Home > Store

MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring

Register your product to gain access to bonus material or receive a coupon.

MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • The first MCTS 70-642 guide to fully cover the Windows Server 2008 R2 upates today's exam candidates need to understand
  • Clear explanations, quizzes, memory tables, study strategies, tips, cautions, key terms, troubleshooting scenarios, CD exam questions, last-minute review tearsheet, and more
  • Exclusive "Do I Know This Already?" quizzes help readers focus their studying and save time

Description

  • Copyright 2012
  • Edition: 1st
  • Book
  • ISBN-10: 0-7897-4830-4
  • ISBN-13: 978-0-7897-4830-0

Learn, prepare, and practice for Microsoft MCTS 70-642 exam success with this MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide from Pearson IT Certification, a leader in IT Certification learning. The companion CD features two complete practice exams.

  • Master Microsoft’s MCTS 70-642 exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions on the CD

MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide is a best-of-breed exam study guide. Best-selling author and expert instructor Don Poulton shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.

The companion CD contains the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.

Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

The study guide helps you master all the topics on the MCTS 70-642 exam, including

  • IPv4/IPv6 address configuration and troubleshooting
  • DHCP configuration, installation, management, and troubleshooting
  • Routing configuration, tables, RRAS, management, and maintenance
  • Windows Firewall, Advanced Security, and IPsec
  • DNS installation, configuration, zones, replication, and records
  • Client name resolution
  • File services, shared folders, permissions, and encryption
  • DFS, namespaces, and replication
  • Backup/restore
  • File Server Resource Manager (FSRM)
  • Print services
  • Remote Access, VPNs, and NAT

Companion CD

The CD contains two free, complete practice exams. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test.

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB hard disk space plus 50 MB for each downloaded practice exam.

Premium Edition

The exciting new MCTS 70-642 Cert Guide, Windows Server 2008 Network Infrastructure, Configuring, Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test with bonus video mentoring.  The Premium Edition eBook and Practice Test contains the following items:

  • The MCTS 70-642 Premium Edition Practice Test, including three full practice exams and enhanced practice test features
  • PDF and EPUB formats of the MCTS 70-642 Cert Guide from Pearson IT Certification, which are accessible via your PC, tablet, and Smartphone

About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson IT Certification Practice Test (PCPT) software with three full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package:

  • Allows you to focus on individual topic areas or take complete, timed exams
  • Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
  • Provides unique sets of exam-realistic practice questions
  • Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), or Windows 7;

Microsoft .NET Framework 4.0 Client;

Pentium class 1GHz processor (or equivalent);

512 MB RAM;

650 MB disc space plus 50 MB for each downloaded practice exam

About the Premium Edition eBook 

Learn, prepare, and practice for MCTS 70-642 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.

Master MCTS 70-642 exam topics

  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions

 MCTS 70-642 Cert Guide, Windows Server 2008 Network Infrastructure, Configuring  is a best-of-breed exam study guide. Best-selling author and expert instructor Don Poulton shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.

Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

The study guide helps you master all the topics on the MCTS 70-642 exam, including

  • IPv4/IPv6 address configuration and troubleshooting
  • DHCP configuration, installation, management, and troubleshooting
  • Routing configuration, tables, RRAS, management, and maintenance
  • Windows Firewall, Advanced Security, and IPsec
  • DNS installation, configuration, zones, replication, and records
  • Client name resolution
  • File services, shared folders, permissions, and encryption
  • DFS, namespaces, and replication
  • Backup/restore
  • File Server Resource Manager (FSRM)
  • Print services
  • Remote Access, VPNs, and NAT
Don Poulton (A+, Network+, Security+, MCSA, MCSE) is an independent consultant who has been involved with computers since the days of 80-column punch cards. After a career of more than 20 years in environmental science, Don switched careers and trained as a Windows NT 4.0 MCSE. He has been involved in consulting with a couple of small training providers as a technical writer, during which time he wrote training and exam-prep materials for Windows NT 4.0, Windows 2000, and Windows XP. Don has written or contributed to several titles, including Security+ Lab Manual (Que, 2004), MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) (Que, 2004), MCSE 70-294 Exam Prep: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Que, 2006), MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring (Que, 2008), MCTS 70-680 Exam Prep: Microsoft Windows 7, Configuring (Que, 2011) , and MCTS 70-640 Exam Prep: Microsoft Windows Server 2008 Active Directory, Configuring (Que, 2011).

Sample Content

Online Sample Chapter

Configuring and Monitoring Print Services for Windows Server 2008

Sample Pages

Download the sample pages (includes Chapter 13 and Index)

Table of Contents

Introduction 3

Chapter 1 Configuring IPv4 and IPv6 Addressing 27

    “Do I Know This Already?” Quiz 28

    Concepts of TCP/IP 33

        TCP/IP History in Brief 33

        TCP/IP Protocol Stack 34

        OSI Reference Model 34

        Four-Layer TCP/IP Model 35

        Application Layer 36

        Transport Layer 36

        Internet Layer 37

        Network Interface Layer 37

        TCP/IP Component Protocols 38

        Transmission Control Protocol 38

        User Datagram Protocol 38

        Internet Protocol 39

        Address Resolution Protocol 39

        Internet Control Message Protocol 39

        Internet Group Management Protocol 40

        Application Layer Protocols 40

    IPv4 Addressing 41

        Static IPv4 Addressing 42

        Subnetting and Supernetting in IPv4 44

        Using Subnetting to Divide a Network 44

        Using Supernetting to Provide for Additional Hosts on a Network 47

        Understanding Private IPv4 Networks 48

        Dynamic IP Addressing 48

        Configuring IPv4 Address Options 48

        Using the Command Line to Configure IPv4 Addressing Options 52

    IPv6 Addressing 54

        IPv6 Address Syntax 56

        IPv6 Prefixes 56

        Types of IPv6 Addresses 56

        Connecting to a TCP/IP Version 6 Network 59

        Interoperability Between IPv4 and IPv6 Addresses 62

        Compatibility Addresses 63

        ISATAP Addresses 63

        6to4 Addresses 64

        Teredo Addresses 65

        Using Group Policy to Configure IPv6 Transition Technologies 66

    Resolving IPv4 and IPv6 Network Connectivity Issues 67

        Windows Server 2008 Network Diagnostics Tools 68

        Using TCP/IP Utilities to Troubleshoot TCP/IP 70

        ARP 70

        FTP 70

        ipconfig 71

        Nbtstat 72

        Netstat 72

        Nslookup 73

        ping 73

        tracert 74

        pathping 75

        Troubleshooting IPv4 and IPv6 Problems 75

        Suggested Response to a Connectivity Problem 75

        Network Discovery 76

        Incorrect IPv4 Address or Subnet Mask 77

        Incorrect Default Gateway 78

        Unable to Connect to a DHCP Server 78

        Duplicate IP Address 78

        Unable to Configure an Alternate TCP/IPv4 Configuration 78

        Using Event Viewer to Check Network Problems 79

        Additional Troubleshooting Hints When Using IPv6 79

    Review All the Key Topics 80

    Complete the Tables and Lists from Memory 81

    Definition of Key Terms 81

Chapter 2 Configuring Dynamic Host Configuration Protocol (DHCP) 83

    “Do I Know This Already?” Quiz 83

    How DHCP Works 89

        Four-Phase DHCP IPv4 Leasing Process 89

        IP Lease Request (DHCPDISCOVER) 90

        IP Lease Offer (DHCPOFFER) 91

        IP Lease Selection (DHCPREQUEST) 91

        IP Lease Acknowledgment (DHCPACK) 92

        Renewing an IPv4 Lease 92

        How DHCPv6 Works 93

    Installing and Configuring a DHCP Server 95

        Using the Command Line to Install DHCP 100

    DHCP Scopes and Options 101

        Creating DHCP Scopes 101

        Using the Command Line to Create Scopes 104

        Superscopes 104

        Multicast Scopes 105

        Split Scopes 106

        Exclusions 107

        Configuring DHCP Scope Properties 107

        Configuring DHCP Options 108

        Server Options 110

        Scope Options 111

        Option Classes 112

        Client Reservations and Options 114

    Managing and Troubleshooting a DHCP Server 116

        Authorizing a DHCP Server in Active Directory 116

        Configuring DHCP Relay Agents 117

        PXE Boot 120

        Monitoring and Troubleshooting a DHCP Server 121

    Review All the Key Topics 124

    Complete the Tables and Lists from Memory 1 25

    Definition of Key Terms 125

Chapter 3 Configuring Routing 127

    “Do I Know This Already?” Quiz 127

    The Need for Routing and Routing Tables 132

        Routing Protocols 133

        Routing Table 135

    Routing and Remote Access Service (RRAS) in Windows Server 2008 R2 137

        Configuring RRAS as a Router 140

        Configuring RIP 142

        Configuring Static Routing 145

        Using the RRAS Snap-In to Create a Static Route 145

        Using the route Command to Create a Static Route 146

        Choosing a Default Gateway 147

        Displaying the Static Routing Table 147

    Managing and Maintaining Routing Servers 148

        Demand-Dial Routing 148

        Establishing a Demand-Dial Interface 148

        Configuring Demand-Dial Interface Properties 150

        Specifying Packet Filtering 151

        IGMP Proxy 153

    Review All the Key Topics 156

    Complete the Tables and Lists from Memory 157

    Definition of Key Terms 157

Chapter 4 Configuring Windows Firewall with Advanced Security 159

    “Do I Know This Already?” Quiz 159

    Configuring Windows Firewall 165

        Basic Windows Firewall Configuration 167

    Using the Windows Firewall with Advanced Security Snap-In 172

        Configuring Multiple Firewall Profiles 174

        Configuring New Firewall Rules 176

        Configuring Inbound Rules or Outbound Rules 176

        Configuring Connection Security Rules 180

        Configuring Rule Properties 184

        Authorizing Users and Computers 185

        Modifying Rule Scope 187

        Additional Rule Properties 188

        Configuring Notifications 189

        Importing and Exporting Policies 190

    Using IPSec to Secure Network Communications 191

        IPSec Modes 191

        IPSec Encryption 193

        Using Group Policy to Create IPSec Policies 194

        Using Group Policy to Configure Windows Firewall Policies 198

        Creating Windows Firewall with Advanced Security Policies 198

        Windows Firewall Group Policy Property Settings 200

        Isolation Policies 201

    Review All the Key Topics 202

    Definition of Key Terms 203

Chapter 5 Installing and Configuring Domain Name System (DNS) 205

    “Do I Know This Already?” Quiz 206

    Introduction to DNS 210

        Hierarchical Nature of DNS 211

        Root-Level Domains 212

        Top-Level Domains 212

        Second-Level Domain Names 214

        Host Names 214

        DNS Name Resolution Process 215

        Recursive Queries 215

        Iterative Queries 216

        Reverse Lookup Queries 217

    Installing DNS in Windows Server 2008 R2 218

        Using the Command Line to Install DNS 221

        Using the Command-Line for DNS Server Administration 222

    Configuring DNS Server Properties 223

        Interfaces Tab 223

        Forwarders Tab 224

        Conditional Forwarders 227

        Advanced Tab 228

        Server Options 229

        Disable Recursion 229

        Name Checking 230

        Loading Zone Data 231

        Root Hints Tab 231

        Debug Logging Tab 233

        Event Logging Tab 235

        Trust Anchors Tab 235

        Monitoring Tab 237

        DNS Socket Pooling 238

        DNS Cache Locking 239

    Review All the Key Topics 241

    Definition of Key Terms 241

Chapter 6 Configuring DNS Zones and Replication 243

    “Do I Know This Already?” Quiz 243

    Zone Types and Their Uses 249

        DNS Zone Types 249

        Primary Zones 249

        Secondary Zones 250

        Active Directory–Integrated Zones 250

        Stub Zones 251

        Forward and Reverse Lookup Zones 251

        GlobalNames Zones 252

        DNS Name Server Roles 253

        Primary Name Servers 253

        Secondary Name Servers 254

        Caching-Only Servers 255

        Forwarders 255

        Slave Servers 256

    Configuring DNS Zones 257

        Creating New DNS Zones 257

        Creating a Reverse Lookup Zone 259

        Creating Secondary Zones 261

        Creating Stub Zones 262

        Creating a GlobalNames Zone 262

        Configuring DNS Zone Properties 263

        Configuring Zone Types 264

        Adding Authoritative DNS Servers to a Zone 265

        Dynamic DNS, Non-Dynamic DNS, and Secure Dynamic DNS 266

        Zone Scavenging 267

        Integrating DNS with WINS 269

        Subdomains and Zone Delegation 270

    Configuring DNS Zone Transfers and Replication 274

        Active Directory DNS Replication 274

        Application Directory Partitions 274

        Replication Scope 275

        Types of Zone Transfers 277

        Full Zone Transfer 277

        Incremental Zone Transfer 278

        Configuring Zone Transfers 279

        Configuring DNS Notify 281

        Secure Zone Transfers 282

        Auditing of DNS Replication 283

    Troubleshooting DNS Zones and Replication 287

        Using the ipconfig, ping, and nslookup Commands 288

        Use of the DNSLint Tool 290

    Review All the Key Topics 291

    Complete the Tables and Lists from Memory 292

    Definition of Key Terms 292

Chapter 7 Configuring DNS Records 295

    “Do I Know This Already?” Quiz 295

    Resource Record Types and Their Uses 299

        Creating New Resource Records 300

        New Host (A or AAAA) Records 301

        New Alias (CNAME) Records 302

        New Mail Exchanger (MX) Records 303

        Additional New Resource Records 304

        Using the Command Line to Create Resource Records 307

    Configuring Resource Record Properties 308

        Configuring SOA Resource Record Properties 309

        Time to Live 311

        Configuring Name Server Resource Record Properties 311

        Registering Resource Records 314

        Using the DnsUpdateProxy Group 314

        Configuring Round Robin 316

        Enabling Netmask Ordering 317

        Configuring DNS Record Security and Auditing 317

    Review All the Key Topics 319

    Complete the Tables and Lists from Memory 319

    Definition of Key Terms 319

Chapter 8 Configuring Client Computer Name Resolution 321

    “Do I Know This Already?” Quiz 321

    Configuring DNS Client Computer Settings 326

        Specifying DNS Server Lists 326

        Configuring DNS Suffix Search Order Lists 328

        Configuring a Client Computer’s Primary DNS Suffix 330

        Using Group Policy to Configure DNS Client Settings 331

        Using the ipconfig Command to Update and Register

        DNS Records 334

        Using the dnscmd Command to Update the DNS Server

        Cache 334

    Other Types of Name Resolution 335

        HOSTS Files 335

        NetBIOS Name Resolution 337

        NetBIOS Broadcasts 337

        LMHOSTS Files 339

        WINS Servers 340

        Troubleshooting NetBIOS Problems 344

        Link Local Multicast Name Resolution 345

    Review All the Key Topics 348

    Complete the Tables and Lists from Memory 349

    Definition of Key Terms 349

Chapter 9 Configuring File Servers 351

    “Do I Know This Already?” Quiz 351

    Shared Folders in Windows Server 2008 R2 358

        Understanding the File Services Role in Windows Server 2008 R2 358

        Using the Network and Sharing Center to Configure File Sharing 360

        Sharing Files, Folders, and Printers 362

        Modifying Shared Folder Properties 363

        Mapping a Drive 367

        Using the net share Command to Manage Shared Folders 368

    NTFS Permissions 369

        NTFS File and Folder Permissions 369

        Applying NTFS Permissions 371

        Specifying Advanced Permissions 373

        Configuring NTFS Permissions Inheritance 376

        Taking Ownership of Files and Folders 377

        Effective Permissions 379

        Viewing a User’s Effective Permissions 380

        Copying and Moving Files and Folders 381

        Copying Files and Folders with NTFS Permissions 381

        Moving Files and Folders with NTFS Permissions 382

        Using the Mouse to Copy or Move Objects from One Location to Another 383

        Practical Guidelines on Sharing and Securing Folders 383

    Data Encryption 384

        Encrypting File System 384

        Encrypting File System Basics 385

        Preparing a Disk for EFS 386

        Encrypting Files 387

        Backing Up EFS Keys 389

        Decrypting Files 391

        EFS Recovery Agents 392

        EFS Group Policies 393

        BitLocker Drive Encryption 395

        Preparing Your Computer to Use BitLocker 397

        Enabling BitLocker 397

        Managing BitLocker 402

        Configuring BitLocker Group Policies 403

        Using Data Recovery Agents 405

    Additional File Server Management Resources 408

        Using Offline Files 408

        Configuring Servers for Offline Files 409

        Configuring Client Computers 411

        Configuring Offline File Policies 411

        Configuring Transparent Caching of Offline Files 413

        Configuring BranchCache 414

        Using the netsh Command to Configure BranchCache 415

        Using Group Policy to Enable BranchCache 417

        Specifying BranchCache Firewall Rules 418

        Understanding BranchCache Network Infrastructure Requirements 419

        Using BranchCache across a Virtual Private Network 419

        Managing Certificates with BranchCache 420

        Using Share and Storage Management Console 421

        Using Share and Storage Management to Provision Shared Resources and Volumes 422

        Using Share and Storage Management to Manage Shared Resources 425

    Review All the Key Topics 426

    Complete the Tables and Lists from Memory 427

    Definition of Key Terms 427

Chapter 10 Configuring Distributed File System (DFS) 429

    “Do I Know This Already?” Quiz 429

    DFS Concepts 433

        Improvements to DFS in Windows Server 2008 R2 434

        Installing DFS on a Windows Server 2008 R2 Computer 435

    Managing DFS Namespaces 438

        Creating Additional DFS Namespaces 438

        Managing Namespaces 439

        Adding Folders to DFS Namespaces 440

        Adding Namespace Servers 441

        Configuring Referrals 441

        Enabling Access-Based Enumeration of a DFS Namespace 443

        Configuring Polling of Domain Controllers 444

    Managing DFS Replication 445

        Setting Up DFS Replication 447

        Replication Topologies 449

        Working with Replication Groups 450

        Adding New Connections 450

        Adding Replicated Folders 451

        Designating Read-Only Replicated Folders 451

        Adding Members to Replication Groups 451

        Sharing or Publishing Replicated Folders 451

        Configuring Failover Cluster Support 452

        Generating Replication Health Reports 454

    Review All the Key Topics 456

    Complete the Tables and Lists from Memory 457

    Definition of Key Terms 457

Chapter 11 Configuring Backup and Restore 459

    “Do I Know This Already?” Quiz 459

    Protecting Data with Windows Backup 464

        Backup Permissions 466

        Installing Windows Server Backup 466

        Backing Up Your File Server 467

        Performing a Bare Metal Backup 472

        Scheduling a Backup 472

        Using the wbadmin Command 474

        Restoring the Backup Catalog 475

        Managing Backups Remotely 476

    Volume Shadow Copies 477

        Using Windows Explorer to Manage Shadow Copies 478

        Using the Command Line to Manage Shadow Copies 480

        Using Volume Shadow Copies to Recover a File or Folder 480

    Restoring Data from Backup 482

        Using Windows Backup to Recover Data 482

        Restoring User Profiles 485

        Recovering System State 486

        Performing a Full Server or Bare Metal Recovery of a Windows Server 2008 R2 Computer 488

        Using the wbadmin Command to Recover Your Server 491

    Review All the Key Topics 492

    Complete the Tables and Lists from Memory 493

    Definition of Key Terms 493

Chapter 12 Managing File Server Resources 495

    “Do I Know This Already?” Quiz 495

    File Server Resource Manager 500

        Installing FSRM 501

        Managing File Screening 501

        Using File Groups 502

        Creating File Screens and Templates 503

        Creating File Screen Exceptions 506

        Monitoring File Screening 506

        Managing Storage Reports 506

        Specifying Report Parameters 507

        Additional FSRM Options 508

        Scheduling Report Generation 509

        Managing File Classification 511

        Configuring File-Management Tasks 514

    Configuring Disk and Volume Quotas 516

        Using Windows Explorer to Enable Disk Quotas 516

        Using FSRM to Enable Quotas 519

        Using FSRM to Create Quota Templates 520

        Some Guidelines for Using Quotas 522

    Storage Manager for SANs 523

    Review All the Key Topics 527

    Complete the Tables and Lists from Memory 528

    Definition of Key Terms 528

Chapter 13 Configuring and Monitoring Print Services 531

    “Do I Know This Already?” Quiz 531

    Printing Terminology in Windows Server 2008 R2 537

        Printing Process 538

    Installing, Sharing, and Publishing Printers 539

        Installing the Print and Document Services Role 540

        Installing Printers 541

        Using Control Panel to Install a Printer 542

        Using the Print Management Console to Install a Printer 544

        Sharing Printers 545

        Publishing Printers in Active Directory 546

        Using Group Policy to Deploy Printer Connections 548

    Managing and Troubleshooting Printers 549

        Using the Printer Properties Dialog box 549

        General Tab 549

        Ports Tab and Printer Pooling 549

        Advanced Tab 551

        Security Tab and Printer Permissions 553

        Migrating Print Queues and Printer Settings 556

        Isolating Printer Drivers 557

        Configuring Location-Aware Printer Settings 558

        Delegating Print Management 559

        Troubleshooting Printer Problems 561

        Some Common Problems 561

        Printer Port Problems 562

        Enabling Notifications 562

    Review All the Key Topics 564

    Complete the Tables and Lists from Memory 565

    Definition of Key Terms 565

Chapter 14 Configuring Remote Access 567

    “Do I Know This Already?” Quiz 567

    Remote Access Protocols 573

        Remote Access Authentication Protocols 574

        New Features of RRAS in Windows Server 2008 576

    Configuring Dial-Up Connections 577

        Configuring a RAS Server for Dial-Up 577

        Configuring Dial-Up RAS Server Properties 579

        Enabling Modems used by the Dial-Up RAS Server 581

        Configuring Windows Server 2008 as a RAS Client 583

    Network Address Translation 584

        Enabling the NAT Server for DHCP 586

        Enabling Addresses, Services, and Ports on the NAT Server 588

        Configuring Internet Connection Sharing 589

    Virtual Private Networking 590

        How VPNs Function 591

        VPN Encapsulation 591

        Authentication 591

        Data Encryption 592

        Configuring a RRAS Server for VPN 592

        Creating and Authenticating VPN Connections 594

        Configuring VPN Connection Security 596

        Enabling VPN Reconnect 598

        Configuring Advanced Security Auditing 599

        Using Remote Access Policies 601

        Configuring VPN Packet Filters 601

    Connection Manager 603

        Installing the Connection Manager Administration Kit 605

        Using Connection Manager Administration Kit to Create a Profile 605

        Using the Connection Manager Client Interface 610

    Review All the Key Topics 612

    Complete the Tables and Lists from Memory 613

    Definition of Key Terms 613

Chapter 15 Configuring Network Policy Server (NPS) 615

    “Do I Know This Already?” Quiz 615

    Wireless Networking Protocols and Standards 619

        Wireless Networking Standards 620

        Planning the Authentication Methods for a Wireless Network 621

        Planning the Encryption Methods for a Wireless Network 622

        Wired Equivalent Privacy 622

        802.1X 622

        Use of IPSec with Wireless Networks 623

        The IEEE 802.3 Wired Standard 623

        Planning and Configuring Wireless Access Policies 623

        Creating a Wireless Access Policy for Windows Vista/7 Clients 624

        Creating a Wireless Access Policy for Windows XP Clients 628

        Configuring IEEE 802.3 Wired Access Policies 630

    RADIUS in Windows Server 2008 R2 633

        Installing NPS on a Windows Server 2008 RRAS Server 634

        Configuring the NPS Server for Wireless Access 635

        Configuring New RADIUS Clients 638

        Creating RADIUS Proxies and Proxy Groups 639

        Creating Connection Request Policies 641

        Configuring RADIUS Accounting 644

        Configuring NPS Templates 647

    Review All the Key Topics 649

    Complete the Tables and Lists from Memory 650

    Definition of Key Terms 650

Chapter 16 Configuring Network Access Protection (NAP) 653

    “Do I Know This Already?” Quiz 653

    Concepts of NAP 658

        Components of a Typical NAP Deployment 660

        What’s New with NAP in Windows Server 2008 R2 662

    NAP Enforcement 663

        DHCP Enforcement 663

        Enabling NAP on the DHCP Server’s Scopes 667

        VPN Enforcement 668

        IPSec Enforcement 670

        Installing and Configuring an HRA Server 671

        Configuring NAP for IPSec Enforcement 674

        Configuring the HRA for Health Certificates 674

        Using Group Policy to Specify IPSec Enforcement 675

        802.1X Enforcement 676

        RDS Enforcement 678

    System Health Validation 680

        Configuring the Windows Security Health Validator 681

        Configuring Error Codes 683

        Using Multi-Configuration SHV 683

        Configuring NAP Policies 684

    Review All the Key Topics 689

    Definition of Key Terms 690

Chapter 17 Configuring DirectAccess 693

    “Do I Know This Already?” Quiz 693

    Concepts of DirectAccess 698

        DirectAccess Server Requirements 700

        Using IPv6 with DirectAccess 701

        Using Network Access Protection 701

        DirectAccess Client Requirements 702

        DirectAccess Connection Process 702

    Configuring the DirectAccess Server 703

        Installing and Configuring the DirectAccess Server Feature 703

        DirectAccess and the Perimeter Network 707

        Configuring Authentication 708

    Group Policy and DirectAccess 708

        Using Group Policy to Configure DirectAccess Clients 708

        Name Resolution Policy Table 710

    Using NRPT Exemptions 714

    Review All the Key Topics 716

    Complete the Tables and Lists from Memory 716

    Definitions of Key Terms 716

Chapter 18 Windows Server Update Services (WSUS) Server Settings 719

    “Do I Know This Already?” Quiz 719

    Concepts of WSUS 724

        Purposes of Windows Update and WSUS 724

        New Features of WSUS 3.0 725

    Installing and Configuring a WSUS Server 727

        Installing WSUS on a Windows Server 2008 R2 Computer 728

        Installing Microsoft Report Viewer Redistributable 2008 731

        Getting Started with WSUS 731

        Configuring WSUS Options 733

        Testing Updates 738

        Using Computer Groups 738

        Configuring Client-Side Targeting 741

        Approving Updates 742

        Declining Updates 744

        Viewing Reports 745

        Using WSUS on a Disconnected Network 747

    Configuring Client Computers for WSUS 748

    Review All the Key Topics 754

    Complete the Tables and Lists from Memory 755

    Definition of Key Terms 755

Chapter 19 Configuring Performance Monitoring 757

    “Do I Know This Already?” Quiz 757

    Performance Monitor 762

        Using Performance Monitor to Collect Real-Time Data 764

        Customizing Performance Monitor 766

        Permissions Required to Run Performance Monitor 767

    Data Collector Sets 768

        System-Defined Data Collector Sets 768

        Using System-Defined Data Collector Sets 769

        Viewing Logged Performance Data 771

        User-Defined Data Collector Sets 771

        Creating a Custom Data Collector Set 774

        Using Performance Monitor to Create a Data Collector Set 776

        A Few Best Practices for Logging Server Performance 777

        Command-Line Utilities 779

        Monitoring Print Servers 779

    Analyzing Performance Data 780

        Optimizing and Troubleshooting Memory Performance 781

        Optimizing and Troubleshooting Processor Utilization 783

        Optimizing and Troubleshooting Disk Performance 784

        Optimizing and Troubleshooting Network Performance 786

    Reliability Monitor 787

        Resource Monitor 789

    Review All the Key Topics 792

    Complete the Tables and Lists from Memory 793

    Definition of Key Terms 793

Chapter 20 Configuring Event Logs 795

    “Do I Know This Already?” Quiz 795

    Event Viewer 799

        Viewing Logs in Event Viewer 800

        Event Log Properties 802

        Applications and Services Logs 804

    Customizing Event Logs 805

        Creating and Using Custom Views 807

        Exporting and Importing Custom Views 808

    Configuring Event Log Subscriptions 809

        Configuring the Source Computers to Forward Events 810

        Configuring the Collector Computer to Forward Receive Events 810

        Configuring Event Log Subscriptions 811

    Configuring Tasks from Events 814

    Review All the Key Topics 816

    Complete the Tables and Lists from Memory 817

    Definitions of Key Terms 817

Chapter 21 Collecting Network Data 819

    “Do I Know This Already?” Quiz 819

    Simple Network Management Protocol 824

        How SNMP Functions 824

        Management Information Base 824

        SNMP Messages 825

        SNMP Communities 826

        How SNMP Functions 827

        Installing and Configuring SNMP 828

    Network Monitor 833

        Concepts of Protocol Analyzers 833

        Placement of Protocol Analyzers 834

        Installing and Running Microsoft Network Monitor 835

        Using Network Monitor to Capture Network Data 837

        Filtering Captured Network Data 839

        Using a Capture Filter 841

        Configuring Network Monitor Options 842

        Using Aliases 844

        Performing a Capture from the Command Prompt 845

    Connection Security Rules Monitoring 846

        Configuring Authentication Properties 848

    Review All the Key Topics 850

    Complete the Tables and Lists from Memory 851

    Definitions of Key Terms 851

Practice Exam 853

Answers to Practice Exam 921

APPENDIX A Answers to the “Do I Know This Already?” Quizzes 961

CD-only Elements:

APPENDIX B Memory Tables 2

APPENDIX C Memory Tables Answer Key 2

Glossary 2

TOC, 9780789748300, 1/17/2012

Updates

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020