* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
Download Final Exam 2004 PowerPoint
Survey
Document related concepts
Transcript
Final Review • This is most likely incomplete as I didn’t write everything down during the review. (01) Active Directory • Large Database • Control and administration mechanism of Windows XP • Combines the various aspects of a network into a manageable hierarchical structure (01) HAL • Hardware abstraction layer – Goal of the HAL is to isolate any hardwaredependent code in order to prevent direct access to hardware (01) HCL • Hardware Compatibility List • Contains all known Windows XPcompatible hardware devices • Finding the HCL – Easiest place to look is on Windows XP CDROM in the Support folder • Keep in mind the HCL is not a static document PXE • To install from a RIS (Remote Installation Service) server, the workstation’s NIC must be PXE compliant (page 44 & 45) (03) Hardware Profiles • Similar to a user profile • Collection of custom device settings used on computers with changing physical components • Most often used on portable computers for which hardware configurations change often (03) MMC Formats • Once you’ve added and configured a console’s snap-ins, you can save the console to an .msc file in one of four formats: – Author Mode – User Mode formats • Full Access • Delegated Access, Multiple Windows • Delegated Access, Single Window • (He kind of screwed this one up) (04) RAID • There are five drive configurations or structures supported by Windows XP: – Simple volume • Single Drive or partition – Spanned volume • Multiple drives or partitions, filled one-at-a-time – Striped volume, RAID-0 • Small pieces of data written sequentially to multiple drives or partitions – Mirrored volume, RAID-1 (hardware only) • Exact duplicate of another drive or partition – RAID-5 volume (hardware only) • Striping with Parity (04) NTFS Permissions • Moving an object within the same NTFS volume or partition – Retain • Copying an object within the same NTFS volume or partition – Inherit • Moving an object from one NTFS volume or partition to another NTFS volume or partition – Inherit (04) NTFS Permissions • Copying an object from one NTFS volume or partition to another NTFS volume or partition – Inherit • Copying or Moving an object from a FAT or FAT32 volume or partition to an NTFS volume or partition – Inherit • Copying or Moving an object from an NTFS volume or partition to a FAT or FAT32 volume or partition – Lose (04) NTFS Permissions • Rules to keep in mind: – NTFS object permissions always apply, no matter if the accessing user is local or remote – NTFS object permissions are cumulative – NTFS file permissions override any contradictory settings on the parent or container folder – Deny overrides all other specific Allows – When disabling inheritance for an NTFS object, select to either Copy the parent object’s permissions to the current object or Remove permissions assigned from the parent and retain only object-specific settings (04) Share Permissions • Important issues to keep in mind when working with shares: – Shares are folders not individual files – Share permissions only apply to the network access points – Multiple share-permission levels due to group membership are cumulative (04) NTFS/Share Permissions • Effective Permissions – The most restrictive permissions of cumulative share or cumulative NTFS apply (05) Fast User Switching • Windows Welcome – Completely new logon method to the Windows product line – Fast user switching, programs stay active while another user is using the system – Does not log into a domain, local logon only (06) Access Token • An access token includes all security information pertaining to that user, including the user’s security ID (SID) and SIDs for each of the groups to which the user belongs • An access token includes the following components: – Unique SID for the account – List of groups to which the user belongs – List of rights and privileges associated with the specific user’s account ACL • Each time a user attempts to access a resource, his/her Access Token is compared to a list of permissions associated with the resource, called an Access Control List – (Chapter 6, page 216) (06) Everyone Group Permissions • Prior to Service Pack 1 – Everyone group has Full Control • With Service Pack – Everyone group has Read Only (06) Encrypted File System (EFS) • Allows you to encrypt data stored on NTFS drive • When EFS is enabled on a file, folder, or drive, only the enabling user can gain access to the encrypted object • EFS uses a public and private key encryption • The Recovery Agent Can Recover the files if the private key is not available – Local System Admin by default GPRESULT • Utility that checks Local Group Policies – (This is all I have on this, hopefully you have more) Priority of Group Policies • • • • • NT4 Local Site Domain OU – Organizational Unit (07) TCP/IP • TCP – Connection-oriented • Class of network transport protocols that include guaranteed delivery, explicit acknowledgement of data receipt, and a variety of other data integrity checks – SMTP, HTTP, FTP (07) TCP/IP • IP – Connectionless • Class of network transport protocols that makes only a “best effort” at delivery • Includes no explicit mechanisms to guarantee delivery or data integrity – UDP (07) DLC • Data Link Control – Network transport protocol that allows connectivity to mainframes, printers, and servers running Remote Program Load software (07) ICMP • Internet Control Message Protocol – Used to send control messages between IP hosts (07) NWLink • Microsoft’s implementation of the IPX/SPX protocol suite • Can communicate with all NetWare implementations • To ensure proper desktop integration in a NetWare server environment, NWLink supports most (but not all) NetWare utilities and functions (07) NetBIOS • Network Basic Input/Output System – Client/server interprocess communication service developed by IBM in 1985 • NBT (NetBIOS over TCP/IP) – Network protocol in TCP/IP stack that provides NetBIOS naming services (07) TCP/IP Command Line Tools • NETSTAT – Displays a list of active TCP connections • NBSTAT – Displays protocol statistics for NetBIOS over TCP/IP (NetBT), NetBIOS name tables, and the NetBIOS name cache (07) Binding / Bindery • Bindings – Refers to the order in which Windows XP networking components are linked • Bindery – Proprietary database that contains Novell network resource information APIPA • Automatic Private IP Addressing – Used when no DHCP server is present X.25 • An ITU standard for packet-switched networking – Common outside the U.S. – Robust data-handling capability makes it a good match for substandard telephone networks (08) ICS/ICF • Internet Connection Sharing (ICS) – Used to share a single network connection with a small group of networked computers • The shared connection can be a link to the Internet or any type of network • Internet Connection Firewall (ICF) – A security measure for protecting network connections from unwanted traffic (08) VPN • Virtual private network – A secure “tunnel” through the Internet – Windows XP support two VPN protocols: – Point-to-Point-Tunneling Protocol (PPTP) (9x+) • Allows you to establish a secure remote access pipeline over the public Internet and to “tunnel” IPX or TCP/IP traffic inside PPP packets – L2TP is a similar protocol developed by Cisco for use with IPSec to support secure VPN links (2000+) • From a user’s perspective, it operates in the same manner as PPTP (08) PPP • Point-to-Point Protocol – Current standard for remote access – Remotes access protocol standards are defined in RFCs published by the IETF and other working groups – Microsoft recommends using PPP because it is flexible and is the industry standard (08) SLIP • Serial Line Internet Protocol (SLIP) – One of the first protocols developed specifically for TCP/IP support over dial-up connections, does not support DHCP (11) LPC • Local Procedure Call (LPC) – Technique to permit processes to exchange data in the Windows XP runtime environment (11) Process Priority • Figure 11-3: The Task Manager’s Process tab with priority options on display (11) Critical Section – Section of code that modifies data structures used by several threads is called a critical section – It is very important that a critical section never be overwritten by more than one thread at once • Application use Windows XP synchronization objects to prevent this from happening (11) VDM • Virtual DOS Machine • It is reasonable to describe two separate operating environments that can run within a VDM: – One supports straightforward DOS emulation and may be called the DOS operating environment – The other supports operation of Win16 applications within a VDM, and may be called the Win16 operating environment (11) VDD • Virtual Device Drivers (VDDs) • DOS applications do not communicate directly with Windows XP drivers – Instead, a layer of VDDs underlies these applications, and they communicate with Windows XP 32-bit drivers • VDDs are device drivers used by VDMs Compatibility Mode • Tool designed to support the installation of older applications that cause problems or fail to work altogether in Windows XP (12) LKGC • Last Known Good Configuration (LKGC) – State of the Registry stored in one of the control sets when the last successful user logon occurred (13) System/Boot Partitions • System partition – Partition that contains the MBR and partition boot sector • NTLDR • Boot partition – Partition that contains the Windows XP files • KERNEL (14) Microsoft IntelliMirror • Term used to describe features of Windows XP that help ensure the availability of a user’s data and computer configuration • Three key elements of IntelliMirror: – User data management – User settings management – Software installation and maintenance (14)Windows File Protection (WFP) • Ensures that the correct and uncorrupted versions of certain core files are retained on the system at all times • Protects its list of sacred files from changes due to application installation, virus infection, and even human error • Works in the background, watching for attempted writes to its monitored files (14) Backup Types • Copy backup – Backs up all selected files without marking them as being backed up • Normal (or full) backup – Backs up all selected files and marks them as being backed up • Daily backup – Backs up only the selected files that have been created or modified on the day the backup is being performed (14) Backup Types • Differential backup – Backs up selected files that have been created or modified since the last full backup • Incremental backup – Backs up selected files that have been created or modified since the last normal or incremental backup (14) Recovery Console • Command-line interface that provides administrative tools useful for recovering a system that is not booting correctly • Install – %systemroot% \winnt32.exe /cmdcons (14) Driver Rollback • Device driver rollback – Removes the current driver for a device and reinitializes the previous driver Windows XP Rollback • Rolling back to Windows 98 – Windows XP installed as an upgrade – Formatted as FAT32 • Add/Remove Programs CMOS • Complimentary Metal-Oxide Semiconductor • Battery powered storage chip located on the motherboard