Lesson Plans Configuring Windows Server 2008 Network Infrastructure (Exam 70-642) Table of Contents Course Overview ................................................................................................................ 3 Section 0.1: Introduction ..................................................................................................... 5 Section 0.2: Server Management ........................................................................................ 6 Section 0.3: Remote Management ...................................................................................... 8 Section 0.4: Mathematical Foundations .............................................................................. 9 Section 1.1: IPv4 Addressing ............................................................................................ 10 Section 1.2: IPv4 Subnetting............................................................................................. 11 Section 1.3: IPv4 Host Configuration ............................................................................... 13 Section 2.1: IPv6 ............................................................................................................... 15 Section 2.2: IPv6 Addressing ............................................................................................ 16 Section 2.3: IPv6 Configuration ....................................................................................... 18 Section 2.4: IPv6 Implementation..................................................................................... 20 Section 3.1: DHCP Configuration .................................................................................... 21 Section 3.2: DHCP Options .............................................................................................. 23 Section 3.3: Advanced DHCPv4 Settings ......................................................................... 25 Section 3.4: Server Placement .......................................................................................... 27 Section 3.5: Superscopes and Split Scopes ....................................................................... 29 Section 3.6: DHCPv6 ........................................................................................................ 30 Section 4.1: DNS Concepts............................................................................................... 32 Section 4.2: Name Resolution........................................................................................... 34 Section 4.3: Zone Configuration ....................................................................................... 35 Section 4.4: Active Directory-integrated Zones ............................................................... 37 Section 4.5: Resource Records ......................................................................................... 38 Section 4.6: Client Configuration ..................................................................................... 39 Section 4.7: Dynamic DNS ............................................................................................... 40 Section 4.8: Stub Zones and Forwarding .......................................................................... 41 Section 4.9: Root Hints and Root Zone ............................................................................ 43 Section 4.10: Zone Delegation .......................................................................................... 44 Section 4.11: DNS Features .............................................................................................. 45 Section 4.12: New DNS Features ..................................................................................... 47 Section 4.13: Single-label Name Resolution .................................................................... 49 Section 4.14: DNS Design ................................................................................................ 51 Section 5.1: Routing.......................................................................................................... 53 Section 5.2: RIP ................................................................................................................ 55 Section 5.3: Demand-dial Routing.................................................................................... 57 Section 5.4: ICS and NAT ................................................................................................ 59 Section 6.1: Remote Access Concepts .............................................................................. 61 Section 6.2: Dial-up and VPN .......................................................................................... 63 Section 6.3: SSTP ............................................................................................................. 65 Section 6.4: CMAK .......................................................................................................... 66 Section 7.1: Network Location Profiles ............................................................................ 67 Section 7.2: RADIUS........................................................................................................ 68 Section 7.3: Network Access Protection (NAP) ............................................................... 70 Section 7.4: Network Authentication ................................................................................ 72 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 1 Section 7.5: Firewall ......................................................................................................... 74 Section 7.6: IPsec .............................................................................................................. 76 Section 7.7: DirectAccess ................................................................................................. 78 Section 8.1: File Services .................................................................................................. 80 Section 8.2: File Shares..................................................................................................... 82 Section 8.3: Offline Files .................................................................................................. 84 Section 8.4: NTFS Permissions ........................................................................................ 85 Section 8.5: Share and NTFS Permissions ....................................................................... 87 Section 8.6: EFS................................................................................................................ 88 Section 8.7: BitLocker ...................................................................................................... 90 Section 8.8: BranchCache ................................................................................................. 92 Section 8.9: Distributed File System (DFS) ..................................................................... 94 Section 8.10: Shadow Copy .............................................................................................. 96 Section 8.11: Backup and Restore .................................................................................... 98 Section 8.12: Disk Quotas............................................................................................... 100 Section 8.13: FSRM Features ......................................................................................... 101 Section 8.14: Print Services ............................................................................................ 103 Section 9.1: WSUS ......................................................................................................... 106 Section 9.2: Client Configuration ................................................................................... 108 Section 10.1: Reliability and Performance Monitor ....................................................... 110 Section 10.2: Event Viewer ............................................................................................ 112 Section 10.3: Network Monitor ...................................................................................... 114 Section 10.4: SNMP........................................................................................................ 116 Practice Exams ................................................................................................................ 118 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 2 Course Overview This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. It focuses on the details of configuring the infrastructure of a network. Module 0 – Introduction This module introduces Microsoft’s recommendations of the technical experience a candidate should have before attempting the certification test. Students will become familiar with server and remote management tools. This module provides the mathematical calculations of how to convert numbers from binary to decimal and hexadecimal. This mathematical foundation is necessary for students to understand the IPv4 and IPv6 addresses they will be studying in the course. Module 1 – IPv4 This module discusses the details of configuring IPv4 addressing and subnetting. This includes topics of converting IPv4 addresses from binary to decimal, converting subnet masks to slant notation, identifying Ipv4 classes and ranges of IP addresses, and determining local and non-local hosts. Students will learn how to customize the number of subnets and hosts allowed on each subnet. Module 2 – IPv6 In this module students will learn why it will become necessary to migrate to IPv6. They will learn the basic format of IPv6 addresses, identifying IPv6 address types, and configuring IPv6 addresses using the GUI and command line. Interoperability strategies for implementing IPv4 and IPv6 are explored. Module 3 – DHCP This module covers DHCP configuration, customization options, and advanced settings. Students will learn proper server placement to assure client communication with the DHCP server, the rationale for creating superscopes and split scopes, and DHCPv6 options. Module 4 – DNS In Module 4 students will learn the details of how DNS translates host names to IP addresses and the process of DNS name resolution for both the client and server. Topics will also include; creating zone and zone transfers, creating or converting an Active Directory-integrated zone, creating and editing resource records, configuring client registration, automatically updating DNS using Dynamic DNS, resolving queries using stub zones and forwarding, using root hints and a root zone, managing zones through zone delegation, creating WINS-integrated zones and GlobalNames zones support, and implementing strategies and goals when designing a DNS solution. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 3 Module 5 – Routing Module 5 teaches the students the basics of routing and how to manage routing table entries. Students will become familiar with installing RRAS components, and configuring RIP, demand-dial routing, and ICS and NAT solutions. Module 6 – Remote Access Module 6 discusses the details of configuring remote access and network authentication. Topics include; configuring a Remote Access server to use Dial-up and VPN connections, configuring client connections, configuring a VPN using SSTP, and using CMAK to manage remote access. Module 7 – Network Access and Security In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles, configuring a RADIUS client, server and proxy, configuring a DHCP server as an enforcement point, enforcing network authentication using Kerberos and NTLM, configuring a firewall, and configuring IPsec to protect IP packets during transmission. Module 8 – File and Print This module discusses managing network files and printing. Topics include: managing network file sharing and shared folders, controlling access using NTFS and share permissions, encrypting files and folders, protecting integrity of data through shadow copy, and backup and restore, restricting disk space using disk quotas and FSRM, and managing print services. Module 9 – WSUS In this module students will learn how to configure a WSUS server and client to manage the updating of software. They will also learn how to use MBSA to scan for security compliance. Module 10 – Performance and Reliability This module covers tools that are used to collect and monitor network data for performance and reliability. The Reliability and Performance Monitor provides network performance statistics. Event Viewer is used to monitor event logs. Network Monitor is used to gather information about network traffic. SNMP is used to manage networkattached devices. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification test. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 4 Section 0.1: Introduction Summary This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. Microsoft recommends at least one year experience in the following underlying technologies: IP addressing and services Names resolution File and print services Network access and remote access Monitoring network services This section introduces the instructor and the concepts that will be covered in this course. Video/Demo 0.1.1 Course Introduction Time 1:09 Total Time About 2 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 5 Section 0.2: Server Management Summary This section discusses a new management console, Server Manager, used to install and manage server components. Details include: Server Manager elements: o Role o Role services o Feature Windows PowerShell cmdlets that support Server Manager in Windows Server 2008 R2 The role of Server Core o Limited GUI support o Limited set of server roles o Features available in Windows Server 2008 R2 o Other limitations: No windows Shell Limited managed code support Only MSI support for unattended mode installs o Managing a server core system Students will learn how to: Configure and manage a server using the Server Manager. Install roles on a Server Core server. Configuring Server 2008 Network Infrastructure Objectives 102. Configure Dynamic Host Configuration Protocol (DHCP) 201. Configure a Domain Name System (DNS) server. Lecture Focus Questions: What are the differences among roles, role services, and features? How are dependencies handled during role installation? How does the server core installation differ from a standard server installation? What are the limitations of a server core installation? What are the advantages? Video/Demo Time 0.2.1 Using Server Manager 6:38 0.2.3 Server Core 1:37 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 6 0.2.4 Installing Roles on Server Core 6:05 Total Time About 20 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 7 Section 0.3: Remote Management Summary This section examines using the following remote management tools to manage a server: Remote Desktop Remote Desktop Gateway MMC snap-ins Remote Server Administration Tools (RSAT) Windows Remote Shell Students will learn how to: Enable Remote Desktop on a Server Core. Enable remote management of the firewall. Open firewall ports to allow remote use of MMC snap-ins. Lecture Focus Questions: How do firewall ports affect your ability to remotely manage a server? What firewall port must be opened for Remote Desktop connections? What advantage does using TS Gateway have over using Remote Desktop? What is the effect of enabling the Remote Administration exception in the firewall? What are the operating system requirements for RSAT? Which remote administration tools could you use if the firewall had only ports 80 and 443 open? Video/Demo Time 0.3.1 Remote Management 4:06 0.3.2 Managing Server Core 14:45 Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 8 Section 0.4: Mathematical Foundations Summary This section explains the mathematical calculations to convert the following numbering systems: Base 2 - Binary Base 10 – Decimal Base 16 - Hexadecimal For students to understand IPv4 and IPv6 addresses they will need to know how to convert from binary to decimal and hexadecimal. Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. Lecture Focus Questions: How does the decimal form of the binary number 10000000 differ from 01000000? What formula can you use to find the decimal equivalent for the binary number 00010000? How can you determine the binary value of the decimal number 161? What is the binary value for the hexadecimal value of E? What is E's decimal value? How many hexadecimal digits replace a full binary octet? Video/Demo 0.4.1 TCP/IP Mathematics Time 12:13 Total Time About 13 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 9 Section 1.1: IPv4 Addressing Summary In this section the students will learn how to convert IPv4 addresses and subnet masks from binary to decimal and how to convert subnet masks to slant notation. Students will learn: The five IPv4 classes of IP addresses with the range of IP addresses and the default subnet mask for each class. How to identify the Network ID, host ID, and the default gateway address to determine local and non-local hosts. Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. o Configure IP address options Lecture Focus Questions: What is the format of an IPv4 address? What is the purpose of a subnet mask? What is the relationship between slash notation and the subnet mask? What is the default address class of the IP address 132.11.166.5? Video/Demo Time 1.1.1 IPv4 Addressing 6:09 1.1.2 Classful IPv4 Subnetting 11:22 Total Time About 20 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 10 Section 1.2: IPv4 Subnetting Summary This section discusses using IPv4 subnetting. Details include: Using a Variable Length Subnet Mask to vary the number of bits in the subnet mask to: o Subnet a single network address into multiple smaller subnets. o Create a supernet which combines multiple network addresses into a single larger subnet. Recommended subnetting tables for students to memorize: o Exponent values for powers of 2 o Binary subnet mask values and decimal equivalent values Students will learn how to: Given a network address and a custom mask, identify valid subnet addresses. Given a scenario with the desired number of hosts, choose a subnet address and mask. Given a subnet address and the subnet mask, identify valid host addresses on that subnet. Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. o Subnetting o Supernetting Lecture Focus Questions: How many hosts can you have if you use a subnet mask of 255.255.255.192? How is a supernet different from a subnet? How can a magic number help you identify the possible subnet addresses when using a custom subnet mask? What is the decimal mask value for a /27 mask? How many approximate and actual hosts can you have when using a mask value of /23? What are the first and last addresses in a range used for? Video/Demo Time 1.2.1 Variable Length Subnet Mask (VLSM) 17:18 1.2.3 IPv4 Subnetting Cheat Sheet 4:37 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 11 Number of Exam Questions 4 questions Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 12 Section 1.3: IPv4 Host Configuration Summary This section explores IPv4 host configuration. Details include: Configuration values: o IP address o Subnet mask o Default gateway o Host name o DNS server o WINS server o MAC address Methods used to configure IPv4 configuration settings: o Static (manual) assignment o Dynamic Host Configuration Protocol (DHCP) o Automatic Private IP Addressing (APIPA) o Alternate IP configuration Commands to configure Windows host with IPv4 configuration parameters TCP Chimney offloading Students will learn how to: Configure static and automatic IPv4 addressing. Specify an alternate IPv4 configuration. Use the command line to configure IPv4 settings. Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. o Configure IP address options Lecture Focus Questions: What is the purpose of an alternate IPv4 configuration? When is a static configuration advantageous? When does a Windows computer use APIPA? What are its limitations? How can you tell when a computer has used APIPA to configure its IP address? What does the MAC address identify? Video/Demo 1.3.1 IPv4 Configuration Time 4:34 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 13 1.3.3 Configuring IPv4 Client Addressing 2:33 1.3.7 Using Netsh 7:31 1.3.9 Allowing Ping through the Firewall 3:45 Lab/Activity Configure IP Settings Configure Automatic and Alternate Addressing Configure a Subnetted Address Number of Exam Questions 10 questions Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 14 Section 2.1: IPv6 Summary This section discusses the need to migrate from IPv4 to IPv6. IPv4 was developed in 1974 and due to the rapid Internet growth we are running out of IPv4 addresses. Students will become familiar with the new features in IPv6 that are designed for the long term health and security of networks. Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. Lecture Focus Questions: What are the reasons for the shift from IPv4 to IPv6? How does IPv6 make route summarization more efficient? How is IPsec treated differently in IPv6 than in IPv4? Why is NAT not needed when using IPv6? Video/Demo 2.1.1 IPv6 Concepts Time 3:47 Total Time About 7 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 15 Section 2.2: IPv6 Addressing Summary Students will learn the basic format of IPv6 addresses. IPv6 is a 128 bit address in which the first 64 bits called the prefix identifies the network and subnet address and the last 64bits is the interface ID which identifies the network connection. They will also learn how to obtain the EUI-64 interface ID from the MAC address. Features of an IPv6 address Address types for IPv6: o Reserved o Multicast o Unicast Global unicast Link-local Unique local o Anycast o Loopback o Unspecified Details of the IPv6 64-bit prefix Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. o Configure IP address options o Subnetting o Supernetting Lecture Focus Questions: What is the format of an IPv6 address? How can you represent leading zeroes and groups of zeroes in IPv6? Which type of IPv6 address uses the FC00::/7 prefix? How can you identify a link-local address? What does IPv6 use instead of a broadcast address? How can you easily identify IPv6 multicast addresses? What does the address ::1 represent? What is the purpose of the prefix length? What are the steps for deriving the EUI-64 interface ID from the MAC address? Video/Demo 2.2.1 IPv6 Addressing Time 3:57 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 16 2.2.3 IPv6 Address Types 8:41 2.2.5 IPv6 Prefix and Subnetting 11:54 2.2.7 IPv6 Interface ID 3:26 Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 17 Section 2.3: IPv6 Configuration Summary This section examines the following details about IPv6 configuration: Methods to configure IPv6 information on a host: o Static full assignment o Static partial assignment o Stateless autoconfiguration o DHCPv6 The process to configure the IPv6 address for an interface States of an autoconfigured IPv6 address: o Tentative o Valid Preferred Deprecated o Invalid Commands to configure Windows hosts with IPv6 configuration parameters Students will learn how to: Configure IPv6 addresses using the GUI and the command line. Configure an advanced firewall rule to allow the ping command. Specify the IPv6 address and scope ID when using ping for a link-local address. Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. o Configure IP address options o Subnetting Lecture Focus Questions: How does a host get its IPv6 address when using stateless autoconfiguration? What information does the DHCP server provide when using stateless DHCPv6? What address does a host use to request an address from a DHCP server? What is the difference between the M and O flags? What are the five states of an autoconfigured IPv6 address? How is the interface ID determined in static partial assignment? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 18 Video/Demo Time 2.3.1 IPv6 Configuration Facts 4:53 2.3.2 IPv6 Autoconfigured Address States 3:57 2.3.5 Configuring IPv6 Addresses 8:23 2.3.6 Using IPv6 Ping 8:08 Number of Exam Questions 6 questions Total Time About 35 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 19 Section 2.4: IPv6 Implementation Summary In this section students will learn various strategies for implementing IPv4 and IPv6 interoperability: Dual stack Tunneling o Manually configured tunnel o Intra-site Automatic Tunnel Addressing Protocol (ISATAP) o 6-to4 tunneling o Teredo tunneling PortProxy Configuring Server 2008 Network Infrastructure Objectives 101. Configure IPv4 and IPv6 Addressing. o Interoperability between IPv4 and IPv6 Lecture Focus Questions: How does IPv6 support differ on various Microsoft operating systems? What limitations does ISATAP have for IPv6 implementation? Which IPv6 tunneling methods work through NAT? When should you implement Teredo? When is 6to4 tunneling automatically configured in Windows Server 2008? What technology allows an IPv4-only host to communicate with an IPv6-only host? Video/Demo Time 2.4.1 IPv4 and IPv6 Interoperability 9:45 2.4.2 IPv6 Implementation in Server 2008 1:48 Number of Exam Questions 3 questions Total Time About 20 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 20 Section 3.1: DHCP Configuration Summary This section discusses how to configure a DHCP server to deliver IP addresses to clients. Details include: Methods to obtain an address from a DHCP server: o DHCP Discover (D) o DHCP Offer (O) o DHCP Request (R) o DHCP ACK (A) Authorizing a DHCP server Objects to configure a DHCP server to deliver IP addresses: o Scope o Exclusion o Reservation The process to configure an existing server running server core for DHCP Using link layer filter to control the issuance or denial of DHCP leases based on MAC address for IPv4 Students will learn how to: Install and authorize a DHCP server. Create and activate scopes. Configure exclusion ranges and reservations. Configuring Server 2008 Network Infrastructure Objectives 102. Configure Dynamic Host Configuration Protocol (DHCP). o DHCP options o Exclusions o Authorize server in Active Directory o Scopes Lecture Focus Questions: What are the steps a client uses to acquire an address from DHCP? When must you authorize a DHCP server? What permissions do you need to authorize a DHCP server? Why does a DHCP server shut down if its address is not found in Active Directory? What does this protect against? How are reservations different from exclusions? How can you change the subnet on a scope? What are the two ways to exclude IP addresses from a scope? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 21 What information is necessary to configure a reservation? Video/Demo Time 3.1.1 DHCP Concepts 5:16 3.1.3 Installing DHCP 3:25 3.1.5 Configuring DHCPv4 Scopes 4:27 3.1.9 Using DHCP MAC Address Filtering 4:11 Lab/Activity Authorize DHCP Servers Create a Scope Create Exclusion Ranges Create Client Reservations Number of Exam Questions 10 questions Time About 45 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 22 Section 3.2: DHCP Options Summary In this section students will learn about DHCP options to deliver a wide range of TCP/IP configuration parameters. Details include: Common option that can be used to configure DHCP: o 003 Router o 006 DNS Servers o 015 DNS Domain Name o 044 WINS/NBNS Servers o 046 WINS/NBT Node Type Levels that the DHCP options can be set at: o Server o Scope o Reservation Students will learn how to: Configure server, scope, and user/vendor class options. Design DHCP options to customize configuration and minimize administration. Configuring Server 2008 Network Infrastructure Objectives 102. Configure Dynamic Host Configuration Protocol (DHCP). o DHCP options Lecture Focus Questions: What are the most common DHCP options? Where can you configure DHCP options? How can you determine which options take precedence? How are DHCP options configured for IPv4 and IPv6? Video/Demo Time 3.2.1 DHCPv4 Options 3:55 3.2.2 Create DHCP Options 6:42 Lab/Activity Configure Server Options Configure Scope Options ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 23 Design Scope Options Design DHCP Options Number of Exam Questions 1 question Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 24 Section 3.3: Advanced DHCPv4 Settings Summary This section examines using advanced DHCPv4 settings to optimize DCHP server performance. Details include Advanced DHCPv4 settings: o Bindings o Backup and Restore o Dynamic DNS o Conflict Detection The role of Bootstrap Protocol (BOOTP) Components required by BOOTP o Client workstation o DHCP server o TFTP server Steps to configure a DHCP server to support Bootstrap Protocol (BOOTP) clients for diskless network boot Students will learn how to: Configure server bindings. Backup or restore a DHCP server. Configure proxy settings for dynamic DNS updates. Set the number of conflict detection attempts. Configuring Server 2008 Network Infrastructure Objectives 102. Configure Dynamic Host Configuration Protocol (DHCP). o Creating new options o PXE boot Lecture Focus Questions: How does conflict detection work? How can this affect system performance? How can you transfer the DHCP configuration from one server to another? Why would you configure BOOTP? Which options should you configure through the BOOTP table and not DHCP options? What should you do so that host names for computers running Windows NT 4.0 are automatically registered using DDNS? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 25 Video/Demo Time 3.3.1 Advanced DHCPv4 Settings 1:59 3.3.2 Configuring Advanced Settings 2:48 Number of Exam Questions 6 questions Total Time About 15 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 26 Section 3.4: Server Placement Summary In this section students will learn how DHCP server placement affects the ability of clients to communicate with the DHCP server. The following strategies to provide DHCP for multiple subnets are presented: DHCP server on each subnet Multihomed DHCP server BOOTP forwarding DHCP relay agent Students will learn how to: Configure a DHCP relay agent. Configuring Server 2008 Network Infrastructure Objectives 101 Configure IPv4 and IPv6 addressing. o Multi-homed 102. Configure Dynamic Host Configuration Protocol (DHCP). o DHCP relay agents Lecture Focus Questions: How can you provide DHCP services to clients on subnets that do not have a DHCP server? What is a multihomed server, and how is it used with DHCP? How does a DHCP relay agent differ from a router that has BOOTP forwarding enabled? What are the advantages to having a DHCP server on every subnet? How can BOOTP forwarding affect your network? Video/Demo Time 3.4.1 DHCP Server Placement 4:15 3.4.3 Configuring a DHCP Relay Agent 1:27 Lab/Activity Configure a DHCP Relay Agent Number of Exam Questions 4 questions ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 27 Total Time About 10 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 28 Section 3.5: Superscopes and Split Scopes Summary This section discusses how and when to use superscopes and split scopes. Superscopes are used to combine multiple address ranges into a single logical range. Split scopes provide fault tolerance by two DHCP servers servicing a portion of each range for each subnet. Students will learn how to: Use the 80/20 rule to create a split scope. Configuring Server 2008 Network Infrastructure Objectives 102. Configure Dynamic Host Configuration Protocol (DHCP). o Scopes Lecture Focus Questions: What are the reasons for deploying a superscope? When using multiple DHCP servers for a single scope, how should you configure the scope range for each server? Why do you configure an exclusion for a part of the address range? How should you configure the relay agent to ensure that the preferred server responds before the backup server in a split scope deployment? How does a clustered server provide fault tolerance? Video/Demo 3.5.1 Superscopes and Split Scopes Time 8:01 Lab/Activity Add a DHCP Server on Another Subnet Number of Exam Questions 3 questions Total Time About 15 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 29 Section 3.6: DHCPv6 Summary This section examines configuring DHCPv6. Details include: Methods to assign IPv6 addresses to clients: o Stateless DCHPv6 o Stateful DHCPv6 Messages exchanged between the client and the DHCP when stateful DHCPv6 is used: o Solicit Packet (S) o Advertise Packet (A) o Request Packet (R) o Reply Packet (R) Students will learn how to: Create and activate an IPv6 scope using the global unicast prefix. Include address range exclusions as part of an IPv6 scope. Configuring Server 2008 Network Infrastructure Objectives 102. Configure Dynamic Host Configuration Protocol (DHCP). o DHCPv6 Lecture Focus Questions: What configuration information is provided by IPv6 routers when using IPv6 autoconfiguration? How does this differ from using APIPA with IPv4? What are the messages used to configure clients in stateful DHCPv6? Under what circumstances do you use stateful DHCPv6? What are the flag settings? What makes autoconfiguration of IPv6 hosts possible? Video/Demo Time 3.6.1 DHCPv6 4:00 3.6.2 Configuring DHCPv6 4:09 Number of Exam Questions 2 questions ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 30 Total Time About 10 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 31 Section 4.1: DNS Concepts Summary In this section students will learn concepts of how the Domain Name System (DNS) translates host names to IP addresses. DNS is a distributed database with multiple servers holding different portions of the data. Components of the DNS hierarchy o .(dot) domain o Top Level Domains (TLDs) (.com, .edu, .gov) o Second-level and additional domains o Hosts Terms that relate to DNS: o A fully qualified domain name (FQDN) o Forward lookup o Authoritative server o Referral o Recursion Authoritative DNS zones: o Primary o Secondary o Active Directory-integrated Zone types: o Forward lookup zone o Reverse lookup zone Common resource records: o SOA (Start of Authority) o NS (name server) o A (host address) o AAAA (quad-A) o PTR (pointer) o CNAME (canonical name) o MX (Mail Exchanger) o SRV (service locator) o WINS and WINS-R resource records The role of Dynamic DNS (DDNS) Secure DDNS Configuring Server 2008 Network Infrastructure Objectives 201. Configure a Domain Name System (DNS) server. 202. Configure DNS zones. o Zone types ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 32 o Dynamic Domain Name System (DDNS) o Secure DDNS o Reverse lookup zones 203. Configure DNS records. o Record types Lecture Focus Questions: What is the purpose of DNS? How does an FQDN identify a host? How is an Active Directory-integrated zone different from a primary zone? How is secondary zone data changed? What is the difference between a forward lookup zone and a reverse lookup zone? What is the purpose of PTR records? How does DDNS simplify DNS management? What type of zone would you create if you wanted to use secure dynamic updates? Video/Demo Time 4.1.1 DNS Concepts 8:43 4.1.3 Authoritative Zones 8:28 4.1.5 Resource Records 4:51 4.1.7 Dynamic DNS 2:41 Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 33 Section 4.2: Name Resolution Summary This section examines the process of DNS name resolution for both the client and the server. Details include: On the client side, there are three checks a client can go through to resolve a DNS name to an IP address: o Hosts file o Local DNS cache o DNS server Command to view the local DNS cache (ipconfig /displaydns) Command to clear the local DNS cache (ipconfig /flushdns) The DNS name resolution process on the server: Configuring Server 2008 Network Infrastructure Objectives 205. Configure name resolution for client computers. Lecture Focus Questions: How does the DNS resolution process on a client differ from the resolution process on a server? Why are there two different DNS cache locations on a DNS server? How do entries in the HOSTS file affect name resolution? What are root hints and how do they affect name resolution performed by a DNS server? Video/Demo Time 4.2.1 DNS Client Name Resolution 9:40 4.2.2 DNS Server Name Resolution 3:54 4.2.3 Examining Name Resolution 7:26 Number of Exam Questions 1 question Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 34 Section 4.3: Zone Configuration Summary In this section students will learn the basics of zone configuration. Configuring the DNS server role The role of A zone transfer The role of a reverse lookup zone Students will learn how to: Add the DNS server role to a server. Create primary, secondary, and reverse lookup zones. Configure zone transfers between primary and secondary zones. Configuring Server 2008 Network Infrastructure Objectives 201. Configure a Domain Name System (DNS) server. o Cache-only 202. Configure DNS zones. o Reverse lookup zones 204. Configure DNS replication. o DNS secondary zones o Securing zone transfer o SOA refresh Lecture Focus Questions: How does a caching-only server reduce name resolution traffic? How can a secondary zone provide security for a DNS domain? What is the role of the SOA record during a zone transfer? What are the advantages to changing zone data through the dnscmd command rather than manually editing the zone file? Why would you choose a secondary server over a caching-only server? What type of name resolution is performed by reverse lookup zones? Video/Demo Time 4.3.1 Creating a Primary Zone 7:16 4.3.3 Creating Secondary Zones 8:11 4.3.6 Reverse Lookup Zones 6:13 4.3.7 Creating Reverse Lookup Zones 4:15 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 35 Lab/Activity Create a Primary Zone Create a Secondary Zone Create a Reverse Lookup Zone Number of Exam Questions 19 questions Total Time About 60 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 36 Section 4.4: Active Directory-integrated Zones Summary This section discusses how Active Directory-integrated zones can be used to manage zone information. Students will learn how to: Create an Active Directory-integrated zone and configure the replication scope. Convert a primary zone to an Active Directory-integrated zone. Configuring Server 2008 Network Infrastructure Objectives 202. Configure DNS zones. o Active Directory integration 204. Configure DNS replication. o Active Directory Integrated replication scopes Lecture Focus Questions: What are some of the benefits of Active Directory-integrated (AD-I) zones? How is zone data for Active Directory-integrated zones replicated? Under which circumstances could you disable zone transfers for an AD-I zone? When would you need to continue using DNS zone transfers? How do AD-I zones integrate with other zone types such as primary or secondary? What are the four replication scopes of an AD-I zone? Video/Demo Time 4.4.1 DNS Integration with AD 8:05 4.4.2 Managing Active Directory-integrated Zones 10:31 Lab/Activity Create an Active Directory-integrated Zone Convert a Zone Number of Exam Questions 10 questions Total Time About 35 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 37 Section 4.5: Resource Records Summary This section provides information about creating and managing resource records. Students will learn how to: Create common resource records. Adding or deleting a DNS record. Configuring Server 2008 Network Infrastructure Objectives 203. Configure DNS records. Lecture Focus Questions: What is the advantage to using DDNS to manage records? What record type would you use to add alternate names for a DNS host? What records are used to identify and locate domain controllers? What happens if you create A and PTR records together if the reverse lookup zone doesn't exist? What happens when you create a CNAME record with a blank name? Video/Demo 4.5.1 Creating Resource Records Time 8:03 Lab/Activity Create a Zone and Add Records Create A and CNAME Records Troubleshoot Name Resolution 1 Troubleshoot Name Resolution 2 Number of Exam Questions 11 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 38 Section 4.6: Client Configuration Summary In this section students will learn how to configure DNS client settings. Students will learn how to: Configure a connection-specific suffix using advanced TCP/IP properties. Specify a suffix search order. Manage DNS client registration. Configuring Server 2008 Network Infrastructure Objectives 205. Configure name resolution for client computers. o Suffix search order Lecture Focus Questions: What is the purpose of listing multiple DNS IP addresses on the client? What are the differences between a primary suffix and a connection-specific suffix? What is a parent suffix? How are they used during name resolution? How do custom search suffixes differ from the default suffix search order? Video/Demo 4.6.1 DNS Client Settings Time 4:33 Lab/Activity Configure DNS Server Addresses Configure Search Suffixes 1 Configure Search Suffixes 2 Configure DNS Client Registration Configure DNS Group Policy Settings Number of Exam Questions 4 questions Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 39 Section 4.7: Dynamic DNS Summary This section covers using Dynamic DNS to automatically update DNS records. Settings on the following components are used to configure Dynamic DNS: Client DHCP server DNS server Students will learn how to: Enable dynamic updates on a DNS zone. Configure DHCP server settings to support dynamic updates. Configuring Server 2008 Network Infrastructure Objectives 202. Configure DNS zones. o Secure DDNS 203. Configure DNS records. Lecture Focus Questions: What is the relationship between DNS and DHCP when using dynamic updates? What are the DDNS settings you can configure on the DHCP server? Which operating systems support dynamic updates? What are the restrictions on record creation when using secure dynamic updates? Which zone types support secure dynamic updates? How can DHCP be used to help the dynamic update process? Lab/Activity Enable Dynamic DNS Updates Troubleshoot Dynamic DNS 1 Troubleshoot Dynamic DNS 2 Troubleshoot Dynamic DNS 3 Number of Exam Questions 4 questions Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 40 Section 4.8: Stub Zones and Forwarding Summary This section discusses using stub zones and forwarding to resolve queries. Methods to control the server’s use of forwarders include: Secondary zone Stub zone Conditional forwarder Students will learn how to: Create a stub zone. Configure forwarders and conditional forwarding. Configuring Server 2008 Network Infrastructure Objectives 201. Configure a Domain Name System (DNS) server. o Conditional forwarding 204. Configure DNS replication. o DNS secondary zones o DNS stub zones o Active Directory Integrated replication scopes o Securing zone traffic Lecture Focus Questions: How does conditional forwarding differ from standard forwarding? How does a stub zone differ from a secondary zone? How do conditional forwarders differ from stub zones? What records are copied to the zone when you create a stub zone? Why isn't a stub zone authoritative for the zone? Video/Demo Time 4.8.1 Stub Zones and Conditional Forwarding 10:05 4.8.2 Configuring Forwarding and Stub Zones 11:16 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 41 Lab/Activity Configure a Stub Zone Configure Conditional Forwarding Number of Exam Questions 4 questions Total Time About 35 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 42 Section 4.9: Root Hints and Root Zone Summary This section provides an overview of root hints and the root zone. Students will learn how to: Configure or delete a root zone. Configure other DNS servers to point to your server via root hints. Configuring Server 2008 Network Infrastructure Objectives 201. Configure a Domain Name System (DNS) server. o Root hints Lecture Focus Questions: Why would you want to create a zone named . (dot)? What is the purpose of the root hints file? Why would you delete the root hints? What is the name and location(s) of the root hints file on a Windows 2008 server? Video/Demo 4.9.1 Root Hints Time 4:25 Lab/Activity Configure Root Hints Create a Root Zone Number of Exam Questions 5 questions Total Time About 15 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 43 Section 4.10: Zone Delegation Summary This section explores using zone delegation to divide DNS namespace into separate zones. Students will learn how to: Manage zones through delegation. Configuring Server 2008 Network Infrastructure Objectives 202. Configure DNS zones. o Zone delegation Lecture Focus Questions: Why might you decide to use zone delegation? What does a delegation identify? What records are created when you delegate a domain? Video/Demo Time 4.10.1 DNS Zone Delegation 5:12 4.10.2 Delegating a Domain 5:20 Lab/Activity Delegate Domains Create a Delegated Zone Number of Exam Questions 1 question Total Time About 20 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 44 Section 4.11: DNS Features Summary This section discusses the following DNS features: Aging and Scavenging Methods for performing load balancing through DNS: o DNS Round Robin o Netmask Ordering o Record Weighting o Network Load Balancing (NLB) Windows Server 2008 R2 command-line tools Students will learn how to: Configure DNS Round Robin. Manage DNS from the command line. Configuring Server 2008 Network Infrastructure Objectives 202. Configure DNS zones. o Zone scavenging 204. Configure DNS replication. o Round robin Lecture Focus Questions: How do stale records affect DNS server performance? How does the no-refresh interval affect scavenging? When is a DNS record considered stale? What is the difference between DNS Round Robin and Network Load Balancing? How does convergence make NLB a dynamic solution? Video/Demo Time 4.11.1 DNS Refresh and Scavenging 2:58 4.11.3 DNS Round Robin 3:22 4.11.6 DNS Command-line Tools 12:21 Lab/Activity Configure DNS Round Robin ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 45 Number of Exam Questions 9 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 46 Section 4.12: New DNS Features Summary This section discusses new features for Windows Server 2008 and Windows 2008 R2: Link-Local Multicast Name Resolution (LLMNR) Background zone loading IPv6 DNS Support Read-only Domain Controller (RODC) GlobalNames Zone Global Query block List Conditional Forwarding Domain controller search DNSSEC Devolution Cache Locking Socket Pool Auditing Students will learn how to: Configure DNS Devolution. Configure DNS Cache Locking. Configure DNS Socket Pools. Configuring Server 2008 Network Infrastructure Objectives 201. Configure a Domain Name System (DNS) server. o Conditional forwarding o Socket pooling o Cache locking 202. Configure DNS zones. o GlobalNames o DNS Security Extensions (DNSSEC) 205. Configure name resolution for client computers. o Link-Local Multicast Name Resolution (LLMNR) o DNS devolution Lecture Focus Questions: How does background loading have a positive effect on name resolution? How can you ensure that a DNS response is from a valid server? How does DNS Devolution simplify name resolution? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 47 How can you defend against cache poisoning attacks? What is the effect of enabling cache locking on Dynamic DNS? What advantage is to be gained by using a larger DNS socket pool? Video/Demo Time 4.12.1 New 2008 DNS Features 4:10 4.12.2 DNS Devolution 3:45 4.12.3 Configuring DNS Devolution 4:16 4.12.4 Cache Locking and Socket Pools 3:05 4.12.5 Configuring DNS Cache Locking 5:47 4.12.6 Configuring Socket Pool 3:11 4.12.7 DNS Security (DNSSec) 4:35 Number of Exam Questions 10 questions Total Time About 45 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 48 Section 4.13: Single-label Name Resolution Summary In this section students will learn how to configure a GlobalNames zone. Details include: Strategies to provide single-label name resolution: o GlobalNames zone o Link-Local Multicast Name Resolution (LLMNR) o HOSTS file Managing the GlobalNames zone Students will learn how to: Enable GlobalNames zone support. Create a GlobalNames zone and add CNAME records to support single-label name resolution. Configuring Server 2008 Network Infrastructure Objectives 202. Configure DNS zones. o GlobalNames 205. Configure name resolution for client computers o Configuring HOSTS file o Link-Local Multicast Name Resolution (LLMNR) Lecture Focus Questions: When would you use the GlobalNames zone? What type of records do you create in the GlobalNames zone? How can you extend the GlobalNames zone across multiple forests? Which strategies can you use to provide single-label name resolution for IPv6 hosts? When will a Windows client use LLMNR? What limitations does relying on LLMNR have? Video/Demo Time 4.13.1 GlobalNames Zones and LLMNR 2:05 4.13.2 Configuring the GlobalNames Zone 8:49 Lab/Activity Configure a GlobalNames Zone ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 49 Number of Exam Questions 8 questions Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 50 Section 4.14: DNS Design Summary In this section students will learn the strategies and goals for designing DNS namespace. They will also learn a variety of configuration options to use and security considerations when designing a DNS solution. Details include: The goals of Namespace design: o Allow internal users to access internal resources. o Allow external users to access external resources. o Allow internal users to access external public resources. o Prevent external users from accessing internal resources. Methods to accomplish these goals: o Same internal and external domain name o Different internal and external domain names o External domain name with an internal subdomain DNS configuration options: o Primary zone o Secondary zone o Reverse lookup zone o Active Directory-integrated zone o Caching-only server o Zone delegation o Forwarders o Conditional forwarding o Stub zone o Root zone o Root hints o Dynamic DNS o WINS-integrated zone o GlobalNames zone o Link-Local Multicast Name Resolution (LLMNR) o HOSTS file Goals for designing security for DNS Methods to improve DNS security Configuring Server 2008 Network Infrastructure Objectives 201. Configure a Domain Name System (DNS) server. o Conditional forwarding o Root hints o Cache-only 202. Configure DNS zones. o Zone types ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 51 o Active Directory integration o Dynamic Domain Name System (DDNS) o GlobalNames o Zone delegation o Reverse lookup zones 204. Configure DNS replication. o DNS stub zones o Securing zone transfer 205. Configure name resolution for client computers o Link-Local Multicast Name Resolution (LLMNR) Lecture Focus Questions: When using internal and external DNS, what are the three possible scenarios for the DNS namespace? What are the advantages and disadvantages of each of the three methods? What are the goals of any split namespace design? When should you use conditional forwarding instead of a standard forward? When should you use a WINS server instead of configuring a GlobalNames zone? How do Active Directory-integrated zones improve security and fault tolerance of DNS data? What type of zones should you use on DNS servers exposed to the public network? Video/Demo 4.14.1 DNS Namespace Design Time 7:40 Number of Exam Questions 2 questions Total Time About 20 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 52 Section 5.1: Routing Summary In this section students will become familiar with routing concepts and the commands to manage routing table entries. Details include: NPAS includes the following role services: o Network Policy Server (NPS) o Remote Access Service o Routing o Health Registration Authority (HRA) o Host Credential Authorization Protocol (HCAP) Routing terminology: o Router o Static Route o Route metric o Default route o Persistent route Commands to manage routing table entries Multicast routing details Students will learn how to: Install the RRAS components of the Network Policy and Access services. Add and modify IPv4 and IPv6 routes through the command line or GUI. Configuring Server 2008 Network Infrastructure Objectives 103. Configure Routing. o Static routing o Choosing a default gateway Lecture Focus Questions: Which role do you install on a Windows Server 2008 server to get the routing component? What is the purpose of a default route? Under what circumstances can you most effectively use static routes? What is the route add switch that allows you to make a route permanent? What routes are automatically added to the routing table when routing is enabled? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 53 Video/Demo Time 5.1.2 Routing Concepts 10:27 5.1.3 Installing Routing and Remote Access 2:06 5.1.4 Configuring Static Routes 13:51 Lab/Activity Enable LAN Routing Add Static Routes Number of Exam Questions 10 questions Total Time About 45 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 54 Section 5.2: RIP Summary This section provides an overview of RIP dynamic routing protocols. Details include: Key features of RIP that can be configured: o Packet protocol o Authentication o Route Filters o Neighbors o Timers o Clean-up updates o VLSM support Students will learn how to: Configure RIP by adding the RIP protocol and adding interfaces to run RIP. Configure RIP sending and receiving protocols, filters, and neighbor lists. Configuring Server 2008 Network Infrastructure Objectives 103. Configure Routing. o Routing Internet protocol (RIP) o Maintaining a routing table Lecture Focus Questions: What is the difference between static and dynamic routing? What routing protocols does Windows Server 2008 support? What is the difference between RIP version 2 and RIP? Why has RIP version 2 become the standard? What is Silent RIP and how does it affect learning and sharing routes? What affect does configuring neighbors have on RIP broadcasts and multicasts? What is route summarization? Video/Demo Time 5.2.1 Dynamic Routing 4:19 5.2.2 Configuring RIP 3:15 Lab/Activity Configure RIP Routing ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 55 Number of Exam Questions 9 questions Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 56 Section 5.3: Demand-dial Routing Summary This section discusses the processes to establish demand-dial routing to connect two networks through a link that is available on demand. Details include: The process to establish a demand-dial link Details about using demand-dial connections Features of demand-dial routing: o Demand-dial filters o Packet filters o Auto-static routing Configuring and enabling demand-dial routing Students will learn how to: Use the Routing and Remote Access wizard to configure demand-dial routing. Configure auto-static routing for RIP. Configuring Server 2008 Network Infrastructure Objectives 103. Configure Routing. o Demand-dial routing 301 Configure remote access. o Packet filters Lecture Focus Questions: How is a demand-dial link established? What is the difference between dial-in and dial-out credentials? How do demand-dial filters differ from packet filters? Which filter type would you configure to prevent a specific traffic type from using a demand-dial link? Why is auto-static routing important when using demand-dial routing? Video/Demo Time 5.3.1 Demand-dial Routing 4:17 5.3.2 Configuring Demand-dial Routing 6:59 Lab/Activity Configure Demand Dial Routing Configure Auto-static Routing ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 57 Number of Exam Questions 5 questions Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 58 Section 5.4: ICS and NAT Summary In this section students will learn the basics of using Internet Connection Sharing (ICS) and Network Address Translation (NAT) to share an Internet connection with an internal private network. NAT allows you to connect a private network to the Internet without obtaining registered addresses for every host. Configuring NAT Students will learn how to: Configure a server as a NAT router. Configure a NAT router to provide DHCP and DNS proxy services. Configure address and port mappings in NAT. Configuring Server 2008 Network Infrastructure Objectives 301. Configure remote access. o Network Address Translation (NAT) Lecture Focus Questions: What does a NAT router do? What are the address ranges you can use when you deploy NAT? How can NAT provide security for a private network? What changes take place automatically to the TCP/IP settings when you enable ICS on an interface? What are the limitations of using ICS over NAT? When would ICS be a good choice? When must you use NAT instead of ICS? Video/Demo Time 5.4.1 ICS and NAT 6:18 5.4.2 Configuring NAT 6:26 Lab/Activity Configure NAT Number of Exam Questions 3 questions ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 59 Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 60 Section 6.1: Remote Access Concepts Summary Students will learn concepts of the Remote Access process. Details include: Remote access connections o Point-to-point (PPP) for a dial-up connection o Virtual Private Network (VPN) use a tunneling protocol that wraps and protect packets in transit o VPN protocols supported by Windows Server 2008 and Vista Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) Secure Socket Tunneling Protocol (SSTP) Authentication protocols: o Password Authentication Protocol (PAP) o Challenge Handshake Authentication Protocol (CHAP) o Microsoft Challenge Handshake Authentication Protocol version 2 (MSCHAP v2) o Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) The role of remote access authorization Remote access is allowed or denied based on components of network policies: o Conditions o Constraints o Permissions o Settings Configuring Server 2008 Network Infrastructure Objectives 301. Configure remote access. o Remote Access Policy o VPN protocols such as Secure Socket Tunneling Protocol (SSTP) and IKEv2 o RAS authentication by using MS-CHAP, MS-CHAPv2, EAP Lecture Focus Questions: Which VPN protocols does Windows Server 2008 support? Which authentication protocols support smart card use? What makes CHAP vulnerable to security breaches? What is the difference between authorization and authentication? What is the server's response to a connection that doesn't match the conditions for a policy? What is the difference between constraints and conditions? How are they similar? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 61 What happens to a connection that matches the policy conditions but not the policy constraints? How many other policies will be checked in this scenario? Where does the server find the permissions for a connection? What must occur before settings are applied? Video/Demo Time 6.1.1 Remote Access Connections 3:35 6.1.3 Remote Access Authentication 4:38 6.1.5 Remote Access Authorization 2:58 Number of Exam Questions 5 questions Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 62 Section 6.2: Dial-up and VPN Summary This section explores configuring a Remote Access server to use Dial-up and VPN connections. Details include: Configuration tasks on the server to allow a remote client to connect to a remote access server: o Enable remote access o Configure ports o Configure addressing o Configure network policies Comparison of configuration settings for dial-up and VPN client connections: o General tab o Options tab o Security tab o Networking tab o Sharing tab Students will learn how to: Enable remote access on a Windows Server 2008 server. Configure VPN ports on a server. Control remote access by configuring network access policies. Create a client dial-up connection. Configure a client VPN connection. Configuring Server 2008 Network Infrastructure Objectives 301. Configure remote access. o Dial-up o VPN reconnect Lecture Focus Questions: Which setting must you configure in Routing and Remote Access to allow remote clients to access the private network, and not just the resources on the remote access server? What object in Routing and Remote Access identifies a logical connection to the remote access server? What are the ways that you can configure a remote access client to get an address for the remote access connection? What role do network policies play when you configure the remote access server? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 63 How do network policy constraints differ from conditions? When would you use the same setting in a constraint instead of a condition? Why does the policy application order affect whether or not clients can connect to a remote access server? When viewing the properties of a network connection, when will the Sharing tab be visible? Video/Demo Time 6.2.1 Configuring a Remote Access Server 14:52 6.2.9 Creating Client Connections 9:56 Lab/Activity Configure a Remote Access Server Reconfigure a Server for Remote Access Configure a VPN Server Configure VPN Ports Create a Network Access Policy 1 Create a Network Access Policy 2 Number of Exam Questions 11 questions Total Time About 70 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 64 Section 6.3: SSTP Summary This section examines using Secure Socket Tunneling Protocol (SSTP) to establish a VPN connection. Details include: SSTP features SSTP client requirements SSTP server requirements Students will learn how to: Request a server certificate for SSTP. Configure a remote access server to allow SSTP connections. Configure a VPN connection on a client computer to use SSTP. Configuring Server 2008 Network Infrastructure Objectives 301. Configure remote access. o VPN protocols such as Secure Socket Tunneling protocol (SSTP) and IKEv2 Lecture Focus Questions: What advantages does using SSTP have over using either PPTP or L2TP for a VPN connection? What ports must you open in a firewall to allow SSTP? How can you ensure that the SSTP client trusts the SSTP server certificate? What client and server operating systems support SSTP? Video/Demo Time 6.3.1 SSTP 1:56 6.3.2 Configuring SSTP 5:56 Number of Exam Questions 2 questions Total Time About 10 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 65 Section 6.4: CMAK Summary This section provides an overview of how the Connection Manager Administration Kit (CMAK) is used to manage remote access for larger deployments. Connection Manager is used to configure client remote access connections. Connection settings are stored in profiles for either VPN or dial-up connections. Details include: Components of the Connection Manager: o Connection Manager Administration Kit (CMAK) o Connection Point Services Configuring Server 2008 Network Infrastructure Objectives 301. Configure remote access. o Connection Manager Lecture Focus Questions: What permissions do you need to create a profile? How do profiles facilitate remote access connection configuration deployment? What methods can you use to distribute profiles to clients? What does a phone book tell clients? Video/Demo 6.4.1 Connection Manager Administration Kit (CMAK) Time 1:15 Number of Exam Questions 2 questions Total Time About 5 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 66 Section 7.1: Network Location Profiles Summary This section provides a summary of using network location profiles to identify network connection types. Details include: Network profile types: o Domain o Public o Private Configuring profile settings manually Enforcing profile settings Students will learn how to: Change the location type on a client computer. Configure Network List Manager Policies to control client network connections profiles. Configuring Server 2008 Network Infrastructure Objectives 104. Configure Windows Firewall with Advanced Security. o Configure firewall by using Group Policy o Network location profiles Lecture Focus Questions: What are the characteristics of a Public network? Why is network discovery disabled for the Public profile? What are the firewall and antivirus software recommendations for the Private profile? How are security settings controlled in the Domain profile? What can you control through the All Networks policy? Video/Demo Time 7.1.1 Network Location Profiles 1:31 7.1.2 Configuring Network List Manager Policies 5:59 Total Time About 10 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 67 Section 7.2: RADIUS Summary This section discusses using Remote Authentication Dial-In User Service (RADIUS) to consolidate network policies for multiple servers to authenticate remote access clients. Details include: Components of a RADIUS solution: o Remote access clients o RADIUS client o RADIUS server o RADIUS proxy o Remote RADIUS server group o Network policies o Connection request policies o RADIUS Accounting o NPS templates o User account databases o RADIUS messages Configuring the components to configure a RADIUS solution: o RADIUS server o RADIUS client o Remote access client o RDIUS proxy o RADIUS accounting Best practices for configuring NPS for RADIUS Students will learn how to: Configure a remote access server as a RADIUS client. Configure a RADIUS server. Configure a RADIUS proxy by configuring Remote RADIUS Server groups and Connection Request policies. Configuring Server 2008 Network Infrastructure Objectives 301. Configure remote access. 304. Configure Network Policy Server (NPS) o RADIUS accounting o Connection Request policies o RADIUS proxy o NPS templates ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 68 Lecture Focus Questions: When using a RADIUS solution, where are network access policies configured? What is the difference between a RADIUS client and a remote access client? Why would you implement a RADIUS proxy? What is the difference between a RADIUS client and a RADIUS proxy? What is the difference between a connection request policy and a network access policy? How does the RADIUS proxy use the remote RADIUS server group when processing authentication requests? Video/Demo Time 7.2.1 RADIUS 3:57 7.2.2 Installing the NPS Role 2:08 7.2.3 Configuring RADIUS 6:25 Lab/Activity Configure a RADIUS Server Configure a RADIUS Client Configure a RADIUS Proxy Number of Exam Questions 9 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 69 Section 7.3: Network Access Protection (NAP) Summary This section examines how NAP can be used to regulate network access or communication based on a computer’s compliance with health requirement policies. Details include: Features of NAP o Health state validation o Health policy compliance o Limited access network Components that comprise the NAP system: o NAP Client o NAP Server o Enforcement Server (ES) o Remediation Server Configuring NAP requires: o Configuring the NAP server o Configuring the client computer o Configuring the following enforcement points: DHCP VPN 802.1x Remote Desktop Gateway IPsec Students will learn how to: Configure a DHCP server as an enforcement point. Configure SHV settings, remediation server groups, health policies, and network policies for NAP. Enable NAP enforcement on a client computer. Configuring Server 2008 Network Infrastructure Objectives 302. Configure Network Access Protection (NAP). o DHCP enforcement o VPN enforcement o Configure NAP health policies o IPsec enforcement o Multi-configuration System Health Validator (SHV) ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 70 Lecture Focus Questions: Why is a non-compliant computer not necessarily an immediate security threat? What happens to a computer that receives a limited access health state validation? What functions are performed by the System Health Validator (SHV)? Which NAP component do you modify to identify the health checks that should be performed? How do remediation servers and auto-remediation help clients become compliant? Which enforcement method uses Connection Authorization Policies? Which one uses Connection Request Policies? Which one uses a Health Registration Authority (HRA)? What type of communication occurs in the boundary network when using IPsec enforcement? Video/Demo Time 7.3.1 Network Access Protection (NAP) 4:52 7.3.3 Configuring DHCP Enforcement 15:56 7.3.4 Configuring VPN Enforcement 13:03 7.3.5 NAP Enforcement Configuration 8:16 Number of Exam Questions 17 questions Total Time About 60 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 71 Section 7.4: Network Authentication Summary In this section students will learn network authentication mechanisms for logging on to the server or domain. Details include: Kerberos authentication and authorization NTLM authentication and authorization Conditions of when to use different authentication methods: o Kerberos o NTLM v2 o NTLM or LM Best practices regarding configuring domain authentication Kerberos policy settings: o Enforce user logon restrictions o Maximum lifetime for service ticket o Maximum lifetime for user ticket o Maximum lifetime for user ticket renewal o Maximum tolerance for computer clock synchronization Students will learn how to: Configure Group Policy to enforce the use of NTLMv2 for authentication. Lecture Focus Questions: What advantages does Kerberos have over NTLM? What disadvantages does it have compared to NTLM? What are the conditions for running NTLMv2? When can you deploy Kerberos? When should you use NTLM instead of NTLMv2? Video/Demo Time 7.4.1 LAN Authentication 1:49 7.4.2 Configuring LAN Authentication 2:40 Lab/Activity Enforce NTLM v2 Number of Exam Questions 1 question ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 72 Total Time About 15 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 73 Section 7.5: Firewall Summary This section discusses the specifics of managing a firewall. Details include: Tools you can use to manage the firewall: o Windows Firewall (in Control Panel) o Windows Firewall with Advanced Security Features of Windows Firewall with Advanced Security: o Profiles o Firewall rules o Connection security rules o Monitoring o Policies Use Window Firewall with Advanced Security to create the following types of inbound and outbound rules: o Program rule o Port rule o Predefined rule o Custom rule Types of connection security rules: o Isolation o Authentication exemption o Server-to-server o Tunnel o Custom Action options that apply to the traffic which meet the rule’s conditions: o Allow the connection o Block the connection o Allow the connection if it is secure Options that can be configured for network profiles: o Firewall state o Inbound connections o Outbound connections Tips for managing firewall settings Port numbers for common services Students will learn how to: Use the Basic Firewall to allow traffic based on port, protocol, or application. Use the Windows Firewall with Advanced Security to manage custom firewall rules. Use Group Policy to enforce firewall rules. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 74 Configuring Server 2008 Network Infrastructure Objectives 104. Configure Windows Firewall with Advanced Security. o Inbound and outbound rules o Custom rules o Authorized users o Authorized computers o Configure firewall by using Group Policy o Network location policies o Isolation policy o Connection security rules Lecture Focus Questions: When must you use the Advanced Firewall instead of the Basic Firewall? When would you configure a custom exception? What does the exception scope do? What are the components of a policy? Why should you allow traffic based on application instead of port when possible? How can a policy help you maintain security integrity in your network? Video/Demo 7.5.1 Windows Firewall Time 4:03 7.5.3 Configuring Windows Firewall with Advanced Security 14:06 7.5.4 Configuring Firewall GPO Settings 2:39 Number of Exam Questions 11 questions Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 75 Section 7.6: IPsec Summary This section provides the details of how Internet Protocol Security (IPsec) protects IP packets during transmission. Details include: IPsec protocols: o Authentication Header (AH) o Encapsulating Security Payload (ESP) o Internet Key Exchange (IKE) o Authenticated IP (AuthIP) Phases to establish the IPsec connection: o Phase 1 (Main Mode) o Phase 2 (Quick Mode) Protocols supported for configuring IPsec: o Integrity: SHA1 MD5 o Encryption: AES-256 AES-192 AES-128 3DES (Triple-DES) DES o Key exchange: Elliptic Curve Diffie-Hellman P-384 Elliptic Curve Diffie-Hellman P-256 Diffie-Hellman Group 14 Diffie-Hellman Group 2 Diffie-Hellman Group 1 o Authentication: Kerberos NTLMv2 Computer certificates, including health certificates Preshared key Configuring IPsec through Windows Firewall with Advanced Security console Students will learn how to: Configure connection security rules by determining the rule type, requirements, authentication method, and profile(s) to which the rule applies. Monitor connection security rules and security associations. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 76 Configuring Server 2008 Network Infrastructure Objectives 104. Configure IPsec. o IPsec group policy Lecture Focus Questions: Under which circumstances should you not use Authentication Header (AH)? What additional services does Encapsulating Security Payload (ESP) provide over AH? What is the difference between data integrity and data confidentiality? What method is used to provide data integrity? What method provides confidentiality? What enhancements does AuthIP provide over IKE? What are the requirements for using AuthIP? What are the phases of an IPsec connection? What does the key lifetime affect? What function is performed by the Diffie-Hellman protocol? Video/Demo Time 7.6.1 IPsec 6:14 7.6.3 IPsec Connection Security Rules 3:12 7.6.4 Configuring IPsec 7:16 7.6.6 IPsec Improvements 3:16 Number of Exam Questions 10 questions Total Time About 35 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 77 Section 7.7: DirectAccess Summary This section discusses using DirectAccess as an automatic connectivity solution. Details include: A comparison of a VPN solution to a DirectAccess solution The support that DirectAccess provides DirectAccess connection methods: o Full enterprise network access (end-to-edge) o Selected server access (modified end-to-edge) o End-to-end The process that the DirectAccess client uses to connect to intranet resources DirectAccess requirements for the: o Infrastructure o Server o Client Configuration details for DirectAccess components: o Server o Client side Configuring Server 2008 Network Infrastructure Objectives 303. Configure DirectAccess. o IPv6 o IPsec o Server requirements o Client requirements Lecture Focus Questions: What are the advantages of using DirectAccess to access corporate file servers? What is the difference between full enterprise network access and selected server access? What are the requirements for a DirectAccess server? How does the client's IP address configuration affect how the client sends traffic to the DirectAccess server? Video/Demo 7.7.1 DirectAccess Time 8:59 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 78 Number of Exam Questions 13 questions Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 79 Section 8.1: File Services Summary This section explores installing the File Services role to manage network file sharing. When installing the File Services role, the following role services are available to choose from: o File Server o Distributed File System (DFS) o File Server Resource Manager (FSRM) o Services for Network File System (NFS) o Windows Search Service o Windows Server 2003 File Services o BranchCache for network files Managing file services on the server includes the following features and options: o NTFS permissions o NTFS quotas o Shadow copies o Server Backup (added as a server feature) o Storage Manager for SANs (added as a server feature) Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server. o File share publishing o Branch Cache o NTFS permissions Lecture Focus Questions: What features are provided by File Server Resource Manager (FSRM)? What does file screening allow you to do? When might you use Services for Network File System (NFS)? What role service would you add to allow replication for DFS with non-Windows Server 2008 servers? Video/Demo 8.1.1 Installing the File Services Role Time 3:01 Number of Exam Questions 1 question ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 80 Total Time About 7 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 81 Section 8.2: File Shares Summary This section discusses creating and managing shared folders. Details include: Tools to create or manage shared folders: o Windows Explorer o Shared Folder snap-in o Share and Store Management snap-in o Command line A comparison of shared folder permissions and roles Facts about shared folders Students will learn how to: Configure and manage shared folders and files. Restrict share access through share permissions and user limits. Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server. o File share publishing o Share permissions o NTFS permissions o Access-based Enumeration (ABE) o Share and Storage Management console Lecture Focus Questions: What permissions do you need to share a folder or configure share permissions? What is the difference between the read permission and the change permission? How does using access-based enumeration on shared folders modify what users can see? What tools are available to you to create and manage shares? What is the effect of appending $ to a share name? What shared folder features can you manage in the Share and Storage Management console vs. the Shared Folder snap-in? Video/Demo Time 8.2.1 File Share Concepts 4:19 8.2.2 Sharing Folders 11:04 8.2.3 Using Share and Storage Management Console 4:47 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 82 Lab/Activity Share a Folder with a Second Name Remove a Shared Folder Number of Exam Questions 7 questions Total Time About 35 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 83 Section 8.3: Offline Files Summary This section provides information about using offline files to work with documents in shared folders even when the user is not connected to the network. Students will learn how to: Configure caching options for offline files, including automatic caching of files and caching of applications. Configure offline availability on the client. Manage synchronization settings through the Sync Center. Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server. o Offline Files Lecture Focus Questions: How does the offline files feature ease file management for mobile users? What happens to NTFS permissions on cached copies of files? How does synchronization affect files? What steps can you take to reconcile synchronization conflicts? What is the result of encrypting the offline files cache with the user key? What security vulnerability does this resolve? Video/Demo 8.3.1 Enabling Offline Files Time 12:53 Lab/Activity Enable Share Caching Disable Share Caching Number of Exam Questions 1 question Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 84 Section 8.4: NTFS Permissions Summary This section explores using NTFS permissions to control access to folders and files on an NTFS partition. Details include: Permissions for folders and files: o Read o Write o List Folder Contents o Read & Execute o Modify o Full Control Special permissions How file ownership affects access and assigning permissions The effects of copying or moving files with NTFS permissions Effective permissions are the sum of all permissions from the following sources: o Explicit assignment o Group membership o Inheritance Examples of effective NTFS permissions Suggestions for planning NTFS permissions Students will learn how to: Configure NTFS permissions. Copy, remove, and modify inherited permissions. Identify the effective permissions a user has to a file or folder. Change file or folder ownership. Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server. o NTFS permissions Lecture Focus Questions: When do NTFS permissions apply? What are the differences between the NTFS Full Control permission and the Modify permission? Which permission assignment overrides all other permission assignments? What is the advantage of the Take Ownership right? When can you use this right to the greatest effect? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 85 What happens to permissions when a file with NTFS permissions is moved to a non-NTFS partition? How might a user end up with more NTFS permissions to a folder than what appear on the access control list for that user? How can you prevent a member of a group from getting the NTFS permissions assigned to the group without removing the user from the group? Video/Demo Time 8.4.1 NTFS Permissions 6:06 8.4.2 Configuring NTFS Permissions 13:11 Lab/Activity Configure NTFS Permissions Remove Inherited Permissions Number of Exam Questions 3 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 86 Section 8.5: Share and NTFS Permissions Summary In this section students will learn how share permissions and NTFS permissions work together to control access. Students will learn how to: Configure combined NTFS and share permissions. Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server. o Share permissions o NTFS permissions Lecture Focus Questions: What are the differences and similarities between NTFS permissions and share permissions? What strategy can you use to combine NTFS and share permissions? Why should you assign permissions to groups rather than users? How do logged on users get updated permissions? Video/Demo 8.5.1 Share and NTFS Permissions Time 4:51 Lab/Activity Configure Share Permissions Configure NTFS and Share Permissions 1 Configure NTFS and Share Permissions 2 Number of Exam Questions 5 questions Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 87 Section 8.6: EFS Summary This section discusses using Encrypting File System (EFS) to encrypt a file or folder. Details include: Operating systems in which EFS is available: o Windows Server 2008 o Windows Vista Business o Windows Vista Enterprise o Windows Vista Ultimate Requirements to encrypt a file or folder: o Must have Write permissions to a file or folder o Cannot encrypt System or Read-only files o Cannot encrypt and compress a file or folder at the same time Users who can open an encrypted file: o The user who originally encrypted the file o Additional users who have been designated as additional users o Designated recovery agents (DRAs) Implementing encryption Recovering encrypted files Moving or copying encrypted files Enforcing encryption settings for offline files Rules to determine the encrypted state of a file Tips when saving encrypted files on a remote computer Students will learn how to: Encrypt or decrypt a file or folder. Add authorized users to allow encrypted file access. Designate DRAs for file recovery. Configure EFS settings in Group Policy. Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server. o Encrypting file system (EFS) Lecture Focus Questions: What is the importance of the DRA in the encryption process? Which users have access to encrypted files and folders? What is the relationship between encryption and compression? What is the significance of encrypting the pagefile? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 88 How does Rekeywiz affect your encryption deployment? Video/Demo Time 8.6.1 EFS 4:26 8.6.2 Managing Encrypted Files 13:24 Lab/Activity Encrypt a Folder Number of Exam Questions 7 questions Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 89 Section 8.7: BitLocker Summary This section examines using BitLocker to protect unauthorized data access on lost or stole laptops or other compromised system. Details include: The role of BitLocker Components of BitLocker o BitLocker partition o Trusted Platform Module (TPM) o USB device o BIOS support How BitLocker differs from the EFS BitLocker configuration involves creating the following security components: o TPM owner password o Recovery key o PIN o Startup key o Data volume key o Data Recovery Agent BitLocker modes which determine the security level: o TPM-only o TPM with startup key o TPM with PIN o TPM with PIN and startup key o Without a TPM Configuring and managing BitLocker Students will learn how to: Generate recovery keys and create a BitLocker DRA. Configure BitLocker to implement BitLocker without a TPM. Configure BitLocker To Go to deny write access to unauthorized USB flash devices. Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server. o BitLocker Lecture Focus Questions: What is the difference between suspending protection and decrypting the drive? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 90 When implementing BitLocker, why is it a good idea to run a system check before encrypting the drive? What is the difference in function between BitLocker and BitLocker To Go? When using BitLocker what are the requirements of the Trusted Platform Module? How can you implement BitLocker without a TPM? What will happen when BitLocker is enabled but then you lose the USB flash device which holds the key? Video/Demo Time 8.7.1 BitLocker 4:53 8.7.3 BitLocker Configuration 4:27 8.7.4 Implementing BitLocker without a TPM 4:25 8.7.5 Configuring BitLocker Recovery Agents 4:07 Number of Exam Questions 12 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 91 Section 8.8: BranchCache Summary This section discusses using BranchCache to store content in remote location so that users in branch offices can access information more quickly. Details include: The role of BranchCache BranchCache operates in one of the following modes: o Hosted Cache o Distributed Cache Configuration of BranchCache: o Content server o Hosted cache server o Distributed cache mode Configuring BranchCache clients Tools to configure BranchCache on branch office client computers: o Netsh o Group Policy o Windows Firewall with Advance Security Students will learn how to: Configure BranchCache clients. Install and configure a BranchCache content server. Install and configure a BranchCache hosted cache server. Configuring Server 2008 Network Infrastructure Objectives 401. Configure a file server o BranchCache Lecture Focus Questions: Under which circumstances should you enable distributed cache mode versus hosted cache mode? How does BranchCache treat traffic while in transit? When would you choose to configure BranchCache using Group Policy rather than netsh? When BranchCache settings have been configured using both the netsh command and Group Policy, which settings take precedence? Why does a hosted cache server need an enrolled server certificate from a trusted CA? What is the difference between the BranchCache feature and the BranchCache for network files role service? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 92 Video/Demo Time 8.8.1 BranchCache 4:55 8.8.3 BranchCache Configuration 6:47 8.8.4 Configuring BranchCache 2:25 Number of Exam Questions 11 questions Total Time About 30 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 93 Section 8.9: Distributed File System (DFS) Summary This section explores using DFS to logically organize shared folders on multiple servers into a single logical folder hierarchy called a namespace. Details include: DFS includes the following namespace components: o Namespace o Namespace server o Namespace root o Folder Components to control replication o Replication group o Replicated folder o Connection DFS configuration Types of namespace: o Stand-alone o Domain-based Configuring a Replication Group Students will learn how to: Create stand-alone or domain-based DFS namespaces. Add folders and folder targets to a namespace. Configure DFS replication by creating replication groups and replicated folders. Configuring Server 2008 Network Infrastructure Objectives 402. Configure Distributed File System (DFS). o DFS namespace o DFS configuration and application o Creating and configuring targets o DFS replication o Read-only replicated folder o Failover cluster support o Health reporting Lecture Focus Questions: What is the advantage of a domain-based namespace over a stand-alone namespace? What is the role of a namespace server? How can you achieve fault tolerance using DFS? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 94 What role do connections play in DFS replication? When can you add a failover cluster to a DFS replication group? How can you prevent users from adding or change files in a replicated folder? How can hides files and folders that users do not have permission to access? Video/Demo Time 8.9.1 DFS 7:22 8.9.2 New DFS Features 4:50 8.9.4 Enabling DFS 9:16 8.9.5 Configuring DFS Read-Only Replicated Folders and Access Based 3:49 Lab/Activity Create a DFS Structure Number of Exam Questions 11 questions Total Time About 45 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 95 Section 8.10: Shadow Copy Summary This section covers using shadow copy to make copies of files at regular intervals. This allows you to take a snapshot of files and shared folders which can be used at a later date to recover previous versions of a file or recover a deleted file. Details include: Facts about using shadow copies Recommendations for using shadow copies Students will learn how to: Enable shadow copies on a volume. Configure shadow copy settings, including storage location, size, and schedule. Create snapshots. Save, copy, or restore previous versions of files. Configuring Server 2008 Network Infrastructure Objectives 403. Configure shadow copy services. o Restoring data o Shadow copy services Lecture Focus Questions: How much disk space do shadow copies take by default? What is the maximum number of shadow copies the system stores? What happens when the system reaches this limit? What happens to NTFS permissions when you restore a file? When you copy a file? Why is it recommended that you place shadow copies on different volumes? How should client work patterns affect your shadow copies schedule? What is the relationship between shadow copies and regular backups? Video/Demo Time 8.10.1 Shadow Copy Services 3:09 8.10.2 Enabling Previous Versions 5:45 Lab/Activity Enable Shadow Copies ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 96 Number of Exam Questions 9 questions Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 97 Section 8.11: Backup and Restore Summary In this section students will become familiar with Windows Server Backup which is used to provide backup and recovery for Windows Server 2008 and replaces NTbackkup.exe. Details include: Using Windows Server Backup Windows Server Backup provides three ways to run backups: o Windows Server Backup MMC snap-in o Wbadmin from the command line o PowerShell cmdlets for Windows Server Backup Volume options you can select for Windows Server Backup: o Full Server o Critical volumes/Bare metal recovery o System state o Individual volumes o Folders or file Storage type for Windows Server Backup: o Internal disk o External disk o Shared folder o DVD, other optical, or removable media Types of backups you can perform using Windows Server Backup: o Automatic backup o Manual backup o Scheduled backup o System state backup Tools to perform a system recovery: o Files and folders o Volumes o Applications o Backup catalog o Operating system or full server o System state Students will learn how to: Install the Windows Server Backup features. Configure a regular backup schedule. Configure and run a Backup Once backup operation. Restore a backup, restoring the full server, volume or selected folders and files. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 98 Configuring Server 2008 Network Infrastructure Objectives 403. Configure backup and restore. o Backup types o Backup schedules o Managing remotely o Restoring data o Volume snapshot services (VSS) o Bare metal restore Lecture Focus Questions: Which backup storage device would you choose if you wanted to be able to restore individual folders or files? What storage types are available when using automatic backups? What happens to a local disk when you designate it for use by Windows Server Backup? How can you create automatic backups with a frequency less than once a day? Video/Demo Time 8.11.1 Server Backup 5:19 8.11.2 Using Windows Server Backup 7:22 8.11.3 Performing a Bare Metal Restore 5:42 Lab/Activity Back Up a Server Number of Exam Questions 17 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 99 Section 8.12: Disk Quotas Summary This section examines using disk quotas to restrict the amount of disk space user’s files can use on an NTFS volume. Disk quotas are set up per volume and per user and cannot be configured using groups. Students will learn how to: Configure disk quotas and enforce quota limits. Add quota entry exceptions for specific users. Enable quota logging for warning levels. Configuring Server 2008 Network Infrastructure Objectives 404. Manage file server resources. o Quota by volume or quota by user o Quota entries Lecture Focus Questions: Are disk quotas configured on disks, volumes, folders, or files? What effect does compressing files have on the disk quota limit? What actions can be taken when a user exceeds the disk quota limit? How can you have a disk quota configured, but still allow users to exceed the quota limits? What conditions must be met before you can delete a disk quota entry? Which user is exempt from disk quotas? Video/Demo 8.12.1 Configuring Disk Quotas Time 2:39 Lab/Activity Enable Quota Restrictions Create a Quota Entry Modify Quota Limits Number of Exam Questions 5 questions Total Time About 25 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 100 Section 8.13: FSRM Features Summary This section explores using the File Server Resource Manager (FSRM) snap-in to manage folder and volume quotas. Details include: FSRM features: o Quotas o Notifications o File Screening o Storage Reports o File Classification o File Management Methods for configuring quotas: o NTFS Disk Quotas o Folder and Volume Quotas Students will learn how to: Configure volume and folder quotas Create quota templates. Configure file screens and file screen exceptions. Create custom file groups. Generate FSRM reports for both quotas and overall file system use. Schedule FSRM reports. Assign file classification information to files. Create file management tasks. Configuring Server 2008 Network Infrastructure Objectives 404. Manage file server resources. o FSRM o Quota entries o Quota templates o File classification o File management tasks o File screening Lecture Focus Questions: What are the primary differences between disk quotas and quotas implemented through FSRM? How does a soft quota differ from a hard quota? How do quota templates facilitate quota management? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 101 What is the difference between a quota and a file screen? How is an active file screen more restrictive than a passive file screen? How can you automatically assign classification information to files? What can you accomplish with the file expiration task? Video/Demo Time 8.13.1 FSRM Quotas and File Screening 5:45 8.13.2 FSRM File Classifications and Management 6:06 8.13.3 Configuring FSRM Quotas and File Screening 8:57 8.13.4 Configuring FSRM File Classifications and Management 8:40 Number of Exam Questions 15 questions Total Time About 45 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 102 Section 8.14: Print Services Summary In this section students will learn how to manage print services on a Windows Server 2008 system by installing the Print and Document Services role. Details include: Key definitions: o Print server o Printer o Print device o Print driver o Print queue o Printer port Managing printing on a Windows Server 2008 R2 Services that the Print and Document Services role is composed of: o Print server o LPD Service o Internet Printing o Distributed Scan Server Facts about Print and Document Services The role of Print Management Configuring printers Features to be aware of when managing printing: o Printer permissions o Printer pooling o Multiple printer objects o List in Active Directory o Deploy with Group Policy o Export/import printer o Manage print drivers o Manage documents in the print queue o Location-aware printing o Print driver isolation o Client-Side Rendering (CSR) Students will learn how to: Install the Print and Document Services role. Create and share a printer. Modify printer properties, including the following: o Sharing o Listing in Active Directory ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 103 o Adding ports o Modifying security permissions o Enabling pooling o Scheduling availability o Designating priority Deploy printers using Group Policy. Manage the default printer based on the location. Configuring Server 2008 Network Infrastructure Objectives 405. Configure and monitor print services. o Printer share o Publish printers to Active Directory o Printer permissions o Deploy printer connections o Install print drivers o Export and import print queues an printer settings o Print pooling o Print priority o Print driver isolation o Location-aware printing o Print management delegation Lecture Focus Questions: What is the difference between a print device and a printer? When would you add the LPD service when configuring the Print Services role? For which physical printing configurations would you choose a local printer when adding a printer? When would you choose a network printer? Under which circumstances would you configure a printer to use multiple print devices? When would you configure multiple printers for a single print device? How can you ensure important print jobs will automatically be printed before any other print jobs? How do clients obtain the correct driver for shared printers? When would you choose to isolate a print driver? What is the advantage of location-aware printing? Video/Demo Time 8.14.1 Print Services 7:14 8.14.2 Installing the Print Services Role 1:49 8.14.4 Configuring Printing 14:02 8.14.5 Migrating Print Server and Configuring Print Driver Isolation 3:44 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 104 8.14.6 Delegating Printer Management 3:19 8.14.7 Configuring Location Aware Printing 2:23 Lab/Activity Create and Share a Printer Configure Printer Pooling Restrict Printer Access Number of Exam Questions 26 questions Total Time About 70 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 105 Section 9.1: WSUS Summary This section discusses how Windows Server Update Services (WSUS) allows you to configure a server on your intranet as a centralized point for updating software. Details include: The advantages of using WSUS Components that WSUS uses: o Microsoft Update o Windows Server Update Services (WSUS) server o Automatic Update Deployment scenarios for WSUS: o Single WSUS server o Multiple independent servers o Multiple synchronized servers o Disconnected WSUS server Microsoft Update and WSUS support updating many Microsoft products, including: o Window operating systems o Exchange Server o SQL Server o Microsoft Office Criteria for controlling updates: o Product family o Update classification o Language Configuring WSUS on the server: o Installation o Configure the server o Approve updates o Add downstream servers Students will learn how to: Install WSUS and configure a WSUS server to download updates from Microsoft Update. Synchronize and approve updates. Configure a child server as a replica of an upstream server. Run reports to view client and update information. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 106 Configuring Server 2008 Network Infrastructure Objectives 501. Configure Windows Server Update Services (WSUS) server settings. o Update type selection o Client settings o Software updates o Test and approval o Disconnected networks Lecture Focus Questions: How do clients receive updates in the absence of WSUS? What are the disadvantages that this method poses for your network? When should you deploy multiple, independent WSUS servers? How is this configuration similar to a single WSUS server? How would you deploy WSUS when an Internet connection is not allowed for an isolated network? How does the Store updates locally setting affect where client computers go to get update files? What is the difference between synchronizing updates, downloading updates, and approving updates? Video/Demo Time 9.1.1 WSUS 8:10 9.1.3 Installing the WSUS Role 6:26 9.1.4 Configuring WSUS Server Settings 7:01 9.1.5 Configuring a Downstream Server 3:06 9.1.6 Viewing WSUS Reports 4:22 Number of Exam Questions 4 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 107 Section 9.2: Client Configuration Summary This section covers WSUS Client Configuration and Targeting. Each client computer must have the Automatic Updates client software to use automatic updates. Targeting allows you to manage deployment of updates to specific computers through the use of groups. Details include: Automatic Update policies: o Configure Automatic Updates o Specify intranet Microsoft Update service location o Enable client-side targeting o Reschedule Automatic Updates Scheduled Installations o No auto-Restart For Scheduled Automatic Updates and Installations o Automatic updates detection frequency o Allow automatic Updates immediate installation o Delay restart of schedule installations o Re-prompt for restart with scheduled installations o Allow non-administrators to receive update notifications o Do not display ‘Install Updates and Shut Down’ option in Shut Down Windows dialog box Download of updates options: o Automatic o Notification Installation of updates options: o Automatic (Scheduled) o Notification The role of targeting Methods to assign client computers to a group: o Server-side targeting o Client-side targeting Students will learn how to: Control client update behavior through Group Policy. Create computer groups for targeting, and manually modify group membership. Enable client-side targeting on the WSUS server. Configure client-side targeting through Group Policy. Configuring Server 2008 Network Infrastructure Objectives 501. Configure Windows Server Update Services (WSUS) server settings. o Client settings o Group Policy Object (GPO) ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 108 o Client targeting o Software updates o Test and approval Lecture Focus Questions: By default, how often does the client check for updates? Which policy allows you to have clients check more frequently? Which policy do you edit to point clients to your WSUS server instead of the Microsoft Update website? How are updates installed if you enable the Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box policy? When using client-side targeting, how do you identify the computer group for a specific computer? How does this differ from server-side targeting? Video/Demo Time 9.2.1 Configuring Automatic Updates Client 10:59 9.2.3 Targeting 1:58 9.2.4 Configuring WSUS Targeting 11:25 Lab/Activity Enforce WSUS Settings Number of Exam Questions 5 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 109 Section 10.1: Reliability and Performance Monitor Summary This section examines using Reliability and Performance Monitor. Details include: Windows Reliability and Performance Monitor combines the functionality of the following components: o Resource Monitor o Reliability Monitor o Performance Monitor o Data Collector Sets Using the Reliability and Performance Monitor Students will learn how to: View system real-time statistical displays. Add specific object counters to Performance Monitor for local or remote machines. Use the System Stability Chart to see historical system information. Configure and run Data Collector Sets for system baselines and to preserve performance statistics. Configuring Server 2008 Network Infrastructure Objectives 502. Capture performance data. o Data Collector Sets o Performance Monitor o Reliability Monitor o Monitoring System Stability Index o Analyze performance data Lecture Focus Questions: What is the relationship between a counter and an object? What service must a remote computer run to allow you to connect to it using Reliability and Performance Monitor? What kind of data collector allows you to capture software process events? What action can you take if you want to know when the CPU in a system runs over 80% more than 15% of the time? How do data collector sets help you manage data collection and reports? ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 110 Video/Demo Time 10.1.1 Reliability and Performance Monitor 4:14 10.1.2 Using Performance Monitor 6:23 10.1.3 Using Data Collector Sets 13:40 10.1.4 Using Resource Monitor 3:27 Number of Exam Questions 13 questions Total Time About 40 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 111 Section 10.2: Event Viewer Summary This section discusses how to access and manage event logs through Event Viewer. Details include: The role of Event Viewer Common event logs include: o Application o Security o System o Setup o ForwardedEvents Features available with event logs: o Log size o Save events o Filter events o Custom views o Attach a task o Event Log Online Help The role of event subscriptions Services used by event subscriptions: o Windows Remote Management (WinRM) o Windows Event Collector (Wecsvc) Subscription types: o Collector initiated o Source computer initiated Delivery optimization options: o Normal o Minimize bandwidth o Minimize latency o Custom Configuring event subscriptions Students will learn how to: View events to gather information, such as Event ID, Log Name, User, and Computer. Create event filters and custom log views. Search and save logs. Attach tasks to events or to logs. Configure subscriptions to pull events from remote machines. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 112 Configuring Server 2008 Network Infrastructure Objectives 503. Monitor event logs. o Custom views o Application and services logs o Subscriptions o Attaching tasks to events to find and filter Lecture Focus Questions: Which log do you view to troubleshoot errors during a software installation? What options do you have for a log file that has reached its designated capacity? What happens to the data in a log that you save that has a filter on it? How does a custom view differ from adding a filter to a log? How can you combine events from multiple logs into a single report? What tasks can you attach to an event or log? What is the purpose of the Event Log Online Help link inside each event? What two services are required to configure event subscriptions? Where do you go to view events collected from remote computers collected using event subscriptions? Video/Demo Time 10.2.1 Event Viewer 5:15 10.2.2 Using Event Logs 10:21 10.2.4 Configuring Event Subscriptions 5:29 Number of Exam Questions 12 questions Total Time About 35 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 113 Section 10.3: Network Monitor Summary This section discusses the basics of using Network Monitor to monitor network traffic. Details include: The role of Network Monitor Using Network Monitor o Promiscuous mode o Filters Display filter Capture filter o Aliases o Conversations o Parsers Students will learn how to: Configure Network Monitor to capture packets. Configure and remove capture and display filters. Configure conversations to group data by type. Save captured files for troubleshooting and analysis. Configuring Server 2008 Network Infrastructure Objectives 504. Gather network data. o Network Monitor Lecture Focus Questions: What are the differences between display filters and capture filters? What should you do after you have modified a capture filter? Why is this unnecessary when reconfiguring a display filter? What is the difference between capturing in promiscuous mode and capturing without promiscuous mode? When will using promiscuous mode not result in significant differences in the data captured? How can aliases make troubleshooting easier? What permissions do you need to run Network Monitor? Video/Demo Time 10.3.1 Network Monitor 3:16 10.3.2 Using Network Monitor 8:53 ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 114 Number of Exam Questions 5 questions Total Time About 20 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 115 Section 10.4: SNMP Summary This section discusses using Simple Network Management Protocol (SNMP) to manage network-attached devices. Details include: Components that make up an SNMP system: o Managed devices o SNMP agent o SNMP manager o Network Management Station (NMS) o Management Information Base (MIB) Methods that communication can occur between agents and managers: o Polling o Traps Definition of a community name Facts about using SNMP Students will learn how to: Add SNMP Agent support to workstations and servers. Configure the SNMP Agent service properties. Configuring Server 2008 Network Infrastructure Objectives 504. Gather network data. o Simple Network Management Protocol (SNMP) Lecture Focus Questions: What is the difference between polling and traps? Why is the default community name a security vulnerability? What does each of the community rights allow the agent or device to do? Why might READ WRITE and READ CREATE rights pose a security threat? Video/Demo Time 10.4.1 SNMP 5:12 10.4.2 Configuring SNMP 5:47 Number of Exam Questions 3 questions ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 116 Total Time About 20 minutes ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 117 Practice Exams Summary This section provides information to help prepare students to take the exam and to register for the exam. Students will also have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exam. For example, all questions that apply to Objective 100. IP Addressing are grouped together and presented in practice exam Objective 100: IP Addressing, All Questions. Students will typically take about 60-90 minutes to complete each of the following practice exams. Objective 100: IP Addressing, All Questions (92 questions) Objective 200: Name Resolution, All Questions (88 questions) Objective 300: Network Access, All Questions (65 questions) Objective 400: File and Print, All Questions (130 questions) Objective 500: Monitoring and Managing, All Questions (42 questions) The Certification Practice Exam consists of 50 questions that are randomly selected from the above practice exams. Each time the Certification Practice Exam is accessed different questions may be presented. The Certification Practice Exam has a time limit of 135 minutes -- just like the real certification exam. A passing score of 95% should verify that the student has mastered the concepts and is ready to take the real certification test. ©2011 TestOut Corporation (Rev 8/11) Configuring Windows Server 2008 Network Infrastructure (70-642) 118