Where to Find Specific Skills in This Book
The following tables provide a list of the skills measured on certification exam 70-214, Implementing and Administering Security in a Microsoft Windows 2000 Network. The table provides the skill, and where in this book you will find the lesson relating to that skill.
Exam skills are subject to change without prior notice and at the sole discretion of Microsoft.
Skill Being Measured | Location in Book |
Configure security templates.
| Chapter 4 (all lessons) |
Deploy security templates. Deployment methods include using Group Policy and scripting. | Chapter 3, Lesson 4 |
Troubleshoot security template problems. Considerations include Group Policy, upgraded operating systems, and mixed client-computer operating systems. | Chapter 4, Lesson 4 |
Configure additional security based on computer roles. Computer roles include Microsoft SQL Server computer, Microsoft Exchange Server computer, domain controller, Internet Access Service (IAS) server, Internet Information Services (IIS) server, and mobile client computer. | Chapter 11 and throughout other chapters |
Configure additional security for client-computer operating systems by using Group Policy. | Chapter 1, Lesson 2 |
Skill Being Measured | Location in Book |
Determine the current status of service packs and security updates. Tools include MBSA and HFNetChk. | Chapter 14, Lesson 1 |
Install service packs and security updates. Considerations include slipstreaming and using Remote Installation Services (RIS), custom scripts, and isolated networks. | Chapter 14, Lesson 1 |
Manage service packs and security updates. Considerations include server computers and remote client computers. Tools include Microsoft Software Update Service, Automatic Updates, and SMS. | Chapter 14, Lesson 2 |
Troubleshoot the deployment of service packs and security updates. Typical issues include third-party application compatibility, permissions, and version conflicts. | Chapter 14 |
Skill Being Measured | Location in Book |
Configure IPSec to secure communication between networks and hosts. Hosts include domain controllers, Internet Web servers, databases, e-mail servers, and client computers.
| Chapter 8, Lesson 1 |
Troubleshoot IPSec. Issues include IPSec rule configurations, firewall configurations, routers, and authentication. | Chapter 8, Lesson 3 |
Implement security for wireless networks.
| Chapter 10, Lessons 1 and 2
|
Configure Server Message Block (SMB) signing to support packet authentication and integrity. | Chapter 8, Lesson 1 |
Deploy and manage SSL certificates. Considerations include renewing certificates and obtaining self-issued certificates versus public-issued certificates.
| Chapter 12, Lesson 3 |
Configure SSL to secure communication channels. Communication channels include:
| Chapter 12, Lesson 3 Chapter 11, Lessons 2 and 3 |
Skill Being Measured | Location in Book |
Configure and troubleshoot authentication.
| Chapter 7 and Chapter 2 |
Configure and troubleshoot authentication for Web users. Authentication types include Basic, Integrated Windows, anonymous, digest, and client certificate mapping. | Chapter 12, Lesson 2 |
Configure authentication for secure remote access. Authentication types include PAP, CHAP, MS-CHAP, MS-CHAP v2, EAP-MD5, EAP-TLS, and Multi-factor authentication with smart cards and EAP. | Chapter 9, Lesson 2 |
Configure and troubleshoot virtual private network (VPN) protocols. Considerations include:
| Chapter 9, Lesson 4 |
Manage client-computer configuration for remote access security. Tools include remote access policy and Connection Manager Administration Kit. | Chapter 9, Lesson 3 |
Skill Being Measured | Location in Book |
Install and configure Certificate Authority (CA) hierarchies. Considerations include enterprise, standalone, and third-party CAs.
| Chapter 5, Lessons 1 and 2 |
Manage Certificate Authorities (CAs). Considerations include enterprise, stand-alone, and third-party CAs.
| Chapter 5, Lesson 3 |
Manage client-computer and server certificates. Considerations include SMIME, EFS, exporting, and storage.
| Chapter 6, Lessons 1 and 2
Chapter 5, Lesson 3 |
Manage and troubleshoot EFS. Considerations include domain members, workgroup members, and client-computer operating systems. | Chapter 6 |
Skill Being Measured | Location in Book |
Configure and manage auditing. Considerations include Windows Events, Internet Information Services (IIS), firewall log files, Network Monitor Log, and RAS log files.
| Chapter 13, Lesson 1 |
Analyze security events. Considerations include reviewing logs and events. | Chapter 13, Lesson 2 |
Respond to security incidents including hackers, viruses, denial-of-service (DoS) attacks, natural disasters, and maintaining chains of evidence.
| Chapter 13, Lesson 3 |