220-1102 Operating Systems Study Guide for the CompTIA A+ Core Series Exam

Page 3

Microsoft Windows Networking Features

Windows comes with many abilities to effectively use network resources. You must be able to configure networking features on a client/desktop. This will be presented as a scenario-based question.

Workgroup vs. Domain Setup

There are three primary networking models in the Windows OS: the homegroup, the workgroup, and the domain. Workgroup allows the OS to be both a server and a client and is primarily used in small office/home office (SOHO) setups. With the domain networking model, the client must be joined to the domain.

Shared Resources

Windows allows sharing of files and folders over the network, allowing a shared space for network users. For convenience, network shares can be mapped to a drive letter. For the users and applications, the network share appears like a local disk. Other resources, such as hardware-based resources, can also be shared among the networking group.

Administrative shares are created automatically to allow remote administrators to configure the computer. These shares are not shown and are not accessible to non-administrative users.

Printers

You can use the printer sharing functionality to allow printing from other computers to the printer connected locally. To print using a shared printer on a remote computer, it needs to be mapped first, installing the drivers for the printer.

File Servers

File servers may also be shared among the networking group.

Mapped Drives

Mapping drives allows for network shares to be connected to a specified drive letter for ease of access among the networking group.

Local OS Firewall Settings

Windows comes with configurable firewall rules to allow or block certain applications or network ports and control security.

Application Restrictions and Exceptions

When installing a new application that needs access to the network, Windows may ask if it should be allowed and add an exception to the firewall. You may also apply application restrictions through the firewall.

Configuration

Windows Firewall can be manually configured to allow or deny applications and network ports. It can also be switched off completely for the type of network. This effectively allows all network traffic and has to be used extremely carefully to avoid exposing the computer to potential network threats and unauthorized access.

Client Network Configuration

The client will automatically connect and configure to the connected router or server if the router supports the Dynamic Host Configuration Protocol (DHCP) with an IP address, subnet mask, default gateway, and the DNS server. These configurations may also be configured manually.

Internet Protocol (IP) Addressing Scheme

The IP address of a Windows computer can be dynamically acquired from a DHCP server on the network, or configured manually. The IP address needs to be in the same subnet with other hosts and the gateway but be unique.

Domain Name System (DNS) Settings

DNS are servers that resolve names (e.g., microsoft.com) to an IP address that the computer can communicate with. More than one DNS server can be configured for reliability.

Subnet Mask

A subnet mask determines what hosts are on the same network as the local computer. It needs to match all the computers and network devices on the local network.

Gateway

A default gateway is a router that can forward the network traffic from the local network to other remote networks. At least one of its interfaces has to be on the same local network as the computer.

Static vs. Dynamic

A static IP address is a specific IP address that is assigned to a computer on the network. A static IP address will remain the same until manually changed. A dynamic IP address changes each time the computer connects to the network based on currently available IP addresses.

Establish Network Connections

There are multiple ways to connect a Windows computer to a local or remote network.

Virtual Private Network (VPN)

A virtual private network uses another underlying network, usually the internet. It allows secure access to a remote location over public infrastructure.

Wired

Wired connections usually come in a form of ethernet to the computers. It requires cabling to every computer and may require other network devices like switches and routers.

Wireless

Wireless network connections use Wi-Fi technology to connect. Because it is not physically restricted in the area, the network will usually have another layer of security in the form of a password or more complex authentication. Once connected, the functionality is very similar to a wired connection.

Wireless Wide Area Network (WWAN)

Similar to mobile phones that can access the internet from anywhere, a WWAN is a cellular network that can be used to connect to the network. Some tablets and laptops come with built-in cellular hardware.

Proxy Settings

A proxy server is a form of a gateway. A common example is a web proxy that is set up to filter access to the internet from a local network to improve security.

Public Network vs. Private Network

A public network is one that is accessible to everyone within range while a private network is protected and limited to those who have proper authentication.

File Explorer Navigation – Network Paths

Within a network, File Explorer navigation is achieved through pre-configured network paths. The Universal Naming Convention (UNC) path is the standard way to navigate to the server and fileshare in the Windows OS.

Metered Connections and Limitations

Metered connections are based on usage and come with limitations to keep usage down. When using a metered connection, updates, whether they be for the OS, application, or system security, will not download and install.

Application Installation and Configuration

There are multiple methods for installing new applications and software. Some things need to be taken into consideration for the successful installation and use of applications. You must be able to apply installation and configuration concepts. Questions on these concepts will be scenario based.

System Requirements for Applications

The system needs to have enough resources to allow installation of new applications. The specific requirements depend on the application and can be usually found in the supporting documentation for the application.

32-bit vs. 64-bit Dependent Application Requirements

Application requirements must match the architecture of the CPU and OS for either 32-bit or 64-bit architectures. However, if the architecture supports 64 bits, it will be able to properly run 32-bit applications.

Dedicated Graphics Card vs. Integrated

A dedicated graphics card, also known as a discrete graphics card, is a separate hardware component designed specifically for rendering graphics and display tasks. On the other hand, an integrated graphics solution is typically built directly into the CPU of modern computers, although some older systems might have it on the motherboard. Regardless of the type, it’s essential to ensure that the graphics solution, whether integrated or dedicated, meets the requirements of the applications and OS being used.

Video Random-Access Memory (VRAM) Requirements

The VRAM requirements are for graphic-intensive applications, such as gaming. For the application to function properly, the VRAM requirements of the program must be met by the device.

RAM Requirements

To run an application, it needs to be loaded into memory. There should be sufficient RAM available or the application will run slowly, slowing down other processes too, or it will not be able to run at all.

Central Processing Unit (CPU) Requirements

The CPU requirements of an application are typically given in gigahertz (GHz) and show the amount of processing power the application requires. These requirements need to be met or exceeded for proper functionality.

External Hardware Tokens

External hardware tokens are physical devices that can be connected to the device for increased security. The requirements for the hardware token must be met or exceeded by the host computer.

Storage Requirements

Before running an application, its files need to be stored on the computer’s disk. There should be enough free disk space to copy and use the program’s files.

OS Requirements for Applications

An application expects to work with a specific operating system. The installation of the software should be compatible with the OS. Refer to the application’s documentation to find out what operating systems are supported.

Application to OS Compatibility

The application needs to be compatible with the host OS. Many applications come in multiple OS-compatible versions so make sure you are installing a Windows-compatible application on a Windows OS.

32-bit vs. 64-bit OS

Applications that require a 64-bit OS will not be compatible with a 32-bit OS, but a 32-bit application will be compatible with a 64-bit OS.

Distribution Methods

There are multiple ways to distribute software installation files.

Physical Media vs. Downloadable

The only way to install new software on a computer that is not connected to any network is to have the application on a portable media, CD, or USB disk. This can also be useful for large applications or slow networks. The installation files can be run directly from the media or copied to the hard disk first and then installed.

On computers connected to a network, applications can be installed over the network and not from portable media or local files. If the application is acquired from the internet, the files are first copied to the local disk, then installed. Operating systems also include forms of application stores and repositories that make it easy to find and install new software.

ISO Mountable

An ISO mountable application installation is one in which the application ISO is downloaded from the vendor and installed directly onto the host machine and acts as a virtual optical drive.

Other Considerations for New Applications

Besides hardware and compatibility requirements, there are other considerations before a new application is installed.

Impact on Device

Installing a new application may allow it access to other files on the computer. Some software can be malicious and may need to be researched before installation. Even if there are no ill intentions, some functions of the software may not be suitable for protected corporate environments with sensitive information.

Impact on Network

If a new application is installed on a computer that is connected to the network, it will effectively get access to the network and may compromise the security of other computers on the same network.

Impact on Operation

New applications can affect the operations of the OS and its information system. These effects can be negative and may compromise the efficiency of the computer.

Impact on Business

Before installing new applications on a computer connected to a business network, the effects of the application on the functioning of the business should be considered and evaluated for potentially harmful effects to the business.

All Study Guides for the CompTIA A+ Core Series Exam are now available as downloadable PDFs