AplusCore2 DemoCramnotes
AplusCore2 DemoCramnotes
Contents
SimulationExams.com
1.2 Features of various Microsoft operating systems
1.3 Microsoft command line tools.
1.4 Microsoft operating system features and tools
1.5 Important Windows Control Panel utilities
1.6 Configure Windows networking on a client/desktop
1.7 Common preventive maintenance procedures using appropriate OS tools.
2.1 Important features, and functionality of the Mac OS and Linux operating
systems
2.2 Set up and use client-side virtualization
2.3 Basic Cloud Concepts
2.4 Basic features of mobile operating systems
2.5 Configure basic mobile device network connectivity and email
3. Computer Security
4. Software Troubleshooting
5. Operational Procedures
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
6. Appendix
SimulationExams.com
A+ Ess Exam Sim A+ Prac Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
be marked as active partition.
1. Press shortcut key WIN+R to open RUN box, type “diskmgmt.msc”, or Right-click the
bottom-left corner (or Start button) on the desktop to open Quick Access Menu, and then
choose Disk Management.
2. Right-click on the partition you want to set active, choose Mark partition as active.
Note: Do not mark a partition as active if it doesn't contain the loader for an operating system.
Doing so will make your computer unbootable
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
If you have two hard disk drives on your computer, a sample of drive letters that could be
assigned are as shown below:
Note: In Windows, drives can be identified by their names (such as "Windows7 OS") and their
drive letters (such as "C:"). The important thing to remember is that Windows really only cares
about the drive letter. That has to be unique; you can't have two drives labeled E: on the same
computer. In Windows 7/8/8.1/10, it is possible to shrink the existing drive (say drive C:) and
create a new drive out of the space available by shrinking the existing drive.
A spanned volume is a formatted partition in which data is stored on more than one hard disk
drive or solid-state drive, yet appears as a single volume. Unlike RAID, spanned volumes have
no fault tolerance, so if any disk fails, the data on the whole volume could be lost.
Types of Installation
When you install a disk in a computer that is running Windows 10, you can choose to select one
of two partitioning schemes.
1. Master Boot Record(MBR): MBR based partitioning scheme contains the partition table for
the disk and a small amount of executable code called the master boot code. MBR is stored on
your hard drive but kept outside of Windows partitions and volumes. Crucially, the code in the
MBR is run as your computer starts up (before Windows) which makes it an ideal place for a
virus or rootkit to hide.
2. Globally unique identifier (GUID): GPT - based partitioning scheme is a newer partitioning
scheme where each partition contains a Global Unique Identifier (GUID)
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Telnet Server is a network service. When you install Windows 7/8/8.1/10, the files that make up
the Telnet Server service are copied to your computer, however, the telnet service is disabled at
first. We can use either “services.msc” snap-in or "net start telnet" command to start the telnet
service at the command prompt. To stop the service, use “net stop telnet”.
when you suspect there may be a problem with a Windows 7/8/10 system file. For example, you
SimulationExams.com
get a dialog box informing you of a problem with a .dll file, or your program will just not load.
It is therefore worth checking to see if there are any corrupt system files using scannow sfc.
To do this, go to the Run box on the Start Menu and type in: “sfc /scannow”
This command will immediately initiate the Windows File Protection service to scan all
protected files and make sure of their correctness, replacing any files that it finds with a
problem.
1. Floppy drives
2. Tape drives
3. Printers
4. Mouse
• It is recommended that you clean the LCD screen with clean water, using a soft cotton
cloth. Do not spray water directly on the screen. First wet the cloth (no dripping of
water), and wipe the LCD screen gently.
• The use of compressed air is most appropriate. Use of vacuum cleaner may tend to
create ESD. A nylon brush also creates electrostatic charges. Soap water is not
recommended to clean PCAs.
PXE: The process describes how to set up a third-party Preboot Execution Environment (PXE)
server. The process includes copying Windows PE 2.0 source files to PXE server and then
configuring your PXE server boot configuration to use Windows PE. The best ways to find
whether a new hardware is supported by your Windows OS is to check the manufacturer's
documentation first, and then the Windows Compatible Products List.
a. eSATA
b. USB
c. Expresscard/54
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Filesystem Types and Formatting: Microsoft Internet Explorer and Windows Explorer can be
SimulationExams.com
used for assigning Share and NTFS permissions on a Windows 7/8/8.1/10 computer. On
readable/writable disks, Microsoft Windows 7/8/8.1/10 supports the NTFS file system and two
file allocation table (FAT) file systems: FAT16, and FAT32.
Majority of USB flash drives you buy are going to come in one of the two formats: FAT32 or
NTFS. The first format, FAT32, is fully compatible with Mac OS X.
FAT32: It works with all versions of Windows, Mac, Linux, game consoles, and practically
anything with a USB port. FAT32 allows 4 GB maximum file size, 8 TB maximum partition
size.
ExFAT: exFAT was introduced in 2006, and was added to older versions of Windows with
updates to Windows XP and Windows Vista.
If you are formatting the device using any modern Windows OS, you will have options to
format it using FAT32, exFAT, or NTFS.
Note that FAT (FAT16) has become obsolete due to file size and partition size limitations.
Back
Features of Windows 10
32 bit vs. 64 bit: Windows 10 64-bit supports up to 2 TB of RAM, while Windows 10 32-bit
can utilize up to 3.2 GB. The memory address space for 64-bit Windows is much larger, which
means, you need twice as much memory than 32-bit Windows to accomplish some of the same
1. Only 64 bit versions of windows 10 can handle over 4GB of RAM
The following table specifies the limits on physical memory for Windows 10.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
Windows 10 Home 4 GB 128 GB
As may be seen from the table above, at the minimum, you can install Windows 10 Home that
supports up to 128 GB of RAM.
3. In Windows 10 we can create multiple profiles and it can be applied to the private and public
network. Each connection will use the assigned profile and it will use the rules that are
configured in the profiles.
4. You can use Region and Language to support additional languages on your Windows 10
computer. With the support of additional languages, you will be able to edit documents written
in those languages. You can also set locale specific to any region using this Option. To use
desired Region and Language options, use the steps given below:
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
Notes
1. You must be logged in with an account that has administrative privileges in order to
change the system locale.
2. The appropriate language packs should be installed on the operating system.
Disk partition in windows 10: To create a partition or volume (the two terms are often used
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
To initialize a new disk using Disk Management use the steps given below:
SimulationExams.com
2. To do so, in the search box on the taskbar, type Disk Management, select and hold (or
right-click) Disk Management, then select Run as administrator > Yes. If you can't
open it as an administrator, type Computer Management instead, and then go to
Storage > Disk Management.
3. In Disk Management, right-click the disk you want to initialize, and then click Initialize
Disk (shown here). If the disk is listed as Offline, first right-click it and select Online.
The screenshot of initializing the disk is shown below.
USB connectivity: To achieve proper USB connectivity six basic system elements must be
present and working correctly.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
• Check the screen for instructions to boot to setup. Depending on the motherboard, the
message might be "BIOS Setup: F8," "Press F8 to Enter BIOS." The keyboard command
to enter the BIOS depends on the motherboard.
• Use the arrow key to select "Advanced”, "Onboard Devices" or "Integrated Peripherals"
from the menu. Press "Enter."
• Select "USB Controller." Press "+" or "-" to change the setting to "Enabled."
• Press "F10" to save and exit the BIOS.
Automatic restart: The automatic restart option in Windows 10 is enabled by default. Errors
might occur but not display with Automatic restart enabled. Disable this option to allow the
computer to display error messages instead of restarting.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
1. In Windows 10, updates are mandatory. However, a user may opt to manually update any
Windows Updates by selecting appropriate options in the Updates applet.
2. Windows 10 periodically checks for updates. If you want to check manually, select the Start
button , then select Settings > Update and security > Windows Update > Check for updates. If
Windows Update says that your PC is up to date, then you have all the updates that are currently
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
3. All updates in Windows 10 are automatically downloaded and installed. You cannot
selectively update here or disable Windows 10 update. However, there is a way to prevent
Windows 10 OS to notify and ask for downloading the updates. If the data connection is marked
as "metered" then Windows 10 will not download and install the updates automatically. It will
only notify when the updates are available.
The possible upgrade scenarios from one edition of windows 10 to another edition of
windows 10 are given below
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
Boot options in windows 10: Pressing F8 or the SHIFT + F8 keys on your keyboard to enter
Safe Mode, no longer work on windows 10. These methods stopped working because the
Windows 10 start procedure became faster than ever before. However, that does not mean that
Windows 10 has no Safe Mode. It is just that to get to it you have to follow other procedures.
Here are all the ways you can start Windows 10 in Safe Mode:
1. Standard Safe Mode - press the 4 or the F4 key on your keyboard to start it
2. Safe Mode with Networking- press 5 or F5
3. Safe Mode with Command Prompt- press either 6 or F6
Log into Windows 10 Safe Mode with a user account that has administrator permissions, and
perform the changes you want.
The Advanced Boot Options menu lets you start Windows in advanced troubleshooting
modes. The options available are
1. Enable debugging
2. Enable boot logging
3. Enable low-resolution video
4. Enable Safe Mode
5. Enable Safe Mode with Networking
6. Enable Safe Mode with Command Prompt
7. Disable driver signature enforcement
8. Disable early launch anti-malware protection
9. Disable automatic restart after failure
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
System Restore in windows 10: If your Microsoft Windows 10 based computer does not start
correctly or if it does not start at all, you can use the Windows Recovery Options to help you
recover your system software. Backup useful files and documents when you are trying to
perform System Restore on your computer.
1. System Restore Tool: System Restore available in the Recovery option in Control Panel in
Windows 10. And you won’t be able to use it if you haven’t turned it on. Here is the path where
you can find System Restore tool in Windows 10:
1. Go to Control Panel and click on System and Security.
2. Click System > System protection > Select the drive that you want to create a restore
point for and click Create.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Startup Repair is one of the recovery tools in Advanced Startup options. This set of tools is
located on your PC's hard disk (recovery partition), Windows installation media, and a
recovery drive.
Windows 10, similar to previous versions, includes BitLocker Drive Encryption, a feature that
allows you to use encryption on your PC's hard drive and on removable drives to prevent prying
eyes from snooping into your sensitive data.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
case, you'll need to check your PC manufacturer's support website to get the latest
firmware update for your BIOS before trying to set up BitLocker.
• Your PC's hard drive must contain two partitions: a system partition, which contains the
necessary files to start Windows, and the partition with the operating system. If your
computer doesn't meet the requirements, BitLocker will create them for you.
Additionally, the hard drive partitions must be formatted with the NTFS file system.
• The process to encrypt an entire hard drive isn't difficult, but it's time-consuming.
Depending the amount of data and size of the drive, it can take a very long time.
• Make sure to keep your computer connected to an uninterrupted power supply
throughout the entire process.
• One of the standout new features found in Windows 10 is the addition of Cortana. For
those unfamiliar, Cortana is a voice-activated personal assistant. You can use it to get
weather forecasts, set reminders,send email, find files, search the Internet and so on.
• For privacy issues, Windows 10 Education does not include Cortana, since this edition is
used for academic organizations. Windows 10 Home, Pro, and Enterprise all contain
Cortana.
• With the launch of Windows 10 comes Edge , Microsoft's new built-in browser that's
meant to replace Internet Explorer. Microsoft Edge is the default browser for all
Windows 10 devices. It’s built to be highly compatible with the modern web. For some
enterprise web apps and a small set of sites that were built to work with older
technologies like ActiveX, you can use Enterprise Mode to automatically send users to
Internet Explorer 11.
• Deployment Image & Servicing Management or commonly you know as DISM is the
tool which settles down component store falsification. However, this utility is also
capable of rectifying and handling Windows image. In addition, it can also manage
Windows Recovery Environment, Windows Setup and Windows PE.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
1.3 Microsoft command line tools
2.1 Important features, and functionality of the Mac OS and Linux operating
systems
You can access the update in Mac OS X computer in the following way
System Preferences controls system-wide settings ("global" settings), and is available from the
Apple menu at the upper-left corner of the screen. System Preferences lets you adjust things like
your screen resolution, keyboard control, mouse control, sound, printer settings, sharing
settings, accounts, and more. The figure below shows the applets that are available in System
Preferences window.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
1. You can manage Startup Applications from System preferences > Users and Groups
pane in MAC OS X
2. You can use Task Manager in Windows 7 for managing Startup Applications
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
Removal and restoration of an app from a MAC OS X computer
Install apps
• To install apps from a disc, insert the disc into your computer's optical drive (or an
optical drive connected to your computer).
• To install apps downloaded from the Internet, double-click the disk image or package
file (looks like an open box). If the provided installer doesn't open automatically, open it,
then follow the onscreen instructions.
Update apps
To manually check for app updates, choose Apple menu > App Store, then click Updates.
Uninstall apps
• You can uninstall apps you got from the Mac App Store, from other websites, or from
discs. You can't uninstall apps that are part of OS X, such as Safari and Mail.
• Apps downloaded from the Mac App Store: Click the Launchpad icon in the Dock, hold
down an app's icon until all the icons begin to jiggle, then click an app's delete button . If
you later want the app, you can reinstall it from the Mac App Store.
• Apps that have an uninstaller: In the Finder sidebar, click Applications. If an app is
inside a folder, it might have an Uninstaller. Open the app's folder. If you see Uninstall
[App] or [App] Uninstaller, double-click it and follow the onscreen instructions.
• Apps that don't have an uninstaller: In the Finder sidebar, click Applications. Drag the
app from the Applications folder to the Trash (located at the end of the Dock), then
choose Finder > Empty Trash.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
• The Dock is located at the bottom of your screen by default. It's a convenient place to
keep items you use frequently. You can add or remove apps and documents, make it
larger or smaller, move it to the left or right side of your screen, or even set it to hide
when you're not using it.
SimulationExams.com
• To add an item to the Dock, just drag the item and drop it where you want it. Place apps
to the left of the line in the Dock, and documents to the right.
• To remove an item, just drag it out of the Dock. Removing an item from the Dock
doesn't remove it from your Mac.
The command line option checks for update in Ubuntu Linux for all the packages
currently installed is
Sudo: The one command to rule them all. It stands for super user do Pronounced like sue doug.
As a Linux system administrator or power user, it's one of the most important commands in
your arsenal.
sudo apt-get: Update is used to install the newest versions of all packages currently installed on
the system
sudo reboot: It is used to reboot the Ubuntu Linux operating system.
Sudo l: It is simply lists the current directory files and folders.
Tools commonly used for downloading and installing any updates to device drivers on a
Linux Ubuntu computer
Mac OS X will notify about available system updates including any device driver updates. You
can visit the app store and update the software.
Ubuntu Linux also notifies about available software updates. You can visit Software Updater to
download and install available updates, including device driver software updates.
Device Manager is commonly used on Windows 7 to update any system components such as
driver updates. It also allows you install a driver, or disable/enable a device.
MacBookPro comes natively with MiniDisplayPort. You need to buy MiniDisplayPort to DVI
adapter separately. You may also need to update the software drivers, if necessary.
The Mini DisplayPort (MiniDP or mDP) is a miniaturized version of the DisplayPort audio-
visual digital interface. It was announced by Apple in October 2008. As of 2013, all new Apple
Macintosh computers had the port.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
• HFS: HFS (Hierarchical File System) was the primary filesystem format used on the
Macintosh Plus and later models, until Mac OS 8.1, when HFS was replaced by HFS
Plus.
SimulationExams.com
• HFS+: HFS+ is the preferred file system on Mac OS X. HFS+ is architecturally similar
to HFS, with several important improvements such as:
1. 32 bits used for allocation blocks (instead of 16). HFS divides the disk space on a
partition into equal-sized allocation-blocks. Since 16 bits are used to refer to an
allocation-block, there can be at most 216 allocation blocks on an HFS file system.
Thus, using 32 bits for identifying allocation blocks results in much less wasted space
(and more files).
2. Long file names up to 255 characters
3. Unicode based file name encoding
4. File/Directory attributes can be extended in future (as opposed to being fixed size)
5. In addition to a System Folder ID (for starting Apple operating systems), a dedicated
startup file that can easily be found (its location and size are stored in the volume header
in a fixed location) during startup, is also supported so that non-Apple systems can boot
from a HFS+ filesystem
6. Largest file size is 263 bytes
Ubuntu's default file system is ext4, since 9.10. Ext4 is an evolution of ext3, which was the
default file system before. Ext4 is often noticeably faster than Ext3 even for ordinary desktop
use.
Given below is a very brief comparison of the most common file systems in use with the
Linux world.
Max
Max File
File System Partition Notes
Size
Size
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
XFS 8 EiB 8 EiB Created by SGI.
A Linux system, just like UNIX, makes no difference between a file and a directory, since a
directory is just a file containing names of other files. Programs, services, texts, images, and so
forth, are all files. Input and output devices, and generally all devices, are considered to be files,
according to the system.
In Linux environment, the following files have special meaning:
Iwconfig/ifconfig: A Linux system, just like UNIX, makes no difference between a file and a
directory, since a directory is just a file containing names of other files. Programs, services,
texts, images, and so forth, are all files. Input and output devices, and generally all devices, are
considered to be files, according to the system.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Some important Linux commands are given below. Try them on the Linux machine to get
acquainted.
clear: Removes all previous commands and output from consoles and terminal windows. (DOS:
cls)
SimulationExams.com
cp: Copies files and directories.
df: Reports the amount of space used and available on currently mounted filesystems.
killall: Terminates all processes associated with programs whose names are provided to it as
arguments.
ps: (short for process status) Lists the currently running processes and their process
identification numbers (PIDs).
pwd: (short for present working directory) Displays the full path to the current directory.
reboot: Restarts a computer without having to turn the power off and back on.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
spell: checks spelling.
su: (short for substitute user) changes a login session's owner without the owner having to
first log out of that session.
uptime: shows the current time, how long the system has been running since it was booted up,
how many user sessions are currently open and the load averages.
w: shows who is logged into the system and what they are doing.
wc: by default counts the number of lines, words and characters that are contained in text.
whatis: provides very brief descriptions of command line programs and other topics related to
Unix-like operating systems.
whoami: returns the user name of the owner of the current login session.
Back
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
3. Security
2. MBR Virus: A Master boot record (MBR) virus infect the first physical sector of all
affected disks
3. File viruses either replace or attach themselves to executable files, and most commonly
found virus
5. Memory viruses are viruses that execute and stay resident in memory. Trojan Horse is an
example of memory virus.
6. Trojan Horse: A trojon is not a virus. The principal of variation between a Trojan horse,
or Trojan, and a virus is that Trojans don't spread themselves. Trojan horses disguise
themselves as valuable and useful software available for download on the internet.
Trojan may work as a client software on your computer communicating with the Trojan
server over the Internet.
8. Script file virus: Note that script files may include viruses hidden inside. Therefore, it is
not wise to open any script file attachments such as file.scr or file.bat etc.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
10. Browser Hijacker: A browser hijacker is a form of malware, spyware or virus that
replaces the existing internet browser home page, error page, or search page with its
own. These are generally used to force hits to a particular website.
SimulationExams.com
1. Shoulder surfing: shoulder surfing refers to using direct observation techniques, such as
looking over someone's shoulder, to get information. It is commonly used to obtain passwords,
PINs, security codes, and similar data. Shoulder surfing is particularly effective in crowded
places because it is relatively easy to observe someone as they fill out a form, enter their PIN at
an automated teller machine or a POS terminal, or enter a password at a cybercafe, public and
university libraries, or airport kiosks. Shoulder surfing can also be done at a distance using
binoculars or other vision-enhancing devices. Inexpensive, miniature closed-circuit television
cameras can be concealed in ceilings, walls or fixtures to observe data entry. To prevent
shoulder surfing, it is advised to shield paperwork or the keypad from view by using one's body
or cupping one's hand.
2. Phishing phone calls: Cybercriminals might call you on the phone and offer to help solve
your computer problems or sell you a software license. Neither Microsoft nor our partners make
unsolicited phone calls (also known as cold calls) to charge you for computer security or
software fixes.
Zero day attack: A Zero day attack is an exploit of an operating system or software
vulnerability that is unknown to and unpatched by the author of the product. The name comes
from the fact that there is no warning of the attack and this is compounded by the fact that the
attack will be successful until it is discovered and patched by the vendor. It does not take long
for a zero day attack to be effective considering the time it takes to program a patch and get it
distributed to the public. These attacks can take place between the time they are discovered and
when the patch is issued.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Brute forcing: Brute forcing (Brute Force Cracking) can be best described as cracking a
username, password, or even a Wi-Fi encryption protocol or decryption key by using trial, error
SimulationExams.com
and result evaluation using a pre-defined set of values for the attack. Use long and complex
passwords to defend against this attack.
Dictionary attacks: Dictionary attacks are a form of brute force attack that uses words found in
the dictionary to attempt to discover passwords and decryption keys. Here you need to avoid
words found in the dictionary for your security. It is helpful to use a mix of upper and lower
case letters along with numbers and special characters (!@#$%).
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Back
4. Software troubleshooting
SimulationExams.com
4.1 Troubleshoot PC operating system problems with appropriate tools
• Windows RE (Short for Recovery) is new for Windows 7/8/10 and completely replaces
the recovery console in Windows XP. You should be able to perform most tasks of
recovery console from Windows RE.
Windows RE (Recovery Environment) is stored as winre. wim file on device hard drive
or SSD in Windows 7, 8/8.1 and 10. Windows 7 normally keeps it on the same
partition/volume with Windows, while Windows 8 and later usually keep it on the
hidden System Reserved partition that also contains boot files and Boot Configuration
Data (BCD).
• Microsoft recommends that you regularly create Automated System Recovery (ASR)
sets as part of an overall plan for system recovery so that you are prepared if the system
fails. ASR should be a last resort for system recovery. Use ASR only after you have
exhausted other options. For example, you should first try Safe Mode Boot and Last
Known Good.
• A hard disk should never be low level formatted at the customer premises. It is highly
recommended that it is done at the manufacturer's or at any authorized center.
• To get into the Windows 7 Safe Mode, as the computer is booting press and hold your
"F8 Key" which should bring up the "Windows Advanced Options Menu". Use the
arrow keys to move to "Safe Mode" and press Enter key.
• There are two main ways to boot your computer in Windows 10 Safe Mode. If your
computer loads the sign-in screen, you can boot Windows 10 in Safe Mode from startup.
If you only get a blank screen when you open up your computer, you can try the
instructions to booting to Safe Mode from a blank screen.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Since Windows 7/8/10, Microsoft added a new security feature called User Account
SimulationExams.com
•
Control (UAC). It tries to prevent malicious apps from doing potentially harmful things
on your PC. Before the administrator-level (elevated) action is allowed, UAC asks
permission from the user to go ahead with it, or cancel the request.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
1. By default, User Account Control will notify you only when apps try to make changes to your
computer. And this setting is recommended if you use familiar apps and visit familiar websites,
referring to the picture above.
2. If you move the scale to the top to select Always notify, you will be notified when apps try to
install software or make changes to your PC and when you make changes to Windows settings.
BTW, the setting is recommended if you routinely install new software and visit unfamiliar
websites.
3. You can move the scale to choose the third option to ask User Account Control not to dim
your desktop when notifying you about apps' up-coming changes to your computer if it takes a
long time to dim the desktop.
4. Supposing that you don't want to be notified when apps try to install software and make
changes to your PC and when you make changes to Windows settings, move the scale to the
bottom to choose Never notify.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Always notify: This is the most secure option. It notifies you anytime a program tries to
make changes to your computer or to Windows settings. When you are notified of a
pending change, your desktop is dimmed (to prevent other programs from running until
a decision is made), and you must either approve or deny the change in the UAC dialog
box.
SimulationExams.com
Notify me only when programs try to make changes to my computer: This is the
default setting Windows notifies you anytime a program tries to make changes to your
computer or if a program outside of Windows attempts to make changes to a Windows
setting.
Notify me only when programs try to make changes to my computer (do not dim
my desktop): Same as the previous setting, except the desktop is not dimmed, which
may allow some malicious programs to alter the appearance of the dialog box.
Never notify: This is the least secure setting. If you’re logged on as a standard user,
changes that require administrator permissions will be denied. If you’re logged in as an
administrator, those changes will be automatically permitted, potentially exposing your
computer, network, and personal information to security risks.
Attempt to install legacy (older) applications in compatibility mode: Select the older
OS that the application was originally written for. It is less likely that updates or the
latest service pack(SP) will help in this situation. Security updates probably won't have
an effect on this scenario either.
The problems such as video card, network card, and modem card can be resolved by
booting to Safe Mode. While in Safe Mode, troubleshoot the problem. In Safe Mode,
you can uninstall the driver(s) that is causing problem with normal boot process.
If your PC is slow, check for excessive paging. The most likely cause for excessive
paging is due to insufficient Memory. Increase the physical Memory on your computer.
Traditionally, workstations can have multiple operating systems installed on them but
run only one at a time. By running virtualization software, the same workstation can be
running Window 7 along with Windows Server 2008 and Red Hat Enterprise Linux (or
almost any other operating system) at the same time, allowing a developer to test code in
various environments as well as cut and paste between them within a virtual machine
(VM).
If you are unable to remove a suspect file, boot in Safe Mode. In Safe Mode, only
required services are loaded. It would typically be possible to remove the file in Safe
Mode.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
First step in resolving the problem is to change the account password. This would
SimulationExams.com
eliminate that some one hijacking your email account. In the second case, the attacker
doesn't have access to your email account, but using your email ID as “From” address to
send spam. The IP address, host name etc. would be different.
There is actually, no simple solution to this problem One feature that may be useful is
DKIM. DKIM short for Domain Keys Identified Mail, is an email authentication method
designed to detect email spoofing. It is a way to sign and verify email messages at the
message transfer agent (MTA) level using public and private keys. The public keys are
published in DNS TXT records. DKIM authenticates the source and its contents.
Email spam (Receiving email): Unsolicited mail is a big problem these days and there
is no single solution to this problem. Sender Policy Framework (SPF) is an open
standard specifying a technical method to prevent sender address forgery. SPF uses a
DNS TXT record in the DNS zone file to limit the number of servers that are allowed to
send email on behalf of a domain name. Basically, this tells the receivers, “messages for
my domain should only come from these servers.” Messages that are coming from
servers other than those specified in the SPF record will be viewed as spam and ignored.
Below is an example of an SPF record for an example domain:
IsoPropyl Alcohol (IPA) is recommended for cleaning PCAs such as motherboards. Mild
detergent can be used for cleaning the outside cabinet or the keyboard.
When attending to the computer maintenance or repair (other than the monitor), ensure
that you work in a static free environment. Always wear wrist strap. You should not
wear clothes/shoes that produce static charges. You should not use an Electrostatic
Discharge (ESD) wrist strap when working on an open Cathode Ray Tube (CRT)
display. An ESD wrist strap grounds your body to protect components from an ESD
shock. However, a CRT display is highly charged, so you do not want to be grounded
when you work inside one. In fact, only specially trained personnel should ever open a
CRT display.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Boot Options: The Advanced Boot Options menu lets you start Windows in advanced
troubleshooting modes. The options available are
SimulationExams.com
2. Safe mode
3. Safe mode with networking
4. Safe mode with command prompt
5. Enable boot logging
6. Enable low resolution video (640 x 480)
7. Last Known Good Configuration (advanced)
8. Directory services restore mode
9. Debugging mode
10. Disable automatic restart on system failure
11. Disable Driver Signature Enforcement
12. Start Windows normally
1. Insert the Windows 7 installation disc or USB flash drive, or a system repair disc, and
then shut down your computer.
2. Restart your computer using the computer's power button.
Automated System Recovery(ASR): ASR is a part of an overall plan for system recovery so
that you are prepared if the system fails. ASR should be a last resort for system recovery. Use
ASR only after you have exhausted other options. It is recommended that you use ASR only if
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
MSCONFIG: Short for Microsoft System Configuration Utility is designed to help you
troubleshoot problems with your computer, MSCONFIG can also be used to ensure that your
computer boots faster. Every time you boot your computer a lot of "hidden" programs load in
the background. Some of these hidden programs are essential, but most aren't. Turning off some
of these hidden programs (or services) can significantly increase your computer's performance
and reliability.
For example, you want to disable DLP program from your computer from startup. To do so, you
access MSconfig (System Configuration utility), and then the Services and Startup tabs in order
to disable the two components of DLP 2.0 (DLP short for Data Loss Prevention).
1. The Startup tab will allow you to disable the actual application stored in Program Files,
stopping the application from starting up when the user logs in.
2. The Services tab will allow you to disable the underlying service so that fewer resources
are used, and there is less chance of system issues.
3. The General tab gives you several different startup selections.
4. The Boot tab allows you to modify how the system boots.
5. The Tools tab enables you to launch various OS utilities directly from Msconfig.
Event Logs: Event Log Explorer helps you to quickly browse, find and report on problems,
security warnings and all other events that are generated within Windows.
2. Security:These events are called audits and are described as successful or failed
depending on the event, such as whether a user trying to log on to Windows was
successful.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
4. System: System events are logged by Windows and Windows system services, and are
classified as error, warning, or information.
5. Forwarded Events: These events are forwarded to this log by other computers.
SimulationExams.com
Some of the troubleshooting tools
1. Log files: A log file (or simply log) is a file that records either the events which happen
while an operating system or other software runs. The act of keeping a logfile is called
logging. When a failure occurs in Windows Setup, review the entries in the Setuperr.log
file, then the Setupact.log file, and then other log files as appropriate.
3. Setupact.log: It contains the events that occurred during the installation. There are
several instances of the Setupact.log file, depending on what point in the installation
process the failure occurs.
5. Setuplog.txt: It records events that occurred during the text portion installation of
Windows XP. Windows 7 does not have a text portion during installation.
Process Kill: If you prefer to kill processes using the Command Prompt, you can do it. You
have to run the Command Prompt as Administrator. To do this just right click command prompt
from "All Programs > Accessories > Command Prompt" then select "Run as Administrator" on
the pop-up menu.
1. Type "tasklist" and press enter. It will show you a list of all the running processes.
2. Now you can End any particular process by executing the "Task kill" command.
For Example: To kill Chrome just type “Task kill /IM chrome.exe /F”
Where:
/IM - Kill by Image Name
/F - Kill the process forcefully.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
2. Windows 10's Recovery Environment enables users to perform a variety of system and
SimulationExams.com
data recovery tasks on a system that won't boot normally, including:
3. Advanced Boot Options is the menu that can be accessed by holding down the Shift key
on your keyboard and restart the PC. Windows will automatically start in advanced boot
options after a short delay.
It is very important that you verify that the backup is working properly. It may so happen that
you have several backup tapes, but none of them is good.
SFC: Sfc /scannow will inspect all of the important Windows files on your computer, including
Windows DLL files. If System File Checker finds an issue with any of these protected files, it
will replace it. You must be logged in as a user with administrator rights in order to run the
sfc /scannow command.
Driver Verifier: Driver Verifier monitors Windows kernel-mode drivers and graphics drivers
to detect illegal function calls or actions that might corrupt the system. Driver Verifier can
subject Windows drivers to a variety of stresses and tests to find improper behavior. You can
configure which tests to run, which allows you to put a driver through heavy stress loads or
through more streamlined testing. You can also run Driver Verifier on multiple drivers
simultaneously, or on one driver at a time. You can use this tool to troubleshoot driver issues.
It is available in all versions of Windows starting with Windows 2000. Each version introduces
new features and checks for finding bugs in Windows drivers. This section summarizes the
changes and provides links to related documentation.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
You can start the tool by going to Run > verifier.exe
1. You can start verification of any driver without rebooting, even if Driver Verifier is not
already running.
2. You can start the verification of a driver that is already loaded.
3. You can activate or deactivate most Driver Verifier options without rebooting.
• Traditionally, antivirus software relies upon signatures to identify malware. This can be
very effective, but cannot defend against malware unless samples have already been
obtained, signatures generated and updates distributed to users. Because of this,
signature-based approaches are not effective against zero-day viruses.
• A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a
previously unknown vulnerability in a computer application, meaning that the attack
occurs on "day zero" of awareness of the vulnerability. This means that the developers
have had zero days to address and patch the vulnerability.
• It is possible that sensitive information is relayed to the hacker unless the infected
system is disconnected from the network. It may also infect other systems by remote
triggering.
• System Restore automatically track changes to your computer and creates restore points
before major changes are to occur. To create a restore point, System Restore takes a full
snapshot of the registry and some dynamic system files. For example, restore points are
created before new device drivers, automatic updates, unsigned drivers, and some
applications are installed. To create a System Restore Point in Windows 10, use the
sequence, Start | All Apps|Windows Accessories | System Tools, and then click System
Restore. Alternatively, you may just type "restore" in the search box, and click on the
"System Restore" option that appears above.
Back
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
5. Operational Procedure
SimulationExams.com
5.1 Given a scenario use appropriate safety procedures
• If an older program doesn't run correctly, use the Program Compatibility Wizard to
simulate the behavior of earlier versions of Windows.
• Installing peripheral devices such as printers at customer premises: Expect that your
customers are not very familiar with the usage of the device. Show the customer how to
use the device. For example, if you had installed a printer, show the customer how to use
the printer and also print a test page. Relevant manuals (hard copy or electronic version)
along with drivers need to be provided to the customer.
• Slow system response or start up problems: Possible reasons for slow running of a
computer may include insufficient memory, viruses and Trojan horses, too many TSRs
(Terminate and Stay Resident) running at the same time, etc. Ensure that your computer
has sufficient memory, hard disk space, and anti-virus software installed (particularly if
connected to the Internet).
• Placing the paging file on different physical disks is optimal. This will improve faster
access to the Paging file, and also distribute the load.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
SimulationExams.com
• Electrostatic discharge (ESD) can damage the component at as little as 110 volts. CMOS
chips are the most susceptible to ESD. Static electricity builds up more in cold and dry
places. Use humidifiers to keep room humidity at about 50% to help prevent static build
up.
• MSDS stands for Material Safety Data Sheet. It is US state department document that
contain information on any substance that is hazardous, and proper use/disposal.
• When working on computers, use special ESD wrist strap. Do not directly ground
yourself with a piece of wire. An ESD wrist strap has built-in resistor to prevent electric
shock. Use specially designed grounded ESD mats. Do not wear synthetic clothing.
Place all electronic components into anti static bags. Anti static bags can be reused.
Keep your workplace clean.
• Follow anti-static precautions before touching any electronic components inside a PC.
• As the humidity decreases, static build up will increase and vice versa. A level of 50% is
considered safe. Below 50% humidity, static build up will be more.
• The MSDS contains wealth of information including Product and Company information,
First aid measures, Handling and storage, Physical and chemical properties, etc.
• Laptop batteries (and most other batteries) consist of hazardous material. You need to
dispose them according to the hazardous material disposal procedures. Enquire local
authorities about disposal procedure.
• While repairing failed boot problem some folder containing user data were lost during
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Antistatic wrist strap: A technician can prevent ESD by using a variety of methods. The most
common tactic is to use an antistatic wrist strap. One end encircles the technician’s wrist. At the
SimulationExams.com
other end, an alligator clip attaches to the computer. The clip attaches to a grounding post or a
metal part such as the power supply.
Antistatic bag: Antistatic bags are good for storing spare adapters and motherboards when the
parts are not in use. However, antistatic bags lose their effectiveness after a few years. Antistatic
mats are available to place underneath a computer being repaired; such a mat may have a snap
for connecting the antistatic wrist strap. Antistatic heel straps are also available.
Self-grounding: Electrical outlets are designed to protect you from electrical shock. Modern
building codes require all outlets to be either self-grounded or ground-fault circuit interrupters.
Personal safety:
Disconnect power before repairing PC: Always be absolutely sure that that your unit is
completely disconnected from the power source before you begin any internal service. It is also
good to discharge any energy stored in the components. After unplugging the unit hold the
power button down for a few seconds. This will cause the PC to initiate the boot process.
Without a power source, the unit will not boot but will dump any energy stored in the
capacitors. Performing this simple procedure will reduce the possibility of any electrical shorts
or harmful accidental discharge.
Remove jewelry: Remove your jewelry before any electronic service. Doing this will eliminate
the possibility of damage caused by shorts and accidental discharges. You will be safer and so
will the unit you are working on. If you have an ID badge around your neck or even a necktie,
be sure to tuck it inside your clothing while you are servicing. You don’t want to catch on any
mechanical components like fans or optical drives.
Lifting techniques: When lifting take a second or two to consider the weight of the object its
location (floor, desk or shelf). Now think about the best practices for lifting. For example, keep
your back straight and use your legs to lift. Use leverage instead of muscle. A little forethought
can spare you weeks of pain.
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
Electrical fire safety: In the event of an electrical fire, you should make every effort to remove
the power. Many fires are a result of someone bypassing or ignoring simple electrical safety
SimulationExams.com
procedures. For example, don’t overload the outlets. Use extension cords as a temporary
solution only and never plug one extension cord into another. Examine the plug and cord of a
device for signs of wear and replace before using. Never run a cable of any type under a rug or
mat. Fire safety codes require fire extinguishers of the types indicated in specific locations.
Electrical fires can be either of two classes depending on their state. When energized the fire is
Class C, then once the power is removed it becomes the class of the burning material i.e. plastic
or Class B. here is a clearly labeled Carbon dioxide fire extinguisher.
Cable management: As mentioned above that you should not run cables under rugs or mats.
Then how do you keep people from tripping on cables? You don’t run them across the floor,
period. There is no condition that justifies running cables across the open floor or walkways.
Bundle cables together using Velcro straps or zip ties.
Safety goggles: You should be in the habit of wearing eye protection at all times in the
workplace. Choose the right style for the type of protection you require. Safety eyewear has
impact resistant properties and there are designs that offer additional protection against
chemical splashes and airborne contaminants like dust or laser printer toner. In a dusty or dirty
environment, you should always protect your lungs. Irritants suspended in the air may be
invisible. You will be able to see the effectiveness of a filter mask by examining the mask after a
period of use. Any particulate matter filtered out of the air will be visible on the mask. You may
be surprised.
Compliance with local government regulations: When you are in the workplace keep in mind
that certain activities like cable routing and disposing of hazardous waste are regulated under
local codes or ordinances. You should be aware of these regulations in order to comply with
them.
Back
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim
6. Appendix
SimulationExams.com
6.1 Windows7 Upgrade & Other features
A+ Core1 Exam Sim A+ Core2 Exam Sim Net+ Exam Sim Sec+ Exam Sim Serv+ Exam Sim