The Microsoft exam 70-299 measures an individual’s ability to implement and administer security in a Microsoft Windows Server 2003 Network. Before taking the 70-299 exam, you should practice the following:
- Plan security templates based on computer roles.
 - Configure registry and file system permissions, account policies, .pol files, audit policies, user rights assignment, security options, system services, restricted groups, and event logs.
 - Deploy security templates by using Active Directory-based Group Policy objects (GPOs) and by using command-line tools and scripting.
 - Troubleshoot security template problems in a mixed operating system environment.
 - Troubleshoot security policy inheritance and removal of security template settings.
 - Plan and configure security settings and software restriction policies.
 - Plan network zones for computer roles and security for infrastructure services including DHCP and DNS.
 - Plan and configure auditing and logging for a computer role.
 - Analyze security configuration by using tools such as Microsoft Baseline Security Analyzer (MBSA), the MBSA command-line tool, and Security Configuration and Analysis.
 - Plan the deployment of service packs and hotfixes. For example, evaluating the applicability of service packs and hotfixes, and testing the compatibility of service packs and hotfixes for existing applications.
 - Plan patch deployment environments for both the pilot and production phases, batch deployment of multiple hotfixes, and rollback strategy.
 - Assess current patch levels by using the MBSA GUI tool and MBSA command-line tool with scripted solutions.
 - Deploy service packs and hotfixes on new and existing servers and client computers.
 - Plan IPSec deployment such as choosing IPSec mode, authentication methods for IPSec, and test the functionality of existing applications and services.
 - Configure IPSec authentication and appropriate encryption levels.
 - Configure the appropriate IPSec protocol such as Authentication Header (AH) and Encapsulating Security Payload (ESP).
 - Configure IPSec inbound and outbound filters and filter actions.
 - Deploy IPSec policies by using Local policy objects or Group Policy objects (GPOs).
 - Deploy IPSec policies by using commands and scripts. Tools include IPSecPol and NetSh.
 - Monitor IPSec policies by using IP Security Monitor and configure IPSec logging.
 - Troubleshoot IPSec certificates including enterprise trust policies and certificate revocation list (CRL) checking.
 - Plan the authentication and encryption methods for a wireless network.
 - Plan wireless access policies and configure wireless encryption.
 - Install and configure wireless support for client computers.
 - Configure SSL to secure communication channels that include client computer to Web server, Web server to SQL Server computer, client computer to Active Directory domain controller, and e-mail server to client computer.
 - Install certificates for SSL and Renew certificates.
 - Configure authentication for secure remote access. Authentication types include PAP, CHAP, MS-CHAP, MS-CHAP v2, EAP-MD5, EAP-TLS, and multifactor authentication that combines smart cards and EAP.
 - Configure and troubleshoot virtual private network (VPN) protocols including Internet service provider (ISP), client operating system, network address translation devices, Routing and Remote Access servers, and firewall servers.
 - Manage client configuration for remote access security by using tools such as remote access policy and the Connection Manager Administration Kit.
 - Plan, configure, and troubleshoot trust relationships.
 - Plan and configure authentication protocols, multifactor authentication, authentication for Web users, and delegated authentication.
 - Decide which types of groups to use and plan security group scope and nested group structure.
 - Configure access control lists (ACLs).
 - Plan and troubleshoot the assignment of user rights and plan requirements for digital signatures.
 - Install and configure root, intermediate, and issuing certification authorities (CAs). Considerations include renewals and hierarchy.
 - Configure certificate templates and archival and recovery of keys.
 - Configure, manage, and troubleshoot the publication of certificate revocation lists (CRLs).
 - Deploy and revoke certificates to users, computers, and CAs.
 - Back up and restore the CA.
 
                            
                                        
                                        
                                        
No Comments Yet
Be the first to share your thoughts on this post!