command line
tools.
• 1002-3.1 Given a scenario, troubleshoot Microsoft Windows OS
problems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Common Wired Network Connectivity Issues (Slide 1 of
2)
• Rule out hardware-layer connectivity (cable connection)
• Troubleshoot wired connectivity:
• Test with ping
• Verify patch cord between host/panel and panel/switch
• Connect a different host
• Verify network adapter link properties
• Connect to a different port
• Check the switch (if multiple users)
• Use cable testing tools
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Common Wired Network Connectivity Issues (Slide 2 of
2)
• Troubleshoot slow transfer speeds:
• Check network adapter driver configuration
• Check setting for switch port
• Check for:
• Switch or router congestion or network-wide problem
• Adapter driver issues
• Malware
• Interference on network cabling
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Common Wireless Network Connectivity Issues
(Slide 1 of 2)
• Consider problems with physical media, configuration:
• RF signal weakens with distance
• Check security and authentication configuration
• Configuration issues:
• If in range, check SSID mismatch or SSID broadcast
• Standards mismatch
• Dual-band support
• Low RF/RSSI
• Signal issues:
• Channel interference
• Signal blocking
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Common Wireless Network Connectivity Issues
(Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
IP Configuration Issues (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
IP Configuration Issues (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
IP Connectivity Issues (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
IP Connectivity Issues (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
IP Connectivity Issues (Slide 3 of 3)
• Test DNS:
• Ping DNS names.
• Try reverse lookup.
• Troubleshoot IP conflicts:
• Possible configuration error due to static assignment.
• Windows disables IP.
• Identify affected machines and resolve duplicate.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
Routing Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111
Unavailable Resources (Slide 1 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
Unavailable Resources (Slide 2 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 113
Unavailable Resources (Slide 3 of 5)
• Performing a reset:
• Restart server as stock response to persistent problems
• Restart application
• Run Windows network troubleshooter
• Reset the network stack
• Windows 10: Network & Internet > Status
• Windows 7/8: Network Adapter troubleshooter or command-line tools
• Remove network adapters and reboot; update all network settings
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 114
Unavailable Resources (Slide 4 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 115
Unavailable Resources (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 116
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 117
Activity 9-7: Discussing Network Connection
Troubleshooting
• You are trying to add a computer to a wireless network but cannot detect
the access point. What would you suspect the problem to be?
• ANSWER:
• The computer's wireless adapter is not supported by the AP, the computer is not in
range, or there is some sort of interference.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 118
Activity 9-7: Discussing Network Connection
Troubleshooting
• What readings would you expect to gather with a Wi-Fi analyzer?
• ANSWER:
• The signal strength of different Wi-Fi networks and their channels within range of the
analyzer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 119
Activity 9-7: Discussing Network Connection
Troubleshooting
• You have restarted the DHCP server following a network problem. What
command would you use to refresh the IP configuration on Windows 7
client workstations?
• ANSWER:
• ipconfig /renew
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 120
Activity 9-7: Discussing Network Connection
Troubleshooting
• What command can you use on a Linux computer to report the IP
configuration?
• ANSWER:
• Historically, this could be reported using the ifconfig tool. The ip command is now
preferred.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 121
Activity 9-7: Discussing Network Connection
Troubleshooting
• A single PC on a network cannot connect to the Internet. Where would
you start troubleshooting?
• ANSWER:
• You could test the PC's IP configuration, specifically the default gateway or name
resolution, or you could check that the cable is good.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 122
Activity 9-7: Discussing Network Connection
Troubleshooting
• A computer cannot connect to the network. The machine is configured to
obtain a TCP/IP configuration automatically. You use ipconfig to
determine the IP address and it returns 0.0.0.0. What does this tell you?
• ANSWER:
• If a DHCP server cannot be contacted, the machine should default to using an APIPA
address (169.254.x.y). As it has not done this, something is wrong with the networking
software installed on the machine (probably the DHCP client service, TCP/IP stack, or
registry configuration, to be specific).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 123
Activity 9-7: Discussing Network Connection
Troubleshooting
• If a host has a firewall configured to block outgoing ICMP traffic, what
result would you expect from pinging the host (assuming that the path to
the host is otherwise OK)?
• ANSWER:
• Destination unreachable.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 124
Activity 9-7: Discussing Network Connection
Troubleshooting
• What Windows tool is used to test the end-to-end path between two IP
hosts on different IP networks?
• ANSWER:
• tracert
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 125
Activity 9-7: Discussing Network Connection
Troubleshooting
• Which command produces the output shown in this graphic?
(slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 126
Activity 9-7: Discussing Network Connection
Troubleshooting
• Which command produces the output shown in this graphic?
(slide 2 of 2)
• ANSWER:
• This is output from netstat. Specifically, it is netstat -ano. The switches show all
connections, with ports in numeric format, and the PID of the process that opened the
port.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 127
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 128
Topic F: Install and Configure IoT Devices
Exam Objectives:
• 1001-2.3 Given a scenario, install and configure a basic wired/wireless
SOHO network.
• 1001-2.4 Compare and contrast wireless networking protocols.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 129
Internet of Things
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 130
IoT Wireless Networking Technologies
Technology Description
• Radio communication speeds up to 3 Mbps; v3 or v4 up to 24 Mbps
Bluetooth • Maximum range of 10 m/30 ft (signal strength weak at max. distance)
Bluetooth Low • Used in many portable/wearable devices
Energy • Pairing procedure
• BLE version for low-powered devices that transmit infrequently
• Wireless protocol for home automation
• Mesh topology over low-energy radio waves
Z-Wave
• Can configure repeaters up to four “hops”
• High 800-low 900 MHz range; runs for years on battery power
• Similar to/competitive with Z-Wave
ZigBee • 2.4 GHz band
• Up to 65,000 devices in single network (232 for Z-Wave); no hop limit
• Tagging and tracking devices with radio-frequency tags
RFID and NFC
• NFC: peer-to-peer version of RFID
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 131
IoT Device Configuration
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 132
Digital Assistants
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 133
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 134
Activity 9-9: Discussing IoT Devices
• What type of network topology is used by protocols such as Zigbee and
ZWave?
• ANSWER:
• A wireless mesh network topology.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 135
Activity 9-9: Discussing IoT Devices
• What types of home automation device might require specialist installer
training?
• ANSWER:
• A device such as a thermostat has to be wired safely and correctly to the heating
controls, door locks must be fitted securely by a joiner or carpenter, and even a
security camera would be better fitted by someone with the skills to evaluate the best
placement. While a homeowner might attempt these as DIY jobs, a service or support
company should not allow untrained staff to attempt this type of installation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 136
Activity 9-9: Discussing IoT Devices
• What are the two main options for operating smart devices?
• ANSWER:
• Using a smartphone/tablet app, or using a voice-enabled smart speaker. Some
devices might also support configuration via a web app.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 137
Activity 9-9: Discussing IoT Devices
• True or false? Voice processing by a smart speaker is performed
internally so these devices can be used without an Internet connection.
• ANSWER:
• False. The speaker passes the voice data to a backend server for processing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 138
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 139
Reflective Questions
2. Do you have any experience working with SOHO networks? What do you
expect to support in future job functions?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 140
Managing Users, Workstations, and
Shared Resources
Managing Users, Workstations, and Shared Resources
• Manage Users
• Configure Shared Resources
• Configure Active Directory Accounts and Policies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Manage Users
Exam Objectives:
• 1002-1.4 Given a scenario, use appropriate Microsoft command line
tools.
• 1002-1.5 Given a scenario, use Microsoft operating system features
and tools.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
• 1002-2.6 Compare and contrast the differences of basic Microsoft
Windows OS security
• settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
User and Group Accounts (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
User and Group Accounts (Slide 2 of 2)
• System Groups
• Everyone
• Authenticated Users
• Creator Owner
• Interactive
• Network
• System and Service Accounts
• LocalSystem
• LocalService
• NetworkService
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Local Users and Groups (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Local Users and Groups (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Local Security Policy
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
SSO and Credential Manager
Single Sign-On (SSO): Any authentication technology that allows a
user to authenticate once and receive authorizations for multiple
services.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Activity 10-1: Discussing Windows User Management
• Which three principal user security groups are created when Windows is
installed?
• ANSWER:
• Users, Administrators, and Guests. You might also include Power Users, though use
of this group is deprecated. There are also system groups, but users cannot be
assigned manually to these. Going beyond the account types listed in the exam
objectives, you might include groups such as Remote Desktop Users, Remote
Management Users, or Backup Operators.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Activity 10-1: Discussing Windows User Management
• What tool would you use to add a user to a local security group?
• ANSWER:
• You can change the account type between Standard and Administrator via the basic
Users app, but the Local Users and Groups management console is the main tool to
use. You could also use the net command suite or PowerShell.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Activity 10-1: Discussing Windows User Management
• True or false? If you delete a user, you can recover the user's permissions
and group memberships by creating a new account with the same name.
• ANSWER:
• False. Accounts have a unique Security Identifier (SID) that Windows uses to track
them. A newly created account would have the same name but a different SID.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Activity 10-1: Discussing Windows User Management
• ANSWER:
• Set the User must change password at next logon option in the user account
properties.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Activity 10-1: Discussing Windows User Management
• ANSWER:
• It is the image name of the Local Security Policy management console. You can use
this to define system security policies, such as password complexity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Topic B: Configure Shared Resources
Exam Objectives:
• 1002-1.4 Given a scenario, use appropriate Microsoft command line
tools.
• 1002-1.8 Given a scenario, configure Microsoft Windows networking on
a client/desktop.
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
• 1002-2.6 Compare and contrast the differences of basic Microsoft
Windows OS security settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Workgroups
Peer-to-peer network: A network with no dedicated server and
each computer acts as both a server and a client.
Workgroup: A small group of computers on a network that share
resources in a peer-to-peer fashion.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Homegroups
Homegroup: Windows networking feature designed to allow Windows
7 and later home networks to share files and printers easily through a
simple password protection mechanism.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Network and Sharing Center (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Network and Sharing Center (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Network Share Configuration (Slide 1 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Network Share Configuration (Slide 2 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Network Share Configuration (Slide 3 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Network Share Configuration (Slide 4 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Network Share Configuration (Slide 5 of 6)
Network drive: A local share that has been assigned a drive letter.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Network Share Configuration (Slide 6 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Offline Files and Sync Center
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
The net Commands
• net /?
• net use /?
• net use DeviceName \\ComputerName\ShareName
• net use DeviceName /delete
• net use * /delete
• net view
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
NTFS File and Folder Permissions (Slide 1 of 8)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
NTFS File and Folder Permissions (Slide 2 of 8)
Folder Allows
Permission
Read View files and subfolders including their attributes, permissions,
and ownership.
Write Create new folders and files, change attributes, view
permissions and ownership.
List View the names of files and subfolders.
Read & Pass-through folders for which no permissions are assigned,
Execute plus read and list permissions.
Modify Includes Read/Execute and Write permissions, as well as the
ability to rename and delete the folder.
Full Control All the above, plus changing permissions, taking ownership, and
deleting subfolders and files. Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
NTFS File and Folder Permissions (Slide 3 of 8)
File Allows
Permission
Read Read the contents of the file and view attributes, ownership, and
permissions.
Write Overwrite the file and view attributes, ownership, and
permissions.
Read & Read permissions, plus the ability to run applications.
Execute
Modify Includes Read/Execute and Write permissions, as well as the
ability to rename and delete the file.
Full Control All the above, plus changing permissions, taking ownership.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
NTFS File and Folder Permissions (Slide 4 of 8)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
NTFS File and Folder Permissions (Slide 5 of 8)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
NTFS File and Folder Permissions (Slide 6 of 8)
Action Effect
Moving files and • Destination folder: Write permission.
folders on the same • Source folder: Modify permission.
NTFS volume • NTFS permissions are retained.
Moving files and • Destination folder: Write permission.
folders to a different • Source folder: Modify permission.
NTFS volume • NTFS permissions are inherited from the destination
folder and the user becomes the Creator/Owner.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
NTFS File and Folder Permissions (Slide 8 of 8)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Activity 10-2: Discussing Shared Resource Configuration
• ANSWER:
• Up to 20 computers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Activity 10-2: Discussing Shared Resource Configuration
• ANSWER:
• The share is hidden from the file browser. It can be accessed by typing a UNC. The
default administrative shares are all configured as hidden.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Activity 10-2: Discussing Shared Resource Configuration
• What basic NTFS permissions do you need to move a file and to copy a
file?
• ANSWER:
• To move a file, you need Write permissions for the destination folder and Modify
permissions for the source folder; to copy a file, you need Write permissions for the
destination folder and Read permissions to the source folder.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Activity 10-2: Discussing Shared Resource Configuration
• When you set permissions on a folder, what happens to the files and
subfolders by default?
• ANSWER:
• They inherit the parent folder's permissions.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Activity 10-2: Discussing Shared Resource Configuration
• If a user obtains Read permissions from a share and Deny Write from
NTFS permissions, can the user view files in the folder over the network?
• ANSWER:
• Yes (but he or she cannot create files).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Activity 10-2: Discussing Shared Resource Configuration
• ANSWER:
• Full control—the most effective permissions are applied.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Topic C: Configure Active Directory Accounts and Policies
Exam Objectives:
• 1002-1.4 Given a scenario, use appropriate Microsoft command line
tools.
• 1002-1.8 Given a scenario, configure Microsoft Windows networking on a
client/desktop.
• 1002-2.2 Explain logical security concepts.
• 1002-2.7 Given a scenario, implement security best practices to secure a
workstation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Windows Active Directory Domains
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Active Directory Components (Slide 1 of 2)
Active Directory Domain Services (AD DS): The database that
contains the users, groups, and computer accounts in a Windows
Server domain.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Active Directory Components (Slide 2 of 2)
Member servers: Any server-based systems that have been
configured into the domain, but do not maintain a copy of the Active
Directory database.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Domain Membership
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Domain Sign-In
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Group Policy Objects (Slide 1 of 2)
GPO: A means of applying security settings (as well as other
administrative settings) across a range of computers and users.
Administrative templates: Group Policy files for registry-based
policy management, which have the .ADM file extension.
Security templates: Settings for services and policy configuration for
a server operating in a particular application role.
RSoP: A Group Policy report showing all of the GPO settings and
how they affect the network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Group Policy Objects (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Basic AD Functions (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Basic AD Functions (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Logon Scripts
Logon script: A file containing commands that run each time a user
logs on to a computer to set up the user environment.
SSO: Any authentication technology that allows a user to
authenticate once and receive authorizations for multiple services.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Home Folder
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Folder Redirection
Folder redirection: A Microsoft Windows technology that allows an
administrative user to redirect the path of a local folder (such as the
user's home folder) to a folder on a network share, making the data
available to the user when they log into any computer on the
network where the network share is located.
Roaming profiles: A Microsoft Windows technology that redirects
user profiles to a network share so that the information is available
when the user logs into any computer on the network where the
network share is located.
Offline files: Files (or folders) from a network share that are cached
locally.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Account Locks and Password Resets
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Activity 10-4: Discussing Active Directory Account and
Policy Configuration
• What type of computer stores Active Directory account information?
• ANSWER:
• A Windows server running the Domain Controller (DC) role.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Activity 10-4: Discussing Active Directory Account and
Policy Configuration
• What are the prerequisites for joining a computer to a domain?
• ANSWER:
• The computer must be running a supported edition of Windows (Professional,
Enterprise, or Ultimate). The computer must be joined to the network with an
appropriate IP configuration (typically configured via DHCP) and be able to access the
domain's DNS server(s). An account with domain administrative credentials must be
used to authorize the join operation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Activity 10-4: Discussing Active Directory Account and
Policy Configuration
• True or false? If you want the same policy to apply to a number of
computers within a domain, you could add the computers to the same
Organizational Unit (OU) and apply the policy to the OU.
• ANSWER:
• True.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Activity 10-4: Discussing Active Directory Account and
Policy Configuration
• What is the difference between the gpupdate and gpresult commands?
• ANSWER:
• gpupdate is used to refresh local policy settings with updates or changes from the
policy template. gpresult is used to identify the Resultant Set of Policies (RSoP) for a
given computer and/or user account.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Activity 10-4: Discussing Active Directory Account and
Policy Configuration
• In Active Directory, what are the options for running a script each time the
user logs on?
• ANSWER:
• You can specify scripts to run for a number of users by using group policy and
attaching the policy to an appropriate container, such as an OU. You can also specify
a script manually for each user account via the account properties.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Activity 10-4: Discussing Active Directory Account and
Policy Configuration
• How do you unlock an AD user account?
• ANSWER:
• Open Active Directory Users and Computers. and locate the user account. Right-click
the user object and select Properties. Check the Unlock account box. Select OK.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Reflective Questions
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Implementing Client Virtualization
and Cloud Computing
Implementing Client Virtualization and Cloud Computing
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Configure Client-Side Virtualization
Exam Objectives:
• 1001-4.2 Given a scenario, set up and configure client-side
virtualization.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Virtualization
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Hypervisors (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Hypervisors (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Hypervisors (Slide 3 of 4)
• Examples:
• VMware Workstation
• Oracle Virtual Box
• Parallels Workstation
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Hypervisors (Slide 4 of 4)
• Examples:
• VMware ESX Server
• Microsoft Hyper-V
• Citrix XEN Server
• Linux KVM
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Processor Support and Resource Requirements (Slide 1
of 2)
• CPU with built-in instruction sets to facilitate virtualization
• Intel: VT-x
• AMD: AMD-v
• SLAT to improve virtual memory performance
• Intel: EPT
• AMD: RVI
• Multiple CPU resources
• SMP
• Multiple physical processors
• Multi-core
• HyperThreading
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Processor Support and Resource Requirements (Slide 2
of 2)
• Each guest OS requires memory above that required by the host.
• Each guest OS requires hard disk space for the VM image.
• Most hypervisors allow guest VMs to use host adapters and peripherals.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Virtual Networks (Slide 1 of 3)
• Multiple VMs can communicate with each other using standard networking
protocols.
• Guest OS emulates standard network adapter hardware.
• Can often have multiple adapters.
• Configurable just like a physical adapter.
• Hypervisor implements network connectivity via virtual switches.
• Function like Ethernet switches.
• Implemented in software.
• Connectivity between virtual adapters and virtual switches configured in hypervisor.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Virtual Networks (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Virtual Networks (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Virtual Machines (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Virtual Machines (Slide 2 of 3)
• Virtual labs
• Support legacy software applications
• Development environment
• Training
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Virtual Machines (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Security Requirements (Slide 1 of 3)
Rogue VM: A virtual machine that has been installed without
authorization.
VM sprawl: The uncontrolled development of more and more virtual
machines.
Guest OS Security
• Each guest OS must be patched and protected against malware.
• Running security software on each guest OS can cause performance issues.
• Rogue VMs and VM sprawl are major security concerns.
• System management software can detect rogue VMs.
• VMs should conform to an application template.
• Rogue developers often install backdoors and logic bombs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Security Requirements (Slide 2 of 3)
MTBF: The rating on a device or component that predicts the
expected time between failures.
Denial of Service (DoS): A network attack that aims to disrupt a
service, usually by overloading it.
Host Security
• If host is compromised, so are guest Oss.
• Host hardware failures are a single point of failure.
• High resource utilization can decrease MTBF of components.
• DOS attack on host or hypervisor causes more damage than to a single server.
• Most hypervisors support disk snapshots to revert to saved image.
• Snapshots can be misused to perform DoS attacks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Security Requirements (Slide 3 of 3)
Hypervisor Security
• Hypervisor provides another attack surface
• Few attacks have been detected so far
• Keep hypervisor up-to-date with patches to help prevent VM escapes
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Activity 11-1: Discussing Client-Side Virtualization
Configuration
• What is a Type 2 hypervisor?
• ANSWER:
• Hypervisor software that must be installed to a host OS. A Type 1 (or bare metal)
hypervisor is installed directly on the host PC.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity 11-1: Discussing Client-Side Virtualization
Configuration
• What is a guest OS?
• ANSWER:
• An OS installed on a virtual machine running within the virtual environment.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 11-1: Discussing Client-Side Virtualization
Configuration
• What system resources are most important on a system designed to host
multiple virtual machines?
• ANSWER:
• The CPU must support virtualization extensions (and ideally be multi-processor or
multicore), and there must be plenty of system memory and disk space.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 11-1: Discussing Client-Side Virtualization
Configuration
• What might you need to install to a guest OS to make full use of a
hypervisor's features?
• ANSWER:
• The drivers for the emulated hardware (often referred to as an extensions, additions,
or integration components).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 11-1: Discussing Client-Side Virtualization
Configuration
• True or false? VMs can be networked together by using a virtual switch,
which is implemented in software by the hypervisor.
• ANSWER:
• True.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity 11-1: Discussing Client-Side Virtualization
Configuration
• If users have access to virtualization tools, what network security
controls might be required?
• ANSWER:
• A VM needs to be subject to network access control and authorization, like any
physical computer device. The VMs need to be checked to ensure they are not
running malware, for instance.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 11-1: Discussing Client-Side Virtualization
Configuration
• If you are using a normal antivirus product to protect a VM from malware,
should you install the A-V product on the host to scan the VM disk image
or on the VM itself?
• ANSWER:
• On the VM. The A-V software will not be able to scan the disk image for malware and
may lock the file and cause performance problems while trying to perform the scan.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Topic B: Cloud Computing Concepts
Exam Objectives:
• 1001-2.2 Compare and contrast common networking hardware devices.
• 1001-4.1 Compare and contrast cloud computing concepts.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Cloud Computing (Slide 1 of 2)
Cloud: Any sort of IT infrastructure provided to the end user where
the end user is not aware of or responsible for any details of the
procurement, implementation, or management of the infrastructure.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Cloud Computing (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Benefits of Cloud Computing
Rapid elasticity: The ability to scale cloud computing resources
quickly to meet peak demand and just as quickly remove resources
if they are not currently needed.
Measured service: A provider's ability to control and bill a
customer's use of resources such as CPU, memory, disk, and
network bandwidth through metering.
• Rapid elasticity
• On-demand and pay-per-use
• Measured service
• Resource pooling
• Flexibility
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Common Cloud Models
• Public or multi-tenant
• Hosted private
• Private
• Community
• Hybrid
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Internal and External Shared Resources
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Cloud Service Options (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Cloud Service Options (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Virtual Desktops (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Virtual Desktops (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Cloud-Based Applications
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Cloud-Based Network Controllers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Activity 11-2: Discussing Cloud Computing Concepts
• How do the five components of cloud computing defined by the NIST
work together to provide users with cloud computing services?
• ANSWER:
• Resource allocation is provided through rapid elasticity and resource pooling.
Resource allocation is requested through on-demand self-service. Broad network
access makes the resources available to the user. Measured service enables the
provider to meter customer usage and bill the customer accordingly.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Activity 11-2: Discussing Cloud Computing Concepts
• Which type of cloud would your organization be likely to use?
• ANSWER:
• (Answers will vary.) Depending on how much control you need over the storage or
services provided through the cloud, you might select a private cloud solution as the
most secure, and a community cloud solution as the least secure.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Activity 11-2: Discussing Cloud Computing Concepts
• A cloud service should exhibit rapid elasticity, allow users to access
resources on-demand, and pay on a per-use basis. What type of service
should the provider run to enable these features?
• ANSWER:
• A measured service with the resources to cope with changing demands.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Activity 11-2: Discussing Cloud Computing Concepts
• A company has contracted the use of a remote data center to offer
exclusive access to Platform as a Service resources to its internal
business users. How would such a cloud solution be classed?
• ANSWER:
• Offsite hosted private.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity 11-2: Discussing Cloud Computing Concepts
• When users connect to the network, they use a basic hardware terminal to
access a desktop hosted on a virtualization server. What type of
infrastructure is being deployed?
• ANSWER:
• Virtual Desktop Infrastructure (VDI).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Reflective Questions
2. What type of cloud computing does your organization use? What other services
might you recommend be implemented?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Security Concepts
Security Concepts
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Topic A: Logical Security Concepts
Exam Objectives:
• 1002-2.2 Explain logical security concepts.
• 1002-2.7 Given a scenario, implement security best practices to secure
a workstation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Security Basics (Slide 1 of 2)
Confidentiality: The fundamental security goal of keeping
information and communications private and protecting them from
unauthorized access.
Integrity: The fundamental security goal of ensuring that electronic
data is not altered or tampered with.
Availability: The fundamental security goal of ensuring that
systems operate continuously and that authorized individuals can
access data that they need.
Hardening: A security technique in which the default configuration
of a system is altered to protect the system against attacks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Security Basics (Slide 2 of 2)
• CIA triad
• Confidentiality
• Integrity
• Availability
• Security policies
• Harden systems
• Cover all aspects of computer and network technology from procurement to change to
disposal
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Security Controls (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Security Controls (Slide 2 of 4)
• Physical controls
• Fences
• Doors
• Locks
• Fire extinguishes
• Procedural controls
• Incident response processes
• Management oversight
• Security awareness
• Training
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Security Controls (Slide 3 of 4)
• Logical controls
• User authentication
• Software-based access controls
• Anti-virus software
• Firewalls
• Legal, regulatory, compliance controls
• Privacy laws
• Policies
• Clauses
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Security Controls (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Implicit Deny and Least Privilege
Implicit deny: Unless something has explicitly been granted access
it should be denied access.
Least privilege: Something should be allocated the minimum
necessary rights, privileges, or information to perform its role.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Encryption (Slide 1 of 3)
Encryption: Scrambling the characters used in a message so that
the message can be seen but not understood or modified unless it
can be deciphered.
Symmetric encryption
• Single secret key used to encrypt and decrypt data
• May be two keys, but one is easy to determine for the other
• Need to securely distribute and store the key
• Faster and less intensive than asymmetric encryption
• Use 1024-bit key encryption
• Hardware to break
• Takes more processing to perform encryption and decryption
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Encryption (Slide 2 of 3)
Key exchange: Two hosts need to know the same symmetric
encryption key without any other host finding out what it is.
RSA cipher: The first successful algorithm to be designed for public
key encryption. It is named for its designers, Rivest, Shamir, and
Adelman.
Asymmetric encryption
• Uses a private key to decrypt data
• Mathematically related public key encrypts data
• Often used for digital certificates, digital signatures, and key exchange
• Most often uses RSA cipher
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Encryption (Slide 3 of 3)
Cryptographic encryption: A hashed value from which it is
impossible to recover the original data.
Hash: The value that results from hashing encryption as a short
representation of data.
SHA1/2: A cryptographic hashing algorithm created to address
possible weaknesses in MDA.
MD5: The Message Digest Algorithm.
Cryptographic encryption
• Provides integrity function in most systems
• Not technically encryption as it is a one-way cryptographic process
• Often uses
• SHA-1
• SHA-2
• MD5
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
PKI and Certificates
PKI: Asymmetric encryption for secure key distribution for
symmetric encryption.
CA: A server that can issue digital certificates and the associated
public/private key pairs.
Digital certificate: X.509 certificate issued by a CA as guarantee
that the key belongs to the organization.
• Asymmetric encryption is important part of PKI.
• PKI authenticates subjects on public networks.
• Users and servers are validated by a CA.
• Digital certificate contains public key associated with the subject.
• Certificate signed by the CA to guarantee validity.
• Client can send data to the server using the public key knowing only the server
can decrypt the data.
• Digital certificates also used to secure authentication to networks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Execution Control (Slide 1 of 5)
Execution control: Logical security technologies designed to
prevent malicious software from running on a host and establish a
security system that does not entirely depend on the good behavior
of individual users.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Execution Control (Slide 2 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Execution Control (Slide 3 of 5)
• Disable AutoRun
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Execution Control (Slide 4 of 5)
Heuristic: Monitoring technique that allows dynamic pattern matching
based on past experience rather than relying on pre-loaded
signatures.
Anti-malware: Software that scans devices for malicious software.
• Anti-virus:
• Detects malware and prevents it from executing
• Uses database of known patterns
• Definitions
• Signatures
• Uses heuristic identification
• Anti-malware detects threats that are not virus-like:
• Spyware
• Trojans
• Rootkits
• Ransomware Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Execution Control (Slide 5 of 5)
Patch Management:
• Apply all the latest patches to ensure the system is as secure as possible
against attacks against flaws in the software.
• Only apply a patch if it solves a particular problem being experienced.
• Requires more work
• Need to keep abreast of security bulletins
• Updates can cause problems with application compatibility
• Test updates on non-production system before rolling out.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
NAC (Slide 1 of 3)
Firewalls: Hardware or software that filters traffic passing into or out
of a network.
Defense in depth: Configuring security controls on hosts as well as
providing network security, physical security, and administrative
controls.
NAC: A means of ensuring endpoint security.
Health policy: Policies or profiles describing a minimum security
configuration that devices must meet to be granted network access.
MAC filtering: Applying an access control list to a switch or access
point so that only clients with approved MAC addresses can connect
to it.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
NAC (Slide 2 of 3)
Port-based NAC: An IEEE 802.1X standard in which the switch (or
router) performs some sort of authentication of the attached device
before activating the port.
Supplicant: Under 802.1X, the device requesting access.
EAPoL: Framework for negotiating authentication methods,
supporting a range of authentication devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
NAC (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
MDM
MDM: Software suites designed to manage use of smartphones and
tablets within an enterprise.
BYOD: Security framework and tools to facilitate use of personally
owned devices to access corporate networks and data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
VPN
VPN: A secure tunnel created between two endpoints connected via
an unsecure network.
IPSec: Layer 3 protocol suite providing security for TCP/IP.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 12-1: Discussing Logical Security Concepts
• ANSWER:
• Availability—information that is inaccessible is not of much use to authorized users.
For example, a secure system must protect against Denial of Service (DoS) attacks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 12-1: Discussing Logical Security Concepts
• ANSWER:
• The principle of least privilege.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Activity 12-1: Discussing Logical Security Concepts
• ANSWER:
• An encrypted ciphertext can be decrypted by using the correct key; a cryptographic
hash is irreversibly scrambled.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Activity 12-1: Discussing Logical Security Concepts
• ANSWER:
• The Advanced Encryption Standard (AES) is a symmetric encryption cipher. This
means that the same key can be used to perform both encryption and decryption
operations on a message.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Activity 12-1: Discussing Logical Security Concepts
• ANSWER:
• A digital certificate is a wrapper for a subject's public key. The public and private keys
in an asymmetric cipher are paired. If one key is used to encrypt a message, only the
other key can then decrypt it.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Activity 12-1: Discussing Logical Security Concepts
• John brought in the new tablet he just purchased and tried to connect to the
corporate network. He knows the SSID of the wireless network and the password
used to access the wireless network. He was denied access, and a warning
message was displayed that he must contact the IT Department immediately. What
happened and why did he receive the message?
• ANSWER:
• John's new tablet probably does not meet the compliance requirements for network access. Being
a new device, it might not have had updates and patches applied, it might not have appropriate
virus protection installed, or it does not meet some other compliance requirement. This caused the
system to appear as a non-compliant system to the network, and network access was denied.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Activity 12-1: Discussing Logical Security Concepts
• ANSWER:
• A Virtual Private Network (VPN) is often deployed to provide remote access to users
who cannot otherwise make a physical connection an office network. A remote access
VPN means that the user can connect to a private network using a public network for
transport. Encryption and authentication are used to make sure the connection is
private and only available to authorized users. You might also mention that VPNs can
be used to other types of access (such as connecting one network site to another).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Topic B: Threats and Vulnerabilities
Exam Objectives:
• 1002-2.5 Compare and contrast social engineering, threats, and
vulnerabilities.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Vulnerabilities, Threats, and Risks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Social Engineering Threats
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Common Social Engineering Exploits
• Impersonation
• Phishing
• Spoofing
• Spear phishing
• Pharming
• Dumpster diving
• Shoulder surfing
• Tailgating
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Mitigation of Social Engineering Attacks
• Training
• Only release information using standard procedures
• Identify phishing style attacks
• Not to release work-related information to third-party sites or social networking
• Reporting system for suspected attacks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Network Footprinting Threats (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Network Footprinting Threats (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Eavesdropping Threats
Eavesdropping: Listening in to communications sent over media.
MAC flooding: Overloading the switch’s MAC cache to prevent
genuine devices from connecting.
ARP poisoning: Maps IP addresses to NIC MAC address.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Spoofing and MITM Threats
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Password Attacks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Types of Password Attacks
• Dictionary
• Brute force
• Rainbow table
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Denial of Service Attacks (Slide 1 of 4)
• DoS attack:
• Causes service to fail or be unavailable to legitimate users
• Overload a service
• Exploit design failures
• Physical DoS attack could be cutting cables
• Can be precursor to DNS spoofing attack
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Denial of Service Attacks (Slide 2 of 4)
Distributed DoS (DDoS): A DoS attack that uses multiple
compromised computers (a "botnet" of "zombies") to launch the
attack.
Botnet: A network attack that aims to disrupt a service, usually by
overloading it.
Zombie: Unauthorized software that directs the devices to launch a
DDoS attack.
Cyber warfare: The use of IT services and devices to disrupt
national, state, or organization activities, especially when used for
military purposes.
Hacker collectives: A group of hackers, working together, to target
an organization as part of a cyber warfare campaign.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Denial of Service Attacks (Slide 3 of 4)
• DDoS attack:
• Attack launched from multiple compromised systems—a botnet
• After bot is installed, attacker has a backdoor to the device.
• Install and trigger zombies to launch attack
• Can be coordinated between multiple attackers
• Cyber warfare:
• Terrorists attack companies or governments
• Hacker collectives might target organizations as part of a campaign
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Denial of Service Attacks (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Vulnerabilities and Zero-Day Exploits
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Activity 12-2: Discussing Threats and Vulnerabilities
• ANSWER:
• Many different of attacks can be classed as a type of social engineering, but they all
exploit some weakness in the way people behave (through manipulation and
deception). These weaknesses might arise from politeness and cultural norms, from
habitual behavior, or from respect for authority and rank.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Activity 12-2: Discussing Threats and Vulnerabilities
• An attacker crafts an email addressed to a senior support technician
inviting him to register for free football coaching advice. The website
contains password-stealing malware. What is the name of this type of
attack?
• ANSWER:
• A phishing attack tries to make users authenticate with a fake resource, such as a
website that appears to be a genuine online banking portal. Phishing emails are often
sent in mass as spam. This is a variant of phishing called spear phishing, because it is
specifically targeted at a single person, using personal information known about the
subject (such as his or her hobbies).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Activity 12-2: Discussing Threats and Vulnerabilities
• ANSWER:
• Tailgating means following someone else through a door or gateway to enter premises
without authorization. Shoulder surfing means observing someone type a PIN or
password or other confidential data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Activity 12-2: Discussing Threats and Vulnerabilities
• ANSWER:
• A packet sniffer or packet capture utility. When combined with software to decode the
frames, these can also be called packet analyzers or network monitors.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Activity 12-2: Discussing Threats and Vulnerabilities
• ANSWER:
• Address Resolution Protocol (ARP) poisoning or spoofing. This is a type of Man-in-
the-Middle attack.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Activity 12-2: Discussing Threats and Vulnerabilities
• ANSWER:
• Brute force attacks are effective against short passwords (under seven characters).
Dictionary attacks depend on users choosing ordinary words or phrases in a
password.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Activity 12-2: Discussing Threats and Vulnerabilities
• ANSWER:
• Denial of Service (DoS) is any type of attack that halts or disrupts a network
application or resource. A Distributed Denial of Service (DDoS) is a specific class of
DoS attack. It means that the attacker uses multiple hosts to launch the attack. The
distributed hosts are usually PCs and other devices (zombies) compromised by
malware (bots) controlled by the attacker.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Activity 12-2: Discussing Threats and Vulnerabilities
• ANSWER:
• A zero day is a type of software exploit. You could also say that it is associated with
hacking and malware threats. The term arises because an attacker has found a
means of exploiting a vulnerability in the software before the software developer has
been able to create a patch or fix for the vulnerability.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Topic C: Physical Security Measures
Exam Objectives:
• 1002-2.1 Summarize the importance of physical security measures.
• 1002-2.9 Given a scenario, implement appropriate data destruction and
disposal methods.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Physical Security Controls
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Lock Types
• Conventional
• Deadbolt
• Electronic
• Token-based
• Biometric
• Multifactor
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Turnstiles and Mantraps
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Security Guards
• Humans:
• Armed
• Unarmed
• At critical checkpoints
• Verify authentication:
• Allow or deny access
• Log physical entry
• Visual deterrent
• Apply knowledge and intuition to potential security breaches
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
ID Badges and Smart Cards
RFID badge: An ID badge containing a chip allowing data to be
read wirelessly.
Common Access Card: An identity and authentication smart card
produced for Department of Defense employees and contractors in
response to a Homeland Security Directive.
Personal Identification Verification Card: Smart card standard for
access control to US Federal government premises and computer
networks.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Entry Control Rosters
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Physical Security Controls for Devices
Privacy screen: A filter to fit over a display screen so that it can
only be viewed straight-on.
• Cable locks
• Locking cabinets
• Privacy screens
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Data Disposal Methods (Slide 1 of 3)
Remnant removal: Data that has nominally been deleted from a
disk by the user can often be recovered using special tools. The
best way to shred data without physically destroying a disk is to
ensure that each writable location has been overwritten in a random
pattern.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Data Disposal Methods (Slide 2 of 3)
Shredding: Grinding a disk into little pieces.
Incineration: Exposing the disk to high heat to melt its components.
Degaussing: Exposing the disk to a powerful electromagnet to
disrupt the magnetic pattern that stores data on the disk surface.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Data Disposal Methods (Slide 3 of 3)
Disk wiping: Overwriting each disk location using zeroes or in a
random pattern, leaving the disk in a clean state for reuse.
Low level format: Creates cylinders and sectors on the disk.
• Overwrite data
• Wipe disk
• Low level formatting
• Wipes software
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Activity 12-3: Discussing Physical Security Measures
• ANSWER:
• Biometric authentication deployed as part of a building's entry control system.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Activity 12-3: Discussing Physical Security Measures
• ANSWER:
• A visible ID badge shows that someone is authorized to move around a particular
zone. This means that even if they are able to slip through a door using tailgating or
some other method, they can be identified and challenged for not wearing visible ID.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Activity 12-3: Discussing Physical Security Measures
• ANSWER:
• Name and company being represented, date, time of entry, and time of departure,
reason for visiting, and contact within the organization.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Activity 12-3: Discussing Physical Security Measures
• ANSWER:
• A computer in which the chassis can be locked shut, preventing access to physical
components.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Activity 12-3: Discussing Physical Security Measures
• ANSWER:
• A display device such as a monitor. A privacy screen prevents the display from being
observed at any angle other than directly in front of the screen.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Activity 12-3: Discussing Physical Security Measures
• ANSWER:
• Incineration, degaussing, and shredding. Making the disk unusable by damaging it
with a drill or hammer is likely to leave remnants that could in theory be analyzed.
Note that degaussing is not effective against SSDs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Reflective Questions
2. What steps has your organization taken to ensure the security of mobile
devices? Have you planned ahead in case the devices are lost or stolen? If so,
how?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Securing Workstations and Data
Securing Workstations and Data
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Implement Security Best Practices
Exam Objectives:
• 1002-2.2 Explain logical security concepts.
• 1002-2.3 Compare and contrast wireless security protocols and
authentication methods.
• 1002-2.7 Given a scenario, implement security best practices to secure
a workstation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Authentication
• Access control depends on credentials being known only to the account holder.
• Use various authentication factors:
• Something you know
• Something you have
• Something you are
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Something You Know: Strong Passwords
• Strong passwords
• 8 – 14 characters for regular user accounts, longer for administrative accounts
• No single words
• No obvious phrases
• Mixed case
• Use easily memorized phrase
• Don’t write down passwords or share passwords
• Change the password periodically
• Password management
• Single sign on
• Avoid using work passwords for personal accounts
• Implement BIOS/UEFI passwords
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Something You Have: Smart Cards and Tokens
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Something You Are: Biometrics
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Multifactor Authentication
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Software Tokens
Replay attack: Where the attacker intercepts some authentication
data and reuses it to try to re-establish a session.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Remote Authentication
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Password and Account Policies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Password Protection Policies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Account Restrictions
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Desktop Lock and Timeout
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Guidelines for Implementing Security Best Practices
• Consider using multifactor authentication.
• Create secure passwords.
• Consider password protecting BIOS/UEFI.
• Take measures to prevent software tokens from being used in replay attacks.
• Consider using RADIUS in VPN implementations and TACACS+ for
authenticating administrative access to routers and switches.
• Enforce use of ACLs through Local Security Policy or Group Policy Objects.
• Enforce the use of strong passwords through GPOs.
• Implement account restrictions.
• Require users to lock unattended systems.
• Implement timeouts for unattended systems.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Activity 13-1: Discussing Security Best Practices
Implementation
• What constitutes a strong password?
• ANSWER:
• Something easy to remember but difficult to guess. A password should be sufficiently
long and mix alphanumeric and punctuation characters and case.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Activity 13-1: Discussing Security Best Practices
Implementation
• How does a smart card provide authentication?
• ANSWER:
• It contains a chip that can store the user's account and credentials securely in a digital
certificate that the logon provider trusts. Therefore, possession of the device is
confirmation of identity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Activity 13-1: Discussing Security Best Practices
Implementation
• Why should use of a smart card be protected by a PIN?
• ANSWER:
• To prevent misuse of the card if it is lost or stolen.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity 13-1: Discussing Security Best Practices
Implementation
• What are the drawbacks of biometric authentication technologies?
• ANSWER:
• Users find it intrusive, it is relatively expensive (compared to password-based
authentication), and there are risks from false positives and false negatives. Some
implementations of biometric methods can be vulnerable to spoofing, such as using a
photograph to pass through a facial recognition system.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Activity 13-1: Discussing Security Best Practices
Implementation
• What type of biometric recognition is most suitable for integrating with a
laptop computer?
• ANSWER:
• Finger or thumbprint readers are generally the simplest type of device. Facial
recognition using a built-in camera is also becoming popular.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity 13-1: Discussing Security Best Practices
Implementation
• What general methods can be used to prevent a replay attack against a
software token?
• ANSWER:
• Using coding techniques to accept a token only once or restrict the timeframe in which
a token can be used.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 13-1: Discussing Security Best Practices
Implementation
• In AAA architecture, what type of device might a RADIUS client be?
• ANSWER:
• AAA refers to Authentication, Authorization, and Accounting. When the role is played
by a Remote Access Dial-in User Service (RADIUS) server, the server processes
authentication and authorization requests. The clients submitting the requests to the
server are network access devices, such as routers, switches, wireless access points
and VPN servers. The end user devices connecting to them are referred to as
supplicants.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 13-1: Discussing Security Best Practices
Implementation
• What type of account policy can protect against password-guessing
attacks?
• ANSWER:
• A lockout policy (disables the account after a number of incorrect logon attempts).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Topic B: Implement Data Protection Policies
Exam Objectives:
• 1002-1.6 Given a scenario, use Microsoft Windows Control Panel
utilities.
• 1002-2.2 Explain logical security concepts.
• 1002-2.6 Compare and contrast the differences of basic Microsoft
Windows OS security settings.
• 1002-2.7 Given a scenario, implement security best practices to secure a
workstation.
• 1002-4.6 Explain the processes for addressing prohibited content/activity,
and privacy, licensing, and policy concepts.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Data Policies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
PII (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
PII (Slide 2 of 2)
Protected Health Information: (PHI) Information that identifies
someone as the subject of medical and insurance records, plus
associated hospital and laboratory test results.
Payment Card Industry Data Security Standard: (PCI DSS) A
standard for organizations that process credit or bank card
payments.
• PHI:
• Anonymizes data
• Highly sensitive and unrecoverable; cannot be changed
• PCI DSS:
• Identifies steps to take if cardholder data is stored
• Specific cyber-security controls
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
ACLs and Directory Permissions
Permissions: Rights granted to access files and folders.
Access Control List: (ACL) The permissions attached to or
configured on a network resource.
Access Control Entries: (ACE) Within an ACL, the records of
subjects and the permissions they hold on the resource.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Data Encryption
Encrypting File System: (EFS) Under NTFS, files and folders can
be encrypted to ensure privacy of the data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Full Disk Encryption
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Data Loss Prevention (DLP)
Data Loss Prevention: (DLP) Software that can identify data that
has been classified and apply fine-grained user privileges to it.
• Policy server
• Endpoint agents
• Network agents
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Software Licensing and DRM (Slide 1 of 2)
End User License Agreement: (EULA) The agreement governing the
installation and use of proprietary software.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Guidelines for Implementing Data Protection Policies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Activity 13-2: Discussing Data Protection Policies
• ANSWER:
• Disclosing Personally Identifiable Information (PII) may lead to loss of privacy or
identity theft. There may be legal or regulatory penalties for mishandling PII.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Activity 13-2: Discussing Data Protection Policies
• What is PHI?
• ANSWER:
• Protected Health Information (PHI) is data such as medical records, insurance forms,
hospital/laboratory test results, and so on.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Activity 13-2: Discussing Data Protection Policies
• ANSWER:
• False—only the user can decrypt files, via their account password or a backup key. In
a Windows domain, administrators can be configured key recovery agents but the
local administrator does not have this right automatically. This means that the disk
cannot be connected to a different computer to circumvent the protection afforded by
encryption.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Activity 13-2: Discussing Data Protection Policies
• ANSWER:
• A Trusted Platform Module can store the disk encryption key to tie use of the disk to a
particular computer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Activity 13-2: Discussing Data Protection Policies
• ANSWER:
• Data Loss Prevention (DLP).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Activity 13-2: Discussing Data Protection Policies
• ANSWER:
• Original Equipment Manufacturer (OEM).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Topic C: Protect Data During Incident Response
Exam Objectives:
• 1002-4.6 Explain the processes for addressing prohibited content/activity,
and privacy, licensing, and policy concepts.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Incident Response Policies
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Incident Response Documentation
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
First Responders
Incident: Something that is not normal and disrupts regular
operations in the computing environment.
Computer Security Incident Response Team: (CSIRT) Team with
responsibility for incident response.
• Categorize and prioritize incident types.
• CSIRT team members:
• Provide the range of decision making and technical skills needed to respond to
incidents.
• Mix of senior decision makers, managers, and technicians.
• Employees at all levels must be trained to recognize and respond to actual or
suspected security incidents.
• Offer confidential reporting.
• Consider using out-of-band communications so intruder is not alerted to being
detected.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Data and Device Preservation (Slide 1 of 2)
• Collection of evidence:
• What evidence must be collected?
• How should evidence be collected?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Data and Device Preservation (Slide 2 of 2)
• General procedure:
• Document crime scene
• Interview witnesses
• Gather evidence from the live system
• Use forensic tools
• Make cryptographic hash of collected data
• Shut down or power off system
• Place evidence in tamper-proof bags
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Chain of Custody
Chain of custody: Documentation attached to evidence from a
crime scene detailing when, where, and how it was collected, where
it has been stored, and who has handled it subsequently to
collection.
• Evidence must conform to valid timeline.
• Digital information must be tightly controlled against tampering.
• Each step should be documented and recorded.
• After evidence is bagged, must not be handled or inspected except in controlled
circumstances.
• Use Chain of Custody form to record:
• When, where, who collected evidence.
• Who handled it subsequently.
• Where it is stored.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Activity 13-4: Discussing Data Protection During Incident
Response
• What is incident reporting?
• ANSWER:
• The process of identifying security breaches (or attempted breaches and suspicious
activity) to security management personnel.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Activity 13-4: Discussing Data Protection During Incident
Response
• Why are the actions of a first responder critical in the context of a
forensic investigation?
• ANSWER:
• Digital evidence is difficult to capture in a form that demonstrates that it has not been
tampered with. Documentation of the scene and proper procedures are crucial.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Activity 13-4: Discussing Data Protection During Incident
Response
• What does Chain of Custody documentation prove?
• ANSWER:
• Who has had access to evidence collected from a crime scene and where and how it
has been stored.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Activity 13-4: Discussing Data Protection During Incident
Response
• The contract ended recently for several workers who were hired for a specific project.
The IT department has not yet removed all of those employees' login accounts. It
appears that one of the accounts has been used to access the network, and a rootkit was
installed on a server. You immediately contact the agency the employee was hired
through and learn that the employee is out of the country, so it is unlikely that this
person caused the problem. What actions do you need to take?
• ANSWER:
• You need to create an incident report, remove or disable the login accounts, isolate the infected
server and possibly any user computers that communicate with the server, and remove the rootkit
from the server. In terms of wider security policies, investigate why the temporary accounts were
not disabled on completion of the project.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Reflective Questions
1. Which security best practices do you feel are the most important? Which are
the minimum measures that should be taken? Does your organization
implement good security practices?
2. Have you had experience with security incidents such as data breaches? What
might have been done differently to further protect the data that was put at risk?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Troubleshooting Workstation
Security Issues
Troubleshooting Workstation Security Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Detect, Remove, and Prevent Malware
Exam Objectives:
• 1002-2.4 Given a scenario, detect, remove, and prevent malware using
appropriate tools and methods.
• 1002-3.3 Given a scenario, use best practice procedures for malware
removal.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Computer Viruses and Worms
Virus: Code designed to infect computer files (or disks) when it is
activated.
Worm: A type of virus that spreads through memory and network
connections rather than infecting files.
• Virus types:
• Boot sector
• Firmware
• Program
• Script
• Macro
• Worms:
• Self-contained
• Typically target a network application vulnerability
• Rapidly consume network bandwidth
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Trojan Horses and Spyware (Slide 1 of 5)
Trojan Horse: A malicious software program hidden within an
innocuous-seeming piece of software.
Spyware: Software that records information about a PC and its
user.
Rootkit: A class of malware that modifies system files, often at the
kernel level, to conceal its presence.
Ransomware: A type of malware that tries to extort money from
the victim by appearing to lock their computer
or by encrypting their files, for instance.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Trojan Horses and Spyware (Slide 2 of 5)
• Trojans:
• Often function as a back door to applications
• Backdoor allows attacker access to the computer
• Upload files
• Install software
• Turn the system into a botnet
• Launch DoS attacks
• Send mass-mail spam
• Used to conceal the attacker’s actions
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Trojan Horses and Spyware (Slide 3 of 5)
• Spyware:
• Often installed without user’s
knowledge
• Keyloggers attempt to steal information
by recording keystrokes
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Trojans and Spyware (Slide 4 of 5)
• Rootkits:
• Masquerade as a dll
• Doesn’t reveal its presence
• General function:
• Replace key system files and utilities
• Provide backdoor for rootkit handler
• Evade anti-virus software
• May be deployed as part of DRM
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Trojans and Spyware (Slide 5 of 5)
• Ransomware:
• Attempt to extort money from the
victim
• May block access to the PC or
encrypt files
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Sources of Malware Infection
• Unsavory websites
• Unpatched browser
• Low security settings
• No anti-virus software
• Links in unsolicited email
• Compromised PC on the same network
• Executing file of unknown origin
• Zero-day exploit
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Antivirus Software
Antivirus software: Software capable of detecting and removing
virus infections and (in most cases) other types of malware.
Heuristic: Monitoring technique that allows dynamic pattern
matching based on past experience rather than relying on pre-
loaded signatures.
• Can run:
• When a file is accessed
• At boot time
• User can:
• Disinfect file
• Quarantine file
• Delete file
• Updates must be installed
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Best Practices for Malware Removal
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Malware Research
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Quarantine and Remediation of Infected Systems (Slide 1
of 2)
• Disconnect network link
• Move infected system to secure work area
• Disable System Restore and automated backup systems
• Scan any removal media that was attached
• Use antivirus software on the infected system
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Quarantine and Remediation of Infected Systems (Slide 2
of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Malware Infection Prevention (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Malware Infection Prevention (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Guidelines for Reducing Malware Effects
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• What are the principal characteristics of Trojan malware?
• ANSWER:
• Trojan malware is named after the Trojan Horse. This myth involved Greek warriors
hidden in a wooden horse presented as a gift to the city of Troy. The Trojans wheeled
the horse into the city and left it unguarded. At night, the Greek warriors slipped out,
opened the gates, and let the Greek army in to ravage the city. A Trojan is malware
disguised as legitimate software. Most Trojans establish a backdoor so that use of the
computer can be subverted by a remote handler.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• What general class of malware is crypto-malware an example of?
• ANSWER:
• Crypto-malware is a type of ransomware. The malware encrypts files on the target and
then demands a ransom be paid to release the key that can decrypt them again.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• Why might you need to use a virus encyclopedia?
• ANSWER:
• Typically, if a virus cannot be removed automatically, you might want to find a manual
removal method. You might also want to identify the consequences of infection—
whether the virus might have stolen passwords, and so on.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• Why must antivirus software be kept up-to-date regularly?
• ANSWER:
• While there are certain heuristic techniques, a scanner is most effective when it can
detect viruses that it recognizes. The virus update contains details about new or
changed virus threats. If the update is not made, it is quite unlikely that these viruses
will be detected if they infect your system.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• What type of file scan offers best protection for ordinary users?
• ANSWER:
• On-access scans. These might reduce performance somewhat but very few users
would remember to scan each file they use manually before opening.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• What would be the purpose of quarantining an infected file, rather than
deleting it?
• ANSWER:
• If antivirus software cannot clean a file, you may still want to investigate alternative
methods of recovering data from the file. Quarantine means the antivirus software
blocks access without actually removing the file from the file system.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• Why is DNS configuration a step in the malware remediation process?
• ANSWER:
• Compromising domain name resolution is a very effective means of redirecting users
to malicious websites. Following malware infection, it is important to ensure that DNS
is being performed by valid servers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 14-1: Discussing Detecting, Removing, and
Preventing Malware Infections
• What sort of training should you give to end users to reduce the risk of
infections?
• ANSWER:
• Not to disable security applications and to be wary of emailed links, file attachments,
removable media, and websites from unproven sources.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Topic B: Troubleshoot Common Workstation Security
Issues
Exam Objectives:
• 1002-2.2 Explain logical security concepts.
• 1002-3.2 Given a scenario, troubleshoot and resolve PC security issues.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Common Symptoms of Malware Infection
• Performance symptoms:
• Fails to boot or locks up
• Strange messages or graphics on screen
• System or network performance is very slow
• Application crashes and service problems:
• Security-related applications stop working
• Applications and plug-ins stop working or crash frequently
• File system errors and anomalies:
• File system or individual files are corrupted or deleted
• Date stamps and file sizes change
• Permissions change
• New executables appear in system folders
• Examine event logs for audit failures and crash events
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Web Browser Security Issues (Slide 1 of 2)
Redirection: When the user tries to open a web page but is sent to
another page (which may or may not look like the page the user was
attempting to access).
• Browsers are often targeted with adware and spyware:
• Pop-ups
• Additional toolbars
• Home page changes suddenly
• Search provider changes suddenly
• Slow performance
• Excessive crashes
• Trojans, rootkits, and botnets
• Firewall shows unfamiliar processes or ports trying to connect to the Internet
• Scan of other hosts for weaknesses
• Attempts to launch DoS attacks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Web Browser Security Issues (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Digital Certificate Issues (Slide 1 of 4)
Digital certificate: An X.509 digital certificate is issued by a CA as
a guarantee that a public key it has issued to an organization to
encrypt messages sent to it genuinely belongs to that organization.
Certificate Authority (CA): A server that can issue digital
certificates and the associated public/private key pairs.
• Digital certificate:
• Wrapper for public/private key pair
• Vouched for by a CA
• When compromised, a CA installs its own root certificate on the computer:
• Validates the CA signature on messages
• Stolen certificates exploited due to weaknesses in the key used in the certificate
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Digital Certificate Issues (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Digital Certificate Issues (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Digital Certificate Issues (Slide 4 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Email Issues
Spam: Junk messages sent over email.
Zombie PC: A PC infected with unauthorized software that directs
the PC to launch a DDoS attack.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Guidelines for Troubleshooting Common Workstation
Security Issues (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Guidelines for Troubleshooting Common Workstation
Security Issues (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Activity 14-3: Discussing Troubleshooting Common
Workstation Security Issues
• Early in the day, a user called the help desk saying that his computer is running slowly
and freezing up. Shortly after this user called, other help desk technicians who
overheard your call also received calls from users who report similar symptoms. Is this
likely to be a malware infection? If so, what type of malware would you suspect?
• ANSWER:
• It is certainly possible. Software updates are often applied when a computer is started in the morning so that is
another potential cause but you should investigate and log a warning so that all support staff are alerted. It is very
difficult to categorize malware when the only symptom is performance issues. You might say a virus or worm as the
malware is non-stealthy. However, it is equally possible that performance issues could be a result of a badly written
Trojan or a Trojan/backdoor application might be using resources maliciously (for DDoS, Bitcoin mining, spam, and
so on).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Activity 14-3: Discussing Troubleshooting Common
Workstation Security Issues
• Why might a PC infected with malware display no obvious symptoms?
• ANSWER:
• If the malware is used with the intent to steal information or record behavior, it will not
try to make its presence obvious. A rootkit may be very hard to detect even when a
rigorous investigation is made.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Activity 14-3: Discussing Troubleshooting Common
Workstation Security Issues
• You receive a support call from a user who is "stuck" on a web page. She
is trying to use the Back button to return to her search results, but the
page just displays again with a pop-up message. Is her computer infected
with malware?
• ANSWER:
• If it only occurs on certain sites, it is probably part of the site design. A script running
on the site can prevent use of the Back button. It could also be a sign of adware or
spyware though, so it would be safest to scan the computer using up to date anti-
malware software.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Activity 14-3: Discussing Troubleshooting Common
Workstation Security Issues
• Another user calls to say he is trying to sign on to his online banking
service, but the browser reports that the certificate is invalid. Should the
bank update its certificate, or do you suspect another cause?
• ANSWER:
• It would be highly unlikely for a commercial bank to allow its website certificates to run
out of date or otherwise be misconfigured. You should strongly suspect redirection by
malware or a phishing/pharming scam.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity 14-3: Discussing Troubleshooting Common
Workstation Security Issues
• Your company's static IP address has been placed on a number of anti-
spam blacklists. Could this be the result of external fraud or do you need
to investigate your internal systems for malware?
• ANSWER:
• It would be very unusual for someone to be able to insert your IP address into multiple
blacklists. You should suspect that malware is being used to send spam from your
network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Reflective Questions
1. Which best practice for minimizing the effect of malware do you think is most
important?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Supporting and Troubleshooting
Laptops
Supporting and Troubleshooting Laptops
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Use Laptop Features
Exam Objectives:
• 1001-1.3 Given a scenario, use appropriate laptop features.
• 1001-3.1 Explain basic cable types, features, and their purposes.
• 1001-3.9 Given a scenario, install and configure common devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Laptops
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Keyboards (Slide 1 of 2)
• Function keys:
• Display.
• Screen orientation.
• Wireless/Bluetooth/Cellular/GPS.
• Volume.
• Screen brightness.
• Keyboard backlight.
• Touchpad.
• Media options.
• Numeric keypad or key
combinations.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Keyboards (Slide 1 of 2)
• Configured via the Keyboard
applet in Windows.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Displays and Touchscreens (Slide 1 of 2)
Touchscreen: A display screen combined with a digitizer that is
responsive to touch input.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Displays and Touchscreens (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Expansion Options
• Wired ports on left, right, and rear:
• At least one video port.
• Several USB Type A ports.
• At least one USB Type C/Thunderbolt port.
• Microphone and speaker jacks.
• Network (RJ-45) port.
• Possibly memory card reader.
• USB adapters:
• USB to RJ-45.
• USB to Wi-Fi/Bluetooth.
• USB optical drive.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Port Replicators
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Docking Stations
Docking station: A sophisticated type of port replicator designed to
provide additional ports and functionality to a portable computer
when used at a desk.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Physical Locks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Activity 15-1: Discussing Laptop Features
• ANSWER:
• Support for multi-touch.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Activity 15-1: Discussing Laptop Features
• ANSWER:
• False—the touchpad is configured via tabs in the Mouse applet.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Activity 15-1: Discussing Laptop Features
• What two display settings would you expect to be able to control via a
laptop's Fn keys?
• ANSWER:
• Screen brightness, and toggling the output between the built-in screen and external
display.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Activity 15-1: Discussing Laptop Features
• What device would you use to extend the functionality of a laptop while
sitting at a desk?
• ANSWER:
• A docking station is used to extend functionality (allowing use of additional drives or
adapters) but you could also mention a port replicator, which extends the number of
connectivity options.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Activity 15-1: Discussing Laptop Features
• ANSWER:
• Ethernet/wired network connectivity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity 15-1: Discussing Laptop Features
• What is the brand name of the standard cable lock security system for
laptops?
• ANSWER:
• Kensington.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Topic B: Install and Configure Laptop Hardware
Exam Objectives:
• 1001-1.1 Given a scenario, install and configure laptop hardware and
components.
• 1001-1.2 Given a scenario, install components within the display of a
laptop.
• 1001-5.5 Given a scenario, troubleshoot common mobile device issues
while adhering to the appropriate procedures.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Laptop Disassembly Processes
• Hand tools and parts:
• Smaller screws than desktops—use jeweler's tools
• Document screw locations, ribbon cables, other connectors
• Organize removed parts
• Form factors and plastics/frames
• Most use proprietary components
• Chassis incorporates:
• Motherboard
• Power supply
• Display screen
• Keypad
• Touchpad
• Review manufacturer’s service documentation before starting upgrades or repairs
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Laptop FRUs
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Mass Storage for Laptops
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Laptop RAM
SODIMM: Memory that is half the size of DIMMs, are available in
32- or 64-bit data paths, and are commonly found in laptops and
iMac systems.
• Packaging for different DDR types:
• DDR and DDR2: 200 pins
• DDR3: 204 pins
• DDR4: 260 pins
• Angled slots allow for easy removal and
installation.
• Disassembly might be required to reach
all installed RAM.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Adapter Cards for Laptops
• Uses:
• Modems
• Wireless networking
• SSD storage
• Adapter formats:
• Mini-PCI
• mSATA
• M.2
• For wireless adapter upgrades:
• Reconnect antenna wires or install new
antenna kit.
• If cellular functionality, a SIM is required.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Optical Drives for Laptops
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Laptop CPU and Motherboard Upgrades
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Laptop Video Card Upgrades
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Laptop Component Replacement
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Laptop Display and Digitizer Replacement
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Laptop Speaker Replacement
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Laptop Input Device Replacement
• Keyboards
• Touchpads
• Webcams
• Microphones
• Smart card readers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Laptop Power Supplies
• Building power:
• Need AC to DC converter.
• Auto switching or manual.
• DC jacks prone to failure.
• Battery operation:
• Li-ion battery packs.
• 6, 9, and 12 cell versions.
• Normally accessed through bottom
of the unit.
• Charging options.
• Tips for maximizing battery life.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Activity 15-2: Discussing Laptop Hardware Installation
and Configuration
• What is the process for installing memory in a laptop?
• ANSWER:
• Verify that the DDR version of the upgrade module is supported by the motherboard.
Take anti-static precautions. Locate the memory slot, which is usually accessed via a
panel on the back cover. Move the connector up to 45º and insert the memory card,
taking care to align it correctly. Push the card flat again.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Activity 15-2: Discussing Laptop Hardware Installation
and Configuration
• What type of standard adapter card might be used to connect internal
FRU devices to the motherboard of a laptop?
• ANSWER:
• Mini-PCIe, mSATA, or M.2.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Activity 15-2: Discussing Laptop Hardware Installation
and Configuration
• What distinguishes a magnetic hard drive designed for a laptop from one
designed for a PC?
• ANSWER:
• Laptop drives are 2.5" (or sometimes 1.8"), rather than 3.5". They also tend to be
slower (5,400 rpm, rather than 7,200 or 10,000 rpm) and lower capacity. The largest at
the time of writing is 5 TB, so this may not be a limiting factor in practice.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Activity 15-2: Discussing Laptop Hardware Installation
and Configuration
• A user reports that when they plug in anything to a USB port on the
laptop, the device is not recognized by the system. Is this something you
can easily repair?
• ANSWER:
• Typically, the processor, the DC jack, and USB ports are attached directly on the
board and cannot be replaced without replacing the whole laptop motherboard. If the
other USB ports are functional, a USB hub could provide additional ports.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Activity 15-2: Discussing Laptop Hardware Installation
and Configuration
• Several laptops need to be replaced in the next fiscal cycle, but that
doesn't begin for several months. You want to improve functionality as
much as possible by upgrading or replacing components in some of the
laptops that are having problems. Which items are most easily replaced in
a laptop?
• ANSWER:
• The fixed drive, system memory (RAM), and plug-in wireless card will be the easiest
upgradable components to install. If items need repairing, fans,
the screen, the battery, touchpad, and the keyboard should be
straightforward to replace, if you can obtain compatible parts.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Topic C: Troubleshoot Common Laptop Issues
Exam Objectives:
• 1001-5.5 Given a scenario, troubleshoot common mobile device issues
while adhering to the appropriate procedures.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Common Laptop Issues
• Display issues:
• Built-in displays
• Touchscreens
• External displays
• Power and cooling issues
• Input and output device issues
• GPS and location services issues
• OS and app issues:
• Performance
• Unresponsive apps
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Display Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Guidelines for Troubleshooting Display Issues (Slide 1 of
2)
• Built-in displays:
• Where does the problem really lie?
• Check for physical damage.
• Check the resolution.
• Check the driver.
• Touchscreen displays:
• Is it clean?
• Check for physical damage.
• Try using it in another location.
• If recently serviced, are wires reconnected?
• Check software configuration.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Guidelines for Troubleshooting Display Issues (Slide 2 of
2)
• External displays.
• Check the keyboard toggle switch.
• Check power and input mode.
• Check the resolution.
• Look for updated drivers.
• Swap out displays and cables.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Power and Cooling Issues
• Battery issues.
• Verify proper insertion and clean contacts.
• Short battery life.
• Windows 10 Settings app for battery use
by apps.
• Swollen batteries.
• AC power issues.
• Overheating.
• Dust and heat.
• Lack of ventilation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Guidelines for Troubleshooting Power and Cooling
Issues (Slide 1 of 2)
• Battery issues:
• Follow manufacturer guidelines on charging.
• Use approved chargers.
• Avoid fire, water, drops, or other impacts.
• Use recommended battery.
• Use power management features.
• AC power issues:
• Check and verify operational needs.
• Test the outlet with known good devices.
• Look for the LED on the AC adapter.
• Check the plug’s fuse.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Guidelines for Troubleshooting Common Laptop Issues
(Slide 2 of 2)
• AC power issues (continued):
• Check the DC socket on the laptop.
• Verify the adapter supplies adequate power.
• Disconnect peripherals one at a time to see if power problems remain.
• Cooling issues.
• Keep the air ducts clean.
• Use compressed air to blow dust out.
• Use computer vacuum to remove dust.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Input and Output Device Issues
• Input devices.
• Stuck keys.
• Improper or unintentional use of Fn keys.
• NumLock use.
• Oversensitive touchpad.
• Sound and speaker issues.
• No sound.
• Sound is distorted.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Guidelines for Troubleshooting Input and Output Device
Issues
• Clean the keyboard with compressed air.
• If serviced recently, verify all cables were reconnected.
• Check Fn key status.
• Check NumLock key status.
• Check drivers.
• Check volume control, playback device configuration, sound card, and internal
wiring.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Communication and Connectivity Issues
• Connectivity:
• Physical issues and software configuration problems.
• Wireless devices need power.
• Issues can arise after laptop wakes from Sleep or Hibernation mode.
• Possible electromagnetic interference.
• GPS and Location Services:
• No functionality.
• Limited functionality.
• Signal strength decreases when indoors.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Guidelines for Troubleshooting Communication and
Connectivity Issues
• Check adapters, Fn keys, and antenna connections.
• Check batteries on wireless mice and other devices.
• Check for driver updates to address sleep mode issues.
• For intermittent connectivity, move the devices around or use an antenna.
• For GPS issues, verify it’s enabled and not in airplane mode.
• Also be sure individual apps have been granted permission to use location services.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
OS and App Issues
• Slow performance
• Unresponsive devices and apps
• Email issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Guidelines for Troubleshooting OS and App Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Activity 15-4: Troubleshooting Common Laptop Issues
• ANSWER:
• The graphics adapter is working. The problem must exist either in the cabling to the
built-in screen or with a screen component, such as an inverter, backlight, or the
display panel itself. Further tests will be required to identify which (though it may be
quicker to replace the whole screen assembly).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Activity 15-4: Troubleshooting Common Laptop Issues
• You received a user complaint about a laptop being extremely hot to the
touch. What actions should you take in response to this issue?
• ANSWER:
• Overheating can be a sign that dust and dirt is restricting the necessary airflow within
the device, so start by cleaning the ventilation duct with compressed air, and then
make sure that the device is getting proper air circulation around the outside of the
case.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Activity 15-4: Troubleshooting Common Laptop Issues
• A user complains that their Bluetooth keyboard, which has worked for the
last year, has stopped functioning. What would you suggest is the
problem?
• ANSWER:
• The batteries in the keyboard have run down—replace them.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Activity 15-4: Troubleshooting Common Laptop Issues
• A user working in graphics design has just received a new laptop. The
user phones to say that performance with the graphics program in the
office is fine but dismal when he takes the laptop to client meetings. What
could be the cause?
• ANSWER:
• The laptop could be using reduced performance settings to conserve battery life.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Activity 15-4: Troubleshooting Common Laptop Issues
• A laptop user reports that they are only getting about two hours of use
out of the battery compared to about three hours when the laptop was
first supplied to them. What do you suggest?
• ANSWER:
• Batteries lose maximum charge over time. It may be possible to recondition the
battery or to use power saving features, but the only real way to restore maximum
battery life is to buy a new battery.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Activity 15-4: Troubleshooting Common Laptop Issues
• A laptop user is complaining about typing on their new laptop. They claim
that the cursor jumps randomly from place-to-place. What might be the
cause of this?
• ANSWER:
• The user could be touching the touchpad while typing, or vibrations could be affecting
the touchpad. Update the driver, or reduce the sensitivity/disable touch and tap
events.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Reflective Questions
2. Of the common laptop issues discussed in this lesson, which do you expect to
encounter most often? Briefly explain your response.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Supporting and Troubleshooting
Mobile Devices
Supporting and Troubleshooting Mobile Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Topic A: Mobile Device Types
Exam Objectives:
• 1001-1.4 Compare and contrast characteristics of various types of other
mobile devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Mobile Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Smartphones
• One-handed operation
• Touchscreen displays
• Screen sizes range from 4.5” to 5.7”
• Multicore CPUs
• 2 to 6 GB system memory
• 16 GB+ flash memory storage
• Features:
• Digital cameras
• Input sensors
• Networking via Wi-Fi or cellular data
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Tablets
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Mobile Devices vs. Laptops
Factor Description
Processors Mobile devices:
• CPUs and chipsets are based on ARM microarchitecture.
• Dual- and quad-core CPUs are common, with some 64-bit CPUs available.
• Provide more power and thermal efficiency.
PCs and laptops:
• CPUs and chipsets are based on CISC and RISC microarchitecture.
• Dual- and quad-core CPUs are widespread, with many 64-bit CPUs available.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Mobile Device Form Factors
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
E-Readers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Wearable Technology
• Smart watches
• Fitness monitors
• VR/AR headsets and smart glasses
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
GPS Navigation Devices
Global Positioning System (GPS): Means of determining a
receiver's position on the Earth based on information received from
GPS satellites. The receiver must have line-of-sight to the GPS
satellites.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Activity 16-1: Discussing Mobile Device Types
• ANSWER:
• A phablet is essentially a smartphone with a screen size of more than approximately
5.5" but less than about 7". Phablets can make voice calls and use cellular data, while
many tablets are limited to Wi-Fi connectivity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Activity 16-1: Discussing Mobile Device Types
• ANSWER:
• Advanced RISC Machines (ARM) produce the CPU designs most widely used in
smartphones.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Activity 16-1: Discussing Mobile Device Types
• ANSWER:
• False—like PCs, smartphones use a variant of DDR for system memory. This is
volatile storage so a flash memory device is used for persistent storage.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Activity 16-1: Discussing Mobile Device Types
• ANSWER:
• Wearable technology is devices that the user doesn't need to hold (as they are affixed
to the wearer via a band or clip) to provide uninterrupted interaction between computer
and network systems and the user. Examples include Virtual Reality (VR) headsets,
smartwatches (such as Apple's iWatch), and fitness monitors like FitBit.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Activity 16-1: Discussing Mobile Device Types
• ANSWER:
• The e-Ink display works without backlighting, producing little to no heat through
resistance and better energy efficiency.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Topic B: Connect and Configure Mobile Device
Accessories
Exam Objectives:
• 1001-1.5 Given a scenario, connect and configure accessories and
ports of other mobile devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Wired Connections for Accessories
• Apple devices:
• Apple Dock for older devices.
• Apple Lightning connector.
• Android devices:
• Micro-B USB connectors for most devices.
• Mini-B for older devices.
• USB-C on newer devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Wireless Connections for Accessories (slide 1 of 2)
• Bluetooth
• NFC
• IR
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Wireless Connections for Accessories (slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Common Mobile Device Accessories
• External keyboard
• Headset
• Speaker dock
• Micro-SD slot
• Docking stations
• Protective covers and waterproofing
• Credit card readers
• Mobile power
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Activity 16-2: Discussing Mobile Device Accessory
Connection and Configuration
• What type of peripheral port would you expect to find on a current
generation smartphone?
• ANSWER:
• For Apple devices, the Lightning port. For Android and Windows, it will be USB—either
Micro Type B or Type-C.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Activity 16-2: Discussing Mobile Device Accessory
Connection and Configuration
• How would you upgrade storage capacity on a typical smartphone?
• ANSWER:
• If the smartphone supports removable flash cards such as Micro-SD, you can add a
larger card. Otherwise, the components in these devices are not field replaceable, so
there are no upgrade options.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Activity 16-2: Discussing Mobile Device Accessory
Connection and Configuration
• What technology do smartphones use to facilitate payment at points of
sale?
• ANSWER:
• Near Field Communications (NFC) allows the user to touch a receiver for the phone to
pass card data to a point of sale terminal.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Activity 16-2: Discussing Mobile Device Accessory
Connection and Configuration
• True or false? An IP67-rated smartwatch could be considered risk-free for
wear while swimming in an indoor pool.
• ANSWER:
• False—IP67 rates immersion up to 1 m (for up to 30 minutes), so wearing a device
while swimming would be a significant risk.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Topic C: Configure Mobile Device Network
Connectivity
Exam Objectives:
• 1001-1.6 Given a scenario, configure basic mobile device network
connectivity and application support.
• 1001-2.7 Compare and contrast Internet connection types, network
types, and their features.
• 1001-3.9 Given a scenario, install and configure common devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Cellular Data Networks (Slide 1 of 4)
Cellular data: Connecting to the Internet via the device's cell phone
radio and the handset's cellar network provider.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Cellular Data Networks (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Cellular Data Networks (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Cellular Data Networks (Slide 4 of 4)
• CDMA networks:
• Locks handset to original provider
• Does not require use of a SIM card
• Handsets are identified by MEID number
• Uses PRI and PRL databases for information needed to connect cellular radio to the
network
• If the handset contains a SIM card, it is to connect to 4G networks, which are GSM-
based networks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Baseband Updates and Radio Firmware
Baseband update: Modification of the firmware of a cellular
modem.
Radio firmware: An operating system that is separate from the end-
user operating system in a mobile device.
Realtime Operating System (RTOS): An OS that is optimized for
use in embedded or real-time apps.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Wi-Fi Networks and Hotspots (slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Wi-Fi Networks and Hotspots (slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Mobile VPN Configuration
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Bluetooth (slide 1 of 3)
Bluetooth: Short-range radio-based technology, working at up to 10
m (30 feet) at up to 1 Mbps, used to connect peripherals for
communication between two devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Bluetooth (slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Bluetooth (slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Airplane Mode (slide 1 of 2)
Control Center: An iOS feature that is accessed by swiping up from
the bottom of the display to access iOS feature settings.
Notification shade: An Android feature that is accessed by swiping
down from the top of the display to access Android OS feature
settings.
Airplane mode: A toggle found on mobile devices enabling the user
to disable and enable wireless functionality quickly.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Airplane Mode (slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Email Configuration Options (Slide 1 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Email Configuration Options (Slide 2 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Email Configuration Options (Slide 3 of 4)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Email Configuration Options (Slide 4 of 4)
• S/MIME:
• Using secure ports does not provide end-to-end encryption for messages.
• Encryption with digital certificates and digital signatures does.
• PGP and S/MIME use digital certificates and public/private key pairs.
• When you sign a message, your private key validates who you are and the public key related
to that private key goes to the recipients. The public key allows the recipient to verify who you
are.
• When you want to receive secure messages, the sender uses your public key to encrypt the
message. Once encrypted, only your private key can decrypt it (your public key cannot be used
to reverse the encryption).
• Digital and root certificates are often added to the device by using MDM software.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Activity 16-3: Discussing Mobile Device Network
Connectivity Configuration
• Why would a user be likely to disable cellular data access but leave Wi-Fi
enabled?
• ANSWER:
• To avoid data charges (especially when using the device abroad).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Activity 16-3: Discussing Mobile Device Network
Connectivity Configuration
• What is tethering?
• ANSWER:
• Tethering is the use of a smartphone as an Internet connectivity hub. It can share its
Internet connection with a computer via either a cable, Bluetooth, or Wi-Fi.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Activity 16-3: Discussing Mobile Device Network
Connectivity Configuration
• What serial number uniquely identifies a particular handset?
• ANSWER:
• International Mobile Station Equipment Identity (IMEI) for handsets from GSM
providers or Mobile Equipment ID (MEID) from CDMA providers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Activity 16-3: Discussing Mobile Device Network
Connectivity Configuration
• What is the function of a smartphone's baseband processor?
• ANSWER:
• The baseband system is usually dedicated to providing radio modem functions, acting
as an interface with the cell tower, access point, or other radio source to transmit
signals.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Activity 16-3: Discussing Mobile Device Network
Connectivity Configuration
• How do you configure an autodiscover-enabled email provider on a
smartphone?
• ANSWER:
• Just select the provider then enter the email address. If the account is detected, you
will be prompted for the password.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Activity 16-3: Discussing Mobile Device Network
Connectivity Configuration
• True or false? S/MIME is used to configure a secure connection to a
mailbox server, so that your password cannot be intercepted when
connecting over an open access point.
• ANSWER:
• False—S/MIME is for encrypting messages. SSL/TLS is used to secure connections.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Activity
Configuring Bluetooth
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Topic D: Support Mobile Apps
Exam Objectives:
• 1001-1.7 Given a scenario, use methods to perform mobile device
synchronization.
• 1001-3.9 Given a scenario, install and configure common devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Mobile Account Setup
• User accounts:
• Normally 1 per device, created at initial use.
• For iOS: Apple ID.
• For Android: Google account, Samsung account, or
similar.
• Unique ID and credentials required.
• Provides access to app store, email, cloud storage.
• Sub-accounts for additional services and apps:
• Corporate email or messaging.
• Facebook.
• LinkedIn.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Mobile Applications and App Stores (slide 1 of 2)
• iOS apps:
• Get from App Store.
• Free or paid.
• Walled garden model—all
apps reviewed and
approved by Apple.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Mobile Applications and App Stores (slide 2 of 2)
• Android apps:
• Get from Google Play Store or third-party sites.
• Free or paid.
• More open model for app acquisition: store model, or APKs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Types of Data to Synchronize
Mobile device synchronization: The act of copying data back and
forth between devices to keep the information up-to-date on all of
the devices.
• Contacts • Location data
• Calendar • Social media data
• Email • Apps
• Pictures, music, and video • Bookmarks
• Documents • Passwords
• E-books
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Synchronization Methods (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Synchronization Methods (Slide 2 of 3)
• Android uses the gmail account to sync with cloud storage and Google Play
Store.
• You can connect to a PC via USB to transfer data directly.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Synchronization Methods (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Mutual Authentication for Multiple Service
Single Sign On: (SSO) One service accepts the credentials from
another service. Also known as federated identity management.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Activity 16-5: Discussing Mobile App Support
• ANSWER:
• A vendor account, such as an Apple, Google, or Samsung account, is required to use
the app store.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Activity 16-5: Discussing Mobile App Support
• What is sideloading?
• ANSWER:
• Installing a mobile app without going through the app store. Android supports
sideloading through the APK package format. Sideloading is not officially supported on
iOS devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Activity 16-5: Discussing Mobile App Support
• Which types of data might require mapping between fields when syncing
between applications?
• ANSWER:
• Contacts and calendar items.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Activity 16-5: Discussing Mobile App Support
• ANSWER:
• iTunes. It can work over USB (with a USB-to-Apple cable) or Wi-Fi.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Activity 16-5: Discussing Mobile App Support
• ANSWER:
• Through federated identity management, or as the user sees it, a "Sign in with..."
feature. If the user's sign-in with the identity service (Google or Facebook, for
example) is cached on the device, this will enable Single Sign On (SSO) with
supported apps. This could also be referred to as mutual authentication, of a kind (the
app and the sign-in provider must authorize one another).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Topic E: Secure Mobile Devices
Exam Objectives:
• 1002-2.8 Given a scenario, implement methods for securing mobile
devices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Popular Security Controls for Mobile Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Mobile Device Access Control (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Mobile Device Access Control (Slide 2 of 3)
• Lockout policies:
• Limits failed logins.
• Can escalate in duration.
• For instance, 10 seconds for the first lockout; 30 minutes for the next.
• Remote wiping:
• Resets a stolen device to factory defaults.
• All personal data removed.
• Possibly erase memory cards, too.
• Preventable, but complicated to bypass.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Mobile Device Access Control (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Mobile Device and Data Recovery (slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Mobile Device and Data Recovery (slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Multifactor Authentication and Authenticator
Applications
• Factors:
• Something you know
• Something you are
• Something you have
• Somewhere you are
• Multifactor authentication requires two different factors.
• Authenticator apps help implement multifactor authentication.
• 2-step verification: password/PIN (what you know) and a single-use verification code
(what you have).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Mobile Device Policies (Slide 1 of 3)
Mobile Device Management (MDM): Software suites designed to
manage use of smartphones and tablets within an enterprise.
Bring Your Own Device (BYOD): Security framework and tools to
facilitate use of personally owned devices to access corporate
networks and data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Mobile Device Policies (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Mobile Device Policies (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Mobile Device Security Software
App scanner: A class of security software designed to monitor the
permissions allocated to apps and how they are using (or abusing)
them.
Firewall app: A firewall implemented as application software
running on the host.
• Anti-virus/Anti-malware
• Firewalls
• Patching OS
• Updates
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Activity 16-6: Discussing Mobile Device Security
• How can the use of mobile devices by employees affect the security of an
organization as a whole?
• ANSWER:
• Mobile devices can function much like regular computers; therefore, when they are
used to send and receive corporate emails and to access systems and data within the
corporate network, they are a vulnerability. If a mobile device is lost or stolen, it could
be used to access sensitive data or launch attacks. Mobile devices should be secured
just as any other system on the corporate network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Activity 16-6: Discussing Mobile Device Security
• ANSWER:
• Fingerprint recognition and facial recognition.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Activity 16-6: Discussing Mobile Device Security
• ANSWER:
• To identify the location of a stolen phone (or, perhaps, members of one's family) and to
provide localized services (movies, restaurants, etc).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Activity 16-6: Discussing Mobile Device Security
• ANSWER:
• Two-step verification—the site sends a code to a registered phone or alternative email
address, prompting the user to verify the validity of the device.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Activity 16-6: Discussing Mobile Device Security
• What is MDM?
• ANSWER:
• Mobile Device Management (MDM) is a class of management software designed to
apply security policies to the use of smartphones and tablets in the enterprise.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Activity 16-6: Discussing Mobile Device Security
• True or false? Updates are not necessary for iOS devices because the OS
is closed source.
• ANSWER:
• False—closed source just means that the vendor controls development of the OS. It is
still subject to updates to fix problems and introduce new features.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
Topic F: Troubleshoot Mobile Device Issues
Exam Objectives:
• 1002-3.4 Given a scenario, troubleshoot mobile OS and application
issues.
• 1002-3.5 Given a scenario, troubleshoot mobile OS and application
security issues.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
Mobile OS Troubleshooting Tools
• Adjust Settings
• Close running apps
• Force stop
• Force Quit
• Uninstall and reinstall apps
• Reset the device
• Soft reset
• Forced restart
• Factory default reset
Android Force
Stop
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Guidelines for Using Mobile Troubleshooting Tools
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Mobile OS Issue Troubleshooting
• Dim display
• Touchscreen unresponsive or inaccurate
• External monitor issues
• Sound issues
• Overheating
Check or change
display brightness
Check for
overheating
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Guidelines for Troubleshooting Mobile OS Issues (Slide 1
of 2)
• Dim display.
• Open the Display settings and adjust the automatic brightness option or adjust the
brightness slider.
• Check for apps that dim the backlight to conserve power.
• Unresponsive or inaccurate touchscreen.
• Check for issues with the screen and any screen protectors.
• Check that there are adequate resources available.
• Use a re-calibration utility.
• Issues with external monitor.
• Verify that the cable is good.
• Verify that a casting dongle is configured correctly between the device and the mobile
device.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Guidelines for Troubleshooting Mobile OS Issues (Slide 2
of 2)
• Sound issues.
• Verify volume controls are set correctly.
• Verify silent mode is not enabled.
• Check volume controls within the app.
• Verify it is not configured to use external speakers through a cable or Bluetooth.
• Overheating.
• Determine if the device is being used intensively.
• Use a battery monitor to view battery status information.
• Keep the device away from direct sunlight or other heat sources.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Mobile App Issue Troubleshooting (Slide 1 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Mobile App Issue Troubleshooting (Slide 2 of 3)
• Slow performance:
• Resources might be too low.
• Use an app such as CCleaner.
• Try soft resets, then factory default reset
(as a last resort).
• Examine recently installed apps.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Mobile App Issue Troubleshooting (Slide 3 of 3)
• Battery life:
• Effectiveness degrades over time.
• GPU and CPU intensive apps drain
a battery quickly.
• Charge might degrade due to faulty
or malicious apps using power-intensive
services.
• GPS, network connections, microphones,
and cameras.
• Uninstall the app, or prevent it from
running in the background.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Guidelines for Troubleshooting Mobile App Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Guidelines for Troubleshooting Mobile Wireless Issues
• Interference issues:
• Use a Wi-Fi Analyzer app to check for interference and signal strength.
• Configuration issues:
• Verify that the device is not in airplane mode.
• Verify that a particular radio service has not been disabled.
• Use Settings to verify that configuration parameters are correctly configured.
• Verify that the Wi-Fi access point supports the same standard as the mobile device.
• If none of these are the issue, determine if an OS or firmware update is
needed.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Mobile Device Security Troubleshooting (Slide 1 of 2)
• Utilization symptoms:
• Rogue apps running in background can cause power drain and high resource use
• Sudden data transmission overlimit
• Unauthorized location tracking
• Disable location services unless required by apps
• Install patches and upgrades
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Mobile Device Security Troubleshooting (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Guidelines for Troubleshooting Mobile Device Security
Issues (Slide 1 of 2)
• If there is a huge power drain or high resource utilization, check for malware or
rogue apps.
• Check for unauthorized location tracking.
• Remove geotagging information or metadata from images posted online.
• Ensure users are not engaging in behavior that makes their devices vulnerable
to attack.
• If using settings that allow automatic connection to service provider hotspots,
verify that the hotspot and device are using trusted, secure connections.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Guidelines for Troubleshooting Mobile Device Security
Issues (Slide 2 of 2)
• Ensure unintended Bluetooth pairing is not allowed.
• Ensure users are locking the device when unattended.
• Install apps or enable OS features that allow the phone to be locked and/or
wiped if it is lost or stolen.
• Verify that email passwords changed on the enterprise network are replicated
to the mobile device.
• When sending and receiving encrypted emails with a digital certificate, use the
email client or encryption program's support documentation to install or locate
the appropriate certificate.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
Activity 16-7: Troubleshooting Mobile Device Issues
• ANSWER:
• False. Restoring to factory settings means removing all user data and settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
Activity 16-7: Troubleshooting Mobile Device Issues
• ANSWER:
• Try restarting the device. If that does not work, uninstall and then reinstall the app.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
Activity 16-7: Troubleshooting Mobile Device Issues
• Your organization has several tablet devices that are loaned out as needed when
employees are traveling. Some users have reported problems getting the Bluetooth
keyboard to work with one of the tablets. What should you do?
• ANSWER:
• There are a couple of issues that can cause Bluetooth connectivity problems. First, check whether
the device batteries need replacing. Another possibility is that the tablet might need a system
update. Finally, the devices might not have been set to discoverable mode. For security purposes,
only enable discovery mode on your mobile device when want a Bluetooth device to find your
device; otherwise, keep that setting disabled. The Bluetooth settings must be configured to allow
devices to connect to the mobile device. This is also referred to as pairing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
Activity 16-7: Troubleshooting Mobile Device Issues
• A user reports that the touchscreen on his mobile device is not
responding properly. What questions should you ask, and what steps
might you take to resolve the issue?
• ANSWER:
• You should ask if the touch screen is greasy, wet, or dirty. If it needs cleaning, remind
the user to use only a soft cloth moistened with eye glass cleaner to gently wipe the
screen. If cleaning is not an issue, ask if it appears to be scratched, cracked, or
otherwise damaged. If so, make arrangements to have the touch screen replaced. If
there is no visible damage, recalibrate the screen for the user, and check for updates.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
Activity 16-7: Troubleshooting Mobile Device Issues
• ANSWER:
• A Wi-Fi Analyzer is used to check connectivity issues with wireless. It can check for
less congested channels.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
Activity 16-7: Troubleshooting Mobile Device Issues
• ANSWER:
• The display, radio, and CPU are the components that draw the most power. If an app
is overutilizing these resources, it could be faulty, badly written, or this could be a sign
of malware activity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111
Reflective Questions
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
Installing, Configuring, and
Troubleshooting Print Devices
Installing, Configuring, and Troubleshooting Print
Devices
• Maintain Laser Printers
• Maintain Inkjet Printers
• Maintain Impact, Thermal, and 3D Printers
• Install and Configure Printers
• Troubleshoot Print Device Issues
• Install and Configure Imaging Devices
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Topic A: Maintain Laser Printers
Exam Objectives:
• 1001-3.6 Explain the purposes and uses of various peripheral types.
• 1001-3.11 Given a scenario, install and maintain various print
technologies.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Printer Types
Printer: An output device that produces text and images from
electronic content onto physical media.
Inkjet printer: A type of printer in which ink is sprayed onto the
paper using microscopic nozzles in the print head.
Laser printer: A type of printer that develops an image on a
drum using electrical charges to attract special toner, then
applying it to paper.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Printer Features
• Speed
• Interfaces
• Image Quality
• Paper Handling
• TCO
• Options
• MFD
• PDL
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Laser Printers
• Laser printing process results in a durable printout that does not smear or fade.
• Very popular for office environments:
• Inexpensive to buy and run
• Quiet
• Fast
• High-quality output
• Grayscale and color options.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Laser Printer Imaging Process (Slide 1 of 2)
• Processing
• Charging
(Conditioning)
• Exposing (Writing)
• Developing
• Transferring
• Fusing
• Cleaning
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Laser Printer Imaging Process (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Laser Printer Maintenance Tasks (Slide 1 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Laser Printer Maintenance Tasks (Slide 2 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Laser Printer Maintenance Tasks (Slide 3 of 6)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Laser Printer Maintenance Tasks (Slide 4 of 6)
Cleaning guidelines:
• Unplug the printer
• Use a damp cloth with mild cleaner
• Inside of printer may be hot
• Use a special toner-safe vacuum when necessary
• If you get toner on skin or clothes, remove it with a cloth or cold
water
• Use isopropyl alcohol and lint-free swabs to clean rollers
• Check documentation for replacing dust and ozone filters if
installed
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Laser Printer Maintenance Tasks (Slide 5 of 6)
Calibration:
• Usually automatic
• Access calibration routine from:
• Printer control panel
• Printer software
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Laser Printer Maintenance Tasks (Slide 6 of 6)
Maintenance kit:
• Replacement feed rollers, transfer roller,
and fuser unit.
• Normally replace these items after an
established number of pages (copy
count) is printed.
• Allow printer to cool down before
replacing fuser unit to avoid burns.
• Print a test page to verify operation and
reset copy count.
• Recycle fuser unit if possible.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Activity 17-1: Discussing Laser Printer Maintenance
• Why is a laser printer better suited to most office printing tasks than an
inkjet?
• ANSWER:
• Laser printers are much faster, quieter, and better quality (the pages do not smear)
than inkjets at this type of output. They also have lower running costs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Activity 17-1: Discussing Laser Printer Maintenance
• What makes the power supply in a printer different to that used in a PC?
• ANSWER:
• A PC's Power Supply Unit (PSU) only needs to generate voltages up to 12 V DC. The
charging and transfer corona wires/rollers in a laser printer require much higher
voltages. To apply a 600 V charge to the drum, for instance, the corona wire must be
charged to 1000 V.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Activity 17-1: Discussing Laser Printer Maintenance
• ANSWER:
• Applying a uniform high charge to the photosensitive drum using the primary corona
wire or roller.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity 17-1: Discussing Laser Printer Maintenance
• What is the removal of the charge from the photosensitive drum by a laser
called?
• ANSWER:
• Laser imaging or writing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Activity 17-1: Discussing Laser Printer Maintenance
• ANSWER:
• Passing paper between the photosensitive drum and the secondary or transfer corona
wire or roller. This attracts the toner from the drum to the paper.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity 17-1: Discussing Laser Printer Maintenance
• What must you do before installing a new toner cartridge into a printer?
• ANSWER:
• Remove the packing strips. The printer should also be turned off, and the old cartridge
should be removed and placed into a sealed bag for recycling.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 17-1: Discussing Laser Printer Maintenance
• ANSWER:
• The main component is a new fuser assembly. The kit will also usually contain a
transfer/secondary charge roller plus paper transport rollers for each tray (pickup
rollers and a new separation pad).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Topic B: Maintain Inkjet Printers
Exam Objectives:
• 1001-3.11 Given a scenario, install and maintain various print
technologies.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Inkjet Printers
• Liquid ink is propelled out of nozzles in a carriage assembly that moves back
and forth across the page.
• Color images use CMYK.
• Cyan, magenta, yellow, and black.
• Wide range of quality and price available.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Inkjet Printer Imaging Process
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Components of Inkjet Printers (Slide 1 of 2)
Piezoelectric print method: An ink delivery system in an inkjet
printer that uses a tiny element that changes shape to act as a
pump used in Epson printers.
Thermal inkjet print method: An ink delivery system in an inkjet
printer where the ink is heated to form a bubble that bursts through
the nozzles.
• Print heads
• Ink cartridges
• Carriage system
• Paper handling and duplex assembly
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Components of Inkjet Printers (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Inkjet Printer Maintenance Tasks
• Loading paper
• Replacing inkjet cartridges
• Print head alignment
• Print head cleaning
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Activity 17-2: Discussing Inkjet Printer Maintenance
• ANSWER:
• Cyan, Magenta, Yellow, and Black (CMYK). Do be aware that some printers can use
more inks. For example, a 6-color printer might add Light Cyan and Light Magenta
inks, or Orange and Green inks (hexachrome).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Activity 17-2: Discussing Inkjet Printer Maintenance
• ANSWER:
• Thermal and piezoelectric. The thermal type is also known by Canon's Bubble Jet
trademark because of the way the print head creates an ink bubble by heating. Most
other printer vendors use thermal technology but Epson printers use their piezoelectric
pump-like process.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Activity 17-2: Discussing Inkjet Printer Maintenance
• ANSWER:
• Try using the printer's built-in cleaning cycle, and then replacing the ink cartridge. If
these do not work, try using an after market cleaning product. Try using the printer
properties sheet to check for print head alignment, color settings, and other settings.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Activity 17-2: Discussing Inkjet Printer Maintenance
• ANSWER:
• Yes, but this type of paper will not produce the best results. It is better to use paper
designed for inkjets. There are different grades of inkjet paper. Higher-grade paper
allows for glossy photo printing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Activity 17-2: Discussing Inkjet Printer Maintenance
• What is an ASF?
• ANSWER:
• An AutoSheet Feeder (ASF) allows the printer to load a sheet of paper from a tray,
using pickup rollers to move the sheet and a separation pad to make sure only a
single sheet is fed at one time.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Topic C: Maintain Impact, Thermal, and 3D Printers
Exam Objectives:
• 1001-3.11 Given a scenario, install and maintain various print
technologies.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Impact Printers
Impact printer: Printer that uses pressure to transfer ink from a
ribbon onto paper in a particular pattern, similar to the mechanism of
a typewriter.
Dot matrix printer: A type of impact printer that uses a set of pins
to strike the ribbon to create printed characters and images using
combinations of dots.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Components of Impact Printers
• Consumables:
• Plain paper
• Carbon paper
• Tractor-fed paper
• Paper feed mechanism
• Impact printer ribbons
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Impact Printer Imaging Process
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Impact Printer Maintenance Tips
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Thermal Printers
Thermal printer: A type of printer that uses a thermal (high heat)
print head to fuse or transfer wax-based ink onto paper or that
selectively heats specially treated paper to form the image.
• Dye sublimation
• Thermal wax transfer
• Direct thermal
• Used for printing barcodes, labels,
and receipts
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Components of Thermal Printers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Direct Thermal Printer Imaging Process
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Thermal Transfer Printer Maintenance Tips
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
3D Printers
3D print process: A printing process that builds a solid object from
successive layers of material.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
3D Printer Imaging Process
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Components of 3D Printers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
3D Printer Maintenance Tips
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Other 3D Printer Types
stereolithography (SLA): Uses liquid plastic resin or photopolymer
to create objects.
selective laser sintering (SLS): Fuses layers together with a pulse
laser.
• SLA-created objects:
• Cured with a UV laser.
• Excess photopolymer is stored in a tank under the print bed.
• Print bed lowers into tank as the object is created.
• Solvent removes uncured polymer.
• SLS-created objects:
• Created from metal or plastic powder.
• Lowered into tank with each layer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Activity 17-3: Discussing Impact, Thermal, and 3D
Printer Maintenance
• What type of printer technology is a dot matrix printer?
• ANSWER:
• It is commonly described as an impact printer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Activity 17-3: Discussing Impact, Thermal, and 3D
Printer Maintenance
• What types of paper/stationery can dot matrix printers use that laser and
inkjet printers cannot?
• ANSWER:
• Multi-part or continuous tractor-fed stationery and carbon copy paper.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Activity 17-3: Discussing Impact, Thermal, and 3D
Printer Maintenance
• Where are you must likely to encounter thermal printers?
• ANSWER:
• Direct thermal printers are typically used as handheld receipt printers. There are other
thermal printer types. For example, dye sublimation printers are often used for photo
printing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Activity 17-3: Discussing Impact, Thermal, and 3D
Printer Maintenance
• You have been asked to perform basic maintenance on a printer in the
Research and Development area. The dot matrix printer used to create
shipping documents seems to be printing lighter than normal, and one of
the pins seems to not be connecting near the center of the print head as
there are blank areas in some letters and images. What maintenance
should you perform?
• ANSWER:
• Using the steps in the printer documentation, replace the ribbon
in the printer and clean the print head. If this does not fix the
problem, replace the print head.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Activity 17-3: Discussing Impact, Thermal, and 3D
Printer Maintenance
• A thermal printer used to create labels for parts bins, kits, and boxes is
jammed due to a label coming loose during printing. How should you
resolve this problem?
• ANSWER:
• Open the printer and locate the label that came off the backing. Remove the label and
if there is any sticky residue, clean it with isopropyl alcohol (IPA) applied to a swab.
Ensure the roll of labels is properly loaded and that there are no loose labels that
might come loose again.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Activity 17-3: Discussing Impact, Thermal, and 3D
Printer Maintenance
• What do you need to create objects with an FDM-type 3D printer?
• ANSWER:
• You will need spools of filament, usually made of some type of plastic, to create 3D
objects on a print bed or build surface.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Activity 17-3: Discussing Impact, Thermal, and 3D
Printer Maintenance
• What considerations for locating a 3D printer do you have to make?
• ANSWER:
• The 3D print process is sensitive to movement and vibration, so the printer must be
located on a firm and stable surface. The process can also be affected by dust and the
ambient temperature and humidity (especially variations and drafts). Finally, some
printer types are fully exposed so there is some risk of burns from the high-heat
elements. Ideally, the printer should not be accessible to untrained staff.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Topic D: Install and Configure Printers
Exam Objectives:
• 1001-3.10 Given a scenario, configure SOHO multifunction
devices/printers and settings.
• 1001-3.11 Given a scenario, install and maintain various print
technologies.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Windows Printers
What You See Is What You Get (WYSIWYG): The effect that some
applications provide where the screen output is equivalent to the
print output.
• Print driver enables communication between Windows and the print device.
• Print language support affects output accuracy.
• Printer technology affects quality, speed, and cost.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Windows Print Process (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Windows Print Process (Slide 2 of 2)
• PDL features:
• Scalable fonts
• Color printing
• Vector graphics
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Virtual Printers
• No physical printing.
• Output is a file containing PDL instructions or bitmap image data.
• Why use virtual printers?
• Sending documents to a fax server
• Creating read-only documents
• Making the content available
outside of the application
• Combining multiple documents
• Testing print output
• Options for file formats:
• Print to file
• Print to PDF
• Print to XPS
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Local Printer Connections
• USB
• Ethernet
• Serial port
• Wireless
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Printer Drivers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Configuration Settings (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Configuration Settings (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Printer Sharing and Networking (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Printer Sharing and Networking (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Data Privacy and Security Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Activity 17-4: Discussing Printer Installation and
Configuration
• When you are purchasing a new printer, what would you need to decide
between as you evaluate connections?
• ANSWER:
• Almost all new printers use USB, so the main consideration would be whether you
needed support for a wireless or Ethernet connection.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Activity 17-4: Discussing Printer Installation and
Configuration
• You use three Windows applications that need to print to a Canon BJC-
4300 printer. How many printer drivers must you install?
• ANSWER:
• One. Applications rely on the operating system to mediate access to devices. They do
not need their own drivers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Activity 17-4: Discussing Printer Installation and
Configuration
• You are setting up a print server and want to enable access for the widest
range of Windows 7 machines possible. Should you install separate
drivers for the Home and Enterprise editions?
• ANSWER:
• No—there is no difference between editions in this regard. You do need to install
drivers for x86 (32-bit) and x64 (64-bit) versions, though.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Activity 17-4: Discussing Printer Installation and
Configuration
• What tool can you use to confirm that basic print functionality is
available?
• ANSWER:
• Print a test page by using the option in the setup wizard or on the General tab of the
Printer Properties dialog box.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Activity 17-4: Discussing Printer Installation and
Configuration
• You have installed an automatic duplex unit in an office laser printer.
What configuration setting would you change to make the unit available
for print jobs?
• ANSWER:
• From Devices and Printers or Settings, select Printer Properties and then select
the Device Settings tab. Select the Duplex Unit setting and select Installed.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Activity 17-4: Discussing Printer Installation and
Configuration
• True or false? When you print 10 copies of an uncollated job, 10 copies of
page one are printed, followed by 10 copies of page two, then 10 copies of
page three, and so on.
• ANSWER:
• True.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Activity 17-4: Discussing Printer Installation and
Configuration
• True or false? To enable printer sharing via Windows, the print device
must be connected to the Windows PC via an Ethernet or Wi-Fi link.
• ANSWER:
• False—any print device can be shared via printer properties. The print device can be
connected to the Windows print server over USB, Bluetooth, Ethernet, or Wi-Fi. Other
clients connect to the printer via the share, however, so the Windows PC must be kept
on to facilitate printing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Activity 17-4: Discussing Printer Installation and
Configuration
• What configuration information does a user need to use a print device
connected to the same local network?
• ANSWER:
• The print device's IP address or host name. You might note that vendor utilities can
search for a connected device on the local network, so "None" could also be a correct
answer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Activity 17-4: Discussing Printer Installation and
Configuration
• What service should a network print device run to enable an Apple iPad to
use the device over Wi-Fi?
• ANSWER:
• The Bonjour service.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 80
Topic E: Troubleshoot Print Device Issues
Exam Objectives:
• 1001-5.6 Given a scenario, troubleshoot printers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Printer Connectivity Troubleshooting
• Error message or
code on printer’s
control panel
• Printer log files
• Device manage-
ment software
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
General Troubleshooting Approach
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Guidelines for Troubleshooting Print Device Issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Print Queue and Spooler Troubleshooting (Slide 1 of 3)
• Backups might mean a printer is offline or out of paper, or a particular print job
won’t print.
• Open the print queue and restart the print job.
• Delete the print job and reprint.
• Cycle power on the printer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Print Queue and Spooler Troubleshooting (Slide 2 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Print Queue and Spooler Troubleshooting (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Permission Issues Troubleshooting
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
Driver and Garbled Output Issues
Paper jams:
• Gain proper access to where paper is
stuck
• Gently free the paper
• If necessary, release levers to remove
paper
• If jams are frequent, diagnose
the problem and repair
• If multiple sheets feed at once:
• Verify media is correctly loaded
• Verify media is appropriate weight
• May need to change pickup rollers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Laser Printer Print Defects
• Faded or faint prints • Persistent marks
• Blank pages • Toner not fused to the paper
• Skewed output • Wavy or wrinkled output
• White stripes • Ghost images
• Black stripes or whole page black • Wrong color or color cast
• Toner specks • Color missing
• Paper jams
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Inkjet and Dot Matrix Print Defects
• Inkjet defects:
• Lines that run through a printout are probably due to dirt on the print head, a blocked
nozzle, or a dirty feed roller. Run a cleaning cycle.
• Other print quality problems like smearing are probably due to paper quality.
• For print head jamming, try cycling the power on the printer.
• Color issues might indicate one of the ink cartridges is running out, or that color
printing is not active.
• Dot matrix defects:
• Lines in the output indicate a stuck pin in the print head.
• Faint printing might be due to the platen gap being too wide.
• Smudges might be due to the platen gap being too narrow.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Activity 17-6: Troubleshooting Printer Issues
• A user reports that the printed output is not up to the usual standards for
her printer. You will need to resolve this issue so she can print her report.
What is the overall process for troubleshooting this issue?
• ANSWER:
• Print out a test page to see if you can reproduce the problem the user reported. If you
see the same problem as reported by the user, identify the print defect, based on the
type of printer, to resolve the problem. Document the steps you took to resolve the
problem.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Activity 17-6: Troubleshooting Printer Issues
• If print jobs do not appear at the printer and the queue is clear, what could
you try first to solve the problem?
• ANSWER:
• Cycle the power on the printer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Activity 17-6: Troubleshooting Printer Issues
• ANSWER:
• %SystemRoot%\System32\Spool\Printers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Activity 17-6: Troubleshooting Printer Issues
• ANSWER:
• Right-click Computer and select Manage. Select Services and
Applications→Services. Right-click Print Spooler and select Restart.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Activity 17-6: Troubleshooting Printer Issues
• ANSWER:
• Check the error message reported by the printer (this may be shown on the printer's
console). It may indicate the location of the stuck pages. Otherwise, visually inspect
the various feed and output mechanisms.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Activity 17-6: Troubleshooting Printer Issues
• What should you do if you cannot delete a job stuck in the print queue?
• ANSWER:
• Stop the print spooler service, delete the spooled file, then restart the spooler.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Activity 17-6: Troubleshooting Printer Issues
• ANSWER:
• The paper might not be loaded squarely, there might be too much paper loaded into
the tray, or the paper is creased or dirty.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Activity 17-6: Troubleshooting Printer Issues
• ANSWER:
• Faint printing.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Activity 17-6: Troubleshooting Printer Issues
• ANSWER:
• Poorly distributed toner or a damaged/worn transfer corona wire. If the secondary
corona does not apply a charge evenly across the paper, less toner is attracted from
the drum to the part of the sheet where charging failed. Note that if there are repetitive
white or black marks (rather than stripes) that do not smudge, the issue is more likely
to be dirt or grease on the drum.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Activity 17-6: Troubleshooting Printer Issues
• What effect does a dirty primary corona wire have on laser printing?
• ANSWER:
• It leaves black stripes on the paper. If the charging corona does not apply the correct
charge evenly to the drum, toner is attracted to the place where the charging failed,
creating a black stripe all the way down the page.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Topic F: Install and Configure Imaging Devices
Exam Objectives:
• 1001-3.6 Explain the purposes and uses of various peripheral types.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
Imaging Devices
• Digital cameras
• Webcams
• Scanners
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
Scanners
Scanner: A type of photocopier that can convert the image of a
physical object into an electronic data file.
Optical Character Recognition (OCR): Software that can identify
the shapes of characters and digits to convert them from printed
images to electronic data files that can be modified in a word
processing program.
• Typically used to input flat objects:
• Documents
• Receipts
• Photos
• OCR enables translation of scanned text into editable content.
• USB, Ethernet, and wireless connections.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
Flatbed Scanners
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
Sheet-Fed and ADF Scanners
Sheet-fed scanner: A scanner in which the paper is passed over a
fixed scan head.
Automatic Document Feeder (ADF): A device that feeds media
automatically into a scanner or printer.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
Multi-Function Devices
• Printer
• Scanner
• Copier
• Possibly fax
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
Scan Options
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111
Barcode Scanners
Barcode scanner: A handheld or pen-shaped device designed to
scan patterns of different sized parallel bars, typically representing a
product number, such as an ISBN, EAN, or UPC.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 112
QR Scanners
Quick Response scanner (QR scanner): A type of 2D barcode
scanner used to store information that can be read using a barcode
scanner or the camera on a smartphone that has a barcode
scanning app installed.
• Any smartphone camera, digital camera, and webcam can scan QR codes.
• No need for special scanning hardware.
• QR scanning software reads instructions in the code to perform an action.
• Open a web page or import a contact record or calendar event.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 113
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 114
Activity 17-8: Discussing Imaging Device Installation
and Configuration
• What type of connection interface is a scanner most likely to use?
• ANSWER:
• All modern scanners will support USB. Some might have an Ethernet network port
(RJ-45) or even wireless (Wi-Fi and/or Bluetooth), though this is more typical of
Multifunction Devices (MFD) than standalone scanners.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 115
Activity 17-8: Discussing Imaging Device Installation
and Configuration
• What type of sensor is used to capture an image for conversion to a
digital file?
• ANSWER:
• Charge Coupled Device (CCD) or Complementary Metal Oxide Semiconductor
(CMOS).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 116
Activity 17-8: Discussing Imaging Device Installation
and Configuration
• What is the function of OCR?
• ANSWER:
• Optical Character Recognition (OCR) software can convert a scanned image of text
into a digital text file that can be edited in a text editor or word processor.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 117
Activity 17-8: Discussing Imaging Device Installation
and Configuration
• What type of imaging input device would be most useful for a Point-of-
Sale (POS) system?
• ANSWER:
• Barcode scanner.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 118
Activity 17-8: Discussing Imaging Device Installation
and Configuration
• True or false? Any type of smartphone camera can be used to read a QR
code.
• ANSWER:
• True. The smartphone just needs to capture the image of the Quick Response (QR)
code and be installed with software to decode it.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 119
Reflective Questions
1. When would you recommend to users that they use laser printers? Inkjet
printers? Impact printers? Thermal printers?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 120
Implementing Operational
Procedures
Implementing Operational Procedures
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Topic A: Environmental Impacts and Controls
Exam Objectives:
• 1002-4.5 Explain environmental impacts and appropriate controls.
• 1002-4.3 Given a scenario, implement basic disaster prevention and
recovery methods.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Power Issues
Surge: Abrupt, but brief change in the value of the voltage.
Spike: A powerful surge, such as that caused by lightning.
Sag: Power supply to components briefly dips below required
levels.
Brownout: Power from the wall socket is insufficient to allow
devices to function correctly.
Blackout: Complete loss of electrical power.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Power Protection Controls (Slide 1 of 5)
Surge protector: A device intended to protect electrical devices
against the damaging effects of a power spike.
Line conditioner: A device that adjusts voltages in under-voltage
and over-voltage conditions to maintain a 120 V output.
Power Distribution Unit (PDU): A device designed to provide
power to other devices that require it.
Uninterruptible Power Supply (UPS): A battery powered device
designed to provide an alternative AC power supply during a power
failure.
• Devices require stable power supply
• Electrical events can crash devices
• Use power protection devices to mitigate issues
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Power Protection Controls (Slide 2 of 5)
Surge protectors:
• Low cost
• Protect one or two devices
• Rated by various standards
• UL 1449
• Characteristics:
• Clamping voltage
• Joules rating
• Amperage
Line conditioners:
• Protect from surges or brownouts
• Cannot protect from blackouts
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Power Protection Controls (Slide 3 of 5)
Battery backups and UPS:
• Power redundancy:
• Protection against blackouts
• Battery backups provide temporary power at the
component level
• UPSs provide temporary power at the system
level
• Length of protection depends on load and
battery capacity
• Allows time to:
• Switch to alternate power source
• Shut down device properly
• Save files
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Power Protection Controls (Slide 4 of 5)
UPS sizing:
• Considerations when purchasing UPS:
• Reliability • Maintenance
• Cost • System performance and features
• Uptime
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Power Protection Controls (Slide 5 of 5)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Environmental Impacts
Mean Time Between Failures (MTBF): The rating on a device or
component that predicts the expected time between failures.
• Environment affects:
• Operation
• Lifespan
• Keep away from:
• Extreme temperatures
• Dampness and dust
• Regularly inspect and clean surroundings
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Dust and Debris
• Dust/airborne particles:
• Drawn in through ventilation holes
• Can prevent heat dissipation
• Can clog keyboards and mice
• Can make displays hard to read
• Control dust by:
• Cleaning devices
• Maintaining HVAC filters
• Maintaining fan inlet air and dust filters
• If necessary, placing a system in enclosure with its own air filters and fans
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Temperature, Humidity, and Ventilation
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
General Preventive Maintenance (Slide 1 of 2)
• Daily:
• No ventilation slot obstructions
• Equipment is installed securely
• No liquid hazards
• Weekly:
• Clean exterior of monitor and system unit
• Clean keyboard and mouse
• Monthly:
• Check that fans are functioning correctly
• Check cable connections
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
General Preventive Maintenance (Slide 2 of 2)
• Clean peripherals with wipes or cloths and cleaning solutions designed for PC
components:
• Mice
• Keyboard
• Displays
• Laptop maintenance:
• Keep vents clear of dust and debris
• Use on a flat surface to allow airflow
• If used on a lap, use a chiller pad or mat to allow airflow
• Use compressed air to clean keyboard
• Use soft cloth and approved cleaner for screen, touchpad, and case
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Disposal, Recycling, and Compliance
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Activity 18-1: Discussing Environmental Impacts and
Controls
• What are the principal characteristics of a surge protector?
• ANSWER:
• This is a circuit designed to protect connected devices from the effect of sudden
increases or spikes in the supply voltage and/or current. Surge protectors are rated by
clamping voltage (low values are better), joules rating (higher values are better), and
amperage (the maximum current that can be carried).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Activity 18-1: Discussing Environmental Impacts and
Controls
• When you are sizing the load for a UPS, how would you calculate the
power used by a PC component?
• ANSWER:
• Multiply its Voltage (V) by the Current (I) it draws to calculate power drawn in Watts
(W=V*I). You may then need to convert this to a VA rating by multiplying by 1.67.
When power is supplied, some is lost through the function of inverters and capacitors.
This means that the supply, measured as VA, must exceed the watts drawn by about
70%. This ratio is also described as the Power Factor (PF).
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Activity 18-1: Discussing Environmental Impacts and
Controls
• Why should you never use a home vacuum cleaner to clean a PC?
• ANSWER:
• Because they generate large amounts of static electricity that may damage sensitive
components.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Activity 18-1: Discussing Environmental Impacts and
Controls
• What are the principal environmental hazards to consider when installing
PC equipment?
• ANSWER:
• Heat and direct sunlight, excessive dust and liquids, and very low or high humidity.
Equipment should also be installed so as not to pose a topple or trip hazard.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Activity 18-1: Discussing Environmental Impacts and
Controls
• When might you need to consult MSDS documentation?
• ANSWER:
• A Material Safety Data Sheet (MSDS) should be read when introducing a new product
or substance to the workplace. Subsequently, you should consult it if there is an
accident involving the substance and when you need to dispose of the substance.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Topic B: Create and Maintain Documentation
Exam Objectives
• 1002-4.1 Compare and contrast best practices associated with types of
documentation.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Equipment Inventory (Slide 1 of 2)
Asset: Hardware and software items found in an organization.
Asset management: A set of policies that includes information
about the financial and contractual specifications of all hardware
and software components present in an organization's inventory.
Radio Frequency ID tag (RFID tag): A tag that can be read by
using a radio transmitter/receiver device.
Typical assets:
• Standard and specialty workstations
• Servers
• Connectivity and backup hardware
• Operating system software
• Productivity and application software
• Maintenance utilities
• Backup documentation
• Overall asset inventory
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Network Topology Diagrams
Network topology: Physical or logical shape or structure of the
network.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Schematic Block Diagram
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Reference Documentation
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Incident Documentation
Incident management: A set of practices and procedures that
govern how an organization will respond to an incident in progress.
• Job ID
• Contact
• Priority
• Problem description
• Asset
• Details
• Follow up
• Dates
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Organizational Policies
Standard: A measure for evaluating compliance with a policy.
Procedure: Inflexible, step-by-step listing of actions that must be
completed for any given task. Also referred to as Standard
Operating Procedure.
Guidelines: For areas of policy where there are no procedures, or
where it is appropriate to deviate from a specified procedure.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Guidelines for Creating and Maintaining Documentation
(Slide 1 of 2)
• Keep accurate records for hardware and software:
• Deployed hardware (complete systems and components).
• Deployed software (applications and OSs).
• Spare hardware (complete systems and components).
• Software that is not currently installed (applications and OSs).
• Use asset tags to track equipment.
• Asset records should be linked to the appropriate vendor documentation.
• Document network components (physical and logical topology).
• Maintain a library of reference documentation, including:
• User and installation manuals.
• Links to Internet and web-based resources.
• Training materials.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Guidelines for Creating and Maintaining Documentation
(Slide 2 of 2)
• Document incidents through the use of standardized incident reports.
• Create and maintain organizational policies, including:
• Personnel management policies.
• Policy for handling confidential information.
• Acceptable use policies.
• Documentation of expectations of privacy.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Activity 18-2: Discussing Documentation Creation and
Maintenance
• What role do barcodes play in managing inventory?
• ANSWER:
• An inventory is a list of assets. To compile a list of assets, you must be able to identify
each asset. A barcode label is a good way of doing this. You can use a scanner to link
to the asset within the inventory database automatically, avoiding delays and mistakes
that might be made by typing an asset ID.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
Activity 18-2: Discussing Documentation Creation and
Maintenance
• What are the two main types of network topology diagrams?
• ANSWER:
• You can create diagrams to show the physical topology or the logical topology. The
physical topology shows the location of cabling and ports plus their bandwidth. The
logical topology shows IP addresses and subnets plus security controls such as
firewalls. There are lots of other types of network topology diagrams, of course, but
physical and logical are the two basic distinctions you can make. It is best practice not
to try to create a diagram that shows both.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Activity 18-2: Discussing Documentation Creation and
Maintenance
• What is the purpose of a KB?
• ANSWER:
• A Knowledge Base (KB) is a reference to assist with installing, configuring, and
troubleshooting hardware and software. A KB might be created by a vendor to support
their products. A company might also create an internal KB, populated with guidelines,
procedures, and information from service tickets.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Activity 18-2: Discussing Documentation Creation and
Maintenance
• What three broad types of incident documentation might a business
require?
• ANSWER:
• Incidents can be categorized as support/troubleshooting, security, and accident
(whether to personnel or to assets). You should also consider the effect compliance
with regulatory or legal requirements has on the documentation that must be kept.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38
Activity 18-2: Discussing Documentation Creation and
Maintenance
• While you are answering a service call on a computer that is located in a common
area of the office, you come across information showing that some unauthorized
websites have been viewed. The activity has been linked to a particular user
account. What is the appropriate action to take?
• ANSWER:
• This is likely to demonstrate a clear breach of Acceptable Use Policies (AUP) and will be the
subject of disciplinary action by HR. You should not over-assume or over-react, however.
Take care to follow best practices for incident response, such as establishing unambiguous
evidence and documenting the entire incident.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 39
Topic C: Use Basic Change Management Best Practices
Exam Objectives:
• 1002-4.2 Given a scenario, implement basic change management best
practices.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 40
Change Management
Configuration management: The practice of identifying all
component of the ICT infrastructure and their properties.
Change management: The practice of adopting policies to reduce
the risk of infrastructure changes affecting service or operations.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 41
Documented Business Processes
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 42
Process for Instituting Change to Operational Policies
and Procedures
• Implementation of changes should be carefully planned
• Organizations should attempt a trial implementation for major changes
• Create a rollback or remediation plan
• Schedule changes to have minimal impact on workflow
• After the change is implemented, assess its impact
• Review the process and document the outcomes
• Can be used to improve the process for future change management projects
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 43
Guidelines for Using Change Management Best Practices
(Slide 1 of 2)
• Create a separate document for each item:
• Describe its initial state
• Identify all subsequent changes
• ITIL configuration management includes documenting:
• Service assets
• CIs
• Configuration Management Database (CMDB)
• Baselines
• Configuration Management System
• Use RFCs to document the need or desire for a change.
• RFCs should be considered at the appropriate level and affected stakeholders should
be notified.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 44
Guidelines for Using Change Management Best Practices
(Slide 2 of 2)
• Major or significant changes:
• Could be managed as a separate project.
• Might require approval through a Change Advisory Board.
• Follow documented SOPs and Work Instructions.
• Implementation of changes should be carefully planned.
• How will the change affect dependent components?
• For most significant or major changes, use trial implementations.
• Always have a rollback (or remediation) plan.
• Schedule changes to minimize system downtime.
• When the change has been implemented:
• Assess its impact, and review the process to identify any outcomes that could help
future change management projects.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 45
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 46
Activity 18-3: Discussing Change Management Best
Practices
• Why are documented business processes essential for effective change
management?
• ANSWER:
• Without documented processes, you do not have a means of measuring or specifying
the effects of change. Of course, you could be introducing a change to start using
documented business processes! But from that point, any project can be measured
and evaluated by the changes it makes to documented procedures. Changes that are
supported by documented procedures can also be communicated more clearly to
staff.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 47
Activity 18-3: Discussing Change Management Best
Practices
• What are the main components of an RFC?
• ANSWER:
• A Request for Change (RFC) sets out the purpose and scope of the proposed change
and a documented plan for carrying out the change. Ideally, it should perform a risk
analysis of both performing the change and not performing the requested change. It
should state the measures by which the change can be judged to have been
completed successfully. Ideally, it would also include a backout plan for reversing the
change.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 48
Activity 18-3: Discussing Change Management Best
Practices
• What is a change board?
• ANSWER:
• A change board is a committee of stakeholders who can approve the planned change.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 49
Topic D: Implement Disaster Prevention and Recovery
Methods
Exam Objectives:
• 1002-4.3 Given a scenario, implement basic disaster prevention and
recovery methods.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 50
Disaster Prevention and Recovery
Disaster Recovery Plan (DRP): A documented and resourced
plan showing actions and responsibilities to be used in response to
critical incidents.
• Identify scenarios for natural and man-made disasters and options for
protecting systems.
• Identify tasks, resources, and responsibilities for responding to a disaster.
• Train staff in the disaster planning procedures and how to react well to change.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 51
Data Backup and Restoration (Slide 1 of 4)
Data backup: A system maintenance task that enables you to store
copies of critical data for safekeeping.
Data restoration: A system recovery task that enables you to access
and restore the backed-up data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 52
Data Backup and Restoration (Slide 2 of 4)
Backup management:
• Plan execution and frequency of backups.
• Identify the recovery window via business continuity planning.
• Long- and short-term
retention.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 53
Data Backup and Restoration (Slide 3 of 4)
Backup types
Type Data Selection Backup/Restore Archive/Attribute
Time
Full All selected data no matter High/low (one Cleared
when it was previously media set)
backed up
Incremen New files and files modified Low/high (multiple Cleared
•talUsing a full
since last
daily backup
backup sets)
means that only one media set is needed to restore
the system.
Differenti All data modified since the Moderate/moderat Not cleared
•al Using an last full backup
incremental e (no
backup means that moreless
it takes than 2 to back up, but you
time
might need to restore several media setssets)
for full recovery.
• Using a differential backup means the time needed for restoring and backing
up is roughly equal.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 54
Data Backup and Restoration (Slide 4 of 4)
Recovery images
• Windows computers come with a recovery image, but the image does not get
updated unless you do it.
• Custom recovery image should contain current OS state plus all desktop apps
installed at the boot partition.
• Any changes to apps or configuration requires a new recovery image to be
created.
• Use recovery images to restore a PC’s or VM’s functionality (OS and apps).
• Use file-level backups to restore user profile information and data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 55
Backup Testing
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 56
Off-site and Local Storage (Slide 1 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 57
Off-site and Local Storage (Slide 2 of 2)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 58
Account Recovery
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 59
Guidelines for Implementing Disaster Recovery and
Prevention Methods (Slide 1 of 2)
• A DRP should:
• Identify scenarios for natural and man-made disaster.
• Identify options for protecting systems.
• Identify tasks, resources, and responsibilities for responding to a disaster.
• Train staff in the disaster response procedures and how to react to change.
• Perform backups of data and configuration files on a regular basis.
• Determine the frequency of backups.
• Determine short-term and long-term data retention needs.
• Determine if you need to perform full, incremental, or differential backups.
• Create custom recovery images for restoring PCs and VMs.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 60
Guidelines for Implementing Disaster Recovery and
Prevention Methods (Slide 2 of 2)
• Remember, restoring data from backup provides data that is only as current as
the last backup.
• Test backups after they are created.
• Determine where backups will be stored both locally and offsite.
• Document the account recovery methods that will be needed for any systems,
applications, or websites used by the organization.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 61
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 62
Activity 18-4: Discussing Disaster Prevention and
Recovery
• At which general levels are backups made to facilitate disaster recovery?
• ANSWER:
• Backup levels include file, image, and critical application. File level backups allow
restoration of user-generated data files in a shared folder or user profile. An image-
level backup records a whole installation (OS, third-party software and drivers, and
custom settings). This can be used to reinstall a computer or recover a Virtual
Machine (VM). A critical application backup saves data and settings kept by a specific
software product. This is likely to involve some sort of database backup.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 63
Activity 18-4: Discussing Disaster Prevention and
Recovery
• What tests can you perform to ensure the integrity of backup settings and
media?
• ANSWER:
• You can perform a test restore and validate the files. You can run an integrity check on
the media, such as using chkdsk on a hard drive used for backup. Backup software
can often be configured to perform an integrity check on each file during a backup
operation. You can also perform an audit of files included in a backup against a list of
source files to ensure that everything has been included.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 64
Activity 18-4: Discussing Disaster Prevention and
Recovery
• For which backup/restore issue is a cloud-based backup service an
effective solution?
• ANSWER:
• The issue of provisioning an offsite copy of a backup. Cloud storage can also provide
extra capacity.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 65
Activity 18-4: Discussing Disaster Prevention and
Recovery
• What provisions can you make for account recovery?
• ANSWER:
• You might implement a password recovery mechanism for users who have forgotten a password,
though this mechanism can itself represent a security risk. You should ensure that profile data is
backed up so that it can be restored in the event of file corruption or damage to a disk. If a profile
cannot be restored, the account would have to be recreated. This means that the account will have
to be reassigned security group memberships and permissions. This is easier if the allocation of
those permissions has been well documented in the first place. There may also need to be some
provision for configuring a recovery key to restore encrypted data.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 66
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 67
Topic E: Basic Scripting Concepts
Exam Objectives:
• 1002-4.8 Identify the basics of scripting.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 68
Script Files
Script file: A text document containing OS commands or
instructions from a scripting language.
Scripting language: A programming language that is not compiled,
and must be run within a particular environment.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 69
Scripting Languages (Slide 1 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 70
Scripting Languages (Slide 2 of 7)
Batch files
• Stored in a .BAT file
• Usually run end to end
• Limited branching
• Limited user input
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 71
Scripting Languages (Slide 3 of 7)
Windows PowerShell
• Perform administrative
tasks
• Can use PowerShell ISE
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 72
Scripting Languages (Slide 4 of 7)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 73
Scripting Languages (Slide 5 of 7)
VBScript:
• Used for administrative tasks
• Run from command line
or Windows GUI
• Must run within host
environment
• Internet Explorer
• IIS
• Windows Script Host
(WSH)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 74
Scripting Languages (Slide 6 of 7)
JavaScript:
• Used for interactive web-based
content and web apps
• Automatically executed by
placing the script in web page
HTML code
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 75
Scripting Languages (Slide 7 of 7)
Python:
• General purpose programming
language
• Designed to be easy to read and
program
• Code runs in an interpreter
• Windows default is CPython
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 76
Basic Script Constructs
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 77
Comment Syntax
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 78
Identifiers
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 79
Environment Variables
Environment variable: A storage location in the OS command
shell.
• Most scripts run from top to bottom unless you specify otherwise.
• You can specify logical conditions to change the order of execution.
• Branches provide flow control
• Loops provide repetition
• Comparison operators help define the condition.
• Logical operators enable testing multiple conditions simultaneously.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 81
Basic Data Types (Slide 1 of 2)
Data Type Description
Integers • Whole numbers.
• For example: 5, 21, or 65536.
• An integer data type consumes 1 to 8 bytes of computer
storage.
Floating Point • Supports decimal fractions such as 4.1, 26.4, or 5.62.
Numbers • Consumes between 4 and 8 bytes of storage.
• Can store a whole number too (4.0, for instance).
Boolean Values • Indicates that something is either TRUE or FALSE (with a
1 or 0).
• Consumes a single bit of storage.
Characters • A single textual character.
• For example: a, D, 7, $, @, #.
• These consume one byte of storage.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 82
Basic Data Types (Slide 2 of 2)
Batch file %%
PowerShell There are different escape characters for different
circumstances.
--%
`
\
VBScript • To escape a single quote, enter two single quotes: ''
• To escape a double quote, enter two double quotes: ""
• Use the Escape(charString) function
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 83
Activity
Discussing Scripting
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 84
Activity 18-6: Discussing Scripting
• ANSWER:
• .py.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 85
Activity 18-6: Discussing Scripting
• Which batch or scripting language is represented here?
• ANSWER:
• VBScript.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 86
Activity 18-6: Discussing Scripting
• ANSWER:
• A variable is a construct within programming code for some sort of value that can
change during the execution of the script. The variable must be given a name. A
variable also has a data type, such as string or integer. The data type can be explicitly
declared or set when the variable is initialized (given its first value). It is good
programming practice to declare variables before they are used.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 87
Activity 18-6: Discussing Scripting
• ANSWER:
• In Windows, environment variables are defined using set. In Linux, there are not only
environment variables (env and printenv), but also variables specific to the current
shell. Shell variables are configured with set. The syntax of set is different between
Windows and Linux
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 88
Activity 18-6: Discussing Scripting
• ANSWER:
• The For ... Next statement is one kind of loop. The script will execute statements
within the loop repetitively until a logical condition is met.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 89
Activity 18-6: Discussing Scripting
• What is a string?
• ANSWER:
• A string is a data type that represents a series of text characters.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 90
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 91
Topic F: Professionalism and Communication
Exam Objectives:
• 1002-4.7 Given a scenario, use proper communication techniques and
professionalism.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 92
Customer Service Attitude
• Be a good communicator:
• Competent technicians with poor communication skills do not impress customers
• Customers are any users or clients of a support service
• Good customer service:
• Be positive
• Be clear, concise, and direct
• Be consistent, fair, and respectful
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 93
Communication Skills
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 94
Professionalism (Slide 1 of 3)
• Proper documentation helps you set realistic expectations.
• Contact information
• Hours of operation
• Items that are supported
• How long to resolve incidents
• When an item will be replaced rather than repaired
• Problem management
• Clarify customer expectations of what will
be done and when
• Address customer concerns about cost or
impact on business processes
• Your constraints regarding time, parts, costs,
contractual obligations, etc.
• Reach a course of action that is realistic and
achievable
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 95
Professionalism (Slide 2 of 3)
• Use a ticketing system to support proper documentation of all support requests.
• Use proper spelling and grammar.
• Be clear in case others need to use
the information to resolve the issue.
• Be aware that the customer might
receive the contents of the ticket.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 96
Professionalism (Slide 3 of 3)
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 97
Respect
• Avoid distractions during a service call:
• Don’t take personal calls or use texting
• Don’t post on social media
• Be respectful of property and confidentiality:
• Don’t use customer equipment or services without permission
• Don’t help yourself to food or drink, and don’t snoop
• Ask before using the restroom
• Notify customers if confidential materials are in sight so they can deal with them
• Maintain a tidy work environment
• Be culturally sensitive:
• Don’t make assumptions
• If language or accents are making things difficult:
• Use questions, summaries, restatements
• Use visual aids or demonstrations
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 98
Customer Complaints
• Maintain a positive attitude
• Be accurate and honest
• When dealing with a difficult customer:
• Identify signs that a customer is becoming angry
• Don’t take complaints personally
• Listen and let the customer explain the
problem
• Hang up if the customer is abusive or
threatening
• Issue a caution first
• Warn them about their behavior
• End the call if they don’t act reasonably
• Be professional
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 99
Guidelines for Communicating with Customers (Slide 1
of 2)
• Use proper language:
• Avoid jargon, acronyms, and slang, whenever possible.
• Maintain a positive attitude and project confidence.
• Actively listen, take notes, and avoid interrupting the customer.
• Be culturally sensitive.
• Use appropriate professional titles, when applicable.
• Be on time, and if you will be late, be sure to contact the customer.
• Avoid distractions.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 100
Guidelines for Communicating with Customers (Slide 2
of 2)
• When dealing with difficult customers or situations:
• Do not argue with customers or be defensive.
• Avoid dismissing customer problems.
• Avoid being judgmental.
• Clarify customer statements.
• Do not disclose experiences via social media outlets.
• Set and meet expectations, adhere to the prescribed timeline, and
communicate status with the customer.
• If necessary, offer different repair or replacement options.
• Provide proper documentation on the services provided.
• Follow up with customers and users at a later date to verify satisfaction.
• Deal appropriately with customers’ confidential and private materials.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 101
Activity
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 102
Activity 18-8: Discussing Customer Service and
Communication Skills
• How would you cope with a user who is struggling to explain the problem
that they are experiencing?
• ANSWER:
• Use closed questions that allow the user to give simple yes or no answers.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 103
Activity 18-8: Discussing Customer Service and
Communication Skills
• You have received an off-site service call to service a network printer at a customer
location. When you arrive, the user is at the printer and starts talking about how the
printer is not working properly, and he cannot get his reports handed in on time.
How should you approach this user?
• ANSWER:
• Demonstrate empathy with the customer's situation and use active listening skills to show
that you understand the importance of the issue and make the customer confident that you
can help. Then use closed questioning techniques to start to diagnose the problem.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 104
Activity 18-8: Discussing Customer Service and
Communication Skills
• How would you deal with a customer who is becoming abusive because
you have taken three separate calls to deal with their problem?
• ANSWER:
• Explain why the problem is taking so long to resolve, and get them to focus on helping
you, rather than hindering you. If the abuse continues, warn them that it cannot be
tolerated and that you will have to end the call if it persists.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 105
Activity 18-8: Discussing Customer Service and
Communication Skills
• You are trying to troubleshoot a problem over the phone and need to get
advice from your manager. How should you handle this with the
customer?
• ANSWER:
• Advise them that you will put them on hold while you speak to someone else or
arrange to call them back.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 106
Activity 18-8: Discussing Customer Service and
Communication Skills
• You are troubleshooting a print problem, which turned out to be caused
by user error. The user is not confident that the problem is solved and
wants more reassurance. You have already explained what the user was
doing wrong in some detail. What should you do?
• ANSWER:
• Run through the print process step-by-step to show that it works. It is very important to
get a customer's acceptance that a problem is "closed."
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 107
Activity 18-8: Discussing Customer Service and
Communication Skills
• A user known to your department as a "frequent flyer" with regard to
support requests calls in with a genuine but non-urgent problem. You are
in the middle of another important job that is urgent. What would be the
best approach?
• ANSWER:
• Confirm that the problem is not impacting their work and get them to email a support
request, which you will attend to within 48 hours.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 108
Activity 18-8: Discussing Customer Service and
Communication Skills
• What should you be wary of if a customer phones in with a problem you
think you have solved already?
• ANSWER:
• Do not assume—allow the customer to describe the problem fully then make a proper
assessment.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 109
Activity 18-8: Discussing Customer Service and
Communication Skills
• You are working on the training documentation for new A+ technicians in
the organization. What should you include for dealing with difficult
customers or situations?
• ANSWER:
• Answers will vary, but might include the following. Do not argue with customers and/or
be defensive. Avoid dismissing customer problems and do not be judgmental. Try to
calm the customer and move the support call towards positive troubleshooting
diagnosis and activity, emphasizing a collaborative approach. Do not disclose
experiences via social media outlets.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 110
Reflective Questions
1. Which of the best practices discussed in this lesson apply in your workplace?
2. How do you think the scripting concepts discussed in this lesson will help you at
your workplace?
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 111