MCSE 70-293 Exam Prep: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

p parameter

       route command   2nd  

p Period parameter

       pathping command  

P-nodes  

packets

       ICMP

               blocking  

       multicast  

padding field

       ESP  

padding length field

       ESP  

PAP

       remote users  

PAP (Password Authentication Protocol)  

parameters

       4

               pathping command  

               tracert command  

       6

               pathping command  

               tracert command  

       a

               ping command  

       command

               route command  

       d

               tracert command  

       destination  

               route command  

       f

               ping command  

               route command   2nd  

       g HostList

               pathping command  

       gateway  

               route command  

       h maximum hops

               tracert command  

       h MaximumHops

               pathping command  

       i IPAddress

               pathping command  

       I TTL

               ping command  

       IF

               route command  

       interface

               route command  

       j HostList

               ping command  

       k HostList

               ping command  

       l size

               ping command  

       mask  

       MASK

               route command  

       metric  

       METRIC

               route command  

       n

               pathping command  

       n count

               ping command  

        netmask

               route command  

       NLB clusters   2nd  

       p

               route command   2nd  

       p Period

               pathping command  

       pathping command  

       ping command  

       q NumQueries

               pathping command  

       R

               tracert command  

       r count

               ping command  

       route command  

       s count

               ping command  

       S srcaddr

               tracert command  

       secedit /analyze   2nd  

       secedit /configure   2nd  

       t

               ping command  

       target name

               tracert command  

       TargetName

               pathping command  

       tracert command  

       v TOS

               ping command  

       w Timeout

               pathping command  

       w timeout

               ping command  

               tracert command  

params command

       NLB monitoring  

parent CAs  

partner types (replication)  

Password Authentication Protocol.   [See PAP]

passwords

       users  

pathping

       name resolution, troubleshooting   2nd  

pathping command

       parameters  

       TCP/IP routing, troubleshooting   2nd   3rd  

paths

       counter logs  

PEAP (Protected Extensible Authentication Protocol)  

Perfect Forward Secrecy.   [See PFS]

performance

       baselines  

       counters  

       instances  

       monitoring   2nd   3rd   4th   5th   6th  

               baselines   2nd  

               bottlenecks   2nd  

               bottlenecks.   [See bottlenecks, monitoring]

               case study   2nd  

               counters   2nd  

               daily   2nd   3rd   4th   5th  

               monitoring stations , creating  

               Performance console   2nd  

               System Monitor   2nd   3rd  

               tips and tricks   2nd  

       objects  

Performance console

       performance monitoring   2nd  

       tips and tricks   2nd  

Performance Monitor  

periodic monitoring  

permissions

       Active Directory   2nd  

       administrators  

       authenticated users  

       creator owners  

       DmsAdmins  

       Domain Admins  

       Enterprise Admins  

       Enterprise Domain Controllers  

       Everyone  

       groups  

       Pre-Windows 2000  

       System  

       users  

Permit action  

Permit action (security)  

PFS (Perfect Forward Secrecy)  

PGP (Pretty Good Privacy)  

physical addresses

       TCP/IP networks  

Physical DiskCurrent Disk Queue Length counter  

Physical DiskDisk Reads/sec counter  

Physical DiskDisk Writes/sec counter  

Physical DiskSplit IO/sec counter  

ping

       name resolution, troubleshooting   2nd  

       Web site  

ping command

       default gateways  

       Internet connectivity  

       parameters  

       TCP/IP routing, troubleshooting   2nd   3rd  

       Web site  

PKI

       CAs  

               Enterprise   2nd  

               Enterprise, configuring   2nd  

               installing   2nd   3rd  

                names  

               Standalone   2nd   3rd  

               third-party  

       certificate templates, managing   2nd  

       certificates   2nd  

                autoenrollment   2nd   3rd  

               enrollment   2nd  

                requests   2nd   3rd  

               requests/renewal   2nd  

       CRL publication configuration   2nd   3rd  

       Enterprise Root CA installation   2nd   3rd  

       planning

               CA hierarchies   2nd  

               CA types   2nd   3rd   4th   5th   6th   7th  

               certificate revocation/renewal   2nd   3rd  

               certificate templates   2nd  

       smart cards  

               certificate templates  

               distribution requirements   2nd  

               enrollment   2nd  

                Group Policy options   2nd  

               readers   2nd  

               supported  

                user education   2nd  

PKI (Public Key Infrastructure)  

planning

       DNS

               forwarding configuration   2nd   3rd   4th   5th  

               security.   [See security, DNS]

       DNS namespaces   2nd   3rd   4th   5th   6th  

       DNS zones   2nd   3rd   4th   5th  

               database files;database files  

       PKI

               CA hierarchies   2nd  

               CA types   2nd   3rd   4th   5th   6th   7th  

               certificate autoenrollment   2nd   3rd  

               certificate enrollment   2nd  

               certificate requests   2nd   3rd  

               certificate requests/renewal   2nd  

               Certificate revocation/renewal   2nd   3rd  

               Certificate templates   2nd  

               smart cards   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       routing   2nd  

       security

               change and configuration management framework   2nd  

       security monitoring   2nd   3rd  

       SUS   2nd   3rd   4th  

point-to-point networks  

point-to-point nodes  

Point-to-Point Protocol.   [See PPP]

Poison Reverse service  

policies

       account

               configuring  

       Account Lockout  

       auditing   2nd  

       Baseline  

       central Internet Authentication Service  

       client

               IPSec  

       Domain  

       Enterprise Client  

       failover

               configuring  

               MSCS clusters   2nd  

       group  

       Group Policy, creating   2nd  

       High Security  

       IPSec   2nd   3rd   4th  

               assigning  

               Custom Transfer Mode.   [See Custom Transfer Mode IPSec policy]

               custom, creating   2nd   3rd   4th  

               custom, creating.   [See customizing, IPSec policies]

               Secure Server (Require Security)   2nd   3rd  

       Legacy Client  

       local

               configuring  

       local Internet Authentication Service  

       remote access   2nd   3rd   4th   5th  

               authentication  

               connections  

               encryption  

               groups  

               names  

       Role-Specific  

       secure server

               IPSec  

       security  

       server

               IPSec  

       WLAN

               configuring   2nd  

               creating   2nd  

Policy Configuration Method dialog box  

Policy Encryption Level dialog box  

port rules   2nd  

       filtering  

       NLB clusters  

Port Rules dialog box  

ports

       rule filtering  

       switch port flooding  

power

       uninterruptible power supplies  

power conditioning  

PPP (Point-to-Point Protocol)  

practice exams

       taking   2nd  

practice tests  

Pre-Windows 2000

       permissions  

Preconfigured Security Template icons  

prefixes (IP)  

PrepLogic

       contacting  

       customer service  

       feedback  

PrepLogic Practice Exams, Preview Edition   2nd  

       deleting  

       Flash Review Mode  

       installing  

       interface design  

       license agreement  

       question quality  

       requirements   2nd  

       reviewing  

       standard options  

       starting   2nd  

       time remaining  

       Wxamination Score Report  

Pretty Good Privacy.   [See PGP]

Previous Versions tab (Properties dialog box)  

principle of least privilege  

principle of least privilege (users)  

private IP addresses   2nd   3rd   4th  

private/public key pair settings (CAs)   2nd  

privileges

       auditing   2nd  

processes

       tracking

               auditing  

processing

       GPOs   2nd  

Processor% Processor Time counter  

ProcessorInterrupts/sec counter  

processors

       counters  

profiles

       remote access  

               authentication  

               connections  

               dial-in constraints   2nd  

               encryption  

               IP protocol  

               Multilink options   2nd  

properties

       dial-in (remote access)   2nd  

       DNS servers   2nd  

       IKE

               IPSec policies   2nd  

       IP configuration

               viewing  

       IP filter

               custom IPSec policies   2nd  

Properties dialog box

       Previous Versions tab  

Proposed Cluster Configuration dialog box  

Protected Extensible Authentication Protocol.   [See PEAP]

protocols

       border  

       CHAP   2nd  

               remote users  

       Distance Vector   2nd  

               RIP   2nd   3rd   4th   5th   6th   7th  

               RIP.   [See RIP]

               RIPv2  

               silent RIP   2nd  

       DVMRP  

       EAP   2nd  

               remote users  

       ESP   2nd   3rd   4th  

       ICMP  

       IGMP   2nd   3rd   4th  

       Internet   2nd  

       IpSec

               NAT  

       IPX/SPX   2nd  

       ISAKMP/IKE   2nd  

       L2TP   2nd  

       Link State   2nd  

               OSPF   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

               OSPF.   [See OSPF]2nd   [See OSPF]3rd   [See OSPF]

       Link State routing  

       MD5  

       MOSPF  

       MPPE  

       MS-CHAP  

               remote users  

       MS-CHAP v2

               remote users  

       multicast routing  

       NetBIOS   2nd  

       networks  

               IPX/SPX  

               NetBIOS  

               SNA  

       OSPF   2nd   3rd  

               bandwidth  

               hello packets  

               hellos  

               link state advertisements  

               LSAs  

               network divisions  

               scalability  

                subnetted networks  

       PAP

               remote users  

       PPP  

       RDP  

       RIP   2nd  

               bandwidth  

               router hops  

               security  

               subnetted networks  

               version 2  

       routing

               OSPF   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

               OSPF.   [See OSPF]2nd   [See OSPF]3rd   [See OSPF]

               RIP   2nd   3rd   4th   5th   6th   7th   8th  

               RIP.   [See RIP]

               RIPv2  

               silent RIP   2nd  

       SNA   2nd  

       SPAP  

               remote users  

       TCP/IP   2nd   3rd  

               NLB cluster settings  

               testing   2nd  

               troubleshooting  

       UDP  

proxies

       WINS  

proxy servers  

Public and Private Key Pair dialog box  

public IP addresses   2nd   3rd  

Public Key Infrastructure.   [See PKI]

public/private key pair settings (CAs)   2nd  

publishing

       CRLs   2nd   3rd   4th   5th  

pull replication   2nd  

       manually performing  

push replication   2nd  

       manually performing  

Категории