System Implementation Flashcards

1
Q

What features were introduced in Windows 7 that were not found in previous versions?

A

Windows 7 introduced the following features not found in previous versions:

  • Enhanced Aero features, including:
    • Snap (maximizes window when dragged to top of screen)
    • Shake (hide/show all windows except for the window being “shaken”)
    • Peek (reveals the desktop by making all windows transparent)
  • Redesigned taskbar with the ability to pin applications.
  • Libraries.
  • Improved backup and restore flexibility.
  • XP Mode (Professional, Ultimate, and Enterprise only).

HomeGroup, which allows a group of PCs on a home network to share files and printers. HomeGroup simplifies the management of workgroups for administrators. Both HomeGroup and workgroup can co-exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the minium hardware reuqirements for Windows 7?

A

Minimum Hardware Requirements:

  • 1 GHz processor
  • 1 GB RAM (2 GB for a 64-bit system)
  • 16 GB free disk space (20 GB for a 64-bit system)
  • 128 MB video memory with DirectX 9 support

DVD-ROM drive (if installing from a DVD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What features were introduced in Windows 8/8.1?

A

Windows 8/8.1 introduced the following features:

  • UEFI integration (including UEFI Secure Boot)
  • Hybrid Boot mode
  • USB 3.0 support
  • Windows Metro UI, which is optimized for touchscreen devices
  • Windows Store apps
  • Charms and the charm toolbar, which provides access to system and app controls
  • Start button removed (Windows 8)
  • Start button reintroduced (Windows 8.1)
  • Start screen (replaced the traditional Start menu)
  • OneDrive integration (Windows 8.1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the minimum hardware requirements for Windows 8/8.1?

A

Minimum Hardware Requirements:

  • 1 GHz processor with support for PAE, NX, and SSE2
  • 1 GB RAM (2 GB for a 64-bit system)
  • 16 GB free disk space (20 GB for a 64-bit system)
  • DirectX 9 graphics device with WDDM driver
  • DVD-ROM drive (if installing from a DVD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What features were introduced in Windows 10?

A

Windows 10 introduced the following features:

  • Universal Windows Platform (UWP)
  • Native Ubuntu Linux compatibility
  • Cortana, Microsoft’s “intelligent personal assistant” software
  • Microsoft Edge web browser (replaces Microsoft Internet Explorer)
  • DirectX 12 and WDDM 2.0 support
  • Start menu reintroduced with new tile design
  • Improved security features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the minimum hardware requirements for Windows 10?

A

Minimum Hardware Requirements:

  • 1 GHz processor with support for PAE, NX, and SSE2
  • 1 GB RAM (2 GB for a 64-bit system)
  • 16 GB free disk space (20 GB for a 64-bit system)
  • DirectX 9 graphics device with WDDM driver
  • DVD-ROM drive (if installing from a DVD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps to install Windows from the installation media?

A

Use the following steps to install Windows from the installation media:

  1. Prepare the system hard disk(s). If you are performing a clean install on a new hard disk, you can partition and format the disk during the installation process. However, you will need to prepare disks before the installation if you want to install Windows on a hardware RAID array (RAID 0, RAID 1, RAID 5, RAID 10, etc.). Some motherboards include an integrated RAID controller that allows you to build an array from multiple SATA hard disks installed in the system. You can also install a RAID controller board in an expansion slot to define a RAID array. If you need to configure a RAID array prior to installation, do the following:
    • Install the drives required to support the desired RAID level in the system.
    • Do one of the following:
      • If using an integrated RAID controller on the motherboard, access the BIOS/UEFI configuration interface and enable RAID instead of traditional SATA operations.
      • If using a RAID controller board, install the board in an expansion slot and then boot the computer. During system boot, the RAID BIOS will load. Press the key combination specified in the RAID BIOS screen to enter the RAID configuration utility.
    • Define a new RAID array of the desired type using the disks installed in the system.

Adding a hard disk to a RAID array will destroy all existing data on that disk. Be sure to back up any data you want to keep before adding the disk to the array.

  1. Insert the installation media (such as a DVD or USB flash drive) and then boot from that media.
  2. During the first part of the installation, Windows loads the necessary files it needs to start the installation. During this phase, you may need to load additional drivers to support your storage controller so that Windows can write to the disk. This commonly occurs when installing to a RAID array. To do this, select Load Driver. You must have the necessary drivers available on a USB flash drive.
  3. After the initial files and drivers are loaded, you select the disk where you want to install Windows. At this point you can choose an existing partition (if one exists), or create a new partition.
  4. After Windows prepares the disks, it starts copying files to the hard disk. When the file copy is complete, the system will reboot. Leave the installation media in the drive until prompted to remove it.

After the system reboots, Windows configures the system. You will be prompted for configuration information such as the region and language, the computer name, date and time, and network settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you perform a network installation of Windows?

A

To perform a network installation, the Windows installation files must first be copied to a network location. Then, the installation process is run remotely over a network connection. This allows multiple systems to be installed at the same time using the same installation files. To do this, you must first:

  • Configure a Windows Deployment Services (WDS) server. This server contains the files needed to install Windows on remote computer systems over a network connection. WDS functions in conjunction with the Preboot Execution Environment (PXE) to load a miniature version of Windows, known as the Windows Preinstallation Environment (Windows PE), on network hosts. Windows PE is a minimal version of the Windows operating system. Its purpose is to get a basic system up and running such that the host can connect to the WDS server and install a full version of Windows.

Boot the host computer where Windows is to be installed using a PXE boot. The computer will connect to the WDS server and boot into Windows PE. Once done, Windows can be installed locally from the WDS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How would you restore a Windows installation?

A

You can perform a repair installation to fix a currently installed Windows implementation. A Repair Installation will restore corrupt or missing DLLs, fix registry problems, and fix startup files while preserving user accounts, data, applications, and installed drivers.

To perform a repair installation, do the following:

  1. Insert your Windows installation media.
  2. Run the Setup.exe file on the installation media.
  3. Elevate privileges when prompted by UAC.
  4. Accept the license agreement.
  5. Specify how the repair installation should occur. You can select from the following options:
    • Keep personal files, apps, and Windows settings
    • Keep personal files only
    • Nothing
  6. Wait while Windows is reinstalled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What atsks should you complete following a successful installation of Windows?

A

Complete the following tasks following a successful installation of Windows:

  • Edit the BIOS/UEFI settings to boot from the hard drive first. This prevents the system from accidentally booting from the optical drive or the USB drive.
  • Update device drivers for unrecognized devices. During installation, drivers for many devices are installed from drivers on the installation disc. However, Windows may not include device drivers for all the hardware in the system. Use Device Manager to verify the status of all hardware devices. If necessary, manually download and install drivers for any unknown devices.
  • Configure Windows Update and download the latest updates. This may take some time to complete, so plan according in your deployment plan.
  • When Windows clients are installed into a Windows domain, verify that they are in the right time zone and are configured to get time from the correct time provider. Use the w32tm command line utility as follows:
    • w32tm /tz returns the current time zone settings on the client.
    • w32tm /query /source returns the time source being used by the Windows Time service on the client.
    • w32tm /query /status returns the status of the Windows Time service on the client.
    • w32tm /? displays command line help for other w32tm parameters that can be used for configuring, monitoring, and troubleshooting the Windows Time service on the client.
  • After installation, you must activate your copy of Windows. Activation does not send personal information to Microsoft (it isn’t the same as registration). Some things to remember about activation are:
    • During activation, the product ID, hardware hash, and the product keys are verified through Microsoft.
    • You can activate over the internet. The system will warn you if your activation is about to expire.
    • If you reinstall Windows, it will need to be activated again.
    • As a best practice, consider not activating Windows until you are sure the system is stable. This allows you to use the system for several days without activation, letting you reinstall if necessary.
    • A significant hardware change, such as upgrading your motherboard, may require Windows to be reactivated. If this is the case, you might need to contact Microsoft to get a reactivation key.
  • Configure the Windows Firewall and install anti-malware software. Be sure to update your anti-malware definition files.
  • Migrate user configuration settings and data:
    • If you perform an in-place upgrade installation, user settings and data are automatically retained; you do not need to use these tools to transfer files. But you should verify that all installed applications run correctly.
    • If you perform a new installation on the existing system, run the transfer utility before performing the installation and save the resulting files to removable media or a network location. Following the installation, run the transfer utility to copy the data into the new installation.
    • If you are moving from an old computer to a new computer, you can transfer files directly between the two computers.
    • Migrating user settings and files does not migrate applications on the new computer, nor does it migrate system files such as fonts or drivers.
  • Once the installation is complete, install applications and add other Windows features.

Configure system backups and other data protection methods (such as System Protection and File History)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define virtualization

A

Virtualization is the ability to install and run multiple operating systems concurrently on a single physical machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe virtualization component: Physical Machine

A

A physical machine contains the actual system hardware, such as the hard disk drive(s), optical drive, RAM, processors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe virtualization component: Hypervisor

A

A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor manages access to system resources such as:

  • CPU
  • Storage
  • RAM

Commonly used hypervisor types include:

  • VMware Workstation and ESX (made by VMware)
  • Hyper-V (made by Microsoft)
  • XEN (open source)
  • Oracle VirtualBox

Kernel-based Virtual Machine (KVM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe virtualization component: Virtual Machine

A

A virtual machine is a software implementation of a computer that executes programs like a physical machine. The virtual machine appears to be a self-contained and autonomous system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe virtualization component: virtual machine

A

A virtual machine is a software implementation of a computer that executes programs like a physical machine. The virtual machine appears to be a self-contained and autonomous system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe virtualization component: Virtual Hard Disk (VHD)

A

A virtual hard disk (VHD) is a file that is created within the host operating system and that simulates a hard disk for the virtual machine. Different hypervisors use different virtual hard disk file formats:

  • Virtual Disk Image (VDI): Oracle VirtualBox
  • Virtual Machine Disk (VMDK): VMware products

Virtual Hard Disk (VHD): Microsoft Hyper-V

17
Q

Describe full virtualization

A

In full virtualization, the virtual machine completely simulates a real physical host. This allows most operating systems and applications to run within the virtual machine without being modified in any way

18
Q

Describe partial virtualization

A

In partial virtualization, only some of the components of the virtual machine are virtualized. Be aware of the following:

  • The operating system uses some virtual components and some real physical hardware components in the actual device where the hypervisor is running.

The operating system or application must be modified to run in a partial virtualization environment

19
Q

Describe para-virtualization

A

In para-virtualization, the hardware is not virtualized. Be aware of the following:

  • All of the guest operating systems running on the hypervisor directly access various hardware resources in the physical device; components are not virtual.
  • The guest operating systems run in isolated domains on the same physical hardware.

The operating system or application must be modified before they can run in a para-virtualization environment

20
Q

Describe how to move a virtual machine from one host to another.

A

If necessary, virtual machines can be moved from one host to another. Follow these guidelines when moving virtual machines:

  • Before moving a virtual machine, make backup copies of the virtual machine directory and all associated files.
  • If you are moving a virtual machine (guest) to a new virtual host that differs from the original host in platform or architecture, be aware of these options and limitations:
    • A guest can be successfully moved from a 32-bit host to a 64-bit host.
    • A guest that is moved from a 64-bit host to a 32-bit host will probably not work correctly. If the guest is a 64-bit virtual machine, it probably won’t start up at all on the 32-bit host.
    • If the original host and the new host both use similar architectures but are from different manufacturers, you usually cannot resume a suspended virtual machine; it must be rebooted. For example, if the original host and new host both have virtualization-enabled 64-bit processors, such as one using an AMD-V and the other using an Intel VT-x CPU, a suspended virtual machine will work after being moved and rebooted
21
Q

Explain Client Hyper-V

A

Hyper-V, Microsoft’s enterprise hypervisor, was formerly used exclusively in the Windows Server product line. Windows 10 implements a modified version of this technology as Client Hyper-V. Client Hyper-V:

  • Runs virtual machines entirely outside of the Windows OS.
  • Is very similar to the version of Hyper-V used on Windows server systems.
  • Is disabled by default.
  • If enabled, loads Hyper-V first and then loads the Windows OS on top of it.
  • Uses the Hyper-V Virtual Machine Connection application to connect to a virtual machine.

Uses Hyper-V Virtual Machine Manager (VMM) for VM management

22
Q

Identify Windows Client Hyper-V requirements

A

Client Hyper-V requires a 64-bit version of Windows 10 Professional or Enterprise.

To run virtual machines on a 32-bit Windows version, you must install a separate virtualization solution (e.g., VMware Player, VMware Workstation, Virtual PC, or VirtualBox)

23
Q

Identify system Client Hyper-V requirements

A

System requirements for Client Hyper-V include the following:

  • A 64-bit CPU.
  • A modern Intel or AMD microprocessor that includes Second Level Address Translation (SLAT) technology.
  • Virtualization enabled in the BIOS/UEFI configuration.

At least 4 GB of RAM in the system. However, much more RAM than this will be required if you choose to run multiple virtual machines

24
Q

Virtual networking can be implemented in Client Hyper-V in three ways. Describe them.

A

Virtual Network

Description

External

An external virtual network is used to provide virtual machines with access to a physical network, allowing them to communicate with externally located servers and clients. This configuration also allows virtual machines on the same virtualization server to communicate with each other. This type of virtual network is sometimes called a bridged network.

Internal

An internal virtual network is used to allow communication between virtual machines on the same virtualization host and between virtual machines and the host operating system. An internal virtual network is not bound to a physical network adapter. As a result, virtual machines using this network are isolated from all external network traffic.

Private

A private virtual network is used to allow communication only between virtual machines on the same virtualization server. A private virtual network is not bound to a physical network adapter. A private virtual network is isolated from all external network traffic on the virtualization server, as well as any network traffic between the management operating system and the external network. This type of virtual network is sometimes called a host-only network.

This type of network implementation allows you to create a sandbox environment that is very useful for protecting your network while testing or troubleshooting a virtual host.

25
Q

What 6 actions should be taken to use Client Hyper-V? Describe the steps of each.

A

Action

Description

Enable Hyper-V

To enable Hyper-V, complete the following steps:

  1. Open Settings.
  2. Select Apps.
  3. Under Related settings, select Programs and Features.
  4. In the left pane, select Turn Windows features on or off.
  5. Mark Hyper-V and select OK. The system will reboot several times as Hyper-V is enabled.

Configure Virtual Networking

To configure virtual networking:

  • Choose the type of network you want to set up:
    • External virtual network
    • Internal virtual network
    • Private virtual network
  • Use the Virtual Switch Manager to select an NIC if you are configuring an external virtual network.

Create Virtual Machines

To create virtual machines, run Hyper-V Manager and specify the following parameters:

  • A name for the new VM
  • The virtual machine’s generation
  • The amount of RAM the VM is allowed to use
  • The shared network switch that you created earlier for the VM to use for networking
  • The VHD file you want to use.
    • You can create a new VHD file or use an existing one.
    • You can use the .vhdx or .vhd format. The .vhd format is older, but is more compatible with other hypervisors.
  • The optical drive you want to use.
    • You can use either a physical optical drive or a virtual .iso file as the optical drive used by the VM.
    • You can install an operating system directly from an ISO file instead of burning it to disk.

Start the Virtual Machine

To start the virtual machine, power it on in Hyper-V Manager. If you created a new VHD file, then you must install an operating system. If you choose to install Windows, then you should install Integration Services (IS) after the installation is complete. IS dramatically improves VM performance by installing modified disk, network, and mouse drivers inside the VM that are Hyper-V aware. In addition, IS lets you cut and paste between the host and guest Windows operating systems installed within VMs. It also enables the mouse to move smoothly in and out of the Virtual Machine Connection window.

Connect to the Virtual Machine

You use the Virtual Machine Connection window to interact with a VM. To connect to a VM, run Hyper-V Manager, select the VM that you want to access, and connect to it. You can start, stop, pause, and take snapshots (also called checkpoints) of the virtual machine’s current configuration using the Hyper-V manager window.

Move a Virtual Machine

Server versions of Hyper-V provide many virtual machine migration tools that you can use to move a VM between hypervisor hosts. However, Client Hyper-V does not include most of these features. To move a virtual machine between client Hyper-V hosts, you must do the following:

  1. Export the VM on the source system using Hyper-V Manager.
  2. Copy the exported VM files from the source system to the destination system.
  3. Import the VM on the destination system using Hyper-V Manager. As you do so, you must select one of the following import options:
    • Register the VM in place using its existing unique ID.
    • Restore the VM using its existing unique ID.
    • Copy the VM and create a new unique ID.
26
Q

Define cloud computing.

A

Cloud computing is a combination of software, data access, computation, and storage services provided to clients through the internet.

  • The term cloud is a metaphor for the internet, based on the basic cloud drawing used to represent the telephone network. It is now used to describe the internet infrastructure in computer network diagrams.
  • Typical cloud computing providers deliver common business applications that are accessed from a web service or software (like a web browser).
  • The cloud connection can exist over the internet or a LAN.

Cloud computing does not require end-user knowledge of the physical location and configuration of the system that delivers the services

27
Q

Describe the 4 major ways cloud computing can be implemented.

A

Type

Description

Public cloud

A public cloud can be accessed by anyone. Cloud-based computing resources such as platforms, applications, and storage are made available to the general public by a cloud service provider. The service provider may or may not require a fee for using these resources. For example, Google provides many publicly accessible cloud applications, such as Gmail and Google Docs.

Private cloud

A private cloud provides resources to a single organization. Access is granted to only the users within the organization. Private clouds can be hosted internally, but because of the expense and expertise required to do so, they are typically hosted externally by a third party. An organization commonly enters into an agreement with a cloud service provider, which provides secure access to cloud-based resources. The organization’s data is kept separate and secure from any other organization using the same service provider.

Community cloud

A community cloud is designed to be shared by several organizations. Access is granted only to the users within the organizations who are sharing the community cloud infrastructure. Community clouds can be hosted internally, with each organization sharing the cost of implementation and maintenance. Because of the expense and expertise required to do so, community clouds are commonly hosted externally by a third party.

Hybrid cloud

A hybrid cloud is a combination of public, private, and community cloud resources from different service providers. The goal behind a hybrid cloud is to expand the functionality of a given cloud service by integrating it with other cloud services.

28
Q

What are some advantages of cloud computing?

A

The advantages of cloud computing are:

  • Flexibility of access
    • Rapid elasticity or scalable provisioning. Rapid elasticity is the ability to provide scalable services. In other words, rapid elasticity allows users to automatically request additional space in the cloud or other types of services.
    • Measured service. Measured service are services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.
    • Resource pooling. Resource pooling allows providers to serve multiple clients and customers with provisional and scalable services. These services can be adjusted to each client’s needs without any changes being apparent to the client or end user. Through modern scalable systems involved in cloud computing and software as a service (SaaS), providers can create a sense of infinite or immediately available resources by controlling resource adjustments at a meta level. This allows customers to change their levels of service without being subject to any of the limitations of physical or virtual resources.
    • On-demand computing (ODC). ODC or metering of services is defined as “pay and use” computing power. ODC allows resources to be provided on an as-needed and when-needed basis.
  • Ease of use
  • API availability
  • Ability to “try out” software applications in some cloud computing service models
29
Q

Describe 3 cloud computing service models

A

Model

Description

Infrastructure as a Service (IaaS)

IaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment.

Platform as a Service (PaaS)

PaaS delivers everything a developer needs to build an application. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers.

Software as a Service (SaaS)

SaaS delivers software applications to the client either over the internet or on a local area network. SaaS can be:

  • A simple multi-tenancy implementation in which customers have their own resources that are segregated from other customers.
  • A fine grain multi-tenancy implementation in which resources are shared, but data is segregated from other customers.
30
Q

Describe some ways cloud computing service providers reduce the risk of security breaches.

A

Cloud computing service providers reduce the risk of security breaches in multiple ways. They:

  • Authenticate all users who access the service and allow users to access only the applications and data that they need.
  • Segregate each organization’s centrally stored data.
  • Verify, test, and apply updates to the infrastructure.
  • Establish a formal process for all facets of the service, from user requests to major data breaches and catastrophic events.
  • Implement security monitoring of things like usage and unusual behavior.
  • Implement encryption up to the point of use, such as the client’s web browser.
  • Probe for security holes with a third-party service provider.
  • Comply with all regulatory measures, like the Sarbanes-Oxley Act.