MCSE 70-293 Exam Prep: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

s count parameter

       ping command  

S srcaddr parameter

       tracert command  

saving

       backup locations  

       counter logs  

       System Monitor configurations  

scalability

       OSPF  

scheduling

        backups   2nd   3rd  

scope

       backups  

       IP addresses  

secedit   2nd  

secedit /analyze parameters   2nd  

secedit /configure parameters   2nd  

secedit.exe command  

secedit.exe tool  

secure communications

       custom IPSec policies  

secure dynamic updates   2nd  

Secure Hash Algorithm (SHA1)  

Secure Hash Algorithm.   [See SHA1]

secure server (require security) policy  

Secure Server (Require Security) policy   2nd   3rd  

secure server policy

       IPSec  

secure template  

Secure User Authentication  

security

       auditing  

               account logon events  

               account management  

               Active Directory  

               logon events  

               object access  

               policies  

               privilges  

               process tracking  

               system events  

       CAs  

               child  

               Enterprise   2nd  

               Enterprise Root   2nd  

               Enterprise Root, creating   2nd  

               Enterprise Subordinate  

               Enterprise, configuring   2nd  

               hierarchies, planning   2nd  

               installing   2nd   3rd  

                names  

               parent  

               public/private key pair settings   2nd  

               renewing  

               Root  

               Standalone   2nd   3rd  

               Standalone Root  

               Standalone Subordinate   2nd  

               third-party  

       Certificate Services  

               auditing   2nd  

               CA subordination  

               delat CRLs  

               enrollment options   2nd  

               Enterprise CA  

               hierarchy  

               key recovery  

               new features   2nd  

               role separation  

               Standalone CA   2nd  

               version 2 templates  

       certificates   2nd  

                autoenrollment   2nd   3rd  

               enrollment   2nd  

               requesting   2nd   3rd   4th  

                requests   2nd   3rd  

               requests/renewal   2nd  

               template management   2nd  

       change and configuration management framework   2nd  

       configuring servers  

               Active Directory   2nd  

               baseline configuration   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  

               OUs  

               roles   2nd  

       CRLs

               publication   2nd  

       default settings

               viewing  

       DNS   2nd   3rd   4th  

               Active Directory permissions   2nd  

               DNSSEC   2nd  

               dynamic updates   2nd   3rd   4th  

               server properties   2nd  

               zone transfers   2nd  

       DNS zones  

       ESP  

       filter actions   2nd  

        Group Policy

               policies, creating   2nd  

       ICMP packets, blocking  

       Internet connections  

       IPSec   2nd   3rd   4th  

               AH  

               Authenticaion Header   2nd  

               configuring  

               custom policies, creating   2nd   3rd   4th  

               custom policies, creating.   [See customizing, IPSec policies]

               ESP   2nd   3rd  

               implementation   2nd  

               IP Security Monitor  

               IP Security Monitor snap-in   2nd   3rd   4th   5th  

               ISAKMP/IKE   2nd  

               Jeff's Jeep Tours case study   2nd  

               L2TP   2nd  

               management console, creating   2nd  

               monitoring  

               new features   2nd  

               policies   2nd   3rd   4th  

               policies, assigning  

                replaying  

               RSoP snap-in   2nd  

               Secure Server (Require Security) policy   2nd   3rd  

               standard features   2nd  

               stateful filtering  

               transport mode  

               troubleshooting   2nd   3rd  

               tunnel mode  

               tunnels  

               VPN connections  

       monitoring   2nd   3rd  

       networks  

       PKI.   [See PKI]

       policies  

       RDA   2nd  

       remote access   2nd  

               authentication   2nd   3rd   4th   5th   6th   7th  

               dial-in properties   2nd  

               Network Access Quarantine Control   2nd  

               policies   2nd   3rd   4th  

               profiles   2nd   3rd   4th   5th   6th   7th   8th   9th  

               Secure User Authentication  

               unauthorized access  

       remote administration  

               Remote Assistance.   [See Remote Assistance]

       Remote Assistance   2nd  

       RIP  

       Rockwell Financial Services case study   2nd  

       role-based   2nd   3rd   4th  

               Baseline Policy  

               Domain Policy  

               Enterprise Client Policy  

               High Security Policy  

               Legacy Client Policy  

               Role-Specific Policy  

               Security Configuration Manager tools   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

               security templates   2nd   3rd   4th   5th  

               server roles   2nd  

       settings, restoring  

       templates   2nd   3rd   4th  

               compatible  

               default DC security  

               default security  

               highly secure  

               no terminal server use SID  

               system root  

       TLS  

       updates   2nd  

               installing   2nd  

               maintenance  

               MBSA   2nd  

               SUS   2nd   3rd   4th  

       WLAN   2nd   3rd   4th   5th  

               authentication  

               Group Policy options   2nd   3rd   4th  

               policies, configuring   2nd  

               policies, creating   2nd  

Security Configuration and Analysis snap-in   2nd   3rd   4th   5th  

       account policies  

       event log  

       file system  

       local policies  

       nodes   2nd  

       Registry  

       restricted groups  

       system services  

Security Configuration Manager  

Security Configuration Manager tools

       security templates   2nd   3rd  

               Group Policy security extensions   2nd   3rd   4th  

               secedit.exe command   2nd   3rd   4th  

               Security Configuration and Analysis snap-in   2nd   3rd   4th   5th   6th  

               Security Templates snap-in   2nd   3rd  

security extensions

       Group Policy   2nd   3rd   4th   5th  

               importing security templates into GPOs   2nd  

Security Parameters Index field.   [See SPI field]

Security Rule Wizard   2nd   3rd  

security templates  

       role-based   2nd   3rd   4th  

               Baseline Policy  

               Domain Policy  

               Enterprise Client Policy  

               High Security Policy  

               importing into GPOs   2nd  

               Legacy Client Policy  

               Role-Specific Policy  

               Security Configuration Manager tools   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

               server roles   2nd  

               Windows Server 2003   2nd   3rd  

       Setup security .inf  

Security Templates snap-in   2nd  

Select Computer dialog box  

Select Network Component Type dialog box  

Select Network Service dialog box  

Send a File button   2nd  

sending

       Remote Assistance requests   2nd   3rd   4th  

sequence number field

       AH  

       ESP  

server (request security) policy  

server policy

       IPSec  

server roles

       security templates   2nd  

server-side features (SUS)   2nd  

servers

       baselining   2nd   3rd  

       DHCP

               troubleshooting   2nd  

       DNS

               properties   2nd  

       proxy  

       security

               Active Directory   2nd  

               baseline configuration   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  

               configuring   2nd   3rd  

               OUs  

       slave  

       SMS  

       WINS  

services

       Certificate  

               auditing  

               CA subordination  

               delta CRLs  

               enrollment options   2nd  

               Enterprise CA  

               hierarchy  

               key recovery  

               role separation  

               Standalone CA   2nd  

               version 2 templates  

       system

               configuring  

session keys

       PFS  

settings

       Windows

               account lockout policies  

               account lookout policies  

               account policies   2nd  

               events logs   2nd   3rd   4th  

               Kerberos Policy   2nd  

               local policies (audit policies)   2nd  

               local policies (security options)   2nd   3rd   4th   5th   6th   7th   8th  

               local policies (User Rights Assignment)   2nd   3rd   4th   5th  

               security options (local policies)  

Settings button   2nd  

Setup security .inf security template  

SHA1 (Secure Hash Algorithm)  

SHA1 algorithm

       AH  

shadow copies

       volume   2nd  

               storing  

Shadow Copies dialog box  

Shiva Password Authentication Protocol)  

Shiva Password Authentication Protocol.   [See SPAP]

Shut Down Windows dialog box  

silent RIP

       implementing   2nd   3rd  

single host filtering   2nd  

single node clusters   2nd  

single point of failure.   [See SPOF]

single quorum clusters  

size

       counter logs  

slave servers  

       DNS  

smart card certificates   2nd   3rd  

smart cards  

       certificate templates  

       device redirection  

       distribution requirements   2nd  

       enrollment   2nd  

       enrollment stations  

       Group Policy options   2nd  

       readers   2nd  

       supported  

       user education   2nd  

Smartcard Logon template   2nd  

Smartcard User template  

Smartcard User templated  

SMS (Systems Management Server)   2nd  

SNA  

SNA (Systems Network Architecture)   2nd  

snap-ins

       IP Security Monitor   2nd   3rd   4th   5th  

               Active Policy node   2nd  

               Main Mode node   2nd   3rd  

               Quick Mode node   2nd   3rd  

       RSoP   2nd   3rd   4th  

       Security Configuration and Analysis   2nd   3rd   4th   5th   6th   7th   8th  

               account policies  

               event log  

               file system  

               local policies  

               nodes   2nd  

               Registry  

               restricted groups  

               system services  

       Security Templates   2nd   3rd   4th   5th  

snaps -ins

       Security Configuration and Analysis  

Software Update Services.   [See SUS]2nd   [See SUS]

solutions

       high availability   2nd  

SPAP

       remote users  

SPAP (Shiva Password Authentication Protocol)   2nd  

SPI (Security Parameters Index) field

       AH  

SPI field

       ESP  

Split Horizons service  

SPOF (single point of failure)  

Standalone CA   2nd  

Standalone CAs   2nd   3rd  

Standalone Root CAs  

Standalone Subordinate CAs   2nd  

standard primary DNS zones  

standard primary zones  

standard secondary DNS zones  

standard secondary zones  

star topology

       routing  

Start Talking button   2nd  

starting

       counter logs  

       PrepLogic Practice Exams   2nd  

startup disks  

State protocols

       OSPF

               hop counts  

stateful filtering (IPSec)  

static routing   2nd   3rd   4th  

       adding to existing routing tables  

       advantages/disadvantages   2nd  

       configuring   2nd   3rd  

Stop Control button  

stopping

       counter logs  

storage

       MSCS clustering  

Storage Services Technology Center Web site  

storage systems

       fault-tolerant   2nd   3rd  

storing

       volume shadow copies  

stub areas  

stub DNS zones  

stub zones  

study tips   2nd   3rd   4th   5th   6th   7th  

       adaptive exams   2nd  

       case study exams   2nd  

        fixed-format exams   2nd  

       learning styles   2nd  

       pretesting   2nd  

       study strategies   2nd   3rd  

subnet masks  

subnetting   2nd  

       OSPF  

       RIP  

Subordinate CAs  

Subordinate Certification Authority template  

SUS

       client-side features   2nd  

       downloading  

       planning   2nd   3rd   4th  

       server-side features   2nd  

       system requirements  

SUS (Software Update Services)   2nd  

switch port flooding  

switches

       Layer 3  

       secedit command  

System

       permissions  

system events

       auditing   2nd  

System Monitor

       bottlenecks   2nd  

               baseline counter logs, creating   2nd   3rd   4th  

               baselining servers   2nd   3rd  

               counters   2nd  

       configurations, saving  

       counter logs, adding  

       network traffic, monitoring  

       performance monitoring   2nd   3rd  

System Monitor Properties dialog box  

system root security template  

system services

       configuring  

System Services node  

System State data   2nd   3rd  

SystemProcessor Queue Length counter  

Systems Management Server.   [See SMS]2nd   [See SMS]

Systems Network Architecture.   [See SNA]2nd   [See SNA]

Категории