® CompTIA A+ 220-701 and 220-702 Practice Questions Fourth Edition Patrick Regan CompTIA® A+ 220-701 and 220-702 Practice Questions Exam Cram, Fourth Edition Publisher Paul Boger Copyright © 2011 by Pearson Education, Inc Associate Publisher David Dusthimer All rights reserved No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher No patent liability is assumed with respect to the use of the information contained herein Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions Nor is any liability assumed for damages resulting from the use of the information contained herein ISBN-13: 978-0-7897-4791-4 ISBN-10: 0-7897-4791-X Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Pearson Education, Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark CompTIA is a registered trademark of CompTIA Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information provided is on an “as is” basis The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it Bulk Sales Pearson Education, Inc offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales For more information, please contact U.S Corporate and Government Sales 1-800-382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact International Sales international@pearson.com Acquisitions Editor Betsy Brown Senior Development Editor Andrew Cupp Managing Editor Sandra Schroeder Technical Editor Chris Crayton Project Editor Mandie Frank Copy Editor Apostrophe Editing Services Proofreader Sarah Kearns Publishing Coordinator Vanessa Evans Multimedia Developer Dan Scherf Book Designer Gary Adair Compositor Tricia Bronkella Contents at a Glance Introduction Part I A+ Essentials 220-701 CHAPTER Hardware CHAPTER Troubleshooting, Repair, and Maintenance 57 CHAPTER Operating System and Software 95 CHAPTER Networking 147 CHAPTER Security 185 CHAPTER Operational Procedure 211 Part II A+ 220-702 CHAPTER Hardware 241 CHAPTER Operating Systems 285 CHAPTER Networking 339 Security 375 CHAPTER 10 Table of Contents Introduction Part I A+ Essentials 220-701 Chapter 1: Hardware 1.1 Categorize storage devices and backup media 1.2 Explain motherboard components, types, and features 1.3 Classify power supplies types and characteristics 16 1.4 Explain the purpose and characteristics of CPUs and their features 18 1.5 Explain cooling methods and devices 21 1.6 Compare and contrast memory types, characteristics, and their purpose 22 1.7 Distinguish between the different display devices and their characteristics 25 1.8 Install and configure peripherals and input devices 27 1.9 Summarize the function and types of adapter cards 29 1.10 Install, configure, and optimize laptop components and features 32 1.11 Install and configure printers 35 Quick-Check Answer Key 40 Answers and Explanations 41 Chapter 2: Troubleshooting, Repair, and Maintenance 57 2.1 Given a scenario, explain the troubleshooting theory 57 2.2 Given a scenario, explain and interpret common hardware and operating system symptoms and their causes 60 2.3 Given a scenario, determine the troubleshooting methods and tools for printers 64 v Table of Contents 2.4 Given a scenario, explain and interpret common laptop issues and determine the appropriate basic troubleshooting method 67 2.5 Given a scenario, integrate common preventative maintenance techniques 71 Quick-Check Answer Key 81 Answers and Explanations 82 Chapter 3: Operating System and Software 95 3.1 Compare and contrast the different Windows Operating Systems and their features 95 3.2 Given a scenario, demonstrate proper use of user interfaces 107 3.3 Explain the process and steps to install and configure the Windows OS 113 3.4 Explain the basics of boot sequences, methods, and startup utilities 123 Quick-Check Answer Key 127 Answers and Explanations 129 Chapter 4: Networking 147 4.1 Summarize the basics of networking fundamentals, including technologies, devices, and protocols 147 4.2 Categorize network cables and connectors and their implementations 159 4.3 Compare and contrast the different network types 164 Quick-Check Answer Key 169 Answers and Explanations 170 Chapter 5: Security 185 5.1 Explain the basic principles of security concepts and echnologies 185 5.2 Summarize the following security features 193 Quick-Check Answer Key 199 Answers and Explanations 200 vi Table of Contents Chapter 6: Operational Procedure 211 6.1 Outline the purpose of appropriate safety and environmental procedures and, given a scenario, apply them 211 6.2 Given a scenario, demonstrate the appropriate use of communication skills and professionalism in the workplace 221 Quick-Check Answer Key 229 Answers and Explanations 230 Part II A+ 220-702 Chapter 7: Hardware 241 1.1 Given a scenario, install, configure, and maintain personal computer components 241 1.2 Given a scenario, detect problems, troubleshoot, and repair/replace personal computer components 252 1.3 Given a scenario, install, configure, detect problems, troubleshoot, and repair/replace laptop components 260 1.4 Given a scenario, select and use the following tools 261 1.5 Given a scenario, detect and resolve common printer issues 263 Quick-Check Answer Key 270 Answers and Explanations 271 Chapter 8: Operating Systems 285 2.1 Select the appropriate commands and options to troubleshoot and resolve problems 285 2.2 Differentiate between Windows Operating System directory structures (Windows 2000, XP, Vista, and Windows 7) 296 2.3 Given a scenario, select and use system utilities/tools and evaluate the results 299 2.4 Evaluate and resolve common issues 310 Quick-Check Answer Key 319 Answers and Explanations 321 vii Table of Contents Chapter 9: Networking 339 3.1 Troubleshoot client-side connectivity issues using appropriate tools 339 3.2 Install and configure a small office home office (SOHO) network 352 Quick-Check Answer Key 361 Answers and Explanations 362 Chapter 10: Security 375 4.1 Given a scenario, prevent, troubleshoot, and remove viruses and malware 375 4.2 Implement security and troubleshoot common issues 379 Quick-Check Answer Key 395 Answers and Explanations 396 About the Author Patrick Regan has been a PC technician, network administrator/engineer, design architect, and security analyst for the past 16 years He has a bachelor’s degree in physics from the University of Akron He has taught many computer and network classes at Sacramento local colleges (Heald Colleges and MTI Colleges) and has participated in and led many projects for Heald Colleges, Intel Corporation, Miles Consulting Corporation, and Pacific Coast Companies For his teaching accomplishments, he received the Teacher of the Year award from Heald Colleges and has received several recognition awards from Intel Corporation Previously, he worked as a product support engineer for Intel Corporation Customer Service, a senior network engineer for Virtual Alert— where he supported the BioTerrorism Readiness suite and as a senior design architect/engineer—and training coordinator for Miles Consulting Corporation (MCC), a premiere Microsoft Gold partner and consulting firm He is currently a senior network engineer at Pacific Coast Companies, where he supports a large enterprise network He holds many certifications, including the Microsoft MCSE, MCSA, MCT; MCITP; CompTIA A+, Network+, Server+, Linux+, Security+ and CTT+; Cisco CCNA; and Novell CNE and CWNP Certified Wireless Network Administrator (CWNA) During the past several years, he has written several textbooks for Prentice Hall, including Troubleshooting the PC; Networking with Windows 2000 and 2003; Linux, Local Area Networks, Wide Area Networks, and the Acing Series (Acing the A+, Acing the Network+, Acing the Security+, and Acing the Linux+) He has also coauthored the MCSA/MCSE 70-290 Exam Cram: Managing and Maintaining a Microsoft Windows Server 2003 Environment, Second Edition and written MCTS 70-620 Exam Cram: Microsoft Windows Vista, Configuring; MCTS 70-642 Exam Cram: Windows Server 2008 Network Infrastructure, Configuring; and MCTS 70643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring In addition, he has completed the study guides for the A+ certification exams for Cisco Press You can write with questions and comments to the author at Patrick_Regan@hotmail.com (Because of the high volume of mail, every message might not receive a reply.) Dedication I dedicate this book to my mother Acknowledgments Publishing a book takes the collaboration and teamwork of many individuals Thanks to everyone involved in this process at Pearson Education, especially Betsy and Chris To the editorial and technical reviewers, thank you for making sure that my work was sound and on target 396 Chapter 10 Answers and Explanations Answer: D Spyware cannot physically damage a computer It can, however, capture information as you type it in, change the default home page, generate pop-up Windows, and slow your machine Therefore, Answers A, B, C, and E are incorrect Answer: D When you know that a program is not spyware, click Always Allow so that it stops thinking the software is spyware Answer A is incorrect because you don’t want to ignore the other programs Answer B is incorrect because Parental Controls not function on domains Answer C is incorrect because Answer D is the better answer Answer: D If you use Software Explorer (part of Windows Defender), you can remove any program that executes during startup Many spyware programs include those that change home pages and load themselves automatically during startup Therefore, you should remove any programs that you don’t recognize Answer A is incorrect because not all programs will be shown in the Add/Remove programs Answer B is incorrect because there is no indication that it is communicating with the outside world, and using the firewall would not stop the spyware program from changing the home page Answer C is incorrect because changing the security level would have no effect because the spyware program is already on the machine Answer: D Because the computer is slow even after reboot, the spyware program must load every time the computer is rebooted Therefore, it has to be loaded during startup Answer A is incorrect because spyware is not typically loaded as a service Answer B is not the best answer because most startup programs are specified in the registry, not the startup folder Answer C is incorrect because if you use Task Manager to stop the program, the program will still reload after you restart the computer Answer: A Quick scan will check all places that you normally would find spyware, including those that execute during startup Answer B is incorrect because a fast scan does not exist Answer C is incorrect because full scans are much more thorough scans but take much longer Answer D is incorrect because you would then need to manually specify where to search for spyware Answer: A A Trojan horse virus appears, to the user, to perform a desirable function but, in fact, it facilitates unauthorized access to the user’s computer system A polymorphic virus (Answer B) is a virus that changes often to keep it from being detected A worm (Answer C) is malware that spreads and utilizes the resources of a computer, slowing the computer down There is no classification called peaceful virus (Answer D) Answer: A If an antivirus software package cannot remove a virus from a file, it can be configured to delete the file or to quarantine the file When a file is quarantined, it is copied to a special folder (usually named quarantined) Isolation mode (Answer B), Boot protection (Answer C), and Firewalled (Answer D) are not terms used with antivirus software Answer: A and C Often, you cannot remove a virus if it is loaded in memory Therefore, you need to boot the computer in Safe Mode or perform a clean boot before you can remove the virus so that certain programs are not loaded If the virus has infected your computer, you might need to be an administrator (Answer B) to remove it Lastly, files that are in the quarantine folder (Answer D) have already been isolated and therefore should not be the source of the virus Security 397 Answer: B Because you are connected to the network and you think it is infected with a virus, you should disconnect it from the network so that the virus does not spread to other computers It is important to download the newest security patches (Answer A) and newest antivirus software package (Answer D), but this only after the virus is removed Rebooting and going into the BIOS setup program (Answer C) will not help you remove the virus 10 Answer: C Data Execution Prevention (DEP) is a security feature included in Windows XP with SP2 and Windows Vista intended to prevent an application or service from executing code from a non-executable memory region This helps prevent certain exploits that store code via a buffer overflow Hyper-V (Answer B) is an Intel technology that creates two logical processors on each physical core in an attempt to keep the pipelines full at all times PAE (Answer A), short for Physical Address Extension, is technology that allows 32-bit Windows to access more than GB of physical memory Protected mode (Answer D) is a mode used in processors that allows the operating system to use virtual memory, paging, and multitasking 11 Answer: A Data Execution Prevention (DEP) is a security feature included in Windows XP with SP2 and Windows Vista that is intended to prevent an application or service from executing code from a non-executable memory region This helps prevent certain exploits that store code via a buffer overflow To disable DEP, modify the Boot.ini file You cannot disable DEP using the registry (Answer B), System Properties (Answer C), or the BIOS setup program (Answer D) 12 Answer: C Data Execution Prevention (DEP) is a security feature included in Windows XP with SP2 and Windows Vista that is intended to prevent an application or service from executing code from a non-executable memory region To enable or disable for an individual application, you open the System Properties, access the Advanced System Settings, select Settings in the Performance session, and click the Data Execution Prevention tab You cannot configure individual programs using the Boot.ini file (Answer A) or BIOS setup program (Answer D), and there is no Processor applet in the Control Panel (Answer B) 13 Answer: B If you reboot the computer into Safe Mode, Windows only loads the essential files needed to start Windows You can then use the antivirus software package to clean the virus If you restart the computer in VGA mode (Answer A), your screen will turn to 640×480 resolution, but all the other service and programs still load The Last Known Good Configuration (Answer C) only undoes the most recent change Updating the antivirus software (Answer D) will not help because the file cannot be cleaned because it is in use, not because the program does not know what with the file 14 Answer: B The Master Boot Record contains the partition table and a volume boot sector The fixmbr command executed from the Recovery Console will fix a corrupted fix Master Boot Record (MBR) Copying the Boot.ini file (Answer A) from another computer will not fix an MBR and executing the fixboot command (Answer C) will only repair the Windows boot sector on the system partition There is no Repair option in Windows Defender (Answer D), Microsoft’s anti-spyware program 15 Answer: A Members included in the Administrators group can perform all administrative tasks on the local system By default, the built-in Administrator account is a member of the Administrators group The guest account (Answer B) is used to give temporary 398 Chapter 10 access to a system but has minimum rights and permissions The Power Users group (Answer C) can create and modify local user accounts on the computer, share resources, and install drivers for legacy software They not have full administrative permissions Remote Desktop Users (Answer D) are granted the right to log on locally through a Remote Desktop Connection Users (Answer E) can perform tasks for which they have been assigned permissions 16 Answer: A Members included in the Administrators group can perform all administrative tasks on the local system By default, the built-in Administrator account is a member of the Administrators group The guest account (Answer B) is used to give temporary access to a system, but has minimum rights and permissions The Power Users group (Answer C) has some but not all the user rights of the Administrator accounts, including creating and modifying local user accounts on the computer, sharing resources, and installing drivers for legacy software They not have full administrative permissions Remote Desktop Users (Answer D) are granted the right to log on locally through Remote Desktop Connection Users (Answer E) can perform tasks for which they have been assigned permissions 17 Answer: C The Power Users group has some, but not all, of the user rights that Administrator accounts have In Windows Vista, the Power Users Group has been simplified and the Power Users group no longer exists unless you upgrade from Windows XP The other groups exist in both Windows XP and Windows Vista 18 Answer: B To help keep Windows secure, the guest account is disabled because it is meant to be used as an anonymous login with minimum access The Administrator account (Answer A) is not disabled There are no Power User (Answer C) or Remote User (Answer D) accounts 19 Answer: D The Users group contains all Windows accounts created on a Windows computer When a computer is added to the domain, Windows adds Domain users to the local Users group By default, the Administrators group (Answer A) only contains the Administrator user account The Guests group (Answer B) only contains the Guest user account By default, the Power Users group (Answer C) does not contain any accounts 20 Answer: D and E Installing a device driver and installing an application require administrative permissions Therefore, UAC prompts you to make sure it is something that you want to Answers A, B, and C are incorrect because standard users can this 21 Answer: B User Account Control is used to prevent unauthorized changes to the computer Answer A is incorrect because the Computer Management Console is used to manage the computer, including managing volumes, using the Event Viewer, and managing local users and groups Answer C is incorrect because the Windows Firewall helps block unwanted packets from getting to your computer Answer D is incorrect because the Event Viewer looks at warning and error messages and the security logs 22 Answers: A and D Windows XP Home does not provide the variety of account options found in Windows 2000 or XP Professional Windows XP Home provides only Limited and Administrative rights options for controlling access to system resources When a user is given a Limited account, she is enabled to access programs already installed on the computer but cannot install software or hardware components or change her account name or type The user cannot create a new user because this activity is relegated to computer administrators Therefore, the other answers are incorrect Security 399 23 Answer: A In Windows XP, the administrator has been given tools that can be used to limit what the user can to any given resource Non-hot-swappable devices, such as local printers, cannot be added to Windows 2000 or Windows XP systems without Administrator permissions In a Domain environment, members of the Print Managers group can normally add printers to the system Likewise, members of the Local Users group can add network printers to the system All these capabilities are based on the default permission settings for these groups; with the exception of the Administrators group, the capabilities of these groups can be modified through Group Policy settings Guests (Answer B), Users (Answer C), and Power Users (Answer D) cannot install non-hot-swappable devices 24 Answer: C The User Account Control asks for permission to continue when you are performing tasks that require you to be an administrator to ensure that you really want to complete the tasks Answer A is incorrect because the Windows Firewall prevents unwanted packets from the outside Answer B is incorrect because NTFS permissions help protect the files on an NTFS volume Answer D is incorrect because there is no such thing as an Internet Sharing Console 25 Answer: D To configure legacy applications to run under Windows Vista, you can right-click an executable and open the Properties dialog box From there, you can specify what environment to run under and, if necessary, specify if the application can run under an administrator account It is not recommended to give all users who need access to this application administrator accounts (Answers A and B) because they could cause other security problems Parental Control (Answer C) is not included in Windows Vista Enterprise 26 Answer: D By default, only members of the Administrators and Power Users groups have the ability to install applications in a Windows domain Members of other Windows groups not have this ability unless they are given it by a Group Policy or inherit it through a group association Therefore, the other answers are incorrect 27 Answer: D Power Users is a special group that has permissions to perform many management tasks on the system but does not have the full administrative privileges of the Administrator account (Answer A) Power Users can create and manage users and groups that they create Also, they not have access to files and folders on NTFS volumes unless they are granted permissions to them through other sources There are no members in this group when it is created Backup Operators, not Backup Administrators (Answer B), give the ability to back up and restore all files The Network Configuration Operators (Answer C) allow you to change the network configuration 28 Answer: B The most efficient method of assigning large groups of users access to the same resources is to (1) create the group, (2) make all users a member of the group, and (3) assign the group access permissions to the resource Therefore, the other answers are incorrect 29 Answer: D The message is generated by the User Account Control, which you can configure by using local or group policies Answer A is incorrect because the Power Users group is left behind from Windows 2000 and XP for backward compatibility Answer B is incorrect because all standard user accounts should already be a member of the Users group Answer C is incorrect because turning off the firewall would not get rid of the message 400 Chapter 10 30 Answer: D You need to edit the Local Security Policy to not prompt during installs by disabling the Detect Application Installations and Prompt for Elevation setting This will allow applications to be installed without prompting for the administrative credentials Answer A is incorrect because you don’t want to give administrative permission Answer B is incorrect because turning off User Account Control will stop protecting the system Answer C is also incorrect because Parental Controls cannot be used when a computer is connected to a domain 31 Answer: A Some users are not having the problem but other users Therefore, you need to focus on what is different between the two groups of users—in this case, you need to add the users who are having the problem to the administrator group Answer B is incorrect because if they were using the wrong usernames and passwords, they would not get logged into the system Answer C is incorrect because if the application runs as a standard user, it would affect all users Answer D is incorrect because there is no such thing as the application service 32 Answer: A and B The Control Panel User accounts and the Computer Management Console, specifically under Users and Groups, are used to add and manage user accounts Answer C is incorrect because Active Directory Users and Computers console is used to manage domain user accounts Answer D is incorrect because the Users and Groups Administrator console does not exist 33 Answer: A Folders and files and their NTFS permissions are managed by the Windows Explorer Answer B is incorrect because Active Directory Users and Computers console is used to manage the user and computer accounts within Active Directory, not NTFS permissions Answer C is incorrect because the Computer Management Console, which includes the disk administrator, can be used to look at the Event Viewer, to examine the status of the disks, and to manage the file system volumes, but it has nothing to with NTFS permissions Answer D is incorrect because the Disk Administrator has nothing to with NTFS permissions 34 Answer C NTFS is the only one that provides security features, such as encryption and NTFS permissions and the ability to use transaction tracking to keep the file system reliable Answers A and B are incorrect because they not offer the features just mentioned for NTFS NFS (Answer D) is a file system used in UNIX/Linux machines and is not supported by Windows Vista as a file system 35 Answer: B When users of a Windows 2000 system complain that they can see files in a folder but cannot access any of the files, they might have been assigned the List Folder Contents permission at the folder level The List Folder Contents permission enables users only to view the contents of the folder, denying them all other permissions, including Read and Execute The Read permission (Answer A) means they can open the files The Read & Execute permission (Answer C) can read and execute executable files The Modify permission (Answer D) means they can read and execute files, list folder contents, modify the contents of files, and change attributes 36 Answer: D When files and folders from an NTFS partition are moved to a FAT partition, their NTFS attributes and security features are lost Even moving files between different NTFS partitions on different drives can change the security level of the files Migrating NTFS data to a partition that has lower permission levels than the original partition causes the data to inherit the lesser permissions of the target folder Therefore, the other answers are incorrect Security 401 37 Answer: A and D The Modify permission enables users to modify and delete the file and to perform all the activities associated with the Read, Write, and Read & Execute permissions The Full Control permission enables the user or group to take ownership of the file and to change its permissions, as well as perform all the other activities possible with all the other permissions The Read permission (Answer B) only allows you to open and read a file The Write permission (Answer C) allows you to write and change a file 38 Answer: D When you combine NTFS and Share permissions, the most restrictive permissions are applied Therefore, the other answers are incorrect 39 Answer: A When you access a computer remotely through the share, you include the share permissions and the NTFS permissions, which can both restrict access When you access the local folder directly, only the NTFS permissions apply Therefore, they could have the same or more restrictive access if both are applied Answers B and C are incorrect because if the user is accessing it remotely, their share permissions may be further restricted Answer D is incorrect because the share and NTFS permissions combined also give the same access rather than more restrictive access 40 Answer: A, B, C, and D When you combine the NTFS permissions assigned to Pat and to the Manager group that Pat is a member of, Pat can read, write, execute, and delete the files in the folder When you access a folder directly on a local computer, Share permissions not apply 41 Answer: A and C When you combine the NTFS permissions assigned to Pat and to the Manager group that Pat is a member of, Pat can read, write, execute, and delete the files in the folder However, the Read share permission only allows the user to read and execute the files, blocking writing and deleting when going through the shared folder Answers B and D are incorrect because the Read permission blocked the Write and Delete permissions 42 Answer: A Pat is a member of the Managers group Because Deny All NTFS permissions has been granted to the Managers group, it blocks all permissions for Pat Answers B, C, and D are incorrect because no access permissions always wins Answer E is incorrect because permissions are assigned 43 Answer: B and D If you run the application with elevated privileges or manually give NTFS permissions, the user will be able to run the program Installing a Windows Vista Upgrade Advisor (Answer A) and Application Compatibility Toolkit (Answer C) will not overcome the problem; it will only point out incompatible applications 44 Answer: A In Windows, the administrator has the tools to limit what the user can to any given file or directory This is accomplished through two types of security permissions: share permissions and NTFS permissions The sharing function is implemented at the computer that hosts the folder or resource (resources are devices capable of holding or manipulating data) To access the shared remote resource, the local operating system must first connect to it After the connection has been established, the level of access to the resource is controlled by the share or NTFS permissions (or a combination of the two) configured (or inherited) for the resource Therefore, the other answers are incorrect 402 Chapter 10 45 Answer: B When you copy a file to a different NTFS, the file is new to the partition As a result, it will inherit the attributes of the target folder Therefore, the other answers are incorrect 46 Answer: C When you copy the file from one folder to another folder within the same NTFS partition, it creates a brand-new file in that folder Therefore, it inherits the permissions of the target folder Therefore, the other answers are incorrect 47 Answer: A Because you are moving the file, it only changes the file allocation table to indicate the new location Therefore, it will retain the same permissions that it had before The other answers are incorrect 48 Answer: D When you are moving a folder to a different NTFS partition, it is a new file to that NTFS partition Therefore, it will receive the permissions of the target folder The other answers are incorrect 49 Answer: A When giving NTFS permissions, a Deny permission always wins out Therefore, you will need to remove Pat from the Research group so that he no longer has the Deny permission Therefore, the other answers are incorrect 50 Answer: C For other users to access your shared folders, including the public folder, you need to enable the Password Protected Sharing option Answer A is incorrect because this scenario mentioned any problem with name resolution Answer B is incorrect because the Public Folder sharing option would not affect the other shared folders Answer D is needed for Link Layer Topology Discovery (LLTD) 51 Answer: C One place to store the report is in the public folder where they both can have access to it Answers A, B, and D are not the best answer because they not provide a secure environment where one user cannot look at the data files of another user 52 Answer: A To view the computer using the network map, you need to have the Link Layer Topology Discovery (LLTD) operational Therefore, you need to have the Network Discovery service Answers B and C are incorrect because Share and NTFS permissions have nothing to with a computer showing on the network map Answer D is incorrect because there is no indication that there is a name resolution problem 53 Answer: B From the command prompt environment, you can use the attribute command to verify that the hidden system files have been successfully copied to the disk (that is, attrib -r -s -h c:\ntldr to make it visible and to remove its read-only, system, and hidden status) The attrib +r +s +h c:\ntldr command (Answer D) will enable the read-only, system, and hidden attributes Using the attrib command is quicker than restarting the entire system (Answer C) In addition, you should not change the attributes of the C: drive from the Properties page (Answer A) 54 Answer: B To change a file’s attributes in Windows Explorer, right-click on the desired file, select the Properties option from the pop-up list, move to the General page, and click on the desired attribute boxes Therefore, the other answers are incorrect 55 Answer: A It is a good security move to convert any FAT or FAT32 partitions to NTFS so that the stronger NTFS and share permissions can be used to provide stronger control over access to data on the drive This also allows you to use the NTFS encrypting file system to protect files on the drive When a file is moved from an NTFS partition to a FAT partition, the NTFS-specific attributes are discarded Therefore, the other answers are incorrect Security 403 56 Answer: C Encryption is treated as a file attribute in Windows Therefore, to encrypt a file, you need to access its properties page by right-clicking it and selecting its Properties option from the pop-up menu Move to the Advanced area under the General tab and click the Encrypt Contents to Secure Data check box You cannot encrypt an entire drive (Answers A and D), and files and folders are not automatically encrypted on NTFS5 (Answer B) 57 Answer: A When you get a TPM error, you need to restart the computer and enter the recovery password in the recovery console Answer B is incorrect because you cannot log in as any user because of the TPM error Answer C is incorrect because disabling the feature in BIOS will not decrypt the disk Answer D is incorrect because it will not be able to open the TPM management console 58 Answer: B Because BitLocker encrypts the entire drive, it is the best solution Answer A is incorrect because you can connect a stolen hard drive to another system that has another operating system and bypass much of the security on the stolen drive, including those set by NTFS permissions Answer C is incorrect because IPSec is used to encrypt data being transmitted over the network Answer D is incorrect because EFS is made only to encrypt data files, not system files 59 Answer: B You need to have two NTFS volumes, not one Answers A, C, and D are correct because they are requirements for BitLocker 60 Answer: D Biometric scanners are getting significantly more sophisticated—including facial-scanning devices, searchable databases, and supporting application programs However, the biometric authentication device most widely used with PCs is the fingerprint scanner Some manufacturers offer miniature touchpad versions that sit on the desk and connect to the system through a cable and USB connector Other fingerprint scanners are built into key fobs that plug directly into the USB port Some manufacturers even build these devices into the top of the mouse Changing the encryption algorithm (Answer A) for login is a complicated process A fingerprint scanner (Answer B) is easier and less expensive than a retinal scanner Using a Shared Secret login (Answer C) would be less secure 61 Answer: C In matters of security, such as handling of passwords, you should always fall back on the company’s policies to protect the company, its employees, its proprietary information, its intellectual properties, and yourself Therefore, the other answers are incorrect 62 Answer: A, B, and C Access to network accounts is based on your user account name and password, which the network asks for each time you log on Forgetting or misspelling either item results in your being denied access to the network Password entries are typically case sensitive, so forgetting to properly capitalize key characters or having the Caps Lock key engaged prevents the system from authenticating you and providing access On the other hand, if the network server is down, there is no component in the network to authenticate you and log you in Finally, if you violate one of the network’s established password policies, you might be locked out and prevented from logging in for a predetermined amount of time There is no such thing as a NSLOOKUP server A DNS server would provide name resolution, and you can use the nslookup command to help troubleshoot name resolution problems 404 Chapter 10 63 Answer: C The Secure Sockets Layer (SSL) protocol is used to authenticate organizations or e-commerce servers on the Internet and to encrypt/decrypt messages using a security process called public-key encryption Most e-commerce transactions are protected under SSL HTTP (Answer A) is a web protocol that is not secure IMAP (Answer B) and SMTP (Answer D) are protocols for email 64 Answer: D Of these protocols, only MS-CHAPv2 provides two-way authentication where both the server and client authenticate each other Therefore, the other answers are incorrect 65 Answer: A PAP is short for Password Authentication Protocol It is a simple protocol that sends the username and password in clear text and therefore is not recommended The other authentication protocols not use clear text 66 Answer: B CHAP is short for Challenge Handshake Authentication Protocol It does not send the username and password across the network Instead, it uses a challenge response with a one-way hash algorithm It is an industry standard protocol that can be used to authenticate non-Windows-based clients PAP (Answer A) sends the username and password in clear text MS-CHAP (Answer C) and MS-CHAPv2 (Answer D), created by Microsoft, improve on CHAP by including a password change mechanism 67 Answer: D EAP is short for Extensible Authentication Protocol It is an extension of PPP that provides support for other authentication mechanisms, such as smart cards This authentication protocol requires the presence of a PK infrastructure (PKI) CHAP (Answer A), MS-CHAP (Answer B), and MS-CHAPv2 (Answer C) are popular remote access protocols 68 Answer: B Kerberos is the primary authentication protocol used on today’s Windows domains You don’t need to upgrade Windows XP to Windows Vista (Answer A) and you don’t have to configure the local policies (Answer C) to activate this feature For Windows to automatically use Kerberos, it must be part of the domain Therefore, Answer D is not correct 69 Answer: B BitLocker To Go is used to encrypt entire volumes on flash drives Answer A is incorrect, because BitLocker, which was introduced with Windows Vista, is used to encrypt volumes on hard drives Answers C and D are incorrect, because EncToGo and GoSecure not exist in Windows Your Publisher for IT Certification Apps Pearson IT Certification is the leader in technology certification learning and preparation tools Articles & Chapters Blogs Books Visit pearsonITcertification.com today to find eBooks • CERTIFICATION EXAM information and guidance for IT certifications, including eBooks (Watermarked) Cert Flash Cards Online Newsletters • EXAM TIPS AND TRICKS by reading the latest articles and sample chapters by Pearson IT Certification·s expert authors and industry experts, such as Podcasts Question of the Day Rough Cuts • Mark Edward Soper and David Prowse CompTIA Short Cuts • Wendell Odom - Cisco Videos • Shon Harris - Security • Thomas Erl - SOACP Connect with Pearson IT Certification pearsonITcertification.com/ newsletters • SPECIAL OFFERS (pearsonITcertification.com/promotions) • REGISTRATION for your Pearson IT Certification products to access additional online material and receive a coupon to be used on your next purchase Be sure to create an account on pearsonITcertification.com and receive member·s-only offers and benefits Pearson IT Certification is a publishing imprint of Pearson twitter.com/ pearsonITCert facebook.com/ pearsonitcertification youtube.com/ pearsonITCert pearsonitcertification com/rss/ The CompTIA A+ Cram Sheet This cram sheet contains the distilled, key facts about the CompTIA A+ 220-701 and 220-702 exams Review this information as the last step before you enter the testing center, paying special attention to those areas where you think that you need to the most review Hardware Motherboards connect everything together Typical form factors include ATX (most common), BTX, microATX, and NLX The chipset includes a northbridge that connects the CPU, RAM, and x16 PCIe devices, and southbridge that connects secondary systems such as USB, SATA, IDE, and sound Types of expansion busses include PCI, AGP, PCI Express (PCIe), AMR, CNR, and PC Card (PCMCIA) The central processing unit (CPU) or processor takes care of all calculations Common CPUs such as the Core can have multiple cores and usually connect to LGA775 sockets Random Access Memory (RAM) types include SDRAM, DDR, DDR2, DDR3, RDRAM, and SODIMMs ATX Power Supplies connect to the motherboard by way of a P1 20-pin or 24-pin cable Switchable between 115 and 230 VAC Hard disk drives are nonvolatile devices that store data, generally 3.5" Types of hard disks include PATA: Parallel ATA drives range between 33MHz and 133MHz (Ultra ATA/33 through /133), use a 4-pin Molex power connector, 40-pin IDE ribbon cable for data, and can be jumpered as single, master, slave, or cable select SATA: Serial ATA drives come in 150, 300, and 600MB/s versions, use a 15-pin power connector, and 7-pin data connector SCSI: Small Computer System Interface drives range in transfer rates from 160MB/s to 640MB/s, and use 68-pin, 80-pin, or serial connectors RAID stands for Redundant Array of Inexpensive Disks RAID is striping, RAID is mirroring, and RAID is striping with parity RAID is not fault tolerant Optical disc drives use removable media to store and retrieve data, typically 5.25" Types of optical discs include CD-ROM: Data CDs can typically hold 700MBs, can read and write at up to 52x (7.8MB/s), and rewrite at up to 32x (4.8MB/s) DVD-ROM: DVDs have a capacity ranging from 4.7GB (DVD-5) to 17GB (DVD-18 dual-sided and dual-layered) Recording technologies include DVD+R, DVD-R, DVD+RW, and DVD-RW Blu-Ray: Blu-Rays are used for HD and games, have a capacity of 50GB, and a write speed of between 1x and 8x (36Mbps—288Mbps) Blu-Ray drives connect via SATA only Floppy drives use 1.44MB 3.5" disks and connect to the motherboard via 34-pin data cable and 4-pin mini power connector A LED that won’t shut off indicates an upside-down data cable Solid-state media includes USB flash drives, CompactFlash, and Secure Digital (SD) cards 10 Laptops are smaller versions of desktop PCs They have replaceable items such as keyboards, SODIMM RAM, displays, inverters, optical discs, and 2.5" hard drives Laptops use PC Card, CardBus, and ExpressCard technologies They have an Fn key for implementing secondary key functions 11 Video cards connect to motherboards by way of x16 PCIe (black), AGP (brown), or PCI (white) expansion slots Video connector types include DVI, VGA, HDMI, S-Video, and Component Video/RGB Common color depths include 16-bit, 24-bit, and 32-bit Common resolutions include XGA (1024x768), WXGA (1280x720), SXGA+ (1280x1024), UXGA (1600x1200), WSXGA+ (1680x1050), and WUXGA (1920x1200) 12 Sound cards connect as x1 PCIe or PCI cards, and normally have PC 99 colorcoded 1/8" mini-jacks for I/O and speakers, and optical I/Os known as S/PDIF 13 USB (Universal Serial Bus) can have up to 127 devices USB 1.1 (full speed) runs at 12Mbps with a max cable length of meters; USB 2.0 (high-speed) runs at 480Mbps, max cable length: meters Computers usually have Type A connectors built in 14 IEEE 1394a (FireWire 400) runs at 400Mbps FireWire 800 runs at 800Mbps IEEE 1394b incorporates FireWire 800 and also specifies 1600Mbps and 3200Mbps IEEE 1394 chains can have up to 63 devices 15 Printers include laser, inkjet, thermal, and impact (dot-matrix) The six steps in the laser printing process are Cleaning, Conditioning (charging), Writing (exposing), Developing, Transferring, and Fusing 26 The Registry is a database that stores 27 28 29 30 31 32 Software 16 Windows requirements: CPU=1GHz, 17 18 19 20 21 22 23 24 25 RAM=1GB (2GB for 64-bit), Free disk space=16GB (20GB for 64-bit) Windows Vista requirements: CPU=800MHz, RAM=512MB, and Free disk space=15GB New features in Vista include GUI called Aero, extended partitions, and UAC (User Account Control) that requires administrator credentials from users to accomplish certain tasks Windows XP requirements: CPU=233MHz, RAM=64MB, Free disk space=1.5GB Setuperr.log contains setup errors during an installation of Windows Graphical User Interface (GUI) includes the desktop, icons, taskbar, Start menu, Quick Launch, System Tray, application windows and dialog boxes, and gadgets Command Prompt is the command-line utility in Windows To run in elevated mode: Click Start > All Programs > Accessories; then right-click Command Prompt and select Run as Administrator Snap-ins are console windows that can be added to a Microsoft Management Console (MMC) Libraries in Windows logically represent user-defined collections of folders Common system tools include Device Manager, System Information tool, Task Manager, Msconfig User data can be migrated using Windows Easy Transfer (Windows and Vista only), User State Migration Tool (USMT), and Files and Settings Transfer Wizard (XP) 33 34 35 36 37 38 39 40 41 42 the settings for Windows It can be accessed by opening the Run prompt and typing regedit.exe Hives store settings; a commonly modified hive is HKEY_LOCAL_MACHINE Remote Desktop software enables a user to see, and control, the GUI of a remote computer The %systemroot% in Windows 7/Vista/XP is C:\Windows, and in 2000 is C:\Winnt Windows 7/Vista boot files include Bootmgr, BCD XP boot files include NTLDR, Boot.ini, and NTdetect.com Directories can be added with the MD command, removed with the RD command, and navigated to with the CD command File checking command-line tools that can be used in Windows include Chkdsk and SFC (System File Checker) A hard disk can have four partitions: up to four primary partitions, but only one extended partition Logical drives are sections of an extended partition The Active partition is the one that is booted from; it usually contains the OS A service pack (SP) is a group of updates, bug fixes, updated drivers, and security fixes installed from one downloadable package or from one disc Windows Update can be accessed from Start > All Programs > Windows Update A hard disk can be maintained with tools such as Disk Cleanup and Disk Defragmenter (defrag.exe) Backups can be accomplished in Windows 7/ Vista with Backup and Restore and in XP with NTBackup System Restore can fix issues caused by defective hardware or software by reverting back to an earlier time F8 brings up the Advanced Boot Options menu that includes options such as Safe Mode, Enable low-resolution video, and Last Known Good Configuration Safe Mode boots the system with minimal drivers The Windows 7/ Vista Windows Recovery Environment (WinRE) includes System Recovery Options such as Startup Repair, System Restore, and Command Prompt Windows XP uses the Recovery Console as its repair environment The Event Viewer warns about possible issues and displays errors as they occur within three main log files: System, Application, and Security Security displays information if auditing has been turned on A stop error (also known as a Blue Screen of Death or BSOD) completely halts the operating system and displays a blue screen with various text and code Networking 43 IPv4 addresses are 32-bit dotted-decimal numbers, for example, 192.168.1.1 and can be statically (manually) inputed or dynamically assigned (DHCP) IP Classes include Class A range: 1–126, subnet mask: 255.0.0.0 Private: 10.x.x.x Class B range: 128–191, subnet mask: 255.255.0.0 Private: 172.16.0.0– 172.31.255.255 Class C range: 192–223, subnet mask: 255.255.255.0 Private: 192.168.x.x 44 IPv6 addresses are 128-bit hexadecimal numbers, for example: 2001:7120:0000 :8001:0000:0000:0000:1F10 ::1 is the loopback address Unicast IPv6 addresses are assigned to a single interface and are the most common type 45 Common network speeds are 1000Mbps and 100Mbps 46 Common protocols include FTP (File Transfer Protocol) Port 21 SSH (Secure Shell) Port 22 Telnet Port 23 SMTP (Simple Mail Transfer Protocol) Port 25 HTTP (Hypertext Transfer Protocol) Port 80 POP3 (Post Office Protocol) Port 110 HTTPS (HTTP Secure) Port 443 47 Common cabling protocols include Category 3: 10Mbps Category 5: 100Mbps Category 5e: Rated for 100Mbps and gigabit networks Category 6: Rated for 100Mbps and gigabit networks 48 Common command-line tools include Ipconfig: Displays current TCP/IP network configuration values; Ipconfig/all shows additional information Ping: Tests whether another host is available over the network (example: ping 192.168.1.1) Tracert: Sends packets to test destinations beyond the local computer’s network Netstat: Shows the network statistics for the local computer Nslookup: Used to query DNS servers to find out DNS details including the IP address of hosts Net: Used to map network drives, view computers, and start and stop services 49 Wireless Ethernet versions, including their name, data transfer rate, frequency, and modulation used 802.11a, 54Mbps, 5GHz, OFDM 802.11b, 11Mbps, 2.4 GHz, DSSS 802.11g, 54Mbps, 2.4 GHz, OFDM 802.11n, 600Mbps (300 typical), and 2.4GHz, OFDM 50 Bluetooth is a short range technology aimed at simplifying communications and synchronization among network devices Bluetooth is divided into three classes Class I has a maximum transmission range of 100 meters, Class II (the most common) has a range of 10 meters, and Class III is short range and hardly used at meter Bluetooth Version has a maximum data transfer rate of 721Kbps, and version is 2.1Mbps 51 Wireless encryption protocols include WEP (Wired Equivalent Privacy), 64-bit key size (typical) WPA (Wi-Fi Protected Access), 256-bit TKIP (Temporal Key Integrity Protocol), 128-bit AES (Advanced Encryption Standard), 128-bit, 192-bit, and 256-bit 52 Port forwarding forwards an external network port to an internal IP address and port 53 Port triggering enables you to specify outgoing ports that your computer uses for special applications; their corresponding inbound ports open automatically when the sessions are established Security 54 Data security is the act of protecting data from threats and possible corruption Threats include Malicious software: Known as malware, this includes computer viruses, worms, Trojan Horses, spyware, rootkits, and adware Unauthorized access: Access to computer resources and data without consent of the owner System failure: Computer crashes or individual application failure Social engineering: The act of manipulating users into revealing confidential information or performing other actions detrimental to the user 55 Data security technologies that can protect against, or help recover from, the preceding threats include Authentication: This is the verification of a person’s identity, and it helps protect against unauthorized access It is a preventative measure that can be broken down into three categories: Something the user knows, for example a password or PIN, Something the user has, for example, a smart card or other security token, and Something the user is, for example, the biometric reading of a fingerprint or retina scan Antimalware software: Protects a computer from the various forms of malware, and if necessary, detects and removes them Data backups: Backups enable you to recover data after an attack or other compromise, or system failure Encryption: The act of changing information using an algorithm known as a cipher to make it unreadable to anyone except users who possess the proper “key” to the data Data removal: Three common options: Clearing This is the removal of data with a certain amount of assurance that it cannot be reconstructed Purging Also known as sanitizing; this is once again the removal of data, but this time, it’s done in such a way so that it cannot be reconstructed by any known technique Destruction This is when the storage media is physically destroyed through pulverizing, incineration, and such User awareness: Employee training and education, easily accessible and understandable policies, securityawareness emails, and online security resources 56 BIOS security includes supervisor and user Trojan Horses: Appear to perform desired functions but are actually performing malicious functions behind the scenes Spyware: Type of malicious software that is either downloaded unwittingly from a website or is installed along with some other third-party software 58 Permission Inheritance: If you create a folder, the default action it takes is to inherit permissions from the parent folder 59 Types of encryption include Symmetric key: Uses a common shared key between the sender and the receiver Examples of symmetric key technology include Encrypting File System (EFS), BitLocker, WEP, WPA, Kerberos, AES, 3DES, and Rivest Cipher Asymmetric key: Uses two keys, one is public, the other private Examples of asymmetric key technology include RSA and ECC Encrypting File System (EFS): Encrypts one or more files or folders directly within the Properties page BitLocker: Encrypts an entire disk, available only on Vista Ultimate and Vista Enterprise CompTIA Six-Step Troubleshooting Process 60 Following is the newly revised CompTIA six-step troubleshooting process: Identify the problem Establish a theory of probable cause (Question the obvious.) Test the theory to determine the cause Establish a plan of action to resolve the problem and implement the solution Verify full system functionality and if applicable implement preventative measures Document findings, actions, and outcomes passwords, drivelock passwords, disabling removable media, and setting the boot device priority to hard drive first 57 Malicious software, or malware, is software that is designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent Types Student Area include Fill in anything else you think will be valuable Virus: A virus is code that runs on a to you here computer without the user’s knowledge; it infects the computer when the code is accessed and executed Types include Boot Sector, Macro, Program, Polymorphic, Stealth, and Multipartite Worms: Worms are much like viruses except that they self-replicate whereas a virus does not ...® CompTIA A+ 220- 701 and 220- 702 Practice Questions Fourth Edition Patrick Regan CompTIA A+ 220- 701 and 220- 702 Practice Questions Exam Cram, Fourth Edition Publisher Paul... answering the ques- tions, you can quickly grade your exam from this section Only correct CompTIA A+ 220- 701 and 220- 701 Practice Questions Exam Cram answers are given in this section No explanations... real exam You will find questions that you will face in real life This book is organized according to the objectives published by CompTIA for the 220- 701: CompTIA A+ Essentials and 220- 702: CompTIA