Download Final Exam 2004 PowerPoint

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
Transcript
Final Review
• This is most likely incomplete as I didn’t
write everything down during the review.
(01) Active Directory
• Large Database
• Control and administration mechanism of
Windows XP
• Combines the various aspects of a network into
a manageable hierarchical structure
(01) HAL
• Hardware abstraction layer
– Goal of the HAL is to isolate any hardwaredependent code in order to prevent direct access
to hardware
(01) HCL
• Hardware Compatibility List
• Contains all known Windows XPcompatible hardware devices
• Finding the HCL
– Easiest place to look is on Windows XP CDROM in the Support folder
• Keep in mind the HCL is not a static
document
PXE
• To install from a RIS (Remote Installation
Service) server, the workstation’s NIC must
be PXE compliant (page 44 & 45)
(03) Hardware Profiles
• Similar to a user profile
• Collection of custom device settings used
on computers with changing physical
components
• Most often used on portable computers for
which hardware configurations change
often
(03) MMC Formats
• Once you’ve added and configured a console’s
snap-ins, you can save the console to an .msc file
in one of four formats:
– Author Mode
– User Mode formats
• Full Access
• Delegated Access, Multiple Windows
• Delegated Access, Single Window
•
(He kind of screwed this one up)
(04) RAID
• There are five drive configurations or structures
supported by Windows XP:
– Simple volume
• Single Drive or partition
– Spanned volume
• Multiple drives or partitions, filled one-at-a-time
– Striped volume, RAID-0
• Small pieces of data written sequentially to multiple drives or
partitions
– Mirrored volume, RAID-1 (hardware only)
• Exact duplicate of another drive or partition
– RAID-5 volume (hardware only)
• Striping with Parity
(04) NTFS Permissions
• Moving an object within the same NTFS volume
or partition
– Retain
• Copying an object within the same NTFS volume
or partition
– Inherit
• Moving an object from one NTFS volume or
partition to another NTFS volume or partition
– Inherit
(04) NTFS Permissions
• Copying an object from one NTFS volume or
partition to another NTFS volume or partition
– Inherit
• Copying or Moving an object from a FAT or
FAT32 volume or partition to an NTFS volume or
partition
– Inherit
• Copying or Moving an object from an NTFS
volume or partition to a FAT or FAT32 volume or
partition
– Lose
(04) NTFS Permissions
• Rules to keep in mind:
– NTFS object permissions always apply, no matter if the
accessing user is local or remote
– NTFS object permissions are cumulative
– NTFS file permissions override any contradictory
settings on the parent or container folder
– Deny overrides all other specific Allows
– When disabling inheritance for an NTFS object, select
to either Copy the parent object’s permissions to the
current object or Remove permissions assigned from
the parent and retain only object-specific settings
(04) Share Permissions
• Important issues to keep in
mind when working with
shares:
– Shares are folders not
individual files
– Share permissions only
apply to the network access
points
– Multiple share-permission
levels due to group
membership are cumulative
(04) NTFS/Share Permissions
• Effective Permissions
– The most restrictive permissions of cumulative
share or cumulative NTFS apply
(05) Fast User Switching
• Windows Welcome
– Completely new logon method to the Windows
product line
– Fast user switching, programs stay active while
another user is using the system
– Does not log into a domain, local logon only
(06) Access Token
• An access token includes all security information
pertaining to that user, including the user’s
security ID (SID) and SIDs for each of the
groups to which the user belongs
• An access token includes the following
components:
– Unique SID for the account
– List of groups to which the user belongs
– List of rights and privileges associated with the specific
user’s account
ACL
• Each time a user attempts to access a
resource, his/her Access Token is compared
to a list of permissions associated with the
resource, called an Access Control List
– (Chapter 6, page 216)
(06) Everyone Group
Permissions
• Prior to Service Pack 1
– Everyone group has Full Control
• With Service Pack
– Everyone group has Read Only
(06) Encrypted File System
(EFS)
• Allows you to encrypt data stored on NTFS drive
• When EFS is enabled on a file, folder, or drive,
only the enabling user can gain access to the
encrypted object
• EFS uses a public and private key encryption
• The Recovery Agent Can Recover the files if the
private key is not available
– Local System Admin by default
GPRESULT
• Utility that checks Local Group Policies
– (This is all I have on this, hopefully you have
more)
Priority of Group Policies
•
•
•
•
•
NT4
Local
Site
Domain
OU – Organizational Unit
(07) TCP/IP
• TCP
– Connection-oriented
• Class of network transport protocols that include
guaranteed delivery, explicit acknowledgement of data
receipt, and a variety of other data integrity checks
– SMTP, HTTP, FTP
(07) TCP/IP
• IP
– Connectionless
• Class of network transport protocols that makes only a “best
effort” at delivery
• Includes no explicit mechanisms to guarantee delivery or
data integrity
– UDP
(07) DLC
• Data Link Control
– Network transport protocol that allows
connectivity to mainframes, printers, and
servers running Remote Program Load
software
(07) ICMP
• Internet Control Message Protocol
– Used to send control messages between IP hosts
(07) NWLink
• Microsoft’s implementation of the IPX/SPX
protocol suite
• Can communicate with all NetWare
implementations
• To ensure proper desktop integration in a
NetWare server environment, NWLink
supports most (but not all) NetWare utilities
and functions
(07) NetBIOS
• Network Basic Input/Output System
– Client/server interprocess communication
service developed by IBM in 1985
• NBT (NetBIOS over TCP/IP)
– Network protocol in TCP/IP stack that provides
NetBIOS naming services
(07) TCP/IP Command Line
Tools
• NETSTAT
– Displays a list of active TCP connections
• NBSTAT
– Displays protocol statistics for NetBIOS over TCP/IP
(NetBT), NetBIOS name tables, and the NetBIOS name
cache
(07) Binding / Bindery
• Bindings
– Refers to the order in which Windows XP
networking components are linked
• Bindery
– Proprietary database that contains Novell
network resource information
APIPA
• Automatic Private IP Addressing
– Used when no DHCP server is present
X.25
• An ITU standard for packet-switched
networking
– Common outside the U.S.
– Robust data-handling capability makes it a
good match for substandard telephone networks
(08) ICS/ICF
• Internet Connection Sharing (ICS)
– Used to share a single network connection with
a small group of networked computers
• The shared connection can be a link to the Internet
or any type of network
• Internet Connection Firewall (ICF)
– A security measure for protecting network
connections from unwanted traffic
(08) VPN
• Virtual private network
– A secure “tunnel” through the Internet
– Windows XP support two VPN protocols:
– Point-to-Point-Tunneling Protocol (PPTP) (9x+)
• Allows you to establish a secure remote access pipeline over
the public Internet and to “tunnel” IPX or TCP/IP traffic inside
PPP packets
– L2TP is a similar protocol developed by Cisco for use
with IPSec to support secure VPN links (2000+)
• From a user’s perspective, it operates in the same manner as
PPTP
(08) PPP
• Point-to-Point Protocol
– Current standard for remote access
– Remotes access protocol standards are defined
in RFCs published by the IETF and other
working groups
– Microsoft recommends using PPP because it is
flexible and is the industry standard
(08) SLIP
• Serial Line Internet Protocol (SLIP)
– One of the first protocols developed specifically
for TCP/IP support over dial-up connections,
does not support DHCP
(11) LPC
• Local Procedure Call (LPC)
– Technique to permit processes to exchange data
in the Windows XP runtime environment
(11) Process Priority
• Figure 11-3: The Task
Manager’s Process tab
with priority options on
display
(11) Critical Section
– Section of code that modifies data structures
used by several threads is called a critical
section
– It is very important that a critical section never
be overwritten by more than one thread at once
• Application use Windows XP synchronization
objects to prevent this from happening
(11) VDM
• Virtual DOS Machine
• It is reasonable to describe two separate
operating environments that can run within a
VDM:
– One supports straightforward DOS emulation and
may be called the DOS operating environment
– The other supports operation of Win16 applications
within a VDM, and may be called the Win16
operating environment
(11) VDD
• Virtual Device Drivers (VDDs)
• DOS applications do not communicate
directly with Windows XP drivers
– Instead, a layer of VDDs underlies these
applications, and they communicate with
Windows XP 32-bit drivers
• VDDs are device drivers used by VDMs
Compatibility Mode
• Tool designed to support the installation of
older applications that cause problems or
fail to work altogether in Windows XP
(12) LKGC
• Last Known Good Configuration
(LKGC)
– State of the Registry stored in one of the
control sets when the last successful user
logon occurred
(13) System/Boot Partitions
• System partition
– Partition that contains the MBR and partition
boot sector
• NTLDR
• Boot partition
– Partition that contains the Windows XP files
• KERNEL
(14) Microsoft IntelliMirror
• Term used to describe features of Windows
XP that help ensure the availability of a
user’s data and computer configuration
• Three key elements of IntelliMirror:
– User data management
– User settings management
– Software installation and maintenance
(14)Windows File Protection
(WFP)
• Ensures that the correct and uncorrupted
versions of certain core files are retained on
the system at all times
• Protects its list of sacred files from changes
due to application installation, virus
infection, and even human error
• Works in the background, watching for
attempted writes to its monitored files
(14) Backup Types
• Copy backup
– Backs up all selected files without marking them as being
backed up
• Normal (or full) backup
– Backs up all selected files and marks them as being backed
up
• Daily backup
– Backs up only the selected files that have been created or
modified on the day the backup is being performed
(14) Backup Types
• Differential backup
– Backs up selected files that have been created
or modified since the last full backup
• Incremental backup
– Backs up selected files that have been created
or modified since the last normal or incremental
backup
(14) Recovery Console
• Command-line interface that provides
administrative tools useful for recovering a
system that is not booting correctly
• Install
– %systemroot% \winnt32.exe /cmdcons
(14) Driver Rollback
• Device driver rollback
– Removes the current driver for a device and reinitializes the previous driver
Windows XP Rollback
• Rolling back to Windows 98
– Windows XP installed as an upgrade
– Formatted as FAT32
• Add/Remove Programs
CMOS
• Complimentary Metal-Oxide
Semiconductor
• Battery powered storage chip located on the
motherboard