MCTS 70-642 Cert Guide
Home > Computing and Information Technology > Computer certification > MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring
MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring

MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Learn, prepare, and practice for Microsoft MCTS 70-642 exam success with this MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide from Pearson IT Certification, a leader in IT Certification learning.   This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Master Microsoft’s MCTS 70-642 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide is a best-of-breed exam study guide. Best-selling author and expert instructor Don Poulton shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.   The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.   Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.   The study guide helps you master all the topics on the MCTS 70-642 exam, including IPv4/IPv6 address configuration and troubleshooting DHCP configuration, installation, management, and troubleshooting Routing configuration, tables, RRAS, management, and maintenance Windows Firewall, Advanced Security, and IPsec DNS installation, configuration, zones, replication, and records Client name resolution File services, shared folders, permissions, and encryption DFS, namespaces, and replication Backup/restore File Server Resource Manager (FSRM) Print services Remote Access, VPNs, and NAT  

Table of Contents:
Introduction 3 Chapter 1 Configuring IPv4 and IPv6 Addressing 27     “Do I Know This Already?” Quiz 28     Concepts of TCP/IP 33         TCP/IP History in Brief 33         TCP/IP Protocol Stack 34         OSI Reference Model 34         Four-Layer TCP/IP Model 35         Application Layer 36         Transport Layer 36         Internet Layer 37         Network Interface Layer 37         TCP/IP Component Protocols 38         Transmission Control Protocol 38         User Datagram Protocol 38         Internet Protocol 39         Address Resolution Protocol 39         Internet Control Message Protocol 39         Internet Group Management Protocol 40         Application Layer Protocols 40     IPv4 Addressing 41         Static IPv4 Addressing 42         Subnetting and Supernetting in IPv4 44         Using Subnetting to Divide a Network 44         Using Supernetting to Provide for Additional Hosts on a Network 47         Understanding Private IPv4 Networks 48         Dynamic IP Addressing 48         Configuring IPv4 Address Options 48         Using the Command Line to Configure IPv4 Addressing Options 52     IPv6 Addressing 54         IPv6 Address Syntax 56         IPv6 Prefixes 56         Types of IPv6 Addresses 56         Connecting to a TCP/IP Version 6 Network 59         Interoperability Between IPv4 and IPv6 Addresses 62         Compatibility Addresses 63         ISATAP Addresses 63         6to4 Addresses 64         Teredo Addresses 65         Using Group Policy to Configure IPv6 Transition Technologies 66     Resolving IPv4 and IPv6 Network Connectivity Issues 67         Windows Server 2008 Network Diagnostics Tools 68         Using TCP/IP Utilities to Troubleshoot TCP/IP 70         ARP 70         FTP 70         ipconfig 71         Nbtstat 72         Netstat 72         Nslookup 73         ping 73         tracert 74         pathping 75         Troubleshooting IPv4 and IPv6 Problems 75         Suggested Response to a Connectivity Problem 75         Network Discovery 76         Incorrect IPv4 Address or Subnet Mask 77         Incorrect Default Gateway 78         Unable to Connect to a DHCP Server 78         Duplicate IP Address 78         Unable to Configure an Alternate TCP/IPv4 Configuration 78         Using Event Viewer to Check Network Problems 79         Additional Troubleshooting Hints When Using IPv6 79     Review All the Key Topics 80     Complete the Tables and Lists from Memory 81     Definition of Key Terms 81 Chapter 2 Configuring Dynamic Host Configuration Protocol (DHCP) 83     “Do I Know This Already?” Quiz 83     How DHCP Works 89         Four-Phase DHCP IPv4 Leasing Process 89         IP Lease Request (DHCPDISCOVER) 90         IP Lease Offer (DHCPOFFER) 91         IP Lease Selection (DHCPREQUEST) 91         IP Lease Acknowledgment (DHCPACK) 92         Renewing an IPv4 Lease 92         How DHCPv6 Works 93     Installing and Configuring a DHCP Server 95         Using the Command Line to Install DHCP 100     DHCP Scopes and Options 101         Creating DHCP Scopes 101         Using the Command Line to Create Scopes 104         Superscopes 104         Multicast Scopes 105         Split Scopes 106         Exclusions 107         Configuring DHCP Scope Properties 107         Configuring DHCP Options 108         Server Options 110         Scope Options 111         Option Classes 112         Client Reservations and Options 114     Managing and Troubleshooting a DHCP Server 116         Authorizing a DHCP Server in Active Directory 116         Configuring DHCP Relay Agents 117         PXE Boot 120         Monitoring and Troubleshooting a DHCP Server 121     Review All the Key Topics 124     Complete the Tables and Lists from Memory 1 25     Definition of Key Terms 125 Chapter 3 Configuring Routing 127     “Do I Know This Already?” Quiz 127     The Need for Routing and Routing Tables 132         Routing Protocols 133         Routing Table 135     Routing and Remote Access Service (RRAS) in Windows Server 2008 R2 137         Configuring RRAS as a Router 140         Configuring RIP 142         Configuring Static Routing 145         Using the RRAS Snap-In to Create a Static Route 145         Using the route Command to Create a Static Route 146         Choosing a Default Gateway 147         Displaying the Static Routing Table 147     Managing and Maintaining Routing Servers 148         Demand-Dial Routing 148         Establishing a Demand-Dial Interface 148         Configuring Demand-Dial Interface Properties 150         Specifying Packet Filtering 151         IGMP Proxy 153     Review All the Key Topics 156     Complete the Tables and Lists from Memory 157     Definition of Key Terms 157 Chapter 4 Configuring Windows Firewall with Advanced Security 159     “Do I Know This Already?” Quiz 159     Configuring Windows Firewall 165         Basic Windows Firewall Configuration 167     Using the Windows Firewall with Advanced Security Snap-In 172         Configuring Multiple Firewall Profiles 174         Configuring New Firewall Rules 176         Configuring Inbound Rules or Outbound Rules 176         Configuring Connection Security Rules 180         Configuring Rule Properties 184         Authorizing Users and Computers 185         Modifying Rule Scope 187         Additional Rule Properties 188         Configuring Notifications 189         Importing and Exporting Policies 190     Using IPSec to Secure Network Communications 191         IPSec Modes 191         IPSec Encryption 193         Using Group Policy to Create IPSec Policies 194         Using Group Policy to Configure Windows Firewall Policies 198         Creating Windows Firewall with Advanced Security Policies 198         Windows Firewall Group Policy Property Settings 200         Isolation Policies 201     Review All the Key Topics 202     Definition of Key Terms 203 Chapter 5 Installing and Configuring Domain Name System (DNS) 205     “Do I Know This Already?” Quiz 206     Introduction to DNS 210         Hierarchical Nature of DNS 211         Root-Level Domains 212         Top-Level Domains 212         Second-Level Domain Names 214         Host Names 214         DNS Name Resolution Process 215         Recursive Queries 215         Iterative Queries 216         Reverse Lookup Queries 217     Installing DNS in Windows Server 2008 R2 218         Using the Command Line to Install DNS 221         Using the Command-Line for DNS Server Administration 222     Configuring DNS Server Properties 223         Interfaces Tab 223         Forwarders Tab 224         Conditional Forwarders 227         Advanced Tab 228         Server Options 229         Disable Recursion 229         Name Checking 230         Loading Zone Data 231         Root Hints Tab 231         Debug Logging Tab 233         Event Logging Tab 235         Trust Anchors Tab 235         Monitoring Tab 237         DNS Socket Pooling 238         DNS Cache Locking 239     Review All the Key Topics 241     Definition of Key Terms 241 Chapter 6 Configuring DNS Zones and Replication 243     “Do I Know This Already?” Quiz 243     Zone Types and Their Uses 249         DNS Zone Types 249         Primary Zones 249         Secondary Zones 250         Active Directory–Integrated Zones 250         Stub Zones 251         Forward and Reverse Lookup Zones 251         GlobalNames Zones 252         DNS Name Server Roles 253         Primary Name Servers 253         Secondary Name Servers 254         Caching-Only Servers 255         Forwarders 255         Slave Servers 256     Configuring DNS Zones 257         Creating New DNS Zones 257         Creating a Reverse Lookup Zone 259         Creating Secondary Zones 261         Creating Stub Zones 262         Creating a GlobalNames Zone 262         Configuring DNS Zone Properties 263         Configuring Zone Types 264         Adding Authoritative DNS Servers to a Zone 265         Dynamic DNS, Non-Dynamic DNS, and Secure Dynamic DNS 266         Zone Scavenging 267         Integrating DNS with WINS 269         Subdomains and Zone Delegation 270     Configuring DNS Zone Transfers and Replication 274         Active Directory DNS Replication 274         Application Directory Partitions 274         Replication Scope 275         Types of Zone Transfers 277         Full Zone Transfer 277         Incremental Zone Transfer 278         Configuring Zone Transfers 279         Configuring DNS Notify 281         Secure Zone Transfers 282         Auditing of DNS Replication 283     Troubleshooting DNS Zones and Replication 287         Using the ipconfig, ping, and nslookup Commands 288         Use of the DNSLint Tool 290     Review All the Key Topics 291     Complete the Tables and Lists from Memory 292     Definition of Key Terms 292 Chapter 7 Configuring DNS Records 295     “Do I Know This Already?” Quiz 295     Resource Record Types and Their Uses 299         Creating New Resource Records 300         New Host (A or AAAA) Records 301         New Alias (CNAME) Records 302         New Mail Exchanger (MX) Records 303         Additional New Resource Records 304         Using the Command Line to Create Resource Records 307     Configuring Resource Record Properties 308         Configuring SOA Resource Record Properties 309         Time to Live 311         Configuring Name Server Resource Record Properties 311         Registering Resource Records 314         Using the DnsUpdateProxy Group 314         Configuring Round Robin 316         Enabling Netmask Ordering 317         Configuring DNS Record Security and Auditing 317     Review All the Key Topics 319     Complete the Tables and Lists from Memory 319     Definition of Key Terms 319 Chapter 8 Configuring Client Computer Name Resolution 321     “Do I Know This Already?” Quiz 321     Configuring DNS Client Computer Settings 326         Specifying DNS Server Lists 326         Configuring DNS Suffix Search Order Lists 328         Configuring a Client Computer’s Primary DNS Suffix 330         Using Group Policy to Configure DNS Client Settings 331         Using the ipconfig Command to Update and Register         DNS Records 334         Using the dnscmd Command to Update the DNS Server         Cache 334     Other Types of Name Resolution 335         HOSTS Files 335         NetBIOS Name Resolution 337         NetBIOS Broadcasts 337         LMHOSTS Files 339         WINS Servers 340         Troubleshooting NetBIOS Problems 344         Link Local Multicast Name Resolution 345     Review All the Key Topics 348     Complete the Tables and Lists from Memory 349     Definition of Key Terms 349 Chapter 9 Configuring File Servers 351     “Do I Know This Already?” Quiz 351     Shared Folders in Windows Server 2008 R2 358         Understanding the File Services Role in Windows Server 2008 R2 358         Using the Network and Sharing Center to Configure File Sharing 360         Sharing Files, Folders, and Printers 362         Modifying Shared Folder Properties 363         Mapping a Drive 367         Using the net share Command to Manage Shared Folders 368     NTFS Permissions 369         NTFS File and Folder Permissions 369         Applying NTFS Permissions 371         Specifying Advanced Permissions 373         Configuring NTFS Permissions Inheritance 376         Taking Ownership of Files and Folders 377         Effective Permissions 379         Viewing a User’s Effective Permissions 380         Copying and Moving Files and Folders 381         Copying Files and Folders with NTFS Permissions 381         Moving Files and Folders with NTFS Permissions 382         Using the Mouse to Copy or Move Objects from One Location to Another 383         Practical Guidelines on Sharing and Securing Folders 383     Data Encryption 384         Encrypting File System 384         Encrypting File System Basics 385         Preparing a Disk for EFS 386         Encrypting Files 387         Backing Up EFS Keys 389         Decrypting Files 391         EFS Recovery Agents 392         EFS Group Policies 393         BitLocker Drive Encryption 395         Preparing Your Computer to Use BitLocker 397         Enabling BitLocker 397         Managing BitLocker 402         Configuring BitLocker Group Policies 403         Using Data Recovery Agents 405     Additional File Server Management Resources 408         Using Offline Files 408         Configuring Servers for Offline Files 409         Configuring Client Computers 411         Configuring Offline File Policies 411         Configuring Transparent Caching of Offline Files 413         Configuring BranchCache 414         Using the netsh Command to Configure BranchCache 415         Using Group Policy to Enable BranchCache 417         Specifying BranchCache Firewall Rules 418         Understanding BranchCache Network Infrastructure Requirements 419         Using BranchCache across a Virtual Private Network 419         Managing Certificates with BranchCache 420         Using Share and Storage Management Console 421         Using Share and Storage Management to Provision Shared Resources and Volumes 422         Using Share and Storage Management to Manage Shared Resources 425     Review All the Key Topics 426     Complete the Tables and Lists from Memory 427     Definition of Key Terms 427 Chapter 10 Configuring Distributed File System (DFS) 429     “Do I Know This Already?” Quiz 429     DFS Concepts 433         Improvements to DFS in Windows Server 2008 R2 434         Installing DFS on a Windows Server 2008 R2 Computer 435     Managing DFS Namespaces 438         Creating Additional DFS Namespaces 438         Managing Namespaces 439         Adding Folders to DFS Namespaces 440         Adding Namespace Servers 441         Configuring Referrals 441         Enabling Access-Based Enumeration of a DFS Namespace 443         Configuring Polling of Domain Controllers 444     Managing DFS Replication 445         Setting Up DFS Replication 447         Replication Topologies 449         Working with Replication Groups 450         Adding New Connections 450         Adding Replicated Folders 451         Designating Read-Only Replicated Folders 451         Adding Members to Replication Groups 451         Sharing or Publishing Replicated Folders 451         Configuring Failover Cluster Support 452         Generating Replication Health Reports 454     Review All the Key Topics 456     Complete the Tables and Lists from Memory 457     Definition of Key Terms 457 Chapter 11 Configuring Backup and Restore 459     “Do I Know This Already?” Quiz 459     Protecting Data with Windows Backup 464         Backup Permissions 466         Installing Windows Server Backup 466         Backing Up Your File Server 467         Performing a Bare Metal Backup 472         Scheduling a Backup 472         Using the wbadmin Command 474         Restoring the Backup Catalog 475         Managing Backups Remotely 476     Volume Shadow Copies 477         Using Windows Explorer to Manage Shadow Copies 478         Using the Command Line to Manage Shadow Copies 480         Using Volume Shadow Copies to Recover a File or Folder 480     Restoring Data from Backup 482         Using Windows Backup to Recover Data 482         Restoring User Profiles 485         Recovering System State 486         Performing a Full Server or Bare Metal Recovery of a Windows Server 2008 R2 Computer 488         Using the wbadmin Command to Recover Your Server 491     Review All the Key Topics 492     Complete the Tables and Lists from Memory 493     Definition of Key Terms 493 Chapter 12 Managing File Server Resources 495     “Do I Know This Already?” Quiz 495     File Server Resource Manager 500         Installing FSRM 501         Managing File Screening 501         Using File Groups 502         Creating File Screens and Templates 503         Creating File Screen Exceptions 506         Monitoring File Screening 506         Managing Storage Reports 506         Specifying Report Parameters 507         Additional FSRM Options 508         Scheduling Report Generation 509         Managing File Classification 511         Configuring File-Management Tasks 514     Configuring Disk and Volume Quotas 516         Using Windows Explorer to Enable Disk Quotas 516         Using FSRM to Enable Quotas 519         Using FSRM to Create Quota Templates 520         Some Guidelines for Using Quotas 522     Storage Manager for SANs 523     Review All the Key Topics 527     Complete the Tables and Lists from Memory 528     Definition of Key Terms 528 Chapter 13 Configuring and Monitoring Print Services 531     “Do I Know This Already?” Quiz 531     Printing Terminology in Windows Server 2008 R2 537         Printing Process 538     Installing, Sharing, and Publishing Printers 539         Installing the Print and Document Services Role 540         Installing Printers 541         Using Control Panel to Install a Printer 542         Using the Print Management Console to Install a Printer 544         Sharing Printers 545         Publishing Printers in Active Directory 546         Using Group Policy to Deploy Printer Connections 548     Managing and Troubleshooting Printers 549         Using the Printer Properties Dialog box 549         General Tab 549         Ports Tab and Printer Pooling 549         Advanced Tab 551         Security Tab and Printer Permissions 553         Migrating Print Queues and Printer Settings 556         Isolating Printer Drivers 557         Configuring Location-Aware Printer Settings 558         Delegating Print Management 559         Troubleshooting Printer Problems 561         Some Common Problems 561         Printer Port Problems 562         Enabling Notifications 562     Review All the Key Topics 564     Complete the Tables and Lists from Memory 565     Definition of Key Terms 565 Chapter 14 Configuring Remote Access 567     “Do I Know This Already?” Quiz 567     Remote Access Protocols 573         Remote Access Authentication Protocols 574         New Features of RRAS in Windows Server 2008 576     Configuring Dial-Up Connections 577         Configuring a RAS Server for Dial-Up 577         Configuring Dial-Up RAS Server Properties 579         Enabling Modems used by the Dial-Up RAS Server 581         Configuring Windows Server 2008 as a RAS Client 583     Network Address Translation 584         Enabling the NAT Server for DHCP 586         Enabling Addresses, Services, and Ports on the NAT Server 588         Configuring Internet Connection Sharing 589     Virtual Private Networking 590         How VPNs Function 591         VPN Encapsulation 591         Authentication 591         Data Encryption 592         Configuring a RRAS Server for VPN 592         Creating and Authenticating VPN Connections 594         Configuring VPN Connection Security 596         Enabling VPN Reconnect 598         Configuring Advanced Security Auditing 599         Using Remote Access Policies 601         Configuring VPN Packet Filters 601     Connection Manager 603         Installing the Connection Manager Administration Kit 605         Using Connection Manager Administration Kit to Create a Profile 605         Using the Connection Manager Client Interface 610     Review All the Key Topics 612     Complete the Tables and Lists from Memory 613     Definition of Key Terms 613 Chapter 15 Configuring Network Policy Server (NPS) 615     “Do I Know This Already?” Quiz 615     Wireless Networking Protocols and Standards 619         Wireless Networking Standards 620         Planning the Authentication Methods for a Wireless Network 621         Planning the Encryption Methods for a Wireless Network 622         Wired Equivalent Privacy 622         802.1X 622         Use of IPSec with Wireless Networks 623         The IEEE 802.3 Wired Standard 623         Planning and Configuring Wireless Access Policies 623         Creating a Wireless Access Policy for Windows Vista/7 Clients 624         Creating a Wireless Access Policy for Windows XP Clients 628         Configuring IEEE 802.3 Wired Access Policies 630     RADIUS in Windows Server 2008 R2 633         Installing NPS on a Windows Server 2008 RRAS Server 634         Configuring the NPS Server for Wireless Access 635         Configuring New RADIUS Clients 638         Creating RADIUS Proxies and Proxy Groups 639         Creating Connection Request Policies 641         Configuring RADIUS Accounting 644         Configuring NPS Templates 647     Review All the Key Topics 649     Complete the Tables and Lists from Memory 650     Definition of Key Terms 650 Chapter 16 Configuring Network Access Protection (NAP) 653     “Do I Know This Already?” Quiz 653     Concepts of NAP 658         Components of a Typical NAP Deployment 660         What’s New with NAP in Windows Server 2008 R2 662     NAP Enforcement 663         DHCP Enforcement 663         Enabling NAP on the DHCP Server’s Scopes 667         VPN Enforcement 668         IPSec Enforcement 670         Installing and Configuring an HRA Server 671         Configuring NAP for IPSec Enforcement 674         Configuring the HRA for Health Certificates 674         Using Group Policy to Specify IPSec Enforcement 675         802.1X Enforcement 676         RDS Enforcement 678     System Health Validation 680         Configuring the Windows Security Health Validator 681         Configuring Error Codes 683         Using Multi-Configuration SHV 683         Configuring NAP Policies 684     Review All the Key Topics 689     Definition of Key Terms 690 Chapter 17 Configuring DirectAccess 693     “Do I Know This Already?” Quiz 693     Concepts of DirectAccess 698         DirectAccess Server Requirements 700         Using IPv6 with DirectAccess 701         Using Network Access Protection 701         DirectAccess Client Requirements 702         DirectAccess Connection Process 702     Configuring the DirectAccess Server 703         Installing and Configuring the DirectAccess Server Feature 703         DirectAccess and the Perimeter Network 707         Configuring Authentication 708     Group Policy and DirectAccess 708         Using Group Policy to Configure DirectAccess Clients 708         Name Resolution Policy Table 710     Using NRPT Exemptions 714     Review All the Key Topics 716     Complete the Tables and Lists from Memory 716     Definitions of Key Terms 716 Chapter 18 Windows Server Update Services (WSUS) Server Settings 719     “Do I Know This Already?” Quiz 719     Concepts of WSUS 724         Purposes of Windows Update and WSUS 724         New Features of WSUS 3.0 725     Installing and Configuring a WSUS Server 727         Installing WSUS on a Windows Server 2008 R2 Computer 728         Installing Microsoft Report Viewer Redistributable 2008 731         Getting Started with WSUS 731         Configuring WSUS Options 733         Testing Updates 738         Using Computer Groups 738         Configuring Client-Side Targeting 741         Approving Updates 742         Declining Updates 744         Viewing Reports 745         Using WSUS on a Disconnected Network 747     Configuring Client Computers for WSUS 748     Review All the Key Topics 754     Complete the Tables and Lists from Memory 755     Definition of Key Terms 755 Chapter 19 Configuring Performance Monitoring 757     “Do I Know This Already?” Quiz 757     Performance Monitor 762         Using Performance Monitor to Collect Real-Time Data 764         Customizing Performance Monitor 766         Permissions Required to Run Performance Monitor 767     Data Collector Sets 768         System-Defined Data Collector Sets 768         Using System-Defined Data Collector Sets 769         Viewing Logged Performance Data 771         User-Defined Data Collector Sets 771         Creating a Custom Data Collector Set 774         Using Performance Monitor to Create a Data Collector Set 776         A Few Best Practices for Logging Server Performance 777         Command-Line Utilities 779         Monitoring Print Servers 779     Analyzing Performance Data 780         Optimizing and Troubleshooting Memory Performance 781         Optimizing and Troubleshooting Processor Utilization 783         Optimizing and Troubleshooting Disk Performance 784         Optimizing and Troubleshooting Network Performance 786     Reliability Monitor 787         Resource Monitor 789     Review All the Key Topics 792     Complete the Tables and Lists from Memory 793     Definition of Key Terms 793 Chapter 20 Configuring Event Logs 795     “Do I Know This Already?” Quiz 795     Event Viewer 799         Viewing Logs in Event Viewer 800         Event Log Properties 802         Applications and Services Logs 804     Customizing Event Logs 805         Creating and Using Custom Views 807         Exporting and Importing Custom Views 808     Configuring Event Log Subscriptions 809         Configuring the Source Computers to Forward Events 810         Configuring the Collector Computer to Forward Receive Events 810         Configuring Event Log Subscriptions 811     Configuring Tasks from Events 814     Review All the Key Topics 816     Complete the Tables and Lists from Memory 817     Definitions of Key Terms 817 Chapter 21 Collecting Network Data 819     “Do I Know This Already?” Quiz 819     Simple Network Management Protocol 824         How SNMP Functions 824         Management Information Base 824         SNMP Messages 825         SNMP Communities 826         How SNMP Functions 827         Installing and Configuring SNMP 828     Network Monitor 833         Concepts of Protocol Analyzers 833         Placement of Protocol Analyzers 834         Installing and Running Microsoft Network Monitor 835         Using Network Monitor to Capture Network Data 837         Filtering Captured Network Data 839         Using a Capture Filter 841         Configuring Network Monitor Options 842         Using Aliases 844         Performing a Capture from the Command Prompt 845     Connection Security Rules Monitoring 846         Configuring Authentication Properties 848     Review All the Key Topics 850     Complete the Tables and Lists from Memory 851     Definitions of Key Terms 851 Practice Exam 853 Answers to Practice Exam 921 APPENDIX A Answers to the “Do I Know This Already?” Quizzes 961 CD-only Elements: APPENDIX B Memory Tables 2 APPENDIX C Memory Tables Answer Key 2 Glossary 2 TOC, 9780789748300, 1/17/2012  

About the Author :
Don Poulton (A+, Network+, Security+, MCSA, MCSE) is an independent consultant who has been involved with computers since the days of 80-column punch cards. After a career of more than 20 years in environmental science, Don switched careers and trained as a Windows NT 4.0 MCSE. He has been involved in consulting with a couple of small training providers as a technical writer, during which time he wrote training and exam-prep materials for Windows NT 4.0, Windows 2000, and Windows XP. Don has written or contributed to several titles, including Security+ Lab Manual (Que, 2004), MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) (Que, 2004), MCSE 70-294 Exam Prep: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Que, 2006), MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring (Que, 2008), MCTS 70-680 Exam Prep: Microsoft Windows 7, Configuring (Que, 2011) , and MCTS 70-640 Exam Prep: Microsoft Windows Server 2008 Active Directory, Configuring (Que, 2011).   In addition, Don has worked on programming projects, both in his days as an environmental scientist and, more recently, with Visual Basic to update an older statistical package used for multivariate analysis of sediment contaminants.   When not working on computers, Don is an avid amateur photographer who has had his photos displayed in international competitions and published in magazines such as Michigan Natural Resources Magazine and National Geographic Traveler . Don also enjoys traveling and keeping fit.   Don lives in Burlington, Ontario, with his wife, Terry.  


Best Sellers


Product Details
  • ISBN-13: 9780132802178
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson IT Certification
  • Language: English
  • Sub Title: Windows Server 2008 Network Infrastructure, Configuring
  • ISBN-10: 0132802171
  • Publisher Date: 24 Jan 2012
  • Binding: Digital download
  • No of Pages: 1111
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring
Pearson Education (US) -
MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!