por David Sanchez 1 ano atrás
433
Mais informações
Amp hours
Volt-amperes rating
-gt
-ge
-le
-ne
Executable File
OS
.sh
National Institute of Standards and Technology
Synthetic Full Backup
Job type that combines incremental backup jobs to synthesize a full backup job. Synthetic full backups have the advantage of being easy to restore from while also being easy on bandwidth across the network as only changes are transmitted.
Full with Differential
It means that the chain starts with a full backup and then runs differential jobs that select new files and files modified since the original full job. A differential chain has moderate time and storage requirements and slightly less recovery complexity than incremental as it requires a maximum of two jobs (the full backup plus the differential job).
Full with Incremental
The chain starts with a full backup and then runs incremental jobs that select only new files and files modified since the previous job. An incremental job has the lowest time and storage requirement. However, this type of chain has the most recovery complexity as it can involve two or more jobs, each of which might be stored on different media.
Full Backup
Host key fingerprint
Managed Google Play
Apple Business Manager
msconfig
Remove disk
Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.
Class of malware that modifies system files, often at the kernel level, to conceal its presence
Software that records information about a PC and its users, often installed without the user's consent.
Mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
Exploit techniques that use the host's scripting environment to create malicious processes. This refers to malicious code that uses the host’s scripting environment, such as Windows PowerShell or PDF JavaScript, to create new malicious processes in memory. As it may be disguised as script instructions or a document file rather than an executable image file, this type of malware can be harder to detect.
Type of malware that replicates between processes in system memory and can spread over client/server network connections.
These replicate between processes in system memory rather than infecting an executable file stored on disk. Worms can also exploit vulnerable client/server software to spread between hosts in a network.
Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
This is malware concealed within an installer package for software that appears to be legitimate. The malware will be installed alongside the program and execute with the same privileges. It might be able to add itself to startup locations so that it always runs when the computer starts or the user signs in. This is referred to as persistence.
These infect the boot sector code or partition table on a disk drive. When the disk is attached to a computer, the virus attempts to hijack the bootloader process to load itself into memory.
Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
Channels
Guest Access
http://192.168.0.1
EAP with Transport Layer Security
Digital Certificate
Encryption Key Pair
Trusted Platform Module
PIN / Password
Server Handshake
EAP over Wireless
Authentication, Authorizations and Accounting Server
Pairwise Master Key
Master Key
Permissions
GCMP
Advanced Encryption Standard
Botnet
Weakness that could be accidentally triggered or intentionally exploited to cause a security breach.
Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.
It's the likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
Potential for someone or something to exploit a vulnerability and breach security. A threat may be intentional or unintentional.
Attack Vector
Power
net user command
64-bit version of FAT designed for use with removable hard drives and flash media. Like NTFS, exFAT supports large volumes (128 petabytes) and file sizes (16 exabytes). There is also support for access permissions but not encryption.
The FAT file system is a very early type named for its method of organization—the file allocation table. The FAT provides links from one allocation unit to another. FAT32 is a variant of FAT that uses a 32-bit allocation table, nominally supporting volumes up to 2 TB. The maximum file size is 4 GB minus 1 byte.
FAT32 does not support any of the reliability or security features of NTFS. It is typically used to format the system partition (the one that holds the boot loader). It is also useful when formatting removable drives and memory cards intended for multiple operating systems and devices.
The New Technology File System (NTFS) is a proprietary file system developed by Microsoft for use with Windows. It provides a 64-bit addressing scheme, allowing for very large volumes and file sizes. In theory, the maximum volume size is 16 Exabytes, but actual implementations of NTFS are limited to between 137 GB and 256 Terabytes, depending on the version of Windows and the allocation unit size. The key NTFS features are:
crontab
ip
.rpm
.deb
chgrp
w
x
groupmod
groupdel
newgrp
usermod
userdel
passwd
du
.SAV file
.LOG file
System 32
Drivers
Power-saving state where the contents of memory are saved to hard disk (hiberfil.sys) and the computer is powered off. Restarting the computer restores the desktop.
Power-saving mode where power to all compatible components except system memory is cut. Note that systems on standby still consume some electricity.
A Microsoft Management Console (MMC) contains one or more snap-ins that are used to modify advanced settings for a subsystem, such as disks or users. The principal consoles available via Administrative Tools are:
Impact paper
Tractor fed
Use good quality and clean paper.
Insert the paper in the correct orientation and do not overload the input tray
DNS
USB
Thunderbolt
HDMI
Ethernet
USB-C
Audio Jack
Lightning
Preferred Roaming List
Thin Film Transistor
Vertical Alignment
In-Plane Switching
Twisted Nematic
Computing architecture where on-demand resources provisioned with the attributes of high availability, scalability, and elasticity are billed to customers on the basis of metered utilization.
The cost for maintaining more users is linear, meaning that if the number of users double, then the cost would also double.
The service guarantees that it'll run at high performance for the most part and experiences very little downtime.
Provides fully developed applications, rather than paying for a number of licenses, you can obtain the software running on the cloud servers and paying as you go.
Google Workspace
Salesforce
Microsoft Office 365
Provides in between IaaS and SaaS, meaning it provisions application and database services. A typical PaaS solution would deploy servers and storage network infrastructure (as per IaaS) but also provide a multi-tier web application/database platform on top.
Google Engine App
Microsoft Azure SQL
Oracle Database
Provides the network and physical resources to the client, such as servers, load balancers, SAN's, etc.
OpenStack
AWS
Microsoft Azure
Feature of cloud service models that allows customers to track and pay for precise compute, storage, and network resource units.
Parallels Workstation
Oracle Virtual Box
VM Workstation
Guest OS
Virutal Machine Manager
Computing environment where multiple independent operating systems can be installed to a single hardware platform and run simultaneously.
Container Virtualization
Server
Host OS
Docker Engine
Applications
Application Virtualization
This is where applications are running on a server and streamed to a client OS, as this allows for clients to always have the latest version.
Server-Side Virtualization
This means running a server role machine as a VM, since servers use for about 10% of hardware resources, this allows for up to 9 programs to be running on a single server with the same performance.
Client-Side Virtualization
Refers to any solution designed to run on "ordinary" desktops or workstations. Each user will be interacting with the virtualization host directly. Desktop virtual platforms, usually based on some sort of guest OS hypervisor, are typically used for testing and development
Training
Cross-Platform Virtualization
This allows for testing and development for applications to run on different OS's, this feature allows you to test that in one single machine.
Support Legacy software and OS's
Some applications are no longer supported in later OS versions, this allows the possibility for those programs to still execute by running on a VM an older OS version.
Sandbox
An environment where safe testing and development can occur as the host OS and the VM cannot communicate to each other, making malware impenetrable to the host OS.
Although VM's run on image files, they require a lot of storage, especially if snapshots are wanting to be created so that you can roll back to a specific settings in a particular session. However, in large enterprises, this usually isn't an issue as SAN's are available to use.
Each guest OS requires more memory than the host OS, for example if one Windows machine requires 2GB of RAM, then at least 4GB are required for it to be able to run both the host and guest OS, and it can add up quickly if more VM's are running.
AMD-V
Rapid Virtualization Indexing
VT-x
Extended Page Table
Telnet
VPN Gateway
IPv6
Interface ID
Network ID
StateLess Address Auto Configuration
IPv4
Subnet Mask
Domain Name System
Default Gateway
Network Address Translation
Host Number
Network Number
Public IP Address
Facilitated by an ISP
Private IP Address
Class C
192.168.0.0 to 192.168.255.255
Class B
172.16.0.0 to 172.31.255.255
Class A
10.0.0.0 to 10.255.255.255
Method of multiplexing a communications channel using a code to key the modulation of a particular signal. CDMA is associated with Sprint and Verizon cellular phone networks.
Standard for cellular radio communications and data transfer. GSM phones use a SIM card to identify the subscriber and network provider. 4G and later data standards are developed for GSM.
SIM Card
Is run all the way to the customer’s building. This full fiber connection type is implemented as a passive optical network (PON)
Optical Network Terminal
Retains some sort of copper wiring to the customer premises while extending the fiber link from the point of presence to a communications cabinet servicing multiple subscribers.
Cable Modem
Data Over Cable Service Interface Specification
DSL Modem
Splitter (if applicable)
RJ11
RJ45
5 GHz
2.4 GHz
900 MHz
FCC
Frequency Bands
5 GTz
Channels (23) Spaced at 20 MHz
Dynamic Frecuency Selection
802.11ac (WI-FI 5)
MU-MIMO
Use of spatial multiplexing to allow a wireless access point to support multiple client stations simultaneously.
802.11a
Channel Bonding
802.11ax (WI-FI 6)
OFDMA
Feature of Wi-Fi 6 allowing an access point to serve multiple client stations simultaneously.
802.11n (WI-FI 4)
MIMO
2.4 GTz
Channels (14) Spaced at 5 MHz
802.11g
802.11b
PoE
Not all switches support PoE.
If so, there are power injectors that will make it possible.
802.3bt
51 W
802.3at (PoE+)
25 W
802.3af
13 W
MAC Address
Has a larger core (62.5 or 50 microns) and is designed to carry a shorter wavelength infrared light (850 nm or 1,300 nm). MMF uses less expensive and less coherent LEDs or vertical cavity surface emitting lasers (VCSELs) and consequently is less expensive to deploy than SMF. However, MMF does not support such high signaling speeds or long distances as single-mode and so is more suitable for LANs than WANs.
Has a small core (8–10 microns) and is designed to carry a long wavelength (1,310 or 1,550 nm) infrared signal, generated by a high-power, highly coherent laser diode. Single-mode cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.
Lucent Connector
Subscriber Connector
Straight Tip
CAT Standards
6A
6
5e
5
Access Point
Mobile devices
Laptops
Workgroup Switch
Patch Panel
Wall Ports
Desktops
Switch
Network Servers
Printers
Network scope and type that uses wireless radio communications based on some variant of the 802.11 (Wi-Fi) standard series.
Standards developed as the IEEE 802.3 series describing media types, access methods, data rates, and distance limitations at OSI layers 1 and 2 using xBASE-y designations.
Network scope that spans a large geographical area, incorporating more than one site and often a mix of different media types and protocols plus the use of public telecommunications networks.
Can be used to mean a specific network type covering an area equivalent to a city or other municipality. It could mean a company with multiple connected networks within the same metropolitan area—so, larger than a LAN but smaller than a WAN.
A local area network (LAN) is a group of computers connected by cabling and one or more network switches that are all installed at a single geographical location. A LAN might span a single floor in a building, a whole building, or multiple nearby buildings (a campus). Any network where the nodes are within about 1 or 2 km (or about 1 mile) of one another can be thought of as "local." LAN cabling and devices are typically owned and managed by the organization that uses the network.
Network dedicated to provisioning storage resources, typically consisting of storage devices and servers connected to switches via host bus adapters.
A SAN is isolated from the main network. It is only accessed by servers, not by client PCs and laptops. SAN clients are servers running databases or applications. Provisioning a shared storage pool as a SAN is more flexible and reliable than using local disks on each server machine. SANs use connectivity technologies such as Fiber Channel and Internet SCSI (iSCSI).
For more details, visit the Troubleshooting Mind Map
To fully solve a problem, you should implement preventive measures. This means eliminating any factors that could cause the problem to reoccur. For example, if the power cable on a PC blows a fuse, you should not only replace the fuse, but also check to see if there are any power problems in the building that may have caused the fuse to blow in the first place. If a computer is infected with a virus, ensure that the antivirus software is updating itself regularly and users are trained to avoid malware risks.
Most troubleshooting takes place within the context of a ticket system. This shows who is responsible for any particular problem and what its status is. This gives you the opportunity to add a complete description of the problem and its solution (findings, actions, and outcomes).
This is very useful for future troubleshooting, as problems fitting into the same category can be reviewed to see if the same solution applies. Troubleshooting steps can be gathered into a "Knowledge Base" or Frequently Asked Questions (FAQ) of support articles. It also helps to analyze IT infrastructure by gathering statistics on what types of problems occur and how frequently.
The other value of a log is that it demonstrates what the support department is doing to help the business. This is particularly important for third-party support companies, who need to prove the value achieved in service contracts. When you complete a problem log, remember that people other than you may come to rely on it. Also, logs may be presented to customers as proof of troubleshooting activity. Write clearly and concisely, checking for spelling and grammar errors.
There are typically three generic approaches to resolving an IT problem:
When you determined the best solution, you must devise a plan of action to put the solution in place. You have to assess the resources, time, and cost required. Another consideration is potential impacts on the rest of the system that your plan of action may have. A typical example is applying a software patch, which might fix a given problem but cause other programs not to work.
An effective change and configuration management system will help you to understand how different systems are interconnected. You must seek the proper authorization for your plan and conduct all remedial activities within the constraints of corporate policies and procedures.
If you do not have authorization to implement a solution, you will need to escalate the problem to more senior personnel. If applying the solution is disruptive to the wider network or business, you also need to consider the most appropriate time to schedule the reconfiguration work and plan how to notify other network users.
When you make a change to the system as part of implementing a solution, test after each change. If the change does not fix the problem, reverse it, and then try something else. If you make a series of changes without recording what you have done, you could find yourself in a tricky position.
If you are completing troubleshooting steps under instruction from another technician—the vendor's support service, for instance—make sure you properly understand the steps you are being asked to take, especially if it requires disassembly of a component or reconfiguration of software that you are not familiar with.
If you cannot solve a problem yourself, it is better to escalate it than to waste a lot of time trying to come up with an answer. Formal escalation routes depend on the type of support service you are operating and the terms of any warranties or service contracts that apply. Some generic escalation routes include:
Choosing whether to escalate a problem is complex because you must balance the need to resolve a problem in a timely fashion against the possibility of incurring additional costs or adding to the burdens/priorities that senior staff are already coping with. You should be guided by policies and practices in the company you work for. When you escalate a problem, make sure that what you have found out or attempted so far is documented. After that, describe the problem clearly to whoever is taking over or providing you with assistance.
You cannot always rely on the user to describe the problem accurately or comprehensively. You may need to use research techniques to identify or clarify symptoms and possible causes. One of the most useful troubleshooting skills is being able to perform research to find information quickly. Learn to use web and database search tools so that you can locate information that is relevant and useful. Identify different knowledge sources available to you. When you research a problem, be aware of both internal documentation and information and external support resources, such as vendor support or forums.
As you identify symptoms and diagnose causes, take care not to overlook the obvious—sometimes seemingly intractable problems are caused by the simplest things. Diagnosis requires both attention to detail and a willingness to be systematic.
One way to consider a computer problem systematically is to step through what should happen, either by performing the steps yourself or by observing the user. Hopefully, this will identify the exact point at which there is a failure or error.
If this approach does not work, break the troubleshooting process into compartments or categories, such as power, hardware components, drivers/firmware, software, network, and user actions. If you can isolate your investigation to a particular subsystem by eliminating "non-causes," you can troubleshoot the problem more quickly. For example, when troubleshooting a PC, you might work as follows:
The first report of a problem will typically come from a user or another technician, and this person will be one of the best sources of information if you can ask the right questions. Before you begin examining settings in Windows or taking the PC apart, spend some time gathering information from the user about the problem. Ensure you ask the user to describe all the circumstances and symptoms. Some good questions to ask include:
Consider the importance of data stored on the local computer when you open a support case. Check when a backup was last made. If a backup has not been made, perform one before changing the system configuration, if possible.
Although the motherboard already has an Ethernet port, additional ports may be needed. The NIC provides just that.
The component in charge of providing an audio signal to a speaker or headphones. They contain audio jack ports to connect both in and out signal
SSD or HDD.
Removable storage devices:
RAID 0 (Striping without parity) is when data is spread across two disks, this is not fault-tolerant.
RAID 1 (Mirroring) is when data is replicated between two disks, this is more fault-tolerant as if one disk fails the other has the exact data.
RAID 5 (Striping with Distributed Parity) is similar to RAID 0 however, the three disks share a parity so if one disk fails it will allow to reconstruct of data from the parity.
RAID 10 (Stripe of mirrors) is when you combine RAID 1 but with more disks as at least four disks are required as two arrays are mirrored between two disks, so it provides the best fault-tolerance.
If there is not enough system RAM, the memory space can be extended by using disk storage. This is referred to as a pagefile or swap space. The total amount of addressable memory (system RAM plus swap space) is referred to as virtual memory or virtual RAM . With virtual memory, the OS assigns memory locations to processes in 4 kilobyte chunks called pages. The memory controller moves inactive pages of memory to the swap space to free up physical RAM and retrieves pages from the swap space to physical RAM when required by process execution. An excessive amount of such paging activity will slow the computer down because disk transfer rates are slower than RAM transfer rates.
Types of RAM:
Each DDR generation sets an upper limit on the maximum possible capacity. DDR for desktop system memory is packaged in a form factor called dual inline memory module (DIMM). The notches (keys) on the module’s edge connector identify the DDR generation (DDR3/DDR4/DDR5) and prevent it from being inserted into an incompatible slot or inserted the wrong way around. DDR DIMMs typically feature heat sinks, due to the use of high clock speeds.
Modules:
The component that is in charge of providing a signal to the monitor or projector.
Many motherboards contain an embedded video card, but often they are not powerful enough.
Most commonly a video card will contain a GPU capability and graphics memory alongside video ports such as HDMI, Displayport, and Thunderbolt.
The central processing unit (CPU), or simply the processor, executes program instruction code. When a software program runs (whether it be system firmware, an operating system, antivirus utility, or word-processing application), it is assembled into instructions utilizing the fundamental instruction set of the CPU platform and loaded into system memory. The CPU then performs the following basic operations on each instruction:
There exist different architectures like:
CPU architecture that exposes two or more logical processors to the OS, delivering performance benefits similar to multicore and multi socket to threaded applications.
The motherboard is the heart of a computer, it has attached all of the components and runs.
These processing and storage components are connected by bus interfaces implemented on the motherboard. The instructions and data are stored using transistors and capacitors and transmitted between components over the bus using electrical signals.
Motherboard Form Factors are:
Power cables that go directly into the motherboard are:
Input/Output Ports examples:
Boot options
Boot passwords and secure boot
Trusted Platform Module (TPM)
Like as powering the motherboard itself and where components obtain their power like the fans and disk drives.
Storage Connectors are:
Power Connectors are:
Like the RAM slots and adapter card slots.
Adapter connector slots:
Such as the CPU socket.
There are only two CPU manufacturers: Intel and AMD.
Intel uses the LGA socket
AMD uses the PGA socket
A computer needs to be at all times under optimal temperature at, because all the components generate heat, a cooling system is required to maintain a moderate temperature so that the computer doesn't overheat.
The PSU is in charge of providing electrical charge to all of the components of the computer, especially the motherboard.
It has various cables with different types of connectors that'll go on different components