1 / 50

Final Review

Final Review. This is most likely incomplete as I didn’t write everything down during the review. (01) Active Directory. Large Database Control and administration mechanism of Windows XP Combines the various aspects of a network into a manageable hierarchical structure. (01) HAL.

burke
Download Presentation

Final Review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Final Review • This is most likely incomplete as I didn’t write everything down during the review.

  2. (01) Active Directory • Large Database • Control and administration mechanism of Windows XP • Combines the various aspects of a network into a manageable hierarchical structure

  3. (01) HAL • Hardware abstraction layer • Goal of the HAL is to isolate any hardware-dependent code in order to prevent direct access to hardware

  4. (01) HCL • Hardware Compatibility List • Contains all known Windows XP-compatible hardware devices • Finding the HCL • Easiest place to look is on Windows XP CD-ROM in the Support folder • Keep in mind the HCL is not a static document

  5. PXE • To install from a RIS (Remote Installation Service) server, the workstation’s NIC must be PXE compliant (page 44 & 45)

  6. (03) Hardware Profiles • Similar to a user profile • Collection of custom device settings used on computers with changing physical components • Most often used on portable computers for which hardware configurations change often

  7. (03) MMC Formats • Once you’ve added and configured a console’s snap-ins, you can save the console to an .msc file in one of four formats: • Author Mode • User Mode formats • Full Access • Delegated Access, Multiple Windows • Delegated Access, Single Window • (He kind of screwed this one up)

  8. (04) RAID • There are five drive configurations or structures supported by Windows XP: • Simple volume • Single Drive or partition • Spanned volume • Multiple drives or partitions, filled one-at-a-time • Striped volume, RAID-0 • Small pieces of data written sequentially to multiple drives or partitions • Mirrored volume, RAID-1 (hardware only) • Exact duplicate of another drive or partition • RAID-5 volume (hardware only) • Striping with Parity

  9. (04) NTFS Permissions • Moving an object within the same NTFS volume or partition • Retain • Copying an object within the same NTFS volume or partition • Inherit • Moving an object from one NTFS volume or partition to another NTFS volume or partition • Inherit

  10. (04) NTFS Permissions • Copying an object from one NTFS volume or partition to another NTFS volume or partition • Inherit • Copying or Moving an object from a FAT or FAT32 volume or partition to an NTFS volume or partition • Inherit • Copying or Moving an object from an NTFS volume or partition to a FAT or FAT32 volume or partition • Lose

  11. (04) NTFS Permissions • Rules to keep in mind: • NTFS object permissions always apply, no matter if the accessing user is local or remote • NTFS object permissions are cumulative • NTFS file permissions override any contradictory settings on the parent or container folder • Deny overrides all other specific Allows • When disabling inheritance for an NTFS object, select to either Copy the parent object’s permissions to the current object or Remove permissions assigned from the parent and retain only object-specific settings

  12. (04) Share Permissions • Important issues to keep in mind when working with shares: • Shares are folders not individual files • Share permissions only apply to the network access points • Multiple share-permission levels due to group membership are cumulative

  13. (04) NTFS/Share Permissions • Effective Permissions • The most restrictive permissions of cumulative share or cumulative NTFS apply

  14. (05) Fast User Switching • Windows Welcome • Completely new logon method to the Windows product line • Fast user switching, programs stay active while another user is using the system • Does not log into a domain, local logon only

  15. (06) Access Token • An access token includes all security information pertaining to that user, including the user’s security ID (SID) and SIDs for each of the groups to which the user belongs • An access token includes the following components: • Unique SID for the account • List of groups to which the user belongs • List of rights and privileges associated with the specific user’s account

  16. ACL • Each time a user attempts to access a resource, his/her Access Token is compared to a list of permissions associated with the resource, called an Access Control List • (Chapter 6, page 216)

  17. (06) Everyone Group Permissions • Prior to Service Pack 1 • Everyone group has Full Control • With Service Pack • Everyone group has Read Only

  18. (06) Encrypted File System (EFS) • Allows you to encrypt data stored on NTFS drive • When EFS is enabled on a file, folder, or drive, only the enabling user can gain access to the encrypted object • EFS uses a public and private key encryption • The Recovery Agent Can Recover the files if the private key is not available • Local System Admin by default

  19. GPRESULT • Utility that checks Local Group Policies • (This is all I have on this, hopefully you have more)

  20. Priority of Group Policies • NT4 • Local • Site • Domain • OU – Organizational Unit

  21. (07) TCP/IP • TCP • Connection-oriented • Class of network transport protocols that include guaranteed delivery, explicit acknowledgement of data receipt, and a variety of other data integrity checks • SMTP, HTTP, FTP

  22. (07) TCP/IP • IP • Connectionless • Class of network transport protocols that makes only a “best effort” at delivery • Includes no explicit mechanisms to guarantee delivery or data integrity • UDP

  23. (07) DLC • Data Link Control • Network transport protocol that allows connectivity to mainframes, printers, and servers running Remote Program Load software

  24. (07) ICMP • Internet Control Message Protocol • Used to send control messages between IP hosts

  25. (07) NWLink • Microsoft’s implementation of the IPX/SPX protocol suite • Can communicate with all NetWare implementations • To ensure proper desktop integration in a NetWare server environment, NWLink supports most (but not all) NetWare utilities and functions

  26. (07) NetBIOS • Network Basic Input/Output System • Client/server interprocess communication service developed by IBM in 1985 • NBT (NetBIOS over TCP/IP) • Network protocol in TCP/IP stack that provides NetBIOS naming services

  27. (07) TCP/IP Command Line Tools • NETSTAT • Displays a list of active TCP connections • NBSTAT • Displays protocol statistics for NetBIOS over TCP/IP (NetBT), NetBIOS name tables, and the NetBIOS name cache

  28. (07) Binding / Bindery • Bindings • Refers to the order in which Windows XP networking components are linked • Bindery • Proprietary database that contains Novell network resource information

  29. APIPA • Automatic Private IPAddressing • Used when no DHCP server is present

  30. X.25 • An ITU standard for packet-switched networking • Common outside the U.S. • Robust data-handling capability makes it a good match for substandard telephone networks

  31. (08) ICS/ICF • Internet Connection Sharing (ICS) • Used to share a single network connection with a small group of networked computers • The shared connection can be a link to the Internet or any type of network • Internet Connection Firewall (ICF) • A security measure for protecting network connections from unwanted traffic

  32. (08) VPN • Virtual private network • A secure “tunnel” through the Internet • Windows XP support two VPN protocols: • Point-to-Point-Tunneling Protocol (PPTP) (9x+) • Allows you to establish a secure remote access pipeline over the public Internet and to “tunnel” IPX or TCP/IP traffic inside PPP packets • L2TP is a similar protocol developed by Cisco for use with IPSec to support secure VPN links (2000+) • From a user’s perspective, it operates in the same manner as PPTP

  33. (08) PPP • Point-to-Point Protocol • Current standard for remote access • Remotes access protocol standards are defined in RFCs published by the IETF and other working groups • Microsoft recommends using PPP because it is flexible and is the industry standard

  34. (08) SLIP • Serial Line Internet Protocol (SLIP) • One of the first protocols developed specifically for TCP/IP support over dial-up connections, does not support DHCP

  35. (11) LPC • Local Procedure Call (LPC) • Technique to permit processes to exchange data in the Windows XP runtime environment

  36. (11) Process Priority • Figure 11-3: The Task Manager’s Process tab with priority options on display

  37. (11) Critical Section • Section of code that modifies data structures used by several threads is called a critical section • It is very important that a critical section never be overwritten by more than one thread at once • Application use Windows XP synchronization objects to prevent this from happening

  38. (11) VDM • Virtual DOS Machine • It is reasonable to describe two separate operating environments that can run within a VDM: • One supports straightforward DOS emulation and may be called the DOS operating environment • The other supports operation of Win16 applications within a VDM, and may be called the Win16 operating environment

  39. (11) VDD • Virtual Device Drivers (VDDs) • DOS applications do not communicate directly with Windows XP drivers • Instead, a layer of VDDs underlies these applications, and they communicate with Windows XP 32-bit drivers • VDDs are device drivers used by VDMs

  40. Compatibility Mode • Tool designed to support the installation of older applications that cause problems or fail to work altogether in Windows XP

  41. (12) LKGC • Last Known Good Configuration (LKGC) • State of the Registry stored in one of the control sets when the last successful user logon occurred

  42. (13) System/Boot Partitions • System partition • Partition that contains the MBR and partition boot sector • NTLDR • Boot partition • Partition that contains the Windows XP files • KERNEL

  43. (14) Microsoft IntelliMirror • Term used to describe features of Windows XP that help ensure the availability of a user’s data and computer configuration • Three key elements of IntelliMirror: • User data management • User settings management • Software installation and maintenance

  44. (14)Windows File Protection (WFP) • Ensures that the correct and uncorrupted versions of certain core files are retained on the system at all times • Protects its list of sacred files from changes due to application installation, virus infection, and even human error • Works in the background, watching for attempted writes to its monitored files

  45. (14) Backup Types • Copy backup • Backs up all selected files without marking them as being backed up • Normal (or full) backup • Backs up all selected files and marks them as being backed up • Daily backup • Backs up only the selected files that have been created or modified on the day the backup is being performed

  46. (14) Backup Types • Differential backup • Backs up selected files that have been created or modified since the last full backup • Incremental backup • Backs up selected files that have been created or modified since the last normal or incremental backup

  47. (14) Recovery Console • Command-line interface that provides administrative tools useful for recovering a system that is not booting correctly • Install • %systemroot% \winnt32.exe /cmdcons

  48. (14) Driver Rollback • Device driver rollback • Removes the current driver for a device and re-initializes the previous driver

  49. Windows XP Rollback • Rolling back to Windows 98 • Windows XP installed as an upgrade • Formatted as FAT32 • Add/Remove Programs

  50. CMOS • Complimentary Metal-Oxide Semiconductor • Battery powered storage chip located on the motherboard

More Related