did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735622876

MCSE Self-Paced Training Kit (Exam 70-293) Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

by
  • ISBN13:

    9780735622876

  • ISBN10:

    0735622876

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2006-04-12
  • Publisher: Microsoft Press
  • Purchase Benefits
List Price: $59.99

Summary

Announcing an all-new MCSA/MCSE Training Kit designed to help maximize your performance on Exam 70-293, a core exam for the new Windows Server 2003 certification. This kit packs the tools and features that exam candidates want most-including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and a robust testing suite. It also provides real-world scenarios, case study examples, and troubleshooting labs for skills and expertise that you can apply to the job.

Author Biography

Craig Zacker is a writer, an editor, and a networking specialist who has authored or coauthored more than 25 computer books, including several popular certification preparation guides. Anthony Steven is a trainer, consultant, and technology manager with Content Master. Part of the CM Group Ltd., Content Master is a Microsoft Gold Certified Partner that specializes in developing technical content.

Table of Contents

About This Book xxv
Intended Audience xxv
Prerequisites xxv
About the CD-ROM xxvi
Features of This Book xxvii
Part 1: Learn at Your Own Pace xxvii
Part 2: Prepare for the Exam xxviii
Informational Notes xxviii
Notational Conventions xxix
Keyboard Conventions xxix
Getting Started xxix
Hardware Requirements xxx
Software Requirements xxx
Setup Instructions xxxi
The Microsoft Certified Professional Program xxxiv
Technical Support xxxiv
Evaluation Edition Software Support xxxv
Part 1 Learn at Your Own Pace
Planning a Network Topology
Why This Chapter Matters
3(1)
Before You Begin
4(1)
Lesson 1: Windows Server 2003 and the Network Infrastructure
5(7)
What Is a Network Infrastructure?
5(3)
Planning a Network Infrastructure
8(1)
Implementing a Network Infrastructure
9(1)
Maintaining a Network Infrastructure
9(1)
Lesson Review
10(1)
Lesson Summary
11(1)
Lesson 2: Selecting Data-Link Layer Protocols
12(13)
Understanding the OSI Reference Model
12(2)
Selecting a Data-Link Layer Protocol
14(9)
Practice: Choosing an Ethernet Variant
23(1)
Lesson Review
23(1)
Lesson Summary
24(1)
Lesson 3: Selecting Network/Transport Layer Protocols
25(6)
Using TCP/IP
25(4)
Lesson Review
29(1)
Lesson Summary
30(1)
Lesson 4: Locating Network Resources
31(10)
Determining Location Criteria
31(1)
Locating Workstations
31(1)
Locating Peripherals
32(1)
Locating Cables
33(1)
Locating Connectivity Devices
34(1)
Locating Servers
35(1)
Practice: Blueprinting a Network Infrastructure
36(1)
Lesson Review
37(1)
Lesson Summary
37(4)
Exam Highlights
41(2)
Key Points
41(1)
Key Terms
41(2)
Questions and Answers
43
Planning a TCP/IP Network Infrastructure
Why This Chapter Matters
2(1)
Before You Begin
2(1)
Lesson 1: Determining IP Addressing Requirements
3(11)
Using Public and Private Addresses
3(4)
Accessing the Internet from a Private Network
7(4)
Planning IP Addresses
11(1)
Practice: Using Registered and Unregistered IP Addresses
12(1)
Lesson Review
12(1)
Lesson Summary
13(1)
Lesson 2: Planning an IP Routing Solution
14(11)
Understanding IP Routing
14(1)
Creating LANs
15(2)
Creating WANs
17(1)
Using Routers
18(1)
Using Switches
19(1)
Combining Routing and Switching
20(2)
Practice: Designing an Internetwork
22(1)
Lesson Review
23(1)
Lesson Summary
24(1)
Lesson 3: Planning an IP Addressing and Subnetting Strategy
25(10)
Obtaining Network Addresses
25(1)
Understanding IP Address Classes
26(1)
Understanding Subnetting
27(2)
Subnetting Between Bytes
29(3)
Practice: Subnetting IP Addresses
32(1)
Lesson Review
33(1)
Lesson Summary
34(1)
Lesson 4: Assigning IP Addresses
35(7)
Manually Configuring TCP/IP Clients
35(1)
Installing a DHCP Server
36(1)
Understanding DHCP Allocation Methods
36(1)
Planning a DHCP Deployment
37(1)
Practice: Installing and Configuring the DHCP Service
38(2)
Lesson Review
40(1)
Lesson Summary
41(1)
Lesson 5: Troubleshooting TCP/IP Addressing
42(12)
Isolating TCP/IP Problems
42(1)
Troubleshooting Client Configuration Problems
43(4)
Troubleshooting DHCP Problems
47(2)
Lesson Review
49(1)
Lesson Summary
50(4)
Exam Highlights
54(2)
Key Points
55(1)
Key Terms
55(1)
Questions and Answers
56
Planning Internet Connectivity
Why This Chapter Matters
3
Before You Begin
2(1)
Lesson 1: Planning an Internet Connectivity Infrastructure
3(12)
Determining Internet Connectivity Requirements
3(4)
Choosing an Internet Connection Type
7(6)
Practice: Understanding WAN Speeds
13(1)
Lesson Review
13(1)
Lesson Summary
14(1)
Lesson 2: Selecting Routers and ISPs
15(9)
Choosing a Router Type
15(2)
Choosing an ISP
17(4)
Practice: Configuring a Windows Server 2003 Router
21(1)
Lesson Review
22(1)
Lesson Summary
23(1)
Lesson 3: Securing and Regulating Internet Access
24(10)
Determining Internet Security Requirements
24(2)
Using NAT
26(3)
Using a Proxy Server
29(1)
Selecting an Internet Access Method
30(1)
Practice: Configuring a NAT Router
31(2)
Lesson Review
33(1)
Lesson Summary
33(1)
Lesson 4: Troubleshooting Internet Connectivity
34(8)
Determining the Scope of the Problem
34(1)
Diagnosing Client Configuration Problems
35(1)
Diagnosing NAT and Proxy Server Problems
36(1)
Diagnosing Internet Connection Problems
37(1)
Lesson Review
38(1)
Lesson Summary
38(4)
Exam Highlights
42(1)
Key Points
42(1)
Key Terms
42(1)
Questions and Answers
43
Planning a Name Resolution Strategy
Why This Chapter Matters
4
Before You Begin
2(1)
Lesson 1: Determining Name Resolution Requirements
3(15)
What Is Name Resolution?
3(1)
What Types of Names Need to Be Resolved?
4(1)
Using the DNS
5(6)
Determining DNS Requirements
11(2)
Using NetBIOS Names
13(3)
Using Local Host Name Resolution
16(1)
Practice: Specifying Name Resolution Requirements
16(1)
Lesson Review
16(1)
Lesson Summary
17(1)
Lesson 2: Designing a DNS Namespace
18(10)
Using an Existing Namespace
18(1)
Creating Internet Domains
19(1)
Creating Internal Domains
20(2)
Combining Internal and External Domains
22(1)
Creating an Internal Root
23(1)
Creating Host Names
23(1)
Practice: Designing a DNS Namespace
24(2)
Lesson Review
26(1)
Lesson Summary
26(2)
Lesson 3: Implementing a DNS Name Resolution Strategy
28(14)
How Many DNS Servers?
28(1)
Understanding DNS Server Types
29(4)
Creating Zones
33(2)
Practice: Understanding DNS Server Functions
35(2)
Practice: Creating a Zone
37(3)
Lesson Review
40(1)
Lesson Summary
40(2)
Lesson 4: Implementing a NetBIOS Name Resolution Strategy
42(8)
Practice: Installing a WINS Server
48(1)
Lesson Review
49(1)
Lesson Summary
49(1)
Lesson 5: Planning DNS Security
50(8)
Determining DNS Security Threats
50(1)
Securing DNS
51(5)
Practice: Understanding DNS Security Techniques
56(1)
Lesson Review
57(1)
Lesson Summary
57(1)
Lesson 6: Troubleshooting Name Resolution
58(10)
Troubleshooting Client Configuration Problems
58(1)
Troubleshooting DNS Server Problems
59(5)
Lesson Review
64(1)
Lesson Summary
64(4)
Exam Highlights
68(2)
Key Points
68(1)
Key Terms
69(1)
Questions and Answers
70
Using Routing and Remote Access
Why This Chapter Matters
5
Before You Begin
2(1)
Lesson 1: Planning a Routing and Remote Access Strategy
3(9)
Choosing a WAN Topology
3(4)
Selecting a WAN Technology
7(3)
Lesson Review
10(1)
Lesson Summary
11(1)
Lesson 2: Static and Dynamic Routing
12(13)
Selecting Routers
12(1)
Using Static Routing
12(3)
Using Dynamic Routing
15(5)
Routing IP Multicast Traffic
20(2)
Practice: Installing RIP
22(2)
Lesson Review
24(1)
Lesson Summary
24(1)
Lesson 3: Securing Remote Access
25(18)
Determining Security Requirements
25(1)
Controlling Access Using Dial-In Properties
26(1)
Planning Authentication
27(4)
Using Remote Access Policies
31(4)
Using Network Access Quarantine Control
35(3)
Practice: Installing a Routing and Remote Access Server
38(3)
Lesson Review
41(1)
Lesson Summary
42(1)
Lesson 4: Troubleshooting TCP/IP Routing
43(13)
Isolating Router Problems
43(4)
Troubleshooting the Routing and Remote Access Configuration
47(1)
Troubleshooting the Routing Table
48(4)
Lesson Review
52(1)
Lesson Summary
52(4)
Exam Highlights
56(2)
Key Points
56(1)
Key Terms
57(1)
Questions and Answers
58
Maintaining Server Availability
Why This Chapter Matters
6(1)
Before You Begin
6
Lesson 1: Monitoring Network Traffic
2(14)
Using the Performance Console
2(5)
Analyzing Network Traffic with Network Monitor
7(6)
Practice: Using Network Monitor
13(2)
Lesson Review
15(1)
Lesson Summary
15(1)
Lesson 2: Monitoring Network Servers
16(15)
Monitoring Network Server Services
16(9)
Locating System Bottlenecks
25(3)
Practice: Establishing a Performance Baseline
28(2)
Lesson Review
30(1)
Lesson Summary
30(1)
Lesson 3: Planning a Backup Strategy
31(16)
Understanding Network Backups
31(4)
Creating a Backup Plan
35(4)
Performing Restores
39(1)
Using Volume Shadow Copy
40(2)
Practice: Using Windows Server 2003 Backup
42(1)
Lesson Review
43(1)
Lesson Summary
44(3)
Exam Highlights
47(2)
Key Points
47(1)
Key Terms
48(1)
Questions and Answers
49
Clustering Servers
Why This Chapter Matters
7(1)
Before You Begin
7
Lesson 1: Understanding Clustering
2(12)
Clustering Types
2(3)
Designing a Clustering Solution
5(7)
Lesson Review
12(1)
Lesson Summary
13(1)
Lesson 2: Using Network Load Balancing
14(16)
Understanding Network Load Balancing
14(1)
Planning a Network Load Balancing Deployment
15(5)
Deploying a Network Load Balancing Cluster
20(1)
Monitoring Network Load Balancing
21(4)
Practice: Creating a Network Load Balancing Cluster
25(3)
Lesson Review
28(1)
Lesson Summary
29(1)
Lesson 3: Designing a Server Cluster
30(19)
Designing a Server Cluster Deployment
30(1)
Planning a Server Cluster Hardware Configuration
31(4)
Creating an Application Deployment Plan
35(3)
Selecting a Quorum Model
38(1)
Creating a Server Cluster
39(2)
Configuring Failover Policies
41(1)
Practice: Creating a Single Node Cluster
42(3)
Lesson Review
45(1)
Lesson Summary
45(4)
Exam Highlights
49(2)
Key Points
49(1)
Key Terms
50(1)
Questions and Answers
51
Planning a Secure Baseline Installation
Why This Chapter Matters
8
Before You Begin
2(1)
Lesson 1: Selecting Computers and Operating Systems
3(10)
Understanding Computer Roles
3(2)
Creating Hardware Specifications
5(2)
Selecting Operating Systems
7(4)
Lesson Review
11(1)
Lesson Summary
11(2)
Lesson 2: Planning a Security Framework
13(6)
High-Level Security Planning
13(1)
Creating a Security Design Team
13(1)
Mapping Out a Security Life Cycle
14(3)
Lesson Review
17(1)
Lesson Summary
18(1)
Lesson 3: Identifying Client and Server Default Security Settings
19(17)
Evaluating Security Settings
19(11)
Practice: Modifying Default Security Settings
30(3)
Lesson Review
33(1)
Lesson Summary
33(3)
Exam Highlights
36(2)
Key Points
36(1)
Key Terms
37(1)
Questions and Answers
38
Hardening Servers
Why This Chapter Matters
9(1)
Before You Begin
9
Lesson 1: Creating a Baseline for Member Servers
2(17)
Creating a Baseline Policy
2(2)
Setting Audit Policies
4(4)
Setting Event Log Policies
8(1)
Configuring Services
9(3)
Configuring Security Options
12(2)
Practice: Creating a Group Policy Object
14(2)
Lesson Review
16(1)
Lesson Summary
17(2)
Lesson 2: Creating Role-Specific Server Configurations
19(13)
Securing Domain Controllers
19(4)
Securing Infrastructure Servers
23(4)
Securing File and Print Servers
27(1)
Securing Application Servers
28(1)
Practice: Modifying the GPO for the Domain Controllers Container's GPO
28(2)
Lesson Review
30(1)
Lesson Summary
30(2)
Lesson 3: Deploying Role-Specific GPOs
32(8)
Combining GPO Policies
32(3)
Practice: Deploying Multiple GPOs
35(2)
Lesson Review
37(1)
Lesson Summary
38(2)
Lesson 4: Using the SCW to Harden Servers
40(12)
Deploying the SCW
40(4)
Practice: Deploying SCW Security Policies
44(3)
Lesson Review
47(1)
Lesson Summary
47(5)
Exam Highlights
52(1)
Key Points
52(1)
Key Terms
52(1)
Questions and Answers
53
Deploying Security Configurations
Why This Chapter Matters
10(1)
Before You Begin
10
Lesson 1: Creating a Testing and Deployment Plan
2(8)
Creating a Testing Environment
2(4)
Creating a Pilot Deployment
6(1)
Creating a Pilot Deployment Plan
7(1)
Lesson Review
8(1)
Lesson Summary
9(1)
Lesson 2: Introducing Security Templates
10(9)
Understanding Security Templates
10(1)
Using the Security Templates Console
11(2)
Using the Supplied Security Templates
13(2)
Practice: Using the Security Templates Snap-in
15(2)
Lesson Review
17(1)
Lesson Summary
17(2)
Lesson 3: Deploying Security Templates
19(14)
Using Group Policies
19(2)
Using the Security Configuration And Analysis Tool
21(3)
Using Secedit.exe
24(1)
Using the Security Configuration Wizard
25(1)
Practice: Using the Security Configuration And Analysis Snap-in
26(2)
Lesson Review
28(1)
Lesson Summary
29(4)
Exam Highlights
33(1)
Key Points
33(1)
Key Terms
33(1)
Questions and Answers
34
Creating and Managing Digital Certificates
Why This Chapter Matters
11(1)
Before You Begin
11
Lesson 1: Introducing Certificates
2(7)
Introducing the Public Key Infrastructure
2(4)
Understanding PKI Functions
6(1)
Practice: Viewing a Certificate
7(1)
Lesson Review
8(1)
Lesson Summary
8(1)
Lesson 2: Designing a Public Key Infrastructure
9(10)
Defining Certificate Requirements
9(2)
Creating a CA Infrastructure
11(5)
Configuring Certificates
16(1)
Practice: Installing a Windows Server 2003 Certification Authority
16(1)
Lesson Review
17(1)
Lesson Summary
18(1)
Lesson 3: Managing Certificates
19(13)
Understanding Certificate Enrollment and Renewal
19(2)
Manually Requesting Certificates
21(3)
Revoking Certificates
24(1)
Practice: Requesting a Certificate
25(3)
Lesson Review
28(1)
Lesson Summary
29(3)
Exam Highlights
32(1)
Key Points
32(1)
Key Terms
32(1)
Questions and Answers
33
Securing Network Communications Using IPSec
Why This Chapter Matters
12
Before You Begin
2(1)
Lesson 1: Securing Internetwork Communications
3(13)
Introducing Packet Filtering
3(2)
Packet Filtering Criteria
5(3)
Windows Server 2003 Packet Filtering
8(3)
Practice: Creating Packet Filters in Routing and Remote Access Service
11(2)
Lesson Review
13(1)
Lesson Summary
14(2)
Lesson 2: Planning an IPSec Implementation
16(11)
Evaluating Threats
16(2)
Introducing IPSec
18(2)
IPSec Protocols
20(4)
Transport Mode and Tunnel Mode
24(1)
Lesson Review
25(1)
Lesson Summary
26(1)
Lesson 3: Deploying IPSec
27(10)
IPSec Components
27(1)
Planning an IPSec Deployment
28(1)
Working with IPSec Policies
28(4)
Practice: Creating an IPSec Policy
32(3)
Lesson Review
35(1)
Lesson Summary
36(1)
Lesson 4: Troubleshooting Data Transmission Security
37(10)
Troubleshooting Policy Mismatches
37(3)
Examining IPSec Traffic
40(1)
Practice: Using Resultant Set of Policy
41(3)
Lesson Review
44(1)
Lesson Summary
44(3)
Chapter Summary
47(1)
Exam Highlights
47(2)
Key Points
48(1)
Key Terms
48(1)
Questions and Answers
49
Designing a Security Infrastructure
Why This Chapter Matters
13
Before You Begin
2(1)
Lesson 1: Planning a Security Update Infrastructure
3(12)
Understanding Software Update Practices
3(1)
Using Windows Update
4(1)
Updating a Network
5(7)
Practice: Using Microsoft Baseline Security Analyzer
12(1)
Lesson Review
13(1)
Lesson Summary
14(1)
Lesson 2: Securing a Wireless Network
15(10)
Understanding Wireless Networking Standards
15(1)
Wireless Networking Topologies
16(2)
Understanding Wireless Network Security
18(1)
Controlling Wireless Access Using Group Policies
19(1)
Authenticating Users
20(2)
Encrypting Wireless Traffic
22(1)
Lesson Review
23(1)
Lesson Summary
24(1)
Lesson 3: Providing Secure Network Administration
25(12)
Using Remote Assistance
25(4)
Using Remote Desktop
29(2)
Practice: Configuring Remote Assistance
31(2)
Lesson Review
33(1)
Lesson Summary
34(3)
Chapter Summary
37(1)
Exam Highlights
37(2)
Key Points
37(1)
Key Terms
38(1)
Questions and Answers
39
Part 2 Prepare for the Exam
Planning and Implementing Server Roles and Server Security (1.0)
Tested Skills and Suggested Practices
3(1)
Further Reading
4(2)
Configure Security for Servers That Are Assigned Specific Roles
6(4)
Objective 1.1 Questions
7(1)
Objective 1.1 Answers
8(2)
Plan a Secure Baseline Installation
10(6)
Objective 1.2 Questions
12(2)
Objective 1.2 Answers
14(2)
Plan Security for Servers That Are Assigned Specific Roles
16(6)
Objective 1.3 Questions
18(2)
Objective 1.3 Answers
20(2)
Evaluate and Select the Operating System to Install on Computers in an Enterprise
22
Objective 1.4 Questions
23(2)
Objective 1.4 Answers
25
Planning, Implementing, and Maintaining a Network Infrastructure (2.0)
Tested Skills and Suggested Practices
15
Further Reading
4(2)
Plan a TCP/IP Network Infrastructure Strategy
6(6)
Objective 2.1 Questions
8(2)
Objective 2.1 Answers
10(2)
Plan and Modify a Network Topology
12(5)
Objective 2.2 Questions
15(1)
Objective 2.2 Answers
16(1)
Plan an Internet Connectivity Strategy
17(7)
Objective 2.3 Questions
20(2)
Objective 2.3 Answers
22(2)
Plan Network Traffic Monitoring
24(6)
Objective 2.4 Questions
26(2)
Objective 2.4 Answers
28(2)
Troubleshoot Connectivity to the Internet
30(6)
Objective 2.5 Questions
32(2)
Objective 2.5 Answers
34(2)
Troubleshoot TCP/IP Addressing
36(5)
Objective 2.6 Questions
38(1)
Objective 2.6 Answers
39(2)
Plan a Host Name Resolution Strategy
41(6)
Objective 2.7 Questions
43(2)
Objective 2.7 Answers
45(2)
Plan a NetBIOS Name Resolution Strategy
47(6)
Objective 2.8 Questions
49(2)
Objective 2.8 Answers
51(2)
Troubleshoot Host Name Resolution
53
Objective 2.9 Questions
55(1)
Objective 2.9 Answers
56
Planning, Implementing, and Maintaining Routing and Remote Access (3.0)
Tested Skills and Suggested Practices
16
Further Reading
2(2)
Plan a Routing Strategy
4(6)
Objective 3.1 Questions
6(2)
Objective 3.1 Answers
8(2)
Plan Security for Remote Access Users
10(8)
Objective 3.2 Questions
14(2)
Objective 3.2 Answers
16(2)
Implement Secure Access Between Private Networks
18(6)
Objective 3.3 Questions
20(2)
Objective 3.3 Answers
22(2)
Troubleshoot TCP/IP Routing
24
Objective 3.4 Questions
26(2)
Objective 3.4 Answers
28
Planning, Implementing, and Maintaining Server Availability (4.0)
Tested Skills and Suggested Practices
17
Further Reading
3(2)
Plan Services for High Availability
5(4)
Objective 4.1 Questions
6(1)
Objective 4.1 Answers
7(2)
Identify System Bottlenecks
9(6)
Objective 4.2 Questions
11(2)
Objective 4.2 Answers
13(2)
Implement a Cluster Server
15(10)
Objective 4.3 Questions
18(4)
Objective 4.3 Answers
22(3)
Manage Network Load Balancing
25(3)
Objective 4.4 Questions
26(1)
Objective 4.4 Answers
27(1)
Plan a Backup and Recovery Strategy
28
Objective 4.5 Questions
30(2)
Objective 4.5 Answers
32
Planning and Maintaining Network Security (5.0)
Tested Skills and Suggested Practices
18
Further Reading
3(2)
Configure Network Protocol Security
5(6)
Objective 5.1 Questions
7(2)
Objective 5.1 Answers
9(2)
Configure Security for Data Transmission
11(6)
Objective 5.2 Questions
13(2)
Objective 5.2 Answers
15(2)
Plan for Network Protocol Security
17(6)
Objective 5.3 Questions
19(2)
Objective 5.3 Answers
21(2)
Plan Secure Network Administration Methods
23(6)
Objective 5.4 Questions
25(2)
Objective 5.4 Answers
27(2)
Plan Security for Wireless Networks
29(6)
Objective 5.5 Questions
31(2)
Objective 5.5 Answers
33(2)
Plan Security for Data Transmission
35(5)
Objective 5.6 Questions
36(2)
Objective 5.6 Answers
38(2)
Troubleshoot Security for Data Transmission
40
Objective 5.7 Questions
42(1)
Objective 5.7 Answers
43
Planning, Implementing, and Maintaining Security Infrastructure (6.0)
Tested Skills and Suggested Practices
19
Further Reading
2(2)
Configure Active Directory Directory Service for Certificate Publication
4(5)
Objective 6.1 Questions
5(2)
Objective 6.1 Answers
7(2)
Plan a Public Key Infrastructure (PKI) That Uses Certificate Services
9(6)
Objective 6.2 Questions
11(2)
Objective 6.2 Answers
13(2)
Plan a Framework for Planning and Implementing Security
15(5)
Objective 6.3 Questions
17(1)
Objective 6.3 Answers
18(2)
Plan a Security Update Infrastructure
20
Objective 6.4 Questions
22(1)
Objective 6.4 Answers
23
Glossary 1(1)
Index 1

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program