You are on page 1of 2

12.

Sound cards connect as x1 PCIe or PCI 26. The Registry is a database that stores
cards, and normally have PC 99 color- the settings for Windows. It can be
coded 1/8" mini-jacks for I/O and speakers, accessed by opening the Run prompt
and optical I/Os known as S/PDIF. and typing regedit.exe. Hives store
13. USB (Universal Serial Bus) can have up to settings; a commonly modified hive is
127 devices. USB 1.1 (full speed) runs at HKEY_LOCAL_MACHINE.
12Mbps with a max. cable length of 3 meters; 27. Remote Desktop software enables a user
USB 2.0 (high-speed) runs at 480Mbps, max to see, and control, the GUI of a remote
cable length: 5 meters. Computers usually computer.
The CompTIA A+ Cram Sheet have Type A connectors built in.
14. IEEE 1394a (FireWire 400) runs at
28. The %systemroot% in Windows 7/Vista/XP
is C:\Windows, and in 2000 is C:\Winnt.
400Mbps. FireWire 800 runs at 800Mbps. 29. Windows 7/Vista boot files include
This cram sheet contains the distilled, key facts about the CompTIA A+ 220-701 and 220-702
IEEE 1394b incorporates FireWire 800 Bootmgr, BCD. XP boot files include
exams. Review this information as the last step before you enter the testing center, paying special and also specifies 1600Mbps and NTLDR, Boot.ini, and NTdetect.com.
attention to those areas where you think that you need to the most review. 3200Mbps. IEEE 1394 chains can have
30. Directories can be added with the MD
up to 63 devices.
command, removed with the RD command,
15. Printers include laser, inkjet, thermal, and and navigated to with the CD command.
Hardware 7. Optical disc drives use removable media
impact (dot-matrix). The six steps in the
to store and retrieve data, typically 5.25". 31. File checking command-line tools that can
1. Motherboards connect everything together. laser printing process are 1. Cleaning, 2.
Types of optical discs include be used in Windows include Chkdsk and
Typical form factors include ATX (most Conditioning (charging), 3. Writing
. CD-ROM: Data CDs can typically hold SFC (System File Checker).
common), BTX, microATX, and NLX. (exposing), 4. Developing, 5. Transferring,
The chipset includes a northbridge that 700MBs, can read and write at up to and 6. Fusing. 32. A hard disk can have four partitions: up
connects the CPU, RAM, and x16 PCIe 52x (7.8MB/s), and rewrite at up to 32x to four primary partitions, but only one
devices, and southbridge that connects (4.8MB/s). extended partition. Logical drives are
. DVD-ROM: DVDs have a capacity
Software sections of an extended partition. The
secondary systems such as USB, SATA,
IDE, and sound. Types of expansion ranging from 4.7GB (DVD-5) to 17GB 16. Windows 7 min. requirements: CPU=1GHz, Active partition is the one that is booted
busses include PCI, AGP, PCI Express (DVD-18 dual-sided and dual-layered). RAM=1GB (2GB for 64-bit), Free disk from; it usually contains the OS.
(PCIe), AMR, CNR, and PC Card (PCMCIA). Recording technologies include space=16GB (20GB for 64-bit) 33. A service pack (SP) is a group of updates,
2. The central processing unit (CPU) or DVD+R, DVD-R, DVD+RW, and 17. Windows Vista min. requirements: bug fixes, updated drivers, and security
processor takes care of all calculations. DVD-RW. CPU=800MHz, RAM=512MB, and Free fixes installed from one downloadable
Common CPUs such as the Core 2 can . Blu-Ray: Blu-Rays are used for HD disk space=15GB. New features in Vista package or from one disc.
have multiple cores and usually connect and games, have a capacity of 50GB, include GUI called Aero, extended 34. Windows Update can be accessed from
to LGA775 sockets. and a write speed of between 1x and partitions, and UAC (User Account Control) Start > All Programs > Windows Update.
8x (36Mbps288Mbps). Blu-Ray that requires administrator credentials from 35. A hard disk can be maintained with
3. Random Access Memory (RAM) types
drives connect via SATA only. users to accomplish certain tasks. tools such as Disk Cleanup and Disk
include SDRAM, DDR, DDR2, DDR3,
RDRAM, and SODIMMs. 8. Floppy drives use 1.44MB 3.5" disks and 18. Windows XP min. requirements: Defragmenter (defrag.exe).
connect to the motherboard via 34-pin CPU=233MHz, RAM=64MB, Free disk 36. Backups can be accomplished in
4. ATX Power Supplies connect to the
data cable and 4-pin mini power connec- space=1.5GB. Windows 7/ Vista with Backup and Restore
motherboard by way of a P1 20-pin or
24-pin cable. Switchable between 115 tor. A LED that wont shut off indicates an 19. Setuperr.log contains setup errors during and in XP with NTBackup.
and 230 VAC. upside-down data cable. an installation of Windows. 37. System Restore can fix issues caused by
5. Hard disk drives are nonvolatile devices 9. Solid-state media includes USB flash 20. Graphical User Interface (GUI) includes the defective hardware or software by reverting
that store data, generally 3.5". Types of drives, CompactFlash, and Secure Digital desktop, icons, taskbar, Start menu, Quick back to an earlier time.
hard disks include (SD) cards. Launch, System Tray, application windows 38. F8 brings up the Advanced Boot Options
10. Laptops are smaller versions of desktop and dialog boxes, and gadgets. menu that includes options such as Safe
. PATA: Parallel ATA drives range
between 33MHz and 133MHz (Ultra PCs. They have replaceable items such 21. Command Prompt is the command-line Mode, Enable low-resolution video, and
ATA/33 through /133), use a 4-pin as keyboards, SODIMM RAM, displays, utility in Windows. To run in elevated mode: Last Known Good Configuration. Safe Mode
Molex power connector, 40-pin IDE inverters, optical discs, and 2.5" hard Click Start > All Programs > Accessories; boots the system with minimal drivers.
ribbon cable for data, and can be drives. Laptops use PC Card, CardBus, then right-click Command Prompt and 39. The Windows 7/Vista Windows Recovery
jumpered as single, master, slave, or and ExpressCard technologies. They have select Run as Administrator. Environment (WinRE) includes System
cable select. an Fn key for implementing secondary 22. Snap-ins are console windows that can Recovery Options such as Startup Repair,
. SATA: Serial ATA drives come in 150, key functions. be added to a Microsoft Management System Restore, and Command Prompt.
300, and 600MB/s versions, use a 11. Video cards connect to motherboards by Console (MMC). 40. Windows XP uses the Recovery Console
15-pin power connector, and 7-pin way of x16 PCIe (black), AGP (brown), or 23. Libraries in Windows 7 logically represent as its repair environment.
data connector. PCI (white) expansion slots. Video connec- user-defined collections of folders. 41. The Event Viewer warns about possible
. SCSI: Small Computer System tor types include DVI, VGA, HDMI, S-Video, 24. Common system tools include Device issues and displays errors as they occur
Interface drives range in transfer rates and Component Video/RGB. Common Manager, System Information tool, Task within three main log files: System,
from 160MB/s to 640MB/s, and use color depths include 16-bit, 24-bit, and Manager, Msconfig. Application, and Security. Security displays
68-pin, 80-pin, or serial connectors. 32-bit. Common resolutions include XGA
25. User data can be migrated using information if auditing has been turned on.
(1024x768), WXGA (1280x720), SXGA+
6. RAID stands for Redundant Array of (1280x1024), UXGA (1600x1200), WSXGA+ Windows Easy Transfer (Windows 7 and 42. A stop error (also known as a Blue Screen
Inexpensive Disks. RAID 0 is striping, (1680x1050), and WUXGA (1920x1200). Vista only), User State Migration Tool of Death or BSOD) completely halts the
RAID 1 is mirroring, and RAID 5 is striping (USMT), and Files and Settings Transfer operating system and displays a blue
with parity. RAID 0 is not fault tolerant. Wizard (XP). screen with various text and code.
Networking 49. Wireless Ethernet versions, including their It is a preventative measure that . Trojan Horses: Appear to perform
name, data transfer rate, frequency, and can be broken down into three desired functions but are actually
43. IPv4 addresses are 32-bit dotted-decimal modulation used categories: 1. Something the user performing malicious functions behind
numbers, for example, 192.168.1.1 and knows, for example a password or the scenes.
can be statically (manually) inputed or . 802.11a, 54Mbps, 5GHz, OFDM
PIN, 2. Something the user has, for . Spyware: Type of malicious software
dynamically assigned (DHCP). IP Classes . 802.11b, 11Mbps, 2.4 GHz, DSSS
example, a smart card or other security that is either downloaded unwittingly
include . 802.11g, 54Mbps, 2.4 GHz, OFDM token, and 3. Something the user is, from a website or is installed along
. Class A range: 1126, subnet mask: . 802.11n, 600Mbps (300 typical), 5 and for example, the biometric reading of a with some other third-party software.
255.0.0.0. Private: 10.x.x.x 2.4GHz, OFDM fingerprint or retina scan.
. Class B range: 128191, subnet mask: 58. Permission Inheritance: If you create a
50. Bluetooth is a short range technology . Antimalware software: Protects a
255.255.0.0. Private: 172.16.0.0 folder, the default action it takes is to
aimed at simplifying communications and computer from the various forms of
172.31.255.255 inherit permissions from the parent folder.
synchronization among network devices. malware, and if necessary, detects and
. Class C range: 192223, subnet mask: Bluetooth is divided into three classes. removes them. 59. Types of encryption include
255.255.255.0. Private: 192.168.x.x Class I has a maximum transmission range . Data backups: Backups enable you . Symmetric key: Uses a common
of 100 meters, Class II (the most common) to recover data after an attack or other shared key between the sender and
44. IPv6 addresses are 128-bit hexadecimal the receiver. Examples of symmetric
numbers, for example: 2001:7120:0000 has a range of 10 meters, and Class III is compromise, or system failure.
short range and hardly used at 1 meter. key technology include Encrypting File
:8001:0000:0000:0000:1F10. ::1 is the . Encryption: The act of changing
Bluetooth Version 1 has a maximum data System (EFS), BitLocker, WEP, WPA,
loopback address. Unicast IPv6 addresses information using an algorithm known
transfer rate of 721Kbps, and version 2 is Kerberos, AES, 3DES, and Rivest
are assigned to a single interface and are as a cipher to make it unreadable to
2.1Mbps. Cipher.
the most common type. anyone except users who possess the
51. Wireless encryption protocols include proper key to the data. . Asymmetric key: Uses two keys, one
45. Common network speeds are 1000Mbps is public, the other private. Examples
and 100Mbps. . WEP (Wired Equivalent Privacy), 64-bit . Data removal: Three common options:
key size (typical) of asymmetric key technology include
46. Common protocols include 1. Clearing. This is the removal RSA and ECC.
. FTP (File Transfer Protocol). Port 21 WPA (Wi-Fi Protected Access), 256-bit
.  of data with a certain amount of
. Encrypting File System (EFS):
TKIP (Temporal Key Integrity Protocol),
.  assurance that it cannot be
. SSH (Secure Shell). Port 22 Encrypts one or more files or folders
128-bit reconstructed.
. Telnet. Port 23 directly within the Properties page.
. AES (Advanced Encryption Standard), 2. Purging. Also known as sanitiz-
. SMTP (Simple Mail Transfer Protocol). . BitLocker: Encrypts an entire disk,
128-bit, 192-bit, and 256-bit ing; this is once again the removal
Port 25 available only on Vista Ultimate and
52. Port forwarding forwards an external of data, but this time, its done
Vista Enterprise.
. HTTP (Hypertext Transfer Protocol). network port to an internal IP address in such a way so that it cannot
Port 80 and port. be reconstructed by any known
. POP3 (Post Office Protocol). Port 110 53. Port triggering enables you to specify technique. CompTIA Six-Step
. HTTPS (HTTP Secure). Port 443 outgoing ports that your computer uses for 3. Destruction. This is when the Troubleshooting Process
special applications; their corresponding storage media is physically 60. Following is the newly revised CompTIA
47. Common cabling protocols include
inbound ports open automatically when the destroyed through pulverizing, six-step troubleshooting process:
. Category 3: 10Mbps incineration, and such.
sessions are established. 1. Identify the problem.
. Category 5: 100Mbps . User awareness: Employee training
2. Establish a theory of probable cause.
. Category 5e: Rated for 100Mbps and and education, easily accessible and
Security (Question the obvious.)
gigabit networks understandable policies, security-
54. Data security is the act of protecting data awareness emails, and online security 3. Test the theory to determine the cause.
. Category 6: Rated for 100Mbps and
gigabit networks from threats and possible corruption. resources. 4. Establish a plan of action to resolve the
Threats include problem and implement the solution.
48. Common command-line tools include 56. BIOS security includes supervisor and user
. Malicious software: Known as passwords, drivelock passwords, disabling 5. Verify full system functionality and if
. Ipconfig: Displays current TCP/IP malware, this includes computer applicable implement preventative
network configuration values; removable media, and setting the boot
viruses, worms, Trojan Horses, device priority to hard drive first. measures.
Ipconfig/all shows additional spyware, rootkits, and adware.
57. Malicious software, or malware, is software 6. 
Document findings, actions, and
information.
. Unauthorized access: Access to that is designed to infiltrate a computer outcomes.
. Ping: Tests whether another host is computer resources and data without
available over the network (example: system and possibly damage it without
consent of the owner. the users knowledge or consent. Types Student Area
ping 192.168.1.1)
. System failure: Computer crashes or include
. Tracert: Sends packets to test individual application failure. Fill in anything else you think will be valuable
destinations beyond the local . Virus: A virus is code that runs on a to you here.
. Social engineering: The act of computer without the users knowl-
computers network
manipulating users into revealing edge; it infects the computer when the
. Netstat: Shows the network statistics confidential information or performing code is accessed and executed. Types
for the local computer other actions detrimental to the user. include Boot Sector, Macro, Program,
. Nslookup: Used to query DNS servers Polymorphic, Stealth, and Multipartite.
55. Data security technologies that can
to find out DNS details including the
protect against, or help recover from, the . Worms: Worms are much like viruses
IP address of hosts
preceding threats include except that they self-replicate whereas
. Net: Used to map network drives, a virus does not.
. Authentication: This is the verifica-
view computers, and start and stop
tion of a persons identity, and it helps
services.
protect against unauthorized access.

You might also like