MCSE Windows 2000 Network Exam Cram
Richard Taylor, Derek Melber, Hank Carbeck
Résumé
Contents
Introduction xxi
Self-Assessment xxxv
Chapter 1
Microsoft Certification Exams 1
Assessing Exam-Readiness 2
The Exam Situation 3
Exam Layout and Design 4
Multiple-Choice Question Format 5
Build-List-and-Reorder Question Format 6
Create-a-Tree Question Format 8
Drag-and-Connect Question Format 11
Select-and-Place Question Format 12
Microsoft?s Testing Formats 13
Strategies for Different Testing Formats 15
The Case-Study Exam Strategy 15
The Fixed-Length and Short-Form Exam Strategy 16
The Adaptive Exam Strategy 17
Question-Handling Strategies 18
Mastering the Inner Game 19
Additional Resources 20
Chapter 2
Network Protocols 23
The OSI Reference Model 24
Protocols Supported by Windows 2000 26
NetBIOS Enhanced User Interface (NetBEUI) 26
NWLink Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) 27
AppleTalk 28
Data Link Control (DLC) 28
TCP/IP 28
Practice Questions 35
Need to Know More? 39
Chapter 3
Dynamic Host Configuration Protocol (DHCP) 41
Why Use DHCP? 42
Installing the DHCP Service 42
The DHCP Lease Process 43
IP Request 44
IP Offer 44
IP Selection 44
IP Acknowledgement 44
Automatic Private IP Address 45
Managing Scopes 45
IP Address Range 46
Exclusions 46
Reservations 47
Client Types 48
DHCP Lease 49
DHCP Options 50
Superscopes 53
Multicast Scopes 54
Activating the Scope 54
Authorizing the DHCP Server 54
Relay Agent 55
DHCP Integration with DNS 56
Automatically Updating Client Information to DNS 56
DNSUpdateProxy Group 58
DHCP Administration 59
Administering the IP Address Allocation 59
Placing DHCP Servers in a Routed Environment 60
Monitoring and Troubleshooting DHCP 60
Tools for Monitoring and Troubleshooting DHCP 61
Troubleshooting DHCP with ipconfig 61
Practice Questions 63
Need to Know More? 71
Chapter 4
Domain Name System (DNS) 73
DNS Overview 74
DNS Names 74
DNS Name Resolution 75
At the DNS Server 75
At the DNS Client 76
What?s in a Zone? 79
Server Types 80
Reverse Lookup Zones 81
Integrating Zones with Active Directory 82
Give Me a Hint 84
Dynamic Updating of DNS 85
Dynamic Update Behavior 85
Dynamic Update Process 85
DHCP Servers, Clients, and Dynamic Updates 86
Secure Dynamic Updates 88
DHCP and Secure Dynamic Updates 89
Integration with WINS 90
Interoperability with Other DNS Servers 90
Configuring NT 4 DNS Servers for Active
Directory Support 91
Configuring Non-Microsoft DNS Servers for Active
Directory Support 91
Name Consistency 91
Troubleshooting DNS 93
Practice Questions 96
Need to Know More? 104
Chapter 5
WINS 105
NetBIOS Name Resolution Overview 106
Standard NetBIOS Name Resolution Methods 106
Microsoft NetBIOS Name Resolution Methods 107
Name Resolution Using NetBIOS over TCP/IP 108
LMHOSTS File 109
WINS Overview 110
Name Registration 110
Name Renewal 111
Name Release 111
Name Resolution 112
WINS in Windows 2000 112
WINS Client Configuration 112
WINS Proxy 113
Installing WINS 113
WINS Replication 114
Persistent Connections 114
Manual Tombstoning 115
Burst Handling 115
Practice Questions 117
Need to Know More? 122
Chapter 6
Remote Access Services 123
Dial-Up Access 124
Configuring the Dial-Up Access Server 124
Virtual Private Network Access 125
Configuring the VPN Server 126
RRAS Communication Protocols 126
Dial-Up Protocols 126
VPN Protocols 126
Configuring the Communication Protocols 127
Remote Access Policies 130
Remote Access Conditions 131
Remote Access Permissions 132
Remote Access Policy Profile 134
Managing Remote Access 139
Security of Dial-Up Clients 140
Authentication Protocols 140
Data Encryption 141
IAS and RADIUS 141
Centralized User Authentication 142
Centralized User Authorization 143
Centralized Auditing and Usage Accounting 143
Integration with Windows 2000 RRAS 144
Managing IAS Configurations in a Multiple IAS
Server Environment 144
Practice Questions 145
Need to Know More? 153
Chapter 7
Routing in a Windows 2000 Network Infrastructure 155
Why Use Windows 2000 Routing? 156
Static Routing 156
Demand-Dial Routing 157
On-Demand and Persistent Connections 157
One-Way and Two-Way Demand-Dial Connections 158
Additional Demand-Dial Configurations 162
Routing Information Protocol 164
RIP-for-IP Networks 164
Silent RIP 166
Additional RIP Configurations 166
Testing the RIP-for-IP Internetwork 167
RIP and SAP for IPX 167
RIP and SAP for IPX Considerations 167
Open Shortest Path First 168
Topology of an OSPF Internetwork 168
Additional OSPF Considerations 172
Monitoring OSPF Internetworks 172
Multicast Routing 172
Internet Group Management Protocol 173
IGMP Router Mode 174
IGMP Proxy Mode 174
The MBone 175
Multicast Boundaries 176
Multicast Heartbeat 177
IP-in-IP Tunnels 177
Monitoring and Troubleshooting Multicast Routing 178
Routing to the Internet 178
Internet Connection Sharing 178
Network Address Translation 180
Practice Questions 183
Need to Know More? 192
Chapter 8
Protocol Security and IPSec 193
Common Types of Network Attacks 194
Eavesdropping 194
Data Modification 194
Identity Spoofing (IP Address Spoofing) 195
Denial-of-Service Attack 195
Man-in-the-Middle Attack 195
Compromised-Key Attack 195
Attack Protection 196
How IPSec Works 196
IPSec Protocols 198
Internet Security Association and Key
Management Protocol 198
Oakley 201
Authentication Header 201
Encapsulating Security Payload 202
Certificate Handling 203
Pre-Shared Key Authentication 204
Public-Key Cryptography 204
Hash Functions 204
DES 205
Key Management 206
IPSec Modes 207
Transport Mode 207
Tunnel Mode 208
IP Packet Filtering 209
Filters and Rules 210
Troubleshooting IPSec 211
Normally Successful Communications Fail 211
Other Causes of Failure 212
IPSec Policy Mismatch Error 212
"Bad SPI" Messages in Event Viewer 213
Tools and Settings 213
Practice Questions 217
Need to Know More? 225
Chapter 9
Certificate Services 227
Concepts of Cryptography 228
Digital Signatures 229
Entity Authentication 229
Secret Key Agreement via Public Key 230
Bulk Data Encryption without Prior Shared Secrets 230
Certificates 231
Trust and Validation 231
Windows 2000 PKI Components 232
Certificate Authorities 233
Certificate Service Considerations 233
Trust and Domain Clients 234
Certificate Revocation 235
PK Security Policy in Windows 2000 235
Using PKI 237
Related Services 238
Types of Certificate Authorities 241
Enterprise Root CA 241
Enterprise Subordinate CA 241
Standalone Root CA 242
Standalone Subordinate CA 242
Installation Notes 242
Practice Questions 244
Need to Know More? 250
Chapter 10
Sample Test 251
Chapter 11
Answer Key 279
Glossary 295
Index 301
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Coriolis |
Auteur(s) | Richard Taylor, Derek Melber, Hank Carbeck |
Parution | 15/09/2000 |
Nb. de pages | 310 |
Format | 15 x 23 |
Couverture | Broché |
Poids | 497g |
Intérieur | Noir et Blanc |
EAN13 | 9781576107119 |
ISBN13 | 978-1-57610-711-9 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse