P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

P-node (peer-to-peer) name resolution, WINS
packet addressing (network data-link layer)
packet filtering
     configuring
         using RRAS
         using TCP/IP Filtering
     defined by IPSec policy
     NAT/Basic Firewall 2nd
     techniques
page faults, monitoring
paged kernel memory
parent-child trusts 2nd
partitions
     Active Directory
         application data partitions, creating
         bridgehead server for replication 2nd
         forest root, configuration, and schema
         monitoring replication
         types of data distrubuted by
     basic disk partition styles
     basic disk partition types
     MBR and GPT styles
     styles
     system, boot, and active
Password Authentication Protocol (PAP) 2nd 3rd
Password Never Expires (Account tab, user properties)
password policies 2nd
     default security for
     default settings, Windows Server 2003
     setting
     strict, using with smart cards
passwords
     Active Directory authoritative restores and
    computer accounts
         problems with
         resetting
     computer, managing
     resetting for computer accounts
    user account
         setting with DSMOD USER
    user accounts
         resetting
     user properties, Account tab options
patches, applying to deployed software
PDC emulator 2nd
PDC emulator master
     recommendation for placement
     viewing and relocating
PEAP (Protected EAP) 2nd
peer-to-peer (P-node) name resolution, WINS
performance
     choosing objects to monitor
     logging 2nd
     monitoring and analyzing for Active Directory
     monitoring for system bottlenecks
     monitoring on a server
     optimization for server and applications, Windows Server 2003
     server environment
         choosing objects to monitor
         file and print servers
         monitoring disk performance objects
         monitoring memory performance objects
         monitoring network performance objects
         monitoring processor performance objects
     system, monitoring in server environment 2nd 3rd
         using Performance console
         using Task Manager
Performance console 2nd 3rd
     creating performance alerts
     creating performance logs
     monitoring performance of local and remote systems
     Performance Logs and Alerts snap-in
     System Monitor snap-in
performance counters 2nd
Performance Logging
     monitoring DNS
     network traffic, monitoring
Performance Logs and Alerts
Performance Monitor Users group
performance monitoring
     configuring on servers, practice exercise
     Memory performance objects
performance object instances 2nd
performance objects 2nd
     choosing for monitoring based on server role
     choosing objects to monitor
     monitoring Network objects
     NTDS, monitoring Active Directory
periodic update mode (RIP router)
permissions
     Active Directory
         default
         viewing or managing
     administrative, assigning to a user
    computer accounts
         insufficient to join a domain
         prestaging or joining computer to domain
     delegated administrative permissions
     delegation and
     filesystem 2nd 3rd 4th
         basic permissions
         default
         default security
         effective permissions 2nd
         inherited permissions 2nd
         ownership of files and folders 2nd
         share vs.
         special permissions 2nd
         troubleshooting access problems 2nd
         web shares
         working with NTFS permissions
     IIS application permissions 2nd
     IIS content permissions 2nd
     joining computer to a domain, problems with
     Registry, default
     shared folders 2nd 3rd
     Terminal Services 2nd
         basic permissions
     to print
     users and groups in Active Directory domains
     web shares
Physical Address, network adapter
physical devices
     disks
     managing and maintaining 2nd 3rd
physical layer (networks, OSI model)
physical memory, usage summary in Task Manager
physical placement, network resources
physical structure (networks)
ping utility
     determining if computer can connect to another computer
     determining whether IP address is in use
     diagnosing WAN Internet connectivity problems
     troubleshooting TCP/IP addressing
pingpath command
     diagnosing WAN Internet connnectivity problems
PKI (Public Key Infrastructure) 2nd
     planning and configuring
     using Certificate Services
     using public and private keys with digital certificates
Plug-and-Play (PnP) devices
policies
    account
         default security
     Active Directory-based policy settings, order of application
     computer and user
     IPSec (IP Security) 2nd
         monitoring
     Kerberos 2nd
     local, default security for
     multiple computer policies, order of precedence
     primary security settings for computers in an OU
     remote access 2nd 3rd
ports
     configuring routing ports 2nd 3rd
     security
    TCP and UDP
         commonly used
         used in replication
PPP (Point-to-Point Protocol) connections 2nd
PPPoE (Point-to-Point Protocol over Ethernet), network interfaces for 2nd
PPTP (Point-to-Point Tunneling Protocol) 2nd
practice tests, online
predefined options (TCP/IP)
prefix notation (network IP addresses) 2nd
prestaging computer accounts
Previous Version client
primary DNS servers 2nd 3rd
     for Active Directory domains
primary DNS suffixes 2nd
primary name servers
primary restore on Sysvol folder
primary restore, performing on Sysvol
primary zone files 2nd 3rd
primary zones
     storage in Active Directory
principle of least privilege 2nd
print queues 2nd
     managing 2nd 3rd
     monitoring and troubleshooting
         print management window
         printer Properties dialog
Print Server Properties dialog box
print servers
     monitoring performance
    performance monitoring
         print queues
     Windows Server 2003 environment
printer properties 2nd
printing, permissions
priority, setting for processes
private IP addresses 2nd
     enabling Internet access with NAT
     overview by class 2nd 3rd
private key encryption
privileges, principle of least privilege
processes, viewing and manipulating in Task Manager
processor performance objects, monitoring 2nd 3rd
     resolving bottlenecks
properties
     computer accounts
     computer, managing
     DNS zones
     group, viewing, or managing
     shared folders
    user account
         common tabs for properties dialogs
         setting with DSADD USER
         setting with DSMOD USER
         viewing and managing with Active Directory
         viewing in Active Directory
Properties dialog box (printers) 2nd
Properties dialog box, DNS servers
Protected EAP (PEAP) 2nd
proxies
     causing problems with Internet connectivity
     using public IP addresses with
PTR (pointer) records 2nd 3rd
     clients registering their own with dynamic DNS updates
     dynamic updates 2nd
     dynamic updates by DHCP server
     resolving IP addresses to computer names
public IP addresses 2nd
     overview of address classes
     use with proxy servers
public key encryption




MCSE Core Required Exams in a Nutshell
MCSE Core Required Exams in a Nutshell: The required 70: 290, 291, 293 and 294 Exams (In a Nutshell (OReilly))
ISBN: 0596102283
EAN: 2147483647
Year: 2006
Pages: 95

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net