1. The minimum installation requirement for processors is a Pentium 233MHz or higher.
2. Installation requires 1500MB free disk space on a 2000MB Partition.
3. Dual-booting is supported for Windows 95, Windows 98, Windows NT 4.0 (Service
Pack 4.0 or greater is required), Windows NT 3.51, Windows for Workgroups 3.11,
Windows 3.1, MS-DOS, OS/2, Windows 2000 Server, Windows 2003 Server and other
installations of Windows 2000 .
4. Two executable setup files exist: Winnt.exe (for command-prompt and 16-bit
environment) and Winnt32.exe (for 32-bit operating systems such 98,2000,…)
5.Windows XP works with NTFS V 5, FAT, and FAT32 file systems. FAT is needed for
MS-DOS, the Windows 3.x operating systems, and the first release of Windows 95.
6. Unattended installations allow you to configure the operating system with little or no
human intervention. There are three primary methods of unattended installations: RIS
(Remote Installation Service) is a service that runs on a Windows 2003 Server. The
System Preparation Tool (Sysprep.exe) is used to prepare an ideal Windows XP
Professional workstation to have an image made of it. Setup Manager is used to create
answer files (known as Uniqueness Database Files, or UDFs) for automatically providing
computer or user information during
7.When using an answer file on a diskette it must be named Winnt.sif, not Unattend.txt.
8. Upgrades can be done from Windows 98, Windows NT Workstation 4.0, and
Windows NT Workstation 3.51.
9. Winnt32.exe initiates the upgrade from most other operating systems.
10.You cannot upgrade if start setup by Boot From CD-ROM
11. A service pack is a self-running program that modifies your operating system.
Upgrades to Windows XP come in the form of service packs. Each service pack contains
patches and fixes to operating systems components that need such, as well as additional
features.
12.The /duprepare switch prepares the downloaded update files to be used during an
installation with the /dushare switch.
13.We should use the "/SOS switch in the boot.ini startup file. This switch causes the
names of drivers to be displayed as they load during boot.
14.The /fastdetect switch is used by default. It makes the early boot process,
NTDETECT, skip the detection of parallel and serial devices (Plug and Play will find
them). This makes booting faster. You cannot configure the /fastdetect switch to log
information on device drivers.
15.To use RIS the computer must be configured to boot from the network.
16.RIS does not need to run on a domain controller. A RIS server must be authorized in
Active Directory before it is running.
17. The CONVERT.EXE utility allows you to convert a FAT or FAT32 file system to
NTFS without losing data.
18.Windows XP includes an uninstall feature which allows us to uninstall Windows XP
after upgrade and return to the previous operating system.
19..The bootcfg command is a Microsoft Windows XP Recovery Console command that
manipulates the Boot.ini file.
20.Windows XP doesn’t have a driver for the SCSI-controller and so can’t find a hard
disk to install onto. Therefore, you must install SCSI driver during setup.
21.Each account has a different Security Identifier (SID). The permissions on the files are
specific to the SID of the user account.
22.The minimum recommended setting of the page file is 1.5 times the physical memory.
23.The Fixboot command writes a new partition boot sector to the system partition.
24.Using the system volume for the paging file will slow the performance.
25.If the system is unable to start after installing a troublesome driver, the first step in
troubleshooting is to start the computer with the Last Known Good Configuration.
26.The fax service is not able to receive faxes by default.
27.The scanstate and loadstate tools are part of the User State Migration Tool.
These tools can be used to collect user data and settings from one machine and load them
on to another machine.
28.only one web site is supported on Windows XP/2000 Professional IIS.
29.To create a striped volume, the disks must be converted to dynamic disks.
30.The backup operators group has permission to access storage devices and to bypass
file permissions to backup files.
31. The permissions, attributes, and characteristics of files and folders depend greatly on
the file system on which Windows XP is install.
32. Share permissions apply only when a user is accessing a file or folder through the
network.
33. Local permissions and attributes are used to protect the file when users are local.
34. The NTFS permissions for a folder are located on the Security tab of its Properties
dialog box.
35. With NTFS, permissions can be individually allowed or denied on a per-folder basis.
You can assign any combination of these values: Full Control, Modify, Read & Execute,
List Folder Contents, Read, and write
36. The Advanced command button enables you to configure auditing and ownership
properties.
37. NTFS file permissions are: Full Control, Modify, Read+Execute, Read, and Write.
38. The Deny permission overrides all other permissions. In the absence of Deny, rights
accumulate through individual and group assignments, as well as through folder and file
assignments. (In the case of a conflict, file permissions override folder permissions.)
39. Moving or copying a file to a new directory could change the permissions on an
NTFS file.
40. Using the NTFS file system, it is possible to configure files and folders for file-level
compression if you have Write permissions. Compression conserves disk space but does
not reduce the estimation of how much space the user is utilizing when computing disk
quotas.
42. Encryption and compression settings appear in the same frame on the dialog box. The
two features are mutually exclusive: You cannot compress encrypted files or encrypt
compressed files.
43. Share permissions differ significantly from NTFS permissions: 1) They apply to users
accessing the resource remotely and not locally. 2) They work with Windows and DOSbased
file systems (NTFS, FAT, or FAT32). 3) They work in conjunction with other
permissions.
44. Folder share permissions are: Full Control, Change, Read.
45. A folder can be shared under an unlimited number of names after it has been shared
the first time. This is used to set another permission for one resource.
46. NET SHARE enables you to create shares from the command prompt.
47. You can "hide" a share (prevent it from appearing in My Network Places) by adding a
dollar sign ($) to the end of the share name.
48. For every Windows XP computer, three hidden shares are created automatically: 1)
C$ is the root of the computer's drive. A similar share (such as D$, E$, and so on) will be
created for each hard drive partition on a system. 2) ADMIN$ is the root of the partition
on which Windows 2000 has been installed. 3) IPC$ is the remote IPC (InterProcess
Connect) share used for networking.
49. To reach the Print Server Properties dialog box, open the Printers folder, and then
choose File, Server Properties.
50. For the Internet printer option, you must specify an URL within the Setup Wizard to
go on to the next dialog box.
51.Internet printing require IIS .
52.By default, anyone with Allow-Print permission can manage their own print jobs.
53.Unreadable text usually indicates an incorrect printer driver. We need to install the
correct driver.
54. Bi-directional support allows the printer to send unsolicited messages (such as "Out
of Paper" or "Low on Toner") to the workstation. The Printer Priority defaults to 1, but it
can be any number between 1 and 99
55. When more than one printer is printing to the same printing device, it is useful to
change priorities (to allow the one with the highest priority to print first).
56. Separator Page lets you choose one of three predefined separator pages or create one
of your own. By default, Windows XP does not separate print jobs or use a separator
page.
57. A printer pool is a single logical printer that prints to more than one printing device. It
prints jobs sent to it to the first available printing device and provides the throughput of
multiple printing devices with the simplicity of a single printer definition.
58. The Computer Management utility offers a storage component that provides the basis
for working with disk devices.
59. The heart of most disk operations resides in the Disk Management tool. You must be
a member of Administrators to access this tool.
60. The System volume holds the files needed to boot the system (the boot files); the
Boot volume holds the files needed by Windows 2000 Professional (the system files).
61. Formatting the drive deletes all data on it. Converting the drive to NTFS (using the
Convert.exe utility) does not delete the data.
62. The disadvantages and limitations of converting to dynamic disks are: 1) Cannot
contain partitions or logical drives; 2) Cannot be accessed by operating systems other
than Windows XP; 3) Dynamic disks are not supported on portable computers.
63. Windows XP Professional, like Windows 98, supports the use of more than one
monitor for creating the output display. Up to 10 monitors can be combined, with the
desktop display divided between them—each capable of having different resolution and
color depth.
64. Windows XP uses ACPI for all power management, from shutdown when low on
battery to startup at the touch of a keyboard key. The options that can be configured from
the Power Options applet in Control Panel are: Power Schemes (allows you to choose the
role of the machine), Advanced (choose whether power-related icons should appear in the
taskbar), Hibernate (choose whether this stage is available).
65.Hibernation is an ACPI feature.
66.. System Information is useful for obtaining a quick snapshot of the system. Beneath
Hardware Resources are six subcomponents that offer the system resource overview:
Conflicts/Sharing, DMA, Forced Hardware, I/O, IRQs, and Memory.
67. If Microsoft can verify that executable files do not behave erratically or cause system
problems or identifiable failures, Microsoft signs the file digitally.
68. When an administrator or user attempts to install a new component, the system
automatically looks for the signature. By default, a system always looks for a driver
signature; this feature is known as System File Protection.
69. SIGVERIF.EXE looks for files that are not digitally signed.
70. The System File Checker utility keeps the operating system alive and well. SFC.EXE
automatically verifies system files after a reboot to see whether they were changed to
unprotected copies. Storing system files in two locations consumes a large amount of disk
space.
71. Task Scheduler allows you to configure jobs to run automatically. For a job to run in
unattended mode, a username and associated password with proper permissions to run the
application must be provided.
72. When you select the Make Available Offline choice, the Offline File Wizard starts.
You can have reminders pop up regularly when you are working offline to tell you that
you are not connected to the network.
73.Enabling offline files is a two step process. First, it must be enabled on the shared files
by allowing the caching of the files.
74. The Synchronization Manager offers three tabs: Logon/Logoff (allows you to
configure whether synchronization should occur when you log on and/or log off or
whether you should always be prompted before you take any action), On Idle (allows you
to configure the items to be updated when the system is idle), and Scheduled (allows you
to define synchronization jobs).
75.A baseline is a history of performance over time and is used to compare against
current activity.
76. Within the System Monitor, the workstation is divided into a number of different
objects. The following objects are normally found in System Monitor: Browser, Cache,
IP, LogicalDisk, Memory, Network Interface, Objects, Paging File, PhysicalDisk,
Process, Processor, Redirector, Server, Server Work Queues, System, TCP, Telephony,
Thread, and UDP.
77. For each object, System Monitor has one or more counters (subsets of the overall
object). There are two types of counters: actual (a true number or an average) and
percentage (from 0 to 100).
78. Performance Logs and Alerts fall into three sections: Counter logs, trace logs, alerts.
79. The five common areas of bottlenecks include: memory, processor, disk, network,
and applications.
80. If the amount of RAM you want to allot to the OS is less than what is installed in
your system, you must use the /MAXMEM switch in the BOOT.INI file.
81.DiskPart is a Windows XP Professional tool which allows the administrator to handle
disk administrative tasks from a command prompt. Diskpart enhances the Disk
Administrator graphical user interface (GUI).
82. Most desktop computers should have only one hardware profile because the hardware
will not deviate greatly. The hardware connected to a laptop/mobile computer can differ
from day to day, based on where it is being used.
83. If a system has multiple hardware profiles, a menu of the choices will appear during
the boot process.
84. The User Profile is the portion of the Registry that is customizable for every user and
is stored in NTUSER.DAT. Whenever a user logs in to a system, he or she automatically
creates a local profile on that system, by default.
85. The profile will be found in {root drive}:\Documents and Settings\{username}.
Profiles can contain the following desktop-related items: Application information,
****ies, Favorites, Files saved on the desktop, Local settings, My documents, My
pictures, Nethood, Printhood, Recent, Send to, Shortcuts, Start Menu, and Template
items.
86. To configure a user account to use a roaming profile, set the profile path in the
Properties dialog box for that account. A roaming profile enables a user to have the same
desktop regardless of the machine he or she uses. You can copy or delete profiles and
change their type from the System applet.
87. A mandatory profile is a deviation on a roaming profile. It's configured like a
roaming profile, but the file is renamed from NTUSER.DAT to NTUSER.MAN.
88. Multiple Language Support allows you to create documents that can be read in
different languages and to change the information text presented in Windows XP Pro. To
enable multiple languages, you must be a member of the Administrators group; open the
Regional Options applet in Control Panel.
89. Windows Installer is divided into two components: an installer service for the client
(MSIEXEC.EXE) and package files (which have the extension .MSI). .MSI files are the
applications themselves and most often come from software vendors, but can be created
internally by developers.
90.Always wait for the network at computer startup and logon policy. This would force
the Windows XP clients to process the GPOs synchronously which guarantee that they
are all applied.
91. MSI files contain relational databases (multiple tables) of instructions that need to be
carried out. Windows Installer is a component of IntelliMirror and is tightly integrated
with Group Policy. IntelliMirror also includes the ability to administer user settings,
perform remote installation, and mirror data between the network and local machines.
92. The Accessibility Options applet allows you to configure the system for use by
individuals with physical disabilities. Configuration can be done in areas related to the
keyboard, mouse, display, or sound. Accessibility features automatically turn off after a
set time. (Five minutes is the default.)
93. Name resolution is the process of translating user-friendly computer names to IP
addresses. On a very small network, a static file named HOSTS can be used to translate
host names to IP addresses in place of DNS.
94.The /flushdns switch of the Ipconfig command flushes the list of locally cached DNS
names.
95. On a very small network, a static file named LMHOSTS can be used to translate
NetBIOS names to IP addresses in place of WINS. The Import LMHOSTS button allows
WINS to convert your static file to the WINS service.
96. DHCP automatically centralizes and manages the allocation of the TCP/IP settings
required for proper network functionality for computers that have been configured as
DHCP clients.
97.The ping command sends a series of ICMP echo requests to the specified computer.
98.The Alternative configuration feature enables mobile computers to have two different
IP configurations, for example one at the office and one at home.
99. To determine the network settings a DHCP server has leased to your computer, type
IPCONFIG /all at a command prompt.
100. Windows XP offers new parameters for IPCONFIG: /DISPLAYDNS (shows the
contents of the DNS cache), /FLUSHDNS (flushes the contents of the DNS cache),
/REGISTERDNS (renews all leases and DNS configuration), /SETCLASSID (changes
the DHCP class ID), and /SHOWCLASSID (shows the DHCP class ID for all adapters).
101. If systems are on different subnets and cannot communicate, remember that TCP/IP
requires routing to communicate between subnets.
102. NBTSTAT is a command-line utility that enables you to check the resolution of
NetBIOS names to TCP/IP addresses. NETSTAT is a command-line utility that enables
you to check the status of current IP connections. Executing NETSTAT without switches
displays protocol statistics and current TCP/IP connections.
103. The Universal Naming Convention (UNC) is a standardized way of specifying a
share name on a specific computer. Share names can refer to folders or printers. The
UNC path takes the form of \\computer_name\share_name. Share names commonly are
limited to 15 characters.
104. Many 16-bit applications do not work with UNC paths. If you need to work with a
16-bit application that doesn't work with UNC paths, you must map a drive letter to the
shared folder or connect a port to the network printer.
105. You can view the currently shared resources from the command prompt by typing
NET VIEW. You can assign network resources to drive letters from the command prompt
by using the Net Use command and the UNC path of the resource.
106. The following authentication protocols are supported to make your connections as
secure as possible: CHAP, EAP, MS-CHAP, MS-CHAPv2, PAP, SPAP, and smart cards.
107. CHAP is the Challenge Handshake Authentication Protocol, while MS-CHAP is the
Microsoft Challenge Handshake Authentication Protocol (requires the communication to
be between a Microsoft client and a Microsoft server). MS-CHAPv2 also requires the
communication to be between a Microsoft client and a Microsoft server.
108. EAP is the Extensible Authentication Protocol; PAP is the Password Authentication
Protocol (uses clear-text authentication).
109. Smart cards provide a certificate-based authentication.
110. The Encrypting File System (EFS) encrypts and protects file or folder contents. To
use EFS, the file system must be NTFS, and the files must not be compressed. Some files
(system files in particular) cannot be compressed. If you move/copy an encrypted file to
one of these partitions, it becomes unencrypted.
111. Settings that are configured under Computer Configuration apply to the computer,
regardless of who is using it. Settings configured under User Configuration apply only if
the specified user is logged on.
112. In Windows XP, a user can be granted rights and permissions to resources in two
ways: Individually (she is explicitly assigned a right or permission through her account),
or as a group (she is a member of a group that has a right or permission).
113. The Profile Path designates a specific location on a specified server where the user's
profile is going to be stored. The user profile contains the user portion of the Registry in
the file NTUSER.DAT.
114. The most common path entered for the user profile is
\\{SERVER}\{PROFILESHARE}\%USERNAME%, where {SERVER} is replaced by
the name of your server, and {PROFILESHARE} by the name of a folder for that user's
profile. The %USERNAME% variable will expand to the name of the user, which makes
it ideal for use in a template.
115. The logon script allows an administrator to configure common drive mappings, run
central batch files, and configure the system.
116. Account policies are divided into two subsections: Password Policy and Account
Lockout Policy.
117. Password Policy settings apply to all users on the system. It is not possible to have
separate settings by group, user, and so on. Account Lockout Policies are settings that can
be used to automatically lock the account should suspicious activity occur.
118. Auditing can be configured on nine pre-defined system events through the Local
Security Policy shortcut within the Administrative Tools folder of the Control Panel:
Audit Account Logon Events, Audit Account Management, Audit Directory Service
Access, Audit Logon Events, Audit Object Access, Audit Policy Change, Audit Privilege
Use, Audit Process Tracking, and Audit System Events.
119. When auditing is configured, entries are written to the Security log, which can be
viewed with the Event Viewer.