Appendix E

Content Tracking to IT Fundamentals Domains and Objectives

Domain 1.0: IT Concepts and Terminology

Objective #

Objective

Book Ch. #, Title

Sections

Pg. #

1.1

Compare and contrast notational systems

Ch. 2, How Computers Store Data: Notational Systems

 

 

 

 

 

Binary

13

 

 

 

Hexadecimal

14

 

 

 

Decimal

17

 

 

Data representation

18

 

 

 

  • ASCII

18

 

 

 

  • Unicode

19

1.2

Compare and contrast fundamental data types and their characteristics

Ch. 3, Compare and Contrast Fundamental Data Types and Their Characteristics

 

 

 

 

 

Char

27

 

 

 

Strings

27

 

 

 

Numbers

28

 

 

 

  • Integers

29

 

 

 

  • Floats

29

 

 

 

Boolean

30

1.3

Illustrate the basics of computing and processing

Ch. 4, Input, Output, and More: The Basics of Computing and Processing

 

 

 

 

 

Input

37

 

 

 

Processing

39

 

 

 

Output

41

 

 

 

Storage

43

1.4

Explain the value of data and information

Ch. 5, Explain the Value of Data and Information

 

 

 

 

 

Data and information as assets

51

 

 

 

Importance of investing in security

51

 

 

 

Relationship of data to creating information

52

 

 

 

Intellectual property

54

 

 

 

  • Trademarks

54

 

 

 

  • Copyright

56

 

 

 

  • Patents

57

 

 

 

Digital products

58

 

 

 

Data-driven business decisions

58

 

 

 

  • Data capture and collection

59

 

 

 

  • Data correlation

59

 

 

 

  • Meaningful reporting

60

1.5

Compare and contrast common units of measure

Ch. 6, Common Units of Measure: Storage, Throughput, and Speed

 

 

 

 

 

Storage unit

67

 

 

 

  • Bit

67

 

 

 

  • Byte

68

 

 

 

  • KB

68

 

 

 

  • MB

68

 

 

 

  • GB

69

 

 

 

  • TB

70

 

 

 

  • PB

71

 

 

 

Throughput unit

73

 

 

 

  • bps

73

 

 

 

  • Kbps

73

 

 

 

  • Mbps

73

 

 

 

  • Gbps

74

 

 

 

  • Tbps

75

 

 

 

Processing speed

75

 

 

 

  • MHz

76

 

 

 

  • GHz

77

1.6

Explain the troubleshooting methodology

Ch. 7, Explain the Troubleshooting Methodology

 

 

 

 

 

Identify the problem

85

 

 

 

  • Gather information

89

 

 

 

  • Duplicate the problem, if possible

90

 

 

 

  • Question users

90

 

 

 

  • Identify symptoms

91

 

 

 

  • Determine if anything has changed

98

 

 

 

  • Approach multiple problems individually

99

 

 

 

Research knowledge base/Internet, if applicable

99

 

 

 

Establish a theory of probable cause

100

 

 

 

  • Question the obvious

100

 

 

 

  • Consider multiple approaches

100

 

 

 

  • Divide and conquer

101

 

 

 

Test the theory to determine the cause

102

 

 

 

  • Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem

103

 

 

 

  • If the theory is not confirmed, establish a new theory or escalate

103

 

 

 

Establish a plan of action to resolve the problem and identify potential effects

104

 

 

 

Implement the solution or escalate as necessary

105

 

 

 

Verify full system functionality and, if applicable, implement preventive measures

105

 

 

 

Document findings/lessons learned, actions, and outcomes

107

Domain 2.0 Infrastructure

Objective #

Objective

Book Ch. #, Title

Sections

Pg.#

2.1

Classify common types of input/output device interfaces

Ch. 8, I/O: Input/Output Device Interfaces

 

 

 

 

 

Networking

115

 

 

 

  • Wired

115

 

 

 

  • Telephone connector (RJ-11)

117

 

 

 

  • Ethernet connector (RJ-45)

118

 

 

 

  • Wireless

118

 

 

 

  • Bluetooth

118

 

 

 

  • NFC

120

 

 

 

  • Peripheral device

121

 

 

 

  • USB

121

 

 

 

  • FireWire

127

 

 

 

  • Thunderbolt

129

 

 

 

  • Bluetooth

131

 

 

 

  • RF

131

 

 

 

  • Graphic device

131

 

 

 

  • VGA

133

 

 

 

  • DVI

134

 

 

 

  • HDMI

134

 

 

 

  • DisplayPort

134

 

 

 

  • Mini DisplayPort

134

2.2

Given a scenario, set up and install common peripheral devices to a laptop/PC

Ch. 9, Connecting and Configuring Peripherals

 

 

 

 

 

Devices

143

 

 

 

  • Printer

144

 

 

 

  • Scanner

150

 

 

 

  • Keyboard

150

 

 

 

  • Mouse

152

 

 

 

  • Camera

153

 

 

 

  • External hard drive

154

 

 

 

  • Speakers

155

 

 

 

  • Display

157

 

 

 

Installation types

161

 

 

 

  • Plug-and-play vs. driver installation

161

 

 

 

  • Other required steps

163

 

 

 

  • IP-based peripherals

163

 

 

 

  • Web-based configuration steps

163

2.3

Explain the purpose of common internal computing components

Ch. 10, Explain the Purpose of Common Internal Computer Components

 

 

 

 

 

Motherboard/system board

171

 

 

 

Firmware/BIOS

175

 

 

 

RAM

177

 

 

 

CPU

179

 

 

 

  • ARM

180

 

 

 

  • Mobile phone

181

 

 

 

  • Tablet

181

 

 

 

  • 32-bit

182

 

 

 

  • Laptop

182

 

 

 

  • Workstation

183

 

 

 

  • Server

183

 

 

 

  • 64-bit

183

 

 

 

  • Laptop

185

 

 

 

  • Workstation

186

 

 

 

  • Server

186

 

 

 

GPU

186

 

 

 

Storage

188

 

 

 

  • Hard drive

188

 

 

 

  • SSD

188

 

 

 

Cooling

190

 

 

 

NIC

193

 

 

 

  • Wired vs. wireless

193

 

 

 

  • On-board vs. add-on card

195

2.4

Compare and contrast common Internet service types

Ch. 11, Internet Service Types

 

 

 

 

 

Fiber optic

203

 

 

 

Cable

205

 

 

 

DSL

209

 

 

 

Wireless

210

 

 

 

  • Radio frequency

210

 

 

 

  • Satellite

211

 

 

 

  • Cellular

212

2.5

Compare and contrast storage types

Ch. 12, Compare and Contrast Storage Types

 

 

 

 

 

Volatile vs. nonvolatile

221

 

 

 

Local storage types

221

 

 

 

  • RAM

221

 

 

 

  • Hard drive

226

 

 

 

  • Solid state vs. spinning disk

226-231

 

 

 

  • Optical

231

 

 

 

  • Flash drive

233

 

 

 

Local network storage types

238

 

 

 

  • NAS

238

 

 

 

  • File server

239

 

 

 

Cloud storage service

242

2.6

Compare and contrast common computing devices and their purposes

Ch. 13, Compare and Contrast Common Computing Devices and Their Purposes

 

 

 

 

 

Mobile phones

249

 

 

 

Tablets

250

 

 

 

Laptops

251

 

 

 

Workstations

252

 

 

 

Servers

253

 

 

 

Gaming consoles

256

 

 

 

IoT

258

 

 

 

  • Home appliances

259

 

 

 

  • Home automation devices

260

 

 

 

  • Thermostats

262

 

 

 

  • Security systems

262

 

 

 

  • Modern cars

264

 

 

 

  • IP cameras

265

 

 

 

  • Streaming media devices

265

 

 

 

  • Medical devices

266

2.7

Explain basic networking concepts

Ch. 14, Explain Basic Networking Concepts

 

 

 

 

 

Basics of network communication

273

 

 

 

  • Basics of packet transmission

273

 

 

 

  • DNS

275

 

 

 

  • URL-to-IP translation

275

 

 

 

  • LAN vs. WAN

276

 

 

 

Device addresses

276

 

 

 

  • IP address

276

 

 

 

  • MAC address

279

 

 

 

Basic protocols

280

 

 

 

  • HTTP/S

281

 

 

 

  • POP3

282

 

 

 

  • IMAP

282

 

 

 

  • SMTP

282

 

 

 

Devices

284

 

 

 

  • Modem

284

 

 

 

  • Router

284

 

 

 

  • Switch

284

 

 

 

  • Access point

285

 

 

 

  • Firewall

286

2.8

Given a scenario, install, configure, and secure a basic wireless network

Ch. 15, Given a Scenario, Install, Configure, and Secure a Basic Wireless Network

 

 

 

 

 

802.11a/b/g/n/ac

295

 

 

 

  • Older vs. newer standards

298

 

 

 

  • Speed limitations

302

 

 

 

  • Interference and attenuation factors

303

 

 

 

Best practices

304

 

 

 

  • Change SSID

305

 

 

 

  • Change default password

306

 

 

 

  • Encrypted vs. unencrypted

307

 

 

 

  • Open

307

 

 

 

  • Captive portal

307

 

 

 

  • Encrypted vs. unencrypted

308

 

 

 

  • WEP

308

 

 

 

  • WPA

308

 

 

 

  • WPA2

308

Domain 3.0: Applications and Software

Objective #

Objective

Book Ch. #, Title

Sections

Pg.#

3.1

Explain the purpose of operating systems

Ch. 16, Explain the Purpose of Operating Systems

 

 

 

 

 

Interface between applications and hardware

319

 

 

 

Disk management

319

 

 

 

Process management/scheduling

322

 

 

 

  • Kill process/end task

322

 

 

 

Application management

324

 

 

 

Memory management

330

 

 

 

Device management

333

 

 

 

Access control/protection

335

 

 

 

Types of OS

336

 

 

 

  • Mobile device OS

336

 

 

 

  • Workstation OS

336

 

 

 

  • Server OS

339

 

 

 

  • Embedded OS

341

 

 

 

  • Firmware

341

 

 

 

  • Hypervisor (Type 1)

342

3.2

Compare and contrast components of an operating system

Ch. 17, Operating Systems 101: Features, Processes, UI, and Management

 

 

 

 

 

File systems and features

351

 

 

 

  • File systems

351

 

 

 

  • NTFS

352

 

 

 

  • FAT32

352

 

 

 

  • HFS

353

 

 

 

  • Ext4

354

 

 

 

Features

355

 

 

 

  • Compression

355

 

 

 

  • Encryption

357

 

 

 

  • Permissions

359

 

 

 

  • Journaling

363

 

 

 

  • Limitations

364

 

 

 

  • Naming rules

364

 

 

 

File management

366

 

 

 

  • Folders/directories

366

 

 

 

  • File types and extensions

367

 

 

 

  • Permissions

359

 

 

 

Services

374

 

 

 

Processes

377

 

 

 

Drivers

381

 

 

 

Utilities

384

 

 

 

  • Task scheduling

385

 

 

 

Interfaces

387

 

 

 

  • Console/command line

387

 

 

 

  • GUI

389

3.3

Explain the purpose and proper use of software

Ch. 18, Purpose and Proper Use of Software

 

 

 

 

 

Productivity software

397

 

 

 

  • Word processing software

397

 

 

 

  • Spreadsheet software

398

 

 

 

  • Presentation software

399

 

 

 

  • Web browser

400

 

 

 

  • Visual diagramming software

402

 

 

 

Collaboration software

403

 

 

 

  • Email client

403

 

 

 

  • Conferencing software

404

 

 

 

  • Instant messaging software

404

 

 

 

  • Online workspace

405

 

 

 

  • Document sharing

405

 

 

 

Business software

406

 

 

 

  • Database software

407

 

 

 

  • Project management software

408

 

 

 

  • Business-specific applications

409

 

 

 

  • Accounting software

409

3.4

Explain methods of application architecture and delivery models

Ch. 19, Getting Apps from Source to Your Device

 

 

 

 

 

Application delivery methods

417

 

 

 

  • Locally installed

417

 

 

 

  • Network not required

418

 

 

 

  • Application exists locally

417

 

 

 

  • Files saved locally

417

 

 

 

  • Local network hosted

418

 

 

 

  • Network required

418

 

 

 

  • Internet access not required

418

 

 

 

  • Cloud hosted

418

 

 

 

  • Internet access required

418

 

 

 

  • Service required

418

 

 

 

  • Files saved in the cloud

418

 

 

 

Application architecture models

419

 

 

 

  • One tier

419

 

 

 

  • Two tier

420

 

 

 

  • Three tier

420

 

 

 

  • N-tier

421

3.5

Given a scenario, configure and use web browsers

Ch. 20, Configuring and Using Web Browsers

 

 

 

 

 

Caching/clearing cache

427

 

 

 

Deactivate client-side scripting

429

 

 

 

Browser add-ons/extensions

430

 

 

 

  • Add

431

 

 

 

  • Remove

432

 

 

 

  • Enable/disable

431

 

 

 

Private browsing

433

 

 

 

Proxy settings

434

 

 

 

Certificates

436

 

 

 

  • Valid

436

 

 

 

  • Invalid

437

 

 

 

Pop-up blockers

439

 

 

 

Script blockers

440

 

 

 

Compatible browser for application(s)

440

3.6

Compare and contrast general application concepts and uses

Ch. 21, Compare and Contrast General Application Concepts and Uses

 

 

 

 

 

Single-platform software

449

 

 

 

Cross-platform software

449

 

 

 

  • Compatibility concerns

450

 

 

 

Licensing

454

 

 

 

  • Single use

454

 

 

 

  • Group use/site license

454

 

 

 

  • Concurrent license

455

 

 

 

  • Open source vs. proprietary

456

 

 

 

  • Subscription vs. one-time purchase

457

 

 

 

  • Product keys and serial numbers

457

 

 

 

Software installation best practices

458

 

 

 

  • Reading instructions

459

 

 

 

  • Reading agreements

464

 

 

 

  • Advanced options

465

Domain 4.0: Software Development Concepts

Objective #

Objective

Book Ch. #, Title

Sections

Pg.#

4.1

Compare and contrast programming language categories

Ch. 22, Compare and Contrast Programming Language Categories

 

 

 

 

 

Interpreted

475

 

 

 

  • Scripting languages

475

 

 

 

  • Scripted languages

479

 

 

 

  • Markup languages

480

 

 

 

Compiled programming languages

483

 

 

 

Query languages

486

 

 

 

Assembly language

487

4.2

Given a scenario, use programming organizational techniques and interpret logic

Ch. 23, Using Programming Organizational Techniques and Interpret Logic

 

 

 

 

 

Organizational techniques

497

 

 

 

  • Pseudocode concepts

497

 

 

 

  • Flow-chart concepts

498

 

 

 

  • Sequence

499

 

 

 

Logic components

501

 

 

 

  • Branching

501

 

 

 

  • Looping

502

4.3

Explain the purpose and use of programming concepts

Ch. 24, Explain the Purpose and Use of Programming Concepts

 

 

 

 

 

Identifiers

511

 

 

 

  • Variables

511

 

 

 

  • Constants

511

 

 

 

Containers

512

 

 

 

  • Arrays

512

 

 

 

  • Vectors

512

 

 

 

Functions

512

 

 

 

Objects

513

 

 

 

  • Properties

513

 

 

 

  • Attributes

513

 

 

 

  • Methods

514

Domain 5.0: Database Fundamentals

Objective #

Objective

Book Ch. #, Title

Sections

Pg.#

5.1

Explain database concepts and the purpose of a database

Ch. 25, Explain Database Concepts and the Purpose of a Database

 

 

 

 

 

Usage of database

521

 

 

 

  • Create

522

 

 

 

  • Import/input

523

 

 

 

  • Query

525

 

 

 

  • Reports

527

 

 

 

Flat file vs. database

528

 

 

 

  • Multiple concurrent users

529

 

 

 

  • Scalability

529

 

 

 

  • Speed

530

 

 

 

  • Variety of data

530

 

 

 

Records

531

 

 

 

Storage

532

 

 

 

  • Data persistence

533

5.2

Compare and contrast various database structures

Ch. 26, Compare and Contrast Various Database Structures

 

 

 

 

 

Structured vs. semi-structured vs. non-structured

541

 

 

 

Relational databases

545

 

 

 

  • Schema

545

 

 

 

  • Tables

545

 

 

 

  • Rows/records

546

 

 

 

  • Fields/columns

546

 

 

 

  • Primary key

546

 

 

 

  • Foreign key

546

 

 

 

  • Constraints

546

 

 

 

Non-relational databases

547

 

 

 

  • Key/value databases

547

 

 

 

  • Document databases

548

5.3

Summarize methods used to interface with databases

Ch. 27, Summarize Methods Used to Interface with Databases

 

 

 

 

 

Relational methods

555

 

 

 

  • Data manipulation

555

 

 

 

  • Select

555

 

 

 

  • Insert

558

 

 

 

  • Delete

559

 

 

 

  • Update

559

 

 

 

  • Data definition

560

 

 

 

  • Create

560

 

 

 

  • Alter

561

 

 

 

  • Drop

561

 

 

 

  • Permissions

561

 

 

 

Database access methods

561

 

 

 

  • Direct/manual access

582

 

 

 

  • Programmatic access

582

 

 

 

  • User interface/utility access

582

 

 

 

  • Query/report builders

582

 

 

 

Export/import

563

 

 

 

  • Database dump

565

 

 

 

  • Backup

566

Domain 6.0: Security

Objective #

Objective

Book Ch. #, Title

Sections

Pg.#

6.1

Summarize confidentiality, integrity, and availability concerns

Ch. 28, Confidentiality, Integrity, and Availability Concerns

 

 

 

 

 

Confidentiality concerns

575

 

 

 

  • Snooping

575

 

 

 

  • Eavesdropping

576

 

 

 

  • Wiretapping

577

 

 

 

  • Social engineering

578

 

 

 

  • Dumpster diving

578

 

 

 

Integrity concerns

579

 

 

 

  • Man-in-the-middle

579

 

 

 

  • Replay attack

580

 

 

 

  • Impersonation

580

 

 

 

  • Unauthorized information alteration

581

 

 

 

Availability concerns

581

 

 

 

  • Denial of service

581

 

 

 

  • Power outage

582

 

 

 

  • Hardware failure

582

 

 

 

  • Destruction

583

 

 

 

  • Service outage

583

6.2

Explain methods to secure devices and best practices

Ch. 29, Device Security Best Practices

 

 

 

 

 

Securing devices (mobile/workstation)

591

 

 

 

  • Antivirus/Anti-malware

591

 

 

 

  • Host firewall

593

 

 

 

  • Changing default passwords

595

 

 

 

  • Enabling passwords

595

 

 

 

  • Safe browsing practices

596

 

 

 

  • Patching/updates

597

 

 

 

Device use best practices

602

 

 

 

  • Software sources

602

 

 

 

  • Validating legitimate sources

602

 

 

 

  • Researching legitimate sources

603

 

 

 

  • OEM websites vs. third-party websites

603

 

 

 

  • Removal of unwanted software

603

 

 

 

  • Removal of unnecessary software

606

 

 

 

Removal of malicious software

606

6.3

Summarize behavioral security concepts

Ch. 30, Summarize Behavioral Security Concepts

 

 

 

 

 

Expectations of privacy when using:

615

 

 

 

  • The Internet

615

 

 

 

  • Social networking sites

617

 

 

 

  • Email

617

 

 

 

  • File sharing

618

 

 

 

  • Instant messaging

620

 

 

 

  • Mobile applications

621

 

 

 

  • Desktop software

623

 

 

 

  • Business software

625

 

 

 

  • Corporate network

629

 

 

 

Written policies and procedures

630

 

 

 

Handling of confidential information

631

 

 

 

  • Passwords

631

 

 

 

  • Personal information

631

 

 

 

  • Customer information

632

 

 

 

  • Company confidential information

632

6.4

Compare and contrast authentication, authorization, accounting, and nonrepudiation concepts

Ch. 31, Compare and Contrast Authentication, Authorization, Accounting, and Nonrepudiation Concepts

 

 

 

 

 

Authentication

639

 

 

 

  • Single factor

639

 

 

 

  • Multifactor

640

 

 

 

  • Examples of factors

640

 

 

 

  • Password

640

 

 

 

  • PIN

640

 

 

 

  • One-time password

640

 

 

 

  • Software token

641

 

 

 

  • Hardware token

641

 

 

 

  • Biometrics

642

 

 

 

  • Specific location

643

 

 

 

  • Security questions

644

 

 

 

  • Single sign-on

645

 

 

 

Authorization

645

 

 

 

  • Permissions

646

 

 

 

  • Least privilege model

647

 

 

 

  • Role-based access

647

 

 

 

  • User account types

648

 

 

 

  • Rule-based access

649

 

 

 

  • Mandatory access controls

649

 

 

 

  • Discretionary access controls

650

 

 

 

Accounting

650

 

 

 

  • Logs

650

 

 

 

  • Tracking

654

 

 

 

  • Web browser history

655

 

 

 

Nonrepudiation

655

 

 

 

  • Video

655

 

 

 

  • Biometrics

655

 

 

 

  • Signature

656

 

 

 

  • Receipt

656

6.5

Explain password best practices

Ch. 32, Explain Password Best Practices

 

 

 

 

 

Password length

665

 

 

 

Password complexity

665

 

 

 

Password history

668

 

 

 

Password expiration

669

 

 

 

Password reuse across sites

672

 

 

 

Password managers

673

 

 

 

Password reset process

673

6.6

Explain common uses of encryption

Ch. 33, Explain Common Uses of Encryption

 

 

 

 

 

Plain text vs. cipher text

685

 

 

 

Data at rest

686

 

 

 

  • File level

686

 

 

 

  • Disk level

689

 

 

 

  • Mobile device

693

 

 

 

Data in transit

694

 

 

 

  • Email

694

 

 

 

  • HTTPS

696

 

 

 

  • VPN

696

 

 

 

  • Mobile application

697

6.7

Explain business continuity concepts

Ch. 34, Explain Business Continuity Concepts

 

 

 

 

 

Fault tolerance

705

 

 

 

  • Replication

705

 

 

 

  • Redundancy

705

 

 

 

  • Data

705

 

 

 

  • Network

708

 

 

 

  • Power

709

 

 

 

  • Backup considerations

709

 

 

 

  • Data

710

 

 

 

  • File backups

710

 

 

 

  • Critical data

713

 

 

 

  • Database

713

 

 

 

  • OS backups

714

 

 

 

  • Location

715

 

 

 

  • Stored locally

715

 

 

 

  • Cloud storage

715

 

 

 

  • On-site vs. off-site

716

 

 

 

  • Contingency plan

716

 

 

 

Disaster recovery

717

 

 

 

  • Data restoration

718

 

 

 

  • Prioritization

718

 

 

 

  • Restoring access

719

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset