Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/458

Click to flip

458 Cards in this Set

  • Front
  • Back
Question
Answer
active directory
a centralized database for managing a network
what two user accounts are created during intial setup
adminstrator guest
98 to xp upgrade do it from boot or in 98?
from win 98 to upgrade and keep settings
when we create a user account what is really created?
SID Security Identifer
built in Groups
Adminstrators guest users power users
by default all users are members of the BLANK gourp
everyone
Backup Operators
can bu and restore files, log on locally and shutdown the sytem. Member cannot change security settings
Administrators
complet unrestricted access to the computer
backup operators
back up and restore files. Log on and shutdown computer.
Network configuration operators
can configure networking settings
power users
can create/modify user accounts they create, same with groups, cannot some group memberships, bu or restore files, device drivers, security logs
users
can logon/lock/shutdown computer. Cannot groups/users, cannot share.
True or false. Windows XP Professional includes support for Internet Connection Firewall.
TRUE
The minimum memory that is supported by Windows XP Professional is ________.
64MB
The minimum amount of disk space required by Windows XP Professional is ________.
1.5GB
True or false. Windows XP Professional can support up to four processors.
False. Windows XP Professional supports computers with one or two processors.
Define the system partition.
The system partition contains the MBR and the system files needed to boot the Windows XP Professional operating system. This is the active partition by default, usually the C: drive.
List the three file systems that are supported for hard drives by Windows XP Professional.
File Allocation Table(FAT16), FAT32, and New Technology File System(NTFS)
Which two options must be available on the network if you want to install Windows XP Professional into a Windows 2000 or Windows 2003 domain?
A domain controller for the domain and a DNS server
What is the purpose of product activation?
Product activation is Microsoft's way of reducing software piracy.
True or false. You use the F2 key to specify that you are using a third-party disk driver during the installation of Windows XP Professional.
False. You would use the F6 key.
Which utility is used to create disk images for Windows XP Professional automated deployment?
The System Preparation Tool, or Sysprep
What is the primary purpose of the Setup Manager utility?
To create answer files(automated installation scripts) that are used to answer the questions that appear during a normal Windows XP Professional installation
List the three network services that are required by the RIS server.
Dynamic Host Configuration Protocol(DHCP)server, Domain Name System(DNS)server, and Active Directory
Which two user rights must be configured for the RIS installation to work properly?
Join a Computer to a Domain and Log On as a Batch Job
True or false. When you assign an application through Windows Installer packages, users can install the application through Control Panel, Add/Remove Programs icon.
False. An assigned package is automatically installed when the user selects the application on the Programs menu or by document invocation(by the document extension).
List the four client upgrade paths to Windows XP Professional .
Windows 98, Windows Me, Windows NT 4 Workstation, and Windows 2000 Professional
True or false. You cannot upgrade to Windows XP Professional from any version of Windows NT Server.
TRUE
You need a ________ or higher processor to upgrade to Windows XP Professional.
233MHz
True or false. If you have a Windows 98 computer that uses third-party quota management software, there is a good chance that the software will work with Windows XP Professional.
False. Applications that use file-system filters, such as third-party antivirus software and disk-quota management software, won't work under Windows XP.
True or false. Windows 98 applications that use virtual device drivers will work with Windows XP Professional.
False. Any application or utilities that use virtual device drivers(VxDs) or 386 drivers are not supported by Windows XP Professional.
True or false. Before you upgrade to Windows XP Professional, you should perform a disk scan, a current virus scan, and disk defragmentation.
TRUE
Which Control Panel(Classic view) icon is used to allow you to install, remove, and troubleshoot your hardware?
Add or Remove Hardware
Which Control Panel(Classic view) icon is used to configure power schemes, hibernation, and ACPI(Advanced Configuration Power Interface)?
Power Options
What are the three main areas of configuration in Computer Management?
System Tools, Storage, and Services & Applications
Which utility allows you to view hardware resources, including the device's interrupt request(IRQ), I/O port address, memory address, and Direct Memory Access(DMA) settings?
Device Manager
True or false. The MMC provides a common environment for snap-ins, which are administrative tools developed by Microsoft or third-party vendors.
TRUE
List the five Registry keys that are available on all Windows XP Professional computers.
HKEY_CURRENT_USER, HKEY_USERS, HKEY_LOCAL_MACHINE, HKEY_CLASSES_ROOT, and HKEY_CURRENT_CONFIG
What is the primary purpose of Windows XP Professional driver signing?
Driver signing is a way of ensuring that drivers are properly tested before they are released to the public.
True or false. In order to set up multiple-display support, you must have a display adapter installed for each monitor, and you must use PCI or AGP display adapter cards.
TRUE
What is hibernation used for in Windows XP Professional?
With hibernation, anything that is stored in memory is also stored on your hard disk.
What is the primary purpose of Advanced Configuration Power Interface(ACPI)?
ACPI allows you to reduce the power consumption of your computer which is important for laptops that are running from battery power.
True or false. USB is an external bus standard that is used to connect USB devices through a USB port. USB supports transfer rates up to 12Mbps and can support up to 56 devices.
False. A single USB port can support up to 127 devices.
Which utility can you use to set processor affinity?
Task Manager
How can you configure your computer to show Administrative Tools and Logoff in the Start menu?
The Advanced tab of the Taskbar and Start Menu Properties dialog box(Start Menu Settings section) has options for configuring Start menu features such as Administrative Tools.
True or false. Shortcuts can exist in various locations, including on the Desktop, on the Start menu, and within folders.
TRUE
What language support is offered by localized versions of Windows XP Professional?
Localized versions include the ability to view, edit, and print documents in different languages
What Control Panel icon is used to configure multilingual editing and viewing of documents?
Regional Options through the Date, Time, Language, and Regional Options
Which version of Windows XP Professional offers support for the user interface(UI) in different languages?
Multilanguage Version Windows XP
Which icon in Control Panel is used to configure keyboard, sound, display, mouse, and general properties of Windows XP Professional for users with limited sight, hearing, or mobility?
Accessibility Options
What is the purpose of FilterKeys?
FilterKeys ignores brief or repeated keystrokes.
What is the purpose of the Accessibility Wizard?
The Accessibility Wizard configures a computer based on the user's vision, hearing, and mobility needs.
What is the purpose of the Utility Manager?
The Utility Manager allows you to start and stop accessibility utilities and determines whether these utilities are started with Windows XP or when the Utility Manager is started.
What is a service?
A service is a program, routine, or process that performs a specific function within the Windows XP operating system.
List the five built-in user accounts created on a computer that is installed with Windows XP Professional in a workgroup.
Administrator, Guest, HelpAssistant, Support_xxxxxxx, and Initial user
List the two types of users supported by Windows XP.
Local users and domain users
True or false. Users must log on to a Windows XP Professional computer before they can use that computer.
TRUE
What keyboard sequence is used to access the logon dialog box if a computer is part of a domain?
Ctrl+Alt+Delete
Which utility is used to create users on a Windows XP Professional computer?
Local Users and Groups
Which two groups have permission to create users on Windows XP Professional computers?
Administrators and Power Users
True or false. A username and a group name can be the same on a Windows XP Professional computer.
FALSE
True or false. Usernames and passwords are case-sensitive.
FALSE
What is a logon script?
Logon scripts are files that run every time a user logs on to the network. They are usually batch files, but they can be any type of executable file.
Which password policy specifies a higher level of encryption for stored user passwords?
Store Password Using Reversible Encryption for All Users in the Domain
What are account lockout policies used for?
The account lockout policies are used to specify how many invalid logon attempts should be tolerated.
Which user right allows a user to create a computer account on the domain?
Add Workstations to the Domain
Which security option automatically logs off users if they have limited logon hours and their logon time has expired?
Automatically Log Off Users when Logon Time Expires
True or false. The default groups on Windows XP Professional computers are considered local groups.
TRUE
Which default local group has permissions to back up and restore the file system, even if the file system is NTFS and the group members have not been assigned permissions to the file system?
Backup Operators
What is the primary purpose of the Guests group?
The Guests group is provided so that you can give people who are not regular users access to specific network resources.
True or false. The Power Users group can create, delete, and modify any user or group account.
False. They can modify or delete only user and group accounts they have created.
What is the primary purpose of the Replicator group?
The Replicator group is intended to support directory replication, which is a feature used by domain servers.
By default, which user is not a part of the Users local group?
Guest
What is the difference between an interactive user and a network user?
An interactive user is someone who uses the computer's resources locally. A network user is someone who accesses the computer's resources over a network connection.
True or false. Group names can be up to 256 characters.
TRUE
True or false. A renamed group keeps all of its properties, including its members and permissions.
TRUE
Which Group Policy setting forces the system to enable disk quota management on all NTFS volumes for the computer?
Enable Disk Quotas
True or false. When configuring group policies through Start menu and Taskbar policies, you can configure users' Start menu and Taskbar options.
TRUE
True or false. By default, user profiles are created locally on the computer that the user account logs on to.
TRUE
What is the default location of local user profiles?
The Documents and Settings folder
What is the definition of a roaming profile?
A roaming profile is stored on a network server and allows users to access their user profile, regardless of the client computer they have logged onto.
Which icon in the Control Panel can you use to copy a user's profile?
System, through the Performance and Maintenance option
Which utility can you use to configure a user account to use a roaming profile?
Local Users and Groups utility
True or false. Roaming profiles are read-only profiles by default.
FALSE
True or false. Mandatory profiles can be configured exclusively with Windows XP Professional computers.
FALSE
How do you create a mandatory user profile?
Rename NTUSER.DAT to NTUSER.MAN
True or false. Only roaming profiles can be used as mandatory profiles. Mandatory profiles do not work for local user profiles.
TRUE
What properties can be configured for a hardware profile?
A hardware profile can contain any hardware settings for the computer. Hardware profiles are typically used when a single computer uses different configurations.
How do you select which hardware profile your computer will use?
If more than one profile is configured, you see a selection menu during the Windows XP Professional boot process.
Which Windows XP Professional file system supports encryption?
NTFS
What is the maximum volume size for a FAT32 partition?
2TB or 32GB if created with Windows XP
What command-line syntax can you use to convert your D:drive from FAT16 to NTFS?
CONVERT D:/fs:ntfs
Which two partition types are used with basic storage on a Windows XP Professional computer?
Primary partition and extended partition
True or false. Dynamic storage is recognized by Windows XP Professional and Windows NT 4 Workstations.
False. Dynamic storage is used only with Windows 2000, Windows XP, and Windows Server 2003.
What is the maximum number of drives supported by a striped volume?
32
True or false. A striped volume is fault tolerant.
FALSE
True or false. Only NTFS files and folders can be compressed.
TRUE
True or false. You cannot have a folder or file compressed and encrypted at the same time.
TRUE
What is the purpose of disk quotas?
Disk quotas are used to specify how much disk space a user is allowed on specific NTFS volumes. You can specify disk quotas for all users, or you can limit disk space on a per-user basis.
Which command-line utility can be used to encrypt files on NTFS volumes?
CIPHER
True or false. By default, the Show Hidden Files and Folders view is selected, so that files and folders with the Hidden attribute are listed.
FALSE
What is the File Types tab of the Folder Options dialog box in Windows Explorer used to configure?
The File Types tab of the Folder Options dialog box is used to associate filename extensions with application file types.
What is the purpose of offline files and folders?
Offline files and folders allow network folders and files to be stored on Windows XP clients. Then, if the network location is not available, users can still access network files.
True or false. You can access only the offline folders that are stored on Windows XP computers.
FALSE
Where in Windows Explorer do you configure your Windows XP Professional computer to use offline files and folders?
Select Folder Options from the Tools pull-down menu.
True or false. You can search for files and folders based on the filename or folder name, the text you are looking for, or the location that you want to look in.
TRUE
List the six levels of NTFS permissions.
Full Control, Modify, Read & Execute, List, Read, and Write
Who can create shared folders?
To share a folder, you must be logged on as a member of the Administrators or Power Users group.
The ________ shared folder option specifies how folders are cached when the folder is offline.
Caching
List three types of share permissions.
Full Control, Change, and Read
______________ is the default permission on shared folders for the Everyone group.
Full Control
The ________ command-line utility can be used to map a network drive.
NET USE
At logon, a(n) ____________ is created for the logon account.
access token
When a resource is accessed, Windows XP Professional checks the ____________ to see if the user should be granted access.
discretionary access control list (DACL)
True or false. Through General Network Adapter properties, you can configure the protocols your network adapter will use.
FALSE
Which network protocol is installed on Windows XP Professional computers by default?
TCP/IP
The ________ is used to specify which part of the IP address is the network address and which part is the host address.
subnet mask
You configure the _______ IP configuration option if the network contains routers.
default gateway
Which two options are used to resolve NetBIOS computer names to IP addresses?
WINS server and LMHOSTS
Dynamic IP configuration assumes that you have a ____________ server on your network.
DHCP
The ____________ command is used to send an ICMP(Internet Control Message Protocol) echo request and echo reply to verify if the remote computer is available.
PING
How do you define a printer in Windows XP terminology?
A printer is the software interface between the physical printer(the print device) and the operating system.
In Windows XP terminology, what is the difference between a logical port and a physical port?
A physical port is a port that the print device is directly attached to. A logical port is used when the print device is attached directly to the network through a network card.
Which groups can create printers by default?
Administrators and Power Users
What is a printer pool?
Printer pools are used to associate multiple print devices with a single logical printer.
How can you redirect a print job to another printer?
To redirect print jobs, add a new port, highlight New Port, and choose New Port Type. In the Port Name dialog box, type the UNC name of the printer you want to redirect jobs to.
When would you use printer priority?
You use printer priority when you have multiple printers that are associated with a single print device and you want jobs from one printer to be serviced before jobs from another printer.
Which print option would you configure if you did not want jobs to be deleted from the print queue after they are printed?
Keep Printed Documents
True or false. Windows XP provides a default separator page that can be used by all print devices.
FALSE
What can a user with the Manage Printers print permission do?
A user or group with this permission can pause and restart the printer, change the spooler settings, share or unshare a printer, change print permissions, and manage printer properties.
True or false. You can audit print events, including the Print, Manage Printers, Manage Documents, Read Permissions, Change Permissions, and Take Ownership events.
TRUE
Which print management option can you use to restart a print job that had already started printing?
Restart
Which print permission does a user need to attach to a network printer?
Print
True or false. When you configure modem properties, you can configure the speaker volume for the modem, maximum port speed, and dial control to wait for a dial tone before dialing.
TRUE
List the two connection methods that can be used with VPNs.
Point-to-Point Tunneling Protocol(PPTP)or Layer Two Tunneling Protocol(L2TP)
What is the difference between the SLIP and PPP protocols?
PPP offers more features and is used by Windows 95/98, Windows NT, Windows 2000, Windows XP, and Windows Server 2003. SLIP offers fewer features and is used by some UNIX servers.
What is the advantage of a virtual private network(VPN)?
A VPN allows you to connect your remote computer to a private network through a public network such as the Internet.
True or false. You must specify the NetBIOS computer name of the server that you will connect to through a VPN connection when you set up the VPN client.
FALSE
True or false. With Internet Connection Sharing, multiple clients can share a single Internet connection.
TRUE
True or false. The computer that will host Internet connection sharing should use a static IP address.
TRUE
What are the two Internet services that are supported by IIS when IIS is installed on a Windows XP Professional computer?
FTP and HTTP
If you required access to a secure website, what request would you use instead of http:\\\\?
https:\\\\
Which protocol is used to support Internet printing services?
Internet Printing Protocol(IPP)
True or false. The Performance Monitor utility is used to monitor system performance in Windows XP.
False. You use System Monitor.
Which command-line utility shows the version of Windows you are using and whether or not any service packs have been applied?
WINVER
A __________ is a snapshot of how your computer is currently performing.
baseline
Which option in Performance Logs and Alerts is used to generate an event such as notification if a specific value is over or under the value you set?
Alerts
What is a trace log used for?
Trace logs are used to measure data continuously.
What value in the Memory>Available MBytes System Monitor counter indicates a memory bottleneck?
A value less than 4MB indicates a memory bottleneck.
Which System Monitor memory counter is used to track the number of times the requested information was not in memory and needed to be retrieved from disk?
Memory>Pages/Sec
The ________ utility shows all of the applications and processes that are currently running on the computer.
Task Manager
Which icon in Control Panel is used to configure application performance based on whether the application is being processed in the foreground or background?
System
Which icon in Control Panel is used to schedule tasks to occur at specified intervals?
Scheduled Tasks
Which Windows XP utility is used to track all of the information about your computer's software and hardware?
Event Viewer
List the five types of events that are tracked through Event Viewer.
Information, Warning, Error, Success Audit, and Failure Audit
What is the BOOT.INI file used for?
The BOOT.INI file is used to build the operating system menu choices that are displayed during the boot process. It is also used to specify the location of the boot partition.
What is the purpose of the BOOTSECT.DOS file?
The BOOTSECT.DOS is an optional Windows XP boot file that is used to load an alternate operating system if the computer is configured for dual-booting or multi-booting.
How can you create a Windows XP boot disk?
Format the floppy disk through the Windows XP operating system, and then copy the NTLDR, NTDETECT.COM, NTBOTTDD.SYS(optional), and BOOT.INI files to the floppy disk.
How do you access Windows XP Professional advanced startup options?
Press F8 when prompted during the Windows XP boot sequence to bring up the Advanced Options menu.
True or false. When you boot a Windows XP Professional computer in Safe Mode, the Windows XP configuration is simplified as much as possible.
TRUE
What information can be backed up and restored using Automated System Recovery(ASR)?
Msconfig.exe
Which utility ships with Windows XP and provides backup services?
The system information that is backed up by ASR includes System State data, system services, and disk configuration information.
What is Recovery Console used for?
Backup
Name some of the features of Automatic Update
The Recovery Console allows limited access to the FAT16, FAT32, and NTFS volumes without starting the Windows XP Professional graphical interface.
What is new in Windows XP with regards to CD creation?
Only one administrative user at a time can run the AU client
How is ClearType specified?
ClearType triples the horizontal resolution available for rendering text for clearer text display on LCD monitors
Is it possible to save a file to a compressed folder?
In Display Properties click the Apperance tab. Under Effects choose ClearType under Use The Following Method To Smooth Edges Of Screen Fonts
What is new with the Start Menu?
The Desktop Cleanup Wizard is by default run every 60 days.
What does the Windows XP Pro fax support enable users to do?
The new Start Menu lists the programs most frequently used
What is possible with the Fast User Switching feature?
The Windows XP Pro fax support enables users to send faxes over a network from a computer with a an attached fax modem or fax board or with a LAN connection
What is provided with Internet Explorer 6.0?
The Auto-Configuration for Multiple Networks feature provides easy access to network devices and the Internet. It also allows mobile computer users to seamlessly operate both office and home networks without manually reconfiguring TCP/IP settings
What does Windows Messenger in Windows XP Pro offer?
IE 6.0 provides visual refresh and enhanced support for Document Object Model (DOM) level 1 and Cascading Style Sheets (CSS) level 1. Native support for Macromedia Flash and Macromedia Shockwave Player files Automatic Image resize (if the image is not embedded within HTML pages
For what was the Internet Connection Firewall (IFC)designed?
Only a .Net passport is needed to run Windows Messenger. If the user wants real-time audio and video a microphone and a Web cam is needed
Name the 5 categories information can be viewed in My Computer Information in Help and Support Center.
My Computer Information provides an easily understood, highly accessible view of personalized software and hardware information about your computer or another computer for which you have administrative permissions.
What is shown in View General Information about This Computer?
The 5 categories are: View General System Information about This Computer View the Status of My System Hardware and Software Find Information about the Hardware Installed on This Computer View a List of Microsoft Software Installed on This Computer View Advanced System Information
What is shown in the My Computer Information - Hardware category?
The Status category allows users to examine diagnostic info about the computer, including: Obsolete applications and device drivers, System Software, Hardware, Hard disks and RAM
What is shown in the My Computer Information - Software category?
The Hardware category allows users to examine descriptive information about the computers hardware.
What is shown in the My Computer Information - Advanced category?
The Software category allows users to view a list of Microsoft products that are installed and registered by a Product Identification Number (PID). It also shows information about any software that crashed.
Name the two network environments Windows XP support?
The Remote Assistance feature allows users to remotely view and control a computer for any support task.
What is a workgroup also called?
Windows XP supports workgroups and domains.
Name some of the features of workgroups
A workgroup is also called a peer-to-peer network because all computers in the workgroup can share resources as equals (peers) without a dedicated server
Can a computer running a Server operating system be part of a workgroup?
Each computer maintains a local security database. Decentralized administration of user accounts and resource security. A user must have a user account on each computer to which he or she wants to gain access. Any changes to user accounts must be made on each computer in the workgroup.
Name some of the advantages of a workgroup.
A workgroup can contain computers running one of the Microsoft Windows NT and Windows 2000 Server products as long as the server is not configured as a domain controller.
What is a domain?
It does not require inclusion of a domain controller in the configuration. It is simple to design and implement. It is a convenient networking environment for a limited number of computers in close proximity (no more than 10 computers)
Where in a domain does the directory reside?
A domain is a logical grouping of network computers that share a central directory database
What is a domain controller?
The directory resides on computers that are configured as domain controllers.
Name some of the benefits of a domain.
A domain controller is a server that manages all security-related aspects of user and domain interactions, centralizing security and administration.
What kind of computers are included in a typical domain?
Centralized administration. A single logon process for users to gain access to network resources. Scalability, so that you can create very large networks
Name the two options for logging on locally offered by Windows XP Pro.
A typical domain includes the following types of computers: Domain controllers running a server O.S. Member servers running a server O.S. Client computers running Windows XP Pro, Windows 2000 Pro or one the the other Microsoft Windows client O.S.
What is the default logon method used by Windows XP Pro?
The two options are: The Welcome screen and The Log On To Windows dialog box
Why would anyone press CTRL+ALT+DEL in the Welcome screen?
By default, Windows XP Pro uses the Welcome screen to allow users to log on locally.
Which account is not displayed in the Welcome screen?
Pressing CTRL+ALT+DEL in the Welcome screen twice enables the user to log on with the Log On To Windows dialog box.
To what can a user log on locally?
The Administrator account is not displayed in the Welcome screen when other user accounts have been created.
What is included in the User Accounts program in Control Panel?
A user can log on locally to either a computer that is a member of a workgroup or a computer that is a member of a domain but is not a domain controller.
Who authenticates a user logging on?
The User Accounts program in Control Panel includes a Change The way Users Lon On Or Off task, which allows users to configure Windows XP Pro to use the Lon On To Windows dialog box instead of the Welcome screen.
Name the options in the Log On To Windows dialog box.
Windows XP Pro authenticates users who log on locally to the computer at which they are seated and one of the domain controllers in a Windows 2000 domain authenticates users who log on to a domain
Which option in the Log On To Windows dialog box is not shown if the computer is not part of a domain?
The options are: User name, Password, Log On To, Log On Using Dial-Up Connection, Shutdown, Options.
Name the authentication process.
If the computer is not part of a domain, the user will not get the Log On To option
What is an access token?
The user logs on by providing logon info. Windows XP Pro compares the logon info with the user info in the local security database. Of the info matches and the user account is valid, Windows XP Pro crates an access token for the user.
What happens if a user logs on to a domain?
An access token is the user's identification for the local computer. It contains the user's security settings, which allow the user to gain access to the appropriate resources on that computer and to perform specific system tasks.
How is the Windows Security dialog box accessed?
If a user logs on to a domain, Windows XP Pro contacts an available domain controller in the domain. The domain controller compares the logon info with the user info that is in the directory for the domain
Name the options in the Windows Security dialog box.
The Windows Security dialog box is accessed by pressing CTRL+ALT+DEL if the computer is joined to a domain or the Welcome screen is disabled. Otherwise the Task Manager will be activated.
Name the preinstallation tasks.
The options are: Lock Computer, Log Off, Shut Down, Change Password, Task Manager, Cancel.
What are the minimum hardware requirements for installing Windows XP Pro?
The preinstallation tasks are: Ensure that the hardware meets the requirements, Determine whether the hardware is on the HCL, Decide partitioning, Choose the file system, Complete a preinstallation checklist
Where can the Hardware Compatible list be found?
The minimum hardware requirements are: Pentium 233MHz CPU, 64MB RAM (128 MB recommended) 1.5GB on a 2GB harddisk, VGA monitor, NIC and related cable for networking 12X CD-ROM for CD-installation Keyboard and mouse
Which partitions should be made during installation?
The HCL can be found on the Web site http://www.microsoft.com/hcl which will redirect to http://www.microsoft.com/whdc/hcl/default.mspx
When should the NTFS file system be used?
Although Setup can create other partitions, only the partition on which Windows XP Pro will be installed should be created.
When should FAT or FAT32 be used on the system partition?
Use NTFS when the partition on which Windows XP Pro will reside requires any of the following features: File- and Folder-level security, Disk compression, Disk quotas, Encryption
Name the command to convert a FAT or FAT32 drive to NTFS.
FAT or FAT32 should be used on the system partition when dual boot with a O.S that requires FAT or FAT32 is required.
What is required when joining a domain?
In a command prompt type: convert volume /FS:NTFS where volume is the drive letter eg. D:
What is required when joining a workgroup?
Joining a domain requires: A domain name, A computer account (can be created during setup) An available domain controller and a DNS server
Name the 4 stages of installing Windows XP Pro from a CD-ROM.
Joining a workgroup requires: A new or existing workgroup name
Name the 6 steps involved in running the Setup program.
The 4 stages are: Running the Setup program, Running the Setup Wizard, Installing Windows XP Pro networking components, Completing the installation
When is the License Agreement shown for acceptance?
The 6 steps are: Load Setup program into memory, Start text-based Setup program, Create the Windows XP Pro partition, Format the Windows XP Pro partition, Copy setup files to the hard disk, Restart the computer.
What information does the Setup Wizard gather?
After the Setup program has restarted the computer and starts the text-mode portion of Setup, the license agreement is shown for acceptance.
How long can a computer name be?
The Setup Wizard gathers the following information: Regional Settings, Name and organization, Computer name, Password for the Administrator account, Time and date
Name the 4 steps in installing Windows XP Pro networking components.
The computer name can be up to 15 characters. If TCP/IP is installed the computer name can be up to 63 characters.
What are the typical networking components when installing Windows XP Pro?
The 4 steps are: Detect network adapter cards, Select networking components, Join a workgroup or domain Install components.
Name the final 5 steps in completing the installation.
The typical networking components are: Client For Microsoft Networks, File And Printer Sharing For Microsoft Networks, QoS Packet Scheduler, Internet Protocol (TCP/IP).
Where are the installations files located in a network installation of Windows XP Pro?
The 5 steps are: Copy files, Configure the computer, Save the configuration, Remove temporary files, Restart the computer.
What are the requirements for a network installation of Windows XP Pro?
In a network installation the installation files are located in a shared location on a network file server, which is called a distribution server
Name the 4 steps in a network installation of Windows XP Pro.
The requirements are: A Distribution server, A FAT partition on the target computer, A Network client
When is WINNT.EXE used and when is WINNT32.EXE used in a network installation of Windows XP Pro?
The 4 steps are: Boot the network client, Connect to the distribution server, Run WINNT.EXE or WINNT32.EXE, Install Windows XP Pro.
Name some of the switches used with WINNT.EXE.
Use WINNT.EXE for an installation using MS-DOS or Windows 3.0 or later versions on the source system. Use WINNT32.EXE for an installation using Windows 95, Windows 98, Windows ME, Windows NT4 or Windows 2000 Pro.
Name some of the switches used with WINNT32.EXE.
/a /r[:folder] /rx[:folder] /s[:sourcepath] /t[:tempdrive] /u[:script_file] /udf:id[,UDF_file]
What does a local user account allow a user to do?
The three types of user accounts are: Local user accounts, Domain user accounts, Built-in user accounts
What does a domain user account allow a user to do?
A local user account allows the user to log on to a specific computer to access resources on that computer.
What does a built-in user account allow a user to do?
A domain user account allows a user to log on to the domain to access network resources
Where does Microsoft recommend to use local user accounts?
A built-in user account allows a user to perform administrative tasks or access local or network resources
What does a domain controller do to a newly created domain user account?
Microsoft recommends that local user accounts only should be used in workgroups.
Name the two commonly used built-in user accounts.
The domain controller replicates the new user account information to all domain controllers in the domain.
For what should the built-in Administrator account be used?
The two commonly used built-in accounts are Administrator and Guest
What is possible to do with the built-in Administrator account?
Use the built-in Administrator account to manage the overall computer.
When should the built-in Guest account be used?
The built-in Administrator account cannot be deleted, but it can be renamed and disabled.
What is possible with the built-in Guest account?
Use the built-in Guest account to allow occasional users to log on and access resources.
How many characters can a user name consist of?
The built-in Guest account cannot be deleted, but it can be renamed or disabled.
Are user names case sensitive?
The user name can be up to 20 characters long.
Which characters are not allowed in a user name?
User names are not case sensitive, but Windows XP Pro preserves the case for display purposes
How many characters can a password consist of?
The characters are: / \\ [ ] : ; | = , + * ? < >
Name the two ways to create, modify and delete user accounts in Windows XP Pro.
A password can consist of up to 128 characters, but it can also be 0 characters.
Which tasks are available after selecting Pick A Task in User Accounts tool in Control Panel?
The two ways are: The user Accounts tool in the Control Panel and The Computer Management snap-in.
Which tasks are available under Change An Account in the User Accounts tool in Control Panel (only available for Administrators)?
The tasks are: Change an account, Create a new user account, Change the way users log on or log off.
What happens when clicking Keep Files after deleting a local user account?
The tasks are: Change the name, Create a password/Change the password, Remove the password, Change the picture, Change the account type, Setup My account to use a .NET Passport, Delete the account.
Who can create new user accounts?
The users desktop and My Documents are saved on the administrators desktop in a folder called Local_User_Name.
What is possible to do with a users own local user account when the user has a limited account type?
Only administrators can create new user accounts.
Who can change the way users log on or log off?
The user can change his or hers own picture and create, change or remove the users password.
Name the three tabs a users account properties are grouped under.
The User Cannot Change Password option and the Password Never Expires option are no longer available.
What is a user profile?
The three tabs are: General, Member Of, Profile.
When is a user profile created?
A user profile is a collection of folders and data that stores the users current desktop environment, application settings and personal data. It also contains all the network connections that are established when the user logs on to a computer.
What is a logon script?
Windows XP Pro creates a user profile the first time the user logs on to a computer and stores the profile on that computer.
What are the advantages in storing all home folders on a file server?
A logon script is a file that can be assigned to a user account to configure the user's working environment.
What happens when naming a folder on an NTFS volume with the %username% variable?
The advantages are: Users can access their home folders from any client computer on the network. Backup and administration can be centralized to one of the network backup operators.
What is a group?
The NTFS Full Control permission is assigned to the user and all other permissions are removed, including those for the Administrator account.
Why are groups used?
A group is a collection of user accounts.
What are permissions?
Groups simplify administration by allowing an administrator to assign permissions and rights to a group of users rather that to each user account individually.
What are rights?
Permissions control what users can do with a resource such as a folder, file or printer
When are local groups used?
Rights allow users to perform system tasks, such as changing the time on a computer and backing up or restoring files.
What are the membership rules for local groups?
Use local groups to assign permissions to resources residing on the computer on which the local group is created.
How is a local group created?
Local groups can contain local user accounts from the computer on which the local groups are created. Local groups cannot belong to any other group.
When should the Member Of tab in the users Properties dialog box be used?
In Computer Management, expand Local Users And Groups. Right-click Groups and then click New Group.
What happens to the user accounts, that are members of a group, when the group is deleted?
The Member Of tab should be used when quickly adding the user account to multiple groups.
Which computers have built-in local groups?
Deleting the group does not delete the user accounts that are members of the group.
What are the built-in local groups for?
All stand-alone servers, member servers and computers running Windows XP Pro have built-in local groups.
Where does Windows XP Pro place the built-in groups?
The built-in local groups give rights to perform system tasks on a single computer.
Name the built-in local groups in Windows XP Pro.
Windows XP Pro places the built-in groups in the Groups folder in Computer Management.
Where does built-in system groups exist?
The built-in local groups are: Administrators, Backup Operators, Guests, Power Users, Replicator, Users
Which user accounts are members of the built-in system groups?
Built-in system groups exist on any computer running one of the Microsoft Windows 2000 or Windows XP operating systems.
Name the built-in System Groups.
System groups do not have specific memberships that can be modified, but they can represent different users at different times, depending on how a user gains access to a computer or a resource.
Which users are no longer members of the Everyone group?
The built-in system groups are: Everyone, Authenticated users, Creator Owner, Network, Interactive, Anonymous Logon, Dialup.
Name the 4 layers of the TCP/IP networking model.
The users that Windows XP Pro cannot authenticate are members of the Anonymous Logon group and no longer member of the Everyone group.
Name the 4 Internet layer protocols.
The 4 layers are: Network Interface, Internet, Transport, Application.
Name the 2 transport layer protocols.
The 4 protocols are: IP, ARP, ICMP, IGMP.
Name some of the standard TCP/IP tools and services from the Application layer.
The 2 protocols are: TCP, UDP
Name the two interfaces for network applications to use the services of the TCP/IP protocol stack.
Some tools and services are: FTP, Telnet, SNMP, DNS.
What does TCP/IP enable a host to use?
The two interfaces are: Winsock and NetBIOS over TCP/IP (NetBT)
What does an IP address consist of?
TCP/IP enables a host to use a static IP address or to obtain an IP address automatically from a DHCP server. It also supports automatic assignment of IP addresses on networks without a DHCP server
What are IP addresses?
An IP address consists of a network ID and a host ID.
What address classes does Microsoft TCP/IP support?
IP addresses are logical 32-bit numbers that are broken down into four 8-bit fields known as octets.
What are the range of class A, B and C TCP/IP addresses?
Microsoft TCP/IP supports class A, B and C addresses
What are the standard subnet masks for class A, B and C TCP/IP addresses?
Class A: 1.0.0.0 to 126.0.0.0 Class B: 128.0.0.0 to 191.255.0.0 Class C: 192.0.0.0 to 223.255.255.0
How is a static IP address assigned to a network adapter?
Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0
What happens if duplicate IP addresses exist on a network?
In the network adapters properties dialog box, select properties for TCP/IP. Assign at least an IP address and a subnet mask.
How is a DHCP client configured?
IP communications can fail if duplicate IP addresses exist on a network.
What is Automatic Private IP Addressing (APIPA)?
In the network adapters Properties dialog box, select Obtain An IP Address Automatically.
What is the range of APIPA addresses?
This addressing mechanism is an extension of dynamic IP address assignment for LAN adapters, enabling configuration of I addresses without using static IP address assignment or installing the DHCP Service
How long is an APIPA address in function?
The range is from 169.254.0.0 to 169.254.255.255
What is the time interval an APIPA configured network adapter tries to locate a DHCP server?
The computer continues to use the APIPA address until it detects and receives configuration information from a DHCP server.
How is APIPA disabled?
An APIPA configured network adapter tries every 5 minutes to locate a DHCP server.
Name some of the tools used to trobleshoot TCP/IP.
APIPA can be disabled by specifying an alternate IP configuration in the network adapters IP Properties.
Name some of the tools used to troubleshoot TCP/IP connectivity.
The tools are: Ping, Arp, Ipconfig, Nbtstat, Netstat, Route, Hostname, Tracert
For what is Ipconfig used?
The tools are: FTP, TFTP, Telnet, RCP, RSH, REXEC, Finger
What does Ipconfig reply if a host has a duplicate IP address?
Ipconfig is used to verify the TCP/IP configuration parameters on a host.
How is it verified that TCP/IP is correctly installed and bound to a network adapter card?
Ipconfig will show the IP address but the subnet mask will be displayed as 0.0.0.0
What is the name of Microsoft's implementation of Novell's IPX/SPX protocol.
Use ping 127.0.0.1 (the loopback address) to verify that TCP/IP is correctly installed and bound to a network adapter card.
How is NetWare client access to file and print resources on a computer running Windows 2000 Server provided?
The networking API's supported by NWLink are: Winsock and NetBIOS over IPX
What must be done to ensure proper communication between a Windows XP Pro computer and a NetWare server?
A internal network number must be specified manually when the plan is to run FPNW or IPX routing
What are the standard frame type for NetWare on Ethernet networks?
The frame types are: 802.2 and SNAP
What happens if Windows XP Pro detects additional frame types to 802.2 during NWLink installation?
The standard frame type for NetWare 2.2 and NetWare 3.1 is 802.3. For Netware 3.12 and later the default is 802.2
How is the frame type, network number and internal network number displayed on a Windows XP Pro computer with NWLink installed?
If Windows XP Pro detects additional frame types to 802.2 during NWLink installation the frame type for NWLink defaults to 802.2
How is a network number manually specified for NWLink?
Type ipxroute config at a command prompt to display the frame type, network number and internal network number
In which situations must a unique, nonzero internal network number be assigned for NWLink?
To manually specify a network number for NWLink, use the Registry Editor.
Name the troubleshooting tools for NetWare connectivity.
A unique, nonzero internal network number must be assigned when: FPNW is installed and there are multiple frame types on a single adapter, FPNW is installed and NWLink is bound to multiple adapters in the computer, An application is using NetWare SAP, like SQL Server and SNA server
What must be done for a Windows XP Pro client to access a NetWare server?
The tools are: Ipxroute config, Ipxroute ripout, Network Monitor
What is binding with regards to networking?
For a Windows XP Pro client to access a NetWare server, NWLink and Client Services for NetWare must be installed and Client Services for NetWare must be running. The frame type should be configured to Auto Detect. The network number must be configured to match the NetWare server.
Who can select which protocols are bound to the network adapter card?
Binding is the process of linking network components on different levels to enables communication among network adapter card drivers, protocols, and services.
What happens when adding network software?
It is possible to select which protocols are bound to the network adapter cards if the user is a member of the Administrators group.
Where are bindings configured?
When adding network software, Windows XP Pro automatically binds all dependent components accordingly.
What is DNS?
In Network Connections click Advanced and select Advanced Settings
What are the benefits of DNS?
DNS (Domain Name System) is a naming system based on a distributed database used in TCP/IP networks to translate computer names to IP addresses.
What is the Domain Namespace?
DNS names are user-friendly, DNS names remain more constant that IP addresses. DNS allows users to connect to local servers using the same naming convention as the Internet.
What does DNS use to resolve a name to an IP address?
The Domain Namespace is he naming scheme that provides the hierarchical structure for the DNS database
How is a host name configured on a Windows XP Pro client?
DNS uses a host's Fully Qualified Domain Name (FQDN) to resolve a name to An IP address.
How long can domain names be?
By default, TCP/IP setup uses the computer name for the host name, replacing illegal characters with hyphen (-).
What is the maximum length for a FQDN?
Domain names can be up to 63 characters long, including periods.
What are the supported DNS characters for Windows 2000?
The maximum length for a FQDN is 255 characters.
What are DNS zones?
Windows 2000 supports A-Z, a-z, 0-9 and hyphen (-)
Where are the name-to-IP address mappings stored for a zone?
Zones provide a way to partition the domain namespace into manageable sections.
What kind of computer stores the zone database file?
The name-to-IP address mappings for a zone are stored in the zone database file.
What is name resolution?
A DNS server stores the zone database file.
What are forward lookup queries and what are reverse lookup queries?
Name resolution is the process of resolving names to IP addresses
What are the two options for configuring DNS server addresses on a Windows XP Pro client?
Forward lookup queries resolve a name to an IP address, and a reverse lookup query resolves an IP address to a name.
What happens if the user specifies a DNS suffix?
The two options are: Obtain DNS Server Address Automatically, Use The Following DNS Server Addresses.
How is a DNS suffix specified?
If the user specifies a DNS suffix, it is used instead of one assigned by a DHCP server
What are the limitations when domains are listed in Append These DNS Suffixes (In Order) in Advanced TCP/IP Settings?
A DNS suffix is specified in the DNS Suffix For This Connection text box in the Advanced TCP/IP settings dialog box.
What happens when selecting the Register This Connection's Addresses In DNS check box?
Queries for unqualified names are limited to the domains that are listed in Append These DNS Suffixes (In Order) in Advanced TCP/IP Settings
What is included in Active Directory?
Selecting the Register This Connection's Addresses In DNS check box causes the computer to attempt to dynamically register the IP addresses (through DNS) of this computer with its full computer name
What are objects?
Active Directory includes the directory of data store, which is a structured database that stores information about network resources, as well as all the services that make the information available and useful.
How is administration simplified with domain controllers?
The resources stores in the directory, such as user data, printers, servers, databases, groups, computers and security policies, are known as objects.
How does Active Directory simplify administration?
To simplify administration, all domain controllers are peers.
Name some of the open standards that Active Directory supports.
Active Directory simplifies administration by providing a single point of administration for all objects on the network
What kind of DNS does Windows 2000 use?
Active Directory uses DNS for its name system and can exchange information with any application or directory that uses LDAP (also version 2 and 3) or HTTP
What does DDNS eliminate?
Windows 2000 uses Dynamic DNS (DDNS)
Name the standard name formats supported by Active Directory.
DDNS eliminates the need for other Internet naming services, such as WINS, in a homogeneous environment.
What is an OU?
The standards are: RFC 822: name@domain, HTTP URL: HTTP://domain/path-to-page UNC: \\\\server\\share\\document-name LDAP URL: LDAP://server/CN=name,OU=users,DC=devel
How many objects can a domain directory contain?
An OU is a container used to organize objects within a domain into logical administrative groups
What are sites?
Theoretically, a domain directory can contain up to 10 million objects, but 1 million objects per domain is a more practical amount
How does a site manage replication?
A site is a combination of one or more IP subnets connected by a highly reliable, fast link to localize as much network traffic as possible
What does the Active Directory Schema define?
Within a site, Active Directory automatically generates a ring topology for replication among domain controllers in the same domain.
Name the two types of definition objects the schema contains.
The Active Directory schema defines objects that can be stored in Active Directory.
What happens with regards to schema when installing AD on the first DC?
The two types are: schema class objects and schema attribute objects
Can the schema be extended?
Installing AD on the first DC in a network creates a default schema that contains a set of basic schema class attributes.
What does Global Catalog contain?
The schema can be extended by using the Schema Manager snap-in or the Active Directory Services Interface.
In which server does Global Catalog reside?
Global Catalog is the catalog service provided by AD. Global Catalog contains selected information about every object in all domains in the directory
How is it defined what attributes are included in the Global Catalog replication?
By default, a Global Catalog is created automatically on the first domain controller in the first domain in the forest.
Can additional Global Catalog servers be designated?
Using the Schema Manager snap-in, an administrator can define what attributes in included in the Global Catalog replication.
Where should a Global Catalog server be in the enterprise?
To designate additional DC's as Global Catalog servers, use the Active Directory Sites and Services Management snap-in.
What is a Distinguished name (DN)?
Every major site in the enterprise should have a Global Catalog server.
What is a Relative Distinguished name (RDN)?
Every object in AD has a DN, which uniquely identifies an object and contains sufficient information to retrieve the object from the directory. DNs must by unique, because AD does not allow duplicate DNs
May RDNs be duplicated?
A RDN of an object is the part of the name that is an attribute of the object itself.
What is a Globally Unique Identifier(GUID)?
Is it possible to have duplicate RDNs for AD objects, but it is not possible to have two objects with the same RDN in the same OU.
When are GUIDs assigned to objects?
A GUID is a 128-bit number that is guaranteed to be unique.
Name the terms used for printing by Windows XP Pro.
GUIDs are assigned to objects when they are created.
What kind of printers does Windows XP Pro support?
The terms are: Printer: The hardware device Printer port: The software interface Print Server: The computer that manages printers Printer driver: set of files to convert print commands into a printer language
What kind of printer ports does Windows XP Pro support?
Windows XP Pro supports: Local printers and Network interface printers
What are the limitations on Windows XP Pro used as a print server?
Windows XP Pro supports: LPT, COM, USB, IEEE1394, and network attached devices such as HP JetDirect and Intel NetPort.
What happens if a print server does not have sufficient RAM?
The limitations are: Up to 10 concurrent connections can be made. Macintosh and NetWare are not supported
What happens if a print server does not have sufficient hard disk space?
If a print server has insufficient RAM, printing performance deteriorates.
What is the limit of local printers that can be connected to a print server through physical ports?
If a print server has insufficient hard disk space to hold all documents, users get error messages and are unable to print
How is a network interface printer added to a Windows XP Pro computer?
The number of local printers that can be connected to a print server through physical ports depends on the hardware configuration.
How is additional port information provided to a TCP/IP printer port?
To add a network interface printer, select Local Printer Attached To This Computer on the Local Or Network Printer page of the Add Printer Wizard
What must be entered in the Printer Name Or IP Address text box in the Add Printer Wizard when adding a network interface printer?
For TCP/IP, additional port information must be provided in the Add Standard TCP/IP Printer Port Wizard
For what is the LPR port designed?
Either the DNS name or the IP address of the printer must be entered.
What must be installed to be able to add an LPR port?
The LPR port is designed for computers that need to communicate with UNIX or VAX host computers
For which operating systems does Windows XP Pro automatically download a printer driver to a client?
To add an LPR port, Print Services for UNIX must be installed first
What must be provided for Windows XP to automatically download a printer driver to a client?
Windows XP Pro automatically downloads a printer drivers to clients running: Windows XP Pro and Home, Windows 2000, Windows NT, Windows ME, Windows 98, Windows 95
How is a connection to a print server made on a Windows XP Pro client?
The correct printer driver for the operating system must be installed on the print server.
What happens when a printer is taken offline?
In the Add Printer Wizard, select A Network Printer Or A Printer Attached To Another Computer
Which operating systems can use a Web browser to connect to a shared printer?
Taking a printer offline causes documents that are send to this printer to be held on the computer while the printer is not available.
What methods are available for connection to a network printer in the Add Printer Wizard on clients running Windows XP and Windows 2000?
Clients running Windows XP Pro, Windows XP Home and Windows 2000 can use a Web browser to connect to a shared printer
Which methods are available to connect to a network printer on clients running Windows NT, Windows ME, Windows 98 and Windows 95?
The methods are: Using the UNC name, Browsing the network, Using the URL name, Searching Active Directory
How is a connection made to a printer with the Run command on the Start Menu?
Client computers running Windows NT, Windows ME, Windows 98 and Windows 95 can only use the UNC name or browsing Network Neighborhood to locate a printer.
Which command can be used on any Windows based client to connect to a printer?
Type the UNC name of the printer on the Open text box and click OK to connect to a printer.
On which operating systems is the Net Use command the only way to connect to a network printer?
The command Net Use can be used on any Windows based client to connect to a printer
Name the two ways to connect to a network printer using a Web browser.
The Net Use command is the only method available for making a connection to a network printer from clients running MS-DOS or OS/2 with Microsoft LAN Manager client software installed
What must be installed to use Internet printing?
The two ways are: If the printers name is unknown, type http://Server_Name/printers If the printers name is known, type http://Server_Name/Printer_Name
What is a printer pool?
To use Internet printing, IIS must be installed on the print server
What kind of printers can be used to printer pools?
A printer pool is two or more identical printers that are connected to one print server and act as a single printer
Can the printers in a printer pool be different from each other?
The printers can be local or network interface printers
How is a printer pool created?
Although the printers should be identical, other printers can be used if they use the same printer driver
What are the advantages of a printer pool?
To create a printer pool, use the Ports tab of the Properties dialog box for a printer that should be part of the pool
What is possible by setting priorities among printers?
The advantages are: In a network with a high volume of printing, it decreases the time that documents wait on the print server. It simplifies administration because multiple printers can be administered simultaneously
Who has by default the Manage Printers permission?
Setting priorities among printers makes it possible to set priorities among groups of documents that all print on the same physical printer
Name the three levels of printer permissions in Windows XP Pro.
By default, members of the Administrators and Power Users groups have the Manage Printers permission for all printers
What is possible with the Print permission for a printer?
The three levels are: Print, Manage documents, Manage printers
What is possible with the Manage Documents permission for a printer?
With the Print permission it is possible to: Print documents, Pause, resume, restart and cancel the users own document, Connect to a printer
What happens of both allow and deny permissions exist for a printer?
With the Manage Documents permission it is possible to all from the Print permission and: Pause, resume, restart and cancel all documents, Control job settings for all documents
Who has by default the Print permission for all printers?
Deny permissions always override allowed permissions
Where are printer permissions set?
By default, Windows XP Pro assigns the Print permission for each printer to the built-in Everyone group
If a user does not have the Security tab under a printers Properties, how is that resolved?
To assign printer permissions, right-click the appropriate printer icon, select Properties and click the Security tab
What functions does a separator page have?
By clearing the Use Simple File Sharing check box in Folder Options, the Security tab becomes available.
Where are the included separator pages placed?
Separator pages have two functions: To identify and separate printed documents, To switch printers between print modes
Name the four separator pages included in Windows XP Pro.
Windows XP includes four separator pages, that are placed in the %systemroot%\\System32 folder.
Where is a separator page selected for a printer?
The four separator pages are: sysprint.sep, pcl.sep pscript.sep, sysprtj.sep
How is a printer taken offline?
In the Advanced tab in the printer's Properties dialog box a separator page can be defined
What are the rules with redirecting print jobs?
To take a printer offline, open the printer windows and on the Printer menu, click Use Printer Offline
Who is by default the owner of a printer?
It is possible to redirect all print jobs from one printer to another as long as both printers use the same driver. It is not possible to redirect specific documents
What is possible when a user has taken ownership of a printer?
By default, the user who installed the printer is the owner
Who can take ownership of a printer?
Taking ownership of a printer enables the user to change administrative responsibility for it
Who can by default pause, resume, restart and cancel a users documents on a printer?
A user or a member of a group who has the Manage Printer permission for the printer, members of the Administrators and Power Users group can take ownership of a printer
What permission is required for setting notification, priority and printing time?
Because the creator of a document by default has the Manage Documents permission, users can perform these actions on their own documents
Where is the notification, priority and printing time set for a document?
For these actions the Manage Documents permission is required
From which computers can a user manage printers from a Web browser?
The notification, priority and printing time is set in the General tab of the Properties dialog box for a document
What must be installed on a print server running Windows XP Pro or Windows 2000 Server to enable a user to manage printers on the print server from a Web browser?
Windows XP Pro enables a user to manage printers from any computer running a Web browser
What is visible from a printers URL page?
To access a printer using a Web browser, a print server running Windows XP Pro or Windows 2000 Server must have Microsoft IIS installed
For what are NTFS permissions used?
From a printers URL page the user can view information about the printer, such as its model, its location, and the number of documents waiting to print
On which volumes are NTFS permissions available?
NTFS permissions are used to specify which users and groups can access files and folders and what they can do with the contents of the files or folders
In which situations are NTFS permissions effective?
NTFS permissions are only available on volumes formatted with NTFS file system
Name the standard NTFS folder permissions.
NTFS security is effective whether a user accesses the file or folder at the local computer or over the network
When are folder permissions assigned?
The standard NTFS folder permissions are: Read, Write, List Folder Contents, Read & Execute, Modify, Full Control
When are file permissions assigned?
Folder permissions are assigned to control the access that users have to folders and the the files and subfolders that are contained within the folders
Name the standard NTFS file permissions.
File permissions are assigned to control the access that users have to individual files
What are a user's effective permissions?
The standard NTFS file permissions are: Read, Write, Read & Execute, Modify, Full Control
When both NTFS folder permissions and NTFS file permissions are assigned, what takes priority?
A user's effective permissions for a resource are the sum of the NTFS permissions that are assigned to the individual user account and to all of the groups which the user belongs
Is it possible to access a file even if the user has no access to the folder where the file is placed?
When both NTFS folder permissions and NTFS file permissions are assigned, NTFS file permissions take priority
Who has by default the Bypass Traverse Checking user right?
If the user has the Bypass Traverse Checking user right, it is possible to access a file even if the user has no access to the folder where the file is placed
What happens by default with NTFS permissions assigned to a parent folder?
Be default, the Everyone group has the Bypass Traverse Checking user right
What permissions are assigned when a volume is formatted with NTFS?
By default, permissions that are assigned to the parent folder are inherited by and propagated to the subfolders and files contained in the parent folder
Who can assign permissions to files and folders?
By default, when a volume is formatted with NTFS, the Full Control permission is assigned to the Everyone group
Where are NTFS permissions assigned?
Administrators, users with the Full Control permission and the owners of files and folders can assign permissions to user accounts and groups
How are special NTFS permissions assigned?
NTFS permissions are assigned in the Security tab of the file's or folder's Properties dialog box
Who can take ownership of a file or folder?
Special NTFS permissions are assigned by clicking the Advanced button on the Security tab in the file's or folder's Properties dialog box
Can an administrator take ownership of a file or folder the administrator hos no access to?
Users with the Full Control standard NTFS permission or the Take Ownership special NTFS permission can take ownership of a file of folder
What happens if an administrator takes ownership of a file or folder?
An administrator can take ownership of a folder or file, regardless of assigned permissions
Where can a user take ownership of a file or folder?
If an administrator takes ownership of a file or folder, the Administrators group becomes the owner and any member of the Administrators group can change the permissions and assign the Take Ownership permissions to other user accounts and groups
How is permission inheritance prevented?
To take ownership of a file or folder, click the Advanced button in the Security tab of the file's or folder's Properties dialog box. Then click the Owner tab
Name the three Preventing Permissions Inheritance options.
To prevent a subfolder or file from inheriting permissions, clear the check box labeled Inherit From Parent The Permission Entries That Apply To Child Objects in the Advanced Security Settings dialog box
What happens to NTFS permissions when a file or folder is copied?
The options are: Copy, Remove, Cancel
What permissions must be in place for a user to copy a file or a folder?
A copy is treats as a new file or folder, and will inherit the permissions from the destination folder. The user that made the copy will be the Creator Owner of the copy.
What happens to the NTFS permissions when copying or moving a folder or a file to a FAT volume?
The user must at least have the Read permission for the source folder or file and at least the Write permission for the destination folder
What happens to a folder's or a file's permissions when moving the file or folder within a single NTFS volume?
When copying or moving a folder or a file to at FAT volume, the NTFS permissions are lost
What permissions must be in place for a user to move a file or folder?
The permissions are retained when moving a file or folder within a single NTFS volume
What happens to a folder's or a file's permissions when moving the folder or file between NTFS volumes?
For a user to move a folder or file, the user must at least have the Write permission for the destination folder and at least the Modify permission for the source file or folder
For what are shared folders used?
When a folder or file is moved between NTFS volumes, the permissions are inherited from the destination folder. The user who made the move becomes the Creator Owner
What can shared folders contain?
Shared folders are used to provide network users with access to file resources
Name some of the characteristics of shared folder permissions.
A shared folder can contain applications, data, or a user's personal data, called a home folder
Name the three levels of shared folder permissions.
Shared folder permissions apply to folders, not individual files. Shared folder permissions are the only way to secure network resources on a FAT volume. The default shared folder permission is Read, and it is assigned to the Everyone group when you share the folder.
What are the effective shared folder permissions for a shared folder?
The three levels are: Read, Change, Full Control
What is needed for a user to gain access to a shared folder on an NTFS volume?
The user's effective permissions are the combination of the user and group permissions
What are a user's effective permissions for a shared folder on an NTFS volume?
When users gain access to a shared folder on an NTFS volume, they need the shared folder permission and also the appropriate NTFS permissions for each file and folder to which they gain access
What happens when a shared folder is copied, renamed or moved?
A user's effective permission for a shared folder on an NTFS volume is the more restrictive of the shared and NTFS permissions
What is the share name length?
Wen a shared folder is copied, the original folder is still shared, but the copy is not. When a shared folder is renamed or moved, it is no longer shared
Who can share a folder in a Windows 2000 domain?
The share name length is 80 characters for Windows XP and Windows 2000, 12 characters for Windows NT, Windows 98 and Windows 95, and 8.3 characters for MS-DOS and Windows 3.X
Who can share a folder in a Workgroup?
In a Windows 2000 domain the Domain Admins group can share folders residing on any machines in the domain. The Power Users group is a local group that can share folders residing only on the stand-alone server or the computer running Windows XP Pro where the group is located
What NTFS permission is needed for a user to share the folder?
In a workgroup, the Administrators and Power Users groups can share folders on the Windows 2000 stand-alone server or the computer running Windows XP Pro on which the group exists
Name the administrative shares on a Windows XP Pro computer.
If the folder to be shared resides on an NTFS volume, users must have at least the Read permission for that folder to be able to share it
What are the permissions for the administrative shares C$, D$ and so on and Admin$?
The root of each volume, the system root folder and the location of the printer drivers are hidden shared volumes, also known as administrative shares
What are the shared folder permissions for the administrative share Print$?
The administrative shares C$, D$ and so on and Admin$ all have the Full Control permissions assigned to the Administrators group
How is a hidden share created?
The administrative share Print$ has the Full Control permission assigned to the Administrators and Power Users group. The Everyone group has the Read permission
How is a folder shared?
Adding a $ sign at the end of the share name makes the share hidden
How are shared folder permissions assigned to users?
Right-click the folder to share and then click Properties. In the Sharing tab of the Properties dialog box, click Share This Folder and configure the options
What is the default cache size for caching shared folders?
In the Sharing tab of the Properties dialog box of the shared folder, click the Permissions button
Where can the cache size be set for caching shared folders?
By default, the cache size is set to 10% of the available disk space
How is a shared folder made available for caching?
The cache size can be set in the Folder Options dialog box using the Offline Files tab
Name the three options for caching?
When a folder is shared,it is possible to make it available offline by clicking Caching in the folder's Properties dialog box
For what is the Automatic Caching Of Programs And Documents recommended?
The three options are: Manual Caching Of Documents, Automatic Caching Of Documents, Automatic Caching Of Programs And Documents
How is a share with multiple share names created?
The Automatic Caching Of Programs And Documents options is recommended for folders containing read-only data or applications that are run from the network
How is a connection to a shared folder made?
To share a folder with multiple names, click New Share in the folder's Properties dialog box