[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] Safe Mode failure options startup boot process issues troubleshooting 2nd sample tests answer keys 2nd 3rd 4th 5th sc (command-line tool) Scavenge Stale Resourec Records (DNS console) scheduled tasks managing scheduling backups Schema Admins group schtasks (command-line tool) scope groups scores practice exams practice tests test preparation and scripting command-line tools 2nd 3rd 4th information Web site scripts GPO troubleshooting IIS command line administration search strategies Web sites and 2nd secedit command auding security settings secedit commands secedit.exe secondary DNS server secure dynamic updates (AD-integrated DNS servers) 2nd secure.inf (security template) Securedc.inf (security policy template) Securews.inf (security policy template) security AD domains secure dynamic updates auditing changing settings common audit events domain account policies order of precedence Security Templates backup/restore advanced restore options 2nd 3rd default restrictions NTFS file permissions overview best practices 2nd DHCP servers DNS issues DNS zone transfers 2nd 3rd group membership IIS configuring authentication 2nd 3rd improvements to 2nd net shares premissions created by policies tools for configuring 2nd policy command-line management 2nd 3rd policy templates MMC snap-ins for 2nd 3rd preconfigured policy templates Principle of Least Privilege 2nd shared folders permissions 2nd 3rd Terminal Services 2nd user accounts Security Configuration and Analysis MMC snap-in components configuring security 2nd installing 2nd policy templates 2nd 3rd principles of operation security templates analyzing 2nd 3rd 4th 5th Security Configuration and Analysis snap-in domains changing security audit settings security groups security policy database editing settings reverting to previous settings security principals Computer object managing 2nd InetOrgPerson moving RSoP reviewing data for User object creating 2nd 3rd 4th 5th 6th 7th 8th deleting 2nd 3rd enabling/disabling locating 2nd 3rd 4th 5th modifying 2nd overview 2nd 3rd 4th resetting passwords unlocking 2nd Security Settings Extentions to Group Policy Security tab (DNS zone properties) security templates analyzing 2nd 3rd 4th 5th applying 2nd Security Templates auditing security changing settings common audit events domain account policies order of precedence security templates built-in creating default Security Templates implementing 2nd 3rd security templates settings adding Security Templates MMC snap-in 2nd 3rd Security Templates tool 2nd installing 2nd Select Computer dialog box (MMC) accessing select-and-place questions 2nd Self special identity group self-assement Server Management Wizard folder shares creating 2nd Server Operators group server-side Shadow Copies of Shared Folders configuring servers IIS management application pooling, implementing 2nd 3rd command line administration 2nd configuring authentication 2nd 3rd installing 2nd installing ASP.NET and Web Server Extensions 2nd metabase configuration file, managing 2nd monitoring overview 2nd remote 2nd 3rd Web applications 2nd 3rd 4th remote management desktop shortcuts for runas command 2nd 3rd MMC snap-ins 2nd 3rd overview 2nd Remote Desktop Connection snap-in 2nd 3rd 4th 5th 6th Service special identity group services reviewing/configuring Set Aging/Scavenging for All Zones (DNS console) Setup security.inf (security policy template) setup security.inf (security template) setx (command-line tool) Shadow Copies of Shared Folders feature 2nd shadow copy volumes restoring data with 2nd 3rd 4th 5th 6th 7th 8th best practices share-level permissions 2nd shared folders Shadow Copies of Shared Folders feature 2nd shares folder creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th overview new features offline settings 2nd permissions multiple for same resource net share command NTFS 2nd 3rd 4th 5th planning final 2nd share-level 2nd short-form exams strategies 2nd 3rd short-form tests shortcuts (desktop) runas command 2nd 3rd shutdown (command-line tool) SMS (Systems Management Server) updating software software SUS (Software Update Service) 2nd configuring clients 2nd 3rd 4th 5th features 2nd installing 2nd 3rd system requirements software update management SUS backup/restore 2nd 3rd common tasks 2nd 3rd configuring Client Automatic Updates 2nd 3rd configuring clients 2nd 3rd 4th installing/configuring 2nd 3rd overview 2nd 3rd testing content Software Update Service. [See SUS]2nd [See SUS] Software Update Services Server special identity groups 2nd 3rd Special Permissions (NTFS permission) Start of Authority (SOA) tab (DNS zone properties) startup boot process ASR (Automatic System Recovery) Device Manager 2nd Event Viewer 2nd Last Known Good Configuration 2nd Recovery Console 2nd Repair feature 2nd Safe Mode 2nd System Information utility 2nd troubleshooting 2nd status icons (security templates) stub zones (DNS) compared to conditional forwarding configuring 2nd 3rd 4th Support account SUS (Software Update Service) 2nd clients configuring 2nd 3rd 4th 5th features 2nd installing 2nd 3rd system requirements update infrastructure management backup/restore 2nd 3rd common tasks 2nd 3rd configuring Client Automatic Updates 2nd 3rd configuring clients 2nd 3rd 4th installing/configuring 2nd 3rd overview 2nd 3rd testing content synchronization networks update infrastrusture management syntax csvde.exe dsadd.exe dsget.exe dsmod.exe dsquery .exe dsrm.exe gpupdate.exe ldifde .exe net share command System Information utility startup boot process issues troubleshooting 2nd system requirements PrepLogic Practice Exams SUS (Software Update Service) 2nd System special identity group System State backing up importance of performing 2nd systeminfo (command-line tool) |