1/322
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Types of laptop battery configs
Modular and integrated
Types of laptop batteries
Lithium-ion and Lithium-ion polymer
Most common components
Keyboard and single ribbon cable
Laptop memory module
SO-DIMM (Small Outline Dual In-line Memory Module)
types of storage medium
Magnetic Disk (HDD) and Solid State Drive (SSD)
Magnetic disk
Spinning drive platter, 2.5” form factor, 3.5” for desktop
Sollid State Drive (SSD)
no moving parts, fast access, less latency, 2.5”
Laptop wireless network connectivity
802.11, integrated into motherboard, wrap at top of screen
802.11
Local area network, high speed, internet access
Bluetooth
Personal area network, short range, high speed comms, connect peripherals & other nearby devices, 802.11, 2.4 GHz
Biometrics
config in OS
Near field communication NFC
mobile phones and smart watches, used for payment methods, short range network functions, data transfer or authentication
Webcam
built-in camera and mic, audio and video with special drivers, accessible from multimedia apps
Use of mobile devices
sync, connectivity, backup, identification
USB
Universal Serial Bus, high speed wired comms, charging and data transfer.
USB-C and uses
24 pin double sided usb connector, display port, HDMI, Thunderbolt
Lighting and uses
8 pin digital signal, apple legacy devices, high power output, simple design
NFC
send small amount of data wirelessly over limited area
Hotspot
use phone as WiFi hotspot to connect multiple devices to one phone
Tethering
personal wireless router with one device connected to one phone
Stylus
pens for mobile devices, bluetooth connected, pressure sensitive, programmable buttons, must be compatible with device
Headset
hands free audio, wired connection with USB on laptop and 3.5 mm tip ring ring sleeve jack
Speakers
battery powered mobile audio, wireless with bluetooth link and stereo sound
Docking station
external keyboard and mouse that extends existing laptop interfaces, adds functions, desktop adapter cards, avoids cables
Port replicator
similar to docking station with no expansion card option and connects using USB
Trackpad
tight working area with laptops to replace mouse, battery and bluetooth options
Drawing Pad
external input using stylus, third party device with support for many OS
3G Network
several MB/s with bandwidth improvement in GPS, mobile TV, video on demand and confrencing
4G and LTE
Long term evolution based on Global System for Mobile Comms (GSMC) and Enhanced Data Rates for GSM Evolution (EDGE), download rate of 150 MB/s
5G
Modern mobile network with 10 GB/s, less bandwidth, large data transfers, faster monitoring and notification, additional cloud processing
WiFi
Local 802.11 network for data access to email and internet, high speed, requires local access point and limited distance, supported by carrier and available without coverage
Subscriber Identity Module
Unique id for cellular devices with tiny physical card that contains ID, phone number, cell network info, and storage for contacts
eSIM
similar to SIM but integrated into mobile device
Bluetooth pairing
built-in security with pin verification
GPS
created by DoD, relies on 30 satelites in orbit, gives precise navigation through: longitude, latitude, altitude, and time difference
Corporate Owned Personally Enabled
COPE, company buys device for employee to use as corporate and personal device
Choose Your Own Device
CYOD, choice of device is done by user
Policy Enforcement
Uses MDM for central configuration of corporate email, account details, server address, and communication methods
2FA
Requires authentication types such as biometrics and pseudorandom authentication apps
Corporate Applications
allow or restrict app install and prevent unauthorized app usage
Data syncÂ
based on data rates and used for backup and recovery
Types of data
Transmission Control Protocol (TCP) and User Data Protocol (UDP), OSI layer 4 (transport)
Multiplexing
Using many different applications at the same time
Ethernet payload
IP and IP Payload {TCP & TCP Payload}, TCP Payload {http payload}
TCP
Connection based with HTTPS and SSH, uses acknowledgement, has error recovery, and reorders data and transmissions
UDP
connectionless, no acknowledgement, no error recovery or reordering of data and transmissions,
Connectionless protocols
Dynamic Host Configuration Protocol (DHCP) and Trivial File Transfer Protocol (TFTP)
Port number
specific receiving location within IP address
IPv4
Server IP address and client IP address
Server IP address
Protocol and server application port number
Client IP address
Protocol and client port number
Non-ephemeral port
Permanent port numbers 0 - 1023, usually on a server
Ephemeral port
Temporary port number 1024 - 65535, determined by client in real time
Web server
TCP/80
VoIP
UDP/5004
Email server
TCP/143
File Transfer Protocol (FTP)
TCP/20 for active mode data and TCP/21 for control, transfers files between systems with authentication using username and password, full feature function
Secure Shell
TCP/22, encrypted comms link
Telnet
TCP/23, telecoms network, login to device remotely for console access, in the clear comms
Simple Mail Transfer Protocol
SMTP, TCP/25 for server to server email transfer and device to mail server
Domain Name System
DNS, UDP/53 for converting name to IP and vice versa, multiple systems available
Dynamic Host Configuration Protocol
DHCP, UDP/67 and UDP/68 for auto config and assignment of IP address in real time from pool with lease and renewal,
Dynamic Host Configuration Protocol Reservation
DHCP assigned by MAC address in DHCP server and managed from one location
Hyper Text Transfer Protocol
HTTP, TCP/80 for web server comms
Hyper Text Transfer Protocol Secure
HTTPS, TCP/443 for web server comms using encryption
Post Office Protocol Version 3
POP3, TCP/110 for basic mail transfer functions
Internet Message Access Protocol Version 4
IMAP4, TCP/143 for management of email inbox from multiple clients
Server Message Block
SMB, UDP/137 for NetBIOS name service, TCP/139 for NetBIOS session service, used for file sharing, printer sharing, and Common Internet File System (CIFS), TCP/445 for SMB comms over TCP without NetBIOS
Lightweight Directory Access Protocol
LDAP, TCP/389 for store and retrieve info in network directory and microsoft active directory
Remote Desktop Protocol
RDP, TCP/3389 for sharing desktop from remote location to control entire computer and applications
DNS server
Distributed naming system, load balance across servers, managed by ISP
File share
Central storage of documents, SMB, Apple Filing Protocol (AFP)
Print Server
Connect printer to network with software on computer or built-in to printer, uses SMB, Internet Printing Protocol (IPP), or Line Printer Daemon (LPD)
Mail Server
Store incoming mail, send outgoing mail, managed by ISP
SYSLOG
Standard message logging, integrated into SIEMs
Authentication Server
Authentication, authorization, accounting server with login
Database Server
Database table storage of columns and rows for relational DB using SQL
NTP Server
Network Time Protocol uses encryptions and logins for backups and log timestamps
SPAM gateways
Stop unsolicited email, onsite and cloud based
All In One Security Appliance
Next gen firewall with Unified Threat Management (UTM), includes URL filter with malware, content & spam inspection, acts as router/switch, firewall, and VPN endpoint
Load Balancer
Distributes load across multiple servers that is invisible to users, large scale implementation not affected by server outages
Proxy server
intermediate server, handles client request to proxy which performs request and sends back results, access control usage
SCADA/ICS
Supervisory Control and Data Acquisition system, Industrial Control System
Legacy system
Old system that is still important
Embedded system
Purpose built device with direct access to OS, alarm system, door security, time card system
IOT
Includes appliances, smart devices, air control, & access
802.11ac
WiFi 5
802.11ax
WiFi 6/WiFi 6e
802.11be
WiFi 7
DNS config in terminal
dig on Linux, nslookup on windows
Resource records
database records of domain name services, 30 record types
Address records
AAAA, defines IP address of host
Canonical name records
CNAME, name is alias of another canonical name, one physical server, multiple services
Mail exchanger record
MX, determines host name for mail server
Text records
human readable text info, used in verification and email security
Domain Keys Identified Mail
DKIM, digitally sign domain outgoing mail, validated by mail server, public key is in text record
Sender Policy Framework
SPF, Protocol that lists all servers authorized to send email for a domain, prevents mail spoofing, performs check to see if incoming mail is from authorized host
Domain Message Authentication Reporting and Conformance
DMARC prevents unauthorized email spoofing, extension of SPF and DKIM
DORA
Discover DHCP server, get an offer, lock in offer, DHCP server configuration
DCHP scope
predefined list of ip addresses that can be assigned