Vocab List - Module 3 Flashcards

Module 3

1
Q

It is the average time in milliseconds between the transmission of a packet to a neighbor and the receipt of an acknowledgement.

A

Smooth Round Trip Time (SRTT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Using multiple processors that share the same operating system and memory to process programs more quickly.

A

SMP (Symmetric Multiprocessing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Microsoft management utility that provides management for Windows NT servers.

A

SMS (Server Management Services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The __________________ for transferring e-mail messages between hosts. ________ assumes that both host and client are constantly connected, but you can use both permanent and dial-up connections to an _______ host.

A

SMTP (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A method of organizing e-mail messages. The default domain and local domains include e-mail addresses hosted on the local Microsoft Internet Information Server computer. Remote domains include e-mail addresses hosted on other SMTP computers.

A

SMTP service domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A protocol suite that is a complete networking system, including proprietary hardware. __________ enables communication between IBM mainframes and terminals. It also interfaces with IBM Token Ring local area networks.

A

SNA (Systems Network Architecture)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A tool used through Microsoft Management Console (MMC). ____________ can be stand-alone (can be added to MMC by itself) or extension (can be added to MMC only to extend the function some other snap-in).

A

Snap-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A simple protocol for managing TCP/IP networks. It is used to report the status of a host on a Windows TCP/IP network. Network equipment vendors developed ________ to let management software monitor network components.
Using ___________, programs called agents are loaded on to each network component. The agents monitor network traffic and other network components and compile the information in a management information base (MIB). Windows 2000 uses ___________ to check the status of another computer on a TCP/IP network.

A

SNMP (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An ____________ performs get, get-next, and set operations requested by a management system. An agent can be any computer running the SNMP agent software, usually a server or router.

A

SNMP agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An ______ agent performs a trap, which is an alert that is sent to management systems for some event that has occurred with that device. This event could be excess traffic, password violations, or a hardware failure.

A

SNMP trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is a point in a network that provides subnetwork services, comparable to the layer 2 address corresponding to the NET or NSAP address.

The ________ is assigned by using one of the following:
The MAC address on a LAN interface.
The virtual circuit ID from X.25 or ATM connections.
The Data-Link Connection Identifier (DLCI) from Frame Relay connections.

A

SNPA (Subnetwork Point of Attachment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________________ is an attack where someone claims to be someone other than who they are. Attackers can assume any role within your organization or of anyone outside of your organization.

Their goal is to get you to disclose confidential or sensitive information verbally or to perform some action on the computer system that would grant the attacker access, such as changing a password based on a verbal request over the phone by someone claiming to be an offsite manager. Some common social engineering attacks are:

Dumpster diving – Going through someone’s trash to find private information.

Keyboard surfing – Observing sensitive information by looking over one’s shoulder.

Piggybacking – Gaining access into a secure facility by slipping in as an authorized visitor enters.

Phishing – Sending legitimate-looking e-mails designed to trick the recipient into divulging private information (often identity theft related activities).

The primary countermeasure to social engineering is awareness.

If users are unaware of the necessity for security in your organization and they are not properly trained to support and provide security, they are vulnerable to numerous social engineering exploits. Awareness training focused on preventing social engineering should include methods to authenticate personnel over the phone, assigning classification levels to information and activities, and educating your personnel on what information should not be distributed over the phone.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is much like a file handle and functions as an endpoint for network communication. Each application creates a socket by specifying the IP address of the host, the type of service (connection oriented, connectionless), and the port that the application is using.

A

Sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network share that stores software installation programs and/or data and from which software can be installed.

A

Software distribution point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Windows Installer package (.MSI file) or ZAP file that is distributed to network users using an Active Directory-based Group Policy Object (GPO).

A

Software package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An application that can run only on the hardware platform for which it was originally compiled.

A

Source compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A replication partner that sends updates to a target replication partner.

A

Source replication partner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A volume on a dynamic disk that spans multiple physical drives. Spanned volumes are not fault tolerant and nor can you mirror spanned volume. In Windows NT 4.0, a spanned volume was called a volume set.

A

Spanned volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is a more secure version of PAP. _________ uses an encrypted password for authentication. Password encryption is easily reversible. _______ is required to be connected to a Shiva LAN Rover (proprietary).

A

SPAP (Shiva Password Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A program that explores links inside and outside a Web site. Also called a robot.

A

Spider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Using the _______________ (also called best information), routers keep track of where the information about a route came from. Routers do not report route information to the routers on that path. In other words, routers do not report information back to the router from which their information originated.

A

Split horizon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Using the ____________________ method (also called poison reverse or route poisoning), routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).

A

Split horizon with poison reverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A query and programming language for databases, widely used with relational database systems. __________ translates what the user sees on the display to commands that the server can understand. IBM originally developed __________ as an English-like query language for entering, editing, and retrieving data in mainframes. There is now an ANSI-standard SQL definition.

A

SQL (Structured Query Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

It is the average time in milliseconds between the transmission of a packet to a neighbor and the receipt of an acknowledgement.

A

SRTT (Smooth Round Trip Time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

It is a secure and acceptable alternative to remote control systems such as Telnet. SSH allows for secure interactive control of remote systems. SSH uses RSA public key cryptography for both connection and authentication. SSH uses the IDEA algorithm for encryption by default, but is able to use Blowfish and DES.
SSH is comprised of slogin, ssh, and scp.

A

SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A protocol that provides encryption for communication between the Internet servers and browser clients. It uses public/private key cryptography and digital certificates to verify users’ identities.

A

SSL (Secure Sockets Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A _____________ allows any type of route information to enter or leave the area.

A

Standard area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An authoritative DNS server for a zone that contains a read-write copy of the zone file and can be updated directly. The updated zone information can then be replicated to secondary zones.

A

Standard primary zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An DNS server that contains a read-only copy of the zone file. The zone information is updated by replication from other servers. Its zone file can then be replicated to other secondary zones.

A

Standard secondary zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

It is a Windows 2000 server that you have configured as an emergency backup server. It has Windows 2000 and all necessary components installed, but has not joined a domain.

A

Standby server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

It is a network topology that uses a hub (or switch) to concentrate all network connections to a single physical location. Today it is the most popular type of topology for a LAN.

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A script that executes when a computer starts up.

A

Startup script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A router that is configured to communicate only with networks to which it has a configured interface. To route IP packets to other networks, each static router must be configured with either an entry in each router’s routing for each network in the internetwork or a default gateway address of another router’s local interface.

A

Static mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A __________ is a route that is manually configured to a remote destination. They can be used to reduce overall traffic because they do not require information to be generated.

_______________ are most commonly used to:

Define specific routes to use when routing information must be exchanged between two autonomous systems.

This eliminates the need for entire routing tables to be exchanged.

Define routes to destinations over a WAN link. This eliminates the need for a dynamic routing protocol.

A

Static route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

It is an addressing method in which IP configuration information must be built and updated manually on each host by an administrator.

A

Static routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A________________ is an out-of-the-computer storage option for large systems. Instead of storage devices being connected inside of a server (known as Direct Attached Storage (DAS)), storage devices are instead connected to the network and then associated with one or more servers. _________ allow for greater capacity storage than is possible with DAS, and support high data transfer rates and clustering to provide high availability.

A

Storage Area Network (SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI.
A method of saving data by writing it in stripes across several different hard disks at once.

A

Stripe sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A _________________ breaks data into units and stores the units across a series of disks (as opposed to a spanned volume that fills the first area with data, then the second area, and so on). Striped volumes:
Do not provide fault tolerance. A failure of one disk in the set means all data is lost.
Provide an increase in performance. Use two or more disks.
Have no overhead–all disk space is available for storing data.

A

Striped volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

___________ is a data protection method. Striping divides data into units and stores the units across a series of disks. Distributing the data removes the threat of losing all of the data in event of a single disk failure.

A

Striping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A query and programming language for databases, widely used with relational database systems. __________ translates what the user sees on the display to commands that the server can understand. IBM originally developed _______ as an English-like query language for entering, editing, and retrieving data in mainframes. There is now an ANSI-standard ________ definition.

A

Structured Query Langu (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A ____________ does not allow ASBR routes, so routes that are external to the OSPF routing process are not transmitted.

A

Stub area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

_______________ is a topology in which the remote router forwards all traffic that is not local to a hub router.

A

Stub routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A key inside another key in the Registry. __________ can contain more subkeys or values.

A

Subkeys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A physical segment in a TCP/IP environment that uses IP addresses created from a single network ID. The ___________ is created by partitioning the bits in the host ID into two parts. The first part is used to identify the segment as a unique network, and the other part is used to identify the hosts. Companies typically used subnetting because they exceeded the maximum number of hosts per segment with their IP address.

A

Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The concept of blocking out a portion of the IP address so that TCP/IP can determine the network ID from the host ID. TCP/IP hosts use the subnet mask to determine whether the destination host is located on a local or remote network. Typically the subnet mask is 255.255.255.0.

A

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An Active Directory object that represents a TCP/IP subnet.

A

Subnet object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

______________ is the division of a network address into multiple smaller subnets. For example, this allows a single Class B or Class C addresses to be divided and used by multiple organizations.

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A _____________________ is a point in a network that provides subnetwork services; comparable to the layer 2 address corresponding to the NET or NSAP address. The SNPA is assigned by using one of the following:
The MAC address on a LAN interface.
The virtual circuit ID from X.25 or ATM connections.
The Data-Link Connection Identifier (DLCI) from Frame Relay connections.
The folders and subfolders contained inside the export directory you use for directory replication.

A

Subnetwork Point of Attachment (SNPA)
Subtree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A ___________ is the best route to a destination.

A

Successor route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

_______________, combining multiple network addresses into a single larger subnet. For example, this allows multiple Class C addresses to be combined into a single network.

A

Supernetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

In Windows 2000 Server, a grouping of multiple DHCP scopes into a single unit. A superscope makes it possible to have multiple logical subnets on a single physical subnet. The individual scopes are called member scopes or child scopes.

A

Superscope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

An on-demand virtual circuit that is maintained for the length of a conversation. When the conversation ends, the connection is released.

A

SVC (Switched Virtual Circuit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A network device that works at the data link layer and allows each device to have higher bandwidth on the network. A switch can offer speeds of 10 to 100 megabits to the desktop.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A system of Digital Data Service (DDS) lines that are on-demand (dial-up) instead of leased and transfer data at a rate of 56 Kbps.

A

Switched 56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

An on-demand virtual circuit that is maintained for the length of a conversation. When the conversation ends, the connection is released.

A

Switched Virtual Circuit (SVC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Codes you can use at the command prompt when starting an application or installation program to customize the way the program runs. Also called command line switches.

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Using multiple processors that share the same operating system and memory to process programs more quickly.

A

Symmetric Multiprocessing (SMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The mechanism by which domain controllers share directory changes and ensure that their information is accurate.

A

Synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A GSNW or CSNW utility that lets you set up user accounts, define policies, and grant user permissions on a NetWare network from a Windows NT computer.

A

SYSCON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

An executable file you can use during an unattended installation of Windows NT if you need to install an application that does not support scripted installations.

A

Sysdiff.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A hive in the Registry which includes information about the devices and services installed on the computer.

A

System hive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A text file containing the events that Windows 2000 components log, such as driver failures. You can use the Event Viewer to display the system log.

A

System log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A Windows 2000 tool that is used to monitor real-time and historical system performance, trends, bottlenecks, and the effects of system configuration changes.

A

System Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

The partition on the hard disk containing the boot files and hardware-specific files for the operating system.

A

System partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A set of registry settings that controls what users can see and do on their Windows NT computers. System policies are used to control and manage desktop computers. You can use system policies to provide all users or computers with a uniform system policy, or customize settings for specific users, groups, and computers. Windows 2000 computers use Group Policy instead.

A

System policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Poledit.exe. A graphical front-end to the registry included with Windows NT Server that allows you to make registry changes without using the registry editor.

A

System Policy Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The files containing the rules governing how a Windows NT client computer will display the desktop, use Control Panel options, access the network, and so on. Ntconfig.pol is a default system policy file. Windows 2000 computer use Group Policy Objects (GPOs) instead.

A

System policy files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

System state data includes all the Windows 2000 system components and distributed services that Active Directory depends on.

A

System state data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

The directory in which you installed the Windows 2000 operating system files.

A

Systemroot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A graphical representation of the contents of a backup tape. Windows 2000 automatically creates catalogs during backup and stores them on the tape. The tape catalog shows all the backup sets on a tape.

A

Tape catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A tape drive which can reads a magnetic storage tape, write data to it, and position it to receive data.

A

Tape device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

An API that Windows 2000 communication applications use when they make calls over the telephone line. These calls can include data, fax, and voice.

A

TAPI (Telephony Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A replication partner that receives updates from a source replication partner. Also called a destination replication partner.

A

Target replication partner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Digital lines that carry data, digitized voice, and digitized video signals. A T- Carrier line multiplexes several channels on to a single physical communication medium. Each channel operates at 64 kilobits per second.

A

T-Carriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A reliable protocol that divides data into packets, which the IP protocol then sends to other computers on the network.

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

TCP/IP is the protocol suite used on the Internet and on most networks. Nearly all computers today use TCP/IP for communication because it is highly scalable and routable.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A Windows NT boundary layer that gives file system drivers a common programming interface so that they do not have to be tied to specific protocols.
A device you can use to examine the breaks and shorts in a network and identify their locations within a few feet. TDRs work by sending a sonar-like pulse down the cable. The pulse looks for shorts or breaks in the cable and reports their location.

A

TDI (Transport Driver Interface)
TDR (Time-Domain Reflectometer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

An employee who works outside the office, at home or on the road, and uses a network or the Internet to communicate with the office.

A

Telecommuter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

An API that Windows 2000 communication applications use when they make calls over the telephone line. These calls can include data, fax, and voice.

A

Telephony Application Programming Interface (TAPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A protocol that emulates a terminal so you can log on to a remote computer. Also called Virtual Terminal Protocol.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

A user account template is a standard user account that you create to simplify creating accounts for other users with similar needs.

A

Template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A terminal with no processor. It accepts keystrokes and displays data from a mainframe computer. Also called a dumb terminal.

A

Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

This data transfer utility provides bi-directional file transfers between two TCP/IP hosts, where one is running the TFTP server software. No user authentication is required.

A

TFTP (Trivial File Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

An online network sponsored by Microsoft. You can find answers to technical questions, read articles about Microsoft products, chat with other users, and much more.

A

The Microsoft Network (MSN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Thicknet (sometimes called ThickWire) is a term for the larger size of coaxial cable used in Ethernet local area networks.

A

Thicknet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Thinnet (sometimes called ThinWire) is a term for the smaller size of coaxial cable used in Ethernet local area networks.

A

Thinnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Thrashing is excessive paging. It occurs when the computer spends too much time passing pages between physical memory and the paging file on a hard drive. A symptom of thrashing is that the CPU is under-used but the I/O system is working exceptionally hard.

A

Thrashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

An object inside a process that runs program instructions. If an operating system allows it, multiple threads can run on different processors at the same time.

A

Thread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A process by which a TCP session is initialized. The purpose of the handshake is to synchronize the sending and receiving of segments, and to communicate to the other host the window size and segment size of data it is capable of receiving.

A

Three-way handshake

90
Q

A timer in which determines how long each station of an FDDI network can keep the token. Each station has a THT.

A

THT (Token Holding Timer)

91
Q

The process by which Win16 on Win32 (WOW) converts calls from 16-bit applications into 32-bit calls for Win32 functions.

92
Q

A device you can use to examine the breaks and shorts in a network and identify their locations within a few feet. TDRs work by sending a sonar-like pulse down the cable. The pulse looks for shorts or breaks in the cable and reports their location.

A

Time-Domain Reflectometer (TDR)

93
Q

In computer networking, a token can be either a physical or a virtual object (often used to authenticate users). Security tokens can be in the form of code, PIN number, or devices like smartcards.

94
Q

A timer in which determines how long each station of an FDDI network can keep the token. Each station has a THT.

A

Token Holding Timer (THT)

95
Q

Token passing is a mechanism that uses a digital pass card. Only the system holding the token is allowed to communicate.

A

Token passing

96
Q

A network topology in which computers are connected in a closed ring. Tokens passed from one computer to another allow each computer to use the network.

A

Token Ring

97
Q

A tombstone marks the fact that someone deleted an object in the directory. When you delete an object in the directory, that item is no longer part of directory replication. Instead, tombstones are replicated to servers to notify them to delete these objects.

98
Q

The tombstone lifetime specifies how long a tombstone will exist before the garbage collection process deletes it as well. A tombstone lifetime should be long enough for directory replication to reach every server in your organization.

A

Tombstone lifetime

99
Q

A tone generator sends an electronic signal on a wire or cable. Use a tone generator to locate the other end of a specific cable. Generate the tone on one end of the cable, then test the other ends of many cables until you detect the tone.

A

Tone generator

100
Q

The physical layout of a network. Topology describes how the network’s computers are connected to each other. Common topologies include buses and rings.

101
Q

A topology table is a record of the updates sent between neighboring routers when a new router is discovered.

A

Topology table

102
Q

A totally stubby area does not allow ASBR routes or inter-area routes; only routes within its own specific area are allowed.

A

Totally stubby area

103
Q

Traceroute is a Linux diagnostic utility that tests connectivity between devices, but as it does so it shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach, and be returned by that host.

A

Traceroute

104
Q

A Microsoft diagnostic utility that verifies the route used from the local host to a remote host.

105
Q

An entire operation consisting of multiple steps that must all be completed properly, or the entire transaction fails.

A

Transaction

106
Q

The standard language for communicating between applications and SQL Server. It is an implementation of ANSI-standard Structured Query Language (SQL) that includes extensions such as stored procedures that make Transact- SQL a full programming language. Sometimes referred to as T-SQL.

A

Transact-SQL

107
Q

digital signals from the network to digital data for the PC. Many transceivers are attached to network interface cards.
A file with the .MST extension that can be applied to a Windows Installer package (.MSI file) to customize it. Also called a software modification file.

A

Transform file

108
Q

A transit area is an area that has more than one way into itself.

A

Transit area

109
Q

Transit AS peering is the communication of information between all EBGP peers. This is optimal for scenarios in which an ISP allows their customers using BGP to access all their other customers using BGP.

A

Transit AS peering

110
Q

A reliable protocol that divides data into packets, which the IP protocol then sends to other computers on the network.

A

Transmission Control Protocol (TCP)

111
Q

In the realm of information technology, transmission media refers to the cables and wires through which signals (such as electric current or light impulse) are transmitted through a network.

A

Transmission Media (Media)

112
Q

A Windows NT boundary layer that gives file system drivers a common programming interface so that they do not have to be tied to specific protocols.

A

Transport Driver Interface (TDI)

113
Q

Layer 4 of the OSI reference model. This layer is responsible for reliable network communication between end nodes. The transport layer provides mechanisms for the establishment, maintenance, and termination of virtual circuits, transport fault detection and recovery, and information flow control. Corresponds to the transmission control layer of the SNA model. See also application layer, data link layer, network layer, physical layer, presentation layer, and session layer.

A

Transport Layer (OSI Model)

114
Q

Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing
Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.

A

Transport policies

115
Q

Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing

Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.

A

Transport policy actions

116
Q

Transport policy agents apply transport policies to e-mails within an Exchange organization. There are two types of transport policy agents in Exchange 2007:
A Transport Rules agent runs on a Hub Transport server and implements policies set by administrators to all e-mail that travels in and out of an Exchange organization.
An Edge Rules agent runs on an Edge Transport server and helps control spam and unwanted mail flow within an organization.

A

Transport policy agents

117
Q

Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing
Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.

A

Transport policy conditions

118
Q

A type of protocol that allows two computers to communicate with each other. For example, TCP/IP and IPX/SPX are both transport protocols.

A

Transport protocol

119
Q

Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing
Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.

A

Transport rules

120
Q

Transport policy agents apply transport policies to e-mails within an Exchange organization. There are two types of transport policy agents in Exchange 2007:
A Transport Rules agent runs on a Hub Transport server and implements policies set by administrators to all e-mail that travels in and out of an Exchange organization.
An Edge Rules agent runs on an Edge Transport server and helps control spam and unwanted mail flow within an organization.

A

Transport Rules agent

121
Q

With the triggered update method (also known as a flash updates), routers that receive updated (changed) information broadcast those changes immediately rather than waiting for the next reporting interval. With this method, routers broadcast their routing tables periodically, punctuated by special broadcasts if conditions have changed. This method reduces the convergence time.

A

Triggered update

122
Q

This data transfer utility provides bi-directional file transfers between two TCP/IP hosts, where one is running the TFTP server software. No user authentication is required.

A

Trivial File Transfer Protocol (TFTP)

123
Q

Pieces of software code written expressly to cause problems with servers and workstations. A Trojan horse conceals harmful code inside what looks like a harmless data string or program. Once it is inside a computer, however, it damages data or systems. A Trojan horse is a type of computer virus.

A

Trojan horses

124
Q

The central cable connecting all of the nodes, either inserted directly into the trunk, or nodes tapping into the trunk using offshoot cables called drop cables. Commonly used in the physical bus topology.

A

Trunk Cable

125
Q

A name server caches all of the information that it receives during a process known as iterative queries. The amount of time that the data is stored in cache is referred to as Time to Live. The name server administrator of the zone that contains the data determines the TTL for the data. This parameter can be adjusted. The TTL is a maximum hop count.

A

TTL (Time to Live)

126
Q

A logical connection that carries encapsulated and possibly encrypted data. Encapsulation and encryption make the tunnel a secure and private link for users across a public network such as the internet.

127
Q

Tunneling is used primarily to support private traffic through a public communication medium. The most widely known form of tunneling is VPN (Virtual Private Networking). A VPN establishes a secured communications tunnel through an insecure network connecting two systems.
Tunnels provide secure communications, they usually provide less than optimal throughput due to the additional overhead of encryption and maintaining the communications link. Tunnels are not directly associated with password theft or protection.
L2TP, PPTP, and IPSec are all VPN tunnel protocols.

128
Q

A database containing supplementary information for a Windows 2000 answer file. For example, a UDF may contain the unique IDs, user data, and other information that varies for each installation.
The is a connectionless communications service that does not guarantee delivery of packets. Applications using UDP typically deliver small amounts of data and the application has the responsibility for reliable delivery.

A

UDF (Uniqueness Database File)
UDP (User Datagram Protocol)

129
Q

A method of installing Windows 2000 using an answer file that automates the installation so you do not have to be physically present at the computer during the installation.

A

Unattended installation

130
Q

A standardized convention used for describing network servers. UNC names start with two backslashes followed by the server computer name, and then the shared folder name. For example, \server_name\users\%username%

A

UNC (Universal Naming Convention)

131
Q

Unicast is a transmission method in which packets are sent from a single host to a single host.

132
Q

The set of letters, numbers, and symbols that SQL Server recognizes in the nchar, nvarchar, and ntext data types. It includes characters for most languages. Unicode is related to character sets, but is not the same thing, having some 200 times as many possible values and requiring twice the storage space.

A

Unicode characters

133
Q

The Unified Messaging server automates and integrates voice, e-mail, and fax communications in a single store within the Exchange environment which is accessible through either telephone or the computer. The Unified Messaging server communicates with an IP-based phone system which directs all voicemails to the Unified Messaging server. All voicemails are converted to windows media audio files which are then sent to the user’s Mailbox server and stored as attachments in an e-mail. The Unified Messaging server also supports voice-prompt calendar and planning services.

A

Unified Messaging server

134
Q

The address of a World Wide Web page, graphic file, or program file on the Internet. Each resource has an exclusive address (URL) that allows your computer to find and display it. The URL includes the code for the transfer

A

Uniform Resource Locator (URL)

135
Q

A power supply that is typically used on file servers to provide battery backup power in case of a power failure. The UPS provides power to a server until an emergency shutdown of the system can occur.
A database containing supplementary information for a Windows 2000 answer file. For example, a UDF may contain the unique IDs, user data, and other information that varies for each installation.

A

Uninterruptible Power Supply (UPS)
Uniqueness Database File (UDF)

136
Q

A standardized convention used for describing network servers. UNC names start with two backslashes followed by the server computer name, and then the shared folder name. For example, \server_name\users\%username%

A

Universal Naming Convention (UNC)

137
Q

A Universal Serial Bus (USB) is a type of media (cable and connectors) that interface between computer and external devices (hubs, audio players, joysticks, keyboards, telephones, scanners, and printers). A network can be created by linking USB cables between multiple computers.

A

Universal Serial Bus (USB)

138
Q

An operating system invented at Bell Labs in 1969. UNIX is a non-proprietary operating system, so there are many independently-produced versions of UNIX, called “flavors.”

139
Q

A server running the line printer daemon (LPD) service, which allows you to print documents from a remote computer.

A

UNIX LPD print server

140
Q

Unreachable queues hold messages that cannot be routed to their destination due to configuration changes or modified routing paths in Exchange 2007. Each transport server can have only one unreachable queue.

A

Unreachable queue

141
Q

Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of two wires that carry the data signals. PVC plastic insulation surrounds each wire. Two wires are twisted to reduce the effects of electromagnetic interference and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield. UTP cables are easier to work with and are less expensive than shielded cables.

A

Unshielded Twisted Pair (UTP)

142
Q

Update messages notify all routers in a network of any updates that have been made within the network.

A

Update messages

143
Q

Servers track directory changes using Update Sequence Numbers (USNs). Each server keeps track of the changes it has already received or made. When a server requests changes from another server, they compare USNs. If the numbers are the same, neither server makes any changes. If one server’s number is higher than another, the server with the lower number requests the changes corresponding to the higher numbers.
In Windows 2000, a USN is a server-specific 64-bit counter that increases each time that domain controller’s Active Directory database is updated. See also local update sequence number and originating update sequence number.

A

Update Sequence Number (USN)

144
Q

A server’s highest originating USN received from a particular originating domain controller. For example, if Server1 has received originating updates from Server6 corresponding to Server6’s local USN value 4653, then Server1’s up-to-date vector for Server6 is Server6-4653.

A

Up-to-date vector

145
Q

The address of a World Wide Web page, graphic file, or program file on the Internet. Each resource has an exclusive address (URL) that allows your computer to find and display it. The URL includes the code for the transfer protocol, plus the unique name of the Web server containing the page. For example, http://www.universal.com/widgets uses the Hypertext Transfer Protocol (http://) to connect to a specific server (www.universal.com) and display a specific Web page (/widgets).

A

URL (Uniform Resource Locator)

146
Q

A Universal Serial Bus (USB) is a type of media (cable and connectors) that interface between computer and external devices (hubs, audio players, joysticks, keyboards, telephones, scanners, and printers). A network can be created by linking USB cables between multiple computers.

A

USB (Universal Serial Bus)

147
Q

A user name and password that allows a user to log on to a domain or a local computer and gain access to resources.

A

User account

148
Q

The is a connectionless communications service that does not guarantee delivery of packets. Applications using UDP typically deliver small amounts of data and the application has the responsibility for reliable delivery.

A

User Datagram Protocol (UDP)

149
Q

The Windows NT tool used to manage the security for domains, member servers, and workstations. If the computer is not configured as a domain controller, User Manager is installed. Windows 2000 uses Active Directory Users and Computers instead.

A

User Manager for Domains

150
Q

A mode in which applications run. User mode confines each application to its own address space and does not allow any application to access the computer’s hardware directly.

151
Q

A file that specifies which Windows 2000 elements are loaded by the system when a user logs on. Included are program items, screen colors, network connections, printer connections, mouse settings, window size, and window position.
When a user logs on for the first time from a Windows-based client, the operating system creates a default profile for that user. A user profile can also be customized to restrict what users see in their interface and have available when they log on.

A

User profile

152
Q

The rights that a user has been granted to access files, printers, and applications in a Windows environment.

A

User rights

153
Q

An account policy in Windows NT that manages the assignment of rights to groups and user accounts.

A

User rights policy

154
Q

A the name given to a user’s account in a Windows environment. Each user account must have a username and password.

155
Q

A user in a local group is someone who has been given permission to access a network resource such as access to a folder, file, or printer.

156
Q

Servers track directory changes using Update Sequence Numbers (USNs). Each server keeps track of the changes it has already received or made. When a server requests changes from another server, they compare USNs. If the numbers are the same, neither server makes any changes. If one server’s number

A

USN (Update Sequence Number)

157
Q

Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of two wires that carry the data signals. PVC plastic insulation surrounds each wire. Two wires are twisted to reduce the effects of electromagnetic interference and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield. UTP cables are easier to work with and are less expensive than shielded cables.

A

UTP (Unshielded Twiste Pair)

158
Q

UUENCODE was the first widely-used format for binary attachments. It is still an alternative to MIME. It comes in several different flavors, due to different implementations, but it characteristically sends attachments as encoded 7-bit text strings.

159
Q

In the Registry, values contain the value name, the type of data the value uses, and the value. Both keys and subkeys can contain values.
In Active Directory, properties common to all objects contain values that correspond to a single user, computer, and so on.
Component that an NTVDM uses to intercept the calls an MS-DOS application makes to the computer’s hardware and send them to the Win32 system instead. The application behaves as if it interacts directly with the hardware device.

A

Values
VDD (Virtual Device Driver)

160
Q

A routing protocol that uses a vector of nearest routers to create a routing table.

A

Vector-based routing protocol

161
Q

A display system that is the standard for PC computers.

A

VGA (Video Graphics Array)

162
Q

A display system that is the standard for PC computers.

A

Video Graphics Array (VGA)

163
Q

Component that an NTVDM uses to intercept the calls an MS-DOS application makes to the computer’s hardware and send them to the Win32 system instead. The application behaves as if it interacts directly with the hardware device.

A

Virtual Device Driver (VDD)

164
Q

A feature of Microsoft Internet Information Server that lets you include information from other folders (besides the designated home directory) in your Web, FTP, and other sites without physically copying the material.

A

Virtual directory

165
Q

Use a switch to create virtual LANs (VLANs). The various ports on a switch can be assigned to a specific VLAN to create logically distinct networks on the same physical network topology.
VLANs reduce the likelihood of traffic interception because the switch creating the VLANs transmits traffic only over the specific port hosting the intended recipient of a message. Thus, eavesdropping on any given segment will reveal only the traffic occurring on that specific segment rather than from the entire network. VLANs decrease broadcast traffic and allow the connection of geographically separate systems into the same network. VLANs usually reduce collisions.

A

Virtual LAN (VLAN)

166
Q

A virtual link is a link that allows for discontinuous area 0s to be connected. Virtual links also all disconnected areas to be connected to area 0.

A

Virtual link

167
Q

A Windows technique of using hard disk space like RAM. Windows uses a paging file to store information that would otherwise be stored in RAM. Virtual memory allows you to run more applications simultaneously than your system’s RAM would normally allow.

A

Virtual memory

168
Q

A component of the virtual memory architecture in Windows NT. It intercepts data storage requests from an application, figures out how much space is needed for the data, then gives the data an unused memory address in either virtual or physical memory. With the VMM, an application does not have to keep track of how the physical memory is organized.

A

Virtual Memory Manager (VMM)

169
Q

Pagefile.sys. A file on a hard disk that Windows uses to transfer information in and out of RAM and virtual memory. Also called a swap file or a paging file.

A

Virtual memory page file

170
Q

Sometimes called a VPN. A VPN is the extension of a private network over a shared or public network such as the Internet. It makes use of encrypted and authenticated links that provide remote access and routed connections between private networks or computers.

A

Virtual private network

171
Q

Sometimes called a VPN. A VPN is the extension of a private network over a shared or public network such as the Internet. It makes use of encrypted and authenticated links that provide remote access and routed connections between private networks or computers.

A

Virtual Private Network (VPN)

172
Q

An independent Web, FTP, or other site hosted on a Microsoft Internet Information Server. You can configure each virtual server independently, as if it were a physically separate server.

A

Virtual server

173
Q

A virus is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found. Viruses are a serious threat to computer systems, especially if they are connected to the Internet. It is often a minimal requirement to have an anti-virus scanner installed on every machine of a secured network to protect against viruses.
E-mail is the most common means of virus distribution. Often viruses will employ self-contained SMTP servers to facilitate self-replication and distribution over the Internet. Viruses are able to spread quickly and broadly by exploiting the communication infrastructure of Internet e-mail. For this reason, it is important to keep your anti-virus software updated so as to block any possible attempt of viruses to infect your systems or to spread to other systems from your system.
Floppy disks, downloaded music files, and commercial software CDs all have the potential to spread viruses, but they are not as common as e-mail.

174
Q

A component of the virtual memory architecture in Windows NT. It intercepts data storage requests from an application, figures out how much space is needed for the data, then gives the data an unused memory address in either virtual or physical memory. With the VMM, an application does not have to keep track of how the physical memory is organized.

A

VMM (Virtual Memory Manager)

175
Q

A partition or several partitions you have formatted to use a file system such as FAT or NTFS.

176
Q

A method of combining areas on different hard drives into a single volume. Data fills each part of the volume before filling the next.

A

Volume set

177
Q

e Volume Shadow Copy Service (VSS) is a component of Windows Server 2003 that takes a point-in-time snapshot of files on the disk. By enabling VSS, you can quickly back up and restore files.

A

Volume Shadow Copy Servic (VSS)

178
Q

Sometimes called a VPN. A VPN is the extension of a private network over a shared or public network such as the Internet. It makes use of encrypted and authenticated links that provide remote access and routed connections between private networks or computers.

A

VPN (Virtual Private Network)

179
Q

A network whose computers and servers are geographically far apart but still connected.

A

WAN (Wide Area Network)

180
Q

WAP (Wireless Application Protocol) access points privacy, integrity, and authentication to wireless client devices and using WTLS (Wireless Transport Layer Security). WTLS is a wireless security services protocol. It protects data between the wireless hub/router/access point and all wireless NICs.

A

WAP (Wireless Application Protocol)

181
Q

A warm site is a fault tolerant strategy which provides a redundant work location. If a disaster renders a work site unusable, the effected organization may have a warm site in which to relocate. Warm sites have the following characteristics:
This is a facility readily available with power, A/C, and computers, but the applications may not be installed or configured.
Extra communications links and other data elements that commonly take a long time to order and install will be present.
The warm site is considerably cheaper than a hot (fully operational) site. Lower administrative and maintenance resources consumed.

182
Q

The well-known discretionary attribute is understood by all BGP implementations, but its presence is not mandatory.

A

Well-known discretionary attribute

183
Q

Also called commonly-used ports. Ports numbers below 256 are defined as commonly used ports. Some of these ports are 21 (FTP), 23 (Telnet), and 53 (Domain Name Service).

A

Well-known ports

184
Q

WEP (Wired Equivalent Privacy) was designed to provide wireless networks the same type of protection that cables provide on a wired network. WEP requires that authorized users have a valid WEP key to communicate with the access point. Likewise, cables provide this type of protection in that a client can only communicate with a hub or router if they have an active network cable connected to them.
On a wireless network that is employing WEP (Wired Equivalent Privacy), only users with the correct WEP key are allowed to authenticate through the WAP (Wireless Application Protocol) access points. That’s the whole point of WEP, to prevent unauthorized users by employing a wireless session key for access.

A

WEP (Wired Equivalent Privacy)

185
Q

A network whose computers and servers are geographically far apart but still connected.

A

Wide Area Network (WAN)

186
Q

An operating system that runs on client computers. It is not a networking operating system.

A

Windows 95

187
Q

An operating system that runs on client computers. It is not a networking operating system.

A

Windows 98

188
Q

A backup solution for Windows that allows you to transfer files to and from tape. You can either perform backups manually or schedule an unattended backup.

A

Windows Backup

189
Q

An operating system that runs on client computers. It is not a networking operating system.

A

Windows for Workgroups

190
Q

A file with the .MSI extension that contains software installation instructions and data for use with the Windows Installer service.

A

Windows Installer package

191
Q

A Windows 2000 service that uses Windows Installer packages (MSI files) to automate software installation and re-installation.

A

Windows Installer Service

192
Q

A component of Microsoft Windows NT Server that resolves NetBIOS names into IP addresses for computers and resources on the network using a dynamically-updated database.

A

Windows Internet Naming Service (WINS)

193
Q

An application that lets you use streaming audio, illustrated audio, and video to download real-time content from the Internet.

A

Windows Media Player

194
Q

An operating system from Microsoft that you can use for both client and server computers. The two types of Windows NT are Windows NT Server and Windows NT Workstation.

A

Windows NT

195
Q

A program that provides a graphical interface to view computer hardware and operating system information. It is used to gather information to help troubleshoot hardware and memory problems.

A

Windows NT Diagnostics

196
Q

The collective name for the Windows NT subsystems and components that run in kernel mode. These include the Executive Services, Microkernel, and HAL.

A

Windows NT Executive

197
Q

A desktop operating system that can function alone or also be part of a network in a workgroup or Windows NT Server domain environment.

A

Windows NT Workstation

198
Q

A scripting host that lets you run scripts, batch files, and command files from the command prompt or the Windows desktop.

A

Windows Scripting Host (WSH)

199
Q

Winsock provides a standard application programming interface to transport protocols such as TCP/IP and IPX. Network applications can use this interface to use the services of the TCP/IP protocol stack.

A

Windows socket service (Winsock)

200
Q

An NWLink API that provides an interface for communication between NetWare Loadable Modules (IPX/SPX sockets) and TCP/IP protocols.

A

Windows Sockets

201
Q

The Windows Sockets service provides a standard application programming interface (API) to different transport protocols such as IPX and TCP/IP. Applications that take advantage of this service are known as Windows Sockets applications.

A

Windows Sockets applications

202
Q

Win16 on Win32. A 32-bit program inside Windows NT that lets you run Win16 applications. WOW works inside an NTVDM.

A

Windows-on-Windows (WOW)

203
Q

A Microsoft Windows NT utility that is used to verify a TCP/IP configuration. For Windows 2000, use the IPCONFIG utility.

204
Q

The executable you use to install Windows 2000 on a computer that does not have a previous version of Windows 95, 98, or NT installed.

205
Q

The executable you use to re-install or upgrade Windows 2000 on a computer that already has Windows 95, 98, or NT installed.

A

Winnt32.exe

206
Q

A component of Microsoft Windows NT Server that resolves NetBIOS names into IP addresses for computers and resources on the network using a dynamically-updated database.

A

WINS (Windows Internet Naming Service)

207
Q

A Microsoft utility that is used to manage the Microsoft Windows Internet Name Service. With this utility, you can make configuration changes to your WINS server such as disabling logging or configuring static mappings.

A

WINS Manager

208
Q

Winsock provides a standard application programming interface to transport protocols such as TCP/IP and IPX. Network applications can use this interface to use the services of the TCP/IP protocol stack.

A

Winsock (Windows socket service)

209
Q

A tool used to attach cable connectors to bare wires (by crimping), such as when you are making your own cables.

A

Wire crimper

210
Q

Wireless networking uses radio waves or infrared light (with the air as the transmission medium) to send data between hosts. Wireless networks are common in homes, businesses, airports, and hotels. Most wireless networks connect into larger wired networks (such as LANs) which are in turn connected to the Internet.

211
Q

WAP (Wireless Application Protocol) access points privacy, integrity, and authentication to wireless client devices and using WTLS (Wireless Transport Layer Security). WTLS is a wireless security services protocol. It protects data between the wireless hub/router/access point and all wireless NICs.

A

Wireless Application Protocol (WAP)

212
Q

A peer-to-peer network where each Windows 2000 workstation is a member of a logical grouping of computers. The workgroup model has no central user account database or computer that validates a logon. Each Windows 2000 workstation in a workgroup must contain accounts for every person who needs to gain access to resources on that workstation. Workgroups are convenient for very small networks, but because there is no central database for maintaining accounts, administration is difficult.

213
Q

A backup technique that allows users to back up the critical information they store on their own local computer. Each computer needs its own backup device and storage media.

A

Workstation-only backup

214
Q

A graphically-based and user-friendly part of the Internet. You need a software application called an Internet browser (to view the information on the World Wide Web. The World Wide Web uses the Hypertext Transfer Protocol (HTTP) to connect a system of graphical pages, called Web sites, formatted using Hypertext Markup Language (HTML).

A

World Wide Web

215
Q

Pieces of software code written expressly to cause problems with servers and workstations by “tunneling” through the data and code on the hard drive. Worms are a type of computer virus.

216
Q

Win16 on Win32. A 32-bit program inside Windows NT that lets you run Win16 applications. WOW works inside an NTVDM.

A

WOW (Windows-on- Windows)

217
Q

A method of logging transactions. Using this method, the log is always written to disk before the data.

A

Write-ahead log

218
Q

A scripting host that lets you run scripts, batch files, and command files from the command prompt or the Windows desktop.

A

WSH (Windows Scripting Host)

219
Q

A text file that references a conventional setup program. The ZAP file can be distributed to network users using Active Directory-based Group Policy Objects (GPOs).
Zero Configuration Networking (Zeroconf) is a standards-based initiative of an IETF working groups whose goals are to:

A

ZAP File
Zeroconf

220
Q

A portion of the DNS namespace made up of a single domain or of a domain and subdomains that are administered as a single, separate entity.
A particular name server is responsible for each zone. The name server stores all address mappings for the domain name space with the zone. It also answers client queries for those names.

221
Q

The process of replicating updates to the zone information among multiple DNS servers. Regular zone transfers are necessary because as computers and other devices are added to or removed from a network, host names and IP addresses change.

A

Zone transfer