MCSA/MCSE Self-Paced Training Kit (Exam 70-299) Implementing and Administering Security in a Microsoft Windows Server 2003 Network

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2004-03-24
Publisher(s): Microsoft Press
List Price: $59.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Announcing an all-new MCSA/MCSE Training Kit designed to help maximize your performance on Exam 70-299, one of two core exams for the MCSE: Security specialization and an elective for MCSA and MCSE. This kit packs the tools and features exam candidates want mostincluding in-depth, self-paced training based on exam content; exam tips from an expert, exam-certified author; and a robust testing suite. It also provides real-world scenarios, case study examples, and troubleshooting labs for the skills and expertise you can apply to the job.Focusing on implementing and administering network security in a Windows Server 2003 environment, the official study guide covers implementing, managing, and troubleshooting security policies, patch management infrastructure, security features for network communications, and planning, configuring, and troubleshooting authentication, authorization, and PKI.Ace your exam preparation by working at your own pace through the lessons, hands-on exercises, and practice tests. The flexible, best-of-class testing suite features a test engine on CD with 325 practice questions. Choose timed or untimed testing mode, generate random tests or focus on discrete objectives or chapters, and get detailed explanations for right and wrong answersincluding a customized learning path to enhance further study. You also get a 180-day evaluation version of Windows Server 2003 softwaremaking this kit an exceptional value and a great career investment.

Author Biography

Orin Thomas, MCITP, MCSE, Microsoft MVP, is a writer, teacher, and consultant whose books include the SELF-PACED TRAINING KITs for Windows 7 Exam 70-680 and Windows Server® 2008 Exams 70-646 and 70-647.

Table of Contents

Acknowledgments xxi
About This Book xxiii
Intended Audience
xxiii
Prerequisites
xxiv
About the CD-ROM
xxiv
Features of This Book
xxv
Part 1: Learn at Your Own Pace
xxv
Part 2: Prepare for the Exam
xxvi
Informational Notes
xxvi
Notational Conventions
xxvii
Keyboard Conventions
xxviii
Getting Started
xxviii
Hardware Requirements
xxviii
Software Requirements
xxix
Setup Instructions
xxix
The Microsoft Certified Professional Program
xxx
Certifications
xxxi
Requirements for Becoming a Microsoft Certified Professional
xxxi
Technical Support
xxxii
Evaluation Edition Software Support
xxxiii
Part I Learn at Your Own Pace
1 Planning and Configuring an Authentication Strategy
1-3(1)
Why This Chapter Matters
1-3(1)
Before You Begin
1-4(1)
Lesson 1: Understanding the Components of an Authentication Model
1-6(1)
The Difference Between Authentication and Authorization
1-6(1)
Network Authentication Systems
1-7(1)
Storing User Credentials
1-8(1)
Authentication Features of Windows Server 2003
1-9(1)
Authentication Protocols in Windows Server 2003
1-9(1)
LM Authentication
1-11(1)
NTLM Authentication
1-12(1)
The Kerberos Authentication Process
1-13(1)
Storage of Local User Credentials
1-15(1)
Tools for Troubleshooting Authentication Problems
1-16(1)
Lesson Review
1-16(1)
Lesson Summary
1-17(1)
Lesson 2: Planning and Implementing an Authentication Strategy
1-18(1)
Considerations for Evaluating Your Environment
1-18(1)
Guidelines for Creating a Strong Password Policy
1-19(1)
Options for Account Lockout Policies
1-21(1)
Options for Creating a Kerberos Ticket Policy
1-22(1)
Windows 2003 Authentication Methods for Earlier Operating Systems
1-24(1)
Using Multifactor Authentication
1-27(1)
Practice: Adjusting Authentication Options
1-28(1)
Lesson Review
1-30(1)
Lesson Summary
1-31(1)
Lesson 3: Configuring Authentication for Web Users
1-32(1)
Configuring Anonymous Access for Web Users
1-32(1)
Configuring Web Authentication
1-33(1)
Delegated Authentication
1-34(1)
Practice: Configuring Anonymous Authentication
1-36(1)
Lesson Review
1-39(1)
Lesson Summary
1-40(1)
Lesson 4: Creating Trusts in Windows Server 2003
1-41(1)
Trusts in Windows Server 2003
1-43(1)
Practice: Creating Trusts
1-49(1)
Lesson Review
1-53(1)
Lesson Summary
1-55(1)
Case Scenario Exercise
1-56(1)
Troubleshooting Lab
1-57(1)
Chapter Summary
1-58(1)
Exam Highlights
1-60(1)
Key Topics
1-60(1)
Key Terms
1-60(1)
Questions and Answers
1-61(1)
Design Activity: Case Scenario Exercise
1-65(1)
Design Activity: Troubleshooting Lab
1-65(1)
2 Planning and Configuring an Authorization Strategy
2-1(1)
Why This Chapter Matters
2-1(1)
Before You Begin
2-2(1)
Lesson 1: Understanding Authorization
2-3(1)
Access Control Lists
2-3(1)
Effective Permissions
2-4(1)
Inheriting Permissions
2-5(1)
Standard and Special Permissions
2-7(1)
Practice: Denying Access Using Group Membership
2-14(1)
Lesson Review
2-16(1)
Lesson Summary
2-18(1)
Lesson 2: Managing Groups in Windows Server 2003
2-19(1)
Types of Groups in Windows Server 2003
2-19(1)
Group Scopes
2-20(1)
Domain and Forest Functional Levels
2-22(1)
Built-In Groups
2-24(1)
Special Groups and Accounts
2-28(1)
Tools for Administering Security Groups
2-32(1)
Creating Restricted Groups Policy
2-32(1)
Practice: Creating Groups and Assigning Rights
2-34(1)
Lesson Review
2-35(1)
Lesson Summary
2-37(1)
Lesson 3: Planning, Implementing, and Maintaining an Authorization Strategy
2-38(1)
Authentication, Authorization, and the Principle of Least Privilege
2-38(1)
User/ACL Authorization Method
2-39(1)
Account Group/ACL Authorization Method
2-39(1)
Account Group/Resource Group Authorization Method
2-40(1)
Group Naming Conventions
2-41(1)
Defining Which Users Can Create Groups
2-43(1)
Group Nesting
2-44(1)
When to Retire Groups
2-44(1)
Lesson Review
2-45(1)
Lesson Summary
2-46(1)
Lesson 4: Troubleshooting Authorization Problems
2-47(1)
Troubleshooting Simple Authorization Problems
2-47(1)
Troubleshooting Complex Authorization Problems
2-48(1)
Lesson Review
2-54(1)
Lesson Summary
2-55(1)
Case Scenario Exercise
2-55(1)
Scenario
2-55(1)
Questions
2-56(1)
Troubleshooting Lab
2-57(1)
Scenario
2-57(1)
Questions
2-57(1)
Chapter Summary
2-58(1)
Exam Highlights
2-59(1)
Key Topics
2-59(1)
Key Terms
2-60(1)
Questions and Answers
2-61(1)
Design Activity: Case Scenario Exercise
2-65(1)
Design Activity: Troubleshooting Lab
2-65(1)
3 Deploying and Troubleshooting Security Templates
3-1(7)
Why This Chapter Matters 3-2
Before You Begin 3-2
Lesson 1: Configuring Security Templates 3-4
Predefined Security Templates
3-5(1)
Security Template Planning
3-6(1)
Creating and Editing Security Templates
3-7(1)
Security Template Settings
3-9(1)
Security Configuration for Earlier Versions of Windows
3-13(1)
Practice: Create and Examine a New Security Template
3-14(1)
Lesson Review
3-16(1)
Lesson Summary
3-17(1)
Lesson 2: Deploying Security Templates
3-18(1)
Deploying Security Templates Using Active Directory
3-18(1)
Deploying Security Templates Without Active Directory
3-25(1)
Practice: Applying and Deploying Security Templates
3-27(1)
Lesson Review
3-29(1)
Lesson Summary
3-30(1)
Lesson 3: Troubleshooting Security Templates
3-31(1)
Troubleshooting Problems with Applying Group Policy
3-31(1)
Troubleshooting Unexpected Security Settings
3-38(1)
Troubleshooting System Policy
3-43(1)
Lesson Review
3-44(1)
Lesson Summary
3-45(1)
Case Scenario Exercise
3-45(1)
Troubleshooting Lab
3-48(1)
Chapter Summary
3-49(1)
Exam Highlights
3-50(1)
Key Topics
3-50(1)
Key Terms
3-50(1)
Questions and Answers
3-51(1)
Design Activity: Case Scenario Exercise
3-54(1)
Design Activity: Troubleshooting Exercise
3-55(1)
4 Hardening Computers for Specific Roles
4-1(1)
Why This Chapter Matters
4-1(1)
Before You Begin
4-2(1)
Lesson 1: Tuning Security for Client Roles 4-3
Planning Managed Client Computers 4-4
Software Restriction Policies
4-5(1)
Security for Desktop Computers
4-7(1)
Security for Mobile Computers
4-(1)
Security for Kiosks
4-9(1)
Practice: Restricting Software
4-10(1)
Lesson Review
4-13(1)
Lesson Summary
4-14(1)
Lesson 2: Tuning Security for Server Roles
4-15(1)
Firewalls
4-16(1)
Perimeter Networks
4-19(1)
Security for DHCP Servers
4-21(1)
Security for DNS Servers
4-26(1)
Security for Domain Controllers
4-29(1)
Security for Internet Information Services
4-31(1)
Security for Internet Authentication Service
4-39(1)
Security for Exchange Server
4-43(1)
Security for SQL Server
4-46(1)
Practice: Hardening Servers and Analyzing Traffic
4-50(1)
Lesson Review
4-52(1)
Lesson Summary
4-54(1)
Lesson 3: Analyzing Security Configurations
4-55(1)
Security Configuration And Analysis
4-55(1)
Microsoft Baseline Security Analyzer-Graphical interface
4-56(1)
Microsoft Baseline Security Analyzer-Command-Line Interface
4-58(1)
Practice: Analyzing Security Configurations
4-58(1)
Lesson Review
4-60(1)
Lesson Summary
4-60(1)
Case Scenario Exercise
4-61(1)
Troubleshooting Lab
4-63(1)
Chapter Summary
4-65(1)
Exam Highlights
4-66(1)
Key Topics
4-66(1)
Key/Terms
4-67(1)
Questions and Answers
4-68(1)
Design Activity: Case Scenario Exercise
4-70(1)
Design Activity : Troubleshooting Lab
4-73(1)
5 Planning an Update Management Infrastructure
5-1(1)
Why This Chapter Matters
5-1(1)
Before You Begin
5-2(1)
Lesson 1: Updating Fundamentals
5-3(1)
Introduction to Updates
5-3(1)
Types of Updates
5-4(1)
Product Lifecycles
5-10(1)
Chaining Updates
5-11(1)
Lesson Review
5-12(1)
Lesson Summary
5-13(1)
Lesson 2: Updating Infrastructure
5-14(1)
The Updating Team
5-14(1)
Assessing Your Environment
5-15(1)
Deploying Updates
5-16(1)
The Update Test Environment
5-24(1)
Practice: Evaluating Your Updating Infrastructure
5-25(1)
Lesson Review
5-26(1)
Lesson Summary
5-27(1)
Lesson 3: Updating Process
5-28(1)
Discovering Updates
5-29(1)
Evaluating Updates
5-30(1)
Retrieving Updates
5-32(1)
Testing Updates
5-33(1)
Installing Updates
5-33(1)
Removing Updates
5-34(1)
Auditing Updates
5-35(1)
Practice: Evaluating Your Updating Process
5-36(1)
Lesson Review
5-36(1)
Lesson Summary
5-37(1)
Case Scenario Exercise
5-37(1)
Scenario
5-37(1)
Questions
5-39(1)
Troubleshooting Lab
5-42(1)
Chapter Summary
5-43(1)
Exam Highlights
5-43(1)
Key Topics
5-44(1)
Key Terms
5-44(1)
Questions and Answers
5-45(1)
Design Activity: Case Scenario Exercise
5-48(1)
Design Activity: Troubleshooting Lab
5-50(1)
6 Assessing and Deploying a Patch Management Infrastructure
6-1(1)
Why This Chapter Matters
6-1(1)
Before You Begin
6-2(1)
Lesson 1: Assessing Patch Levels
6-3(1)
The M BSA Console
6-3(1)
MBSACLI
6-6(1)
Practice: Assessing Patch Levels on the Current Network
6-11(1)
Lesson Review
6-13(1)
Lesson Summary
6-14(1)
Lesson 2: Deploying Updates on New Clients
6-15(1)
Security Considerations
6-15(1)
Integrated Installation
6-19(1)
Scripting Non-Microsoft Updates
6-23(1)
Practice: Creating an Integrated Installation
6-24(1)
Lesson Review
6-25(1)
Lesson Summary
6-26(1)
Lesson 3: Deploying Updates on Existing Clients
6-27(1)
Manually Applying Updates
6-27(1)
Windows Update Web Site
6-29(1)
Software Update Services
6-29(1)
Automatic Updates Client
6-32(1)
Group Policy
6-36(1)
Practice: Configuring Software Update Services and the Automatic Updates Client
6-38(1)
Lesson Review
6-41(1)
Lesson Summary
6-42(1)
Scenario Exercise
6-43(1)
Scenario
6-43(1)
Questions
6-43(1)
Troubleshooting Lab
6-45(1)
Scenario
6-45(1)
Questions
6-46(1)
Chapter Summary
6-46(1)
Exam Highlights
6-47(1)
Key Topics
6-47(1)
Key Terms
6-48(1)
Questions and Answers
6-49(1)
Design Activity: Case Scenario Exercise
6-51(1)
Design Activity: Troubleshooting Lab
6-53(1)
7 Installing, Configuring, and Managing Certification Services
7-1(1)
Why This Chapter Matters
7-1(1)
Before You Begin
7-2(1)
Lesson 1: Public Key Infrastructure Fundamentals
7-3(1)
Cryptography and Encryption
7-3(1)
Public Key Infrastructure
7-4(1)
Windows Server 2003 Certificate Services
7-8(1)
Practice: Configuring a CA Hierarchy
7-13(1)
Lesson Review
7-17(1)
Lesson Summary
7-17(1)
Lesson 2: Managing Certificate Templates
7-19(1)
Overview of Certificate Templates
7-19(1)
Certificate Template Versions
7-21(1)
Certificate Template Usage
7-21(1)
Certificate Template Permissions
7-24(1)
Methods for Updating a Certificate Template
7-25(1)
Practice: Superseding Certificate Templates
7-27(1)
Lesson Review
7-29(1)
Lesson Summary
7-30(1)
Lesson 3: Deploying and Revoking Certificates
7-31(1)
Certificate Enrollment Process
7-31(1)
Certificate Enrollment Methods
7-32(1)
Revoking Certificates
7-35(1)
Publishing CRLs
7-36(1)
Troubleshooting CRL Publishing
7-38(1)
Practice: Creating and Revoking Certificates
7-39(1)
Lesson Review
7-44(1)
Lesson Summary
7-45(1)
Lesson 4: Archiving and Recovering Certificates
7-46(1)
Overview of Key Recovery
7-46(1)
Exporting Keys
7-47(1)
Key Archival
7-49(1)
Key Recovery
7-50(1)
Practice: Exporting and Recovering Keys
7-52(1)
Lesson Review
7-58(1)
Lesson Summary
7-59(1)
Case Scenario Exercise
7-59(1)
Scenario
7-59(1)
Questions
7-60(1)
Troubleshooting Lab
7-61(1)
Scenario
7-61(1)
Exercise 1: Re-Creating the Problem
7-61(1)
Questions
7-62(1)
Chapter Summary
7-63(1)
Exam Highlights
7-64(1)
Questions and Answers
7-66(1)
Design Activity: Case Scenario Exercise
7-69(1)
Design Activity: Troubleshooting Lab
7-70(1)
8 Planning and Configuring IPSec
8-1(1)
Why This Chapter Matters
8-1(1)
Before You Begin
8-2(1)
Lesson 1: IPSec Fundamentals
8-3(1)
IPSec Overview
8-3(1)
Securing Host-to-Host Communications
8-4(1)
Securing Host-to-Network Communications
8-6(1)
Securing Network-to-Network Communications
8-8(1)
Negotiating IPSec Connections
8-10(1)
Authentication Header and ESP
8-13(1)
IPSec in Windows
8-13(1)
Lesson Review
8-15(1)
Lesson Summary
8-16(1)
Lesson 2: Planning an IPSec Infrastructure
8-17(1)
Active Directory Considerations
8-17(1)
Authentications for IPSec
8-18(1)
Testing IPSec
8-21(1)
Lessor Review
8-22(1)
Lesson Summary
8-23(1)
Lesson 3: Configuring IPSec
8-24(1)
IP Filters
8-24(1)
Filter Actions
8-26(1)
IP Security Rules
8-29(1)
Configuring IP Security Policies with Graphical Tools
8-30(1)
Configuring IP Security Policies with Command-Line Tools
8-32(1)
Certificate Revocation List Checking
8-33(1)
Practice: Configuring IP Security Policies
8-34(1)
Lesson Review
8-38(1)
Lesson Summary
8-39(1)
Case Scenario Exercise
8-39(1)
Scenario
8-39(1)
Questions
8-40(1)
Troubleshooting Lab
8-41(1)
Scenario
8-41(1)
Questions
8-42(1)
Chapter Summary
8-42(1)
Exam Highlights
8-43(1)
Key Topics
8-43(1)
Key Terms
8-44(1)
Questions and Answers
8-45(1)
Design Activity: Case Scenario Exercise
8-47(1)
Design Activity: Troubleshooting Lab
8-48(1)
9 Deploying and Troubleshooting IPSec
9-1(1)
Why This Chapter Matters
9-1(1)
Before You Begin
9-2(1)
Lesson 1: Deploying IPSec
9-3(1)
Deploying IPSec by Using Active Directory
9-3(1)
Deploying IPSec Using Scripts
9-6(1)
Deploying Certificate Services for IPSec
9-10(1)
Practice: Deploying IPSec Configurations
9-12(1)
Lesson Review
9-16(1)
Lesson Summary
9-17(1)
Lesson 2: Monitoring IPSec
9-18(1)
IP Security Monitor Snap-In
9-18(1)
Event Viewer
9-23(1)
IKE Tracing
9-28(1)
Netsh
9-29(1)
Performance Console
9-29(1)
Network Monitor
9-30(1)
Netcap
9-31(1)
Ping
9-32(1)
IPSecMon
9-33(1)
IPSecCmd
9-33(1)
Netdiag
9-33(1)
Practice: Monitoring IPSec
9-34(1)
Lesson Review
9-38(1)
Lesson Summary
9-39(1)
Lesson 3: Troubleshooting IPSec
9-40(1)
General Troubleshooting Guidelines
9-40(1)
Kerberos Authentication Problems
9-41(1)
Certificate Authentication Problems
9-42(1)
Troubleshooting Firewalls, Routers, and Packet Filtering
9-43(1)
Network Address Translation Problems
9-43(1)
Interoperability Problems
9-44(1)
Lesson Review
9-46(1)
Lesson Summary
9-46(1)
Case Scenario Exercise
9-47(1)
Scenario
9-47(1)
Questions
9-48(1)
Troubleshooting Lab
9-49(1)
Scenario
9-50(1)
Questions
9-50(1)
Chapter Summary
9-51(1)
Exam Highlights
9-52(1)
Key Topics
9-52(1)
Key Term
9-52(1)
Questions and Answers
9-53(1)
Design Activity: Case Scenario Exercise
9-55(1)
Design Activity: Troubleshooting Lab
9-56(1)
10 Planning and Implementing Security for Wireless Networks
10-1(1)
Why This Chapter Matters
10-1(1)
Before You Begin
10-2(1)
Lesson 1: Wireless Network Security Fundamentals
10-3(1)
Security Threats
10-3(1)
WEP
10-4(1)
Wi-Fi Protected Access
10-11(1)
Other Wireless Security Techniques
10-13(1)
Lesson Review
10-15(1)
Lesson Summary
10-15(1)
Lesson 2: Configuring Wireless Security
10-17(1)
Planning Wireless Access Policies
10-17(1)
Designing the Authorization Strategy
10-19(1)
Configuring the Certificate Infrastructure
10-20(1)
Configuring IAS
10-21(1)
Configuring Wireless Clients
10-24(1)
Configuring WAPs
10-29(1)
Practice: Deploying WEP Encryption with PEAP Authentication
10-29(1)
Lesson Review
10-34(1)
Lesson Summary
10-35(1)
Case Scenario Exercise
10-36(1)
Scenario
10-36(1)
Questions
10-36(1)
Troubleshooting Lab
10-37(1)
Scenario
10-38(1)
Question
10-38(1)
Chapter Summary
10-39(1)
Exam Highlights
10-39(1)
Key Topics
10-39(1)
Key Terms
10-40(1)
Questions and Answers
10-41(1)
Design Activity: Case Scenario Exercise
10-42(1)
Design Activity: Troubleshooting Lab
10-43(1)
11 Deploying, Configuring, and Managing SSL Certificates
11-1(1)
Why This Chapter Matters
11-1(1)
Before You Begin
11-2(1)
Lesson 1: Overview of Secure Sockets Layer (SSL)
11-3(1)
How SSL Works
11-3(1)
Comparing SSL with IPSec
11-4(1)
Obtaining SSL Certificates
11-5(1)
Renewing SSL Certificates
11-6(1)
Configuring Firewalls
11-7(1)
Lesson Review
11-8(1)
Lesson Summary
11-9(1)
Lesson 2: Configuring SSL for IIS
11-10(1)
Using SSL Certificates with a Web Site
11-10(1)
The Web Server Certificate Wizard
11-12(1)
Client Certificates
11-16(1)
Troubleshooting SSL
11-19(1)
Practice: Using Certificates for SSL
11-21(1)
Lesson Review
11-24(1)
Lesson Summary
11-25(1)
Lesson 3: Other SSL Applications
11-26(1)
Enabling SSL on Active Directory Domain Controllers
11-26(1)
Enabling SSL on Computers Running SQL Server
11-27(1)
Enabling SSL on Mail Servers
11-31(1)
Enabling SSL on Microsoft Outlook
11-33(1)
Practice: Protecting Active Directory Communications
11-34(1)
Lesson Review
11-37(1)
Lesson Summary
11-38(1)
Case Scenario Exercise
11-38(1)
Scenario
11-38(1)
Questions
11-39(1)
Troubleshooting Lab
11-40(1)
Scenario
11-41(1)
Questions
11-41(1)
Chapter Summary
11-42(1)
Exam Highlights
11-43(1)
Key Topics
11-43(1)
Key Terms
11-43(1)
Questions and Answers
11-44(1)
Design Activity: Case Scenario Exercise
11-46(1)
Design Activity: Troubleshooting Lab
11-47(1)
12 Securing Remote Access
12-1(1)
Why This Chapter Matters
12-1(1)
Before You Begin
12-2(1)
Lesson 1: Remote Access Fundamentals
12-3(1)
Remote Access Methods
12-3(1)
VPN Protocols
12-5(1)
Authentication Methods
12-8(1)
Lesson Review
12-15(1)
Lesson Summary
12-16(1)
Lesson 2: Configuring Remote Access Servers
12-17(1)
Configuring Authentication
12-17(1)
Configuring Authorization
12-19(1)
Configuring Authentication with Certificates or Smart Cards
12-23(1)
Practice: Configuring a VPN Server and Client
12-24(1)
Lesson Review
12-28(1)
Lesson Summary
12-29(1)
Lesson 3: Configuring Remote Access Clients
12-30(1)
Configuring Client-Side Authentication Protocols
12-30(1)
CMAK Wizard
12-32(1)
Practice: Using the CMAK
12-35(1)
Lesson Review
12-41(1)
Lesson Summary
12-41(1)
Case Scenario Exercise
12-41(1)
Scenario
12-41(1)
Questions
12-42(1)
Troubleshooting Lab
12-43(1)
Scenario
12-43(1)
Questions
12-44(1)
Chapter Summary
12-44(1)
Exam Highlights
12-45(1)
Key Topics
12-45(1)
Key Terms
12-45(1)
Questions and Answers
12-47(1)
Design Activity: Case Scenario Exercise
12-49(1)
Design Activity: Troubleshooting Lab
12-50(1)
Part II Prepare for the Exam
13 Implementing, Managing, and Troubleshooting Security Policies (1.0)
13-3(1)
Testing Skills and Suggested Practices
13-4(1)
Further Reading
13-5(1)
Objective 1.1: Plan Security Templates Based on Computer Role
13-7(1)
Objective 1.1 Questions
13-8(1)
Objective 1.1 Answers
13-11(1)
Objective 1.2: Configure Security Templates
13-14(1)
Objective 1.2 Questions
13-15(1)
Objective 1.2 Answers
13-20(1)
Objective 1.3: Deploy Security Templates
13-23(1)
Objective 1.3 Questions
13-24(1)
Objective 1.3 Answers
13-29(1)
Objective 1.4: Troubleshoot Security Template Problems
13-32(1)
Objective 1.4 Questions
13-33(1)
Objective 1.4 Answers
13-36(1)
Objective 1.5: Configure Additional Security Based on Computer Roles
13-38(1)
Objective 1.5 Questions
13-39(1)
Objective 1.5 Answers
13-42(1)
14 Implementing, Managing, and Troubleshooting Patch Management Infrastructure (2.0)
14-1(1)
Testing Skills and Suggested Practices
14-1(1)
Further Reading
14-2(1)
Objective 2.1: Plan the Deployment of Service Packs and Hotfixes
14-4(1)
Objective 2.1 Questions
14-5(1)
Objective 2.1 Answers
14-11(1)
Objective 2.2: Assess the Current Status of Service Packs and Hotfixes
14-15(1)
Objective 2.2 Questions
14-16(1)
Objective 2.2 Answers
14-22(1)
Objective 2.3: Deploy Service Packs and Hotfixes
14-27(1)
Objective 2.3 Questions
14-28(1)
Objective 2.3 Answers
14-34(1)
15 Implementing, Managing, and Troubleshooting Security for Network Communications (3.0)
15-1(1)
Testing Skills and Suggested Practices
15-2(1)
Further Reading
15-5(1)
Objective 3.1: Plan IPSec Deployment
15-8(1)
Objective 3.1 Questions
15-9(1)
Objective 3.1 Answers
15-15(1)
Objective 3.2: Configure IPSec Policies to Secure Communication between Networks and Hosts
15-20(1)
Objective 3.2 Questions
15-21(1)
Objective 3.2 Answers
15-24(1)
Objective 3.3: Deploy and Manage IPSec Policies
15-26(1)
Objective 3.3 Questions
15-27(1)
Objective 3.3 Answers
15-30(1)
Objective 3.4: Troubleshoot IPSec
15-32(1)
Objective 3.4 Questions
15-33(1)
Objective 3.4 Answers
15-37(1)
Objective 3.5: Plan and Implement Security for Wireless Networks
15-40(1)
Objective 3.5 Questions
15-41(1)
Objective 3.5 Answers
15-43(1)
Objective 3.6: Deploy, Manage, and Configure SSL Certificates
15-45(1)
Objective 3.6 Questions
15-46(1)
Objective 3.6 Answers
15-49(1)
Objective 3.7: Configure Security for Remote Access Users
15-51(1)
Objective 3.7 Questions
15-52(1)
Objective 3.7 Answers
15-56(1)
16 Planning, Configuring, and Troubleshooting Authentication, Authorization, and PKI (4.0)
16-1
Testing Skills and Suggested Practices
16-2(1)
Further Reading
16-4(1)
Objective 4.1: Plan and Configure Authentication
16-6(1)
Objective 4.1 Questions
16-7(1)
Objective 4.1 Answers
16-10(1)
Objective 4.2: Plan Group Structure
16-13(1)
Objective 4.2 Questions
16-14(1)
Objective 4.2 Answers
16-18(1)
Objective 4.3: Plan and Configure Authorization
16-21(1)
Objective 4.3 Questions
16-22(1)
Objective 4.3 Answers
16-26(1)
Objective 4.4: Install, Manage, and Configure Certificate Services
16-29
Objective 4.4 Questions
16-30(1)
Objective 4.4 Answers
16-33
Glossary G-1
Index I-1

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.