Vocab List - Module 2 Flashcards

Module 2

1
Q

it is an address family that is used to identify routing sessions for protocols that use standard IP version 4 address prefixes, such as BGP. In the IPv4 address family:
Unicast or multicast address prefixes can be specified.
Unicast routing information is advertised by default when a BGP peer is configured unless the advertisement of unicast IPv4 information is explicitly turned off.

A

IPv4 (Internet Protocol version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A new packet structure that has 128-bit source and destination IP addresses, which are four times larger than the current Ipv4. _______ also provides for a simplified header format and supports time-dependent traffic for use with voice and video that require specified bandwidth. _____ is also extensible to provide for additional headers if needed.

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is an older communication protocol used to interconnect clients and servers on a Novell NetWare operating system environment. _____ is a connectionless packet protocol that operates at the Network layer of communication. SPX is a transport layer protocol that sits on top of the IPX layer providing connection- oriented services between network nodes.

A

IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A physical line that devices use to send signals to the processor when they want to send or receive information.

A

IRQ (Interrupt Request Line)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This organization has the responsibility to coordinate all TCP/IP-related research projects.

A

IRTF (Internet Research Task Force)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is a network protocol that encapsulates storage device communication data into IP packets for transmission over an Ethernet connection allowing IP- connected hosts to access a Storage Area Network (SAN). iSCSI provides the benefits of a FC SAN without the cost of fibre channel hardware. Using Ethernet and iSCSI, you can create a very powerful, very fast SAN using off- the-shelf, commodity-grade Ethernet hardware such as Cat5/5e cabling and Ethernet switches.

A

ISCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is another alternative to traditional dial-up that can be used to connect to the Internet or to directly communicate with another computer connected to the ISDN network. ISDN is more common in Europe than in the U.S. ISDN can use regular telephone wiring, but must be connected to a special ISDN network.
Levels of ISDN service include:
BRI (Basic Rate Interface):
2 64-Kbps bearer (B) channels can transfer data up to 128 Kbps. Only one B channel is used during phone use.
1 16-Kbps delta (D) channel for connection control.
PRI (Primary Rate Interface):
23 B channels (each at 64 Kbps) for data transmission. 1 D channel (at 64 Kbps) for connection control.

A

ISDN (Integrated Services Digital Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intermediate System to Intermediate System (IS-IS) is an OSI-based link-state routing protocol.

A

IS-IS (Intermediate System to Intermediate System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A global organization created in 1992. Responsible for the internetworking technologies and applications of the Internet. It is also responsible for the further development of the standards and protocols that allow the Internet to function.

A

ISOC (Internet Society)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An ISP (Internet service provider) is a company that provides Internet access and other web related services.

A

ISP (Internet service provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A domain controller whose Knowledge Consistency Checker (KCC) establishes inbound intersite Connection objects for all bridgehead servers in a site.

A

ISTG (Intersite Topology Generator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A committee that has set most standards related to modems since the late 1980s.

A

ITU (International Telecommunications Union)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exchange 2007’s database engine is referred to as the Extensible Storage Engine (ESE). ESE is a transactional database that writes information into RAM memory and into a log file. Once it is in the log file, it will be written to disk.
There are a number of files used to store information:

A

.JRS file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A programming language designed to let programmers create applications for the Internet. Java applications do not depend on a particular operating system or hardware platform to run.

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Journaling is the ability to record and retain all communications in an organization.

A

Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).
Keepalive messages act as hello packets to ensure that routers are still responsive.

A

KCC (Knowledge Consistenc Checker)
Keepalive messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is an authentication encryption protocol designed to provide security for the initial logon process and service requests. Kerberos uses symmetric key cryptography, employs DES, and provides end-to-end security.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A privileged operating mode for the operating system files and processes that interact directly with the computer’s hardware.

A

Kernel mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A part of the Registry. Keys appear as folders in the Registry window and can contain subkeys and values.

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).

A

Knowledge Consistency Checker (KCC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

L2F is a VPN protocol which offers no data encryption.
L2F was combined with PPTP, creating L2TP. Support for IPSec was added, and the result is a very versatile, nearly universally interoperable VPN protocol that provides solid authentication and reliable data encryption.

A

L2F (Layer 2 Forwarding Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is (Layer 2 Tunneling Protocol) is the VPN protocol that typically employs IPSec as its data encryption mechanism.

It is the recommended VPN protocol to use on dial-up VPN connections.

A

L2TP (Layer Two Tunneling Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A group of closely located computers or peripherals connected so that they can interact with each other as a network.

A

LAN (Local area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A Data Link layer protocol called Link Access Procedure for Modems (LAPM) used by newer modems for error detection. LAPM is implemented in the modem hardware. LAPM is described by ITU’s V.42 standard.

A

LAPM (Link Access Procedure for Modems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

It is a VPN protocol which offers no data encryption.

A

Layer 2 Forwarding Protocol (L2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A ____________ operates at the Network layer reading the logical address and making forwarding and receiving decisions. Contrast this with most switches that operate at the Data Link layer which read the MAC address.

A

Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

It is the VPN protocol that typically employs IPSec as its data encryption mechanism. It is the recommended VPN protocol to use on dial-up VPN connections.

_______ was created by combining PPTP and L2F and adding in support for IPSec. The result is a very versatile, nearly universally interoperable VPN protocol that provides solid authentication and reliable data encryption.

A

Layer Two Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A ________________ distributes link-state information and defines the characteristics of an IS-IS router.

A

Layered Service Provider (LSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A lightweight protocol that clients such as Outlook Express use to look up and search for addresses in an online directory. It also allows a user to add, edit, and delete information from the directory.

A

LDAP (Lightweight Directory Access Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The period of time for which a dynamically assigned IP address remains valid for a DHCP client. Before the end of the lease, the client has to renew the lease or be assigned a new lease by DHCP.

A

Lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

__________ is the traditional method of backup for Exchange environments.

A

Legacy streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The way you pay to use an application or operating system. You can choose Per Server or Per Seat licensing for Windows 2000.

A

Licensing mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A lightweight protocol that clients such as Outlook Express use to look up and search for addresses in an online directory. It also allows a user to add, edit, and delete information from the directory.

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A service residing on a UNIX print server that receives print jobs from clients using the LPR utility.

A

Line Printer Daemon (LPD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

LPD/LPR is the most widely-used cross platform print protocol. LPD/LPR establishes connection between printing devices and workstations. LPD is usually loaded on the printing device. LPR is usually loaded onto the client workstation.

A

Line Printer Daemon/Line Print Remote (LPD/LPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

This utility obtains the status of a print queue on a host running the Line Printing Daemon (LPD) service.

A

Line Printer Queue (LPQ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A utility on a client that allows it to send print jobs to the Line Printer Daemon on the server.

A

Line Printer Remote (LPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A Data Link layer protocol called Link Access Procedure for Modems (LAPM) used by newer modems for error detection. LAPM is implemented in the modem hardware. LAPM is described by ITU’s V.42 standard.

A

Link Access Procedure for Modems (LAPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Routing algorithm in which each router broadcasts or multicasts information regarding the cost of reaching each of its neighbors to all nodes in the internetwork. Link state algorithms create a consistent view of the network and are therefore not prone to routing loops, but they achieve this at the cost of relatively greater computational difficulty and more widespread traffic (compared with distance vector routing algorithms). Compare with distance vector routing algorithm.
Linked mailboxes are used in environments in which there are multiple forests (known as resource forests). When a linked mailbox is created, a mailbox and a disabled user account are created in the forest which hosts the Exchange organization. Once the mailbox has been created, it is then linked or associated with a user account that resides in the second forest. In order to assign an account from the second forest to the mailbox, a trust relationship must exist between the domain that contains the Exchange server and the domain in which the user account resides.

A

Link state routing protocol
Linked mailbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Link-local Multicast Name Resolution (LLMNR) enables IP hosts to perform IP address-to-host name resolution without a DNS server. LLMNR is feature used in Zeroconf networking and is being developed by Microsoft.

A

Link-local Multicast Name Resolution (LLMNR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A popular (freely-distributable open source) operating system that runs on multiple hardware platforms.

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

In the OSI model, the Logical Link Control (LLC) layer is one of two sublayers of the Data-Link layer. The LLC manages traffic (flow and error control) over the physical medium.

A

LLC (Logical Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Link-local Multicast Name Resolution (LLMNR) enables IP hosts to perform IP address-to-host name resolution without a DNS server. LLMNR is feature used in Zeroconf networking and is being developed by Microsoft.

A

LLMNR (Link-local Multicast Name Resolution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

An ASCII text file that associates IP addresses to computer names outside the local subnet. In Windows 2000, the Lmhost file is located in systemroot
\System32\Drivers\Etc. You must manually update the LMHOSTS file.

A

LMHOSTS file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Load balancing is the capability of a router to distribute traffic over all of its network ports that are the same metric from the destination address.

A

Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A group of closely located computers or peripherals connected so that they can interact with each other as a network.

A

Local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Local Continuous Replication (LCR) is a cluster implementation which maintains a copy of the production storage group on a second set of disks that are connected to the same server using built-in asynchronous log shipping and log replay technology.

A

Local Continuous Replication (LCR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A Group Policy Object (GPO) stored on the local computer. Every Windows 2000 computer has exactly one local GPO.

A

Local GPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Groups used to provide users with permissions to access a network resource and to provide rights to perform system tasks.

A

Local group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Addresses in the 127.0.0.0 range are reserved to refer to the local host (in other words “this” host or the host you’re currently working at).

A

Local Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The local preference (type code 5) is a well-known discretionary BGP attribute that describes the preferred exit path from an AS. Local preferences are configured by assigning a number between 1 and 100; higher values representing higher preference over lower values.

A

Local preference attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A neighbor table contains a list of neighbors with which it has a BGP connection.
The USN of the local domain controller when an Active Directory update is made.

A

Local routing table
Local update sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

User name and password information stored in the directory database of the local computer.

A

Local user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A profile stored on a user’s local workstation.

A

Local user profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A text file that contains detailed information about the backup procedures you perform with Windows Backup. Other processes, such as the Performance Monitor, also generate log files.

A

Log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The process by which a user disconnects from a network and closes connections to mapped drives and printers.

A

Log off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The process by which a user gains access to a network by providing security credentials (usually a user name and password).

A

Log on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

In the OSI model, the Logical Link Control (LLC) layer is one of two sublayers of the Data-Link layer. The LLC manages traffic (flow and error control) over the physical medium.

A

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A script that executes when a user logs off.

A

Logoff script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A script that executes when a user logs on.

A

Logon script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A name for a file or folder that includes more characters than the standard MS- DOS 8.3 filename convention.

A

Long file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A reserved IP address, 127.0.0.1, that is used to perform loopback functions.

A

Loopback address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A mode of processing Active Directory-based Group Policy Objects (GPOs) in which computer-specific settings replace or take precedence over user-specific settings.

A

Loopback Processing Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

An Active Directory container that holds objects that no longer have a valid parent container. For example, this could happen if an object is created on one domain controller while simultaneously the object’s container is deleted or renamed on another domain controller.

A

LostAndFound container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A hard disk formatting process, usually performed by the disk manufacturer, that defines the basic physical structure of the disk. It runs a surface analysis to test the disk heads, defines sectors and assigns sector IDs, temporarily fills each sector, identifies bad sectors on the drive, and defines the interleave ratio.

A

Low-level disk formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A service residing on a UNIX print server that receives print jobs from clients using the LPR utility.

A

LPD (Line Printer Daemon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

LPD/LPR is the most widely-used cross platform print protocol. LPD/LPR establishes connection between printing devices and workstations. LPD is usually loaded on the printing device. LPR is usually loaded onto the client workstation.

A

LPD/LPR (Line Printer Daemon/Line Print Remote)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

This utility obtains the status of a print queue on a host running the Line Printing Daemon (LPD) service.

A

LPQ (Line Printer Queue)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A utility on a client that allows it to send print jobs to the Line Printer Daemon on the server.

A

LPR (Line Printer Remote)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A Layered Service Provider (LSP) distributes link-state information and defines the characteristics of an IS-IS router.

A

LSP (Layered Service Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A unique hardware address that is assigned to each device by the vendor. For example, a LAN adapter has a unique MAC address that is permanent to the adapter card.

A

MAC (Media Access Control) Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

MADCAP is a multicast addressing server, which provides multicast address allocation.

A

MADCAP (multicast addressing server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Madman.mib is the Management Information Base (MIB) for Simple Network Management Protocol (SNMP) Mail and Directory Management (MADMAN). Windows NT Performance Monitor counters are made available as MIB objects that can be monitored through SNMP.

A

MADMAN MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A DNS resource record that you can define in DNS. The MX records specify a mail exchanger for a domain name: a host that will either process or forward mail for the domain name.

A

Mail Exchanger (MX) record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Mailbox delivery queues only exist on Hub Transport servers in Exchange 2007. They hold messages for recipients whose mailbox data is stored on a Mailbox server within the same site as the Hub Transport server. More than one mailbox delivery queue can exist on a Hub Transport server.

A

Mailbox delivery queue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The Mailbox server in Exchange 2007 contains the mailbox and public folder databases. The Mailbox server role in Exchange 2007 supports multiple storage groups and multiple stores, making it possible to have up to 50 storage groups and up to 5 stores (databases) per storage group. The maximum number of stores on a single Exchange server is limited to 50.

A

Mailbox server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A mailbox-enabled user is an Active Directory user that has a mailbox that is hosted on one of the mailbox servers within an Exchange organization. A mailbox-enabled user can logon to the domain and access resources on the network according to the permissions and groups to which they are assigned. Mailbox-enabled users are the most common type of Exchange recipient.

A

Mailbox-enabled user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Mail-enabled contacts are used to make it easier for users within an Exchange organization to locate the contact details of people outside of your organization.

A

Mail-enabled contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A mail-enabled user is an Active Directory user the has an e-mail address associated with their account, but whose mailbox is stored on an external mail system. For example, a contractor who is working for the organization but is using their own e-mail address.

A

Mail-enabled user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Another name for virus, which is a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Management domains are the network subdivisions specified in the X.400 international messaging standard. Management domains include Administration Management Domains (ADMDs) and Private Management Domains (PRMDs).

A

Management domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A database containing the data gathered by SNMP agents which monitor network traffic and components.

A

Management Information Base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

A set of standard commands developed by Microsoft. Messaging services use these commands to communicate with other MAPI-compliant applications.

A

MAPI (Messaging Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Making an association between two different elements, such as computer names and IP addresses, drives and drive letters, and so on.

A

Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

The area of the hard disk containing the partition table for the drive and the specialized executable code necessary to boot the computer.

A

Master Boot Record (MBR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

The central connecting point for a token ring network.

A

MAU (Multistation Access Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

A hub or concentrator that connects a group of computers to a local area network in token ring topology.

A

MAU (Multi-station Access Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

The area of the hard disk containing the partition table for the drive and the specialized executable code necessary to boot the computer.

A

MBR (Master Boot Record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Message-Digest algorithm 5 (MD5) is a cryptographic authentication method that prevents unauthorized routing messages from unapproved sources in EIGRP.

A

MD5 (Message-Digest algorithm 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

MDBEF is the internal format for e-mail messages in Exchange. The Exchange directory database (Dir.edb) is based on (but not entirely identical to) the International Telecommunications Union’s X.500 directory recommendations.

A

MDBEF (Message Database Encoding Format)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

The MultiExist-Discriminator (MED) (type code 4) is an optional, nontransitive BGP attribute (also known as a metric) that communicates to neighbors the preferred path for information to be sent to them.

A

MED attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

In the realm of information technology, transmission media refers to the cables and wires through which signals (such as electric current or light impulse) are transmitted through a network.

A

Media (Transmission Media)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

A unique hardware address that is assigned to each device by the vendor. For example, a LAN adapter has a unique MAC address that is permanent to the adapter card.

A

Media Access Control (MAC) Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Use a media tester to make sure that a cable is unbroken and that all cables are connected to the correct pins inside the connector.

A

Media tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

An Windows 2000 Server computer that is not a domain controller. Member servers provide file and print services for the network.

A

Member server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Interleaving increases the rate at which data can be written to or read from a memory module by grouping data into contiguous blocks instead of dispersing data intermittently. The following components must be interleaving-enabled in order for interleaving to work:
Motherboard BIOS
Memory Module

A

Memory Interleaving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Mesh is a network topology that exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. This increases the network’s fault tolerance because alternate paths can be used when one path fails. Two variations of mesh topologies exist:
Partial Mesh–Some redundant paths exist.
Full Mesh–Every node has a point-to-point connection with every other node.
MDBEF is the internal format for e-mail messages in Exchange. The Exchange directory database (Dir.edb) is based on (but not entirely identical to) the International Telecommunications Union’s X.500 directory recommendations.

A

Mesh
Message Database Encoding Format (MDBEF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

In the Exchange 2007 messaging environment, messages are placed in queues as they wait to be sent. Queues are stored in an Extensible Storage Engine (ESE) databases which reside on Hub Transport servers. Exchange 2007 queues can hold up to a million messages, so in the event of a Hub Transport server failure, the database can be retrieved and mounted onto another Hub Transport server, at which point the queued messages will be sent to their recipients.

A

Message queue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Message-Digest algorithm 5 (MD5) is a cryptographic authentication method that prevents unauthorized routing messages from unapproved sources in EIGRP.

A

Message-Digest algorithm 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

A client access specification that enables clients to communicate with a messaging system. It is implemented as a subsystem in the Windows operating system. Microsoft and many other vendors support this standard.

A

Messaging Application Programming Interface (MAPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

A database containing the data gathered by SNMP agents which monitor network traffic and components.

A

MIB (Management Information Base)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A set of manageable objects representing various types of information about a network device, such as the number of active sessions or the version of the network operating system software that is running on a host.

A

MIBs (Management Information Bases)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

A company called Microcom introduced a series of standards for early modems that described error detection techniques. The standards were called MNP Class 2, Class 3, and Class 4. This standard became popular with several modem manufacturers

A

Microcom Network Protocol (MNP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

The part of the operating system that handles vital low-level processes. These include deferred procedure calls, first-level interrupt handling, thread scheduling, and so on.

A

Microkernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

A certificate server for issuing and administering in-house digital certificates that let you authenticate the identity of visitors to your Web sites. It also lets you enable SSL encryption.

A

Microsoft Certificate Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Microsoft Cluster servers are fault-tolerant servers that use two separate nodes.

A

Microsoft Cluster Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

A bulletin board sponsored by Microsoft. Check the MSDN for support information and downloadable code.

A

Microsoft Download Service (MSDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

The Exchange Management Console is the graphical administration tool. It is comprised of a three-paned view that includes a tree view, results, and an actions pane. It cannot perform many of the administrative tasks that can be performed in the Exchange Management Shell.

A

Microsoft Exchange Management Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Microsoft Exchange Management Shell (Windows PowerShell) is a command line environment designed for automating administration and maintenance. The Exchange Management Shell is the primary management interface of 2007.

A

Microsoft Exchange Management Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Microsoft Exchange Management Shell (Windows PowerShell) is a command line environment designed for automating administration and maintenance. The Exchange Management Shell is the primary management interface of 2007.

A

Microsoft Exchange PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

A store is a database of Microsoft Exchange information. There are two types of Exchange stores:
A Mailbox store holds the information that comprise mailboxes in Exchange 2007, such as data, data definitions, indexes, checksums, and flags. Sent and received e-mails are held in the mailbox store.
A Public Folder store holds information that can be shared by users. Messages posted to public folders are held in the public folder store.

A

Microsoft Exchange Public store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

A Microsoft Exchange storage group is a collection of Exchange stores (databases). A Recovery Storage Group (RSG) is a special storage group used for recovering Mailbox stores.

A

Microsoft Exchange recovery storage group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

A Microsoft Exchange storage group is a collection of Exchange stores (databases). A Recovery Storage Group (RSG) is a special storage group used for recovering Mailbox stores.

A

Microsoft Exchange storage group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

A store is a database of Microsoft Exchange information. There are two types of Exchange stores:
A Mailbox store holds the information that comprise mailboxes in Exchange 2007, such as data, data definitions, indexes, checksums, and flags. Sent and received e-mails are held in the mailbox store.
A Public Folder store holds information that can be shared by users. Messages posted to public folders are held in the public folder store.

A

Microsoft Exchange store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

An application that includes not only a Web browser but also a set of tools that integrates it with Microsoft Windows 95/98, NT, and 2000.

A

Microsoft Internet Explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

A Windows NT Server file and application server designed to host Internet sites. IIS is integrated with Windows 2000 Server.

A

Microsoft Internet Information Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

A common framework for a variety of Windows 2000 administrative tools. It provides no functionality of its own.

A

Microsoft Management Console (MMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A compact disc from Microsoft that contains information to help you administer and troubleshoot networks.

A

Microsoft Technet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

The Internet site that you can use to read information about Microsoft products or reach Microsoft support.

A

Microsoft Web site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

The process of transferring files, folders, and account information from a NetWare server to a Windows 2000 server.

A

Migration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

A measure of performance. Many computer companies use MIPS to measure the cost of computing. MIPS is also the name of a company that makes RISC processors.

A

Millions of Instructions Per Second (MIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

MIME’s primary purpose is allowing users to send attachments along with e- mail messages through the Internet. With MIME, you can use several different character sets, as well as binary data.

A

MIME (Multipurpose Internet Mail Extensions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

A measure of performance. Many computer companies use MIPS to measure the cost of computing. MIPS is also the name of a company that makes RISC processors.

A

MIPS (Millions of Instructions Per Second)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

A mirrored volume stores data to two duplicate disks simultaneously. It provides fault tolerance because if one disk fails, data is preserved on the other disk, and the system switches immediately from the failed disk to the functioning disk to maintain service. Mirrored volumes:
Provide fault tolerance. Data is available even if one disk in the set fails. Do not increase performance.
Require two disks.
Have a 50% overhead. Data is written twice, meaning that half of the disk space is used to store the second copy of the data.

A

Mirrored volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Mirroring is a data protection method. To mirror data is to duplicate and store it in a separate location.

A

Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

A common framework for a variety of Windows 2000 administrative tools. It provides no functionality of its own.

A

MMC (Microsoft Management Console)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

A NetBIOS node that provides support over TCP/IP. The M-node is a combination of B-nodes and P-Nodes. The default is to function as a B-node.

A

M-node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

A company called Microcom introduced a series of standards for early modems that described error detection techniques. The standards were called MNP Class 2, Class 3, and Class 4. This standard became popular with several modem manufacturers

A

MNP (Microcom Network Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

A modem is a device that modulates and demodulates signals being sent and received across transmission media (telephone wire). For example, computer data is in digital form, which must be converted to analog. To receive data, the modem reconverts the signal back to digital form.

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

A component that allows computers to use file and print resources on the network by routing requests to the correct redirector or provider.

A

MPR (Multiple Provider Router)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

The central connecting point for a token ring network.

A

MSAU (Multistation Access Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

A bulletin board sponsored by Microsoft. Check the MSDN for support information and downloadable code.

A

MSDN (Microsoft Download Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Multicast Source Discovery Protocol (MSDP) is a mechanism that connects multiple PIM-SM domains; allowing the discovery of multicast sources in other domains.

A

MSDP (Multicast Source Discovery Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

An online network sponsored by Microsoft. You can find answers to technical questions, read articles about Microsoft products, chat with other users, and much more.
A processing system for creating and distributing Web applications using Active Server Pages. It tracks unique transactions, and ensures that each component of a process must be completed in order for the transaction to succeed.

A

MSN (The Microsoft Network)
MTS (Microsoft Transaction Server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Multicast is a transmission method that transmits packets from a single device to a specific set of hosts. It is optimal for transmitting voice and video applications and streaming video.

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

MADCAP is a multicast addressing server, which provides multicast address allocation.

A

Multicast addressing server (MADCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

A range of multicast group IP addresses available to be leased to multicast clients by DHCP. Addresses are in the Class D address range – 224.0.0.0 to 239.255.255.255 – are reserved for use in IP multicasting.

A

Multicast scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Multicast Source Discovery Protocol (MSDP) is a mechanism that connects multiple PIM-SM domains; allowing the discovery of multicast sources in other domains.

A

Multicast Source Discovery Protocol (MSDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

The ability of a router to function using both static and dynamic routing. For example, you can configure a Windows 2000 computer with multiple network adapters and route between the two cards. Computers configured in this fashion are known as multihomed computers.

A

Multi-homed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Multihoming is the term used to describe an AS that has more than one connection to the Internet. If an organization performs multihoming with BGP, it is accomplished in one of the following ways:
Each ISP only passes a default route to the AS.
Each ISP only passes a default route and provider-owned specific routes to the AS.
Each ISP passes all routes to the AS.

A

Multihoming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

A replication model in which updates can be made to any of several domain controllers (masters). The master that receives the update then replicates its updates to other domain controllers. Windows 2000 uses this replication model.

A

Multi-master replication model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

In this Windows NT domain model, user accounts are distributed among more than one master domain and the domains communicate via trust relationships. In this model a user can log on from any domain because pass-through authentication sends the request to the user’s home domain. This model is typically used for large companies that want centralized administration. Each network user account is created in one of the master domains. Other domains in the network are resource domains, which are usually created at the department level.

A

Multiple master domain model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

A component that allows computers to use file and print resources on the network by routing requests to the correct redirector or provider.

A

Multiple Provider Router (MPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

A component that allows a remote computer to accept paths and filenames written in UNC format. The MUP keeps the UNC list so that the client computer does not have to rewrite the UNC names for each redirector on the network.

A

Multiple Universal Naming Convention Provider (MUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

A communications device that combines signals for transmission over a single transmission medium. A multiplexer is sometimes called a mux.
Multiprotocol BGP is an enhanced extension of BGP that has the ability to carry IP multicast routes.

A

Multiplexer
Multiprotocol BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

MIME’s primary purpose is allowing users to send attachments along with e- mail messages through the Internet. With MIME, you can use several different character sets, as well as binary data.

A

Multipurpose Internet Mail Extensions (MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

The central connecting point for a token ring network.

A

Multistation Access Unit (MAU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

A hub or concentrator that connects a group of computers to a local area network in token ring topology.

A

Multi-station Access Unit (MAU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

The central connecting point for a token ring network.

A

Multistation Access Unit (MSAU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

In multitasking operating systems, the processor is time-sliced across tasks, devoting a certain amount of processing time to each task. The processor then alternates between tasks until they have all been completed. This process occurs so rapidly that the computer appears to be working on multiple tasks at one time.

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

An operating system feature that allows more than one process to work at the same time. For example, Winnt32.exe can decompress and copy files at the same time, since each task is a separate thread.

A

Multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

A component that allows a remote computer to accept paths and filenames written in UNC format. The MUP keeps the UNC list so that the client computer does not have to rewrite the UNC names for each redirector on the network.

A

MUP (Multiple Universal Naming Convention Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

A DNS resource record that you can define in DNS. The MX records specify a mail exchanger for a domain name: a host that will either process or forward mail for the domain name.

A

MX (Mail Exchanger) record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

A mechanism that processes use to communicate with each other locally or remotely.

A

Named pipes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

A group of unique labels for objects in a shared computing environment. For example, the DNS database is a a tree structure called the domain namespace. Each domain (node) is named and can contain subdomains. The domain name identifies the position of the domain in relation to its parent domain. A group of contiguous names in such a structure constitutes a namespace.

A

Namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

The process of converting the IP addresses used in private network (such as an intranet) to Internet IP addresses. This increases the number addresses available within the the intranet without reducing the number of available Internet addresses.

A

NAT (Network Address Translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

An NonBroadcast MultiAccess (NBMA) network is a network that interconnects multiple routers but does not have broadcast capabilities (examples are Frame Relay, X.25, and ATM).

A

NBMA (NonBroadcast MultiAccess)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

A Microsoft utility that checks the state of current NetBIOS over TCP/IP connections. It also updates the LMHOSTS cache, and determines your registered name and scope ID. The utility is also used for troubleshooting and pre-loading the NetBIOS name cache.

A

NBTSTAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

A set of software rules that specify how protocols communicate with device drivers. All NDIS-compatible cards and drivers can communicate with each other without needing to use specifically tailored protocols.

A

NDIS (Network Device Interface Specification) 4.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

NDS lets you display a list of shared objects and servers in a NetWare network. The NDS tree shows the available resources as a hierarchical list.

A

NDS (NetWare Directory Services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Neighbor discovery/recovery is a mechanism that enables routers to dynamically learn about the other routers on their directly attached networks. Neighbor discovery/recovery:
Allows routers to know when neighbors become unreachable or inoperative.
Has low overhead.
Periodically sends and receives small hello packets to and from neighboring routers. If hello packets start to not be received from a particular router, neighbor discovery/recovery will assume that the router is not functioning.

A

Neighbor discovery/recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

This command accepts several command arguments that control functions such as logon, logoff, and resource connections.

A

NET command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

A protocol supported by all Microsoft products. It has a small stack size, excellent data transfer rates, and is compatible with all Microsoft networks. It cannot be routed, and it is not compatible with non-Microsoft networks.

A

NetBEUI (NetBIOS Extended User Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

A program that allows computers to share resources on a network. Each computer has a unique NetBIOS name that provides applications with a common set of commands for requesting the lower-level network services that are necessary to transmit information between network resources.

A

NetBIOS (Network Basic Input/Output System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

A utility that checks the state of current NetBIOS over TCP/IP connections. It is also used to update the LMHOSTS cache and determine your registered name and scope ID.

A

NetBIOS applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

A protocol supported by all Microsoft products. It has a small stack size, excellent data transfer rates, and is compatible with all Microsoft networks. It cannot be routed, and it is not compatible with non-Microsoft networks.

A

NetBIOS Extended User Interface (NetBEUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

The NetBIOS scope parameter is configured on the remote host. The scope ID must match the scope ID on your Microsoft clients or they will not be able to communicate with NetBIOS.

A

NetBIOS scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

A Win32 service that can share processes with other Win32 services. It is a service registered under the Services subkey in the Registry.

A

NetDDE (Network Dynamic Share)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Software that runs on the client computer and lets you play, start, and stop audio, illustrated audio (slide show), and full-motion video files.

A

NetShow Player

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

A Microsoft utility that displays the protocol statistics and the current state of TCP/IP connections.

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Networking software from Novell.

A

NetWare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

NDS lets you display a list of shared objects and servers in a NetWare network. The NDS tree shows the available resources as a hierarchical list.

A

NetWare Directory Services (NDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

A system group that is not used for network administration. It includes any user who is currently connected from another computer on the network to a shared resource on your computer.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

The process of converting the IP addresses used in private network (such as an intranet) to Internet IP addresses. This increases the number addresses available within the the intranet without reducing the number of available Internet addresses.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

A standardized set of physical and data link layer protocols that serve as the network’s foundation upon which other protocol layers can function.

A

Network architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

A program that allows computers to share resources on a network. Each computer has a unique NetBIOS name that provides applications with a common set of commands for requesting the lower-level network services that are necessary to transmit information between network resources.

A

Network Basic Input/Output System (NetBIOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

A set of software rules that specify how protocols communicate with device drivers. All NDIS-compatible cards and drivers can communicate with each other without needing to use specifically tailored protocols.

A

Network Device Interface Specification (NDIS) 4.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

A Win32 service that can share processes with other Win32 services. It is a service registered under the Services subkey in the Registry.

A

Network Dynamic Share (NetDDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

The network ID identifies the TCP/IP hosts that are located on the same physical network. Any hosts that are on the same physical network must be assigned the same network ID in order to communicate.

A

Network ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

The base of the Department of Defense (DOD) model. This layer has the responsibility to place frames on the wire and retrieve frames from the wire.

A

Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Layer 3 of the OSI reference model. This layer provides connectivity and path selection between two end systems. The network layer is the layer at which routing occurs. Corresponds roughly with the path control layer of the SNA model. See also application layer, data link layer, physical layer, presentation layer, session layer, and transport layer.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

A Windows troubleshooting tool. It monitors the information in frames which are transferred over the network to or from the local computer.

A

Network Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

A protocol that provides access to Internet newsgroups. It allows a client to read messages sent to newsgroups and makes it possible for hosts to replicate articles back and forth.
The unique number that the NWLink IPX/SPX protocol uses to identify a specific part of the network. Also called an external network number.

A

Network News Transfer Protocol (NNTP)
Network number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

A printer connected to the network and registered as a shared resource.

A

Network printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Protocols that allow computers to communicate with each other over a network. For example, AppleTalk and NetBEUI are network protocols.

A

Network protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

A Network Service Access Point (NSAP) is used to identify routers and build the topology table in IS-IS.

A

Network Service Access Point (NSAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

NTP is used to communicate time synchronization information between systems on a network.

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Network-Attached Storage (NAS) is another method of adding storage capacity to a network. A NAS system plugs directly into the network in the same way that workstations and other peripherals do. A NAS device is typically a pared down file server consisting of:
A RAID array with terabytes of storage space. A motherboard (logic board).
One or more network interface cards. Multiple interface cards allow you to perform adapter teaming.
A minimal network operating system.

A

Network-Attached Storage (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

A Windows NT file system that provides secure and robust file access. File and folder names can be up to 255 characters (long file names). Permissions can be assigned to individual files and folders. Windows 2000 updates NTFS with new features.

A

New Technology File System (NTFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

A client that uses NNTP to read postings in Internet newsgroups.

A

Newsreader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

The next-hop (type code 3) is a well-known mandatory BGP attribute that indicates the next-hop IP address that can be used to reach a destination.

A

Next-hop attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

A protocol that provides access to Internet newsgroups. It allows a client to read messages sent to newsgroups and makes it possible for hosts to replicate articles back and forth.

A

NNTP (Network News Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

A node is a device that acts as a connection point within a network. Nodes can be used for redistributing or forwarding data or providing services to other devices or programs. Node and host, in the network context, are often used interchangeably.

A

Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

The priority assigned to each computer (values between 0 and 8) in a token ring. Computers with higher priority levels get first rights to the token. Computers that perform critical network functions may need higher priority.

A

Node prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

A restoration method which uses the Backup utility to return the Active Directory database to the state it was in before the back up. Windows 2000 automatically performs a consistency check on and re-indexes the Active Directory database. It then updates Active Directory and File Replication service (FRS) with data from the server’s replication partners.

A

Nonauthoritative restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

An NonBroadcast MultiAccess (NBMA) network is a network that interconnects multiple routers but does not have broadcast capabilities (examples are Frame Relay, X.25, and ATM).

A

NonBroadcast MultiAccess (NBMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

A Group Policy Object (GPO) stored in Active Directory. Settings in a non-local GPO can be applied to users and computers throughout the network. Also called an Active Directory-based (GPO).

A

Non-local GPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

The part of operating system memory that remains in physical memory instead of being swapped into virtual memory.

A

Non-paged pool system memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

A system in which each application currently running a process voluntarily passes control of the CPU to another application between processes. Also called cooperative multitasking.

A

Non-preemptive multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Nontransit AS peering provides access to a single EBGP peer; excluding all other EBGP peers. This is optimal for scenarios in which a customer is connected to two ISP’s networks and wishes to have each ISP’s customers use their own connections for communication.

A

Nontransit AS peering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

A backup method that backs up selected files and folders, and marks their archive attributes.

A

Normal backup

202
Q

A Not So Stubby Area (NSSA) is similar to a stub area because it does not allow external ASBR routes, but it does allow ASBR routes that originate from within the area. These ASBR routes are flagged as Type 7 LSA packets (NSSA type LSA packets).

A

Not So Stubby Area (NSSA)

203
Q

Notification messages are transmitted when errors have been detected.

A

Notification messages

204
Q

A name service record that is placed in a DNS server.

A

NS (Name Service) record

205
Q

A Network Service Access Point (NSAP) is used to identify routers and build the topology table in IS-IS.

A

NSAP (Network Service Access Point)

206
Q

A Microsoft utility used to diagnose problems with DNS. Users can interact with the DNS server, and this utility can be used to display resource records on DNS servers, including UNIX DNS servers.

207
Q

A Not So Stubby Area (NSSA) is similar to a stub area because it does not allow external ASBR routes, but it does allow ASBR routes that originate from within the area. These ASBR routes are flagged as Type 7 LSA packets (NSSA type LSA packets).

A

NSSA (Not So Stubby Area)

208
Q

A Windows NT utility which checks the hardware installed on an Intel x86 computer before you begin installing Windows NT. This helps you prevent problems during installation.

A

NT Hardware Qualifier (NTHQ)

209
Q

A specialized environment that allows MS-DOS and Win16 applications to run under Windows NT.

A

NT Virtual DOS Machine (NTVDM)

210
Q

This program has the responsibility to pass hardware configuration information to the NTLDR program.

A

Ntdetect.com

211
Q

The NTVDM equivalent of the MSDOS.SYS in MS-DOS.

212
Q

An object in System Monitor which represents Directory Services and can be monitored to observe the performance of Active Directory.

A

NTDS Performance Object

213
Q

A partition formatted with the NTFS file system.

A

NTFS partition

214
Q

A Windows NT utility which checks the hardware installed on an Intel x86 computer before you begin installing Windows NT. This helps you prevent problems during installation.

A

NTHQ (NT Hardware Qualifier)

215
Q

The NTVDM equivalent to the IO.SYS in MS-DOS.

216
Q

The Windows NT operating system loader. During the startup phase, the pre- boot sequence locates the boot partition of the hard disk. NTLDR (the boot loader) is then loaded and initialized from the boot sector. This program switches the processor to the 32-bit flat memory mode, starts the appropriate minifile system, and reads the Boot.ini file.

217
Q

NTP is used to communicate time synchronization information between systems on a network.

A

NTP (Network Time Protocol)

218
Q

A specialized environment that allows MS-DOS and Win16 applications to run under Windows NT.

A

NTVDM (NT Virtual DOS Machine)

219
Q

The executable that emulates MS-DOS and manages an NTVDM. It runs in kernel mode.

220
Q

A discrete piece of information, such as a graphic, chart, or paragraph of text, that you can create in one application and link or embed into a file created in another application.

221
Q

A standard for embedding objects and text in electronic documents.

A

Object Linking and Embedding (OLE)

222
Q

A term used to describe 8 bits in an IP address. An IP address consists of a 4 octet address. An octet is separated by periods. The octet represents a decimal number in the range of 0-255 known as dotted decimal notation.

223
Q

On-Demand Routing (ODR) uses the Cisco Discovery Protocol (CDP) to transfer network information between routers. ODR makes it possible to find the following types of characteristics about neighboring devices:
Device type IP address
Cisco IOS version being run Network capabilities

A

ODR (On-Demand Routing)

224
Q

A company that uses parts of other company’s products to create its own products.

A

OEM (Original Equipment Manufacturer)

225
Q

A defragmentation method you perform manually using NTDSUTIL when the computer is not connected to the network. It rearranges the data in the Active Directory database, compresses the file, and creates a compact, new file.

A

Offline defragmentation

226
Q

Backup tapes stored at a location different from the business location.

A

Off-site storage

227
Q

An application programming interface (API) that lets COM applications access data from an OLE DB provider without regard to the data storage format of the provider. For example, the provider could be a database, a spreadsheet, or text files.

228
Q

Wireless networks require antennas for sending and receiving transmitted signals. An omni-directional antenna disperses a radio frequency wave in an equal 360-degree pattern. This type of antenna is used to provide access to many clients in a radius.

A

Omni-directional Antenna

229
Q

On-Demand Routing (ODR) uses the Cisco Discovery Protocol (CDP) to transfer network information between routers. ODR makes it possible to find the following types of characteristics about neighboring devices:
Device type IP address
Cisco IOS version being run Network capabilities

A

On-Demand Routing (ODR)

230
Q

A defragmentation method that the Extensible Storage engine performs automatically at regular intervals, following the garbage collection process. It rearranges the data in the Active Directory database, but does not compress the data or reduce the size of the database file.

A

Online defragmentation

231
Q

Backup tapes stored at the business location.

A

On-site storage

232
Q

The standard software interface you can use on any hardware or software platform to create high-quality graphics.

A

Open Graphics Language (OpenGL)

233
Q

The first message sent by each side of an established TCP session is an open message. Open messages exchange information on how to set up a session

A

Open message

234
Q

A routing protocol like RIP. This routing protocol periodically exchanges routes to known networks among dynamic routers. If a route changes, other routers are automatically informed of the change. Dynamic routing requires a protocol such as Open Shortest Path First.

A

Open Shortest Path First (OSPF)

235
Q

It includes the Application, Presentation, Session, Transport, Network, Data Link, and Physical layers, which correspond to the model created by the International Standards Organization (ISO).

A

Open Systems Interconnection (OSI) model

236
Q

The standard software interface you can use on any hardware or software platform to create high-quality graphics.

A

OpenGL (Open Graphics Language)

237
Q

The origin (type code 1) is a well-known mandatory BGP attribute used to describe the origination of information in transit.

A

Origin attribute

238
Q

A company that uses parts of other company’s products to create its own products.

A

Original Equipment Manufacturer (OEM)

239
Q

The domain controller on which an Active Directory update was originally made.

A

Originating domain controller

240
Q

An update to the Active Directory update that is made directly rather than through replication. For example, if BSmith’s password is changed on Server1 then replicated to Server2, the originating update was made on Server1.

A

Originating update

241
Q

The local USN of the domain controller on which an Active Directory update was originally made.

A

Originating update sequence number

242
Q

An electronic device that displays signal voltage information. You can use an oscilloscope to detect shorts, breaks, bends, or crimps in a network cable.
Oscilloscopes can also indicate attenuation problems (loss of signal power).
It includes the Application, Presentation, Session, Transport, Network, Data Link, and Physical layers, which correspond to the model created by the International Standards Organization (ISO).

A

Oscilloscope
OSI (Open Systems Interconnection) model

243
Q

A routing protocol like RIP. This routing protocol periodically exchanges routes to known networks among dynamic routers. If a route changes, other routers are automatically informed of the change. Dynamic routing requires a protocol such as Open Shortest Path First.

A

OSPF (Open Shortest Path First)

244
Q

Outlook Web Access (OWA) provides browser access to e-mail.

A

Outlook Anywhere

245
Q

The term used to describe information that is compartmentalized for transport across the network. For example, the IP protocol has a packet structure that contains the Source IP address, Destination IP Address, Protocol type, Checksum, data, and so on.

246
Q

A packet filtering firewall filters packets based on source and destination addresses, ports, and service protocols. This type of firewall uses ACLs or filter rules to control traffic. It operates at OSI layer 3 (Network layer), Offers high performance because it only examines addressing information in the packet header and it is subject to DoS and buffer overflow attacks.

A

Packet filtering firewall

247
Q

A TCP/IP utility that verifies TCP/IP is configured correctly and that another host is available.

A

Packet InterNet Groper (PING)

248
Q

A packet switched network allows data to be broken up into packets. Packets are transmitted along the most efficient route to the destination. Packet switching is ideal for transmitting data that can handle transmission delays, as is often the case with Web pages and e-mail.

A

Packet Switching

249
Q

A contiguous, fixed-length block of virtual addresses. It is copied from memory to disk and back during paging operations. Windows 2000 uses 4 KB blocks to map physical and virtual memory addresses. SQL Server allocates database space in 8K pages.

250
Q

A program that tells a printer how printed output should appear on a page. PostScript and TrueType are two different PDLs.

A

Page Description Languages (PDL)

251
Q

Pagefile.sys. A file on a hard disk that Windows 2000 uses to transfer information in and out of RAM and virtual memory. Also called a swap file or a virtual memory page file.

A

Paging file

252
Q

One of the less-secure protocols, where the username and password are sent in clear text for authentication increasing the chance of interception. PAP should be used only when no other form of authentication is supported. PAP protocols are supported by multiple platforms, including Microsoft and Linux.

A

PAP (Password Authentication Protocol)

253
Q

A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. In a partial mesh topology, some redundant paths exist.

A

Partial Mesh

254
Q

A replica that contains only selected attributes of objects on which a searches are likely to be performed. Partial replicas are read-only.

A

Partial replica

255
Q

A portion of the free space on a hard disk that you format with a file system. Partitions can be either primary or extended.
A partition can also refer to a division (part) of the Active Directory database. In this case, it is called an Active Directory partition or directory partition.

256
Q

Passive interfaces stop the routing process from participating out of a particular interface. The interface still listens and receives network traffic, but the interface does not participate, advertise, or generate any traffic for a given protocol. Passive interfaces are often used with protocol migration or redistribution.

A

Passive interface

257
Q

The process by which users log on to the network from computers or domains in which they have no account. Pass-through authentication allows a user with an account on one domain to access the entire network. Pass-through authentication can occur when a user logs on to a trusted domain or connects to a resource in a trusting domain.

A

Pass-through authentication

258
Q

A credential used to verify a user’s request to log on to the network. A password is associated with a user account name and both are used during the authentication process.

259
Q

One of the less-secure protocols, where the username and password are sent in clear text for authentication increasing the chance of interception. PAP should be used only when no other form of authentication is supported. PAP protocols are supported by multiple platforms, including Microsoft and Linux.

A

Password Authentication Protocol (PAP)

260
Q

A 32 or 64-bit bus providing compatibility with both 486 and Pentium machines. PCI buses:
Have a maximum throughput rate of 133 MB/s.
Are processor independent (the CPU and the PCI bus can process concurrently).
Use a divisor to synchronize the system bus speed and the PCI bus speed. Are most commonly 5V, but specifications provide for 3V and dual- voltage cards.
Can support ISA and EISA; however if PCI and ISA share a bus, then the use of one disables the other.
Are plug-and-play.
Are normally white plastic.
Are available in 64-bit as well as 32-bit. 64-bit PCI cards are often backwards compatible with 32-bit PCI slots.

A

PCI (Peripheral Component Interconnect)

261
Q

The PCI-X specification is a high-performance enhancement to the conventional PCI bus specification.
PCI-X has a maximum throughput rate of 1.06 GB/s.
PCI-X provides maximum clock frequencies of 266 MHz and 533 MHz increasing transfer rates up to 4.3 GB/s.
PCI-X 1.0 improved the efficiency of the PCI bus itself and the devices attached to it by providing new features such as split transactions and transaction byte counts.
PCI-X 2.0 adds additional features for systems reliability to minimize errors at high speeds and keep up with other advances made to such as RAID, Fiber Channel, and iSCSI architectures.
PCI-X is used primarily in server systems.

262
Q

A GSNW or CSNW utility that allows you to manage NetWare print servers from a Windows 2000 client computer.

263
Q

Any portable hand-held device used for computing.

A

PDA (Personal Digital Assistant)

264
Q

A PDC holds all security and account information for a Windows NT domain and is responsible to communicate all changes to the BDCs.

A

PDC (Primary Domain Controller)

265
Q

A program that tells a printer how printed output should appear on a page. PostScript and TrueType are two different PDLs.

A

PDL (Page Description Languages)

266
Q

PEAP (an extension of EAP) is one of the most effective wireless security solutions. PEAP provides authentication, including passwords. PEAP, provides the following two options:
PEAP-EAP-TLS. This method uses certificates (either on the local system or on a smart card).
PEAP-MS-CHAP v2. This method uses certificates on the server, but passwords on the client. Use this method when the client does not have a certificate.

A

PEAP (Protected Extensible Authentication Protocol)

267
Q

A network in which every computer on the network is equal in providing and requesting resources. These networks have no central administration and only share-level security.

A

Peer-to-peer network

268
Q

A licensing mode that requires you to buy a license for every client computer that will connect to resources on the server running Windows 2000.

A

Per seat licensing

269
Q

A licensing mode that requires you to buy a license for each server that will be running Windows 2000.

A

Per server licensing

270
Q

A 32 or 64-bit bus providing compatibility with both 486 and Pentium machines. PCI buses:
Have a maximum throughput rate of 133 MB/s.
Are processor independent (the CPU and the PCI bus can process concurrently).
Use a divisor to synchronize the system bus speed and the PCI bus speed. Are most commonly 5V, but specifications provide for 3V and dual- voltage cards.
Can support ISA and EISA; however if PCI and ISA share a bus, then the use of one disables the other.
Are plug-and-play.
Are normally white plastic.
Are available in 64-bit as well as 32-bit. 64-bit PCI cards are often backwards compatible with 32-bit PCI slots.

A

Peripheral Component Interconnect (PCI)

271
Q

An interpreted script language that includes UNIX facilities with C. It is faster and easier to code than other languages, but works best for small, limited applications.

A

PERL (Practical Extraction and Report Language)

272
Q

A virtual circuit that provides permanent access to the network like a permanent physical connection. Leasing a PVC is cheaper than leasing a permanent physical connection because the physical circuit is not dedicated to a single PVC and can be used to carry data from other virtual circuits.

A

Permanent Virtual Circuit (PVC)

273
Q

A static route entry or entry in a router that is stored in the registry. Static routes are stored in memory unless you specify through the Bp parameter that the route is persistent. When you restart a Windows 2000 computer, you will need to re- create all non-persistent routes.

A

Persistent route

274
Q

A personal area network is the interconnection of components, such as laptops, personal digital assistants, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters).

A

Personal Area Network (PAN)

275
Q

Any portable hand-held device used for computing.

A

Personal Digital Assistant (PDA)

276
Q

If you install Microsoft Internet Information Server on a computer running Windows 2000 Professional, it installs as Microsoft Personal Web Server (PWS). PWS is not a full Internet server, but you can use it to publish content on your local LAN, or to remotely administer an IIS server.

A

Personal Web Server (PWS)

277
Q

A list of the settings Dial-Up Networking uses to connect a client to a remote computer. The entry includes information such as the country code, area code, phone number, name of the remote computer, and so on.

A

Phonebook entry

278
Q

The lowest layer in the seven-layer OSI model that represents the hardware on a network. The physical layer is the adapter card and the physical media that transport protocols across the network.

A

Physical Layer

279
Q

A text file that contains the information Windows needs to run MS-DOS applications, such as the path and filename of the executable file.

A

PIF (Program Information File)

280
Q

Entering a secured building immediately behind another employee without authenticating yourself is a piggyback attack.

A

Piggyback attack

281
Q

Protocol Independent Multicast (PIM) is a very important multicast routing protocol that tells the router to ignore any Layer 3 protocol when making multicast-routing decisions (e.g. OSPF and EIGRP). PIM:
Uses the routing table that is populated by the unicast routing protocol in its multicast routing calculations.
Does not send routing updates between PIM routers.

A

PIM (Protocol Independent Multicast)

282
Q

PIM Dense Mode (PIM-DM) is a push method controlled by the source to push multicast information. PIM-DM:
Is used when there are many clients requesting the same multicast information.
Builds shortest-path trees by flooding multicast traffic domain wide, then prunes back the branches of the tree where no receivers are present.
Generally has poor scaling properties.

A

PIM Dense Mode (PIM-DM)

283
Q

PIM Source Specific Multicast (PIM-SSM) builds trees that are rooted in just one source. PIM-SSM:
Sources (S) transmit an IP datagram to an SSM destination address (G). Receivers can receive data by subscribing to channel (S,G).

A

PIM Source Specific Multicast (PIM-SSM)

284
Q

PIM Dense Mode (PIM-DM) is a push method controlled by the source to push multicast information. PIM-DM:
Is used when there are many clients requesting the same multicast information.
Builds shortest-path trees by flooding multicast traffic domain wide, then prunes back the branches of the tree where no receivers are present.
Generally has poor scaling properties.

A

PIM-DM (PIM Dense Mode)

285
Q

PIM Sparse Mode (PIM-SM) is a client-initiated pull method to get multicast information. PIM-SM:
Is used when there are few sources of information. Uses a shared tree.
Requires an RP to be defined.
Requires multicast sources and receivers to register with their local RP.

A

PIM-SM (PIM Sparse Mode)

286
Q

PIM Source Specific Multicast (PIM-SSM) builds trees that are rooted in just one source. PIM-SSM:
Sources (S) transmit an IP datagram to an SSM destination address (G). Receivers can receive data by subscribing to channel (S,G).

A

PIM-SSM (PIM Source
Specific Multicast)

287
Q

A TCP/IP utility that verifies TCP/IP is configured correctly and that another host is available.

A

PING (Packet Internet Groper)

288
Q

POTS refers to the telephone system. Early on, Internet connectivity was accomplished with a modem converting digital signals into analog for transmission via POTS. Newer, better, and faster methods are quickly replacing POTS as a signal transport medium.

A

Plain Old Telephone Service (POTS)

289
Q

A peer to peer protocol that uses NetBIOS over TCP/IP. The P-node uses a NetBIOS name server (NBNS) such as WINS to resolve NetBIOS names and does not use broadcasts. It will query the name server directly. All computers using P-node must be configured with the IP address of the NBNS. Computers can communicate as long as the NBNS is working.

290
Q

A protocol designed as an enhancement to the original SLIP specification. PPP is a data link protocol that provides a standard protocol for sending packets across a point to point network link.

A

Point to Point Protocol (PPP)

291
Q

A special resource record that is added to DNS to associate the IP addresses and the corresponding host name. Part of the administration of a DNS name server is ensuring that pointer records are created for hosts.

A

Pointer (PTR) record

292
Q

PPPoE is a variation of Point-to-Point Protocol (PPP) that sends PPP packets over an Ethernet network and an “always on” WAN link (DSL or cable modem, for example) rather than over a dial-up connection. In this way, Internet service providers can install PPP-based remote access servers and require remote clients to establish a connection before being granted access to the Internet. This

A

Point-to-Point Protocol over Ethernet (PPPoE)

293
Q

A protocol that allows a remote user to connect to the network over the Internet so that a company does not have to lease dedicated lines.
Poison message queues are used to isolate messages that contain potentially harmful errors caused by an Exchange 2007 system failure. This queue is only viewable in the case that such messages have been directed to the poison message queue. Delivery of all messages within the poison message queue is suspended. If a message is deemed unharmful, it will be passed to the submission queue. All other messages within the poison message queue are deleted.

A

Point-to-Point Tunneling Protocol (PPTP)
Poison message queue

294
Q

Using the split horizon with poison reverse method (also called poison reverse or route poisoning), routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).

A

Poison reverse

295
Q

A mail-drop protocol designed to work with clients that are not always connected to the network. It allows a mail server to receive mail messages and store them on a server until the client comes back on line and requests them.

A

POP3 (Post Office Protocol Version 3)

296
Q

Network ports are logical connections, provided by the TCP or UDP protocols at the Transport layer, for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine what protocol incoming traffic should be directed to. Some ICANN specified categories for ports are listed below:
Well Known – Port numbers range from 0 to 1023 and are assigned for specific protocols and services.
Registered – Port numbers range from 1024 to 49151 and are specifically assigned, by ICANN, for newly created network services.
Dynamic, Private, or High – Port numbers range from 49,152 to 65,535 and are assigned when a network service establishes contact and released when the session ends.

297
Q

A standard for versions of UNIX and UNIX-like operating systems. POSIX allows developers to create applications that meet certain US Federal standards.

298
Q

The first stage in the Windows NT boot process, during which the system checks to make sure all necessary hardware components and memory are in place and functioning correctly.

A

POST (Power On Self-Test)

299
Q

A mail-drop protocol designed to work with clients that are not always connected to the network. It allows a mail server to receive mail messages and store them on a server until the client comes back on line and requests them.

A

Post Office Protocol Version 3 (POP3)

300
Q

A programming language developed by Adobe that determines how a page will look when you print it.

A

PostScript

301
Q

POTS refers to the telephone system. Early on, Internet connectivity was accomplished with a modem converting digital signals into analog for transmission via POTS. Newer, better, and faster methods are quickly replacing POTS as a signal transport medium.

A

POTS (Plain Old Telephone Service)

302
Q

The first stage in the Windows NT boot process, during which the system checks to make sure all necessary hardware components and memory are in place and functioning correctly.
Users that can perform user functions on workstations and servers. They can also create user accounts and modify the accounts they have created. Power users can also add user accounts to the built-in groups Users, Guests, and Power Users.

A

Power On Self-Test (POST)
Power Users

303
Q

An open-standard microprocessor architecture that uses RISC instead of Intel x86 processors. IBM, Motorola, and Apple worked together to develop the PowerPC.

304
Q

A protocol designed as an enhancement to the original SLIP specification. PPP is a data link protocol that provides a standard protocol for sending packets across a point to point network link.

A

PPP (Point to Point Protocol)

305
Q

PPPoE is a variation of Point-to-Point Protocol (PPP) that sends PPP packets over an Ethernet network and an “always on” WAN link (DSL or cable modem, for example) rather than over a dial-up connection. In this way, Internet service providers can install PPP-based remote access servers and require remote clients to establish a connection before being granted access to the Internet. This lets Internet usage be better tracked and regulated. PPP over Ethernet automatically discovers the remote access server using broadcast messages.

A

PPPoE (Point-to-Point Protocol over Ethernet)

306
Q

A protocol that allows a remote user to connect to the network over the Internet so that a company does not have to lease dedicated lines.

A

PPTP (Point-to-Point Tunneling Protocol)

307
Q

An interpreted script language that includes UNIX facilities with C. It is faster and easier to code than other languages, but works best for small, limited applications.

A

Practical Extraction and Report Language (PERL)

308
Q

The ability of the Windows 2000 operating system to service multiple requests of the CPU by preempting a task to execute another task.

A

Preemptive multitasking

309
Q

A domain controller that can potentially be chosen as a bridgehead server.

A

Preferred bridgehead server

310
Q

Layer 6 of the OSI reference model. This layer ensures that information sent by the application layer of one system will be readable by the application layer of another. The presentation layer is also concerned with the data structures used by programs, and therefore negotiates data transfer syntax for the application layer. Corresponds roughly with the presentation services layer of the SNA model. See also application layer, data link layer, network layer, physical layer, session layer, and transport layer.

A

Presentation Layer

311
Q

A PDC holds all security and account information for a Windows NT domain and is responsible to communicate all changes to the BDCs.

A

Primary Domain Controller (PDC)

312
Q

An operations master that simulates a Windows NT 4.0 Primary Domain Controller (PDC). Also called a PDC Emulator master.

A

Primary Domain Controller (PDC) Emulator operations master

313
Q

The ID assigned to a specific user for auditing purposes. With the impersonation (or client) ID, this information tells a system administrator who is using which network functions.

A

Primary ID

314
Q

The partition of a hard disk that the operating system uses. One basic hard disk can have up to four primary partitions.

A

Primary partition

315
Q

In the Windows 2000 environment, the hardware that produces printed output (what the rest of the world calls a printer). When the term “printer” is used, it refers to the software interface between the operating system and the print device. The print devices are connected to print servers or client computers that have the correct printing software installed on it.

A

Print device

316
Q

A piece of software that translates the graphics commands in documents into a language the print device can understand.

A

Print driver

317
Q

A description of and location for a specific size of paper in a particular tray in the print device.

A

Print forms

318
Q

A component of the print spooler that controls access to and monitors the status of a specific print device.

A

Print monitor

319
Q

A special group of users that have been given the necessary rights to manage a printer or printers.

A

Print Operators

320
Q

Specific printing-related rights you assign to users. There are four levels of printer permissions that can be assigned, including Print, Manage Documents, and Manage Printers.

A

Print permissions

321
Q

A component of the print spooler that works in conjunction with a print driver to despool the spooled print jobs. Despooling is the process of reading the contents from a spool file and converting the print data into a format the print device can understand.

A

Print processor

322
Q

In the Windows 2000 environment, a list of print jobs waiting to be processed by the printer and printed by the print device. This terminology is a little different from other operating systems such as NetWare. In NetWare, the print queue is a directory on a server that holds print jobs waiting to be printed and has configurable properties and settings.

A

Print queue

323
Q

A component of the print spooler that receives print jobs from the remote print provider and routes them to the appropriate print processor.

A

Print router

324
Q

Software components that reside on the print server. They receive print jobs from clients and send them on to the spooler.

A

Print services

325
Q

A collection of DLLs that receive, process, schedule, and distribute print jobs. Every print job goes through the print spooler.

A

Print spooler

326
Q

In the Windows 2000 environment, the “printer” is the software interface between the operating system and the print device. The printer determines how a print job travels to the print devices. A single printer can send print jobs to multiple print devices. Multiple printers can send jobs to a single print device.

327
Q

An I/O port through which the printer and computer communicate.

A

Printer port

328
Q

A technique that helps you use the available resources more efficiently in a high traffic printing environment. In a printing pool, the print server directs new print jobs to the print device with the lightest load.

A

Printing pool

329
Q

The private (secret) member of a cryptographic key pair associated with a public key algorithm. The private key can be used to decrypt data that has been encrypted using the public key.

A

Private key

330
Q

ain A PRMD is a private company that controls an X.400 management domain.
These domains are the backbone for transferring electronic messages. PRMDs handle internal messages and communicate with each other through ADMDs.

A

Private Management Dom (PRMD)

331
Q

A LAN or WAN for private individual or group use which may or may not be secure. Examples include home and organization (small business, corporate,

A

Private Network

332
Q

A PRMD is a private company that controls an X.400 management domain. These domains are the backbone for transferring electronic messages. PRMDs handle internal messages and communicate with each other through ADMDs.

A

PRMD (Private Management Domain)

333
Q

Lets you run each application separately. This means that if one application fails, it can’t affect the other applications running on your server.

A

Process isolation

334
Q

The logic circuitry that responds to instructions and runs the computer. Also called a CPU (central processing unit).

335
Q

How long the processor queue is. A counter measures how many threads are requesting processor time at once.

A

Processor queue length

336
Q

A text file that contains the information Windows needs to run MS-DOS applications, such as the path and filename of the executable file.

A

Program Information File (PIF)

337
Q

The ability for an adapter card to view packets travelling across the network. A LAN adapter must support promiscuous mode if it is used to monitor network traffic.

A

Promiscuous mode

338
Q

The process of changing a Windows 2000 member server into a domain controller. The process transfers an up-to-date copy of the Active Directory database from a current domain controller to the new domain controller.

339
Q

PEAP (an extension of EAP) is one of the most effective wireless security solutions. PEAP provides authentication, including passwords. PEAP, provides the following two options:
PEAP-EAP-TLS. This method uses certificates (either on the local system or on a smart card).
PEAP-MS-CHAP v2. This method uses certificates on the server, but passwords on the client. Use this method when the client does not have a certificate.

A

Protected Extensible Authentication Protocol (PEAP)

340
Q

Conventions or rules for sending data across a network. These conventions may deal with content, format, timing, sequencing, and error control.

341
Q

Protocol Independent Multicast (PIM) is a very important multicast routing protocol that tells the router to ignore any Layer 3 protocol when making multicast-routing decisions (e.g. OSPF and EIGRP). PIM:
Uses the routing table that is populated by the unicast routing protocol in its multicast routing calculations.
Does not send routing updates between PIM routers.

A

Protocol Independent Multicast (PIM)

342
Q

Protocol stacks are installed and configured versions of protocols that connectors use to communicate. For example, the X.400 Connector uses TCP/IP, TP4/CLNP, and/or X.25.

A

Protocol stacks

343
Q

A Protocol-Dependent Module (PDM) is used by EIGRP to carry out the requirements specific to independent protocols. PDMs:
Operate completely independent of one another.

A

Protocol-Dependent Modules (PDM)

344
Q

A computer on the network that keeps a cache of resolved names and responds to queries for names outside the local subnet.

345
Q

A computer on the network that keeps a cache of resolved names and responds to queries for names outside the local subnet.

A

Proxy server

346
Q

The network you use when you make a typical telephone call. It is a worldwide, circuit-switched, analog network. Computers connect to the PSTN through a modem. The PSTN can be used on an on-demand (dial-up) basis or a circuit can be leased permanently as a dedicated line.

A

PSTN (Public Switched Telephone Network)

347
Q

A special resource record that is added to DNS to associate the IP addresses and the corresponding host name. Part of the administration of a DNS name server is ensuring that pointer records are created for hosts.

A

PTR (Pointer) record

348
Q

Public folders provide a simple and efficient way to collect, organize, and share Exchange 2007 collaborative applications such as calendars, contact lists, task lists, and message lists.

A

Public folder

349
Q

The public (non-secret) member of a cryptographic key pair associated with public key algorithm. When the public key is used to encrypt data, the corresponding private key is necessary to decrypt it.

A

Public key

350
Q

Also called PKI. The policies and software relating to digital certificates and public and private keys. It includes digital certificates and certification authorities the guarantee the identity the parties involved in an electronic transaction.

A

Public key infrastructure

351
Q

A large collection of unrelated computers, with each node on the network having a unique address. The Internet, for example, is a public network. Because computers are unrelated and many companies and individuals share the same communication media, the public network is by nature insecure.

A

Public Network

352
Q

The network you use when you make a typical telephone call. It is a worldwide, circuit-switched, analog network. Computers connect to the PSTN through a modem. The PSTN can be used on an on-demand (dial-up) basis or a circuit can be leased permanently as a dedicated line.

A

Public Switched Telephone Network (PSTN)

353
Q

In a pull feed, a computer connects to a host at scheduled times and requests any new information.

354
Q

A WINS server that pulls (requests) WINS database entries from its push partners. The pull partner pulls new WINS database entries by requesting entries with a higher version number than the last entry it received during the last replication from that push partner.

A

Pull partners

355
Q

A punch-down block is typically used in telephone wiring cabinets to connect individual strands of twisted pair wires. For example, the punch-down block connects the outside phone lines to inside extensions or phone plugs at the demark (where the local network ends and the telephone company’s network begins). You use a punch-down tool to attach wires to the punch down block.

A

Punch-down block

356
Q

In a push feed, the computer containing replicated information connects to its partners at specified intervals and uploads new information.

357
Q

A virtual circuit that provides permanent access to the network like a permanent physical connection. Leasing a PVC is cheaper than leasing a permanent

A

PVC (Permanent Virtual Circuit)

358
Q

RADIUS (Remote Authentication Dial-In User Service) is primarily used for pre-authenticating remote clients before access to the network is granted.
RADIUS maintains client profiles in a centralized database. It offloads the authentication burden for dial-in users from the normal authentication of local network clients. For environments with a large number of dial-in clients, RADIUS provides improved security, easier administration, improved logging, and less-performance impact on LAN security systems.
The primary benefit of RADIUS (Remote Authentication Dial-In User Service) can be summarized as centralized. RADIUS is a centralized database of user access profiles. User access profiles determine the rules and restrictions dial-in users must comply with to establish a dial-up link to the network. Only after satisfying the criteria enforced by RADIUS is a remote client granted access to the network.

A

RADIUS (Remote Authentication Dial-in User Service)

359
Q

A method of categorizing the use of multiple disks to provide performance enhancement and/or fault tolerance.

A

RAID (Redundant Array of Inexpensive Disks)

360
Q

With a given host name, the RARP request will discover the IP address on a network.

A

RARP (Reverse Address Resolution Protocol)

361
Q

A Windows NT service that you install on one of your network’s servers to allow clients to access your network remotely. The RAS software can manage up to 256 simultaneous remote connections.

A

RAS (Remote Access Service)

362
Q

A GSNW or CSNW utility that allows you to view and perform console functions on a remote NetWare system console.

363
Q

A Windows utility that you can use to restore the hard disk configuration and to update a Emergency Repair Disk.

364
Q

The process of a domain controller pulling updates from its replication partner as well as pushing updates to its replication partner. In comparison, each replication partner typically pulls updates from its partner.

A

Reciprocal replication

365
Q

Recomputation is the process of a router comparing routes in search for a new successor route. Recomputation occurs when a successor route to a destination goes down and there are no feasible successors for the destination.

A

Recomputation

366
Q

An entry in a DNS name server is known as a record.
In SQL Server, a record is a set of related fields (columns) of data joined as a unit. In a SQL database, it is more common to talk about rows and columns than records and fields.

367
Q

A file system driver that receives I/O requests for network resources and send the requests into the network. For example, a redirector redirects print jobs away from the client computer’s printer port and out to the network.

A

Redirector

368
Q

A RISC computer has a microprocessor that performs a small subset of instructions. This lets it process data more quickly.

A

Reduced Instruction Set Computing (RISC)

369
Q

Redundancy is the implementation of one or more backup components that perform duplicate functions. Redundancy:
Improves system performance.
Allows a system to keep functioning normally in the event of a component failure. Increases fault tolerance.

A

Redundancy

370
Q

A method of categorizing the use of multiple disks to provide performance enhancement and/or fault tolerance.

A

Redundant Array of Inexpensive Disks (RAID)

371
Q

Prefix for Registry data types REG_BINARY, REG_DWORD, REG_EXPAND_SZ, REG_MULTI_SZ, AND REG_SZ.

372
Q

A unified database in which Windows 2000 stores all hardware and software configuration information for the local computers.

373
Q

A Windows utility you can use to display, troubleshoot, and manually edit the contents of the registry.

A

Registry Editor

374
Q

A regular area (also known as nonbackbone area)does not allow traffic to pass through it. The regular area’s primary function is to connect users and resources.

A

Regular area

375
Q

Rehoming is the process of moving a public folder from one server to another.

376
Q

A collection of units of data stored in tables that represent a group of objects (for example, Empoyees, Products, or Customers). Columns in a table represent an attribute of the object (for example, an attribute of an Employee might be LastName, or an attribute of a Product might be shipping weight). Each row in a table represents a single instance of that kind of object (for example, the employee name Jane Smith or the part number 3Y557). Data from one table can be used to find related data in another.

A

Relational database

377
Q

Software used to store, update, and retrieve data. It has a client/server architecture, stores data in tables with rows (records) and columns (fields), defines and enforces relationships among data items, and uses some version of Structured Query Language (SQL).

A

Relational database management system (RDBMS)

378
Q

A relay domain is a domain for which a server accepts mail but is not authoritative.

A

Relay domain

379
Q

Reliable Transport Protocol (RTP) is used by EIGRP to deliver packets to neighboring routers in a guaranteed, ordered manner. RTP:
Supports intermixed transmission of unicast or multicast packets. Only reliably sends certain EIGRP packets.
Sends hello packets that contain an indicator as to whether or not the packet needs to be acknowledged by the recipient.
Ensures low convergence time by sending packets even when unacknowledged packets are pending.

A

Reliable Transport Protocol (RTP)

380
Q

administrators who manage servers at multiple location. Windows 2000 and Network and Dial-up Connections let users access networks remotely for such services as file and printer sharing, electronic mail, and database access.
Remote access is part of the integrated Routing and Remote Access service.
An Windows NT utility used to configure a RAS server. This utility can also be used to start a RAS server.

A

Remote Access Admin

381
Q

A Windows NT service that you install on one of your network’s servers to allow clients to access your network remotely. The RAS software can manage up to 256 simultaneous remote connections.

A

Remote Access Service (RAS)

382
Q

RADIUS (Remote Authentication Dial-In User Service) is primarily used for pre-authenticating remote clients before access to the network is granted.
RADIUS maintains client profiles in a centralized database. It offloads the authentication burden for dial-in users from the normal authentication of local network clients. For environments with a large number of dial-in clients, RADIUS provides improved security, easier administration, improved logging, and less-performance impact on LAN security systems.
The primary benefit of RADIUS (Remote Authentication Dial-In User Service) can be summarized as centralized. RADIUS is a centralized database of user access profiles. User access profiles determine the rules and restrictions dial-in users must comply with to establish a dial-up link to the network. Only after satisfying the criteria enforced by RADIUS is a remote client granted access to the network.

A

Remote Authentication Dial-in User Service (RADIUS)

383
Q

Remote delivery queues hold messages that will be delivered using SMTP to recipient mailboxes that reside on remote servers in Exchange 2007. Each remote delivery queue holds messages that are routed to recipients with the same delivery destination. Each time multiple recipients have the same delivery destination, a remote delivery queue is dynamically created. Once the messages have been successfully delivered, the queue expires and is automatically deleted three minutes later.

A

Remote delivery queue

384
Q

A Windows utility that lets you run a process on a remote computer.

A

Remote Execution (REXEC)

385
Q

A backup method that uses a tape drive installed on a single server or workstation to back up data other servers and computers connected to the network. This method backs up the registry on the computer attached to the tape drive, but not the registries of the other computers.

A

Remote network backup

386
Q

Remote Procedure Calls are based on a client/server model in which one server runs processes on another server. Both servers assume the calls are local, when in reality they run over LAN connections and through software libraries on both servers.

A

Remote Procedure Call (RPC)

387
Q

A Windows NT utility that lets you run commands on a UNIX host.

A

Remote Shell (RSH)

388
Q

A Rendezvous Point (RP) is a temporary connection between a multicast receiver and an existing shared multicast tree. When a volume of traffic crosses a threshold, the receiver is joined to a source-specific tree, and the feed through the RP is dropped.

A

Rendezvous Point (RP)

389
Q

A command-line Windows 2000 support tool that lets you perform replication- related tasks.

A

Repadmin.exe

390
Q

A device that reamplifies packets sent on a network. A repeater provides additional distance on a network by reamplifying packets and sending them on.

391
Q

An update to the Active Directory update that is made through replication. For example, if BSmith’s password is changed on Server1 then replicated to Server2, the replicated update was made on Server1.

A

Replicated update

392
Q

A process by which a collection data is copied to one or more computers in order to create synchronized sets of data. Changes to Active Directory, for example, are regularly replicated to all domain controllers in a forest.

A

Replication

393
Q

The time period between when a change is made to a server’s directory and when that change appears on other servers in the same site. It is usually 5 minutes.

A

Replication latency

394
Q

Replmon.exe. A graphical Windows 2000 support tool that lets you monitor the replication process and perform replication-related tasks.

A

Replication Monitor

395
Q

One of two domain controllers that exchange updated information.

A

Replication partner

396
Q

The series of connections over which replication takes place.

A

Replication topology

397
Q

A local group used by the Directory Replicator service. This group is not used for administration.

A

Replicator

398
Q

A series of documents regarding TCP/IP standards. RFCs describe the internal workings and processes of the Internet. TCP/IP standards, however, are developed by consensus. Member of the Internet Society can submit a document to be published as an RFC. After submittal, the document is reviewed for technical accuracy and assigned a classification. There are five classifications of RFCs, including Required, Recommended, Elective, Limited Use, Not Recommended. If a document is being considered as a standard, it goes through stages known as maturity levels. These levels include proposed standard, draft standard, and Internet standard.

A

Request for Comment (RFC)

399
Q

A specific IP address permanently set aside for use by a specific DHCP client. Addresses are reserved in the DHCP database by using DHCP Manager. Each reserved address is associated with a unique client device identifier.

A

Reservation

400
Q

A client computer running DNS that queries a DNS server on the network for name resolution.

401
Q

Any network service, such as file and print are resources. Microsoft provides many resource types, including DHCP server, file shares, print spooler, and so on.

402
Q

Resource mailboxes are used to manage meeting rooms, projectors, and additional facilities in Exchange 2007. When a resource mailbox is created, a disabled user account is created for the mailbox. Rights are then designated to a user who will manage the resource mailbox, or rules are created for the mailbox so it can manage itself.

A

Resource mailboxes

403
Q

A DNS record that is to be placed in the name service. Using the DNS Manager, you can configure new host records and new resource records.

A

Resource records

404
Q

Retransmit Time-Out (RTO) is the amount of time in milliseconds that a router will wait for an acknowledgement before sending a reliable packet to a neighbor from the retransmission queue.

A

Retransmit Time-Out (RTO)

405
Q

With a given host name, the RARP request will discover the IP address on a network.

A

Reverse Address Resolution Protocol (RARP)

406
Q

is made to access a particular application, the application can contact the DNS server and do a reverse lookup on the client’s IP address. If the host name returned by the DNS server is not in the access list for the NFS volume, or if the host name was not found in DNS, then the request would be denied.
Reverse Path Forwarding (RPF) routes traffic away from the source rather than to the receiver.

A

Reverse Path Forwarding (RPF)

407
Q

A Windows utility that lets you run a process on a remote computer.

A

REXEC (Remote Execution)

408
Q

A series of documents regarding TCP/IP standards. RFCs describe the internal workings and processes of the Internet. TCP/IP standards, however, are developed by consensus. Member of the Internet Society can submit a document to be published as an RFC. After submittal, the document is reviewed for technical accuracy and assigned a classification. There are five classifications of RFCs, including Required, Recommended, Elective, Limited Use, Not Recommended. If a document is being considered as a standard, it goes through stages known as maturity levels. These levels include proposed standard, draft standard, and Internet standard.

A

RFC (Request for Comment)

409
Q

A person who has the responsibility to review an RFC submitted for publication and assign a classification to the document. See RFC for information on classifications and maturity levels for RFCs.

A

RFC editor

410
Q

Rights allow you to carry out specific tasks in Windows 2000. For example, with Backup Operator, you can back up and restore user and system state data on a Windows 2000 computer.

411
Q

A ring topology connects neighboring nodes until they form a ring. Signals travel in one direction around the ring. In ring topologies, each device on the network acts as a repeater to send the signal to the next device. With a ring:
Installation requires careful planning to create a continuous ring. Isolating problems can require going to several physical locations along the ring.
A malfunctioning node or cable break can prevent signals from reaching nodes further along on the ring.

412
Q

A technique for rerouting data on an FDDI ring network to a secondary ring to prevent a break in the network from interrupting network service. Also referred to as dual counter-rotating rings.

A

Ring wrapping

413
Q

A protocol that allows a router to communicate routing information to another router on the network.

A

RIP (Routing Information Protocol)

414
Q

A protocol that routers use to exchange information between other routers on an IPX network and that hosts use to decide on the best route when forwarding remote IPX traffic.

A

RIPX (Routing Information Protocol over IPX)

415
Q

A RISC computer has a microprocessor that performs a small subset of instructions. This lets it process data more quickly.

A

RISC (Reduced Instruction Set Computing)

416
Q

A user profile located on the server but downloaded to the local computer when the user logs on. Changes to the profile are saved both locally and on the server when the user logs off.
Roaming user profiles are convenient for users that move from location to location and use different computers, but want to keep the same desktop. The

A

Roaming user profile

417
Q

A program that explores links inside and outside a Web site. Also called a spider.
A rogue DHCP server is an unauthorized DHCP server on the network.

A

Robot
Rogue DHCP Server

418
Q

A certification authority that has no higher authority to vouch for it. The root authority is at the top of a certification hierarchy.

A

Root authority

419
Q

A certificate that is digitally signed by the authority that issued it. This occurs when the issuing authority is the root authority and there is no higher authority to verify the certificate.

A

Root certificate

420
Q

The first-level directory on a hard disk or partition.

A

Root directory

421
Q

A Microsoft utility that views or modifies the local routing table in a TCP/IP network.

422
Q

Route aggregation allows the aggregation of specific routes into a single route in BGP. When route aggregation is implemented without any modifiers, granularity is lost because there is no inheritance of the individual route attributes (such as AS_PATH or community).

A

Route aggregation

423
Q

The process by which routers exchange route information between themselves. Each routing table entry learned through RIP is given a time-out value of three minutes past the last time it was last received in a RIP advertisement.

A

Route convergence

424
Q

A route map is an access list that has the ability to apply logic and make modifications to parameters by using route map statements. Route maps are best used in:
PBR NAT BGP
Route filtering during redistribution

425
Q

Using the split horizon with poison reverse method (also called poison reverse or route poisoning), routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).

A

Route poisoning

426
Q

Route redistribution is the capability of boundary routers connecting different routing domains to exchange and advertise routing information.

A

Route redistribution

427
Q

Route summarization is the consolidation of multiple routes into a single advertisement.

A

Route summarization

428
Q

A device that receives packets, reads their headers to find addressing information, and sends them on to their correct destination on the network or Internet.

429
Q

A protocol that allows a router to communicate routing information to another router on the network.

A

Routing Information Protocol (RIP)

430
Q

A protocol that routers use to exchange information between other routers on an IPX network and that hosts use to decide on the best route when forwarding remote IPX traffic.
A table that gives network bridges and routers the information needed to forward data packets to locations on other networks. Routing tables must be updated frequently as changes to machines and connections occur.
Routing tables include network addresses, the subnet mask, and the gateway addresses. They may also include the subnet broadcast address, network broadcast address, local loopback address, local network address, and the local host address.

A

Routing Information Protocol over IPX (RIPX)
Routing table

431
Q

A Rendezvous Point (RP) is a temporary connection between a multicast receiver and an existing shared multicast tree. When a volume of traffic crosses a threshold, the receiver is joined to a source-specific tree, and the feed through the RP is dropped.

A

RP (Rendezvous Point)

432
Q

Remote Procedure Calls are based on a client/server model in which one server runs processes on another server. Both servers assume the calls are local, when in reality they run over LAN connections and through software libraries on both servers.

A

RPC (Remote Procedure Call)

433
Q

Reverse Path Forwarding (RPF) routes traffic away from the source rather than to the receiver.

A

RPF (Reverse Path Forwarding)

434
Q

A Windows NT utility that lets you run commands on a UNIX host.

A

RSH (Remote Shell)

435
Q

Retransmit Time-Out (RTO) is the amount of time in milliseconds that a router will wait for an acknowledgement before sending a reliable packet to a neighbor from the retransmission queue.

A

RTO (Retransmit Time-Out)

436
Q

Reliable Transport Protocol (RTP) is used by EIGRP to deliver packets to neighboring routers in a guaranteed, ordered manner. RTP:
Supports intermixed transmission of unicast or multicast packets. Only reliably sends certain EIGRP packets.
Sends hello packets that contain an indicator as to whether or not the packet needs to be acknowledged by the recipient.
Ensures low convergence time by sending packets even when unacknowledged packets are pending.

A

RTP (Reliable Transport Protocol)

437
Q

A database hive in the Registry that includes the directory database for a Windows NT computer.

A

SAM (Security Accounts Manager)

438
Q

Samba is an open source file sharing protocol that provides file and print services. Samba (based on SMB) allows non-Windows servers to communicate with Windows based applications and networks.

439
Q

A Storage Area Network (SAN) is an out-of-the-computer storage option for large systems. Instead of storage devices being connected inside of a server (known as Direct Attached Storage (DAS)), storage devices are instead connected to the network and then associated with one or more servers. SANs allow for greater capacity storage than is possible with DAS, and support high data transfer rates and clustering to provide high availability.

A

SAN (Storage Area Network)

440
Q

The capacity of a single computer or an entire network to function well as you add or remove components (hardware or software).
One mode that an infrared device operates in is diffuse mode (also called scatter mode), which operates by broadcasting a large beam of light rather than a narrow beam. It does not require line-of-sight connections.

A

Scalability
Scatter Mode (Diffuse Mode)

441
Q

Single Copy Cluster (SCC) uses shared storage in a failover cluster configuration which allows multiple servers to manage a single copy of storage groups. Because nothing in a single copy cluster is shared between the nodes, nodes have access to shared data, but cannot access it at the same time.

A

SCC (Single Copy Cluster)

442
Q

The schema is used to hold the blueprint for Active Directory in Exchange 2007. It defines all of the valid object types and attributes that can be associated with each object type on the Active Directory. If you try to create an object on an Active Directory domain controller that has not been defined within the schema, the domain controller will contact the schema master to make sure it has the latest copy of the schema. If the object is not defined, then the attempt to create the new object will fail.

443
Q

An Active Directory partition that stores which types objects and attributes can be created in the Active Directory database.

A

Schema partition

444
Q

A Microsoft term for a range of IP addresses that have been configured on a DHCP server awaiting assignment to a host.

445
Q

A file that lists actions to be executed when the script is run.

446
Q

An interface used to connect microcomputers to physical devices (hard disks, scanners, and so on). The American National Standards Institute (ANSI) defines SCSI as a standard high-speed parallel interface.

A

SCSI (Small Computer System Interface)

447
Q

Session Description Protocol (SDR) is an application tool that is commonly used to find multicast traffic by querying directories or listening to announcements. SDR encapsulates the following protocols:
Session Directory Protocol (SDP) Session Announcement Protocol (SAP)

A

SDR (Session Description Protocol)

448
Q

A fault-tolerant feature that detects bad sectors of a hard disk, moves data from bad sectors to good sectors, and maps out bad sectors to prevent future use.

A

Sector sparing

449
Q

SFTP is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data which prevent data from being transmitted over the network in clear text.

A

Secure File Transfer Protocol (SFTP)

450
Q

SHTTP (Secure Hypertext Transfer Protocol) is a proposed standard for security enhanced HTTP. It is used only for Web traffic. SHTTP is an alternative to SSL for Web traffic, but it does not employ SSL.
SHTTP should not be confused with HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), which uses a URL of https://.

A

Secure Hypertext Transfer Protocol (SHTTP)

451
Q

HTTPS is a secure form of HTTP that uses SSL as a sublayer for security.

A

Secure Socket Layer over Hypertext Transfer Protocol (SHTTPS)

452
Q

A protocol that provides encryption for communication between the Internet servers and browser clients. It uses public/private key cryptography and digital certificates to verify users’ identities.

A

Secure Sockets Layer (SSL)

453
Q

A database hive in the Registry that includes the directory database for a Windows NT computer.

A

Security Accounts Manager (SAM)

454
Q

A Microsoft Management Console (MMC) snap-in that lets you compare a computer’s current security settings with an existing security template. You can also save security settings as a new security templates.

A

Security Analysis and Configuration Snap-In

455
Q

A unique ID used to identify everything in the domain.

A

Security Identifier (SID)

456
Q

A text file containing records of events you have chosen to audit. For example, if you chose to monitor unsuccessful attempts to log on to your system, you would look at the security log to find the results of that audit.

A

Security log

457
Q

The Windows subsystem that handles the process of logging on to a domain. It works with the Security Accounts Manager to validate the given user name and password, generates an access token, and returns it to the user.

A

Security Subsystem

458
Q

A group of security-related settings stored in a file. Security templates can be imported into a Group Policy Object (GPO).

A

Security template

459
Q

The seed metric is the default metric or cost for a redistributed route.
In OSPF, the seed metric is based on the interface’s bandwidth. In IS-IS, the default seed metric is 10.
In EIGRP and IGRP, the default seed metric is based on the interface bandwidth and delay.
In RIP, the seed metric starts with a hop count of 0 and increases from router to router in increments.

A

Seed metric

460
Q

Segmentation is a Transport layer process of breaking large packets of information from higher layers into smaller packets called segments. Segmentation is necessary to enable the data to meet network size and format restrictions. The other function of segmentation happens when the receiving Transport layer uses packet sequence numbers to reassemble segments into the original message.

A

Segmentation

461
Q

A page you can print between each print job sent to a printer. Also called a banner.

A

Separator page file

462
Q

An industry-standard protocol developed in 1984 to support TCP/IP over low- speed serial interfaces. Windows 2000 supports SLIP client functionality, but not server functionality. Also, Windows NT RAS Servers do not accept SLIP client connections.

A

Serial Line Internet Protocol (SLIP)

463
Q

A serial port transmits and receives data one bit at a time. The modem and mouse connect to a computer through a serial port.

A

Serial port

464
Q

A Microsoft management utility that provides management for Windows NT servers.

A

Server Management Services (SMS)

465
Q

The file-sharing protocol used on all MS Net products. A workstation communicates with an SMB server process at the remote host.

A

Server Message Block (SMB)

466
Q

An Active Directory object that represents the physical location of a server (usually a domain controller) on a Windows 2000 network.

A

Server object

467
Q

A built-in local group on domain controllers only. Server Operators share disk resources and can back up and restore the server.

A

Server Operators

468
Q

A backup technique that backs up the data stored on the server. This requires fewer backup devices and storage media, but requires all users to store critical files on the server.

A

Server-only backup

469
Q

A computing process that performs a specific task in the system. It may also provide a programming interface for other processes.

470
Q

Updates to the Windows 2000 operating system that Microsoft periodically issues. They include bug fixes and other improvements and are available at no cost from the Microsoft web site.

A

Service packs

471
Q

The organization that provides a WAN service to an individual or company. A service provider might be the same organization that owns the WAN, or it might be a separate organization that purchases network access from a WAN carrier and then resells network access to the general public.

A

Service provider

472
Q

A type of wireless security feature used to group several wireless devices and access points as part of the same network and to distinguish these devices from other adjacent wireless networks. The SSID is also commonly referred to as the network name. Most WAPs come with a default SSID, which you should change as part of your security implementation. Even after you change the SSID, it is still only a minimal security feature. There are two type of SSIDs:
BSSID (Basic Service Set Identification) is used by an ad-hoc wireless network with no access points.
ESSID (Extended Service Set Identification), or ESS Identifier, is used in an infrastructure wireless network that has access points.

A

Service Set Identification (SSID)

473
Q

A session refers to a communication between two end points (usually between client and service) that occur during a single connection. The session begins when the connection is established at both ends and terminates when the connection is ended.

474
Q

Session Description Protocol (SDR) is an application tool that is commonly used to find multicast traffic by querying directories or listening to announcements. SDR encapsulates the following protocols:
Session Directory Protocol (SDP) Session Announcement Protocol (SAP)

A

Session Description Protocol (SDR)

475
Q

SFTP is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data which prevent data from being transmitted over the network in clear text.

A

SFTP (Secure File Transfer Protocol)

476
Q

The name of a folder that many users will access on a network. Use intuitive share names so that your users can easily identify resources.

A

Share name

477
Q

Security to control how users access a shared folder.

A

Share permissions

478
Q

A folder that is used by a group of people on the network. Shared folders give access to users of applications, data, and home folders.

A

Shared folder

479
Q

A printer that is connected to the network so many users can access it.

A

Shared printer

480
Q

A messaging system based on a server/client relationship in which the client takes the active role in delivering and processing messages. The server is simply a repository of shared files. Microsoft Mail 3.x and Lotus cc:Mail are shared- file messaging systems.

A

Shared-file messaging system

481
Q

Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of two wires that carry the data signals. PVC plastic insulation surrounds each wire. Two wires are twisted to reduce the effects of electromagnetic interference and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI.

A

Shielded Twisted Pair (STP)

482
Q

The SPAP protocol is a more secure version of PAP. SPAP uses an encrypted password for authentication. Password encryption is easily reversible. SPAP is required to be connected to a Shiva LAN Rover (proprietary).

A

Shiva Password Authentication Protocol (SPAP)

483
Q

SHTTP (Secure Hypertext Transfer Protocol) is a proposed standard for security enhanced HTTP. It is used only for Web traffic. SHTTP is an alternative to SSL for Web traffic, but it does not employ SSL.
SHTTP should not be confused with HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), which uses a URL of https://.

A

SHTTP (Secure Hypertext Transfer Protocol)

484
Q

HTTPS is a secure form of HTTP that uses SSL as a sublayer for security.

A

SHTTPS (Secure Socket Layer over Hypertext Transfer Protocol)

485
Q

A script that executes when a computer shuts down.

A

Shutdown script

486
Q

A unique ID used to identify everything in the domain.

A

SID (Security Identifier)

487
Q

The Internet standard protocol for transferring e-mail messages between hosts. SMTP assumes that both host and client are constantly connected, but you can use both permanent and dial-up connections to an SMTP host.

A

Simple Mail Transfer Protocol (SMTP)

488
Q

the information in a management information base (MIB). Windows 2000 uses SNMP to check the status of another computer on a TCP/IP network.
Simple Password Authentication Protocol is used to authenticate a user to a network access server. Simple password authentication protocol:
Allows a password (key) to be configured per area. Routers in the same area that want to participate in the routing domain will have to be configured with the same key.
Is commonly used by internet service providers. Is a Point to Point Protocol.
Is supported by almost all network operating system remote servers.

A

Simple Password Authentication Protocol

489
Q

Simplex and duplex are methods of communication transmission. Simplex is the one-way transmission of a signal across a medium. Duplex is the two-way transmission of a signals across a medium. There are two types of duplex transmission; half-duplex and full-duplex. Half-duplex allows transmission of signals, one party at a time. Full-duplex allows transmission and reception of signals to occur concurrently.

A

Simplex (Duplex)

490
Q

Single Copy Cluster (SCC) uses shared storage in a failover cluster configuration which allows multiple servers to manage a single copy of storage groups. Because nothing in a single copy cluster is shared between the nodes, nodes have access to shared data, but cannot access it at the same time.

A

Single Copy Cluster (SCC)

491
Q

A Windows NT domain model in which all users and groups reside in one domain, with a single PDC and one or more BDCs. This model does not use trust relationships because there is only a single domain. Typically used for centralized administration of accounts and resources.

A

Single domain model

492
Q

A Windows NT domain model consisting of at least two domains. Each of the domains has its own domain controller, but all account information is kept on the master domain’s controllers. The single master domain model is used when a company has divisions and departments where each entity has its own resource management, but there is still centralized account management.

A

Single master domain model

493
Q

A replication model in which updates can only be made to one domain controller (master). The master then replicates its updates to other domain controllers. Windows NT 4.0 used this replication model.

A

Single-master replication model

494
Q

A TCP/IP subnet or group of well connected subnets. If subnets are well connected the connection is very reliable and fast. Sites make it easier to configure Active Directory access and replication to best utilize the physical network.
In Windows 2000, a site is a physical unit that defines replication for Active Directory informatioon. Each site includes one or more servers within an organization. To be in the same site, servers need permanent, high-speed LAN or WAN connections to each other.

495
Q

An Active Directory object that models which site links should be bridged (in other words, over which site links IP packets can be routed).

A

Site link bridge object

496
Q

An Active Directory object that represents a non-permanent or low-bandwidth link between multiple sites.

A

Site link object

497
Q

An Active Directory object that represents a group of permanent, high- bandwidth TCP/IP subnets.
A sliding window is used to buffer data transmission between two hosts. Each TCP/IP host maintains two sliding windows: one for receiving and the other for transmitting data. The size of the window is the amount of data that can be buffered on a computer.

A

Site object Sliding windows

498
Q

An industry-standard protocol developed in 1984 to support TCP/IP over low- speed serial interfaces. Windows 2000 supports SLIP client functionality, but not server functionality. Also, Windows NT RAS Servers do not accept SLIP client connections.

A

SLIP (Serial Line Internet Protocol)

499
Q

An interface used to connect microcomputers to physical devices (hard disks, scanners, and so on). The American National Standards Institute (ANSI) defines SCSI as a standard high-speed parallel interface.

A

Small Computer System Interface (SCSI)

500
Q

The file-sharing protocol used on all MS Net products. A workstation communicates with an SMB server process at the remote host.

A

SMB (Server Message Block)