CertCities.com -- The Ultimate Site for Certified IT Professionals
Post Your Mind in the CertCities.com Forums
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: Secrets of the Windows Gurus

Reader Review: Word 2007 -- Not Exactly a Must-Have

Access Anywhere

Windows Vista: Learning To Play Nice

Product Review: WhatsUp Gold 11.0, Premium Edition


CertCities.com
Let us know what you
think! E-mail us at:



Visit Redmond Media Group
 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Saturday: November 17, 2007
TechBusiness: Resources for Innovation Through Software Technology on Redmond Developer News
Secure Computing: Visit SWAT Now!
Dice: The Career Hub for Tech Insiders


Microsoft Exam 70-220: Designing Security for a Windows 2000 Network
8 case-based study questions. Case study text comes first, then questions, then answers and explanations at the end of the quiz.


courtesy of   Transcender LLC

Case Study Scenario

Background

VisionWorx is a national chain of corrective lens stores, which employs 5,000 people. VisionWorx manufactures their own line of corrective lenses and eyeglass frames. VisionWorx occasionally engages in joint ventures with TXGlobal, a plastics manufacturer. Currently, VisionWorx is collaborating with TXGlobal on Project X-Ray Vision to create a more comfortable daily-use contact lens.

Organization

VisionWorx

The VisionWorx manufacturing facility is in Denver, Colorado. The VisionWorx corporate office is in New York City, and VisionWorx has stores throughout the United States.

The VisionWorx Research department will organize the joint venture with TXGlobal, and information about Project X-Ray Vision will be stored in a shared folder named Xray on a VisionWorx Windows 2000 Server computer.

The VisionWorx Manufacturing department will produce the X-Ray Vision contact lens. The chemical makeup of the X-Ray Vision contact lens is a trade secret and must be protected.

The VisionWorx Marketing department will market the X-Ray Vision contact lens. The VisionWorx Marketing Department employees occasionally need to change the advertisements on the VisionWorx Web site.

TXGlobal

TXGlobal is located in Houston, Texas.

The TXGlobal Research department will work with the VisionWorx Research Department to create a new chemical compound for the X-Ray Vision contact lens.

The TXGlobal Manufacturing department will create a method for manufacturing the X-Ray Vision contact lens. TXGlobal and VisionWorx will use their manufacturing facilities to produce the X-Ray Vision contact lenses.

The TXGlobal Accounting department must ensure that VisionWorx compensates TXGlobal for its role in the development of the X-Ray Vision contact lens.

Current Network

VisionWorx

The VisionWorx network administrators are members of the VisionAdmin group.

All VisionWorx servers are Windows 2000 Server computers, and all VisionWorx client computers are Windows 2000 Professional computers.

The VisionWorx marketing representatives use portable Windows 2000 Professional computers to remotely access the company's network. Because the company is committed to biometrics, VisionWorx has issued portable digital cameras to all marketing representatives; these cameras are used with third-party software for retinal scan remote-access authentication.

VisionWorx maintains a T3 wide area network (WAN) link between the manufacturing facility and the corporate office.

Each VisionWorx local area network (LAN) uses 100 megabits-per-second (Mbps) Ethernet.

The VisionWorx network is organized into a single Windows 2000 domain.

VisionWorx uses the domain name system (DNS) name

VisionWorx.com. VisionWorx maintains a shared folder named Vision.VisionWorx employees can store files in the Vision folder, create new files and sub folders in the Vision folder, and change the contents of files in the Vision folder.

Network administration of the Research organizational unit (OU) has been delegated to a group named Research Admins. The Research Admins group has been granted Full Control permission to the Research OU.

VisionWorx and TXGlobal are connected through the Internet and have established a two-way trust relationship between their Windows 2000 networks.

VisionWorx has the following computers at the corporate office: one Proxy Server 2.0 computer, three Windows 2000 Server computers with the Routing and Remote Access Service (RRAS) that provide dial-up and virtual private network (VPN) support, three SQL Server 7.0 computers and three Windows 2000 Server computers that are domain controllers.

Employees at the VisionWorx corporate office print to a pool of shared printers.

The VisionWorx manufacturing facility has three Windows 2000 Server computers that act as domain controllers and a pool of shared laser printers.

VisionWorx allows customers to anonymously access the VisionWorx Web site.

The VisionWorx Windows 2000 domain operates in native mode.

TXGlobal

The TXGlobal network administrators are members of a group named TXAdmin.

The TXGlobal network is organized in a single Windows 2000 domain with the DNS domain name TXGlobal.com. The TXGlobal Windows 2000 network is operating in native mode.

The TXGlobal Windows 2000 network has four Microsoft Exchange 2000 Server computers.

TXGlobal has a shared folder on its network named TXGlobal. All TXGlobal employees can read documents in the TXGlobal folder, but they cannot modify documents in the TXGlobal folder.

The TXGlobal Windows 2000 network has the following computers: two Proxy Server 2.0 computers and three Windows 2000 Server computers with RRAS, which are named TXRAS1, TXRAS2 and TXRAS3.

The TXGlobal employees use Windows 2000 Professional desktop computers.

TXGlobal requires users to provide usernames and passwords to access the TXGlobal Web site.

TXGlobal has a T1 connection to the Internet.

Envisioned System

The VisionWorx Manufacturing department and the TXGlobal Manufacturing department will use a folder named XRay_Man on the VisionWorx Windows 2000 network. VisionWorx Manufacturing department employees are members of a group named VisionMan, and TXGlobal Manufacturing department employees are members of a group named TXMan. Members of the VisionMan group and the TXMan group must be allowed to store files in the VisionMan folder and change the contents of the files that are stored in the VisionMan folder. The Everyone group has been granted Full Control permission to the XRay_Man share, and administrators have configured the appropriate NTFS permissions on the XRay_Man folder. The VisionAdmin group needs to change permissions on the XRay_Man folder. The The VisionWorx Manufacturing department and the TXGlobal Manufacturing department will use a folder named XRay_Man on the VisionWorx Windows 2000 network. VisionWorx Manufacturing department employees are members of a group named VisionMan, and TXGlobal Manufacturing department employees are members of a group named TXMan. Members of the VisionMan group and the TXMan group must be allowed to store files in the VisionMan folder and change the contents of the files that are stored in the VisionMan folder. The Everyone group has been granted Full Control permission to the XRay_Man share, and administrators have configured the appropriate NTFS permissions on the XRay_Man folder. The VisionAdmin group needs to change permissions on the XRay_Man folder. The TXAdmin group does not need to access the XRay_Man folder.

The VisionWorx Marketing Department employees are members of a group in the VisionWorx Windows 2000 domain named VisionMark. The TXGlobal Marketing Department employees are members of a group in the TXGlobal Windows 2000 domain named TXMark. Members of the TXMark group and members of the VisionMark group need to read the files that are stored in the XRay_Man folder.

The VisionWorx Research Department and the TXGlobal Research Department will use a shared folder named Research. The VisionWorx Research Department employees are members of a group named VisionRes, and the TXGlobal Research Department employees are members of a group named TXRes. The Research folder is only accessible to members of the VisionAdmin, TXAdmin, VisionRes and TXRes groups. Members of the TXRes and the VisionRes groups do not need to access the files in the XRay_Man folder.

VisionWorx will not upgrade the T3 lines that connect the VisionWorx Windows 2000 network to the Internet.

The CA that is configured to issue certificates to users and computers on the VisionWorx Windows 2000 network should use Active Directory for authentication of users when issuing certificates.

Concerns

VisionWorx Chief Executive Officer (CEO)

"Our Manufacturing department needs to share files with the TXGlobal Manufacturing department. Our connection to TXGlobal must be secure because we may use it to transmit sensitive data. Shared folders must be available to employees at VisionWorx and TXGlobal. Only authorized users should be allowed to modify the files stored in the shared folders on the VisionWorx network. The VisionWorx Marketing representatives use portable computers to record orders and plan marketing strategies. The VisionWorx Marketing representatives store proprietary VisionWorx information on their portable Windows 2000 Professional computers; proprietary information that is stored on portable Windows 2000 Professional computers needs to be encrypted."

TXGlobal CEO

"We do not want to share all the files stored in the Manufacturing folder because some of the files contain secret formulas and other proprietary information."

VisionWorx Information Systems (IS) Manager

"We need to provide an efficient way to move an employee from one OU in our domain to another because employees often move from one department to another. We must secure the information that is stored on the portable Windows 2000 Professional computers."

TXGlobal IS Manager

"We need to protect the TXGlobal network from computer viruses. We must find a cost-effective way to create an encrypted WAN link between the TXGlobal Windows 2000 network and the VisionWorx Windows 2000 network."

VisionWorx Sales Manager

"We must use every available resource to advertise our new product. We need to view information about the production process to create persuasive advertising, so we need to access select files in the XRay_Man folder."

 

Case Study Questions:

1. Which of the following are primary network security risks for VisionWorx and TXGlobal?

a. The TXGlobal engineers will design a new chemical compound for contact lenses.

b. The XRay_Man folder will be accessed by unauthorized users.

c. Employees will change advertisements on the VisionWorx Web site or the TXGlobal Web site.

d. Data about Project X-Ray Vision that is stored on the portable Windows 2000 Professional computers will be accessed by unauthorized users.

 

2. Which of the following should be used to protect the information that the VisionWorx Marketing representatives store on their portable Windows 2000 Professional computers?

a. EFS

b. MPPE

c. PPTP

d. PPP

 

3. Which of the following authentication protocols should be used to enable the VisionWorx Marketing representatives to remotely log on to the VisionWorx network?

a. Challenge Handshake Authentication Protocol (CHAP)

b. Extensible Authentication Protocol (EAP)

c. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

d. Password Authentication Protocol (PAP)

 

4. How should the VisionWorx employees be granted access to resources on the VisionWorx network?

a. The VisionWorx employees should be granted access to resources on the VisionWorx network individually.

b. The VisionWorx employees should be placed in Universal groups. The Universal groups should be granted access to resources on the VisionWorx network.

c. The VisionWorx employees should be placed in domain local groups. The domain local groups should be placed in global groups. The global group should be granted access to resources on the VisionWorx network.

d. The VisionWorx employees should be placed in global groups. The global groups should be placed in domain local groups. The domain local group should be granted access to resources on the VisionWorx network.

 

5. Which of the following diagrams represents the NTFS permissions that should be granted on the XRay_Man folder?

a)network configuration diagram

b)network configuration diagram

c)network configuration diagram

d)network configuration diagram

6. Which of the following events should the TXGlobal IS manager audit to determine whether malicious users have attempted to access the TXGlobal network?

a. successful account logon events

b. failed account logon events

c. successful object access events

d. failed object access events

 

7. Which of the following types of certification authority (CA) should be used to issue digital certificates to users and computers on the VisionWorx network?

a. a stand-alone root CA

b. a third party CA

c. an enterprise root CA

d. an enterprise subordinate CA

 

8. Which of the following technologies should be used on the Windows 2000 RRAS servers on the TXGlobal network to protect the RRAS servers and the rest of the TXGlobal network from malicious users on the Internet?

a. Packet filtering should be enabled on each Windows 2000 RRAS server's internal network interface.

b. Packet filtering should be enabled on each Windows 2000 RRAS server's Internet interface.

c. Domain Name System Dynamic Update (DDNS) should be enabled on each Windows 2000 RRAS server's internal network interface.

d. DDNS should be enabled on each Windows 2000 RRAS server's Internet interface.

 

Answers:

1) Only choices b and d are correct. Of the choices listed, the two primary security risks to the VisionWorx and TXGlobal networks are that the XRay_Man folder and the data on the portable Windows 2000 Professional computers will be accessed by unauthorized users. The XRay_Man folder is shared by the TXGlobal Manufacturing department and the VisionWorx Manufacturing department. Because the XRay_Man folder contains proprietary information, it must be secured. In Windows 2000, the files in a folder can be secured in a variety of ways including share permissions, NTFS permissions and EFS. VisionWorx Marketing representatives store manufacturing and research data on their portable Windows 2000 Professional computers. If a portable Windows 2000 Professional computer were to be either accessed by an unauthorized person or stolen, then the sensitive data stored on it could be compromised. Files on the portable Windows 2000 Professional computers should be encrypted with EFS. The VisionWorx employees need to change advertisements on the VisionWorx Web site, and the TXGlobal engineers must design a new chemical compound for the X-Ray Vision contact lens. However, neither of these activities poses a significant security risk for the VisionWorx Windows 2000 network or the TXGlobal Windows 2000 network.

Reference: W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Choosing Security Solutions That Use Public Key Technology," "How to Choose Appropriate Security Solutions." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Authentication," "Basic Concepts of Authentication." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Choosing Security Solutions That Use Public Key Technology," "Network Security Solutions." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to Encrypting File System."

2) Choice a is correct. The VisionWorx Marketing representatives should use the Encrypting File System (EFS) to encrypt the data that is stored on their portable Windows 2000 Professional computers. If a portable Windows 2000 Professional computer were accessed by an unauthorized person, then it would be unlikely that EFS-encrypted files could be accessed. EFS should only be used to encrypt files that will be accessed by one user. Files that will be accessed by multiple users should not be encrypted with EFS because an EFS-encrypted file can only be decrypted by the encrypting user, someone using the encrypting user's credentials, or an EFS recovery agent. Microsoft Point-to-Point Encryption (MPPE) is a data encryption method that is used to encrypt data on Point-to-Point Tunneling Protocol (PPTP) connections. MPPE uses the RSA RC4 stream cipher to encrypt data, and MPPE can use a 40-bit, 56-bit or 128-bit encryption key. Windows NT 4.0 only supports 40-bit MPPE encryption, so Windows 2000 MPPE provides 40-bit encryption for backward compatibility with down-level clients. The level of MPPE encryption that will be used on a Virtual Private Network (VPN) connection is negotiated as the link is being established. MPPE is not used to encrypt data that is stored on a hard disk. PPTP with MPPE could be used to create the VPN connection between the VisionWorx network and the TXGlobal network; however, a Layer Two Tunneling Protocol (L2TP) over Internet Protocol security (IPSec) connection would be more secure. Point-to-Point Protocol (PPP) is used to establish a remote access dial-up connection. Neither PPP nor PPTP can encrypt files.

Reference: W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "Features of EFS." W2KSRK, Contents, "Internetworking Guide," "Remote Access," "Virtual Private Networking," "VPN Security," "PPTP Connections."

3) Choice b is correct. EAP is the only listed choice that enables third-party authentication modules to be used for logon. Because the VisionWorx Marketing representatives must use portable cameras and third-party software for retinal scan authentication to remotely log on to the VisionWorx network, EAP should be used. CHAP is an authentication protocol that can be used to authenticate users on a PPP connection. CHAP uses MD5 to encrypt the response to the challenge when authenticating users. MS-CHAP is similar to CHAP, but MS-CHAP uses MD4 to encrypt the response to the challenge. PAP is a down-level authentication protocol that transmits usernames and passwords in clear text. CHAP, MS-CHAP and PAP cannot support third-party authentication software.

Reference: W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Distributed Security," Authenticating All User Access," "Remote Access." W2KSRK, Contents, "Internetworking Guide," "Remote Access," "Internet Authentication Service," "IAS Authentication," "Authentication Methods."

4) Choice d is correct. Global groups normally contain users that need to have the same access to network resources. Only users from the same Windows 2000 domain can be placed in a global group. Domain local groups are granted access to resources in the domain where they reside; however, domain local groups can contain users and groups from any domain in the Windows 2000 forest, trusted forests or trusted down-level domains. Therefore, VisionWorx employees should be placed in global groups, which should be placed in domain local groups that have been granted access to resources on the VisionWorx network. Placing individual user accounts in universal groups is not a recommended practice because frequent changes may need to be made to universal group membership. Each time a membership change is made to a universal group, the change must be replicated to all the domain controllers in the forest, which can produce considerable replication traffic. Universal groups should normally contain only global groups and user membership should only be changed at the global group level; these practices will confine the replication traffic to the Windows 2000 domain where the global group resides. Additionally, granting individual users access to resources is not a recommended practice because the administrative effort needed to manage resource access permissions is much greater than when users are grouped and only the access permissions for group objects needs to be managed.

Reference: W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Distributed Security," "Applying Access Control," "Security Groups." W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Determining Domain Migration Strategies," "Planning Domain Upgrade," "Examining Windows 2000 Groups."

5) Choice d is correct. The following diagram represents the NTFS permissions that should be assigned on the XRay_Man folder:

d)network configuration diagram

The "No Access" column in the exhibit indicates that no permissions should be assigned. Although a No Access permission existed in Windows NT 4.0, this permission has been renamed as Deny in Windows 2000.

The VisionAdmin group should be granted Full Control permission to the XRay_Man folder because the VisionAdmin group needs to change permissions on the XRay_Man folder; this capability is provided by the Full Control permission. Members of the TXAdmin group do not need to access the files in the X-Ray Man folder, so they should not be granted permission to access the XRay_Man folder. Members of the VisionMan group and the TXMan group need to store files in the XRay_Man folder and change the files that are stored in the XRay_Man folder; because the Modify access permission provides these capabilities, the TXMan group and the VisionMan group should be granted Modify permission to the XRay_Man folder. Members of the VisionMark group and the TXMark group need to read information in the XRay_Man folder, so that they can produce advertising materials; therefore, the VisionMark group and the TXMark group should be granted Read permission to the XRay_Man folder. Because the VisionRes and TXRes groups do not need to access files in the XRay_Man folder, they should not be granted access permission to the X-Ray Man folder.

Reference: W2KSOH, Contents, "Security," "Concepts," "Understanding Security," "Access Control," "Objects and object managers," "Folder permissions." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Access Control," "Rights," "Permissions."

6) Only choices a and b are correct. An administrator can track operating system events in Windows 2000 by using auditing. In Windows 2000, auditing must be enabled in a local security policy or in a group policy. Auditing must then be enabled for each Active Directory object on which events must be tracked. An administrator must then view the security event log in the Windows 2000 Event Viewer to determine whether any audited events have been generated. If the TXGlobal IS manager audits account logon events, then the TXGlobal IS manager can determine if malicious users are attempting to log on to the TXGlobal network. If the Event Viewer displays successful account logon events from malicious users, then this indicates that malicious users are able to log on to the TXGlobal network. A series of failed account logon events for a particular user account may indicate that the TXGlobal Windows 2000 network is under attack by a malicious person.

Successful and failed object access events can be audited to determine which users are attempting to access Active Directory objects, such as files and folders. Successful object access events can help an administrator determine whether unauthorized users can access Active Directory objects. Failed object access events can help an administrator to determine whether unauthorized users have attempted to access Active Directory objects.

Reference: W2KSRK, Contents, "Internet Information Services 5.0 Resource Guide," "Security," "Using the Built-in Security Features of Windows 2000 Server," "Auditing in Windows 2000 Server." W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Distributed Security," "Managing Administration," "Auditing." W2KSOH, Contents, "Security," "Concepts," "Understanding Security," "Auditing Security Events."

7) Choice d is correct. An enterprise subordinate CA should be used to issue certificates to users and computers on the VisionWorx network. An enterprise subordinate CA requires an enterprise root CA to be configured on the network. An enterprise root CA has a self-signed certificate and is at the top of a CA hierarchy. An enterprise root CA uses its self-signed digital certificate to certify enterprise subordinate CAs in the CA hierarchy. Generally, an enterprise root CA should not be used to issue certificates to users and computers because doing so exposes the enterprise root CA to possible compromise. It is strongly suggested that any enterprise root CA be kept offline and stored in a vault or another physically secure area for added security. Enterprise CAs rely on Active Directory for authentication of requesting entities.

Stand-alone CAs are normally used to issue certificates to users and computers that cannot be authenticated through Active Directory, such as those on extranets or the Internet. A stand alone CA normally identifies a user who is requesting a digital certificate with credentials provided by the user, which can pose a security risk. If a stand-alone CA is configured to automatically issue certificates to users and computers, then it may issue digital certificates to malicious users. Because Windows 2000 provides the necessary functionality for issuing digital certificates to the users and computers on the VisionWorx network, a third party CA is not needed in this scenario.

Reference: W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Choosing Security Solutions that Use Public Key Technology," "Network Security Solutions," "Security with Encrypting File System." W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Your Public Key Infrastructure," "Deploying Your Public Key Infrastructure," "Install Certification Authorities." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Windows 2000 Certificate Services and Public Key Infrastructure," "Major Components of the Public Key Infrastructure." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Windows 2000 Certificate Services and Public Key Infrastructure," "Major Components of the Public Key Infrastructure," "Windows 2000 Certificate Services." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Windows 2000 Certificate Services and Public Key Infrastructure," "Features of the Public Key Infrastructure," "Certification Authority Trust Model."

8) Choice b is correct. Packet filtering should be enabled on the Internet interfaces of the Windows 2000 RRAS servers to protect the RRAS servers and the rest of the TXGlobal network from malicious users on the Internet. Packet filtering can be configured to allow only IP packets from specified TCP ports or IP packets from specified IP addresses to pass through a network interface. The TXGlobal administrators could use packet filtering on the RRAS servers to accept packets only from authorized VPN clients. If IP packet filtering is configured on the Internet interfaces of the Windows 2000 RRAS computers, then IP packets from malicious users are less likely to enter the RRAS servers than if port filtering were not enabled on the Internet network interfaces. If packet filtering were configured only on the RRAS servers' internal network interfaces, then the RRAS servers would be exposed to malicious users on the Internet because IP packets from malicious users would be allowed to enter the RRAS computers. DDNS enables DNS clients to dynamically register changes with DNS servers. DNS dynamic update is not normally used to protect a network from attacks by malicious users.

Reference: W2KSRK, Contents, "Internetworking Guide," "Remote Access," "Virtual Private Networking," "VPNs and Firewalls." W2KSOH, Contents, "Virtual Private Networks," "Concepts," "Understanding Virtual Private Networks," "VPN Security," "Packet Filtering." W2KSOH, Contents, "Networking," "DNS," "Concepts," "Understanding DNS," "Dynamic update."

These questions and answers are provided by Transcender LLC. Order the full version of this exam simulation online at www.transcender.com, phone 615-726-8779, 8 a.m. - 6 p.m., (CST), M - F, fax 615-726-8884, or mail to Transcender LLC, 565 Marriott Drive, Suite 300, Nashville, TN 37214.


More Pop Quiz:


There are 4 CertCities.com user Comments for “Microsoft Exam 70-220: Designing Security for a Windows 2000 Network”
Page 1 of 1
1/28/02: Eric says: This is one of the best written practice exams I have ever read.
7/8/02: zeus says: O.K. so why does ms strictly recomend that enterprise CA's not be taken offline? Only stand alone should be offline.
1/6/03: Jesus Everloving Christ says: This was actually a damned easy test. Wonder if I should have even bothered to buy the book!
4/16/04: Steve from Canada says: This is a very realistic sample of microsoft's exam layout for the 220 design exam...too bad there aren't alot more examples to practice on.
Your comment about: “Microsoft Exam 70-220: Designing Security for a Windows 2000 Network”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

top


Sponsored Links
Work Smarter with Citrix Education
Learn how to maximize the performance of your IT environment
Get 25% Off Certification Practice Exams
Introductory offer at SybexTestsuccess.com through November
Capella U. IT career with a degree online.
Click here to learn about our many specializations



Home | Microsoft® | Cisco® | Oracle® | A+/Network+" | Linux/Unix | MOS | Security | List of Certs
Advertise | Contact Us | Contributors | Features | Forums | News | Pop Quiz | Tips | Press Releases | RSS Feeds RSS Feeds from CertCities.com
Search | Site Map | Redmond Media Group | TechMentor Conferences | Tech Library Webcasts
This Web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc., Microsoft Corp., Oracle Corp., The Computing Technology Industry Association, Linus Torvolds, or any other certification or technology vendor. Cisco® and Cisco Systems® are registered trademarks of Cisco Systems, Inc. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corp. Oracle® is a registered trademark of Oracle Corp. A+®, i-Net+T, Network+T, and Server+T are trademarks and registered trademarks of The Computing Technology Industry Association. (CompTIA). LinuxT is a registered trademark of Linus Torvalds. All other trademarks belong to their respective owners.
Reprints allowed with written permission from the publisher. For more information, e-mail
Application Development Trends | Campus Technology | CertCities.com | The Data Warehousing Institute
E-Gov | EduHound | ENTmag.com | Enterprise Systems | Federal Computer Week | FTPOnline.com | Government Health IT
IT Compliance Institute | MCPmag.com | Recharger | Redmond Developer News | Redmond
Redmond Channel Partner | TCPmag.com | T.H.E. Journal | TechMentor Conferences | Visual Studio Magazine | VSLive!
Copyright 1996-2007 1105 Media, Inc. See our Privacy Policy.
1105 Redmond Media Group