Features of This Book

Each chapter opens with a "Before You Begin" section, which prepares you for completing the chapter. Then the text presents a scenario involving fictitious companies, which is used to illustrate the design decisions you will face when designing Windows 2000 security.

The chapters are then divided into lessons. Most of the chapters contain activities and labs that give you an opportunity to use and explore the design skills presented.

The "Review" section at the end of the chapter allows you to test what you have learned in the chapter's lessons.

The appendix, "Answers," contains all of the answers to the questions asked in each chapter.


Several types of Notes appear throughout the lessons.

  • Notes marked Tip contain explanations of possible results or alternative methods.
  • Notes marked Important contain information that is essential to completing a task.
  • Notes marked Note contain supplemental information.
  • Notes marked Caution contain warnings about possible loss of data.


The following conventions are used throughout this book:

Notational Conventions

  • Characters or commands that you type appear in bold type.
  • Italic in syntax statements indicates placeholders for variable information. Italic is also used for book titles.
  • Names of files and folders appear in Title Caps, except when you are to type them directly. Unless otherwise indicated, you can use all lowercase letters when you type a file name in a dialog box or at a command prompt.
  • File name extensions appear in all lowercase.
  • Acronyms appear in all uppercase.
  • Monospace type represents code samples, examples of screen text, or entries that you might type at a command prompt or in initialization files.
  • Icons represent specific sections in the book as follows:

    Icon Represents

    Supplemental course materials. This material includes Windows 2000 white papers and Knowledge Base articles. You will find these files on the book's Supplemental Course Materials CD-ROM.

    An activity or lab. You should perform the activity or lab to give yourself an opportunity to use the design skills being presented in the lesson. You will find the answers to the activity and lab exercise questions in the appendix, "Answers."

    Chapter review questions. These questions at the end of each chapter allow you to test what you have learned in the lessons. You will find the answers to the review questions in the appendix, "Answers."

Fictitious Name Conventions

The content of this training kit requires the use of fictitious company and domain names in fictitious scenarios. This training kit makes every effort to avoid using domain names that represent live Web sites. To accomplish this, each domain name illustrated in the book for fictitious companies uses the nonexistent top-level domain .tld, rather than the standards of .com or .net. In reality, domain names should represent an organization's identity.

Microsoft Corporation - MCSE Training Kit (Exam 70-220. Designing Microsoft Windows 2000 Network Security)
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
ISBN: 0735611343
EAN: 2147483647
Year: 2001
Pages: 172

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net