MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing & Administering Security in a Windows 2000 Network Study Guide (Exam 70-214)
- Exam Objective Map
Chapter 1: Basic Windows 2000 Security: Using Security Templates
- Table 1.1: Schema Objects, Attributes, and Values
- Table 1.2: Windows 2000 Security Templates
- Table 1.3: Account Policies Security Options
- Table 1.4: Local Policies Security Options
- Table 1.5: Event Log Security Options
Chapter 2: Advanced Security Template and Group Policy Issues
- Table 2.1: SMB Signing Default Settings in Windows 2000 Security Templates
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
- Table 3.1: The HFNetChk Switches
- Table 3.2: The mbsacli.exe Switches
Chapter 4: Installing, Configuring, & Managing Windows 2000 Certificate Authorities
- Table 4.1: X.509v3 Certificate Properties
- Table 4.2: Templates Available for Users
- Table 4.3: Templates Available for Machines
Chapter 5: Managing and Troubleshooting the Encrypting File System
- Table 5.1: Public and Private Keys
- Table 5.2: Copying Encrypted Files
- Table 5.3: Cipher Command Switches
- Table 5.4: EfsRecvr Command-Line Syntax
- Table 5.5: Troubleshooting EFS
Chapter 6: Configuring and Troubleshooting Windows IP Security
- Table 6.1: Categorizing Corporate Assets
- Table 6.2: Categorizing Impact Levels for Various Data Types
- Table 6.3: Troubleshooting IPSec
Chapter 8: Configuring Secure Network and Internet Authentication Methods
- Table 8.1: Netdom Syntax
- Table 8.2: LM Compatibility Levels
- Table 8.3: Summary of the Authentication Methods Supported in IIS 5.0
- Table 8.4: Troubleshooting Common Web Authentication Problems
Chapter 10: Configuring and Using Auditing and the Event Logs
- Table 10.1: Logon Events that Appear in the Event Log
- Table 10.2: Account Logon Events that Appear in the Event Log
- Table 10.3: Account Management Events that Appear in the Event Log
- Table 10.4: Dumpel Tool Switches
Appendix B: Port Numbers and Associated Attacks
- Table B.1: Well-Known Port Numbers