Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902
CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902
CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902
Ebook1,217 pages12 hours

CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902

Rating: 5 out of 5 stars

5/5

()

Read preview

About this ebook

Complete, objective-by-objective review for the A+ exam

The CompTIA A+ Complete Review Guide, 3rd Edition is your ideal solution for preparing for exams 220-901 and 220-902. The perfect companion to the CompTIA A+ Complete Study Guide, 3rd Edition this book provides you with extra review and reinforcement of key topics you'll see on the exam. The material is broken into two parts that each focus on a single exam, then organized by domain objective so you can quickly find the information you need most. This new third edition has been updated to reflect the revised exams, with the latest best practices and an emphasis on Windows 8/8.1 and mobile OSes. You also get access to the exclusive Sybex online  learning environment featuring over 170 review questions, four bonus exams, 150 electronic flashcards, and a glossary of key terms — over 500 practice questions in all!

The CompTIA A+ certification is the essential computer technician credential, and is required by over 100 leading employers. This book gives you the review and practice you need to approach the exam with confidence.

  • Brush up on PC hardware, laptops, printers, and mobile devices
  • Review the fundamentals of networking and security
  • Delve into the latest operating systems and operating procedures
  • Troubleshoot common IT issues, and learn the latest best practices
LanguageEnglish
PublisherWiley
Release dateDec 1, 2015
ISBN9781119137894
CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902

Read more from Troy Mc Millan

Related to CompTIA A+ Complete Review Guide

Related ebooks

Hardware For You

View More

Related articles

Reviews for CompTIA A+ Complete Review Guide

Rating: 5 out of 5 stars
5/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    CompTIA A+ Complete Review Guide - Troy McMillan

    Introduction

    The A+ certification program was developed by the Computing Technology Industry Association (CompTIA) to provide an industry-wide means of certifying the competency of computer service technicians. The A+ certification is granted to those who have attained the level of knowledge and troubleshooting skills that are needed to provide capable support in the field of personal computers. CompTIA is a widely respected industry leader in this area.

    CompTIA’s A+ exam objectives are periodically updated to keep the certification applicable to the most recent hardware and software. This is necessary because a technician must be able to work on the latest equipment. The most recent revisions to the objectives—and to the whole program—were introduced in 2015 and are reflected in this book.

    This book and the Sybex CompTIA A+ Complete Study Guide (both the Standard and Deluxe Editions) are tools to help you prepare for this certification—and for the new areas of focus of a modern computer technician’s job.

    What Is A+ Certification?

    The A+ certification program was created to offer a wide-ranging certification, in the sense that it’s intended to certify competence with personal computers from many different makers/vendors. Everyone must take and pass two exams: 220-901 and 220-902.

    You don’t have to take the 220-901 exam and the 220-902 exam at the same time. The A+ certification isn’t awarded until you’ve passed both tests. For the latest pricing on the exams and updates to the registration procedures, call Pearson VUE at (877) 551-7587. You can also go to Pearson VUE for additional information or to register online at www.pearsonvue.com/comptia. If you have further questions about the scope of the exams or related CompTIA programs, refer to the CompTIA website at www.comptia.org.

    Who Should Buy This Book?

    If you want to acquire a solid foundation in personal-computer basics and your goal is to prepare for the exams by filling in any gaps in your knowledge, this book is for you. You’ll find clear explanations of the concepts you need to grasp and plenty of help to achieve the high level of professional competency you need in order to succeed in your chosen field.

    If you want to become certified as an A+ holder, this book is definitely what you need. However, if you just want to attempt to pass the exam without really understanding the basics of personal computers, this guide isn’t for you. It’s written for people who want to acquire skills and knowledge of personal-computer basics.

    How to Use This Book

    We’ve included several learning tools in the book. These tools will help you retain vital exam content as well as prepare to sit for the actual exams.

    Exam Essentials Each chapter includes a number of exam essentials. These are the key topics that you should take from the chapter in terms of areas on which you should focus when preparing for the exam.

    Chapter Review Questions To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers are in the Appendix. You can go back to reread the section that deals with each question you got wrong to ensure that you answer correctly the next time you’re tested on the material.

    Interactive Online Learning Environment and Test Bank

    The interactive online learning environment that accompanies CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902, Third Edition, provides a test bank with study tools to help you prepare for the certification exam—and increase your chances of passing it the first time! The test bank includes the following:

    Sample Tests All the questions in this book are provided, including the Chapter Tests that include the review questions at the end of each chapter. In addition, there are four Practice Exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.

    Flashcards One set of questions is provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.

    Other Study Tools A glossary of key terms from this book and their definitions are available as a fully searchable PDF.

    Go to http://sybextestbanks.wiley.com to register and gain access to this interactive online learning environment and test bank with study tools.

    Tips for Taking the A+ Exams

    Here are some general tips for taking your exams successfully:

    Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.

    Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information.

    Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what the question is asking.

    Don’t leave any unanswered questions. Unanswered questions are scored against you.

    There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either Choose two or Choose all that apply. Be sure to read the messages displayed to know how many correct answers you must choose.

    When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.

    On form-based tests (nonadaptive), because the hard questions will eat up the most time, save them for last. You can move forward and backward through the exam.

    For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at www.comptia.org.

    Performance-Based Questions

    CompTIA has introduced performance-based questions on the latest A+ exams. These are not the traditional multiple-choice questions with which you’re probably familiar. These questions require the candidate to know how to perform a specific task or series of tasks. More than likely the candidate will be presented with a scenario and will be asked to complete a task. They will be taken to a simulated environment where they will have to perform a series of steps and will be graded on how well they complete the task.

    CompTIA A+ 900 Series Exam Objectives

    CompTIA goes to great lengths to ensure that its certification programs accurately reflect the IT industry’s best practices. The company does this by establishing Cornerstone Committees for each of its exam programs. Each committee comprises a small group of IT professionals, training providers, and publishers who are responsible for establishing the exam’s baseline competency level and who determine the appropriate target audience level.

    Once these factors are determined, CompTIA shares this information with a group of hand-selected subject-matter experts (SMEs). These folks are the true brainpower behind the certification program. They review the committee’s findings, refine them, and shape them into the objectives you see before you. CompTIA calls this process a Job Task Analysis (JTA).

    Finally, CompTIA conducts a survey to ensure that the objectives and weightings truly reflect the job requirements. Only then can the SMEs go to work writing the hundreds of questions needed for the exam. And, in many cases, they have to go back to the drawing board for further refinements before the exam is ready to go live in its final state. So, rest assured, the content you’re about to learn will serve you long after you take the exam.

    Exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit the certification page of CompTIA’s website at www.comptia.org for the most current listing of exam objectives.

    CompTIA also publishes relative weightings for each of the exam’s objectives. The following tables list the objective domains and the extent to which they’re represented on each exam.

    The following sections show the objectives beneath each of these in more detail.

    CompTIA 220-901 Exam Objectives

    1.0 Hardware

    1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.

    Firmware upgrades – flash BIOS

    BIOS component information

    RAM

    Hard drive

    Optical drive

    CPU

    BIOS configurations

    Boot sequence

    Enabling and disabling devices

    Date/time

    Clock speeds

    Virtualization support

    BIOS security (passwords, drive encryption: TPM, LoJack, secure boot)

    Built-in diagnostics

    Monitoring

    Temperature monitoring

    Fan speeds

    Intrusion detection/notification

    Voltage

    Clock

    Bus speed

    1.2 Explain the importance of motherboard components, their purpose, and properties.

    Sizes

    ATX

    Micro-ATX

    Mini-ITX

    ITX

    Expansion slots

    PCI

    PCI-X

    PCIe

    miniPCI

    RAM slots

    CPU sockets

    Chipsets

    North bridge

    South bridge

    CMOS battery

    Power connections and types

    Fan connectors

    Front/Top-panel connectors

    USB

    Audio

    Power button

    Power light

    Drive activity lights

    Reset button

    Bus speeds

    1.3 Compare and contrast various RAM types and their features.

    Types

    DDR

    DDR2

    DDR3

    SODIMM

    DIMM

    Parity vs. non-parity

    ECC vs. non-ECC

    RAM configurations

    Single channel vs. dual channel vs. triple channel

    Single-sided vs. double-sided

    Buffered vs. unbuffered

    RAM compatibility

    1.4 Install and configure PC expansion cards.

    Sound cards

    Video cards

    Network cards

    USB cards

    FireWire cards

    Thunderbolt cards

    Storage cards

    Modem cards

    Wireless/cellular cards

    TV tuner cards

    Video capture cards

    Riser cards

    1.5 Install and configure storage devices and use appropriate media.

    Optical drives

    CD-ROM/CD-RW

    DVD-ROM/DVD-RW/DVD-RW DL

    Blu-ray

    BD-R

    BD-RE

    Magnetic hard disk drives

    5,400 rpm

    7,200 rpm

    10,000 rpm

    Hot-swappable drives

    Solid-state/flash drives

    Compact flash

    SD

    Micro-SD

    Mini-SD

    xD

    SSD

    Hybrid

    eMMC

    RAID types

    0

    1

    5

    10

    Tape drive

    Media capacity

    CD

    CD-RW

    DVD-RW

    DVD

    Blu-ray

    Tape

    DVD DL

    1.6 Install various types of CPUs and apply the appropriate cooling methods.

    Socket types

    Intel: 775, 1155, 1156, 1366, 1150, 2011

    AMD: AM3, AM3+, FM1, FM2, FM2+

    Characteristics

    Speeds

    Cores

    Cache size/type

    Hyperthreading

    Virtualization support

    Architecture (32-bit vs. 64-bit)

    Integrated GPU

    Disable execute bit

    Cooling

    Heat sink

    Fans

    Thermal paste

    Liquid-based

    Fanless/passive

    1.7 Compare and contrast various PC connection interfaces, their characteristics, and purpose.

    Physical connections

    USB 1.1 vs. 2.0 vs. 3.0

    Connector types: A, B, mini, micro

    FireWire 400 vs. FireWire 800

    SATA1 vs. SATA2 vs. SATA3, eSATA

    Other connector types

    VGA

    HDMI

    DVI

    Audio

    Analog

    Digital (optical connector)

    RJ-45

    RJ-11

    Thunderbolt

    Wireless connections

    Bluetooth

    RF

    IR

    NFC

    Characteristics

    Analog

    Digital

    Distance limitations

    Data transfer speeds

    Quality

    DRM

    Frequencies

    1.8 Install a power supply based on given specifications.

    Connector types and their voltages

    SATA

    Molex

    4/8-pin 12v

    PCIe 6/8-pin

    20-pin

    24-pin

    Specifications

    Wattage

    Dual rail

    Size

    Number of connectors

    ATX

    Micro-ATX

    Dual-voltage options

    1.9 Given a scenario, select the appropriate components for a custom PC configuration to meet customer specifications or needs.

    Graphic/CAD/CAM design workstation

    Multicore processor

    High-end video

    Maximum RAM

    Audio/video-editing workstation

    Specialized audio and video card

    Large fast hard drive

    Dual monitors

    Virtualization workstation

    Maximum RAM and CPU cores

    Gaming PC

    Multicore processor

    High-end video/specialized GPU

    High-definition sound card

    High-end cooling

    Home Theater PC

    Surround sound audio

    HDMI output

    HTPC compact form factor

    TV tuner

    Standard thick client

    Desktop applications

    Meets recommended requirements for selected OS

    Thin client

    Basic applications

    Meets minimum requirements for selected OS

    Network connectivity

    Home Server PC

    Media streaming

    File sharing

    Print sharing

    Gigabit NIC

    RAID array

    1.10 Compare and contrast types of display devices and their features.

    Types

    LCD

    TN vs. IPS

    Fluorescent vs. LED backlighting

    Plasma

    Projector

    OLED

    Refresh/frame rates

    Resolution

    Native resolution

    Brightness/lumens

    Analog vs. digital

    Privacy/antiglare filters

    Multiple displays

    Aspect ratios

    16:9

    16:10

    4:3

    1.11 Identify common PC connector types and associated cables.

    Display connector types

    DVI-D

    DVI-I

    DVI-A

    DisplayPort

    RCA

    HD15 (i.e., DE15 or DB15)

    BNC

    miniHDMI

    miniDin-6

    Display cable types

    HDMI

    DVI

    VGA

    Component

    Composite

    Coaxial

    Device cables and connectors

    SATA

    eSATA

    USB

    FireWire (IEEE 1394)

    PS/2

    Audio

    Adapters and convertors

    DVI to HDMI

    USB A to USB B

    USB to Ethernet

    DVI to VGA

    Thunderbolt to DVI

    PS/2 to USB

    HDMI to VGA

    1.12 Install and configure common peripheral devices.

    Input devices

    Mouse

    Keyboard

    Scanner

    Barcode reader

    Biometric devices

    Game pads

    Joysticks

    Digitizer

    Motion sensor

    Touch pads

    Smart card readers

    Digital cameras

    Microphone

    Webcam

    Camcorder

    MIDI-enabled devices

    Output devices

    Printers

    Speakers

    Display devices

    Input & Output devices

    Touchscreen

    KVM

    Smart TV

    Set-Top Box

    1.13 Install SOHO multifunction device/printers and configure appropriate settings.

    Use appropriate drivers for a given operating system

    Configuration settings

    Duplex

    Collate

    Orientation

    Quality

    Device sharing

    Wired

    USB

    Serial

    Ethernet

    Wireless

    Bluetooth

    802.11 (a,b,g,n,ac)

    Infrastructure vs. ad hoc

    Integrated print server (hardware)

    Cloud printing/remote printing

    Public/shared devices

    Sharing local/networked device via operating system settings

    TCP/Bonjour/AirPrint

    Data privacy

    User authentication on the device

    Hard drive caching

    1.14 Compare and contrast differences between the various print technologies and the associated imaging process.

    Laser

    Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing assembly

    Imaging process: processing, charging, exposing, developing, transferring, fusing and cleaning

    Inkjet

    Ink cartridge, print head, roller, feeder, duplexing assembly, carriage and belt

    Calibration

    Thermal

    Feed assembly, heating element

    Special thermal paper

    Impact

    Print head, ribbon, tractor feed

    Impact paper

    Virtual

    Print to file

    Print to PDF

    Print to XPS

    Print to image

    1.15 Given a scenario, perform appropriate printer maintenance.

    Laser

    Replacing toner, applying maintenance kit, calibration, cleaning

    Thermal

    Replace paper, clean heating element, remove debris

    Impact

    Replace ribbon, replace print head, replace paper

    Inkjet

    Clean heads, replace cartridges, calibration, clear jams

    2.0 Networking

    2.1 Identify the various types of network cables and connectors.

    Fiber

    Connectors: SC, ST and LC

    Twisted Pair

    Connectors: RJ-11, RJ-45

    Wiring standards: T568A, T568B

    Coaxial

    Connectors: BNC, F-connector

    2.2 Compare and contrast the characteristics of connectors and cabling.

    Fiber

    Types (single-mode vs. multi-mode)

    Speed and transmission limitations

    Twisted pair

    Types: STP, UTP, CAT3, CAT5, CAT5e, CAT6, CAT6e, CAT7, plenum, PVC

    Speed and transmission limitations

    Splitters and effects on signal quality

    Coaxial

    Types: RG-6, RG-59

    Speed and transmission limitations

    Splitters and effects on signal quality

    2.3 Explain the properties and characteristics of TCP/IP.

    IPv4 vs. IPv6

    Public vs. private vs. APIPA/link local

    Static vs. dynamic

    Client-side DNS settings

    Client-side DHCP

    Subnet mask vs. CIDR

    Gateway

    2.4 Explain common TCP and UDP ports, protocols, and their purpose.

    Ports

    21 – FTP

    22 – SSH

    23 – TELNET

    25 – SMTP

    53 – DNS

    80 – HTTP

    110 – POP3

    143 – IMAP

    443 – HTTPS

    3389 – RDP

    137-139, 445 - SMB

    548 or 427 - AFP

    Protocols

    DHCP

    DNS

    LDAP

    SNMP

    SMB

    CIFS

    SSH

    AFP

    TCP vs. UDP

    2.5 Compare and contrast various Wi-Fi networking standards and encryption types.

    Standards

    802.11 a/b/g/n/ac

    Speeds, distances, and frequencies

    Encryption types

    WEP, WPA, WPA2, TKIP, AES

    2.6 Given a scenario, install and configure SOHO wireless/wired router and apply appropriate settings.

    Channels

    Port forwarding, port triggering

    DHCP (on/off)

    DMZ

    NAT/DNAT

    Basic QoS

    Firmware

    UPnP

    2.7 Compare and contrast Internet connection types, network types, and their features.

    Internet connection types

    Cable

    DSL

    Dial-up

    Fiber

    Satellite

    ISDN

    Cellular

    Tethering

    Mobile hotspot

    Line-of-sight wireless Internet service

    Network types

    LAN

    WAN

    PAN

    MAN

    2.8 Compare and contrast network architecture devices, their functions, and features.

    Hub

    Switch

    Router

    Access point

    Bridge

    Modem

    Firewall

    Patch panel

    Repeaters/extenders

    Ethernet over Power

    Power over Ethernet injector

    2.9 Given a scenario, use appropriate networking tools.

    Crimper

    Cable stripper

    Multimeter

    Tone generator & probe

    Cable tester

    Loopback plug

    Punchdown tool

    Wi-Fi analyzer

    3.0 Mobile Devices

    3.1 Install and configure laptop hardware and components.

    Expansion options

    Express card/34

    Express card/54

    SODIMM

    Flash

    Ports/adapters

    Thunderbolt

    DisplayPort

    USB to RJ-45 dongle

    USB to Wi-Fi dongle

    USB to Bluetooth

    USB optical drive

    Hardware/device replacement

    Keyboard

    Hard drive

    SSD vs. hybrid vs. magnetic disk

    1.8in vs. 2.5in

    Memory

    Smart card reader

    Optical drive

    Wireless card

    Mini-PCIe

    Screen

    DC jack

    Battery

    Touchpad

    Plastics/frames

    Speaker

    System board

    CPU

    3.2 Explain the function of components within the display of a laptop.

    Types

    LCD

    TTL vs. IPS

    Fluorescent vs. LED backlighting

    OLED

    Wi-Fi antenna connector/placement

    Webcam

    Microphone

    Inverter

    Digitizer

    3.3 Given a scenario, use appropriate laptop features.

    Special function keys

    Dual displays

    Wireless (on/off)

    Cellular (on/off)

    Volume settings

    Screen brightness

    Bluetooth (on/off)

    Keyboard backlight

    Touch pad (on/off)

    Screen orientation

    Media options (fast forward/rewind)

    GPS (on/off)

    Airplane mode

    Docking station

    Physical laptop lock and cable lock

    Rotating/removable screens

    3.4 Explain the characteristics of various types of other mobile devices.

    Tablets

    Smartphones

    Wearable technology devices

    Smart watches

    Fitness monitors

    Glasses and headsets

    Phablets

    e-Readers

    Smart camera

    GPS

    3.5 Compare and contrast accessories and ports of other mobile devices.

    Connection types

    NFC

    Proprietary vendor-specific ports (communication/power)

    microUSB/miniUSB

    Lightning

    Bluetooth

    IR

    Hotspot/tethering

    Accessories

    Headsets

    Speakers

    Game pads

    Docking stations

    Extra battery packs/battery chargers

    Protective covers/water proofing

    Credit card readers

    Memory/MicroSD

    4.0 Hardware and Network Troubleshooting

    4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU, and power with appropriate tools.

    Common symptoms

    Unexpected shutdowns

    System lockups

    POST code beeps

    Blank screen on bootup

    BIOS time and settings resets

    Attempts to boot to incorrect device

    Continuous reboots

    No power

    Overheating

    Loud noise

    Intermittent device failure

    Fans spin – no power to other devices

    Indicator lights

    Smoke

    Burning smell

    Proprietary crash screens (BSOD/pin wheel)

    Distended capacitors

    Tools

    Multimeter

    Power supply tester

    Loopback plugs

    POST card/USB

    4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.

    Common symptoms

    Read/write failure

    Slow performance

    Loud clicking noise

    Failure to boot

    Drive not recognized

    OS not found

    RAID not found

    RAID stops working

    Proprietary crash screens (BSOD/pin wheel)

    S.M.A.R.T. errors

    Tools

    Screwdriver

    External enclosures

    CHKDSK

    FORMAT

    File recovery software

    Bootrec

    Diskpart

    Defragmentation tool

    4.3 Given a scenario, troubleshoot common video, projector, and display issues.

    Common symptoms

    VGA mode

    No image on screen

    Overheat shutdown

    Dead pixels

    Artifacts

    Color patterns incorrect

    Dim image

    Flickering image

    Distorted image

    Distorted geometry

    Burn-in

    Oversized images and icons

    4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.

    Common symptoms

    No connectivity

    APIPA/link local address

    Limited connectivity

    Local connectivity

    Intermittent connectivity

    IP conflict

    Slow transfer speeds

    Low RF signal

    SSID not found

    Hardware tools

    Cable tester

    Loopback plug

    Punchdown tools

    Tone generator and probe

    Wire strippers

    Crimper

    Wireless locator

    Command-line tools

    PING

    IPCONFIG/IFCONFIG

    TRACERT

    NETSTAT

    NBTSTAT

    NET

    NETDOM

    NSLOOKUP

    4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.

    Common symptoms

    No display

    Dim display

    Flickering display

    Sticking keys

    Intermittent wireless

    Battery not charging

    Ghost cursor/pointer drift

    No power

    Num lock indicator lights

    No wireless connectivity

    No Bluetooth connectivity

    Cannot display to external monitor

    Touchscreen non-responsive

    Apps not loading

    Slow performance

    Unable to decrypt e-mail

    Extremely short battery life

    Overheating

    Frozen system

    No sound from speakers

    GPS not functioning

    Swollen battery

    Disassembling processes for proper re-assembly

    Document and label cable and screw locations

    Organize parts

    Refer to manufacturer resources

    Use appropriate hand tools

    4.6 Given a scenario, troubleshoot printers with appropriate tools.

    Common symptoms

    Streaks

    Faded prints

    Ghost images

    Toner not fused to the paper

    Creased paper

    Paper not feeding

    Paper jam

    No connectivity

    Garbled characters on paper

    Vertical lines on page

    Backed up print queue

    Low memory errors

    Access denied

    Printer will not print

    Color prints in wrong print color

    Unable to install printer

    Error codes

    Printing blank pages

    No image on printer display

    Tools

    Maintenance kit

    Toner vacuum

    Compressed air

    Printer spooler

    CompTIA 220-902 Exam Objectives

    1.0 Windows Operating Systems

    1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).

    Features:

    32-bit vs. 64-bit

    Aero, gadgets, user account control, BitLocker, shadow copy, system restore, ready boost, sidebar, compatibility mode, virtual XP mode, easy transfer, administrative tools, defender, Windows firewall, security center, event viewer, file structure and paths, category view vs. classic view, previous versions.

    Side-by-side apps, Metro UI, Pinning, One Drive, Windows store, Multimonitor task bars, Charms, Start Screen, Power Shell, Live sign in, Action Center.

    Upgrade paths – differences between in-place upgrades, compatibility tools, Windows upgrade OS advisor

    1.2 Given a scenario, install Windows PC operating systems using appropriate methods.

    Boot methods

    USB

    CD-ROM

    DVD

    PXE

    Solid-state/flash drives

    Netboot

    External/hot-swappable drive

    Internal hard drive (partition)

    Type of installations

    Unattended installation

    Upgrade

    Clean install

    Repair installation

    Multiboot

    Remote network installation

    Image deployment

    Recovery partition

    Refresh/restore

    Partitioning

    Dynamic

    Basic

    Primary

    Extended

    Logical

    GPT

    Filesystem types/formatting

    ExFAT

    FAT32

    NTFS

    CDFS

    NFS

    ext3, ext4

    Quick format vs. full format

    Load alternate third-party drivers when necessary

    Workgroup vs. domain setup

    Time/date/region/language settings

    Driver installation, software, and windows updates

    Factory recovery partition

    Properly formatted boot drive with the correct partitions/format

    1.3 Given a scenario, apply appropriate Microsoft command-line tools.

    TASKKILL

    BOOTREC

    SHUTDOWN

    TASKLIST

    MD

    RD

    CD

    DEL

    FORMAT

    COPY

    XCOPY

    ROBOCOPY

    DISKPART

    SFC

    CHKDSK

    GPUPDATE

    GPRESULT

    DIR

    EXIT

    HELP

    EXPAND

    [command name] /?

    Commands available with standard privileges vs. administrative privileges.

    1.4 Given a scenario, use appropriate Microsoft operating system features and tools.

    Administrative

    Computer management

    Device manager

    Users and groups

    Local security policy

    Performance monitor

    Services

    System configuration

    Task scheduler

    Component services

    Data sources

    Print management

    Windows memory diagnostics

    Windows firewall

    Advanced security

    MSCONFIG

    General

    Boot

    Services

    Startup

    Tools

    Task Manager

    Applications

    Processes

    Performance

    Networking

    Users

    Disk management

    Drive status

    Mounting

    Initializing

    Extending partitions

    Splitting partitions

    Shrink partitions

    Assigning/changing drive letters

    Adding drives

    Adding arrays

    Storage spaces

    Other

    User State Migration tool (USMT)

    Windows Easy Transfer

    Windows Upgrade Advisor

    System utilities

    REGEDIT

    COMMAND

    SERVICES.MSC

    MMC

    MSTSC

    NOTEPAD

    EXPLORER

    MSINFO32

    DXDIAG

    DEFRAG

    System restore

    Windows Update

    1.5 Given a scenario, use Windows Control Panel utilities.

    Internet options

    Connections

    Security

    General

    Privacy

    Programs

    Advanced

    Display/display settings

    Resolution

    Color depth

    Refresh rate

    User accounts

    Folder options

    View hidden files

    Hide extensions

    General options

    View options

    System

    Performance (virtual memory)

    Remote settings

    System protection

    Windows firewall

    Power options

    Hibernate

    Power plans

    Sleep/suspend

    Standby

    Programs and features

    HomeGroup

    Devices and Printers

    Sound

    Troubleshooting

    Network and Sharing Center

    Device Manager

    1.6 Given a scenario, install and configure Windows networking on a client/desktop.

    HomeGroup vs. WorkGroup

    Domain setup

    Network shares/administrative shares/mapping drives

    Printer sharing vs. network printer mapping

    Establish networking connections

    VPN

    Dialups

    Wireless

    Wired

    WWAN (Cellular)

    Proxy settings

    Remote Desktop Connection

    Remote Assistance

    Home vs. Work vs. Public network settings

    Firewall settings

    Exceptions

    Configuration

    Enabling/disabling Windows firewall

    Configuring an alternative IP address in Windows

    IP addressing

    Subnet mask

    DNS

    Gateway

    Network card properties

    Half duplex/full duplex/auto

    Speed

    Wake-on-LAN

    QoS

    BIOS (on-board NIC)

    1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools.

    Best practices

    Scheduled backups

    Scheduled disk maintenance

    Windows updates

    Patch management

    Driver/firmware updates

    Antivirus/antimalware updates

    Tools

    Backup

    System restore

    Recovery image

    Disk maintenance utilities

    2.0 Other Operating Systems and Technologies

    2.1 Identify common features and functionality of the Mac OS and Linux operating systems.

    Best practices

    Scheduled backups

    Scheduled disk maintenance

    System updates/App store

    Patch management

    Driver/firmware updates

    Antivirus/antimalware updates

    Tools

    Backup/Time Machine

    Restore/snapshot

    Image recovery

    Disk maintenance utilities

    Shell/terminal

    Screen sharing

    Force Quit

    Features

    Multiple desktops/Mission Controls

    Keychain

    Spot Light

    iCloud

    Gestures

    Finder

    Remote disk

    Dock

    Boot Camp

    Basic Linux commands

    ls

    grep

    cd

    shutdown

    pwd vs. passwd

    mw

    cp

    rm

    chmod

    cmkdir

    chown

    iwconfig/ifconfig

    ps

    q

    su/sudo

    apt-get

    vi

    dd

    2.2 Given a scenario, set up and use client-side virtualization.

    Purpose of virtual machines

    Resource requirements

    Emulator requirements

    Security requirements

    Network requirements

    Hypervisor

    2.3 Identify basic cloud concepts.

    SaaS

    IaaS

    PaaS

    Public vs. Private vs. Hybrid vs. Community

    Rapid elasticity

    On-demand

    Resource pooling

    Measured service

    2.4 Summarize the properties and purpose of services provided by networked hosts.

    Server roles

    Web server

    File server

    Print server

    DHCP server

    DNS server

    Proxy server

    Mail server

    Authentication server

    Internet appliance

    UTM

    IDS

    IPS

    Legacy/embedded systems

    2.5 Identify basic features of mobile operating systems.

    Android vs. iOS vs. Windows

    Open source vs. closed source/vendor specific

    App source (play store, app store and store)

    Screen orientation (accelerometer/gyroscope)

    Screen calibration

    GPS and geotracking

    Wi-Fi calling

    Launcher/GUI

    Virtual assistant

    SDK/APK

    Emergency notification

    Mobile payment service

    2.6 Install and configure basic mobile device network connectivity and e-mail

    Wireless/cellular data network (enable/disable)

    Hotspot

    Tethering

    Airplane mode

    Bluetooth

    Enable Bluetooth

    Enable pairing

    Find device for pairing

    Enter appropriate pin code

    Test connectivity

    Corporate and ISP e-mail configuration

    POP3

    IMAP

    Port and SSL settings

    Exchange, S/MIME

    Integrated commercial provider e-mail configuration

    Google/Inbox

    Yahoo

    Outlook.com

    iCloud

    PRI updates/PRL updates/baseband updates

    Radio firmware

    IMEI vs. IMSI

    VPN

    2.7 Summarize methods and data related to mobile device synchronization.

    Types of data to synchronize

    Contacts

    Programs

    E-mail

    Pictures

    Music

    Videos

    Calendar

    Bookmarks

    Documents

    Location data

    Social media data

    eBooks

    Synchronization methods

    Synchronize to the cloud

    Synchronize to the desktop

    Mutual authentication for multiple services

    Software requirements to install the application on the PC

    Connection types to enable synchronization

    3.0 Security

    3.1 Identify common security threats and vulnerabilities.

    Malware

    Spyware

    Viruses

    Worms

    Trojans

    Rootkits

    Ransomware

    Phishing

    Spear phishing

    Spoofing

    Social engineering

    Shoulder surfing

    Zero-day attack

    Zombie/botnet

    Brute forcing

    Dictionary attacks

    Non-compliant systems

    Violations of security best practices

    Tailgating

    Man-in-the-middle

    3.2 Compare and contrast common prevention methods.

    Physical security

    Lock doors

    Mantrap

    Cable locks

    Securing physical documents/passwords/shredding

    Biometrics

    ID badges

    Key fobs

    RFID badge

    Smart card

    Tokens

    Privacy filters

    Entry control roster

    Digital security

    Antivirus/antimalware

    Firewalls

    User authentication/strong passwords

    Multifactor authentication

    Directory permissions

    VPN

    DLP

    Disabling ports

    Access control lists

    Smart card

    E-mail filtering

    Trusted/untrusted software sources

    User education/AUP

    Principle of least privilege

    3.3 Compare and contrast differences of basic Windows OS security settings.

    User and groups

    Administrator

    Power user

    Guest

    Standard user

    NTFS vs. share permissions

    Allow vs. deny

    Moving vs. copying folders and files

    File attributes

    Shared files and folders

    Administrative shares vs. local shares

    Permission propagation

    Inheritance

    System files and folders

    User authentication

    Single sign-on

    Run as administrator vs. standard user

    BitLocker

    BitLocker-To-Go

    EFS

    3.4 Given a scenario, deploy and enforce security best practices to secure a workstation.

    Password best practices

    Setting strong passwords

    Password expiration

    Changing default usernames/passwords

    Screensaver required password

    BIOS/UEFI passwords

    Requiring passwords

    Account management

    Restricting user permissions

    Login time restrictions

    Disabling guest account

    Failed attempts lockout

    Timeout/screen lock

    Disable autorun

    Data encryption

    Patch/update management

    3.5 Compare and contrast various methods for securing mobile devices.

    Screen locks

    Fingerprint lock

    Face lock

    Swipe lock

    Passcode lock

    Remote wipes

    Locator applications

    Remote backup applications

    Failed login attempts restrictions

    Antivirus/antimalware

    Patching/OS updates

    Biometric authentication

    Full device encryption

    Multifactor authentication

    Authenticator applications

    Trusted sources vs. untrusted sources

    Firewalls

    Policies and procedures

    BYOD vs. corporate owned

    Profile security requirements

    3.6 Given a scenario, use appropriate data destruction and disposal methods.

    Physical destruction

    Shredder

    Drill/Hammer

    Electromagnetic (degaussing)

    Incineration

    Certificate of destruction

    Recycling or repurposing best practices

    Low level format vs. standard format

    Overwrite

    Drive wipe

    3.7 Given a scenario, secure SOHO wireless and wired networks.

    Wireless specific

    Changing default SSID

    Setting encryption

    Disabling SSID broadcast

    Antenna and access point placement

    Radio power levels

    WPS

    Change default usernames and passwords

    Enable MAC filtering

    Assign static IP addresses

    Firewall settings

    Port forwarding/mapping

    Disabling ports

    Content filtering/parental controls

    Update firmware

    Physical security

    4.0 Software Troubleshooting

    4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools.

    Common symptoms

    Proprietary crash screens (BSOD/pin wheel)

    Failure to boot

    Improper shutdown

    Spontaneous shutdown/restart

    Device fails to start/detected

    Missing dll message

    Services fails to start

    Compatibility error

    Slow system performance

    Boots to safe mode

    File fails to open

    Missing NTLDR

    Missing Boot.ini

    Missing operating system

    Missing Graphical Interface

    Missing GRUB/LILO

    Kernel panic

    Graphical Interface fails to load

    Multiple monitor misalignment/orientation

    Tools

    BIOS/UEFI

    SFC

    Logs

    Recovery console

    Repair disks

    Pre-installation environments

    MSCONFIG

    DEFRAG

    REGSRV32

    REGEDIT

    Event viewer

    Safe mode

    Command prompt

    Emergency repair disk

    Automated system recovery

    Uninstall/reinstall/repair

    4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.

    Common symptoms

    Pop-ups

    Browser redirection

    Security alerts

    Slow performance

    Internet connectivity issues

    PC/OS lock up

    Application crash

    OS updates failures

    Rogue antivirus

    Spam

    Renamed system files

    Files disappearing

    File permission changes

    Hijacked e-mail

    Responses from users regarding e-mail

    Automated replies from unknown sent e-mail

    Access denied

    Invalid certificate (trusted root CA)

    Tools

    Antivirus software

    Antimalware software

    Recovery console

    Terminal

    System restore/snapshot

    Pre-installation environments

    Event viewer

    Refresh/restore

    MSCONFIG/safe boot

    Best practice procedure for malware removal

    Identify malware symptoms

    Quarantine infected system

    Disable system restore (in Windows)

    Remediate infected systems

    Update antimalware software

    Scan and removal techniques (safe mode, pre-installation environment)

    Schedule scans and run updates

    Enable system restore and create restore point (in Windows)

    Educate end user

    4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.

    Common symptoms

    Dim display

    Intermittent wireless

    No wireless connectivity

    No Bluetooth connectivity

    Cannot broadcast to external monitor

    Touchscreen non-responsive

    Apps not loading

    Slow performance

    Unable to decrypt e-mail

    Extremely short battery life

    Overheating

    Frozen system

    No sound from speakers

    Inaccurate touchscreen response

    System lockout

    Tools

    Hard reset

    Soft reset

    Close running applications

    Reset to factory default

    Adjust configurations/settings

    Uninstall/reinstall apps

    Force stop

    4.4 Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools.

    Common symptoms

    Signal drop/weak signal

    Power drain

    Slow data speeds

    Unintended Wi-Fi connection

    Unintended Bluetooth pairing

    Leaked personal files/data

    Data transmission overlimit

    Unauthorized account access

    Unauthorized root access

    Unauthorized location tracking

    Unauthorized camera/microphone activation

    High resource utilization

    Tools

    Antimalware

    App scanner

    Factory reset/clean install

    Uninstall/reinstall apps

    Wi-Fi analyzer

    Force stop

    Cell tower analyzer

    Backup/restore

    iTunes/iCloud/Apple Configurator

    Google sync

    One Drive

    5.0 Operational Procedures

    5.1 Given a scenario, use appropriate safety procedures.

    Equipment grounding

    Proper component handling and storage

    Antistatic bags

    ESD straps

    ESD mats

    Self-grounding

    Toxic waste handling

    Batteries

    Toner

    CRT

    Personal safety

    Disconnect power before repairing PC

    Remove jewelry

    Lifting techniques

    Weight limitations

    Electrical fire safety

    Cable management

    Safety goggles

    Air filter mask

    Compliance with local government regulations

    5.2 Given a scenario with potential environmental impacts, apply the appropriate controls.

    MSDS documentation for handling and disposal

    Temperature, humidity-level awareness, and proper ventilation

    Power surges, brownouts, blackouts

    Battery backup

    Surge suppressor

    Protection from airborne particles

    Enclosures

    Air filters/mask

    Dust and debris

    Compressed air

    Vacuums

    Compliance to local government regulations

    5.3 Summarize the process of addressing prohibited content/activity and explain privacy, licensing, and policy concepts.

    Incident response

    First response

    Identify

    Report through proper channels

    Data/device preservation

    Use of documentation/documentation changes

    Chain of custody

    Tracking of evidence/documenting process

    Licensing/DRM/EULA

    Open source vs. commercial license

    Personal license vs. enterprise licenses

    Personally Identifiable Information

    Follow corporate end-user policies and security best practices

    5.4 Demonstrate proper communication techniques and professionalism.

    Use proper language – avoid jargon, acronyms, slang when applicable

    Maintain a positive attitude/project confidence

    Actively listen (taking notes) and avoid interrupting the customer

    Be culturally sensitive

    Use appropriate professional titles, when applicable

    Be on time (if late contact the customer)

    Avoid distractions

    Personal calls

    Texting/social media sites

    Talking to co-workers while interacting with customers

    Personal interruptions

    Dealing with difficult customer or situation

    Do not argue with customers and/or be defensive

    Avoid dismissing customer problems

    Avoid being judgmental

    Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue or question to verify understanding)

    Do not disclose experiences via social media outlets

    Set and meet expectations/timeline and communicate status with the customer

    Offer different repair/replacement options if applicable

    Provide proper documentation on the services provided

    Follow up with customer/user at a later date to verify satisfaction

    Deal appropriately with customer’s confidential and private materials

    Located on a computer, desktop, printer, etc.

    5.5 Given a scenario, explain the troubleshooting theory.

    Always consider corporate policies, procedures, and impacts before implementing changes.

    Identify the problem

    Question the user and identify user changes to computer and perform backups before making changes

    Establish a theory of probable cause (question the obvious)

    If necessary, conduct external or internal research based on symptoms

    Test the theory to determine cause

    Once theory is confirmed, determine next steps to resolve problem

    If theory is not confirmed, re-establish new theory or escalate

    Establish a plan of action to resolve the problem and implement the solution

    Verify full system functionality and if applicable implement preventive measures

    Document findings, actions, and outcomes

    PART I

    CompTIA A+ 220-901

    Chapter 1: Hardware

    Chapter 2: Networking

    Chapter 3: Mobile Devices

    Chapter 4: Hardware and Network Troubleshooting

    CHAPTER 1

    Hardware

    CompTIA A+ Essentials Exam Objectives Covered in This Chapter:

    1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.

    Firmware upgrades – flash BIOS

    BIOS component information (RAM, hard drive, optical drive, CPU)

    BIOS configurations (boot sequence, enabling and disabling devices, date/time, clock speeds, virtualization support, BIOS security [passwords, drive encryption: TPM, LoJack, secure boot])

    Built-in diagnostics

    Monitoring (temperature monitoring, fan speeds, intrusion detection/notification, voltage, clock, bus speed)

    1.2 Explain the importance of motherboard components, their purpose, and properties.

    Sizes (ATX, micro-ATX, mini-ATX, ITX)

    Expansion slots (PCI, PCI-X, PCIe, miniPCI)

    RAM slots

    CPU sockets

    Chipsets (north bridge, south bridge)

    CMOS battery

    Power connections and types

    Fan connectors

    Front/top-panel connectors (USB, audio, power button, power light, drive activity lights, reset button)

    Bus speeds

    1.3 Compare and contrast various RAM types and their features.

    Types (DDR, DDR2, DDR3, SODIMM, DIMM, parity vs. non-parity, ECC vs. non-ECC)

    RAM configurations (single channel vs. dual channel vs. triple channel)

    Single-sided vs. double-sided

    Buffered vs. unbuffered

    RAM compatibility

    1.4 Install and configure PC expansion cards.

    Sound cards

    Video cards

    Network cards

    USB cards

    FireWire cards

    Thunderbolt cards

    Storage cards

    Modem cards

    Wireless/cellular cards

    TV tuner cards

    Video capture cards

    Riser cards

    1.5 Install and configure storage devices and use appropriate media.

    Optical drives (CD-ROM/CD-RW, DVD-ROM/DVD-RW/DVD-RW DL, Blu-ray, BD-R, BD-RE)

    Magnetic hard drive drives (5,400 rpm, 7,200 rpm, 10,000 rpm, 15,000 rpm)

    Hot-swappable drives

    Solid-state/flash drives (Compact Flash, SD, micro-SD, mini-SD, xD, SSD, hybrid, eMMC)

    RAID types (0, 1, 5, 10)

    Tape drive

    Media capacity (CD, CD-RW, DVD-RW, DVD, Blu-ray, tape, DVD DL)

    1.6 Install various types of CPUs and apply the appropriate cooling methods.

    Socket types (Intel: 775, 1155, 1156, 1366, 1150, 2011, AMD: AM3, AM3+, FM1, FM2, FM2+)

    Characteristics (speeds, cores, cache size/type, hyperthreading, virtualization support, architecture [32-bit vs. 64-bit])

    Integrated GPU

    Disable execute bit

    Cooling (heat sink, fans, thermal paste, liquid-based, fanless/passive)

    1.7 Compare and contrast various PC connection interfaces, their characteristics, and purpose.

    Physical connections (USB 1.1 vs. 2.0 vs. 3.0, connector types [A, B, mini, micro])

    Firewire 400 vs. Firewire 800

    SATA1 vs. SATA2 vs. SATA3, eSATA

    Other connector types (serial, parallel, VGA, HDMI, DVI, audio [analog, digital/optical connector], RJ-45, RJ-11, Thunderbolt)

    Wireless connections (Bluetooth, RF, IR, NFC)

    Characteristics (analog, digital, distance limitations, data transfer speeds, quality, DRM, frequencies)

    1.8 Install a power supply based on given specifications.

    Connector types and their voltages (SATA, Molex, 4/8-pin 12v, PCIe 6/8-pin, 20-pin, 24-pin)

    Specifications (wattage, dual rail, size, number of connectors, ATX, micro-ATX, dual voltage options)

    1.9 Given a scenario, select the appropriate components for a custom PC configuration to meet customer specifications or needs.

    Graphic/CAD/CAM design workstation (multicore processor, high-end video, maximum RAM)

    Audio/video-editing workstation (specialized audio and video card, large fast hard drive, dual monitors)

    Virtualization workstation (maximum RAM and CPU cores)

    Gaming PC (multicore processor, high-end video/specialized GPU, high-definition sound card, high-end cooling)

    Home theater PC (surround sound audio, HDMI, output, HTPC compact form factor, TV tuner)

    Standard thick client (desktop applications, meets recommended requirements for selected OS)

    Thin client (basic applications, meets minimum requirements for selected OS, network connectivity)

    Home server PC (media streaming, file sharing, print sharing, Gigabit NIC, RAID array)

    1.10 Compare and contrast types of display devices and their features.

    Types (LCD [TN vs. IPS, fluorescent vs. LED backlighting], plasma, projector, OLED)

    Refresh/frame rates

    Resolution

    Native resolution

    Brightness/lumens

    Analog vs. digital

    Privacy/antiglare filters

    Multiple displays

    Aspect ratios (16:9, 16:10, 4:3)

    1.11 Identify common PC connector types and associated cables.

    Display connector types (DVI-D, DVI-I, DVI-A, DisplayPort, RCA, HD-15 [i.e., DE-15 or DB-15], BNC, miniHDMI, miniDIN-6)

    Display cable types (HDMI, DVI, VGA, component, composite, coaxial)

    Device cables and connectors (SATA, eSATA, USB, FireWire [IEEE 1394], PS/2, audio)

    Adaptors and convertors (DVI to HDMI, USB A to USB B, USB to Ethernet, DVI to VGA, Thunderbolt to DVI, PS/2 to USB, HDMI to VGA)

    1.12 Install and configure common peripheral devices.

    Input devices (mouse, keyboard, scanner, barcode reader, biometric devices, game pads, joysticks, digitizer, motion sensor, touch pads, smart card readers, digital cameras, microphone, webcam, camcorder, MIDI-enabled devices)

    Output devices (printers, speakers, display devices)

    Input and output devices (touchscreen, KVM, smart TV, set-top box)

    1.13 Install SOHO multifunction devices/printers and configure appropriate settings.

    Using appropriate drivers for a given operating system

    Configuration settings (duplex, collate, orientation, quality)

    Device sharing (wired [USB, serial, Ethernet], wireless [Bluetooth, 802.11, infrastructure vs. ad hoc])

    Integrated print server (hardware)

    Cloud printing/remote printing

    Public/shared devices (sharing local/networked device via operating system settings [TCP/Bonjour/AirPrint], data privacy, user authentication on the device, hard drive caching)

    1.14 Compare and contrast differences between the various print technologies and the associated imaging process.

    Laser (imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing assembly)

    Inkjet (ink cartridge, print head, roller, feeder, duplexing assembly, carriage and belt, calibration)

    Thermal (feed assembly, heating element, special thermal paper)

    Impact (print head, ribbon, tractor feed, impact paper)

    Virtual (print to file, print to PDF, print to XPS, print to image)

    1.15 Given a scenario, perform appropriate printer maintenance.

    Laser (replacing toner, applying maintenance kit, calibration, cleaning)

    Thermal (replace paper, clean heating element, remove debris)

    Impact (replace ribbon, replace print head, replace paper)

    Inkjet (clean heads, replace cartridges, calibration, clear jams)

    This chapter will focus on the exam topics related to PC hardware. It will follow the structure of the CompTIA A+ 220-901 exam blueprint, objective 1, and it will explore the 15 subobjectives that you will need to master before taking the exam.

    1.1 Given a Scenario, Configure Settings and Use BIOS/UEFI Tools on a PC

    PCs and other devices that use an operating system usually also contain firmware that provides low-level instructions to the device even in the absence of an operating system. This firmware, called either the Basic Input/Output System (BIOS) or the Unified Extensible Firmware Interface (UEFI), contains settings that can be manipulated as well as diagnostic utilities that can be used to monitor the device. This section discusses those settings and utilities. The topics addressed in objective 1.1 include the following:

    Firmware upgrades—flash BIOS

    BIOS component information

    BIOS configurations

    Built-in diagnostics

    Monitoring

    Firmware Upgrades—Flash BIOS

    Computer BIOSs don’t go bad; they just become out of date or contain bugs. In the case of a bug, an upgrade will correct the problem. An upgrade may also be necessary when the BIOS doesn’t support some component that you would like to install—a larger hard drive or a different type of processor, for instance.

    Most of today’s BIOSs are written to an electrically erasable programmable read-only memory (EEPROM) chip and can be updated through the use of software. Each manufacturer has its own method for accomplishing this. Check out the documentation for complete details. Regardless of the exact procedure, the process is referred to as flashing the BIOS. It means the old instructions are erased from the EEPROM chip and the new instructions are written to the chip.

    UEFI is a standard firmware interface for PCs, designed to replace BIOS. Some advantages of UEFI include the following:

    Better security, which protects the pre-boot process

    Faster startup times and resuming from hibernation

    Support for drives larger than 2.2 TB

    Support for 64-bit firmware device drivers

    Capability to use BIOS with UEFI hardware

    UEFI can also be updated by using an update utility from the motherboard vendor. In many cases, the steps are as follows:

    Download the update file to a flash drive.

    Insert the flash drive and reboot the machine.

    Use the specified key sequence to enter the BIOS settings.

    If necessary, disable secure boot.

    Save the changes and reboot.

    Reenter the BIOS settings.

    Choose boot options, and boot from the flash drive.

    Follow the specific directions with the update to locate the upgrade file on the flash drive.

    Execute the file (usually by typing flash).

    While the update is completing, ensure you maintain power to the device.

    BIOS Component

    At startup, the BIOS will attempt to detect the devices and components at its disposal. The information that it gathers, along with the current state of the components, will be available for review in the BIOS settings. Some of the components and the types of information available with respect to these devices and components are covered in this section.

    You can view and adjust a computer’s base-level settings through the CMOS Setup program, which you access by pressing a certain key at startup, such as F1 or Delete (depending on the system). The most common settings to adjust in CMOS include port settings (parallel, serial, USB), drive types, boot sequence, date and time, and virus/security protections. The variable settings that are made through the CMOS Setup program are stored in nonvolatile random access memory (NVRAM), while the base instructions that cannot be changed (the BIOS) are stored on an EEPROM chip. NVRAM is memory that does not lose its content when power is lost to the machine. Figure 1.1 shows an example of NVRAM on a motherboard.

    FIGURE 1.1 NVRAM

    RAM

    Most systems today detect the random access memory (RAM) amount and speed automatically. Some motherboards can use different types of RAM, such as parity and nonparity, or different speeds, and the CMOS Setup program may provide the opportunity to change those settings. Increasingly, however, RAM settings are becoming a read-only part of CMOS Setup programs because the system will detect additional memory added or a change in memory type. This does not preclude you from ensuring you are installing the correct type of memory for the system.

    Hard Drive

    Some CMOS Setup programs have a feature that polls the IDE channels and provides information about the IDE devices attached to them. You can use this feature to gather the settings for a hard disk. However, most hard disks these days are fully Plug and Play, so they automatically report themselves to the CMOS Setup.

    Hard drives can be autodetected by most systems if the IDE setting is set to Auto. The settings detected may include the drive’s capacity; its geometry, meaning cylinders, heads, and sectors (CHS); and its preferred programmed input/output (PIO), direct memory access (DMA), or UltraDMA operating mode. You can also configure a hard drive by entering its CHS values manually, but doing so is almost never necessary anymore.

    CHS is also called the drive geometry because together these three numbers determine how much data the disk can hold. Most CMOS Setup programs are able to automatically detect the CHS values.

    Optical Drive

    Optical drives, such as CD, CD-R, CD-RW, and DVD players, are also detected and reported by the BIOS. You can even set the computer to boot from one of these drives if desired (see the section Boot Sequence later in this chapter). When you do that, in most cases the drives will be listed as CD-ROM or CD-ROM/DVD.

    CPU

    In most modern systems, the BIOS detects the CPU type and speed automatically, so any CPU settings in CMOS Setup are likely to be read-only. Most operating systems provide utilities for gathering information about the CPU in the computer, but if the computer will not boot or there is no operating system, then viewing the CPU information in the BIOS can be a valuable option.

    BIOS Configurations

    When any of the changes listed in the following section are made to any of the BIOS configurations, it is important that the program be exited properly to save the changes. The CMOS Setup program includes an Exit command, with options that include Save Changes and Discard Changes. In most programs, Esc is a shortcut for exiting and discarding changes, and F10 is a common shortcut for exiting and saving changes.

    Boot Sequence

    Each system has a default boot order, which is the order in which it checks the drives for a valid operating system to which it can boot. Usually, this order is set for the hard disk and then CD-ROM, but these components can be placed in any boot order. For example, you might set CD-ROM first to boot from a Windows 7 Setup disk on a system that already contains an operating system. If you receive an error message when booting, always check the CD-ROM, and if a nonsystem disk is present, remove it and reboot.

    Enabling and Disabling Devices

    In CMOS Setup, you can enable or disable integrated components, such as built-in video cards, sound cards, or network cards. You may disable them in order to replace them with different models on expansion boards, for example.

    You can also disable the onboard I/O ports for the motherboard, including parallel, serial, and USB. Depending on the utility, there may also be settings that enable or disable USB keyboard usage, Wake on LAN, or other special features.

    In addition to enabling or disabling legacy parallel ports, you can assign an operational mode to the port. Table 1.1 lists the common modes for a parallel port. When you’re troubleshooting parallel port problems, sometimes trying a different mode will help. Some legacy systems do not allow onboard devices to be disabled. If this is the case, if an onboard device fails, the entire motherboard may need to be replaced.

    TABLE 1.1 Parallel port settings

    Date/Time

    One of the most basic things you can change in CMOS Setup is the system date and time. You can also change this from within the operating system. When the PC is not keeping correct time or date when turned off, it is usually a CMOS battery issue and may include a warning that the battery is soon going to die. In the absence of the PC receiving time and date updates from a time server such as a Network Time Protocol (NTP) server, the time kept in the CMOS is the time source for the computer.

    Clock Speeds

    Clock speed is a measurement of the rate at which the clock signal oscillates; it is expressed in millions of cycles per second or megahertz. The motherboard must be set to utilize the proper clock settings for the CPU installed in the computer. The BIOS usually detects the type of CPU and automatically sets the proper timings. In some older systems, you may have to use jumpers to set the correct clock speed and CPU.

    External Speed (Clock Speed) The clock speed, or external speed, which is usually expressed in megahertz or gigahertz, is the speed at which the motherboard communicates with the CPU. It’s determined by the motherboard, and its cadence is set by a quartz crystal (the system crystal) that generates regular electrical pulses.

    Internal Speed The internal speed is the maximum speed at which the CPU can perform its internal operations. This may be the same as the motherboard’s speed (the external speed), but it’s more likely to be a multiple of it. For example, a CPU may have an internal speed of 1.3 GHz but an external speed of 133 MHz. That means for every tick of the system crystal’s clock, the CPU has 10 internal ticks of its own clock.

    When the proper CPU speed is known, you must make sure the relationship between the speed of the CPU and that of the motherboard bus is correct. This is done with a value called the multiplier. Although the bus speed can also be manipulated, usually it is set to accommodate the required speed of the memory to be used, and so it is more likely you will be using the multiplier to achieve the proper relationship between the CPU speed and the bus speed.

    For example, if you have a processor that has a CPU speed of 1.82 GHz, the proper settings for the BIOS would be a bus speed of 166 MHz and a multiplier of 11 (166 MHz × 11 = 1.826 GHz). So if the bus needed to be 166 MHz, you would set the multiplier for 11. On the other hand, if you changed the bus speed to 332 MHz (just a random example), the closest multiplier would be 5.5 to maintain 1.826 GHz (332 MHz × 5.5 = 1.826 GHz). When setting the speed of either is required, refer to the documentation from the CPU and motherboard.

    Virtualization Support

    Many computers, especially servers, host virtual machines (VMs). These are fully functional operating systems running in their own environment. In many cases, the motherboard and associated BIOS settings need no alteration to provide services to these VMs.

    However, some of the newer virtualization products, for example, Microsoft Hyper-V, require that the motherboard support hardware-assisted virtualization. This is because in these cases the virtualization product is not installed on top of a regular operating system but is installed directly on bare metal—that is, as an integral part of the operating system, as in Windows Server 2012 R2.

    The benefit derived from the virtualization product (also called a hypervisor) using hardware-assisted virtualization is it allows the hypervisor to dynamically allocate memory and CPU to the VMs as required. When the motherboard and the BIOS support this technology, you must ensure that it is enabled. Figure 1.2 shows an example of the settings.

    FIGURE 1.2 BIOS virtualization

    BIOS Security

    A number of security features are built into most BIOSs. They include BIOS passwords, drive encryption, Trusted Platform Module (TPM), and LoJack. These items are discussed in this section.

    BIOS Passwords In most CMOS Setup programs, you can set a supervisor password. Doing so requires a password to be entered in order to use the CMOS Setup program, effectively locking out users from making changes to it. You may also be able to set a user password, which restricts the PC from booting unless the password is entered.

    To reset a forgotten password, you can remove the CMOS battery to reset everything. There also may be a Reset jumper on the motherboard.

    Drive Encryption Many operating systems provide the ability to encrypt an entire volume or drive, protecting a mobile device’s data in the event of theft. A good example of this is BitLocker, which is available in Windows Vista and Windows 7. The drives are encrypted with encryption keys, and the proper keys are required to boot the device and access the data.

    BitLocker can be used with a TPM chip (discussed in the next section), but it is not required. When this feature is in effect with no TPM chip, the keys are stored on a USB drive that must be presented during startup to allow access to the drives. Without the USB drive holding the key, the device will not boot.

    TPM Chips When the device has a TPM chip present on the motherboard, additional security and options become available. First the chip contains the keys that unlock the drives. When the computer boots, the TPM chip unlocks the drive only after it compares hashes of the drive to snapshots of the drive taken earlier. If any changes have been made or tampering has been done to the Windows installation, the TPM chip will not unlock the drives.

    Moreover, you can (and should) combine this with a PIN entered at startup or a key located in a USB drive. In this scenario, the computer will not start unless the hashes pass the test and the PIN or key is provided.

    LoJack LoJack is a product made by Absolute Software that allows you to remotely locate, lock, and delete the data on a mobile device when it is stolen. It is a small piece of software that embeds itself on the computer and is difficult to detect. Once activated, it stays in contact with a monitoring center, allowing you to send the commands to lock and delete data via the center. Not only can you protect the data in this fashion, but also it will gather forensic data that can help to locate the device and aid in its recovery.

    Secure Boot Secure Boot is a standard adopted by many venders that requires the operating system to check the integrity of all system files before allowing the boot process to proceed. By doing so, it protects against the alteration or corruption of these system files. As with any emerging technology, issues have already been discovered that can enable a hacker to not only bypass Secure Boot but to also change a key value in the settings that will brick the device (render it useless).

    Built-in Diagnostics

    Although you may not realize it, every time you start the computer, built-in diagnostics are at work. Every computer has a diagnostic program built into its BIOS called the power-on self-test (POST). When you turn on the computer, it executes this set of diagnostics. Many steps are involved in the POST, but they happen quickly, they’re invisible to the user, and they vary among BIOS versions. The steps include checking the CPU, checking the RAM, checking for the presence of a video card, and so on. The main reason to be aware of the POST’s existence is that if it encounters a problem, the boot process stops. Being able to determine at what point the problem occurred can help you troubleshoot.

    One way to determine the source of a problem is to listen for a beep code. This is a series of beeps from the computer’s speaker. The number, duration, and pattern of the beeps can sometimes tell you what component is causing the problem. However, the beeps differ depending on the BIOS manufacturer and version, so you must look up the beep code in a chart for your particular BIOS. Different BIOS manufacturers use the beeping differently. AMI BIOS, for example, relies on a raw number of beeps and uses patterns of short and long beeps.

    Another way to determine a problem during the POST routine is to use a POST card. This is a circuit board that fits into an Industry Standard Architecture (ISA) or Peripheral Component Interconnect (PCI) expansion slot in the motherboard and reports numeric codes as the boot process progresses. Each of those codes corresponds to a particular component being checked. If the POST card stops at a certain number, you can look up that number in the manual that came with the card to determine the problem.

    BIOS Central is a website containing charts detailing the beep codes and POST error codes for many different BIOS manufacturers.

    Monitoring

    By viewing the information provided in the BIOS, basic monitoring of the many items can be done with varying degrees of certainty. It is simply a matter of navigating the menu-based BIOS program and locating the proper screen that provides the information. Examples are provided in the following sections.

    Temperature Monitoring

    Temperature is probably the most important item to monitor. When components like the CPU overheat, bad things start to occur, such as repeated reboots. Figure 1.3 shows an example of the values for the CPU. Technicians should retain baseline temperatures for these items. Baseline temperatures should include idle temperature and load temperature baselines. Intel processors run at a cooler temperature than AMD.

    FIGURE 1.3 Temperature monitoring

    Fan Speeds

    The speed at which various fans are operating can also be displayed in the BIOS. There can be a CPU fan, as well as one or more system fans. (See Figure 1.3.) Programs are available that monitor this for you and can send alerts. This is particularly important for servers in a data center.

    Intrusion Detection/Notification

    It is also possible to enable intrusion detection, which will indicate to you whether the chassis has been opened. This may be referred to as the chassis intrusion detection or possibly the case open status, as shown in Figure 1.3, where this function has been disabled.

    Voltage

    You can also monitor and change the voltage settings in the BIOS. Be cautious in changing these settings because improper settings can damage the system or shorten the life of the CPU. Possible settings include the following:

    CPU voltage

    Memory voltage, which will typically be 1.5 volts

    Motherboard voltage

    Voltage of the graphics card

    These are just a few examples. Figure 1.4 shows an example of these and many more voltage settings.

    FIGURE 1.4 Voltage settings

    Clock

    The CMOS clock is located on the computer’s motherboard and keeps time when the computer is off. The operating system gets its time from the BIOS clock at boot time. This clock can be set using the BIOS if it is not correct. Figure 1.5 shows the time setting.

    FIGURE 1.5 Clock

    Bus Speed

    The processor’s ability to communicate with the rest of the system’s components relies on the supporting circuitry. Part of the system board’s underlying circuitry is called the bus. The computer’s bus moves information into and out of the processor and other devices. A bus allows all devices to communicate with one another. The motherboard has several buses. The external data bus carries information to and from the CPU and is the

    Enjoying the preview?
    Page 1 of 1