ExamInsight for MCP / MCSE certification : security for a Microsoft Windows 2000 network exam 70-220 /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Friendswood, Tex. :
TotalRecall Publications,
©2003.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Table of Contents
- ExamInsight For Exam 70-220
- About the Author
- About the Contributing Author
- About The Book
- Introduction
- Forward
- 70-220 Exam Specifications
- Networking Terminology
- Chapter 1: Analyzing Business Requirements
- I Introduction
- Getting Ready
- Questions
- Getting Ready
- Answers
- II Analyzing the business models
- The Company Model and Geographical Scope:
- Regional Model:
- National Model:
- International Model:
- Subsidiaries:
- Branch Offices:
- Pop quiz 1.1
- IIIAnalyzing the Company Process
- Information Flow Process.
- Communication Flow Process:
- The Product Life-Cycle Process:
- Decision Making Process:
- Pop Quiz 1.2
- IV Analyze Organizational Structures
- Management Model:
- Company Organization:
- Vendors/Partners/Customer Relations:
- Acquisition Plans:
- Pop Quiz 1.3
- V Analyzing Company Strategies
- Company Priorities:
- Company Projected Growth and Growth Strategy:
- Relevant Laws and Regulations:
- The Company's Tolerance for Risk:
- Total Cost of Operations:
- Pop quiz 1.4
- VI Business and Security Requirements
- Business Requirements for the End User.
- Security Requirements for the End User:
- Pop quiz 1.5
- VII Analyze the Structure of IT Management
- Centralized Administration:
- Decentralized Administration:
- The Funding Model:
- Outsourcing:
- The Decision Making Process:
- The Change Management Process:
- Pop quiz 1.6
- VIII Analyzing the Companies Current Model
- Physical Model:
- Information Security Model:
- IX Analyze Security Risks
- Pop Quiz 1.7
- X Chapter 1: Summary
- XI Chapter 1: Post-Assessment (Answers appear in Appendix A.)
- Chapter 2: Analyzing Technical Requirements
- I Introduction
- Information.
- Getting Ready
- Questions
- Getting Ready
- Answers
- II Evaluate Company Technical Environment
- Company Size, User, and Resource Distribution:
- Geographic Work Sites and Remote Sites Connectivity:
- Net Available Bandwidth:
- Performance Requirements:
- Methods for Accessing Data and Systems:
- Network Roles and Responsibilities:
- Administrative Network Roles and Responsibilities
- User Network Roles and Responsibilities
- Service Network Roles and Responsibilities
- Resource Ownership Network Roles and Responsibilities
- Application Network Roles
- Pop Quiz 2.1.
- III Analyze the Security Design
- Systems And Applications:
- Planned Upgrades and Rollouts:
- Technical Support Structure:
- Planned Network and Systems Management:
- Pop Quiz 2.2
- VI Chapter 2: Summary
- V Chapter 2: Post-Assessment (Answers appear in Appendix A.)
- Chapter 3: Analyzing Security Requirements
- I Introduction
- Information:
- Getting Ready
- Questions
- Getting Ready
- Answers
- II Design a Security Baseline
- Domain Controllers:
- Operations Masters:
- Application Servers:
- File and Print Servers:
- RAS Servers:
- Desktop Computers.