Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
MSCE windows 2000 security design exam cram
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

MSCE windows 2000 security design exam cram

MSCE windows 2000 security design exam cram

Phillip G Schein

442 pages, parution le 15/09/2000

Résumé

Provides all of the curriculum objectives of the Windows 2000 Security Design exam (70-220), and serves as a perfect complement to the Windows 2000 Security Design Exam Prep. Each book includes proven test-taking strategies, warnings on trick questions, timesaving study tips and shortcuts. Contains sample questions and practice tests much like the format of the actual exams. Security issues are of major concern for most corporations. Windows 2000 is strongly security focused and the Windows 2000 Security Design exam will be one of the most popular electives.

Contents

Introduction xxi

Self-Assessment xxxiii

Chapter 1
Microsoft Certification Exams 1

Assessing Exam-Readiness  2

The Exam Situation  3

Exam Layout and Design: New Case Study Format  4

Multiple-Choice Question Format  5

Build-List-and-Reorder Question Format  7

Create-a-Tree Question Format  8

Drag-and-Connect Question Format  10

Select-and-Place Question Format  11

Microsoft’s Testing Formats  13

Strategies for Different Testing Formats  15

The Case Study Exam Strategy  15

The Fixed-Length and Short-Form Exam Strategy  16

The Adaptive Exam Strategy  17

Question-Handling Strategies  18

Mastering the Inner Game  19

Additional Resources  20

Chapter 2
Security Overview 25

The Key Questions  26

Required Technical Background  27

IT Controls and Corporate Objectives  28

IT Security Controls  28

Corporate Objectives  30

Physical and Logical Access  30

System Security Audits  31

Risk Management  32

Security Requirements  33

Deployment of a Security System  34

Problems with Procedural Paradigms  34

A Microsoft Historical Perspective  35

Key Historical Trends  36

Active Directory  38

Integrating Security Account Management  41

Physical Organization  42

A Layered Security Paradigm  43

Evaluating Risks  45

Documenting Nontechnical Procedures  48

Using Security Protocols  49

Mapping Security Technologies  49

Competencies  50

Practice Questions  53

Need to Know More?  58

Chapter 3
Public Key Infrastructure (PKI) 59

Applying the Basic Security Scheme  61

Encrypted Exchanges  62

Symmetric Key Encryption  63

Cryptanalysis  65

Distribution Problems  66

Asymmetric Key Encryption  66

Active Interception  68

Authentication and Integrity Controls  68

One-Way Hash Functions  69

The Windows 2000 Implementation  70

Entity Authentication through Proof of Possession  70

Secret Key Agreements  71

Bulk Data Encryption  71

Digital Envelope  71

Certificates and Key
Management Services  72

Digital Signatures  73

Extensibility  73

Certificates  74

The PKI Suite  76

Microsoft CryptoAPI  78

Global Encryption Policies  79

Practice Questions  80

Need to Know More?  85

Chapter 4
Kerberos Security 87

MIT Kerberos: The Basis for
Microsoft’s Implementation  88

Goals and Requirements  88

Assumptions  89

Components of the Protocol  89

Version 5 Enhancements  90

Microsoft’s Implementation of
Kerberos 5  91

Public Key Infrastructure (PKI)  92

Ticket Structure  92

Other Enhancements  92

KDC  94

Cross-Domain Authentication  98

Delegation of Authentication  100

Account Database  101

Kerberos Policy  101

Interoperability  102

Kerberos and Alternative Protocols   103

The Big Picture  103

SSPs  104

A Kerberos Case Study  110

ExamCram Ltd.: Sharing Resources with
Other Companies  110

Commentary  112

Practice Questions  114

Need to Know More?  123

Chapter 5
IP Security Architecture 125

IP and Security  126

Examples of IPSec Deployment   128

Building upon IPSec  129

Industry Standards  131

Security Protocols  131

IPSec Architecture  132

Encryption Techniques  133

Key Management Protocols  134

TCO  135

Software Upgrades  135

Training  135

Cryptographic Key Management  136

Deployment Strategy  136

Analyze Information  136

Create Communications Scenarios  136

Determine Security Levels  137

Build Security Policies  137

An IP Security Architecture Case Study  141

ExamCram Ltd.: Considering Network Layer
Security Solutions  141

Commentary  142

Practice Questions  144

Need to Know More?  150

Chapter 6
Remote Connectivity Issues 153

An Overview of VPN  154

Security Protocols  155

Basic Remote Access Models  156

Tunneling  158

NAT  159

VPN Security Protocols   159

Design Considerations  160

IPSec Tunnel and Transport Modes  162

Security Protocols Compared  162

VPN Management Policies  164

Remote Access Policy Management  164

Client Management  165

Firewall Technologies  165

Firewall Components  166

Firewall Architectures  167

Firewall Policies  171

Practice Questions  173

Need to Know More?  180

Chapter 7
Other Network Issues 183

IIS 5  185

Network Addressing and Domain Name Security  185

IIS Authentication Security  186

IIS Permissions  189

Combining NTFS and IIS Permissions  189

Other Security Methods  190

Secure Channel (SChannel) Protocols  191

SSL3/TLS1  192

Deployment of SSL   192

Certificate Services  193

Deploying Security for
Distributed Services  194

SSL in Windows 2000  195

Application Standards and Policies   195

Authenticode  196

Secure Multipurpose Internet Mail Extensions (S/MIME)  197

Permission Management  197

Identity Management  198

Requirements for Identity Management  199

Deployment of Identity Management  200

Practice Questions  205

Need to Know More?  211

Chapter 8
Constructing a Security Policy 213

Steps in Planning Network Security  214

Identifying the User Population  216

Determining the Scope, Sizing, and Placement of IT Resources  217

Scoping Physical Assets  217

Scoping Logical Assets  218

Assessing Network Security Risks  220

Attack Modalities  220

Ring Model  221

Creating Secure Boundaries: Physical Scoping  224

Creating Secure Boundaries: Protocol Scoping  225

Creating Secure Boundaries: Application Scoping  225

Creating Secure Boundaries: Policy Scoping  225

Preparing a Support Team  226

Monitoring and Auditing  227

Help Desk Support  228

Developing a Security Deployment Plan  228

Creating and Publishing a Security Policy  228

Developing Strategies for Secure
Network Connections  228

Deploying Network Strategies for the Everyone Group  229

Deploying Network Strategies for Staff Members  229

Deploying Network Strategies for Users
and Applications  232

Deploying Network Strategies for Business Partners  233

A Security Policy Case Study  234

ExamCram Ltd. Reformulates Its Plans  234

Commentary  236

Practice Questions  243

Need to Know More?  248

Chapter 9
Identity Management Issues 251

Basic Directory Services   252

The X.500 Standard  253

LDAP v3  254

AD Directory Services  254

Objects and Attributes  255

Names/Name Resolution  256

Terms and Components  257

Access Control  262

Limiting Authenticated Access  262

Managing Access Control Lists  264

Managing Security Administration  264

Establishing Trust Relationships  266

Resources  267

EFS  267

Practice Questions  269

Need to Know More?  274

Chapter 10
Group Policy 275

The Concept of Group  276

Enhancements  277

Policies and Settings  278

Securing the Desktop Environment  281

Securing Access and Permissions  281

Policy Scoping: Secured Boundaries   282

Types of Policy Management  283

Group Policy Administration  284

Group Policy Processing  286

Permission Management Tools  290

Practice Questions  292

Need to Know More?  296

Chapter 11
Security and Configuration Tools 299

Centralized Administration Tools  301

WMI  301

WSH  302

TSA  302

RIS  303

AD  303

MMC  303

Desktop Management with IntelliMirror  304

The Security Configuration (SC) Tool Set  306

Security Areas  306

Security Settings  307

Tool Set Components  308

Security Templates  309

The secedit.exe Tool  310

Other System and Security Tools  312

IPSec Monitoring Tool  313

Certificate Services CLI Tools  313

Support Security Management Tools  314

Tools from the Windows 2000 Server Resource Kit CD  317

Practice Questions  319

Need to Know More?  323

Chapter 12
Other Technical Issues 325

Centralized Identity Management  326

Identity Administration  327

Community Management  328

Identity Integration  329

Standardizing Access for Users  330

Single Sign-On (SSO)  331

Securing Access for Users  333

Enhancement: Smart Cards  334

Terminal Services Uses  339

RIS  340

SNMP  341

SMB Signing  342

OS Migration vs. Coexistence   343

Interoperability/Migration: NetWare  343

Interoperability/Migration: Unix  345

Interoperability/Migration: Apple Macintosh  349

Extensibility: COM+  350

Distributed Services  351

Security and RBAC  353

Practice Questions  354

Need to Know More?  358

Chapter 13
Sample Test 361

Chapter 14
Answer Key 389

Glossary 409

Index 421

Caractéristiques techniques

  PAPIER
Éditeur(s) Coriolis
Auteur(s) Phillip G Schein
Parution 15/09/2000
Nb. de pages 442
Format 15 x 23
Couverture Broché
Poids 673g
Intérieur Noir et Blanc
EAN13 9781576107157
ISBN13 978-1-57610-715-7

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription