Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

70-680 Cards

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
DRA   A user account with a certificate that is used for data recovery.  
🗑
DirectAccess   Always-on VPN connection that connects immediately after internet connectivity. Uses IPv6 only.  
🗑
BranchCache   Technology that shares hosted files on a Win 2008 R2 server. This decreases the time it takes to load network files.  
🗑
EFS   Encryption of files and folders for specific user accounts. Does NOT encrypt volumes. Available on Professional, Enterprise & Ultimate.  
🗑
HomeGroup   Network sharing of files on a home network. Will not work on a domain computer. Administrators set up, but users decide what to share.  
🗑
Dummy Restore   File recovery that occurs to a new location instead of over the original file.  
🗑
Staging   This allows admins to put software into a store that can later be installed by user accounts.  
🗑
Side-By-Side Migration   Migration that occurs when the files are taken from the original computer straight to the new computer.  
🗑
WAIK   A set of tools that help with deploying Windows images to computers or VHDs  
🗑
VHD   Virtual Hard Disk. VHD files are used by Hyper-V, Virtual Server, and Virtual PC  
🗑
Wipe-And-Load Migration   Migration that occurs when the files are exported and the original computer is reformatted and set up with a new operating system-after which the files are then imported.  
🗑
VPN Reconnect   Technology that automatically reconnects VPN connection if it is dropped. This allows a pc to get a new IP address without renegotiating with the VPN server. Uses IKEv2 protocol and has a MOBIKE extension.  
🗑
NAP Remediation   Technology in Server 2008 that restricts network access based on a client's pc health. It can verify virus protection updates along with software and OS updates.  
🗑
OS Upgrade Path from XP to 7   There is no upgrade path from XP to 7. Only Vista can be upgraded to 7 directly.  
🗑
Windows SIM   Used to create answer files, open Windows images and manages distribution shares. This is part of WAIK.  
🗑
ImageX   Captures, creates, modifies and applies Windows images.  This is part of WAIK.  
🗑
DISM   This applies drivers, language packs and updates to an already created Windows image. This is part of WAIK.  
🗑
Windows PE tools   WAIK has several tools to build and manage windows PE environments.  
🗑
Oscdimg   Used to create ISO images. This is part of WAIK.  
🗑
BitLocker   Used on Win 7 Enterprise & Ultimate only. It can be used with or without TPM (trusted platform module) chips. TPM recovery data can be stored to AD.  
🗑
BitLocker DRA   BitLocker Data Recovery Agent: These are special accounts used to recover encrypted data without the need of numerous keys stored. One account can open any drive. Configured certificates are usually stored in AD. Command is: manage-bde.exe -unlock [drive]  
🗑
wecutil qc   Used to confugre the Windows Event Collector and is typically used on a  collector PC. This is a command-line command.  
🗑
Event Viewer   Events fall into four categories: Criticial, Error, Warning, Information Logs include: Application, Security, System, Forwarded Events  
🗑
The 3 WMI Features   Common Information Model Object Manager (CIMOM), AKA WMI Services. Common Information Model (VIM) Repository, AKA WMI Repository WMI Providers  
🗑
DMTF   Maintains the set of core classes from which system & application developers create extension classes.  
🗑
Copy/Move Permissions   Files/Directories moving on the same volume will retain their original permissions.  
🗑
NAP   Network Access Protection  
🗑
DirectAccess Server Requirements   Win Server 2008 R2 and must be amember of domain. 2 network adapters- one for the internet, other to intranet PC requires digital certificates.  
🗑
Performance Manager   Located in Control Panel or by typing perfmon in the Start menu or command-line.  
🗑
Offline Files   Stores locally cached versions of network resources. Available on Win 7 Professional, Enterprise & Ultimate  
🗑
Bcedit.exe   Used to enable a VHD file as a boot option- it does not create VHD files. Used to edit BCD (Boot Configuration Data). Creates & modifies BCD store.  
🗑
Shadow Copy   Does NOT copy Offline Files.  
🗑
VSS   Manages & implements shadow copies. The service start up is set to manual.  
🗑
Configure BranchCache with Netsh   netsh BranchCache [command] reset show status set service mode=distributed/local set cachesize set localcache Netsh configures firewall automatically.  
🗑
VPN Technologies Supported by Win 7   PPTP- most connom but least secure. Does not use PKI. L2TP/IPSec- Provides origin authentication, data integrity, relay protection & data condifentiality. SSTP- Uses port 443 which means it usually works with most firewalls. Also uses certificates. IKEv2-  
🗑
Tools that back up EFS Certificates   Certificates Console (certmgr.msc). Manage File Encryption Certificates Tool. Cipher.exe command-line tool.  
🗑
VPN Authentication Protocols   Password Authentication Protocol (PAP), Challenge Authentication Protocol (CHAP), Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2), Protected extensible Authentication Protocol with Transport Layer Security (PEAP-TLS),  
🗑
more VPN Authentication Protocols   EAP-MS-CHAPv2/PEAP-MS-CHAPv2, Smart Card or Other Certificate  
🗑
Effective Permissions Tool   It calculates the permissions that are granted to the specified user or group.  
🗑
Icacls   Command-line utility used to configure NTFS permissions. To view permissions, use: Icacls [file/directory] To grant permissions, use: /grant [user/group: permissions  
🗑
Windows PowerShell Remote Management   Windows 7 uses and requires PowerShell V2. Syntax: Icm hostname [command]  
🗑
WinRS Script Samples   WinRS -r:[pc name/netbios name] [command] ie: WinRS -r:testpc ipconfig To supply passwords: -p:[password] To supply usernames: -u:[username]  
🗑
Windows Remote Management Service   Windows Remote Management is one component of the Windows Hardware Management features that manage server hardware locally and remotely.  
🗑
Remote Desktop   Available on Win 7 Professional, Enterprise & Ultimate. Remote Desktop is disabled by default. Windows firewall automatically changes when Remote Desktop is enabled.  
🗑
802.11n   Still in draft mode. Utilizes MIMO- Multiple Input/Multiple Output  
🗑
802.11g   Speeds up to 54Mbps. Has a good range with little obstructions.  
🗑
802.11a   Speeds up to 54Mbps. Uses 5.0Ghz frequency. Faster than 802.11b but is more likely to be obstructed by walls. Is NOT compatibile with 802.11b.  
🗑
802.11b   Up to 11Mbps. Uses 2.4Ghz frequency. Major interference with microwaves and cell phones.  
🗑
Port-restricted cone   An external host with a specific IP address and source port can send a packet to an internal host ONLY if the internal host sent a packet first.  
🗑
Restricted-Cone NAT   All requests from the same internal IP address & port are mapped to the same external IP address & port. External hosts may send packets only if the internal address sent a packet first.  
🗑
Full-cone NAT   All requests from the same itnernal IP address & port are mappes to the same external IP address & port.  Any external host can send a packet to the itnernal host by sending a packet to the mapped external address.  
🗑
ISATAP Address   Intra-Site Automatic Tunneling Addressing Protocol. This provides IPv6 connectivity within an IPv4 Intranet. The address contains the identifier: 0:5efe  
🗑
Teredo Address   The address looks like: 2001::132. The prefix is followed by the IPv4 publica ddress of the Teredo server.  The enxt 16 bits are reserved for Teredo flags.  
🗑
6to4 Address   This allows IPv6 packets to transmit over an IPv4 network. This is meant to be a temporary solution to a problem. It looks like: 2002:[first 2 bytes of IPv4 address]:[second 2 bytes of IPv4 address]::/16  
🗑
IPv6 Multicast Address   This address starts with:fp  
🗑
IPv6 Link-Local Address   This address starts with:fe8 This is the same as IPv4's IPAPA  
🗑
IPv6 Loopback Address   Also known as: 0:0:0:0:0:0:01 or::1  
🗑
Flash Drive Requirements to be used to install an OS   Must be 4GB+, formatted as FAT 32 and the drive must be set as ACTIVE  
🗑
IPv6 Site-Local Address   This address starts with:fec0 This is the same as IPv4's private addresses  
🗑
APIPA   Uses IPv4 in the range of169.254.0.1 to 169.254.254.254 and a subnet of 255.255.0.0  
🗑
WHQL   Windows Hardware Quality Labs  
🗑
WDS Images: Install   This is an OS image that is deployed to a client PC. The order is:Install, Boot, Capture, Discover  
🗑
mmc devmgt.msc   Run command that launches device manager  
🗑
WDS Images: Boot   This is an image a client boots before you isntall the WIM file.  Capture & discover are types of boot images. The order is:Install, Boot, Capture, Discover  
🗑
WDS   Windows Deployment Services  
🗑
WDS Images: Capture   This is a boot image that you boot a client pc to capture the OS as a WIM install image file.  You do this before you create a custom image file. The order is:Install, Boot, Capture, Discover  
🗑
WDS Images: Discover   This is a boot image that installs Windows 7 on a pc that is not PXE-enabled. This image allows a computer to locate a WDS server and use it to install an image. The order is:Install, Boot, Capture, Discover  
🗑
Hardware Requirements for Windows 7 Starter or Home Premium   1Ghz processor, 512mb RAM, 10GB HDD  
🗑
Hardware requirements for Windows 7 Professional and Ultimate   1Ghz processor, 1GB RAM, 10GB HDD  
🗑
.SWM extension   SWAM files are split or spanned WIM files.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: onlldvd
Popular Computers sets