Index D


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

d parameter
       tracert command  
daily backups  
daily counters
       monitoring   2nd  
data
       System State   2nd  
Data Encryption Standard.   [See DES]
Data Recovery Agent.   [See DRA]
data transmission
       security.   [See IPSec]
databases
       LSDB  
       Removable Storage
               restoring  
default DC security template  
Default Domain Policy  
default gateways   2nd  
       testing  
default routes  
default security settings (Windows 2003)  
       identifying   2nd   3rd   4th   5th   6th   7th   8th  
default security settings (Windows XP Professional)
       identifying   2nd   3rd   4th   5th   6th   7th  
default security template  
delegated DNS namespaces  
delegated namespaces  
deleting
       certificate templates  
       PrepLogic Practice Exams  
delta CRLs  
delta CRLs (Certificate Revocation Lists)  
Demand-Dial Connections dialog box  
demand-dial routing  
Denial of Serivce (DoS) attacks  
Department of Defense.   [See DoD]
DES (Data Encryption Standard)  
designs
       high availability   2nd  
destination parameter  
       route command  
DHCP
       dynamic updates  
DHCP relay agents  
DHCP servers
       troubleshooting   2nd  
dial-in constraints (remote access profiles)   2nd  
Dial-in Constraints tab (Edit Profile dialog box)   2nd  
dial-in properties (remote access)   2nd  
dialog boxes
       Access Method  
       Accounting to Payroll Security Policy Properties  
       Add Counters   2nd  
       Add Objects  
       Add Standalone Snap-ins  
       Add/Edit Port Rule  
       Advanced Restore Options  
       Advanced TCP/IP Settings
               WINS tab  
       Analyzing Configuration  
       Analyzing System Security  
       Authentication Method  
       Authentication Methods  
       Backup Destination  
       Backup Options  
       Backup Type, Destination, and Name  
       CA Identifying Information  
       CA Properties
               Extensiosn tab  
       CA Type  
       Certificate Database Settings  
       Certificate Friendly Name and Description  
       Cluster IP Addresses  
       Cluster Name and Domain  
       Cluster Parameters  
       Cluster Service Account  
       Communicating with Computers That Do Not Support IPSec  
       Completing the Backup Wizard  
       Completing the IP Filter Wizard  
       Completing the IP Security Filter Action Wizard  
       Completing the New Remote Access Policy Wizard  
       Completing the Restore Wizard  
       Completing the Wireless Network Policy Wizard  
       Configure Log Files  
       Connect  
       Creating the Cluster  
       Custom Security Method Settings  
       Demand-Dial Connections  
       DNS server Properties
               Advanced tab  
       DNS Server Properties
               Forwarders tab  
       Edit Profile
               Advanced tab  
               Authentication tab  
               Dial-in Constraints tab   2nd  
               Encryption tab  
               IP tab  
               Multilink tab   2nd  
       Edit Rule Properties  
               Authentication Methods tab  
               Connection Type tab  
               Filter Actions tab  
               IP Filter List tab  
               Tunnel Setting tab  
       Enable Certificate Templates  
       Filter Action  
       Filter Action General Options  
       Host Parameters  
       How to Back Up  
       How to Restore  
       Import Policy From  
       IP Filter Description and Mirrored Property  
       IP Filter List  
       IP Protocol Type  
       IP Security Policy Name  
       IP Traffic Destination  
       IP Traffic Security  
       IP Traffic Source  
       Items to Back Up  
       Key Exchange Security Methods  
       Key Exchange Settings  
       Local Area Connection Properties  
       network adapter Properties  
       network adapter Status  
       Network Type  
       New Interface for RIP Version 2 for Internet Protocol  
       New Preferred Setting Properties  
               IEEE 802.1x tab  
               Network Properties tab  
       OSPF  
       OSPF Area Configuration  
       OSPF Virtual Interface Configuration  
       Policy Configuration Method  
       Policy Encryption Level  
       Port Rules  
       Properties
               Previous Versions tab  
       Proposed Cluster Configuration  
       Public and Private Key Pair  
       Remote Assistance settings  
       Remote Desktop Connection  
       Replication Partner Properties  
       Requests for Secure Communication  
       Restore Progress  
       Revoked Certificates Properties  
       RIP properties  
       Select Computer  
       Select Network Component Type  
       Select Network Service  
       Shadow Copies  
       Shut Down Windows  
       System Monitor Properties  
       TCP/IP Properties  
       Tunnel Endpoint  
       Type of Backup  
       What to Back Up  
       What to Restore  
       When to Back Up  
       Where to Restore  
       Wirelesss Network Policy Name  
       WLAN Properties
               General tab options  
dialy backups  
differential backups   2nd  
Diffie-Hellman exchange  
digital certificates.   [See certificates]
directed messages  
Directory E-mail Replication  
disable port range filtering   2nd  
disaster recovery  
       .   [See also backups]
       ASR  
               floppy drives  
               performing   2nd  
               sets, creating   2nd  
       Backup Utility   2nd  
               new features   2nd  
       volume shadow copies   2nd   3rd   4th  
               configuring   2nd   3rd   4th  
               configuring for file server exercise  
Disconnect button   2nd  
disconnected sessions (RDA)  
disks
       counters  
       ERDs  
       junction points  
       junction points, restoring  
       quorum
               defined  
       startup  
display command
       NLB monitoring  
Distance Vector Multicast Routing Protocol.   [See DVMRP]2nd   [See DVMRP]
Distance Vector protocols   2nd  
       RIP   2nd  
               addint to RRAS   2nd  
               bandwidth  
               businesses today  
               convergence  
               hop count  
               implementing   2nd  
               network size  
               options   2nd  
               OSPF, compared   2nd   3rd  
               silent, implementing   2nd  
               silent, implmenting  
                subnetted networks  
               troubleshooting   2nd  
       RIPv2  
distribution requirements
       smart cards   2nd  
DNS   2nd  
        clients
               dynamic updates  
       forwarders   2nd  
       forwarding configuration   2nd   3rd   4th   5th  
               conditional forwarding   2nd  
               forwarders  
               name resolvers   2nd  
               slave servers  
       FQDN  
       FQDNs   2nd  
       hierarchies   2nd   3rd  
       iterative queries  
       local resolver caches
               purging  
       name restrictions  
       namespace, planning   2nd   3rd   4th   5th  
       namespaces
               delegated  
               existing  
               planning  
               restrictions  
               unique  
       providers  
       queries  
       recursive queries  
       resolvers   2nd   3rd   4th  
       security   2nd   3rd   4th  
               Active Directory permissions   2nd  
               DNSSEC   2nd  
               dynamic updates   2nd   3rd   4th  
               server properties   2nd  
               zone transfers   2nd  
       servers
               DNSSEC   2nd  
               properties   2nd  
       slave servers   2nd  
       third-party solutions   2nd  
       TLDs   2nd  
       troubleshooting  
       zones   2nd   3rd   4th  
               Active Directory-integrated  
               Active Directory-integrated zones  
               compared  
               comparisons  
               database files  
               domains, compared  
               security  
               standard primary   2nd  
               standard secondary   2nd  
               stub   2nd  
               transfers  
       zones, planning   2nd   3rd   4th   5th  
DNS (Domain Name Service)  
DNS Security.   [See DNSSEC]2nd   [See DNSSEC]
DNS server Properties dialog box
       Advanced tab  
DNS Server Properties dialog box
       Forwarders tab  
DnsAdmins
       permissions  
DNSSEC (DNS Security)   2nd  
DoD
       TCP/IP, mapping  
DoD (Department of Defense) model
       TCP/IP networks  
Domain Admins
       permissions  
Domain Controller Authentication template  
Domain Controller template  
Domain Name Service.   [See DNS]
Domain Policy  
domains
       clusters  
        first-level  
       footprinting  
       root  
doman policies  
DoS (Denial of Service) attacks  
downloading
       MBSA  
       SUS  
DRA (Data Recovery Agent)  
drivers
       Network Monitor  
drives
       floppy
               ASR  
DumpEL (Dump Event Log)  
DVMRP (Distance Vector Multicast Routing Protocol  
DVMRP (Distance Vector Multicast Routing Protocol)  
dynamic routing   2nd  
       advantages/disadvantages  
       Distance Vector protocols  
       Link State protocols   2nd  
dynamic routing tables  
dynamic updates   2nd   3rd   4th  
       DHCP  
       DNS clients  
       secure   2nd  



MCSE Windows Server 2003 Network Infrastructure (Exam 70-293)
MCSE 70-293 Exam Prep: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736500
EAN: 2147483647
Year: 2003
Pages: 151
Authors: Will Schmied

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net