Simpson, Patrick.

ExamInsight For MCP / MCSE Certification : Security for a Microsoft Windows 2000 Network Exam 70-220. - 1st ed. - 1 online resource (310 pages)

Intro -- Table of Contents -- ExamInsight For Exam 70-220 -- About the Author -- About the Contributing Author -- About The Book -- Introduction -- Forward -- 70-220 Exam Specifications -- Networking Terminology -- Chapter 1: Analyzing Business Requirements -- I Introduction -- -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Analyzing the business models -- The Company Model and Geographical Scope: -- Regional Model: -- National Model: -- International Model: -- Subsidiaries: -- Branch Offices: -- Pop quiz 1.1 -- IIIAnalyzing the Company Process -- Information Flow Process: -- Communication Flow Process: -- The Product Life-Cycle Process: -- Decision Making Process: -- Pop Quiz 1.2 -- IV Analyze Organizational Structures -- Management Model: -- Company Organization: -- Vendors/Partners/Customer Relations: -- Acquisition Plans: -- Pop Quiz 1.3 -- V Analyzing Company Strategies -- Company Priorities: -- Company Projected Growth and Growth Strategy: -- Relevant Laws and Regulations: -- The Company's Tolerance for Risk: -- Total Cost of Operations: -- Pop quiz 1.4 -- VI Business and Security Requirements -- Business Requirements for the End User: -- Security Requirements for the End User: -- Pop quiz 1.5 -- VII Analyze the Structure of IT Management -- Centralized Administration: -- Decentralized Administration: -- The Funding Model: -- Outsourcing: -- The Decision Making Process: -- The Change Management Process: -- Pop quiz 1.6 -- VIII Analyzing the Companies Current Model -- Physical Model: -- Information Security Model: -- IX Analyze Security Risks -- -- Pop Quiz 1.7 -- X Chapter 1: Summary -- XI Chapter 1: Post-Assessment (Answers appear in Appendix A.) -- Chapter 2: Analyzing Technical Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers. II Evaluate Company Technical Environment -- Company Size, User, and Resource Distribution: -- Geographic Work Sites and Remote Sites Connectivity: -- Net Available Bandwidth: -- Performance Requirements: -- Methods for Accessing Data and Systems: -- Network Roles and Responsibilities: -- Administrative Network Roles and Responsibilities -- User Network Roles and Responsibilities -- Service Network Roles and Responsibilities -- Resource Ownership Network Roles and Responsibilities -- Application Network Roles -- Pop Quiz 2.1 -- III Analyze the Security Design -- Systems And Applications: -- Planned Upgrades and Rollouts: -- Technical Support Structure: -- Planned Network and Systems Management: -- Pop Quiz 2.2 -- VI Chapter 2: Summary -- V Chapter 2: Post-Assessment (Answers appear in Appendix A.) -- Chapter 3: Analyzing Security Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design a Security Baseline -- Domain Controllers: -- Operations Masters: -- Application Servers: -- File and Print Servers: -- RAS Servers: -- Desktop Computers: -- Portable Computers: -- Kiosks: -- Pop Quiz 3.1 -- III Identify Resource Security -- Printers: -- Files: -- Shares: -- Internet Access: -- Dial-in Access: -- Pop Quiz 3.1 -- VI Chapter 3: Summary -- V Chapter 3: Post-Assessment (Answers appear in Appendix A.) -- Chapter 4: Designing a Security Solution -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an Audit Policy -- What is an Audit Policy: -- Where to start: -- Things to Audit: -- Pop Quiz 4.1 -- III Design a Delegation of Authority Strategy -- What is an Authority Strategy: -- How do I start the design: -- Suggested Authority Strategies: -- Pop Quiz 4.2 -- IV Designing Security Policies -- What is a Security Policy:. Where do I start the Design: -- Security policies for Sites: -- Security Policies for Domains: -- Security Policies for Organizational Units: -- Pop Quiz 4.3 -- V Design an Authentication Strategy -- What are the authentication methods: -- Certification Based Authentication Method: -- Kerberos Authentication Method: -- Clear Text Passwords Method: -- Digest Authentication Method: -- Smart Card Authentication Method: -- NTLM Authentication Method: -- RADIUS Authentication Method: -- SSL Authentication Method: -- TLS (Transport Layer Security): -- Pop Quiz 4.4 -- VI Design a Security Group Strategy -- Designing a Security Group: -- Security Group: -- Manage Security Group: -- Integrate Security Group with other Domains: -- Pop Quiz 4.5 -- VII Design a Public Key Infrastructure -- Where do I Start: -- Certificate Authority (CA) Hierarchies: -- Certificate Server Roles: -- Manage Certificates: -- Integrating with Third-Party CAs: -- Map Certificates: -- Pop Quiz 4.6 -- VIII Windows 2000 Network Services Security -- Where to Start the Design: -- Windows 2000 DNS Security Designs: -- Windows 2000 Remote Installation Services (RIS) Security Design: -- Windows 2000 SNMP Security Design: -- Windows Terminal Server Security Designs: -- Pop Quiz 4.7 -- IX Chapter 4: Summary -- X Chapter 4: Post-Assessment (Answers appear in Appendix A.) -- Chapter 5: Designing Security Access Between Networks -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Secure Access to Public and Private Networks -- What is a Public Network: -- What is a Private Network: -- Difference between Public and Private Networks: -- Pop Quiz 5.1 -- III Provide External Users with Secure Access -- Who is an External User: -- Secure Access: -- IV Secure Access Between Private Networks -- Secure Access within a LAN: -- Secure Access within a WAN:. Secure Access across a Public Network: -- Pop Quiz 5.2 -- V Chapter 5: Summary -- VI Chapter 5: Post-Assessment (Answers appear in Appendix A.) -- Chapter 6: Designing Security Communication Channels -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an SMB-Signing Solution -- SMB Signing Solution: -- Pop Quiz 6.1 -- III Design an IPSec Solution -- The IPSec Encryption Scheme: -- The IPSec Management Strategy Design: -- Negotiation Policies: -- Security Policies: -- IP Filters: -- Security Levels: -- Pop Quiz 6.2 -- IV Chapter 6: Summary -- V Chapter 6: Post-Assessment (Answers appear in Appendix A.) -- Chapter 7: Scenario Concepts with Practice Questions -- I Introduction -- II BFQ - Supreme Division -- III BFQ - ExGovern Division -- IV BFQ - ProTax Division -- V BFQ - Excel Division -- VI BFQ - ABC Toys Division -- VII BFQ - MediAssociate -- VIIIBFQ - Kellok Division -- IX Chapter 7: Summary -- Appendix A -- Chapter 1: Answers -- Chapter 2: Answers -- Chapter 3: Answers -- Chapter 4: Answers -- Chapter 5: Answers -- Chapter 6: Answers -- Chapter 7: Answers -- Chapter 7: Scenario II: BFQ - Supreme Division -- Chapter 7: Scenario III: BFQ - ExGovern Division -- Chapter 7: Scenario IV: BFQ - ProTax Division -- Chapter 7: Scenario V: BFQ - Excel Division -- Chapter 7: Scenario VI: BFQ - ABC Toys Division -- Chapter 7: Scenario VII: BFQ - MediAssociate -- Chapter 7: Scenario VIII: BFQ - Kellok Division -- Index -- Money Back Book Guarantee -- Microsoft 70-220 Practice Exam Offer.

9781590956076


Microsoft Windows (Computer file).
Electronic data processing personnel -- Certification.
Microsoft software -- Examinations -- Study guides.
Computer networks -- Examinations -- Study guides.


Electronic books.

QA76.3.S5678 2003