Saturday, October 10, 2015

Beautiful bird

Saturday, August 15, 2015

The cockroach theory for self development - by Sunder Pitchai, CEO of Google.

At a restaurant, a cockroach suddenly flew from somewhere and sat on a lady.
She started screaming out of fear.
With a panic stricken face and trembling voice, she started jumping, with both her hands desperately trying to get rid of the cockroach.

Her reaction was contagious, as everyone in her group also got panicky.
The lady finally managed to push the cockroach away but ...it landed on another lady in the group.

Now, it was the turn of the other lady in the group to continue the drama.
The waiter rushed forward to their rescue.

In the relay of throwing, the cockroach next fell upon the waiter.

The waiter stood firm, composed himself and observed the behavior of the cockroach on his shirt.

When he was confident enough, he grabbed it with his fingers and threw it out of the restaurant.

Sipping my coffee and watching the amusement, the antenna of my mind picked up a few thoughts and started wondering, was the cockroach responsible for their histrionic behavior?
If so, then why was the waiter not disturbed?
He handled it near to perfection, without any chaos.
It is not the cockroach, but the inability of those people to handle the disturbance caused by the cockroach, that disturbed the ladies.

I realized that, it is not the shouting of my father or my boss or my wife that disturbs me, but it's my inability to handle the disturbances caused by their shouting that disturbs me.

It's not the traffic jams on the road that disturbs me, but my inability to handle the disturbance caused by the traffic jam that disturbs me.

More than the problem, it's my reaction to the problem that creates chaos in my life.
Lessons learnt from the story:

I understood, I should not react in life.
I should always respond.
The women reacted, whereas the waiter responded.

Reactions are always instinctive whereas responses are always well thought of.
A beautiful way to understand............LIFE.

Person who is HAPPY is not because Everything is RIGHT in his Life..
He is HAPPY because his Attitude towards Everything in his Life is Right..!!,,,,,,,

Tuesday, May 26, 2015

Difference Between VLAN and Subnet

Subnetting and implementation of VLANs provide administrators flexibility when trying to come up
with networks on medium to very large scales. In essence, VLANs and subnets are similar in the
Difference Between VLAN and Subnet | Difference Between | VLAN vs Subnet purpose of their development. But when you peel off their general similarities, obvious differences emerge whether by functionality,operation, or deeper objectives.
VLAN (Virtual Local Area Network) exists when two or more ports are connected physically or grouped together by some piece of network hardware/software that supports VLAN functionalities. On the whole, a VLAN is very similar to that of a physical LAN. Their main difference is VLANs capability to group end stations together without the requirement of
being located on the same network switch. In VLAN, configuration of the network can be done via
software extensively. Basically, VLANs are used at layer 2 to break up broadcast domains.
Each VLAN is considered as a separate entity and it can only reach another VLAN through a
router. You can use a single network with VLANs but when one network goes down for some
reason, the entire logical network is concerned. VLANs are very useful when an IT professional
(system or network admin) wants to group organization departments for better work performance,
less traffic, and more efficiency.
A subnet is essentially a group of IP addresses. Any particular address can reach any address without using any routing device if they belong to the same subnet. Now, if the address you want to reach is outside of your subnet, then just like in VLANs, you will have to go through a router. 
Subnet is at layer 3 (IP), wherein IP addresses belong.
When you are subnetting, you are actually dividing an IP address into smaller subnets. This
accomplishes an addition of multiple networks to the system, a thing that any organization or
agency would constantly need. The great thing about subnetting is that subnets are unaffected with
other subnets going down or having technical breakdowns.
It can be said that VLAN is software-based and subnetting is primarily hardware-based. Though
VLANS are somewhat perceived to be lacking in security as they can be hacked, it is still the
more popular network segregation of choice by many administrators.

Summary:
1. VLAN is found to be more popular than subnetting but, more often than not, both are used to
complement each other.
2. VLAN is works at the layer 2 while subnet is at layer 3.
3. Subnets are more concerned about IP addresses. 
4. Many would consider that subnetting is more secure but VLAN brings more network efficiency.
5. VLAN is largely software-based while subnet is hardware-based.

Nature

Saturday, May 23, 2015

The basic steps in configuring a VLAN are:

Plan your network.
Create the VLANs.
Associate switch ports with the VLANs.
Test VLAN connectivity.

Implement security measures as appropriate.

Active vs Passive FTP

Introduction

One of the most commonly seen questions when dealing with firewalls and other Internet connectivity issues is the difference between active and passive FTP and how best to support either or both of them. Hopefully the following text will help to clear up some of the confusion over how to support FTP in a firewalled environment.
This may not be the definitive explanation, as the title claims, however, I've heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...

The Basics

FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.

Active FTP

In active mode FTP the client connects from a random unprivileged port (N > 1023) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.
From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:
FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1023 (Server responds to client's control port)
FTP server's port 20 to ports > 1023 (Server initiates data connection to client's data port)
FTP server's port 20 from ports > 1023 (Client sends ACKs to server's data port)
When drawn out, the connection appears as follows:

In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.
The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.

Active FTP Example

Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the last two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.
testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PORT 192,168,150,80,14,178
200 PORT command successful.
---> LIST
150 Opening ASCII mode data connection for file list.
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.

Passive FTP

In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.
In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1023 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1023) and sends P back to the client in response to the PASV command. The client then initiates the connection from port N+1 to port P on the server to transfer data.
From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:
FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1023 (Server responds to client's control port)
FTP server's ports > 1023 from anywhere (Client initiates data connection to random port specified by server)
FTP server's ports > 1023 to remote ports > 1023 (Server sends ACKs (and data) to client's data port)
When drawn, a passive mode FTP connection looks like this:

In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port.
While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.
The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.
NOTE: This is no longer the case--use the -p option with the Solaris FTP client to enable passive mode!
With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.

Passive FTP Example

Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.
testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PASV
227 Entering Passive Mode (192,168,150,90,195,149).
---> LIST
150 Opening ASCII mode data connection for file list
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.

Other Notes

A reader, Maarten Sjouw, pointed out that active FTP will not function when used in conjunction with a client-side NAT (Network Address Translation) device which is not smart enough to alter the IP address info in FTP packets.

Summary

The following chart should help admins remember how each FTP mode works:
Active FTP :
command : client >1023 -> server 21
data : client >1023 <- 20="" font="" server="">

Passive FTP :
command : client >1023 -> server 21
data : client >1024 -> server >1023
A quick summary of the pros and cons of active vs. passive FTP is also in order:
Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.
Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously. See Appendix 1 for more information.  

Active and passive are the two modes that FTP can run in. FTP uses two channels between client and server, the command channel and the data channel, which are actually separate TCP connections. The command channel is for commands and responses, the data channel is for actually transferring files. It's a nifty way of sending commands to the server without having to wait for the current data transfer to finish.

In active mode, the client establishes the command channel (from client port X to server port 21(b)) but the server establishes the data channel (from server port 20(b) to client port Y, where Y has been supplied by the client).

In passive mode, the client establishes both channels. In that case, the server tells the client which port should be used for the data channel.

Passive mode is generally used in situations where the FTP server is not able to establish the data channel. One of the major reasons for this is network firewalls. While you may have a firewall rule which allows you to open up FTP channels to ftp.microsoft.com, Microsoft's servers may not have the power to open up the data channel back through your firewall.

Passive mode solves this by opening up both types of channel from the client side. In order to make this hopefully clearer:

Active mode:

Client opens up command channel from client port 2000(a) to server port 21(b).
Client sends PORT 2001(a) to server and server acknowledges on command channel.
Server opens up data channel from server port 20(b) to client port 2001(a).
Client acknowledges on data channel.
Passive mode:

Client opens up command channel from client port 2000(a) to server port 21(b).
Client sends PASV to server on command channel.
Server sends back (on command channel) PORT 1234(a) after starting to listen on that port.
Client opens up data channel from client 2001(a) to server port 1234(a).
Server acknowledges on data channel.
At this point, the command and data channels are both open.

(a)Note that the selection of ports on the client side is up to the client, as the selection of the server data channel port in passive mode is up to the server.


(b)Further note that the use of port 20 and 21 is only a convention (although a strong one). There's no absolute requirement that those ports be used although the client and server both have to agree on which ports are being used. I've seen implementations that try to hide from clients by using different ports (futile, in my opinion).

Wednesday, April 29, 2015

Nature scenery

Thursday, April 23, 2015

Pictures


Monday, April 20, 2015

Mani Rathnam becomes Money Rathnam again

Director Mani Rathnam is very happy about his results of his new film O Kadhal Kanmani. He was very rare to meet press or giving interview to satellite TV channels and he never conduct any type of functions for his movies' 100th day of 25th week.
But we can witness him very often in satellite TV channels. I met him in Pudhu Yugam channel and Coffee with DD @ Vijay TV yesterday.
Press says Mani Rathnam becomes Money Rathnam again after the success of O Kadhal Kanmani.

Wednesday, April 01, 2015

Microsoft Announces Its Own Linux OS

I got fooled today after reading this article, which says that Microsoft announces its own Linux OS.
To know more about that visit these links
http://itsfoss.com/microsoft-announces-linux-os
http://en.wikipedia.org/wiki/April_Fools%27_Day

Thursday, February 12, 2015

How to Prepare Grape Wine

3 lbs. black grapes
3 lbs. sugar
1 oz. yeast
1 gal. water

Crush grapes by hand and set aside in the fermenting vessel.
Bring the water to boiling point and pour in sugar,
when the water reaches boiling point again and the sugar is dissolved,
cut off heat and pour sugar liquid over grapes.
Allow mix to cool, sprinkle yeast on top. Stir in, cover with plastic wrap tied in place with a string.
Ferment 21 days, strain and bottle.

you can prepare more kind of grapes wine from the recipe given here:
http://www.cooks.com/rec/search/0,1-0,black_grape_wine,FF.html

Wednesday, February 11, 2015

Semmozhi Anthem - AR Rahman

(TMS)
Pirapokkum ella uyirkum pirandha pinnar
(ARR) yaddhum ooreee yaavarum kellirrr
(Harini) onnbadhu naazhi udupathu irende 
(Chinmayi) uraividam enbadhu ondre 
(Karthik) uraithu vazhndhom uzhaithu vazhvom.. 
(Hariharan) theedhum nandrum pirar thara vaarai yenum nan mozhiye nam pon mozhiyaam 
(Yuvan) porrai puram thallzhi porulai podhuvaakave.. 
(Chorus) amaidhi vazhi kaatum anbu mozhi ayyan valluvarin vaaimozhiyaam 
(ARR + Yuvan + Chorus) SEMMOZHIYAANA TAMIZH MOZHIYAAAM 
(P Susheela humming..) 
(Vijay Yesudas) orrarivu mudhal aararivu uyirinam varayile unarndhidum udal amaipai pagirthu koorum 
(P Susheela) orrarivu mudhal aararivu uyirinam varayile unarndhidum udal amaipai pagirthu koorum 
(G.V.Prakash Kumar) thozhgapugal thozhgapiyamum oppatra kural koorum uyar panpaadu 
(Naresh Iyer + chorus) olikindra silamubum meghalayum sindhamaniyudane.. 
(T.L.Maharajan) vazhayapathi kundalakesiyumm.. 
(Chorus+ Nithya Shree humming) SEMMOZHIYAANA TAMIZH MOZHIYAAAM 
(Blaaze + ?) kamba naataalvarum kavi arasiyevai nallaalum yemmadhamum yetrum puzhgal endrum yethanayo aayiram kavidhai neivor tharum thadai anaithukkum vithaaga vilangum mozhi 
(Nagoor Brothers)SEMMOZHIYAANA TAMIZH MOZHIYAAAM 
(Dr.Bala Murali Karishna + Srinivas + chorus) aagam endrum puram endrum vazhvai azhagaaga vaguthalithu aadhi anddam illathu irukindra iniya mozhi modhi vazharum uyiraana uzhaga mozhi thamm mozhi namm mozhi adhuve... 
(Sruti Haasan) SEMMOZHIYAANA TAMIZH MOZHIYAAAM 
tamizh mozhi tamizh mozhi tamizh mozhi ya ghaaa... 
(Chorus) SEMMOZHIYAANA TAMIZH MOZHIYAAAM 
(Chinnapponnu) Thamizh Mozhiyam Engal Thamil Mozhiyam 
(ARR) Vazhiya Vazhiya ve..Thamizh .. Vazhiya Vazhiya ve 
(ARR) SEMMOZHIYAANA TAMIZH MOZHIYAAAM 

Rap of Hosanna - Vinnai Thandi Varuvaya

Everybody wanna know be like be like, I really wanna be here with you.. Is that enough to say that we are made for each other is all that is *Hosaana* true Hosaanna... be there when you are calling i will be there.. Hosaanna... be the life the whole life i share.. i never wanna be the same.. its time we re arrange i take a step, you take a step and me calling out to you...

My Honda Activa 2013: Full features and Specifications

Engine:
·         Type: High rigidity under Bone type
·         No. of Cylinders: Single
·         No. of Valves: 10
·         Displacement: 110 cc
Performance:
·         Max. Power:  9 Bhp @ 7500 rpm
·         Max. Torque: 9 Nm @ 5500 rpm
Built:
·         Dimensions: 710x1147x1761 mm
·         Weight: 110 kg
Suspension:
·         Front: Bottom Link with spring loaded hydraulic damper
·         Rear: Unit swing with spring loaded hydraulic damper
Gears and Brakes:
·         Front: Disk
·         Rear: Drum 130mm
·         Gears: Automatic
Capacity:
·         Fuel Tank Capacity: 5.3 lit.
·         Seating Capacity: 2
Handle:
·         Ground Clearance: 145 mm
Wheel & Tyres:
·         Wheel Type: Alloy
·         Wheel Size: 12’
·         Wheel Base: 1238 mm
·         Tubeless
Other Specifications:
·         Top speed: 80 kmph
·         Cooling Type: Air cooling
·         Carburetor: Direct
·         Engine block Material: Steel
·         Electrical System: Self
·         Headlamp: 35W
·         Horn: Single
·         Self start
·         Step-up Seat
Available Colors:
·         Geny grey metallic
·         Candy Lucid red
·         Metallic black
·         Orchid blue metallic
·         Armour gold metallic
·         Pearl sunbeam white

Tuesday, February 10, 2015

XP Questions

1. consults the software administrator.The software administrator suggests about installing Windows XP professional.Identify the feature of Window XP professional edition, which would help in solving the above problem?
    1. support for multiple processors
    2. Support for 32 bit CPU
    3. Internet remote service
  1. Answer: A
  2. Mary works for a computer training institute in North America.After discussing the steps of installing Windows XP professional in the class room, Mary divided the students in a group of two and asked them to complete the installation on their respective machines.But none of the students were able to complete the installation process.Identify the solution that is the cause to the above problem.
    1. Needs to run XP Upgrade Adviser to avoid compatibility problem
    2. Needs to run XP Upgrade Professional to avoid compatibility problem
    3. Needs to run XP Upgrade Home Edition to avoid compatibility problem
    4. Needs to run XP Service Pack to avoid compatibility problem
Answer: A
  1. anes Technologies is a leading microprocessor manufacturing organization.After the launch of Windows XP professional in the market and its spreading popularity day by day, Ron, the owner of the organization decided to upgrade machines operating system in theoffice.This is decided because the interface of Windows XP would help the employees in increasing their work efficiency. To familiarize employees with the installation procedure of Windows XP professional, Ron also arranged a training session for the employees.But during the installation process, some employees found problem in installing Windows XP.Identify the correct sequence of steps for installing Windows XP that would help the employees in completing their task.
    1. File copy, GUI mode setup, Text mode setup, Windows welcome
    2. GUI mode setup, File copy, Text mode setup, Windows welcome
    3. Text mode setup, GUI mode setup, File copy, Windows welcome
    4. File copy, Text mode setup, GUI mode setup, Windows welcome
Answer: D
  1. The hardware engineer of Janes Technologies is stuck at a point during the installation process of Windows XP professional.He wants to eliminate forced reboot after file copying phase of the setup process is complete.For this purpose, he is unable to find a command that will perform this operation.Identify the command and help him in completing the installation process.
    1. /noreboot
    2. /noboot
    3. /nostart
    4. /norestart
Answer: A
  1. Mary works for a computer training institute in North America.After discussing the steps of installing Windows XP professional in the class room, Mary divided the students in a group of two and asked them to complete the installation on their respective machines.The students were able to complete the installation process successfully but were finding problem in creating and deploying disk images.Now help the students by identifying the file that is used for creating and deploying disk images.
    1. sys.exe
    2. sys.dll
    3. sysprep.dll
    4. sysprep.exe
Answer: D
  1. You need to support eight users who work at one of your company%26apos;s remote offices.The users work on Windows XP Professional computers.There is a firewall at the remote office.Identify the component that is installed by default during the installation process of Windows XP in the remote office?
    1. Fax service
    2. Networking service
    3. Network file and Print services
    4. Indexing service
Answer: D
  1. Ron has recently purchased a new computer system.He has planned to install Windows XP professional on the system along with other several software.For this purpose, he has consulted the vendor to install the software as required by him.But after several notifications also, the vendor was unable to reach his place and perform the task.Then, he decided to install Windows XP at his own.Identify the file that will provide him detailed instruction and technical information during the installation process.
    1. Deploy.chm
    2. Ref.chm
    3. Ins.chm
    4. Help.chm
Answer: A
  1. Mary while instructing the class about the installation process of different versions of Windows also decided to discuss the importance and significance of the Windows Setup Manager Wizard.Identify the operating system, which supports this wizard and creates an answer file for automated installation process?
    1. Windows 95
    2. Windows XP Professional
    3. Windows 98
    4. Windows me
Answer: B
  1. Don is a system administrator for a renowned travel agency.The agency is planning to upgrade its computer systems to Windows XP Professional.Most of the computers are networked but some computers do not have CD-ROM drives.How can Don upgrade the computer systems without CD-ROM drives to Windows XP Professional?
    1. can attach a portable tape backup unit to each computer and install the operating system from it.
    2. can use the windows installer program to push out the operating system.
    3. can perfom the installation over a network share.
    4. can not install windows XP Professional unless he installs a CD-ROM drive in the computer systems that do not have them.
Answer: C
  1. Don is using a dual boot system between Windows 2000 Professional and Windows XP Professional.Ron installed Windows 2000 Professional in a primary partition which is C drive, and Windows XP Professional is installed in the logical drive in extended partition which is D drive.Don now planned to install Windows 2003 in the unallocated space in the hard disk.When Don attempt to create a new primary partition using Disk Management snap-in, he received a message prompting him to make necessary change.The following shows the content of your Boot.ini: 
    [operating systems] 
    multi(0)disk(0)rdisk(0)partition(1)%255cWINNT=%2526quot;Windows 2000 Professional%2526quot; 
    multi(0)disk(0)rdisk(0)partition(2)%255cWINNT=%2526quot;Windows XP Professional%2526quot; 
    Identify the change that should be done in boot.ini.
    1. multi(0)disk(0)rdisk(0)partition(3)%255cWINNT="Windows 2000 Professional" /fastdetect
    2. multi(0)disk(0)rdisk(0)partition(1)%255cWINNT="Windows XP Professional" /fastdetect
    3. multi(0)disk(0)rdisk(0)partition(2)%255cWINNT=%2526quot;Windows 2000 Professional%2526quot; /fastdetect
    4. multi(0)disk(0)rdisk(0)partition(3)%255cWINNT=%2526quot;Windows XP Professional%2526quot;/fastdetect
Answer: C

you open the Properties sheet of the folder you are about to share, you notice you are able to share the folder but there is not an option to assign share permissions to individual groups and users.What should you do?

    1. After sharing the folder, switch to the Security tab and set appropriate permissions.
    2. Disable the Use simple file sharing option in Folder Options.
    3. Protect the Shared Folder with a password and give this password only to the users that need access.
    4. Convert the FAT32 volume to NTFS.
  1. Answer: B
  2. You are the administrator at a large company.The company policy is that all data is stored on file servers using shared folders, never locally.Many users have a notebook which they often take out of the office.All these users are a member of the Power Users group on their Windows XP client.You want to prevent all these users from making some of the shared folders available offline.What should you do?
    1. In the Advanced properties for Offline Files, select the Never allow my computer to go offline check box on each of the client computers.
    2. Disable the option Allow Caching of files in this shared folder in the Caching settings of each appropriate shared folder on the file servers.
    3. On the Offline Files tab of Folder Options disable the option Enable Offline Files on each file server.
    4. On the Offline Files tab of Folder Options disable the option Enable Offline Files on each client computer.
Answer: B
  1. You are the administrator at a huge company.You just recently upgraded almost all Windows 98 clients to Windows XP.In some rare situations you installed Windows XP on a second partition to create a dual-boot installation.At one of these clients you need to install a new 40 GB hard disk and format it as one partition which both operating systems will be able to access.What should you do?
    1. Use Windows 98 to format the partition with FAT32.
    2. Use Windows XP to format the partition with FAT32.
    3. Use Windows 98 to format the partition with NTFS.
    4. Use Windows XP to format the partition with NTFS.
Answer: A
  1. You are the administrator of a medium sized company.All the clients are running Windows XP Professional.At the end of a workday, you install an unsigned driver for a mass storage device on one of the clients.When the computer restarts you get a blue screen with Stop 0xc0000218 (0xe11a30e8, 0x00000000, 0x000000000, 0x00000000) UNKNOWN_HARD_ERROR.What should you do?
    1. Start Windows in Safe mode and reinstall the driver.
    2. Boot the computer from the Windows XP Professional installation CD and run Automated System Recovery.
    3. Start Windows using the Last Known Good configuration.
    4. Start Windows using the Recovery Console and restore the most recent full backup.
Answer: C
  1. You are the desktop administrator at a major enterprise.You just installed a second disk in one of the Windows XP clients and formatted it with NTFS.You are moving a large amount of files from an NTFS compressed folder on C: to a new uncompressed folder on the new D: drive.What will be the compression state of the files after they are moved?
    1. The files will be compressed.
    2. The files will be uncompressed.
    3. Both the target folder and the files will be compressed.
    4. Only the target folder but not the files will be compressed
Answer: B
  1. You have upgraded 10 laptops to Windows XP Professional.All users complain they experience problems when putting the computer in standby mode.You investigate and discover that the client computers' BIOS version does not support ACPI.What should you do to solve their problems?
    1. (Choose 2)
    2. Perform a complete re-install of Windows XP
    3. Disable Power Management
    4. Update the BIOS
    5. Perform an in-place upgrade of Windows XP
Answer: C, D
  1. You are the desktop administrator for your company.Five users in the Marketing department use software that produces a large amount of graphics and video related files on their local hard disks.They want this data to be included in the daily backup, but you do not want to pull hundreds of gigabytes extra over the company's LAN.
All their computers are connected to a single 100Mbps switch so you decide to add a tape drive to one of the Windows XP Professional desktops in the Marketing department.You create a share on each desktop computer, which contains the data that should be included in the backup.Because of the large amount of data, you want to use a backup method that takes the least amount of time to backup the data to tape.
Which of the following backup methods should you use?
    1. Perform a Normal/Full backup every Monday and an Incremental backup for Tuesday, Wednesday, Thursday, and Friday.
    2. Perform a Normal backup every Monday and a Copy backup for Tuesday, Wednesday, Thursday, and Friday.
    3. Perform a Normal backup every Monday and a Differential backup for Tuesday, Wednesday, Thursday, and Friday.
    4. Perform a Weekly backup every Monday.Create an Daily backup for Tuesday, Wednesday, Thursday, and Friday.
Answer: A
  1. You are the desktop administrator for your company.All client desktop computers run Windows XP Professional and have one 80GB dynamic disk with 2 simple NTSF volumes.The C: volume holds the operating system and the user's applications.The D: volume contains only user data.
One of the users in the Marketing department requires more disk space for user data.Instead of restoring the contents of both drives on a larger hard disk, you decide to add an additional hard disk.How should you configure the disks for the best performance and the most usable disk space?
    1. Create a spanned volume by extending volume D: to include the unallocated disk space of the second disk.
    2. Create a striped volume by extending volume D: to include the unallocated disk space of the second disk.
    3. Create a mirrored volume by mirroring the contents of volume D: to a new volume E: on the second disk.
    4. Create a new simple volume on the second hard disk and mount it to a folder on volume D:
Answer: A
  1. You are the network administrator at a small-sized company.Your workgroup became too large so you installed a Windows 2000 domain controller and turn the workgroup into a domain.You have successfuly joined all the Windows XP Professional clients to the domain and everything seemed to work fine.The next morning some of your users complain they are not able to switch users using the Fast User Switching feature.What should you do?
    1. Click User Accounts in the Control Panel, click Change the way users log on or off and enable the Use Fast User Switching option
    2. Click User Accounts in the Control Panel, click Change the way users log on or off and enable the Use Welcome Screen option
    3. Instruct your users to press the WIN-L button to switch users.
    4. Inform the users Fast User Switching is not available on computers that are joined to a domain.
Answer: D
  1. You want to reduce the amount of space used on one of your FAT32 drive fast, so you decide to compress a folder named Odata with user data such as Word and Excel docs.When you want to enable compression on the folders properties sheet you notice compression is not available.How can you compress the files with the least amount of administrative effort and still be able to read the files?
    1. Convert the drive to NTFS using convert.exe /fs:ntfs to enable NTFS File Compression
    2. Convert the drive to NTFS using fs.exe /ntfs to enable NTFS File Compression
    3. Create a new Compressed Folder and drag all the files from the Odata folder to the Compressed Folder and delete the original Odata folder
    4. Use NTbackup.exe to create a file backup with maximum compression and delete the original Odata folder
Answer: C





received a popup when he started the image scanning software asking him if he wanted to search the Internet for new software and drivers.The user accepts and the update utility downloads and installs an updated driver for the scanner.
  1. When the user attempted to use the scanner, the computer stopped responding.He calls you and explains the problem.He also informs you that he already rebooted the computer but when he tried to use the scanner again the computer stopped responding again.
What should you tell the user to do?
    1. Restart the computer using the Last Known Good Configuration.
    2. Use the Recovery Console to disable the device and restore the previous driver.
    3. Configure the Driver Signing options to Ignore unsigned files.
    4. Use the Driver Roll Back option in Device Manager to restore the previous driver.
Answer: D
  1. You are the desktop administrator for your company.All client computers run Windows XP Professional and are members of a single Windows 2003 domain.You create a shared folder on one of the client computers and you assign the share permission Full Control to the Sales group and read to Everyone.You assign the share permission Change to Michael, who is a member of the Marketing group.You deny Full Control NTFS permissions for the Marketing group.
What are Michael's effective permissions when connecting to the shared folder?
    1. Read
    2. Read and Execute
    3. Change
    4. Full Control
    5. No access
Answer: E
  1. You are the administrator for a small company with 15 clients.All client desktop computers run Windows XP Professional and are members of a single workgroup.One of the computers is equipped with a large and fast SCSI hard disk to allow for a centralized location for file sharing.The disk is still basic and contains one large FAT32 partition.Because this computer contains most of the company's critical data, you have been asked to implement a fault tolerant solution to protect the data.Although you perform a backup every night, the downtime to restore the data could have disastrous financial consequences, so you decide to add an additional SCSI disk and create a mirrored volume.
What should you do to be able to implement the RAID 1 solution on the computer?
    1. Use Disk Management to convert the disk to dynamic.
    2. Use Disk Management to convert the disk to NTFS.
    3. Run Windows XP Setup and press F6 to install the Windows Mirrored Volume driver.
    4. Reinstall the computer with Windows 2000 or 2003 Server.
Answer: D
  1. You are the domain administrator for your company.All client computers run Windows XP Professional and are members of a single Windows 2003 domain.One of the users, Julia, created a shared folder on her computer and asks you to set the permissions.She wants everyone in the Sales department to be able to do everything except changing permissions for the shared folder.Nobody else in the company should be granted access of any kind.She wants to maintain Full Control over the shared folder's permission settings.
How should you assign the permissions?
    1. (Choose 3.)
    2. Remove Everyone from the share permissions.
    3. Assign the share permission Full Control to the Sales group.
    4. Assign the share permission Change to the Sales group.
    5. Assign Full Control share permissions to Julia.
    6. Deny the share permission Full Control to the Sales group.
    7. Deny the share permission Full Control to Everyone.
    8. Assign the NTSF permission Modify to the Sales group.
Answer: A, C, G
  1. You are the desktop administrator for your company.All client computers run Windows XP Professional and are members of a single Windows 2003 domain.All clients use a single shared Internet connection.You want to install 20 new clients using an answer file and you are current testing out the image on a test client.You've added the following text to the unattend.txt file:
[UserData]
ProductID = ABCDE-12345-FGHI6-JKLM7-NOPQ8

When you run the installation on the test computer, you notice that the Activation failed.What should you do to allow automatic product activation during setup?
    1. Open port 80 and 443 on the firewall.
    2. Add AutoActivate = Yes to the [Unattended] section of the answer file.
    3. Add the msoobe /a command to the autoexec.bat of each client.
    4. Add the /a and /ID parameters to winnt.exe when starting setup on the clients.
Answer: B
  1. You want to share a printer on your Windows XP Professional client named Wrkst12, to allow IPP clients to print documents across the Internet.You installed PWS, shared the printer under the name Printer01, and set the appropriate permissions.What is the correct URL users should use to connect to the printer by using the Add Printer wizard?
    1. http://Wrkst12/Printers/Printer01/.printer
    2. http://Wrkst12/Printer01/.printer
    3. http://Wrkst12/Printer01/
    4. http://Wrkst12/Printers/Printer01/
    5. http://Printer01/
Answer: A
  1. You are a network technician assigned to troubleshoot problems with your company's enterprise network Windows 2000 environment.You have just been informed that a user's computer running Windows XP Professional has crashed.Upon inspection you notice that this computer will begin to load but the GUI no longer will come up.It will not load past the POST.What utility can you use to retrieve the files off this computer before the hard drive is formatted and a new image put back on?
    1. ScanDisk
    2. Device Manager
    3. Last Known Good Configuration
    4. Recovery Console
Answer: E
  1. You share a folder on your computer and you assigned the share permission Change to Everyone.John, a user from the Sales department, has been granted Full Control NTFS permission to the folder.John is also a member of the Sales group, which has been assigned Read NTFS permissions.
    What are John's effective permissions when connecting to the shared folder?
    1. Read
    2. Read and Execute
    3. Change
    4. Full Control
Answer: C
  1. Your Windows XP Professional computer won't boot correctly.You want to use the Recovery Console to troubleshoot, but you did not install it using the winnt32.exe /cmdcons command.How should you access the Recovery Console?
    1. Using the Windows XP Advanced Options Menu at system startup
    2. By pressing the F8 key at system startup
    3. From Repair option of Setup
    4. Add the /cmdcons switch to the Windows XP ARC path in the boot.ini file.
Answer: C
  1. Which of the following is true concerning drive compression in Windows XP Professional?
    1. You can compress files and folders only on drives formatted with NTFS.
    2. Compressed files and folders cannot be shared.
    3. Compressed files and folders can be encrypted.
    4. Compressed files and folders cannot be encrypted
Answer: A, D

Monitor for a few minutes and notice the following averages: % Processor Time: 90%, Page per Sec: 0.7%, Disk Time: 14%.Which component is probably the cause of the slow performance?
    1. Processor
    2. Physical Disk
    3. Page File
  1. Answer: A
  2. You are the desktop administrator for your company.All client desktop computers run Windows XP Professional and are members of a Windows 2000 domain.You have lost your file encryption certificate and you cannot access your encrypted files.What are possible ways to decrypt the files?
    1. Restore a backup copy of your file encryption certificate and private key in a .pfx file format from a floppy disk.
    2. Log on as the administrator of the local computer and decrypt the files.
    3. Log on as the domain administrator and decrypt the files.
    4. Log on as the administrator of the local computer and take ownership of the files.
    5. Restore a backup copy of the file using NT Backup.
Answer: A, C
  1. You are using Windows XP Professional operating system on your laptop with docking station.While in the office your files are redirected from "My Documents" local folder to a folder on the network file server.You want to be able to view these files either at work or on the road and have all files in this folder be current and up to date.What is the correct procedure to accomplish this?
    1. (select all that apply)
    2. From My Computer, Tools Menu, Folder Options, Enable Offline Files.
    3. From the Remote Directory, File Menu, Select Make Available Offline.
    4. Copy the remote folder to your local directory.On the folders properties page, select synchronize with offline folders.
    5. From the Local Directory, File Menu, Select Make Available Offline.
    6. Select Synchronize all offline files before logging off.
Answer: A, E
  1. You are setting up a user to print to a Network Printer without assigning this user to a print server.What is the proper way to configure thisuser's PC?
    1. In the printers properties dialogue, specify the port to print to LPT1:
    2. Set the Spool Settings to spool document first, and then print
    3. Select Automatically Detect My Plug and Play Printer
    4. Add a Standard TCP/IP local port
    5. Enable Printer Pooling
    6. Stop and restart the print spool service
Answer: D
  1. You are installing an LPR port on your Windows XP Professional client to be able to print to a print device connected to a UNIX print server.Which of the following information do you need to provide?
    1. IP address or host name of the UNIX print server
    2. IP address or host name of the print device
    3. The name of the print queue on the UNIX server
    4. The name of the print queue on the print device
Answer: A, C
  1. You are the administrator at a small law firm.A couple of minutes ago, one of your Windows XP Professional clients' hard disk crashed, and you plan to recover from this disaster using Automated System Recovery.You have the tape from the ASR set you created by using Backup's ASR Wizard, but you cannot find the ASR floppy disk.
What should you do to be able to perform the ASR restore?
    1. (Select the best answer.)
    2. Use the Backup utility on another Windows XP Professional client to recreate the ASR floppy.
    3. Use the Backup utility on another Windows XP Professional client to restore the necessary files from the %systemroot%\repair directory on the tape to a floppy.
    4. Copy the ASR.* files from the i386 directory on the Installation CD to a boot floppy.
    5. Copy the ASR.* files from the %systemroot%\repair directory on another Windows XP Professional client to a floppy disk.
    6. Perform the restore without using the ASR floppy disk.
Answer: B
  1. You are the administrator of a small Windows 2000 Active Directory domain.You want to install 20 non-PXE compliant Windows XP Professional clients by using RIS.You installed and configured Remote Installation Services on the DHCP server.You configured the clients to boot from the network but when you boot a client you are not prompted to start the download of the client installation wizard.What should you do?
    1. Run RIPREP.exe on the target clients before you boot them.
    2. Create a boot disk with a network client and manually start the installation by running winnt.exe.
    3. Create a startup disk by using the RBFG.exe utility.
    4. Install a WINS server in the domain.
    5. Install a DNS server in the domain.
Answer: C
  1. You are the domain administrator at a large company.Your company uses a custom directory application for contact information.You want this application to be automatically installed when users from the Sales department log on to a computer.Which of the following should you do?
    1. Assign the package to the computer accounts of the users in the Sales department.
    2. Publish the package to the computer accounts of the users in the Sales department.
    3. Assign the package to the user accounts of the users in the Sales department.
    4. Publish the package to the user accounts of the users in the Sales department.
Answer: C
  1. You have recently upgraded several Windows 98 clients to Windows XP Professional.To make use of advanced NTFS features such as file and folder permissions and encryption, you decide to convert the client's hard disks to NTFS.What should you do?
    1. Run the convert C: /fs:ntfs command.
    2. Upgrade the clients again and choose to convert the file system this time.
    3. Use the Disk Manager to convert the file system.
    4. Reformat the disk with NTFS and restore a full backup
Answer: A
  1. You are the desktop administrator at a small company.All clients run Windows XP Professional.One of these clients is used as a print server, besides two locally attached printers the print server serves several Hewlett Packet JetDirect network printers configured to use a standard TCP/IP port.One of the users complains about print jobs taking too much time to be printed.You verify the print server and notice the C: drive is nearly full.What should you do the increase the performance of the print server?
    1. Change the location for the print spooler on the Advanced tab of the Printer properties to another disk.
    2. Change the location for the print spooler on the Advanced tab of the Print Server properties to another disk.
    3. Relocate the print queue of the network printers to the JetDirect adapters.
    4. Replace the Standard TCP/IP port with a DLC port for the HP printers.
Answer: B