A
a (archive) file attribute, 850
A records, 633
AAA (authentication, authorization, and accounting), 794, 799
AAAA records, 633
AC (alternating current) in power supplies, 370–372
acceptable-use policies (AUPs), 45–47, 590
access control entries (ACEs), 839
access control lists (ACLs), 784–785, 839
access control vestibules, 784
access issues
mobile devices, 591–592
monitoring, 786
security. See security
Accessibility setting in macOS, 92
accounting, 794
accounts. See user accounts
ACEs (access control entries), 839
acknowledgment (ACK) messages, 628
acknowledgments in professional listening, 32
ACLs (access control lists), 784–785, 839
actions and action plans for troubleshooting, 434
activating Windows, 132
Active Directory (AD)
account creation, 817
account deletion, 818
components, 816–817
description, 816
domains, 836–838
folder redirection, 819
group policies, 820
home folders, 819
Kerberos, 817
passwords, 818–819
Active Directory Repair option, 223–224
active listening, 31
Active Management Technology (AMT), 313
active-matrix OLED (AMOLED) displays, 387, 545
active network hubs, 648–649
active partitions, 120
activities, prohibited, 36–39
activity (ACT) lights for NICs, 746
actuator arms in disk drives, 354
AD. See Active Directory (AD)
ad blockers, 721
adapter cards
installing, 411–413
key points, 419
removing, 411
summary, 418
troubleshooting, 451
adapters
audio, 334–335
communication, 344–347
converters, 346–347
description, 334
drive, 284
key points, 362
modems, 345–346
network. See network interface cards (NICs)
port, 335–344
scenario and solution, 347
summary, 362
wireless, 558
addresses
IP. See IP addresses
ADFs (automatic document feeders), 500
Admin privileges for command interpreters, 164
administrative shares, 844–845
Administrative Tools applet, 83
Administrator accounts, 802–804
Administrators group, 802–803
administrators in wireless networks, 679
ADSL (asymmetric DSL), 622
Advanced Encryption Standard (AES), 678
Advanced Micro Devices, Inc. (AMD) CPUs, 301
Advanced Packaging Tool, 180
Advanced RISC Machine (ARM) CPUs, 299–300
Advanced settings for printers, 493
Advanced Sharing dialog, 842–843
Advanced Technology Attachment Packet Interface (ATAPI)
standard, 353
Advanced Technology eXtended (ATX)
motherboard standard, 286–287
power supplies, 375–376
adware, 873–874
AES (Advanced Encryption Standard), 678
airborne particles, 13–14
AirDrop feature, 601
airplane mode, 581
alarm systems, 786
alerts as malware infection symptom, 881–882
all-in-one printers, 481
allocation units in file systems, 156–157
Allow an app through firewall option, 892
allowed permissions, 839
Alternate Shell option for Safe Mode, 223
alternating current (AC) in power supplies, 370–372
ALUs (arithmetic logic units), 297
AMD (Advanced Micro Devices, Inc.) CPUs, 301
AMD-V virtualization technology, 301
American National Standards Institute (ANSI), 643
American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE), 10
AMOLED (active-matrix OLED) displays, 387, 545
amperes (A), 370–371
AMT (Active Management Technology), 313
analog LCD displays, 382
analog modems, 345
Android devices
resetting, 604–605
synchronizing, 589
Android package (APK) source, 592
anonymous accounts, 804
ANSI (American National Standards Institute), 643
Anti-Phishing Working Group (APWG), 876–877
antimalware software, 893–896
early launch, 220
mobile devices, 592–593
antistatic bags, 11
antivirus programs, 881–882, 893–896
Apache HTTP Server, 711
APFS (Apple File System), 161
APIPA (Automatic Private Internet Protocol Addressing) addresses, 636, 751, 754
APK (Android package) source, 592
APP files, 180
App History tab in Task Manager, 213
App-V (Microsoft Application Virtualization), 259
Apple File System (APFS), 161
Apple IDs, 799
Apple menu, 92–93
applets, Control Panel, 81–86
appliances, Internet, 714–715
applications, 176
acquiring, 180–181
compatibility, 182–184
installing, 177–180
key points, 188
macOS, 93
mobile devices, 601–604
operating system compatibility, 110–111, 177
removing, 184–185
repairing, 185–186
security, 182
spoofing, 592–593
summary, 186
system permissions, 181
system requirements, 177
troubleshooting, 238–239
approvals in change management, 55
Apps setting in Windows, 87
apt-get command in Linux, 180–181
APWG (Anti-Phishing Working Group), 876–877
architectures
CPUs, 299
operating systems, 71–72
archive (a) file attribute, 850
arguments, avoiding, 33
arithmetic logic units (ALUs), 297
ARM (Advanced RISC Machine) CPUs, 299–300
artifacts, screen, 460
ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers), 10
asset management, 50
assigned users in asset management, 50
asterisks (*) in command prompt, 165
asymmetric DSL (ADSL), 622
ATAPI (Advanced Technology Attachment Packet Interface) standard, 353
attachments, e-mail, 878
attended installations, 117, 123–127
attitude, professional, 33
attributes, file, 849–850
ATX (Advanced Technology eXtended)
motherboard standard, 286–287
power supplies, 375–376
audience considerations in documentation, 45
audio adapters, 334–335
audio errors in POST, 440–441
audit logs for printers, 499
AUPs (acceptable-use policies), 45–47, 590
authentication
Apple IDs, 799
browsers, 720
device-based, 795
Kerberos, 817
key fobs and tokens, 797
key points, 823
mobile devices, 593–594
passwords, 795
printers, 499
RADIUS and TACACS, 799
RFID cards and badge readers, 796
smart cards, 795–796
smartphones, 798
summary, 821
workstations, 807–811
authentication, authorization, and accounting (AAA), 794, 799
authentication servers (ASs), 712, 817
authenticator applications, 594
auto-rotate display issues, 602–603
auto-switching power supplies, 372
automatic document feeders (ADFs), 500
Automatic Private Internet Protocol Addressing (APIPA) addresses, 636, 751, 754
automatic restart after failure, 221
automatic Windows updates, 133
AutoPlay feature, 811–812
avatars, 254
B
back-probing, 447
backbones, Internet, 705
background processes in Task Manager, 212
backlighting keyboards, 547
Backup and Restore utility, 851
backup power generators, 16
backups, 850
firmware settings, 310
Registry, 203
rotation schemes, 853–854
scenario and solution, 856
scheduled vs. real-time, 851
software and technologies, 851–852
storage locations, 852
system images, 856
testing, 853
tools, 854–855
Windows upgrades, 116
badge readers, 796
badges, 787
bandwidth
cable, 340
bare-metal hypervisors, 261
barriers, 784
base priority processor levels, 212
basic input/output system (BIOS)
flashing, 443
history, 306–307
overview, 305–306
passwords, 788–790
resetting, 313–314
scenario and solution, 315
setup, 307–310
startup issues, 237
wireless access points, 676
Basic Service Sets (BSSs), 673
batteries
disposing, 17
laptop, meters, 556–557
laptop, power management, 550–559
laptop, replacing, 537–539
laptop, troubleshooting, 569
mobile devices, 598–599
motherboards, 441–443
behavior, prohibited, 36–39
binary digits (bits), 327
biometric authentication, 594, 798–799
BIOS. See basic input/output system (BIOS)
BitLocker Drive Encryption feature, 789–790
BitLocker To Go feature, 849
bits (binary digits), 327
blackouts, 15
blotches in printing, 518
Blu-ray discs, 356
Blue Screen of Death (BSOD), 232–233
Bluetooth
unauthorized access, 593
bollards, 784
book resources, 924
boot devices, inaccessible, 236
boot logging, 219
boot media and methods in Windows installation, 122–123
boot modes in System Configuration, 225–226
boot records in FAT file system, 157
boot sequence firmware settings, 313
Boot tab in System Configuration, 223–224
bootable devices not found, 453
booting
firmware setup, 308–309
to incorrect drives, 452
macOS, 95
slow, 235
bootleg applications, 592–593
BOOTREC tool, 230
bots, 874
bridges in networks, 648
bring your own device (BYOD)
policies, 785
security issues, 590
situations, 872
broadband routers, 670
broadband speed, testing, 624
broadcasts
reducing, 760–762
SSID, 678–679
broken parts in laptops, 565
browsers
downloading and installing, 716–717
extensions and plug-ins, 716
hijacking, 871
malware infection symptoms, 880
password managers, 716–717
proxy servers, 718–719
scenario and solution, 721
secure connections and sites, 717
security and privacy, 719–721
brute-force password attacks, 874
BSOD (Blue Screen of Death), 232–233
builds for Windows, 78–80
built-in accounts, 801–802
built-in groups, 802–804
burn-in, screen, 461
burners for optical disc drives, 356
burning smells, 438
burning storage devices, 793
busses
CPUs, 298
BYOD (bring your own device)
policies, 785
security issues, 590
situations, 872
bytes, 327
C
cable
coaxial, 644
components, 640–641
direct burial, 642
display issues, 462
fiber-optic, 644–645
plenum vs. PVC, 642
securing and protecting, 768
twisted-pair, 642–643
USB, 338–341
VGA, 381
cable modems, 650–651
cable networks, 621–622
cable strippers, 665
caches
browsers, 721
CPUs, 298
DNS, 763
protected files, 169
SRAM, 329
calibration, printer, 511–512
cameras
laptops, 548
in toolkit, 283
capacitor swelling on motherboards, 441–442
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), 710
capture cards, 335
capturing mouse and keyboard, 267–268
card readers, 357–358
carriage belts in inkjet printers, 480
cartridges
disposing, 17–18
case
design for cooling, 304
opening on laptops, 535–536
case fans
cooling systems, 405–406
CPUs, 302
CAT cable, 642–643
cat command, 173
categories in ticketing systems, 51
cathode ray tube (CRT) monitors, 8, 18, 386
CCFLs (cold cathode fluorescent lamps), 386–387
cd command, 173
CDs (compact discs), 356
cell phone disposal, 18
cellular Internet, 623
cellular network connections, 581
central office (CO) in DSL, 622
central processing units (CPUs), 296, 305
cooling mechanisms, 301–304, 405–406, 450
installing, 403–404
key points, 317
laptop power settings, 558
machine cycles, 296–298
motherboard compatibility, 301
operating system requirements, 109
removing, 402–403
summary, 315
technologies and characteristics, 298–301
troubleshooting, 445
upgrading, 401
certificate authorities (CAs), 717
Certificate Manager, 207–208
Certificate Services for smart cards, 796
certificate warnings as malware infection symptom, 880
certificates of destruction, 793
chain of custody in incident investigation, 38
challenge-response protocols, 710
change management, 51–56
changes
command interpreters, 164
Registry, 201–203
troubleshooting, 431
channels in WLANs, 647
charging step in laser printers, 478
chemical disposal, 18–19
chipsets, 295
chmod command, 173
chown command, 173
circuit board disposal, 18
CISCs (Complex Instruction Set Computers), 299
classrooms, virtual, 254–255
clean installs
mobile devices, 604
cleaning
printers, 508–510
for Windows upgrades, 115–116
cleaning stage in laser printers, 479
clearing caches, 721
clicking noises
drives, 455
printers, 519–520
client/server-based networks, 626
client-side virtualization
vs. emulation, 260
guest OSs, 268–269
hypervisors, 259–260
implementation, 262–264
key points, 270–271
mouse and keyboard, 267–268
network requirements, 262
Oracle VirtualBox, 264–267
scenario and solution, 269
self test, 271–277
vs. server-side, 256–257
summary, 270
types, 258–259
virtual machine security, 262
virtualization overview, 254–256
clock speed of CPUs, 300
closing mobile device applications, 603–604
cloud
characteristics, 722–723
deployment models, 724
key points, 734
service models, 723
services and functions, 724–725
summary, 731
clusters in file systems, 156–157
CMOS (complementary metal-oxide semiconductor) chips, 306–307
cold cathode fluorescent lamps (CCFLs), 386–387
Collation setting for printers, 494
color
displays, 463
printers, 479, 494, 511–512, 518
Color Management settings, 493
command interpreters, 164
command-line tools for network troubleshooting, 743–745
command prompt
file management, 163–167
Linux and macOS, 170–175
network troubleshooting, 743
Windows, 199
Windows Recovery Environment, 229–230
comments in scripting, 916
commercial licenses, 40
common ports, 637–640
communication adapters, 344–347
community clouds, 724
compact discs (CDs), 356
compatibility
applications, 177, 182–184, 238–239
CPU and motherboards, 301
HDMI, 384
memory, 333
Wi-Fi networks, 672–673
complementary metal-oxide semiconductor (CMOS) chips, 306–307
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), 710
Complex Instruction Set Computers (CISCs), 299
compliance policies, 48–49
compression in NTFS, 159
Computer Management, 204
computers
disposal, 16–19
concerns, customer, 33
conditional execution in scripting, 916–917
confidence, projecting, 33
confidential information, 32
connections and connectivity issues
browsers, 717
hardware, 745–749
hidden wireless networks, 689
Internet types, 620–624
IP configuration, 752–758
laptops, 560–561
limited connectivity, 750–752
malware infection symptoms, 880
mobile devices, 581–583, 599–600
net command, 758–759
network adapters to switches and routers, 670
networks, 647–651
printers, 487
shared folders, 845–846
syncing, 587–590
wireless, 749–750
connectors
HDMI, 384–385
motherboard power, 293–294
power supplies, 375–376
USB, 338–341
VGA, 381
consent prompts in UAC, 886
consumables for printers, 504–508
content
filtering, 682–683
prohibited, 36–39
continuous form printer paper, 482–483
Control Panel applets
application removal, 184
identifying, 81–86
network configuration, 687–693
power options, 550–559
printer queues, 515–516
User Account Control, 811–812
Windows tools, 199–200
control units in CPUs, 297
converters, 346–347
convertible laptops, 535
cookies, 720
cooling systems, 404
case fans, 405–406
heat sinks, 405–406
installing, 406
liquid cooling systems, 406
removing, 406
troubleshooting, 449–450
copied files, permissions for, 840
copper cable, 640–644
copy command, 173
copying files, 165
corona wires in laser printers, 478–479
corruption of drives, 454
counters in Performance Monitor, 205
coworkers, talking to, 34
cp command, 173
CPUs. See central processing units (CPUs)
crackers, password, 874
Creator Owner group, 805
crimpers, 664–665
cross-platform virtualization, 256
cross-site scripting (XSS), 875
CRT (cathode ray tube) monitors, 8, 18, 386
cryptomining, 870
cultural sensitivity, 32
current
measuring, 448
power supplies, 370
current directories in command prompt, 165
cursor drift in laptops, 566
customers
concerns, 33
confidential information, 32
D
D-sub connectors, 343–344
DAC (discretionary access control), 838
data areas in FAT file system, 157
data-at-rest encryption, 847
data loss in drives, 454
data preservation in incident investigation, 38
data protection
backups. See backups
description, 782
electrical interruptions, 857–858
encryption, 847–849
key points, 859–860
privacy, 42
self test, 860–866
sharing. See sharing data
summary, 858–859
data source issues in displays, 462
data synchronization in browsers, 720
data types in scripting, 913
databases for asset management, 50
datagrams in TCP, 628
date issues in motherboards, 442–443
DB-9 serial ports, 343–344
DC (direct current), 370–372
DDoS (distributed denial-of-service) attacks, 869
DDR1 SDRAM (double data rate 1 SDRAM), 331
DDR2 SDRAM (double data rate 2 SDRAM), 331
DDR3 SDRAM (double data rate 3 SDRAM), 331–332
DDR4 (double data rate 4), 332
DDR5 (double data rate 5), 332
dead pixels in displays, 462–463
debris, protection from, 13–14
Debugging Mode, 219
decibel (dB) levels for fans, 405
decode step in CPUs, 297
dedicated CPU registers, 298
defaults
IP address gateways, 631
printers, 496
user names, 810
wireless network administrators, 679
defensiveness, avoiding, 33
defragmenting hard disks, 239–240
degaussing storage devices, 792–793
del command, 173
deleting
accounts, 818
files, 792
printers, 502
demilitarized zones (DMZs), 681
denial-of-service (DoS) attacks, 869
denied permissions, 839
deployment models for cloud, 724
descriptions in ticketing systems, 51
desktop
alerts, 881
laptop power background settings, 558
macOS, 94
virtualization, 255
virtualization, client-side. See client-side virtualization
virtualization, cloud, 725
destination network address translation (DNAT), 680
destruction of storage devices, 792–793
Details tab in Task Manager, 212
Developer mode for mobile devices, 592
developing stage in laser printers, 479
device-based authentication, 795
Device Manager applet, 83
description, 205
driver updates, 241
troubleshooting, 432–433
video adapter cards, 347
device preservation in incident investigation, 38
devices
intermittent failures, 439–440
operating systems, 71–72
ticketing systems, 50
Windows settings, 87
Devices and Printers applet, 83, 496
df command, 173
DHCP. See Dynamic Host Configuration Protocol (DHCP) servers
Diagnostic Startup option, 223
dictionary password attacks, 874
differential backups, 853
difficult customers, dealing with, 31
dig (Domain Information Groper) command, 765
digital cameras, 283
digital rights management (DRM), 41–42, 384
digital subscriber line (DSL), 622
digital versatile discs (DVDs), 356
Digital Video Interface (DVI), 382–383
digitizers
mobile devices, 596–597
DIMMs (Dual Inline Memory Modules)
installing and removing, 408–410
motherboards, 288–289
dir command, 173
direct burial cable, 642
direct current (DC), 370–372
direct thermal printers, 480
directories
command prompt, 165–167
FAT file system, 157–158
dirt and SSDs, 457–458
Disable Early Launch Anti-Malware Protection option, 220
disabled antivirus programs, 881
disabling
AutoPlay feature, 811–812
Fast Startup, 551–552
ports, 679
SSID broadcasts, 678–679
startup programs, 213
System Restore, 897
discretionary access control (DAC), 838
Disk Cleanup utility, 115–116
disk management, 148. See also drives
file management. See file management
file systems, 155–161
key points, 186–187
macOS, 154–155
summary, 186
Windows, 149–154
Disk Management utility, 149–151, 167–168
Disk Utility program, 154–155
DISKPART command, 152–154, 230
display adapters, 334, 346–347, 380–381
DisplayPort, 384–385
DVI, 382–383
HDMI, 383–384
interfaces, 381
operating system requirements, 109
VGA, 381–382
Display Power-Management Signaling (DPMS) standard, 387
DisplayPort standard, 384–385
auto-rotate issues, 602–603
CRTs, 386
disposal, 18
FPD, 386
geometry, 463
key points, 389
laptop power settings, 558
LCD, 386–387
low-resolution video, 220
macOS, 92
safety practices, 8
scenario and solution, 388
screen geometry, 463
screen saver locks, 808–809
shutdown, 460
summary, 388
disposal
computer equipment, 16–19
hardware, 791–793
distance limitations in Wi-Fi networks, 671–672
distortion in displays, 463
distractions, 34
distributed denial-of-service (DDoS) attacks, 869
distribution servers and shares in unattended Windows installation, 128
distributions, Linux, 96
DKIM (Domain Keys Identified Mail) records, 633
DMARC (Domain-based Message Authentication, Reporting, and Conformance) records, 633
DMG files, 179
DMZs (demilitarized zones), 681
DNAT (destination network address translation), 680
DNS. See Domain Name System (DNS) servers
Dock, macOS, 90
docking stations, 561
document locks, 788
documentation, 43
best practices, 44–45
change management, 55–56
file naming conventions, 44
incident investigation, 37–38
laptop case opening, 536
scenario and solution, 49
structure, 44
troubleshooting, 435
types, 45–49
writing tips, 45
Domain-based Message Authentication, Reporting, and Conformance (DMARC) records, 633
Domain Information Groper (dig) command, 765
Domain Keys Identified Mail (DKIM) records, 633
Domain Name System (DNS) servers
DNS problems, 762–765
Internet, 706–707
ports, 638
domains
access, 77
Active Directory, 816, 836–838
client/server-based networks, 626
names, 706–707
user accounts, 816–817
dongles, 41
DoS (denial-of-service) attacks, 869
dot matrix printers, 476
dotted-decimal notation, 630
double data rate 1 SDRAM (DDR1 SDRAM), 331
double data rate 2 SDRAM (DDR2 SDRAM), 331
double data rate 3 SDRAM (DDR3 SDRAM), 331–332
double data rate 4 (DDR4), 332
double data rate 5 (DDR5), 332
double print images, 517
downloading browsers, 716–717
DPMS (Display Power-Management Signaling) standard, 387
drawing pads for laptops, 562
dress, professional, 31
drive adapters, 284
Drive Encryption Wizard, 849
drivers
signature enforcement, 221
software, 315
updates, 241
Windows storage, 119
checking, 168–169
defragmenting, 239–240
eSATA, 350–351
formatting, 168–169
imaging, 128–129
installing, 414–417
laptop power settings, 558
laptops, 543–544
legacy, 351
letters, mapping, 845–846
magnetic, 354–356
missing, 454
mobile devices, 351
operating system requirements, 109
partitions, 119–121
PATA and IDE, 351–353
removing, 414
SATA, 348–349
SCSI, 353–354
troubleshooting, 451–455
viewing data on, 149–150
viewing disk storage, 150–151
Windows upgrades, 115–116
wiping, 791–792
DRM (digital rights management), 41–42, 384
DSL (digital subscriber line), 622
DSL modems, 650–651
dual-booting, 95
dual-channel architecture
memory, 330
motherboards, 288–289
dual-core CPUs, 300–301
Dual Inline Memory Modules (DIMMs)
installing and removing, 408–410
motherboards, 288–289
dual voltage power supplies, 372
dumpster diving, 787
duplexing printers, 494
dust, 13–14
DVDs (digital versatile discs), 356
DVI (Digital Video Interface), 382–383
Dynamic Host Configuration Protocol (DHCP) servers
ports, 638
Wi-Fi networks, 676
E
attacks, 871
cloud, 725
hijacked, 883–884
malware infection symptoms, 883–884
mobile devices, 583–586
EAP (Extensible Authentication Protocol), 678
EAP with Personal Shared Key (EAP-PSK), 678
Ease Of Access Center, 83
EB (exabytes), 327
ECC (error-correcting code) for memory, 328–329
echo packets in ICMP, 756
echo print images, 517
editions
macOS, 93
Windows, 75–81
Windows upgrades, 117–118
education about malware, 885
EEPROM (electrically erasable programmable ROM)
for BIOS, 306
efficiency of power supplies, 379
EFS (Encrypting File System), 159, 847
EIDE (Enhanced IDE) standard, 353
802.11 standards, 645–646, 671–672
elasticity in cloud, 722
electric shock, 7
electrical interruption protection, 857–858
electrical terminology, 370–372
electrically erasable programmable ROM (EEPROM)
for BIOS, 306
electro-photosensitive drums in laser printers, 478
electromagnetic interference (EMI)
connectivity issues, 746
twisted-pair cable, 642
electrostatic discharge (ESD)
dangers, 9–10
protection from, 10–12
wrist straps, 282
elevating command interpreters, 164
embedded systems, 713–714
EMI (electromagnetic interference)
connectivity issues, 746
twisted-pair cable, 642
emulation vs. virtualization, 260
Encrypting File System (EFS), 159, 847
encryption
BitLocker, 789–790
mobile devices, 595
Windows professional editions, 78
wireless networks, 677–678
end-of-life (EOL) operating systems, 74–75, 872
end-user acceptance in change management, 55
End User License Agreements (EULAs), 39–41
energy efficiency in power supplies, 379
Enhanced IDE (EIDE) standard, 353
Enterprise and Education Windows editions, 78
enterprise licenses, 40–41
enticements for attachments, 878
environment
troubleshooting, 430
environment variables in scripting, 913–915
environmental concerns, 12–13
airborne particles, 13–14
equipment disposal, 16–19
power concerns, 14–16
recycling centers, 19
scenario and solution, 20
temperature and humidity, 14
EOL (end-of-life) operating systems, 74–75, 872
EPROM (erasable programmable ROM) chips for BIOS, 306
equipment
locks, 786
moving, 5–7
erasable programmable ROM (EPROM) chips for BIOS, 306
erasure lamps in laser printers, 479
error-correcting code (ECC) for memory, 328–329
error indicators
POST, 440–441
startup, 236–238
eSATA (External SATA) standard, 350–351, 455–456
escalation levels in ticketing systems, 51
ESD (electrostatic discharge)
dangers, 9–10
protection from, 10–12
wrist straps, 282
EULAs (End User License Agreements), 39–41
even parity, 329
Event Viewer, 205–207
Everyone group, 805
evil twin attacks, 879
exabytes (EB), 327
Exam Objective Map, 925
Exchange clients for mobile devices, 585–586
EXIT command in Windows Recovery Environment, 230
expansion busses, 289
expansion cards
capture cards, 335
description, 334
key points, 362
sound cards, 334–335
summary, 361
expectations, setting and meeting, 34–35
expiration of passwords, 810
exploits, malware, 872
exposing step in laser printers, 478–479
ext3 (third extended filesystem), 161
ext4 (fourth extended filesystem), 161
Extended File Allocation Table (exFAT), 160
extended partitions, 120
Extensible Authentication Protocol (EAP), 678
extensions, browser, 716
external interference in Wi-Fi networks, 671
external monitors for laptops, 568
external port adapters and interfaces, 335–344
External SATA (eSATA) standard, 350–351, 455–456
external storage devices, installing and removing, 418
extinguishing fires, 4–5
F
F-type connectors, 644
facial recognition, 594
factory recovery partitions, 123
factory resets for mobile devices, 604
faded prints, 517
failed login attempts
lockout, 811
mobile devices, 594
fanless cooling, 302–303
fans
cooling systems, 405–406
CPUs, 302
failed, 449
firmware settings, 313
noisy, 450
power supplies, 374
Fast Startup feature for laptops, 553–554
FAT. See file allocation table (FAT) file systems
fault tolerance
NTFS, 158
RAID, 358–360
FAX$ share, 845
FDM (fused deposition modeling) in 3-D printers, 482
Federal Communications Commission (FCC) licenses, 623
feeding technologies
multifunction devices, 500
fetch step in CPUs, 297
fiber-optic cable, 641, 644–645
fiber-optic service, 621
field-replaceable units (FRUs), 283
FIFO (first-in first-out) backup rotation schemes, 853
filaments in 3-D printers, 482
file allocation table (FAT) file systems, 156
components, 157–158
FAT16, 158
File Explorer options, 83, 162–163
file management
File Explorer options, 162–163
key points, 187–188
Linux and macOS command prompts, 170–175
operating systems, 71
shutdown commands, 175–176
summary, 186
Windows command prompt, 163–170
file servers, 711
file systems, 155–156
characteristics, 156–157
exFAT, 160
FAT, 157–158
Mac, 160–161
macOS, 135
NTFS, 158–160
ReFS, 160
scenario and solution, 161
Windows installation, 121–122
File Transfer Protocol (FTP), 638, 709, 711
files
attributes, 849–850
cloud storage, 725
cloud synchronization, 723
compression, 159
deleting, 792
encryption, 847–849
missing, 882
naming conventions, 44
scripting, 911
fileshares, 711
FileVault, 848
filters
content, 682–683
e-mail, 883
IP addresses, 682
privacy, 788
find command, 173
Finder in macOS, 90–91
findstr command, 173
fingerprint scanners, 594, 798–799
Firefox browser, 716
fires, extinguishing, 4–5
Firewall notification settings option, 892
firewalls
mobile devices, 594
networks, 651
settings, 679
software, 887–893
firmware
configuring, 307–313
passwords, 789–790
updates, 307
wireless access points, 676
first-in first-out (FIFO) backup rotation schemes, 853
first-party cookies, 720
FIXBOOT command, 230
fixed-input power supplies, 372, 375
flash BIOS, 306
flash drives, 357
flash memory, 356
flashing
BIOS, 443
screens, 461
flat-panel displays (FPDs), 386, 461–463
flatbed feeders, 500
flushing DNS caches, 763
folders
compression, 159
encryption, 847–849
FAT file system, 157–158
redirection, 819
Force Quit command, 92
force-restarts for mobile devices, 604
Force Stop feature, 604
forests in Active Directory, 817
forgetting wireless networks, 692
form factors
motherboards, 285–288
power supplies, 375–376
formatting storage devices, 151, 168–169, 792
forwarding, port, 679–680
fourth extended filesystem (ext4), 161
FPDs (flat-panel displays), 386, 461–463
FQDNs (fully qualified domain names), 706
fraud, 876
freeware, 40
frequency of power supplies, 371
friction feeds, 482–483, 505–506
front-side bus in CPUs, 298
FRUs (field-replaceable units), 283
FTP (File Transfer Protocol), 638, 709, 711
full backups, 853
full-duplex communication, 337
fully qualified domain names (FQDNs), 706
functions, cloud, 724–725
fused deposition modeling (FDM) in 3-D printers, 482
fusing stage in laser printers, 479
fuzzy displays, 461
G
Gaming setting, 87
garbled printing, 519
gateways
Internet appliances, 714
IP addresses, 631
GB (gigabytes), 327
General Data Protection Regulation (GDPR), 42
General Options in File Explorer, 162
general-purpose CPU registers, 298
General tab in System Configuration, 222–223
gestures in macOS, 95
ghost cursors, 566
ghost print images, 517
gigabytes (GB), 327
gigahertz (GHz), 327
global unicast addresses, 631
globally unique identifier partition tables (GPTs), 119–120
globally unique identifiers (GUIDs), 119
glossary in online content, 925
Google Chrome browser, 716
Google Sync, 590
GPMC (Group Policy Management Console), 820
gpresult command, 169–170
GPTs (globally unique identifier partition tables), 119–120
gpupdate command, 169–170
grandfather-father-son backup scheme, 854
graphics processing units (GPUs), 296
graphics settings for laptops, 558
grep command, 173
grime and SSDs, 457–458
grinding noises, 450, 455, 519–520
Group Policy Editor, 78, 169–170, 208–209
Group Policy Management Console (GPMC), 820
groups
built-in, 802–804
Group Policy Editor, 208–209
local, 208
policies, 820
Windows command prompt, 169–170
workgroups, 834–836
guest access in wireless networks, 683
Guest accounts, 810
guest OSs
client-side virtualization, 263
mouse and keyboard, 267–268
performance, 268–269
Guests group, 803–804
GUIDs (globally unique identifiers), 119
H
h (hidden) file attribute, 850
half-duplex communication, 336
hard drives. See drives
hard resets for mobile devices, 604–605
hard tokens, 797
hardware
addresses, 628–629
compatibility in upgrades, 114
connectivity issues, 745–749
disposal, 791–793
firmware settings, 310
network. See network hardware
operating system compatibility, 110–111
operating systems for, 71
toolkit, 282–284
troubleshooting. See hardware troubleshooting
Windows installation requirements, 118
hardware-assisted virtualization (HAV), 260, 301
hardware profiles, 432
hardware tokens, 177
hardware troubleshooting, 428
adapter cards, 451
cooling systems, 449–450
CPUs, 445
displays, 459–464
key points, 465–467
motherboards, 440–444
power supplies, 445–449
preparing for, 428–429
procedures, 436–437
RAM, 444–445
scenario and solution, 451, 458
self test, 467–474
steps, 429–435
storage devices, 451–458
summary, 464–465
symptoms, 437–440
training, 435
hashing in browser downloads, 716
HAV (hardware-assisted virtualization), 260, 301
hazards in scripting, 910
HDCP (High-Bandwidth Digital Content Protection), 384
HDMI (High-Definition Multimedia Interface), 383–384
headers
motherboards, 294–295
packets, 628
headsets for laptops, 562
Health Insurance Portability and Accountability Act (HIPAA), 36, 42
heat sinks, 284, 302–303, 405–406
heating elements in thermal printers, 480
HELP command in Windows Recovery Environment, 230
help file management command, 173
help systems, 48
hertz (Hz), 327
HFS+ (Hierarchical File System Plus), 160
Hi-Speed USB 2.0, 336–337
hidden (h) file attribute, 850
hidden wireless network connections, 689
Hide Extensions For Known File Types option, 162
Hierarchical File System Plus (HFS+), 160
high availability in cloud, 723
High-Bandwidth Digital Content Protection (HDCP), 384
High-Definition Multimedia Interface (HDMI), 383–384
high latency in networks, 760
high-voltage power supplies (HVPSs), 371
hijacking
browsers, 871
e-mail, 883–884
HIPAA (Health Insurance Portability and Accountability Act), 36, 42
HKEY_ registry subtrees, 202–203
hoaxes, 876
Home editions in Windows, 77
home folders, assigning, 819
host keys in client-side virtualization, 268
host names in URLs, 706
host OSs and computers in client-side virtualization, 263–264
hosts in IP addresses, 629–630
hot swapping in USB, 341
hotfixes, 78
hotspots
creating, 581–582
laptop connections, 560
WLANs, 645–646
HT Technology (Hyper-Threading Technology), 300
HTML (Hypertext Markup Language), 708
HTTP (Hypertext Transfer Protocol), 638, 708
HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer), 638, 708
HVPSs (high-voltage power supplies), 371
hybrid clouds, 724
hygiene, professional, 31
Hyper-Threading Technology (HT Technology), 300
Hypertext Markup Language (HTML), 708
Hypertext Transfer Protocol (HTTP), 638, 708
Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS), 638, 708
hyperthreading, 300
Hz (hertz), 327
I
IaaS (Infrastructure as a Service), 723
IANA (Internet Assigned Numbers Authority), 706
ICC (International Color Consortium) standards, 511
iCloud
macOS, 95
mobile devices, 588–590
ICMP (Internet Control Message Protocol), 756
IDE (Integrated Drive Electronics) standard, 353
IDs in asset management, 50
if statements in scripting, 916–917
IIS (Internet Information Services), 711
images
system, 856
unattended installation, 128–129
ImageX tool, 128
imaging drums in laser printers, 478
imaging process in printers, 476, 478–479
IMAP (Internet Message Access Protocol), 584, 638, 708
impact considerations in change management, 54
impersonation, 876
implementation in change management, 55
in-place upgrades, 111–113
in-plane switching (IPS), 387
Inaccessible Boot Device message, 236
incidents
documentation, 47
responding to, 37–38
incineration of storage devices, 793
incremental backups, 853
indexing in NTFS, 159
Indexing Options applet, 84
information gathering in Windows installation, 124–125
Information Technology Infrastructure Library (ITIL) change management, 52
Infrastructure as a Service (IaaS), 723
inherited permissions, 839
injection, SQL, 875
ink, printer, 506–507
ink cartridge disposal, 18
input/output operations per second (IOPS) drive rating, 455
insider threats, 874
instability problems in Windows, 232–233
installing
adapter cards, 411–413
applications, 177–180
browsers, 716–717
cooling systems, 406
CPUs, 403–404
DIMMs, 408–410
Linux, 135–136
motherboards, 399–401
printers, 486–489
SODIMMs, 541–542
SOHO networks, 669–677
storage devices, 413–418
VirtualBox, 266
Windows. See Windows operating systems
integers in scripting, 913
Integrated Drive Electronics (IDE) standard, 353
Intel Corporation CPUs, 301
Intel graphics laptop settings, 558
interactive mode in DNS troubleshooting, 764
interfaces, printer, 484–485
interference
connectivity issues, 746
twisted-pair cable, 642
Wi-Fi networks, 671
intermittent failures, 439–440
International Color Consortium (ICC) standards, 511
Internet
appliances, 714–715
browser download and installation, 716–717
connection devices, 647–651
connection types, 620–624
connectivity in Windows installation, 129
IP addresses, 706–707
ISPs, 705
key points, 732–733
legacy and embedded systems, 713–714
operating system requirements, 109
self test, 735–740
server types, 710–713
services and protocols, 707–710
structure, 704–705
summary, 731
Internet Assigned Numbers Authority (IANA), 706
Internet Control Message Protocol (ICMP), 756
Internet Explorer, 558, 719–720
Internet Information Services (IIS), 711
Internet Message Access Protocol (IMAP), 584, 638, 708
Internet of Things (IoT) devices, 714–715, 785
Internet Properties dialog box, 719–720
Internet Protocol (IP), 627–628
Internet Service Providers (ISPs), 705
interruptions, minimizing, 31, 34
intranets, 724
inventory databases for assets, 50
IOPS (input/output operations per second) drive rating, 455
IoT (Internet of Things) devices, 714–715, 785
IP (Internet Protocol), 627–628
IP addresses, 629
default gateways, 631
DHCP servers, 634
DNS servers, 631–633
filtering, 682
Internet, 706–707
IPv4, 630
IPv6, 631
NICs, 633–635
ping command, 754–756
printers, 488
routers, 681–682
scenario and solution, 639
special, 636
viewing, 635
Wi-Fi networks, 676
ip command, 744
IP packet filtering, 651
iPads synchronization, 588
IPC$ share, 845
ipconfig utility, 629
DNS problems, 763
IP addresses, 752–753
network troubleshooting, 743–744, 750–751
IPS (in-plane switching), 387
ISPs (Internet Service Providers), 705
ITIL (Information Technology Infrastructure Library) change management, 52
ITX motherboards, 286–287
J
jailbreaks in mobile devices, 591
jargon, professional, 31
jitter in networks, 760
joining
domains, 836–837
workgroups, 835
judgmental behavior, 33
jump drives, 357
K
KB (kilobytes), 327
Kerberos authentication, 817
kernels, Linux, 96
Key Distribution Center (KDC) servers, 817
key fobs, 797
keyboards
guest OSs, 267–268
Keychain feature, 94–95
keyloggers, 875
keys
Registry, 202
kilobytes (KB), 327
kilohertz (KHz), 327
knowledge base articles, 48
L
L1 and L2 CPU caches, 298
labels, printing, 505
laminated layers in 3-D printers, 482
land grid array (LGA) sockets, 402
lands on optical disc drives, 356
Landscape printer orientation, 494
language, professional, 31
LANs (local area networks), 619, 636–637
laptops, 534
AC adapters, 538
accessories, 561–562
case opening, 535–536
component replacement, 537–549
connection methods, 560–561
description, 535
displays, 545–547
drives, 543–544
key points, 570–572
keyboards, 547–548
memory, 540–542
multimedia components, 548–549
overheating, 404
port replicators and docking stations, 561
power options, 550–559
scenario and solution, 549, 559, 564
security components, 549
self test, 572–578
summary, 569–570
touchscreens and digitizers, 548
trackpads, 562–564
troubleshooting, 565–569
wireless cards, 539
laser printers
overview, 477–479
paper, 505
toner cartridges, 17–18, 507–508
LC (lucent connector), 645
LCD (liquid crystal display) monitors, 382
LDAP (Lightweight Directory Access Protocol), 638
leases in DHCP servers, 634
LED-lit LCD, 387
LEDs (light-emitting diodes)
status indicators, 438–439
legacy software, 256
legacy storage interfaces, 351
legacy systems, 713–714
LGA (land grid array) sockets, 402
Li-Ion (lithium ion) batteries, 538
license terms and conditions for online content, 922–923
licenses, 39–40
asset management, 50
open-source vs. commercial, 40
personal vs. enterprise, 40–41
scenario and solution, 43
wireless, 623
lid closing for laptops, 552–553, 558
lifting techniques for moving equipment, 5–7
light-emitting diodes (LEDs)
status indicators, 438–439
light polymers for 3-D printers, 482
Lightning interface, 560
Lightweight Directory Access Protocol (LDAP), 638
lines on printed page, 519
Linux operating system
application acquisition, 180–181
application removal, 184
backup tools, 854–855
DNS troubleshooting, 765
file management, 170–175
firewall settings, 893
installing, 135–136
introduction, 96–97
open-source software, 40
shutdown commands, 176
Terminal interface, 170–175
updates and patches, 242
liquid cooling systems, 303–304, 406
liquid crystal display (LCD) monitors, 382
liquid damage of laptops, 566
listening skills, 31–35
lit pixels in displays, 462–463
lithium ion (Li-Ion) batteries, 538
load balancers, 714
Load Startup Items option, 223
Load System Services option, 223
local accounts, 130
local area networks (LANs), 619, 636–637
local fiber-optic cable connectors, 645
local media, application installations from, 178
Local Security Policies app, 813–814
local user and group accounts
built-in, 801–802
overview, 799–801
rebuilding, 806–807
Windows, 804–805
Windows sign-in, 806
Local Users and Groups tool, 208
localhosts, pinging, 754
location services, 591–593
locators for mobile devices, 595
lockout for failed login attempts, 811
locks
documents, 788
equipment, 786
screen saver, 808–809
lockups
applications, 238
symptoms, 437–438
logical addresses. See IP addresses
logical drives, 120
login attempts, failed, 594, 811
login scripts in Active Directory, 820, 918–919
login time restrictions, 810–811
LOGON command, 230
logs
malware infection symptoms, 883
printers, 499
long-range fixed wireless networks, 623
loopback addresses, 636
loopback plugs, 667
loops in scripting, 917
lost data, recovering, 458
lost mobile devices, 595–596
low-battery options, 554
low-power mode, 550
low-resolution video, 220
ls command, 173
lucent connector (LC), 645
M
M.2 interface, 351
laptops, 540
motherboards, 292
SSD installation, 415
MAC (Media Access Control) addresses
network addressing, 628–629
routers, 682
machine cycles in CPUs, 296–298
macOS operating system
Apple menu, 92–93
application installations, 179–180
application removal, 184
application running, 93
backup tools, 854–855
desktop, 89
disk management, 154–155
Dock, 90
features, 95–96
file management, 170–175
Finder, 90–91
firewall settings, 892
multiple desktops, 94
storing passwords, 94–95
System Preferences, 92
updates and patches, 242
upgrading, 134
versions, 93
XProtect, 895
Mail applet, 84
mail exchange (MX) records, 633
mail servers, 712
maintenance tools and kits for printers, 503–504, 511
malware
access issues, 874–879
antivirus and antimalware software, 893–896
attacks, 869–870
description, 783
firewalls, 887–893
infection symptoms, 880–885
key points, 899–900
mobile devices, 592–593
removing, 896–898
scenario and solution, 898
scripts, 910
self test, 901–907
spyware and adware, 873–874
summary, 899
system protection, 886
User Account Control, 885–886
user education, 885
vectors, 870–871
vulnerabilities and exploits, 872
MAM (mobile application management) policies, 785
man command, 173
man-in-the-middle attacks, 871
Manage Documents printer option, 499
Manage This Printer option, 498
managed network switches, 649
MANs (metropolitan area networks), 619
mantraps, 784
manual installations, 117
mapping
drive letters, 845–846
ports, 679–680
masks for IP addresses, 630
mass storage devices
drives. See drives
RAID, 358–360
scenario and solution, 360
solid-state storage, 356–358
master boot records (MBRs), 119, 121
master file tables (MFTs), 156, 158
material safety data sheets (MSDSs), 18–19
MB (megabytes), 327
MBRs (master boot records), 119, 121
md command, 173
MDM (mobile device management), 113, 785
Media Access Control (MAC) addresses
network addressing, 628–629
routers, 682
megabytes (MB), 327
megahertz (MHz), 327
memory, 326
capacity, 327
compatibility, 333
CPUs, 298
key points, 361
memory cards, 357–358
motherboard modules, 288–289
RAM. See random access memory (RAM)
ROM, 328
speed, 327
summary, 361
metered cloud utilization, 723
metered connections, 689
metropolitan area networks (MANs), 619
MFA (multifactor authentication), 594, 795
MFDs. See multifunction devices (MFDs)
MFTs (master file tables), 156, 158
MHz (megahertz), 327
micro-ATX power supplies, 375
MicroDIMMs, 541
microphones, 549
Microsoft Application Virtualization (App-V), 259
Microsoft Deployment Toolkit, 128
Microsoft Management Console (MMC), 169, 204
Certificate Manager, 207–208
Device Manager, 205
Event Viewer, 205–207
Local Users and Groups, 208
Performance Monitor, 205
Task Scheduler, 205
Microsoft Product Activation (MPA), 132
Microsoft Remote Assistance (MSRA), 731
midspan injection in Power over Ethernet, 650
migration for laptops drives, 544
MIMO (multiple input/multiple output), 646, 673
Mini PCI bus, 291–292
Mini PCI Express bus, 291–292, 539–540
Mini-SATA (mSATA) standard, 349, 351–352
miniconnectors for power supplies, 377–378
Minimal option for Safe Mode, 223
mirroring, RAID, 359
missing drives, 454
missing files, 882
Missing Graphical Interface message, 236
Missing operating system message, 236–237
missing slot covers, 450
mkdir command, 173
MMC. See Microsoft Management Console (MMC)
MMF (multimode fiber), 644
mobile application management (MAM) policies, 785
mobile device management (MDM), 113, 785
mobile devices, 580
applications, 601–604
auto-rotate issues, 602–603
battery issues, 598–599
connectivity issues, 599–600
e-mail configuration, 583–586
frozen, 598
interfaces, 351
key points, 606–607
laptops. See laptops
lost and stolen, 595–596
malware infection symptoms, 884
operating system updates, 586, 602
operating systems, 72
overheating, 597–598
reboot issues, 603
resetting, 604–605
security, 590–595
self test, 608–614
summary, 605
synchronization, 586–590
touchscreens, 596–597
troubleshooting, 596–605
wireless network connections, 581–583
mobile hotspots, 645–646
modems
adapters, 345–346
networks, 650–651
modes for fiber-optic cable, 644
modular power supplies, 377
moisture in paper-feed problems, 514
Molex connectors, 377–378
monitoring access, 786
monitors. See displays
motherboards, 284
BIOS and UEFI overview, 305–306
BIOS and UEFI resetting, 313–314
BIOS history, 306–307
bus architectures, 289–292
chipsets, 295
comparing, 288
CPU compatibility, 301
driver software, 315
form factors, 285–288
handling, 400–401
headers, 294–295
installing, 399–401
power connectors, 293–294
printers, 483
RAM slots, 288–289
removing, 400
replacing, 398–399
scenario and solution, 296, 407
self test, 318–319, 321–322, 324, 420–421, 423–425
troubleshooting, 440–444
mouse
guest OSs, 268
laptops, 566
moved files, permissions for, 840
moving equipment lifting techniques, 5–7
MPA (Microsoft Product Activation), 132
mSATA (Mini-SATA) standard, 349, 351–352
MSCONFIG. See System Configuration (MSCONFIG)
MSDSs (material safety data sheets), 18–19
MSI application installs, 177–178
msinfo32.exe, 200–201
MSRA (Microsoft Remote Assistance), 731
multicore CPUs, 300–301
multicore twisted-pair cable, 641
multifactor authentication (MFA), 594, 795
multifunction devices (MFDs), 481
installing, 489
scanning features, 500–501
security, 499
multimedia
laptop power settings, 558–559
laptops, 548–549
multimode fiber (MMF), 644
multipage misfeeds, 513
multiple desktops in macOS, 94
multiple input/multiple output (MIMO), 646, 673
multisocket motherboards, 301
multitasking, 214–215
multithreading, 300
mv command, 173
MX (mail exchange) records, 633
3.145.81.24