Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Final Review • This is most likely incomplete as I didn’t write everything down during the review. (01) Active Directory • Large Database • Control and administration mechanism of Windows XP • Combines the various aspects of a network into a manageable hierarchical structure (01) HAL • Hardware abstraction layer – Goal of the HAL is to isolate any hardwaredependent code in order to prevent direct access to hardware (01) HCL • Hardware Compatibility List • Contains all known Windows XPcompatible hardware devices • Finding the HCL – Easiest place to look is on Windows XP CDROM in the Support folder • Keep in mind the HCL is not a static document PXE • To install from a RIS (Remote Installation Service) server, the workstation’s NIC must be PXE compliant (page 44 & 45) (03) Hardware Profiles • Similar to a user profile • Collection of custom device settings used on computers with changing physical components • Most often used on portable computers for which hardware configurations change often (03) MMC Formats • Once you’ve added and configured a console’s snap-ins, you can save the console to an .msc file in one of four formats: – Author Mode – User Mode formats • Full Access • Delegated Access, Multiple Windows • Delegated Access, Single Window • (He kind of screwed this one up) (04) RAID • There are five drive configurations or structures supported by Windows XP: – Simple volume • Single Drive or partition – Spanned volume • Multiple drives or partitions, filled one-at-a-time – Striped volume, RAID-0 • Small pieces of data written sequentially to multiple drives or partitions – Mirrored volume, RAID-1 (hardware only) • Exact duplicate of another drive or partition – RAID-5 volume (hardware only) • Striping with Parity (04) NTFS Permissions • Moving an object within the same NTFS volume or partition – Retain • Copying an object within the same NTFS volume or partition – Inherit • Moving an object from one NTFS volume or partition to another NTFS volume or partition – Inherit (04) NTFS Permissions • Copying an object from one NTFS volume or partition to another NTFS volume or partition – Inherit • Copying or Moving an object from a FAT or FAT32 volume or partition to an NTFS volume or partition – Inherit • Copying or Moving an object from an NTFS volume or partition to a FAT or FAT32 volume or partition – Lose (04) NTFS Permissions • Rules to keep in mind: – NTFS object permissions always apply, no matter if the accessing user is local or remote – NTFS object permissions are cumulative – NTFS file permissions override any contradictory settings on the parent or container folder – Deny overrides all other specific Allows – When disabling inheritance for an NTFS object, select to either Copy the parent object’s permissions to the current object or Remove permissions assigned from the parent and retain only object-specific settings (04) Share Permissions • Important issues to keep in mind when working with shares: – Shares are folders not individual files – Share permissions only apply to the network access points – Multiple share-permission levels due to group membership are cumulative (04) NTFS/Share Permissions • Effective Permissions – The most restrictive permissions of cumulative share or cumulative NTFS apply (05) Fast User Switching • Windows Welcome – Completely new logon method to the Windows product line – Fast user switching, programs stay active while another user is using the system – Does not log into a domain, local logon only (06) Access Token • An access token includes all security information pertaining to that user, including the user’s security ID (SID) and SIDs for each of the groups to which the user belongs • An access token includes the following components: – Unique SID for the account – List of groups to which the user belongs – List of rights and privileges associated with the specific user’s account ACL • Each time a user attempts to access a resource, his/her Access Token is compared to a list of permissions associated with the resource, called an Access Control List – (Chapter 6, page 216) (06) Everyone Group Permissions • Prior to Service Pack 1 – Everyone group has Full Control • With Service Pack – Everyone group has Read Only (06) Encrypted File System (EFS) • Allows you to encrypt data stored on NTFS drive • When EFS is enabled on a file, folder, or drive, only the enabling user can gain access to the encrypted object • EFS uses a public and private key encryption • The Recovery Agent Can Recover the files if the private key is not available – Local System Admin by default GPRESULT • Utility that checks Local Group Policies – (This is all I have on this, hopefully you have more) Priority of Group Policies • • • • • NT4 Local Site Domain OU – Organizational Unit (07) TCP/IP • TCP – Connection-oriented • Class of network transport protocols that include guaranteed delivery, explicit acknowledgement of data receipt, and a variety of other data integrity checks – SMTP, HTTP, FTP (07) TCP/IP • IP – Connectionless • Class of network transport protocols that makes only a “best effort” at delivery • Includes no explicit mechanisms to guarantee delivery or data integrity – UDP (07) DLC • Data Link Control – Network transport protocol that allows connectivity to mainframes, printers, and servers running Remote Program Load software (07) ICMP • Internet Control Message Protocol – Used to send control messages between IP hosts (07) NWLink • Microsoft’s implementation of the IPX/SPX protocol suite • Can communicate with all NetWare implementations • To ensure proper desktop integration in a NetWare server environment, NWLink supports most (but not all) NetWare utilities and functions (07) NetBIOS • Network Basic Input/Output System – Client/server interprocess communication service developed by IBM in 1985 • NBT (NetBIOS over TCP/IP) – Network protocol in TCP/IP stack that provides NetBIOS naming services (07) TCP/IP Command Line Tools • NETSTAT – Displays a list of active TCP connections • NBSTAT – Displays protocol statistics for NetBIOS over TCP/IP (NetBT), NetBIOS name tables, and the NetBIOS name cache (07) Binding / Bindery • Bindings – Refers to the order in which Windows XP networking components are linked • Bindery – Proprietary database that contains Novell network resource information APIPA • Automatic Private IP Addressing – Used when no DHCP server is present X.25 • An ITU standard for packet-switched networking – Common outside the U.S. – Robust data-handling capability makes it a good match for substandard telephone networks (08) ICS/ICF • Internet Connection Sharing (ICS) – Used to share a single network connection with a small group of networked computers • The shared connection can be a link to the Internet or any type of network • Internet Connection Firewall (ICF) – A security measure for protecting network connections from unwanted traffic (08) VPN • Virtual private network – A secure “tunnel” through the Internet – Windows XP support two VPN protocols: – Point-to-Point-Tunneling Protocol (PPTP) (9x+) • Allows you to establish a secure remote access pipeline over the public Internet and to “tunnel” IPX or TCP/IP traffic inside PPP packets – L2TP is a similar protocol developed by Cisco for use with IPSec to support secure VPN links (2000+) • From a user’s perspective, it operates in the same manner as PPTP (08) PPP • Point-to-Point Protocol – Current standard for remote access – Remotes access protocol standards are defined in RFCs published by the IETF and other working groups – Microsoft recommends using PPP because it is flexible and is the industry standard (08) SLIP • Serial Line Internet Protocol (SLIP) – One of the first protocols developed specifically for TCP/IP support over dial-up connections, does not support DHCP (11) LPC • Local Procedure Call (LPC) – Technique to permit processes to exchange data in the Windows XP runtime environment (11) Process Priority • Figure 11-3: The Task Manager’s Process tab with priority options on display (11) Critical Section – Section of code that modifies data structures used by several threads is called a critical section – It is very important that a critical section never be overwritten by more than one thread at once • Application use Windows XP synchronization objects to prevent this from happening (11) VDM • Virtual DOS Machine • It is reasonable to describe two separate operating environments that can run within a VDM: – One supports straightforward DOS emulation and may be called the DOS operating environment – The other supports operation of Win16 applications within a VDM, and may be called the Win16 operating environment (11) VDD • Virtual Device Drivers (VDDs) • DOS applications do not communicate directly with Windows XP drivers – Instead, a layer of VDDs underlies these applications, and they communicate with Windows XP 32-bit drivers • VDDs are device drivers used by VDMs Compatibility Mode • Tool designed to support the installation of older applications that cause problems or fail to work altogether in Windows XP (12) LKGC • Last Known Good Configuration (LKGC) – State of the Registry stored in one of the control sets when the last successful user logon occurred (13) System/Boot Partitions • System partition – Partition that contains the MBR and partition boot sector • NTLDR • Boot partition – Partition that contains the Windows XP files • KERNEL (14) Microsoft IntelliMirror • Term used to describe features of Windows XP that help ensure the availability of a user’s data and computer configuration • Three key elements of IntelliMirror: – User data management – User settings management – Software installation and maintenance (14)Windows File Protection (WFP) • Ensures that the correct and uncorrupted versions of certain core files are retained on the system at all times • Protects its list of sacred files from changes due to application installation, virus infection, and even human error • Works in the background, watching for attempted writes to its monitored files (14) Backup Types • Copy backup – Backs up all selected files without marking them as being backed up • Normal (or full) backup – Backs up all selected files and marks them as being backed up • Daily backup – Backs up only the selected files that have been created or modified on the day the backup is being performed (14) Backup Types • Differential backup – Backs up selected files that have been created or modified since the last full backup • Incremental backup – Backs up selected files that have been created or modified since the last normal or incremental backup (14) Recovery Console • Command-line interface that provides administrative tools useful for recovering a system that is not booting correctly • Install – %systemroot% \winnt32.exe /cmdcons (14) Driver Rollback • Device driver rollback – Removes the current driver for a device and reinitializes the previous driver Windows XP Rollback • Rolling back to Windows 98 – Windows XP installed as an upgrade – Formatted as FAT32 • Add/Remove Programs CMOS • Complimentary Metal-Oxide Semiconductor • Battery powered storage chip located on the motherboard