S


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

Safe Mode
    computers
         starting 2nd 3rd 4th
     limitations
     when to launch 2nd 3rd
Safe Mode option
     advanced startups 2nd
scalability
     multiprocessor computers
scanners
     configuring (Device Manager) 2nd 3rd
     installing (Device Manager) 2nd
     Windows Image Acquisition (WIA) interface
Scanners and Cameras Utility (Control Panel) 2nd 3rd
Scheduled Tasks applet (Control Panel) 2nd
Scheduled Tasks application
     configuring 2nd 3rd
    launch problems
         troubleshooting 2nd
     launching 2nd
     Properties dialog box 2nd
Scheduled Tasks Properties dialog box
     tab options 2nd
scheduling
     printer availability
SCSI controllers (Small Computer System Interface)
     CD/DVD drives 2nd
SCSI ports (RS-232)
     multimedia device connections
Secedit.utility
     as security tool 2nd
secondary monitors
     adding to computers (Dualview) 2nd 3rd 4th
     configuring for multiple display setup
security
    access rights
         configuring 2nd 3rd
     account lockout policies 2nd
     Account Lockout policy
    Administrator account
         renaming
     Administrator rights 2nd
    Audit policy
         setting 2nd 3rd 4th 5th 6th 7th
     cached credentials
    configuration options
         account policies 2nd 3rd 4th 5th
         IP Security policies 2nd
         local policies 2nd 3rd 4th 5th 6th
         public key policies
         software restriction policies 2nd 3rd
    EFS
         administrator use guidelines 2nd
         certificate storage 2nd
         certificates, exporting 2nd
         certification authority (CA)
         certification authority (CA), certificate requests 2nd
         file decryption methods 2nd
         file encryption methods 2nd 3rd 4th
         policies, setting 2nd
         practical implementation of 2nd 3rd
         recovery agents
         self-signed certificates, generating 2nd
         supported file systems 2nd
         troubleshooting issues 2nd 3rd
         troubleshooting via cipher command switches 2nd 3rd
     Encrypting File System (EFS)
     exam questions 2nd 3rd 4th 5th 6th 7th 8th 9th
         answers 2nd 3rd 4th
    exercises
         Configuring a Local Group Policy (13.1) 2nd 3rd
         Establishing a Password Policy (12.1) 2nd
    file systems
         configuring 2nd 3rd
    firewalls
         Windows Firewall
     Full Control rights 2nd
    Guest account
         disabling
     hidden administrative shares 2nd
    Internet Explorer
         advanced options
         configuring 2nd 3rd 4th 5th 6th
         system information
         updates
     Internet zones
     Limited rights 2nd
    local security policies
         effect of GPOs (Group Policy Objects) 2nd
         management of 2nd
     lock-down practices 2nd 3rd 4th
     management of 2nd 3rd 4th 5th
    passwords
         never expire option
         policies 2nd
    permissions
         consistent manmagement scheme
    pop-up ads
         blocking 2nd
    remote access
         configuring 2nd 3rd
    resources
         websites
     review questions
         answers 2nd
    Simple File Sharing
         disabling
    smart cards
         logon requirements
     SP2 improvements
     SP2 tools
         buffer overrun protection
         malware protection
         Security Center
         Windows Firewall
    templates
         creating (Security Configuration and Analysis tool) 2nd 3rd
    tools
         Computer Management
         Group Policy Editor
         Local Security Policy
         Secedit.exe utility 2nd
         security templates
     troubleshooting 2nd 3rd 4th 5th
    Windows Firewall
         configuring after SP2 installation 2nd
         function of
     Windows Product Activation (WPA) 2nd 3rd
         confirmation codes
         ID generation
         information submission 2nd
Security Center
Security Configuration and Analysis tool
    file systems
         security settings 2nd 3rd
security levels node
     software restriction policies
security templates
     as security tool
select-and-place questions 2nd 3rd
self-signed certificates (EFS)
     generating 2nd
Serial Line Internet Protocol, [See SLIP]
serial ports (RS-232)
     multimedia device connections
server computers
    Offline File feature
         configuring 2nd
servers
     networking requirements 2nd
    required RIS components
         Active Directory
         DHCP
         DNS
         separate disk partitions
    RIS
         Admin\#092i386 subfolder 2nd
         OSChooser subfolder 2nd
Service Pack 2, [See SP2]
service packs, [See SPs]
services
    networks
         management of 2nd 3rd 4th 5th 6th
settings (user profiles)
     transferring between computers (Files and Settings Transfer Wizard) 2nd 3rd 4th 5th 6th
Setup Manager
     administrator password bug
     installing (exercise 2.1) 2nd 3rd
     running (exercise 2.2) 2nd 3rd
     running from Windows 2000 Server
     running from Windows Server 2003
     unattended installations
         answer files, creatinng 2nd
         deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
share permissions
     Change 2nd
     conflicts with NTFS permissions 2nd
     establishing 2nd
     exam questions 2nd 3rd 4th 5th 6th 7th 8th
     Full Control 2nd
     Read 2nd
shared connections
    Internet
         configuring ICS) 2nd 3rd 4th 5th
shared folders
     creating 2nd
         with net share command
    exercises
         Installing IIS (5.1) 2nd
     hidden
         ADMIN$ share
         C$ share
         creating
         FAX$ share
         IPC$ share
         Print$ share
    hidden administrative shares ($
         )
     management overview
     maximum number of connections
    network drives
         mapping 2nd
    offline files
         caching 2nd 3rd
         providing 2nd 3rd
     removing
         from Computer Management console
     sharing over web (IIS) 2nd 3rd 4th 5th
shared resources
     connecting to 2nd
    share permissions
         establishing 2nd
sharing
     encrypted files 2nd
    files
         ForceGuest behaviors 2nd
         implementation of 2nd
     local printers 2nd 3rd
    printers
         configuration of 2nd
         implementation of 2nd
Shiva PAP
Simple File Sharing
     disabling
     file access permissions 2nd
simple volumes
simulation-based questions 2nd 3rd 4th
SLIP
     (Serial Line Internet Protocol)
slipstreaming
     SP2 pre-installations 2nd 3rd 4th 5th 6th
small peer-to-peer networks
     printer setup options
smart cards
     configuring (Device Manager) 2nd 3rd
     enrollment agents
     installing (Device Manager)
     logon requirements
     PC/SC Workshop website
     Personal Computer/Smart Card (PC/SC) specification
     Plug and Play support
     public key infrastructure (PKI)
     remote access authentication
snapshots
     System Restore 2nd 3rd
software
     cloning problems 2nd
    compatibility
         testing for upgrades 2nd 3rd 4th
    driver signing
         System File Protection
    installation requirements
         compatibility checks 2nd 3rd 4th
software restriction policies
     additional rules node
         certificate rule 2nd 3rd 4th
     designated file type node
     enforcement node
    security
         configuring 2nd 3rd
     security levels node
     trusted publishers node
Software Update Services (SUS)
    SP2 deployment
         benefits 2nd
solutions
    defining
         installation troubleshooting
    documentation of
         installation troubleshooting
    testing and implementation
         installation troubleshooting 2nd
SP1
     major system improvements
SP2
     (Service Pack 2) 2nd
     deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         via Group Policy 2nd 3rd 4th 5th 6th 7th
         via Software Update Services (SUS) 2nd
     downloading
    installations
         Group Policy deployment 2nd 3rd 4th 5th 6th 7th
         manual 2nd 3rd
         preparations 2nd
         slipstreaming 2nd 3rd 4th 5th 6th
    Internet Explorer
         Pop-Up Blocker 2nd
     major system improvements 2nd
     manual installations 2nd 3rd
    resources
         websites
     security focus
     security tools
         buffer overrun protection
         malware protection
         Security Center
         Windows Firewall
    Windows Firewall
         configuring 2nd
         function of
spanned volumes
spooling
     print jobs
SPs
     (XP service packs)
     components of
     hotfixes
     potential for errors
    version 1
         major improvements
    version 2
         downloading
         major improvements 2nd
         security focus
stale data status
     volumes
standby mode
     airline restrictions
    power conservation
         mobile computers 2nd
     power management scheme 2nd
static IP addresses 2nd 3rd 4th 5th 6th 7th 8th
    network adapters
         configuring 2nd 3rd 4th 5th
stop errors
    failed installations
         resolving 2nd 3rd
stopped installations
     troubleshooting
storage devices [See also disk devices]
    Computer Management utility
         Device Manager
         Device Services
         Disk Defragmenter
         Disk Management 2nd 3rd 4th 5th 6th 7th 8th
         Event Viewer
         Indexing Service
         Performance Alerts and Logs
         Removable Storage 2nd 3rd 4th
         WMI Control
    removable media
         configuring 2nd 3rd 4th
         troubleshooting 2nd 3rd 4th
storing
     cached credentials
     certificates (EFS) 2nd
    offline files
         caches
stripe sets
    conversions
         upgrade preparations
striped volumes
     creating (Diskpart.exe utility) 2nd 3rd
study strategies (exam) 2nd
     active approach 2nd 3rd
     macro approach 2nd
     micro approach 2nd
subnet masks
     (TCP/IP)
    IP addresses
         classes 2nd 3rd
         Classless Inter-Domain Routing (CIDR) 2nd
         host calculations
success tips (exam) 2nd 3rd
switching
     between languages in multi-language environment 2nd
Symantec Drive Image
symmetrical multiprocessing (SMP)
    processor usage
         monitoring (Performance Monitor) 2nd
     QNX Software Systems
symmetrical processing (SMP)
     converting computers to (Device Manager) 2nd 3rd 4th
     multiprocessor computers
synchronizing
    offline files
         with network versions
Sysprep
     (System Preparation Tool)
    computer functionality
         testing 2nd
     desktop property configuration
    domains
         computer removal
     extracting
    images
         cloning problems 2nd
         creating 2nd 3rd 4th 5th
         creating (exercise 2.3) 2nd
         deploying 2nd 3rd 4th 5th 6th 7th
         encrypted file usage
    Mini-Setup Wizard
         running (exercise 2.4) 2nd 3rd 4th
     network requirements 2nd 3rd
     Norton Ghost Image
     situations to avoid 2nd
     SP1/SP2 deployment tools
     Symantec Drive Image
     unattended installations
         executing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
         troubleshooting 2nd 3rd 4th
     when to use 2nd 3rd 4th 5th
System applet (Control Panel)
System Configuration utility (msconfig.exe)
    clean boots
         executing
    video problems
         troubleshooting
system data
    backups
         copy type (Windows Backup)
         daily type (Windows Backup)
         differential type (Windows Backup)
         executing (Windows Backup) 2nd 3rd 4th 5th
         full type (Windows Backup)
         incremental type (Windows Backup)
         permissions (Windows Backup) 2nd
         restoring (Windows Backup) 2nd 3rd 4th 5th
System File Checker (scf.exe)
    driver signatures
         checking
System File Protection
     driver signing
System Information Utility
    devices
         conflict/sharing status
System Monitor snap-in (Performance Console)
    counters
         highlighting
     Explain button
    real-time statistics
         viewing 2nd
system partitions
     booting from
system performance [See performance]
    LogicalDisk Object
         counters 2nd
    Memory Object
         counters 2nd 3rd
    monitoring
         overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
    optimizing
         overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
    PhysicalDisk Object
         counters 2nd
    power management
         preconfigured modes 2nd
    processor Object
         counters
System Preparation (sysprep) utility
System Preparation Tool, [See Sysprep]
system resources
     accessing in Internet Explorer 2nd
system restoration
     troubleshooting (Safe Mode) 2nd 3rd 4th
System Restore
    earlier system states
         restoring to 2nd 3rd
     restore points 2nd 3rd
     snapshots 2nd 3rd
System State data
     file types 2nd 3rd 4th
     recovering (Recovery Console) 2nd 3rd 4th 5th 6th
system volumes



Exam Prep 2. Windows XP Professional
MCSA/MCSE 70-270 Exam Prep 2: Windows XP Professional
ISBN: 0789733633
EAN: 2147483647
Year: 2004
Pages: 193

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net