Вы находитесь на странице: 1из 72

2151

Module-1
Operating System
Operating System Function
Hardware Management
Software Management
Memory Management
Features of Windows 2000
Multitasking
Memory Support (64 GB)
SMP { Symmetric Multi Processing} Scalability (32 CPU)
PNP { Plug and Play}
Clustering
File System
NTFS
File System Recovery
Large Partition Size
Security
Disk Quota
Compression
QOS {Quality of Services}
Terminal Services
Remote Administration Mode
Application Server Mode
RIS {Remote Installation Service}
PXE
Non PXE
BOOT ROM
Version of Windows 2000
Windows 2000 Professionals (2 CPU) (4 GB RAM)
Windows 2000 Server (4 CPU) (4 GB RAM)
Windows 2000 Advance Server (8 CPU) (8 GB RAM) + Clustering

Windows 2000 Datacenter Server (32 CPU) (64 GB RAM) +


Clustering
Network Benefit
Information Sharing
Hardware and Software Sharing
Centralize Administration and Support
Role of a Computer in a Network
Client
Server
File and Print Server
Database Server
Mail Server
Fax Server
Directory Services Server
Types of Network
Peer-to-Peer/Workgroup (For 10 users)
Client-Server/Domain (Dedicated server)
NOS {Network Operating System}
NOS Features
Domain
Features of Domain
Single Logon
Single User Account
Centralized Administration
Scalability
Benefit of Domain
Organized Object {OU}
Easy Location of Information
Streamlined Access
Delegated Authority
Domain Organization
Domain Controller
Tree
Forest
Features of Active Directory
Organized Information
Provide a Central Repository

Provide Security
Benefit of Active Directory
Reduce TCO {Total Cost of Ownership}
Flexible Administration
Scalability
Simplify Administration

Module-2
Administrative Tasks
Routine Administrative Tasks
User and Groups
Printers
Security
Network Event and Resources
System Integrity
Backup and Restoration
Server Application
Disks
Scheduling Administrative Tasks
Schedule a Task
Administrative Tools
Control Panel
Registry
System Properties
General
Network Identification
Hardware
User Profile
Advance
System Information
System Summery
Hardware Resources
Component
Software Environment

Event Viewer
Application Log
System Log
Security Log
Error
Warning
Information
Windows Task Manager
Application
Process
Performance
Performance
Performance Data
System Monitor
Performance Logs and Alerts
Printer
Share Folder
Share
Session
Open Files
Disk Management
Disk Cleanup
Disk Defragmenter
Backup
Backup Wizard
Restore Wizard
ERD {Emergency Repair Disk}
Security Management
Local User and Group
Active Directory User and Computer
Local Security Policy
Domain Security Policy
Domain Controller Security Policy
Network Tools
Network Dial-up Connections
Network Monitor

Additional Tools
Configure your Server
Add/Remove Programs
Application Specific Utility
Third Party Tools
MMC {Microsoft Management Console}
Add/Remove Snap-in

Module-3
User Account
Local User Account
User Define Local User Account
Built-in (Local) User Account
Administrator
Guest (By Default Disable)
Local User and Group Utility
Domain User Account
User Define Domain Account
Built-in (Domain) User Account
Administrator
Guest (By Default Disable)
Active Directory Users and Computers Utility
Groups
Group on a Local Computer
Group on a Domain Controller
User Rights
Common User Rights
Log on Locally
Change the System Time
Shut down the System
Access the computer from Network
Rights Assigned to Built-in Group
Rights of Administrator (Full Control)
Rights of User (Logon, Shutdown, Using Application & Network)

Power Users (not in D.C.)


Backup Operators
Permissions
Object Permissions
NTFS File Permissions
Read
Write
Read & Execute
Modify
Full Control
NTFS Folder Permission
Read
Write
List Folder Contents
Read & Execute
Modify
Full Control
Share Folder Permission
Read
Change
Full Control
Printer Permission
Print
Manage Document
Manage Printer

Module-4
Network
Scope of Network
Local Area Network {LAN}
Wide Area Network {WAN}
Metropolitan Area Network {MAN}
Basic Connectivity Component
Network Adapter
Mac Address

Network Cable
Twisted Pair (10 Base-T) (Length: 100Mtr. 328 Feet)
UTP {Unshielded Twisted Pair}
STP {Shielded Twisted Pair}
RJ-45 Connector
Coaxial Cable
Thin net (10 Base-2) (Length: 185Mtr. 607 Feet)
Thick net (10 Base-5) (Length: 500Mtr. 1640 Feet)
BNC Connector
Fiber Optic Cable (Digital Signals/Light Beams)
Wireless Communication Device
Infrared Transmission
Narrowband Radio Transmission
Network Topologies
Physical Topology
Logical Topology
Bus Topology
Coaxial Cable
Terminator
Star Topology
UTP Cable
Central Device (Hub/Switch)
Ring Topology
Token Ring
Coaxial Thick net/Fiber Optic
MSAU {Multi Station Access Unit}
Mesh Topology
Thick net Coaxial/Fiber Optic
Hybrid Topology
Star-Wired-Bus
Star-Wired-Ring
Network Technologies
Ethernet
Access Method CSMA/CD {Career Sense Multiple
Access/Collision Detection}
Transfer Speed

Standard Ethernet 10Mbps


Fast Ethernet 100Mbps
Gigabyte Ethernet 1Gbps (1000Mbps)
Token Ring
Access Method Token Passing
Transfer Speed 4 to 6 Mbps for all cable types
MSAU
ATM {Asynchronous Transfer Mode}
Packet Switching Network
Access Method
Point-to-Point
Fixed Packet Size (53 bytes-48 bytes for data and 5 bytes for
Address)
ATM Switch
Transfer Speed Fiber Optic at 155Mbps to 622Mbps
FDDI {Fiber Distribution Data Interface}
Primary Ring
Secondary Ring
Access Method Token Passing
Transfer Speed - Fiber Optic at 155Mbps to 622Mbps
Frame Relay
Packet Switching Network
Access Method
Point-to-Point
Variable Packet Size
Transfer Speed Depending on the speed over Lease Line
Expanding The Network
Repeater
Hub
Active Hub
Passive Hub
Bridge (Maximum 16 Ports, MAC Address)
Switch (Maximum 100 Ports)
Router
Gateway (works between two different architectures)
Remote Access Connectivity Type

Dial-up Remote Access


Remote Access Client
Remote Access Server
Modem or Telephone Line Both side
VPN {Virtual Private Network}
Remote Access Client
Windows 2000 VPN Server
Corporate Intranet
PSTN {Public Switched Telephone Network}
Telephone Line
Analog Modem Both side
56Kbps
ISDN {Integrated Services Digital Network
Digital Telephone Line/Telephone Wire
ISDN Modem Both side for Digital Transmission
64Kbps or Faster
BRI {Basic Rate Interface} ChannelIndia Use
Two B Channel (64Kbps each)
One D {Data} Channel (16Kbps for control information)
PRI {Primary Rate Interface} Channel
There Are two Types Of PRI technology
E1 TechnologyEurope Use
30 B Channel--64 Kbps Per Channel
1 D Channel64 Kbps
T1 TechnologyUSA Use
23 B Channel
One 64Kbps D channel
X.25
Packet Switching Network
X.25 PAD {Packet Assembler/Dissembler}
Client side Modem
Server side X.25 Smart Card
ADSL {Asymmetric Digital Subscriber Line}
ADSL Wire/Copper Telephone Wire
Voice and Data Transmission
1.5 to 9 Mbps Downstream Rate (Downloading}

16 to 640 Kbps Upstream Rate (Uploading)


LAN Interface and Dial-up Interface (Both side)

Module-5
Protocol
Types of Protocol
Open Protocol TCP/IP
Vendor Specific Protocol IPX/SPX
OSI {Open System Interconnection} Reference Module
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Protocol Stacks
Application Protocol FTP, SMTP
Application Layer
Presentation Layer
Session Layer
Transport Protocol TCP
Transport Layer
Network Protocol IP
Network Layer
Data Link Layer
Physical Layer
Protocols and Data Transmission
Routable Protocol
TCP/IP, IPX/SPX
Non-Routable Protocol
NetBEUI, DLC {Data Link Control}
Types of Transmission
Unicast
Broadcast

Multicast
Common Protocols
TCP/IP {Transmission Control Protocol/Internet Protocol}
IPX/SPX {Internetwork Packet Exchange/Sequenced Packed
Exchange}
NetBEUI {NetBIOS Enhanced User Interface}
NBF {NetBIOS Frame}
AppleTalk
Macintosh Network
Other Communication Protocol
ATM {Asynchronous Transfer Mode}
Transfer Video, Audio, Data
ATM Switch
IrDA {Infrared Data Association}
Wireless Communication
Remote Access Protocol
Dial-up Protocol
SLIP {Serial Line Internet Protocol} (Unix)
PPP {Point-to-Point Protocol} (Microsoft)
VPN Protocol
PPTP {Point-to-Point Tunneling Protocol}
MPPE {Microsoft Point-to-Point Encryption}
L2TP {Layer Two Tunneling Protocol}
IPSec {Internet Protocol Security}

Module-6
TCP/IP Layers
Application Layer
HTTP {Hyper Text Transfer Protocol}
FTP {File Transfer Protocol}
Transport Layer
TCP {Transmission Control Protocol}
Acknowledgement Must
UDP {User Datagram Protocol}
Acknowledgement not required

Internet Layer
IP {Internet Protocol}
Adding Source Address
ICMP {Internet Control Manager Protocol}
Error Message
IGMP {Internet Group Management Protocol}
Control Multicasting
ARP {Address Resolution Protocol}
Mac Address
Network Interface Layer
ATM
Ethernet
Identifying Application
IP Address
TCP/UDP Port
TCP
FTP (Port 20, 21)
HTTP (Port 80)
UDP Port 67, 68
Socket = IP Address + TCP or UDP Port
TCP/IP Suit
TCP
Three Way Handshake
UDP
IP
TTL {Time to Live}
ICMP
IGMP
UDP
ARP
TCP/IP Utilities
Diagnostic Utilities
ARP
Hostname
IPConfig
Nbstat

Netstat
Ping
Tracert
Connectivity Utility
FTP
Telnet
Tftp
Server Based Software
TCP/IP Printing Service
IIS {Internet Information Service}
Types of Name
Host Name
NetBIOS Name
Static IP Mapping
Host File
LMHost File
Dynamic IP Mapping
DNS
WINS
Packet Terminology
Segment
Message
Datagram
Frame
Frame Component

Data Flow

IP Routing
Packet Delivery
Routing Table
Data Transfer Across Router
IP at Source Computer
IP at Router
IP at Destination Computer

Module-7
IP Address
Network ID
Host ID
IP Address Classes
Class A
1 to 126
255.0.0.0
Network : 126, Host : 1,67,77,214
Class B
128 to 191
255.255.0.0
Network : 16,384, Host : 65,534
Class C
192 to 223
255.255.255.0
Network : 20,97,152, Host : 254
Class D
224 to 239
Class E

240 to 255
*[127 is reserved for Loopback]
Subnets
Subnet Mask
Default Subnet Mask
Custom Subnet Mask
Local Host
Remote Host
Default Gateway
Static IP Addressing
Dynamic IP Addressing
DHCP
APIPA {Automatic Private IP Addressing} (169.254.x.y)

Module-8
CIDR {Classless Inter-Domain Routing}
Classless
Classfull
Defining CIDR
Binary Nation
Increased choice of Network Size
Binary IP Address
Decimal Nation
Binary Nation
Binary Subnet Mask
Subnetting
Supernetting

Module-9
Internet
TCP/IP
Private and Public IP
IANA {Internet Assigned number Authority}
ISP {Internet Service Provider}

Internet Service
E-Mail {Electronic Mail}
WWW {World Wide Web}
Chat
Internet News
FTP {File Transfer Protocol}
Telnet
Intranet
Domain Naming
Top Level .com
Second Level Microsoft.com
Sub Domain example.microsoft.com
Client Technologies
Newsreader
Msnews.microsoft.com
Microsoft Outlook Express News
Web Browser
IE {Internet Explorer}
Search Engine
Portals
Internet Protocols
HTTP
HTTPs
SSL
FTP
SMTP
NNTP
HTML
DHTML
URL
NAT {Network Address Translator}
Proxy Server
Firewall
Microsoft Proxy Server
Web Server
Microsoft {IIS} Internet Information Service

Indexing Service
SSL {Secure Socket Layer}
Windows Media Service
Additional Developer Support
ASP
VB Script

2152
Module-1
Windows 2000 Operating System
Windows 2000 Professional
Windows 2000 Server
Windows 2000 Advance Server
Windows 2000 Datacenter Server
System Requirement
Item
Professional
Server
CPU
133 MHz
133MHz
Memory
64MB
128MB(M), 256MB(R)
Hard Disk
2GB (650MB Free)
2GB (1GB Free)
Display
VGA
VGA
Accessories
Keyboard/Mouse
Keyboard/Mouse
For Installation
CD-ROM (12X)
CD-ROM (12X)
For Network
Lan Card
Lan Card
HCL {Hardware Compatible List}
Disk Partition Option
Create a new Partition on unformatted Hard Disk
Create a new Partition on partitioned Hard Disk
Install on Exiting Partition
Delete Exiting Partition to make Disk Space available
File System
FAT/FAT32
Support Dual Boot Configuration
No File and Folder Level Security
NTFS
File and Folder Level Security
Disk Compression
Disk Quota
File Encryption
*[NTFS supports up 2TB Partition size and FAT16 2GB]
CAL {Client Access License}

Per Seat Unlimited


Per Server By Default 5 Client
Workgroup
SAM {Security Account Manager}
Domain
BIOS and Firmware
Service Pack/Hot Fixes
Makeboot.exe
Windows 2000 Advance Server Component
Certification Services
Windows Clustering
Management and Monitoring Tools
Message Query
IIS
Microsoft Indexing Service
Microsoft Script Debugger
Remote Installation Service
Configure Your Server
Active Directory
File Server
Print Server
Web/Media Server
Networking
Application Server
More Advance Configuration
Upgrading Windows 2000 Professional
Windows 95, 98 Windows 2000 Professional
Windows NT Workstation 3.51 or 4.0 Windows 2000 Professional
Windows For Workgroup 3.1 Windows NT Workstation 3.51 or 4.0
Windows 2000 Professional
Generate a Compatibility report
Winnt32/checkupgradeonly
Windows 2000 reading Analyzer
DLL Files
DFS {Distribution File System}
NTLM Version 2 Authentication (Windows 95 & 98)
Server Upgrading

Regback.exe
Windows NT Server Resource Kit
Regrest.exe
ERD {Emergency Repair Disk}
UPS {Uninterrupted Power Supply}
ISA {Industry Standard Architecture}
IRQ {Interrupt Request}
BIOS {Basic Input/Output System}

Module-2
Configuring and Managing Hardware
Installing Hardware
Installing Device
Driver Signing
Ignore
Warn
Block
Sigverif (Command)
Hardware Profile
Configuring Display
Configuring Multiple Monitors
Environment Variable

User Environment Variable


System Environment Variable
Startup and Recovery
System Startup
System Failure
Write Debugging Information
Dump File
Boot.ini
Configuring Desktop Environment
Regional Options
General Language
Number
Currency
Time
Date
Input Locals
Accessibility Option
Keyboard
Sticky Keys
Filter Keys
Toggle Keys
Sound
Sound Sentry
Show Sound
Display
High Contrast
Mouse
Mouse Key
General
Support Serial Keys
Configuring Internet Option
Changing Home Page
Caching Temporary Internet Files
Configure Proxy Server Setting
Setting Security Level of Web Content Zone
Internet

Local Internet
Trusted Site
Restricted Site
Security Level
High
Medium
Medium Low
Low

Module-3
Protocol
Network Services
Network Adapter
Binding
Connecting to Windows 2000 Network/Method
Run
Internet Explorer
Map Network Drive
My Network Places
Search on Start Menu
CSNW {Client Services for Netware}
GSNW {Gateway (and Client) Services for Netware}
IPX/SPX
Internal Network Number
Frame Type

Module-4
User Account
Local User Account
SAM Database
Domain User Account
Active Directory
Built-in User Account
Administrator

Guest
Naming Convention
Logon Name
20 Characters
Full Name
*[Logon Name and Full Name must be Unique]
Password
Minimum 8 Characters
Maximum 128 Characters
Account Option
Logon Hours
Computer Which User can Logon
Account Expiration
Administrative Tools
Adminpak.msi
Runas
Domain User Account
First Name
Initials
Last Name
Full Name
User Logon Name
User Logon Name (Pre Windows)
Password
Password
Confirm Password
User must change Password
User cannot change Password
Password never Expired
Account is Disable
Home Folder
Domain User Account Properties
User Account Template
User Profile
Contents
Display

Regional Setting
Mouse
Sound
Types
Local User Profile
Roaming User Profile
Mandatory User Profile
NTuser.dat/NTUser.man

Module-5
Group in Workgroup
Local Group
Built-in Local Group
Group in Domain
Group Type
Security Group
Distribution Group
Group Scope
Global Group
Domain Local Group
Universal Group (Native Mode)Distribution Group
Built-in Group in Domain
Built-in Domain Local Group
Special Identities
Predefined Global Group
ALP
AGDLP
SID {Security Identifier}

Module-6
NTFS Permissions
ACL {Access Control List}
ACE {Access Control Entry}
Attributes

Ownership
Permission Inheritance
Compression
Disk Quota
Quota Entry
EFS {Encrypted File System}
Cipher.exe
Recovery Agent (Use Private key to Decrypt file)

Module-7
Folder Sharing
Sharing Permission
Publish a Share Folder
UNC Name
DFS {Distributed File System}
DFS Root
DFS Link
DFS Benefits
Organized Resources
Facilitates Navigation
Facilitates Administration
Preserves Permission
DFS Root
Domain Based DFS Root
Stand-alone Based DFS Root
DFS Replicas
FRS {File Replication Services}
Replication Policy
Initial Master

Module-8
Event Log
System Log
Application Log

Security Log
Information
Warning
Error
Event Log Wrapping (Overwrite a older event is called wrapping)
*[Event Log file size can be between 64KB to 4GB]
Log File Format (.evt)
Text File Format (.txt)
Comma-delimited Text File Format (.csv)
System Monitor
Object
Instant
Counter
Viewing Counter Data
Histogram
Report
Chart
Alert
Threshold

Module-9
Security Templates
BasicBy Default
Compatible
Secure
High
Security Policy
Types
Local Security Policy
Domain Security Policy
Domain Controller Security Policy
Account Policy
Password Policy (Kerberos Version 5)
Local Policy
Public Key Policy

IP Security Policy
Event Log
Restricted Group
System Service
Registry
File System
Secedit.exe (Command)
/analyze (Analyzing Database .sdb File)
/configure
/export
/refreshpolicy
/validate
/areas
Auditing
Auditing Entry
Auditing Policy

Module-10
Print Device
Local Print Device
Network Interface Print Device
Printer
Print Server
Printer Driver
Local Printer Port
TCP/IP Printer Port
LPD {Line Printer Daemon}
Printer Pooling
Printer Priority
Spool Folder
Printer Properties
Printer Permissions
Print
Manage Document
Manage Printer

URL {Uniform Resource Locater}


PWS {Microsoft Peer Web Service}
http://server_name/Printers
Spool folder

Module-11
Mobile User
Hardware Profile
Dock
Undock
Power Management
ACPI {Advance Configuration Power Interface}
APM {Advance Power Management}
Power Scheme
Power Security Option
Hibernate
Standby
Offline Files
Synchronized
Manual Caching
Automatic Caching
Program Caching

Module-13
Fault Tolerance
Disaster Recovery
*[Fault Tolerance + Disaster Recovery = Disaster Protection]
UPS {Uninterrupted Power Supply}
Basic Disk
Partition
Primary (Maximum 4 Partitions)
Extended (Maximum 1 Partition)
Logical (Unlimited Partition)
Dynamic Disk

Volume
Simple Volume
Maximum 1 Physical Disk
Normal Volume
Spanned Volume
Minimum 2, Maximum 32
Unequal Space
Stripped (Raid 0)
Minimum 2, Maximum 32
Equal Space
Mirrored (Raid 1)
Minimum 2, Maximum 2
Equal Space
Striped Volume with Parity (Raid 5)
Minimum 3, Maximum 32
Equal Space
*[Only that Drive will be extended who is originally created in
Dynamic Disk]
RAID {Redundant Array of Independent Disks}
RAID 0 Striped Volume
RAID 1 Mirrored Volume
RAID 5 Striped Volume with Parity
Parity Information
Mirrored Volume
Ftdisk.sys (Windows 2000 Fault Tolerance Drive)
Boot Partition
System Partition
Dynamic Disk
Disk Duplexing
Reactivate Disk
Failed Redundancy
Recovery Failed Mirrored Hard Disk
Recovery Failed RAID 5 Hard Disk
Backup
Normal
Copy

Differential
Incremental
Daily
System State Data
Registry
CS {Component Service} Class Registration Database
System Startup Files
Certificate Services Database (Only in Server and Domain Controller)
Active directory (Only in Domain Controller)
Sysvol folder (Only in Domain Controller)
Disaster Recovery Tool
Safe Mode
Safe Mode with Networking
Safe Mode with Command Prompt
Enable Boot Logging
Enable VGA Mode
Last Known Good Configuration
Directory Services Restore Mode
Debugging Mode
Recovery Console Win32.exe /cmdcons
Commands
Attrib
Batch
Chdir (CD)
Chkdsk
Cls
Copy
Delete (Del)
Dir
Disable
Diskpart
Enable
Exit
Expand
Fixboot
Fixmbr
Format

Help
Listsvc
Logon
Map
Mkdir (MD)
More
Rmdir (RD)
Rename (Ren)
Systemroot
Type
ERD {Emergency Repair disk}
systemroot/repair

Module-14
Terminal Server
Terminal Services
RDP {Remote Desktop Protocol}
TCP/IP
Terminal Server Mode
Remote Administration Mode
Application Server Mode
Remote Support
License Server
Terminal Services CAL {Client Access License}
Terminal Services Internet Connection License
Built-in License
Temporary License
Terminal Services Client Creator
systemroot\system32\client\TSclient Folder
Terminal Services Configuration
Terminal Services Manager
Terminal Session Setting
Command
Changeuser/install
Changeuser/execute

Application Compatibility Script


Systemroot\Application Compatibility Script\Install folder

Module-15
Deploying Windows 2000
Compact Disk
Network
Disk Duplication
Remote Installation
Manual Network Installation
A Distribution Server
A Client
650 MB Free Space in Hard Disk
Winnt.exe
/a
/e[:command]
/udf:id [,UDB_file]
/r[:folder]
/rx[:folder]
/s[:source_path]
/t[:temp_drive]
/u[:answer_file]
Automatic (unattended) Installation with switch
x: \winnt.exe /u:answer_file /s:\\server_name\share_name
Winnt32.exe
/copydir:[foldername]
/cmd:[command_line]
/cmdcons
/debug [level] [:file]
/s:[source_path]
/syspart:[drive]
/tempdrive:[drive]
/unattend [num:file]
/udf:id [,udf_file]
Creating Answer File and UDF File

\\support\tools Folder
Setupmgr.exe
Deploy.cab
Unattend.txt
Unattend.bat
Unattend.udf
Disk Duplication
Sysprep.exe
Sysprep.inf
Image Copier
Distribution Server
Destination Computer
Sysprep.exe {System Preparation Tool}
-quiet
-pnp
-reboot
-nosidgen
RIS {Remote Installation Server} Requirement
DNS
DHCP
Active Directory
Net PC
Rbfg.exeRemote Boot Floppy Generator.

Module-16

File Server
Print Server
Web Server
Application Server
Domain Controller
DNS Server
DHCP Server
WINS Server
Documentation
Installation Documentation

Configuration Documentation
Account Change
Server stop error and corrective action
Security and Virus violation
Service Pack, Upgrade, HotFix and Installation
Application Store Server
Distribution Server

2153
Module-1
Intranet
IETF {Internet Engineering Task Force}
Remote Access
Dial-up Remote Access
Virtual Private Network
Remote Office
Internet
Extranet

Module-2
Manual TCP/IP Configuration
Automatic TCP/IP Configuration
DHCP {Dynamic Host Configuration Protocol}
DHCP Option
IP Address
MAC Address
Default Gateway
IP Address of DNS
IP Address of WINS
BOOTP {Bootstrap Protocol}
RFC {Request For Comments} 951, 2132, 2131, 1534, 1542
DHCP Lease Generation Process
IP Lease Request
DHCPDISCOVER
Mac Address
IP Lease Offer
DHCPOFFER
IP Lease Selection
DHCPREQUEST
IP Lease Acknowledgement

DHCPACK
DHCP Lease Renewal Process
Automatic Lease Renewal
DHCPNAK, DHCPOFFER
Manual Lease Renewal
Ipconfig/release
Ipconfig/renew
DHCP Server Requirement
Install DHCP Server
Static IP Address, Subnet Mask, Default Gateway
Authorizing DHCP Server
Deletion of Unauthorized DHCP Server
DHCPINORM
DHCP Scopes
Netsh
Scope Option
Server Level
Scope Level
Class level
Reserved Client Level
Client Reservation
Scope Parameters
Exclude
Lease Duration
Decreasing Lease Duration
Increasing Lease Duration
Unlimited Lease Duration
Active a Scope
Configuration of Scope Option
Common Scope Option
IP Address of Router (Default Gateway)
Domain Name
IP Address of DNS or WINS
Scope Option Supported by DHCP
IP Address of Router (Default Gateway)
IP Address of one & more DNS Server

DNS Domain Name


IP Address of one & more WINS Server
Type of NetBIOS over TCP/IP name resolution
Additional Scope Option
Option Classes
Vendor Defined Classes
User Defined Classes
Super Scope
Multicast ScopeClass D IP Address
Routed Network Configuration Option
Include at least one DHCP Server on each subnet
Configure RFC 1542 complaint router to forward DHCP message
Configure a DHCP Relay Agent on each subnet to forward DHCP
message
DHCP Relay Agent
RFC-1542
Monitoring DHCP Service
DHCPSrvlog.xxx
DHCP Database
Store
Systemroot\system32\DHCP
Backup
Systemroot\system32\DHCP\backup\jet\new
Jetpack dhcp.mdb kk.mdb
Removing a DHCP Server
Short Lease Duration for Client
New Lease for Client
Sufficiently Large Address pool on the new DHCP Server
Record any Reserved Address
Transfer IP Address to the new scope

Module-3
DNS {Domain Name System}
FQDN {Fully Qualified Domain Name}
DNS Query

Iterative Query
Recursive Query
DNS Lookup Types
Forward Lookup
Reverse Lookup
Zone
Zone Type
Active Directory Integrated Zone
Standard Primary Zone
Standard Secondary Zone
Zone File
FQDN
IP Address
Alias
Master DNS Server
Multiple Master DNS Server
Zone Transfer
All Zone Transfer
AXFR
Incremental Zone Transfer
IXFR
SOA {Start of Authority} Resource Record
Serial Number
Primary Server
Responsible Person
Refresh Interval
Retry Interval
Expires After
Minimum TTL {Time to Live}
TTL for this Record
Zone Transfer Security
To any server
Only to server listed on the Name Server tab
Only to the following server
Configuration Notification
Creating a Sub-Domain in an Existing Zone
Converting Existing Zone

DNS Database
Store
Systemroot\system32\DNS
Migrates Zones to Windows 2000 DNS Server
Migrating From a Bind{Berkeley Internet Name Doamin} Based
DNS Server
File Type
UNIX file name Windows 2000 file name
Boot File
named.boot
Boot.ini
Forward Lookup zone file db.domain_name Domain_name.dns
Reverse Lookup zone file db.w.x.y
y.x.w.in-addr.arpa.dns
Cache File
Cache.dns
Root Zone
Integrating DNS and DHCP
Dynamic Updates
Dynamic Updates Protocol
Dynamic Update Process
PTR {Pointer} resource record
A resource record
Allow Dynamic Update
Yes
No
Only Secure Update
Caching Only Server
Forwarders
Command
Nslookup
-Option
-computer_to_find
-server
IPConfig/flushdns
Ipconfig/registerdns
DNS Registration
DNS Record Type
A {Address}
NS {Name Server}
CNAME {Canonical Name}

MX {Mail Exchanger}
SOA {Start of Authority}
PTR {Pointer}
SRV {Service}
DNS Server Debug Logging Option
Systemroot\system32\dns\dns.log

Module-4
WINS {Windows Internet Name Service}
NetBIOS Name
NetBIOS Name Registration
NetBIOS Scope
Browsing
NetBIOS Name
Name Registration
Name Discovery
Name Release
NetBIOS Name Resolution
NetBIOS Name Cache
NetBIOS Name Server
Local Broadcast
NetBIOS Over TCP/IP Name Resolution Nodes
B Node (Broadcast)
P Node (Peer to Peer)
M Node (Mixed)
H Node (Hybrid)
LMHost File
Registration Renewal
Name Query
Name Release
Non WINS Client
WINS and DNS Interoperability
Integration of DNS and WINS
Enabling WINS lookup on DNS Zones
Enabling WINS Lookup with Third Party DNS Server

WINS Lookup Process


Configuring DNS to Forward Query to WINS Server
Configure Static Mapping
Configure WINS Proxy
NetBIOS Name Registration
NetBIOS Name Resolution
WINS Database Replication
Replication Partners
Push Partner
Pull Partner
Push Pull PartnerBy Default
Maintain WINS Database
Reconciling Database
Opening Database
WINS Record Information
IP Address
State
Static
Owner
Version
Expiration
Record Name
Type
Compacting WINS Database
Stop WINS
Run Jetpack Command (Jetpackwins.mdb)
Restart WINS
Removing Records from WINS Database
Verifying WINS Database Consistency
Initiating WINS Database Consistency Verification
Configure WINS Database Consistency Verification
Backup and Restore WINS Database
Specifying a Backup Directory
Backing Up WINS Database
Restoring WINS Database

Module-5
Network Security
PKI {Public Key Infrastructure}
Public Key Encryption
Using Public Key and Private Key
Encryption and Decryption Text
Public key Authentication
Digital Signature
Hash Algorithms
CA {Certification Authority}
Certificate
External and Internal CAs
Certificate Revocation
Certifications Hirarchies
Root CA
Subordinate CA
Windows 2000 PKI
Primary Components
Certificate Services
Active Directory
PKI enabled applications
Security Protocols
SSL {Secure Socket Layer}
IPSec {Internet Security Protocol}
TLS {Transport Layer Security}
Use of Certificates
Server Authentication
Client Authentication
Code Signing
Secure e-mail
EFS
IPSec
Deploying Certificate Services
Choosing a CA Model
Enterprise Root CA

Active Directory
DNS Server Service
Enterprise Subordinate CA
Stand Alone Root CA
Stand Alone Subordinate CA
Location of Database and Log Files
Systemroot\system32\CertLog
Share Folder sytemroot\CAConfig
Backing Up CA
Restoring CA
Certificate Templates
Administrator
Domain Controller
Computer
Basic EFS
EFS Recovery Agent
User
Web Server
Requesting a Certificate
Certificate Services Web Pages
Submitting a Certificate Request
Submitting an Advance Certificate Request
Checking a Pending Request
Viewing Certificates
Issuing Certificates
Revoking Certificates
Publishing a Certificate Revocation List
Import and Export Certificates
Certificate File Format
Personal Information Exchange (PKCS # 12)
Cryptographic Message Syntax Standard (PKCS # 7)
DER Encoded Binary X.509
Base64 Encoded X.509
CA Trust
Validity of a Certificate

Module-6
IPSec {Internet Protocol Security}
Identifying Security issues with network
Network Monitor
Data Modification
Password
Address spooling
Application Layer
Man-in-the middle
Denial-of-Service
Examining the Role of IPSec in a Network
Enhanced Network Security
IPSec Policies
Enabling IPSec
Predefined IPSec Policies
Client (Respond Only)
Server (Request Security)
Secure Server (Required Security)
IPSec between Computers
Transport Mode
IPSec between Networks
Tunnel Mode
Customizing IPSec Policy
Rule Component
Tunnel Endpoint
Network Type
Authentication Method
IP Filter List
Filter Action
Default Response Rule
IPSec Encryption
Authentication Encryption
SHA {Secure Hash Algorithm}
FIPS {Federal Information Processing Standard}
160-bit key

MD5 {Message Digest 5}


128-bit key
Packet Encryption
56-bit DES {Data Encryption Standard}
40-bit DES
3DES

Module-7
RAS {Remote Access Server}
Remote Access Connection
Remote Access Process
Remote Access connectivity
Dial-up Connection
Virtual Private network Connection
Data Transport Protocol
Remote Access Protocol
PPP
SLIP {Serial Line Internet Protocol}
Microsoft RAS
ARAP {AppleTalk Remote Access Protocol}
VPN Network Protocol
PPTP {Point-to-Point Tunneling Protocol}
MPPE {Microsoft Point-to-Point Encryption}
L2TP {Layer Two Tunneling Protocol}
IPSec {Internet Protocol Security}
Difference between PPTP and L2TP
Connectivity
Header Compression
Authentication
Encryption
Inbound Connection
VPN Ports
PPTP Ports
L2TP Ports
Cable and Modem Ports

Dial-in Setting
Remote Access Permission
Caller ID Verification
Callback Option
No Call BackBy default
Set By Caller
Always Callback To
Assigning Static IP Address
Applying Static Route
Outbound Connection
Hardware Option
PSTN
ISDN
Cable Modem
X.25
Direct Connection
Dial-up Connection
Multilink Connection
PPP Multilink
BAP
Authentication Protocol
SAP {Standard Authentication Protocol}
PAP {Password Authentication Protocol}
Security Low
SPAP {Shiva Password Authentication Protocol}
Security Medium
CHAP {Challenge Handshake Authentication Protocol} also
known as MD5
Security Medium
MS-CHAP {Microsoft Challenge Handshake Protocol}
Security High
MS-CHAP v2 {Microsoft Challenge Handshake Protocol Version2}
Security High
EAP {Extensible Authentication Protocol}
MD5 CHAP

TLS {Transport Layer Security}


Additional Third Party Authentication Method
Encryption Protocol
MPPE
IPSec
Routing and Remote Access and DHCP Integration

Module-8
Remote Access Policy
Stores Locally
Components
Condition
8 Am To 5 Pm
Marketing group
Monday To Friday
Permission
Yes
No
Profile
Connectivity Time
IP Sec Policy
Default Remote Access Policy
Native Mode
Mixed Mode
Multiple Policies
NAS {Network Access Server}
RADIUS {Remote Authentication Dial-In User Service}
Modem Logging
Tracing Remote Access Connection
Troubleshooting
Communication Line Failure
Intermittent Connection Failure
VPN Connection Failure
Network Configuration
Remote Access Server Setting

Module-9
IAS {Internet Authentication Service}
Purpose and Use IAS
Dial-up Corporate Access
Extranet Access for Business Purpose
Internet Access
Outsourced Corporate Access Through Service Provider
Authorizing an IAS Server in Active Directory.
RADIUS Server
IAS Server
RADIUS Client
RAS Server
VPN Server

Module-10
Router Functions
Router Terminology
End System
Intermediate System
Network
Router
Hardware Router
Software Router
Internetwork
Purpose of Routing
IP Routers are multihomed host
IP Routers provide packet forwarding for other TCP/IP hosts
Routing Table
Routing Table Entries
Network Destination
Netmask
Gateway
Interface
Metric

Hop count
Delay
Throughput
Reliable
Address Relationship
Routing by Remote and Routing Access
Static Routes
Static Routing Table
Destination
Network Mask
Gateway
Interface
Metric
Protocol
Adding a Static Route
Packet Filtering
Input Filter
Output Filter
Filter Action
Demand Dial Routing
Demand Dial Filters
Dial out hours
Demand Dial Connections
Configure ports to allow Demand Dial Connection
Demand Dial Interface
Inbound Demand Dial Connections
Static IP Address Pools
Restrict Demand Dial Connections
Demand Dial Filtering
Dial-Out Hours
Routing Protocols
RIP {Routing Information Protocol}
For Smaller Network
OSPF {Open Shortest Path First}
For Larger Network
Adding an Interface to support RIP

Configuring RIP Interface


Operation Mode
Auto Static Update Mode
Periodic Update Mode
RIP Announcement Protocol
RIP Version 1
Broadcast
RIP Version 2
Multicast
Activating Authentication
Route Filtering
RIP for Non Broadcast Network

Module-11
Connecting Internet by Using a Router
Routing Functionality
Routing Services
Routing Considerations
Secure Internet Connection by Using Firewall
Configure a Firewall
Establishing Security Rules
NAT {Network Address Translator}
Benefits of NAT
Single Connection for Multiple Users
ICS {Internet Connection Sharing}
Proxy Server
Restricting Connections
Caching Information
Internet Connectivity Options
NAT vs. Routing
NAT vs. Proxy Server
ICS vs. NAT
Router Interface for NAT

Module-12

WEB Server
IIS {Internet Information Sharing}
WWW {World Wide Web}
FTP {File Transfer Protocol}
NNTP {Network News Transfer Protocol}
SMTP {Simple Mail Transfer Protocol}
Web Site
Web Site Identification
Default Web site
Descriptions
IP Address
TCP Port
SSL Port
Home Directory
Local Directory
Shared Folder
Method of Authentications
Anonymous Access
Basic Authentication
Digest Authentication
Integrated Windows Authentication
Multiple Method of Authentication
Default Document
Administering IIS
Applying the Latest Security Updates
Managing Web Server Remotely
Monitoring Internet Information Service
Internet Information Service Global
Web Service
Active server Pages
CGI {Common Gateway Interface}
ISAPI {Internet Server Application Programming Interface}

Module-13

RIS {Remote Installation Services}


RIS Server
RIS Client Computer
Images
RIS Requirement
Network Requirement
DHCP Server Service
Active Directory
DNS Server Service
Server Requirement
2GB Minimum Total Disk Space
Images Stored on NTFS Partition
Client Requirement
Windows 2000 Professional Requirement
Network Boot Capability
PXE Boot ROM Version .99c
RIS Security Setting
Authorizing RIS Server
Assigning User Permissions
Client Computer Name and Location
Client Computer Naming Format
Client Computer Account Location
Prestaging Client Computer
GUIDGlobally Unique Identification Number
Deploying a Image
CD Based Image
Answer File
Restricting Image
RIS Startup Disk
RIPrep Image
RIS Problems
BootP Message
DHCP Message
BINL Message
RIS Boot Disk
Computer Cannot Connect to the Server
Installation Options Are not Available

Module-14
Windows 2000 Administrative Strategies
Terminal Services
SNMP {Simple Network Management Protocol}
SNMP Service
Configuring Terminal Services for Remote Administration
Configuring Performance Parameters
Optimizing Services Running On The Server
Freeing Computer Resources
Configuring Security Parameters
Controlling Administrator Access
Encrypting Terminal Services Data
SNMP Agent Trap Message
MIB {Management Information Base}
Hierarchical Name Tree
Object Identifier Format
Microsoft Object Identifier Namespace
SNMP Tarps
SNMPUTIL Command

Module-15
Saving IPConfig Output
ARP Cache
Dynamic Entries
Static Entries
PathPing Utility
NetDiag Support Tool
Capturing Data by Using Network Monitor
Capturing Network Traffic
Saving Capture Data
Capture Filters
Capture Triggers

Module-16
SNA Host (also known as IBM Host )

2154
Module-1
Introduction to Active Directory
What is Active Directory
Active Directory Objects
Active Directory Schema
LDAP {Lightweight Directory Access Protocol}
Active Directory Logical Structure
Domains
Organization Units
Trees and Forest
Global Catalog
Active Directory Physical Structure
Domain Controllers
Sites
Method for Administering a Windows 2000 Network
Using Active Directory for Centralized Management
Managing the User Environment
Delegating Administrative Control

Module 2
Introduction to Role of DNS in Active Directory
Name Resolution
Naming Convention for Windows 2000 Domain
Locating the Physical Component of Active Directory
DNS and Active Directory
DNS and Active Directory Namespace
Active Directory and the Internet
DNS Host Names and Windows 2000 Computer Names
DNS Name Resolution in Active Directory
SRV {Service} Resource Records

SRV Record Format


SRV Record Registered by Domain Controller
SRV Record Registered only by Windows 2000 Domain
Controllers
How Computers use DNS to Locate Domain Controller
Active Directory Integrated Zone
Installing and Configuring DNS to support Active Directory
DNS Requirement for Active Directory
SRV Records
Dynamic Update Protocol
Incremental Zone Transfer
Installing and Configuring DNS
Installing DNS during the Active Directory Installation

Module 3
Introduction to Creating a Windows 200 Domain
Installing Active Directory
Preparing to Install Active Directory
200 MB Disk Space
50 MB for Log Files
Creating the First Domain
Adding a Replica Domain Controller
Using an Unattended Setup Script to Install Active Directory
Active Directory Installation
Configuring Parameters
Site Configuration
Directory Service Configuration
Directory Partitions Configuration
Service and Security Configuration
RPCRemote Procedure Call
Netlogon
KDCKey Distribution Center
Intersite Messaging
Distributed Link Tracking Server

Windows Time
Additional Active Directory Installation Operations
Examining the Default Structure of Active Directory
Performing Post Active Directory Installation Tasks
Verifying the Active Directory Installation
Implementing Active Directory Integrated Zones
Forward Lookup Zone
Reverse Lookup Zone
Securing Updates for Active Directory Integrated Zone
Changing the Domain Mode
Mixed Mode
Native Mode
Implementing an Organizational Unit Structure
Troubleshooting the Installation of Active Directory
DNS or NetBIOS names are not unique
Removing Active Directory

Module 4
Introduction to User Accounts and Groups
User Logon Name
User Logon Name
User Principle Name
User Logon Name (Pre Windows 2000)
User Logon Name Uniqueness Rules
Creating a User Principle Name Suffix
Creating Multiple User Accounts
The Bulk Process
Import
Using CSVDE to create multiple user accounts
Using LDIFDE to create multiple user accounts
Administering User Accounts
Performing Common Administrative Tasks
Moving User Account within Domain
Locating User Account

Using Groups in Active Directory


Introduction to Group in Active Directory
Using Global Groups
Using Universal Groups
Membership
Scope
Strategies for using Groups in a Domain
Using Global and Domain Local Groups
Troubleshooting Domain User Accounts and Groups

Module 5
Introduction to Publishing Resources
Setting up and Administering Published Printers
Introduction to Printer Publishing
Managing Printer Publishing
Publishing Printers on Computers not Running windows 2000
Administering Published Printer
Implementing Printer Locations
What are Printer Locations
Requirements for Printer Location
Define Location Names
Configuring Printer Locations
Setting up and Administering Published Shared Folders
Comparing Published Objects with Shared Resources

Module 6
Object Security in Active Directory
Active Directory Security Components
Security Principal
Security Identifiers
Security Descriptors
Discreationary and System Access Control Lists

DACL
SACL
ACL {Access Control Entries}
Inheritance
The Logon Process
Access Tokens
How Windows 2000 grant Access to Resources
Controlling Access to Active Directory Objects
Active Directory Permissions
Controlling Inheritance of Permissions
Setting Active Directory Permissions
Object Ownership
Changing Object Ownership
Delegating Administrative Control of Active Directory Objects
Overview of Delegating Administrative Control
Using the Delegation of Control Wizard
Guidelines for Delegating Administrative Control
Assign Control at the OU Level
Use the Delegation of Control Wizard
Track the Delegation of Permission Assignments
Follow Organizational Guidelines for Delegating Control
Customizing MMS Consoles
Creating Customized MMC Consoles
Distributing Customized MMC Consoles
Installing Windows 2000 Snap-in
Setting up Taskpads
What is Taskpad
Creating and Configuring a Taskpad
Adding Tasks in a Taskpad

Module 7
Group Policy Structure
Types of Group Policy Setting
Group Policy Objects

Group Policy Setting for Computers and Users


Group Policy Object and Active Directory Containers
Working with Group Policy Object
Creating Linked Group Policy Object
Creating Unlinked Group Policy Object
Linking an Existing Group Policy Object
Specifying a Domain Controller for Managing Group Policy Objects
How Group Policy Settings are Applied in Active Directory
Group Policy Inheritance
How Group Policy Setting are Processed
Controlling the Processing of Group Policy
Group Policy and Slow Network Connections (Links)
Resolving Conflicts between Group Policy Setting
Class Discussion How Group Policy is Applied
Modifying Group Policy Inheritance
Enabling Block Inheritance
Enabling No Override
Filtering Group Policy Setting
Class Discussion : Changing Group Policy Inheritance
Delegating Administrative Control to Group Policy
Monitoring and Troubleshooting Group Policy
Monitoring Group Policy
Group policy Troubleshooting Tools
Netdiag.exe
Replman.exe
Gpotool.exe
Gpresult.exe
Troubleshooting Group Policy

Module 8
Introduction to Managing User Environments
Introduction to Administrative Templates
What are Administrative Templates
How Computers Apply Administrative Template Settings

Using Administrative Templates in Group Policy


Types of Administrative Template Setting
Setting for Locking Down the Desktop
Setting for Locking Down User Access to Network Resources
Setting for Locking Down User Access to Administrative Tools and
Applications
Loopback Processing Mode Setting in Group Policy
Implementing Administrative Templates
Assigning Scripts with Group Policy
What are Group Policy Script Setting
The Process of Appling Script Setting with Group Policy
Assigning Group Policy Script Settings
Using Group Policy to Redirect Folders
What is Folder Redirection
Selecting the Folder to Redirect
Redirecting Folder to a Server Location
Using Group Policy to Secure the User Environment
Troubleshooting User Environment Management

Module 9
Introduction to Managing Software Deployment
Windows Installer
Deploying Software
Software Deployment
Creating a Software Distribution Point
Assigning Software
Publishing Software
Using Group Policy to Deploy Software Packages
Setting Software Installation Defaults
Configuring Software Deployment
Using Software Modifications
Creating Software Categories
Associating File Name Extensions with Applications
Maintaining Deployed Software

Upgrading Deployed Software


Redeploying Software
Removing Deployed Software
Troubleshooting Software Deployment

Module 10
Introduction to Tree and Forests
What is a Tree
What is a Forest
What is the Forest Root Domain
Characteristics of Multiple Domain
Creating Trees and Forests
Creating a New Child Domain
Creating a New Tree
Creating a New Forest
Trust Relationship in Tree and Forests
Transitive Trust in Windows 2000
Types of Domain Trust
Transitive Trust
Tree Root Trust
Parent Child Trust
Two-Way Trust
How Trust Work
How Kerberos V5 Works
Shortcut Trusts in Windows 2000
Non Transitive Trusts in Windows 2000
Verifying and Revoking Trusts
The Global Catalog
The Global Catalog and the Logon Process
Creating a Global Catalog Server
Strategies for Using Group in Trees and Forest
Universal Groups and Replication
Nesting Strategy Using Universal Groups
Class Discussion : Using Groups in Trees and Forests

Troubleshooting Creating and Managing Trees and Forests

Module 11
Multi Master Replication Model
Active Directory Replication
Multi-Master Replication with Loose Convergence
Replicated Updates
Replication Latency
Change Notification Hop Limit
Urgent Replication Account Lockout
Replication Conflicts
Sibling Name CNF
Globally Unique Stamps
USN {Update Sequence Number}
Up-to-dateness Vector
Active Directory Partition
Schema Partition
Configuration Partition
Domain Partition (contoso.msft)
Direct Replication Partner
Transitive Replication Partner
GCS {Global Catalog Server}
KCC {Knowledge Consistency Checker}
Automatic Replication
NTDS Setting
Sites
Default First Site Name
Why we use Site
Replication Traffic
Logon Traffic
Request to Global Catalog
Replication within Site
Uncompressed
Replication between Sites

Replication Scheduling
Compressed Traffic
Bridgehead Server
ISTG {Inter Site Topology Generator}
NTDS Site Setting (Preferred Bridgehead Server)
Replication Protocol
RPC {Remote Procedure Call}
SMTP {Simple Mail Transfer Protocol}
FRS {File Replication Service}
Site
Default First Site Name
IP Subnet
Site Link
Transport
Member Site
Cost (Between 1 to 32767)
Schedule
Replication Interval (Between 15 to 10,080 Minutes)
Inter-Site Transport
Site Link Bridge
Replication Partner
Monitor Replication Traffic
Repadmin [/u:[domain\]user/PW:[password]]
Repadmin /showvector
Repadmin /showconn
Reciprocal Replication

Module 12
Operation Master
Operation Master Role
Forest Wise Role
Schema Master
Domain Naming Master
Domain Wise Role

PDC {Primary Domain Controller} Emulator


RID {Relative Identifier} Master
Infrastructure Master
RID + Domain SID = Object SID
Creating Object
Dcdiag Utility
Moving Object
Group Membership Identification
Global Catalog
Active Directory Users and Computers
RID Master
PDC Emulator
Infrastructure Master
Active Directory Domain and Trust
Domain Naming Master
Active Directory Schema Snap-in
Schema Master
(regsrv32.exe%systemroot%\system 32\schmmgmt.dll)
Seizing a Role
Ntdsutil
FQDN {Fully Qualified Domain Name}
Transfer a Role

Module 13
Backup Active Directory
Backup System State Data
Restore Active Directory
Move Active Directory Database
Defragment the Active Directory Database
Active Directory Database
Systemroot\NTDS Folder
Ntds.dit
Edb.log (10 MB)
Edb.chk

Res1.log and Res2.log (20 MB Each)


ESE {Extensible Storage Engine}
Garbage Collection Process
Tombstone Lifetime
Backing up Active Directory
System State Data
Active Directory
Sysvol Folder
Registry
System Startup Files
Class Registration Database
Certification Service Database
Third Party Tool for Backing up Active Directory on a Remove
Computer is VERITAS
Restore Active Directory
Authoritative Restore Ntdsutil
Non Authoritative Restore
Directory Service Restore Mode
Move Database
Ntdsutil Move DB
Active Directory Database Defragment
Online Defragment
Offline Defragment
LDAP {Lightweight Directory Access Protocol}

Designing

Domain
Tree
Forest
OU
Objects
Multiple Domain
Multiple Tree
Multiple Tree
Hierarchical Structure
Site
Delegation of Administrative Authority
Schema Modification
Centralized Management
Group Policy
Site Level
Domain Level
OU Level
BIND DNS Server
Resource Record
BIND 8.2.1 or Later
ICANN
NIC
Root Domain
Parent Domain
Child Domain
Public Network
Private Network
Name Resolution
Authoritative DNS Server
Non Authoritative DNS Server
TTL Record
Site Manager Replication Traffic
Security Boundary

Object Ownership
Group
Security Group
Distribution Group
Site Level Delegation
Domain Level Delegation
OU Level Delegation
Parent OU
Child OU
Permission
Inherit Permission
Small No. of Domain Administrator
Reason for Schema Modification
Activating Schema Components
Deactivating Schema Components
List of Attributes
Attributes Can be Reactivated/Deactivated
Replication Latency
Network Performance
Directory Enable Application
Global Catalog Replication
Single Domain
Multiple Domain
Group Policy Filtering
Group Policy Object
Block Policy Inheritance
No Override
Loop Back Processing
GPO Linking
Peak Hours
Off Peak Hours
Enable GPO
Disable GPO
Growth
Flexibility
First Domain
Group Type

Global Group
Domain Local Group
Universal Group
Group Nesting
Mixed Mode
Native Mode
Reason to Maintain a Single Domain
Reason to Create Multiple Domain
Trust Relationship
Kerberos
Transitive Trust
Shortcut Trust
External Trust
Key Distribution Center
Features of Multiple Forest
Site Link
Inter Site Replication Topology
Replication Traffic
DFS Topology
FRS
Workstation Logon Traffic
Replication Latency
Replication Efficiency
Replication Cost
Bridgehead Server
Wan Link
Replication Scheduling
Setting Cost
Site Link Cost
Types Inter Site Replication Transport
RPC {Remote Procedure Call}
RPC Over TCP/IP
SMTP {Simple Mail Transfer Protocol}
LDAP {Light Weight Directory Access Protocol} Query
Operation Master Role
Forest Level Role
Domain Level Role

Directory Partition Replication


Forest Level
Domain Level
Mobile User
Resources
Domains
Server
Site Topology
Classes and Attributes are not Deleted but Deactivated
Classes and Attributes can be Reactivated
Primary Reason for Schema Modification

MCSE 2003 Document


Widows 2003 Server Family
Windows Sever 2003 Web Edition
2 Processors
2GB RAM
Cannot Install Active Directory
Clustering is not available
64 bit O/S is not available
Windows Server 2003 Standard Edition
4 Processors
4GB RAM
Can Install Active Directory
Clustering is not available
64 bit O/S is not available
Windows Server 2003 Enterprise Edition
32 Processors
64GB RAM
Can Install Active Directory
Clustering is available for 8 Nodes
64 bit O/S is available
Windows Server2003 Data Center Edition
64 Processors
512GB RAM
Can Install Active Directory
Clustering is available for 8 Nodes
64 bit O/S is available
SUS {Software Update Server}
IIS Version 6.0
Remote Desktop Connection
Command Line Tools
Dsadd
Dsmod
Dsquery
Run As Command

GPMC {Group Policy Management Console}


Backing up a GPO
Deleting a GPO
Copying a GPO
Importing a GPO
Group Policy Modeling
Group Policy Resulting
Security Template
Conditional Forwarding
Stub Zone
ASP.NET Support
Web Server
SUS Server Minimum Requirement
ASR {Automated System Recovery}
Shadow Copies of Shared Folder
Disaster Recovery
RSOP {Resultant Setup Policy}
Planning Mode
Logging Mode
Logical Structure of Active Directory
Physical Structure of Active Directory
Optimizes Network Traffic
First Domain Controller in Forest Root Domain
Distinguished Name
Relative Distinguished Name
User, Computer, Printer
Schema Changes can be Redefined
Global Catalog A Repository that contains a subset of the attributes of all
objects in Active Directory

Вам также может понравиться