Guide to Managing and Maintaing Your Pc Chapter 20
In:
Submitted By spartan123 Words 424 Pages 2
Chapter 20
1. The three types of user accounts used by Windows Vista is administrator, standard user, and guest accounts.
2. The four types of user accounts used by Windows XP is administrator, power user, limited user, and guest accounts.
3. You use the computer management console and create user accounts to create a new user group.
4. Windows XP uses a simple file sharing by default, which restricts control over who has access to a shared folder or file.
5. Parent folders use inherited permissions which are obtained from the parent folder.
6. A folder can be shared on the network when the permissions for a remote user is set. These permissions are called share permissions.
7. To change the permissions for all 10 folders, you must go into you’re settings and click advanced. And edit the advanced security settings.
8. For windows XP to be able to share its resources, you must enable two services. Client for Microsoft networks and the print sharing services.
9. If you are changing permissions of a folder that was created by another user, try taking ownership of the folder. So you are granted access.
10. A shared folder whose names ends with a $ is called a hidden share.
11. It is possible to use administrative shares when folders are shared by default on a network that administrator’s accounts can assess.
12. By using the EFS certificate it is required to decrypt the files. Although the drive holding the encrypted file or folders must use the NTFS file system.
13. The commands to decrypt a file is cipher/d C:/filename.ext.
14. You can use the certmgr.msc console to launch the certificate manager console.
15. You can use the file extension a .cer file without a private key and a .pfx for file with private key.
16. If you cannot access you’re encrypted after a new installation of windows and you have a backup copy of your certificate, import the certificate in windows, and then add it to the encrypted file.
17. You must use TPM chip that holds the bit locker encryption key.
18. The first thing you do when if an infected computer is connected to network is to immediately disconnect the network cable or turn off the wireless adapter.
19. The best tool to find out the purpose of a program that is running is by using the Microsoft support page.
20. You can use the Task Kill Command to stop the process that is more powerful than the task manager.