| 1.
|
Describe various data risks. (I)
|
| 2.
|
Identify potential threats against network security. (I)
|
| 3.
|
Summarize how key technologies within Windows 2000 are used to secure
a network and its resources. (II)
|
| 4.
|
Plan secure local and remote administrative access to a network. (III)
|
| 5.
|
Design account policies for user accounts. (IV)
|
| 6.
|
Plan account creation and location. (IV)
|
| 7.
|
Evaluate security requirements and configurations. (V)
|
| 8.
|
Describe file and print resources. (VI)
|
| 9.
|
Identify various backup and restore procedures. (VI)
|
| 10.
|
Assess network for potential risks to data. (VII)
|
| 11.
|
Design a strategy for securing network access to non- Microsoft
clients. (VIII)
|
| 12.
|
Design a secure network for various remote users. (IX)
|
| 13.
|
Differentiate between a private and public network. (X)
|
| 14.
|
Plan and design a secure connection between two remote networks. (X)
|
| 15.
|
Analyze possible threats to a network when connected to the Internet.
(XI)
|
| 16.
|
Determine which computers, protocols and users are allowed access to
the Internet. (XII)
|
| 17.
|
Summarize methods to extend a network to other trusted partner
organizations. (XIII)
|
| 18.
|
List and describe the basic components of a Public Key Infrastructure
(PKI). (XIV)
|
| 19.
|
Summarize certificate use and their life cycle. (XIV)
|
| 20.
|
Design and maintain a security plan. (XV)
|
|