Quick Reference

CompTIA A+ Cram Sheet

OSI model, ports, commands, RAID, and more — one page

OSI Model (7 Layers)

#LayerProtocols/Devices
7ApplicationHTTP, FTP, DNS, SMTP, SNMP
6PresentationSSL/TLS, JPEG, encryption
5SessionNetBIOS, RPC, SQL sessions
4TransportTCP (reliable), UDP (fast)
3NetworkIP, ICMP, routers
2Data LinkMAC, Ethernet, switches, ARP
1PhysicalCables, hubs, signals, Wi-Fi
Mnemonic (top-down): All People Seem To Need Data Processing. (bottom-up): Please Do Not Throw Sausage Pizza Away.

Common Network Ports

PortProtocolUse
20/21FTPFile Transfer (20=data, 21=control)
22SSHSecure remote access
23TelnetUnsecure remote access
25SMTPSend email
53DNSName resolution (TCP+UDP)
67/68DHCPIP address assignment
80HTTPWeb (unencrypted)
110POP3Receive email (downloads)
143IMAPReceive email (syncs)
443HTTPSWeb (encrypted/TLS)
3389RDPRemote Desktop Protocol

IP Address Ranges

ClassRangeDefault Subnet
Class A1.0.0.0 – 126.255.255.255255.0.0.0 (/8)
Class B128.0.0.0 – 191.255.255.255255.255.0.0 (/16)
Class C192.0.0.0 – 223.255.255.255255.255.255.0 (/24)
Private Ranges (not routable)
10.0.0.0 – 10.255.255.255 (Class A)
172.16.0.0 – 172.31.255.255 (Class B)
192.168.0.0 – 192.168.255.255 (Class C)
169.254.x.x = APIPA (DHCP failed)
127.0.0.1 = Loopback (localhost)

Windows Command Line Tools

CommandPurpose
ipconfigShow IP config; /all for details; /release & /renew for DHCP
pingTest connectivity to host
tracertTrace route to destination (shows hops)
netstatShow active connections and listening ports
nslookupDNS lookup — query name or IP
sfc /scannowSystem File Checker — repairs corrupted Windows files
chkdskCheck and repair disk errors
diskpartDisk partitioning utility
gpupdateForce Group Policy update

RAID Levels

RAIDMethodMin DrivesFault Tolerance
RAID 0Striping only2None — one failure = total loss
RAID 1Mirroring21 drive failure
RAID 5Striping + Parity31 drive failure
RAID 6Striping + Dual Parity42 drive failures
RAID 10Stripe of Mirrors41 per mirror pair
RAID is NOT a backup! RAID 0 = speed (no redundancy). RAID 1 = redundancy (50% capacity). RAID 5 = balance. RAID 10 = best overall.

6-Step Troubleshooting Methodology

  1. Identify the problem — gather info, symptoms, recent changes
  2. Establish a theory — probable cause (question obvious first)
  3. Test the theory — confirm cause; if wrong, establish new theory
  4. Establish plan of action — resolve the issue, consider implications
  5. Implement solution — fix the problem, escalate if needed
  6. Verify and document — confirm full functionality, document findings

Laptop Display Types

TypeProsCons
TNFast response, cheapPoor viewing angles, colors
IPSGreat colors, wide anglesMore expensive, slight ghosting
OLEDPerfect blacks, vibrantBurn-in risk, expensive

Security Quick Reference

ThreatDescriptionPrevention
PhishingFraudulent emails to steal credentialsUser training, email filtering, MFA
RansomwareEncrypts files, demands paymentOffline backups, patching, AV, email filtering
Social EngineeringManipulating humans to bypass securitySecurity awareness training
Zero-DayExploit targeting unpatched vulnerabilityBehavior-based AV, network segmentation, fast patching
TailgatingPhysical unauthorized entry behind authorized personSecurity policies, access badges, mantraps
Encryption: BitLocker = full disk (needs TPM). EFS = individual files/folders. Always save BitLocker recovery key OFF the encrypted drive.
Principle of Least Privilege: Grant minimum permissions needed. Run as standard user daily. Admin only when required. Reduces attack surface significantly.
✅ Ready to practice? Take the full CompTIA A+ Practice Exam →