Tuesday, January 29, 2008

119 Tips For Passing Xp 70-270, XP Professional Study guide

119 Tips for Passing the Microsoft Windows
XP Professional 70-270

1. The minimum installation requirement for processors is a Pentium 233MHz or higher.
2. Installation requires 1500MB free disk space on a 2000MB Partition.
3. Dual-booting is supported for Windows 95, Windows 98, Windows NT 4.0 (Service
Pack 4.0 or greater is required), Windows NT 3.51, Windows for Workgroups 3.11,
Windows 3.1, MS-DOS, OS/2, Windows 2000 Server, Windows 2003 Server and other
installations of Windows 2000 .
4. Two executable setup files exist: Winnt.exe (for command-prompt and 16-bit
environment) and Winnt32.exe (for 32-bit operating systems such 98,2000,…)
5.Windows XP works with NTFS V 5, FAT, and FAT32 file systems. FAT is needed for
MS-DOS, the Windows 3.x operating systems, and the first release of Windows 95.
6. Unattended installations allow you to configure the operating system with little or no
human intervention. There are three primary methods of unattended installations: RIS
(Remote Installation Service) is a service that runs on a Windows 2003 Server. The
System Preparation Tool (Sysprep.exe) is used to prepare an ideal Windows XP
Professional workstation to have an image made of it. Setup Manager is used to create
answer files (known as Uniqueness Database Files, or UDFs) for automatically providing
computer or user information during
7.When using an answer file on a diskette it must be named Winnt.sif, not Unattend.txt.
8. Upgrades can be done from Windows 98, Windows NT Workstation 4.0, and
Windows NT Workstation 3.51.
9. Winnt32.exe initiates the upgrade from most other operating systems.
10.You cannot upgrade if start setup by Boot From CD-ROM
11. A service pack is a self-running program that modifies your operating system.
Upgrades to Windows XP come in the form of service packs. Each service pack contains
patches and fixes to operating systems components that need such, as well as additional
features.
12.The /duprepare switch prepares the downloaded update files to be used during an
installation with the /dushare switch.
13.We should use the "/SOS switch in the boot.ini startup file. This switch causes the
names of drivers to be displayed as they load during boot.
14.The /fastdetect switch is used by default. It makes the early boot process,
NTDETECT, skip the detection of parallel and serial devices (Plug and Play will find
them). This makes booting faster. You cannot configure the /fastdetect switch to log
information on device drivers.
15.To use RIS the computer must be configured to boot from the network.
16.RIS does not need to run on a domain controller. A RIS server must be authorized in
Active Directory before it is running.
17. The CONVERT.EXE utility allows you to convert a FAT or FAT32 file system to
NTFS without losing data.
18.Windows XP includes an uninstall feature which allows us to uninstall Windows XP
after upgrade and return to the previous operating system.
19..The bootcfg command is a Microsoft Windows XP Recovery Console command that
manipulates the Boot.ini file.
20.Windows XP doesn’t have a driver for the SCSI-controller and so can’t find a hard
disk to install onto. Therefore, you must install SCSI driver during setup.
21.Each account has a different Security Identifier (SID). The permissions on the files are
specific to the SID of the user account.
22.The minimum recommended setting of the page file is 1.5 times the physical memory.
23.The Fixboot command writes a new partition boot sector to the system partition.
24.Using the system volume for the paging file will slow the performance.
25.If the system is unable to start after installing a troublesome driver, the first step in
troubleshooting is to start the computer with the Last Known Good Configuration.
26.The fax service is not able to receive faxes by default.
27.The scanstate and loadstate tools are part of the User State Migration Tool.
These tools can be used to collect user data and settings from one machine and load them
on to another machine.
28.only one web site is supported on Windows XP/2000 Professional IIS.
29.To create a striped volume, the disks must be converted to dynamic disks.
30.The backup operators group has permission to access storage devices and to bypass
file permissions to backup files.
31. The permissions, attributes, and characteristics of files and folders depend greatly on
the file system on which Windows XP is install.
32. Share permissions apply only when a user is accessing a file or folder through the
network.
33. Local permissions and attributes are used to protect the file when users are local.
34. The NTFS permissions for a folder are located on the Security tab of its Properties
dialog box.
35. With NTFS, permissions can be individually allowed or denied on a per-folder basis.
You can assign any combination of these values: Full Control, Modify, Read & Execute,
List Folder Contents, Read, and write
36. The Advanced command button enables you to configure auditing and ownership
properties.
37. NTFS file permissions are: Full Control, Modify, Read+Execute, Read, and Write.
38. The Deny permission overrides all other permissions. In the absence of Deny, rights
accumulate through individual and group assignments, as well as through folder and file
assignments. (In the case of a conflict, file permissions override folder permissions.)
39. Moving or copying a file to a new directory could change the permissions on an
NTFS file.
40. Using the NTFS file system, it is possible to configure files and folders for file-level
compression if you have Write permissions. Compression conserves disk space but does
not reduce the estimation of how much space the user is utilizing when computing disk
quotas.
42. Encryption and compression settings appear in the same frame on the dialog box. The
two features are mutually exclusive: You cannot compress encrypted files or encrypt
compressed files.
43. Share permissions differ significantly from NTFS permissions: 1) They apply to users
accessing the resource remotely and not locally. 2) They work with Windows and DOSbased
file systems (NTFS, FAT, or FAT32). 3) They work in conjunction with other
permissions.
44. Folder share permissions are: Full Control, Change, Read.
45. A folder can be shared under an unlimited number of names after it has been shared
the first time. This is used to set another permission for one resource.
46. NET SHARE enables you to create shares from the command prompt.
47. You can "hide" a share (prevent it from appearing in My Network Places) by adding a
dollar sign ($) to the end of the share name.
48. For every Windows XP computer, three hidden shares are created automatically: 1)
C$ is the root of the computer's drive. A similar share (such as D$, E$, and so on) will be
created for each hard drive partition on a system. 2) ADMIN$ is the root of the partition
on which Windows 2000 has been installed. 3) IPC$ is the remote IPC (InterProcess
Connect) share used for networking.
49. To reach the Print Server Properties dialog box, open the Printers folder, and then
choose File, Server Properties.
50. For the Internet printer option, you must specify an URL within the Setup Wizard to
go on to the next dialog box.
51.Internet printing require IIS .
52.By default, anyone with Allow-Print permission can manage their own print jobs.
53.Unreadable text usually indicates an incorrect printer driver. We need to install the
correct driver.
54. Bi-directional support allows the printer to send unsolicited messages (such as "Out
of Paper" or "Low on Toner") to the workstation. The Printer Priority defaults to 1, but it
can be any number between 1 and 99
55. When more than one printer is printing to the same printing device, it is useful to
change priorities (to allow the one with the highest priority to print first).
56. Separator Page lets you choose one of three predefined separator pages or create one
of your own. By default, Windows XP does not separate print jobs or use a separator
page.
57. A printer pool is a single logical printer that prints to more than one printing device. It
prints jobs sent to it to the first available printing device and provides the throughput of
multiple printing devices with the simplicity of a single printer definition.
58. The Computer Management utility offers a storage component that provides the basis
for working with disk devices.
59. The heart of most disk operations resides in the Disk Management tool. You must be
a member of Administrators to access this tool.
60. The System volume holds the files needed to boot the system (the boot files); the
Boot volume holds the files needed by Windows 2000 Professional (the system files).
61. Formatting the drive deletes all data on it. Converting the drive to NTFS (using the
Convert.exe utility) does not delete the data.
62. The disadvantages and limitations of converting to dynamic disks are: 1) Cannot
contain partitions or logical drives; 2) Cannot be accessed by operating systems other
than Windows XP; 3) Dynamic disks are not supported on portable computers.
63. Windows XP Professional, like Windows 98, supports the use of more than one
monitor for creating the output display. Up to 10 monitors can be combined, with the
desktop display divided between them—each capable of having different resolution and
color depth.
64. Windows XP uses ACPI for all power management, from shutdown when low on
battery to startup at the touch of a keyboard key. The options that can be configured from
the Power Options applet in Control Panel are: Power Schemes (allows you to choose the
role of the machine), Advanced (choose whether power-related icons should appear in the
taskbar), Hibernate (choose whether this stage is available).
65.Hibernation is an ACPI feature.
66.. System Information is useful for obtaining a quick snapshot of the system. Beneath
Hardware Resources are six subcomponents that offer the system resource overview:
Conflicts/Sharing, DMA, Forced Hardware, I/O, IRQs, and Memory.
67. If Microsoft can verify that executable files do not behave erratically or cause system
problems or identifiable failures, Microsoft signs the file digitally.
68. When an administrator or user attempts to install a new component, the system
automatically looks for the signature. By default, a system always looks for a driver
signature; this feature is known as System File Protection.
69. SIGVERIF.EXE looks for files that are not digitally signed.
70. The System File Checker utility keeps the operating system alive and well. SFC.EXE
automatically verifies system files after a reboot to see whether they were changed to
unprotected copies. Storing system files in two locations consumes a large amount of disk
space.
71. Task Scheduler allows you to configure jobs to run automatically. For a job to run in
unattended mode, a username and associated password with proper permissions to run the
application must be provided.
72. When you select the Make Available Offline choice, the Offline File Wizard starts.
You can have reminders pop up regularly when you are working offline to tell you that
you are not connected to the network.
73.Enabling offline files is a two step process. First, it must be enabled on the shared files
by allowing the caching of the files.
74. The Synchronization Manager offers three tabs: Logon/Logoff (allows you to
configure whether synchronization should occur when you log on and/or log off or
whether you should always be prompted before you take any action), On Idle (allows you
to configure the items to be updated when the system is idle), and Scheduled (allows you
to define synchronization jobs).
75.A baseline is a history of performance over time and is used to compare against
current activity.
76. Within the System Monitor, the workstation is divided into a number of different
objects. The following objects are normally found in System Monitor: Browser, Cache,
IP, LogicalDisk, Memory, Network Interface, Objects, Paging File, PhysicalDisk,
Process, Processor, Redirector, Server, Server Work Queues, System, TCP, Telephony,
Thread, and UDP.
77. For each object, System Monitor has one or more counters (subsets of the overall
object). There are two types of counters: actual (a true number or an average) and
percentage (from 0 to 100).
78. Performance Logs and Alerts fall into three sections: Counter logs, trace logs, alerts.
79. The five common areas of bottlenecks include: memory, processor, disk, network,
and applications.
80. If the amount of RAM you want to allot to the OS is less than what is installed in
your system, you must use the /MAXMEM switch in the BOOT.INI file.
81.DiskPart is a Windows XP Professional tool which allows the administrator to handle
disk administrative tasks from a command prompt. Diskpart enhances the Disk
Administrator graphical user interface (GUI).
82. Most desktop computers should have only one hardware profile because the hardware
will not deviate greatly. The hardware connected to a laptop/mobile computer can differ
from day to day, based on where it is being used.
83. If a system has multiple hardware profiles, a menu of the choices will appear during
the boot process.
84. The User Profile is the portion of the Registry that is customizable for every user and
is stored in NTUSER.DAT. Whenever a user logs in to a system, he or she automatically
creates a local profile on that system, by default.
85. The profile will be found in {root drive}:\Documents and Settings\{username}.
Profiles can contain the following desktop-related items: Application information,
Cookies, Favorites, Files saved on the desktop, Local settings, My documents, My
pictures, Nethood, Printhood, Recent, Send to, Shortcuts, Start Menu, and Template
items.
86. To configure a user account to use a roaming profile, set the profile path in the
Properties dialog box for that account. A roaming profile enables a user to have the same
desktop regardless of the machine he or she uses. You can copy or delete profiles and
change their type from the System applet.
87. A mandatory profile is a deviation on a roaming profile. It's configured like a
roaming profile, but the file is renamed from NTUSER.DAT to NTUSER.MAN.
88. Multiple Language Support allows you to create documents that can be read in
different languages and to change the information text presented in Windows XP Pro. To
enable multiple languages, you must be a member of the Administrators group; open the
Regional Options applet in Control Panel.
89. Windows Installer is divided into two components: an installer service for the client
(MSIEXEC.EXE) and package files (which have the extension .MSI). .MSI files are the
applications themselves and most often come from software vendors, but can be created
internally by developers.
90.Always wait for the network at computer startup and logon policy. This would force
the Windows XP clients to process the GPOs synchronously which guarantee that they
are all applied.
91. MSI files contain relational databases (multiple tables) of instructions that need to be
carried out. Windows Installer is a component of IntelliMirror and is tightly integrated
with Group Policy. IntelliMirror also includes the ability to administer user settings,
perform remote installation, and mirror data between the network and local machines.
92. The Accessibility Options applet allows you to configure the system for use by
individuals with physical disabilities. Configuration can be done in areas related to the
keyboard, mouse, display, or sound. Accessibility features automatically turn off after a
set time. (Five minutes is the default.)
93. Name resolution is the process of translating user-friendly computer names to IP
addresses. On a very small network, a static file named HOSTS can be used to translate
host names to IP addresses in place of DNS.
94.The /flushdns switch of the Ipconfig command flushes the list of locally cached DNS
names.
95. On a very small network, a static file named LMHOSTS can be used to translate
NetBIOS names to IP addresses in place of WINS. The Import LMHOSTS button allows
WINS to convert your static file to the WINS service.
96. DHCP automatically centralizes and manages the allocation of the TCP/IP settings
required for proper network functionality for computers that have been configured as
DHCP clients.
97.The ping command sends a series of ICMP echo requests to the specified computer.
98.The Alternative configuration feature enables mobile computers to have two different
IP configurations, for example one at the office and one at home.
99. To determine the network settings a DHCP server has leased to your computer, type
IPCONFIG /all at a command prompt.
100. Windows XP offers new parameters for IPCONFIG: /DISPLAYDNS (shows the
contents of the DNS cache), /FLUSHDNS (flushes the contents of the DNS cache),
/REGISTERDNS (renews all leases and DNS configuration), /SETCLASSID (changes
the DHCP class ID), and /SHOWCLASSID (shows the DHCP class ID for all adapters).
101. If systems are on different subnets and cannot communicate, remember that TCP/IP
requires routing to communicate between subnets.
102. NBTSTAT is a command-line utility that enables you to check the resolution of
NetBIOS names to TCP/IP addresses. NETSTAT is a command-line utility that enables
you to check the status of current IP connections. Executing NETSTAT without switches
displays protocol statistics and current TCP/IP connections.
103. The Universal Naming Convention (UNC) is a standardized way of specifying a
share name on a specific computer. Share names can refer to folders or printers. The
UNC path takes the form of \\computer_name\share_name. Share names commonly are
limited to 15 characters.
104. Many 16-bit applications do not work with UNC paths. If you need to work with a
16-bit application that doesn't work with UNC paths, you must map a drive letter to the
shared folder or connect a port to the network printer.
105. You can view the currently shared resources from the command prompt by typing
NET VIEW. You can assign network resources to drive letters from the command prompt
by using the Net Use command and the UNC path of the resource.
106. The following authentication protocols are supported to make your connections as
secure as possible: CHAP, EAP, MS-CHAP, MS-CHAPv2, PAP, SPAP, and smart cards.
107. CHAP is the Challenge Handshake Authentication Protocol, while MS-CHAP is the
Microsoft Challenge Handshake Authentication Protocol (requires the communication to
be between a Microsoft client and a Microsoft server). MS-CHAPv2 also requires the
communication to be between a Microsoft client and a Microsoft server.
108. EAP is the Extensible Authentication Protocol; PAP is the Password Authentication
Protocol (uses clear-text authentication).
109. Smart cards provide a certificate-based authentication.
110. The Encrypting File System (EFS) encrypts and protects file or folder contents. To
use EFS, the file system must be NTFS, and the files must not be compressed. Some files
(system files in particular) cannot be compressed. If you move/copy an encrypted file to
one of these partitions, it becomes unencrypted.
111. Settings that are configured under Computer Configuration apply to the computer,
regardless of who is using it. Settings configured under User Configuration apply only if
the specified user is logged on.
112. In Windows XP, a user can be granted rights and permissions to resources in two
ways: Individually (she is explicitly assigned a right or permission through her account),
or as a group (she is a member of a group that has a right or permission).
113. The Profile Path designates a specific location on a specified server where the user's
profile is going to be stored. The user profile contains the user portion of the Registry in
the file NTUSER.DAT.
114. The most common path entered for the user profile is
\\{SERVER}\{PROFILESHARE}\%USERNAME%, where {SERVER} is replaced by
the name of your server, and {PROFILESHARE} by the name of a folder for that user's
profile. The %USERNAME% variable will expand to the name of the user, which makes
it ideal for use in a template.
115. The logon script allows an administrator to configure common drive mappings, run
central batch files, and configure the system.
116. Account policies are divided into two subsections: Password Policy and Account
Lockout Policy.
117. Password Policy settings apply to all users on the system. It is not possible to have
separate settings by group, user, and so on. Account Lockout Policies are settings that can
be used to automatically lock the account should suspicious activity occur.
118. Auditing can be configured on nine pre-defined system events through the Local
Security Policy shortcut within the Administrative Tools folder of the Control Panel:
Audit Account Logon Events, Audit Account Management, Audit Directory Service
Access, Audit Logon Events, Audit Object Access, Audit Policy Change, Audit Privilege
Use, Audit Process Tracking, and Audit System Events.
119. When auditing is configured, entries are written to the Security log, which can be
viewed with the Event Viewer.

url
http://www.mcseworld.com/forums/showthread.php?t=8014

18 comments:

Anonymous said...

thanks yaar.very use full deatailes include this blog.wish u all the best.i hope u will include mcsa level vidos also

逆円助 said...

さあ、今夏も新たな出会いを経験してみませんか?当サイトは円助交際の逆、つまり女性が男性を円助する『逆円助交際』を提供します。逆円交際を未経験の方でも気軽に遊べる大人のマッチングシステムです。年齢上限・容姿・経験一切問いません。男性の方は無料で登録して頂けます。貴方も新たな出会いを経験してみませんか

精神年齢 said...

みんなの精神年齢を測定できる、メンタル年齢チェッカーで秘められた年齢がズバリわかっちゃう!かわいいあの子も実は精神年齢オバサンということも…合コンや話のネタに一度チャレンジしてみよう

メル友募集 said...

最近仕事ばかりで毎日退屈してます。そろそろ恋人欲しいです☆もう夏だし海とか行きたいな♪ k.c.0720@docomo.ne.jp 連絡待ってるよ☆

動物占い said...

あなたの性格を、動物に例えて占っちゃいます。もしかしたらこんな動物かも!?動物占いをうまく使って、楽しい人間関係を築いてください

家出 said...

家出中の女性や泊まる所が無い女性達がネットカフェなどで、飲み放題のドリンクで空腹を満たす生活を送っています。当サイトはそんな女性達をサポートしたいという人たちと困っている女性たちの為のサイトです

セレブラブ said...

セレブ女性との割り切りお付き合いで大金を稼いでみませんか?女性に癒しと快楽、男性に謝礼とお互い満たしあえる当サイト、セレブラブはあなたの登録をお待ちしております。

夏フェス!! said...

夏フェス一緒に行ってくれる人募集!!夏の思い出一緒につくろぉ☆ megumi-0830@docomo.ne.jp 連絡してね♪

無料ゲーム said...

あなたのゲーマー度を無料ゲーム感覚で測定します。15個の質問に答えるだけの簡単測定で一度遊んでみませんか?ゲームが得意な人もそうでない人もぜひどうぞ。

素人 said...

Hな女性たちは素人ホストを自宅やホテルに呼び、ひとときの癒しを求めていらっしゃいます。当サイトでは男性ホスト様の人員が不足しており、一日3~4人の女性の相手をするホストもおられます。興味を持たれた方は当サイトにぜひお越しください

出会い系 said...

実は出会い系には…関係者用入り口があるのを知っていますか?広告主やスポンサー用に用意されたIDではサクラや業者が立ち入ることが出来ないようになっているのです。当サイトでは極秘に入手した関係者用URLが公開されています

逆援助 said...

男性はお金、女性は快楽を得る逆援助に興味はありませんか?お金を払っても性的欲求を満たしたいセレブ達との割り切り1日のお付き合いで当サイトでは大金を得ることができます。無料登録なのでアルバイト感覚でOK、詳しくはTOPページでどうぞ。

友達募集 said...

ホムペ完成記念!私の事みんなに知ってもらいたくて頑張りましたぁ。色々とご感想をお待ちしているので思った事を意見してください。メアドはほむぺにのせてありますぅ!★ fan.jna@docomo.ne.jp

家出 said...

夏休みで気軽に家出する女子○生が急増しています。しかし家出したはいいものの泊る所やお金が無い彼女たちは、掲示板などで泊めてくれる男性を探す子も多いようです。当掲示板にも夏休みに入ってから通常の3倍以上のメッセージが寄せられています

人妻 said...

今最もアツイバイトは人妻とのセフレ契約です。当サイトではお金を払ってでもセフレがほしい人妻が集まり、男性会員様との逆援生活を待っています。当サイトで欲求不満の女性との出会いをしてみませんか

素人 said...

素人ホストでは、男性のテクニック次第で女性会員様から高額な謝礼がもらえます。欲求不満な人妻や、男性と出会いが無い女性達が当サイトで男性を求めていらっしゃいます。興味のある方はTOPページからどうぞ

友達募集中 said...

少し魅惑な自分をネットだから公開してみました。普段言えない事など、思い切って告白しているプロフなので興味ある方はぜひ除いてみてください連絡待ってまぁす。 hinyaaaaa@docomo.ne.jp

Anonymous said...

Having read this I believed it was really enlightening.
I appreciate you finding the time and effort to put this content together.
I once again find myself spending a significant
amount of time both reading and posting comments. But so what, it was still worth it!


Also visit my site ... How to make money with adfly

About Me

My photo
bangalore, karnataka, India
View sudhesh pnair's profile on LinkedInIn .com