Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

W3C (World Wide Web Consortium)   2nd   3rd   4th  

Wake on LAN (WOL)   2nd  

       Universal Network Boot  

WAN

       (wide area network)  

       connecting to a LAN

               routers   2nd   3rd  

       protocols   2nd  

       routers   2nd  

       security

               host computers   2nd  

               network sniffers  

               preventive measures   2nd   3rd  

               spoofing   2nd  

               training   2nd  

               Tripwire   2nd   3rd  

               updating   2nd  

               virus-checking applications  

       wireless networking   2nd   3rd   4th  

WAN (wide area network)  

WAN PHY  

WANs (wide area networks)

       security   2nd  

               back doors   2nd  

               forged e-mail   2nd  

               passwords   2nd  

               preventing attacks   2nd   3rd  

               Trojan horses   2nd  

               types of attacks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               viruses   2nd   3rd   4th   5th  

WatchGuard SOHO  

Web

       browsers

               amanging printers   2nd   3rd  

Web sites

       ACPI   2nd  

       Bluetooth  

       CodeWeavers  

       Datapoint  

       SMSC (Standard Microsystems Corporation)  

Web-based printers folder

       managing   2nd   3rd   4th   5th  

WECA (Wireless Ethernet Compatibility Alliance)   2nd   3rd  

weight

       fiber- optic cables  

WEP (Wired Equivalent Privacy)   2nd   3rd   4th   5th   6th  

WfM (Wired for Management)   2nd  

       Universal Network Boot  

Wi-Fi (Wireless Fidelity)

       selecting   2nd  

Wi-Fi Alliance  

Wiazrds

       Add Printer  

wide area network.   [See WAN]2nd   [See WAN]

wide area networks.   [See WANs]

Wildpackets  

WILL command  

windows

       backup  

       congestion  

       Effective Rights  

Windows

       FTP (File Transfer Protocol) command-line clients   2nd   3rd   4th   5th   6th   7th   8th   9th  

       integrated Windows authentication  

       ipconfig command   2nd   3rd   4th   5th  

       netstat command   2nd   3rd   4th   5th  

       NFS   2nd  

windows

        offered  

Windows

       permissions

               cumulative effect of  

       permissons

               cumulative effects of  

       ping command   2nd   3rd  

       print servers

               printers/printing devices   2nd   3rd   4th  

       print serversadding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

       SFU (Services for Unix 3.0)   2nd   3rd  

               installing   2nd   3rd   4th   5th  

windows

       sizes  

       sliding  

Windows

       SOHO   2nd   3rd  

Windows 200 Server

       DFS   2nd   3rd   4th   5th   6th  

Windows 2000

       Administration Tools

               installing   2nd  

       DHCP servers

               authorizing   2nd   3rd  

               installing   2nd  

               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  

       directories

               interoperability   2nd  

               selecting   2nd  

       eDirectory  

       groups   2nd   3rd  

       migrating from Novell Netware   2nd   3rd  

               CSNW   2nd   3rd   4th  

               GSNW   2nd   3rd   4th   5th   6th   7th  

               SFN   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  

       MMC (Microsoft management Console)  

       MMC (Microsoft Management Console)

               Action menu   2nd  

               computer management   2nd   3rd   4th   5th   6th  

               properties   2nd   3rd   4th   5th  

                User Manager   2nd   3rd  

        name resolution  

       print servers

               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

       printers

               adding   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

       Telnet

               managing   2nd  

       user groups   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       user-level permissions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       Windows NT

               centralized/decentralized management   2nd   3rd  

               domain controllers   2nd   3rd  

               member servers   2nd   3rd  

               migrating   2nd  

               modeling directories   2nd   3rd  

               namespaces   2nd  

       WINS

               installing   2nd  

               managing   2nd   3rd   4th   5th   6th  

Windows 2000 Professional

       Windows 2003 Server   2nd   3rd   4th   5th  

Windows 2000 Professional Client

       configuring   2nd   3rd   4th   5th  

Windows 2000 Server

       ActiveState ActivePerl 5.6  

       DNS   2nd  

       Korn Shell command   2nd   3rd   4th   5th  

       NetWare

               file permissions   2nd   3rd   4th   5th   6th   7th   8th  

       passwords   2nd   3rd   4th  

       Telnet   2nd   3rd   4th  

       Unix

               FTP   2nd   3rd   4th  

               managing FTP   2nd   3rd   4th   5th  

               protocols/utuilities   2nd   3rd  

               TCP/IP   2nd  

               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       upgrading to   2nd   3rd  

       user name mapping   2nd  

       Windows 2003 Server

               upgrading to   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  

Windows 2000/2003

       configuring

               auditing policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

       Event Viewer

               applying   2nd   3rd   4th   5th   6th   7th   8th  

       servers

               events   2nd  

Windows 2003

       groups   2nd   3rd  

Windows 2003 Server

       Active Directory   2nd  

               installing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       ActiveState ActivePerl 5.6  

       BOOTP   2nd   3rd   4th   5th   6th  

       DFS   2nd   3rd   4th   5th   6th  

       DNS   2nd  

       installing  

       Korn Shell command   2nd   3rd   4th   5th  

       NetWare

               file permissions   2nd   3rd   4th   5th   6th   7th   8th  

       operating systems   2nd  

       passwords   2nd   3rd   4th  

       Telnet   2nd   3rd   4th  

               managing   2nd  

       Unix

               FTP   2nd   3rd   4th  

               FTP;managing   2nd   3rd   4th   5th  

               protocols/utilities   2nd   3rd   4th   5th   6th   7th   8th   9th  

               TCP/IP   2nd  

               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       upgrading to   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  

       user name mapping   2nd  

       WINS

               managing  

               netsh commands   2nd   3rd  

Windows 95

       share-level permissions   2nd  

Windows 98

       share-level permissions   2nd  

Windows Component Wizard  

Windows Components Wizard  

Windows Internet Naming Service (WINS)   2nd  

Windows NT

       ActiveState ActivePerl 5.6  

       domains

               controllers   2nd   3rd  

               creating trust relationships   2nd   3rd   4th   5th  

               interdomain trust relationships   2nd   3rd   4th  

               models   2nd   3rd   4th   5th   6th   7th   8th  

               replication between controllers   2nd   3rd   4th  

               workgroups   2nd   3rd   4th  

       eDirectory  

       Event Log  

       Event Viewer   2nd  

       groups   2nd  

               adding users   2nd  

               assigning membership   2nd  

               built-in user groups   2nd   3rd  

               creating   2nd   3rd  

       Korn Shell command   2nd   3rd   4th   5th  

       NTFS

               permissions  

       passwords   2nd   3rd   4th   5th   6th   7th  

       printers

               managing   2nd  

       share-level permissions  

       Telnet   2nd   3rd   4th  

       trust relationships  

       Unix

               protocols/utilities   2nd   3rd   4th   5th   6th   7th  

       user accounts

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       user name mapping   2nd  

       user-level permissions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       Windows 2000

               centralized/decentralized management   2nd   3rd  

               domain controllers   2nd   3rd  

               member servers   2nd   3rd  

               migrating   2nd  

               modeling directories   2nd   3rd  

               namespaces   2nd  

Windows NT 4.0

       configuring

               auditing policies   2nd   3rd   4th   5th   6th   7th  

       Event Viewer

               applying   2nd   3rd  

       migrating from Novell Netware   2nd   3rd  

               CSNW   2nd   3rd   4th  

               GSNW   2nd   3rd   4th   5th   6th   7th  

               SFN   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  

       printers

               adding   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  

       servers

               upgrading to Windows 2003 Server   2nd   3rd   4th   5th   6th   7th   8th   9th  

Windows Server 2003

       eDirectory  

Windows XP Professional

       auditing   2nd   3rd   4th  

       printing   2nd   3rd   4th   5th   6th   7th   8th   9th  

       Windows 2003 Server   2nd   3rd   4th   5th  

WinDump command   2nd   3rd   4th  

Winodws NT 4.0

       printers

               adding   2nd  

WINS

       configuring   2nd  

       NetBIOS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       Windows 2000

               installing   2nd  

               managing   2nd   3rd   4th   5th   6th  

       Windows 2003 Server

               managing  

               netsh commands   2nd   3rd  

WINS (Windows Internet Naming Service)   2nd  

wire-mapping  

Wired Equivalent Privacy (WEP)   2nd   3rd   4th   5th   6th  

Wired for Management (WfM)   2nd  

       Universal Network Boot  

Wired Protected Access (WPA)   2nd  

wireless

       IEEE 802.11   2nd  

       topologies   2nd  

wireless devices  

       3G mobile phones   2nd  

       PDAs   2nd  

Wireless Ethernet Compatibility Alliance (WECA)   2nd   3rd  

Wireless Fidelity (Wi-Fi)

       selecting   2nd  

wireless hubs  

wireless network adapters

       installing   2nd   3rd   4th   5th   6th   7th   8th  

wireless networking   2nd   3rd   4th  

       ad-hoc networks   2nd   3rd   4th  

       APs (access points)   2nd   3rd   4th   5th  

       HomeRF technology  

       IEEE 802.11 standards   2nd  

               MAC layer   2nd   3rd   4th  

               Physical layer   2nd   3rd  

       interference   2nd   3rd  

       LAN

               adding   2nd   3rd   4th   5th   6th   7th  

               security   2nd   3rd  

       radio wave transmission  

       spread-spectrum technology   2nd   3rd   4th  

       WAN (wide area network)   2nd   3rd   4th  

wireless networks

       AMA  

       connecting  

       IEEE  

       need for   2nd  

       PAN   2nd   3rd  

       public use of   2nd  

       security   2nd  

       SOHO  

       SOHO (Small Office and Home Office)

               troubleshooting   2nd  

       Wi-Fi Alliance  

wireless protocols

       selecting   2nd  

wireless routers

       installing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  

wireless security

       WEP   2nd   3rd   4th   5th  

       WPA   2nd  

Wireless Token-Ring Protocol (WTRP)  

wiring

       ARCnet   2nd   3rd  

       Category 5   2nd  

       drawings  

       records   2nd  

        reports  

       structured   2nd  

               backbone cabling system   2nd   3rd   4th  

               horizontal cabling system   2nd   3rd  

               work area specification  

       terminologies  

               ACR (attenuation to cross talk ratio)  

               attenuation   2nd   3rd  

               bandwidth   2nd  

               characteristic impedance  

               cross-talk   2nd  

               dialectic  

               electromagnetic field  

               EMI (electromagnetic interference)  

               FEXT ( far-end cross-talk)   2nd   3rd  

               frequency   2nd  

                full-duplex communication   2nd  

               half-duplex communication   2nd  

               impedance  

               impedance match  

               leakage  

               NEXT ( near-end corss-talk)  

               NEXT (near-end cross-talk)  

               niminal velocity of propogation  

               Power SUM  

               radio frequencies   2nd  

                shields   2nd  

               TDR (time domain reflectometry)   2nd  

       twisted-pair.   [See also 10Base-T networks]

       work orders   2nd  

wizards

       Add Printer Wizard  

       Administration Tools Setup  

       Installation  

       Windows Component  

       Windows Components  

WOL

       compliant network cards   2nd  

       network adapter card  

WOL (Wake on LAN)   2nd  

       Universal Network Boot  

WON'T command  

word processors

       documentation   2nd   3rd   4th  

work area specification

       structured wiring  

work orders

       wiring   2nd  

work patterns, assessing   2nd  

workgroups

       temporary  

       Windows NT

               creating trust relationships   2nd   3rd   4th   5th  

               domain controllers   2nd   3rd  

               domain models   2nd   3rd   4th   5th   6th   7th   8th  

               domains   2nd   3rd   4th  

               interdomain trust relationships   2nd   3rd   4th  

               replication between domain controllers   2nd   3rd   4th  

workstations

       backbones   2nd  

        backups   2nd   3rd   4th   5th   6th   7th  

               media   2nd   3rd   4th   5th  

       BOOTP   2nd  

               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               customizing DHCP   2nd   3rd   4th   5th  

               DHCP   2nd   3rd   4th   5th   6th   7th  

               downloading operating systems   2nd  

               options fields   2nd   3rd   4th   5th  

               packet formats   2nd   3rd   4th   5th  

               request/reply mechanisms   2nd   3rd   4th  

       Gigabit Ethernets  

       limiting   2nd  

       NIC (network interface card)

               installing   2nd   3rd   4th   5th   6th   7th   8th   9th  

World Wide Web Consortium (W3C)   2nd   3rd   4th  

WPA (Wired Protected Access)   2nd  

WRITE command   2nd  

WTRP (Wireless Token-Ring Protocol)  

Категории