Cargando…

ExamInsight for MCP / MCSE certification : security for a Microsoft Windows 2000 network exam 70-220 /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Simpson, Patrick
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Friendswood, Tex. : TotalRecall Publications, ©2003.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Table of Contents
  • ExamInsight For Exam 70-220
  • About the Author
  • About the Contributing Author
  • About The Book
  • Introduction
  • Forward
  • 70-220 Exam Specifications
  • Networking Terminology
  • Chapter 1: Analyzing Business Requirements
  • I Introduction
  • Getting Ready
  • Questions
  • Getting Ready
  • Answers
  • II Analyzing the business models
  • The Company Model and Geographical Scope:
  • Regional Model:
  • National Model:
  • International Model:
  • Subsidiaries:
  • Branch Offices:
  • Pop quiz 1.1
  • IIIAnalyzing the Company Process
  • Information Flow Process.
  • Communication Flow Process:
  • The Product Life-Cycle Process:
  • Decision Making Process:
  • Pop Quiz 1.2
  • IV Analyze Organizational Structures
  • Management Model:
  • Company Organization:
  • Vendors/Partners/Customer Relations:
  • Acquisition Plans:
  • Pop Quiz 1.3
  • V Analyzing Company Strategies
  • Company Priorities:
  • Company Projected Growth and Growth Strategy:
  • Relevant Laws and Regulations:
  • The Company's Tolerance for Risk:
  • Total Cost of Operations:
  • Pop quiz 1.4
  • VI Business and Security Requirements
  • Business Requirements for the End User.
  • Security Requirements for the End User:
  • Pop quiz 1.5
  • VII Analyze the Structure of IT Management
  • Centralized Administration:
  • Decentralized Administration:
  • The Funding Model:
  • Outsourcing:
  • The Decision Making Process:
  • The Change Management Process:
  • Pop quiz 1.6
  • VIII Analyzing the Companies Current Model
  • Physical Model:
  • Information Security Model:
  • IX Analyze Security Risks
  • Pop Quiz 1.7
  • X Chapter 1: Summary
  • XI Chapter 1: Post-Assessment (Answers appear in Appendix A.)
  • Chapter 2: Analyzing Technical Requirements
  • I Introduction
  • Information.
  • Getting Ready
  • Questions
  • Getting Ready
  • Answers
  • II Evaluate Company Technical Environment
  • Company Size, User, and Resource Distribution:
  • Geographic Work Sites and Remote Sites Connectivity:
  • Net Available Bandwidth:
  • Performance Requirements:
  • Methods for Accessing Data and Systems:
  • Network Roles and Responsibilities:
  • Administrative Network Roles and Responsibilities
  • User Network Roles and Responsibilities
  • Service Network Roles and Responsibilities
  • Resource Ownership Network Roles and Responsibilities
  • Application Network Roles
  • Pop Quiz 2.1.
  • III Analyze the Security Design
  • Systems And Applications:
  • Planned Upgrades and Rollouts:
  • Technical Support Structure:
  • Planned Network and Systems Management:
  • Pop Quiz 2.2
  • VI Chapter 2: Summary
  • V Chapter 2: Post-Assessment (Answers appear in Appendix A.)
  • Chapter 3: Analyzing Security Requirements
  • I Introduction
  • Information:
  • Getting Ready
  • Questions
  • Getting Ready
  • Answers
  • II Design a Security Baseline
  • Domain Controllers:
  • Operations Masters:
  • Application Servers:
  • File and Print Servers:
  • RAS Servers:
  • Desktop Computers.