S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Safe Mode, starting computer in 2nd
SAM (Security Accounts Manager) database
     user account information
scavenging (DNS resource records)
     configuring
     configuring options
     manually scavenging a zone
Schema Admins group
schema container 2nd
     domain controllers in a forest
schema master role 2nd
     placement of
     viewing and transferring
schema partition
scopes
     DHCP 2nd
         creating and configuring 2nd 3rd
         initial scope on server
         managing options
         troubleshooting option settings
     groups
         changing 2nd 3rd
         domain functional level and 2nd
secedit utility, creating rollback template
secondary DNS servers 2nd 3rd
secondary zone files
secondary zones 2nd
     storage in Active Directory
Secure only option (DNS updates)
Secure Server (Require Security) policy
Secure Sockets Layer (SSL)
security
     accessing security tools
     backup operations 2nd
     DNS 2nd
         dynamic record updates by DHCP
         preventing attacks
         zones
     enterprise-wide policies
     IIS (Internet Information Services) 2nd
     network 2nd 3rd
         Exam 70-293
     remote access 2nd 3rd 4th 5th
         user authentication
         users
     RIP version 2
    servers
         for servers assigned specific roles
         practice exercises
         secure baseline installation
     Terminal Services, diagnosing issues related to
Security Accounts Manager (SAM) database
     user account information
Security Configuration And Analysis
     accesing and working with standard templates
     applying rollback template
     applying security template
     applying templates and analyzing security 2nd
     comparing current computer security settings to particular security template
     custom security template based on server role
     database storing security template settings
Security Configuration Wizard
security groups 2nd
     creating
     planning
security infrastructure 2nd
Security log 2nd
security options policy
security templates 2nd 3rd
     applying 2nd
     comparing current computer settings to a particular template
     configuring computer security settings
     creating 2nd
         rollback template
     principle of least privilege
     recovering from improper application of
Security Templates snap-in
     accessing and working with standard templates
     creating custom security template based on server role
     creating security templates
select and place questions
     Exam 70-291
Server (Request Security) policy
server availability 2nd 3rd 4th
     availability goals 2nd
         high-availability goals
     identifying system bottlenecks
     meeting moderate and high-availability goals
     network traffic monitoring
    planning high-availability services
         using clustering services
         using NLB
     planning services for high availability 2nd
         backup and recovery 2nd
         using clustering services
         using network load balancing (NLB)
     planning, practice exercise
server environment, managing 2nd 3rd
     events 2nd
         accessing and reviewing 2nd
         event logs 2nd
         logging options
     monitoring system performance
     performance for server environment
         choosing objects to monitor
         disk performance objects 2nd
         file and print servers 2nd
         memory performance objects 2nd
         network performance objects 2nd
         processor performance objects 2nd
     software site licensing 2nd
     software update infrastructure 2nd
     system performance
         monitoring with Performance console
         monitoring with Task Manager
     web servers
         configuring IIS
         IIS management tools
         IIS security
         installing IIS
server hardware
     installing and configuring devices
     monitoring (Windows Server 2003)
server licensing
server options (TCP/IP)
server roles and server security 2nd 3rd 4th
     enforcing system default security settings
     Group Policy
     hardening servers
     identifying operating system default security settings
     Kerberos policies, default security
     local policies
     NTFS permissions
     operating system selection
         client operating system
         for enterprise computers
         server operating system
    operating sytem selection
         client operating system
     password policies, default security
     planning and implementing roles 2nd
         adding/removing roles
         domain controller
         standalone server
         Windows Server 2003 roles, listed
     planning secure baseline installation
         operating system default security settings
         system default security settings, enforcing
     role-specific security configuration
     secure baseline installation
     security enhancements
     security for account policies
     security for computers assigned specific roles
     security for servers assigned specific roles
         configuring security
         custom server templates for server roles
         deploying security configurations
     security plans
     security policies, enterprise-wide
     security policy, developing
     security settings
     security teams
     security templates
     security, areas of
     server configurations
     server roles
server templates (custom), based on server roles
servers
     changing server name
     configuring TCP/IP addressing on
    DHCP
         migrating
         stopping unauthorized
     DNS
         Active Directory-integrated primary
         configuration options
         configuring multiple
     licensing
     performance monitoring, configuring
     support of fault-tolerant RAID
service identity
service locator (SRV) records
     alteration by clients on newtwork
service pack, applying to deployed software
services
     configuring
     dependencies
     determining dependencies
     high availability
         backup and recovery
     planning for high availability
     recovery
     startup types
     states
Services utility
     managing DHCP Server service
session settings (Remote Desktop Connection)
Shadow Copy client
Shadow Copy volumes
     configuring 2nd
     restoring data from 2nd
         practice exercise
share permissions 2nd 3rd 4th
     default security for
     levels granted to user or group
shared folders
     accesing using a network drive
     access to 2nd
     configuring access 2nd
     creating
     creating using Computer Management
     creating using Windows Explorer
     managing properties and permissions
     web shares
Shared key authentication
Shiva Password Authentication Protocol (SPAP) 2nd 3rd
shortcut trusts 2nd
Shortest Path First (SPF) algorithm
SIDs (security identifiers)
     user accounts
signed device drivers
signed drivers
simple volume (dynamic disk)
single quorum device server clusters 2nd
single-node clustering 2nd
site links 2nd
     configuring site link bridges 2nd
     creating
     creating and configuring
     creating for intersite replication
         between two or more sites
         changing sites associated with site links
         configuring properties
         transport protocols
     determining ISTG
     determining site bridgehead servers
     transitivity
sites 2nd 3rd
     configuring and maintaining
         associating domain controllers with sites
         creating sites
         creating subnets
         site license server, specifying
         tasks for site configuration
     creating and configuring
     GPOs, creating and managing
     intersite replication
         configuring site link bridges
         creating required site links
         determining ISTG
         site bridgehead servers
     overview
         designing site topology
         reasons to create multiple sites at a physical location
     policy settings
     replication
         comparing intrasite and intersite replication
     universal group caching
Smart Card Is Required For Interactive Logon (Account tab, user properties)
smart cards
     authentication strategy that uses
     EAP used with
     planning for
     user authentication with
     using for authentication 2nd
SMTP (Simple Mail Transfer Protocol)
snap-ins (MMC)
SOA (Start of Authority) 2nd 3rd
     configuring 2nd 3rd
Software Installation policy
     updating applications deployed through
software RAID
software routers 2nd
software settings
software site licensing 2nd 3rd
     configuring server licensing
     managing
software update infrastructure 2nd 3rd 4th
     Automatic Updates
     configuring
     configuring, Exam 70-293
     installing and configuring Automatic Client Update 2nd
     maintaining system security
     Windows Server Update Services (WSUS)
         configuring
         installing
     Windows Update
     WSUS (Windows Server Update Services)
Software Update Services (SUS)
software, distributing using Group Policy 2nd
spanned volumes 2nd
SPAP (Shiva Password Authentication Protocol) 2nd 3rd
special characters not allowed in user, computer, and group names
special identities
     types of
special or default shares
special permissions
     NTFS filesystem 2nd
     Terminal Services
special volumes
SRV (service locator) records
     alteration by clients on network
SSL (Secure Sockets Layer)
stand-alone CAs
stand-alone root CA
stand-alone subordinate CAs 2nd
standalone servers
star topology (WAN connections)
state flags (nodes in server clusters)
static address pool option (RRAS)
static IP addresses 2nd 3rd 4th 5th
static routes 2nd 3rd
     configuring using command line
     configuring with RRAS
static routing 2nd 3rd
storage media, backups 2nd
Store Password Using Reversible Encryption (Account tab, user properties)
striped volumes 2nd 3rd
striped with parity volumes (RAID-5) 2nd 3rd
     failure and repair of
stub zone files 2nd
stub zones 2nd 3rd
study resources
subnet masks 2nd 3rd 4th
     invalid
     invalid, preventing Internet connectivity
     IP addresses
     network bit lengths and
     standard, overview of
subnets 2nd
     configuring DHCP relay agents on
     creating and associating with a site
     creating for sites
     creating IP subnet scheme 2nd
         calculating number of nodes on subnet
         calculating number of subnets
         Class C networks, overview of subnetting
     in multinets
     IP routing and
     sites and
     using to divide a network
success audit events 2nd
suffixes, DNS
     practice exercises with
superscopes (DHCP) 2nd
     creating and using 2nd
Support Tools
     Netdiag
SUS (Software Update Services)
switches
system bottlenecks, identifying
system environment, managing
    performance for server environment
         choosing objects to monitor
System event log
     conflicts in IP addresses, warning events
     DHCP troubleshooting
     password/trust problem for computer account
system identity
System log 2nd
System Monitor 2nd
     managing/maintaining server environment
     monitoring DNS
     monitoring performance of local and remote systems
     network traffic, monitoring
     performance monitoring for system bottlenecks
     report formats
system performance, monitoring in server environment 2nd
     four key areas
     with Performance console
     with Task Manager
System services policy
System State data 2nd 3rd
     backing up on domain controllers
     backing up to media 2nd
     restoring
System utility
     Remote tab
system volume 2nd
Sysvol folder
     checking permissions with Gpotool
     performing primary restore on 2nd
     replication dependencies
     replication of files in 2nd




MCSE Core Required Exams in a Nutshell
MCSE Core Required Exams in a Nutshell: The required 70: 290, 291, 293 and 294 Exams (In a Nutshell (OReilly))
ISBN: 0596102283
EAN: 2147483647
Year: 2006
Pages: 95

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net