Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

e-mail

       forged   2nd  

       IMAP4   2nd   3rd  

               client commands   2nd  

               commands   2nd   3rd   4th  

               data formatting   2nd  

               mailbox naming   2nd  

               states  

               system flags   2nd  

               universal commands  

       POP3 (Post Office Protocol)   2nd  

               AUTHORIZATION state   2nd  

               TRANSACTION state   2nd  

               UPDATE state  

       SMTP (Simple Mail Transfer Protocol)   2nd   3rd   4th  

               commands   2nd   3rd   4th   5th  

               extensions  

               models   2nd   3rd   4th  

               response codes   2nd   3rd   4th   5th  

               transactions   2nd  

EA (Extension Bit)  

EBCDIC (Extended Binary-Coded Decimal Interchange Code)   2nd  

ECC (error correction code)  

economics

       determining needs for network upgrades  

eDirectory   2nd  

       features   2nd   3rd   4th  

       installing   2nd   3rd   4th  

effective rights  

       NetWare   2nd   3rd  

EGP (Exterior Gateway Protocols)   2nd  

egress LSRs  

EHLO command   2nd  

EIA (Electrinics INdustries Association)   2nd  

EISA

       bus hardware interrupts  

EISA (Extended ISA)  

electrical barriers  

electromagnetci interference (EMI)  

electromagnetic fields  

Electronics Industries Association (EIA)   2nd  

elements

       network security policies   2nd   3rd   4th  

EMI (electromagnetic interfernece)  

employees

       guidelines for usage (network security)   2nd  

emulation

       Bindery   2nd  

Enable Burst Handling  

enabling

       Active Directory schema  

       auditing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               applying AUDITCON tool  

Encapsulating Security Payload (ESP)  

encapsulation  

       L2TP (Layer Two Tunneling Protocol)   2nd   3rd   4th  

        layers  

encoding

       Manchester scheme  

encrypted authentication  

encryption  

       digital certificates   2nd   3rd   4th   5th   6th   7th   8th  

       PGP (Pretty Good Privacy)   2nd   3rd  

       privacy   2nd   3rd  

       SSL handshakes   2nd  

       types of   2nd  

               public key encryption   2nd   3rd   4th  

               RSA public key encryption   2nd  

               single-key encryption   2nd   3rd   4th  

               symmetric   2nd   3rd   4th  

End of File (EOF)  

End of Record (EOR)  

End of Transmission (EOT)  

end users

        surveying  

end users.   [See also users]

ending

       TCP (Transmission Control Protocol)

               sessions   2nd  

endpoints  

ENQ (Enquiry)  

Enquiry (ENQ)  

entries

       static  

environments

       ARCnet  

       SOHO.   [See also SOHO]

EOF (End of File (EOF)  

EOR (End of Record)  

EOT (End of Transmission)  

equipment

       evaluating contracts  

equivalence

       security.   [See security equivalence]2nd   [See security equivalence]

Error bit  

error correction code (ECC)  

errors

       BERT (Bit Rate Error Testers)   2nd  

        ethernets   2nd   3rd   4th   5th  

       failed login attempts   2nd   3rd  

       ginat frames   2nd   3rd   4th   5th  

       LDAP   2nd  

       monitoring   2nd  

       multiple network  

errors.   [See also troubleshooting]2nd   [See also troubleshooting]3rd   [See also troubleshooting]

escalation procedures

       network security   2nd   3rd  

ESDP (Bluetooth Extended Service Discovery Profile)  

ESE (Extensible Storage Engine)  

ESP

       VPN (virtual private network)   2nd   3rd   4th  

ESP (Encapsulating Security Payload)  

establishing

       baselines   2nd   3rd   4th   5th  

       LCP (Link Control Protocol)   2nd   3rd   4th   5th   6th  

       NCP (Network Control Protocol)   2nd  

Ethernet

       ARCnet

               laying out   2nd   3rd   4th   5th  

               troubleshooting   2nd   3rd  

               upgrading   2nd   3rd   4th   5th   6th  

ethernet

       frames   2nd  

Ethernet

       history of  

       laying out new networks   2nd   3rd   4th   5th  

       Token-Ring

               replacing   2nd  

Ethernet II   2nd   3rd  

ethernets

       10 Gigabit Ethernet   2nd   3rd  

Ethernets

       adapter cards  

ethernets

       ARCnet

               connecting   2nd  

       backbones   2nd  

       backoff algorithm   2nd  

       collisions   2nd   3rd   4th   5th   6th  

       collsions

               buses, hubs, and switches   2nd   3rd  

       Fast Ethernet   2nd   3rd   4th  

       frames   2nd  

               802.2 LLC standard   2nd   3rd   4th   5th  

               802.3 standard  

               Ethernet II/PARC   2nd   3rd  

        full-duplex switches   2nd   3rd   4th  

Ethernets

       Gigabit

               costs  

               desktops  

               high-end servers   2nd  

               traffic volume   2nd  

               upgrading network backbones   2nd  

ethernets

       Gigabit Ethernet   2nd   3rd   4th  

       history of   2nd   3rd  

Ethernets

        phasing into Token-Ring networks   2nd   3rd   4th   5th   6th   7th  

       replacing Token-Ring equipment  

       routing   2nd  

       security  

ethernets

       topologies

               bus   2nd  

               hybrid LAN   2nd   3rd  

               restrictions   2nd   3rd   4th   5th   6th  

               star   2nd   3rd   4th  

       troubleshooting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

       types of   2nd   3rd   4th   5th   6th   7th  

Ethernets

       upgrading   2nd   3rd   4th  

Ethertest LAN Analyzer for Windows  

evaluating

       competing products   2nd  

        components

               upgrading networks   2nd   3rd  

       upgrade needs   2nd   3rd   4th   5th   6th   7th  

               maintaining support   2nd  

               surverying users   2nd   3rd  

evaluating contracts  

evaluating networks  

even parity  

Event Log

       Windows NT  

Event View

       Action menu   2nd   3rd   4th   5th  

Event Viewer

       failed login attempts  

       Windows 2000/2003

               applying   2nd   3rd   4th   5th   6th   7th   8th  

       Windows NT 4.0

               applying   2nd   3rd  

events  

       AUDITCON tool  

        audits

               configuring   2nd   3rd   4th   5th  

       directories   2nd  

       files   2nd  

       printers   2nd  

       Windows 2003 servers   2nd  

Everyone group   2nd  

exclusions

       DHCP   2nd  

exclusive locks  

executing

       pilot programs   2nd  

execution

       Active Directory schema   2nd   3rd   4th   5th   6th  

       firewalls   2nd   3rd   4th  

               hardware/software  

       Start/Search method   2nd  

       WINS   2nd  

execution.   [See also applying]

executive overviews  

existing trees

       joining  

expanding

       LAN   2nd   3rd  

               reasons to segment network users   2nd  

               remote locations   2nd  

expectations

       network upgrades

               surveying users   2nd   3rd  

Expert Observer  

expiration

        user accounts   2nd   3rd   4th   5th  

expirations

       passwords  

explicit assignments  

explicit tagging

       VLAN (virtual LAN)   2nd   3rd   4th   5th  

EXPN command  

exportfs command   2nd   3rd  

exporting

       records  

       tools  

Extended Binary-Coded Decimal Interchange Code (EBCDIC)   2nd  

Extended ISA (EISA)  

extensible match

       eDirectory  

Extensible Storage Engine (ESE)  

Extension Bit (EA)  

Extension fields  

extension headers

       IPv6   2nd   3rd  

extensions

       SMTP (Simple Mail Transfer Protocol)  

Exterior Gateway Protocols (EGP)   2nd  

External Data Representation (XDR)   2nd   3rd  

Extinction Intervals  

Категории