1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

sybex mcitp microsoft windows vista desktop support consumer study guide exam 70 623 phần 10 ppt

54 311 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 54
Dung lượng 0,96 MB

Nội dung

65348bgloss.fm Page 466 Wednesday, October 24, 2007 3:06 PM 466 Glossary LGPO See Local Group Policy Object Link Layer Topology Discovery (LLTD) A protocol that allows Windows Vista to build a network map and display a graphical view of the network systems running an LLTD responder local area network (LAN) An access standard that is used to provide connectivity in a local corporate or home environment Local Computer Policy snap-in A Microsoft Management Console (MMC) snap-in used to implement local group policies, which include computer configuration policies and user configuration policies local group A group that is stored on the local computer’s accounts database These are the groups that administrators can add users to and manage directly on a Windows Vista computer local group policies A combination of security settings that are used to specify the levels of security defined on a Windows Vista computer Local Group Policy Object (LGPO) A set of security configuration settings that are applied to users and computers LGPOs are created and stored on the Windows Vista computer local policies Policies that allow administrators to control what a user can after logging on Local policies include audit policies, security option policies, and user right policies These policies are set through the Local Computer Policy snap-in local security Security that governs a local or interactive user’s ability to access locally stored files Local security can be set through NTFS permissions local user account A user account stored locally in the user accounts database of a com- puter that is running Windows Vista local user profile A profile created the first time a user logs on, stored in the Documents and Settings folder The default user profile folder’s name matches the user’s logon name This folder contains a file called NTUSER.DAT and subfolders with directory links to the user’s Desktop items Local Users and Groups A utility that is used to create and manage local user and group accounts logical drive An allocation of disk space on a hard drive, using a drive letter For example, a 50GB logical drive could be partitioned into two logical drives: a C: drive, which might be 20GB, and a D: drive, which might be 30GB logoff The process of closing an open session with a Windows Vista computer or Windows domain logon The process of opening a session with a Windows Vista computer or a network by pro- viding a valid authentication consisting of a user account name and a password After logon, network resources are available to the user according to the user’s assigned permissions 65348bgloss.fm Page 467 Wednesday, October 24, 2007 3:06 PM Glossary 467 M Mail Exchanger (MX) Record A DNS record that identifies the server or servers that handle e-mail for a particular Internet domain malware Short for malicious software, malware is a general class of software that falls into the same category as spyware, but simply is defined as software that intends to harm or hijack your computer mandatory profile A user profile created by an administrator and saved with a special extension (.man) so that the user cannot modify the profile in any way Mandatory profiles can be assigned to a single user or a group of users mapped drive A shared network folder associated with a drive letter Mapped drives appear to users as local connections on their computers and can be accessed through a drive letter using My Computer Master Boot Record (MBR) A record used in the Windows Vista boot sequence to point to the active partition, which is the partition used to boot the operating system This is normally the C: drive Once the MBR locates the active partition, the boot sector is loaded into memory and executed MB See megabyte MBR See Master Boot Record MCE device See Media Center Extender device Media Center Extender (MCE) device A device that enables you to watch or record TV, watch videos, listen to music, and view pictures without being at a computer megabyte A computer storage measurement equal to 1,024 kilobytes megahertz One million cycles per second The internal clock speed of a microprocessor is expressed in megahertz (MHz) memory Any device capable of storing information This term is usually used to indicate vol- atile random access memory (RAM) capable of high-speed access to any portion of the memory space, but incapable of storing information without power MHz See megahertz Microsoft Challenge Handshake Authentication Protocol Version (MS-CHAPv2) A remote access authentication protocol that adds to the services provided by CHAP by providing mutual authentication, different encryption keys for sending and receiving, and stronger data encryption keys Windows 2000 (all versions), Windows XP (all versions), Windows Server 2003, and Windows Vista can use MS-CHAPv2 with dial-up and virtual private network (VPN) connections If you are using Windows NT (all versions) or Windows 95/98 computers, you can use MS-CHAPv2 authentication only with VPN connections 65348bgloss.fm Page 468 Wednesday, October 24, 2007 3:06 PM 468 Glossary Microsoft Management Console (MMC) A console framework for management applications The MMC provides a common environment for snap-ins Microsoft Point-to-Point Encryption (MPPE) A remote data encryption standard that is a Point-to-Point Protocol (PPP) data encryption option that uses Rivest-Shamir-Adleman (RSA) RC4 encryption MPPE supports strong (128-bit key) or standard (40-bit key) encryption In order to use MPPE data encryption over a dial-up or virtual private network (VPN) connection, the remote client and server that will be accessed must use the MS-CHAPv2 or EAP authentication protocols Microsoft Update A utility in Windows Vista that allows you to connect to a server and check for updates You can also have the tool automatically download and install updates MMC See Microsoft Management Console modem Modulator/demodulator A device used to create an analog signal suitable for transmission over telephone lines from a digital data stream Modern modems also include a command set for negotiating connections and data rates with remote modems and for setting their default behavior MPPE See Microsoft Point-to-Point Encryption MS-CHAPv2 See Microsoft Challenge Handshake Authentication Protocol Version multibooting The process of allowing a computer to boot multiple operating systems N NAP See Network Access Protection (NAP) NBTSTAT Command-line utility that is used to display TCP/IP connection protocol statistics over NetBIOS over TCP/IP NetBIOS See Network Basic Input/Output System NETSTAT Command-line utility that is used to display TCP/IP ports statistics and other IP information network adapter The hardware used to connect computers (or other devices) to the network Network Access Protection (NAP) A set of technologies based on hardware, policies, standards, and software that combine to protect the networks from the usual unintentional threats NAP can identify unhealthy computers and segregate them from the rest of the network, while bringing them back to a healthy status Network and Sharing Center The new networking hub in Windows Vista that you can use to view and configure your network devices, as well as share files and printers on your network 65348bgloss.fm Page 469 Wednesday, October 24, 2007 3:06 PM Glossary 469 Network Basic Input/Output System (NetBIOS) A client/server interprocess communi- cations (IPC) service developed by IBM in the early 1980s NetBIOS presents a relatively primitive mechanism for communication in client/server applications, but its widespread acceptance and availability across most operating systems make it a logical choice for simple network applications Network Configuration Operators group Members of the Network Configuration Operators group have some administrative rights to manage the computer’s network configuration Network Discovery Network discovery, when enabled, allows a computer to be “seen” by other computers on the network Network group A special group that includes the users who access a computer’s resources over a network connection Network Places The folder that provides access to shared resources, such as local network resources and web resources network printer A printer that is available to local and network users A network printer can use a physical port or a logical port network profiles Windows Vista defines three different kinds of network profiles: domain, private, and public The firewall uses network profile information to allow settings to be more restrictive in the case of a public network or more permissive on a private or domain network Network Zone Rules A software restriction rule that identifies application installer files (.msi) based on the network zone they are run from New Technology File System (NTFS) A secure, transaction-oriented file system developed for Windows NT and used by Windows 2000, Windows XP, and Windows Server 2003 NTFS offers features such as local security on files and folders, data compression, disk quotas, and data encryption nslookup.exe A command-line tool that allows you to resolve names and IP address specif- ically using DNS as the resolver NTFS See New Technology File System NTFS permissions Permissions used to control access to NTFS folders and files Access is configured by allowing or denying NTFS permissions to users and groups NTLM An authentication protocol that uses a challenge-response mechanism for authentication, in which clients are able to prove their identities without sending a password to the server This standard was developed for Windows NT but is also used in Windows 98 and Windows 2000 NTLM2 The new version of NTLM developed for Windows XP and later 65348bgloss.fm Page 470 Wednesday, October 24, 2007 3:06 PM 470 Glossary O optimization Any effort to reduce the workload on a hardware component by eliminating, obviating, or reducing the amount of work required of the hardware component through any means For instance, file caching is an optimization that reduces the workload of a hard disk drive by reducing the number of requests sent to the hard disk drive organizational unit (OU) In Active Directory, an organizational unit is a generic folder used to create a collection of objects An OU can represent a department, division, location, or project group Used to ease administration of AD objects and as a unit to which Group Policy can be deployed OU See organizational unit outbound rule A Windows Firewall rule that applies to network traffic sent from the computer over-the-shoulder (OTS) credentials A term used to refer to an administrator entering their credentials when a standard user receives a UAC prompt after attempting to perform an administrative action owner The user associated with an NTFS file or folder who is able to control access and grant permissions to other users P pagefile Logical memory that exists on the hard drive If a system is experiencing excessive paging (swapping between the pagefile and physical RAM), it needs more memory PAP See Password Authentication Protocol partition A section of a hard disk that can contain an independent file system volume Partitions can be used to keep multiple operating systems and file systems on the same hard disk Password Authentication Protocol (PAP) A remote access authentication protocol It is the simplest authentication method It uses unencrypted, plain-text passwords You would use PAP if the server you were connecting to didn’t support secure validations or you were troubleshooting remote access and wanted to use the most basic authentication option password policies Windows Vista policies used to enforce security requirements on the computer Password policies are set on a per-computer basis, and they cannot be configured for specific users Password policies are set through account policies Path rules A software restriction rule that identifies applications based on their name and/or path to the executable file PC Card A special credit-card-sized device used to add devices to a laptop computer Also called a Personal Computer Memory Card International Association (PCMCIA) card 65348bgloss.fm Page 471 Wednesday, October 24, 2007 3:06 PM Glossary 471 PCI See Peripheral Component Interconnect PCMCIA card See Personal Computer Memory Card International Association (PCMCIA) card Peripheral Component Interconnect (PCI) A high-speed, 32/64-bit bus interface developed by Intel and widely accepted as the successor to the 16-bit Industry Standard Architecture (ISA) interface PCI devices support input/output (I/O) throughput about 40 times faster than the ISA bus Performance Monitor The Performance Monitor provides a graphical display of performance counters built into Windows and other applications you may have installed It allows you to watch counters or trend them over time to help isolate performance problems Performance Information and Tools An application in Windows Vista that provides you with a numerical score that lets you know how well each of your computer’s subsystems performs permissions Security constructs used to regulate access to resources by username or group affiliation Permissions can be assigned by administrators to allow any level of access, such as read-only, read/write, or delete, by controlling the ability of users to initiate object services Security is implemented by checking the user’s security identifier (SID) against each object’s discretionary access control list (DACL) Personal Computer Memory Card International Association (PCMCIA) card A special credit-card-sized device used to add devices to a laptop computer Also called a PC Card phishing A method used to attempt to trick someone into providing personal and financial information by claiming to be a legitimate company requesting information Phishing Filter A feature of Windows Vista that provides protection against phishing attacks by checking websites to determine whether they are known to be fraudulent or contain characteristics common to fraudulent sites PING A command used to send an Internet Control Message Protocol (ICMP) echo request and echo reply to verify that a remote computer is available Plug and Play A technology that uses a combination of hardware and software to allow the operating system to automatically recognize and configure new hardware without any user intervention Point-to-Point Protocol (PPP) A set of remote authentication protocols used by Windows during remote access for interoperability with third-party remote access software Point-to-Point Tunneling Protocol An open industry standard developed by Microsoft and other industry leaders to provide support for tunneling of Point-to-Point Protocol (PPP) frames through an Internet Protocol (IP) network PPP provides authentication, compression, and encryption services policies General controls that enhance the security of an operating environment In Win- dows Vista, policies affect restrictions on password use and rights assignments and determine which events will be recorded in the Security log 65348bgloss.fm Page 472 Wednesday, October 24, 2007 3:06 PM 472 Glossary POP3 See Post Office Protocol Pop-up Blocker A feature of Internet Explorer that prevents pop-ups from being displayed by web pages POST See Power-On Self-Test Post Office Protocol (POP3) A protocol used to receive e-mail messages over the Internet power plans Preconfigured options for power management in Windows Vista Power-On Self-Test (POST) A part of the boot sequence The POST detects the computer’s processor, how much memory is present, what hardware is recognized, and whether the BIOS is standard or has Plug and Play capabilities Power Saver power plan A power plan included with Windows Vista that is optimized for power savings rather than performance Power Users group A built-in group that is included for backward compatibility purposes PPP See Point-to-Point Protocol PPTP See Point-to-Point Tunneling Protocol Preboot Execution Environment (PXE) A technology that allows a client computer to remotely boot and connect to a Windows Deployment Services (WDS) server Previous Versions A feature of Windows Vista for creating shadow copies of files so that the files can be restored to a previous state If System Restore is not enabled, the shadow copies cannot be created primary partition A part of basic storage on a disk The primary partition is the first parti- tion created on a hard drive The primary partition uses all of the space that is allocated to the partition This partition is usually marked as active and is one used to boot the computer print device The actual physical printer or hardware device that generates printed output printer In Windows Vista terminology, the software interface between the physical printer (see print device) and the operating system priority A level of execution importance assigned to a thread In combination with other fac- tors, the priority level determines how often that thread will get computer time according to a scheduling algorithm privilege escalation Method by which UAC protects computers by requiring authentication when performing a task that requires administrative privileges Problem Reports and Solutions A new application in Windows Vista that enables you to track system problems and allows you to check for potential solutions to those problems Problem Reports and Solutions replaces Dr Watson 65348bgloss.fm Page 473 Wednesday, October 24, 2007 3:06 PM Glossary 473 process A running program containing one or more threads A process encapsulates the protected memory and environment for its threads processor A circuit designed to automatically perform lists of logical and arithmetic opera- tions Unlike microprocessors, processors may be designed from discrete components rather than be a monolithic integrated circuit processor affinity The association of a processor with specific processes that are running on the computer Processor affinity is used to configure multiple processors Protected Mode A security feature of Internet Explorer that prevents malicious code from being run outside of the Temporary Internet Files directory, unless specifically granted access protocol An established rule of communication adhered to by the parties operating under it Protocols provide a context in which to interpret communicated information Computer protocols are rules used by communicating devices and software services to format data in a way that all participants understand published When you deploy software via active directory, you can publish an application for installation This will allow a user to install the application via the Programs and Features Control Panel applet PXE See Preboot Execution Environment Q Quarantined Items Location in Windows Defender where suspicious software applications are kept until you remove them R RAM See random access memory random access memory (RAM) Integrated circuits that store digital bits in massive arrays of logical gates or capacitors RAM is the primary memory store for modern computers, storing all running software processes and contextual data ReadyDrive ReadyDrive is a new technology included with Windows Vista that can be used to speed up the boot process, resume from a hibernation state faster, and conserve battery power ReadyDrive relies on new hybrid hard disks, which uses flash memory technology in conjunction with mechanical hard disk technology Really Simple Syndication (RSS) RSS is a content syndication technology that enables a website to syndicate content via an RSS file, which is a formatted XML document 65348bgloss.fm Page 474 Wednesday, October 24, 2007 3:06 PM 474 Glossary reference computer The Windows Vista disk image used as the source for automated installations REGEDIT A Windows program, the Registry Editor, which is used to edit the Registry Registry A database of settings required and maintained by Windows Vista and its compo- nents The Registry contains all of the configuration information used by the computer It is stored as a hierarchical structure and is made up of keys, hives, and value entries Registry Editor The utility used to edit the Windows Vista registry You can use REGEDIT or REGEDT32 Reliability and Performance Monitor An application in Windows Vista that is used to mea- sure the performance and reliability of a local or remote computer on the network Reliability and Performance Monitor replaces Performance Logs and Alerts (PLA), Server Performance Advisor (SPA), and System Monitor remote access connections A method for allowing remote clients connectivity to a private network or the Internet Remote Assistance A mechanism for requesting help for x86-based computers through Windows Messenger and e-mail or by sending a file requesting help To use Remote Assistance, the computer requesting help and the computer providing help must be using Windows Vista, Windows XP Professional, or Windows Server 2003 and must have some sort of interconnectivity Remote Desktop A utility that allows you to take control of a remote computer’s keyboard, video, and mouse This tool does not require that someone collaborate with you on the remote computer While the remote computer is being accessed, it remains locked and any actions that are performed remotely will not be visible to the monitor that is attached to the remote computer Remote Desktop Users group A special group automatically created on Windows Vista computers that is used in conjunction with the Remote Desktop service remote installation Installation of Windows Vista performed remotely through Windows Deployment Services (WDS) Remote Installation Services (RIS) A technology used in previous versions of Windows that allows the remote installation of those versions of Windows, such as Windows XP Professional A RIS server installs Windows XP Professional on RIS clients This technology has been updated in Windows Vista and is now called Windows Deployment Services Replicator group A built-in group that supports directory replication, which is a feature used by domain servers Only domain user accounts that will be used to start the replication service should be assigned to this group resource Any useful service, such as a shared folder or a printer restore point Recovery point created by System Protection and used by System Restore to restore the system files and settings on your computer to an earlier point in time 65348bgloss.fm Page 475 Wednesday, October 24, 2007 3:06 PM Glossary 475 Resultant Set of Policy (RSoP) All GPO settings taken together after the machine has booted and the user has logged on After all conflicts have been worked out, the GPO settings left are the actual settings that will affect the user RIS See Remote Installation Services roaming profile A user profile that is stored and configured to be downloaded from a server Roaming profiles allow users to access their profiles from any location on the network router A Network layer device that moves packets between networks Routers provide internetwork connectivity RSS See Really Simple Syndication S Safe Mode A Windows Vista Advanced Boot Options menu item that loads the absolute minimum of services and drivers that are needed to start Windows Vista The drivers that are loaded with Safe Mode include basic files and drivers for the mouse, monitor, keyboard, hard drive, standard video driver, and default system services Safe Mode is considered a diagnostic mode It does not include networking capabilities Safe Mode with Command Prompt A Windows Vista Advanced Boot Options menu item that starts Windows Vista in Safe Mode, but after you log in to Windows Vista, only a command prompt is displayed This mode does not provide access to the desktop Safe Mode with Networking A Windows Vista Advanced Boot Options menu item that starts Windows Vista in Safe Mode but adds networking features SCSI See Small Computer Systems Interface search providers The website used when entering search phrases into the Instant Search box in Internet Explorer Multiple search providers can be installed, and custom providers can be created security The measures taken to secure a system against accidental or intentional loss, usually in the form of accountability procedures and use restriction—for example, through NTFS permissions and share permissions security identifier (SID) A unique code that identifies a specific user or group to the Win- dows Vista security system SIDs contain a complete set of permissions for that user or group Security Level When configuring software restriction policies, you must define a default security level and security levels for each rule you create The Security Levels are unrestricted, basic user, and disallowed Security log A log that tracks events that are related to Windows Vista auditing The Security log can be viewed through the Event Viewer utility 65348.book Page 505 Monday, October 22, 2007 4:27 PM systems – TV (television) options overview, 419–421, 420–421 review questions/answers, 447–452 Startup Repair Tool (SRT), 421–422, 422 System Restore tool, 422 systems corrupted See corrupted systems monitoring with Performance Monitor (exercise), 412–413 securing with BitLocker, 312–314 System Configuration tool (MSConfig), 68–72 System File Checker (sfc) command-line tool, 428 System Restore tool, 422, 427–428, 428 T tagging images, 96–97 taskbar thumbnails, 58 tasks (Windows Calendar), 86–87, 87 TCP/IP advanced settings, 347 autonetting addresses, 341 theme settings, 60, 60 time/date set up, 18 Time Restrictions (Parental Control), 261–262, 262 Time Zone setting, 67 Tools tab (MSConfig), 72 TPM (Trusted Platform Module), 309–310, 312–314 trace route (tracert) tool, 371–373 transferring data/settings, 20–21 troubleshooting application compatibility, 32–34, 33–34 505 application issues (UAC), 303 camcorders, 145 client side DNS, 373–374 connections to peripherals, 117 DHCP, 378–382 digital cameras, 145 driver installation, 29–30 faxes, 169–172, 170–171 files/folders sharing, 391–393, 392 Group Policy, 384–385, 384–385 with Network and Sharing Center, 386 networks See network troubleshooting PDA hardware, 132 PDA software, 133, 133–134 portable media devices, 146–147 printer sharing, 383, 393–394, 394 printers, 166–169, 167–168 Protected Mode issues, 279–280, 280 public vs private connections, 385–386 scanner/copy devices, 169–172, 170–171 UAC policy settings, 303–304 USB connections, 123–124 Windows Firewall, 382–386, 382, 384–385 Windows Vista See diagnostic tools; system recovery wireless networking, 387–388, 388 Trusted Platform Module (TPM) See TPM (Trusted Platform Module) Trusted Sites zone (IE 7), 288–289, 288–289 tuners, TV See TV (television) TV (television) recording, 212–213, 212 setting up in Windows Media Center, 195–196 65348.book Page 506 Monday, October 22, 2007 4:27 PM 506 UAC (User Account Control) – View Full Map option (networks) syncing recorded to portable device, 233–235, 233–235 tuners, setting up, 200–205, 200–205 watching and recording, 212–213, 212 U UAC (User Account Control) Application Information service, 303 overview, 300, 300 prompts, configuring, 302 Security Center and, 255 settings, 301–302 troubleshooting application issues, 303 troubleshooting UAC policy settings, 303–304 Virtualization issues, 303 Windows Update and, 304–309, 305–306, 308 uninstalling gadgets, 52–53 updates, 307 updating applying security updates, 307–309, 308 installing updates, 17 Microsoft Update See Microsoft, Update Windows Defender definitions, 444–445, 445 Windows Update See Windows Update Windows Update log file, 444 upgrades, in-place, 8–10, 10 URL Reputation Service, Microsoft, 283 USB (Universal Serial Bus) connections cabling problems, 124 defined, 117 device drivers and, 123–124 flash drives and, 313 hardware failures and, 123 outdated firmware/BIOS, 124 User Account Control (UAC) See UAC (User Account Control) user accounts administrator accounts See administrator accounts basics, 62–63 local, 64 setting up, 16 standard, 67–68, 67 types of, 63 User Account Control (UAC), 63, 65–66 User Broker (ieuser.exe process), 279 User Controls screen (Parental Controls), 257–258, 258, 269–270, 270 user state data, 20 User State Migration Tool (USMT), 21 V videos adapter drivers, 31–32 backing up, 101 importing from camcorders, 142–145, 143 importing from digital cameras, 137–140 managing on PDAs, 131–132 preferences for transferring, 142–144, 143 transferring from camcorders, 142–145, 143 videoconferencing, 125 View Full Map option (networks), 327 65348.book Page 507 Monday, October 22, 2007 4:27 PM Virtualization issues (UAC) – Windows Virtualization issues (UAC), 303 Vista, Windows application support/compatibility, 4–5 choosing editions of, customizing and configuring See customizing/configuring Vista device drivers for, hardware requirements for, 2–4 in-place upgrades, 8–10, 10 installing See installing Windows Vista troubleshooting See diagnostic tools; system recovery Windows Vista Program Compatibility Assistant, visual effects (Windows Media Center), 61, 194 W WAP (Wireless Access Point), 355 watched folders (Windows Media Center), 196–197, 197–199 Web Restrictions automatic configuring, 260–261 manually configuring, 259–260, 260 Web sites, for downloading Streams command-line tool, 433 Windows Upgrade Advisor, Web sites, for further information ESRB ratings, 263 Malware Removal Starter Kit, 445 Microsoft Hardware Compatibility List, 200 Microsoft Security Portal, 434 webcams, installing/configuring, 125–126, 125–126 507 WEP (Wired Equivalent Privacy), 356–358, 357 Wi-Fi Protected Access (WPA) See WPA (Wi-Fi Protected Access) WIM (Windows Imaging), 7–8 Window Color and Appearance applet, 60–61, 61 Windows Aero See Aero-enhanced graphical interface Basic interface (non-Aero), 56, 56 Calculator, 338 Display Driver Model (WDDM) driver, 58 Error Reporting, 419 event logs, 408 Fax and Scan application, 157–165, 158–159, 161, 165, 169–171, 170–171 Flip, 58–59, 59 Imaging (WIM), 7–8 Live Gallery, 53 Live Messenger, 125–126, 126 Mail, 78–85, 79–80 Meeting Space, 91–94, 92–94 Memory Diagnostics Tool, 424–425, 424–425 Mobile Device Center, 129–131, 129, 131 Mobile Partnership, 129 Movie Maker, 94–96, 95 Network Diagnostics tool, 386 PE 2.0, Photo Gallery, 96–99, 97–99, 136–141 Security Center See Security Center Transfer Wizard, 23–29 Ultimate Extras, 305 Upgrade Advisor, 5–7, 6–7 65348.book Page 508 Monday, October 22, 2007 4:27 PM 508 Windows Calendar – wireless networking versions upgrade paths, Vista Capable standard, 2–3 Vista Premium Ready standard, 2–3 Vista Program Compatibility Assistant, Windows Calendar appointments, 85–86, 85–86 multiple calendars, 88–89, 88–89 sharing calendars, 89–91 tasks, 86–87, 87 Windows Defender configuring/running scan (exercise), 438–443, 439–443 fundamentals, 432–438, 433–435, 437–438 quarantined software, 444 scan results, 441–443, 442–443 updating definitions, 444–445, 445 Windows Easy Transfer Easy Transfer Cable, 22 overview, 20–22 Transfer Wizard, 23–29, 23–25 Windows Firewall configuring, 352–355, 353–354 troubleshooting, 382–386, 382, 384–385 Windows Media Center burning CDs/DVDs, 221–223, 222–223 exam essentials, 239 extenders/gaming consoles, 205–211, 206–211 media categories supported, 211–212 Media library set up, 196–199, 197–199 movies, watching, 213–215, 213–214 pictures, viewing, 219, 219 playing music, 215–218, 215–218 review questions/answers, 240–245 setting up, 192–196, 192–194 streaming media services, 219–221, 220–221 syncing portable devices, 223–224, 224 syncing recorded TV to portable device, 233–235, 233–235 TV tuners, setting up, 200–205, 200–205 TV, watching/recording, 212–213, 212 Xbox 360 extender (exercise), 206–211, 206–211 Windows Media Player (WMP) DRM and, 235–238, 237 exam essentials, 239 library, configuring, 182–184, 183–184 library, sharing, 188–192, 189–191 MP3 players, setting up in, 225–228, 226–228 playing media, 184–186, 185–186 playlists, creating, 227–228, 228, 229–233, 229–233 review questions/answers, 240–245 ripping/burning music, 186–188, 187–188 Windows Update Automatic Updating, 251–253, 252–253 configuring, 304–309, 305–306, 308 Windows Update log file, 444 wipe-and-load migration, 20 Wired Equivalent Privacy (WEP) See WEP (Wired Equivalent Privacy) wireless networking fundamentals, 355–356 65348.book Page 509 Monday, October 22, 2007 4:27 PM WMA (Windows Media Audio) format – zones security, configuring, 356–358, 357 troubleshooting, 387–388, 388 WMA (Windows Media Audio) format files, 143 Lossless, 187 WPA-Enterprise, 388 WPA (Wi-Fi Protected Access), 358 509 X Xbox 360, adding as extender (exercise), 206–211, 206–211 XPS Document Writer, 154 Z zones, security See security, zones (IE 7) Need More Practice? Preparing for your certification exams just got easier thanks to TestSuccess from Sybex With 24-hour access to this online test prep environment, you can practice how you want, when you want, from wherever you can access the Internet With your paid subscription you will be able to: G •  ain access to 200 questions per exam covering all exam subject areas • Get explanations of questions and answers in Practice Mode  • Select your own questions • Take your own customized practice exams C •  reate a “quick” exam, pulling questions randomly from the entire test bank • View detailed strength and weakness reports separated by subject area  • Compare your performance and scores to other users to see how you rank  Available exams: • CCNA: Cisco Certified Network  Associate (640-802) M •  CTS: Microsoft Windows Vista Configuration (70-620) • CompTIA A+ Essentials C •  ISSP: Certified Information System Security Professional • CompTIA A+ IT Technician • Comp TIA Linux+ • CompTIA Network+ • CompTIA Security+ P •  HR/SPHR: Professional/Senior Professional in Human Resources P •  MP: Project Management Professional Go to www.sybextestsuccess.com today for more information and to subscribe! 65348badvert.fm Page 510 Tuesday, October 23, 2007 10:11 AM 65348badvert.fm Page 511 Tuesday, October 23, 2007 10:11 AM 65348badvert.fm Page 512 Tuesday, October 23, 2007 10:11 AM 65348badvert.fm Page 513 Tuesday, October 23, 2007 10:11 AM Need More Practice? Preparing for your certification exams just got easier thanks to TestSuccess from Sybex With 24-hour access to this online test prep environment, you can practice how you want, when you want, from wherever you can access the Internet With your paid subscription you will be able to: • Gain access to 200 questions per exam covering all exam subject areas • Get explanations of questions and answers in Practice Mode • Select your own questions • Take your own customized practice exams • Create a “quick” exam, pulling questions randomly from the entire test bank • View detailed strength and weakness reports separated by subject area • Compare your performance and scores to other users to see how you rank Available exams: • CCNA: Cisco Certified Network Associate (640-802) • MCTS: Microsoft Windows Vista Configuration (70-620) • CompTIA A+ Essentials • CISSP: Certified Information System Security Professional • CompTIA A+ IT Technician • Comp TIA Linux+ • CompTIA Network+ • CompTIA Security+ • PHR/SPHR: Professional/Senior Professional in Human Resources • PMP: Project Management Professional Go to www.sybextestsuccess.com today for more information and to subscribe! 65348badvert.fm Page 514 Tuesday, October 23, 2007 10:11 AM 65348bmeddis.fm Page 515 Tuesday, October 23, 2007 10:14 AM Wiley Publishing, Inc End-User License Agreement READ THIS You should carefully read these terms and conditions before opening the software packet(s) included with this book “Book” This is a license agreement “Agreement” between you and Wiley Publishing, Inc “WPI” By opening the accompanying software packet(s), you acknowledge that you have read and accept the following terms and conditions If you not agree and not want to be bound by such terms and conditions, promptly return the Book and the unopened software packet(s) to the place you obtained them for a full refund License Grant WPI grants to you (either an individual or entity) a nonexclusive license to use one copy of the enclosed software program(s) (collectively, the “Software,” solely for your own personal or business purposes on a single computer (whether a standard computer or a workstation component of a multi-user network) The Software is in use on a computer when it is loaded into temporary memory (RAM) or installed into permanent memory (hard disk, CD-ROM, or other storage device) WPI reserves all rights not expressly granted herein Ownership WPI is the owner of all right, title, and interest, including copyright, in and to the compilation of the Software recorded on the physical packet included with this Book “Software Media” Copyright to the individual programs recorded on the Software Media is owned by the author or other authorized copyright owner of each program Ownership of the Software and all proprietary rights relating thereto remain with WPI and its licensers Restrictions On Use and Transfer (a) You may only (i) make one copy of the Software for backup or archival purposes, or (ii) transfer the Software to a single hard disk, provided that you keep the original for backup or archival purposes You may not (i) rent or lease the Software, (ii) copy or reproduce the Software through a LAN or other network system or through any computer subscriber system or bulletin-board system, or (iii) modify, adapt, or create derivative works based on the Software (b) You may not reverse engineer, decompile, or disassemble the Software You may transfer the Software and user documentation on a permanent basis, provided that the transferee agrees to accept the terms and conditions of this Agreement and you retain no copies If the Software is an update or has been updated, any transfer must include the most recent update and all prior versions Restrictions on Use of Individual Programs You must follow the individual requirements and restrictions detailed for each individual program in the About the CD-ROM appendix of this Book or on the Software Media These limitations are also contained in the individual license agreements recorded on the Software Media These limitations may include a requirement that after using the program for a specified period of time, the user must pay a registration fee or discontinue use By opening the Software packet(s), you will be agreeing to abide by the licenses and restrictions for these individual programs that are detailed in the About the CD-ROM appendix and/or on the Software Media None of the material on this Software Media or listed in this Book may ever be redistributed, in original or modified form, for commercial purposes Limited Warranty (a) WPI warrants that the Software and Software Media are free from defects in materials and workmanship under normal use for a period of sixty (60) days from the date of purchase of this Book If WPI receives notification within the warranty period of defects in materials or workmanship, WPI will replace the defective Software Media (b) WPI AND THE AUTHOR(S) OF THE BOOK DISCLAIM ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE SOFTWARE, THE PROGRAMS, THE SOURCE CODE CONTAINED THEREIN, AND/ OR THE TECHNIQUES DESCRIBED IN THIS BOOK WPI DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE SOFTWARE WILL BE ERROR FREE (c) This limited warranty gives you specific legal rights, and you may have other rights that vary from jurisdiction to jurisdiction Remedies (a) WPI’s entire liability and your exclusive remedy for defects in materials and workmanship shall be limited to replacement of the Software Media, which may be returned to WPI with a copy of your receipt at the following address: Software Media Fulfillment Department, Attn.: MCITP Microsoft Windows Vista Desktop Support Consumer Study Guide,Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, or call 1-800-762-2974 Please allow four to six weeks for delivery This Limited Warranty is void if failure of the Software Media has resulted from accident, abuse, or misapplication Any replacement Software Media will be warranted for the remainder of the original warranty period or thirty (30) days, whichever is longer (b) In no event shall WPI or the author be liable for any damages whatsoever (including without limitation damages for loss of business profits, business interruption, loss of business information, or any other pecuniary loss) arising from the use of or inability to use the Book or the Software, even if WPI has been advised of the possibility of such damages (c) Because some jurisdictions not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation or exclusion may not apply to you U.S Government Restricted Rights Use, duplication, or disclosure of the Software for or on behalf of the United States of America, its agencies and/or instrumentalities “U.S Government” is subject to restrictions as stated in paragraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause of DFARS 252.227-7013, or subparagraphs (c) (1) and (2) of the Commercial Computer Software - Restricted Rights clause at FAR 52.227-19, and in similar clauses in the NASA FAR supplement, as applicable General This Agreement constitutes the entire understanding of the parties and revokes and supersedes all prior agreements, oral or written, between them and may not be modified or amended except in a writing signed by both parties hereto that specifically refers to this Agreement This Agreement shall take precedence over any other documents that may be in conflict herewith If any one or more provisions contained in this Agreement are held by any court or tribunal to be invalid, illegal, or otherwise unenforceable, each and every other provision shall remain in full force and effect 65348bmedinst.qxd:Layout 10/23/07 10:04 AM Page 516 M ICROSOFT DESKTOP SUPPORT – CONSUMER BOOK/CD PACKAGE ON THE MARKET! Get ready for the new Pro: Microsoft Desktop Support – Consumer exam (70-623) with the most comprehensive and challenging sample tests anywhere! The Sybex Test Engine features: All the review questions, as covered in each chapter of the book Challenging questions representative of those you’ll find on the real exam Two full-length bonus exams available only on the CD Use the Electronic Flashcards for PCs or Palm devices to jog your memory and prep last-minute for the exam! Reinforce your understanding of key concepts with these hardcore flashcardstyle questions Download the Flashcards to your Palm device and go on the road Now you can study for the Pro: Windows Desktop Support – Consumer exam any time, anywhere Search through the complete book in PDF! Access the entire MCITP: Microsoft Windows Vista Desktop Support Consumer Study Guide, complete with figures and tables, in electronic format Search the MCITP: Microsoft Windows Vista Desktop Support Consumer chapters to find information on any topic in seconds 65348bperfcard.fm Page Monday, October 22, 2007 4:24 PM MICROSOFT WINDOWS VISTA DESKTOP SUPPORT CONSUMER STUDY GUIDE Exam 70-623: Pro: Microsoft Desktop Support – Consumer OBJECTIVE CHAPTER INSTALL AND UPGRADE WINDOWS VISTA Evaluate potential upgrade environments Prepare to install Windows Vista Troubleshoot and resolve installation issues Troubleshoot and resolve post-installation issues POST-INSTALLATION: CUSTOMIZE AND CONFIGURE SETTINGS Configure Sidebar Configure Windows Aero Customize and configure user accounts Evaluate user requirements and recommend, set up, and configure appropriate applications Evaluate user’s system and recommend appropriate settings to optimize performance CONFIGURE WINDOWS VISTA SECURITY Configure Windows Security Center Configure Firewalls Configure Windows Updates Configure Windows Defender Configure Parental Controls Configure Internet Explorer 7+ Configure User Account Control Protect data 65348bperfcard.fm Page Monday, October 22, 2007 4:24 PM OBJECTIVE CHAPTER CONFIGURE, TROUBLESHOOT, AND REPAIR NETWORKING Configure and troubleshoot network protocols 6, Configure and troubleshoot network services at the client 6, Configure and troubleshoot Windows Vista by using the Network and Sharing Center 6, Configure and troubleshoot wireless networking 6, Troubleshoot file and print sharing Configure Media Center INSTALL, CONFIGURE, AND TROUBLESHOOT DEVICES Connect peripherals to Windows Vista Install, configure, and troubleshoot mobile devices Install, configure, and troubleshoot digital cameras and camcorders 3, Install, configure, and troubleshoot media devices Install, configure, and troubleshoot printers, fax machines, and copy devices TROUBLESHOOT AND REPAIR WINDOWS VISTA Diagnose a specified issue Repair a corrupted operating system Remove malware from a client system Exam objectives are subject to change at any time without prior notice and at Microsoft’s sole discretion Please visit Microsoft’s website (www.microsoft.com/learning) for the most current listing of exam objectives ... tool, 107 ? ?108 , 108 basics, 99? ?100 complete pc restore, 105 ? ?107 , 106 ? ?107 configuring complete pc backups, 103 ? ?104 , 104 ? ?105 configuring file backups, 100 ? ?103 , 100 ? ?103 restoring files, 104 ? ?105 Basic... versions of Microsoft Windows: Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP, Windows Server 2003, and Windows Vista Windows 9x The 32-bit Windows 95, Windows 98, and Windows. .. address: Software Media Fulfillment Department, Attn.: MCITP Microsoft Windows Vista Desktop Support Consumer Study Guide, Wiley Publishing, Inc., 104 75 Crosspoint Blvd., Indianapolis, IN 46256, or

Ngày đăng: 10/08/2014, 13:20

TỪ KHÓA LIÊN QUAN