The Microsoft exam 70-298 measures an individual’s ability to design security for a Microsoft Windows Server 2003 network. Before taking the 70-298 exam, you should practice the following:
- Plan security templates based on computer role.
- Configure registry and file system permissions, account policies, .pol files, audit policies, user rights assignment, security options, system services, restricted groups, and event logs.
- Deploy security templates by using Active Directory-based Group Policy objects (GPOs) and by using command-line tools and scripting.
- Troubleshoot security template problems in a mixed operating system environment.
- Troubleshoot security policy inheritance and removal of security template settings.
- Plan and configure security settings and software restriction policies.
- Plan network zones for computer roles and security for infrastructure services including DHCP and DNS.
- Plan and configure auditing and logging for a computer role.
- Analyze security configuration by using tools such as Microsoft Baseline Security Analyzer (MBSA), the MBSA command-line tool, and Security Configuration and Analysis.
- Plan the deployment of service packs and hotfixes. For example, evaluating the applicability of service packs and hotfixes, testing the compatibility of service packs and hotfixes for existing applications.
- Plan patch deployment environments for both the pilot and production phases, batch deployment of multiple hotfixes, and rollback strategy.
- Assess current patch levels by using the MBSA GUI tool and MBSA command-line tool with scripted solutions.
- Deploy service packs and hotfixes on new and existing servers and client computers.
- Plan IPSec deployment such as choosing IPSec mode, authentication methods for IPSec, and test the functionality of existing applications and services.
- Configure IPSec authentication and appropriate encryption levels.
- Configure the appropriate IPSec protocol such as Authentication Header (AH) and Encapsulating Security Payload (ESP).
- Configure IPSec inbound and outbound filters and filter actions.
- Deploy IPSec policies by using Local policy objects or Group Policy objects (GPOs).
- Deploy IPSec policies by using commands and scripts. Tools include IPSecPol and NetSh.
- Monitor IPSec policies by using IP Security Monitor and Configure IPSec logging.
- Troubleshoot IPSec certificates including enterprise trust policies and certificate revocation list (CRL) checking.
- Plan the authentication and encryption methods for a wireless network.
- Plan wireless access policies and configure wireless encryption.
- Install and configure wireless support for client computers.
- Configure SSL for secure communication.
- Install certificates for SSL and Renew certificates.
- Configure authentication for secure remote access. Authentication types include PAP, CHAP, MS-CHAP, MS-CHAP v2, EAP-MD5, EAP-TLS, and multifactor authentication that combines smart cards and EAP.
- Configure and troubleshoot virtual private network (VPN) protocols including Internet service provider (ISP), client operating system, network address translation devices, Routing and Remote Access servers, and firewall servers.
- Manage client configuration for remote access security by using tools such as remote access policy and the Connection Manager Administration Kit.
- Plan, configure, and troubleshoot trust relationships.
- Plan and configure authentication protocols, multifactor authentication, authentication for Web users, delegated authentication.
- Decide which types of groups to use and plan security group scope and nested group structure.
- Configure access control lists (ACLs).
- Plan and troubleshoot the assignment of user rights and plan requirements for digital signatures.
- Install and configure root, intermediate, and issuing certification authorities (CAs). Considerations include renewals and hierarchy.
- Configure certificate templates and archival and recovery of keys.
- Configure, manage, and troubleshoot the publication of certificate revocation lists (CRLs).
- Deploy and revoke certificates to users, computers, and CAs.
- Back up and restore the CA.