1 - Windows Versions Flashcards

1
Q

What was the first Microsoft OS version created?

A

MS- DOS

MS-DOS was created in 1981, and originally developed by Microsoft for IBM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What were three significant advancements of Windows 95 over Windows 3.1?

A
  1. Windows 95 sported a new user interface.
  2. Windows 95 supported 32-bit applications.
  3. Applications specifically written for the Win 95 OS could run much faster.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What new technologies did Windows 98 support?

Hint - list of 7

A

Win 98 supported a number of new technologies, including:

  1. FAT32
  2. AGP
  3. MMX
  4. USB
  5. DVD
  6. ACPI
  7. Active Desktop
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What did the Win 98 “Active Desktop” feature do?

A

Active Desktop integrated the web browser (Internet Explorer) within the OS.

Thus, for the User, there was no difference between accessing a document on the local HD or accessing a Web server anywhere in the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What option did the Win ME OS remove?

A

The Win ME OS removed the “Boot in DOS” option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the 4 versions of Windows 2000 (W2K)

Microsoft released

A

Microsoft released four versions of Windows 2000:

  1. Win 2000 Professional - for business desktop and laptop systems
  2. Win 2000 Server - both a Web server and an office server
  3. Win 2000 Advanced Server - for line-of-business applications
  4. Win 2000 Datacenter Server - for high-traffic computer networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When was Windows XP released?

A

XP was released in 2001.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What were three new features of Windows XP?

A
  1. Redesigned look and feel to the User interface
  2. XP was built on W2K kernel, giving the user a more stable and reliable environment
  3. Windows XP implemented 802.11x wireless security

Trivia - XP would be the best selling OS until 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What were 6 improvements Windows Vista offered (when compared to XP)?

A
  1. Advancements in reliability
  2. Additional security (features to protect against latest generation of threats)
  3. Ease of deployment, performance and manageability
  4. Capabilities to detect hardware problems before they occurred
  5. Faster start-up time
  6. Lower power consumption when placed in the sleep state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What were 8 enhancements Windows 7 offered?

A

Win 7 was released on 10/22/2009. Enhancements in this OS included:

  1. Multi-touch support
  2. Internet Explorer 8
  3. Improved performance
  4. Faster start up time
  5. Aero snap / Aero shake
  6. Support for virtual hard disks
  7. New and improved Windows Media Center
  8. Improved security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe 4 features of Windows 8

A

Win 8 was released on 8/1/2012. Features of Windows 8 included:

  1. Replaced traditional Microsoft Windows OS look with a new “metro” design system that first debuted on the Windows Phone 7
  2. Made to mimic the look and feel of a tablet / mobile device
  3. Metro user interface consisted of a “Start screen” made up of “live tiles”
  4. Windows 8 supported both x86 and ARM processors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe 4 features of Windows 10

A

Win 10 was released on 7/29/2015. Features of Windows 10 included:

  1. Fast start up and resume
  2. Built in security
  3. Return of the Start Menu in an expanded form
  4. First version to feature / include Microsoft Edge, MSFT’s new browser

Note: any qualified device (tablets, PCs, phones and Xboxes) were able to upgrade to Win 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the definition of a Server?

A

A server is a computer or system that provides resources, data, services, or programs to other computers (known as clients) over a network.

Whenever computers share resources with client machines they are also considered servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name four types (examples / categories) of Servers

A
  1. File Servers
  2. Print Servers
  3. Application Servers
  4. DNS Servers
  5. Web Servers
  6. Mail Servers
  7. Virtual Servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A device can be both a server and a client at the same time.

[TRUE OR FALSE]

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the “Client-Server” networking model

A
  1. A client will first require data or functionality from a server. The client will send a request over the network.
  2. The server receives this request.
  3. The server will respond with the appropriate information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is another name for the Client-Server networking model?

A

The Call and Response model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define “File Servers”

A

File servers store and distribute files. Multiple clients or users may share files stored on a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define “Print Servers”

A

Print servers allow for the management and distribution of printing functionality. Rather than attaching a printer to every workstation, a single print server can respond to printing requests from numerous clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define “Application Servers”

A

Application servers run applications in lieu of client computers running applications locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define “DNS Servers”

A

Domain Name System (DNS) servers are application servers that provide name resolution to client computers by converting names easily understood by humans into machine-readable IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define “Mail Servers”

A

Mail servers are a very common type of application server. Mail servers receive emails sent to a user and store them until requested by a client on behalf of said user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define “Web Servers”

A

One of the most abundant types of servers in today’s market is a web server.

A web server is a special kind of application server that hosts programs and data requested by users across the Internet or an intranet.

24
Q

Define “Database Servers”

A

The amount of data used by companies, users, and other services is very high. Much of that data is stored in databases.

25
Q

Define “Virtual Servers”

A
  • Virtual servers are the “new thing”, and are taking the server world by storm.
  • Unlike traditional servers that are installed as an operating system on machine hardware, virtual servers exist only as defined within specialized software called hypervisor.
  • Each hypervisor can run hundreds, or even thousands, of virtual servers all at once.
26
Q

What is a workstation (WS)?

[Definition]

A

A workstation (WS) is a computer dedicated to a user or group of users engaged in business or professional work.

27
Q

Name four components of a workstation

A
  1. One or more high resolution displays
  2. Faster processor than a personal computer (PC)
  3. Greater multitasking capability due to additional RAM
  4. Additional drives and drive capacity
28
Q

Name two other items that the term “workstation” can also be used to reference

A
  1. A PC
  2. A mainframe terminal on a local area network (LAN)

Note: These workstations may share network resources with one or more large client computers and network servers. A workstation is a computer which requests access to the LAN and switch services to perform dedicated tasks.

29
Q

Describe the 5 steps to setting up a Work Group in Windows 10

A
  1. Navigate to the Control Panel > All Control Panel Items > System. You will get to view basic information about your computer.
  2. Click on Change Settings under Computer name, domain, and work group settings to arrive at the System properties pop-up.
  3. Click on “Change” to rename this computer.
  4. Under the Computer Name/Domain Changes pop-up, you’ll have the option to join the work group of your choice.
  5. Ensure that all the devices you want in a particular work group are joined to that work group.
30
Q

A Work group may also be known as what?

A

A work group is also known as a peer-to-peer network.

31
Q

Describe 2 characteristics of a Work Group (functionalities)

A
  1. Allows all participating and connected systems to access shared resources such as files, system resources and printers.
  2. Every PC in a work group is a server and a client at the same time. A PC will act as a client when it seeks to access a resource in another PC.
32
Q

A Work Group is the same thing as a Network

[TRUE / FALSE]

A

FALSE

Note - While a work group is a group of computers that are connected to a network, it’s not the same as a network.

33
Q

Work groups can easily be used in a large setting.

[TRUE/FALSE]

A

FALSE.

While work groups can be handy in a small setting, in a large setting they are very limited.

34
Q

Describe 3 advantages of Domains over Work Groups.

A
  1. The Domain set up ensures better security as it offers varying degrees of permissions for different users or groups of users.
  2. Domains also allow company-wide policies to be deployed for easier administration.
  3. User accounts and passwords are managed on the domain controller, so you can log in with the same username and password on any computer joined to the domain.
35
Q

Name the four types of User Accounts

A
  1. Administrator
  2. Standard
  3. Guest
  4. Child
36
Q

Define Administrator account

(User account)

A
  • Administrator accounts are special accounts that are used for making changes to system settings or managing other people’s accounts.
  • They have full access to every setting on the computer.
  • Every computer will have at least one Administrator account.
37
Q

Define Standard account

(User account)

A
  • Standard accounts are the basic accounts you use for normal everyday tasks.
  • As a Standard user, you can do just about anything you would need to do, such as running software or personalizing your desktop.
38
Q

Define Guest account

(User account)

A
  • Guests can play with the computer, but the computer doesn’t recognize them by name.
  • Guest accounts function much like Standard accounts but with no privacy: Anybody can sign in with the Guest account, and the desktop will look the way the last guest left it.
39
Q

Define Child account

(User account)

A

The Child account setting is actually just a Standard account with the Family Safety settings automatically turned on.

40
Q

Define Service account

A

Service accounts are a special type of non-human privileged account used to execute applications and run automated services, virtual machine instances, and other processes.

41
Q

Service accounts can be privileged local or domain account.

[TRUE/FALSE]

A

TRUE.

Service accounts can be privileged local or domain accounts, and in some cases, they may have domain administrative privileges.

42
Q

Name two functions of Service Accounts.

A
  1. Service accounts are needed for persistent applications so that they can perform actions on behalf of the users of the application.
  2. In other words, Service accounts are proxies for performing limited actions for users that have no access to sensitive data and systems.
43
Q

Name the four most common types of Windows Service accounts

A
  1. LocalSystem
  2. NetworkService
  3. Local user account
  4. Domain user account

NOTE: In short, a service account is a user account that is created to run a particular service or software

44
Q

What is SID an acronym for?

A

SID is short for security identifier.

45
Q

What is an SID used for?

A

An SID (Security Identifier) is a number used to identify user, group, and computer accounts in Windows.

46
Q

When is an SID created?

A

An SID is created for an account when it is first made in Windows.

Note: No two SIDs on a computer are ever the same.

47
Q

What do all SIDs start with?

Hint - format is X-X-X-XX

A

All SIDs start with S-1-5-21 but will otherwise be unique.

48
Q

What value do Administrator Accounts in Windows always end in?

(SID)

A

Administrator accounts in Windows always ends in 500.

49
Q

What value do Guest Accounts in Windows always end in?

(SID)

A

Guest accounts in Windows always ends in 501.

50
Q

Using the CLI, what command can be used to get SID information?

A

Open a command line box and type in:

wmic useraccount get name and SID

51
Q

Name the three key elements included in most access tokens

A
  1. Header
  2. Payload
  3. Signature
52
Q

What information does the Header contain?

(Access tokens)

A

The Header contains data about the token’s type and the algorithm used to make it.

53
Q

What information does the Payload contain?

(Access tokens)

A

The Payload contains information about the user, including permissions and expiration.

54
Q

What information does the Signature contain?

(Access tokens)

A

The Signature contains verification data so the recipient can ensure the authenticity of the token.

This signature is typically hashed, so it’s difficult to hack and replicate.

55
Q

You can use Access Tokens for single sign-on (SSO).

[TRUE/FALSE]

A

TRUE

56
Q

Describe the 4 step process for using an access token for single-sign on.

A
  1. Authorization: You agree to use your credentials from one site to enter another.
  2. Connection: The first site connects the second and asks for help. The second site creates an access token.
  3. Storage: The access token is stored in your browser.
  4. Entry: The access token from the second site gives you entry into the first.

Note: think of this like a hotel key card. You check in at the front desk and receive a key card to unlock your room door. The hotel gets your credit card information, your name address, and verifies your identity. Then from there you receive the key card. The card doesn’t need to know any of that information. It only needs to know if it should grant you access to the room.