Regarding the Exams - Must present 2 forms of ID which include a signature Arrive early so you can review your materials The exams are 90 questions in 90 minutes The most difficult questions are presented first, it is wise to mark them and complete them last You will not be permitted to bring anything into the exam Read the questions carefully as they are often misleading, CompTIA is testing your understanding of their methodology more than general apprehension All unanswered questions will be marked incorrect Many questions will have multiple answers, be vigilant for any instructional text For task based questions, review them immediately to ensure you’ve completed all parts Introductory Practice Exam Core 1 1 C (C) / 2 D (A) / 3 AB (AB) / 4 A (A) / 5 C (C) / 6 CDE (CD) / 7 A (A) / 8 A (D) / 9 CD (CD) / 10 D (D) / 11 B (C) / 12 B (A) / 13 A (C) / 14 B (C) / 15 D (A) / 16 BD (AB) / 17 A (A) / 18 D (D) / 19 AD (CD) / 20 B (B) / 21 A (B) / 22 BD (AC) / 23 C (C) / 24 D (A) 25 A (D) / 26 A (A) / 27 D (B) / 28 D (D) / 29 D (C) / 30 D (D) / 31 C (D) / 32 A (B) / 33 C (C) / 34 B (C) / 35 D (B) / 36 BC (BC) Introductory Practice Exam Core 2 1 B (B) / 2 D (D) / 3 B (B) / 4 C (C) / 5 C (C) / 6 D (D) / 7 B (D) / 8 C (D) / 9 C (C) / 10 A (D) / 11 C (C) / 12 D (C) / 13 D (B) / 14 D (D) / 15 A (A) / 16 B (B) / 17 B (C) / 18 B (B) / 19 D (B) / 20 B (A) / 21 A (B) / 22 B (B) / 23 D (C) / 24 C (C) / 25 D (B) / 26 C (A) / 27 C (D) / 28 C (C) / 29 C (C) / 30 B (C) / 31 A (B) / 32 B (A) / 33 A (C) / 34 B (B) / 35 D (D) / 36 B (B) / 37 B (D) / 38 BD (BD) / 39 D (D) / 40 B (B) / 41 D (B) / 42 C (C) / 43 A (D) / 44 C (C) / 45 C (C) / 46 C (C) / 47 B (A) / 48 A (D) / 49 C (C) / 50 A (A) Glossary: ARM (Advanced RISC Machine) ATX (Advanced Technology eXtended) BIOS (Basic Input/Output System) Channel CISC (Complex Instruction Set Computer) Core CPU (Central Processing Unit) DDR (Double Data Rate) DIMM (Dual Inline Memory Module) ECC (Error Correction Code) Headers HSM (Hardware Security Module) ITX (Information Technology eXtended) M.2 Multisocket Multithreading PCI (Peripheral Component Interconnect) RAM (Random Access Memory) RISC (Reduced Instruction Set Computer) SAN (Storage Area Network) SATA (Serial Advanced Technology Attachment) SCSI (Small Computer System Interface) SODIMM (Small Outline Dual Inline Memory Module) TPM (Trusted Platform Module) UEFI (Unified Extensible Firmware Interface) USB (Universal Serial Bus) Virtualization VRAM (Virtual Random Access Memory) x64/x86 - Core 1 Notes Chapter 1 - Motherboards, Processors, and Memory Motherboards - - “The Big Three” of computer parts are the MOBO, CPU, and RAM The MOBO (aka System Board or Main Board) is the “spine” of the computer as it connects all the other components The MOBO is a PCB (Printed Circuit Board) MOBO must match form factor, and chipset as well as support all needed components ATX boards have the CPU and RAM slots at right angles to the expansion cards, this configuration aligns those components with the PSU fan exhaust providing cooling Standard ATX boards measure 12” x 9.6” (305mm x 244mm) ITX boards are lower power and smaller form factor ITX is a family of form factors: Mini, Nano, Pico, and Mobile Mini-ITX is compatible with ATX cases Bus Architecture - - Busses are signal pathways that send data between components Serial Busses send data 1 bit at a time, Parallel Busses send 1 byte through separate lines Modern PCs use serial transmissions since technology has improved the speed Serial communications include SATA, USB, IEEE 1394/FireWire, and PCIe The term bus is also used in any parallel or bit-serial wiring implementation where multiple devices can be attached at the same time in parallel or in series (daisy-chained). E.g. SCSI (Small Computer System Interface), USB, and Ethernet Busses will often need to synchronize speeds to function properly Chipsets - A chipset is a collection of chips or circuits that perform interface and peripheral functions for the processor The chipset dictates how a MOBO will communicate with its installed components Chipset naming conventions are decided by the manufacturer and can be easily referenced - Chipsets are made up of at least one integrated chip, sometimes these chips are obscured by cooling systems - Chipsets can be functionally categorized as Northbridge and Southbridge, however AMD and Intel have integrated these features into their CPUs rather than the MOBO - Northbridge - The Northbridge set performs the management of high-speed peripheral communications such as video and CPU to RAM communications - CPU to RAM and PCIe communications occur over the FSB (Front-Side Bus) - The Northbridge contains the clock signal that synchronizes components - The BSB (Back-Side Bus) connects the CPU to external cache memory and may not be present - If there is no BSB, the cache is placed on the FSB - The Northbridge controls the Southbridge - Southbridge - The Southbridge set performs the management of slower communications to peripherals such as USB, SATA, PATA, parallel ports, serial ports, etc. - The Southbridge does not need to keep up with the clock speed - Any component that would impose a bottleneck to the clock speed should be implemented on the Northbridge Expansion Slots - Expansion slots are typically 1-6” long and ½” wide PCI slots are outdated and have been mostly surpassed by PCIe slots PCI busses operate at 33 or 66 MHz over a 32-bit channel PCI busses have data rates of 133 or 266 MBps PCI operates at 3.3 or 5 V 5 V slot notches are oriented towards the front of the MOBO, 3.3 V to the back Mobile Devices (Wearables, Phones, Tablets, and Laptops) Migrating Drives In-Place Clone - Used when both drives can be simultaneously accessed by the computer Install cloning software > Shutdown/Discharge the computer > Connect the new device > Run the cloning software (be mindful of selecting the correct source and output) > Shutdown/Discharge the computer > Remove the old device > Install the new device (if initially connected externally) > Reboot and test Backup and Restore - Used when only one drive can be accessed at a given time Backup the old device > Obtain/Create Boot Media (via flash drive) > Shutdown/Discharge the computer > Remove the old device > Install the new device > Boot system from Boot Media > Restore system from created backup > Reboot and test Displays LCD (Liquid Crystal Display) uses an intermediate state of matter in which light-interacting crystals are rotated via electric signal allowing and disallowing the transmission of light. LCDs require backlighting to function which is commonly supplied by CCFL (Cold Cathode Fluorescent Light) or LED (Light Emitting Diode). Color is provided via transparent color filters which create a Red, Green, and Blue subpixel for each display pixel. An LED display is still an LCD display, the denotation of LED only means that its backlight is LED rather than CCFL. Twisted Nematic (TN) displays are quite inexpensive but offer the worst color quality and relatively poor viewing angles. TN Displays do have high response times offering minimal latency and high refresh rates. In-Plane Switching (IPS) displays are also inexpensive but more than TN displays. IPS features wider viewing angles, and response and refresh rates that are adequate for most purposes. IPS does offer the best color quality. Vertical Alignment (VA) displays are a good intermediate between the viewing angles and color quality of IPS and the speed of TN. Highest contrast ratio, but slower than TN. Quantum Light-Emitting Diode (QLED) displays are also LCD, but use quantum excitation in nanoparticles to preface the light emissions before they reach the liquid crystals. Organic Light Emitting Diode (OLED) displays emit light when an electric current is passed through an organic (carbon containing) semiconductor. OLED are relatively new, and do not require backlighting. OLED can display true blacks as there is no backlighting and their color quality is more accurate since the colored light is emitted directly rather than using color filters. OLED displays can bend, and are more common in smaller devices such as phones, wearables, and tablets. Color Depth - Number of bits per pixel available for providing color information to a display. This value indicates the bits-per-pixel for each of the three RGB colors. E.g. Total # of possible colors = (2n)3 : where n is color depth per pixel and 3 represents RGB. 8-bit color ~ 16.78 Million colors 10-bit color ~ 1.07 Billion colors Color Gamut - The range of visible colors (usually expressed as a %) that can be displayed with a given combination of display driver and monitor. Higher is better. These are measured within color standards (sRGB, Adobe RGB, NTSC, DCI-P3, etc.) so always compare monitors within the same standard. A Chromaticity diagram is a graphical representation of the color gamut. The colored space is the human color visibility spectrum, the inscribed regions are the representation areas of different color standards. LCD displays require an inverter to convert DC to AC power, whereas OLED or LED displays run on DC. Network Connectivity International Mobile Equipment Identity (IMEI) - A 15 or 17 digit cell phone identifier that enables a provider to blacklist a stolen device. International Mobile Subscriber Identity (IMSI) - A 15 digit (or less) cellular network identifier. Identifies the user on any and all cellular networks; stored on the SIM card. Global System for Mobiles (GSM) - More common outside US, used by AT&T and T-Mobile in US Code Division Multiple Access (CDMA) - More common inside US, used by Verizon and Sprint GSM and CDMA are common in 2G and 3G networks but are being phased out in favor of 4G, LTE, and 5G networks US carriers shutdown their GSM and CDMA networks in 2022 in favor of >4G networks Wifi connectivity on mobile devices usually sourced by a mini-PCIe card with integrated antenna Business and home networks provide a Wireless Access Point (WAP) which may be a single device or part of a router Modern devices support WiFi 6 (802.11ax) with up to 14Gbps over 2.4 or 5GHz bands Bluetooth devices operate over shorter distances and create a (Wireless) Personal Area Network (PAN/WPAN) Class 3 - <1m, Class 2 (Most Common) - <10m, Class 1 - <100m App Support and Synchronization Post Office Protocol (POP3) - User downloads emails, marks them for deletion on server, POP3 is designed for 1 client on 1 device Internet Message Access Protocol (IMAP) - Emails are kept on the server until the user deletes them, IMAP is designed for any client on any device Mobile clients in the Microsoft environment use Messaging Application Program Interface (MAPI) rather than IMAP or POP3. MAPI is useful for contacts, calendars, and synchronization Simple Mail Transport Protocol (SMTP) is the basic system for outgoing mail services Secure Sockets Layer (SSL) encrypts traffic between the client and server, can be enabled/disabled for incoming, outgoing mail, or both SSL usually operates on port 995 or 993 for incoming mail, 465 for outgoing SSL is more secure than SMTP, but it is not end-to-end encryption, meaning there is no guarantee of encryption when it arrives at its recipient server Secure Multipurpose Internet Mail Extensions (S/MIME) is a more robust encryption protocol that guarantees encryption, facilitates authentication via digital signatures, and ensures message integrity (meaning the message received is validated to match the message sent) S/MIME does offer end-to-end security, however this encryption prevents server side scanning for malware and spam as the server does not have the ability to decrypt traffic S/MIME requires a certificate system, a Public Key Infrastructure (PKI) Single Sign-On (SSO) is a system in which the local device is trusted and therefore the user only needs to sign into a computer with their microsoft account to gain automatic access to all microsoft suite applications SSO should be accompanied by MFA for security Mobile Device Management (MDM) - A utility for managing multiple mobile devices from a single device, facilitates the monitoring, securing, and administration of connected (typically corporate-owned) devices and typically across multiple platforms Mobile Application Management (MAM) - Focused on protecting corporate data and configuring business apps. MAM is less intrusive than MDM and is better for BYOD. MAM is targeted to users rather than devices MDM requires enrollment, MAM does not Networking Networking Configuration Concepts Internet Protocol (IP) - The principal set of digital message formats and rules for exchanging messages between computers across a single network or a series of interconnected networks IP Address - Logical numeric address assigned to an internet or network connected device IPv4 - 32 bit address therefore 4.2 billion addresses, current address pool is exhausted The first 3 numbers of an IPv4 address represent the network ID, the last number represent the host ID Subnet Mask - Used by TCP to determine which network a subnetwork is on, the subnet mask decodes the IP address IP address are divided into 5 classes A-E, only ABC are common Class A - 1-126 in the first octet / Subnet Mask 255.0.0.0 / Example 10.52.36.11 / CIDR /8 Class B - 128-191 first octet / Subnet Mask 255.255.0.0 / Example 172.16.52.63 / CIDR /16 Class C - 192-223 first octet / Subnet Mask 255.255.255.0 / Example 192.168.123.132 / CIDR /24 Class D - Multicast IP addresses Class E - Experimental IP addresses CIDR (Classless Inter-Domain Routing) - Alternative to class system IPv4 has private addresses in 16, 20, and 24 bit blocks that can be used to supplement the scarce public addresses Private addresses are remapped (translated) within a router through Network Address Translation (NAT) to an available public IP address that can connect to the internet The private address system allows public addresses to function for all devices within a household IPv6 - 128 bit address, creating plenty of public addresses, IPv6 uses hexadecimal addressing rather than decimal, and IPv6 is fully compatible with IPv4, addresses are 8 16-bit blocks Example IPv6 address: 2001:0000:3238:DFE1:0063:0000:0000:FEFB Binary Conversion - 0010000000000001 0000000000000000 0011001000111000 1101111111100001 0000000001100011 0000000000000000 0000000000000000 1111111011111011 Rules to shorten addresses: Discard the leading 0s 2001:0000:3238:DFE1:63:0000:0000:FEF If 2 or more consecutive blocks show only zeroes, replace with :: 2001:0000:3238:DFE1:63::FEF Then replace blocks of 0 with a single 0 2001:0:3238:DFE1:63::FEF Dynamic Host Configuration Protocol (DHCP) - DHCP servers assigns IP addresses temporarily, recurring devices will eventually be reserved addresses but eventually all addresses will change, uses UDP 67/68 Automatic Private IP Addressing (APIPA) - When a DHCP server is unavailable, the device will automatically assign itself an APIPA address also known as a Link-Local address, this allows the device to communicate on the local network but cannot access the internet Domain Name System (DNS) - Translates the domain name into an IP address, uses TCP/UDP 53 Gateway - A device located at the boundary of a network, the router is usually the gateway at home Two most common network protocols are TCP and UDP, facilitates the transmission of information between devices Both TCP and UDP are complements to the IP Transmission Control Protocol (TCP) - Connection-oriented protocol, requires a connection to be established before any data can be sent, after the data is sent the connection is terminated. TCP is the most reliable with error detection and systems to guarantee data integrity User Datagram Protocol (UDP) - Connectionless protocol, data is continuously sent to the recipient with only basic error checking and no confirmation, UDP is best for real-time communications or online gaming TCP can retransmit lost packets, while UDP cannot UDP is faster than TCP Network Port - A process-specific or application-specific software construct serving as a communication endpoint, which is used by the Transport Layer protocols of IP (TCP and UDP) File Transfer Protocol (FTP) - One of the most common protocols, moves files from one system or another, uses TCP 20/21 Secure Shell (SSH) - Most commonly used to manage network devices at the command level, uses TCP 22 Telnet - Similar use case to SSH but is not a secured connection and is therefore not recommended over public networks, uses TCP 23 Simple Mail Transfer Protocol (SMTP) - Popular protocol for email between mail servers and from end-users to email systems (e.g. Outlook), uses TCP 25 Hypertext Transfer Protocol (HTTP) - Used to display webpages, HTTP is unsecured, uses TCP 80 Hypertext Transfer Protocol Secure (HTTPS) - A secure version of HTTP, uses TCP 443 Post Office Protocol v3 (POP3) - Used to retrieve email from a server, uses TCP 110 Internet Message Access Protocol (IMAP) - More versatile email retrieval protocol (see POP3), uses TCP 143 Simple Network Management Protocol (SNMP) - Collects and organizes information about devices connected to the network, uses TCP/UDP 161/162, most commonly configured as UDP but can use TCP NetBIOS over TCIP/IP (NetBT) - Central protocol for interconnection for windows devices, uses TCP/UDP 137/138/139 Lightweight Directory Access Protocol (LDAP) - Used for accessing and maintaining distributed directory information, uses TCP/UDP 389 Server Message Block (SMB) - Foundation of windows networking, also known as Common Internet File System (CIFS), interconnectable but somewhat distinct, uses TCP 445 Remote Desktop Protocol (RDP) - Used for remote viewing within network, uses TCP 3389 Networking Hardware Hub - Early device to connect networks together, transmits any signal going into all data interfaces on the device, the hub operates at half-duplex meaning it only allows one device to communicate at a time, less efficient as traffic increases across the hub, hubs can only communicate at 10 or 100Mb/s Switch - Modern replacement for a hub, can analyze where the information needs to go and direct the traffic to the correct recipient through a hardware component Application Specific Integrated Circuit (ASIC), switches can vary in size depending on the intended use Switches can be unmanaged, meaning they allow all devices on a network to communicate, or managed which allows management of network ports and speeds Router - Device the facilitates communications between subnets, makes forwarding decisions on the destination IP based on an internal routing table, routers can connect Local Area Networks (LAN) to Wide Area Networks (WAN, Internet), sometimes routing is enabled within a switch and is called a layer/level 3 switch Access Point - A device that bridges the wireless connection to a wired connection (e.g. our home router), think of it as the wi-fi box, access points also make routing decisions Cable/DSL Modem - (Modem stands for Modulator/Demodulator) Converts the analog signal from a phone line into a digital signal, for cable/DSL connections Optical Network Terminal (ONT) - A modem for fiber technology, converts analog light signal to digital signal Firewall - Can be hardware or software, filters traffic by port number or application to block bad/unnecessary traffic Network Interface Card/Networking Card (NIC) - Connects device to networks Patch Panel - Used for large-scale enterprise networks, end-point for management of many ethernet cables Power over Ethernet (PoE) - A feature that allows transmission of electrical power over ethernet, common in network enabled security cameras, or VoIP telephones, it is usually provided by the switch but can also be provided by a PoE injector placed between the switch and the device IEEE 802.3af - PoE standard transmission - 12.95W - Cameras, VoIP phones IEEE 802.3at - PoE+ - 25.5W - PTZ cameras, alarm systems IEEE 802.3bt - PoE++ (Type 3) - 51W - Video conferencing, advanced access points IEEE 802.3bt - PoE++ (Type 4) - 71.3W - Laptops, screens Software-defined Networking (SDN) - A newer approach to managing network hardware, uses software-based controllers and APIs to communicate with connected devices, allows total control of the network from a single device, can control multiple networks from the same point ISP > Modem/ONT > Router > PoE Switch > Cameras V > Network Card Network and Internet Connection Personal Area Network (PAN) - Occupies very small spaces such as individual rooms, wirelessly can be Bluetooth, wired connections would include devices and peripherals. You may not consider these networks, but by definition they are. Local Area Network (LAN) - Occupies a building, useful for groups wanting to share resources and information among themselves, but not the wider world. LAN can be composed of many devices both wired and wireless. If a LAN consists of entirely wireless connections it is called a WLAN. Virtual Local Area Network (VLAN) - A system that allows partitioning of LAN into subgroups based on needs and functionality, allows for easier system management and creating specific application or security protocols depending on the partition. Metropolitan Area Network (MAN) - Connects multiple LANs together across multiple buildings or an entire municipality, e.g. college campuses or municipal server networks. Wide Area Network (WAN) - WAN can be any size larger than LAN, MAN can be WAN. WAN can span from multiple office buildings to multiple countries. The Internet is the most popular WAN. Storage Area Network (SAN) - Internal server that creates a dedicated high-speed network for sharing access between storage devices in an organization. SANs can be accessed by connected devices as though the storage devices were internal to the user’s computer. Digital Subscriber Lines (DSL) - Uses existing phone lines, should be called ADSL (Asymmetric) because download speeds are significantly faster than upload speeds. In theory, 100Mbps, most commonly ~7Mbps. Internet speed is inversely proportional to the distance from the ISP or nearest repeater. Cable - Uses existing cable coax connections. Uses the Data Over Cable Service Interface Specification (DOCSIS) standard. Speeds are offered in packages ranging from 10Mbps to 940Mbps, but commonly are capped at 300-400Mbps within larger municipalities. Speed is determined by the ISP. Fiber - Uses optical fiber cables to further increase speeds to 1-10Gbps. Satellite - Modem is directly connected to a satellite, most commonly used in remote sites or extremely rural areas without cable infrastructure. High cost, low speeds, high latency. Cellular - Connects via the cellular network, with speeds up to 1Gbps. Wireless Internet Service Providers (WISP) - Popular in rural regions without cable infrastructure, sets up towers similar to cell towers that have a fiber optic connection, homes or businesses use receivers to connect to the tower. Faster speeds and lower latencies than satellites. Protocols for Wireless Networking All devices with the Wi-Fi trademark adhere to an IEEE standard - Institute of Electrical and Electronics Engineers 802.11a - First wireless standard (1999), operated at 5GHz, up to 54 Mbps, but with a low range and sensitivity to physical barriers between the access point and device. Not common anymore. 802.11b - Sister standard to a, but at 2.4GHz and slower at 11Mbps, much greater range, 2.4GHz range can experience interference from devices on or near the same frequency, e.g. microwaves, baby monitors, cordless telephones 802.11g - 2003 upgrade to b, still operating at 2.4GHz but with 54Mbps. Backwards compatible with b 802.11n - 2009 upgrade, worked on both 2.4 and 5GHz bands, offered 600Mbps. Introduced Multiple-Input Multiple-Output antennas (MIMO), allowing multiple antennas in access points to achieve those higher speeds, MIMO is those routers with multiple antennas 802.11ac - Wi-Fi 5, introduced in 2014 only operates at 5GHz, using all MIMO streams it can achieve up to 7Gbps 802.11ax - Wi-Fi 6, introduced in 2019 operates on both 2.4 and 5GHz bands, 14Gbps 802.11ax-2021 - Wi-Fi 6E, approved by IEEE in 2021, not available in all countries yet, uses 6GHz band, is only backwards compatible with 802.11ax Wireless communications are regulated by the government (FCC in US), there are broadly 2 types of frequencies: licensed and unlicensed. Licensed frequencies require the user to buy a license to transmit within that frequency, offering greater reliability and bandwidth. Unlicensed frequencies can be used by anyone to transmit data but are still regulated. Wi-Fi frequencies are unregulated hence why you don’t need to apply for a license, the regulations are usually hardcoded into a wireless router, e.g. signal power. Example FCC regulation - Wi-Fi 6E (802.11ax-2021) routers can transmit with up to 36 dBm (decibels per milliwatt) of equivalent isotropic radiated power (EIRP), this is the total radiated power from the transmitter antenna multiplied by the numerical directivity of the antenna 2.4GHz refers to any frequency between 2.4-2.5GHz 5GHz = 5.1-5.8GHz 5.9GHz is “the safety band” and is partially reserved for transportation communications for autonomous vehicles and emergency vehicles communicating with traffic systems 2.4GHz includes 14 channels for signal, only 11 are used in the US Each channel is 20-22MHz wide with 16-22MHz of separation, most routers will automatically assign which channels are used but this can be configured manually On 2.4GHz only channels 1, 6, and 11 are non-overlapping channels 5GHz allows 24 20MHz non-overlapping channels with configurable wide channels that are 40, 80, or 160 MHz wide (160 may be referred to as super-wide), wider bandwidth allows for wider bandwidth 6GHz allows 7 160MHz non-overlapping channels Bluetooth is a wireless standard for shorter PAN utility, but with modern advances has a theoretical maximum range of 800 feet with Bluetooth 5.0 Operates at 2.4GHz, popularity is primarily due to the substantially reduced power consumption especially compared to Wi-Fi, there is even an extra low power variant called Bluetooth Low Energy (BLE) Bluetooth has significantly lower speeds at 1-3Mbps, enough for wireless peripherals but insufficient for internet traffic Near Field Communication (NFC) allows for wireless communication between compatible devices at very low range (<10cm), it can be passive (bus card, tap to pay) or active (phone, card reader), the active device is powered and activates the passive device to interact with it Radio-Frequency Identification (RFID) similar purpose to a barcode, UPC, or QR code but without the need for direct line-of-sight, commonly used to track items through systems Networked Hosts and Services Web servers deliver web based content, e.g. wikipedia.org, web servers can be public (accessible from outside via the internet) or private (organizational intranets). Web servers use many different technologies but common ones include Apache or Microsoft’s Internet Information Services (IIS) File servers create a central location to store documents and files, enterprise business often have a file share server Print servers manage and distribute print jobs among printers connected to the server, it allows users to print across multiple networked printers and gives administrators visibility and management capabilities Mail/Email servers manage email services within an organization, Microsoft’s Exchange Server is a popular option Syslog servers consolidate logs from multiple sources in a single location, e.g. routers, firewalls, web servers Authorization, Authentication, and Accounting (AAA) servers handle user authentication and permissions, authorizes users to access certain resources if they have been approved to by the owner, and audits/logs activity on the server for review if necessary. Microsoft’s Active Directory is a popular service Domain Name System (DNS) servers enable the DNS for users Dynamic Host Configuration Protocol (DHCP) servers enable the DHCP for users Load Balancers distribute traffic across multiple resources to balance the load on a server, they are very popular within web servers and web based applications, they also provide some fault tolerance since when a web server is down the load balancer will stop forwarding traffic to it Proxy servers handle external requests made by users on a network, it sits between the user and the server offering different levels of security such as a firewall or web filtering, privacy by changing IP addresses, and functionality such as blocking certain websites or caching web content Spam Gateways check email and block spam as well as offer some antivirus capabilities Unified Threat Management (UTM) combines multiple security features into a single hardware appliance, e.g. routing, firewall, VPN, Anti-Spam, DDOS protection, etc. Embedded systems are hyper-specialized computer systems designed for a singular purpose, e.g. monitoring valves Supervisory Control and Data Acquisition System (SCADA) is a very popular embedded system that are used in large scale industrial applications for monitoring sensors, valves, motors, pumps, etc. SCADA was not initially designed for network capabilities so there is often dedicated hardware to manage those devices, SCADA is relatively old so security is not robust Internet of Things (IoT) enables network connectivity to normally non-internet connected devices Networking Troubleshooting Tools Crimpers are used to create ethernet connections by allowing you to cut cables to exact lengths and press connectors onto the cable jacket, allows you to make custom ethernet cables Cable/Wire Strippers are used to remove the cable jackets Tone generator and probes are used to find two ends of a cable, connect one end to a generator and take the probe to where you think the end of the cable is and you will hear the tone, the probe does not need to be touching the cable Cable testers are used to validate all the pins on a network cable are properly connected, advanced testers can also measure signal loss and interference Loopback plugs are used to troubleshoot physical interfaces, it will make the computer think it is being connected to a network, but will instead retransmit information back to the computer, e.g. it allows you to see if what the computer sends is what is being received Punchdown tools are used to work with patch panels or punchdown blocks, it is used to physically connect wires to their connectors, it connects the wire and trims additional wire for better management Network Tap (Test Access Point/Terminal Access Point) is used to connect directly to the cabling infrastructure to split or copy packets for analysis, security, and network management Wi-Fi Analyzers are used to debug wireless networks, can be hardware or software, they show the signal strength and detect interference, helps to troubleshoot and optimize the wireless network Example Network Configuration Module You just bought a new house and you need to setup the network, it has a home office, and we need to optimize the network Getting Internet to the House Verify service availability from multiple ISPs, choose an available ISP and package, the initial package should be plug-and-play, install the modem and router Configuring Access Point Settings Find the IP address of the router, usually provided by the ISP or router manufacturer, navigate to the access portal and sign in, change the default administrator password, configuring the DNS, DHCP, and other protocol settings is done within the advanced settings area, configure the DHCP settings for IP range and subnet, configure the public DNS settings, configure your WAP settings including bands, channels, signal strength, security types Configuring End Devices Connect wireless devices, or connect wired devices to the routers, configure a static IP if desired, if setting up a static IP the gateway and preferred DNS should be your router, and ensure that your address is outside your router’s DHCP range Optimizing the Network Install Wi-Fi extenders or mesh systems as needed to ensure optimal signal strength throughout the house, configure Quality of Service (QoS) settings on your router, this allows you to set different priorities for network traffic by Mac address, IP address, port number, or application, e.g. setting the home office to take priority over streaming devices Advanced DNS Options Not common for home but for small business or enterprise networks, allows you to host applications like websites from your network, DNS records can be configured to host servers, direct email, and other functionalities. The A record is an IPv4 record that maps a name to an address for a website or load balancer service The AAAA record serves the same purpose for IPv6 Mail Exchanger (MX) records direct mail to a mail server, it will point to a domain name instead of an IP address, multiple MX records with different priorities in case a mail server goes down providing redundancy Text (TXT) records were originally used for human-readable notes but are now used for many purposes, such as domain ownership verification, and spam prevention Spam prevention through TXT allows detection of spoofed domains, SPF records list all the servers that are authorized to send email messages from a domain, DKIM signs each email using a public-private key pair, Domain-Based Message Authentication Reporting and Conformance (DMARC) authenticates email by aligning SPF and DKIM and has instructions for other servers on what to do with emails attempting to spoof your domain Hardware Internal Hardware Components Basic Input Output System (BIOS) - Firmware computer instructions embedded on the PCB that allow performing a Power-On Self Test (POST), allowing the computer to check what components are accessible and installed, vendors will periodically update their BIOS Complementary Metal-oxide Semiconductor (CMOS) - The settings available at the BIOS level, the user’s configuration settings for their BIOS Unified Extensible Firmware Interface (UEFI) - Similar but more recent BIOS upgrade, performs the same tasks as the BIOS but supersedes it, includes clickable settings, GPT disk boot, secure boot Trusted Platform Module (TPM) - A firmware cryptographic solution that generates secure hashes for boot integrity, TPM also encrypts data at rest and stores the hashing keys, TPM is available on motherboards or via PCI expansions BitLocker - A microsoft feature that encrypts certain disk partitions Hardware Security Module (HSM) - External cryptographic component that is more versatile than TPM, it performs key generation, key storage, encryption and decryption, hashing, and SSL / TLS offload to secure network communications Cables, Interface Connectors, and Power Integrated Drive Electronics (IDE) - Older standard that transmits using parallel, sometimes called PATA, 40 or 80 wire ribbon cable that connects to the motherboard. Small Computer System Interface (SCSI) - Traditionally a parallel standard, but there are serial variants in the world, internal and external variants for in/out-of-case connections Twisted Pair (TP) - Network cables that twist to avoid interference Coax - Singular wire cable T568A Wiring Standard - Is used for crossover (2-way) cables T568B Wiring Standard - Is used for straight-through cables Cat 5 - 100Mbps Cat 5e - 1Gbps Cat 6 - 10Gbps / 10m or 5Gbps / 100m Cat 6a - 10 Gbps / 100m Storage and Memory Redundant Array of Independent Disks (RAID) - A group of physical disks working together, provides increased performance and fault tolerance, disks can be hot swapped, RAID controllers are designated pieces of hardware or software to configure and use RAID disks RAID 0 - Striped Volume, at least 2 disks, all data is written across both disks to increase the performance, offers no fault tolerance RAID 1 - Mirrored Volume, at least 2 disks, all data is copied on disks to create redundancy but no increased performance RAID 5 - Striping with Distributed Parity, at least 3 disks, data is striped across disks with redundancy striping distributed across different disks, allowing rebuilding of any failed disks and increases performance RAID 10 - RAID 1 + RAID 0, at least 4 disks, combines mirroring and striping RAID 50 - RAID 5 + RAID 0, at least 6 disks, combines mirroring and striping with distributed parity Network Attached Storage (NAS) - Network storage accessible over a standard IP network, allows backup to cloud iSCSI - Deeper storage than NAS, uses TCP 3260, embed I/O commands in IP packets Cloud Storage - Using an external storage provider from an internal cloud server, if cloud is crucial ensure internet connectivity redundancy, automatic synchronization Printers and Multifunction Devices Laser printer - Rotating cylindrical imaging drum, laser writes a negatively charged image onto the drum, positively charged toner is then attracted to the drum, pickup rollers bring paper into the printer, a separation pad ensures that only one piece of paper is fed at a time, lastly the toner on the drum is the transferred to the negatively charged paper via a transfer belt which is part of the fuser assembly Inkjet printer - Uses ink cartridges that are moved across the paper by a carriage belt, rollers feed the paper into the printer, pressure or electrical pulses force the ink out of jet nozzles, these cartridges need to calibrated to match the size of the paper, cartridges are expensive, inkjet is one of the fastest printers Always reference the manual when servicing a printer Thermal printer - Common with POS receipts, uses heat sensitive paper, regions are heated to act like invisible ink Impact printer - Dot matrix printers that use a print head that uses electrical charges for pins to form shapes, print head pins then impact the paper through an ink ribbon to form characters on the paper, useful for printing multiple carbon copies in one print pass 3D printer - Useful for creating prototypes and simple components, additive design Virtualization and Cloud Computing Introduction to Virtualization and Cloud Computing Virtualization - The process of creating a software-based or virtual representation of something, such as virtual applications, servers, storage, and networks Hypervisor - Virtualization layer that has all the requisite drivers and applications to control the hardware Virtual machines can run multiple servers on a single motherboard/machine, virtual machines cannot cross-contaminate each other Major virtualization tools include: VMware (vSphere), Microsoft (Hyper-V), Citrix (Citrix Hypervisor), Oracle (Oracle VM Server), Red Hat Cloud Computing - Enables companies to consume a compute resource, such as a virtual machine, storage, or an application, as a utility rather than having to build and maintain computing infrastructures in situ The cloud provider owns the hardware and clients have access to a virtualized environment on that hardware Cloud consumption is metered like a utility and is billed on that usage Virtualization in the Real World Virtualization requires CPU capability (Intel VT-x, AMD-V), as well as enough RAM/Storage for workloads, the storage can be local or SAN Virtual machines are subject to the same security risks as a standard computer The network will need enough bandwidth to serve all requirements of the virtualized environments Type 2 Hypervisors run on OS Virtualization at the enterprise level uses level 1 (bare metal) hypervisors and do not have a superseding OS Cloud Computing in the Real World On-Premises - The client provides and manages all elements of the hardware and software. Pizza Analogy - Made from Scratch at Home Infrastructure as a Service (IaaS) - The service provider manages the networking, storage, servers, and virtualization hardware, while the client manages applications, data, runtime, middleware, and OS. Pizza Analogy - Buying a Frozen Pizza (still need oven, electricity, drinks, dining ware, table) Popular Services - Microsoft Azure, AWS, Google Compute Engine, Rackspace Best for - Test and development, storage and backups, high performance computing, big data analysis Platform as a Service (PaaS) - The service provider manages all elements except the applications and data. Pizza Analogy - Having it Delivered (still need drinks, dining ware, table) Popular Services - Heroku, Amazon Elastic Beanstalk, Azure Logic Apps Best for - Analytics or business intelligence, development framework Software as a Service (SaaS) - The service provider manages everything and the client pays to use the service. Pizza Analogy - Dining Out Popular Services - Microsoft 365, Google Workspace, Salesforce, Dropbox Best for - Gaining access to sophisticated applications without managing the infrastructure Public Cloud - A cloud vendor provides cloud services simultaneously to multiple clients using the same hardware securely Private Cloud - Hardware is only used by a single company, which often owns the hardware and datacenter Hybrid Cloud - Combination of public and private cloud with automation and orchestration of resources between the two Community Cloud - Infrastructure is shared by several organizations within a community with aligned concerns regarding security, compliance, and jurisdiction Most offerings are in public cloud, if not specified then the service is a public cloud Private and hybrid clouds have begun adopting PaaS and SaaS models that allow workloads to be transferred to public clouds more easily Community clouds are most commonly used by government bodies Virtual Desktop Infrastructure (VDI) - The process of running a user desktop inside a virtual machine that lives on a server in the datacenter. It is a useful form of desktop virtualization that enables fully personalized desktops for each user with all the security and simplicity of a centrally managed system. VDI can be used from any computing device (essentially as a boot option) and because it is borrowing hardware resources from the datacenter, the access point device does not need to be very powerful, it only needs to be able to access the VDI Enterprises can enforce security and compliance, as well as restrict certain applications and information to only being accessible through VDI VDI can exist through an on-premises/private or a public cloud Troubleshooting The Troubleshooting Methodology Identify the Problem Ensure the problem is properly understood, a symptom is not the problem, it is helpful to be able to recreate the symptoms. Ask what the user was doing when the problem arose, ask for exact error message details. Ask the user what has changed since the time when the system was functioning properly, are there any restore points or backups we can use to test, have configuration settings changed, have there been any updates applied, have there been network changes? Review relevant logs on the device or if there are network logs on parts of the infrastructure. The most important aspect is knowing which questions to ask and using deductive problem solving to narrow the range of possible causes. E.g. If more than one user is encountering the same problem, it is more likely the root cause is serverside rather than clientside. Establish a Theory of Probable Cause Ask what caused the problem symptoms, if you can recreate the problem then you will know what the cause is. There could be more than one probable cause and it should be investigated in the order of likelihood. In the event that no probable cause can be deduced, it will become necessary to escalate the issue to another department, the service provider, or other third-parties. Who you escalate to should be laid out within the company's policies. Start with the obvious possibilities: Is everything receiving power? Is everything plugged in properly? Have hardware components slipped out of position? For network issues: Were there any network device firmware updates? Is the network congested? Have the network configurations been modified? Always consult pre-existing knowledge bases either internal or external, it is extremely likely this problem has occurred and been solved elsewhere before. Test the Theory Start with the most likely cause, determine how best to test this problem, if possible use a virtual machine in a sandbox environment that runs a backup or snapshot of the user’s system. Your organization may have tools available for testing network connectivity, or the cloud provider may have troubleshooting tools. In case you are unable to test your theory, escalate. Only make one change at a time, document the changes as you make them. If your test fails, move to the next theory or develop a new theory, otherwise escalate. Establish a Plan of Action Determine how to roll out the fix, this may need to be scripted or automated for systemic problems, also prepare a rollback plan in case the fix causes unforeseen issues. Backup data and configurations, it will be easy to revert back. If you are not able to execute the plan, escalate. Determine the solution scope, is it only for a single user device, is it to a server which may impact many users? Plan the solution’s implementation, schedule the fix and notify users. Enact the plan, but always ensure there is a rollback plan. Verify System Functionality Are the affected users happy with the solution? How do we ensure this problem is not repeated? How do we track the implemented solution over time (logs, monitoring solutions, etc.) Discern whether the problem is solved, it may be necessary to consult Subject Matter Experts (SMEs) to determine whether the solution is appropriate and effective. E.g. If a fix is applied to a financial services tool, it may be helpful to consult someone familiar with those tools to verify our solution is good. Have new problems been introduced by the solution, this involves testing in a sandbox to perform regression testing. Can we make preventative changes to avoid this problem in the future? Document Findings Record the problem symptoms, record the solution details, update existing documentation where applicable. Document problems, actions, results. It could be reported in an IT incident report, add the solution to the knowledgebase, be sure to close IT tickets and update any relevant training materials. Hardware and Storage Issues Power issues Sometimes cables fail, other times batteries degrade, insufficient wattage from PSU may cause failures. Common symptoms - No POST, Intermittent Power, Random Card/Device failure, Fan Failure, Breakers Tripped. Test PSU with multimeter, try a different outlet, test PSU in a different machine MOBO, CPU, RAM issues Common symptoms - POST beeps/messages/indicators, blank screen on boot, BSOD, random reboots or shutdowns, CPU overheating, SPoD (Mac BSOD) Replace faulty components, disable overclocking, test RAM with tools, replace CMOS battery, check hardware logs Storage and RAID issues Common symptoms - Failure to read/write, clicking or grinding noise, slower performance, disk drive not recognized, bootable device not found, RAID not found Take common backups and ensure the integrity of the backups, Self-Monitoring Analysis and Reporting Technology (SMART) is disk drive firmware that provides LED display messages related to imminent or current problems, use RAID diagnostic tools, replace failed disks, test NAS connectivity, test disk volume, ensure cables are plugged in properly. Display and Printing Issues Ensure cables are plugged in properly, if the connection is wireless verify there is adequate signal strength. Consider electromagnetic interference (EMI) for longer cable runs. Consider the signal source device. Common problems - Multiple outputs, power loss, stuck in POST, failing battery, failing GPU, overheating GPU, bad drivers Boot in VGA mode, test components with different physical components, adjust the monitor controls, check temperature, check video settings, update or rollback driver, select correct input source, check OS settings Consider the type of printer we are troubleshooting, has anything in the IT environment changed, is the problem systemic or local? Common problems - Bad drivers, wrong paper type, too humid, paper jams, print settings, ink levels, bad permissions Check print job settings, check error logs through local access, use correct paper type, remove debris, connect through physical connections, repair printer, replace toner/ink, clean imaging drum Mobile Devices and Network Issues Mobile device issues Common problems - moisture or impact damage, faulty battery, overheating, flickering or dim displays, lack of response, broken screen, external display failure, ghost cursors, intermittent wi-fi, bluetooth not pairing, cellular failures, GPS failures, malware, updates, memory overloaded, bad apps, input issues Check relevant settings, check SIM card installation, check updates, run malware scans, uninstall recently apps, take the device in for repairs, reboot the device Wired network issues Common problems - Network switch error indicators, port flapping, cable failure, network congestion, card failure, hardware failure, EMI, permission problems Use ipconfig cmd, ping cmd, ping may be blocked by firewalls, tracert cmd to map the pathway, nslookup cmd to lookup destination IP Check IP settings, IPv4 APIPA address should be configured with 169.254 prefix, IPv6 link-local address should have an FE80 prefix, there could be IP conflicts Wireless network issues Common problems - Too distant, extender failure, EMI, poor quality, SSID hidden, MAC address filtering, authentication server failure, expired PKI certificate, slow network, congested network Core 2 Notes