Network+ Exam Cram 2

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

sags

Samba 2nd

     Linux/Windows Server interoperability

SAS (single attached stations)

satellite Internet access

     one-way satellite systems

     propagation time

     two-way satellite systems

satellite Internet connections

     troubleshooting

satellites

     remote network connections

scheduling (antivirus software)

scopes

SCP (Secure Copy Protocol)

ScTP (screened twisted-pair) cable

SDH (Synchronous Digital Hierarchy)

SDSL (Symmetric DSL)

security

    antivirus software

         characteristics of, centralized virus management

         characteristics of, email vetting

         characteristics of, live updates

         characteristics of, real-time protection

         characteristics of, scheduling

         characteristics of, virus scanning

     AppleShare IP

     authentication

         biometrics

         passwords 2nd

         passwords, policies

         passwords, sharing

         passwords, strength of 2nd

         smartcards

     broadband

     encryption 2nd 3rd

         network traffic

         PKI (Public Key Infrastructure)

         presentation layer (OSI reference model)

         processors

         supported operating systems

         unencrypted client requests

    extranets

         characteristics of

         defining

    firewalls

         application gateway firewalls

         circuit-level firewalls

         firewalling proxy servers 2nd

         NAT (Network Address Translation)

         packet-filtering firewalls 2nd 3rd 4th 5th

         private networks

     FTP (File Transfer Protocol)

    HTTPS (Hypertext Transfer Protocol Secure)

         SSL (Secure Sockets Layer)

    intranets

         characteristics of

         defining

         example of

    Linux

         files/directories

         remote access 2nd

         user authentication

    NetWare (Novell)

         directories 2nd

         file systems 2nd 3rd

         file systems, attributes 2nd

         file systems, permissions

         resource access

         resource access, security equivalence

         user authentication

     port blocking 2nd

         network users

    protocols

         802.1x protocol 2nd

         IPSec (IP Security) protocol 2nd

         Kerberos

         L2TP (Layer 2 Tunneling Protocol) 2nd

         SSL (Secure Sockets Layer) protocol

         WEP (Wired Equivalent Privacy) protocol

         WPA (Wi-Fi Protected Access) protocol

     proxy servers

         caching proxy servers 2nd

         configuring

         firewalling proxy servers 2nd

         Internet access control 2nd

         NAT functions

     Telnet 2nd

     Windows servers 2nd

         file services, permissions 2nd

         passwords 2nd

         shares, permissions 2nd

     wireless devices

    wireless network communications

         authentication

         encryption

security equivalence

self-assessments

     educational background 2nd

     exam readiness, testing 2nd

     hands-on experience 2nd

    ideal Network+ candidates

         qualifications of 2nd

server clustering 2nd

servers

    fault tolerance

         server clustering 2nd

         stand-by servers 2nd

     heartbeats

     stand-by servers

         failover configuration

serves

     primary server configurations

session layer (OSI reference model) 2nd

SFTP (Secure File Transfer Protocol)

shared bandwidth

shared key authentication

shares (Windows servers)

     permissions 2nd

sharing

     passwords

signal quality (wireless networks), troubleshooting 2nd 3rd 4th

simplex dialog mode

single-mode fiber-optic cable

SLIP (Serial Line Internet Protocol) 2nd

     remote network connections

slipstreaming

smartcards

SMB (Server Message Blocks) 2nd

SMB/CIFS (Server Message Blocks/Common Internet File System) protocols

SMTP (Simple Mail Transfer Protocol)

SNMP (Simple Network Management Protocol)

     SNMP management system

SNMP (Simple Network Management Protocol) management system

     NMS (Network Management System)

software (antivirus)

    characteristics of

         centralized virus management

         email vetting

         live updates

         real-time protection

         scheduling

         virus scanning

SOHO (Small Office/Home Office) routers

     configuring

     remote connectivity, troubleshooting 2nd

solution documentation (troubleshooting steps/procedures) 2nd

solution results/effects identification (troubleshooting steps/procedures)

SONET

     OC (Optical Carrier) levels 2nd

source route bridges

SPAP (Shiva Password Authentication Protocol)

speed [See data transmission rates]

spikes

split horizons (routing loops)

spread spectrum technology

    DSSS (direct sequence spread spectrum)

         chips

     FHSS (frequency hopping spread spectrum)

     OFDM

spyware

    trojan horses

         worms; virus hoaxes [See also viruses]

SSH (Secure Shell)

SSID (service set identifiers) 2nd

SSID (Service Set Identifiers)

     troubleshooting 2nd

SSL (Secure Sockets Layer)

     HTTPS (Hypertext Transfer Protocol Secure)

SSL (Secure Sockets Layer) protocol

stand-by servers

     failover configuration

standard user accounts

     Mac OS X server security

standards

     IEEE 802 network standards

         802.11 standards 2nd 3rd

         802.11 standards, IEEE 802.11a 2nd

         802.11 standards, IEEE 802.11b 2nd 3rd

         802.11 standards, IEEE 802.11g 2nd

         802.3 standards 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

         802.5 standards 2nd 3rd 4th 5th

         LLC (Logical Link Control) standards

star topologies

     troubleshooting

state information heading (netstat diagnostic utility)

states (LED visual indicators)

static addressing

static routing environments 2nd

storage

     backups 2nd

store-and-forward switching environments

STP (shielded twisted-pair) cable

strong passwords

subnet masks 2nd

     IP addresses 2nd

     private address ranges

subnetting 2nd

Supervisor permission (NetWare)

support

    application support

         Linux 2nd

         NetWare (Novell)

         Windows servers

    client support

         Linux

         NetWare (Novell)

         Windows servers 2nd

surges 2nd

switches 2nd 3rd

     crossover cables 2nd

     cut-through switching environments

     FragmentFree-switching environments

     full-duplex dialog mode

     MDI (Medium Dependant Interface) ports

     OSI (Open Systems Interconnect) reference model maps

     stone-and-forward switching environments

     troubleshooting

     versus hubs

symptom identification (troubleshooting steps/procedures)

Категории