Previous Page | Next Page

  1. Introduction
  2. Capabilities
  3. Structure
  4. The Registry
  5. System and Configuration Files
  6. Security
  7. Application Support
  8. Requirements
  9. Installation
  10. Unattended Installation
  11. Booting
  12. Filesystems
  13. Programs
  14. Control Panel
  15. Tool
  16. Commands
  17. Customization
  18. Environment Variables
  19. Printing
  20. Performance
  21. System Services
  22. Permissions
  23. Groups
  24. User Rights and Auditing
  25. User Profiles
  26. Policies
  27. Network Model
  28. Resource Access
  29. Network Browsing
  30. Protocol Support
  31. RAS
  32. Networking
  33. Backups
  34. Events
  35. Error Handling
  36. Diagnostic Tools
  37. Items to Memorize
  38. Terms
  39. Credits

Items to Memorize for the Test

This page includes items to memorize for the certification test (beyond the obvious working knowledge).

  • RISC computers that NT can run on are PowerPC, MIPS, and DEC Alpha.
  • The requirements for memory and Hard drive space for i386 and RISC computers. I386: 12 Mb 120Mb RISC: 16 MB, 160Mb. Recommended RAM: 16Mb i386, 24Mb RISC.
  • Executive services - I/O Manager, Object Manager, LPC Facility, Security Reference Monitor, Process Manager, Virtual memory manager, and GDI.
  • Environmental subsystems are OS/2, Win32, and POSIX.
  • Winnt and Winnt32 options - /B /C /E /F /I
  • Permissions - RWXDPO, No Access(), List(RX), Read(RX), Add(WX), Add and Read(RWX), Change(RWXD), Full(RWXDPO), special file or folder access.
  • Groups are administrators, power users, users, guests, backup operators, and replicators. Special groups are system, everyone, interactive, network, creator/owner.
  • Three types of policies are account, user rights, and audit policy.
  • The 5 registry subkeys are HKEY_LOCAL_MACHINE, HKEY_CURRENT_CONFIG, HKEY_USERS, HKEY CURRENT USERS, and HKEY_CLASSES_ROOT. HKEY_LOCAL_MACHINE includes: hardware, software, system, SAM, and security.
  • Script variables include %PROCESSOR%, %HOMEDRIVE%, %HOMEPATH%, %OS%, %USERDOMAIN%, %USERNAME%.
  • Be familiar with the various control panel applets.
  • Remember access controls (RWEDPO), Share level permissions (Read, Change, Full control, no access), and folder permissions (No access List[RX], read[RX], add[WX], add and read[RWX], change, full control, special access).
  • Backup methods - Normal, copy, incremental, backup, daily, incremental backup. Backup options - replace, restrict access to owner or administrator, verify after backup, backup registry. Backup logging options - Summary, full detail, don't log. Restore options - Verify after restore, Restore file permissions, restore registry (local).
  • CACLS - Command line utility used to change file permissions on several files at once. /T - Change permissions for files specified in the current directory and all its subdirectories. Options: /E - Edit the ACL without replacing it. /C - Ignore errors when replacing ACLs. (Continue) /G - Specified access rights are to be granted (C-change, or R-read, or F-full control) /R - Used with the /E option it is used to revoke access rights to users. /P - Replace user access rights(N-none, C, R, F). /D - Deny access. "CACLS filename options User:permissions"

Other things to remember for the test.

  • Unattend.txt file created with SETUPMGR.EXE. One UDF file is required for installing to various types of computers.
  • FDISK cannot remove an NTFS partition. Use the Floppy install disks to remove the partition.
  • If a CDROM is not on the HAL, installation can still work when installing from a different OS such as DOS.
  • Copied files inherit permission of the folder or partition they are copied to while moved files retain their permissions.
  • Accounts created by default are administrator and guest.
  • When copying a user account, fields left blank are username, Full name, Password and confirm password, user cannot change password box, and account disabled box. The description is copied.
  • Page file default size is 11M plus physical RAM.
  • Users may have a local or roaming profile. The roaming profile is created in User Manager by specifying the UNC name of the computer and path where the profile will be stored. Mandatory profiles can be set by changing the .DAT file to .MAN in the registry so users cannot change the profile.
  • Regedit cannot be used to search the registry for application references. Regedit32 must be used.
  • NT4.0 cannot be installed on an HPFS filesystem. If upgrading an NT version that operates on HPFS, the filesystem must be converted to NTFS before the upgrade.
  • The BOOT partition contains the System32 directory, and the System partition contains the NTLDR, BOOT.INI, and NTDETECT.COM files.
  • 1 to 32 partitions may be contained in a volume set. A volume set cannot be shrunk in size.
  • The CDFS filesystem cannot be backed up
  • Permission parenthesis line (All)(All) - The first is permissions for that directory and subdirectories, the second are special permissions on current and new files in the directory. Options are: Access not specified, Full control, other (R,W,X,D,P,O).
  • Backups - On questions always assume the file archive bits should be set during backups.
  • DefaultDomainName and DefaultUserName values in the Winlogon registry keys to automate the logon process.
  • NT server does not support logon via telnet.