comptia a+ it technician & 70-620 - microsoft vista deployment & configuration

Upload: ethan-castanon

Post on 30-May-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    1/27

    isa: industry standard architecture

    pci: peripheral component interconnect

    agp: accelerated graphics port

    pentium pro: socket 8

    pentium ii: secc type type 1 socket

    pentium iii: secc type 2 socket, also socket 370

    pentium 75+ overdrive: socket 7

    pcmcia type 2: 5mm thick

    pcmcia type 1: 3.3mm thick

    pcmcia type 3: 10.5mm thick

    pga: pin grid array (pga) is a square ceramic cpu chip with pins on the bottom; the zero insertion force chipfits into the zero-insertion force socket on the motherboard.

    secc2: a cartridge-style cpu that accepts cartridge-type athlon cpu.

    secc:a cartridge-style cpu

    mau: mutltistation access unit

    bridge: used to separate a large physical network into two smaller networks to reduce network traffic.

    single setting: if, a single hard disk is attached to a primary ide channel, its jumper should be set to single

    g0: global power state: fully operational

    g1: global power state: sleep mode

    g2: global power state: soft off

    g3: global power state: mechanical off

    network standard: 1. media; 2. speed; 3. topology

    s1, s2, s3, s4: sleep modes: s4 consumes the least power of the four sleep modes; it is also called"hibernation"

    contrast ration: lcd measurement between the diff of darkest color and the lightest color that a screen candisplay.

    osi: the open systems interconnection model is used to describe how network protocols should functionthe osi model was designed by the international organization for standardization

    hal: hardware abstraction layer. required for successful boot

    worm: self-contained in that it can reproduce itself and doesn't need a host for transport

    ntoskrnl.exe: is the core (or kernel) of the operating system and is loaded last.

    windows 2000: requires 133MHz

    windows xp: requires 233MHz

    current drivers: to get the newest drivers available, always visit the manufacturer's website

    corona wire, corona roller: transfers the neg charged toner from the neg charged print drum via a poscharge that exceeds the difference -> corona is positive

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    2/27

    ntfs: first file system, windows, that supported encryption

    ieee1284: defines the ecp parallel port to use, a dma channel, and the buffer to be able to transfer data athigh speeds to printers standard

    nlx form factor: places expansion slots on a special riser card and is used in low-pro pc's

    class a: fire extinguisher: for water-based products

    class b: fire extinguisher: for flammable liquids

    class c: fire extinguisher: for electrical fires

    class d: fire extinguisher: for flammable metals

    i&a: identification and authentication

    pcmcia type iii form factor: usu hard drives

    pcmcia type ii form factor: usu sound cards & net adapters

    erd: in win 2000, emergency repair disk - setup through windows backup to repair the registry.

    asr: in win xp, automated system recovery is accessed through the windows backup utility and backs up

    the registry.

    built-in remote assistance: r-click 'my computer', sel properties, sel remote tab

    vga mode: good boot choice to troubleshoot prob's emanating from inserting a new video card andsubsequent performance was impacted somehow by symptoms such as garbled and unreadable video.

    ide: intrenal interface used to connect hard drives, cd drives, and dvd drives.

    irda: infrared data association, is a cable-free method of connecting a printer by using a system similar to atv remote control.

    parallel port: traditionally used for a printer port because it supports faster speeds than a serial port.

    usb: becoming more popular than parallel ports because it is faster than them

    dma: direct memory allocation - allows a device to bypass the cpu and place data directly onto ram itself

    irq 7: by default assigned to lpt1

    irq 3: assigned to com 2 & 4 - may want to check

    bluetooth class 2 devices: most common form of commercial devices

    ieee 802.15.1: bluetooth standard: 2.4GHz

    do desktop systems occassionally share memory with the os, as laptops are known to do?

    chkdsk: a utility used by xp/2000 that is capable of fixing cross-linked files on hard drives

    asr: automated system recovery utility used to back up the registry in windows xp systems

    what are 2 ways to change the file system on a partition? convert -> fat to ntfs: appears simple toadvanced, not reverse; format -> format the partition,

    fdisk: partition utility

    fuser: component in a laser printer most likely to f-you up, burn

    transfer corona: changes the charge on the paper to positive to force the toner onto the paper from thenegatively charged drum

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    3/27

    primary corona wire: applies a negative charge to the drum after it has gone through the cleaning phase

    telnet: 23

    ftp: 21

    ssh: 22

    hd partitions: can hold a max of 4 partitions: can be 4 primary, or three primary and one extendedpartition

    lpti: irq7

    com2: 02f8-02ff

    com1 & com3: both use irq4 -> avoid conflict

    computer management: service selection & monitoring: here you can do such things as stop & restart theprint spooler

    services & monitoring: control panel, admin tools, services: here you can stop & restart an offendingservice

    safe modes: listed in order of most minimal: safe mode, safe mode with networking, vga mode

    task manager's performance tab: allows one to see processor, page-file, and physical mem stat's in reatime

    fuser assembly: presses & melts the toner intot he paper

    transfer corona: transfers the toner from the drum to the paper by putting a positive charge on the paperforcing the toner on a neg charged drum to transfer to the paper

    printer controller circuitry: converts signals from the pc into signals for the various printer assemblies

    paper transport assembly: controls the movement of the paper through the printer

    dot-matrix printer: these use both tractor & friction feed paper mechanisms

    write permission: in ntfs file system, this allows one to change the target's ownership, permissionsattributes and create new entities within a folder

    *fat, fat16, and fat32 file systems do not support local security features. should you require these, ntfsshould be used

    ecp: was designed for fast transfer speeds. ecp uses dma channels and buffers to increase printingperformance

    msds: material data safety sheet

    infrared: does not use radio waves, not very susceptible to interference, can transmit at up to 16mbpsbits.

    inverter: responsible for powering the lcd backlight

    video card: responsible for the video signal

    transfer corona wire: laser printer: faulty corona wire would cause white streaks on paper

    primary corona charging wire: applies a uniform -600vdc charge to the photosensitive drum. the drum isthen ready for the image to be written on it.

    dark to light fading across the page: dot-matrix printer: likely the gear isn't turning the gear upon whichthe ribbon is attached

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    4/27

    solid-ink printer: uses ink that comes in a solid, wax form

    thermal printer: use either heat only or heat along with a ribbon that contains a wax-based ink

    bubble-jet printer: liquid ink

    dye-sublimation: liquid ink

    pin 9: laser printer: should read +24v

    pin 1: laser printer: should read +5v

    pin 5: laser printer: should read -5v

    white streaks: laser printer: most likely caused by toner on the transfer corona wire

    black streaks: vertical black lines: are likely caused by a scratch or a groove in the ep drum

    fuser faulty: toner wouldn't bond to the paper and you would have smearing

    writingprocess: laser printer: during the writing process, a laser shines on the photosensitive drum andreduces the charge from -600vdc to 100vdc. the areas where the charge is reduced will form the image.

    dye-sublimation printing: dye-sub printers use sheets of solid ink that immediately convert to gaseous

    form and then adhere to the paper

    laser printing order: cleaning, charging, writing, developing, transfering, fusing

    blank line across line of text: if there is a consistent blank space, it likely means that a pin is not firingproperly, and the print head needs to be replaced

    ghosting: laser printer phenom: due to a bad erasure lamp or a broken cleaning blade

    elements that can damage a laser printer: heat, light, ozone and ammonia

    scanning image fuzzy: solution: sharpen it

    scanning image fuzzy: solution: could be simply a low-resolution scanner

    vertical black lines: laser printer: cause: scratch or groove in teh eep drum

    nslookup: command-line utility that lets one cross check names on a dns server

    gateway: a gateway is an upper-layer device that can work between applications, such as different e-maiprotocols, and send between dissimilar networks

    cname: dns record: canonical name record used to hold aliases for the host

    soa: dns record: is the start of authority record, which holds the time to live and related info

    hinfo: dns record: holds the tcp/ip address info, as do a records

    a record: dns record: holds the

    ptr: dns record: ptr is used for a reverse lookup. it holds the 'pointer' information

    nsrecord: dns record: name server record. maps to the primary server for the zone

    caching-only dns server: a caching-only dns server holds the results of queries it has performed but doesnot have a zone file of its own

    tftp: uses port 69

    imap: internet mail access protocol

    tracert: trace route: a utility used to test connectivity and see the path taken to reach another host

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    5/27

    nslookup: is a command-line utility that enables you to verify entries on a dns server

    solid-ink printer: thermal printers: use either heat only or heat along with a ribbon that contains a wax-based ink.

    liquid-ink printer: bubble-jet and dye-sublimation printers use liquid ink

    laser printer: pin 9 has +24v

    laser printer: pin 1 is +5v

    laser printer: pin 5 is -5v

    .scr: stands for screen and is an executable. can be used for attacks, ojo.

    database local account: all databases have this account by default and thus hackers target it

    .pif: this extension is used for program information files: a type of file that allows legacy executableprograms to run, ojo

    tcp/ip hijacking: involves exploiting the existence of a valid session by intercepting communications andgaining access to them; also, stealing a valid ip address and using it to gain authorization to a network

    replay attack: a replay attack attempts to replay the results of a previously successful session to gain

    access

    tcpack attack: creates multiple incomplete sessions. eventually, the tcp protocol hits a limit and refusesadditional connections

    smurf attack: using a broadcast ping (icmp) on a network. the return address of the ping can be anysystem computer

    task manager: control+shift+esc

    sfc: system file checker: use if system files are corrupted - run sfc /scannow -> sfc will automatically repaifiles it detects as corrupt.

    open command prompt: command, cmd

    run: edit: dos editor

    device manager: deleting or uninstalling a card's driver will only be in effect until reboot when plug 'n' playwill reinstall 'em. disabling them is best.

    computer management: contains event viewer, disk defragmenter and services.

    restart spooler: control panel -> administrative tools -> services; or, computer management -> services.

    ntldr: file that is responsible for switching from real to protected mode during the windows 2000/xp bootprocess.

    erd: emergency repair disk: the erd backs up the registry, which contains system configuration items.

    attrib +r work.doc: r-> 'read-only' file

    router: network device that affords network address translation.

    shared memory: to reallocate memory sharing enter the system bios. for example, to reallocate memoryallocated to vga on ram, enter bios and adjust.

    piconet: bluetooth network

    network or net: ethernet network

    cells: cellular network

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    6/27

    infrared: doesn't really make networks. it's a point-to-point communication method

    type iii pcmcia: 10.5mm thick

    type ii pcmcia: 5mm thick

    type i pcmcia: 3.3mm thick

    safer+: the secure and fast encryption routine (safer+) is the encryption method used by bluetoothdevices

    power adapters: you can use an ac or dc power adapter for a laptop as long as its output matches thespecified voltage and amperage.

    devices can be enabled or disabled via the control panel or the bios

    isa: antiquated computer expansion bus for video

    pci: not so hot expansion bus for video

    pcie: quick, good expansion bus for video

    ram: all ram is solid state

    modern bios: auto-conifig for cpu and ram

    berg connector: this is the power connector for the floppy drive. it must be inserted correctly or the drivewill be damaged.

    low-level formatting: this process ties ata (ide) drives to their controllers. manufacturers do this for ata(ide) drives, but you must do yourself for scsi drives.

    high-level formatting: partitioning and high-level formatting are based on the operating system beingused.

    pincushion: a configuration option for computer video

    contrast: a configuration option for computer video

    trapezoid: a configuration option for computer video

    standard input devices: i.e., human interface devices, such as keyboards and mice.

    the fan always blows down: this is to push the heat out through the fins of the heat sink.

    irq: interrupt request lines

    phantom problems: open the cover, clean the inside of the computer, and reseat all cards adn chips.

    class a extinguisher: wood & paper fires

    class abc: will work fine for wood & paper fires

    electricalcontacts: denatured isopropyl alcohol and a cotton swab should be used to clean electricacontacts. water should never touch electrical components.

    high-voltage probe: instrument designed to properly release electricity from high-voltage components e.g., those included in the back of crt computer monitors.

    mtsd: material safety data sheet:

    generally avoid using magnetic tipped tools within a computer's case.

    3 most common screw drivers: flat, phillips and torx.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    7/27

    accidents and near accidents should always be reported.

    threshold above which humans feel a shock: 3,000 volts

    osha: doesn't mandate rules on safety training

    alkaline batteries should always be recycled. older alkaline batteries contain lead, which is anenvironmental hazard.

    nickel metal hydride batteries: not, not considered environmental hazards.

    ieee 802.3: csma/cd lan:

    transport layer: it is the responsibility of the transport layer to signal 'all clear' by making sure are errorfree. it also controls the data flow and troubleshoots any prob's with tx

    physical layer: is amongst other things, responsible for formatting the final packet of data for transmissionover a physical medium.

    physical star topology: the hub provides the central connecting device in a star topology.

    csma/ca: this access method uses smart interface cards to detect traffic before they try to send datacarrier sense multiple access with collision avoidance. it is slightly more sophisticated than csma/cd. ittransmits a very small packet on the network. if it is successful, then the nic begins transmission of the

    actual data.

    csma/cd: the ieee 802.3 specification satates that csma/cd is the standard access method for ethernetnetworks.

    ep print process: cleaning, charging, writing, developing, tranferring, fusing

    page-description language:

    basis weight: quantity, type and size: 500, bond, 17x22

    multipart forms: impact printers only can do this.

    led page printers:

    ep process laser printers:

    page printer: a page printer is a type of computer printer that prints a page at a time. common types ofpage printers are the laser printer and the inkjet printer.

    printer controller assembly: the pritner controller assembly is responsible for the print job for the types oprinter being used.

    page-description languate: postscript language & pcl

    hal.dll: file specifically responsible for enabling communication between the system hardware and theoperating system. hal, or the hardware abstraction layer, is the translater between the hardware and theoperating system.

    ASR: automated system recovery: it makes a backup of your system partition and creates a recovery disk.

    neither autoexec.bat nor config.sys is involved in the windows xp/2000 boot process

    sysedit, msconfig, defrag: all utilities used to troubleshoot or modify windows

    replacing system files: attrib: in order to delete and/or replace system files, you must use the attribcommand to remove the hidden, system, and read-only attributes on the file.

    autoexec.bat: windows file-related problems do not include autoexec.bat issues. autoexec.bat is a dosbatch file that is automatically executed during bootup if the file is present.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    8/27

    thrashing: means an extremely slow system speed and a disk that is constantly being accessed. thiscondition occurs because windows doesn't have enough memory to contain all the programs that arerunning.

    boot.ini: file that frequently is the cause of faulty system boot due to corrupted system files.

    *general protection fault: the most common error in windows. it happens when a program accessesmemory that another program is usingor when a program accesses a memory address that doesn't exist.generally, gpf's are the result of sloppy programming; they can often be fixed by clearing the memory witha reboot.

    *illegal operation: is the windows error message displayed when a program is forced to quit because it didsomething windows didn't like. the error's details include which module experienced the problem, thememory location being accessed at the time, and the registers and flags of the processor at the time of theerror.

    ntdetect.com: the information detected by ntdecect.com is used to create dynamic hardware informationin the registry.

    registry problem/registry error correction: last known good configuration enables you to restore the systemto a prior, functional state if a change was made to the registry that turned out to be problematic.

    windows update: windows update is a utility that is responsible for finding updates, patches, and service

    packs, downloading them, and installing them on your computer.system restore utility: windows xp automatically creates restore points, which are copies of your systemconfiguration. you can also create them manually through the system restore utility.

    formatting: scans for bad spots, lays down magnetic tracks in concentric circles, splits tracks into pieces o512 bytes called sectors and lastly creates a file allocation table that contains info about the location fo thefiles.

    *swap file: this is where idle pieces of programs are placed while the active pieces of the program areplaced into main memory.

    *temporary files/temp files: look here -> sys control panel -> advanced dab -> environmental variablesbutton

    *windows releases order: ...win 3, nt, 95, 98, 98se, 2k, me, xp, vista, win7

    *requirements: win xp => hd space > 1.5GB

    *partitioning & formatting: fdisk.exe & format.com, respectively.

    *winnt.exe: from windows 9x -> windows 2k

    *most common source of device problems: out-of-date hardware drivers

    *add new hardware troubleshooting wizard: when plug and play doesn't work, users can use the win 2k &win xp wizard to add new hardware and update drivers for existing hardware.

    *win nt doesn't come with a version of either defrag or disk defrag. all succeeding win's versions do

    *swap file: is a file used for virtual memory. it is where the information what was swapped from mainmemory resides on the hard disk. it's also refereed to as a page file or paging file.

    *where do you find the disk cache setting in win 2k & win xp? the settings for largesystemcache arelocated in the windows registry.

    *image of a computer: what utility do you use to create an image of a system if you are to use win 2k orwin xp? the sysprep utility comes with the 2 os's and is used to make an image of a computer. ghost is athird-party utility made by norton.

    *localis suspectus of temp files in windows: c:\temp, c:\windows\temp and c:\tmp.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    9/27

    *localis suspectus of other goodness: system control panel, click advanced tab, click environment variablesbutton.

    *win xp: min processor required to run: 233MHz.

    *virtual memory settings: system control panel -> performance tab

    *win2k & winxp: 255 character max

    *ps/2 mice: use irq 12

    *ping utility: start by pinging local host, then ping a host on the same segment. if you get a response fromyour machine and another local machine, the nic is functioning properly and the problem lies with thenetwork somewhere. then ping the near side of your router (gateway) and then the far side.

    *power supply failure: this is a difficult problem to track down or deduce. its effects are hard to duplicateand are intermittent - prob's can be inexplicable lockups, memory failures, keyboard errors.

    *power supply testing with multi-meter: see 'a+_Supplemental_materials.pdf', pg. 4. test the voltagesbeing produced by the power supply. penetrateone of the red leads and then subsequently withoutwithdrawing the lead red probe, penetrate one of the black grounds. itshould read a quantity in agreemenwith the associated legend. next penetrate the other red leads to test their voltages; do not withdraw theground probe from the sheath.

    *dram: dynamic ram holds info for a short period of time and needs to be constantly refreshed to maintainits memory.

    *sram: static ram holds info until power is turned off and as a result is much faster (and more expensive)than dram. for this reason, the majority of ram in a pc is dram.

    *edo ram: legacy product.

    *rdram: rambus dram. high-speed form of memory

    *sdram: synchronous dram is a higher speed dram and is about 3x as fast as conventional memory.

    *vram: video ram

    *wram: windows ram. higher perf than vram bec it can address large blocks at once

    *ide: integrated device electronics: is a general reference to a technology that allows mass storage devicesto be connected to a pc

    *eide: enhanced ide allows for faster data throughput and larger drives than older ide

    *ata: advanced technology attachment: interface for ide

    *atapi: advanced technology attachmnet packet interface: interface for eide

    *cmos: complimentary metal oxide semiconductor: works in tandem with the system bios. in fact, cmos iswhere the user configurable settings are stored.

    *plug and play: there exist the following: pnp bios, pnp os and pnp devices - non-pnp devices can be usedin a pnp environment, but they must be manually configured.

    *isdn: requires a leased line: private ip addressing: see t1, t3, etc.

    *scandisk: scandisk is a utility that can find different types of errors on hard disks and correct some ofthem; lost clusters are an example. the program also scans the surface fo the hard disk (the disk plattersfor physical defects.

    *xcopy: command to copy large amounts of data from one disk to another. xcopyhas many switchesmaybe as many as 18 or more.

    *mscdex:

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    10/27

    *edit.com: is a dos-based text editor that allows you to create, read and modify text documents, batch files(.bat), initialization files (.ini) adn some .sys and .com files. it is invoked by typing edit from a commandprompt.

    *wscript.exe: is a microsoft windows script host language-independent scripting host for activex scriptingengines.

    *asd.exe: is the automatic skip driver agent, whick is a windows 98/me utility that identifies devices thatare causing a pc to hang during startup. using this this info, asd bypasses the problem devices by disablingthem the next time you restart the computer.

    *safe mode: a state that can be invoked manually or automatically at times when drivers are installedincorrectly. safe mode loads windows 9x/me/2000 with a minimal set of drivers, and bypasses thecommands found in autoexec.bat or config.sys.

    *command.com: command.com is the command interpreter. if you have access to a boot disk you cancopy command.com from teh disk to the hard drive (making sure the boot disk is the same os version).

    *himem.sys: is an extended memory manager. if this file is corrupt, dos or windows can't access anythingover 1mb of memory.

    *numeric error codes that occur during the post:

    100 range- system board errors

    200 range- ram errors

    300 range- keyboard errors

    500 range- video controller errors

    6000 range- scsi or network card errors

    7300 range- floppy drive errors

    *winnt32.exe /ox: create boot disks

    *autostart a program: place a shortcut to the desired application in the startup folder

    *recovery console: you can install Recovery Console as a boot option so its always available. To install theRecovery Console on your system, get to a command prompt and type:

    drive :\i386\winnt32.exe /cmdcons

    (drive = the location of your Windows 2000 installation CD)

    This will load the Recovery Console and make it available at system boot. Using Recovery Console enablesyou to recover from the following problems:

    *windows protection error: a windows protection error occurs when the system tries to load or unload avirtual device driver.

    *win /b: crate a boot log that will capture drivers loaded up to fail and presumably capture the name of theoffending driver immediately prior to failure.

    *systematic troubleshooting solution: You can also boot into safe mode and from there type msconfig toload the configuration utility. From there you can uncheck items in the system.ini, win.ini autoexec.bat andconfig.sys files and reboot. Each time you

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    11/27

    reboot, add items back in one at a time until you discover the one causing the error. From there eithepermanently remove the item/driver or reinstall.

    *vxd's: virtual device drivers:

    *illegal operation errors: occurs when an application does something the cpu doesn't know how to interpretor process.

    *ipx/spx: internetwork packet exchange/sequenced packet exchange. this is a networking protocol used innovell netware networks. microsoft has a compatible protocol called nwlink.

    *netbui: netbios extended user interface-is a fast connectionless protocol taht is non-routable and usedtypically in small peer-to-peer networks. its low overhead and minimal config makes it well suited to smallsingle-segmented networks.

    *freezing on an irregular basis and no new software or drivers have been installed: run the windowsmemory diagnostic tool

    *startup repair should be used if a computer running windows vista cannot complete the boot process.

    Windows Restore - System Restore vs. Windows Complete PC Restore

    *system restore should be used to return to an existing restore point.

    *windows complete pc restore is to restore a pc fully, including applications and data.

    *Windows Vista Windows Firewall: Enable Block All Connections will block all inbound connections and stilallow Internet use, as Internet outbound requests dont qualify as inbound connections because thecommunication was initiated from the inside.

    *Pointer Options: Tablet PC: Pointer Options are used to vary the appearance of the pen on the display.

    *Gestures are used when entering special characters such as Tab and Enter using the character or writingpads.

    *Windows Vista: Aero theme: Changing the theme Windows Vista will restore Windows Aero.

    *Setting the theme to Windows Classic disables Windows Aero.

    *Software Explorer: will tell you about which applications have been installed and their startup status, butwill not inform you about ActiveX controls.

    *The Manage Add Ons function of Internet Explorer will tell you which ActiveX controls have beendownloaded and installed.

    *Programs and Features will tell you which applications, but not which ActiveX controls, have beeninstalled.

    *System Restore: This moves back to a prior point in time -> The installation of updates can sometimeshave unusual side effects. A new update might cause problems with an existing driver or hardware device

    The quickest way to resolve such problems is to perform a system restore, which returns the computer to

    the state it was in prior to the installation of the update.*Diagnose and Repair in Network and Sharing Center performs routines that assume the network has beenmisconfigured. It doesnt change the driver, change the adapter, etc.

    *System Restore cannot be used to restore corrupted data.

    *Startup Repair: only use Startup Repair if there exists a problem with the computers ability to boot.

    *In a situation where both applications and user data have become corrupted and a system image backupexists, you should use the Windows Complete PC Restore Option.

    *Windows Firewall with Advanced Security: Rules: Exceptions cannot be used to block, only to allow. Ruleswhich are an attribute of Windows Firewall with Advanced Security, can be used to allow or block.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    12/27

    *Custom view: a custom view can be configured to display only those messages in a folder thathavespecific properties, such as being flagged. When the view is applied, you only see those messagesWhen the view is removed, you see all of the other messages located in the folder.

    *Sorting: sorting arranges objects in a grouped arrangement for easy an organizational view, but the non-desired objects are still visible. To allow one to see only what is desired, custom views should be used.

    *ReadyBoost devices should have a minimum of 256MB storage, support the USB 2.0 specification, andhave a 2.5MB/sec throughput for 4KB random reads and 1.75MB/sec for 512KB random writes.

    *Different Subnet: if a share isnt listed when you search in the Connect To ANetwork whatever, it is likelythat the share is located on a separate subnet. It is possible to connect to a share on a different subnetusing the shares IP address or fully qualified domain name (FQDN).

    *Windows Meeting Space: You must not be logged into a network prior to joining the Windows meeting. Itis necessary to be signed into People Near Me touse Windows Meeting Space. You must actuallydisconnect from the local Internet connection so you can join the ad-hoc wireless meeting.

    *Investigate Software Explorer:

    *Investigate The Reliability Monitor:

    *Power Options Advanced Settings dialog: Configure Lid Close Action So, shutting the lid will not turn thecomputer off.

    *DNS error check: If you are able to ping a host by IP address, but not by its FQDN, then there is a problemwith Domain Name System (DNS).

    *Upgrading Windows XP to Vista: if there is a prohibitive problem, you can resort to the Roll Back option toWindows XP. Until a successful login has occurred, this option is available. It is preferred to any othemeasure in this case: that an integrated graphics adapter built into the laptops motherboard isnsupported by Vista.

    *Restricted Sites zone: If an intranet server has been infected with a virus, you can add it to all WindowsVista comptuers restricted sites zones to prevent access & virus propogation.

    *If you manipulate the monitor settings and then cannot see anything in order to boot, you must boot off

    the installation media and run Startup Repair.

    *Dos Commands:

    Bootcfg: rec console boot.ini file utility

    Whatever.exe: relaunch app whichever application

    Sfc.exe: system file checker

    Sys a:: make a: bootable

    Fdisk: fix master boot record if infected with virus, for example.

    Fdisk /mbr: replace mbr with backup copySmartdrv /c: forces smart drive to write out all cached data

    Attrib c:\myfiles +a /s: archive directories and sub-directories

    *Roll back to the system restore point generated prior to the updates installation: This is what you shoulddo if after you apply a recent update, you reboot your computer you notice you are unable to access anysystem resources.

    *Restore Point: It is possible to return to a previous system state via Restore Point even by booting fromInstallation Media.

    *The Startup Repair function repairs startup files and resolves common startup problems.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    13/27

    *Presentation Settings: Enabling presentation settings stops the display of notifications, such as calendareminders and messages that appear through instant messaging programs. When enabled, PresentationSettings ensure that the computer will not go into hibernation or sleep and the screen saver will not bedisplayed. It is also possible to see to it that a special desktop background is displayed duringpresentations rather than the one that is normally shown.

    *Custom Search Provider:http://search.contoso.local/results.aspx?q=TEST

    *Software Explorer: Software Explorer can be used to temporarily disable an applications automatic startup.

    *Programs and Features: this rather than Windows Update, is the Windows Vista feature that you use to remove the installed updatesThis is accomplished by uninstalling the update and might be necessary in the event that an installed update causes problems withyour computer.

    *Tablet PC: The Target Specific Errors routine, available through the Handwriting Personalization dialog box, allows one to correcspecific recognition mistakes. This is a good option if the handwriting recognizer routinely recognizes most characters, but mistakes asingle character constantly.

    *The Administrators group is allowed to make changes without entering credentials.

    *Unscramble is used to undo Rot 13 encoding.

    *Windows Vista Upgrade Advisor: wont work with XP Pro 64-bit, Win 2k Pro 32-bit or Win Me.

    *Windows Aero Theme: Access on/off via The Theme item in Personalization. It can be used to switch between Win Classic & WinAero.

    *Add-On Manager: Can provide a report of all Internet Explorer add-ons that run without requiring permission as well as all add-onsthat have been installed or used by the Web browser.

    *Set Up A Connection or Network: can be used to configure a new wireless router.

    *People Near Me: You can configure People Near Me to limit from whom you receive invitations. The ops are Trusted Contacts, Anyoneand No One.

    *In the event you change the refresh rate and/or resolution in a way that results in the inability to see anything, you should boot intosafe mode to rectify the problem.

    *Cookies: Internet Options dialog box: if set so that all cookies are blocked, IE will block all cookies regardless of source and existingcookies stored on the computer cannot be read.

    *The Problem Reports and Solutions feature provides you with information about any problems with your computer and possible

    solutions.

    *The Reliability Monitor can inform you that a crash has occurred and which software has caused the crash, it provides no informationon how to resolve the issue.

    Tablet PC: PC Tablet: Pointer: Pen Entry: Handwriting Recognition: Input Device

    *Pin Flicks enable shortcuts like cut and paste to be assigned to specific movements of the pen.

    *Gestures are used on the Input panel to add special characters like Tab and Enter. They cannot be used to configure pen shortcutslike cutting and pasting.

    *Pointer options determine the visual feedback of the pen in a similar way to configuring mouse pointers and cannot be used toconfigure pen shortcuts.

    *Windows Vista Aero Graphics Card Properties Required to Run Aero: WDDM driver, Hardware Pixel Shade

    2.0, DirectX 9 capable, 32-bits per pixel capacity, and an adequate amount of graphics memory.

    *The amount of memory required on the graphics adapter depends on the resolution in which you want to run Aero. Running WindowsAero at the lowest possible resolution requires 64 MB of graphics adapter memory.

    *Any graphics adapter, whether it is PCI, PCIe, or AGP, will work with Windows Aero as long as it has the other requiredcharacteristics.

    *Web Restrictions: use this to put mischievous children on lockdown.

    *Allow list: Re: Web Restrictions: Allows on to allow their kids to visit an approved Web site withoutchanging any of the blocking options, i.e., defaults & defined settings.

    http://search.contoso.local/results.aspx?q=TESThttp://search.contoso.local/results.aspx?q=TESThttp://search.contoso.local/results.aspx?q=TESThttp://search.contoso.local/results.aspx?q=TESThttp://search.contoso.local/results.aspx?q=TEST
  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    14/27

    *Windows Firewall: Each network profile has a unique set of exceptions. An exception applied to onenetwork profile is not applied to other network profiles. Windows Firewall can be applied selectively tointerfaces, but Windows Firewall exceptions cannot be configured on a per-interface basis they apply toall interfaces for which the firewall is configured.

    *Rules: only rules, not exceptions, can be used to block outbound traffic.

    *Restricted Sites zone:

    *User Account Control: Deny Elevation Requests to lock block someone

    *Admin Approval mode:

    *sync partnerships:

    *msd: diagnostics utility

    *chkntfs:

    *chkdsk:

    *defrag:

    *scandisk:

    *scanreg:

    *Computer Management Snapin Launcher:

    *User Account Control: Administer Users

    *ESRB: Entertainment Software Rating Board

    *Cryptographic Operators:

    *Backup Operators:

    *Power Users:

    *Internet zone Privacy slider:

    *Protected mode:

    *Pop-up Blocker:

    *Phishing Filter:

    *Manage Add Ons:

    *Configure People Near Me:

    *System Protection:

    *Restore Previous Versions:

    *Configure Windows Sidebar Properties:

    *Remote Administration, Remote Assistance, Remote Desktop and Remote Service Management

    *Windows Firewall Settings: Here you can make exceptions for applications & services you want to run.

    *Windows Update Driver Settings dialog box:

    *Secure Desktop: WTF?

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    15/27

    *Windows Firewall: Web Server: lecturer offering students opp to download notes via his Windows Vista fileshare, one must configure Win Firewall to allow exceptions to the World Wide Web Services (http), this is ihost doesnt have Secure Sockets Layer (SSL) layer configured.

    *The Display Settings: span display across both monitors: 1. Click Display 1; & 2. Select Extend TheDesktop Onto this Monitor check box.

    *Pop-Up Blocker: Allow Exception: The Pop-up Blocker settings of IE include a configurable list of sites thatyou can exempt from the application. Adding a site to the Trusted Sites zone does not allow pop-ups ifPop-up Blocker is enabled.

    *Which of the following can you accomplish directly in the Change Search Defaults dialog box? 1. Set adefault search provider; & 2. Remove a search provider.

    *User Account Control prompt: Only members of the Administrators group can get a User Account Controprompt.

    *The Theme item in Personalization: this is where you go to switch between Windows Aero and WindowsClassic.

    File Sharing Share UNC shared folder File and Printer Sharing

    *Core Networkingexception: The Core Networking exception is required for general remote networkconnectivity.

    *File and Printer sharing: The File and Printer Sharing exception is required to allow remote clients toaccess shared folders and printers on the local computer running Windows Vista.

    *Administrators group: Only members of the Administrators group are able to elevate privileges withoutproviding credentials, and this is only the case if the local policy is configured in a specific way.

    *The Power Users group is included in Windows Vista for backward-compatibility reasons.

    *Intel Core Duo processor is a 32-bit processor: Only a 32-bit edition of Windows Vista can be installed onthis computer.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    16/27

    *Blocking outbound traffic: Port blocking: Firewall configuration: Only Windows Firewall with AdvancedSecurity can be configured to block outgoing traffic.

    * Blocking outbound traffic: Port blocking: Firewall configuration: Basic Windows Firewall can only block orallow inbound traffic.

    *Windows Defender: WD is used to block spyware and does not block network traffic.

    *Cookie management: Internet zone Privacy slider

    *Task Scheduler backup limitations: Automated backups can only back up personal data. This includesInternet Windows Contacts data, Windows Mail data and Microsoft Internet Explorer bookmarks. RegardingAutomated backups, system files and application files are not able to be backed up via automatedbackups.

    *Windows Easy Transfer cable:

    *USB TV Tuner:

    *Red network Xd Icon in Task Bar: no connectivity at all; neither wired or wireless.

    *Yellow warning Network System icon: may indicate more, but can indicate ip conflict.

    *published calendar: publishing calendar off of a share: coworkers will subscribe: make sure that changes

    are being published and posters computer and that subscriptions settings on her coworkers computers iscorrect.

    *Restore Hidden Updates:

    *Windows Vista Upgrade Advisor: The Windows Vista Upgrade Advisor will only run on 32-bit editions ofWindows XP and Windows Vista. This means that it will not run on Windows XP Pro 64-bit edition, Win2000 Pro 32-bit or Windows Me.

    *Scopes: Windows Firewall: Scopes can be applied to single IP addresses, IP address ranges, anycomputers and the local subnet. However, it is not possible to apply a scope to a domain name suffixusing Windows Firewall.

    *Windows Meeting Space: There is no way to forcibly eject a disruptive @#$!. One must close and re-sendall invites excluding on for the @#$!.

    *Programs and Features: It is here you can uninstall a Windows Update, not through Windows Update.

    *Target Specific Errors routine: Handwriting recognition for Tablet PCs - > use to target little oddities.

    *WDDM: Even if the hardware of a graphics adapter is compliant, the graphics adapter needs to have aWDDM driver installed before it can be used to display the Windows Aero interface.

    *Windows Defender: It is possible to scan only CD-ROM, network share and USB hard disk drive forspyware.

    *Xbox 360: Windows Media Center extender: Set this up to transmit captured data over the Internet to an

    Xbox 360 located a bit away so that you can use it as a transceiver to play captured data on a big-screenTV attached to the Xbox 360.

    *Windows Vista Windows Genuine Advantage: Must have 2 things: 1. Active Internet connection; & 2.Perform Windows Product Activation.

    * Group Policy settings -By default, members of the Administrators group can click through User AccountControl dialog boxes and standard users must provide credentials. It is possible to change this throughGroup Policy settings.

    *Subnet mask: static network IP address: Default gateway: This is possible: default gateway:192.168.23.100; static ip: 192.168.23.47; subnet mask: 255.255.255.0.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    17/27

    *System Restore: Advanced Restore: use advanced restore to restore non-native files on a computer onwhich they werent created and on a computer on which they never existed by using backup data createdon a second & different computer.

    *All Control Panel Items: Everything

    *Default Program Associations: Control Panel > All Control Panel Items > Default Programs

    *nbtstat a computer-name

    *route PRINT: TABLE

    *arp a 10.40.2.21

    *format drive: control panel > computer management > Storage > Disk Management

    *format drive: above or - > control panel > all control panel items > admin istrative tools > computermanagement > storage > disk management

    *'traceroute -m 30 -q 3 -f 3 76.174.115.47'

    *User Account Control: change settings here to implement strictness regarding alerts and permissionsabout new applications and their allowance regarding the suspect program being added to changesystem settings, configuration, etc.

    *ipconfig /flushdns

    *ren temp files

    *fdisk: command-line partition utility

    *com2: address i/o: 02F8-02ff

    *tracert:

    *nslookup:

    *ntbackup: manage dns configuration

    *rd dir1: remove directory, directory 1

    *File Settings and Transfer Wizard:

    *Windows Easy Transfer:

    *User State Migration Tool:

    *You want to record information such as the number of paging operations carried out per second and the percentage of availableprocessor time used when a computer is carrying out.

    *Windows Anytime Upgrade:

    *Services:

    *Component Services:

    *Heuristics:

    *ipconfig /renew

    *shadow copies: previous versions of files

    *Mobile Device Center: Bluetooth modem via cellular phone: config a partnership via Windows Mobile Device Center

    *Trusted Sites:protected mode, one of a few security zone classifications, is not enabled by default in the local intranet.

    *Keep setting: a Media Center recording default

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    18/27

    *Virtual Memory dialog box: another route: from Performance Information and Tools dialog box see Advanced Tools

    *Create a Standard User Account: Local Users And Groups MMC snap-in.

    *Content Advisor: you can configure this to allow access to sites that have no content rating

    *Content Advisor: Generally parental controls

    *Plug-and-play hardware: Non-plug and play hardware needs to be installed by using the Add Legacy Hardware command in theDevice Manager.

    *protected mode is disabled for Trusted Sites.

    *Media Center recording defaults: automatically eliminating the movies one has watched

    *SideShow: A device that can access ones

    *Reliability Monitor: Re the appearance of inexplicable system failures can be zeroed in on by looking on the Reliability Monitor for asudden drop off.

    *Software Explorer: Startup Programs, Currently Running Programs, Windows Sockets (Winsock) Service Providers, Network-Connected Programs

    *Windows Firewall: These profiles are available for configuration: 1. Private; 2. Public; & 3. Domain.

    *Public Profile: Windows Firewall: The Public Profile is gen more restrictive than the other 2 and is intended for use in a users non-network environment when he is not a member of the Active Directory domain.

    *Domain Profile: Windows Firewall: The Domain Profile is used when a computer is a part of a network and also a domain member.

    *Away Mode: Media Center Extender: The Media Center Extender can penetrate the Media Center for data even if the Media Center isshut down completely at the time of the distant Media Center Extender requests the data.

    *Z-shaped scratch-out gesture: Input Panel options: selecting or extablishing this option will restrict scratch-out gestures to only the zscratch out i.e., eliminate all others.

    *The Windows Vista Upgrade Advisor runs on all versions of Windows XP and Vista.

    *Local Users And Groups MMC snap-in: New User: here you can create owned accounts in that you can make users create or changethe password you initially provide them with.

    *User Account Control: Virtualize File And Registry Write Failures To Per-User Locations: This prevents legacy files that attempt to writeto protected parts of the registry or file system from running.

    *Advanced Power Settings: High Performance plan: Editing the Advanced Power Settings of the current plan allows you to modifywhether a password is required when the computer is woken up based upon ac or dc, i.e., wall or battery power.

    *System Recovery Options: Startup Repair: Startup Repair should be your first port of call with any startup problem encountered by acomputer running Windows Vista.

    *Gadget Gallery: Windows Sidebar: If the gadgets arent removed from the Gadget Gallery, you can drag and drop them back off atthe Windows Sidebar

    *Problem Reports and Solutions: System and Maintenance: You can check here intermediately for solutions to problems.

    *Windows Aero: Circumnavigation to restore Aero: The only way another standard user can disable the Aerotheme is by forciblychanging the number of colors displayed. The user who wants to reverse this can reverse the colors shown to 32-bit.

    *UAC: User Access Control: This is Vista and after: It by default requires admin users to acknowledge by clicking ok at minimum toacknowledge allowance of admin options, install, configuration, deletion, etc. It is here that you impose restrictions and rules onactions. This setting causes administrator accounts to run continuously with elevated privileges. Standard accounts cannot supplyadministrator permissions to run administrator tasks. This is legacy Windows XP mode, and UAC is disabled.

    *Microsoft Messenger: From here you can transmit Remote Assistance requests.

    *Windows Problem Reporting and Solutions: Admin can impose or chose All Users On.

    *Vista minimum speed processor: 800MHz

    *LCD screens should always be set to their native resolutions. If an LCD screen is set to another setting, it will appear blocky.

    *Windows Firewall: Limitation: It can edit only the currently active network profile when editing.

    *You need to run the Program Compatibility Wizard and select the Run This Program As An Administrator check box.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    19/27

    *Internet Information Server: ? Can you use this to penetrate a firewall?

    *Terminal Gateway Services: THIS PROVIDES AN ALTERNATIVE TO USING VPN SOFTWARE -

    *Windows Mobility Center: configure slate mode vs laptop mode; portrait vs landscape

    *Color Management Utility:

    *User Access Control:

    *Handwriting Personalization:

    *Target Specific Errors in Handwriting Personalization: target errors

    *Parental Controls: Application Restrictions:

    *Fax accounts: fax accounts allow you to shift between using a built-in fax modem and a fax server on the network.

    *Presentation Settings dialog box: Turn off system notifications, change screen background, access a list of connected displays andset the speaker vol

    *Ask Me Later: Clicking the Ask Me Later allows you to configure Windows Vista to use a local update server rather than having thecomputer automatically contact the Microsoft Update servers on the Internet.

    *Parental Controls: Control Panel: 1. Set Up Parental Controls for any User; & 2. Add or Remove User Accounts.

    *Windows Firewall: Export Policy: Before making changes to the Windows Firewall Policy, you should export the current policy so thatyou can import it later if you @#$%@ up.

    *Windows Meeting Space meeting:

    *Windows Anytime Upgrade: prior to running WAU, you must activate your current edition of Windows Vista

    *Windows Vista Upgrade Advisor: runs on all 32-bit versions of Windows XP & Vista

    *Trusted Sites: protected mode is not enabled on these sites by default.

    *Aggregator functions: auto-fetch, offline presense, grouping and organization

    *Elevated Privileges: Updates: Which updates can be installed without requiring elevated privileges. They can also be installedautomatically even Important and Recommended.

    *You need to run the Program Compatibility Wizard and select the Run This Program As An Administrator check box.

    *Create a View: Creating views allows one to distinguish between email from multiple accounts

    *Recommended Updates: Install Updates Automatically: Recommended Updates are the only significant class of updates that can beactivated or deactivated to update if Windows is set to Audo-Update.

    *Windows Mobility Center: See here . . .

    *Windows Vista Minimum RAM requirement: 512MB

    *Public Folder Sharing: Enabling Public Folder Sharing allows the user to share files without requiring administrator intervention.Enabling Public Folder Sharing allows the user to share files without requiring administrator intervention. Enabling Password ProtectedSharing ensures that only users who have accounts on the computer can access the files. Enabling Network Discovery enables theuser to access her files from another workstation. The user will not use the file sharing method because this requires administratorintervention, so in this scenario it does not matter whether this setting is enabled or disabled. However, it is good practice to disableany feature that is not used.

    *Note the difference between file sharing and folder sharing

    *UAC: configure UAC settings: Expand Local Policies, and select Security Options.

    *Opacity Settings: Configure each gadgets opacity settings. This is an individual thing baby.

    *Restore Plan Defaults: Create a power plan: Creating a custom power plan ensures that if you revert to default by a slip of themouse, your settings wont revert to anything but what they are hence, no loss. If you adjust a pre-existing setting and hit RestorePlan Defaults, you will wind up with a severe reversion.

    * The Target Specific Recognition Errors function

    *System Restore is performed via Restore Points: System restore points are automatically created whenever a new application ordevice driver software is installed. This means that you can return the computer to the state it was in prior to installing theapplication by using the restore point taken at that point in time.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    20/27

    *Parental Controls: One setting is Select All. Clear the programs you want to block.

    *UAC dialog box: is by default set to Secure Desktop: In a Microsoft Question, the user who wanted to capture a screenshot shouldhave disabled Secure Desktop in order to allow image data to be captured to the clipboard so that it can be saved in Microsoft Paint.

    *Remote Assistance: Remote Assistance connections are not possible with the Remote Assistance panel closed.

    *Calendar Sharing: This consists of at least 2 steps: 1. Creating; & 2. Publishing.

    *UAC: What setting disables UAC: User Account Control: Run All Administrators in Admin Approval Mode is Disabled

    *Receiving Faxes on Vista: You must do a minimum of 2 things: 1. Config the send/receive options to allow the device to receive faxes2. Config a Fax Account

    *ReadyBoost: Microsoft suggests using a flash memory device that has a capacity equal to 1x to 3x the size of the machines RAM.

    *Applications Compatibility with Vista: Microsoft suggests two main steps: 1. Check with the progs vendors; & 2. Run the Windows Vupgrade Advisor: it maintains a list of progs with known compatibility issues.

    *Parental Controls: High restriction level: this levl ermits children only to access websites approved for children.

    *UAC: You just installed Vista Ultimate on a computer that is part of a workgroup: These settings are enabled by default: 1. OnlyElevate UIAccess Applications That are Installed in Secure Locations; 2. Run All Administrators in Admin Approval Mode; 3. VirtualizeFile and Registry Write Failures to Per-User Locations; & 4. Switch to the Secure Desktop when Prompting for Elevation.

    *Windows Meeting Space meeting: Ad-hoc Wireless Networking: If you want to create a wireless Ad-hoc network and dont have a preexisting, functional network in place and only have a few laptops or maybe desktops, you must have IPv6 enabled. This is the casewhether one is attempting to establish a Windows Meeting Space via wired or wireless connections.

    *Reliability and Performance Monitor: One can use this utility to establish a baseline from which to compare seemingly abnormalbehavior in search for problems: In Control Panel, select System And Maintenance. Click Performance Information And Tools. ClickAdvanced Tools. Select Open Reliability And Performance Monitor.

    *Sync Partnership: resort to this to sync certain specs amongst two devices: for example, a specific folder from your desktop to yourlaptop.

    *Windows Vista Home Premium: This OS doesnt support offline file synchronization.

    *User State Migration Tool: Only the User State Migration Tool is able to migrate both user settings and data from a computer runningWin 2k Pro to Windows Vista.

    *Native Resolution: LCD: Blurry & Blocky => monitor is not set to its native resolution.

    *Restricted Sites zone: Sites containing suspect contenct(such as ActiveX controls and certain utilities) can be added to the RestrictedSites zone and this is done to impose strict rules on permissions extended to the site in question. Users can still visit sites in theRestricted Sites zone, however these users cannot download anything even fonts: dont misconstrue this to mean they cannotvisually see content the site contains displayed in their browser on their computer.

    *Windows Meeting Space meetings: 4 users. A saves first. Then B saves and so on. Later, users will see only the additional work doneby user A because only the first saving users additions or changes are replicated to the document in question.

    *User State Migration Tool: This is the only utility that can take user data & settings from a machine running Vista to an XP machine

    *Add Legacy Hardware: Device Manager: to install non-plug and play hardware. For example, a non-plug and play PCI card.

    *Severe alert items: Windows Defender: this is the only alert level for which users cannot specify a response to take due to the alertat hand.

    *Negative caching: Internet Explorer cannot display a webpage: These are actions Microsoft suggests taking in response to thisdilemma: 1. Wait for a while and try again; 2. Reboot the computer; 3. Access the website from another computer; & 4. Open the

    Command Prompt console by right-clicking the item in the Accessories menu and selecting Run AsAdministrator. Enter ipconfig/flushdns. Refresh the browser.

    The computers DNS Resolver cache has stored the information that the website URL cannot resolve. Rebooting thecomputer clears the

    cache. Also, DNS Resolver cache is periodically cleared and so the negative cache will be discarded in time. Finally, Run AsAdministrator

    ipconfig /flushdns clears the DNS cache.

    *Windows Device Drivers, New: Find new Windows produced drivers: 1. Windows Update; & 2. Device Manager: from here, you wouldcheck by right-clicking a specific device and selecting Update Driver.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    21/27

    *Remote Assistance: Procedures that must be followed for this to work: 1. Computer and firewall must be config to allow inboundRemote Asistance connections; 2. Penetrated computer must be on and have its Remote Assistance Panel open.

    *footer specification box: &bPage &p of &P&b: this will show, as a general example, Page 6 of 10.

    *Roll back the device driver:

    *Content Advisor:

    *In Control Panel, select System And Maintenance. Click Performance Information And Tools. Click Advanced Tools. Select ViewPerformance Details In Event Log.

    *In Control Panel, select System And Maintenance. Click Performance Information And Tools. Click Advanced Tools. Select OpenReliability And Performance Monitor.

    *Game Overrides:

    *Game Restrictions:

    *Problem Reports and Solutions & Reliability Monitor: Diagnostics when clueless

    *Command Prompt: Command Prompt as Administrator: Accessories -> Command Prompt -> Right-Click & Select Run asAdministrator

    *ipconfig /flushdns: Must be run from Command Prompt as Admin: See above

    *whoami

    *Windows Mobile Partnership through WMDC.

    *Orientation Calibration: Configure this for stylus mismatch in.

    *Complex Activation & Licensing Requirements: Sometimes an Upgrade rather than a migration is the answer.

    *Protected Mode: Local Intranet: For additional internal network security to protect your computer from internal penetration, reversethe default to not include the Local Intranet in the protected mode.

    *Logs: See at Event Viewer: 1. mmc.exe; 2. Eventvwr.msc; &

    *Graphics Adapter Requirements to run Vista:

    *Tablet PC running Vista: how do you create shortcuts.

    *Which of the following audio data formats do not support the Copy Protect Music option? (Choose all that apply.)

    *Ian's computer running Windows Vista has System Protection enabled for all volumes on Ian's computer.

    *Restore Previous Versions

    *Spanned Display:

    *Block All Incoming Connections: It appears this overrides any specified exceptions: It is the big lockdown.

    *Presentation Settings: Configure them so that there is no interference or future configuration changes for supported users; they justswitch into Presentation Mode when the Time is Right.

    *Web Restrictions: Block Web Content Automatically setting

    *Remote Desktop Users: They must be named in order to connect.

    *Away Mode: Windows Vista Media Center Extender: Windows Media Center: you can wake up the repository with the Extender withthis setting enabled on the repository.

    *Parental Controls: Configure Game Restrictions to block Drug Referenc

    *Logging: Email: Attach Task to this Event to the event in question to implement a defined response to the event, such as emailingyourself.

    *WDDM: Windows Display Driver Model

    *Restore categories: Restore Files, Advanced Restore, System Restore complete PC restore.

    *Roll back Vista install: if there materializes some prohibitive component or some other mishap during a Vista install, one can rebootthe computer and at the boot menu there is an option to roll back to Windows XP.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    22/27

    *Windows Defender: Windows Defender can detect spyware in hardware device drivers!

    *Change Search Defaults:

    *Use the Services and Drivers real-time protection option.

    *Reliability Monitor: Check here for system failures.

    *Microsoft Windows Media Player Library: share music: must do prior configurations -> 1. Core Networking Exception; & 2. Firewallconfiguration.

    *3D Flip: procedure to check to see whether Windows Aero is functioning

    *Modify particular Aero features: System Properties -> Advanced Tab -> Performance and modify the original settings of the VisualEffects tab

    *Windows Vista Fax and Scan:

    *Windows Mobility Center: Windows Vista Tablet PC

    *Automatic Driver Update: Change the Windows Update driver setting to Check For Drivers Automatically.

    *Resource Monitor:

    *1. mmc.exe; 2. Eventvwr.msc; 3. Perfmon.exe (performance monitor); 4. Perfmon.exe /res (resource monitor)

    *Device Manager: use Device Manager to Install drivers, update drivers, and troubleshoot drivers but use Windows Update todownload current drivers.

    *Program Compatibility Wizard: helps get non-compatible apps working with a new system.

    *Reliability Monitor:

    *Plug-ins: mmc:

    *User Account Control: Use Local Security Policies to Configure User Account Control:

    *Internet Security Zones: Allowed, Blocked, Restricted,

    *Advanced Firewall: Windows Firewall: Ensure that Windows Firewall is active on all interfaces

    *nslookup: networking commands:

    *Vista display to span monitors:

    *Crossover cable: you can use a crossover cable to coattail your neighbors

    *Attach Task to This Event: Security log:

    *Firewall Exceptions: The professor lecturer example he wanted to allow students to download lecture notes from his personallaptop running a web server. The professor would configure exceptions for FTP server and core networking, whatever that is?!

    *Public, Private and Work Network profiles each have a corresponding Public, Private and Work firewall profile

    *Remote Assistance: configure Remote Assistance

    *Encoding:

    *Heuristics: activate this on your computer

    *Web server feature:

    *Click Show Me All The Shared Network Folders On This Computer in Network and Sharing Center.

    *Advanced Restore:

    *ipconfig /release: you will now be unable to connect to anything and must issue this command: ipconfig /renew

    *Restore hidden updates: how?

    *Windows Firewall: Worms: Windows Firewall protects against worms.

    *default feed settings determine whether or not an audible alert is triggered when ie detects a new feed.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    23/27

    *Run As Administrator: This option exists to solve issues such as installation failure due to no UAC requests made by the offendingapplication, which will frequently be programs coded for older OSs such as Win 2k. This is not a Compatibility issue it is a UACissue and the solution therefore not solved by using the compatibility mode issue. This problem will also not be solved by using theAdmin account created when Vista was installed because it is subject to the same UAC constraints.

    *Customize: Click Customize in Network and Sharing Center to rectify a misclassified location: such as, public rather thanprivate. Note: Manage Network Connections in Network and Sharing Center allows you to change adapter properties, notalter network designations!

    *Vista: Items in Control Panel that require privilege elevation are indicated with a shield icon.

    *Windows Anytime Upgrade: Windows Aero-compatible graphics adapter will improve your users experience, although it is notnecessary to perform the upgrade from one version of Vista to a version with more capabilities Note: Anytime Upgrade implies inand of itself that Vista pre-exists on the machine in question, hence it has to be Vista capable regardless of whether or not it is Aerocapable.

    *Automatic Learning: Switching off Automatic Learning deletes all existing handwriting recognition data. Rebooting and then turningAutomatic Learning back on will allow the Tablet PC to start learning afresh the new users handwriting.

    *Handwriting Recognition problems: If a new user assumes ownership of a new tablet, the following methods will not resolve thecomputers inability to recognize the new users handwriting: 1. Teach the Recognizer Your Handwriting Style routine; 2. Calibrate thepen; & 3. Target Specific Recognition Errors routine on the new Tablet PC. The solution is to Switch off Automatic Learning, reboot thecomputer, and then turn Automatic learning back on.

    *Windows Mobile powered phone: A Windows Mobile powered phone can be partnered with a maximum of two different computers.

    *VPN: VPN is already configured, how do you initiate connection via the VPN in question? In at minimum either of the following 2

    methods: 1. Use Connect to a Network and Sharing Center; & 2. Use Manage Network Connections in Network and Sharing Center.

    *Windows Firewall with Advanced Security: Only Windows Firewall with Advanced Security allows the importation and/or exportation oFirewall policy.

    *Remote Desktop timeout: When a new user requests a session, the current user has 30 seconds to respond or s/he is booted fromtheir session against their will. The new user than has the option of initiating a connection.

    *Trusted Sites zone: If you notice that in your IE browser window that some sites show not protected, then you can deduce that thatsite must be listed in the Trusted Sites zone.

    *Trusted Sites zone: sites added here are not subject to protected mode settings

    *Fax Settings: allow one to select which fax device will be used if multiple devices exist.

    *Fax Accounts Settings: allow one to select between a local fax modem and fax servers on the network.

    *Firewall Rules: if a rules scope, protocol and port numbers are correct and you are having problems succeeding with your objectivecheck if the rule is set to permit or deny.

    *Pen Flicks: enable shortcuts like cut and paste to be assigned to specific movements of the pen.

    *Pen Gestures: are used on the input panel to add special characters like Tab and Enter.

    *Share a file full of files with everyone on your local network: How do you carry this out? 1. Copy the folder you wish to share to thePublic folder; & 2. Turn on Public Folder Sharing in Network and Sharing Center.

    *Public Folder Sharing: When you enable Public Folder Sharing, File Sharing and Network Discovery are automatically enabled.

    *Allow and Block lists: If the Block Some Websites or Content option is not set, the Allow and Block lists will not be used.

    *Windows Firewall exception: scopes: custom exceptions can be applied to an IP address range, computers (any), a local subnet and

    finally a single IP address.

    *Windows Firewall exception: scopes: It is not possible to apply a scope to a domain name suffix using Windows Firewall.

    *the yellow warning Network System icon: actually both of these cases occur when your computer has only 1 network interface. 1.Incorrect password provided when attempting to join a wireless network; & 2. An IP address conflict between your computer andanother computer (this only occurs in the event that your machine has a single network interface).

    *The Local Only Network System Icon will be displayed when your DNS servers are misconfigured.

    *The Local Only Network System Icon will be displayed also when your WINS server address is incorrectly configured.

    *The Local Only Network System Icon will be displayed yet again when one has an incorrectly configured default gateway.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    24/27

    *What info must you have to configure an exception in Windows Firewall? It is necessary to know either the programs name or theprotocol and port that the program uses.

    *It is necessary to know the IP address of the people who will connect?!

    *Configure Sharing within Windows Media Player: this allows others with Media Player installed to share the offering computersprogram.

    *Disable Secure Desktop:

    *What protocols can be used by Windows Mail to retrieve e-mail from a mail server? POP3 & IMAP4.

    *Updates; after applying a recent update, you reboot and are unable to access any network resources what do you do? Roll back tothe system restore point gen prior to update.

    *Intel Core Duo is a 32-bit processor and it cannot run 64-bit Vista.

    *Window Sideshow Gadgets: they are displayed on an auxiliary display.

    *If you want to run a web server without SSL, what exceptions must be made to Windows Firewall? World Wide Web services (HTTP)and Core Networking Exception.

    *If you want to run a web server without SSL, what exceptions must be made to Windows Firewall? World Wide Web services (HTTP)and Core Networking Exception. NOTE: SSL is required only if you want to use secure World Wide Web services.

    *Safe List Only: can be used to restrict permissible email senders to your machine; usually set up for older people who cantunderstand what spam is.

    *Calendar Subscriptions: Read only permission is the minimum requirement. If someone is already subscribed, then you canconclude that the correct permissions are set.

    *Red x: Disconnected: Either a cable is unplugged or there is no wireless access point, which is the ethereal equivalent

    *Yellow warning network system icon: one condition that will cause this to show up is if the machine in question is able to makecontact with the network, but the machine cannot obtain a DHCP IP address.

    *Local Only Network System icon: this appears as two computers only, no globe, no red x and no yellow triangle of death.

    *Remote Assistance: Stop Sharing: Clicking the Stop Sharing only prevents the Assistor from further interaction with the desktop

    *Remote Assistance: Disconnect icon: this disconnects the remote Assistor.

    *Remote Assistance: The Assistor will be unable to see the desktop in question if the Pause icon is clicked.

    *Remote Assistance: Clicking the Stop Sharing icon does not stop any dialog that is in progress through the chat utility.

    *User Account Control policy settings: members of the Administrators group can click through User Account Control dialog boxes andstandard users must provide credentials. It is possible to change this through Group Policy Settings.

    *Group Policy Settings:

    *Power Users: in previous versions of Microsoft Windows, Power Users had limited administrator ability, in Windows Vista if an accountis not in the Administrators local group it is a standard user.

    *Windows Firewall with Advanced Security: A cant configure a rule to allow B to FTP into his machine. He must get the specs rightplus do the following: 1. Change the rule from outbound to inbound; & 2. Change the rule action from block to allow.

    *Windows Sidebar properties: Ian wants to see his stock gadgets at all times. Therefore he has no alternative but to configureWindows Sidebar properties so that the Windows Sidebar is always displayed on top of other panes.

    *Gadget Opacity: Windows Sidebar: Gadget Opacity is only relevant when Windows Sidebar is visible.

    *Windows Sideshow: Windows Sideshow also has gadgets but these are not displayed on Windows Sidebar.

    *Public Folder Sharing: Network and Sharing Center: Sharing and Discovery: if you enable Public Folder Sharing and set it up so thatanyone can access files in question, what processes are activated? 1. Network Discovery; & 2. File Sharing. Test material says thatthese two are activated auto if Public Folder Sharing is enabled.

    *Password Protected Sharing: This is not automatically enabled and must be configured manually.

    *Media Sharing: this too must be manually configured.

    *You want to share some files over the network. You have configured a shared folder and appropriatepermissions. Which exceptions should you configure? 1. File and Printer Sharing; & 2. Core Networking.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    25/27

    *Core Networking: The Core Networking exception is required for general remote network connectivity.

    *Program Installation: Program Installation Troubleshooting: Occassionallyone encounters a problem with policy settings. One policythat can be problematic is the local policy that only elevates executables that are signed and validated. NOTE: This is a seemingoddity but there is a clear indication of the problem if some applications can install and others cant! The ones that cant arerequesting Admin authority and it would be declined with this setting set to on. Unsigned software can be stopped by disallowingelevation of privileges for unsigned software.

    *If there are multiple interfaces, Windows Vista considers all classified identically with the least secure network interface location.

    *Window Aero: Personalization: Theme: It is here that you can return your computer to the Aero theme if it

    *Windows key + Spacebar: show desktop

    *Windows Sidebar: It is not possible to adjust the size of Windows Sidebar:

    *editing gadget properties: this can only be done if the gadget is located on the desktop.

    *Recovery Console: this is antiquated: It existed in Win 2k, Win XP and Win Server 2003. In Vista there is System Recovery Options

    *Windows Vista does not allow simultaneous connections to a computer.

    *Windows Firewall: To which interfaces can Windows Firewall be applied? 1. Local area network; 2. Bluetooth; & 3. Mobile device.

    *User State Migration Tool 3.0: This tool is used to transfer userdata and settings from XP to Vista and the tool can be used with ascript that allows the automation of the migration of user data and settings from Win XP to Vista. Windows Easy Transfer wouldrequire that each step be performed manually.

    *File Settings and Transfer Wizard was a Win XP tool that performed similar functions to Windows Easy Transfer. This cannot be usedto transfer data to Vista.

    *Change Search Defaults: It is only possible to remove a provider or set the default search provider in the Change Search Defaultsdialog box.

    *Change Search Defaults: new providers must be added through the Add Provider web pages.

    *Add Provider web pages: where you would add a search provider.

    *Search provider properties: It is not possible to edit existing provider properties.

    *Priority settings among search providers: there is no priority setting among search providers, as there can only be one default searchprovider and all the others are alternates.

    * Windows Easy Transfer : Windows 2000 pro cannot be migrated in totality through Windows Easy Transfer: one cannot transferdesktop settings, bookmarks or user accounts from Win 2000 to Vista, although this is a possibility when performing a migration fromXP to Vista.

    *Windows Easy Transfer: Windows Easy Transfer cannot be used to migrate passwords under any circumstances.

    *Windows Firewall: Each network profile has a unique set of exceptions. An exception applied to one network profile is not applied toothers. Windows Firewall can be applied selectively to interfaces.

    *Windows Firewall: EXCEPTIONS cannot be configured on a per-interface basis, they are applied to all interfaces upon which thefirewall is configured. NOTE: this means that you can set the firewall on or off for bluetooth, but any exceptions to the firewall areapplied across all interfaces upon which it is acting upon.

    *Windows Firewall with Advanced Security: Rules: Rules are an attribute of Windows Firewall with Advanced Security and can be usedto allow and block.

    *Windows Firewall: Exceptions: exceptions are an attribute of Windows Firewall, basic. They can only allow.

    *Windows Firewall with Advanced Security: Only RULES, not exceptions, can be used to block outbound traffic.

    *Windows Meeting Space: through Windows Meeting Space, one can share via workgroup network or ad-hoc network. The individualhosting the application can grant a participant in the Windows Meeting Space meeting control of the application so that theparticipant in question can make changes remotely to the hosts application or document belonging to the application hosted on theremote desktop.

    *Handouts:

    *Windows Meeting Space: Handouts: applications cannot be dispensed as handouts.

    *Subscribed RSS feeds: It is only possible to configure automatic attachment downloadson a per-feed basis, so you mustconfigure every one.

  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    26/27

    *RSS feed properties cannot be configured using Windows Mail.

    *RSS feed properties cannot be configured using the default feed settings.

    *Admin Approval mode: policies determine whether a prompt to continue, a request for credentials or automatic elevation occurs.

    *Start Menu Power button: This is not the Power Button! This setting is configured in the Power Options Advanced Settings dialogbox.

    *Sync conflict: Sync Center: synchronization conflicts occur when the local and remote copies of the file have been modified in theperiod between synchronization.

    *Sync Center: deleted files do not cause synchronization errors.

    *Deleted gadgets: Gadget Gallery: Ian deleted three default gadgets from the Gadget Gallery. He has decided he wants to use one ofthgadgets he removed. How would he get it back? Edit Windows Sidebar properties. From Windows Sidebar Properties, it is possibleto click Restore Gadgets Installed with Windows. This reinstalls all of the default gadgets.

    *Gadget Gallery: Windows Sidebar: The default gadgets cannot be downloaded from the Internet again.

    *Windows Anytime Upgrade: It is possible to use full versions of Windows Vista software to perform an upgrade as long as theupgrade path is supported, although this is more expensive than using Windows Anytime Upgrade.

    *Network projectors: Network projectors can be protected with a password,ensuring only approved users connect to it. If one can seeit but cannot connect, it is nec to enter the password.

    *Network projectors: it is not necessary to elevate privileges to connect to a network projector.

    *Windows Sideshow Gadgets can be shown on a computers auxiliary display.

    *Windows Sidebar Gadgets can only be shown on the sidebar or on the desktop.

    *Application Event log: Although the Reliability Monitor will inform you of the specific applications that have failed on aparticular day, you need to examine the Application event log to learn exactly what time the event occurred.

    *UNC path names use this syntax: \\computername\sharename\folder\filename. NOTE: Network shares do not have the same name asthe local folder that they are sharing.

    *I Do Not Think That This is a Phishing Website: This will report directly to Microsoft and they will verify your claim.

    *Administrators: Only members of the Administrators group are able to elevate privileges without providing credentials.

    *Power Users: the Power Users group is included in Windows Vista for backward-compatibility reasons.

    *Cryptographic Operators and Backup Operators groups can perform specific tasks, unless a user account is a member of the theAdministrator group, credentials are necessary to elevate privileges.

    *Windows XP Tablet PC upgrade while maintaining Tablet PC functionality? Vista Ultimate, Vista Enterprise and Vista Business.

    *Network Icons: Cannot access Internet: Only two computers, no yellow, no red

    *red x: no wire or no access point

    *yellow warning: havent received an IP address

    *WDDM: Windows Display Driver Model: One must exist for the monitor one plans to use or Aero isnt going to work.

    *Windows Aero compatible adapter: Assuming a WDDM exists, the next 2 important characteristics are these 2: 1. Amount of adaptermemory; & 2. Hardware Pixel Shader support (Hardware Acceleration).

    *Graphics adapter suggested memory: 64MB for low res & 128MB for high res or generally recommended settings.

    *Graphics adapter: Hardware Pixel Shader standard is version 2.0 or higher

    *Graphics: the adapter must also support 32-bit color.

    *Graphics: the speed at which the graphics memory runs is not important.

    *Graphics: both PCIe and AGP adapters are supported, as are DVI and VGA output.

    *Security zones: These zones allow you to manually add sites: 1. Restricted Sites zone (you can directly add); 2. Trusted Sites zone(you can directly add); & 3. Local Intranet zone (you can add to the Intranet zone by going through the Advanced Properties dialogbox.

    http://computername/sharename/folder/filenamehttp://computername/sharename/folder/filenamehttp://computername/sharename/folder/filenamehttp://computername/sharename/folder/filenamehttp://computername/sharename/folder/filename
  • 8/14/2019 CompTIA A+ IT Technician & 70-620 - Microsoft Vista Deployment & Configuration

    27/27

    *Security zones: Internet zone: only the Internet zone doesnt allow you to manually add sites to it.

    *RSS feeds: the default feed applies to all feeds that are not using a custom schedule.

    *Vista Screen corruption on older programs: lower color, 256 colors, and lower res, 640 by 480.

    *Automated backups: What types of media allow Vista to perform automated backups? Network share and USB external hard disk.

    *Adjust for Best Performance OfBackground Services: set this for a computer running Vista that is rarely used and is running a IIS Webserver interfacing with an SQL database. This sets processor scheduling that is what is really being adjusted.

    *Adjust for Best Performance of Programs: set this when the computer is primarily used to run applications, such as games orMicrosoft Office.

    *Windows Aero: Graphics Adapters: any graphics adapter will work as long as it meets the other required characteristics: PCI, PCIe orAGP.

    *Windows Aero: Graphics Adapters: what are the required characteristics? 1. Capable of running DirectX 9 or higher; 2. Have a WDDMdriver; 3. Have a Hardware Pixel Shader 2.0; 4. 32-bits per pixel capacity; & 5. An adequate amount of graphics memory this exactquantity depends on the resolution at which you want to run Aero. Running Aero at the lowest possible resolution requires 64MB ofgraphics adapter memory.

    *Sleep Mode: Password upon Awake: Configure the password requirement in Power Options

    *Screensaver: Password upon Awake: Personalization -> Screen Saver Settings -> check On resume, display logon screen. NOTE:The password upon awake is different from the password upon screen saver!

    *Internet Explorer protected mode: which zones have protected mode enabled by default? 1. Local intranet; 2. Internet; & 3.

    Restricted Sites.

    *Internet Explorer Protected mdoe: by default all zones except Trusted Sites zone have protected mode enabled.

    *Application Installation Failure: User Account Control: when an User Account Control is enabled, and an application fails to install, it islikely that Alter the settings of the User Account Control: Detect applications installatioonsa nd prompt for elevation policity is theproblem. This is generally the case for managed environments.

    *Software Installation: Only members of the Administrators group, either directly or indirectly can install applications in Vista.

    *Parental controls: what are the limitations: these aspects cannot be controlled: 1. DVD with inappropriate conduct; 2. Offensivemusic; & 3. Email with profanity.

    *Windows Mobile Device Center: Partnership: you can automatically browse a mobile devices memory without establishing apartnership, but doing so make