50
Final Review • This is most likely incomplete as I didn’t write everything down during the review.

Final Review This is most likely incomplete as I didn’t write everything down during the review

Embed Size (px)

Citation preview

Page 1: Final Review This is most likely incomplete as I didn’t write everything down during the review

Final Review

• This is most likely incomplete as I didn’t write everything down during the review.

Page 2: Final Review This is most likely incomplete as I didn’t write everything down during the review

(01) Active Directory

• Large Database

• Control and administration mechanism of Windows XP

• Combines the various aspects of a network into a manageable hierarchical structure

Page 3: Final Review This is most likely incomplete as I didn’t write everything down during the review

(01) HAL

• Hardware abstraction layer– Goal of the HAL is to isolate any hardware-

dependent code in order to prevent direct access to hardware

Page 4: Final Review This is most likely incomplete as I didn’t write everything down during the review

(01) HCL

• Hardware Compatibility List• Contains all known Windows XP-

compatible hardware devices• Finding the HCL

– Easiest place to look is on Windows XP CD-ROM in the Support folder

• Keep in mind the HCL is not a static document

Page 5: Final Review This is most likely incomplete as I didn’t write everything down during the review

PXE

• To install from a RIS (Remote Installation Service) server, the workstation’s NIC must be PXE compliant (page 44 & 45)

Page 6: Final Review This is most likely incomplete as I didn’t write everything down during the review

(03) Hardware Profiles

• Similar to a user profile

• Collection of custom device settings used on computers with changing physical components

• Most often used on portable computers for which hardware configurations change often

Page 7: Final Review This is most likely incomplete as I didn’t write everything down during the review

(03) MMC Formats

• Once you’ve added and configured a console’s snap-ins, you can save the console to an .msc file in one of four formats:– Author Mode

– User Mode formats• Full Access

• Delegated Access, Multiple Windows

• Delegated Access, Single Window• (He kind of screwed this one up)

Page 8: Final Review This is most likely incomplete as I didn’t write everything down during the review

(04) RAID• There are five drive configurations or structures

supported by Windows XP:– Simple volume

• Single Drive or partition

– Spanned volume• Multiple drives or partitions, filled one-at-a-time

– Striped volume, RAID-0• Small pieces of data written sequentially to multiple drives or

partitions

– Mirrored volume, RAID-1 (hardware only)• Exact duplicate of another drive or partition

– RAID-5 volume (hardware only)• Striping with Parity

Page 9: Final Review This is most likely incomplete as I didn’t write everything down during the review

(04) NTFS Permissions

• Moving an object within the same NTFS volume or partition– Retain

• Copying an object within the same NTFS volume or partition– Inherit

• Moving an object from one NTFS volume or partition to another NTFS volume or partition – Inherit

Page 10: Final Review This is most likely incomplete as I didn’t write everything down during the review

(04) NTFS Permissions• Copying an object from one NTFS volume or

partition to another NTFS volume or partition – Inherit

• Copying or Moving an object from a FAT or FAT32 volume or partition to an NTFS volume or partition– Inherit

• Copying or Moving an object from an NTFS volume or partition to a FAT or FAT32 volume or partition – Lose

Page 11: Final Review This is most likely incomplete as I didn’t write everything down during the review

(04) NTFS Permissions

• Rules to keep in mind:– NTFS object permissions always apply, no matter if the

accessing user is local or remote– NTFS object permissions are cumulative– NTFS file permissions override any contradictory

settings on the parent or container folder– Deny overrides all other specific Allows– When disabling inheritance for an NTFS object, select

to either Copy the parent object’s permissions to the current object or Remove permissions assigned from the parent and retain only object-specific settings

Page 12: Final Review This is most likely incomplete as I didn’t write everything down during the review

(04) Share Permissions

• Important issues to keep in mind when working with shares:– Shares are folders not

individual files

– Share permissions only apply to the network access points

– Multiple share-permission levels due to group membership are cumulative

Page 13: Final Review This is most likely incomplete as I didn’t write everything down during the review

(04) NTFS/Share Permissions

• Effective Permissions– The most restrictive permissions of cumulative

share or cumulative NTFS apply

Page 14: Final Review This is most likely incomplete as I didn’t write everything down during the review

(05) Fast User Switching

• Windows Welcome– Completely new logon method to the Windows

product line– Fast user switching, programs stay active while

another user is using the system– Does not log into a domain, local logon only

Page 15: Final Review This is most likely incomplete as I didn’t write everything down during the review

(06) Access Token

• An access token includes all security information pertaining to that user, including the user’s security ID (SID) and SIDs for each of the groups to which the user belongs

• An access token includes the following components:– Unique SID for the account– List of groups to which the user belongs– List of rights and privileges associated with the specific

user’s account

Page 16: Final Review This is most likely incomplete as I didn’t write everything down during the review

ACL

• Each time a user attempts to access a resource, his/her Access Token is compared to a list of permissions associated with the resource, called an Access Control List– (Chapter 6, page 216)

Page 17: Final Review This is most likely incomplete as I didn’t write everything down during the review

(06) Everyone Group Permissions

• Prior to Service Pack 1– Everyone group has Full Control

• With Service Pack– Everyone group has Read Only

Page 18: Final Review This is most likely incomplete as I didn’t write everything down during the review

(06) Encrypted File System (EFS)

• Allows you to encrypt data stored on NTFS drive• When EFS is enabled on a file, folder, or drive,

only the enabling user can gain access to the encrypted object

• EFS uses a public and private key encryption• The Recovery Agent Can Recover the files if the

private key is not available– Local System Admin by default

Page 19: Final Review This is most likely incomplete as I didn’t write everything down during the review

GPRESULT

• Utility that checks Local Group Policies– (This is all I have on this, hopefully you have

more)

Page 20: Final Review This is most likely incomplete as I didn’t write everything down during the review

Priority of Group Policies

• NT4

• Local

• Site

• Domain

• OU – Organizational Unit

Page 21: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) TCP/IP

• TCP– Connection-oriented

• Class of network transport protocols that include guaranteed delivery, explicit acknowledgement of data receipt, and a variety of other data integrity checks

– SMTP, HTTP, FTP

Page 22: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) TCP/IP

• IP– Connectionless

• Class of network transport protocols that makes only a “best effort” at delivery

• Includes no explicit mechanisms to guarantee delivery or data integrity

– UDP

Page 23: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) DLC

• Data Link Control – Network transport protocol that allows

connectivity to mainframes, printers, and servers running Remote Program Load software

Page 24: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) ICMP

• Internet Control Message Protocol– Used to send control messages between IP

hosts

Page 25: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) NWLink

• Microsoft’s implementation of the IPX/SPX protocol suite

• Can communicate with all NetWare implementations

• To ensure proper desktop integration in a NetWare server environment, NWLink supports most (but not all) NetWare utilities and functions

Page 26: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) NetBIOS

• Network Basic Input/Output System– Client/server interprocess communication

service developed by IBM in 1985

• NBT (NetBIOS over TCP/IP)– Network protocol in TCP/IP stack that provides

NetBIOS naming services

Page 27: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) TCP/IP Command Line Tools

• NETSTAT– Displays a list of active TCP connections

• NBSTAT– Displays protocol statistics for NetBIOS over TCP/IP

(NetBT), NetBIOS name tables, and the NetBIOS name cache

Page 28: Final Review This is most likely incomplete as I didn’t write everything down during the review

(07) Binding / Bindery

• Bindings– Refers to the order in which Windows XP

networking components are linked

• Bindery– Proprietary database that contains Novell

network resource information

Page 29: Final Review This is most likely incomplete as I didn’t write everything down during the review

APIPA

• Automatic Private IP Addressing– Used when no DHCP server is present

Page 30: Final Review This is most likely incomplete as I didn’t write everything down during the review

X.25

• An ITU standard for packet-switched networking– Common outside the U.S.– Robust data-handling capability makes it a

good match for substandard telephone networks

Page 31: Final Review This is most likely incomplete as I didn’t write everything down during the review

(08) ICS/ICF

• Internet Connection Sharing (ICS)– Used to share a single network connection with

a small group of networked computers• The shared connection can be a link to the Internet

or any type of network

• Internet Connection Firewall (ICF)– A security measure for protecting network

connections from unwanted traffic

Page 32: Final Review This is most likely incomplete as I didn’t write everything down during the review

(08) VPN

• Virtual private network– A secure “tunnel” through the Internet

– Windows XP support two VPN protocols:

– Point-to-Point-Tunneling Protocol (PPTP) (9x+)• Allows you to establish a secure remote access pipeline over

the public Internet and to “tunnel” IPX or TCP/IP traffic inside PPP packets

– L2TP is a similar protocol developed by Cisco for use with IPSec to support secure VPN links (2000+)

• From a user’s perspective, it operates in the same manner as PPTP

Page 33: Final Review This is most likely incomplete as I didn’t write everything down during the review

(08) PPP

• Point-to-Point Protocol – Current standard for remote access– Remotes access protocol standards are defined

in RFCs published by the IETF and other working groups

– Microsoft recommends using PPP because it is flexible and is the industry standard

Page 34: Final Review This is most likely incomplete as I didn’t write everything down during the review

(08) SLIP

• Serial Line Internet Protocol (SLIP)– One of the first protocols developed

specifically for TCP/IP support over dial-up connections, does not support DHCP

Page 35: Final Review This is most likely incomplete as I didn’t write everything down during the review

(11) LPC

• Local Procedure Call (LPC)– Technique to permit processes to exchange data

in the Windows XP runtime environment

Page 36: Final Review This is most likely incomplete as I didn’t write everything down during the review

(11) Process Priority

• Figure 11-3: The Task Manager’s Process tab with priority options on display

Page 37: Final Review This is most likely incomplete as I didn’t write everything down during the review

(11) Critical Section

– Section of code that modifies data structures used by several threads is called a critical section

– It is very important that a critical section never be overwritten by more than one thread at once

• Application use Windows XP synchronization objects to prevent this from happening

Page 38: Final Review This is most likely incomplete as I didn’t write everything down during the review

(11) VDM

• Virtual DOS Machine• It is reasonable to describe two separate

operating environments that can run within a VDM:– One supports straightforward DOS emulation and

may be called the DOS operating environment– The other supports operation of Win16 applications

within a VDM, and may be called the Win16 operating environment

Page 39: Final Review This is most likely incomplete as I didn’t write everything down during the review

(11) VDD

• Virtual Device Drivers (VDDs)

• DOS applications do not communicate directly with Windows XP drivers– Instead, a layer of VDDs underlies these

applications, and they communicate with Windows XP 32-bit drivers

• VDDs are device drivers used by VDMs

Page 40: Final Review This is most likely incomplete as I didn’t write everything down during the review

Compatibility Mode

• Tool designed to support the installation of older applications that cause problems or fail to work altogether in Windows XP

Page 41: Final Review This is most likely incomplete as I didn’t write everything down during the review

(12) LKGC

• Last Known Good Configuration (LKGC)– State of the Registry stored in one of the

control sets when the last successful user logon occurred

Page 42: Final Review This is most likely incomplete as I didn’t write everything down during the review

(13) System/Boot Partitions

• System partition– Partition that contains the MBR and partition

boot sector• NTLDR

• Boot partition– Partition that contains the Windows XP files

• KERNEL

Page 43: Final Review This is most likely incomplete as I didn’t write everything down during the review

(14) Microsoft IntelliMirror

• Term used to describe features of Windows XP that help ensure the availability of a user’s data and computer configuration

• Three key elements of IntelliMirror:– User data management– User settings management– Software installation and maintenance

Page 44: Final Review This is most likely incomplete as I didn’t write everything down during the review

(14)Windows File Protection (WFP)

• Ensures that the correct and uncorrupted versions of certain core files are retained on the system at all times

• Protects its list of sacred files from changes due to application installation, virus infection, and even human error

• Works in the background, watching for attempted writes to its monitored files

Page 45: Final Review This is most likely incomplete as I didn’t write everything down during the review

(14) Backup Types

• Copy backup– Backs up all selected files without marking them as being

backed up

• Normal (or full) backup– Backs up all selected files and marks them as being backed

up

• Daily backup– Backs up only the selected files that have been created or

modified on the day the backup is being performed

Page 46: Final Review This is most likely incomplete as I didn’t write everything down during the review

(14) Backup Types

• Differential backup– Backs up selected files that have been created

or modified since the last full backup

• Incremental backup– Backs up selected files that have been created

or modified since the last normal or incremental backup

Page 47: Final Review This is most likely incomplete as I didn’t write everything down during the review

(14) Recovery Console

• Command-line interface that provides administrative tools useful for recovering a system that is not booting correctly

• Install– %systemroot% \winnt32.exe /cmdcons

Page 48: Final Review This is most likely incomplete as I didn’t write everything down during the review

(14) Driver Rollback

• Device driver rollback– Removes the current driver for a device and re-

initializes the previous driver

Page 49: Final Review This is most likely incomplete as I didn’t write everything down during the review

Windows XP Rollback

• Rolling back to Windows 98 – Windows XP installed as an upgrade – Formatted as FAT32

• Add/Remove Programs

Page 50: Final Review This is most likely incomplete as I didn’t write everything down during the review

CMOS

• Complimentary Metal-Oxide Semiconductor

• Battery powered storage chip located on the motherboard