'Examinable' Stuff Flashcards
What is Authentication?
Verifying the identity of someone or something
What is Authorization?
Determining whether someone or something has permission to access a resource
What does Access refer to in the Authorization process?
Determining what actions
something or someone can perform on
the resource based on permission levels
List 3 Windows Authentication methods.
- Kerberos version 5 protocol
- NT LAN Manager
- Certificate mapping
KDC
Key Distribution Center - Kerberos uses this trusted intermediary to manage the use of encrypted keys passed between the clients and server for authentication
List some new authentication features in Windows 7?
- Smartcards
- Windows Biometric Framework (for Biometrics)
- Managing file access in Win 7 through NTFS permissions
- online identity integration
What are NTFS permissions?
Define the type of access granted to a user, group or computer for a file or folder
What are the 2 levels of permission?
- Shared folders permissions
2. NTFS file system permissions
What are Shared Folder permissions?
Allow security principals such as users to access shared resources from across the network. Shared folder permissions are only in effect when users access some resource from across the network.
What are NTFS file system permissions?
Always in effect, whether connected across the network or logged on to the local machine where the resource is located. You grant NTFS permissions to a user of group for a file or folder.
What are explicit permissions?
User creates a file or folder and assign permissions
Inherited permissions
File or folder permissions for a child object default from its parent
Effective permissions
A file or folder’s final, combined permission set that is determined by Windows 7 when a file or folder contains both user and group permissions.
What happens when determining effective permissions?
- User and group permissions are combined
2. Deny overrides allos
What are shared folders?
Shared folders are folders that allow network access to their content.
You can share folders but you cannot share individual files.
The default shared folder’s permission is full control for the user that shared the folder
What methods can be used to share folders?
- MMC console using share’s snap-in
- In Windows Explorer
- Command line using ‘net share’ command
- Through computer management
Network and Sharing Center
Provides services to view, configure and troubleshoot your network access and sharing capabilities
What else does NSC do?
Provides centralized control of network features:
- network map
- network location - private, public, domain
- network discovery
Controls sharing capabilities related to various network resources:
- file sharing
- public folder sharing
- printer sharing
- media sharing
Network discovery
After you enable Network Discovery, components on the computer allow it to map the network and respond to map requests
NTFS File Compression
The method used by the NTFS file system to compress files and folders and volumes
We use compression to save disk space
How do you determine version of Windows (32 or 64bit)
Start -> Right-click Computer -> Properties OR
use msinfo command
What is an upgrade path?
Set of options for upgrading from one Windows OS to another
Upgrade installation
Retains files, settings, and programs
Custom installation
Otherwise known as clean installation. Overwrites files, settings, and programs
Windows Upgrade Advisor
Scans PC for potential hardware devices and programs which may cause problems
Helps determine if:
- your computer can run Windows 7
- which editions and features will work
- whether your computer has any compatibility issues
Windows 7 Compatibility Center
Provides Win7 programs,updates, drivers, and more that are compatible with Window 7
- Can be used to search software issues whilst upgrading
List common installation methods
- High Touch Installation (HTI)
- Lite Touch Installation (LTI)
- Zero Touch Installation (ZTI)
High Touch Installation
Requires manual configuration of each system
May include retail media or standard ISO file
Uses installation DVD or USB and manual installation of OS on every computer
LTI
Requires human intervention in early phases, but is automated or unattended from that point on
Works well in environments of 150+ computers
You need WAIK, Windows Deployment services, and microsoft deployment toolkit
ZTI
Fully automated, “touchless” installation of Windows
Requires System Center Configuration Manager (SCCM) - deploys and updates servers, client computers, and all kinds of devices on a network
- Geared for environments of more than 500+ computers
- Steep learning curve
- Considerable budget compared to HTI
Windows Intune
Allows you to manage installations and upgrades from the cloud
Windows Easy Transfer
Helps you move files and settings from one computer running Windows to another. Cannot transfer programs
Generates .MIG file
What is a User Account?
A collection of information that defines:
- actions that can be taken on a computer
- files and folders that can be accessed (rights, policies, permissions)
Keeps track of user preferences such as the desktop background, window color, and screensaver
User Account Control
A feature in Windows Vista and Windows 7 that requires administrative-level permission to make changes to your computer that affects security or affects settings for other user accounts - 4 levels
Control Panel
A utility that allows you to > configure OS features > set up hardware > install/uninstall software > create and modify users > perform system maintenance
Administrative Tools
A set of utilities for managing advanced Windows features and diagnosing system problems
Windows Desktop Settings
A broad term that refers to many different configurable settings for personalizing Windows such as the Windows theme, desktop background, mouse clicks, pointer speeds, gadgets, shortcuts, and more
Aero Interface
Aero Shake
Aero Snap
Aero Peek
Show Desktop button (far right end of Desktop)
Shortcuts
Icons or links that give you quick access to an original source
Gadget
A small, single-purpose application that can be installed on the Windows 7 desktop
User Profile
Contains all of a user’s personal preferences - from theme choice to screensavers to shortcuts
User profile != User account
Local profile
Available only on computer on which it was created
Roaming profile
Enables a user to use any computer to connect to a Windows domain and access his/her profile
Briefly describe virtualization
A technology that creates an abstract version of a complete OS environment (incl. a processor, memory, storage, network links, a display, and so forth) entirely in software
Software produces a virtual computer or a virtual machine (VM)
Has a guest OS
Microsoft Virtualization
Windows Virtual PC Windows XP mode Microsoft Enterprise Desktop Virtualization (Med-V) Virtual Desktop Infrastructure Application virtualization (App-V)
Ease of Access Center
- Magnifier
- Narrator
- On-screen keyboard
- High contrast
App-V
Permits users to launch and run applications on their desktops without installing or rebooting machine
VDI
Runs a desktop OS within a vm run on a server
MED-V
A way to deliver legacy applications to end users on centrally configured and managed VMs
Windows XP mode
An extension to Windows Virtual PC
When installed on Windows 7, enables users to run applications inside the VM that won’t work on Windows 7
What is an application?
A program that runs on top of the OS or from a server
Helps a user perform a specific task such as word processing, appointment scheduling or accounting
Local installation of an application
software files running directly from a computer
Network installation of an application
software files are made available from an application server on a network
msconfig
System configuration utility
- Enable or disable startup services
- set boot options such as boot into Safe Mode
- Access tools like Action Center and Event Viewer
Windows 7 Library
A virtual folder that can display content from different locations (folders, for example) on your computer or external hard drive
Encryption
Encrypted data is ‘scrambled’ but still readable and usable by the user who encrypted the file
the user and other authorized users can still open and change the file as necessary
Encryption uses:
- encryption keys
- certs
How to encrypt files and folders in Windows 7
Advanced Attributes dialog box
What is compression?
The process of decreasing the size of files/folders without affecting their content
Compressing files replaces repeated data with pointers to the data
BitLocker Drive Encryption
Encrypts an entire fixed disk to prevent access by unauthorized users
Windows Ultimate, Enterprise
BitLocker To Go
Encrypts removable drives such as USBs
Basic disk
- Contains only simple volumes
- Uses partitions and logical drives
- Partition styles: MBR, GUID
Dynamic disk
Divided into volumes instead of partitions
Contains simple,spanned, striped, mirrored
Disk Management
Part of Computer MMC snap-in
- Add a new disk
- Modify the configuration of an installed disk
- Convert a disk
Simple volume
Uses free space available on a single disk
Spanned volume
Extends a simple volume across multiple disks to a maximum of 32
Mirrored volume
Duplicates data from one disk to a second disk for redundancy and fault tolerance
Striped volume
Stores data across two or more physical disks; Raid-0 or RAID-5
Other types of storage
eSATA
USB and USB 2.0
Firewire
iSCSI
Device manager
Displays a list of all devices currently installed on the computer and their status
Must be admin to use Device Manager
Cloud storage for Windows users
Windows Live Mesh
Windows Live Skydrive
OneNote to Skydrive
When to use HomeGroups or Public Folders?
Small office/home office, all using Windows 7
When to use Workgroup?
Peer-to-peer network that includes a mix of computers running Windows 7 and Windows Vista or Windows XP, and you want to share files between the computers
When to use domains and AD?
Large business environments
What are the caveats of Homegroup?
- Can only join and not create Homegroups in Windows Start and Basic editions
- Can only join one homegroup at a time
- Can’t limit access to shared items to individual users
- Non-Windows 7 users require additional setup steps to access shared items in a homegroup
- Must already have a network set up (either wired or wireless)
- To create or join a homegroup, computer’s network location must be set to ‘Home Network’ in the network and sharing center
Permissions
Rules applied to users and groups to limit actions they can take on shared resources
Share permissions
Applies to users who connect to a shared folder over a network
NTFS
Apply to users who log on locally or from across a network
What are effective permissions?
Granted to a user or group based on the permissions granted through group membership and any permissions inherited from the parent object
Name some Windows built-in utilities
Disk Defragmenter, Disk cleanup, task scheduler, and the maintenance section of the Action Center
Disk defrag
A utility that helps improve the computer’s performance by moving sectors of data on the hard disk, so that files are stored sequentially.
Minimizes the movement of a hard disk’s arm must make to read all of the sectors that make up a program
Set up to automatically run once a week
Can take between several minutes an hour depending on the size and level of fragmentation on the disk
How to run disk defrag from the command line
‘defrag/?’
Solid State Drives and disk defrag
SSDs differ from hard disks. They use SS memory to store data, as opposed to writing data to sectors of a hard disk. Therefore, they do not require disk defrag.
Disk Cleanup
Helps user remove unnecessary files from their computers
- downloaded program files
- temporary internet files
- offline webpages
- files left after running software
Task scheduler
Enables a user to schedule and automate a variety of actions such as starting programs, displaying messages, and even sending e-mails
Tasks are scheduled by specifying a trigger, which is an event that causes a task to run, and action, which is the action taken when a task is run
Action Center
Action Center provides a single interface in which you can view the status of security and maintenance features and it alerts you to problems you need to correct and usually provides a way to fix it
System information
Displays a wealth of information about the computer’s hardware, drivers and system software
Check system info for possible clues about the source of system-related issues
Windows Registry
A database of configuration settings for your computer
Self-sufficient, and rarely requires maintenance
Can you a registry cleaner to remove settings no longer used
Made up of keys, subkeys and values
Subkeys have values that make up the preferences, configuration settings and so on of the OS
Types of Windows Updates
- Important updates: security and critical updates, hotfixes, service packs, and reliability improvement
- Recommended updates: These include software updates, and new or improved features to help keep software running optimally
- Optional updates: Optional device drivers for components on your computer, or new or trial Microsoft software
Action Center tracks 7 security features. What are they?
- Network firewall
- Windows update
- Virus protection
- Spyware and unwanted software protection
- Internet security settings
- UAC
- Network Access Protection -
Windows Defender
A free software program that provides antispyware detection for a Windows computer