MCSA/MCSE 70-270 Exam Prep 2: Windows XP Professional

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

Safe Mode

    computers         starting 2nd 3rd 4th     limitations

     when to launch 2nd 3rd

Safe Mode option     advanced startups 2ndscalability

     multiprocessor computersscanners

     configuring (Device Manager) 2nd 3rd     installing (Device Manager) 2nd     Windows Image Acquisition (WIA) interface

Scanners and Cameras Utility (Control Panel) 2nd 3rd

Scheduled Tasks applet (Control Panel) 2nd

Scheduled Tasks application

     configuring 2nd 3rd    launch problems

         troubleshooting 2nd

     launching 2nd     Properties dialog box 2nd

Scheduled Tasks Properties dialog box

     tab options 2nd

scheduling     printer availabilitySCSI controllers (Small Computer System Interface)

     CD/DVD drives 2nd

SCSI ports (RS-232)

     multimedia device connections

Secedit.utility

     as security tool 2nd

secondary monitors

     adding to computers (Dualview) 2nd 3rd 4th

     configuring for multiple display setup

security

    access rights

         configuring 2nd 3rd

     account lockout policies 2nd

     Account Lockout policy    Administrator account         renaming

     Administrator rights 2nd

    Audit policy         setting 2nd 3rd 4th 5th 6th 7th     cached credentials

    configuration options         account policies 2nd 3rd 4th 5th

         IP Security policies 2nd

         local policies 2nd 3rd 4th 5th 6th

         public key policies         software restriction policies 2nd 3rd    EFS

         administrator use guidelines 2nd

         certificate storage 2nd         certificates, exporting 2nd         certification authority (CA)

         certification authority (CA), certificate requests 2nd         file decryption methods 2nd

         file encryption methods 2nd 3rd 4th         policies, setting 2nd         practical implementation of 2nd 3rd

         recovery agents

         self-signed certificates, generating 2nd

         supported file systems 2nd

         troubleshooting issues 2nd 3rd         troubleshooting via cipher command switches 2nd 3rd

     Encrypting File System (EFS)

     exam questions 2nd 3rd 4th 5th 6th 7th 8th 9th         answers 2nd 3rd 4th

    exercises

         Configuring a Local Group Policy (13.1) 2nd 3rd

         Establishing a Password Policy (12.1) 2nd    file systems         configuring 2nd 3rd

    firewalls

         Windows Firewall

     Full Control rights 2nd

    Guest account

         disabling

     hidden administrative shares 2nd

    Internet Explorer

         advanced options

         configuring 2nd 3rd 4th 5th 6th

         system information

         updates

     Internet zones

     Limited rights 2nd    local security policies         effect of GPOs (Group Policy Objects) 2nd

         management of 2nd

     lock-down practices 2nd 3rd 4th     management of 2nd 3rd 4th 5th    passwords

         never expire option         policies 2nd

    permissions

         consistent manmagement scheme

    pop-up ads         blocking 2nd    remote access

         configuring 2nd 3rd

    resources         websites     review questions

         answers 2nd    Simple File Sharing

         disabling    smart cards         logon requirements

     SP2 improvements

     SP2 tools

         buffer overrun protection

         malware protection         Security Center

         Windows Firewall

    templates         creating (Security Configuration and Analysis tool) 2nd 3rd

    tools

         Computer Management

         Group Policy Editor         Local Security Policy         Secedit.exe utility 2nd

         security templates

     troubleshooting 2nd 3rd 4th 5th

    Windows Firewall

         configuring after SP2 installation 2nd

         function of

     Windows Product Activation (WPA) 2nd 3rd

         confirmation codes

         ID generation

         information submission 2nd

Security Center

Security Configuration and Analysis tool

    file systems

         security settings 2nd 3rdsecurity levels node     software restriction policies

security templates

     as security tool select-and-place questions 2nd 3rdself-signed certificates (EFS)

     generating 2ndSerial Line Internet Protocol, [See SLIP]

serial ports (RS-232)

     multimedia device connections

server computers    Offline File feature         configuring 2nd

servers

     networking requirements 2nd    required RIS components         Active Directory

         DHCP         DNS

         separate disk partitions    RIS         Admin\#092i386 subfolder 2nd

         OSChooser subfolder 2nd

Service Pack 2, [See SP2]

service packs, [See SPs]

services    networks

         management of 2nd 3rd 4th 5th 6th

settings (user profiles)     transferring between computers (Files and Settings Transfer Wizard) 2nd 3rd 4th 5th 6th

Setup Manager

     administrator password bug

     installing (exercise 2.1) 2nd 3rd     running (exercise 2.2) 2nd 3rd     running from Windows 2000 Server

     running from Windows Server 2003

     unattended installations

         answer files, creatinng 2nd

         deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

share permissions

     Change 2nd

     conflicts with NTFS permissions 2nd

     establishing 2nd

     exam questions 2nd 3rd 4th 5th 6th 7th 8th

     Full Control 2nd

     Read 2nd

shared connections

    Internet         configuring ICS) 2nd 3rd 4th 5thshared folders

     creating 2nd

         with net share command    exercises         Installing IIS (5.1) 2nd

     hidden         ADMIN$ share

         C$ share

         creating

         FAX$ share         IPC$ share         Print$ share

    hidden administrative shares ($

         )     management overview     maximum number of connections

    network drives         mapping 2nd

    offline files         caching 2nd 3rd         providing 2nd 3rd

     removing

         from Computer Management console

     sharing over web (IIS) 2nd 3rd 4th 5th

shared resources     connecting to 2nd

    share permissions

         establishing 2ndsharing

     encrypted files 2nd

    files

         ForceGuest behaviors 2nd         implementation of 2nd     local printers 2nd 3rd

    printers

         configuration of 2nd

         implementation of 2nd

Shiva PAP

Simple File Sharing

     disabling

     file access permissions 2nd

simple volumes

simulation-based questions 2nd 3rd 4th

SLIP

     (Serial Line Internet Protocol)

slipstreaming

     SP2 pre-installations 2nd 3rd 4th 5th 6thsmall peer-to-peer networks     printer setup options

smart cards

     configuring (Device Manager) 2nd 3rd     enrollment agents     installing (Device Manager)

     logon requirements     PC/SC Workshop website

     Personal Computer/Smart Card (PC/SC) specification

     Plug and Play support

     public key infrastructure (PKI)     remote access authenticationsnapshots

     System Restore 2nd 3rd

software     cloning problems 2nd    compatibility

         testing for upgrades 2nd 3rd 4th    driver signing

         System File Protection    installation requirements         compatibility checks 2nd 3rd 4th

software restriction policies

     additional rules node

         certificate rule 2nd 3rd 4th

     designated file type node     enforcement node

    security

         configuring 2nd 3rd     security levels node

     trusted publishers node

Software Update Services (SUS)

    SP2 deployment         benefits 2ndsolutions

    defining

         installation troubleshooting

    documentation of

         installation troubleshooting

    testing and implementation

         installation troubleshooting 2nd

SP1

     major system improvements

SP2

     (Service Pack 2) 2nd

     deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         via Group Policy 2nd 3rd 4th 5th 6th 7th

         via Software Update Services (SUS) 2nd     downloading    installations

         Group Policy deployment 2nd 3rd 4th 5th 6th 7th

         manual 2nd 3rd         preparations 2nd         slipstreaming 2nd 3rd 4th 5th 6th

    Internet Explorer         Pop-Up Blocker 2nd

     major system improvements 2nd

     manual installations 2nd 3rd

    resources         websites     security focus

     security tools

         buffer overrun protection         malware protection         Security Center

         Windows Firewall    Windows Firewall

         configuring 2nd         function of spanned volumes

spooling

     print jobs

SPs

     (XP service packs)     components of

     hotfixes

     potential for errors    version 1

         major improvements

    version 2

         downloading         major improvements 2nd         security focus

stale data status

     volumes

standby mode

     airline restrictions

    power conservation

         mobile computers 2nd

     power management scheme 2nd

static IP addresses 2nd 3rd 4th 5th 6th 7th 8th

    network adapters

         configuring 2nd 3rd 4th 5th

stop errors

    failed installations

         resolving 2nd 3rdstopped installations     troubleshooting

storage devices [See also disk devices]

    Computer Management utility         Device Manager         Device Services

         Disk Defragmenter         Disk Management 2nd 3rd 4th 5th 6th 7th 8th

         Event Viewer

         Indexing Service

         Performance Alerts and Logs         Removable Storage 2nd 3rd 4th         WMI Control

    removable media

         configuring 2nd 3rd 4th         troubleshooting 2nd 3rd 4thstoring

     cached credentials     certificates (EFS) 2nd

    offline files         cachesstripe sets

    conversions

         upgrade preparations

striped volumes

     creating (Diskpart.exe utility) 2nd 3rd study strategies (exam) 2nd

     active approach 2nd 3rd

     macro approach 2nd     micro approach 2nd

subnet masks

     (TCP/IP)

    IP addresses         classes 2nd 3rd         Classless Inter-Domain Routing (CIDR) 2nd

         host calculations

success tips (exam) 2nd 3rd

switching

     between languages in multi-language environment 2nd

Symantec Drive Image

symmetrical multiprocessing (SMP)

    processor usage

         monitoring (Performance Monitor) 2nd

     QNX Software Systems

symmetrical processing (SMP)

     converting computers to (Device Manager) 2nd 3rd 4th

     multiprocessor computers

synchronizing    offline files         with network versions

Sysprep

     (System Preparation Tool)    computer functionality         testing 2nd

     desktop property configuration    domains

         computer removal

     extracting

    images         cloning problems 2nd         creating 2nd 3rd 4th 5th

         creating (exercise 2.3) 2nd

         deploying 2nd 3rd 4th 5th 6th 7th         encrypted file usage    Mini-Setup Wizard

         running (exercise 2.4) 2nd 3rd 4th     network requirements 2nd 3rd

     Norton Ghost Image     situations to avoid 2nd     SP1/SP2 deployment tools

     Symantec Drive Image

     unattended installations

         executing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

         troubleshooting 2nd 3rd 4th     when to use 2nd 3rd 4th 5th

System applet (Control Panel)

System Configuration utility (msconfig.exe)    clean boots

         executing

    video problems

         troubleshootingsystem data    backups

         copy type (Windows Backup)

         daily type (Windows Backup)

         differential type (Windows Backup)

         executing (Windows Backup) 2nd 3rd 4th 5th

         full type (Windows Backup)

         incremental type (Windows Backup)

         permissions (Windows Backup) 2nd

         restoring (Windows Backup) 2nd 3rd 4th 5th

System File Checker (scf.exe)

    driver signatures

         checking

System File Protection

     driver signingSystem Information Utility    devices

         conflict/sharing status

System Monitor snap-in (Performance Console)    counters         highlighting

     Explain button    real-time statistics

         viewing 2nd

system partitions

     booting fromsystem performance [See performance]    LogicalDisk Object

         counters 2nd

    Memory Object         counters 2nd 3rd    monitoring

         overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th    optimizing

         overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th    PhysicalDisk Object         counters 2nd

    power management

         preconfigured modes 2nd

    processor Object

         counters System Preparation (sysprep) utility

System Preparation Tool, [See Sysprep]

system resources     accessing in Internet Explorer 2nd

system restoration

     troubleshooting (Safe Mode) 2nd 3rd 4th

System Restore    earlier system states         restoring to 2nd 3rd

     restore points 2nd 3rd

     snapshots 2nd 3rd

System State data

     file types 2nd 3rd 4th

     recovering (Recovery Console) 2nd 3rd 4th 5th 6th

system volumes

Категории