knowt logo

compTIA A+ Exam Flashcards

Motherboard 

• For connecting all components. 
• Form factors: ATX, micro ATX, and ITX. 
• Types of expansion buses: PCI Express (PCIe) and PCI. 
• Intel chipsets link to CPU via DMI or QPI. 
• AMD CPU-to-chipset connection is Hyper Transport. 

 

Central processing unit (CPU) 

Handles most calculations. Each core contains L1/L2 cache. The entire CPU shares L3 cache. 
 
Intel CPUs use these sockets: 
• LGA775 
• 1150 
• 1155 
• 1156 
• 1366 
• 2011 
 

AMD CPUs use these sockets:AM3 
• AM3+ 
• FM1 
• FM2 
• FM2 

 

Random Access Memory (RAM) 

• RAM DIMMs include DDR (184 pins), DDR2 (240 pins), DDR3 (240 pins) and DDR4 (288 pins). 
• RAM SODIMMs include DDR (200 pin), DDR2 (200 pin), DDR3 (204 pin), and DDR4 (260 pin). 
• Dual-channel: 2× width of 128-bit bus. 
• Triple-channel: 3× width of 192-bit bus. 
• Quad-channel: 4× width of 256-bit bus. 
• Latency measured as CL or CAS. 

 

 

 

Serial Advanced Technology Attachment (SATA) 

It consists of a 15-pin power connection and a 7-pin data connector. 
 
Revisions: 
• Rev 1 (1.5 Gb/s), 
• Rev 2 (3 Gb/s), 
• Rev 3 (6 Gb/s), 
• Rev 3.2 (SATA Express) (16 Gb/s), 
• Rev 3.2 (SATA Express) (16 Gb/s). 
 
mSATA = mini-SATA. 

 

Hard disk drive (HDD) 

Speeds: 5,400 RPM, 7,200 RPM, 10,000 RPM, 15,000 RPM 
Form factors: 3.5”, 2.5” 

 

Solid-state drive (SSD) 

Communication interfaces: 
• Non-Volatile Memory Express (NVMe) 
• SATA 
• Peripheral Component Interconnect Express (PCIe): x1, x2, x8, x16 
Form factors: M.2, mSATA 

 

Solid-state media 
• SSDs 
• USB flash drives 
• CompactFlash 
• Secure Digital (SD) cards 

 

 

 

 

 

Redundant Array of Independent/Inexpensive Disks (RAID) 

• RAID 0 = striping; not fault tolerant. 
• RAID 1 = mirroring. RAID 1 + two disk controllers = disk duplexing. 
• RAID 5 = striping with parity. 
• RAID 10 = mirrored sets in a striped set. 

 

Small Computer Systems Interface (SCSI)  

Modern SCSI standards
• Serial Attached SCSI (SAS) 
• Internet SCSI 

 

IPS - In-Plane Switching. Possesses a wider viewing angle. 

 

TN - Twisted Nematic. 

 

Optical media - Optical disc drives use changeable media to store and retrieve data. 
Versions: 
• read-only memory (ROM) 
• write-once ® 
• rewritable/write-many (RW) 

 

Compact Disc (CD) 

Capacity: 650–700 MB 

 

 

 

 

 

Digital video/versatile disc (DVD) 

Special formats
• DL: dual-layered 
• DS: double-sided 
Capacity: 4.37 – 17 GB 
Recording technologies: DVD+R, DVD-R, DVD+RW, and DVD-RW. 

 

Blu-ray disc (BD) 

For games and HD movies. 
Capacity: 25–128 GB (Mini-disc capacity: 7.8 or 15.6 GB) 

 

Laptop - Portable miniaturized versions of desktop computers. 

Uses M.2, Mini PCIe, and Mini PCI (internal) and Express Card /34 and /54 (external). 
Replaceable components: 
• Keyboards 
• Touchpads 
• SODIMM RAM 
• Screens 
• Inverters 
• Batteries 
• Optical disc drives 
• Smart card readers 
• Hard drives (SSD, HDD, or hybrid). 

 

 

 

 

 

Heat sink 

  • When installing a heat sink, use thermal paste or pads for filling in gaps and increasing thermal conductivity between CPU and heat sink. 

  • Liquid-based cooling systems have higher thermal transfer capabilities than air cooling. 

  • To minimize overheating, a “dual-rail” power supply unit (PSU) separates and controls the current in each wire. 

 

Sound card 

Links as x1 PCIe (or PCI cards) and will typically have PC 99 color-coded 1/8” mini-jacks for I/O and speakers and optical I/Os known as S/PDIF. 

 

Video card - You link them to motherboards through x16 PCIe or PCI expansion slots. 
Video connector types and cables
• DVI 
• VGA 
• HDMI 
• Mini-HDMI 
• DisplayPort 
• Mini Display Port 
• S-Video 
• Component Video/RGB 
• Composite 

Typical color depths
• 16-bit 
• 24-bit 
• 32-bit 
 

Typical resolutions (aspect ratio): 
• 1280×720 (720p, 16:9) 
• 1920×1080 (1080p, 16:9) 
• 1366×786 (16:9) 
• 1680×1050 (WSXGA+, 8:5) 
• 1920×1200 (WUXGA, 8:5) 
• 640×480 (VGA, 4:3) 

 

Image processing of laser printing 

1. Processing 
2. Charging 
3. Exposing 
4.Developing 
5. Transferring 
6. Fusing 
7. Cleaning 

 

Printer configuration settings 

• Duplexing: printing on both sides. 
• Collation: printing many jobs in a row. 
• Orientation: portrait/landscape. Quality: 600 or 1200 DPI. 

 

BIOS/UEFI 

• Locates, tests, and initializes components and boots to the hard drive, optical disc, USB flash drive, or network by PXE. 
• CMOS stores time/date and passwords. 
• A CR2032 lithium battery powers the CMOS. 

 

BIOS/UEFI configurations 

• Time/date 
• Boot device order 
• Passwords 
• Power management 
• WOL 
• Monitoring 
• Clock and bus speeds 
• Virtualization support (Intel VT or AMD-V) 
• Enable/disable devices 
• Diagnostics 
• Security 
• Intrusion detection 

 

Networking 

LAN - Local area network 

WAN - Wide area network 

MAN - Metropolitan area network 

PAN - Personal area network 

SAN - Storage area network 

WLAN - Wireless local area network 

Network Address Translation (NAT) - Modifying IP address as it crosses a router 

Port forwarding - Forwards outside network port to internal IP address and port 

Switch - Connect computers in LAN 

Router - Connects ≥2 LANs to the Internet 

Firewall - Safeguards computers and networks against unauthorized access 

IDS - Intrusion detection system 

IPS - Intrusion prevention system 

UTM - Unified threat management 

 

Network Cables 

Twisted pair - RJ45, RJ11 

Fiber optic - SC, ST, LC 

Coaxial - F-connector, BNC 

Plenum-rated - Fire-resistant cable designed for airways, conduits, and regions where sprinklers cannot reach. 

Cabling Standards: 

3 - 10 Mb/s 

5 - 100 Mb/s 

5e - 100 Mb/s and gigabit networks 

6/6a - gigabit and 10 Gb/s networks 

7 - gigabit and 10 Gb/s networks 

 

Wiring Pattern 

T568A: 

1. White/green 
2. Green 
3. White/orange 
4. Blue 
5. White/blue 
6. Orange 
7. White/brown 
8. Brown 

T568B: Swap “green” and “orange” in T568A. 

 

Connection Methods 

Thunderbolt: 

• Version 1 is 10 Gb/s and uses DisplayPort; 
• Version 2 is 20 Gb/s and uses DisplayPort; 
• Version 3 is 40 Gb/s and uses USB-C. 

Universal Serial Bus (USB): - Can support up to 127 devices. 
• USB 1.1 (full speed) runs at 12 Mb/s by a max cable length of 3m. 
• USB 2.0 (high-speed) runs at 480 Mb/s by a max cable length of 5m. 
• USB 3.0 (SuperSpeed) runs at 5 Gb/s. 
• USB 3.1 (SuperSpeed+) runs at 10 Gb/s.  

 
Version 3.x ports are blue. 

Desktop/laptop computers use USB-A/B connectors. 
 
Tablets/smartphones use mini- and micro-connectors. 
USB-C: one-third the size of USB-A plug; compatible with USB 3.1. 

Bluetooth - Short-range technology for simplifying communication and connectivity among network devices 

Bluetooth transmission range lengths: 

• Class I: 100m (about the length of a football field) 
• Class II: 10m (most popular) 
• Class III: 1m (unpopular) 

Bluetooth maximum data transfer rate: 

• Version 1: 721 Kb/s 
• Version 2: 2.1 Mb/s 
• Version 3: 24 Mb/s 

 

Internet Protocol (IP): 

IPv4 address: 

32-bit number, consisting of four decimals from 0 to 255 separated by period (.), e.g., 192.168.1.1 
Manual entry or Dynamic Host Configuration Protocol (DHCP) determines your IPv4 address. 

IPv4 loopback: 127.0.0.1 

APIPA/link-local: 169.254.x.x 

Classless Inter-Domain Routing (CIDR): 

CIDR IPv4 addresses have a prefix; e.g., “/24” in “10.150.23.58/24” denotes a 255.255.255.0 subnet mask. 

IPv6 address: 128-bit hexadecimal number, e.g., 2001:7120:0000:8001: 0000:0000:0000:1F10 

IPv6 loopback: ::1 (unicast) 

Network speed: 

• 1000 Mb/s (gigabit Ethernet) 
• 10 Gb/s (10 Gb Ethernet) 

 

 

 

 

IPv4 address classes: 

A: 1–126 (Range 1st Decimal) 255.0.0.0 (Subnet Mask) 10.x.x.x (Private) 

B:  128–191 (Range 1st Decimal) 255.255.0.0 (Subnet Mask) 172.16.0.0–172.31.255.255 (Private) 

C: 192–223 (Range 1st Decimal) 255.255.255.0 (Subnet Mask) 192.168.x.x (Private) 

 

Wireless Ethernet:  

VERSION 

DATA TRANSMISSION RATE 

FREQUENCY MODULATION (GHZ) 

802.11a 

54 Mb/s 

5 

802.11b 

11 Mb/s 

2.4 

802.11g 

54 Mb/s 

2.4 

802.11n 

300/600 Mb/s 

2.4, 5 

802.11ac 

≥1.7 Gb/s 

5 

802.11ax 

≤9.6 Gb/s 

2.4, 5, 6 

 

Ports & Protocols: 

21 - File Transfer Protocol (FTP) 

22 - Secure Shell (SSH) 

23 - Telnet 

25 - 587, Simple Mail Transfer Protocol (SMTP) 

53 - Domain Naming System (DNS) 

80 - Hypertext Transfer Protocol (HTTP) 

110 - Post Office Protocol (POP3) 

137–139 - NetBIOS 

143 - Internet Message Access Protocol (IMAP) 

443 - HTTP Secure (HTTPS) 

445 - Server Message Block (SMB) 

548 - Apple Filing Protocol (AFP) 

3389 - Remote Desktop Protocol (RDP) 

 

Virtualization and Cloud Computing:  

AaS - Infrastructure as a service 

PaaS - Platform as a service 

SaaS - Software as a service 

VDI - Virtual desktop infrastructure 

Virtual machines (VMs) come in these two types: 

HYPERVISOR, ELABORATION 

Type 1 - Bare or native metal 

Type 2 - App-like VM on the operating system 

 

Core 2 220-1102: 

Microsoft Management Console (MMC) snap-in 

Examples: Computer Management, Performance Monitor 

Master boot record (MBR) - Hard drive has up to four partitions but only one extended partition. 

GPT (GUID Partition Table) - Hard drive has 128 partitions and may exceed MBR’s 2 TB limit. Stored in multiple locations. Requires UEFI-compliant motherboard. 

Logical drive - Segment of an extended partition 

Active partition - Computer boots from here, usually contains operating system 

Volume - Any section of a drive with a letter 

Samba - File- and printer-sharing service 

EOL - End-of-life 

CDFS - Compact disc file system 

NFS - Network file system 

NTFS - New Technology File System 

FAT32 - File Allocation Table 32 

ext3, ext4 - Third and fourth extended file systems 

APFS - Apple File System 

ExFAT - Extensible File Allocation Table 

 

Common system tools in Windows: 

Command Prompt - Command-line program. 
For elevated privileges: Click START (bottom left corner) > type “cmd” > select “Run as administrator.” 

Control Panel - View/change settings 

Registry - Store settings 

Task Manager - Monitor and start/end processes 

Device Manager - Monitor and (dis)connect devices 

Remote Desktop software - View/control a remote computer 

User State Migration Tool (USMT) - Move user data 

System Restore - Revert to earlier system configuration (“restore point”) 

Windows upgrade minimum prerequisites: 

WINDOWS 

CPU (GHZ) 

RAM (GB) 

FREE DISK SPACE (GB) 

10 (32-bit) 

1 

1 

16 

10 (64-bit) 

1 

2 

20 

11 

1; 2 cores 

4 

64 

Security: 

WPA - Wi-Fi Protected Access 

TKIP - Temporal Key Integrity Protocol 

AES - Advanced Encryption Standard 

RADIUS - Remote Authentication Dial-In User Service 

TACACS+ - Terminal Access Controller Access-Control System 

 

Social Engineering: 

Phishing - Attack by email; single target 

Vishing - Attack by telephone or voicemail 

Shoulder surfing - Look over someone’s shoulder, often with a recording device 

Whaling - Phishing that targets high-ranking people, such as C-suite executives 

Tailgating - Unauthorized entity follows authorized party into secured premises 

Impersonation - Attacks using stolen credentials or personal information 

Dumpster diving - Recover information from trash 

Evil twin - Setting up a fake Wi-Fi access point, hoping people choose it over the genuine one. 

 

Threats: 

Denial of service (DoS) - Overwhelming a target using a single machine 

Distributed denial of service (DDoS) - DoS using multiple machines 

Zero-day attack - Vulnerability unbeknownst to developers 

Spoofing - Gain unauthorized access by pretending to be authorized 

On-path attack - Setting up Wi-Fi networks to trap unsuspecting users 

Brute-force attack - Trying character combinations 

Dictionary attack - Using lists of probable passwords 

Insider threat - Potential for an insider to use their authorized access or understanding of an organization to harm that organization 

Structured Query Language (SQL) injection - Manipulating SQL to modify remote database (such as by using SQL map)  

Cross-site scripting (XSS) - Injecting malicious scripts into normal websites 

 

Malware: 

Virus - Runs on a computer without the user’s knowledge. 
Examples: Boot Sector, Macro, Program, Polymorphic, Stealth, and Multipartite. 

Worm - Replicates itself across a network 

Trojan Horse - Performs useful functions superficially but runs malicious programs covertly 

Spyware - Spies on a computer and records its activities. 
Examples: keylogger and browser-hijacking adware 

Rootkit - Gains administrator-level access to the system core undetected 

Ransomware - Holds a computer hostage until the user pays 

compTIA A+ Exam Flashcards

Motherboard 

• For connecting all components. 
• Form factors: ATX, micro ATX, and ITX. 
• Types of expansion buses: PCI Express (PCIe) and PCI. 
• Intel chipsets link to CPU via DMI or QPI. 
• AMD CPU-to-chipset connection is Hyper Transport. 

 

Central processing unit (CPU) 

Handles most calculations. Each core contains L1/L2 cache. The entire CPU shares L3 cache. 
 
Intel CPUs use these sockets: 
• LGA775 
• 1150 
• 1155 
• 1156 
• 1366 
• 2011 
 

AMD CPUs use these sockets:AM3 
• AM3+ 
• FM1 
• FM2 
• FM2 

 

Random Access Memory (RAM) 

• RAM DIMMs include DDR (184 pins), DDR2 (240 pins), DDR3 (240 pins) and DDR4 (288 pins). 
• RAM SODIMMs include DDR (200 pin), DDR2 (200 pin), DDR3 (204 pin), and DDR4 (260 pin). 
• Dual-channel: 2× width of 128-bit bus. 
• Triple-channel: 3× width of 192-bit bus. 
• Quad-channel: 4× width of 256-bit bus. 
• Latency measured as CL or CAS. 

 

 

 

Serial Advanced Technology Attachment (SATA) 

It consists of a 15-pin power connection and a 7-pin data connector. 
 
Revisions: 
• Rev 1 (1.5 Gb/s), 
• Rev 2 (3 Gb/s), 
• Rev 3 (6 Gb/s), 
• Rev 3.2 (SATA Express) (16 Gb/s), 
• Rev 3.2 (SATA Express) (16 Gb/s). 
 
mSATA = mini-SATA. 

 

Hard disk drive (HDD) 

Speeds: 5,400 RPM, 7,200 RPM, 10,000 RPM, 15,000 RPM 
Form factors: 3.5”, 2.5” 

 

Solid-state drive (SSD) 

Communication interfaces: 
• Non-Volatile Memory Express (NVMe) 
• SATA 
• Peripheral Component Interconnect Express (PCIe): x1, x2, x8, x16 
Form factors: M.2, mSATA 

 

Solid-state media 
• SSDs 
• USB flash drives 
• CompactFlash 
• Secure Digital (SD) cards 

 

 

 

 

 

Redundant Array of Independent/Inexpensive Disks (RAID) 

• RAID 0 = striping; not fault tolerant. 
• RAID 1 = mirroring. RAID 1 + two disk controllers = disk duplexing. 
• RAID 5 = striping with parity. 
• RAID 10 = mirrored sets in a striped set. 

 

Small Computer Systems Interface (SCSI)  

Modern SCSI standards
• Serial Attached SCSI (SAS) 
• Internet SCSI 

 

IPS - In-Plane Switching. Possesses a wider viewing angle. 

 

TN - Twisted Nematic. 

 

Optical media - Optical disc drives use changeable media to store and retrieve data. 
Versions: 
• read-only memory (ROM) 
• write-once ® 
• rewritable/write-many (RW) 

 

Compact Disc (CD) 

Capacity: 650–700 MB 

 

 

 

 

 

Digital video/versatile disc (DVD) 

Special formats
• DL: dual-layered 
• DS: double-sided 
Capacity: 4.37 – 17 GB 
Recording technologies: DVD+R, DVD-R, DVD+RW, and DVD-RW. 

 

Blu-ray disc (BD) 

For games and HD movies. 
Capacity: 25–128 GB (Mini-disc capacity: 7.8 or 15.6 GB) 

 

Laptop - Portable miniaturized versions of desktop computers. 

Uses M.2, Mini PCIe, and Mini PCI (internal) and Express Card /34 and /54 (external). 
Replaceable components: 
• Keyboards 
• Touchpads 
• SODIMM RAM 
• Screens 
• Inverters 
• Batteries 
• Optical disc drives 
• Smart card readers 
• Hard drives (SSD, HDD, or hybrid). 

 

 

 

 

 

Heat sink 

  • When installing a heat sink, use thermal paste or pads for filling in gaps and increasing thermal conductivity between CPU and heat sink. 

  • Liquid-based cooling systems have higher thermal transfer capabilities than air cooling. 

  • To minimize overheating, a “dual-rail” power supply unit (PSU) separates and controls the current in each wire. 

 

Sound card 

Links as x1 PCIe (or PCI cards) and will typically have PC 99 color-coded 1/8” mini-jacks for I/O and speakers and optical I/Os known as S/PDIF. 

 

Video card - You link them to motherboards through x16 PCIe or PCI expansion slots. 
Video connector types and cables
• DVI 
• VGA 
• HDMI 
• Mini-HDMI 
• DisplayPort 
• Mini Display Port 
• S-Video 
• Component Video/RGB 
• Composite 

Typical color depths
• 16-bit 
• 24-bit 
• 32-bit 
 

Typical resolutions (aspect ratio): 
• 1280×720 (720p, 16:9) 
• 1920×1080 (1080p, 16:9) 
• 1366×786 (16:9) 
• 1680×1050 (WSXGA+, 8:5) 
• 1920×1200 (WUXGA, 8:5) 
• 640×480 (VGA, 4:3) 

 

Image processing of laser printing 

1. Processing 
2. Charging 
3. Exposing 
4.Developing 
5. Transferring 
6. Fusing 
7. Cleaning 

 

Printer configuration settings 

• Duplexing: printing on both sides. 
• Collation: printing many jobs in a row. 
• Orientation: portrait/landscape. Quality: 600 or 1200 DPI. 

 

BIOS/UEFI 

• Locates, tests, and initializes components and boots to the hard drive, optical disc, USB flash drive, or network by PXE. 
• CMOS stores time/date and passwords. 
• A CR2032 lithium battery powers the CMOS. 

 

BIOS/UEFI configurations 

• Time/date 
• Boot device order 
• Passwords 
• Power management 
• WOL 
• Monitoring 
• Clock and bus speeds 
• Virtualization support (Intel VT or AMD-V) 
• Enable/disable devices 
• Diagnostics 
• Security 
• Intrusion detection 

 

Networking 

LAN - Local area network 

WAN - Wide area network 

MAN - Metropolitan area network 

PAN - Personal area network 

SAN - Storage area network 

WLAN - Wireless local area network 

Network Address Translation (NAT) - Modifying IP address as it crosses a router 

Port forwarding - Forwards outside network port to internal IP address and port 

Switch - Connect computers in LAN 

Router - Connects ≥2 LANs to the Internet 

Firewall - Safeguards computers and networks against unauthorized access 

IDS - Intrusion detection system 

IPS - Intrusion prevention system 

UTM - Unified threat management 

 

Network Cables 

Twisted pair - RJ45, RJ11 

Fiber optic - SC, ST, LC 

Coaxial - F-connector, BNC 

Plenum-rated - Fire-resistant cable designed for airways, conduits, and regions where sprinklers cannot reach. 

Cabling Standards: 

3 - 10 Mb/s 

5 - 100 Mb/s 

5e - 100 Mb/s and gigabit networks 

6/6a - gigabit and 10 Gb/s networks 

7 - gigabit and 10 Gb/s networks 

 

Wiring Pattern 

T568A: 

1. White/green 
2. Green 
3. White/orange 
4. Blue 
5. White/blue 
6. Orange 
7. White/brown 
8. Brown 

T568B: Swap “green” and “orange” in T568A. 

 

Connection Methods 

Thunderbolt: 

• Version 1 is 10 Gb/s and uses DisplayPort; 
• Version 2 is 20 Gb/s and uses DisplayPort; 
• Version 3 is 40 Gb/s and uses USB-C. 

Universal Serial Bus (USB): - Can support up to 127 devices. 
• USB 1.1 (full speed) runs at 12 Mb/s by a max cable length of 3m. 
• USB 2.0 (high-speed) runs at 480 Mb/s by a max cable length of 5m. 
• USB 3.0 (SuperSpeed) runs at 5 Gb/s. 
• USB 3.1 (SuperSpeed+) runs at 10 Gb/s.  

 
Version 3.x ports are blue. 

Desktop/laptop computers use USB-A/B connectors. 
 
Tablets/smartphones use mini- and micro-connectors. 
USB-C: one-third the size of USB-A plug; compatible with USB 3.1. 

Bluetooth - Short-range technology for simplifying communication and connectivity among network devices 

Bluetooth transmission range lengths: 

• Class I: 100m (about the length of a football field) 
• Class II: 10m (most popular) 
• Class III: 1m (unpopular) 

Bluetooth maximum data transfer rate: 

• Version 1: 721 Kb/s 
• Version 2: 2.1 Mb/s 
• Version 3: 24 Mb/s 

 

Internet Protocol (IP): 

IPv4 address: 

32-bit number, consisting of four decimals from 0 to 255 separated by period (.), e.g., 192.168.1.1 
Manual entry or Dynamic Host Configuration Protocol (DHCP) determines your IPv4 address. 

IPv4 loopback: 127.0.0.1 

APIPA/link-local: 169.254.x.x 

Classless Inter-Domain Routing (CIDR): 

CIDR IPv4 addresses have a prefix; e.g., “/24” in “10.150.23.58/24” denotes a 255.255.255.0 subnet mask. 

IPv6 address: 128-bit hexadecimal number, e.g., 2001:7120:0000:8001: 0000:0000:0000:1F10 

IPv6 loopback: ::1 (unicast) 

Network speed: 

• 1000 Mb/s (gigabit Ethernet) 
• 10 Gb/s (10 Gb Ethernet) 

 

 

 

 

IPv4 address classes: 

A: 1–126 (Range 1st Decimal) 255.0.0.0 (Subnet Mask) 10.x.x.x (Private) 

B:  128–191 (Range 1st Decimal) 255.255.0.0 (Subnet Mask) 172.16.0.0–172.31.255.255 (Private) 

C: 192–223 (Range 1st Decimal) 255.255.255.0 (Subnet Mask) 192.168.x.x (Private) 

 

Wireless Ethernet:  

VERSION 

DATA TRANSMISSION RATE 

FREQUENCY MODULATION (GHZ) 

802.11a 

54 Mb/s 

5 

802.11b 

11 Mb/s 

2.4 

802.11g 

54 Mb/s 

2.4 

802.11n 

300/600 Mb/s 

2.4, 5 

802.11ac 

≥1.7 Gb/s 

5 

802.11ax 

≤9.6 Gb/s 

2.4, 5, 6 

 

Ports & Protocols: 

21 - File Transfer Protocol (FTP) 

22 - Secure Shell (SSH) 

23 - Telnet 

25 - 587, Simple Mail Transfer Protocol (SMTP) 

53 - Domain Naming System (DNS) 

80 - Hypertext Transfer Protocol (HTTP) 

110 - Post Office Protocol (POP3) 

137–139 - NetBIOS 

143 - Internet Message Access Protocol (IMAP) 

443 - HTTP Secure (HTTPS) 

445 - Server Message Block (SMB) 

548 - Apple Filing Protocol (AFP) 

3389 - Remote Desktop Protocol (RDP) 

 

Virtualization and Cloud Computing:  

AaS - Infrastructure as a service 

PaaS - Platform as a service 

SaaS - Software as a service 

VDI - Virtual desktop infrastructure 

Virtual machines (VMs) come in these two types: 

HYPERVISOR, ELABORATION 

Type 1 - Bare or native metal 

Type 2 - App-like VM on the operating system 

 

Core 2 220-1102: 

Microsoft Management Console (MMC) snap-in 

Examples: Computer Management, Performance Monitor 

Master boot record (MBR) - Hard drive has up to four partitions but only one extended partition. 

GPT (GUID Partition Table) - Hard drive has 128 partitions and may exceed MBR’s 2 TB limit. Stored in multiple locations. Requires UEFI-compliant motherboard. 

Logical drive - Segment of an extended partition 

Active partition - Computer boots from here, usually contains operating system 

Volume - Any section of a drive with a letter 

Samba - File- and printer-sharing service 

EOL - End-of-life 

CDFS - Compact disc file system 

NFS - Network file system 

NTFS - New Technology File System 

FAT32 - File Allocation Table 32 

ext3, ext4 - Third and fourth extended file systems 

APFS - Apple File System 

ExFAT - Extensible File Allocation Table 

 

Common system tools in Windows: 

Command Prompt - Command-line program. 
For elevated privileges: Click START (bottom left corner) > type “cmd” > select “Run as administrator.” 

Control Panel - View/change settings 

Registry - Store settings 

Task Manager - Monitor and start/end processes 

Device Manager - Monitor and (dis)connect devices 

Remote Desktop software - View/control a remote computer 

User State Migration Tool (USMT) - Move user data 

System Restore - Revert to earlier system configuration (“restore point”) 

Windows upgrade minimum prerequisites: 

WINDOWS 

CPU (GHZ) 

RAM (GB) 

FREE DISK SPACE (GB) 

10 (32-bit) 

1 

1 

16 

10 (64-bit) 

1 

2 

20 

11 

1; 2 cores 

4 

64 

Security: 

WPA - Wi-Fi Protected Access 

TKIP - Temporal Key Integrity Protocol 

AES - Advanced Encryption Standard 

RADIUS - Remote Authentication Dial-In User Service 

TACACS+ - Terminal Access Controller Access-Control System 

 

Social Engineering: 

Phishing - Attack by email; single target 

Vishing - Attack by telephone or voicemail 

Shoulder surfing - Look over someone’s shoulder, often with a recording device 

Whaling - Phishing that targets high-ranking people, such as C-suite executives 

Tailgating - Unauthorized entity follows authorized party into secured premises 

Impersonation - Attacks using stolen credentials or personal information 

Dumpster diving - Recover information from trash 

Evil twin - Setting up a fake Wi-Fi access point, hoping people choose it over the genuine one. 

 

Threats: 

Denial of service (DoS) - Overwhelming a target using a single machine 

Distributed denial of service (DDoS) - DoS using multiple machines 

Zero-day attack - Vulnerability unbeknownst to developers 

Spoofing - Gain unauthorized access by pretending to be authorized 

On-path attack - Setting up Wi-Fi networks to trap unsuspecting users 

Brute-force attack - Trying character combinations 

Dictionary attack - Using lists of probable passwords 

Insider threat - Potential for an insider to use their authorized access or understanding of an organization to harm that organization 

Structured Query Language (SQL) injection - Manipulating SQL to modify remote database (such as by using SQL map)  

Cross-site scripting (XSS) - Injecting malicious scripts into normal websites 

 

Malware: 

Virus - Runs on a computer without the user’s knowledge. 
Examples: Boot Sector, Macro, Program, Polymorphic, Stealth, and Multipartite. 

Worm - Replicates itself across a network 

Trojan Horse - Performs useful functions superficially but runs malicious programs covertly 

Spyware - Spies on a computer and records its activities. 
Examples: keylogger and browser-hijacking adware 

Rootkit - Gains administrator-level access to the system core undetected 

Ransomware - Holds a computer hostage until the user pays 

robot