click below
click below
Normal Size Small Size show me how
70-680 Cards
Question | Answer |
---|---|
DRA | A user account with a certificate that is used for data recovery. |
DirectAccess | Always-on VPN connection that connects immediately after internet connectivity. Uses IPv6 only. |
BranchCache | Technology that shares hosted files on a Win 2008 R2 server. This decreases the time it takes to load network files. |
EFS | Encryption of files and folders for specific user accounts. Does NOT encrypt volumes. Available on Professional, Enterprise & Ultimate. |
HomeGroup | Network sharing of files on a home network. Will not work on a domain computer. Administrators set up, but users decide what to share. |
Dummy Restore | File recovery that occurs to a new location instead of over the original file. |
Staging | This allows admins to put software into a store that can later be installed by user accounts. |
Side-By-Side Migration | Migration that occurs when the files are taken from the original computer straight to the new computer. |
WAIK | A set of tools that help with deploying Windows images to computers or VHDs |
VHD | Virtual Hard Disk. VHD files are used by Hyper-V, Virtual Server, and Virtual PC |
Wipe-And-Load Migration | Migration that occurs when the files are exported and the original computer is reformatted and set up with a new operating system-after which the files are then imported. |
VPN Reconnect | Technology that automatically reconnects VPN connection if it is dropped. This allows a pc to get a new IP address without renegotiating with the VPN server. Uses IKEv2 protocol and has a MOBIKE extension. |
NAP Remediation | Technology in Server 2008 that restricts network access based on a client's pc health. It can verify virus protection updates along with software and OS updates. |
OS Upgrade Path from XP to 7 | There is no upgrade path from XP to 7. Only Vista can be upgraded to 7 directly. |
Windows SIM | Used to create answer files, open Windows images and manages distribution shares. This is part of WAIK. |
ImageX | Captures, creates, modifies and applies Windows images. This is part of WAIK. |
DISM | This applies drivers, language packs and updates to an already created Windows image. This is part of WAIK. |
Windows PE tools | WAIK has several tools to build and manage windows PE environments. |
Oscdimg | Used to create ISO images. This is part of WAIK. |
BitLocker | Used on Win 7 Enterprise & Ultimate only. It can be used with or without TPM (trusted platform module) chips. TPM recovery data can be stored to AD. |
BitLocker DRA | BitLocker Data Recovery Agent: These are special accounts used to recover encrypted data without the need of numerous keys stored. One account can open any drive. Configured certificates are usually stored in AD. Command is: manage-bde.exe -unlock [drive] |
wecutil qc | Used to confugre the Windows Event Collector and is typically used on a collector PC. This is a command-line command. |
Event Viewer | Events fall into four categories: Criticial, Error, Warning, Information Logs include: Application, Security, System, Forwarded Events |
The 3 WMI Features | Common Information Model Object Manager (CIMOM), AKA WMI Services. Common Information Model (VIM) Repository, AKA WMI Repository WMI Providers |
DMTF | Maintains the set of core classes from which system & application developers create extension classes. |
Copy/Move Permissions | Files/Directories moving on the same volume will retain their original permissions. |
NAP | Network Access Protection |
DirectAccess Server Requirements | Win Server 2008 R2 and must be amember of domain. 2 network adapters- one for the internet, other to intranet PC requires digital certificates. |
Performance Manager | Located in Control Panel or by typing perfmon in the Start menu or command-line. |
Offline Files | Stores locally cached versions of network resources. Available on Win 7 Professional, Enterprise & Ultimate |
Bcedit.exe | Used to enable a VHD file as a boot option- it does not create VHD files. Used to edit BCD (Boot Configuration Data). Creates & modifies BCD store. |
Shadow Copy | Does NOT copy Offline Files. |
VSS | Manages & implements shadow copies. The service start up is set to manual. |
Configure BranchCache with Netsh | netsh BranchCache [command] reset show status set service mode=distributed/local set cachesize set localcache Netsh configures firewall automatically. |
VPN Technologies Supported by Win 7 | PPTP- most connom but least secure. Does not use PKI. L2TP/IPSec- Provides origin authentication, data integrity, relay protection & data condifentiality. SSTP- Uses port 443 which means it usually works with most firewalls. Also uses certificates. IKEv2- |
Tools that back up EFS Certificates | Certificates Console (certmgr.msc). Manage File Encryption Certificates Tool. Cipher.exe command-line tool. |
VPN Authentication Protocols | Password Authentication Protocol (PAP), Challenge Authentication Protocol (CHAP), Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2), Protected extensible Authentication Protocol with Transport Layer Security (PEAP-TLS), |
more VPN Authentication Protocols | EAP-MS-CHAPv2/PEAP-MS-CHAPv2, Smart Card or Other Certificate |
Effective Permissions Tool | It calculates the permissions that are granted to the specified user or group. |
Icacls | Command-line utility used to configure NTFS permissions. To view permissions, use: Icacls [file/directory] To grant permissions, use: /grant [user/group: permissions |
Windows PowerShell Remote Management | Windows 7 uses and requires PowerShell V2. Syntax: Icm hostname [command] |
WinRS Script Samples | WinRS -r:[pc name/netbios name] [command] ie: WinRS -r:testpc ipconfig To supply passwords: -p:[password] To supply usernames: -u:[username] |
Windows Remote Management Service | Windows Remote Management is one component of the Windows Hardware Management features that manage server hardware locally and remotely. |
Remote Desktop | Available on Win 7 Professional, Enterprise & Ultimate. Remote Desktop is disabled by default. Windows firewall automatically changes when Remote Desktop is enabled. |
802.11n | Still in draft mode. Utilizes MIMO- Multiple Input/Multiple Output |
802.11g | Speeds up to 54Mbps. Has a good range with little obstructions. |
802.11a | Speeds up to 54Mbps. Uses 5.0Ghz frequency. Faster than 802.11b but is more likely to be obstructed by walls. Is NOT compatibile with 802.11b. |
802.11b | Up to 11Mbps. Uses 2.4Ghz frequency. Major interference with microwaves and cell phones. |
Port-restricted cone | An external host with a specific IP address and source port can send a packet to an internal host ONLY if the internal host sent a packet first. |
Restricted-Cone NAT | All requests from the same internal IP address & port are mapped to the same external IP address & port. External hosts may send packets only if the internal address sent a packet first. |
Full-cone NAT | All requests from the same itnernal IP address & port are mappes to the same external IP address & port. Any external host can send a packet to the itnernal host by sending a packet to the mapped external address. |
ISATAP Address | Intra-Site Automatic Tunneling Addressing Protocol. This provides IPv6 connectivity within an IPv4 Intranet. The address contains the identifier: 0:5efe |
Teredo Address | The address looks like: 2001::132. The prefix is followed by the IPv4 publica ddress of the Teredo server. The enxt 16 bits are reserved for Teredo flags. |
6to4 Address | This allows IPv6 packets to transmit over an IPv4 network. This is meant to be a temporary solution to a problem. It looks like: 2002:[first 2 bytes of IPv4 address]:[second 2 bytes of IPv4 address]::/16 |
IPv6 Multicast Address | This address starts with:fp |
IPv6 Link-Local Address | This address starts with:fe8 This is the same as IPv4's IPAPA |
IPv6 Loopback Address | Also known as: 0:0:0:0:0:0:01 or::1 |
Flash Drive Requirements to be used to install an OS | Must be 4GB+, formatted as FAT 32 and the drive must be set as ACTIVE |
IPv6 Site-Local Address | This address starts with:fec0 This is the same as IPv4's private addresses |
APIPA | Uses IPv4 in the range of169.254.0.1 to 169.254.254.254 and a subnet of 255.255.0.0 |
WHQL | Windows Hardware Quality Labs |
WDS Images: Install | This is an OS image that is deployed to a client PC. The order is:Install, Boot, Capture, Discover |
mmc devmgt.msc | Run command that launches device manager |
WDS Images: Boot | This is an image a client boots before you isntall the WIM file. Capture & discover are types of boot images. The order is:Install, Boot, Capture, Discover |
WDS | Windows Deployment Services |
WDS Images: Capture | This is a boot image that you boot a client pc to capture the OS as a WIM install image file. You do this before you create a custom image file. The order is:Install, Boot, Capture, Discover |
WDS Images: Discover | This is a boot image that installs Windows 7 on a pc that is not PXE-enabled. This image allows a computer to locate a WDS server and use it to install an image. The order is:Install, Boot, Capture, Discover |
Hardware Requirements for Windows 7 Starter or Home Premium | 1Ghz processor, 512mb RAM, 10GB HDD |
Hardware requirements for Windows 7 Professional and Ultimate | 1Ghz processor, 1GB RAM, 10GB HDD |
.SWM extension | SWAM files are split or spanned WIM files. |