|HOME Sitemap Cisco Exams Microsoft Exams Advertise Contact Us|
Microsoft 70-299 Exam
Exam Name: Microsoft 70-299 - Implementing and Administering Security in a Microsoft Windows Server 2003 Network
"I like the Questions and Answers pattern of Testking 70-299 a lot as it provides concentrated material on Microsoft 70-299 IT certification exam. It helped me to understand all the important aspects of 70-299 IT certification without any further coaching. Moreover, the material here was designed on the style of the real exam which enabled me to feel confident in solving the queries without any difficulty. I am in debt of deep gratitude to Testking 70-299 study material."
Passing Score: 700
70-299 is the most important certification from the Microsoft. Microsoft 70-299 or Implementing and Administering Security in a Microsoft Windows Server 2003 Network certification exam teaches you how to implement and administrate the security issues in the Microsoft Windows Server and enable you to secure the windows server network . Microsoft 70-299 or Implementing and Administering Security in a Microsoft Windows Server 2003 Network certification exam is suggested for the people who want to become the security administrator in their future.
The 70-299 exam provides you with the knowledge of planning and configuring an Authentication and Authorization Strategy. By doing this course, an IT Professional becomes capable of installing, configuring and managing certification authorities so as to securely communicate on networks. This Microsoft certification enlightens you with the technical knowledge of configuring, deploying and managing certificates. Moreover, the 70-299 exam provides you with the skills of Planning, Implementing and Troubleshooting Smart Card Certificates. This course trains you for planning, implementing and troubleshooting Encrypting File System. In addition, the 70-299 exam assists you in planning and implementing software updates. Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam equips an IT Professonal with the technical know-how of planning and implementing Security for Wireless Networks.
You can find thousand of websites on the internet which provide you the quality and up-to-date study material to prepare your Microsoft 70-299 or Implementing and Administering Security in a Microsoft Windows Server 2003 Network certification exam. But the main problem is that there is not many websites which provide you the quality, reliable and up-to-date study material. Testking is the only website that provides you the quality and up-to-date study material for the preparation of your Microsoft 70-299 exams (Implementing and Administering Security in a Microsoft Windows Server 2003 Network). The Preparation Material available on Testking for the 70-299 Exam for Implementing and Administering Security in a Microsoft Windows Server 2003 Network provides you with the details required to take a certification examination. Study materials of the Microsoft 70-299 certification exam are organized after thorough research by certification experts who use their experience in order to produce accurate, rational and verified materials for the answers. Testking provides you the detail question with their exact answer related to your Microsoft 70-299 or Implementing and Administering Security in a Microsoft Windows Server 2003 Network certification exam. Testking also provides you the audio exam and guidance books of 70-299 exams as well. Testking also provides you the guidance of the well educated and qualified people.
Course Outline: Implementing and Administering Security in a Microsoft Windows Server 2003 Network
Implementing, Managing, and Troubleshooting Security Policies
Plan security templates based on computer role. Computer roles include SQL Server computer, Microsoft Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server.
Configure security templates.
Configure registry and file system permissions.
Configure account policies.
Configure .pol files.
Configure audit policies.
Configure user rights assignment.
Configure security options.
Configure system services.
Configure restricted groups.
Configure event logs.
Deploy security templates.
Plan the deployment of security templates.
Deploy security templates by using Active Directory-based Group Policy objects (GPOs).
Deploy security templates by using command-line tools and scripting.
Troubleshoot security template problems.
Troubleshoot security templates in a mixed operating system environment.
Troubleshoot security policy inheritance.
Troubleshoot removal of security template settings.
Configure additional security based on computer roles. Server computer roles include SQL Server computer, Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server. Client computer roles include desktop, portable, and kiosk.
Plan and configure security settings.
Plan network zones for computer roles.
Plan and configure software restriction policies.
Plan security for infrastructure services. Services include DHCP and DNS.
Plan and configure auditing and logging for a computer role. Considerations include Windows Events, Internet Information Services (IIS), firewall log files, Netlog, and RAS log files.
Analyze security configuration. Tools include Microsoft Baseline Security Analyzer (MBSA), the MBSA command-line tool, and Security Configuration and Analysis.
Implementing, Managing, and Troubleshooting Patch Management Infrastructure
Plan the deployment of service packs and hotfixes.
Evaluate the applicability of service packs and hotfixes.
Test the compatibility of service packs and hotfixes for existing applications.
Plan patch deployment environments for both the pilot and production phases.
Plan the batch deployment of multiple hotfixes.
Plan rollback strategy.
Assess the current status of service packs and hotfixes. Tools include MBSA and the MBSA command-line tool.
Assess current patch levels by using the MBSA GUI tool.
Assess current patch levels by using the MBSA command-line tool with scripted solutions.
Deploy service packs and hotfixes.
Deploy service packs and hotfixes on new servers and client computers. Considerations include slipstreaming, custom scripts, and isolated installation or test networks.
Deploy service packs and hotfixes on existing servers and client computers.
Implementing, Managing, and Troubleshooting Security for Network Communications
Plan IPSec deployment.
Decide which IPSec mode to use.
Plan authentication methods for IPSec.
Test the functionality of existing applications and services.
Configure IPSec policies to secure communication between networks and hosts. Hosts include domain controllers, Internet Web servers, databases, e-mail servers, and client computers.
Configure IPSec authentication.
Configure appropriate encryption levels. Considerations include the selection of perfect forward secrecy (PFS) and key lifetimes.
Configure the appropriate IPSec protocol. Protocols include Authentication Header (AH) and Encapsulating Security Payload (ESP).
Configure IPSec inbound and outbound filters and filter actions.
Deploy and manage IPSec policies.
Deploy IPSec policies by using Local policy objects or Group Policy objects (GPOs).
Deploy IPSec policies by using commands and scripts. Tools include IPSecPol and NetSh.
Deploy IPSec certificates. Considerations include deployment of certificates and renewing certificates on managed and unmanaged client computers.
Monitor IPSec policies by using IP Security Monitor.
Configure IPSec logging. Considerations include Oakley logs and IPSec driver logging.
Troubleshoot IPSec across networks. Considerations include network address translation, port filters, protocol filters, firewalls, and routers.
Troubleshoot IPSec certificates. Considerations include enterprise trust policies and certificate revocation list (CRL) checking.
Plan and implement security for wireless networks.
Plan the authentication methods for a wireless network.
Plan the encryption methods for a wireless network.
Plan wireless access policies.
Configure wireless encryption.
Install and configure wireless support for client computers.
Deploy, manage, and configure SSL certificates, including uses for HTTPS, LDAPS, and wireless networks. Considerations include renewing certificates and obtaining self-issued certificates instead of publicly issued certificates.
Obtain self-issued certificates and publicly issued certificates.
Install certificates for SSL.
Configure SSL to secure communication channels. Communication channels include client computer to Web server, Web server to SQL Server computer, client computer to Active Directory domain controller, and e-mail server to client computer.
Configure security for remote access users.
Configure authentication for secure remote access. Authentication types include PAP, CHAP, MS-CHAP, MS-CHAP v2, EAP-MD5, EAP-TLS, and multifactor authentication that combines smart cards and EAP.
Configure and troubleshoot virtual private network (VPN) protocols. Considerations include Internet service provider (ISP), client operating system, network address translation devices, Routing and Remote Access servers, and firewall servers.
Manage client configuration for remote access security. Tools include remote access policy and the Connection Manager Administration Kit.
Planning, Configuring, and Troubleshooting Authentication, Authorization, and PKI
Plan and configure authentication.
Plan, configure, and troubleshoot trust relationships.
Plan and configure authentication protocols.
Plan and configure multifactor authentication.
Plan and configure authentication for Web users.
Plan and configure delegated authentication.
Plan group structure.
Decide which types of groups to use.
Plan security group scope.
Plan nested group structure.
Plan and configure authorization.
Configure access control lists (ACLs).
Plan and troubleshoot the assignment of user rights.
Plan requirements for digital signatures.
Install, manage, and configure Certificate Services.
Install and configure root, intermediate, and issuing certification authorities (CAs). Considerations include renewals and hierarchy.
Configure certificate templates.
Configure, manage, and troubleshoot the publication of certificate revocation lists (CRLs).
Configure archival and recovery of keys.
Deploy and revoke certificates to users, computers, and CAs.
Backup and restore the CA.
|© 2009-2013 Copyright - Cert-Vista.com - ActualTest - Actual Exams - Real Exams - Testking|