暫缺《MCSE Windows 2000 Accelerated考前輔導(dǎo)(英文影印版)》簡介
作者簡介
暫缺《MCSE Windows 2000 Accelerated考前輔導(dǎo)(英文影印版)》作者簡介
圖書目錄
Exam Insights xxv Self-Assessment lv Chapter 1 Introduction to Windows 2000 What’s New?2 The Windows 2000 Family Windows 2000 Professional Enhanced User Interface Enhanced Setup Improved Internet and Communications Features Strengthened Security Improved File Management Improved Configuration Features Enhanced Printing Support Improved Mobile Computing Platform New Troubleshooting Utilities Windows 2000 Server Introducing the Active Directory New System Management Tools Improved Network Protocol Support Enhanced Web Services Remote Access Refinements and Improvements Strengthened Security Enhanced File Management Features Improved Configuration Management Bolstered Printing Support Windows 2000 Advanced Server Windows 2000 Datacenter Server Chapter Summary Review Questions Real-World Projects Chapter 2 Windows 2000 Installation and Setup Preinstallation Checklist Review Hardware Requirements Select a File System FAT and FAT32 Strengths NTFS Advantages Select a Windows 2000 Licensing Mode Determining a Namespace Review the Checklist Installing Windows 2000 Using a Compact Disk Winnt.exe Installation Winnt32.exe Installation Installing Windows 2000 Over a Network Installing Windows 2000 Using the Setup Manager Wizard Installing Windows 2000 Using Disk Duplication The Role of Sysprep Installing Windows 2000 Via Remote Installation Services Troubleshooting Windows 2000 Setup Chapter Summary Review Questions Real-World Projects Chapter 3 DNS and the Active Directory What’s in a Name?72 Introduction to the DNS Service The Structure The Zone Files The Records The Resolvers Planning a DNS Namespace Testing and Troubleshooting DNS The Monitoring Utility The nslookup Utility IPCONFIG and PING Netmon Chapter Summary Review Questions Real-World Projects Chapter 4 Active Directory Defined Network Directories Explored The Network Directory Explained Introduction to the Active Directory Active Directory Benefits Locating Objects in the Active Directory Active Directory Structure The Logical Structure The Physical Layout Active Directory Considerations The Schema Global Catalog Trust Relationships The Database and Shared Volume Planning the Active Directory Determining a Namespace Planning for Replication Traffic Identifying Organizational Units Chapter Summary Review Questions Real-World Projects Chapter 5 Designing and Configuring the First Domain Domain Structures Creating the First Domain Creating the First Windows 2000 Domain Controller Improvements to the Domain Organizational Units Planning OUs Using OUs as Subdomains Nesting OUs Planning for Delegation of Authority Steps to Delegate Permissions Active Directory Security Permission Inheritance Chapter Summary Review Questions Real-World Projects Chapter 6 Active Directory Administration Adding Objects to the Active Directory Organizational Units User Accounts Computer Accounts Groups Group Types Group Scope Groups and Replication Assigning Permissions and Membership Built-In Groups Working with Active Directory Objects Locating Objects within the Directory Moving Objects Securing Access to Active Directory Objects Active Directory Object Permissions Delegation of Administrative Authority Chapter Summary Review Questions Real-World Projects Chapter 7 Planning Larger Windows 2000 Networks When to Use Multiple Domains Understanding Active Directory Trees Tree Root Transitive and Cross-Link Trusts Creating Additional Domains within a Tree Locating Resources within a Tree Planning a Forest When to Use Multitree Forests Searching Multiple Trees Creating a Forest Forest Structure Planning Understanding Multiple Forests When to Use Multiple Forests Creating Multiple Forests Planning Multiple Forests Planning for Infrastructure Services in a Multidomain Environment Domain Naming Systems Global Catalog Servers Operation Masters Replication Issues in Large Network Environments SYSVOL Chapter Summary Review Questions Real-World Projects Chapter 8 Understanding and Configuring Replication 217 Replication Defined Understanding Active Directory Replication Update Sequence Numbers Directory Updates Understanding Propagation Dampening Replication Conflicts Resolving Conflicts The Replication Model Replication Propagation Understanding Replication Partitions Operation Master Replication Replication Topology Replication Traffic Performance Monitor Replication Monitor Network Monitor Replication among Sites Sites Site Links Bridgehead Servers Chapter Summary Review Questions Real-World Projects Chapter 9 The Active Directory Schema The Schema’s Location The Schema’s Contents The attributeSchema Object The classSchema Object Class Types Inheritance The Directory System Agent Attribute Syntax Object Identifiers Schema Structure Rules Queries to the Schema Initial Security Mode Customizing the Schema Preparing to Modify the Schema Modifying the Schema–Checks, Ramifications, and Tools Chapter Summary Review Questions Real-World Projects Chapter 10 Active Directory Connector Administration and Exchange Service Interoperability Role of the Active Directory Connector Connection Agreements Installing Active Directory Connector Configuring ADC Properties Configuring Connection Agreements Managing Synchronization Active Directory Connector Preparation Deployment Recommendations Preparing a Test Environment Selection of an ADC Deployment Model Monitoring the Active Directory Connector Service Chapter Summary Review Questions Real-World Projects Chapter 11 Managing DHCP and WINS Introduction to the Dynamic Host Control Protocol DHCP Leases Setting Up the DHCP Scope Identifying Client Options and Using Multicast DHCP Keeping the DHCP Database Reliable Special Considerations with DHCP Implementation Maintaining the DHCP Service Introduction to the Windows Internet Naming Service Exploring WINS Keeping the WINS Database Reliable Managing Servers, Records, and Replication Chapter Summary Review Questions Real-World Projects Chapter 12 Understanding and Administering Disk Management Functionality Disk Storage Options Basic Storage Dynamic Storage Configuring and Administering Disk Management Refresh and Rescan Disks Dynamic Disk Administration Simple Volume Administration Extended Volume Administration Spanned Volume Administration Stripe Volume Administration Administering Common Disk Management Tasks Administering Disk Defragmenter Managing Partitions Adding Local and Remote Disks to Disk Management Drive Letter and Drive Path Management Administering Windows NT Server 4 Disk Sets Converting Disk Types Chapter Summary Review Questions Real-World Projects Chapter 13 Administering Windows 2000 File System Publishing Folders Computer Management Administrative Tool Sharing a Folder Publishing Shares to the Active Directory Understanding and Configuring Distributed File Systems Why Use Dfs Creating Dfs Adding Dfs Links NTFS Permissions Standard Permissions Special Permissions Viewing NTFS Special Permissions Modifying NTFS Special Permissions NTFS Permission Inheritance Managing Disk Quotas How Quotas Work Configuring Disk Quotas Encrypting File System How EFS Works EFS Features The Recovery Agent Encrypting and Decrypting at the Command Prompt Chapter Summary Review Questions Real-World Projects Chapter 14 Controlling the User Environment with Group Policies Group Policies and Active Directory Group Policy Objects and Links Software Settings Extensions in the Computer Configuration Node Windows Settings Extensions in the Computer Configuration Node Administrative Templates Extensions in the Computer Configuration Node Software Settings Extensions in the User Configuration Node Windows Settings Extensions in the User Configuration Node Administrative Templates Extensions in the User Configuration Node Group Policy Management Storing Group Policies Linking Group Policies Filtering Group Policies Delegating Group Policies Processing Group Policies Editing Group Policies Using Client-Side Extensions Using Loop Back Support Addressing Group Policy Issues after Migration Chapter Summary Review Questions Real-World Projects Chapter 15 Getting a Handle on Software Deployment Windows 2000 Software Distribution Using IntelliMirror to Control Software Distribution Using the Windows 2000 Software Installation Snap-In Assigned Software versus Published Software The Windows Installer Service The Add/Remove Programs Applet in Control Panel The Software Management Life Cycle Preparing for Software Distribution Distributing Software in the Organization Targeting Software to Appropriate Users and Groups Testing the Software Distribution Rolling Out the Tested Packages Maintaining Distributed Software Packaging Applications with Windows Installer and Other Technologies Windows Installer Terminal Services WinInstall ZAP Files Chapter Summary Review Questions Real-World Projects Chapter 16 Configuring Remote Access in Windows 2000 Windows 2000 Enhances Routing and Remote Access Enabling Routing and Remote Access Windows 2000 Introduces New Security Protocols Bandwidth Allocation Protocol Extensible Authentication Protocol Internet Protocol Security Layer 2 Tunneling Protocol Remote Authentication Dial-in User Service Configuring Remote Access Dial-up Connections Configuring Modems Configuring Inbound Dial-up Connections Configuring Outbound Dial-up Connections Configuring Direct Cable Connections Configuring Virtual Private Networks Configuring VPN Ports Connecting a System to a VPN Configuring Routing Functions in Windows 2000 Support for Routing Protocols Network Address Translation Remote Access Policy Usage Remote Access Policy Conditions Remote Access Policy Permissions Remote Access Policy Profiles Remote Access Policy Authentication Creating and Administering Remote Access Policies Configuring Dial-in Settings Creating a Remote Access Policy Editing a Remote Access Policy Profile Chapter Summary Review Questions Real-World Projects Chapter 17 Understanding Windows 2000 Terminal Services Terminal Services Components Planning Windows 2000 Terminal Services Deployments Examine Client Applications Determine the Client Device’s Hardware Requirements Research the Terminal Services Server Configuration Obtain the Necessary Licenses Required by Terminal Services Installing Windows 2000 Terminal Services Administering Windows 2000 Terminal Services Servers Configuring Terminal Services User Session Settings Installing Applications on a Terminal Services Server Terminal Services Session Administration Configuring Terminal Services Clients Using Terminal Services for Remote Administration Configuring a Terminal Server for Remote Administration Tightening Security Settings for Remote Administration Chapter Summary Review Questions Real-World Projects Chapter 18 Preventing and Preparing for Disaster Recovery Planning for Disasters What to Include in a Disaster-Recovery Plan Fault Tolerance RAID 1 Volumes RAID 5 Volumes RAID Drawbacks Startup Options Understanding Advanced Startup Options The Recovery Console Installing the Recovery Console Using the Recovery Console Windows 2000 Backup Utility Backup Requirements Creating Backup Jobs Scheduling a Backup Restoring from a Backup Understanding Active Directory Recovery and Maintenance Understanding the Active Directory Store Active Directory Data Store Files Active Directory Maintenance Recovering Active Directory Non-Authoritative Restore Authoritative Restore Recovery without Restore Chapter Summary Review Questions Real-World Projects Chapter 19 Planning and Implementing a Windows NT 4 to Windows 2000 Migration Planning for Success Documenting Goals, Resources, and Milestones Developing Your Upgrade Strategy Upgrade Overview Windows 2000 in Mixed Mode and Native Mode Upgrade Considerations for Each Directory Service Model Migrating Member Servers, Clients, and Resources Develop an Active Directory Naming Strategy Planning for Sites Performing an Upgrade Establishing a Root Domain Testing a Proposed System Using a Test Lab for Testing Pilot Programs for the Proposed System Chapter Summary Review Questions Real-World Projects Chapter 20 Securing a Windows 2000 Network Planning and Implementing Network Security Analyzing Common Security Issues Windows NT Security Models Securing the Authentication and Logon Process Kerberos Authentication Protocol Using Smart Card Authentication Securing Remote Access Servers0 Controlling Access to Resource ACLs and Interdomain Trusts Introduction to Access Control Lists Implementing Security Groups Securing Interdomain Trusts Protecting Network Data and Communications3 Securing Data with the Encrypting File System3 Using IPSec Policies to Secure Network Communications3 Ensuring Standard Security Policy Implementation Using Group Policies to Implement Security Using the Security Analysis Tool and Templates Chapter Summary Review Questions Real-World Projects Chapter 21 Windows 2000 Professional Windows 2000 Enhancements Making Windows Easier Support for Mobile Computing Windows 2000 Printing Features Enhanced Hardware Support Improved File System Management Improved Security Hardware Installation and Configuration Plug and Play Windows 2000 Device Manager System Information Driver Signing Windows 2000 Professional Network Configuration TCP/IP and Windows 2000 Joining a Domain Creating User and Group Accounts on Windows 2000 Professional Local User Accounts Domain User Accounts Builtin User Accounts Creating and Managing User Accounts Creating and Managing Groups in Windows 2000 Professional Understanding Windows 2000 Professional Security Policies Account Policies Windows 2000 Professional Goes Mobile Offline Folders Chapter Summary Review Questions Real-World Projects Chapter 22 Sample Test Chapter 23 Answer Key Appendix A Answers to Review Questions Appendix B Objectives for Exam 70-240 Appendix C Study Resources Glossary Index