Chapter 32. Exam Overview

As a network administrator or consultant, your job can involve planning, analyzing, and designing networks as much as implementing them. Security should be a major consideration in any network design.

MCSE Exam 70-220, Designing Security for a Microsoft Windows 2000 Network, deals with the design and planning of network security services and protocols. This exam can be used as an optional core exam or as an elective.

Because Active Directory is the fundamental data store for Windows 2000 security, most security techniques involve the Directory. You should be familiar with all aspects of Active Directory, as discussed in Part III. You should also consider the design of Active Directory (Part V) and Network Infrastructure (Part VI) when developing a security design.

To prepare for this chapter and the Designing Security exam, you should have studied Parts 1 and 2 for the basics of Windows 2000 Professional and Server. You should also be familiar with Windows 2000’s Active Directory and should, ideally, have real-world experience managing and securing a Windows 2000 network.

Areas of Study

Planning Network Security

Need to Know

Reference

Types of security

Section 31.1.1

Network role types

Section 31.1.5

Need to Apply

Reference

Analyze business requirements for a security design

Section 31.1.2

Analyze technical requirements for a security design

Section 31.1.3

Map information flow

Section 31.1.4

Identify network roles

Section 31.1.5

Analyze current security risks

Section 32.1.6

Design a plan for upgrades and changes

Section 32.1.7

Designing Basic Security

Need to Know

Reference

Basic components to secure

Section 33.2.1

Operations master types

Section 33.2.1.2

Windows 2000 authentication methods

Section 33.2.2

Certificate authority roles

Section 33.2.3.2

Need to Apply

Reference

Create a baseline for security

Section 33.2.1

Choose authentication methods

Section 33.2.2

Install Certificate Services

Section 33.2.3.1

Manage certificates

Section 33.2.3.3

Encrypting Filesystem (EFS)

Need to Know

Reference

EFS features, advantages, and disadvantages

Section 33.3.1

EFS terminology

Section 33.3.1

EFS process

Section 33.3.1.1

Key storage locations

Section 33.3.1.2

Need to Apply

Reference

Determine whether to use EFS

Section 33.3.1

Encrypt and decrypt files

Section 33.3.1.1

Designing Auditing

Need to Know

Reference

Built-in audit policies

Section 33.4.1

Typical events to audit

Section 33.4.1

Need to Apply

Reference

Create an audit policy

Section 33.4.1

Determine events to audit

Section 33.4.1

Plan for the use of audit data

Section 33.4.2

Securing Network Services

Need to Know

Reference

Windows 2000 DNS security features

Section 33.5.1

Dynamic DNS support for different operating systems

Section 33.5.1

RIS features and requirements

Section 33.5.2

Terminal Services modes

Section 33.5.3

Need to Apply

Reference

Configure DNS for higher security

Section 33.5.1

Configure RIS naming schemes

Section 33.5.2

Secure Terminal Services

Section 33.5.3

Designing Secure Connectivity

Need to Know

Reference

Differences between NAT and Proxy Server

Section 33.6.1

VPN protocols

Section 33.6.2

Windows 2000 SMB security features

Section 33.6.3

Need to Apply

Reference

Secure Internet access with NAT or Proxy Server

Section 33.6.1

Choose VPN protocols

Section 33.6.2

Enable SMB signing

Section 33.6.3

Planning IP Security

Need to Know

Reference

IP Security features and advantages

Section 33.7

IPSec terminology

Section 33.7.1

IPSec negotiation phases

Section 33.7.2

Common TCP/IP ports

Section 33.7.3

Types of filter policy

Section 33.7.3

Need to Apply

Reference

Create an IPSec encryption scheme.

Section 33.7.1

Configure IPSec packet filters.

Section 33.7.3

Define IPSec security levels.

Section 33.7.3.1

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.123.147