Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] Safe Modecomputers starting 2nd 3rd 4th limitations when to launch 2nd 3rdSafe Mode option advanced startups 2ndscalability multiprocessor computersscanners configuring (Device Manager) 2nd 3rd installing (Device Manager) 2nd Windows Image Acquisition (WIA) interface Scanners and Cameras Utility (Control Panel) 2nd 3rd Scheduled Tasks applet (Control Panel) 2ndScheduled Tasks application configuring 2nd 3rdlaunch problems troubleshooting 2nd launching 2nd Properties dialog box 2ndScheduled Tasks Properties dialog box tab options 2ndscheduling printer availabilitySCSI controllers (Small Computer System Interface) CD/DVD drives 2ndSCSI ports (RS-232) multimedia device connectionsSecedit.utility as security tool 2ndsecondary monitors adding to computers (Dualview) 2nd 3rd 4th configuring for multiple display setupsecurityaccess rights configuring 2nd 3rd account lockout policies 2nd Account Lockout policyAdministrator account renaming Administrator rights 2ndAudit policy setting 2nd 3rd 4th 5th 6th 7th cached credentialsconfiguration options account policies 2nd 3rd 4th 5th IP Security policies 2nd local policies 2nd 3rd 4th 5th 6th public key policies software restriction policies 2nd 3rdEFS administrator use guidelines 2nd certificate storage 2nd certificates, exporting 2nd certification authority (CA) certification authority (CA), certificate requests 2nd file decryption methods 2nd file encryption methods 2nd 3rd 4th policies, setting 2nd practical implementation of 2nd 3rd recovery agents self-signed certificates, generating 2nd supported file systems 2nd troubleshooting issues 2nd 3rd troubleshooting via cipher command switches 2nd 3rd Encrypting File System (EFS) exam questions 2nd 3rd 4th 5th 6th 7th 8th 9th answers 2nd 3rd 4thexercises Configuring a Local Group Policy (13.1) 2nd 3rd Establishing a Password Policy (12.1) 2ndfile systems configuring 2nd 3rdfirewalls Windows Firewall Full Control rights 2ndGuest account disabling hidden administrative shares 2ndInternet Explorer advanced options configuring 2nd 3rd 4th 5th 6th system information updates Internet zones Limited rights 2ndlocal security policies effect of GPOs (Group Policy Objects) 2nd management of 2nd lock-down practices 2nd 3rd 4th management of 2nd 3rd 4th 5thpasswords never expire option policies 2ndpermissions consistent manmagement schemepop-up ads blocking 2ndremote access configuring 2nd 3rdresources websites review questions answers 2ndSimple File Sharing disablingsmart cards logon requirements SP2 improvements SP2 tools buffer overrun protection malware protection Security Center Windows Firewalltemplates creating (Security Configuration and Analysis tool) 2nd 3rdtools Computer Management Group Policy Editor Local Security Policy Secedit.exe utility 2nd security templates troubleshooting 2nd 3rd 4th 5thWindows Firewall configuring after SP2 installation 2nd function of Windows Product Activation (WPA) 2nd 3rd confirmation codes ID generation information submission 2nd Security CenterSecurity Configuration and Analysis toolfile systems security settings 2nd 3rdsecurity levels node software restriction policiessecurity templates as security tool select-and-place questions 2nd 3rdself-signed certificates (EFS) generating 2ndSerial Line Internet Protocol, [See SLIP]serial ports (RS-232) multimedia device connectionsserver computersOffline File feature configuring 2ndservers networking requirements 2ndrequired RIS components Active Directory DHCP DNS separate disk partitionsRIS Admin\#092i386 subfolder 2nd OSChooser subfolder 2ndService Pack 2, [See SP2]service packs, [See SPs]servicesnetworks management of 2nd 3rd 4th 5th 6thsettings (user profiles) transferring between computers (Files and Settings Transfer Wizard) 2nd 3rd 4th 5th 6thSetup Manager administrator password bug installing (exercise 2.1) 2nd 3rd running (exercise 2.2) 2nd 3rd running from Windows 2000 Server running from Windows Server 2003 unattended installations answer files, creatinng 2nd deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12thshare permissions Change 2nd conflicts with NTFS permissions 2nd establishing 2nd exam questions 2nd 3rd 4th 5th 6th 7th 8th Full Control 2nd Read 2ndshared connectionsInternet configuring ICS) 2nd 3rd 4th 5thshared folders creating 2nd with net share commandexercises Installing IIS (5.1) 2nd hidden ADMIN$ share C$ share creating FAX$ share IPC$ share Print$ sharehidden administrative shares ($ ) management overview maximum number of connectionsnetwork drives mapping 2ndoffline files caching 2nd 3rd providing 2nd 3rd removing from Computer Management console sharing over web (IIS) 2nd 3rd 4th 5thshared resources connecting to 2ndshare permissions establishing 2ndsharing encrypted files 2ndfiles ForceGuest behaviors 2nd implementation of 2nd local printers 2nd 3rdprinters configuration of 2nd implementation of 2nd Shiva PAPSimple File Sharing disabling file access permissions 2nd simple volumes simulation-based questions 2nd 3rd 4thSLIP (Serial Line Internet Protocol)slipstreaming SP2 pre-installations 2nd 3rd 4th 5th 6thsmall peer-to-peer networks printer setup optionssmart cards configuring (Device Manager) 2nd 3rd enrollment agents installing (Device Manager) logon requirements PC/SC Workshop website Personal Computer/Smart Card (PC/SC) specification Plug and Play support public key infrastructure (PKI) remote access authenticationsnapshots System Restore 2nd 3rdsoftware cloning problems 2ndcompatibility testing for upgrades 2nd 3rd 4thdriver signing System File Protectioninstallation requirements compatibility checks 2nd 3rd 4thsoftware restriction policies additional rules node certificate rule 2nd 3rd 4th designated file type node enforcement nodesecurity configuring 2nd 3rd security levels node trusted publishers nodeSoftware Update Services (SUS)SP2 deployment benefits 2ndsolutionsdefining installation troubleshootingdocumentation of installation troubleshootingtesting and implementation installation troubleshooting 2ndSP1 major system improvementsSP2 (Service Pack 2) 2nd deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th via Group Policy 2nd 3rd 4th 5th 6th 7th via Software Update Services (SUS) 2nd downloadinginstallations Group Policy deployment 2nd 3rd 4th 5th 6th 7th manual 2nd 3rd preparations 2nd slipstreaming 2nd 3rd 4th 5th 6thInternet Explorer Pop-Up Blocker 2nd major system improvements 2nd manual installations 2nd 3rdresources websites security focus security tools buffer overrun protection malware protection Security Center Windows FirewallWindows Firewall configuring 2nd function of spanned volumesspooling print jobsSPs (XP service packs) components of hotfixes potential for errorsversion 1 major improvementsversion 2 downloading major improvements 2nd security focusstale data status volumesstandby mode airline restrictionspower conservation mobile computers 2nd power management scheme 2nd static IP addresses 2nd 3rd 4th 5th 6th 7th 8thnetwork adapters configuring 2nd 3rd 4th 5thstop errorsfailed installations resolving 2nd 3rdstopped installations troubleshooting storage devices [See also disk devices]Computer Management utility Device Manager Device Services Disk Defragmenter Disk Management 2nd 3rd 4th 5th 6th 7th 8th Event Viewer Indexing Service Performance Alerts and Logs Removable Storage 2nd 3rd 4th WMI Controlremovable media configuring 2nd 3rd 4th troubleshooting 2nd 3rd 4thstoring cached credentials certificates (EFS) 2ndoffline files cachesstripe setsconversions upgrade preparations striped volumes creating (Diskpart.exe utility) 2nd 3rd study strategies (exam) 2nd active approach 2nd 3rd macro approach 2nd micro approach 2ndsubnet masks (TCP/IP)IP addresses classes 2nd 3rd Classless Inter-Domain Routing (CIDR) 2nd host calculations success tips (exam) 2nd 3rdswitching between languages in multi-language environment 2nd Symantec Drive Imagesymmetrical multiprocessing (SMP)processor usage monitoring (Performance Monitor) 2nd QNX Software Systemssymmetrical processing (SMP) converting computers to (Device Manager) 2nd 3rd 4th multiprocessor computerssynchronizingoffline files with network versionsSysprep (System Preparation Tool)computer functionality testing 2nd desktop property configurationdomains computer removal extractingimages cloning problems 2nd creating 2nd 3rd 4th 5th creating (exercise 2.3) 2nd deploying 2nd 3rd 4th 5th 6th 7th encrypted file usageMini-Setup Wizard running (exercise 2.4) 2nd 3rd 4th network requirements 2nd 3rd Norton Ghost Image situations to avoid 2nd SP1/SP2 deployment tools Symantec Drive Image unattended installations executing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st troubleshooting 2nd 3rd 4th when to use 2nd 3rd 4th 5th System applet (Control Panel)System Configuration utility (msconfig.exe)clean boots executingvideo problems troubleshootingsystem databackups copy type (Windows Backup) daily type (Windows Backup) differential type (Windows Backup) executing (Windows Backup) 2nd 3rd 4th 5th full type (Windows Backup) incremental type (Windows Backup) permissions (Windows Backup) 2nd restoring (Windows Backup) 2nd 3rd 4th 5thSystem File Checker (scf.exe)driver signatures checkingSystem File Protection driver signingSystem Information Utilitydevices conflict/sharing statusSystem Monitor snap-in (Performance Console)counters highlighting Explain buttonreal-time statistics viewing 2ndsystem partitions booting fromsystem performance [See performance]LogicalDisk Object counters 2ndMemory Object counters 2nd 3rdmonitoring overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19thoptimizing overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19thPhysicalDisk Object counters 2ndpower management preconfigured modes 2ndprocessor Object counters System Preparation (sysprep) utilitySystem Preparation Tool, [See Sysprep]system resources accessing in Internet Explorer 2ndsystem restoration troubleshooting (Safe Mode) 2nd 3rd 4thSystem Restoreearlier system states restoring to 2nd 3rd restore points 2nd 3rd snapshots 2nd 3rdSystem State data file types 2nd 3rd 4th recovering (Recovery Console) 2nd 3rd 4th 5th 6th system volumes |