ORPP logo
Image from Google Jackets

ExamInsight For MCP / MCSE Certification : Security for a Microsoft Windows 2000 Network Exam 70-220.

By: Material type: TextTextPublisher: Friendswood : TotalRecall Publications, 2003Copyright date: ©2003Edition: 1st edDescription: 1 online resource (310 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781590956076
Subject(s): Genre/Form: Additional physical formats: Print version:: ExamInsight For MCP / MCSE CertificationLOC classification:
  • QA76.3.S5678 2003
Online resources:
Contents:
Intro -- Table of Contents -- ExamInsight For Exam 70-220 -- About the Author -- About the Contributing Author -- About The Book -- Introduction -- Forward -- 70-220 Exam Specifications -- Networking Terminology -- Chapter 1: Analyzing Business Requirements -- I Introduction -- -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Analyzing the business models -- The Company Model and Geographical Scope: -- Regional Model: -- National Model: -- International Model: -- Subsidiaries: -- Branch Offices: -- Pop quiz 1.1 -- IIIAnalyzing the Company Process -- Information Flow Process: -- Communication Flow Process: -- The Product Life-Cycle Process: -- Decision Making Process: -- Pop Quiz 1.2 -- IV Analyze Organizational Structures -- Management Model: -- Company Organization: -- Vendors/Partners/Customer Relations: -- Acquisition Plans: -- Pop Quiz 1.3 -- V Analyzing Company Strategies -- Company Priorities: -- Company Projected Growth and Growth Strategy: -- Relevant Laws and Regulations: -- The Company's Tolerance for Risk: -- Total Cost of Operations: -- Pop quiz 1.4 -- VI Business and Security Requirements -- Business Requirements for the End User: -- Security Requirements for the End User: -- Pop quiz 1.5 -- VII Analyze the Structure of IT Management -- Centralized Administration: -- Decentralized Administration: -- The Funding Model: -- Outsourcing: -- The Decision Making Process: -- The Change Management Process: -- Pop quiz 1.6 -- VIII Analyzing the Companies Current Model -- Physical Model: -- Information Security Model: -- IX Analyze Security Risks -- -- Pop Quiz 1.7 -- X Chapter 1: Summary -- XI Chapter 1: Post-Assessment (Answers appear in Appendix A.) -- Chapter 2: Analyzing Technical Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers.
II Evaluate Company Technical Environment -- Company Size, User, and Resource Distribution: -- Geographic Work Sites and Remote Sites Connectivity: -- Net Available Bandwidth: -- Performance Requirements: -- Methods for Accessing Data and Systems: -- Network Roles and Responsibilities: -- Administrative Network Roles and Responsibilities -- User Network Roles and Responsibilities -- Service Network Roles and Responsibilities -- Resource Ownership Network Roles and Responsibilities -- Application Network Roles -- Pop Quiz 2.1 -- III Analyze the Security Design -- Systems And Applications: -- Planned Upgrades and Rollouts: -- Technical Support Structure: -- Planned Network and Systems Management: -- Pop Quiz 2.2 -- VI Chapter 2: Summary -- V Chapter 2: Post-Assessment (Answers appear in Appendix A.) -- Chapter 3: Analyzing Security Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design a Security Baseline -- Domain Controllers: -- Operations Masters: -- Application Servers: -- File and Print Servers: -- RAS Servers: -- Desktop Computers: -- Portable Computers: -- Kiosks: -- Pop Quiz 3.1 -- III Identify Resource Security -- Printers: -- Files: -- Shares: -- Internet Access: -- Dial-in Access: -- Pop Quiz 3.1 -- VI Chapter 3: Summary -- V Chapter 3: Post-Assessment (Answers appear in Appendix A.) -- Chapter 4: Designing a Security Solution -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an Audit Policy -- What is an Audit Policy: -- Where to start: -- Things to Audit: -- Pop Quiz 4.1 -- III Design a Delegation of Authority Strategy -- What is an Authority Strategy: -- How do I start the design: -- Suggested Authority Strategies: -- Pop Quiz 4.2 -- IV Designing Security Policies -- What is a Security Policy:.
Where do I start the Design: -- Security policies for Sites: -- Security Policies for Domains: -- Security Policies for Organizational Units: -- Pop Quiz 4.3 -- V Design an Authentication Strategy -- What are the authentication methods: -- Certification Based Authentication Method: -- Kerberos Authentication Method: -- Clear Text Passwords Method: -- Digest Authentication Method: -- Smart Card Authentication Method: -- NTLM Authentication Method: -- RADIUS Authentication Method: -- SSL Authentication Method: -- TLS (Transport Layer Security): -- Pop Quiz 4.4 -- VI Design a Security Group Strategy -- Designing a Security Group: -- Security Group: -- Manage Security Group: -- Integrate Security Group with other Domains: -- Pop Quiz 4.5 -- VII Design a Public Key Infrastructure -- Where do I Start: -- Certificate Authority (CA) Hierarchies: -- Certificate Server Roles: -- Manage Certificates: -- Integrating with Third-Party CAs: -- Map Certificates: -- Pop Quiz 4.6 -- VIII Windows 2000 Network Services Security -- Where to Start the Design: -- Windows 2000 DNS Security Designs: -- Windows 2000 Remote Installation Services (RIS) Security Design: -- Windows 2000 SNMP Security Design: -- Windows Terminal Server Security Designs: -- Pop Quiz 4.7 -- IX Chapter 4: Summary -- X Chapter 4: Post-Assessment (Answers appear in Appendix A.) -- Chapter 5: Designing Security Access Between Networks -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Secure Access to Public and Private Networks -- What is a Public Network: -- What is a Private Network: -- Difference between Public and Private Networks: -- Pop Quiz 5.1 -- III Provide External Users with Secure Access -- Who is an External User: -- Secure Access: -- IV Secure Access Between Private Networks -- Secure Access within a LAN: -- Secure Access within a WAN:.
Secure Access across a Public Network: -- Pop Quiz 5.2 -- V Chapter 5: Summary -- VI Chapter 5: Post-Assessment (Answers appear in Appendix A.) -- Chapter 6: Designing Security Communication Channels -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an SMB-Signing Solution -- SMB Signing Solution: -- Pop Quiz 6.1 -- III Design an IPSec Solution -- The IPSec Encryption Scheme: -- The IPSec Management Strategy Design: -- Negotiation Policies: -- Security Policies: -- IP Filters: -- Security Levels: -- Pop Quiz 6.2 -- IV Chapter 6: Summary -- V Chapter 6: Post-Assessment (Answers appear in Appendix A.) -- Chapter 7: Scenario Concepts with Practice Questions -- I Introduction -- II BFQ - Supreme Division -- III BFQ - ExGovern Division -- IV BFQ - ProTax Division -- V BFQ - Excel Division -- VI BFQ - ABC Toys Division -- VII BFQ - MediAssociate -- VIIIBFQ - Kellok Division -- IX Chapter 7: Summary -- Appendix A -- Chapter 1: Answers -- Chapter 2: Answers -- Chapter 3: Answers -- Chapter 4: Answers -- Chapter 5: Answers -- Chapter 6: Answers -- Chapter 7: Answers -- Chapter 7: Scenario II: BFQ - Supreme Division -- Chapter 7: Scenario III: BFQ - ExGovern Division -- Chapter 7: Scenario IV: BFQ - ProTax Division -- Chapter 7: Scenario V: BFQ - Excel Division -- Chapter 7: Scenario VI: BFQ - ABC Toys Division -- Chapter 7: Scenario VII: BFQ - MediAssociate -- Chapter 7: Scenario VIII: BFQ - Kellok Division -- Index -- Money Back Book Guarantee -- Microsoft 70-220 Practice Exam Offer.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Table of Contents -- ExamInsight For Exam 70-220 -- About the Author -- About the Contributing Author -- About The Book -- Introduction -- Forward -- 70-220 Exam Specifications -- Networking Terminology -- Chapter 1: Analyzing Business Requirements -- I Introduction -- -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Analyzing the business models -- The Company Model and Geographical Scope: -- Regional Model: -- National Model: -- International Model: -- Subsidiaries: -- Branch Offices: -- Pop quiz 1.1 -- IIIAnalyzing the Company Process -- Information Flow Process: -- Communication Flow Process: -- The Product Life-Cycle Process: -- Decision Making Process: -- Pop Quiz 1.2 -- IV Analyze Organizational Structures -- Management Model: -- Company Organization: -- Vendors/Partners/Customer Relations: -- Acquisition Plans: -- Pop Quiz 1.3 -- V Analyzing Company Strategies -- Company Priorities: -- Company Projected Growth and Growth Strategy: -- Relevant Laws and Regulations: -- The Company's Tolerance for Risk: -- Total Cost of Operations: -- Pop quiz 1.4 -- VI Business and Security Requirements -- Business Requirements for the End User: -- Security Requirements for the End User: -- Pop quiz 1.5 -- VII Analyze the Structure of IT Management -- Centralized Administration: -- Decentralized Administration: -- The Funding Model: -- Outsourcing: -- The Decision Making Process: -- The Change Management Process: -- Pop quiz 1.6 -- VIII Analyzing the Companies Current Model -- Physical Model: -- Information Security Model: -- IX Analyze Security Risks -- -- Pop Quiz 1.7 -- X Chapter 1: Summary -- XI Chapter 1: Post-Assessment (Answers appear in Appendix A.) -- Chapter 2: Analyzing Technical Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers.

II Evaluate Company Technical Environment -- Company Size, User, and Resource Distribution: -- Geographic Work Sites and Remote Sites Connectivity: -- Net Available Bandwidth: -- Performance Requirements: -- Methods for Accessing Data and Systems: -- Network Roles and Responsibilities: -- Administrative Network Roles and Responsibilities -- User Network Roles and Responsibilities -- Service Network Roles and Responsibilities -- Resource Ownership Network Roles and Responsibilities -- Application Network Roles -- Pop Quiz 2.1 -- III Analyze the Security Design -- Systems And Applications: -- Planned Upgrades and Rollouts: -- Technical Support Structure: -- Planned Network and Systems Management: -- Pop Quiz 2.2 -- VI Chapter 2: Summary -- V Chapter 2: Post-Assessment (Answers appear in Appendix A.) -- Chapter 3: Analyzing Security Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design a Security Baseline -- Domain Controllers: -- Operations Masters: -- Application Servers: -- File and Print Servers: -- RAS Servers: -- Desktop Computers: -- Portable Computers: -- Kiosks: -- Pop Quiz 3.1 -- III Identify Resource Security -- Printers: -- Files: -- Shares: -- Internet Access: -- Dial-in Access: -- Pop Quiz 3.1 -- VI Chapter 3: Summary -- V Chapter 3: Post-Assessment (Answers appear in Appendix A.) -- Chapter 4: Designing a Security Solution -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an Audit Policy -- What is an Audit Policy: -- Where to start: -- Things to Audit: -- Pop Quiz 4.1 -- III Design a Delegation of Authority Strategy -- What is an Authority Strategy: -- How do I start the design: -- Suggested Authority Strategies: -- Pop Quiz 4.2 -- IV Designing Security Policies -- What is a Security Policy:.

Where do I start the Design: -- Security policies for Sites: -- Security Policies for Domains: -- Security Policies for Organizational Units: -- Pop Quiz 4.3 -- V Design an Authentication Strategy -- What are the authentication methods: -- Certification Based Authentication Method: -- Kerberos Authentication Method: -- Clear Text Passwords Method: -- Digest Authentication Method: -- Smart Card Authentication Method: -- NTLM Authentication Method: -- RADIUS Authentication Method: -- SSL Authentication Method: -- TLS (Transport Layer Security): -- Pop Quiz 4.4 -- VI Design a Security Group Strategy -- Designing a Security Group: -- Security Group: -- Manage Security Group: -- Integrate Security Group with other Domains: -- Pop Quiz 4.5 -- VII Design a Public Key Infrastructure -- Where do I Start: -- Certificate Authority (CA) Hierarchies: -- Certificate Server Roles: -- Manage Certificates: -- Integrating with Third-Party CAs: -- Map Certificates: -- Pop Quiz 4.6 -- VIII Windows 2000 Network Services Security -- Where to Start the Design: -- Windows 2000 DNS Security Designs: -- Windows 2000 Remote Installation Services (RIS) Security Design: -- Windows 2000 SNMP Security Design: -- Windows Terminal Server Security Designs: -- Pop Quiz 4.7 -- IX Chapter 4: Summary -- X Chapter 4: Post-Assessment (Answers appear in Appendix A.) -- Chapter 5: Designing Security Access Between Networks -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Secure Access to Public and Private Networks -- What is a Public Network: -- What is a Private Network: -- Difference between Public and Private Networks: -- Pop Quiz 5.1 -- III Provide External Users with Secure Access -- Who is an External User: -- Secure Access: -- IV Secure Access Between Private Networks -- Secure Access within a LAN: -- Secure Access within a WAN:.

Secure Access across a Public Network: -- Pop Quiz 5.2 -- V Chapter 5: Summary -- VI Chapter 5: Post-Assessment (Answers appear in Appendix A.) -- Chapter 6: Designing Security Communication Channels -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an SMB-Signing Solution -- SMB Signing Solution: -- Pop Quiz 6.1 -- III Design an IPSec Solution -- The IPSec Encryption Scheme: -- The IPSec Management Strategy Design: -- Negotiation Policies: -- Security Policies: -- IP Filters: -- Security Levels: -- Pop Quiz 6.2 -- IV Chapter 6: Summary -- V Chapter 6: Post-Assessment (Answers appear in Appendix A.) -- Chapter 7: Scenario Concepts with Practice Questions -- I Introduction -- II BFQ - Supreme Division -- III BFQ - ExGovern Division -- IV BFQ - ProTax Division -- V BFQ - Excel Division -- VI BFQ - ABC Toys Division -- VII BFQ - MediAssociate -- VIIIBFQ - Kellok Division -- IX Chapter 7: Summary -- Appendix A -- Chapter 1: Answers -- Chapter 2: Answers -- Chapter 3: Answers -- Chapter 4: Answers -- Chapter 5: Answers -- Chapter 6: Answers -- Chapter 7: Answers -- Chapter 7: Scenario II: BFQ - Supreme Division -- Chapter 7: Scenario III: BFQ - ExGovern Division -- Chapter 7: Scenario IV: BFQ - ProTax Division -- Chapter 7: Scenario V: BFQ - Excel Division -- Chapter 7: Scenario VI: BFQ - ABC Toys Division -- Chapter 7: Scenario VII: BFQ - MediAssociate -- Chapter 7: Scenario VIII: BFQ - Kellok Division -- Index -- Money Back Book Guarantee -- Microsoft 70-220 Practice Exam Offer.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.