النتائج 1 إلى 9 من 9

الموضوع: 119 Tips For Passing Xp 70-270, XP Professional Study guide

  1. #1
    عضو برونزي الصورة الرمزية one-zero
    تاريخ التسجيل
    Jul 2007
    المشاركات
    8,296
    معدل تقييم المستوى
    59

    119 Tips For Passing Xp 70-270, XP Professional Study guide



    1. The minimum installation requirement for processors is a Pentium 233MHz or higher.
    2. Installation requires 1500MB free disk space on a 2000MB Partition.
    3. Dual-booting is supported for Windows 95, Windows 98, Windows NT 4.0 (Service
    Pack 4.0 or greater is required), Windows NT 3.51, Windows for Workgroups 3.11,
    Windows 3.1, MS-DOS, OS/2, Windows 2000 Server, Windows 2003 Server and other
    installations of Windows 2000 .
    4. Two executable setup files exist: Winnt.exe (for command-prompt and 16-bit
    environment) and Winnt32.exe (for 32-bit operating systems such 98,2000,…)
    5.Windows XP works with NTFS V 5, FAT, and FAT32 file systems. FAT is needed for
    MS-DOS, the Windows 3.x operating systems, and the first release of Windows 95.
    6. Unattended installations allow you to configure the operating system with little or no
    human intervention. There are three primary methods of unattended installations: RIS
    (Remote Installation Service) is a service that runs on a Windows 2003 Server. The
    System Preparation Tool (Sysprep.exe) is used to prepare an ideal Windows XP
    Professional workstation to have an image made of it. Setup Manager is used to create
    answer files (known as Uniqueness Database Files, or UDFs) for automatically providing
    computer or user information during
    7.When using an answer file on a diskette it must be named Winnt.sif, not Unattend.txt.
    8. Upgrades can be done from Windows 98, Windows NT Workstation 4.0, and
    Windows NT Workstation 3.51.
    9. Winnt32.exe initiates the upgrade from most other operating systems.
    10.You cannot upgrade if start setup by Boot From CD-ROM
    11. A service pack is a self-running program that modifies your operating system.
    Upgrades to Windows XP come in the form of service packs. Each service pack contains
    patches and fixes to operating systems components that need such, as well as additional
    features.
    12.The /duprepare switch prepares the downloaded update files to be used during an
    installation with the /dushare switch.
    13.We should use the "/SOS switch in the boot.ini startup file. This switch causes the
    names of drivers to be displayed as they load during boot.
    14.The /fastdetect switch is used by default. It makes the early boot process,
    NTDETECT, skip the detection of parallel and serial devices (Plug and Play will find
    them). This makes booting faster. You cannot configure the /fastdetect switch to log
    information on device drivers.
    15.To use RIS the computer must be configured to boot from the network.
    16.RIS does not need to run on a domain controller. A RIS server must be authorized in
    Active Directory before it is running.
    17. The CONVERT.EXE utility allows you to convert a FAT or FAT32 file system to
    NTFS without losing data.
    18.Windows XP includes an uninstall feature which allows us to uninstall Windows XP
    after upgrade and return to the previous operating system.
    19..The bootcfg command is a Microsoft Windows XP Recovery Console command that
    manipulates the Boot.ini file.
    20.Windows XP doesn’t have a driver for the SCSI-controller and so can’t find a hard
    disk to install onto. Therefore, you must install SCSI driver during setup.
    21.Each account has a different Security Identifier (SID). The permissions on the files are
    specific to the SID of the user account.
    22.The minimum recommended setting of the page file is 1.5 times the physical memory.
    23.The Fixboot command writes a new partition boot sector to the system partition.
    24.Using the system volume for the paging file will slow the performance.
    25.If the system is unable to start after installing a troublesome driver, the first step in
    troubleshooting is to start the computer with the Last Known Good Configuration.
    26.The fax service is not able to receive faxes by default.
    27.The scanstate and loadstate tools are part of the User State Migration Tool.
    These tools can be used to collect user data and settings from one machine and load them
    on to another machine.
    28.only one web site is supported on Windows XP/2000 Professional IIS.
    29.To create a striped volume, the disks must be converted to dynamic disks.
    30.The backup operators group has permission to access storage devices and to bypass
    file permissions to backup files.
    31. The permissions, attributes, and characteristics of files and folders depend greatly on
    the file system on which Windows XP is install.
    32. Share permissions apply only when a user is accessing a file or folder through the
    network.
    33. Local permissions and attributes are used to protect the file when users are local.
    34. The NTFS permissions for a folder are located on the Security tab of its Properties
    dialog box.
    35. With NTFS, permissions can be individually allowed or denied on a per-folder basis.
    You can assign any combination of these values: Full Control, Modify, Read & Execute,
    List Folder Contents, Read, and write
    36. The Advanced command button enables you to configure auditing and ownership
    properties.
    37. NTFS file permissions are: Full Control, Modify, Read+Execute, Read, and Write.
    38. The Deny permission overrides all other permissions. In the absence of Deny, rights
    accumulate through individual and group assignments, as well as through folder and file
    assignments. (In the case of a conflict, file permissions override folder permissions.)
    39. Moving or copying a file to a new directory could change the permissions on an
    NTFS file.
    40. Using the NTFS file system, it is possible to configure files and folders for file-level
    compression if you have Write permissions. Compression conserves disk space but does
    not reduce the estimation of how much space the user is utilizing when computing disk
    quotas.
    42. Encryption and compression settings appear in the same frame on the dialog box. The
    two features are mutually exclusive: You cannot compress encrypted files or encrypt
    compressed files.
    43. Share permissions differ significantly from NTFS permissions: 1) They apply to users
    accessing the resource remotely and not locally. 2) They work with Windows and DOSbased
    file systems (NTFS, FAT, or FAT32). 3) They work in conjunction with other
    permissions.
    44. Folder share permissions are: Full Control, Change, Read.
    45. A folder can be shared under an unlimited number of names after it has been shared
    the first time. This is used to set another permission for one resource.
    46. NET SHARE enables you to create shares from the command prompt.
    47. You can "hide" a share (prevent it from appearing in My Network Places) by adding a
    dollar sign ($) to the end of the share name.
    48. For every Windows XP computer, three hidden shares are created automatically: 1)
    C$ is the root of the computer's drive. A similar share (such as D$, E$, and so on) will be
    created for each hard drive partition on a system. 2) ADMIN$ is the root of the partition
    on which Windows 2000 has been installed. 3) IPC$ is the remote IPC (InterProcess
    Connect) share used for networking.
    49. To reach the Print Server Properties dialog box, open the Printers folder, and then
    choose File, Server Properties.
    50. For the Internet printer option, you must specify an URL within the Setup Wizard to
    go on to the next dialog box.
    51.Internet printing require IIS .
    52.By default, anyone with Allow-Print permission can manage their own print jobs.
    53.Unreadable text usually indicates an incorrect printer driver. We need to install the
    correct driver.
    54. Bi-directional support allows the printer to send unsolicited messages (such as "Out
    of Paper" or "Low on Toner") to the workstation. The Printer Priority defaults to 1, but it
    can be any number between 1 and 99
    55. When more than one printer is printing to the same printing device, it is useful to
    change priorities (to allow the one with the highest priority to print first).
    56. Separator Page lets you choose one of three predefined separator pages or create one
    of your own. By default, Windows XP does not separate print jobs or use a separator
    page.
    57. A printer pool is a single logical printer that prints to more than one printing device. It
    prints jobs sent to it to the first available printing device and provides the throughput of
    multiple printing devices with the simplicity of a single printer definition.
    58. The Computer Management utility offers a storage component that provides the basis
    for working with disk devices.
    59. The heart of most disk operations resides in the Disk Management tool. You must be
    a member of Administrators to access this tool.
    60. The System volume holds the files needed to boot the system (the boot files); the
    Boot volume holds the files needed by Windows 2000 Professional (the system files).
    61. Formatting the drive deletes all data on it. Converting the drive to NTFS (using the
    Convert.exe utility) does not delete the data.
    62. The disadvantages and limitations of converting to dynamic disks are: 1) Cannot
    contain partitions or logical drives; 2) Cannot be accessed by operating systems other
    than Windows XP; 3) Dynamic disks are not supported on portable computers.
    63. Windows XP Professional, like Windows 98, supports the use of more than one
    monitor for creating the output display. Up to 10 monitors can be combined, with the
    desktop display divided between them—each capable of having different resolution and
    color depth.
    64. Windows XP uses ACPI for all power management, from shutdown when low on
    battery to startup at the touch of a keyboard key. The options that can be configured from
    the Power Options applet in Control Panel are: Power Schemes (allows you to choose the
    role of the machine), Advanced (choose whether power-related icons should appear in the
    taskbar), Hibernate (choose whether this stage is available).
    65.Hibernation is an ACPI feature.
    66.. System Information is useful for obtaining a quick snapshot of the system. Beneath
    Hardware Resources are six subcomponents that offer the system resource overview:
    Conflicts/Sharing, DMA, Forced Hardware, I/O, IRQs, and Memory.
    67. If Microsoft can verify that executable files do not behave erratically or cause system
    problems or identifiable failures, Microsoft signs the file digitally.
    68. When an administrator or user attempts to install a new component, the system
    automatically looks for the signature. By default, a system always looks for a driver
    signature; this feature is known as System File Protection.
    69. SIGVERIF.EXE looks for files that are not digitally signed.
    70. The System File Checker utility keeps the operating system alive and well. SFC.EXE
    automatically verifies system files after a reboot to see whether they were changed to
    unprotected copies. Storing system files in two locations consumes a large amount of disk
    space.
    71. Task Scheduler allows you to configure jobs to run automatically. For a job to run in
    unattended mode, a username and associated password with proper permissions to run the
    application must be provided.
    72. When you select the Make Available Offline choice, the Offline File Wizard starts.
    You can have reminders pop up regularly when you are working offline to tell you that
    you are not connected to the network.
    73.Enabling offline files is a two step process. First, it must be enabled on the shared files
    by allowing the caching of the files.
    74. The Synchronization Manager offers three tabs: Logon/Logoff (allows you to
    configure whether synchronization should occur when you log on and/or log off or
    whether you should always be prompted before you take any action), On Idle (allows you
    to configure the items to be updated when the system is idle), and Scheduled (allows you
    to define synchronization jobs).
    75.A baseline is a history of performance over time and is used to compare against
    current activity.
    76. Within the System Monitor, the workstation is divided into a number of different
    objects. The following objects are normally found in System Monitor: Browser, Cache,
    IP, LogicalDisk, Memory, Network Interface, Objects, Paging File, PhysicalDisk,
    Process, Processor, Redirector, Server, Server Work Queues, System, TCP, Telephony,
    Thread, and UDP.
    77. For each object, System Monitor has one or more counters (subsets of the overall
    object). There are two types of counters: actual (a true number or an average) and
    percentage (from 0 to 100).
    78. Performance Logs and Alerts fall into three sections: Counter logs, trace logs, alerts.
    79. The five common areas of bottlenecks include: memory, processor, disk, network,
    and applications.
    80. If the amount of RAM you want to allot to the OS is less than what is installed in
    your system, you must use the /MAXMEM switch in the BOOT.INI file.
    81.DiskPart is a Windows XP Professional tool which allows the administrator to handle
    disk administrative tasks from a command prompt. Diskpart enhances the Disk
    Administrator graphical user interface (GUI).
    82. Most desktop computers should have only one hardware profile because the hardware
    will not deviate greatly. The hardware connected to a laptop/mobile computer can differ
    from day to day, based on where it is being used.
    83. If a system has multiple hardware profiles, a menu of the choices will appear during
    the boot process.
    84. The User Profile is the portion of the Registry that is customizable for every user and
    is stored in NTUSER.DAT. Whenever a user logs in to a system, he or she automatically
    creates a local profile on that system, by default.
    85. The profile will be found in {root drive}:\Documents and Settings\{username}.
    Profiles can contain the following desktop-related items: Application information,
    ****ies, Favorites, Files saved on the desktop, Local settings, My documents, My
    pictures, Nethood, Printhood, Recent, Send to, Shortcuts, Start Menu, and Template
    items.
    86. To configure a user account to use a roaming profile, set the profile path in the
    Properties dialog box for that account. A roaming profile enables a user to have the same
    desktop regardless of the machine he or she uses. You can copy or delete profiles and
    change their type from the System applet.
    87. A mandatory profile is a deviation on a roaming profile. It's configured like a
    roaming profile, but the file is renamed from NTUSER.DAT to NTUSER.MAN.
    88. Multiple Language Support allows you to create documents that can be read in
    different languages and to change the information text presented in Windows XP Pro. To
    enable multiple languages, you must be a member of the Administrators group; open the
    Regional Options applet in Control Panel.
    89. Windows Installer is divided into two components: an installer service for the client
    (MSIEXEC.EXE) and package files (which have the extension .MSI). .MSI files are the
    applications themselves and most often come from software vendors, but can be created
    internally by developers.
    90.Always wait for the network at computer startup and logon policy. This would force
    the Windows XP clients to process the GPOs synchronously which guarantee that they
    are all applied.
    91. MSI files contain relational databases (multiple tables) of instructions that need to be
    carried out. Windows Installer is a component of IntelliMirror and is tightly integrated
    with Group Policy. IntelliMirror also includes the ability to administer user settings,
    perform remote installation, and mirror data between the network and local machines.
    92. The Accessibility Options applet allows you to configure the system for use by
    individuals with physical disabilities. Configuration can be done in areas related to the
    keyboard, mouse, display, or sound. Accessibility features automatically turn off after a
    set time. (Five minutes is the default.)
    93. Name resolution is the process of translating user-friendly computer names to IP
    addresses. On a very small network, a static file named HOSTS can be used to translate
    host names to IP addresses in place of DNS.
    94.The /flushdns switch of the Ipconfig command flushes the list of locally cached DNS
    names.
    95. On a very small network, a static file named LMHOSTS can be used to translate
    NetBIOS names to IP addresses in place of WINS. The Import LMHOSTS button allows
    WINS to convert your static file to the WINS service.
    96. DHCP automatically centralizes and manages the allocation of the TCP/IP settings
    required for proper network functionality for computers that have been configured as
    DHCP clients.
    97.The ping command sends a series of ICMP echo requests to the specified computer.
    98.The Alternative configuration feature enables mobile computers to have two different
    IP configurations, for example one at the office and one at home.
    99. To determine the network settings a DHCP server has leased to your computer, type
    IPCONFIG /all at a command prompt.
    100. Windows XP offers new parameters for IPCONFIG: /DISPLAYDNS (shows the
    contents of the DNS cache), /FLUSHDNS (flushes the contents of the DNS cache),
    /REGISTERDNS (renews all leases and DNS configuration), /SETCLASSID (changes
    the DHCP class ID), and /SHOWCLASSID (shows the DHCP class ID for all adapters).
    101. If systems are on different subnets and cannot communicate, remember that TCP/IP
    requires routing to communicate between subnets.
    102. NBTSTAT is a command-line utility that enables you to check the resolution of
    NetBIOS names to TCP/IP addresses. NETSTAT is a command-line utility that enables
    you to check the status of current IP connections. Executing NETSTAT without switches
    displays protocol statistics and current TCP/IP connections.
    103. The Universal Naming Convention (UNC) is a standardized way of specifying a
    share name on a specific computer. Share names can refer to folders or printers. The
    UNC path takes the form of \\computer_name\share_name. Share names commonly are
    limited to 15 characters.
    104. Many 16-bit applications do not work with UNC paths. If you need to work with a
    16-bit application that doesn't work with UNC paths, you must map a drive letter to the
    shared folder or connect a port to the network printer.
    105. You can view the currently shared resources from the command prompt by typing
    NET VIEW. You can assign network resources to drive letters from the command prompt
    by using the Net Use command and the UNC path of the resource.
    106. The following authentication protocols are supported to make your connections as
    secure as possible: CHAP, EAP, MS-CHAP, MS-CHAPv2, PAP, SPAP, and smart cards.
    107. CHAP is the Challenge Handshake Authentication Protocol, while MS-CHAP is the
    Microsoft Challenge Handshake Authentication Protocol (requires the communication to
    be between a Microsoft client and a Microsoft server). MS-CHAPv2 also requires the
    communication to be between a Microsoft client and a Microsoft server.
    108. EAP is the Extensible Authentication Protocol; PAP is the Password Authentication
    Protocol (uses clear-text authentication).
    109. Smart cards provide a certificate-based authentication.
    110. The Encrypting File System (EFS) encrypts and protects file or folder contents. To
    use EFS, the file system must be NTFS, and the files must not be compressed. Some files
    (system files in particular) cannot be compressed. If you move/copy an encrypted file to
    one of these partitions, it becomes unencrypted.
    111. Settings that are configured under Computer Configuration apply to the computer,
    regardless of who is using it. Settings configured under User Configuration apply only if
    the specified user is logged on.
    112. In Windows XP, a user can be granted rights and permissions to resources in two
    ways: Individually (she is explicitly assigned a right or permission through her account),
    or as a group (she is a member of a group that has a right or permission).
    113. The Profile Path designates a specific location on a specified server where the user's
    profile is going to be stored. The user profile contains the user portion of the Registry in
    the file NTUSER.DAT.
    114. The most common path entered for the user profile is
    \\{SERVER}\{PROFILESHARE}\%USERNAME%, where {SERVER} is replaced by
    the name of your server, and {PROFILESHARE} by the name of a folder for that user's
    profile. The %USERNAME% variable will expand to the name of the user, which makes
    it ideal for use in a template.
    115. The logon script allows an administrator to configure common drive mappings, run
    central batch files, and configure the system.
    116. Account policies are divided into two subsections: Password Policy and Account
    Lockout Policy.
    117. Password Policy settings apply to all users on the system. It is not possible to have
    separate settings by group, user, and so on. Account Lockout Policies are settings that can
    be used to automatically lock the account should suspicious activity occur.
    118. Auditing can be configured on nine pre-defined system events through the Local
    Security Policy shortcut within the Administrative Tools folder of the Control Panel:
    Audit Account Logon Events, Audit Account Management, Audit Directory Service
    Access, Audit Logon Events, Audit Object Access, Audit Policy Change, Audit Privilege
    Use, Audit Process Tracking, and Audit System Events.
    119. When auditing is configured, entries are written to the Security log, which can be
    viewed with the Event Viewer.

  2. #2
    عضو برونزي الصورة الرمزية sharif_soper
    تاريخ التسجيل
    Dec 2006
    المشاركات
    2,780
    معدل تقييم المستوى
    14

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide

    السلام عليكم جزاك الف شكر مستر ياسر رمزي جزاك الله خيرا:frnd":frnd":frnd"

  3. #3
    عضو الصورة الرمزية habibko
    تاريخ التسجيل
    Sep 2007
    المشاركات
    509
    الدولة: Saudi Arabia
    معدل تقييم المستوى
    0

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide

    جزاك الله كل خير يا استاذ ياسر.

  4. #4
    عضو الصورة الرمزية Marc_kamel
    تاريخ التسجيل
    Apr 2007
    المشاركات
    290
    الدولة: Egypt
    معدل تقييم المستوى
    0

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide

    thanks
    Marc Kamel
    MCT, CCNP, Cvoice, MCITP:

  5. #5
    عضو
    تاريخ التسجيل
    Feb 2006
    المشاركات
    14
    الدولة: Saudi Arabia
    معدل تقييم المستوى
    0

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide

    هل هذا مختصر للماده

  6. #6
    عضوية جديدة
    تاريخ التسجيل
    May 2008
    المشاركات
    5
    معدل تقييم المستوى
    0

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide

    thank you

  7. #7
    عضو برونزي
    تاريخ التسجيل
    Oct 2006
    المشاركات
    4,303
    الدولة: United Arab Emirates
    معدل تقييم المستوى
    0

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide

    تسلم يا اخ ويبووووووووووو

  8. #8
    عضو الصورة الرمزية mohamedabduon
    تاريخ التسجيل
    Dec 2004
    المشاركات
    869
    الدولة: Saudi Arabia
    معدل تقييم المستوى
    0

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide

    السلام عليكم

    أولا بخصوص برنامج ال virtual pc انا شفت اخونا احمد جودة بالفيديو بيشيل ملف من على الويندوز الحقيقى بيدخله على الويندوز الوهمى بالماوس بسرعة كيف هو عمل الحركة دى ,,,, ده اولا ....... اصل انا عملت دومين على الاجهزة الوهمية ومش عارف اخش على الجهاز الحقيقى علشان اعمل مشاركة لاى ملف

    وكمان سؤال تانى هل يوجد شرح بالعربى لبقية امتحانات ال mcse

    وياريت الرد بارك الله فيك


    اصل انا بعت لك عالخاص فوجد ان صندوق الرسائل عندك مليان

  9. #9
    عضو برونزي الصورة الرمزية one-zero
    تاريخ التسجيل
    Jul 2007
    المشاركات
    8,296
    معدل تقييم المستوى
    59

    رد: 119 Tips For Passing Xp 70-270, XP Professional Study guide



    عزيزي جرب الخاص الان

المواضيع المتشابهه

  1. بخصوص كتاب VMware Certified Professional on VSphere 5 Study Guide
    بواسطة alfeel2000 في المنتدى الأرشيف
    مشاركات: 0
    آخر مشاركة: 25-12-2011, 12:59
  2. LPIC-1 Linux Professional Institute Certification Study Guide
    بواسطة one-zero في المنتدى الأرشيف
    مشاركات: 1
    آخر مشاركة: 03-03-2010, 20:48
  3. CCNP BSCI Portable Command Guide (Self-Study Guide)
    بواسطة المجاهد المصرى في المنتدى الأرشيف
    مشاركات: 14
    آخر مشاركة: 04-01-2008, 05:38
  4. Thanks god Finally ccnp-bsci-portable-command-guide-self-study official Guide
    بواسطة dayday في المنتدى الأرشيف
    مشاركات: 9
    آخر مشاركة: 12-07-2007, 15:13
  5. A+ STUDY GUIDE
    بواسطة heba eid في المنتدى الأرشيف
    مشاركات: 53
    آخر مشاركة: 26-04-2006, 21:32

الكلمات الدلالية لهذا الموضوع

المفضلات

ضوابط المشاركة

  • لا تستطيع إضافة مواضيع جديدة
  • لا تستطيع الرد على المواضيع
  • لا تستطيع إرفاق ملفات
  • لا تستطيع تعديل مشاركاتك
  •