More About the Author "endeavor27@163.com"

Author Nick: endeavor27@163.com
Site:


Articles by endeavor27@163.com :

Sort by:

Practice: Securing a Rogue Access Point

In this practice, you will design security for an access MCTS: Windows 7 cert point that has just been discovered on a fictitious company’s network. Read the scenario and answer the question that follows. If you are unable to answer the question, review the lesson materials and try the question again. You can find the […]

Designing Security Using 802.1x for Wireless Networks

Even if you have taken every security precaution in configuring your MCSA Certification wireless network, it is difficult to prevent unauthorized connections. Anyone who can connect can detect and receive all data on that network and potentially on your wired network. Even WEP-encrypted data might be successfully attacked. An attacker can connect from outside your […]

Guidelines for Designing Incremental Security Templates

Designing incremental security templates for server roles consists of determining where 220-701 settings in the template need to be changed from those set in the base-line template. In general, this is not an onerous task because few settings need to be changed. However, security for server roles generally involves much more than modi-fications made to […]

Understanding Group Policy on MCSE 70-297

You can see a mapping of the Group Policy GUID and name in the Active Directory Replication Monitor (Replmon.exe). To see this, add a domain controller as the mon¬itored server, and then right-click that domain controller and select Show Group Policy Object Status. You can determine which administrative groups can administer (create, modify, delete) GPOs […]

Understanding GPOs on MCSE

To create a specific desktop configuration for users, you create GPOs, which are collections of free Microsoft exam questions on Group Policy settings. Each computer running Microsoft Windows Server 2003 has one local GPO and can, in addition, be subject to any number of nonlocal (Active Directory—based) GPOs. Local GPOs One local GPO is stored […]