MCSE PRACTICALS : to download :
http://www.4shared.com/file/jZ68hmo9/MCSE_PRACTICALS.html
INFI-NITE,Ranchi is a humble initiative towards achieving the goal of technical expertise and brilliance both and to enable the millions of users worldwide to present an approach of Indian Minds .
KINDLY REPLY HOW YOU LIKE IT
Programming Tutorials on different platforms
Any general and specialized interesting programming language training and exploration .
Fun with knowledge .
Search This Blog
Friday, June 18, 2010
AUTHOR'S DISCLAIMER :IMPORTANT
Warning! Disclaimer
The creator of THIS PAGE or the ISP(s) hosting any content on this site takes NO responsibility for the way you use the content provided on this site. These files and anything else on this site are here for private purposes only and, if you want to use a software for business purpose, please purchase it from your local retailer or software author. Nothing on this page is illegal the way it is. If you use this site content for anything other than educational purposes, the owner of this site is not responsible for your actions or anything as a result of your actions. Misuse could result in breaking the law so use it at your own risk!!! DOWNLOAD AT YOUR OWN RISK!!! DO NOT ENTER If you are not agreeing to these terms (Disclaimer) you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site.
This site was created as a service to those who don’t find it difficult to choose and purchase the particular software application that suits them and don’t have the idea from where they can have them. It is not the purpose of this site to infringe on anybody's created application rights . If you are creator of any such software, and a stuff of yours is listed here, and it is not your intention to make it freely available, please contact me at techinfiniteonline@gmail.com and the link will be removed. I do not host many of these stuff nor do I have any control over those hosting them. I am merely listing links that I have found from numerous Search engines.
The creator of THIS PAGE or the ISP(s) hosting any content on this site takes NO responsibility for the way you use the content provided on this site. These files and anything else on this site are here for private purposes only and, if you want to use a software for business purpose, please purchase it from your local retailer or software author. Nothing on this page is illegal the way it is. If you use this site content for anything other than educational purposes, the owner of this site is not responsible for your actions or anything as a result of your actions. Misuse could result in breaking the law so use it at your own risk!!! DOWNLOAD AT YOUR OWN RISK!!! DO NOT ENTER If you are not agreeing to these terms (Disclaimer) you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site.
This site was created as a service to those who don’t find it difficult to choose and purchase the particular software application that suits them and don’t have the idea from where they can have them. It is not the purpose of this site to infringe on anybody's created application rights . If you are creator of any such software, and a stuff of yours is listed here, and it is not your intention to make it freely available, please contact me at techinfiniteonline@gmail.com and the link will be removed. I do not host many of these stuff nor do I have any control over those hosting them. I am merely listing links that I have found from numerous Search engines.
MCP SYLLABUS :
Contents at a Glance
Introduction xxi
Assessment Test xxxiv
Chapter 1
Getting Started with Windows XP Professional 1
Chapter 2
Automating the Windows XP Installation 37
Chapter 3
Upgrading to Windows XP Professional 93
Chapter 4
Configuring the Windows XP Environment 117
Chapter 5
Managing the Windows XP Professional Desktop 169
Chapter 6
Managing Users and Groups 195
Chapter 7
Managing Security 237
Chapter 8
Managing Disks 279
Chapter 9
Accessing Files and Folders 335
Chapter 10
Managing Network Connections 389
Chapter 11
Managing Printing 439
Chapter 12
Dial-Up Networking and Internet Connectivity 481
Chapter 13
Optimizing Windows XP 551
Chapter 14
Performing System Recovery Functions 605
Glossary
679
Index 718
Contents
Introduction xxi
Assessment Test xxxiv
Chapter 1 Getting Started with Windows XP Professional 1
Preparing to Install Windows XP Professional 2
Hardware Requirements 3
The Hardware Compatibility List (HCL) 5
BIOS Compatibility 6
Driver Requirements 6
Clean Install or Upgrade? 6
Installation Options 7
Choosing Your Installation Method 10
Running the Windows XP Professional Installation Process 11
Collecting Information 12
Preparing Installation 12
Installing Windows XP Professional 12
Finalizing Installation 14
Using Automatic Updates 17
Using Product Activation 17
Using Windows Update 18
Accessing Windows Update 18
Other Windows Update Options 19
Windows Service Packs 23
Troubleshooting Installation Problems 23
Identifying Common Installation Problems 24
Troubleshooting Installation Errors with
the
Boot.ini
File 25
Installing Non-Supported Hard Drives 26
Troubleshooting with Installation Log Files 26
Supporting Multiple-Boot Options 27
Summary 28
Exam Essentials 28
Review Questions 29
Answers to Review Questions 34
Chapter 2 Automating the Windows XP Installation 37
Choosing Automated Deployment Options 38
An Overview of Unattended Installation 39
An Overview of Remote Installation 40
An Overview of the System Preparation Tool
and Disk Imaging 42
Contents
ix
Summary of Windows XP Professional
Deployment Options 44
Accessing the Windows XP Professional Deployment Tools 45
Deploying Unattended Installations 47
Using Remote Installation Services (RIS) 49
RIS Client Options 50
Preparing the RIS Server 51
Preparing the RIS Client 59
Installing Windows XP Professional through RIS 60
Using the System Preparation Tool to Create Disk Images 61
Preparing for Disk Duplication 61
Using the System Preparation Tool 62
Using Setup Manager to Create Answer Files 66
Options That Can Be Configured through Setup Manager 66
Creating Answer Files with Setup Manager 67
Manually Editing Unattended Answer Files 72
Installing Applications with Windows Installer Packages 78
Copying the MSI Application to a Share 79
Creating a Group Policy Object 79
Filtering the Group Policy Object 80
Adding the Package to the Group Policy Object 81
Installing a Published Application 83
Summary 85
Exam Essentials 85
Review Questions 86
Answers to Review Questions 90
Chapter 3 Upgrading to Windows XP Professional 93
Deciding Whether to Upgrade 94
Preparing to Upgrade to Windows XP Professional 95
Client Upgrade Paths and Requirements 95
Upgrade Considerations for Windows NT 4 Workstation
and Windows 2000 Professional 96
Upgrade Considerations for Windows 98 and Windows Me 96
An Upgrade Checklist 99
Performing the Windows XP Upgrade 100
Migrating Files and Settings 102
Migrating User Data 103
Overview of the User State Migration Tool 103
Requirements for the User State Migration Tool 104
Using the User State Migration Tool 105
Troubleshooting XP Professional Upgrades 106
Incompatible Hardware Drivers 106
Incompatible Software Applications 107
User Settings Lost after Upgrade 108
Reversing a Windows XP Professional Upgrade 108
x
Contents
Summary 108
Exam Essentials 109
Review Questions 110
Answers to Review Questions 115
Chapter 4 Configuring the Windows XP Environment 117
New Device and Hardware Support for Windows XP 118
Windows Image Acquisition Architecture 118
Support for Digital Audio and Video 121
Dualview Multi-Monitor Support 121
Windows XP Management Utilities 121
Microsoft Management Console 121
Registry Editor 124
Device Manager 125
Installing Hardware 127
Installing Plug and Play Devices 128
Installing Non–Plug and Play Devices 128
Managing Device Drivers 129
Updating Drivers 129
Managing Driver Signing 130
Managing Disk Devices 132
Managing DVD and CD-ROM Devices 133
Managing Removable Media 134
Managing Display Devices 134
Configuring Video Adapters 134
Using Multiple-Display Support 137
Managing Mobile Computer Hardware 138
Power Management 138
Managing Card Services 145
Managing I/O Devices 146
Configuring the Keyboard 146
Configuring the Mouse 147
Configuring Wireless Devices 148
Managing USB Devices 149
Managing Imaging Devices 150
Managing Processors 152
Configuring Fax Support 153
Setting Fax Properties 153
Starting the Fax Service 154
Troubleshooting Devices 155
Managing Windows XP Services 155
Managing Multiple Hardware Profiles 159
Summary 160
Exam Essentials 160
Review Questions 162
Answers to Review Questions 166
Contents
xi
Chapter 5 Managing the Windows XP Professional Desktop 169
Managing Desktop Settings 170
Customizing the Taskbar and Start Menu 172
Using Shortcuts 176
Setting Display Properties 176
Managing Multiple Languages and Regional Settings 179
Using Multilingual Technology 179
Choosing Windows XP Multiple-Language Support 180
Enabling and Configuring Multilingual Support 181
Configuring Accessibility Features 183
Setting Accessibility Options 183
Using Accessibility Utilities 185
Summary 187
Exam Essentials 188
Review Questions 189
Answers to Review Questions 193
Chapter 6 Managing Users and Groups 195
Overview of Windows XP User Accounts 196
Built-in Accounts 197
Local and Domain User Accounts 197
Logging On and Logging Off 198
Local User Logon Authentication 198
Logging Off Windows XP Professional 199
Working with User Accounts 200
Using the Local Users and Groups Utility 200
Creating New Users 201
Disabling User Accounts 205
Deleting User Accounts 206
Renaming User Accounts 208
Changing a User’s Password 208
Managing User Properties 209
Managing User Group Membership 209
Setting Up User Profiles, Logon Scripts, and Home Folders 211
Troubleshooting User Accounts Authentication 215
Troubleshooting Local User Account Authentication 216
Domain User Accounts Authentication 217
Caching Logon Credentials 218
Creating and Managing Groups 219
Using Built-in Groups 219
Default Local Groups 219
Special Groups 223
Working with Groups 224
Renaming Groups 228
Deleting Groups 228
Summary 229
xii
Contents
Exam Essentials 230
Review Questions 231
Answers to Review Questions 235
Chapter 7 Managing Security 237
Options for Managing Security Configurations 238
Group Policy Objects and Active Directory 239
Active Directory Overview 239
GPO Inheritance 240
Using the Group Policy Result Tool 241
Applying LGPOs 242
Using Account Policies 244
Using Local Policies 248
Analyzing System Security 264
Specifying a Security Database 264
Importing a Security Template 265
Performing a Security Analysis 267
Reviewing the Security Analysis and
Resolving Discrepancies 267
Using Windows Security Center 270
Summary 270
Exam Essentials 271
Review Questions 272
Answers to Review Questions 276
Chapter 8 Managing Disks 279
Configuring File Systems 280
File System Selection 281
File System Conversion 283
Configuring Disk Storage 285
Basic Storage 285
Dynamic Storage 285
Using the Disk Management Utility 288
Managing Basic Tasks 289
Managing Basic Storage 302
Managing Dynamic Storage 302
Troubleshooting Disk Management 303
Managing Data Compression 305
Using the Compact Command-Line Utility 307
Using Compressed (Zipped) Folders 308
Setting Disk Quotas 308
Configuring Disk Quotas 309
Monitoring Disk Quotas 313
Managing Data Encryption with EFS 314
New EFS Features in Windows XP and
Windows Server 2003 314
Contents
xiii
Encrypting and Decrypting Folders and Files 314
Managing EFS File Sharing 315
Using the DRA to Recover Encrypted Files 317
Using the
Cipher
Utility 319
Using the Disk Defragmenter Utility 321
Analyzing Disks 322
Defragmenting Disks 323
Using the Disk Cleanup Utility 323
Troubleshooting Disk Devices and Volumes 324
Summary 326
Exam Essentials 326
Review Questions 328
Answers to Review Questions 332
Chapter 9 Accessing Files and Folders 335
File and Folder Management Basics 336
Organizing Files and Folders 336
Managing Folder Options 340
Searching for Files and Folders 352
Managing Local Access 354
Design Goals for Access Control 354
Applying NTFS Permissions 354
Understanding Ownership and Security Descriptors 360
Determining Effective Permissions 361
Viewing Effective Permissions 364
Determining NTFS Permissions for Copied or Moved Files 365
Managing Network Access 365
Creating Shared Folders 365
Configuring Share Permissions 367
Using the Shared Documents Folder 369
Managing Shares with the Shared Folders Utility 369
Creating New Shares 371
Providing Access to Shared Resources 373
The Flow of Resource Access 376
Access Token Creation 377
DACLs and ACEs 377
Local and Network Resource Access 378
Summary 379
Exam Essentials 380
Review Questions 381
Answers to Review Questions 387
Chapter 10 Managing Network Connections 389
Installing and Configuring Network Adapters 390
Installing a Network Adapter 390
Configuring a Network Adapter 391
xiv
Contents
Managing Authentication 396
Managing Advanced Configuration Properties 396
Managing Network Bindings 398
Troubleshooting Network Adapters 398
Supporting Wireless Network Connections 400
Configuring Wireless Network Settings 400
Configuring Security for a Small Wireless Network 403
Overview of Network Protocols 405
Overview of TCP/IP 406
Options for Deploying TCP/IP Configurations 412
Additional TCP/IP Features and Options 421
Using NWLink IPX/SPX/NetBIOS 427
Summary 429
Exam Essentials 429
Review Questions 430
Answers to Review Questions 437
Chapter 11 Managing Printing 439
Printing Basics 440
The Windows XP Printing Process 441
The Roles of Print Devices and Printers 443
Setting Up Printers 443
Managing Printer Properties 449
Configuring General Properties 449
Configuring Sharing Properties 453
Configuring Port Properties 454
Configuring Advanced Properties 456
Separator Pages 461
Security Properties 462
Print Permission Assignment 464
Advanced Settings 465
Device Settings Properties 466
Managing Printers and Print Documents 467
Managing Printers 467
Managing Print Documents 468
Connecting to Printers 470
Troubleshooting Printing 471
Summary 472
Exam Essentials 472
Review Questions 474
Answers to Review Questions 479
Chapter 12 Dial-Up Networking and Internet Connectivity 481
Overview of Dial-Up Networking 482
Understanding Connection Options 483
Contents
xv
Local Area Network Connections 484
Remote Access Connections 485
Virtual Private Network Connections 485
Wide Area Network Connections 486
Direct Cable Connections 486
Incoming Connection 487
Understanding Remote Access Security 487
Authentication Methods 487
Remote Data Encryption Options 489
Setting Up a Modem 489
Configuring General Modem Properties 490
Configuring Modem Properties 491
Running Modem Diagnostics 491
Configuring Advanced Modem Properties 491
Viewing Driver Details and Updating Drivers 495
Viewing Modem Resources 496
Using the New Connection Wizard 496
Creating a Connection to a Remote Access Server 497
Creating a RAS Connection 498
Managing the Properties of a RAS Connection 500
Troubleshooting Remote Access Connections 507
Creating a Connection to the Internet 508
Using Virtual Private Network Connections 508
Using Internet Connection Sharing 512
Configuring Internet Connection Sharing on
the Host Computer 513
Configuring Internet Connection Sharing on
the Network Computers 515
Troubleshooting Internet Connection Sharing 516
Using an Internet Connection Firewall Without a
Service Pack or with Service Pack 1 517
Using Windows Firewall 518
Configuring and Managing Internet Explorer 521
Accessing Resources through Internet Explorer 521
Configuring Internet Explorer 522
Managing Internet Printers 528
Overview of Internet Information Services 530
Installing Internet Information Services 530
Managing a Website 531
Troubleshooting Website Access 541
Summary 542
Exam Essentials 542
Review Questions 543
Answers to Review Questions 548
xvi
Contents
Chapter 13 Optimizing Windows XP 551
Overview of System Monitoring Tools 552
Creating Baselines 552
Identifying System Bottlenecks 553
Determining Trends 553
Testing Configuration Changes or Tuning Efforts 554
Using Alerts for Problem Notification 554
Using System Monitor 554
Selecting the Appropriate View 557
Adding Counters 559
Managing System Monitor Properties 561
Using Performance Logs and Alerts 564
Creating a Counter Log 565
Creating a Trace Log 567
Creating an Alert 570
Managing System Performance 572
Monitoring and Optimizing Memory 572
Monitoring and Optimizing the Processor 576
Monitoring and Optimizing the Disk Subsystem 578
Monitoring and Optimizing the Network Subsystem 580
Creating Baseline Reports 581
Minimizing the Performance Effects of System Monitoring 583
Using the System Tool in Control Panel 584
Using Task Manager 586
Managing Application Tasks 586
Managing Process Tasks 587
Managing Performance Tasks 590
Managing Networking Tasks 591
Scheduling Tasks 591
Managing Scheduled Task Properties 593
Troubleshooting Scheduled Tasks 596
Summary 597
Exam Essentials 597
Review Questions 598
Answers to Review Questions 603
Chapter 14 Performing System Recovery Functions 605
Safeguarding Your Computer and Recovering from Disaster 607
Using Event Viewer 609
Reviewing Event Types 610
Getting Event Details 611
Managing Log Files 612
Setting Log File Properties 613
Understanding the Windows XP Professional Boot Process 617
Reviewing the
x
86-Based Boot Process 618
Contents
xvii
Configuring the
BOOT.INI
File 623
Reviewing the Itanium Boot Process 629
Managing NVRAM Startup Settings 631
Creating the Windows XP Boot Disk 631
Using Advanced Startup Options 633
Starting in Safe Mode 633
Enabling Boot Logging 635
Using Other Advanced Options Menu Modes 637
Using Driver Rollback 638
Using Startup and Recovery Options 639
Using the Dr. Watson Utility 641
Using the Backup Utility 643
Using the Backup Wizard 644
Configuring Backup Options 645
Using the Restore Wizard 650
Using the Automated System Recovery Wizard 651
Using System Restore 652
Using the Recovery Console 654
Starting the Recovery Console 654
Working with the Recovery Console 656
Using Remote Desktop and Remote Assistance 659
Using Remote Desktop 659
Using Remote Assistance 664
Summary 670
Exam Essentials 670
Review Questions 672
Answers to Review Questions 676
Glossary
679
Index 718
Table of Exercises
Exercise 1.1
Installing Windows XP Professional . . . . . . . . . . . . . . . .15
Exercise 1.2
Troubleshooting Failed Installations with Setup Logs . . . . . . . . .26
Exercise 2.1
Extracting the Windows XP Deployment Tools . . . . . . . . . . . .46
Exercise 2.2
Using the System Preparation Tool . . . . . . . . . . . . . . . . .64
Exercise 2.3
Installing Windows XP Professional from a Disk Image . . . . . . . .65
Exercise 2.4
Publishing an Application with Windows Installer . . . . . . . . . . .83
Exercise 2.5
Installing a Published Application . . . . . . . . . . . . . . . . .84
Exercise 3.1
Upgrading to Windows XP Professional . . . . . . . . . . . . . . 102
Exercise 4.1
Updating a Device Driver . . . . . . . . . . . . . . . . . . . . 129
Exercise 4.2
Managing Driver Signing . . . . . . . . . . . . . . . . . . . . 132
Exercise 4.3
Managing Disk Devices . . . . . . . . . . . . . . . . . . . . . 133
Exercise 4.4
Viewing Video Adapter Settings . . . . . . . . . . . . . . . . . 136
Exercise 4.5
Configuring Multiple-Display Support. . . . . . . . . . . . . . . 137
Exercise 4.6
Configuring Power Management Support . . . . . . . . . . . . . 144
Exercise 4.7
Configuring I/O Devices . . . . . . . . . . . . . . . . . . . . 148
Exercise 4.8
Managing and Monitoring Imaging Devices . . . . . . . . . . . . 151
Exercise 4.9
Configuring Multiple Processors . . . . . . . . . . . . . . . . . 152
Exercise 4.10
Using the Troubleshooter Wizard . . . . . . . . . . . . . . . . 155
Exercise 5.1
Configuring Taskbar and Start Menu Options . . . . . . . . . . . 175
Exercise 5.2
Creating a Shortcut . . . . . . . . . . . . . . . . . . . . . . 176
Exercise 5.3
Configuring Display Options . . . . . . . . . . . . . . . . . . 178
Exercise 5.4
Configuring Locale Settings . . . . . . . . . . . . . . . . . . . 182
Exercise 5.5
Using Accessibility Features. . . . . . . . . . . . . . . . . . . 187
Exercise 6.1
Accessing the Local Users and Groups Utility . . . . . . . . . . . 200
Exercise 6.2
Creating New Local Users . . . . . . . . . . . . . . . . . . . 204
Exercise 6.3
Disabling a User . . . . . . . . . . . . . . . . . . . . . . . 206
Exercise 6.4
Deleting a User . . . . . . . . . . . . . . . . . . . . . . . . 207
Exercise 6.5
Renaming a User . . . . . . . . . . . . . . . . . . . . . . . 208
Exercise 6.6
Changing a User’s Password . . . . . . . . . . . . . . . . . . 209
Exercise 6.7
Adding a User to a Group . . . . . . . . . . . . . . . . . . . . 210
Exercise 6.8
Using Local Profiles . . . . . . . . . . . . . . . . . . . . . . 212
Exercise 6.9
Assigning a Home Folder to a User . . . . . . . . . . . . . . . . 215
Exercise 6.10
Troubleshooting User Authentication . . . . . . . . . . . . . . . 218
Table of Exercises
xix
Exercise 6.11
Creating Local Groups. . . . . . . . . . . . . . . . . . . . . .226
Exercise 6.12 Adding Users to a Local Group . . . . . . . . . . . . . . . . . .227
Exercise 6.13 Renaming a Local Group . . . . . . . . . . . . . . . . . . . .228
Exercise 6.14 Deleting a Local Group . . . . . . . . . . . . . . . . . . . . .229
Exercise 7.1 Adding the Local Computer Policy Snap-In to the MMC . . . . . . . .243
Exercise 7.2 Setting Password Policies . . . . . . . . . . . . . . . . . . . .246
Exercise 7.3 Setting Account Lockout Policies . . . . . . . . . . . . . . . . .247
Exercise 7.4 Setting Audit Policies . . . . . . . . . . . . . . . . . . . . . .251
Exercise 7.5 Setting User Rights . . . . . . . . . . . . . . . . . . . . . . .255
Exercise 7.6 Defining Security Options . . . . . . . . . . . . . . . . . . . .263
Exercise 7.7 Using the Security Configuration and Analysis Tool . . . . . . . . .268
Exercise 8.1 Converting a FAT16 Partition to NTFS . . . . . . . . . . . . . . .284
Exercise 8.2 Creating a New Partition . . . . . . . . . . . . . . . . . . . . .299
Exercise 8.3 Editing a Drive Letter . . . . . . . . . . . . . . . . . . . . . .301
Exercise 8.4 Compressing and Uncompressing Folders and Files . . . . . . . . .306
Exercise 8.5 Applying Default Quota Limits . . . . . . . . . . . . . . . . . .311
Exercise 8.6 Applying Individual Quota Limits . . . . . . . . . . . . . . . . .313
Exercise 8.7 Using EFS to Manage Data Encryption . . . . . . . . . . . . . . .315
Exercise 8.8 Using the CIPHER Utility . . . . . . . . . . . . . . . . . . . . .320
Exercise 8.9 Analyzing and Defragmenting Disks . . . . . . . . . . . . . . . .323
Exercise 8.10 Using the Disk Cleanup Utility . . . . . . . . . . . . . . . . . .324
Exercise 8.11 Using the Check Disk Utility . . . . . . . . . . . . . . . . . . .325
Exercise 9.1 Creating a Directory and File Structure . . . . . . . . . . . . . . .338
Exercise 9.2 Configuring Offline Files and Folders . . . . . . . . . . . . . . .351
Exercise 9.3 Configuring NTFS Permissions . . . . . . . . . . . . . . . . . .363
Exercise 9.4 Creating a Shared Folder . . . . . . . . . . . . . . . . . . . .367
Exercise 9.5 Applying Share Permissions . . . . . . . . . . . . . . . . . . .368
Exercise 9.6 Accessing Network Resources . . . . . . . . . . . . . . . . . .376
Exercise 10.1 Viewing Network Adapter Properties . . . . . . . . . . . . . . .396
Exercise 10.2 Manually Configuring IP . . . . . . . . . . . . . . . . . . . . .415
Exercise 10.3 Using the IPCONFIG Command . . . . . . . . . . . . . . . . . .423
Exercise 10.4 Installing NWLink IPX/SPX Protocol . . . . . . . . . . . . . . . .427
Exercise 10.5 Configuring the NWLink IPX/SPX Protocol . . . . . . . . . . . . .428
Exercise 11.1 Creating Printers . . . . . . . . . . . . . . . . . . . . . . . .444
Exercise 11.2 Sharing an Existing Printer . . . . . . . . . . . . . . . . . . . .454
xx Table of Exercises
Exercise 11.3 Managing Advanced Printer Properties . . . . . . . . . . . . . . 462
Exercise 11.4 Assigning Print Permissions. . . . . . . . . . . . . . . . . . . 465
Exercise 11.5 Managing Printers and Print Documents . . . . . . . . . . . . . 470
Exercise 11.6 Connecting to a Shared Network Printer. . . . . . . . . . . . . . 470
Exercise 12.1 Creating a Dial-Up Connection to the Internet . . . . . . . . . . . 509
Exercise 12.2 Configuring a VPN Client . . . . . . . . . . . . . . . . . . . . 511
Exercise 12.3 Configuring Internet Connection Sharing . . . . . . . . . . . . . 516
Exercise 12.4 Configuring Internet Connection Firewall . . . . . . . . . . . . . 518
Exercise 13.1 Creating a Management Console for Monitoring System Performance . 564
Exercise 13.2 Monitoring System Memory . . . . . . . . . . . . . . . . . . 575
Exercise 13.3 Monitoring the System Processor . . . . . . . . . . . . . . . . 577
Exercise 13.4 Monitoring the Disk Subsystem . . . . . . . . . . . . . . . . . 579
Exercise 13.5 Monitoring the Network Subsystem . . . . . . . . . . . . . . . 581
Exercise 13.6 Creating a Baseline Report . . . . . . . . . . . . . . . . . . . 581
Exercise 13.7 Setting a Process Priority . . . . . . . . . . . . . . . . . . . . 590
Exercise 13.8 Creating a New Scheduled Task . . . . . . . . . . . . . . . . . 592
Exercise 14.1 Using the Event Viewer Utility . . . . . . . . . . . . . . . . . . 616
Exercise 14.2 Creating a Windows XP Boot Disk . . . . . . . . . . . . . . . . 632
Exercise 14.3 Booting Your Computer to Safe Mode . . . . . . . . . . . . . . 635
Exercise 14.4 Using Boot Logging . . . . . . . . . . . . . . . . . . . . . . 636
Exercise 14.5 Using Startup and Recovery Options . . . . . . . . . . . . . . . 641
Exercise 14.6 Using the Backup Wizard . . . . . . . . . . . . . . . . . . . . 644
Exercise 14.7 Using the Restore Wizard . . . . . . . . . . . . . . . . . . . . 650
Exercise 14.8 Using the Automated System Recovery Wizard. . . . . . . . . . . 651
Exercise 14.9 Using the System Restore Wizard . . . . . . . . . . . . . . . . 653
Exercise 14.10 Adding Recovery Console to Windows XP Startup . . . . . . . . . 655
Exercise 14.11 Using the Recovery Console . . . . . . . . . . . . . . . . . . 658
Introduction
Microsoft’s Microsoft Certified Systems Administrator (MCSA) and Microsoft Certified
Systems Engineer (MCSE) tracks for Windows 2000 and Windows Server 2003 are the premier
certifications for computer industry professionals. Covering the core technologies
around which Microsoft’s future will be built, these programs are powerful credentials for
career advancement.
This book has been developed to give you the critical skills and knowledge you need to prepare
for one of the core requirements of both the MCSA and MCSE certifications, in either the
Windows 2000 or the new Windows Server 2003 tracks:
Installing
,
Configuring
,
and Administering
Microsoft Windows XP Professional
(Exam 70-270).
The Microsoft Certified Professional Program
Since the inception of its certification program, Microsoft has certified over 1.5 million people.
As the computer network industry increases in both size and complexity, this number is sure
to grow—and the need for
proven
ability will also increase. Companies rely on certifications to
verify the skills of prospective employees and contractors.
Microsoft has developed its Microsoft Certified Professional (MCP) program to give you
credentials that verify your ability to work with Microsoft products effectively and professionally.
Obtaining your MCP certification requires that you pass any one Microsoft certification
exam. Several levels of certification are available based on specific suites of
exams. Depending on your areas of interest or experience, you can obtain any of the following
MCP credentials:
Microsoft Certified System Administrator (MCSA) on Windows 2000 or Windows Server 2003
The MCSA certification is the latest certification track from Microsoft. This certification targets system
and network administrators with roughly 6 to 12 months of desktop and network administration
experience. The MCSA can be considered the entry-level certification. You must take and pass
a total of four exams to obtain your MCSA. Or, if you are an MCSA on Windows 2000, you can
take one Upgrade exam to obtain your MCSA on Windows Server 2003.
Microsoft Certified System Engineer (MCSE) on Windows 2000 or Windows Server 2003
This certification track is designed for network and systems administrators, network and systems
analysts, and technical consultants who work with Microsoft Windows 2000 Professional
and Server and/or Windows XP and Server 2003 software. You must take and pass seven exams
to obtain your MCSE. Or, if you are an MCSE on Windows 2000, you can take two Upgrade
exams to obtain your MCSE on Windows Server 2003.
Introduction xxi
Assessment Test xxxiv
Chapter 1
Getting Started with Windows XP Professional 1
Chapter 2
Automating the Windows XP Installation 37
Chapter 3
Upgrading to Windows XP Professional 93
Chapter 4
Configuring the Windows XP Environment 117
Chapter 5
Managing the Windows XP Professional Desktop 169
Chapter 6
Managing Users and Groups 195
Chapter 7
Managing Security 237
Chapter 8
Managing Disks 279
Chapter 9
Accessing Files and Folders 335
Chapter 10
Managing Network Connections 389
Chapter 11
Managing Printing 439
Chapter 12
Dial-Up Networking and Internet Connectivity 481
Chapter 13
Optimizing Windows XP 551
Chapter 14
Performing System Recovery Functions 605
Glossary
679
Index 718
Contents
Introduction xxi
Assessment Test xxxiv
Chapter 1 Getting Started with Windows XP Professional 1
Preparing to Install Windows XP Professional 2
Hardware Requirements 3
The Hardware Compatibility List (HCL) 5
BIOS Compatibility 6
Driver Requirements 6
Clean Install or Upgrade? 6
Installation Options 7
Choosing Your Installation Method 10
Running the Windows XP Professional Installation Process 11
Collecting Information 12
Preparing Installation 12
Installing Windows XP Professional 12
Finalizing Installation 14
Using Automatic Updates 17
Using Product Activation 17
Using Windows Update 18
Accessing Windows Update 18
Other Windows Update Options 19
Windows Service Packs 23
Troubleshooting Installation Problems 23
Identifying Common Installation Problems 24
Troubleshooting Installation Errors with
the
Boot.ini
File 25
Installing Non-Supported Hard Drives 26
Troubleshooting with Installation Log Files 26
Supporting Multiple-Boot Options 27
Summary 28
Exam Essentials 28
Review Questions 29
Answers to Review Questions 34
Chapter 2 Automating the Windows XP Installation 37
Choosing Automated Deployment Options 38
An Overview of Unattended Installation 39
An Overview of Remote Installation 40
An Overview of the System Preparation Tool
and Disk Imaging 42
Contents
ix
Summary of Windows XP Professional
Deployment Options 44
Accessing the Windows XP Professional Deployment Tools 45
Deploying Unattended Installations 47
Using Remote Installation Services (RIS) 49
RIS Client Options 50
Preparing the RIS Server 51
Preparing the RIS Client 59
Installing Windows XP Professional through RIS 60
Using the System Preparation Tool to Create Disk Images 61
Preparing for Disk Duplication 61
Using the System Preparation Tool 62
Using Setup Manager to Create Answer Files 66
Options That Can Be Configured through Setup Manager 66
Creating Answer Files with Setup Manager 67
Manually Editing Unattended Answer Files 72
Installing Applications with Windows Installer Packages 78
Copying the MSI Application to a Share 79
Creating a Group Policy Object 79
Filtering the Group Policy Object 80
Adding the Package to the Group Policy Object 81
Installing a Published Application 83
Summary 85
Exam Essentials 85
Review Questions 86
Answers to Review Questions 90
Chapter 3 Upgrading to Windows XP Professional 93
Deciding Whether to Upgrade 94
Preparing to Upgrade to Windows XP Professional 95
Client Upgrade Paths and Requirements 95
Upgrade Considerations for Windows NT 4 Workstation
and Windows 2000 Professional 96
Upgrade Considerations for Windows 98 and Windows Me 96
An Upgrade Checklist 99
Performing the Windows XP Upgrade 100
Migrating Files and Settings 102
Migrating User Data 103
Overview of the User State Migration Tool 103
Requirements for the User State Migration Tool 104
Using the User State Migration Tool 105
Troubleshooting XP Professional Upgrades 106
Incompatible Hardware Drivers 106
Incompatible Software Applications 107
User Settings Lost after Upgrade 108
Reversing a Windows XP Professional Upgrade 108
x
Contents
Summary 108
Exam Essentials 109
Review Questions 110
Answers to Review Questions 115
Chapter 4 Configuring the Windows XP Environment 117
New Device and Hardware Support for Windows XP 118
Windows Image Acquisition Architecture 118
Support for Digital Audio and Video 121
Dualview Multi-Monitor Support 121
Windows XP Management Utilities 121
Microsoft Management Console 121
Registry Editor 124
Device Manager 125
Installing Hardware 127
Installing Plug and Play Devices 128
Installing Non–Plug and Play Devices 128
Managing Device Drivers 129
Updating Drivers 129
Managing Driver Signing 130
Managing Disk Devices 132
Managing DVD and CD-ROM Devices 133
Managing Removable Media 134
Managing Display Devices 134
Configuring Video Adapters 134
Using Multiple-Display Support 137
Managing Mobile Computer Hardware 138
Power Management 138
Managing Card Services 145
Managing I/O Devices 146
Configuring the Keyboard 146
Configuring the Mouse 147
Configuring Wireless Devices 148
Managing USB Devices 149
Managing Imaging Devices 150
Managing Processors 152
Configuring Fax Support 153
Setting Fax Properties 153
Starting the Fax Service 154
Troubleshooting Devices 155
Managing Windows XP Services 155
Managing Multiple Hardware Profiles 159
Summary 160
Exam Essentials 160
Review Questions 162
Answers to Review Questions 166
Contents
xi
Chapter 5 Managing the Windows XP Professional Desktop 169
Managing Desktop Settings 170
Customizing the Taskbar and Start Menu 172
Using Shortcuts 176
Setting Display Properties 176
Managing Multiple Languages and Regional Settings 179
Using Multilingual Technology 179
Choosing Windows XP Multiple-Language Support 180
Enabling and Configuring Multilingual Support 181
Configuring Accessibility Features 183
Setting Accessibility Options 183
Using Accessibility Utilities 185
Summary 187
Exam Essentials 188
Review Questions 189
Answers to Review Questions 193
Chapter 6 Managing Users and Groups 195
Overview of Windows XP User Accounts 196
Built-in Accounts 197
Local and Domain User Accounts 197
Logging On and Logging Off 198
Local User Logon Authentication 198
Logging Off Windows XP Professional 199
Working with User Accounts 200
Using the Local Users and Groups Utility 200
Creating New Users 201
Disabling User Accounts 205
Deleting User Accounts 206
Renaming User Accounts 208
Changing a User’s Password 208
Managing User Properties 209
Managing User Group Membership 209
Setting Up User Profiles, Logon Scripts, and Home Folders 211
Troubleshooting User Accounts Authentication 215
Troubleshooting Local User Account Authentication 216
Domain User Accounts Authentication 217
Caching Logon Credentials 218
Creating and Managing Groups 219
Using Built-in Groups 219
Default Local Groups 219
Special Groups 223
Working with Groups 224
Renaming Groups 228
Deleting Groups 228
Summary 229
xii
Contents
Exam Essentials 230
Review Questions 231
Answers to Review Questions 235
Chapter 7 Managing Security 237
Options for Managing Security Configurations 238
Group Policy Objects and Active Directory 239
Active Directory Overview 239
GPO Inheritance 240
Using the Group Policy Result Tool 241
Applying LGPOs 242
Using Account Policies 244
Using Local Policies 248
Analyzing System Security 264
Specifying a Security Database 264
Importing a Security Template 265
Performing a Security Analysis 267
Reviewing the Security Analysis and
Resolving Discrepancies 267
Using Windows Security Center 270
Summary 270
Exam Essentials 271
Review Questions 272
Answers to Review Questions 276
Chapter 8 Managing Disks 279
Configuring File Systems 280
File System Selection 281
File System Conversion 283
Configuring Disk Storage 285
Basic Storage 285
Dynamic Storage 285
Using the Disk Management Utility 288
Managing Basic Tasks 289
Managing Basic Storage 302
Managing Dynamic Storage 302
Troubleshooting Disk Management 303
Managing Data Compression 305
Using the Compact Command-Line Utility 307
Using Compressed (Zipped) Folders 308
Setting Disk Quotas 308
Configuring Disk Quotas 309
Monitoring Disk Quotas 313
Managing Data Encryption with EFS 314
New EFS Features in Windows XP and
Windows Server 2003 314
Contents
xiii
Encrypting and Decrypting Folders and Files 314
Managing EFS File Sharing 315
Using the DRA to Recover Encrypted Files 317
Using the
Cipher
Utility 319
Using the Disk Defragmenter Utility 321
Analyzing Disks 322
Defragmenting Disks 323
Using the Disk Cleanup Utility 323
Troubleshooting Disk Devices and Volumes 324
Summary 326
Exam Essentials 326
Review Questions 328
Answers to Review Questions 332
Chapter 9 Accessing Files and Folders 335
File and Folder Management Basics 336
Organizing Files and Folders 336
Managing Folder Options 340
Searching for Files and Folders 352
Managing Local Access 354
Design Goals for Access Control 354
Applying NTFS Permissions 354
Understanding Ownership and Security Descriptors 360
Determining Effective Permissions 361
Viewing Effective Permissions 364
Determining NTFS Permissions for Copied or Moved Files 365
Managing Network Access 365
Creating Shared Folders 365
Configuring Share Permissions 367
Using the Shared Documents Folder 369
Managing Shares with the Shared Folders Utility 369
Creating New Shares 371
Providing Access to Shared Resources 373
The Flow of Resource Access 376
Access Token Creation 377
DACLs and ACEs 377
Local and Network Resource Access 378
Summary 379
Exam Essentials 380
Review Questions 381
Answers to Review Questions 387
Chapter 10 Managing Network Connections 389
Installing and Configuring Network Adapters 390
Installing a Network Adapter 390
Configuring a Network Adapter 391
xiv
Contents
Managing Authentication 396
Managing Advanced Configuration Properties 396
Managing Network Bindings 398
Troubleshooting Network Adapters 398
Supporting Wireless Network Connections 400
Configuring Wireless Network Settings 400
Configuring Security for a Small Wireless Network 403
Overview of Network Protocols 405
Overview of TCP/IP 406
Options for Deploying TCP/IP Configurations 412
Additional TCP/IP Features and Options 421
Using NWLink IPX/SPX/NetBIOS 427
Summary 429
Exam Essentials 429
Review Questions 430
Answers to Review Questions 437
Chapter 11 Managing Printing 439
Printing Basics 440
The Windows XP Printing Process 441
The Roles of Print Devices and Printers 443
Setting Up Printers 443
Managing Printer Properties 449
Configuring General Properties 449
Configuring Sharing Properties 453
Configuring Port Properties 454
Configuring Advanced Properties 456
Separator Pages 461
Security Properties 462
Print Permission Assignment 464
Advanced Settings 465
Device Settings Properties 466
Managing Printers and Print Documents 467
Managing Printers 467
Managing Print Documents 468
Connecting to Printers 470
Troubleshooting Printing 471
Summary 472
Exam Essentials 472
Review Questions 474
Answers to Review Questions 479
Chapter 12 Dial-Up Networking and Internet Connectivity 481
Overview of Dial-Up Networking 482
Understanding Connection Options 483
Contents
xv
Local Area Network Connections 484
Remote Access Connections 485
Virtual Private Network Connections 485
Wide Area Network Connections 486
Direct Cable Connections 486
Incoming Connection 487
Understanding Remote Access Security 487
Authentication Methods 487
Remote Data Encryption Options 489
Setting Up a Modem 489
Configuring General Modem Properties 490
Configuring Modem Properties 491
Running Modem Diagnostics 491
Configuring Advanced Modem Properties 491
Viewing Driver Details and Updating Drivers 495
Viewing Modem Resources 496
Using the New Connection Wizard 496
Creating a Connection to a Remote Access Server 497
Creating a RAS Connection 498
Managing the Properties of a RAS Connection 500
Troubleshooting Remote Access Connections 507
Creating a Connection to the Internet 508
Using Virtual Private Network Connections 508
Using Internet Connection Sharing 512
Configuring Internet Connection Sharing on
the Host Computer 513
Configuring Internet Connection Sharing on
the Network Computers 515
Troubleshooting Internet Connection Sharing 516
Using an Internet Connection Firewall Without a
Service Pack or with Service Pack 1 517
Using Windows Firewall 518
Configuring and Managing Internet Explorer 521
Accessing Resources through Internet Explorer 521
Configuring Internet Explorer 522
Managing Internet Printers 528
Overview of Internet Information Services 530
Installing Internet Information Services 530
Managing a Website 531
Troubleshooting Website Access 541
Summary 542
Exam Essentials 542
Review Questions 543
Answers to Review Questions 548
xvi
Contents
Chapter 13 Optimizing Windows XP 551
Overview of System Monitoring Tools 552
Creating Baselines 552
Identifying System Bottlenecks 553
Determining Trends 553
Testing Configuration Changes or Tuning Efforts 554
Using Alerts for Problem Notification 554
Using System Monitor 554
Selecting the Appropriate View 557
Adding Counters 559
Managing System Monitor Properties 561
Using Performance Logs and Alerts 564
Creating a Counter Log 565
Creating a Trace Log 567
Creating an Alert 570
Managing System Performance 572
Monitoring and Optimizing Memory 572
Monitoring and Optimizing the Processor 576
Monitoring and Optimizing the Disk Subsystem 578
Monitoring and Optimizing the Network Subsystem 580
Creating Baseline Reports 581
Minimizing the Performance Effects of System Monitoring 583
Using the System Tool in Control Panel 584
Using Task Manager 586
Managing Application Tasks 586
Managing Process Tasks 587
Managing Performance Tasks 590
Managing Networking Tasks 591
Scheduling Tasks 591
Managing Scheduled Task Properties 593
Troubleshooting Scheduled Tasks 596
Summary 597
Exam Essentials 597
Review Questions 598
Answers to Review Questions 603
Chapter 14 Performing System Recovery Functions 605
Safeguarding Your Computer and Recovering from Disaster 607
Using Event Viewer 609
Reviewing Event Types 610
Getting Event Details 611
Managing Log Files 612
Setting Log File Properties 613
Understanding the Windows XP Professional Boot Process 617
Reviewing the
x
86-Based Boot Process 618
Contents
xvii
Configuring the
BOOT.INI
File 623
Reviewing the Itanium Boot Process 629
Managing NVRAM Startup Settings 631
Creating the Windows XP Boot Disk 631
Using Advanced Startup Options 633
Starting in Safe Mode 633
Enabling Boot Logging 635
Using Other Advanced Options Menu Modes 637
Using Driver Rollback 638
Using Startup and Recovery Options 639
Using the Dr. Watson Utility 641
Using the Backup Utility 643
Using the Backup Wizard 644
Configuring Backup Options 645
Using the Restore Wizard 650
Using the Automated System Recovery Wizard 651
Using System Restore 652
Using the Recovery Console 654
Starting the Recovery Console 654
Working with the Recovery Console 656
Using Remote Desktop and Remote Assistance 659
Using Remote Desktop 659
Using Remote Assistance 664
Summary 670
Exam Essentials 670
Review Questions 672
Answers to Review Questions 676
Glossary
679
Index 718
Table of Exercises
Exercise 1.1
Installing Windows XP Professional . . . . . . . . . . . . . . . .15
Exercise 1.2
Troubleshooting Failed Installations with Setup Logs . . . . . . . . .26
Exercise 2.1
Extracting the Windows XP Deployment Tools . . . . . . . . . . . .46
Exercise 2.2
Using the System Preparation Tool . . . . . . . . . . . . . . . . .64
Exercise 2.3
Installing Windows XP Professional from a Disk Image . . . . . . . .65
Exercise 2.4
Publishing an Application with Windows Installer . . . . . . . . . . .83
Exercise 2.5
Installing a Published Application . . . . . . . . . . . . . . . . .84
Exercise 3.1
Upgrading to Windows XP Professional . . . . . . . . . . . . . . 102
Exercise 4.1
Updating a Device Driver . . . . . . . . . . . . . . . . . . . . 129
Exercise 4.2
Managing Driver Signing . . . . . . . . . . . . . . . . . . . . 132
Exercise 4.3
Managing Disk Devices . . . . . . . . . . . . . . . . . . . . . 133
Exercise 4.4
Viewing Video Adapter Settings . . . . . . . . . . . . . . . . . 136
Exercise 4.5
Configuring Multiple-Display Support. . . . . . . . . . . . . . . 137
Exercise 4.6
Configuring Power Management Support . . . . . . . . . . . . . 144
Exercise 4.7
Configuring I/O Devices . . . . . . . . . . . . . . . . . . . . 148
Exercise 4.8
Managing and Monitoring Imaging Devices . . . . . . . . . . . . 151
Exercise 4.9
Configuring Multiple Processors . . . . . . . . . . . . . . . . . 152
Exercise 4.10
Using the Troubleshooter Wizard . . . . . . . . . . . . . . . . 155
Exercise 5.1
Configuring Taskbar and Start Menu Options . . . . . . . . . . . 175
Exercise 5.2
Creating a Shortcut . . . . . . . . . . . . . . . . . . . . . . 176
Exercise 5.3
Configuring Display Options . . . . . . . . . . . . . . . . . . 178
Exercise 5.4
Configuring Locale Settings . . . . . . . . . . . . . . . . . . . 182
Exercise 5.5
Using Accessibility Features. . . . . . . . . . . . . . . . . . . 187
Exercise 6.1
Accessing the Local Users and Groups Utility . . . . . . . . . . . 200
Exercise 6.2
Creating New Local Users . . . . . . . . . . . . . . . . . . . 204
Exercise 6.3
Disabling a User . . . . . . . . . . . . . . . . . . . . . . . 206
Exercise 6.4
Deleting a User . . . . . . . . . . . . . . . . . . . . . . . . 207
Exercise 6.5
Renaming a User . . . . . . . . . . . . . . . . . . . . . . . 208
Exercise 6.6
Changing a User’s Password . . . . . . . . . . . . . . . . . . 209
Exercise 6.7
Adding a User to a Group . . . . . . . . . . . . . . . . . . . . 210
Exercise 6.8
Using Local Profiles . . . . . . . . . . . . . . . . . . . . . . 212
Exercise 6.9
Assigning a Home Folder to a User . . . . . . . . . . . . . . . . 215
Exercise 6.10
Troubleshooting User Authentication . . . . . . . . . . . . . . . 218
Table of Exercises
xix
Exercise 6.11
Creating Local Groups. . . . . . . . . . . . . . . . . . . . . .226
Exercise 6.12 Adding Users to a Local Group . . . . . . . . . . . . . . . . . .227
Exercise 6.13 Renaming a Local Group . . . . . . . . . . . . . . . . . . . .228
Exercise 6.14 Deleting a Local Group . . . . . . . . . . . . . . . . . . . . .229
Exercise 7.1 Adding the Local Computer Policy Snap-In to the MMC . . . . . . . .243
Exercise 7.2 Setting Password Policies . . . . . . . . . . . . . . . . . . . .246
Exercise 7.3 Setting Account Lockout Policies . . . . . . . . . . . . . . . . .247
Exercise 7.4 Setting Audit Policies . . . . . . . . . . . . . . . . . . . . . .251
Exercise 7.5 Setting User Rights . . . . . . . . . . . . . . . . . . . . . . .255
Exercise 7.6 Defining Security Options . . . . . . . . . . . . . . . . . . . .263
Exercise 7.7 Using the Security Configuration and Analysis Tool . . . . . . . . .268
Exercise 8.1 Converting a FAT16 Partition to NTFS . . . . . . . . . . . . . . .284
Exercise 8.2 Creating a New Partition . . . . . . . . . . . . . . . . . . . . .299
Exercise 8.3 Editing a Drive Letter . . . . . . . . . . . . . . . . . . . . . .301
Exercise 8.4 Compressing and Uncompressing Folders and Files . . . . . . . . .306
Exercise 8.5 Applying Default Quota Limits . . . . . . . . . . . . . . . . . .311
Exercise 8.6 Applying Individual Quota Limits . . . . . . . . . . . . . . . . .313
Exercise 8.7 Using EFS to Manage Data Encryption . . . . . . . . . . . . . . .315
Exercise 8.8 Using the CIPHER Utility . . . . . . . . . . . . . . . . . . . . .320
Exercise 8.9 Analyzing and Defragmenting Disks . . . . . . . . . . . . . . . .323
Exercise 8.10 Using the Disk Cleanup Utility . . . . . . . . . . . . . . . . . .324
Exercise 8.11 Using the Check Disk Utility . . . . . . . . . . . . . . . . . . .325
Exercise 9.1 Creating a Directory and File Structure . . . . . . . . . . . . . . .338
Exercise 9.2 Configuring Offline Files and Folders . . . . . . . . . . . . . . .351
Exercise 9.3 Configuring NTFS Permissions . . . . . . . . . . . . . . . . . .363
Exercise 9.4 Creating a Shared Folder . . . . . . . . . . . . . . . . . . . .367
Exercise 9.5 Applying Share Permissions . . . . . . . . . . . . . . . . . . .368
Exercise 9.6 Accessing Network Resources . . . . . . . . . . . . . . . . . .376
Exercise 10.1 Viewing Network Adapter Properties . . . . . . . . . . . . . . .396
Exercise 10.2 Manually Configuring IP . . . . . . . . . . . . . . . . . . . . .415
Exercise 10.3 Using the IPCONFIG Command . . . . . . . . . . . . . . . . . .423
Exercise 10.4 Installing NWLink IPX/SPX Protocol . . . . . . . . . . . . . . . .427
Exercise 10.5 Configuring the NWLink IPX/SPX Protocol . . . . . . . . . . . . .428
Exercise 11.1 Creating Printers . . . . . . . . . . . . . . . . . . . . . . . .444
Exercise 11.2 Sharing an Existing Printer . . . . . . . . . . . . . . . . . . . .454
xx Table of Exercises
Exercise 11.3 Managing Advanced Printer Properties . . . . . . . . . . . . . . 462
Exercise 11.4 Assigning Print Permissions. . . . . . . . . . . . . . . . . . . 465
Exercise 11.5 Managing Printers and Print Documents . . . . . . . . . . . . . 470
Exercise 11.6 Connecting to a Shared Network Printer. . . . . . . . . . . . . . 470
Exercise 12.1 Creating a Dial-Up Connection to the Internet . . . . . . . . . . . 509
Exercise 12.2 Configuring a VPN Client . . . . . . . . . . . . . . . . . . . . 511
Exercise 12.3 Configuring Internet Connection Sharing . . . . . . . . . . . . . 516
Exercise 12.4 Configuring Internet Connection Firewall . . . . . . . . . . . . . 518
Exercise 13.1 Creating a Management Console for Monitoring System Performance . 564
Exercise 13.2 Monitoring System Memory . . . . . . . . . . . . . . . . . . 575
Exercise 13.3 Monitoring the System Processor . . . . . . . . . . . . . . . . 577
Exercise 13.4 Monitoring the Disk Subsystem . . . . . . . . . . . . . . . . . 579
Exercise 13.5 Monitoring the Network Subsystem . . . . . . . . . . . . . . . 581
Exercise 13.6 Creating a Baseline Report . . . . . . . . . . . . . . . . . . . 581
Exercise 13.7 Setting a Process Priority . . . . . . . . . . . . . . . . . . . . 590
Exercise 13.8 Creating a New Scheduled Task . . . . . . . . . . . . . . . . . 592
Exercise 14.1 Using the Event Viewer Utility . . . . . . . . . . . . . . . . . . 616
Exercise 14.2 Creating a Windows XP Boot Disk . . . . . . . . . . . . . . . . 632
Exercise 14.3 Booting Your Computer to Safe Mode . . . . . . . . . . . . . . 635
Exercise 14.4 Using Boot Logging . . . . . . . . . . . . . . . . . . . . . . 636
Exercise 14.5 Using Startup and Recovery Options . . . . . . . . . . . . . . . 641
Exercise 14.6 Using the Backup Wizard . . . . . . . . . . . . . . . . . . . . 644
Exercise 14.7 Using the Restore Wizard . . . . . . . . . . . . . . . . . . . . 650
Exercise 14.8 Using the Automated System Recovery Wizard. . . . . . . . . . . 651
Exercise 14.9 Using the System Restore Wizard . . . . . . . . . . . . . . . . 653
Exercise 14.10 Adding Recovery Console to Windows XP Startup . . . . . . . . . 655
Exercise 14.11 Using the Recovery Console . . . . . . . . . . . . . . . . . . 658
Introduction
Microsoft’s Microsoft Certified Systems Administrator (MCSA) and Microsoft Certified
Systems Engineer (MCSE) tracks for Windows 2000 and Windows Server 2003 are the premier
certifications for computer industry professionals. Covering the core technologies
around which Microsoft’s future will be built, these programs are powerful credentials for
career advancement.
This book has been developed to give you the critical skills and knowledge you need to prepare
for one of the core requirements of both the MCSA and MCSE certifications, in either the
Windows 2000 or the new Windows Server 2003 tracks:
Installing
,
Configuring
,
and Administering
Microsoft Windows XP Professional
(Exam 70-270).
The Microsoft Certified Professional Program
Since the inception of its certification program, Microsoft has certified over 1.5 million people.
As the computer network industry increases in both size and complexity, this number is sure
to grow—and the need for
proven
ability will also increase. Companies rely on certifications to
verify the skills of prospective employees and contractors.
Microsoft has developed its Microsoft Certified Professional (MCP) program to give you
credentials that verify your ability to work with Microsoft products effectively and professionally.
Obtaining your MCP certification requires that you pass any one Microsoft certification
exam. Several levels of certification are available based on specific suites of
exams. Depending on your areas of interest or experience, you can obtain any of the following
MCP credentials:
Microsoft Certified System Administrator (MCSA) on Windows 2000 or Windows Server 2003
The MCSA certification is the latest certification track from Microsoft. This certification targets system
and network administrators with roughly 6 to 12 months of desktop and network administration
experience. The MCSA can be considered the entry-level certification. You must take and pass
a total of four exams to obtain your MCSA. Or, if you are an MCSA on Windows 2000, you can
take one Upgrade exam to obtain your MCSA on Windows Server 2003.
Microsoft Certified System Engineer (MCSE) on Windows 2000 or Windows Server 2003
This certification track is designed for network and systems administrators, network and systems
analysts, and technical consultants who work with Microsoft Windows 2000 Professional
and Server and/or Windows XP and Server 2003 software. You must take and pass seven exams
to obtain your MCSE. Or, if you are an MCSE on Windows 2000, you can take two Upgrade
exams to obtain your MCSE on Windows Server 2003.
MCSE : Microsoft Certified System Engineer
MCSE (MICROSOFT CERTIFIED SYSTEM ENGINEER)
Installing & Configuring Windows XP Professional (70-270) :
Installing Windows XP Professional
Perform and troubleshoot an attended installation of Windows XP Professional.
Perform and troubleshoot an unattended installation of Windows XP Professional.
Install Windows XP Professional by using Remote Installation Services (RIS).
Install Windows XP Professional by using the System Preparation Tool.
Create unattended answer files by using Setup Manager to automate the installation of Windows XP Professional.
Upgrade from a previous version of Windows to Windows XP Professional.
Prepare a computer to meet upgrade requirements.
Migrate existing user environments to a new installation.
Perform post-installation updates and product activation.
Troubleshoot failed installations. ~ Configuring and Troubleshooting the Desktop Environment
Configure and manage user profiles and desktop settings.
Create users and configure user environment by user profiles.
Configure users for various roles. Configure and manage groups.
Configure support for multiple languages or multiple locations.
Enable multiple-language support.
Configure multiple-language support for users.
Configure local settings.
Configure Windows XP Professional for multiple locations.
Manage applications by using Windows Installer packages.
Configure Internet and Remote Access and VPN connectivity ~ Implementing and Conducting Administration of Resources ~ Monitor, manage, and troubleshoot access to files and folders.
Configure, manage, and troubleshoot file compression.
Control access to files and folders by using permissions.
Optimize access to files and folders. Manage and troubleshoot access to shared folders.
Create and remove shared folders.
Control access to shared folders by using permissions.
Manage and troubleshoot Web server resources.
Connect to local and network print devices.
Manage printers and print jobs.
Control access to printers by using permissions.
Connect to an Internet printer.
Connect to a local print device.
Configure and manage file systems.
Convert from one file system to another file system.
Configure NTFS, FAT32, or FAT file systems.
Manage and troubleshoot access to and synchronization of offline files ~ Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers.
Implement, manage, and troubleshoot disk devices.
Install, configure, and manage DVD and CD-ROM devices.
Monitor and configure disks. Monitor, configure, and troubleshoot volumes.
Monitor and configure removable media, such as tape devices.
Implement, manage, and troubleshoot display devices.
Configure multiple-display support.
Install, configure, and troubleshoot a video adapter.
Configure Advanced Configuration Power Interface (ACPI).
Implement, manage, and troubleshoot input and output (I/O) devices.
Monitor, configure, and troubleshoot I/O devices, such as printers, scanners, multimedia devices, mouse, keyboard, and smart card reader.
Monitor, configure, and troubleshoot multimedia hardware, such as cameras.
Install, configure, and manage modems. Install, configure, and manage Infrared Data Association (IrDA) devices.
Install, configure, and manage wireless devices.
Install, configure, and manage USB devices.
Install, configure, and manage hand held devices.
Install, configure, and manage network adapters.
Manage and troubleshoot drivers and driver signing.
Monitor and configure multiprocessor computers.
Monitoring and Optimizing System Performance and Reliability.
Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.
Optimize and troubleshoot memory performance.
Optimize and troubleshoot processor utilization.
Optimize and troubleshoot disk performance.
Optimize and troubleshoot application performance ~ Configure, manage, and troubleshoot Scheduled Tasks.
Manage, monitor, and optimize system performance for mobile users.
Restore and back up the operating system, System State data, and user data.
Recover System State data and user data by using Windows Backup.
Troubleshoot system restoration by starting in safe mode.
Recover System State data and user data by using the Recovery console ~ Implementing, Managing, and Troubleshooting Network Protocol Services Configure and troubleshoot the TCP/IP protocol.
Connect to computers by using dial-up networking.
Connect to computers by using a virtual private network (VPN) connection.
Create a dial-up connection to connect to a remote access server.
Connect to the Internet by using dial-up networking.
Configure and troubleshoot Internet Connection Sharing (ICS).
Connect to resources by using Internet Explorer. Configure, manage, and implement Internet Information Services (IIS).
Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.
Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).
Managing Windows Server
===================--===--=--=-=-=---=-=---=-=-=-
Server (70-290) :
Managing and Maintaining Physical and Logical Devices, Tools might include Device Manager, the Hardware Troubleshooting Wizard, and appropriate Control Panel items.
Manage basic disks and dynamic disks.
Optimize server disk performance.
Implement a RAID solution.
De-fragment volumes and partitions.
Monitor and Troubleshoot server hardware devices.
Install and configure server hardware devices.
Configure driver-signing options.
Configure device properties and resource settings for a device.
Diagnose and resolve issues related to server hardware settings and hardware device driver upgrades.
Managing Users, Computers, and Groups.
Manage local, roaming, and mandatory user profiles.
Create and manage computer accounts in an Active Directory environment.
Create and manage groups. Identify and modify the scope of a group.
Find domain groups in which a user is a member. Manage group membership.
Create and modify groups by using the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in.
Create and modify groups by using automation.
Create and manage user accounts. Import user accounts.
Create and modify user accounts by using the Active Directory Users and Computers
Managing and Maintaining Access to Resources
Troubleshoot user authentication issues.
Troubleshoot Terminal Services.
Diagnose and resolve issues related to Terminal Services security.
Diagnose and resolve issues related to client access to Terminal Services.
Configure access to shared folders. Manage shared folder permissions.
Configure file system permissions.
Verify effective permissions when granting permissions.
Change ownership of files and folders.
Troubleshoot access to files and shared folders.
Troubleshoot print queues.
Manage a Web server. Manage Internet Information Services (IIS).
Manage security for IIS.
Managing and Maintaining a Server Environment.
Monitor and analyze events. Tools might include Event Viewer and System Monitor.
Manage software update infrastructure. Manage software site licensing.
Manage servers remotely. Manage a server by using Remote Assistance.
Manage a server by using Terminal Services remote administration mode.
Manage a server by using available support tools.
Monitor system performance.
Monitor file and print servers. Tools might include Task Manager, Event Viewer, and System Monitor.
Monitor disk quotas. Monitor print queues. Monitor server hardware for bottlenecks.
Monitor and optimize a server environment for application performance.
Monitor memory performance objects.
Managing and Implementing Disaster Recovery.
Perform system recovery for a server.
Implement Automated System Recovery (ASR).
Restore data from shadow copy volumes.
Back up files and System State data to media.
Configure security for backup operations.
Manage backup procedures.
Verify the successful completion of backup jobs.
Manage backup storage media.
Recover from server hardware failure.
Restore backup data.
Schedule backup jobs.
===========------------------=====================---------------
Planning Windows 2003 Server Network Infrastructure (70-291) :
Implementing, Managing, and Maintaining IP Addressing ~ Configure TCP/IP addressing on a server computer.
Manage DHCP.
Manage DHCP clients and leases.
Manage DHCP Relay Agent. Manage DHCP databases.
Manage DHCP scope options.
Manage reservations and reserved clients.
Troubleshoot TCP/IP addressing. Diagnose and resolve issues related to Automatic Private IP Addressing (APIPA).
Diagnose and resolve issues related to incorrect TCP/IP configuration. Troubleshoot DHCP.
Diagnose and resolve issues related to DHCP authorization.
Verify DHCP reservation configuration.
Examine the system event log and DHCP server audit log files to find related events.
Diagnose and resolve issues related to configuration of DHCP server and scope options.
Verify that the DHCP Relay Agent is working correctly.
Verify database integrity. ~ Implementing, Managing, and Maintaining Name Resolution ~ Install and configure the DNS Server service.
Configure DNS server options. Configure DNS zone options. Configure DNS forwarding. Configure DNS caching only.
Manage DNS. Manage DNS zone settings.
Manage DNS record settings.
Manage DNS server options. Manage DNS zone options.
Monitor DNS. Tools might include System Monitor, Event Viewer, Replication Monitor, and DNS debug logs ~ Implementing, Managing, and Maintaining Routing and Remote Access ~ Configure Routing and Remote Access user authentication.
Configure remote access authentication protocols.
Configure Internet Authentication Service (IAS) to provide authentication for Routing and Remote Access clients.
Configure Routing and Remote Access policies to permit or deny access.
Manage remote access. Manage packet filters.
Manage Routing and Remote Access routing interfaces.
Manage devices and ports. Manage routing protocols.
Manage Routing and Remote Access clients.
Manage TCP/IP routing. Manage routing protocols.
Manage routing tables. Manage routing ports.
Implement secure access between private networks.
Troubleshoot user access to remote access services.
Diagnose and resolve issues related to remote access VPNs.
Diagnose and resolve issues related to establishing a remote access connection.
Diagnose and resolve user access to resources beyond the remote access server.
Troubleshoot Routing and Remote Access routing.
Troubleshoot demand-dial routing.
Troubleshoot router-to-router VPNs. ~ Implementing, Managing, and Maintaining Network Infrastructure and Security ~ Implement secure network administration procedures.
Implement security baseline settings and audit security settings by using security templates.
Implement the principle of least privilege.
Install and configure software update infrastructure.
Install and configure software update services.
Install and configure automatic client update settings.
Configure software updates on earlier operating systems.
Monitor network protocol security.
Tools might include the IP Security Monitor Microsoft Management Console (MMC) snap-in and Kerberos support tools.
Troubleshoot network protocol security.
Tools might include the IP Security Monitor MMC snap-in, Event Viewer, and Network Monitor.
Monitor network traffic.
Tools might include Network Monitor and System Monitor.
Troubleshoot connectivity to the Internet.
Troubleshoot server services.
Diagnose and resolve issues related to service dependency.
Use service recovery options to diagnose and resolve service-related issues.
Planning Windows 2003 Server Network Infrastructure (70-293) ~ Planning and Implementing Server Roles and Server Security ~ Configure security for servers that are assigned specific roles.
Plan a secure baseline installation.
Plan a strategy to enforce system default security settings on new systems.
Identify client operating system default security settings.
Identify all server operating system default security settings.
Plan security for servers that are assigned specific roles.
Roles might include domain controllers, Web servers, database servers, and mail servers.
Deploy the security configuration for servers that are assigned specific roles.
Create custom security templates based on server roles.
Evaluate and select the operating system to install on computers in an enterprise.
Identify the minimum configuration to satisfy security requirements.
Planning, Implementing, and Maintaining a Network Infrastructure
Plan a TCP/IP network infrastructure strategy.
Analyze IP addressing requirements.
Plan an IP routing solution.
Create an IP subnet scheme.
Plan and modify a network topology.
Plan the physical placement of network resources.
Identify network protocols to be used.
Plan an Internet connectivity strategy.
Troubleshoot connectivity to the Internet.
Troubleshoot TCP/IP addressing.
Diagnose and resolve issues related to Network Address Translation (NAT).
Diagnose and resolve issues related to name resolution cache information ~ Diagnose and resolve issues related to client configuration.
Diagnose and resolve issues related to client computer configuration.
Diagnose and resolve issues related to DHCP server address assignment.
Plan a host name resolution strategy.
Plan a DNS namespace design.
Plan zone replication requirements.
Plan a forwarding configuration.
Plan for DNS security.
Examine the interoperability of DNS with third-party DNS solutions.
Plan a NetBIOS name resolution strategy.
Plan a WINS replication strategy.
Plan NetBIOS name resolution by using the Lmhosts file.
Troubleshoot host name resolution.
Diagnose and resolve issues related to DNS services.
Diagnose and resolve issues related to client computer configuration
Planning, Implementing, and Maintaining Routing and Remote Access.
Plan a routing strategy.
Plan routing for IP multicast traffic.
Identify routing protocols to use in a specified environment.
Plan security for remote access users.
Plan remote access policies.
Analyze protocol security requirements.
Plan authentication methods for remote access clients.
Implement secure access between private networks.
Create and implement an IPSec policy.
Troubleshoot TCP/IP routing.
Tools might include the route, tracert, ping, pathping, and netsh commands and Network Monitor.
Planning, Implementing, and Maintaining Server Availability ~ Configure Active Directory service for certificate publication.
Plan a public key infrastructure (PKI) that uses Certificate Services.
Identify the appropriate type of certificate authority to support certificate issuance requirements.
Plan the enrollment and distribution of certificates.
Plan for the use of smart cards for authentication.
Plan a framework for planning and implementing security.
Plan for security monitoring.
Plan a change and configuration management framework for security.
Plan a security update infrastructure.
Tools might include Microsoft Baseline Security Analyzer and Microsoft Software Update Services.
Plan network traffic monitoring.
Tools might include Network Monitor and System Monitor.
===========--------------------------------------
Planning & Implementing Active Directory Infrastructure (70-294) :
Planning and Implementing an Active Directory Infrastructure ~ Plan a strategy for placing global catalog servers.
Evaluate network traffic considerations when placing global catalog servers.
Evaluate the need to enable universal group caching.
Plan flexible operations master role placement.
Plan for business continuity of operations master roles.
Identify operations master role dependencies.
Implement an Active Directory service forest and domain structure.
Create the forest root domain. Create a child domain.
Create and configure Application Data Partitions.
Install and configure an Active Directory domain controller.
Set an Active Directory forest and domain functional level based on requirements.
Establish trust relationships.
Types of trust relationships might include external trusts, shortcut trusts, and cross-forest trusts.
Implement an Active Directory site topology.
Configure site links.
Configure preferred bridgehead servers.
Managing and Maintaining an Active Directory Infrastructure
Manage an Active Directory forest and domain structure.
Manage trust relationships.
Manage schema modifications.
Add or remove a UPN suffix.
Manage an Active Directory site.
Configure site boundaries.
Configure replication schedules.
Configure site link costs ~ Monitor Active Directory replication failures.
Tools might include Replication Monitor, Event Viewer, and support tools. Monitor Active Directory replication.
Monitor File Replication service (FRS) replication.
Restore Active Directory services.
Perform an authoritative restore operation.
Perform a non-authoritative restore operation.
Troubleshoot Active Directory.
Diagnose and resolve issues related to Active Directory replication.
Diagnose and resolve issues related to operations master role failure.
Diagnose and resolve issues related to the Active Directory database.
Planning and Implementing User, Computer, and Group Strategies ~ Plan Group Policy strategy.
Plan a Group Policy strategy by using Resultant Set of Policy (RSoP) Planning mode.
Plan a strategy for configuring the user environment by using Group Policy.
Plan a strategy for configuring the computer environment by using Group Policy.
Configure the user environment by using Group Policy.
Distribute software by using Group Policy.
Automatically enroll user certificates by using Group Policy.
Redirect folders by using Group Policy.
Configure user security settings by using Group Policy.
Deploy a computer environment by using Group Policy.
Distribute software by using Group Policy.
Automatically enroll computer certificates by using Group Policy.
Configure computer security settings by using Group Policy.
Managing and Maintaining Group Policy Troubleshoot issues related to Group Policy application deployment.
Tools might include RSoP and the gpresult command.
Maintain installed software by using Group Policy.
Distribute updates to software distributed by Group Policy.
Configure automatic updates for network clients by using Group Policy.
Troubleshoot the application of Group Policy security settings.
Tools might include RSoP and the gpresult command.
=====================-------------------------------
Designing Active Directory & Network Infrastructure (70-297) :
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements.
Analyze current network administration model. Analyze network requirements.
Analyze DNS for Active Directory service implementation.
Analyze the current DNS infrastructure.
Analyze the current namespace.
Analyze existing network operating system implementation.
Identify the existing domain model.
Identify the number and location of domain controllers on the network.
Identify the configuration details of all servers on the network ~ Analyze security requirements for the Active Directory service.
Analyze current security policies, standards, and procedures.
Identify the impact of Active Directory on the current security infrastructure.
Identify the existing trust relationships.
Identify constraints in the current network infrastructure. Interpret current baseline performance requirements for each major subsystem.
Analyze the impact of the infrastructure design on the existing technical
Design the Active Directory and Network Services infrastructure to meet business and technical requirements ~ Create the conceptual design of the Active Directory forest structure.
Design the Active Directory replication strategy.
Create the conceptual design of the organizational unit (OU) structure.
Create the conceptual design of the DNS infrastructure.
Create the conceptual design of the WINS infrastructure.
Create the conceptual design of the DHCP infrastructure.
Creating the Logical Design for an Active Directory Infrastructure Design an OU structure.
Identify the Group Policy requirements for the OU structure.
Design an OU structure for the purpose of delegating authority.
Design a security group strategy.
Define the scope of a security group to meet requirements.
Define user roles.
Design a user and computer authentication strategy.
Identify common authentication requirements.
Select authentication mechanisms.
Design a user and computer account strategy.
Specify account policy requirements.
Specify account requirements for users, computers, administrators, and services.
Design an Active Directory naming strategy.
Identify NetBIOS naming requirements.
Design migration paths to Active Directory.
Define whether the migration will include an in-place upgrade, domain restructuring, or migration to a new Active Directory environment.
Design the administration of Group Policy objects (GPOs).
Creating the Logical Design for a Network Services Infrastructure.
Design a DNS name resolution strategy.
Create the namespace design.
Identify DNS interoperability with Active Directory, WINS, and DHCP. Specify zone requirements.
Specify DNS security.
Design a DNS strategy for interoperability with UNIX Berkeley Internet Name Domain (BIND) to support Active Directory. Design a NetBIOS name resolution strategy. Design a WINS replication strategy.
Design security for remote access users.
Design remote access policies. Specify logging and auditing settings.
Design a DNS service implementation.
Design a strategy for DNS zone storage.
Specify the use of DNS server options.
Identify the registration requirements of specific DNS records. Design a remote access strategy.
Specify the remote access method.
Specify the authentication method for remote access.
Design an IP address assignment strategy.
Specify DHCP integration with DNS infrastructure.
Specify DHCP interoperability with client types.
Creating the Physical Design for an Active Directory and Network Infrastructure.
Design DNS service placement.
Design an Active Directory implementation plan.
Design the placement of domain controllers and global catalog servers.
Plan the placement of flexible operations master roles.
Select the domain controller creation process.
Specify the server specifications to meet system requirements.
Design Internet connectivity for a company.
Design a network and routing topology for a company.
Design a TCP/IP addressing scheme through the use of IP subnets.
Specify the placement of routers.
Design IP address assignment by using DHCP.
Design a perimeter network. Design the remote access infrastructure.
Plan capacity.
Ascertain network settings required to access resources.
Design for availability, redundancy, and survivability.
==================================--------------------------------------
Installing & Configuring Windows XP Professional (70-270) :
Installing Windows XP Professional
Perform and troubleshoot an attended installation of Windows XP Professional.
Perform and troubleshoot an unattended installation of Windows XP Professional.
Install Windows XP Professional by using Remote Installation Services (RIS).
Install Windows XP Professional by using the System Preparation Tool.
Create unattended answer files by using Setup Manager to automate the installation of Windows XP Professional.
Upgrade from a previous version of Windows to Windows XP Professional.
Prepare a computer to meet upgrade requirements.
Migrate existing user environments to a new installation.
Perform post-installation updates and product activation.
Troubleshoot failed installations. ~ Configuring and Troubleshooting the Desktop Environment
Configure and manage user profiles and desktop settings.
Create users and configure user environment by user profiles.
Configure users for various roles. Configure and manage groups.
Configure support for multiple languages or multiple locations.
Enable multiple-language support.
Configure multiple-language support for users.
Configure local settings.
Configure Windows XP Professional for multiple locations.
Manage applications by using Windows Installer packages.
Configure Internet and Remote Access and VPN connectivity ~ Implementing and Conducting Administration of Resources ~ Monitor, manage, and troubleshoot access to files and folders.
Configure, manage, and troubleshoot file compression.
Control access to files and folders by using permissions.
Optimize access to files and folders. Manage and troubleshoot access to shared folders.
Create and remove shared folders.
Control access to shared folders by using permissions.
Manage and troubleshoot Web server resources.
Connect to local and network print devices.
Manage printers and print jobs.
Control access to printers by using permissions.
Connect to an Internet printer.
Connect to a local print device.
Configure and manage file systems.
Convert from one file system to another file system.
Configure NTFS, FAT32, or FAT file systems.
Manage and troubleshoot access to and synchronization of offline files ~ Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers.
Implement, manage, and troubleshoot disk devices.
Install, configure, and manage DVD and CD-ROM devices.
Monitor and configure disks. Monitor, configure, and troubleshoot volumes.
Monitor and configure removable media, such as tape devices.
Implement, manage, and troubleshoot display devices.
Configure multiple-display support.
Install, configure, and troubleshoot a video adapter.
Configure Advanced Configuration Power Interface (ACPI).
Implement, manage, and troubleshoot input and output (I/O) devices.
Monitor, configure, and troubleshoot I/O devices, such as printers, scanners, multimedia devices, mouse, keyboard, and smart card reader.
Monitor, configure, and troubleshoot multimedia hardware, such as cameras.
Install, configure, and manage modems. Install, configure, and manage Infrared Data Association (IrDA) devices.
Install, configure, and manage wireless devices.
Install, configure, and manage USB devices.
Install, configure, and manage hand held devices.
Install, configure, and manage network adapters.
Manage and troubleshoot drivers and driver signing.
Monitor and configure multiprocessor computers.
Monitoring and Optimizing System Performance and Reliability.
Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.
Optimize and troubleshoot memory performance.
Optimize and troubleshoot processor utilization.
Optimize and troubleshoot disk performance.
Optimize and troubleshoot application performance ~ Configure, manage, and troubleshoot Scheduled Tasks.
Manage, monitor, and optimize system performance for mobile users.
Restore and back up the operating system, System State data, and user data.
Recover System State data and user data by using Windows Backup.
Troubleshoot system restoration by starting in safe mode.
Recover System State data and user data by using the Recovery console ~ Implementing, Managing, and Troubleshooting Network Protocol Services Configure and troubleshoot the TCP/IP protocol.
Connect to computers by using dial-up networking.
Connect to computers by using a virtual private network (VPN) connection.
Create a dial-up connection to connect to a remote access server.
Connect to the Internet by using dial-up networking.
Configure and troubleshoot Internet Connection Sharing (ICS).
Connect to resources by using Internet Explorer. Configure, manage, and implement Internet Information Services (IIS).
Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.
Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).
Managing Windows Server
===================--===--=--=-=-=---=-=---=-=-=-
Server (70-290) :
Managing and Maintaining Physical and Logical Devices, Tools might include Device Manager, the Hardware Troubleshooting Wizard, and appropriate Control Panel items.
Manage basic disks and dynamic disks.
Optimize server disk performance.
Implement a RAID solution.
De-fragment volumes and partitions.
Monitor and Troubleshoot server hardware devices.
Install and configure server hardware devices.
Configure driver-signing options.
Configure device properties and resource settings for a device.
Diagnose and resolve issues related to server hardware settings and hardware device driver upgrades.
Managing Users, Computers, and Groups.
Manage local, roaming, and mandatory user profiles.
Create and manage computer accounts in an Active Directory environment.
Create and manage groups. Identify and modify the scope of a group.
Find domain groups in which a user is a member. Manage group membership.
Create and modify groups by using the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in.
Create and modify groups by using automation.
Create and manage user accounts. Import user accounts.
Create and modify user accounts by using the Active Directory Users and Computers
Managing and Maintaining Access to Resources
Troubleshoot user authentication issues.
Troubleshoot Terminal Services.
Diagnose and resolve issues related to Terminal Services security.
Diagnose and resolve issues related to client access to Terminal Services.
Configure access to shared folders. Manage shared folder permissions.
Configure file system permissions.
Verify effective permissions when granting permissions.
Change ownership of files and folders.
Troubleshoot access to files and shared folders.
Troubleshoot print queues.
Manage a Web server. Manage Internet Information Services (IIS).
Manage security for IIS.
Managing and Maintaining a Server Environment.
Monitor and analyze events. Tools might include Event Viewer and System Monitor.
Manage software update infrastructure. Manage software site licensing.
Manage servers remotely. Manage a server by using Remote Assistance.
Manage a server by using Terminal Services remote administration mode.
Manage a server by using available support tools.
Monitor system performance.
Monitor file and print servers. Tools might include Task Manager, Event Viewer, and System Monitor.
Monitor disk quotas. Monitor print queues. Monitor server hardware for bottlenecks.
Monitor and optimize a server environment for application performance.
Monitor memory performance objects.
Managing and Implementing Disaster Recovery.
Perform system recovery for a server.
Implement Automated System Recovery (ASR).
Restore data from shadow copy volumes.
Back up files and System State data to media.
Configure security for backup operations.
Manage backup procedures.
Verify the successful completion of backup jobs.
Manage backup storage media.
Recover from server hardware failure.
Restore backup data.
Schedule backup jobs.
===========------------------=====================---------------
Planning Windows 2003 Server Network Infrastructure (70-291) :
Implementing, Managing, and Maintaining IP Addressing ~ Configure TCP/IP addressing on a server computer.
Manage DHCP.
Manage DHCP clients and leases.
Manage DHCP Relay Agent. Manage DHCP databases.
Manage DHCP scope options.
Manage reservations and reserved clients.
Troubleshoot TCP/IP addressing. Diagnose and resolve issues related to Automatic Private IP Addressing (APIPA).
Diagnose and resolve issues related to incorrect TCP/IP configuration. Troubleshoot DHCP.
Diagnose and resolve issues related to DHCP authorization.
Verify DHCP reservation configuration.
Examine the system event log and DHCP server audit log files to find related events.
Diagnose and resolve issues related to configuration of DHCP server and scope options.
Verify that the DHCP Relay Agent is working correctly.
Verify database integrity. ~ Implementing, Managing, and Maintaining Name Resolution ~ Install and configure the DNS Server service.
Configure DNS server options. Configure DNS zone options. Configure DNS forwarding. Configure DNS caching only.
Manage DNS. Manage DNS zone settings.
Manage DNS record settings.
Manage DNS server options. Manage DNS zone options.
Monitor DNS. Tools might include System Monitor, Event Viewer, Replication Monitor, and DNS debug logs ~ Implementing, Managing, and Maintaining Routing and Remote Access ~ Configure Routing and Remote Access user authentication.
Configure remote access authentication protocols.
Configure Internet Authentication Service (IAS) to provide authentication for Routing and Remote Access clients.
Configure Routing and Remote Access policies to permit or deny access.
Manage remote access. Manage packet filters.
Manage Routing and Remote Access routing interfaces.
Manage devices and ports. Manage routing protocols.
Manage Routing and Remote Access clients.
Manage TCP/IP routing. Manage routing protocols.
Manage routing tables. Manage routing ports.
Implement secure access between private networks.
Troubleshoot user access to remote access services.
Diagnose and resolve issues related to remote access VPNs.
Diagnose and resolve issues related to establishing a remote access connection.
Diagnose and resolve user access to resources beyond the remote access server.
Troubleshoot Routing and Remote Access routing.
Troubleshoot demand-dial routing.
Troubleshoot router-to-router VPNs. ~ Implementing, Managing, and Maintaining Network Infrastructure and Security ~ Implement secure network administration procedures.
Implement security baseline settings and audit security settings by using security templates.
Implement the principle of least privilege.
Install and configure software update infrastructure.
Install and configure software update services.
Install and configure automatic client update settings.
Configure software updates on earlier operating systems.
Monitor network protocol security.
Tools might include the IP Security Monitor Microsoft Management Console (MMC) snap-in and Kerberos support tools.
Troubleshoot network protocol security.
Tools might include the IP Security Monitor MMC snap-in, Event Viewer, and Network Monitor.
Monitor network traffic.
Tools might include Network Monitor and System Monitor.
Troubleshoot connectivity to the Internet.
Troubleshoot server services.
Diagnose and resolve issues related to service dependency.
Use service recovery options to diagnose and resolve service-related issues.
Planning Windows 2003 Server Network Infrastructure (70-293) ~ Planning and Implementing Server Roles and Server Security ~ Configure security for servers that are assigned specific roles.
Plan a secure baseline installation.
Plan a strategy to enforce system default security settings on new systems.
Identify client operating system default security settings.
Identify all server operating system default security settings.
Plan security for servers that are assigned specific roles.
Roles might include domain controllers, Web servers, database servers, and mail servers.
Deploy the security configuration for servers that are assigned specific roles.
Create custom security templates based on server roles.
Evaluate and select the operating system to install on computers in an enterprise.
Identify the minimum configuration to satisfy security requirements.
Planning, Implementing, and Maintaining a Network Infrastructure
Plan a TCP/IP network infrastructure strategy.
Analyze IP addressing requirements.
Plan an IP routing solution.
Create an IP subnet scheme.
Plan and modify a network topology.
Plan the physical placement of network resources.
Identify network protocols to be used.
Plan an Internet connectivity strategy.
Troubleshoot connectivity to the Internet.
Troubleshoot TCP/IP addressing.
Diagnose and resolve issues related to Network Address Translation (NAT).
Diagnose and resolve issues related to name resolution cache information ~ Diagnose and resolve issues related to client configuration.
Diagnose and resolve issues related to client computer configuration.
Diagnose and resolve issues related to DHCP server address assignment.
Plan a host name resolution strategy.
Plan a DNS namespace design.
Plan zone replication requirements.
Plan a forwarding configuration.
Plan for DNS security.
Examine the interoperability of DNS with third-party DNS solutions.
Plan a NetBIOS name resolution strategy.
Plan a WINS replication strategy.
Plan NetBIOS name resolution by using the Lmhosts file.
Troubleshoot host name resolution.
Diagnose and resolve issues related to DNS services.
Diagnose and resolve issues related to client computer configuration
Planning, Implementing, and Maintaining Routing and Remote Access.
Plan a routing strategy.
Plan routing for IP multicast traffic.
Identify routing protocols to use in a specified environment.
Plan security for remote access users.
Plan remote access policies.
Analyze protocol security requirements.
Plan authentication methods for remote access clients.
Implement secure access between private networks.
Create and implement an IPSec policy.
Troubleshoot TCP/IP routing.
Tools might include the route, tracert, ping, pathping, and netsh commands and Network Monitor.
Planning, Implementing, and Maintaining Server Availability ~ Configure Active Directory service for certificate publication.
Plan a public key infrastructure (PKI) that uses Certificate Services.
Identify the appropriate type of certificate authority to support certificate issuance requirements.
Plan the enrollment and distribution of certificates.
Plan for the use of smart cards for authentication.
Plan a framework for planning and implementing security.
Plan for security monitoring.
Plan a change and configuration management framework for security.
Plan a security update infrastructure.
Tools might include Microsoft Baseline Security Analyzer and Microsoft Software Update Services.
Plan network traffic monitoring.
Tools might include Network Monitor and System Monitor.
===========--------------------------------------
Planning & Implementing Active Directory Infrastructure (70-294) :
Planning and Implementing an Active Directory Infrastructure ~ Plan a strategy for placing global catalog servers.
Evaluate network traffic considerations when placing global catalog servers.
Evaluate the need to enable universal group caching.
Plan flexible operations master role placement.
Plan for business continuity of operations master roles.
Identify operations master role dependencies.
Implement an Active Directory service forest and domain structure.
Create the forest root domain. Create a child domain.
Create and configure Application Data Partitions.
Install and configure an Active Directory domain controller.
Set an Active Directory forest and domain functional level based on requirements.
Establish trust relationships.
Types of trust relationships might include external trusts, shortcut trusts, and cross-forest trusts.
Implement an Active Directory site topology.
Configure site links.
Configure preferred bridgehead servers.
Managing and Maintaining an Active Directory Infrastructure
Manage an Active Directory forest and domain structure.
Manage trust relationships.
Manage schema modifications.
Add or remove a UPN suffix.
Manage an Active Directory site.
Configure site boundaries.
Configure replication schedules.
Configure site link costs ~ Monitor Active Directory replication failures.
Tools might include Replication Monitor, Event Viewer, and support tools. Monitor Active Directory replication.
Monitor File Replication service (FRS) replication.
Restore Active Directory services.
Perform an authoritative restore operation.
Perform a non-authoritative restore operation.
Troubleshoot Active Directory.
Diagnose and resolve issues related to Active Directory replication.
Diagnose and resolve issues related to operations master role failure.
Diagnose and resolve issues related to the Active Directory database.
Planning and Implementing User, Computer, and Group Strategies ~ Plan Group Policy strategy.
Plan a Group Policy strategy by using Resultant Set of Policy (RSoP) Planning mode.
Plan a strategy for configuring the user environment by using Group Policy.
Plan a strategy for configuring the computer environment by using Group Policy.
Configure the user environment by using Group Policy.
Distribute software by using Group Policy.
Automatically enroll user certificates by using Group Policy.
Redirect folders by using Group Policy.
Configure user security settings by using Group Policy.
Deploy a computer environment by using Group Policy.
Distribute software by using Group Policy.
Automatically enroll computer certificates by using Group Policy.
Configure computer security settings by using Group Policy.
Managing and Maintaining Group Policy Troubleshoot issues related to Group Policy application deployment.
Tools might include RSoP and the gpresult command.
Maintain installed software by using Group Policy.
Distribute updates to software distributed by Group Policy.
Configure automatic updates for network clients by using Group Policy.
Troubleshoot the application of Group Policy security settings.
Tools might include RSoP and the gpresult command.
=====================-------------------------------
Designing Active Directory & Network Infrastructure (70-297) :
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements.
Analyze current network administration model. Analyze network requirements.
Analyze DNS for Active Directory service implementation.
Analyze the current DNS infrastructure.
Analyze the current namespace.
Analyze existing network operating system implementation.
Identify the existing domain model.
Identify the number and location of domain controllers on the network.
Identify the configuration details of all servers on the network ~ Analyze security requirements for the Active Directory service.
Analyze current security policies, standards, and procedures.
Identify the impact of Active Directory on the current security infrastructure.
Identify the existing trust relationships.
Identify constraints in the current network infrastructure. Interpret current baseline performance requirements for each major subsystem.
Analyze the impact of the infrastructure design on the existing technical
Design the Active Directory and Network Services infrastructure to meet business and technical requirements ~ Create the conceptual design of the Active Directory forest structure.
Design the Active Directory replication strategy.
Create the conceptual design of the organizational unit (OU) structure.
Create the conceptual design of the DNS infrastructure.
Create the conceptual design of the WINS infrastructure.
Create the conceptual design of the DHCP infrastructure.
Creating the Logical Design for an Active Directory Infrastructure Design an OU structure.
Identify the Group Policy requirements for the OU structure.
Design an OU structure for the purpose of delegating authority.
Design a security group strategy.
Define the scope of a security group to meet requirements.
Define user roles.
Design a user and computer authentication strategy.
Identify common authentication requirements.
Select authentication mechanisms.
Design a user and computer account strategy.
Specify account policy requirements.
Specify account requirements for users, computers, administrators, and services.
Design an Active Directory naming strategy.
Identify NetBIOS naming requirements.
Design migration paths to Active Directory.
Define whether the migration will include an in-place upgrade, domain restructuring, or migration to a new Active Directory environment.
Design the administration of Group Policy objects (GPOs).
Creating the Logical Design for a Network Services Infrastructure.
Design a DNS name resolution strategy.
Create the namespace design.
Identify DNS interoperability with Active Directory, WINS, and DHCP. Specify zone requirements.
Specify DNS security.
Design a DNS strategy for interoperability with UNIX Berkeley Internet Name Domain (BIND) to support Active Directory. Design a NetBIOS name resolution strategy. Design a WINS replication strategy.
Design security for remote access users.
Design remote access policies. Specify logging and auditing settings.
Design a DNS service implementation.
Design a strategy for DNS zone storage.
Specify the use of DNS server options.
Identify the registration requirements of specific DNS records. Design a remote access strategy.
Specify the remote access method.
Specify the authentication method for remote access.
Design an IP address assignment strategy.
Specify DHCP integration with DNS infrastructure.
Specify DHCP interoperability with client types.
Creating the Physical Design for an Active Directory and Network Infrastructure.
Design DNS service placement.
Design an Active Directory implementation plan.
Design the placement of domain controllers and global catalog servers.
Plan the placement of flexible operations master roles.
Select the domain controller creation process.
Specify the server specifications to meet system requirements.
Design Internet connectivity for a company.
Design a network and routing topology for a company.
Design a TCP/IP addressing scheme through the use of IP subnets.
Specify the placement of routers.
Design IP address assignment by using DHCP.
Design a perimeter network. Design the remote access infrastructure.
Plan capacity.
Ascertain network settings required to access resources.
Design for availability, redundancy, and survivability.
==================================--------------------------------------
CCNA TEST QUESTIONS :
ROUTER TEST
1. Identify the command to display the IP routing table?
A.) show route
B.) show ip route
C.) show ip table route
D.) show ipx route
2. Identify the command to display all the valid commands at the given mode?
A.) Help all
B.) Help
C.) All commands
D.) ?
3. Identify the keystroke used to terminate the setup mode?
A.) Ctrl-K
B.) Crtl-C
C.) Ctrl-Z
D.) Crtl-End
4. Identify the command to display the IP host table?
A.) show ip hostnames
B.) show ip names
C.) show hosts
D.) show ip hosts
5. Identify the command to display the configured IP routing protocols?
A.) show protocols
B.) show protocols all
C.) show routing-protocols
D.) show ip protocols
6. Identify the command to configure ALL the default VTY ports?
A.) Router(config)# line vty 0 4
B.) Router# line vty 0 4
C.) Router(config)# line vty
D.) Router(config)# line vty 0
7. Identify the command to reload the router?
A.) Router(config)# reload
B.) Router# reset
C.) Router# reload
D.) Router> reload
8. Identify command that configures 'Cisco1' as a secret password?
A.) Router(config)# enable secret password Cisco1
B.) Router(config)# enable secret cisco1
C.) Router(config)# enable password Cisco1
D.) Router(config)# enable secret Cisco1
9. Identify the statement which connects access-list 101 inbound to interface e0?
A.) Router(config-if)# ip access-group 101 in
B.) Router(config-if)# ip access-group 101
C.) Router(config)# ip access-group 101 e0 in
D.) Router(config)# ip access-group 101 e0 in
10. Identify the command that displays ethernet0/1 interface status?
A.) show interface ethernet0/1
B.) show interface ethernet e0/1
C.) show interface ethernet0.1
D.) show ethernet0/1
11. Based upon the exhibit, create a static route to 172.16.10.0 on Router A
A.) Router# ip route 172.16.10.0 255.255.255.0 10.1.0.2
B.) Router(config)# ip static route 172.16.10.0 255.255.255.0 10.1.0.2
C.) Router(config)# ip route 172.16.10.0 10.1.0.2
D.) Router(config)# ip route 172.16.10.0 255.255.255.0 10.1.0.2
12. Identify the command that saves the configuration stored in RAM to NVRAM?
A.) copy running-config startup-config
B.) copy tftp running-config
C.) copy startup running
D.) copy active to backup
13. Identify the command that displays the SAP table?
A.) show ipx servers
B.) display SAP table
C.) display SAP's
D.) show sap table
14. Identify the command to configure the IP address 172.16.100.5
255.255.255.0?
A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0
B.) Router(config)# ip address 172.16.100.5
C.) Router# ip address 172.16.100.5 255.255.255.0
D.) Router(config)# ip address 172.16.100.5 255.255.255.0
15. Identify the command to configure the router to boot from an IOS located
on a TFTP server?
A.) boot system tftp IOS.exe 172.16.5.1
B.) boot system tftp 172.16.5.1 IOS.exe
C.) boot system flash tftp 172.16.5.1
D.) boot system IOS.exe 172.16.5.1
16. Identify the command to display the hardware platform information?
A.) show all
B.) show platform
C.) display hardware
D.) show version
17. Identify the command to display the Frame Relay map table?
A.) Router# display frame-relay map
B.) Router# show frame-relay map
C.) Router(setup)# show frame-relay map
D.) Router# show map frame-relay
18. Given the command 'cl?', what will it display?
A.) Syntax of the 'clock' command
B.) Syntax of the 'clear' command
C.) All commands that begin with 'cl'
D.) All commands that begin with 'c'
19. Identify the 2 commands that copies the configuration in NVRAM to RAM?
A.) copy backup-config running-config
B.) configure nvram
C.) copy startup-config running-config
D.) configure memory
20. Identify the 2 commands the saves the running-config to NVRAM?
A.) write memory
B.) copy running-config startup-config
C.) write network
D.) write backup
21. Identify the command that displays traffic statistics on serial0/1?
A.) display interface serial0/1
B.) show interface serial0/1
C.) show seria0/1 stats
D.) show interface serial0/1 stats
22. Identify the command to determine if CDP is enabled?
A.) show enable cdp
B.) show cdp enabled
C.) show cdp run
D.) show cdp
23. Which 2 commands shows the Cisco IOS filename?
A.) show IOS
B.) show ver
C.) show flash
D.) show mem
E.) show NVRAM
24. Identify the command to copy a configuration file from a TFTP server to a
routers active configuration?
A.) Router# copy running-config tftp
B.) Router# copy tftp running-config
C.) Router# copy tftp 172.16.0.1 running-config
D.) Router(config)# copy tftp running-config
25. Identify the command mode necessary to enter the extended ping command?
A.) Router#
B.) Router>
C.) Router(config)#
D.) Router(ext-ping)#
26. Identify the command to configure the router for IGRP autonomous system
100?
A.) Router(config)# router igrp 100
B.) Router> router igrp 100
C.) Router# router igrp 100
D.) Router(config)# router igrp
27. Identify the command that forces the router to load into ROM mode upon a
reload?
A.) boot system rom
B.) rom boot
C.) boot system flash rom
D.) boot router rom
28. Identify the command that specifies Serial 0 in slot 1?
A.) Router(config)# interface serial1/1
B.) Router(config)# interface serial1/0
C.) Router(config)# interface serial0.1
D.) Router(config)# interface serial0/1
29. Identify the command to configure the configuration-register?
A.) Router# config-register 0x2102
B.) Router(config)# config-register 0x2102
C.) Router(config-reg)# 0x2102
D.) Router> config-register 0x2102
30. Identify the command to disable CDP on an interface?
A.) Router(config-if)# no cdp enable
B.) Router(config-if)# no cdp run
C.) Router# no cdp enable
D.) Router(config-if)# no cdp
31. Identify the command that will display the RIP routes entering and leaving
the router?
A.) Router(config)# debug ip rip
B.) Route# debug ip rip
C.) Router>debug ip rip
D.) Router# debug rip routes
32. Identify the prompt displayed if in privileged exec mode?
A.) Router(config)#
B.) Router#
C.) Router>
D.) Router(priv)#
33. 'Show cdp neighbors detail' show the following 3 pieces of information?
A.) Hardware platform
B.) Software version
C.) Same as 'show version' command
D.) Up to 1 address for each protocol
E.) Non-direct connected routers
34. Identify the command mode necessary to enter the standard ping command?
A.) Router(config)#
B.) Router>
C.) Router(std-ping)#
D.) Router(config-if)#
35. Identify the command to run 'setup'?
A.) Router(config)#setup
B.) Router?setup
C.) Router#setup
D.) Router>setup
36. Identify the command that configures serial0 for PPP encapsulation?
A.) Router(config)# encapsulation ppp
B.) Router(config-if)# encapsulation serial ppp
C.) Router(config-if)# encapsulation ppp
D.) Router# encapsulation ppp
37. Identify the command to display the status of the Frame Relay virtual
circuit?
A.) Router# show frame-relay virtual-circuit
B.) Router(config)# show frame-relay pvc
C.) Router# show frame-relay pvc
D.) Router# show virtual
38. Identify the command that disables name-to-address translation?
A.) Router(config-dns)# no ip domain-lookup
B.) Router(config)# no address translation
C.) Router(config)# no ip domain-lookup
D.) Router(config)# ip domain-lookup
39. What command will not display the status of to1?
A.) show int to1
B.) show to1
C.) show interface to1
D.) show interface
40. Identify the 2 commands to copy a configuration from a TFTP server to RAM?
A.) configure network
B.) configure overwrite
C.) copy backup-config running-config
D.) copy tftp running-config
41. Identify the following command to configure a secret password to 'cisco'?
A.) Router(config)#enable password cisco secret
B.) Router(config)#enable secret cisco
C.) Router(config)#enable secret password cisco
D.) Router(config)#set secret = cisco
42. Identify the effect of Ctrl-Z?
A.) Exits back to privileged exec mode
B.) Disconnect from the router
C.) Abort the ping operation
D.) Exits privileged exec mode
43. Given an IPX network with redundant paths, what command will configure
load balancing?
A.) ipx load-balance
B.) ip maximum-paths 2
C.) ipx maximum-paths 2
D.) ipx load-share
44. Identify the correct IGRP configuration?
A.) Router# router igrp 100
Router# network 10.0.0.0
B.) Router(config)# router igrp 100
Router(config-router)# network 10.0.0.0
C.) Router(config)# router igrp
Router(config-router)# network 10.0.0.0
45. Identify the components in the following command 'interface serial0/1/1'
A.) Serial interface, port number 0, slot 1, port adapter 1
B.) Serial interface, slot 1, port number 1, port adapter 0
C.) Serial interface, slot 0, port adapter 1, port number 1
46. Identify the command to view the configuration-register value?
A.) show register
B.) display config-register
C.) show config
D.) show version
47. Identify the 2 commands that save the running-config to a TFTP server?
A.) write running tftp
B.) copy running network
C.) copy running tftp
D.) write network
48. Identify the mode reflected by the following prompt 'Router'?
A.) Setup
B.) RXBoot
C.) Boot mode
D.) Privileged exec mode
49. How do you disable CDP on the entire Router?
A.) Router#no cdp run
B.) Rotuer(config-if)# no cdp enable
C.) Router(config)# no cdp enable
D.) Router(config)# no cdp run
50. What command can be used to test IPX connectivity?
A.) Ping 2e.000.0045.8923
B.) Ping 192.168.100.1
C.) Ping ipx 2e.0000.0045.8923
D.) Ipx ping 2e.0000.0045.8923
51. Identify the 2 commands that display the clock rate configured on the
serial0 interface?
A.) show serial0
B.) show interface serial0
C.) Show clock rate serial 0
D.) show controllers serial 0
E.) show running-config
52. What is the command to copy the IOS image to a TFTP server?
A.) copy flash tftp
B.) copy running-config tftp
C.) copy ios tftp
D.) copy startup-config tftp
53. Identify the command that configures the bandwidth to 56K?
A.) Router(config-if)# bandwidth 56000
B.) Router(config-if)# bandwidth 56k
C.) Router(config)# bandwidth 56
D.) Router(config-if)# bandwidth 56
54. Identify the command to configure DLCI 100 on an interface e0?
A.) Router(config)# frame-relay local-dlci 100
B.) Router(config)# frame-relay local-dlci 100 int e0
C.) Router(config-if)# frame-relay local-dlci 100
D.) Router(config-if)# frame-relay local-dlci 100 int e0
55. Identify the command to configure the router to boot from an alternate IOS
located in flash?
A.) boot system flash IOS.exe
B.) boot system tftp IOS.exe 172.16.5.1
C.) boot system alternate IOS.exe
D.) boot system rom IOS.exe
56. Identify the command to configure a description on an interface?
A.) Router> description Finance department
B.) Router(config)# description Finance department
C.) Router(config-if)# description Finance department
D.) Router# description Finance department
57. Identify the 2 commands that will display the status and information about
interface E0 only?
A.) show interface ethernet E0
B.) show interface E0
C.) show E0
D.) show int E0
E.) show interface
58. In order to configure a Frame Relay subinterface with IP identify the 2
commands that must be configured on the physcial interface?
A.) Router(config-if)# encapsulation frame-relay
B.) Router(config-if)# no ip address
C.) Router(config-if)#encapsulation subinterface frame-relay
D.) Router(config)# subinterface s0 encapsulation frame-relay
59. Identify the command to determine if an IP access-list is grouped on
interface e0?
A.) Router(config)# show ip interface e0
B.) Router> show ip interface e0
C.) Router# show interface e0
D.) Router# show ip interface e0
60. Identify the keystroke to position the cursor to the beginning of a
command line?
A.) Ctrl-A
B.) Ctrl-Ins
C.) Ctrl-B
D.) Ctrl-Z
61. Identify the following components of the IPX address 2e.0000.0065.ed43
A.) Not a valid IPX address
B.) Network = 2e, Subnet = 0000, Node = 0065.ed43
C.) Network = 2e.0000, Node = 0065.ed43
D.) Network = 2e, Node = 0000.0065.ed43
62. What is the syntax to add a banner to the Cisco router?
A.) motd banner #
B.) banner
C.) banner motd #
D.) banner #
63. What is the command to allow you to type Tokyo instead of the IP address
172.16.30.1 to access a router named Tokyo?
A.) config t, ip host Tokyo 172.16.30.1
B.) config t, ip hostname Tokyo 172.16.30.1
C.) config t, hostname Tokyo 172.16.30.1
D.) config t, ip hostname 172.16.30.1 Tokyo
64. How do you disable advanced editing?
A.) terminal editing
B.) terminal no editing
C.) disable editing
D.) no terminal editing
65. Which of the following will show an extended access list 150?
A.) sh access-list 150
B.) sh ip int
C.) sh ip access-list
D.) sh access-list 150 extended
66. You have a Class B network address divided into 30 subnets. You will add
25 new subnets within the next year. You need 600 host IDs for each
subnet. Which subnet mask should you use?
A.) 255.254.0.0
B.) 255.192.0.0
C.) 255.255.252.0
D.) 255.255.248 0
67. What is the syntax to use to configure the port on a Catalyst 5000 switch?
A.) slot port/type
B.) type slot/port
C.) port slot/type
D.) port type/slot
68. What 3 sources can configuration commands be placed into RAM?
A.) HP Openview
B.) Console
C.) Vterminal
D.) TFTP server
E.) NVRAM
69. Identify the true statements about the following access list:
Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23
Access-list 101 permit ip any any
A.) This access list prevents the host 192.10.172.0 from telneting
B.) This access list prevents any telnet traffic from subnet
192.10.172.0/24
C.) This access list filters some telnet access
D.) This access list denies any telnet traffic to subnet 192.10.172.0/24
E.) This access list is invalid
F.) The netmask on the this access list is reversed
70. Given the IPX address 4a.0002.1111.a999, what is the network ID and what
is the node ID?
A.) net 4a host 0002.1111.a999
B.) net a999 node 0002.1111
C.) net 0002.1111.a999 node 4a
D.) net 0002.1111 node a999
71. What command do you use to disable domain lookup?
A.) no domain-lookup
B.) domain no-lookup
C.) lookup no-domain
D.) no ip domain-lookup
72. Which of the following are valid Cisco encapsulation type names?
A.) arpa = IPX Ethernet
B.) novell-ether = IPX Ethernet_802.3
C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring
D.) novell-fddi = IPX Fddi_Raw
E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring
F.) hdlc = HDLC on serial interfaces
73. Which of the following is an invalid host address using a netmask of
255.255.255.192?
A.) 10.1.1.1
B.) 10.1.1.66
C.) 10.1.1.130
D.) 10.1.1.127
74. Which of the following will apply IPX sap access list 1010 for incoming
traffic, assume you are at the interface configuration?
A.) ipx input-sap-filter 1010 in
B.) ipx input-sap-filter 1010
C.) ipx access-group 1010 in
D.) ipx access-list 1010 in
75. What command can you type to view the connections after telneting into
multiple routers simultaneously?
A.) sh users
B.) sh ports
C.) sh host
D.) sh sessions
76. Which of the following is a valid extended IP access-list?
A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21
log
B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log
C.) router(config)# acess-list 101 permit any any 172.16.30.0
D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21
log
77. What is the command to manually enter a static route?
A.) IP route network
B.) IP route
C.) IP route < destination network>
D.) IP route
1. Identify the command to display the IP routing table?
A.) show route
B.) show ip route
C.) show ip table route
D.) show ipx route
2. Identify the command to display all the valid commands at the given mode?
A.) Help all
B.) Help
C.) All commands
D.) ?
3. Identify the keystroke used to terminate the setup mode?
A.) Ctrl-K
B.) Crtl-C
C.) Ctrl-Z
D.) Crtl-End
4. Identify the command to display the IP host table?
A.) show ip hostnames
B.) show ip names
C.) show hosts
D.) show ip hosts
5. Identify the command to display the configured IP routing protocols?
A.) show protocols
B.) show protocols all
C.) show routing-protocols
D.) show ip protocols
6. Identify the command to configure ALL the default VTY ports?
A.) Router(config)# line vty 0 4
B.) Router# line vty 0 4
C.) Router(config)# line vty
D.) Router(config)# line vty 0
7. Identify the command to reload the router?
A.) Router(config)# reload
B.) Router# reset
C.) Router# reload
D.) Router> reload
8. Identify command that configures 'Cisco1' as a secret password?
A.) Router(config)# enable secret password Cisco1
B.) Router(config)# enable secret cisco1
C.) Router(config)# enable password Cisco1
D.) Router(config)# enable secret Cisco1
9. Identify the statement which connects access-list 101 inbound to interface e0?
A.) Router(config-if)# ip access-group 101 in
B.) Router(config-if)# ip access-group 101
C.) Router(config)# ip access-group 101 e0 in
D.) Router(config)# ip access-group 101 e0 in
10. Identify the command that displays ethernet0/1 interface status?
A.) show interface ethernet0/1
B.) show interface ethernet e0/1
C.) show interface ethernet0.1
D.) show ethernet0/1
11. Based upon the exhibit, create a static route to 172.16.10.0 on Router A
A.) Router# ip route 172.16.10.0 255.255.255.0 10.1.0.2
B.) Router(config)# ip static route 172.16.10.0 255.255.255.0 10.1.0.2
C.) Router(config)# ip route 172.16.10.0 10.1.0.2
D.) Router(config)# ip route 172.16.10.0 255.255.255.0 10.1.0.2
12. Identify the command that saves the configuration stored in RAM to NVRAM?
A.) copy running-config startup-config
B.) copy tftp running-config
C.) copy startup running
D.) copy active to backup
13. Identify the command that displays the SAP table?
A.) show ipx servers
B.) display SAP table
C.) display SAP's
D.) show sap table
14. Identify the command to configure the IP address 172.16.100.5
255.255.255.0?
A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0
B.) Router(config)# ip address 172.16.100.5
C.) Router# ip address 172.16.100.5 255.255.255.0
D.) Router(config)# ip address 172.16.100.5 255.255.255.0
15. Identify the command to configure the router to boot from an IOS located
on a TFTP server?
A.) boot system tftp IOS.exe 172.16.5.1
B.) boot system tftp 172.16.5.1 IOS.exe
C.) boot system flash tftp 172.16.5.1
D.) boot system IOS.exe 172.16.5.1
16. Identify the command to display the hardware platform information?
A.) show all
B.) show platform
C.) display hardware
D.) show version
17. Identify the command to display the Frame Relay map table?
A.) Router# display frame-relay map
B.) Router# show frame-relay map
C.) Router(setup)# show frame-relay map
D.) Router# show map frame-relay
18. Given the command 'cl?', what will it display?
A.) Syntax of the 'clock' command
B.) Syntax of the 'clear' command
C.) All commands that begin with 'cl'
D.) All commands that begin with 'c'
19. Identify the 2 commands that copies the configuration in NVRAM to RAM?
A.) copy backup-config running-config
B.) configure nvram
C.) copy startup-config running-config
D.) configure memory
20. Identify the 2 commands the saves the running-config to NVRAM?
A.) write memory
B.) copy running-config startup-config
C.) write network
D.) write backup
21. Identify the command that displays traffic statistics on serial0/1?
A.) display interface serial0/1
B.) show interface serial0/1
C.) show seria0/1 stats
D.) show interface serial0/1 stats
22. Identify the command to determine if CDP is enabled?
A.) show enable cdp
B.) show cdp enabled
C.) show cdp run
D.) show cdp
23. Which 2 commands shows the Cisco IOS filename?
A.) show IOS
B.) show ver
C.) show flash
D.) show mem
E.) show NVRAM
24. Identify the command to copy a configuration file from a TFTP server to a
routers active configuration?
A.) Router# copy running-config tftp
B.) Router# copy tftp running-config
C.) Router# copy tftp 172.16.0.1 running-config
D.) Router(config)# copy tftp running-config
25. Identify the command mode necessary to enter the extended ping command?
A.) Router#
B.) Router>
C.) Router(config)#
D.) Router(ext-ping)#
26. Identify the command to configure the router for IGRP autonomous system
100?
A.) Router(config)# router igrp 100
B.) Router> router igrp 100
C.) Router# router igrp 100
D.) Router(config)# router igrp
27. Identify the command that forces the router to load into ROM mode upon a
reload?
A.) boot system rom
B.) rom boot
C.) boot system flash rom
D.) boot router rom
28. Identify the command that specifies Serial 0 in slot 1?
A.) Router(config)# interface serial1/1
B.) Router(config)# interface serial1/0
C.) Router(config)# interface serial0.1
D.) Router(config)# interface serial0/1
29. Identify the command to configure the configuration-register?
A.) Router# config-register 0x2102
B.) Router(config)# config-register 0x2102
C.) Router(config-reg)# 0x2102
D.) Router> config-register 0x2102
30. Identify the command to disable CDP on an interface?
A.) Router(config-if)# no cdp enable
B.) Router(config-if)# no cdp run
C.) Router# no cdp enable
D.) Router(config-if)# no cdp
31. Identify the command that will display the RIP routes entering and leaving
the router?
A.) Router(config)# debug ip rip
B.) Route# debug ip rip
C.) Router>debug ip rip
D.) Router# debug rip routes
32. Identify the prompt displayed if in privileged exec mode?
A.) Router(config)#
B.) Router#
C.) Router>
D.) Router(priv)#
33. 'Show cdp neighbors detail' show the following 3 pieces of information?
A.) Hardware platform
B.) Software version
C.) Same as 'show version' command
D.) Up to 1 address for each protocol
E.) Non-direct connected routers
34. Identify the command mode necessary to enter the standard ping command?
A.) Router(config)#
B.) Router>
C.) Router(std-ping)#
D.) Router(config-if)#
35. Identify the command to run 'setup'?
A.) Router(config)#setup
B.) Router?setup
C.) Router#setup
D.) Router>setup
36. Identify the command that configures serial0 for PPP encapsulation?
A.) Router(config)# encapsulation ppp
B.) Router(config-if)# encapsulation serial ppp
C.) Router(config-if)# encapsulation ppp
D.) Router# encapsulation ppp
37. Identify the command to display the status of the Frame Relay virtual
circuit?
A.) Router# show frame-relay virtual-circuit
B.) Router(config)# show frame-relay pvc
C.) Router# show frame-relay pvc
D.) Router# show virtual
38. Identify the command that disables name-to-address translation?
A.) Router(config-dns)# no ip domain-lookup
B.) Router(config)# no address translation
C.) Router(config)# no ip domain-lookup
D.) Router(config)# ip domain-lookup
39. What command will not display the status of to1?
A.) show int to1
B.) show to1
C.) show interface to1
D.) show interface
40. Identify the 2 commands to copy a configuration from a TFTP server to RAM?
A.) configure network
B.) configure overwrite
C.) copy backup-config running-config
D.) copy tftp running-config
41. Identify the following command to configure a secret password to 'cisco'?
A.) Router(config)#enable password cisco secret
B.) Router(config)#enable secret cisco
C.) Router(config)#enable secret password cisco
D.) Router(config)#set secret = cisco
42. Identify the effect of Ctrl-Z?
A.) Exits back to privileged exec mode
B.) Disconnect from the router
C.) Abort the ping operation
D.) Exits privileged exec mode
43. Given an IPX network with redundant paths, what command will configure
load balancing?
A.) ipx load-balance
B.) ip maximum-paths 2
C.) ipx maximum-paths 2
D.) ipx load-share
44. Identify the correct IGRP configuration?
A.) Router# router igrp 100
Router# network 10.0.0.0
B.) Router(config)# router igrp 100
Router(config-router)# network 10.0.0.0
C.) Router(config)# router igrp
Router(config-router)# network 10.0.0.0
45. Identify the components in the following command 'interface serial0/1/1'
A.) Serial interface, port number 0, slot 1, port adapter 1
B.) Serial interface, slot 1, port number 1, port adapter 0
C.) Serial interface, slot 0, port adapter 1, port number 1
46. Identify the command to view the configuration-register value?
A.) show register
B.) display config-register
C.) show config
D.) show version
47. Identify the 2 commands that save the running-config to a TFTP server?
A.) write running tftp
B.) copy running network
C.) copy running tftp
D.) write network
48. Identify the mode reflected by the following prompt 'Router
A.) Setup
B.) RXBoot
C.) Boot mode
D.) Privileged exec mode
49. How do you disable CDP on the entire Router?
A.) Router#no cdp run
B.) Rotuer(config-if)# no cdp enable
C.) Router(config)# no cdp enable
D.) Router(config)# no cdp run
50. What command can be used to test IPX connectivity?
A.) Ping 2e.000.0045.8923
B.) Ping 192.168.100.1
C.) Ping ipx 2e.0000.0045.8923
D.) Ipx ping 2e.0000.0045.8923
51. Identify the 2 commands that display the clock rate configured on the
serial0 interface?
A.) show serial0
B.) show interface serial0
C.) Show clock rate serial 0
D.) show controllers serial 0
E.) show running-config
52. What is the command to copy the IOS image to a TFTP server?
A.) copy flash tftp
B.) copy running-config tftp
C.) copy ios tftp
D.) copy startup-config tftp
53. Identify the command that configures the bandwidth to 56K?
A.) Router(config-if)# bandwidth 56000
B.) Router(config-if)# bandwidth 56k
C.) Router(config)# bandwidth 56
D.) Router(config-if)# bandwidth 56
54. Identify the command to configure DLCI 100 on an interface e0?
A.) Router(config)# frame-relay local-dlci 100
B.) Router(config)# frame-relay local-dlci 100 int e0
C.) Router(config-if)# frame-relay local-dlci 100
D.) Router(config-if)# frame-relay local-dlci 100 int e0
55. Identify the command to configure the router to boot from an alternate IOS
located in flash?
A.) boot system flash IOS.exe
B.) boot system tftp IOS.exe 172.16.5.1
C.) boot system alternate IOS.exe
D.) boot system rom IOS.exe
56. Identify the command to configure a description on an interface?
A.) Router> description Finance department
B.) Router(config)# description Finance department
C.) Router(config-if)# description Finance department
D.) Router# description Finance department
57. Identify the 2 commands that will display the status and information about
interface E0 only?
A.) show interface ethernet E0
B.) show interface E0
C.) show E0
D.) show int E0
E.) show interface
58. In order to configure a Frame Relay subinterface with IP identify the 2
commands that must be configured on the physcial interface?
A.) Router(config-if)# encapsulation frame-relay
B.) Router(config-if)# no ip address
C.) Router(config-if)#encapsulation subinterface frame-relay
D.) Router(config)# subinterface s0 encapsulation frame-relay
59. Identify the command to determine if an IP access-list is grouped on
interface e0?
A.) Router(config)# show ip interface e0
B.) Router> show ip interface e0
C.) Router# show interface e0
D.) Router# show ip interface e0
60. Identify the keystroke to position the cursor to the beginning of a
command line?
A.) Ctrl-A
B.) Ctrl-Ins
C.) Ctrl-B
D.) Ctrl-Z
61. Identify the following components of the IPX address 2e.0000.0065.ed43
A.) Not a valid IPX address
B.) Network = 2e, Subnet = 0000, Node = 0065.ed43
C.) Network = 2e.0000, Node = 0065.ed43
D.) Network = 2e, Node = 0000.0065.ed43
62. What is the syntax to add a banner to the Cisco router?
A.) motd banner #
B.) banner
C.) banner motd #
D.) banner #
63. What is the command to allow you to type Tokyo instead of the IP address
172.16.30.1 to access a router named Tokyo?
A.) config t, ip host Tokyo 172.16.30.1
B.) config t, ip hostname Tokyo 172.16.30.1
C.) config t, hostname Tokyo 172.16.30.1
D.) config t, ip hostname 172.16.30.1 Tokyo
64. How do you disable advanced editing?
A.) terminal editing
B.) terminal no editing
C.) disable editing
D.) no terminal editing
65. Which of the following will show an extended access list 150?
A.) sh access-list 150
B.) sh ip int
C.) sh ip access-list
D.) sh access-list 150 extended
66. You have a Class B network address divided into 30 subnets. You will add
25 new subnets within the next year. You need 600 host IDs for each
subnet. Which subnet mask should you use?
A.) 255.254.0.0
B.) 255.192.0.0
C.) 255.255.252.0
D.) 255.255.248 0
67. What is the syntax to use to configure the port on a Catalyst 5000 switch?
A.) slot port/type
B.) type slot/port
C.) port slot/type
D.) port type/slot
68. What 3 sources can configuration commands be placed into RAM?
A.) HP Openview
B.) Console
C.) Vterminal
D.) TFTP server
E.) NVRAM
69. Identify the true statements about the following access list:
Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23
Access-list 101 permit ip any any
A.) This access list prevents the host 192.10.172.0 from telneting
B.) This access list prevents any telnet traffic from subnet
192.10.172.0/24
C.) This access list filters some telnet access
D.) This access list denies any telnet traffic to subnet 192.10.172.0/24
E.) This access list is invalid
F.) The netmask on the this access list is reversed
70. Given the IPX address 4a.0002.1111.a999, what is the network ID and what
is the node ID?
A.) net 4a host 0002.1111.a999
B.) net a999 node 0002.1111
C.) net 0002.1111.a999 node 4a
D.) net 0002.1111 node a999
71. What command do you use to disable domain lookup?
A.) no domain-lookup
B.) domain no-lookup
C.) lookup no-domain
D.) no ip domain-lookup
72. Which of the following are valid Cisco encapsulation type names?
A.) arpa = IPX Ethernet
B.) novell-ether = IPX Ethernet_802.3
C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring
D.) novell-fddi = IPX Fddi_Raw
E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring
F.) hdlc = HDLC on serial interfaces
73. Which of the following is an invalid host address using a netmask of
255.255.255.192?
A.) 10.1.1.1
B.) 10.1.1.66
C.) 10.1.1.130
D.) 10.1.1.127
74. Which of the following will apply IPX sap access list 1010 for incoming
traffic, assume you are at the interface configuration?
A.) ipx input-sap-filter 1010 in
B.) ipx input-sap-filter 1010
C.) ipx access-group 1010 in
D.) ipx access-list 1010 in
75. What command can you type to view the connections after telneting into
multiple routers simultaneously?
A.) sh users
B.) sh ports
C.) sh host
D.) sh sessions
76. Which of the following is a valid extended IP access-list?
A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21
log
B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log
C.) router(config)# acess-list 101 permit any any 172.16.30.0
D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21
log
77. What is the command to manually enter a static route?
A.) IP route
B.) IP route
C.) IP route < destination network>
D.) IP route
Subscribe to:
Posts (Atom)