Exam Highlights

 < Day Day Up > 

Before taking the exam, review the key topics and terms that are presented in this chapter. You need to know this information.

Key Topics

  • Understand the various roles that client computers play on the network and how each role should be configured separately.

  • Be familiar with the tools you can use to control client systems, including how to configure and deploy software restrictions, how to limit a user’s access to the graphical interface, and how to protect the data on a computer in the event of theft.

  • Know the major roles that server computers fulfill on a network, and know how security should be configured for each. Understand how firewalls and perimeter networks should be used to create barriers between public and private networks.

  • Be able to configure packet filters to allow legitimate traffic to and from various server roles.

  • Understand the role that logging plays in identifying successful and unsuccessful attacks. Be able to configure logging for common server roles.

  • Be able to use several different tools to analyze a computer’s security configuration and the status of critical updates on the computer.

Key Terms

denial-of-service attack An attack that prevents users from using network resources.

firewallA system that creates a boundary between a public and private network.

man-in-the-middle attack A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. To each user, the attacker pretends to be the other user. During a successful man-in-the-middle attack, the users are unaware that there is an attacker between them who is intercepting and modifying their data. Also referred to as a bucket brigade attack.

packet filter A basic function of firewalls that examines incoming and outgoing packets and drops packets based on predefined criteria, such as port numbers, source IP address, and destination IP address.

perimeter network A small network that is set up separately from an organization’s private network and the Internet. A perimeter network provides a layer of protection for internal systems in the event that a system offering services to the Internet is compromised. Also known as a demilitarized zone (DMZ) or a screened subnet.

 < Day Day Up > 

MCSA(s)MCSE Self-Paced Training Kit Exam 70-299 (c) Implementing and Administering Security in a M[.  .. ]twork
MCSA/MCSE Self-Paced Training Kit (Exam 70-299): Implementing and Administering Security in a MicrosoftВ® Windows Server(TM) 2003 Network (Pro-Certification)
ISBN: 073562061X
EAN: 2147483647
Year: 2004
Pages: 217

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net