Section 7.1. Areas of Study for Exam 70-293


7.1. Areas of Study for Exam 70-293

7.1.1. Planning and Implementing Server Roles and Server Security

  • Configure security for servers that are assigned specific roles.X

  • Plan a secure baseline installation.

    Plan a strategy to enforce system default security settings on new systems.

    Identify client operating system default security settings.

    Identify all server operating system default security settings.

  • Plan security for servers that are assigned specific roles.X

    Deploy the security configuration for servers that are assigned specific roles.X

    Create custom security templates based on server roles.X

  • Evaluate and select the operating system to install on computers in an enterprise.

    Identify the minimum configuration to satisfy security requirements.

See "Planning and Implementing Server Roles and Server Security" on page 352.

7.1.2. Planning, Implementing, and Maintaining a Network Infrastructure

  • Plan a TCP/IP network infrastructure strategy.

    Analyze IP addressing requirements.

    Plan an IP routing solution.

    Create an IP subnet scheme.

  • Plan and modify a network topology.

    Plan the physical placement of network resources.

    Identify network protocols to be used.

  • Plan an Internet connectivity strategy.

  • Plan network traffic monitoring.

  • Troubleshoot connectivity to the Internet.

    Diagnose and resolve issues related to Network Address Translation (NAT).

    Diagnose and resolve issues related to name resolution cache information.

    Diagnose and resolve issues related to client configuration.

  • Troubleshoot TCP/IP addressing.

    Diagnose and resolve issues related to client computer configuration.

    Diagnose and resolve issues related to DHCP server address assignment.

  • Plan a hostname resolution strategy.X

    Plan a DNS namespace design.X

    Plan zone replication requirements.X

    Plan a forwarding configuration.X

    Plan for DNS security.X

    Examine the interoperability of DNS with third-party DNS solutions.X

  • Plan a NetBIOS name resolution strategy.

    Plan a WINS replication strategy.

    Plan NetBIOS name resolution by using the Lmhosts file.

  • Troubleshoot hostname resolution.

    Diagnose and resolve issues related to DNS services.

    Diagnose and resolve issues related to client computer configuration.

See "Planning, Implementing, and Maintaining a Network Infrastructure" on page 374.

7.1.3. Planning, Implementing, and Maintaining Routing and Remote Access

  • Plan a routing strategy.

    Identify routing protocols to use in a specified environment.

    Plan routing for IP multicast traffic.

  • Plan security for remote access users.

    Plan remote access policies.

    Analyze protocol security requirements.

    Plan authentication methods for remote access clients.

  • Implement secure access between private networks.

    Create and implement an IPSec policy.

  • Troubleshoot TCP/IP routing.

See "Planning, Implementing, and Maintaining Routing and Remote Access" on page 411.

7.1.4. Planning, Implementing, and Maintaining Server Availability

  • Plan services for high availability.X

    Plan a high-availability solution that uses clustering services.X

    Plan a high-availability solution that uses Network Load Balancing.X

  • Identify system bottlenecks, including memory, processor, disk, and network-related bottlenecks.

    Identify system bottlenecks by using System Monitor.

  • Implement a cluster server.

    Recover from cluster node failure.

  • Manage Network Load Balancing.

  • Plan a backup and recovery strategy.X

    Identify appropriate backup types. Methods include full, incremental, and differential.X

    Plan a backup strategy that uses volume shadow copy.X

    Plan system recovery that uses Automated System Recovery (ASR). X

See "Planning, Implementing, and Maintaining Server Availability" on page 425.

7.1.5. Planning and Maintaining Network Security

  • Configure network protocol security.

    Configure protocol security in a heterogeneous client computer environment.

    Configure protocol security by using IPSec policies.

  • Configure security for data transmission.

    Configure IPSec policy settings.

  • Plan for network protocol security.

    Specify the required ports and protocols for specified services.

    Plan an IPSec policy for secure network communications.

  • Plan secure network administration methods.X

    Create a plan to offer Remote Assistance to client computers.X

    Plan for remote administration by using Terminal Services.X

  • Plan security for wireless networks.X

  • Plan security for data transmission.X

    Secure data transmission between client computers to meet security requirements.X

    Secure data transmission by using IPSec.X

  • Troubleshoot security for data transmission.

See "Planning, Implementing, and Maintaining Network Security and Infrastructure" on page 435.

7.1.6. Planning, Implementing, and Maintaining Security Infrastructure

  • Configure Active Directory directory service for certificate publication.X

  • Plan a public key infrastructure (PKI) that uses Certificate Services.X

    Identify the appropriate type of certificate authority to support certificate issuance requirements.X

    Plan the enrollment and distribution of certificates.X

    Plan for the use of smart cards for authentication.X

  • Plan a framework for planning and implementing security.X

    Plan for security monitoring.X

    Plan a change and configuration management framework for security.X

  • Plan a security update infrastructure.X

See "Planning, Implementing, and Maintaining Network Security and Infrastructure" on page 435.




MCSE Core Required Exams in a Nutshell
MCSE Core Required Exams in a Nutshell: The required 70: 290, 291, 293 and 294 Exams (In a Nutshell (OReilly))
ISBN: 0596102283
EAN: 2147483647
Year: 2006
Pages: 95

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net