T

 < Day Day Up > 



Telnet

A program that runs a command console on the client computer much like the command console in Windows Server 2003.

terminal concentrator

A piece of equipment which contains a large number of serial ports that can support a connection to a server. The terminal concentrator can be connected to a network or a modem to provide terminal access to the servers it is connected to. This makes it easier to provide out-of-band communication to a larger amount of servers. A terminal concentrator also makes it easier to secure out-of-band communications.

threat modeling

A process used to describe the threats to a system and the harm they could to do to the system if it has a vulnerability.

three-pronged configuration

Configuration in which a firewall system has a minimum of three network adapters. One adapter will be connected to the internal network, one to the external or public network, and the third to a screened subnet. This configuration allows for hosts from the public and internal networks to access the available resources in the screened subnet while continuing to isolate the internal network from the wild.

Transport Layer Security (TLS)

This type of security is used to provide session encryption and integrity for packets sent from one computer to another. This could be client-to-server or server-to-server network traffic. It also provides a means for the verification of the server to the client and the client to the server through X.509 certificates (digital certificates).

tree-root trust

A trust between the tree-root domains of each tree. It is created automatically when a new tree is created in an existing forest.

trust model

A model representing the configuration of the trusts between an Active Directory domain or forest and another environment.

trusted computing base

A trusted computing base is the total combination of protection mechanisms in a computer system.

two-factor authentication

Using this authentication method, you have some additional means of authentication in addition to a password. For example, you can use the physical smart card or biometrics in addition to a valid PIN to authenticate on the network or digitally sign an e-mail message.



 < Day Day Up > 



MCSE. Windows Server 2003 Network Security Design Study Guide Exam 70-298
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net