Thursday, August 9, 2012

Lesson 11—Project 1Key





Establish a remote desktop session with your lab partner’s computer. Attempt to copy a text document from your desktop to the desktop of your partner’s computer.

Was this successful? This should not be successful


Disconnect from your lab partner’s computer. Reconnect to your lab partner’s computer, but first, configure the Remote Desktop options to share your local drives. Attempt to copy a text document from your desktop to your partner’s computer desktop.

Was this successful?

Lesson 11—Exercise 1 Key








List and explain the steps necessary to successfully troubleshoot a problem with Windows 7.

·       List the symptoms
·       Identify the affected area
·       Determine what has changed
·       Look at the most probable cause
·       Implement the solution
·       Test the result of the solution
·       Document the solution


List the steps of the Windows 7 startup process.

·       Power-on self-test
·       Initial startup phase
·       Windows Boot Manager phase
·       Windows Boot Loader phase
·       Kernel loading phase
·       Logon phase

Lesson 10—Project 1Key





Configure the following Account Polices for the Test User1 account you created in the previous exercises. If you did not previously create a user account named Test User1, you will need to do so before completing this, exercise or configure these settings for another user. Ask your instructor to view your screen, showing these settings, when you have completed them.

Password Policies
Set password history to 6
Set minimum password length to 7
Specify that passwords must meet complexity requirements

Account Lockout Policies
Set the account lockout threshold to 4
Set the account lock out duration to 20 minutes
Set reset account lockout timer to 60 minutes


*View each student’s workstation to verify that the settings have been completed correctly.

Lesson 10—Exercise 1Key





List three types of restrictive settings you can configure using Parental Controls.

·       Enforce time limit
·       Restrict access to games by rating, content, or title
·       Allow or block specific applications


List the three basic elements the Windows Firewall can use to make filtering decisions.

·       IP address
·       Protocol number
·       Port number

List the six password policy settings that can be configured in Windows 7.

·       Enforce password history
·       Maximum password age
·       Minimum password age
·       Minimum password length
·       Password must meet complexity requirements
·       Store passwords using reversible encryptions

Lesson 9—Project 1 Key





Using the Local Users and Groups snap-in, create a user called Test User1. Assign the user the password P@ssw0rd. Uncheck the User must change password at next logon box.

Create a local group named TestUsers. Add the Test User1 user account to the TestUsers group.

Using the User Account tab in the Control Panel, change the account type for Test User1 to Standard.

Log in to your student computer using the Test User1 account and attempt to create an additional user.

Could you create the user? Why or why not?

The Test1 User account is a standard user andshould not be able to create a local user account. Creating a user account requires administrative privileges.

Lesson 9—Exercise 1 Key





List the 15 types of built-in local groups in Windows 7.

·       Administrators
·       Backup Operators
·       Cryptographic Operators
·       Distributed COM Users
·       Event Log Readers
·       Guests
·       IIS_IUSRS
·       Network Configuration Operators
·       Performance Log Users
·       Performance Monitor Users
·       Power Users
·       Remote Desktop Users
·       Replicators
·       Users
·       Offer Remote Assistance Helpers



List and explain the three types of user profiles available in Windows 7.

·       Local user profiles: automatically generated profile when the user logs on for the first time. Local profiles are stored on the local computer.
·       Roaming user profile: a copy of the automatically generated local profile that is stored on a network share so that users receive their individual profiles when logging on to any computer.
·       Mandatory user profile:A roaming profile that is read-only, thus preventing users from making any changes to settings.

Lesson 8—Project 1





1.     You and your lab partner are experiencing significant issues with the performance of your lab machines. Work together to troubleshoot your student computers by completing the following tasks.

Open the Event view and access your lab partner’s Event Viewer.  Click through the available tabs to familiarize yourself with the types of events that are listed in each log.

What logs did you view?

Answers will vary but should include System, Application, and Security.

On your student computer, access the Window Experience Index and record your student computer’s Windows Experience Index base score. Compare your index to your lab partner’s index. Explain what is meant by your index.

The Windows Index will be a value between 1 and 5.9. It provides a rating for how well your computer hardware and software are performing. The base score will reflect the lowest subscore of the components monitored.

You computer’s performance is suffering, and you suspect the cause is inadequate RAM. Using Performance Monitor on your student computer, add the Memory Counter and gather statistics for one minute. What can you tell from the data collected?

Memory utilization as well as other memory counter statistics should be low on the student computers.

To further investigate memory utilization, open the Windows Task Manager on your student computer and record the system’s current memory utilization.

Answers will vary depending on the amount of memory installed and the functions performed by the computer at the time.

Lesson 8—Exercise 1 Key




List and explain four types of operating system updates released by Microsoft.

·       Hotfixes:updates that are typically designed to fix a specific problem. Some are released to all Windows users, and some are released only to users experiencing a specific problem.
·       Security update: a hotfix that is designed to address a specific security vulnerability.
·       Cumulative updates or rollups: cumulative updates combine multiple hotfix updates for a specific operating system, element, or application into a single update for easier distribution.
·       Service Packs: a cumulative update for a specific operating system that often goes back to the original release of the operating system.

List and explain the four classifications used to categorize Microsoft updates.

·       Important updates: updates that address issues that need immediate attention and should be installed by all users.
·       Recommended updates: updates that address less critical issues.
·       Optional updates: updates that provide new features or enhancements but are not critical to the operating system’s functionality.
·       Device drivers: Microsoft distributes new hardware drivers that have been fully tested and signed by Microsoft.


What are the four configuration choices for how Windows will treat important updates?

·       Install updates automatically (recommended)
·       Download updates but let me choose whether to install them
·       Check for updates but let me choose whether to download and install them
·       Never check for updates (not recommended)


Lesson 7—Exercise 1 Key



List and explain the four basic add-ons in Internet Explorer 8.

·       Toolbars and Extensions: Enables the web browser to open and manipulate file types or websites that Internet Explorer 8 does not natively support.
·       Search Providers: Allows administrators to define specific search engines to be used by the browser as well as order of preference.
·       Accelerators: Enables users to use the browser to send text or other media to other applications such as email or blogs.
·       InPrivate Filtering: Enables administrators to import XML files with InPrivate filter settings.

List and explain the four security zones in Internet Explorer 8.

·       Internet: Contains all sites that aren’t listed in other zones. Sites in the Internet zone run in Protected Mode.
·       Local Intranet: Internet Explorer 8 detects sites that run from the local intranet and places them in the Local Intranet zone. Sites in this zone do not run in Protected Mode.
·       Trusted Sites: Sites must be manually placed in this zone. These sites run with the highest level of privileges.
·       Restricted Sites: This zone is intended for sites that are known to be malicious. Sites in this zone have the lowest level of privileges. This zone is empty by default.


Lesson 6—Exercise 1 Key





List and explain the four types of permission utilized by Windows 7.

·       NTFS permissions control access to resources stored on disk volumes that are formatted with the NTFS file system.
·       Share permissions control access to resources accessed across a network.
·       Registry permissions control access to specific areas of the Windows Registry.
·       Active Directory permissions control access to Active Directory resources.

List the seven standard NFTS permissions.
·       Full Control
·       Modify
·       Read and Execute
·       List Folder Contents
·       Read
·       Write
·       Special Permissions

What are the three basic methods of sharing a file or folder in Windows 7?
·       Any Folder Sharing
·       Public Folder Sharing
·       Homegroup Sharing

What are the three levels of share permissions?
·       Full Control
·       Change
·       Read

Lesson 6—Project 1 Key





*Depending on your lab setup, parts of this exercise may be beyond the students’ current understanding. If the students do not have multiple user accounts on their student computers, or don’t know how to create an additional user account, they will not be able to complete the exercise.

Create a new folder named Test on your Windows 7 desktop. If necessary, create a user account for this exercise called Test User. Assign Test User the following NTFS permissions to the Test folder: Read and Execute, List Folder Contents, and Read. Log in as Test User and attempt to create a text document inside the Test folder.

Did you succeed? You should not succeed. 

Modify the permissions on Test User to allow Write permissions. Attempt to create a text document inside the Test folder again.

Did you succeed? You should succeed.


Why did you succeed this time?What other permission could you have assigned the Test User account to allow Write permissions?

Another option though less preferred would be to grant Test User Full Control of the folder


Lesson5—Project 1Key



One of your users has reported that she cannot connect to any network resources or to the Internet. Troubleshoot this issue using the tools from your Windows 7 configuration class.

Type the command IPCONFIG on your student computer. Record your IP address, subnet mask, and default gateway.

*Answers will vary based on DHCP configuration or lab configuration.

IP address 192.168.100.10
Subnet mask 255.255.255.0
Default gateway 192.168.100.1

Type the command IPCONFIG /All. Record the address of your DNS server.

*Answers will vary based on DHCP configuration or lab configuration.

DNS server 192.168.100.1

Use the PING command to test your ability to communicate with your default gateway.

Was the PING successful? Record the results of your PING test.



Perform a trace route (tracert.exe) to www.microsoft.com. Was the tracert test successful?

*Answer will vary.




How many different routers can you identify that your trace packet crossed on the way to its destination?

*Answers will vary.

Lesson 5—Exercise 1 Key




List the seven layers of the OSI model.

·       Physical
·       Data-Link
·       Network
·       Transport
·       Session
·       Presentation
·       Application

List the three IP address ranges that have been reserved as private IP address ranges.

10.0.0.0 through 10.255.255.255
172.16.0.0 through 172.31.255.255
192.168.0.0 through 192.168.255.255

List the three types of address supported by IPv4 and IPv6.

IPv4: unicast, broadcast, multicast
IPv6: unicast, anycast, multicast

In addition to address types, IPv6 also supports five scope types, which define the area in which the address must be unique. List the five scope types.

·       Node-local
·       Link-local
·       Site-local
·       Organization-local
·       Global

List and explain the three default network location options in Windows 7. Is there a fourth type of network connection? Please explain.

·       Home: Computer is connected to a home network and not directly connected to the Internet. Network discovery and file sharing are allowed.
·       Work: Computer is connected to a workgroup or small office and not directly connected to the Internet. File sharing and network discovery are permitted, but the computer cannot join a home group.
·       Public: Computer is connected to a network in a public place that is not considered secure. Network discovery and file sharing are disabled.
·       Domain: Indicates the computer is a member of an active directory domain. This option is configured automatically when a computer joins a domain.

Lesson 4—Project 1 Key





1.     One of your development users has asked for an additional partition on a computer in order to experiment with dual booting. Using the Disk Management Snap-In, create a 2 GB partition on your student computer. Format the partition with the NTFS file system.  Take a screenshot of the Disk Management screen showing the new partition to hand into your instructor. Spend a few minutes exploring the configuration options available in the Disk Management Snap-In. When complete, please delete the partition created in the exercise.

*Answers will vary based on the disk configuration of the student PC

2.     Launch the Diskpart.exe utility from the command line. When you see the DISKPART> prompt, type? and hit the Enter key. Record the configuration options below.



What are two modes that Diskpart can operate in?
Script Mode and Interactive Mode


Which tool, Disk Management or DiskPart, provides greater configuration options?

DiskPart

Lesson 4—Exercise 1 Key





Explain the two supported Windows 7 partition styles. What are the advantages of each partition style? Include in your explanation the number and type of partitions available with each partition type.

Windows 7 supports two partition types, Master Boot Record (MBR) and Globally Unique Identifier Partition tables (GPT).

MBR supports four partitions: three primary partitions and one extended partition.
MBR supports a maximum volume size of 2 terabytes.
MBR does not support replication or CRC.

GPT supports 128 primary partitions.
GPT supports volumes up to 18 exabytes.
GPT supports CRC for increased reliability.

Explain what is meant by the terms primary partition, extended partition, logical drive, and active partition.

·       Primary partition: Acts as separate disk space, can host and operating system
·       Extended partition: Cannot host an operating system, can be subdivided into logical drives
·       Active partition: the primary partition that hosts the operating system the computer will boot from

 What two disk types are supported in Windows 7?

Basic and dynamic

What are the four volume types available in Windows 7?  Explain the advantages and disadvantages of each.

·       Simple volume: Contains space for a single disk, can be extended if more disks are added, can be created on basic or dynamic disks.
·       Spanned volume: Contains space for 2 to 32 disks, all disks must be dynamic, Windows 7 writes to the disk in order (when disk 1 is full it begins writing to disk 2), can be extended, does not improve read-write, does not provide fault tolerance.
·       Striped volume: Contains space for 2 to 32 disks, cannot be extended, all disks must be dynamic, system writes data in stripes across all disks, improves disk performance, does not provide fault tolerance.
·       Mirrored volume: Contains an equal amount of disk space for two disks, both disks must be dynamic, each mirrored disk contains an identical copy of the data, provides fault tolerance, useable disk space is one-half that of other volume types.



Lesson 1—Exercise 1





List and explain the five high-level deployment steps that are typically a part of an enterprise workstation deployment.

·       Build a deployment image.
·       Perform a reference computer installation.
·       Capture an image of the reference computer.
·       Boot the target computers.
·       Apply the Windows 7 reference computer image.

Explain the advantages of using Microsoft Imaging rather than traditional imaging.

The advantages of Microsoft imaging include .wim files being:

·       Bandwidth efficient
·       Nondestructive
·       Hardware independent
·       Compressed
·       Compatible with multiple operating systems
·       Capable of single-instance storage
·       Spannable
·       Bootable
·       Editable

List and explain the seven different configuration passes in an answer file.

·       Windows PE
·       Offline servicing
·       Generalize
·       Specialize
·       AuditSystem
·       AuditUser
·       OOBE System

windows 7 lession 3



Lesson 3Project 1 Key

Your company is planning an enterprise deployment of Windows 7 to 1,000 workstations, which include seven different hardware platforms. You have been asked to research the Microsoft tools and utilities that are available for this project. Please explain in detail your proposed approach to this deployment project. Also explain why you have eliminated some of the possible options. Would your solution change if all of the target computers were identical?

In this scenario, which involves multiple hardware configurations, using the Windows SIM tool with an answer file might be the best approach. Answer files automate tasks such as device driver, format options, and many other Windows parameters that must be configured during the installation process. Using an answer file does not eliminate the process of preparing reference computers and gathering images, but does allow you to provide answers to configuration questions that occur during installation.

If the hardware platforms were all identical, Windows Deployment Services would be a good option for performing the upgrade. On a network that has SCCM installed, the Microsoft Deployment Toolkit also offers attractive tools.

windows 7 Lesson 2 Q & Ans




List and explain at least four functions that should be performed prior to beginning an upgrade to Windows 7 from a previous version of Windows.

Possible answers may include:

Run Upgrade Advisor
Check hardware compatibility
Search for updated drivers
Check application compatibility
Check disk space
Ensure computer functionality
Perform a full backup


Explain what two tools are available for migrating user settings and files during a migration to Windows 7. Discuss when it would be appropriate to use each tool.

The Windows Easy Transfer tool is designed to transfer user files and settings on a single computer. It can be used to transfer profile information for multiple users on a single computer but is not designed to transfer information for multiple computers. Windows Easy Transfer can perform a side-by-side migration when migrating data between different computers, or a wipe-and-clean migration when a single computer is being upgraded. The Windows Easy Transfer tool can be used to transfer files and setting from Windows XP or Windows Vista to Windows 7.


The User State Migration Tool 4.0 (USMT) is designed to migrate user profile information for a large group of computers. USMT 4.0 can also be used to transfer from Windows XP or Windows Vista to Windows 7.