Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] name resolution 2nd 3rd 4th broadcast name resolution, remote access clients DNS (Domain Name System) 2nd queries and server configuration DNS Server service configuring options 2nd delegation and stub zones DNS forwarding installing resource records zone options, managing managing DNS clients dynamic DNS updates primary and alternate DNS suffixes resolver cache monitoring DNS NetBIOS 2nd planning strategy for networks DNS NetBIOS troubleshooting hostname resolution understanding name resolution WINS problems with, causing Internet connectivity problems name server (NS) records 2nd 3rd configuring for a zone name servers configuring for a zone 2nd forwarders primary and alternate, for DNS domains names Active Directory objects changing server name users, computers, and groups 2nd NAT (Network Address Translation) 2nd 3rd 4th 5th 6th Basic Firewall 2nd configuring NAT/Basic Firewall routing protocol enabling and configuring packet filtering installing NAT/Basic Firewall routing protocol configuring NAT and Basic Firewall problems with Internet connectivity securing internal network from the Internet using public IP addresses with NAT/Basic Firewall routing protocol installing NBMA (nonbroadcast multiple access) neighbors 2nd .NET Passport authentication (IIS) net stop dhcpserver command NetBIOS name resolution planning strategy 2nd using LMHOSTS file used by remote access clients NetBIOS names 2nd Netdiag diagnosing Kerberos problems running netdiag utility testing computer TCP/IP configuration NETDOM (netdom.exe) joining computers to domains 2nd resetting computer account password 2nd NETDOM RESETPWD command netsh ipsec static show all command netstat -ano command network adapters editing TCP/IP properties GUID Internet Protocol (TCP/IP) properties correcting incorrect IP addressing MAC address 2nd wireless standards network class ranges, IP addresses network connections adding and configuring interfaces for APIPA problems with Task Manager summary of network connectivity, shared folder access and network identity network IDs 2nd Class A network IP addresses Class B network IP addresses Class C network IP address classful and classless networks IP subnets network infrastructure 2nd 3rd 4th Exam 70-291 topics 2nd Exam 70-293 topics Internet connectivity strategy 2nd troubleshooting maintaining monitoring network traffic maintaining, summary of highlights monitoring network traffic name resolution strategy DNS NetBIOS 2nd troubleshooting hostname resolution understanding name resolution WINS planning and modifying network topology 2nd identifying network protocols to use physical placement of resources understanding network infrastructure planning TCP/IP infrastructure 2nd IP addressing requirements IP routing solution 2nd IP subnet scheme 2nd troubleshooting server services service dependency issues service recovery options, using troubleshooting TCP/IP addressing 2nd network interface cards (NICs), transmission of data packets between network interfaces for dial-up connections for VPN and PPPoE connections network layer protocol (IP) network load balancing (NLB) 2nd 3rd high-availability solution that uses implementing Network Monitor 2nd displaying captured data network performance objects, monitoring 2nd 3rd 4th network protocols identifying for use security 2nd network resources, access to 2nd 3rd file and folder attributes filesystem permissions shared folders 2nd troubleshooting file and folder access troubleshooting Terminal Services network security 2nd 3rd 4th 5th 6th 7th digital certificates disaster recovery Exam 70-293 2nd network protocol security 2nd IP Security (IPSec) 2nd IPSec policy for 2nd 3rd Kerberos 2nd port and protocol security 2nd practice exercise packet filtering RRAS TCP/IP filtering performance monitoring PKI (Public Key Infrastructure) planning and configuring using Certificate Services planning security for VPN Remote Desktop for Administration restoring data from shadow copy volumes secure administration procedures 2nd accessing security tools applying security templates and analyzing security creating security templates principle of least privilege 2nd recovering from improper application of a template security templates 2nd smart cards, planning for software update infrastructure troubleshooting data transmission security 2nd 3rd Windows Firewall wireless networks 2nd 3rd network settings checking for a computer incorrect, troubleshooting for computer account 2nd Network Statistics and Captured Statistics network traffic, monitoring New Object - Computer wizard New Scope Wizard no-refresh interval (timestamp on resource record) nodes active and passive 2nd tracking status with state flags non-Plug-and-Play (non-PnP) devices nonauthoritative DNS servers nonauthoritative restore (Active Directory) 2nd 3rd 4th performing nonbroadcast multiple access (NBMA) neighbors 2nd nondedicated root nonpaged kernel memory Nonsecure and secure option (DNS updates) normal backups Active Directory normal scopes (DHCP) 2nd creating and activating NS (name server) records 2nd configuring for a zone NSLOOKUP.EXE NTDS performance object Ntdsutil.exe, creating application partition NTFS filesystem disk quotas file and folder attributes formatting volumes as 2nd 3rd using FORMAT command mirrored volumes formatted as permissions 2nd 3rd 4th default problems with access share permissions vs. RAID-5 volumes formatted as striped volumes formatted as supported features volumes formatted as clusters NTLM authentication 2nd security template settings for NTLM trusts password changes Ntuser.dat file |