Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

SA (security association)  

SAE (stochastic arbitration event)  

safety

       fiber- optic cables  

SAM

       domains

               controllers   2nd   3rd  

               models   2nd   3rd   4th   5th   6th   7th   8th  

               replication between controllers   2nd   3rd   4th  

        User Manager utility   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

SAM (security accounts manager)  

       domains   2nd   3rd   4th  

Samba   2nd   3rd  

SAMBA   2nd  

Samba.org  

SAML command  

sampling intervals  

SAN (Storage Area Network)   2nd  

SANs

       Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  

       fabric switched topology   2nd   3rd   4th   5th  

       Fibre Channel   2nd   3rd   4th  

       IP   2nd   3rd  

       mixed topologies   2nd   3rd   4th  

       selecting   2nd   3rd   4th  

SANs (Storage Area Networks)  

SAP (Service Advertising Protocol)   2nd  

SAPs (Service Access Points)  

SAR (Segmentation and Reassembly)  

saving

       applications  

       SOHO networks   2nd  

SC (Source Code)  

scalability

       Active Directory   2nd  

       campus networks   2nd  

       multi-tiered networks   2nd  

       RIP (Routing Information Protocol)   2nd  

scams   2nd  

scatternets   2nd  

       Bluetooth   2nd   3rd   4th   5th  

scavenging  

       databases  

schedules

        backups   2nd  

       rotation  

scheduling downtime  

schema

       Active Directory   2nd   3rd   4th   5th   6th   7th  

               executing   2nd   3rd   4th   5th   6th  

               master  

               modifying   2nd   3rd   4th   5th   6th   7th   8th   9th  

       X.500  

schemes

       Manchester encoding  

SCO (Synchronous Connection-Oriented)   2nd   3rd  

scope

       addresses

               configuring   2nd   3rd   4th  

               creating   2nd   3rd   4th   5th  

       groups

               selecting   2nd   3rd  

screened host architecture  

SCSI   2nd  

       NAS   2nd  

               capacity   2nd   3rd   4th  

               network appliances   2nd  

               protocols   2nd  

       SANs   2nd   3rd   4th  

               applying NAS   2nd  

               Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  

               fabric switched topology   2nd   3rd   4th   5th  

               Fibre Channel   2nd   3rd   4th  

               IP   2nd   3rd  

               mixed topologies   2nd   3rd   4th  

SCSI (Small Computer Systems Interface)  

SD (Start Delimiter )  

SD (start delimiter)  

SDP (Service Discovery Protocol)  

SDSL (Single-line Digital Subscriber Line)   2nd  

searching

       Active Directory   2nd   3rd   4th   5th   6th   7th   8th   9th  

       databases   2nd  

       information

               NIC  

       printers   2nd  

       user accounts   2nd   3rd  

secondary servers   2nd   3rd   4th   5th   6th   7th   8th   9th  

Secure Hash Algorithm (SHA)  

Secure Shell (SSH) utilities   2nd  

Secure Shell utilities.   [See SSH utilities]

security  

       802.11b networking   2nd   3rd   4th  

       access control mechanisms  

               auditing   2nd  

               identifying users   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               resource protections  

       Bindery   2nd  

               comparing NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               Services   2nd   3rd   4th   5th  

       Bluetooth   2nd  

       CERT/CC  

       CIAC  

       delegating authority  

               specialized servers   2nd  

               user accounts   2nd  

       disabling default options   2nd  

       encryption  

               digital certificates   2nd   3rd   4th   5th   6th   7th   8th  

               PGP (Pretty Good Privacy)   2nd   3rd  

               privacy   2nd   3rd  

               public key encryption   2nd   3rd   4th  

               RSA public key encryption   2nd  

               single-key encryption   2nd   3rd   4th  

               SSL handshakes   2nd  

               types of   2nd  

       equivalence

               NetWare   2nd   3rd  

       Ethernets  

       fiber-optic cables  

       firewalls   2nd   3rd   4th   5th   6th   7th  

               executing   2nd   3rd   4th  

               filtering IP addresses   2nd  

               FWTK  

               hardware   2nd   3rd   4th  

               hybrids   2nd   3rd   4th  

               Intrusion Detection   2nd  

               NAT (Network Address Translation)   2nd   3rd   4th   5th  

               packet filters   2nd  

               port number filtering   2nd   3rd   4th  

               protocol filtering   2nd   3rd  

               proxy applications   2nd   3rd   4th  

               proxy servers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               software   2nd   3rd  

               SOHO   2nd  

               troubleshooting   2nd  

       FIRST  

       FTP   2nd  

       HomeRF technology  

       IEEE 802.10  

       interdomain trust relationships   2nd   3rd   4th  

               creating   2nd   3rd   4th   5th  

       levels of   2nd  

       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  

       modes  

       NAT (Netwaork Address Translation

               routers  

       NetWare  

               comparing NDS/file system rights  

               Everyone group   2nd  

               file system rights   2nd  

               inheritance of rights   2nd   3rd   4th  

               login   2nd   3rd  

               object/property rights   2nd   3rd   4th  

               permissions   2nd  

               trustees  

       networks   2nd  

       Novell

               AUDITCON/SYSCON utilites   2nd   3rd   4th   5th   6th  

       NTBugTraq   2nd  

       OpenSSL  

       passwords

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       permissions

               cumulative effect of  

               NTFS   2nd  

       physical measures  

               disposing of hardware and media   2nd  

               locking the door   2nd  

               UPS (Uninterruptable Power Supply)   2nd  

       piracy  

       policies   2nd  

               acceptable use statements   2nd   3rd   4th   5th  

               elements to include   2nd   3rd  

               guidelines for usage   2nd  

               Network Connection Policy   2nd  

       policies and procedures

               elements to include  

       procedures

               escalation procedures   2nd   3rd  

       proxy servers   2nd  

       routers   2nd  

       services and system daemons   2nd  

       share-level permissions   2nd  

                Windows 95/98   2nd  

               Windows NT  

       SMB (Server Message Block)   2nd   3rd  

       SSL  

       Symantec Security Response  

       TCP (Transmission Control Protocol)

               sessions   2nd  

       Telnet   2nd  

       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  

       user-level permissions   2nd  

               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       viruses   2nd   3rd  

       VPN (virtual private network)   2nd  

               protocols   2nd  

               protocols;AH   2nd   3rd  

               protocols;ESP   2nd   3rd   4th  

               protocols;IKE   2nd  

               protocols;IPSec   2nd  

               protocols;L2TP   2nd   3rd   4th   5th   6th  

               protocols;PPTP   2nd   3rd  

               RAS (Remote Access Service)   2nd   3rd  

       WAN

               host computers   2nd  

               network sniffers  

               preventive measures   2nd   3rd  

               routers   2nd  

               spoofing   2nd  

               training   2nd  

               Tripwire   2nd   3rd  

               updating   2nd  

               virus-checking applications  

       WANs (wide area networks)   2nd  

               back doors   2nd  

               forged e-mail   2nd  

               passwords   2nd  

               preventing attacks   2nd   3rd  

               Trojan horses   2nd  

               types of attacks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               viruses   2nd   3rd   4th   5th  

       wireless

               WEP   2nd   3rd   4th   5th  

               WPA   2nd  

       wireless networking

               LAN   2nd   3rd  

security accounts manager (SAM)  

       domains   2nd   3rd   4th  

security association (SA)  

Security Equivalance   2nd  

Security Parameters Index (SPI)  

security policies  

segmentation

       collison Domains   2nd  

Segmentation and Reassembly (SAR)  

segmenting

       cable segement length   2nd  

segments   2nd  

       LAN   2nd   3rd  

               reasons to segment network users   2nd  

               remote locations   2nd  

               routers   2nd   3rd   4th   5th  

               switches   2nd   3rd  

       networks

               routers   2nd   3rd   4th   5th  

               switches   2nd   3rd  

Select Network Component Type dialog box  

Select Network Protocol dialog box  

Select Network Service dialog box  

selected attributes  

selecting

       access points

               wireless netowrking   2nd   3rd   4th  

       cables  

       directories   2nd  

       drivers

               Windows NT   2nd  

       groups

               scope   2nd   3rd  

       Hardware bus types   2nd   3rd   4th   5th   6th   7th   8th   9th  

       NAS or SANs   2nd   3rd   4th  

       ports

               Windows NT   2nd  

       routers   2nd  

       Wi-Fi   2nd  

       wireless networks   2nd  

       wireless protocols   2nd  

selection

       protocols   2nd  

selectors

       creating  

SEND command  

Sender-SMTP  

sending

       messages

               ARCnet   2nd   3rd  

separating logical and physical topologies  

Sequenced Packet Exchange (SPX)  

Sequenced Packet Exchange.   [See SPX]

serial connections

       Fibre Channel   2nd   3rd   4th  

Serial Line Internet Protocol (SLIP)   2nd   3rd   4th   5th   6th   7th  

Serial Port profile  

serial port profile group  

Server 2003

       DHCP

               authorizing   2nd   3rd  

               installing   2nd  

               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  

Server Information Table (SIT)  

Server Message Block (SMB)   2nd   3rd   4th  

       CIFS   2nd   3rd  

       files   2nd   3rd   4th   5th   6th   7th   8th  

       NET commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       protocol negotiation   2nd  

       Samba   2nd   3rd  

       security   2nd   3rd  

       types   2nd   3rd  

Server Message Block protocol.   [See CIFS]

servers

       adding  

       backups   2nd   3rd   4th   5th   6th   7th  

               media   2nd   3rd   4th   5th  

       BIND (Berkeley Internet Name Domain)  

       Bindery.   [See Bindery]

       binding   2nd  

       BOOTP

               client exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               customizing DHCP   2nd   3rd   4th   5th  

               DHCP   2nd   3rd   4th   5th   6th   7th  

               downloading operating systems   2nd  

               options fields   2nd   3rd   4th   5th  

               packet formats   2nd   3rd   4th   5th  

               request/reply mechanisms   2nd   3rd   4th  

       caching   2nd   3rd   4th   5th   6th   7th   8th   9th  

       configuring  

       connecting  

       DFS   2nd   3rd   4th   5th   6th  

       DHCP

               APIPA   2nd  

               authorizing   2nd   3rd  

               BOOTP support  

               clustering   2nd  

               configuring   2nd   3rd   4th  

               daemons   2nd   3rd  

               DNS   2nd   3rd   4th   5th   6th  

               exclusions/ reservations   2nd  

               installing   2nd   3rd  

               large/routed environments  

               leasing  

               managing logging   2nd   3rd  

               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  

               Red Hat Linux   2nd  

               relay agents   2nd   3rd   4th  

               troubleshooting  

       DNS

               files  

               Unix configuration   2nd  

       dual-redundant network controllers   2nd  

       file

               protocols   2nd   3rd  

       FTP

               Windows 2003 Server   2nd   3rd   4th   5th  

       FTp.   [See also FTP]

       groups

               Windows 2000/2003   2nd   3rd  

       hardware-based print   2nd   3rd   4th  

       high-end

               Gigabit Ethernets   2nd  

       installing  

       job   2nd  

       master/slave (NIS)  

       member   2nd   3rd   4th   5th   6th  

       multi- homed   2nd  

       NBNS (NetBIOS Name Server)  

       NCP (NetWare Core Protocol)

               signature options   2nd  

       NDS Manager

               synchronzing servers   2nd  

       network Printer  

       NFS

               configuring  

               daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

       NIS (Network Information Service)

               ypserve daemon  

       primary   2nd   3rd   4th   5th   6th   7th   8th   9th  

       printer server applications   2nd   3rd   4th  

       proxy   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

       secondary   2nd   3rd   4th   5th   6th   7th   8th   9th  

       signatures   2nd  

       slaves (NIS)   2nd   3rd  

       SMS (System Management Server)  

       SMTP (Simple Mail Transfer Protocol)

               commands   2nd   3rd   4th   5th  

               extensions  

               models   2nd   3rd   4th  

               response codes   2nd   3rd   4th   5th  

               transactions   2nd  

       statistics  

       Telnet   2nd   3rd   4th  

       telnet

               Unix  

       telnet.   [See telnet]

       tftp (trivial FTP server)  

       Windows 2000

               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

               installing DNS  

       Windows 2000 Server

               ActiveState ActivePerl 5.6  

               BOOTP   2nd  

               FTP   2nd   3rd   4th  

               Korn Shell command   2nd   3rd   4th   5th  

               managing FTP   2nd   3rd   4th   5th  

               NetWare file permissions   2nd   3rd   4th   5th   6th   7th   8th  

               passwords   2nd   3rd   4th  

               protocols/utilities   2nd   3rd  

               TCP/IP   2nd  

               Telnet   2nd   3rd   4th  

               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               upgrading to   2nd   3rd  

               user name mapping   2nd  

       Windows 2000/2003

               events   2nd  

       Windows 2003

               Active Directory   2nd  

               FTP   2nd   3rd   4th  

               installing Active Directory   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               managing FTP   2nd   3rd   4th   5th  

               protocols/utilities   2nd   3rd  

               TCP/IP   2nd  

               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               upgrading to   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  

       Windows 2003 Server

               ActiveState ActivePerl 5.6  

               BOOTP   2nd   3rd   4th   5th   6th   7th   8th  

               installing  

               Korn Shell command   2nd   3rd   4th   5th  

               managing Telnet   2nd  

               managing WINS  

               netsh commands (WINS)   2nd   3rd  

               NetWare file permissions   2nd   3rd   4th   5th   6th   7th   8th  

               passwords   2nd   3rd   4th  

               Telnet   2nd   3rd   4th  

               user name mapping   2nd  

       Windows NT

               adding users to groups   2nd  

               assigning group memberships   2nd  

               built-in user groups   2nd   3rd  

               creating user groups   2nd   3rd  

               groups   2nd  

               managing user accounts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       Windows Print

               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

               printers/printing devices   2nd   3rd   4th  

serves

       DHCP   2nd   3rd   4th   5th   6th  

Service Access Points (SAPs)  

Service Advertising Protocol (SAP)   2nd  

service categories

       ATM   2nd   3rd   4th  

Service Discovery Application profile   2nd  

Service Discovery Protocol (SDP)  

Service Level Agreement (SLA)  

service record (SRV)  

Service Resource Records (SRV RRs)  

services

       Active Directory   2nd  

       Bindery   2nd   3rd   4th   5th  

               configuring   2nd  

       connection-oriented

               NetWare   2nd  

       connectionless

               NetWare   2nd  

       directory   2nd  

               NDS (Novell Directory Service)  

               X.500   2nd   3rd   4th   5th   6th   7th   8th   9th  

       identifying

               planning logical network design   2nd  

       IP addresses  

       Knowledge Consistency Checker  

       NetWare 6   2nd  

       NIS (Network Information Service)   2nd   3rd   4th  

                clients  

               domainname command   2nd  

               maps   2nd   3rd   4th   5th  

               master/slave servers  

               modifying maps   2nd  

               slaves   2nd   3rd  

               starting   2nd   3rd  

               yp commands   2nd  

               ypserve daemon  

       RPC  

       security  

       TCP/IP   2nd   3rd  

services (background processes)

       network security   2nd  

Services for NetWare Version 5.0.   [See SFN]2nd   [See SFN]

Services for Unix (SFU)  

Services for Unix 3.0 (SFU)   2nd   3rd  

       installing   2nd   3rd   4th   5th  

Session layer  

sessions

       one-way synchronization

               MSDSS   2nd   3rd   4th   5th  

       SMB   2nd  

       TCP (Transmission Control Protocol)   2nd  

               configuring   2nd   3rd  

               ending   2nd  

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th  

               security   2nd  

       Telnet   2nd  

               authentication   2nd   3rd  

               commands   2nd   3rd   4th   5th   6th   7th   8th  

               NVT (Network Virtual Terminal)   2nd  

       two-way synchronization

               MSDSS   2nd  

sessions.   [See also connections]

set commands  

Set Group ID (SGID)   2nd   3rd   4th   5th  

Set User ID (SUID)   2nd   3rd   4th   5th  

setting

       goals  

SFF (small form factor)   2nd   3rd  

SFN

       (Services for NetWare Version 5.0)   2nd  

       FMU feature   2nd  

               installation  

               migration steps   2nd   3rd   4th   5th  

       FPNW 4.0 feature

               mapping NetWare trustee rights to Windows NT permissions   2nd  

       FPNW 5.0 feature

               installation   2nd   3rd   4th  

       MSDSS feature   2nd  

               installation   2nd  

               one-time migration   2nd  

               one-way synchronization sessions   2nd   3rd   4th   5th  

               prerequisites  

               two-way synchronization sessions   2nd  

SFU

       ActiveState ActivePerl 5.6  

       Korn Shell commands   2nd   3rd   4th   5th   6th   7th  

       password synchronization   2nd   3rd   4th  

       Telnet  

       telnet  

       Telnet   2nd   3rd  

       user name mapping   2nd  

SFU (Services for Unix 3.0)   2nd   3rd  

       installing   2nd   3rd   4th   5th  

SFU (Services for Unix)  

SGID (Set Group ID)   2nd   3rd   4th   5th  

SHA (Secure Hash Algorithm)  

shadow password files (Unix)   2nd  

share-level permissions   2nd  

       Windows 95/98   2nd  

       Windows NT  

share-level security.

       SMB   [See also security]

shared network media  

shared topologies   2nd   3rd  

shareware

       SOHO   2nd  

shareware.   [See also applications]

sharing

       file systems   2nd   3rd  

       files

               Linux/NetWare   2nd  

       printers   2nd  

               Linux/NetWare   2nd  

shielded twisted-pair)  

shields   2nd  

short frames   2nd  

shutdown events

       Windows 2003 servers   2nd  

SID (Source Node Identification)  

SIG (special interest group)

       Bluetooth  

signatures

       digital  

       options

               NCP (NetWare Core Protocol)   2nd   3rd   4th   5th   6th  

       packets

               NCP (NetWare Core Protocol)   2nd  

               troubleshooting   2nd  

Simple Mail Transfer Protocol (SMTP)   2nd  

Simple Mail Transfer Protocol )SMTP

       commands   2nd   3rd   4th   5th  

       extensions  

       models   2nd   3rd   4th  

       response codes   2nd   3rd   4th   5th  

       transactions   2nd  

Simple Mail Transfer Protocol )SMTP)   2nd   3rd   4th  

Simple Network Management Protocol (SNMP)  

Simple Network Management Protocol.   [See SNMP]

Simple Network Monitoring Protocol (SNMP)  

simple repeaters  

single domain models

       Windows NT  

single hops  

single-key encryption   2nd   3rd   4th  

SIT (Server Information Table)  

site-to-site VPN  

sites

       Active Directory

               managing large enterprises  

size

       fiber-optic cables  

SIZE command  

sizes

       giant frame errors   2nd   3rd   4th   5th  

       windows  

SLA (Service Level Agreement)  

slave servers  

slave servers (NIS)  

slaves

       NIS (Network Information Service)   2nd   3rd  

sliding windows   2nd  

SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  

slow starts  

small businesses

       SOHO networks

               backups   2nd  

               requirements   2nd   3rd   4th   5th  

               topologies   2nd   3rd   4th  

               vertical-market applications   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

Small Computer Systems Interface.   [See SCSI]

small form factor (SFF)   2nd   3rd  

small office/home office (SOHO)  

small office/home office.   [See SOHO]

small offices and home offices (SoHO)  

smart cards   2nd  

SMB (Server Message Block)   2nd   3rd   4th  

       CIFS   2nd   3rd  

       files   2nd   3rd   4th   5th   6th   7th   8th  

       NET commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       protocol negotiation   2nd  

       Samba   2nd   3rd  

       security   2nd   3rd  

       types   2nd   3rd  

SMSC (Standard Microsystems Corporation)  

SMTP (Simple Mail Transfer Protocol)   2nd   3rd   4th   5th   6th  

       commands   2nd   3rd   4th   5th  

       extensions  

       models   2nd   3rd   4th  

       response codes   2nd   3rd   4th   5th  

       transactions   2nd  

SNA (Systems Network Architecture)  

snap features, 802.3   2nd  

snap-ins

       Active Directory Computers and Users   2nd   3rd  

       Active Directory schema

               adding   2nd  

               executing   2nd   3rd   4th   5th   6th  

SNIA (Storage Networking Industry Association)  

sniff mode  

sniffers   2nd  

SNMP   2nd  

       eDirectory  

SNMP (Simple Network Management Protocol)   2nd   3rd  

       MIB (Management Information Base)   2nd   3rd   4th   5th  

       primitives   2nd  

       proxy agents   2nd  

       RMON (Remote Monitoring)   2nd   3rd   4th   5th  

       SNMPv2/SMNPv3   2nd   3rd  

SNMP (Simple Network Monitoring Protocol)  

SOA (Start of Authority)   2nd  

social engin  

sockets  

software

       drivers  

               NDIS (Network Driver Interface Specification)   2nd  

               ODI (Open Data-Link Interface)   2nd  

               Packet Drivers   2nd  

       firewalls   2nd  

               executing  

software-based analyzers   2nd   3rd   4th   5th   6th  

software-based LAN analyzers   2nd   3rd  

SOH (Start of Header)  

SOHO

       clients

               Windows 2003 Server   2nd   3rd  

       firewalls   2nd  

SOHO (Small Office and Home Office)

       troubleshooting  

               cables   2nd  

                components   2nd  

               configuring computers   2nd   3rd   4th   5th   6th   7th   8th  

               firewalls   2nd  

               networks  

               power   2nd   3rd  

               tech support   2nd  

               wireless networks   2nd  

SOHO (small office/home office)   2nd   3rd  

       backups   2nd  

       requirements   2nd   3rd   4th   5th  

       topologies   2nd   3rd   4th  

       vertical-market applications   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

SOHO (small offices and home offices)  

Solaris AIX Unix

       eDirectory  

SOML command  

Sonicwall  

source IP addresses   2nd   3rd  

Source Node Identification (SID)  

Source Service Access Point (SSAP)  

source-routing bridges (SRB)  

Spanning Tree Protocol  

special interest group (SIG)

       Bluetooth  

special permissions

       Windows NT  

specialized servers

       delegating authority for network security   2nd  

specifications

       general horizontal cabling subsystem  

       work area

               structured wiring  

speed

       networks

               selecting NICs   2nd  

SPI (Security Parameters Index)  

splicing

       fiber optic   2nd   3rd  

       fiber optic cables   2nd   3rd  

splitters  

spoofing   2nd  

spool directories

       creating  

spooling

       modifying  

spread-spectrum technology   2nd   3rd   4th  

spreadsheets

       documentation   2nd   3rd   4th  

SPX (Sequenced Packet Exchange)   2nd   3rd  

       communications   2nd  

       packets   2nd  

       SPXII   2nd  

SPXII (Sequenced Packet Exchange II)   2nd  

SQL (Structured Query Language)  

SRB (source-routing bridges)  

SRV (service record)  

SRV RRs (Service Resource Records)  

SSAP (Source Service Access Point)  

SSH (Secure Shell) utilities   2nd  

SSH utilities

       (Secure Shell utilities)  

SSL

       eDirectory  

       handshakes   2nd  

       OpenSource  

       transactions  

stackable switches  

stacks

       adding   2nd  

       HBA  

       protocol.   [See also protocols]

       protocols  

standalone UPS systems.   [See also UPS]2nd   [See also UPS]3rd   [See also UPS]4th   [See also UPS]

standard input  

Standard Microsystems Corporation (SMSC)  

standard objects

       Active Directory   2nd   3rd   4th   5th  

standard Select User Computer or Group dialog box  

standards   2nd   3rd  

       802.2 LLC   2nd   3rd   4th   5th  

       802.3  

       Active Directory   2nd   3rd   4th   5th  

       corporate

               vertifying   2nd  

       IEEE   2nd  

               VLAN switches   2nd   3rd  

       IEEE 802 LAN/MAN Standards Committee   2nd  

       IEEE 802.11b  

               increased bandwidth   2nd   3rd  

               interference   2nd  

               public use   2nd  

               security   2nd  

       IEEE 802.11g   2nd  

               increasing bandwidth   2nd  

       ISO   2nd  

       LMSC   2nd  

               IEEE 802 architecture   2nd   3rd   4th   5th  

               IEEE 802.1 architecture   2nd  

               IEEE 802.10 architecture  

               IEEE 802.11 architecture   2nd  

               IEEE 802.2 architecture   2nd  

               IEEE 802.3 architecture   2nd  

               IEEE 802.4 architecture   2nd  

               IEEE 802.5 architecture   2nd  

               IEEE 802.7 architecture   2nd  

       OSI (International Organization for Standardization)  

       RFCs   2nd  

       SNIA  

       W3C  

       X.500  

standards.   [See also conventions]

standby mode  

star topologies   2nd   3rd   4th   5th   6th   7th  

       ARCnet   2nd  

       LAN   2nd  

star-wireless topologies   2nd  

StarOffice  

Start Delimiter (SD)  

start delimiter (SD)  

Start menu commands

       Active Directory Users and Computers  

       Computer Management  

       Internet Services Manager  

Start of Authority (SOA)   2nd  

Start of Header (SOH)  

Start/Search method   2nd  

starting

       Arbitrated Loops   2nd   3rd   4th   5th  

       networks

               upgrading   2nd   3rd  

       NIS (Network Information Service)

               starting   2nd   3rd  

startup events

       Windows 2003 servers   2nd  

STAT command  

stateful protocols  

stateless protocols  

states

       IMAP4  

       POP3 (Post Office Protocol)   2nd  

               AUTHORIZATION   2nd  

               TRANSACTION   2nd  

               UPDATE  

       tombstone  

static entries  

static mappings

       WINS  

statistical data   2nd  

statistics  

       printing   2nd  

       servers  

status

       system flags   2nd  

status command  

stochastic arbitration event (SAE)  

storage

       backups   2nd   3rd  

       NAS   2nd  

               capacity   2nd   3rd   4th  

               network appliances   2nd  

               protocols   2nd  

       SANs   2nd   3rd   4th  

               applying NAS   2nd  

               Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  

               fabric switched topology   2nd   3rd   4th   5th  

               Fibre Channel   2nd   3rd   4th  

               IP   2nd   3rd  

               mixed topologies   2nd   3rd   4th  

       selecting   2nd   3rd   4th  

Storage Area Network (SAN)   2nd  

Storage Area Networks.   [See SANs]

Storage Networking Industry Association (SNIA)  

store-and-forward switches   2nd  

STP (shielded twisted-pair)  

stream ciphers   2nd  

stream mode  

strict source routing  

Structured Query Language (SQL)  

structured wiring   2nd  

       backbone cabling system   2nd   3rd   4th  

       horizontal cabling system   2nd   3rd  

       work area specification  

structures

       directories

               modeling   2nd   3rd  

       IPX packets   2nd   3rd  

       Netware directories   2nd  

               Bindery   2nd  

               Bindery Services   2nd   3rd   4th   5th  

               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  

               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  

su command   2nd   3rd  

subheaders

       LLC   2nd   3rd  

sublayers

       Media Access Control   2nd  

subnets

        multi-homed systems   2nd  

subnetting

       IP addresses   2nd   3rd   4th   5th   6th   7th   8th  

subordinate reference replicas   2nd  

subsets .   [See also global catalog]

success, measuring upgrades   2nd  

SUID (Set User ID)   2nd   3rd   4th   5th  

suites

       protocols

               NetWare   2nd  

       protocols.   [See also protocols]2nd   [See also protocols]

summarization

       global catalog   2nd  

Sun

       StarOffice  

supernetting

       IP addresses   2nd   3rd   4th   5th   6th  

superscopes .   [See also scope]

support

       BOOTP  

       costs

               evaluating   2nd  

       UNIX

               protocols/utilities   2nd   3rd   4th   5th   6th  

       Windows NT

               UNIX protocols/utilities   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

surveying

       users   2nd   3rd  

SVC (switched virtual circuit)   2nd  

SVC (switched virtual connection)  

SVR4 (System V, Release 4)   2nd  

       administration commands   2nd   3rd   4th   5th   6th  

       commands   2nd   3rd   4th   5th   6th  

swapping out.   [See upgrading]

switched virtual circuit (SVC)   2nd  

switched virtual connection (SVC)  

switches   2nd   3rd   4th   5th   6th   7th   8th  

       10Base-2 networks   2nd   3rd   4th  

       applying  

        collapsed backbones   2nd   3rd   4th   5th  

       collision domains

               segmenting   2nd  

       collisions   2nd   3rd  

       fabric switched topology   2nd   3rd   4th   5th  

        full-duplex ethernet   2nd   3rd   4th  

       hardware types   2nd   3rd   4th  

               chassis  

               cut-through switches   2nd   3rd  

               home offices   2nd  

               Layer 3 switches   2nd  

               stackable  

               store-and-forward switches   2nd  

       managing  

       mixed topologies   2nd   3rd   4th  

       network segments   2nd   3rd  

       results  

       troubleshooting  

       upgrade from bridges   2nd   3rd   4th   5th   6th  

switching

       layer-3  

       MPLS  

       multi-protocol label   2nd   3rd  

       routing

               combining   2nd  

       VLAN (virtual LAN)   2nd   3rd   4th   5th  

               purchasing   2nd   3rd  

Sygate Personal Firewall Pro  

Symantec Security Response  

symbols

       ARCnet   2nd   3rd   4th   5th   6th   7th   8th  

symmetric encryption   2nd   3rd   4th   5th  

       digital certificates   2nd   3rd   4th  

       SSL handshakes   2nd  

SYN (synchronization) flooding   2nd  

synchronization

       full/partial   2nd  

       NetWare   2nd   3rd  

       one-way sessions

               MSDSS   2nd   3rd   4th   5th  

       servers

               NDS Manager   2nd  

       troubleshooting   2nd  

       two-way sessions

               MSDSS   2nd  

synchronization (SYN) flooding   2nd  

Synchronization profile  

synchronizing

       passwords   2nd   3rd   4th  

Synchronous Connection-Oriented (SCO)   2nd   3rd  

syslog

       Linux/Unix   2nd   3rd   4th   5th   6th   7th  

syslog daemon  

syslog utility  

SYSPRINT.SEP  

System Code (SC)  

system flags   2nd  

System Information MMC utility  

system log files

       Linux/Unix   2nd   3rd  

System Management Server (SMS)  

System Management Server.   [See SMS]

System V, Release 4 (SVR4)   2nd  

       administration commands   2nd   3rd   4th   5th   6th  

       commands   2nd   3rd   4th   5th   6th  

systems

       multi-homed   2nd  

Systems Network Architecture (SNA)  

Категории