Cisnet A+ 901 & 902 Study Guide
Cisnet A+ 901 & 902 Study Guide
Cisnet A+ 901 & 902 Study Guide
CompTIA A+ Certification
CompTIA's A+ certification is an entry-level certification that verifies that you have the knowledge equivalent to that of
an entry-level IT professional with about 1 year of hands-on experience. To obtain A+ certification, you must pass 2
exams:
A+ Exam 220-901 A+ Exam 220-902
Domain % of Exam Domain % of Exam
PC Hardware 34% Windows Operating Systems 29%
Networking 21% Other Operating Systems 12%
Mobile Devices 17% Security 22%
Hardware & Networking Troubleshooting 28% Software Troubleshooting 24%
Operational Procedures 13%
Total 100% Total 100%
In addition to covering everything you need to know for the A+ exams, this course has been designed to help you gain
real-world skills that you will use every day on-the-job as a PC technician. By the time you are done with this course,
you should be able to do following:
Set up a new computer.
Identify system requirements when purchasing a new computer.
Understand the technology and specifications used to describe computer components, and make informed
choices about which device characteristics are required for your situation.
Install or upgrade the operating system.
Manage external devices.
Troubleshoot common computer problems that can be resolved without replacing internal components.
Connect to a small home network.
Hardware Basics
As a PC technician, it is very important that you understand the common components of a computer. The following table
contains the three basic elements that make up a computer:
Term Definition
The physical components that work together to make a computer system or network. Hardware include:
Hardware
Keyboard, mouse, monitor, printer, Connectors and cables, Drives, Circuit boards
Computer programs that perform specific tasks. Software components include:
Software Operating System, Program applications
Hardware drivers (special programs that tell the operating system how to use the hardware)
Software that has been permanently placed in a hardware component. An example of firmware is a BIOS
Firmware
chip.
1|Page
Cisnet A+ 901 & 902 Study Guide
Modern PC repair and maintenance is facilitated by increasing componentization and standardization.
Because of componentization, a working PC is a combination of many different parts. Each component, also
called a Field-Replaceable Unit (FRU), can be replaced when faulty or upgraded to provide additional functionality.
Replacing a single component is cheaper than replacing the entire PC. And in most cases, replacing the component
is easier and cheaper than repairing the component.
Because of standardization, components from many different manufacturers are interchangeable. As long as
the component meets the standards, you can be reasonably confident that it will work in the system.
Power Supply:
Power supplies must be matched to the motherboard and case form factor. If you have an ATX motherboard, purchase
an ATX power supply. The power supply converts AC current to DC current.
AC (Alternating current) is the type of current distributed through wall sockets.
DC (Direct current) is the type of current used inside a computer.
Standard ATX Power supplies provide + 3.3 volts, +/- 5 volts, and +/- 12 volts (DC power). Most modern components
require +12 volt output. MicroATX power supplies only provide + 3.3 volts and +/- 12 volts (+/- 5 volt components are
not typically used in MicroATX systems.)
The following are common power supply connectors.
2|Page
Cisnet A+ 901 & 902 Study Guide
Motherboard
A motherboard, also called system board, logic board, or mainboard, is a circuit board that either houses or is
connected to all of the components operating in the computer. Choosing the correct motherboard requires attention
regarding which features and configurations are available. Ensure that the board chosen is compatible with the system
CPU and that there are enough compatible expansion and memory slots, keeping in mind future upgrading
requirements.
There are a number of connectors on motherboards for components such as power supplies, fans,
and LED lights. System cases often have additional ports available, such as USB or Firewire ports,
Onboard internal that need to be connected to the motherboard. These ports are connected to the motherboard's front
connectors panel connectors, which are also called headers.
External ports required by users that are not available on the motherboard are often added using
expansion cards. These cards plug directly into designated expansion slots on the motherboard.
The BIOS chip is firmware (hardware hard-coded with software)
attached to the motherboard and is essential in booting the
BIOS chip & computer.
CMOS battery
The CMOS battery supplies power to the CMOS to retain system
settings used by the BIOS during system boot.
The chipset is a group of chips that facilitate communication between the processor, memory
components, and peripheral devices. The chipset controls the bus speed and also power management
features. Chipsets are usually attached to the motherboard and are non-upgradeable. Most modern
chipsets consist of the following:
The northbridge chip provides control for main and cache memory, the front side bus, and
the AGP and PCIe graphics. The northbridge is closest to the CPU. The northbridge dictates the
CPU and memory type supported by the motherboard. On some motherboards, the northbridge
chip includes an integrated graphic processor. The northbridge often has a heat sink and
Chipset sometimes a fan, especially if it includes built-in video.
The southbridge chip provides the real time clock, controls power management, and
provides the controllers for the PCI bus and USB devices.
There are two other important chipsets on a motherboard: the keyboard controller and the
I/O controller.
Recent developments for the chipset include:
Combining north- and southbridge functions into a single chipset.
Moving the memory controller from the northbridge to the CPU itself to improve memory
access by the CPU.
Jumpers are electrical connection points that can be set to control devices and functions attached to
the motherboard. Some functions controlled by jumpers are:
Clearing the CMOS password
Clearing the CMOS settings
Jumpers Setting the CPU bus speed on the
motherboard
Enabling or disabling onboard components
Many functions previously performed by jumpers can now be configured in the CMOS or are
configured automatically.
When selecting and working with motherboards, a good place for information is the motherboard
documentation. Most motherboard documentation includes a diagram of the motherboard that
Documentation
identifies the components listed above and details any jumper settings. If you are missing the
motherboard documentation, check the manufacturer's Web site.
4|Page
Cisnet A+ 901 & 902 Study Guide
BIOS Configurations:
Boot Sequence:
POST – A major function of the BIOS is to perform a process known as a power-on self-test. It is a series of system
checks including the integrity of the BIOS, confirms the size of primary memory, hardware information, etc. Once the
POST has completed successfully, the BIOS selects the boot device and executes the master boot record (MBR) to load
the OS. Example of a BIOS boot screen is shown below.
From the ‘Main’ tab, use the keys to change the date/time settings, hardware components, to enable and disable the
devices (Hit ‘Enter’ to change the options).
Use the ‘Advanced’ settings to view the memory settings, configuration of other I/O systems, advanced chipset
controls, and also to change the clock bit rates.
The ‘Security’ sections allows to set or change the password for your system. The User password is used when you
login to the PC and Supervisor password is used to login to the BIOS settings. Any Intrusion detected can be notified
through the BIOS Security settings.
The ‘Power’ options let’s to change the CPU/MB temperature and CPU fan speed settings.
BIOS upgrade
To upgrade the firmware/BIOS, we need to identify the current BIOS version. This may appear when the system
starts (difficult to catch) or look into system Information (msinfo32 -> System summary -> BIOS Version/Date).
Get a copy of the current version (backup). Before the upgrade go through the upgrade documentation.
Make sure there is uninterrupted power supply to the system. Laptop should be connected to AC power and use UPS
power for the Desktop’s if possible.
Older systems may require a boot disk (floppy, CD-ROM), while modern upgrades run as an executable file. Close all
other applications before running.
Check for the prerequisites. Upgrade requires a reboot of the computer. Save your documents!!
UEFI BIOS
• Unified Extensible Firmware Interface
• Based on Intel’s EFI (Extensible Firmware Interface)
• Designed to replace the legacy BIOS
• Boot from large (> 2.2 TB), GUID partition table (GPT) disks
5|Page
Cisnet A+ 901 & 902 Study Guide
6|Page
Cisnet A+ 901 & 902 Study Guide
Processors (CPU):
When selecting a CPU, be aware that you will need to match the motherboard and the CPU. Either select a CPU
supported by the motherboard, or select a motherboard that will support the processor you have chosen. The following
table lists several considerations for choosing a processor:
Feature Description
Intel and AMD are the two producers of processors used in modern PCs.
Both Intel and AMD processors work in PC systems and support Windows software.
Intel has a larger market share, while AMD processors generally cost less.
Processor performance and special features vary between models and manufacturers.
Manufacturer
A 32-bit processor can process 32-bits of information at a time; a 64-bit processor can process 64-
bits of information. Over the last several years, processors have been moving from 32-bit processors
to 64-bit processors.
32-bit or 64-bit The biggest advantage of 64-bit processors over 32-bit processors is in the amount of
memory they can use. 32-bit processors have a limit of 4GB. 64-bit processors have a
theoretical limit of 16.8 TB, although operating system and current hardware limitations
impose a much lower practical limit.
Processors operate using an internal clock that is the same as, or is a multiple of, the motherboard
bus speed. The speed is represented in MHz and is also referred to as the frequency.
You can purchase processors of the same type but with different speed ratings.
Speed When selecting a processor, make sure the motherboard supports the processor speed by
reading the motherboard documentation first.
Most motherboards automatically detect the processor speed. If not, you might need to use
jumpers or edit the CMOS to configure the processor speed.
A multiple core processor has multiple processors within a single processor package.
Dual-core, triple-core, and quad-core processors are typical in desktop systems.
Multi-core
Multi-core systems enable the operating system to run multiple applications simultaneously.
Some motherboards use two (or more) processor sockets to provide a multiple process.
Cache is memory that the processor can access directly without using the system RAM. There are
Cache
three types of processor cache:
7|Page
Cisnet A+ 901 & 902 Study Guide
Level 1 (L1) cache is integrated on the
processor die itself and stores instructions
for the processor. On multi-core systems,
each processor typically has its own L1 cache.
Some processors might have two L1 caches,
one for instructions and one for data.
Level 2 (L2) cache is additional cache
used for both instructions and data.
Depending on the processor, L2 cache might
be shared between two or more cores, or
exclusive to a single core.
Level 3 (L3) cache is additional cache
beyond the level 2 cache. For multi-core
systems, L3 cache is shared between all
cores.
Hyper-threading is a feature of some Intel processors that allows a single processor to run threads
(instructions) in parallel, as opposed to processing threads linearly. Hyper-threading enables a
processor to execute two threads at the same time. For example, on a quad-core Intel system that
supports hyper-threading, the processor can execute 8 threads at a time (2 on each core). Hyper-
Hyper-threading
threading is not the same as multithreading. Multithreading is a feature of an application that
allows it to send multiple threads at the same time. Applications are typically written to support
multithreading to take advantage of multiple cores (executing threads on two or more processors at
the same time) or hyper-threading features.
Throttling is the process of modifying the operating characteristics of a processor based on current
conditions.
Throttling is often used in mobile processors to change the operating frequency to minimize
power consumption and heat output.
Throttling can also be used in low memory conditions to slow down the processing of I/O
Throttling
memory requests, processing one sequence at a time in the order the request was received.
Related to throttling, processors or the operating system can shut down unused cores in
multi-core systems to conserve energy.
Some Intel processors include a Turbo Boost feature. Turbo Boost, the opposite of throttling, allows
the processor to dynamically run above its rated speed to improve performance.
Mobile CPUs are used in notebook computers where portability and mobility are a concern. Special
Mobile processors
versions of processors are built to minimize power consumption and the amount of heat generated.
Virtualization allows a single physical machine (known as the host operating system) to run
multiple virtual machines (known as the guest operating systems). The virtual machines appear to
be self-contained and separate physical systems. Virtualization is performed by adding a layer
between the physical and the operating system. This layer acts as the hardware to the guest system.
Early virtualization was performed using software only. Newer virtualization uses special
instructions supported by the processor to improve performance.
Virtualization VMware is the most popular virtualization solution. Microsoft has several virtualization
products including Virtual PC, Virtual Server, and Hyper-V.
If you are planning on implementing a virtual solution, check to see whether hardware
support in the CPU is required. Hardware support is provided by processors with the following
features:
Intel's Virtualization Technology (VT)
AMD's AMD Virtualization (AMD-V)
In a traditional processor design, the processor is connected to the front side bus and the
Northbridge chip. The processor communicates with other system components through the front
Integrated memory side bus. Smaller manufacturing size has reduced the overall size of a processor, leaving more room
controller on the processor die for additional cores or cache. To improve performance, some processors include
the memory controller on the processor die rather than in the Northbridge chip, resulting in faster
memory access by the processor.
8|Page
Cisnet A+ 901 & 902 Study Guide
Processors require some form of heat dissipation system to function properly. Without a heat
dissipation system, a processor will overheat and burn out in less than a minute. Most modern CPUs
require a heat sink and a fan. Between the CPU and the heat sink, thermal paste or a thermal pad
helps in the transfer of heat from the CPU to the cooling unit.
Liquid cooling: Instead of air, liquid is used to cool the components. A coolant circulates on top of
the processor chip, and it then moves into a fan that is radiating out that heat. Same process that is
used in automobiles. This is usually used in high-end systems like gaming, graphics, etc.
Cooling
CPU Socket:
When choosing a motherboard, you need to ensure that the board is compatible with the system CPU that you intend to
use. Your motherboard has a socket that accepts the processor. The motherboard socket must match the socket type and
design used by the processor (in other words, when choosing a motherboard, make sure it matches the processor you
will use). Some motherboards support multiple processors and will have a socket for each one.
Processor sockets can be categorized according to how the processor makes contact with the leads in the processor
socket:
1. Pin Grid Array (PGA): PGA processors 2. Land Grid Array (LGA): The LGA socket
implement a series of pins on the moves the connecting pins from the
underside of the processor package in an processor package to the socket itself.
array. The pins are inserted into Conducting pads are implemented on the
corresponding receptacles within the bottom of the processor that contact the
processor socket on the motherboard. protruding pins from the processor socket.
Intel:
775: Used with the Intel Pentium 4, Celeron D, Intel Pentium 4 Extreme Edition, Pentium D, Pentium
Dual-Core, Core 2 Duo, Core 2 Extreme, Core 2 Quad, Xeon, and Celeron processors.
1155: Used with the Intel Pentium 4, Celeron, Core i3, Core i5, Core i7, Core i7 Extreme, and Xeon
processors.
1156: Used with the Intel Pentium 4, Celeron, Core i3, Core i5, Core i7, and Xeon processors.
1366: Used with the Intel Celeron, Core i7, and Xeon processors.
AMD:
940: Used with the AMD Opteron and Athlon 64 FX processors.
AM2: Used with the AMD Athlon 64, Athlon 64 X2, Athlon 64 FX, Opteron, Sempron, and Phenom
processors.
AM2+: Used with the AMD Athlon 64, Athlon 64 X2, Athlon II, Opteron, Phenom, and Phenom II
processors.
AM3: Used with the AMD Phenom II, Athlon II, Sempron, and Opteron processors.
AM3+: Used with the AMD Phenom II, Athlon II, Sempron, and Opteron processors.
FM1: Used with the AMD Athlon II processor along with the A-series APUs.
F: Used with the AMD Opteron and Athlon 64 FX processors.
9|Page
Cisnet A+ 901 & 902 Study Guide
RAM is a volatile memory and requires power to keep the data accessible, if power is lost all data contained in memory
is lost. When computer boots up, parts of the OS and drivers are loaded into memory, which allows the CPU to process
the instructions much faster, taking less time to bring your machine into operation.
200-pin SODIMM:
Notice the notch farther off center than the 144-pin SODIMM. You might also be able to notice
the higher pin density. 200-pin SODIMMs are used by DDR-2 and DDR-3 memory.
Memory Characteristics:
The best way to ensure you get the correct RAM for your system is to consult the motherboard documentation. When
selecting RAM, you will need to consider the following factors:
Characteristic Description
When you are purchasing RAM for a system, the most important
Packaging consideration is the packaging (or form). The packaging controls
(form) both the physical size of the memory module as well as the
memory standard (DDR, DDR2, etc.).
The capacity (sometimes called the size) refers to the storage
Capacity
capacity of the memory module (i.e. 256 MB, 512 MB, 1 GB).
For optimal performance, you should match the memory
frequency (sometimes called the speed) with the frequency
supported by the system bus/memory controller.
Memory frequency is equal to or is a multiplier of the
Frequency front side bus.
On many systems, you can edit the BIOS manually to
change the frequency.
When you mix memory with different frequencies, it will
operate at the lowest frequency.
10 | P a g e
Cisnet A+ 901 & 902 Study Guide
Another factor that affects performance of memory is the latency
associated with accessing data in RAM.
With a read request, there is a delay between the time
the data is requested and the time that the data is available
on the module's output pins. This delay is called the CAS
latency (CL).
For memory modules of the same type and frequency, a
lower CL number indicates less delay (i.e. "faster" RAM).
Because CL is related to the frequency, you cannot directly
CAS
compare the CL between modules with a different
latency/timing
frequency. For example, a DDR2 module operating at 533
MHz with a CL of 6 has more delay than a DDR3 module at
667 MHz with a CL of 7.
For many systems, you can manually modify the
memory timings and frequency. Running RAM at a lower
clock speed enables you to decrease the CAS latency setting;
increasing the frequency must usually be compensated for
by increasing the CL (and other) settings.
Some memory modules include error correction on the
module itself. Two different approaches are used:
With parity, a 1 or a 0 is appended to each byte
so that the total number of 1s is always either even
or odd. Parity methods can detect errors in only one
bit, but cannot fix them.
Using Error Correcting Code (ECC), a value is
appended to the end of each byte so that the value of
Error
the data can be compared and recalculated if an
Correction
error occurs. Error Correcting Code is an
improvement on parity techniques because errors in
more than one bit can be detected and corrected.
Modern systems simply use ECC for error detection
and correction.
Keep in mind the following facts about error correcting memory:
Memory modules with ECC have extra memory chips on
the module (typically 9 modules instead of 8). If the
number of chips is divisible by 3 or 5, the module is
likely ECC memory.
Because it is more expensive, ECC memory is typically
used only in servers.
ECC memory is slower than non-ECC memory.
Originally, double-sided RAM had modules on both sides of the
circuit board, and single-sided RAM had modules on only one
Single- or
side. However, you can also have double-sided RAM with
Double-sided
modules on only one side, where internally the memory is
divided into separate banks.
Installed in pairs, or trios for maximum
Multi-channel throughput. Memory combinations should match
Memory (colors), Dual-channel systems use two memory
controllers, while triple-channel systems use
three memory controllers. The memory controller
is in the Northbridge chip on the motherboard.
Newer processors move the memory controller
onto the processor chip
Expansion Cards:
Expansion slots provide a connection for a number of devices and functions. To add features to your computer, you can
typically add a peripheral card to an existing bus slot. The following table lists common expansion buses in a PC system:
11 | P a g e
Cisnet A+ 901 & 902 Study Guide
Slot Characteristics
PCI supports a 32- or 64-bit I/O bus.
PCI is plug-and-play, newly installed
devices can be detected & configured
automatically.
PCI buses are most commonly used for
Peripheral Component
devices such as sound cards, modems, network
Interconnect (PCI)
cards, and storage device controllers.
PCI slots are typically white. The PCI bus is usually
32-bits wide, although 64-bit versions were used as
well. Running at 33 MHz, it can transfer data at 133
MB/s (266 MB/s for 64-bit)
Small form factor computers, such as laptops or micro-ATX
systems, might include a mini-PCI slot. Mini-PCI devices are
Mini-PCI
small cards with either 100- or 124-pins. A typical use for a mini-
PCI slot is to add internal cards such as wireless cards to laptops.
PCI Express (PCIe) is a next generation I/O bus
architecture. Rather than a shared bus, each PCIe slot
links to a switch which prioritizes and routes data
through a point-to-point dedicated connection and
Peripheral Component provides a serial full-duplex method of transmission.
Interconnect Express Basic PCIe provides one lane for transmission
(PCIe) (x1), at a transfer rate of 250 MBps. It can also
provide multiple transmission lanes (x2, x4, x8, x16,
x32). Newer versions of PCIe:
Version 1: 250 MBps
Version 2: 500 MBps
Version 3: 1 GBps
Version 4: 2 GBps
AGP is similar to PCI, but designed specifically for
graphics support. Motherboards that provide AGP
support have a single AGP slot. AGP is commonly used
for video cards in modern computer systems, but has
been replaced by PCIe. AGP slots are typically brown.
Several different versions of AGP have been
implemented over the years:
AGP 1.0 1x: Runs at 66 MHz with a data
Accelerated Graphics throughput rate of 266 MBps
Port (AGP) AGP 1.0 2x: Runs at 66 MHz with a data
throughput rate of 533 MBps
AGP 2.0 4x: Runs at 66 MHz with a data
throughput rate of 1066 MBps
AGP 3.0 8x: Runs at 66 MHz with a data
throughput rate of 2133 MBps
12 | P a g e
Cisnet A+ 901 & 902 Study Guide
CNR is a riser card slot (not a bus) that allows for
Communications
inserting networking, wireless communication, sound,
Network Riser (CNR)
or modem functions.
Storage:
13 | P a g e
Cisnet A+ 901 & 902 Study Guide
more, depending upon the format)
Some of the disadvantages of optical discs are:
They are slower & have smaller capacity than hard disks
There are some compatibility issues between disc formats
and readers
Flash devices store information using programmable, non-volatile flash
memory. Common flash devices:
“ Compact Flash cards, MMC cards, SD cards, SDHC cards, Mini-SD cards,
Micro-SD cards, XD cards, Memory sticks, USB thumb drives.”
Some of the advantages of flash devices are:
The memory is re-programmable, They can retain content without
power, Are optimal for use in devices like cameras, They are highly
portable, They have a larger capacity than CDs and DVDs, They have
Flash devices
relatively fast memory access
Some of the disadvantages of flash devices are:
Their storage capacity is not yet comparable to the modern hard
disks
Different memory card formats require different readers
Tape drives (also called digital linear tape or DLT drives) store data on
magnetic tapes, similar to audio cassette tapes. Tape drives are most
commonly used for data backups, such as taking a backup of all hard drives
in a system. Some advantages of tape drives:
Tapes can typically store large amounts of data. DLT tapes range in
capacity from 10 GB to 800 GB per tape.
Tapes can be changed, allowing you to save data from different
sources on the same drive.
Tape drives Tapes are relatively inexpensive and small enough for long-term
storage.
Some disadvantages of tape drives:
Access to data on tape is typically slower than reading or writing to
other storage types, making them not well suited for instant, interactive
access.
Data must be read from tape sequentially. The tape must be cued to
the exact location on tape when data must be retrieved.
Storage device interfaces allow internal and external devices to interact with the storage device by providing an
interface through which information can be transferred. The most common storage device interfaces:
PATA (also called EIDE, IDE, and ATAPI) is a parallel ATA interface. ATA is
the standard interface for transferring data from storage devices such as HDD.
Used to be the most common interface for hard disks and CD/DVD
drives.
Parallel ATA Allows two devices per channel. Most modern motherboards include at
(PATA) least one built-in channel.
Uses parallel communication (devices share same data transfer
channel).
They have a maximum speed of 133 MB/s.
Because both devices share channel, devices must
be configured properly to avoid conflicts.
Jumper settings determine the connection as either master/slave/cable select.
15 | P a g e
Cisnet A+ 901 & 902 Study Guide
16 | P a g e
Cisnet A+ 901 & 902 Study Guide
arrays. To use RAID 5 on a client computer, you will need to use hardware or software RAID. The exact process you use
to configure RAID depends on your motherboard and/or controller card. The following steps are a typical method for
configuring software RAID included on many motherboards.
1. Install the RAID controller card and connect the drives to the controller. RAID arrays can use either
IDE or SATA disks based on the type of disk supported by the controller card.
2. If using an onboard RAID controller with SATA drives, edit the CMOS settings and identify the drive
type as RAID. This tells the system to load the onboard BIOS for accessing the connected drives.
3. Boot the computer. After the system BIOS loads, the RAID BIOS will load. Press the key combination
displayed to enter the RAID configuration utility (commonly Ctrl + F).
4. Within the configuration utility, define an array, add disks to the array, and identify the array type
(RAID 0, 1, or 5, etc.).
On some controller cards, you can
create a RAID 1 set using an existing disk (with
data) and a new disk. During the setup, data from
the first disk is copied to the second disk.
Some controller cards cannot create
mirrored drives using existing data on a drive. If
you use drives with existing data, that data will be
lost.
Some controller cards let you mirror
an existing drive, but only from a utility that runs
within the operating system.
When creating new RAID 0 and RAID
5 drives, all existing data on all disks will be lost.
5. Reboot the computer into the operating system and install the drivers for the RAID controller.
6. In Windows, the RAID array appears as a single disk with a partition already defined. Use Explorer or
Disk Management to format the partition and assign it a drive letter.
17 | P a g e
Cisnet A+ 901 & 902 Study Guide
Fiber communications
Uses light to send data between devices. With light we send photons and hence there are no
electrical RF signals.
This is secure, since it’s very difficult to monitor or tap.
Light degrades much slower than the electrical signal, hence data transmission is possible over longer
distances.
Immune to radio interference. There is no RF.
Types of fiber:
Multimode fiber:
Used for short range communications (Up to 2 km)
Inexpensive light source is used (LED)
Light takes different (multiple) paths from source to destination.
Singlemode fiber:
Used for long range communications (up to 100 km without re- generating that signal)
Uses expensive light source (Laser beams). Do not hold the light directly to your eyes.
The light takes a single path, unlike the multimode which takes multiple paths to the destination.
Twisted pair:
RJ-11 connector
Used in telephone connections.
This is a 6position, 2 conductor (6P2C) standard connection.
RJ-45 connector
8 positions, 8 connectors (8P8C)
Used for network connections (Ethernet).
18 | P a g e
Cisnet A+ 901 & 902 Study Guide
T568A and T568B termination
These are pin assignments from EIA/TIA-568-B standard.
This is for 8 conductor 100-ohm balanced twisted-pair cabling.
The T568A and T568B are different in pin assignments for 8P8C connectors.
Many organizations traditionally use 568B.
Can’t terminate one side of the cable with 568A and the other with 568B. It won’t work.
Remember the colors!!
Twisted pair
Most popular cabling type. It uses a balanced mode (two wires with equal (Transmit+/Receive+) and
opposite (Transmit-/Receive-) signals.
The twists keeps a single wire constantly moving away from the interference, resulting in reduced EMI.
Pairs in the same cable have different twist rates (number of twists).
Different types are:
STP (Shielded Twisted Pair):
Used in industrial environments and places where there is lot if EM interference.
It has additional shielding that protects from the interference.
Requires the use of an electrical ground.
Maximum distance follows the Ethernet standard.
Expensive.
UTP (Unshielded Twisted Pair):
No additional shielding, less expensive.
The most common twisted pair cabling
Maximum distance follows the Ethernet standard.
Plenum vs Non-Plenum
Plenum’ is the area above the ceiling, where all the air is going in & out from the cooling system.
19 | P a g e
Cisnet A+ 901 & 902 Study Guide
If both the air supply and air return in through the duct, then it is considered ‘non-plenum’.
If the air return is in to a common area inside the ceiling, then it is considered ‘plenum’.
A plenum rated cable has a cable jacket that goes around the twisted pairs. It is made up of either
PVC (Polyvinyl chloride) or FEP (Fluorinated Ethylene Polymer).
This makes the cable not as flexible and may not have the same bend radius.
The ‘riser-cable’ is used between-floor connections.
Co-axial:
BNC connector (Bayonet Neill-Concelman)
From this connector we can plug in cables like co-axial cable and Ethernet
(RG-58 used in 10BASE2).
Also used in sending high end video connections
F-connector
Commonly used in cable television (RG-6/U).
Connects to the back of the television or cable modem.
Coaxial cables
Used for WAN, cable networks, etc.
It refers to two or more forms that share a common axis.
Used in older Ethernet networks (10Base5 “Thicknet” (500m), 10Base2
“Thinnet” RG-58 (185m)).
Commonly used in television/digital cable (broadband internet RG-56).
RG-59 is used for short distance video.
Characteristics of TCP/IP
IP Address
IP address isn’t really a single address.
It is a combination of a network ID and a host ID.
The subnet mask determines which part of the IP address belongs to the network portion and which part is the
host portion.
The subnet mask is just as important as your IP address.
Classful subnet
20 | P a g e
Cisnet A+ 901 & 902 Study Guide
128.0.0.0 to 191.255.255.255
B 255.255.0.0 172.16.0.0 to 172.31.255.255
192.0.0.0 to 223.255.255.255
C 255.255.255.0 192.168.0.0 to 192.168.255.255
224.0.0.0 to 239.255.255.255
D N/A
240.0.0.0 to 255.255.255.255
E N/A
21 | P a g e
Cisnet A+ 901 & 902 Study Guide
TCP/IP Addressing
To communicate both inside and outside the network, every device needs a unique IP address.
Requires a subnet mask. It is used by the local workstation to determine what subnet t’s on.
The subnet mask isn’t usually transmitted across the network.
You’ll ask for the subnet mask all the time.
Default gateway - e.g., 192.168.1.1, the interface on the router that allows you to communicate outside of
your local subnet.
It must always be an IP address on the local subnet.
Common TCP & UDP ports
TCP (Transmission Control Protocol)
Connection-oriented. Before any TCP related information is sent from one station to another, both of those
stations have to synchronize themselves and create a connection between them. At the end of the connection, there
is a teardown process that terminates that connectivity.
Reliable delivery. Acknowledge is sent for all the TCP packets.
Can manage out-of-order messages or retransmissions.
Slower due to big header size and lot of processing.
22 | P a g e
Cisnet A+ 901 & 902 Study Guide
Protocols:
Protocol Description
HTTP is used by Web browsers and Web servers to exchange files (such as Web pages)
through the World Wide Web and intranets. HTTP can be described as an information
HyperText Transfer
requesting and responding protocol. It is typically used to request and send Web documents,
Protocol (HTTP)
but is also used as the protocol for communication between agents using different IP
protocols. HTTP uses port 80 by default.
HyperText Transfer HTTPS is a secure form of HTTP that uses SSL as a sublayer for security. SSL secures
Protocol over Secure messages being transmitted on the Internet. It uses RSA for authentication and encryption.
Socket Layer or HTTP Web browsers use SSL (Secure Sockets Layer) to ensure safe Web transactions. URLs that
over SSL (HTTPS) begin with https:// trigger your Web browser to use SSL. HTTPS uses port 443 by default.
FTP provides a generic method of transferring files. It can include file security through
usernames and passwords, and it allows file transfer between dissimilar computer systems.
File Transfer Protocol
FTP can transfer both binary and text files, including HTML, to another host. FTP URLs are
(FTP)
preceded by ftp:// followed by the DNS name of the FTP server. To log in to an FTP server,
use: ftp://username@servername. FTP uses ports 20 and 21 by default.
Simple Mail Transfer SMTP is used to route electronic mail through the internetwork. E-mail applications provide
Protocol (SMTP) the interface to communicate with SMTP or mail servers. SMTP uses port 25 by default.
IMAP is an e-mail retrieval protocol designed to enable users to access their e-mail from
Internet Message
various locations without the need to transfer messages or files back and forth between
Access Protocol
computers. Messages remain on the remote mail server and are not automatically downloaded
(IMAP)
to a client system. IMAP uses port 143 by default.
POP3 is part of the IP protocol suite and used to retrieve e-mail from a remote server to a local
Post Office Protocol 3
client over an IP connection. With POP3, e-mail messages are downloaded to the client. POP3
(POP3)
uses port 110 by default.
Telnet allows an attached computer to act as a dumb terminal, with data processing taking
place on the IP host computer. It is still widely used to provide connectivity between
Remote Terminal
dissimilar systems. Telnet can also be used to test a service by the use of HTTP commands.
Emulation (Telnet)
You should avoid using Telnet as it transmits all data, including usernames and passwords
clear text. Telnet uses port 23 by default.
SSH allows for secure interactive control of remote systems. SSH is much more secure
Secure Shell (SSH)
alternative to Telnet. SSH uses port 22 by default.
SFTP addresses one of the key weaknesses of FTP; namely, FTP doesn't use encryption. All
data, including user names and passwords, is sent clear text. SFTP provides the same
Secure FTP (SFTP)
functionality as FTP, but secures the data transmissions using the SSH protocol. SFTP uses
port 22, the same port used by SSH.
23 | P a g e
Cisnet A+ 901 & 902 Study Guide
DNS is a system that is distributed throughout the internetwork to provide address/name
resolution. For example, the name www.mydomain.com would be identified with a specific
IP address. DNS uses port 53 by default.
Remote Desktop RDP allows you to view and use the graphical desktop of a remote computer system as if you
Protocol (RDP) were sitting in front of it. RDP uses port 3389 by default.
DHCP is used to dynamically assign IP addressing information to network hosts when they
come online. The client system, when it connects to the network, broadcasts a
Dynamic Host DHCPDISCOVER message on the network, looking for a DHCP server. The DHCP server
Configuration Protocol responds with a DHCPOFFER message containing proposed IP addressing configuration
(DHCP) information. The client then responds with a DHCPREQUEST message to the DHCP server
indicating it wants to use the proposed configuration. The DHCP server makes the assignment
with a DHCPACK message. DHCP uses ports 67 and 68.
Lightweight Directory LDAP is a protocol used to access information about network resources stored by a directory
Access Protocol service, such as Active Directory or eDirectory. LDAP uses ports 389 (clear text) and 636
(LDAP) (secure).
SNMP is used to monitor and manage network devices. SNMP agents can be installed on
Simple Network network devices such as PCs, switches, and routers. These agents send data to an SNMP
Management Protocol manager application running on an administrative workstation, which aggregates the
(SNMP) information and displays an overview of the current network status. Thresholds can be
configured which trigger alerts if exceeded. SNMP uses ports 161 and 162.
SMB enables the sharing of folders and printers on the network. Using SMB, remote users can
Server Message Block access files in a shared folder on a server or workstation. Likewise, a remote user can send
(SMB) print jobs to a shared printer. SMB is also known as Common Internet File System (CIFS).
SMB uses ports 137, 138, and 139.
Wireless networking (802.11) is managed by the IEEE Standards Committee (IEEE 802).
Standard
Specification
802.11a 802.11b 802.11g 802.11n
5.75 GHz (U- 2.4 GHz 2.4 GHz
Frequency 2.4 GHz (ISM) or 5.75 GHz (U-NII)
NII) (ISM) (ISM)
Maximum speed 54 Mbps 11 Mbps 54 Mbps 150, 300, or 600 Mbps
Maximum range 150 Ft. 300 Ft. 300 Ft. 1200 Ft.
Channels 5.75 GHz--23 (12 or 6)
23 (12) 11 (3) 11 (3)
(non-overlapped) 2.4 GHz--11 (3 or 1)
24 | P a g e
Cisnet A+ 901 & 902 Study Guide
designed to provide wireless connections with the same security as wired connections. WEP has
the following weaknesses:
Static Pre-shared Keys (PSKs) are configured on the access point and the client and
cannot be dynamically changed or exchanged without administration. As a result, every host
on large networks usually uses the same key.
Privacy (WEP) Because it doesn't change, the key can be captured and easily broken. The key values are
short, making them easy to predict.
When using WEP, use open authentication. Using shared key authentication with WEP
uses the key that is used for encryption for authentication as well. This use exposes the
key to additional attacks, making WEP more susceptible to being compromised.
WPA is the implementation name for wireless security based on initial 802.11i drafts and was
deployed in 2003. It was intended as an intermediate measure to take the place of WEP while a
fully secured system (802.11i) was prepared. WPA:
Uses TKIP for encryption.
Wi-Fi Protected
Supports both Pre-shared Key (referred to as WPA-PSK or WPA Personal) and 802.1x
Access (WPA)
(referred to as WPA Enterprise) authentication.
Can use dynamic keys or pre-shared keys.
Can typically be implemented in WEP-capable devices through a software/firmware
update.
WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications
and was deployed in 2005. It is built upon the idea of Robust Secure Networks (RSN). Like WPA,
it resolves the weaknesses inherent in WEP, and is intended to eventually replace both WEP and
WPA. WPA2:
Wi-Fi Protected Uses Advanced Encryption Standard (AES) as the encryption method. It is similar to and
Access 2 (WPA2) or more secure than TKIP, but requires special hardware for performing encryption.
802.11i Supports both Pre-shared Key (referred to as WPA2-PSK or WPA2 Personal) and 802.1x
(referred to as WPA2 Enterprise) authentication.
Can use dynamic keys or pre-shared keys.
WPA2 has the same advantages over WEP as WPA. While more secure than WPA, its
main disadvantage is that it may require newer hardware for implementation.
25 | P a g e
Cisnet A+ 901 & 902 Study Guide
WEP is not an appropriate option.
Check your devices. Not all of them may allow for the highest
encryption type.
Configuring NAT
Port Forwarding
Port Triggering
24x7 access to your internal network may not be a good solution. There is a method to setup dynamic access to
the services called port triggering.
There is a trigger when that particular link is made and the access is made from the outside.
Internal client communicates externally on a particular port (file transfer, game, etc.). Port is open only when
triggered.
Only one person can port trigger at a time. Multiple users must use port forwarding.
26 | P a g e
Cisnet A+ 901 & 902 Study Guide
SSID (Service Set Identifier)
Uniquely identifies a wireless network. Usually a recognizable name.
BSSID – Basic SSID. The MAC address of the access point. Not usually seen by the end-user. No configuration
changes are normally required for the BSSID.
SSID is often configured to broadcast. It makes it easy for the devices to find/connect to the network.
The SSID broadcast can also be disabled, which then becomes invisible to most of the people. This is
also referred to “hidden SSID”.
“Hide SSID” is not a security measure, free software tools are available to identify the SSID.
IP Addressing
Options available to turn on/off DHCP (Automatic) IP addressing and Manual IP addressing.
IP addresses are easy to see in an unencrypted wireless network.
If the encryption is broken, the IP address will be noticeable.
WPS (Wi-Fi Protected Setup)
Lot of different options available for configuring encryption settings on a wireless router.
We can just push a button on the wireless router or punch in a PIN number that is co-related to that wireless
router and it would allow users to secure access to the wireless network.
There are significant security issues associated with this. It’s easy to brute force the PIN.
Since this is a default setting, get into the router and disable the router’s PIN. Always disable the WPS to make
sure no one gets access to your private network.
Cable Modem
We put data on the cable network. The standard associated with this is DOCSIS (Data Over Cable
Service Interface Specification).
This is the standard set of protocols and methods used by the cable modem that takes data off of that cable and
provides it over the Ethernet connection.
Advantage: High-speed networking (4 Mbps through 100 Mbps).
It provides multiple services – Data, voice
DSL (Digital Subscriber Line)
Commonly used DSL is ADSL (Asymmetric DSL) the download speed is faster than the upload speed
(symmetric).
It uses telephone lines for data communication.
Disadvantage: Distance limitation (~10,000 foot limitation from the data office). The farther the distance,
slower the connectivity.
Speed: 24 Mbps downstream, 3.5 Mbps upstream.
27 | P a g e
Cisnet A+ 901 & 902 Study Guide
SDSL (Symmetric DSL) never got standardized due to technical problems.
However, VDSL (Very High Bitrate DSL) was an improvement with speed of 4 Mbps through 100 Mbps.
Dialup
Still some use modem to communicate to the internet. Modems use the standard phone lines and connect just
how we dial a phone number.
Very slow throughput – 56 Kbps. With compression of data, it can provide up to 320 Kbps.
It is difficult to find a modem of this type nowadays.
Fiber
Advanced high speed internet connection through fiber optics.
Lot of bandwidth available to run video, voice and data over the connection.
The providers give data storage in the cloud up to 1 TB.
Satellite networking
Communicating from a ground station (computer) to a satellite and then back again.
High cost compared to terrestrial networking.
5 Mbps download and 1 Mbps upload speed.
Mostly helpful in remote sites and difficult-to-network sites.
Disadvantage: High latency (delay) – 250 ms up, and 250 ms down.
High frequency is used – 2 GHz and suffers due to poor line-of-sight, and rain fade.
ISDN (Integrated Services Digital Network)
Legacy connectivity technology still used.
Two types: BRI (Basic Rate Interface) used commonly at home or business. There are two 64 kbps bearer (B)
channels providing 128 kbps and one 16 kbps signalling (D) channel.
PRI (Primary Rate Interface) is used in larger environment, delivered over a T1 (23B+D) in US and E1
(30B+D) in Europe. Commonly used as connectivity from the PSTN to large phone systems (PBX).
Cellular Networks
Internet provided through cellular networks by mobile devices.
Geographic location is divided into “cells”. Antenna coverages a cell with certain frequencies.
2G network – GSM (Global System for Mobile Communications) and CDMA (Code Division Multiple
Access). It gives poor data support.
LTE and HSPA+: Next generation technology developed through collaboration between telecommunications
organizations.
LTE (Long Term Evolution), is based on the GSM/EDGE networks with download rates of 300 Mbps and
upload speed of 75 Mbps.
HSPA+ (Evolved High Speed Packet Access) is based on CDMA with download speed of 84 Mbps and upload
speed of 22 Mbps.
Network Types
LAN (Local Area Network)
Devices connected within a building or group of buildings.
Provides high speed connectivity provided by Ethernet (802.3) and wireless (802.11) access.
WAN (Wide Area Network)
Spanning the globe, or the neighborhood, which generally connects LANs across a distance.
Generally, slower than LAN.
Many different WAN technologies – PPP (Point-to-Point), MPLS, Frame Relay, etc.
PAN (Personal Area Network)
Your own private network provided by Bluetooth, IrDA, and Wi-Fi.
28 | P a g e
Cisnet A+ 901 & 902 Study Guide
Commonly used in automobiles, connecting mobile devices to the audio systems, Mobile phones with
headset, printers and health related uses.
MAN (Metropolitan Area Network)
A network in your city which is larger than LAN, and often smaller than WAN.
Now moving towards Metro Ethernet.
Network Topologies:
Useful in planning a new network trying to determine the best way to connect the devices together.
Also used in troubleshooting purposes.
Mesh
Ring
Bus
Star
Used in most large and small networks.
All devices are connected to a central device.
Switched Ethernet networks (Switch/hub in the middle)
Hybrid
Combination of one or more physical topologies.
Most networks are hybrid.
Network Devices
Hub
Used before the advent of switches. It is a multi-port repeater.
Traffic going on port is repeated to every other port.
Layer-1 device and half-duplex.
Replaced old bus topology with star based topology.
Became less efficient as network speeds increased and not used today.
Speed: 10 Mbps – 100 Mbps.
29 | P a g e
Cisnet A+ 901 & 902 Study Guide
Switches
Layer-2 device and full-duplex.
Bridging done in hardware through ASIC (Application Specific Integrated Circuit)
Contains many number of ports.
Distributes traffic based on MAC address.
Provides high bandwidth.
Routers
Layer-3 device and connects two different network types (LAN, WAN, Fiber, etc.)
Routes traffic between IP subnets. Routers inside of switches sometimes called “layer-3 switches”.
Highly intelligent, but slower than switches.
WAP (Wireless Access Point)
Not a wireless router. This is a single device that provides wireless connection.
Similar to a hub (half-duplex and works at layer-2)
WAP is a bridge, it extends the wired network onto the wireless network.
Bridge
Connects different physical networks.
Can connect different topologies. Layer-2 device that distributes traffic based on MAC address.
Many bridges these days are wireless.
Modem
Modulator/De-modulator. Converts analog sounds to digital signals.
Requires modem on both sides of connection.
Uses standard phone lines (limited frequencies, limited bandwidth)
Firewalls
Filters traffic by port number.
OSI layer-4 (TCP/UDP). Some firewalls can filter through layer-7.
Can encrypt traffic into/out of the network. Helps in protecting your traffic between sites.
Provides proxy traffic, which is a common security type.
Most firewalls can be layer-3 devices (routers) which usually sits on the ingress/egress of the network.
VoIP
A normal phone connected to the networks that can do much more.
It has built-in browser, multimedia, etc.
Provides voice and video communications and has a built-in camera.
Internet appliance
Many capabilities (switch, router, firewall, access point, QoS, DHCP server, security services, etc.)
built into one device.
One single device to take care of all the needs.
30 | P a g e
Cisnet A+ 901 & 902 Study Guide
Punch-down tools
To fasten all the wires in infrastructure into a single wiring block. We can use that block to
cross connect them to other wires that might be going somewhere else.
It can be tedious process. Every wire must be individually punched.
It trims the wires during the punch and it’s a very efficient process.
Mobile Devices
Laptops Hardware & Components:
Laptop Expansion options
31 | P a g e
Cisnet A+ 901 & 902 Study Guide
There were type I, II and III cards which referred to
the thickness of the cards.
It is now referred as PC Card.
Update to this card type is CardBus. They allowed much
higher throughput and it is backward compatible with
PCMCIA.
ExpressCard
Laptop Displays
32 | P a g e
Cisnet A+ 901 & 902 Study Guide
LCD
Most of the laptop displays are LCD.
Advantages: lightweight, relatively low power consumption, and inexpensive.
Disadvantages: No dark blacks, requires separate backlight. Any issues with the backlight is difficult to replace.
OLED (Organic LED)
Emerging technology on mobile devices. It uses chemicals that then produces light with different colors.
Advantages: No backlight required, great picture quality, thin and portable with fast refresh rates and low power
consumption.
Disadvantages: Expensive.
Plasma
Beautiful and very accurate color.
It requires a lot of power. LCD’s draw 25%-30% of battery power and plasma would draw even more.
Wi-Fi antennas
Multiple antennas found on the display. There are two separate antenna wires.
Bluetooth antenna is also inside the device.
Antenna wires wrap around the laptop screen since it’s up high.
Backlight & inverter
LCD display needs a backlight. The florescent lamps run on AC power.
Behind the laptop screen, there are inverters that convert the DC current to AC current.
Laptop features
Some features on laptop work little bit different. The function ‘fn’ keys help in performing some
additional functions.
Laptop display – We can plug into an external monitor or an LCD projector. In those cases we can do screen
duplicate, extend or projector only functions using the ‘Toggle’ function keys.
W
ireless control – Helps in controlling wireless signal. If wireless signal is not required, there is a special switch to be
able to enable/disable the wireless connection. If there is no physical switch on the laptop, use a function key.
W
e can also enable/disable the Bluetooth functionality.
V
olume settings are integrated to the keyboard.
S
pecial function keys are to help control the backlight.
L
aptops can be connected to a docking station/port replicators to connect outside devices of the laptop.
D
ocking station allows to add additional full size desktop adapter cards (PCI/PCIe).
33 | P a g e
Cisnet A+ 901 & 902 Study Guide
P
ort replicator doesn’t provide the above feature, but helps in extending existing laptop interfaces. It
avoids cable issues.
P
hysical laptop locks – keep your laptop from walking away. Connect the strong cable to a solid object.
Applications must be written to run on tablet devices based on the operating system & system
Apps architecture. App distribution is provided online by platform
a. iOS: AppStore, b. Android: Android Market, c. MS: Windows Store
Lightning
• Apple proprietary
• 8-pin digital signals
Bluetooth
• High speed communication over short distances
• PAN (Personal Area Network). Connects our mobile devices like Speakers, Headphones,
Smart Watches, Automobile & phone integration, Health & fitness devices
IR (Infrared)
• Included on many smartphones, tablets,
and smartwatches
• Control your entertainment center
Hotspot / tethering
• Turn your phone into a WiFi hotspot
• Dependent on phone type and provider
• May require additional charges and data costs
35 | P a g e
Cisnet A+ 901 & 902 Study Guide
36 | P a g e
Cisnet A+ 901 & 902 Study Guide
Printers
Laser Printers
Commonly used printer. It is a complex piece of equipment that uses laser beams with a lot of power, creating
charged ions, powdered ink and paper.
Advantages: Very high quality print, fast printing speeds.
Disadvantages: Very complex due to many moving parts, requires on-printer memory, and it tends to get very
messy inside.
Imaging drum
It is the heart of the printer. This is a photo-sensitive drum
usually contained within the toner cartridge.
Should not be exposed to light. Laser hits on this, which then
allows to pick up the toner and place it onto the paper.
Fuser assembly
At the end of the printing process, heat and pressure is applied
on the paper to make the image permanent. This heat and
pressure is coming from the fuser assembly.
Transfer belt
Used in color laser printers where the process is bit more complex.
There are different toner cartridges with different colors along with something called transfer belt.
This belt is responsible for taking all of the colors from all of the toner cartridges and putting all the
colors at one time.
It then does a single transfer from the belt to the paper.
Pickup rollers
In the printer paper tray, there is a little piece of rough rubber responsible for picking up the paper and
pulling it into the printer.
If this gets dirty, loses its ability to grip the paper (due to wear and tear), then it just needs
to be replaced.
Usually some additional pickup rollers are provided by the manufacturer.
Separation pad
Located inside the paper tray, that works along with the rollers to grab a single piece of paper to feed it into
the printer.
Very small and not easy to identify quickly. It may also go under wear and tear, hence requires to be
replaced.
Duplexing assembly
Process to make printing on both sides on a laser printer, we need a
printer with duplexing assembly.
It is responsible for taking the paper and turning it over to print it on the
other side too.
Processing
Before the laser printer can start the printing process, it has to build an image of the entire page that needs to be
printed.
Laser printer does not print little page at a time. It prints an entire page at a time.
37 | P a g e
Cisnet A+ 901 & 902 Study Guide
There are specific languages that these laser printers can understand. The printer drivers are responsible for
taking the word processing/graphics document and converting it into the language that is specific to that printer.
The printer then has to interpret it and build out that page.
Commonly used languages are Adobe Postscript (PS), HP Print Command Language (PCL), Microsoft
XML Page Specification (XPS), etc.
Imaging Process
1) Processing
Once the laser printer is ready to print, it receives the document to be printed and converts it into a
bitmap raster image. The photosensitive drum starts spinning.
2) Charging
The primary corona (also called primary corona) prepares the photosensitive drum for writing by
causing it to receive a negative electrostatic charge. Depending on the printer, the primary corona will be wires
or rollers.
3) Exposing
A laser beam changes the charge on the surface
of the drum in a pattern of page’s image.
4) Developing
The developing roller applies roller to the
drum. The toner sticks to the charged areas on the
drum.
5) Transferring
The transfer corona (also called secondary corona) charges the paper to attract the toner.
6) Fusing
Fusing rollers attach the toner to the paper by pressing and melting it through the help of heat and pressure. As the
paper leaves the printer, a static eliminator strip removes the static charge from the paper.
7) Cleaning
The toner cartridge includes a photosensitive drum. In preparation for a page, a rubber blade wipes any
loose toner off the drum and a fluorescent lamp (discharge lamp) removes any electrical charge.
Inkjet Printers
Often referred as ink-dispersion printers.
Relatively inexpensive technology compared to laser printer.
They are very quiet.
Provides high-resolution images.
Expensive ink since most of the ink cartridges are proprietary. The ink will
eventually fade away and they are not permanent.
The ink can clog (dries up) easily near the print head which requires some cleaning process.
They come in different colors like black, cyan, magenta and yellow.
Combination of these four colors can give variety of different colors.
Easy to replace these cartridges.
Print head is also a part of the cartridge. Hence we replace the print head
whenever we change the ink cartridge.
The rubber paper feed roller may subject to wear and tear, hence needs to be
replaced for better performance.
It has a duplexing assembly to print pages on both sides automatically.
Carriage and belt – another important moving part inside the printer, used to move the cartridge back and forth
across the paper.
Calibration – Usually a program that can be run on the printer that can print out few examples to make sure
how the printer prints. By this we can make some minor changes to how the colors and text look on the paper.
Thermal Printers
38 | P a g e
Cisnet A+ 901 & 902 Study Guide
Uses heat to create an output on the paper.
Usually uses white paper, and by adding heat to it, it turns black on the areas
where the heat has been applied.
Very quiet, usually seen at the point of sale. Inexpensive.
It is very sensitive to light and heat.
Generally designed for printing receipts. Hence the paper is not wider. There is still a small paper
feed assembly.
There is a heating element inside the printer that is responsible for hating up the paper.
This uses a very special kind of paper called thermal paper, which has been treated with chemicals
39 | P a g e
Cisnet A+ 901 & 902 Study Guide
Impact printers
It’s a dot-matrix printer.
Good for carbon/multiple copies.
Low cost per page. Ink is relatively cheap.
Very noisy.
Poor graphics – we use tiny pins to create the output on a page.
Printer head – there are 9-pin and 24-pin types.
Printer ribbon – this ribbon keeps constantly moving back and forth attached to
the case. Inside the case, there are lot more ribbons that are saturated with ink. The ribbon will rotate a
number of times until the output gets faded.
Tractor feed – these printers use different kind of paper (uses holes to move the paper). Usually the papers are
very long.
Installing & Configuring printers
Printer Drivers
Printers require appropriate drivers to work with the operating system, so that they can
communicate properly with each other. It controls how the printer processes the print job.
Drivers are specific to printer model and OS. Windows 7 and Windows Vista use different drivers.
Drivers have very important information in them, which could define
o What printer language it uses?
o Type of paper trays
o Different colors that are supported
o Font specifications and many other options.
Wired Printer
If connecting to a wired printer, there are number of different interfaces.
Serial – When computers send data serially, they send it 1 bit at a time. The bits stand in a queue, waiting to
get in. The point-of-sale printers use serial connection. Not commonly used on desktop or laptop computers.
Parallel – This connection sends 8 bits at a time over eight separate wires (1 for each bit). It’s faster
than serial connection and these are legacy connectors to our computers.
USB – Commonly used connection from the computers.
Ethernet – Printers have in-built NIC and ROM based software that allow them to communicate on the
network with multiple workstations and servers. It is a centralized connection. Easy to share with a print server. It
uses a RJ-45 connection.
Wireless Printer
IrDA (Infrared Data Association) – Legacy method. Requires proper line-of-sight.
Bluetooth – Printer should be enabled with Bluetooth. It is used generally in PAN that replaces the slow-
speed wires. It provides throughput of 1 Mbps to 3 Mbps.
802.11 – Very common wireless connection type. This comes as built-in in many printers.
Printer Sharing
Printers can be shared on the network. Check the sharing tab of the printer in Windows OS.
Windows XP – Control Panel -> Printers and Faxes -> Right-click Printer -> Properties -> Sharing.
Windows 7/Vista – Control Panel -> Devices and Printers -> Right-click Printer -> printer Properties ->
Sharing.
40 | P a g e
Cisnet A+ 901 & 902 Study Guide
Printer maintenance
Laser Printer
Requires regular replacement of toner cartridges. Often get a message on the display saying “Toner is
Low”. It doesn’t necessarily mean we need to replace it, but still be able to print few more copies.
The toner cartridge also contains the OPC drum (Organic Photo Conductor) which is very sensitive to light. Take
careful precautions with the drum being exposed to light.
Before you start working inside the printer, make sure it is powered off. Remove the packing strips
from the new drum while replacing it with the old one.
Laser printers wear out by time. They have a lot of moving parts and produce high heat and pressure.
Hence manufactures come up with printer maintenance kit with the spare units for replacements.
When to perform the printer maintenance? – Check the printer’s page counter. After the maintenance, reset the
counter.
Printer Calibration – Sometimes, different toner cartridges print with different densities (dark/light).
Then the printer requires calibration which allows you to adjust the right kind of density needed. This could be
an automated process or may require some manual adjustment.
Check the printer manual.
Cleaning – They get very dirty mainly due to the toner dust. Check the manufactures recommendations to clean.
You can use either water, or isopropyl alcohol (IPA) for rollers, but do not use any harsh chemicals. Use damp
cloth to clean outside the printer. Do not use a vacuum cleaner.
Thermal printer
Maintenance is relatively a simple and inexpensive process for thermal printers.
Since it requires a very specific paper type, make sure you get the right kind and right size of the paper. Always
have many in stock.
The paper replacement process is very simple.
Cleaning – To clean the heating element it is recommended to use a liquid cleaner pen like Isopropyl alcohol
(IPA). Check for manufactures recommendations. Some may require to use cleaning cards to clean the head and
paper pathways.
Usually paper bits may get inside, so use a small blower to take these bits outside.
Impact Printer
These printers often use single ribbon, which is a self-contained into a single cartridge. It is easy to remove and
replace these cartridges.
Replace when ink becomes too light.
Print head – It undergoes a lot of wear and tear since it directly hits the ribbon and paper continuously. It may
also get hot. They are very easy to replace.
While replacing the print head, it is also best time to replace the ribbon.
Paper replacement – Paper must feed perfectly into holes and without any constraint. Careful attention is
needed while positioning the forms.
41 | P a g e
Cisnet A+ 901 & 902 Study Guide
System Implementation:
If you are purchasing a new computer or building a new computer, you need to ensure that the hardware
you select can accomplish the work that will be expected of it. In most organizations, a "one-size-fits-all"
approach to selecting computing hardware simply won't work. You need to evaluate the job role of the
user who will use the system and then create a list of specifications that will ensure the hardware can
fulfill that role. Observe the following recommendations for each computing role:
Graphics design or CAD/CAM workstation:
o Select the most powerful processor that you can afford. Graphics and CAD/CAM
applications require a great deal of processing power. A 64-bit multi-core processor should be the
minimum processor considered.
o Implement a high-end video adapter. Graphics and CAD/CAM applications require a
great deal of video processing.
o Implement the maximum amount of RAM supported by the motherboard in dual- or
triple-channel mode.
Audio/video editing workstation:
o Select the most powerful processor that you can afford. Audio and video editing
applications require a great deal of processing power. A 64-bit multi-core processor should be the
minimum processor considered.
o Implement a high-end video adapter with dual displays. Audio and video editing
applications require extensive video processing and screen real estate.
o Implement a high-end audio adapter and speaker system.
o Implement a very large and very fast hard disk drive. Audio and video editing
applications require extensive disk space and speed. You may want to consider using an SSD drive
instead of a traditional hard disk.
Virtualization workstation:
o Virtualization hosts require extensive RAM and CPU processing power. Each virtual
machine running on the system must share the system processor and RAM; therefore, you need to
implement the maximum amount of RAM supported by the motherboard in dual- or triple-channel
mode.
o A 64-bit multi-core processor should be the minimum processor considered. You may
want to consider a system with multiple processors.
Gaming system:
o Gaming applications require a great deal of processing power. A 64-bit multi-core
processor should be the minimum processor considered.
o Gaming applications can cause the systems processor, RAM, and video adapter to
generate excessive heat. You should implement a high-end cooling solution to dissipate this heat.
o Implement a high-end video adapter with a GPU. Gaming applications require a great
deal of video processing.
o Implement a high-end audio adapter with a surround-sound speaker system.
Home theater system:
o Implement a high-end audio adapter with a surround-sound speaker system.
o Implement a video adapter with a TV tuner and HDMI output.
o To save space, you may want to select a system that uses the Home Theater PC (HTPC)
compact form factor.
42 | P a g e
Cisnet A+ 901 & 902 Study Guide
43 | P a g e
Cisnet A+ 901 & 902 Study Guide
The backlight in LEDs instead of florescent. This is still an LCD, but an LED-backlit LCD display.
LED technology can be implemented in many ways. One way could be LEDs around the edges of
the screen and there is a diffuser inside of the display that evenly distributes that light
throughout the entire back.
Another way is an entire array of LEDs not just around the edges, but throughout the entire back
of the display. This gives the display more control of lighting and darkening certain areas to
make those blacks lit bit darker when required.
New technology is the Organic LED. This uses an organic material that lights up when current is
provided. It is cheaper, power efficient, wider viewing angle and fast response time mostly used
in mobile devices.
Plasma Display
Another type of modern display. It contains tiny little cells in the display and these cells have
noble gas and mercury inside them.
When voltage is provided, the cells creates a plasma that then the mercury sends out a ultra-
violet light. The UV light then strikes a color phosphor, that is present on each one of those cells,
and this phosphor glows a particular color on the display.
Phosphor provides deep blacks, and very good color representation. They use lot of power and it
doesn’t work at high altitudes and they also put out a lot of radio interference.
Digital Projectors
They take information on one screen and project them on a wall. Tey are not always LCD.
They get very bright. The bulb inside gets very hot. When turned off, the fan is still on to ket the
bulb cool off.
Display Specifications
Display resolution - This is regardless of the type of display being used. This is represented by pixels
(width x height).This is actually the pixel dimension and not the screen size.
Native resolution – An important specification in LCD displays. The number of pixels doesn’t
change. Hence LCD displays has to adjust themselves to look best when the video settings match a
display’s native resolution. A mismatch can cause distortion. Some letters may look thin and some may
look fat. If the display resolution needs to be changed, try to use a mutiple of the native resolution.
Example, 1600x1200 is the same as 800x600.
Display brightness – to get a very clear view of what gets displayed. One measure to look at is
Luminance, candela per square meter (cd/m2). The more the number, the brighter the image is.
Analog vs. digital – The way the siganl is sent from the comouter to the display device. Analog video
is sent as a continuous signal. A long analog video cable may result in some lost signal. Example, VGA
video with DE-15 interface.
Modern monitors used digital video signals. DVI (Digital Visual Interface) port or an HDMI (High-
Definition Multimedia Interface) port can provide this.
44 | P a g e
Cisnet A+ 901 & 902 Study Guide
Display filters – Privacy filter is used for security reasons. They fade the screen
to black or gold when viewed at an angle. Usually placed on front of the display.
Anti-glare – With the glossy monitors, reflective screens are common. These filters
reduces the glare and improve viewing.
Multiple displays – To connect more than one display for flexible work
environment. Easy to move between the screens when used as extending the
desktop where each display is independent. We can mirror a desktop while
presenting information to a group of users.
Display Port
It is a standard from Video Electronics Standard Association (VESA).
The data is sent in packetized form, which is like data sending through
the Ethernet and PCIe. It is compatible with HDMI and DVI.
RCA
Used since 1940s, commonly referred to a photo connector.
It is very commonly used for Composite video. Composite video uses a single link (bright yellow)
along with a audio link.
RCA interfaces are also used to send Component video. There are three RCA connectors for this.
MiniDIN-6
45 | P a g e
Cisnet A+ 901 & 902 Study Guide
S-Video (Separate Video) used for analog videos used on the legacy devices.
It has 2 channels. One for the intensity and second for the color.
RJ-45 connector
Video sent over the Ethernet.
The KVM (Keyboard, Video, and Mouse) signals are sent to any devices in the environment.
Troubleshooting Theory
Troubleshooting a problem
Identify the problem
Information gathering – Get as many details as possible. What is the specific error message?
Identify the symptoms – may be more than a single symptom.
Questioning the user(s) – best source of details.
Determine if anything has changed recently – Who is in the wiring closet?
Establish a plan of action to resolve the problem and identify potential effects.
Build a plan – Correct the issue with a minimum of impact. Identify potential effects (every
plan can go bad, have plan B, or plan C.
46 | P a g e
Cisnet A+ 901 & 902 Study Guide
Escalate as necessary
47 | P a g e
Cisnet A+ 901 & 902 Study Guide
48 | P a g e
Cisnet A+ 901 & 902 Study Guide
49 | P a g e
Cisnet A+ 901 & 902 Study Guide
Windows 7
Released in 2009 and it was a successor to Windows Vista.
There are 6 editions. Home - Win 7 Starter, Win 7 Home Basic (specially designed for few geographical
locations), Win 7 Home Premium, and Win 7 Ultimate, Work - Win 7 Professional, and Win 7
Enterprise.
Windows Starter – Basic version. Built for netbooks (small portable computers with no advanced
graphical capabilities or high end processors. No DVD playback (b’cse netbooks do not have DVD
players) or Windows Media Center, No Windows Aero (b’cse no advanced graphics), No ICS (Internet
Connection Sharing), No IIS Web Server, and No enterprise technologies (domain connection,
BitLocker, EFS encryption). It’s only a 32-bit version, with maximum of 2 GB RAM.
Windows 7 Home Premium – The “consumer” edition. Commonly used version allowing DVD
playback, Windows Aero, ICS, and IIS Web server. No enterprise technologies (domain connection,
BitLocker, EFS encryption). It provides 64-bit version of OS which supports 16 GB of RAM and 2
physical processors.
Windows 7 Ultimate – loaded with all the features. Supports domain support, Remote desktop, and
EFS and BitLocker. 64-bit version supports 192 GB of RAM. Same features as Windows Enterprise
(only available through volume licensing) built for home users alone.
50 | P a g e
Cisnet A+ 901 & 902 Study Guide
Windows 7 Professional – For business environment which does not require all the capability. Same
features as Windows 7 Home Premium, but it can connect to Windows Domain and administrate that
device through AD, supports remote Desktop Host, and EFS. BitLocker cannot be used. 64-bit version
supports 192 GB of RAM.
Windows 7 Enterprise – Sold only with volume licenses (only for very large organizations). Supports
Multilingual User Interface packages, BitLocker Drive encryption, and UNIX application support.
Windows 7 Editions
Modern UI
• Microsoft’s common user interface, formerly known as the Metro UI, A combination of typeface,
graphical style, and animation
Pinning
• Put application icons on the task bar for quick and easy access, Available in Windows 7 and Windows
8/8.1, Right-click application and “Pin this program to taskbar”, Or touch and hold and “Pin to taskbar” in
Windows 8/8.1
Microsoft OneDrive
• Formerly known as SkyDrive or Live Folders, Sync files in the cloud - store pictures, Office 365
documents, Integrated with Windows 8/8.1
Windows store
• Curated list of Windows apps, Central point for Modern UI apps, Sales pages for independent developers
Multi-monitor taskbars
• Separate monitors can have different taskbar settings, define where taskbar buttons are shown,
• Define how buttons are combined
Charms
• Shortcuts available at any time - Search, share, settings, etc. Use keyboard, mouse, or touch,
• Windows + C, Mouse on bottom or top right corner, Swipe from right edge towards the center
51 | P a g e
Cisnet A+ 901 & 902 Study Guide
Start screen
• Tiled set of applications - The Modern UI, Dynamic information without launching individual
applications
PowerShell
• Command line for system administrators, extend command-line functions with cmdlets (command-lets)
• Automate and integrate system administration
Windows Features
Operating System technologies
32-bit vs 64-bit
Processor specific - relates to the processor used within the computer. The OS should ideally
match the processor type.
Hardware drivers are specific to the OS version (32-bit/64-bit)
Shortcut: 32-bit (x86), 64-bit (x64)
To run 64-bit application, we need 64-bit OS, while 32-bit cannot support them. However, 32-bit
applications can run on 64-bit OS.
52 | P a g e
Cisnet A+ 901 & 902 Study Guide
Windows will put the applications in different places of the hard drives.
32-bit apps: \Program Files (x86)
64-bit apps: \Program Files
Windows Aero
Windows Vista and 7 had enhanced graphics
functionality called Windows Aero. It is removed in
Windows 8.
It allows you to have a graphics front end that gives
transparency to the window for graphical view of the
applications. But it requires at least 1 GHz processor, 1
GB of RAM and 128 MB graphics card. It enhanced UI
and switching between applications
BitLocker
Allows you to encrypt entire volumes of data (not just a single
file). It protects all your data as well as the OS. Used in Vista and
7 – Ultimate and Enterprise edition.
Data is always protected, even if the drive is moved from one computer to another.
Volume Shadow Copy
It’s a Windows feature, which allows you to back up your data on the system, even though you are
using the programs and have the files open. Normal backup programs doesn’t allow to backup when
the files are in use.
Volume Snapshot Service (VSS) allows you to do this.
It provides “Previous Versions” tab, to backup multiple versions files
and folders on the hard drive. This feature is available in Vista
Business, Enterprise, Ultimate and all versions of Windows 7.
Versions are automatically created once a day, or when backup or
installer runs the application.
System Restore
Taking the computer back to a previous configuration. It is designed
to create a restore point, when you install a program or make any
configuration change to the PC, and if anything goes wrong, you can
get back to the previous settings.
Not designed to protect from a virus or malware infection. They
infect the restore function as well.
It doesn’t modify user data files.
Windows XP: Start -> Control Panel -> System -> System Restore.
Win Vista & 7: Start -> All Programs -> Accessories -> System Tools -> System Restore.
53 | P a g e
Cisnet A+ 901 & 902 Study Guide
Compatibility mode
While migrating from an old OS to a new OS version, we are
concerned about running the old applications in the new OS. With
the help of the Compatibility mode, we can assign a certain OS
functionality to an application.
It’s like your OS emulating another OS to run the outdated
applications.
This can be configured only per-application. If an application
doesn’t run on the new OS, get into the properties of that app and
select the right OS.
Windows XP Mode
With Win 7 Professional, Enterprise, and Ultimate, we can run
Win XP application in a virtual system or PC that is running Win
XP within the Win 7.
To use this, we need Win XP SP3 (which is fully licensed) on
Win 7. This is integrated into the OS and runs Win XP apps on
the Win 7 desktop.
54 | P a g e
Cisnet A+ 901 & 902 Study Guide
Administrative Tools
To work on the options on your OS. Start -> Control Panel -> Administrative Tools.
It is not exclusive to the administrators.
Few functions are in Read-Only mode (Computer Management, Services, Memory Diagnostics, etc.)
Windows Defender
This is a free version of Anti-malware program to make our data secure and protected that comes with
Win Vista and 7. Win 8 includes Anti-virus tool as well.
Windows updated Microsoft Security Essentials to include Anti-virus for Win Vista and 7, and once
installed, they disable Windows Defender.
It provides real-time protection. It also integrates with IE (scan files during download) to provide
better security.
Windows Firewall
It’s a security feature that protects from attacks across the networks.
Integrated into the OS. Start -> Control Panel -> Windows Firewall.
Security Center
Vista has ‘Security Center’ in the Control Panel, later changed to ‘Action Center’ in Win 7 and 8.
Provides central security overview of the PC (Anti-virus, Anti-spyware, Automatic updates, etc.)
It is a useful security portal (troubleshooting) and a recovery guide.
Event Viewer
Lot of things happening behind the screen like, different services,
applications performing various processes. One common place to
look for all of the event is the Event Viewer.
It separates these events into different categories such as
Application, Security, Setup, and System.
It also provides information about various severities like
Information, Warning, Error, Critical, and Successful/Failure
Audit.
Control Panel -> Administrative Tools
55 | P a g e
Cisnet A+ 901 & 902 Study Guide
56 | P a g e
Cisnet A+ 901 & 902 Study Guide
Note: Windows 7 Anytime upgrade cannot upgrade to Win 7 Enterprise edition (for very large
organization).
Upgrading to Windows 8
57 | P a g e
Cisnet A+ 901 & 902 Study Guide
58 | P a g e
Cisnet A+ 901 & 902 Study Guide
59 | P a g e
Cisnet A+ 901 & 902 Study Guide
b) Extended – If more than four partitions are required, then we go for the Extended. Inside the
extended partition we can have as many partition as possible. One extended partition per hard
disk (optional). Cannot boot from a logical partition that exists within the extended partition.
c) Basic –It can have primary & extended partitions with logical drives. Data cannot be spanned
across multiple partitions. If you need to increase the size of the basic disk volume, the only way
to do it is to remove the data, create a new larger partition and put the data back.
d) Dynamic – Span multiple disks to create a larger volume. Win 2000, XP, 2003/2008 Server,
Vista Enterprise/Ultimate/Business, 7 Enterprise/Professional/Ultimate support this storage.
Need dynamic partitioning to split data across physical disks (striping), and duplicate data across
physical disks (mirroring).
File Systems
Before data can be written to the partition, it must be formatted.
OS must be written to understand the file system that we use. If you are
using, MS and Linux, then we need to choose file system that is
common to both. FAT and FAT32 can be used in such scenario. Some
OS can read (and perhaps write) multiple file system types. Example,
Windows can use FAT, FAT32, and NTFS.
FAT (File Allocation Table) – One of the first PC-based file system.
Updated version is FAT32, which is native to Windows 2000 and newer. It
allows up to 2 TB volume sizes, with a maximum file size of 4 GB.
NTFS – Introduced since Windows NT. It has extensive improvements
(file compression, encryption, symbolic links, large file support, security
and recoverability.
CDFS (Compact Disk File System) – It’s an ISO 9660 standard. Interoperability between file systems,
CDFS is very common. This can be put into a UNIX or a Linux system, a Mac or a Windows system, and
all these can read the disks without any problem.
Quick format vs Full format
In Windows Vista and 7 this option is not available, we need to go to the cmd line to do it, else it does a
quick format. Quick format – wipes data from the drive, since it doesn’t check for any bad sectors. Full
format – wipes data from the drive, goes sector by sector to check the disk for any bad sectors. It is time
consuming process, but a good option.
The networking part of the OS asks for Workgroup vs. Domain setup (Home vs. Business). Make sure the
time/data/region/language settings are correct. Make sure all the necessary drivers are loaded, software
and hardware are updated. Factory Recovery partition needs to be created for future use.
Network Command Line tools
IPCONFIG – Most of the troubleshooting starts with IP address. Ping your local gateway to check the
connectivity. Ipconfig gives the IP information, and adapter details.
Ipconfig /all – additional details
Ipconfig /release – release the DHCP lease
Ipconfig /renew – renew the DHCP lease
Ipconfig /flushdns – Flush the DNS resolver cache
PING – To test reachability between devices. It determines the round-trip time. Uses ICMP. Common
troubleshooting tool. Ping –t is used for continuous ping.
TRACERT – Determine the route a packet takes to reach the destination. Maps the entire path. Uses
ICMP TTL Exceeded error message method. The time in TTL refers to hop counts, not seconds or
minutes. When TTL is 0, the packet is dropped and the router sends a message. Router must be
60 | P a g e
Cisnet A+ 901 & 902 Study Guide
configured to send this message. Not all devices will reply with ICMP time exceed message. Some firewalls
filter ICMP, also ICMP is low priority for many devices.
NSLOOKUP – Lookup information from DNS servers. We can find IP addresses, canonical names, cache
timers, etc. It helps in looking up names and IP addresses. DIG is another advanced option than nslookup,
but not included in Windows.
NETSTAT – To gather network statistics. Netstat –a shows all active connections (incoming & outgoing)
on our computer. Netstat –b shows binaries (actual programs that are using provide this communication).
Netstat –n removes the name resolution information.
NBTSTAT (NetBIOS over TCP/IP) – To troubleshoot Windows networking features. Used to query
devices that use Windows NetBIOS language to determine how it can be configured to do Windows
networking. We can query local and remote devices.
NET – Windows network commands. Command-line view instead of graphical. It has many different
capabilities such as connect to share, view connections, start and stop services.
OS Command Line tools
Windows always has a built in ‘Help’ function.
DISKPART – Powerful command line tool, it affects management configuration of the disks and the
volume on those disks. Also able to create and remove partitions. Format different volumes or erase
information, hence need to be careful with this command.
FORMAT – Formats a disk for use with Windows. C:\>format <drive>. Need to be careful while
executing this command.
CHKDSK – Check disk command. CHKDSK /f – checks for the errors with the file system and fixes
those. CHHDSK /r – if the issue is with physical drive itself, it locates bad sectors and recovers readable
information. Check disk starts when the system is booted up.
MD/CD/RD – Make directory, Change Directory, Remove
Directory.
DIR – lists files and directories inside the current folder.
DEL – removes a file from a directory or disk. Also called erase.
COPY – copy files and move them different place on a storage
medium. /a – copy an ASCII file, /v – verifies that new files are
written correctly. /y – supresses prompting to confirm you want
to overwrite an existing destination file. C:\Users\Logs>copy /a
{source file} {destination}
XCOPY – copies more than one file and an entire directory trees
to another directory.
ROBOCOPY – Robust copy, an ultimate copy command. This is a part of Windows resource kit, not part
of Win XP, included with Vista and 7. Used mainly to copy files from the network. If the network
connection fails, it waits till the connection gets restored to copy the remaining.
TASKLIST & TASKKILL – Manage tasks from the command line. No Task Manager required.
TASKLIST displays the list of tasks/processes currently running. Can be used on both local and remote
machine. TASKKILL is to terminate any process by process id (PID) or image name.
SFC – If the Windows is not starting up properly, or if there is any malicious application or program that
may have changed Windows system files then we can use SFC. Scans integrity of all protected system files.
SHUTDOWN – Shutdown a computer and optionally restart. Shutdown /s /t nn – wait nn seconds then
shutdown. Shutdown /r /t nn – shutdown and restart after nn seconds.
Windows Recovery Console
Very powerful troubleshooting tool. Allows you to go to the OS and change the file system, without
actually starting the Windows. It is also a very dangerous tool. It gives a complete control to fix the issues
before the system starts. It can copy, rename, or replace OS files and folders. Enable/disable services,
repair the file system boot sector or the MBR. Create and format partitions on drives.
MBR – The first sector of the boot disk. Not located in partition. It knows about all of the disk partitions
and location of the active bootable partition (volume boot record). Problems with MBR will result in error
loading OS, missing OS, invalid partition table.
Administrative
Computer Management - A pre-built MS Management Console. It has a lot of utilities, Events, user
accounts, storage management, services, etc. (Start -> Control Panel -> Administrative Tools -> Computer
Management or ‘devmgmt.msc’ from the command line)
Device Manager – Windows doesn’t know how to talk directly to most hardware. OS use device drivers
to make the hardware to work. It is the middleman. There are different versions of device drivers that
61 | P a g e
Cisnet A+ 901 & 902 Study Guide
depends on the OS type (driver for XP will not work with Vista or 7). Also the 32/64 bit OS makes a
difference. To install new drivers, download from the manufacturer website directly. Most drivers require
‘Administrator’ access. Some drivers are not ‘unsigned’. Signed drivers are certified by Microsoft (tested in
Microsoft labs).
Users and Groups
Users login to Windows through username and password. The credentials determine which kind of users
they are. There are two kinds of users. Administrator, who has all the control access. Guest user which is
commonly disabled (for security reasons), with limited access to the OS. Everyone else are ‘Regular’
users.
Groups – Sets permissions for large sets of people at one time and built into the OS. Inside the Groups, we
can assign Administrators, users, backup operators, power users, etc. who can perform certain functions.
Local Security Policy – In small companies, standalone computers are not managed through AD. The
security for these devices can be achieved through the local security policy which are local for themselves.
This is not available in Home editions, but seen in Professional, Ultimate and Enterprise edition. (Start ->
Control Panel -> Administrative Tools -> Local Security Policy)
Performance Monitor – Gathers long-term OS metric statistics for troubleshooting (control Panel ->
Administrative Tools). Example, CPU utilization, disk, memory, etc. Able to set alerts and automated
actions. Able to store the statistics information to analyze long-term trends.
Services – there are number of programs running on the background that doesn’t require any user
intervention and they are running services. It can be an Anti-virus program, File indexing, etc. Useful
when troubleshooting the startup process, since many services startup automatically. To use from the
command line ‘net start’ and ‘net stop’. Control Panel -> Administrative tools -> Services or services.msc)
System Configuration (msconfig) – To troubleshoot the system startup process, use this utility to look
into the boot process to know what applications are starting up. In Windows XP only command line can
be used.
Task Scheduler – To perform some tasks at some time of the day automatically. This works in Windows
Vista/7 with predefined schedules (click & go). Windows XP doesn’t provide the predefined service. There
are also folders to organize the schedule tasks. In Windows XP it is called ‘Scheduled Tasks’, and Windows
Vista/7 it is Task Scheduler’.
Component Services – For the developers who use the COM (Component Object) model. Allows you to
build applications for large environments. If you want the device to act as a server in this COM+
environment then you use the Component Services. There is an Event viewer and Services view built in to
this.
Data Sources – For developer who creates application, then you need these applications to
communicate with the database, then you use something like ODBC (Open Database Connectivity). There
are lot of independent applications and different OS existing. With ODBC this differentiation doesn’t
matter. This is a translation that occurs between your application and the database. You don’t have to
write an application to use any particular kind of DB, we can simply have our application use ODBC to
talk to different DB that we use. Users probably won’t need to use this option.
Print Management – To administer and centralize all the print services. Share printers from one
central console to get the status and updates of all the printers). Also we can add and manage printer
drivers (central management of 32 and 64-bit drivers). Windows XP – Control Panel -> printers and
Faxes. In Windows Vista/7 – Control Panel -> Administrative Tools -> Print Management.
Memory Diagnostics – To troubleshoot bad memory. Sometimes we can get automated notification or
we can launch manually. It goes through all the memory processes to try finding a bad chip/module.
Included with Windows Vista and 7 (inside the Administrative tools). There are Basic, Standard and
Extended tests available.
Windows Firewall – We use stateful firewalls. Firewalls can understand the conversations going
through them. Control Panel -> Windows Firewall. Basic settings allows to set some fundamental firewall
rules. This is based on the applications and no detailed control is required. Either allow all traffic or deny
all traffic. No connection security rules based on IP address. Windows Firewall with Advanced Security
allows to configure inbound/outbound rules, connection security rules (IP address and port numbers) for
granular filtering.
Task Manager – It provides real-time system statistics like CPU, memory and dick access information.
Ctrl+Alt+Del -> select Task Manager, Right click the task bar -> Task Manager. Also use Ctrl+Shift+Esc.
Disk Management
62 | P a g e
Cisnet A+ 901 & 902 Study Guide
Allows to configure and manage all of the storage devices that are connected to the OS. We can see the
status of the drive, mount/extend/split the partitions, assigning drive letters, add new drives, etc. Control
Panel -> Administrative Tools -> Computer Management -> Disk Management.
Migration Tools
You would have customized your computer settings for specific application configuration, specific
documentation, bookmarks. When you move from one computer to another, we should not lose these
settings. Sometimes there is no direct path to upgrade (Windows XP to 7). Also used in migrating from
one computer to another. We can do either a Side-by-
side or wipe-and-load migration. Early migration tools
was ‘File and Settings Transfer Wizard’ to migrate
from Windows 95, 98, ME, NT 4.0, 2000, XP and
Server 2003 to Windows XP. This is replaced by
Windows Easy Transfer. Migrate from Windows XP,
Vista or 7 (to a newer computer). In larger
organizations we use Windows Automated
Installation Kit (AIK) which works at the command
line.
Command Line Utilities
These are couple of options for starting the applications. One is through the menus in the Windows OS
and find the applications, also we can start the application from the Run line. In Windows Vista and 7 it is
integrated into the command prompt. Few of the main application shortcuts are:
CMD (command Prompt), REGEDIT (The Windows Registry) will take into the ‘Registry Editor’ which
is a huge master database displayed in hierarchical structure, used by almost everything like kernel,
device drivers, services, user interface, applications, etc.
SERVICES.MSC – to launch the Windows services which is used for
troubleshooting the startup process.
MMC (Microsoft management Console) – It is a framework that allows
you to build own management frontend for the Windows OS. It uses
‘’snap-ins’’ to create a modular display. The MMC command starts an
empty MMC view that allows you to customize as you like.
MSTSC – To start the Microsoft Terminal Server Client, also called
Remote Desktop Connection (to access a desktop on another computer or a Terminal server).
NOTEPAD – to view and edit text files.
EXPLORER – to access the file system, use this option (Windows Explorer). From here we can view,
copy or launch files.
MSINFO32 – To get more information about the Windows system. We can see hardware resources
(memory, etc.), components (multimedia, video/audio card, network cards, etc.) and software
environment (drivers, print jobs, running tasks, etc.).
DXDIAG (DirectX Diagnostic Tool) – For additional troubleshooting, it allows to manage the DirectX
installation. DirectX is a multimedia API (Application programming Interface) for 3D graphics, audio,
input options. A very good diagnostic tool that helps to listen to
the audio coming from the system.
63 | P a g e
Cisnet A+ 901 & 902 Study Guide
Local user accounts are stored on individual devices and in larger organizations we have domain accounts
using active directory. We can customize the account name and type, modify password, change picture,
and certificate information.
Folder Options
Manage Windows Explorer.
General – folder options (open in same/new window, window page single/double click options)
View – granular control of how to view inside your Windows.
Search – define search options.
System
Provides computer information (hardware, processor, OS version, system ratings, RAM, etc.)
Name and Workgroup/Domain details
OS product ID
Security Center
Windows Vista. “Action Center” in Win 7 and 8.
Central security overview. Makes sure Anti-virus, automatic updates and security patches are up
to date.
Power Options
Helps in managing power use (laptop batteries).
Control over hardware (display, storage, hibernate automatically, turn off monitor, etc.)
Windows Vista Control Panel options
Tablet PC settings
Special configuration options for tablet computers
Handedness (left/right)
Handwriting recognition with stylus (automatic learning)
Display orientation (portrait/landscape)
Pen and Input devices
Pen options (single tap, double tap, etc.)
Change pointer options (visual feedback, cursors)
Offline files
General – enable/disable offline files
Disk usage – limit storage
Encryption – protect offline files
Network – work offline when network is slow
Problem reports and solutions
Windows try to solve the problem by itself. Problems are automatically identified. Windows will
check for the solution.
Printers
Faxes has been removed. Can be installed separately.
Manage and control printers
Windows 7 Control Panel options
Homegroup
Easily share information (Windows 7/8), can share documents, picture, music, video, etc.
A network for home (must be set to “Home” in Windows)
Enable homegroup (share the password with everyone)
Action Center
Consolidated view of alerts (security, maintenance)
Monitor Windows update, firewall, Anti-virus, Anti-malware
RemoteApp and Desktop Connections
Run applications remotely (looks like they run locally), these applications are configured on the
server through remoteApp manager service.
Troubleshooting
One-stop shop for troubleshooting (hardware and software)
Separated by categories (hardware, internet, securities, etc.)
Diagnostics (simple check)
Windows Homegroup
Allows Windows 7 and 8 users to easily share information (documents, video, pictures, music,
etc.)
Network must be set to “Home”
64 | P a g e
Cisnet A+ 901 & 902 Study Guide
65 | P a g e
Cisnet A+ 901 & 902 Study Guide
Scheduled backups
• Time Machine - Included with Mac OS X, Hourly, daily, and weekly backups
• Starts deleting oldest information when disk is full
Image recovery
• Build a disk image in Disk Utility, creates an Apple Disk Image (.dmg) file
• Mount on any Mac OS X system, appears as a normal file system & use the restore feature in Disk utility
Terminal
• Command line access to the operating system, manage the OS without a graphical interface, run scripts,
manage files, configure OS and application settings
Force Quit
• Stop an application from executing, Command-Option-Esc - List application to quit
• Hold the option key when right-clicking the app icon in the dock - Choose Force Quit
Mac OS Features:
Mission Control and Spaces
• Quickly view everything that’s running, Spaces - Multiple desktops & Add Spaces inside of Mission
Control
Keychain
• Password management - Passwords, notes, certificates, etc. integrated into the OS - Keychain Access
• Passwords and Secure Notes are encrypted with 3DES, Login password is the key
Spotlight
66 | P a g e
Cisnet A+ 901 & 902 Study Guide
• Find files, apps, images, etc. - Similar to Windows search, Magnifying glass in upper right or press
Command-Space, type anything in & define search categories in System Preferences / Spotlight
iCloud
• Integrates Apple technologies - Mac OS, share across systems - Calendars, documents, contacts, etc.,
Backup iOS devices - Never lose data again, Store files in an iCloud drive - like Google Drive & Dropbox
Gestures
• Extend the capabilities of your trackpad, use one, two, three fingers - Swipe, pinch, click
• Customization - Enable/disable
Finder
• The central OS file manager - Compare with Windows Explorer, File management - Launch, delete,
rename, etc., Integrated access to other devices - File servers, remote storage
Dock
• Fast access to apps - Quickly launch programs, View running applications - Dot underneath the icon
• Keep folders in the dock - Easy access to files, Move to different sides of the screen - Auto-hide or display
Boot Camp
• Dual-boot into Windows on Mac hardware - Not virtualization, Requires Apple device drivers - Windows
natively on Intel CPU, everything is managed through the Boot Camp Assistant
67 | P a g e
Cisnet A+ 901 & 902 Study Guide
System updates
• Command line tools - apt-get, yum, Graphical update managers - Software updater
• Patch management - Updates can be scheduled, Software center - The Linux “App Store”
Driver/firmware updates
• Many drivers are in the kernel - updated when the kernel updates, Drivers are managed with software
updates or at the command line
68 | P a g e
Cisnet A+ 901 & 902 Study Guide
Anti-virus/Anti-malware updates
• Relatively few viruses and malware for Linux, ClamAV - Open source antivirus engine
• Same best practice as any other OS, always update signature database & provide on-demand scanning
Image recovery
• Not as many options as Windows, dd is built-in to Linux (and very powerful)
• Other 3rd-party utilities - can image drives like GNU Parted, Clonezilla
Terminal
• Command line access to the Linux OS, Run scripts, manage files, Configure OS and application settings
69 | P a g e
Cisnet A+ 901 & 902 Study Guide
Screen sharing
• Many options, like most of Linux, may be included with your distribution, UltraVNC & Remmina
Disk maintenance
• Linux doesn’t require a lot of maintenance
• Clean up log space - All logs are stored in /var/log
• File system check - done automatically every X
number of reboots
Closing programs
• Use terminal - sudo for proper permissions
• sudo killall firefox
• Graphical kill - kill <pid>
70 | P a g e
Cisnet A+ 901 & 902 Study Guide
cp - Copy a file
• cp SOURCE DEST
71 | P a g e
Cisnet A+ 901 & 902 Study Guide
72 | P a g e
Cisnet A+ 901 & 902 Study Guide
• > vi script.sh
• Insert text - i <text>
• Exit insert mode with Esc
• Save (write) the file and quit vi - :wq
The hypervisor
• Virtual Machine Manager, Manages the virtual platform and guest operating systems
Resource requirements
• CPU Processor Support - Intel: VT, AMD: AMD-V
• Memory - Above and beyond host OS requirements
• Disk space - Each guest OS has it’s own image
• Network - Configurable on each guest OS
Hypervisor security
• Hypervisor is a sweet spot for the bad guys, VM escaping, Malware recognizes it’s on a virtual machine
• Malware compromises the hypervisor & jumps from one guest OS to another
Network requirements
• Most client-side virtual machine managers have their own virtual (internal) networks
• Shared address - VM and host shares the same IP address
• Bridged address - The VM is a device on the physical network
• Private address - The VM does not communicate to the outside
Basic Cloud Concepts:
Software as a service (SaaS)
• On-demand software - No local installation, Central management of data and applications like Google
Mail
73 | P a g e
Cisnet A+ 901 & 902 Study Guide
Google Android
Google started the Android, but it is maintained by Open Handset Alliance.
Open-source OS, based on Linux.
Supported by many different manufacturer’s devices.
Apple iOS
Apple only OS, used in iPhones, iPad OS
Not an open-source and completely proprietary, based on Unix
Exclusive to Apple products.
Irrespective of the different types, there are number of similarities between them. Example, icons on the
screen which can be launched different applications, click and move around interface.
Apple iOS has a ‘Home’ button at the bottom. These OS are very graphical and a lot of interface is
happening through the finger.
Production & development models
Android – Apps are developed on Windows/MAC OS X/ Linux with the Android SDK.
Once the apps are created, you can make them available for download or sale on online service
called ‘Google Play’.
Apps are also available from third-party sites (Amazon App Store).
Installing an Android application from outside of Google Play, it is referred to ‘’Side Loading’’.
iOS – Apps are developed with iOS SDK on MAC OS X.
Apps must be approved by Apple before the release.
Apple apps are available only from the Apple App store.
Device displays
Calibration – Older touch screens required periodic calibration. Modern capacitive touch
screens do not require calibration.
Accelerometer – motion sensor to know if you are holding the device in portrait mode or in
landscape mode. It detects through the gravity.
Gyroscope – apart from knowing the position of the device, it also detects pitch, roll, and yaw
for multi-axis motion sensing (games).
GPS – over 30 satellites currently in orbit. To get the precise navigation, need to see at least 4
satellites. With the four satellites, we can determine location based on timing difference
(latitude, longitude and altitude).
Wireless Networks
Mobile devices can connect to the network using either Wi-Fi or cellular. Options available to
enable and disable them independently. Airplane mode disabled wireless connections to save
battery power.
Android – ‘Wireless & network settings’
iOS – Settings -> General -> Cellular
Bluetooth is another option for devices to connect to PAN to share the files. Coverage is 10
meters. Able to connect to different devices like mouse, keyboard, headset, computer,
automobile, etc. Once paired, devices can work together. Connect & disconnect automatically.
Bluetooth pairing process – Enable Bluetooth on both devices (Settings -> Bluetooth). Set
devices to discoverable mode (may require key sequence on Bluetooth device). Select
74 | P a g e
Cisnet A+ 901 & 902 Study Guide
discovered device (many devices may appear). Enter or confirm the PIN (should be the same
on both devices). Test the connectivity.
Configuring Email on Mobile devices
Retrieving mail messages
POP3 (Post Office Protocol 3)
Used for downloading mail to the local mail client.
Downloads and deletes from the server.
IMAP (Internet Message Access protocol)
Access mail on a server.
Mail is still stored on a server. No deletion of emails after it is downloaded.
Network ports
The network ports are defined by the mail service provider.
SSL Settings
Option to encrypt the information inside the mail. Useful mainly in
wireless networks while connecting to the hotspots and hotel networks.
Microsoft Exchange
These are the mail accounts that we use at work (Enterprise email). One
common tool is MS Exchange.
It is more than just email. It gives an option to sync and integrate your
contacts, calendars, and reminders by integrating with the mobile device
database.
You need some configuration options to configure this. You will be given
this from your network administrator. The information that you may require are email address,
server name or IP address, domain name, password, etc. This is then integrated with AD
database.
Gmail
Another popular mail service from Google is Gmail. This is tightly
integrated with Android.
It can be accessed through a web browser, but it can also be downloaded
using POP3, and IMAP.
This can also integrate with Google Calendar, where our meeting requests
and reminders work together with the Calendar.
Options available to integrate the notes created in iOS with the Gmail.
Changes can be made only on the iOS and this will be reflected on the
Google server.
Security Best Practice:
Passcode locks – helps in restricting access to the devices unless the passcode is known. Choose a pin or
add complexity with other forms. Failed attempts – iOS has an option to erase everything after 10 failed
attempts. Android has an option to lock the device and require a Google login.
Locator applications and remote wipe – To help in getting the device back when you lose it. It has a
built-in GPS and location “helpers”. It helps in finding your phone on a map through network
triangulation. You can make it to play sound and make a noise. Also you can let the device to wipe off the
data completely if you are unable to find it.
Remote backup – Data on the phone needs to be backup, in case if it is lost.
Unfortunately, it is difficult to backup the data from wireless mobile devices. One of
the common ways to backup these data is to use the cloud technology. There is a
constant backup button to let it backup automatically whenever required. This
process doesn’t require any wire to be connected. Use can use the existing available
network. With the new device you can restore the complete information by just one
click.
Antivirus – Apple iOS is a closed environment and tightly secured. Malwares need
to find another vulnerability to attack. Android is more open, and their apps can be
downloaded from anywhere which makes easier for the malwares to find a way in.
The applications run in a “Sandbox”, which do not have complete access to the OS,
unless you allow the access.
Patches/OS updates – Helps in keeping the bad guys out. All devices including mobiles requires
updates. Manufactures provide updates and patches if there are any security problems or any other bugs
in the OS. Make sure to update your mobiles always.
75 | P a g e
Cisnet A+ 901 & 902 Study Guide
Security
Physical Security Techniques
Hardware locks – Conventional (lock and key), electronic lock (keyless), Token-based (magnetic
swipe card), Biometric (fingers), Multi-factor in enterprise (smart card and PIN).
Tailgating – use someone else to gain access to a building. Policy for visitors (one scan, one
person).
Shredding – Shred your documents.
Things that you have – Smart card, USB taken, Hardware or software tokens, phone (SMS a code
to your phone).
Control your input – use privacy filters
Digital Security Techniques
Anti-virus
76 | P a g e
Cisnet A+ 901 & 902 Study Guide
Anti-spyware – it’s watching you. Browsing activity, keylogs, and username/password details.
Host-based firewall – protect against others on the network.
Firewalls – filters traffic by port numbers (OSI layer 4).
Password protection – Weak password is difficult to protect. Password need complexity to
prevent brute force attack.
NTFS file permissions to lock down access.
User permission
Security Awareness
Security Policy training and procedures
All the security policy is in the Intranet, but nobody reads it.
In-person mandatory training sessions are required.
Teach how to deal with virus and company policy for the visitors.
User Habits
Password behaviors – no sticky notes, etc.
Data handling, clean desk policy, personally owned devices.
New viruses – new technology is needed.
Phishing attacks – it’s a trap. Check the URL.
Spyware – learns personal information, captures keystrokes &
browsing information.
Common Security threats
Social engineering – major threat, electronically undetectable.
Suspicious phone call
Shoulder surfing – You have access to important details and
many people want to see.
Malware – similar to spyware
Rootkits – they get into the kernel of your computer and modify
some of the core system files. They become invisible. Even anti-
virus cannot detect this.
Security Best Practices
Desktop Security – require a screensaver password which can be administratively enforced.
Disable autorun – No autorun in Windows 7, which is disabled through the registry. Autorun was
changed to Auto Play, and this won’t run automatically and instead asks what to do.
Disposing of Sensitive data
Disk Formatting (high level format)
Software Troubleshooting
Slow System Performance
Windows update – latest patches and drivers
Disk space – Check for available space and defrag
Laptops may be using power-saving mode – Throttles the CPU
Task Manager – Check for high CPU utilization and I/O
Anti-virus and anti-malware – Scan for bad programs. Make sure Anti-virus isn’t the issue.
Starting the system
Device not starting – Device Manager and Event Viewer, often a bad driver too.
“One or more services failed to start” – Try starting manually, check the account permissions,
Windows services -> check system files, Application service -> reinstall application.
Files and Compatibility errors
File types are associated with applications – associations can be changed.
Configure the associations –Windows Vista/7 -> Default Programs applet
Compatibility tab – Run application as an older Windows app, File or shortcut properties.
Boot problems
Invalid boot disk – USB drive may be connected, check BIOS config
OS System Not Found -> Boot device does not have a boot loader, Use Recovery Console or
Recovery Environment to run chkdsk, repair the MBR.
Boot errors
Boot.ini errors –In Windows 7/Vista we have Boot Configuration Database (BCD). We can also
manually edit in the text editor from the Recovery console “bootcfg /rebuild” and this will rebuild
the boot configuration database to load the OS.
77 | P a g e
Cisnet A+ 901 & 902 Study Guide
MSCONFIG
Microsoft System Utility can perform some diagnosis to identify where the problem in loading the
OS might be.
We can control what exactly happens during the booting process. We can enable/disable certain
applications from loading.
Also able to change the way ‘Services’ operate.
Defragmentation
78 | P a g e
Cisnet A+ 901 & 902 Study Guide
If there are any performance issues while accessing files on the hard drive, then defragmentation
could be an option.
It moves file fragments so they are contiguous. It helps in improving read and write time.
Go to the drive Properties -> Tools -> Defragmentation. From command line: ‘defrag’.
We can also do weekly schedule of defragmentation by using Control Panel -> Administrative
Tools -> Task Scheduler.
REGEDIT and REGSVR32
The Windows OS relies heavily on this massive
hierarchical database called the Registry.
Lot of information about the application, system
configuration, services, security, UI, drivers, etc. is
stored in this database.
If this critical data gets corrupted, then it may have problems in running an application.
To see what is inside the registry, use a program called REGEDIT (Registry Editor).
The registry allows full and complete access to edit the information that is inside the registry.
We can add/delete/modify keys from the registry.
We can also import and export information from the registry.
REGSVR32 – another important utility that affects what’s in the registry is the Microsoft register
Server. This is an application that allows to register and unregister DLL's (Dynamic Link Library)
from the OS.
Event Viewer
A common place to see what’s happening on the system. It is separated into different areas like
Application, Security, Setup and System.
We could see different levels such as Information, Warning, Error, Critical, Successful Audit, and
Failure Audit.
Options at boot time
Press F8 before OS boot begins to get to the ‘Advanced
boot’ options.
Most recovery options start here – Safe Mode, Windows
recovery Console, Last Known Good Configuration.
Safe Mode
Only the necessary drivers get started.
Safe Mode with Networking – Includes drivers for network
connectivity.
Safe Mode with Command Prompt – No Windows
Explorer.
Enable low-resolution (VGA Mode) – Recover from bad
video driver installations.
Windows Recovery Console
Starting the console –Windows Vista/7: System Recovery
Options / Command Prompt.
Very powerful and very dangerous.
You have complete control:
Use, copy, rename, or replace OS files and folders.
Enable/disable service or device setup
Repair the file system boot sector or the MBR
Create and format partitions on drives.
Troubleshooting Common Security Issues
Browser security
Pop-ups: may look like a legitimate application, but not in reality.
Browser redirection – Instead of your Google result, your browser goes somewhere else. Viruses
are common causes for this.
Security alerts – Something isn’t right
Malware symptoms
Slow performance – Malware isn’t the best written code and it’s also busy wreaking havoc.
Internet connectivity issues – Malware likes to control everything, and makes you go where it
wants to go.
79 | P a g e
Cisnet A+ 901 & 902 Study Guide
Windows updates failures – Malware keeps you vulnerable, some malware uses multiple
communication paths.
Renamed system files
Files disappearing – or gets encrypted.
File permission changes – Protections are modified.
Access denied – Malware locks itself away, and doesn’t leave easily.
Virus alerts and hoaxes
Seems to be legit – may include recognizable logos
and language
May require money to “unlock” your PC
Often requires a specific anti-malware removal
utility or technique.
Email Security
Spam – Unsolicited email messages,
advertisements, phishing attacks, spread viruses,
spam filters can be helpful.
Hijacked email – Infected computers can become
email spammers. Participation in DoS attack.
Tools for Security Troubleshooting
Anti-virus software
Stop malicious software from running – if it can’t execute, it can’t infect.
Can include anti-malware and anti-spyware, etc.
Keep your signatures updated – there are new malwares every day.
System Restore
Creates restore points – to go back in time to correct problems.
Windows Vista/7: All Programs -> Accessories -> System Tools -> System Restore.
Doesn’t guarantee recovery from viruses and spyware.
Best Practices for Malware removal
Identifying Malware
Odd error messages like Application failures, security
alerts
System performance issues – slow boot, slow
applications.
80 | P a g e
Cisnet A+ 901 & 902 Study Guide
ESD is very harmful to components inside the computers since the silicon is very
sensitive to high voltages.
We can feel the static charge when it is around ~3,500 volts, but 100 volts or less
is more than enough to damage the electronic components inside the motherboard.
Controlling ESD
Lower the humidity more are the chances of ESD. Humidity level over 60% helps
in controlling ESD.
Air conditioners constantly pull the humidity out of the air and this makes it
difficult to main the required humidity level.
Use your hand to minimize the instances of ESD. First disconnect the device from
power source.
Touch the exposed metal chassis before touching a component.
Best practice – Do not directly touch the components.
Use the edges to hold.
Anti-static pad – Used to displace the ESD.
Commonly connected to the electrical ground.
These devices have resistors inside them that
will prevent any type of voltage getting to you.
Anti-static bag should be used to move the electronic components.
Computer Safety Procedures
Power is dangerous. Remove all the power sources before starting to work on the
devices.
Do not touch any component if you are not sure what it is.
Usually it’s less expensive to swap the entire power supply unit, rather than
repairing individual internal components. It is also safe.
Need to be mindful with the right voltage types. Different devices use different
voltages and devices like power supplies, laser printers and displays use high
voltages.
Equipment grounding
Most of the computer products are connected to the ground to divert any electrical
faults from the people.
It also applies to the equipment racks, especially in data centers. Hence do not
remove the ground pin connection at any time.
Personal safety
Technicians mostly work in moving environments (laser printers that pull
papers). If you are working near to any of these equipment’s make sure to remove
your jewellery and any name badge neck straps.
Lifting technique – lift with your legs, keep your back straight. Don’t carry
overweight items.
Electrical fire safety – Don’t use water or foam. Use carbon-di-oxide (CO2), FM-
200, or other dry chemicals. Always make sure to remove the power source.
81 | P a g e
Cisnet A+ 901 & 902 Study Guide
CRT safety – Capacitors hold high voltage. Only to be opened by the trained
technicians.
There are many health and safety laws specified by each country. It’s very
important to keep the workplace hazard-free.
Building codes needs to be in place for fire prevention and electrical codes.
Components of these electric components will be hazardous to the environment,
hence it requires high-tech waste disposal. Refer to the right documentation.
Managing Computer Environment
Disposal Procedures
All electrical components fail one day. It requires proper disposal techniques and
procedures.
Read the Material Safety Data Sheets (MSDS) provided by the US
Department of Labor, Occupational Safety and Health Administration (OSHA).
http://www.osha.gov. Different countries might have different kinds of
documents commonly abbreviated as Safety Data Sheet (SDS).
This document provides information on how to dispose various hazardous
chemicals like batteries, display devices, chemical solvents, toner and ink
cartridges, etc.
Each manufacturer provides their own MSDS sheet for their products.
Room control
Temperature control is critical for devices and humans. High humidity will
result in condensation and low humidity will promote ESD. Hence proper
maintenance is required.
Proper ventilation is a must, since computers generate lot of heat, and do not
put everything inside a closet.
Surge Suppressor
The power supplied to the computer is very important. Surge suppressor helps by
taking a lot of spikes and surges coming over those electrical systems and cleans
the power going into the computers.
They also have noise filters to filter out any line noise. This is generally measured
in decibels (dB).
Higher dB provides better filtering capability.
Specifications – measured in Joule ratings. For surge absorption 200 = good, and
400 = better. If possible get 600 joules for better protection.
Get the highest Surge amp ratings.
There are different voltage ratings that ranges from 500, 400 and 330 volts.
Lower is better.
UPS
Provides power backup and protects from blackouts, brownouts, surges, etc.
UPS types: Standby UPS, uses power from the primary power source, unless that
stops. Batteries inside provide the supply during this outage. There will be a bit of
delay in switching over.
Line-interactive UPS, Not a standby UPS, but slowly move over to battery power
if the line begins losing power. Impact to the end device is not dramatic.
82 | P a g e
Cisnet A+ 901 & 902 Study Guide
Online UPS, mainly used in data centres and for sensitive equipment’s. It
provides power from both the power source and the battery simultaneously. There
is no delay in switching over to the batteries.
There are different options provided by the UPS when they have issues, such as
auto shutdown.
Need to make sure the airflow is clean without any dirt/dust. While cleaning, use
natural detergents. No ammonia-based cleaning liquids to be used and avoid isopropyl
alcohol. Try to use only the computer vacuum and not the general type.
Communication
Good communication skills are very important for the technicians. Technician
needs to be able to communicate effectively to non-technical persons as well.
It is one of the most difficult skill to master.
Try to avoid jargons and abbreviations. Try to be the translator for these
acronyms.
Communicate in terms that everyone can understand.
Avoid interrupting when someone explains the issue (even if you know the
answer).
Listen!! Build a relationship with the customer. They may need your help again
someday.
Do not miss any key information about the issue.
Clarify customer statements – ask appropriate questions, drill-down into the
details, avoid an
argument and don’t be judgemental.
Always repeat your understanding of the problem back to the customer. This is
to make sure you have understood the problem correctly.
Keep an open mind on the solution. Do not make an assumption.
Setting expectations – Set the right kind of expectations. Offer different options
like replacing with a different component with warranty.
Document everything. There will be no room for questions.
Keep everyone informed. Even if the status is unchanged.
Follow up. This provides higher customer satisfaction.
Professionalism
Maintain positive attitude – positive tone of voice. Problems can’t always be
fixed. Try to do your
best and provide helpful options.
Attitude has a direct impact on the overall customer experience.
Avoid being judgemental – You may be in different cultural surrounding when
you visit a home or desk for troubleshooting. Need to handle the situation with
professionalism.
Let the customer know what happened by teaching so that you can make people
smarter.
Be on time – Do not allow any kind of interruptions like personal calls, personal
interruptions, and talking to co-workers.
83 | P a g e
Cisnet A+ 901 & 902 Study Guide
84 | P a g e