Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server® 2008 Network Infrastructure
Exam 70-642: TS: Windows Server 2008 Network Infrastructure, Configuring Introduction
System Requirements
Hardware Requirements Software Requirements Lab Setup Instructions
Preparing the Windows Server 2008 R2 Computers
Using the CD
How to Install the Practice Tests How to Use the Practice Tests
Lesson Review Options Practice Test Options
How to Uninstall the Practice Tests
Acknowledgments Support & Feedback
Errata We Want to Hear from You Stay in Touch
Preparing for the Exam 1. Understanding and Configuring TCP/IP
Before You Begin Lesson 1: Introducing Windows Networking
What Are Network Layers? Exploring the Layers of the TCP/IP Networking Model
Network Interface Layer Internet Layer Transport Layer Application Layer TCP/IP Encapsulation
Configuring Networking Properties in Windows Server 2008 R2
Network and Sharing Center Viewing Network Connections
Viewing Default Components of Network Connections
Bridging Network Connections Viewing an Address Configuration Assigning an IP Configuration Manually
Assigning an IPv4 Configuration Manually Assigning an IPv6 Configuration Manually Configuring IPv4 and IPv6 Settings Manually from the Command Prompt
Configuring an IPv4 Connection to Receive an Address Automatically
Understanding DHCP-Assigned Addresses Defining an Alternate Configuration Understanding Automatic Private IP Addressing Repairing a Network Connection with Ipconfig /Renew and the Diagnose Feature Troubleshooting Network Connectivity with Ping, Tracert, PathPing, and Arp
Practice: Configuring TCP/IP Addresses
Lesson Summary Lesson Review
Lesson 2: Understanding IPv4 Addressing
The Structure of IPv4 Addresses
Network ID and Host ID
IPv4 Addresses and ZIP+4 Compared
Subnet Masks
Subnet Mask Notations Subnet Mask Midrange Values Subnet Mask Octet Values
Understanding Routing and Default Gateways Understanding IPv4 Address Ranges
Using Public IPv4 Addresses Using Private IPv4 Addresses Understanding Address Blocks and Subnets Creating an IPv4 Address Block Reference Chart Determining the Block Size for a /n Network Determining the Block Size for a Dotted-Decimal Subnet Mask
Determining Host Capacity Per Block
Determining Block Size Requirements
What Is Subnetting? Advantages of Subnetting
Accommodating Physical Topology Restricting Broadcast Traffic
The Subnet ID Creating Equally Sized Subnets Using Variable-Length Subnet Masks Enumerating Subnets in an Address Space Verifying Subnet Ownership and Configuration
Practice: Learning to Work with Address Blocks
Lesson Summary Lesson Review
Lesson 3: Understanding IPv6 Addressing
Introducing IPv6 Addresses
The Structure of IPv6 Addresses How Do IPv6 Computers Receive an IPv6 Address?
Understanding IPv6 Address Types
Global Addresses Link-Local Addresses Unique Local Addresses States of an IPv6 Address
IPv6 Transition Technologies
Next Generation TCP/IP Intra-Site Automatic Tunnel Addressing Protocol 6to4 Teredo IP-HTTPS
Working with IPv6 Subnets
Determining the Number of Bits Left in the Subnet ID Determining How Many Bits You Need for Subnetting Determining the New Network Prefix to Be Used Within Your Subnetted Portion of the Network Determining the Hexadecimal Increment Between Subnet Addresses Using the Hexadecimal Increment to Determine the Network Address of Each Subnet Practice: Testing IPv6 Connectivity
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario: Working with IPv4 Address Blocks
Suggested Practices
Configure IP Addressing
Take a Practice Test
2. Configuring Name Resolution
Before You Begin Lesson 1: Understanding Name Resolution in Windows Server 2008 Networks
Name Resolution Methods in Windows What Is Link Local Multicast Name Resolution? What Is NetBIOS Name Resolution?
NetBIOS Name Resolution Methods
NetBIOS Broadcasts WINS Lmhosts File
Enabling and Disabling NetBIOS NetBIOS Node Types Advantages and Disadvantages of NetBIOS
What Is DNS Name Resolution?
DNS Namespace Domain Names Private Domain Namespace
DNS Components
DNS Servers DNS Zones DNS Resolvers Resource Records
Understanding How a DNS Query Works
DNS Resolution Methods DNS Query Steps
Step 1: The Local Resolver Step 2: Querying a DNS Server
Understanding Recursion Root Hints Query Example
Understanding How Caching Works
DNS Client Cache DNS Server Cache
Time to Live Values
Practice: Exploring Automatic Name Resolution in Local Networks
Lesson Summary Lesson Review
Lesson 2: Deploying a DNS Server
Deploying a DNS Server on a Domain Controller Deploying a DNS Server on a Stand-Alone or Member Server Deploying a DNS Server on a Server Core Installation of Windows Server 2008 R2 Configuring a Caching-Only DNS Server Configuring Server Properties
Interfaces Tab Root Hints Tab Forwarders Tab
When to Use Forwarders When to Use Conditional Forwarding
Configuring DNS Socket Pooling Configuring DNS Cache Locking
Practice: Exploring DNS in an Active Directory Environment
Lesson Summary Lesson Review
Lesson 3: Configuring DNS Client Settings
Specifying DNS Servers Specifying a Computer Name and DNS Suffixes
Configuring a Connection-Specific DNS Suffix
Configuring a Suffix Search List
Default DNS Suffix Searches DNS Devolution Levels Custom DNS Suffix Search Lists
Configuring Dynamic Update Settings
Default Client Update Behavior
Update Behavior for Host Records Update Behavior for Pointer Records
Viewing and Clearing the DNS Client Cache
Practice: Managing the DNS Client Cache
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Troubleshooting DNS Clients Case Scenario 2: Deploying a DNS Server
Suggested Practices
Configure a DNS Server Configure Name Resolution for Client Computers
Take a Practice Test
3. Configuring a DNS Zone Infrastructure
Before You Begin Lesson 1: Creating and Configuring Zones
Creating Zones
Choosing a Zone Type
Primary Zones Secondary Zones Stub Zones Storing the Zone in Active Directory Standard Zones
Choosing an Active Directory Zone Replication Scope Creating a Forward or Reverse Lookup Zone Choosing a Zone Name Configuring Dynamic Update Settings
Dynamic Updates and DNS Record Security
Examining Built-in Resource Records
Start of Authority (SOA) Records Name Server Records
Creating Resource Records
Record Types
Host Resource Records Alias Resource Records Mail Exchanger Resource Records Pointer Resource Records Service Resource Records
Enabling DNS to Use WINS Resolution Aging and Scavenging
Enabling Aging Time Stamping Modifying Zone Aging/Scavenging Properties Performing Scavenging
Using a GlobalNames Zone
Deploying a GlobalNames Zone Practice: Deploying a GlobalNames Zone
Lesson Summary Lesson Review
Lesson 2: Configuring Zone Replication, Transfers, and Delegations
Configuring Zone Replication for Active Directory–Integrated Zones
Replication and Application Directory Partitions
DomainDnsZones and ForestDNSZones Custom Application Directory Partitions Storing DNS Data in the Domain Partition
Choosing Zone Replication Scope Creating Custom Application Directory Partitions
Using Zone Transfers
Zone Transfer Initiation Enabling Zone Transfers Configuring Notifications Manually Updating a Secondary Zone
Understanding Zone Delegations
When to Delegate Zones How Delegations Work Creating a Zone Delegation
Implementing Stub Zones
Stub Zone Example Other Uses for Stub Zones Practice: Creating an Application Directory Partition for DNS Practice: Deploying a Secondary Zone
Lesson Summary Lesson Review
Lesson 3: Implementing DNSSEC
Understanding Public Key Cryptography in DNSSEC
Understanding Key Pairs Understanding Digital Signatures Understanding DNSSEC Trust Relationships
Understanding DNSSEC Name Resolution Configuring DNSSEC
Configuring DNSSEC in Windows Server 2008 R2
Preparing A Zone for DNSSEC Choosing a Key Rollover Mechanism Generating Key Pairs Signing a Zone File Configure Trust Anchors
Configuring Clients for DNSSEC Practice: Configuring DNSSEC
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Managing Outdated Zone Data Case Scenario 2: Configuring Zone Transfers
Suggested Practices
Configure a DNS Infrastructure
Take a Practice Test
4. Creating a DHCP Infrastructure
Before You Begin Lesson 1: Installing a DHCP Server
Understanding DHCP Address Assignment
Understanding Address Leases Understanding DHCP Scopes Understanding DHCP Options
Adding the DHCP Server Role
Selecting Network Connection Bindings Specifying IPv4 DNS Server Settings Specifying IPv4 WINS Server Settings Adding DHCP Scopes Configuring DHCPv6 Stateless Mode
Configuring Clients for Stateful or Stateless IPv6 Addressing
Configuring IPv6 DNS Server Settings Authorizing DHCP Server Practice: Deploying a DHCP Server
Lesson Summary Lesson Review
Lesson 2: Configuring a DHCP Server
Performing Post-Installation Tasks
Creating Address Exclusions Creating Reservations Adjusting Lease Durations Configuring Additional DHCP Options
Understanding DHCP Options Classes
Implementing User Classes
Controlling DHCP Access Through MAC Filtering DHCP Delay Configuration Using the DHCP Split-Scope Configuration Wizard Configuring DHCP to Perform Dynamic DNS Updates for Clients
Configuring Name Protection Using the DnsUpdateProxy Security Group
Installing and Configuring DHCP on a Server Core Installation
Practice: Creating an Exclusion Range
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Deploying a New DHCP Server Case Scenario 2: Configuring DHCP Options
Suggested Practice
Configure DHCP
Take a Practice Test
5. Configuring IP Routing
Before You Begin Lesson 1: Routing
Routing Overview Examining Network Routes Routing Protocols
Installing Routing and Remote Access Services Configuring RIP Configuring an IGMP Proxy
Demand-Dial Routing Static Routing
Configuring Static Routing with the Route Command Configuring Static Routing with Routing and Remote Access Practice: Analyzing and Configuring Routing
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Adding a Second Default Gateway Case Scenario 2: Adding a New Subnet
Suggested Practices Take a Practice Test
6. Protecting Network Traffic with IPsec
Before You Begin Lesson 1: Configuring IPsec
What Is IPsec?
IPsec Policies
IPsec Policy Example
Connection Security Rules Security Associations How IPsec Connections Are Established
Using IPsec in Tunnel Mode Authentication Methods for IPsec Assigning a Predefined IPsec Policy Creating a New IPsec Policy
Using the Create IP Security Rule Wizard Managing IP Filter Lists and Filter Actions
Creating and Configuring a Connection Security Rule
Using the New Connection Security Rule Wizard
Rule Type Page Endpoints Page Requirements Page Authentication Method Page Protocols and Ports Page Profile Page Name Page
Configuring IPsec Settings for Connection Security Rules Practice: Deploying IPsec Through IPsec Policies and Connection Security Rules
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Implementing IPsec
Suggested Practices
Deploy IPsec Watch a Webcast
Take a Practice Test
7. Connecting to Networks
Before You Begin Lesson 1: Configuring Network Policy Server
Wireless Security Standards Infrastructure and Ad Hoc Wireless Networks Configuring the Public Key Infrastructure Authenticating Wireless Networks by Using Windows Server 2008 R2
Configuring the RADIUS Server for Wireless Networks Configuring RADIUS Proxies Monitoring RADIUS Server Logons
Using Event Viewer RADIUS Logging Enabling Trace Logging on the Server
Connecting to Wireless Networks Deploying Wireless Networks with WPA-EAP Wired Network Security Using NPS Templates
Practice: Configuring WPA-EAP Authentication for a Wireless Access Point
Lesson Summary Lesson Review
Lesson 2: Configuring Network Address Translation
Network Address Translation Concepts Configuring Internet Connection Sharing Configuring Network Address Translation by Using Routing And Remote Access
Enabling NAT Enabling DHCP Enabling Forwarding of DNS Requests Configuring Client Computers
Troubleshooting Network Address Translation
Practice: Configuring NAT
Lesson Summary Lesson Review
Lesson 3: Connecting to Remote Networks
Remote Access Overview
Dial-Up Connections Virtual Private Networks
Configuring Dial-Up Connections
Configuring the Dial-Up Server Configuring the RADIUS Server for Dial-Up Connections Configuring the Dial-Up Client
Configuring VPN Connections
Configuring the VPN Server Configuring VPN Packet Filters Configuring the VPN Client Configuring VPN Reconnect
Troubleshooting VPN Connection Problems Configuring Connection Restrictions Testing Connectivity
Ipconfig Ping Tracert Practice: Establishing a Remote Access VPN Connection
Lesson Summary Lesson Review
Lesson 4: Configuring DirectAccess
DirectAccess Connection Types Using DirectAccess on IPv4 Networks DirectAccess and Name Resolution The Network Location Server DirectAccess Requirements DirectAccess Limitations Firewall Configuration Running the DirectAccess Setup Wizard
Practice: Configuring DirectAccess
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Connecting a Branch Office to the Internet
Questions
Case Scenario 2: Planning Remote Access
Interviews Questions
Suggested Practices
Configure Wireless Access Configure Remote Access Configure Network Authentication Configure DirectAccess
Take a Practice Test
8. Configuring Windows Firewall and Network Access Protection
Before You Begin Lesson 1: Configuring Windows Firewall
Why Firewalls Are Important Firewall Profiles Filtering Inbound Traffic Filtering Outbound Traffic Configuring Scope Authorizing Connections Configuring Firewall Settings with Group Policy Enabling Logging for Windows Firewall Identifying Network Communications
Practice: Configuring Windows Firewall
Lesson Summary Lesson Review
Lesson 2: Configuring Network Access Protection
Network Access Protection Concepts
Enforcement Types
IPsec Connection Security 802.1X Access Points VPN Servers DHCP Servers Remote Desktop Gateways
System Health Agents and System Health Validators
Planning a NAP Deployment Installing and Configuring the Network Policy Server
Installing NAP Using the Configure NAP Wizard
Configuring NAP Enforcement
Configuring IPsec Enforcement
Step 1: Installing the HRA Role Service Step 2: Configuring the NAP Wizard Step 3: Configuring HRA Step 4: Configuring Client Computers for IPsec Enforcement Step 5: Configuring IPsec Connection Security Rules
Configuring 802.1X Enforcement Configuring DHCP Enforcement
Enabling NAP on All DHCP Scopes Enabling NAP on a Single DHCP Scope
Configuring VPN Enforcement Configuring RD Gateway Enforcement
Configuring NAP Components
Configuring NAP Clients Configuring a Health Requirement Policy
Configuring SHVs Configuring the Windows Security Health Validator Configuring Remediation Configuring Network Policies
Configuring NAP for Monitoring Only
NAP Logging
Practice: Configuring DHCP NAP Enforcement
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Evaluating Firewall Settings
Interviews Questions
Case Scenario 2: Planning NAP
Questions
Suggested Practices
Configure Firewall Settings Configure Network Access Protection
Take a Practice Test
9. Managing Software Updates
Before You Begin Lesson 1: Understanding Windows Server Update Services
WSUS Overview Windows Update Client WSUS Architecture
Organizations with One Office Organizations with Multiple Offices Organizations with Multiple IT Departments
WSUS Requirements Planning the WSUS Installation Auditing Updates Lesson Summary Lesson Review
Lesson 2: Using Windows Server Update Services
Installing Windows Server Update Services Configuring Windows Server Update Services
Configuring WSUS Options Configuring Computer Groups
Server-Side Targeting Client-side Targeting
Configuring Client Computers Approving Updates Declining Updates Viewing Reports Managing Synchronizations Administering WSUS from the Command Line Configuring WSUS to Use an SSL Certificate
Troubleshooting Problems Installing Updates
Troubleshooting WSUS Troubleshooting the Windows Update Client
Removing Updates
Practice: Deploying Updates with WSUS
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Planning a Basic WSUS Infrastructure Case Scenario 2: Planning a Complex WSUS Infrastructure
Interviews Questions
Suggested Practice
Configure Windows Server Update Services Server Settings
Take a Practice Test
10. Monitoring Computers
Before You Begin Lesson 1: Monitoring Events
Using Event Viewer
Filtering Events Using Custom Views
Automatically Responding to Events Configuring Event Forwarding
Configuring the Forwarding Computer Configuring the Collecting Computer Creating an Event Subscription Configuring Event Forwarding to Use HTTPS Troubleshooting Event Forwarding Practice: Responding to and Collecting Events
Lesson Summary Lesson Review
Lesson 2: Monitoring Performance and Reliability
Using Performance Monitor Using Reliability Monitor Using Data Collector Sets
Using Built-in Data Collector Sets Creating a Data Collector Set Customizing a Data Collector Set Saving Performance Data Viewing Saved Performance Data in a Report Using Logman
Configuring Virtual Memory
Practice: Running a Data Collector Set and Analyzing the Results
Lesson Summary Lesson Review
Lesson 3: Using Network Monitor and Simple Network Management Protocol
Installing Network Monitor Capturing and Analyzing Network Communications
Capturing Network Data Capturing Network Data by Using a Command Prompt Analyzing Network Data Assigning Aliases Filtering Network Data
Configuring SNMP
Practice: Capturing and Analyzing Network Traffic
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Troubleshooting a Network Performance Problem
Interviews Questions
Case Scenario 2: Monitoring Computers for Low Disk Space
Suggested Practices
Configure Event Logs Configure Performance Monitoring Gather Network Data
Take a Practice Test
11. Managing Files
Before You Begin Lesson 1: Managing File Security
NTFS File Permissions Encrypting File System
Protecting Files and Folders with EFS Sharing Files Protected with EFS Configuring EFS by Using Group Policy Settings Configuring a Data Recovery Agent
BitLocker
BitLocker Modes Managing TPM Hardware Enabling BitLocker Encryption Practice: Encrypting and Recovering Files
Lesson Summary Lesson Review
Lesson 2: Sharing Folders
Installing the File Services Server Role Quotas
Configuring Disk Quotas by Using the Quota Management Console
Creating Quota Templates Creating Quotas
Configuring Disk Quotas at a Command Prompt or Script Configuring Disk Quotas by Using Windows Explorer Configuring Disk Quotas by Using Group Policy
Folder Sharing
Sharing Folders from Windows Explorer Sharing Folders by Using the Provision A Shared Folder Wizard Sharing Folders from a Command Prompt or Script Connecting to Shared Folders
Classification Management
Creating Classification Properties Creating Classification Rules
Distributed File System
Installing DFS Creating a DFS Namespace Adding Folders to a DFS Namespace Configuring DFS Root Permissions Configuring DFS from a Command Prompt or Script Generating Health Reports for DFS Replication Configuring Failover Clustering for DFS
Offline Files BranchCache
Using BranchCache Modes
Distributed Cache Mode Hosted Cache Mode
Configuring BranchCache
Installing Required Components for a File Server Installing Required Components for a Web Server or Hosted Cache Server Configuring BranchCache Servers Configuring BranchCache Clients
Practice: Working with Shared Folders
Lesson Summary Lesson Review
Lesson 3: Backing Up and Restoring Files
Shadow Copies
Managing Shadow Copies from Windows Explorer Managing Shadow Copies from a Command Prompt
Windows Server Backup
Installing Windows Server Backup Features Manually Performing a Backup Scheduling Backups Performing Backups from a Command Prompt or Script Recovering Individual Files Recovering Files or Volumes Recovering from a Backup When Windows Will Not Start Practice: Backing Up and Restoring Files
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Planning File Services Case Scenario 2: Planning Disaster Recovery
Suggested Practices
Configure a File Server Configure Distributed File System Configure Shadow Copy Services Configure Backup and Restore Manage File Server Resources
Take a Practice Test
12. Managing Printers
Before You Begin Lesson 1: Managing Printers
Installing the Print And Document Services Server Role Installing Printers
Installing a Printer by Using Control Panel Installing a Printer by Using the Print Management Snap-in
Sharing Printers Configuring Print Server and Printer Permissions Adding Printer Drivers Configuring Printer Pooling Configuring Printer Priorities Managing Internet Printing Generating Notifications Deploying Printers with Group Policy Migrating Printers
Exporting Printers Importing Printers
Managing Printers from a Command Prompt or Script Monitoring Printers
Practice: Installing and Sharing a Printer
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Managing Network Printers
Suggested Practices
Configure and Monitor Print Services
Take a Practice Test
A. Answers
Chapter 1: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3
Chapter 1: Case Scenario Answers
Case Scenario: Working with IPv4 Address Blocks
Chapter 2: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3
Chapter 2: Case Scenario Answers
Case Scenario 1: Troubleshooting DNS Clients Case Scenario 2: Deploying a DNS Server
Chapter 3: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3
Chapter 3: Case Scenario Answers
Case Scenario 1: Managing Outdated Zone Data Case Scenario 2: Configuring Zone Transfers
Chapter 4: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 4: Case Scenario Answers
Case Scenario 1: Deploying a New DHCP Server Case Scenario 2: Configuring DHCP Options
Chapter 5: Lesson Review Answers
Lesson Case Scenario 1: Adding a Second Default Gateway Case Scenario 2: Adding a New Subnet
Chapter 6: Lesson Review Answers
Lesson
Chapter 6: Case Scenario Answers
Case Scenario: Implementing IPsec
Chapter 7: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3 Lesson 4
Chapter 7: Case Scenario Answers
Case Scenario 1: Connecting a Branch Office to the Internet Case Scenario 2: Planning Remote Access
Chapter 8: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 8: Case Scenario Answers
Case Scenario 1: Evaluating Firewall Settings Case Scenario 2: Planning NAP
Chapter 9: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 9: Case Scenario Answers
Case Scenario 1: Planning a Basic WSUS Infrastructure Case Scenario 2: Planning a Complex WSUS Infrastructure
Chapter 10: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3
Chapter 10: Case Scenario Answers
Case Scenario 1: Troubleshooting a Network Performance Problem Case Scenario 2: Monitoring Computers for Low Disk Space
Chapter 11: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3
Chapter 11: Case Scenario Answers
Case Scenario 1: Planning File Services Case Scenario 2: Planning Disaster Recovery
Chapter 12: Lesson Review Answers
Lesson
Chapter 12: Case Scenario Answers
Case Scenario: Managing Network Printers
Glossary B. About the Authors Index About the Authors
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion