Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

AAL (ATM Adaption Layer)  

AC (alternating current)  

Academic Source Release (ASR)  

Accelerated Graphics Port (AGP)  

Accent Points

        dual-mode   2nd  

acceptable use statements

       network security   2nd   3rd   4th   5th  

access

       Anonymous Access  

       Arbitrated Loops  

       CSMA/CD   2nd  

       databases

               X.500   2nd   3rd   4th   5th   6th   7th  

       dial-in

               allowing  

       LDAP   2nd   3rd   4th   5th  

       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  

        methods

               token-passing bus   2nd  

               Token-Ring   2nd  

       NBMA (nonbroadcast mulitple access)  

       NetWare  

       NTFS  

               Windows NT  

       R-utilities   2nd   3rd  

       share-level permissions   2nd  

               Windows 95/98   2nd  

               Windows NT  

       shared network media  

       SMB   2nd   3rd   4th   5th   6th   7th   8th  

       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  

        user -level permissions   2nd  

               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       users

               limiting time   2nd  

       VPN (virtual private network)   2nd   3rd  

       Web-based printers folders

               managing   2nd   3rd   4th   5th  

       Windows NT

               adding users to groups   2nd  

               assigning group memberships   2nd  

               built-in user groups   2nd   3rd  

               creating user groups   2nd   3rd  

               groups   2nd  

               managing user accounts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       wireless networking

               selecting locations   2nd   3rd   4th  

       workstations

               limiting   2nd  

Access Code field  

Access Control List (ACL)   2nd   3rd  

       routers  

Access Control Lists (ACLs)  

access control mechanisms (network security)  

       auditing   2nd  

       identifying users   2nd   3rd  

               passwords   2nd   3rd   4th   5th   6th   7th  

       resource protections  

Access Points   2nd   3rd  

access points (APs)   2nd   3rd   4th   5th  

Account Information dialog box   2nd   3rd   4th   5th   6th  

account lockouts

       passwords  

Account Policy dialog box   2nd  

accounts

       Account Information dialog box   2nd   3rd   4th   5th  

       computers

               managing   2nd   3rd   4th  

       generic

               naming  

       interdomain trust relationships   2nd   3rd   4th  

               creating   2nd   3rd   4th   5th  

       time

               limiting   2nd  

       tracking  

       user

               searching   2nd   3rd  

       users

               complete trust models   2nd  

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

               moving between Linux/NetWare   2nd   3rd  

               Unix   2nd   3rd   4th  

       Windows NT

               creating  

       workstations

               limiting   2nd  

ACK ( Acknowledgement )   2nd  

ACK (acknowledgement)  

acknowledgement (ACK)  

Acknowledgment (ACK)   2nd  

ACL (Access Control List)   2nd   3rd  

       routers  

ACL (Asynchronous Connection-Less)   2nd  

ACLs (Access Control Lists)  

ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  

ACPI (Advanced Configuration and Power Management Interface)  

ACR (attenuation to cross talk ratio)  

acronyms   2nd   3rd   4th  

ACT (Access Control Commands)   2nd  

Action menu

       Event Viewer   2nd   3rd   4th   5th  

       MMC   2nd   3rd   4th   5th   6th   7th   8th  

               configuring properties   2nd  

       MMC (Microsoft Management Console)   2nd  

       WINS

               managing   2nd   3rd   4th   5th   6th  

Active Directory  

       ADSI (Active Directory Service Interface)   2nd  

               DC (domain controller)   2nd  

               directory-aware application programming   2nd  

               member servers   2nd  

       application of  

       attributes   2nd  

       DDNS (Dynamic DNS)   2nd  

       directory services   2nd  

       DNS (Domain Name System)  

       domain models   2nd  

       global catalog

               summarizing data   2nd  

       groups   2nd   3rd   4th  

       managing  

       migration

               implementing   2nd   3rd   4th  

               joining trees  

               master domain model   2nd   3rd   4th   5th  

               upgrading BDCs   2nd  

               upgrading PDCs   2nd   3rd   4th   5th  

       objects   2nd   3rd   4th  

               naming   2nd   3rd  

               searching   2nd   3rd   4th   5th   6th   7th   8th   9th  

               standard   2nd   3rd   4th   5th  

       partitioning   2nd  

       replicating   2nd   3rd  

       schema   2nd   3rd   4th   5th   6th   7th  

               modifying   2nd   3rd   4th   5th   6th   7th   8th   9th  

       sites

               managing large enterprises  

       standards   2nd   3rd   4th   5th  

       trees   2nd   3rd   4th  

       Windows 2003 Server   2nd  

               installing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

Active Directory Computers and Users snap-in   2nd   3rd  

Active Directory Migration Tool (ADMT)  

Active Directory Service Interface (ADSI)   2nd  

       DC (domain controller)   2nd  

       directory-aware application programming   2nd  

       member servers   2nd  

Active Directory Service Interface.   [See ADSI]

Active Directory Service Interfaces (ADSI)  

Active Directory Users and Computers command (Start menu)  

Active Dorectory

       objects   2nd  

       services   2nd  

active hubs   2nd   3rd   4th   5th   6th  

       ARCnet  

active mode  

active monitor  

active open connections  

ActiveState ActivePerl 5.6  

ad hoc wireless networks  

ad-hoc networks

       wireless networking   2nd   3rd   4th  

adapter cards  

       10Base-2 networks   2nd   3rd   4th   5th   6th  

       ARCnet   2nd  

adapters

       networks

               troubleshooting  

       PCMCIA   2nd  

       wireless network

               installing   2nd   3rd   4th   5th   6th   7th   8th  

Add Button dialog box  

Add Printer dialog box  

Add Printer Wizard   2nd  

Add Server dialog box  

Add Standalone Snap-in dialog box  

Add Trusted Domains dialog box  

Add Users and Groups dialog box   2nd   3rd  

add-ons

       Korn Shell commands

               SFU (Services for Unix 3.0);NFS   2nd   3rd   4th   5th  

               SFU (Services for Unix);NFS   2nd  

       SFU (Services for Unix 3.0)   2nd   3rd  

               installing   2nd   3rd   4th   5th  

Add/Remove Snap-in dialog box  

adding

       Active Directory schema   2nd  

       computers

               domains   2nd  

       labels   2nd   3rd  

       links

               DFS roots   2nd   3rd  

       objects

               databases  

       printers

               Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

               Windows NT 4.0   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

       server partners  

       servers  

       stacks   2nd  

       users

               groups   2nd  

       wireless networking

               LAN   2nd   3rd   4th   5th   6th   7th  

Address field  

Address Recognized bit  

Address Resolution Protocol (ARP)   2nd   3rd  

       IP addresses

               proxy ARP   2nd  

               resolving   2nd   3rd   4th   5th   6th   7th   8th   9th  

address space

       configuring routers   2nd  

addresses   2nd   3rd   4th   5th  

       APIPA

               DHCP   2nd  

       base I/O ports   2nd   3rd  

       destination   2nd  

       IP

               filtering   2nd  

               spoofing   2nd  

               to cable modems   2nd   3rd   4th  

       MAC

               VLAN (virtual LAN)   2nd  

       MAC (Media Access Control)  

       protocols

               name resolution   2nd  

       reserving  

       reusing  

       routers

               hierarchical network organizations   2nd  

       scope

               configuring   2nd   3rd   4th  

               creating   2nd   3rd   4th   5th  

addressing

       ARCnet   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       broadcast  

       IP (Internet Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

               ARP (Address Resolution Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               Class A   2nd   3rd   4th  

               Class B   2nd   3rd   4th  

               Class C   2nd  

               Class D   2nd   3rd   4th   5th   6th   7th   8th  

               Class E   2nd   3rd   4th   5th   6th   7th   8th  

               datagram headers   2nd   3rd   4th   5th   6th   7th  

               proxy ARP (Address Resolution Protocol)   2nd  

               RARP (Reverse Address Resolution Protocol)  

               subnetting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

               supernetting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       MAC (Media Access Control)  

       mulitcast  

       unicast  

adduser -d command

       Unix  

adduser command

       Unix  

administration

       Active Directory  

               large enterprises with sites  

       centralized management   2nd   3rd  

       complete trust models   2nd  

       decentralized management   2nd   3rd  

       directories

               modeling   2nd   3rd  

       domains

               controllers   2nd   3rd  

               creating trust relationships   2nd   3rd   4th   5th  

               interdomain trust relationships   2nd   3rd   4th  

               models   2nd   3rd   4th   5th   6th   7th   8th  

               replication between controllers   2nd   3rd   4th  

               Windows NT   2nd   3rd   4th  

       groups   2nd  

               adding users   2nd  

               assigning group memberships   2nd  

               built-in user groups   2nd   3rd  

               creating user groups   2nd   3rd  

       IEEE 802.1   2nd  

       installation   2nd  

       NDS Manager  

               creating replicas   2nd   3rd  

               partitioning   2nd  

               synchronizing servers   2nd  

       Netware   2nd   3rd  

       NetWare

               NWADMN32   2nd   3rd  

       printers

               Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

               Windows NT   2nd   3rd  

       routers

               delegating LAN responsibilties   2nd   3rd  

               LAN sizes   2nd   3rd   4th   5th  

       switches  

       user accounts

               Windows NT   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       users

               modifying Unix accounts   2nd   3rd   4th  

               Unix   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       WINS  

               netsh commands   2nd   3rd  

               Windows 2000   2nd   3rd   4th   5th   6th  

               Windows 2003 Server  

       wiring

               drawings  

               records   2nd  

                reports  

               work orders   2nd  

Administration Tools

       installing   2nd  

administrative rights

       delegating   2nd   3rd  

adminstration

       WINS

               Action menu   2nd   3rd   4th   5th   6th  

ADMT (Active Directory Migration Tool)  

ADSI (Active Directory Service Interfaces)  

ADSL   2nd   3rd  

ADSL (Asynchronous Digital Subscriber Line)  

Advanced Audio/Video Remote Control Profile (AVRCP)  

Advanced Configuration and Power Interface (ACPI)   2nd   3rd   4th  

Advanced Configuration and Power Management Interface (ACPI)  

Advanced Encryption Standard (AES)   2nd  

Advanced Power Management (APM)  

aero domain  

AES (Advanced Encryption Standard)   2nd  

agents

       proxy   2nd  

       relay   2nd   3rd  

               DHCP  

AGP (Accelerated Graphics Port)  

AH

       VPN (virtual private network)   2nd   3rd  

AH (Authentication Header)  

alarms   2nd  

alerts

       Unix  

algorithms

       backoff   2nd  

       congestion avoidance  

       Dijkstra  

       OSPF (Open Shortest Path First)   2nd  

               LSDB (Link State Database)   2nd   3rd   4th   5th  

               route calculations  

       SHA (Secure Hash Algorithm)  

       Truncated Binary Exponential Backoff Algorithm  

allocation

       DHCP  

allowing dial-in access  

ALOHA project  

ALOHAnet  

alternate migration plans  

alternation current (AC)  

AMA (Open Mobile Alliance)  

amdinistration

       Web-based printers folders   2nd   3rd   4th   5th  

American National Standards Institute (ANSI)   2nd  

American Power Conversion Corp (APC)  

American Standard Code for Information Interchange (ASCII)  

analog modems  

analysis

       logical network design   2nd   3rd   4th   5th   6th   7th  

                components   2nd   3rd   4th   5th   6th   7th   8th   9th  

               mainatining  

               physical networks  

analyzers   2nd   3rd  

       baselines

               establishing   2nd   3rd  

               statistical data   2nd  

       protocols

               decoding  

               filtering   2nd  

               hardware   2nd   3rd  

               software   2nd   3rd   4th   5th   6th  

               software LAN   2nd   3rd  

analyzers, networks   2nd  

analyzing

       printing statistics   2nd  

Anixter  

Anonymous Access  

ANSI (American National Standards Institute)   2nd  

Antheil, George  

anti-virus applications  

APC (American Power Conversion Corp)  

API (application programming interface)  

APIPA

       DHCP   2nd  

APIPA (Automatic Private IP Addressing)  

APM (Advanced Power Management)  

appliances

       NAS   2nd  

Application Compatibility Toolkit

       Windows 2003 Server   2nd  

application gateways.   [See proxy servers]

Application layer  

application programming interface (API)  

application-specific integrated chips (ASICS)  

application-specific integrated circuits (ASICs)  

applications   2nd   3rd  

       10Base-2 networks

               upgrading   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Active Directory  

       ADSI (Active Directory Service Interface)   2nd  

               DC (domain controller)   2nd  

               directory-aware application programming   2nd  

               member servers   2nd  

       Anixter  

       assessing   2nd  

       Cisco  

       competing products

               evaluating   2nd  

       copying  

       corporate standards

               verifying   2nd  

       deleting  

       drivers  

               NDIS (Network Driver Interface Specification)   2nd  

               ODI (Open Data-Link Interface)   2nd  

               Packet Drivers   2nd  

       firewalls   2nd   3rd  

       FTP (File Transfer Protocol)   2nd   3rd  

               commands   2nd   3rd   4th   5th  

               data transfers   2nd   3rd   4th  

               ports/processes   2nd  

               Red Hat Linux   2nd   3rd   4th   5th   6th  

               replies   2nd   3rd   4th   5th  

               TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  

               Windows command-line clients   2nd   3rd   4th   5th   6th   7th   8th   9th  

       gateways  

       HP  

       IBM  

       IP addresses  

       Juniper Networks, Inc.  

       legacy

               maintaining support   2nd  

       LinkSys  

       Linux/NetWare   2nd   3rd   4th  

       Micorosft  

       NETGEAR  

       network sniffers   2nd  

       print servers   2nd   3rd   4th  

       proxy   2nd   3rd   4th  

       RedHat  

       Samba.org  

       security  

       TCP/IP   2nd   3rd  

       Telnet   2nd  

               commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               NVT (Network Virtual Terminal)   2nd  

       Tripwire   2nd   3rd  

       Trojan horses   2nd  

       upgrading   2nd   3rd   4th   5th  

       vertical-market   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       virus-checking  

       viruses   2nd   3rd   4th   5th  

       WEP  

applying

       802.11b networking   2nd   3rd  

               distance limitations  

               firewalls   2nd  

       NAS and SANs   2nd  

       NDS Manager  

               creating replicas   2nd   3rd  

               partitioning   2nd  

               synchronizing servers   2nd  

       routers   2nd   3rd  

       Start/Search method   2nd  

       switches  

       Windows 2000/2003 Event Viewer   2nd   3rd   4th   5th   6th   7th   8th  

       Windows NT 4.0 Event Viewer   2nd   3rd  

       WINS   2nd  

APs (access points)   2nd   3rd   4th   5th  

Arbitrated Loops  

       SANs   2nd   3rd   4th   5th   6th   7th   8th   9th  

architecture

       ATN (Asynchronous Transfer Mode)   2nd   3rd   4th   5th   6th  

       IEEE 802   2nd   3rd   4th   5th  

       IEEE 802.1   2nd  

       IEEE 802.10  

       IEEE 802.11   2nd  

       IEEE 802.2   2nd  

       IEEE 802.3   2nd  

       IEEE 802.4   2nd  

       IEEE 802.5   2nd  

       IEEE 802.7   2nd  

       SCSI  

ARCnet   2nd   3rd  

       bus topologies   2nd  

       configuring   2nd  

        ethernets

               connecting   2nd  

       frame types  

        frames

               formats   2nd   3rd   4th   5th   6th   7th   8th  

       hubs   2nd  

       laying out   2nd   3rd   4th   5th  

       network adapter cards   2nd  

       selecting   2nd  

       star topologies   2nd  

       symbols   2nd   3rd   4th   5th   6th   7th   8th  

       Token-Ring

               laying out   2nd   3rd   4th   5th  

               troubleshooting   2nd   3rd  

               upgrading   2nd   3rd   4th  

       troubleshooting   2nd   3rd   4th   5th   6th  

       upgrading   2nd   3rd   4th  

       wiring   2nd  

ARCnet (Attached Resource Computer Network)   2nd  

       addressing   2nd   3rd  

ARCnet Trade Association (ATA)  

ARP (Address Resolution Protocol)   2nd   3rd  

       IP addresses

               proxy ARP   2nd  

               resolving   2nd   3rd   4th   5th   6th   7th   8th   9th  

arp command   2nd   3rd  

ARPANET   2nd  

arranging domains   2nd  

ASCII

       Telnet NVT  

       transfers  

ASCII (American Standard Code for Information Interchange)  

ASICS (application-specific integrated chips)  

ASICs (application-specific integrated circuits)  

ASR *Academic Source Release)  

assessing

       applications   2nd  

       reliability   2nd  

assessing client work patterns   2nd  

Asset Management component  

assigning

       group memberships   2nd  

assignment

       users  

assignments

       IPX packets   2nd   3rd  

association

       MAC Layer   2nd  

asymmetric encryption  

       digital certificates   2nd   3rd   4th  

       SSL handshakes   2nd  

Asynchronous Connection-Less (ACL)   2nd  

Asynchronous Digital Subscriber Line (ADSL)  

Asynchronous Transfer Mode (ATM)   2nd   3rd   4th  

       architecture   2nd   3rd   4th   5th   6th  

       connections   2nd  

       frames   2nd   3rd  

       Lan emulation   2nd  

       service categories   2nd   3rd   4th  

ATA (ARCnet Trade Association)  

ATM

       Frame Relay   2nd  

       IP over  

ATM (Asynchronous Transfer Mode)   2nd   3rd   4th  

       architecture   2nd   3rd   4th   5th   6th  

       connections   2nd  

       frames   2nd   3rd  

       LAN emulation   2nd  

       service categories   2nd   3rd   4th  

ATM Adaption Layer (AAL)  

ATRN command  

Attached Resource Computer Network.   [See ARCnet]

attacks

       denial of service  

       digital certificates   2nd   3rd  

       distributed denial-of-service  

       forged e-mail   2nd  

       types of  

               denial-of-service   2nd  

               distributed denial-of-service   2nd   3rd   4th  

               ICMP redirects   2nd   3rd  

               Ping of Death   2nd  

       WANs (wide area networks)

               back doors   2nd  

               forged e-mail   2nd  

               passwords   2nd  

               preventing   2nd   3rd  

               Trojan horses   2nd  

               types of attacks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               viruses   2nd   3rd   4th   5th  

attenuation   2nd   3rd  

       fiber- optic cables  

       testing  

attenuation to cross talk ratio (ACR)  

attributes

       Active Directory   2nd  

       property set  

       selected  

       User Account object  

Audio/Video Remote Control Profile  

Audit Policy dialog box  

auditing   2nd  

       enabling   2nd   3rd   4th   5th   6th   7th   8th   9th  

       Linix   2nd   3rd   4th  

               syslog   2nd   3rd   4th   5th   6th   7th  

               system log files   2nd   3rd  

       NetWare 6   2nd  

       networks   2nd  

       reports   2nd  

       Unix   2nd   3rd   4th  

               syslog   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Windows 2000/2003

               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

       Windows NT 4.0

               configuring   2nd   3rd   4th   5th   6th   7th  

       Windows XP Professional   2nd   3rd   4th  

Auditing Entry dialog box  

AUTH command  

authenitcation

       users

               Linux/NetWare  

authenticated commands   2nd  

authentication  

       basic authentication  

       digest  

       domain controllers   2nd   3rd  

               replication   2nd   3rd   4th  

       encrypted  

       integrated Windows  

       LDAP   2nd  

       pass-through  

       Telent   2nd   3rd  

Authentication Header (AH)  

authority

       delegating for network security  

               specialized servers   2nd  

               user accounts   2nd  

authorization

       R-utilities   2nd   3rd  

       share-level permissions   2nd  

               Windows 95/98   2nd  

               Windows NT  

       user-level permissions   2nd  

               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

AUTHORIZATION state   2nd  

authorizing

       DHCP

               servers   2nd   3rd  

Automatic Private IP Addressing (APIPA)  

automation

       file systems   2nd  

automount command   2nd   3rd  

autonmous systems

       RIP (Routing Information Protocol)   2nd   3rd   4th   5th   6th  

               router updates   2nd   3rd   4th  

               scalability   2nd  

               version 2   2nd   3rd  

autonomous systems  

autosensing   2nd  

AVCP (Audio/Video Remote Control Profile)  

AVRCP (Advanced Audio/Video Remote Control Profile)  

Категории