MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring [NOOK Book]

Overview

Learn, prepare, and practice for Microsoft MCTS 70-642 exam success with this MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide from Pearson IT Certification, a leader in IT Certification learning.


This is the eBook version of the print title. Note that the eBook does not ...

See more details below
MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$27.49
BN.com price
(Save 42%)$47.99 List Price

Overview

Learn, prepare, and practice for Microsoft MCTS 70-642 exam success with this MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide from Pearson IT Certification, a leader in IT Certification learning.


This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.

  • Master Microsoft’s MCTS 70-642 exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks

MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide is a best-of-breed exam study guide. Best-selling author and expert instructor Don Poulton shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.


Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

The study guide helps you master all the topics on the MCTS 70-642 exam, including

  • IPv4/IPv6 address configuration and troubleshooting
  • DHCP configuration, installation, management, and troubleshooting
  • Routing configuration, tables, RRAS, management, and maintenance
  • Windows Firewall, Advanced Security, and IPsec
  • DNS installation, configuration, zones, replication, and records
  • Client name resolution
  • File services, shared folders, permissions, and encryption
  • DFS, namespaces, and replication
  • Backup/restore
  • File Server Resource Manager (FSRM)
  • Print services
  • Remote Access, VPNs, and NAT

Read More Show Less

Product Details

  • ISBN-13: 9780132802161
  • Publisher: Pearson Education
  • Publication date: 2/20/2012
  • Series: Cert Guide
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 866
  • File size: 70 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Don Poulton (A+, Network+, Security+, MCSA, MCSE) is an independent consultant who has been involved with computers since the days of 80-column punch cards. After a career of more than 20 years in environmental science, Don switched careers and trained as a Windows NT 4.0 MCSE. He has been involved in consulting with a couple of small training providers as a technical writer, during which time he wrote training and exam-prep materials for Windows NT 4.0, Windows 2000, and Windows XP. Don has written or contributed to several titles, including Security+ Lab Manual (Que, 2004), MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) (Que, 2004), MCSE 70-294 Exam Prep: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Que, 2006), MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring (Que, 2008), MCTS 70-680 Exam Prep: Microsoft Windows 7, Configuring (Que, 2011) , and MCTS 70-640 Exam Prep: Microsoft Windows Server 2008 Active Directory, Configuring (Que, 2011).

In addition, Don has worked on programming projects, both in his days as an environmental scientist and, more recently, with Visual Basic to update an older statistical package used for multivariate analysis of sediment contaminants.

When not working on computers, Don is an avid amateur photographer who has had his photos displayed in international competitions and published in magazines such as Michigan Natural Resources Magazine and National Geographic Traveler . Don also enjoys traveling and keeping fit.

Don lives in Burlington, Ontario, with his wife, Terry.

Read More Show Less

Table of Contents

Introduction 3

Chapter 1 Configuring IPv4 and IPv6 Addressing 27

“Do I Know This Already?” Quiz 28

Concepts of TCP/IP 33

TCP/IP History in Brief 33

TCP/IP Protocol Stack 34

OSI Reference Model 34

Four-Layer TCP/IP Model 35

Application Layer 36

Transport Layer 36

Internet Layer 37

Network Interface Layer 37

TCP/IP Component Protocols 38

Transmission Control Protocol 38

User Datagram Protocol 38

Internet Protocol 39

Address Resolution Protocol 39

Internet Control Message Protocol 39

Internet Group Management Protocol 40

Application Layer Protocols 40

IPv4 Addressing 41

Static IPv4 Addressing 42

Subnetting and Supernetting in IPv4 44

Using Subnetting to Divide a Network 44

Using Supernetting to Provide for Additional Hosts on a Network 47

Understanding Private IPv4 Networks 48

Dynamic IP Addressing 48

Configuring IPv4 Address Options 48

Using the Command Line to Configure IPv4 Addressing Options 52

IPv6 Addressing 54

IPv6 Address Syntax 56

IPv6 Prefixes 56

Types of IPv6 Addresses 56

Connecting to a TCP/IP Version 6 Network 59

Interoperability Between IPv4 and IPv6 Addresses 62

Compatibility Addresses 63

ISATAP Addresses 63

6to4 Addresses 64

Teredo Addresses 65

Using Group Policy to Configure IPv6 Transition Technologies 66

Resolving IPv4 and IPv6 Network Connectivity Issues 67

Windows Server 2008 Network Diagnostics Tools 68

Using TCP/IP Utilities to Troubleshoot TCP/IP 70

ARP 70

FTP 70

ipconfig 71

Nbtstat 72

Netstat 72

Nslookup 73

ping 73

tracert 74

pathping 75

Troubleshooting IPv4 and IPv6 Problems 75

Suggested Response to a Connectivity Problem 75

Network Discovery 76

Incorrect IPv4 Address or Subnet Mask 77

Incorrect Default Gateway 78

Unable to Connect to a DHCP Server 78

Duplicate IP Address 78

Unable to Configure an Alternate TCP/IPv4 Configuration 78

Using Event Viewer to Check Network Problems 79

Additional Troubleshooting Hints When Using IPv6 79

Review All the Key Topics 80

Complete the Tables and Lists from Memory 81

Definition of Key Terms 81

Chapter 2 Configuring Dynamic Host Configuration Protocol (DHCP) 83

“Do I Know This Already?” Quiz 83

How DHCP Works 89

Four-Phase DHCP IPv4 Leasing Process 89

IP Lease Request (DHCPDISCOVER) 90

IP Lease Offer (DHCPOFFER) 91

IP Lease Selection (DHCPREQUEST) 91

IP Lease Acknowledgment (DHCPACK) 92

Renewing an IPv4 Lease 92

How DHCPv6 Works 93

Installing and Configuring a DHCP Server 95

Using the Command Line to Install DHCP 100

DHCP Scopes and Options 101

Creating DHCP Scopes 101

Using the Command Line to Create Scopes 104

Superscopes 104

Multicast Scopes 105

Split Scopes 106

Exclusions 107

Configuring DHCP Scope Properties 107

Configuring DHCP Options 108

Server Options 110

Scope Options 111

Option Classes 112

Client Reservations and Options 114

Managing and Troubleshooting a DHCP Server 116

Authorizing a DHCP Server in Active Directory 116

Configuring DHCP Relay Agents 117

PXE Boot 120

Monitoring and Troubleshooting a DHCP Server 121

Review All the Key Topics 124

Complete the Tables and Lists from Memory 1 25

Definition of Key Terms 125

Chapter 3 Configuring Routing 127

“Do I Know This Already?” Quiz 127

The Need for Routing and Routing Tables 132

Routing Protocols 133

Routing Table 135

Routing and Remote Access Service (RRAS) in Windows Server 2008 R2 137

Configuring RRAS as a Router 140

Configuring RIP 142

Configuring Static Routing 145

Using the RRAS Snap-In to Create a Static Route 145

Using the route Command to Create a Static Route 146

Choosing a Default Gateway 147

Displaying the Static Routing Table 147

Managing and Maintaining Routing Servers 148

Demand-Dial Routing 148

Establishing a Demand-Dial Interface 148

Configuring Demand-Dial Interface Properties 150

Specifying Packet Filtering 151

IGMP Proxy 153

Review All the Key Topics 156

Complete the Tables and Lists from Memory 157

Definition of Key Terms 157

Chapter 4 Configuring Windows Firewall with Advanced Security 159

“Do I Know This Already?” Quiz 159

Configuring Windows Firewall 165

Basic Windows Firewall Configuration 167

Using the Windows Firewall with Advanced Security Snap-In 172

Configuring Multiple Firewall Profiles 174

Configuring New Firewall Rules 176

Configuring Inbound Rules or Outbound Rules 176

Configuring Connection Security Rules 180

Configuring Rule Properties 184

Authorizing Users and Computers 185

Modifying Rule Scope 187

Additional Rule Properties 188

Configuring Notifications 189

Importing and Exporting Policies 190

Using IPSec to Secure Network Communications 191

IPSec Modes 191

IPSec Encryption 193

Using Group Policy to Create IPSec Policies 194

Using Group Policy to Configure Windows Firewall Policies 198

Creating Windows Firewall with Advanced Security Policies 198

Windows Firewall Group Policy Property Settings 200

Isolation Policies 201

Review All the Key Topics 202

Definition of Key Terms 203

Chapter 5 Installing and Configuring Domain Name System (DNS) 205

“Do I Know This Already?” Quiz 206

Introduction to DNS 210

Hierarchical Nature of DNS 211

Root-Level Domains 212

Top-Level Domains 212

Second-Level Domain Names 214

Host Names 214

DNS Name Resolution Process 215

Recursive Queries 215

Iterative Queries 216

Reverse Lookup Queries 217

Installing DNS in Windows Server 2008 R2 218

Using the Command Line to Install DNS 221

Using the Command-Line for DNS Server Administration 222

Configuring DNS Server Properties 223

Interfaces Tab 223

Forwarders Tab 224

Conditional Forwarders 227

Advanced Tab 228

Server Options 229

Disable Recursion 229

Name Checking 230

Loading Zone Data 231

Root Hints Tab 231

Debug Logging Tab 233

Event Logging Tab 235

Trust Anchors Tab 235

Monitoring Tab 237

DNS Socket Pooling 238

DNS Cache Locking 239

Review All the Key Topics 241

Definition of Key Terms 241

Chapter 6 Configuring DNS Zones and Replication 243

“Do I Know This Already?” Quiz 243

Zone Types and Their Uses 249

DNS Zone Types 249

Primary Zones 249

Secondary Zones 250

Active Directory–Integrated Zones 250

Stub Zones 251

Forward and Reverse Lookup Zones 251

GlobalNames Zones 252

DNS Name Server Roles 253

Primary Name Servers 253

Secondary Name Servers 254

Caching-Only Servers 255

Forwarders 255

Slave Servers 256

Configuring DNS Zones 257

Creating New DNS Zones 257

Creating a Reverse Lookup Zone 259

Creating Secondary Zones 261

Creating Stub Zones 262

Creating a GlobalNames Zone 262

Configuring DNS Zone Properties 263

Configuring Zone Types 264

Adding Authoritative DNS Servers to a Zone 265

Dynamic DNS, Non-Dynamic DNS, and Secure Dynamic DNS 266

Zone Scavenging 267

Integrating DNS with WINS 269

Subdomains and Zone Delegation 270

Configuring DNS Zone Transfers and Replication 274

Active Directory DNS Replication 274

Application Directory Partitions 274

Replication Scope 275

Types of Zone Transfers 277

Full Zone Transfer 277

Incremental Zone Transfer 278

Configuring Zone Transfers 279

Configuring DNS Notify 281

Secure Zone Transfers 282

Auditing of DNS Replication 283

Troubleshooting DNS Zones and Replication 287

Using the ipconfig, ping, and nslookup Commands 288

Use of the DNSLint Tool 290

Review All the Key Topics 291

Complete the Tables and Lists from Memory 292

Definition of Key Terms 292

Chapter 7 Configuring DNS Records 295

“Do I Know This Already?” Quiz 295

Resource Record Types and Their Uses 299

Creating New Resource Records 300

New Host (A or AAAA) Records 301

New Alias (CNAME) Records 302

New Mail Exchanger (MX) Records 303

Additional New Resource Records 304

Using the Command Line to Create Resource Records 307

Configuring Resource Record Properties 308

Configuring SOA Resource Record Properties 309

Time to Live 311

Configuring Name Server Resource Record Properties 311

Registering Resource Records 314

Using the DnsUpdateProxy Group 314

Configuring Round Robin 316

Enabling Netmask Ordering 317

Configuring DNS Record Security and Auditing 317

Review All the Key Topics 319

Complete the Tables and Lists from Memory 319

Definition of Key Terms 319

Chapter 8 Configuring Client Computer Name Resolution 321

“Do I Know This Already?” Quiz 321

Configuring DNS Client Computer Settings 326

Specifying DNS Server Lists 326

Configuring DNS Suffix Search Order Lists 328

Configuring a Client Computer’s Primary DNS Suffix 330

Using Group Policy to Configure DNS Client Settings 331

Using the ipconfig Command to Update and Register

DNS Records 334

Using the dnscmd Command to Update the DNS Server

Cache 334

Other Types of Name Resolution 335

HOSTS Files 335

NetBIOS Name Resolution 337

NetBIOS Broadcasts 337

LMHOSTS Files 339

WINS Servers 340

Troubleshooting NetBIOS Problems 344

Link Local Multicast Name Resolution 345

Review All the Key Topics 348

Complete the Tables and Lists from Memory 349

Definition of Key Terms 349

Chapter 9 Configuring File Servers 351

“Do I Know This Already?” Quiz 351

Shared Folders in Windows Server 2008 R2 358

Understanding the File Services Role in Windows Server 2008 R2 358

Using the Network and Sharing Center to Configure File Sharing 360

Sharing Files, Folders, and Printers 362

Modifying Shared Folder Properties 363

Mapping a Drive 367

Using the net share Command to Manage Shared Folders 368

NTFS Permissions 369

NTFS File and Folder Permissions 369

Applying NTFS Permissions 371

Specifying Advanced Permissions 373

Configuring NTFS Permissions Inheritance 376

Taking Ownership of Files and Folders 377

Effective Permissions 379

Viewing a User’s Effective Permissions 380

Copying and Moving Files and Folders 381

Copying Files and Folders with NTFS Permissions 381

Moving Files and Folders with NTFS Permissions 382

Using the Mouse to Copy or Move Objects from One Location to Another 383

Practical Guidelines on Sharing and Securing Folders 383

Data Encryption 384

Encrypting File System 384

Encrypting File System Basics 385

Preparing a Disk for EFS 386

Encrypting Files 387

Backing Up EFS Keys 389

Decrypting Files 391

EFS Recovery Agents 392

EFS Group Policies 393

BitLocker Drive Encryption 395

Preparing Your Computer to Use BitLocker 397

Enabling BitLocker 397

Managing BitLocker 402

Configuring BitLocker Group Policies 403

Using Data Recovery Agents 405

Additional File Server Management Resources 408

Using Offline Files 408

Configuring Servers for Offline Files 409

Configuring Client Computers 411

Configuring Offline File Policies 411

Configuring Transparent Caching of Offline Files 413

Configuring BranchCache 414

Using the netsh Command to Configure BranchCache 415

Using Group Policy to Enable BranchCache 417

Specifying BranchCache Firewall Rules 418

Understanding BranchCache Network Infrastructure Requirements 419

Using BranchCache across a Virtual Private Network 419

Managing Certificates with BranchCache 420

Using Share and Storage Management Console 421

Using Share and Storage Management to Provision Shared Resources and Volumes 422

Using Share and Storage Management to Manage Shared Resources 425

Review All the Key Topics 426

Complete the Tables and Lists from Memory 427

Definition of Key Terms 427

Chapter 10 Configuring Distributed File System (DFS) 429

“Do I Know This Already?” Quiz 429

DFS Concepts 433

Improvements to DFS in Windows Server 2008 R2 434

Installing DFS on a Windows Server 2008 R2 Computer 435

Managing DFS Namespaces 438

Creating Additional DFS Namespaces 438

Managing Namespaces 439

Adding Folders to DFS Namespaces 440

Adding Namespace Servers 441

Configuring Referrals 441

Enabling Access-Based Enumeration of a DFS Namespace 443

Configuring Polling of Domain Controllers 444

Managing DFS Replication 445

Setting Up DFS Replication 447

Replication Topologies 449

Working with Replication Groups 450

Adding New Connections 450

Adding Replicated Folders 451

Designating Read-Only Replicated Folders 451

Adding Members to Replication Groups 451

Sharing or Publishing Replicated Folders 451

Configuring Failover Cluster Support 452

Generating Replication Health Reports 454

Review All the Key Topics 456

Complete the Tables and Lists from Memory 457

Definition of Key Terms 457

Chapter 11 Configuring Backup and Restore 459

“Do I Know This Already?” Quiz 459

Protecting Data with Windows Backup 464

Backup Permissions 466

Installing Windows Server Backup 466

Backing Up Your File Server 467

Performing a Bare Metal Backup 472

Scheduling a Backup 472

Using the wbadmin Command 474

Restoring the Backup Catalog 475

Managing Backups Remotely 476

Volume Shadow Copies 477

Using Windows Explorer to Manage Shadow Copies 478

Using the Command Line to Manage Shadow Copies 480

Using Volume Shadow Copies to Recover a File or Folder 480

Restoring Data from Backup 482

Using Windows Backup to Recover Data 482

Restoring User Profiles 485

Recovering System State 486

Performing a Full Server or Bare Metal Recovery of a Windows Server 2008 R2 Computer 488

Using the wbadmin Command to Recover Your Server 491

Review All the Key Topics 492

Complete the Tables and Lists from Memory 493

Definition of Key Terms 493

Chapter 12 Managing File Server Resources 495

“Do I Know This Already?” Quiz 495

File Server Resource Manager 500

Installing FSRM 501

Managing File Screening 501

Using File Groups 502

Creating File Screens and Templates 503

Creating File Screen Exceptions 506

Monitoring File Screening 506

Managing Storage Reports 506

Specifying Report Parameters 507

Additional FSRM Options 508

Scheduling Report Generation 509

Managing File Classification 511

Configuring File-Management Tasks 514

Configuring Disk and Volume Quotas 516

Using Windows Explorer to Enable Disk Quotas 516

Using FSRM to Enable Quotas 519

Using FSRM to Create Quota Templates 520

Some Guidelines for Using Quotas 522

Storage Manager for SANs 523

Review All the Key Topics 527

Complete the Tables and Lists from Memory 528

Definition of Key Terms 528

Chapter 13 Configuring and Monitoring Print Services 531

“Do I Know This Already?” Quiz 531

Printing Terminology in Windows Server 2008 R2 537

Printing Process 538

Installing, Sharing, and Publishing Printers 539

Installing the Print and Document Services Role 540

Installing Printers 541

Using Control Panel to Install a Printer 542

Using the Print Management Console to Install a Printer 544

Sharing Printers 545

Publishing Printers in Active Directory 546

Using Group Policy to Deploy Printer Connections 548

Managing and Troubleshooting Printers 549

Using the Printer Properties Dialog box 549

General Tab 549

Ports Tab and Printer Pooling 549

Advanced Tab 551

Security Tab and Printer Permissions 553

Migrating Print Queues and Printer Settings 556

Isolating Printer Drivers 557

Configuring Location-Aware Printer Settings 558

Delegating Print Management 559

Troubleshooting Printer Problems 561

Some Common Problems 561

Printer Port Problems 562

Enabling Notifications 562

Review All the Key Topics 564

Complete the Tables and Lists from Memory 565

Definition of Key Terms 565

Chapter 14 Configuring Remote Access 567

“Do I Know This Already?” Quiz 567

Remote Access Protocols 573

Remote Access Authentication Protocols 574

New Features of RRAS in Windows Server 2008 576

Configuring Dial-Up Connections 577

Configuring a RAS Server for Dial-Up 577

Configuring Dial-Up RAS Server Properties 579

Enabling Modems used by the Dial-Up RAS Server 581

Configuring Windows Server 2008 as a RAS Client 583

Network Address Translation 584

Enabling the NAT Server for DHCP 586

Enabling Addresses, Services, and Ports on the NAT Server 588

Configuring Internet Connection Sharing 589

Virtual Private Networking 590

How VPNs Function 591

VPN Encapsulation 591

Authentication 591

Data Encryption 592

Configuring a RRAS Server for VPN 592

Creating and Authenticating VPN Connections 594

Configuring VPN Connection Security 596

Enabling VPN Reconnect 598

Configuring Advanced Security Auditing 599

Using Remote Access Policies 601

Configuring VPN Packet Filters 601

Connection Manager 603

Installing the Connection Manager Administration Kit 605

Using Connection Manager Administration Kit to Create a Profile 605

Using the Connection Manager Client Interface 610

Review All the Key Topics 612

Complete the Tables and Lists from Memory 613

Definition of Key Terms 613

Chapter 15 Configuring Network Policy Server (NPS) 615

“Do I Know This Already?” Quiz 615

Wireless Networking Protocols and Standards 619

Wireless Networking Standards 620

Planning the Authentication Methods for a Wireless Network 621

Planning the Encryption Methods for a Wireless Network 622

Wired Equivalent Privacy 622

802.1X 622

Use of IPSec with Wireless Networks 623

The IEEE 802.3 Wired Standard 623

Planning and Configuring Wireless Access Policies 623

Creating a Wireless Access Policy for Windows Vista/7 Clients 624

Creating a Wireless Access Policy for Windows XP Clients 628

Configuring IEEE 802.3 Wired Access Policies 630

RADIUS in Windows Server 2008 R2 633

Installing NPS on a Windows Server 2008 RRAS Server 634

Configuring the NPS Server for Wireless Access 635

Configuring New RADIUS Clients 638

Creating RADIUS Proxies and Proxy Groups 639

Creating Connection Request Policies 641

Configuring RADIUS Accounting 644

Configuring NPS Templates 647

Review All the Key Topics 649

Complete the Tables and Lists from Memory 650

Definition of Key Terms 650

Chapter 16 Configuring Network Access Protection (NAP) 653

“Do I Know This Already?” Quiz 653

Concepts of NAP 658

Components of a Typical NAP Deployment 660

What’s New with NAP in Windows Server 2008 R2 662

NAP Enforcement 663

DHCP Enforcement 663

Enabling NAP on the DHCP Server’s Scopes 667

VPN Enforcement 668

IPSec Enforcement 670

Installing and Configuring an HRA Server 671

Configuring NAP for IPSec Enforcement 674

Configuring the HRA for Health Certificates 674

Using Group Policy to Specify IPSec Enforcement 675

802.1X Enforcement 676

RDS Enforcement 678

System Health Validation 680

Configuring the Windows Security Health Validator 681

Configuring Error Codes 683

Using Multi-Configuration SHV 683

Configuring NAP Policies 684

Review All the Key Topics 689

Definition of Key Terms 690

Chapter 17 Configuring DirectAccess 693

“Do I Know This Already?” Quiz 693

Concepts of DirectAccess 698

DirectAccess Server Requirements 700

Using IPv6 with DirectAccess 701

Using Network Access Protection 701

DirectAccess Client Requirements 702

DirectAccess Connection Process 702

Configuring the DirectAccess Server 703

Installing and Configuring the DirectAccess Server Feature 703

DirectAccess and the Perimeter Network 707

Configuring Authentication 708

Group Policy and DirectAccess 708

Using Group Policy to Configure DirectAccess Clients 708

Name Resolution Policy Table 710

Using NRPT Exemptions 714

Review All the Key Topics 716

Complete the Tables and Lists from Memory 716

Definitions of Key Terms 716

Chapter 18 Windows Server Update Services (WSUS) Server Settings 719

“Do I Know This Already?” Quiz 719

Concepts of WSUS 724

Purposes of Windows Update and WSUS 724

New Features of WSUS 3.0 725

Installing and Configuring a WSUS Server 727

Installing WSUS on a Windows Server 2008 R2 Computer 728

Installing Microsoft Report Viewer Redistributable 2008 731

Getting Started with WSUS 731

Configuring WSUS Options 733

Testing Updates 738

Using Computer Groups 738

Configuring Client-Side Targeting 741

Approving Updates 742

Declining Updates 744

Viewing Reports 745

Using WSUS on a Disconnected Network 747

Configuring Client Computers for WSUS 748

Review All the Key Topics 754

Complete the Tables and Lists from Memory 755

Definition of Key Terms 755

Chapter 19 Configuring Performance Monitoring 757

“Do I Know This Already?” Quiz 757

Performance Monitor 762

Using Performance Monitor to Collect Real-Time Data 764

Customizing Performance Monitor 766

Permissions Required to Run Performance Monitor 767

Data Collector Sets 768

System-Defined Data Collector Sets 768

Using System-Defined Data Collector Sets 769

Viewing Logged Performance Data 771

User-Defined Data Collector Sets 771

Creating a Custom Data Collector Set 774

Using Performance Monitor to Create a Data Collector Set 776

A Few Best Practices for Logging Server Performance 777

Command-Line Utilities 779

Monitoring Print Servers 779

Analyzing Performance Data 780

Optimizing and Troubleshooting Memory Performance 781

Optimizing and Troubleshooting Processor Utilization 783

Optimizing and Troubleshooting Disk Performance 784

Optimizing and Troubleshooting Network Performance 786

Reliability Monitor 787

Resource Monitor 789

Review All the Key Topics 792

Complete the Tables and Lists from Memory 793

Definition of Key Terms 793

Chapter 20 Configuring Event Logs 795

“Do I Know This Already?” Quiz 795

Event Viewer 799

Viewing Logs in Event Viewer 800

Event Log Properties 802

Applications and Services Logs 804

Customizing Event Logs 805

Creating and Using Custom Views 807

Exporting and Importing Custom Views 808

Configuring Event Log Subscriptions 809

Configuring the Source Computers to Forward Events 810

Configuring the Collector Computer to Forward Receive Events 810

Configuring Event Log Subscriptions 811

Configuring Tasks from Events 814

Review All the Key Topics 816

Complete the Tables and Lists from Memory 817

Definitions of Key Terms 817

Chapter 21 Collecting Network Data 819

“Do I Know This Already?” Quiz 819

Simple Network Management Protocol 824

How SNMP Functions 824

Management Information Base 824

SNMP Messages 825

SNMP Communities 826

How SNMP Functions 827

Installing and Configuring SNMP 828

Network Monitor 833

Concepts of Protocol Analyzers 833

Placement of Protocol Analyzers 834

Installing and Running Microsoft Network Monitor 835

Using Network Monitor to Capture Network Data 837

Filtering Captured Network Data 839

Using a Capture Filter 841

Configuring Network Monitor Options 842

Using Aliases 844

Performing a Capture from the Command Prompt 845

Connection Security Rules Monitoring 846

Configuring Authentication Properties 848

Review All the Key Topics 850

Complete the Tables and Lists from Memory 851

Definitions of Key Terms 851

Practice Exam 853

Answers to Practice Exam 921

APPENDIX A Answers to the “Do I Know This Already?” Quizzes 961

CD-only Elements:

APPENDIX B Memory Tables 2

APPENDIX C Memory Tables Answer Key 2

Glossary 2

TOC, 9780789748300, 1/17/2012

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted May 30, 2012

    VERY VERY HIGHLY RECOMMENDED!!

    Are you a network administrator, network engineer and consultant who is pursuing the Microsoft Certified Technology Specialist or Microsoft Certified IT Professional certifications for Windows Server 2008? If you are, then this book is for you! Author Don Poulton, has done an outstanding job of writing a book that covers all the objectives that Microsoft has established for exam 70-642. Author Poulton, begins by focusing on the various types of Ipv4 and Ipv6 addresses and methods that are used to troubleshoot network addressing and subnetting problems. Then, the author shows you how to set up, configure and troubleshoot DHCP servers on the network. He also shows you how to configure a Windows Server 2008 computer to route traffic between multiple segments in order to optimize network traffic and reduce bottlenecks. The author continues by discussing the use of Group Policy with rules that determine the types of network traffic allowed into and out of computers on your network. Then, he introduces the concepts behind the DNS protocol and shows you how to set up DNS servers and forwarders. Next, the author shows you the various types of DNS zones, how and when to create them, how to integrate DNS zone information with Active Directory, and how to ensure that zone data is properly replicated among each other. He also discusses the various types of DNS records used to store data about the various computers located within a DNS zone and shows you how to configure and troubleshoot DNS record information. The author continues by showing you how to ensure that client computers on your network are able to access servers locally and remotely. Then, he shows you how to configure a Windows Server 2008 R2 computer to share files and folders; and, how to secure shared resources so that only allowed users and groups can access them. Next, the author shows you how to set up and manage a DFS root and ensure its security, reliability and availability. He also discusses how you can back up data so that the risk of loss is minimized. The author continues by discussing other items you need to know of when managing file servers such as File Server Resource Manager, disk and volume quotas, and Storage Managers for SANs. Then, he shows you how to configure a server that enables a user to connect to the network from a remote location using various connection protocols. Next, the author shows you how to configure policies for wired and wireless connections and connection requests. He also discusses the requirements for a DirectAccess connection and then shows you how to configure, secure and troubleshoot this type of network connection. The author continues by showing you how to configure and troubleshoot policies that govern user access to the WSUS server. Then, he focuses on computer performance and looks at factors that might cause degraded performance and steps you might take to restore performance to an acceptable level. Next, the author shows you how to configure Event Viewer to display appropriate types of logs and specifies actions that the server can automatically take when a certain type of event is logged. Finally, he shows you how to monitor the various types of network traffic passing to and from your servers. The goal of this most excellent book is simple: to help you get ready to take and pass the Microsoft Certification Exam 70-642. More importantly, this book helps ensure your success as you pursue this Microsoft exam and the Technology S

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)