P


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

packet sniffing
packet switching 2nd
     datagram packet switching 2nd
     virtual-circuit packet switching
packet-filtering firewalls
     IP addresses
     MAC addresses
     port numbers
     protocols, identifying
PAD (packet assemblers/disassemblers)
PAP (Password Authentication Protocol)
partitioning
passive hubs
passwords 2nd
     complexity
     enforcing password history
     NetWare (Novell)
     policies
         expiration
         minimum lengths
     reusing
     sharing
     strength of 2nd
     Windows servers 2nd
patch panels
PCs
     coaxial network connections
     twisted-pair network connections
     wireless network connections
peer-to-peer networks
     versus client/server networks 2nd
peripherals
    mouse devices
         modem conflicts
permissions
    client connectivity errors
         troubleshooting 2nd
    Linux
         file systems
     Mac OS X server file systems
    NetWare (Novell)
         file systems
     Windows server file services 2nd
     Windows server shares 2nd
physical bus topologies
physical layer (OSI reference model) 2nd
physical objects (wireless network interference)
physical ring topologies [See ring topologies]
physical topologies (networks)
ping diagnostic utility
     Destination Host Unreachable error message
     DNS
     Expired TTL error message
     llopback addresses
     Request Timed Out error message
     switches list table
     troubleshooting example 2nd
     Unknown Host error message
ping utility
     ICMP (Internet Control Message Protocol)
PKI (Public Key Infrastructer)
     encryption
plugs [See hardware loopback connectors]
poison reverse (routing loops)
polarization
polymorphic viruses
POP3 (Post Office Protocol version 3) 2nd
port blocking 2nd
     network users, effects on
port numbers
     packet-filtering firewalls
     port blocking 2nd
     purposes of
port-based VLAN memberships
ports
     MDI (Medium Dependant Interface) ports
     MDI-X (Medium Dependant Interface-Crossed) ports (hubs)
         crossover cables 2nd
     TCP/IP protocol 2nd
         assignment chart
     well-known ports
POTS Internet connections
     troubleshooting 2nd
POTS/PSTN (Plain Old Telephone Service/Public Switched Telephone Network) Internet access
PPP (Point-to-Point Protocol) 2nd
     remote network connections
PPPoE (Point-to-Point Protocol over Ethernet)
     remote network connections 2nd
PPTP (Point-to-Point Tunneling Protocol)
     versus L2TP (Layer 2 Tunneling Protocol) 2nd
practice exams
     exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
         answer key 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
         answer key 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
presentation layer (OSI reference model) 2nd
     encryption
PRI (Primary Rate Interface) standard
     versus BRI (Basic Rate Interface) standard 2nd
primary server configurations
print services
    Linux
         CUPS
         Line Printer daemon
    NetWare (Novell)
         capture command-line utility
         Distributed Print Services
     Windows servers 2nd
printing
     troubleshooting checklist
private address ranges
     subnet masks
private networks
     firewalls
     private address ranges
         subnet masks
    versus public networks
         IP addresses 2nd 3rd
probable cause, selecting (troubleshooting steps/procedures)
processors
     encryption
propagation time (satellite Internet access)
proto information heading (netstat diagnostic utility)
protocol-based VLAN memberships 2nd
protocols
     802.1x protocol 2nd
     AFP (Apple File Protocol)
     AppleTalk protocol suite
         addresses
         AppleTalk over IP
         functions of 2nd 3rd
         hostnames
         interoperability
         protocol comparison chart
         RTMP protocol
         zones
     ARP (Address Resolution Protocol)
     ATCP (AppleTalk Control Protocol)
     BOOTP
     CHAP (Challenge Handshake Authentication Protocol)
    client connectivity configurations
         troubleshooting 2nd
     comparison chart 2nd
     DHCP (Dynamic Host Configuration Protocol) 2nd
         dynamic addresses
         scopes
     distance vector routing protocols
         IPX RIP (Routing Information Protocol) 2nd
         RIP (Routing Information Protocol)
         routing tables
         versus link state routing protocols
     DNS (Domain Name Service) protocol 2nd 3rd
         HOSTS files 2nd
     EAP (Extensible Authentication Protocol)
    file sharing
         AFP
         NFS
         SMB/CIFS
     FTP (File Transfer Protocol)
         commands list 2nd
         ports
         security
     HTTP (Hypertext Transfer Protocol)
         URL (uniform resource locator)
    HTTPS (Hypertext Transfer Protocol Secure)
         SSL (Secure Sockets Layer)
    ICMP (Internet Control Message Protocol)
         ping utility
     IGMP (Internet Group Management Protocol)
     IMAP4 (Internet Message Access Protocol version 4) 2nd
     IP (Internet Protocol)
     IPSec (IP Security) protocol 2nd
     IPX RIP (Routing Information Protocol) 2nd
    IPX/SPX (Internetwork Packet Exchange) protocol suite
         functions of 2nd
         hostnames
         interoperability
         IPX addresses
         protocol comparison chart
     Kerberos
    L2TP (Layer 2 Tunneling Protocol)
         versus PPTP (Point-to-Point Tunneling Protocol) 2nd
     LDAP (Lightweight Directory Access Protocol) 2nd
    link state routing protocols
         LSA (link state advertisements)
         NLSP (NetWare Link State Protocol)
         OSPF (Open Shortest Path First)
         versus distance vector routing protocols
     LPD (Line Printer Daemon) protocol
     LPR (Line Printer Remote) 2nd
     MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)
     NetBEUI protocol
         addresses
         protocol comparison chart
     NFS (Network File System)
     NNTP (Network News Transport Protocol)
     NTP (Network Time Protocol)
     packet-filtering firewalls
     PAP (Password Authentication Protocol)
     POP3 (Post Office Protocol version 3) 2nd
     PPP (Point-to-Point Protocol) 2nd
     PPPoE (Point-to-Point Protocol over Ethernet)
     PPTP (Point-to-Point Tunneling Protocol)
         versus L2TP (Layer 2 Tunneling Protocol) 2nd
     RADIUS (Remote Authentication Dial-In User Service) protocol
     RARP (Reverse Address Resolution Protocol)
     RDP (Remote Desktop Protocol)
    remote connectivity configuration
         troubleshooting 2nd
     RIP (Routing Information Protocol)
     SCP (Secure Copy Protocol)
    security protocols
         802.1x protocol 2nd
         IPSec (IP Security) 2nd
         Kerberos
         L2TP (Layer 2 Tunneling Protocol) 2nd
         SSL (Secure Sockets Layer) protocol
         WEP (Wired Equivalent Privacy) protocol
         WPA (Wi-Fi Protected Access) protocol
     SFTP (Secure File Transfer Protocol)
     SLIP (Serial Line Internet Protocol) 2nd
     SMTP (Simple Mail Transfer Protocol)
     SNMP (Simple Network Management Protocol)
         SNMP management system
     SPAP (Shiva Password Authentication Protocol)
     SSH (Secure Shell)
     SSL (Secure Sockets Layer) protocol
     TCP (Transmission Control Protocol)
     TCP/IP protocol suite
         ARP (Address Resolution Protocol)
         FTP (File Transfer Protocol) 2nd 3rd 4th
         hostnames
         HTTP (Hypertext Transfer Protocol) 2nd
         HTTPS (Hypertext Transfer Protocol Secure)
         ICMP (Internet Control Message Protocol)
         IGMP (Internet Group Management Protocol)
         IMAP4 (Internet Message Access Protocol version 4) 2nd
         interoperability
         IP (Internet Protocol)
         IP addresses 2nd 3rd 4th 5th 6th 7th
         IP addresses, APIPA 2nd
         IP addresses, dynamic addresses
         IP addresses, static addresses
         LDAP (Lightweight Directory Access Protocol) 2nd
         LPR (Line Printer Remote) protocol 2nd
         network services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
         NNTP (Network News Transport Protocol)
         NTP (Network Time Protocol)
         OSPF (Open Shortest Path First) 2nd
         POP3 (Post Office Protocol version 3) 2nd
         ports 2nd 3rd
         protocol comparison chart
         protocol summary table 2nd 3rd 4th
         RARP (Reverse Address Resolution Protocol)
         RFC (Requests for Comments)
         RIP (Routing Information Protocol) 2nd
         SCP (Secure Copy Protocol)
         SFTP (Secure File Transfer Protocol)
         SMTP (Simple Mail Transfer Protocol)
         SSH (Secure Shell)
         subnet masks
         TCP (Transmission Control Protocol)
         TCP/IP addresses 2nd
         Telnet 2nd
         TFTP (Trivial File Transfer Protocol) 2nd
         UDP (User Datagram Protocol)
     Telnet
         security 2nd
     TFTP (Trivial File Transfer Protocol)
     TFTP (TrivialFile Transfer Protocol)
     UDP (User Datagram Protocol)
     WEP (Wired Equivalent Privacy) protocol
     WEP protocol
proxy servers
     caching proxy servers 2nd
     configuring
     firewalling proxy servers 2nd
     Internet access control 2nd
     NAT functions
Proxy Settings configuration screen (Internet Explorer)
PSTN (Public Switched Telephone Networks)
     remote network connections
public key encryption
     802.1x protocol 2nd
     SSL (Secure Sockets Layer) protocol
     WEP (Wired Equivalent Privacy) protocol
     WPA (Wi-Fi Protected Access) protocol
public networks
    IP addresses
         IANA (Internet Assigned Numbers Authority)
    versus private networks
         IP addresses 2nd 3rd
punchdown tools 2nd



Network+ Exam Cram 2
Network+ Exam Cram 2
ISBN: 078974905X
EAN: N/A
Year: 2003
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net