Upload
milton-booth
View
220
Download
0
Tags:
Embed Size (px)
Citation preview
Final Review
• This is most likely incomplete as I didn’t write everything down during the review.
(01) Active Directory
• Large Database
• Control and administration mechanism of Windows XP
• Combines the various aspects of a network into a manageable hierarchical structure
(01) HAL
• Hardware abstraction layer– Goal of the HAL is to isolate any hardware-
dependent code in order to prevent direct access to hardware
(01) HCL
• Hardware Compatibility List• Contains all known Windows XP-
compatible hardware devices• Finding the HCL
– Easiest place to look is on Windows XP CD-ROM in the Support folder
• Keep in mind the HCL is not a static document
PXE
• To install from a RIS (Remote Installation Service) server, the workstation’s NIC must be PXE compliant (page 44 & 45)
(03) Hardware Profiles
• Similar to a user profile
• Collection of custom device settings used on computers with changing physical components
• Most often used on portable computers for which hardware configurations change often
(03) MMC Formats
• Once you’ve added and configured a console’s snap-ins, you can save the console to an .msc file in one of four formats:– Author Mode
– User Mode formats• Full Access
• Delegated Access, Multiple Windows
• Delegated Access, Single Window• (He kind of screwed this one up)
(04) RAID• There are five drive configurations or structures
supported by Windows XP:– Simple volume
• Single Drive or partition
– Spanned volume• Multiple drives or partitions, filled one-at-a-time
– Striped volume, RAID-0• Small pieces of data written sequentially to multiple drives or
partitions
– Mirrored volume, RAID-1 (hardware only)• Exact duplicate of another drive or partition
– RAID-5 volume (hardware only)• Striping with Parity
(04) NTFS Permissions
• Moving an object within the same NTFS volume or partition– Retain
• Copying an object within the same NTFS volume or partition– Inherit
• Moving an object from one NTFS volume or partition to another NTFS volume or partition – Inherit
(04) NTFS Permissions• Copying an object from one NTFS volume or
partition to another NTFS volume or partition – Inherit
• Copying or Moving an object from a FAT or FAT32 volume or partition to an NTFS volume or partition– Inherit
• Copying or Moving an object from an NTFS volume or partition to a FAT or FAT32 volume or partition – Lose
(04) NTFS Permissions
• Rules to keep in mind:– NTFS object permissions always apply, no matter if the
accessing user is local or remote– NTFS object permissions are cumulative– NTFS file permissions override any contradictory
settings on the parent or container folder– Deny overrides all other specific Allows– When disabling inheritance for an NTFS object, select
to either Copy the parent object’s permissions to the current object or Remove permissions assigned from the parent and retain only object-specific settings
(04) Share Permissions
• Important issues to keep in mind when working with shares:– Shares are folders not
individual files
– Share permissions only apply to the network access points
– Multiple share-permission levels due to group membership are cumulative
(04) NTFS/Share Permissions
• Effective Permissions– The most restrictive permissions of cumulative
share or cumulative NTFS apply
(05) Fast User Switching
• Windows Welcome– Completely new logon method to the Windows
product line– Fast user switching, programs stay active while
another user is using the system– Does not log into a domain, local logon only
(06) Access Token
• An access token includes all security information pertaining to that user, including the user’s security ID (SID) and SIDs for each of the groups to which the user belongs
• An access token includes the following components:– Unique SID for the account– List of groups to which the user belongs– List of rights and privileges associated with the specific
user’s account
ACL
• Each time a user attempts to access a resource, his/her Access Token is compared to a list of permissions associated with the resource, called an Access Control List– (Chapter 6, page 216)
(06) Everyone Group Permissions
• Prior to Service Pack 1– Everyone group has Full Control
• With Service Pack– Everyone group has Read Only
(06) Encrypted File System (EFS)
• Allows you to encrypt data stored on NTFS drive• When EFS is enabled on a file, folder, or drive,
only the enabling user can gain access to the encrypted object
• EFS uses a public and private key encryption• The Recovery Agent Can Recover the files if the
private key is not available– Local System Admin by default
GPRESULT
• Utility that checks Local Group Policies– (This is all I have on this, hopefully you have
more)
Priority of Group Policies
• NT4
• Local
• Site
• Domain
• OU – Organizational Unit
(07) TCP/IP
• TCP– Connection-oriented
• Class of network transport protocols that include guaranteed delivery, explicit acknowledgement of data receipt, and a variety of other data integrity checks
– SMTP, HTTP, FTP
(07) TCP/IP
• IP– Connectionless
• Class of network transport protocols that makes only a “best effort” at delivery
• Includes no explicit mechanisms to guarantee delivery or data integrity
– UDP
(07) DLC
• Data Link Control – Network transport protocol that allows
connectivity to mainframes, printers, and servers running Remote Program Load software
(07) ICMP
• Internet Control Message Protocol– Used to send control messages between IP
hosts
(07) NWLink
• Microsoft’s implementation of the IPX/SPX protocol suite
• Can communicate with all NetWare implementations
• To ensure proper desktop integration in a NetWare server environment, NWLink supports most (but not all) NetWare utilities and functions
(07) NetBIOS
• Network Basic Input/Output System– Client/server interprocess communication
service developed by IBM in 1985
• NBT (NetBIOS over TCP/IP)– Network protocol in TCP/IP stack that provides
NetBIOS naming services
(07) TCP/IP Command Line Tools
• NETSTAT– Displays a list of active TCP connections
• NBSTAT– Displays protocol statistics for NetBIOS over TCP/IP
(NetBT), NetBIOS name tables, and the NetBIOS name cache
(07) Binding / Bindery
• Bindings– Refers to the order in which Windows XP
networking components are linked
• Bindery– Proprietary database that contains Novell
network resource information
APIPA
• Automatic Private IP Addressing– Used when no DHCP server is present
X.25
• An ITU standard for packet-switched networking– Common outside the U.S.– Robust data-handling capability makes it a
good match for substandard telephone networks
(08) ICS/ICF
• Internet Connection Sharing (ICS)– Used to share a single network connection with
a small group of networked computers• The shared connection can be a link to the Internet
or any type of network
• Internet Connection Firewall (ICF)– A security measure for protecting network
connections from unwanted traffic
(08) VPN
• Virtual private network– A secure “tunnel” through the Internet
– Windows XP support two VPN protocols:
– Point-to-Point-Tunneling Protocol (PPTP) (9x+)• Allows you to establish a secure remote access pipeline over
the public Internet and to “tunnel” IPX or TCP/IP traffic inside PPP packets
– L2TP is a similar protocol developed by Cisco for use with IPSec to support secure VPN links (2000+)
• From a user’s perspective, it operates in the same manner as PPTP
(08) PPP
• Point-to-Point Protocol – Current standard for remote access– Remotes access protocol standards are defined
in RFCs published by the IETF and other working groups
– Microsoft recommends using PPP because it is flexible and is the industry standard
(08) SLIP
• Serial Line Internet Protocol (SLIP)– One of the first protocols developed
specifically for TCP/IP support over dial-up connections, does not support DHCP
(11) LPC
• Local Procedure Call (LPC)– Technique to permit processes to exchange data
in the Windows XP runtime environment
(11) Process Priority
• Figure 11-3: The Task Manager’s Process tab with priority options on display
(11) Critical Section
– Section of code that modifies data structures used by several threads is called a critical section
– It is very important that a critical section never be overwritten by more than one thread at once
• Application use Windows XP synchronization objects to prevent this from happening
(11) VDM
• Virtual DOS Machine• It is reasonable to describe two separate
operating environments that can run within a VDM:– One supports straightforward DOS emulation and
may be called the DOS operating environment– The other supports operation of Win16 applications
within a VDM, and may be called the Win16 operating environment
(11) VDD
• Virtual Device Drivers (VDDs)
• DOS applications do not communicate directly with Windows XP drivers– Instead, a layer of VDDs underlies these
applications, and they communicate with Windows XP 32-bit drivers
• VDDs are device drivers used by VDMs
Compatibility Mode
• Tool designed to support the installation of older applications that cause problems or fail to work altogether in Windows XP
(12) LKGC
• Last Known Good Configuration (LKGC)– State of the Registry stored in one of the
control sets when the last successful user logon occurred
(13) System/Boot Partitions
• System partition– Partition that contains the MBR and partition
boot sector• NTLDR
• Boot partition– Partition that contains the Windows XP files
• KERNEL
(14) Microsoft IntelliMirror
• Term used to describe features of Windows XP that help ensure the availability of a user’s data and computer configuration
• Three key elements of IntelliMirror:– User data management– User settings management– Software installation and maintenance
(14)Windows File Protection (WFP)
• Ensures that the correct and uncorrupted versions of certain core files are retained on the system at all times
• Protects its list of sacred files from changes due to application installation, virus infection, and even human error
• Works in the background, watching for attempted writes to its monitored files
(14) Backup Types
• Copy backup– Backs up all selected files without marking them as being
backed up
• Normal (or full) backup– Backs up all selected files and marks them as being backed
up
• Daily backup– Backs up only the selected files that have been created or
modified on the day the backup is being performed
(14) Backup Types
• Differential backup– Backs up selected files that have been created
or modified since the last full backup
• Incremental backup– Backs up selected files that have been created
or modified since the last normal or incremental backup
(14) Recovery Console
• Command-line interface that provides administrative tools useful for recovering a system that is not booting correctly
• Install– %systemroot% \winnt32.exe /cmdcons
(14) Driver Rollback
• Device driver rollback– Removes the current driver for a device and re-
initializes the previous driver
Windows XP Rollback
• Rolling back to Windows 98 – Windows XP installed as an upgrade – Formatted as FAT32
• Add/Remove Programs
CMOS
• Complimentary Metal-Oxide Semiconductor
• Battery powered storage chip located on the motherboard