Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Latoya Stoudmire

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 35 total)
  • Author
    Posts
  • in reply to: OCU C)HT B Discussion Lesson 12 #98962
    Latoya Stoudmire
    Participant

    Hello Trae,
    I really like the description that you gave in your discussion. I felt it was very detailed seeing how it listed all of the standards with the dates times and reasons they were created. I was able to even learn a few things about different encryptions and a few versions of Wi-Fi standards that I overlooked. I also thought your encryption detail was very descriptive. Have you ever personally work with this type of software in a commercial setting?

    in reply to: OCU C)HT B Discussion Lesson 12 #98855
    Latoya Stoudmire
    Participant

    There are several different types of Wi-Fi standards. The first was introduced in 1997. In 1997 the IEEE (institute of electrical and electronic engineers) introduced IEEE 802.11. This standard speed was 2 Mbps. Shortly after the introduction of the IEEE 802.11 came the 802.11a the standard was used to assist with traffic interference with other devices on the frequency 2.4. 802.11a uses 5Ghz frequency. That same year 802.11b was developed but uses frequency 2.4Ghz. 802.11b is used in home settings and 802.11a is used in a commercial setting. In 2003 802.11g combined the features of 802.11a and 802.11b using frequency 2.4Ghz. 802.11n allowed for both 802.11a and 802.11b features to use frequencies 2.4Ghz and 5Ghz in 2009. In 2013 802.11ac standard operates on 5Ghz with a speed of 1.5 Gbps. 802.11n is the most commonly used standard in households today. The most advanced version is the 802.11ax this runs on Both 2.4Ghz and 5Ghz. This standard allows for 40% more traffic.

    Asides from the Wi-Fi standards there are also Wi-Fi encryption standards. WEP, WPA, WPA2, and WPA3 are Wi-Fi security protocols that prevent unauthorized access and eavesdropping on wireless. WEP is Wired Equivalent Privacy, it was introduced in 1997 with the 802.11. A 64–128-bit encryption is used to keep information confidential. The WEP uses static keys for encryption. The WPA is also known as Wi-Fi Protected Access. This type of encryption uses packets and has a dynamic key. WPA uses 128-bit encryptions and TKIP (Temporal Key Integrity Protocol) to ensure the data is encrypted. WPA2 and WPA3 are each updated and improved versions of WPA. The most current and secure version is WPA3 which uses a 256-bit encryption.

    Šlekytė, I., & Šlekytė, I. (2024, September 22). WEP, WPA, WPA2, and WPA3: Main differences | NordVPN. NordVPN. https://nordvpn.com/blog/wep-vs-wpa-vs-wpa2-vs-wpa3/

    GeeksforGeeks. (2021, March 17). WiFi standards explained. GeeksforGeeks. https://www.geeksforgeeks.org/wi-fi-standards-explained/

    in reply to: OCU C)HT B Discussion Lesson 09 #98894
    Latoya Stoudmire
    Participant

    Hello Jessica,

    I like how detailed your discussion was in regards to the ways the RJ45 is used. I also like how you gave a detailed description of how the RJ 45 looks. I think its important to know how each connector looks especially the connectors most commonly used. I do have a question though. Is the HDMI considered a cable or a connector? I thought it was a cable but it seems as though I might be wrong.

    in reply to: OCU C)HT B Discussion Lesson 11 #98893
    Latoya Stoudmire
    Participant

    Hello Branden,

    I think network trouble shooting is often overlooked. I agree a lot of issues with printers can originate with network connections. As you said in your statement I notice this most with wireless printers. I believe most common issue with printers are jams. I also like how you gave multiple ways to troubleshoot the issue including hardware and software options.

    in reply to: OCU C)HT B Discussion Lesson 10 #98892
    Latoya Stoudmire
    Participant

    Hello Jason,

    This was very informative seeing how did not personally know that running multiple apps can cause your mobile device to overheat. Nor did I know that phones can overheat from too much sun exposure. I did however notice that when running multiple apps on my phone that it kills the battery a lot faster but I didn’t know that blue-tooth connections can also drain batteries. I also was unaware that Overcharging a battery can effect your battery life

    in reply to: OCU C)HT B Discussion Lesson 11 #98825
    Latoya Stoudmire
    Participant

    There are several different ways to trouble shoot printers. The trouble shooting method used will always depend on the type of printer and the issue the printer is having. There are some common trouble shooting methods that are used for printers. An issue that most printers face is ink streaks. To trouble shoot this issue some practical options are to check the ink cartridge to ensure it is not too full or not full enough, ensure that the printer head is not clogged, and you have properly removed all protective shields from the ink cartridge.

    A simple trouble shooting method often overlooked is changing the paper in the printer. If a printer is loaded with the incorrect type of paper required for the printer, it can cause the printer to malfunction. In some cases, the paper causes the printer to jam. To correct a printer with the wrong paper, you can find the correct paper size. If the printer did jam due to the incorrect paper, you will first need to remove the jammed sheet of paper. Removing the paper tray, locating the jammed sheet of paper, and removing it for the printer will typically clear the jam. In some cases, after removing the jam the printer will require a restart.

    in reply to: OCU C)HT B Discussion Lesson 09 #98727
    Latoya Stoudmire
    Participant

    The most common type of cable connector is the RJ 45, This is also referred to as registered jack 45. The RJ 45 is primarily used to connect a device to a network. The RJ 45 connector is typically used with twisted pair cables, it has 8 pins of contact. This allows for four twisted wire pairs. Cables Cat5, Cat5e, Cat6, Cat6a, Cat7, and Cat7a cables use the same RJ45 connectors. Despite the RJ 45 having 8 pins and 8 wire contacts it also has a tab feature that helps secure the wires in place. (Smoot, 2022)

    BNC connector is also called a Boayonet neill-concelman. This connector is used with coaxial cables. This is used in radio frequency. BNC connectors are also used heavily in video applications. The BNC connector provides a secure connection with high quality. Although the BNC connector is a valuable connector in securing high quality data in video surveillance the RJ 45 connector is used more commonly. (imops@saffronedge.com, 2024)

    imops@saffronedge.com. (2024, July 5). Types of Cables and Connectors in Computer Networks. Network Drops. https://networkdrops.com/blog/different-types-of-cables-and-connectors-in-computer-network/

    Smoot, J. (2022, June 2). RJ45 Connectors – What You Need to Know. Digi-Key Electronics. https://www.digikey.com/en/articles/rj45-connectors-what-you-need-to-know

    in reply to: OCU C)HT B Discussion Lesson 10 #98763
    Latoya Stoudmire
    Participant

    There are several diverse types of mobile devices. Each mobile device must rectify any trouble shooting issues differently. Some mobile devices are laptops, cell phones, smart watches and more. When trouble shooting a device like a cell phone it is important to first identify the issue with, the device. If the device is having an issue connecting to a network, to trouble shoot the issue first check the device network setting. Ensure that the device is connecting to a network that is available. You also want to ensure the network credentials are correct when trying to access an internet connection.

    Laptops are a mobile device that can use some of the same techniques for trouble shooting as a PC. Laptops and PC’s have some of the same hardware components such as a motherboard a Ram and other components. Similar to trouble shooting a PC, when trouble shooting a laptop, it is important to first identify the problem. When trouble shooting one of the first steps to take is checking the power source check. You do this by checking all the cables and battery connectivity are established. Another trouble shooting method is to ensure the laptop is running at its most current version. CPU overheating sometimes can be an issue for the laptop. To trouble shoot the CPU you can clean the CPU fan and heatsink with compressed air. (Knotts, 2024) There a numerous ways to trouble shoot a mobile device but each depends on the type of device and its issues

    in reply to: OCU C)HT B Discussion Lesson 08 #98688
    Latoya Stoudmire
    Participant

    When trouble shooting display devices you must consider if the device issue is with the hardware or software. Software and Hardware must be rectified differently. There are many potential software issues. Some software issues consist of trouble with overheating, flickering images, and artifacts. Hardware Issues can consist of multiple issues like loose cables, expansion cards not properly placed, or no power source.

    When trouble shooting display hardware device issues the first step is to always check the power source. A power source such as a cable not being plugged in or an faulty outlet could be an issue that causes problems with display. Another issue is that a particular expansion card could not be compatible with the device. If an expansion card is not compatible with a PC PCI slot, then the PC could experience display issues. To trouble shoot this ensure that the expansion card is compatible with the PCI.

    Issues a PC could experience with software display are flickering images. To trouble shoot a flickering image you should update your graphics drivers to ensure it is performing at its latest version. Another trouble shooting technique would be to try ending programs that could be affecting your graphics card.

    in reply to: OCU C)HT B Discussion Lesson 07 #98686
    Latoya Stoudmire
    Participant

    There are many distinct types of input and output devices. Some of the input devices include Barcode readers, NFC readers, microphone, and a digitizer. All are important and play key roles in a computer’s ability to receive information. Some of the output devices are displays, printers and speakers. The output devices are also essential seeing how they allow the device to sed communication to the user.

    An NFC, also known as near field communication reader, is an output device that is extremely popular with merchants and business owners. An NFC allows customers to make purchases with contactless payments. With NFC a customer can use their phone or card that has a magnetic chip and make payments to merchants. This is done by using Radio Frequency Identification. “RFID has been used in places for decades for things like scanning items in grocery stores and luggage on baggage claims and tagging cattle.” (Square, 2024).

    Popular output devices are monitors, speakers, and printers. Each of these devices allows communication between the user and the device. This communication ranges from visual graphics that appear on the screen to the speakers used for audio calls or listening to music.

    in reply to: OCU C)HT B Discussion Lesson 06 #98636
    Latoya Stoudmire
    Participant

    Physical storage is sometimes referred to as local storage. Physical storage includes hard disk drives, solid-state drives, and USB flash drives. Each of the physical storage drives plays a different role in storing data.

    The hard disk drive works by allowing an arm to move rapidly on the disk reading and writing data in small sections called sectors. The sectors are then combined to create larger files. I hard drive can hold a range of information spanning from 500 GB to 10 TB.

    Solid state drives also known as SSD can replace traditional HDD drives. One of the largest differences between HDD and SDD is that SDD is faster. SDD can load applications and save data at a fraction of the time it takes HDD. Instead of an arm SSD uses a flash controller to read, write and store data.

    Another physical storage is USB Flash drives. Flash drives like SSD use a flash connector to read data yet, USB Flash drives are portable. The drive is plugged into the PC and a notification informs the user of the device. Once the user can access the device, they can then save new information or pull up stored information on the disk.

    in reply to: OCU C)HT B Discussion Lesson 05 #98635
    Latoya Stoudmire
    Participant

    There is a wide array of expansion options. The options vary from memory, graphics, and networking. Expansion options are imperative to the functionality of the device, Expansions cards can be used to bring new capabilities to a device that will not be possible without the expansion capability.

    A popular expansion card is a graphic card. The graphic card is also referred to as the video card or the graphics processing unit (GPU). The GPU is used to enhance the video experience. “It accelerates the graphics processing capabilities of your computer, enabling you to enjoy smooth and high-quality visuals in games, videos, and other graphic-intensive applications. The graphics card works with the central processing unit (CPU) to process and output visual data.” (What Is a Graphics Card? And Why Do I Need One? | Lenovo US, 2023). The GPU would be the most ideal for a gamer or someone needing high quality graphics.

    Network cards are another popular expansion. Network cards are also known as network interface cards (NIC). The NIC assists with networking communication at higher speeds. Majority of PC’s include a NIC.The NIC can be viewed as the intermediary between a computer and a data network.

    in reply to: OCU C)HT B Discussion Lesson 03 #98567
    Latoya Stoudmire
    Participant

    Hello Jason
    I followed a lot of the same steps as yourself. I like that you started from the easiest thing to correct and branched out from there. The use of an ESD strap is often times overlooked but very useful in preventing a person from being electrocuted. I have never used the multimeter method but I have used the paper clip method. which do you find more effective?

    in reply to: OCU C)HT B Discussion Lesson 02 #98566
    Latoya Stoudmire
    Participant

    Hello Jessica great response. You have a great way of simplifying information. I think you did a great job explaining the motherboard features especially the bios and uefi. After reading your discussion I went back and researched the bios more.

    in reply to: OCU C)HT B Discussion Lesson 01 #98565
    Latoya Stoudmire
    Participant

    Hello Jason I like how you used real life instances to better explain the troubleshooting process. I agree that both business and customers can face issues requiring them to trouble shoot. Each party may take different measures to resolve the issue but as you said all steps should be documented to prevent future issues.

Viewing 15 posts - 1 through 15 (of 35 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .