Vocab List - Module 3 Flashcards
Module 3
It is the average time in milliseconds between the transmission of a packet to a neighbor and the receipt of an acknowledgement.
Smooth Round Trip Time (SRTT)
Using multiple processors that share the same operating system and memory to process programs more quickly.
SMP (Symmetric Multiprocessing)
A Microsoft management utility that provides management for Windows NT servers.
SMS (Server Management Services)
The __________________ for transferring e-mail messages between hosts. ________ assumes that both host and client are constantly connected, but you can use both permanent and dial-up connections to an _______ host.
SMTP (Simple Mail Transfer Protocol)
A method of organizing e-mail messages. The default domain and local domains include e-mail addresses hosted on the local Microsoft Internet Information Server computer. Remote domains include e-mail addresses hosted on other SMTP computers.
SMTP service domains
A protocol suite that is a complete networking system, including proprietary hardware. __________ enables communication between IBM mainframes and terminals. It also interfaces with IBM Token Ring local area networks.
SNA (Systems Network Architecture)
A tool used through Microsoft Management Console (MMC). ____________ can be stand-alone (can be added to MMC by itself) or extension (can be added to MMC only to extend the function some other snap-in).
Snap-in
A simple protocol for managing TCP/IP networks. It is used to report the status of a host on a Windows TCP/IP network. Network equipment vendors developed ________ to let management software monitor network components.
Using ___________, programs called agents are loaded on to each network component. The agents monitor network traffic and other network components and compile the information in a management information base (MIB). Windows 2000 uses ___________ to check the status of another computer on a TCP/IP network.
SNMP (Simple Network Management Protocol)
An ____________ performs get, get-next, and set operations requested by a management system. An agent can be any computer running the SNMP agent software, usually a server or router.
SNMP agent
An ______ agent performs a trap, which is an alert that is sent to management systems for some event that has occurred with that device. This event could be excess traffic, password violations, or a hardware failure.
SNMP trap
It is a point in a network that provides subnetwork services, comparable to the layer 2 address corresponding to the NET or NSAP address.
The ________ is assigned by using one of the following:
The MAC address on a LAN interface.
The virtual circuit ID from X.25 or ATM connections.
The Data-Link Connection Identifier (DLCI) from Frame Relay connections.
SNPA (Subnetwork Point of Attachment)
__________________ is an attack where someone claims to be someone other than who they are. Attackers can assume any role within your organization or of anyone outside of your organization.
Their goal is to get you to disclose confidential or sensitive information verbally or to perform some action on the computer system that would grant the attacker access, such as changing a password based on a verbal request over the phone by someone claiming to be an offsite manager. Some common social engineering attacks are:
Dumpster diving – Going through someone’s trash to find private information.
Keyboard surfing – Observing sensitive information by looking over one’s shoulder.
Piggybacking – Gaining access into a secure facility by slipping in as an authorized visitor enters.
Phishing – Sending legitimate-looking e-mails designed to trick the recipient into divulging private information (often identity theft related activities).
The primary countermeasure to social engineering is awareness.
If users are unaware of the necessity for security in your organization and they are not properly trained to support and provide security, they are vulnerable to numerous social engineering exploits. Awareness training focused on preventing social engineering should include methods to authenticate personnel over the phone, assigning classification levels to information and activities, and educating your personnel on what information should not be distributed over the phone.
Social engineering
It is much like a file handle and functions as an endpoint for network communication. Each application creates a socket by specifying the IP address of the host, the type of service (connection oriented, connectionless), and the port that the application is using.
Sockets
A network share that stores software installation programs and/or data and from which software can be installed.
Software distribution point
A Windows Installer package (.MSI file) or ZAP file that is distributed to network users using an Active Directory-based Group Policy Object (GPO).
Software package
An application that can run only on the hardware platform for which it was originally compiled.
Source compatible
A replication partner that sends updates to a target replication partner.
Source replication partner
A volume on a dynamic disk that spans multiple physical drives. Spanned volumes are not fault tolerant and nor can you mirror spanned volume. In Windows NT 4.0, a spanned volume was called a volume set.
Spanned volume
It is a more secure version of PAP. _________ uses an encrypted password for authentication. Password encryption is easily reversible. _______ is required to be connected to a Shiva LAN Rover (proprietary).
SPAP (Shiva Password Authentication Protocol)
A program that explores links inside and outside a Web site. Also called a robot.
Spider
Using the _______________ (also called best information), routers keep track of where the information about a route came from. Routers do not report route information to the routers on that path. In other words, routers do not report information back to the router from which their information originated.
Split horizon
Using the ____________________ method (also called poison reverse or route poisoning), routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).
Split horizon with poison reverse
A query and programming language for databases, widely used with relational database systems. __________ translates what the user sees on the display to commands that the server can understand. IBM originally developed __________ as an English-like query language for entering, editing, and retrieving data in mainframes. There is now an ANSI-standard SQL definition.
SQL (Structured Query Language)
It is the average time in milliseconds between the transmission of a packet to a neighbor and the receipt of an acknowledgement.
SRTT (Smooth Round Trip Time)
It is a secure and acceptable alternative to remote control systems such as Telnet. SSH allows for secure interactive control of remote systems. SSH uses RSA public key cryptography for both connection and authentication. SSH uses the IDEA algorithm for encryption by default, but is able to use Blowfish and DES.
SSH is comprised of slogin, ssh, and scp.
SSH (Secure Shell)
A protocol that provides encryption for communication between the Internet servers and browser clients. It uses public/private key cryptography and digital certificates to verify users’ identities.
SSL (Secure Sockets Layer)
A _____________ allows any type of route information to enter or leave the area.
Standard area
An authoritative DNS server for a zone that contains a read-write copy of the zone file and can be updated directly. The updated zone information can then be replicated to secondary zones.
Standard primary zone
An DNS server that contains a read-only copy of the zone file. The zone information is updated by replication from other servers. Its zone file can then be replicated to other secondary zones.
Standard secondary zone
It is a Windows 2000 server that you have configured as an emergency backup server. It has Windows 2000 and all necessary components installed, but has not joined a domain.
Standby server
It is a network topology that uses a hub (or switch) to concentrate all network connections to a single physical location. Today it is the most popular type of topology for a LAN.
Star
A script that executes when a computer starts up.
Startup script
A router that is configured to communicate only with networks to which it has a configured interface. To route IP packets to other networks, each static router must be configured with either an entry in each router’s routing for each network in the internetwork or a default gateway address of another router’s local interface.
Static mapping
A __________ is a route that is manually configured to a remote destination. They can be used to reduce overall traffic because they do not require information to be generated.
_______________ are most commonly used to:
Define specific routes to use when routing information must be exchanged between two autonomous systems.
This eliminates the need for entire routing tables to be exchanged.
Define routes to destinations over a WAN link. This eliminates the need for a dynamic routing protocol.
Static route
It is an addressing method in which IP configuration information must be built and updated manually on each host by an administrator.
Static routing
A________________ is an out-of-the-computer storage option for large systems. Instead of storage devices being connected inside of a server (known as Direct Attached Storage (DAS)), storage devices are instead connected to the network and then associated with one or more servers. _________ allow for greater capacity storage than is possible with DAS, and support high data transfer rates and clustering to provide high availability.
Storage Area Network (SAN)
Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI.
A method of saving data by writing it in stripes across several different hard disks at once.
Stripe sets
A _________________ breaks data into units and stores the units across a series of disks (as opposed to a spanned volume that fills the first area with data, then the second area, and so on). Striped volumes:
Do not provide fault tolerance. A failure of one disk in the set means all data is lost.
Provide an increase in performance. Use two or more disks.
Have no overhead–all disk space is available for storing data.
Striped volume
___________ is a data protection method. Striping divides data into units and stores the units across a series of disks. Distributing the data removes the threat of losing all of the data in event of a single disk failure.
Striping
A query and programming language for databases, widely used with relational database systems. __________ translates what the user sees on the display to commands that the server can understand. IBM originally developed _______ as an English-like query language for entering, editing, and retrieving data in mainframes. There is now an ANSI-standard ________ definition.
Structured Query Langu (SQL)
A ____________ does not allow ASBR routes, so routes that are external to the OSPF routing process are not transmitted.
Stub area
_______________ is a topology in which the remote router forwards all traffic that is not local to a hub router.
Stub routing
A key inside another key in the Registry. __________ can contain more subkeys or values.
Subkeys
A physical segment in a TCP/IP environment that uses IP addresses created from a single network ID. The ___________ is created by partitioning the bits in the host ID into two parts. The first part is used to identify the segment as a unique network, and the other part is used to identify the hosts. Companies typically used subnetting because they exceeded the maximum number of hosts per segment with their IP address.
Subnet
The concept of blocking out a portion of the IP address so that TCP/IP can determine the network ID from the host ID. TCP/IP hosts use the subnet mask to determine whether the destination host is located on a local or remote network. Typically the subnet mask is 255.255.255.0.
Subnet mask
An Active Directory object that represents a TCP/IP subnet.
Subnet object
______________ is the division of a network address into multiple smaller subnets. For example, this allows a single Class B or Class C addresses to be divided and used by multiple organizations.
Subnetting
A _____________________ is a point in a network that provides subnetwork services; comparable to the layer 2 address corresponding to the NET or NSAP address. The SNPA is assigned by using one of the following:
The MAC address on a LAN interface.
The virtual circuit ID from X.25 or ATM connections.
The Data-Link Connection Identifier (DLCI) from Frame Relay connections.
The folders and subfolders contained inside the export directory you use for directory replication.
Subnetwork Point of Attachment (SNPA)
Subtree
A ___________ is the best route to a destination.
Successor route
_______________, combining multiple network addresses into a single larger subnet. For example, this allows multiple Class C addresses to be combined into a single network.
Supernetting
In Windows 2000 Server, a grouping of multiple DHCP scopes into a single unit. A superscope makes it possible to have multiple logical subnets on a single physical subnet. The individual scopes are called member scopes or child scopes.
Superscope
An on-demand virtual circuit that is maintained for the length of a conversation. When the conversation ends, the connection is released.
SVC (Switched Virtual Circuit)
A network device that works at the data link layer and allows each device to have higher bandwidth on the network. A switch can offer speeds of 10 to 100 megabits to the desktop.
Switch
A system of Digital Data Service (DDS) lines that are on-demand (dial-up) instead of leased and transfer data at a rate of 56 Kbps.
Switched 56
An on-demand virtual circuit that is maintained for the length of a conversation. When the conversation ends, the connection is released.
Switched Virtual Circuit (SVC)
Codes you can use at the command prompt when starting an application or installation program to customize the way the program runs. Also called command line switches.
Switches
Using multiple processors that share the same operating system and memory to process programs more quickly.
Symmetric Multiprocessing (SMP)
The mechanism by which domain controllers share directory changes and ensure that their information is accurate.
Synchronization
A GSNW or CSNW utility that lets you set up user accounts, define policies, and grant user permissions on a NetWare network from a Windows NT computer.
SYSCON
An executable file you can use during an unattended installation of Windows NT if you need to install an application that does not support scripted installations.
Sysdiff.exe
A hive in the Registry which includes information about the devices and services installed on the computer.
System hive
A text file containing the events that Windows 2000 components log, such as driver failures. You can use the Event Viewer to display the system log.
System log
A Windows 2000 tool that is used to monitor real-time and historical system performance, trends, bottlenecks, and the effects of system configuration changes.
System Monitor
The partition on the hard disk containing the boot files and hardware-specific files for the operating system.
System partition
A set of registry settings that controls what users can see and do on their Windows NT computers. System policies are used to control and manage desktop computers. You can use system policies to provide all users or computers with a uniform system policy, or customize settings for specific users, groups, and computers. Windows 2000 computers use Group Policy instead.
System policy
Poledit.exe. A graphical front-end to the registry included with Windows NT Server that allows you to make registry changes without using the registry editor.
System Policy Editor
The files containing the rules governing how a Windows NT client computer will display the desktop, use Control Panel options, access the network, and so on. Ntconfig.pol is a default system policy file. Windows 2000 computer use Group Policy Objects (GPOs) instead.
System policy files
System state data includes all the Windows 2000 system components and distributed services that Active Directory depends on.
System state data
The directory in which you installed the Windows 2000 operating system files.
Systemroot
A graphical representation of the contents of a backup tape. Windows 2000 automatically creates catalogs during backup and stores them on the tape. The tape catalog shows all the backup sets on a tape.
Tape catalog
A tape drive which can reads a magnetic storage tape, write data to it, and position it to receive data.
Tape device
An API that Windows 2000 communication applications use when they make calls over the telephone line. These calls can include data, fax, and voice.
TAPI (Telephony Application Programming Interface)
A replication partner that receives updates from a source replication partner. Also called a destination replication partner.
Target replication partner
Digital lines that carry data, digitized voice, and digitized video signals. A T- Carrier line multiplexes several channels on to a single physical communication medium. Each channel operates at 64 kilobits per second.
T-Carriers
A reliable protocol that divides data into packets, which the IP protocol then sends to other computers on the network.
TCP (Transmission Control Protocol)
TCP/IP is the protocol suite used on the Internet and on most networks. Nearly all computers today use TCP/IP for communication because it is highly scalable and routable.
TCP/IP
A Windows NT boundary layer that gives file system drivers a common programming interface so that they do not have to be tied to specific protocols.
A device you can use to examine the breaks and shorts in a network and identify their locations within a few feet. TDRs work by sending a sonar-like pulse down the cable. The pulse looks for shorts or breaks in the cable and reports their location.
TDI (Transport Driver Interface)
TDR (Time-Domain Reflectometer)
An employee who works outside the office, at home or on the road, and uses a network or the Internet to communicate with the office.
Telecommuter
An API that Windows 2000 communication applications use when they make calls over the telephone line. These calls can include data, fax, and voice.
Telephony Application Programming Interface (TAPI)
A protocol that emulates a terminal so you can log on to a remote computer. Also called Virtual Terminal Protocol.
Telnet
A user account template is a standard user account that you create to simplify creating accounts for other users with similar needs.
Template
A terminal with no processor. It accepts keystrokes and displays data from a mainframe computer. Also called a dumb terminal.
Terminal
This data transfer utility provides bi-directional file transfers between two TCP/IP hosts, where one is running the TFTP server software. No user authentication is required.
TFTP (Trivial File Transfer Protocol)
An online network sponsored by Microsoft. You can find answers to technical questions, read articles about Microsoft products, chat with other users, and much more.
The Microsoft Network (MSN)
Thicknet (sometimes called ThickWire) is a term for the larger size of coaxial cable used in Ethernet local area networks.
Thicknet
Thinnet (sometimes called ThinWire) is a term for the smaller size of coaxial cable used in Ethernet local area networks.
Thinnet
Thrashing is excessive paging. It occurs when the computer spends too much time passing pages between physical memory and the paging file on a hard drive. A symptom of thrashing is that the CPU is under-used but the I/O system is working exceptionally hard.
Thrashing
An object inside a process that runs program instructions. If an operating system allows it, multiple threads can run on different processors at the same time.
Thread
A process by which a TCP session is initialized. The purpose of the handshake is to synchronize the sending and receiving of segments, and to communicate to the other host the window size and segment size of data it is capable of receiving.
Three-way handshake
A timer in which determines how long each station of an FDDI network can keep the token. Each station has a THT.
THT (Token Holding Timer)
The process by which Win16 on Win32 (WOW) converts calls from 16-bit applications into 32-bit calls for Win32 functions.
Thunking
A device you can use to examine the breaks and shorts in a network and identify their locations within a few feet. TDRs work by sending a sonar-like pulse down the cable. The pulse looks for shorts or breaks in the cable and reports their location.
Time-Domain Reflectometer (TDR)
In computer networking, a token can be either a physical or a virtual object (often used to authenticate users). Security tokens can be in the form of code, PIN number, or devices like smartcards.
Token
A timer in which determines how long each station of an FDDI network can keep the token. Each station has a THT.
Token Holding Timer (THT)
Token passing is a mechanism that uses a digital pass card. Only the system holding the token is allowed to communicate.
Token passing
A network topology in which computers are connected in a closed ring. Tokens passed from one computer to another allow each computer to use the network.
Token Ring
A tombstone marks the fact that someone deleted an object in the directory. When you delete an object in the directory, that item is no longer part of directory replication. Instead, tombstones are replicated to servers to notify them to delete these objects.
Tombstone
The tombstone lifetime specifies how long a tombstone will exist before the garbage collection process deletes it as well. A tombstone lifetime should be long enough for directory replication to reach every server in your organization.
Tombstone lifetime
A tone generator sends an electronic signal on a wire or cable. Use a tone generator to locate the other end of a specific cable. Generate the tone on one end of the cable, then test the other ends of many cables until you detect the tone.
Tone generator
The physical layout of a network. Topology describes how the network’s computers are connected to each other. Common topologies include buses and rings.
Topology
A topology table is a record of the updates sent between neighboring routers when a new router is discovered.
Topology table
A totally stubby area does not allow ASBR routes or inter-area routes; only routes within its own specific area are allowed.
Totally stubby area
Traceroute is a Linux diagnostic utility that tests connectivity between devices, but as it does so it shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach, and be returned by that host.
Traceroute
A Microsoft diagnostic utility that verifies the route used from the local host to a remote host.
TRACERT
An entire operation consisting of multiple steps that must all be completed properly, or the entire transaction fails.
Transaction
The standard language for communicating between applications and SQL Server. It is an implementation of ANSI-standard Structured Query Language (SQL) that includes extensions such as stored procedures that make Transact- SQL a full programming language. Sometimes referred to as T-SQL.
Transact-SQL
digital signals from the network to digital data for the PC. Many transceivers are attached to network interface cards.
A file with the .MST extension that can be applied to a Windows Installer package (.MSI file) to customize it. Also called a software modification file.
Transform file
A transit area is an area that has more than one way into itself.
Transit area
Transit AS peering is the communication of information between all EBGP peers. This is optimal for scenarios in which an ISP allows their customers using BGP to access all their other customers using BGP.
Transit AS peering
A reliable protocol that divides data into packets, which the IP protocol then sends to other computers on the network.
Transmission Control Protocol (TCP)
In the realm of information technology, transmission media refers to the cables and wires through which signals (such as electric current or light impulse) are transmitted through a network.
Transmission Media (Media)
A Windows NT boundary layer that gives file system drivers a common programming interface so that they do not have to be tied to specific protocols.
Transport Driver Interface (TDI)
Layer 4 of the OSI reference model. This layer is responsible for reliable network communication between end nodes. The transport layer provides mechanisms for the establishment, maintenance, and termination of virtual circuits, transport fault detection and recovery, and information flow control. Corresponds to the transmission control layer of the SNA model. See also application layer, data link layer, network layer, physical layer, presentation layer, and session layer.
Transport Layer (OSI Model)
Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing
Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.
Transport policies
Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing
Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.
Transport policy actions
Transport policy agents apply transport policies to e-mails within an Exchange organization. There are two types of transport policy agents in Exchange 2007:
A Transport Rules agent runs on a Hub Transport server and implements policies set by administrators to all e-mail that travels in and out of an Exchange organization.
An Edge Rules agent runs on an Edge Transport server and helps control spam and unwanted mail flow within an organization.
Transport policy agents
Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing
Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.
Transport policy conditions
A type of protocol that allows two computers to communicate with each other. For example, TCP/IP and IPX/SPX are both transport protocols.
Transport protocol
Transport policies (also referred to as transport rules) provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization. Transport rules allow you to:
Apply corporate policies Apply compliance policies Apply content restraints Manage message routing
Each transport rule consists of three components:
Conditions identify the e-mail messages to which a transport policy action are applied.
Exceptions identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.
Actions modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.
Transport rules
Transport policy agents apply transport policies to e-mails within an Exchange organization. There are two types of transport policy agents in Exchange 2007:
A Transport Rules agent runs on a Hub Transport server and implements policies set by administrators to all e-mail that travels in and out of an Exchange organization.
An Edge Rules agent runs on an Edge Transport server and helps control spam and unwanted mail flow within an organization.
Transport Rules agent
With the triggered update method (also known as a flash updates), routers that receive updated (changed) information broadcast those changes immediately rather than waiting for the next reporting interval. With this method, routers broadcast their routing tables periodically, punctuated by special broadcasts if conditions have changed. This method reduces the convergence time.
Triggered update
This data transfer utility provides bi-directional file transfers between two TCP/IP hosts, where one is running the TFTP server software. No user authentication is required.
Trivial File Transfer Protocol (TFTP)
Pieces of software code written expressly to cause problems with servers and workstations. A Trojan horse conceals harmful code inside what looks like a harmless data string or program. Once it is inside a computer, however, it damages data or systems. A Trojan horse is a type of computer virus.
Trojan horses
The central cable connecting all of the nodes, either inserted directly into the trunk, or nodes tapping into the trunk using offshoot cables called drop cables. Commonly used in the physical bus topology.
Trunk Cable
A name server caches all of the information that it receives during a process known as iterative queries. The amount of time that the data is stored in cache is referred to as Time to Live. The name server administrator of the zone that contains the data determines the TTL for the data. This parameter can be adjusted. The TTL is a maximum hop count.
TTL (Time to Live)
A logical connection that carries encapsulated and possibly encrypted data. Encapsulation and encryption make the tunnel a secure and private link for users across a public network such as the internet.
Tunnel
Tunneling is used primarily to support private traffic through a public communication medium. The most widely known form of tunneling is VPN (Virtual Private Networking). A VPN establishes a secured communications tunnel through an insecure network connecting two systems.
Tunnels provide secure communications, they usually provide less than optimal throughput due to the additional overhead of encryption and maintaining the communications link. Tunnels are not directly associated with password theft or protection.
L2TP, PPTP, and IPSec are all VPN tunnel protocols.
Tunneling
A database containing supplementary information for a Windows 2000 answer file. For example, a UDF may contain the unique IDs, user data, and other information that varies for each installation.
The is a connectionless communications service that does not guarantee delivery of packets. Applications using UDP typically deliver small amounts of data and the application has the responsibility for reliable delivery.
UDF (Uniqueness Database File)
UDP (User Datagram Protocol)
A method of installing Windows 2000 using an answer file that automates the installation so you do not have to be physically present at the computer during the installation.
Unattended installation
A standardized convention used for describing network servers. UNC names start with two backslashes followed by the server computer name, and then the shared folder name. For example, \server_name\users\%username%
UNC (Universal Naming Convention)
Unicast is a transmission method in which packets are sent from a single host to a single host.
Unicast
The set of letters, numbers, and symbols that SQL Server recognizes in the nchar, nvarchar, and ntext data types. It includes characters for most languages. Unicode is related to character sets, but is not the same thing, having some 200 times as many possible values and requiring twice the storage space.
Unicode characters
The Unified Messaging server automates and integrates voice, e-mail, and fax communications in a single store within the Exchange environment which is accessible through either telephone or the computer. The Unified Messaging server communicates with an IP-based phone system which directs all voicemails to the Unified Messaging server. All voicemails are converted to windows media audio files which are then sent to the user’s Mailbox server and stored as attachments in an e-mail. The Unified Messaging server also supports voice-prompt calendar and planning services.
Unified Messaging server
The address of a World Wide Web page, graphic file, or program file on the Internet. Each resource has an exclusive address (URL) that allows your computer to find and display it. The URL includes the code for the transfer
Uniform Resource Locator (URL)
A power supply that is typically used on file servers to provide battery backup power in case of a power failure. The UPS provides power to a server until an emergency shutdown of the system can occur.
A database containing supplementary information for a Windows 2000 answer file. For example, a UDF may contain the unique IDs, user data, and other information that varies for each installation.
Uninterruptible Power Supply (UPS)
Uniqueness Database File (UDF)
A standardized convention used for describing network servers. UNC names start with two backslashes followed by the server computer name, and then the shared folder name. For example, \server_name\users\%username%
Universal Naming Convention (UNC)
A Universal Serial Bus (USB) is a type of media (cable and connectors) that interface between computer and external devices (hubs, audio players, joysticks, keyboards, telephones, scanners, and printers). A network can be created by linking USB cables between multiple computers.
Universal Serial Bus (USB)
An operating system invented at Bell Labs in 1969. UNIX is a non-proprietary operating system, so there are many independently-produced versions of UNIX, called “flavors.”
UNIX
A server running the line printer daemon (LPD) service, which allows you to print documents from a remote computer.
UNIX LPD print server
Unreachable queues hold messages that cannot be routed to their destination due to configuration changes or modified routing paths in Exchange 2007. Each transport server can have only one unreachable queue.
Unreachable queue
Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of two wires that carry the data signals. PVC plastic insulation surrounds each wire. Two wires are twisted to reduce the effects of electromagnetic interference and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield. UTP cables are easier to work with and are less expensive than shielded cables.
Unshielded Twisted Pair (UTP)
Update messages notify all routers in a network of any updates that have been made within the network.
Update messages
Servers track directory changes using Update Sequence Numbers (USNs). Each server keeps track of the changes it has already received or made. When a server requests changes from another server, they compare USNs. If the numbers are the same, neither server makes any changes. If one server’s number is higher than another, the server with the lower number requests the changes corresponding to the higher numbers.
In Windows 2000, a USN is a server-specific 64-bit counter that increases each time that domain controller’s Active Directory database is updated. See also local update sequence number and originating update sequence number.
Update Sequence Number (USN)
A server’s highest originating USN received from a particular originating domain controller. For example, if Server1 has received originating updates from Server6 corresponding to Server6’s local USN value 4653, then Server1’s up-to-date vector for Server6 is Server6-4653.
Up-to-date vector
The address of a World Wide Web page, graphic file, or program file on the Internet. Each resource has an exclusive address (URL) that allows your computer to find and display it. The URL includes the code for the transfer protocol, plus the unique name of the Web server containing the page. For example, http://www.universal.com/widgets uses the Hypertext Transfer Protocol (http://) to connect to a specific server (www.universal.com) and display a specific Web page (/widgets).
URL (Uniform Resource Locator)
A Universal Serial Bus (USB) is a type of media (cable and connectors) that interface between computer and external devices (hubs, audio players, joysticks, keyboards, telephones, scanners, and printers). A network can be created by linking USB cables between multiple computers.
USB (Universal Serial Bus)
A user name and password that allows a user to log on to a domain or a local computer and gain access to resources.
User account
The is a connectionless communications service that does not guarantee delivery of packets. Applications using UDP typically deliver small amounts of data and the application has the responsibility for reliable delivery.
User Datagram Protocol (UDP)
The Windows NT tool used to manage the security for domains, member servers, and workstations. If the computer is not configured as a domain controller, User Manager is installed. Windows 2000 uses Active Directory Users and Computers instead.
User Manager for Domains
A mode in which applications run. User mode confines each application to its own address space and does not allow any application to access the computer’s hardware directly.
User mode
A file that specifies which Windows 2000 elements are loaded by the system when a user logs on. Included are program items, screen colors, network connections, printer connections, mouse settings, window size, and window position.
When a user logs on for the first time from a Windows-based client, the operating system creates a default profile for that user. A user profile can also be customized to restrict what users see in their interface and have available when they log on.
User profile
The rights that a user has been granted to access files, printers, and applications in a Windows environment.
User rights
An account policy in Windows NT that manages the assignment of rights to groups and user accounts.
User rights policy
A the name given to a user’s account in a Windows environment. Each user account must have a username and password.
Username
A user in a local group is someone who has been given permission to access a network resource such as access to a folder, file, or printer.
Users
Servers track directory changes using Update Sequence Numbers (USNs). Each server keeps track of the changes it has already received or made. When a server requests changes from another server, they compare USNs. If the numbers are the same, neither server makes any changes. If one server’s number
USN (Update Sequence Number)
Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of two wires that carry the data signals. PVC plastic insulation surrounds each wire. Two wires are twisted to reduce the effects of electromagnetic interference and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield. UTP cables are easier to work with and are less expensive than shielded cables.
UTP (Unshielded Twiste Pair)
UUENCODE was the first widely-used format for binary attachments. It is still an alternative to MIME. It comes in several different flavors, due to different implementations, but it characteristically sends attachments as encoded 7-bit text strings.
UUENCODE
In the Registry, values contain the value name, the type of data the value uses, and the value. Both keys and subkeys can contain values.
In Active Directory, properties common to all objects contain values that correspond to a single user, computer, and so on.
Component that an NTVDM uses to intercept the calls an MS-DOS application makes to the computer’s hardware and send them to the Win32 system instead. The application behaves as if it interacts directly with the hardware device.
Values
VDD (Virtual Device Driver)
A routing protocol that uses a vector of nearest routers to create a routing table.
Vector-based routing protocol
A display system that is the standard for PC computers.
VGA (Video Graphics Array)
A display system that is the standard for PC computers.
Video Graphics Array (VGA)
Component that an NTVDM uses to intercept the calls an MS-DOS application makes to the computer’s hardware and send them to the Win32 system instead. The application behaves as if it interacts directly with the hardware device.
Virtual Device Driver (VDD)
A feature of Microsoft Internet Information Server that lets you include information from other folders (besides the designated home directory) in your Web, FTP, and other sites without physically copying the material.
Virtual directory
Use a switch to create virtual LANs (VLANs). The various ports on a switch can be assigned to a specific VLAN to create logically distinct networks on the same physical network topology.
VLANs reduce the likelihood of traffic interception because the switch creating the VLANs transmits traffic only over the specific port hosting the intended recipient of a message. Thus, eavesdropping on any given segment will reveal only the traffic occurring on that specific segment rather than from the entire network. VLANs decrease broadcast traffic and allow the connection of geographically separate systems into the same network. VLANs usually reduce collisions.
Virtual LAN (VLAN)
A virtual link is a link that allows for discontinuous area 0s to be connected. Virtual links also all disconnected areas to be connected to area 0.
Virtual link
A Windows technique of using hard disk space like RAM. Windows uses a paging file to store information that would otherwise be stored in RAM. Virtual memory allows you to run more applications simultaneously than your system’s RAM would normally allow.
Virtual memory
A component of the virtual memory architecture in Windows NT. It intercepts data storage requests from an application, figures out how much space is needed for the data, then gives the data an unused memory address in either virtual or physical memory. With the VMM, an application does not have to keep track of how the physical memory is organized.
Virtual Memory Manager (VMM)
Pagefile.sys. A file on a hard disk that Windows uses to transfer information in and out of RAM and virtual memory. Also called a swap file or a paging file.
Virtual memory page file
Sometimes called a VPN. A VPN is the extension of a private network over a shared or public network such as the Internet. It makes use of encrypted and authenticated links that provide remote access and routed connections between private networks or computers.
Virtual private network
Sometimes called a VPN. A VPN is the extension of a private network over a shared or public network such as the Internet. It makes use of encrypted and authenticated links that provide remote access and routed connections between private networks or computers.
Virtual Private Network (VPN)
An independent Web, FTP, or other site hosted on a Microsoft Internet Information Server. You can configure each virtual server independently, as if it were a physically separate server.
Virtual server
A virus is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found. Viruses are a serious threat to computer systems, especially if they are connected to the Internet. It is often a minimal requirement to have an anti-virus scanner installed on every machine of a secured network to protect against viruses.
E-mail is the most common means of virus distribution. Often viruses will employ self-contained SMTP servers to facilitate self-replication and distribution over the Internet. Viruses are able to spread quickly and broadly by exploiting the communication infrastructure of Internet e-mail. For this reason, it is important to keep your anti-virus software updated so as to block any possible attempt of viruses to infect your systems or to spread to other systems from your system.
Floppy disks, downloaded music files, and commercial software CDs all have the potential to spread viruses, but they are not as common as e-mail.
Virus
A component of the virtual memory architecture in Windows NT. It intercepts data storage requests from an application, figures out how much space is needed for the data, then gives the data an unused memory address in either virtual or physical memory. With the VMM, an application does not have to keep track of how the physical memory is organized.
VMM (Virtual Memory Manager)
A partition or several partitions you have formatted to use a file system such as FAT or NTFS.
Volume
A method of combining areas on different hard drives into a single volume. Data fills each part of the volume before filling the next.
Volume set
e Volume Shadow Copy Service (VSS) is a component of Windows Server 2003 that takes a point-in-time snapshot of files on the disk. By enabling VSS, you can quickly back up and restore files.
Volume Shadow Copy Servic (VSS)
Sometimes called a VPN. A VPN is the extension of a private network over a shared or public network such as the Internet. It makes use of encrypted and authenticated links that provide remote access and routed connections between private networks or computers.
VPN (Virtual Private Network)
A network whose computers and servers are geographically far apart but still connected.
WAN (Wide Area Network)
WAP (Wireless Application Protocol) access points privacy, integrity, and authentication to wireless client devices and using WTLS (Wireless Transport Layer Security). WTLS is a wireless security services protocol. It protects data between the wireless hub/router/access point and all wireless NICs.
WAP (Wireless Application Protocol)
A warm site is a fault tolerant strategy which provides a redundant work location. If a disaster renders a work site unusable, the effected organization may have a warm site in which to relocate. Warm sites have the following characteristics:
This is a facility readily available with power, A/C, and computers, but the applications may not be installed or configured.
Extra communications links and other data elements that commonly take a long time to order and install will be present.
The warm site is considerably cheaper than a hot (fully operational) site. Lower administrative and maintenance resources consumed.
Warm Site
The well-known discretionary attribute is understood by all BGP implementations, but its presence is not mandatory.
Well-known discretionary attribute
Also called commonly-used ports. Ports numbers below 256 are defined as commonly used ports. Some of these ports are 21 (FTP), 23 (Telnet), and 53 (Domain Name Service).
Well-known ports
WEP (Wired Equivalent Privacy) was designed to provide wireless networks the same type of protection that cables provide on a wired network. WEP requires that authorized users have a valid WEP key to communicate with the access point. Likewise, cables provide this type of protection in that a client can only communicate with a hub or router if they have an active network cable connected to them.
On a wireless network that is employing WEP (Wired Equivalent Privacy), only users with the correct WEP key are allowed to authenticate through the WAP (Wireless Application Protocol) access points. That’s the whole point of WEP, to prevent unauthorized users by employing a wireless session key for access.
WEP (Wired Equivalent Privacy)
A network whose computers and servers are geographically far apart but still connected.
Wide Area Network (WAN)
An operating system that runs on client computers. It is not a networking operating system.
Windows 95
An operating system that runs on client computers. It is not a networking operating system.
Windows 98
A backup solution for Windows that allows you to transfer files to and from tape. You can either perform backups manually or schedule an unattended backup.
Windows Backup
An operating system that runs on client computers. It is not a networking operating system.
Windows for Workgroups
A file with the .MSI extension that contains software installation instructions and data for use with the Windows Installer service.
Windows Installer package
A Windows 2000 service that uses Windows Installer packages (MSI files) to automate software installation and re-installation.
Windows Installer Service
A component of Microsoft Windows NT Server that resolves NetBIOS names into IP addresses for computers and resources on the network using a dynamically-updated database.
Windows Internet Naming Service (WINS)
An application that lets you use streaming audio, illustrated audio, and video to download real-time content from the Internet.
Windows Media Player
An operating system from Microsoft that you can use for both client and server computers. The two types of Windows NT are Windows NT Server and Windows NT Workstation.
Windows NT
A program that provides a graphical interface to view computer hardware and operating system information. It is used to gather information to help troubleshoot hardware and memory problems.
Windows NT Diagnostics
The collective name for the Windows NT subsystems and components that run in kernel mode. These include the Executive Services, Microkernel, and HAL.
Windows NT Executive
A desktop operating system that can function alone or also be part of a network in a workgroup or Windows NT Server domain environment.
Windows NT Workstation
A scripting host that lets you run scripts, batch files, and command files from the command prompt or the Windows desktop.
Windows Scripting Host (WSH)
Winsock provides a standard application programming interface to transport protocols such as TCP/IP and IPX. Network applications can use this interface to use the services of the TCP/IP protocol stack.
Windows socket service (Winsock)
An NWLink API that provides an interface for communication between NetWare Loadable Modules (IPX/SPX sockets) and TCP/IP protocols.
Windows Sockets
The Windows Sockets service provides a standard application programming interface (API) to different transport protocols such as IPX and TCP/IP. Applications that take advantage of this service are known as Windows Sockets applications.
Windows Sockets applications
Win16 on Win32. A 32-bit program inside Windows NT that lets you run Win16 applications. WOW works inside an NTVDM.
Windows-on-Windows (WOW)
A Microsoft Windows NT utility that is used to verify a TCP/IP configuration. For Windows 2000, use the IPCONFIG utility.
Winipcfg
The executable you use to install Windows 2000 on a computer that does not have a previous version of Windows 95, 98, or NT installed.
Winnt.exe
The executable you use to re-install or upgrade Windows 2000 on a computer that already has Windows 95, 98, or NT installed.
Winnt32.exe
A component of Microsoft Windows NT Server that resolves NetBIOS names into IP addresses for computers and resources on the network using a dynamically-updated database.
WINS (Windows Internet Naming Service)
A Microsoft utility that is used to manage the Microsoft Windows Internet Name Service. With this utility, you can make configuration changes to your WINS server such as disabling logging or configuring static mappings.
WINS Manager
Winsock provides a standard application programming interface to transport protocols such as TCP/IP and IPX. Network applications can use this interface to use the services of the TCP/IP protocol stack.
Winsock (Windows socket service)
A tool used to attach cable connectors to bare wires (by crimping), such as when you are making your own cables.
Wire crimper
Wireless networking uses radio waves or infrared light (with the air as the transmission medium) to send data between hosts. Wireless networks are common in homes, businesses, airports, and hotels. Most wireless networks connect into larger wired networks (such as LANs) which are in turn connected to the Internet.
Wireless
WAP (Wireless Application Protocol) access points privacy, integrity, and authentication to wireless client devices and using WTLS (Wireless Transport Layer Security). WTLS is a wireless security services protocol. It protects data between the wireless hub/router/access point and all wireless NICs.
Wireless Application Protocol (WAP)
A peer-to-peer network where each Windows 2000 workstation is a member of a logical grouping of computers. The workgroup model has no central user account database or computer that validates a logon. Each Windows 2000 workstation in a workgroup must contain accounts for every person who needs to gain access to resources on that workstation. Workgroups are convenient for very small networks, but because there is no central database for maintaining accounts, administration is difficult.
Workgroup
A backup technique that allows users to back up the critical information they store on their own local computer. Each computer needs its own backup device and storage media.
Workstation-only backup
A graphically-based and user-friendly part of the Internet. You need a software application called an Internet browser (to view the information on the World Wide Web. The World Wide Web uses the Hypertext Transfer Protocol (HTTP) to connect a system of graphical pages, called Web sites, formatted using Hypertext Markup Language (HTML).
World Wide Web
Pieces of software code written expressly to cause problems with servers and workstations by “tunneling” through the data and code on the hard drive. Worms are a type of computer virus.
Worms
Win16 on Win32. A 32-bit program inside Windows NT that lets you run Win16 applications. WOW works inside an NTVDM.
WOW (Windows-on- Windows)
A method of logging transactions. Using this method, the log is always written to disk before the data.
Write-ahead log
A scripting host that lets you run scripts, batch files, and command files from the command prompt or the Windows desktop.
WSH (Windows Scripting Host)
A text file that references a conventional setup program. The ZAP file can be distributed to network users using Active Directory-based Group Policy Objects (GPOs).
Zero Configuration Networking (Zeroconf) is a standards-based initiative of an IETF working groups whose goals are to:
ZAP File
Zeroconf
A portion of the DNS namespace made up of a single domain or of a domain and subdomains that are administered as a single, separate entity.
A particular name server is responsible for each zone. The name server stores all address mappings for the domain name space with the zone. It also answers client queries for those names.
Zone
The process of replicating updates to the zone information among multiple DNS servers. Regular zone transfers are necessary because as computers and other devices are added to or removed from a network, host names and IP addresses change.
Zone transfer