Pearson MCSA 70 697 and 70 698 cert guide configuring windows devices 0789758806 kho tài liệu bách khoa

1.3K 176 0
Pearson MCSA 70 697 and 70 698 cert guide configuring windows devices 0789758806 kho tài liệu bách khoa

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Contents Chapter Introducing Windows 10 “Do I Know This Already?” Quiz Foundation Topics A Brief History of Windows Features Tour of Windows 10 A Quick Tour of Windows 10 Configuring Windows Updates Configure Updates in the Enterprise Exam Preparation Tasks Review All the Key Topics Definitions of Key Terms Chapter Implementing Windows “Do I Know This Already?” Quiz Foundation Topics Preparing for Installation Requirements Performing a Clean Installation Upgrading to Windows 10 Using Alternate Installation Media Installing Additional Windows Features Configuring Native Boot Scenarios Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter Post-Installation Configuration “Do I Know This Already?” Quiz Foundation Topics Configuring and Customizing the User Interface, According to Device Type Configuring Windows 10 Options Configuring Devices and Device Drivers Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter Managing Windows in an Enterprise “Do I Know This Already?” Quiz Foundation Topics Active Directory Windows in an Enterprise Environment Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter Installing and Managing Software “Do I Know This Already?” Quiz Foundation Topics Microsoft Account Windows Store and Cloud Apps Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter Windows 10 Networking “Do I Know This Already?” Quiz Foundation Topics Configuring TCP/IP Settings Configuring IP Settings Configuring Network Settings Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter Windows 10 Security “Do I Know This Already?” Quiz Foundation Topics Configuring Authentication and Authorization Supporting Authentication and Authorization Configuring NTFS Permissions Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter Windows 10 Data Security “Do I Know This Already?” Quiz Foundation Topics Support Data Security Encrypting File System Configuring Local Security Policy Security for Mobile Devices Exam Preparation Tasks Review All the Key Topics Complete Tables and Lists from Memory Definitions of Key Terms Chapter Managing User Data “Do I Know This Already?” Quiz Foundation Topics Configuring Data Storage Supporting Data Storage User Data Migration and Configuration Configuring Local, Roaming, and Mandatory Profiles Exam Preparation Tasks Review All the Key Topics Definitions of Key Terms Chapter 10 Windows Hyper-V “Do I Know This Already?” Quiz Foundation Topics Introduction to Virtualization Creating and Configuring Virtual Machines Creating and Managing Virtual Machine Checkpoints Creating and Configuring Virtual Switches Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter 11 Configuring and Securing Mobile Devices “Do I Know This Already?” Quiz Foundation Topics Configuring Offline Files and Sync Center Configuring Power Policies Configuring Windows To Go Configuring Wi-Fi Direct Exam Preparation Tasks Review All the Key Topics Complete Tables and Lists from Memory Definitions of Key Terms Chapter 12 Managing Mobile Devices “Do I Know This Already?” Quiz Foundation Topics Mobile Device Policies Managing Data Synchronization Managing Broadband Connectivity Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter 13 Microsoft Intune “Do I Know This Already?” Quiz Foundation Topics Microsoft Intune Administration Microsoft Intune Monitoring Deploying Software Updates Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter 14 Configuring File and Folder Access “Do I Know This Already?” Quiz Foundation Topics Configuring Data Encryption Using Encrypting File System (EFS) Configuring Disk Quotas Configuring Object Access Auditing Configuring Shared Resources Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter 15 Configuring Remote Access “Do I Know This Already?” Quiz Foundation Topics Configuring Remote Authentication Configuring Remote Desktop Settings Configuring VPN Authentication and Settings Configuring Remote Management Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter 16 Configuring and Maintaining Network Security “Do I Know This Already?” Quiz Foundation Topics Configuring Windows Firewall Configuring IPsec Security Rules Configuring Network Discovery Exam Preparation Tasks Review All the Key Topics Complete the Tables and Lists from Memory Definitions of Key Terms Chapter 17 Managing Mobile Apps “Do I Know This Already?” Quiz Foundation Topics Remote Desktop Services and RemoteApp Microsoft Azure RemoteApp Exam Preparation Tasks Review All the Key Topics Definitions of Key Terms Chapter 18 Managing Desktop Applications “Do I Know This Already?” Quiz Foundation Topics you can use to perform actions such as modifying the startup scheme, the default operating system that boots on a dual-boot computer, services that are enabled, and startup programs that run automatically You can also launch several computer management tools from this utility .msi file The installation file for an application that uses Windows Installer msinfo32 The command that opens the System Information program .msp file The installation file for a patch or hotfix used to update an application that uses Windows Installer .mst file A transform file that performs a scripting-like function for a Windows Installer package multicast IPv6 address An IPv6 address that enables the delivery of packets to each of multiple interfaces Network Address Translation (NAT) A specification in TCP/IP that maps the range of private IP addresses (192.168.0.1–192.168.0.254) to the public IP address of an Internet-facing network adapter Network and Sharing Center A feature of Windows 10 that provides a centralized location from which you can manage all networking tasks, such as connecting to networks and the Internet and sharing files and folders with users at other computers Network Discovery A feature of Windows networking used to allow computers to advertise themselves and locate and connect to other computers and network resources NIC Network Interface Card, or the hardware device used to connect the computer system to a media access layer of a network Although termed a “card”, many NICs are now integrated components of computers and other devices NTFS permissions The security feature available in NTFS that allows you to grant or deny local access rights non-uniform memory architecture (NUMA) A memory allocation technology that groups memory locations and processors into nodes to avoid performance issues caused by multiple processors attempting to access the same memory location, or accessing memory in a location slower to access for the processor that requests it Online Certificate Status Protocol (OCSP) A network standard for verifying the status of certificates, retrieving revocation lists, and obtaining the certificate trust change of a X.509 certificate Office 365 Microsoft’s cloud-based offering for delivering office software and other services to Windows clients offline files A feature built in to all modern Windows versions that enables you to cache locally stored copies of shared files and folders so that you can work with them while offline and resynchronize your changes when you go back online offline licensing Licensing model for store apps that allows you to deploy the apps locally to your systems without accessing the online Windows Store OneDrive A cloud-based, always-available storage and file sharing solution for Windows users online licensing The traditional licensing model that requires users to authenticate to the online Windows Store or Windows Store for Business to obtain a license and the app organizational unit (OU) An Active Directory container object that allows an administrator to logically group users, groups, computers, and other OUs into administrative units paging file Virtual memory stored on disk that enables Windows 10 to run more applications at one time than would be allowed by the computer’s physical memory (RAM) partition A configured section of a basic disk that is capable of being formatted with a file system and identified with a drive letter Password Authentication Protocol (PAP) The oldest remote access authentication protocol, which sends the user's credentials over the wire in clear text and can easily be sniffed off of the wire by an attacker password policy A series of Group Policy settings that determine password security requirements, such as length, complexity, and age performance counter A statistical measurement associated with a performance object such as % disk time, queue length, and so on Performance Monitor A Microsoft Management Console (MMC) application that contains several tools for monitoring your computer’s performance performance object Hardware or software components that the Performance Monitor can use for tracking performance data Personal Identification Number (PIN) Refers to any of a series of digital confirmation numbers required for use of a device or to supplement authentication of a device user Personal Identity Verification (PIV) A standard developed and published by the National Institute of Standards and Technology to specify the security and encryption attributes of smart cards and their functions PKCS #12 A file format for storing many cryptography objects in a file, typically a private key and public key To export a certificate from a Microsoft CA that includes a private key, the PKCS #12 format is used Public Key Infrastructure (PKI) A term for the various services and security devices used to implement encryption and identity certificates in an enterprise The basis for PKI in a Windows Active Directory domain is the Active Directory Certificate Services and related server roles Plug and Play (PnP) A standard developed by Microsoft and Intel that allows for automatic hardware installation detection and configuration in most Windows operating systems Point-to-Point Protocol (PPP) A dial-up protocol that supports TCP/IP and other protocols with advanced compression and encryption functions Point-to-Point Tunneling Protocol (PPTP) A protocol that is used to create VPN tunnels across a public network and includes encryption and authentication power plans A series of preconfigured power management options that control actions such as shutting off the monitor or hard disks or placing the computer in Sleep mode or hibernation PowerShell Remoting PowerShell Remoting is the framework within PowerShell and enabled by WinRM that allows administrators to run cmdlets and commands on remote computers primary partition A segment of the hard disk A maximum of four primary partitions may exist on a single basic disk Print Management A Microsoft Management Console (MMC) application that you can use to manage local and remote printers, print servers, jobs, queues, and drivers private store The section of the Windows Store for Business that is private to each organization and includes only the apps that the organization has made available to its users Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS) A remote access authentication and security protocol that provides an encrypted authentication channel, dynamic keying material from TLS, fast reconnect using cached session keys, and server authentication that protects against the setup of unauthorized access points provisioned apps LOB apps that have been added to a Windows image and available to all users of the device public folder sharing A simple Windows 10 folder sharing model that allows others on the network to access files in your Public folders of each Windows library (Documents, Pictures, Videos, and Music) Push-Button Reset A feature in Windows 10 used to refresh the operating system, back to the factory image Push-Button reset can optionally preserve user data, or it can be used to completely wipe any user files and settings from the device quality updates Traditional operating system updates, generally released on Patch Tuesday (the second Tuesday of each month), although they can be released at any time They contain items such as security, driver, and critical updates RAID-5 A combination of disk striping with parity data interleaved across three or more disks RAID-5 provides improved disk performance and is fault tolerant RD Connection Broker A component used for RemoteApp that handles connections from remote clients and directs them to the applications or desktops available RD Gateway An RDS component used for forwarding Internet-based clients to internal or private desktop services or RemoteApp applications RD Session Host Used for creating Remote Desktop sessions and hosting and streaming published applications to clients RD Web Access An RDS component that allows clients to connect to the desktop or RemoteApp services using a standard web browser Remote Desktop Services (RDS) A collection of software and services in Windows Server and Microsoft Azure that supports virtual desktops and RemoteApp streaming, and associated services recovery agent A user account that has been granted the authority to decrypt encrypted files Reliability Monitor A monitoring tool that provides a trend analysis of your computer’s system stability with time It shows how events such as hardware or application failures, software installations or removals, and so on affect your computer’s stability Remote Assistance A service available in Windows 10 that enables a user to share control of her computer with an administrator or other user to resolve a computer problem Remote Desktop A service available in Windows 10 Pro or Enterprise that allows a single remote control session of a computer running Windows XP, Vista, 7, 8.1, or Windows 10 Remote Desktop uses the Remote Desktop Protocol (RDP), which is the same protocol used in Terminal Services Remote Desktop Gateway (RD Gateway) A Windows Server feature that replaces the Terminal Services feature included with older versions of Windows Server RD Gateway enables you to connect to remote servers on the corporate network from any computer that is connected to the Internet remote wipe The process of deleting all private and personal information on a device connected to the Internet or other network, without any physical or direct access to the device Remote wipe is enabled at the server managing the device, and the next time the device attempts to connect to a network service it receives a signal and initiates the wipe and reset process RemoteApp client Used by Windows computers to access Azure RemoteApp services and applications Resource Monitor A monitoring tool that provides a summary of CPU, disk, network, and memory performance statistics, including mini-graphs of recent performance of these four components as well as tabulated data pertaining to each roaming profile A user profile that is stored on a shared folder on a server so that a user receives the Registry settings and files for his desktop interface regardless of the computer on which he logs on Software as a Service (SaaS) A cloud service that allows users to use software over the Internet without installing it locally Office 365 is an example of SaaS Safe Mode A method of starting Windows 10 with only the basic drivers enabled, so that you can troubleshoot problems that prevent Windows from starting normally System Center Configuration Manager (SCCM) A system management product developed by Microsoft for managing large groups of computers Secure Boot Secure Boot is a technology in Windows 10 that protects the pre-OS environment of a computer to ensure that all drivers and system loaders are authenticated and secure Secure Socket Tunneling Protocol (SSTP) A tunneling protocol that uses Secure Hypertext Transfer Protocol (HTTPS) over TCP port 443 to transmit traffic across firewalls and proxy servers that might block PPTP and L2TP traffic service pack A collection of updates and fixes to a software package, usually available via download from the Internet Service packs are available for download from Microsoft and when using the Microsoft automated update service Service Set Identifier (SSID) A network name that identifies a wireless access point settings location template A template used by UE-V to determine where the settings for a specific application are located so that they can be saved to a central store Setup.exe The application that installs Windows 10 on a new computer or updates an older Windows computer to Windows 10 Also frequently used as a routine for installing applications shadow copies Backup copies of files and folders automatically created by Windows as you work on them, enabling File History to back them up to another location, even while you are working on them shared folder permissions The security feature available when sharing files and folders across a network that allows you to grant or deny access rights to network users shared folders Folders that are made available for access by users who are working at another computer on the network shim A compatibility fix that is used to enable an application originally written for an older Windows version to function properly when running in Windows 10 sideloading The process of installing a UWP or other app to a device without installing it through an online vendor’s store Sigverif.exe A utility that checks your computer for unsigned device drivers single pane of glass Refers to the concept of using a single UI or user interface with multiple back-end services The complexity of all the connections and interactions is hidden from the user, simplifying administrative tasks site A physical component of Active Directory that includes computers and other resources at a single geographical location and connected with fast LAN links Sites are created for the purpose of balancing logon authentication with replication site-local IPv6 address An IPv6 address that is private to the network on which it is located This type of address cannot be accessed from locations external to its network, such as the Internet Second Level Address Translation (SLAT) A processor feature, also known as Rapid Virtualization Indexing (RVI), improves processor performance by managing memory with additional indexes or lookup tables sleep mode A condition in which the computer consumes low power but is available for use Sleep mode saves configuration information to memory and powers down the monitor, disks, and several other hardware components Software License Manager (SLMGR) A script named slmgr.vbs that can be used to query activation states and manage activation using the command line Smart Paging A technique used in Hyper-V that minimizes the risk of running out of memory during virtual machine startup operations by swapping some of the requests for physical memory out to a special file on the disk drive SmartScreen A feature in Windows 10 and Internet Explorer that works in conjunction with dynamically updated online databases to track malicious software and phishing sites to warn users of potential malware and identity theft sites special access permissions A granular set of NTFS security permissions that enables a single type of access only Regular NTFS permissions are a combination of special access permissions startup repair A utility that provides a diagnostics-based, step-by-step troubleshooter that enables end users and tech support personnel to rapidly diagnose and repair problems that are preventing a computer from starting normally storage pool A set of physical disk drives grouped together and used as the storage capacity for virtual storage spaces storage space A virtual disk volume, optionally with resiliency, created from a pool of physical disks and used as a single disk drive striping A method of segmenting data and interleaving it across multiple disks, which has the effect of improving disk performance, but is not fault tolerant subnet mask A set of numbers, 32-bits in length, that begins with 1s and ends with 0s in binary notation The number of 1s represents the number of bits that are considered the subnet address The bits that are 0s are the host address Using a subnet mask, you can create more subnets with a smaller number of computers per subnet All computers on a given subnet must have the same subnet mask Using dotted decimal notation, a subnet mask is written as 255.255.0.0 (which is the default mask for a Class B address) Sync Center A program on mobile computers that synchronizes data with other network devices, including servers, desktop computers, and other portable computers synchronization conflicts Occur when two users have modified a file that is available offline and Windows detects that conflicting modifications have occurred Windows 10's Sync Center enables you to save either or both of these versions synchronizing files The act of copying files from a shared folder on the network to an offline files cache on a computer or copying the same files back to the shared folder after a user has modified them system access control list (SACL) A list of actions that trigger audit events System Configuration Utility A tool that enables you to perform actions such as modifying the startup scheme, the default operating system that boots on a dual-boot computer, services that are enabled, and startup programs that run automatically You can also launch several computer management tools from this utility Started with the Msconfig.exe command System Protection A troubleshooting tool that provides several options for retaining copies of system files and settings so that you can configure how System Restore works to restore your computer to an earlier point in time System Restore A troubleshooting tool that enables you to restore your computer to an earlier time at which it was operating properly Task Manager A Windows 10 administrative utility that provides data about currently running processes, including their CPU and memory usage, and enables you to modify their priority or to shut down misbehaving applications You can also manage services, including starting, stopping, enabling, and disabling them, obtain information on network utilization, and display users with sessions running on the computer Task Scheduler Tool used to schedule and automate tasks to perform a specific function at a specific time Teredo A tunneling communication protocol that enables IPv6 connectivity between IPv6/IPv4 nodes across network address translation (NAT) interfaces, thereby improving connectivity for newer IPv6-enabled applications on IPv4 networks Temporal Key Integrity Protocol (TKIP) An encryption standard used for wireless networking It was the first successor to the weaker WEP encryption standard and incorporates several features to ensure unique encryption keys for every data packet, making it a much more challenging encryption methodology compared to WEP tree A collection of Active Directory domains that form a contiguous namespace A tree is contained within a forest, and multiple trees can exist within a forest UEFI The Unified Extensible Firmware Interface is a specification designed as a replacement for the older BIOS firmware on PCs It defines the services and interface points between the computer firmware and the operating system User Experience Virtualization (UE-V) A technology that can be used in an organization to save user’s Windows and application settings to a central location and synchronize the settings across devices and sessions USB recovery drive A USB thumb drive or portable hard drive on which copies of files required to start your computer are used if a problem has prevented your computer from starting properly User Account Control (UAC) A feature in Windows 8.1 that enables you to work with a nonadministrative user account UAC displays a prompt that requests approval when you want to perform an administrative task Should malicious software attempt to install itself or perform undesirable actions, you receive a prompt that you can use to prevent such actions from occurring First introduced in Windows Vista, UAC has been updated in Windows 8.1 to provide new configuration options and reduce the number of prompts user profile A series of user-specific settings that is composed of desktop settings, files, application data, and the specific environment established by the user Universal Windows Platform (UWP) A new style of app created by Microsoft These apps are hosted by the Microsoft Store, or developers can create LOB apps and sideload them to devices UWP apps work on any type of Windows 10 device, as well as Xbox, and Microsoft Hololens Virtual Desktop Infrastructure (VDI) A Microsoft technology used to virtualize desktops in a centralized delivery solution VDI makes use of virtualization technology to store and run desktop workloads in a serverbased VM Verify.exe A utility used for low-level debugging of device driver issues VFD Virtual floppy disk, a representation of a floppy disk images store on a disk file virtual hard disk (VHD) A representation of a hard drive of specific geometry stored in a disk file VHDX A new format for virtual hard disks optimized for use by Hyper-V virtual machines virtual machine A computer running inside another operating system or hypervisor, sharing the hardware resources of the host and behaving as it would running on a physical computer Virtual Private Network (VPN) A remote access connection technology that uses a protocol such as Point-to-Point Tunneling Protocol or L2TP with IPsec to tunnel through a public network to connect to a private network and maintain a secure connection virtual switch A software representation of a network switch, configured in software and used to connect virtual machines in a Hyper-V environment virtualization The process of creating software representations of physical computer components that behave like their physical counterparts VLAN Virtual LANs are creating by use of special routing or virtual switches that tag network packets with VLAN ID numbers which are then used to divide a network space into individual and separate LAN segments volume A logical drive that has been formatted for use by a file system Although often considered synonymous with “partition,” a volume is most specifically a portion of a dynamic disk, or multiple sections of dynamic disks, that is capable of being formatted with a file system and being identified with a drive letter wireless access point (WAP) A router or other device that broadcasts wireless signals to computers on a wireless local area network (WLAN) Also known as an access point or AP Computers connecting through a WAP are members of an infrastructure (as opposed to ad hoc) wireless network wbadmin A command-line utility that provides a comprehensive system backup function in a scriptable form Wired Equivalent Privacy (WEP) The original encryption standard used on 802.11 wireless networks It has a number of vulnerabilities that have prompted security experts to recommend against its use whenever possible Wi-Fi Direct A new industry standard connectivity technology in Windows 8.1 that enables data and content sharing between devices and PCs on a peerto-peer network that does not require separate Wi-Fi access points Wi-Fi Protected Access (WPA) A wireless authentication protocol that uses preshared network key encryption to ensure that only authorized users receive access to the network There are several flavors, including WPA2Personal and WPA2-Enterprise Wi-Fi triangulation A technique that sweeps the current area for Wi-Fi access points and cross-references the information, including the strength of each signal, with a database of locations to determine the location of a computer in range of those access points Windows Firewall The personal firewall software incorporated in Windows 10 that filters incoming TCP/IP traffic Windows Firewall was first introduced in Windows XP SP2 Windows Firewall with Advanced Security A Microsoft Management Console (MMC) snap-in that enables you to configure comprehensive firewall rules specifying conditions for external connection to your computer Default inbound, outbound, and connection security rules are provided; you can modify these rules or create new rules as required Windows Hardware Certification Program A Microsoft program that identifies all hardware certified to run properly on Windows 10 computers It replaces the Windows Logo program previously used Windows PowerShell An enhanced task-based command-line scripting interface that enables you to perform a large number of remote management tasks Windows Recovery Environment (Windows RE) A parallel, minimum Windows installation that enables you to boot your computer when your Windows 10 installation will not start by any of the other advanced startup modes You can perform advanced recovery operations when you have booted into Windows RE Windows Server Update Services (WSUS) A service that can be configured to run on a server, supplying updates, hotfixes, and other patches automatically to computers on a network WSUS enables you to deploy and manage updates that are downloaded from the Microsoft Windows Update website to WSUS servers running on your own network Client computers connect to the local WSUS server to download and install updates Windows Store for Business A subscription service for organizations, which they can use to manage and deploy LOB or volume-purchased apps for their employees Windows To Go A bootable version of Windows 10 contained on a USB drive It includes all operating system files, applications, and Windows settings and can be used to boot a computer with the appropriate hardware into Windows 10, independently of the operating system installed on this computer Windows Update A Windows Settings utility that enables you to maintain your computer in an up-to-date condition by automatically downloading and installing critical updates as Microsoft publishes them Windows XP Mode The basic virtualization technology introduced in Windows Vista for running an instance of Windows XP within a Vista or Windows operating system Replaced by Client Hyper-V in Windows 10 Wired Equivalent Privacy (WEP) A protocol that is used on 802.11-based wireless networks to encrypt data sent between computers on a wireless network or between a computer and its access point WEP is better security than an open network but is considered less secure than WPA wireless network profile A series of configuration settings that determines the extent of access to external computers according to your computer's location Windows enables you to create profiles for Home, Work, and Public locations wireless local area network (WLAN) Is synonymous with a local area network (LAN) using wireless equipment and signaling Work Folders A technology introduced for Windows Server 2012 R2 that allows users to sync files on their local device with a secure location on a Windows Server Wi-Fi Protected Access (WPA and WPA2) A security protocol developed by the Wi-Fi Alliance to secure wireless networks WPA2 incorporates stronger AES-based encryption and devices are subject to security certification by the Wi-Fi Alliance WPA is no longer supported in Windows 10 Windows Server Update Services (WSUS) A service developed by Microsoft that enables administration and distribution of updates to a large number of computers in an organization ... system Windows 10, take a look at “Why Is It Called Windows 10 and Not Windows 9?” at www.extremetech.com/computing/191279-why-isit-called -windows- 10-not -windows- 9 Windows 10 Editions Windows. .. similar to Windows 10 Pro; it adds a Set Up School PCs app and removes Cortana and some Windows Store functionality • Windows 10 Enterprise: Similar to Windows 10 Pro and descended from Windows. .. recent Windows At the same time, Microsoft developed an industrial-strength, 32-bit networking system known as Windows NT Starting with Windows NT 3.1 and progressing to Windows NT 3.5 and Windows

Ngày đăng: 09/11/2019, 01:00

Từ khóa liên quan

Mục lục

  • Chapter 1. Introducing Windows 10

  • Chapter 2. Implementing Windows

  • Chapter 3. Post-Installation Configuration

  • Chapter 4. Managing Windows in an Enterprise

  • Chapter 5. Installing and Managing Software

  • Chapter 6. Windows 10 Networking

  • Chapter 7. Windows 10 Security

  • Chapter 8. Windows 10 Data Security

  • Chapter 9. Managing User Data

  • Chapter 10. Windows Hyper-V

  • Chapter 11. Configuring and Securing Mobile Devices

  • Chapter 12. Managing Mobile Devices

  • Chapter 13. Microsoft Intune

  • Chapter 14. Configuring File and Folder Access

  • Chapter 15. Configuring Remote Access

  • Chapter 16. Configuring and Maintaining Network Security

  • Chapter 17. Managing Mobile Apps

  • Chapter 18. Managing Desktop Applications

  • Chapter 19. Monitoring and Managing Windows

  • Chapter 20. Configuring System Recovery Options

Tài liệu cùng người dùng

Tài liệu liên quan