1 / 250
文档名称:

(Exam 70-298) Exam Cram 2 - Designing Security for a Windows Server 2003 Network.pdf

格式:pdf   页数:250
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

(Exam 70-298) Exam Cram 2 - Designing Security for a Windows Server 2003 Network.pdf

上传人:kuo08091 2014/2/19 文件大小:0 KB

下载得到文件列表

(Exam 70-298) Exam Cram 2 - Designing Security for a Windows Server 2003 Network.pdf

文档介绍

文档介绍:Designing Security™ for a Windows® Server™ 2003
Network Exam Cram™ 2 (Exam 70-298)































By Bill Ferguson

Published by Que

May 2004





Page 1 of 250
INDEX

A Note from Series Editor Ed Tittel ..........................................................................................4
About the Author ......................................................................................................................5
Acknowledgments ....................................................................................................................5
We Want to Hear from You! .....................................................................................................6
The 70-298 Cram Sheet...........................................................................................................7
TYPES OF SECURITY POLICIES...................................................................................7
KEY PRINCIPLES OF SECURITY DESIGN ....................................................................7
TYPES OF DATA .............................................................................................................7
COMPONENTS OF A PUBLIC KEY INFRASTRUCTURE ..............................................7
MON HIERARCHICAL DESIGNS FOR CERTIFICATION AUTHORITIES ..8
TYPES OF CAS ...............................................................................................................8
TYPES OF ACCOUNT POLICIES ...................................................................................8
TYPES OF TRUSTS ........................................................................................................8
ADMINISTRATIVE TOOLS THAT ENHANCE SECURITY ..............................................9
COMMON AUDIT POLICY SETTINGS.........................................................