QUIZ CHAPTER 16-23              

                                   Windows 2000 Professional

 

 

Chapter 16

 

  •   Auditing is a tool for maintaining network security that allows you to track user activities

and system wide events.

  •   Auditing allows you to track both user activities and Windows 2000 activities which are

called events, on a computer.

  •   The security log maintains a record of valid and invalid logon attempts and events related to

creating, opening, or deleting files or other objects.

  •   Audit the Everyone group, instead of the Users group.
  •   Auditing is turned off by default.
  •   There are three logs, application, security, and system.  The Application contains errors or

warnings.  The Security log contains information about the success or failure of audited events. 

The System log contains errors warnings, and information that Windows 2000 generates.

  •   Start/Programs/Administrative Tools/Event Viewer/Console Tree/Security Log.
  •   You can use the Filter and Find commands in Event Viewer to locate specific events or types of

events.

  •   Start/Programs/Administrative Tools/Local Security Policy/in Local Security Settings/ Local

Policies/Audit Policy.

 

 

 

Chapter 17

 

 

  •   Password policy allows you to improve security on your computer by controlling how

passwords are created and managed.

  •   The Security Options node lives under the Local Policies node.  Close to 40 additional

security options are available here that allow you to increase the effective security on your

computer.

  •   By default Windows 2000 Professional doesn’t require a user to be logged on to the

computer to shut it down.  Security Options allow you to disable this feature and force

users to log on the computer before it can be shut down.

  •   By default, Windows 2000 Professional requires users to press Ctrl+Alt+Delete to

log on to the computer.

  •   By default, Windows 2000 Professional doesn’t clear the virtual memory pagefile when

the system is shut down.

  •   By default, Windows 2000 Professional displays the last user name to log on to the

computer in the Windows Security or Log on To Windows dialog box.

 

 

Chapter 18

 

 

  •   Microsoft Windows 2000 File system (NTFS) compression enables you to compress

files and folders.  Compressed files and folders occupy less space on an NTFS-formatted

volume, which enables you to store more data.  Each file and folder on an NTFS volume

has a compression state, which is either compressed or uncompressed.

  •   Compressed files can be read and written to by any Microsoft Windows-based or MS-DOS

based application without first being uncompressed by another program.

  •   NTFS allocates disk space based on the uncompressed file size.  If you copy a compressed

file to an NTFS volume with enough space for the compressed file but not enough space for

the uncompressed file, you might get an error message stating that there is not enough disk

space for the file.    The file will not be copied to the volume.

  •   If you want to set the compression state of folder or file, right-click the folder or file in Windows

Explorer, Click Properties, and then click Advanced button.

  •   If you select Encryption, you cannot select Compression of a file or folder.  NTFS encryption

and compression are mutually exclusive.

  •   To change the compression state for a file or folder, you must have Write permission for that

file or folder.

  •   Windows 2000 doesn’t support NTFS compression for cluster sizes larger than 4KB because

compression on large clusters causes performance degradation.

  •   You can set alternative colour for compressed files in Windows Explorer/Tools/Folder

Options/View tab/Display Compressed Files and Folders with Alternate Color.

  •   Disk Quotas allow you to allocate disk space usage based on the files and folders that

user own.

  •   Windows 2000 tracks disk quotas for each volume, even if the volumes are on the same

hard disk.

  •   By default, only members of the Administrators group can view and change quota settings.
  •   Red = quota disabled, yellow = quota rebuilding, green = quota is active.
  •   EFS allows user to encrypt NTFS files by using a strong public key-based cryptographic

scheme that encrypts all files in a folder.

  •   Files remain encrypted if you move or rename them, and encryption isn’t defeated by

temporary files created during editing and file unencrypted in the paging file or in a temporary

file.

  •   EFS is implemented either from Windows Explorer or from the Command Prompt.
  •   It can be enabled or disabled for a computer, domain, or OU by resetting recovery

policy in the Group Policy console in the MMC.

  •   To set group policy for the domain or for an OU, your computer must be part of a

Windows 2000 domain.

  •   Compressed files can’t be encrypted, and encrypted files can’t be compressed.
  •   After you encrypt the folder, when you save a file in that folder, the file is encrypted by

using file encryption keys, which are fast symmetric keys designed for bulk encryption.

  •   By default, encryption provided by EFS is standard 56-bit encryption. For additional

security, North American users can obtain 128-bit encryption by ordering the Enhanced

CryptoPAK from Microsoft.  Files encrypted by the CryptoPAK cannot be decrypted,

accessed, or recovered on a system that supports only 56-bit encryption.

  •   Encrypted files can’t be shared, obviously.!!
  •   Disk Defragmenter can be defragment FAT, FAT32 and NTFS volumes.

 

 

Chapter 19

 

  •   A backup job is a single process of backing up data.
  •   Start/Programs/Accessories/System Tools/Backup  OR at the RUN type ntbackup.
  •   Backup Markers are known as archive attributes, which mark a file as having changed.
  •   There are 5 types of backups:  Normal or Full, Copy, Incremental, Differential, Daily.
  •   Start/Programs/Administrative Tools/Computer Management/Action/All Tasks/Send

Console Message.

 

 

Chapter 20

 

  •   Windows 2000 includes the Computer Management and Shared Folder snap-ins so that you

can easily monitor access to network resources and send administrative message to users.

  •   There are three reasons to assess management:  Maintenance, Security, Planning.
  •   Windows 2000 Professional, the maximum is 10 concurrent or simultaneous users accessing a file.
  •   Disconnecting users from open files can result in data loss.

 

 

 

Chapter 21

 

 

  •   Windows 2000 includes Extensible Authentication Protocol (EAP), Remote Authentication

Dial-in User Service (RADIUS), Internet Protocol Security (IPSec), Layer-Two Tunneling

Protocol (L2TP) and Bandwidth Allocation Protocol (BAP).

  •   RADIUS is scaleable, no limit to growth.
  •   RADIUS support in Windows 2000 facilitates this kind of user authentication, while

providing highly scaleable authentication designs for performance and fault-tolerant

designs for reliability.

  •   Both PPTP and L2TP use PPP to provide an initial envelope for the data and then append

additional headers for transport through the transit internetwork.

  •   L2TP supports header compression; PPTP does not.
  •   PPTP uses PPP encryption.  L2TP requires IPSec for encryption.
  •   L2TP operates with 4 bytes of overhead, as compared with 6 bytes for PPTP.
  •   PAP, CHAP, MS-CHAP, SPAP, and PPTP which provides tunneling capabilities.

 

 

Chapter 22

 

  •   Boot sequence has four phases:  initial boot loader, operating system selection, hardware detection,

and configuration selection.

  •   Windows 2000 modifies the boot sector during installation so that ntldr loads during system startup.
  •   If the boot.ini file isn’t present, Ntldr attempts to load Windows 2000 from the Winnt folder on the

first partition of the first disk, typically C:\Winnt

  •   If you select an operating system other than Windows 2000, such as Windows 98, Ntldr loads

and executes Bootsect.dos.  Bootsect.dos is a copy of the boot sector that was on the system

partition at the time that Windows 2000 was installed.

  •   Control set contains configuration  data used to control the system, such as a list of the device

drivers and services to load and start.

  •   Windows 2000 startup is not considered good until a user successfully logs on to the system. 

After a successful logon, the system copies the Clone control set to the LastKnownGood

control set.

  •   There are 5 states of the Windows 2000 Intel-based boot process:  Preboot sequence, Boot

sequence, Kernel load, Kernel initialization, and logon.

  •   The current control set is stored in the Registry under HKEY_LOCAL-MACHINE\SYSTEM\Select.
  •   Windows 2000 provides two configurations to load a driver and have problems rebooting,

you can use the last known good process to recover your working configuration or the Default.

  •   The boot.ini file is located on the active partition.
  •   If your computer is not equipped with a CD-ROM drive that is capable of booting from a

CD-ROM, then also insert your Windows 2000 Setup Boot disk into your floppy disk drive.

 

Chapter 23

 

  •   You can use the Setup Manager to create the Unattend.txt files that are necessary for scripted

 installations.

  •   The new Windows 2000 Setup Manager Wizard allows you to quickly create a script for a customized

 installation of Windows 2000 without concern for cryptic text file syntax.

  •   The Sysdiff.exe utility is often used in conjunction with the Setup Manager to install Windows using

different files.  The use of Sysdiff.exe has not changed from Windows NT 4.

  •   The Setup Manager Wizard creates a Sysprep folder at the root of drive image and places

Sysprep.inf in this folder.  The Mini-Setup wizard checks fro Sysprep.inf in the Setup folder at the

root of the drive in which Windows 2000 is being installed.

  •   When you use disk duplication, the mass storage controllers and HALs for the test computer and

all destination computer must be identical.

  •   The Administrator Group doesn’t have the right to log on to the batch job by default and

thus will need to be assigned this right prior to attempting a remote installation.

  •   You run Rbfg.exe for the remote install, and it is located in Remote Install\Admin\I386 folder on

the Remote Installation Server.

  •   Windows 95 or Windows 98 computers that don’t meet the hardware compatibility requirements

can still take advantage of Active Directory Directory services by using Directory Service Client.

  •   You must first upgrade computers running Windows NT3.1 or Windows NT 3.5 to Windows

NT 3.51 or Windows NT 4, and then you can upgrade them to Windows 2000 Professional.