Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

70-680 Cards

QuestionAnswer
DRA A user account with a certificate that is used for data recovery.
DirectAccess Always-on VPN connection that connects immediately after internet connectivity. Uses IPv6 only.
BranchCache Technology that shares hosted files on a Win 2008 R2 server. This decreases the time it takes to load network files.
EFS Encryption of files and folders for specific user accounts. Does NOT encrypt volumes. Available on Professional, Enterprise & Ultimate.
HomeGroup Network sharing of files on a home network. Will not work on a domain computer. Administrators set up, but users decide what to share.
Dummy Restore File recovery that occurs to a new location instead of over the original file.
Staging This allows admins to put software into a store that can later be installed by user accounts.
Side-By-Side Migration Migration that occurs when the files are taken from the original computer straight to the new computer.
WAIK A set of tools that help with deploying Windows images to computers or VHDs
VHD Virtual Hard Disk. VHD files are used by Hyper-V, Virtual Server, and Virtual PC
Wipe-And-Load Migration Migration that occurs when the files are exported and the original computer is reformatted and set up with a new operating system-after which the files are then imported.
VPN Reconnect Technology that automatically reconnects VPN connection if it is dropped. This allows a pc to get a new IP address without renegotiating with the VPN server. Uses IKEv2 protocol and has a MOBIKE extension.
NAP Remediation Technology in Server 2008 that restricts network access based on a client's pc health. It can verify virus protection updates along with software and OS updates.
OS Upgrade Path from XP to 7 There is no upgrade path from XP to 7. Only Vista can be upgraded to 7 directly.
Windows SIM Used to create answer files, open Windows images and manages distribution shares. This is part of WAIK.
ImageX Captures, creates, modifies and applies Windows images.  This is part of WAIK.
DISM This applies drivers, language packs and updates to an already created Windows image. This is part of WAIK.
Windows PE tools WAIK has several tools to build and manage windows PE environments.
Oscdimg Used to create ISO images. This is part of WAIK.
BitLocker Used on Win 7 Enterprise & Ultimate only. It can be used with or without TPM (trusted platform module) chips. TPM recovery data can be stored to AD.
BitLocker DRA BitLocker Data Recovery Agent: These are special accounts used to recover encrypted data without the need of numerous keys stored. One account can open any drive. Configured certificates are usually stored in AD. Command is: manage-bde.exe -unlock [drive]
wecutil qc Used to confugre the Windows Event Collector and is typically used on a  collector PC. This is a command-line command.
Event Viewer Events fall into four categories: Criticial, Error, Warning, Information Logs include: Application, Security, System, Forwarded Events
The 3 WMI Features Common Information Model Object Manager (CIMOM), AKA WMI Services. Common Information Model (VIM) Repository, AKA WMI Repository WMI Providers
DMTF Maintains the set of core classes from which system & application developers create extension classes.
Copy/Move Permissions Files/Directories moving on the same volume will retain their original permissions.
NAP Network Access Protection
DirectAccess Server Requirements Win Server 2008 R2 and must be amember of domain. 2 network adapters- one for the internet, other to intranet PC requires digital certificates.
Performance Manager Located in Control Panel or by typing perfmon in the Start menu or command-line.
Offline Files Stores locally cached versions of network resources. Available on Win 7 Professional, Enterprise & Ultimate
Bcedit.exe Used to enable a VHD file as a boot option- it does not create VHD files. Used to edit BCD (Boot Configuration Data). Creates & modifies BCD store.
Shadow Copy Does NOT copy Offline Files.
VSS Manages & implements shadow copies. The service start up is set to manual.
Configure BranchCache with Netsh netsh BranchCache [command] reset show status set service mode=distributed/local set cachesize set localcache Netsh configures firewall automatically.
VPN Technologies Supported by Win 7 PPTP- most connom but least secure. Does not use PKI. L2TP/IPSec- Provides origin authentication, data integrity, relay protection & data condifentiality. SSTP- Uses port 443 which means it usually works with most firewalls. Also uses certificates. IKEv2-
Tools that back up EFS Certificates Certificates Console (certmgr.msc). Manage File Encryption Certificates Tool. Cipher.exe command-line tool.
VPN Authentication Protocols Password Authentication Protocol (PAP), Challenge Authentication Protocol (CHAP), Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2), Protected extensible Authentication Protocol with Transport Layer Security (PEAP-TLS),
more VPN Authentication Protocols EAP-MS-CHAPv2/PEAP-MS-CHAPv2, Smart Card or Other Certificate
Effective Permissions Tool It calculates the permissions that are granted to the specified user or group.
Icacls Command-line utility used to configure NTFS permissions. To view permissions, use: Icacls [file/directory] To grant permissions, use: /grant [user/group: permissions
Windows PowerShell Remote Management Windows 7 uses and requires PowerShell V2. Syntax: Icm hostname [command]
WinRS Script Samples WinRS -r:[pc name/netbios name] [command] ie: WinRS -r:testpc ipconfig To supply passwords: -p:[password] To supply usernames: -u:[username]
Windows Remote Management Service Windows Remote Management is one component of the Windows Hardware Management features that manage server hardware locally and remotely.
Remote Desktop Available on Win 7 Professional, Enterprise & Ultimate. Remote Desktop is disabled by default. Windows firewall automatically changes when Remote Desktop is enabled.
802.11n Still in draft mode. Utilizes MIMO- Multiple Input/Multiple Output
802.11g Speeds up to 54Mbps. Has a good range with little obstructions.
802.11a Speeds up to 54Mbps. Uses 5.0Ghz frequency. Faster than 802.11b but is more likely to be obstructed by walls. Is NOT compatibile with 802.11b.
802.11b Up to 11Mbps. Uses 2.4Ghz frequency. Major interference with microwaves and cell phones.
Port-restricted cone An external host with a specific IP address and source port can send a packet to an internal host ONLY if the internal host sent a packet first.
Restricted-Cone NAT All requests from the same internal IP address & port are mapped to the same external IP address & port. External hosts may send packets only if the internal address sent a packet first.
Full-cone NAT All requests from the same itnernal IP address & port are mappes to the same external IP address & port.  Any external host can send a packet to the itnernal host by sending a packet to the mapped external address.
ISATAP Address Intra-Site Automatic Tunneling Addressing Protocol. This provides IPv6 connectivity within an IPv4 Intranet. The address contains the identifier: 0:5efe
Teredo Address The address looks like: 2001::132. The prefix is followed by the IPv4 publica ddress of the Teredo server.  The enxt 16 bits are reserved for Teredo flags.
6to4 Address This allows IPv6 packets to transmit over an IPv4 network. This is meant to be a temporary solution to a problem. It looks like: 2002:[first 2 bytes of IPv4 address]:[second 2 bytes of IPv4 address]::/16
IPv6 Multicast Address This address starts with:fp
IPv6 Link-Local Address This address starts with:fe8 This is the same as IPv4's IPAPA
IPv6 Loopback Address Also known as: 0:0:0:0:0:0:01 or::1
Flash Drive Requirements to be used to install an OS Must be 4GB+, formatted as FAT 32 and the drive must be set as ACTIVE
IPv6 Site-Local Address This address starts with:fec0 This is the same as IPv4's private addresses
APIPA Uses IPv4 in the range of169.254.0.1 to 169.254.254.254 and a subnet of 255.255.0.0
WHQL Windows Hardware Quality Labs
WDS Images: Install This is an OS image that is deployed to a client PC. The order is:Install, Boot, Capture, Discover
mmc devmgt.msc Run command that launches device manager
WDS Images: Boot This is an image a client boots before you isntall the WIM file.  Capture & discover are types of boot images. The order is:Install, Boot, Capture, Discover
WDS Windows Deployment Services
WDS Images: Capture This is a boot image that you boot a client pc to capture the OS as a WIM install image file.  You do this before you create a custom image file. The order is:Install, Boot, Capture, Discover
WDS Images: Discover This is a boot image that installs Windows 7 on a pc that is not PXE-enabled. This image allows a computer to locate a WDS server and use it to install an image. The order is:Install, Boot, Capture, Discover
Hardware Requirements for Windows 7 Starter or Home Premium 1Ghz processor, 512mb RAM, 10GB HDD
Hardware requirements for Windows 7 Professional and Ultimate 1Ghz processor, 1GB RAM, 10GB HDD
.SWM extension SWAM files are split or spanned WIM files.
Created by: onlldvd
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards