did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780782142068

MCSA / MCSE: Windows 2000 Network Security Administration Study Guide Exam 70-214

by ;
  • ISBN13:

    9780782142068

  • ISBN10:

    0782142060

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2003-06-03
  • Publisher: Sybex
  • Purchase Benefits
List Price: $49.99

Summary

Here's the book you need to prepare for Exam 70-214, Implementing and Administering Security in a Microsoft Windows 2000 Network. This Study Guide provides: In-depth coverage of every exam objective Practical information on managing a secure Windows 2000 network Hundreds of challenging practice questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine and electronic flashcards Authoritative coverage of all exam objectives, including: Implementing, Managing, and Troubleshooting Baseline Security Implementing, Managing, and Troubleshooting Service Packs and Security Updates Implementing, Managing, and Troubleshooting Secure Communication Channels Configuring, Managing, and Troubleshooting Authentication and Remote Access Security Implementing and Managing a Public Key Infrastructure (PKI) and Encrypting File System (EFS) Monitoring and Responding to Security Incidents Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Author Biography

Bill English, MCSE, MCT, is President of Networknowledge, a training and consulting firm located in Minnesota. He has written numerous books, including the Administrator's Guide to SharePoint Portal Server 2001. Russ Kaufmann, MCSE, MCT, has over 11 years' IT experience, most recently with the Root Group as a Microsoft Practice Manager.

Table of Contents

Introduction xxi
Assessment Test xxxv
Configuring, Deploying, and Troubleshooting Security Templates
1(42)
Group Policies and Windows 2000 Server
2(5)
Configuring Group Policies
3(2)
Applying Group Policies
5(1)
Modifying Group Policy Inheritance
6(1)
Working with Security Templates
7(5)
Default Security Templates
10(1)
Incremental Templates
11(1)
Configuring Templates
12(15)
Account Policies
12(2)
Audit Policies
14(4)
User Rights Assignment
18(2)
Security Options
20(1)
System Services
21(1)
Registry and File System Permissions
22(3)
Restricted Groups
25(1)
Event Logs
26(1)
Deploying Security Templates
27(4)
Using Group Policies to Deploy Templates
27(2)
Using Scripts to Deploy Templates
29(2)
Troubleshooting Security Templates
31(2)
Troubleshooting Group Policy--Applied Templates
32(1)
Troubleshooting after Upgrading Operating Systems
33(1)
Troubleshooting Mixed Client Environments
33(1)
Summary
33(1)
Exam Essentials
34(1)
Key Terms
34(1)
Review Questions
35(5)
Answers to Review Questions
40(3)
Configuring Security Based on Computer Roles
43(36)
SQL Server Security
44(5)
Security Features in SQL Server 2000
45(1)
Windows 2000 Security and SQL Server
45(4)
Exchange 2000 Server Security
49(1)
Securing the SMTP Service
49(1)
Securing Outlook Web Access
50(1)
Securing Outlook Web Access, URLScan, and IISLockdown
50(1)
Securing Public Folder Information
50(1)
Windows 2000 Domain Controller Security
50(6)
Using Digital Signatures for Communication
51(1)
Securing DNS Updates
52(1)
Restricting Anonymous Access
52(2)
Enabling NTLMv2 for Legacy Clients
54(1)
Hardening the TCP/IP Stack
54(1)
Disable Auto Generation of 8.3 Filenames
55(1)
Disable LmHash Creation
55(1)
Securing Built-in Accounts
55(1)
IIS Server Security
56(9)
IP Address/DNS Restrictions
61(1)
Disabling the IIS Anonymous Account
61(1)
The URLScan Tool
61(4)
Securing Mobile Communications and Internet Authentication Service (IAS) Server
65(2)
Applying Security to Client Operating Systems
67(2)
Unix Clients
67(1)
NetWare Clients
68(1)
Macintosh Clients
69(1)
Summary
69(1)
Exam Essentials
70(1)
Key Terms
70(1)
Review Questions
71(5)
Answers to Review Questions
76(3)
Installing, Managing, and Troubleshooting Hotfixes and Service Packs
79(44)
Determining the Current Status of Hotfixes and Service Packs
80(1)
Installing Service Packs and Hotfixes
81(31)
Using the MBSA Tool
84(8)
Slipstreaming
92(4)
Managing Service Packs and Hotfixes
96(15)
Troubleshooting the Deployment of Service Packs and Hotfixes
111(1)
Summary
112(1)
Exam Essentials
113(1)
Key Terms
114(1)
Review Questions
115(5)
Answers to Review Questions
120(3)
Configuring IPSec and SMB Signing
123(38)
Understanding IPSec
124(21)
Configuring and Administering IPSec Authentication
127(11)
Configuring the Appropriate IPSec Protocol and Encryption Levels
138(1)
Deploying and Managing IPSec Certificates
139(2)
Renewing Certificates
141(1)
Securing Communication between Server Types with IPSec
142(1)
Troubleshooting IPSec
143(2)
Domain Controllers and SMB Signing
145(6)
SMB Commands
146(1)
Configuring SMB
147(1)
The Common Internet File System (CIFS)
147(1)
Enabling SMB Signing
148(3)
Summary
151(1)
Exam Essentials
151(1)
Key Terms
152(1)
Review Questions
153(5)
Answers to Review Questions
158(3)
Implementing Security for Wireless Networks
161(40)
Configuring Public and Private Wireless LANs
162(9)
Configuring a Public Wireless LAN
163(2)
Configuring a Private Wireless LAN
165(3)
Configuring Windows CE as a Wireless Client
168(1)
Wireless Components
169(2)
Configuring Secure Wireless Network Settings
171(14)
Dynamic Host Configuration Protocol (DHCP)
172(1)
Service Set Identifier (SSID)
172(3)
SSID Security Concerns
175(1)
Configuring Wireless Encryption Levels with WEP
176(3)
MAC Filtering
179(2)
Configuring Wireless Encryption Levels Using 802.1x
181(3)
EAP Authentication Methods
184(1)
Problems and Attacks Specific to Wireless Networks
185(3)
Rogue APs
185(1)
War Driving
186(1)
War Chalking
186(1)
Radio Interference
187(1)
WEP Attacks
187(1)
The Next Steps
188(3)
Implementing VPNs to Protect Wireless Networks
189(1)
Combining VPN and 802.1x
190(1)
Wireless Security Moving Forward
190(1)
Summary
191(1)
Exam Essentials
191(1)
Key Terms
192(1)
Review Questions
193(6)
Answers to Review Questions
199(2)
Deploying, Managing, and Configuring SSL Certificates
201(54)
An SSL Primer
202(2)
Obtaining Public and Private Certificates
204(15)
Obtaining Public Certificates
205(8)
Obtaining and Renewing a Private Certificate
213(6)
Configuring SSL to Secure Communications Channels
219(25)
Using SSL to Secure a Client Machine to Web Server Traffic
219(3)
Using SSL to Secure Web Server to SQL Server Traffic
222(4)
Using SSL to Secure Client Machine to Active Directory Domain Controller Traffic
226(3)
Using SSL to Secure Client Machine to E-Mail Server Traffic
229(2)
Securing SMTP
231(3)
Securing IMAP4
234(2)
Securing POP3
236(3)
Setting Up and Testing Secured IMAP4, POP3, and SMTP with Outlook Express
239(3)
Securing Outlook Web Access
242(2)
Summary
244(1)
Exam Essentials
245(1)
Key Terms
245(1)
Review Questions
246(7)
Answers to Review Questions
253(2)
Configure, Manage, and Troubleshoot Authentication
255(46)
Configuring and Troubleshooting Authentication
256(18)
The LAN Authentication Protocols
257(4)
The Logon Process
261(2)
Troubleshooting Authentication
263(1)
Configuring Authentication Protocols to Support Mixed Windows Client-Computer Environments
264(3)
The Interoperability of Kerberos Authentication with Unix
267(2)
Configuring Authentication in Extranet Scenarios and with Members of Nontrusted Domains
269(2)
Trust Relationships
271(3)
Configuring and Troubleshooting Authentication for Web Users
274(12)
Anonymous Authentication
274(12)
Configuring and Troubleshooting Authentication for Secure Remote Access
286(4)
Multifactor Authentication with Smart Cards and EAP
290(1)
Summary
291(1)
Exam Essentials
292(1)
Key Terms
293(1)
Review Questions
294(5)
Answers to Review Questions
299(2)
Configuring and Troubleshooting Virtual Private Network Protocols
301(38)
VPNs and Internet Service Providers
302(2)
Routing and Remote Access Services (RRAS) Server
304(10)
Configuring RRAS
304(3)
Configuring Authentication Protocols
307(1)
Troubleshooting RRAS
308(6)
Configuring and Troubleshooting VPN Client Systems
314(6)
Configuring Client Systems for VPNs
314(5)
Troubleshooting Client Systems
319(1)
Network Address Translation (NAT) and VPNs
320(1)
Firewall Servers with VPNs
321(1)
Managing Client Computer Configurations for Remote Access Security
322(8)
Remote Access Service Policies
322(4)
The Connection Manager Administration Kit
326(4)
Summary
330(1)
Exam Essentials
331(1)
Key Terms
332(1)
Review Questions
333(5)
Answers to Review Questions
338(1)
Installing, Configuring, and Managing Certificate Authorities
339(48)
Public Key Infrastructure and Certificate Authorities
340(30)
Installing and Configuring the Root CA
342(3)
Configuring the Publication of CRLs
345(2)
Installing and Configuring the Intermediate CA
347(6)
Installing and Configuring the Issuing CA
353(7)
Configuring Certificate Templates
360(1)
Configuring Public Key Group Policies
361(1)
Prerequisites for Using Group Policies to Distribute Certificates
362(5)
Configuring Certificate Enrollment and Renewals
367(3)
Managing Certificate Authorities
370(8)
Viewing Certificates
370(2)
Revoking Certificates
372(1)
Editing Certificates
373(1)
Managing CRLs
373(1)
Backing Up and Restoring the CA
374(4)
Summary
378(1)
Exam Essentials
379(1)
Key Terms
380(1)
Review Questions
381(4)
Answers to Review Questions
385(2)
Managing Client-Computer and Server Certificates and EFS
387(44)
Managing Client Certificates
388(16)
Securing E-mail with Secure MIME
388(6)
Securing Files and Folders with the Encrypting File System (EFS)
394(3)
Importing and Exporting Certificates
397(5)
Certificate Storage
402(2)
Publishing Certificates through Active Directory
404(6)
Publishing Certificates from a Standalone Online CA
404(2)
Using Certificates in a Child Domain
406(4)
Enrolling Certificates
410(4)
The Certificates MMC Snap-In
410(1)
Web Enrollment Pages
411(2)
Auto-Enrollment
413(1)
Recovering KMS-Issued Certificates
414(1)
Managing and Troubleshooting EFS
415(5)
Implementing EFS
415(2)
EFS Encryption for Domain Members
417(1)
EFS and Workgroup Members
417(1)
Disabling EFS
418(1)
Troubleshooting EFS
419(1)
Summary
420(1)
Exam Essentials
420(1)
Key Terms
421(2)
Review Questions
423(5)
Answers to Review Questions
428(3)
Configuring and Managing Auditing
431(40)
Understanding Windows Events
432(25)
Event Messages in Event Viewer
433(4)
Implementing and Configuring Auditing
437(13)
Using Event Logs
450(6)
Managing Log Retention
456(1)
Managing Distributed Audit Logs by Using EventComb
457(5)
Summary
462(1)
Exam Essentials
462(1)
Key Terms
462(1)
Review Questions
463(5)
Answers to Review Questions
468(3)
Responding to Security Incidents
471(22)
Understanding Types of Attacks
475(4)
Natural Disasters
475(1)
Hacker Attacks
475(1)
Virus Attacks
476(1)
Denial of Service Attacks
477(1)
Trojan Horse Attacks
478(1)
Worm Attacks
478(1)
Isolating and Containing the Incident
479(1)
Preserving the Chain of Evidence
480(1)
Implementing Countermeasures
481(2)
Restoring Services
483(1)
Summary
483(1)
Exam Essentials
484(1)
Key Terms
484(1)
Review Questions
485(5)
Answers to Review Questions
490(3)
Glossary 493(18)
Index 511

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program