Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

8 Cards in this Set

  • Front
  • Back
You are preparing your XP's disk subsystem. You change your disks to dynamic disks. Which volume types cannot be extended at will?
According to Microsoft KB: A simple volume uses free space from a single disk. It can be a single region on a disk or consist of multiple, concatenated regions. A simple volume can be extended within the same disk or onto additional disks. If a simple volume is extended across multiple disks, it becomes a spanned volume. A spanned volume is made from free disk space that is linked together from multiple disks (up to a maximum of 32 disks). A spanned volume can be extended onto additional disks. A spanned volume cannot be mirrored. A mirrored volume is a fault-tolerant volume whose data is duplicated on two physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If one of the disks fails, the data can still be accessed from the remaining disk. A mirrored volume cannot be extended. Mirroring is also known as RAID-1. A striped volume is a volume whose data is interleaved across two or more physical disks. The data on this type of volume is allocated alternately and evenly to each of the physical disks. A striped volume cannot be mirrored or extended. Striping is also known as RAID-0. A RAID-5 volume is a fault-tolerant volume whose data is striped across an array of three or more disks. Parity (a calculated value that can be used to reconstruct data after a failure) is also striped across the disk array. If a physical disk fails, the portion of the RAID-5 volume that was on that failed disk can be recreated from the remaining data & the parity. A RAID-5 volume cannot be mirrored or extended.
Which of the following features do NOT allow a program to trap open operations against objects in the file system & run their own code before returning file data:
A) Encryption
B) Sparse files
C) Reparse points
D) USN Journal
E) Quotas
According to Microsoft New features of the NTFS 3.0/3.1 file system include:
Disk quotas. Administrators can limit the amount of disk space users can consume on a per-volume basis. The three quota levels are: Off, Tracking, and Enforced.
Encryption. NTFS file system can automatically encrypt & decrypt file data as it is read & written to the disk.
Reparse points. Programs can trap open operations against objects in the file system & run their own code before returning file data. This feature can be used to extend file system features such as mount points, which you can use to redirect data read & written from a folder to another volume or physical disk.
Sparse files. This feature allows programs to create very large files, but to consume disk space only as needed.
USN Journal. This feature provides a persistent log of all changes made to files on the volume. This feature is one of the reasons that Windows XP & Windows 2000 domain controller must use an NTFS partition as the system volume.
The managers complain that the accounting employees always occupy the printer. They want to be able to print first. You currently have only one printer created. How many more printer(s) should you create to handle this situation?
Setting priorities between printers makes it possible to set priorities between groups of documents that all print on the same print device. Multiple printers point to the same print device, which allows users to send critical documents to a high-priority printer and noncritical documents to a lower-priority printer. The critical documents always print first. Consider the following two methods to set priorities between printers:
Point two or more printers to the same print device-that is, the same port. The port can be either a physical port on the print server or a port that points to a network-interface print device.
Set a different priority for each printer that is connected to the print device, and then have different groups of users print to different printers, or have users send different types of documents to different printers.
You want to optimize the page file settings. Under which conditions must you restart your computer for any change to take effect?
Decrease the size of the minimum page file setting
Decrease the size of the maximum page file setting
Created a new page file on another drive
What is the name of the source file that contains all the XP drivers
The file is installed into the following hidden folder:
%SystemRoot%\Driver Cache\platform\
This folder location can be found in the following registry key:
You ping yourself and receive output Replied
What can be concluded ?
You have an IP stack properly installed It does require the IP stack in order to run.

You have tested your dummy network interface is a loopback address. This is a dummy interface. It runs without a NIC presented.
On a Win XP desktop, what is the command Prompt's equivalent to the old MS-DOS Autoexec batch mechanism?
By default, Command Prompt executes on startup whatever it finds in the following two registry values:
The AutoRun value in HKLMSoftwareMicrosoftCommand Processor
The AutoRun value in HKCUSoftwareMicrosoftCommand Processor
You want to perform an exhaustive check of the entire disk. Which scandisk options will you use?
Scan For And Attempt Recovery Of Bad Sectors. Select this option to perform an exhaustive check of the entire disk, locate bad sectors, & recover readable information stored in defective locations. Note that selecting this option automatically repairs file system errors as well, even if the previous option is cleared. This option is the equivalent of running the Chkdsk command with the /R switch.