• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/478

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

478 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
Question
Answer
True or false. Windows XP Professional includes support for Internet Connection Firewall.
TRUE
The minimum memory that is supported by Windows XP Professional is ________.
64MB
The minimum amount of disk space required by Windows XP Professional is ________.
1.5GB
True or false. Windows XP Professional can support up to four processors.
False. Windows XP Professional supports computers with one or two processors.
Define the system partition.
The system partition contains the MBR and the system files needed to boot the Windows XP Professional operating system. This is the active partition by default, usually the C: drive.
List the three file systems that are supported for hard drives by Windows XP Professional.
File Allocation Table(FAT16), FAT32, and New Technology File System(NTFS)
Which two options must be available on the network if you want to install Windows XP Professional into a Windows 2000 or Windows 2003 domain?
A domain controller for the domain and a DNS server
What is the purpose of product activation?
Product activation is Microsoft's way of reducing software piracy.
True or false. You use the F2 key to specify that you are using a third-party disk driver during the installation of Windows XP Professional.
False. You would use the F6 key.
List the two types of images that can be configured for an RIS server.
A CD-based image and a Remote Installation Preparation(RIPrep) image.
Which utility is used to create disk images for Windows XP Professional automated deployment?
The System Preparation Tool, or Sysprep
What is the primary purpose of the Setup Manager utility?
To create answer files(automated installation scripts) that are used to answer the questions that appear during a normal Windows XP Professional installation
List the three automated deployment options that can use unattended answer files.
Windows XP unattended installation, Sysprep(disk imaging) install, and Remote Installation Services(RIS)
True or false. The partition that will hold RIS installation images must be NTFS and must not contain the operating system files.
TRUE
List the three network services that are required by the RIS server.
Dynamic Host Configuration Protocol(DHCP)server,Domain Name System(DNS)server, and Active Directory
Which two user rights must be configured for the RIS installation to work properly?
Join a Computer to a Domain and Log On as a Batch Job
Which Sysprep switch should you use to force the Setup program to run Plug and Play detection of hardware?
#NAME?
True or false. If you want to preserve Windows NT 4 Workstation users and groups, you should perform a clean install.
False. If you want to preserve existing Windows NT 4 users and groups, you should perform an upgrade.
True or false. You can directly upgrade to Windows XP Professional from Windows 95.
False. There is no direct upgrade path to Windows XP Professional from Windows 95.
List the four client upgrade paths to Windows XP Professional .
Windows 98, Windows Me, Windows NT 4 Workstation, and Windows 2000 Professional
True or false. You cannot upgrade to Windows XP Professional from any version of Windows NT Server.
TRUE
You need a ________ or higher processor to upgrade to Windows XP Professional.
233MHz
True or false. Any hardware that is supported by Windows 98 is also supported by Windows XP Professional.
False. You should check the Windows XP HCL for hardware compatibility.
Which switch can you use with the WINNT32 program to create a Windows XP Compatibility Report to be used with an upgrade?
/checkupgradeonly
True or false. Before you upgrade to Windows XP Professional, you should perform a disk scan, a current virus scan, and disk defragmentation.
TRUE
Which Windows XP Professional utility is used by administrators to migrate users from one computer to another via a command-line utility?
The User State Migration Tool(USMT)
Which Control Panel(Classic view) icon is used to allow you to install, remove, and troubleshoot your hardware?
Add or Remove Hardware
Which Control Panel(Classic view) icon is used to configure power schemes, hibernation, and ACPI(Advanced Configuration Power Interface)?
Power Options
What are the three main areas of configuration in Computer Management?
System Tools, Storage, and Services & Applications
Which utility allows you to view hardware resources, including the device's interrupt request(IRQ), I/O port address, memory address, and Direct Memory Access(DMA) settings?
Device Manager
True or false. The MMC provides a common environment for snap-ins, which are administrative tools developed by Microsoft or third-party vendors.
TRUE
List the five Registry keys that are available on all Windows XP Professional computers.
HKEY_CURRENT_USER,HKEY_USERS,HKEY_LOCAL_MACHINE,HKEY_CLASSES_ROOT,and HKEY_CURRENT_CONFIG
What is the primary purpose of Windows XP Professional driver signing?
Driver signing is a way of ensuring that drivers are properly tested before they are released to the public.
True or false. In order to set up multiple-display support, you must have a display adapter installed for each monitor, and you must use PCI or AGP display adapter cards.
TRUE
What is hibernation used for in Windows XP Professional?
With hibernation, anything that is stored in memory is also stored on your hard disk.
What is the primary purpose of Advanced Configuration Power Interface(ACPI)?
ACPI allows you to reduce the power consumption of your computer which is important for laptops that are running from battery power.
True or false. USB is an external bus standard that is used to connect USB devices through a USB port. USB supports transfer rates up to 12Mbps and can support up to 56 devices.
False. A single USB port can support up to 127 devices.
Which utility can you use to set processor affinity?
Task Manager
If you are using Windows XP Professional Multilanguage version, which utility do you use to switch between languages in the UI?
MUISETUP.EXE
How can you configure your computer to show Administrative Tools and Logoff in the Start menu?
The Advanced tab of the Taskbar and Start Menu Properties dialog box(Start Menu Settings section) has options for configuring Start menu features such as Administrative Tools.
True or false. Shortcuts can exist in various locations, including on the Desktop, on the Start menu, and within folders.
TRUE
What language support is offered by localized versions of Windows XP Professional?
Localized versions include the ability to view, edit, and print documents in different languages
What Control Panel icon is used to configure multilingual editing and viewing of documents?
Regional Options through the Date, Time, Language, and Regional Options
Which version of Windows XP Professional offers support for the user interface(UI) in different languages?
Multilanguage Version Windows XP
Which icon in Control Panel is used to configure keyboard, sound, display, mouse, and general properties of Windows XP Professional for users with limited sight, hearing, or mobility?
Accessibility Options
What is the purpose of FilterKeys?
FilterKeys ignores brief or repeated keystrokes.
What is the purpose of the Accessibility Wizard?
The Accessibility Wizard configures a computer based on the user's vision, hearing, and mobility needs.
What is the purpose of the Utility Manager?
The Utility Manager allows you to start and stop accessibility utilities and determines whether these utilities are started with Windows XP or when the Utility Manager is started.
What is a service?
A service is a program, routine, or process that performs a specific function within the Windows XP operating system.
List the five built-in user accounts created on a computer that is installed with Windows XP Professional in a workgroup.
Administrator,Guest,HelpAssistant,Support_xxxxxxx,and Initial user
List the two types of users supported by Windows XP.
Local users and domain users
True or false. Users must log on to a Windows XP Professional computer before they can use that computer.
TRUE
What keyboard sequence is used to access the logon dialog box if a computer is part of a domain?
Ctrl+Alt+Delete
Which utility is used to create users on a Windows XP Professional computer?
Local Users and Groups
Which two groups have permission to create users on Windows XP Professional computers?
Administrators and Power Users
True or false. A username and a group name can be the same on a Windows XP Professional computer.
FALSE
True or false. Usernames and passwords are case-sensitive.
FALSE
What is a logon script?
Logon scripts are files that run every time a user logs on to the network. They are usually batch files, but they can be any type of executable file.
Which password policy specifies a higher level of encryption for stored user passwords?
Store Password Using Reversible Encryption for All Users in the Domain
What are account lockout policies used for?
The account lockout policies are used to specify how many invalid logon attempts should be tolerated.
What audit policy tracks when a user logs on, logs off, or makes a network connection?
Audit Account Logon Events
Which user right allows a user to create a computer account on the domain?
Add Workstations to the Domain
Which security option automatically logs off users if they have limited logon hours and their logon time has expired?
Automatically Log Off Users when Logon Time Expires
True or false. The default groups on Windows XP Professional computers are considered local groups.
TRUE
Which default local group has permissions to back up and restore the file system, even if the file system is NTFS and the group members have not been assigned permissions to the file system?
Backup Operators
What is the primary purpose of the Guests group?
The Guests group is provided so that you can give people who are not regular users access to specific network resources.
True or false. The Power Users group can create, delete, and modify any user or group account.
False. They can modify or delete only user and group accounts they have created.
What is the primary purpose of the Replicator group?
The Replicator group is intended to support directory replication, which is a feature used by domain servers.
By default, which user is not a part of the Users local group?
Guest
What is the difference between an interactive user and a network user?
An interactive user is someone who uses the computer's resources locally. A network user is someone who accesses the computer's resources over a network connection.
True or false. Group names can be up to 256 characters.
TRUE
True or false. A renamed group keeps all of its properties, including its members and permissions.
TRUE
Which Group Policy setting forces the system to enable disk quota management on all NTFS volumes for the computer?
Enable Disk Quotas
Which Group Policy setting specifies that if users reach their quota limit, an entry will be added to the Event Viewer Application log?
Log Event when Quota Limit Exceeded
True or false. When configuring group policies through Start menu and Taskbar policies, you can configure users' Start menu and Taskbar options.
TRUE
True or false. The mouse driver that a user prefers can be configured as a part of the user's profile.
FALSE
True or false. By default, user profiles are created locally on the computer that the user account logs on to.
TRUE
What is the default location of local user profiles?
The Documents and Settings folder
What is the definition of a roaming profile?
A roaming profile is stored on a network server and allows users to access their user profile, regardless of the client computer they have logged onto.
Which icon in the Control Panel can you use to copy a user's profile?
System, through the Performance and Maintenance option
Which utility can you use to configure a user account to use a roaming profile?
Local Users and Groups utility
True or false. Roaming profiles are read-only profiles by default.
FALSE
True or false. Mandatory profiles can be configured exclusively with Windows XP Professional computers.
FALSE
How do you create a mandatory user profile?
Rename NTUSER.DAT to NTUSER.MAN
True or false. Only roaming profiles can be used as mandatory profiles. Mandatory profiles do not work for local user profiles.
TRUE
What properties can be configured for a hardware profile?
A hardware profile can contain any hardware settings for the computer. Hardware profiles are typically used when a single computer uses different configurations.
How do you select which hardware profile your computer will use?
If more than one profile is configured, you see a selection menu during the Windows XP Professional boot process.
Which Windows XP Professional file system supports encryption?
NTFS
What is the maximum volume size for a FAT32 partition?
2TB or 32GB if created with Windows XP
What command-line syntax can you use to convert your D:drive from FAT16 to NTFS?
CONVERT D:/fs:ntfs
Which two partition types are used with basic storage on a Windows XP Professional computer?
Primary partition and extended partition
True or false. Dynamic storage is recognized by Windows XP Professional and Windows NT 4 Workstations.
False. Dynamic storage is used only with Windows 2000, Windows XP, and Windows Server 2003.
What is a spanned volume?
A spanned volume consists of disk space on two or more dynamic drives; up to 32 dynamic drives can be used in a spanned volume configuration.
What is the maximum number of drives supported by a striped volume?
32
True or false. A striped volume is fault tolerant.
FALSE
True or false. Only NTFS files and folders can be compressed.
TRUE
True or false. You cannot have a folder or file compressed and encrypted at the same time.
TRUE
What is the purpose of disk quotas?
Disk quotas are used to specify how much disk space a user is allowed on specific NTFS volumes. You can specify disk quotas for all users, or you can limit disk space on a per-user basis.
Which command-line utility can be used to encrypt files on NTFS volumes?
CIPHER
True or false. By default, the Show Hidden Files and Folders view is selected, so that files and folders with the Hidden attribute are listed.
FALSE
What is the File Types tab of the Folder Options dialog box in Windows Explorer used to configure?
The File Types tab of the Folder Options dialog box is used to associate filename extensions with application file types.
What is the purpose of offline files and folders?
Offline files and folders allow network folders and files to be stored on Windows XP clients. Then, if the network location is not available, users can still access network files.
True or false. You can access only the offline folders that are stored on Windows XP computers.
FALSE
Where in Windows Explorer do you configure your Windows XP Professional computer to use offline files and folders?
Select Folder Options from the Tools pull-down menu.
True or false. You can search for files and folders based on the filename or folder name, the text you are looking for, or the location that you want to look in.
TRUE
List the six levels of NTFS permissions.
Full Control,Modify,Read & Execute,List,Read,and Write
Who can create shared folders?
To share a folder, you must be logged on as a member of the Administrators or Power Users group.
The ________ shared folder option specifies how folders are cached when the folder is offline.
Caching
List three types of share permissions.
Full Control,Change,and Read
______________ is the default permission on shared folders for the Everyone group.
Full Control
The ________ command-line utility can be used to map a network drive.
NET USE
At logon, a(n) ____________ is created for the logon account.
access token
When a resource is accessed, Windows XP Professional checks the ____________ to see if the user should be granted access.
discretionary access control list (DACL)
True or false. Through General Network Adapter properties, you can configure the protocols your network adapter will use.
FALSE
Which network protocol is installed on Windows XP Professional computers by default?
TCP/IP
The ________ is used to specify which part of the IP address is the network address and which part is the host address.
subnet mask
You configure the _______ IP configuration option if the network contains routers.
default gateway
Which two options are used to resolve NetBIOS computer names to IP addresses?
WINS server and LMHOSTS
Dynamic IP configuration assumes that you have a ____________ server on your network.
DHCP
The ____________ command is used to send an ICMP(Internet Control Message Protocol) echo request and echo reply to verify if the remote computer is available.
PING
____________ is Microsoft's implementation of the Novell IPX/SPX(Internetwork Packet Exchange/Sequenced Packet Exchange) protocol stack.
NWLink IPX/SPX/NetBIOS Compatible Transport
________ are used to enable communication between your network adapter and the network protocols that are installed.
Bindings
How do you define a printer in Windows XP terminology?
A printer is the software interface between the physical printer(the print device) and the operating system.
In Windows XP terminology, what is the difference between a logical port and a physical port?
A physical port is a port that the print device is directly attached to. A logical port is used when the print device is attached directly to the network through a network card.
Important
Which groups can create printers by default?
Administrators and Power Users
What is a printer pool?
Printer pools are used to associate multiple print devices with a single logical printer.
How can you redirect a print job to another printer?
To redirect print jobs, add a new port, highlight New Port, and choose New Port Type. In the Port Name dialog box, type the UNC name of the printer you want to redirect jobs to.
When would you use printer priority?
You use printer priority when you have multiple printers that are associated with a single print device and you want jobs from one printer to be serviced before jobs from another printer.
Which print option would you configure if you did not want jobs to be deleted from the print queue after they are printed?
Keep Printed Documents
True or false. Windows XP provides a default separator page that can be used by all print devices.
FALSE
What can a user with the Manage Printers print permission do?
A user or group with this permission can pause and restart the printer, change the spooler settings, share or unshare a printer, change print permissions, and manage printer properties.
True or false. You can audit print events, including the Print, Manage Printers, Manage Documents, Read Permissions, Change Permissions, and Take Ownership events.
TRUE
Which print management option can you use to restart a print job that had already started printing?
Restart
Which print permission does a user need to attach to a network printer?
Print
True or false. When you configure modem properties, you can configure the speaker volume for the modem, maximum port speed, and dial control to wait for a dial tone before dialing.
TRUE
List the two connection methods that can be used with VPNs.
Point-to-Point Tunneling Protocol(PPTP)or Layer Two Tunneling Protocol(L2TP)
What is a smart card used for in remote access?
A smart card is special hardware used to ensure secure communications.
True or false. Non-Microsoft clients are able to use the MS-CHAP protocol for dial-in user authentication.
FALSE
What is the advantage of a virtual private network(VPN)?
A VPN allows you to connect your remote computer to a private network through a public network such as the Internet.
True or false. You must specify the NetBIOS computer name of the server that you will connect to through a VPN connection when you set up the VPN client.
FALSE
True or false. With Internet Connection Sharing, multiple clients can share a single Internet connection.
TRUE
True or false. The computer that will host Internet connection sharing should use a static IP address.
TRUE
What are the two Internet services that are supported by IIS when IIS is installed on a Windows XP Professional computer?
FTP and HTTP
If you required access to a secure website, what request would you use instead of http:\\?
https:\\
Which protocol is used to support Internet printing services?
Internet Printing Protocol(IPP)
True or false. The Performance Monitor utility is used to monitor system performance in Windows XP.
False. You use System Monitor.
Which MMC snap-in is used to load the Windows XP System Monitor utility?
The ActiveX utility is used to load the System Monitor utility.
Which command-line utility shows the version of Windows you are using and whether or not any service packs have been applied?
WINVER
A __________ is a snapshot of how your computer is currently performing.
baseline
Which option in Performance Logs and Alerts is used to generate an event such as notification if a specific value is over or under the value you set?
Alerts
What is a trace log used for?
Trace logs are used to measure data continuously.
What value in the Memory>Available MBytes System Monitor counter indicates a memory bottleneck?
A value less than 4MB indicates a memory bottleneck.
Which System Monitor memory counter is used to track the number of times the requested information was not in memory and needed to be retrieved from disk?
Memory>Pages/Sec
The ________ utility shows all of the applications and processes that are currently running on the computer.
Task Manager
Which icon in Control Panel is used to configure application performance based on whether the application is being processed in the foreground or background?
System
Which icon in Control Panel is used to schedule tasks to occur at specified intervals?
Scheduled Tasks
Which Windows XP utility is used to track all of the information about your computer's software and hardware?
Event Viewer
List the five types of events that are tracked through Event Viewer.
Information,Warning,Error,Success Audit,and Failure Audit
What is the BOOT.INI file used for?
The BOOT.INI file is used to build the operating system menu choices that are displayed during the boot process. It is also used to specify the location of the boot partition.
What is the purpose of the BOOTSECT.DOS file?
The BOOTSECT.DOS is an optional Windows XP boot file that is used to load an alternate operating system if the computer is configured for dual-booting or multi-booting.
How can you create a Windows XP boot disk?
Format the floppy disk through the Windows XP operating system, and then copy the NTLDR, NTDETECT.COM, NTBOTTDD.SYS(optional), and BOOT.INI files to the floppy disk.
How do you access Windows XP Professional advanced startup options?
Press F8 when prompted during the Windows XP boot sequence to bring up the Advanced Options menu.
True or false. When you boot a Windows XP Professional computer in Safe Mode, the Windows XP configuration is simplified as much as possible.
TRUE
Which command-line utility would you use to access the System Configuration utility?
Msconfig.exe
What information can be backed up and restored using Automated System Recovery(ASR)?
The system information that is backed up by ASR includes System State data, system services, and disk configuration information.
Which utility ships with Windows XP and provides backup services?
Backup
What is Recovery Console used for?
The Recovery Console allows limited access to the FAT16, FAT32, and NTFS volumes without starting the Windows XP Professional graphical interface.
When you access the computer's setup program during bootup what are you really accessing?
CMOS
What is the purpose of the flash bios?
old BIOS could not be altered. Flash uses a disk to electronically upgrade bios to communicate with new device.
SIMM, DIMM and RIMM are part of what?
memory
What does IDE stand for?
Integrated Drive Electronics
What does SVGA stand for?
Super Virtual Graphics array
What does ANSI stand for?
American National Standards Institute.
What processors use ZIF?
all 80486 etc and Pentiums up to Pentium II but not including Pentium II. Pentium two uses SEC
Active matrix displays use what technology?
Thin Film TFT
How many color can be diplayed at once with an SGVA monitor?
16 million + but only 32 bit true colors
Can computer systems support ATA and IDE devices at the same time?
Yes, they support a mixture
How do you know the P8 and P9 wires were attached to the system board correctly?
The black wires should touch each other.
workgroup
user are saved locally to each computer
active directory
a centralized database for managing a network
what two user accounts are created during intial setup
adminstrator guest
/duprepare ?
prepares downloaded update files to be used during an installation
/dushare\\\\ location of updates
update wizard is not shown to user and no attempt is made to connect to win update
98 to xp upgrade do it from boot or in 98?
from win 98 to upgrade and keep settings
RIS bootable floppy supports ISA or PCI network cards?
Only PCI
Default password expriation for workgruop?
42 days
system/system calls/sec
the number of calls made to the OS service routines
processor\\interrupts/sec
number of hardware interrupts per second
system \\processor queue length
how many operations are waiting for the processor at any time >10 bad
when we create a user account what is really created?
SID Security Identifer
built in Groups
Adminstrators guest users power users
by default all users are members of the BLANK gourp
everyone
Backup Operators
can bu and restore files, log on locally and shutdown the sytem. Member cannot change security settings
Administrators
complet unrestricted access to the computer
backup operators
back up and restore files. Log on and shutdown computer.
Network configuration operators
can configure networking settings
power users
can create/modify user accounts they create, same with groups, cannot some group memberships, bu or restore files, device drivers, security logs
users
can logon/lock/shutdown computer. Cannot groups/users, cannot share.
Question
Answer
Name some of the features of Automatic Update
AU allows users with admin. privileges to automatically download and install critical O.S. updates Updates are downloaded and installed in the background It uses bandwidth throttling
How many users can run the AU client at one time?
Only one administrative user at a time can run the AU client
What is new in Windows XP with regards to CD creation?
Users can save files to CD without using third-party software
What is necessary for a CD creation to complete successfully?
The user must have enough space on the hard drive to temporarily hold the files for the CD
What is ClearType?
ClearType triples the horizontal resolution available for rendering text for clearer text display on LCD monitors
How is ClearType specified?
In Display Properties click the Apperance tab. Under Effects choose ClearType under Use The Following Method To Smooth Edges Of Screen Fonts
By default, how often is the Desktop Cleanup Wizard run?
The Desktop Cleanup Wizard is by default run every 60 days.
What is new with the Start Menu?
The new Start Menu lists the programs most frequently used
What does the Windows XP Pro fax support enable users to do?
The Windows XP Pro fax support enables users to send faxes over a network from a computer with a an attached fax modem or fax board or with a LAN connection
What is possible with the Fast User Switching feature?
The Fast User Switching feature allow multiple users to simultaneously share a computer without closing all applications first
What does the Auto-Configuration for Multiple Networks feature provide?
The Auto-Configuration for Multiple Networks feature provides easy access to network devices and the Internet. It also allows mobile computer users to seamlessly operate both office and home networks without manually reconfiguring TCP/IP settings
What is provided with Internet Explorer 6.0?
IE 6.0 provides visual refresh and enhanced support for Document Object Model (DOM) level 1 and Cascading Style Sheets (CSS) level 1. Native support for Macromedia Flash and Macromedia Shockwave Player files Automatic Image resize (if the image is not embedded within HTML pages
What is the difference between Remote Desktop and Remote Desktop Connection?
Remote Desktop provides access to a desktop from any Terminal Services client. Remote Desktop Connection is the end-user tool for establishing connections to computers running Terminal Services including Remote Desktop
What does My Computer Information in Help and Support Center provide?
My Computer Information provides an easily understood, highly accessible view of personalized software and hardware information about your computer or another computer for which you have administrative permissions.
What is shown in the My Computer Information - Hardware category?
The Hardware category allows users to examine descriptive information about the computers hardware.
What is shown in the My Computer Information - Software category?
The Software category allows users to view a list of Microsoft products that are installed and registered by a Product Identification Number (PID). It also shows information about any software that crashed.
How many sessions of the Help and Support Center can be opened at the same time?
It is possible to open 2 sessions of the Help and Support Center at the same time
What is possible with the Remote Assistance feature?
The Remote Assistance feature allows users to remotely view and control a computer for any support task.
Name the two network environments Windows XP support?
Windows XP supports workgroups and domains.
What is a workgroup also called?
A workgroup is also called a peer-to-peer network because all computers in the workgroup can share resources as equals (peers) without a dedicated server
Name some of the features of workgroups
Each computer maintains a local security database. Decentralized administration of user accounts and resource security. A user must have a user account on each computer to which he or she wants to gain access. Any changes to user accounts must be made on each computer in the workgroup.
Can a computer running a Server operating system be part of a workgroup?
A workgroup can contain computers running one of the Microsoft Windows NT and Windows 2000 Server products as long as the server is not configured as a domain controller.
Name some of the advantages of a workgroup.
It does not require inclusion of a domain controller in the configuration. It is simple to design and implement. It is a convenient networking environment for a limited number of computers in close proximity (no more than 10 computers)
What is a domain?
A domain is a logical grouping of network computers that share a central directory database
Where in a domain does the directory reside?
The directory resides on computers that are configured as domain controllers.
What is a domain controller?
A domain controller is a server that manages all security-related aspects of user and domain interactions, centralizing security and administration.
Name some of the benefits of a domain.
Centralized administration. A single logon process for users to gain access to network resources. Scalability, so that you can create very large networks
What kind of computers are included in a typical domain?
A typical domain includes the following types of computers: Domain controllers running a server O.S. Member servers running a server O.S. Client computers running Windows XP Pro, Windows 2000 Pro or one the the other Microsoft Windows client O.S.
Name the two options for logging on locally offered by Windows XP Pro.
The two options are: The Welcome screen and The Log On To Windows dialog box
What is the default logon method used by Windows XP Pro?
By default, Windows XP Pro uses the Welcome screen to allow users to log on locally.
Why would anyone press CTRL+ALT+DEL in the Welcome screen?
Pressing CTRL+ALT+DEL in the Welcome screen twice enables the user to log on with the Log On To Windows dialog box.
Which account is not displayed in the Welcome screen?
The Administrator account is not displayed in the Welcome screen when other user accounts have been created.
To what can a user log on locally?
A user can log on locally to either a computer that is a member of a workgroup or a computer that is a member of a domain but is not a domain controller.
What is included in the User Accounts program in Control Panel?
The User Accounts program in Control Panel includes a Change The way Users Lon On Or Off task, which allows users to configure Windows XP Pro to use the Lon On To Windows dialog box instead of the Welcome screen.
Who authenticates a user logging on?
Windows XP Pro authenticates users who log on locally to the computer at which they are seated and one of the domain controllers in a Windows 2000 domain authenticates users who log on to a domain
Name the options in the Log On To Windows dialog box.
The options are: User name, Password, Log On To, Log On Using Dial-Up Connection, Shutdown, Options.
Which option in the Log On To Windows dialog box is not shown if the computer is not part of a domain?
If the computer is not part of a domain, the user will not get the Log On To option
Name the authentication process.
The user logs on by providing logon info. Windows XP Pro compares the logon info with the user info in the local security database. Of the info matches and the user account is valid, Windows XP Pro crates an access token for the user.
What is an access token?
An access token is the user's identification for the local computer. It contains the user's security settings, which allow the user to gain access to the appropriate resources on that computer and to perform specific system tasks.
What happens if a user logs on to a domain?
If a user logs on to a domain, Windows XP Pro contacts an available domain controller in the domain. The domain controller compares the logon info with the user info that is in the directory for the domain
How is the Windows Security dialog box accessed?
The Windows Security dialog box is accessed by pressing CTRL+ALT+DEL if the computer is joined to a domain or the Welcome screen is disabled. Otherwise the Task Manager will be activated.
Name the options in the Windows Security dialog box.
The options are: Lock Computer, Log Off, Shut Down, Change Password, Task Manager, Cancel.
What are the minimum hardware requirements for installing Windows XP Pro?
The minimum hardware requirements are: Pentium 233MHz CPU, 64MB RAM (128 MB recommended) 1.5GB on a 2GB harddisk, VGA monitor, NIC and related cable for networking 12X CD-ROM for CD-installation Keyboard and mouse
Which partitions should be made during installation?
Although Setup can create other partitions, only the partition on which Windows XP Pro will be installed should be created.
When should the NTFS file system be used?
Use NTFS when the partition on which Windows XP Pro will reside requires any of the following features: File- and Folder-level security, Disk compression, Disk quotas, Encryption
When should FAT or FAT32 be used on the system partition?
FAT or FAT32 should be used on the system partition when dual boot with a O.S that requires FAT or FAT32 is required.
Name the command to convert a FAT or FAT32 drive to NTFS.
In a command prompt type: convert volume /FS:NTFS where volume is the drive letter eg. D:
What is required when joining a domain?
Joining a domain requires: A domain name, A computer account (can be created during setup) An available domain controller and a DNS server
What is required when joining a workgroup?
Joining a workgroup requires: A new or existing workgroup name
Name the 4 stages of installing Windows XP Pro from a CD-ROM.
The 4 stages are: Running the Setup program, Running the Setup Wizard, Installing Windows XP Pro networking components, Completing the installation
Name the 6 steps involved in running the Setup program.
The 6 steps are: Load Setup program into memory, Start text-based Setup program, Create the Windows XP Pro partition, Format the Windows XP Pro partition, Copy setup files to the hard disk, Restart the computer.
When is the License Agreement shown for acceptance?
After the Setup program has restarted the computer and starts the text-mode portion of Setup, the license agreement is shown for acceptance.
What information does the Setup Wizard gather?
The Setup Wizard gathers the following information: Regional Settings, Name and organization, Computer name, Password for the Administrator account, Time and date
Name the 4 steps in installing Windows XP Pro networking components.
The 4 steps are: Detect network adapter cards, Select networking components, Join a workgroup or domain Install components.
What are the typical networking components when installing Windows XP Pro?
The typical networking components are: Client For Microsoft Networks, File And Printer Sharing For Microsoft Networks, QoS Packet Scheduler, Internet Protocol (TCP/IP).
Name the final 5 steps in completing the installation.
The 5 steps are: Copy files, Configure the computer, Save the configuration, Remove temporary files, Restart the computer.
Where are the installations files located in a network installation of Windows XP Pro?
In a network installation the installation files are located in a shared location on a network file server, which is called a distribution server
What are the requirements for a network installation of Windows XP Pro?
The requirements are: A Distribution server, A FAT partition on the target computer, A Network client
Name the 4 steps in a network installation of Windows XP Pro.
The 4 steps are: Boot the network client, Connect to the distribution server, Run WINNT.EXE or WINNT32.EXE, Install Windows XP Pro.
Name the three types of user accounts.
The three types of user accounts are: Local user accounts, Domain user accounts, Built-in user accounts
What does a local user account allow a user to do?
A local user account allows the user to log on to a specific computer to access resources on that computer.
What does a domain user account allow a user to do?
A domain user account allows a user to log on to the domain to access network resources
What does a built-in user account allow a user to do?
A built-in user account allows a user to perform administrative tasks or access local or network resources
Where does Microsoft recommend to use local user accounts?
Microsoft recommends that local user accounts only should be used in workgroups.
What does a domain controller do to a newly created domain user account?
The domain controller replicates the new user account information to all domain controllers in the domain.
Name the two commonly used built-in user accounts.
The two commonly used built-in accounts are Administrator and Guest
For what should the built-in Administrator account be used?
Use the built-in Administrator account to manage the overall computer.
What is possible to do with the built-in Administrator account?
The built-in Administrator account cannot be deleted, but it can be renamed and disabled.
When should the built-in Guest account be used?
Use the built-in Guest account to allow occasional users to log on and access resources.
What is possible with the built-in Guest account?
The built-in Guest account cannot be deleted, but it can be renamed or disabled.
How many characters can a user name consist of?
The user name can be up to 20 characters long.
Are user names case sensitive?
User names are not case sensitive, but Windows XP Pro preserves the case for display purposes
Which characters are not allowed in a user name?
The characters are: / \\ [ ] : ; | = , + * ? < >
How many characters can a password consist of?
A password can consist of up to 128 characters, but it can also be 0 characters.
Name the two ways to create, modify and delete user accounts in Windows XP Pro.
The two ways are: The user Accounts tool in the Control Panel and The Computer Management snap-in.
Which tasks are available after selecting Pick A Task in User Accounts tool in Control Panel?
The tasks are: Change an account, Create a new user account, Change the way users log on or log off.
Which tasks are available under Change An Account in the User Accounts tool in Control Panel (only available for Administrators)?
The tasks are: Change the name, Create a password/Change the password, Remove the password, Change the picture, Change the account type, Setup My account to use a .NET Passport, Delete the account.
What happens when clicking Keep Files after deleting a local user account?
The users desktop and My Documents are saved on the administrators desktop in a folder called Local_User_Name.
Who can create new user accounts?
Only administrators can create new user accounts.
What is possible to do with a users own local user account when the user has a limited account type?
The user can change his or hers own picture and create, change or remove the users password.
Who can change the way users log on or log off?
Only administrators can change the way users log on or log off.
What does the MMC allow the user to do, when the user has administrative privileges?
The MMC allows the user to: Administer tasks and troubleshoot problems locally, Administer tasks and troubleshoot problems remotely, Centralize administration.
How is a customized MMC console created?
A customized MMC console is create by typing MMC in the Start/Run field. On the File menu click Add/Remove Snap-In. In the Standalone tab, click Add. Select the snap-ins to use and save the console.
How is a local user account created in the Computer Management Snap-In?
Open the Computer Management Snap-In, In the console pane double-click System Tools, and then click Local Users And Groups, In the details pane right-click Users, and then click New User.
What happens to other options in the users account properties if The User Must Change Password At Next Logon option is checked in a users account properties?
The User Cannot Change Password option and the Password Never Expires option are no longer available.
Name the three tabs a users account properties are grouped under.
The three tabs are: General, Member Of, Profile.
What is a user profile?
A user profile is a collection of folders and data that stores the users current desktop environment, application settings and personal data. It also contains all the network connections that are established when the user logs on to a computer.
When is a user profile created?
Windows XP Pro creates a user profile the first time the user logs on to a computer and stores the profile on that computer.
What is a logon script?
A logon script is a file that can be assigned to a user account to configure the user's working environment.
What are the advantages in storing all home folders on a file server?
The advantages are: Users can access their home folders from any client computer on the network. Backup and administration can be centralized to one of the network backup operators.
What happens when naming a folder on an NTFS volume with the %username% variable?
The NTFS Full Control permission is assigned to the user and all other permissions are removed, including those for the Administrator account.
What is a group?
A group is a collection of user accounts.
Why are groups used?
Groups simplify administration by allowing an administrator to assign permissions and rights to a group of users rather that to each user account individually.
What are permissions?
Permissions control what users can do with a resource such as a folder, file or printer
What are rights?
Rights allow users to perform system tasks, such as changing the time on a computer and backing up or restoring files.
When are local groups used?
Use local groups to assign permissions to resources residing on the computer on which the local group is created.
What are the membership rules for local groups?
Local groups can contain local user accounts from the computer on which the local groups are created. Local groups cannot belong to any other group.
How is a local group created?
In Computer Management, expand Local Users And Groups. Right-click Groups and then click New Group.
When should the Member Of tab in the users Properties dialog box be used?
The Member Of tab should be used when quickly adding the user account to multiple groups.
What happens to the user accounts, that are members of a group, when the group is deleted?
Deleting the group does not delete the user accounts that are members of the group.
Which computers have built-in local groups?
All stand-alone servers, member servers and computers running Windows XP Pro have built-in local groups.
What are the built-in local groups for?
The built-in local groups give rights to perform system tasks on a single computer.
Where does Windows XP Pro place the built-in groups?
Windows XP Pro places the built-in groups in the Groups folder in Computer Management.
Name the built-in local groups in Windows XP Pro.
The built-in local groups are: Administrators, Backup Operators, Guests, Power Users, Replicator, Users
Where does built-in system groups exist?
Built-in system groups exist on any computer running one of the Microsoft Windows 2000 or Windows XP operating systems.
Which user accounts are members of the built-in system groups?
System groups do not have specific memberships that can be modified, but they can represent different users at different times, depending on how a user gains access to a computer or a resource.
Name the built-in System Groups.
The built-in system groups are: Everyone, Authenticated users, Creator Owner, Network, Interactive, Anonymous Logon, Dialup.
Which users are no longer members of the Everyone group?
The users that Windows XP Pro cannot authenticate are members of the Anonymous Logon group and no longer member of the Everyone group.
Name the 4 layers of the TCP/IP networking model.
The 4 layers are: Network Interface, Internet, Transport, Application.
Name the 4 Internet layer protocols.
The 4 protocols are: IP, ARP, ICMP, IGMP.
Name the 2 transport layer protocols.
The 2 protocols are: TCP, UDP
Name some of the standard TCP/IP tools and services from the Application layer.
Some tools and services are: FTP, Telnet, SNMP, DNS.
Name the two interfaces for network applications to use the services of the TCP/IP protocol stack.
The two interfaces are: Winsock and NetBIOS over TCP/IP (NetBT)
What does TCP/IP enable a host to use?
TCP/IP enables a host to use a static IP address or to obtain an IP address automatically from a DHCP server. It also supports automatic assignment of IP addresses on networks without a DHCP server
What does an IP address consist of?
An IP address consists of a network ID and a host ID.
What are IP addresses?
IP addresses are logical 32-bit numbers that are broken down into four 8-bit fields known as octets.
What address classes does Microsoft TCP/IP support?
Microsoft TCP/IP supports class A, B and C addresses
What are the range of class A, B and C TCP/IP addresses?
Class A: 1.0.0.0 to 126.0.0.0 Class B: 128.0.0.0 to 191.255.0.0 Class C: 192.0.0.0 to 223.255.255.0
What are the standard subnet masks for class A, B and C TCP/IP addresses?
Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0
How is a static IP address assigned to a network adapter?
In the network adapters properties dialog box, select properties for TCP/IP. Assign at least an IP address and a subnet mask.
What happens if duplicate IP addresses exist on a network?
IP communications can fail if duplicate IP addresses exist on a network.
How is a DHCP client configured?
In the network adapters Properties dialog box, select Obtain An IP Address Automatically.
What is Automatic Private IP Addressing (APIPA)?
This addressing mechanism is an extension of dynamic IP address assignment for LAN adapters, enabling configuration of I addresses without using static IP address assignment or installing the DHCP Service
What is the range of APIPA addresses?
The range is from 169.254.0.0 to 169.254.255.255
How long is an APIPA address in function?
The computer continues to use the APIPA address until it detects and receives configuration information from a DHCP server.
What is the time interval an APIPA configured network adapter tries to locate a DHCP server?
An APIPA configured network adapter tries every 5 minutes to locate a DHCP server.
How is APIPA disabled?
APIPA can be disabled by specifying an alternate IP configuration in the network adapters IP Properties.
Name some of the tools used to trobleshoot TCP/IP.
The tools are: Ping, Arp, Ipconfig, Nbtstat, Netstat, Route, Hostname, Tracert
Name some of the tools used to troubleshoot TCP/IP connectivity.
The tools are: FTP, TFTP, Telnet, RCP, RSH, REXEC, Finger
For what is Ipconfig used?
Ipconfig is used to verify the TCP/IP configuration parameters on a host.
What does Ipconfig reply if a host has a duplicate IP address?
Ipconfig will show the IP address but the subnet mask will be displayed as 0.0.0.0
What is the name of Microsoft's implementation of Novell's IPX/SPX protocol.
The name of Microsoft's implementation of the IPX/SPX protocol is NWLink.
Where is NWLink most commonly used?
NWLink is most commonly used in environments in which clients running Microsoft O.S. are used to access resources on NetWare servers, or in which clients running NetWare are used to access resources on computers running Microsoft O.S.
What is binding with regards to networking?
Binding is the process of linking network components on different levels to enables communication among network adapter card drivers, protocols, and services.
Who can select which protocols are bound to the network adapter card?
It is possible to select which protocols are bound to the network adapter cards if the user is a member of the Administrators group.
What happens when adding network software?
When adding network software, Windows XP Pro automatically binds all dependent components accordingly.
Where are bindings configured?
In Network Connections click Advanced and select Advanced Settings
What is DNS?
DNS (Domain Name System) is a naming system based on a distributed database used in TCP/IP networks to translate computer names to IP addresses.
What are the benefits of DNS?
DNS names are user-friendly, DNS names remain more constant that IP addresses. DNS allows users to connect to local servers using the same naming convention as the Internet.
What is the Domain Namespace?
The Domain Namespace is he naming scheme that provides the hierarchical structure for the DNS database
What does DNS use to resolve a name to an IP address?
DNS uses a host's Fully Qualified Domain Name (FQDN) to resolve a name to An IP address.
How is a host name configured on a Windows XP Pro client?
By default, TCP/IP setup uses the computer name for the host name, replacing illegal characters with hyphen (-).
How long can domain names be?
Domain names can be up to 63 characters long, including periods.
What are DNS zones?
Zones provide a way to partition the domain namespace into manageable sections.
What kind of computer stores the zone database file?
A DNS server stores the zone database file.
What is name resolution?
Name resolution is the process of resolving names to IP addresses
What are forward lookup queries and what are reverse lookup queries?
Forward lookup queries resolve a name to an IP address, and a reverse lookup query resolves an IP address to a name.
What are the two options for configuring DNS server addresses on a Windows XP Pro client?
The two options are: Obtain DNS Server Address Automatically, Use The Following DNS Server Addresses.
What happens if the user specifies a DNS suffix?
If the user specifies a DNS suffix, it is used instead of one assigned by a DHCP server
How is a DNS suffix specified?
A DNS suffix is specified in the DNS Suffix For This Connection text box in the Advanced TCP/IP settings dialog box.
What are the limitations when domains are listed in Append These DNS Suffixes (In Order) in Advanced TCP/IP Settings?
Queries for unqualified names are limited to the domains that are listed in Append These DNS Suffixes (In Order) in Advanced TCP/IP Settings
What happens when selecting the Register This Connection's Addresses In DNS check box?
Selecting the Register This Connection's Addresses In DNS check box causes the computer to attempt to dynamically register the IP addresses (through DNS) of this computer with its full computer name
What is included in Active Directory?
Active Directory includes the directory of data store, which is a structured database that stores information about network resources, as well as all the services that make the information available and useful.
What are objects?
The resources stores in the directory, such as user data, printers, servers, databases, groups, computers and security policies, are known as objects.
How is administration simplified with domain controllers?
To simplify administration, all domain controllers are peers.
How does Active Directory simplify administration?
Active Directory simplifies administration by providing a single point of administration for all objects on the network
Name some of the open standards that Active Directory supports.
Active Directory uses DNS for its name system and can exchange information with any application or directory that uses LDAP (also version 2 and 3) or HTTP
What kind of DNS does Windows 2000 use?
Windows 2000 uses Dynamic DNS (DDNS)
What does DDNS eliminate?
DDNS eliminates the need for other Internet naming services, such as WINS, in a homogeneous environment.
Name the standard name formats supported by Active Directory.
The standards are: RFC 822: name@domain, HTTP URL: HTTP://domain/path-to-page UNC: \\\\server\\share\\document-name LDAP URL: LDAP://server/CN=name,OU=users,DC=devel
What is an OU?
An OU is a container used to organize objects within a domain into logical administrative groups
How many objects can a domain directory contain?
Theoretically, a domain directory can contain up to 10 million objects, but 1 million objects per domain is a more practical amount
What are sites?
A site is a combination of one or more IP subnets connected by a highly reliable, fast link to localize as much network traffic as possible
How does a site manage replication?
Within a site, Active Directory automatically generates a ring topology for replication among domain controllers in the same domain.
What does the Active Directory Schema define?
The Active Directory schema defines objects that can be stored in Active Directory.
Name the two types of definition objects the schema contains.
The two types are: schema class objects and schema attribute objects
What happens with regards to schema when installing AD on the first DC?
Installing AD on the first DC in a network creates a default schema that contains a set of basic schema class attributes.
Can the schema be extended?
The schema can be extended by using the Schema Manager snap-in or the Active Directory Services Interface.
What does Global Catalog contain?
Global Catalog is the catalog service provided by AD. Global Catalog contains selected information about every object in all domains in the directory
In which server does Global Catalog reside?
By default, a Global Catalog is created automatically on the first domain controller in the first domain in the forest.
How is it defined what attributes are included in the Global Catalog replication?
Using the Schema Manager snap-in, an administrator can define what attributes in included in the Global Catalog replication.
Can additional Global Catalog servers be designated?
To designate additional DC's as Global Catalog servers, use the Active Directory Sites and Services Management snap-in.
Where should a Global Catalog server be in the enterprise?
Every major site in the enterprise should have a Global Catalog server.
What is a Distinguished name (DN)?
Every object in AD has a DN, which uniquely identifies an object and contains sufficient information to retrieve the object from the directory. DNs must by unique, because AD does not allow duplicate DNs
When are GUIDs assigned to objects?
GUIDs are assigned to objects when they are created.
Name the terms used for printing by Windows XP Pro.
The terms are: Printer: The hardware device Printer port: The software interface Print Server: The computer that manages printers Printer driver: set of files to convert print commands into a printer language
What kind of printers does Windows XP Pro support?
Windows XP Pro supports: Local printers and Network interface printers
What kind of printer ports does Windows XP Pro support?
Windows XP Pro supports: LPT, COM, USB, IEEE1394, and network attached devices such as HP JetDirect and Intel NetPort.
What are the limitations on Windows XP Pro used as a print server?
The limitations are: Up to 10 concurrent connections can be made. Macintosh and NetWare are not supported
What happens if a print server does not have sufficient RAM?
If a print server has insufficient RAM, printing performance deteriorates.
What happens if a print server does not have sufficient hard disk space?
If a print server has insufficient hard disk space to hold all documents, users get error messages and are unable to print
What is the limit of local printers that can be connected to a print server through physical ports?
The number of local printers that can be connected to a print server through physical ports depends on the hardware configuration.
How is a network interface printer added to a Windows XP Pro computer?
To add a network interface printer, select Local Printer Attached To This Computer on the Local Or Network Printer page of the Add Printer Wizard
How is additional port information provided to a TCP/IP printer port?
For TCP/IP, additional port information must be provided in the Add Standard TCP/IP Printer Port Wizard
What must be entered in the Printer Name Or IP Address text box in the Add Printer Wizard when adding a network interface printer?
Either the DNS name or the IP address of the printer must be entered.
For which operating systems does Windows XP Pro automatically download a printer driver to a client?
Windows XP Pro automatically downloads a printer drivers to clients running: Windows XP Pro and Home, Windows 2000, Windows NT, Windows ME, Windows 98, Windows 95
What must be provided for Windows XP to automatically download a printer driver to a client?
The correct printer driver for the operating system must be installed on the print server.
How is a connection to a print server made on a Windows XP Pro client?
In the Add Printer Wizard, select A Network Printer Or A Printer Attached To Another Computer
What happens when a printer is taken offline?
Taking a printer offline causes documents that are send to this printer to be held on the computer while the printer is not available.
Which operating systems can use a Web browser to connect to a shared printer?
Clients running Windows XP Pro, Windows XP Home and Windows 2000 can use a Web browser to connect to a shared printer
What methods are available for connection to a network printer in the Add Printer Wizard on clients running Windows XP and Windows 2000?
The methods are: Using the UNC name, Browsing the network, Using the URL name, Searching Active Directory
Which methods are available to connect to a network printer on clients running Windows NT, Windows ME, Windows 98 and Windows 95?
Client computers running Windows NT, Windows ME, Windows 98 and Windows 95 can only use the UNC name or browsing Network Neighborhood to locate a printer.
How is a connection made to a printer with the Run command on the Start Menu?
Type the UNC name of the printer on the Open text box and click OK to connect to a printer.
Which command can be used on any Windows based client to connect to a printer?
The command Net Use can be used on any Windows based client to connect to a printer
On which operating systems is the Net Use command the only way to connect to a network printer?
The Net Use command is the only method available for making a connection to a network printer from clients running MS-DOS or OS/2 with Microsoft LAN Manager client software installed
What must be installed to use Internet printing?
To use Internet printing, IIS must be installed on the print server
What is a printer pool?
A printer pool is two or more identical printers that are connected to one print server and act as a single printer
What kind of printers can be used to printer pools?
The printers can be local or network interface printers
Can the printers in a printer pool be different from each other?
Although the printers should be identical, other printers can be used if they use the same printer driver
How is a printer pool created?
To create a printer pool, use the Ports tab of the Properties dialog box for a printer that should be part of the pool
What are the advantages of a printer pool?
The advantages are: In a network with a high volume of printing, it decreases the time that documents wait on the print server. It simplifies administration because multiple printers can be administered simultaneously
What is possible by setting priorities among printers?
Setting priorities among printers makes it possible to set priorities among groups of documents that all print on the same physical printer
Who has by default the Manage Printers permission?
By default, members of the Administrators and Power Users groups have the Manage Printers permission for all printers
Name the three levels of printer permissions in Windows XP Pro.
The three levels are: Print, Manage documents, Manage printers
What is possible with the Print permission for a printer?
With the Print permission it is possible to: Print documents, Pause, resume, restart and cancel the users own document, Connect to a printer
What is possible with the Manage Documents permission for a printer?
With the Manage Documents permission it is possible to all from the Print permission and: Pause, resume, restart and cancel all documents, Control job settings for all documents
What happens of both allow and deny permissions exist for a printer?
Deny permissions always override allowed permissions
Who has by default the Print permission for all printers?
By default, Windows XP Pro assigns the Print permission for each printer to the built-in Everyone group
Where are printer permissions set?
To assign printer permissions, right-click the appropriate printer icon, select Properties and click the Security tab
If a user does not have the Security tab under a printers Properties, how is that resolved?
By clearing the Use Simple File Sharing check box in Folder Options, the Security tab becomes available.
What functions does a separator page have?
Separator pages have two functions: To identify and separate printed documents, To switch printers between print modes
Where are the included separator pages placed?
Windows XP includes four separator pages, that are placed in the %systemroot%\\System32 folder.
Name the four separator pages included in Windows XP Pro.
The four separator pages are: sysprint.sep, pcl.sep pscript.sep, sysprtj.sep
Where is a separator page selected for a printer?
In the Advanced tab in the printer's Properties dialog box a separator page can be defined
How is a printer taken offline?
To take a printer offline, open the printer windows and on the Printer menu, click Use Printer Offline
What are the rules with redirecting print jobs?
It is possible to redirect all print jobs from one printer to another as long as both printers use the same driver. It is not possible to redirect specific documents
Who is by default the owner of a printer?
By default, the user who installed the printer is the owner
What is possible when a user has taken ownership of a printer?
Taking ownership of a printer enables the user to change administrative responsibility for it
Who can take ownership of a printer?
A user or a member of a group who has the Manage Printer permission for the printer, members of the Administrators and Power Users group can take ownership of a printer
Who can by default pause, resume, restart and cancel a users documents on a printer?
Because the creator of a document by default has the Manage Documents permission, users can perform these actions on their own documents
What permission is required for setting notification, priority and printing time?
For these actions the Manage Documents permission is required
Where is the notification, priority and printing time set for a document?
The notification, priority and printing time is set in the General tab of the Properties dialog box for a document
From which computers can a user manage printers from a Web browser?
Windows XP Pro enables a user to manage printers from any computer running a Web browser
What must be installed on a print server running Windows XP Pro or Windows 2000 Server to enable a user to manage printers on the print server from a Web browser?
To access a printer using a Web browser, a print server running Windows XP Pro or Windows 2000 Server must have Microsoft IIS installed
What is visible from a printers URL page?
From a printers URL page the user can view information about the printer, such as its model, its location, and the number of documents waiting to print
For what are NTFS permissions used?
NTFS permissions are used to specify which users and groups can access files and folders and what they can do with the contents of the files or folders
On which volumes are NTFS permissions available?
NTFS permissions are only available on volumes formatted with NTFS file system
In which situations are NTFS permissions effective?
NTFS security is effective whether a user accesses the file or folder at the local computer or over the network
Name the standard NTFS folder permissions.
The standard NTFS folder permissions are: Read, Write, List Folder Contents, Read & Execute, Modify, Full Control
When are folder permissions assigned?
Folder permissions are assigned to control the access that users have to folders and the the files and subfolders that are contained within the folders
When are file permissions assigned?
File permissions are assigned to control the access that users have to individual files
Name the standard NTFS file permissions.
The standard NTFS file permissions are: Read, Write, Read & Execute, Modify, Full Control
What are a user's effective permissions?
A user's effective permissions for a resource are the sum of the NTFS permissions that are assigned to the individual user account and to all of the groups which the user belongs
When both NTFS folder permissions and NTFS file permissions are assigned, what takes priority?
When both NTFS folder permissions and NTFS file permissions are assigned, NTFS file permissions take priority
Is it possible to access a file even if the user has no access to the folder where the file is placed?
If the user has the Bypass Traverse Checking user right, it is possible to access a file even if the user has no access to the folder where the file is placed
Who has by default the Bypass Traverse Checking user right?
Be default, the Everyone group has the Bypass Traverse Checking user right
What happens by default with NTFS permissions assigned to a parent folder?
By default, permissions that are assigned to the parent folder are inherited by and propagated to the subfolders and files contained in the parent folder
What permissions are assigned when a volume is formatted with NTFS?
By default, when a volume is formatted with NTFS, the Full Control permission is assigned to the Everyone group
Who can assign permissions to files and folders?
Administrators, users with the Full Control permission and the owners of files and folders can assign permissions to user accounts and groups
Where are NTFS permissions assigned?
NTFS permissions are assigned in the Security tab of the file's or folder's Properties dialog box
How are special NTFS permissions assigned?
Special NTFS permissions are assigned by clicking the Advanced button on the Security tab in the file's or folder's Properties dialog box
Who can take ownership of a file or folder?
Users with the Full Control standard NTFS permission or the Take Ownership special NTFS permission can take ownership of a file of folder
Can an administrator take ownership of a file or folder the administrator hos no access to?
An administrator can take ownership of a folder or file, regardless of assigned permissions
What happens if an administrator takes ownership of a file or folder?
If an administrator takes ownership of a file or folder, the Administrators group becomes the owner and any member of the Administrators group can change the permissions and assign the Take Ownership permissions to other user accounts and groups
Where can a user take ownership of a file or folder?
To take ownership of a file or folder, click the Advanced button in the Security tab of the file's or folder's Properties dialog box. Then click the Owner tab
How is permission inheritance prevented?
To prevent a subfolder or file from inheriting permissions, clear the check box labeled Inherit From Parent The Permission Entries That Apply To Child Objects in the Advanced Security Settings dialog box
Name the three Preventing Permissions Inheritance options.
The options are: Copy, Remove, Cancel
What happens to NTFS permissions when a file or folder is copied?
A copy is treats as a new file or folder, and will inherit the permissions from the destination folder. The user that made the copy will be the Creator Owner of the copy.
What permissions must be in place for a user to copy a file or a folder?
The user must at least have the Read permission for the source folder or file and at least the Write permission for the destination folder
What happens to the NTFS permissions when copying or moving a folder or a file to a FAT volume?
When copying or moving a folder or a file to at FAT volume, the NTFS permissions are lost
What happens to a folder's or a file's permissions when moving the file or folder within a single NTFS volume?
The permissions are retained when moving a file or folder within a single NTFS volume
What permissions must be in place for a user to move a file or folder?
For a user to move a folder or file, the user must at least have the Write permission for the destination folder and at least the Modify permission for the source file or folder
What happens to a folder's or a file's permissions when moving the folder or file between NTFS volumes?
When a folder or file is moved between NTFS volumes, the permissions are inherited from the destination folder. The user who made the move becomes the Creator Owner
For what are shared folders used?
Shared folders are used to provide network users with access to file resources
What can shared folders contain?
A shared folder can contain applications, data, or a user's personal data, called a home folder
Name some of the characteristics of shared folder permissions.
Shared folder permissions apply to folders, not individual files. Shared folder permissions are the only way to secure network resources on a FAT volume. The default shared folder permission is Read, and it is assigned to the Everyone group when you share the folder.
Name the three levels of shared folder permissions.
The three levels are: Read, Change, Full Control
What are the effective shared folder permissions for a shared folder?
The user's effective permissions are the combination of the user and group permissions
What is needed for a user to gain access to a shared folder on an NTFS volume?
When users gain access to a shared folder on an NTFS volume, they need the shared folder permission and also the appropriate NTFS permissions for each file and folder to which they gain access
What are a user's effective permissions for a shared folder on an NTFS volume?
A user's effective permission for a shared folder on an NTFS volume is the more restrictive of the shared and NTFS permissions
What happens when a shared folder is copied, renamed or moved?
Wen a shared folder is copied, the original folder is still shared, but the copy is not. When a shared folder is renamed or moved, it is no longer shared
What is the share name length?
The share name length is 80 characters for Windows XP and Windows 2000, 12 characters for Windows NT, Windows 98 and Windows 95, and 8.3 characters for MS-DOS and Windows 3.X
Who can share a folder in a Windows 2000 domain?
In a Windows 2000 domain the Domain Admins group can share folders residing on any machines in the domain. The Power Users group is a local group that can share folders residing only on the stand-alone server or the computer running Windows XP Pro where the group is located
Who can share a folder in a Workgroup?
In a workgroup, the Administrators and Power Users groups can share folders on the Windows 2000 stand-alone server or the computer running Windows XP Pro on which the group exists
What NTFS permission is needed for a user to share the folder?
If the folder to be shared resides on an NTFS volume, users must have at least the Read permission for that folder to be able to share it
Name the administrative shares on a Windows XP Pro computer.
The root of each volume, the system root folder and the location of the printer drivers are hidden shared volumes, also known as administrative shares
What are the permissions for the administrative shares C$, D$ and so on and Admin$?
The administrative shares C$, D$ and so on and Admin$ all have the Full Control permissions assigned to the Administrators group
What are the shared folder permissions for the administrative share Print$?
The administrative share Print$ has the Full Control permission assigned to the Administrators and Power Users group. The Everyone group has the Read permission
How is a hidden share created?
Adding a $ sign at the end of the share name makes the share hidden
How is a folder shared?
Right-click the folder to share and then click Properties. In the Sharing tab of the Properties dialog box, click Share This Folder and configure the options
How are shared folder permissions assigned to users?
In the Sharing tab of the Properties dialog box of the shared folder, click the Permissions button
What is the default cache size for caching shared folders?
By default, the cache size is set to 10% of the available disk space
Where can the cache size be set for caching shared folders?
The cache size can be set in the Folder Options dialog box using the Offline Files tab
How is a shared folder made available for caching?
When a folder is shared,it is possible to make it available offline by clicking Caching in the folder's Properties dialog box
Name the three options for caching?
The three options are: Manual Caching Of Documents, Automatic Caching Of Documents, Automatic Caching Of Programs And Documents
For what is the Automatic Caching Of Programs And Documents recommended?
The Automatic Caching Of Programs And Documents options is recommended for folders containing read-only data or applications that are run from the network
How is a share with multiple share names created?
To share a folder with multiple names, click New Share in the folder's Properties dialog box
How is a connection to a shared folder made?
To access a shared folder, use: My Network Places, My Computer, Add Network Place Wizard or the Run command