Messer 220-802 Flashcards
Windows XP Home/Professional minimum requirements
Processor: 233 MHz Memory: 64 MB RAM Free disk space: 1.5 GBs Optical Drive: CD-ROM/DVD-ROM Video: SVGA (800x600) Input: Mouse and keyboard
Windows XP Home/Professional recommended requirements
Processor: 300 MHz Memory: 128 MB RAM Free disk space: 1.5 GBs Optical Drive: CD-ROM/DVD-ROM Video: SVGA (800x600) Input: Mouse and keyboard
Windows XP Media Center minimum requirements
Processor: 1.6 GHz Memory: 256 MBs Free disk space: 60 GBs Disk requirements: DVD-ROM Video: 1024x768 Input devices: keyboard and mouse
Windows XP Media Center maximum
Processor: Two physical CPUs Memory: 4 GB RAM Free disk space 256 TB Disk Requirements: DVD-ROM Video: High resolution Input devices: Remote control, 4 tuners
Windows Vista Home Basic minimum requirements
Processor: 800 MHz
Memory: 512 MB RAM
Hard rive size/free space: 20 GB/15 GB
Video: 32 MB graphics RAM
Windows Vista Home Premium/Ultimate/Business/Enterprise minimum requirements
Processor: 1 GHz
Memory: 1 GB RAM
Hard drive space/free space: 40 GB/15 GB
Video: 128 MB graphics RAM
Windows 7 (x86) minimum requirements
Processor: 1 GHz
Memory: 1 GB RAM
Free disk space: 16 GB
Video: DirectX 9 graphics device with WDDM 1.0 or higher driver
Windows 7 (x64) minimum requirements
Processor: 1 GHz
Memory: 2 GB RAM
Free disk space: 20 GB
Video: DirectX 9 graphics device with WDDM 1.0 or higher driver
Windows 7 Starter features
2 GB x86 RAM
Windows Home Premium features
DVD playback Aero ICS IIS 4 GBs x86 RAM 16 GBs x64 RAM
Windows 7 Professional features
DVD playback Aero ICS IIS Domain membership EFS 4 GB x86 RAM 192 GB x64 RAM
Windows Ultimate/Enterprise features
DVD playback Aero ICS IIS Domain membership EFS Bitlocker 4 GB x86 RAM 192 GB x64 RAM
Aero
Windows 7 enhanced graphical interfact
ICS
Internet Connection Sharing
One computer provides the internet for multiple devices
IIS
Internet Information Services
Microsoft’s web server
EFS
Encrypting File System
Filesystem-level encryption of all data
Windows XP Home can upgrade to
Vista Home Basic
Vista Home Premium
Vista Business
Vista Ultimate
Windows XP Professional can upgrade to
Vista Business
Vista Ultimate
Windows XP Media Center can upgrade to
Vista Home Premium
Vista Ultimate
Windows Vista Home Basic can upgrade to
Windows 7 Home Basic
Windows 7 Home Premium
Windows 7 Ultimate
Windows Vista Home Premium can upgrade to
Windows 7 Home Premium
Windows 7 Ultimate
Windows Vista Business can upgrade to
Windows 7 Professional
Windows 7 Ultimate
Windows 7 Enterprise
Windows Vista Ultimate can upgrade to
Windows 7 Ultimate
Windows Vista Enterprise can upgrade to
Windows 7 Enterprise
ipconfig
Windows tcp/ip configuration
ipconfig /all
Show all tcp/ip details
ipconfig /release
Release the DHCP lease
ipconfig /renew
Renew the DHCP lease
ipconfig /flushdns
Flush the DNS resolver cache
Ping
Test reachability to another network node/resource
ping
Test reachability to a tcp/ip address
ping -t
Ping until stopped with Control-C
ping -a
Resolve address to a hostname
ping -n
Send a # of echo requests
ping -f
Send with Don’t Fragment flag set
tracert
Determine the route a packet takes to a destination
Takes advantage of ICMP Time to Live Exceeded error message
Not all devices will reply with ICMP Time Exceeded messages
nslookup
Lookup information from DNS servers
Canonical names, IP addresses, cache timers, etc
netstat
Network statistics
netstat -a
Show active connections
netstat -b
show binaries
netstat -n
Do not resolve names
nbtstat
Query NetBIOS over tcp/ip information
nbtstat -n
List local NetBIOS names
nbtstat -A
List remote netBIOS names
nbstat -a
List remore NetBIOS
net
Windows network commands
net use
Connect to a resource
net view
List available resources
net start /net stop
Start or stop Windows services
fixmbr [device-name]
Fix the MBR on Windows XP
bootrec /fixmbr
Fix the MBR on Windows Vista/7
fixboot [drive]
Fix the boot sector on Windows XP
bootrec /fixboot
Fix the boot sector on Windows Vista/7
diskpart
Disk partitioner
Replaces the Pre-Windows XP fdisk command
format
Format a disk
Prepares a disk for use by the Operating System
chkdsk
Check Disk
chkdsk /f
Fixes logical errors on the disk
chkdsk /r
Locates bad sectors and recovers information
md
Make directory
cd
Change directory
rd
Remove directory
dir
List files and directory in current location
del
Remove a file from a directory or disk
copy
Duplicates files
copy /v
Verifies that new files are written correctly
copy /y
Suppresses overwrite prompts
xcopy
Copies multiple files and directory trees
robocopy
Functionality replaces xcopy
Designed to handle NTFS file system details
tasklist
Displays a list of currently running processes for the local or a remote device
taskkill
Terminates tasks by process id (PID) or image name
sfc
System File Checker
sfc /scannow
Runs the System File Checker
Scans the integrity of all protected file systems
shutdown
Shuts down a computer
FAT32
File Allocation Table Native support in Windows 2000 and newer Some older Windows versions provided limited support Larger (2 TB) volume sizes Maximum file size of 4 GBs
NTFS
NT File System
Windows NT, 2000, XP, Server 2003, Server 2008, Vista, 7
Quotas, file compression, encryption, symbolic links, large file support, security, recoverability
CDFS
Compact Disc File System
ISO 9660 standard
All operating systems can read the CD
Quick format
Wipes data from the drive and performs no additional checks
Full format
Wipes data from the drive
Checks for bad sectors
Time consuming
Primary partitions
Bootable partitions
Maximum of four primary partitions per disk
One of the primary partitions can be marked as active
Extended partitions
Used for extending the maximum number of partitions
One extended partition per hard disk (optional)
Contains additional logical partitions
Logical partitions inside an extended partition aren’t bootable
Computer Management
A pre-built Microsoft Management Console
Includes System Tools, Storage, and Services and Applications
Device Manager
View the status of all device drivers
Enable and disable hardware devices
Users and Groups
Manage access to the OS
Administrators and Guest users
Local Security Policy
Administration of security rules
Password policy, account lockout policy, etc.
Performance monitor
Gather long-term statistics
Set alerts, store statistics
Windows Services
Manage background processes
Start, stop, manage automatic start
Start with services.msc
System Configuration
msconfig
Manage boot processes, startup, services, etc.
Task scheduler
Schedule an application or batch file
Component Services
Device COM+ Management, Event Viewer, Services
Data Sources
Administer ODBC drivers and connectivity
Print Management
Manage printers from one central console
Memory Diagnostics
Perform a hardware check on your RAM (Vista and 7)
Windows Firewall
Allows or denies data transfer over the network
Advanced Security provide additional security options in the rules
Task Manager
Real-time system statistics
CPU, memory, disk access
Disk Management
Administer disk-related operations
Drive status, adding drives, adding arrays
Side-by-Side
Simultaneous move between two PCs
Wipe-and-Load
Export data, load new OS, and import
File and Settings Transfer Wizard
Migrate from Windows 95, 98, 98 SE, ME, NT 4.0, 2000, XP, and Server 2003 to Windows XP
Windows Easy Transfer
Migrate from Windows XP, Vista, or 7
User State Migration Tool
Command line migration
regedit
Registry Editor
Can be used to backup and restore parts of the registry (hives)
Windows Registry
Large master database of Windows settings
Used by the kernel, drivers, and services
mmc
Microsoft Management Console
Build your own management framework
Choose from a list of snap-ins
A number of built in tools to manage Windows
mstsc
Microsoft Terminal Services Client
Remote Desktop Connection
Access a desktop on another computer
Commonly used to manage “headless” servers
Notepad
View and edit text files
Can create scripts and web pages
Explorer
File management
View, copy, and launch files
msinfo32
Windows System Information
Hardware resources - Memory, DMA, IRQs
Components - Multimedia, input, network
Software environment - Drivers, print jobs
dxdiag
DirectX Diagnostics Tools
Manage your DirectX installation
Multimedia API
Generic diagnostic tool for audio and video
Internet Options
Windows browser and proxy configuration
Display
Resolution options, text size
User Accounts
Local user account names and types
Folder Options
Manage Windows Explorer options
System
Computer information, OS version
Security Center
Central security overview
Anti-virus, anti-spyware, automatic updates
Windows Firewall
Control Network Access, protect from attacks
Power Options
Manage power use
Display, storage devices, hibernation options
Home Groups
Windows 7
Easily share documents, pictures, music, video
Action Center
Windows 7
Consolidated alert view for updates and security
RemoteApp and Desktop Connections
Windows 7
Remote applications look like they’re local
Applications are configured on the server
Troubleshooting
Windows 7
High-level diagnostics
Tablet PC settings
Windows Vista
Handedness, handwriting recognition, display
Pen and Input Devices
Windows Vista
Tap options, pointer options, flicks
Offline Files
Windows Vista
Disk usage, encryption, and network options
Problem Reports and Solutions
Windows Vista
Automatic problem identification
Printers
Windows Vista
Common console for printer management
Add/Remove Programs
XP
Programs, Windows components, program access
Network Connections
XP
Local, VPN, serial infrared, etc.
Change Firewall settings
Network Setup Wizard
XP
Step-by-step network setup
Printers and Faxes
XP
Start, pause, share printers
Add a fax
Automatic Updates
XP
Security patches, OS updates
Wired
Ethernet cable
The fastest connection is the default route
Wireless
Network name - SSID Service Set Identifier
Use either WPA or WPA2
Wireless Wide Area Network
WWAN
Network using mobile providers
Dialup
Uses a modem and standard phone lines
VPN Concentrator
Establish a private network from remote locations
Windows includes a built-in VPN client
Speed and Duplex
Auto-negotiate isn’t always foolproof
Both sides must match
Wake on LAN
Computer sleeps until needed
Designed for late-night updates
Quality of Service
QoS Prioritize network traffic Applications, VoIP, video Infrastructure must support QoS DSCP (Differentiated Services Code Point) Manage through local computer policy
Virtualization
One computer, many operating systems Requires extensive resources • CPU processor support • Memory to support multiple OS • Disk space for multiple OS • Network connection - each OS is virtual
Host-based virtualization
Your normal desktop plus others
Hypervisor
The virtual machine manager
Backup types
Full
Differential
Incremental
Full backup
Copies everything
Differential backup
Copies everything since the last backup
Incremental backup
Backup what’s changed since the last full or incremental backup
S.M.A.R.T.
Self-Monitoring, Analysis, and Reporting Technology
Disk check
chkdsk
Logical and physical disk check
Defragmentation
Moves fragmented files and makes them contiguous
Graphical version and defrag command
Can use Task Scheduler
Windows Updates
Security patches, new features, driver updates
Automated - download and install or download only
Patch management
Testing, scheduling, implementing, and fallback
Driver/firmware updates
Typically updated when a problem is discovered
Many drivers receive updates via Windows Updates
Anti-virus updates
Signatures are constantly updated
Automatic schedule, daily or hourly
Anti-virus
An application that protects against viruses and various malware
Spyware
Sends personal information and computing habits to others
Host-based firewall
Protect against others on the network
Can view all local applications
Network firewall
Filters physical network connections by port number
Can encrypt and/or proxy
Account information
A personal identifier
Usually combined with additional credentials
Password protection
Strong passwords prevent brute-force attacks
Build passwords with letters, numbers, and special characters
User rights and permissions
NTFS file permissions are more granular than FAT
Assign individual user permissions
Hardware locks
Conventional, biometric, electronic, etc.
Tailgating
Walking into a building behind someone else
Dumpster diving
Digging through the trash to find data
Shredding
Prevents discarded documents from being accessible to those looking to steal data
Multi-factor Authentication
A secondary source of identity authentication (e.g., a code via text message)
Smart card, USB token, hardware/software token, SMS text
Shoulder surfing
Someone watching your activities from over your shoulder
Password security
No single words, no obvious passwords
Use upper and lowercase letters, numbers, and special characters
Restrict user permission
Users do no get administrative rights
Assign rights based on groups
Limit access based on job requirements and responsibilities
Disable unnecessary accounts
Guest, root, mail, etc.
Disable interactive logins for services
Change the default usernames (e.g., change Administrator)
Desktop security
Require a screensaver password that is integrated with login
Disable autorun in XP and Vista in the registry
Consider changing AutoPlay
Disk formatting
low level - erases all the data, requires special utilities
high level - does not erase the data
Hard drive security
Remove data with file-level or whole disk data wiping
Physical drive destruction may be required
Google Android
Open Handset Alliance
Open-Source OS based on Linux
Supported on different devices
Apple iOS
Apple iPhone and iPad OS
Based on Unix
Exclusive to Apple products
Display calibration
Resistive touch screens only
Accelerometer
Motion sensor
Detects orientation of the device
Gyroscope
Detects pitch, roll, and yaw
Multi-axis sensing
GPS
Satellite location tracking
Longitude, latitude, and altitude
Provides maps and directions
Mobile Wireless Networking
Both WiFi ad Bluetooth
Bluetooth
10 meter short-range network
Bluetooth pairing
Enable Bluetooth on both devices Set devices to discoverable mode Select discovered device Enter or confirm pin Test connectivity
iOS Synchronization
Apple iTunes - syncs everything on the phone
Wired or wireless
iCloud - syncs some items
Android synchronization
Sync online with Google
Transfer movies and music over USB
Network physical security
Restrict physical access to the devices
Lock and key, electronic, or biometric
Network account info
Change the default usernames and passwords
Wireless encryption
Use WPA/WPA2
SSID management
Service Set Identifier
Change from default SSID
Consider disabling SSID broadcast
MAC address filtering
Media Access Control - the physical address of the NIC
Each NIC has a unique MAC address
Limit access at the network level
Easily spoofed
Wireless power restrictions
Limit the strength of your SSID broadcast
Automatic IP addressing
Simplifies network administration
Disabling ports
Disable all unused ports
Consider using Network Access Control (NAC) 802.1x
Passcode locks
Restricts access to the device
Pin or passphrase
iOS: wipes all data after 10 failed attempts
Android: Locks device and requires Google sign in to unlock
Location apps and remote wipe
Uses built-in GPS
Find your mobile device
Make a sound or display a message on the device
Wipe the device
Remote backup
Backup to the cloud
No local device required
One-click restoration to a new device
Antivirus
iOS: Closed architecture
Android: Apps can be installed from anywhere
Apps run in a sandbox
User controls scope of each app
Patching and OS updates
Update regularly for the best security features
POP3
Post Office Protocol 3
Downloads mail and deletes it from the server
Used when you only have one mail device
IMAP
Internet Message Access Protocol
Downloads mail to device and does not delete from the mail server
Used when you have multiple mail devices
SMTP
Simple Mail Transfer Protocol
Sends email
Configured separately from inbound email config
Securing email transfers
Configure SSL (Secure Socket Layer) Encrypts email between the device and the server
Microsoft Exchange
Uses proprietary protocols for sending and receiving email
Includes contacts, calendars, tasks, etc.
Integrates with Active Directory database
Gmail
Google’s email service
Web, POP, and IMAP
Uses Google Calendar for scheduling
Multimeter
Measures voltage, current, resistance for AC and DC
AKA Volt-Ohm Meter
Check power supply voltage, cable continuity
Power Supply Tester
Connect inline with devices for detailed power statistics
Loopback plug
Used for diagnostics and troubleshooting physical ports
Determine if a received signal is the same as the sent signal
POST test cards
Connects to expansion slots
Runs diagnostics during boot
Troubleshooting Theory Steps
- Identify the problem
- Establish a theory of probably cause
- Test the theory to determine cause
- Establish a plan of action to resolve the problem and identify potential effects
- Implement the solution or escalate as necessary
- Verify full system functionality and, if applicable, implement preventative measures
- Document findings, action, and outcomes
Lockups
Check for activity lights
Update/downgrade drivers and software patches
Consider reverting to a restore point
POST
Test system components before starting the OS
Failures are noted with beeps and/or codes
Every manufacturer uses different codes
Blank screen on boot
Bad video, BIOS configuration issue
Listen for the beeps
Booting to an incorrect device
Set boot order in the BIOS configuration
Confirm that the boot device has a valid OS
Unplug USB devices and/or remove CDs/DVDs
Continuous reboots
How far does the boot order process get?
Try safe mode or OS recovery options
The CMOS battery
Bad battery will display messages on every boot
Can reset the BIOS by removing the battery
Excessive heat
Heat generated from CPUs, video adapters, and memory
Check cooling fans and heat sinks
Verify temperatures with monitoring software
Noise
Loose components can rattle
Hard drive scraping noises and clicking
Check fans for obstructions
Odors
Electrical problems
Always disconnect power
Locate and replace bad components