did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780072129304

Test Yourself McSe Designing Security for Windows 2000: (Exam 70-220)

by
  • ISBN13:

    9780072129304

  • ISBN10:

    0072129301

  • Format: Paperback
  • Copyright: 2000-11-01
  • Publisher: McGraw-Hill Osborne Media
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $19.99

Summary

This Test Yourself book provides compete practice and quick review coverage of Exam 70-220 objectives to maximize chances for exam success. It drills and prepares candidates and helps them increase their chances for success through realistic question types, clear and in-depth answers, and an A-to-Z quick review of official exam topics. Illustrations.

Table of Contents

About the Contributors v
Acknowledgments vii
Preface xv
Introduction xvii
Analyzing the Existing and Planned Business Models
1(24)
Analyzing the Company Model and Geographical Scope
2(4)
Questions
3(3)
Analyzing Company Processes
6(5)
Questions
8(3)
Understanding Life Cycles
11(5)
Questions
12(4)
Lab Question
16(1)
Quick Answer Key
17(1)
In-Depth Answers
18(6)
Lab Answer
24(1)
Analyzing Business Requirements
25(22)
Analyzing the Existing and Planned Business Models and Organizational Structures
26(4)
Questions
27(3)
Analyzing Factors That Influence Company Strategies
30(4)
Questions
31(3)
Analyzing the Structure of IT Management
34(4)
Questions
35(3)
Lab Question
38(1)
Quick Answer Key
39(1)
In-Depth Answers
40(6)
Lab Answer
46(1)
Analyzing End User Computing Requirements
47(24)
Analyzing Business and Security Requirements for the End User
48(5)
Questions
49(4)
Analyzing the Current Physical Model and Information Security Model
53(6)
Questions
54(5)
Lab Question
59(1)
Quick Answer Key
60(1)
In-Depth Answers
61(8)
Lab Answer
69(2)
Analyzing Technical Requirements
71(24)
Evaluating the Company's Existing and Planned Technical Environment
72(5)
Questions
73(4)
Analyzing the Impact of the Security Design on the Existing and Planned Technical Environment
77(6)
Questions
78(5)
Lab Question
83(1)
Quick Answer Key
84(1)
In-Depth Answers
85(7)
Lab Answer
92(3)
Designing a Security Baseline for a Windows 2000 Network
95(26)
Understanding Domain Controllers
96(4)
Questions
97(3)
Understanding Operations Masters
100(4)
Questions
101(3)
Understanding Group Policy Scenarios
104(5)
Questions
105(4)
Lab Question
109(1)
Quick Answer Key
110(1)
In-Depth Answers
111(7)
Lab Answer
118(3)
Analyzing Security Requirements
121(28)
Identifying the Required Level of Security for Each Resource
122(4)
Questions
123(3)
Understanding Active Directory Concepts
126(4)
Questions
127(3)
Active Directory Planning Considerations
130(3)
Questions
131(2)
Securing the Active Directory
133(4)
Questions
134(3)
Lab Question
137(1)
Quick Answer Key
138(1)
In-Depth Answers
139(8)
Lab Answer
147(2)
Designing a Windows 2000 Security Solution
149(30)
Designing the Placement and Inheritance of Security Policies
150(4)
Questions
151(3)
Designing an Authentication Strategy
154(4)
Questions
155(3)
Designing a Public Key Infrastructure
158(3)
Questions
159(2)
Designing Windows 2000 Network Services Security
161(5)
Questions
162(4)
Lab Question
166(1)
Quick Answer Key
167(1)
In-Depth Answers
168(8)
Lab Answer
176(3)
Understanding Policies
179(30)
Understanding Group Policy and the MMC
180(3)
Questions
181(2)
Applying Group Policy
183(4)
Questions
184(3)
Configuring Group Policy
187(3)
Questions
188(2)
Designing an Audit Policy
190(3)
Questions
191(2)
Utilizing Security Templates
193(4)
Questions
195(2)
Lab Question
197(1)
Quick Answer Key
198(1)
In-Depth Answers
199(7)
Lab Answer
206(3)
Managing Data Security
209(26)
Designing a Delegation of Authority Strategy
210(4)
Questions
211(3)
Implementing Disaster Recovery
214(4)
Questions
215(3)
Designing an Encrypting File System Strategy
218(5)
Questions
219(4)
Lab Question
223(1)
Quick Answer Key
224(1)
In-Depth Answers
225(7)
Lab Answer
232(3)
Designing a Security Solution for Access Between Networks
235(42)
Providing Secure Access to Public Networks from a Private Network
236(4)
Questions
238(2)
Providing External Users with Secure Access to Private Network Resources
240(5)
Questions
242(3)
Providing Secure Access Between Private Networks
245(3)
Questions
246(2)
Designing Windows 2000 Security for Remote Access Users
248(4)
Questions
250(2)
Designing an SMB Signing Solution
252(4)
Questions
253(3)
Designing an IPSec Solution
256(4)
Questions
257(3)
Lab Question
260(2)
Quick Answer Key
262(1)
In-Depth Answers
263(12)
Lab Answer
275(2)
Practice Exam 277(44)
Blue Hound Enterprises Case Study
278(15)
Company Profile and History
278(7)
Questions
285(8)
Southwest Gifts Case Study
293(9)
Company Profile and History
293(3)
Questions
296(6)
Answers
302(10)
Answers
312(9)
Glossary 321

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program