Exam Prep 2 [Electronic resources] : Windows XP Professional نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Exam Prep 2 [Electronic resources] : Windows XP Professional - نسخه متنی

Melissa Craft, Don Poulton

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید


"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">








  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [Z]

    Safe Mode

    computers

    starting 2nd 3rd 4th

    limitations

    when to launch 2nd 3rd

    Safe Mode option

    advanced startups 2nd

    scalability

    multiprocessor computers

    scanners

    configuring (Device Manager) 2nd 3rd

    installing (Device Manager) 2nd

    Windows Image Acquisition (WIA) interface

    Scanners and Cameras Utility (Control Panel) 2nd 3rd

    Scheduled Tasks applet (Control Panel) 2nd

    Scheduled Tasks application

    configuring 2nd 3rd

    launch problems

    troubleshooting 2nd

    launching 2nd

    Properties dialog box 2nd

    Scheduled Tasks Properties dialog box

    tab options 2nd

    scheduling

    printer availability

    SCSI controllers (Small Computer System Interface)

    CD/DVD drives 2nd

    SCSI ports (RS-232)

    multimedia device connections

    Secedit.utility

    as security tool 2nd

    secondary monitors

    adding to computers (Dualview) 2nd 3rd 4th

    configuring for multiple display setup

    security

    access rights

    configuring 2nd 3rd

    account lockout policies 2nd

    Account Lockout policy

    Administrator account

    renaming

    Administrator rights 2nd

    Audit policy

    setting 2nd 3rd 4th 5th 6th 7th

    cached credentials

    configuration options

    account policies 2nd 3rd 4th 5th

    IP Security policies 2nd

    local policies 2nd 3rd 4th 5th 6th

    public key policies

    software restriction policies 2nd 3rd

    EFS

    administrator use guidelines 2nd

    certificate storage 2nd

    certificates, exporting 2nd

    certification authority (CA)

    certification authority (CA), certificate requests 2nd

    file decryption methods 2nd

    file encryption methods 2nd 3rd 4th

    policies, setting 2nd

    practical implementation of 2nd 3rd

    recovery agents

    self-signed certificates, generating 2nd

    supported file systems 2nd

    troubleshooting issues 2nd 3rd

    troubleshooting via cipher command switches 2nd 3rd

    Encrypting File System (EFS)

    exam questions 2nd 3rd 4th 5th 6th 7th 8th 9th

    answers 2nd 3rd 4th

    exercises

    Configuring a Local Group Policy (13.1) 2nd 3rd

    Establishing a Password Policy (12.1) 2nd

    file systems

    configuring 2nd 3rd

    firewalls

    Windows Firewall

    Full Control rights 2nd

    Guest account

    disabling

    hidden administrative shares 2nd

    Internet Explorer

    advanced options

    configuring 2nd 3rd 4th 5th 6th

    system information

    updates

    Internet zones

    Limited rights 2nd

    local security policies

    effect of GPOs (Group Policy Objects) 2nd

    management of 2nd

    lock-down practices 2nd 3rd 4th

    management of 2nd 3rd 4th 5th

    passwords

    never expire option

    policies 2nd

    permissions

    consistent manmagement scheme

    pop-up ads

    blocking 2nd

    remote access

    configuring 2nd 3rd

    resources

    websites

    review questions

    answers 2nd

    Simple File Sharing

    disabling

    smart cards

    logon requirements

    SP2 improvements

    SP2 tools

    buffer overrun protection

    malware protection

    Security Center

    Windows Firewall

    templates

    creating (Security Configuration and Analysis tool) 2nd 3rd

    tools

    Computer Management

    Group Policy Editor

    Local Security Policy

    Secedit.exe utility 2nd

    security templates

    troubleshooting 2nd 3rd 4th 5th

    Windows Firewall

    configuring after SP2 installation 2nd

    function of

    Windows Product Activation (WPA) 2nd 3rd

    confirmation codes

    ID generation

    information submission 2nd

    Security Center

    Security Configuration and Analysis tool

    file systems

    security settings 2nd 3rd

    security levels node

    software restriction policies

    security templates

    as security tool

    select-and-place questions 2nd 3rd

    self-signed certificates (EFS)

    generating 2nd

    Serial Line Internet Protocol,
    [See SLIP]

    serial ports (RS-232)

    multimedia device connections

    server computers

    Offline File feature

    configuring 2nd

    servers

    networking requirements 2nd

    required RIS components

    Active Directory

    DHCP

    DNS

    separate disk partitions

    RIS

    Admin\#092i386 subfolder 2nd

    OSChooser subfolder 2nd

    Service Pack 2,
    [See SP2]

    service packs,
    [See SPs]

    services

    networks

    management of 2nd 3rd 4th 5th 6th

    settings (user profiles)

    transferring between computers (Files and Settings Transfer Wizard) 2nd 3rd 4th 5th 6th

    Setup Manager

    administrator password bug

    installing (exercise 2.1) 2nd 3rd

    running (exercise 2.2) 2nd 3rd

    running from Windows 2000 Server

    running from Windows Server 2003

    unattended installations

    answer files, creatinng 2nd

    deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

    share permissions

    Change 2nd

    conflicts with NTFS permissions 2nd

    establishing 2nd

    exam questions 2nd 3rd 4th 5th 6th 7th 8th

    Full Control 2nd

    Read 2nd

    shared connections

    Internet

    configuring ICS) 2nd 3rd 4th 5th

    shared folders

    creating 2nd

    with net share command

    exercises

    Installing IIS (5.1) 2nd

    hidden

    ADMIN$ share

    C$ share

    creating

    FAX$ share

    IPC$ share

    Print$ share

    hidden administrative shares ($

    )

    management overview

    maximum number of connections

    network drives

    mapping 2nd

    offline files

    caching 2nd 3rd

    providing 2nd 3rd

    removing

    from Computer Management console

    sharing over web (IIS) 2nd 3rd 4th 5th

    shared resources

    connecting to 2nd

    share permissions

    establishing 2nd

    sharing

    encrypted files 2nd

    files

    ForceGuest behaviors 2nd

    implementation of 2nd

    local printers 2nd 3rd

    printers

    configuration of 2nd

    implementation of 2nd

    Shiva PAP

    Simple File Sharing

    disabling

    file access permissions 2nd

    simple volumes

    simulation-based questions 2nd 3rd 4th

    SLIP

    (Serial Line Internet Protocol)

    slipstreaming

    SP2 pre-installations 2nd 3rd 4th 5th 6th

    small peer-to-peer networks

    printer setup options

    smart cards

    configuring (Device Manager) 2nd 3rd

    enrollment agents

    installing (Device Manager)

    logon requirements

    PC/SC Workshop website

    Personal Computer/Smart Card (PC/SC) specification

    Plug and Play support

    public key infrastructure (PKI)

    remote access authentication

    snapshots

    System Restore 2nd 3rd

    software

    cloning problems 2nd

    compatibility

    testing for upgrades 2nd 3rd 4th

    driver signing

    System File Protection

    installation requirements

    compatibility checks 2nd 3rd 4th

    software restriction policies

    additional rules node

    certificate rule 2nd 3rd 4th

    designated file type node

    enforcement node

    security

    configuring 2nd 3rd

    security levels node

    trusted publishers node

    Software Update Services (SUS)

    SP2 deployment

    benefits 2nd

    solutions

    defining

    installation troubleshooting

    documentation of

    installation troubleshooting

    testing and implementation

    installation troubleshooting 2nd

    SP1

    major system improvements

    SP2

    (Service Pack 2) 2nd

    deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    via Group Policy 2nd 3rd 4th 5th 6th 7th

    via Software Update Services (SUS) 2nd

    downloading

    installations

    Group Policy deployment 2nd 3rd 4th 5th 6th 7th

    manual 2nd 3rd

    preparations 2nd

    slipstreaming 2nd 3rd 4th 5th 6th

    Internet Explorer

    Pop-Up Blocker 2nd

    major system improvements 2nd

    manual installations 2nd 3rd

    resources

    websites

    security focus

    security tools

    buffer overrun protection

    malware protection

    Security Center

    Windows Firewall

    Windows Firewall

    configuring 2nd

    function of

    spanned volumes

    spooling

    print jobs

    SPs

    (XP service packs)

    components of

    hotfixes

    potential for errors

    version 1

    major improvements

    version 2

    downloading

    major improvements 2nd

    security focus

    stale data status

    volumes

    standby mode

    airline restrictions

    power conservation

    mobile computers 2nd

    power management scheme 2nd

    static IP addresses 2nd 3rd 4th 5th 6th 7th 8th

    network adapters

    configuring 2nd 3rd 4th 5th

    stop errors

    failed installations

    resolving 2nd 3rd

    stopped installations

    troubleshooting

    storage devices [See also disk devices]

    Computer Management utility

    Device Manager

    Device Services

    Disk Defragmenter

    Disk Management 2nd 3rd 4th 5th 6th 7th 8th

    Event Viewer

    Indexing Service

    Performance Alerts and Logs

    Removable Storage 2nd 3rd 4th

    WMI Control

    removable media

    configuring 2nd 3rd 4th

    troubleshooting 2nd 3rd 4th

    storing

    cached credentials

    certificates (EFS) 2nd

    offline files

    caches

    stripe sets

    conversions

    upgrade preparations

    striped volumes

    creating (Diskpart.exe utility) 2nd 3rd

    study strategies (exam) 2nd

    active approach 2nd 3rd

    macro approach 2nd

    micro approach 2nd

    subnet masks

    (TCP/IP)

    IP addresses

    classes 2nd 3rd

    Classless Inter-Domain Routing (CIDR) 2nd

    host calculations

    success tips (exam) 2nd 3rd

    switching

    between languages in multi-language environment 2nd

    Symantec Drive Image

    symmetrical multiprocessing (SMP)

    processor usage

    monitoring (Performance Monitor) 2nd

    QNX Software Systems

    symmetrical processing (SMP)

    converting computers to (Device Manager) 2nd 3rd 4th

    multiprocessor computers

    synchronizing

    offline files

    with network versions

    Sysprep

    (System Preparation Tool)

    computer functionality

    testing 2nd

    desktop property configuration

    domains

    computer removal

    extracting

    images

    cloning problems 2nd

    creating 2nd 3rd 4th 5th

    creating (exercise 2.3) 2nd

    deploying 2nd 3rd 4th 5th 6th 7th

    encrypted file usage

    Mini-Setup Wizard

    running (exercise 2.4) 2nd 3rd 4th

    network requirements 2nd 3rd

    Norton Ghost Image

    situations to avoid 2nd

    SP1/SP2 deployment tools

    Symantec Drive Image

    unattended installations

    executing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

    troubleshooting 2nd 3rd 4th

    when to use 2nd 3rd 4th 5th

    System applet (Control Panel)

    System Configuration utility (msconfig.exe)

    clean boots

    executing

    video problems

    troubleshooting

    system data

    backups

    copy type (Windows Backup)

    daily type (Windows Backup)

    differential type (Windows Backup)

    executing (Windows Backup) 2nd 3rd 4th 5th

    full type (Windows Backup)

    incremental type (Windows Backup)

    permissions (Windows Backup) 2nd

    restoring (Windows Backup) 2nd 3rd 4th 5th

    System File Checker (scf.exe)

    driver signatures

    checking

    System File Protection

    driver signing

    System Information Utility

    devices

    conflict/sharing status

    System Monitor snap-in (Performance Console)

    counters

    highlighting

    Explain button

    real-time statistics

    viewing 2nd

    system partitions

    booting from

    system performance
    [See performance]

    LogicalDisk Object

    counters 2nd

    Memory Object

    counters 2nd 3rd

    monitoring

    overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

    optimizing

    overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

    PhysicalDisk Object

    counters 2nd

    power management

    preconfigured modes 2nd

    processor Object

    counters

    System Preparation (sysprep) utility

    System Preparation Tool,
    [See Sysprep]

    system resources

    accessing in Internet Explorer 2nd

    system restoration

    troubleshooting (Safe Mode) 2nd 3rd 4th

    System Restore

    earlier system states

    restoring to 2nd 3rd

    restore points 2nd 3rd

    snapshots 2nd 3rd

    System State data

    file types 2nd 3rd 4th

    recovering (Recovery Console) 2nd 3rd 4th 5th 6th

    system volumes


  • / 192