Microsoft Client Configuration TESTOUT CLIENT PRO 5.0.0 Part 1 of 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Configuration of wireless settings using Windows Connect Now (located in either Computer Configuration or User Configuration under Policies\Administrative Templates\Network\Windows Connect Now) provides several configuration options.

o

Configure Active Directory, including Group Policies.

o

Configure BitLocker.

Configure ClearType text settings

o

Configure Cortana.

o

Configure Credential Guard.

o

Configure Credential Manager.

o

Configure Device Guard.

o

Configure Device Health Attestation.

o

Configure Device Manager.

o

Configure Device Registration.

o

Configure DirectAccess.

o

Configure File History.

o

Configure Group Policy Objects (GPOs) for signed packages.

o

Configure HomeGroup settings.

Configure Hyper-V

o

Configure Hyper-V.

Configure IP settings

o

Configure IPsec.

Configure Internet Explorer features and options.

o

Configure Internet Explorer.

o

Configure Internet and web browser options for security and privacy.

o

Configure Microsoft Edge.

o

Configure Microsoft Passport.

o

Configure Microsoft accounts.

o

Configure NTFS permissions.

o

Configure OneDrive usage.

o

Configure OneDrive.

o

Configure Remote Assistance, including Easy Connect.

o

Configure Remote Desktop settings.

o

Configure Remote Desktop.

o

Configure RemoteApp and Desktop Connections settings.

o

Configure Task Scheduler.

o

Configure UAC behavior.

o

Configure VPN connections and authentication.

o

Configure VPN connections.

o

Configure VPN, such as app-triggered VPN, traffic filters, and lockdown VPN.

o

Configure Wi-Fi Direct.

o

Configure Wi-Fi settings.

o

Configure Windows Defender.

o

Configure Windows Firewall with Advanced Security.

o

Configure Windows Firewall.

o

Configure Windows Hello

o

Configure Windows Hello.

o

Configure Windows Store.

o

Configure Windows To Go.

o

Configure Windows Update options.

o

Configure Windows Update policies.

o

Configure Windows features.

o

Configure Windows for additional regional and language support.

o

Configure Windows update.

o

Configure a recovery drive.

Desktop

o

Desktop app compatibility using Application Compatibility Toolkit (ACT) including shims and compatibility database.

o

Desktop application co-existence using Hyper-V, Azure RemoteApp, and App-V.

Desktop icons

Destination unreachable indicates that the computer does not know the correct route to reach the destination computer.

Technology

Details

Detect monitors when an attached monitor is not shown.

o

Determine and create appropriate installation media.

o

Determine appropriate editions according to device type.

o

Determine hardware requirements and compatibility.

15.

Determine if all of the assigned IP addresses fall within the same subnet. For example, the first possible subnet for a /26 subnet mask could have IP addresses in the .1 to .62 range:

o

Determine requirements for particular features, such as Hyper-V, Cortana, Miracast, Virtual Smart Cards, and Secure Boot.

Determine who can add trusted publishers.

-Enabled enables or disables the rule. Use a value of True to enable the rule. Use a value of False to disable the rule. A disabled rule still exists in the firewall, but it is not enforced. To enforce a disabled rule, enable it.

-Enabled specifies that either enabled or disabled rules be displayed. Use a value of True or False.

-Enabled specifies that either enabled or disabled rules be enabled or disabled. Use a value of True or False.

-FileSystem file_system specifies the file system the partition should be formatted with. You can specify NTFS, ReFS, exFAT, FAT32, or FAT.

-FileSystemLabel "label" assigns the specified label to the new volume.

-InterfaceType specifies that the rule is only applied to network connections made using a specific type of network interface. Use a value of Any, Wired, Wireless, or RemoteAccess.

-LocalAddress configures the rule to match network packets that contain a specified IP address (or addresses). Use one of the following values:

-LocalPort configures the rule to match network packets containing the specified local IP port numbers. Specify one of the following values:

-Profile specifies the network profiles to which the rule will be assigned. Specify a value of Any, Domain, Private, or Public.

-Program specifies the application whose network traffic the rule will be applied to. Identify the full path and filename of the executable.

-Protocol configures the rule to match network packets using a specified protocol. Specify one of the following:

-RemoteAddress configures the rule to match network packets that contain a specified remote computer IP address (or addresses). Use one of the following values:

-RemotePort configures the rule to match network packets containing the specified remote host IP port numbers. Specify one of the following values:

-Service configures the rule to match any traffic generated by the specified service. Use the service's short name as the value for this parameter. The short name can be identified by viewing the properties of the service in services.msc.

-Size size identifies a new size for the selected volume. Specify a value in bytes, KB, MB, GB, or TB.

-Size size specifies a custom size for the partition. Specify a value in bytes, KB, MB, GB, or TB.

-UseMaximumSize specifies that the partition use all of the unallocated space on the drive.

-a displays all connections and listening ports.

-a looks up the hostname from a given IP address.

-b displays the executable that created each connection or listening port.

-e displays Ethernet statistics. This is commonly used in conjunction with the -s option.

-l specifies the packet payload size to use in the test. With this test, you can identify whether packets above a certain size are being lost.

-n displays addresses and port numbers in numerical form.

128

64 32 16 8 4 2 1

802.1x

802.1x authentication uses usernames and passwords, certificates, or devices (e.g., smart cards) to authenticate wireless clients. Originally designed for Ethernet networks, the 802.1x standards have been adapted for use in wireless networks to provide secure authentication. 802.1x authentication requires the following components:

Any domain controller can make changes to the Active Directory database.

Any theme can be customized using the Desktop Background, Window Color, Sounds, and Screen Saver options below the Themes pane. The customized theme displays in the Themes pane as an Unsaved Theme in the My Themes section.

Anycast addresses can be used to locate the nearest server of a specific type, such as the nearest DNS or network time server.

o

Application icons

Applications and services

Applications can be pinned to the taskbar for easy access.

o

Applications listed above the horizontal line are applications that are attached, or pinned, to the Start menu. Pinning an application creates a shortcut for easy access.

o

Applications listed below the horizontal line are placed there based on frequency of use. Applications that are used the most appear in this list.

o

Applications listed on the left are sorted in several ways:

Apply restrictions to specific users or all users.

Are only enabled on NTFS-formatted volumes, including local volumes, network volumes, and removable storage.

Are primarily used at the file server level, but can be used for clients.

Are volume-level restrictions and cannot be used to apply restrictions on folders.

5.

Assign a drive letter to each volume.

assign letter drive_letter

Assigns a drive letter to the selected partition.

Set-Volume -DriveLetter drive_letter -NewFileSystemLabel "label"

Assigns a label to a volume.

GPOs are applied in the following order:

GPOs can be linked to Active Directory domains, organizational units (OUs), and containers.

2.

GPOs linked to the domain that contains the user or computer object.

3.

GPOs linked to the organizational unit(s) that contains the object (from the highest-level OU to the lowest-level OU).

Identical copies of the partition table are stored in both the first and last sectors of the storage device. If one copy gets corrupted, then the redundant copy can be used instead.

Identifies drivers that are not behaving properly, such as making illegal function calls, causing memory corruption, mishandling I/O requests or locking up the system.

Identifies drivers that are not behaving properly, such as making illegal function calls, causing memory corruption, mishandling I/O requests, or locking up the system.

Identify allowed or blocked software.

o

Identify and resolve issues related to the following:

Identify monitors to display the monitor number on the monitor screen.

IPv4 Mapped Address

If a device is not compatible with IPv6, you can use an IPv4 mapped address. This address is used to represent an IPv4-only node to an IPv6 node. The sixth octet contains FFFF, the last four octets being the IPv4 address of the device. The format is 0:0:0:0:0:FFFF:w:x:y:z.

If a dynamic disk fails or is missing, use the Reactivate Disk option in Disk Management to reactivate the missing or offline disk.

5.

If a manual address or stateful autoconfiguration is used, the host sends an NS message to make sure the address is not already in use. If stateless autoconfiguration is used, the NS message at this step is unnecessary because the interface ID was verified in step 2.

o

If a setting is configured in two GPOs, the setting in the last applied GPO will be used.

o

If a setting is defined in one GPO and undefined in another, the defined setting will be enforced (regardless of the position of the GPO in the application order).

o

If a standard user attempts to install a device whose driver is not in the driver store, Windows performs the following steps:

If a storage device will be accessed by different operating systems, be sure to select a file system that is supported by all operating systems.

If a storage space runs out of disk space, it will immediately unmount, leaving any I/O processes vulnerable to data corruption.

If all of the wireless access points in your network have the same SSID, the Windows client will automatically switch to the access point with the strongest signal strength.

o

If an RA message is not received, the host sends out an RS message addressed to all routers on the subnet using the multicast address FF02::2.

If an address has more than one consecutive location where one or more quartets are all zeros, only one location can be abbreviated. For example, FEC2:0:0:0:78CA:0:0:23AB can be abbreviated as:

o

If enabled, any files saved to your OneDrive account or to the local folder on your hard disk are automatically synchronized.

If loading a new driver causes system instability, try the following:

If multiple pictures are selected, the desktop background picture will be displayed as a slide show (the pictures change based on the time specified in the Change picture every box).

If needed, you can use the Rollback feature to revert to a previous driver version. The Rollback feature is useful in scenarios where the driver installation failed or caused the system to crash.

If network infrastructure devices (such as servers and routers) use static IP address assignments, they are not affected by a DHCP outage. As a result, workstations that switch to APIPA during the outage will not be able to communicate with these devices.

o

If no routers respond, the host will attempt to use stateful DHCPv6 to receive configuration information.

o

If the address is in use, the other network host responds with a neighbor advertisement message. Then process stops, and manual configuration of the host is required.

o

If the address is not in use (no neighbor advertisement message is received), the process continues.

If the device functions at a basic level but doesn't provide the features that it is supposed to, it is likely due to an outdated, incompatible, or corrupt driver. For example, this commonly happens when Windows detects a device and then loads a basic driver provided by Microsoft instead of the manufacturer's full-featured driver. In this situation, do one of the following (as appropriate):

o

If the device is not listed in Device Manager, try rescanning for new devices. If that doesn't work, make sure the device is plug-and-play compatible and that it is connected correctly and turned on.

If the disk is completely lost and cannot be reactivated, remove it from the system by removing all volumes and then choosing the Remove option on the disk.

If the hardware device still does not work, try replacing it with one you know to be good. Ideally, the known-good device should be of the same make and model as the suspect device. For example, if you can't get the network card working, replace it with one that you know works. If the new one works, then it is likely that the old one is malfunctioning.

If the network has been secured, you will be prompted to enter a security key or passphrase for the wireless access point.

If the system crashes before you can log on, try booting into Safe Mode. When in Safe Mode, try the following resolutions:

o

If the system is too unstable to boot into Safe Mode, boot the system into the Recovery Environment from the Windows installation media and select one of the following advanced options:

2.

If using an onboard RAID controller with SATA drives, edit the CMOS settings and identify the drive type as RAID. This tells the system to load the onboard BIOS/UEFI to access the connected drives.

If you are connected to a domain, the network map only displays your computer, the domain, and the Internet.

If you are having problems with a device, update the driver through Device Manager or manually download and install the latest driver. For example, complete the following steps to update the video adapter driver:

If you are not operating in a domain, the Network Diagnostics tool displays a network map to help you locate the source of a problem. The network map displays your computer and all other devices connected to your network, including other computers, hubs, switches, your ISP, and the Internet.

If you can boot the system and log on, try the following measures:

o

If you can log on, use Device Manager to roll back the driver.

o

If you can't log on or the system won't boot all the way, try booting into Safe Mode. Once in Safe Mode, try rolling back the driver, disabling the device, or reverting the system to a restore point that was created prior to the driver being loaded.

If you cannot boot the system into Safe Mode:

If you have a mobile device (e.g., a laptop) that connects to two networks, one with a DHCP server and one without a DHCP server.

If you need to ensure compatibility with older operating systems (e.g., the ability to boot Windows on a computer with a traditional BIOS) you'll need to use MBR partitioning instead of GPT.

o

If you recently updated the driver, roll it back to a previous version.

If you still can't start the system, try reducing the system to a minimum state by removing everything except for the CPU, one memory module, the video card, and the hard disk or optical drive for starting the operating system. Once you get the system started, add hardware devices one by one until you find the component that is causing the problem. (You can also perform the process in reverse, removing components until the system becomes stable, then adding components back.)

If you want to provide values to properly configure the computer in case the DHCP server is unavailable.

If your network does not have a DHCP server, or if you want to eliminate DHCP traffic from your network.

Ignores all inbound rules, effectively blocking all inbound connections.

o

Implement Active Directory-based activation.

o

Implement Insider Preview, Current Branch (CB), Current Branch for Business (CBB), and Long Term Servicing Branch (LTSB) scenarios.

It is easy to plug in a FireWire connector backward. This usually results in a short circuit, causing your cable to smoke, and can possibly ruin the device.

It is vulnerable to replay attacks.

o

Modify settings remotely by using the Microsoft Management Console (MMC) or Windows PowerShell.

Monitor Windows

o

Monitor a Windows operating system.

o

Monitor and manage printers.

o

Monitor performance using Performance Monitor and Data Collector Sets.

o

Monitor performance using Resource Monitor.

o

Monitor performance using Task Manager.

o

Monitor system resources.

o

More OneDrive sharing options

o

LLMNR is enabled by default. It can be disabled by adding a registry setting to each client.

o

LLMNR is used to resolve single-label hostnames with or without a DNS server. If name resolution to the DNS server fails, the client then uses LLMNR to attempt to resolve the hostname.

o

LLMNR uses multicast messages (also known as multicast DNS) to resolve local host names.

Overloading the power resources of the USB bus can cause devices to receive insufficient power. Make sure that your devices are not drawing more than 500 mA of power through the USB bus.

Program windows display the application interface for applications running on the computer.

Programs and Features

5.

Reboot the computer into the operating system and install the drivers for the RAID controller.

o

Recover files from OneDrive.

4.

Recreate the volumes.

3.

Redefine the disk as a basic disk.

shrink desired=size

Reduces the size of a volume to the specified size (in megabytes).

Registry settings that apply to the computer (the HKEY_LOCAL_MACHINE subtree)

Registry settings that apply to the current user (the HKEY_CURRENT_USER subtree)

Reliability Monitor

Reliability Monitor maintains historical data that describes the operating system's stability.

Reliability Monitor shows a historical chart that identifies when software installs, uninstalls, and failures have occurred. Click on a date to view the changes to the system that may have affected its stability.

Remember that shorter cable lengths are best. Signal attenuation can occur with overly-long cables; you should avoid cables that are longer than 3-4 feet.

Remember to install the appropriate driver before plugging in the device.

Remote Assistance

Remote Assistance allows users to view and control remote desktops.

Remote Desktop

Remote Desktop allows a remote user to log on and access the desktop of a computer, providing access to all programs and files on the computer.

Remove a computer from a docking station

2.

Remove all volumes from the dynamic disk.

Require authentication for inbound communication and request authentication for outbound communication.

Lack of centralized authentication

Lack of centralized configuration control

Lack of centrally applied security settings

Lack of scalability

Larger partition sizes.

Get-Disk

Lists all disks installed in the system. This cmdlet is used to identify the number assigned to the disk that you want to manage.

Get-Partition -DiskNumber disk_number

Lists all partitions on the specified disk.

list part

Lists all partitions on the specified disk.

list volume

Lists all volumes on all hard disks in the system.

Get-Volume -DriveLetter drive_letter

Lists all volumes on the specified disk.

Live tiles. Selecting a live tile starts an application, much like a standard tile. However, live tiles can also display dynamic content (such as news headlines or current weather information).

Load and unload device drivers

o

Log off

o

Logging is configured on a per-profile basis, meaning that you can enable logging of only dropped packets for a specific profile type, such as the public profile.

o

Logging is enabled in the Advanced Audit Policy Configuration settings of Local Security Policy.

Logical block addressing (LBA) allows the use of larger hard disks.

File name length

Long File Names

Requires a minimum of four disks.

Requires a minimum of three disks.

Requires a minimum of two disks

Requires an IPv6 router and dual layer or IPv6-only clients. Routers and hosts perform tunneling when communicating on the IPv4 network.

Requires dual layer routers as the tunnel endpoints. Hosts can be IPv6-only hosts.

Requires routers that provide dual layer support as the tunnel endpoints. Hosts can be IPv6-only hosts.

Requires that keys be manually configured on each device.

Requires two disks.

Route aggregation

Route aggregation combines blocks of addresses in a routing table as a single route, reducing the size of routing tables on the Internet and backbone operators.

Local Policies/Security Options

Security Options allow you to apply or disable rights for all users the Group Policy applies to. Examples of Security Options policies include:

Security settings are not shared between domains.

Software

Software RAID uses a driver and the system CPU for controlling RAID operations. This is the slowest form of RAID, but also the least expensive to implement.

Software that should be installed for a specific user

Software that should be installed on a specific computer

Some files, such as certain system files, cannot be moved.

4.

The RA message contains information that identifies how the IPv6 address and other information should be configured. The following table shows possible combinations:

The address is made up of 32 hexadecimal numbers, organized into 8 quartets (e.g., 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973).

o

Update the driver to latest version.

Update the driver to the latest version by downloading the latest driver from the manufacturer's website and installing it.

o

Upgrade using Windows Update.

o

Upgrade using installation media.

Account Policies

Use Account Policies to control the following:

Local Policies/Audit Policy

Use Audit Policy settings to configure auditing for events such as log on, account management, or privilege use.

o

Use Device Manager for a basic disk. Right-click the disk to be removed and select Uninstall.

Device Manager

Use Device Manager to verify that all devices have been recognized, that their drivers have been installed, and that the devices have been configured correctly.

netsh wlan

Use the netsh wlan command to configure wireless connections at the command prompt. Be aware of the following options:

o

any matches any protocol.

o

any matches any value in the port field of the IP packet.

disconnect disconnects an interface from the network if there is only one wireless interface on the computer.

disconnect interface disconnects the specified interface from the network if there is more than one wireless interface on the computer.

disconnect interface=* disconnects all wireless interfaces.

disk=disk_number specifies which disk to extend the volume to.

o

exFAT

fs=file_system specifies the file system the partition should be formatted with. You can specify FAT, FAT32, exFAT, NTFS, ReFS, or UDF.

o

icmpv4 matches all ICMP v4 packets.

o

icmpv6 matches all ICMP v6 packets.

quick performs a quick format.

o

tcp matches TCP traffic.

o

udp matches UDP traffic.

o

Choose between an upgrade and a clean installation.

o

Choose the appropriate remote management tools.

Conduct Internet searches

Characteristic

Description

Cmdlet

Description

Component

Description

Configuration Method

Description

Disk Type

Description

DiskPart Command

Description

Exception Type

Description

Feature

Description

GPO Category

Description

Gesture

Description

Issue

Description

Method

Description

Model

Description

Option

Description

PowerShell Commandlet

Description

RAID Level

Description

Rule Type

Description

Security Rule Type

Description

Service

Description

Setting

Description

Setting Category

Description

Standard

Description

Task

Description

Tool

Description

Type

Description

Utility

Description

Does not increase performance.

Does not provide fault tolerance.

Does not work through NAT.

Require authentication for all communication.

Conduct local searches for resources like applications, utilities, or files

o

Configure remote authentication.

Configure remote connections

Configure remote management

o

Configure remote management settings.

o

Configure removable devices.

o

Configure restore points.

Configure security for mobile devices

o

Configure services.

o

Configure shared folder permissions.

o

Configure shared printers.

Configure shared resources

Configure specific registry keys and values.

o

Configure startup key storage.

o

Configure startup options.

Configure storage

o

Configure sync options, including files and Sync Center.

o

Configure sync options.

Configure system and data recovery

Configure system recovery

o

Configure system restore.

o

Configure the Microsoft Intune connector site system role.

o

Configure the Microsoft Intune subscriptions.

o

Configure the connection as a metered connection.

o

Configure the wireless adapter to use a random MAC address.

o

Configure update settings.

Configure updates

o

Configure user account control (UAC) settings.

o

Configure user rights and account policies.

o

Configure wireless networks and wireless profiles.

o

Configure workgroups.

Custom (which allows individual visual effects to be selected).

o

Customize display settings.

Customize the Start menu, taskbar, or desktop environment.

Customized themes can be saved by selecting Save theme and specifying a name.

Alt + Tab

Cycles through open windows on the desktop.

Domain network (if the computer is joined to a domain)

Domain networking uses the concept of security principals, which are entities such as users, computers, and resources.

Domains are identified using DNS names.

Domains are much more efficient and scalable than workgroups due to a centralized management structure and function.

o

Download and import driver packages.

o

Enable VPN reconnect.

Volume resizing is supported only for simple and spanned volumes.

Property

FAT32 NTFS

o

FEC2:0:0:0:78CA::23AB

o

FEC2::78CA:0:0:23AB

FF02::1 is for all nodes on the local link. This is the equivalent of the IPv4 subnet broadcast address. FF01::1 is for all interfaces on a node.

FF02::1:2 is for all DHCP servers or DHCP relay agents on the local link. DHCP relay agents forward these packets to other subnets.

FF02::2 is for all routers on the local link. FF01::2 is for all routers on the node.

Is the best option for I/O-intensive applications (e.g., database, email, web servers, or any other system requiring high disk performance).

Is typically performed in conjunction with creating partitions and volumes.

Isolating operating system files from user files and vice versa.

Volumes that can span multiple partitions.

add address adds an IPv6 address to a specified interface.

Choose the display to be configured. This is applicable only if more than one monitor is connected.

Choose what closing the lid does

Choose what the power buttons do

Choose when to turn off the display

o

Memory

2.

On the Account tab, select Choose folders.

On the Airplane Mode page, you can:

1.

On the Autosave tab, select the library folders you want to sync with OneDrive.

online disk

(Optional) Brings the selected disk online if it is currently offline.

clean

(Optional) Removes all existing partitions and volumes from the selected hard disk drive.

Clear-Disk disk_number -RemoveData

(Optional) Removes all existing partitions and volumes from the specified hard disk drive.

* 0.0.0.0 and 127.0.0.0-127.255.255.255 addresses are reserved for special use or features.

-Action specifies that rules that match a particular action be enabled or disabled. Use a value of Allow or Block.

-Action specifies that rules that match a particular action being displayed. Use a value of Allow or Block.

-Action specifies which action to take for traffic that matches the rule. Use a value of Allow or Block.

-All specifies that all firewall rules be displayed.

-All specifies that all firewall rules be enabled or disabled.

-AssignDriveLetter assigns the next available drive letter to the new partition.

-Description configures a description for the firewall rule.

-Description specifies that rules matching the identified description be displayed.

-Description specifies that rules matching the identified description be enabled or disabled.

-Direction identifies which traffic direction to match with the rule. Use a value of Inbound or Outbound.

-Direction specifies that rules matching a particular direction are displayed. Use a value of Inbound or Outbound.

-Direction specifies that rules matching a particular direction be enabled or disabled. Use a value of Inbound or Outbound.

-DiskNumber disk_number specifies the disk to create the partition on.

-DisplayName (Required) specifies a name for the firewall rule.

-DisplayName specifies the display name of the rule to be displayed.

-DisplayName specifies the display name of the rule to be enabled or disabled.

-DriveLetter drive_letter specifies which partition to format.

-DriveLetter number specifies the drive letter of the volume to be resized.

-o displays the owning process ID associated with each connection.

-p [protocol] shows connections for the protocol specified, such as IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6.

-r displays the routing table.

-s displays per-protocol statistics. The output can be limited to specific protocols by using this option in conjunction with the -p option.

-t performs a continuous ping test. Press Ctrl + C to stop sending ping tests.

11.

...

18.

... (valid addresses)

3.

.00000000 = .0

8.

.00000000 = .0 (network address for the first subnet; not a valid workstation IP address)

9.

.00000001 = .1

16.

.00000001 = .1 (valid address)

10.

.00000010 = .2

17.

.00000010 = .2 (valid address)

19.

.00111101 = .61 (valid address)

12.

.00111110 = .62

20.

.00111110 = .62 (valid address)

13.

.00111111 = .63 (broadcast address; not valid for a workstation IP address)

4.

.01000000 = .64

14.

.01000000 = .64 (network address for the next possible subnet.)

5.

.10000000 = .128

6.

.11000000 = .192

/faults injects stress tests to determine if a driver is working properly in all situations.

o

/fixboot repairs the boot sector

o

/fixmbr repairs the master boot record

o

/rebuildbcd rebuilds the boot configuration data

/volatile begins the verification without rebooting.

A

0.0.0.0 to 127.255.255.255* 1-126

10000000

01000000 00100000 00010000 00001000 00000100 00000010 00000001

Port

A port rule specifies a connection based on the TCP or UDP port number that the computer is using for a given connection.

o

10.0.0.0 to 10.255.255.255

B

128.0.0.0 to 191.255.255.255 128-191

Maximum range

150 Ft. 300 Ft. 300 Ft. 1200 Ft. 150 Ft.

o

172.16.0.0 to 172.31.255.255

C

192.0.0.0 to 223.255.255.255 192-223

o

192.168.0.0 to 192.168.255.255

Maximum speed

54 Mbps 11 Mbps 54 Mbps 600 Mbps 1.3 Gbps

Partition size

2 terabytes* 256 terabytes

Volume size

2 terabytes* 256 terabytes

D

224.0.0.0 to 239.255.255.255 224-239

(non-overlapped)

23 (12) 11 (3) 11 (3) 5 GHz--23 (12 or 6)

E

240.0.0.0 to 255.255.255.255 240-255

(Binary: 00000001-01111110)

255.0.0.0 /8

(Binary: 10000000-10111111)

255.255.0.0 /16

(Binary: 11000000-11011111)

255.255.255.0 /24

Amount of files

268,435,437 4,294,967,295

A predefined group

File size

4 gigabytes 16 terabytes

Frequency

5 GHz (U-NII) 2.4 GHz (ISM) 2.4 GHz (ISM) 2.4 GHz (ISM) or 5.75 GHz (U-NII) 5 GHz (U-NII)

Predefined

A predefined rule specifies a connection based on a list of programs or services.

Multiple Input Multiple Output (MIMO)

802.11n uses multiple send and receive radios (MIMO). The use of multiple antennas both at the transmitter and receiver improves the performance of radio communication systems by creating a stronger signal and increasing speed.

A predefined theme is used when the computer is first started.

A DHCP server automates the process of assigning IP addresses to network hosts.

A DHCP server can also be configured to deliver the default gateway address, DNS server address, and other configuration information to hosts.

Domain Name System (DNS)

A DNS server is used to resolve Fully Qualified Domain Names (FQDNs) to IP addresses. When a hostname is specified for a target computer (such as a URL in a browser), the hostname must be translated to an IP address. Windows computers use the following steps to resolve a name to an IP address:

A GPO applied to a domain affects all objects within all OUs.

A GPO applied to an OU affects the objects in the OU and all sub-OUs.

A NAT router associates a port number with each private IP address. Port assignments are made dynamically by the NAT router. Responses sent from the Internet to the internal private host are sent to the public IP address of the NAT router. The NAT router translates the public IP address into the private IP address of the requesting host.

Network address translation (NAT)

A NAT router translates multiple private addresses into a single registered (public) IP address.

A OneDrive account is automatically created when you set up an online Microsoft user account.

A PKI for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate.

A RADIUS server to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells but authenticate using the same account information.

RAID 10 (stripe of mirrors)

A RAID 10 volume stripes data across mirrored pairs to provide improved performance while still providing data redundancy. If a single disk fails, its data can be recovered using the mirrored information stored on the remaining disks. RAID 10:

Primary

A primary partition is used to store both data and the operating system. Primary partitions:

RAID 5 (striping with distributed parity)

A RAID 5 volume combines disk striping across multiple disks (similar to RAID 0), but also implements parity to provide data redundancy. Parity information is stored on each disk. If a single disk fails, its data can be recovered using the parity information stored on the remaining disks. RAID 5:

A Windows domain is a collection of security principals that share a central authentication database known as Active Directory.

A bad sector is a portion of the hard disk that cannot be used. Bad sectors are marked so that they are no longer used. Any files in bad sectors are redirected to another sector.

A basic disk can have only simple volumes.

A basic disk has a limit of four partitions, only one of which can be an extended partition. An extended partition can be divided into a maximum of 26 logical drives.

Basic

A basic disk is a physical disk type that can be accessed by all operating systems. A basic disk uses MBR-like partition tables to store the partitioning information.

Dual stack

A common method for moving from IPv4 to IPv6 is referred to dual stack configuration. In this method, both the IPv4 and IPv6 protocol stacks run concurrently on a host. IPv4 is used to communicate with IPv4 hosts, and IPv6 is used to communicate with IPv6 hosts. Windows Vista and later (as well as Windows Server 2008 and later) use a dual architecture protocol stack, whereas IPv4 and IPv6 use common transport and framing layers. The dual layer architecture means you cannot uninstall either IPv4 or IPv6, although you can disable one or change the priority.

A cross-linked file occurs when two files claim the same cluster. Check Disk will identify cross-linked files and correct their cluster associations.

Custom

A custom rule specifies a connection based on specific criteria not covered in other options.

o

A default gateway address must be configured on each host in order for internetwork communication to occur. Without the default gateway, hosts will only be able to communicate with devices that are in the same subnet.

o

A device with an exclamation mark indicates Windows encountered some kind of problem with the device. In this situation, the device has usually encountered some type of error. Depending upon the nature of the error, the device may or may not function correctly.

Quotas

A disk quota limits each person's use of disk space on a volume to conserve disk space. Quotas:

On the Data Usage page, you can monitor Wi-Fi usage statistics.

A domain can contain multiple domain controllers. Each domain controller holds a copy of the Active Directory database.

Domain Controller

A domain controller is a Windows server that holds a copy of the Active Directory database.

A domain controller is a member of only one domain.

Domain

A domain is an administratively-defined collection of network resources that share a common directory database and security policies. The domain is the basic administrative unit of an Active Directory structure.

o

A down arrow identifies a disabled device. To use a disabled device, you must first enable it.

A dual band access point can use one radio to transmit at one frequency, and a different radio to transmit at a different frequency. For example, you can configure many 802.11n devices to use one radio to communicate at 5.75 GHz with 802.11a devices, and the remaining radios to use 2.4 GHz to communicate with 802.11n devices. Dual band 802.11a and 802.11g devices are also available.

Dynamic

A dynamic disk is a physical disk that uses the Logical Disk Manager (LDM) database to store the volume types, sizes, locations, drive letters, and configurations. The LDM information is copied to other dynamic disks on the computer, thereby providing redundancy.

File

A file is a one-dimensional stream of bits that are treated as a logical unit. Files are the most basic component of a file system and are used to organize raw bits of data on the storage device. A complete file name is made up of the base file's name and the directory path to the file. An extension can also be added to the filename to identify the file type and program used to create, view, and modify the file.

Folder

A folder (also called a directory) is a container in a volume that holds files or additional folders. Folders are used to logically sort and organize data (i.e., to keep related files grouped together). Most operating systems use a hierarchal filing structure.

A forest is a collection of related domain trees. The forest establishes the relationship between trees that have different DNS name spaces.

A host uses broadcast messages to locate a DHCP server when it boots.

A local GPO is stored on a local machine. Computers that are not part of a domain use the Local Group Policy settings to control security settings and other restrictions on the computer.

RAID 1 (mirroring)

A mirrored volume stores data redundantly on two disks. If one disk fails, a redundant copy of the data is still available on the other disk. The system continues to provide access to the data using the functioning disk. Mirroring:

Partition

A partition is a logical division of the storage space on a storage device (e.g., a hard disk drive). Several partitions can be created on a single storage device, and each partition is assigned a unique drive letter. Multiple drive letters do not always indicate multiple storage devices; they simply indicate multiple partitions. Consider the following reasons for partitioning a storage device:

On the Wi-Fi page, you can:

Program

A program rule manages network traffic used by a specific Windows application or service.

o

A program window can be minimized, maximized, or closed using the icons in the upper right corner of the window. Selecting the maximize (middle) button of a maximized window will return the window to its pre-maximized size.

o

A record - Identifies the hostname and corresponding IP address

Server-to-server

A server-to-server rule protects connections between specific computers identified by IP address.

A specific setting in a GPO can be:

Optimization

A storage space needs to be optimized whenever a new storage device is added to an existing storage space that already contains data. This is called rebalancing the storage space. The rebalancing process redistributes the data already saved in the storage space to the newly-added device. There are three ways to do this:

RAID 0 (striping)

A stripe set breaks data into units and stores the units across a series of disks by reading and writing to all disks simultaneously. Striping:

o

A subnet address and mask. (e.g., 10.0.0.0/255.0.0.0 or 10.0.0.0/8)

A tree is a group of related domains that share the same contiguous DNS namespace.

Tunnel

A tunnel rule protects connections between gateway computers. It is typically used when two gateways are connecting across the Internet.

A volume cannot be decreased to a size smaller than the amount of data on the volume.

Volume

A volume is a single storage area within a file system. Depending on how it is configured, a volume can encompass a single partition or span multiple partitions. Volumes are identified by drive letters (e.g., C:, D:, F:).

A wireless NIC for sending and receiving signals.

A wireless access point (WAP) that is the equivalent of an Ethernet hub. The wireless NICs connect to the WAP. The WAP manages network communications between wireless hosts.

A wireless bridge connects two WAPs into a single network or connects your WAP to a wired network.

o

A yellow question mark identifies a device that Windows could not recognize (usually because no driver was found for the device). To correct this problem, right-click the device and search for a suitable driver. In many cases, you will need to download and install the driver from the manufacturer's website or install the driver from the device's installation disc.

Allowing multiple operating systems to be installed on the system.

Automatic Private IPv4 Addressing (APIPA)

APIPA is an automatic configuration method in which hosts automatically select their own IPv4 address within a specific range.

APIPA sets only the IPv4 address and mask. Because it does not assign a default gateway, APIPA only supports communications within the same subnet; it cannot be used if communication with other subnets is required.

Access

1.

Access https://onedrive.com and log in to your OneDrive account.

2.

Access the Recycle bin and then select the deleted file or folder you want to recover.

Access the current user's files and folders.

Access this computer from the network (the ability to access resources on the computer through a network connection)

Access utilities used to configure and manage the system.

Account lockout settings

Shortcut

Action

Active Directory uses DNS for locating and naming objects.

Active sessions, ports, and sockets

Connection Method

Ad hoc An ad hoc network works in peer-to-peer mode. The wireless NICs in each host communicate directly with one another. An ad hoc network is difficult to maintain for a large number of hosts because connections must be created between every other host, and special configurations are required to reach wired networks. You will typically use an ad hoc network to create a direct and temporary connection between two hosts. An ad hoc network is rarely (if ever) used to create a large scale wireless network in a production environment.

Add drivers, update drivers, change hardware settings, remove drivers, and troubleshoot problems with devices.

Add the free space on that device to a storage pool.

Additional antennas or signal boosters can increase wireless coverage.

Control Panel

Additional display settings are found in Control Panel under Appearance and Personalization. Under Personalization, you can configure the following:

o

Additional storage can be purchased for a monthly fee.

Additional themes are available online.

Additional wireless access points may be necessary to increase wireless coverage.

Class

Address Range First Octet Range Default Subnet Mask CIDR Notation

o

Addresses

Reserved

Addresses beginning with 00 have been reserved for use by the IETF (Internet Engineering Task Force). This reserved block is at the top of the address space and represents only a small portion of the total IPv6 address space.

Addresses with consecutive zeros can be expressed more concisely by substituting two colons for the group of zeros. For example, FEC0:0:0:0:78CD:1283:F398:23AB can be written as FEC0::78CD:1283:F398:23AB.

add disk=disk_number

Adds a mirror to an existing simple volume using the specified disk.

extend

Adds space to an existing volume. Use the following options with this command:

Adjust for best appearance.

Adjust for best performance.

o

Adjust the power settings on each access point to prevent signal emanation.

Adjust the screen resolution

Windows Logo + P

Adjusts display settings.

Administrative Templates

Administrative templates are registry-based settings that can be configured within a GPO to control the computer and the overall user experience, such as:

Advanced file and folder permissions to control access to files.

Allows for more advanced subnetting than was available in IPv4.

Allows more flexibility in assigning IP addresses to devices.

After a volume is formatted with FAT or FAT32, you can use the Convert command-line utility to convert the file system to NTFS without reformatting and losing data.

3.

After the drivers are loaded, select the partition that represents the RAID array. The installation process will format the partition and install the operating system.

o

All IP addresses by specifying any

All device drivers that come with Windows have the Microsoft digital signature. If you have to install a device driver that has not been digitally signed by Microsoft, new versions of Windows may not allow you to load the driver.

o

All hosts can function as both workstation and server.

o

All hosts in a workgroup can both provide network services and consume network services.

All multicast addresses have a FF00::/8 prefix.

All nodes must have at least one link-local address, although each interface can have multiple addresses.

All of the drives in the storage pool must be kept together when the pool is moved to the new computer. We recommend you label each physical drive in the pool to ensure you move the correct devices to the new system.

All programs, which lists installed applications on the left side of the Start menu.

o

All users are given 5 GB of storage for free.

o

All work areas within your facility are adequately serviced by the wireless network.

Allocate space to an existing storage space.

Allow connections that do not match any active firewall rules (default).

Allow inbound connections that do not match an active firewall rule.

Allow logon locally (the ability to log on to the computer console)

Allow logon through Terminal Services (the ability to log on using a Remote Desktop connection)

Allow non-administrators to install drivers.

Allow or prevent Windows from installing, updating, or removing a device driver.

Allow users to run only the files you specify on multi-user computers.

o

An IP address (e.g., 10.0.0.1)

o

An IP address range. (e.g., 10.0.0.1-10.0.0.15)

o

An IP address. (e.g., 10.0.0.1)

An IPv4 address is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is separated by a period. IPv4 addresses can be represented in one of two ways:

IPv4 Compatible Address

An IPv4 address that is compatible with IPv6 has ten octets, the last four octets being the IPv4 address of the device. The format is 0:0:0:0:0:0:w:x:y:z.

Address

An IPv6 to IPv4 address allows IPv6 packets to travel over an IPv4 network, such as the IPv4 Internet, without additional configuration or tunneling. This type of addressing works best when an IPv6 to IPv4 router is used. The first octet is 2002. The second octet contains the first two bytes of the IPv4 address. The third octet contains the second two bytes of the IPv4 address. The format is 2002:u:v::/16.

An anycast address is the same as a unicast address. Assigning the same unicast address to more than one interface makes it an anycast address.

Authentication exemption

An authentication exemption rule allows traffic from specific computers without authentication. You can specify computers using the following criteria:

Extended

An extended partition is an optional partition that contains logical partitions. Because an operating system cannot be booted from a logical partition within an extended partition, this type of partition is not bootable. Extended partitions:

Isolation

An isolation rule isolates computers by restricting connections based on authentication credentials. You can configure an isolation rule to:

o

An organization unit (OU) is a type of container object used to logically organize network resources and simplify administration.

Organizational Unit (OU)

An organizational unit is like a folder that subdivides and organizes network resources within a domain. An organizational unit:

o

An unmounted storage space must be brought back online manually.

Annualized Failure Rate (AFR): The AFR identifies the number of anticipated disk failures each year, based on the manufacturer's total number of installed units of similar type.

o

Authentication

Automatic delivery of additional configuration parameters such as default gateway and DNS server addresses

Automatic host configuration on small, medium, or large networks

Automatic switching (roaming)

Automatic switching allows mobile users to move to different access points, establishing connections automatically. Be aware of the following automatic switching details:

Automatic switching is enabled by default.

Automatically generates an IPv6 address for the site using the 2002::/16 prefix followed by the public IPv4 address of the tunnel endpoint router. For example, a router with the IPv4 address of 207.142.131.202 would serve the site with the following prefix: 2002:CF8E:83CA::/48 (CF8E:83CA is the hexadecimal equivalent of 207.142.131.202).

Automatically generates link-local addresses that include the IPv4 address of each host:

Automatically pick an accent color from my background.

1.

Back up all data on the disk.

Back up files and directories (does not include restoring files and directories)

Windows Firewall

Basic Windows Firewall settings are configured in the Windows Firewall utility in the Control Panel. When configuring Windows Firewall, be aware of the following:

o

Because addresses are allocated based on physical location, the prefix generally identifies the location of the host. The 64-bit prefix is often referred to as the global routing prefix.

Because the key doesn't change, the key can be captured and broken.

o

Before updating the firmware, back up or write down any configuration settings.

Block connections that do not match any active firewall rules (default).

Block outbound connections that do not match an active firewall rule.

o

Boot from VHD.

3.

Boot the computer. After the system BIOS/UEFI loads, the RAID BIOS will load. Press the displayed key combination to enter the RAID configuration utility (e.g., Ctrl + F).

o

Boot the system from the Windows installation media and enter the recovery environment. Then revert the system to a recent restore point.

o

Bridge connections.

Built-n Quality of Service (QoS)

Built-in QoS support enables bandwidth reservations to make guaranteed data transfer rates possible.

o

But not as FEC2::78CA::23AB

By default, Windows Firewall is turned on for each network profile.

By default, Windows can provide the latest drivers for many (but not all) devices. To take advantage of automatic driver updates during installation, make sure you have an Internet connection.

Startup Settings

By default, a driver must be digitally signed (and the signature must be valid) before Windows will allow it to be loaded. This is done to prevent malware infections. If a device driver is tampered with after it has been digitally signed by the hardware vendor, then the signature will become invalid, and you will know you should not use it.

By default, all outbound traffic is allowed, as are inbound responses to requests sent from the local system. All inbound traffic initiated from external sources is automatically blocked unless you define an exception that allows that traffic through.

By default, any application or service running on the system can accept network traffic on a port opened with a port rule.

o

By default, the log is saved to %systemroot%\system32\LogFiles\Firewall\pfirewall.log in a text format.

By default, the program is allowed to accept connections on any port.

o

CPU meter

CRC-32 is susceptible to bit-flipping attacks, where modifications in the frame result in the same hash value.

1.

Calculate the binary value of the subnet mask and determine which octet is affected by the subnet mask. For example, a /26 subnet mask affects the last octet as shown below:

o

Calendar

Calibrate color settings

Can be formatted with a file system.

Can be further subdivided into a large number of logical partitions.

Can be used to logically organize network resources.

Can contain other OUs or any type of leaf object (e.g., users, computers, and printers).

Can hold operating system boot files.

Can provide a total of 3.4 x 1038 globally unique addresses. (IPv4 can provide only 232 (or approximately 4.3 billion) addresses.

Can use dynamic keys or pre-shared keys.

Cannot be directly formatted with a file system. However, logical partitions within an extended partition can be formatted with a file system.

Cannot be further subdivided into logical drives.

Windows Logo + Space

Causes all windows on the desktop to become transparent so you can see the desktop.

o

Center

Certified for Windows

o

Change Notification Settings

Change the displayed size of items (text, apps, and other items)

Change the position of the monitors to match their physical placement. This is done by selecting one of the monitors and moving it to the right or left of the other monitor or monitors. This is applicable only if more than one monitor is connected.

Change the resolution for the selected monitor using the Display drop-down list.

Change when the computer sleeps

Resize-Partition

Changes the size of an existing partition and the underlying file system. Use the following options with this command:

Channel bonding

Channel bonding combines two non-overlapping 20-MHz channels into a single 40-MHz channel, which results in slightly more than double the bandwidth.

Check BIOS/UEFI settings to ensure that the appropriate function is enabled in the firmware configuration.

Choose a screen saver from options preloaded on the system or select Photos to display pictures saved on the system. The settings options change based on the screen saver selected. For example, if Photos is selected, the following configuration options are available:

1.

Check the Hosts file (located in C:\Windows\System32\drivers\etc). If a hostname-to-IP address entry is found, it is used and the remaining steps are skipped.

Check the disk rotational speed. A disk that spins faster will perform better.

Input devices

Check the following when troubleshooting input devices:

2.

Check the local DNS cache. The DNS cache is a record of the computer's successful and unsuccessful URL queries on the Internet. If an entry is found, it is used and the remaining steps are skipped.

Check the speed of the SATA connection. Older SATA versions have slower transfer speeds from newer SATA versions. If performance is too slow, consider upgrading components to the latest SATA version.

Check the speed of the disk interface. If your system uses an older disk interface, upgrade to a faster interface (if possible).

Check the status of network connections.

Choose Allow Windows to manage HomeGroup connections when all computers in the HomeGroup have been configured with the same username and passwords.

o

Choose OneDrive folders to sync

Choose Use user accounts and passwords to connect to other computers when there are different user accounts and passwords for the computers in the HomeGroup.

Choose a Sound Scheme from the drop-down menu.

Adjust ClearType text

ClearType is a technology that improves the readability of text on LCDs. ClearType can be turned on or off.

ClearType text

Windows Logo + Home

Clears all windows on the desktop except the active window.

o

Clock

Color calibration

Command Prompt

Command Prompt (Admin)

Communication takes place using a commonly available public network, such as the Internet.

Complexity of backing up data

Compression to reduce the amount of space used by files.

Computer Management

Computer Configuration

Computer policies (also called machine policies) are enforced for the entire computer and are applied when the computer boots. Computer policies are in effect regardless of the user logging into the computer. Computer policies include:

Local Policies/User Rights Assignment

Computer policies include a special category of policies called user rights. User rights identify system maintenance tasks and the users or groups who can perform these actions. Examples of user rights include:

Computer shutdown when the Security event log reaches capacity

Computers

o

Configure a system restore.

o

Configure accessibility options.

Configure advanced management tools

o

Configure and analyze Event Viewer logs.

o

Configure and customize Start menu, desktop, taskbar, and notification settings according to device type.

Configure and maintain network security

Configure and manage updates

o

Configure and optimize user account control (UAC).

o

Configure and support IPv4 and IPv6 network settings.

o

Configure and troubleshoot IPv4 and IPv6 addressing.

o

Configure and use the MMC.

o

Configure authenticated exceptions.

o

Configure authentication and authorization.

Configure authorization and authentication

o

Configure automation of management tasks using Windows PowerShell.

o

Configure broadband tethering.

o

Configure connection security rules (IPsec).

Configure data access and usage

o

Configure default printers.

o

Configure desktop apps.

Configure devices and device drivers

o

Configure disk quotas.

o

Configure disks, volumes, and file system options using Disk Management and Windows PowerShell.

o

Configure domain settings.

o

Configure driver settings, including signed and unsigned drivers.

o

Configure event subscriptions.

o

Configure file access auditing.

Configure file and folder access

o

Configure file and printer sharing and HomeGroup connections.

Configure file recovery

o

Configure file system permissions.

o

Configure file systems, partitions, volumes, and RAID.

o

Configure folder location.

o

Configure folder shares, public folders, and OneDrive.

o

Configure indexing options.

o

Configure libraries.

o

Configure local accounts.

o

Configure location settings for location-aware apps.

o

Configure location-aware printing.

Configure mobility options

o

Configure monitoring and alerts.

o

Configure name resolution.

o

Configure name resolution; connect to a network.

o

Configure native boot scenarios.

o

Configure network adapters.

o

Configure network discovery.

o

Configure network locations.

Configure networking

Configure networking settings

o

Configure offline file policies.

o

Configure offline files.

o

Configure picture passwords and biometrics.

o

Configure power policies, including powercfg.

o

Configure power policies.

o

Configure power settings.

o

Configure profiles including profile version, local, roaming, and mandatory.

o

Configure remote PowerShell.

o

Connect or disconnect from a wireless network.

o

Connect to a network.

o

Connect to a wireless network.

o

Connect/disconnect the connection.

Device

Considerations

Consistent saving

Container objects hold other objects, either other containers or leaf objects.

Control Panel

Control notifications.

Cordless telephones that operate in the 2.4 GHz range.

Cortana

Cortana is a personal assistant that is included in Windows 10.

o

Create a portable installation of Windows.

Create a power plan

o

Create and configure VHDs.

o

Create and configure storage spaces.

o

Create and configure virtual disks.

o

Create and configure virtual machines, including integration services.

o

Create and configure virtual switches.

o

Create and manage checkpoints.

o

Create and manage user and group accounts.

o

Create packages.

o

Create shortcut for the connection.

New-NetFirewallRule

Creates a new inbound or outbound firewall rule. The syntax is New-NetFirewallRule -DisplayName name [options]. Use the following parameters with this cmdlet:

New-Partition

Creates a new partition on the disk. Use the following options with this cmdlet:

create partition primary size=size

Creates a new partition on the selected disk. Use the size=size option with this command to specify a size (in MB) for the partition. If this option is omitted, then all of the unallocated space on the selected disk will be assigned to the new partition.

Creating multiple partitions allow for the creation of a dual-boot system, where one operating system is installed on one partition and a second operating system is installed on a second partition.

Ctrl+Alt+Del required for log on

Current connections

DHCPv6

DHCPv6 is an updated version of DHCP used for IPv6 addressing. It operates in one of two different modes:

DHCP and APIPA are disabled when a static IPv4 address is configured.

Dynamic Host Configuration Protocol (DHCP)

DHCP is an automatic method for assigning IPv4 address and other TCP/IPv4 configuration parameters to hosts. Client computers contact a DHCP server to receive IPv4 configuration information. DHCP can perform the following tasks:

Disable DHCP

DHCP servers dynamically assign IP addresses, gateway addresses, subnet masks, and DNS addresses whenever a computer on the wireless network starts up, regardless of whether the host is authorized to use the network or not. Disabling DHCP on the wireless access points makes it more difficult for unauthorized hosts to connect to other hosts on the network as an attacker must manually determine valid static IP addressing parameters.

Area

Description

o

DMA (direct memory access controller)

Benefit

Description

Data in existing partitions is not deleted.

Database information is replicated (shared or copied) within a domain.

o

Deep link apps by using Microsoft Intune.

o

Default programs lists the default settings the operating system will use.

o

Delete the connection.

2.4 GHz--11 (3 or 1)

Depends on configuration

Deploy and manage Azure RemoteApp

o

Deploy desktop apps by using Microsoft Intune.

Deploy software updates by using Microsoft Intune

Address Type

Description

Device Manager

Device Manager uses icons on the devices to communicate problems:

Issue

Device Type Resolution

o

Device drivers that are approved by Microsoft have a digital signature. The digital signature:

Devices and Printers

Devices and Printers in the Control Panel can also be used to manage and maintain drivers. The devices displayed in Devices and Printers are typically external devices connected to the computer. In Devices and Printers, all of the components that comprise the device are shown as a single device and can be managed as a single device.

o

Devices and Printers lists the external devices attached to the computer, such as printers, USB thumb drives, and external monitors.

Devices are the hard disks or other types of storage from which storage pools are created. You can use a variety of storage devices, such as SATA drives, SCSI drives, and external USB drives to create storage pools.

Multiple IP addresses per device

Devices can have multiple IPv6 addresses, each with its own purpose. Each address can be on a different subnet and have a different subnet ID. This is referred to as multinetting.

Devices

Devices on a wireless network include:

Diagnose and repair network connectivity issues.

o

Diagnose problems.

Dial-up and VPN site-to-site demand-dial router

Dial-up remote access server

o

Disable or enable the wireless adapter.

o

Disable or uninstall the suspect device.

o

Disable the device in Device Manager.

Disabling the firewall leaves the computer open to attack. Disable the Windows Firewall only if the computer is protected by a different firewall program.

Disk Defragmenter

Disk Defragmenter optimizes the performance of your hard drive by joining fragments of files that are in different locations on your hard drive into a single location. Be aware of the following when using Disk Defragmenter:

Disk Management

Disk quotas to restrict the amount of disk space that files saved by a user can use.

DiskPart

Display a customized message to a user when the installation or update of a device driver is prevented.

Display adapter properties

Display orientation (landscape or portrait)

Displays each system resource and the device(s) using the resource when you select Conflicts/Sharing under Hardware Resources.

Get-NetFirewallRule

Displays firewall rules. By default, all firewall rules are displayed. To limit the output to specific rules, use the following parameters with this cmdlet:

Displays information for all the devices on your system.

Docked displays the enlarged area around a point at the top of the screen.

o

Download the firmware update from the manufacturer's website.

Downloaded program files

Category

Driver Implementation

Driver staging is the process of manually downloading and placing drivers into the driver store or other authorized locations.

Duplicate

o

Duplicate the displays on both monitors

2.

During the first part of the installation, Windows loads the necessary files to start the installation. You need to manually load the controller driver so that Windows can see the RAID array. You need to have the drivers available on a flash drive.

o

During the update, do not turn off the device.

Dynamic disks support the following volume types:

Each domain maintains its own set of relationships with other domains.

Each host functions independently.

Each host must have a unique IPv4 address.

Each host on the same logical network must be assigned the same subnet mask.

Each object contains attributes (i.e., information about the object, such as a user's name, phone number, and email address) which are used for locating and securing resources.

Each quartet is represented as a hexadecimal number between 0 and FFFF. Each quartet represents 16-bits of data (FFFF in binary form is 1111 1111 1111 1111).

Each storage device and partition is assigned a unique ID.

Earlier IPv6 specifications defined a site-local address that was not globally unique and had a FEC0::/10 prefix. The site-local address has been replaced with the unique local address. Addresses beginning with FEC, FED, FEE, and FEF are site-local addresses.

o

Enable Airplane Mode, which will stop all wireless communications.

o

Enable DirectAccess, remote access, and remote assistance.

o

Enable Wi-Fi Sense. This configures the wireless adapter to do one or both of the following:

o

Enable boot logging to record a detailed list of drivers that are loading during system startup. Examine the Ntbtlog.txt file and identify the last driver that has loaded successfully. The problem device will most likely appear after this device.

Enable edge traversal to allow an application or service to be accessible from outside of a Network Address Translation (NAT) device.

Enable the Shuffle option to rotate the order in which multiple pictures are displayed.

o

Enable/disable the connection.

o

Enabled, meaning that the GPO identifies a value to enforce.

o

Encrypt files and folders by using EFS.

Encryption key and initialization vectors are increased.

Encryption to protect the contents of a file.

Enhancements that support better time-sensitive data delivery

o

Enroll devices.

Ensure that the wireless standard used by the wireless network (e.g., 802.11ac) is compatible with the wireless network adapter hardware.

o

Evaluate system stability using Reliability Monitor.

Even if you use DHCP for other addressing parameters, DNS server addresses can be manually assigned.

Event Viewer

Event Viewer

Event Viewer logs significant events on a computer, such as when a process encounters an error.

Enable MAC address filtering

Every network board has a unique address assigned to it called a MAC address. By specifying which MAC addresses are allowed to connect to your network, you can prevent unauthorized MAC addresses from connecting to the access point. Be aware that initially implementing a MAC address filtering system is very time consuming and can be difficult to maintain as authorized systems are added to and removed from your network.

Existing partitions and logical drives in an extended partition are converted to simple volumes on the dynamic disk.

1.

Expand Display adapters.

o

Export and import Azure RemoteApp configurations.

Extend

o

Extend the displays, allowing Windows and the pointer to span across the displays

Extended partitions can contain many logical partitions.

Extremely large storage devices and partitions are supported.

o

FAT32

File Explorer

File and Print Sharing

File and Printer Sharing makes files and printers on the local computer available to other users on the network.

File sharing connections

File sharing connections allow you to choose between 128-bit, 40-bit, or 56-bit encryption to protect file sharing connections.

o

Files can be accessed after the storage space is brought back online manually, but you must add more physical disk space to the pool and add it to the storage space in order to use the storage space.

Files in the Recycle Bin

Files stored on your computer can be made accessible to others on the network.

o

Fill

o

Fit

o

Folder syncing provides the following benefits:

4.

Following installation, edit the BIOS/UEFI settings to modify the boot order to boot from the RAID array.

Following the Global ID, the remaining 16-bits in the prefix are used for subnet information.

Following the prefix, the next 40 bits are used for the Global ID. The Global ID is generated randomly in such a way that its uniqueness is essentially guaranteed on the entire Internet.

For Windows 7 and earlier systems, try using the Last Known Good configuration option in the boot menu if the system crashes during startup before you can log on. This starts Windows using the hardware configuration that existed during the last successful logon.

For all RAID configurations, the amount of disk space used on each disk must be of equal size. If disks in the array are of different sizes, the resulting volume will be limited to the smallest disk. Remaining space on other drives can be used in other RAID sets or as traditional storage.

For example, if you connect to the wired network at work, this location profile is applied.

For hardware devices that include their own firmware, try updating the firmware to the latest version. This will usually fix bugs, make new features available, or reduce security risks.

For non-DHCP hosts (hosts that cannot accept an IPv4 address using DHCP).

For specific hosts that must have the same address all of the time (such as servers).

For stuck or malfunctioning keyboard keys, you might be able to pop the key off and clean the contact underneath. Be aware that purchasing a new keyboard might be more cost-effective than spending excess time cleaning an old one.

2.

For the affected octet, determine how many subnets are available within the subnet mask and calculate the decimal value for each subnet. For example, a /26 subnet mask has four subnets available as shown below:

7.

For the affected octet, remove the first IP address (network address) and last IP address (broadcast address) as possible workstation addresses for each subnet. For example, a /26 subnet mask could not have the following IP addresses for the first possible subnet:

For wireless devices, check the battery level. If necessary, charge the device or change the batteries.

o

Forced Hardware

4.

Format each volume with one of the following file systems:

Format-Volume

Formats a partition with a file system. Use the following options with this cmdlet:

format

Formats the selected partition with a file system. Use the following options with this command:

Formatting removes the existing file system (if present) and installs the new file system type. Formatting a drive removes file and folder entries for all existing data on the partition.

Update the firmware

Frequently update the firmware on the access point to prevent your system from being exposed to known bugs and security holes. Most access point manufacturers provide firmware updates on their web sites.

o

From any Internet-connected device, use a web browser to access https://onedrive.com. The web interface allows you to download, delete, move, copy, or share files. You can also see a list of all devices that are linked to your OneDrive account.

Full screen enlarges the entire screen.

o

GUID Partition Table (GPT)

Gadgets are small applications designed to perform a single task. Examples include:

1.

Go to Control Panel.

Group Policies

Group policies can automate the management of device drivers in an Active Directory domain. Using group policies, you can:

Groups

Drive noise

HDD Excessive or unusual drive noise is almost always indicative of a failing hard disk. For example, a clicking noise coming from the drive usually indicates one or more failing heads.

Slow performance

HDD Several things can help increase the performance of a slow HDD:

Failure to boot (OS not found)

HDD/ SSD A failure to boot with an error message that reads something to the effect of "OS Not Found" could be trivial or serious. Common causes include the following:

Drive not recognized by the BIOS/UEFI

HDD/SSD A modern BIOS/UEFI automatically detects your drives and their geometry during POST. In older systems, you had to manually enter the disk geometry, and it was very common for a wrong value to be entered. In modern systems, this rarely happens. If the BIOS can't detect your drive, it's usually caused by one of three things:

Hardware

Hardware

Hardware RAID uses a special controller card that includes a RAID processor. Hardware RAID is the most expensive method, but provides the best performance and reliability.

o

Hardware conflicts occur when two hardware devices try to use the same hardware resources.

Has a 50% overhead. Data is written twice, meaning that half of the total disk space is used to store the second copy of the data. For example, a mirrored array created using two 1 TB hard disks will only provide 1 TB of available storage space.

Has little overhead because all disk space is used for storing data

Has overhead associated with the parity information. For example, in a three-disk array, 1/3 of each disk is used to store parity information. Therefore, the available storage space will be 2/3; of the total sum of the sizes of all the disks in the array.

Have user-based exceptions that must be manually applied for each user.

Icon shortcuts for applications and files stored on the desktop. Shortcuts are identified by a small back arrow in the lower left corner of the icon.

o

Help and Support connects you to the Windows Help system.

o

Hibernate

Hibernation files

Icon shortcuts for applications and files stored on the desktop. Shortcuts are identified by a small back arrow in the lower left of the icon.

o

Icons are provided to access the current user's folders:

Host-based firewalls are implemented using software and reside on the individual hosts within the network.

Host-to-host (end-to-end)

Host-to-router or router-to-host

Hosts are dual layer hosts and tunnel IPv6 to send on the IPv4 network.

Hosts in the same workgroup can access shared resources on other hosts.

o

Hosts must run a supported version of the Windows operating system to join a domain.

Hosts select an IPv4 address in the 169.254.0.1-169.254.255.255 range with a mask of 255.255.0.0. After choosing the address, the host verifies that no other host on the network is using the selected address.

o

I/O

IANA has designated the following IP address ranges as reserved for private network use:

Icons for running applications appear to the right of pinned application icons.

Icons for running applications appear to the right of pinned application icons. Icons of applications that are running have a black border around them.

IP address range

IPv4 addresses are divided into several default classes. Each class identifies a range of IPv4 addresses and a default subnet mask for that range. The following table shows the default address class for each IPv4 address range.

Static (manual) assignment

IPv4 configuration values can be manually assigned to a host. This is called static addressing.

Address space

IPv6 address spacing provides sufficient addresses for every device that needs to have a unique public IPv6 address. IPv6 eliminates the need for Network Address Translation (NAT), which is commonly used in IPv4 networks to conserve registered IP addresses. IPv6:

Built-in security features

IPv6 has built-in support for security protocols such as IPSec. This feature enhances security for Internet communication.

o

IRQs

IVs are sequenced to prevent against replay attacks.

Settings app

In the Settings app under Network & Internet, you can perform the following wireless network management tasks:

o

Implement Storage Spaces.

o

Implement Windows Store apps.

o

Implement Windows Store for Business.

Implement Windows in an enterprise environment

Implement apps

o

Implement client-side virtualization.

o

Implement hardware that meets Windows' system requirements.

o

Implement volume activation using a Key Management Service (KMS).

Improving performance by separating paging files from operating system files.

o

In Classless Inter-Domain Routing (CIDR) form, the subnet mask appears as a forward slash (/) followed by the number of bits in the mask that are set to 1. A simple mask might be /24, which is equivalent to 11111111.11111111.11111111.00000000 or 255.255.255.0.

o

In File Explorer on the Navigation pane, select OneDrive.

Settings

In Settings, select System > Display. In this interface, you can configure the following:

6.

In Windows, the RAID array appears as a single disk. Use Disk Management to format the partition and assign it a drive letter.

Alternate IPv4 configuration

In an alternate IPv4 configuration, the system attempts to use DHCP for IPv4 configuration information. Static configuration values are used if a DHCP server cannot be contacted. Alternate configuration should be used in the following situations:

o

In binary form, the subnet mask is always a series of 1s followed by a series of 0s (In the mask, 1s and 0s are never mixed in sequence). In decimal form, a simple mask might be 255.255.255.0.

In general, place access points in high locations to avoid interference problems caused by transmitting the wireless signal through building foundations.

o

In most cases, individual interface IDs are not assigned by ISPs. Instead, they are generated automatically or managed by site administrators. Using the automatic host ID simplifies administration.

Client-server

In the client-server model, each host has a specific role in the network. Servers provide services such as file storage, user management, security configuration, and printing. Clients request services from servers. The client-server model is known as domain networking in a Windows environment. Key domain networking facts include the following:

4.

In the configuration utility, define an array, add disks to the array, and identify the array type (RAID 0, 1, 5, 10, etc.).

0.

In the notification area, right-click the OneDrive icon and select Settings.

1.

In the notification area, right-click the OneDrive icon and select Settings.

Stand-alone

In the stand-alone model:

Incoming and outgoing connections

Increase security on the computer by selecting On resume, display logon screen. This requires the password to be entered before the desktop is reactivated.

Increased complexity of implementation

Increased cost to implement due to specialized hardware and software requirements

Increased knowledge required to manage the implementation

Increased planning time required for implementation

expand

Increases the maximum size of a virtual disk.

Indicates if a driver will fail when memory usage or CPU usage is above or below a specified level.

Individual settings within all GPOs are combined to form the effective group policy setting as follows:

Is not required to create a partition or a volume.

1.

Initialize the disk.

convert gpt

Initializes the selected hard disk and configures it to use the specified partitioning format (MBR or GPT).

Initialize-Disk disk_number

Initializes the specified disk. If no parameters are included with this command, it will configure the disk to use the GPT partition format. If you wish to use the MBR partition format, use the -PartitionStyle MBR option with this command.

Inside each ISP, the address is further subdivided for each customer or other, smaller Internet registries.

Inside each region, the address is further subdivided by each ISP.

Install Windows

o

Install Windows on a virtual hard disk (VHD).

o

Install a driver provided by the hardware manufacturer.

Install a new storage device to the system.

o

Install additional Windows features.

o

Install and activate the version and edition of Windows that meets end-user requirements.

o

Install and configure local printers.

o

Install and configure shared printers.

o

Install and manage software by using Microsoft Office 365 and Windows Store apps.

o

Install on bootable USB.

1.

Install the RAID controller card and connect the drives to the controller.

o

Install to virtual hard disk (VHD).

o

Install, update, disable, and roll back drivers.

o

Installation and configuration of User Experience Virtualization (UE-V).

o

Integrate Microsoft account including personalization settings.

o

Interface IDs must be unique within a subnet, but may be the same if interfaces are on different subnets.

Internet Explorer user settings (such as favorites and security settings)

Internet Protocol (IP) router for connecting subnets of a private network

o

Interpret data from Device Manager.

Is a container object.

Is configured between individual hosts and an ISATAP router.

Is configured between individual hosts.

Is configured between routers at different sites.

Is configured using Netsh.

Jump lists, which allow a user to easily access common tasks or to quickly open pinned and recent documents.

Keep the disk defragmented. A heavily fragmented disk can run quite slowly. You'll need ample free space to fully defragment the drive.

Kerberos settings

Knowledge bases

LEAP

Leading zeros can be omitted in each section. For example, the quartet 0284 could also be represented as 284.

Lens enlarges the area around the pointer.

Let Windows choose what's best for my computer.

Built-in Containers

Like OUs, generic built-in containers are used to organize Active Directory objects. However, built-in container objects have several differences:

Link-local Multicast Name Resolution (LLMNR) is a name resolution protocol that provides peer-to-peer name resolution when DNS is unavailable.

Link-local addresses are the equivalent of Automatic Private IP Addressing (APIPA) in IPv4.

Link-local addresses are used for automatic address configuration, neighbor discovery, or for subnets that have no routers.

Link-local addresses have a FE80::/10 prefix. This includes any address beginning with FE8, FE9, FEA, or FEB.

list disk

Lists all disks installed in the system.

Lost clusters are a series of used clusters on the hard disk drive that are not associated with a specific file.

MD5

MS-CHAP v2 (uses passwords for client authentication)

Maintain a healthy amount of free disk space on the drive. A mostly empty disk runs faster than a mostly full disk. If a disk is getting full, migrate to a newer, bigger disk.

Make Start, taskbar, and action center transparent.

Make sure that devices are plugged in and turned on, all cables are securely connected, and expansion cards are properly seated.

Make sure that nothing is resting on the keyboard as the system boots. If a key is pressed during the boot up process, a 301 (keyboard) error can result. If this happens, remove the obstruction and then reboot the system.

Other access points in the area (for example, neighboring wireless access points might be configured to use a similar channel).

Make sure the device is plugged in securely.

Make sure the file system being used is optimized for an SSD. Because SSDs store data differently from HDDs, they require special techniques to extend the life of the drive, such as wear leveling support.

o

Manage Windows applications.

o

Manage client security by using Windows Defender.

o

Manage devices and drivers.

Manage devices with Microsoft Intune

o

Manage driver packages.

o

Manage policies.

o

Manage preferred wireless networks.

o

Manage remote computers.

o

Manage services on a Windows system.

o

Manage update history.

o

Manage user and computer groups.

o

Manage your existing wireless network profiles. For example, you can remove an existing profile by clicking on it and selecting Forget.

Manually connect to a wireless network using the Set up a new network connection option.

Many 802.11n access points can support clients running other wireless standards (802.11a/b/g). When a mix of clients using different standards are connected, the access point must disable some 802.11n features to be compatible with non-802.11n devices, which decreases the effective speed.

Change SSID from the default value

Many manufacturers use a default SSID, so it is important to change your SSID. You can also disable the SSID broadcast for further protection. This is known as SSID suppression or cloaking.

Mapped network drives cannot be defragmented.

Mark the Optimize drive option when a new storage device is added to an existing storage pool.

Mark the Optimize drive usage option for the storage space in Control Panel.

o

Master Boot Record (MBR)

Windows Logo + Up Arrow

Maximizes the active window.

Mean Time Before Failure (MTBF): The MTBF provides an estimated lifespan for the disk (usually measured in hours of operation).

Other options under Hardware Resources are:

Microsoft 70-697: Configuring Windows Devices, which can be used as credit for the following Microsoft certifications:

Microsoft 70-698: Installing and Configuring Windows 10, which can be used as credit for the Microsoft Certified Solutions Associate (MCSA): Windows 10 certification.

o

Microsoft Certified Professional (MCP)

o

Microsoft Certified Solutions Associate (MCSA): Windows 10

o

Microsoft Specialist: Windows 10

Microsoft Validation Process

Microsoft has a validation process to maintain the integrity of drivers installed on Windows systems. Be aware of the following regarding the Microsoft validation process:

Migrate and configure user data

o

Migrate from previous versions of Windows.

o

Migrate user profiles.

Windows Logo + Down Arrow

Minimizes the active window. If the active window is maximized, this shortcut will restore it down instead of minimize it.

o

Mirrored (RAID 1) volumes store data redundantly to two disks simultaneously. If one disk fails, data is present on the other disk, and the system switches immediately from the failed disk to the functioning disk. The volume size is the same as a single disk in the array.

Most well-known services and programs available on computers running Windows are provided in the list.

Enable the firewall on the access point

Most wireless access points come with a built-in firewall between the wireless and the wired network.

Mouse settings

o

Move a virtual machine's storage.

Windows Logo + Left/Right Arrows

Moves the active window to either the left or right side of the monitor corresponding to the arrow key used.

Multicast

Multicast addresses represent a dynamic group of hosts. Packets sent to a multicast address are sent to all interfaces identified by that address. By using a different multicast address for different functions, only the devices that need to participate in the particular function will respond to the multicast. Devices that have no need to participate will ignore the multicast.

Multicast addresses that are restricted to the local link have a FF02::/16 prefix. Packets starting with FF02 are not forwarded by routers.

Multicast addresses with a FF01::/16 prefix are restricted to a single node.

Trees and Forests

Multiple domains are grouped together in the following relationship:

Must be performed before you can save data on the disk.

Backwards-compatibility

N/A No With 802.11b With 802.11a/b/g, depending on frequencies supported 802.11b/g/n

o

NS resource record - Identifies all name servers that can perform name resolution for the zone

o

NTFS

Network Connections

Network Discovery

Network Discovery enables the computer to see and be seen by other computers on the network.

Network Location Awareness (NLA)

Network Location Awareness (NLA) enables a user to assign specific Windows Firewall settings to a connection based on the connection profile. The profile identifies the type of network being connected to. Profile types include the following:

Network address translator (NAT) for connecting a private network to the Internet

Network communication security settings

Network and Sharing Center

Network connections can also be managed in the Network and Sharing Center. You can access the Network and Sharing Center using Control Panel or by right-clicking the wireless network icon in the notification area. In the Network and Sharing Center, you can do the following:

Network firewalls are typically implemented using hardware and positioned at the network's perimeter.

Network programs installed on the computer may add their own entry on the list.

Network traffic is encapsulated in IPsec as it travels across the public network.

Networking

Overall system stability is given a stability index rating that ranges from 1 to 10 (10 being the most stable). The stability rating is affected by application, hardware, Windows, and other failures.

Header improvements

Non-essential and optional packet fields are moved to extension headers, which are placed after the IPv6 header; this reduces header size and decreases the amount of time required to process the packet. In addition, IPv6 provides the following header improvements:

None of the hosts in a workgroup have a specific role.

o

Not configured, meaning that the GPO has no value for that setting and does not change the current setting.

o

Notifications from the Windows operating system (such as the results from the latest antimalware scan)

Exam

Objectives

70-697

Objectives covered for 70-697 exam:

70-698

Objectives covered for 70-698 exam:

o

Objects are used to define the security attributes, such as access, availability, and use limitations within the domain.

o

Objects can be organized in container objects.

o

Objects represent resources, such as users, computers, and printers.

o

Obtains DNS and other configuration information from a DHCPv6 server

o

Obtains the subnet prefix and default gateway from the RA message

Offline web pages

o

On Ethernet networks, the interface ID can be automatically created using the MAC address.

o

On some controller cards, you can create a RAID 1 set using an existing disk (with data) and a new disk. During the setup, data from the first disk is copied to the second disk. However, most controller cards cannot create mirrored drives using existing data on a drive. If you try to use drives with existing data, that data will be lost when the array is defined.

OneDrive allows you to recover files that have been deleted from your account. This is done by completing the following:

OneDrive files and folders that are accessed using File Explorer have the additional right-click menu options:

OneDrive files can be accessed in the following locations:

OneDrive offers file and folder syncing:

OneDrive provides a Fetch Files feature that can be used to remotely access any file or folder on a computer that has the OneDrive desktop app installed.

Only four standard partitions can be created on a storage device.

Only one type of partition is used (there are no primary, extended, or logical partitions).

Open

Open authentication requires that clients provide a MAC address in order to connect to the wireless network. You can implement MAC address filtering to restrict access to the access point to known (or allowed) MAC addresses. Because MAC addresses are easily spoofed, this provides little practical security.

Shift + Click a Taskbar Icon

Opens a new instance of the application.

o

Optimize and troubleshoot disks.

o

Optimize hardware performance, power management, and virtual memory.

Orphaned files are files that exist on the hard drive, but are not associated with a directory in the index. Normally, Check Disk can re-associate the file with the correct directory.

PC screen only

PEAP

o

PTR record - Identifies an IP address with a corresponding hostname (also known as a pointer record)

Parity requires that you have at least three storage devices. This option uses parity information to reconstruct data if one of the storage devices fails. Parity uses less space for redundancy than the mirroring options, but performance is not as good as that provided by the mirror options if a device failure occurs.

Partition table integrity is verified using a cyclic redundancy check (CRC).

3.

Partition the disk and create volumes.

Password restrictions that must be met for all user accounts

Password settings

o

Perform Windows post-installation configuration tasks.

o

Perform a backup and restore with WBAdmin.

o

Perform a driver rollback.

o

Perform a refresh or recycle.

o

Perform clean installations.

Perform post-installation configuration

o

Perform recovery operations using Windows Recovery.

Moving storage devices between computers

Perform the following tasks when removing a disk from a functioning computer:

Performance Logs and Alerts

Performance Logs and Alerts allows non-local computers to view and manage Performance Logs and Alerts services in Windows Firewall with Advanced Security (WFAS).

Preserved integrity

Physically move the disk to the new computer.

o

Physically remove the device and then uninstall the device in Device Manager to remove the driver from the system. Then reinstall the device along with a known, good version of its driver.

Pinned Items, which are shortcuts to the items. An item can be pinned to the Start menu, taskbar, or both.

Place access points so that adequate coverage is provided to the entire work area without emanating the wireless signal outside of your organization's facility. Consider the following guidelines for placing access points:

Pinch

Placing two fingers apart on the screen and then moving the fingers together. This gesture zooms out on the displayed object.

Turn

Placing two fingers on the screen and then turning them clockwise or counterclockwise. This gesture rotates the displayed object.

Spreading

Placing two fingers together on the screen and then moving the fingers further apart. This gesture zooms in on the displayed object.

Pools of storage are created from the available disk space. A pool is a logical entity composed of the free space available on the specified storage devices.

PortProxy

PortProxy is a TCP proxy that allows an IPv4-only host to communicate with an IPv6-only host. PortProxy does this by transmitting TCP traffic for application-layer protocols that do not embed address or port information in the TCP segment. Thus, an application like FTP does not work across a PortProxy computer because FTP embeds addresses when using the FTP Port command. To configure PortProxy, use the Netsh interface portproxy command with the necessary parameters.

o

Ports

Power Options

Power can be conserved by pausing the slide show when running on battery power.

PowerShell

Prepare for installation requirements

Prepares a partition so the operating system can use it.

Printers directly attached to your computer can be made accessible to other users on the network.

Printing

Private network

Incorrect configuration

Probably the most common source of problems with wireless networking is incorrect configuration settings. Before considering other problems, perform the following:

o

Program windows can be moved and resized.

Prohibit access of the Windows Connect Now wizards located in either Computer Configuration or User Configuration under Policies\Administrative Templates\Network\Windows Connect Now can be used to prohibit access to the WCN wizards. When enabled, all WCN wizards are disabled for the computer or the user.

o

Protect a Windows system by creating restore points.

o

Protect data on a Windows system by configuring data backups and recovering data from backups.

o

Protect files with File History.

o

Protocols

Provide appointment reminders and message notifications

Provides a broad view of all layers of the networking subsystem.

Provides an increase in performance

Provides an increase in performance for read operations. Write operations are slower with RAID 5 than with other RAID configurations because of the time required to compute and write the parity information.

Provides fault tolerance for a single disk failure.

Provides for dynamic key generation and rotation through the CCMP protocol.

Provides redundancy and performance.

o

Provision packages.

o

Provision user accounts.

o

Provision with the Windows Imaging and Configuration Designer (ICD) tool.

Public IPv6 addresses are grouped by major geographic region, such as a continent.

Public folder sharing

Public folder sharing is a way to share files with other users on the network. When Public folder sharing is enabled, network users can access files stored in the folders within C:\Users\Public.

Public network

Push down device driver settings to each system in the domain when the system boots and connects to the domain.

Slide

Putting your finger on the screen, then quickly moving it in one direction and holding for one second before releasing. Sliding is the equivalent of clicking and dragging with a mouse. The slide gesture is typically used to move an object on the screen.

Swipe

Putting your finger on the screen, then quickly moving it in one direction and releasing. By swiping, you can:

Quartets are separated by colons.

o

Query and configure activation states using the command line.

Quickly retrievable

Tap

Quickly touching the screen with your finger and immediately removing your finger from the screen. Tapping is the equivalent of clicking on the object with a mouse.

o

RSS viewer

Radio frequency wireless has trouble transmitting through certain materials, such as concrete or earth.

Radio signals above 5 GHz are more carefully regulated, resulting in less interference from other wireless products.

1.

Reboot the computer from the operating system installation disc.

o

Rename the connection.

Replication is the process of copying changes made to the Active Directory database between all of the domain controllers in the domain.

Request authentication for inbound and outbound communication.

Request timed out indicates that the destination computer did not respond to the ping requests.

Require a password on wakeup

o

Resolve driver issues.

o

Resolve hardware and device issues.

Resolve hardware conflicts:

o

Resources by connection

o

Resources by type

o

Restart

5.

Restore data from the backup.

o

Restore previous versions of files and folders.

Restrict access to Control Panel features.

o

Restrict access to files and folders using encryption and NTFS.

o

Revert the system to a restore point that was created before the device was updated or added.

o

Revert the system to a restore point that was created when the system ran correctly.

2.

Right-click the video adapter and click Update Driver Software.

o

Roll back the driver used by the suspect device.

o

Roll back updates.

Rollback to a previous version of a driver. Because Windows stores only one previous version for a driver, driver rollback can restore only the immediately preceding version of the driver.

Router advertisement (RA) is a message sent by the router both periodically and in response to RS messages to inform clients of the IPv6 subnet prefix and the default gateway address.

Router solicitation (RS) is a message sent by the client to request that routers respond.

Router-to-router

Routers never forward packets destined for link-local addresses to other subnets.

Routing and Remote Access

Routing and Remote Access is a network service that provides the following access:

Run

Run a manufacturer-specific SSD software utility. Most SSD manufacturers have specialized utilities that can check for errors and optimize an SSD's performance.

Run the Optimize-StoragePool PowerShell cmdlet using the following syntax:

Screen resolution

Screen saver settings

Scripts that should run at logon or logoff

Scripts that should run at startup or shutdown

Scroll to different parts of a screen by swiping up, down, left, or right.

Windows Logo + T

Scrolls through the items on the taskbar.

Search

Search, which allows you to perform searches for any searchable item on your computer such as programs, files, and email messages. You can also use the search feature to perform Internet searches.

Second screen only

add dnsserver adds a DNS server address for a specific interface and changes the mode to static configuration.

4.

Select Advanced system settings.

o

Select Internet Protocol Version 4 (TCP/IPv4) to manage the properties for IPv4.

o

Select Internet Protocol Version 6 (TCP/IPv6) to manage the properties for IPv6.

3.

Select Restore.

2.

Select System and Security.

3.

Select System.

Select a Program Event, then press Test to hear the sound associated with that event.

Select a new sound for that event from the Sounds drop-down menu or select Browse to select a different sound in a .wav file on the computer.

Select a theme by selecting the theme's icon. Screen characteristics automatically change when a theme is selected.

Select multiple display options:

Select power management settings to adjust display brightness and other power settings that conserve energy or maximize performance.

3.

Select the folders and files you wish to automatically sync with OneDrive.

select part partition_number

Selects a specific partition on the selected disk.

3.

Send a name resolution request to a DNS server. The DNS server then checks its cache and hosts file. If an entry is not found, the DNS server checks any zone files that it holds for the requested name. Zone files include the following records:

4.

Send a name resolution request to a root-level DNS server. The root-level server responds with the IP address of a DNS server that is authoritative for the IP address being resolved. An authoritative server is a DNS server that responds to resolution requests for domain names in one or more zones. A request is then sent to the authoritative server, which responds with the IP address.

Service manuals

o

Share a OneDrive link

o

Share network resources.

Shared key authentication is commonly implemented on small wireless networks such as home or small office networks.

Shared key authentication is less secure than 802.1x authentication. Because all hosts use the same key, it must be widely disseminated. As such, there is a risk that the key could be knowingly or unknowingly disclosed to an unauthorized user.

Start menu shortcuts

Shortcuts for commonly used Windows utilities are displayed when you right-click the Start menu icon, including:

Show color on Start, taskbar, action center, and title bar.

o

Shut down

Shut down or sign out

Shut down the system

o

Sideload apps by using Microsoft Intune.

o

Sideload apps into online and offline images.

Similar to IPv4 addresses, a DNS server holds zone records for IPv6 addresses:

o

Simple volumes use a single hard disk.

Simple, which does not provide any redundancy. This option adds space from the storage pool to the storage space. When you select the Simple option, all of the data in the storage space is lost if one of the drives fails.

Simplifies security administration.

o

Sleep

o

Slide show

Smaller cluster sizes, which allow for efficient storage.

Ease of adding space

Storage spaces eliminate the need for tasks such as repartitioning drives, resizing volumes, and backing up data in order to repartition. When you need more disk space for your storage spaces, follow these steps:

Some newer 802.11a or 802.11g devices provide up to 108 Mbps using 802.11n technologies (MIMO and channel bonding).

Space is added to a user's storage space as the user consumes space.

o

Span

o

Spanned volumes use disk space from multiple hard disks. The volume size is the total size of all space on all disks allocated to the spanned volume.

Specific IP address

select disk disk_number

Specifies which disk in the system you want to manage.

Specify if a user can view and/or change a registry value, view sub-keys, or modify key permissions.

2.

Specify one of the following partition formats:

Specify the Wait time (in minutes). This is the time the screen must be inactive before the screen saver activates.

o

Specify the monitor to be the main display

Specification

Standard

Standard application tiles. Selecting an application tile starts the associated application. Two types of applications are implemented in Windows 10:

Standardized packet header size, enabling routers and devices to transfer IPv6 packets at faster rates

Start programs

Start programs.

Start utilities used for file and folder access

Start utilities used to configure and manage the system

Stateless DHCPv6 does not provide the client an IP address and does not track the status of each client, but rather supplies the client with the DNS server IP address. Stateless DHCPv6 is most useful when used in conjunction with stateless autoconfiguration.

o

Sticky notes

Storage

Data resiliency

Storage spaces can include data resiliency. Choosing an option that provides resiliency requires you to allocate space for redundant information. Storage spaces data resiliency options include:

Storage spaces define logical units of space created from a pool. One or more storage spaces can be created from the pool. To the Windows system and the user, storage spaces appear as disks with typical drive letters assigned (e.g., E: drive, F: drive, etc.).

System

o

Stretch

o

Striped (RAID 0) volumes break data into units (called stripes) and store the units across a series of disks by reading and writing to all disks simultaneously. The volume size is the total size of all space on all disks allocated to the array.

o

Striped with Parity (RAID 5) volumes combine disk striping across multiple disks with parity for data redundancy.

Subnet

o

Subscribe to the Azure RemoteApp and Desktop Connections feeds.

o

Support Mobile Device Management by using Microsoft Intune, including Windows Phone, iOS, and Android.

Support Windows Store and cloud apps

Support authentication and authorization

o

Support broadband connectivity, including broadband tethering and metered networks.

Support data security

Support data storage

Support desktop apps

o

Support iOS and Android, configure remote desktop web access for Azure RemoteApp distribution.

o

Support mobile access and data synchronization, including Work Folders and Sync Center.

o

Support mobile device policies, including security policies, remote access, and remote wipe.

Support mobile devices

Supports both pre-shared Key (referred to as WPA2-PSK or WPA2 Personal) and 802.1x (referred to as WPA2 Enterprise) authentication.

Supports both pre-shared key (referred to as WPA-PSK or WPA Personal) and 802.1x (referred to as WPA Enterprise) authentication.

Supports open, shared key, and 802.1x authentication.

System Protection

System documentss

o

System management icons (such as for networks, sound volume, and removable devices)

TKIP provides for dynamic key rotation, which also helps protect against IV reuse.

TLS (uses certificates for client authentication)

TTLS

The Problem Devices option under Components lists devices that cannot start, devices that do not have drivers installed, or devices that have some other issue.

Double-tap

Tapping the screen twice. Double-tap is the equivalent of a double-click with a mouse.

Task Manager

o

Temporarily connect to open hotspots when they are in range to see if paid Wi-Fi services are available.

Temporary Internet files

Client Pro

TestOut Client Pro Certification tests proficiency concerning the following objectives:

TestOut Client Pro, which tests your ability to perform tasks necessary to support Windows 7 and Windows 10.

Tests and traps many conditions that might otherwise go unnoticed during normal operation.

Text size

The 128-bit address contains two parts:

The 2.4 GHz range has a total of 11 channels, three of them non-overlapping. This allows for a maximum of 1 non-overlapping channel. For this reason, channel bonding is typically not practical for the 2.4 GHz range.

The 5.75 GHz range has a total of 23 channels, 12 of them non-overlapping. This allows for a maximum of six non-overlapping bonded (combined) channels.

o

The 64-bit prefix can be divided into various elements, with each part having a specific meaning. Elements in the prefix identify the geographic region, the ISP, the network, and the subnet.

Channel interference

The 802.11b/g standards use the 2.4 GHz frequency range, which is divided into 11 channels, each channel overlapping adjacent channels. You might experience problems with your wireless network when other devices are trying to use the same or adjacent channels. Devices that use this frequency range include:

o

The AAAA record maps a DNS host name to a 128-bit IPv6 address.

The Active Directory database is located on one or more servers in the domain.

The Adapter tab displays the amount of video memory installed in the system. Select List All Modes to view the modes that will work with the installed video card.

Check Disk

The Check Disk utility verifies the file system integrity of a hard disk. Errors that can be checked and fixed by Check Disk include the following:

The Color Management tab is used to adjust the color on the screen to match the color of printed documents. Color management is controlled by using profiles associated with a specific device, such as a printer.

o

The Computer link provides access to the file system.

o

The Control Panel link provides access to adjust the computer's settings.

The DHCP server assigns IP address and subnet mask values to the host (called an address lease).

Dynamic Host Configuration Protocol (DHCP)

The DHCP service assigns IP addresses and other configuration information to IP hosts on the network.

o

The DevicePath registry key identifies the folders (or subfolders) on the local computer or network share that Windows searches for device drivers. You can stage a driver using these alternate paths by copying the driver to that location, then identifying the path in the DevicePath registry key.

Disk Cleanup

The Disk Cleanup utility helps manage disks by locating and disposing of files safe to remove from the disk, compressing old files, and deleting the following:

The Domain location profile is applied to network connections when the computer is connected to an Active Directory domain. This location profile is automatically selected when the computer connects to the domain controller.

Driver Verifier

The Driver Verifier tool (verifier.exe) is a command line tool that identifies devices drivers that will fail if memory usage or CPU usage is above or below a certain limit. The Driver Verifier tool enables you to monitor device drivers and to detect issues and actions that might cause problems. You start Driver Verifier from the command line by typing verifier. Driver Verifier:

Driver Verifier

The Driver Verifier tool enables you to monitor device drivers and to detect issues and actions that might cause problems. You start Driver Verifier from the command line by typing verifier. Driver Verifier:

o

The File Explorer icon provides access to the file system.

File Signature Verification

The File Signature Verification tool (sigverif.exe) scans the computer and identifies any unsigned drivers.

The Public location profile is applied to an untrusted network connection. For example, if you connect to a public wireless network connection at an airport or hotel, this location profile is applied.

HomeGroup connections

The HomeGroup connections option is only available in the private network profile. It is used to determine how authentication works for connections to HomeGroup resources.

Geographic assignment of addresses

The Internet Corporation for Assigned Names and Numbers (ICANN) assigns IPv6 addresses based on the following method:

The Internet is classified as a public network. All devices on the public network must have a globally-unique registered IP address; this address is assigned by the ISP. No two hosts on a public network can have the same IP address. The Internet Assigned Number Authority (IANA) controls and issues public addressing.

1.

The Local Group Policy on the computer.

Microsoft System Information

The Microsoft System Information tool is another option you can use to resolve hardware conflicts. You can load the Microsoft System Information tool by running MSinfo32.exe from the command prompt. The Microsoft System Information tool:

Microsoft System Information

The Microsoft System Information tool is another way to resolve hardware conflicts. You can load the Microsoft System Information tool by running MSinfo32.exe from the command prompt. The Microsoft System Information tool:

The Monitor tab is used to configure the refresh rate. LCD monitors have a single refresh rate that should be used. For CRT monitors, choose the highest refresh rate supported by the monitor.

o

The Monitoring Overview Page displays the profiles that are active and the settings for the active profiles.

Neighbor Discovery (ND)

The Neighbor Discovery (ND) protocol, in conjunction with ICMPv6 messages, replaces the Address Resolution Protocol (ARP) to discover the addresses of other interfaces on the network. ND can also automatically generate the IPv6 address for hosts (if configured).

o

The Network icon allows you to browse the network for shared resources.

o

The PTR (pointer record) can be used with IPv6 to map an IPv6 address to a DNS host name.

The Power button is displayed at the bottom left of the Start menu. Clicking this button lists system shut down options, including:

The Private location profile is applied to a trusted (private) local area network.

o

The remaining prefix values are set to 0.

The Recycle Bin holds all deleted files. Deleted files can be restored from the Recycle Bin. If the file is deleted from the Recycle Bin, it is also deleted from the file system.

o

The Resources tab of Properties for the device identifies resources being used by the device.

The SATA cable is unplugged.

SSID (Service Set Identifier)

The Service Set Identifier (SSID), also called the wireless network name, identifies the wireless network to wireless clients. The SSID is configured on the WAP in infrastructure mode and on the initial wireless client for ad hoc mode. By default, the SSID is periodically broadcast to announce the availability of the wireless network. All devices on the same network must use the same SSID.

o

The Settings icon launches the Settings app.

The Start button is located on the left end of the taskbar.

Start menu

The Start menu is accessed using the Start button located in the lower left corner of the desktop. The Start menu is used to:

The Start menu provides access to the applications installed on the computer. When you select an application's tile, the application launches.

The System log may contain errors related to network services.

o

The User icon allows you to:

The Windows Firewall interface in Control Panel allows you to create basic rules that are applied to the network traffic generated by a specific program or service.

The Windows Firewall with Advanced Security (WFAS) interface allows much more complex rules to be created. For example, you can create rules based on the following:

Windows Network Diagnostics

The Windows Network Diagnostics tool analyzes the computer's network connection and verifies connectivity. If there are problems with the connection, this tool will attempt to diagnose the problem and present possible solutions.

The Windows driver store is a protected area containing device drivers that have been approved for installation on the computer. You can preload drivers for commonly used peripheral devices. After a device driver is in the driver store, a non-administrative user on the computer can install the device without additional permissions.

The ability of newer devices to communicate with older devices depends on the capabilities of the transmit radios in the access point. For example, some 802.11n devices can transmit at either 2.4 GHz or 5.75 GHz.

Change the administrator account name and password

The access point typically comes configured with a default username and password that is used to configure the access point settings. If possible, it is important to change the administrator account name and password from the defaults. This helps prevent outsiders from breaking into your system by guessing the default username and password.

The active partition is the one whose operating system will boot. A system can have only one active partition at a time.

The active primary partition is represented by the drive letter C:.

The actual speed and maximum distance of a wireless network depends on several factors, including obstructions (such as walls), antenna quality, antenna location, and interference.

Anycast

The anycast address is a unicast address that is assigned to more than one interface, typically belonging to different hosts. An anycast packet is routed to the nearest interface having that address (based on routing protocol decisions).

The bottom right corner of the Start menu has a Shut down button, which shuts down the computer. Clicking the arrow to the right of the Shut down button lists power options, including:

The broadcast address is the last address in the address range and is used to send messages to all hosts on the network.

The channels used by 5 GHz radio signals offer many more channels with much less overlap, reducing the likelihood of overlapping wireless networks.

o

The common name is the domain name itself.

o

The remaining two quartets use the IPv4 address, written in either dotted-decimal or hexadecimal notation.

o

The computer you are accessing files from must have the Fetch Files feature enabled. Enable this features by selecting Let me use OneDrive to fetch any of my files on this PC on the Settings tab of the OneDrive Settings window.

Allow the connection if it is secure

The connection is allowed if the traffic meets the rule conditions and is authenticated using one of the methods specified in the connection security rules.

Allow the connection

The connection is allowed if the traffic meets the rule conditions.

Block the connection

The connection is blocked if the traffic meets the rule conditions.

o

The current date and time

The default block size of 512 bytes limits partitions to a maximum size of 2 TB.

o

The default gateway address must be on the same subnet as the host computer. Routers have multiple network interface cards attached to multiple networks. When configuring the default gateway, choose the address on the local subnet.

The default gateway is a device that performs routing and enables communication with hosts on other networks.

Desktop Background

The desktop background can be a picture or a solid color. The desktop background can be customized as follows:

Desktop

The desktop encompasses the entire user interface. Key features of the desktop are:

The destination computer must be running Windows 10 or Windows Server 2016. You cannot move a Windows 10 storage space to an older version of Windows, even if it supports storage space technology (such as Windows 8.1).

The digital signature ensures that the driver comes from a legitimate source and that no malware has been introduced into the driver.

Up to 128 partitions on a storage device are allowed.

o

The distinguished name includes the DNS context or additional portions of the name.

o

The distinguished name of the domain is composed of the domain name itself along with the DNS (Domain Name System) context.

The drive is malfunctioning.

o

The driver store is located in C:\Windows\System32\DriverStore.

The driverquery utility provides a list of all of the signed and unsigned drivers on the system and can be used to manage drivers.

The dxdiag tool identifies problems with DirectX and other graphics enabled devices. The tool also checks to see if the system's graphics drivers are signed.

The far left side of the Start menu lists links to various utilities:

Prefix

The first 64-bits are known as the prefix.

o

The first two quartets of the interface ID are set to 0000:5EFE.

o

The folder containing the photos to use for the screen saver.

Screen Saver Setting

The following options are available on Screen Saver Settings:

o

The following support considerations including:

o

Update Windows Store apps.

Always present

The hardware does not have configurable parameters. The software interface is loaded from the BIOS or UEFI firmware. A good example is the built-in real-time clock (RTC) on the computer's motherboard.

Usually present with variable parameters

The hardware has unique parameters that need to be configured for the specific device. The driver is loaded from the BIOS or UEFI firmware and the parameters it needs to support the hardware are usually stored in the motherboard firmware. A good example is a hard disk drive.

1.

The host generates an IPv6 address using the link-local prefix (FE80::/10) and modifies the MAC address to get the interface ID. For example, if the MAC address is 20-0C-FB-BC-A0-07, the link-local address for the interface would be FE80::220C:FBFF:FEBC:A007.

2.

The host sends a neighbor solicitation (NS) message addressed to its own link-local address to see if the address it has chosen is already in use:

3.

The host waits for an RA message from a router to learn the prefix:

The hosts are linked together by some type of local network connection.

The hosts are not connected by a local area network.

The internal network is classified as a private network. All devices on the private network use private IP addresses internally, but share the public IP address when accessing the Internet.

Ipconfig

The ipconfig command displays all current TCP/IP network configuration values and refreshes the DHCP and DNS settings. Use the ipconfig command as follows:

The key values are short, making the key easy to predict.

Interface ID

The last 64-bits are the interface ID. This is the unique address assigned to an interface.

The left side of the Start menu lists applications installed on the computer. When you select an application icon, the application launches.

Loopback

The local loopback address for the local host is 0:0:0:0:0:0:0:1 (also identified as ::1 or ::1/128). The local loopback address is not assigned to an interface. It can be used to verify that the TCP/IP protocol stack has been properly installed on the host.

The local routing table

Access point placement

The location of the access point can affect signal strength and network access. Keep the following recommendations in mind:

The location of the background picture can be selected from the list displayed. You can also select Browse to use other pictures on the system as the background.

The logs detail a specific error or issue, which can help diagnose network problems.

The master boot record must be installed in the first 512 bytes of the hard disk.

o

The monitoring session will display information about current firewall rules, connection security rules, and the security associations.

The more information is on the drive, the more time it takes to defragment it.

Netsh

The netsh command displays TCP/IP information for both IPv4 and IPv6 addresses.

Netstat

The netstat command shows IP statistics, which includes the following information:

May or may not be present

The wide variety of the hardware included in this category prevents drivers from being stored in the motherboard firmware. Drivers for this category of hardware are loaded by the operating system as the system boots. These drivers may be distributed on a disc with the hardware, on the manufacturer's website, or with the Windows operating system itself. A good example is a network interface or a sound card.

o

The wireless network radio signal is not emanating outside your facility.

The network address is the first address in the address range and cannot be assigned to a host.

The notification area is displayed at the right end of the taskbar. The notification area displays:

Nslookup

The nslookup command resolves (looks up) the IP address of a hostname. It also displays other name resolution-related information, such as the DNS server used for the lookup request.

The only way to convert a drive from NTFS to FAT32 is to reformat the drive (which will destroy all files on the drive). If necessary, back up the drive before formatting it so you can restore the data to the new volume.

Override block rules

The override block rules option allows you to specify a computer account or computer group that can bypass existing block rules.

Pathping

The pathping command provides a similar function as the tracert utility by identifying problems with routes to remote hosts. For example, using the -h switch, you can determine the maximum number of hops in a particular route.

The picture display options are as follows:

Ping

The ping command verifies IP connectivity between two nodes in a network by sending ICMP packets and measuring response time in milliseconds. The following error messages may occur when you use ping:

The power connector is unplugged.

o

The prefix is the equivalent of an IPv4 subnet mask.

o

The prefix is the well-known link-local prefix: FE80::/16.

o

The prefix length identifies the number of bits in the relevant portion of the prefix. To indicate the prefix length, add a forward slash (/) followed by the prefix length number. Full quartets with trailing 0s in the prefix address can be omitted (e.g., 2001:0DB8:4898:DAFC::/64).

The right side of the Start menu lists links to various parts of the operating system:

o

The servers running the Active Directory database are called domain controllers.

The short initialization vector results in quick reuse of the initialization vector. This allows hackers to easily crack the key.

The sigverif tool scans the computer and identifies any unsigned drivers.

o

The slide show speed.

The speed of data transmission decreases as the distance between the transmitter and receiver increases. In other words, in practice, you can get the maximum distance or the maximum speed, but not both.

The subnet mask is a 32-bit number associated with each IPv4 address. A subnet mask identifies the network portion of the address.

o

The system will automatically detect a basic disk and assign it a drive letter.

Taskbar

The taskbar is the bar along the bottom of the screen. The taskbar in Windows 7 consolidates features that were separate in previous versions of Windows:

Taskbar

The taskbar is the bar that runs along the bottom of the screen by default. Be aware of the following facts about the taskbar:

Tracert

The tracert (trace route) command tests connectivity between two devices and displays the path between them. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach and be returned by that host. This is useful for troubleshooting connectivity problems between specific network segments.

Unspecified

The unspecified address is 0:0:0:0:0:0:0:0 (also identifies as ::: or :::/128). The unspecified address is used when there is no IPv6 address. It is typically used during system startup when the host has not yet configured its address. The unspecified address should not be assigned to an interface.

The volume can be extended using only contiguous free space on the same disk.

o

The volume is running out of space and you have free space available on the disk or on other disks in the system.

Update the SSD's firmware. Newer firmware versions are released to fix bugs and optimize how the SSD stores data.

Workgroup

The workgroup model is based on peer-to-peer networking. In the workgroup model:

Themes

Themes are predefined settings that are used to change the desktop background, window color, sounds and screen saver settings all at once. Be aware of the following when selecting a theme:

There are a variety of default themes that you can use, including High Contrast themes that make the screen and Windows easier to read.

There are no broadcast addresses in IPv6. IPv6 multicast and anycast addresses are used instead of broadcast addresses.

There are several reasons for expanding or shrinking a volume.

They are created by default.

They cannot be created, moved, renamed, or deleted.

They have very few editable properties.

Thin provisioning is based on the premise that not all users will use all space in their allocated storage space.

Thin provisioning

Thin provisioning or overbooking allows you to allocate larger storage spaces than the disk space available in the pool.

Adjust resolution / Change display settings

This option changes the resolution of the monitor and manages multiple displays. The monitors currently connected are shown on the screen and numbered. The following options are available:

Change size of items

This option customizes the size of text and other items on the screen. Three options are available: smaller, medium, and larger.

Adjust brightness

This option is implemented only on mobile devices. It is used to select a power plan to maximize the computer's performance or to conserve energy. Other options from this screen are as follows:

Project to a second screen

This option is only on mobile devices. It is used to manage displays when the system is connected to a projector. The following options are available:

This rule type is useful if you are not sure of the port or other settings required to allow access.

This type of rule usually protects connections between servers.

Three-way mirror requires at least five storage devices as the data is written redundantly to three storage devices. This option provides redundancy if two storage devices fail at one time.

o

Tile

o

Tiles displayed on the right side of the Start menu are pinned to it. A pinned application is always displayed on the Start menu for easy access.

Tiles

Tiles replace application icons in Windows 10. Two types of tiles are used:

To change how Windows provides notifications when the firewall blocks a new program, use one of the following options:

Sounds

To configure sound settings, select Sounds. You can choose a predefined Sound Scheme from the drop-down menu. You can also customize a Sound Scheme as follows:

To convert from binary to decimal (and vice versa) memorize the decimal equivalent of the following binary numbers:

To convert from binary, take each bit position with a 1 value and add the decimal values for that bit together. For example, the decimal equivalent of 10010101 is: 128 + 16 + 4 + 1 = 149

To determine if your disk needs to be defragmented, use the Analyze option in Disk Defragmenter before running a full defragmentation. If defragmentation is recommended, use the Optimize option in Disk Defragmenter.

To discover if workstations are on the same subnet, perform the following calculation:

To edit the IP properties of a network connection, click the connection link, and then click Properties.

o

To enable OneDrive to automatically sync files stored in your library folders, complete the following steps:

o

To enable automatic syncing for files stored in your OneDrive account locally, complete the following steps:

o

To fetch files, access https://onedrive.com and log in to your OneDrive account. A list of your devices and computers with the Fetch Files feature enabled is displayed.

To identify the system resources used by a device (including conflicts), view the device properties in Device Manager and access the Resources tab. Alternatively, use the Microsoft System Information utility (Msinfo32.exe) to view the resources used by a device.

To improve defragmentation, disable programs that run in the background, like screen savers and virus software. Any disk access (reading from or writing to the disk) while Disk Defragmenter is running significantly slows the defragmentation process.

To monitor the firewall status, use the Monitoring option in the WFAS console.

o

To run disk defragmentation on a custom schedule, use Scheduled Tasks in Computer Management.

USB/FireWire

To troubleshoot USB and FireWire devices, consider the following:

To view overall resource usage by all devices in the system, including resource conflicts, select View in Device Manager and then select one of the following:

To view the current IP configuration details for the network connection, click the connection link, and then click Details.

Use the Quota tab in Disk Properties.

Tap and Hold

Touching the screen and leaving your finger on the screen. This is the equivalent of right-clicking. This gesture is primarily used with desktop apps.

Track disk usage. Usage quotas are referred to as soft quotas. They do not prevent users from exceeding limits, but log events when users exceed limits.

Track usage and restrict disk consumption. Consumption quotas are referred to as hard quotas. They deny disk space to users exceeding limits.

o

Traditional desktop applications similar to those used in previous versions of Windows.

o

Use the Windows Assessment and Deployment Kit (ADK).

o

Troubleshoot data access and usage.

o

Troubleshoot network issues.

o

Troubleshoot performance issues.

o

Troubleshoot storage and removable devices issues.

Tunneling

Tunneling wraps an IPv6 packet within an IPv4 packet, allowing IPv6 hosts or sites to communicate over the existing IPv4 infrastructure. With tunneling, a device encapsulates IPv6 packets in IPv4 packets for transmission across an IPv4 network, and then the packets are de-encapsulated to their original IPv6 packets by another device at the other end.

o

Turn Windows Firewall on or off

o

Turn off ability to configure Windows portable device (WPD) prevents Windows from being able to configure portable media players, digital cameras, and mobile phones.

o

Turn off ability to configure using WCN over Ethernet (UPnP) prevents the configuration of network devices using Universal Plug and Play (UPnP). UPnP is a network protocol that allows network devices to discover each other's presence on the network and establish functional network communications.

o

Turn off ability to configure using WCN over in-band 802.11 Wi-Fi prevents Windows from configuring wireless devices.

o

Turn off ability to configure using a USB flash drive prevents Windows from saving a WCN configuration to a USB flash drive.

o

Turn the wireless adapter off or on.

Two-way mirror requires at least two storage devices as the data is written redundantly to two devices. This option protects data from a single storage device failure.

Use the fsutil quota command.

Under Advanced Settings on the Wi-Fi page, you can:

Under Manage Wi-Fi Settings on the Wi-Fi page, you can:

5.

Under Performance, choose Settings.

Unicast

Unicast addresses are assigned to a single interface for the purpose of allowing that particular host to send and receive data. Packets sent to a unicast address are delivered to the interface identified by that address.

(255 characters, spaces)

Unicode

Unified tracing

Unified tracing identifies and resolves network connectivity by collecting event logs and capturing packets across all layers of the networking subsystem. Unified tracing:

Uninstall or remove the disk from the system configuration.

Unique local addresses are globally unique, but are not globally routable. Unique local addresses might be routed between sites by a local ISP.

Unique local addresses have a FC00::/7 prefix. However, the 8th bit is always set to 1 to indicate that the address is local (and not global). Therefore, addresses beginning with FC or FD are unique local addresses.

Unmark Play Windows Startup sound for no sound at startup.

Unsigned driver installation

Devices and Printers

Use Devices and Printers in Control Panel to manage drivers for devices connected externally to the computer, such as printers, cameras, tablets, and phones. To troubleshoot issues with an external device or printer, right-click the device or printer icon and click Troubleshoot or Properties.

o

Use Disk Management for a dynamic disk. Right-click the disk to be removed and select Remove Disk.

Use Disk Management to check the status of the disk and, if necessary, repair volumes using the Repair option.

File System

Use File System policies to configure file and folder permissions that apply to multiple computers. For example, you can limit access to specific files that appear on all client computers.

o

Use Windows Backup and Restore.

Custom

Use a custom rule to authenticate connections between two endpoints when you cannot set up authentication rules with the other types of rules.

Use chkdsk with the /f switch to automatically fix errors without scanning for bad sectors.

o

Use deployment tools.

o

Use directional access points along the perimeter of work areas and direct the signal toward the center of the facility.

Use ipconfig with no switch to view the IP address, subnet mask, and default gateway.

Use logging to track dropped/allowed packets or firewall connections.

Use of 4,096-byte sectors increases the maximum partition size on a disk.

Use of Windows features such as BitLocker, Offline files and Parental Controls.

o

Use omni-directional access points in the center of work areas.

o

Use reports and In-Console Monitoring to:

Use show address to display information about static IP addresses and default gateways.

Use show config to display IP address and other configuration information as assigned through DHCP.

Use show dns to display the DNS configuration.

Software Restriction Policies

Use software restrictions policies to define the software permitted to run on any computer in the domain. These policies can be applied to specific users or all users. You can use software restrictions to:

Use the /all switch to view detailed configuration information, including the DHCP and DNS server addresses.

Use the /flushdns switch to force the client to flush its DNS cache.

Use the /r switch to scan and fix bad sectors and other errors.

Use the /release (IPv4) and /release6 (IPv6) switches to release the configuration information obtained from the DHCP server.

Use the /renew (IPv4) and /renew6 (IPv6) switches to request new configuration information from the DHCP server.

o

Use the Deployment Image Servicing and Management (DISM) tool to add packages.

Network and Sharing Center

Use the Network and Sharing Center to perform the following tasks:

o

Use the PnPUtil (pnputil.exe) command line utility to add or remove drivers from the driver store.

Use wireless survey tools to verify that:

Disable-NetFirewallRule

Used to enable (Enable-NetFirewallRule) or disable (Disable-NetFirewallRule) an existing firewall rule. To specify which rules are affected, use the following parameters with these cmdlets:

o

User account areas provide access to users' personal folders, documents, pictures, and music.

User forums

User Configuration

User policies are enforced for specific users. User policy settings include:

Users

Method

Uses

Uses 50% of the total capacity of the drives due to mirroring.

Uses Advanced Encryption Standard (AES) with a 128-bit key and a 48-bit initialization vector for encryption, which is more secure than TKIP.

Uses CRC-32 for data integrity, which is applied to the data only (not the header).

Uses Cipher Block Chaining Message Authentication Code (CBC-MAC) for data integrity applied to both the data and the header.

Uses Counter Mode with CBC-MAC Protocol (CCMP).

Uses RC4 with a 128-bit key and a 48-bit initialization vector (IV) for encryption.

Uses Rivest Cipher 4 (RC4) with a 40-bit key and 24-bit initialization vector (IV) for encryption. (Most later implementations used a 104-bit key.)

Uses Temporal Key Integrity Protocol (TKIP) for encryption.

Uses a 2001::/32 prefix followed by the IPv4 public address converted to hexadecimal. For example, the IPv4 public address of 207.142.131.202 would provide clients with the prefix 2001:0:CF8E:83CA::/64.

Uses a dynamic association of an IPv6 site prefix to the IPv4 address of the destination tunnel endpoint.

Uses a static (manual) association of an IPv6 address with the IPv4 address of the destination tunnel endpoint.

Uses the Message Integrity Check (MIC) algorithm (also called Michael) for data integrity and is applied to both the data and the header.

Uses the netsh tool and the network monitor tool.

o

Using binary notation (e.g., 10000011.01101011.00000010.11001000). Each octet is an 8-character number.

Using classless addresses uses Classless Inter-Domain Routing (CIDR).

Using custom subnet masks is often called classless addressing because the subnet mask cannot be inferred from the class of a given IP address.

o

Using decimal notation (e.g., 131.107.2.200). Each octet must be between 0 and 255.

Using one partition for operating system files and another for data files can sometimes help the system run more smoothly and minimize damage in the event of a system crash.

Shared key

Using shared key authentication, all clients and access points are configured with the same security key (called a secret or passphrase). Only devices with the correct shared key can connect the wireless network.

Using stateful DHCPv6, the DHCP server provides each client with the IP address, default gateway, and other IP configuration information (such as the DNS server IP address). The DHCP server tracks the status (or state) of the client.

Stateless autoconfiguration

Using stateless autoconfiguration, clients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP). NDP uses the following messages for autoconfiguration:

Static full assignment

Using static full assignment, the entire 128-bit IPv6 address and all other configuration information is statically assigned to the host.

Static partial assignment

Using static partial assignment, the prefix is statically assigned, and the interface ID uses the modified EUI-64 format derived from the MAC address.

o

Using the multicast address FF02::1, the router sends out an RA message addressed to all interfaces on the subnet.

Verify BIOS/UEFI firmware settings for onboard USB and FireWire interfaces. Make sure motherboard ports are enabled and that the correct USB version is configured.

Verify that the correct SSID and passphrase have been configured. Remember that the SSID and WPA/WPA2 passphrases are case sensitive.

Verify that the device is recognized and enabled in Device Manager.

View a graphical representation of network connections.

View a list of available configured network connections using the Change adapter settings option. Right-click a connection to:

o

View and manage all managed devices.

o

View connection properties.

View different screen elements, such as the scroll bar, Charms menu, and apps.

View driver settings and detailed information about the driver, including the files used for the driver software. The driver information can be viewed on the Driver tab in Properties of installed devices.

o

View online

o

View the connection properties.

o

View the status.

Virtual private network (VPN) remote access server

Vista clients query the DNS server for a router named ISATAP. When using ISATAP, be sure to use this name for the server or create an A or CNAME record in DNS using ISATAP as the name and pointing to the ISATAP router.

Vista clients will use ISATAP automatically if they can find the ISATAP router.

WCN allows wireless network settings to be saved to a USB flash drive. You can quickly add wireless devices to the network by loading the settings from the flash drive.

Windows Connect Now (WCN)

WCN provides two methods for simplified configuration of network devices and computers.

WCN supports push button connect, which is a wireless feature available with access points and network interfaces that support Wi-Fi Protected Setup (WPS). End users do not need to know how to configure wireless parameters such as SSID or the security passphrase. Pushing a button on the wireless access point and on the network interface initiates communications between the two devices to negotiate security parameters for the connection.

Wired Equivalent Privacy (WEP)

WEP is an optional component of the 802.11 specifications and was deployed in 1997. WEP was designed to provide wireless connections with the same security as wired connections. WEP:

WEP uses a weak implementation of RC4 encryption.

Wi-Fi Protected Access (WPA)

WPA is the implementation name for wireless security based on initial 802.11i drafts and was deployed in 2003. It was intended as an intermediate measure to take the place of WEP while a fully secured system (802.11i) was prepared. WPA:

Wi-Fi Protected Access 2 (WPA2) or 802.11i

WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications and was deployed in 2005. This implementation is built upon the idea of Robust Secure Networks (RSN). Like WPA, it resolves the weaknesses inherent in WEP and replaces both WEP and WPA. WPA2:

Well-organized and easy to locate

Color

When Color is selected, the following options are available:

When a device driver is approved, Microsoft provides the driver manufacturer with a digital signature to be included with the driver files.

Wireless network icon

When a wireless network adapter is installed and configured, a wireless network icon is displayed in the notification area. Windows uses wireless profiles to remember connection settings to wireless networks. The profile contains information about the SSID, authentication type, and encryption mechanism for the network. Once the profile is saved, a user does not need to re-enter this information to connect to the wireless network.

o

When creating new RAID 0 and RAID 5 drives, all existing data on all disks will be lost.

File and printer sharing

When file and printer sharing is enabled:

When formatting a disk, you identify the file system type and identify the cluster size used to store data.

Media streaming

When media streaming is enabled, other network users can access music, pictures, and videos on your computer. Likewise, your computer will be able to find media files on other computers within the network.

Network discovery

When network discovery is on, your computer can see other network computers and devices and is visible to them, as well.

When the SSD is too full, performance will decrease significantly. If this happens, try enabling features such as TRIM support in the OS.

When using NTFS on removable storage devices, the Safely Remove Hardware utility must be used before removing the device in order to prevent file corruption.

When you assign an anycast address to an interface, you must explicitly identify the address as an anycast address (to distinguish it from a unicast address).

When you click the wireless network icon in the notification area, detected wireless networks are listed in order of signal strength.

When you configure a static IPv4 address, you must also configure the subnet mask and default gateway.

When you configure an access point, some configuration utilities use the term mixed mode to designate a network that has both 802.11n and non-802.11n clients. In this configuration, one radio transmitter is used for legacy clients, and the remaining radio transmitters are used for 802.11n clients.

o

When you connect a legacy device to the wireless network, all devices on the network operate at the legacy speed. For example, connecting an 802.11b device to an 802.11n or 802.11g access point slows down the network to 802.11b speeds.

When you enable some Windows features, the corresponding network traffic is automatically allowed through the firewall. You can check the Allowed apps and features list to verify that necessary traffic has been allowed.

o

When you move a dynamic disk to another computer, use the Rescan and Import Foreign Disks option in the Disk Management utility.

o

Whether pictures are shuffled or displayed in the order they appear in the folder.

While some RAID configurations provide fault tolerance in the event of a disk failure, configuring RAID is not a substitute for regular backups.

o

While the radio is capable of transmitting at either frequency, a single radio cannot transmit at both frequencies at the same time.

Virtual desktops

Windows 10 allows you to define and use multiple desktops. One set of applications can be displayed on one virtual desktop, while others are displayed in another virtual desktop. You add, switch between, and manage virtual desktops using the Task View icon in the taskbar.

Windows Management Instrumentation

Windows Management Instrumentation allows administrators to manage local and remote computers.

Windows Media Player Network Sharing Service

Windows Media Player Network Sharing Service allows users to share media on their computer with other network users.

Windows Media Player

Windows Media Player allows users to receive streaming media over an Internet Protocol (IP) network.

Windows Remote Management

Windows Remote Management allows remote management of the computer by the WS-Management protocol.

o

Windows Update updates the driver repository automatically.

o

Windows apps that come from the Windows Store and run only on newer versions of Windows (Windows 8.x and later).

Windows can only boot from a GPT partition on UEFI-based computers running 64-bit versions of Windows. All 64-bit versions of Windows 7 and later can use GPT drives for storing data, but they cannot boot from them without UEFI firmware on the motherboard.

Windows computers will use APIPA if a DHCP server cannot be contacted.

Windows error reports

Windows installation and configuration

Windows Firewall configuration interfaces

Windows provides two interfaces that can be used to configure the Windows firewall:

o

Windows runs disk defragmentation automatically by default. Use the Change Settings option on Disk Defragmenter to modify the schedule. You can modify the schedule to run daily, weekly, or monthly.

1.

Windows searches Windows Update.

2.

Windows searches the folders specified in the DevicePath registry key.

Windows supports FAT32, exFAT, and NTFS file systems.

o

Windows supports plug and play devices so that when a new hardware device is plugged into the computer, the operating system searches for the appropriate driver in the driver store.

Windows theme settings

You must specify the tunnel endpoints by IP address and specify the authentication method.

Range and obstructions

Wireless connections have a limited range. Moving a device to the edge of the network's effective range will weaken the signal and likely cause intermittent reception. Moving the device out of range will cause the connection to be completely dropped. When installing wireless access points, be aware of the following:

Wireless signals in the 5 GHz range do not penetrate solid objects as well as 2.4 GHz signals.

With shared key authentication, all access points and all clients use the same authentication key.

Objects

Within Active Directory, each resource is identified as an object. Common objects include:

Works through NAT.

Works with Windows

Workstations on different subnets cannot communicate with each other without a router.

Workstations with the same subnet masks may appear to be in the same subnet; however, they may be on different logical networks depending upon the IP address assigned to each one.

o

You can also see all events for WFAS in the Event Viewer.

You can also try moving the malfunctioning device to a different bus slot or connector.

You can click a wireless network in the list to manually connect to it or to specify to automatically connect whenever the wireless network is in range.

Inbound connections

You can configure inbound connections to follow one of the following settings:

Outbound connections

You can configure outbound connections to follow one of the following settings:

You can disable automatic switching between preferred networks (with different SSIDs) to solve certain problems that come with overlapping wireless networks, such as temporary interruptions to the user's connection or losing the connection entirely.

Enable IPsec

You can enable IPsec on your wireless connections to provide encryption of data transmissions.

o

You can export and import firewall rules to a binary file with the .wfw extension.

You can have link-local, unique local, or global unicast anycast addresses.

o

You can manually load drivers into the driver store.

Partitioning and formatting a storage device

You can partition a hard drive using Disk Management, PowerShell cmdlets, or the DiskPart command-line utility.

Resizing a volume

You can resize a volume by either expanding it or shrinking it. Be aware of the following:

o

You need to create a dual-boot system, but there is only one disk in the system, and it already has a single partition on it that is consuming all of the available disk space.

You can schedule disk defragmentation:

You can start by adding a single ISATAP router and configuring each host as an ISATAP client.

Firewall state

You can turn Windows Firewall on or off independently for each profile.

Device Manager

You can use Device Manager in Windows to:

o

You can use LLMNR to create ad hoc networks, or to find hosts on the local subnet without the use of a DNS server. LLMNR replaces the NetBIOS broadcast capabilities, but requires LLMNR-capable hosts.

You can use custom subnetting rather than using default subnet masks. For example, instead of using 255.255.255.0 with a Class C address, you might use 255.255.255.192 instead.

Registry

You can use registry policies to:

Reliability Monitor

You can use the Reliability Monitor to determine when a device driver was installed and if the reliability of the Windows system was affected by the device driver.

You can use the Windows Firewall Control Panel to allow only predefined exceptions for common programs for specific profiles. You must use the Windows Firewall with Advance Security snap-in to configure exceptions based on the port, protocol, or application, or to have greater control over when and how firewall rules are applied.

o

You cannot set more than one disk defragmentation schedule per computer using the Disk Defragmenter.

You must have administrator rights to run disk defragmentation.

You must reboot the system to complete the conversion if the disk contains the boot or system volume (or if the volume includes the page file).

You must specify the authentication type and the network endpoints between which communications are protected.

You must specify the path to the program executable file.

You must specify the protocol (TCP or UDP) and the local port number.

You're booting from the wrong disk, and it doesn't have an operating system installed. This is a very common issue. It frequently occurs when a CD or DVD is in your optical drive at system boot and the BIOS/UEFI is configured to boot from the optical drive first. The error message is displayed when an operating system can't be found on the optical disc. To fix this issue, simply remove the optical disc from the drive and reboot. This error could also be caused in situations where you have multiple hard disks in the system, but only one has an operating system installed. If the boot device setting gets inadvertently changed in the BIOS/UEFI, it will try to boot the system from the wrong hard disk.

Your master boot record (MBR) has been overwritten or is corrupt. The MBR is the first sector of your hard drive that tells the BIOS where to look for the operating system on the disk. If the MBR is damaged or corrupt, then the operating system will fail to load. On Windows, you have to boot from the installation disc to enter the recovery environment and select the Automatic repair option. Alternatively, you can select the Command Prompt option and run the bootrec command to rebuild the boot configuration data. You can also run the bootrec command with the following switches:

Windows Logo + (+/-)

Zooms in or out of the display.

o

[port_number] specifies an exact port number that must be present to match the rule. You can specify a specific port or a range of port numbers.

compress compresses the new volume.

connect connects to the specified wireless network.

label="label" assigns the specified label to the new volume.

(Binary: 11100000-11101111)

n/a n/a

(Binary: 11110000-11111111)

n/a n/a

Stateful autoconfiguration

o Obtains the interface ID, subnet prefix, default gateway, and other configuration information from a DHCPv6 server

Stateless autoconfiguration

o Sets the interface ID automatically

ping -6 tests connectivity between IPv6 hosts.

set address modifies the properties of an IPv6 address (e.g., the address type and valid lifetime).

set dnsserver specifies the mode for configuring DNS server addresses (static or DHCP), and allows a server address to be set when static is configured.

show interfaces displays the available wireless network interfaces on the computer.

show profiles displays the wireless profiles configured on the computer.

size=size specifies the amount of space (in MB) to add to the selected volume.


Kaugnay na mga set ng pag-aaral

Don't you even dare steal my flashcards for your evil Machiavellian ways..

View Set

Chapter 14 science cornell notes- The sun

View Set

Introduction to Early Childhood Exam Three

View Set