Because this book is self-paced, you can skip some lessons and revisit them later. But note that you must complete the procedures in Chapter 1, "Installing Windows 2000 Professional," before you can perform procedures in the other chapters. Use the following table to find the best starting point for you:
If you | Follow this learning Path |
---|---|
Are preparing to take the Microsoft Certified Professional exam 70-240, MicrosoftWindows 2000 Accelerated Exam for MCPs Certified on Microsoft Windows NT 4. | Read the "Getting Started" and "Introduction" sections. Then work through Chapter 1. Work through the remaining chapters in any order, though you should complete Chapter 8 before working on chapters 9 27. |
Are reviewing information aboutspecific topics from the exam | Use the "Where to Find Specific Skills in This Book" section that follows this table |
The following tables provide a list of the skills measured on certification exam 70-240: Microsoft Windows 2000 Accelerated Exam for MCPs Certified on Microsoft Windows NT 4.0 The table provides the skill, and where in this book you will find the lesson relating to that skill.
NOTE
Exam skills are subject to change without prior notice and at the sole discretion of Microsoft.
Skill Being Measured | Location In Book |
---|---|
Perform an attended installation of Windows 2000 Professional | Chapter 1, Lessons 1 and 2 |
Perform an unattended installation of Windows 2000 Professional | Chapter 1, Lessons 4, 5, and 6 |
Install Windows 2000 Professional by using Windows 2000 Server Remote Installation Services (RIS) | Chapter 1, Lesson 6 |
Install Windows 2000 Professional by using the System Preparation Tool | Chapter 1, Lesson 5 |
Create unattended answer files by using Setup Manager to automate the installation of Windows 2000 Professional | Chapter 1, Lesson 4 |
Upgrade from a previous version of Windows to Windows 2000 Professional | Chapter 1, Lesson 7 |
Apply update packs to installed software applications | Chapter 1, Lesson 7 |
Prepare a computer to meet upgrade requirements | Chapter 1, Lessons 7 and 8 |
Deploy service packs | Chapter 1, Lesson 8 |
Troubleshoot failed installations | Chapter 1, Lesson 3 |
Skill Being Measured | Location In Book |
---|---|
Monitor, manage, and troubleshoot access to files and folders | Chapter 3, Lessons 1, 2, 3, 4, and 5 |
Configure, manage, and troubleshoot file compression | Chapter 3, Lesson 4 |
Control access to files and folders by using permissions | Chapter 3, Lessons 1 and 2 |
Optimize access to files and folders. | Chapter 3, Lesson 5 |
Manage and troubleshoot access to shared folders | Chapter 3, Lessons 3 and 5 |
Create and remove shared folders. | Chapter 3, Lesson 5 |
Control access to shared folders by using permissions | Chapter 3, Lesson 5 |
Manage and troubleshoot Web server resources. | Chapter 3, Lesson 5 |
Connect to local and network print devices | Chapter 3, Lessons 6, 7, and 8 |
Manage printers and print jobs. | Chapter 3, Lessons 10 and 11 |
Control access to printers by using permissions. | Chapter 3, Lessons 10 and 11 |
Connect to an Internet printer. | Chapter 3, Lesson 12 |
Connect to a local print device. | Chapter 3, Lesson 6 |
Configure and manage file systems | Chapter 3 |
Convert from one file system to another file system. | Chapter 3, Lessons 1, 2, and 3 |
Configure file systems by using NTFS, FAT32 or FAT, | Chapter 3, Lesson 1 |
Skill Being Measured | Location In Book |
---|---|
Implement, manage, and troubleshoot disk devices | Chapter 2, Lessons 1, 2, 4, 7, 8, and 9 |
Install, configure, and manage DVD and CD-ROM devices | Chapter 2, Lessons 1, 2, and 11 |
Monitor and configure disks. | Chapter 2, Lessons 1 and 2 |
Monitor, configure, and troubleshoot volumes. | Chapter 2, Lesson 8 |
Monitor and configure removable media, such as tape devices | Chapter 2, Lessons 1, 2, and 11 |
Implement, manage, and troubleshoot display devices | Chapter 2, Lesson 3 |
Configure multiple-display support | Chapter 2, Lesson 3 |
Install, configure, and troubleshoot a video adapter | Chapter 2, Lesson 3 |
Implement, manage, and mobile computer hardware | Chapter 2, Lesson 10 |
Configure Advanced Power Management (APM). | Chapter 2, Lesson 10 |
Configure and manage card services | Chapter 2, Lesson 4 |
Implement, manage, and troubleshoot input and output devices | Chapter 2, Lessons 1, 2, 6, 7, and 8 |
Monitor, configure, and troubleshoot I/O devices, such as printers, scanners, multimedia devices, mouse, keyboard, and smart card reader. | Chapter 2, Lesson 4 |
Monitor, configure, and troubleshoot multimedia hardware, such as cameras. | Chapter 2, Lesson 4 |
Install, configure, and manage modems. | Chapter 2, Lessons 2, 4, and 11 |
Install, configure, and manage Infrared Data Association (IrDA) devices | Chapter 2, Lesson 4 |
Install, configure, and manage wireless devices. | Chapter 2, Lesson 4 |
Install, configure, and manage USB devices. | Chapter 2, Lesson 4 |
Skill Being Measured | Location In Book |
---|---|
Configure and manage user profiles. | Chapter 4, Lesson 1 |
Configure support for multiple languages or multiple locations | Chapter 4, Lesson 2 |
Enable multiple-language support | Chapter 4, Lesson 2 |
Configure multiple-language support for users. | Chapter 4, Lesson 2 |
Configure local settings. | Chapter 4, Lesson 2 |
Configure Windows 2000 Professional for multiple locations | Chapter 4, Lesson 2 |
Install applications by using Windows Installer packages. | Chapter 20, Lesson 2 |
Configure and troubleshoot desktop settings. | Chapter 4, Lesson 2 |
Configure and troubleshoot fax support | Chapter 2, Lesson 4 |
Configure and troubleshoot accessibility services | Chapter 4, Lesson 2 |
Skill Being Measured | Location In Book |
---|---|
Configure and troubleshoot the TCP/IP protocol. | Chapter 5, Lesson 1 |
Connect to computers by using dial-up networking | Chapter 5, Lesson 2 |
Connect to computers by using a virtual private network (VPN) connection | Chapter 5, Lesson 3 |
Create a dial-up connection to connect to a remote access server | Chapter 12, Lesson 2 |
Connect to the Internet by using dial-up networking | Chapter 5, Lessons 2 and 3 |
Configure and troubleshoot Internet Connection Sharing | Chapter 5, Lessons 2 and 3 |
Connect to shared resources on a Microsoft network. | Chapter 3, Lessons 2, 5, and 7 |
Skill Being Measured | Location In Book |
---|---|
Manage and troubleshoot driver signing | Chapter 6, Lesson 3 |
Configure, manage, and troubleshoot Task Scheduler | Chapter 6, Lesson 1 |
Manage and troubleshoot the use and synchronization of offline files | Chapter 6, Lesson 2 |
Optimize and troubleshoot performance of the Windows 2000 Professional desktop | Chapter 2, Lesson 12 |
Optimize and troubleshoot memory performance | Chapter 2, Lesson 12 |
Optimize and troubleshoot processor utilization | Chapter 2, Lesson 12 |
Optimize and troubleshoot disk performance | Chapter 2, Lessons 8 and 9 |
Optimize and troubleshoot network performance | Chapter 9, Lessons 2, 7, and 8 |
Optimize and troubleshoot application performance Windows NT 4 experience | Chapter 20, Lesson 2 |
Manage hardware profiles | Chapter 2, Lessons 5 and 6 |
Recover systems and user data | Chapter 6, Lesson 2 |
Recover systems and user data by using Windows Backup | Chapter 6, Lesson 2 |
Troubleshoot system restoration by using Safe Mode | Chapter 6, Lesson 4 |
Recover systems and user data by using the Recovery Console | Chapter 6, Lesson 5 |
Skill Being Measured | Location In Book |
---|---|
Encrypt data on a hard disk by using Encrypting File System (EFS) | Chapter 7, Lesson 4 |
Implement, configure, manage, and troubleshoot local Group Policy | Chapter 7, Lesson 1 |
Implement, configure, manage, and troubleshoot local user accounts | Chapter 4, Lessons 1, 2, 3, and 4 |
Implement, configure, manage, and troubleshoot auditing | Chapter 7, Lesson 5 |
Implement, configure, manage, and troubleshoot account settings | Chapter 4, Lesson 4 Chapter 7, Lesson 3 |
Implement, configure, manage, and troubleshoot account policy | Chapter 4, Lesson 4 |
Create and manage local users and groups. | Chapter 4, Lesson 3 Chapter 7, Lesson 1 |
Implement, configure, manage, and troubleshoot user rights. | Chapter 4, Lessons 3 and 5 Chapter 7, Lesson 3 |
Implement, configure, manage, and troubleshoot local user authentication | Chapter 7, Lesson 6 |
Configure and troubleshoot local user accounts | Chapter 4, Lesson 3 |
Configure and troubleshoot domain user accounts | Chapter 4, Lessons 4 and 5 Chapter 20, Lesson 4 |
Implement, configure, manage, and troubleshoot a security configuration | Chapter 7, Lessons 1, 3, and 6 |
Skill Being Measured | Location In Book |
---|---|
Install, configure, and troubleshoot DNS | Chapter 9, Lessons 1, 2, 3, 4, and 5 |
Install the DNS Server service | Chapter 10, Lesson 2 |
Configure a root name server | Chapter 10, Lesson 3 |
Configure zones | Chapter 10, Lesson 4 |
Configure a caching-only server | Chapter 10, Lesson 5 |
Configure a DNS client | Chapter 10, Lesson 5 |
Configure zones for dynamic updates | Chapter 10, Lesson 4 |
Test the DNS Server Service | Chapter 10, Lesson 5 |
Implement a delegated zone for DNS | Chapter 10, Lesson 4 |
Manually create DNS resource records | Chapter 10, Lesson 3 |
Manage and monitor DNS | Chapter 10, Lessons 3 and 5 |
Skill Being Measured | Location In Book |
---|---|
Install, configure, and troubleshoot DHCP | Chapter 11,Lessons 1, 2, 3, and 4 |
Install the DHCP Server service | Chapter 11, Lesson 1 |
Create and manage DHCP scopes, superscopes, and multicast scopes | Chapter 11, Lesson 2 |
Configure DHCP for DNS integration | Chapter 11, Lesson 3 |
Authorize a DHCP server in Active Directory | Chapter 11, Lesson 4 |
Manage and monitor DHCP | Chapter 11, Lesson 5 |
Skill Being Measured | Location In Book |
---|---|
Configure and troubleshoot remote access | Chapter 12, Lessons 2, 4, 5, and 6 |
Configure inbound connections | Chapter 12, Lesson 2 |
Create a remote access policy | Chapter 12, Lesson 2 |
Configure a remote access profile | Chapter 12, Lesson 2 |
Configure a VPN | Chapter 12, Lesson 4 |
Configure multilink connections | Chapter 12, Lesson 5 |
Configure Routing and Remote Access for DHCP integration | Chapter 12, Lesson 6 |
Manage and monitor remote access | Chapter 12, Lesson 7 Chapter 14, Lesson 1 |
Configure remote access security | Chapter 4, Lesson 3 Chapter 12, Lesson 2 Chapter 14, Lesson 2 |
Configure authentication protocols | Chapter 14, Lesson 2 |
Configure encryption protocols | Chapter 4, Lesson 3 Chapter 14, Lesson 2 |
Create a remote access policy | Chapter 12, Lesson 2 Chapter 14, Lesson 2 |
Skill Being Measured | Location In Book |
---|---|
Install, configure, and troubleshoot network protocols | Chapter 9, Lessons 1, 2, 3, 4, 6, and 7 |
Install and configure TCP/IP | Chapter 9, Lesson 1 |
Install the NWLink protocol | Chapter 9, Lesson 2 |
Configure network bindings | Chapter 9, Lesson 2 |
Configure TCP/IP packet filters | Chapter 9, Lesson 1 |
Configure and troubleshoot network protocol security | Chapter 9, Lessons 6 and 7 |
Manage and monitor network traffic | Chapter 9, Lesson 7 |
Configure and troubleshoot IPSec | Chapter 9, Lessons 3, 4, 5, and 6 |
Enable IPSec | Chapter 9, Lesson 3 |
Configure IPSec for transport mode | Chapter 9, Lesson 4 |
Configure IPSec for tunnel mode | Chapter 9, Lesson 3 |
Customize IPSec policies and rules | Chapter 9, Lesson 5 |
Manage and monitor IPSec | Chapter 9, Lessons 6 and 7 |
Skill Being Measured | Location In Book |
---|---|
Install, configure, and troubleshoot WINS | Chapter 13, Lessons 1, 2, 3, and 4 |
Configure WINS replication | Chapter 13, Lesson 4 |
Configure NetBIOS name resolution | Chapter 13, Lesson 1 Chapter 13, Lesson 2 |
Manage and monitor WINS | Chapter 13, Lesson 3 Chapter 13, Lesson 4 |
Skill Being Measured | Location In Book |
---|---|
Install, configure, and troubleshoot IP routing protocols | Chapter 9, Lesson 1 Chapter 12, Lessons 2 and 3 |
Update a Windows 2000-based routing table by means of static routes | Chapter 9, Lesson 1 Chapter 12, Lesson 3 |
Implement demand-dial routing | Chapter 12, Lesson 2 |
Manage and monitor IP routing | Chapter 9, Lesson 1 Chapter 12, Lessons 1, 5, and 6 |
Manage and monitor border routing | Chapter 9, Lesson 1 Chapter 12, Lessons 1 and 6 |
Manage and monitor internal routing | Chapter 9, Lesson 1 Chapter 12, Lesson 5 |
Manage and monitor IP routing protocols | Chapter 9, Lesson 1 Chapter 12, Lessons 1 and 6 |
Skill Being Measured | Location In Book |
---|---|
Install Internet Connection Sharing | Chapter 14, Lesson 2 |
Install NAT | Chapter 14, Lessons 2 and 3 |
Configure NAT properties | Chapter 14, Lesson 3 |
Configure NAT interfaces | Chapter 14, Lesson 3 |
Skill Being Measured | Location In Book |
---|---|
Install and configure Certificate Authority (CA) | Chapter 15, Lesson 2 |
Create certificates | Chapter 15, Lesson 2 |
Issue certificates | Chapter 15, Lesson 2 |
Revoke certificates | Chapter 15, Lesson 3 |
Remove the Encrypting File System (EFS) recovery keys | Chapter 15, Lesson 3 |
Skill Being Measured | Location In Book |
---|---|
Install Active Directory | Chapter 17, Lesson 1 |
Create sites | Chapter 17, Lesson 4 |
Create subnets | Chapter 17, Lesson 4 |
Create site links | Chapter 17, Lesson 4 |
Create site link bridges | Chapter 17, Lesson 5 |
Create connection objects | Chapter 17, Lesson 5 |
Create global catalog servers | Chapter 17, Lesson 6 |
Move server objects between sites | Chapter 17, Lesson 6 |
Transfer Operations Master roles | Chapter 17, Lesson 2 |
Verify Active Directory installation | Chapter 17, Lesson 1 |
Implement an OU structure | Chapter 17, Lesson 3 |
Back Up and Restore Active Directory | |
Perform an authoritative restore of Active Directory | Chapter 11, Lesson 6 |
Recover from a system failure | Chapter 11, Lesson 7 |
Skill Being Measured | Location in Book |
---|---|
Install, Configure, and Troubleshoot DNS for Active Directory | |
Integrate an Active Directory DNS with a non-ActiveDirectory DNS | Chapter 18, Lessons 1 and 2 |
Configure zones for dynamic updates | Chapter 10, Lesson 4 |
Manage, Monitor, and Troubleshoot DNS | |
Manage replication of DNS data | Chapter 18, Lesson 2 |
Skill Being Measured | Location In Book |
---|---|
Implement and Troubleshoot Group Policy | |
Create a group policy object (GPO) | Chapter 20, Lessons 1 and 4 |
Link an existing GPO | Chapter 20, Lesson 1 |
Delegate administrative control of group policy | Chapter 20, Lesson 1 |
Modify group policy inheritance | Chapter 20, Lesson 1 |
Filter group policy settings by associating security groups to GPOs | Chapter 20, Lessons 1 and 4 |
Modify group policy | Chapter 20, Lessons 1 and 4 |
Manage and Troubleshoot User Environments by Using Group Policy | |
Control user environments by using Administrative Templates | Chapter 20, Lessons 1 and 4 |
Assign script policies to users and computers | Chapter 20, Lessons 1 and 4 |
Manage and Troubleshoot Software by Using Group Policy | |
Deploy software by using group policy | Chapter 20, Lesson 2 |
Maintain software by using group policy | Chapter 20, Lesson 2 |
Configure deployment options | Chapter 20, Lesson 2 |
Troubleshoot common problems that occur during software deployment | Chapter 20, Lesson 4 |
Manage Network Configuration by Using Group Policy | Chapter 20, Lesson 3 |
Deploy Windows 2000 by Using RIS | |
Install an image on an RIS client computer | Chapter 20, Lesson 6 |
Create an RIS boot disk | Chapter 1, Lesson 6 Chapter 20, Lesson 6 |
Configure remote installation options | Chapter 1, Lesson 6 Chapter 20, Lesson 6 |
Troubleshoot RIS problems | Chapter 20, Lesson 8 |
Manage images for performing remote installations | Chapter 20, Lesson 7 |
Configure RIS Security | |
Grant computer account creation rights | Chapter 20, Lesson 7 |
Prestage RIS client computers for added security and load balancing | Chapter 20, Lesson 7 |
Authorize an RIS server | Chapter 20, Lesson 7 |
Skill Being Measured | Location in Book |
---|---|
Manage Active Directory Objects | |
Move Active Directory objects | Chapter 19, Lesson 4 |
Publish resources in Active Directory | Chapter 19, Lesson 3 |
Locate objects in Active Directory | Chapter 19, Lesson 1 |
Create and manage accounts manually or by scripting | Chapter 1, Lessons 4 and 5 Chapter 8, Lessons 4 and 5 |
Control access to Active Directory objects | Chapter 19, Lesson 2 |
Delegate administrative control of objects in Active Directory | Chapter 19, Lesson 5 |
Manage Active Directory Performance | |
Monitor, maintain, and troubleshoot domain controller performance | Chapter 19, Lessons 6, 7, and 8 |
Monitor, maintain, and troubleshoot Active Directory components | Chapter 19, Lessons 6, 7, and 8 |
Manage and Troubleshoot Active Directory Replication | |
Manage inter-site replication | Chapter 17, Lessons 5 and 6 |
Manage intra-site replication | Chapter 17, Lesson 6 |
Skill Being Measured | Location in Book |
---|---|
Configure and Troubleshoot Security in a Directory Services Infrastructure | |
Apply security policies by using group policy | Chapter 21, Lessons 1, 3, 4, and 7 |
Create, analyze, and modify security configurations by using Security Configuration and Analysis and Security Templates | Chapter 21, Lessons 5, 6, and 7 |
Implement an audit policy | Chapter 7, Lesson 5 Chapter 21, Lessons 2 and 7 |
Monitor and Analyze Security Events | Chapter 21, Lesson 3 |
Skills Being Measured | Location in Book |
---|---|
Perform an attended installation of Windows 2000 Server. | Chapter 8, Lessons 1 and 2 |
Perform an unattended installation of Windows 2000 Server | Chapter 8, Lesson 4 |
Create unattended answer files by using Setup Manager to automate the installation of Windows 2000 Server. | Chapter 8, Lesson 4 |
Create and configure automated methods for installation of Windows 2000. | Chapter 8, Lessons 4 and 5 |
Upgrade a server from Microsoft Windows NT 4.0. | Chapter 8, Lesson 2 |
Deploy service packs. | Chapter 1 |
Troubleshoot failed installations. | Chapter 8, Lesson 3 |
Skills Being Measured | Location in Book |
---|---|
Install and configure network services for interoperability. | Chapter 9, Lessons 2, 3, and 4 Chapter 11, Lessons 1 and 2 |
Monitor, configure, troubleshoot, and control access to printers. | Chapter 3, Lessons 8, 9, and 10 |
Monitor, configure, troubleshoot, and control access to files, folders, and shared folders. | Chapter 3, Lessons 2, 3, and 5 |
Configure, manage, and troubleshoot a stand-alone Distributed file system (Dfs). | Chapter 4, Lesson 1 |
Configure, manage, and troubleshoot a domain-based Distributed file system (Dfs). | Chapter 2, Lesson 1 Chapter 4, Lesson 1 |
Monitor, configure, troubleshoot, and control local security on files and folders. | Chapter 8, Lessons 1—23 |
Monitor, configure, troubleshoot, and control access to files and folders in a shared folder. | Chapter 3, Lessons 2, 3, and 5 |
Monitor, configure, troubleshoot, and control access to files and folders via Web services. | Chapter 23, Lesson 2 |
Monitor, configure, troubleshoot, and control access to Web sites | Chapter 23, Lessons 1, 2, and 3 |
Skills Being Measured | Location in Book |
---|---|
Configure hardware devices. | Chapter 2, Lessons 1, 2, 3, 4, and 5 |
Configure driver signing options. | Chapter 2, Lesson 11 Chapter 6, Lesson 4 |
Update device drivers. | Chapter 1, Lesson 8 Chapter 2, Lessons 1 and 2 |
Troubleshoot problems with hardware. | Chapter 2, Lesson 4 |
Skills Being Measured | Location in Book |
---|---|
Monitor and optimize usage of system resources. | Chapter 2, Lesson 2 |
Manage processes. | Chapter 2, Lesson 2 |
Optimize disk performance. | Chapter 2, Lessons 7, 8, and 9 |
Manage and optimize availability of system state data and user data. | Chapter 2, Lessons 2, 11, and 12 |
Recover systems and user data. | Chapter 6, Lessons 2, 5, and 6 Chapter 25, Lesson 2 |
Recover systems and user data by using Windows Backup | Chapter 6, Lesson 2 Chapter 25, Lesson 2 |
Troubleshoot system restoration by using Safe Mode | Chapter 6, Lesson 5 Chapter 25, Lesson 2 |
Recover systems and user data by using the Recovery Console. | Chapter 6, Lesson 6 Chapter 25, Lesson 2 |
Skills Being Measured | Location in Book |
---|---|
Configure and manage user profiles. | Chapter 4, Lessons 1, 2, 3, and 4 |
Monitor, configure, and troubleshoot disks and volumes. | Chapter 2, Lessons 7, 8, and 9 |
Configure data compression. | Chapter 3, Lesson 4 |
Monitor and configure disk quotas. | Chapter 2, Lesson 9 |
Recover from disk failures. | Chapter 2, Lesson 8 Chapter 25, Lessons 1 and 2 |
Skills Being Measured | Location in Book |
---|---|
Install, configure, and troubleshoot shared access. | Chapter 5, Lessons 1, 2, and 3 |
Install, configure, and troubleshoot a virtual private | Chapter 12, Lesson 3 |
Install, configure, and troubleshoot network protocols. | Chapter 9, Lessons 2, 3, and 4 |
Install and configure network services. | Chapter 5, Lesson 1 Chapter 26, Lesson 1 |
Configure, monitor, and troubleshoot remote access. | Chapter 12, Lessons 1—9 |
Configure inbound connections. | Chapter 5, Lessons 2 and 8 |
Create a remote access policy. | Chapter 12, Lessons 2 and 8 |
Configure a remote access profile. | Chapter 12, Lesson 2 |
Install, configure, monitor, and troubleshoot Terminal Services. | Chapter 22 |
Remotely administer servers by using Terminal Services. | Chapter 22, Lessons 3 and 4 |
Configure Terminal Services for application sharing. | Chapter 22, Lessons 2, 3, and 4 |
Configure applications for use with Terminal Services. | Chapter 22, Lessons 2, 3, and 4 |
Configure the properties of a connection. | Chapter 5, Lessons 2 and 3 Chapter 23, Lesson 1 |
Install, configure, and troubleshoot network adapters | Chapter 1, Lesson 1 Chapter 2, Lessons 1 and 2 |
Skill Being Measured | Location In Book |
---|---|
Encrypt data on a hard disk by using Encrypting File System (EFS) | Chapter 27, Lesson 2 |
Implement, configure, manage, and troubleshoot policies in a Windows 2000 environment | Chapter 20, Lesson 6 Chapter 27, Lessons 4 and 5 |
Implement, configure, manage, and troubleshoot Local Policy in a Windows 2000 environment | Chapter 7, Lesson 3 Chapter 20, Lesson 1, 2, 3, and 4 Chapter 27, Lesson 5 |
Implement, configure, manage, and troubleshoot System Policy in a Windows 2000 environment | Chapter 27, Lesson 5 |
Implement, configure, manage, and troubleshoot auditing. | Chapter 7, Lesson 8 Chapter 27, Lesson 5 |
Implement, configure, manage, and troubleshoot local accounts. | Chapter 7, Lessons 1, 2, and 3 |
Implement, configure, manage, and troubleshoot Account Policy | Chapter 7, Lesson 3 |
Implement, configure, manage, and troubleshoot security by using the Security Configuration Tool Set. | Chapter 27, Lesson 4 |