MCSE 70-293 Exam Prep: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

n count parameter

       ping command  

n parameter

       pathping command  

name caches

       NetBIOS

               viewing  

name resolution

       BIND   2nd  

               versions  

       DNS   2nd   3rd  

               forwarders   2nd  

               forwarding configuration   2nd   3rd   4th   5th  

               FQDN  

               FQDNs   2nd  

               hierarchies   2nd   3rd  

               iterative queries  

               local resolver caches, purging  

               name restrictions  

               namespace, planning   2nd   3rd   4th   5th  

               namespaces   2nd   3rd  

               queries  

               recursive queries  

                resolvers   2nd   3rd   4th  

               security   2nd   3rd  

               security.   [See security, DNS]

               slave servers   2nd  

               third-party solutions   2nd  

               TLDs   2nd  

               zones   2nd   3rd   4th   5th   6th  

               zones, planning   2nd   3rd   4th   5th  

       NetBIOS   2nd   3rd   4th  

               name cache, viewing  

               name table, viewing  

       troubleshooting  

               ipconfig   2nd   3rd  

               nbstat   2nd  

               nslookup   2nd  

               pathping   2nd  

               ping   2nd  

               tracert   2nd  

       WINS   2nd   3rd   4th   5th   6th   7th  

               client computers  

               multicasting  

               non-WINS client computers  

               proxies  

               replication   2nd   3rd   4th  

               servers  

               Windows 2003   2nd  

name tables

       NetBIOS

               viewing  

names

        backups  

       CAs  

       counter logs  

       custom IPSec policies  

       DNS

               restrictions  

       remote access policies  

namespaces

       DNS

               delegated  

               existing  

               planning   2nd   3rd   4th   5th   6th  

               restrictions  

               unique  

NAT  

       Internet connections  

       troubleshooting  

NAT (Network Address Translation)   2nd  

NBMA (nonbroadcast multi-access)  

nbstat

       name resolution, troubleshooting   2nd  

NBT (NetBIOS over TCP/IP)  

Negotiate Security action  

Negotiate Security action (security)  

nesting

       OUs

               GPOs   2nd  

NET (network providers)   2nd  

NetBEUI (NetBIOS Extended User Interface)  

NetBIOS   2nd   3rd   4th   5th  

       name cache, viewing  

       name table, viewing  

NetBIOS (Network Basic Input/Output System)   2nd  

NetBIOS Extended User Interface.   [See NetBEUI]

NetBIOS over TCP/IP.   [See NBT]2nd   [See NetBT]

NetBT (NetBIOS over TCP/IP)  

netmask parameter

       route command  

netsh command  

       TCP/IP routing, troubleshooting   2nd  

Network Access Quarantine Control   2nd  

network adapeters

       clustering  

network adapter Properties dialog box  

network adapter Status dialog box  

network adapters

       clusters  

Network Address Translation.   [See NAT]2nd   [See NAT]

Network Basic Input/Output System.   [See NetBIOS]2nd   [See NetBIOS]

network identifiers  

Network Interface Cards.   [See NICs]

Network InterfaceBytes Total/sec counter  

Network Load Balancing Manager  

Network Load Balancing Manger.   [See NLB Manager]

network load balancing.   [See NLB]2nd   [See NLB]

Network Monitor   2nd   3rd  

       driver  

Network Monitor command

       TCP/IP routing, troubleshooting   2nd  

Network Properties tab (New Preferred Setting Properties dialog box)  

network providers (.NET)  

Network Type dialog box  

networks

       areas  

       bottlenecks   2nd  

       classes  

       communication  

       counters  

       high availability  

        multiaccess  

       NBMA  

       point-to-point  

       protocols  

               IPX/SPX  

               NetBIOS  

               SNA  

       reconvergence  

       redundancy  

       redundant infrastructures  

       remote access  

               Network Access Quarantine Control  

               Secure User Authentication  

       Remote Assistance  

               requesting  

       Remote Desktop for Administration  

               connections  

               restrictions  

       resource placement  

       resources   2nd  

       security  

       TCP/IP   2nd  

               default gateways  

               DoD model  

               firewalls  

               fundamentals   2nd   3rd  

               IP address configuration  

               IP address requirements   2nd  

               IP address routing   2nd  

               IP address scope  

               IP addresses   2nd   3rd   4th   5th   6th   7th   8th   9th  

               Layer 3 switches  

               NAT  

               NICs  

               OSI model  

               physical addresses  

               private IP addresses   2nd   3rd  

               proxy servers  

               public IP addresses   2nd  

               subnet masks  

               troubleshooting   2nd   3rd   4th   5th  

               unique IP addresses  

       traffic

               broadcast  

               monitoring   2nd  

               multicast  

               unicast  

       traffic, monitoring   2nd  

       troubleshooting

               netsh command   2nd  

New Interface for RIP Version 2 for Internet Protocol dialog box  

New Preferred Setting Properties dialog box  

       IEEE 802.1x tab  

       Network Properties tab  

New Remote Access Policy Wizard  

next header field

       AH  

       ESP  

next hop addresses  

NICs  

NICs (Network Interface Cards)  

NLB

       clusters

               filtering   2nd  

               multicast method  

               nodes  

               port rule filtering  

               unicast method  

NLB (network load balancing)   2nd  

NLB clusters   2nd  

       creating   2nd   3rd   4th   5th   6th  

       creating exercise   2nd  

       creation exercise   2nd  

       filtering   2nd  

       IGMP support  

       IP addresses  

       load balancing adapters  

       monitoring   2nd   3rd  

       network adapeters  

       network adapters  

       nodes, adding   2nd   3rd   4th   5th  

       operation mode   2nd  

       parameters   2nd  

       port rules   2nd   3rd  

       switch port flooding  

       TCP/IP settings  

NLB Manager  

nlb.exe command  

no terminal server use SID template  

nodes  

       Account Policies  

       adding

               MSCS clusters   2nd   3rd   4th  

               NLB clusters   2nd   3rd   4th   5th  

       B-nodes  

       cluster

               evicting  

       cluster failure, recovering   2nd   3rd  

       defined  

       Event Log  

       File System  

       H-nodes  

       Local Policies  

       M-nodes  

       NLB clusters  

       P-nodes  

       Registry  

       Restricted Groups  

       System Services  

Non-WINS client computers  

nonbroadcast multi-access  

nonprofit /noncommercial establishments (.ORG)  

normal backups  

Novice control buttons (Remote Assistance)   2nd  

nslookup

       name resolution, troubleshooting   2nd  

numbering systems

       counter logs  

Категории