Preface |
|
xxvii | |
Acknowledgments |
|
xxx | |
Introduction |
|
xxxi | |
Exam Readiness Checklist, Exam 220-1001 |
|
xxxiii | |
Exam Readiness Checklist, Exam 220-1002 |
|
xxxvii | |
|
Part I Safety and Professionalism |
|
|
|
|
3 | (32) |
|
Workplace Safety and Safe Equipment Handling |
|
|
4 | (13) |
|
|
4 | (1) |
|
|
5 | (2) |
|
Lifting and Moving Equipment |
|
|
7 | (2) |
|
Exercise 1-1 Research Lifting Guidelines |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (3) |
|
Exercise 1-2 ESD-Proofing Your Workspace |
|
|
15 | (1) |
|
Working Safely with Power Supplies |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Environmental Concerns for IT Professionals |
|
|
17 | (8) |
|
Protection from Dust, Debris, and Other Airborne Particles |
|
|
17 | (1) |
|
Providing the Proper Temperature and Humidity |
|
|
18 | (1) |
|
|
18 | (3) |
|
Disposing of Computer Waste |
|
|
21 | (4) |
|
Exercise 1-3 Researching Recycling Centers |
|
|
25 | (1) |
|
|
25 | (2) |
|
|
26 | (1) |
|
|
27 | (8) |
|
|
31 | (4) |
|
2 Planning and Professionalism |
|
|
35 | (38) |
|
Professionalism and Proper Communication |
|
|
36 | (6) |
|
|
36 | (6) |
|
Dealing with Prohibited Content and Prohibited Activities |
|
|
42 | (3) |
|
Defining Prohibited Content and Behavior |
|
|
43 | (1) |
|
Educating Employees on Policies and Procedures |
|
|
43 | (1) |
|
Responding to the Discovery of Prohibited Content and/or Behavior |
|
|
44 | (1) |
|
Licensing, Privacy, and Regulations |
|
|
45 | (4) |
|
|
46 | (2) |
|
Regulated Data and Privacy |
|
|
48 | (1) |
|
|
49 | (7) |
|
General Documentation Best Practices |
|
|
50 | (1) |
|
|
51 | (5) |
|
|
56 | (4) |
|
Change Management Objectives |
|
|
56 | (1) |
|
Describing the Purpose of the Change |
|
|
57 | (1) |
|
Defining the Type and Scope of the Change |
|
|
57 | (1) |
|
|
58 | (1) |
|
Formulating a Back-Out Plan |
|
|
58 | (1) |
|
|
58 | (1) |
|
Getting Approval and Implementing the Change |
|
|
59 | (1) |
|
Getting End-User Acceptance |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (3) |
|
|
61 | (2) |
|
|
63 | (10) |
|
|
66 | (7) |
|
Part II Operating Systems |
|
|
|
3 Operating System Fundamentals |
|
|
73 | (48) |
|
Introduction to Operating Systems |
|
|
74 | (6) |
|
The Purpose of Operating Systems |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Device Types and Architectures |
|
|
76 | (1) |
|
32-Bit vs. 64-Bit Operating Systems |
|
|
77 | (1) |
|
End-of-Life and Update Considerations |
|
|
78 | (2) |
|
The Many Flavors of Windows |
|
|
80 | (8) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (3) |
|
|
83 | (3) |
|
|
86 | (1) |
|
Service Packs and Major Updates |
|
|
86 | (1) |
|
Exercise 3-1 Viewing the Windows Version, Edition, and Service Pack Information |
|
|
87 | (1) |
|
Windows Features That Vary by Version |
|
|
88 | (15) |
|
Features Specific to Windows 7 |
|
|
89 | (1) |
|
File Management Interface |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Features Specific to Windows 8/8.1 |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
Exercise 3-2 Exploring Windows 8.1 Features |
|
|
98 | (1) |
|
Features Specific to Windows 10 |
|
|
98 | (1) |
|
Modern Apps Became Universal Apps |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Settings App vs. Control Panel |
|
|
100 | (1) |
|
Task View and Multiple Desktops |
|
|
101 | (1) |
|
Exercise 3-3 Exploring Task View in Windows 10 |
|
|
101 | (2) |
|
Configuring and Using macOS |
|
|
103 | (6) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Dual-Booting with Windows |
|
|
108 | (1) |
|
Using Another Computer's Optical Drive |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (3) |
|
|
111 | (2) |
|
|
113 | (8) |
|
|
117 | (4) |
|
4 Upgrading, Installing, and Configuring Operating Systems |
|
|
121 | (50) |
|
Considerations for Installing or Upgrading Windows |
|
|
122 | (5) |
|
|
122 | (1) |
|
Application and Hardware Compatibility |
|
|
123 | (1) |
|
Clean Install vs. Upgrade |
|
|
124 | (1) |
|
|
125 | (2) |
|
|
127 | (5) |
|
|
127 | (2) |
|
Exercise 4-1 Using Disk Cleanup |
|
|
129 | (1) |
|
Upgrading to a Newer Version of Windows |
|
|
130 | (1) |
|
Upgrading to a Different Edition of the Same Windows Version |
|
|
131 | (1) |
|
|
132 | (17) |
|
Preparing to Install Windows |
|
|
132 | (8) |
|
Selecting Boot Media and Methods |
|
|
140 | (2) |
|
|
142 | (5) |
|
Exercise 4-2 Performing an Attended Clean Install of Windows |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (9) |
|
Checking for Internet Connectivity |
|
|
150 | (1) |
|
|
150 | (3) |
|
Registering and Activating Windows |
|
|
153 | (1) |
|
|
154 | (2) |
|
Installing Applications and Additional Windows Components |
|
|
156 | (1) |
|
|
157 | (1) |
|
Installing and Upgrading macOS and Linux Operating Systems |
|
|
158 | (2) |
|
|
158 | (1) |
|
File Systems for Linux and macOS |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Exercise 4-3 Installing Ubuntu Linux |
|
|
160 | (1) |
|
|
160 | (3) |
|
|
161 | (2) |
|
|
163 | (8) |
|
|
166 | (5) |
|
5 Disk, File, and Application Management |
|
|
171 | (64) |
|
|
172 | (15) |
|
Managing Disks in Windows |
|
|
173 | (3) |
|
Exercise 5-1 Viewing the Disk Storage Type |
|
|
176 | (3) |
|
Exercise 5-2 Creating a New Volume |
|
|
179 | (2) |
|
Exercise 5-3 Mounting a Volume to a Folder |
|
|
181 | (1) |
|
|
182 | (1) |
|
Managing Disks with DISKPART |
|
|
183 | (1) |
|
Exercise 5-4 Using DISKPART |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (9) |
|
General Characteristics of a File System |
|
|
188 | (1) |
|
|
189 | (2) |
|
|
191 | (2) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (19) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (3) |
|
Setting Explorer Folder Options |
|
|
201 | (1) |
|
File Management at the Windows Command Prompt |
|
|
202 | (2) |
|
Exercise 5-5 Managing Directories and Files at a Command Prompt |
|
|
204 | (5) |
|
Managing Files at the Linux or macOS Command Prompt |
|
|
209 | (1) |
|
Exercise 5-6 Creating a Text File in vi |
|
|
210 | (1) |
|
Exercise 5-7 Managing Files at the Linux Terminal Window |
|
|
211 | (2) |
|
Using the Shutdown Command |
|
|
213 | (2) |
|
|
215 | (10) |
|
Application System Requirements and OS Compatibility |
|
|
215 | (1) |
|
Methods of Installation and Deployment |
|
|
216 | (3) |
|
System Permissions for Managing Software |
|
|
219 | (1) |
|
Security Considerations When Installing Applications |
|
|
219 | (1) |
|
Compatibility Issues with Older Applications |
|
|
220 | (1) |
|
Exercise 5-8 Exploring Compatibility Mode Settings |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
224 | (1) |
|
Exercise 5-9 Working with Windows Applications |
|
|
224 | (1) |
|
|
225 | (3) |
|
|
225 | (3) |
|
|
228 | (7) |
|
|
232 | (3) |
|
6 Operating System Troubleshooting and Maintenance |
|
|
235 | (64) |
|
|
236 | (1) |
|
Windows Troubleshooting Tools |
|
|
237 | (21) |
|
|
237 | (1) |
|
|
237 | (1) |
|
System Information (MSINF032.EXE) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (2) |
|
Exercise 6-1 Backing Up and Restoring the Registry |
|
|
241 | (1) |
|
Microsoft Management Console |
|
|
242 | (5) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (4) |
|
Exercise 6-2 Exploring Windows 8.1 or 10 Task Manager |
|
|
253 | (1) |
|
Windows Memory Diagnostic |
|
|
254 | (1) |
|
|
255 | (1) |
|
Exercise 6-3 Viewing the Virtual Memory Settings |
|
|
256 | (2) |
|
Troubleshooting Windows Startup Problems |
|
|
258 | (17) |
|
Advanced Boot Options/Startup Options Menu |
|
|
258 | (6) |
|
Exercise 6-4 Working in Safe Mode |
|
|
264 | (1) |
|
System Configuration (MSCONFIG) |
|
|
265 | (3) |
|
Exercise 6-5 Exploring Boot Modes with System Configuration |
|
|
268 | (1) |
|
|
269 | (2) |
|
|
271 | (4) |
|
Windows Symptoms and Solutions |
|
|
275 | (8) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (3) |
|
Troubleshooting Applications |
|
|
281 | (2) |
|
OS Preventive Maintenance |
|
|
283 | (5) |
|
Defragmenting a Hard Disk |
|
|
283 | (1) |
|
Exercise 6-6 Defragmenting a Disk Drive |
|
|
283 | (1) |
|
Scheduling Disk Maintenance |
|
|
284 | (1) |
|
Exercise 6-7 Scheduling Windows Disk Maintenance |
|
|
285 | (1) |
|
Updates and Patch Management |
|
|
285 | (3) |
|
|
288 | (3) |
|
|
289 | (2) |
|
|
291 | (8) |
|
|
295 | (4) |
|
7 Client-Side Virtualization |
|
|
299 | (32) |
|
Introduction to Virtualization |
|
|
300 | (5) |
|
Purposes of Virtualization |
|
|
300 | (2) |
|
Server-Side Virtualization vs. Client-Side Virtualization |
|
|
302 | (1) |
|
Types of Client-Side Virtualization |
|
|
302 | (3) |
|
Implementing Client-Side Desktop Virtualization |
|
|
305 | (15) |
|
|
305 | (3) |
|
Implementing Desktop Virtualization |
|
|
308 | (3) |
|
Installing and Configuring Hyper-V Manager |
|
|
311 | (1) |
|
Exercise 7-1 Enabling Hyper-V Manager |
|
|
312 | (1) |
|
Exercise 7-2 Creating a VM in Hyper-V Manager |
|
|
313 | (2) |
|
Exercise 7-3 Setting Up a Virtual Switch in Hyper-V Manager |
|
|
315 | (1) |
|
Installing and Configuring Oracle VirtualBox |
|
|
315 | (2) |
|
Exercise 7-4 Installing Oracle VirtualBox |
|
|
317 | (1) |
|
Exercise 7-5 Create a Virtual Machine in VirtualBox |
|
|
317 | (2) |
|
Capturing and Releasing the Mouse and Keyboard in a Guest OS |
|
|
319 | (1) |
|
Improving Guest OS Performance |
|
|
319 | (1) |
|
|
320 | (2) |
|
|
320 | (2) |
|
|
322 | (9) |
|
|
325 | (6) |
|
Part III Computer Hardware |
|
|
|
8 Personal Computer Components: Motherboards and Processors |
|
|
331 | (42) |
|
|
332 | (3) |
|
Exercise 8-1 What's in Your Toolkit? |
|
|
335 | (1) |
|
Motherboard Form Factors and Components |
|
|
335 | (10) |
|
|
336 | (3) |
|
Exercise 8-2 Compare Motherboards |
|
|
339 | (1) |
|
|
339 | (6) |
|
|
345 | (9) |
|
|
346 | (2) |
|
CPU Technologies and Characteristics |
|
|
348 | (2) |
|
CPU Brand and Model Compatibility |
|
|
350 | (1) |
|
|
351 | (2) |
|
Exercise 8-3 Check Out Your Cooling System |
|
|
353 | (1) |
|
Configuring a Motherboard |
|
|
354 | (10) |
|
|
354 | (1) |
|
Understanding BIOS and UEFI |
|
|
354 | (1) |
|
A Brief History of the PC System BIOS |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
Exercise 8-4 Booting into Firmware Setup |
|
|
357 | (1) |
|
Exercise 8-5 Viewing the Firmware Settings |
|
|
358 | (4) |
|
Firmware-Based Diagnostics and Monitoring |
|
|
362 | (1) |
|
Motherboard Driver Software |
|
|
363 | (1) |
|
|
364 | (2) |
|
|
364 | (2) |
|
|
366 | (7) |
|
|
370 | (3) |
|
9 Personal Computer Components: Memory, Adapters, and Storage |
|
|
373 | (54) |
|
|
374 | (8) |
|
Capacity: From Bits to Exabytes |
|
|
374 | (1) |
|
Speed: From Hertz to Gigahertz |
|
|
375 | (1) |
|
|
376 | (1) |
|
Features and Configurations of RAM Chips and Modules |
|
|
376 | (5) |
|
|
381 | (1) |
|
Expansion Cards and Built-in Adapters |
|
|
382 | (16) |
|
|
383 | (1) |
|
|
383 | (2) |
|
|
385 | (4) |
|
Exercise 9-1 Research USB Connectors |
|
|
389 | (1) |
|
Exercise 9-2 Explore Your System's USB Ports |
|
|
389 | (5) |
|
|
394 | (2) |
|
|
396 | (1) |
|
|
397 | (1) |
|
Exercise 9-3 View Adapter Cards in Device Manager |
|
|
397 | (1) |
|
Storage Devices and Interfaces |
|
|
398 | (19) |
|
|
398 | (8) |
|
|
406 | (7) |
|
Exercise 9-4 Identify Your Storage Devices |
|
|
413 | (1) |
|
Exercise 9-5 Safely Disconnect External Storage |
|
|
414 | (3) |
|
|
417 | (2) |
|
|
417 | (2) |
|
|
419 | (8) |
|
|
422 | (5) |
|
10 Power Supplies, Display Devices, and Peripherals |
|
|
427 | (48) |
|
|
428 | (9) |
|
|
428 | (3) |
|
Exercise 10-1 Check Out the Wattage on PCs and Other Devices |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
Power Supply Form Factors and Connectors |
|
|
433 | (1) |
|
Connecting Power to Peripherals |
|
|
434 | (2) |
|
|
436 | (1) |
|
Removing a Power Supply/Installing a Power Supply |
|
|
436 | (1) |
|
Exercise 10-2 Replacing a Power Supply |
|
|
436 | (1) |
|
Video Adapters and Displays |
|
|
437 | (15) |
|
|
437 | (1) |
|
|
438 | (5) |
|
|
443 | (1) |
|
Multiple Video Adapters for One Monitor |
|
|
444 | (1) |
|
|
444 | (4) |
|
|
448 | (2) |
|
Exercise 10-3 Adjust Display Settings in Windows 10 |
|
|
450 | (2) |
|
Installing and Configuring Peripheral Devices |
|
|
452 | (12) |
|
|
452 | (3) |
|
|
455 | (4) |
|
|
459 | (1) |
|
|
460 | (2) |
|
|
462 | (1) |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
464 | (3) |
|
|
465 | (2) |
|
|
467 | (8) |
|
|
470 | (5) |
|
11 Installing and Upgrading PC Components |
|
|
475 | (36) |
|
Selecting Components for Custom PCs |
|
|
476 | (6) |
|
Graphics/CAD/CAM Design Workstation |
|
|
477 | (1) |
|
Audio/Video Editing Workstation |
|
|
478 | (1) |
|
Virtualization Workstation |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
Network-Attached Storage Device |
|
|
481 | (1) |
|
Installing and Upgrading Motherboards and Onboard Components |
|
|
482 | (11) |
|
|
482 | (1) |
|
|
483 | (1) |
|
Exercise 11-1 Removing an Old Motherboard |
|
|
483 | (1) |
|
Exercise 11-2 Properly Handling and Installing a Motherboard |
|
|
484 | (1) |
|
|
484 | (2) |
|
Exercise 11-3 Removing a PGA Processor from Its Socket |
|
|
486 | (1) |
|
Exercise 11-4 Removing an LGA Processor from Its Socket |
|
|
486 | (1) |
|
Exercise 11-5 Installing a Processor in an Empty LGA Socket |
|
|
487 | (1) |
|
Removing and Installing Cooling Systems |
|
|
487 | (3) |
|
Optimizing a System by Adding RAM |
|
|
490 | (1) |
|
Exercise 11-6 Running a Memory Scanner |
|
|
491 | (1) |
|
Installing and Removing DIMMs |
|
|
491 | (1) |
|
Exercise 11-7 Installing and Removing a DIMM |
|
|
492 | (1) |
|
|
493 | (3) |
|
|
494 | (1) |
|
Exercise 11-8 Removing an Adapter Card |
|
|
494 | (1) |
|
Installing and Configuring an Adapter Card |
|
|
494 | (1) |
|
Exercise 11-9 Installing an Adapter Card |
|
|
494 | (2) |
|
Installing Storage Devices |
|
|
496 | (5) |
|
Removing an Internal Storage Device |
|
|
496 | (1) |
|
Exercise 11-10 Removing a Drive |
|
|
496 | (1) |
|
Installing Optical Drives |
|
|
497 | (1) |
|
Installing Solid-State Storage |
|
|
497 | (1) |
|
Installing Drives on SATA Channels |
|
|
498 | (1) |
|
Exercise 11-11 Installing a SATA Drive |
|
|
499 | (1) |
|
|
500 | (1) |
|
Removing and Installing an External Storage Device |
|
|
500 | (1) |
|
|
501 | (2) |
|
|
501 | (2) |
|
|
503 | (8) |
|
|
506 | (5) |
|
12 PC Hardware Troubleshooting and Maintenance |
|
|
511 | (60) |
|
Preparing for Troubleshooting |
|
|
512 | (8) |
|
Protecting Systems and Gathering Tools |
|
|
512 | (1) |
|
|
513 | (3) |
|
Exercise 12-1 Troubleshooting with Device Manager |
|
|
516 | (3) |
|
|
519 | (1) |
|
Troubleshooting Motherboards, RAM, CPUs, and Power |
|
|
520 | (15) |
|
|
520 | (1) |
|
|
521 | (2) |
|
Troubleshooting Motherboard Problems |
|
|
523 | (3) |
|
Exercise 12-2 Replacing the Motherboard Battery |
|
|
526 | (1) |
|
Troubleshooting RAM Problems |
|
|
527 | (1) |
|
|
528 | (1) |
|
Troubleshooting Power Supplies |
|
|
529 | (1) |
|
Exercise 12-3 Checking a PI Connector |
|
|
530 | (3) |
|
|
533 | (1) |
|
|
534 | (1) |
|
Troubleshooting Storage Devices |
|
|
535 | (8) |
|
Tools Required for Working with Drives |
|
|
535 | (1) |
|
|
535 | (2) |
|
Exercise 12-4 Troubleshooting a Drive Failure |
|
|
537 | (1) |
|
SATA and eSATA Interfaces |
|
|
538 | (1) |
|
RAID Arrays and Controllers |
|
|
539 | (1) |
|
Solid-State Storage Devices |
|
|
540 | (1) |
|
|
541 | (1) |
|
|
542 | (1) |
|
|
543 | (7) |
|
|
544 | (1) |
|
The Computer Goes into Low-Resolution VGA Mode |
|
|
544 | (1) |
|
|
545 | (1) |
|
Screen Suddenly Shuts Down |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
Image Distortion or Discoloration |
|
|
549 | (1) |
|
|
549 | (1) |
|
Troubleshooting Keyboards and Pointing Devices |
|
|
550 | (2) |
|
|
550 | (1) |
|
|
551 | (1) |
|
Troubleshooting USB and FireWire Ports and Peripherals |
|
|
552 | (2) |
|
Exercise 12-5 Checking USB Hub Power Usage |
|
|
553 | (1) |
|
|
554 | (1) |
|
Preventive Maintenance Techniques |
|
|
554 | (4) |
|
Visual and Aural Inspection |
|
|
554 | (1) |
|
Managing Environmental Temperature |
|
|
555 | (1) |
|
Cleaning Computer Components |
|
|
555 | (3) |
|
|
558 | (4) |
|
|
558 | (4) |
|
|
562 | (9) |
|
|
565 | (6) |
|
13 Using and Supporting Printers |
|
|
571 | (64) |
|
|
572 | (9) |
|
Printer Types and Technologies |
|
|
572 | (7) |
|
Paper-Feeding Technologies |
|
|
579 | (1) |
|
|
580 | (1) |
|
Installing and Configuring Printers |
|
|
581 | (19) |
|
|
581 | (4) |
|
|
585 | (4) |
|
Installing a Multifunction Device |
|
|
589 | (1) |
|
|
589 | (5) |
|
|
594 | (1) |
|
|
595 | (1) |
|
|
595 | (1) |
|
|
596 | (3) |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
600 | (10) |
|
|
601 | (1) |
|
|
601 | (2) |
|
Exercise 13-1 Adding Paper to an Upright Friction-Feed Tray |
|
|
603 | (2) |
|
|
605 | (1) |
|
|
606 | (1) |
|
Maintenance Kits and Page Counts |
|
|
607 | (1) |
|
|
608 | (1) |
|
Ensuring a Suitable Environment |
|
|
609 | (1) |
|
|
610 | (13) |
|
Printer Troubleshooting Tools |
|
|
610 | (1) |
|
Enabling or Disabling Print Spooling |
|
|
610 | (1) |
|
Unable to Install a Printer |
|
|
611 | (1) |
|
Access Denied to an Installed Printer |
|
|
611 | (1) |
|
Non-Windows Clients Cannot Connect to a Shared Printer |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
613 | (1) |
|
No Connectivity to Printer |
|
|
614 | (1) |
|
Unable to Install Printer |
|
|
614 | (1) |
|
|
615 | (1) |
|
Exercise 13-2 Restarting the Print Spooler Service |
|
|
615 | (1) |
|
|
616 | (2) |
|
|
618 | (3) |
|
|
621 | (2) |
|
|
623 | (2) |
|
|
623 | (2) |
|
|
625 | (10) |
|
|
628 | (7) |
|
Part IV Laptops and Mobile Devices |
|
|
|
14 Configuring and Using Laptops |
|
|
635 | (52) |
|
Repairing, Upgrading, and Configuring Laptops |
|
|
636 | (23) |
|
|
637 | (1) |
|
|
638 | (1) |
|
Replacing Laptop Components |
|
|
639 | (8) |
|
Exercise 14-1 Installing SODIMM Memory |
|
|
647 | (3) |
|
Exercise 14-2 Replacing a Hard Drive |
|
|
650 | (2) |
|
Exercise 14-3 Replacing a Display Screen |
|
|
652 | (7) |
|
|
659 | (9) |
|
Power Management Standards |
|
|
660 | (1) |
|
Configuring Power Management in Windows |
|
|
661 | (2) |
|
Exercise 14-4 Exploring Power Options on a Laptop |
|
|
663 | (5) |
|
|
668 | (5) |
|
|
668 | (2) |
|
Port Replicators and Docking Stations ` |
|
|
670 | (1) |
|
Physical Security Devices |
|
|
670 | (1) |
|
Rotating and Removable Screens |
|
|
671 | (1) |
|
|
671 | (2) |
|
Troubleshooting Laptop Problems |
|
|
673 | (3) |
|
Touchpad and Mouse Troubleshooting |
|
|
673 | (1) |
|
Touch Screen Troubleshooting |
|
|
674 | (1) |
|
|
674 | (1) |
|
|
675 | (1) |
|
|
675 | (1) |
|
Battery and Power Troubleshooting |
|
|
675 | (1) |
|
|
676 | (3) |
|
|
676 | (3) |
|
|
679 | (8) |
|
|
682 | (5) |
|
15 Supporting Mobile Devices |
|
|
687 | (48) |
|
Overview of Mobile Devices |
|
|
689 | (8) |
|
|
690 | (3) |
|
How Smartphones Are Identified |
|
|
693 | (1) |
|
|
694 | (1) |
|
|
695 | (2) |
|
Configuring and Using Mobile Device Connections |
|
|
697 | (13) |
|
Connecting to Wireless Networks |
|
|
698 | (3) |
|
|
701 | (3) |
|
|
704 | (2) |
|
|
706 | (1) |
|
|
706 | (4) |
|
|
710 | (5) |
|
|
710 | (2) |
|
|
712 | (2) |
|
Recovering After a Device Is Lost or Stolen |
|
|
714 | (1) |
|
Troubleshooting Mobile Device Problems |
|
|
715 | (9) |
|
|
715 | (4) |
|
|
719 | (2) |
|
|
721 | (1) |
|
|
722 | (1) |
|
Troubleshooting with Safe Mode |
|
|
722 | (1) |
|
Closing, Uninstalling, and Reinstalling Mobile Applications |
|
|
722 | (1) |
|
Resetting a Mobile Device |
|
|
723 | (1) |
|
|
724 | (3) |
|
|
724 | (3) |
|
|
727 | (8) |
|
|
730 | (5) |
|
|
|
|
735 | (52) |
|
|
736 | (14) |
|
|
737 | (1) |
|
|
737 | (1) |
|
|
737 | (1) |
|
|
738 | (3) |
|
Metropolitan Area Network |
|
|
741 | (1) |
|
|
742 | (5) |
|
Exercise 16-1 Testing Broadband Speeds |
|
|
747 | (1) |
|
|
748 | (2) |
|
|
750 | (16) |
|
|
750 | (1) |
|
|
751 | (1) |
|
|
751 | (1) |
|
|
752 | (2) |
|
|
754 | (8) |
|
Exercise 16-2 Viewing the Physical and IP Addresses of a NIC |
|
|
762 | (1) |
|
|
763 | (3) |
|
|
766 | (10) |
|
|
766 | (1) |
|
|
766 | (5) |
|
Devices for Connecting to LANs and the Internet |
|
|
771 | (4) |
|
Exercise 16-3 Identifying Network Hardware |
|
|
775 | (1) |
|
|
775 | (1) |
|
|
776 | (3) |
|
|
777 | (2) |
|
|
779 | (8) |
|
|
783 | (4) |
|
17 Installing a Small Office/Home Office (SOHO) Network |
|
|
787 | (50) |
|
|
788 | (4) |
|
Crimper and Wire Stripper |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
790 | (1) |
|
|
790 | (1) |
|
|
790 | (1) |
|
|
791 | (1) |
|
Wireless Locator/Analyzer |
|
|
791 | (1) |
|
Installing and Configuring SOHO Networks |
|
|
792 | (27) |
|
Installing a Network Adapter |
|
|
793 | (1) |
|
Connecting a Network Adapter to a Switch or Router |
|
|
794 | (1) |
|
Configuring a Network Adapter |
|
|
794 | (2) |
|
|
796 | (7) |
|
Securing a Wireless Network |
|
|
803 | (6) |
|
Exercise 17-1 Configuring a WAP or Wireless Router |
|
|
809 | (5) |
|
|
814 | (1) |
|
Exercise 17-2 Configuring a Static IP Address |
|
|
815 | (2) |
|
Network and Sharing Center |
|
|
817 | (1) |
|
Establishing a Dial-Up Connection |
|
|
818 | (1) |
|
Configuring Other Common Connections |
|
|
819 | (7) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
821 | (1) |
|
|
821 | (1) |
|
Cable/DSL Modem Configuration |
|
|
821 | (1) |
|
Virtual Private Networking |
|
|
822 | (1) |
|
|
822 | (3) |
|
|
825 | (1) |
|
|
826 | (3) |
|
|
827 | (2) |
|
|
829 | (8) |
|
|
832 | (5) |
|
18 Internet, Cloud, and Remote Access |
|
|
837 | (42) |
|
|
838 | (11) |
|
How the Internet Is Structured |
|
|
838 | (1) |
|
Internet Service Providers |
|
|
839 | (1) |
|
Domain Names, IP Addresses, and DNS Servers |
|
|
840 | (1) |
|
Internet Services and Protocols |
|
|
841 | (3) |
|
|
844 | (3) |
|
Legacy and Embedded Systems |
|
|
847 | (1) |
|
|
847 | (2) |
|
Configuring Internet Settings in Windows |
|
|
849 | (11) |
|
|
849 | (2) |
|
|
851 | (1) |
|
|
852 | (2) |
|
|
854 | (1) |
|
|
855 | (1) |
|
|
856 | (2) |
|
|
858 | (1) |
|
Exercise 18-1 Configuring Internet Options |
|
|
859 | (1) |
|
|
860 | (4) |
|
Characteristics of a Cloud Environment |
|
|
861 | (1) |
|
|
862 | (1) |
|
|
862 | (1) |
|
Cloud Services and Functions |
|
|
863 | (1) |
|
Remote Access Technologies |
|
|
864 | (5) |
|
Establishing a Remote Desktop Connection in Windows |
|
|
865 | (1) |
|
Exercise 18-2 Allowing Remote Desktop Connections |
|
|
865 | (1) |
|
Exercise 18-3 Establishing a Remote Desktop Connection |
|
|
866 | (2) |
|
Using Third-Party Remote Desktop Tools |
|
|
868 | (1) |
|
Security Considerations for Remote Access |
|
|
868 | (1) |
|
Using Remote Assistance in Windows |
|
|
869 | (1) |
|
|
869 | (4) |
|
|
870 | (3) |
|
|
873 | (6) |
|
|
876 | (3) |
|
19 Troubleshooting Networks |
|
|
879 | (40) |
|
Troubleshooting Common Network Problems |
|
|
880 | (24) |
|
Command-Line Tools for Network Troubleshooting |
|
|
881 | (1) |
|
|
882 | (12) |
|
Exercise 19-1 Using TRACERT |
|
|
894 | (3) |
|
Resolving Insufficient Bandwidth |
|
|
897 | (2) |
|
Troubleshooting DNS Problems |
|
|
899 | (2) |
|
Exercise 19-2 Using NSLOOKUP to Troubleshoot DNS |
|
|
901 | (1) |
|
Troubleshooting Unavailable Resources |
|
|
902 | (2) |
|
Preventive Maintenance for Networks |
|
|
904 | (2) |
|
|
904 | (1) |
|
Securing and Protecting Network Cabling |
|
|
905 | (1) |
|
|
906 | (3) |
|
|
907 | (2) |
|
|
909 | (10) |
|
|
912 | (7) |
|
|
|
20 Physical Security and User Authentication |
|
|
919 | (46) |
|
Security Threats: An Overview |
|
|
920 | (1) |
|
Securing the Local Physical Environment |
|
|
921 | (6) |
|
|
922 | (1) |
|
Preventing Piggybacking and Tailgating |
|
|
922 | (1) |
|
|
923 | (1) |
|
Preventing Dumpster Diving |
|
|
923 | (1) |
|
|
923 | (1) |
|
Preventing Unauthorized Physical Access to Information |
|
|
924 | (1) |
|
Using BIOS/UEFI Passwords |
|
|
925 | (2) |
|
Locking a Computer with Windows |
|
|
927 | (1) |
|
Securely Disposing of Data Storage Hardware |
|
|
927 | (3) |
|
|
928 | (1) |
|
Physically Destroying a Storage Device |
|
|
928 | (2) |
|
Working with User Accounts |
|
|
930 | (26) |
|
|
930 | (4) |
|
Managing Local User and Group Accounts in Windows |
|
|
934 | (9) |
|
Best Practices to Secure a Workstation |
|
|
943 | (4) |
|
Adjusting User Account Control Settings |
|
|
947 | (2) |
|
Setting Local Security Policies |
|
|
949 | (1) |
|
Exercise 20-1 Using the Local Security Policy Editor |
|
|
950 | (1) |
|
Using Windows Credential Manager |
|
|
951 | (1) |
|
Managing Domain User Accounts |
|
|
952 | (4) |
|
|
956 | (2) |
|
|
957 | (1) |
|
|
958 | (7) |
|
|
962 | (3) |
|
21 Protecting and Managing Data |
|
|
965 | (44) |
|
Configuring Windows Clients for Sharing |
|
|
966 | (10) |
|
Understanding Windows Network Locations |
|
|
967 | (2) |
|
|
969 | (1) |
|
Exercise 21-1 Creating a HomeGroup |
|
|
970 | (3) |
|
|
973 | (1) |
|
|
974 | (2) |
|
Implementing File Sharing and Security |
|
|
976 | (16) |
|
|
977 | (2) |
|
Exercise 21-2 Viewing Folder Permissions in Windows |
|
|
979 | (1) |
|
Applying Share Permissions |
|
|
980 | (2) |
|
Exercise 21-3 Creating a Share and Modifying Share Permissions |
|
|
982 | (1) |
|
|
983 | (1) |
|
Connecting to a Shared Folder |
|
|
984 | (1) |
|
Applying NTFS File and Folder Encryption |
|
|
985 | (2) |
|
|
987 | (2) |
|
|
989 | (2) |
|
|
991 | (1) |
|
|
992 | (7) |
|
|
992 | (1) |
|
Network/Local Data Synchronization |
|
|
992 | (1) |
|
Disaster Prevention and Recovery |
|
|
993 | (1) |
|
|
993 | (2) |
|
|
995 | (1) |
|
Using Backup Tools in macOS |
|
|
996 | (1) |
|
Using Backup Tools in Linux |
|
|
997 | (1) |
|
Protecting Storage from Electrical Interruption |
|
|
997 | (2) |
|
|
999 | (2) |
|
|
999 | (2) |
|
|
1001 | (8) |
|
|
1004 | (5) |
|
22 Defending Against Malware and Social Engineering |
|
|
1009 | (44) |
|
Security and Privacy Threats |
|
|
1010 | (14) |
|
|
1011 | (1) |
|
Malicious Software Attacks |
|
|
1011 | (2) |
|
|
1013 | (3) |
|
Vulnerabilities and Exploits |
|
|
1016 | (1) |
|
|
1017 | (1) |
|
Exercise 22-1 Research Spam Statistics |
|
|
1018 | (1) |
|
Methods for Gaining Access and Obtaining Information |
|
|
1019 | (2) |
|
Exercise 22-2 What Is Your Phishing IQ? |
|
|
1021 | (3) |
|
Identifying the Symptoms of Malware Infection |
|
|
1024 | (5) |
|
Internet Connectivity and Browser Behavior |
|
|
1025 | (1) |
|
Operating System Problems |
|
|
1025 | (3) |
|
Unexpected E-mail Behavior |
|
|
1028 | (1) |
|
Implementing a Defense Against Malware |
|
|
1029 | (12) |
|
|
1029 | (1) |
|
|
1030 | (1) |
|
|
1031 | (1) |
|
|
1032 | (3) |
|
Exercise 22-3 Configuring Windows Defender Firewall |
|
|
1035 | (1) |
|
Exercise 22-4 Creating a Firewall Rule |
|
|
1036 | (1) |
|
Antivirus and Antimalware Software |
|
|
1037 | (1) |
|
Identifying Trusted Software Resources |
|
|
1037 | (1) |
|
Implementing Security Suites |
|
|
1038 | (1) |
|
|
1039 | (2) |
|
|
1041 | (2) |
|
|
1041 | (2) |
|
|
1043 | (10) |
|
|
1046 | (7) |
|
|
|
|
1053 | (10) |
|
|
1053 | (2) |
|
|
1055 | (1) |
|
|
1055 | (1) |
|
|
1055 | (1) |
|
|
1056 | (1) |
|
|
1056 | (1) |
|
|
1056 | (1) |
|
|
1056 | (2) |
|
Common Scripting Elements |
|
|
1058 | (1) |
|
|
1058 | (1) |
|
|
1059 | (1) |
|
|
1059 | (1) |
|
Active Directory User Logon Scripts |
|
|
1060 | (3) |
|
B About the Online Content |
|
|
1063 | (4) |
|
|
1063 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
1063 | (1) |
|
|
1064 | (1) |
|
Single User License Terms and Conditions |
|
|
1064 | (1) |
|
|
1065 | (1) |
|
|
1066 | (1) |
|
Performance-Based Questions |
|
|
1066 | (1) |
|
Video Training from the Authors |
|
|
1066 | (1) |
|
|
1066 | (1) |
|
|
1066 | (1) |
|
|
1066 | (1) |
Index |
|
1067 | |