Uploaded by John Smith2

Mike Meyers passport

advertisement
Mike Meyers’ CompTIA
A+A+
Core 1
CompTIA ™
®
CERTIFICATION
PASSPORT
(Exams220-1101)
(Exam
220-1001 & 220-1002)
SEVENTH
EDITION
About the Series Editor
Michael Meyers is the industry’s leading authority on CompIA A+ and CompIA Network+
certiications. He is the president and co-ounder o otal Seminars, LLC, a major provider
o computer and network repair curriculum and seminars or thousands o organizations
throughout the world, and a member o CompIA.
Mike has written numerous popular textbooks, including the best-selling Mike Meyers’
CompTIA A+ Guide to Managing and Troubleshooting PCs, Mike Meyers’ CompTIA Network+
Guide to Managing and Troubleshooting Networks, and Mike Meyers’ CompTIA Security+
Certification Guide.
About the Author
Ron Gilster is a well-known best-selling author with over 40 published books on I career
certiication, technology, business, and inance. Ron’s career has spanned over multiple decades,
ranging rom punched-card equipment to senior executive and author. His books have covered
CompIA’s A+, Network+, Server+, Security+, and Cloud+ as well as Cisco CCNA, CCDA,
and several others. He has also been an educator, teaching I, IS, networking, and cybersecurity
at the high-school, baccalaureate, and graduate levels. Ron has always admired Mike and his
books and videos and is honored to be working directly with Mike on this project.
About the Technical Editor
Chris Crayton is a technical consultant, trainer, author, and industry-leading technical
editor. He has worked as a computer technology and networking instructor, inormation
security director, network administrator, network engineer, and PC specialist. Chris has
authored several print and online books on PC repair, CompIA A+, CompIA Security+,
and Microsot Windows. He has also served as technical editor and content contributor
on numerous technical titles or several o the leading publishing companies. He holds
numerous industry certiications, has been recognized with many proessional and teaching
awards, and has served as a state-level SkillsUSA inal competition judge.
Mike Meyers’ CompTIA
A+A+
Core 1
CompTIA ™
®
CERTIFICATION
PASSPORT
(Exams220-1101)
(Exam
220-1001 & 220-1002)
SEVENTH
EDITION
Mike Meyers, Series Editor
Ron Gilster
New York Chicago San Francisco Athens
London Madrid Mexico City Milan
New Delhi Singapore Sydney Toronto
McGraw Hill is an independent entity rom CompIA® and is not aliated with CompIA in any manner. Tis publication and accompanying media
may be used in assisting students to prepare or the CompIA A+™ exams. Neither CompIA nor McGraw Hill warrants that use o this publication and
accompanying media will ensure passing any exam. CompIA and CompIA A+ are trademarks or registered trademarks o CompIA in the United
States and/or other countries. All other trademarks are trademarks o their respective owners. Te CompIA Marks are the proprietary trademarks and/
or service marks o CompIA and its aliates used under license rom CompIA.
Copyright © 2023 by McGraw Hill. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no
part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system,
without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and
executed in a computer system, but they may not be reproduced for publication.
ISBN: 978-1-26-460773-0
MHID:
1-26-460773-3
The material in this eBook also appears in the print version of this title: ISBN: 978-1-26-460565-1,
MHID: 1-26-460565-X.
eBook conversion by codeMantra
Version 1.0
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benet of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps.
McGraw Hill eBooks are available at special quantity discounts to use as premiums and sales promotions or for use in corporate
training programs. To contact a representative, please visit the Contact Us page at www.mhprofessional.com.
Information has been obtained by McGraw Hill from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw Hill, or others, McGraw Hill does not guarantee the accuracy, adequacy, or
completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such
information.
TERMS OF USE
This is a copyrighted work and McGraw-Hill Education and its licensors reserve all rights in and to the work. Use of this work
is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the
work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit,
distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill Education’s prior consent. You
may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to
use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES
OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED
FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA
HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. McGraw-Hill Education and its licensors do not warrant or guarantee that the functions contained in the work will
meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill Education nor its licensors
shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages
resulting therefrom. McGraw-Hill Education has no responsibility for the content of any information accessed through the work.
Under no circumstances shall McGraw-Hill Education and/or its licensors be liable for any indirect, incidental, special, punitive,
consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of
the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or
cause arises in contract, tort or otherwise.
v
DOMAIN
Contents at a Glance
1.0
2.0
3.0
4.0
5.0
A
Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1
Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Virtualization and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Hardware and Network roubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
About the Online Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
v
This page intentionally left blank
DOMAIN
vii
Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
1.0
Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1
Objective 1.1 Given a scenario, install and configure
laptop hardware and components                         
Hardware/Device Replacement                                       
Keyboard                                                    
Hard Drive                                                   
Memory                                                     
Wireless Card                                                
Physical Privacy and Security Components                               
Physical Security                                              
Biometrics                                                   
Near-Field Scanners                                           
REVIEW                                                         
11 QUESTIONS                                              
11 ANSWERS                                               
Objective 1.2 Compare and contrast the display
components of mobile devices                           
Types of Displays                                                   
LCD                                                        
LED                                                        
Display Panel Components                                           
Wi-Fi Antenna Connector/Placement                              
Camera/Webcam                                             
Microphone                                                  
Inverter                                                     
Touchscreen/Digitizer                                          
2
2
3
4
6
9
9
10
10
10
11
11
12
12
13
13
13
14
15
15
16
16
16
vii
viii
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
REVIEW                                                         
12 QUESTIONS                                              
12 ANSWERS                                               
Objective 1.3 Given a scenario, set up and configure
accessories and ports of mobile devices                    
Connection Methods                                                
Universal Serial Bus                                           
Lightning Connector                                           
Serial Interfaces                                              
Near-Field Communication                                      
Bluetooth                                                   
Hotspot                                                     
Accessories                                                       
Touch Pens                                                  
Headsets                                                    
Speakers                                                    
Webcams                                                   
Docking Station                                                    
Port Replicator                                                     
Trackpads and Drawing Pads                                         
REVIEW                                                         
13 QUESTIONS                                              
13 ANSWERS                                               
Objective 1.4 Given a scenario, configure basic mobile-device
network connectivity and application support               
Wireless/Cellular Data Network (Enable/Disable)                         
Mobile Device Communication                                  
Wireless Generations                                          
Hotspot                                                     
GSM vs CDMA                                               
Preferred Roaming List Updates                                  
Bluetooth                                                   
Cellular Location Services                                      
GPS                                                        
Securing Mobile Devices                                       
Mobile Device Synchronization                                  
REVIEW                                                         
14 QUESTIONS                                              
14 ANSWERS                                               
16
17
17
18
18
18
21
21
21
21
22
22
22
22
22
22
23
23
24
24
24
25
26
26
26
28
30
31
31
31
32
34
34
36
39
40
41
Contents
2.0
Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
Objective 2.1 Compare and contrast Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP)
ports, protocols, and their purposes                       
Ports and Protocols                                                 
Connection-Oriented vs Connectionless                                
Connection-Oriented                                           
Connectionless                                               
TCP vs UDP                                                 
Other Connection-Oriented Protocols                              
Other Connectionless Protocols                                  
REVIEW                                                         
21 QUESTIONS                                              
21 ANSWERS                                               
Objective 2.2 Compare and contrast common
networking hardware                                   
Routers                                                          
Switches                                                         
Managed                                                    
Unmanaged                                                  
Access Points                                                     
Patch Panel                                                       
Firewall                                                          
Power over Ethernet                                                
PoE Standards                                                
Injectors                                                    
Switch                                                      
Hub                                                             
Optical Network Terminal                                            
Cable/DSL Modem                                                 
Cable Modem                                                
DSL Modem                                                 
Network Interface Card                                              
Software-Defined Networking                                        
REVIEW                                                         
22 QUESTIONS                                              
22 ANSWERS                                               
44
44
45
46
46
47
47
48
48
49
50
50
50
51
51
51
52
52
53
54
54
55
55
55
56
56
56
57
57
60
60
61
62
ix
x
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
Objective 2.3 Compare and contrast protocols
for wireless networking                                  
Frequencies                                                       
Industrial, Scientific, and Medical Bands                          
Unlicensed National Information Infrastructure Bands                
Channels                                                    
Wireless Networking Standards                                       
Bluetooth                                                         
Enabling and Pairing Bluetooth                                  
Long-Range Fixed Wireless                                           
IEEE 80211ah                                                
Local Multichannel Distribution Service                           
Licensed Frequencies                                          
WLAN Devices: Power and Signal Strength                              
Near-Field Communication                                           
Radio-Frequency Identification                                        
REVIEW                                                         
23 QUESTIONS                                              
23 ANSWERS                                               
Objective 2.4 Summarize services provided by networked hosts   
Server Roles                                                      
DHCP Server                                                 
DNS Server                                                  
File Server                                                   
Print Server                                                  
Mail Server                                                  
Syslog                                                      
Web Server                                                  
Authentication, Authorization, and Accounting Server                
Internet Appliance                                                  
Spam Gateways                                              
Unified Threat Management                                    
Load Balancers                                               
Proxy Server                                                 
Legacy/Embedded Systems                                          
Supervisory Control and Data Acquisition                               
Internet of Things Devices                                           
REVIEW                                                         
24 QUESTIONS                                              
24 ANSWERS                                               
62
62
63
64
64
65
66
66
68
69
69
69
70
70
70
71
71
72
72
73
73
73
73
73
74
74
74
74
75
75
75
75
75
76
76
76
77
77
78
Contents
Objective 2.5 Given a scenario, install and configure basic
wired/wireless small office/home office (SOHO) networks     
Internet Protocol Addressing                                          
IPv4 Addresses                                               
IPv6 Addresses                                               
IPv4 vs IPv6                                                 
Dynamic Address Assignment                                        
Dynamic Host Configuration Protocol                             
Static Addresses                                              
Gateway                                                         
REVIEW                                                         
25 QUESTIONS                                              
25 ANSWERS                                               
Objective 2.6 Compare and contrast common
network configuration concepts                           
DNS                                                             
DNS Operation                                               
DNS Record Types                                            
E-mail Protection in DNS                                       
DHCP                                                            
DHCP Operations                                             
DHCP Leases                                                 
DHCP Scope                                                 
VPN                                                             
VLAN                                                            
REVIEW                                                         
26 QUESTIONS                                              
26 ANSWERS                                               
Objective 2.7 Compare and contrast Internet connection types,
network types, and their features                          
Internet Connection Types                                            
Connection Hardware                                          
Satellite                                                    
Fiber                                                       
Cable                                                       
DSL                                                        
Cellular                                                     
Wireless Internet Service Provider                                
Network Types                                                     
LAN                                                        
WAN                                                       
79
79
80
81
82
83
83
86
86
88
88
89
89
90
90
90
92
92
92
93
93
94
96
97
97
98
98
99
99
99
100
100
101
101
101
102
102
102
xi
xii
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
PAN                                                         102
MAN                                                        102
WLAN                                                       103
SAN                                                         103
REVIEW                                                          103
27 QUESTIONS                                               104
27 ANSWERS                                                105
Objective 2.8 Given a scenario, use networking tools             105
Crimper and Cable Stripper                                            106
Wi-Fi Analyzer                                                      107
Toner Probe                                                        107
Punchdown Tool                                                     108
Cable Tester                                                        110
Loopback Plug                                                      111
Network TAP                                                       111
REVIEW                                                          112
28 QUESTIONS                                               112
28 ANSWERS                                                113
3.0
Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Objective 3.1 Explain basic cable types and their connectors,
features, and purposes                                  
Network Cables and Connectors                                       
Copper Cables                                                
Coaxial                                                     
Fiber                                                       
Peripheral Cables                                             
Video Cables and Connectors                                         
Hard Drive Cables                                                  
SATA and eSATA                                              
IDE                                                         
SCSI                                                       
Connectors                                                        
Registered Jack Connectors                                     
Coaxial Cable Connector: F-Type                                 
Fiber Optic Cable Connectors                                    
Punchdown Block                                             
Molex and Berg                                              
Lightning Port                                                
Adapters                                                         
DVI to HDMI, DVI to VGA                                       
USB to Ethernet                                              
116
116
116
121
121
122
127
128
128
130
130
130
131
133
133
134
135
136
137
137
138
Contents
REVIEW                                                          138
31 QUESTIONS                                               139
31 ANSWERS                                                140
Objective 3.2 Given a scenario, install the appropriate RAM        140
RAM Packages                                                     140
Dual Inline Memory Modules                                     141
Memory Architectures                                          141
Double Data Rate Memory                                       142
Handling and Installing DIMM                                    144
Laptop RAM                                                        145
Handling and Installing SO-DIMM Sticks                           146
Confirming RAM Installation                                           148
Performance Configurations for Desktop and Laptop                        148
Error-Correcting Memory                                              149
Virtual Memory                                                     149
REVIEW                                                          150
32 QUESTIONS                                               150
32 ANSWERS                                                151
Objective 3.3 Given a scenario, select and install storage devices   151
Hard Drives                                                        152
Solid-State Drives                                                   153
NVMe                                                       154
SATA                                                        154
mSATA                                                      154
M2 SSD                                                     155
Flash Memory                                                      155
Flash Drives                                                  155
Memory Cards                                                155
SD Card                                                      156
Installing Storage Devices                                            156
Installing SATA Drives                                          156
Installing IDE Drives                                            157
Installing M2 Drives                                           158
RAID                                                              159
Optical Drives                                                      160
REVIEW                                                          161
33 QUESTIONS                                               161
33 ANSWERS                                                162
xiii
xiv
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
Objective 3.4 Given a scenario, install and configure motherboards,
central processing units (CPUs), and add-on cards            163
Motherboard Form Factor                                             163
ATX                                                         163
ITX                                                          165
Motherboard Connector Types                                         165
Expansion Bus Architectures                                     166
PCI                                                          166
PCIe                                                         166
SATA                                                        168
eSATA                                                       168
Motherboard Headers                                          168
M2 Interface                                                 169
Motherboard Compatibility                                            170
CPU Compatibility                                              170
System Compatibility Issues                                     172
Multisocket Motherboards                                       172
BIOS/UEFI Settings                                                  173
BIOS/UEFI                                                    173
Boot Options                                                  177
USB Permissions                                               178
Trusted Platform Module                                        179
Fan Controls                                                  180
Secure Boot                                                  181
Boot Password                                                182
Encryption                                                         182
Using TPM                                                   182
Hardware Security Module                                      183
CPU Features                                                       183
x64 and x86 Architectures                                       184
Advanced RISC Machine                                        185
Single Core and Multicore                                       185
Multithreading                                                186
Hardware Virtualization                                         186
Expansion Cards                                                    188
Video Cards                                                   188
Sound Cards                                                  189
Capture Card                                                  190
Network Interface Card                                         191
Cooling Mechanism                                                  192
Heat Sink and Cooling Fans                                      193
Liquid Cooling System                                          197
Contents
REVIEW                                                          198
34 QUESTIONS                                               199
34 ANSWERS                                                200
Objective 3.5 Given a scenario, install or replace the appropriate
power supply                                           200
Input: 110–120 VAC vs 220–240 VAC                                   200
PSU Terminology                                               201
Output: +33 V, +5 V, and +12 V                                   202
Output: +5 V and +12 V Connectors                                     203
24-Pin Motherboard Adapter                                          205
Redundant Power Supplies                                            205
Modular Power Supply                                               206
Wattage Rating                                                     206
Number of Devices/Types of Devices to Be Powered                       207
Power Supply Installation Notes                                        207
REVIEW                                                          208
35 QUESTIONS                                               209
35 ANSWERS                                                210
Objective 3.6 Given a scenario, deploy and configure multifunction
devices/printers and settings                              210
Unboxing, Placing, and Configuring an MFD                              211
Initial Configuration                                            211
Device Drivers                                                      212
Windows                                                     212
macOS                                                       212
Linux                                                        213
PostScript and PCL                                             213
Device Connectivity                                                  215
USB Connections                                              216
Ethernet Connections                                           216
Wireless Printers                                              217
Device Sharing                                                     218
Wired                                                       218
Wireless                                                     218
Public and Shared Printers                                       218
Print Server                                                   219
Cloud Printing                                                 220
Remote Printing                                               220
Configuration Settings                                               220
Device Sharing                                                     221
Wired                                                       222
Wireless                                                     222
xv
xvi
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
Security                                                           222
User Authentication                                            222
Badging                                                      223
Audit Logs                                                    223
Secure Print                                                  224
Network Scan Services                                               224
Automatic Document Feeder                                           225
REVIEW                                                          225
36 QUESTIONS                                               226
36 ANSWERS                                                227
Objective 3.7 Given a scenario, install and replace
printer consumables                                     227
Calibration                                                         227
Laser Printers                                                       228
Laser Printer Imaging Process                                    228
Laser Printer Components                                       229
Laser Printer Maintenance                                       231
Cleaning a Laser Printer                                         232
Inkjet Printers                                                      234
Inkjet Printing and Components                                   234
Inkjet Printer Maintenance and Cleaning                            237
Thermal Printers                                                    239
Thermal Print Head/Heating Element                              239
Thermal Printer Feed Assembly                                   239
Thermal Paper                                                 240
Thermal Printer Cleaning                                        240
Impact Printers                                                     240
Impact Print Heads                                             241
Impact Components                                            243
Impact Maintenance                                            244
3-D Printers                                                        244
3-D Printing Filaments                                          245
3-D Printer Bed                                                245
REVIEW                                                          246
37 QUESTIONS                                               246
37 ANSWERS                                                247
Contents
4.0
Virtualization and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Objective 4.1 Summarize cloud-computing concepts             
Common Cloud Models                                              
Cloud Deployment Models                                      
Cloud Service Models                                          
Cloud Characteristics                                               
Shared Resources                                             
Metered Utilization                                            
Elasticity/Scalability                                           
High Availability                                              
File Synchronization                                           
Desktop Virtualization                                               
REVIEW                                                         
41 QUESTIONS                                              
41 ANSWERS                                               
Objective 4.2 Summarize aspects of client-side virtualization      
Purpose of Virtual Machines                                          
Sandboxing                                                  
Test-Driven Development                                       
Application Virtualization                                       
Resource Requirements                                             
Emulator Requirements                                              
Security Requirements                                              
Network Requirements                                              
Hypervisor                                                        
Installing a Hypervisor and Creating a Virtual Machine               
Installing the Guest Operating System                            
REVIEW                                                         
42 QUESTIONS                                              
42 ANSWERS                                               
5.0
250
250
250
251
252
252
253
254
254
255
256
257
257
258
259
259
259
260
260
261
262
262
263
263
264
264
267
268
269
Hardware and Network roubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Objective 5.1 Given a scenario, apply the best practice
methodology to resolve problems                         272
The CompTIA Troubleshooting Methodology                              272
REVIEW                                                          273
51 QUESTIONS                                               274
51 ANSWERS                                                275
xvii
xviii
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
Objective 5.2 Given a scenario, troubleshoot problems
related to motherboards, RAM, CPU, and power              275
Troubleshooting Common Symptoms                                    275
Power-On Self-Test Beep Codes                                   275
Proprietary Crash Screens                                       276
No Power                                                    277
Sluggish Performance                                           278
Overheating                                                  278
Burning Smell and Smoke                                       279
Intermittent Shutdowns                                         279
Application Crashes                                            280
Grinding Noise                                                280
Capacitor Swelling                                             280
Inaccurate System Date/Time                                    281
Other Symptoms                                               281
REVIEW                                                          283
52 QUESTIONS                                               283
52 ANSWERS                                                284
Objective 5.3 Given a scenario, troubleshoot
and diagnose problems with storage drives and RAID arrays   285
Troubleshooting Common Symptoms                                    285
Light-Emitting Diode (LED) Status Indicators                         285
Grinding Noises                                               285
Clicking Sounds                                               285
Bootable Device Not Found/Failure to Boot                          285
Data Loss or Corruption                                         286
RAID Failure                                                  286
SMART Failure                                              286
Extended Read/Write Times and Read/Write Failure                  286
Missing Drives in OS                                           287
Other Symptoms                                               287
REVIEW                                                          288
53 QUESTIONS                                               288
53 ANSWERS                                                289
Objective 5.4 Given a scenario, troubleshoot video, projector, and
display issues                                           290
Troubleshooting Video, Projector, and Display Issues                       290
Incorrect Data Source                                           290
Physical Cabling Issues                                         290
Burned-Out Bulb                                               290
Fuzzy or Distorted Image                                        290
Contents
Display Burn-In                                                291
Dead Pixels                                                   291
Flashing Screen/Flickering Image                                 291
Incorrect Color Display                                          291
Audio Issues                                                  291
Dim Image                                                    291
Intermittent Projector Shutdowns                                 292
Other Symptoms                                               292
REVIEW                                                          293
54 QUESTIONS                                               293
54 ANSWERS                                                294
Objective 5.5 Given a scenario, troubleshoot common issues
with mobile devices                                      295
Troubleshooting Mobile Devices                                        295
Poor Battery Health/Short Battery Life                             295
Swollen Battery                                               295
Broken Screen                                                 296
Improper Charging                                             296
Poor/No Connectivity                                           297
Liquid Damage                                                298
Overheating                                                  298
Digitizer Issues                                                298
Physically Damaged Ports                                       298
Malware                                                     299
Cursor Drift/Touch Calibration                                    299
Other Symptoms                                               299
REVIEW                                                          302
55 QUESTIONS                                               303
55 ANSWERS                                                304
Objective 5.6 Given a scenario, troubleshoot
and resolve printer issues                                 304
Troubleshooting Printing Issues                                        305
Lines Down the Printed Pages                                    305
Garbled Print                                                  305
Toner Not Fusing to Paper                                       305
Paper Jams                                                   306
Faded Prints                                                  306
Incorrect Paper Size                                            307
Paper Not Feeding                                             307
Multipage Misfeed                                             307
Multiple Prints Pending in Queue                                  307
xix
xx
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
Speckling on Printed Pages                                      308
Double/Echo Images on the Print                                  309
Incorrect Color Settings                                         309
Grinding Noise                                                309
Finishing Issues                                               310
Incorrect Page Orientation                                       310
Other Symptoms                                               310
REVIEW                                                          312
56 QUESTIONS                                               312
56 ANSWERS                                                313
Objective 5.7 Given a scenario, troubleshoot problems
with wired and wireless networks                          314
Troubleshooting Network Issues                                        314
Intermittent Wireless Connectivity                                314
Slow Network Speeds                                          315
Limited Connectivity/No Connectivity                              315
Jitter                                                        316
Poor VoIP Quality                                              316
Port Flapping                                                  316
High Latency                                                  316
External Interference                                           317
Other Symptoms                                               317
REVIEW                                                          318
57 QUESTIONS                                               319
57 ANSWERS                                                320
A
About the Online Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
System Requirements                                               
Your Total Seminars Training Hub Account                               
Privacy Notice                                                
Single User License Terms and Conditions                               
TotalTester Online                                                  
Pre-Assessment                                              
Mike’s CompTIA A+ Video Training Sample                              
TotalSims Sample for CompTIA A+                                     
Mike’s Cool Tools                                                   
Technical Support                                                  
321
321
321
322
323
323
324
324
324
324
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
DOMAIN
xxi
Acknowledgments
As with every book, a lot o work rom a lot o people went into making it happen.
Our acquisitions editor, im Green, kept us on track with kind words and pointy sticks.
Always a pleasure working with you, im!
Our acquisitions coordinator, Caitlin Cromley-Linn, did an outstanding job acquiring and
coordinating, with gentle yet insistent reminders or us to get stu to her on a timely basis.
Likewise, our project manager, asneem Kauser at KnowledgeWorks Global Ltd. his was a
un project, and we look orward to the next one!
Bart Reed did great work as our copy editor. He transormed every awkward stumble o
language into a grammatical gem.
Our technical editor, Chris Crayton, took what some would describe as gleeul delight in
pointing out every technical error he ound. But since he helped us ix every error too, we won’t
hold it against him. hanks, once again, or your technical expertise.
he layout team at KnowledgeWorks Global Ltd. did a remarkable job, putting the prose
and pictures into printable orm, which you now get to enjoy!
Finally, thanks to our prooreader, Rick Camp, or catching every last error. here’s no error
too big or small—he’ll ind them all. hank you.
xxi
This page intentionally left blank
DOMAIN
xxiii
Introduction
Your Passport to Certifcation
Hello! I’m Mike Meyers, series editor, co-ounder o otal Seminars, and author o many
best-selling certiication books. On any given day, you’ll ind me replacing a hard drive,
setting up a website, or writing code. he book you hold in your hands is part o a powerul book series called the Mike Meyers’ Certification Passports. Every book in this series
combines easy readability with a condensed ormat—in other words, it’s the kind o book
I always wanted when I went or my certiications. Putting a huge amount o inormation in
an accessible ormat is an enormous challenge, but I think we have achieved our goal and
I am conident you’ll agree.
I designed this series to do one thing and only one thing—to get you the inormation you
need to achieve your certiication. You won’t ind any lu in here. We packed every page with
nothing but the real nitty-gritty o the CompIA A+ Core 1 certiication exam.
Your Destination: CompTIA A+ Certifcation
his book is your passport to CompIA A+ Core 1 certiication, the vendor-neutral
industry standard certiication or PC hardware technicians, the olks who build and ix PCs.
o get ully CompIA A+ certiied, you need to pass two exams: 220-1101 (Core 1) and
220-1102 (Core 2). o help you prepare or the Core 2 exam, please see our companion book,
Mike Meyers’ CompTIA A+ Core 2 Certification Passport (Exam 220-1102).
The CompTIA A+ Exams
he 220-1101 Core 1 exam concentrates on ive areas: Mobile Devices, Networking, Hardware, Virtualization and Cloud Computing, and Hardware and Network roubleshooting.
his exam ocuses on your understanding o the terminology and hardware technology used
in each o the ive subject areas.
he 220-1102 Core 2 exam works the same way, covering Operating Systems, Security,
Sotware roubleshooting, and Operational Procedures. he 1102 exam is ocused mainly on
Windows, including installing, updating, maintaining, troubleshooting, and more. he other
xxiii
xxiv
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
operating systems covered—macOS, Linux, iOS, and Android—get more o a big picture
view. Security and troubleshooting, in both Windows and applications, make up hal the
exam questions.
Speaking o questions, each exam consists o up to 90 questions. Each exam takes
90 minutes. You must score at least 675 on a scale o 100–900 to pass exam 220-1101 (Core 1)
and at least 700 on a scale o 100–900 to pass exam 220-1102 (Core 2). Remember, you must
pass both exams to achieve your CompIA A+ certiication.
Question Types and Examples
Both o the exams are extremely practical, with little or no interest in theory. When you take
the exams, you will see three types o questions: multiple choice, drag-and-drop matching, and
perormance based (simulation).
he ollowing is an example o the type o multiple-choice question you will see on
the exams:
A company is planning to upgrade its Fast Ethernet network to Gigabit Ethernet.
he existing network uses a mixture o Cat 5, Cat 5e, and Cat 6 cables. Which o the
ollowing needs to be perormed during the upgrade process?
A. Replace all cables with Cat 6.
B. Keep the same cables.
C. Replace Cat 5 with Cat 5e or Cat 6.
D. Replace all cables with Cat 5e.
he best answer is C, “Replace Cat 5 with Cat 5e or 6.” he cable standards mentioned in
Answers A and D support Gigabit Ethernet, but since some parts o the network already use
these cables types, it is not necessary to replace them. You might also see multiple-response
questions, essentially multiple choice with more than one correct answer.
Drag-and-drop questions involve dragging and dropping a picture onto the relevant text.
For example, you might see the words “HDMI” and “DisplayPort,” and then two video port
illustrations next to them. You would need to drag the HDMI illustration onto the word
“HDMI” and then drag the other illustration onto the word “DisplayPort.”
Perormance-based (simulation) questions ask you to re-create a real process used by techs
when working on PCs. You might be asked to copy a ile or change a setting in Control Panel,
but instead o you picking a multiple-choice answer, your screen will look like a Windows
desktop and you will ollow the provided instructions, just like you were using the real thing.
Always read the questions very careully, especially when dealing with perormance-based
and multiple-choice questions with two or more correct responses. Remember to look or the
best answer, not just the right answer. Check the CompIA website or the most up-to-date
exam inormation, as CompIA does make changes.
Introduction
Signing Up or Your CompTIA A+
Certiication Exams
So, how do you sign up to take the CompIA A+ certiication exams? As this book went to
press, the procedure looks like this: Go to https://home.pearsonvue.com/CompIA. Click the
Sign In button or, i you don’t already have a Pearson VUE account, click Create Account and
create one. hen, click View Exams, select the 1101 or 1102 exam (you must pass both to
get ully certiied), select your preerred language, review the details, and click Schedule his
Exam. Enter your username and password, choose an exam center, date, and time, and provide
payment or an exam voucher when required. Repeat this process to schedule the other exam.
Be sure to see the Pearson VUE website or the latest details.
You can also now take your tests over the Internet. o schedule an Internet-based exam
through OnVUE, go to www.onvue.com. You’ll need a solid Internet connection and a
webcam, such as one built into most portable computers. Pearson VUE will accommodate any
special needs, although this may limit your selection o testing locations.
A single exam voucher purchased directly rom the CompIA website is $239. However,
there are many sources, including otal Seminars, that oer discounts. Some vendors oer
bundles that include a ree retest voucher. his book comes with a coupon code you can use to
purchase a discounted exam voucher rom the CompIA Store. See the ad in the ront o the
book or more inormation on the code and the discount. ake it rom me, you might like the
opportunity to have a “mulligan” i you get test jitters!
CompIA A+ certiication can be your ticket to a career in I or simply an excellent step in
your certiication pathway. his book is your passport to success on the CompIA A+ Core 1
certiication exam.
Your Guides: Mike Meyers and Ron Gilster
You get a pair o tour guides or this book—both me and Ron Gilster. I’ve written numerous
computer certiication books—including the best-selling CompTIA A+ Certification
All-in-One Exam Guide and the CompTIA Network+ Certification All-in-One Exam Guide.
More to the point, I’ve been working on PCs and teaching others how to make and ix them
or a very long time, and I love it! When I’m not lecturing or writing about PCs, I’m working
on PCs! My personal e-mail address is michaelm@totalsem.com. Please eel ree to contact
me directly i you have any questions, complaints, or compliments.
Ron has written or co-authored many books on career certiication and books on hardware
and sotware principles and troubleshooting, networking, and security. As an educator, he has
developed and taught courses in computer technology, inormation systems, cybersecurity,
and networking. He sees himsel as a trainer, teacher, and guide and works to exhibit these
qualities in his writing. Ron can be contacted at rgilster@pm.me.
xxv
xxvi
Mike Meyers’ CompIA A+ Core 1 Certifcation Passport
About the Book
his Passport is divided into “Domains” that ollow the exam domains. Each Domain is urther divided into “Objective” modules covering each o the top-level certiication objectives
or the Core 1 exam. he goal is to acilitate accelerated review o the exam objectives in a
quick-review ormat that will allow you to quickly gauge what you can expect to be tested on.
Whether you want a last-minute review or you have enough experience that you don’t need
ull coverage o every topic, this ormat is designed or you. his isn’t meant to be a course in a
book, but we hope you will ind the Passport helpul as you prepare or your exam. I you ind
you need more in-depth coverage o the exam topics, we suggest using Mike’s CompTIA A+
Certification All-in-One Exam Guide, Eleventh Edition to supplement your studies.
We’ve created a set o learning elements that call your attention to important items, reinorce
key points, and provide helpul exam-taking hints. ake a look at what you’ll ind:
•
•
Each Domain begins with a Domain Objectives list o the oicial CompIA A+
Core 1 exam objectives, which correspond to the titles o the individual Objective
modules in that Domain. he structure o each Objective module is based on the
subobjectives listed under the corresponding exam objective.
he ollowing elements highlight key inormation throughout the modules:
EXAM TIP
The Exam Tip element focuses on information that pertains
directly to the exam These helpful hints are written by authors who have taken
the exam and received their certification—who better to tell you what to worry
about? They know what you’re about to go through!
Cross-Reerence
This element points to related topics covered in other Objective modules or Domains
ADDITIONAL RESOURCES
This element points to books, websites,
and other media for further assistance
CAUTION
These cautionary notes address common pitfalls or real-world
issues
NOTE This element calls out any ancillary but pertinent information
Introduction
•
•
•
Tables allow or a quick reerence to help quickly navigate quantitative data or lists o
technical inormation.
Video
Cable Type Standard Name
ReducedSignal Types
Size Version Supported
VGA
Video Graphics
Array
N/A
HDMI
High Deinition MiniMultimedia
HDMI
Interace
Notes
Analog video VGA displays can be
connected to HDMI,
DVI-I, and DisplayPort
ports with suitable adapters.
HD video
Video signal is compatible
and HD
with DVI.
audio
Each Objective module ends with a brie Review. he review begins by repeating the
oicial exam objective number and text, ollowed by a succinct and useul summary,
geared toward quick review and retention.
Review Questions and Answers are intended to be similar to those ound on the exam.
Explanations o the correct answer are provided.
Online Content
For more inormation on the practice exams and other bonus materials included with the
book, please see the “About the Online Content” appendix at the back o this book.
Ater you’ve read the book, complete the ree online registration and take advantage o the
ree practice questions! Use the ull practice exam to hone your skills, and keep the book handy
to check answers.
When you’re acing the practice questions, you’re ready to take the exam.
Go get certified!
What’s Next?
he I industry changes and grows constantly, and so should you. Finishing one certiication
is just a step in an ongoing process o gaining more and more certiications to match your
constantly changing and growing skills. Remember, in the I business, i you’re not moving
orward, you are way behind!
Good luck on your certiication! Stay in touch.
Mike Meyers, Series Editor
Mike Meyers’ Certification Passport
xxvii
This page intentionally left blank
Mobile Devices
M A
I
1.0
Domain Objectives
• 1.1 Given a scenario, install and configure laptop hardware and components.
• 1.2 Compare and contrast the display components of mobile devices.
• 1.3 Given a scenario, set up and configure accessories and ports of mobile devices.
• 1.4 Given a scenario, configure basic mobile-device network connectivity and
application support.
1
N
D
O
2
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Given a scenario, install and congure
laptop hardware and components
Objective 1.1
A
lthough an increasing number o laptops have no user-replaceable parts, there are still
many existing and new models rom a variety o manuacturers that will need replacement keyboards, upgraded RAM or mass storage, or other types o upgrades. This objective
gives you the “inside story” on what to expect.
Hardware/Device Replacement
Laptops can break, but when they do, the problem is usually a component that can be replaced.
The most common replacements (or upgrades) include keyboards and other input devices,
hard drives, and RAM, but there are several additional components that you might be called
upon to swap out. Many o these components can be seen in Figures 1.1-1 and 1.1-2.
HDMI port
DVI and
VGA ports
Memory slots
USB ports
CPU socket
Power connector
Audio port
SATA/SSD slots
PCI/PCIe slots
Chipset
CMOS battery
FIGURE 1.1-1
The major components on the top side of a typical laptop system board
DOMAIN 1.0 Objective 1.1
Memory slots
System board
(bottom side)
CPU heat sink and
fan assembly
FIGURE 1.1-2
The bottom side of a typical system board
Cross-Reference
Be sure to apply electrostatic discharge (ESD) precautions when upgrading or replacing laptop
field replaceable units (FRUs). The companion book in this set, Mike Meyers’ CompTIA A+
Core 2 Certification Passport (Exam 220-1102), provides coverage on ESD protections and preventive
measures.
CAUTION Before attempting any laptop hardware or component replacement,
refer to its service or owner’s manual or access it online. Because laptops differ so
much from brand to brand and model to model, the steps vary a great deal, and if you
don’t use proper procedures to disassemble a laptop, you might end up with more
problems than when you started!
Keyboard
Replacing a laptop keyboard varies in diiculty rom model to model. With some laptops,
removing the old keyboard can be as easy as removing a retaining screw rom the bottom o
the laptop and pushing the keyboard up. However, some models require that almost all other
components be removed beore the keyboard can be removed.
NOTE If the built-in laptop keyboard fails and can’t be replaced right away, you
can attach an external keyboard through a USB physical or wireless connection or
through a Bluetooth connection.
3
4
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 1.1-3
The 2.5-inch and 3.5-inch drives are mostly the same.
Hard Drive
The term hard drive is used or a variety o mass storage devices using magnetic or solidstate technologies. You can replace a hard disk drive (HDD), solid-state drive (SSD), or solidstate hybrid drive (HHD or SSHD) easily in any recently manuactured traditional laptop; it’s
almost certainly a 2.5-inch SATA drive (most are 7 mm thick, but a ew thicker drives won’t
it into some laptops). Otherwise, no dierence exists between 2.5-inch drives and their larger
3.5-inch brethren (see Figure 1.1-3).
Hard drive replacement is a little dierent on laptops than on desktops: ind the hard drive
hatch—either along one edge or on the bottom—and remove the screws (see Figure 1.1-4).
Remove the old hard drive, detach its mounting hardware, and install the mounting hardware on the new drive. The mounting hardware might include brackets, shock bumpers, or a
protective cover over the drive’s circuit board (see Figure 1.1-5).
FIGURE 1.1-4
Removing the drive compartment hatch. Some laptops, like this one, use a
single cover for access to hard drives and RAM.
DOMAIN 1.0 Objective 1.1
Shock bumpers
FIGURE 1.1-5
Protective cover
Bumper attachment screws
The mounting hardware on this hard drive must be removed and attached to
the new drive so it will fit properly in the computer.
SATA connectors
Install
Remove
FIGURE 1.1-6
Inserting a replacement drive
Next, slide the new drive into its place (see Figure 1.1-6), making sure it is irmly connected
to the drive interace and secured in place. Reattach the hatch, boot the computer, and install
an operating system (OS) i necessary.
NOTE Some laptops require the user to remove many components before upgrading
the drive. Try to avoid upgrading these systems.
SSD vs. Hybrid vs. Magnetic Disk
One o the best laptop upgrades is to an SSD rom a magnetic disk (HDD). It’s less storage
or the money, but SSDs are aster, lighter, quieter, cooler, use less power, and lack mechanical parts easily damaged by bumps, drops, and travel. SSDs are available in both the traditional 2.5-inch laptop orm actor and smaller orm actors, most notable the M.2 design.
5
6
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
SATA hard drive
FIGURE 1.1-7
M.2 SSD
A laptop with both SATA and SSD drives
Some laptops, like the one shown in Figure 1.1-7, can use both. M.2 SSDs are available in
two types: those that emulate SATA drives as well as versions known as NVMe drives. These
connect to the PCIe bus, which is much aster than the SATA bus.
EXAM TIP Make sure you are familiar with installing and configuring solid-state
drives (SSDs) and magnetic hard disk drives (HDDs).
1.8 Inch vs. 2.5 Inch
Today, 2.5-inch HDDs and SSDs dominate laptop designs, as 1.8-inch HDDs have allen out
o avor due to lash memory usurping their role in portable music players and other small
portables. These days, 1.8-inch HDDs are quite rare. I you encounter one, it almost certainly
will be in an older portable on the small end o the scale.
Cross-Reference
For more on HDDs and SSD, see Domain 3.0, Objective 3.4.
Memory
Some laptops have upgradeable memory (RAM) slots, and other portables may not. RAM or
portable devices, and especially laptop PCs, has its own small outline DIMM (SO-DIMM)
orm actor. Older SO-DIMMs (DDR and DDR2) were conigured with 200-pin expansion
cards. The DDR3 and DDR3L (low-voltage) cards used 204-pin SO-DIMMs, and the 260-pin
DDR4 and 262-pin DDR5 SO-DIMMs. A DDR5 SO-DIMM has a 4800 MT/s (megatransers
per second) data rate and is currently available with 8 GB, 16 GB, and 32 GB memory capacities.
Figure 1.1-8 shows examples o the DDR3, DDR4, and DDR5 SO-DIMMs.
DOMAIN 1.0 Objective 1.1
DDR3 SO-DIMM
DDR4 SO-DIMM
DDR5 SO-DIMM
FIGURE 1.1-8
Examples of DDR3 (top), DDR4 (middle), and DDR5 SO-DIMMs (bottom)
(images courtesy of Micron Technology, Inc.)
NOTE
The DDR5 SO-DIMM may not be backward compatible, even on DDR4
systems.
EXAM TIP Memorize the SO-DIMM form factors—and the associated memory
technologies—for the CompTIA A+ 220-1101 exam. (Note that the CompTIA objectives
use “SODIMM,” without the hyphen.)
When installing RAM, just like with a desktop, protect yoursel and the portable by removing all power and taking ESD precautions. With portables, this includes removable batteries.
I the portable has built-in batteries, consult the manuacturer’s resources to check i and how
you can saely work on it.
CAUTION Some portables have both built-in and removable batteries.
7
8
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 1.1-9
Removing a RAM panel
Once you know you can work saely, consult the manuacturer’s website or manual to
conirm what kind o RAM the portable requires. Next, check the existing RAM coniguration
to conirm what you need to buy. To go rom 4 GB to 8 GB, or example, you need to know
i the portable has one 4-GB module or two 2-GB modules. You should also match the clock
speed and timing o the existing module.
Second, locate the RAM slots. Depending on the system, the RAM slots might be under the
same panel that you remove to access the hard drive (reer back to Figure 1.1-4) or under a
separate panel (see Figure 1.1-9) on the bottom o the portable. Then you push out the retaining clips, and the RAM stick pops up (see Figure 1.1-10). Gently remove the old stick o RAM
and insert the new one by reversing the steps.
Retaining clips
RAM swings up after
retaining clips are released
FIGURE 1.1-10
Releasing the RAM
DOMAIN 1.0 Objective 1.1
Some portables (and desktops) have shared memory that enables the video card to borrow
regular system RAM, providing perormance comparable to its mega-memory alternative at
a much lower cost. Unortunately, the term shared memory is a bit misleading: the video card
reserves this memory, and perormance can suer i the system runs out o it.
EXAM TIP RAM and hard drives are usually the easiest components to replace.
Some CMOS utilities can change the amount o shared memory, while others can just
toggle the setting. In both cases, more system RAM will improve overall perormance when
the OS and CPU get more usable RAM; the upgrade can also improve video perormance i
the system either shares a percentage o all RAM or lets you adjust the amount.
Cross-Reference
For more about laptop and desktop RAM types and specifications, see Domain 3.0, Objective 3.3.
Wireless Card
A wireless card is sometimes relatively easy to swap, as it may be accessible rom the panel
covering the hard drive and/or RAM. Beore choosing an upgrade, make sure you check out
the supported models, as an unsupported card won’t be recognized by your system. I you
upgrade a wireless expansion card, remember to reattach the antenna leads coming rom the
display in the correct locations. Depending on the age o the system, the wireless card might
use a Mini-PCIe (reer back to Figure 1.1-1) or M.2 orm actor.
EXAM TIP Make sure you are familiar with the form factors used for wireless
cards/Bluetooth modules.
Physical Privacy and Security Components
Laptop computers and other mobile devices don’t stay in any one location, by design, which
requires their physical security to be more speciic to them than is the case or stationary
devices. The physical security measures that protect desktop computers can also protect
laptops, but only when the laptops are located within their coverage. A laptop that is moving about requires a special orm o physical security that must also provide or data privacy
as well.
9
10
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Physical Security
The general objective o physical security is to restrict physical access to a device and, in turn,
restrict logical access to its private content. Because a laptop is portable, its physical security
must be portable as well. Certain aspects o physical security are diicult to apply to a laptop,
such as preventing physical proximity, physical contact, and even physical possession. But
wait, aren’t those the physical aspects we need to secure? Yes, but more importantly, we need
to secure any access to private or sensitive inormation or services located on the device. In
other words, or a laptop, physical security amounts to denying access to the laptop’s resources
despite weak or nonexistent physical security.
The A+ Core 1 exam may include questions or content related to two o the methods used
to secure laptops and their stored content: biometrics and near-ield scanning.
Biometrics
Biometrics is used to both identiy and authenticate someone attempting to gain access to
a laptop and its resources. Biometrics involves the capture o one or more human traits or
comparison against a prerecorded standard o the same measurements. Common biometric
scans used with laptops and mobile devices include voice recognition, a ingerprint, the
recognition o acial eatures, or an iris or retina scan o an eye.
Much like how a password is established as a control device, any o these biometric
measurements and scans require a baseline capture to which uture scans will be compared.
Biometrics is, or the most part, reliable, and as the technology continues to develop, it
becomes more and more reliable. However, biometric systems can produce two security laws
that, just like a password, require monitoring and the renewal o the baseline: alse negatives
and alse positives.
A alse negative occurs when the biometric scan o an authorized user results in the user
being denied access. On the other hand, a alse positive, which many be a more troublesome
problem, occurs when an unauthorized supplicant is granted access in error.
NOTE The Windows Biometric Framework (WBF), located on the Windows Control
Panel, provides native support for the interface, management, and control of biometric
devices interfaced to a computer.
Near-Field Scanners
Although the technology is more o a protective application than a pure security measure,
near-ield scanning can saeguard a computer rom harm by detecting electromagnetic
intererence (EMI) within a conigured range o a device. As mobile devices move about, EMI
signals in an area may be strong enough to cause damage to system and power components.
DOMAIN 1.0 Objective 1.1
A near-ield scanner measures the amount o voltage in a time period or by requency and
quantiies it. The resulting metric is used to determine i a threat exists and, i so, to alert the
user. Older near-ield scanning systems used an onboard antenna, but more recent systems
employ a scanner receiver to detect any electrical charges in its vicinity. Understand, though,
that near-ield scanning works over relatively small distances.
REVIEW
Objective 1.1: Given a scenario, install and configure laptop hardware and components Laptop hardware and component issues you might deal with include the ollowing:
•
•
•
•
•
Keyboard replacement
Hard drive (2.5 inch) removal and installation
Use an SSD (2.5 inch or M.2), i you can, to improve perormance and durability.
Memory (SO-DIMM) types and their removal and installation
Wireless card removal and installation
Biometric devices or authentication and identiication security
•
1.1 QUESTIONS
1. Your client wants you to upgrade the RAM, wireless cards, and storage in a collection
o laptops rom dierent vendors. Which o the ollowing do you need to perorm the
work successully? (Choose all that apply.)
A. Service manual or each model
B. Specialized tools
C. Speciications
D. All o the above
2. You are speciying the components you want in an ultimate gaming laptop. Which o the
ollowing standards provides the best opportunity or high-perormance mass storage?
A. SATA
B. USB
C. M.2
D. Mini-PCIe
3. Which o the ollowing laptop components typically requires the least disassembly to
swap or upgrade?
A. Hard drive
B. RAM
C. CPU
D. Smart card reader
11
12
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
4. Your client wants to switch rom SATA hard disk to SATA SSD storage in their leet o
laptops. Which o the ollowing pieces o advice is most likely to be correct?
A.
B.
C.
D.
Buy M.2 drives because all laptops have M.2 slots.
SSDs are no aster than hard disk drives, so don’t bother switching.
Replacing hard disk drives with SSDs can provide better perormance.
SSDs are more ragile than hard disk drives.
5. Your client has stripped components rom retired laptops to use or replacement parts
in more recent laptops. Which o the ollowing is most likely to be compatible with a
newer laptop?
A. Hard drive
B. RAM
C. Wireless card
D. Optical drive
1.1 ANSWERS
1. D A service manual provides detailed teardown and reassembly instructions;
specialized tools help you open cases without breaking parts; speciications inorm
you o standard eatures and supported upgrades.
2. C
M.2 drives using NVMe are the astest mass storage devices.
3. B Most laptops with upgradeable RAM have the modules under an easy-to-remove
panel on the bottom o the case.
4. C SSDs in the SATA orm actor provide aster perormance than SATA hard
disk drives.
5. A As long as a SATA 2.5-inch hard drive will physically it into a laptop, it can be used
as a replacement (a ew hard drives are too thick or some laptops, but that is rare).
Objective 1.2
T
Compare and contrast the display
components of mobile devices
he displays on or in mobile devices, including those on laptop computers, are very complex
components. As a certiied A+ technician, you can expect to encounter, troubleshoot, and
diagnose the displays across the gamut o mobile devices, which will likely include smartphones,
tablet, laptop, and notebook PCs, and other smaller handheld devices. This objective covers the
subjects, topics, and content you can expect to see on the A+ Core 1 exam (220-1101).
DOMAIN 1.0 Objective 1.2
Types of Displays
As mentioned, mobile devices are available in an expanding range o sizes and capabilities,
which are determined by the technology each uses to create a displayed image. The overall size
o a mobile device is largely a unction o its display’s size and its technology. A mobile device’s
display, which is commonly a liquid crystal display (LCD) or an organic light-emitting diode
(OLED), typically ranges rom 3 inches to as much as 20 inches on some laptop PCs.
LCD
An LCD display is backlit with light-emitting diodes (LEDs). Mobile devices incorporate three
LCD display types: twisted nematic (TN), vertical alignment (VA), and in-plane switching
(IPS). Table 1.2-1 compares these display types or perormance and quality.
ADDITIONAL RESOURCES
For some additional information on the
different LCD types, read the article “Monitor Panel Types | TN, IPS, VA Pros and
Cons Explained – Pick the Right Display Technology!” by Dusan Stanar at the VSS
Monitoring website (https://www.vssmonitoring.com/monitor-panel-types/).
EXAM TIP Know the differences between the IPS, TN, and VA LCD technologies.
LED
An LED display on a mobile device uses light-emitting diodes (LEDs) to construct and show
images, typically on a lat-screen display. An LED display provides a bright color image with
higher eiciency that other types o monitors, including an LCD. In act, an LED display
consumes as much as 50 percent less power than an LCD, which is important to the lie o the
battery in a mobile device.
TABLE 1.2-1
LCD Displays on Mobile Devices
Criteria
TN
VA
IPS
Perormance
Faster than
VA and IPS
Worse than
VA and IPS
Slower than
TN and IPS
Better than TN,
worse than IPS; good
color; best contrast
and image depth
Worse than TN,
better than VA
Better than TN and VA;
best viewing angles;
best color
Display
13
14
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
An LED is a type o semiconductor that emits light when electricity is passed through it. An
LED contains red, green, and blue sub-pixels that can blend to produce a particular color or
shade. There are our primary types o LED displays:
•
•
•
•
Edge-lit LED This is actually an LCD monitor that has LEDs along the edges o the
display that shine light toward the center o the display to light an image. The LEDs
enable the displayed image to be viewed rom several angles.
Full-array LED As its name implies, a ull-array LED display has LEDs throughout
the display area to produce sharp images and iner dimming. This type o display is
popular on gaming and video streaming systems.
Direct-lit LED This type o LED display places LEDs in rows, which limits its
capability to produce true colors, including black. Its images are in gray tones only.
Organic LED (OLED) OLEDs provide a superior display quality without separate
backlighting. OLEDs illuminate pixels using negatively and positively charged ions.
The three other orms o LEDs, and LCDs as well, use backlighting to sharpen their
images, but OLED pixels provide all the light needed.
Display Panel Components
The display panel o a mobile device, especially laptops and notebook PCs, typically contains
more than just the display. The display panel typically also houses the Wi-Fi antenna and the
onboard webcam and microphone. There is a dierence between a display panel, which is
essentially the “lid” o the mobile PC, and the display assembly, which is only the display itsel
and its connecting wires and components.
Because the same panel can work in a wide variety o laptop models, inding a compatible display panel is easier than inding a compatible display assembly, and purchasing only
a panel is less expensive than purchasing an assembly. In a ew cases, it might be possible to
switch screen types (rom matte to glossy, or example). When swapping the panel only, take
particular care to note the placement o component wires and how they are routed around
the panel.
The ollowing sections cover the system components commonly included in a display
panel.
EXAM TIP Expect a question or two on the A+ 220-1101 exam involving a typical
scenario that requires the replacement of the screen or components in the screen
(for example, a cracked display panel, digitizer/touchscreen failure, Wi-Fi antenna
malfunction, and so on).
DOMAIN 1.0 Objective 1.2
Wi-Fi Antenna Connector/Placement
A broken mobile device display can be serviced in one o two ways: replace the entire display
assembly or swap the display panel only.
NOTE CompTIA’s specific language for the antenna is Wi-Fi antenna connector/
placement (although the industry-standard term is Wi-Fi ). This refers to the wireless
antenna wires that run along the top and sides of the screen assembly and connect
to the Wi-Fi card.
When you’re swapping a display assembly, it’s important to note how the Wi-Fi antenna
wires are connected to the wireless card. Even i you are only swapping a panel, you might need
to move the wires out o the way. When you ind it necessary to move them, it’s important to
properly position the Wi-Fi antenna wires around the panel and reconnect them to the wireless card. I they are pinched or broken, the laptop’s Wi-Fi will stop working.
Figure 1.2-1 illustrates the position o Wi-Fi antenna wires and other components in a
typical laptop display assembly.
Camera/Webcam
The camera/webcam (reer to Figure 1.2-1) is also built into the display assembly. The webcam
can be replaced i it stops working. However, it’s usually easier to replace a ailed webcam with
a USB version. I you decide to replace the webcam, be sure to note how it is attached to the
display assembly and connected to the system board.
Secondary (aux)
wireless antenna
Webcam
Aux antenna wire Display interface cable
FIGURE 1.2-1
Primary wireless antenna
Inverter
Primary antenna wire
Wi-Fi antennas and other components in a typical laptop display panel
15
16
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Microphone
Some laptops include a microphone in the screen assembly, while others place the microphone in the base o the laptop. I the laptop has a microphone in the screen assembly, be sure
to disconnect it beore swapping the screen assembly and be sure to reconnect it during the
replacement process.
Inverter
Laptops that use older LCD screens with cold cathode luorescent lamp (CCFL)
backlighting require an inverter to convert DC power to AC power to control the backlight (reer to Figure 1.2-1). I the inverter ails, the screen will be extremely dim (use a
lashlight to see i the screen still works). Replacing an inverter is a relatively easy and
inexpensive repair to make because it is accessed rom the bottom o the display assembly
and is a plug-in component.
Touchscreen/Digitizer
Older laptops oten used a separate touchscreen/digitizer layer, making repairs both
expensive and more complicated. (A digitizer is the component that provides the “touch”
part o a touchscreen. The digitizer’s ine grid o sensors under the glass detects your
inger’s touch and signals to the OS its location on the grid.) Recent touchscreen laptops
typically use display panels with integrated touchscreens, making the process o swapping
the panel easier.
REVIEW
Objective 1.2: Compare and contrast the display components of mobile devices A typical
laptop display assembly includes the ollowing:
•
•
•
•
•
•
•
LCD panel (standard) or OLED panel (only very recent laptops)
• LCD has a luorescent or LED backlight.
• OLED has no backlight.
Wi-Fi antenna wires
Camera/webcam
Microphone (might be built into the base on some models)
Inverter, but only on older LCD screens with luorescent backlights
Touchscreen/digitizer (might be a separate display panel layer on older models)
LCD technologies, including IPS, TN, and VA
DOMAIN 1.0 Objective 1.2
1.2 QUESTIONS
1. Your client has a cracked laptop screen, but the laptop still works. Which o the
ollowing might be the most cost-eective solution?
A.
B.
C.
D.
Replace the display panel.
Replace the display assembly.
Replace the laptop.
Replace the laptop with a desktop.
2. Your client decided to have a laptop display assembly swapped. Now, the Wi-Fi
connection doesn’t work. Which o the ollowing is the most likely cause?
A. The webcam was plugged into the wireless card.
B. The Wi-Fi card was not reconnected to the wireless antennas.
C. The new assembly is not compatible with the current wireless card.
D. Wi-Fi wires were broken during the swap.
3. A user reports that an older laptop isn’t displaying anything. However, when you
plug in an external display, the laptop can be used. Which o the ollowing would
you check irst?
A. Digitizer
B. Microphone
C. Inverter
D. Wi-Fi antennas
4. The wireless antennas in a laptop display assembly are usually located where?
A. Lower-let and lower-right corners o the display
B. Bottom center o the display
C. Top center o the display
D. Top-let and top-right corners o the display
5. Your client uses a laptop or live chats with her salesorce, but her webcam has ailed.
The weekly chat is in two hours. What should you do?
A. Arrange or an express swap o her display assembly.
B. Connect a USB webcam.
C. Reimage a spare laptop.
D. Advise her to cancel the chat.
1.2 ANSWERS
1. A Replace the display panel. The other components in the display assembly are
working, so replacing only the panel is likely to be cheaper and probably aster than
swapping the entire display assembly.
17
18
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
2. B The Wi-Fi card is in the laptop base, so the wireless antenna wires must be
disconnected to swap a display assembly. It’s easy to orget to reattach them.
3. C Check the inverter (on older laptops so equipped). When it ails, the built-in
display becomes extremely dim.
4. D The antennas usually are located in the upper-let and upper-right corners o
the display assembly.
5. B A USB webcam will work ine, may have better image quality than the built-in
webcam, and can be installed and conigured in plenty o time or the meeting.
Objective 1.3
Given a scenario, set up and congure
accessories and ports of mobile devices
M
obile devices are small and portable, but thanks to a variety o wired and wireless
connections, they can also be versatile. In this objective you are introduced to the main
types o accessories available or mobile devices and the ways in which they can be connected.
Connection Methods
Mobile devices have many o the same types o connections and options as desktop devices do.
These include wired ports, wireless devices, and accessories. Wired connections can be used
or data synchronization and transer to a larger computer, or charging, and or tethering to
share a cellular connection. You need to be able to identiy several wired connection types or
the CompTIA A+ 220-1101 exam.
Universal Serial Bus
The universal serial bus, which is most commonly reerred to as USB, connects a wide variety
o devices to other devices, such as printers, external storage devices, keyboards, mice, and
other controllers. USB has replaced the standard serial and parallel interaces or the most
part. Like these interaces, USB provides or data transmission but also supplies 5 volts (5V) o
power through a standard connection and cable. This allows low-voltage devices (those needing 5V o power or less) to connect and operate without requiring additional external power
sources. A single USB jack has the capability o supporting as many as 127 USB devices using
a series o unpowered USB hubs. USB devices that need more than 5V o power can connect
through a powered USB hub that connects directly to a power source.
Since their introduction in the mid-1990s, the USB standards have expanded to a variety o
versions and connector conigurations, oten distinguished by their overall size and pin array.
DOMAIN 1.0 Objective 1.3
USB connectors are identiied in a conusing overlap o types (aka generations and orm
actors) and versions that speciy the cabling and transer speeds, among other characteristics.
Types and versions are commonly used interchangeably and in combination. However, simply
put, USB types are denoted by letters (as in A, B, and C) and USB versions by numbers (such
as 2, 3, and 4). The sections that ollow explain the USB types and versions you should know
or the A+ Core 1 exam.
NOTE USB standards advanced from the original USB 0.7 to the developing
USB 4.0. Market acceptance, or the lack of it, drove the early developments, but the
first version to gain acceptance was USB 1.1. USB versions 1.0 and 1.1 were later
renamed as USB 2.0 LowSpeed and USB 2.0 FullSpeed, respectively.
There are three basic USB types or orm actors:
•
•
•
Type-A The original and likely most commonly used USB connector
Type-B Smaller, squarish-shaped connector compatible with nearly all other
USB types
Type-C Asymmetric and slightly oval connector
Figure 1.3-1 shows each o these USB types.
USB-C
A USB-C cable, shown in the upcoming Figure 1.3-3, uses Type-C 24-pin connectors or
transerring power o up to 100 watts and data as ast as 10 Gbps. These capabilities make
the USB-C cable suitable or connecting video devices, such as monitors, transerring data
between computers or phones, and charging any compatible devices. A standard USB-C cable
has Type-C connectors at each end, but there are USB-C to USB-A converters that can be used
or interacing with USB Type-A ports. One o the better eatures o a USB-C/Type-C connector is that it is completely reversible and can be inserted into a plug with either side up.
Type-A
FIGURE 1.3-1
Type-B
Type-C
The three basic USB connector types
19
20
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 1.3-2
A micro-USB cable with a USB 3.0 connector
Micro-USB
The micro-USB connector is the smallest o the USB types and has been commonly used or
connecting and charging mobile devices, such as MP3 players, smartphones, cameras, and
more. There are several varieties o micro-USB cables, each intended to connect a micro-USB
device to another USB port, commonly o a dierent type and typically a USB 3.0 or Type-C
connector. Figure 1.3-2 and Figure 1.3-3 show examples o this cable.
There are a variety o micro-USB cables, each having a dierent USB type connector on
the other end o the cable. Commonly used micro-USB cables are the micro-USB to Type-A,
micro-USB to Type-B, and the USB 3.0.
Mini-USB
The mini-USB is essentially a sub-amily o USB cables that includes versions with Type-A,
Type-B, and hybrid Type-AB connectors. The most commonly used mini-USB connector is
the 5-pin Type-B, which is popular in card readers, MP3 players, digital cameras, and many
mobile PC storage devices. All mini-USB interaces are sealed and essentially waterproo and
dustproo. However, because they are smaller in size than other USB types, which is both a
plus and a disadvantage, they are easily misplaced and can be diicult to remove rom a device.
FIGURE 1.3-3
From left to right: USB-C, micro-USB, and Lightning cables
DOMAIN 1.0 Objective 1.3
Lightning Connector
The Lightning connector was introduced in 2012 along with the iPhone 5 and several other
Apple products or use in charging and synchronizing its devices. Apple continues to use the
Lightning connector or its iPhones but has switched some devices to the USB-C interace. An
example o a Lightning cable is shown in Figure 1.3-3.
Lightning is an 8-pin digital signal connector that can be attached to a device with dualorientation, meaning no up or down sides. Each o the pins is connected directly to the reverse
side pin in its position.
Cross-Reference
To learn more about these cables, their features, and how they are used, see Domain 3.0,
Objective 3.1.
Serial Interfaces
The A+ Core 1 exam objectives indicate that you may encounter serial interaces on the 220-1101
exam. So, let’s take a quick look at this topic.
At one time, the peripheral devices on a PC were connected primarily as either a serial
or a parallel interace. Simply deined, a serial interace sends or receives data one bit at a
time in a series or in what is known as a temporal (time) ormat. In comparison, a parallel
interace transmits data on a set o parallel carriers, usually wires, as a spatial group. Here’s
the short version: serial is one bit at a time on one wire and parallel is more than one bit at
a time and more than one wire. Serial interaces are used by USB and Serial Attached SCSI
(SAS) devices.
Near-Field Communication
Near-ield communication (NFC) uses chips embedded in mobile devices that create
electromagnetic ields when these devices are close to each other or touching each other
(typical ranges are anywhere rom a ew centimeters to only a ew inches). The ields can be
used to exchange contact inormation, small iles, and even payment transactions through
stored credit cards using systems like Apple Pay and Google Pay.
The OS determines the exact eatures o a smartphone. For example, Apple supports NFC
only or Apple Pay, while Android smartphones also support ile transer.
Bluetooth
Bluetooth is a short-range wireless technology that can be used or personal area networking, connections to wireless speakers, mice, and keyboard devices, as well as connections to
headsets, microphones, and wearables. Bluetooth implementations in mobile devices generally
have a range o no more than 10 meters (about 33 eet).
21
22
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Hotspot
Many smartphones and tablets with cellular support can share their cellular Internet connection with other devices by enabling a hotspot. The hotspot eature turns the device into a wireless router with an SSID (service set identiier) and password. When the hotspot device shares
that inormation with Wi-Fi-enabled devices, those devices can connect to the Internet. The
range o a hotspot connection varies according to the Wi-Fi standard used by the smartphone
and the location (outdoors has a longer range than indoors).
EXAM TIP Be able differentiate the wireless connection types, including NFC,
Bluetooth, and hotspot.
Accessories
Although mobile devices have many built-in eatures, they can use accessories to provide even
more unctionality. The ollowing sections describe the accessories you need to understand or
this objective.
Touch Pens
Also known as a stylus, a touch pen is a handheld pointing device that can be used on capacitive touchscreens. Touch pens can be used on smartphones, tablets, and other devices with
touchscreen displays. A touch pen works much like your inger in that it absorbs the electricity
o the touchscreen and identiies a speciic location on the display.
Headsets
Headsets can connect to mobile devices via traditional 3.5-mm mini-jacks, USB, or wirelessly
via Bluetooth. Headsets designed or use with smartphones or gaming include microphones.
Speakers
Mobile devices oten have very small speakers with limited power. To increase volume and
make it easier or groups to hear music, connect external speakers via 3.5-mm speaker jacks
or wirelessly via Bluetooth.
Webcams
A webcam is a small digital camera that can be connected to a computer to capture video
images in real time. Like any digital camera, a webcam captures images using a matrix o light
detectors in a light-sensing chip, which is either a charge-coupled device (CCD) or a CMOS
image sensor (the most common these days). The name “webcam” reers more to its sotware
that ormats the video or the Web.
DOMAIN 1.0 Objective 1.3
FIGURE 1.3-4
Port replicator (bottom) versus docking station (top)
Docking Station
Business-oriented laptops can connect (Transformers style) with docking stations that provide
a host o single- and multi-unction ports. The typical docking station uses a proprietary
connection but adds ports or devices not available on the original laptop, such as a network
port, optical drive, and so on (see Figure 1.3-4, top device).
Port Replicator
A port replicator provides a permanent home or video, network, and audio cables that you
would otherwise attach to and detach rom a laptop as you move it around. Port replicators
typically connect to the highest-bandwidth port (such as USB 3.0, 3.1, 3.2 and USB-C or
Thunderbolt) and subdivide the bandwidth among port devices. Figure 1.3-4 shows a typical
port replicator or a MacBook Pro or Air compared with a docking station or a Microsot
Surace Pro.
EXAM TIP The difference between port replicators and docking stations is
sometimes unclear. For purposes of the CompTIA A+ 220-1101 exam, a docking station
connects to a proprietary port, whereas a port replicator connects via a standard port.
The Microsoft Surface Dock shown in Figure 1.3-4 is a true docking station because it
plugs into the proprietary charging/docking port on the Surface Pro and adds a network
port. The third-party port replicator for macOS-based laptops connects to a Thunderbolt
port on a MacBook, MacBook Air, or MacBook Pro.
23
24
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Trackpads and Drawing Pads
A trackpad is a user interace device that senses downward pressure and movement that is
converted into cursor or pointer locations and movements. Also known as a touchpad, a
trackpad is included in many laptop computers as an alternative to an external mouse. Trackpads and drawing pads, which are typically used with a stylus, work much like touchscreens
and touch pens in that the touch device grounds the pad and its location is passed to the
computer to move a visible cursor.
REVIEW
Objective 1.3: Given a scenario, set up and configure accessories and ports of mobile
devices Mobile devices eature various types o connections and accessories, including
the ollowing:
•
•
•
•
•
•
•
•
•
•
•
•
•
Universal serial bus (USB), including USB-C, micro-USB, and mini-USB
Lightning
Serial interaces
Near-ield communication (NFC)
Bluetooth
Hotspots
Touch pens
Headsets
Speakers
Webcams
Docking stations use a proprietary connection but add ports or devices not available
on the original laptop, such as a network port and optical drive.
Port replicators provide a permanent home or video, network, and audio cables that
you would otherwise attach to and detach rom a laptop as you move it around.
Trackpads/drawing pads are typically used with a stylus and work much like touchscreens
and touch pens in that the touch device grounds the pad and its location is passed to
the computer to move a visible cursor.
1.3 QUESTIONS
1. Which o the ollowing is not a wired connection type ound on many mobile devices?
A. Micro-USB
B. Mini-USB
C. USB-C
D. NFC
DOMAIN 1.0 Objective 1.3
2. Bluetooth can be used or which o the ollowing accessories? (Choose all that apply.)
A. Headset
B. Battery pack
C. Game pad
D. Speaker
3. Your supervisor asks you about using a smartphone to make a payment at a convenience
store. Which eature needs to be activated?
A. USB
B. Tethering
C. NFC
D. Hotspot
4. Your client has just purchased a new model iPad Pro. Which type o charge/sync cable
does she need to use?
A. Lightning
B. USB-C
C. Thunderbolt
D. 30-pin
5. You’re prevented rom connecting your laptop computer to a video display because
the laptop lacks an HDMI port. Which o the ollowing devices could be used to solve
this problem?
A. Lightning cable
B. USB-C hub
C. Port replicator
D. Serial cable
1.3 ANSWERS
1. D An NFC connection is a type o wireless interace. The other answers are
common types o wired connectors into which a matching cable can be inserted.
2. A C D Bluetooth cannot be used or battery charging but works with Bluetoothequipped speakers, headsets, game pads, and other input/output devices.
3. C Near-ield communication (NFC) can be used or cardless payment at
convenience stores.
4. B
The newest iPad Pro models have switched rom Lightning to USB-C.
5. C
A port replicator or docking station may supply the missing HDMI port.
25
26
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Objective 1.4
Given a scenario, congure basic
mobile-device network connectivity
and application support
I
n this objective, you learn how to conigure mobile devices, including cellular and wireless
devices, or e-mail and other mobile applications.
Wireless/Cellular Data Network (Enable/Disable)
The majority o today’s mobile devices are able to connect to two dierent communication
technologies to access a network, including the Internet: cellular (cell phone) and wireless
(Wi-Fi) networks. Only recently has either o these mediums been a viable means o connecting to a network rom a mobile device.
Mobile Device Communication
Cellular networks became a usable way to connect to a network, and especially to the Internet, with the introduction o the ourth-generation (4G) long-term evolution (LTE) cellular
technologies. The emerging 5G standard will improve the perormance o cellular-based network access and provide the technology to support a merger o cellular networking with
Wi-Fi standards.
A Wi-Fi network connection applies the IEEE 802.11 standard that is appropriate and
compatible with the wireless communication technology o the particular mobile device.
Wi-Fi communications are over the air radio requency (RF) communications.
Cross-Reference
For more information on the IEEE 802.11 wireless networking standards, see Domain 2.0,
Objective 2.3.
Regardless o the technology used to access a network rom a mobile device, this
capability likely needs to be conigured and enabled (or disabled, i so desired). Generally,
these actions are perormed in the Settings or Preerences page o a system, using roughly
the same steps.
By deault, cellular-enabled devices, such as smartphones and some tablets, are enabled or
communication to cellular data networks. However, on non-cellular (that is, Wi-Fi) devices
such as laptops, notebooks, and some tablets, these connections must be conigured and
enabled manually.
DOMAIN 1.0 Objective 1.4
Mobile devices such as laptops, notebooks, and some tablets running a ull operating
system, such as Windows, macOS, or Linux, have deined methods or coniguring and
enabling a connection to one or both o the communication mediums. Tablets, personal
digital assistants (PDAs), and smartphones that are running a specialized version o Windows
or macOS, or a version o Android or IOS, use a process that is particular to that system to
enable or disable network communications over either technology.
EXAM TIP For the A+ Core 1 exam, you should know the general process involved
to enable, share, and disable access to a network over a cellular or Wi-Fi network on a
mobile device.
Enabling/Disabling Cellular Communication
Smartphones and cellular-based tablets, by deault, have a Subscriber Identiication Module
(SIM) card or an embedded SIM (eSIM) that permits the device to connect and communicate
with a speciic cellular network service such as LTE or broadband. Some laptops and tables
may have an eSIM, but or the most part, these devices must connect to a cellular service
though a USB cellular modem (see Figure 1.4-1) or a cellular router device. Cellular modems
commonly have their own speciic conigurations that are typically set by deault.
The process used on a Windows laptop to conigure and enable a connection to the Internet
using a cellular network involves the ollowing steps:
1. Insert the SIM card into its holder, slot, or USB modem. Without a SIM or eSIM,
cellular communications cannot be conigured.
2. Access the Start menu and click the gear wheel icon on the let edge o the window to
open Settings.
3. On the Setting menu page, click the Network & Internet selection.
FIGURE 1.4-1
A USB cellular modem with a SIM card adapter
27
28
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
4. On the Network and Internet page, select Cellular rom the let-hand panel and do the
ollowing:
a. In the Data Roaming Options drop-down menu on the right-side o the page, select
either Don’t Roam (which is the deault selection) or Roam.
NOTE
The preceding action sets a value for the InternetAlwaysOn DWORD of the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WwanSvc\RoamingPolicyForPhone\ key.
b. Close Settings.
ADDITIONAL RESOURCES
For information on a few other options for using
a cellular connection on a Windows 10 or 11 system, visit https://support.microsoft.com/
en-us/windows/cellular-settings-in-windows-905568ff-7f31-3013-efc7-3f396ac92cd7.
Enabling/Disabling Wi-Fi Communication
On a Windows 10 system, the steps used to access the settings to enable or disable Wi-Fi are
ound by choosing Settings | Network & Internet | Wi-Fi. On the Wi-Fi page, this service can
be set on (enabled) or o (disabled) using a slide switch, as shown in Figure 1.4-2. (This igure
also shows the other connection options available. I a cellular service is available, it would also
be listed.) On handheld mobile devices, you should reer to the user’s manual or how to enable
or disable Wi-Fi services.
Making a Wi-Fi connection on a smartphone or tablet is essentially the same as the process
used on a laptop. The settings involved are relatively intuitive: on an iPhone they are under
Wi-Fi, and on an Android device they are under Wireless and Networks. Much like with other
mobile devices, the Wi-Fi networks within range are listed and you can select one to connect
with temporarily or conigure one as the deault Wi-Fi network.
Wireless Generations
To date, there have been ive major “generations” o wireless and cellular communications.
Figure 1.4-3 illustrates the path o the generations. Each generation provided important
improvements in the technologies and capabilities o wireless telecommunications. Here is a
brie summary o each o the generations:
•
•
The irst generation (1G) cellular network provided narrow band analog service with a
very limited number o simultaneous callers.
The second generation (2G) introduced digital transmissions on wider requency bands
with greater mobility. 2G introduced digital encryption o conversations.
DOMAIN 1.0 Objective 1.4
FIGURE 1.4-2
•
•
The Network & Internet settings page on a Windows 10 system
The third generation (3G) added several security eatures, transmission types, global
roaming, and data transmission speeds, which are in the range o 144 Kbps to a
theoretical 2 Mbps. 3G provided eatures that included video conerencing, instant
messaging, and cellular VoIP. 3G provided or two-way authentication between a
phone and a network.
The ourth generation (4G) uses an IP-based system and higher transmission rates.
4G provides data speeds o 50 Mbps to 80 Mbps (LTE+) to a maximum distance o
31 miles (endpoint device to tower). 4G provides security eatures such as secured
data in transit, authenticated access, and support or 3DES and AES encryption.
29
30
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 1.4-3
•
1G
2G
3G
4G
5G
Analog
Messaging
Wireless
Internet
Mobile
broadband
Unlimited
data
Each of the five generations in telecommunications introduced major
developments in mobile and cellular communications.
The ith-generation (5G) telecommunications standards deine a radio access
technology (RAT) separated into two requency ranges: Frequency range 1 (FR1)
supports the sub-6 GHz bands o the earlier standards and the 410 MHz to 7.125 GHz
spectrum. Frequency range 2 (FR2) supports the range 24.25 GHz to 52.6 GHz. 5G,
which is built on the 4G LTE standard, provides data speeds o multiple Gbps or more.
Hotspot
A mobile hotspot device creates a Wi-Fi network to share its cellular data connection (3G, 4G,
4G LTE, or 5G) with other Wi-Fi devices. Wireless providers sell standalone hotspot devices
or their network, but many smartphones and tablets with cellular access can be conigured to
act as a hotspot. As illustrated in Figure 1.4-4, enabling a smartphone (in this case, an Android
smartphone) involves enabling a cellular data connection and toggling the hotspot setting.
The hotspot coniguration enables the device to interact with the Wi-Fi network and serve
as a router between it and the cellular network. You should also conigure a password to limit
access to the hotspot.
FIGURE 1.4-4
The sequence of screens (left to right) and selections for configuring an
Android phone as a Wi-Fi hotspot
DOMAIN 1.0 Objective 1.4
NOTE
Some devices use the term tethering as a synonym for hotspot.
GSM vs. CDMA
The two primary service protocols used or cellular phone systems are Global System or
Mobile Communications (GSM) and code division multiple access (CDMA). GSM is the
generally deployed standard and is replacing CDMA slowly, but there are still CDMA networks
deployed. Both o these network standards provide about the same eatures and capabilities,
but their major dierence is their portability. A GSM SIM card can be removed and installed
into a new device with the same provider or that o another provider. CDMA devices are tied
to a provider and must remain so.
Preferred Roaming List Updates
As mobile devices travel, they requently have to pass through areas that don’t have strong
signals, or into areas that the carrier does not service, and maintain connection by roaming
on another carrier’s network. Your phone’s irmware gets occasional updates to its preferred
roaming list (PRL), a priority-ordered list o other carrier networks and requencies, sent via
your phone’s cellular connection (called baseband updates, or over-the-air updates) or through
normal OS updates. Updates to the PRL are also sent to cell towers. As the PRL is updated,
devices can roam urther rom their own providers’ coverage area.
CDMA devices may also receive product release instruction (PRI) updates that modiy a
host o complex device settings. Don’t worry about speciics, here—but a device may need PRI
updates i the network is evolving during the lietime o the device, the device is moving to a
new network, or the device has a new owner.
EXAM TIP PRL updates are handled automatically during firmware/OS updates.
They are only for CDMA networks. No one but the nerdiest of nerds will ever see
these updates.
Bluetooth
As discussed in the previous objective, Bluetooth is a popular way to connect many dierent
types o accessories. Table 1.4-1 covers the process o using Bluetooth on a mobile device.
EXAM TIP Given a scenario, know the setup process for Bluetooth pairing.
31
32
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
TABLE 1.4-1
Bluetooth Setup Process
Step
What It Does
Enable Bluetooth.
Enable pairing.
Turns on Bluetooth connectivity.
Enables the device to ind and be ound by other
Bluetooth devices.
Locates and lists nearby Bluetooth devices available to
pair with (headset, keyboard, and so on).
Makes the pairing connection between the Bluetooth
host and device.
Conirms that the devices can communicate. Use the
Bluetooth device to play music, record audio, type,
and so on.
Find a device or pairing.
Enter the appropriate PIN code or
press a button on the device.
Test connectivity.
Two or more paired Bluetooth devices create a personal area network (PAN). Figure 1.4-5
illustrates a very simple PAN, in which each device is paired with other devices in range to
create a network. Another Bluetooth network topology is a scatternet, which combines two
PANs by connecting a device rom either side to link the PANs. Figure 1.4-6 illustrates a
simple scatternet.
Cellular Location Services
Cellular location services use real-time location tracking to identiy a mobile device’s physical
and geographical locations. This technology tracks your location constantly, not just at one
Smartphone
Laptop
Desktop
Printer
Tablet
FIGURE 1.4-5
A Bluetooth personal area network (PAN)
DOMAIN 1.0 Objective 1.4
Bridge link
PAN #1
PAN #2
FIGURE 1.4-6
A Bluetooth scatternet connects two or more PANs.
particular moment. A mobile device commonly includes one or more technologies able to
determine its current location. In most cases, these technologies are GPS, radio requency ID
(RFID), Wi-Fi, and cellular RF technology. In order to unction, a mobile device uses one or
more o these technologies to interact with other devices, which may include geopositioned
satellites, network routers, and cell and communication towers. This interaction, which
involves a mobile device communicating with one o the multiple types o communication
hubs, is used to nail down a device’s precise location. This eature, known as Location Services
in iOS and Location in Android, is used by mapping and several other types o apps, but only
you provide the apps with permission to use this eature.
Most cellular systems use a triangulation method to determine the general location o a
trackable device. As shown in Figure 1.4-7, the distance to each o three (and possibly more)
cellular service towers can cause the transmitted signal strength to weaken. The degree to
which the signal does weaken is used to determine the distance to the tower. The distance
calculations or each tower are combined to locate the device.
Cellular towers
Signal degradation = Distance
Mobile device
FIGURE 1.4-7
A process called triangulation is used to determine the location of a device.
33
34
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
There are many pros and cons to enabling location services on a cellular or mobile device.
Enabling location services can provide a route-inder application with a starting point and
the capability o tracking progress. In an emergency, irst responders are able to pinpoint the
phone’s exact location. You can also let selected riends see your location on their smartphones.
There are many other possibilities with location services turned on.
On the other hand, it may not always be sae to broadcast your location. You can’t be sure
exactly who may be receiving that inormation. Knowing where you are could lead to stalking
or robbery. And knowing where you aren’t could lead to someone breaking into your home.
It’s debated whether the police or a government agency knowing and tracking your location,
without a warrant to do so, could be a violation o your civil rights.
Disabling location services on a mobile device won’t completely mask its location. Several
applications, and even phone calls, connect to the nearest cell tower, which has a location.
Perhaps the only way you can hide your personal location is to not have the device with
you. Much o the sharing o a mobile device’s location is done by misconigured application
permissions and settings. Being aware o which apps use location services and careully assigning their permissions can reduce the chance o location services being used or bad.
ADDITIONAL RESOURCES
To learn more about location-based services,
read the article “What are location-based services?” at the Ancoris website (https://
www.ancoris.com/blog/what-are-location-based-services).
GPS
One o the primary technologies used by location-based services is the Global Positioning
System (GPS), which is built into most mobile devices, along with Bluetooth, Wi-Fi hotspots,
and cellular towers, to determine the device’s location.
GPS is based on 24 satellites that transmit their location and time to Earth-based GPS
receivers. The most common purpose-built GPS device is the navigational aid that mounts
on a vehicle’s dashboard or windshield, and you can buy the equivalent or boats, airplanes,
bicycles, and more. There are even handheld versions tailored to scuba diving, hiking, hunting,
and so on, with eatures better suited to their niche, such as preloaded special-purpose maps,
waterprooing, impact resistance, route memory, bookmarking, stored locations, low-power
use, simple replaceable batteries, and other useul sensors or tools. Figure 1.4-8 illustrates a
simpliied version o GPS integrated into a communications system.
Securing Mobile Devices
Mobile device management (MDM) is a type o security sotware that enables organizations
to secure, monitor, manage, and enorce policies on employees’ mobile devices. MDM is oten
linked with or based on the use o mobile application management (MAM) sotware.
DOMAIN 1.0 Objective 1.4
GPS satellites
Satellite-based
communication
connection
GPS and cellular
tower
Mobile device
FIGURE 1.4-8
An example of a GPS network
Mobile Device Management
MDM involves the use o monitoring, securing, and managing any mobile devices that
have access, gain access, or connect to a company’s network and data resources. Employees
and possibly customers or suppliers may be allowed to directly connect mobile devices on
an internal network. Their activity must be tracked to protect the data asset by applying a
careully thought-out data management program. The purpose o the MDM is to provide the
internal IT administrators with the inormation needed to manage and administer the security
o a network. MDM solutions allow IT teams and admins to control and distribute security
policies to the mobile devices.
Mobile Application Management
MAM encompasses the entire sotware development lie cycle (SDLC) process or mobile sotware developed internally or externally, as well as updates, ixes, and retirement o mobile
sotware. MAM can also include the management o application licenses, user account access
permissions, and the operating coniguration o mobile sotware. Here are some examples o
how MAM is applied:
•
Corporate e-mail configuration A corporate or even a small business e-mail system
must be conigured and ine-tuned to provide e-mail services to mobile devices.
Commonly this may also be accomplished through the coniguration on the mobile
device itsel. The inormation commonly used includes account type, e-mail address,
password, logical domain, and the user’s account name.
35
36
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
•
Two-factor authentication Unortunately, shoulder suring and phishing are oten
successul in learning a user’s login credentials. The use o a two-actor authentication
(2FA) process at login helps to ensure that a mail client is who they claim to be. In a
2FA scheme, the user’s account name and password count only as one actor. A second
security actor is commonly a phone number, a PIN code, or a generated code sent to
the supplicant’s device.
EXAM TIP Be sure you understand the concept and use of two-factor (multifactor)
authentication and the use of biometrics as a part of the MAM process.
•
Corporate applications The management o application sotware on a mobile
device is very much like the management o sotware on an internal network. For
example, i a corporation has a customer relationship management (CRM) system,
whether the user is local and using a device on the internal network or is remote and
several thousand miles away, the client/server nature o the application must be the
ocus or its conidentiality, integrity, and availability.
EXAM TIP Know the differences between MDM and MAM. MDM concentrates
on centrally managing device updates and securing mobile devices, whereas MAM
focuses on specific corporate applications.
Mobile Device Synchronization
People generally want their contacts and calendars to match across their devices, so or
the CompTIA A+ 220-1101 exam, you need to know how to conigure mobile devices to
synchronize data across two or more devices to maintain a single set o contacts, one e-mail
inbox, one calendar, and perhaps even one set o up-to-date iles, olders, or directories.
Whether you wish to synchronize a desktop with a mobile device or two, most personal
productivity applications and suites now include support to synchronize, or sync, data.
EXAM TIP Be sure you understand the difference between the synchronization of
data and files and performing a backup of the same.
Having the same data available on dierent mobile (and stationary) devices is the primary
beneit o data synchronization. The requirements or this process are a data source, a target
or the data, and an application to transer and synchronize the data on both devices. A source
device could be a mobile phone or a desktop computer, and the target device may be any
mobile device or desktop PC, or any other combination o devices, provided a synchronization
application is available.
DOMAIN 1.0 Objective 1.4
Data synchronization is important to anyone who relies on data stored on a mobile
device to be just as accurate and timely as the same data stored on a base system. Data
synchronization is a two-way street, meaning that the data source could very well be a
mobile device, and the target device could be a user’s desktop computer, a cloud application,
or even another mobile device.
Data synchronization processes are deined by their targets. The ollowing briely describes
the three target categories.
•
Synchronizing to a desktop Mobile devices can synchronize data by connecting
to a laptop or desktop computer via USB, Wi-Fi, or Bluetooth. Another way that a
mobile computing device can sync to a desktop is using OneDrive or Dropbox as
an intermediary. However, this method may only work or data that isn’t updated
requently.
•
Synchronizing to the cloud Cloud-based storage sites can be used to pass data
between devices, especially when the devices might not be able to communicate
directly. Cloud services like NetApp’s Cloud Sync, Apple’s iCloud, and Microsot
Azure AD Connect provide the capability to schedule backups, synchronization,
and other data harmonization eatures.
Synchronizing to an automobile The latest models o automobiles use synchronization
to push irmware and sotware updates to systems in a vehicle, usually without the owner
being involved or even knowing that it happens. The car may also provide data back to
the manuacturer regarding the perormance o certain onboard systems. Drivers may
want to synchronize their smartphone to the sound system or hands-ree use or to play
music stored on the smartphone.
•
The types o data and inormation that can be synchronized between two devices includes
just about everything: e-mail messages, calendars and contacts, applications, photos, audio
iles, video iles, browser bookmarks, documents, e-books, and even passwords.
You should expect to encounter a question or perhaps just a reerence to the synchronization
processes o Microsot 365, Google Workspace, and Apple iCloud application suites. The
synchronization processes or these and other similar products are relatively the same, but the
setup processes do vary. Since the primary resource that is synchronized to a mobile device
relates to e-mail, the ollowing are some examples o how each is set up.
Synchronize Apple iCloud to an Android Device
iCloud is an application in the Apple system environment. Beore you can sync to it, you must
establish an account. I you already have an @mac.com or @me.com e-mail account, you are
set. I not, you must create one. Ater doing so, you can then set up synchronization.
On an Android device, perorm the ollowing steps:
1. Access the Apps menu and select Settings.
2. Choose Accounts and then Add An Account.
37
38
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
3. Select the appropriate Account Type and, i necessary, the Account Sub-Type.
4. Enter the e-mail address to be synchronized and its corresponding password and then
tap Next to continue. You may be prompted or a username, password, or server. I so,
provide this inormation.
5. Provide the SMTP server ID and the related port number and then tap Next.
6. You may be asked or some additional settings or this account, such as requency, size,
and the like. I so, enter this inormation and tap Next.
7. Assign a name to the account (it will be the name used or outgoing messages rom the
account). Select Next to create the account.
Synchronize Google Workspace
to an Android or iOS Device
As in the previous example, in order to synchronize to a Google Workspace account, you must
irst have one. I you already have an @gmail.com account, you are good to go. Otherwise, you
need to create one.
Next, sign in to the Gmail app:
•
•
For an Android device, access the Gmail app and sign-in.
For an iOS device:
1. Choose Settings | Accounts & Passwords | Add Account | Gmail.
2. Enter a name, address, and password and then click Next.
3. Re-enter the address and click Next.
4. Choose the items to be synced and click Done.
Synchronize Outlook (Exchange)
to an Android or iOS Device
Beore beginning to set up the synchronization, create a Microsot account, i necessary, and
install the Outlook or Android app on the Android device, i needed. Use the ollowing steps
to set up synchronization between Outlook and the device.
On the Android device:
1. Open the Email app and sign in.
2. Select Manually Setting and ill in the Domain/Username entry.
3. Enter the Exchange server password and choose the Use Secure Connection (SSL) option.
4. Set the requency to be used or checking or updates in Accounts Options.
5. Give the account a name and tap Done.
DOMAIN 1.0 Objective 1.4
On the iOS device:
1. Add the account using Settings | Accounts & Passwords | Add Account and indicate
the account type being added.
2. Enter a name, e-mail address, e-mail password, and description, i desired, and tap Save.
Synchronize Outlook (Exchange) to an iOS Device
Beore you begin to set up the synchronization, create a Microsot account, i necessary.
Use the ollowing steps to set up synchronization between Outlook and the iOS device:
1. The irst step is to identiy the Outlook/Exchange account to iOS using Settings |
Passwords & Accounts | Add Account | Exchange. Then enter the e-mail address to
be synchronized.
2. Enter how you wish to connect to the Exchange server, choosing either Conigure
Manually or Sign In.
• Conigure Manually requires that you set up an Exchange account using your
e-mail account and its associated password, plus perhaps some other serverrelated inormation.
• Sign In requires only your e-mail address and password, which are transmitted
to the Exchange server or validation and to retrieve account inormation.
I multiactor authentication is in use, you will be asked or the additional
authentication inormation.
3. Add the account using Settings | Accounts & Passwords | Add Account and indicate
the account type being added.
4. Enter a name, e-mail address, e-mail password, and description, i desired, and then
tap Save.
One huge caution, though: i you are synchronizing to or rom a cell phone or smartphone,
keep the data transer capacity limit (data cap) in mind. Some iles, and probably most iles, are
larger than you think and may result in additional charges or data transers.
REVIEW
Objective 1.4: Given a scenario, configure basic mobile-device network connectivity and
application support
•
The ive generations o cellular data networks and communication are 1G, 2G, 3G, 4G,
and 5G.
• 1G oered narrow band analog service with a limited number o simultaneous callers.
• 2G provided wider requency bands and greater mobility. 2G introduced digital
encryption.
39
40
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
•
•
•
3G added security eatures, transmission types, global roaming, aster data transmission
speeds, and two-way authentication.
• 4G uses IP-based system with data speeds o 50 Mbps to 80 Mbps over a maximum
range o 31 miles. Also, it secures data in transit with 3DES and AES encryption,
and access is authenticated.
• 5G deines a RAT that is separated into two requency ranges: FR1 with sub-6 GHz
bands, and FR2 built on the 4G LTE, which provides Gbps data speeds.
A mobile hotspot device creates a Wi-Fi network that shares its data connection with
other Wi-Fi devices. A hotspot is also called tethering.
The primary service protocols or cellular phone systems are Global System or Mobile
Communications (GSM) and code division multiple access (CDMA).
•
•
•
•
•
•
•
GSM is the generally deployed standard and is replacing CDMA. A GSM SIM card
can be removed and installed into a new device.
• CDMA devices are tied to a provider and must remain so.
A preerred roaming list (PRL) contains networks and requencies used by other carriers.
CDMA devices may receive product release instruction (PRI) updates.
Bluetooth setup includes the ollowing steps: enable Bluetooth, enable pairing, locate a
device or pairing, enter the PIN code, and test connectivity.
Location services use GPS, RFID, Wi-Fi, or cellular RF technology to identiy a
device’s location.
Mobile device management (MDM) is security sotware that enables organizations to
secure, monitor, manage, and enorce policies on employees’ mobile devices.
Mobile application management (MAM) is a methodology or mobile sotware
development but can also cover operations o mobile sotware, including corporate
e-mail coniguration, two-actor authentication, and corporate applications on
mobile devices.
Data synchronization helps to ensure that the same data is available on dierent devices.
1.4 QUESTIONS
1. Which o the cellular technology generations added security eatures, transmission
types, global roaming, and data transmission speeds o 144 Kbps to 2 Mbps?
A. 1G
B. 2G
C. 3G
D. 4G
E. 5G
DOMAIN 1.0 Objective 1.4
2. What technology allows a SIM card to be removed and installed into a new device?
A. CDMA
B. GSM
C. TDMA
D. 5G
3. What eature is used by mapping and location-based apps on mobile devices?
A. Location Services
B. Maps
C. Find My
D. Tips
4. You are getting ready to try out a new Bluetooth headset or your smartphone. Ater
you enable Bluetooth and turn on the headset, which o the ollowing do you need to
do to use the headset?
A. Tether the headset.
B. Connect to the hotspot on the phone.
C. Pair the headset with the phone.
D. Run a program.
5. What types o data can be synchronized between a PC and another device?
A. Only text-based data
B. Only e-mail
C. All data
D. No data
1.4 ANSWERS
1. C 3G added security eatures, transmission types, global roaming, aster data
transmission speeds, and two-way authentication.
2. B GSM SIM cards are portable and can be removed rom one device and inserted
into another device, regardless o the service provider.
3. A Apple’s Location Services eature provides location inormation to mapping and
location-based apps. (The same is true or Google’s Location eature.)
4. C You must pair a new Bluetooth device with your mobile device beore you can use
the new device.
5. C Virtually all types o data can be synchronized between two devices or between a
source and a target.
41
This page intentionally left blank
Networking
M A
I
2.0
Domain Objectives
• 2.1 Compare and contrast Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) ports, protocols, and their purposes.
• 2.2 Compare and contrast common networking hardware.
• 2.3 Compare and contrast protocols for wireless networking.
• 2.4 Summarize services provided by networked hosts.
• 2.5 Given a scenario, install and configure basic wired/wireless small
office/home office (SOHO) networks.
• 2.6 Compare and contrast common network configuration concepts.
• 2.7 Compare and contrast Internet connection types, network types,
and their features.
• 2.8 Given a scenario, use networking tools.
43
N
D
O
44
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Objective 2.1
Compare and contrast Transmission
Control Protocol (TCP) and User
Datagram Protocol (UDP) ports,
protocols, and their purposes
I
n the standard network reerence models, such as the TCP/IP and OSI models, the
respective Transport layers deine two protocols: the Transmission Control Protocol (TCP)
and User Datagram Protocol (UDP), which are the primary data transer protocols o any
TCP/IP network. Although both are used to transport inormation, they are as dierent as an
eye dropper and a ire hose—a dierence we explore in this objective.
Ports and Protocols
Protocols handle data transer details, such as how to pack and unpack data into protocolspeciic packet ormats. The Internet runs on the Transmission Control Protocol/Internet
Protocol (TCP/IP) suite, which is a stack (collection) o protocols and services that individually
are designed to manage, package, transmit, and operate networks large and small.
NOTE The terms packet and frame are often used interchangeably. However,
they are actually two different message formats used on separate layers of a network
reference model. A frame is a Data Link layer message format, most commonly used
in Ethernet networks. A packet is a Network or Internet layer message format typically
associated with TCP/IP networks, such as the Internet.
TCP and UDP both use port numbers to identiy the type o connection being used.
Table 2.1-1 provides a quick reerence to application protocols and the TCP port numbers
they use. Table 2.1-2 provides a quick reerence to utility protocols (protocols that are hidden
“behind the scenes” protocols) and the TCP and UDP port numbers they use.
EXAM TIP Be able to identify the various TCP/UDP ports and the associated
protocol of each port.
ADDITIONAL RESOURCES
Apps with network support use many
additional TCP and UDP ports. To see a comprehensive real-time report on TCP and
UDP activity on a computer running Windows, download the free LiveTcpUdpWatch
utility from NirSoft at https://www.nirsoft.net/utils/live_tcp_udp_watch.html.
DOMAIN 2.0 Objective 2.1
TABLE 2.1-1
Application Protocols
TCP Port Number
Application Protocol
20/21
FTP (File Transer Protocol)
22
23
25
80
110
143
443
3389
TABLE 2.1-2
Function
File transer control data (20)
and ile data (21)
SSH (Secure Shell)
Encrypted terminal emulation
Telnet
Terminal emulation (not secure)
SMTP (Simple Mail Transer Protocol)
Outgoing e-mail
HTTP (Hypertext Transer Protocol)
Web pages (not secure)
POP3 (Post Oice Protocol 3)
Incoming e-mail
IMAP (Internet Message Access Protocol) Incoming e-mail
HTTPS (HTTP Secure, HTTP over SSL)
Secure web pages
RDP (Remote Desktop Protocol)
Remote Desktop
Utility Protocols
Port Number
Protocol Type
Utility Protocol
Function
53
67, 68
UDP
UDP
137–139
TCP/UDP
161, 162
UDP
389
TCP
445
TCP
DNS (Domain Name System) Allows the use o DNS naming
DHCP (Dynamic Host
IP addressing provided by
Coniguration Protocol)
a DHCP server (67) to network
client (68)
NetBIOS/NetBT (NetBIOS
Enables legacy (pre-TCP/IP)
over TCP/IP)
apps to run on TCP/IP networks
SNMP (Simple Network
Remote management o network
Management Protocol)
devices; SNMP manager (161)
and SNMP agent (162)
LDAP (Lightweight
Querying directories
Directory Access Protocol)
SMB/CIFS (Server Message
Windows naming/older sharing
Block/Common Internet
and cross-platorm ile sharing
File System)
Connection-Oriented vs. Connectionless
When transmitting data over a network, whether it’s over the same network or between two
dierent networks, the protocol in use and the communication interaces o the sending and
receiving stations determine which o the two available connection types is to be used. The two
connection types are connection-oriented and connectionless.
A connection-oriented protocol, as its name implies, ocuses on creating, managing, and
operating the connections and data transmission over the circuit established between them.
45
46
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
A connectionless protocol, as its name implies, doesn’t create ormal connections and ocuses
instead on the data transmission.
Connection-Oriented
The connection-oriented communication method is an outgrowth o the telephone system.
Beore signals can be transmitted over an end-to-end link, each end o the link must agree to
the coniguration o the line and the protocol in use. The link is conirmed using what is called
a handshake, which involves an exchange o specialized packets that represent a request to synchronize (SYN), a request to send (RTS), indications that the line is clear to send (CTS), and
the acknowledgments (ACKs) or each packet sent and received by either end. Once the connection is veriied, data packets are transmitted and received in a ixed serial order. Because
o its rigid protocol requirements, TCP, which is a connection-oriented protocol (COP), is
considered to be a reliable communication protocol.
Connectionless
Earlier TCP and UDP were likened to an eye dropper and a ire hose, respectively. With its
ixed requirements or establishing and managing a communication link, the connectionoriented TCP is something like an eye dropper. A connectionless protocol—namely, UDP—is
then more like a ire hose. A connectionless protocol doesn’t manage the connection, the transmission link, or the data low. Data is merely transmitted on the line without the use o RTSs,
CTSs, or ACKs. Data lows at the speed available, much like water through a ire hose. UDP,
which is a connectionless protocol (CLP), is considered to be an unreliable protocol.
Figure 2.1-1 shows a simpliied comparison o connection-oriented and connectionless
protocols.
Connection-oriented: TCP
ACK
SYN - ACK
www
ACK
www
Connectionless: UDP
Data
www
FIGURE 2.1-1
www
A comparison of the connection methods used by TCP and UDP
DOMAIN 2.0 Objective 2.1
TCP vs. UDP
TCP accomplishes the reliable transer o data with communication rules that require both
machines to acknowledge each other to send and receive data. Thus, TCP is reerred to as a
connection-oriented protocol.
UDP is much aster because it lacks these checks—which is ine i your data can tolerate
some errors, or i the chance o errors is low. For example, speed might be more important
than a ew dropped packets or a Voice over IP (VoIP) call or video chat. Because UDP simply
sends data without checking to see i it is received, it is reerred to as a connectionless protocol.
When data moving between systems must arrive in good order, we use the connectionoriented Transmission Control Protocol (TCP). I it’s not a big deal or data to miss a bit or two,
the connectionless User Datagram Protocol (UDP) is the way to go. Most TCP/IP applications
use TCP (that’s why we don’t call it UDP/IP) because it transers data reliably.
Other Connection-Oriented Protocols
Although TCP is oten given as the primary example o a connection-oriented protocol, there
are others. In situations where an assurance o integrity or conidentiality is needed, there is
very likely a COP that its the bill. Other commonly used COPs are HTTPS, FTP, SMTP, and
SSH. TCP, HTTPS, and SSH are the COPs you can expect to see on the A+ Core 1 exam. Let’s
look at the latter two a bit deeper.
Hypertext Transport Protocol Using TLS
At one time, the S in HTTPS represented the Secure Sockets Layer (SSL), but SSL is in
the process o being replaced by the Transport Layer Security (TLS) protocol, but more on
that later. First, it’s important to understand how HTTPS incorporates connection-oriented
communication.
Like TCP, an HTTP session involves an exchange o messages between the requester and
the server, which can require several back-and-orth messages. These messages help the client and the server come to an agreement on the characteristics o the transmission, such as
bandwidth, speed, and more. However, one o these characteristics isn’t security, and HTTP
data packets are plain text, which is why TLS is added to the mix. HTTPS encrypts the standard HTTP packet within a TLS wrapper (packet). So, in this relationship, HTTP provides the
connection-oriented assurance o the communication and TLS supplies the security.
Secure Shell
The Secure Shell (SSH) protocol is a secured replacement or the unsecured Telnet protocol,
which is a COP or unencrypted communication between network nodes. In addition to a lack
o security, Telnet doesn’t provide authenticate policies or encryption.
The SSH protocol is included in all later versions o macOS and Linux, but a utility, such
as PuTTY, is required or Windows systems. SSH operates on a client/server model using
TCP port 22 and uses a TCP authentication handshake to veriy a session and, once veriied,
sets up the secure shell and connection.
47
48
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Other Connectionless Protocols
There are unctions and services perormed by several TCP/IP protocols that require less
assurance and more eiciency than would be possible with a connection-oriented protocol.
Some o the more commonly used connectionless protocols are UDP, Internet Protocol (IP),
Internet Control Message Protocol (ICMP), Dynamic Host Coniguration Protocol (DHCP),
and Trivial FTP (TFTP). The A+ Core 1 exam may include questions or reerences about
DHCP and TFTP.
Dynamic Host Configuration Protocol
The Dynamic Host Coniguration Protocol (DHCP) is a connectionless protocol that unctions on UDP. DHCP is a client/server model protocol that responds to a client’s request
or IP coniguration data with data drawn rom a pool o predeined values. DHCP also
manages the “lease” period or the data supplied to the client and its renewal or expiration.
DHCP operates as a connectionless service because the data is needed immediately by the
requesting station.
Trivial File Transfer Protocol
The legacy File Transer Protocol (FTP) is a connection-oriented service based on the need or
accuracy in the transer. However, smaller iles, command sets, or iles not requiring veriication can use a connectionless service. Trivial FTP (TFTP) is a lightweight version o FTP that
operates without authentication and a structured low control as a connectionless protocol.
REVIEW
Objective 2.1: Compare and contrast Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) ports, protocols, and their purposes
•
Application protocols use TCP ports to perorm unctions such as ile transer, terminal
emulation, web page transers, and remote desktop connections.
•
TCP ports are connection-oriented, meaning that both ends o a connection must
acknowledge the connection. TCP connections are more reliable but slower than
UDP connections.
Utility protocols use primarily UDP ports, as well as some TCP ports, to perorm
unctions such as ile and directory services, older sharing, and services discovery.
UDP ports are connectionless, meaning that a service using UDP does not veriy
that the connection is working. UDP connections are aster but less reliable than
TCP connections.
HTTPS and SSH are connection-oriented protocols.
DHCP and TFTP are examples o connectionless protocols.
•
•
•
•
DOMAIN 2.0 Objective 2.1
2.1 QUESTIONS
1. An incorrect irewall setting results in port 110 being blocked. Which o the ollowing
services will not work until the port is unblocked?
A.
B.
C.
D.
Secure web pages
Receiving POP3 e-mail
Remote desktop
Upgrading to Windows 11
2. A computer that uses automatic IP addressing relies on which o the ollowing ports?
A. 21
B. 25
C. 143
D. 67, 68
3. Which o the ollowing protocols are considered connection-oriented? (Choose two.)
A. HTTPS
B. SSH
C. DHCP
D. TFTP
4. Sometimes, or greater security, e-mail providers change the deault ports used
or sending and receiving e-mail. I an e-mail provider changes rom port 143 to
a dierent port, which o these services would need to be conigured to use the
new port?
A. POP3
B. SMTP
C. IMAP
D. HTTP
E. SSH
5. A user reports that she can connect to insecure websites (http://) but not to secure
websites (https://). Which port is being blocked by a irewall?
A. 80
B. 445
C. 25
D. 443
49
50
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
2.1 ANSWERS
1. B
The deault port used by POP3 to receive e-mail is 110.
2. D
The ports used by the DHCP service or automatic IP addressing are 67 and 68.
3. A B
HTTPS and SSH are connectionless protocols.
4. C
IMAP normally uses port 143.
5. D
443 is the port used or HTTPS (secure HTTP).
Objective 2.2
Compare and contrast common
networking hardware
N
etworks are all about interconnecting computing devices (also called hosts) so they can
communicate. More speciically, your local host can communicate with remote hosts to
access the resources (such as printers, iles, web pages, and so on) those systems share, and to
share its own resources. In each exchange, the system providing a resource is the server, and the
system using the resource is the client; when we call an entire system a server, what we really
mean is that the system’s primary job is serving some resource(s) to clients.
For a variety o dierent devices to share resources over a network, the network components need a shared connectivity standard, an addressing method clients and servers can use to
ind and communicate with each other, and shared sotware protocols that each system in an
exchange understands. Let’s look at many o the concepts and components that come together
to orm a network.
Routers
A router is a device that connects LANs to a WAN (see Figure 2.2-1). Hosts send signals or
destinations outside o the LAN to the router, which routes traic between networks.
FIGURE 2.2-1
Two broadcast domains connected by a router—a WAN
DOMAIN 2.0 Objective 2.2
FIGURE 2.2-2
Two broadcast domains—two separate LANs
Switches
Switches connect hosts on a local area network (LAN) and pass signals between them.
Switches memorize the MAC address o each device to smartly repeat signals to the appropriate host. A group o computers connected by one or more switches is a broadcast domain
(see Figure 2.2-2).
EXAM TIP A LAN is a group of networked computers within a few hundred
meters of each other, whereas a wide area network (WAN) is a group of computers
on multiple LANs connected with long-distance technologies.
Managed
A managed switch is a switch in which each port can be conigured with dierent settings.
For example, you can set a single managed switch to unction as two or more virtual LANs
(VLANs), control quality o service (QoS) settings on a per-port basis, and more.
Unmanaged
An unmanaged switch is the type o switch sold or small oice/home oice (SOHO) use, such
as the one shown in Figure 2.2-2. It has no management eatures, and all devices connected to
it are in the same LAN.
EXAM TIP Be ready to identify the various networking hardware devices. Know
the differences between routers, managed switches, and unmanaged switches.
51
52
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 2.2-3
Device that acts as access point, switch, and router (inset shows ports on
back side)
Access Points
An access point (AP) centrally connects wireless network nodes into a wireless LAN (WLAN)
in the same way a switch connects wired devices into a LAN. Many APs also act as highspeed switches and Internet routers (see Figure 2.2-3). APs are sometimes reerred to as
wireless APs (WAPs).
Patch Panel
A patch panel (shown in Figure 2.2-4) has a row o permanent connectors or horizontal
cables on the back and a row o emale port connectors on the ront, enabling you to use short
FIGURE 2.2-4
Typical patch panels
DOMAIN 2.0 Objective 2.2
FIGURE 2.2-5
Typical patch cable
stranded-core UTP patch cables (shown in Figure 2.2-5) to connect the patch panel to the
switch. Premade patch cables make it simple to get multiple colors or organization and oten
come with booted (reinorced) connectors.
NOTE A patch cable is a specific length (usually short but can be up to 100 feet)
of cable terminated at each end with a plug or socket. Also called a patch cord.
Firewall
Firewalls generally protect an internal network rom unauthorized access to and rom the
Internet at large with methods such as hiding IP addresses and blocking TCP/IP ports, but
irewalls at internal boundaries can also help limit the damage a compromised node can do
to important resources. Hardware firewalls are oten built into routers (or standalone devices),
whereas software firewalls run on individual systems.
Hardware irewalls protect your LAN rom outside threats by iltering packets beore they
reach your internal network and its resources and devices. You can conigure a SOHO router’s
irewall rom its browser-based settings utility provided by virtually all hardware irewalls.
Hardware irewalls use stateful packet inspection (SPI) to inspect individual packets and block
incoming traic that isn’t a response to your network’s outgoing traic. You can even disable
ports entirely, blocking all traic in or out.
Most sotware irewalls don’t provide the advanced eatures ound on larger hardware irewalls, but they are primarily designed to protect a single host computer rather than entire
networks or enterprise systems. Figure 2.2-6 shows a sampling o the irewall settings on the
Comodo Internet Security Pro system.
53
54
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 2.2-6
The configuration settings on a software firewall
Power over Ethernet
Most network hardware, including APs, draw power rom an electrical outlet. Advanced APs
and networked devices such as security cameras can instead operate on electricity supplied
by a Power over Ethernet (PoE) injector or PoE switch. Both types o devices enable a standard
Ethernet cable to carry power and data simultaneously.
PoE Standards
PoE provides electrical power rom power sourcing equipment (PSE), such as a PoE switch,
to a powered device (PD) over Ethernet cables that carry both the electrical power and
transmitted data. PoE standards, discussed next, are developed and published by the IEEE
(Institute o Electrical and Electronics Engineers) primarily to control how much power is
supplied to dierent types o PDs.
The PoE standards deine our types or levels o power, detailed in IEEE 802.3a, IEEE
802.3at, and IEEE 802.3bt, which deines two types. Each o these PoE standards speciies the
minimum power a PSE can source and the maximum power a PD can expect to receive. The
three standards, which are deined within the IEEE 802.3 Ethernet group, are as ollows:
•
IEEE 802.3af (Standard PoE) Also known as Type 1, this standard deines a power
source o 44–57 volts and the maximum power output o a port to be no more than
15.4 watts. Used or voice over the Internet (VoIP) and Wi-Fi APs.
DOMAIN 2.0 Objective 2.2
TABLE 2.2-1
IEEE PoE Standards
IEEE Standard
Type
PD Min. Power
PSE Max. Power
Cable
802.3a
802.3at
802.3bt
802.3bt
1
2
3
4
12.95 W
25 W
51–60 W
71–90 W
15.4 W
30 W
60 W
100 W
Cat5e
Cat5e
Cat5e
Cat5e
•
•
IEEE 802.3at (PoE+) Also known as Type 2, this standard is essentially an update
to the 802.3a standard. However, the 802.3at standard doesn’t replace or obsolete
the earlier standard and is backward compatible with it. PoE+ supplies a range o
50–57 volts. Each port o a PSE can supply up to 30 watts o power, but not less than
25 watts. PoE+ supports LCD displays, biometric sensors, and tablets.
IEEE 802.3bt (PoE++) Also known as Type 3 and Type 4, these two standards
increase the maximum PoE power by sending additional power over two or more
previously unused pairs o Ethernet cables:
• Type 3 (PoE++) Carries up to 60 watts on each PoE port with a minimum power
o 51 watts on a single RJ-45 cable.
• Type 4 (higher-power PoE) Supplies maximum power o 100 watts on each port
o a PSE and ensures a minimum o 71 watts.
Table 2.2-1 summarizes the speciications o the PoE standards.
Injectors
A PoE injector (also known as a midspan) is plugged into a standard Ethernet cable coming
rom a switch and a source o AC power. The injector adds the power to the Ethernet cable
running rom the injector to the PoE device.
Switch
A PoE switch detects whether connected devices are standard Ethernet devices or PoE devices.
It supplies power to PoE devices but does not supply power to standard Ethernet devices.
Hub
An Ethernet hub resembles a switch but takes a signal rom one port and blindly broadcasts it
out the others. This slows down traic, and to make matters worse, hubs subdivide the total
bandwidth o the network by the number o connected devices. Take, or example, a 100Base-T
(Fast Ethernet) network. Use a switch, and you get the ull 100-Mbps speed to each port. Replace
that switch with a hub, and i you have our devices connected, the eective speed per port is only
25 Mbps. Don’t use Ethernet hubs (USB hubs, on the other hand, are very useul).
55
56
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Optical Network Terminal
Fiber-to-the-curb/-cabinet (FTTC), iber-to-the-premises (FTTP), and iber-to-the-home
(FTTH) are becoming more and more available throughout the United States and in many
countries around the world. I you subscribe to a iber optic service or Internet, you’ll ind that
just like most all other communication service types, there is a device that serves as the demarcation point (demarc). In a iber installation, the demarc is a device or which the responsibility or the service connection is divided. The service provider is responsible or all aspects o
the service (quality, availability, speed, and so on) rom its originating source, like a central
oice (CO). The subscriber is responsible or the service either at or beyond the demarc (as it
enters the premises). The responsibility o the demarc and the service responsibility change are
typically tied to who owns the demarc.
In a iber optic service, the demarc can be an optical network terminal (ONT), or the service
provider may install a termination unit as the demarc, as illustrated in Figure 2.2-7. This
device operates like a modem that is converting digital to analog and back again. An ONT,
however, converts light signaling into electrical impulses, and vice versa. An ONT device can
be about the same size as a cable modem but may also be the size o a bathroom medicine
cabinet. Typically, an ONT is installed out o sight in a utility or service area.
Cable/DSL Modem
At one time, DSL was one o the more common types o broadband services or SOHO
networks. However, it’s now just one o several services available or SOHO Internet
connections, along with cable, satellite, and wireless. The A+ Core 1 (220-1101) exam ocuses
on only two o these services: cable and DSL. This section looks at the dierences between
these services and their respective modem interaces.
Cable Modem
Cable uses regular RG-6 or RG-59 cable TV lines to provide upload speeds rom 1 to 20 Mbps
and download speeds rom 6 Mbps to 1+ Gbps. Cable Internet connections are theoretically
Demarc
FTTH
D
ONT
Network cable
Fiber optic cable
Router
FIGURE 2.2-7
An ONT provides the conversion between fiber optic service and a premises
network.
DOMAIN 2.0 Objective 2.2
FIGURE 2.2-8
Cable modem with VoIP telephone support
available anywhere you can get cable TV. The cable connects to a cable modem that itsel connects (via Ethernet) to a small home router or your NIC. Some cable modems also include
support or VoIP telephony, such as the one shown in Figure 2.2-8.
DSL Modem
A digital subscriber line (DSL) modem connects to a standard RJ-11 telephone line, enabling
the conversion o high-speed digital signals to and rom the telephone line. DSL modems
requently are combined with wireless routers and are reerred to as DSL gateways. DSL speeds
vary widely rom location to location because the greater the distance rom the DSL modem to
the telephone company’s central switch, the slower the perormance.
Cross-Reference
To learn more about DSL service, see the “DSL” section in Objective 2.7.
Network Interface Card
A network interface card (NIC) was originally an add-on card that connected a computer to an
Ethernet or other wired network. Although most computers and network devices use integrated
wired or wireless network connections instead o a card, the term NIC is used or both network
cards and integrated network adapters. Older computers can use PCI-based NICs, while current computers can use PCIe NICs, such as the wireless NIC shown in Figure 2.2-9.
I a computer needs an upgrade to a aster or more capable NIC, it’s usually easier to use a
USB NIC, like the one shown in Figure 2.2-10. Tablets and other devices with USB ports but
no Ethernet ports can use a USB to Ethernet adapter (see Figure 2.2-11).
57
58
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 2.2-9
Wireless PCIe add-on NIC
FIGURE 2.2-10
External USB wireless NIC
DOMAIN 2.0 Objective 2.2
FIGURE 2.2-11
External USB to Ethernet adapter
Each network adapter (or NIC) has a 48-bit built-in binary media access control (MAC)
address that uniquely identiies it. Beore a NIC sends data out, it breaks that data into
transmission-riendly frames (see Figure 2.2-12), each tagged with the MAC address o the
sender and recipient, along with inormation the receiver can use to detect any possible errors.
A network switch uses the MAC address to orward rames to the port on which the correct
host can be reached.
NOTE A cyclic redundancy check (CRC) is a common mechanism for detecting data
transmission errors.
FIGURE 2.2-12
Generic frame
59
60
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Software-Dened Networking
Unlike hardware-based networking—where the conigurations o a network’s switches,
routers, and irewalls speciy its operations, pathing, and decisions—software-defined networking (SDN) provides an approach to network management that enables the network
coniguration to be set using dynamic, programmatic settings to deine the network environment. SDN provides a more lexible way to conigure a network’s operation, perormance,
and monitoring unctions. SDN is more like cloud computing than traditional hardwarebased network management.
An SDN network is deined on three layers: an application layer, a control layer, and an
inrastructure layer. This architecture isn’t something you need to know or the exam, but what
each layer represents may help you to answer a question in which SDN is material. The application layer o an SDN contains hardware or sotware edge devices, such as a load balancer or
a irewall (or both) and other mechanisms that operate at the edge o the network. The control
layer contains the device (or example, a router or switch) that runs the sotware and acts as
the brains or the network. The inrastructure layer is made up o the switching systems and
devices that direct the low o network traic. The most important element o all o this is that
the unctions and interactions o the SDN layers are sotware-deined.
REVIEW
Objective 2.2: Compare and contrast common networking hardware
•
•
•
•
•
•
•
•
•
Networks interconnect devices or communication and sharing resources. Network
components share a connectivity standard, an addressing method, and protocols.
A router connects LANs to WANs, and a switch connects devices on a LAN. Switches
use the MAC address o a device, and routers use IP addresses to orward data to
a destination.
A LAN is a group o networked computers in close proximity, and a WAN is a group
o computers on multiple LANs connected with long-distance technologies.
Each port on a managed switch can be conigured with dierent settings. An unmanaged
switch has no management eatures.
An AP centrally connects wireless network nodes into a WLAN.
A irewall protects an internal network rom unauthorized access to and rom external
networks. A network irewall can be either hardware or sotware.
PoE devices provide electrical power over cables that carry both electrical power and
transmitted data.
An Ethernet hub takes a signal rom one port and broadcasts it to all its other ports.
An ONT is a iber optic service’s demarc that converts light into electrical impulses,
and vice versa.
DOMAIN 2.0 Objective 2.2
•
•
A DSL modem converts high-speed digital signals to and rom the telephone line.
A cable modem perorms the same unction on a cable service line.
An SDN network is deined on three layers: an application layer, a control layer, and
an inrastructure layer, which contain hardware or sotware edge devices, the control
sotware, and the switching systems, respectively, that deine and control a network.
2.2 QUESTIONS
1. Company A wants to create two separate networks in a building but only wants to use
a single-point connection. Which o the ollowing does the company need?
A. Unmanaged switch
B. Router
C. Hub
D. Managed switch
2. You wish to install a digital PoE security camera over an outside storage area that requires
60 watts o power. To operate, what is the minimum PoE standard or this camera?
A. PoE+
B. Standard PoE
C. Type 3 PoE++
D. PoE is not available or digital cameras.
3. Company B has just moved into a new building and has ound an existing Internet
connection that use RG-6 wiring. Which o the ollowing is being used?
A. Cable
B. DSL
C. PoE
D. Fiber
4. Your client is a company that has two locations in the same city, both o which get
their Internet service rom the same provider in the same city. Both locations use the
same type o service, but one location has service that is about three to ive times aster
than the other. What type o service is most likely being used?
A. Cable
B. Satellite
C. DSL
D. PoE
61
62
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
5. What eature o all network adapters can be used to determine which device a rame is
sent rom or going to?
A.
B.
C.
D.
IP address
MAC address
Switch port
Router
2.2 ANSWERS
1. D
A managed switch can be used to create multiple networks.
2. C
A 60-watt PoE device requires Type 3 PoE++ standard support.
3. A
RG-6 is a type o wiring used or cable Internet and cable TV.
4. C DSL service varies widely in speed, which is dependent on the distance rom a
client site to the central switch (central oice) used by the phone company; longer
distances have slower connections.
5. B Every network adapter, including those built into other devices, has a unique
48-bit MAC address.
Objective 2.3
Compare and contrast protocols
for wireless networking
S
etting up a small oice/home oice (SOHO) network is a great way to learn about networking and its beneits, such as easy ile sharing and more lexible printing. The principles
and methods you learn in this objective will help you understand the operations o wireless
networking protocols.
Frequencies
The U.S. Federal Communications Commission (FCC) and the International Telecommunication Union (ITU) work together to provide intererence-ree transmission across the spectrum
o RF bands. The ITU’s authority also extends to assigning satellite orbits and developing and
coordinating worldwide technical standards. Figure 2.3-1 shows a graphic o the requency
allocations in U.S. radio spectrum.
ADDITIONAL RESOURCES
For a better view of the poster shown in
Figure 2.3-1, visit the National Telecommunications and Information Administration (NTIA)
at www.ntia.doc.gov/files/ntia/publications/january_2016_spectrum_wall_chart.pdf.
DOMAIN 2.0 Objective 2.3
FIGURE 2.3-1
The frequency allocations in U.S. radio spectrum
The two primary radio requency bands used in SOHO wireless networks are those that
contain the 2.4-GHz and 5-GHz requencies. These requency bands are unlicensed, meaning
there is no registration or licensing ees or requirements or their use.
Industrial, Scientific, and Medical Bands
The Industrial, Scientiic, and Medical (ISM) bands were originally designated or use by
machinery that emits RF signals as a by-product o its use, such as welders, heaters, and microwave ovens. In 1985, these bands were opened or use with mobile communications and LAN
networking.
The ISM bands are open and ree to use without restriction. However, the downside to
using ISM bands is that ISM bands are used or other purposes beside Wi-Fi. Many household,
irst responder, microwave, and several other wireless connections are also permitted to use
these requencies.
As shown in Table 2.3-1, the ISM bands used in Wi-Fi are in the 2.40-GHz to 2.48-GHz
band and the 5.73-GHz to 5.83-GHz band. ISM bands are the basis o two IEEE 802.11 standards: 802.11b and 802.11g. Within these standards, wireless devices communicate over nonoverlapping channels (channels 1, 6, and 11), as shown in Figure 2.3-2. All other channels
overlap one or more other channels, making them unreliable to use.
63
64
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
TABLE 2.3-1
Bandwidth for the ISM RF Bands
Band Designation
ISM Band/Devices
Max Bandwidth
Industrial
Scientiic
Medical
902–928 MHz
2.4–2.48 GHz
5.725–5.825 GHz
26 MHz
100 MHz
150 MHz
1
2
3
4
5
6
7
8
9
10
11
12
13
2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472
Channel 1
Channel 6
FIGURE 2.3-2
14
2.484
Channel 11
The channels in a wireless frequency band
Unlicensed National Information
Infrastructure Bands
The Unlicensed National Inormation Inrastructure (UNII) bands include three separate requency bands: UNII-1 (lower bands), UNII-2 (middle bands), and UNII-3 (upper bands), as
shown in Table 2.3-2. Each o these requency groupings is 100 MHz wide. Like the ISM bands,
UNII bands are unlicensed.
Channels
Each o the 802.11-based wireless network standards uses a single requency range in either o
the two radio band allocations (ISM or UNII) or sending and receiving data. Although 14 ISM
channels are deined internationally, not all the channels can be used in certain countries. In the
U.S., the FCC identiies only 11 channels, or example. Each o the 11 U.S. channels is 5 MHz
in width. Unortunately, in the 11-channel designation, only channels 1, 6, and 11 are available
or use on a wireless local area network (WLAN), as these channels aren’t overlapped by other
channels, as illustrated in Figure 2.3-2.
TABLE 2.3-2
Standard UNII Bands
Band Designation
ISM Band/Devices
UNII-1 Low
UNII-2 Middle
UNII-3 Upper
5.15–5.25 GHz
5.25–5.35 GHz
5.725–5.825 GHz
DOMAIN 2.0 Objective 2.3
TABLE 2.3-3
UNII Non-overlapping Channels
UNII Band
Non-overlapping Channels Available
UNII-1
UNII-2
UNII-3
36, 40, 44, 48
52, 56, 60, 64
149, 153, 157, 161, 165
The UNII requencies have 24 non-overlapping channels that can be used on a WLAN,
but not all are available on each o the UNII band levels. Table 2.3-3 lists the non-overlapping
channels available or each o the bands.
Wireless Networking Standards
Wi-Fi, or wireless networking, is made up o a series o standards published by the IEEE. These
standards deine dierent levels o range, bandwidth, and compatibility with other standards
or the medium in a WLAN. For each o the Wi-Fi standards, all o which are in the 802.11
series, two primary measurements are used to dierentiate them: speed and requency.
Speed designates the amount o data a standard can transmit rom one wireless device to
another in millions o bits per second, or Mbps. Frequency speciies the RF requency o the
wireless medium. Table 2.3-4 lists these characteristics or the current wireless standards.
EXAM TIP You should know the characteristics of the various Wi-Fi/802.11
standards for the A+ Core 1 exam.
TABLE 2.3-4
Current Wireless Network Standards
Name
Standard
Speed
Range Indoor/Outdoor
Frequency
Wi-Fi 1
Wi-Fi 2
Wi-Fi 3
Wireless-N/
Wi-Fi 4
Gigabit Wi-Fi/
Wi-Fi 5
AX Wi-Fi/
Wi-Fi 6
Wi-Fi 6E
802.11b
802.11a
802.11g
802.11n
11 Mbps
54 Mbps
54 Mbps
100 Mbps
115 eet/460 eet
115 eet/390 eet
125 eet/460 eet
230 eet/820 eet
802.11ac
1.3 Gbps
115 eet
2.4 GHz
5 GHz
2.4 GHz
2.4 GHz/
5 GHz
5 GHz
802.11ax
9.6 Gbps
200 eet/3000 eet
802.11ax
10.8 Gbps
50 eet
2.4 GHz/
5 GHz
6 GHz
65
66
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
NOTE Wi-Fi 5, or 802.11ac, operates only in the 5-GHz band. However, Wi-Fi 4,
Wi-Fi 6, and after are dual-band and operate in either the 2.4-GHz or 5-GHz band.
Bluetooth
As explained in Objective 1.4, Bluetooth devices communicate directly with each other.
Whereas a wireless LAN needs an intermediary device, such as a router or an access point,
Bluetooth devices are able to connect directly by “pairing.” Bluetooth data transmission uses
a limited-distance requency between 2.1 and 2.48 GHz that a wireless network may also use.
A Bluetooth device operates on either Bluetooth Low Energy (LE), which is the more popular o the two types, or legacy Bluetooth, which is also called Basic Rate/Enhanced Data Rate
(BR/EDR). Bluetooth LE has a lower data transer rate (1 to 2 Mbps) than the Bluetooth BR/
EDR, which operates at 3 Mbps.
Bluetooth devices, such as computing and handheld devices, can be all or part o a personal
area network (PAN), which is accomplished by pairing Bluetooth devices together (important
to remember or the exam). The ollowing section provides a basic outline o the pairing process or a Bluetooth device.
Enabling and Pairing Bluetooth
Beore you can connect via Bluetooth one device with another, you must irst enable the Bluetooth capability on the device(s). Enabled Bluetooth devices can then be paired to establish
interaction between them. For example, you can pair two smartphones together or a PC to a
keyboard, mouse, printer, or another Bluetooth device. Assuming the device you wish to pair
with has Bluetooth active and ready, the ollowing sections describe the steps you need to take
on a Windows, macOS, or Linux device to enable and pair it.
Windows 10/11
To enable Bluetooth on a Windows 10 or Windows 11 device, do the ollowing:
1. Open the Settings app rom the Start menu.
2. Choose Devices to open the Bluetooth & Other Devices page.
3. Move the slide switch to On to enable Bluetooth (see Figure 2.3-3).
Once Bluetooth is enabled on a Windows device, it can be paired with (connected to)
another Bluetooth device. On a Windows device, open the Settings | Devices | Bluetooth &
Other Devices page, as described. Click the plus sign associated with the Add a Bluetooth or
Other Device option, and the Add a Device applet page will appear (see Figure 2.3-4). Choose
Bluetooth to open the page that lists the Bluetooth devices within range to which your device
can be paired. Choose the device to complete the pairing.
DOMAIN 2.0 Objective 2.3
FIGURE 2.3-3
The Bluetooth & Other Devices settings page
FIGURE 2.3-4
The Add a Device applet is used to pair Bluetooth devices to a Windows device.
Many Bluetooth devices, such as wireless headsets, mice, keyboards, and the like, will ask
or a PIN code (number) to complete the pairing. For most devices, the pairing process is
timed, which means you only have about 30 seconds (or less) to complete the pairing. Typically, this code is ound in the device’s user manual or on a sticker on the device itsel. I you
cannot ind the code cannot, access the manuacturer’s website or contact them directly.
macOS
To enable Bluetooth on an Apple macOS device, use the ollowing steps:
1. On the Control Center or on the menu bar, click the Bluetooth icon (see Figure 2.3-5).
2. Click the Bluetooth switch to On (to enable) or O (to disable).
NOTE
On a macOS system, turning off Bluetooth may also disable hotspot and
other services.
67
68
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 2.3-5
The Bluetooth symbol
To pair a Bluetooth device to macOS, make sure the device is on and Bluetooth is enabled.
Open System Preerences on the Apple menu and click Bluetooth to list the devices in range
and choose the device. Enter the passcode i required.
Linux
On a Linux system, depending on its distro, the required daemons are bluez, gnomebluetooth, Xoe, LXDE, and i3, all o which are typically available in the blueman package. To start the Bluetooth daemon, enter the command sudo apt-get Bluetooth start in
the Terminal.
To pair a Bluetooth device to a Linux system, use the ollowing series o commands at the
command line:
1. Check the Bluetooth status: sudo systemctl status Bluetooth
2. Enable Bluetooth discovery: bluetoothctl discoverable on
3. List Bluetooth devices in range: bluetoothctl scan on
4. Pair with a device: bluetoothctl pair <MAC address>
5. Connect to the paired device: bluetoothctl connect <MAC address>
6. Set the paired device to trust status: bluetoothctl trust <MAC address>
7. List paired devices: bluetoothctl paired-devices
Long-Range Fixed Wireless
Oten the cost o pulling cable over long distances to provide access to rural homes and businesses isn’t easible. In this case, alternative solutions, such as digital subscriber line (DSL),
satellite, and ixed wireless access (FWA), can provide access to Internet-based resources.
DOMAIN 2.0 Objective 2.3
DSL may not be a viable solution in all situations. It has distance limitations and may not
be available. Satellite and FWA may also not be viable as they are point-to-point and typically
line-o-sight (LoS) services. Satellite services require the installation o a dish and typically
have expensive bandwidth increments. FWA does require an antenna, but it is smaller than a
satellite dish. Like satellite, FWA doesn’t require long pulls o iber optic and copper cables or
last mile connection.
I you have a satellite service, such as Dish Network, DirectTV, or Hughes Internet, you are
already using a orm o FWA. FWA isn’t a new technology, and it’s possible you use some orm
o it, in one way or another, including 4G/LTE and Wi-MAX, both o which have proven to
be expensive to install and operate. The deployment o 5G Fixed Wireless Access (5G-FWA)
or any o the ixed wireless legacy systems, such as Local Multipoint Distribution Services
(LMDS) and ISM 2.4-MHz point-to-point services, will depend on local ordinances and policy.
IEEE 802.11ah
The IEEE 802.11ah standard deines a WLAN that operates on an unlicensed 1-GHz band. Its
lower requency gives it a longer transmission range than other Wi-Fi WLAN standards. IEEE
802.11ah is used or extended-range hotspots and cellular traic oloading.
Local Multichannel Distribution Service
Local multichannel distribution service (LMDS) has proven to be a cost-eective two-way
wireless LoS microwave service or all Internet media types. In the U.S., LMDS operates on
the 28-GHz requency band (the EU uses 40 GHz), which is limited to a range o two or three
miles, depending on what may be encountered in its path.
Licensed Frequencies
In the U.S., the Federal Communications Commission (FCC) controls who can broadcast
on the available RF spectrums. Licensed bands o the RF spectrum are assigned (or a ee)
to broadcasting and cellular networks, among others. A licensed RF band grants the holder
the sole right to broadcast their signals over one speciic requency in a speciied geographic
area (or example, your avorite radio station might broadcast on the licensed requency o
98.7 FM).
EXAM TIP For the A+ Core 1 exam, you should know and understand what longrange fixed wireless is and how it’s used as well as the difference between licensed
and unlicensed frequencies. You should also have a general understanding of the power
and signal strength elements of wireless signaling.
69
70
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
WLAN Devices: Power and Signal Strength
In a WLAN, transmitting and receiving devices convert wired signals to wireless signals and
back again. The signals transmitted between the wireless devices are in the orm o radio
requency signals, which can attenuate over set distances, depending on the signal strength.
The primary signal strength and the power o the transmission are deined by the ollowing:
•
•
•
Radio transmit power Measured in decibel mW to indicate the power level o a
transmitted signal.
Equivalent isotopically radiated power (EIRP) The equivalent o the transmit
power less the signal strength loss between the transmitter and the antenna plus the
signal strength gain o the antenna.
Received signal strength indicator (RSSI) As its name says, this is the measurement
o the signal strength received at any receiver within the range o a WLAN. It indicates
the signal strength residual ater distance and obstacle attenuations.
Near-Field Communication
Near-field communication (NFC) allows wireless devices to communicate with other wireless devices within a range o 4 centimeters (cm), or about 1.6 inches. NFC transmits and
receives RF waves, which can make it seem much like Bluetooth, RFID, or even Zigbee, but
NFC diers because its signal generation is produced rom electromagnetic induction. This
allows passive devices with no power source to transmit to an active device, such as a smartphone or tablet, that enters its range.
NFC has three modes o operations: read/write, card emulation, and peer-to-peer, which
has been redacted. NFC is most commonly used with tap-to-go payment systems, such as
Apple Pay, Google Pay, and other orm o cashless payment services.
Radio-Frequency Identication
Radio-requency identiication (RFID) is a technology in which digital data, burned into labels
or tags, is emitted as RF waves that can be received by nearby readers. RFID is an automatic
identiication and data capture (AIDC) technology that automatically identiies objects, collects
data about them, and inputs the data into another system without external intervention.
At its core, an RFID system has three components: an RFID tag or label, a reader, and an
antenna. An RFID tag or label contains an integrated circuit and an antenna that transmits
data to an RFID reader on a receiver device. The reader converts the signal into usable data
that is transerred to a host computer system and then stored. RFID devices can be used or
asset, inventory, and people tracking as well as to limit access into controlled areas. RFID technology is also used in ID badges.
DOMAIN 2.0 Objective 2.3
REVIEW
Objective 2.3: Compare and contrast protocols for wireless networking
•
•
•
•
•
•
•
The two primary RF spectrums used in SOHO wireless networks are the unlicensed
ISM and UNII spectrums (2.4 GHz and 5 GHz, respectively).
ISM WLAN devices communicate over non-overlapping channels (channels 1, 6, and 11).
The IEEE 802.11 wireless networking standards have evolved rom the 802.11a to the
current 802.11ax.
Wi-Fi 802.11 standards use two measurements to dierentiate them: speed and
requency. Speed designates the data transmitted in Mbps. Frequency speciies the
RF requency.
Bluetooth devices communicate directly, but a WLAN requires an intermediary
device, such as a router or an access point. Bluetooth transmits on a limited-distance
requency between 2.1 and 2.48 GHz in the ISM requencies.
NFC wireless devices communicate in a range o 4 cm. NFC has three modes o
operations: read/write, card emulation, and peer-to-peer.
RFID labels or tags emit RF waves that can be received by nearby readers. RFID systems
have three components: an RFID tag or label, a reader, and an antenna.
2.3 QUESTIONS
1. The wireless LAN RF requencies are speciied in the 2.4-GHz and 5-GHz ranges, which
are known commonly as what? (Choose two.)
A. ISM
B. WLAN
C. NTIA
D. UNII
2. Bluetooth transmits on a limited-distance requency between which two ISM requencies?
A. 2.57 GHz to 2.8 GHz
B. 2.1 GHz to 2.48 GHz
C. 5.725 GHz to 5.825 GHz
D. 28 GHz to 36 GHz
3. Which o the ollowing is not one o the actors used to deine the primary signal
strength and transmission power o an RF wireless signal?
A. Radio transmit power
B. EIRP
C. RSSI
D. DHCP
71
72
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
4. What is the maximum range o NFC wireless devices?
A. 4 cm
B. 4.6 inches
C. 4 mm
D. 4 mW
5. Which o the ollowing is not a component o an RFID system?
A. RFID tag
B. RFID label
C. RFID printer
D. RFID reader
6. Which Wi-Fi standard has a maximum speed o 9.6 Gbps and uses the 2.4-GHz and
5.8-GHz requencies?
A. 802.11ac
B. 802.11n
C. 802.11ax
D. 802.11z
2.3 ANSWERS
1. A D
2. B
3.
ISM requencies begin with 2.4 GHz, and UNII requencies begin with 5 GHz.
Bluetooth transmits on a limited-distance requency between 2.1 GHz to 2.48 GHz.
D
DHCP is not a actor o the primary signal strength and transmission power o an
RF wireless signal.
4. A
The maximum range o NFC wireless devices is 4 cm.
5. C
RFID systems are wireless and do not print physical elements.
6. C 802.11ax, also known as Wi-Fi 6, has a maximum speed o 9.6 Gbps and uses the
2.4- and 5.8-GHz requencies.
Objective 2.4
N
Summarize services provided
by networked hosts
etwork hosts can be used as servers to provide ile, print, and other types o services;
as network appliances to provide security and network protection eatures; and as
embedded and legacy devices to provide ATM, traic light, machine control, and other
specialized services.
DOMAIN 2.0 Objective 2.4
Server Roles
A server is any computer or device that provides services to connected devices. Depending on
the size and types o networks in use, some servers are built into devices such as routers, and
some computers on the network can perorm server roles. The ollowing sections describe
these roles.
EXAM TIP Know the various server roles by name and function. For example, know
that a syslog server is used to store (log) events and can send alerts to administrators.
DHCP Server
A Dynamic Host Coniguration Protocol (DHCP) server provides IP addresses, deault gateways, and other network settings such as DNS server addresses to connected devices. Typically,
a DHCP server’s unction is incorporated into a device such as a router on a small oice/home
oice (SOHO) network. However, larger networks might use dedicated DHCP servers.
DNS Server
A Domain Name Service (DNS) server maintains a database o IP addresses and their matching host names. When a host name, such as www.totalsem.com, is entered into a web browser,
the DNS server used by that system matches that host name to the appropriate IP address.
DNS servers are provided by ISPs as well as by public DNS services such as Google DNS
and OpenDNS. Although your device typically is conigured with DNS servers by the DHCP
server, it is possible to manually conigure the DNS servers you preer.
File Server
A file server or a file share stores iles that are used by other computers and devices on a network. For residential or small business networks, a ile server–like unction can be enabled
through ile sharing on Windows, Linux, or macOS computers. Larger organization networks
typically use dedicated ile servers and computers. File server hardware generally eatures very
large high-speed storage devices, high-perormance network adapters, and suicient memory
to support the server sotware it hosts.
Print Server
A print server manages a network print queue or printers that are attached to the server or are
connected directly to the network. Depending on the network, a single physical server might
be used or both ile and print server tasks, or separate servers might be used.
73
74
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Mail Server
A mail server sends and receives e-mail. Incoming servers (where you check or new e-mail)
typically use Post Office Protocol version 3 (POP3) or Internet Message Access Protocol version 4
(IMAP4), while outgoing servers (where you send e-mail) use Simple Mail Transfer Protocol
(SMTP). These addresses come rom your e-mail provider (usually your ISP, company, school,
or other organization).
Syslog
Syslog is a protocol that network devices use to send event messages to a server that logs them
or viewing. The syslog server can send alerts that can be reviewed by network administrators.
Syslog is not natively supported on Windows, but third-party sotware can be used to convert
messages rom Windows apps into syslog-compatible messages.
ADDITIONAL RESOURCES
To learn more about syslog, see the article
“The Original Windows Syslog Server” at https://www.winsyslog.com/.
Web Server
A web server runs sotware designed or serving websites. For example, Microsot Internet
Inormation Services (IIS) unctionality is available as an optional eature o Windows Server
and business-oriented editions o Windows 10 and Windows 11. Most Linux distributions
include Apache or Nginx web servers. Apache can also be used on macOS.
Authentication, Authorization,
and Accounting Server
An authentication, authorization, and accounting (AAA) server program processes user
requests to authenticate (identiy) that the requestor is valid, may be authorized or speciic
access levels, and is to be tracked by audit and accounting unctions. Authentication typically
requires the veriication o a user name and password, but additional actors can be used or
required. Authorization assigns the predeined rights and permissions o an authenticated user
to control access and action with resources. Accounting is the tracking mechanism in use to
record the actions and results o the user.
An AAA server veriies the user’s identity and controls and tracks access to system resources
while the user is logged in to a network. Examples o AAA servers include RADIUS servers
used by WPA2 and WPA3 encryption on corporate networks and servers that inspect RSA
tokens provided by users with RSA key obs.
DOMAIN 2.0 Objective 2.4
Internet Appliance
Internet appliances are special-purpose devices that are incorporated into networks, typically to provide various types or levels o network security. The ollowing sections provide
a brie overview o the types o Internet appliances you need to know or the CompTIA A+
220-1101 exam.
Spam Gateways
Anti-spam appliances (aka spam gateways) are devices that use onboard sotware to ilter out
incoming spam e-mail messages and instant messaging (or “spim”) to prevent them rom entering a system. Spam gateway devices are primarily in use in enterprise organizations, but many
ISPs, academic institutions, and small businesses also employ some version o this unction.
Unified Threat Management
Unified threat management (UTM) involves the use o hardware or sotware to provide a combination o several security unctions. Typically, a UTM device provides security protections
that may include irewall, remote access, VPN support, web traic iltering, anti-malware, and
network intrusion prevention. UTM replaces the need to install separate devices or systems or
each o its supported security unctions. A UTM solution can be a specialized appliance that is
placed between an internal network and an end or gateway device, or it may be installed on a
virtual machine running cloud-based services.
EXAM TIP Know the purposes of and understand the differences between Internet
appliances such as UTM devices, intrusion detection systems (IDSs), and intrusion
prevention systems (IPSs). For example, an IDS can identify threats and send alerts.
However, the more powerful IPS can actually act on the threat and possibly stop it!
Load Balancers
The purpose o a load balancer is to spread out the processing required to respond to incoming
request traic as evenly as possible, or desired, across a group o network or speciic-purpose
servers. Load balancers typically sit on the network between client devices and the servers to
be balanced. Incoming requests are assigned to the next available server with the capability o
processing the request.
Proxy Server
A proxy server is an intermediary between its users and the resources they request. Applications send requests to the proxy server instead o trying to access the Internet directly, and
the proxy server etches the resources on behal o the users. This enables the proxy server to
monitor usage, to restrict access to or modiy insecure or objectionable content, as well as to
75
76
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
cache, compress, or strip out resources to improve perormance—and more. Enterprise proxy
servers are usually implemented as sotware running on a multipurpose server.
EXAM TIP Many security appliances include context-based rules called data loss
prevention (DLP) to avoid data leaks. DLP scans outgoing packets and stops the flow if
they break a rule.
Legacy/Embedded Systems
Networked devices don’t necessarily look like computers. Many are, but you can ind narrow-purpose computers or servers embedded in all sorts o machines and other equipment—
CompTIA calls these legacy/embedded systems. It can be easy to overlook networked devices
embedded in this equipment, but they may represent massive investments your network must
remain compatible with. Some examples o legacy/embedded systems include machine controllers, digital watches, digital music players, traic light controllers, aviation equipment,
bank ATMs, and more. I these systems are running operating systems that are no longer supported with security or other patches (such as Windows XP or Windows 7), they represent a
signiicant security threat.
Supervisory Control and Data Acquisition
Supervisory control and data acquisition (SCADA) systems perorm real-time data collection
or analysis o the eiciency, cost reduction, and operation improvements in an industrial
setting. Because there can be an almost overwhelming amount o data available, SCADA is
used to help organizations select and access speciic data and control the unctions o the
equipment and machinery involved. SCADA applications can be used to view, collect, analyze,
and graph a range o process characteristics, such as temperature, power consumption, operating levels, and many other measurable conditions.
Internet of Things Devices
Internet of Things (IoT) devices, also called “smart devices,” include those devices and
objects capable o being connected to a WAN or the Internet. IoT devices, or “things,” is
an ever expanding group, but characteristically they are devices that have the capability to
send and receive data over a network. This includes automobiles, home appliances, smartphones and watches, residential and security lighting, home security detection and alarm
systems, and more. For example, a car may have a system that helps it locate an empty parking
space, or a rerigerator can alert its owner when the inventory o a required ood or liquid
item alls below a certain level.
DOMAIN 2.0 Objective 2.4
REVIEW
Objective 2.4: Summarize services provided by networked hosts
•
•
•
•
•
•
•
•
•
•
•
•
Web servers run sotware that serves websites.
File servers store iles and olders or use on the network.
Print servers manage network print queues.
DHCP servers provide IP addresses to connected devices.
DNS servers handle DNS/IP address lookups.
Proxy servers reroute requests or Internet content to their own copy o that content,
or they can block requests.
Mail servers send and receive e-mail.
Authentication servers veriy a user’s identity.
The syslog protocol is used to send event messages to a server where they can be logged
and viewed.
Internet appliance categories include spam gateways, load balancers, IDSs, IPSs,
UTM devices, and end-point management servers, all o which can be used to
protect the network.
Legacy/embedded systems such as ATMs and machine controllers represent a signiicant
security threat i their operating systems are no longer being patched. SCADA systems
perorm real-time data collection or analysis o the eiciency, cost reduction, and
operation improvements in an industrial setting.
IoT devices include automobiles, home appliances, smartphones and watches, residential
and security lighting, home security detection and alarm systems, and more!
2.4 QUESTIONS
1. Microsot IIS and Apache are examples o which type o server?
A. DHCP server
B. File server
C. Web server
D. Print server
2. Company H is setting up a RADIUS server as part o its wireless network. This server
will perorm which o the ollowing tasks?
A. Mail server
B. Authentication server
C. Proxy server
D. Print server
77
78
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
3. Company J wants to install an Internet appliance that will provide protection as well
as load balancing and VPN services. Which o the ollowing categories has the device
they need?
A.
B.
C.
D.
IPS
DLP
IDS
UTM
4. Your client’s network is able to receive e-mail but unable to send it. Which o the
ollowing is not working?
A. SMTP
B. UTM
C. Authentication server
D. DNS server
5. Your department is considering an Internet appliance. Which o the ollowing is the
most likely reason to get one?
A. Print serving
B. Security
C. Wireless AP
D. Web server
2.4 ANSWERS
1. C
These are examples o web servers.
2. B A RADIUS server is used or authentication on a WPA2 or WPA3 Wi-Fi
enterprise network.
3. D UTM (uniied threat management) includes broad protection against threats as
well as bundles network security services.
4. A SMTP (Simple Mail Transer Protocol) is used to send e-mail messages. I this
protocol is disabled or blocked, e-mail cannot be sent.
5. B Internet appliances are used to provide additional security eatures to an Internet
connection.
DOMAIN 2.0 Objective 2.5
Objective 2.5
Given a scenario, install and congure
basic wired/wireless small ofce/home
ofce (SOHO) networks
S
mall oice/home oice (SOHO) networks tend to be simpler in design and layout, and
they typically have ewer components than the networks in larger organizations and
enterprises. This doesn’t mean that the same network unctions aren’t required, because they
are. A SOHO network oten uses a single device to implement multiple network processes,
but this capability isn’t always available. This objective provides an overview o the processes
used to conigure and install a basic network, wired or wireless, in a SOHO setting.
Internet Protocol Addressing
The most important activity in the coniguration o a network, regardless o its size, is the
assignment o its Internet Protocol (IP) addressing scheme. On Ethernet networks, which most
SOHO networks are, the addressing choices are Layer 2 Media Access Control (MAC) addresses
(also called physical addresses) and IP version 4 (IPv4) or IP version 6 (IPv6) addresses (also
called logical addresses).
MAC addresses are the deault addressing on any Ethernet network. Each component
capable o communicating on the network’s medium is permanently assigned a MAC
address by its manuacturer. I the communication between one network node and another
remains totally on the local network, only the MAC address is needed. However, should
network communication need to exit the local network and be orwarded on a WAN or the
Internet, IP addressing becomes a necessary part o the coniguration o the network and
each o its nodes.
A network address, also called a logical address, must uniquely identiy any device capable
o communicating on the network medium, regardless o the medium being wireline (or
wired) or wireless. A network address becomes the means by which a device is located on
the network. In the addressing schemes o a TCP/IP network, an IP address identiies both a
device and the network on which it resides. There are two versions o IP: IPv4 and IPv6. The
ollowing sections cover their essentials eatures and dierences.
EXAM TIP Know the differences between IPv4 and IPv6. For example, an IPv4
address uses 32 bits while an IPv6 address uses 128 bits.
79
80
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
IPv4 Addresses
An IPv4 address is expressed in dotted-octet notation, which ormats the address in our sets
o eight binary numbers (octets), separated by periods (or dots). Network devices see IP
addresses in binary orm (or example, 11001010.00100010.00010000.00001011), but this isn’t
human-riendly. Thereore, the dotted-decimal orm is used to express the IPv4 address (or
example, 202.34.16.11), which is easier or people to read.
The IPv4 standard reserves certain address ranges or special purposes and uses. Table 2.5-1
lists these special-purpose address ranges.
Loopback Addresses
An IPv4 loopback address is the logical address assigned to the network adapter in a computer or network-capable device. On most computers, the loopback address reers to the
network interace controller (NIC) or its network adapter. Because the address range o the
lookback address block is a set standard, the loopback address is almost always the same on
all network-enabled computers. This means that on any single PC, the loopback address is
likely to be 127.0.0.1. The same is true or any other PC, even i it’s on the same network.
Network-capable devices, especially computers, can have multiple network adapters (reerred
to as being “multihomed”). In this case, each o the network adapters is assigned a dierent
loopback address rom the 127.0.0.0–127.255.255.255 loopback address range.
Private Addresses
When it began to be apparent that the available IPv4 addresses were running out, one o the
changes made to the IPv4 standard was to set aside three blocks o addresses, one rom each
address class, that could be used repeatedly or local area networks (LANs) and other private
networks. To ensure that these addresses could be reused on dierent networks and to avoid
any possible routing problems, these addresses, designated as private addresses, were blocked
rom being orwarded outside o an organization’s edge routers. Similar to the reusability o
loopback addresses, multiple LANs in the same or in dierent organizations may use the same
block o private addressing.
All IPv4 addresses that are not in the set-aside ranges o private addresses are public
addresses. This means that unlike private addresses, a public address cannot be duplicated
anywhere on the Internet or on the WANs and LANs that make up the Internet.
TABLE 2.5-1
Reserved IPv4 Nonroutable Addresses
Purpose
IPv4 Address Range
Loopback/localhost
Private addresses
127.0.0.0–127.255.255.255
10.0.0.0–10.255.255.255
172.16.0.0–172.31.255.255
192.168.0.0–192.168.255.255
169.254.0.0–169.254.255.255
Link-local (APIPA)
DOMAIN 2.0 Objective 2.5
Link-Local Addresses
Sometimes a node on a local network is unable to obtain its coniguration data rom a
Dynamic Host Coniguration Protocol (DHCP) server. Rather than being blocked rom communicating on the local network, which typically uses MAC addresses, the node’s operating
system can assign a placeholder link-local address, which is an address that’s valid only or
interactions within the network segment (broadcast domain) on which its node is located.
This address is blocked rom communicating outside o its LAN until it can obtain a valid
IPv4 address.
On a Windows system, the link-local address that is assigned is an Automatic Private IP
Addressing (APIPA) address, which is chosen randomly rom the reserved IPv4 address range
o 169.254.0.1 to 169.254.255.254 and assigned with a Class B 16-bit subnet mask (255.255.0.0).
To ensure that the address assigned is unique to the local network, the system broadcasts the
random address and uses it i there is no response.
EXAM TIP If your system can communicate with other systems on your local
network but can’t reach the Internet, chances are the DHCP server is down and you
have been assigned an APIPA address. You can find out if you are using an APIPA
address by running ipconfig.
IPv6 Addresses
IPv6 is a Network layer protocol that was irst deined by the Internet Engineering Task Force
(IETF) in a drat proposal in December 1998 because o a concern that we would soon be running out o IPv4 addresses to assign. In September 2015, the American Registry or Internet
Numbers (ARIN) announced that oicially there were no more IPv4 addresses to issue. In July
2017, IETF issued the IPv6 standard to expand the available address pool and to supersede
IPv4. The ormat o an IPv6 address is shown in this example:
2001:0000:0000:3210:0800:200C:00CF:1234
The structure o IPv6 involves the ollowing characteristics:
•
•
It has 128 bits in its addressing scheme, which provides or 340 undecillion (2128)
addresses.
It has eight hexadecimal number groups separated by colons.
An IPv6 address can be shorted using the ollowing rules:
•
•
Leading zeros may be omitted rom a group; thereore, 00CF becomes CF, and 0000
becomes 0.
Any number o consecutive all-zero groups (0000) can be omitted and indicated with
two-colon separators rom the beginning and end o the string.
81
82
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
For example, the shortened version o the IPv6 address
2001:0000:0000:3210:0800:200C:00CF:1234
is
2001::3210:800:200C:CF:1234
EXAM TIP IPv6 addresses aren’t case sensitive and can use either uppercase or
lowercase letters. You may encounter lowercase or uppercase notation on the exam.
Operating system (OS) developers have two options or the last 64 bits (host ID) o an IPv6
address. Windows OS generates a random value when a NIC is conigured, and that number
never changes. Linux and macOS build the host ID (called the Extended Unique Identifier64-bit, or EUI-64) rom the MAC address o the NIC.
IPv6 includes a loopback address or a network adapter that can be used or testing. The ull
address is 0000:0000:0000:0000:0000:0000:0000:0001/128, which can be abbreviated as ::1/128
(using the two-colon abbreviation or consecutive all-zero groups).
IPv4 vs. IPv6
IPv4 and IPv6 dier in many ways. Table 2.5-2 helps you compare the dierences.
TABLE 2.5-2
IPv4 vs. IPv6
Feature
IPv4
Number o address bits 32 bits
Address ormat
Four groups o
binary octets,
separated by periods
Zero compression
N/A
Address example
192.168.0.1
Loopback address
127.0.0.1
Maximum number o
public IP addresses
Over 4 billion (232)
IPv6
128 bits
Eight our-digit groups o hex numbers,
separated by colons
Uses :: (double colon) to replace one or more
contiguous ields o zeros
2001:0000:0000:3210:0800:200C:00CF:1234
or
2001::3210:800:200C:CF:1234
0000:0000:0000:0000:0000:0000:0000:0001/128
or
::1/128
Over 340 undecillion (2128)
DOMAIN 2.0 Objective 2.5
Dynamic Address Assignment
Dynamic address coniguration on a Windows, Linux, or macOS computer is perormed by
the TCP/IP protocol DHCP. Dynamic addressing allows a network’s devices to be possibly
conigured with a dierent IP address each time it connects to a network. A node conigured
through dynamic address assignment is able to use network services like DNS and communication protocols based on UDP or TCP.
Dynamic Host Configuration Protocol
On a local network, or multiple LANs connected via a relay, the DHCP inrastructure consists
o one or more DHCP servers and usually one or more network nodes or DHCP clients. The
DHCP server supplies IP coniguration inormation rom a pool conigured by the network
administrators in response to requests made by DHCP clients.
The primary elements o a DHCP implementation are as ollows:
•
•
•
•
DHCP server As a server in a client/server arrangement, a DHCP server responds
to IP coniguration or lease requests to provide an IP address, monitor it during its
lease period, and renew the lease i it expires.
DHCP client As a client in a client/server arrangement, a DHCP client is the endpoint
that requests and receives coniguration data rom a DHCP server. Most network clients
receive DHCP coniguration data by deault.
IP address pool The IP address provided to a network node is drawn rom a pool o
unassigned addresses deined in a pool o available addresses.
IP address lease DHCP coniguration items, including the IP address, have
expiration dates. This data indicates the time period (present to uture) in which a
DHCP client can hold its DHCP coniguration. I the lease expires, the aected client
must renew it.
NOTE
Each time a DHCP client reboots, the DHCP configuration is assigned without
regard to any configuration data previously assigned.
IPv4 DHCP
DHCP is the deault dynamic addressing service or Windows and macOS and can be
conigured on most Linux distros. In response to a request rom a node, DHCP automatically
provides an IP address (IPv4, IPv6, or both), the associated subnet mask, the deault gateway
address, and the primary DNS address. The addressing provided is selected rom a conigured
pool o available addresses.
83
84
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
To view the address assignment coniguration o a Windows system, use the ollowing steps:
1. Open the Control Panel and select Network and Sharing Center.
2. Click Change Adapter Settings.
3. Select the adapter that provides the primary connection to the network.
4. Click Properties.
5. Click Internet Protocol Version 4 (as shown in Figure 2.5-1).
6. Click Properties. Figure 2.5-2 shows a typical example o the settings or dynamic
IP addressing on a Windows system.
Here are the steps used in the DHCP client/server coniguration acquisition process, as
illustrated in Figure 2.5-3:
1. Discover Ater the client has completed its startup or i the ipconig/iconig
command is used, the client broadcasts a message asking the DHCP server to
identiy itsel with its network addressing.
2. Offer The DHCP server responds to the client with an IP address assigned rom
its pool o available addresses. I no addresses are available, the server sends a nonacknowledgment (NAK) message, and the client assigns itsel a link-local address
and terminates the dialog.
FIGURE 2.5-1
The adapter properties dialog box
DOMAIN 2.0 Objective 2.5
FIGURE 2.5-2
Network adapter configured to get an IP address from a DHCP server
automatically
DHCP discover
DHCP oer
DHCP request
DHCP ACK
FIGURE 2.5-3
The DHCP client/server configuration acquisition process
3. Selection On some larger networks, there may be two or more DHCP servers oering
IP address conigurations, each sending its own DHCP oer. The client can respond to
each o the oers with a DHCP request or additional inormation or merely respond
with a request to the server that provided the irst oer it received.
4. Acknowledgment When the server receives the DHCP request message rom the
client, it creates an Address Resolution Protocol (ARP) mapping and responds to the
client directly (unicast) with a DHCP ACK message.
85
86
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
IPv6 Link-Local Address
When a computer running IPv6 boots or restarts, the system is conigured with a link-local
address using the Stateless Address Autoconfiguration (SLAAC) service. SLAAC provides IPv6
systems with most o their link-local conigurations. The irst 64 bits o a link-local address are
always FE80:0000:0000:0000 (which shortens to FE80::).
IPv6 DHCPv6
Whereas IPv4 DHCP (DHCPv4) uses broadcasting requests and responses, IPv6 DHCP
(DHCPv6) uses multicasting (IPv6 doesn’t include a broadcasting capability). One limitation
o DHCPv6 is that it doesn’t provide a deault gateway to a node.
DHCP Reservations
A DHCP reservation is a DHCP-supplied IP address that never changes. It is meant or devices
whose IP address needs to remain constant (or example, a print server). DHCP reservations
are created on the DHCP server. This eature is available in DHCP servers as well as in some
SOHO routers.
Static Addresses
A static IP address is a permanent, manually assigned IP address. Typically, static IP addresses
are used in networks or systems that must always have the same IP address because they
are used as servers or because they use dierent protocol settings than other devices on the
network. When a static IP address is used, the IP address, subnet mask, deault gateway, and
DNS servers must also be assigned. See Figure 2.5-4 or a typical example.
EXAM TIP Know the various IP addressing concepts, including static, dynamic,
APIPA, and link local. Practice using the ipconfig and ipconfig /all commands at
a command prompt to see if you can identify any of these IP address assignments.
Gateway
A gateway is a link connecting two networks. When a computer uses DHCP or its IP address,
it receives the deault gateway’s IP address as part o its coniguration. However, i you conigure a device with a static IP address, you must also provide the deault gateway’s IP address.
The deault gateway on most private networks is an address such as 192.168.0.1 or 192.168.1.1.
To see the current IP address, subnet mask, deault gateway, and DNS servers in Windows,
open a command prompt and use the command ipconfig /all. Scroll to the current local area
connection ater running the command (a typical example is shown in Figure 2.5-5). The
comparable command to use in Linux and macOS is ifconfig.
DOMAIN 2.0 Objective 2.5
FIGURE 2.5-4
Network adapter configured with a static IP address
FIGURE 2.5-5
Using ipconfig /all to display the current IP configuration on the author’s PC
87
88
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
EXAM TIP Make sure you know how to use ipconfig /all and how to identify
the settings displayed by ipconfig /all. Practice using ipconfig and ipconfig
/all (or ifconfig and ifconfig -a) on different computers.
NOTE The “(Preferred)” after an IP address in an adapter’s ipconfig display indicates
the address assigned to the interface. This address has no restrictions on its use.
REVIEW
Objective 2.5: Given a scenario, install and configure basic wired/wireless small office/
home office (SOHO) networks
•
•
•
•
•
•
•
•
•
A dynamic IP address is received rom a DHCP server by a device on the network.
An APIPA address is generated i the DHCP server cannot be reached.
A link-local address is IPv6’s equivalent to an APIPA address.
A static IP address is an address that is manually assigned.
I a static IP address is assigned, a DNS server must also be assigned.
A DHCP reservation is a DHCP-supplied IP address that doesn’t change.
IPv4 uses dotted-octet notation and a subnet mask.
IPv6 uses up to eight groups o numbers and supports methods to shorten its address.
A gateway is a link connecting two networks.
2.5 QUESTIONS
1. A user cannot connect to the Internet. When you ask her or her current IP address,
she tells you it is 169.254.0.18. Which o the ollowing is not working?
A. APIPA
B. Static IP
C. Link-local
D. DHCP
2. An IPv4 address o 10.10.10.10 is best described as which o the ollowing?
A. Class C address
B. Loopback address
C. Private address
D. DHCP address
DOMAIN 2.0 Objective 2.6
3. Which o the ollowing are characteristics o an IPv6 address? (Choose two.)
A. Link-local
B. 128 bits
C. Zeroes omitted
D. Colon separated
4. A DHCP-provided IP address that never changes is classiied as which o the ollowing?
A. IP permanency
B. IP reservation
C. Link-local
D. APIPA address
5. A network node using IPv6 can get its IP coniguration rom which o the ollowing
services and protocols? (Choose two.)
A. VPN
B. SLAAC
C. DHCPv6
D. ipconig
2.5 ANSWERS
1. D The IPv4 address 169.254.x.x is generated when the DHCP server cannot
be reached.
2. C
Three address ranges are reserved or use as private network addressing.
3. B D IPv6 addresses are 128 bits in length and ormatted into eight groups o
our-digit hex numbers separated by colons.
4. B
An IP reservation is an address set up by a DHCP server that doesn’t change.
5. B C DHCP is not a deault coniguration method in IPv6, but SLAAC is. Optionally,
DHCPv6 can be conigured.
Objective 2.6
T
Compare and contrast common
network conguration concepts
o enable a network to work properly, an IP address must be assigned to each device on
the network, a mechanism must be available or translating between website names and
IP addresses, and methods must exist or connecting dierent networks to each other. This
objective explains these eatures.
89
90
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
DNS
The Domain Name System (DNS), also reerred to as the Domain Naming Service, exists because
humans use the Internet. In the site-to-site operations o the Internet, the binary-encoded
addresses o the sites, whether IPv4 or IPv6, guide the transer o data across the network.
A binary IPv4 address like 10010000.10101000.11001010.10110110 could be hard to remember. For this very reason, DNS was developed as a means to convert the binary addressing and
its decimal equivalent (such as 144.168.202.182) into a uniorm resource locator (URL) or a
ully qualiied domain name (FQDN).
DNS Operation
Figure 2.6-1 illustrates the interaction o a local device with DNS to request a URL rom a DNS
server. Although greatly simpliied, this illustration shows the process involved to resolve a
URL to an IP address.
1. The user enters a URL into a browser.
2. DNS responds with the IP address associated with that URL.
3. The browser sends out an HTTPS request with the IP address.
4. The appropriate web server provides the requested content.
DNS Record Types
DNS matches IP addresses to host names (and the reverse). Each device on an IP network must
have access to at least one DNS server. By deault, DNS values are assigned by a DNS server,
but they can be manually entered. Although DNS appears to be a simple lookup application,
www.myurl.com?
DNS
1
2
144.168.202.182
3
HTTPS://144.168.202.182
HTTP response
4
www
FIGURE 2.6-1
A request and response between a local device and a DNS server
DOMAIN 2.0 Objective 2.6
it’s really not. More than 30 separate record types deine the relationships between a URL or
FQDN and an IP address. The ollowing list includes the DNS record types you are likely to
encounter on the A+ Core 1 (220-1101) exam:
•
A record An A record associates a domain name with its corresponding IPv4 address,
and it deines the ollowing characteristics or the domain name:
• The domain name I an “at” sign (@) ollows the domain name, the name is a
root domain name.
• The IP address associated with the domain name A records can only hold
IPv4 addresses.
• The TTL (Time to Live) in seconds The deault is 14400 (240 minutes or 4 hours).
This is the time at which DNS must request new inormation or this record type.
Here is an example o an A record:
www.myurl.com @ A 144.168.202.182 14400
•
•
AAAA record An AAAA record perorms the same unction and contains
essentially the same data as an A record. However, an AAAA record associates an
IPv6 address to a domain name. Remember that A is or an IPv4 address and AAAA
is or an IPv6 address.
MX record Mail exchanger (MX) records provide SMTP instructions or e-mail to use
to reach a particular mail server, which must have an active A record that provides its
IP address. In addition to the ields in an A record, the MX record includes a priority. In
the example that ollows, the MX record has a priority o 10. There is no scale, but the
lower the priority in an MX record, the higher its privilege.
Here is an example o an MX record:
www.myurl.com @ MX 10 mail.myurl.com 14400
•
TXT record A text (TXT) record can be combined with any other DNS record type
to store comments or descriptions that cannot be included in other record types. In a
TXT record, the IP address ield is replaced with a comments or “value” ield that can
contain up to 255 alphanumeric characters. As explained in the next section, TXT
records can also be used to help prevent spam.
Here is an example o a TXT record:
www.myurl.com @ TXT “IP expires 10-31-24” 14400
EXAM TIP The important elements and concepts to remember about DNS for the
A+ Core 1 exam are addressing, A records, AAAA records, TXT records, and MX records.
91
92
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
E-mail Protection in DNS
The DNS server’s MX records indicate where e-mail messages are to be orwarded. Speciically, MX records identiy the mail servers that can receive messages addressed to a domain
name. MX records identiy speciically who (which senders) is authorized to send messages to
a mail client or mail box. There are other DNS record types that can help to set up controls on
the deliverability o e-mail. For the A+ Core 1 exam, you should know the DMARC, SPF, and
DKIM record types and their purposes, as explained in the ollowing sections.
DMARC Record
DMARC stands or Domain-based Authentication, Reporting, and Conformance. DMARC
records are composed in DNS TXT record types to help prevent spooing on the domain in an
e-mail address. Essentially what a DMARC does is deine what should happen to a message i
the sender cannot be authenticated. One o two actions can be taken:
•
•
The receiving mail server is advised to quarantine the message, reject the message, or
accept the message or delivery to the addressee.
The receiving mail server reports to the message’s recipient e-mail address (or addresses)
with inormation on messages received rom the sending domain.
SPF Record
A Sender Policy Framework (SPF) record is another type o a DNS TXT record. An SPF record
identiies the speciic mail servers that are authorized to send out e-mail rom a particular
domain. One o the primary protections oered by an SPF record is that it can prevent spam
being generated rom the domain with a spooed From address. In other words, SPF records
act as an e-mail authentication agent that protects against e-mail spooing.
DKIM Record
The DomainKeys Identified Mail (DKIM) DNS record attempts to authenticate whether a message’s content can be trusted and has not been modiied or tampered with while in transit.
DKIM records are also TXT records. An SPF record is oten compared to the return address o
a message, and DKIM raises the level o a message to something like that o a USPS certiied
letter, providing enhanced trust to both sender and receiver.
DHCP
Although the Dynamic Host Configuration Protocol (DHCP) was discussed in the previous
objective, we’ll look a bit deeper into some o its characteristics and unctions in this section.
DHCP Operations
DHCP operates with a our-step interactive process to provide an IP coniguration to a network node. The steps involved, and the transaction types used, are as ollows:
DOMAIN 2.0 Objective 2.6
1. When a network node powers up onto a network, typically a LAN, it has no ability to
communicate on the network. To gain this ability, it broadcasts a DHCPDISCOVER
message to the network with a source address o 0.0.0.0 and a destination address
o 255.255.255.255. The local network DHCP server continuously scans or these
messages on UDP port 67.
2. The DHCP server responds to the DHCPDISCOVER message with a DHCPOFFER
message that includes all o the coniguration settings the node needs to become
active on the network. The node, which is now a DHCP client, uses the content o the
DHCPOFFER message to complete its network coniguration.
3. The client replies to the DHCPOFFER message with a DHCPREQUEST message to
accept the coniguration it was provided.
4. The server acknowledges the client’s DHCPREQUEST message with a DHCPACK
message granting permission to the client to use the coniguration provided.
DHCP Leases
As explained in the previous objective, DHCP coniguration data is not assigned permanently
to a network node. In eect, the coniguration is assigned or a speciic period o time ater
which it expires and must, i possible, be renewed.
Why is this mechanism needed? Well, at one time, an organization could have more networked workstations needing Internet access than it had IP addresses. So, to give each one
the network time needed, IP addresses were pooled and assigned by DHCP on ixed-time
leases. The lease time set the number o seconds a client could use the IP coniguration beore
it expired and then possibly assigned to a dierent node. On networks that allow clients to
renew their leases, a lease is renewed when the lease period is about hal over. However, i a
node with a current DHCP coniguration is powered o, the next time it restarts, the complete
cycle starts over rom scratch.
EXAM TIP For the exam, know the difference between a static IP address and a
reservation. A static IP address is configured at the client, and the DHCP reservation is
created at the server.
DHCP Scope
A DHCP scope deines a range o IP addresses and other coniguration settings available
or assignment to requesting network nodes. DHCP scopes can be deined as one o three
dierent types:
•
Normal A normal DHCP scope is created through the DHCP Management Console
and the Scope Wizard.
93
94
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
•
•
Multicast A multicast scope is created and managed by the Multicast Address
Dynamic Client Allocation Protocol (MADCAP).
Superscope A DHCP server with a superscope is able to provide DHCP coniguration
settings to clients on multiple subnets.
All DHCP scopes share a common ormat that includes the ollowing data:
•
•
•
•
•
•
•
Network ID or the range o IP addresses in the scope
Subnet mask or the network ID
The range o IP addresses assigned to the scope
The IP address o the network gateway or router
The range o any IP addresses excluded rom the scope
The lease duration in seconds
An administrative alphanumeric name or the scope
EXAM TIP You can expect to encounter questions about or references to DHCP
leases, reservations, and scope types on the A+ Core 1 exam.
VPN
A virtual private network (VPN) sets up endpoints at each end o an encrypted tunnel between
computers or networks to join them into a private network as i they were on a directly connected LAN (though they obviously won’t perorm like it). In order to pull o this trick, the
endpoint on each LAN gets its own LAN IP address and is responsible or handling traic
addressed to and rom the remote network (see Figure 2.6-2).
NOTE When your mobile or portable device connects to an untrusted Wi-Fi
hotspot, you can connect to another network with a VPN and do all of your browsing
(or other work) through the secure tunnel.
In Windows 10/11, type VPN at the Start screen and select VPN Settings. Enter your VPN
server inormation, which your network administrator should provide, in the resulting dialog
box (see Figure 2.6-3). This creates a virtual NIC that gets an IP address rom the DHCP server
back at the oice.
To set up a VPN connection in macOS, open System Preerences | Network, click Add, and
choose VPN. Select the VPN type, server address, account name, and authentication settings
and then click OK. Click Connect to connect.
To set up a VPN connection in Linux, check the distro’s documentation.
DOMAIN 2.0 Objective 2.6
FIGURE 2.6-2
Typical VPN tunnel
FIGURE 2.6-3
The Add a VPN Connection dialog box in Windows 11
95
96
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
VLAN
A virtual local area network (VLAN) is a Layer 2 logical construct o switch ports that connect
a set o nodes to create a broadcast domain. Typically, a VLAN is created by coniguring ports
on a managed network switch into a single VLAN. Other VLANs may be conigured on the
same switch by placing other interaces into a VLAN coniguration. A VLAN is essentially
a subgroup o switch ports on an Ethernet LAN. A VLAN is its own broadcast and collision
domain and subnetwork, thus increasing the number o domains while reducing the size o
each. For example, a 48-port managed switch could be subdivided into six eight-port VLANs.
Figure 2.6-4 illustrates a common VLAN in which all o the network hosts exist on the same
collision and broadcast domain. Figure 2.6-5 shows an example o how VLANs are conigured
across a network.
FIGURE 2.6-4
A VLAN with all of the hosts in the same broadcast domain
VLAN1
Floor 3
VLAN2
VLAN3
Floor 2
Floor 1
FIGURE 2.6-5
VLANs do not need to be configured in a single location or on a single switch.
DOMAIN 2.0 Objective 2.6
ADDITIONAL RESOURCES
To learn more about VLANs, go to www
.lifewire.com and search for the article “What Is a Virtual LAN (VLAN) and What Can
It Do?”
REVIEW
Objective 2.6: Compare and contrast common network configuration concepts
•
•
•
DNS record types contain speciic content:
• The ollowing are the important address records:
• A records associate a domain name with an IPv4 address.
• AAAA records associate a domain name with an IPv6 address.
• MX records provide SMTP instructions.
• TXT records hold comments and descriptions.
• DKIM records are a version o TXT records that provide message authentication.
• SPF records identiy the mail servers authorized to send e-mail rom a domain.
• DMARC records prevent domain spooing.
A VPN is a virtual private network. It enables secure connections over an insecure
network such as the Internet.
A VLAN is a collection o ports that act as a separate physical network, and it requires
a managed switch.
2.6 QUESTIONS
1. Which o the ollowing is used to deine DNS-based security or e-mail?
A. DKIM
B. DMARC
C. SPF
D. MX
2. Company K has a sales orce that typically uses insecure wireless networks in hotels
and coee shops. Which o the ollowing should you advice the salespeople start using
to enhance security?
A. VLAN
B. VPN
C. NAT
D. IPv6
97
98
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
3. A DHCP-provided IP address that never changes is known as which o the ollowing?
A. IP permanency
B. IP reservation
C. Link-local
D. APIPA address
4. Your client wants to buy a single switch to create three separate wired networks.
What type o networks does the client want to create?
A. VPN
B. Link-local
C. VLAN
D. IPv6
5. Which o the ollowing DNS record types is a TXT record intended to prevent spooing
o an e-mail address domain?
A. MX
B. AAAA
C. DMARC
D. SPF
2.6 ANSWERS
1. D
2.
DMARC, SPF, and DKIM records are deined using a TXT record.
B
A VPN is a virtual private network, which creates a secure “tunnel” or carrying
network traic through insecure connections.
3. B
An IP reservation is an address set up by a DHCP server that doesn’t change.
4. C A VLAN is a group o ports on a managed switch that perorms as i it’s on a
separate network rom other ports on the switch.
5. C
DMARC records help to block spooing o a domain name.
Objective 2.7
T
Compare and contrast Internet
connection types, network types,
and their features
here are many dierent methods or connecting to the Internet as well as many
dierent network types. They work together to connect devices into networks ranging in
size rom small LANs to worldwide networks.
DOMAIN 2.0 Objective 2.7
Internet Connection Types
When you want to connect a LAN to the Internet, you need some way o connecting the LAN
to an available data transmission medium. This can only be done through hardware that interconnects your computer, LAN, or WLAN to the data transmission medium and the sotware
that speaks to the hardware. However, this hardware and its associated sotware as well as
where the hardware is located can vary.
EXAM TIP Make sure you can explain the differences between these Internet
connection types: satellite, fiber, cable, DSL, dial-up, cellular, and wireless Internet
service provider (WISP).
Connection Hardware
The type o hardware device used to connect to an Internet service largely depends on
the ISP and the type o service it provides. Each o the dierent Internet connection types
uses a dierent proprietary device suited to the signal type and ormat. Table 2.7-1 lists the
hardware device type used or each o the Internet service types you may encounter on the
A+ Core 1 exam.
NOTE Each PC OS has settings to share a direct Internet connection with a LAN or
other systems. For example, Windows 10 uses a virtual network adapter and Internet
Connection Sharing (ICS), and Windows 11 provides a wireless hotspot.
Satellite
Satellite connections beam data to a proessionally installed satellite dish at your house or
oice (with line o sight to the satellite). Coax connects the satellite to a receiver or satellite
modem that translates the data to Ethernet, which can connect directly to your router or the
NIC in your computer.
TABLE 2.7-1
Internet Service Connection Devices
Internet Service
Connection Device(s)
Dial-up
Digital subscriber line (DSL)
Cable
Satellite
Cellular (3G/4G/5G)
Modem
Modem
Modem and router or modem/router combo
Modem/router combo (plus satellite disk)
Cellular Internet gateway
99
100
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Real-world download speeds in clear weather run rom a ew to about 25 Mbps; upload
speeds vary but are typically a tenth to a third o the download speed. They aren’t stunning, but
satellite can provide these speeds in areas with no other connectivity.
NOTE Keep in mind satellite latency—usually several hundred milliseconds (ms).
It isn’t highly obvious for many purposes but can affect real-time activities like gaming
or video/voice calls.
Fiber
Telephone system providers are in the process o making iber optic services available. The
two primary service types or network (WAN and Internet) are iber-to-the-node/iber-tothe-neighborhood (FTTN) and iber-to-the-premises (FTTP) services. FTTN connections
run rom a provider’s central oice (CO) to a distribution box in a neighborhood. Your
home or oice connects to the distribution box over coaxial or Ethernet cable. An FTTP
connection links the provider’s CO directly to a home or oice with iber cabling the whole
way.
NOTE Other types of fiber services available include fiber-to-the-curb/fiberto-the-cabinet (FTTC), fiber-to-the-home (FTTH), and fiber-to-the-building (FTTB).
Fiber is also commonly spelled as “fibre.”
Fiber services are becoming more available in cities, with several telco and resell providers
oering a variety o service packages. These services oer a range o speeds (100 to 5000 Mbps)
and subscription costs ($39 to $55 per month).
Cable
It may seem counterintuitive that a cable TV service could also provide high-speed Internet
service. The coaxial cable used to carry the two signal streams is capable o transmitting multiple MHz o signals. The TV service uses only a 6-MHz channel to transmit the available channels and more. The remaining space can then be used or other services, including Internet
and possibly telephone. Typically, the service enters a premises through either a modem or
router (or a combination o the two) and is capable o supporting either a wired or a wireless
SOHO network.
The cable Internet services oer a relatively wide range o speeds, mostly asymmetric,
meaning a service oers dierent upload speeds (5 Mbps to 50 Mbps) and download speeds
(50 Mbps to 5 Gbps). Cable Internet connections are theoretically available anywhere you can
get cable TV.
DOMAIN 2.0 Objective 2.7
DSL
A digital subscriber line (DSL) connects to a provider’s CO on what is called either the plain
old telephone system (POTS) or the public switched telephone network (PSTN). A switching
device at the CO, a DSL access multiplexor (DSLAM), supports an always-on Internet connection. There are several “lavors” o DSL, and depending on a number o actors, any or all may
not be available to any given location.
Distance is DSL’s primary limiting actor. DSL’s speed diminishes as the distance between
the subscriber’s premises and the provider’s CO increases. In general, DSL has a very limited
range in which its maximum speeds are available, commonly less than 18,000 eet (3.4 miles),
measured along the cable path o the provider.
NOTE
The most common forms of DSL are asynchronous (ADSL) and synchronous
(SDSL).
Cellular
Access to an Internet connection has become a necessity or households and SOHOs. Most
cellular service providers now oer home and oice cellular Internet plans. Cellular Internet
connections are increasingly available in 3G, 4G, and 5G in more locations. In addition to
being available in smartphones, cellular connections are available or tablets and laptops as an
additional wireless eature alongside the usual Wi-Fi and Bluetooth connections.
To connect an oice or a residence to a cellular Internet service requires a router or a hotspot that connects to a cellular service provider’s network, in the same way that a cellular
phone does. A router provides or a wireless LAN, and a hotspot essentially extends the cellular
service into the premises. One major limitation on cellular Internet services is that they may be
subject to data plans. The amount o data transerred may be included in the cell service plan’s
cost, usually with a cap, such as a 10-Gigabit download limit, on a single cellular subscription.
Exceeding the data cap could be very expensive.
The data speed o the internal network largely depends on location. The closer you are to a
cell tower, the higher the speed o the service between the router/hotspot and the tower will be.
Another actor that can aect data speeds is congestion; as more devices connect to the tower,
its speed can diminish. Weather may also become a actor, although rarely. Typically, the data
speeds o a cellular Internet service or homes and oices tend to be lower than those o cable
or FTTH server. It is anticipated that 5G services will greatly improve speed, bandwidth, and
perhaps even cost.
Wireless Internet Service Provider
A wireless Internet service provider (WISP) is an ISP that uses wireless technology to provide
Internet services to the home. WISP networks are called line o sight. Line-of-sight wireless
101
102
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Internet service (also known as fixed wireless) is a popular choice in some smaller cities and
nearby rural areas where cable or DSL Internet services are not available. This type o service
uses high-powered directional antennas to connect to ixed locations up to about eight miles
away. Speeds can vary rom as little as 256 Kbps to 20 Mbps or more, depending on the distance and your ISP.
ADDITIONAL RESOURCES
To learn more about this type of service, search
the Web for “broadband fixed wireless.”
Network Types
With more network types than ever beore, the CompTIA A+ 220-1101 exam expects you to
know the dierences between LANs, WANs, and many more. See the ollowing subsections or
a brie introduction to the types you need to know.
EXAM TIP Make sure you can explain the differences between these network
types: LAN, WAN, PAN, MAN, WLAN, and SAN.
LAN
A local area network (LAN) is a group o networked computers within a ew hundred meters o
each other. LAN connections typically use wired Ethernet or Wi-Fi.
WAN
A wide area network (WAN) is a group o computers on multiple LANs connected with longdistance technologies. The Internet is a WAN.
PAN
A personal area network (PAN) is a short-range network typically using Bluetooth. It is used to
interchange data between personal devices such as smartphones, tablets, and laptops.
MAN
A metropolitan area network (MAN) is a network larger than a LAN but smaller than a WAN.
The term MAN is oten used to reer to city-wide or campus-wide networks that use iber optic
or ixed-base wireless networks.
DOMAIN 2.0 Objective 2.7
WLAN
A wireless local area network (WLAN) is essentially a LAN with the wired medium replaced
by an RF wireless medium, typically with similar range, attenuation, and strength. However, a WLAN can be less secure because its signal is transmitted through the air and can
be intercepted.
SAN
A storage area network (SAN) interconnects two or more storage devices into a single addressable network node. A SAN, which can be connected directly to the network, a server, or a network node, commonly by a iber channel (FC) protocol, is a sel-contained network primarily
or servicing data transers. A SAN is recognized by an accessing device as a single data storage
device, which serves to reduce latency and improves data transer speeds. Because a SAN is
made up o multiple storage devices, it can provide redundancy and scalability in that additional devices can be added to the SAN without impacting the existing system.
NOTE A SAN is commonly confused with a NAS (network attached storage), which
is a control device with multiple storage devices attached. The storage devices of a
NAS are typically in a RAID arrangement.
REVIEW
Objective 2.7: Compare and contrast Internet connection types, network types, and their
features
•
•
•
•
•
•
•
Internet service types use a variety o connection devices:
Dial-up and DSL services use a modem.
Cable service uses a modem and router or a modem/router combination.
Satellite service uses a modem/router combination.
Cellular (3G/4G/5G) uses a cellular Internet gateway.
Satellite connections beam data to a satellite dish with a line-o-sight signal.
The two primary options or Internet service over iber are iber-to-the-node (FTTN)
and iber-to-the-premises (FTTP).
Cable TV services also provide highspeed Internet services on a coaxial cable able to
carry the two signal streams.
•
•
•
•
A digital subscriber line (DSL) provides Internet services over the PSTN.
Cellular Internet connections are available in 3G, 4G, and 5G on smartphones as well
as cellular Internet gateways.
Line-o-sight wireless Internet service or ixed wireless service is a popular choice in
rural areas where other types o Internet services aren’t available.
103
104
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
•
•
•
•
•
•
A local area network (LAN) is a group o networked computers within a ew hundred
meters o each other. LAN connections typically use wired Ethernet or Wi-Fi.
A wide area network (WAN) is a group o computers on multiple LANs connected with
long-distance technologies. The Internet is a WAN.
A personal area network (PAN) is a short-range network typically using Bluetooth.
It is used to interchange data between personal devices such as smartphones, tablets,
and laptops.
A metropolitan area network (MAN) is a network larger than a LAN but smaller than
a WAN. The term MAN is oten used to reer to city-wide or campus-wide networks
that use iber optic or ixed-base wireless networks.
A wireless local area network (WLAN) is a LAN with an RF wireless medium that may
be less secure because its signal is transmitted through the air and can be intercepted.
A storage area network (SAN) interconnects two or more storage devices into a single
addressable network node connected using a iber channel protocol.
2.7 QUESTIONS
1. You are working with a client who needs Internet access but lives too ar away rom
the city to use DSL or cable. They live on top o a hill. They need quick response and
expect to use 15 GB or more o data per month. Which o the ollowing Internet
services would you recommend investigating?
A. Satellite
B. Cellular
C. FTTP
D. Line-o-sight ixed wireless
2. Your client has an old laptop with an RJ-11 port and an RJ-45 port built in. The laptop
does not have wireless capabilities. Without buying or renting another component, the
client is ready to use which o the ollowing Internet connection types on this laptop?
A. DSL
B. Dial-up
C. Cable
D. Fiber
3. You are at a client’s location preparing to install an update to Windows. Their Internet
connection goes down. Which o the ollowing is the best choice to use to install the
update immediately?
A. DSL
B. Dial-up
C. Mobile hotspot/tethering
D. ISDN
DOMAIN 2.0 Objective 2.8
4. Your client wants to build a network that will connect locations in various parts o a
medium-sized city with each other. Which type o network does the client want to create?
A.
B.
C.
D.
MAN
WAN
LAN
PAN
5. Your company is considering upgrading its DSL service to a aster service. Which o
the ollowing types o services is likely to be the astest?
A. Cable
B. FTTN
C. Satellite
D. FTTP
2.7 ANSWERS
1. D Line-o-sight ixed wireless, i available, is the best choice because it has no data
caps and, unlike satellite, has a quick response rate (that is, a ast ping rate).
2. B The RJ-11 port indicates the laptop has a dial-up modem. Dial-up requires no
additional equipment, only an account with a dial-up ISP.
3. C The mobile hotspot/tethering option supported by many smartphones would
enable you to perorm the update onsite.
4. A A metropolitan area network (MAN) connects locations in a single city that
might be separated by some blocks o distance.
5. D Fiber-to-the-premises (FTTP) will be the astest because the iber is connected
directly to the oice.
Objective 2.8
Given a scenario, use networking tools
W
hether you build, repair, or troubleshoot wired or wireless networks, you need to understand how to use the networking tools covered in this section.
EXAM TIP Make sure you understand the uses for the following tools: crimper,
cable stripper, Wi-Fi analyzer, toner probe, punchdown tool, cable tester, loopback plug,
and network TAP.
105
106
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 2.8-1
Crimper
Crimper and Cable Stripper
For a patch cable, use stranded unshielded twisted pair (UTP) cable matching the Cat level
o your horizontal cabling. I you use cable with a lower Cat level than your existing cable,
the network might run more slowly. The basic tool is a RJ-45 crimper (see Figure 2.8-1) with
built-in cable stripper (also known as a wire stripper) and wire snips. Stranded and solid-core
cable require dierent crimps; make sure you have the right kind. First, cut the cable square
with the RJ-45 crimper or scissors; then use the built-in cable stripper to strip a hal inch o
plastic jacket o the end o the cable (see Figure 2.8-2). Once the cable is stripped, you’re ready
to wire the connector.
FIGURE 2.8-2
Properly stripped cable
DOMAIN 2.0 Objective 2.8
FIGURE 2.8-3
Typical 2.4-GHz (left) and 5-GHz (right) router activity as captured by Wi-Fi
Analyzer from Farproc
Wi-Fi Analyzer
Which Wi-Fi channels are currently in use? How strong are the signals? To ind out, you
can use your Android or iOS smartphone with a ree or paid Wi-Fi analyzer app, available
rom many vendors on the Google Play and Apple App stores. Figure 2.8-3 illustrates how a
typical Wi-Fi analysis app (Wi-Fi Analyzer app or Android rom Farproc) shows activity on
the 2.4- and 5-GHz bands. Ater you review the inormation, you might want to change the
channel(s) used by your router.
Toner Probe
Even in well-planned networks that don’t turn into a rat’s nest o cable, labels all o and people
miscount which port to label. In the real world, you may have to locate, or trace, cables and
ports to test them.
107
108
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 2.8-4
Fox and Hound, a tone generator and probe (toner probe) made by Triplett
Corporation
Network techs use a toner probe, also known as a tone generator and probe (see Figure 2.8-4).
The tone generator connects to the cable with alligator clips, tiny hooks, or a network jack, and
it sends an electrical signal along the wire. The toner probe emits a sound when it is placed near
the cable carrying this signal.
Punchdown Tool
With a typical horizontal cabling run, you’ll connect the work-area end to the back o a wall
outlet with a emale connector, and the telecommunications-room end will connect to the
back o a patch panel’s emale connector. You typically use a punchdown tool (see Figure 2.8-5)
to connect the cable to a 110 block (also called a 110-punchdown block), which is wired to
the emale connector. The punchdown tool orces each wire into a small metal-lined groove
(shown in Figure 2.8-6), where the metal lining slices the cladding to contact the wire.
DOMAIN 2.0 Objective 2.8
FIGURE 2.8-5
Punchdown tool
FIGURE 2.8-6
Punching down a patch panel (left) and modular jack (right)
NOTE The UTP connectors in outlets and patch panels also have Cat levels—for
example, don’t hamstring a good Cat 6 installation with outlets or patch panels that
have a lower Cat level (such as Cat 5e or Cat 5).
A work-area wall outlet (see Figure 2.8-7) consists o one or two emale jacks, a mounting
bracket, and a aceplate.
109
110
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
FIGURE 2.8-7
Typical work area outlet
Cable Tester
A cable tester (shown in Figure 2.8-8) is used to veriy the individual wires in twisted pair (TP)
cable are properly located and connected. When testing cables, be sure to test patch cables as
well as cable runs in the walls. To do so, unplug the patch cable rom the PC, attach a cable
tester, and go to the communications room. Unplug the patch cable rom the switch and plug
the tester into that patch cable.
FIGURE 2.8-8
Typical cable tester
DOMAIN 2.0 Objective 2.8
FIGURE 2.8-9
Loopback plug
Loopback Plug
A bad network interace card (NIC) can cause a length o network cable to appear to have
ailed. Unortunately, the NIC’s emale connector is easy to damage. To determine i the card
is bad, diagnostics provided by the OS or NIC manuacturer may include a loopback test
that sends data out o the NIC to see i it comes back. A loopback plug (see Figure 2.8-9) is
attached to the NIC’s RJ-45 cable port, and it loops transmit lines back to the receive lines. I
the data that’s sent and received is the same, the NIC port works. I not, the NIC needs repair
or replacement.
Network TAP
A network TAP (test access point) is a piece o hardware that can be added to a network segment to track network traic over the network medium. The TAP copies all network traic,
without impeding its low. It provide access or other monitoring or measuring devices to all
network activity lowing on the network medium.
As illustrated in Figure 2.8-10, a network TAP device is inserted into a network segment,
typically between two interconnecting devices such as a switch and a server (as illustrated)
or perhaps, on a wireless network, between an access point and a router. In either o these
cases, the link is considered to be an “out o band” connection. The TAP provides connections or monitoring devices, such as an intrusion detection or prevention system or an
VoIP recorder.
111
112
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Network
Server
TAP
Monitor
Monitoring devices
FIGURE 2.8-10
An example of how a network TAP can be used to capture network traffic
information
REVIEW
Objective 2.8: Given a scenario, use networking tools
•
•
•
•
•
•
•
•
A crimper is used to attach a connector to a UTP cable.
A wire/cable stripper is used to remove the outer sheath rom the cable to expose the
UTP wires.
A tone generator and probe (also known as a toner or toner probe) is used to ind the
speciic cable or labeling or testing.
A cable tester tests speciic wires in a cable.
A loopback plug checks the condition o a NIC port.
A punchdown tool is used to connect the wires in a cable to a 110-punchdown block.
A Wi-Fi analyzer is an app you can run on an iOS or Android smartphone to display
signal strength and network usage or Wi-Fi networks.
A network TAP monitors local network events.
2.8 QUESTIONS
1. Your client is reporting problems with some o their network cables. Unortunately,
none o the cables are labeled and the client’s wiring closet is a mess. Which o the
ollowing should you use to help label the client’s cables?
A. Multimeter
B. Toner probe
DOMAIN 2.0 Objective 2.8
C. Crimper
D. Loopback plug
2. Ater labeling the cables or your client, you discover that one o the cables is connected
to a workstation that can’t connect to the Internet. To help determine i the problem is
actually the NIC, which o the ollowing would you use?
A. Loopback plug
B. Multimeter
C. Cable tester
D. Tone generator and probe
3. Your client’s 2.4-GHz network once ran very quickly. However, several new houses
have been built nearby and network perormance is now very poor. Which o the
ollowing would help determine i dierent settings are needed?
A. Mobile hotspot
B. Cable tester
C. Punchdown tool
D. Wi-Fi analyzer
4. You are preparing to build some network patch cables or a Gigabit Ethernet network.
Which o the ollowing do you not need to use or this task?
A. Punchdown block
B. RJ-45 crimper
C. Wire stripper
D. Connector matching cable type
5. Ater an oice remodeling project, some segments o your client’s wired network are
slow. The existing computers, switches, and routers were retained, but additional patch
panels were installed. What might have gone wrong during the process? (Choose two.)
A. Incorrect Cat level in patch panels
B. Loopback plugs let connected to some workstations
C. Incorrect Cat level in patch cables
D. Hub used on some network segments
2.8 ANSWERS
1. B
A toner probe helps determine which wire is which.
2. A A loopback plug is attached to the NIC’s RJ-45 cable port, and it loops transmit
lines back to the receive lines. I the data that is sent and received is the same, the NIC
port works. I not, the NIC needs repair or replacement.
113
114
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
3. D A Wi-Fi analyzer displays the activity on the 2.4-GHz band by channel and
router name.
4. A A punchdown block is not used to make patch cables. It is used or cables wired
into a wall.
5. A C Using patch cables or punchdown blocks with Cat levels lower than the network
hardware requires could slow down the network. For example, using Cat 5 (100 Mbps)
on a system designed or Cat 6 (1000 Mbps) hardware capabilities.
M A
I
3.0
Hardware
Domain Objectives
• 3.1 Explain basic cable types and their connectors, features, and purposes.
• 3.2 Given a scenario, install the appropriate RAM.
• 3.3 Given a scenario, select and install storage devices.
• 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
• 3.5 Given a scenario, install or replace the appropriate power supply.
• 3.6 Given a scenario, deploy and configure multifunction devices/printers
and settings.
• 3.7 Given a scenario, install and replace printer consumables.
115
N
D
O
116
Mk M’ CmTIA A+ C 1 Cf P
Objective 3.1
Explain basic cable types and their
connectors, features, and purposes
C
bg  g  h m m  g ,   b
(PCB), x , m, h v,  v h m.
Cb ( )  xm m   mg v’  mm
,    g,   x mm h h v. I h bjv, 
k  h v    m,  v,  h .
Network Cables and Connectors
Nk b  m  h v   k, m LAN,
   v     I g. Th  h m g 
k b, h b    m:
•
•
•
Twisted pair (TP) Th  m- b  h m  b 
Eh LAN  h .
Coaxial Th b  h       m hg  h
m  b TV  I v.
Fiber optic Th b  m  gh m v  g   .
Fb bg  b   LAN , b ’ m mm   gh m  WAN.
NOTE Another very popular LAN medium is RF signaling, more commonly
known as wireless networking, WLAN, or simply Wi-Fi. Domain 2.0 of the Core 1
exam (220-1101) covers wireless media.
EXAM TIP Be sure you are familiar with the network cable types identified in
this objective and their speeds, characteristics, and any transmission limitations.
Copper Cables
W Eh k    (   b) g -
g  b. A  , h  m    bg   
 x b. O h  b , TP  b  h m mm  h x
bg        .
DOMAIN 3.0 Objv 3.1
FIGURE 3.1-1
A Cat 6 twisted-pair cable
TP b,  h  Fg 3.1-1,  m  gh     
g   - . Tb 3.1-1 m h h  h mj
g  Eh b   : C 5, C 5, C 6,  C 6.
NOTE The Electronics Industry Association/Telecommunications Industry
Association (EIA/TIA) classifies twisted-pair cable into categories, or Cats, each of
which defines the construction, characteristics, and proper use of different twistedpair cable types, such as the number of wires and nominal transmission speeds.
Cats 1 through 4 are now considered to be defunct, and Cats 7 and 8 (40 Gbps) are
now available.
EXAM TIP Although most Ethernet installations use twisted-pair cabling,
Ethernet networks can also use fiber optic or coaxial cable. Coaxial cable is still in
use for hazardous environments, such as wet areas.
TABLE 3.1-1
Common Ethernet Cable Types
Category
Maximum Speed Supported Network Types Supported
C 5
C 5
C 6
C 6 (Agm)
100 Mb
1 Gb
1 Gb
10 Gb
F Eh (100-Mb Eh)
Ggb Eh (1000-Mb Eh)
Ggb Eh (1000-Mb Eh)
Ggb Eh, 10-Gb Eh ( 
100 m),  P v Eh (PE)
117
118
Mk M’ CmTIA A+ C 1 Cf P
TABLE 3.1-2
Common 802.3 Ethernet Cable Codes
IEEE Standard
Ethernet Cable Designation
Cable Medium
802.3
802.3
802.3
802.3j
802.3
802.3b
802.3
10B5
10B2
10BT
10BFL
100BTX
1000BT
10GBT
Cx (Thk)
Cx (Th)
T 
Fb 
TP
TP
TP
TP bg   Eh k   g b h IEEE 802.3  h 
m v g m,     h Eh . Tb 3.1-2  h
m mm   h Eh b . A h, h b g 
h m:    ,  m m,   mm g.
F xm,  10BT g   10 Mb , bb m, 
- mm.
EXAM TIP For the A+ Core 1 exam, you should know the IEEE standards in
Table 3.1-2. The Ethernet standards in this table are for informational and crossreferencing purposes only.
Unshielded Twisted Pair
Unshielded twisted pair (UTP) bg     gh 22–26 AWG (gg) 
, h  hh   h  -mh  m    . Th g
   h    mm v hhg. Th EIA/TIA 568 ,
hh h A+ xm    T568A  T568B,  h   q  h
- . UTP bg  h m mm b    Eh  
k. Fg 3.1-1 h h    C 6 UTP b.
Th g  h      mh mg  b h
  h   h k h j  . I , h   
 h  j mg  (EMI) m  h b. N h 
   k h, b Ax Ghm B v h .
Shielded Twisted Pair
E,  shielded twisted pair (STP) b h h m b    UTP b.
Hv, h        hg  h   j  x
EMI. STP   q   g k . I’ m mm  
EMI-hv g, h   mh h     h  m.
DOMAIN 3.0 Objv 3.1
FIGURE 3.1-2
Cat 6 cable showing the identification on the sheathing
M Eh b  mk h  C mb,  h  Fg 3.1-2.
Th EIA/TIA 568 ,  ,  h mxmm    g C 5,
5,  6 b  (b  k v). F C 5, C 5,  C 6, h mxmm
gm gh  100 m (b 328 ). Th   h  
 h b . C 6 h  mx   55 m ( b m h 60 ). B
h ,  k  m b   z   b gm, xg
h    h b.
C 6 (C 6 gm)   v   h TP h v m     m . A h  Fg 3.1-3,   hhg m  
-mk x m, h     -  h  
 .
Cross-Reference
To learn more about network devices used with Ethernet, see Domain 2.0, Objective 2.2.
Direct-Burial Underground Cable
Sh  b      ,  m b q  (  )  
k b g. A  m  b   hg bg, h   bg 
b  g:  b, g b b,  -b b. Th
h   h    h A+ C 1 bjv.
Low smoke zero halogen
(LSZH) sheath
Drain wire
Foil shield
Copper wire
Color-coded
insulation
FIGURE 3.1-3
A cross-section of a Cat 6 cable showing its construction
119
120
Mk M’ CmTIA A+ C 1 Cf P
Th    h  h b   b  q  b g   b- b. Hv,  g, h b  g  h g:
•
•
•
Outdoor cable Th b g  hgh-  -m  m ,
  h   g  b mg. Hv,     b h h
b  b g   —h, , k, , ,  .
Underground burial cable Th b g  m h  b 
g,  g  ’   m m  . Th   b
h     g  h x jk   h  g
m m mg. Hv, m  h b’  vm 
v g h  jk  h b   m   h
 g. Dmg  h     h , v, 
h    h b.
Direct-burial cable Cbg h h g h  m g b  h- g h q  , k  m , b b
 g h  , h   . I ,
h b m b UL (U’ Lb) m-  q  
P-Lm T Cb (PLTC). Th m tray cable m h h b  b
    , gh, ,  . Th  m   b g b,  hh h  h  h   hh h bk
 m  ,  underground service entrance (USE)  underground feeder
(UF) b. USE b  m mm  b  ,  UF  mm
  .
Th bm   g  b   g  h   ’ 
,  m b  h h g  h b   direct-burial cable.
Plenum
A m, h m mm bg   hz   C 5  C 6 UTP. Th
b  mm   h   plenum space, hh   bv g,  ,   . Pm- UTP  STP b h   hhg
h  -, hh    b    m .
Pm- bg h  - jk h   T  h ’
 x m h  b. Th PVC (v h) hhg   m   TP b  mmb,  b,   g m
h   qk hgh  m .
NOTE Horizontal cabling connects the devices on a single level, such as one
floor of a building to connect end devices to a distribution device, such as a router or
a switch. This cabling is commonly UTP. A vertical cabler runs from floor to floor to
connect the individual floor distribution devices to the core system.
DOMAIN 3.0 Objv 3.1
FIGURE 3.1-4
A stripped view of a typical coaxial cable
Coaxial
Cx b, hh  mm  coax,       h  ,
   h  b b ( Fg 3.1-4)  m ,  
  v v. Cx b   g  Rg G (RG) . Th  v  Eh  x b, h 10B5  10B2,   UTP. T, x 
m   b   TV .
Fiber
Fb  b  h   gh bm   gh-mg  (LED)  m Eh k m, hh mk  mm   bm h  ghg, h
,  . Fb  g  v 2000 m (2 km)  m.
Th b  bg    k, mg h ,  h g
m  mm. Ov g-m b,   g b  gh v  
g   b. Mm b  m m LED g, h vg hgh h mm g    g  h . B h 
g  h gh bm  k   v g , mm b 
m  v h m .
M b  Eh k  62.5/125 mm b. Th mb  h
m  h b  h z  h  m. Th  mb (62.5) 
h m  h   m  m,  h  mb  h m, g
 m,  h  m   g ( v g   h  m  k h gh  h ). Fb   h-x;     ,
 b  q  b.
121
122
Mk M’ CmTIA A+ C 1 Cf P
TABLE 3.1-3
A Comparison of Ethernet Cable Medium Standards
Ethernet Standard
Wiring
Cable Type(s)
1000BT
1000BCX
1000BSX
F  UTP
T  STP
O  mm
b 
O  g-m 
mm b 
C 5, 5,  6 UTP
C 5, 5,  6 STP
Mm b 770–860
m m
Fb  b 1270–1355
m m
1000BLX
NOTE
Maximum
Segment Length
100 m
25 m
550 m
500 m
A micron is one-millionth of a meter.
Ug b  bg   k q  b  h  b  k
 . Th       m  h  b
h b Eh . Fb  bg h xm hgh m 
 , b h    Eh k, h   v h h  . Tb 3.1-3 h  m  h Ggb Eh   UTP, STP,
g-m b,  mm b.
Peripheral Cables
A h v   v   , m , x   m.
F h m ,  h v    , ,   . Th 
m  h v   m   mm  b h . Th 
h x h v b     h k  h A+ C
1 xm: v  b (USB), ,  Thb. Th g  v
m  h  h.
USB
USB      v  v   PC  mb v, g kb, m , , ,  v,    gg  
hgh   h v, h   m,  h,  ,  m.
Th   USB  h USB h ,  g  m b  h
h. I   h  b h m  v USB v h   .
Th USB  hb  h   h h  h mk h h   h
USB . A USB h   h b (h m)   v (h v) h g
DOMAIN 3.0 Objv 3.1
FIGURE 3.1-5
Typical USB hub (image courtesy of Targus Global)
 h h . Th h  m  k: g mm  vg    USB v. Th h   m, g v
 m  . Th h   h b v v gg  , 
     h h  v.
Y   x USB    m g h  USB x    USB
hb ( Fg 3.1-5). USB hb m    b- v. P USB
v hv h   g  b- USB v  h  m h
USB b. T m b- v   b- hb   bm,  ’
b    hb  h .
ADDITIONAL RESOURCES
For more information about USB, visit www
.usb.org.
USB v  hot-swappable, hh m      hm  
m h g   m. USB hg    hb   
 127 v   g h    m.
EXAM TIP For the CompTIA A+ 220-1101 exam, you should expect one or more
questions on the USB 2.0 and 3.x standards regarding their connectors and their
maximum data speeds.
123
124
Mk M’ CmTIA A+ C 1 Cf P
TABLE 3.1-4
USB Standards
Name
Standard
Maximum Speed
Cable Length
H-S USB
SS USB
SS USB 10 Gb
SS+ USB
USB 2.0
USB 3.0/3.1 G 1
USB 3.1 G 2
480 Mb
5 Gb
10 Gb
U  5 m
U  3 m
U  3 m
Th hv b v g  h USB , g h v 
. Tb 3.1-4 v  qk   h   hm .
NOTE
USB 3.1 doesn’t specify a limit, but interference can make longer cables
slower.
Ov h   , h hv b v   USB , hh hv
b hgb  h m . F xm, T-A USB g   USB 1.1 
2.0 . Hv, h  USB v, m h 3.x  4 v, hv v
q  h  mk . USB 3.x gg h  h b b 
 hm m  v h bk  h . USB 3.x g  mb h  USB ,  v v. Hv, h ,      
, h    .
Tb 3.1-5  h mm USB   h . N h “k” m
h g   h k    . N h h    m b
    m  h .
TABLE 3.1-5
USB Connection Types
Connector
Plug Type
Plugs Into
T-A
USB 3.0/3.1 S-A
USB 2.0 T-B
USB 2.0 M-B
USB 2.0 M-B
USB 3.0/3.1 M-B
USB T-C
K
K
K
K
K
K
Rvb
Cm
Cm
Lg h
Sm h
T h
T h
Cm  h
DOMAIN 3.0 Objv 3.1
USB 3.0/3.1 Gen 1 Type-A
FIGURE 3.1-6
USB Type-C
USB 1.1/2.0 Type-A USB Micro-B
USB Type-A, Type-C, and Micro-B cables
Fg 3.1-6  3.1-7      Tb 3.1-5.
EXAM TIP CompTIA uses the term USB-C for what others call USB Type-C.
CompTIA also uses the term micro-USB for USB Micro-B and mini-USB for USB
Mini-B. You might see either forms of the device names on the exam.
Th USB T-C     A mh  b, A’ P b,  m k   m. N A Ph   b h  Lghg       USB-C  h h, bh  hh ’ k,  h’
  . USB-C   m ,   . USB-C  mgh   USB 3.1
G 2, USB 3.1 G 1,  USB 2.0 ; hk h v’    .
EXAM TIP You will likely see micro- and mini-USB, USB Type-C, and Lightning
mobile device connection types on the exam. Know their characteristics and differences.
USB 1.1/2.0 Mini-B
FIGURE 3.1-7
USB 1.1/2.0 Type-B
USB 3.0/3.1 Gen 1 Micro-B
USB 2.0 and USB 3.0 Type-B and Micro-B cables
USB 3.0/3.1 Gen 1 Type-B
125
126
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.1-8
DB-9 serial port and connector
Serial Connector
O ’ m, m h  v  USB , hh   m   
. Hv, m g k m hv   m   ,
m k  b  DB-9 . Th DB-9 RS-232    v   h, g - mm, m  m ,   . USB
  b      v hgh  USB DB-9 . Fg 3.1-8 h
 DB-9    .
EXAM TIP Expect to see the DB-9 serial connector on the A+ Core 1 exam.
Thunderbolt
Th Thunderbolt    hgh- v  xg hg, g USB
 FW,  g h g PCI  DP hg m, h mbg h . Tb 3.1-6  h h  h  h v
 h Thb   m   h xm.
A   Tb 3.1-6, h   h  Thb 3  m
 m h USB T-C   . USB T-C  Thb 3   hgb. Th m h USB T-C b  mb h Thb
  h Thb bg  mb h USB T-C . Fg 3.1-9 h
 Thb 3   .
TABLE 3.1-6
Thunderbolt Standards
Standard
Connector
Maximum Speed
Cable Length
Thb 1
Thb 2
Thb 3
M DP
M DP
USB T-C
10 Gb
20 Gb
40 Gb
3 m () / 60 m (b)
3 m () / 60 m (b)
3 m () / 60 m (b)
DOMAIN 3.0 Objv 3.1
FIGURE 3.1-9
Thunderbolt 3 port and connector
Thb b, hh   b  b m xv h USB T 3 b, 
m h h   b . Th  b     3 m (hh 
g b  h). O  x mh h,   60 m. Thb 3 
mh  h USB T-C, h    480 Mb  20 Gb, b  
 40 Gb  b.
Video Cables and Connectors
V b  , m, HDTV,  j   m’ v
  b v . Tb 3.1-7 v  vv  h b   
 h k  h A+ C 1 xm.
TABLE 3.1-7
Video Cables
Video
Cable Type Standard Name
Reduced-Size
Version
Signal Types
Supported
VGA
V Gh
A
N/A
Ag v
HDMI
Hgh-D
Mm
I
Dg V
I
M-HDMI
HD v 
HD 
N/A
HD v
DP
M DP HD v 
(mDP)
HD 
DVI
DP
Notes
VGA  b 
 HDMI, DVI-I, 
DP  h
.
V g  mb
h DVI.
DVI-I (g/g)
 DVI-D (g)
g  mb
h HDMI.
V g  mb
h DVI  HDMI.
127
128
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.1-10
Typical HDMI, Mini-HDMI, DP, and mDP cables/connectors (left to right)
VGA
DVI-D
DVI-I
Mini-HDMI
mDP
FIGURE 3.1-11
HDMI
Typical video ports
Fg 3.1-10  m  h v b,  Fg 3.1-11  m 
h v .
Hard Drive Cables
Objv 3.1  h CmTIA A+ 220-1101 xm   “h v b,” b ’ m  k h h  h b   h SSD,  v,   v.
D   b   b h    h v  m g v.
SATA and eSATA
Serial Advanced Technology Attachment (SATA) g  mm   h v
  v. SATA   --  ( Fg 3.1-12) b 
SATA v, h   h v   v,   SATA .
DOMAIN 3.0 Objv 3.1
FIGURE 3.1-12
SATA power (wide) and data (narrow) cables and drive connectors
A SATA v’  m v  h v- b h  h   
m  gh. Th SATA v’    h SATA   . Th SATA
v—1.0 (1.5 Gb), 2.0 (3 Gb),  3.0 (6 Gb)—hv  mxmm hgh 
150 MB, 300 MB,  600 MB, v. N h h    mgbytes  .
External SATA (eSATA) x h SATA b  x v  h m   h
 SATA b. Th  ( Fg 3.1-13)  k  SATA b  k ;   b   2 m  h    h-b.
EXAM TIP When you encounter the term hot-swappable on the exam, remember
that a hot-swappable drive (or device) is immediately recognized by the system when it
is connected, swapped, or replaced while the system is running.
FIGURE 3.1-13
eSATA connectors (in center of photo)
129
130
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.1-14
80-wire (left) and 40-wire (right) IDE cables
IDE
Integrated Drive Electronics (IDE)  h m   h CmTIA A+ xm  h  
k  ATA  P ATA (PATA) v. Th v   40-  bb b 
    v   h  b   mhb   - . IDE
    g m, hgh   m- m h  SATA
 h v   IDE   v. Fg 3.1-14 h  80- IDE b 
 ,  40- IDE b.
EXAM TIP Although CompTIA uses the term IDE on the exam, the interface is
more often referred to as PATA or ATA/IDE by the industry. They’re the same thing, so
be prepared!
SCSI
Small Computer System Interface (SCSI)    g m    x v
 v . I SCSI v h   v  h v   
b v   v 50-  68-  b h mb  v  IDE
b. Ex SCSI v  bk  b gg m 25   68 . Eh
SCSI v  g  ID mb, bg m v  b    g
h  g -hg. U  k h v, ’ k     SCSI h   v  h .
Th SCSI  h b g  b Serial Attached SCSI (SAS)  v 
g . SAS 4, h  v,     22.5 Gb. SAS   SATA
v. Ah v  SCSI, Internet SCSI (iSCSI),  bk-v I/O  g
v hgh SCSI mm m   k.
Connectors
A   k, g  h   h v m b h   m
g  m     h. M v    , h
h q  mz   . C hv m  g,
DOMAIN 3.0 Objv 3.1
b m    b     g   v g, h
 RJ-45  M SAS 4x.
Cb      b  v     gz. Th m mm  h gz— h ’ ’ k   
h xm— h I  E  E Eg (IEEE), USB Imm
F (USB IF), E I A (EIA), Tmm I A (TIA), Rg Jk (RJ),  I Eh Cmm (IEC).
C  hv  g h  hh      v . A “m”   h  h , b,  . A “m”  h h
    h h v h g m  h m .
L’ k  h    k    h A+ C 1 xm.
Registered Jack Connectors
A RJ     mg b h TIA  mm k 
   v v. Th   RJ    k   h xm
 h RJ-11  h RJ-45  h g.
RJ-11
D-  DSL mm  k     h jk  
- RJ-11 h b   ( Fg 3.1-15). Th kg   h
m RJ-11   h b  h . M mm  hv   
  h.
RJ-45
Nk  m  v v. M k   (NIC)  mhb hv  gh- RJ-45  ( Fg 3.1-16). RJ-45  k k 
RJ-11 h   g  h m RJ-45   h m m h
RJ-11 h b g   mm.
FIGURE 3.1-15
RJ-11 connectors on a modem
131
132
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.1-16
An RJ-45 connecter and port
T568A/B
Th EIA/TIA T568A  T568B , h   ,   h
g  TP g  RJ-45 . S,   mk    ,
 h h T568A (mm)  h T568B ()   h g.
Th   TP b  - ( Fg 3.1-17)  g h  m
mb,    Tb 3.1-8.
EXAM TIP It’s a good idea to know the pin numbers of RJ-45 and their use in
straight-through and crossover connectors.
8
7
6
5
4
3
2
1
FIGURE 3.1-17
RJ-45 pin numbers using the T568A/T568B standards
DOMAIN 3.0 Objv 3.1
TABLE 3.1-8
UTP Cabling Color Chart
Pin
T568A
T568B
1
2
3
4
5
6
7
8
Wh/G
G
Wh/Og
B
Wh/B
Og
Wh/B
B
Wh/Og
Og
Wh/G
B
Wh/B
G
Wh/B
B
FIGURE 3.1-18
A male F-type connector
Coaxial Cable Connector: F-Type
Cx b   b  h g    h b. Th F-     h  “v h ”  b TV. I’  h m mm    x bg  Eh k. F-    
 b-b I v m  point of presence (POP)   hm  b 
h consumer premises equipment (CPE), h     mm. Fg 3.1-18 h 
xm   m F- .
EXAM TIP For the A+ Core 1 exam, you should know the F-type coaxial cable
connector.
Fiber Optic Cable Connectors
Th A+ C 1 bjv  h  b  b     
h xm: h gh  (ST), h bb  (SC),  h L  (LC),
 h  Fg 3.1-19. Sm h b  b   mgh   h xm
 g     FDDI, MT-RJ,  FC.
133
134
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.1-19
ST (left), SC (center), and LC (right) fiber connectors
Straight Tip
Th gh  (ST) b     v mm    mm
k, h     m m  g bg. Th ST  h
 “h   ” kg mhm h   k. A h  Fg 3.1-19,  ST
   g  m  m   h h b b.
Subscriber Connector
Th bb  (SC)    h m  b  b ,   h
 h ’ m    xv. A SC   h-    kg
b   h .
Lucent Connector
Lk h bb , h L    h- , b h kg
mhm   b- h. Th LC   h h   h   m. A
LC  m (h h z   SC  ST )    , hh  h LC
  h g-m b--h-hm (FITH) v.
Punchdown Block
O h A+ C 1 xm, h v      punchdown block. Hv, ’  mm   punch block,  quick connect block,  patch panel,   terminating block, mg 
 h m. A h bk,   b  h     g 
bg  , h     m  (IDC)  hh b g
  g  “h”   .
DOMAIN 3.0 Objv 3.1
FIGURE 3.1-20
The RJ-45 (left) and punchdown (right) connections of a punchdown block
A h bk  mm     v  mg mm b  g  h  k     zg  g  k g. Ph bk  m mm    m
mm  h v   bg   mm    
   m    bg. Amg h b  g  h bk  h
gg  k m  q mvg RJ-45  m    h.
T   h bk  mm  mm :  66 bk 
 110 bk. A 66 bk  m   v m g. A 110 bk,    
m k, h IDC     RJ   h h ( Fg 3.1-20).
Molex and Berg
A Mx , hh g  m m  g v, h Mx C
Cm,   mm -  v   v DC   
m   PC. Mx  h     IDE (ATA, PATA) v
g h 4- Mx  , h  Fg 3.1-21. Mx    b
 h h  DC- v, h   . Fg 3.1-21 h  Mx
 .
135
136
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.1-21
Molex (upper) and Berg (lower) power connectors
Ah   mm      mhb  h Bg
. Nm   v, Bg E Cm,   m mm
    P7   m-Mx . Fg 3.1-21   xm  
Bg .
Lightning Port
“Lghg” hg   b   v b A   
v, g Ph, P,     m, m, hg,  m. Th
m ghg jk  mm, hh m h ’ vb   b  
 ghg  g   —k USB  h k . Wh
h m    ghg b, hh  h  ghg     
h   (mm  USB-A )  h h ( Fg 3.1-22),
  hg A v. I   b    g , h  h  ,
b OS v   m.
FIGURE 3.1-22
A lightning cable with a USB jack
DOMAIN 3.0 Objv 3.1
Adapters
A  v b    v  g . Y    b
h DVI     HDMI  h h ,  xm,  g   DVI   h
v   h HDMI k  h m. Th v    b g
b  h bm h v: g    v b    h 
g m hg  USB.
DVI to HDMI, DVI to VGA
A  v  v k  m m: v m v h  
    b, vg   h  ,  b h b- v
h hv    h . Th m  m xb, b h   
 . Fg 3.1-23   DVI--HDMI b,  Fg 3.1-24   DVI-VGA .
FIGURE 3.1-23
A DVI-to-HDMI cable
FIGURE 3.1-24
A DVI-to-VGA adapter enables a DVI-I connection to work with VGA displays.
137
138
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.1-25
A USB-to-Ethernet adapter enables a USB port to connect to an Ethernet
network.
USB to Ethernet
Th  m USB      v, b h m mm   h
USB--Eh (RJ-45) ,   b m h Eh    
 - Eh k ( Fg 3.1-25).
EXAM TIP Other USB adapters you may encounter on the exam are USB-A to
USB-B, USB to Bluetooth, and USB to Wi-Fi.
REVIEW
Objective 3.1: Explain basic cable types and their connectors, features, and purposes
•
•
•
•
•
•
•
•
Th m mm   k b  Eh k  C 5, 5, 6,
 6.
Eh bg  RJ-45 .
Pm-g b  g    m ( )   -.
UTP b    h v mj  10/100/1000BT k.
STP b  h      EMI       h
vm.
Th T568A  T568B b   UTP b   h  
gz  h/g, g, g,  h/g .
Cx b    b TV, LAN,  I.
Fb  bg  b   Eh k, SAN, FTTN  FTTH.
DOMAIN 3.0 Objv 3.1
3.1 QUESTIONS
1. Cm A   m  k  k   k b
 m. Whh  h g v   h b ?
A.
B.
C.
D.
DVI-I
DVI-D
VGA
HDMI
2. Cm B  g  g  F Eh k  Ggb Eh.
I hkg xg b, h k h hv v h m  
 h C 5, m h C 5,  m h C 6. Whh  h g
h h     h g ?
A. R  b h C 6.
B. K h m b.
C. R C 5 h C 5  C 6.
D. R  b h C 5.
3. Cm C h h m  m h hv USB 3.0     
USB-C . I    h USB-C   v  x SSD v. Wh
  b m ?
A. A USB-C SSD v vb?
B. H   h USB-C ?
C. C h USB-C  k h h m ?
D. I USB-C  g  10 Gb?
4. Cm D    x b      h HDTV. Whh  h
g b  h h m ?
A. RG-6
B. STP C 5
C. STP C 6
D. RG-59
5. Cm E   h SS USB v   . Hv,
  h    v b h  USB v mb. Whh  h
g USB v  h m ?
A. USB 3.1 G 2
B. USB 3.0
C. USB 1.1
D. USB 2.0
139
140
Mk M’ CmTIA A+ C 1 Cf P
3.1 ANSWERS
1. D
HDMI  HD   HD v g.
2. C
C 5  C 6  Ggb Eh  h   C 5.
3. B
USB-C  USB 2.0, USB 3.0/USB 3.1 G 1,  USB 3.1 G 2 .
4. A
RG-6  h   HD v.
5. B
USB 3.0 (k USB 3.1 G 1)  h v mb  SS USB.
Objective 3.2
Given a scenario, install
the appropriate RAM
M
 m  mk bv h gm    h h v.
Th   h , b v h  h v ’ k  h h 
CPU. I, gm m b    - mm h    CPU
h h           h q . Th
mm b  vg h   h CPU  random access memory,  RAM.
Lhg    h   m h h v  RAM, h h
CPU   h    h gm.
NOTE Technically, you can use a hard drive or flash drive as virtual memory to
expand the available RAM, but these devices are not nearly as fast as RAM, and it
isn’t quite the same as running a program from where it is stored on a hard drive.
RAM     mm,  v  m g  h  .
Th , ’  v xv   m RAM,     h b g  
ggh m. Th ’ m   j gb    RAM; ’v g  mh
h mhb h h gh   RAM, g  h gh . M hv
 RAM  m h m  (mm  packages)  hg
v h . Th  k  h   RAM   Objv 3.2  h CmTIA A+ C 1 (220-1101) xm.
RAM Packages
F h A+ C 1 xm, ’ m   h m, ,    h  , g,  kgg  h v RAM hg. Rmmb h h
A+ xm  g        kg      .
Th   RAM  h k  h xm    h g b.
DOMAIN 3.0 Objv 3.2
FIGURE 3.2-1
A DIMM (bottom) and a SO-DIMM (top)
Dual Inline Memory Modules
Th mm m   v  k m   inline memory module m. U 2000, single inline memory module,  SIMM,  h . Th hg vv  dual inline memory module,  DIMM. A DIMM    b  hh
m RAM g   m  . Th DIMM m   h m m  g mm   m, ,  v. Th     DIMM, b h  m   h 133.35-mm (mm) m
  k m  h g v  h 67.6-mm m  m,
 SO-DIMM,    m. Fg 3.2-1 h xm  h  DIMM.
Memory Architectures
Sv mm h    m. Dm RAM (DRAM)  h m b mm h. Fg 3.2-2  h DRAM  h  
m h mm .
RAM
DRAM
DDR
SDRAM
DDR1
FIGURE 3.2-2
DDR2
DDR3
SRAM
SDRAM
DDR4
DRAM is the root of most RAM architectures.
DDR5
141
142
Mk M’ CmTIA A+ C 1 Cf P
Th g  h mm h   x    h A+ C 1 xm:
•
•
Dynamic RAM (DRAM) DRAM m b h (hg) v 
m    . I  m b h v  h  b
h h   v,  .
Synchronous DRAM (SDRAM) M DRAM  h, mg h ’
 hz  h m k. SDRAM  hz  h m k,
hh m h    hgh   h b DRAM. Y m 
    h xm, b SDRAM  h   DRAM mm h  h
 h  h Db D R (DDR) mm .
Double Data Rate Memory
B, b   (DDR) mm’ m m m h  h    
    h   g   (SDR) mm,  SDRAM. Th “b”
 DDR  h 2 b     g k  m mm   I/O
g,     “2-b h.”
DDR mm h vv m  g   2000 hgh v v
 ’ DDR5. Eh  h v h  z, ,  bh  h h
. Th g b b DDR3 hgh DDR5 (DDR1  DDR2  
  h xm):
NOTE
Prefetching decreases transfer times by buffering or caching a resource
(such as a set of bits) before it is required.
•
•
•
DDR3 DDR3 b hgh , m  h,  
30    m h DDR2. Dk DDR3   240-
DIMM. DDR3 b h z  h h b m 4 b  8 b, gvg 
bh  hg b h g g . M DDR3 m 
-  -h mm g. T z  DDR3 DIMM k
g m 1 GB   8 GB.
DDR4 DDR4 v hgh , m  h,  
20    m h DDR3. Dk DDR4   288-
DIMM h h  gh v  bh    mhb . T
z  DDR4 DIMM k g m 4 GB   64 GB.
DDR5 I  2021, DDR5 h mv h , 
mgm,  m   mb h h m- h
 mgg m m. DDR5 v m  h bh  DDR4
  50  m . T z  DDR5 DIMM k g m
8 GB   128 GB.
DOMAIN 3.0 Objv 3.2
TABLE 3.2-1
Comparison of DDR Memory Versions
DDR
Standard
Connection
Pins
Prefetch
Bits
Max Memory
Size (GB)
Max Data
Rate (Gbps)
Bandwidth
(Gbps)
Voltage(V)
DDR3
DDR4
DDR5
240
288
288
8
8
16
8
32
128
1.6
3.2
6.4
17
25.6
32
1.3/1.5
1.2
1.1
Tb 3.2-1  Fg 3.2-3 v    v m  DDR3, DDR4, 
DDR5 DIMM.
NOTE Both DDR4 and DDR5 have 288 pins on their edge connectors, but each
uses a different pin arrangement.
EXAM TIP You should be familiar with the various RAM sizes and speeds for
DDR3, DDR4, and DDR5.
ADDITIONAL RESOURCES
To familiarize yourself with the many RAM
standards and specifications for both desktops and laptops, visit www.crucial.com,
paying attention to the characteristics, such as module size, package, and features.
FIGURE 3.2-3
DDR3 (top), DDR4 (center), and DDR5 (bottom) DIMMs compared (images
courtesy of Micron Technologies, Inc.)
143
144
Mk M’ CmTIA A+ C 1 Cf P
Handling and Installing DIMM
P RAM hg    v mg   m. Th  v h    h k RAM  h   .
RAM  xm v   hg (ESD). Th,    k
 h g, hg,  g . A  RAM  
bg  v h ’     m,  k  b h h , z,
   h     . W      g  b kg h RAM. D’ k  RAM k    bg b   
  . A, b   h RAM b h g  h m  v hg 
  .
T  DIMM,    h m  g  m h AC . DIMM
k   h k v. Eh  h mm /k  h mhb
 hv  g b h hh h g h  h DIMM  mh   h
DIMM   ,    Fg 3.2-4,   v  m bg 
h g . Mk  h h RAM    h   h k  h
m .
H h RAM k b h g,   bv h RAM k,    gh
  h  h g  ( Fg 3.2-5). Wh h RAM   , h
     h  h  h   h k. S h 
m  ,  ’ .
Bg ESD,     g g. Th m hg  k   m g. I h
  ’ gg ,  RAM k ’  m. DDR3 k
      bh . DDR4 k        
 x g   h h ,  DDR5 k     DDR5    DDR5
mhb. I,   , h DDR k ’  , ’   h gh  
’ h g mm.
FIGURE 3.2-4
Match the guide slot on the DIMM with the guide bar in the memory socket.
DOMAIN 3.0 Objv 3.2
FIGURE 3.2-5
Properly seating a DIMM
T mv  DIMM, h h  ()  h k . Th   
v  j h k   h   h    h  .
Laptop RAM
L, bk, m -- m,  h m m  PC   DDR
RAM, j  k . Hv,   h  m  h v, RAM, g DDR RAM,  kg  small outline dual inline memory modules (SO-DIMMs, h 
Fg 3.2-6). Ahgh  h b bv,  h k h DIMM  SO-DIMM
  hgb.
Th m h   SO-DIMM   h m   m
DIMM h h m hg. Th m  Tb 3.2-1   bh DIMM 
SO-DIMM. A SO-DIMM    h m   DIMM k     g
. Th k hg  h     h gm h  h    h
m  h mg .
Th  SO-DIMM  h  h DDR v, g DDR5. Th  
-vg v  h DDR3 SO-DIMM,   DDR3L m. Th -vg
v  h  vg v ’  mb,  b   k
h hh  ’ kg. A DDR5 SO-DIMM q 1.1 V (v), hh  0.1 V
 h h  h DDR4.
•
DDR3 SO-DIMM DDR3 SO-DIMM  kg   204- m, h 
h  h  Fg 3.2-6. N h m DDR3 SO-DIMM  -vg
DDR3 mm. Th m   DDR3L SO-DIMM. Chk h 
   v  m     vg (DDR3)  -vg
(DDR3L) mm.
145
146
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.2-6
•
•
DDR3 (top), DDR4 (center), and DDR5 (bottom) SO-DIMMs compared (images
courtesy of Micron Technologies, Inc.)
DDR4 SO-DIMM DDR4 SO-DIMM  kg   260- m, h 
h h  Fg 3.2-6. A DDR4 SO-DIMM  gh  h v
SO-DIMM .
DDR5 SO-DIMM Th m   262- SO-DIMM h   I/O
h   bh, h   -b g,   z
b b. Fg 3.2-6 h  mg   DDR5 SO-DIMM.
EXAM TIP You should be able to differentiate the DIMM and SO-DIMM form
factors and the number of pins in the edge connectors of each for the A+ Core 1 exam.
Handling and Installing SO-DIMM Sticks
J k h  k,    h b v b mvg   
 h SO-DIMM b g  ESD v hq. Wh b, mvg
  g mvb b. I  h b- b,  h
m’   hk   h    k  .
DOMAIN 3.0 Objv 3.2
FIGURE 3.2-7
Removing a RAM panel
NOTE
Some portables have both built-in and removable batteries.
O  k   k , m h k  RAM   b hkg h
m’ b  m. Nx, hk h xg RAM g  m
h    b. T g m 4 GB  8 GB,    k  h b h  4-GB
m   2-GB m.
Nx,  h RAM . Th’  bh    h bm  h b, 
h  Fg 3.2-7, b mm h’ .
Th     h g ,  h RAM k   ( Fg 3.2-8).
G mv h  k  RAM   h   b vg h .
FIGURE 3.2-8
Releasing the RAM
147
148
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.2-9
Confirming RAM installation by checking total memory in UEFI BIOS Utility
Conrming RAM Installation
O ’v  RAM, m h h m gz  b bg   hkg h RAM  mg  b kg  h UEFI/BIOS   ( Fg 3.2-9).
M m m  h RAM z  g h m g. Y
   g h RAM g. Y   v h m  
RAM m h h g m— xm,   v  W, m  h windows  pause k  bg  h Sm P .
Performance Congurations
for Desktop and Laptop
C k   mhb  mh mm g 
 mm m. Wh  64-b  b, DIMM v 64 b    
m   single memory channel. A dual-channel mm h b h mb 
 b m 64  128, hh  b h vb bh. S mm m
 64-b v,  mm m  q  b     hv
DOMAIN 3.0 Objv 3.2
 -h h. A triple-channel mm h q h mm
m b    ( mm   h m )    192-b 
b. T hv  quad-channel mm h— g — mm m      256-b mm  b. U  RAM k   
bk  mh mm m. A hk h mhb  m m  .
Eh  h m-h mm h q  mm  h   mb  h. D-h mm    h m,  -h  q-h g q mm 
h  h   h, v. Mhb h   mh
m     -h m, b h b m  v b h hgh m h mhb .
EXAM TIP Know the differences and configurations of single-, dual-, triple-, and
quad-channel memory.
Error-Correcting Memory
Hgh-, m- m    error-correction code (ECC) RAM h
         . ECC RAM   h 
   b  hm  h  h g m . ECC
RAM  mm  m-h k  v.
Virtual Memory
I m m k vhg    b v   m h . O v m  vb  “v”  m h  OS, hh      hm. V
mm  virtual RAM   v  h  h ’    h   
m’ m mm (RAM). I, ’     g,   h
k,    g mm.
V mm   b  mm mgm  (MMU)  h g m. Th v mm   mm    swap space   swap file b ’
  m    - g  mm     mm
   v .
Th m  v mm  g   m v h h g m,
h  g  h mh,    h . Y  hv  mh
v mm,  hh  h MMU   thrashing,  mvg g   
 mm    m v mm. Cmm   h v mm
  b   mm  hhg, bh  hh  b  b h m 
mm   h  .
149
150
Mk M’ CmTIA A+ C 1 Cf P
REVIEW
Objective 3.2: Given a scenario, install the appropriate RAM
•
•
•
•
•
•
•
•
•
•
•
Dk RAM  h DIMM m , hh  vb  DDR3, DDR4, 
DDR5 m.
DIMM   b g  h m h h  RAM  
g h DIMM    k  .
L, bk,  h m m  m  h SO-DIMM m
  RAM. I  vb  h m m  DIMM.
SO-DIMM   b g  h m h h  RAM  
 g, hg h m  h ,  vg h   h m 
 k  .
Sg-h mm   g DIMM   h.
D-h mm   DIMM   h  g bh.
T-h mm  h DIMM   h  v g bh.
Q-h mm   DIMM   h   g bh.
DIMM   mh m   gv bk   h m . U
 RAM k    bk  mh mm m.
E-  (ECC) RAM   h     b
 hm  h  h g m .
V mm      g   v  bk
  h MMU.
3.2 QUESTIONS
1. H m    m  DDR4 DIMM RAM ?
A. 108 
B. 186 
C. 205 
D. 288 
2. Wh    RAM?
A. C g gm
B. Pgm h ’ g
C. Nhg
D. H m
DOMAIN 3.0 Objv 3.3
3. H m DIMM   q  hv  256- h?
A. O
B. T
C. Th
D. F
4. Y  g RAM   -h m h h  4-GB m  g
  8 GB. Whh  h g     m b  b m RAM?
A. Th  k’ b  RAM
B. Th  k’   RAM
C. Th  k’   RAM
D. A  h bv
5. Y  hg 288- RAM  g m   gz.
Wh   RAM   hg?
A. DDR5 SO-DIMM
B. DDR4 SO-DIMM
C. DDR4 DIMM
D. DDR5 DIMM
3.2 ANSWERS
1. D
2.
DDR4 DIMM mm   288- .
A
RAM  h k  b gm  h  g. Pgm h 
 g       k g v.
3. D
Q-h mm h  DIMM   256-b mm h.
4. D T  h m  -h m  b , h  m
m b   h ,    h  m b mh.
5. D
S DDR5 DIMM hv 288 . A DDR5 SO-DIMM h  262 .
Objective 3.3
T
Given a scenario, select and install
storage devices
h g-vm  g        mv m,
h h mm  g m hg  g mg  
m. Nvh,  h x   mg, -, ,  h
m   k   h,      m   h bjv.
151
152
Mk M’ CmTIA A+ C 1 Cf P
Hard Drives
T hard disk drives (HDDs)   mg  g , g
-mvg  m h / h h   b  v m (
Fg 3.3-1). Th m   h z, g ,  ,
h z,  .
M m HDD  2.5  3.5 h   hv g  m
 ggb (GB, b  b), b (TB,   b),  b (PB,
1024 b). Th 2.5-h HDD  m     x USB  Thb g h. Th 3.5-h HDD  mm  k  v m 
x AC   g h. C, 2.5-h HDD hv  g
  4 TB,  3.5-h v    20 TB.
EXAM TIP Know the HDD 2.5- and 3.5-inch form factors and spindle speeds as
well as the drive categories represented.
FIGURE 3.3-1
Inside a hard drive
DOMAIN 3.0 Objv 3.3
TABLE 3.3-1
Typical HDD Spindle Speeds
Spindle Speed
Typical Purpose
Drive Interface
5400 RPM
S  b m
7200 RPM
10,000 RPM
S  k m
Eh  v m
15,000 RPM
E v
S ATA (SATA), Ig
Dvm Evm (IDE)
SATA, IDE
Sm Cm Sm I
(SCSI), S Ah SCSI (SAS)
SAS
H k v h hgh   k, ,   , b  g ,
h m m   g hgh h  . Tb 3.3-1 h mm
HDD   h  . Ch z, m  mgb (MB),  h
v’  hgh.
Solid-State Drives
S- v (SSD)  h mm h   . SSD gh , hv  mvg , k , hv hgh hgh, m  ,   h, hv
b hk ,   g h HDD. Th    h HDD hv h
vg  .
M m SSD   SATA 2.5-h h v m   M.2 h v m.
A M.2 SSD   m m  SSD h      b g: serial
ATA (SATA)  Non-Volatile Memory Express (NVMe). Th g m   SSD 
SATA 2.5 h. Fg 3.3-2 m  SATA 2.5-h v h  M.2 v.
FIGURE 3.3-2
SATA (top) and M.2 (bottom) SSDs
153
154
Mk M’ CmTIA A+ C 1 Cf P
NOTE Confused by all the xxD acronyms yet? Hard drive and hard disk were
traditional synonyms, but in this book, we use hard drive as an umbrella term,
including HDD and SSD.
NVMe
Non-Volatile Memory Express (NVMe)    h  h PCI Ex (PCI) b 
 m    SSD v. NVM   b SATA   M.2 SSD.
NVM v    2.5  3 m h   SATA   M.2 SSD.
SATA
Th serial ATA (SATA) h   m   g HDD g
v   m. SATA    v  h g  ATA (PATA) ,
bh  hh  IDE v, hh hv h v   h v. SATA v
 SATA SSD, M.2 SSD, mSATA SSD,  v h.
EXAM TIP The M.2 form factor supports both NVMe and SATA SSDs. You might
encounter a question that asks about the differences, so keep in mind that NVMe is
faster but doesn’t work in all M.2 slots.
mSATA
Th m mSATA   mini-SATA, hh    v b h SATA I Ogz   -h, - g v. Th m   mSATA 
m h h  m SATA SSD. D  m z,  mSATA v   
 1 TB. Fg 3.3-3 h  xm   mSATA v.
FIGURE 3.3-3
An mSATA drive (image courtesy of Micron Technologies, Inc.)
DOMAIN 3.0 Objv 3.3
FIGURE 3.3-4
M.2 modules: M.2 NVMe (top) and M.2 SATA (bottom) (image courtesy of
Samsung)
M.2 SSD
A M.2 SSD  v m h  mSATA SSD, hh mk    b
m  -h bk  h k. A M.2 SSD m h   
  2 TB        b g mg  h 
h B k k  M k k. Th m  vb  M.2 SATA  M.2
NVM ( Fg 3.3-4).
Flash Memory
Fh mm, hh  - hg k h   SSD,   g
h  g hg. F h xm,    k h  h mm m: h v (k, hmb v)  mm .
Flash Drives
Fh v    m hgh   USB . Fh v 
mm  hv v  g: h v hv v  m  h
g mvb g, h   k, CD-RW,  h k. G,  h v
    mg v hgh h  USB T-A  T-C. Th  
h v    h v  h mm, h h v hvg
g    2 TB.
Memory Cards
Memory card   g m   m   mm   b
v, h  bk, m, b,  h m  mb v. Mm
 v  , g ,  m . Th m mm m  h
mg qm  S Dg (SD), mSD,  CFx.
155
156
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.3-5
Assortment of SD memory cards
SD Card
Ahgh ’   hv b  b  mm  , SD  (xm  hh  h  Fg 3.3-5) m v  mg. Sm m 
v, h  mSD  mSD, h  g m, hgh h m  m
q  v    h g SD . SD  hv g    2 TB.
ADDITIONAL RESOURCES
To learn more about the different form
factors, speeds, and capacities of SD and CF cards, see www.sdcard.org and
https://compactflash.org/.
EXAM TIP Be familiar with the differences between USB flash drives and memory
cards, including capacities and uses.
Installing Storage Devices
Th        g v   m: IDE, SATA,
 M.2. Th  x h   v h  h .
Installing SATA Drives
Th   b   h h g SATA v; h , j  h
, g  h  b ( Fg 3.3-6),    h OS  m
 h v. Th kg  SATA    b mk  mb 
 .
DOMAIN 3.0 Objv 3.3
FIGURE 3.3-6
Properly connected SATA cables
S mhb m h m SATA , h  h m  h gh
h v  b  ? Th’ h h BIOS/UEFI g m  . B , b
  v    b  SATA  ID: SATA 0  C:, SATA 1  D:,
  .
EXAM TIP BIOS/UEFI setup utilities enable you to change boot order easily,
which is great for multi-OS computers.
Wh g  v,  mgh     mv bk  
h m v. Th SATA  k h m  h    SATA v.
Installing IDE Drives
I      IDE v, h v  h b (hh     v)
m b g v  jm bk, hh   m    h 
gh  ( m)    g bk    g .
157
158
Mk M’ CmTIA A+ C 1 Cf P
MA or single drive
SL
Jumper blocks
Cable select
Configuration pins
7 5
3 1
8 6
4 2
Pin numbers
FIGURE 3.3-7
Power
connector
The jumper settings for an IDE device
Th g bk   IDE v   x  h Mx   
h bk  h v. A   Fg 3.3-7, h    hh h jm bk
  (     jumpering)  h   h v. A v  
 80- b    CS (b ). Wh  IDE v     g
40- b,  v  jm  MA  h h  SL. Th jmg   g
v   40- b v,   h  h v’ m   g.
Installing M.2 Drives
Wh    M.2 v, g  SSD, NVM SSD,  h   M.2
v   , h     hv h :
1. S  v h   h .
2. S h v h  mg .
A M.2   22 mm , h gh vg m 30 mm   mh  110 mm. Th
m mm z, hv,  2280 (22 mm , 80 mm g),    Fg 3.3-8.
FIGURE 3.3-8
An M.2 2280 SSD installed and secured into an M.2 slot
DOMAIN 3.0 Objv 3.3
RAID
A redundant array of independent ( inexpensive) disks (RAID)  m h v 
 m   . Mhb h b- RAID  m
hv  BIOS/UEFI g  b  b RAID ( Fg 3.3-9). Th g 
b h  h RAID v  h k  h C 1 xm.
EXAM TIP A RAID array collects two or more hard drives into a logical unit.
CompTIA expects you to know RAID levels 0, 1, 5, and 10.
•
•
RAID 0: Disk striping Dk g q    v. I 
m b g k v m v, b    v 
 . I  v ,    .
RAID 1: Disk mirroring/duplexing RAID 1  q    h v,
hgh h  k h  v mb  v. RAID 1 mirrors  
m v, vg   h   g  (   ;
   2-TB v   2 TB  ).
FIGURE 3.3-9
BIOS/UEFI settings for RAID
159
160
Mk M’ CmTIA A+ C 1 Cf P
•
•
RAID 5: Disk striping with distributed parity RAID 5 b   
m v   v. Th  h    v  .
RAID 5  v   v’ h    , qg  mmm
 h v. I RAID 5, h 2-TB v v    4 TB, h  2-TB
v v    6 GB.
RAID 10: Nested, striped mirrors RAID 10 k  m   v 
 hm gh. Th    h x   ,
hgh  k  v   mmm. RAID 10     h g RAID
v b   mm . RAID 10 mb RAID v 0  1   
RAID g h m  -v  (RAID 0+1)   
m-v  (RAID 1+0  RAID 10). A h mb g 
RAID   multiple RAID   nested RAID.
EXAM TIP Be sure you know and understand the RAID 0, 1, 5, and 10 (1+0)
configurations for the A+ Core 1 exam, especially the minimum number of disks
required for each and the basic method(s) each implements, such as mirroring, striping,
redundancy, and so on. You will encounter at least one of these on the test.
Optical Drives
Compact disc (CD), digital versatile disc (DVD),  Blu-ray Disc (BD) v    
( mm    b)   optical discs. Th v hv b   
  bk   hv . I  v  h SATA   x
 v    USB .
A h  h  m  vb  h : -(R), - (W),
 b (RW). O combo drives     h   m .
Hv,  h  hk mb,  h  v.
NOTE
Optical discs use a unique Compact Disc File System (CDFS), more accurately
called the ISO 9660 file system.
CD hv    h 650 MB  700 MB. DVD  B- m hv v
mb  m   h g   g, hh   
g . Tb 3.3-2 h DVD  B- D .
DOMAIN 3.0 Objv 3.3
TABLE 3.3-2
Common DVD/Blu-ray Disc Capacities in DVD-Industry Gigabytes
Sg- DVD
Db- DVD
B- D
M B- D
Single Layer
Dual Layer
4.7 GB
9.4 GB
25 GB
7.8 GB
8.5 GB
17.1 GB
50 GB
15.6 GB
REVIEW
Objective 3.3: Given a scenario, select and install storage devices
•
•
•
•
•
•
•
•
•
•
•
•
SATA HDD, SSD,   v   g  SATA  b   SATA
 b.
M.2 v  vb  v (SATA SSD )  NVM (2.5  3 m
) .
HDD  vb  2.5-h  3.5-h m .
HDD hv    5400 RPM, 7200 RPM, 10,000 RPM,  15,000 RPM.
3.5-h v    AC-     k  v.
2.5-h v    USB-   .
NVM  h PCI b    SSD v.
mSATA   m-SATA ( -h, - g v). Th m 
 mSATA  m h h  m SATA SSD.
Th m mm m  h mm   SD, g mSD  h v
 mSD.
RAID 0   h h RAID  b      v;  h
 .
RAID 1 m h    v  h h; RAID 5    h v
 b   v () m   v; RAID 10 
RAID 1+0 mb g  mg, hh q  v.
O   vb  CD, DVD,  BD (B-) .
3.3 QUESTIONS
1. Y   g   500-GB h k h m z SSD.
Amg mb, hh  h g  v h b m?
A. NVM 2.5-h
B. NVM M.2
C. SATA M.2
D. SATA 2.5-h
161
162
Mk M’ CmTIA A+ C 1 Cf P
2. Whh  h g         g v 
 m?
A.
B.
C.
D.
IDE
SATA
M.2
S
3. Y      NVM v  h k m  b m,
b h M.2   h m ’  NVM v. Whh  h g
  b  ?
A. SATA
B. PCI
C. SATA
D. ISO 9660
4. Y    h  RAID   h  x   b.
Whh  h g  h b mh  h qm?
A. RAID 10
B. RAID 1
C. RAID 5
D. RAID 0
5. Y   h  mSD   h g m  
 SD . Whh  h g  h b    h ?
A. C h  m  xg   h  .
B. R h   h   h  .
C. U   h h .
D. B   m h  mSD .
3.3 ANSWERS
1. B
2.
Th NVM M.2 SSD  h    SSD.
D
IDE, SATA,  M.2   g v . S   
   m.
3. B NVM v  vb  PCI ; NVM  h PCI b  x
 v SATA.
4. A
RAID 10 mb mg     g  .
5. C SD   mSD   v mm   b h
mSD .
DOMAIN 3.0 Objv 3.4
Objective 3.4
Given a scenario, install and congure
motherboards, central processing units
(CPUs), and add-on cards
C
m PC g  g    h’ b  g -h-h
m m v    kg m. I h bjv,   h
 h, ,  g mb mhb, CPU,  - .
Motherboard Form Factor
A form factor  h mhb’ z, h, , h ’ m  h m , h   b k  x ,  m. E, h m
   mhb m h  m m. I  hh m 
mb   b   h mhb     g  h
   qm, h z  h  h ,     x h 
   h m.
Th m mm m   PC mhb  ATX  ITX, hh  
Advanced Technology eXtended  Information Technology eXtended, v. Eh 
h m  h v,  h   v  . F h m ,
m    hgb,  ATX  ITX. Th  m  
 g      h mhb b   mb g m  . Th m h,  xm, ATX mhb   ATX
,  ITX mhb   ITX .
ATX
Th ATX mhb m  ( Fg 3.4-1)  v   h g
AT m . Th ATX m  g h m  x , CPU, 
RAM     h m. Th ATX g    g
bm  h AT mhb h  m g x    h CPU.
Th ATX  hv hg h vm  hg, g v 
  ,   ,    h g.
Th ATX mhb g   b I/O    port cluster  h
 b   h bk   ATX . Fg 3.4-2       ATX
mhb  .
163
164
Mk M’ CmTIA A+ C 1 Cf P
CPU
RAM
Power
I/O ports
Expansion slots
FIGURE 3.4-1
ATX motherboard
USB 2.0 ports VGA video port
PS/2 mouse/keyboard
combo port
FIGURE 3.4-2
USB 3.0
Gigabit
(USB 3.1 Gen 1) ports Ethernet port
Surround audio ports
DVI-D video port USB Type-C port USB 3.1 Gen 2 port HDMI A/V port
Typical ATX port cluster
Th ATX m  h v v, g h g , hh  h
 h    Fg 3.4-3:
•
Standard (full-sized) ATX Th   -z ATX (m    h
ATX m )  12 h b 9.6 h. I  h  v  gh
, v v x ,     -z ATX .
DOMAIN 3.0 Objv 3.4
Standard-ATX
FIGURE 3.4-3
•
Mico-ATX
Mini-ITX
Nano-ITX
Pico-ITX
Examples of ATX and ITX form factor motherboards (image courtesy of VIA
Labs, Inc.)
Micro-ATX A    mATX, h m-ATX mhb  9.6 h b
9.6 h q   h m b mhb    
 h -z ATX. Th m-ATX       m m
. Wh  ATX mhb ’    m-ATX, h m m 
 b    ATX .
EXAM TIP Know the differences between the ATX and the ITX motherboard/
system board form factors.
ITX
Th ITX m   h m mm  h small form factor (SFF) mhb.
Og, h ITX m     -z mhb, b  v k h.
Hv, m v  h m  hv  mh b,  h m-,
-,  -ITX m ,  h  h gh   Fg 3.4-3.
O h h ITX v, h mini-ITX ( mITX)  h g  6.7 h q. Th
m-ITX m h h g m-ATX. Th nano-ITX mhb,  4.7 h
q,  h pico-ITX mhb,  3.8 h b 2.8 h,  m . Th mh
m mhb m     mb m  z v
h  .
Motherboard Connector Types
A mhb  m h  g  b  hh RAM  CPU  . Sg, v, I/O,  h v        mhb. I h b h ,   b h v h m   mhb  
 h h g h , jk, ,   h h      mhb’
g  m   v k   expansion bus.
165
166
Mk M’ CmTIA A+ C 1 Cf P
Expansion Bus Architectures
Wh  v   m   mm    h h v
 h m,  “k  b.” I h x  m hg,  bus  mm  b      mhb h  v  mm. A b  
h  b mb g  hh v    b . Ex 
    mhb hgh  x b.
Th x b   mhb h h m   vg  z
   g v   m. Th x b  h mhb (
hgh , h m)  b mz  h qm  h .
Ov h , m x b h hv b ,  m ,  
, g h g:
•
•
•
Ph Cm I (PCI)
PCI Ex (PCI)
Sm Cm Sm I (SCSI)
Ahgh h hv b   h h  z  mm , v,
gh,  m, h A+ C 1 xm’    h PCI  PCI h.
PCI
Th Peripheral Component Interconnect (PCI) x b h    h
b m  h 1990 b h I C h h  g mhb
m     h g. Cm  h x b  h
 , PCI    32 b,   33 MHz,  m xb. PCI   gg,   h    h Pg  P (PP) . Th k  
 h x hg  m   PCI  h  
  b .
PCIe
PCI Express (PCIe)    v  PCI. Hv, PCI   -- 
   PCI’ h    mm. Th    vh   hgh   h  m h
 v. A PCI v’ -- ()   h hbg
m  h h      h h     h v.
A PCIe lane    g   hh     v. Hv,  PCI
v   1, 2, 4, 8, 12, 16,  32  h g     ×1 (b ),
×4 (b ), ×8 (b gh),   . Eh         h 
 h PCI v  h x , h PCI v,  h mhb. I h  
  PCI v b     , h  v  .
DOMAIN 3.0 Objv 3.4
TABLE 3.4-1
Data Transfer Speeds of the PCIe Versions
PCIe Version
Bus Transfer Rate (Giga-Transfers
per Second, GTps)
Throughput Speed (GBps)
PCI 1.0
PCI 2.0
PCI 3.0
PCI 4.0
PCI 5.0
PCI 6.0
2.5
5
8
16
32
64
×1
0.25
0.50
1.0
2.0
4.0
8.0
×4
1.0
2.0
4.0
8.0
16.0
32.0
×8
2.0
4.0
8.0
16.0
32.0
63.0
×16
4.0
8.0
16.0
32.0
63.0
126.0
Sm PCI g hv  :
•
•
•
PCIe ×32 B   g z  h  h h  ’ m v
 vb h  , h PCI v   .
PCIe ×12 Th PCI v     m-mk PC b 
mm   v mhb.
PCIe ×2 Th PCI v      b   x .
Tb 3.4-1  h    h v PCI v.
NOTE A lot of laptop computers offer an internal PCIe expansion slot called PCI
Express Mini Card, or Mini PCIe. It works like any PCIe expansion slot, although it’s not
compatible with full-sized cards.
Th m mm PCI   h 16- (×16) v m v  , h ×1
 ×4  h m mm g- PCI . Th  PCI mhb  
g PCI ×16   v  PCI . Fg 3.4-4 m PCI  PCI 
   -m mhb.
FIGURE 3.4-4
PCIe ×16 (bottom), PCI (middle), and PCIe ×1 (top) slots
167
168
Mk M’ CmTIA A+ C 1 Cf P
SATA
SATA
SATA
FIGURE 3.4-5
Front-mounted and top-mounted SATA ports on a typical motherboard
EXAM TIP Given a scenario, be able to identify the various PCI and PCIe slots.
SATA
SATA   mhb mgh    b  g h  g 
 . Sm mhb    bh  ( Fg 3.4-5).
eSATA
SATA   x (h’ h h e  )   SATA v h m
h USB 3.0  g x g v. SATA    SATA 
b m   m  hg  g v, hh  b  SATA k
v,  SATA h v,  v  USB 3.0 h v. Hv, SATA, b  ’
 ,  gvg   h SATA ( v SATA  h SATA/USB hb )
  ( Fg 3.4-6).
Motherboard Headers
A header        k   mhb h     m 
   m. Th m    h mm   PC mhb
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-6
An eSATAp + USB port
 1394 (F)  USB, hh   -mb. F xm,  USB  
-  b    PC  v b    h mhb g h
USB h, k h h  Fg 3.4-7.
A mhb m   v h   h, g , gm
, k ,     .
M.2 Interface
Og  h Nx G Fm F (NGFF), h M.2   v  vm h m h mSATA   SFF v, h  SSD. Th M.2
  b m     m kg. M.2  bh
FIGURE 3.4-7
USB headers on a motherboard
169
170
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.4-8
An M.2 interface connector
SATA  PCI b  b       m. Fg 3.4-8 h h   
 M.2 .
Motherboard Compatibility
Ag  m h   CPU, mm,  g v   mhb  
 mb h  h  m  h  . Th g b  h   m  m’ mb h   mhb.
NOTE A motherboard is also referred to as a system board in the product literature
of some components.
CPU Compatibility
Y h  h g  h mg hh  CPU  mb
h  mhb:
•
•
•
Manufacturer Th  m CPU m  I  Av M
Dv (AMD). Th CPU  h m q  mhb
   mb  h h.
CPU socket type Eh CPU k   g  m   CPU
   CPU. Th CPU k m b mb h h CPU  b m
  mhb. F xm, Fg 3.4-9 h  AMD A4 CPU k.
Memory compatibility Th     mg h mb
b  mhb  h mm m  b :
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-9
•
•
An AMD A4 CPU socket
Form factor Wh mm   vb (DIMM  SO-DIMM)? Wh DDR
g  ? O mhb   DDR3,  
mhb  DDR4  DDR5.
Capacity Th m  h m  mm  m   m
m b h CPU. F xm,  mhb h  128 GB m
 b m  4 GB b  32-b . Th, b   mh h
mm   h mhb  CPU.
NOTE To find the memory capacity on a Windows PC, enter the command wmic
memphysical get maxcapacity at a command prompt and divide the result by
1,048,576. The result is the maximum memory capacity in gigabytes.
•
•
Chipset D CPU   h. Sm h 
vkg  h ’. A -m h   h 
  hgh-m CPU,     h m b    m CPU. Chk h h CPU m  m h b
  mhb’ h h  CPU.
BIOS/UEFI F  m   , h mhb, CPU, h,
 h m BIOS m  b mb. Th mhb m’
b h  h mb m  h mhb  h
BIOS. A  mhb h b g  g, b  CPU g m q
 BIOS —b   h  CPU.
171
172
Mk M’ CmTIA A+ C 1 Cf P
•
Fit Sm RAM m q g h k h m b h m,
h  h CPU g v. Chk h h hgh    h mm
m  h z    h CPU g v  b   gh
  .
System Compatibility Issues
Dg  h      m, v q mb  m x.
Sv, k,  mb PC  hv v  h ’ mg h
mb   mhb  h m.
Servers
Lk  m,  mhb   v m m b b  g h m
 b   . Hv, h  m    v mhb h
 h h  h mb  h CPU  mm m. Th h 
h v   h mhb. A,   , h mhb, CPU,
 mm m  b mh  h h    h k  h v.
Desktops
Th mb    k m  h b   h ,
b k  m, h k   h   b . Th mhb, CPU,  mm m  b  z  g  h h     h m.
A gg k q m b h  m   
 v.
Mobile
L  bk  h mb v h  b  mj g, b h m
 b v  gg h mhb, CPU,  mm. Th   g
 h m  m m h h   v  k m. Chk h
m’ g  gg  mb v  h mb  h v
h  b g.
Multisocket Motherboards
Mhb h   m CPU  g  b hgh-   m. D- mhb   vb m h mj mhb
m, b hg b h (h , h, ,  m )  
mm   m b mz. Fg 3.4-10 h  xm   k mhb.
O  m-CPU m, b   m-k mhb,    bm
v,    h h h , hh mk h  m m
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-10
A dual-socket motherboard (image courtesy of ASUSTeK Computer Inc.)
  . Cmb  m vv h CPU    h
h. Th m m b mh  hv m m  h m. S h
mhb m  m  h m  mb  .
BIOS/UEFI Settings
Th g     h m ROM b   g m
m g   CMOS. Th g  CPU , b q, 
mgm,  v h, hh  b x.
CMOS   complementary metal-oxide semiconductor, hh  h m  
mk h h. CMOS h  v m m  g  hh h g g
  m  ,   q      h   h, hh  v b  b  h mhb. Th m CMOS  m mm     h
   h h h h  m.
NOTE CMOS is an algorithm commonly associated with BIOS and the system
configuration of a computer.
BIOS/UEFI
Th Basic Input/Output System (BIOS)     read-only memory (ROM) h, hh
  h BIOS m  g  . Th BIOS   xm  m. Th m ROM   b h h BIOS mk’ m b 
173
174
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.4-11
The inset shows a magnification of the M_BIOS and B_BIOS chips.
 b   h (      h)  h mhb. Sm mhb hv
 BIOS h:  M_BIOS   B_BIOS ( Fg 3.4-11). A M_BIOS  h m 
m BIOS h,  ’  g m . Th B_BIOS   bk  v 
h M_BIOS,   v h M_BIOS h h  bm .
Th’  bg  b m ROM h  RAM: RAM   volatile
b     h ’ . ROM  nonvolatile    v h
h m ’ . Ex  g h CMOS b (b  h x
)   , m ROM q   m.
Th m  m m  h Unified Extensible Firmware Interface (UEFI). H
 h :
•
UEFI    hgh  gh m  . M , bk,
 k PC  hv  x-m   bh BIOS  UEFI.
•
•
UEFI  bg   g h 2.2 TB.
Th UEFI    b  m h h OS, hh  mhg h
 b  h BIOS.
UEFI      S B h   v b g
  .
•
NOTE Although it may sound as if BIOS and UEFI are perhaps mutually exclusive,
most of the currently available operating systems versions support BIOS and UEFI together.
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-12
The main menu of a text-based BIOS configuration utility
The BIOS Setup Utility
A  , h  BIOS CMOS g    b 
  v     g  OS. Ag h BIOS g  m
b   h bgg  h m b . Dg  h v m
 h BIOS   , h mh  v. A  m,  m    
 k hh k       h BIOS . Hv, m 
m  g  . Th   g h BIOS g   b
  h m  h mhb.
Fg 3.4-12 h  xm  h m (g) b   BIOS g 
. Th m  b h   h  g  h   h  h m. M  h g  b hg    h
CMOS  m    m  h .
T, m g    gh    m-,
k h  h  h   Fg 3.4-13, h h h x-m   m
vg h  kb, k h  h  h bm  Fg 3.4-13. I h ,
bh h x  h GUI     m  h  g vv   CPU,
RAM, h v,   v g, g h h    m h  b
 hh  g g  b , v,  m.
Navigating the CMOS Setup Utility
Ahgh h m   h m m   x-b   h b   GUI 
m  b x h m m v  v, h g g  h
g  v  h m.
175
176
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.4-13
System information screen in graphical (top) and text-mode (bottom) setup
utilities
Wh ’ g  kg h h g , h   vg   k  m b  x  m g  ,  
 hg   h g:
•
Save & Exit Setup T v , only  h  h    mk 
hg  ’  h h   b. T, g h  bg
  m m h  “A      mk h hg? Y/N.”
DOMAIN 3.0 Objv 3.4
•
Exit Without Saving Th    hg. Chg h 
bg  h “A  ? Y/N” m m. P y  k 
v  CMOS  h g  mg.
NOTE There’s enough variety in how tabs, menus, and options are labeled in
different setup utilities that you’ll inevitably find yourself hunting for what you need.
Boot Options
Th b  ( Fg 3.4-14   xm) h   h m q hg
g  h  : h b q. Th g  hh v  m m  b m   h . Oh  ’ k   h 
hh h m b m USB v  k ,   POST
(- -) m,  h k mb  h h  ,
  .
FIGURE 3.4-14
Boot tab in graphical setup utility
177
178
Mk M’ CmTIA A+ C 1 Cf P
EXAM TIP The boot sequence is the first place to check if you have a computer
that attempts to boot to an incorrect device or gives an “invalid boot device” error. If you
have a USB thumb drive inserted and this setting has removable devices ahead of hard
drives in the boot order, the computer will dutifully try to boot from the thumb drive.
USB Permissions
I  v  ,  m b   b   USB   v h mg    v   h   m hgh h   hz m  . Th   b   b USB :
•
•
Disabling USB ports in BIOS USB   b b   g m.
O h BIOS,  h Ig Ph b,  hg h   h
USB   Db. I  h  b h USB  , j hg h
g  Eb.
Disabling USB ports in the Device Manager Y   h Dv Mg
 b h USB    W v b g h Uv S
B C   h W Dv Mg, gh-kg h USB
v    b,  hg Db Dv m h - , 
h  Fg 3.4-15. Ah     h v m h Dv
Mg m.
FIGURE 3.4-15
Disabling a USB device on the Device Manager
DOMAIN 3.0 Objv 3.4
•
•
Disconnecting the USB Th  h b   ,   
 m b  USB    m. Wh  ’ b   h
USB v h ,   mv  USB  m b ggg  m
h mhb.
Locking USB ports with Registry entries Y  b  USB  g h
g   hg  g  h W Rg. I h    h
g , vg  HKEY_LOCAL_MACHINE\SYSTEM\CCS\
Sv\USBSTOR. F h k, b-k h S   h gh . I h
S bx, hg h v  4 (Db). A v  3 b h . Sv h 
 x g.
Trusted Platform Module
Th Trusted Platform Module (TPM)    mh h    - 
v h-b  . TPM    m mg   
 . TPM , ,   gh k, v v h g  b- RSA k,  mg m  m  mm.
Dg h b , TPM “m” h m  OS    h mm. Th TPM mm bhmk h h m    v h
 TPM-g k    h b . TPM k     v  ,
g h g:
•
•
•
Attack mitigation TPM  b g  h h TPM k   vb
 TPM, hh  b   mg m  hhg k.
Authorization TPM  b g  q  h/hz
 b h TPM k  b . T m b g  
g h TPM     k.
Confidentiality TPM  b g      b  .
CmTIA    k b h    mgh   h BIOS/
UEFI  , hh    g b ( Fg 3.4-16)   b
h m:
•
Passwords Wh  ’ BIOS/UEFI   , h m ’ b h
h  . A m’ BIOS/UEFI     h
BIOS/UEFI  .
EXAM TIP Remember that BIOS/UEFI configuration settings—including
passwords—can be wiped by using the CMOS clear jumper or button or by removing
and replacing the CMOS battery.
179
180
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.4-16
•
Security tab in text-mode setup utility
Secure Boot Th UEFI   h m m m -v m
 h x b g   v  OS  h h’ b 
g b   . S B q  I CPU,  UEFI BIOS,  
g m g  .
Cross-Reference
More information on TPM is included later in this objective in the section “Encryption.”
Fan Controls
Th    h b h  jm  h g m  
m   h b   h CPU, mhb,   h h 
m   PC. Th  g   PC’ g m   ()  
    h mm   h m b    v .
Th   h    h g      m:
•
•
Manufacturer-supplied software Q g m m   
CPU  m h  v b h m h    h
v  m. S       v  b, h 
 h mb bm   m  .
BIOS/UEFI settings V  BIOS  UEFI m v  h h
b  v    , g m m g,  h
 g.
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-17
•
The main page of the NoteBook FanControl software
Third-party software Th- m mg , g  
 mg ,   b g   g   PC h
 m g m. Sv h-    g m
mg kg  vb  , m,  . Fg 3.4-17
h h b    h NBk FC .
ADDITIONAL RESOURCES
For more information on the popular fan
control and monitoring software packages available, navigate to the article “The
Ultimate Guide to CPU Temperature” by Miodrag Matović (https://www.thetechlounge
.com/cpu-temperature/).
Secure Boot
S B     h h    v    h m
  h h v  g m m   hv v.
U h S B , h h v  , m v h g 
h  h  m vv  h b —g  UEFI  O
ROM m  v, h g m,  Exb Fm I (EFI)
v— v b g   h g m  m h .
Th  h v   S B   W m:
•
•
Secure Boot PC h bh UEFI m   TPM  b g  
b .
Trusted boot A W PC’ m v h v  h  h 
m b g .
181
182
Mk M’ CmTIA A+ C 1 Cf P
•
Measured boot A h b  g,    gg. Th g 
h m b   h b     v   bjv
  h PC’ hh.
Boot Password
A boot password,  mm     BIOS password, h g,  h
  h CMOS- m  b h CPU     m. I  , 
b  v   h  j h  g  h m, hh  m
hgh    b v m.
Th   gg  b    m’ BIOS  h gg  m
 b, hh  b   h. Sm h  vb, hgh: h BIOS v 
x  bk BIOS , hh m q h h m b h mm  gg . A, - b   mm b  b mvg h CMOS b  b   g  h .
Encryption
E, encryption  h    v b x   gb,
b, hb . Th   h v    h  h
hz  , ,   h   h  h  . O , h   m, b  b mh. E   , m, ,  , .
Th    k  x     g  
ghm    k   hx. Chx q  
 k b   b v  . Th   b   hx:
mm (v k), hh  h m k    ,  mm (b k), hh   v () k   h    b k
( )   .
Using TPM
Th   TPM,     ISO/IEC 11889, mv h g    PC. O
 m, TPM      k  v h h g
m  m  v  hv  b mg  m h. E, TPM
  b  g m  g h   v  h h 
    PC. W, Lx,  mOS  mm TPM   h
 .
TPM   h    PC mhb, gg  h mhb g  m
,  g  h m  AMD  I CPU. Th  v 
TPM 2.0, b TPM h b vb  PC  2005. A PC m  2016 
k  hv TPM      m.
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-18
A rackmount HSM
NOTE You can check to see if a Windows 10 PC has TPM. If there is a Security
Processor section on the Settings | Update and Security | Windows Security | Device
Security page, TPM is available on the system. If Security Processor information is not
displayed, check your motherboard or CPU manufacturer’s website for information.
A TPM h  h h  m   PC  v   h /
 . Eh m   g    m, TPM    k
 b  h h ’    bm  . Hv,   h,
h   ,  , h m  k    vv m. Th
   TPM  h   g   k  v
h.
Hardware Security Module
A h  m (HSM)    b h m    TPM. Hv, h  v hv  mj :  HSM     x 
 h v ( Fg 3.4-18)    h  h mhb. HSM 
-  m-. Th mk hm  x h  g  g  k h  b   b hz . A HSM  
 m h k  h  v  k.
HSM     g k  g      m.
HSM  b    , b   m   bkg, hh,  h  m.
CPU Features
CPU hv  v   h gh hm m h h, g h
   , mb  , h vz, , mhg,  h h , h  hh  b x  h g
b.
183
184
Mk M’ CmTIA A+ C 1 Cf P
x64 and x86 Architectures
Ahgh h m x86  x64   b m  b m , b h, 
h hg  g m   CPU, h ,  ,   instruction set
architectures (ISAs). Th x  h m   ISA v. Bh ISA  v
b h I C   CPU.
x64 Architecture
Th x64 ISA,     x86-64  h x86-based 64-bit ISA,    m  ISA
 m . Sv m hv v  64-b ISA. I
 AMD  I 64  AMD 64, v. Th x64 ISA h  v  
  256 bb (TB, h b v qv   b)  v g
 mm.
H’    m  h m   h x64 ISA:
•
•
A 64-b g b h   v g  xm   m
9 q,  ± 263
A xm 256-TB v  
NOTE A virtual address space (VAS), also known as a logical address space, is
a range of virtual memory addresses allocated to a process by the operating system.
It represents areas of physical memory and their addresses that are referenced in a
relative way by a process.
•
•
A v g  mg   ’  
A g h    RAM    256 TB
A  h x64 ISA  h g:
•
•
•
•
•
Mb 
Sm
C g m
V gm 
Vz hg
x86 Architecture
Th x86 ISA  h   mg  x v  m 
g m   gm. Th x86 ISA  b  I’ 8086  8088 m  g m  16-b   ( h 16-b )   32-b  . Th x86 ISA  b  h complex instruction set computing (CISC) h.
DOMAIN 3.0 Objv 3.4
Cmx   x    m    k m h   
m. Th x86 ISA h b  b v m m b 
 mb h PC  Sm.
Th g  m  h m   h x86 ISA:
•
•
•
•
U CISC mg h
Omz m m g  h h
U m g   mm  
Dg  mx 
Sm   h x86 ISA :
•
•
•
•
Mb v  PC
Gmg 
Wk g  g-v  (v
k)
C mg gm
Advanced RISC Machine
A reduced instruction set computer (RISC)   m, mz  , 
   CISC. O h , RISC  h m     b m  h 
CPU. Hv, h      -,  32-b RISC CPU h  b
  mb  m, g g  (DSP),  b mm v, h  Advanced RISC Machine (ARM)    v.
ARM  orthogonal, mg h       m   h m
g hm   b g  , hh      RISC
CPU. ARM   mm  mh, b,  h hh mg
 mm v.
Single Core and Multicore
Og,  CPU h    . I ,  ’ v   . Hv,
h CPU k  h h  m  gh 4 GHz, CPU  mb
  m CPU ()   g     multicore CPU. Th  m  mb  CPU    m g  (IC) 
 dual-core h. Wh mb   m m, h  
h   .
EXAM TIP For the A+ Core 1 exam, know the basic differences between a singlecore CPU and a multicore CPU.
185
186
Mk M’ CmTIA A+ C 1 Cf P
ADDITIONAL RESOURCES
To access information on the microprocessor
(and much more) in a computer, you can use the CPU-Z utility (https://www.cpuid.com/
softwares/cpu-z.html).
Multithreading
V   h m CPU  m h, hh   multithreading
(h x  m h  h m). A h    b  
 ,      g gm h  hv m h.
Th  b    h x:
•
•
Concurrent execution Th    h  m 
h   mh   h,  .
Parallel execution Th  h       
 .
Mh      h    h:
•
•
•
Many to many M h  h  q   mb  h.
Many to one M h  k   g h.
One to one Wh h h,  h  k  j  h h.
Hardware Virtualization
I  AMD hv b-   hardware virtualization: I’ V Thg
Ex (VT-X)  AMD’ AMD-V  S V Mh (SVM). Ahgh    CPU, h x  k h m.
Hardware virtualization (  hardware-assisted virtualization  native virtualization)  b b  x    h I  AMD . Th  v  g   g  v vm   m. H
vz  b hgh BIOS/UEFI m.
Enabling Hardware Virtualization
I h vz   b   PC,   bh  h g  
mg  :
•
•
Th PC ’ hv h VT-x  AMD-V h ,     vb
 h m.
Th m ’ hv VT-x/AMD-V b.
DOMAIN 3.0 Objv 3.4
Sh   h   m mg , v  m h   h h vz hg vb (  h   hk h x),  
   h g  (hhv  )    b h
vz:
•
•
•
B h PC   BIOS  UEFI  g .
L h Vz g (   Sm Cg).
Eb h H Vz  h v  x.
Verifying Hardware Virtualization
Is Enabled on a Windows System
O  W m,   hk  h vz  b g  v 
mh. H        W m:
•
•
systeminfo A  mm m,  h mm systeminfo. T h
bm  h m ,  h  b “H-V Rqm”
( Fg 3.4-19). I h “Vz Eb  Fm:”  “N,”  h
BIOS/UEFI g  b h .
Task Manager O h Tk Mg m P U m   ctrl-alt-del
 h Tk Mg. Ck h Pm b. I h -gh   h
Pm , h   Vz  h.
Verifying Hardware Virtualization
Is Enabled on a Linux System
T hk h   h vz   Lx m,  h g  
mm  h mm m:
1. I h -hk :
$ sudo apt-get update
$ sudo apt-get install cpu-checker
2. Chk h h vz :
$ kvm-ok
FIGURE 3.4-19
The Hyper-V Requirements section of a systeminfo command’s output
187
188
Mk M’ CmTIA A+ C 1 Cf P
I h PC h h vz b,  mg  h  h  x   b
  .
Cross-Reference
For a comprehensive overview of virtualization, see Domain 4.0 in this book.
Expansion Cards
Ahgh m  mhb  m  m b- , h 
 m    h  b    m  mv hm v h
  vb. F xm, /v   mm g
h x . Th A+ C 1 xm   x   W m,
hgh x    b mOS  Lx m  .
Video Cards
A video card ( display adapter) h h v h h mg v b g m m h CPU  g   h . I  g h m
 hh    b graphics processing unit (GPU) h     h CPU  
x .
Onboard
A onboard v    GPU mm g  CPU. Am   
hk  h  k  b gh . Dk m h b
GPU  hv   m v  vb,  h   Fg 3.4-2.
Add-on Card
A v/gh  h    PCI      h CmTIA    
add-on card. V   q   v h h x  v. A mg PCI v    6- PCI   mm  
h - g  h  (h  g  m h  bk). Hgh- 
  8- v ,  m ,  PCI b. Fg 3.4-20   PCI v
 h  6-     6/8- PCI  b.
Th m    v   h v RAM  v . Th v 
k m m h v RAM  h    h m. E v    m h  m b h CPU  v RAM, b 
m v      h v  ( Fg 3.4-21).
Wh g  v    W m,  m   v v
v   h Dv Mg  m h  k. Th x    g
h v   h D C P   g -   h
h .
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-20
Connecting a PCIe power cable to a PCIe video card
FIGURE 3.4-21
Video card with a cooling fan
Sound Cards
F h m , m   h b  h mhb h ’ 
 h hgh hg  q. I , mb   v m hv
 b hm  bzz  b x    m h v 
h mhb,  h h hgh hh. A   h 
189
190
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.4-22
Klipsch 2.1 speaker set
 hgh  q   q    m  mv   
h  k  k h h  Fg 3.4-22.
NOTE The numbers used to describe speaker sets, such as 2.1, 5.1, and 7.1,
define the number of satellite speakers and a subwoofer. A 2.1 system, for example,
means two satellites and a subwoofer. A 5.1 set, in contrast, has two front satellites,
two rear satellites (for surround sound), a center channel speaker, and a subwoofer.
A 7.1 set adds two additional rear satellites for sound effects to the speaker
configuration used for 5.1 surround sound.
I    k    x . Pg  b  h 
,  h h k . I  ’   b g  , hk h S 
 h W C P  m h h  v  kg, , 
  h   h h bk  h v  h  v.
Th 3.4-mm    h mhb      bk ’ h
  . Th   mgh   S/PDIF (S/Ph Dg I)
  g , HDMI (Hgh-D Mm I),  DP HD
v , hh   HD .
Capture Card
A capture card  h   x    h v h 
() h  mg    h m hm  bk   vm
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-23
A PCIe capture card (top) and a Thunderbolt video capture device (bottom)
  hgh- v . C      v,  h 
h ,  h m ,  v. A mm     h v m v
gm     m v  m mg.
Ex       m hgh USB  USB-C  Thb. A   x m     PCI . Fg 3.4-23 h
xm    v.
Network Interface Card
Th network interface card (NIC),    network adapter, k  v   k
. V   PC  k-b v hv  b 
  k . Hv, m v, h  b  h hh v,
   h v     h  Eh k. Nbk 
k m    h k , b  h , h 
         b  k.
A W m  m   g  NIC. O m W m   Lx  mOS m,  m     g  x
 NIC, g h m’ .
Cross-Reference
To learn more about NIC configuration, see Domain 2.0, Objective 2.2.
191
192
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.4-24
An Ethernet RJ-45 port with LED status lights
Th,  mg v   k-b v ’ mm
 h h k. Th k v  h h NIC,  h NIC 
k mg  h k mm. T  h mg, h vg  
h  NIC.
Eh NIC hv LED status indicators (  link lights)    h
  h k   m  . M NIC hv  LED, b m 
hv h:  k   gh,  v gh,  b   gh  h 
h LED  h NIC,    h g :
•
•
•
Link light Th  hh  k  h b bh
b h NIC  h k. I h k gh  hg g,   .
Hv,  h LED  , h    bm.
Activity light Th LED    b h NIC  h k
b kg  hg m. I h   hg  , h 
b  bm h h   mhg  h k.
Speed light I , h gh  h m   h .
Th LED    m 10/100 Mb Eh NIC.
A, m NIC  -  h- LED (g, ,  mb)  mb h
 gh  h g  (m PCMCIA) h hv  LED  . M  h
LED  g  h RJ-45 ,  h  Fg 3.4-24. Th ’  
  h, b  LED     h  ,   gh
hg bgh k m h’  h . T b ,  h mhb  NIC m.
Cooling Mechanism
CPU hv  mvg ,       h  k , b v ,
h g  b m  h. Exm h   bg bm   CPU 
m h   PC’ m. Exv h  m b, k,  v
 CPU. F h m , CPU kg  m m hgh-h hm  
DOMAIN 3.0 Objv 3.4
FIGURE 3.4-25
Top of retail heat sink (left) and bottom of fan assembly (right) for an Intel CPU
m h  h, b  g   m h   active cooling.
Av g h v m, b h m mm   mb   heat sink and
fan assembly ( Fg 3.4-25)   liquid cooling system.
Heat Sink and Cooling Fans
Uk h CPU k, mg h k   mb  k m  h
’ x! A m h v  h.
EXAM TIP Some systems are fanless or use passive cooling. Smartphones and
tablets are the passively cooled devices you’re most likely familiar with. Passive CPU
heat sinks may still rely on other fans to create good airflow in the case.
H k   mb  CPU  m   ;  , h h   h
h k b g bh  h CPU. Ag,  CPU, k g, 
h k q   ,  b    h CPU  mhb m b mvg g v m  g hm  h CPU
 mhb. Ph h m m  m m   PC
 h  h mk  h  g m   CPU. Th b   h CPU
g mb   h k,  g ,      m  h h
mb gh. L’ k  h  h m.
Heat Sinks
A heat sink   h g v  h CPU  h m h 
m h g m  h CPU. Tb 3.4-2 m h v g
m  AMD  I CPU. F h  h CPU   h b, h g m   g  v h  h m  h CPU 
gh  hv . Th mxmm m  h hh b hh h CPU
 b mg.
193
194
Mk M’ CmTIA A+ C 1 Cf P
TABLE 3.4-2
Comparison of CPU Temperatures
CPU
Running Temperature
Maximum Temperature
AMD A6
AMD A10
I 5
I 7
122–145° F
120–140° F
113–149° F
104–140° F
158° F
162° F
212° F
162° F
NOTE The temperatures for any give CPU version can vary based on its build
and included technologies. The values shown in Table 3.4-2 are averages for the CPU
families given.
A CPU hk  g  g mm   bk h  h v
  h    m h CPU     h  g    h
. Fg 3.4-26 h  mg  v   CPU hk. I h  h hk h  h g,  h   h  g b hm.
Th  h m   hk  h CPU, h h m vg 
vg, g  h  h h  :
•
Active heatsink Th   hk h    b   . Th
mb h  Fg 3.4-25  xm  v hk.
FIGURE 3.4-26
Heatsinks are available in a variety of designs, shapes, and sizes.
DOMAIN 3.0 Objv 3.4
•
•
Passive heatsink Th   hk h  mvg    v 
 h. Th m h  Fg 3.4-26  v hk.
Hybrid heatsink A  mgh g,  hb hk mb h b 
v  v hk.
O ’ PC,     hk  b  v g v   CPU,  m
b mb h  g . Av hk    b , b v 
hb hk m b mb h     h h h bb. Hv, h
hk      h  hgh h    hm , hh 
 h hm    hm .
Thermal Conductors
Th m   hm    mv   g b h hk
 h g . T   hm   m : hm v   hm g , hh v hm v  hm m, v. Conductivity  h   h,  impedance  h  h
hh h h  . Thm  m  g g gh 
thermal interface material (TIM).
Thermal Pads O k  thermal gap pads, thermal pads m  h 
b h hk  h g     g. Th    bg 
mm, h  hk  b 0.01  0.2 h. Thm    
 ’ q hv  hm . I   bg       CPU g mb, hm    b    h m h  h m
m  h mhb,    Fg 3.4-27. M  v hk, hh  h hk   g ,   hm  b h ’
 h     h .
FIGURE 3.4-27
A CPU heatsink with a thermal pad
195
196
Mk M’ CmTIA A+ C 1 Cf P
NOTE
Thermal pads are definitely one-time use.
Thermal Paste O thermal conductive paste, thermal paste    h m 
  hm , b b   b  q,  k . Thm    v m h     h xm m g,  m  z, b
 CPU   gh g  (GPU)   g mb. Th   h hm
   v , hh     h, m bg   g h v  h g m. Thm    -, m-,  m-b.
Thm    m  j ( Fg 3.4-28)  h   b 
b h  mb. Th     b     qh
g v bg h  h CPU   GPU. F   mb,  m  
hm     h   h b  h g v. Th m  
h b b h z   g  . Ahg m m    gg  h
mhb. F h qh mb, h m v mh     m m
 hm   h b  h g mb     bg  g v 
 h  v  h b  h . I h , b  h h  h
 b   h h CPU  v v. Th   hmb  h h  h
b v h   b .
FIGURE 3.4-28
A small amount of thermal paste applied to a CPU cooling assembly
DOMAIN 3.0 Objv 3.4
A  h TIM  vb  g h CPU  g m, g hm
g, hm hv, hm g , hm , h-hg m,  q
m. Eh  h m h  vg  vg, b h    h m   hm   hm .
Liquid Cooling System
A  , h   mxmm m h  CPU  h b  m
b mg b h h. M m mm h   thermal throttling, hh
m h    m  v xv vhg. A v
g mh h h  v bh h mg  h   m 
liquid cooling.
Y  h  q g m,  h    m k 
h m. A q   hgh  hk h  h CPU. Th  q
g hgh h hk, bb h h,  h  h q    . Th
  h h m h q   h , h g h q, hh
h  bk hgh h m.
T   q g m    PC: -- (AIO)  
m  . AIO g m  h m mm  h   h m
k      h A+ C 1 xm. A AIO m   bk h
h  m h h  h CPU. Fm h mb,  b h   
h h     h q. Fg 3.4-29  h mj    q g
m   PC.
Radiator
Fan
Tubes
Heatsink and pump
FIGURE 3.4-29
The components of a PC liquid cooling system (image courtesy of Intel
Corporation)
197
198
Mk M’ CmTIA A+ C 1 Cf P
REVIEW
Objective 3.4: Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Mhb hv    h   USB ,  jk, k ,
 h b- .
PCI  hv b  h m   b PCI  h  ×1  ×16 .
I  AMD CPU   hgb.
M h v   v   SATA .
A mhb h   mhb k  g  .
Th M.2   bh SATA  PCI b  b       m.
CPU/mhb mb m  m, CPU k ,
mm mb  , m ,  h.
D- mhb  g  b hgh-   m.
Th BIOS/UEFI   m,  h g g  
 CMOS.
USB  m b b   v m.
TPM , ,    k    mg m
 m.
S B   v   h  m  .
A b     CMOS- m.
E v x  hb     hz .
HSM   h v  g  g  k.
Th x64  x86 ISA  64-  32-b   PC h, v.
A RISC   mz  ,   ARM h  z  .
I VT-x  AMD-V v h vz .
V    RAM h mhb,  m hv g .
M v  q x  m  PCI  .
S   b  h     .
HDMI  DP  g .
NIC hv  gh     .
USB x   h b b    m USB .
A hk   g v  mm   h  h  m  CPU.
Th    hm   hm v   hm g .
Lq g  q   CPU.
DOMAIN 3.0 Objv 3.4
3.4 QUESTIONS
1. Y hv b k h vg mhb m    j. Th
mb- qm  h h mhb b  m  b. Whh 
h mhb  h m?
A. M-ATX
B. M-ITX
C. ITX
D. ATX
2. Y  h  PCI v 3.0 gh   h h gz’
v g k. Hv, h m  PCI v 2.0. Whh 
h g m  ?
A. Th     PCI 3.0 .
B. Th mhb m b  h PCI 3.0–mb v.
C. Th   b .
D. Th     PCI 2.0 .
3. Y  gg   m h USB 3.0 (USB 3.1 G 1) v b
hv    x . Y   m . Whh  h g
 v h ?
A. USB 2.0 h b
B. USB-C h b
C. USB 3.0 h b
D. SATA--USB v b
4. Y  g m  h h    h g h
UEFI m   m. Whh  h g m h  b 
h m b   ?
A. SATA v  b g  h-b.
B. USB   b b.
C. Th b q  b hg.
D. Y  x UEFI/BIOS  h vg hg.
5. Whh  h g    m     CPU g m?
A. Thm 
B. Thm 
C. Lq m
D. Thm m
199
200
Mk M’ CmTIA A+ C 1 Cf P
3.4 ANSWERS
1. B
Th M-ITX (mITX)  h m mhb .
2. D Wh   PCI v   (  ), h  v
 .
3. C A USB 3.0 h b v  USB 3.0 ; hv,   mhb
h USB 3.0 hv h.
4. A SATA v  h-b h g  AHCI  h UEFI/BIOS
m.
5. D Thm , hm , q m   m h  b  
 g   CPU g m. Thm m   v  h .
Objective 3.5
Given a scenario, install or replace
the appropriate power supply
P
   (PSU) v h  h b m  . PSU  
mm   PC ,  h   g     vv m gm. A - h h  v  b (USB)
v bm m m  CPU  GPU q m , PSU h g
g g  m  m.
Input: 110–120 VAC vs. 220–240 VAC
A k m   PSU ( Fg 3.5-1) h v hgh-vg AC (alternating current)   h -vg DC (direct current)   h m’ mhb  v. I    h  h m  v. Wh 
   g , h    v gg   h h
qm  h .
Th  AC vg  h U.S., C, Mx,  34 h   b
110 v (V)  120 V, hh  mm    h U.S.  ~115 v AC (VAC).
I h mg 175     h , h  AC vg g m
220 VAC  240 VAC. B  h   h  vg, m    h b    -vg h   h vg  
  . Th   h  h bk  h PSU h  Fg 3.5-1  
-vg .
DOMAIN 3.0 Objv 3.5
Dual-voltage
switch
FIGURE 3.5-1
An ATX 500-watt power supply
CAUTION Even if the plug pattern and the outlet are compatible, plugging
a 110-V device into a 220-V outlet would cause the device to run up to about twice
its designed operations and burn out fairly quickly. On the other hand, if you were
to plug a 220-V device into a 110-V outlet, the device may run for a while but will
eventually stop.
EXAM TIP For the A+ Core 1 exam, you should know that a PSU can be switched
between the two primary electrical voltage range services.
PSU Terminology
Th mg   b h  b   PC PSU  b g.
A PSU  b x , hg -, x ,  m  vg
v. T,   k m   fixed input/fixed output PSU. Th
m h h      g vg h ’ hg—  x  h
vg. Lk h  h  Fg 3.5-1,  PSU h  b h b vg 
 k   switched input v. Hv,   b g h  h  PSU
  b  x  PSU, b   g vg v   , h PSU
  x  v.
201
202
Mk M’ CmTIA A+ C 1 Cf P
M     auto-switching, mg h h   h mg
vg  g hmv g. Y    -hg  
h  h , m h 110–120 VAC  N Yk C  h 220–240 VAC  Hg
Kg. Th   m h b m!
CAUTION If you are using a fixed input power supply connected to a 220–240
VAC power line, don’t turn it on if the voltage selector switch is set to 115 VAC. That’s
a sure way to kill the power supply and possibly other components as well!
EXAM TIP The power connector for the AC plug on the back of a power supply is
called an IEC-320 connector, and you should expect to see a question on the CompTIA
A+ Core 1 exam that refers to the power supply unit as a PSU.
Output: +3.3 V, +5 V, and +12 V
PC PSU v  h , ,  h mb  +12-V rails . A power supply
rail   h   PSU’   b (PCB). A PSU   AC  m 
x   m   DC  h    b     v.
I v  PSU, h    +3.3 V, +5 V,  +12 V. Th  vg 
 b   PC h v q h m   . F xm,
h USB    5 V, DDR4 RAM q  b +1.2  +1.35 V,  h
    +12 V,   h CPU. Th jb  h PSU   v h 
 v q b h  h PC’ m.
Rg  hh h mg    120 VAC  220 VAC,  m b v
 bh   (DC) , , +12 V, hh  h  vg h hh 
PSU k. Th v  m b h AC/DC converter  h PSU. A  
h +12-V    +3.3-V  +5-V v, mg h v  h AC
   h h   h PSU. E   m h DDR RAM 
 +1.2 V  +1.35 V  , b h  vg  b h PSU  +3.3 V. T 
h h, m mhb,  h  m, hv  g   
v   h   h   h m m  hm.
Th +12-V   h     h CPU  b h GPU. I’ mm 
 PSU h h +12-V   v    m    h mg (m)
h    . A single-rail     gh   vg
k m, b  hgh- m m q  multi-rail  . I ,
v g  m v      m-  .
DOMAIN 3.0 Objv 3.5
EXAM TIP Make sure you know the voltage ranges of input (110–120 VAC and
220–240 VAC) and output (+3.3 V, +5 V, and +12 V) supported by power supplies.
ADDITIONAL RESOURCES
To learn more about the internal components
and the operations of a PSU, read the article “Anatomy of a Power Supply Unit (PSU)”
at https://www.techspot.com/article/1967-anatomy-psu/.
Output: +5 V and +12 V Connectors
A b ,  PSU v hgh-vg AC  -vg DC    v
h   v  h m  h v   v (+12 V) 
b  (+5 V) v h v b h  g  h PSU.
Th v b   mm  m PSU  serial ATA (SATA)  Molex,
 h  Fg 3.5-2. Hgh-   hv   6-  8- PCIe   PCI Ex v  ( Fg 3.5-3).
P    h mhb h h  20-  24- P1 
 h m    h  4- P4      8-
EPS12V       h CPU ( Fg 3.5-4). Th EPS12V    4- (P4)   mhb h   4- ATX12V  
 bh  mhb h   8- EPS12V .
FIGURE 3.5-2
Molex (left) and SATA (right) power connectors
FIGURE 3.5-3
PCIe power connector
203
204
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.5-4
EPS12V/ATX12V connectors (left) and P1 connector (right)
EXAM TIP The +5-V orange (sometimes gray) wire on the P1 connector is called
power good and is used in the initial boot sequence.
M m ATX mhb   8- CPU  , v 
  EPS12V, EATX12V,  ATX12V 2×4. H  h   b -mb h
h P4  ; h h h m b   v . O  m, hk
h mhb’  m  h   h  8 . F bk mb, m   v  8-   h     4- ,
  hh  h P4  (  Fg 3.5-4). Ahgh h k m, h 8-
CPU     mb h h 8- PCI  . Tb 3.5-1 
TABLE 3.5-1
Power Connectors and Voltages
Connector
Voltages
Mx
5 V (), 12 V ()
SATA
PCI
P1 (20-)
P1 (24-)
P4  8- CPU
 
AUX
G 
Common Use
Lg g   v,
m PCI v  
mhb,   
5 V, 12 V (3.3 V g ) SATA v
12 V
PCI v 
3.3 V, 5 V, 12 V
Pm    ATX
mhb
3.3 V, 5 V, 12 V
Pm    ATX
mhb
12 V
S    ATX
mhb
3.3 V, 5 V, 12 V
Ax    mhb
Bk
U b   
DOMAIN 3.0 Objv 3.5
h mm   h ATX12V  —h  —h h
vg  .
CAUTION Power connectors are keyed so that you can’t easily plug them in
backward, but some older designs can be forced. Reversing the power on a device will
fry it. Don’t force a power connector.
24-Pin Motherboard Adapter
T b h m   m  k h  20- ATX mhb 
m mhb h  24- , m v v 24- mhb .
Redundant Power Supplies
Th m redundant power supply m m k h v ’  , hh
  b    j h . A    g
vv  g v, m   k-m v, h  h  PSU.
Th  PSU  bh  b  g h v. I m , h 
h   v  q   h     v. I m
, h   v hg h   vg h , b m PSU
 b   h  gg. Fg 3.5-5 h  -PSU 
 .
Sg h h    PSU,    h PSU        ,
h h PSU      v    m. Th 
v m  h  v.
FIGURE 3.5-5
A redundant power supply unit (image courtesy of Hewlett-Packard Enterprises)
205
206
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.5-6
A fully modular power supply with two examples of its cabling (image courtesy
of Micro-Star International)
Modular Power Supply
A  ( ATX) PSU  m  hv   x  b hgg
b  h m . A  h b  g  h PSU    b m h mgg hm. A m   m h bm b
vg  h     . P, h    h vg  g
m  , hh ’ g  .
Th    m PSU  h  m  h m-m . E, h  b hm  h v b h g  h  m 
  b mv. A  m PSU, k h  h  Fg 3.5-6, h   
 ,  g b h   vg,  hh   b
 b gg        v.
Wh h  m PSU h  m h b.  m-m
PSU h g b  h v h  mm  v  PC, h  
24- ATX, 4/8- CPU,  mb PCI  h mhb, CPU,  mm. Oh
b m  m  b     PC, h  b h SATA, PCI, 
Mx .
Wattage Rating
Y m   q  h A+ C 1 xm gg h  mg v,
m,  . Th,  h hv m g  h  h   
h h. T h , h   b   h m:
•
•
•
Volts Vg (V) m h    h hg   mm. I’
mhg k h      h.
Amps Amg (A) m h m   g hgh h mm.
Skg h h  h xm,  m  k h g  m (gm)
  h   h h.
Watts Wg (W) m h m       
  v. W    A × V = W. T m h  g,
  m h   h  q     b.
DOMAIN 3.0 Objv 3.5
P  v   wattage h h mhb, v,    
 . Th’ h  . P    harmonics (h hm  h
h h   ), hh   bm h h    h
 v  h    .
EXAM TIP Wattage is the amount of amperage flowing at a specific voltage,
usually written as W = V × A.
A m q  g   . Ev v  h m 
q   g  . F xm,   mg h v  15 W
  h  (SSD  ), h  q- I 9-9900K CPU  
hg 162 W  k g—h vg g  92 W. Th  mb g
   v  h mmm   h    v.
I h   ’  h g  b  m, h m ’ k
. B m v  h m q mxmm g h g, h
 m   g   gh h k k  m. Th 
x  h    mv h v  g    h m g. T’
m q   500--    .
G m   m h active power factor correction (active PFC), hh 
x  h v  hgh-vg AC  b g   h m  
, h mg hm. Av       h h .
Number of Devices/Types
of Devices to Be Powered
I’   k h mb    v h q   h 
  b g       PC. P  v  h
mb  Mx, SATA,  m (Bg)  v. I , m PSU 
  g PCI  . Mx    g   v b 
    h h ’     h mhb. Mx 
  b    SATA v  v h  m (Bg) .
Av g    m v h  b      .
Ch  h  h   vh,  v h b-q          m.
Power Supply Installation Notes
B  h  k h      m. H’ h:  ATX
  v  . I  ATX      AC , h PSU 
5 VDC  h mhb. Ig , h,  mm m   mhb
207
208
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.5-7
Power supply secured in the case
h   g  mg h m. Rmmb   g h
    b   b  k  h m  
h    m!
B   h  , ’   m   h  h     ( Fg 3.5-7). Th  x  m m   .
REVIEW
Objective 3.5: Given a scenario, install or replace the appropriate power supply
•
•
•
•
•
•
•
P   110–120 VAC  220–240 VAC, h hgh  g
h  h  -hg.
Th IEC-320     h AC g  h   h  .
P  g v +3.3-V, +5-V,  +12-V   h v h
SATA  Mx  . PCI   v +12-V   PCI .
P1 v   h mhb g  24- ()  20- ()
k .
R   v  m   m h
 PSU .
F m PSU hv  g bg  v g   v 
 ,  m-m PSU hv h b  b,  h
mhb  CPU,    h  .
O mhb  h P4 4- 12-V   v   h CPU
(h     b h mhb);  mhb  h EPS12V
8-   h jb.
DOMAIN 3.0 Objv 3.5
•
•
•
Hgh g g      h h    
 b v h  x h   h   .
Av PFC h m hm  b-q .
P    m g    h  h  hgh
h  .
3.5 QUESTIONS
1. Y ’ 20- ATX   h . Whh  h g  b 
 b  m    b    m?
A. ATX12V 
B. 24- mhb 
C. EPS12V 
D. Ax 
2. Y    v  h  m hv    
m h  m b. Wh     g h
b   h v g h ?
A. Sm-m PSU
B. F m PSU
C. R PSU
D. Hgh g PSU
3. Wh  h m mm      vg g 
h  PC PSU?
A. I: 110–120 VAC / O: ±12 V
B. I: 220–240 VAC / O: 110–120 VAC
C. I: 110–120 VAC / O: +3.3 V, +5 V, +12 V
D. I: 110–120 VAC / O: +3.3 V  +5 V
4. Y hv v     hm m   gm h h  h 
PCI v       ’ g h g PCI  b  h
 . Whh  h g  h b ?
A. Lk   8- PCI .
B. U h 8- EPSV12 .
C. C  m   b      h.
D. P h   bk  b h   ’ b .
209
210
Mk M’ CmTIA A+ C 1 Cf P
5. P     h mhb h hh  h g ?
(Ch  h .)
A.
B.
C.
D.
E.
F.
A 20- P1
A 24- P1
4- P4
8- EPS12V
4- ATX12V
A  h bv
3.5 ANSWERS
1. B A 24- mhb  b  m 24-    k
h   m  g h b   hgh g.
2. C A  PSU g  v  m h 
PSU .
3. C PC PSU mm    110–120 VAC  v   +3.3 VDC,
+5 VDC,  +12 VDC.
4. A
M (b  )   hv bh 6-  8- PCI  .
5. F
A  h        PSU   mhb.
Objective 3.6
Given a scenario, deploy and congure
multifunction devices/printers
and settings
O
  h m mm v  A+ C Sv Th m  
  g  m v (MFD)  . Objv 3.6 
h A+ C 1 xm  h   q     g
h v. A MFD,   m m,  m , hh  
b- v  g, xg, g, g, ,  m m, g h
h Wb. I    v  m h  h ,  MFD mb hm
  g m v.
EXAM TIP Make sure you know the steps required to install printers and
their drivers.
DOMAIN 3.0 Objv 3.6
K  m h   MFD  , b m . Th, h h m
printer    h   h bjv, mmb h m  h m 
  MFD.
Unboxing, Placing, and Conguring an MFD
NOTE The following discussion on the initial setup and the configuration of an
MFD is based on the installation guide of a Xerox MFD. The installation guide books
that ship with most devices are proprietary, but, for the most part, the tasks and
objectives are the same.
Obv h    k  bg h   g   multifunction device (MFD)   mv    m m h bx  kgg. I’ b 
k h v   h    b . Th  v    h  v
h b    m. T,    g g 
kg h h v, g h   m, ,   m, 
 g,  h  qk vv  h  h   b h MFD.
Initial Configuration
M  h b MFD  g   out of the box (OOTB). Hv, m
g   q  z  v h   h v. Th g   g   h k  m ( h  q)   h 
g   MFD:
1. C h MFD  h  AC   vb. I h AC  
h      hz,  h v  mv h  k.
2. C h ’ k   h k mm  q   
 k.
3. Cm h h   gz b h k. Th  h b
g  h k b h Dm H Cg P (DHCP)
 b b  mm v h k. T  h,  h  m 
h   v h IP  g. I h IP   m ,
h   , b h m  m  b  b h b
k   (NIC).
4. I mm   h h k, - () h .
M MFD     /g z m h g  hgh
h g . Th mm  , m z,    m,
 mm     .
211
212
Mk M’ CmTIA A+ C 1 Cf P
5. F h   h m  h    h 
 mm (k j, ,   )     g.
6. I v   ,   mm  h v’ g g.
7. T h  h mb   h :
a. Fm  b, m  h h IP  g  h .
b. I vb,   m  -m      h m.
c. I vb,   m  -m      h m.
d. Th x    vb  m MDF, b ’ bgg  .
I ’ ,  h    h   h .
e. B  h h  g m v h  h  b 
h m.
F h   h ’    m  m h
 g.
Device Drivers
B h        b  m  k   h m,
h v v()   h v’  ’ g m m b 
 g.
Windows
M   MFD  g-- v  W m,      bh, W m    h  v. I h
m ’  h v,     h   h v v m. Y hv     vb       W m. O 
 g h Dv  P   h C P   A  Dv . Th
   g h P & S   h Sg  ( Fg 3.6-1). Y
h   h   g  v h h v.
macOS
Th mOS  m h AP-mb . O h mb
, mOS  h v v m. I h    v USB,
v h h mOS       h h   v  vb. I
  g  W-F   mOS,  AP-mb W-F   g m, b mb  m   b  v USB m  g.
DOMAIN 3.0 Objv 3.6
FIGURE 3.6-1
The Printers & Scanners page in the Windows Settings app
Linux
Lx   v h h g m   h v vb.
M HP  Bh    m-v Lx v. T  h
 g   Lx gh   (GUI),  h P  Sm |
P    k vm       h v v
h h GUI. Th Cmm Ux P Sv (CUPS)     g
   v;   g  Lx b’ kg mg.
PostScript and PCL
Th CmTIA A+ C 1 xm bjv  PostScript (PS  PS)  Printer Control
Language (PCL)  h bjv “U  v   gv OS.” Hv, h
 h  “v”  v   b  h   m’ :
PS b Ab Sm  PCL b H Pk. Eh  h v   
 g  gg h v  g mg   x  b   
 v   m   g.
PostScript
PostScript  g v b Ab   k bhg    m
gmmg gg. M PS-mb  hv   h, k
 v gmmg gg,  h PS mm  h x
213
214
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.6-2
An example of PostScript page commands
() h  h  g    . Fg 3.6-2 h  xm 
PS mm,  Fg 3.6-3 h h g  m h .
NOTE
Some printers refer to PostScript interpreters as raster image processors
(RIPs).
PS mm      hgh- gh  x 
h m  g. PS 3  h , ,  m k  v  PS. Ab  h h Pb Dm F (PDF) m   bm h
m  gh bhg . PS mg  mm   b
v  Encapsulated PostScript (.eps) .
FIGURE 3.6-3
The results printed from the PostScript example in Figure 3.6-2
DOMAIN 3.0 Objv 3.6
Printer Control Language
P Control Lgg (PCL)    h P Command Lgg, hh 
   h Pg D Lgg, hh  g  PCL. Th PCL  
 k b (h , h P C Lgg)  v b H-Pk  
         kj . Hv,  h b  
m h   , g hm  m.
Th  v  PCL  v 6, hh h b h   h m
1990. PCL 6   h :
•
•
•
PCL 6 Enhanced A k  PCL XL, h  v   g
m GUI-b m h  W.
PCL 6 Standard Th  h bk-mb  qv  PCL 5.
Font synthesis Th   b     g 
b -.
Th b  b PS  PCL  h h m   g  gg v  k bhg  h    g  gg
v     . A g  gg b h  
  h g  b . I h  v v? Th , b h 
 v mm .
EXAM TIP PCL is commonly used for basic office document and letter printing,
whereas PostScript is more often used for detailed graphics printing.
Device Connectivity
Th  v        m, b h b    
    m  h    mh vb  h  . Th
m mm        PC  h  USB . Oh mh h
      , -- hg, , v m ,  
. O  LAN,    h  h k.
W-b   gg    bg    PAN
 h LAN, Hv,  , k    , q  
    b   h g PC. Th  ,  h g   W m h  USB ,  Plug and Play (PnP), hh m
W bh h g   h kg. Hv, g  h  ,   g m (W, mOS,  Lx),  v v m b
q   m v h h . W  mOS   v 
    v  .
215
216
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.6-4
A Type-B (left) to Type-AB (right) USB printer cable
USB Connections
V  PC-mb  v USB  b, b h USB        g. A USB-b  mm h 
T-B      v   RJ-45 ,    . Th 
b h h  T-B     , g  h v  hh h 
 bg ,  T-AB ( Fg 3.6-4)  h v  T-C .
Ethernet Connections
I        PC,  k, Eh,  hg  . Hv,  h   b       Eh k, m g 
  h PC. M  h mj  m, h  HP, Zb, C,
Lxmk,  h, v h m h   g    b
h g  hgh h . Hv, m   q g  h
k  h   PC.
Cg  k-b    Eh k   v m .
Ph,  k b     h    , h,  hb h 
v   k. O h  ,  b- g     m g h   h k  g h  hgh  -b- .
Hv, g  h -k     h g m.
EXAM TIP Both Ethernet and wireless are listed separately in Objective 3.6 for
Domain 3 of the A+ Core 1 exam. You may assume that should the exam reference
Ethernet, it’s referring to a wired network. This is probably a safe assumption, but be
careful with that.
DOMAIN 3.0 Objv 3.6
Add an Ethernet Printer to a Windows System
Th   g     k  m  W 10/11 m, 
m  h v v,  h g :
1. O h S m,  h Sg    P & S m h
Dv  ( bk  Fg 3.6-1).
2. Ck h  g       .
3. W h    k    () vb 
b .
4. S h v  b   k A Dv  hv h m  h 
v  h m.
5. I h    , h mg “Th  I  ’ ” . Ck
h mg    A P g bx h  g  g 
 m.
Add an Ethernet Printer to a macOS System
Th  v  mOS  h b  h    m k
, mh k W 10/11. A jm   h m g
 h b     m  b   h P & Fx   h Sm
P .
Add an Ethernet Printer to a Linux System
Th m  Lx    v     k , mh
k W  mOS. O  GUI k h  GNOME  KDE,  h h
Sg  A Sg    h g . Ck h P  
  h    v h  m k  h . I  
 ,  h Common Unix Printing System (CUPS), hh   b-b  
mgg  hg g.
Wireless Printers
Th m mm        k, g   bg   ,
       v  h k h  b h   b hz k  h k. Obv,    k,    
b   v, hh m  h  b-  k . F h m ,
h   g       b  b
 m.
O   ( W-F)   g   LAN, h   bg h
k   h m  h   g    . Th m     , h h  x g  h  g.
217
218
Mk M’ CmTIA A+ C 1 Cf P
Device Sharing
U m      m q, h’    h  
hv  v . Th  m   h ,  h   h
k   h .
Wired
Th m  b       g h    g
m   b   h h . Th g  h  h m mm
 mh  hg   mg v:
•
•
•
U  USB hb  h   b  b m. Th mh m
h   h m  b    k.
O  k,   h      b h, v h h
m  g  File and Print Sharing Services  v.
Ah h  hg     k   bh h   
b Eh k .
Wireless
M  ’  m       m  k.
H  h m mm     v v   :
•
•
A  h Bluetooth       m  mb v g
Bh. Th v m b  g (~10 m), h v m bh
g,   b g  m b   h mb v.
I’  mm     hv Wi-Fi (802.11x) b, hh   
 j   k g   IP   b    
  g. Ph h h   g    
 k  g h  g (SSID, ,  
k) g h ’  .
Public and Shared Printers
A public printer   k   hh    g  g . F xm, 
b    g b m q  g h   k  b h 
,   m q  . Ah xm   b b    m  h’ k h  v   -m m  b 
 . I h k,  b   vb  h b. Hv, h   
“b” m b   b h k.
A shared printer   v  h      b gg m   . Fg 3.6-5 h h W 11 C P’ Nk 
DOMAIN 3.0 Objv 3.6
FIGURE 3.6-5
The Windows Change Sharing Options for Different Network Profiles dialog box
Shg C’ Chg Shg O  D Nk P g bx  hh
h g  h hghgh   b   h  .
Print Server
Ahgh ’  hv  m b h h  h , m k g
. A  m mh b h m   g  mgm k 
h b  print server. Th   mj  b  k     v
  k. A k-b   b    k   b  h
h   h m b m    . A  v k m k 
   jb, ,  , m     integrated print servers.
A  v  b    h m:  - k h v,
  b   ,   g   k v, h    v.
Fg 3.6-6  h    h m. A h-b  v ( k
  external print server)    mg v   vg  q
mgm ,    m     h v,  bg h
. A k    v  v  (mm  
  internal print server) h  q mgm  . Th-  g  k v h  mg  q,  bg,   v 
    k.
NOTE
functions.
Some external print server devices don’t provide support for all MFD
219
220
Mk M’ CmTIA A+ C 1 Cf P
Local Area Network
Internal Print Server
External Print Server
FIGURE 3.6-6
An illustration of external and internal print servers
Cloud Printing
A v  cloud printing , h  Gg’ C P, M’ Uv
P,  UP’ IC, v  h h b    m  
m  m v   h  I   vb. A 
g    m     h     -b 
v. Th  v  h        g.
C g     m  v, g mb v, 
  k. A  g v    b   v  
I-   b h . C g v h v v, 
 mg mb,   q   h   
 LAN-b g.
Remote Printing
Remote printing  mhg k  g, b h h . E, m
g  x mh  g m m     k  
g v  h m k, g  hh ’       LAN,
 WAN,  h I. Rm g v   m  h h
b  v  m m  m    h m  h 
  m .
Conguration Settings
A  hv      m, h x    v  b m
 g, hh m h h    m. O  W m, 
h     h Dv  P  h C P  P &
S  Sg  h gh-k     Pg P. T g    mOS,  h P g bx,  h , k Sh D, 
h h  . T g    Lx,  h m  
GUI  .
DOMAIN 3.0 Objv 3.6
O v b v  , b h  h     k  h A+
C 1 xm:
•
•
•
Duplex Th x g  hh  h   h    
g. Sm xg  h   bk  h h  q, b
v    h     bg   gv g 
   g    bk .
Collate Ebg h         mg m
b g h x . Wh h   b, h    
  g b mvg  h x g.
Quality Th q g b   mg h  b q 
, k ,  mm :
•
•
•
Th m bv  h, resolution,  h DPI h m h
b  .
• Sm  m   h m m  q  h mz g
 gh  x  h  m g   v g.
• Sm  m hv g h  k   ,  m 
vm .
Orientation V   mm   SOHO vm hv h
b  g  g  h  (8.5" b 11")   (11" b 8.5").
P,  m     v     mz g z,
h  A3. O g  m,  mgh    h  g.
Tray settings G, h  g     h z  h  
  , hh    v () h h  m h , h
    h  (h  m  hk  m),  h h
hk  h g.
NOTE The names and descriptions of settings that influence quality might discuss
quality itself, ink or toner use, environmental friendliness, or even cost savings. As a
result, quality-reducing settings may be scattered around multiple menus.
EXAM TIP Make sure you know the configuration settings for printers covered
in this section.
Device Sharing
U m      m q, h’    hv  
 v m. Th   v    h ,      h .
221
222
Mk M’ CmTIA A+ C 1 Cf P
Wired
Th  h  b    , hh  v m   g   g v,  h m    v hg,  :
•
•
U  USB h  h   b  b m h h 
 kg;  h m    k,   h h   g 
h h m  g. (D’ g      hg v!)
U h Ethernet   g h     k. I  hv  
IP .
Wireless
M         h m  k.
•
•
•
•
A  h Bluetooth       m  mb v
h Bh  g (j mk   hv  b g  
h mb v).
A  h Wi-Fi b (802.11 , b, g, , ,  x)    j  
k, hv   IP ,  b   v  jb  g.
Th h   h  m b g h SSID   k g h
’  .
Infrastructure   g m  h  h m W-F k k: v
v, g h ,   SSID       (AP)  .
Ad hoc,  h h h,     b   W-F v
h gg hgh    AP. W      h
, b     v  mh   g    h
   .
Security
Pg      g     h  hz 
 b  hgh-       . P ’  
 b m  k, b h   v  h  h . Sm  h —
 h  h  b ’ k  hm  h A+ C 1 xm—
  h g .
User Authentication
A   v m g ,    k h  h, h
 v g . Th, g   b    mk  h
m ’ kg . Wh m   k , h  m h
DOMAIN 3.0 Objv 3.6
 h v  g h  jb b h jb  . Th  b  h  
 h    h ’  bk  b g v h v.
Badging
Sm k  , ,  h   hh  m b  
 , v,  hz . F xm,  m m m hv  3D 
  k b       h m h  q  
 . Th  b  hgh    badging, hh   g  h
    h        m. Ahgh
h   g ,    h m   h    
  .
Audit Logs
I  ’ g h bgg   g hv   h m g, h h   . Th m    g   m   b b
 v  v  h h b  m    . Th  
 v  .
O  W m, h   h v  g   b v g h
Event Viewer,  m  hh  h  Fg 3.6-7. O  mOS m, h m g
 b  g h V Sm Lg   h Console . Lx m 
 g  h /v/g/    b v g h aureport mm .
FIGURE 3.6-7
The Event Viewer is used to analyze the Windows audit logs.
223
224
Mk M’ CmTIA A+ C 1 Cf P
Secure Print
M  h  m   h b  v , v,   m m bg . Th    h  g h 
q  -  -g   b  b h m  b . Eh
 m h h   b , b h    h
m    hm.
Oh m   g     ,  h hgh   MFD,  h g:
•
•
•
Image overwrite I ,  m mg k  h ’ g  b
g h.
Data encryption D  m   m h   b  g
SSL/TLS  IPS.
Unauthorized remote access D   h  v   g
  h  h   bg .
Sm  m   bgg  m  v   .
Network Scan Services
P  MFD h v network scanning gv  h b    m 
v h  mg  h  h. Th      m, ,  v m   h g mg     m . Sm
k g m q h   - m  h  h h
m   b   . F mm  h k  v  h
v   MFD m  h g:
•
Server Message Block (SMB)/Common Internet File System (CIFS) file share Th
     h v  k.
•
HTTP/FTP file share Sm   SMB  h, h  h v  
m  v HTTP  FTP.
Scan to e-mail A g m  b    -m mg m
 m.
Cloud services O   hg m  g mmb  
ggh , g  m , g  h  h m
,  h g  v.
•
•
DOMAIN 3.0 Objv 3.6
Automatic Document Feeder
A m m  (ADF)   m   m m    j h h m    MFD (, , , h g,
 x). Th    ADF    pages per minute (ppm). A ADF v  v m  g m g   MFD. Hv,  m  b  mj bk
h     .
A k    ADF  h b   () h    - m   h,    duplexing,   ADF . Th    ADF
xg  Reversing ADF (RADF)  Duplexing ADF (DADF). A  m m, 
RADF       m  h v () h m   h
 . A DAFD  bh    m   , hh q  , mkg  bv h m xv  h   mh. Bh xg mh    images per minute (ipm).
REVIEW
Objective 3.6: Given a scenario, deploy and configure multifunction devices/printers
and settings
•
•
•
•
•
•
•
•
•
•
•
•
•
M MFD  g b m q z  v 
v g.
W  mOS m  h  v   v 
  m.
PS  PCL v  g mg   x  b   .
A   MFD  b g   v, h,  b .
Nk   b    k.
A  v  b  x, ,  mb v.
P  MFD    xg, , g ,  q
  g.
P  b h g USB hb, Eh h,    .
W      v v Bh  IEEE 802.11x m.
P   b h hgh  h, bgg,   g,
mg h mh h m        .
Th     v , v,   m
m bg .
Nk g v h b    m  v h mg 
hv  h.
M MFD  m m   b .
225
226
Mk M’ CmTIA A+ C 1 Cf P
3.6 QUESTIONS
1. T Sm h h   MFD  b    LAN. Whh  h
g      h MFD  h k?
A.
B.
C.
D.
E.
F.
USB
S
RJ-45
IEEE 802.11
A  h bv
N  h bv
2. Y  h  m  g hz    k   m
,     vg h  v. Whh  h g 
    h  g   W m?
A. F Ex
B. M Eg
C. Ev V
D. Tm Lg  O
3. Y   h   b  m h,   , h
 b k. Whh  h g  h b ?
A. USB  v
B. KVM
C. A h 
D. USB h
4. A    m  b     Bh , v hgh
Bh  b  h   h m. Whh  h g 
h m bb ?
A. Th Bh v   .
B. Th’  Bh .
C. Th Bh b  .
D. Th  .
5. A   m MFD  ,  m   g  
    m. Th   xm  hh  h g
? (Ch .)
A. S g
B. Rm g
C. Bgg
D. Nk g
DOMAIN 3.0 Objv 3.7
3.6 ANSWERS
1. E A   h  (A hgh D)  b . Hv, RJ-45  IEEE
802.11  h m mm  m  k g.
2. C Th Ev V  h vg, g,  g  m, ,
  v   W m.
3. D A USB h b h USB v (h   MFD  )  b h
h kg.
4. A A Bh  ( h Bh v) m b  h  m
 mb v b   b .
5. A C Bh  g  bgg  m   h, hh 
q  g   h MFD  h .
Objective 3.7
Given a scenario, install
and replace printer consumables
U
  h m hgh h   h m mm  h   gh v   . Th mb “”    
 . Hv,  ,     ,  h   mb    v .
A ’   mb, h h x     , 
q  h     mhm. Sm   h   hg
 m h  mg; h  k bb, x,  bm. Rg  h
h , , ,  vv  mb m. I h bjv,  k  v
    h m, ,  h   mb h
q. B b  g  h   h , ’ k  b b b.
EXAM TIP The A+ Core 1 exam’s objectives cover the gamut of printer
technologies, but its coverage focuses primarily on laser printers and inkjet printers.
Calibration
Ev    h m m  b . Th   bg
     h h x  mg    gb,  gm, ,
   , h h     ’ b v   h.
227
228
Mk M’ CmTIA A+ C 1 Cf P
C , g  h , h b b g h m’
b mh (  h    m)   h bx  hv
mj m    m. L   3-D   h
hv  b    h   vv m gm. M
hm  m   hv  b    g b  h 
 g m.
Laser Printers
Th hg     m      h mb 
 q   b h . Th       h
m :
1. A  m h  mg j   b    
hv.
2. T    h hg   h m (h  hg b h ).
3. Th       ,  h     h
  h .
N v   h  h  mb m (h h , h ), b
bv h    h  h .
Laser Printer Imaging Process
Th mgg      vv v h, h  hh  h  
  g  g mg   v :
•
•
•
Processing Wh h  mm  , k,  , h m
 mg  b      gg h  PS  PCL, hh
 v b   mg    bm mg  h m h
 h   b .
Charging A k  h conditioning . A vg h mg  h 
 b , h ’  hg h hv mgg m h
 AC hg m  m hg      hg  m 
v  mg. A DC hg  h m    h mgg
m  vg h  mg.
Exposing A h mgg m  hg,     v hg  h
  h m h  h mg  h   b . A mhm
  h   m, hh   k  (h  bk). Sm
  ,  MFD , m hv  m,  h  ,
mg, ,  bk (CMYK). Th  ’   h mgg
m, b  bm    h m v   m m.
DOMAIN 3.0 Objv 3.7
•
•
•
•
Developing Wh h  mg   h m ,  
  h m b  j , hh    hg   
m  v. Th vg   h -hg   h mgg
m hv   hg  h  b h ,       
h m h  hgh vg. Th   gv hg  h  v. A
h   ,     h  h  k gv hg (hh
k   k  v hg)  v h   h mg  b .
Transferring A h  mg    h mgg m,  h    
 h mgg  b h  b,   ,  . A v hg
   ’  h   h hg  h m. A h  mv
v h m, h mg    h .
Fusing A h     h , h   hgh xm
h g     h  m h   h   h
  h    h  () h m   h g. Th
  h mv  h    .
Cleaning Th h      h “g  hgg” h. B
h     h x g  b ,     mv
m h mgg m b   hg g b h  h 
 h m. A hgg  h   m gv hg  h mgg
m  mv  gg hg ( mg) m . Th   h .
EXAM TIP For sure, know the seven phases of the laser imaging process for the
A+ Core 1 exam.
Laser Printer Components
Th mj m      h m g  m  m,
h  m m . I   h m v x  h
 g , h h   mb      h k b
 b  h g . Th m  h mgg m,  mb,  b,  , k ,  ,  h xg mb.
A  hv m kg  h h , h h ,  h h   h v
 g   h A+ C 1 xm. Fg 3.7-1  h mj m
    .
EXAM TIP For the A+ Core 1 exam and the questions on Domain 3.0, know the
key printer components described in this section.
229
230
Mk M’ CmTIA A+ C 1 Cf P
System board
Toner cartridge
Printer memory
Gearbox/motors
FIGURE 3.7-1
•
•
Fuser assembly
Sub-logic
board
High-voltage
power supply
Paper
tray
Primary
power
supply
Components inside a laser printer
Imaging drum Th mgg m   g  h  g
  hv m. Wh gh, m  , h h , h
 hg “”  hgh h g . I’ mm  m
 m   h h  g   mb  
h mgg m (g h h m  h mgg ), hh 
bm   b h m h    . Fg 3.7-2 h 
xm    g.
Fuser assembly Th  mb    h bm  (b  
h) h  g   h   (     h )
FIGURE 3.7-2
A laser printer toner cartridge may contain the imaging drum.
DOMAIN 3.0 Objv 3.7
•
•
•
•
 m  h   h . Th h  h  k g
h  T  v  m kg.
Transfer belt Th  b   g g b    . I
k k  v b      h mgg . Th 
b  h  h CMYK v   h  m  h 
   mg. O g-   , h  b   
h CMYK   h g  h m m.
Transfer roller O mhm  ,    m  v
  h  b   . Th     v hg
 h , hh  h   h gv hg mgg m 
 h    b   h g. A  hg m h
mv h hg  k h  m g  h m.
Pickup roller and separation pad Th m k  m   h
   h  . Th bb k  h  gh  h 
 h  m h  . Th  , hh   h
 g,    h k   gb  h. I   bg
hvg  jm q, h  m  h g  b h bm.
Duplexing assembly M SOHO  MFD    mx ( g) . M    hgh-    x ( ) g. I     bh    h,    q 
duplexing assembly. A h   h mgg , h xg mb 
h h h    bk  h    h g   h
mgg   h v .
EXAM TIP Be familiar with the general purpose and function of each of the laser
printer components discussed.
Laser Printer Maintenance
M ’  m . M   vv m h
 g, g,  bg. H q  m  m  
     v  , b    g     gg
 g mg h h m h b m. M  h mj  
b v  mm m k ( v k) h  h  
   h m . M k ’ g vb  hm
 m      m  h g  , ,  m v.
M k, h xg h     , ’ v h g 
   h . I, h    h x h gv  h ;
h  vm g  .
231
232
Mk M’ CmTIA A+ C 1 Cf P
EXAM TIP Know the contents of a maintenance kit and the elements of a
maintenance program: replacing the toner or toner cartridge, applying a maintenance
kit, calibrating the imaging components, and cleaning the printer.
Maintenance Kit Contents
Th    m’   m k  v h  m,
b  g h mm  h g m   mb:
•
•
•
•
•
•
T, k,   
Fg mb
S 
T , b,  
Fg 
Cg 
Th m k m   m   g m 
  m.
Cleaning a Laser Printer
A     x m   mg,  jm,  m . Hv, g      g b   v m  h
  h .
Cleaning Supplies
Th          vb  h mk. Hv, m
 h m    h   h h   ’ . Th   h 
       h g:
•
•
Protective gear Y h b  gv (bb  m-m )
  v   mk. A b ,    , h 
h-g  h   ’   bh   g   k.
Toner vacuum A g vm , mg h  ’    h
    h k, h’ b    qm, h 
 h    m   h mgg m   g   
,   m . O,   vm  g  g
m     h zz; ,     h vm m
    xh  b b   h .
DOMAIN 3.0 Objv 3.7
•
Activated toner cloths Th b (g-)    h 
 h m  h - hg   h    h
b vm.
•
Alcohol Nv, , never  bbg h    g hgh
m  h   . S gh  h  b 
  h     . Th g    CD, 
v,  h  m h   99   
 g  .
Brushes and swabs S-b  bh, k  m 
g bh   bh,  b    h  m. H  
b bh     g b  m h h m.
•
Cleaning Steps
B bgg h  g     ,  h  h 
   h . T v m  h h b k b  
h   g  (1) g   g  h   (2) gvg 
mkg   .
Ab  h b bgg   h    ,  h   ,
g h   m h  ,   h      m 
bh m   . A gg  h v ,  h 
gv   mk h kg h    g. Y ’    
hzm ; j   h  g.
T    , h g g    :
1. Open the printer. R  h  m  b   h mh  
 h   g.
2. Identify and extract removable components. Ag,   h ’ m
   mv   h h m  h . Th   h
 g,  v (k, , b),  h  m. Tk 
   h     h h   h  m. P h hv  m   k .
3. Clean the toner cartridge. S    h  g   v  h
  h h  mv  x  m  . S h g
, v   b v  - h.
4. Use the toner vacuum to clean the printer. Ug   vm,   g
mv   h m hv b   h   h  . B
v     h vm      h  .
5. Brush excess toner from hard-to-reach areas. U   bh   b  mv
  m h k    h    h  h vm 
mv  m h .
233
234
Mk M’ CmTIA A+ C 1 Cf P
6. Clean the transfer rollers and charge rollers. W   b h  h
 g  h   bh h   bm .
7. Clean the feed rollers. Ug   m  b   h, h h
    mv    h m hv b .
8. Reassemble the printer. Ug h ’ m,  h m
mv  g h m    mv hm.
9. Clean the outside of the case. I ,  h   h ’  g
v  h  m  h.
10. Restart the printer. R h     ,   ,   
b-         v h mb  .
EXAM TIP It’s doubtful that you will encounter a question that requires you to
sequence the maintenance and cleaning steps for a laser printer. However, you should
have a general understanding of the actions performed and why each step is included.
Inkjet Printers
Wh    mm  hgh-  hgh-vm g , inkjet
printers  h m mm   v,    hm  m .
Amg h m  vg  kj h v     h  k  
mhm     - g h   h  k  
g. Ah vg, hh m  b  b,  h kj   mh 
xv h  .
Inkjet Printing and Components
A kj , hh  h m  g-  SOHO   ,
 m  mg b g k  h   h     
300   h (). I m ,  kj    mg  -
    600   hgh. I h’  gh,  kj  b h  m   m v h  mk ,   v x m, 
   x  mg.
Th h  mg  b  kj  m   m  h  
 h    g    h mv          
m. Hv, b  k  h     kj   , ’  v
h m  h kj  h  h   g  m.
EXAM TIP For the Core 1 exam, be sure you know the components of an inkjet
printer and the role each plays in the printing process.
DOMAIN 3.0 Objv 3.7
FIGURE 3.7-3
Inkjet ink cartridges vary in size and shape.
Ink Cartridge
A kj ’ ink cartridge  m h j h k  v. Th k g 
 kj    ( mhm)  m ( CMYK) k v   m h mm   h h ’    h 
m ( )  k  h  h, hh   b    h k g .
Th     z  h  kj k g. A kj k g’
m     q  h  kj , h m  ,
, , h m. Fg 3.7-3 h kj k g m v 
kj m, h m    m.
Print Head
Th print head  m kj  m    h k g. F h, h
 h    m gh. Rg   ,  kj ’
235
236
Mk M’ CmTIA A+ C 1 Cf P
 h m h m , hh  g k   v  m  m
h, mb,  mg.
Uk m   , hh  v , kj  h ’  h
m. Wh m   k  bb m  m   v   bh,
 kj  h  m k    g. Hv, h h g g 
kj  h, v hgh h m  h m v , kj  h
 v  h hg  . Ikj   h      mh—
z  hm— g k   mm  ’ m  k h 
b hm  h C 1 xm.
Piezo Print Heads Th z  mh (hh g  m m h z  g  hg) vv  v h m h v   hg. Th hg  h
m  b, hh     k hmb j h    h zz. Th
m  hg m h m  x, hh   m h m  k
h   m h zz  h   h mm. A piezo print head h 720 
zz  h  h   . Hgh-q g  q m   h
 , hh   h   b   mv h  .
Thermal Print Heads Thm kj  h  h m mm   kj 
 h. A thermal print head,   m gg,  h  -b k 
 mg  m. I m  z, hh    hg  
h  h  h k m   h zz, hm   h  h
k h   hmb bh  zz  bg    b. Th bg k   bbb 
k v, hh   hgh h  h zz, g   b   h k
 h mm. Th hmb h   v qk  h h   
mm,  .
Print Head Stepper Motor Rg  h  h hg    kj ,
h  h ( k g) m b mv hz  h mm, 
 bh . Th m   b  stepper motor, hh v h --
  h    m v ,  . Sm kj   
  m  k h  h h h      .
Trays, Rollers, and Feeders
Th g g  m kj    paper tray h   - (mvb)
   b- (mvb) m. I h , h mm    h 
 b    rollers, hh  v h ,   b h  , 
h  h m g       mv  h x .
Sm kj  hv  feeder     . O  kj ,    
h  h   bk  h ’ h. A  ’ h  m h   ,
b    b       z h   m  b b  .
Fg 3.7-4 h  kj  h bh      .
DOMAIN 3.0 Objv 3.7
FIGURE 3.7-4
An inkjet printer featuring both a paper tray and a document feeder
Carriage Belt
Th kj ’  h mv --  h   h g 
m. Th  h mb  h  h g b, hh   ,
hgh  h,  h  m. A h  m    v 
v,  mv h g b g, hh    h  h  h   h mv.
Duplexing Assembly
A x   h    ,  xg mb b  
   bh   h mm. I g , h xg mb b h
    m   h b     bk  h   h
  b     .
Inkjet Print Process Summarized
Ikj    hm --m  h m k m  g v   m hmb     zz. Th  h  h  z 
 hm    h k hgh  zz  h  h   h . Th
k       m k g,  h k    h 
b h  h. Th k g  q  h m  m  h ,
b  h     : z  hm.
Inkjet Printer Maintenance and Cleaning
Th  q h g  kj   h m  h   
 h g   , h  :    bg h mvg
237
238
Mk M’ CmTIA A+ C 1 Cf P
   kj. Hv,  h  bg  h  z  h h  
-b k,  h k    g  g h  
kj .
Wh g  kj ,   h  h (hh m b    h 
k g), h k g,   jm  b m  jm,  h ’
b, hh  v x.
Th     kj  v gh h h m  h 
 . B g    kj , v h ’ m,
kg   , g,  hz. U h m b   g , h  h   :
1. Remove the ink cartridge. I m kj , h k g ( g) 
m    h mv g  bz  g b. G,  m, mv
h g   h m  h b,  h  ’ m mv
 h h   h . Wh h   ,  h  ,
mv h   m h  ,  mv h k g.
2. Clean the print head and cartridges. Wh h k g mv,  h hv
  h  h, h  h g     v h 
h k g . I h ,   h,   g
,    h         b  g 
 h  h  mv   k     g  h  h.
I h  h mvb  h,  m mv hm   hm  h
m . W h k    h k g  mv  x k.
3. Clean the ink cartridge caddy. U   b  mv  k   m h k
g .
4. Check the ribbon cables and ink reservoirs. Ik     m  h
g b     h . Ug   , b,  -b
bh, mv  k/ b m h  .
5. Clean the exterior. Ug  g     h h,   h x
 h ’ .
6. Reassemble and test. R- h k g   h,  ,  
 h . I vb,  h      h h   
mb. Y h  k h m  b h ’ gm.
EXAM TIP Be sure that you are familiar with the inkjet printer components described
in this section as well as the areas and procedures listed in the maintenance process.
DOMAIN 3.0 Objv 3.7
Thermal Printers
A thermal printer, k   kj , ’    k   h 
mg  . I , ’ h    x    h  h mg 
h h  . Th    hm , bh  hh   hm “
h”  h h   h   m,  hm    hm.
A hm  h h m : h hm  h/hg m,  
 mb h mv h mm  h  h,   h k h
mm  h  h  .
Thermal Print Head/Heating Element
A hm  h,  heating element, m  g  g h   mg
  mm. Th mg   h b mg  m   g  hm
hg  h mm. Thm g   hm   hh x, h,  mg
 “”   m    h-v hm  hm .
A thermal transfer printer   h   bb  h  x  
m  m h g   mm. Th m m  bb b h mm,
hh  mh  h m  v. Th mm bb h m  m,
 h mg bm b   .
Direct thermal printing, hh    thermal printing,  h   x, h,  mg   hm  hmhm , hh  , bv gh, thermal paper.
Thm    v v  hm  g  h-v
m  b   m b. Thm  g     v 
mg , g , T-h, ,  h h m. Fg 3.7-5
 h hm   .
Thermal Printer Feed Assembly
O  h m vg   hm   h ’ v q, hh  h 
h     mm  b, ,  h. T   q
, h  mhm  h hm  m  b q. Th  mb
  hm   bbz  h g h hm     
 h hm  h  hgh h  h.
Print head/heat element
Ribbon with wax/ink
Ink transferred
FIGURE 3.7-5
Paper/material
Thermal transfer printers heat the material on a ribbon to transfer it to a medium.
239
240
Mk M’ CmTIA A+ C 1 Cf P
Thermal Paper
Uk hm  g,  hm ’ vv hg h h h 
hm . (I h ,  bb, , k,  x m  hm 
h     hm .) A h hm   h  h, h 
  h hm    hm g   h h  m h h
 mg bg .
B    h hm  m v  h  gh,  hm g ’ b. Ev, h mg    h   k   
 h  bg x  h  gh   gh  m. Ahgh m -
hm   vb, h mj   hm g  mhm (h bk
 mb).
Thermal Printer Cleaning
Th g  h   h g  hm h :
1. A h  b , h    g  ,   h g
v h,     h , mv    m h  , 
 h   .
2. O m hm , h  h  hg m  h hgh
  h v   h  h, h bb,    b 
(g  h   hm ),    h   h .
3. L h v h  h  h  bb. Mv h bb  h  
x h  h.
4. Ug  v  h  h   - h m h
 h,  m     h  h, g gh 
  m  mv  b-  m h bb. L h  h  
h h    .
5. R h bb   h  h  h  h  v bk 
 k .
6. C   h  . R     mk  vhg  bk
h  h b.
Impact Printers
Th     : m  -m. S ,  h bjv ’v v
-m —h h ’ mk    h h  mm.
Th b  b  m   -m  h b bv—h
m,   h h  k. Wh m hm  m    g m , h    kj, m   v  , h  h
m- - m   .
DOMAIN 3.0 Objv 3.7
Im  vv m h m v—, ,  h k—
 hv b    h m   b  hm. Ov h ,
m   xm   hm  m  . Hv, h q,
,    -m    hv  hm  g .
EXAM TIP Know the components (print head, ribbon, and tractor feed devices)
and maintenance processes for impact printers.
Impact printer   g m   m    h  x  h
  b kg  m    h   k bb h   g
h         , h,  mb  h g. Exm  m
 (bh    h )  m (  m-mx) , bk , -h ,  ,  h .
Impact Print Heads
Th  h  m   h       .
A  m  h  h     m,    m
 h m  h  gh h   . Th m mm  h
 m        , h h  m b   kg ,
g   g v m.
Fg 3.7-6   xm    m  . I h xm, h
h  h h  ,  m   m,      E. I h
xm, x  m    m   h mg  h .
Th  h h  h k h h    h m  h h
 h x m  h gh. N h  h m m,   h   ,
  h x m  h gh,  h , m,  bm   k. Th
 h    h m  k  m h m  h h.
Th   h h   Fg 3.7-6  h  h  h k  
h h, - m b - m,   gh. Wh h xm 
   , h m  h m  24 .
A  m    hmm bk (     -h)   
h  mx  h  m . Lk h  mh,   m  h
v m   ,   gh, b   g  v m  ,  
 hz      h h  h  . Wh h  m
 h   h h bg ,   m  h k  h
h            m.
A h  h v   gh, h hmm   h   h h
 h   k. Th hmm bk  h  m  h  k g  
m     . Eh  h hmm  h  h’ hmm bk  h  
  b  g h     h hmm  k h bb  h
241
242
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.7-6
The print wires of an impact printer form a character with a series of columns.
b  bk   ,  . Fg 3.7-7   h  b 
 m  h. Eh  ( b mb)     g k g 
h hmm   h .
NOTE
A line impact printer is the faster of the two impact print methods.
1
2
3
4
5
6
7
8
9
10
FIGURE 3.7-7
A line impact printer creates characters one row at a time.
DOMAIN 3.0 Objv 3.7
FIGURE 3.7-8
Examples of impact draft mode (top) and near letter quality (NLQ) bottom
Th q  h   b  m  v . I  m
( Fg 3.7-8), h  b h     vb. N  q (NLQ)
m,  h  Fg 3.7-8,    b   g  h   b
 . T  NLQ ,  m    hgh   hmm ,
hh m h h   hmm   gh,   h    v
gh   h  h’ .
Impact Components
A m  h   m mvg  h -m ,     mj
 k     m. H  h mj m, m  hh
’v  :
•
Platen or tractor feed Th    m    bb-  h
  h    m   h h ,  h   
m,  h m   g h x     h h 
h. A        g k h  h   
  g    k h  - h k  h   h
k. Fg 3.7-9       m .
•
Print head A  ,  m   9, 18,  24  h 
h  b  z mhm   vg     v
m   h  gh.
Print ribbon Wh h  h    , h k  k bb
    h . Im bb     g h  
h . Rbb g  h  h    ,  h 
 h bb h  , ’ m   h g. Sm g  m
   bb, b h  xm .
•
FIGURE 3.7-9
An illustration of a tractor feed unit on an impact printer printing a continuous form
243
244
Mk M’ CmTIA A+ C 1 Cf P
FIGURE 3.7-10
An example of an impact printer cartridge ribbon
Impact Maintenance
F h A+ C 1 xm, h    k b mg  m  b
 h m,  :
•
•
•
Replacing the ribbon M m    g bb, k h 
h  Fg 3.7-10. A bb m  v    m : 
v h k   h g h k b  ,   b h 
h’ , hh  hm m m mg.
Replacing the paper P jm  b  bm  m , 
h  m m  bg -. B h  , v h  
g  h m   m  h().
Replacing the print head O v mm  h hv  m 
 mg  h  h’ , hh  bm b  bk. Th 
 h   mg    h. Th  x    h
 h.
3-D Printers
Additive manufacturing, hh  h gg m  h-m (3-D) g,
 h    bj b g g . Th 3-D g   
v   hh    v    v  .
A 3-D  k v m   kj , h m    h bj
 mh h m   kj  k   g. Hv,   k,  3-D 
“”   m hm     hm gh h hv  UV
gh. Fg 3.7-11 h  3-D  g   m    bj.
DOMAIN 3.0 Objv 3.7
FIGURE 3.7-11
A 3-D printer (image courtesy of LiteWorld, LLC)
3-D Printing Filaments
A 3-D  ’ k    m m  k  k v. I,
    m    h , hh h m   h m.
“P”  3-D g  b  thermoplastic material, hh m h   m h
h   h . Th      3-D   
b  (ABS),   (PLA), ,  b  , h hh g (PETG). ABS  h m   mk LEGO bk, PLA  mm  
mk m b ,  PETG  h m   mk jg. Th hm m
m  ,    h hg m   3-D ,  h   hgh
 zz (  extruder)  h bj bg .
3-D Printer Bed
A bj  b  h  b  h . P b m  m  m   
 h  . I , h    m  m h b h  h
 b. Th   h  b, h h bg h h bj ,   v
245
246
Mk M’ CmTIA A+ C 1 Cf P
 hv   h   ( h h  ’ k  h x)  
v h hg  g  h bj  h . M  b  h g 
mm,  m  h.
EXAM TIP For the A+ Core 1 exam, understand how 3-D printers convert filaments
and resins into objects on their print beds.
REVIEW
Objective 3.7: Given a scenario, install and replace printer consumables
•
•
•
•
•
•
•
•
•
•
•
•
•
P  h,  hg, k bb,   m   h
 mg   mm.
A      hg m       x 
mg  .
Th  mgg  h v h: g, hgg, xg,
vg, g, g,  g.
Th mj m      h mgg m,  mb, 
b,  , k ,  ,  xg mb.
Ikj   x  mg g   k    g.
A hm   hm    hm.
A m        m  h.
A  m  h  h     m.
A  m  h m h  gh b g      .
Th  m mm m  h hv h 9  24 .
Th mj m   m        mhm,
h  h,    bb.
A 3-D    v mg     bj b g
v   hm m    v  m.
Cbg    h h x  mg   gb  
gm ,   , h     ’ v.
3.7 QUESTIONS
1. Whh   h g     h v h  h  mgg ?
A. Chgg
B. Fg
C. Cg
D. Cg
DOMAIN 3.0 Objv 3.7
2. Whh  h g  h g g     ?
(Ch  h .)
A.
B.
C.
D.
E.
F.
Mg
C
Og
Bk
Y
G
3. Th  h hg  b kj    h   mm 
hh  h g? (Ch .)
A. Pz
B. Thm
C. Ph-v
D. Im
4. H  h    m  hm . Wh  h m h  
h h    hm g?
A. D bm
B. Wx  
C. Thm 
D. Ikj
5. Wh  h m  h   gg h x, gh,     ?
A. L 
B. Ex
C. Cbg
D. Dxg
3.7 ANSWERS
1. D Ahgh   b  m  h  ,       h
 mgg .
2. A B D E
Th m g g  , mg, ,  bk (CMYK).
3. A B Th  hg vz h k h  hgh h zz 
 h .
4. B
D hm   h    mg    hm .
5. C
Cbg     h  .
247
This page intentionally left blank
Virtualization and
Cloud Computing
M A
I
4.0
Domain Objectives
• 4.1 Summarize cloud-computing concepts.
• 4.2 Summarize aspects of client-side virtualization.
249
N
D
O
250
Mk My’ CoTIA A+ Co 1 Cfo Po
Objective 4.1
Summarize cloud-computing concepts
C
ou oug h bo o, o o og v  - ov o g bu . I h o, you  bou h  y o
ou v  how o hoo h o o ou o o h wok you 
o ogzo  o o.
Common Cloud Models
I w’ h vy og go h h “ou” w’ uh o h  w y -og
v, uh  ODv, Dobox,  Goog Dv. Toy, h ou o vuy y
v u   qu o uu  o. Th ou o 
v y o o- oug ou  v o ov uh  Azo,
Moo, Goog, Cbo, IBM,  y oh,  o h o I.
Cloud Deployment Models
Th ou  ouy  hyy  u o y o ovg o. So o  o how h ou   o ov,  oh   by h y o v
o o o. Th o  gou o wo g go: oy o
 v o. Fo h A+ Co 1 x, you  o kow wh h o h vou
o   u h v  ov.
L’  wh h oy o. I  ,  ou oy o 
who h  o h ou   ouo. Th A+ Co 1 objv ou o ou y ou oy o: ub, v, ouy,  hyb.
Public Cloud
O h o, ub I, o y v yo who    u h
ou vb   h public cloud. Wh w k bou h ou  g , w
 o ky g o h ub ou. Th ou vb  h ub ou 
ow by h ov  o o h ub, whou o, o, o uhozo. Sh g,  ,  oo   o  x o ub ou.
Private Cloud
A private cloud, whh  o  o   internal cloud,  h oo o  ub ou.
Wh h ub ou  o o ,  v ou  o o h ub  o o oy
h b o   gou. Th gou  yy  oy, hoo, o o o
ogzo, o oh y o bh gou o ogzo. Pv ou o 
oo, uy,  zo, whh  yy    ub ou.
DOMAIN 4.0 Objv 4.1
Community Cloud
A ouy  b  u o h u   o  hoo , z o 
go, h b o  xuv ogzo, h bu   hb o o,
ooo  h  uy,  h k. A community cloud   o o  v ou,
 o by  ouy, h ow  b o h oo  ou. A ouy ou  b k o  ouy bu bo o ou.
Hybrid Cloud
A hyb yhg   u o , uuy h b , o  . A hyb
ou   ogoo o uu, ,  o o ub  v ou ( ouy ou  y  hyb ou o bg wh). A hybrid cloud   u o g
ou o ub ou, v ou,  o ou o   uo vo.
EXAM TIP You need to understand who can access each type of cloud deployment
model and who controls them.
Cloud Service Models
Wh h ou w   by h No Iu o S  Thoogy (NIST)
 2011,  h h v vy o: Iuu   Sv (IS), Sow  
Sv (SS),  Po   Sv (PS). S h, h h b  xoo o
“S” v , h wh  ow o h h .
EXAM TIP You need to know the common cloud model acronyms—IaaS, SaaS,
and PaaS—and associated delivery models for the CompTIA A+ 220-1101 exam.
Infrastructure as a Service
Poou  “y---,” IaaS   ou v h ov v ubb wh 
obo o vuzo, oo g  o  ow,  h by
o o o k  . Cloud service providers (CSPs) b yo o vu o g uo ooo o uh w vu v ug  gv og
y (OS), o ,  vy ow o. CSP ov xb vuz vo
h  b o vg ou, ox wb o, vo vo,
 uoz oo, ug u  og, b v, hg, 
hog,  o,  b by ug. IS  ubb o gg hw 
og vo.
251
252
Mk My’ CoTIA A+ Co 1 Cfo Po
Software as a Service
SaaS, whh  oou  “,”  h g  o ow o o o 
ou-b vy o o h g ub by vo  ov. A o SS
og  b  (wh go), ubb o v  -b g, ubb
o o  y--you-go b, o u   o  bh kg. Th b o h
u o ubb  h h ov h h oby o g  ug 
SS og, og wh uyg hw, o,   oo, hu vg
h u o h ob.
Ex o SS o ow  o u wo og, o,
h, -, owhg,  uo/vo og. SS og  vb ywh h   I oo. Howv, o o h jo o o ug
SS o  h you y  o gv u oo o you  o h SS ov 
u   uy.
Platform as a Service
PaaS, oou  “,”   ou v o h ov ubb wh  o
 uoz bu o hw  ow ou ov h I. O o h o
oo u o PS v  o ow vo  g. A PS vo
 gv ow vo h oo  o vog, oyg, g, 
g o  oh ow ou.
Th PS CSP ou  uu, whh ou b  IS,  bu  platform.
Th o  v b  o oy  g y. A PS ubo v h u quo   o  w  h o   o u,
oguo,   (ooy  h x o xby).
Cloud Characteristics
Cou oug   y wy  o h -hg  o h y y o
oug. T-hg ow o o “”  o  z ou 
o vo h x o uhg oug qu, whh  h  w y
. I y wy, h ou   oy o “” v o  v
ov ov h I, h h ov -u   bo,  o hv o bg 
o h qu hw  ow,  o, -hou. Th oowg o ov
o o o o h u  h o ou oug.
Shared Resources
O o h b o ou oug  how  h h o o shared resources. A
wok u h ou, uh  og  v o o h  LAN.
Wh ou oug, h  oh ou   o h I.
DOMAIN 4.0 Objv 4.1
Wh you o h v  oy uu CSP y hv oz,  o hu o hou, o ubb o  v, ovg  o  ou u b o
 h b. Dg o h v o o, hw, ow,  og, 
oh v u b vg o ov h o h v ubb wh h ou
    h v v g (SLA). To oh h, h CSP u
  vuz vo.
Sy, wok,  og vuzo    o ou hg 
ou oug. O h ubb , h CSP’ vuz vo  ,
 h vu o oo ubb o   “”  h ov  o
h ou qu o h .
Metered Utilization
A metered utilization o   u vy ho h o CSP u o k h
v o  ubb o  ou v. Th  how h ou o ou ug,
 o u o u,  ov h CSP wh  b o oog, oog,
hog (g), g, , o ou, bg h ubb o h ug.
Th v g bw h CSP  h ubb  h   u o h
vou u o  (u),   ou (MB o GB), by (v
v),  og  (MB/GB),  oh ou   u. Fo x, hou  oy  x v ug h wok wk oy,   ubb o h
u o IS v  y o h , y, o     u. Th oy
vo uhg hy v h y   y 30  o h . M
uzo v  o kow  u v o “y--u” v.
Rou oo  bg  h wo y o CSP u metering. Mg u  ubb’ u o h ou, uh  bwh o  og,  hy 
ou. Th u   h b u o y, uzo, g o hog,  bg.
Scaling  h xo o uo o h ug hho o ou o  ubb
v b o , ug, o o v. Fo x,   ubb  oy
 o ov h ubb k og , hy  g o g h k og  o
 w hgh v. Th  o ou o y hou h ubb  o u
h ou qu. Sby o ou  o b  by o - v
h   o h y.
Throttling ’ xy h oo o g, bu  g  o o b  xo, h hog   oo. Howv, hog  b o  g-o u h
 ou   ug. A ubb’ u ug  u g h hog u, whh yy  h u  o  ou’ ug. Thog  oy
u o v u u o  ou h   o  hgh .
Billing  b o h u uzo o ou by  ubb. Th  ug
  u o g h bg, whh  ooy ohy.
253
254
Mk My’ CoTIA A+ Co 1 Cfo Po
Elasticity/Scalability
O o h o ough- h o h ou  xby, whh  x 
elasticity  h A+ Co 1 objv  scalability  y v o. Exg
h b o  -hou y  k o  h  uuy vb  o o
h  hou. A ou v uh  IS o PS  ov ubb wh h by
o xg ou  hy bo qu. Th y  b ou, wh
h ubb uw o h hg, o h ubb  b o o ov bo
h v   . Fxby ov h ubb wh h by o g
ou ou  v on demand, whh ow h ubb o  u o ow
y o g k o u  ou . Th  kow  rapid elasticity.
EXAM TIP Rapid elasticity allows a customer to use more, or fewer, cloud
resources, as needed. On demand means that a customer can access cloud resources
24/7, as needed.
High Availability
So o  ogzo u hv  o h   y  (o vy
y )  , 24/7  365. Eug h by  b xy xv
og h qu  o qu. Subbg o  ou v h o h v o uo,  high availability, vov g boh h oby
 u o  CSP.
D o  h ou, g o  bg  y ou o v o o 
 bku,     h u   gy  b y vb wh
. Th v  uy u o  CSP og  og u ov o h
hgh vby, oy,  gy o  ubb.
Hgh vby   ub  h   by h  o  SLA bw h
CSP  h ubb. Suo h ubb    o b y vb oy
 hou  y, uh  7 a.m. o 10 p.m., Moy hough Fy, bu o  h
99.9  o h  ug ho hou. Th, h,  h hgh vby qu by h
ubb. A o hog wb h uo - og ou h ok,
v y  wk  52 wk  y, ou qu h  g o hgh vby
(99.9 ), whh u   uh hgh o o h CSP. I og h
wo x, w   h h o qu  o o h CSP h, ug
h o hou, h SS  h ubb’  o b uvb o y o
h o u  y o. I h o x, h CSP o o ug h 
v o b uvb o h 8.78 u  y. Tb 4.1-1 ov h u
 o ow  h “v-” h o hgh vby o.
DOMAIN 4.0 Objv 4.1
TABLE 4.1-1
Downtime Limits by Time Period in the Five-Nines Schedule
Downtime Limit
Availability
Year
Month
Week
Day
99.0% (wo )
99.9% (h )
99.99% (ou )
99.999% (v )
87.6 hou
8.7 hou
52.6 u
5.3 u
7.3 hou
43.8 u
4.4 u
26.3 o
1.7 hou
10.1 u
1.0 u
6.0 o
14.4 u
1.44 u
8.6 o
< 1 o
EXAM TIP You don’t need to memorize the information in Table 4.1-1. It’s
provided only as an illustration for high availability. However, the five-nines approach
is commonly used to define availability terms in SLAs.
File Synchronization
File synchronization  uy  o o  bku, wh    o obj   o o o o  og . F yhozo  o ju kg 
oy oy  h ’ g o k o o   obj oo, g o h oo. A bku oy o     ho k   o  . U 
bku   by   ho o h  ,   h . A yhoz 
 o o  ou, g h y hg  o h ou   uoy  (o ) o h yhoz   w. Bku   oy o o
  u o v   o   u oo. A  o yhoz
  b o o h  v o v o  y o og  o h 
v, h o  wok, o v  h ou. Tyy, hough, yhoz  
o o  v  uuy  .
A  o yhoz  y hv o o  ko PC,  ob PC,   ho,  h oh v  w. O h v, h  y b o  h k,
 USB v,  o h Uv Fh Sog (UFS) o   ho. I  oo 
 o y o o  ’ o,   yhozo o o v w oow  u  g o y h oo o  oh vo o h , g
o o whh v h hg w   o whh v h yhoz  o
 o. Th oguo  g o h  yhozo ow  
o: o x, o  o  u o y hg; o o  u oy
oy;  yhoz o  h oy—u  vy o oh yhozo o.
255
256
Mk My’ CoTIA A+ Co 1 Cfo Po
F yhozo  b  o-wy o wo-wy o. One-way synchronization 
o  o  mirroring ( RAID). Wh  hg   o  b oy o  , o o h v    o g oo  og. Oy hg o h b
  o. Two-way synchronization, whh  uy wh  yhozo ,
 y oo o  o o  , o by oyg h   o  h
yhoz o.
Desktop Virtualization
Virtualization,  h ox o oug,   o h u hw 
h x oy  o o h vuzo ow. Ahough vu, h u
hw  b o uo    w  u v. Vu v  b ou,
wok , wokg v,  y oh, ug wh you’ ky 
o h A+ Co 1 x: vu ko.
Virtual desktops    o o wo o: ho ko uu (HDI) 
 vuzo o vu ko uu (VDI). Th hosted desktop o 
vuz h  ko  y o hy hw, o wh  
“b .” C vuzo, o VDI,   ko vo o h ,
o  o woko o  o wok, o  h ou.
Desktop virtualization  (  y , o) u u u ko,  ug o  g ou. Th host v, h ou o whh h vuzo ow (  hypervisor)  ug, ou b  hy ou   ogzo o  vu ou  h ou. Mo o h vuzo y  persistent
vu ko, whh  h h y v h  vu ko’ vo
o h  u  o   h    o ou xy  h o wh 
w o. A nonpersistent vu ko o b v   oy w h 
’ .
Vuzo y uo h y o ko vuzo:
•
•
•
Virtual desktop infrastructure (VDI) I h y o ko vuzo, h
hyvo  vu h (VM), h wh  ow ko g, o  
 o ou v. U  h vu ko oy o o v.
VDI    VM h   ow uqu og vo.
Remote desktop services (RDS) Ug RDS, u    o ko h
h hw ou  w  y  o ow.
Desktop as a Service (DaaS) DS (oou  “”)  vy uh k VDI,
wh h jo xo h h u’ ogzo o’ uy h hw o
ow o whh h vu ko  g, oy h o v u o
 h DS v  h ou.
DOMAIN 4.0 Objv 4.1
REVIEW
Objective 4.1: Summarize cloud-computing concepts
•
•
•
•
•
•
•
•
•
•
•
Th jo y o ou v  Iuu   Sv (IS), Sow  
Sv (SS),  Po   Sv (PS).
Th ub ou ov ou v o yo.
A v ou   o uhoz  u.
A ouy ou   v ou wh   o   gou o
ogzo o vu.
A hyb ou b u o ub  v ou ou.
Rou uh  VM, ou og,  oh  b h v LAN (y)
o ou oug (xy).
M uzo k oug ou ug v u o bwh,
, /o y o bg  y uo.
Th by o  o o ou v   (o- -v) b
ogzo o hv  y.
Pou ou-b v u -,  og,   yhozo.
Vu ko uu (VDI)   vu vo h  b
 oy o o h ou   o, , o w  o
o ko g.
F yhozo  u o k u o o   o obj  y,
ooy o v v.
4.1 QUESTIONS
1. Coy A u v SS ou uh  G  Goog Do, og wh
 uoz v ou o  oy . Whh o h oowg b
b Coy A’ ou oug gy?
A. Pub ou
B. Hyb ou
C. Couy ou
D. VMM
2. Coy B o  ou-h-ok -  oo h uo boh
ho  o o. Wh  o  , h voy  u 
  o vo ov. Wh  o h oy’ SLA wh  CSP ov
h qu o h  o  oo?
A. Bwh
B. Bku  hv
C. Hgh vby
D. M uzo
257
258
Mk My’ CoTIA A+ Co 1 Cfo Po
3. You oy  gog o u ou v o vo ow,  h ow w
h b vb   ou v. Whh g uy  wh v
w b u,  h o o?
A.
B.
C.
D.
IS, PS
PS, SS
SS, IS
SS, PS
4. Wh  h  o h by o  ou v o x o o  ou,
 qu, o v  ubb’ ?
A. DS
B. Syhozo
C. R y
D. M uzo
5. You oy   o u ou o uo o- wg 
ou qu bu w o y oy o h ou uy u. Wh
v g  you oy ookg o?
A. VDI
B. IS
C. Hyb ou
D. M uzo
4.1 ANSWERS
1. B A hyb ou ob ub ou ( h , SS)  v ou
ouo.
2. C
Hgh vby     o Coy B’ oo.
3. B Po   Sv (PS)  h u o  o ou-b ow
vo vo. Sow   Sv (SS) k h ow vb
o u v h ou.
4. C R y   ou vo  h by o  o 
o ou,  , o   ubb’ og o og
qu.
5. D M uzo ov u  o ou o  y-o-whyou-u b.
DOMAIN 4.0 Objv 4.2
Objective 4.2
Summarize aspects of client-side
virtualization
V
irtualization b  g hy ho ou ug z ow o
 vu h (v   ), o kow  guests, whh 
oh ou, h wh  ow og y, g, ,  . C-
vuzo  o ug  vu h (VM) o you o y ( o o
VM u wh) g o whh h VM   gh b o oy o o
  v  v h wok. Th ow u o   g VM 
kow   hypervisor.
Purpose of Virtual Machines
I you ’  wh vuzo, h      o  . Why wou
you  o u  OS   OS? H   w o h bgg b:
•
•
•
Gog vu b o o ob u v oo w h
h  o oug. Th o ou vg o hw uh,
y u,  h  u o oug.
Bu  VM  oy  g  o wo,  hk y  y b  wh
 ho ( bku) k o h oy wokg VM. Th  y uu o
gg  v bk u quky. Lkw, h   ub k 
y o u  VM.
Th by o u y og y o  g hy h k
uo g  h   h h wh o u.
Sandboxing
Sandboxing   vuzo o  whh  wy vo o  uou og 
b xu    o   o  vuz ou. Th og ug  h box
h h ou   o oy u h ’ ug   ouo vo
whou y o h k h gh .
Aoh vu o h   xo o  box  h container. Sbox 
  y h  z  wh h  ou, whh  o o h
wh’ uy  o  uo. A o   box h   o  k.
Aoh, h  kow,  bou box  h  vu h  y
 box, whh  ohg you hou kow.
259
260
Mk My’ CoTIA A+ Co 1 Cfo Po
EXAM TIP You should know about sandboxes, containers, and VMs for the
A+ Core 1 exam.
Test-Driven Development
Test-driven development (o test development)    o vo (RAD) hqu ooy o o  VM, whh   y  vo o h vo  g o . I  vo,  bok o ogg   g
 vo h u h ob o b ov o  objv o b hv. Th
ho vo o h  vo o go ohg k h:   , w 
og,  h og,  h ogg,  h .
Application Virtualization
Application virtualization    h b o o h jo uo  u o vuzo  g. Ao vuzo b h o o  h wok
 ug   o vo o  VM. Th vu vo hog h
vu o ou b  o o o hy o vu v. Ao vuzo  b o ovo y vo o o  o h.
Vu o  oz o u  vu ko vo o  o
h o  h ou. A vu o uy u o  v bu  o b ug o h VM. Aoh o o o vuzo  application streaming. I h
ho, oy oo o  o,  o, oguo,    v o h
VM  h oy wh hy  .
Ao vuzo g   h u o vuz o. Fo
x, h Moo Ao Vuzo (A-V) o Wow ou g
h vy o vu o o u vo. Th vu o  o
o  v  v    ug h - ho b . O
h vu ko,  u  h vu o  h  wy   oy 
o.
NOTE Other available virtual application managers include Citrix Virtual Apps,
Parallels Remote Application Server, and the Microsoft Azure Virtual Desktop.
My o  ogzo g o o, “gy” ow (o ky wh h
 h  ’  wokg, h’ o o o  ),  h  h h hw  ow vo o whh  w ogy vo o u y o og
b vb. Cross-platform virtualization, whh   ow-b y uo, ow
h y o u o  vu h ogu o ov h qu vo.
DOMAIN 4.0 Objv 4.2
Vuzo ov h by o gy og y  o o ou o b u u w ow  b vo o h o  bough u o .
EXAM TIP For the A+ Core 1 exam, know and understand the purpose and use
of VMs and their relationships with virtual apps, including sandboxes, application and
test development, and VDI.
Resource Requirements
Th  vo o Wow, Lux,  OS w uo  hyvo o  vu
h g (VMM). Howv,  hyvo o VMM u b o  ou wh
hw vuzo uo. I you ou’ CPU  BIOS UEFI u hw
vuzo,   b b o b  h y u uy ( Fgu 4.2-1).
Cross-Reference
Hardware virtualization is also covered in Domain 3.0, Objective 3.4.
NOTE AMD and Intel include hardware virtualization to provide better performance
when the CPU is supporting multiple VMs and operating systems. AMD’s hardware
virtualization features are Secure Virtual Machine (SVM) mode and AMD-V. Intel
provides VT-x and Intel VT-d. VT-d is separate from VT-x and provides directed I/O (input/
output) virtualization for better performance.
I o o hw vuzo, wo oh hw qu o 
vuzo uo  RAM  og . Eh VM qu ju  uh RAM 
h hy h ’ ug. Ev hough h RAM g o  VM  o 
, h ho h y  u RAM  o u h hyvo ,  o
, h ho og y  h oh ow. Ju how uh RAM   
o yy qu  b o h.
A VM  o k u  o o og . A VM’   ou  ob
ou o og  bu hy u vyhg  o h VM, whh 
FIGURE 4.2-1
UEFI firmware settings for CPU virtualization support on AMD (top) and Intel
(bottom) CPUs
261
262
Mk My’ CoTIA A+ Co 1 Cfo Po
ou o ywh o  w gby o  uh  oz o ggby. O uo  b u o h you u h  qu o ogug  VM   vy
o hyvo o VMM.
ADDITIONAL RESOURCES
One virtualization calculator you could use is
the “Virtualization Calculator” provided by WintelGuy.com at https://wintelguy.com/
vmcalc.pl.
Emulator Requirements
I h vuz wo, o hw  u  o  vuz. O uo
 vuzo  ou  hough o b h  hg. Ahough hy hv y
, uo  vuzo hv o   how hy o.
Wh  y  h o o oh,   ug h y. Fo x,
uo you hv  o g uh  Duke Nukem h you’ k o y g. Wow 11
wo’ u h ow, bu you    OS uo, k OWok.o, h u 
Wow 95 vo hough you bow o you  y h g. You y  
Wow 11, bu you’ ug  bow h  ug  uo o  wb o.
Euo  o by ow ug o  v vo h  oh
vo. Th   by h vuzo u  o h b y wh uo u o h b y.
Hyvo u hw o ow  gu OS o b b o   u h hw
v vb o  ho y. Ohw, h hyvo wou  o u  v
v o y   v  gu OS uo. Eug  g vo o  v
v ow h gu og y  y o  u o u h vu hw. Th y o hw bg u  yy ho h  wy uo 
ho o whh h gu OS u  v.
I h uo o by  hyvo, h o gv o h vu ko
hw v  ov o h o o u by h hy v.
EXAM TIP Understand that emulating another platform (using a laptop to
run Sony PlayStation 5 games, for example) requires hardware several times more
powerful than the platform being emulated.
Security Requirements
A vu h hou b k  u   hy ou. A , wh wok
 I oo  o o y VM,   b u (o u)  h
 wy   hy ou. D u wh  v o  hou b 
u o  VM h w b u by u u. Sog wo hou b .
DOMAIN 4.0 Objv 4.2
Avu  -w  hou b oy  k u. OS u hou
b o  .
EXAM TIP Virtualized operating systems use the same security features as real
ones. You still need to keep track of user names, passwords, permissions, and so on,
just like on a normal system.
Network Requirements
Th  wy o wok  ou h w b hog o o o VM  wh h  w Eh uo. I you w  w oo, you ou u  w NIC
h u  PCI o. Ug  USB wok   o o bu o h 
uo h USB v hv o o VM ow.
Hypervisor
A hypervisor, o kow   virtual machine manager (VMM), , u,  g
VM. Th  wo y o hyvo: Ty 1  Ty 2.
EXAM TIP Be sure to know the differences between Type 1 and Type 2
hypervisors.
A Ty 1 hyvo uh  Hy-V, VMw ESX, o Cx Hyvo (oy
kow  Cx XSv) u y o ou hw   o   og y. A Ty 1 hyvo  o kow   “b-” hyvo bu h’ o
oh ow bw   h hw. VM ug v og y  u
o Ty 1 hyvo.
A Ty 2 hyvo uh  O VM VuBox o VMw Woko  u o 
 og y (Lux, Wow, o OS). Thu, Ty 2 hyvo hv 
o y o ow o o Ty 1 hyvo ( Fgu 4.2-2 o  x).
Mo y o - vuzo u Ty 2 hyvo.
NOTE Although you install Hyper-V after installing Windows Server or enable it
after installing a Windows 10 or Windows 11 edition that includes it, it is considered a
Type 1 hypervisor. Here’s why: after Hyper-V is installed/enabled, it turns the Windows
edition that was installed first into a VM running under Hyper-V, and additional VMs
can be created. To learn more about the differences between Hyper-V running on
Windows versus Hyper-V running on Windows Server, see https://docs.microsoft.com
and search for “Hyper-V.”
263
264
Mk My’ CoTIA A+ Co 1 Cfo Po
App
OS App
App
Type 1 hypervisor
VMM
(hypervisor)
App
OS App
App
App
OS App
App
App
OS App
App
Type 2 hypervisor
OS
FIGURE 4.2-2
VMM
(hypervisor)
App
OS App
App
App
OS App
App
Type 1 hypervisor (top) compared to Type 2 hypervisor (bottom)
Installing a Hypervisor and Creating
a Virtual Machine
Ig  h-y hyvo  k g y oh ow—owo  xu h hyvo ow  oow  u wz. O  Wow y h u
Hy-V, you  b   h Wow Fu og box ( Fgu 4.2-3), whh you
h v Coo P | Pog  Fu  | Tu Wow Fu O o O.
A bg Hy-V, boo h y.
A you’v  you hyvo o ho, you’ hv  vu h g
h   h y  o , , o, v,   gu vu h. O
y uh y VMM, you   w VM by kg Nw | Vu Mh  og h wz h o ( Fgu 4.2-4). Mo hyvo hv  o u you
gu OS h h vu hw  .
Installing the Guest Operating System
O you’v  h w gu VM, ’  o   gu og y. Wou you
k o u Moo Wow  you vu h? No ob, bu kow h Wow
( y oh  ow you ) qu  v .
I you o’ y hv o , o VMM  ju  y ISO  (uh
 h o you’ u o k you ow o )  h vu h’ o
v. I h VMM ogz you o  ( Fgu 4.2-5),  y ogu h
vu hw g (ou o RAM, vu h v z,  o o) uoy;
ohw, you  o  b vu o h (you   hg h  h VM 
). Nx,  h z o h vu v ( Fgu 4.2-6).
DOMAIN 4.0 Objv 4.2
FIGURE 4.2-3
Enabling Hyper-V in Windows
FIGURE 4.2-4
Creating a new VM in Oracle VirtualBox
265
266
Mk My’ CoTIA A+ Co 1 Cfo Po
FIGURE 4.2-5
Installer recognizing selected installation media
FIGURE 4.2-6
Setting the virtual drive size
DOMAIN 4.0 Objv 4.2
EXAM TIP After you have set up a VM, installing an operating system into it is
just like installing an OS on a normal computer.
You’ o b o o  h VM   wh o o   . I you
 o , you’ o hv o  o bu wh h OS . A
oguo  o, you  o, , u, o  h VM,  o ov
vu hw, o ju  wh h OS  oh ow  .
NOTE Use descriptive names for virtual machines, such as “64-Win10-Mark.” This
will save you a lot of confusion when you have multiple VMs on a single host.
Ug  VM  o xy k ug   y, x ’ o   wow
 o hoky . VMw Woko, o x,  ctrl-alt-delete wh
ctrl-alt-insert by u (o you   u ctrl-alt-delete o you ko). Th,
 you   you virtual desktop o hgg  whou   o h o:  goo
hyvo    ov vu h v, vu wok , vu RAM,  o
o. K   h USB v uo v bw hyvo  y qu 
g o hv  uo o USB 3.0   vo.
REVIEW
Objective 4.2: Summarize aspects of client-side virtualization
•
•
•
•
•
•
•
•
Vuzo b o o u w v o o k, ov o
 bku,  b uo g o  g ou.
Vu h (VM)  ov o box  vo  g
vo.
I  AMD oo uo hw vuzo wh VT-x  AMD-v,
whh  b o b  BIOS/UEFI u.
Vuzo qu u RAM  k  o h VM  w  o h
ho OS o hyvo.
Hyvo u  w g o hw whou  v.
VM qu xy h  v o uy (wo, u,  o o)  h
hy ou hy .
Ao vuzo ov uo o gy o  o-o
ob.
Ty 1 hyvo (.k.. b- hyvo)   y o h hw
  yy u o VM  ouo o.
267
268
Mk My’ CoTIA A+ Co 1 Cfo Po
•
•
Ty 2 hyvo   o  og y   yy u o
xg  uo uo.
Hy-V   Ty 1 hyvo vb o Wow 10   h  b
hough h Tu Wow Fu O o O oo  h Pog  Fu
Coo P .
4.2 QUESTIONS
1. Wh  h  o  vu h (VM) vo u o  ou w og
  o  wy o  v  ou?
A. Ty 1 vuzo
B. Sbox
C. VMM
D. Ty 2 vuzo
2. Whh o h oowg   u?
A. A vu h   ou h  w o o h hy ou o
whh h vu h  ug.
B. Vu h ov h by o ug u h ,
h wh  ow og y.
C. Th ow o vu h hoog  h hvg ou y
  h  o v o ovh.
D. A  B.
E. A o h bov.
3. Coy D h  u vuzo o v -o I  AMD y
ug hgh-o oo ug h o g  h
hyvo o h VM, bu h VM  ug vy owy. Whh o h oowg
 h o ky u?
A. Hw vuzo uo  o b  h UEFI w.
B. VM  ug oo uh RAM.
C. Hw vuzo uo  o b  h OS.
D. VM  ug oo uh k .
4. Cuo E  ug Wow 10 Po  w o   Lux-b VM 
Hy-V. Whh o h oowg u h uo o o h o wok? (Choo wo.)
A. Tu o Hy-V  Wow Fu.
B. Ru Wow U.
C. S h ho y o vu.
D. R h y.
DOMAIN 4.0 Objv 4.2
5. Wh og y  b    VM gu OS?
A. Wow 10
B.
C.
D.
E.
Lux o
Wow 11
OS
A o h bov
4.2 ANSWERS
1. D Ty 2 vuzo u wh   og y  y
qu o h hw o h ho og y, wh Ty 1 vuzo
y  wh h ou’ hw.
2. E A VM  gg o h hy ou,  b o o y 
ug o  hy ou wh  ow OS,   g o
oo ovh.
3. A Hgh- I  AMD oo hv uo o hw vuzo.
Howv,    o b  h w, vuzo wou u vy owy.
4. A D Fo h o wok, hw vuzo uo u  b b  h
UEFI/BIOS. So, Hy-V  o b u o  Wow Fu. Fy,
bg Hy-V qu h y o b .
5. E
Ay o h OS  b    VM.
269
This page intentionally left blank
M A
I
5.0
Hardware and
Network Troubleshooting
Domain Objectives
• 5.1 Given a scenario, apply the best practice methodology to resolve problems.
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPU, and power.
• 5.3 Given a scenario, troubleshoot and diagnose problems with storage drives
and RAID arrays.
• 5.4 Given a scenario, troubleshoot video, projector, and display issues.
• 5.5 Given a scenario, troubleshoot common issues with mobile devices.
• 5.6 Given a scenario, troubleshoot and resolve printer issues.
• 5.7 Given a scenario, troubleshoot problems with wired and wireless networks.
271
N
D
O
272
M My’ CTIA A+ C 1 C P
Objective 5.1
Given a scenario, apply the best practice
methodology to resolve problems.
T
h CTIA best practice methodology,  w  h troubleshooting methodology,
v y wh   y    y, v,   y hgy
b.
A y y h hgy  y y--y w (     h
CTIA A+ 220-1101 x), b  wy   , ,
  b g hg.
The CompTIA Troubleshooting Methodology
Th hgy h x ,  hw  h wg b. N h h 
 h b    h  CTIA bjv wh  w  
 w.
Step #
Description
Details, Tips, and Notes
1
Iy h b.
•
•
Gh   h , y 
hg, ,  b,  b
b g hg.
Iq gg v 
 hg.
C, h,  v  
 by (hw, w,  w),
    b .
C  vw    
wh y    b.
2
Ebh  hy  bb
 (q h bv).
•
I y,  x  
h b  y.
Ch v  h-y wb  ,
y  h ,  
h  .
C    b , g wh h
  vg  h  bv.
DOMAIN 5.0 Objv 5.1
Step #
Description
Details, Tips, and Notes
3
T h hy 
 .
•
•
O h hy  ,  h
x   v b.
I hy   , bh  w
hy  .
Chg       h  h v.
I h v  ’ w,    
v g  hg h  h  
h    .
I y   wg  by 
,   y v   
h x-v h  w-.
4
Ebh    
 v h b 
 h .
5
Vy  y y
,  b, 
vv .
6
D h g,
,  .
•
R  h v’   g
Th  h  h  y. Y
gh    h  wg  . R  h v’
  g.
Mg  h y w  h 
   , b h    
. Pvv  h gz
 g  v b y.
Rg y, ,   h
z  b   b,
h w h wh  h  ,
 h  h bhg hy  
v.
EXAM TIP It is likely you will encounter exam questions directly related to the
best practice troubleshooting methodology. Know it well!
REVIEW
Objective 5.1: Given a scenario, apply the best practice methodology to resolve
problems U h x- CTIA b  hgy  bh 
v hgy b:
1. Iy h b.
2. Ebh  hy  bb  (q h bv).
273
274
M My’ CTIA A+ C 1 C P
3. T h hy   .
4. Ebh      v h b   h .
5. Vy  y y ,  b,  vv .
6. D h g, ,  .
5.1 QUESTIONS
1. A y bh    , wh h y  x?
A. T h hy.
B. Vy  y y.
C. D g.
D. Ebh  hy  bb .
2. Wh h y q h bv?
A.
B.
C.
D.
Wh yg h b
Wh g g
Wh g h hy
Wh bhg  hy
3. Dg h   bhg   b, y   
h  h  v , hw y  h,  hw y  h
  h y vv. Whh  h wg   y ?
A. Dg g
B. Ebhg  hy  bb 
C. Vyg  y y
D. Tg h hy
4. Whh   h bhg hgy    b  1?
A.
B.
C.
D.
Iy h b.
Ebh  hy  bb .
T h hy   .
Vy  y y ,  b,  vv .
5. Wh h y wy   b g hg?
A. C x   h b  y.
B. I vv .
C. C  , ,  .
D. Ebh  w hy  .
DOMAIN 5.0 Objv 5.2
5.1 ANSWERS
1. B Ebhg       4,  vyg  y y
  5.
2. D
Qg h bv     bhg  hy  bby  ( 2).
3. A Dg h g, whh  h    h bhg
hgy,   g   h    hw hy w .
4. A
Iyg h b   1.
5. C Awy   , ,   b g
 hg.
Objective 5.2
Given a scenario, troubleshoot
problems related to motherboards,
RAM, CPU, and power
M
hb, RAM, CPU,  w  h    y .
Tbhg  gg   b h  by g 
h by.
Troubleshooting Common Symptoms
Tbhg b wh hb, RAM, CPU,  w  b  b
h  hv  b   y h  hv  . I h
bjv, y w  b h y, y ,  g .
Th wg  gz  PC   by    y
y y   h A+ C 1 x (220-1101). Th   y  
 h C 1 x bjv  h  x, b  w v  h v x
(220-1001)   b y gh   h  h  x. I 
v  h y y h y ()  ()  h y.
Power-On Self-Test Beep Codes
Th vy  hg    wh   w      -   
, whh  h g  h BIOS  UEFI. Th  h h bv 
 w- -,   ’ y , h POST. My  y w y y
 hy , b j  y   POST b , whh  j wh hy
  (  ). T  y   b  g h POST, 
    b  . Th b  b ,   , h
275
276
M My’ CTIA A+ C 1 C P
TABLE 5.2-1
Examples of POST Beep Codes from Different BIOS Publishers
Beep Signals
Provider
BIOS ROM
CPU
RAM
Video card
AMI BIOS
AST BIOS
D
IBM B
9 h
9 h
1 h
2 h
5 h
1 h
7 h
1 g + 1 h
1 h
1 g + 5 h
4 h
1 g + 2 h
1 g + 2 h
6 h
1 g + 2  3 h
gh  h b   by wh b h POST . Th b 
h    h h b  v .
O g-  g h POST b   h h        h. Eh BIOS bh   w q  h. S,  g 
y  h  BIOS   y , h’ b  b. Tb 5.2-1  x    h  y  BIOS-b POST b  h.
Th  b  y y h w  h     h wg b:
Suspected Issue(s)
Possible Solution(s)
C ’ b  POST
b  .
POST  vy wh h BIOS v;  
h BIOS   h   by
h  .
Pw w h y   h v .
T  h y  . I h b ,
 h v .
Pw w h y  h RAM. R b
RAM   w RAM,   h y,  .
POST b  , g 
b   v .
POST b  , g
b  g RAM.
EXAM TIP You don’t need to memorize the beep code patterns, just know what
they are and why you’d hear them. Also be familiar with the beep code symptoms.
Proprietary Crash Screens
Th w    y h   y h  h     hw  w   h h  g y wh  b b, y  h blue screen of death,  h BSoD,  Ww g y,  h
DOMAIN 5.0 Objv 5.2
v-g g wh, y w  h spinning pinwheel of death,  h
SPoD,  bh Ww  OS (hgh ’    OS).
Th BSD  yy  w g y  b: v v /
hw b. Ah,      g wh vg g. A SPD   h OS h   h  g.
Ah   y  h b   b-, whh ’ y
hv   g y. Th    h wg b   h
b.
Suspected Issue(s)
Possible Solution(s)
B  b y    b- T  h y. Ch h ’ w .
BSD:  
L  h STOP     h 
 . I h y b b y  
h STOP  ,  “I Shw” 
 .
OS SPD: v 
Sh w h y   RAM ( b).
Th  h y.
F    h OS y v  hv
10     .
I     v,   . .
B v v
U F Q (option-command-esc)   
v .
I h y w g POST b  
h OS ,  h OS  S M  
  v v.
No Power
Th  b   h by    g. I h    
hv w, h  hg  h  h h w      w 
. Hwv, h  h ,    h wg b.
Suspected Issue(s)
Possible Solution(s)
Pw    y h.
Pw wh  w y 
 .
Pw y wh   vg
wh h   vg g.
Rh h w .
T  h w y wh.
T  h w y wh; hg h wh 
h  vg.
277
278
M My’ CTIA A+ C 1 C P
Sluggish Performance
Th  y      Ww y   w, g    
,  j    g, g  y g  h  ,  y
v g,  g Rgy,  h w  bg  . Th wg
b      b  g  ggh 
by  PC.
Suspected Issue(s)
Possible Solution(s)
Ovh CPU
J 
S h x , “Ovhg.”
Ty , h,   I h,
 w   b Ry B  qy  
 y  g   g, whh  b
 gy  y hv  h v y
( x, gg ). U h Ww Disk
Cleanup   v  .
Mw  v w y b g  h
bg. S h y wh v/w w.
Mw
Overheating
H  b h  y   . T h h    CPU;   h 
 w . Ev h gh   h, b  h wg ,   
   y   gh. Th wg b  y  h 
  b  g  vhg.
Suspected Issue(s)
Possible Solution(s)
Pw y  h .
I h    g, h  h y  
h w y.
C h v h    wh 
   - v.
I h    g, h  h y  h
h    h hb. I h  
,  h v h .
C h    .
U h PC Hh  Hw M  
h BIOS/UEFI w  h  .
R h y  y    h
 g  h BIOS/UEFI w; 
h CPU  v,     
h  g.
Av h  CPU  y.
Av h   CPU h 
  .
A     gg.
C  CPU   g
 wy.
Sy  v.
DOMAIN 5.0 Objv 5.2
Burning Smell and Smoke
I y  hg  bg bb    g  y ,  ’
b  g hg, b  y  b  b  y y h. F  , ’   g
 b. I h    ,   b wh h  g g. Th, h b   y  b hg . Th wg b
b  b   h   wh y       PC.
Suspected Issue(s)
Possible Solution(s)
Th’  b   .
Ch w    v 
h hb  h g. R b
  g/ .
O h v   h . I h 
,  h v.
Ch  bw, b,   .
R g  h  b .
Pw w h y  h h  
h v, hb,  h . M
 h w    bw.
Ph v    g.
Th’     by
  .
Th’     by
 vg v.
Intermittent Shutdowns
Wh    ,   h y h   h Pw G (PG) h.
Th w y  (PSU) h h vg    ,     yg h
 vg, whh  h PSU  wg y, h hb    Pw
G g  +5 V  h b   . Th wg b v b
   w  h   h y b g  PC  h w y.
Suspected Issue(s)
Pw G   w y 
  .
Possible Solution(s)
Pw G (PG)  h w   8 (y
gy). N vg  +5 VDC. I h PG vg
  w, h y w b.
CPU  vh.
S “Ovhg,”   h bjv.
Sy  v.
S “Ovhg,”   h bjv.
Mb v by  y.
T wh  w-g by  by 
h y by.
Ww  g  y T b h BSD  , 
b  BSD .
SystemPropertiesAdvanced.exe   
   Sg  S  Rvy,
h Ay R.
Sg   y.
T wh  w-g   by 
h .
279
280
M My’ CTIA A+ C 1 C P
Application Crashes
I      ,   h  gh wy,  z  
“h” wh g, b  wy  h  , y y hv  
. Th wg b   w  h  h  b g   
h  b   v h .
Suspected Issue(s)
Possible Solution(s)
Ww   hg   g. Eb Ww S -.
Rq    vb.
T y   g  h bg;
 y jb.
U   b
U v v.
wh xg v v.
Fy v  g I/O . T v h w  g wh   h
y v.
C y   g
R h Sy F Ch  (DISM.x)  h
  .
     h.
Grinding Noise
Oh h h h  h  , h h b   , y gg
, g   y . Th  yy y  j hg h  b
g h b: h w y  hb   g,  x
 h wg b.
Suspected Issue(s)
Possible Solution(s)
S   bg   h PC R h b  g . Sh
 h w y  hb h  b  h hb,  h
 hv .
hb. I h   g  h w
y,  h b  y.
Capacitor Swelling
Ay   h hb h b h,   g  , 
  b b y   b ,  x  h wg b.
Suspected Issue(s)
Possible Solution(s)
Swg    
 hb  
R  wh   (q g/
g),  b ,  
h hb,  .
DOMAIN 5.0 Objv 5.2
Inaccurate System Date/Time
Th    bw h y  ( by h y )  h  y  h w-gh   h Ww GUI. I h y     h
    y,   h CMOS by. A   h wg b,
h b y b    h hb by.
Suspected Issue(s)
Possible Solution(s)
B by  hb
Pw w h y   h CMOS by
(y  CR2032). T  h y,  BIOS/
UEFI w ,  /  g, v
hg,   h y.
Other Symptoms
Th wg     v  h v A+ C 1 x (220-1001),
b y y   h  h  (220-1101) x.
Attempts to Boot to Incorrect Device
Suspected Issue(s)
Possible Solution(s)
Nbb    USB h
v 
I b q g
Rv bb vb   
h y.
E BIOS/UEFI w ,  h b
q    bb v,  
h y.
R h b v g OS .
Ww  h OS b
v 
System Lockups
Suspected Issue(s)
Possible Solution(s)
Ovhg y
C Ww 
S “Ovhg,”   h bjv.
R Sy F Ch (.x)     
 .
D h   \T  (Ww).
Pw w h y, v RAM,  
/b,   h y. I h y 
 ’  , w RAM. I  /b 
h b,  .
C y 
B RAM
281
282
M My’ CTIA A+ C 1 C P
Intermittent Device Failures
Suspected Issue(s)
Possible Solution(s)
USB v: w y g 
v gh w  
I v:   v
w   w 
I  x v: w
y vg   
R h w y wh  hgh- .
C USB v  h w hb.
R w . R h w y 
w   b  b  .
U  w y , h PC Hh/Sy
Dg ww  BIOS/UEFI,   
 h w y w v. R h w
y wh  hgh-   w v  
 .
Fans Spin, No Power to Other Devices
Suspected Issue(s)
Possible Solution(s)
Sy w  hb
(4/8-)   

Pw w h y, g  h , 
h w  h y.
Indicator Lights
Suspected Issue(s)
Possible Solution(s)
I gh  wg
Pw w h y, h h  
  h hb,  
y    . Pw  h y.
Log Entries and Error Messages
Suspected Issue(s)
Possible Solution(s)
E g (BSD  h) 
y  OS y g.
O v g g OS  (Ev Vw 
Ww,  x)  h  b 
. Ch  g  b  
h   h .
EXAM TIP Given a scenario, be prepared to identify and troubleshoot the common
systems covered in this objective and listed in the following “Review” section.
DOMAIN 5.0 Objv 5.2
REVIEW
Objective 5.2: Given a scenario, troubleshoot problems related to motherboards, RAM,
CPU, and power C y  b   hb, RAM, CPU,
 w  h wg:
•
•
•
•
•
•
•
•
•
•
•
•
Pw- - (POST) b 
Py h 
N w
Sggh 
Ovhg
Bg   
I hw
A h
Gg 
C wg
I y /
Oh y:
• A  b   v
• Sy 
• I v 
• F  b  w  h v
• I gh
• Lg    g
K   h h  h y y h   .
5.2 QUESTIONS
1. Whh  h wg   vhg  b   h y BIOS/UEFI
g?
A. Cgg  
B. Pw y  
C. C  CPU   w
D. GPU vg
283
284
M My’ CTIA A+ C 1 C P
2. Wh h   w y    230 VAC  y   115 VAC  
    h ?
A.
B.
C.
D.
Ovvg    .
C  .
Sg gh   b    .
S   .
3. Y hv  h w y    h  y bg, 
h Pw G   h vg v   OK. Wh  h y h?
A. Whh Ww  g  y b   STOP 
B. Whh Ww wy b y   STOP 
C. Whh h ctrl-alt-del y  h yb  
D. Whh h w wh  h w y  
4. Wh h y    ’   h BIOS/UEFI   g
y vy  h   w ?
A. R h b q .
B. Ch g    g.
C. P   .
D. R h CMOS by.
5. A   h h   bg    v. Whh 
h wg w  y y h ? (Ch w.)
A. Chg h b   h BIOS/UEFI.
B. Rv y bb   USB h v.
C. R Sy F Ch (.x).
D. Ch       .
5.2 ANSWERS
1. C Th BIOS/UEFI , y  PC Hh  Hw M, y
   w  y .
2. B Th    b h w y     vg v w
wh  bg v.
3. A Ww  b g   h y y  h v  
STOP ;  b g  h STOP ,  h y  S M 
hg h g  Sy .
4. D Pw w y   h CMOS by (y  CR2032). T
 h y,  BIOS/UEFI ,  BIOS/UEFI   g, v y
hg,   h y.
5. A B E BIOS/UEFI ,  h b q   h  bb
v,  . Rv bb vb    h y.
DOMAIN 5.0 Objv 5.3
Objective 5.3
Given a scenario, troubleshoot and
diagnose problems with storage drives
and RAID arrays
H
 v  RAID y  wh g     . Svg
b wh h by    g w  v
 .
Troubleshooting Common Symptoms
Th   h bjv   y  g b, g wh h
y   g .
Light-Emitting Diode (LED) Status Indicators
H v gh  wy .
R h y y by vg h w .
Grinding Noises
F g whg 
Sy vhg; h g y.
Mg y:
Ug AC w. P Pw b  15 
 h  BIOS/UEFI g.
•
•
N b v vb
B v  
Clicking Sounds
HDD  ;   
   g .
B  h v,  h v,   
 h b.
Bootable Device Not Found/Failure to Boot
Dv  bb
Dg b 
Nbb   USB vb v 
Chg h b .
R h b  wh OS .
Rv bb     hg h
b .
285
286
M My’ CTIA A+ C 1 C P
Data Loss or Corruption
<>   gz  
   gz.
R   y, h  SFC  CHKDSK, 
   b.
RAID Failure
RAID  b
B    b
L w b
O   v  y 
Rb h RAID   h BIOS/UEFI
w   -  .
Sh w h y,  h  b, 
w  h y. R h  b  h
b .
Sh w h y,  h w b, 
w  h y.
I g RAID 1, RAID 5,  RAID 10 wh  
v,  h v  b h y  h
vvg v. I g RAID 0 wh   v,
 h v     b (y
  ).
S.M.A.R.T. Failure
H v   
v  .
B  h v,  h v,   
 h w v  h b.
Extended Read/Write Times and Read/Write Failure
L  b
B  b
Dv 
I  g  SATA v
 BIOS/UEFI w 
Cb  b  SATA 6 Gb
B  b
Sh w h y (   v), h
h  b,  w  h y.
Sh w h y (   v),  h
 b,  w  h y.
B  h v,  h v,   
h b.
Ch h v   vy h  SATA
v y/ g  BIOS/UEFI w .
Sh w h y,  h SATA b wh 
SATA 6-Gb b,   y.
Sh w h y (   v),  h
 b,  w  h y.
DOMAIN 5.0 Objv 5.3
L  RAM g  hhg
(v y)
Lg w  wh g
  
R   b
 
Fw /  (IOP)
A RAM  h y.
Ty g  h v . T wh wg v  by .
Ayz  wh g,  y g, 
gy h.
Missing Drives in OS
Pw   b  
 ().
I SATA  g.
USB  Thb b 
.
USB  ’ v gh
w   h v.
F y   gz by h
g y.
Dv  g  OS.
Sh w h y,  w / 
b,  w  h y.
Chg h SATA  g  -RAID
(AHCI    y).
R h b  h   v  h
y.
Pg h v  h  hb  h y   
-w hb.
Ww   v  wh  y
y  by Lx  OS.
Ch BIOS/UEFI g,  h v, 
h hw . Ch D Mg
 Ww  y  z.
Other Symptoms
OS Not Found
Wg b v 
B  
Chg h b .
R h b  wh OS .
EXAM TIP Be sure to know the symptoms, meanings, and solutions covered in
this objective and listed in the following “Review” section.
287
288
M My’ CTIA A+ C 1 C P
REVIEW
Objective 5.3: Given a scenario, troubleshoot and diagnose problems with storage drives
and RAID arrays H v  RAID y  hv  vy  b, y
 whh  h wg:
•
•
•
•
•
•
•
•
•
•
LED 
Gg 
Cg 
Bb v  
D /
RAID 
S-g, Ay,  Rg Thgy (S.M.A.R.T.) 
Ex /w 
Mg v  OS
OS  
K   h y  h y  hv  h  b .
5.3 QUESTIONS
1. A v   RAID 0 y  wg. A y  h v v, hw
 y v  h ?
A. Rb h y  h wg v.
B. R h   b  h y.
C. U D Mg  b h y.
D. R bh v; h h v w bby  gh wy  w.
2. A 1-TB USB b v w      g Ww b
w  w wh gg   Ww    by w. Wh
 h  y ?
A. Dv  b   b gz by h .
B. Dv   g  b  by h .
C. L USB    vg gh w  h v.
D. L      v  Ww.
DOMAIN 5.0 Objv 5.3
3. A    b   Ww . Th  w v 
 bb USB v. Whh  h wg h y y   g h
  b?
A.
B.
C.
D.
R h    bb USB v.
R h     .
S h USB v  v.
D h USB v   h .
4. A ’  y  “RAID  ”   b. Wh  y
  bh h ?
A. F    h y v  hv 10    .
B. Rb h RAID   h BIOS/UEFI w  -  .
C. R h b  wh OS .
D. A  RAM  h y.
5. Whh  h wg  v   ? (Ch h b w.)
A. S.M.A.R.T.
B. BSD/ wh
C. L g 
D. Ev Vw 
5.3 ANSWERS
1. B RAID 0,  h ,    y y; h   
 bh v  v ,  h h    g v w
 h y’ .
2. C S  USB    v h  w v   x
h v wh g  by w;   w,  v 
 Y-b   w    ,  h v  b gg   w USB hb.
3. D S y  g  hv  USB v  h  bb v 
b g  g y ; by g h v, y
 h y   h x bb v    h BIOS/UEFI w.
4. B F “RAID  ” , y h b h RAID   h
BIOS   -  . Y   y g  g  
w b  y    b b.
5. A
S.M.A.R.T. h v    v   .
289
290
M My’ CTIA A+ C 1 C P
Objective 5.4
D
Given a scenario, troubleshoot video,
projector, and display issues
      wh h y  h  wh h yb  g v. Gg y b x qy   hgh y.
Troubleshooting Video,
Projector, and Display Issues
Th   h bjv v  y  v, j,  y ,
g wh h y   .
Incorrect Data Source
Rq  g
C v  gh 
D   b wh 
x
C   y  g  g
 g . Cg Ww M Py 
w h  y.
V  gh  v   h v, SD ,
USB v,     b   b
  w,  y h,   
h yb v. U  v v  
y h  VLC  y  Ww M
Py   h .
U  v  v   h .
Physical Cabling Issues
L   v b
Pw w h y  h y,  h
v b,   h y  y.
Burned-Out Bulb
B- bb  j
R h bb.
Fuzzy or Distorted Image
C v  (GPU) v
R h  v.
DOMAIN 5.0 Objv 5.4
Display Burn-In
Sy g  
v “gh” bh  
y.
D’   y  .
Py  - hw   w h  v
 b-.
Dead Pixels
Px    g

Px   “ ” 
R h y  ’ wy.
Gy g x wh       
 .
Flashing Screen/Flickering Image
Fhg  g
CCFL bgh g
Ch h , v v,  gh .
R h bgh  y.
Incorrect Color Display
Ovhg v  (GPU)
Ch h   h v    h  
  v.
I h   v,     .
Audio Issues
N 
A  wg 
g 
A  y
A v  g
Ch h v    .
R h Ww Pyg A bh.
Ch h  .
Ch h  g  v v 
T Mg.
Dim Image
Bgh 
Iv 
Dy bgh  w
R   h y.
R h v  y.
I bgh.
291
292
M My’ CTIA A+ C 1 C P
Intermittent Projector Shutdowns
I hw
Pj vhg
Fhg    h
Pj vh   gg
 v
Pj  
GPU (v )  
R h .
C h  v.
Ch h  .
T  h j, v  h  v,
   h ,  ,  .
R   h j.
R h   v .
Other Symptoms
Artifacts
Ovhg v  (GPU)
Ch h   h v    h  
  v.
I h   v,     .
Ovhg 
Ch h   h CPU h   h
  v.
C h     .
Distorted Geometry
Ovhg v  (GPU)
Ch h   h v    h  
  v.
I h   v,     .
Oversized Images and Icons
Sy g  VGA (640 × 480)
 SVGA (800 × 600) 
C v  v
Dy g   hgh
R h y   h  v.
R h v  v.
R h g  100  g h Dy 
 Sg
EXAM TIP Make sure you are familiar with the symptoms, explanations, and
solutions covered in this objective and listed in the following “Review” section.
DOMAIN 5.0 Objv 5.4
REVIEW
Objective 5.4: Given a scenario, troubleshoot video, projector, and display issues C
y  v, j,  y ,  h wg:
•
•
•
•
•
•
•
•
•
•
•
•
I  
Phy bg 
B- bb
Fzzy g
Dy b-
D x
Fhg 
I  y
A 
D g
I j hw
Oh y:
• A
• D gy
• Ovz g  
K   h y  h y hv   — .
5.4 QUESTIONS
1. A  h  h    w h y  g h 
g  h . Hwv, h y   w gh  . Whh
 h wg w y hv h h ?
A. L w   y
B. Pg fn y  g b  y y
C. L v b
D. L w b
2. A Ww   vy g x    h . I h   y
g h  wh gh b h , h   h w “   
 g” g . Whh  h wg  h  y ?
A. Sy b   S M.
B. V  GPU  h .
C. CPU  h .
D. Sy b   STOP .
293
294
M My’ CTIA A+ C 1 C P
3. Y  yg  3-D g  h  hv b xg wh gg
b   y v ,  w y    
. A hg h   y v   g ’ wg
y, wh h y  x?
A. Eb v ggg.
B. Db vg.
C. Eb S M.
D. Eb A .
4. Hw w y v   x y ? (Ch w.)
A. R h   h v .
B. R h y   wy.
C. Gy g h x wh       .
D. C h     .
5. A   xg  g   y. Y bv h    
v . Whh  h wg  y  x h?
A. I   h  v  v.
B. R h GPU.
C. I h y .
D. R h v.
5.4 ANSWERS
1. C Mvg h    h v b  b , g h
  .
2. A S v  Ww y b   S M  h y
’ b y  h v b ; S M   w 
, g  g   x.
3. B Ovg v   h     vhg, whh 
      .
4. B C Px y b    g   bg   “ ” .
R h y     wy  gy g h x wh  
      .
5. A A     g   v  (GPU) v.
Y h    h  v  v.
DOMAIN 5.0 Objv 5.5
Objective 5.5
Given a scenario, troubleshoot common
issues with mobile devices
M
b v h  , h,  b     y’
-h-g w. Wh hy  wg,   wg. Th bjv
h y  y b v b  .
Troubleshooting Mobile Devices
Th   h bjv v  y  b v , g wh
y   .
Poor Battery Health/Short Battery Life
Device Type
Cause
Solution
L, h, b
L, h, b
U   g. C  hb  .
By   hg
Fw h ’
y.
gg  hgg 
hgg h by.
L, h, b
By  v.
Rv h by  b; hv
h  v  .
Device Type
Cause
Solution
L, h, b
Ovhg by
(Pv) D h hg
 h by  y hg.
Swollen Battery
L
L, h, b
Chg  vg
 hgh
Dv by
(S) R h by 
y h  by y.
Ch h hg vg ;
 h hg    .
R h by  y h
 by y.
295
296
M My’ CTIA A+ C 1 C P
Broken Screen
Device Type
Cause
Solution
L
LCD  wh  .
L
Sy   
x y.
L
Iv h .
L
Sh, b
L
L, h, b
Bgh h .
Bgh h .
Iv  bgh
h .
Sy    .
F  h wh  hv h
 v.
U h y whg y
 h yb  hg 
 y.
R h v ( 
LCD wh CCFL bgh y).
R h bgh  LCD .
R   h v.
U  x y  h
  b v.
T h yb,  b, 
h  w  h y.
L, h, b
S  b.
Ch wh  
,     h,
  h b .
L
Iv  g.
L, h, b
Dy bgh 
  w.
R h v ( 
LCD wh CCFL bgh y).
I h y bgh.
L
Ixv y wh
LED bgh  h
   y wh
   .
I h y bgh 
 h y wh  hghqy LED-b LCD y.
Improper Charging
Device Type
Cause
Solution
L, h, b
L, h, b
L, h, b
B AC 
F by
Dg hgg b
R h AC   y.
R h by  v.
R h hgg b  hg.
L, h, b
I hgg
Ch  y b, hg,
,  .
DOMAIN 5.0 Objv 5.5
Poor/No Connectivity
No Wireless Connectivity
Device Type
Cause
Solution
L, h, b
W-F    .
L, h, b
L
A    .
W-F   
  W-F .
T  h W-F ; g
 h v, h  gh b
 by  x wh 
by OS g.
T   .
I h  w y
v, h h W-F 
  h W-F  .
No Bluetooth Connectivity
Device Type
Cause
L, h, b
Bh   .
L, h, b
Solution
T  Bh;  h v
 .
A    . T   .
Intermittent Wireless
Device Type
Cause
Solution
L
W-F  w  
 .
L
W-F    y
.
L, h, b
Sg gh v by
W-F   w.
Ch h W-F   h 
b    
 w  h 
h.
Ch h W-F   h 
b   . I h
g w  , gh
h. I h g w 
g,  h.
Aj h   h v 
USB W-F   h v
g .
297
298
M My’ CTIA A+ C 1 C P
Liquid Damage
Device Type
Cause
Solution
Sh  b
Lq
L
Lq
A h Lq Dg I
(LDI). C b b.
Rv x w 
h; v by 
 vb v;  y
 w   y.
Overheating
Device Type
Cause
Sh
C    g
vhg.
L, b
L, b
L
Solution
Rv h v  ;
  h   h b
.
V  /  P h v   h 
v  b.
  y  gg v.
F  v hv  Ch    hv h
  g  wy.
v v  h  hv
;  h   hy 
g  wy.
Th  
Hv h v v.
bw CPU  h 
h .
Digitizer Issues
L, h, b
Th gz 
.
Hv h  v.
Physically Damaged Ports
Device Type
Cause
Solution
L, h, b
B  g 
T h v   
 h.
DOMAIN 5.0 Objv 5.5
Malware
Device Type
Cause
Solution
Sh  b
Mw 
L
Mw 
U -w w
w  h v  
E Mby Mg
(EMM) v  h v OS.
I  b w .
Cursor Drift/Touch Calibration
Device Type
Cause
Solution
L
Mg h
L
Dy h 
L
I h 
L
U h
U h C P  
h g  qv.
Rv h yb  g
  h h 
  h.
U h C P  Sg
g   h h   h
 (y 60 Hz).
Aj h vy  h h.
Other Symptoms
Sticking Keys
Device Type
Cause
Solution
L, Bh
yb  wh
b  h
Db  y 
bw  bh y
U     bw
h y; v h yb
  ,  b  h
yb  y b g .
Device Type
Cause
Solution
L
Fy h v
  USB, FW,
 Thb 
B AC w 
B AC 
B  w j
D h v  y.
No Power
L, h, b
L, h, b
L
Ty   AC w .
R h AC   y.
Hv h  v.
299
300
M My’ CTIA A+ C 1 C P
num lock
Indicator Lights
Device Type
Cause
Solution
L
num lock  caps lock
y   y.
T  h num lock  caps
lock y,  ;  h b
, h BIOS ,  h
yb,   h yb.
Cannot Display to External Monitor
Device Type
Cause
Solution
L
Dy   gg
 .
L   g 
 x y.
Pg h y  h .
L
U h   y 
    h x
y   /x
y,  .
Touchscreen Nonresponsive
Device Type
Cause
Solution
L, h, b
Th  y.
L, h, b
Th   gg
 .
C h   h h
wh  b h;   
q y  h h.
P h b 
h v g .
Sh, b
Sy  z.
U      h v.
Device Type
Cause
Solution
L, h, b
T y   g
 y.
A ’   y
    .
A   b
wh v.
C  h    .
Apps Not Loading
Sh, b
L
P     h y
h .
C  q
(OS, RAM,  ,   )
wh  w/hw
;  h  
   h    b.
DOMAIN 5.0 Objv 5.5
Slow Performance
Device Type
Cause
Solution
L, h, b
T y  g
 y
C  h    .
L, h, b
L, h, b
N gh RAM
N gh  
 y v 
 g
Ovhg v
I  RAM  b.
F    h y v
  g.
L, h, b
Sh w h v, w   
w,  h  h v.
Unable to Decrypt E-mail
Device Type
Cause
Solution
L, h, b
E-  ’ hv
 w 
y y.
I h  w 
y y   -.
Device Type
Cause
Solution
L, h, b
Sy w 
P     h
 b
y .
Ib    Rv   h  
 .
Frozen System
L, h, b
No Sound from Speakers
Device Type
Cause
Solution
L, h, b
S  h w
 y gg 
 j
Bh  
h  wg
T  h ,  h
,  y.
L, h, b
L
I  
h
M  h   h
  ;  wh h b
v  y.
O h  x  h
h   v.
301
302
M My’ CTIA A+ C 1 C P
GPS Not Functioning
Device Type
Cause
Solution
Sh, b
GPS    
v g.
GPS    
 v .
A   b.
T  GPS.
Sh, b
Sh, b
Chg h  g   GPS.
T   .
EXAM TIP Be sure to know the symptoms, explanations, and solutions covered
in this objective and listed in the following “Review” section.
REVIEW
Objective 5.5: Given a scenario, troubleshoot common issues with mobile devices Sy
  b v   h wg:
•
•
•
•
•
•
•
•
•
•
•
•
P by hh/h by 
Sw by
B 
I hgg
P/ vy
• N w vy
• N Bh vy
• I w
Lq g
Ovhg
Dgz 
Phyy g 
Mw
C /h b
Oh y
Sg y
N w
num lock  gh
C y  x 
•
•
•
•
DOMAIN 5.0 Objv 5.5
•
•
•
•
•
•
•
Th v
A  g
Sw 
Ub  y -
Fz y
N   
GPS  g
K   h y  h y hv   — .
5.5 QUESTIONS
1. A   g       h  h  HDTV wh  b
  h . A g h , h    g  yhg
 h b- y. Wh h y y   y  g h  
 ?
A. C h   h w  y    .
B. Hv h   h  y()  wh  h x y.
C. T h     y .
D. F      h g ’ Ww   .
2. A ’ w       b  h  h 
  . Whh  h wg  h  y   h b?
A. A w    y.
B. Kyb  .
C. W-F b  h g  h  w   g h .
D. C v w   h  h.
3. A   xg xy h by    b v. Wh
 h y ? (Ch  h y.)
A. C  hb  g  h bg.
B. P  h   h b v.
C. Fw h ’ gg  hgg  hgg h by.
D. R h bgh  h y  h v by .
4. A   h h  b   h   h b  h
  . Wh  h h ?
A. P h b  v g .
B. Chg h  .
C. Db  v  .
D. U h y’ v v.
303
304
M My’ CTIA A+ C 1 C P
5. Whh  h wg   h   by b ?
A. LCD  wh 
B.
C.
D.
E.
F.
G.
Iv 
Bgh 
Iv  bgh 
A  h bv
A  C
Oy D
5.5 ANSWERS
1. B M   wh bw h b- y  h v  by g
 F y ( qg h     h fn y).
2. A L wh b- W-F     h g  h
y     h W-F   h by  h ;  h
b   y  g by, W-F  w b 
 w y .
3. A C D By    b v    h  v  h v
h w w. Ah   b h h by   bg hg y.
4. A Pg h b w g h   h y’
h y.
5. E Aw A, B, C,  D    h     b
y .
Objective 5.6
A
Given a scenario, troubleshoot
and resolve printer issues
hgh gz hv gh h -    , g
   v        y z  w   h h. P
hg vy,  ’   w bh h y  h  y g
h y  v g b.
DOMAIN 5.0 Objv 5.6
Troubleshooting Printing Issues
Th   h bjv v y   g  by  y,
g wh y   .
Lines Down the Printed Pages
I: Hz wh b—y
 g h
I: Ch  —h
g 
L: V wh — gg
Ij: C b hgh 
L: S  g v  by 
g    y 
L: R b    
by  w  g g b
Dy 
C h h. I h b ,
 h h.
S h h g  h  v
 h  y.
Rv  h h  g.
E h   y g  
. I h b ,  h
h.
Ch h   
 whh g   by
whh b. C h  
wh 90   hgh  h,
 h  g  ,  v
h   .
R h g b  , g
 wh h g b  .
C   wh 90   hgh
 h.
Garbled Print
B    b
C  v
Ch h  b;    ’ 
    ’ b.
R h  v.
Toner Not Fusing to Paper
L: F by y
L: F 
C h  by wh 90  
hgh  h.
R h , by wh  
 h h h b .
305
306
M My’ CTIA A+ C 1 C P
Paper Jams
I  y   g
P j wh g x  b
x   y   wg
W  
Ch   y  h
  y  g .
Ch x   
;  y b .
P        w.
R h      g
   x  h  by vg h
hy .
Faded Prints
I: P bb  w    .
I: Fh bb   .
I: O     .
L: T  g w.
I h  bb h   v,
v . Ohw,  h bb.
Aj h h g. I h h g  y,
 h h.
Th     j; hv h 
v.
Rv  h   h  g.
L: T  .
R h  g   ,
 .
L: T   .
P h g g g h -.
I h g  b, h h   
 h g g  vb h. I  , h
’    w y h
. R  v  .
B g  bw  jb.
Th     g  w
,   vy  y.
Aj h g  h    
 ( hg h  y
y ’ q h b g).
DOMAIN 5.0 Objv 5.6
Incorrect Paper Size
Hz g: Mg 
 y
V g: M h 
  
Aj h   y  h 
 z.
Rv h ,  ,    h
   bg ; h 
h .
Paper Not Feeding
Wg  y     y
P  
P y     y
U h   y;       b.
R h  wh y .
Rv h  y, h h  v
 ,   h y y.
Multipage Misfeed
Mg 
C h w’    whh
  b  h .
Multiple Prints Pending in Queue
P h  b   jb wg h
  gg.
P jb   gg  
hgh h   .
O h P S v  h h
   jb ( Fg 5.6-1); 
 jb h  wg,   jb
h hv ,  h b.
By h     y 
h  ( Fg 5.6-2). R h P
S v.
Ex   g   .
U h g   b  
  .
307
308
M My’ CTIA A+ C 1 C P
FIGURE 5.6-1
Print spooler’s print queue
FIGURE 5.6-2
Print spool settings
Speckling on Printed Pages
Sg   g
Ch  y    g
 b y h  
 .
DOMAIN 5.0 Objv 5.6
Double/Echo Images on the Print
L: D ghg  by g
gg 
L: D ghg  by 
v
R h  g  h   b
   h .
Pv h:
• Lw h  (  300 
  600 ).
• Chg h g/ y.
• Av 50  gy  “-/
- .”
• Chg h y  h gy 
  w b .
• M   gh  gh
 .
• P   .
• Aj h  y  RET g.
• I  b g  h  jb b
h g wh ghg.
• Ch h   hy  h
   j h  hy 
  h  g.
L: Lgh ghg  by w 
R h  g  h g
g g b
b  b ,   h b.
Ig b   v h g H- h   h h
b.
Incorrect Color Settings
P b  g 
C v
Dv 
Ij: Ph gg
R  g  b.
R h   v.
Hv h  v   h .
R h h   g y
v by h v.
Grinding Noise
P  gg  wh g.
U     h wg :
Ch  .
C .
R g.
U  v v.
C h  h.
•
•
•
•
•
309
310
M My’ CTIA A+ C 1 C P
Finishing Issues
S j
H h
Pw  ; v   
h;  j    ;
v y b.
Ey h h b;  h h
v v.
Incorrect Page Orientation
Pg  g wh  .
Pg    g w-
 wh x g .
Ch h Ly | O g 
h   g  h  .
Ch h P g  h Av
Sg  h M O 
(F | M |O |Av).
Chg h F g  h M
O   g  h h
g .
Other Symptoms
No Connectivity
B     w b
P     
B w g
P  
Ch h   w b 
           b.
Ch h   g     h
 .
Ch h w  w w g.
P h  b   h  
wh h  .
Low Memory Errors
L: T y   gh  g
    vy wy    
g  yg   g  
gh ( gh   j g y).
Ug  y  b.
W: R  ,
y h g (w , w  
gh),    RET  h 
h.
DOMAIN 5.0 Objv 5.6
Access Denied
Sh   b .
Vy h   h   h 
(h Sy b  P P).
S  gh hv  y g
 .
Printer Will Not Print
I   y   
g  OS
P q b 
P     
Chg h  g  h  
h h OS  g.
S h “M P Pg  Q”
y  h bjv.
Ch h   g     h
 .
Unable to Install Printer
U  
P  
Pv    
  h .
L: Ch h  b  w 
h .
Nw: Ch h w g 
h .
No Image on Printer Display
Dy z
T  h , g    w
,  h   b . I h
y   z, hv h  v.
EXAM TIP Make sure you are familiar with the symptoms, causes, and solutions
covered in this objective and listed in the following “Review” section. Note that to solve
many of these problems, you first need to correctly identify the printer type in use.
311
312
M My’ CTIA A+ C 1 C P
REVIEW
Objective 5.6: Given a scenario, troubleshoot and resolve printer issues C
y  b wh    y  h wg:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
L w h  g
Gb 
T  g  
P j
F 
I  z
P  g
Mg 
M  g  q
Sg   g
Db/h g  h 
I  g
Gg 
Fhg 
• S j
• H h
I g 
Oh y
• N vy
• Lw y 
• A 
• P w  
• Ub   
• N g   y
5.6 QUESTIONS
1. A   g h h  jb  yg  gh . F h
, whh  h wg y     ?
A. V
B. L
C. I
D. Ij
DOMAIN 5.0 Objv 5.6
2. A   h wh h  v, h v    g.
Whh  h wg    y  h?
A.
B.
C.
D.
Chg h   g- g.
Aj h  .
Aj h  g.
U RET  h  .
3. A    j  h   h  wh h    b-
g. Whh  h wg    y h ?
A. R  
B. I g
C. Dx
D. RET
4. A    g b g. Whh  h wg  h y
y  x h b? (Ch w.)
A. R h h.
B. By h     y  h .
C. R  g.
D. A    g g g -.
5. A ’  h  b   jb b   wg  h  q.
Whh  h wg  h y   g h  jb g g?
A. Vy h   h   h .
B. R h P S v.
C. Cb h .
D. R h   v.
5.6 ANSWERS
1. B
D gh  y   g  .
2. C P g  b  y  h    wh ;  hy
   w, h / w   gh.
3. C Th x  h   h      h   g  h
v .
4. C D I     b g, y h  h  g
  ,  . I      ,   g g g h
-. I h g  b, h h     h g g  vb h.
I  , h ’    w y h   h b 
 v,  .
5. B O h  w  g  b-  q, g h P
S v  h b .
313
314
M My’ CTIA A+ C 1 C P
Objective 5.7
Given a scenario, troubleshoot
problems with wired and wireless
networks
T
y’ , h ,  h  y y  wg,  h
  g  w b  hgh.
Troubleshooting Network Issues
M h   vg w b  y v by g h  y
  v  h wg .
Intermittent Wireless Connectivity
B   w b
B NIC
Mg W-F g
T h w g  
h (y wh 2.4 GHz)
Lg   w   AP
P   w   v
R h b  ’     
’ b.
Pw w h y, v h NIC, 
   h  ( ’  ). R h
NIC  ’ b. I h  v.
Chg h   h W-F 
(v h )  g    w
  AP. Chg   -w
h  h   AP.
Ch h  w  h 1, 6, 
11. U  W-F yz    A 
OS v   h w h  .
Mv h v   h   AP.
Chg h    (
y  b- W-F). I USB W-F 
Bh  ,  h   
USB x b  v    
v g.
DOMAIN 5.0 Objv 5.7
Slow Network Speeds
W: M /x g w
w w.
W: N-  g wg 
h  .
U  g  /
x g.
U C 5 y  F Eh (100 Mb). U
C 5  6  Ggb Eh (1000 Mb).
U C 6  g  10-Gb Eh.
W: Hb     wh.
Hb b    v 
bv bwh. R y g
hb wh wh.
W: Lg   w   AP. Mv h v   h   AP.
U   h wg  v
.
Limited Connectivity/No Connectivity
APIPA IP  y w  LAN
; DHCP v  
vb.
Ch h   h DHCP v ( 
  h   AP  h w).
R h   AP. O  
  Ww   ipconfig/release
 ipconfig/renew  b  w IP ,
  h DHCP v. R h v 
y  g h DHCP IP .
W: Nw b gh b  
Ch h NIC  wh g gh   
v.
hy  hy vy. I  gh
 y, w h h b. U 
w-g w .
W: NIC gh  b b  h
Ch Dv Mg  h hw g
 v  .
 h NIC. I h NIC   ,  h
v. I h NIC  b, b .
W: NIC gh  b g 
T h NIC wh  b g. D
vg g.
h w b   h b
g. I h NIC  b,  .
W: Cb gh  b   gh Ch h h w b  gg 
b v.
 w ;   , h h h  
h b   wg . I  
  bh ,   b  
 h b. R h b  ’ b.
315
316
M My’ CTIA A+ C 1 C P
W: NIC MAC  ’ hv
   w.
W: A   b.
W: W-F   .
A h NIC’ MAC   
 (wh)  h 
g. I h    b 
b MAC , v h 
 h b,  b. I h v 
   g wh, h MAC
g g  h wh.
T   .
T  h W-F  g h hy
wh  h v  h w wh 
h OS.
Jitter
I   y
A  j b, g h Eh b,
 g h gwy v.
Poor VoIP Quality
P v qy
R h j  g h 
w.
Port Flapping
P g
L     h w   g
v   h w.
High Latency
Hgh y  w
W y
Ay     h wg  
w y:
• R       w
.
• U  w    w
 hgh-v .
• Ay QS   hgh-bwh
 q.
Ly  h w  v  
 AP   h v x
vg.
DOMAIN 5.0 Objv 5.7
External Interference
W: W-F v
Eg  (EMI)
Chg h W-F h  v h .
Ay g, hg,  gg.
Other Symptoms
Unavailable Resources: Internet
U  g   g I .
APIPA IP  ’ w I
.
R h .
Bb  h .
Ch h   /g
g  hg   y.
S h “L Cvy/N Cvy”
y   h bjv.
Sh w   h . U h
w. R  vw h IP  
h v. R h     g.
Sh w   h , w
by h . U h  w.
R h     g.
Unavailable Resources: Local Resources
Ub     v w
A h   hgh 
h
,    w v.
Sh, : I  /w Wg/h : U h 
 /w  h   y
   h v. I ,    
  h .
Wg : Sh  vb
F   , h wh h w
g     b h.
Ch  h   .
R h     h 
  y g.
Sh, : I w,
Ch h wg    g
hg,   g
 Sy P  hg   .
E-: I  /w  - Ch wh h - v  vy y
 g h   /w.
Chg h g  .
E-: I g  -
Ch wh h - v  vy y
v
 g h  - g (v y
[SMTP, POP, IMAP],  , y,
  ). Chg h g  .
317
318
M My’ CTIA A+ C 1 C P
APIPA/Link Local Address
Th v h  IP   h g
169.254.0.1–169.254.255.254.
Th DHCP v (whh v IP
 y)   wg.
Ch h v vg h DHCP v
(y  )   h DHCP v.
R  w h IP   h
v wh  APIPA    h.
IP Conflict
Tw   v hv  IP .
R  w h IP   hy 
v by DHCP.
I h IP    y, hg
h g v   w IP  
h  g.
SSID Not Found/Multiple SSIDs
H SSID
A  b
M h  vb SSID
E h    h SSID 
v h y y.
T   . I W-F   
,    g y.
S h SSID wh h g g. Sg
  h w w g  g  
h g g,  .
EXAM TIP Be sure to know the symptoms, causes, and solutions for the network
issues covered in this objective and listed in the “Review” section.
REVIEW
Objective 5.7: Given a scenario, troubleshoot problems with wired and wireless networks Th wg w  w w b  hv   ,
,  h    y:
•
•
I w vy
Sw w :
• L vy/ vy
• J
DOMAIN 5.0 Objv 5.7
•
•
•
•
•
P VIP qy
P g
Hgh y
Ex 
Oh y:
• Uvb : I   : h, , -
• APIPA/  
• IP 
• SSID  / SSID
5.7 QUESTIONS
1. Whh  h wg  by w  v  w w w
 ?
A. Mvg  v   w   z b bw h 
 h 
B. Chgg h AP h g  h    -vg h
C. Ug h w  v v  h   w AP  
D. Rvg h -w w v  h  h y  h 
qy b
E. Chgg h DHCP g
2. Wh  h IPv4  g   APIPA g?
A. 169.254.0.1–169.254.255.254
B. 10.0.0.0–10.255.255.255
C. 127.0.0.1–127.255.255.255
D. 224.0.0.0–239.255.255.255
3. A w  b    h  b  b  b  IP .
Whh  h wg  y h   h b? (Ch  h y.)
A. R q  .
B. Ww F S.
C. R  w   h .
D. I v   vb  h ISP.
E. A  h bv  b h .
4. Wh  h y    qy v   VIP w?
A. Bwh
B. Thgh
C. J
D. T 
319
320
M My’ CTIA A+ C 1 C P
5. Whh  h wg  h b   w hgh   w w?
A. Ug  g   x g
B. Ug  g   x
C. Ugg h bg  
D. Rg  wh wh hb
5.7 ANSWERS
1. E A  h h vb   vy  gh v 
   w .
2. A IP  g wh “169.”  g y wh  IP 
 b v   DHCP v.
3. E
4.
C
A  h    b h   h .
J  h        VIP .
5. A A g   x g w h y  g h
   h w.
I X
A P
E N
About the Online Content
This book comes complete with:
•
•
•
•
D
P
TotalTester Online practice exam sotware with practice exam questions or
exam 220-1101, as well as a pre-assessment test to get you started
More than an hour o sample video training episodes rom Mike Meyers’
CompTIA A+ Certiication video series
More than 20 sample simulations rom Total Seminars’ TotalSims or CompTIA A+
Links to a collection o Mike Meyers’ avorite tools and utilities or PC troubleshooting
System Requirements
The current and previous major versions o the ollowing desktop browsers are recommended
and supported: Chrome, Microsot Edge, Fireox, and Saari. These browsers update requently,
and sometimes an update may cause compatibility issues with the TotalTester Online or other
content hosted on the Training Hub. I you run into a problem using one o these browsers,
please try using another until the problem is resolved.
Your Total Seminars Training Hub Account
To get access to the online content you will need to create an account on the Total Seminars
Training Hub. Registration is ree, and you will be able to track all your online content using your
account. You may also opt in i you wish to receive marketing inormation rom McGraw Hill or
Total Seminars, but this is not required or you to gain access to the online content.
Privacy Notice
McGraw Hill values your privacy. Please be sure to read the Privacy Notice available during
registration to see how the inormation you have provided will be used. You may view our
Corporate Customer Privacy Policy by visiting the McGraw Hill Privacy Center. Visit the
mheducation.com site and click Privacy at the bottom o the page.
321
322
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Single User License Terms and Conditions
Online access to the digital content included with this book is governed by the McGraw Hill
License Agreement outlined next. By using this digital content you agree to the terms o
that license.
Access To register and activate your Total Seminars Training Hub account, simply ollow
these easy steps.
1. Go to this URL: hub.totalsem.com/mheclaim
2. To register and create a new Training Hub account, enter your e-mail address, name,
and password on the Register tab. No urther personal inormation (such as credit
card number) is required to create an account.
I you already have a Total Seminars Training Hub account, enter your e-mail address
and password on the Log in tab.
3. Enter your Product Key: dqvf-v30w-ngxh
4. Click to accept the user license terms.
5. For new users, click the Register and Claim button to create your account. For existing
users, click the Log in and Claim button.
You will be taken to the Training Hub and have access to the content or this book.
Duration of License Access to your online content through the Total Seminars Training Hub
will expire one year rom the date the publisher declares the book out o print.
Your purchase o this McGraw Hill product, including its access code, through a retail store
is subject to the reund policy o that store.
The Content is a copyrighted work o McGraw Hill, and McGraw Hill reserves all rights in
and to the Content. The Work is © 2023 by McGraw Hill.
Restrictions on Transfer The user is receiving only a limited right to use the Content or
the user’s own internal and personal use, dependent on purchase and continued ownership
o this book. The user may not reproduce, orward, modiy, create derivative works based
upon, transmit, distribute, disseminate, sell, publish, or sublicense the Content or in any way
commingle the Content with other third-party content without McGraw Hill’s consent.
Limited Warranty The McGraw Hill Content is provided on an “as is” basis. Neither
McGraw Hill nor its licensors make any guarantees or warranties o any kind, either express
or implied, including, but not limited to, implied warranties o merchantability or itness or
a particular purpose or use as to any McGraw Hill Content or the inormation therein or
any warranties as to the accuracy, completeness, correctness, or results to be obtained rom,
APPENDIX About the Online Content
accessing or using the McGraw Hill Content, or any material reerenced in such Content or
any inormation entered into licensee’s product by users or other persons and/or any material
available on or that can be accessed through the licensee’s product (including via any hyperlink or otherwise) or as to non-inringement o third-party rights. Any warranties o any
kind, whether express or implied, are disclaimed. Any material or data obtained through use
o the McGraw Hill Content is at your own discretion and risk and user understands that it
will be solely responsible or any resulting damage to its computer system or loss o data.
Neither McGraw Hill nor its licensors shall be liable to any subscriber or to any user or
anyone else or any inaccuracy, delay, interruption in service, error or omission, regardless o
cause, or or any damage resulting thererom.
In no event will McGraw Hill or its licensors be liable or any indirect, special or consequential damages, including but not limited to, lost time, lost money, lost proits or good will,
whether in contract, tort, strict liability or otherwise, and whether or not such damages are
oreseen or unoreseen with respect to any use o the McGraw Hill Content.
TotalTester Online
TotalTester Online provides you with a simulation o the CompTIA A+ Core 1 exam, 220-1101.
The exam can be taken in Practice Mode or Exam Mode. Practice Mode provides an assistance
window with hints, explanations o the correct and incorrect answers, and the option to
check your answer as you take the test. Exam Mode provides a simulation o the actual exam.
The number o questions, the types o questions, and the time allowed are intended to be an
accurate representation o the exam environment. The option to customize your quiz allows
you to create custom exams rom selected domains, and you can urther customize the number
o questions and time allowed.
To take a test, ollow the instructions provided in the previous section to register and
activate your Total Seminars Training Hub account. When you register, you will be taken to
the Total Seminars Training Hub. From the Training Hub Home page, select your certiication
rom the list o “Your Topics” on the Home page, and then click the TotalTester link to launch
the TotalTester. Once you’ve launched your TotalTester, you can select the option to customize
your quiz and begin testing yoursel in Practice Mode or Exam Mode. All exams provide an
overall grade and a grade broken down by domain.
Pre-Assessment
In addition to the sample exam questions, the TotalTester also includes a CompTIA A+
pre-assessment test to help you assess your understanding o the topics beore reading the
book. To launch the pre-assessment test, click Pre-Assessment Test or the Core 1 exam.
The A+ Pre-Assessment test is 50 questions and runs in Exam Mode. When you complete
the test, you can review the questions with answers and detailed explanation by clicking See
Detailed Results.
323
324
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
Mike’s CompTIA A+ Video Training Sample
Over an hour o training videos, starring Mike Meyers, are available or ree. Select
CompTIA A+ Core 1 Passport (220-1101) Resources rom the list o “Your Topics” on the
Home page. Click the TotalVideos tab. Along with access to the videos, you’ll ind an option
to purchase Mike’s complete video training series rom the Total Seminars website www
.totalsem.com.
There are over an hour o ree videos available or study. You can purchase Mike’s complete
video training series rom the Total Seminars website www.totalsem.com.
TotalSims Sample for CompTIA A+
From your Total Seminars Training Hub account, select CompTIA A+ Core 1
Passport (220-1101) Resources rom the list o “Your Topics” on the Home page.
Click the TotalSims tab. There are over 20 ree simulations available or reviewing topics covered in the book. You can purchase access to the ull TotalSims or
A+ with over 200 simulations rom the Total Seminars website, www.totalsem.com.
Mike’s Cool Tools
Mike loves reeware/open-source PC troubleshooting and networking tools! Access the utilities
mentioned in the text by selecting CompTIA A+ Core 1 Passport (220-1101) Resources rom
the list o “Your Topics” on the Home page. Click the Book Resources tab, and then select
Mike’s Cool Tools.
Technical Support
For questions regarding the TotalTester or operation o the Training Hub, visit www.totalsem
.com or e-mail support@totalsem.com.
For questions regarding book content, visit www.mheducation.com/customerservice.
Index
NUMBERS
1G cellular networks, 28
2-bit preetch, 142
2G cellular networks, 28
3-D printers, 244–246
3G cellular networks, 29
4G cellular networks, 29
5G cellular networks, 30
110 block, 108
A
A records, 91
AAA servers, 74
AAAA records, 91
AC (alternating current), 200
access points (APs), 52
accessories
headsets, 22
speakers, 22
touch pens, 22
webcams, 15, 22
AC/DC converters, 202
active cooling, 193
active heatsink, 194
active power actor correction (active PFC), 207
activity lights, 192
adapters, 137
DVI to VGA, 137
USB to Ethernet, 138
additive manuacturing, 244
See also 3-D printers
add-on cards, 188, 189
Advanced RISC Machine (ARM), 185
Advanced Technology eXtended. See ATX
amps, 206
antennas, connector/placement, 15
anti-spam appliances. See spam gateways
APIPA addresses, 318
Apple iCloud, synchronizing to an Android
device, 37–38
applications
corporate, 36
crashes, 280
not loading, 300
streaming, 260
virtualization, 260–261
ATA drives, 130
attack mitigation, 179
ATX, 163–165
audio
no sound rom speakers, 301
troubleshooting issues, 291
audit logs, 223
authorization, 179
automatic document eeders (ADFs), 225
automatic identiication and data capture
(AIDC), 70
Automatic Private IP Addressing (APIPA),
81, 318
B
badging, 223
batteries, troubleshooting, 295
beep codes, 275–276
Berg connectors, 136
best practice methodology, 272–273
billing, 253
biometrics, 10
See also security
BIOS, 173
passwords, 182
setup utility, 175
325
326
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
BIOS/UEFI, 171
settings, 173–182
blue screen o death (BSoD), 276–277
Bluetooth, 21, 31–32, 66
enabling and pairing, 66–68
Blu-ray discs, 160–161
boot options, 177–178
boot passwords, 182
booting problems, 281, 285
broadcast domains, 51
broken screens, 296
burning smell, 279
buses. See expansion bus architectures
C
cable modems, 56–57
cable services, 100
cable strippers, 106
cable testers, 110
cables
coaxial, 116, 121
common 802.3 Ethernet cable codes, 118
common Ethernet cable types, 117
copper, 116–118
direct-burial underground, 119–120
DVI-to-HDMI, 137
Ethernet cable medium standards, 122
iber optic, 116, 121–122
hard drive, 128–130
peripheral, 122
plenum-rated, 120
shielded twisted pair (STP), 118–119
troubleshooting cabling issues, 290
twisted pair (TP), 116
Type 3 (PoE++), 55
Type 4 (higher-power PoE), 55
unshielded twisted pair (UTP), 118
video, 127–128
cameras, 15, 22
capacitor swelling, 280
capacity, 171
capture cards, 190–191
CDMA, 31
CDs, 160
cellular Internet connections, 101
cellular location services, 32–34
cellular network connectivity
enabling/disabling cellular communication,
27–28
See also network connectivity
channels, 64–65
chipsets, 171
ciphertext, 182
See also encryption
clicking sounds, 285
clients, 50
cloud computing
community cloud, 251
deployment models, 250–252
desktop virtualization, 256
downtime limits, 255
elasticity/scalability, 254
ile synchronization, 255–256
high availability, 254–255
hybrid cloud, 251
metered utilization, 253
printing, 220
private clouds, 250
public clouds, 250
service models, 251–252
shared resources, 252–253
cloud service providers (CSPs), 251
CLP. See connectionless protocols
CMOS, 173
setup utility, 175–177
coaxial cables, 116, 121
F-type connectors, 133
code division multiple access. See CDMA
combo drives, 160
Common Unix Printing System (CUPS), 217
community cloud, 251
complex instruction set computing (CISC)
architecture, 184–185
CompTIA troubleshooting methodology,
272–273
conductivity, 195
conidentiality, 179
connection methods, 18
Bluetooth, 21, 31–32
hotspots, 22
Lightning connectors, 21
micro-USB, 20
mini-USB, 20
Index
near-ield communication (NFC), 21
serial interaces, 21
USB, 18–19
USB-C, 19
connectionless protocols, 46, 48
connection-oriented protocols, 45–46, 47
connectivity, troubleshooting, 297, 310,
314–316
connectors, 130–131
Berg, 136
iber optic cable connectors, 133–134
F-type, 133
Lightning connectors, 136
Lucent connector (LC), 134
Molex, 135–136
punchdown block, 134–135
registered jack (RJ), 131–133
serial, 126
straight tip (ST), 134
subscriber connector (SC), 134
Thunderbolt, 126–127
USB, 122–125
video, 127–128
and voltages, 204
consumer premises equipment (CPE), 133
cooling mechanisms, 192–197
COPs. See connection-oriented protocols
copper cables, 116–118
CPUs
cooling mechanisms, 192–197
eatures, 183–188
socket type, 170
crash screens, 276–277
crimpers, 106
cross-platorm virtualization, 260–261
cursor drit, 299
cyclic redundancy checks (CRCs), 59
D
data loss prevention (DLP), 76
data loss troubleshooting, 286
data source, incorrect, 290
data synchronization. See synchronization
DB-9 connectors, 126
DC (direct current), 200
DDR memory, 142–143
DDR SO-DIMM, 6
DDR2 SO-DIMM, 6
DDR3, 142
DDR3 SO-DIMM, 6, 7, 145
DDR3L SO-DIMM, 6
DDR4, 142
DDR4 SO-DIMM, 6, 7, 146
DDR5, 142
DDR5 SO-DIMM, 6, 7, 146
decryption, 301
Desktop as a Service (DaaS), 256
desktop virtualization, 256
desktops, compatibility, 172
device drivers, 212–215
device ailures, 282
device sharing, 218–220, 221–222
DHCP, 48, 83
IPv4 vs., 83–85
leases, 93
operations, 92–93
reservations, 86
scope, 93–94
servers, 73
digital subscriber line. See DSL
digitizers, 16
troubleshooting, 298
DIMMs, 6, 141
handling and installing, 144–145
removing, 145
See also SO-DIMMs
direct thermal printing. See thermal printers
direct-burial underground cables, 119–120
direct-lit LED, 14
disk mirroring/duplexing, 159
disk striping, 159
with distributed parity, 160
display, 12
broken screens, 296
display panel components, 14–16
LCD, 13
LED, 13–14
troubleshooting display issues, 290–292
types o, 13–14
display adapters, 188
DKIM records, 92
DMARC records, 92
327
328
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
DNS, 90
e-mail protection in, 92
operations, 90
record types, 90–91
servers, 73
docking stations, 23
Domain Name System. See DNS
Domain Naming Service. See DNS
DomainKeys Identiied Mail (DKIM), 92
dotted-octet notation, 80
double data rate (DDR) memory.
See DDR memory
DRAM. See dynamic RAM (DRAM)
drawing pads, 24
DSL, 68, 69, 101
DSL gateways, 57
DSL modems, 57
dual inline memory modules. See DIMMs
dual-channel memory architecture,
148–149
duplexing, 159, 225
Duplexing ADF (DADF), 225
duplexing assembly, 231, 237
DVDs, 160–161
DVI to HDMI cables, 137
DVI to VGA adapters, 137
dynamic address assignment, 83–86
Dynamic Host Coniguration Protocol.
See DHCP
dynamic RAM (DRAM), 141–142
See also RAM
E
ECC RAM, 149
edge-lit LED, 14
elasticity, 254
electromagnetic intererence (EMI), 10
Electronics Industry Association/
Telecommunications Industry Association
(EIA/TIA), 117
electrostatic discharge (ESD)
precautions, 3, 7
and RAM, 144
e-mail
corporate e-mail coniguration, 35
decrypting, 301
embedded SIM cards. See eSIM cards
EMI. See electromagnetic intererence (EMI)
Encapsulated PostScript (.eps) iles, 214
encryption, 182
hardware security module (HSM), 183
using TPM, 182–183
equivalent isotopically radiated power
(EIRP), 70
error messages, 282
error-correction code (ECC), 149
eSATA, 168
cables, 128–129
ESD. See electrostatic discharge (ESD)
eSIM cards, 27
Ethernet
cables, 55
hubs, 55
MFD connections, 216–217
expansion bus architectures, 166
expansion cards, 188–192
Extended Unique Identiier-64-bit (EUI-64), 82
external monitors, 300
external print servers, 219
See also printers
external SATA cables, 128–129
extruders, 245
F
an controls, 180–181
ans, 193
See also cooling mechanisms
Federal Communications Commission (FCC), 62
iber optic cables, 116, 121–122
connectors, 133–134
iber services, 100
iber-to-the-curb/iber-to-the-cabinet
(FTTC), 56, 100
iber-to-the-home (FTTH), 56, 100
iber-to-the-premises (FTTP), 56, 100
iber-to-the-node/iber-to-the-neighborhood
(FTTN), 100
ile servers, 73
ile shares, 73
ile synchronization, 255–256
File Transer Protocol. See FTP
irewalls, 53, 54
Index
ixed wireless access. See FWA
lash drives, 155
lash memory, 155–156
orm actors, 163, 171
small orm actor (SFF), 165
rames, 44, 59
requencies, 62–65
licensed, 69
requency, 65
rozen system, 301
FTP, 48
F-type connectors, 133
ull-array LED, 14
FWA, 68–69, 102
heat sinks, 193–195
HHDs. See solid-state hybrid drives (HHDs/SSHDs)
hosted desktop model, 256
hotspots, 22, 30
hot-swappable devices, 123, 129
HTTP, 47
HTTPS, 47
hubs, 55
hybrid cloud, 251
hybrid heatsink, 195
hypervisors, 256, 259, 262, 263, 264
installing and creating a virtual machine,
264, 265
installing the guest operating system,
264–267
G
gateways, 86, 87
Global Positioning System. See GPS
Global System or Mobile Communications.
See GSM
Google Workspace, synchronizing to an Android
or iOS device, 38
GPS, 34, 35
not unctioning, 302
graphics processing units (GPUs), 188
grinding noise, 280, 285, 309
GSM, 31
H
hard disk drives (HDDs), 152–153
replacing, 4–6
spindle speeds, 153
hard drives, 152–153
cables, 128–130
replacing, 4–6
hardware, 183
irewalls, 53
Internet connection hardware, 99
mounting hardware, 4, 5
networking, 50–60
virtualization, 186–188
harmonics, 207
HDDs. See hard disk drives (HDDs)
headers, 168–169
headsets, 22
I
IDE, 130
IDE drives, installing, 157–158
IEEE 802.11, 26
IEEE 802.11ah, 69
IEEE 802.3a (Standard PoE), 54
IEEE 802.3at (PoE+), 55
IEEE 802.3bt (PoE++), 55
images per minute (ipm), 225
IMAP4, 74
impact printers, 240–241
components, 243
maintenance, 244
print heads, 241–243
See also printers
impedance, 195
indicator lights, 282, 285, 300
Industrial, Scientiic, and Medical bands.
See ISM bands
Inormation Technology eXtended. See ITX
Inrastructure as a Service (IasS), 251
inkjet printers, 234
carriage belts, 237
duplexing assembly, 237
eeders, 236
ink cartridges, 235
maintenance and cleaning, 237–238
paper trays, 236
print heads, 235–236
print process, 237
329
330
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
inkjet printers (cont.)
rollers, 236
See also printers
in-plane switching (IPS) display, 13
insulation displacement connectors (IDCs),
134–135
Integrated Drive Electronics. See IDE
integrated print servers, 219
See also printers
intermittent shutdowns, 279
internal clouds, 250
internal print servers, 219
See also printers
International Telecommunication Union (ITU), 62
Internet appliances, 75
Internet connection types, 99
cable services, 100
cellular services, 101
connection hardware, 99
DSL, 101
iber services, 100
satellite connections, 99–100
wireless Internet service providers
(WISPs), 101–102
Internet o Things (IoT), 76
Internet SCSI (iSCSI), 130
intrusion detection systems (IDSs), 75
intrusion prevention systems (IPSs), 75
inverters, 16
IP addressing, 79–82
IP conlicts, 318
IPv4 addresses, 79, 80
vs. DHCP, 83–85
vs. IPv6, 82
IPv6 addresses, 79, 81–82
vs. IPv4, 82
IPv6 DHCPv6, 86
IPv6 link-local addresses, 86
ISM bands, 63–64
ITX, 165
J
jitter, 316
K
keyboards
replacing, 3
sticking keys, 299
L
LANs, 51, 102
laptops
hardware/device replacement, 2–11
major components, 2
RAM, 145–147
system board, 3
laser printers, 228
cleaning, 232–234
components, 229–231
duplexing assembly, 231
user assembly, 230–231
imaging drum, 230
imaging process, 228–229
maintenance, 231–232
pickup roller and separation pad, 231
transer belt, 231
transer roller, 231
See also printers
latency, 316
LCD displays, 13
LED displays, 13–14
legacy/embedded systems, 76
light-emitting diodes (LEDs), 13
Lightning connectors, 21, 136
line-o-sight (LoS) services, 69
wireless Internet service, 101–102
link lights, 192
link-local addresses, 81, 318
Linux
adding an Ethernet printer, 217
device drivers, 213
enabling and pairing Bluetooth, 68
veriying hardware virtualization is
enabled, 187–188
liquid cooling systems, 193, 197
liquid damage, 298
load balancers, 75
local area networks. See LANs
local hosts, 50
local multichannel distribution service (LMDS), 69
location services, 32–34
log entries, 282
logical address space, 184
logical addresses, 79
See also IP addressing
long-range ixed wireless connectivity, 68–69
loopback addresses, 80
loopback plugs, 111
Index
M
M.2 drives, installing, 158
M.2 orm actor, 9
M.2 interace, 169–170
M.2 SSD, 155
MAC addresses, 59, 79
macOS
adding an Ethernet printer, 217
device drivers, 212
enabling and pairing Bluetooth,
67–68
mail servers, 74
malware, 299
managed switches, 51
MANs, 102
manuacturers, 170
MDM. See mobile device management (MDM)
media access control (MAC) addresses,
59, 79
memory
architectures, 141–142
capability, 170
cards, 155, 156
error-correcting, 149
lash memory, 155–156
replacing, 6–9
shared memory, 9
virtual, 149
See also RAM
memory management units (MMUs), 149
metered utilization, 253
metering, 253
metropolitan area networks. See MANs
MFDs, 210–211
automatic document eeders (ADFs), 225
device connectivity, 215–217
device drivers, 212–215
device sharing, 218–220, 221–222
initial coniguration, 211–212
network scan services, 224
wireless printers, 217
micro-ATX, 165
microphones, 16
microSD. See SD cards
Microsot Surace Dock, 23
micro-USB, 20, 125
See also USB
mini-ITX (mITX), 165
Mini-PCIe, 9, 167
mini-SATA. See mSATA
miniSD. See SD cards
mini-USB, 20, 125
See also USB
mirroring, 256
mobile application management (MAM), 34,
35–36
mobile device management (MDM), 34, 35
mobile device synchronization, 36–39
mobile devices
charging, 296
compatibility, 172
troubleshooting, 295–302
See also laptops
modular power supplies, 206
Molex connectors, 135–136, 203
monitors, external, 300
motherboards
24-pin adapters, 205
compatibility, 170–172
connector types, 165–170
orm actors, 163–165
headers, 168–169
multisocket, 172–173
mounting hardware, 4, 5
mSATA, 154
multicore CPUs, 185
multiunction devices. See MFDs
multiple RAID, 160
multithreading, 186
MX records, 91
N
nano-ITX, 165
native virtualization, 186–188
near-ield communication (NFC), 21, 70
near-ield scanners, 10–11
nested RAID, 160
network adapters. See NICs
network addresses, 79
See also IP addressing
network connectivity
Bluetooth, 21, 31–32
cellular location services, 32–34
331
332
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
network connectivity (cont.)
enabling/disabling cellular communication,
27–28
GPS, 34, 35
GSM vs. CDMA, 31
hotspots, 22, 30
mobile application management (MAM),
34, 35–36
mobile device communication,
26–28
mobile device management (MDM),
34, 35
mobile device synchronization, 36–39
preerred roaming lists (PRLs), 31
product release instructions (PRIs), 31
wireless generations, 28–30
network hosts, services, 72–76
network interace cards. See NICs
network scan services, 224
network switches, 59
network TAP (test access point), 111, 112
network types, 102–103
networking
hardware, 50–60
sotware-deined networking (SDN), 60
troubleshooting problems, 314–318
unavailable resources, 317
Next Generation Form Factor (NGFF).
See M.2 interace
NICs, 57–59, 191–192
Non-Volatile Memory Express. See NVMe drives
NVMe drives, 6, 153, 154
O
on demand, 254
onboard video cards, 188
one-way synchronization, 256
operating systems (OSs)
missing drives, 287
OS not ound, 287
optical drives, 160–161
optical network terminals (ONTs), 56
organic LED (OLED), 14
Outlook (Exchange), synchronizing to an
Android or iOS device, 38–39
overheating, 278, 292, 298
owner’s manual, 3
P
packets, 44
pages per minute (ppm), 225
PANs, 32, 102
parallel ATA (PATA), 154
drives, 130
passive cooling, 193
passive heatsink, 195
passwords, 179
boot passwords, 182
patch cables, 53
patch panels, 52–53, 134–135
PCI, 166
PCIe buses, 6, 154, 166–167
PCIe connectors, 203
PCIe lane, 166
perormance, sluggish, 278, 301
peripheral cables, 122
Peripheral Component Interconnect. See PCI
personal area networks. See PANs
physical addresses. See MAC addresses
pico-ITX, 165
piezo print heads, 236
Platorm as a Service (PaaS), 252
plenum space, 120
plenum-rated cables, 120
Plug and Play (PnP), 215
point o presence (POP), 133
POP3, 74
port clusters, 163, 164
port lapping, 316
port replicators, 23
ports, damaged, 298
POST beep codes, 275–276
PostScript, device drivers, 213–214
power loss, 277, 299
Power over Ethernet (PoE) injectors,
54, 55
Power over Ethernet (PoE) standards,
54–55
Power over Ethernet (PoE) switches,
54, 55
power supply rails, 202
power supply units (PSUs), 200
auto-switching, 202
input, 200–202
installation notes, 207–208
modular power supplies, 206
Index
number o devices/types o devices to be
powered, 207
output, 202–205
redundant power supplies, 205
switched input, 201
terminology, 201–202
preerred roaming lists (PRLs), 31
preetching, 142
print head stepper motor, 236
print heads, 235–236
print servers, 73
print spooler, 307, 308
Printer Control Language (PCL), device drivers,
213, 215
printers, 307
3-D, 244–246
automatic document eeders (ADFs), 225
calibration, 227–228
cloud printing, 220
coniguration settings, 220–221
impact, 240–244
inkjet, 234–238
laser, 228–234
network scan services, 224
paper jams and eeding problems, 306
print servers, 219, 220
public and shared, 218–219
remote printing, 220
security, 222–224
thermal, 239–240
troubleshooting, 304–311
wired, 218, 222
wireless, 217, 218, 222
See also MFDs
private addresses, 80
private clouds, 250
product release instructions (PRIs), 31
protocols, 44–45
connection-oriented vs. connectionless,
45–48
See also specific protocols
proxy servers, 75–76
public addresses, 80
public clouds, 250
public printers, 218
See also printers
punch block, 134–135
punchdown block, 134–135
punchdown tool, 108–110
Q
quad-channel memory architecture, 149
quick connect block, 134–135
R
radio transmit power, 70
radio-requency identiication (RFID), 70
RAID, 159–160
ailure, 286
troubleshooting, 285–287
RAM, 140
conirming RAM installation, 148
double data rate (DDR) memory, 142–143
dual inline memory modules (DIMMs),
141, 144–145
dynamic RAM (DRAM), 141–142
error-correcting, 149
laptop RAM, 145–147
memory architectures, 141–142
packages, 140–145
perormance conigurations, 148–149
removing, 8
replacing, 6–9
SO-DIMMs, 145–147
synchronous DRAM (SDRAM), 142
virtual, 149
rapid elasticity, 254
read/write ailure, 286–287
received signal strength indicator (RSSI), 70
redundant power supplies, 205
registered jack (RJ) connectors, 131–133
remote desktop services (RDS), 256
remote hosts, 50
remote printing, 220
resources, 50
Reversing ADF (RADF), 225
RF spectrum, 69
RJ-11 connectors, 131
RJ-45 connectors, 131, 132
ROM, 173–174
routers, 50
333
334
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
S
sandboxing, 259
SANs, 103
SATA, 153, 154, 168
SATA buses, 6
SATA cables, 128–129, 203
SATA drives, installing, 156–157
satellite connectivity, 68, 99–100
SCADA, 76
scalability, 254
scaling, 253
scatternet, 32
SCSI, 130
SD cards, 156
SDRAM. See synchronous DRAM (SDRAM)
Secure Boot, 180, 181–182
Secure Shell (SSH) protocol, 47
security
audit logs, 223
badging, 223
biometrics, 10
mobile device management (MDM),
34, 35
near-ield scanners, 10–11
overview, 9
physical, 10
printers, 222–224
secure print, 224
two-actor authentication, 36
user authentication, 222–223
Sender Policy Framework records, 92
serial ATA. See SATA
Serial Attached SCSI (SAS) devices,
21, 130
serial connectors, 126
serial interaces, 21
servers, 50
compatibility, 172
roles, 73–74
shared memory, 9
shared printers, 218–219
See also printers
shared resources, 252–253
shielded twisted pair (STP) cables, 118–119
shutdowns
intermittent, 279
troubleshooting projector shutdowns, 292
SIM cards, 27
SIMM, 141
single core CPUs, 185
single inline memory module. See SIMM
single memory channel, 148
sluggish perormance, 278, 301
Small Computer System Interace. See SCSI
small orm actor (SFF), 165
small oice/home oice networks,
79–88
S.M.A.R.T. ailure, 286
smoke, 279
SMTP, 74
SO-DIMMs, 6, 7, 145–146
handling and installing, 146–147
Sotware as a Service (SaaS), 252
sotware irewalls, 53
See also irewalls
sotware-deined networking (SDN), 60
SOHO networks, 79–88
solid-state drives (SSDs), 153–155
replacing, 4–6
solid-state hybrid drives (HHDs/SSHDs),
replacing, 4–6
sound cards, 189–190
spam gateways, 75
speakers, 22, 301
speed, 65, 315
speed lights, 192
SPF records, 92
spinning pinwheel o death (SPoD), 277
SSDs. See solid-state drives (SSDs)
SSHDs. See solid-state hybrid drives
(HHDs/SSHDs)
SSIDs, 318
stateul packet inspection (SPI), 53
Stateless Address Autoconiguration
(SLAAC), 86
static IP addresses, 86, 87
status indicators, 192
sticking keys, 299
storage area networks. See SANs
storage drives, troubleshooting, 285–287
Subscriber Identiication Module cards.
See SIM cards
supervisory control and data acquisition.
See SCADA
Index
swap iles, 149
swap spaces, 149
switches, 51, 59
synchronization, 36–37
Apple iCloud to an Android device,
37–38
Google Workspace to an Android or iOS
device, 38
Outlook (Exchange) to an Android or iOS
device, 38–39
synchronous DRAM (SDRAM), 142
syslog, 74
system compatibility, 172
system date/time, 281
system lockups, 281
T
T568A/B standards, 132–133
TCP
ports and protocols, 44–45
vs. UDP, 47
TCP/IP, 44
terminating blocks, 134–135
tethering. See hotspots
TFTP, 48
thermal conductors, 195–197
thermal interace material (TIM), 195
thermal pads, 195–196
thermal paper, 240
thermal paste, 196–197
thermal print heads, 236
thermal printers, 239–240
See also printers
thermal throttling, 197
thermoplastic material, 245
thrashing, 149
throttling, 197, 253
Thunderbolt, 126–127
ports, 23
tone generators. See toner probes
toner probes, 107–108
tools
cable strippers, 106
cable testers, 110
crimpers, 106
loopback plugs, 111
network TAP (test access point),
111, 112
punchdown tool, 108–110
toner probes, 107–108
Wi-Fi analyzers, 107
touch calibration, 299
touch pens, 22
touchpads. See trackpads
touchscreens, 16, 300
TPM, 179–180, 182–183
trackpads, 24
Transmission Control Protocol. See TCP
triangulation, 33
triple-channel memory architecture, 149
Trivial FTP. See TFTP
troubleshooting, 275
application crashes, 280
attempts to boot to incorrect device, 281
burning smell and smoke, 279
capacitor swelling, 280
connectivity problems, 297
ans spin and no power to other
devices, 282
grinding noise, 280
inaccurate system date/time, 281
indicator lights, 282
intermittent device ailures, 282
intermittent shutdowns, 279
log entries and error messages, 282
mobile device issues, 295–302
networking issues, 314–318
no power, 277
overheating, 278
power-on sel-test beep codes,
275–276
printer issues, 304–311
proprietary crash screens, 276–277
RAID array problems, 285–287
sluggish perormance, 278
storage drives, 285–287
system lockups, 281
video, projector and display issues,
290–292
troubleshooting methodology, 272–273
Trusted Platorm Module. See TPM
335
336
Mike Meyers’ CompTIA A+ Core 1 Certifcation Passport
twisted nematic (TN) display, 13
twisted pair (TP) cables, 116, 117
two-actor authentication, 36
two-way synchronization, 256
TXT records, 91
U
UDP
ports and protocols, 44–45
TCP vs., 47
UEFI, 174
See also BIOS/UEFI
uniied threat management (UTM), 75
UNII bands, 64
universal serial bus. See USB
Unlicensed National Inormation Inrastructure
(UNII) bands. See UNII bands
unmanaged switches, 51
unshielded twisted pair (UTP) cables, 118
USB, 18–19
connection types, 124
connectors, 122–125
MFD connections, 216
permissions, 178–179
standards, 124
See also micro-USB; mini-USB;
serial interaces
USB to Ethernet adapters, 138
USB-C, 19, 21, 125
user authentication, 222–223
User Datagram Protocol. See UDP
V
vertical alignment (VA) display, 13
video
adapters and connectors, 137
cables and connectors, 127–128
cards, 188
troubleshooting video, projector and
display issues, 290–292
virtual address space (VAS), 184
virtual desktop inrastructure (VDI), 256
virtual local area networks. See VLANs
virtual machine managers (VMMs), 261
virtual memory, 149
virtual private networks. See VPNs
virtualization, 259
application virtualization, 260–261
cross-platorm virtualization,
260–261
desktop, 256
emulator requirements, 262
hypervisors, 256, 259, 262,
263–267
network requirements, 263
purpose o virtual machines, 259
resource requirements, 261–262
sandboxing, 259
security requirements, 262–263
test-driven development, 260
VLANs, 96
VoIP, poor quality, 316
volts, 206
VPNs, 94–95
W
WANs, 51, 102
wattage rating, 206–207
watts, 206
web servers, 74
webcams, 15, 22
wide area networks. See WANs
Wi-Fi, antenna connector/placement, 15
Wi-Fi analyzers, 107
Windows
adding an Ethernet printer, 217
device drivers, 212, 213
enabling and pairing Bluetooth,
66–67
veriying hardware virtualization is
enabled, 187
Windows Biometric Framework (WBF), 10
See also security
wire snips, 106
wire strippers, 106
wireless APs (WAPs), 52
Index
wireless cards, replacing, 9
wireless generations, 28–30
wireless local area network. See WLAN
wireless network connectivity
enabling/disabling Wi-Fi communication, 28
See also network connectivity
wireless networking standards, 65–66
wireless printers, 217
WLAN, 103
power and signal strength, 70
X
x64 architecture, 184
x86 architecture, 184–185
x86-64, 184
x86-based 64-bit ISA, 184
337
This page intentionally left blank
Your Next Move
Starts Here!
Get CompTIA certied to help achieve your career
goals and gain a powerful, vendor-neutral credential
that is trusted by employers.
Save 10%
when you purchase
your exam voucher
from CompTIA.org.
Use code:
MCGRAW10
WHY GET CompTIA CERTIFIED?
Increase your condence
91% of certication earners show
increased condence.*
Stand out to employers
64% of IT decision makers say certied
employees add value.**
Earn more money
77% of IT pros got a raise within six
months of earning their certication.*
Join a global community
92% of IT professionals hold at least
one certication.**
GET READY FOR EXAM DAY.
• Download the exam objectives: Visit CompTIA.org to nd the exam objectives for your IT
certication and print them out. This is your road map!
• Create your study plan: Decide how many hours each week you are going to dedicate to
studying, choose your preferred study tools and get to work. Studying is a unique experience.
Download a study plan worksheet on CompTIA.org.
• Get certied: If you haven’t already, use the coupon on this page when you purchase your exam
CHOOSE YOUR TESTING OPTION.
Online testing
Earn a CompTIA certication online, from your
home–or any quiet, distraction-free, secure
location–at a time that’s convenient for you.
In-person testing
Test at any of the Pearson VUE test centers
around the world, where you can use their
equipment under the supervision of a proctor.
To purchase your exam voucher and learn how to prepare for exam day, visit CompTIA.org.
*Pearson VUE 2021 Value of IT Certications
**2021 Global Knowledge IT Skills and Salary Report
Download