Microsoft #70-680

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Briefly describe the Programs category in Control Panel.

The Programs category in Control Panel has applets that are used to install, manage, and uninstall applications. You can also get a list of Windows Updates that have been installed and configure Windows Defender. Control Panel applets in the Programs category are: • Programs and Features • Default Programs • Desktop Gadgets

What are the major advantages of using NTFS?

• Log file and checkpoint consistency checks • Automatic bad cluster management • Transactional NTFS • File names stored in Unicode and 8.3 DOS format • Alternate data streams • Encrypted File System (EFS) • File and folder permissions • Compression • Disk quotas • Shrinkable/extendable partitions and volumes • Volume mount points • Symbolic links • Sparse files

What are the most common reasons that the BitLocker Drive Encryption recovery password is required?

• Modified boot files—If one of the boot files on the system volume is modified, BitLocker Drive Encryption stops the system from starting because the operating system has been tampered with. • Lost encryption keys—If there is a problem with the TPM and the encryption keys stored in it are lost or corrupted, then the encrypted volume cannot be decrypted normally. The recovery password is also required if the encryption keys are stored on a USB drive that is lost or erased. • Lost or forgotten startup PIN—If the requirement for a startup PIN is selected and the user forgets the startup PIN, then the recovery password is required to access the encrypted data.

What are the Control Panel applets in the Network and Internet category?

• Network and Sharing Center • HomeGroup • Internet Options

What are the basic components of Windows 7 that support networking?

• Network and Sharing Center • Networks • Connections

What are the security settings monitored by Action Center?

Action Center is a Control Panel applet that lets you quickly check important security settings in Windows 7. This replaces the Windows Security Center that was available in Windows XP and Windows Vista. Action Center includes maintenance settings in addition to security settings. The security settings monitored by Action Center are: • Network Firewall • Windows Update • Virus protection • Spyware and unwanted software protection • Internet security settings • User Account Control • Network Access Protection

What are the main characteristics of the Windows 7 DiskPart utility?

DiskPart is a command-line tool that allows disk and volume operations to be performed from a text-based screen interactively or from within a scripted file. Operations in the DiskPart utility are driven by a sequence of commands. Each command must have a specific object to focus its action on. For example, before a partition can be created, the DiskPart utility must be told which disk the partition will be created on. Items such as disks and partitions are usually numbered, with the first disk or partition object starting at 0. The DiskPart utility is powerful; it can contain a series of maintenance or repair commands that can be executed as part of a scheduled task or automated response on the local computer or remotely on another computer. It is considered an advanced tool that is not normally used for day-to-day administration.

Describe the main characteristics of the Read-Only attribute flag.

Files and folders use the read-only attribute flag differently. Files that have the read-only flag set will block changes to the contents of a file. Folders that have the read-only attribute flag set trigger special behavior in Windows Explorer. Folders are not marked as read only to protect their contents; Windows Explorer largely ignores this setting. Instead the read-only flag is used to indicate that the folder is a system folder and should be treated differently. That is why when viewing the properties of a folder, the read-only setting is blocked out by default.

What is a device driver?

Hardware devices such as modems, network adapter cards, and video cards are manufactured by a wide variety of vendors. The capabilities and functions of these devices vary depending on the model and manufacturer. A device driver is software that allows Windows 7 to properly communicate with and use the functionality of a device. Device drivers act as intermediaries between a hardware component and an operating system such as Windows 7. A device driver contains the instructions on how to use the full capabilities of a device properly. After they are installed, device drivers load automatically as part of the boot process each time Windows 7 is started.

What are the messages that can appear if you attempt to install an unsigned device driver in Windows 7?

If you attempt to install an unsigned device driver in Windows 7, one of the following messages will appear: • Windows can't verify the publisher of this driver software—This message appears when no digital signature is present, or the digital signature cannot be verified as valid. You should install unsigned drivers only if you are confident it is from a legitimate source. • This driver software has been altered—This message appears if the device driver has been altered since the developer added the digital signature. In most cases, this message indicates that the original device driver has been infected by a malicious program and it should not be installed. • Windows cannot install this driver software—This message appears only on the 64-bit versions of Windows 7. •The 64-bit versions of Windows 7 do not allow unsigned device drivers to be installed by default. However, for testing purposes, you can disable the check for driver signing by using bcdedit.exe.

What are the steps to convert a FAT file system to NTFS?

NTFS and FAT file systems can be converted from one form to another. The process to do so depends on the direction of the conversion. To convert a FAT file system to NTFS, perform these steps: 1. Back up the data on the partition. 2. Ensure free space remains on the partition. 3. Convert the partition using the convert command-line utility.

What are the steps to convert an NTFS file system to FAT?

NTFS and FAT file systems can be converted from one form to another. The process to do so depends on the direction of the conversion. To convert an NTFS file system to FAT, perform the following steps: 1. Back up the data on the partition. 2. Reformat the partition with FAT or FAT32. 3. Restore the data originally backed up from the NTFS partition.

What are the rules to create basic disk partitions?

Primary: A maximum of four primary partitions can exist on one basic MBR-style disk. The Disk Management tool in Windows 7 will only allow the creation of three primary partitions before the fourth partition is created as an extended partition. A maximum of 128 primary partitions can exist on one GPT-style disk. A primary partition is required to start the load sequence of an operating system. A primary partition can only be used as part of the load sequence of an operating system if it has been flagged as the active primary partition. If a single disk contains multiple primary partitions, only one of them can be flagged as active. If a basic disk contains primary partitions and none of them are used to start the operating system then none of the primary partitions have to be flagged as active. This assumes that a second disk exists in the computer and is responsible for starting the operating system. Extended: An extended partition can take the place of one of the primary partitions on a single basic MBR-style disk. Only one extended partition can exist on a single basic MBR-style disk. An extended partition is not required unless logical partitions are required on a disk. Logical: A logical partition can exist only inside an extended partition. The number of logical partitions is only limited by the availability of free space in an extended partition.

What are the major security improvements in Windows 7?

Security threats are constantly evolving, and Windows 7 has new features to address the new threats found on the Internet and elsewhere. Many of these features were also included in Windows Vista but have been improved or refined in Windows 7. The major security improvements in Windows 7 are: • Malware protection • Easier deployment of alternative authentication methods • Enhanced network protection • Data protection for stolen hard drives • AppLocker for software restriction

What are some of the most common naming conventions for user logon names?

Some common naming conventions for user logon names are: • First name—In small environments, there is little risk that two users will have the same first name. This approach is easy for users to remember. • First name and last initial—This naming convention helps ensure that user logon names are not duplicated. In small and mid-sized environments, if two users have the same first name, they are unlikely to have the same last initial. • First initial and last name—Most large environments use this naming convention or a variation of it. Last names are more likely to be unique than first names, so this convention reduces the risk of duplicate user logon names.

What are the main characteristics of Automatic Bad Cluster Management?

This is an automatic feature built into the NTFS file system. An NTFS system file called the Bad Cluster File keeps a record of all the clusters that are considered unusable by the file system within that volume. When the operating system detects that a cluster cannot be trusted to store data, the cluster's identification will be automatically added to this file. If the bad cluster is currently used by a file or folder to store data, the operating system will try to move that data to a different cluster. The move is transparent to the user and does not require user intervention.

What are some of the user account attributes that describe user and control access?

User accounts are required for individuals to log on to Windows 7 and use resources on the computer. Each user account has attributes that describe the user and control access. Some user account attributes are: • Name • Password • Group membership • Profile location

How does XPS-based printing work?

When XPS-based printing is used, a WPF application creates an XPS file for the print job. This XPS file is stored in the printer queue and is equivalent to the EMF file in the GDI-based printing process. If an XPS printer is used, the XPS print job can be transferred to the printer with no further conversion because the printer understands XPS and can render jobs internally. Conversion to PCL or Postscript is not required because an XPS printer uses XPS as its printer language. The printer driver is used to describe the capabilities of the printer, such as duplexing (two-sided printing), print resolution, or color. If a PCL or Postscript printer is used, then the driver converts the print job to PCL or Postscript before delivery to the printer.

What are the standard NTFS permissions for a folder or file?

• Write • Read • List folder contents • Read & execute • Modify • Full control • Special

Explain how to check disk health.

A hard disk can have physical areas that become damaged and therefore corrupt data stored in those locations. A disk area that is damaged this way is typically reported as bad sectors on the disk. Even if the disk is physically okay, misbehaving device drivers, applications, or intermittent faults in the hardware itself can logically corrupt a file that is written to the disk. If a user suspects a problem with the way data has been stored to the disk, several utilities are available to check for problems. From the perspective of the utilities, a disk is a partition or volume that is accessible via a drive letter or mount point. Disk health can be checked by selecting the Check Now button on the Tools tab of the properties of a volume. The chkdsk command-line utility is also available for use at the command prompt or from within a script. Partition and volume error checking requires Administrator permission.

Briefly describe the main characteristics of logical partitions.

A logical partition can only be created using the free space inside an extended partition. Windows 7 refers to logical partitions as logical drives in disk administration utilities. The terms logical drive and logical partition can be used interchangeably. If an extended partition does not have any free space, a new logical drive cannot be created inside the extended partition. The free space inside the extended partition is the only limit to how many logical partitions can be created inside it. A logical partition can be formatted using a file system to store files. Only drive letters can be assigned to logical partition file systems. Note that even though the number of logical partitions within an extended partition is theoretically unlimited, there is a practical limit. If a computer runs out of available drive letters, any logical partitions created after that point cannot be properly formatted with a file system.

What are the main characteristics of simple dynamic disk volumes?

A simple volume exists on just a single dynamic disk. With basic disks, a single contiguous block of disk space is assigned a partition type and is treated as a unique partition. With dynamic disks, a simple dynamic volume can consist of one or more blocks of space from the same disk. The blocks of space do not have to be contiguous on the disk. A simple volume is not fault tolerant, and a failure of the dynamic disk will result in data loss. All versions of Windows 7 that support dynamic disks support simple volume types.

Briefly describe the main characteristics of an extended partition.

A single MBR-based basic disk can contain no more than one extended partition. The extended partition, if used, takes the place of one of the primary partitions that can be created on the basic disk. This means that if a basic disk has an extended partition, then a maximum of three primary partitions can exist on the same disk. GPT-based disks do not use or support extended partitions. The extended partition does not have a drive letter or specific folder path assigned to it. The only purpose of an extended partition is to reserve space for and hold logical partitions. An extended partition cannot be deleted without first deleting all logical partitions it contains. -162

What are the main characteristics of spanned dynamic disk volumes?

A spanned volume exists on two or more dynamic disks. Blocks of space from multiple dynamic disks are linked together to form one spanned volume. The blocks of space can be any size. The operating system presents the sum total of all linked blocks of space as one volume. When a file is saved to a spanned volume it can reside on any linked block of space. As one block fills up, the operating system adds new files to the next available block of space. A spanned volume is not fault tolerant, and a failure of any linked block of space from a dynamic disk will result in the loss of the entire spanned volume. All versions of Windows 7 that support dynamic disks also support spanned volume types.

Briefly describe the rule collections used by AppLocker.

AppLocker rules are divided into categories called rule collections. Each rule collection applied to different types of files. The rule collections are: • Executable—These rules apply to mexe and mcom files. Use these rules to control which applications users can run. • Windows Installer—These rules apply to .msi and .msp files. Use these rules to control which users can install applications and from what locations. • Scripts—These rules apply to .ps1, .bat, .cmd, .vbs, and .js files. Use these rules to control which users can run scripts. • DLL—These rules apply to .dll and .ocx files. Use these rules to verify that the DLLs used by applications are not modified or unknown. These rules are not enable by default due to negative performance impact.

Describe the main characteristics of the Windows 7 Disk Management console.

The Disk Management console is an MMC console snap-in that is usually found as part of the Computer Management utility. Disk Management provides a graphical interface that allows a member of the Administrators group to observe and make changes to the computer's disk configuration. The Disk Management console allows changes to be made interactively and usually takes effect immediately without requiring the computer to be restarted. The Disk Management console is divided into two views, a top view and a bottom view. The top view defaults to a summary of the volumes and partitions on the computer. The bottom view defaults to a graphical view of the disks and the volumes/partitions they contain.

What does the Control Panel Region and Language Options applet in the Clock, Language, and Region category do?

The Region and Language Options applet is used to configure display and input options to support different languages and regions. The Formats tab lets you configure the format used to display numbers, currency, time, short date, and long date. The Location tab lets you select a country as your location so that certain applications can provide you with relevant information such as local news. The Keyboards and Languages tab lets you select a keyboard layout and choose the language that is used in Windows menus and dialog boxes. The Administrative tab lets you configure the language that is used for nonunicode programs and apply regional and language settings to system accounts and the default user account. Nonunicode programs use only a single byte to store character information and are unable to display extended character sets required for some languages such as Chinese or Japanese.

What does the Control Panel Sound applet in the Hardware and Sound category do?

The Sound applet lets you view and configure the properties for the audio devices in your system and configure a sound scheme. When you configure audio devices, you can adjust the volume level of your speakers or the input levels of microphones or videos. You can also configure the format of the sound used by that device. For example, you can specify that your sound card uses CD quality (16 bit, 44100Hz) sound. Sound schemes are groups of predefined sounds that are associated with system events in Windows. For example, a specific audio file is played when Windows 7 is shut down. You can choose whichever sound scheme you prefer.

Briefly describe the Universal Disk Format (UDF).

The Universal Disk Format (UDF) is a file system defined by the Optical Storage Technology Association (OSTA). The OSTA was created to promote the use of recordable optical technologies and products. UDF was developed as a standard to allow file interchange between different operating systems. This makes it ideal for storing files on portable CD-ROM and DVD media. Some manufacturers will use the UDF file system with portable flash memory, but it is formatted at the factory and not by Windows 7.

Briefly describe the User Accounts and Family Safety category in Control Panel.

The User Accounts and Family Safety category in Control Panel lets you configure user accounts and parental controls. User accounts are required to log on to the computer. Parental controls are used to control access to Web sites through Internet Explorer. Control Panel applets in the User Accounts and Family Safety category are: • User Accounts • Parental Controls • Windows CardSpace • Credential Manager

What are the main characteristics of a domain-based network?

User accounts for domain-based networks are much easier to manage than user accounts for peer-to-peer networks. A central server called a domain controller is responsible for maintaining user accounts and computer accounts. All computers in the domain share the user accounts on the domain controller. So, user accounts only need to be created once and there are no concerns about synchronizing passwords between multiple accounts. To participate in a domain, Windows 7 computers are joined to the domain. The joining process creates a computer account for the Windows 7 computer and integrates Windows 7 security with the domain. The Domain Admins group becomes a member of the local Administrators group to allow centralized administration by the domain administrators. The Domain Users group becomes a member of the local Users group to allow all users in the domain to log on to Windows 7.

What are the logon methods supported by Windows 7?

Users must log on to Windows 7 before they can access resources and interact with the system. How each user logs on varies depending on how Windows 7 is configured. Windows 7 supports the following configurations: • Standalone—This is a Windows 7 computer without network connectivity. All user accounts are local accounts. • Workgroup member—This is a Windows 7 computer that has network connectivity. Workgroups are logical groupings of Windows computers on the network. All user accounts are local accounts with no synchronization of accounts between computers. • Domain client—This is a Windows 7 computer that has network connectivity and is a member of a domain. Most of the time a user logs on by using a domain user account, but local user accounts are still supported when required.

What will happen when you convert a basic disk to a dynamic disk?

When a basic disk is converted to a dynamic disk, all primary and logical partitions it contains are converted to simple volumes. The disk will obtain a copy of the dynamic disk database that records all other dynamic disks and their volumes on that computer. If the basic disk being converted contains the system or boot partitions, the computer will require multiple restarts to complete the conversion.

What are the methods for managing printers in Windows 7?

Windows 7 offers two methods for managing printers. The first method, the Devices and Printers applet in Control Panel, is similar to the Printers applet offered in previous versions of Windows. The second method, the Print Management snap-in, was new in Windows Vista. Regardless of which utility you use to manage printers, you are able to perform tasks such as installing new printers, manage printer settings, and remove printers.

What are the logon methods supported by Windows 7?

Windows 7 supports several log-on methods; which method you choose depends on your requirements as network administrator, user needs, and whether the computer is a member of a domain. The available logon methods are: • Windows Welcome • Secure logon • Fast user switching • Automatic logon

Briefly describe the changes in Windows services that have been made to harden them.

Windows services have been changed in the following ways to harden Windows services: • Each service is given a SID number. Previous versions of Windows did not apply SIDs to services. With a SID assigned to each service, access to resources can be controlled for each service. • Services run with a lower privilege level by default. In previous versions of Windows, many services ran as LocalSystem, which has full access to the local computer and operating system. Most services now run as LocalService or NetworkService, with lower privilege levels. • Wherever possible, unnecessary privileges for services have been removed. For example, the ability to perform debugging is not required for services. • Windows Firewall can control network access based on service SIDs. Unauthorized services are blocked from accessing the network. • Services are isolated and cannot interact with users. Preventing user interaction stops malicious software from communicating with services and exploiting flaws.

What are the settings available to control account lockouts?

• Account lockout duration—This setting determines how many minutes an account remains locked. The default value is 30 minutes, however this value is not configured until the Account lockout threshold has been configured. • Account lockout threshold—This setting determines the number of incorrect log-on attempts that must be performed before an account is locked. The default value is 0 invalid log-on attempts, which means that account lockouts are disabled. • Reset account lockout counter after—This setting determines within what timeframe the incorrect log-on attempts must occur to trigger a lockout. The default value is 30 minutes, however this value is not configured until the Account lockout threshold has been configured.

What are the categories of local security policy settings?

• Account policies • Local policies • Windows Firewall with Advanced Security • Network List Manager Policies • Public Key Policies • Software Restriction Policies • Application Control Policies • IP Security Policies on Local Computer • Advanced Audit Policy Configuration

What are the Control Panel applets in the System and Security category?

• Action Center • Windows Firewall • System • Windows Update • Power Options • Backup and Restore • BitLocker Drive Encryption • Administrative Tools

What are the major tasks you can perform in the Devices and Printers applet?

• Add a printer—This option adds a new printer to the local computer. This printer can be physically attached or a network printer. • See what's printing—This option allows you to see jobs in the print queue for the selected printer. Within the queue, you can pause or delete individual print jobs. • Set as default—This option allows you to configure a printer as the default printer for applications. In an application, such as Microsoft Word, when you click the print button in the toolbar, the default printer is used. • Select printing preferences—This option allows you to configure basic printer settings and paper configuration. • Configure printer properties—This option allows you to edit all printer properties, including those for printing preferences, sharing, and security. • Configure print server properties—This option allows you edit print server properties for the local computer. This includes setting available forms (page sizes), configuring ports, and managing drivers. • Remove device—This option removes the printer from your computer.

What are some of the settings available in the user rights assignment?

• Allow log on locally—This setting controls which users are allowed to log on to the computer at the console, but does not affect who can access the computer over the network. Administrators, Backup Operators, Guest, and Users are assigned this right by default. • Back up files and directories—This setting controls which users are allowed to back up files, regardless of whether they have the necessary file permissions to read those files. Administrators and Backup Operators are assigned this right by default. • Change the system time—This setting controls which users are allowed to change the system time. Administrators and LOCAL SERVICE are assigned this right by default. • Load and unload device drivers—This setting controls which users are able to install and remove device drivers. Only Administrators are assigned this right by default. • Shut down the system—This setting controls which users are able to shut down Windows Vista. For a public access computer, you may restrict this right. Administrators, Backup Operators, and Users are assigned this right by default.

What actions can be specified for a Windows firewall rule?

• Allow the connection—This option allows connections based on this rule. • Allow the connection if it is secure—This option allows connections based on this rule only when an IPsec connection is configured. By default, this option requires that IPsec authenticates the connection and ensures integrity. However, you also have the option to require data encryption. Additionally, because a secure connection is based on an IPsec rule, you can select to have this rule override other block firewall rules. • Block the connection—This option denies all connections based on this rule. However, a rule with this option selected can be overridden by another rule that allows only secure connections.

What are the tasks you can perform with the Security Configuration and Analysis tool?

• Analyze—You can compare the settings in a security template against the settings on a computer. This is useful when you want to confirm that computers meet the minimum security requirements defined in a security template. • Configure—You can apply the settings in a security template to a computer. This is useful to enforce the security requirements defined in a security template. • Export—You can export the settings on a computer to a security template. This is useful if a computer has been properly configured and you want to apply these security settings to an additional computer.

What can Snap be used for?

• Automatically size windows the full height of the screen—Move the mouse to the top or bottom edge of a window until the pointer becomes a double-headed arrow. Then drag the window edge to the top or bottom of the screen and release the mouse. • Arrange windows side by side—Click a window and drag it to the edge of the screen, until about half of the window is not visible, and then release the mouse. • Maximize a window—Drag a window to the top edge of the screen and then release the mouse.

What are the connection clients and services included with Windows 7?

• Client for Microsoft Networks—This client allows Windows 7 to access shared files and printers on other Windows computers. • File and Printer Sharing for Microsoft Networks—This service allows Windows 7 to share files and printers with other Windows computers. • QoS Packet Scheduler—This service controls the flow of network traffic in Windows 7. It is responsible for optimizing network communication by controlling the Quality of Service (QoS). Corporate environments can use QoS policies to give certain network content types higher priority within Windows 7. For home networks, QoS incorporates Quality Windows Audio/Video Experience (qWave) to ensure that A/V streams get higher network priority than data streams, which are more tolerant of network delays.

What are the limits of the FAT file system?

• Limited fault tolerance—There is no provision for fault-tolerance in FAT, except for the fact that two copies of the FAT table are stored in the partition. • Inefficient storage—When a file's data is written to a cluster, the entire cluster is unavailable for any other file to store data in, even if the entire cluster is not used. Large cluster sizes can lead to a lot of wasted space. • Limited security—Simple attributes are used to mark files as system files, hidden, or read only; no user-based security is available.

What are some of the settings available in the security options of the local policy?

• Devices: Prevent users from installing printer drivers—This setting controls whether standard users are allowed to install network printer drivers. It does not affect the installation of local printer drivers. The default value is disabled, which allows all users to install network printer drivers. • Interactive logon: Do not display last username—This setting allows you to remove the last username from the logon screen. This makes logon more secure by not giving away usernames to potential hackers. The default value is Disabled. • Interactive logon: Message text for users attempting to log on—This setting allows you to display a message for users before they log on. The message can be instructions about how to log on or a warning against unauthorized use. By default, there is no message. • Shutdown: Allow system to be shut down without having to log on—This setting allows you to enforce log on before allowing the system to be shut down. This is important for public access computers when you want to restrict which users can shut down the system. The default value is Enabled.

What are the four main resources a hardware component might use?

• Direct memory access (DMA) channels—A legacy method for allowing devices to communicate directly with system memory instead of passing data through the processor. Typically used for sound cards. • Input/output (I/O) ranges—Addresses at which a device can be communicated with. A single device can have several addresses, with each address allowing access to a particular device feature or component. • Interrupt request (IRQ) lines—A mechanism for devices to request time from the CPU. • Memory address ranges—Address ranges in system memory that are dedicated to the device.

What are the default permissions for printing?

• Everyone—Allowed to print. • CREATOR OWNER—Allowed to manage documents. • Local Administrator User (Userx) —Allowed to print, manage printers, and manage documents. • Administrators—Allowed to print, manage printers, and manage documents.

What are the folders included in the default public profile?

• Favorites—Favorites stored here are available to all users. • Libraries—Libraries stored here do not appear in user profiles but are available to all users. • Public Desktop—Files and shortcuts stored here appear on the Desktop of each user. • Public Documents—Files stored here appear in the Documents library of each user. • Public Downloads—Files stored here do not appear in profi les, but the files in it are available to all users. • Public Music—Files stored here appear in the Music library of each user. • Public Pictures—Files stored here appear in the Pictures library of each user. • Public Recorded TV—This folder is used to store recorded television programs for personal video recorder (PVR) functionality. This folder does not appear in user profiles, but the files in it are available to all users. • Public Videos—Files stored here appear in the Videos folder of each user.

What file systems are supported by Windows 7?

• File Allocation Table • NT File System • Universal Disk Format • CDFS File System • Extended File Allocation Table

What are some of the index settings that can be configured on the Index Settings tab of the Advanced Options dialog box?

• File Settings—You can select whether encrypted files are indexed. You can also select whether words with different accents are treated as the same. • Troubleshooting—You can rebuild the index if you believe it has become corrupted. You can also restore the default index settings. • Index location—You can move the index from the default location of C:\ProgramData\Microsoft to another location. This can be useful if the C drive is becoming full and you have free space on a different partition.

What are the share permissions available in Windows 7?

• Full Control—Allows users complete control over files and folders in the share and set permissions on files and folders in the share. In addition, Full Control allows users to configure the share permissions on the shared folder. • Change—Allows users complete control to create, modify, and delete files in the shared folder, but not to set permissions. • Read—Allows users to read the contents of files in the shared folder, but not to modify the files in any way.

What are the important configuration concepts of IPv4?

• IP addresses • Subnet masks • Default gateways • DNS • WINS • Methods for configuring IP • Troubleshooting IPv4

What are some of the improvements found in IPv6?

• Increased address space • Hierarchical routing to reduce the load on Internet backbone routers • Simpler configuration through automatic address management • Inclusion of encryption services for data security • Quality of service • Extensibility to support new features

What types of zones are available in the Security tab in the Internet Options of Internet Explorer?

• Internet—The Internet zone includes all Internet Web sites that are not specifically assigned to another zone. The default security level is Medium-high. • Local intranet—The Local intranet is meant to be all computers on the internal corporate network. The internal corporate network is defined by default as all sites in the local domain. However, this is only relevant if the workstation is joined to a domain. For workstations that are not part of a domain, the Intranet zone is treated the same as the Internet zone. The default security level is Medium-low. • Trusted sites—The Trusted sites zone contains no sites by default, you must add sites that you consider trusted. This is useful when the Internet zone settings block functionality such as pop-up windows that are required for a site you know and trust. Adding the site to the Trusted sites zone allows that site to function properly. The default security level is Medium. • Restricted sites—The Restricted sites zone is a specific list of sites that you do not trust. No sites are in this list by default. The default security level is High and cannot be changed except through custom settings

What are the characteristics of the Windows 7 Guest account?

• It cannot be deleted. • It cannot be locked out. • It is disabled by default. • It has a blank password by default. • It can be renamed. • It is a member of the Guests group by default. • It is a member of the Everyone group.

What are the characteristics of the Windows 7 Administrator account?

• It is not visible on the logon screen. • It has a blank password by default. • It cannot be deleted. • It cannot be locked out due to incorrect logon attempts. • It cannot be removed from the local administrators group. • It can be disabled. • It can be renamed.

What are the three areas of Network and Sharing Center?

• Network map—This shows a summary of the network you are connected to. Three icons representing the local computer, local network, and the Internet are shown. If there are any communication problems on your network, the summary map will show whether the problem is related to the local network or the Internet. There is also a link to view a full network map. • Active Network details—This area shows summary information for the network you are connected to. It displays the network you are connected to, the type of network it is, the type of access you have, and the connection being used to access the network. • Change your networking settings —This area displays links to common configuration and troubleshooting wizards.

What are the management tasks that can be performed for each print job?

• Pause—Prevents the job from printing. If a job is partially finished printing, it will stop at the end of a page. • Resume—Allows a paused print job to continue printing. • Restart—Restarts printing a job from the first page. • Cancel—Stops a print job and removes it from the queue. The print job may not stop immediately, as it may take a few moments for the printer to remove the job from memory and complete printing the final page. • Edit job properties—Allows you to change the priority of a print job or schedule the job.

What are the major activities for proper disk administration?

• Preparing hard disks • Disk cleanup • Checking disk health • Defragmenting disks • Moving disks • Converting disk types • Managing fault tolerance

What are some of the situations where you might want to manage print jobs?

• Restarting a print job when there has been a paper jam and some pages have been destroyed. • Pausing a large print job to let several other smaller print jobs complete. • Raising the priority of a print job from an executive secretary to ensure that it prints next. • Changing the schedule of a large print job to prevent it from printing during main office hours. • Canceling a corrupted print job that is blocking other jobs in the queue.

What are some of the tasks that can be performed with Windows Fax and Scan?

• Scan documents and pictures. • Fax scanned documents and pictures. • Fax electronic documents. • Receive faxes. • Create and manage fax coversheets. • Forward received faxes, scanned documents, and scanned pictures by using e-mail. • Send faxes by using a central fax server. • Maintain a contacts list that includes phone numbers for faxing

What are some of the benefits of using the FAT file system?

• Supported by many legacy operating systems, which may be required if partitions are shared in a multi-boot configuration • Simple technology that is well understood and supported by third-party utilities • Adequate when file and folder requirements are simple and do not require complex security • Suitable for removable media such as digital camera memory, media players, and USB memory sticks

What are the categories available in Control Panel?

• System and Security • Network and Internet • Hardware and Sound • Programs • User Accounts and Family Safety • Appearance and Personalization • Clock, Language, and Region • Ease of Access

What are some of the differences between the Administrator account and the initial account?

• The initial account is visible on the logon screen. • The initial account does not have a blank password by default. • The initial account can be deleted. • The initial account can be locked out due to incorrect logon attempts. • The initial account can be removed from the Administrators group.

What are the options for network discovery?

• Turn on network discovery—You can see and access other computers and devices on the network. Other computers can also see your computer on the network and access shared resources. This is the default configuration when the network is in the Home or Work location type. • Turn off network discovery—You cannot see or access other computers and devices on the network. Other computers also cannot see your computer on the network or access shared resources. This is the default configuration for networks in the Public location type.

What are the options for sharing the Public folder in Windows 7?

• Turn on sharing so anyone with network access can read and write files in the Public folder— When this option is selected, all network users are able to read, change, delete, and create files in the Public folder. A Public folder configured this way could be used as a central storage location for business documents in a small business to ensure that files can be easily found and are able to be backed up each night. • Turn off Public folder sharing—When this option is selected, only local users can access files in the Public folder. One also has options for Password protected sharing that also apply to the Public folder. Password protection offers two options. These options also apply to other shared folders and printers. • Turn on password protected sharing—When this option is selected, network users must log on to the sharing computer by using a user account that has been granted access to the sharing computer. The account can be either a local user account or a domain user account. This allows you to restrict access to the shared public folder to valid user accounts, but you cannot select which user accounts have access. All valid user accounts are able to access the shared Public folder. • Turn off password protected sharing—When this option is selected, anyone can access the information in the public folder, even if they do not have a valid user account on the sharing computer. Effectively, this allows anonymous users access to the Public folder.

What are some of the restrictions imposed by Windows 7 on the user logon name?

• User logon names must be unique—No two users can have the same logon name, because the logon name is used by the computer to identify the user and verify the password associated with it during logon. • User logon names must be 20 characters or less—This restriction is typically not a problem, because no users want to type in a logon name of 20 characters or more. • User logon names are not case sensitive—You cannot change the case of letters to create unique user logon names; Windows 7 will read any case changes as the original name. Also, users do not need to be concerned about case when they type in their user name. However, passwords are case sensitive. • User logon names cannot contain invalid characters—Windows 7 uses some characters for special functions, so they cannot be used in user logon names. The invalid characters are: "/\{}:;|=,+*?<>.

What are the tools available to perform advanced firewall configuration in Windows 7?

• Windows Firewall with Advanced Security utility—This utility is a graphical tool to configure all of the Windows Firewall features on a single computer. • Netsh—This is a command-line utility for managing network configuration. It is also capable of configuring all of the Windows Firewall features on the local computer. This tool can be used in a script that is run on multiple computers. • Group Policy—To quickly and easily manage the Windows Firewall settings in a corporate environment, you should use Group Policy. It allows firewall settings to be applied to hundreds or thousands of computers very quickly. Some Group Policy configuration options were not available for previous versions of Windows and these settings will be ignored by previous versions of Windows.


Ensembles d'études connexes

Data Types (Work with Data 25-30% of Exam)

View Set

GE B2+/C1 [Unit 2] Mixed Conditionals HW

View Set

Micro 2060 Chapter 19 Review Questions

View Set

Suspense and Horror: Gothic Writing across Time

View Set