did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735611306

McSe Training Kit: Microsoft Windows 2000 Core Requirements

by
  • ISBN13:

    9780735611306

  • ISBN10:

    0735611300

  • Format: Paperback
  • Copyright: 2000-06-01
  • Publisher: Microsoft Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $199.99

Summary

Here's all-in-one training covering the core exams every Windows 2000 MCSE candidate must pass. This set includes official Microsoft study guides for Exams 70-210, 70-215, 70-216, and 70-217 -- which can also be used in preparation for the special accelerated exam (70-240) for candidates already certified on Windows NT "RM" 4.0. Students work at their own pace through an integrated system of skill-building tutorials and hands-on lab exercises. An economical alternative to classroom instruction, students can rely on official self-paced "MCSE Training Kits" from Microsoft for the skills they need on the job -- and on the exam.

Table of Contents

About This Book xv
Intended Audience xv
Prerequisites xvi
Reference Materials xvi
About the CD-ROM xvi
Features of This Book xvi
Notes xvii
Conventions xvii
Chapter and Appendix Overview xviii
Finding the Best Starting Point for You xx
Where to Find Specific Skills in This Book xxi
Getting Started xxiv
Hardware Requirements xxiv
Software Requirements xxv
Setup Instructions xxv
The Microsoft Certified Professional Program xxxiv
Microsoft Certification Benefits xxxv
Requirements for Becoming a Microsoft Certified Professional xxxvi
Technical Training for Computer Professionals xxxvii
Technical Support xxxviii
Designing a Windows 2000 Network
1(22)
About This Chapter
1(1)
Before You Begin
1(1)
Network Services Overview
2(1)
TCP/IP
2(1)
Domain Name System
2(1)
Dynamic Host Configuration Protocol
3(1)
Windows Internet Name Service
4(1)
Remote Access Overview
4(2)
Network Address Translator
6(1)
Certificate Services
7(1)
Lesson Summary
8(1)
Developing a Network Implementation Plan
9(1)
Operating System Considerations
9(2)
Phases of Deployment
11(1)
Hardware Considerations
12(1)
Interaction with Legacy Systems
12(1)
Network Protocol Considerations
12(1)
Lesson Summary
13(1)
Common Protocols Supported by Windows 2000
14(1)
Transmission Control Protocol/Internet Protocol
14(4)
NWLink
18(1)
NetBEUI
19(1)
Apple Talk
19(1)
Data Link Control
19(1)
Infrared Data Association
19(1)
Lesson Summary
20(3)
Review
21(2)
Implementing TCP/IP
23(30)
About This Chapter
23(1)
Before You Begin
23(1)
TCP/IP Overview
24(1)
Benefits of TCP/IP
24(2)
Architectural Overview of the TCP/IP Protocol Suite
26(3)
Transmission Control Protocol
29(1)
Internet Protocol (IP)
29(1)
User Datagram Protocol
30(1)
Lesson Summary
30(1)
Internet Protocol Addressing
31(1)
The IP Address
31(2)
Dotted-Decimal Notation
33(1)
IP Address Conversion from Binary to Decimal
33(1)
Address Classes
34(1)
IP Address Guidelines
35(1)
Lesson Summary
36(1)
Microsoft TCP/IP Installation and Configuration
37(1)
Installing TCP/IP
37(1)
Practice: Installing the TCP/IP Protocol
37(1)
Configuring TCP/IP
38(3)
Testing TCP/IP with Ipconfig and PING
41(2)
Configuring Packet Filters
43(1)
Practice: Implementing IP Packet Filters
43(1)
Lesson Summary
44(1)
Basic Concepts of IP Routing
45(1)
Overview of Routing
45(2)
Static and Dynamic IP Routing
47(1)
Practice: Updating a Windows 2000-Based Routing Table
47(3)
Lesson Summary
50(3)
Review
51(2)
Implementing NWLink
53(26)
About This Chapter
53(1)
Before You Begin
53(1)
Introducing NWLink
54(1)
Interoperability with NetWare
54(1)
NWLink and Windows 2000
55(1)
NWLink Architecture
56(4)
Lesson Summary
60(1)
Using Gateway Service for NetWare
61(1)
Gateway Service for NetWare Overview
61(1)
Understanding Gateway Service for NetWare and Gateways
61(1)
Installing Gateway Service for NetWare
62(2)
Creating a Gateway
64(2)
Connecting Directly to NetWare Resources
66(1)
Lesson Summary
66(1)
Using Clinet Service for NetWare
67(1)
NetWare Connectivity
67(1)
Choosing Between Client Service for NetWare and Gateway Service for NetWare
67(1)
Configuring Client Service for NetWare
68(1)
Lesson Summary
69(1)
Installing and Configuring NWLink
70(1)
Windows 2000 Professional and NetWare Connectivity
70(1)
Internal Network Number
71(1)
Frame Type and Network Number
72(2)
Configuring NWLink
74(1)
Practice: Installing and Configuring NWLink
75(1)
Lesson Summary
76(3)
Review
77(2)
Monitoring Network Activity
79(20)
About This Chapter
79(1)
Before You Begin
79(1)
Introducing Network Monitor
80(1)
Understanding Network Monitor
80(1)
Practice: Installing Network Monitor
80(2)
Lesson Summary
82(1)
Using Network Monitor
83(1)
Examining Frames
83(1)
Viewing Data
83(3)
Using Display Filters
86(1)
Reviewing Captured Data
87(2)
Practice: Capturing Frames with Network Monitor
89(1)
Network Monitor Performance Issues
89(1)
Detecting Network Monitor
89(1)
Lesson Summary
90(1)
Windows 2000 Administration Tools
91(1)
Windows 2000 Administration Capabilities
91(1)
Terminal Services
91(4)
Simple Network Management Protocol (SNMP)
95(2)
Lesson Summary
97(2)
Review
98(1)
Implementing IPSec
99(38)
About This Chapter
99(1)
Before You Begin
99(1)
Introducing and Enabling IPSec
100(1)
Internet Protocol Security
100(1)
In-Depth Defense
101(1)
Benefits of IPSec
101(3)
IP Security Process
104(1)
IPSec Architecture
104(3)
Considerations for IPSec
107(1)
Lesson Summary
108(1)
Configuring IPSec
109(1)
Prerequisites for Implementing IPSec
109(1)
How to Implement IPSec
109(1)
Configuring IPSec Policies
109(1)
Connection Types
110(1)
Authentication Method
111(1)
IP Packet Filtering
112(3)
Filter Actions
115(1)
Additional IPSec Tasks
116(1)
Practice: Testing IPSec
117(1)
Lesson Summary
118(1)
Customizing IPSec Policies and Rules
119(1)
Policy-Based Security
119(1)
IP Filters and Filter Specifications
120(1)
Security Methods and Negotiation Policies
121(1)
IPSec Through Firewalls
122(1)
IPSec Through NAT and Proxies
122(1)
Other IPSec Considerations
123(2)
TCP/IP Properties
125(1)
Practice: Building a Custom IPSec Policy
125(3)
Lesson Summary
128(1)
Monitoring IPSec
129(1)
IPSec Management and Troubleshooting Tools
129(2)
Using Network Monitor
131(1)
Practice: Using Network Monitor to View Clear Text Traffic
131(1)
Practice: Using Network Monitor to View Encrypted Traffic
132(1)
Practice: Using Diagnostic Aids
133(1)
Lesson Summary
134(3)
Review
135(2)
Resolving Network Host Names
137(14)
About This Chapter
137(1)
Before You Begin
137(1)
TCP/IP Naming Schemes
138(1)
Windows 2000 Naming Schemes
138(1)
Lesson Summary
139(1)
Host Names
140(1)
Understanding Host Names
140(1)
Purpose of Host Names
140(1)
Host Name Resolution
141(4)
Lesson Summary
145(1)
The HOSTS File
146(1)
Understanding the HOSTS File
146(1)
Advantage of Using a HOSTS File
147(1)
Practice: Working with the HOSTS File and DNS
147(1)
Lesson Summary
148(3)
Review
149(2)
Implementing Domain Name System (DNS)
151(34)
About This Chapter
151(1)
Before You Begin
151(1)
Introducing DNS
152(1)
DNS Origins
152(1)
DNS and Windows 2000
152(1)
How DNS Works
153(1)
The Structure of DNS
154(1)
Zones
155(1)
Name Server Roles
156(1)
Lesson Summary
157(1)
Name Resolution and DNS Files
158(1)
Recursive Queries
158(1)
Iterative Queries
158(1)
Inverse Queries
159(1)
Caching and Time to Live
160(1)
DNS Configuration Files
160(1)
The Reverse Lookup File
161(1)
The Cache File
162(1)
The Boot File
162(1)
Lesson Summary
163(1)
Planning a DNS Implementation
164(1)
DNS Considerations
164(1)
Registering with the Parent Domain
164(1)
Practice: Implementing DNS
165(6)
Lesson Summary
171(1)
Installing DNS
172(1)
Practice: Installing the DNS Server Service
172(2)
Troubleshooting DNS with NSLOOKUP
174(2)
Lesson Summary
176(1)
Configuring DNS
177(1)
Configuring DNS Server Properties
177(2)
Adding DNS Domains and Zones
179(1)
Practice: Configuring a DNS Server
180(1)
Adding Resource Records
181(1)
Configuring Reverse Lookup
182(1)
Lesson Summary
182(3)
Review
183(2)
Using Windows 2000 Domain Name Service
185(14)
About This Chapter
185(1)
Before You Begin
185(1)
Working with Zones
186(1)
Delegating Zones
186(3)
Configuring Zones for Dynamic Update
189(1)
Practice: Enabling Dynamic Updates
190(1)
Lesson Summary
191(1)
Working with Servers
192(1)
Overview of DNS Servers and Caching
192(1)
Implementing a Caching-Only Server
192(2)
Monitoring DNS Server Performance
194(1)
Practice: Testing a Simple Query on a DNS Server
194(2)
Lesson Summary
196(3)
Review
197(2)
Implementing Windows Internet Name Service (WINS)
199(28)
About This Chapter
199(1)
Before You Begin
199(1)
Introduction to WINS
200(1)
Name Resolution with NetBIOS
200(3)
WINS Overview
203(1)
WINS and Windows 2000
204(1)
Lesson Summary
205(1)
The WINS Resolution Process
206(1)
Resolving NetBIOS Names with WINS
206(1)
Name Registration
207(1)
Name Renewal
208(1)
Name Release
209(1)
Name Query and Name Response
210(1)
Lesson Summary
211(1)
Implementing WINS
212(1)
When to Use WINS
212(1)
Considerations for WINS Servers
213(1)
WINS Requirements
213(1)
Using Static Mappings
214(2)
Practice: Configuring a WINS Client
216(1)
Troubleshooting WINS
217(2)
Managing and Monitoring WINS
219(1)
Lesson Summary
219(1)
Configuring WINS Replication
220(1)
Replication Overview
220(1)
Configuring a WINS Server as a Push or Pull Partner
220(1)
Configuring Database Replication
221(1)
Practice: Performing WINS Database Replication
222(2)
Backing Up the WINS Database
224(1)
Lesson Summary
225(2)
Review
226(1)
Implementing Dynamic Host Configuration Protocol (DHCP)
227(34)
About This Chapter
227(1)
Before You Begin
227(1)
Introducing and Installing DHCP
228(1)
DHCP Overview
228(1)
How DHCP Works
229(4)
Installing a DHCP Server
233(1)
Ipconfig
234(2)
DHCP Relay Agent
236(1)
Lesson Summary
236(1)
Configuring DHCP
237(1)
Using DHCP on a Network
237(1)
Installing and Configuring a DHCP Server
238(5)
Implementing Multiple DHCP Servers
243(1)
Lesson Summary
244(1)
Integrating DHCP with Naming Services
245(1)
DNS and DHCP
245(3)
Lesson Summary
248(1)
Using DHCP with Active Directory
249(1)
Windows 2000 Integrated IP Management
249(1)
Rogue DHCP Server Detection Feature
250(1)
Lesson Summary
250(1)
Troubleshooting DHCP
251(1)
Preventing DHCP Problems
251(1)
Troubleshooting DHCP Clients
252(3)
Troubleshooting DHCP Servers
255(2)
Moving the DHCP Server Database
257(1)
Lesson Summary
258(3)
Review
259(2)
Providing Your Clients Remote Access Service (RAS)
261(42)
About This Chapter
261(1)
Before You Begin
261(1)
Introducing Remote Access Service
262(1)
Overview of Remote Access Service
262(1)
Routing and Remote Access Features
263(2)
Enabling Routing and Remote Access
265(1)
Practice: Installing a Routing and Remote Access Server
266(1)
Remote Access Versus Remote Control
267(2)
Lesson Summary
269(1)
Configuring a Routing and Remote Access Server
270(1)
Allowing Inbound Connections
270(1)
Creating a Remote Access Policy (RAP)
271(3)
Practice: Creating a New Remote Access Policy
274(1)
Configuring a Remote Access Profile
275(1)
Practice: Creating a Policy Filter
276(1)
Configuring Bandwidth Allocation Protocol (BAP)
277(1)
Lesson Summary
278(1)
Implementing IP Routing on a Remote Access Server
279(1)
Installing IP Routing
279(1)
Practice: Enabling and Configuring a Routing and Remote Access Server
279(1)
Updating the Routing Tables
280(2)
Implementing Demand-Dial Routing
282(3)
Lesson Summary
285(1)
Supporting Virtual Private Networks
286(1)
Implementing a VPN
286(2)
Integrating VPN in a Routed Environment
288(1)
Integrating VPN Servers with the Internet
288(2)
Practice: Creating VPN Interfaces
290(1)
Lesson Summary
291(1)
Supporting Multilink Connections
292(1)
Point-to-Point Protocol
292(1)
Multilink PPP
292(1)
Lesson Summary
293(1)
Using Routing and Remote Access with DHCP
295
Routing and Remote Access and DHCP
294(1)
DHCP Relay Agent
294(1)
Practice: Configuring the DHCP Relay Agent to Work over Routing and Remote Access
295(1)
Lesson Summary
295(1)
Managing and Monitoring Remote Access
296(1)
Logging User Authentication and Accounting Requests
296(2)
Accounting
298(1)
Netsh Command-Line Tool
299(1)
Network Monitor
300(1)
Resource Kit Utilities
300(1)
Lesson Summary
301(2)
Review
302(1)
Supporting Network Address Translation (NAT)
303(24)
About This Chapter
303(1)
Before You Begin
303(1)
Introducing NAT
304(1)
Network Address Translation
304(1)
Public and Private Addresses
305(2)
How NAT Works
307(2)
NAT Processes in Windows 2000 Routing and Remote Access
309(3)
Additional NAT Routing Protocol Components
312(1)
Lesson Summary
313(1)
Installing Internet Connection Sharing
314(1)
Internet Connection Sharing
314(3)
Internet Connection Sharing and NAT
317(1)
Troubleshooting Connection Sharing (NAT)
318(1)
Lesson Summary
319(1)
Installing and Configuring NAT
320(1)
Network Address Translation Design Considerations
320(4)
Virtual Private Networks and NATs
324(1)
Lesson Summary
325(2)
Review
326(1)
Implementing Certificate Services
327(22)
About This Chapter
327(1)
Before You Begin
327(1)
Introducing Certificates
328(1)
Overview of Certificates
328(2)
Enterprise and Stand-Alone CAs
330(1)
Types of CAs
331(1)
Lesson Summary
332(1)
Installing and Confiruging Certificate Authority
333(1)
Deploying a CA
333(1)
Protecting a CA
334(1)
Certificate Enrollment
334(3)
Practice: Installing a Stand-Alone Subordinate CA
337(2)
Certificate Renewal
339(1)
Certificate and Key Recovery
339(2)
Lesson Summary
341(1)
Managing Certificates
342(1)
Revoked Certificates
342(1)
Issued Certificates
342(1)
Pending Requests
342(1)
Failed Requests
342(1)
How a Certificate Is Issued
343(1)
Certificate Revocation
343(1)
Practice: Revoking a Certificate
344(1)
EFS Recovery Policy
344(1)
Practice: Changing a Recovery Policy
345(1)
Lesson Summary
346(3)
Review
347(2)
Implementing Enterprise-Wide Network Security
349(26)
About This Chapter
349(1)
Before You Begin
349(1)
Implementing Network Security
350(1)
Planning for Network Security
350(3)
Planning Distributed Network Security
353(1)
Internet Connection Issues
354(1)
Microsoft Proxy Server
355(1)
Lesson Summary
356(1)
Configuring Routing and Remote Access Security
357(1)
Overview of Remote Access
357(1)
Configuring Protocols for Security
358(1)
Practice: Using Security Protocols for a Virtual Private Network Connection
359(1)
Creating Remote Access Policies
360(1)
Using Encryption Protocols
361(2)
Lesson Summary
363(1)
Monitoring Security Events
364(1)
Monitoring Your Network Security
364(1)
Using Event Viewer to Monitor Security
365(1)
Practice: Recording Failed Logon Attempts
365(2)
Practice: Viewing the Security Log
367(1)
System Monitor
368(1)
The IPSec Monitor Utility
369(1)
Monitoring Security Overhead
370(1)
Lesson Summary
371(4)
Review
372(3)
Appendix A Questions and Answers 375(14)
Glossary 389(26)
Index 415

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program