Microsoft MCSE Certification Boot Camp

MCSE Exam 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure


Skills Measured

This certification exam measures your ability to plan and maintain a Microsoft Windows Server 2003 network infrastructure. Before taking the exam, you should be proficient in the job skills listed in the following matrix.

Prerequisites
Experience in implementing and administrating Windows network operating systems with network services, and a proficient working knowledge of networking concepts

Planning and Implementing Server Roles and Server Security

Configure security for servers that are assigned specific roles.     

Plan a secure baseline installation.

Plan a strategy to enforce system default security settings on new systems.

Identify client operating system default security settings.

Identify all server operating system default security settings.

     

Plan Security for Servers that are Assigned Specific Roles

Roles might include domain controllers, Web servers, database servers, and mail servers.

Deploy the security configuration for servers that are assigned specific roles.

Create custom security templates based on server roles.

     

Evaluate and Select the Operating System to Install on Computers in an Enterprise

Identify the minimum configuration to satisfy security requirements.

     

Planning, Implementing, and Maintaining a Network Infrastructure

Plan a TCP/IP network infrastructure strategy.

Analyze IP addressing requirements.

Plan an IP routing solution.

Create an IP subnet scheme.

     

Plan and Modify a Network Topology

Plan the physical placement of network resources.

Identify network protocols to be used.

     

Plan an Internet Connectivity Strategy    

Plan network traffic monitoring. Tools might include Network Monitor and System Monitor.      

Troubleshoot connectivity to the Internet.

Diagnose and resolve issues related to Network Address Translation (NAT).

Diagnose and resolve issues related to name resolution cache information.

Diagnose and resolve issues related to client configuration.

     

Troubleshoot TCP/IP Addressing

Diagnose and resolve issues related to client computer configuration.

Diagnose and resolve issues related to DHCP server address assignment.

     

Plan a Host Name Resolution Strategy

Plan a DNS namespace design.

Plan zone replication requirements.

Plan a forwarding configuration.

Plan for DNS security.

Examine the interoperability of DNS with third-party DNS solutions.

     

Plan a NetBIOS Name Resolution Strategy

Plan a WINS replication strategy.

Plan NetBIOS name resolution by using the Lmhosts file.

     

Troubleshoot Host Name Resolution

Diagnose and resolve issues related to DNS services.

Diagnose and resolve issues related to client computer configuration.

      

Planning, Implementing, and Maintaining Routing and Remote Access 

Plan a routing strategy.

Identify routing protocols to use in a specified environment.

Plan routing for IP multicast traffic.

     

Plan Security for Remote Access Users

Plan remote access policies.

Analyze protocol security requirements.

Plan authentication methods for remote access clients.

     

Implement Secure Access Between Private Networks

Create and implement an IPSec policy.

     

Troubleshoot TCP/IP Routing

Tools might include the route, tracert, ping, pathping, and netsh commands and Network Monitor.      

Planning, Implementing, and Maintaining Server Availability 

Plan services for high availability.

Plan a high availability solution that uses clustering services.

Plan a high availability solution that uses Network Load Balancing.

     

Identify System Bottlenecks, Including Memory, Processor, Disk, and Network Related Bottlenecks

Identify system bottlenecks by using System Monitor.

     

Implement a Cluster Server

Recover from cluster node failure.

     

Manage Network Load Balancing

Tools might include the Network Load Balancing Monitor Microsoft Management Console (MMC) snap-in and the WLBS cluster control utility.      

Plan a backup and recovery strategy.

Identify appropriate backup types. Methods include full, incremental, and differential.

Plan a backup strategy that uses volume shadow copy.

Plan system recovery that uses Automated System Recovery (ASR).

     

Planning and Maintaining Network Security

Configure network protocol security.

Configure protocol security in a heterogeneous client computer environment.

Configure protocol security by using IPSec policies.

     

Configure Security for Data Transmission

Configure IPSec policy settings.

     

Plan for Network Protocol Security

Specify the required ports and protocols for specified services.

Plan an IPSec policy for secure network communications.

     

Plan Secure Network Administration Methods

Create a plan to offer Remote Assistance to client computers.

Plan for remote administration by using Terminal Services.

     

Plan Security for Wireless Networks     

Plan security for data transmission.

Secure data transmission between client computers to meet security requirements.

Secure data transmission by using IPSec.

     

Troubleshoot Security for Data Transmission

Tools might include the IP Security Monitor MMC snap-in and the Resultant Set of Policy (RSoP) MMC snap-in.     

Planning, Implementing, and Maintaining Security Infrastructure.

Configure Active Directory directory service for certificate publication.    

Plan a public key infrastructure (PKI) that uses Certificate Services.

Identify the appropriate type of certificate authority to support certificate issuance requirements.

Plan the enrollment and distribution of certificates.

Plan for the use of smart cards for authentication.

     

Plan a Framework for Planning and Implementing Security

Plan for security monitoring.

Plan a change and configuration management framework for security.

    

Plan a Security Update Infrastructure

Tools might include Microsoft Baseline Security Analyzer and Microsoft Software Update Services.     

 

 

For more information on our training, simply fill out the form below and a training advisor will contact you within one business day.

Boldface fields required.

CBT Direct has a strong commitment to providing excellent service to all who visit this website. At CBT Direct, meeting your needs and expectations forms the foundation of everything we do. Protection of your privacy is paramount. Any information you share with us will be treated with care. We will not share your personal information with any third parties.










Back to Home Page
English Close