Preface |
|
vi | |
|
Installing, Configuring and Troubleshooting Active Directory |
|
|
1 | (32) |
|
|
2 | (2) |
|
|
4 | (2) |
|
|
6 | (2) |
|
|
8 | (2) |
|
Creating site link bridges |
|
|
10 | (2) |
|
Create connection objects |
|
|
12 | (2) |
|
Create Global Catalog servers |
|
|
14 | (2) |
|
Move server objects between sites |
|
|
16 | (2) |
|
Transfer operations master roles |
|
|
18 | (2) |
|
Verify Active Directory installation |
|
|
20 | (2) |
|
Implement an Organizational Unit (OU) structure |
|
|
22 | (2) |
|
|
24 | (2) |
|
Perform an authoritative restore of Active Directory |
|
|
26 | (2) |
|
Recover from a system failure |
|
|
28 | (2) |
|
Troubleshoot Active Directory |
|
|
30 | (3) |
|
Installing, Configuring, Managing, Monitoring, and Troubleshooting DNS for Active Directory |
|
|
33 | (12) |
|
Install DNS for Active Directory |
|
|
34 | (2) |
|
Integrate AD DNS zones with non-AD DNS zones |
|
|
36 | (2) |
|
Configure zones for dynamic updates |
|
|
38 | (2) |
|
Manage replication of DNS data |
|
|
40 | (2) |
|
Monitor and troubleshoot DNS |
|
|
42 | (3) |
|
Configuring, Managing, Monitoring, Optimizing, and Troubleshooting Change and Configuration Management |
|
|
45 | (48) |
|
Create a Group Policy Object (GPO) |
|
|
46 | (2) |
|
|
48 | (2) |
|
Delegate administrative control of group policy |
|
|
50 | (2) |
|
Modify group policy inheritance |
|
|
52 | (2) |
|
Filter group policy settings by associating security groups to GPOs |
|
|
54 | (2) |
|
|
56 | (2) |
|
Control user environments by using administrative templates |
|
|
58 | (2) |
|
Configuring security using group policies |
|
|
60 | (2) |
|
Assign script policies to users and computers |
|
|
62 | (2) |
|
Deploy software by using group policy |
|
|
64 | (2) |
|
Maintain software by using group policy |
|
|
66 | (2) |
|
Configure deployment options |
|
|
68 | (2) |
|
Troubleshoot common problems that occur during software deployment |
|
|
70 | (2) |
|
Manage network configuration by using group policy |
|
|
72 | (2) |
|
Deploy Windows 2000 by using RIS |
|
|
74 | (2) |
|
Install an image on a RIS client computer |
|
|
76 | (2) |
|
Configure remote installation options |
|
|
78 | (2) |
|
Troubleshoot RIS problems |
|
|
80 | (2) |
|
Manage CD-based images for performing remote installations |
|
|
82 | (2) |
|
Manage RIPrep images for performing remote installations |
|
|
84 | (2) |
|
|
86 | (2) |
|
|
88 | (2) |
|
Prestage RIS client computers for added security and load balancing |
|
|
90 | (3) |
|
Managing, Monitoring, and Optimizing the components of Active Directory |
|
|
93 | (30) |
|
Move Active Directory objects |
|
|
94 | (2) |
|
Publish resources in Active Directory |
|
|
96 | (2) |
|
Locate objects in Active Directory |
|
|
98 | (2) |
|
Create and manage accounts manually or by scripting |
|
|
100 | (2) |
|
Control access to Active Directory objects |
|
|
102 | (2) |
|
Delegate administrative control of objects in Active Directory |
|
|
104 | (2) |
|
Monitor domain controller performance |
|
|
106 | (2) |
|
Maintain domain controller performance |
|
|
108 | (2) |
|
Troubleshoot domain controller performance |
|
|
110 | (2) |
|
Monitor Active Directory components |
|
|
112 | (2) |
|
Maintain Active Directory components |
|
|
114 | (2) |
|
Troubleshoot Active Directory components |
|
|
116 | (2) |
|
Manage and troubleshoot intersite replication |
|
|
118 | (2) |
|
Manage and troubleshoot intrasite replication |
|
|
120 | (3) |
|
Configuring, Managing, Monitoring, and Troubleshooting Security in a Directory Services Infrastructure |
|
|
123 | (15) |
|
Apply security policies by using group policy |
|
|
124 | (2) |
|
Create security configurations by using Security Configuration and Analysis and security templates |
|
|
126 | (2) |
|
Analyze security configurations by using Security Configuration and Analysis and security templates |
|
|
128 | (2) |
|
Troubleshoot/modify security configurations by using Security Configuration and Analysis and security templates |
|
|
130 | (2) |
|
Implement an audit policy |
|
|
132 | (2) |
|
|
134 | (2) |
|
|
136 | (2) |
Answer Key |
|
138 | (13) |
Glossary of Acronyms and Abbreviations |
|
151 | |