Troubleshooting and Security Hardware
Methodology and Physical Safeguards
1 Purpose
When a mobile device fails, a technician needs a logical and repeatable process to find the root cause. This document introduces how to apply the standard A+ troubleshooting methodology to common mobile device symptoms. It also covers the physical and biometric hardware features designed to protect the device and its data from unauthorized access.
2 What You’ll Accomplish
By the end of this reading, you will be able to:
- List the six steps of the CompTIA A+ troubleshooting methodology.
- Apply the troubleshooting methodology to common mobile device symptoms like poor battery life or failed connectivity.
- Identify common hardware security features, such as biometric scanners and physical lock slots.
This reading maps to the following program and course learning outcomes:
- Course Learning Outcomes (CLOs):
- 3. Troubleshoot hardware and basic network components: This document is focused on the core process of troubleshooting and identifying security-related hardware.
This exercise develops the following skills, which align with the O*NET SOC Code 15-1232.00 for Computer User Support Specialists.
| Learning Objective | O*NET KSAs | Technologies Used |
|---|---|---|
| Apply the A+ troubleshooting methodology. | Knowledge: Customer and Personal Service Skills: Troubleshooting, Critical Thinking |
A+ Methodology |
| Diagnose common mobile device symptoms. | Knowledge: Computers & Electronics, Telecommunications Skills: Systems Analysis |
upower, nmcli |
| Identify hardware security features. | Knowledge: Public Safety and Security Abilities: None |
Biometrics, Kensington Lock |
3 The A+ Troubleshooting Methodology
A structured approach is always more effective than random guessing. The CompTIA A+ methodology provides a six-step framework for any IT problem.
- Identify the problem: Question the user and gather information. Identify all symptoms.
- Establish a theory of probable cause: Start with the simplest and most obvious potential causes.
- Test the theory to determine cause: If the theory is confirmed, move to the next step. If not, establish a new theory.
- Establish a plan of action to resolve the problem and implement the solution.
- Verify full system functionality and, if applicable, implement preventative measures.
- Document findings, actions, and outcomes.
4 Applying the Methodology to Mobile Issues
Let’s apply this framework to a couple of common scenarios that can be diagnosed using the tools in your Fedora VM.
4.1 Scenario 1: “My battery drains too fast.”
- 1. Identify: A user reports their laptop battery life has recently become much shorter.
- 2. Theory:
- Theory A: The battery is old and has degraded.
- Theory B: A software process is stuck and using excessive CPU.
- Theory C: The system is stuck in the “Performance” power profile.
- 3. Test:
- Test A: Use
upower -i /org/freedesktop/UPower/devices/battery_BAT0and check thecapacitypercentage. A low value (e.g., below 80%) indicates significant degradation. - Test B: Use the
topcommand to see if any process is consistently using a high percentage of the CPU. - Test C: Use
powerprofilesctl getto see if the active profile isperformance.
- Test A: Use
- 4. Plan:
- If Test A is the cause, the plan is to recommend a battery replacement.
- If Test B is the cause, the plan is to kill the rogue process and investigate why it got stuck.
- If Test C is the cause, the plan is to use
powerprofilesctl set balancedto return to a normal power profile.
- 5. Verify: After implementing the fix, use the device and see if battery life improves.
- 6. Document: Note the cause (e.g., “High CPU usage from ‘stuck_process’”) and the solution.
4.2 Scenario 2: “I can’t connect to the Wi-Fi.”
- 1. Identify: A user’s laptop cannot access any websites. The Wi-Fi icon indicates it is disconnected.
- 2. Theory:
- Theory A: The Wi-Fi radio has been accidentally turned off by a physical switch or software setting.
- Theory B: The device is out of range of any known access points.
- 3. Test:
- Test A: Run
nmcli radio wifito see if the hardware is enabled. - Test B: Run
nmcli device wifi listto see if any networks are visible and what their signal strength is.
- Test A: Run
- 4. Plan:
- If Test A is the cause, the plan is to run
nmcli radio wifi on. - If Test B is the cause, the plan is to advise the user to move closer to their router.
- If Test A is the cause, the plan is to run
- 5. Verify: Attempt to connect to the network.
- 6. Document: Note the cause (e.g., “Wi-Fi radio was disabled in software”) and the solution.
5 Hardware Security Features
Beyond software, mobile devices have physical features to protect them.
- Biometric Authentication:
- Fingerprint Readers: Scanners (often on the power button or under the screen) that grant access based on a unique fingerprint.
- Facial Recognition: Uses infrared cameras and dot projectors (like Apple’s Face ID) to create a 3D map of a face for secure authentication.
- Physical Security:
- Kensington Lock Slot: A small, reinforced hole found on most laptops. A special cable lock can be attached to secure the laptop to a desk, preventing physical theft.
- Privacy Shutters: A small physical slider that covers the webcam, providing a guaranteed way to know the camera is not active.
- Microphone Mute Keys: A dedicated key on some laptops that electronically disconnects the microphone at the hardware level.
6 Reflect and Review
Now that you have reviewed this document, take a moment to reflect on your learning in your Microsoft Teams Student Notebook:
- 3 of the six steps in the A+ troubleshooting methodology.
- 2 different hardware security features you might find on a laptop.
- 1 question you still have about diagnosing mobile device issues.
Answer these questions in your notebook to solidify your understanding:
- What is the first step in the A+ troubleshooting methodology?
- A user reports their laptop feels “puffy” and the keyboard is bulging. What is the most likely and most dangerous cause?
- You suspect a rogue application is draining your battery. What command-line tool could you use to check for processes with high CPU usage?
- What is the purpose of a Kensington Lock slot?
- You run
nmcli device wifi listand see no networks listed. What are two possible theories for the cause of this problem?