[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] d parameter tracert command daily backups daily counters monitoring 2nd data System State 2nd Data Encryption Standard. [See DES] Data Recovery Agent. [See DRA] data transmission security. [See IPSec] databases LSDB Removable Storage restoring default DC security template Default Domain Policy default gateways 2nd testing default routes default security settings (Windows 2003) identifying 2nd 3rd 4th 5th 6th 7th 8th default security settings (Windows XP Professional) identifying 2nd 3rd 4th 5th 6th 7th default security template delegated DNS namespaces delegated namespaces deleting certificate templates PrepLogic Practice Exams delta CRLs delta CRLs (Certificate Revocation Lists) Demand-Dial Connections dialog box demand-dial routing Denial of Serivce (DoS) attacks Department of Defense. [See DoD] DES (Data Encryption Standard) designs high availability 2nd destination parameter route command DHCP dynamic updates DHCP relay agents DHCP servers troubleshooting 2nd dial-in constraints (remote access profiles) 2nd Dial-in Constraints tab (Edit Profile dialog box) 2nd dial-in properties (remote access) 2nd dialog boxes Access Method Accounting to Payroll Security Policy Properties Add Counters 2nd Add Objects Add Standalone Snap-ins Add/Edit Port Rule Advanced Restore Options Advanced TCP/IP Settings WINS tab Analyzing Configuration Analyzing System Security Authentication Method Authentication Methods Backup Destination Backup Options Backup Type, Destination, and Name CA Identifying Information CA Properties Extensiosn tab CA Type Certificate Database Settings Certificate Friendly Name and Description Cluster IP Addresses Cluster Name and Domain Cluster Parameters Cluster Service Account Communicating with Computers That Do Not Support IPSec Completing the Backup Wizard Completing the IP Filter Wizard Completing the IP Security Filter Action Wizard Completing the New Remote Access Policy Wizard Completing the Restore Wizard Completing the Wireless Network Policy Wizard Configure Log Files Connect Creating the Cluster Custom Security Method Settings Demand-Dial Connections DNS server Properties Advanced tab DNS Server Properties Forwarders tab Edit Profile Advanced tab Authentication tab Dial-in Constraints tab 2nd Encryption tab IP tab Multilink tab 2nd Edit Rule Properties Authentication Methods tab Connection Type tab Filter Actions tab IP Filter List tab Tunnel Setting tab Enable Certificate Templates Filter Action Filter Action General Options Host Parameters How to Back Up How to Restore Import Policy From IP Filter Description and Mirrored Property IP Filter List IP Protocol Type IP Security Policy Name IP Traffic Destination IP Traffic Security IP Traffic Source Items to Back Up Key Exchange Security Methods Key Exchange Settings Local Area Connection Properties network adapter Properties network adapter Status Network Type New Interface for RIP Version 2 for Internet Protocol New Preferred Setting Properties IEEE 802.1x tab Network Properties tab OSPF OSPF Area Configuration OSPF Virtual Interface Configuration Policy Configuration Method Policy Encryption Level Port Rules Properties Previous Versions tab Proposed Cluster Configuration Public and Private Key Pair Remote Assistance settings Remote Desktop Connection Replication Partner Properties Requests for Secure Communication Restore Progress Revoked Certificates Properties RIP properties Select Computer Select Network Component Type Select Network Service Shadow Copies Shut Down Windows System Monitor Properties TCP/IP Properties Tunnel Endpoint Type of Backup What to Back Up What to Restore When to Back Up Where to Restore Wirelesss Network Policy Name WLAN Properties General tab options dialy backups differential backups 2nd Diffie-Hellman exchange digital certificates. [See certificates] directed messages Directory E-mail Replication disable port range filtering 2nd disaster recovery . [See also backups] ASR floppy drives performing 2nd sets, creating 2nd Backup Utility 2nd new features 2nd volume shadow copies 2nd 3rd 4th configuring 2nd 3rd 4th configuring for file server exercise Disconnect button 2nd disconnected sessions (RDA) disks counters ERDs junction points junction points, restoring quorum defined startup display command NLB monitoring Distance Vector Multicast Routing Protocol. [See DVMRP]2nd [See DVMRP] Distance Vector protocols 2nd RIP 2nd addint to RRAS 2nd bandwidth businesses today convergence hop count implementing 2nd network size options 2nd OSPF, compared 2nd 3rd silent, implementing 2nd silent, implmenting subnetted networks troubleshooting 2nd RIPv2 distribution requirements smart cards 2nd DNS 2nd clients dynamic updates forwarders 2nd forwarding configuration 2nd 3rd 4th 5th conditional forwarding 2nd forwarders name resolvers 2nd slave servers FQDN FQDNs 2nd hierarchies 2nd 3rd iterative queries local resolver caches purging name restrictions namespace, planning 2nd 3rd 4th 5th namespaces delegated existing planning restrictions unique providers queries recursive queries resolvers 2nd 3rd 4th security 2nd 3rd 4th Active Directory permissions 2nd DNSSEC 2nd dynamic updates 2nd 3rd 4th server properties 2nd zone transfers 2nd servers DNSSEC 2nd properties 2nd slave servers 2nd third-party solutions 2nd TLDs 2nd troubleshooting zones 2nd 3rd 4th Active Directory-integrated Active Directory-integrated zones compared comparisons database files domains, compared security standard primary 2nd standard secondary 2nd stub 2nd transfers zones, planning 2nd 3rd 4th 5th DNS (Domain Name Service) DNS Security. [See DNSSEC]2nd [See DNSSEC] DNS server Properties dialog box Advanced tab DNS Server Properties dialog box Forwarders tab DnsAdmins permissions DNSSEC (DNS Security) 2nd DoD TCP/IP, mapping DoD (Department of Defense) model TCP/IP networks Domain Admins permissions Domain Controller Authentication template Domain Controller template Domain Name Service. [See DNS] Domain Policy domains clusters first-level footprinting root doman policies DoS (Denial of Service) attacks downloading MBSA SUS DRA (Data Recovery Agent) drivers Network Monitor drives floppy ASR DumpEL (Dump Event Log) DVMRP (Distance Vector Multicast Routing Protocol DVMRP (Distance Vector Multicast Routing Protocol) dynamic routing 2nd advantages/disadvantages Distance Vector protocols Link State protocols 2nd dynamic routing tables dynamic updates 2nd 3rd 4th DHCP DNS clients secure 2nd |