Introduction |
|
xxvii | |
Assessment Test |
|
lxxxii | |
Part I 220-1101 |
|
1 | (814) |
|
Chapter 1 Motherboards, Processors, and Memory |
|
|
3 | (76) |
|
Understanding Motherboards |
|
|
7 | (35) |
|
|
7 | (3) |
|
|
10 | (32) |
|
|
42 | (7) |
|
|
43 | (2) |
|
|
45 | (4) |
|
|
49 | (14) |
|
|
50 | (4) |
|
|
54 | (5) |
|
|
59 | (4) |
|
Understanding Cooling Systems |
|
|
63 | (8) |
|
|
63 | (3) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (4) |
|
|
71 | (1) |
|
|
71 | (2) |
|
|
73 | (4) |
|
Performance-Based Question 1 |
|
|
77 | (1) |
|
Performance-Based Question 2 |
|
|
78 | (1) |
|
Chapter 2 Expansion Cards, Storage Devices, and Power Supplies |
|
|
79 | (60) |
|
Installing and Configuring Expansion Cards |
|
|
81 | (8) |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
88 | (1) |
|
Understanding Storage Devices |
|
|
89 | (25) |
|
|
90 | (6) |
|
|
96 | (8) |
|
|
104 | (3) |
|
Removable Storage and Media |
|
|
107 | (7) |
|
Installing, Removing, and Configuring Storage Devices |
|
|
114 | (17) |
|
Understanding Power Supplies |
|
|
118 | (1) |
|
|
119 | (1) |
|
Power Supply Output and Ratings |
|
|
120 | (1) |
|
|
121 | (4) |
|
|
125 | (1) |
|
|
126 | (3) |
|
|
129 | (1) |
|
AC Adapters as Power Supplies |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
133 | (4) |
|
Performance-Based Question |
|
|
137 | (2) |
|
Chapter 3 Peripherals, Cables, and Connectors |
|
|
139 | (52) |
|
Understanding Cables and Connectors |
|
|
140 | (20) |
|
|
141 | (13) |
|
|
154 | (2) |
|
|
156 | (3) |
|
|
159 | (1) |
|
Understanding Cables and Connectors |
|
|
160 | (24) |
|
Peripheral Cables and Connectors |
|
|
160 | (9) |
|
|
169 | (1) |
|
Video Cables and Connectors |
|
|
170 | (8) |
|
Hard Drive Cables and Connectors |
|
|
178 | (6) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (4) |
|
Performance-Based Question |
|
|
190 | (1) |
|
Chapter 4 Printers and Multifunction Devices |
|
|
191 | (78) |
|
Understanding Print Technologies and Imaging Processes |
|
|
193 | (30) |
|
|
194 | (2) |
|
|
196 | (9) |
|
|
205 | (12) |
|
|
217 | (1) |
|
|
218 | (5) |
|
Installing and Maintaining Printers |
|
|
223 | (39) |
|
Printer Interface Components |
|
|
224 | (5) |
|
Installing and Sharing Local Printers |
|
|
229 | (12) |
|
Installing and Sharing Networked Printers |
|
|
241 | (10) |
|
Performing Printer Maintenance |
|
|
251 | (6) |
|
Installing Printer Upgrades |
|
|
257 | (5) |
|
|
262 | (1) |
|
|
262 | (2) |
|
|
264 | (4) |
|
Performance-Based Question |
|
|
268 | (1) |
|
Chapter 5 Networking Fundamentals |
|
|
269 | (64) |
|
Understanding Networking Principles |
|
|
271 | (24) |
|
|
272 | (7) |
|
Primary Network Components |
|
|
279 | (4) |
|
Network Operating Systems |
|
|
283 | (1) |
|
|
283 | (3) |
|
|
286 | (4) |
|
|
290 | (5) |
|
Identifying Common Network Hardware |
|
|
295 | (29) |
|
|
295 | (4) |
|
|
299 | (15) |
|
|
314 | (10) |
|
|
324 | (1) |
|
|
324 | (3) |
|
|
327 | (4) |
|
Performance-Based Question |
|
|
331 | (2) |
|
Chapter 6 Introduction to TCP/IP |
|
|
333 | (46) |
|
|
335 | (33) |
|
|
336 | (10) |
|
Understanding IP Addressing |
|
|
346 | (10) |
|
Understanding DHCP and DNS |
|
|
356 | (9) |
|
|
365 | (3) |
|
Understanding Virtual Networks |
|
|
368 | (4) |
|
Virtual Local Area Networks |
|
|
368 | (2) |
|
|
370 | (2) |
|
|
372 | (1) |
|
|
372 | (2) |
|
|
374 | (4) |
|
Performance-Based Question |
|
|
378 | (1) |
|
Chapter 7 Wireless and SOHO Networks |
|
|
379 | (78) |
|
Understanding Wireless Networking Technologies |
|
|
381 | (21) |
|
802.11 Networking Standards |
|
|
382 | (11) |
|
|
393 | (3) |
|
Long-Range Fixed Wireless |
|
|
396 | (2) |
|
Radio Frequency Networking Standards |
|
|
398 | (4) |
|
Installing and Configuring SOHO Networks |
|
|
402 | (47) |
|
Keys to Planning a Network |
|
|
402 | (2) |
|
Choosing an Internet Connection |
|
|
404 | (14) |
|
Choosing Internal Network Connections |
|
|
418 | (4) |
|
Installing the Network Infrastructure |
|
|
422 | (11) |
|
Configuring Wireless Routers and Access Points |
|
|
433 | (16) |
|
|
449 | (1) |
|
|
449 | (2) |
|
|
451 | (4) |
|
Performance-Based Question |
|
|
455 | (2) |
|
Chapter 8 Network Services, Virtualization, and Cloud Computing |
|
|
457 | (66) |
|
Understanding Network Services |
|
|
459 | (28) |
|
|
460 | (13) |
|
|
473 | (7) |
|
|
480 | (2) |
|
Internet of Things Devices |
|
|
482 | (5) |
|
Understanding Virtualization and Cloud Computing |
|
|
487 | (28) |
|
Concepts of Cloud Computing |
|
|
488 | (11) |
|
Concepts of Virtualization |
|
|
499 | (16) |
|
|
515 | (1) |
|
|
516 | (2) |
|
|
518 | (4) |
|
Performance-Based Question |
|
|
522 | (1) |
|
Chapter 9 Laptop and Mobile Device Hardware |
|
|
523 | (68) |
|
Working with Laptop and Mobile Device Hardware |
|
|
526 | (58) |
|
Understanding the Differences between Device Types |
|
|
526 | (5) |
|
Disassembling and Reassembling Laptops |
|
|
531 | (4) |
|
Installing and Configuring Laptop Hardware |
|
|
535 | (45) |
|
Setting Up and Configuring Accessories and Ports |
|
|
580 | (4) |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
586 | (4) |
|
Performance-Based Question |
|
|
590 | (1) |
|
Chapter 10 Mobile Connectivity and Application Support |
|
|
591 | (84) |
|
Understanding Mobile Connectivity |
|
|
593 | (42) |
|
Understanding Cellular Networking Standards |
|
|
595 | (2) |
|
Using Cellular Data Connections |
|
|
597 | (11) |
|
Establishing Wi-Fi Connectivity |
|
|
608 | (14) |
|
Establishing Bluetooth Connectivity |
|
|
622 | (13) |
|
Understanding Mobile App Support |
|
|
635 | (33) |
|
Understanding Location Services |
|
|
635 | (6) |
|
Understanding Mobile Device and App Management |
|
|
641 | (13) |
|
Configuring Mobile Device Synchronization |
|
|
654 | (12) |
|
|
666 | (2) |
|
|
668 | (1) |
|
|
668 | (2) |
|
|
670 | (4) |
|
Performance-Based Question |
|
|
674 | (1) |
|
Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
675 | (42) |
|
Using the Troubleshooting Best Practice Methodology |
|
|
678 | (12) |
|
Step 1: Identify the Problem |
|
|
678 | (5) |
|
Step 2: Establish a Theory |
|
|
683 | (1) |
|
|
684 | (3) |
|
Step 4: Establish a Plan of Action |
|
|
687 | (1) |
|
Step 5: Verify Functionality |
|
|
688 | (1) |
|
Step 6: Document Findings |
|
|
689 | (1) |
|
Troubleshooting Motherboards, CPUs, RAM, and Power Problems |
|
|
690 | (18) |
|
Identifying General Hardware Symptoms and Causes |
|
|
691 | (5) |
|
Identifying BIOS/UEFI and POST Routine Problems |
|
|
696 | (4) |
|
Identifying Motherboard and CPU Problems |
|
|
700 | (2) |
|
Identifying Memory Issues |
|
|
702 | (3) |
|
Identifying Power Supply Problems |
|
|
705 | (3) |
|
|
708 | (1) |
|
|
709 | (2) |
|
|
711 | (4) |
|
Performance-Based Question |
|
|
715 | (2) |
|
Chapter 12 Hardware and Network Troubleshooting |
|
|
717 | (98) |
|
Troubleshooting Storage Drives and RAID Arrays |
|
|
721 | (10) |
|
|
722 | (1) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
725 | (4) |
|
|
729 | (1) |
|
|
730 | (1) |
|
Troubleshooting Video, Projector, and Display Issues |
|
|
731 | (6) |
|
|
731 | (1) |
|
|
732 | (3) |
|
|
735 | (2) |
|
Troubleshooting Common Mobile Device Issues |
|
|
737 | (14) |
|
|
738 | (3) |
|
|
741 | (2) |
|
|
743 | (5) |
|
Physical Damage and Malware |
|
|
748 | (3) |
|
Troubleshooting Printer Problems |
|
|
751 | (28) |
|
|
752 | (3) |
|
|
755 | (4) |
|
|
759 | (13) |
|
|
772 | (7) |
|
Troubleshooting Networking Problems |
|
|
779 | (27) |
|
Using Network Troubleshooting Tools |
|
|
779 | (20) |
|
Resolving Connectivity Issues |
|
|
799 | (7) |
|
|
806 | (1) |
|
|
806 | (3) |
|
|
809 | (4) |
|
Performance-Based Question |
|
|
813 | (2) |
Part II 220-1102 |
|
815 | (700) |
|
Chapter 13 Operating System Basics |
|
|
817 | (62) |
|
Understanding Operating Systems |
|
|
819 | (11) |
|
Operating System Terms and Concepts |
|
|
821 | (2) |
|
|
823 | (5) |
|
Minimum System Requirements |
|
|
828 | (2) |
|
Understanding Applications |
|
|
830 | (6) |
|
System Requirements for Applications |
|
|
830 | (2) |
|
|
832 | (3) |
|
|
835 | (1) |
|
Other Considerations for New Applications |
|
|
835 | (1) |
|
Introduction to Windows 10 |
|
|
836 | (35) |
|
|
836 | (4) |
|
|
840 | (11) |
|
|
851 | (13) |
|
|
864 | (3) |
|
|
867 | (4) |
|
|
871 | (1) |
|
|
872 | (1) |
|
|
872 | (2) |
|
|
874 | (4) |
|
Performance-Based Question |
|
|
878 | (1) |
|
Chapter 14 Windows Configuration |
|
|
879 | (98) |
|
Interacting with Operating Systems |
|
|
882 | (78) |
|
|
882 | (6) |
|
Microsoft Management Console |
|
|
888 | (11) |
|
|
899 | (6) |
|
|
905 | (32) |
|
|
937 | (23) |
|
|
960 | (2) |
|
|
962 | (8) |
|
Getting Disks Ready to Store Files and Programs |
|
|
963 | (6) |
|
Checking the Health of Hard Disks and Optimizing Their Performance |
|
|
969 | (1) |
|
|
970 | (1) |
|
|
970 | (2) |
|
|
972 | (4) |
|
Performance-Based Question |
|
|
976 | (1) |
|
Chapter 15 Windows Administration |
|
|
977 | (80) |
|
Installing and Upgrading Windows |
|
|
980 | (33) |
|
Windows Installation Options |
|
|
982 | (2) |
|
|
984 | (18) |
|
|
1002 | (4) |
|
|
1006 | (1) |
|
|
1007 | (1) |
|
Side-by-Side Upgrading Windows 10/11 |
|
|
1007 | (1) |
|
|
1008 | (1) |
|
Upgrading Editions of Windows |
|
|
1008 | (1) |
|
Security and Feature Updates |
|
|
1008 | (3) |
|
Installation/Upgrade Boot Options |
|
|
1011 | (1) |
|
|
1012 | (1) |
|
|
1013 | (17) |
|
|
1030 | (20) |
|
|
1030 | (4) |
|
|
1034 | (2) |
|
Establishing a Network Connection |
|
|
1036 | (5) |
|
|
1041 | (3) |
|
|
1044 | (2) |
|
Client Network Configuration |
|
|
1046 | (4) |
|
|
1050 | (1) |
|
|
1050 | (2) |
|
|
1052 | (4) |
|
Performance-Based Question |
|
|
1056 | (1) |
|
Chapter 16 Working with macOS and Linux |
|
|
1057 | (58) |
|
|
1060 | (1) |
|
|
1061 | (4) |
|
Installing Applications from the App Store |
|
|
1061 | (1) |
|
Installing Downloadable Applications |
|
|
1062 | (2) |
|
|
1064 | (1) |
|
|
1065 | (1) |
|
|
1065 | (6) |
|
|
1065 | (3) |
|
Scheduled Disk Maintenance |
|
|
1068 | (1) |
|
|
1068 | (1) |
|
|
1069 | (1) |
|
|
1070 | (1) |
|
Antivirus/Antimalware Updates |
|
|
1071 | (1) |
|
|
1071 | (2) |
|
|
1073 | (9) |
|
|
1082 | (5) |
|
|
1087 | (19) |
|
Understanding the Syntax of Shell Commands |
|
|
1088 | (1) |
|
Discovering and Using Linux Commands |
|
|
1089 | (2) |
|
Becoming root (Super User) |
|
|
1091 | (1) |
|
Maintaining the Operating System |
|
|
1092 | (3) |
|
|
1095 | (2) |
|
|
1097 | (1) |
|
|
1098 | (1) |
|
Changing Permissions and Ownership |
|
|
1099 | (1) |
|
|
1100 | (3) |
|
|
1103 | (1) |
|
|
1104 | (2) |
|
|
1106 | (1) |
|
|
1106 | (2) |
|
|
1108 | (1) |
|
|
1109 | (1) |
|
|
1110 | (4) |
|
Performance-Based Question |
|
|
1114 | (1) |
|
Chapter 17 Security Concepts |
|
|
1115 | (80) |
|
Physical Security Concepts |
|
|
1121 | (7) |
|
|
1121 | (1) |
|
|
1122 | (1) |
|
|
1122 | (1) |
|
|
1123 | (1) |
|
|
1124 | (1) |
|
|
1124 | (1) |
|
|
1125 | (2) |
|
|
1127 | (1) |
|
|
1127 | (1) |
|
|
1128 | (1) |
|
Physical Security for Staff |
|
|
1128 | (4) |
|
|
1129 | (1) |
|
Smartcards and RFID Badges |
|
|
1129 | (1) |
|
|
1130 | (1) |
|
|
1131 | (1) |
|
|
1132 | (1) |
|
|
1132 | (1) |
|
|
1132 | (11) |
|
Principle of Least Privilege |
|
|
1133 | (1) |
|
|
1133 | (2) |
|
|
1135 | (1) |
|
Multifactor Authentication |
|
|
1135 | (2) |
|
Mobile Device Management (MDM) |
|
|
1137 | (1) |
|
|
1138 | (5) |
|
|
1143 | (8) |
|
|
1144 | (1) |
|
|
1144 | (1) |
|
|
1145 | (1) |
|
|
1145 | (1) |
|
|
1145 | (1) |
|
|
1146 | (1) |
|
|
1146 | (4) |
|
Virus Transmission in a Network |
|
|
1150 | (1) |
|
|
1151 | (1) |
|
|
1151 | (1) |
|
Mitigating Software Threats |
|
|
1151 | (8) |
|
|
1152 | (1) |
|
|
1153 | (1) |
|
|
1154 | (1) |
|
|
1154 | (2) |
|
|
1156 | (2) |
|
|
1158 | (1) |
|
Social Engineering Attacks, Threats, and Vulnerabilities |
|
|
1159 | (4) |
|
|
1160 | (1) |
|
|
1161 | (1) |
|
|
1161 | (1) |
|
|
1162 | (1) |
|
|
1162 | (1) |
|
|
1162 | (1) |
|
|
1163 | (7) |
|
Denial-of-Service Attacks |
|
|
1163 | (2) |
|
|
1165 | (1) |
|
|
1166 | (1) |
|
On-Path Attack (Previously Known as Man-in-the-Middle Attack) |
|
|
1167 | (1) |
|
|
1167 | (1) |
|
|
1168 | (1) |
|
|
1169 | (1) |
|
Cross-Site Scripting (XSS) |
|
|
1169 | (1) |
|
Exploits and Vulnerabilities |
|
|
1170 | (2) |
|
|
1170 | (1) |
|
|
1170 | (1) |
|
Operating Systems Life Cycle |
|
|
1171 | (1) |
|
|
1171 | (1) |
|
|
1171 | (1) |
|
|
1172 | (11) |
|
|
1172 | (1) |
|
|
1173 | (1) |
|
|
1174 | (1) |
|
|
1175 | (1) |
|
|
1176 | (1) |
|
|
1177 | (4) |
|
|
1181 | (2) |
|
Destruction and Disposal Methods |
|
|
1183 | (4) |
|
Recycling or Repurposing Best Practices |
|
|
1183 | (2) |
|
|
1185 | (2) |
|
|
1187 | (1) |
|
|
1187 | (3) |
|
|
1190 | (4) |
|
Performance-Based Question |
|
|
1194 | (1) |
|
Chapter 18 Securing Operating Systems |
|
|
1195 | (76) |
|
Working with Windows OS Security Settings |
|
|
1199 | (29) |
|
|
1199 | (4) |
|
|
1203 | (5) |
|
NTFS vs. Share Permissions |
|
|
1208 | (7) |
|
|
1215 | (3) |
|
|
1218 | (2) |
|
Windows Security Features |
|
|
1220 | (8) |
|
|
1228 | (11) |
|
Browser Download and Installation |
|
|
1228 | (2) |
|
|
1230 | (2) |
|
|
1232 | (1) |
|
|
1233 | (1) |
|
|
1234 | (5) |
|
Securing a SOHO Network (Wireless) |
|
|
1239 | (8) |
|
Changing Default Usernames and Passwords |
|
|
1240 | (1) |
|
|
1240 | (1) |
|
|
1240 | (1) |
|
|
1241 | (1) |
|
|
1242 | (1) |
|
|
1242 | (1) |
|
|
1243 | (1) |
|
|
1244 | (1) |
|
Antenna and Access Point Placement |
|
|
1245 | (1) |
|
Assign Static IP Addresses |
|
|
1245 | (1) |
|
|
1246 | (1) |
|
|
1246 | (1) |
|
Securing a SOHO Network (Wired) |
|
|
1247 | (6) |
|
Changing Default Credentials |
|
|
1247 | (1) |
|
|
1248 | (1) |
|
|
1248 | (4) |
|
|
1252 | (1) |
|
|
1252 | (1) |
|
|
1253 | (10) |
|
|
1254 | (2) |
|
Remote Wipes and Locator Applications |
|
|
1256 | (2) |
|
|
1258 | (1) |
|
Failed Login Attempts Restrictions |
|
|
1258 | (1) |
|
Viruses and Malware on Mobile Devices |
|
|
1259 | (1) |
|
|
1260 | (1) |
|
|
1260 | (1) |
|
Multifactor Authentication |
|
|
1260 | (1) |
|
Authenticator Applications |
|
|
1261 | (1) |
|
|
1261 | (1) |
|
|
1261 | (2) |
|
|
1263 | (1) |
|
|
1263 | (1) |
|
|
1264 | (1) |
|
|
1265 | (4) |
|
Performance-Based Question |
|
|
1269 | (2) |
|
Chapter 19 Troubleshooting Operating Systems and Security |
|
|
1271 | (76) |
|
Troubleshooting Common Microsoft Windows OS Problems |
|
|
1275 | (34) |
|
|
1275 | (22) |
|
Common Troubleshooting Steps |
|
|
1297 | (12) |
|
Troubleshooting Security Issues |
|
|
1309 | (9) |
|
|
1310 | (5) |
|
|
1315 | (3) |
|
Best Practices for Malware Removal |
|
|
1318 | (7) |
|
1 Identify and Verify Malware Symptoms |
|
|
1318 | (1) |
|
2 Quarantine Infected Systems |
|
|
1319 | (1) |
|
3 Disable System Restore in Windows |
|
|
1320 | (1) |
|
4 Remediate Infected Systems |
|
|
1321 | (2) |
|
5 Schedule Scans and Run Updates |
|
|
1323 | (1) |
|
6 Enable System Restore and Create a Restore Point in Windows |
|
|
1324 | (1) |
|
|
1325 | (1) |
|
Troubleshooting Mobile OS Issues |
|
|
1325 | (10) |
|
|
1325 | (2) |
|
|
1327 | (2) |
|
|
1329 | (1) |
|
Extremely Short Battery Life |
|
|
1330 | (1) |
|
|
1331 | (3) |
|
|
1334 | (1) |
|
Troubleshooting Mobile Security Issues |
|
|
1335 | (6) |
|
|
1336 | (2) |
|
|
1338 | (3) |
|
|
1341 | (1) |
|
|
1342 | (1) |
|
|
1343 | (3) |
|
Performance-Based Question |
|
|
1346 | (1) |
|
Chapter 20 Scripting and Remote Access |
|
|
1347 | (46) |
|
|
1349 | (26) |
|
|
1351 | (4) |
|
|
1355 | (11) |
|
|
1366 | (7) |
|
|
1373 | (2) |
|
|
1375 | (12) |
|
|
1375 | (1) |
|
Virtual Private Network (VPN) |
|
|
1376 | (3) |
|
Virtual Network Computing |
|
|
1379 | (1) |
|
|
1379 | (1) |
|
|
1380 | (1) |
|
Remote Monitoring and Management |
|
|
1381 | (1) |
|
|
1382 | (5) |
|
|
1387 | (1) |
|
|
1387 | (1) |
|
|
1388 | (1) |
|
|
1389 | (3) |
|
Performance-Based Question |
|
|
1392 | (1) |
|
Chapter 21 Safety and Environmental Concerns |
|
|
1393 | (60) |
|
Understanding Safety Procedures |
|
|
1395 | (22) |
|
Identifying Potential Safety Hazards |
|
|
1395 | (12) |
|
Creating a Safe Workplace |
|
|
1407 | (10) |
|
Understanding Environmental Controls |
|
|
1417 | (16) |
|
Managing the Physical Environment |
|
|
1418 | (6) |
|
Handling and Disposing of Computer Equipment |
|
|
1424 | (9) |
|
Understanding Policies, Licensing, and Privacy |
|
|
1433 | (13) |
|
Dealing with Prohibited Content/Activity |
|
|
1434 | (1) |
|
|
1435 | (5) |
|
Managing Software Licenses |
|
|
1440 | (3) |
|
Managing Sensitive Information |
|
|
1443 | (3) |
|
|
1446 | (1) |
|
|
1446 | (2) |
|
|
1448 | (4) |
|
Performance-Based Question |
|
|
1452 | (1) |
|
Chapter 22 Documentation and Professionalism |
|
|
1453 | (62) |
|
Documentation and Support |
|
|
1457 | (19) |
|
|
1458 | (4) |
|
|
1462 | (4) |
|
|
1466 | (9) |
|
|
1475 | (1) |
|
Change Management Best Practices |
|
|
1476 | (6) |
|
Disaster Prevention and Recovery |
|
|
1482 | (12) |
|
|
1483 | (6) |
|
|
1489 | (1) |
|
|
1490 | (1) |
|
|
1491 | (1) |
|
|
1492 | (2) |
|
Demonstrating Professionalism |
|
|
1494 | (14) |
|
|
1495 | (1) |
|
Communicating with Customers |
|
|
1496 | (4) |
|
Using Appropriate Behavior |
|
|
1500 | (7) |
|
Putting It All in Perspective |
|
|
1507 | (1) |
|
|
1508 | (1) |
|
|
1508 | (2) |
|
|
1510 | (4) |
|
Performance-Based Question |
|
|
1514 | (1) |
Appendix A Answers to the Review Questions |
|
1515 | (46) |
|
Chapter 1: Motherboards, Processors, and Memory |
|
|
1516 | (2) |
|
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies |
|
|
1518 | (2) |
|
Chapter 3: Peripherals, Cables, and Connectors |
|
|
1520 | (1) |
|
Chapter 4: Printers and Multifunction Devices |
|
|
1521 | (2) |
|
Chapter 5: Networking Fundamentals |
|
|
1523 | (2) |
|
Chapter 6: Introduction to TCP/IP |
|
|
1525 | (2) |
|
Chapter 7: Wireless and SOHO Networks |
|
|
1527 | (2) |
|
Chapter 8: Network Services, Virtualization, and Cloud Computing |
|
|
1529 | (2) |
|
Chapter 9: Laptop and Mobile Device Hardware |
|
|
1531 | (2) |
|
Chapter 10: Mobile Connectivity and Application Support |
|
|
1533 | (2) |
|
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
1535 | (2) |
|
Chapter 12: Hardware and Network Troubleshooting |
|
|
1537 | (2) |
|
Chapter 13: Operating System Basics |
|
|
1539 | (1) |
|
Chapter 14: Windows Configuration |
|
|
1540 | (3) |
|
Chapter 15: Windows Administration |
|
|
1543 | (2) |
|
Chapter 16: Working with macOS and Linux |
|
|
1545 | (2) |
|
Chapter 17: Security Concepts |
|
|
1547 | (2) |
|
Chapter 18: Securing Operating Systems |
|
|
1549 | (2) |
|
Chapter 19: Troubleshooting Operating Systems and Security |
|
|
1551 | (3) |
|
Chapter 20: Scripting and Remote Access |
|
|
1554 | (2) |
|
Chapter 21: Safety and Environmental Concerns |
|
|
1556 | (2) |
|
Chapter 22: Documentation and Professionalism |
|
|
1558 | (3) |
Appendix B Answers to Performance-Based Questions |
|
1561 | (20) |
|
Chapter 1: Motherboards, Processors, and Memory |
|
|
1562 | (1) |
|
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies |
|
|
1563 | (1) |
|
Chapter 3: Peripherals, Cables, and Connectors |
|
|
1563 | (1) |
|
Chapter 4: Printers and Multifunction Devices |
|
|
1564 | (1) |
|
Chapter 5: Networking Fundamentals |
|
|
1565 | (1) |
|
Chapter 6: Introduction to TCP/IP |
|
|
1566 | (1) |
|
Chapter 7: Wireless and SOHO Networks |
|
|
1566 | (1) |
|
Chapter 8: Network Services, Virtualization, and Cloud Computing |
|
|
1567 | (1) |
|
Chapter 9: Laptop and Mobile Device Hardware |
|
|
1568 | (1) |
|
Chapter 10: Mobile Connectivity and Application Support |
|
|
1568 | (1) |
|
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems |
|
|
1569 | (1) |
|
Chapter 12: Hardware and Network Troubleshooting |
|
|
1569 | (1) |
|
Chapter 13: Operating System Basics |
|
|
1570 | (1) |
|
Chapter 14: Windows Configuration |
|
|
1570 | (1) |
|
Chapter 15: Windows Administration |
|
|
1571 | (4) |
|
Chapter 16: Working with macOS and Linux |
|
|
1575 | (2) |
|
Chapter 17: Security Concepts |
|
|
1577 | (1) |
|
Chapter 18: Securing Operating Systems |
|
|
1577 | (1) |
|
Chapter 19: Troubleshooting Operating Systems and Security |
|
|
1578 | (1) |
|
Chapter 20: Scripting and Remote Access |
|
|
1578 | (1) |
|
Chapter 21: Safety and Environmental Concerns |
|
|
1579 | (1) |
|
Chapter 22: Documentation and Professionalism |
|
|
1579 | (2) |
Index |
|
1581 | |