Chapter 9: Exam 70-298 Prep and Practice
You will need plenty of planning and design experience to pass the exam. This
design will be based on your skills in analyzing the given information in a case
study. You’ll need to review the Study Guide closely and focus on any areas with
which you are unfamiliar. This section provides a numbered list of exercises that
you can follow to gain experience in the exam’s subject areas. Performing the
exercises will be useful to help to ensure that you have plenty of planning and
design experience with all areas of the exam.
The exam tests your planning and design skills instead of any hands-on skills. The
case scenarios presented in the exam will require you to have an in-depth knowl-
edge of Windows Server 2003 technologies and how they can be applied when
you are creating a design for an Active Directory-based network infrastructure. It
is not bad idea, however, to have a Windows XP Pro client computer and
Windows Sever 2003 enterprise server test network just in case you need to prac-
tice a few hands-on skills.
Before you take Exam 70-298, we strongly recommend that you
review key features of Windows Server 2003 Active Directory and
the network services that you studied while preparing for the four
core exams. The companion book MCSE Core Required Exams in a
Nutshell, Third Edition, by William Stanek (O’Reilly), covers all
four core exams.
In addition to understanding the material in Chapter 8 and in the “Exam 70-298
Highlighters Index” later in this chapter, you should also be experienced in the
network and Windows Server 2003 technologies and applications that are
discussed in the next sections.
1. Understand the differences between a router, Ethernet switch, firewall, NAT
device, IP filtering, and VPNs.
2. Given a particular business scenario and requirements, understand which
device or feature is most appropriate to segment network traffic.
Encryption and Authentication
1. Understand the two different types of cryptographic encryption—symmetric
and asymmetric—and when each should be used.
2. Understand the difference between encryption and authentication, and which
cryptographic technology supports which cryptographic features.
3. Understand which key is used when in asymmetric encryption and
4. Understand which Microsoft technologies use encryption and authentication.
5. Understand what is Federal Information Processing Standard (FIPS) is and
why it is required in some environments.
6. Know the difference between one-factor, two-factor, and multi-factor