Certificazioni MICROSOFT: 70 - 218

Managing a Microsoft Windows 2000 Network Environment

Competenze valutate

This certification exam measures your ability to administer, support, and troubleshoot information systems that incorporate Microsoft Windows 2000. Before taking the exam, you should be proficient in the job skills listed below.

Creating, Configuring, Managing, Securing, and Troubleshooting File, Print, and Web Resources.

  • Publish resources in Active Directory. Types of resources include printers and shared folders:
    • Perform a search in Active Directory Users and Computers.
    • Configure a printer object.
  • Manage data storage. Considerations include file systems, permissions, and quotas:
    • Implement NTFS and FAT file systems.
    • Enable and configure quotas.
    • Implement and configure Encrypting File System (EFS).
    • Configure volumes and basic and dynamic disks.
    • Configure file and folder permissions.
    • Manage a domain-based distributed file system (DFS).
    • Manage file and folder compression.
  • Create shared resources and configure access rights. Shared resources include printers, shared folders, and Web folders:
    • Share folders and enable Web sharing.
    • Configure shared folder permissions.
    • Create and manage shared printers.
    • Configure shared printer permissions.
  • Configure and troubleshoot Internet Information Services (IIS):
    • Configure virtual directories and virtual servers.
    • Troubleshoot Internet browsing from client computers.
    • Troubleshoot intranet browsing from client computers.
    • Configure authentication and SSL for Web sites.
    • Configure FTP services.
    • Configure access permissions for intranet Web servers.
  • Monitor and manage network security. Actions include auditing and detecting security breaches:
    • Configure user-account lockout settings.
    • Configure user-account password length, history, age, and complexity.
    • Configure Group Policy to run logon scripts.
    • Link Group Policy objects.
    • Enable and configure auditing.
    • Monitor security by using the system security log file.

Configuring, Administering, and Troubleshooting the Network Infrastructure.

  • Troubleshoot routing. Diagnostic utilities include the tracert command, the ping command, and the ipconfig command:
    • Validate local computer configuration by using the ipconfig, arp, and route commands.
    • Validate network connectivity by using the tracert, ping, and pathping commands.
  • Configure and troubleshoot TCP/IP on servers and client computers. Considerations include subnet masks, default gateways, network IDs, and broadcast addresses:
    • Configure client computer TCP/IP properties.
    • Validate client computer network configuration by using the winipcfg, ipconfig, and arp commands.
    • Validate client computer network connectivity by using the ping command.
  • Configure, administer, and troubleshoot DHCP on servers and client computers:
    • Detect unauthorized DHCP servers on a network.
    • Configure authorization of DHCP servers.
    • Configure client computers to use dynamic IP addressing.
    • Configure DHCP server properties.
    • Create and configure a DHCP scope.
  • Configure, administer, and troubleshoot DNS:
    • Configure DNS server properties.
    • Manage DNS database records such as CNAME, A, and PTR.
    • Create and configure DNS zones.
  • Troubleshoot name resolution on client computers. Considerations include WINS, DNS, NetBIOS, the Hosts file, and the Lmhosts file:
    • Configure client computer name resolution properties.
    • Troubleshoot name resolution problems by using the nbtstat, ipconfig, nslookup, and netdiag commands.
    • Create and configure a Hosts file for troubleshooting name resolution problems.
    • Create and configure an Lmhosts file for troubleshooting name resolution problems.

Managing, Securing, and Troubleshooting Servers and Client Computers.

  • Install and configure server and client computer hardware:
    • Verify hardware compatibility by using the qualifier tools.
    • Configure driver signing options.
    • Verify digital signatures on existing driver files.
    • Configure operating system support for legacy hardware devices.
  • Troubleshoot starting servers and client computers. Tools and methodologies include Safe Mode, Recovery Console, and parallel installations:
    • Interpret the startup log file.
    • Repair an operating system by using various startup options.
    • Repair an operating system by using the Recovery Console.
    • Recover data from a hard disk in the event that the operating system will not start.
    • Restore an operating system and data from a backup.
  • Monitor and troubleshoot server health and performance. Tools include System Monitor, Event Viewer, and Task Manager:
    • Monitor and interpret real-time performance by using System Monitor and Task Manager.
    • Configure and manage System Monitor alerts and logging.
    • Diagnose server health problems by using Event Viewer.
    • Identify and disable unnecessary operating system services.
  • Install and manage Windows 2000 updates. Updates include service packs, hot fixes, and security hot fixes:
    • Update an installation source by using slipstreaming.
    • Apply and reapply service packs and hot fixes.
    • Verify service pack and hot fix installation.
    • Remove service packs and hot fixes.

Configuring, Managing, Securing, and Troubleshooting Active Directory Organizational Units and Group Policy.

  • Create, manage, and troubleshoot User and Group objects in Active Directory:
    • Create and configure user and computer accounts for new and existing users.
    • Troubleshoot groups. Considerations include nesting, scope, and type.
    • Configure a user account by using Active Directory Users and Computers. Settings include passwords and assigning groups.
    • Perform a search for objects in Active Directory.
    • Use templates to create user accounts.
    • Reset an existing computer account.
  • Manage object and container permissions:
    • Use the Delegation of Control wizard to configure inherited and explicit permissions.
    • Configure and troubleshoot object permissions by using object access control lists (ACLs).
  • Diagnose Active Directory replication problems:
    • Diagnose problems related to WAN link connectivity.
    • Diagnose problems involving replication latency. Problems include duplicate objects and the LostandFound container.
  • Deploy software by using Group Policy. Types of software include user applications, antivirus software, line-of-business applications, and software updates:
    • Use Windows Installer to deploy Windows Installer packages.
    • Deploy updates to installed software including antivirus updates.
    • Configure Group Policy to assign and publish applications.
  • Troubleshoot end-user Group Policy:
    • Troubleshoot Group Policy problems involving precedence, inheritance, filtering, and the No Override option.
    • Manually refresh Group Policy.
  • Implement and manage security policies by using Group Policy:
    • Use security templates to implement security policies.
    • Analyze the security configuration of a computer by using the secedit command and Security Configuration and Analysis.
    • Modify domain security policy to comply with corporate standards.

Configuring, Securing, and Troubleshooting Remote Access.

  • Configure and troubleshoot remote access and virtual private network (VPN) connections:
    • Configure and troubleshoot client-to-server PPTP and L2TP connections.
    • Manage existing server-to-server PPTP and L2TP connections.
    • Configure and verify the security of a VPN connection.
    • Configure client computer remote access properties.
    • Configure remote access name resolution and IP address allocation.
  • Troubleshoot a remote access policy:
    • Diagnose problems with remote access policy priority.
    • Diagnose remote access policy problems caused by user account group membership and nested groups.
    • Create and configure remote access policies and profiles.
    • Select appropriate encryption and authentication protocols.
  • Implement and troubleshoot Terminal Services for remote access:
    • Configure Terminal Services for remote administration or application server mode.
    • Configure Terminal Services for local resource mapping.
    • Configure Terminal Services user properties.
  • Configure and troubleshoot Network Address Translation (NAT) and Internet Connection Sharing:
    • Configure Routing and Remote Access to perform NAT.
    • Troubleshoot Internet Connection Sharing problems by using the ipconfig and ping commands.
Iscriviti alla newsletter di CLIC ~ E' gratuito!

Iscriviti alla nostra newsletter per essere sempre informato su:

  • Rapporti sull'utilizzo e la crescita di Internet;
  • Finanziamenti pubblici per le aziende relativi al settore (solo per la Sicilia);
  • Novità sul mondo del web di interesse per le aziende;
  • Offerte e promozioni CLIC;
  • Curiosità, statistiche, news varie.
Chiedi un preventivo alla web agency di Sicilia

consulenze per il web marketing

Tu sei qui: Home > Titoli e certificazioni > Certificazioni MCSA > Certificazioni MICROSOFT: 70 - 218

 

Antonino Argentati

Antonino Argentati - Web master di Sicilia

Leggi tutte le news

24/01/2017

La pasticceria artigianale siciliana, tra storia e bonta'

24/01/2017

Le cucine in muratura Sicilia - Punti focali e materiali

11/05/2016

Oroscopo e Cartomanzia

CLIC ~ CONSULENZE PER IL WEB MARKETING

Via Filippo Turati, 22 - 93100 Caltanissetta

Tel. / Fax 0934 597211 ~ Cell. 338 9687800 ~ info@clicsnc.it

P. IVA 01413320852 ~ Privacy policy


Ottimizzazione posizionamento siti web sui motori di ricerca

a cura di A. Argentati - Consulenze Aziendali per Internet

Scarica GRATIS "La guida alla progettazione del sito web per le piccole e medie imprese (PMI)"

Fare un sito web è facilissimo... ...farlo bene può essere molto complicato

Argentati - Consulenze aziendali per internet Scarica gratis, in formato pdf, la guida alla progettazione del sito web per piccole e medie imprese