Tra Studyguide Preview 041805 Old
Tra Studyguide Preview 041805 Old
SUC
UCCE
ESS S A N D ACCO
ACC O M
MPLI
PLI SHM
SH MEN
ENTT
STUDY GUIDE
PREVIEW
www.transcender.com/club
YO U R G U I D E TO S
SUC
UCCE
ESS S A N D ACCO
ACC O M
MPLI
PLI SHM
SH MEN
ENTT
STUDY GUIDE
Cert-220-601
CompCert: A+ Essentials
www.transcender.com/club
CompTIA 220-601 Study Guide
Transcender
500 Northridge Road
Suite 240
Atlanta, GA 30350
www.transcender.com
www.transcender.com
2
CompTIA 220-601 Study Guide
Contents
Contents......................................................................................................................... 3
About Your Transcender Study Guide .......................................................................................................... 5
Personal Computer Components ................................................................................ 6
Identify the Fundamental Principles of Using Personal Computers.............................................................. 7
Install, Configure, Optimize, and Upgrade Personal Computer Components ............................................ 25
Identify Tools, Diagnostic Procedures, and Troubleshooting Techniques for Personal Computer
Components................................................................................................................................................ 32
Perform Preventive Maintenance on Personal Computer Components..................................................... 40
Review Checklist: Personal Computer Components .................................................................................. 43
Laptops and Portable Devices ................................................................................... 44
Identify Fundamental Principles of Using Laptops and Portable Devices .................................................. 45
Install, Configure, Optimize, and Upgrade Laptops and Portable Devices................................................. 53
Use Tools, Diagnostic Procedures, and Troubleshooting Techniques for Laptops and Portable Devices 61
Perform Preventive Maintenance on Laptops and Portable Devices ......................................................... 65
Review Checklist: Laptops and Portable Devices ...................................................................................... 68
Operating Systems...................................................................................................... 69
Identify the Fundamental Principles of Operating Systems ........................................................................ 70
Install, Configure, Optimize, and Upgrade Operating Systems .................................................................. 79
Identify Tools, Diagnostic Procedures, and Troubleshooting Techniques for Operating Systems............. 90
Perform Preventive Maintenance for Operating Systems......................................................................... 105
Review Checklist: Operating Systems ...................................................................................................... 107
Printers and Scanners .............................................................................................. 108
Identify the Fundamental Principles of Printers and Scanners ................................................................. 109
Install, Configure, Optimize, and Upgrade Printers and Scanners ........................................................... 115
Identify Tools, Diagnostic Procedures, and Troubleshooting Techniques for Printers and Scanners...... 118
Review Checklist: Printers and Scanners ................................................................................................. 124
Networks .................................................................................................................... 125
Identify the Fundamental Principles of Networks...................................................................................... 126
Install, Configure, Optimize, and Upgrade Networks................................................................................ 140
Identify Tools, Diagnostic Procedures, and Troubleshooting Techniques for Networks .......................... 143
Review Checklist: Networks...................................................................................................................... 148
Security ...................................................................................................................... 149
Identify the Fundamental Principles of Security........................................................................................ 150
Install, Configure, Upgrade, and Optimize Security.................................................................................. 159
Identify Tools, Diagnostic Procedures, and Troubleshooting Techniques for Security ............................ 163
Perform Preventive Maintenance for Computer Security ......................................................................... 167
Review Checklist: Security........................................................................................................................ 170
Safety and Environmental Issues ............................................................................ 171
Describe the Aspects and Importance of Safety and Environmental Issues ............................................ 172
Identify Potential Hazards and Implement Proper Safety Procedures ..................................................... 176
Identify Proper Disposal Procedures for Batteries, Display Devices, Chemical Solvents, and Cans....... 179
Review Checklist: Safety and Environmental Issues................................................................................ 180
Communication and Professionalism ..................................................................... 181
Use Good Communication Skills when Communicating with Customers and Colleagues ...................... 182
Use Job-Related Professional Behavior ................................................................................................... 185
Review Checklist: Communication and Professionalism .......................................................................... 187
www.transcender.com
3
CompTIA 220-601 Study Guide
www.transcender.com
4
CompTIA 220-601 Study Guide
The Study Guide is objective-driven and contains a variety of tools to help you focus your study
efforts. Each Study Guide contains structured sections to help you prepare for your certification
exam:
Scope :: identifies the learning objectives for each section
Focused Explanation :: provides definitions, in-depth discussions and examples
Review Checklist :: highlights the key learning points at the end of each major section
Additional sections to further assist you are located at the end of each Study Guide:
Test Taking Strategies
General Tips
Explanation of Test Item Types
The following study model will help you optimize your study time.
Prepare
Develop a Assess your Focus on Track your
To
Study Plan knowledge weak areas progress
Pass
Start early, at least Assess your current Read the Study Take a Transcender
6 weeks out knowledge level Guide by objective practice exam using
Dont try to cram Take a Transcender Use the practice Preset Experience
Set aside specific practice exam using exam in Optimize again
study times Preset Experience Experience mode If you didnt score 100%,
Use a disciplined The objective-based Study the test items go back to your study
approach so you score report shows by objective plan and focus on weak
can thoroughly you the areas where Use the included areas
prepare you are strong and TranscenderFlash Study those objective
Stick to your plan the areas where you cards to review key areas where you didnt
need to focus your concepts score 100%
study efforts Use your favorite Keep practicing until
references to get you consistently score
further information 100% in all areas
on complex material
Transcenders commitment to product quality, to our team and to our customers continues to
differentiate us from other companies. Transcender uses an experienced team of certified
subject-matter experts, technical writers, and technical editors to create and edit the most in-
depth and realistic study material. Every Transcender product goes through a rigorous, multi-
stage editing process to ensure comprehensive coverage of exam objectives. Transcender
study materials reinforce learning objectives and validate knowledge so you know youre
prepared on exam day.
www.transcender.com
4
CompTIA 220-601 Study Guide
www.transcender.com
108
CompTIA 220-601 Study Guide
Focused Explanation
Printers are used to print information from a computer. You can use a printer to print text, images, graphs,
and other printable information. Printers are divided into two main categories: impact printers and non-
impact printers.
Types of Printers
Depending on the printing requirement, different types of printers are used. Printers are divided into two
categories:
Impact printers: These types of printers use a print head that strikes on the ribbon to print
characters on a paper. Examples of impact printers are dot-matrix printers and daisy wheel
printers. An impact printer allows you to print multi-part forms and carbon copies of documents.
Non-impact printers: These types of printers use a print head that does not strike the paper.
Unlike impact printers, non-impact printers do not allow carbon copies to be made with a single
print cycle. Examples of non-impact printers are laser printers, ink-jet printers, thermal printers,
and solid ink printers.
Similar to other computer peripherals, printers have evolved over the years. Depending on the printing
requirement, different types of printers are used
A dot-matrix printer is an impact printer. Dot-matrix printers can print multi-part forms, also known as
carbon copy printing. In multi-part form printing, two or more papers are interleaved with sheets of carbon
paper. The print head strikes the top sheet, and the impact transfers the carbon image to the additional
sheets. Dot-matrix printers can also print multi-part forms using a carbonless form of duplicate printing.
Laser Printers
A laser printer is a non-impact printer that produces high quality text and graphics on plain paper. Laser
printers are also referred to as page printers because these printers receive job instructions one page at a
time. These printers use toner instead of liquid ink. A laser printer has many advantages, such as faster
speed and low printing cost. The slowest laser printer can print approximately four pages per minute
(ppm), and the fastest printer can print approximately 200 monochrome ppm.
www.transcender.com
109
CompTIA 220-601 Study Guide
Inkjet Printers
An inkjet printer is a non-impact printer that uses liquid ink stored in cartridges and can produce high
quality output for text and graphics. These printers are commonly used in homes and small businesses.
Inkjet printers cost less than laser printers, however, the printing cost of an inkjet printer is higher because
of the cost of ink cartridges.
Thermal Printers
Thermal printers are non-impact printers that use a heated head to enable images to appear on a special
paper. Thermal printers are usually found in some modern cash registers and fax machines.
Thermal Wax Transfer printer: Uses wax-based ink for printing on paper. The print head of the
printer, known as the thermal print head, melts the wax-based ink and pushes the ink out through
the nozzles onto the paper. Thermal wax transfer printers, also referred to as solid ink printers,
are available as monochrome, three-color, and four-color thermal wax transfer printers. These
printers do not require special paper. Each page requires a full page of wax to print, regardless of
the amount of data on the page.
Direct Thermal printer: Prints burning dots on heat-sensitive paper. Direct thermal printers are
fast, but result in low quality printing. These printers require special paper.
Printer Components
A printer includes several components that work together in printing.
A laser printer includes various components. The following are the major components of a laser printer:
Toner cartridge: Holds the toner, which is a combination of carbon compound, polyester resins,
and iron particles.
Fuser assembly: Consists of two rollers that heat and fuse the toner onto the paper. This prevents
the toner from being brushed off if anything touches the paper.
High-voltage power supply: Converts the standard 120 volt from your wall outlet to the higher
voltages required to energize both the corona wire and the transfer corona wire.
DC power supply: Provides power to the rest of printer components, such as the circuit boards,
motors, and other electrical parts that do not require high voltage.
Paper transport assembly: Moves paper from one component to the other as part of the printing
process.
www.transcender.com
110
CompTIA 220-601 Study Guide
Corona: Transfers the toner from the drum to the paper. It does this by using high voltage current
to give the paper a charge, causing the toner to stick to the paper.
Printer controller circuitry: Converts print signals from a computer into signals that the printer
components can use.
A laser printer contains other components that assist in printing. These components are the main
control board and read-only memory module. The main control board, also referred to as interface
controller, includes a processor, Basic Input/Output System (BIOS) firmware, random access
memory (RAM), and read-only memory (ROM) modules. The ROM module contains printer
languages and fonts.
Power supply board: Supplies power to the printer electronics, such as the circuit boards, within
the printer and electromechanical components, such as the paper feed mechanism and nozzle
assembly, within the printer.
Main control board: Controls the operation of the printer. The main control board contains the
circuitry for controlling the paper feed and the circuitry that drives the nozzle assembly.
Ink cartridge: Contains ink. Black and white printers use a single black ink cartridge. Color printers
may use a black cartridge and a partitioned cartridge containing cyan-, yellow-, and magenta-
colored inks.
Ink cartridge print head assembly: Consists of nozzles (one for each color of ink) that move
horizontally back and forth across the paper. The print head traverses the paper horizontally,
depositing drops of ink to form characters or graphics on the paper. The cartridges are a part of
the ink cartridge print head assembly, and move with the print head.
Paper feed mechanism: Feeds and moves the paper as printing proceeds. Inkjet printers use
friction feed. The paper feed mechanism is driven by a motor allowing the printer to move the
paper.
Ink cartridge print head assembly positioning motor: Horizontally traverses the ink cartridge print
head assembly across the paper during printing. The main control board drives the motor.
Printer Interfaces
The connection through which a printer is connected to a computer is referred as the printer interface.
Printers use various interfaces, such as a parallel interface, network interface, Universal Serial Bus (USB)
interface, serial interface, IEEE 1394/FireWire interface, wireless interface, and Small Computer System
Interface (SCSI) interface, to communicate with a computer.
www.transcender.com
111
CompTIA 220-601 Study Guide
Parallel Interface
Parallel printer cables use a 36-pin Centronics connector on the end that attaches to a printer, and a male
DB-25 connector on the end that attaches to a computer's parallel port. The Institute of Electrical and
Electronics Engineers (IEEE) created a specification for an IEEE 1284 cable, which is used for
bidirectional data transfer. A standard cable allows data transfers from a computer to a printer, but the
IEEE 1284 cable allows the printer to send data back to the computer. Parallel printer cables are normally
limited to 10 feet in length.
Network Interface
Printers that can be configured on the network are known as network printers. These printers are
equipped with a network interface card (NIC), configured with an IP address, and are able to execute print
jobs sent by remote computers on the network. A network printer appears to the network as another host
and typically uses the RJ-45 port to connect to the network. You can connect network printers using a
network cable. To attach a network cable to the network printer, connect one end to the RJ-45 port in the
printer and other end to any available RJ-45 port on the network.
Some printers are connected to a central print server to enable central maintenance and configuration.
Using a print server, the printer drivers for all operating systems can be installed in a central location,
ready for installation on any networked computer.
USB Interface
The USB interface allows you to connect the printer to your computers USB port. The USB port provides
faster transfer rates, and it is hot-swappable and supported by most of the available operating systems. A
USB 1.0 interface allows the data transfer speed of 1.5 megabits per second (Mbps), and a USB 2.0
interface allows the data transfer speed of 480 Mbps. This interface is widely used and is the fastest
interface for printing from a computer.
Serial Interface
Serial interface printers tend to be slow, due to the speed of the serial interface. The data transfer speed
of serial interface is slow because this interface transfers data one bit at a time. The only advantage of
using a serial interface for printers is that you can use a longer cable to connect the printer to a computer.
IEEE 1394/FireWire
The IEEE 1394/FireWire port is a high-speed serial-transmission port that allows devices to be hot-
plugged. A FireWire port can be seen in modern laptops. The high data transfer rates make it the port of
choice for transferring digital image files.
www.transcender.com
112
CompTIA 220-601 Study Guide
Wireless Interface
A wireless interface is used to connect printers without using a network cable. Wireless interface
technologies, such as Bluetooth, 802.11b, and infrared, are becoming popular for connecting a printer to
a computer. Bluetooth is a wireless technology that provides convergence between a variety of wireless-
enabled devices, such as computers, printers, cellular telephones, Personal Digital Assistants (PDAs),
and other Bluetooth-supported devices. The IEEE 802.11b is a wireless standard and is referred to as Wi-
Fi. Most printers have a built-in 802.11b interface that is used to connect printers on a wireless network.
Infrared is also used as a wireless interface to establish communication with other infrared compatible
devices. There are many infrared devices available, such as printers and laptops. The infrared devices
work in a limited area of one meter and require a clear view of other devices with which they are
communicating.
SCSI Interface
SCSI printers can print at speeds faster than parallel port printers. However, SCSI printers are rarely used
because SCSI is a relatively expensive interface.
Recap
Printers are divided into two categories: impact printers and non-impact printers.
Impact printers use a print head that strikes on the ribbon to print characters on paper.
Non-impact printers use a print head that does not strike the paper.
A laser printer is a type of non-impact printer that produces high quality text and graphics on a
plain paper.
An inkjet is a type of non-impact printer. These printers use liquid ink and produce high quality
output.
Dot-matrix printers are often used for printing multi-part forms, also known as carbon copy printing.
In multi-part form printing, two or more papers are interleaved with sheets of carbon paper or a
carbonless form for duplicate printing.
Thermal printers are non-impact printers and use a heated head to enable images to appear on a
special paper.
Thermal printers are mainly divided into two categories: thermal wax transfer printer and direct
thermal printer.
The toner cartridge holds the toner, which is a combination of carbon compound, polyester resins,
and iron particles.
The corona is part of the laser printing system that transfers the toner from the drum to the paper.
Black and white printers use a single black ink cartridge. Color printers may use a black cartridge
and a partitioned cartridge containing cyan-, yellow-, and magenta-colored inks.
www.transcender.com
113
CompTIA 220-601 Study Guide
Parallel printer cables use a 36-pin Centronics connector on the end that attaches to a printer, and
a male DB-25 connector on the end that attaches to a computer's parallel port.
Printers that can be configured on the network are known as network printers. A network printer
appears to the network as another host and typically uses the RJ-45 port to connect to the
network.
The USB interface is used for serial data transfers and allows high transfer speeds. The hot-swap
capabilities of these interfaces make them attractive for use with printers.
Serial interface printers can be slow, due to the speed of the serial interface.
The IEEE 1394/FireWire port is a high-speed serial-transmission port that allows devices to be
hot-plugged.
Wireless interface is used to connect printers without using a network cable. Wireless interface
technologies, such as Bluetooth, 802.11b, and infrared, are becoming popular.
www.transcender.com
114
CompTIA 220-601 Study Guide
Focused Explanation
To make a printer operational, you should first install the printer. USB printers support the Windows Plug-
and-Play (PnP) feature that automatically detects the printer and installs the required driver for the printer.
Unlike USB printers, you have to manually install parallel printers on a computer. This requires turning off
the computer, connecting the printer to the computer, and then restarting the computer to install the
printer driver. After installing the printer, you should configure printer options to optimize the printer's
performance according to your requirements.
Microsoft Windows XP supports the PnP feature that automatically detects and installs peripheral
devices, such as mouse, printers, and scanners. To determine whether a new printer is supported by
Windows operating system, you should check the Hardware Compatibility List (HCL) provided by
Microsoft for your version of Windows operating system. You should also check the printer's
documentation to see whether the device supports a particular version of Windows operating system.
Modern printers use a USB interface to connect to a computer. To install a USB printer, you should
connect the printer to a computer and let the Windows XP PnP feature automatically detect and install the
appropriate printer driver. If an operating system is unable to install the appropriate printer driver
automatically, you should use driver installation media provided by the printer manufacturer to install the
printer on the computer.
If you want to install a parallel printer on a Windows XP computer, you should use the Add a printer
option in the Printers and Faxes icon in Control Panel. You should read the instructions specified in the
printers manual before installing a new printer.
After installing the printer, you must configure the printer options and settings. To configure the printer
options, you should adhere to the following steps:
Click the Device Settings tab. You can configure printer options, such as the Form to Tray
Assignment option that is used to set paper trays used by a printer.
www.transcender.com
115
CompTIA 220-601 Study Guide
Click the Advanced tab, and click Printing Defaults. This will reset your printer settings to default
settings.
You should print a test page to check if the printer is installed and configured correctly. By printing a test
page, you can verify the printer configuration, such as data format, share name, location, driver name,
and driver version. The test page also allows you to inspect the print quality.
To print a test page on a network printer in Windows XP computer, perform the following steps:
On the General tab of the printer's Properties dialog box, click Print Test Page.
Note: You can use low-resolution printing to achieve high-speed printing with low quality.
You can optimize printer performance by configuring printer settings, such as tray switching, print spool
settings, device calibration, media types, and paper orientation.
You can configure tray switching from the Device Settings in the printer's Properties dialog box. To
configure tray selection, follow these steps:
On the Paper/Quality tab, you can set Tray Selection options, such as Paper Source and Media
Type.
On the Layout tab, you can set paper orientation by selecting Portrait or Landscape.
www.transcender.com
116
CompTIA 220-601 Study Guide
Scanners
Scanners are used for scanning documents or pictures. Scanners are often compatible with parallel
connectors, such as a computer's DB-25 female connector, which is often used to connect a parallel
printer to a computer. Image scanners can connect to a computer through either a USB port or a parallel
port. Other popular high-speed interfaces used by scanners include SCSI or IEEE 1394/FireWire. Some
scanners also use the RS-232 serial port. However, the RS-232 serial port has a low bandwidth.
Therefore, nowadays scanners are rarely designed to transfer data to a computer by using RS-232
connections.
To install a scanner that uses a USB interface, you need to connect the scanner to the USB port on the
computer and allow the Windows XP PnP feature to automatically detect the scanner and install the
appropriate scanner driver. If you are installing a parallel scanner, you should install the scanner by using
the Scanners and Cameras option in Control Panel and use the scanner driver installation media
provided by the manufacturer.
Recap
Windows XP supports the PnP feature that automatically detects and installs peripheral devices,
such as mouse and printers.
If an operating system is unable to install the appropriate printer driver automatically, you should
use the driver installation media provided by the vendor to install a printer on a computer.
You should print a test page to check if the printer is installed and configured correctly. By printing
a test page, you can verify the printer configuration, such as data format, share name, location,
driver name, and driver version.
You can optimize printer performance by configuring printer settings, such as tray switching, print
spool settings, device calibration, media types, and paper orientation.
To install a USB scanner, connect the scanner to the USB port on the computer and allow the
Windows XP PnP feature to automatically detect and install the appropriate scanner driver.
www.transcender.com
117
CompTIA 220-601 Study Guide
Focused Explanation
Most printers have a self-test capability that allows them to test their functionality when a printer starts. If
you suspect a problem with a printer, you should first run the self test to check the functionality of the
printer. If the self test is successful, you will need to check other options, such as the printer cable,
network interface card connectivity, or printer configuration, on the client computer or the print server.
Diagnostic Procedures
Before troubleshooting a printer or scanner problem, you should gather required information about
problems. This information assists in diagnosing problems and troubleshooting problems efficiently. To
gather the information about printer or scanner problems, you should adhere to the following guidelines:
View event logs for detailed information of the problem. When the problem occurs, the Windows
operating system creates a log that contains the information of the problem. To view event logs,
you can use Event Viewer in the Windows 2000 or Windows XP operating systems.
Use vendor-specific diagnostic utilities. Some vendors provide diagnostic tools or Web-based
utilities that can be used to identify the cause of a problem. Some printers have built-in utilities or
have a self-test button that can be used to diagnose a problem. The self-test button assists in
testing the print engine.
Error codes and messages displayed on a printer are vendor-specific. Table 4-1 shows some
examples of common error codes for HP Laser Jet printers.
www.transcender.com
118
CompTIA 220-601 Study Guide
11 Paper Out The paper tray sensor reports that there is no paper in the paper tray.
13 Paper Jam A piece of paper is stuck in the paper path, causing a paper jam.
24 JOB Memory The print job is complex and larger than the printer can handle. This error
Full can usually be resolved by adding memory to the printer.
50 Fuser Error A fuser lamp failure. You should replace the fuser to resolve this problem
After you have gathered the information about the printer problem, you should adhere to the following
guidelines:
Review and analyze collected data to troubleshoot the problem more efficiently.
Establish probable causes, such as printer driver problem, paper jam problem, or print quality
problem.
Define and isolate the problems, whether it is a hardware or software problem. If it is a hardware
problem, replace printer consumables, such as toner cartridge and print head. If it is a software
problem, you should try reinstalling the printer driver.
When you have resolved the problem, test the printer by printing a test page and by verifying the
proper functionality.
Troubleshooting Techniques
Some common techniques, such as calibrating a printer or restarting the print spooler service, are used to
troubleshoot printer problems.
If a printer is not printing colors correctly or is printing blurred documents, you should calibrate the printer.
Calibrating the printer ensures that printed documents contain the same color as displayed on your
monitor. When colors of a printed image are different from that displayed on the monitor, the first step is
to calibrate the monitor and then the printer, which can be done by using the printer driver. Calibrating a
printer requires you to adjust printer color settings, brightness and contrast settings, and paper type
settings. You can adjust these settings from the printer's Properties dialog box.
www.transcender.com
119
CompTIA 220-601 Study Guide
Spooling is the process of loading files that must be printed into a buffer until the printer is ready to print
the files. The print spooler service in Windows manages the queue for print jobs to be printed. Before you
can print the files from an application, Windows creates a spool file and stores the files that must be
printed. After the spool file is created, Windows transfers control to the application and then sends the file
to be printed. After the file is printed, Windows deletes the file from the spool file.
You can configure a printer to start printing after the first page is spooled. To do so in Windows 2000 or
Windows XP, you must perform the following steps:
Right-click the printer for which you want to update the driver, and select Properties.
Select the Advanced tab in the printers Properties dialog box, and select the Spool print
documents so the program finishes printing faster option.
Select the Start printing immediately option. Windows 2000 or Windows XP automatically spools
the first page before it starts printing.
Note: If you are printing a document from a computer but the printer does not print the document and
you observe that print jobs are queued in the printer spooler, then you should restart the Print Spooler
service to resolve this problem. Similarly, if you are troubleshooting a printer problem in which the printer
suddenly stops working and you are unable to print a test page, then you should first inspect the Printer
Spooler service.
A printer driver is a program that acts as a mediator between the computer or its applications and the
print device. A printer driver accepts instructions from the computer application and passes it to the
printer. If there is a problem with the printer driver, the printer can stop printing or can print incorrectly.
A newly installed software package or program overwrites the printer driver files with incorrect
driver files.
Note: If you connect a new printer to Windows XP Home via USB cable and Windows XP Home detects
the device but still the printer is not working, the problem is probably due to the printer's driver not being
installed.
www.transcender.com
120
CompTIA 220-601 Study Guide
Note: If a printing problem occurs, always troubleshoot the most obvious issues first. Ensure that there is
paper in the printer and that the printer is connected as a local printer or to a network. If a printing
problem persists, you should troubleshoot the print spooler and driver.
Print quality on paper largely depends on the toner or the cartridge. For example, if a laser print drum is
scratched, your print job will have vertical lines. If this occurs, you should replace the toner cartridge. A
new toner cartridge will produce acceptable print quality.
A laser printer that has the toner cartridge replaced may print documents that are smudged and smeared.
The smudged and smeared printing usually appears when a toner cartridge has been cleaned. To avoid
this problem, after cleaning the toner cartridge, you should print a few test sheets to ensure that there is
no excess toner.
Paper feed and output problems normally occur with tractors and friction feed. The tractors, found on dot-
matrix printers, adjust the paper on the printer. The tractors hold paper that has holes on both sides. If the
paper is not adjusted properly, the tractor cannot push the paper through the printer properly. Uneven
adjustment of the paper causes paper jam problems.
Dot-matrix printers use a platen, a rubberized roller to hold the paper in place and to help advance the
continuous paper. A dot-matrix printer may print dark and clear on the left side of the paper, but print
lighter colors on the right side of the paper. If the platen does not hold the paper evenly, the print will
appear lighter as you move across the page. Adjusting the platen usually solves the problem.
Friction feeds are prone to humidity problems. Humidity can cause the paper to absorb moisture. When
papers have moisture, they stick together resulting in more than one sheet being pushed into the
assembly for printing. If the friction feeders are not clean, they can also force the rollers to pick up
multiple sheets of paper, causing a paper jam.
Note: When a printer is not feeding paper properly due to excessive wear on the printer, you should first
inspect the pickup roller of the printer.
Fuzzy Printing
Laser and inkjet printers can produce fuzzy printing. A laser printer produces fuzzy printing when the
printer paper is damp. When the paper is damp, the toner is not able to fuse ink permanently onto the
paper and the printed content will appear fuzzy.
When the toner is running low on ink, it tends to produce light-colored or fuzzy printing. This is also a
symptom of damp paper. When a printer produces fuzzy printing, you should first try replacing the paper.
If that fails to correct the problem, then replace the toner.
The corona wire also needs to be cleaned occasionally. During a printing process, the corona wire
collects toner. If the corona wire is not cleaned periodically, the printed content will appear faded.
www.transcender.com
121
CompTIA 220-601 Study Guide
If a laser printer produces accurate images that smear easily, you should replace the fuser assembly. A
laser printer's fuser contains two rollers, which use heat and pressure to fuse an image onto the paper.
You may need to replace a blown fuser assembly to resolve the problem.
Laser printers are more prone to paper jams. Paper jams commonly occur in the following places:
At the feeder. This indicates that the feeder wheel is worn out or needs immediate replacement.
This can also indicate that improper paper is being used, such as paper that is too thick or too thin.
You should ensure that the paper meets the recommendations of the printer manufacturer.
At the corona assembly. This usually occurs when the static eliminator strip or the transfer corona
wire is damaged.
At the feed rollers. This usually occurs when one of the rollers is damaged. Defective feed rollers
pick up multiple papers at once.
When a paper jam occurs in a laser printer, the display panel flashes a paper jam message. After
fixing the component that caused the paper jam, you should open the printer cover and then close
it. Opening and closing the printer cover removes the paper jam message from the display panel.
Problems related to missing or partial character printing typically occur in dot-matrix printers. A defective
print head can cause a dot-matrix printer to print only partial characters. Dot-matrix printers use an array
of pins to strike an inked printer ribbon that prints characters or generates images on the paper. The
individual pins in the print head are controlled by electromagnets, which move the pins to form specific
characters. The failure of some or all of the pins in the print head to move in response to the
electromagnetic force will have an obvious and immediate effect on the printer's ability to print specific
characters.
A print head could also be misaligned in such a way that only the bottom half of its pins strike the printer
ribbon. In such cases, the printer would render only partial characters, even if all components in the print
head were functioning correctly. If possible, you should align the print head to the correct position or
replace the print head with a new one.
Note: If an inkjet printer is printing documents that have a horizontal line missing, then you should first
troubleshoot the print head to resolve the problem.
Scanner problems occur for many reasons, such as incorrect driver, power cable unplugged, and faulty
scanner components.
www.transcender.com
122
CompTIA 220-601 Study Guide
Check the scanner components to ensure they are working properly. If a component is faulty, you
must replace the component.
Recap
Most printers have the self-test capability, which allows them to test the printer functionality when a
printer starts.
Before troubleshooting a printer problem, you should gather information about printer or scanner
problems. This information helps to diagnose problems and troubleshoot efficiently.
You should use vendor-specific diagnostic utilities. Some vendors provide diagnostic tools or Web-
based utilities to identify the cause of the problem.
You should define and isolate problems, whether it is a hardware problem or software problem.
If the printer is not printing color correctly or printing blurred documents, you should calibrate the
printer.
Spooling is the process of loading files into a buffer until the printer is ready to print the files.
Some common printer problems include failed printer driver, poor print quality, paper feed and
output errors, fuzzy printing, paper jam, and missing or partial printing.
A printer driver is a program that acts as a mediator between the computer application that creates
the document and the print device.
Print quality on paper largely depends on the toner or the cartridge. A laser printer that has the
toner cartridge replaced may print documents that are smudged and smeared.
Paper feed and output problems normally occur with the tractors and the friction feed. The tractors,
found on dot-matrix printers, adjust the paper on the printer.
Friction feeds are prone to humidity problems. Humidity can cause the paper to absorb moisture.
Laser and inkjet printers can produce fuzzy printing. A laser printer causes fuzzy printing when the
printer paper is damp.
If a laser printer produces accurate images that tend to smear easily, then you should replace the
fuser assembly.
Missing or partial characters printing errors generally occur in dot-matrix printers. A defective print
head can cause a dot-matrix printer to print only partial characters.
Scanner problems occur for many reasons such as incorrect driver, power cable unplugged, and
faulty scanner components.
www.transcender.com
123
CompTIA 220-601 Study Guide
www.transcender.com
124
CompTIA 220-601 Study Guide
The CompTIA A+ credential identifies individuals who possess excellent customer service and
communication skills. Candidates should also have a good understanding and the ability to address
security issues. The 220-601 A+ Essentials exam will test the basic skills necessary for an entry-level
service technician.
The A+ Essentials exam is a proctored exam, which may be taken at a Prometric or VUE testing center.
A CompTIA A+ candidate should combine training with on-the-job experience. Many of the exam
questions are based on real-world scenarios so hands-on experience is vital.
http://www.vue.com
Or
http://www.prometric.com
Resources
There are several references to prepare for this exam. Reference material for our practice test can be
found in the following publication by Que Publishing:
www.transcender.com
188
CompTIA 220-601 Study Guide
General Tips
Schedule your exam only after you are confident that you have mastered the subject matter.
Schedule your exam for a time of day when you perform at your best.
Review the number of questions and the question types in each testlet carefully before starting each
testlet. Be careful not to bypass this option because you are in a hurry to finish.
Everything you do has time limitations, so don't let the pressure overwhelm you.
Exam-specific Tips
Before starting the exam, review your short stack of reserved flash cards or personal study notes to
remind yourself about terms, topics, and syntax that are likely to appear on the exam.
Once you have entered the testing room, you can write down any useful charts that you have
memorized on the scratch paper or erasable board provided by the testing center.
Determine how much time you are allotted to answer the questions. Do not spend too much time on a
given question during your first pass through the exam.
Remember that if you take a break during the exam, the time clock continues.
If you are disconnected during the exam, you will be able to resume where you left off.
www.transcender.com
189
CompTIA 220-601 Study Guide
Multiple-Choice
Read each Multiple-Choice item with the intention of answering the item without the alternatives that
follow. If you focus on finding an answer without the help of the alternatives, you will increase your
concentration and help you read the question more clearly.
Understand that Multiple-Choice items with round radio buttons require a single response, and Multiple-
Choice items with square radio buttons require one or more responses. If more than one response is
required, pay special attention to the directive sentence of the question (Choose two.). This may
indicate the number of correct answers.
Use the process of elimination when you do not know the correct answer. If the question has a single
answer and four options are listed, eliminate two of these options quickly and make the decision between
the two that remain. This increases your probability to 50/50. Another helpful methodology is to identify a
likely false alternative and eliminate it. This elimination method is particularly helpful when the item
requires more than one answer.
When two very similar answers appear, it is likely that one of them is the correct choice. Test writers often
disguise the correct option by giving another option that looks very similar.
You can download a free demo on our Web site that mimics the types of questions that will appear on the
exam. Sample questions do not cover all the content areas on the exam.
Good luck.
www.transcender.com
190
YO U R G U I D E TO S
SUC
UCCE
ESS S A N D ACCO
ACC O M
MPLI
PLI SHM
SH MEN
ENTT
STUDY GUIDE
Cert-640-801
NetCert: Certified Network Associate
www.transcender.com/club
Cisco 640-801 Study Guide
Cisco 640-801 Study Guide
2005 Transcender, a division of Kaplan Inc. All rights reserved. No part of this study
guide may be used or reproduced in any manner whatsoever without written permission
of the copyright holder. The information contained herein is for the personal use of the
reader and may not be incorporated in any commercial programs, other books,
databases, or any kind of software without written consent of the publisher. Making
copies of this study guide or any portion for any purpose other than your own is a
violation of United States Copyright laws.
Transcender
500 Northridge Road
Suite 240
Atlanta, GA 30350
www.transcender.com
www.transcender.com
2
Cisco 640-801 Study Guide
Contents
Contents....................................................................................................................................................... 3
About Your Transcender Study Guide .......................................................................................................... 5
Performing Initial Configuration and Maintenance ................................................................................. 6
Router Components ...................................................................................................................................... 7
Router Boot Process ..................................................................................................................................... 9
Initial Router Boot........................................................................................................................................ 11
Command-Line Interface............................................................................................................................. 12
Router Configuration ................................................................................................................................... 17
Managing IOS Images and Configuration Files .......................................................................................... 26
Cisco Discovery Protocol ............................................................................................................................ 31
Review Checklist: Performing Initial Configuration and Maintenance ........................................................ 33
LANs, VLANs, and Switching................................................................................................................... 34
The OSI Model ............................................................................................................................................ 35
Switches ...................................................................................................................................................... 41
Redundant Topologies ................................................................................................................................ 44
Spanning Tree Protocol .............................................................................................................................. 48
Configuring a Catalyst................................................................................................................................. 53
VLANs ......................................................................................................................................................... 59
VLAN Trunking Protocol.............................................................................................................................. 63
Review Checklist: LANs, VLANs, and Switching ........................................................................................ 66
IP Addressing ............................................................................................................................................ 67
IP Addresses............................................................................................................................................... 68
IP Address Classes..................................................................................................................................... 69
Binary and Hexadecimal Conversion.......................................................................................................... 71
Subnet Masks and ANDING ....................................................................................................................... 74
Subnetting ................................................................................................................................................... 76
Configuring IP Addresses and Subnet Masks ............................................................................................ 79
Review Checklist: IP Addressing ................................................................................................................ 82
Routing Protocols ..................................................................................................................................... 83
Understanding Routing ............................................................................................................................... 84
Dynamic Routing......................................................................................................................................... 85
Distance Vectored Routing Protocols ......................................................................................................... 89
Link-State Routing Protocols....................................................................................................................... 99
Hybrid Routing Protocols .......................................................................................................................... 103
Variable-Length Subnet Masking.............................................................................................................. 107
Review Checklist: Routing Protocols ........................................................................................................ 108
Access Lists ............................................................................................................................................ 109
Access List Applications............................................................................................................................ 110
Types of Access Lists ............................................................................................................................... 111
How Access Lists Operate ........................................................................................................................ 112
Wildcard Masking...................................................................................................................................... 115
Configuring Access Lists........................................................................................................................... 116
Applying Access Lists ............................................................................................................................... 118
Troubleshooting Access Lists ................................................................................................................... 123
Review Checklist: Access Lists................................................................................................................. 125
Wide Area Networking ............................................................................................................................ 126
Types of WAN Connections ...................................................................................................................... 127
HDLC Overview ........................................................................................................................................ 129
PPP Overview ........................................................................................................................................... 130
www.transcender.com
3
Cisco 640-801 Study Guide
www.transcender.com
4
Cisco 640-801 Study Guide
The Study Guide is objective-driven and contains a variety of tools to help you focus your study
efforts. Each Study Guide contains structured sections to help you prepare for your certification
exam:
Scope :: identifies the learning objectives for each section
Focused Explanation :: provides definitions, in-depth discussions and examples
Review Checklist :: highlights the key learning points at the end of each major section
Additional sections to further assist you are located at the end of each Study Guide:
Test Taking Strategies
General Tips
Explanation of Test Item Types
The following study model will help you optimize your study time.
Prepare
Develop a Assess your Focus on Track your
To
Study Plan knowledge weak areas progress
Pass
Start early, at least Assess your current Read the Study Take a Transcender
6 weeks out knowledge level Guide by objective practice exam using
Dont try to cram Take a Transcender Use the practice Preset Experience
Set aside specific practice exam using exam in Optimize again
study times Preset Experience Experience mode If you didnt score 100%,
Use a disciplined The objective-based Study the test items go back to your study
approach so you score report shows by objective plan and focus on weak
can thoroughly you the areas where Use the included areas
prepare you are strong and TranscenderFlash Study those objective
Stick to your plan the areas where you cards to review key areas where you didnt
need to focus your concepts score 100%
study efforts Use your favorite Keep practicing until
references to get you consistently score
further information 100% in all areas
on complex material
Transcenders commitment to product quality, to our team and to our customers continues to
differentiate us from other companies. Transcender uses an experienced team of certified
subject-matter experts, technical writers, and technical editors to create and edit the most in-
depth and realistic study material. Every Transcender product goes through a rigorous, multi-
stage editing process to ensure comprehensive coverage of exam objectives. Transcender
study materials reinforce learning objectives and validate knowledge so you know youre
prepared on exam day.
www.transcender.com
5
Cisco 640-801 Study Guide
www.transcender.com
34
Cisco 640-801 Study Guide
Focused Explanation
The International Organization for Standardization (ISO) developed the OSI model. Based on the OSI
model, you can design applications or protocols that allow heterogeneous computers or networks to
communicate with each other.
The OSI model consists of seven layers. Each layer describes a process or service that prepares a piece
of data for network transfer. Each layer on the host system communicates with the adjacent layer on the
destination system. In addition, data and control information from one layer is passed onto the
corresponding layer in the same system. Figure 2.1 shows the communication among the different layers.
System-to system communication
Layer-to layer
communication Session (L5) Session (L5)
www.transcender.com
35
Cisco 640-801 Study Guide
Application layer: This is the highest layer of the model. It is the point at which the user
interfaces with applications to access the network. This layer handles data exchange, job
management, file, print, message, database, and application services.
Presentation layer: This layer provides the coding and conversion functions that are applied to
application layer data. The presentation layer of the sending system encrypts the data received
from the application layer of that system. While the presentation layer of the receiving system on
the network decrypts the data. This layer also compresses and decompresses data. An example
of the coding function is the jpeg and gif format of images that are displayed on the web pages.
With the help of this formatting, it will be possible for all the web browsers to display these
images, regardless of the operating system.
Session layer: This layer establishes, manages, and terminates communication sessions among
presentation layer entities. The kind of communication that occurs at this layer consists of the
requests and responses that occur between applications located in different devices.
Network layer: This layer defines logical addressing for nodes and networks. It enables
internetworking, passing data from one network to another, and defines the logical network layout
so that routers can determine how to forward packets through an internetwork. IP addresses
reside at this layer.
Data link layer: This layer assigns the appropriate physical protocol to the data. Protocols at this
layer include Ethernet and Token Ring. This layer is responsible for hardware addressing (MAC
addresses), computing CRCs, and preparing the data for transmission.
Physical layer: This layer defines the electrical, mechanical, procedural, and functional
specifications to activate, maintain, and deactivate the physical link between communicating
network systems. Physical layer specifications define characteristics, such as voltage levels, the
timing of voltage changes, physical data rates, maximum transmission distances, and physical
connectors.
www.transcender.com
36
Cisco 640-801 Study Guide
You can broadly classify all seven layers into two main categories:
Upper layers: Deal with the user interface, data formatting, and application access. The
application, presentation, and session layer comprise the upper layers.
Lower layers: Define the process of data transfer across a physical wire, through internetwork
devices, to the desired end station, and to the application on the other side of the network. The
transport, network, data link and physical layers comprise the lower layers.
Table 2.1 lists the various protocols and the network components used at each layer.
Transport TCP, UDP, RTP, SPX, ATP Gateway, Advanced Cable Tester,
Brouter
Network IP, ICMP, IGMP, X.25, ARP, Brouter, Router, Frame Relay
OSPF, RIP, IPX, Device, ATM Switch, Advanced
Cable Tester
Data Link Ethernet, Token Ring, PPP, Bridge, Switch, Intelligent Hub, NIC,
HDLC, Frame relay, ISDN, ATM Advanced Cable Tester
Table 2.1
TCP/IP is the most widely implemented, data-communication protocol suite in the world. TCP/IP is a
layered set of protocols. Some of the more commonly recognized applications of TCP/IP are:
Terminal Emulation (Telnet) With the help of this protocol you can connect to your router or
switch for configuration and troubleshooting purposes. The default port number is 23.
File Transfer Protocol (FTP) With the help of this protocol, you can copy data from or to a
remote host. The default port number is 21.
www.transcender.com
37
Cisco 640-801 Study Guide
Trivial File Transfer Protocol (TFTP) This is the slimmed down version of FTP. With the help
of this protocol, you can speed up the communication, without the benefits of authentication or
reliable delivery. The default port number is 69.
Domain Name Service (DNS) With the help of this protocol, you can translate fully qualified
names, such as www.cisco.com, into an IP address, which is used to build a packet. The default
port number is 53.
Dynamic Host Configuration Protocol (DHCP) With the help of this protocol you can assigns
IP addresses to hosts as they boot, rather than having to statically configure all IP information.
The default port number is 67.
Simple Network Management Protocol (SNMP) With the help of this protocol you can gather
statistics and manipulate settings for network devices. SNMP can be configured on network
devices to send network alerts or traps to a designated management station. The default port
number is 162.
Simple Mail Transfer Protocol (SMTP) With the help of this protocol you can relay e-mail
communications across the Internet. The default port number is 25.
Post Office protocol (POP3) With the help of this protocol you can download electronic mail
from a mail server. The default port number is 110.
www.transcender.com
38
Cisco 640-801 Study Guide
There are many different reasons why a network may experience communication problems. An
understanding of the OSI model helps you troubleshoot problems with data transfer on a network. An
important part of troubleshooting is to first have an understanding of how the data flows between the
various layers of the OSI model. Figure 2.2 represents data flow through the OSI model:
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
Physical Physical
Binary 1s and 0s
The above figure explains how data is transferred from the application layer to the physical layer. At this
point, data is encoded and transmitted across any physical media to the destination system in the form of
binary 1s and 0s. When the receiving systems physical layer receives data, it is passed to the data link
layer. The data link layer reads the frame and transfers the extracted packet to the network layer. From
here, the data is transferred to the transport layer. This process is repeated until the data reaches the
application layer.
Troubleshooting becomes easier when the understanding of data flow between the various layers of the
OSI model is clear. This can be well understood with the help of the following example:
Example: Suppose two computers exist on the network. Data from one computer is transferred to the
other computer, but it does not reach the destination address. In this case, the troubleshooting approach
is started from the physical layer. The following steps can be performed:
1. Check whether the computer to which the data is sent is on the network This can be done by
physically checking the network cable wire. (Physical layer)
www.transcender.com
39
Cisco 640-801 Study Guide
2. Check for the connection to the remote computer This can be done with the help of the ping
command. (Network layer)
3. Check the settings of the application You can do this by analyzing the configuration of different
application parameters. For example, if the data sent is a mail, then you should check the
parameters for the mail application, such as the mail servers IP address and the users mail
account on the PC. (Application layer)
www.transcender.com
40
Cisco 640-801 Study Guide
Redundant Topologies
Scope
Identify the reasons for redundancy. Identify what Layer 2 loops are and how they occur. Also, learn the
various reasons for broadcast storms and how multiple frame transmissions occur.
Focused Explanation
Switches or hubs are the concentration point of the network. Redundancy is used to increase network
reliability and availability. A good network design always considers the need for redundant links to help
ensure that an alternate path through the network exists in case a link (or piece of equipment) fails.
Switched networks designed with redundant links and devices eliminate the possibility that a single point
of failure will result in a loss of function for the entire network. Although redundant designs might eliminate
a single point of failure, they introduce several problems that must be considered:
A bridge loop is created whenever two or more switches have redundant connections with one
another. In a bridge loop, each switch forwards broadcast packets endlessly. The continuous
propagation of broadcasts through the loop produces a broadcast storm. This results in wasted
bandwidth and hampers the performance of the network.
Multiple copies of non-broadcast frames may be delivered to destination stations. This might
cause unrecoverable errors.
Because copies of the same frame are received on different ports of the switch, instability occurs
in the contents of the MAC address table. Because the switch will need to consume additional
resources to cope with address thrashing in the MAC table, data forwarding might be hampered.
Broadcast Storms
Switches flood broadcast frames to all ports except the one on which the frame was received. A
broadcast storm is a condition of extreme congestion that may be caused due to too many broadcasts on
the network or a loop in the layer 2 network.
www.transcender.com
44
Cisco 640-801 Study Guide
For example, consider Figure 2.3 to understand how broadcast storms occur:
Server/
Host X
Router Y
Segment 1
Switch 1 Switch 2
Segment 2
The broadcast storm shown in Figure 2.3 occurs due to the following sequence of events:
Switch A examines the destination address field in the frame and determines that the frame must
be flooded to segment 2.
When this copy of the frame arrives at Switch B, the process repeats and a copy of the frame is
transmitted to the segment 1.
The original copy of the frame arrives at Switch B on Segment 1 after it is received by Switch A.
The frame is also forwarded by Switch B to Segment 2. As a result, the frame travels around the
loop in both the directions.
www.transcender.com
45
Cisco 640-801 Study Guide
Server/
Host X Router Y
Unicast
Segment 1
Unicast Unicast
Switch A Switch B
Segment 2
Host X sends a unicast frame to Router Y. Segment 1 and Switch A receive the copy simultaneously
and Switch A puts the frame into its buffer.
Switch A examines the destination address field in the frame by looking up Router Ys MAC address
in the MAC address table. If Switch A does not find an entry for Router Y, it sends the frame to all
ports except the originating port.
Switch B receives a copy of the frame sent by Switch A and looks up for Router Ys entry in the MAC
address table. If Switch B does not find a corresponding entry in the MAC address table, it forwards a
copy of the frame to Segment 1.
A copy of the frame is received by Router Y both from Switch A and Switch B.
www.transcender.com
46
Cisco 640-801 Study Guide
When multiple copies of a frame arrive on different ports of a switch, it leads to the corruption of the MAC
address table. Consider Figure 2.5 to understand the sequence of steps that lead to this situation.
Server/
Host X
Router Y
Unicast Segment 1
Unicast
Port 0 Port 0
Switch A Switch B
Port 1
Port 1
Segment 2
Figure 2.5: Corruption of the MAC Address Table
In the above figure, when the first frame arrives from Host X, Switch A maps the host and the port to
Segment 1. When Switch B receives the copy of the frame from Switch A, Switch B removes the first
entry and maps the MAC address of Host X to the port on Segment 2. This process creates instability in
the MAC database leading to the corruption of the MAC address table in the following way:
www.transcender.com
47
Cisco 640-801 Study Guide
Understand redundancy and identify the various reasons for broadcast storms and how multiple
frame transmissions occur.
Identify what STP is and the various states of Spanning Tree ports.
Know how to configure a trunk link, add a VLAN, and assign ports to a VLAN.
www.transcender.com
66
Cisco 640-801 Study Guide
Ciscos CCNA is a highly sought-after certification among networking professionals, due mainly to the
proliferation of Cisco devices. These devices provide critical network services. It is imperative that
networking professionals have a basic understanding of the services they provide, be familiar with the
underlying technologies they use, and gain the skills required to configure and maintain the devices.
Networking professionals, such as Microsoft MCSEs and Novell CNEs, who have concentrated their
training on operating systems, can greatly benefit from the addition of a Cisco CCNA. For these
networking professionals, earning a CCNA complements their existing skills by demonstrating an
expanded knowledge of underlying networking technologies beyond those critical to a particular operating
system. In addition, it demonstrates a level of proficiency in a new operating systemthe Cisco command
line interfacethat is fast becoming an essential skill for all networking professionals.
Career-changers and new entrants into the world of networking often choose the CCNA as a
steppingstone toward a new career. Earning the CCNA demonstrates essential networking skills, which
can open new doors for them in the job market. The Cisco CCNA is also the first step towards Ciscos
professional level certifications, which lead to even more opportunities and new rewarding career options.
While there are no set prerequisites for taking the exam, a candidate should have a working knowledge of
Cisco routers and the Cisco command line interface. Candidates must know how to navigate the
command line interface and perform basic configuration and troubleshooting tasks. Candidates with little
or no experience with the command line interface should not attempt the CCNA exam.
In addition, a thorough understanding of the exam topics is required. Candidates should not attempt the
test until achieving a thorough understanding of all the exam topics.
www.transcender.com
152
Cisco 640-801 Study Guide
Or
http://www.prometric.com
Cisco is unique in its testing strategy, in that you cannot go back and review a question in their test. Once
you answer a question and hit the Next button, you cannot go back to that item.
The general strategy for taking the CCNA is to answer a question as soon as you can to the best of your
ability. The simulations (which will be discussed in detail below) can take a good bit of time to answer,
and they can be at the end of the exam, so youll want to make sure you do not run out of time.
Some items on the CCNA test can take several minutes to answer. Often, these time-consuming items
appear one after another at the beginning third of the exam. This can cause undue stress since the
examination must be completed within an allotted amount of time. Candidates often find that half or more
of the time has elapsed before even completing the first third of the exam. Should this happen to you,
dont panic. Instead, work calmly through the remainder of the exam with the knowledge that most items
are of the pick the best answer variety and can be quickly answered by someone who is well prepared.
For more information on the CCNA exams, visit these links on the Cisco Web site:
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/current_exams/640-801.html
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/current_exams/640-811.html
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/current_exams/641-821.html
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/simulation/demo_sim.html
General Tips:
Wear comfortable clothing to the exam.
Everything we do has time limitations, so dont let the pressure overwhelm you.
www.transcender.com
153
Cisco 640-801 Study Guide
CCNA-Specific Tips:
Work through at least one subnetting problem.
Review item types on the Cisco Web site before you take the test, but use this as a refresher, not
your only exposure to it.
On your way into the exam room, flip through your short stack of reserved flash cards or notes to
remind yourself about terms, topics, steps, and interface details that are likely to appear on the
exam.
Immediately after entering the test room, write down key information such as the binary/decimal
bit conversion information, the IP address range for the different IP address classes, and
information that you are having trouble remembering such as the sequence of the OSI layers.
Test Items
The CCNA test features four types of test questions: multiple-choice, drag-and-drop, free response,
and simulations. While knowing the technical content for this exam is the most important thing you can
do to pass the test, understanding the psychology of the question type, then following a strategy of how to
answer them can mean the difference between passing and failing. Below is some specific advice for
each of these item types.
Multiple-Choice
1. Read each item with the intention of answering the item without the alternatives that follow. Focus
on finding an answer without the help of the alternatives. This will increase your concentration
and help you read the question more clearly.
2. Use the process of elimination when you do not know the answer for sure. If the item has a single
answer, eliminate two alternatives quickly and then make the decision between the two
remaining. This increases your probability to 50/50. Another helpful method of elimination is to
use a true-false approach where you identify a likely false alternative. Then, you eliminate it. The
true-false elimination method is particularly helpful when the item requires more than one answer.
3. Choose answers that are longer and more descriptive. These answers stand out from the others.
Test writers will often give you descriptive detail to help you identify the truth.
4. When two very similar answers appear, it is likely that one of them is the correct choice. Test
writers often disguise the correct option by giving another option that looks very much like the
correct one.
5. Watch out for negative words in the question. You may have been told to select an option that is
not true. Remember to reverse your usual thought and eliminate truth, not falsehood. When
looking for negative options look for extreme modifiers that make them false (always, never, all,
etc.).
www.transcender.com
154
Cisco 640-801 Study Guide
Drag-and-drop
1. The drag-and-drop items simply list features/characteristics and ask you to drag the appropriate
answer to the appropriate feature/characteristics (For example, The OSI layers could be listed on
one side and you would have to place them in the appropriate order). As with multiple choice
items, first, try to answer the question without the help of the alternatives.
2. Second, match up the answers you know by placing them into the target drag area to reduce your
remaining choices.
3. Finally, use a combination of your experience and a process of elimination to answer the more
challenging ones to arrive at a complete answer.
Free response
The free response items ask you to input appropriate data into a box such as a command, an IP address,
Subnet Mask, or Gateway address. (For example, you may have to input a subnet mask for a network
connection that hosts two nodes. Therefore, you would input the subnet mask 255.255.255.252.) Use
caution when typing in the intended data when answering free response items. Check and recheck your
answer before continuing to the next question. Remember, once you go to the next item you cannot
return to the previous item.
Simulation
The simulation items, which simulate an actual networking environment, can be extremely difficult if you
have not had the appropriate experience on Cisco equipment. The most important preparation strategy
for these types of items is to be familiar with the simulation engine. One tip here is that you can use
show commands to ensure the required modifications were made.
The sites below demonstrate all the item types graphically. You will be way ahead on test day if you
spend an hour or so beforehand familiarizing yourself with them.
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/simulation/tutorial.html
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/simulation/demo_sim.html
You can also download a free demo on our Web site that mimics the types of questions that will appear
on the exam. Sample questions do not cover all of the content areas on the exams.
www.transcender.com
155
YO U R G U I D E TO S
SUC
UCCE
ESS S A N D ACCO
ACC O M
MPLI
PLI SHM
SH MEN
ENTT
STUDY GUIDE
Cert-70-293
MSCert: Planning and Maintaining
a Windows Server 2003 Network Infrastructure
www.transcender.com/club
Microsoft 70-293 Study Guide
2005 Transcender, a division of Kaplan Inc. All rights reserved. No part of this study
guide may be used or reproduced in any manner whatsoever without written permission
of the copyright holder. The information contained herein is for the personal use of the
reader and may not be incorporated in any commercial programs, other books,
databases, or any kind of software without written consent of the publisher. Making
copies of this study guide or any portion for any purpose other than your own is a
violation of United States Copyright laws.
Transcender
500 Northridge Road
Suite 240
Atlanta, GA 30350
www.transcender.com
www.transcender.com
2
Microsoft 70-293 Study Guide
Contents
Contents......................................................................................................................... 3
About Your Transcender Study Guide .......................................................................................................... 5
Planning and Implementing Server Roles and Server Security ................................ 6
Configure Security for Servers that are Assigned Specific Roles................................................................. 7
Plan a secure baseline installation.............................................................................................................. 18
Plan Security for Servers that are Assigned Specific Roles ....................................................................... 33
Evaluate and Select the Operating System to Install on Computers in an Enterprise................................ 38
Review Checklist: Planning and Implementing Server Roles and Server Security .................................... 44
Planning, Implementing, and Maintaining a Network Infrastructure ...................... 46
Analyzing IP Addressing Requirements...................................................................................................... 47
Planning an IP Routing Solution ................................................................................................................. 60
Creating an IP Subnet Scheme .................................................................................................................. 62
Planning the Physical Placement of Network Resources ........................................................................... 64
Identifying Network Protocols to be Used ................................................................................................... 69
Planning an Internet Connectivity Strategy................................................................................................. 70
Planning Network Traffic Monitoring ........................................................................................................... 75
Troubleshooting Connectivity with the Internet........................................................................................... 90
Resolving Issues Related to Network Address Translation ........................................................................ 94
Resolving Issues Related to Name Resolution Cache Information and Client Configuration .................... 98
Resolving Issues Related to Client Computer Configuration...................................................................... 99
Planning a Host Name Resolution Strategy.............................................................................................. 103
Planning a DNS Namespace Design ........................................................................................................ 105
Planning Zone Replication Requirements................................................................................................. 113
Planning a Forwarding Configuration........................................................................................................ 116
Planning for DNS Security ........................................................................................................................ 119
Examining the Interoperability of DNS with Third-Party DNS Solutions ................................................... 123
Planning a NetBIOS Name Resolution Strategy....................................................................................... 125
Troubleshooting Host Name Resolution ................................................................................................... 128
Review Checklist: Planning, Implementing, and Maintaining a Network Infrastructure............................ 133
Planning, Implementing, and Maintaining Routing and Remote Access ............. 134
Plan a Routing Strategy ............................................................................................................................ 135
Plan Security for the Servers Assigned Specific Roles ............................................................................ 142
Implement Secure Access Between Private Networks............................................................................. 157
Review Checklist: Planning, Implementing, and Maintaining Routing and Remote Access .................... 172
Planning, Implementing, and Maintaining Server Availability............................... 174
Plan Services for Availability ..................................................................................................................... 175
Identify System Bottlenecks ...................................................................................................................... 182
Implement a Cluster Server ...................................................................................................................... 197
Implement and Manage Network Load Balancing .................................................................................... 201
Planning a Backup and Recovery Strategy .............................................................................................. 210
Review Checklist: Planning, Implementing, and Maintaining Server Availability...................................... 227
Planning and Maintaining Network Security........................................................... 228
www.transcender.com
3
Microsoft 70-293 Study Guide
www.transcender.com
4
Microsoft 70-293 Study Guide
The Study Guide is objective-driven and contains a variety of tools to help you focus your study
efforts. Each Study Guide contains structured sections to help you prepare for your certification
exam:
Scope :: identifies the learning objectives for each section
Focused Explanation :: provides definitions, in-depth discussions and examples
Review Checklist :: highlights the key learning points at the end of each major section
Additional sections to further assist you are located at the end of each Study Guide:
Test Taking Strategies
General Tips
Explanation of Test Item Types
The following study model will help you optimize your study time.
Prepare
Develop a Assess your Focus on Track your
To
Study Plan knowledge weak areas progress
Pass
Start early, at least Assess your current Read the Study Take a Transcender
6 weeks out knowledge level Guide by objective practice exam using
Dont try to cram Take a Transcender Use the practice Preset Experience
Set aside specific practice exam using exam in Optimize again
study times Preset Experience Experience mode If you didnt score 100%,
Use a disciplined The objective-based Study the test items go back to your study
approach so you score report shows by objective plan and focus on weak
can thoroughly you the areas where Use the included areas
prepare you are strong and TranscenderFlash Study those objective
Stick to your plan the areas where you cards to review key areas where you didnt
need to focus your concepts score 100%
study efforts Use your favorite Keep practicing until
references to get you consistently score
further information 100% in all areas
on complex material
Transcenders commitment to product quality, to our team and to our customers continues to
differentiate us from other companies. Transcender uses an experienced team of certified
subject-matter experts, technical writers, and technical editors to create and edit the most in-
depth and realistic study material. Every Transcender product goes through a rigorous, multi-
stage editing process to ensure comprehensive coverage of exam objectives. Transcender
study materials reinforce learning objectives and validate knowledge so you know youre
prepared on exam day.
www.transcender.com
5
Microsoft 70-293 Study Guide
Focused Explanation
NAT
NAT allows an internal IP address range, such as 10.x.x.x or 192.x.x.x, to connect to the Internet using a
common public IP address. The NAT device or the NAT server translates the internal IP address range to
the public IP address, allowing multiple internal IP addresses to use a common public IP.
NAT is primarily deployed as a security feature. All external entities connect to a single public IP address
and not to the internal IP addresses. This prevents the internal network from being visible on the Internet.
NAT consists of two components, the client and the server. The client does not require any special
configuration. The server uses a routing table to map internal IP addresses and ports to one or more
public IP addresses and ports. When an internal NAT client computer sends a packet to a Web server
located on the Internet, the NAT server checks the mapping of the internal IP address and port to the
public IP address and port in the routing table. If a valid mapping is found, the packet is forwarded to the
Web server on the Internet. The reverse is also true. If a computer on the Internet sends a packet to the
organizations public IP address, the NAT server will check for the appropriate mapping in the routing
table. If the public IP address and port is mapped with an internal IP address and port, the packet is
forwarded to the internal NAT client. If no match is found in the routing table, the packet is dropped at the
NAT server.
Types of NAT
Static NAT: Maps one IP address to another IP address in the routing table of the NAT device or
NAT server. A private IP address is mapped to a public IP address. The mapping remains constant
and does not change. When an external entity attempts to connect to the internal server, such as a
Web server, the NAT device or NAT server translates the Web servers externally-known IP address
in the incoming packet to the Web servers private IP address and then serves the request.
Dynamic NAT: Performs mapping on a many-to-many basis in the routing table. The routing table on
the NAT device or NAT server uses a free Internet IP address when a request is sent. For example,
when a user sends a request for a Web page, the NAT device or the NAT server checks the routing
table for a free Internet IP address and uses the free IP address to browse the Web page.
Masquerading NAT: Is a form of mapping in which the NAT device or the NAT server uses only one
Internet IP address. When a client sends a request to the NAT device or NAT server to locate a Web
www.transcender.com
94
Microsoft 70-293 Study Guide
page on the Internet, the NAT device or NAT server checks for a free port and sends the request
forward. When the Web page is located and the NAT device needs to return the query to the
requesting client, the NAT device checks for the port mapped with the request and returns it to the
client.
To configure NAT:
1. Invoke the Routing and Remote Access option from Administrative Tools. This invokes the
Routing and Remote Access dialog box.
2. Right-click the server name in the right pane and select Configure and Enable Routing and
Remote Access from the shortcut menu. This displays the Routing and Remote Access
Server Setup wizard.
3. Click Next.
4. In the Configuration dialog box, select Custom Configuration and click Next.
5. In the Custom Configuration dialog box, select the NAT and basic firewall check box and click
Next.
6. Click Finish. The Routing and Remote Access dialog box appears.
7. Click Yes. The Completing Initialization dialog box, which states the initialization of the
Routing and Remote service, appears.
www.transcender.com
95
Microsoft 70-293 Study Guide
You have initialized the Routing and Remote Access service to run the NAT and Firewall service. To
configure the NAT and Firewall service:
1. In the Routing and Remote Access snap-in, expand the Server branch and expand the IP
Routing branch.
2. Right-click NAT/Basic Firewall to select the New Interface command from the shortcut menu.
This displays the New Interface for Network Address Translation (NAT) dialog box.
3. Select the Public interface in the New Interface for Network Address Translation (NAT) dialog
box and click OK. This displays the Network Address Translation Properties <connection
name> dialog box.
7. Click the Inbound Filters and Outbound Filters buttons to set the inbound and outbound
filters.
8. Click OK to close the Network Address Translation Properties <connection name> dialog
box.
www.transcender.com
96
Microsoft 70-293 Study Guide
The Network Address Translation Properties dialog box consists of four tabs, which allow you to configure
different settings for NAT. The tabs are:
NAT/Basic Firewall Allows you to select an interface and enable NAT on the interface. This tab
also allows you to enable a firewall on the selected interface. You can enable a firewall if your
network does not have a firewall configured. After you enable the firewall feature, you can set
inbound and outbound filters.
Address Pool Allows you to add, edit, or remove the list of IP addresses provided by the ISP.
Using the Reservation feature on this tab, you can also map Internet IP addresses to private IP
addresses. In this way, you can map a private IP address to specifically use an Internet IP address.
Services and Ports Allows you to select the services that should be set for private IP addresses.
You can set a specific service to run on a specific private IP address and deny it on other private
addresses.
ICMP Allows you to set the type of requests to which the NAT server will cater.
www.transcender.com
97
Microsoft 70-293 Study Guide
Focused Explanation
NetBIOS
The Nbtstat command displays NetBIOS name tables for the local and remote computers. You can use
this command to display information about NetBIOS over TCP/IP. You can use a number of switches to
do this. For instance, you can use the RR switch to refresh the NetBIOS name cache for the local
computer registered with WINS.
nbtstat [-a RemoteName] [-A IPAddress] [-c] [-n] [-r] [-R] [-RR] [-s] [-S]
[Interval]
The two switches to purge and refresh the NetBIOS name for the local and remote computers are:
-R: Purges the NetBIOS name cache and uses #PRE-tagged entries from the Lmhosts file to
load the NetBIOS name cache.
-RR: Releases and refreshes the NetBIOS names of the local computer registered with the
WINS server.
The ipconfig command displays the current TCP/IP configuration of a computer. When you use the
ipconfig command with the /all switch, the complete TCP/IP configuration for each adapter will be
displayed along with the associated DHCP and DNS information. If you use the ipconfig command with
the /release and /renew switches, the DHCP and DNS information for the local computer will be updated.
The two ipconfig switches used to troubleshoot network problems related to DNS on a local computer are:
/flushdns: Purges DNS entries on the local computer, which may contain old or redundant
DNS entries in the cache. To delete the entries, you can use the /flushdns switch with the
ipconfig command.
/registerdns: Registers the DNS name and the IP address of a computer in DNS. If a
computer fails to perform a DNS registration, you can use this switch to manually update
DNS entries.
www.transcender.com
98
Microsoft 70-293 Study Guide
Focused Explanation
Your computer can communicate on a network only if the TCP/IP settings on the computer are correct.
You may face some problems due to incorrect settings in TCP/IP properties. Some of these problems are:
Default Gateway -- If you have configured the incorrect default gateway on your computer, you will
not be able to communicate with the computers on remote subnets. Because the default gateway is
incorrect, your computer will not be able to locate the route to the other subnet.
Subnet Mask If you have configured the subnet mask incorrectly on your computer, it will not be
able to communicate with other hosts on the network. Your computer will also not be accessible to
the other computers on the network.
DNS Address An incorrect internal DNS server address will prevent a computer from successfully
joining a domain or locating a domain controller for logons. This is because Active Directory relies on
DNS for name resolution services. An incorrect DNS server address can also prevent your computer
from resolving the host names to which you intend to connect. Because DNS resolves host names,
incorrect entries may prevent host name resolution.
If you suspect that there is a problem with the connectivity of a computer, you can use the ipconfig
command to check for TCP/IP connection details. To troubleshoot, you need to first find out the IP
address of the computer.
You can use the following command to obtain the IP address and other information, such as the subnet
mask and the default gateway:
ipconfig /all:
The above command displays the complete TCP/IP details of a computer. In case your
computer has obtained an incorrect IP address, you can release the IP address using the
following command:
ipconfig /release:
After the IP address from your computer has been released, you need to obtain a new IP
address from the DHCP server. To obtain an IP address, use the following command:
ipconfig /renew:
The Ipconfig/renew command fetches the correct TCP/IP configuration from the DHCP server
and assigns this configuration to the computer.
www.transcender.com
99
Microsoft 70-293 Study Guide
Conflict Detection
Before the DHCP server offers an IP address to the requesting client on the network, it uses the ping
process to ensure that the available IP address in the scope has not been statically assigned to a non-
DHCP client computer. Each ping delays the IP offer by one second. A successful ping response
indicates that a client computer is using the IP address on the network. The DHCP server then moves to
the next available IP address in the scope and pings it. This process continues until the DHCP server
finds an IP address where the ping response is negative, which results in a time out. In this case, the IP
address is offered to the client computer on the network.
1. Click Start -> Programs -> Administrative Tools -> DHCP. This displays the DHCP dialog box.
2. Right-click the DHCP server name and select Properties. This displays the <DHCP server>
Properties dialog box.
On the Advanced tab, you can increase the number of conflict detection attempts. The default number is
zero. The number entered here determines how many times the DHCP server pings an IP address before
assigning it to a client computer on the network.
www.transcender.com
100
Microsoft 70-293 Study Guide
Lease Duration
The DHCP server leases an IP address to a computer on the network for a specific period. By default, the
duration of the lease is eight days.
When you run the ipconfig /all command at the command prompt, you obtain the complete TCP/IP
details. The two parameters that define the lease duration are Lease Obtained and Lease Expires.
If the DHCP server and the DHCP client exist on the same subnet, they communicate at the MAC
address and the IP level broadcast of the client computer. If the DHCP server and the DHCP client exist
on different subnets, the DHCP/BOOTP relay agent relays the IP address across the subnets.
1. The DHCP client broadcasts a DHCPDiscover message, which is sent to the local subnet.
2. If the DHCP server exists on the server, it replies with a DHCPOffer message that contains
an IP address and other information for the client.
www.transcender.com
101
Microsoft 70-293 Study Guide
3. The client accepts the IP address and other information and sends a DHCPRequest
message to the DHCP server.
4. The DHCP server replies with the DHCPAck message, which approves the IP lease to the
client computer.
5. The client accepts the message from the DHCP server and configures its TCP/IP properties.
If the client requests a duplicate IP address or if an available IP address is not located in the DHCP
scope, the DHCP server sends the DHCPNak message instead of the DHCPAck message. After the
DHCPNak message is relayed to the client computer, the client computer needs to start the IP lease
process once again. The entire process is repeated until the client computer receives a DHCPAck
message from the DHCP server.
Figure 2-25: IP Lease Obtained and Expired Through the IPCONFIG /all Command
www.transcender.com
102
Microsoft 70-293 Study Guide
Learn how to resolve issues related to name resolution cache information and client
configuration.
www.transcender.com
133
Microsoft 70-293 Study Guide
The 70-293 exam is a proctored exam, which may be taken at a Prometric or VUE testing center.
A Microsoft candidate should combine training with on-the-job experience. Many of the exam questions
are based on real-world scenarios so hands-on experience with the software is vital.
http://www.vue.com
Or
http://www.prometric.com
Resources
There are several resources produced by Microsoft that you may use to prepare for this exam. These
resources include the Microsoft Official Curriculum courseware used in instructor-led training, Microsoft
Self-Paced Training Kits, and Microsoft Online Resources. For more information, see the 70-293
Preparation Guide at http://www.microsoft.com/learning/exams/70-293.asp.
www.transcender.com
316
Microsoft 70-293 Study Guide
Microsoft allows you to go back to questions that you previously answered, so manage your time wisely.
If a question requires too much time to answer, select the best possible answer, mark the item for review,
and return to the question after answering all of the other questions.
General Tips
Schedule your exam only after you are confident that you have mastered the subject matter.
Schedule your exam for a time of day when you perform at your best.
Review the question types carefully before starting the actual exam. Be careful not to bypass this
option because you are in a hurry to finish.
Everything you do has time limitations, so don't let the pressure overwhelm you.
Determine how much time you are allotted to answer each question. Do not spend too much time
on a given question during your first pass through the exam.
Remember that if you take a break during the exam, the time clock continues.
If you are disconnected during the exam, you will be able to resume where you left off.
www.transcender.com
317
Microsoft 70-293 Study Guide
Multiple-Choice
1. Read each multiple-choice item with the intention of answering the item without the alternatives
that follow. Focusing on finding an answer without the help of the alternatives will increase your
concentration and help you read the question more clearly.
2. Understand that multiple choice items with round radio buttons requires a single response, and
multiple choice items with square radio buttons require one or more responses. If more than one
response is required, pay special attention to the directive sentence of the question (Choose
two. Each correct answer..). This will indicate whether the different responses are independent
or corresponding, as indicated below:
When this directive is given, each of the correct responses, when taken together, will provide the
desired result. Sometime each response will be a different, independent answer:
When this directive is given, each response can be used independently to provide the desired
solution. In other words, there are two ways to achieve the same result.
3. Use the process of elimination when you do not know the answer for sure. If the question has a
single answer and four options are listed, eliminate two of these options quickly and make the
decision between the two that remain. This increases your probability to 50/50. Another helpful
methodology is to identify a likely false alternative and eliminate it. This elimination method is
particularly helpful when the item requires more than one answer.
4. When two very similar answers appear, it is likely that one of them is the correct choice. Test
writers often disguise the correct option by giving another option that looks very similar.
Read each Drag and Drop item with the intention of answering the item without the alternatives
that follow. Focusing on finding an answer without the help of the alternatives will increase your
concentration and help you read the question more clearly.
The correct answers must be dragged to the appropriate areas in the answer portion of the
diagram.
Use the process of elimination when you do not know the answer for sure. Most Drag and Drop
items have many options that can be dragged to multiple answer areas. Try to eliminate options
www.transcender.com
318
Microsoft 70-293 Study Guide
for certain answer areas. Using this methodology, you can sometimes narrow certain answers
down to only a few areas. For example, IP addresses should not be used in subnet mask areas,
and vice versa.
When two very similar answers appear, it is likely that one of them is the correct choice. Test
writers often disguise the correct option by giving another option that looks very similar.
Hot Area
The hot area questions are typically screen shots of a portion of the user interface such as the
properties box for a component in the Microsoft Management Console (MMC). You will be
instructed to click on the correct answer (area) within the graphic.
Use a combination of your experience and a process of elimination to answer the more
challenging ones to arrive at the correct answer.
Active Screen
Active screen questions are typically screen shots of a dialog box or other user interface. You will
be asked to perform an action within the screen shot to achieve the desired result. Before
attempting to answer, be sure to try each drop-down menu, radio button, and text field to see
which are operational for that particular question.
Sometimes the controls in an Active screen dialog box do not operate exactly like the controls in
the actual dialog box. Be sure that all live portions of the interface are properly configured before
moving on to the next question.
While the same screen shot may be used for more that one question, the active areas within that
screen shot may change. Therefore, you will need to explore which areas are active for each
question.
You may see questions that integrate both active screen and select and place items.
You can download a free demo on our Web site that mimics the types of questions that will appear on the
exam. Sample questions do not cover all the content areas on the exam.
www.transcender.com
319
YOUR GUIDE TO SUCCESS AND ACCOMPLISHMENT
IT professionals agree! Transcender has consistently been voted the industry's #1 practice
exam. Now we have a suite of products to help you with your IT certification exam preparation.
Whether youre looking for skills assessment, learning opportunities or exam preparation
products, Transcender has a learning solution geared toward the demands of the IT
professional.
TranscenderCertTM TranscenderFlashTM
Industry-Best Practice Exam Software Flash Card Review Software
TranscenderCertTM products are our industry- TranscenderFlashTM products are quiz-format
best exam simulations that provide realistic review software products designed right into
simulations of IT certification exams. Our our TranscenderCertTM exam simulations.
award-winning TranscenderCertTM exams are Flash cards drill you on key study elements
known as the most comprehensive and that are essential to every certification exam.
realistic available. We even offer a Pass-the-
First-Time Guarantee.
2005 Transcender, a division of Kaplan IT, Inc. All rights reserved. No part of this study guide may be used or
reproduced in any manner whatsoever without written permission of the copyright holder. The information contained
herein is for the personal use of the reader and may not be incorporated in any commercial programs, other books,
databases, or any kind of software without written consent of the publisher. Making copies of this study guide or any
portion for any purpose other than your own is a violation of United States Copyright laws.
Transcender
500 Northridge Road, Suite 240
Atlanta, Georgia 30350
Tel. 678-277-3200, or 1-866-639-8765 Toll Free, U.S. & Canada.