This specific ISBN edition is currently not available.View all copies of this ISBN edition:
Test Yourself Practice Exams provide broad exposure to exam style questions and exam objectives to build knowledge and testing confidence. It provides clear and in-depth answers, and an A-Z quick review of all official exam topics.
"synopsis" may belong to another edition of this title.
There are three phrases that describe this book accurately:
Well Written. As with most books in the vastly underappreciated Syngress series, the writing is a wonderful mixture of clarity and readability. Not that it's a day at the beach, by any stretch (this is a certification book, after all), but the Study Guide walks you with ease through the various issues that are involved in high-level Windows 2000 security. The sections on the political, organizational, and emotional sides of security are particularly worthwhile; you'll learn how IT security strategies must be shaped by the pressures from both upper management and the everyday user to be effective. The chapters on Active Directory planning and EFS are good from a technology standpoint, and illustrate the various approaches that one can take when using these two new Microsoft features.
Challenging. The multiple-choice questions probably are just a shade less difficult than what you'll find on the actual exam; but, to simulate the often complex (and much-feared) "scenario" questions that Microsoft has loved to throw out recently, there are also lab questions at the end of every chapter that give real-world business scenarios and ask you what you'd do to solve them. These questions tend to be rough, particularly near the end of the book, and they should prepare you quite nicely for the exam. The wealth of ExamSim questions also adds value.
Poorly Organized. Unfortunately, the Achilles heel of this book is the fact that, instead of making its own way, it follows the Microsoft test objectives chapter by chapter, which leads to a scattered and disjointed feel. The book skips from topic to topic, repeats certain ideas numerous times over the course of several sections, and brings up important topics only once or twice. For example, instead of detailing the security issues that are involved in, say, remote salesmen having to dial in to a Windows 2000 network all in one place, the Study Guide details the laws, regulations, and personnel issues of remote users in chapter 3; dialup permissions in chapter 4; laptop group policies in chapter 6; EFS hard-drive security strategies in chapter 8; and VPNs, which barely are mentioned until you're all the way through chapter 11. Almost every security issue is split and diced finely throughout the book.
If you already have hands-on experience with security issues, no doubt you'll be able to assemble these disparate topics into a coherent whole. But, if you're new to security and aren't quite sure how things mesh, you could be knocked off balance by a simple question like, "What are the security measures you need to take when hosting a Web site?"
This is a solid book that's marred notably, because it adheres too closely to the Microsoft curriculum. If you have experience with security already, or approach networking from a feature-based line of thought, this could prove a fine guide for you. But, if you're new to security, or tend to think in the larger picture instead of in individual functions, you might want to look elsewhere. --William SteinmetzFrom the Back Cover:
Exclusive "Exam Watch" features point out the most frequently missed questions - and how to answer them correctly
Answers provide in-depth explanations - and show why the incorrect choices are wrong, as shown below:A high-level executive of your company has resigned. Two weeks after his departure, the VP of Sales comes to you and asks for permission to access the former executive's network folders on your Windows 2000 network because some important documents are there. How can this be accomplished?
A. Log on as the former executive and choose Transfer Ownership
B. Log on as Administrator and choose Grant Ownership
C. Log on as the VP of Sales and choose Take Ownership
D. Log on as Administrator and choose Modify Owner
D. If the former executive had the folders secured, the only way to gain access to them is to Modify Owner. This is similar to the Take Ownership permission in previous versions of Windows NT. Once you have taken ownership, you can modify the permissions on the folder(s) to grant access to others.
A is not correct. You cannot give or transfer ownership of an object in Windows 2000. This prevents someone from making unauthorized changes and then falsely assigning ownership of the object. B is not correct. There is a permission called Modify Owner but not Grant Ownership in Windows 2000. C is not correct. The VP of Sales would have to be given permission to Modify Owner. This permission is typically only granted to network administrators. However, the permission would not be called Take Ownership, as that permission was used in Windows NT 4.0 and earlier.
"About this title" may belong to another edition of this title.
Book Description The McGraw-Hill Company. Condition: New. pp. 382. Seller Inventory # 5776839
Book Description MGH, 2000. Paperback. Condition: New. Seller Inventory # KSK-9780072129304
Book Description McGraw-Hill Osborne Media, 2000. Condition: New. book. Seller Inventory # M0072129301
Book Description McGraw-Hill Companies, 2000. Paperback. Condition: New. Seller Inventory # DADAX0072129301