500 likes | 637 Views
Final Review. This is most likely incomplete as I didn’t write everything down during the review. (01) Active Directory. Large Database Control and administration mechanism of Windows XP Combines the various aspects of a network into a manageable hierarchical structure. (01) HAL.
E N D
Final Review • This is most likely incomplete as I didn’t write everything down during the review.
(01) Active Directory • Large Database • Control and administration mechanism of Windows XP • Combines the various aspects of a network into a manageable hierarchical structure
(01) HAL • Hardware abstraction layer • Goal of the HAL is to isolate any hardware-dependent code in order to prevent direct access to hardware
(01) HCL • Hardware Compatibility List • Contains all known Windows XP-compatible hardware devices • Finding the HCL • Easiest place to look is on Windows XP CD-ROM in the Support folder • Keep in mind the HCL is not a static document
PXE • To install from a RIS (Remote Installation Service) server, the workstation’s NIC must be PXE compliant (page 44 & 45)
(03) Hardware Profiles • Similar to a user profile • Collection of custom device settings used on computers with changing physical components • Most often used on portable computers for which hardware configurations change often
(03) MMC Formats • Once you’ve added and configured a console’s snap-ins, you can save the console to an .msc file in one of four formats: • Author Mode • User Mode formats • Full Access • Delegated Access, Multiple Windows • Delegated Access, Single Window • (He kind of screwed this one up)
(04) RAID • There are five drive configurations or structures supported by Windows XP: • Simple volume • Single Drive or partition • Spanned volume • Multiple drives or partitions, filled one-at-a-time • Striped volume, RAID-0 • Small pieces of data written sequentially to multiple drives or partitions • Mirrored volume, RAID-1 (hardware only) • Exact duplicate of another drive or partition • RAID-5 volume (hardware only) • Striping with Parity
(04) NTFS Permissions • Moving an object within the same NTFS volume or partition • Retain • Copying an object within the same NTFS volume or partition • Inherit • Moving an object from one NTFS volume or partition to another NTFS volume or partition • Inherit
(04) NTFS Permissions • Copying an object from one NTFS volume or partition to another NTFS volume or partition • Inherit • Copying or Moving an object from a FAT or FAT32 volume or partition to an NTFS volume or partition • Inherit • Copying or Moving an object from an NTFS volume or partition to a FAT or FAT32 volume or partition • Lose
(04) NTFS Permissions • Rules to keep in mind: • NTFS object permissions always apply, no matter if the accessing user is local or remote • NTFS object permissions are cumulative • NTFS file permissions override any contradictory settings on the parent or container folder • Deny overrides all other specific Allows • When disabling inheritance for an NTFS object, select to either Copy the parent object’s permissions to the current object or Remove permissions assigned from the parent and retain only object-specific settings
(04) Share Permissions • Important issues to keep in mind when working with shares: • Shares are folders not individual files • Share permissions only apply to the network access points • Multiple share-permission levels due to group membership are cumulative
(04) NTFS/Share Permissions • Effective Permissions • The most restrictive permissions of cumulative share or cumulative NTFS apply
(05) Fast User Switching • Windows Welcome • Completely new logon method to the Windows product line • Fast user switching, programs stay active while another user is using the system • Does not log into a domain, local logon only
(06) Access Token • An access token includes all security information pertaining to that user, including the user’s security ID (SID) and SIDs for each of the groups to which the user belongs • An access token includes the following components: • Unique SID for the account • List of groups to which the user belongs • List of rights and privileges associated with the specific user’s account
ACL • Each time a user attempts to access a resource, his/her Access Token is compared to a list of permissions associated with the resource, called an Access Control List • (Chapter 6, page 216)
(06) Everyone Group Permissions • Prior to Service Pack 1 • Everyone group has Full Control • With Service Pack • Everyone group has Read Only
(06) Encrypted File System (EFS) • Allows you to encrypt data stored on NTFS drive • When EFS is enabled on a file, folder, or drive, only the enabling user can gain access to the encrypted object • EFS uses a public and private key encryption • The Recovery Agent Can Recover the files if the private key is not available • Local System Admin by default
GPRESULT • Utility that checks Local Group Policies • (This is all I have on this, hopefully you have more)
Priority of Group Policies • NT4 • Local • Site • Domain • OU – Organizational Unit
(07) TCP/IP • TCP • Connection-oriented • Class of network transport protocols that include guaranteed delivery, explicit acknowledgement of data receipt, and a variety of other data integrity checks • SMTP, HTTP, FTP
(07) TCP/IP • IP • Connectionless • Class of network transport protocols that makes only a “best effort” at delivery • Includes no explicit mechanisms to guarantee delivery or data integrity • UDP
(07) DLC • Data Link Control • Network transport protocol that allows connectivity to mainframes, printers, and servers running Remote Program Load software
(07) ICMP • Internet Control Message Protocol • Used to send control messages between IP hosts
(07) NWLink • Microsoft’s implementation of the IPX/SPX protocol suite • Can communicate with all NetWare implementations • To ensure proper desktop integration in a NetWare server environment, NWLink supports most (but not all) NetWare utilities and functions
(07) NetBIOS • Network Basic Input/Output System • Client/server interprocess communication service developed by IBM in 1985 • NBT (NetBIOS over TCP/IP) • Network protocol in TCP/IP stack that provides NetBIOS naming services
(07) TCP/IP Command Line Tools • NETSTAT • Displays a list of active TCP connections • NBSTAT • Displays protocol statistics for NetBIOS over TCP/IP (NetBT), NetBIOS name tables, and the NetBIOS name cache
(07) Binding / Bindery • Bindings • Refers to the order in which Windows XP networking components are linked • Bindery • Proprietary database that contains Novell network resource information
APIPA • Automatic Private IPAddressing • Used when no DHCP server is present
X.25 • An ITU standard for packet-switched networking • Common outside the U.S. • Robust data-handling capability makes it a good match for substandard telephone networks
(08) ICS/ICF • Internet Connection Sharing (ICS) • Used to share a single network connection with a small group of networked computers • The shared connection can be a link to the Internet or any type of network • Internet Connection Firewall (ICF) • A security measure for protecting network connections from unwanted traffic
(08) VPN • Virtual private network • A secure “tunnel” through the Internet • Windows XP support two VPN protocols: • Point-to-Point-Tunneling Protocol (PPTP) (9x+) • Allows you to establish a secure remote access pipeline over the public Internet and to “tunnel” IPX or TCP/IP traffic inside PPP packets • L2TP is a similar protocol developed by Cisco for use with IPSec to support secure VPN links (2000+) • From a user’s perspective, it operates in the same manner as PPTP
(08) PPP • Point-to-Point Protocol • Current standard for remote access • Remotes access protocol standards are defined in RFCs published by the IETF and other working groups • Microsoft recommends using PPP because it is flexible and is the industry standard
(08) SLIP • Serial Line Internet Protocol (SLIP) • One of the first protocols developed specifically for TCP/IP support over dial-up connections, does not support DHCP
(11) LPC • Local Procedure Call (LPC) • Technique to permit processes to exchange data in the Windows XP runtime environment
(11) Process Priority • Figure 11-3: The Task Manager’s Process tab with priority options on display
(11) Critical Section • Section of code that modifies data structures used by several threads is called a critical section • It is very important that a critical section never be overwritten by more than one thread at once • Application use Windows XP synchronization objects to prevent this from happening
(11) VDM • Virtual DOS Machine • It is reasonable to describe two separate operating environments that can run within a VDM: • One supports straightforward DOS emulation and may be called the DOS operating environment • The other supports operation of Win16 applications within a VDM, and may be called the Win16 operating environment
(11) VDD • Virtual Device Drivers (VDDs) • DOS applications do not communicate directly with Windows XP drivers • Instead, a layer of VDDs underlies these applications, and they communicate with Windows XP 32-bit drivers • VDDs are device drivers used by VDMs
Compatibility Mode • Tool designed to support the installation of older applications that cause problems or fail to work altogether in Windows XP
(12) LKGC • Last Known Good Configuration (LKGC) • State of the Registry stored in one of the control sets when the last successful user logon occurred
(13) System/Boot Partitions • System partition • Partition that contains the MBR and partition boot sector • NTLDR • Boot partition • Partition that contains the Windows XP files • KERNEL
(14) Microsoft IntelliMirror • Term used to describe features of Windows XP that help ensure the availability of a user’s data and computer configuration • Three key elements of IntelliMirror: • User data management • User settings management • Software installation and maintenance
(14)Windows File Protection (WFP) • Ensures that the correct and uncorrupted versions of certain core files are retained on the system at all times • Protects its list of sacred files from changes due to application installation, virus infection, and even human error • Works in the background, watching for attempted writes to its monitored files
(14) Backup Types • Copy backup • Backs up all selected files without marking them as being backed up • Normal (or full) backup • Backs up all selected files and marks them as being backed up • Daily backup • Backs up only the selected files that have been created or modified on the day the backup is being performed
(14) Backup Types • Differential backup • Backs up selected files that have been created or modified since the last full backup • Incremental backup • Backs up selected files that have been created or modified since the last normal or incremental backup
(14) Recovery Console • Command-line interface that provides administrative tools useful for recovering a system that is not booting correctly • Install • %systemroot% \winnt32.exe /cmdcons
(14) Driver Rollback • Device driver rollback • Removes the current driver for a device and re-initializes the previous driver
Windows XP Rollback • Rolling back to Windows 98 • Windows XP installed as an upgrade • Formatted as FAT32 • Add/Remove Programs
CMOS • Complimentary Metal-Oxide Semiconductor • Battery powered storage chip located on the motherboard