Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server® 2008 Network Infrastructure
Exam 70-642: TS: Windows Server 2008 Network Infrastructure, Configuring
Introduction
System Requirements
Hardware Requirements
Software Requirements
Lab Setup Instructions
Preparing the Windows Server 2008 R2 Computers
Using the CD
How to Install the Practice Tests
How to Use the Practice Tests
Lesson Review Options
Practice Test Options
How to Uninstall the Practice Tests
Acknowledgments
Support & Feedback
Errata
We Want to Hear from You
Stay in Touch
Preparing for the Exam
1. Understanding and Configuring TCP/IP
Before You Begin
Lesson 1: Introducing Windows Networking
What Are Network Layers?
Exploring the Layers of the TCP/IP Networking Model
Network Interface Layer
Internet Layer
Transport Layer
Application Layer
TCP/IP Encapsulation
Configuring Networking Properties in Windows Server 2008 R2
Network and Sharing Center
Viewing Network Connections
Viewing Default Components of Network Connections
Bridging Network Connections
Viewing an Address Configuration
Assigning an IP Configuration Manually
Assigning an IPv4 Configuration Manually
Assigning an IPv6 Configuration Manually
Configuring IPv4 and IPv6 Settings Manually from the Command Prompt
Configuring an IPv4 Connection to Receive an Address Automatically
Understanding DHCP-Assigned Addresses
Defining an Alternate Configuration
Understanding Automatic Private IP Addressing
Repairing a Network Connection with Ipconfig /Renew and the Diagnose Feature
Troubleshooting Network Connectivity with Ping, Tracert, PathPing, and Arp
Practice: Configuring TCP/IP Addresses
Lesson Summary
Lesson Review
Lesson 2: Understanding IPv4 Addressing
The Structure of IPv4 Addresses
Network ID and Host ID
IPv4 Addresses and ZIP+4 Compared
Subnet Masks
Subnet Mask Notations
Subnet Mask Midrange Values
Subnet Mask Octet Values
Understanding Routing and Default Gateways
Understanding IPv4 Address Ranges
Using Public IPv4 Addresses
Using Private IPv4 Addresses
Understanding Address Blocks and Subnets
Creating an IPv4 Address Block Reference Chart
Determining the Block Size for a /n Network
Determining the Block Size for a Dotted-Decimal Subnet Mask
Determining Host Capacity Per Block
Determining Block Size Requirements
What Is Subnetting?
Advantages of Subnetting
Accommodating Physical Topology
Restricting Broadcast Traffic
The Subnet ID
Creating Equally Sized Subnets
Using Variable-Length Subnet Masks
Enumerating Subnets in an Address Space
Verifying Subnet Ownership and Configuration
Practice: Learning to Work with Address Blocks
Lesson Summary
Lesson Review
Lesson 3: Understanding IPv6 Addressing
Introducing IPv6 Addresses
The Structure of IPv6 Addresses
How Do IPv6 Computers Receive an IPv6 Address?
Understanding IPv6 Address Types
Global Addresses
Link-Local Addresses
Unique Local Addresses
States of an IPv6 Address
IPv6 Transition Technologies
Next Generation TCP/IP
Intra-Site Automatic Tunnel Addressing Protocol
6to4
Teredo
IP-HTTPS
Working with IPv6 Subnets
Determining the Number of Bits Left in the Subnet ID
Determining How Many Bits You Need for Subnetting
Determining the New Network Prefix to Be Used Within Your Subnetted Portion of the Network
Determining the Hexadecimal Increment Between Subnet Addresses
Using the Hexadecimal Increment to Determine the Network Address of Each Subnet
Practice: Testing IPv6 Connectivity
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario: Working with IPv4 Address Blocks
Suggested Practices
Configure IP Addressing
Take a Practice Test
2. Configuring Name Resolution
Before You Begin
Lesson 1: Understanding Name Resolution in Windows Server 2008 Networks
Name Resolution Methods in Windows
What Is Link Local Multicast Name Resolution?
What Is NetBIOS Name Resolution?
NetBIOS Name Resolution Methods
NetBIOS Broadcasts
WINS
Lmhosts File
Enabling and Disabling NetBIOS
NetBIOS Node Types
Advantages and Disadvantages of NetBIOS
What Is DNS Name Resolution?
DNS Namespace
Domain Names
Private Domain Namespace
DNS Components
DNS Servers
DNS Zones
DNS Resolvers
Resource Records
Understanding How a DNS Query Works
DNS Resolution Methods
DNS Query Steps
Step 1: The Local Resolver
Step 2: Querying a DNS Server
Understanding Recursion
Root Hints
Query Example
Understanding How Caching Works
DNS Client Cache
DNS Server Cache
Time to Live Values
Practice: Exploring Automatic Name Resolution in Local Networks
Lesson Summary
Lesson Review
Lesson 2: Deploying a DNS Server
Deploying a DNS Server on a Domain Controller
Deploying a DNS Server on a Stand-Alone or Member Server
Deploying a DNS Server on a Server Core Installation of Windows Server 2008 R2
Configuring a Caching-Only DNS Server
Configuring Server Properties
Interfaces Tab
Root Hints Tab
Forwarders Tab
When to Use Forwarders
When to Use Conditional Forwarding
Configuring DNS Socket Pooling
Configuring DNS Cache Locking
Practice: Exploring DNS in an Active Directory Environment
Lesson Summary
Lesson Review
Lesson 3: Configuring DNS Client Settings
Specifying DNS Servers
Specifying a Computer Name and DNS Suffixes
Configuring a Connection-Specific DNS Suffix
Configuring a Suffix Search List
Default DNS Suffix Searches
DNS Devolution Levels
Custom DNS Suffix Search Lists
Configuring Dynamic Update Settings
Default Client Update Behavior
Update Behavior for Host Records
Update Behavior for Pointer Records
Viewing and Clearing the DNS Client Cache
Practice: Managing the DNS Client Cache
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Troubleshooting DNS Clients
Case Scenario 2: Deploying a DNS Server
Suggested Practices
Configure a DNS Server
Configure Name Resolution for Client Computers
Take a Practice Test
3. Configuring a DNS Zone Infrastructure
Before You Begin
Lesson 1: Creating and Configuring Zones
Creating Zones
Choosing a Zone Type
Primary Zones
Secondary Zones
Stub Zones
Storing the Zone in Active Directory
Standard Zones
Choosing an Active Directory Zone Replication Scope
Creating a Forward or Reverse Lookup Zone
Choosing a Zone Name
Configuring Dynamic Update Settings
Dynamic Updates and DNS Record Security
Examining Built-in Resource Records
Start of Authority (SOA) Records
Name Server Records
Creating Resource Records
Record Types
Host Resource Records
Alias Resource Records
Mail Exchanger Resource Records
Pointer Resource Records
Service Resource Records
Enabling DNS to Use WINS Resolution
Aging and Scavenging
Enabling Aging
Time Stamping
Modifying Zone Aging/Scavenging Properties
Performing Scavenging
Using a GlobalNames Zone
Deploying a GlobalNames Zone
Practice: Deploying a GlobalNames Zone
Lesson Summary
Lesson Review
Lesson 2: Configuring Zone Replication, Transfers, and Delegations
Configuring Zone Replication for Active Directory–Integrated Zones
Replication and Application Directory Partitions
DomainDnsZones and ForestDNSZones
Custom Application Directory Partitions
Storing DNS Data in the Domain Partition
Choosing Zone Replication Scope
Creating Custom Application Directory Partitions
Using Zone Transfers
Zone Transfer Initiation
Enabling Zone Transfers
Configuring Notifications
Manually Updating a Secondary Zone
Understanding Zone Delegations
When to Delegate Zones
How Delegations Work
Creating a Zone Delegation
Implementing Stub Zones
Stub Zone Example
Other Uses for Stub Zones
Practice: Creating an Application Directory Partition for DNS
Practice: Deploying a Secondary Zone
Lesson Summary
Lesson Review
Lesson 3: Implementing DNSSEC
Understanding Public Key Cryptography in DNSSEC
Understanding Key Pairs
Understanding Digital Signatures
Understanding DNSSEC Trust Relationships
Understanding DNSSEC Name Resolution
Configuring DNSSEC
Configuring DNSSEC in Windows Server 2008 R2
Preparing A Zone for DNSSEC
Choosing a Key Rollover Mechanism
Generating Key Pairs
Signing a Zone File
Configure Trust Anchors
Configuring Clients for DNSSEC
Practice: Configuring DNSSEC
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Managing Outdated Zone Data
Case Scenario 2: Configuring Zone Transfers
Suggested Practices
Configure a DNS Infrastructure
Take a Practice Test
4. Creating a DHCP Infrastructure
Before You Begin
Lesson 1: Installing a DHCP Server
Understanding DHCP Address Assignment
Understanding Address Leases
Understanding DHCP Scopes
Understanding DHCP Options
Adding the DHCP Server Role
Selecting Network Connection Bindings
Specifying IPv4 DNS Server Settings
Specifying IPv4 WINS Server Settings
Adding DHCP Scopes
Configuring DHCPv6 Stateless Mode
Configuring Clients for Stateful or Stateless IPv6 Addressing
Configuring IPv6 DNS Server Settings
Authorizing DHCP Server
Practice: Deploying a DHCP Server
Lesson Summary
Lesson Review
Lesson 2: Configuring a DHCP Server
Performing Post-Installation Tasks
Creating Address Exclusions
Creating Reservations
Adjusting Lease Durations
Configuring Additional DHCP Options
Understanding DHCP Options Classes
Implementing User Classes
Controlling DHCP Access Through MAC Filtering
DHCP Delay Configuration
Using the DHCP Split-Scope Configuration Wizard
Configuring DHCP to Perform Dynamic DNS Updates for Clients
Configuring Name Protection
Using the DnsUpdateProxy Security Group
Installing and Configuring DHCP on a Server Core Installation
Practice: Creating an Exclusion Range
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Deploying a New DHCP Server
Case Scenario 2: Configuring DHCP Options
Suggested Practice
Configure DHCP
Take a Practice Test
5. Configuring IP Routing
Before You Begin
Lesson 1: Routing
Routing Overview
Examining Network Routes
Routing Protocols
Installing Routing and Remote Access Services
Configuring RIP
Configuring an IGMP Proxy
Demand-Dial Routing
Static Routing
Configuring Static Routing with the Route Command
Configuring Static Routing with Routing and Remote Access
Practice: Analyzing and Configuring Routing
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Adding a Second Default Gateway
Case Scenario 2: Adding a New Subnet
Suggested Practices
Take a Practice Test
6. Protecting Network Traffic with IPsec
Before You Begin
Lesson 1: Configuring IPsec
What Is IPsec?
IPsec Policies
IPsec Policy Example
Connection Security Rules
Security Associations
How IPsec Connections Are Established
Using IPsec in Tunnel Mode
Authentication Methods for IPsec
Assigning a Predefined IPsec Policy
Creating a New IPsec Policy
Using the Create IP Security Rule Wizard
Managing IP Filter Lists and Filter Actions
Creating and Configuring a Connection Security Rule
Using the New Connection Security Rule Wizard
Rule Type Page
Endpoints Page
Requirements Page
Authentication Method Page
Protocols and Ports Page
Profile Page
Name Page
Configuring IPsec Settings for Connection Security Rules
Practice: Deploying IPsec Through IPsec Policies and Connection Security Rules
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenario
Case Scenario: Implementing IPsec
Suggested Practices
Deploy IPsec
Watch a Webcast
Take a Practice Test
7. Connecting to Networks
Before You Begin
Lesson 1: Configuring Network Policy Server
Wireless Security Standards
Infrastructure and Ad Hoc Wireless Networks
Configuring the Public Key Infrastructure
Authenticating Wireless Networks by Using Windows Server 2008 R2
Configuring the RADIUS Server for Wireless Networks
Configuring RADIUS Proxies
Monitoring RADIUS Server Logons
Using Event Viewer
RADIUS Logging
Enabling Trace Logging on the Server
Connecting to Wireless Networks
Deploying Wireless Networks with WPA-EAP
Wired Network Security
Using NPS Templates
Practice: Configuring WPA-EAP Authentication for a Wireless Access Point
Lesson Summary
Lesson Review
Lesson 2: Configuring Network Address Translation
Network Address Translation Concepts
Configuring Internet Connection Sharing
Configuring Network Address Translation by Using Routing And Remote Access
Enabling NAT
Enabling DHCP
Enabling Forwarding of DNS Requests
Configuring Client Computers
Troubleshooting Network Address Translation
Practice: Configuring NAT
Lesson Summary
Lesson Review
Lesson 3: Connecting to Remote Networks
Remote Access Overview
Dial-Up Connections
Virtual Private Networks
Configuring Dial-Up Connections
Configuring the Dial-Up Server
Configuring the RADIUS Server for Dial-Up Connections
Configuring the Dial-Up Client
Configuring VPN Connections
Configuring the VPN Server
Configuring VPN Packet Filters
Configuring the VPN Client
Configuring VPN Reconnect
Troubleshooting VPN Connection Problems
Configuring Connection Restrictions
Testing Connectivity
Ipconfig
Ping
Tracert
Practice: Establishing a Remote Access VPN Connection
Lesson Summary
Lesson Review
Lesson 4: Configuring DirectAccess
DirectAccess Connection Types
Using DirectAccess on IPv4 Networks
DirectAccess and Name Resolution
The Network Location Server
DirectAccess Requirements
DirectAccess Limitations
Firewall Configuration
Running the DirectAccess Setup Wizard
Practice: Configuring DirectAccess
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Connecting a Branch Office to the Internet
Questions
Case Scenario 2: Planning Remote Access
Interviews
Questions
Suggested Practices
Configure Wireless Access
Configure Remote Access
Configure Network Authentication
Configure DirectAccess
Take a Practice Test
8. Configuring Windows Firewall and Network Access Protection
Before You Begin
Lesson 1: Configuring Windows Firewall
Why Firewalls Are Important
Firewall Profiles
Filtering Inbound Traffic
Filtering Outbound Traffic
Configuring Scope
Authorizing Connections
Configuring Firewall Settings with Group Policy
Enabling Logging for Windows Firewall
Identifying Network Communications
Practice: Configuring Windows Firewall
Lesson Summary
Lesson Review
Lesson 2: Configuring Network Access Protection
Network Access Protection Concepts
Enforcement Types
IPsec Connection Security
802.1X Access Points
VPN Servers
DHCP Servers
Remote Desktop Gateways
System Health Agents and System Health Validators
Planning a NAP Deployment
Installing and Configuring the Network Policy Server
Installing NAP
Using the Configure NAP Wizard
Configuring NAP Enforcement
Configuring IPsec Enforcement
Step 1: Installing the HRA Role Service
Step 2: Configuring the NAP Wizard
Step 3: Configuring HRA
Step 4: Configuring Client Computers for IPsec Enforcement
Step 5: Configuring IPsec Connection Security Rules
Configuring 802.1X Enforcement
Configuring DHCP Enforcement
Enabling NAP on All DHCP Scopes
Enabling NAP on a Single DHCP Scope
Configuring VPN Enforcement
Configuring RD Gateway Enforcement
Configuring NAP Components
Configuring NAP Clients
Configuring a Health Requirement Policy
Configuring SHVs
Configuring the Windows Security Health Validator
Configuring Remediation
Configuring Network Policies
Configuring NAP for Monitoring Only
NAP Logging
Practice: Configuring DHCP NAP Enforcement
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Evaluating Firewall Settings
Interviews
Questions
Case Scenario 2: Planning NAP
Questions
Suggested Practices
Configure Firewall Settings
Configure Network Access Protection
Take a Practice Test
9. Managing Software Updates
Before You Begin
Lesson 1: Understanding Windows Server Update Services
WSUS Overview
Windows Update Client
WSUS Architecture
Organizations with One Office
Organizations with Multiple Offices
Organizations with Multiple IT Departments
WSUS Requirements
Planning the WSUS Installation
Auditing Updates
Lesson Summary
Lesson Review
Lesson 2: Using Windows Server Update Services
Installing Windows Server Update Services
Configuring Windows Server Update Services
Configuring WSUS Options
Configuring Computer Groups
Server-Side Targeting
Client-side Targeting
Configuring Client Computers
Approving Updates
Declining Updates
Viewing Reports
Managing Synchronizations
Administering WSUS from the Command Line
Configuring WSUS to Use an SSL Certificate
Troubleshooting Problems Installing Updates
Troubleshooting WSUS
Troubleshooting the Windows Update Client
Removing Updates
Practice: Deploying Updates with WSUS
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Planning a Basic WSUS Infrastructure
Case Scenario 2: Planning a Complex WSUS Infrastructure
Interviews
Questions
Suggested Practice
Configure Windows Server Update Services Server Settings
Take a Practice Test
10. Monitoring Computers
Before You Begin
Lesson 1: Monitoring Events
Using Event Viewer
Filtering Events
Using Custom Views
Automatically Responding to Events
Configuring Event Forwarding
Configuring the Forwarding Computer
Configuring the Collecting Computer
Creating an Event Subscription
Configuring Event Forwarding to Use HTTPS
Troubleshooting Event Forwarding
Practice: Responding to and Collecting Events
Lesson Summary
Lesson Review
Lesson 2: Monitoring Performance and Reliability
Using Performance Monitor
Using Reliability Monitor
Using Data Collector Sets
Using Built-in Data Collector Sets
Creating a Data Collector Set
Customizing a Data Collector Set
Saving Performance Data
Viewing Saved Performance Data in a Report
Using Logman
Configuring Virtual Memory
Practice: Running a Data Collector Set and Analyzing the Results
Lesson Summary
Lesson Review
Lesson 3: Using Network Monitor and Simple Network Management Protocol
Installing Network Monitor
Capturing and Analyzing Network Communications
Capturing Network Data
Capturing Network Data by Using a Command Prompt
Analyzing Network Data
Assigning Aliases
Filtering Network Data
Configuring SNMP
Practice: Capturing and Analyzing Network Traffic
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Troubleshooting a Network Performance Problem
Interviews
Questions
Case Scenario 2: Monitoring Computers for Low Disk Space
Suggested Practices
Configure Event Logs
Configure Performance Monitoring
Gather Network Data
Take a Practice Test
11. Managing Files
Before You Begin
Lesson 1: Managing File Security
NTFS File Permissions
Encrypting File System
Protecting Files and Folders with EFS
Sharing Files Protected with EFS
Configuring EFS by Using Group Policy Settings
Configuring a Data Recovery Agent
BitLocker
BitLocker Modes
Managing TPM Hardware
Enabling BitLocker Encryption
Practice: Encrypting and Recovering Files
Lesson Summary
Lesson Review
Lesson 2: Sharing Folders
Installing the File Services Server Role
Quotas
Configuring Disk Quotas by Using the Quota Management Console
Creating Quota Templates
Creating Quotas
Configuring Disk Quotas at a Command Prompt or Script
Configuring Disk Quotas by Using Windows Explorer
Configuring Disk Quotas by Using Group Policy
Folder Sharing
Sharing Folders from Windows Explorer
Sharing Folders by Using the Provision A Shared Folder Wizard
Sharing Folders from a Command Prompt or Script
Connecting to Shared Folders
Classification Management
Creating Classification Properties
Creating Classification Rules
Distributed File System
Installing DFS
Creating a DFS Namespace
Adding Folders to a DFS Namespace
Configuring DFS Root Permissions
Configuring DFS from a Command Prompt or Script
Generating Health Reports for DFS Replication
Configuring Failover Clustering for DFS
Offline Files
BranchCache
Using BranchCache Modes
Distributed Cache Mode
Hosted Cache Mode
Configuring BranchCache
Installing Required Components for a File Server
Installing Required Components for a Web Server or Hosted Cache Server
Configuring BranchCache Servers
Configuring BranchCache Clients
Practice: Working with Shared Folders
Lesson Summary
Lesson Review
Lesson 3: Backing Up and Restoring Files
Shadow Copies
Managing Shadow Copies from Windows Explorer
Managing Shadow Copies from a Command Prompt
Windows Server Backup
Installing Windows Server Backup Features
Manually Performing a Backup
Scheduling Backups
Performing Backups from a Command Prompt or Script
Recovering Individual Files
Recovering Files or Volumes
Recovering from a Backup When Windows Will Not Start
Practice: Backing Up and Restoring Files
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Planning File Services
Case Scenario 2: Planning Disaster Recovery
Suggested Practices
Configure a File Server
Configure Distributed File System
Configure Shadow Copy Services
Configure Backup and Restore
Manage File Server Resources
Take a Practice Test
12. Managing Printers
Before You Begin
Lesson 1: Managing Printers
Installing the Print And Document Services Server Role
Installing Printers
Installing a Printer by Using Control Panel
Installing a Printer by Using the Print Management Snap-in
Sharing Printers
Configuring Print Server and Printer Permissions
Adding Printer Drivers
Configuring Printer Pooling
Configuring Printer Priorities
Managing Internet Printing
Generating Notifications
Deploying Printers with Group Policy
Migrating Printers
Exporting Printers
Importing Printers
Managing Printers from a Command Prompt or Script
Monitoring Printers
Practice: Installing and Sharing a Printer
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenario
Case Scenario: Managing Network Printers
Suggested Practices
Configure and Monitor Print Services
Take a Practice Test
A. Answers
Chapter 1: Lesson Review Answers
Lesson 1
Lesson 2
Lesson 3
Chapter 1: Case Scenario Answers
Case Scenario: Working with IPv4 Address Blocks
Chapter 2: Lesson Review Answers
Lesson 1
Lesson 2
Lesson 3
Chapter 2: Case Scenario Answers
Case Scenario 1: Troubleshooting DNS Clients
Case Scenario 2: Deploying a DNS Server
Chapter 3: Lesson Review Answers
Lesson 1
Lesson 2
Lesson 3
Chapter 3: Case Scenario Answers
Case Scenario 1: Managing Outdated Zone Data
Case Scenario 2: Configuring Zone Transfers
Chapter 4: Lesson Review Answers
Lesson 1
Lesson 2
Chapter 4: Case Scenario Answers
Case Scenario 1: Deploying a New DHCP Server
Case Scenario 2: Configuring DHCP Options
Chapter 5: Lesson Review Answers
Lesson
Case Scenario 1: Adding a Second Default Gateway
Case Scenario 2: Adding a New Subnet
Chapter 6: Lesson Review Answers
Lesson
Chapter 6: Case Scenario Answers
Case Scenario: Implementing IPsec
Chapter 7: Lesson Review Answers
Lesson 1
Lesson 2
Lesson 3
Lesson 4
Chapter 7: Case Scenario Answers
Case Scenario 1: Connecting a Branch Office to the Internet
Case Scenario 2: Planning Remote Access
Chapter 8: Lesson Review Answers
Lesson 1
Lesson 2
Chapter 8: Case Scenario Answers
Case Scenario 1: Evaluating Firewall Settings
Case Scenario 2: Planning NAP
Chapter 9: Lesson Review Answers
Lesson 1
Lesson 2
Chapter 9: Case Scenario Answers
Case Scenario 1: Planning a Basic WSUS Infrastructure
Case Scenario 2: Planning a Complex WSUS Infrastructure
Chapter 10: Lesson Review Answers
Lesson 1
Lesson 2
Lesson 3
Chapter 10: Case Scenario Answers
Case Scenario 1: Troubleshooting a Network Performance Problem
Case Scenario 2: Monitoring Computers for Low Disk Space
Chapter 11: Lesson Review Answers
Lesson 1
Lesson 2
Lesson 3
Chapter 11: Case Scenario Answers
Case Scenario 1: Planning File Services
Case Scenario 2: Planning Disaster Recovery
Chapter 12: Lesson Review Answers
Lesson
Chapter 12: Case Scenario Answers
Case Scenario: Managing Network Printers
Glossary
B. About the Authors
Index
About the Authors
← Prev
Back
Next →
← Prev
Back
Next →