Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - certforumz

#1651
A+ Certification / .A+ Essentials Question 2:
June 18, 2010, 07:08:54 AM
10. Which specification refers to the family of wireless LAN technologies?

A. 802.3
B. 802.5
C. 802.11
D. 10BaseT

Ans: C

Explanation:

The generic standard that defines wireless LAN technologies is 802.11. Specifically, the following standards exist:
a. 802.11: applies to wireless LANs and provides 1 or 2 Mbps transmission in the 2.4 GHz band.
b. 802.11a: an extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz band.
c. 802.11b (initially referred to as 802.11 or Wi-Fi):  an extension to 802.11 that applies to wireless LAN and provides up to 11 Mbps transmission in the 2.4 GHz band.
d. 802.11g:  applies to wireless LANs and provides 20+ Mbps in the 2.4 GHz band.

11. James, your customer calls you from his hotel where he is trying to work out of office. The hotel provides a WiFi connection but he can't seem to connect to it. You direct him to open a command prompt and run IPCONFIG. He responds that he receives the network address of 117.245.2.211. What must James do to connect to the WiFi Access Point?

     A.    Ensure that the wireless connection is configured properly, he was probably using a wired network card last time he was in the office.
     B.    Provide the information for the default gateway so he can reach the DHCP server.
     C.    Configure Ethernet card, and connect RJ-45 cable from the laptop to an ethernet port in his room.
     D.    Ask the front desk at the hotel to enable WPA security

asn: A

Explanation: Note that James computer was configured with a public IP address. Usually, the Wireless Internet clients are assigned private address range and the router that connects to the ISP is assigned a public IP. Configuring the laptop to use the wireless Internet will solve the problem.
#1652
A+ Certification / A+ Essentials Questions
June 18, 2010, 05:14:34 AM
Check out the new A+ exams here:
https://certforumz.com/index.php/topic,3708.0.html


1. Windows Vista and Windows 7 Operating Systems feature glass-like design, live task bar thumb nails, dynamic Windows, etc. What is the term given to these modern features?

A. Sidebar
B. Start Menu
C. Aero
D. SSD (Smooth Scrolling Desktop)

Ans: C

Explanation:
Windows Vista and Windows 7 feature a user interface termed as Aero by Microsoft. This is the default interface used by Vista. Aero interface is characterized by the following features:
1.    Glass-like translucent design
2.    Dynamic windows: When you minimize a window, it animates to its place on the taskbar, so it's easier to find when you need it.
3.    High dots-per-inch (dpi) support: Windows Aero supports high-resolution monitors, so you can get a laptop or flat-screen monitor that's smaller in size but shows visually richer, displaying high-resolution, easy-to-read images.
4.    Live taskbar thumbnails: In Windows Aero, live taskbar thumbnail images display the actual contents of both windows that are currently open and those that are minimized in the taskbar. When you rest your mouse pointer on a tile on the taskbar, you'll see the "live" contents of that window without having to bring it to the foreground.
Other features include Windows Flip 3D, and smooth scrolling desktop.

Source: http://www.simulationexams.com/exam-details/aplus-essentials-220-701.htm

2. Which Global state of laptop power management is the normal working state?


              A. G0
              B. G1
              C. G2
              D. G3
              E. S1

Ans: A

Explanation:
The ACPI specification defines the following seven states (so-called global states) for an ACPI-compliant computer-system:

    G0 (S0): Working
    G1, Sleeping subdivides into the four states S1 through S4:
        S1: All processor caches are flushed, and the CPU(s) stop executing instructions. Power to the CPU(s) and RAM is maintained; devices that do not indicate they must remain on may be powered down.
        S2: CPU powered off
        S3: Commonly referred to as Standby, Sleep, or Suspend to RAM. RAM remains powered
        S4: Hibernation or Suspend to Disk. All content of main memory is saved to non-volatile memory such as a hard drive, and is powered down.
    G2 (S5), Soft Off: G2 is almost the same as G3 Mechanical Off, but some components remain powered so the computer can "wake" from input from the keyboard, clock, modem, LAN, or USB device.
    G3 (S6), Mechanical Off: The computer's power consumption approaches close to zero, to the point that the power cord can be removed and the system is safe for dis-assembly (typically, only the real-time clock is running off its own small battery).

3. The maximum Bluetooth range as per Class 1 specification is?
    A.    55 feet
      B.    330 feet
      C.    200 feet
      D.    12 feet

ans: B

Explanation:

    Class 1: range up to 100 meters (in most cases 20-30 meters)
    Class 2: range up to 30 meters (in most cases 5-10 meters)

4. A technician needs to do which of the following before wrapping up the successful installation a new printer at customer premises?
      A.    Educate users about basic functionality.
      B.    Print a test page.
      C.    Reset to default settings.
      D.    Print out a personal email.

ans: A

Explanation: The technician needs to educate the user(s) about the functionality and usage of the printer before finishing with the installation.


5. Which hive of the registry includes information about which file extensions map to particular applications?

      A.    HKEY_LOCAL_MACHINE
      B.    HKEY_USERS
      C.    HKEY_CLASSES_ROOT
      D.    HKEY_CURRENT_CONFIG

ans: C

Explation: HKEY_CLASSES_ROOT provides information about file extensions map to a particular application.

6. What tool lets you test Direct X?
      A.    MSConfig.
      B.    DXDiag
      C.    GraphX
      D.    Nvidia Control Panel

ans: B


7. You have been tasked with fixing a problem with a computer display. You talk to the User to try to determine what the problem may be. What do you not ask the User?

      A.    Have any changes been made recently?
      B.    How often does the problem occur?
      C.    Can you replicate the problem?
      D.    What did you do?


Ans:D


8. What type of file has a file extension of .BKF?

      A.    Binding Key File
      B.    Burger King Fries
      C.    Backup file
      D.    Binary Key Function

ans: C

9. A User calls you because he is receiving General Protection Faults. He is working within several programs at the same time to perform his duties and uses two flat panel monitors. One of the programs was written specifically for the company by a
software vendor and the other programs are part of Microsoft Office. What is the most probable reason for receiving this error?

A. He opened an email and a virus infected attachment. His antivirus has failed to maintain the integrity of his system.
B. He has performed an illegal action.
C. He is downloading streaming media to his computer which violates company policy and has been caught.
D. A program has tried to access memory that is in use by another program or a memory address that doesn't exist.

ans:D



Practice Tests:
http://www.simulationexams.com/exam-details/aplus-essentials-220-801.htm
http://www.simulationexams.com/exam-details/aplus-practical-application-220-802.htm
#1653
CCNA Certification / CCNA Questions - OSI Layers
June 18, 2010, 01:51:55 AM
Q5. Two sub layers of OSI Data Link layer are which of the following? [Select 2].

        A. Logical Link Control
        B. Data Link Control
        C. Media Access Control
        D. Physical Layer Control

Ans:A,C

Explanation:
The OSI model was designed to facilitate open specification for connecting to systems conforming to OSI model. These systems are designed to be open for communication with almost any other system. OSI model breaks down each functional layer so that overall design complexity could be lessened. OSI model primarily consists of seven layers for the flow of information. This is shown in the figure below.

The Data Link Layer corresponds to layer 2 of OSI reference model. This layer is further divided into two sub-layers:

1. Logical Link Control (LLC) sub-layer, and
2. Media Access Control (MAC) sub-layer.

The LLC sub-layer handles error control, flow control, framing, and MAC sub-layer addressing.

The MAC sub-layer is the lower of the two sub-layers of the Data Link layer.
MAC sub-layer handles access to shared media, such a Token passing or Ethernet.



#1654
Q3. Match the following:

        A. Repeater   1. Data Link Layer device

        B. Bridge       2. Network Layer device

        C. Router      3. Physical Layer device

Select best answer:

                    A.  A -->2,  B---->3, C---->1                           
                    B.  A--->3,  B---->1, C---->2
                    C.  A--->3,  B---->2, C---->1
                    D.  A--->1,  B---->2, C---->3

Answer: B

Explanation:

The most frequently used network devices may be categorized as repeaters, hubs, switches, and routers. These devices let you connect computers, printers, and other devices to communicate with each other. The medium that is used for communication is usually cable (optical or copper) and air (Wifi, bluetooth, etc.).

A repeater is a basic device that simply amplifies the input signals and retransmits. It is used to extend the range of a network segment. For example, the range of a 10BaseT network segment is 100meters by default. If the end devices are at a distance more than 100 meters, you will require a repeater so that the transmitted signals are received at the destination device without losing any information.

Repeaters work at the physical layer of OSI model.

A hub is typically the simplest device to use. Its job is very simple: anything that comes in one port is sent out to all other ports on the hub. Every computer connected to the hub "sees" the same information on the network that every other computer on the hub sees. For years, simple hubs have been quick and easy ways to connect computers in small and home networks. All devices connected to a hub will be in the same collision domain as well as broadcast domain.

A switch is more intelligent than a hub, though it does essentially the same things as that of a hub. A switch learns the physical addresses of sending devices by reading the MAC address and mapping it to the port number through which the frame had arrived. This way, it will quickly learn which MAC address belongs to which switch port, and stores the information in a table (called MAC table). Then onwards, it will send a frame only to the port that connects to the destination device (as specified in the frame). Note that both hub and switch are layer-2 devices together.

A hub or a switch is used to connect two or more network segments.

A router is used to route packets, and most complicated among the three.  They work at layer-3 of the OSI model. They route packets based on the IP addresses where as a switch forwards packets based on the MAC addresses. A router needs to disseminate an incoming packet down to its IP address and route it to destination based on information available in its routing table. Again, note that switches maintain a MAC table where as routers maintain a routing table. When a switch sends a packet (usually called a frame when sent by a switch) it is called forwarding. Thus a switch forwards an incoming frame based on its destination MAC address. A router reads the destination IP address of the incoming packet, finds out which interface it needs to go to reach desired destination (which may be several hops away) and routes the packet appropriately.

A router is used to connect two or more networks together.

CCNA Exam Simulator:
http://www.certexams.com/cisco/ccna/exam-details.htm

CCENT Exam Simulator:
http://www.certexams.com/cisco/ccent/exam-details.htm
#1655
Q. Which of the following are true about a collision domain and a broadcast domain in a switch network? (Choose 2 best answers)

  a. Both collision domain and broadcast domain are one and the same.
  b. A collision domain is one where collisions may occur due to simultaneous transmission of packets by two or more devices
  c. Assuming no VLANs are present, a switch acts as a single broadcast domain.
  d. A layer 2 switch forms a single collision domain.
  e. A switch with 2 or more VLANs forms only one broadcast domain.

ans: b, c

Explation:
A collision domain is one where collisions can occur between transmitting devices. For example, a network hub with several work stations (PCs) attached to it forms a single collision domain. In otherwords, if you have two or more transmitting devices sharing a common medium (cable, air, etc) there can be collisions. Switches are different from Hubs. In a switch, a port is not shared with any other ports on the switch, and therefore forms a single collision domain. Therefore, an individual workstation connected to a switch port has no one to collide with. On the other hand, an individual workstation connected to a port on a Hub shares the medium with all other ports on the Hub, and therefore all Hub ports form a single collision domain.

In a switch, broadcasts are sent out every port, and therefore switches are defined as a single broadcast domain. Every workstation connected to a switch receives every broadcast generated by any other device connected to that switch. When there are several nodes connected to a switch, broadcasts may slow down the speed of the network significantly. VLANs may be used to divide the switch in to two or more broadcast domains. VLANS do not allow broadcasts to propagate to other VLANs on the switch network. For example, traffic generated in VLAN1 can only be forwarded into devices connected to VLAN1. InterVLAN connectivity can be achieved by using routers to route traffic between VLANs, in the same way as routing traffic between two networks (or subnets). VLANS are configured with layer 3 addressing (IP and subnet mask) scheme. The router acts as a border that broadcasts (by default) do not cross. When traffic is generated in one VLAN and needs to go into another VLAN the router simply sees it as subnet to subnet traffic and routes it as configured.

CCNA Exam Simulator:
http://www.certexams.com/cisco/ccna/exam-details.htm

CCNA Exam Simulator with Netsim:
https://www.certexams.com/cisco/ccna/netsim-exam-details.htm
#1656
CCNA Certification / CCNA Questions - Basic
June 17, 2010, 01:01:38 AM
Question 1:

Which of the following is Class C IP address?

      A. 10.10.14.118
      B. 135.23.112.57
      C. 191.200.199.199
      D. 204.67.118.54

Explanation:

IP addresses are written using decimal numbers separated by decimal points. This is called dotted decimal notation of expressing IP addresses. The different classes of IP addresses as per IP v4 specification is as below:

Class  Format    Leading Bits  Network address    Max. nets    Max hosts
                                                                                                                   
A      N.H.H.H          0          0 - 126              127              16,777,214
B      N.N.H.H          10      128 - 191          16,384                    65,534
C      N.N.N.H          110    192 - 223        2,097,152                      254
D    Not Applicable 1110    Address range:  224.0.0.0 to 239.255.255.255  Class D multicast address space is 2^28  or 268,435,456 multicast groups.
E    Not Applicable 1111    Address range: 240.0.0.0      255.255.255.255

Network address of all zeros means "This network or segment".
Network address of all 1s means " all networks", same as hexadecimal of all Fs.
Network number 127 is reserved for loopback tests.
Host (Node) address of all zeros mean "This Host (Node)".
Host (Node) address of all 1s mean "all Hosts (Nodes) " on the specified network.
Class D is a special multicast address and cannot be used for networks. The 4 high-order bits are always 1110, and the remaining 28 bits allow for more than 268 million possible addresses. There is no concept of network and host address ranges in Class D
Class E is reserved for experimental purposes. The first four bits in the address are always 1111.

CCNA Exam Simulator:
http://www.certexams.com/cisco/ccna/exam-details.htm

CCNA Netsim with Exam Simulator:
https://www.certexams.com/cisco/ccna/netsim-exam-details.htm
Question 2:

You have an IP of 156.233.42.56 with 7 bits reserved for subnetting. How many hosts and subnets are possible?

                A. 126 hosts and 510 subnets
                B. 128 subnets and 512 hosts
                C. 510 hosts and 128 subnets
                D. 512 subnets and 128 hosts

Correct Answer: C

Class B network has the form N.N.H.H, the default subnet mask is 16 bits long.
(N represents network portion, and H represents host portion of the IP address)

There are an additional 7 bits to the default subnet mask. The total number of bits in the subnet mask are 16+7 = 23.

This leaves us with 32-23 =9 bits for assigning to hosts.

7 bit subnet bits correspond to (2^7)=128 subnets.

Note that earlier, Cisco used to deduct all zeros and all ones subnets from the total number of available networks. However, this practice was discontinued because all zeros and all ones subnets can also used now-a-days.

9 bits belonging to host addresses correspond to (2^9-2)=512-2 = 510 hosts.
Note that all zeros and all ones host addresses cannot be used. All zeros host correspond to this network, and all one ones correspond to broadcast address to all hosts.

In other words, the Network Address is the address in which all binary bits in the host portion of the IP address are set to zero. Network Address is used to specify a network, so it cannot be assigned to any individual host.

CCNA Exam Simulator:
http://www.certexams.com/cisco/ccna/exam-details.htm

CCNA Exam Simulator with Netsim:
https://www.certexams.com/cisco/ccna/netsim-exam-details.htm
#1657
Exam Objectives for CCNP BSCI 640-901:

Implement EIGRP operations.

   * Explain the functions and operations of EIGRP (e.g., DUAL).
   * Configure EIGRP routing. (e.g., Stub Routing, authentication, etc.)
   * Verify or troubleshoot EIGRP routing configurations.

Implement multiarea OSPF operations.

   * Explain the functions and operations of multiarea OSPF.
   * Configure multiarea OSPF routing. (e.g., Stub, NSSA, authentication, etc.)
   * Verify or troubleshoot multiarea OSPF routing configurations.

Describe integrated IS-IS.

   * Describe the features and benefits of integrated IS-IS.
   * Configure and verify integrated IS-IS.

Implement Cisco IOS routing features.


   * Describe, configure or verify route redistribution between IP routing IGPs. (e.g., route-maps, default routes, etc.)
   * Describe, configure or verify route filtering (i.e., distribute-lists and passive interfaces).
   * Describe and configure DHCP services (e.g., Server, Client, IP helper address, etc.).

Implement BGP for enterprise ISP connectivity

   * Describe the functions and operations of BGP.
   * Configure or verify BGP operation in a non-transit AS (e.g., authentication).
   * Configure BGP path selection. (i.e., Local Preference, AS Path, Weight or MED attributes).

Implement multicast forwarding.

   * Describe IP Multicast (e.g., Layer-3 to Layer-2 mapping, IGMP, etc.).
   * Describe, configure, or verify IP multicast routing (i.e., PIM Sparse-Dense Mode).

Implement IPv6.

   * Describe IPv6 addressing operations.
   * Describe IPv6 interoperation with IPv4.
   * Describe, configure or verify OSPF routing with IPv6 addressing.

642-902 Exam Objectives:

Implement an EIGRP based solution, given a network design and a set of requirements


Determine network resources needed for implementing EIGRP on a network
Create an EIGRP implementation plan
Create an EIGRP verification plan
Configure EIGRP routing
Verify EIGRP solution was implemented properly using show and debug commands
Document results of EIGRP implementation and verification
Implement a multi-area OSPF Network, given a network design and a set of requirements
Determine network resources needed for implementing OSPF on a network
Create an OSPF implementation plan
Create an OSPF verification plan
Configure OSPF routing
Verify OSPF solution was implemented properly using show and debug commands
Document results of OSPF implementation and verification plan

Implement an eBGP based solution, given a network design and a set of requirements

Determine network resources needed for implementing eBGP on a network
Create an eBGP implementation plan
Create an eBGP verification plan
Configure eBGP routing
Verify eBGP solution was implemented properly using show and debug commands
Document results of eBGP implementation and verification plan

Implement an IPv6 based solution, given a network design and a set of requirements

Determine network resources needed for implementing IPv6 on a network
Create an IPv6 implementation plan
Create an IPv6 verification plan
Configure IPv6 routing
Configure IPv6 interoperation with IPv4
Verify IPv6 solution was implemented properly using show and debug commands
Document results of IPv6 implementation and verification plan

Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements

Create a redistribution implementation plan based upon the results of the redistribution analysis
Create a redistribution verification plan
Configure a redistribution solution
Verify that a redistribution was implemented
Document results of a redistribution implementation and verification plan
Identify the differences between implementing an IPv4 and IPv6 redistribution solution

Implement Layer 3 Path Control Solution

Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis
Create a Layer 3 path control verification plan
Configure Layer 3 path control
Verify that a Layer 3 path control was implemented
Document results of a Layer 3 path control implementation and verification plan

Implement basic teleworker and branch services

Describe broadband technologies
Configure basic broadband connections
Describe basic VPN technologies
Configure GRE
Describe branch access technologies
#1658
Describe the operation of data networks.

    * Describe the purpose and functions of various network devices
    * Select the components required to meet a given network specification
    * Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
    * Describe common networking applications including web applications
    * Describe the purpose and basic operation of the protocols in the OSI and TCP models
    * Describe the impact of applications (Voice Over IP and Video Over IP) on a network
    * Interpret network diagrams
    * Determine the path between two hosts across a network
    * Describe the components required for network and Internet communications
    * Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
    * Differentiate between LAN/WAN operation and features

Implement a small switched network

    * Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
    * Explain the technology and media access control method for Ethernet technologies
    * Explain network segmentation and basic traffic management concepts
    * Explain the operation of Cisco switches and basic switching concepts
    * Perform, save and verify initial switch configuration tasks including remote access management
    * Verify network status and switch operation using basic utilities (including: ping, traceroute,telnet,SSH,arp, ipconfig), SHOW & DEBUG commands
    * Implement and verify basic security for a switch (port security, deactivate ports)
    * Identify, prescribe, and resolve common switched network media issues, configuration issues, autonegotiation, and switch hardware failures


Implement an IP addressing scheme and IP services to meet network requirements for a small branch office
    * Describe the need and role of addressing in a network
    * Create and apply an addressing scheme to a network Assign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment
    * Explain the basic uses and operation of NAT in a small network connecting to one ISP
    * Describe and verify DNS operation
    * Describe the operation and benefits of using private and public IP addressing
    * Enable NAT for a small network with a single ISP and connection using SDM and verify operation using CLI and ping
    * Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM)
    * Implement static and dynamic addressing services for hosts in a LAN environment
    * Identify and correct IP addressing issues

Implement a small routed network

    * Describe basic routing concepts (including: packet forwarding, router lookup process)
    * Describe the operation of Cisco routers (including: router bootup process, POST, router components)
    * Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
    * Configure, verify, and troubleshoot RIPv2
    * Access and utilize the router CLI to set basic parameters
    * Connect, configure, and verify operation status of a device interface
    * Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
    * Perform and verify routing configuration tasks for a static or default route given specific routing requirements
    * Manage IOS configuration files (including: save, edit, upgrade, restore)
    * Manage Cisco IOS
    * Implement password and physical security
    * Verify network status and router operation using basic utilities (including: ping, traceroute,telnet,SSH,arp, ipconfig), SHOW & DEBUG commands

Explain and select the appropriate administrative tasks required for a WLAN

    * Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)
    * Identify and describe the purpose of the components in a small wireless network. (including: SSID, BSS, ESS)
    * Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
    * Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
    * Identify common issues with implementing wireless networks

Identify security threats to a network and describe general methods to mitigate those threats

    * Explain today's increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats
    * Explain general methods to mitigate common security threats to network devices, hosts, and applications
    * Describe the functions of common security appliances and applications
    * Describe security recommended practices including initial steps to secure network devices

Implement and verify WAN links

    * Describe different methods for connecting to a WAN
    * Configure and verify a basic WAN serial connection
#1659
CCNA Certification / CCNA 640-802 Exam Topics
June 04, 2010, 08:15:08 AM
Describe how a network works

    * Describe the purpose and functions of various network devices
    * Select the components required to meet a network specification
    * Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
    * Describe common networked applications including web applications
    * Describe the purpose and basic operation of the protocols in the OSI and TCP models
    * Describe the impact of applications (Voice Over IP and Video Over IP) on a network
    * Interpret network diagrams
    * Determine the path between two hosts across a network
    * Describe the components required for network and Internet communications
    * Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
    * Differentiate between LAN/WAN operation and features

Configure, verify and troubleshoot a switch with VLANs and interswitch communications

    * Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
    * Explain the technology and media access control method for Ethernet networks
    * Explain network segmentation and basic traffic management concepts
    * Explain basic switching concepts and the operation of Cisco switches
    * Perform and verify initial switch configuration tasks including remote access management
    * Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
    * Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
    * Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
    * Describe how VLANs create logically separate networks and the need for routing between them
    * Configure, verify, and troubleshoot VLANs
    * Configure, verify, and troubleshoot trunking on Cisco switches
    * Configure, verify, and troubleshoot interVLAN routing
    * Configure, verify, and troubleshoot VTP
    * Configure, verify, and troubleshoot RSTP operation
    * Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
    * Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.


    * Describe the operation and benefits of using private and public IP addressing
    * Explain the operation and benefits of using DHCP and DNS
    * Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM)
    * Implement static and dynamic addressing services for hosts in a LAN environment
    * Calculate and apply an addressing scheme including VLSM IP addressing design to a network
    * Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
    * Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).
    * Describe IPv6 addresses
    * Identify and correct common problems associated with IP addressing and host configurations

Configure, verify, and troubleshoot basic router operation and routing on Cisco devices

    * Describe basic routing concepts (including: packet forwarding, router lookup process)
    * Describe the operation of Cisco routers (including: router bootup process, POST, router components)
    * Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
    * Configure, verify, and troubleshoot RIPv2
    * Access and utilize the router to set basic parameters.(including: CLI/SDM)
    * Connect, configure, and verify operation status of a device interface
    * Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
    * Perform and verify routing configuration tasks for a static or default route given specific routing requirements
    * Manage IOS configuration files. (including: save, edit, upgrade, restore)
    * Manage Cisco IOS.
    * Compare and contrast methods of routing and routing protocols
    * Configure, verify, and troubleshoot OSPF
    * Configure, verify, and troubleshoot EIGRP
    * Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
    * Troubleshoot routing issues
    * Verify router hardware and software operation using SHOW & DEBUG commands.
    * Implement basic router security

Explain and select the appropriate administrative tasks required for a WLAN

    * Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)
    * Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)
    * Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
    * Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
    * Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration)


Identify security threats to a network and describe general methods to mitigate those threats

    * Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats
    * Explain general methods to mitigate common security threats to network devices, hosts, and applications
    * Describe the functions of common security appliances and applications
    * Describe security recommended practices including initial steps to secure network devices

Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network.

    * Describe the purpose and types of ACLs
    * Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)
    * Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)
    * Verify and monitor ACLs in a network environment
    * Troubleshoot ACL issues
    * Explain the basic operation of NAT
    * Configure NAT for given network requirements using (including: CLI/SDM)
    * Troubleshoot NAT issues

Implement and verify WAN links

    * Describe different methods for connecting to a WAN
    * Configure and verify a basic WAN serial connection
    * Configure and verify Frame Relay on Cisco routers
    * Troubleshoot WAN implementation issues
    * Describe VPN technology (including: importance, benefits, role, impact, components)
    * Configure and verify a PPP connection between Cisco routers

Please note that Cisco may change exam objectives at any time without any notice. For latest topics, please visit official site.
#1660
One of IPv6's key benefits over IPv4 is its capability for automatic interface addressing. By implementing the IEEE's 64-bit Extended Unique Identifier (EUI-64) format, a host can automatically assign itself a unique 64-bit IPv6 interface identifier without the need for manual configuration or DHCP. This is accomplished on Ethernet interfaces by referencing the already unique 48-bit MAC address, and reformatting that value to match the EUI-64 specification.

RFC 2373 dictates the conversion process, which can be described as having two steps. The first step is to convert the 48-bit MAC address to a 64-bit value. To do this, we break the MAC address into its two 24-bit halves: the Organizationally Unique Identifier (OUI) and the NIC specific part. The 16-bit hex value 0xFFFE is then inserted between these two halves to form a 64-bit address.

Step one

Why 0xFFFE? As explained in the IEEE's Guidelines for EUI-64 Registration Authority, this is a reserved value which equipment manufacturers cannot include in "real" EUI-64 address assignments. In other words, any EUI-64 address having 0xFFFE immediately following its OUI portion can be recognized as having been generated from an EUI-48 (or MAC) address.

The second step is to invert the universal/local (U/L) flag (bit 7) in the OUI portion of the address. Globally unique addresses assigned by the IEEE originally have this bit set to zero, indicating global uniqueness. Likewise, locally created addresses, such as those used for virtual interfaces or a MAC address manually configured by an administrator, will have this bit set to one. The U/L bit is inverted when using an EUI-64 address as an IPv6 interface ID.
Step two

Again, you're probably wondering why this is done. The answer lies buried in section 2.5.1 of RFC 2373:

"The motivation for inverting the 'u' bit when forming the interface identifier is to make it easy for system administrators to hand configure local scope identifiers when hardware tokens are not available. This is expected to be case for serial links, tunnel end-points, etc. The alternative would have been for these to be of the form 0200:0:0:1, 0200:0:0:2, etc., instead of the much simpler ::1, ::2, etc."

The important part to remember here is that the scope of the address never changes: global addresses are still global and local addresses are still local. Rather, the meaning of the bit is inverted for convenience, so the value of the bit must be inverted as well.

We can see this conversion in action when we assign an IPv6 address to a router interface. First, take note of the interface's MAC address (this is typically the same as its burned-in address, or BIA).

Router# show interface f0/0
FastEthernet0/0 is up, line protocol is down
  Hardware is Gt96k FE, address is 0012.7feb.6b40 (bia 0012.7feb.6b40)
...

After assigning an EUI-64-designated IPv6 address to the interface, we can verify that the interface ID has been drawn from the MAC address in the process described for both the assigned and the link local address:

Router(config)# interface f0/0
Router(config-if)# ipv6 address 2001:db8::/64 eui-64
Router(config-if)# do show ipv6 interface f0/0
FastEthernet0/0 is up, line protocol is down
  IPv6 is enabled, link-local address is FE80::212:7FFF:FEEB:6B40 [TEN]
  No Virtual link-local address(es):
  Global unicast address(es):
    2001:DB8::212:7FFF:FEEB:6B40, subnet is 2001:DB8::/64 [EUI/TEN]
...

Taken with thanks from http://wiki.nil.com/IPv6_EUI-64_interface_addressing

#1661
Security+ exam objectives are as given below:

1.0 Systems Security

1.1 Differentiate among various systems security threats: Privilege escalation, Virus, Worm, Trojan, Spyware, Spam, Adware, Rootkits, Botnets, Logic bomb

1.2 Explain the security risks pertaining to system hardware and peripherals: BIOS, USB devices, Cell phones, Removable storage, Network attached storage

1.3 Implement OS hardening practices and procedures to achieve workstation and server security: Hotfixes, Service packs, Patches, Patch management, Group policies, Security templates, Configuration baselines

1.4 Carry out the appropriate procedures to establish application security: ActiveX, Java, Scripting, Browser, Buffer overflows, Cookies, SMTP open relays, Instant messaging, P2P, Input validation, Cross-site scripting (XSS)

1.5 Implement security applications: HIDS, dersonal software firewalls, Antivirus, Anti-spam, Popup blockers

1.6 Explain the purpose and application of virtualization technology.

2.0 Network Infrastructure

2.1 Differentiate between the different ports & protocols, their respective threats and mitigation techniques.

  • Antiquated protocols
  • TCP/IP hijacking
  • Null sessions
  • Spoofing
  • Man-in-the-middle
  • Replay
  • DOS, DDOS
  • Domain Name Kiting
  • DNS poisoning, ARP poisoning

2.2 Distinguish between network design elements and components: DMZ, VLAN, NAT, Network interconnections, NAC, Subnetting, Telephony,

2.3 Determine the appropriate use of network security tools to facilitate network security: NIDS, NIPS, Firewalls, Proxy servers, Honeypot, Internet content filters, Protocol analyzers

2.4 Apply the appropriate network tools to facilitate network security: NIDS, Firewalls, Proxy servers, Internet content filters, Protocol analyzers

2.5 Explain the vulnerabilities and mitigations associated with network devices: Privilege escalation, Weak passwords, Back doors, Default accounts, DOS

2.6 Explain the vulnerabilities and mitigations associated with various transmission media: Vampire taps

2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking: Data emanation, War driving, SSID broadcast, Blue jacking, Bluesnarfing, ? Rogue access points, Weak encryption

3.0 Access Control

3.1 Identify and apply industry best practices for access control methods: Implicit deny, Least privilege, Separation of duties, Job rotation

3.2 Explain common access control models and the differences between each: MAC, DAC, Role & Rule based access control

3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.

3.4 Apply appropriate security controls to file and print resources.

3.5 Compare and implement logical access control methods: ACL, Group policies, Password policy, Domain password policy, User names and passwords, Time of day restrictions, Account expiration, Logical tokens

3.6 Summarize the various authentication models and identify the components of each - One, two and three-factor authentication, Single sign-on

3.7 Deploy various authentication models and identify the components of each: Biometric reader, RADIUS, RAS, LDAP, Remote access policies, Remote authentication, VPN, Kerberos, CHAP, PAP, Mutual, 802.1x, TACACS

3.8 Explain the difference between identification and authentication (identity proofing).

3.9 Explain and apply physical access security methods: Physical access logs/lists, Hardware locks, Physical access control ? ID badges, Door access systems, Man-trap, Physical tokens, Video surveillance ? camera types and positioning

4.0 Assessments & Audits

4.1 Conduct risk assessments and implement risk mitigation.

4.2 Carry out vulnerability assessments using common tools: Port scanners, Vulnerability scanners, Protocol analyzers, OVAL, Password crackers, Network mappers

4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.

4.4 Use monitoring tools on systems and networks and detect security-related anomalies.
? Performance monitor
? Systems monitor
? Performance baseline
? Protocol analyzers

4.5 Compare and contrast various types of monitoring methodologies.
? Behavior-based
? Signature-based
? Anomaly-based

4.6 Execute proper logging procedures and evaluate the results: Security application, DNS, System, Performance, Access, Firewall, Antivirus

4.7 Conduct periodic audits of system security settings: User access and rights review, Storage and retention policies, Group policies

5.0 Cryptography

5.1 Explain general cryptography concepts: Key management, Steganography, Symmetric key, Asymmetric key, Confidentiality, Integrity and availability, Non-repudiation, Comparative strength of algorithms, Digital signatures, Whole disk encryption, Trusted Platform Module (TPM), Single vs. Dual sided certificates, Use of proven technologies

5.2 Explain basic hashing concepts and map various algorithms to appropriate applications.: SHA, MD5, LANMAN, NTLM

5.3 Explain basic encryption concepts and map various algorithms to appropriate applications: DES, 3DES, RSA, PGP, Elliptic curve, AES, AES256, One time pad, Transmission encryption (WEP TKIP, etc)

5.4 Explain and implement protocols: SSL/TLS, S/MIME, PPTP, HTTP vs. HTTPS vs. SHTTP, L2TP, IPSEC, SSH

5.5 Explain core concepts of public key cryptography: Public Key Infrastructure (PKI), Recovery agent, Public key, Private keys, Certificate Authority (CA), Registration, Key escrow, Certificate Revocation List (CRL), Trust models

5.6 Implement PKI and certificate management: Public Key Infrastructure (PKI), Recovery agent, Public key, Private keys, Certificate Authority (CA), Registration, Key escrow, Certificate Revocation List (CRL),

6.0 Organizational Security


6.1 Explain redundancy planning and its components: Hot site, Cold site, Warm site, Backup generator, Single point of failure, RAID, Spare parts, Redundant servers, Redundant ISP, UPS, Redundant connections

6.2 Implement disaster recovery procedures: Planning, Disaster recovery exercises, Backup techniques and practices ? storage, Schemes, Restoration

6.3 Differentiate between and execute appropriate incident response procedures: Forensics, Chain of custody, First responders, Damage and loss contro, Reporting ? disclosure of

6.4 Identify and explain applicable legislation and organizational policies: Secure disposal of computers, Acceptable use policies, Password complexity, Change management, Classification of information, Mandatory vacations, Personally Identifiable Information (PII), Due care, Due diligence, Due process, SLA, Security-related HR policy, User education and awareness training

6.5 Explain the importance of environmental controls: Fire suppression, HVAC, Shielding

6.6 Explain the concept of and how to reduce the risks of social engineering: Phishing, Hoaxes, Shoulder surfing, Dumpster diving, User education and awareness training

Please note that the Security+ exam objectives may change from time to time. Check with the official CompTIA website for latest exam objectives.
#1662
This article is aimed at all the candidates, specially freshers, who intend to make a career in Information Technology. Let us start by defining Information Technology. Information technology (IT) is "the study, design, development, implementation, and support of methods involved in the area of IT". Information technology is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information.

The field IT encompasses:

1. Information management: Collection, storage, organization, and retrieval
2. Systems management: Managing hardware resources such as servers, clients, and peripherals. And management of software resources such as server/client operating systems, applications, and other resources.
3. Network management: Managing (includes design, installation, and maintenance) of network devices such as routers, switches, hubs, access points, firewalls, etc.
4. Infrastructure management: Managing infrastructure such as power cabling, network cabling, primary and backup power generation, UPS, and server room management.
5. Systems software development: Development of systems software such as mobile operating systems, server/client operating systems, network protocols development, security protocols development, etc. For example, Linux is an open source server operating system that comes under the category of systems software.
6. Software applications development: Development of desktop or server applications that are used for specific purpose. For example, Microsoft Word is a desktop application that is used most commonly.
7. Networking protocols development: This is another area of IT that represents development of software specific to protocols such as TCP/IP. Netwokr protocols can also be categorized under systems software. But, this has emerged as a dominant field, and inherited its own significance.

8. Web Technologies: This is a fast growing IT discipline. The areas of work include web design and development, search engine optimization (SEO), website administration (webmaster), etc. The technical competencies required for this area of work are typically proficiency in PHP, asp, .net, mySQL, MS SQL, CGI Perl, JSP, Java, etc.

9. Back-office services such as record maintenance, customer services also come under IT.

Apart from the above, certain types embedded systems software development may also be categorized under IT.

As can be seen above, the term IT represents a wide variety of specialties, and the opportunities are practically boundless.

How to choose a particular certification?
Before answering this question, we would like to give a brief view of different types of certifications available in the IT arena, and explain them briefly.

Microsoft Certifications: Microsoft certification may broadly be classified in to two categories, viz server administration and software development. Sever administration certifications primarily aim at administering different systems produced by Microsoft. These include Windows Servers (there are different servers for different end use), database servers, mail servers, etc. The list is almost endless. The administration of these servers is not a small task and requires a lot of skills and experience. The man power requirement is also huge. The other category is certification in the area of software development. This is another area where candidates will be tested for their fluency in various Microsoft-based software languages such as VB.NET, ASP.NEt, etc. There are several other specialty certifications in between which have not been discussed, such as security management

CompTIA Certification: CompTIA certifications are aimed at entry level candidates, typically having a 3-year diploma with one or two years of industry experience or fresh engineering or technology graduates. Different streams offered by CompTIA include A+ Certification, Network+ Certification, Security+ Certification, etc. Among these, A+ Certification is most widely recognized by the computer industry. The certification is a measure of a candidate's ability to configure, maintain, and troubleshoot computer hardware and software (particularly Microsoft Windows based). CompTIA is receommended for candidates who wish to pursue a career as a computer or networking technician. The jobs are plenty in this category. Typically, CompTIA certifications require 2 to 3 months of preparation. One needs to make sure that he/she has sufficient hands-on preparation before going to take the exam.

Cisco Certifications: Cisco certifications are most rewarding for right candidates who have aptitude to install, configure, and troubleshoot LANs/WANs in an enterprise environment. They have several levels of certifications, such as Associate, Professional, and Expert. If one is pursuing Cisco certs, it is highly recommended that she/he attain multiple certifications in a choosen stream. It would not only enhances the domain knowledge, but improves the chances of placement significantly. Cisco cert exams are considered to be tougher than CompTIA, and Microsoft exams and therefore requires higher level of preparation.
.
Prosoft Certifications:

Prosoft is a leading provider of certification in web technologies. They offer CIW (Certified Internet Webmaster) certification that measures the skills of a candidate to design, develop, and promote a website. Various certifications offered by prosoft include the following:

# CIW Associate
# CIW Associate Design Specialist
# CIW Professional
# CIW Web Developer
# CIW Security Analyst
# CIW Security Essentials
# Master CIW Designer
# Master CIW Administrator
# Master CIW Web Site Manager
# Master CIW Enterprise Developer

Please visit the official website for more information.
http://www.ciwcertified.com/certifications/program.asp

Practice tests are offered at:
http://www.simulationexams.com/ciw_exams.htm
#1663
Server+ 2009 Exam Objectives:

1.0 System Hardware

1.1 Differentiate between system board types, features, components and their purposes.
? Dip switches / jumpers? Processor (single and multi)? Bus types and bus speeds? On board components: NICs, Video, Audio, USB, HID, Serial, Parallel? Expansion slots: PCI, PCIe, PCIx, AGP, ISA? BIOS? Riser Card / backplane? Storage connectors: SCSI, SATA, IDE, Floppy
1.2 Deploy different chassis types and the appropriate components

? Cooling: Fans, Water cooled, Passive, Active, Shroud, Ducts, Redundant cooling, Hot swappable, Ventilation? Form Factor (tower, rack, blade): Space utilization (U size, height, width, depth)? Power:  Connectors, Voltages, Phase? Redundant power? Shut off switches ? chassis intrusion? Power buttons? Reset buttons? Diagnostic LEDs? Expansion bays

1.3 Differentiate between memory features / types and given a scenario select appropriate memory ? Memory pairing? ECC vs. non ECC? Registered vs. non-registered? RAID and hot spares? Types: DDR, Fully buffered DIMM, DDR2, SDRAM, DDR3? Memory compatibility: Speed, Size, Pins, CAS Intency, Timing, Vendor specific memory? On board vs. riser card

1.4 Explain the importance of a Hardware Compatibility List (HCL) ? Vendor standards for hardware? Memory and processor compatibility? Expansion cards compatibility? Virtualization requirements

1.5 Differentiate between processor features / types and given a scenario select the appropriate processor ? Multicore? Multiprocessor? Cache levels? Stepping? Speed? VRMs? Execute disable (XD) or not execute (NX)? Hyperthreading? VT or AMD-V? AMD vs.Intel (non-compatible CPUs)? Processor architecture (RISC, CISC)? Vendor slot types? 64bit vs. 32 bit? Heat dissipation (heat sinks, fans, liquid cooling)

1.6 Given a scenario, install appropriate expansion cards into a server while taking fault tolerance into consideration.
? Manufacturer specific: Fax cards, PBX cards, Camera cards, VoIP, HBAs
? NICs? Video? Audio? Storage controller (SCSI, SATA, RAID): SCSI low voltage / high voltage (LVD/HVD), SCSI IDs, Cables and connectors, Active vs. passive termination? Port expansion cards: USB, IEEE 1394, Serial, Parallel
1.7 Install, update and configure appropriate firmware.
                    ? Driver / hardware compatibility? Implications of a failed firmware upgrade (redundant BIOS)? Follow manufacturer instructions and documentation

2.0 Software

2.1 Install, deploy, configure and update NOS (Windows / *nix).
? Installation methods (optical media, USB, network share, PXE) o Imaging ? system cloning and deployment (Ghost, RIS/WDS, Altiris, virtualization templates)? Bootloader? File systems: FAT, FAT32, NTFS, VMFS, ZFS, EXT3? Driver installation: Driver acquisition, Installation methods, Required media? Configure NOS: Initial network, User, Device, Roles, OS environmental settings, Applications and tools? Patch management

2.2 Explain NOS security software and its features.? Software firewall: Port blocking, Application exception, ACL? Malware protection software: Antivirus, Antispyware? Basics of file level permissions vs. share permissions

2.3 Given a scenario, implement and administer NOS management features based on procedures and guidelines
? User management: Add and remove users, Setting permissions, Group memberships, Policies, Logon scripts? Resource management: ACLs, Quotas, Shadow volumes, Disk management, Performance monitoring, Baselining? Monitoring (tools and agents): SNMP (MIBs), WBEM (WMI)

2.4 Explain different server roles, their purpose and how they interact
? File and print server? Database server? Web server? Messaging server? DHCP server? Directory services server? DNS server? Application server: Update server and proxy server, Filtering server, Monitoring server, Dedicated, Distributed, Peer to peer? Remote access server? Virtualized services? NTP server? Explain the different between a workstation, desktop and a server? Server shut down and start up sequence (one server vs. multiple servers vs. attached components)

2.5 Summarize server virtualization concepts, features and considerations
? Resource utilization? Configuration? Interconnectivity? Management server? Reasons for virtualization: Cost benefits, Redundancy, Green initiative, Disaster recovery, Testing environment, Ease of deployment

2.6 Describe common elements of networking essentials
? TCP/IP: Subnetting, DNS, DHCP, Classes, Gateways, Static vs. dynamic, IP stack, Ports
? Ethernet: Types,  Speeds, Cables? VPN? VLAN? DMZ

3.0 Storage

3.1 Describe RAID technologies and its features and benefits
? Hot spare? Software vs. hardware
? Cache read/write levels (data loss potential)
? Performance benefits and tradeoffs

3.2 Given a scenario, select the appropriate RAID level
? 0, 1, 3, 5, 6, 10, 50
? Performance benefits and tradeoffs

3.3 Install and configure different internal storage technologies
? Hot swappable vs. non-hot swappable
? SCSI, Ultra SCSI, Ultra320 (termination), LUNs
? SAS, SATA
? Tape
? Optical: DVD, DVD-R, CD-ROM, CD-R, CD-RW, Blu-Ray
? Flash
? Floppy (USB)
? Controller (firmware levels)
? Hard drive (firmware, JBOD)

3.4 Summarize the purpose of external storage technologies
? Network attached storage
? Storage area network
? Tape library
? WORM
? Optical jukebox
? Transport media: iSCSI, SATA, SAS, SCSI, Fiber Channel

4.0 IT Environment

4.1 Write, utilize and maintain documentation, diagrams and procedures
? Follow pre-installation plan when building or upgrading servers
? Labeling? Diagram server racks and environment topologies
? Hardware and software upgrade, installation, configuration , server role and repair logs
? Document server baseline (before and after service)
? Original hardware configuration, service tags, asset management and warranty
? Vendor specific documentation: Reference proper manuals, Websites, Support channels (list of vendors)

4.2 Given a scenario, explain the purpose of the following industry best practices
? Follow vendor specific server best practices: Documentation, Tools, Websites
? Explore ramifications before implementing change ? determine organizational impact
? Communicate with stakeholders before taking action and upon completion of action
? Comply with all local laws / regulations, industry and corporate regulations? Purpose of Service Level Agreement (SLAs)
? Follow change control procedures
? Equipment disposal

4.3 Determine an appropriate physical environment for the server location
? Check for adequate and dedicated power, proper amperage and voltageo UPS systems (check load, document service, periodic testing)o UPS specifications (run time, max load, bypass procedures, server communication and shut down, proper monitoring)
? Server cooling considerations ? HVAC, Adequate cooling in roomo Adequate cooling in server racko Temperature and humidity monitors

4.4 Implement and configure different methods of server access
? KVM (local and IP based)
? Direct connect
? Remote management: Remote control, Administration, Software deployment, Dedicated management port

4.5 Given a scenario, classify physical security measures for a server location
? Physical server security: Locked doors, Rack doors, CCTV, Mantraps, Security personnel
? Access control devices (RFID, keypads, pinpads): Biometric devices (fingerprint scanner, retina)
? Security procedures: Limited access, Access logs, Limited hours
? Defense in-depth ? multiple layers of defense
? Reasons for physical security: Theft, Data loss, Hacking
? Secure documentation related to servers: Passwords, System configurations, Logs

5.0 Disaster Recovery

5.1 Compare and contrast backup and restoration methodologies, media types and concepts
? Methodologies (full, incremental, differential): Snapshot, Copy, Bare metal, Open file, Databases, Data vs. OS restore, Rotation and retention (grandfather, father, and son)? Media types: Tape, Disk, WORM, Optical, Flash? Backup security and off-site storage? Importance of testing the backup and restoration process

5.2 Given a scenario, compare and contrast the different types of replication methods ? Disk to disk? Server to server: Clustering, Active/active, Active/passive? Site to site? Site types: Cold site, Hot site, Warm site, Distance requirements

5.3 Explain data retention and destruction concepts
? Awareness of potential legal requirements
? Awareness of potential company policy requirements
? Differentiate between archiving and backup

5.4 Given a scenario, carry out the following basic steps of a disaster recovery plan
?Disaster recovery testing process
? Follow emergency procedures (people first)? Use appropriate fire suppressants
? Follow escalation procedures for emergencies
? Classification of systems (prioritization during recovery)

6.0 Troubleshooting

6.1 Explain troubleshooting theory and methodologies
? Identify the problem and determine the scopeo Question users/stakeholders and identify changes to the server / environmento Collect additional documentation / logso If possible, replicate the problem as appropriateo If possible, perform backups before making changes
? Establish a theory of probable cause (question the obvious)o Determine whether there is a common element of symptom causing multiple problems
? Test the theory to determine cause o Once theory is confirmed determine next steps to resolve problemo If theory is not confirmed re-establish new theory or escalate
? Establish a plan of action to resolve the problem and notify impacted users
? Implement the solution or escalate as appropriate o Make one change at a time and test/confirm the change has resolved the problemo If the problem is not resolved, reverse the change if appropriate and implement new change
? Verify full system functionality and if applicable implement preventative measures
? Performa a root cause analysis
? Document findings, actions and outcomes throughout the process

6.2 Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods
? Common problems: Failed POST, Overheating, Memory failure, Onboard component failure, Processor failure, Incorrect boot sequence, Expansion card failure, Operating system not found, Drive failure, Power supply failure, I/O failure
? Causes of common problems: Third party components or incompatible componentso Incompatible or incorrect BIOSo Cooling failureo Mismatched componentso Backplane failure
? Environmental issues: Dust, Humidity, Temperature, Power surge / failure
? Hardware tools: Power supply tester (multimeter), System board tester, Compressed air, ESD equipment

6.3 Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods
? Common problems: User unable to logon, User cannot access resources, Memory leak, BSOD / stop, OS boot failure,  Driver issues, Runaway process, Cannot mount drive, Cannot write to system log, Slow OS performance, Patch update failure, Service failure, Hangs no shut down, Users cannot print
? Cause of common problems: Malware, Unauthorized software, Software firewall, User Account Control (UAC/SUDO), Improper permissions, Corrupted files, Lack of hard drive space, Lack of system resources, Virtual memory (misconfigured, corrupt), Fragmentation, Encryption, Print server drivers/services, Print spooler
? Software tools: System logs, Monitoring tools (resource monitor, performance monitor), Defragmentation tools

6.4 Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods
? Common problemso Internet connectivity failureo Email failureo Resource unavailableo DHCP server mis-configuredo Non-functional or unreachableo Destination host unreachableo Unknown hosto Default gateway mis-configuredo Failure of service providero Can reach by IP not by host name
? Causes of common problems: Improper IP configuration, VLAN configuration, Port security, Improper subnetting, Component failure, Incorrect OS route tables, Bad cables, Firewall (mis-configuration, hardware failure, software failure), Mis-configured NIC, routing / switch issues, DNS and/or DHCP failure, Mis-configured hosts file
? Networking tools: ping, tracert / traceroute, ipconfig / ifconfig, nslookup, net use / mount, route, nbstat, netstat

6.5 Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods
? Common problems: Slow file access, OS not found, Data not available, Unsuccessful backup, Error lights, Unable to mount the device, Drive not available, Cannot access logical drive, Data corruption, Slow I/O performance, Restore failure, Cache failure, Multiple drive failure
? Causes of common problems: Media failure, Drive failure, Controller failure, HBA failure, Loose connectors, Cable problems, Mis-configuration, Improper termination, Corrupt boot sector, Corrupt file system table, Array rebuild, Improper disk partition, Bad sectors, Cache battery failure, Cache turned off, Insufficient space, Improper RAID configuration, Mis-matched drives, Backplane failure
? Storage tools: Partitioning tools, Disk management, RAID array management, Array management, System logs, Net use / mount command, Monitoring tools

Please note that CompTIA exam objectives are subject to change without notice. Please check CompTIA officical website for latest exam objectives
#1664
The exam objectives for A+ Practical Applications exam 220-702 are given below:

1.0 Hardware

1.1 Given a scenario, install, configure and maintain personal computer components
? Storage devices: o HDD:SATA, PATA, Solid state; FDD; Optical drives: CD / DVD / RW / Blu-Ray; Removable ; External
? Motherboards: Jumper settings; CMOS battery; Advanced BIOS settings; Bus speeds; Chipsets; Firmware updates; Socket types; Expansion slots; Memory slots; Front panel connectors; I/O ports: Sound, video, USB 1.1, USB 2.0, serial, IEEE 1394 / Firewire, parallel, NIC, modem, PS/2)
? Power supplies: Wattages and capacity; Connector types and quantity; Output voltage
? Processors : Socket types; Speed; Number of cores; Power consumption; Cache; Front side bus; 32bit vs. 64bit
? Memory
? Adapter cards: Graphics cards; Sound cards; Storage controllers : RAID cards (RAID array ? levels 0,1,5), eSATA cards; I/O cards : Firewire, USB, Parallel, Serial; Wired and wireless network cards; Capture cards (TV, video); Media reader
? Cooling systems: Heat sinks; Thermal compound; CPU fans; Case fans

1.2 Given a scenario, detect problems, troubleshoot and repair/replace personal computer components
? Storage devices: HDD: SATA, PATA, Solid state; FDD; Optical drives: CD / DVD / RW / Blu-Ray; Removable; External
? Motherboards: Jumper settings; CMOS battery; Advanced BIOS settings; Bus speeds; Chipsets; Firmware updates; Socket types; Expansion slots; Memory slots; Front panel connectors; I/O ports: Sound, video, USB 1.1, USB 2.0, serial, IEEE 1394 / Firewire, parallel, NIC, modem, PS/2)
? Power supplies : Wattages and capacity, Connector types and quantity, Output voltage
? Processors: Socket types, Speed, Number of cores, Power consumption, Cache, Front side bus, 32bit vs. 64bit
? Memory
? Adapter cards: Graphics cards - memory; Sound cards; Storage controllers: RAID cards, eSATA cards; I/O cards: Firewire, USB, Parallel, Serial; Wired and wireless network cards; Capture cards (TV, video); Media reader
? Cooling systems: Heat sinks; Thermal compound; CPU fans; Case fans

1.3 Given a scenario, install, configure, detect problems, troubleshoot and repair/replace laptop
components
? Components of the LCD including inverter, screen and video card
? Hard drive and memory
? Disassemble processes for proper re-assembly
o Document and label cable and screw locations
o Organize parts
o Refer to manufacturer documentation
o Use appropriate hand tools
? Recognize internal laptop expansion slot types
? Upgrade wireless cards and video card
? Replace keyboard, processor, plastics, pointer devices, heat sinks, fans, system board, CMOS
battery, speakers

1.4 Given a scenario, select and use the following tools
? Multimeter
? Power supply tester
? Specialty hardware / tools
? Cable testers
? Loop back plugs
? Anti-static pad and wrist strap
? Extension magnet
1.5 Given a scenario, detect and resolve common printer is
? Symptoms: Paper jams; Blank paper; Error codes; Out of memory error; Lines and smearing; Garbage printout; Ghosted image; No connectivity
? Issue resolution: Replace fuser; Replace drum; Clear paper jam; Power cycle; Install maintenance kit (reset page count); Set IP on printer; Clean printer

2.0 Operating Systems

Unless otherwise noted, operating systems referred to within include Microsoft Windows 2000, Windows XP Professional, XP Home, XP MediaCenter, Windows Vista  Home, Home Premium, Business and Ultimate.

2.1 Select the appropriate commands and options to troubleshoot and resolve problems
? MSCONFIG, DIR, CHKDSK (/f /r), EDIT, COPY (/a /v /y), XCOPY, FORMAT, IPCONFIG (/all /release /renew), ? PING (-t ?l), MD / CD / RD, NET, TRACERT, NSLOOKUP,  [command name] /? , SFC

2.2 Differentiate between Windows Operating System directory structures (Windows 2000, XP and Vista)
? User file locations
? System file locations
? Fonts
? Temporary files
? Program files
? Offline files and folders

2.3 Given a scenario, select and use system utilities / tools and evaluate the results
? Disk management tools: DEFRAG; NTBACKUP; Check Disk
? Disk Manager: Active, primary, extended and logical partitions; Mount points; Mounting a drive; FAT32 and NTFS;  Drive status: Foreign drive, Healthy, Formatting, Active unallocated, Failed, Dynamic, Offline. Online
? System monitor
? Administrative tools: Event Viewer, Computer Management, Services, Performance Monitor
? Devices Manager: Enable, Disable, Warnings, Indicators
? Task Manager: Process list, Resource usage, Process priority, Termination
? System Information
? System restore
? Remote Desktop Protocol (Remote Desktop / Remote Assistance)
? Task Scheduler
? Regional settings and language settings

2.4 Evaluate and resolve common issues
? Operational Problems
o Windows specific printing problems: Print spool stalled; Incorrect / incompatible driver / form printing
o Auto-restart errors
o Bluescreen error
o System lock-up
o Devices drivers failure (input / output devices)
o Application install, start or load failure
o Service fails to start
? Error Messages and Conditions
o Boot: Invalid boot disk; Inaccessible boot drive; Missing NTLDR
o Startup: Device / service failed to start; Device / program in registry not found
o Event viewer (errors in the event log)
o System Performance and Optimization: Aero settings; Indexing settings; UAC; Side bar settings; Startup file maintenance; Background processes

3.0 Networking

3.1 Troubleshoot client-side connectivity issues using appropriate tools
? TCP/IP settings: Gateway ; Subnet mask ; DNS ;DHCP (dynamic vs.static) ;NAT (private and public)
? Characteristics of TCP/IP: Loopback addresses; Automatic IP addressing
? Mail protocol settings: SMTP; IMAP; POP
? FTP settings: Ports: IP addresses; Exceptions; Programs
? Proxy settings: Ports, IP addresses, Exceptions, Programs
? Tools (use and interpret results): Ping, Tracert, Nslookup, Netstat, Net use,  Net /?, Ipconfig, telnet, SSH
? Secure connection protocols: SSH, HTTPS
? Firewall settings: Open and closed ports, Program filters

3.2 Install and configure a small office home office (SOHO) network
? Connection types: Dial-up, Broadband - DSL - Cable - Satellite - ISDN
o Wireless : All 802.11; WEP; WPA; SSID; MAC filtering; DHCP settings
o Routers / Access Points: Disable DHCP; Use static IP; Change SSID from default; Disable SSID broadcast; MAC filtering; Change default username and password; Update firmware; Firewall
o LAN (10/100/1000BaseT, Speeds)
o Bluetooth (1.0 vs. 2.0)
o Cellular
o Basic VoIP (consumer applications)
? Basics of hardware and software firewall configuration
o Port assignment / setting up rules (exceptions)
o Port forwarding / port triggering
? Physical installation
o Wireless router placement
o Cable length

4.0 Security

4.1 Given a scenario, prevent, troubleshoot and remove viruses and malware
? Use antivirus software
? Identify malware symptoms
? Quarantine infected systems
? Research malware types, symptoms and solutions (virus encyclopedias)
? Remediate infected systems
? Update antivirus software
o Signature and engine updates
o Automatic vs. manual
? Schedule scans
? Repair boot blocks
? Scan and removal techniques
o Safe mode
o Boot environment
? Educate end user

4.2 Implement security and troubleshoot common issues
? Operating systems
o Local users and groups: Administrator, Power Users, Guest, Users
o Vista User Access Control (UAC)
o NTFS vs. Share permissions: Allow vs. deny; Difference between moving and copying folders and files; File attributes
o Shared files and folders: Administrative shares vs. local shares; Permission propagation; Inheritance
o System files and folders
o Encryption (Bitlocker, EFS)
o User authentication
? System
o BIOS security- Drive lock, Passwords, Intrusion detection, TPM

Note: Please check with the CompTIA site for latest changes to the exam objectives.
#1665
A+ Certification / A+ Essentials Exam Objectives:
May 28, 2010, 08:35:22 AM
Section 1.0 Hardware

1.1 Categorize storage devices and backup media:
These include FDD, HDD, Solid state, magnetic, and Optical drives. You will also need to study about CD / DVD / RW / Blu-Ray and other removable storage devices like tape drive, Solid state (e.g. thumb drive, flash, SD cards, USB), External CD-RW and hard drive. Know the distinction between hot swappable devices and non-hot swappable devices
1.2 Explain motherboard components, types and features:
   These include ATX/BTX, Micro ATX, and NLX motherboards and their form factors, I/O interfaces for sound, video, USB 1.1 and 2.0, serial, parallel,  IEEE 1394/Firewire,  and PS/2. Know about Modems, and NICs.
Processors: Know about various processor sockets used by dual core, quad core, and other processors.
Momory slots: Know about RIMM, DIMM, SODIMM, and SIMM memory slots.
Bus architecture and bus-slots: Know about PCI, AGP, PCIe, AMR, CNT, PCMCIA, PATA, IDE, EIDE, SATA, and eSATA.
RAID levels: Know about RAID levels 0, 1, and 5.
BIOS, Firmware, and chipsets: Know about basic BIOS settings, battery replacement, and reading firmware version, etc. Know about raiser card, and common BIOS errors.

1.3 Classify power supplies types and characteristics
   The topics include AC adapter, ATX proprietary power supplies, Voltage, wattage and capacity of power supplies,  Voltage selector switch and pin configuration Pins (20, 24) on power supply output.

1.4 Explain the purpose and characteristics of CPUs and their features:
   These include identification of CPU types (AMD and Intel),  hyper threading, multi, dual, triple, and quad core processing,
   Cache: Onchip cache (L1 and L2), actual versus real speed, 32 bit vs. 64 bit processing.

1.5 Explain cooling methods and devices:
   The topics here include heat sinks, CPU and case fans, liquid cooling systems, thermal compound.

1.6 Compare and contrast memory types, characteristics and their purpose:
   Several memory types are covered under this section, including DRAMs, SRAMs, SDRAMs, DDR / DDR2 / DDR3, and RAMBUS.
       The memory characteristics are further discussed in terms of Parity vs. Non-parity,  ECC vs. non-ECC, Single sided vs. double sided, Single channel vs. dual channe.

The bus speeds include PC100, PC133, PC2700, PC3200, DDR3-1600, DDR2-667.

1.7 Distinguish between the different display devices and their characteristics:
       know about projectors, CRTs, and LCD technologies.  Understand screen resolutions  (e.g. XGA, SXGA+, UXGA, WUXGA), contrast ratio, and native resolution.
   Understand different connector types like VGA, HDMI, S-video, Component/RGB.
   Know about refresh rate, resolution, multi-monitor, and degaussing.

1.8 Install and configure peripherals and input devices:
   These include mouse, bar code reader, multimedia (such as web and digital cameras, MIDI, and microphones), biometric devices, touch screen, and KVM switches.

1.9 Summarize the function and types of adapter cards:
These include video, PCI, PCIe, AGP cards such as sound card, TV tuner card, and capture card.
The I/O interfaces covered include SCSI, Serial, USB, and Parallel. Know about communication devices such as NIC and modem.

1.10 Install, configure and optimize laptop components and features:
   The expansion devices covered include PCMCIA careds, PCI Express cards, docking station, etc.
   Know about laptop communication connections such as Bluetooth, infrared, cellular WAN, Ethernet, and modem.
   Know about power and electrical input devices such as fixed input power supplies, and batteries.
   Laptop input devices such as stylus/digitizer, pointing devices (touch pad, point stick, etc.) are covered.
   
1.11 Install and configure printers:

Differentiate between laser, inkjet, thermal, and impact printer types Differentiate between local vs. network printers. Know about printer drivers compatibility.

2.0 Troubleshooting, Repair and Maintenance

2.1 Given a scenario, explain the troubleshooting theory
? Identify the problem
o Question the user and identify user changes to computer and perform backups
before making changes
? Establish a theory of probable cause (question the obvious)
? Test the theory to determine cause
o Once theory is confirmed determine next steps to resolve problem
o If theory is not confirmed re-establish new theory or escalate
? Establish a plan of action to resolve the problem and implement the solution
? Verify full system functionality and if applicable implement preventative measures
? Document findings, actions and outcomes

2.2 Given a scenario, explain and interpret common hardware and operating system symptoms and their causes
? OS related symptoms: Bluescreen, System lock-up, Input/output device, Application install, Start or load, Windows specific printing problems, Print spool stalled, Incorrect / incompatible driver,
? Hardware related symptoms: Excessive heat, Noise, Odors, Status light indicators, Alerts, Visible damage (e.g. cable, plastic)
? Use documentation and resources: Use/installation manuals, Internet / web based, Training materials

2.3 Given a scenario, determine the troubleshooting methods and tools for printers

? Manage print jobs
? Print spooler
? Printer properties and settings
? Print a test page

2.4 Given a scenario, explain and interpret common laptop issues and determine the appropriate basic troubleshooting method
? Issues: Power conditions, Video, Keyboard, Pointer, Stylus, Wireless card issues
? Methods: Verify power (e.g. LEDs, swap AC adapter), Remove unneeded peripherals, Plug in external monitor, Toggle Fn keys or hardware switches, Check LCD cutoff switch, Verify backlight functionality and pixilation, Check switch for built-in WIFI antennas or external antennas

2.5 Given a scenario, integrate common preventative maintenance techniques
? Physical inspection
? Updates: Driver, Firmware, OS, Security
? Scheduling preventative maintenance: Defrag, Scandisk, Check disk, Startup programs
? Use of appropriate repair tools and cleaning materials: Compressed air, Lint free cloth, Computer vacuum and compressors
? Power devices: Appropriate source such as power strip, surge protector or UPS
? Ensuring proper environment
? Backup procedures

3.0 Operating Systems and Software


Unless otherwise noted, operating systems referred to within include Microsoft Windows 2000, Windows XP Professional, XP Home, XP MediaCenter, Windows Vista Home, Home Premium, Business and Ultimate.

3.1 Compare and contrast the different Windows Operating Systems and their features
? Windows 2000, Windows XP 32bit vs. 64bit, Windows Vista 32 bit vs. 64bit
o Side bar, Aero, UAC, minimum system requirements, system limits
o Windows 2000 and newer ? upgrade paths and requirements
o Terminology (32bit vs. 64bit ? x86 vs. x64)
o Application compatibility, installed program locations (32bit vs. 64bit),
Windows compatibility mode
o User interface, start bar layout

3.2 Given a scenario, demonstrate proper use of user interfaces
? Windows Explorer
? My Computer
? Control Panel
? Command prompt utilities: telnet, ping, ipconfig,
? Run line utilities: msconfig, msinfo32, Dxdiag, Cmd, REGEDIT
? My Network Places
? Task bar / systray
? Administrative tools: Performance monitor, Event Viewer, Services, Computer Management
? MMC
? Task Manager
? Start Menu

3.3 Explain the process and steps to install and configure the Windows OS
? File systems: FAT32 vs. NTFS,
? Directory structures: Create folders, Navigate directory structures
? Files: Creation, Extensions, Attributes, Permissions
? Verification of hardware compatibility and minimum requirements
? Installation methods: Boot media such as CD, floppy or USB, Network installation, Install from image, Recover CD, Factory recovery partition
? Operating system installation options: File system type, Network configuration, Repair install
? Disk preparation order: Format drive, Partition, Start installation
? Device Manager: Verify, Install and update devices drivers, Driver signing
? User data migration ? User State Migration Tool (USMT)
? Virtual memory
? Configure power management: Suspend, Wake on LAN, Sleep timers, Hibernate, Standby
? Demonstrate safe removal of peripherals

3.4 Explain the basics of boot sequences, methods and startup utilities
? Disk boot order / device priority
o Types of boot devices (disk, network, USB, other)
? Boot options
o Safe mode
o Boot to restore point
o Recovery options: Automated System Recovery (ASR), Emergency Repair Disk (ERD), Recovery console

4.0 Networking

4.1 Summarize the basics of networking fundamentals, including technologies, devices and protocols
? Basics of configuring IP addressing and TCP/IP properties (DHCP, DNS)
? Bandwidth and latency
? Status indicators
? Protocols (TCP/IP, NETBIOS)
? Full-duplex, half-duplex
? Basics of workgroups and domains
? Common ports: HTTP, FTP, POP, SMTP, TELNET, HTTPS
? LAN / WAN
? Hub, switch and router
? Identify Virtual Private Networks (VPN)
? Basics class identification

4.2 Categorize network cables and connectors and their implementations
? Cables: Plenum / PVC, UTP (e.g. CAT3, CAT5 / 5e, CAT6), STP, Fiber, Coaxial cable
? Connectors: RJ45, RJ11

4.3 Compare and contrast the different network types
? Broadband: DSL, Cable, Satellite, Fiber
? Dial-up
? Wireless: All 802.11 types, WEP, WPA, SSID, MAC filtering, DHCP settings
? Bluetooth
? Cellular

5.0 Security

5.1 Explain the basic principles of security concepts and technologies
? Encryption technologies
? Data wiping / hard drive destruction / hard drive recycling
? Software firewall: Port security, Exceptions
? Authentication technologies: User name, Password, Biometrics, Smart cards
? Basics of data sensitivity and data security: Compliance, Classifications, Social engineering

5.2 Summarize the following security features
? Wireless encryption: WEPx and WPAx, Client configuration (SSID)
? Malicious software protection: Viruses, Trojans, Worms, Spam, Spyware, Adware, Grayware
? BIOS Security: Drive lock, Passwords, Intrusion detection, TPM
? Password management / password complexity
? Locking workstation: Hardware, Operating system
? Biometrics: Fingerprint scanner,

6.0 Operational Procedure

6.1 Outline the purpose of appropriate safety and environmental procedures and given a
scenario apply them
? ESD
? EMI: Network interference, Magnets
? RFI: Cordless phone interference, Microwaves
? Electrical safety: CRT, Power supply, Inverter, Laser printers, Matching power requirements of equipment with power distribution and UPSs
? Material Safety Data Sheets (MSDS)
? Cable management: Avoiding trip hazards
? Physical safety: Heavy devices, Hot components
? Environmental ? consider proper disposal procedures

6.2 Given a scenario, demonstrate the appropriate use of communication skills and professionalism in the workplace
? Use proper language ? avoid jargon, acronyms, slang
? Maintain a positive attitude
? Listen and do not interrupt a customer
? Be culturally sensitive
? Be on time: If late contact the customer
? Avoid distractions: Personal calls, Talking to co-workers while interacting with customers, Personal interruptions,
? Dealing with a difficult customer or situation
o Avoid arguing with customers and/or being defensive
o Do not minimize customers? problems
o Avoid being judgmental
o Clarify customer statements: Ask open-ended questions to narrow the scope of the problem, Restate the issue or question to verify understanding
? Set and meet expectations / timeline and communicate status with the customer
o Offer different repair / replacement options if applicable
o Provide proper documentation on the services provided
o Follow up with customer / user at a later date to verify satisfaction
? Deal appropriately with customers confidential materials
o Located on computer, desktop, printer, etc.