Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] packet sniffing packet switching 2nd datagram packet switching 2nd virtual-circuit packet switching packet-filtering firewalls IP addresses MAC addresses port numbers protocols, identifying PAD (packet assemblers/disassemblers) PAP (Password Authentication Protocol) partitioning passive hubs passwords 2nd complexity enforcing password history NetWare (Novell) policies expiration minimum lengths reusing sharing strength of 2nd Windows servers 2nd patch panels PCs coaxial network connections twisted-pair network connections wireless network connections peer-to-peer networks versus client/server networks 2nd peripherals mouse devices modem conflicts permissions client connectivity errors troubleshooting 2nd Linux file systems Mac OS X server file systems NetWare (Novell) file systems Windows server file services 2nd Windows server shares 2nd physical bus topologies physical layer (OSI reference model) 2nd physical objects (wireless network interference) physical ring topologies [See ring topologies] physical topologies (networks) ping diagnostic utility Destination Host Unreachable error message DNS Expired TTL error message llopback addresses Request Timed Out error message switches list table troubleshooting example 2nd Unknown Host error message ping utility ICMP (Internet Control Message Protocol) PKI (Public Key Infrastructer) encryption plugs [See hardware loopback connectors] poison reverse (routing loops) polarization polymorphic viruses POP3 (Post Office Protocol version 3) 2nd port blocking 2nd network users, effects on port numbers packet-filtering firewalls port blocking 2nd purposes of port-based VLAN memberships ports MDI (Medium Dependant Interface) ports MDI-X (Medium Dependant Interface-Crossed) ports (hubs) crossover cables 2nd TCP/IP protocol 2nd assignment chart well-known ports POTS Internet connections troubleshooting 2nd POTS/PSTN (Plain Old Telephone Service/Public Switched Telephone Network) Internet access PPP (Point-to-Point Protocol) 2nd remote network connections PPPoE (Point-to-Point Protocol over Ethernet) remote network connections 2nd PPTP (Point-to-Point Tunneling Protocol) versus L2TP (Layer 2 Tunneling Protocol) 2nd practice exams exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th answer key 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd answer key 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th presentation layer (OSI reference model) 2nd encryption PRI (Primary Rate Interface) standard versus BRI (Basic Rate Interface) standard 2nd primary server configurations print services Linux CUPS Line Printer daemon NetWare (Novell) capture command-line utility Distributed Print Services Windows servers 2nd printing troubleshooting checklist private address ranges subnet masks private networks firewalls private address ranges subnet masks versus public networks IP addresses 2nd 3rd probable cause, selecting (troubleshooting steps/procedures) processors encryption propagation time (satellite Internet access) proto information heading (netstat diagnostic utility) protocol-based VLAN memberships 2nd protocols 802.1x protocol 2nd AFP (Apple File Protocol) AppleTalk protocol suite addresses AppleTalk over IP functions of 2nd 3rd hostnames interoperability protocol comparison chart RTMP protocol zones ARP (Address Resolution Protocol) ATCP (AppleTalk Control Protocol) BOOTP CHAP (Challenge Handshake Authentication Protocol) client connectivity configurations troubleshooting 2nd comparison chart 2nd DHCP (Dynamic Host Configuration Protocol) 2nd dynamic addresses scopes distance vector routing protocols IPX RIP (Routing Information Protocol) 2nd RIP (Routing Information Protocol) routing tables versus link state routing protocols DNS (Domain Name Service) protocol 2nd 3rd HOSTS files 2nd EAP (Extensible Authentication Protocol) file sharing AFP NFS SMB/CIFS FTP (File Transfer Protocol) commands list 2nd ports security HTTP (Hypertext Transfer Protocol) URL (uniform resource locator) HTTPS (Hypertext Transfer Protocol Secure) SSL (Secure Sockets Layer) ICMP (Internet Control Message Protocol) ping utility IGMP (Internet Group Management Protocol) IMAP4 (Internet Message Access Protocol version 4) 2nd IP (Internet Protocol) IPSec (IP Security) protocol 2nd IPX RIP (Routing Information Protocol) 2nd IPX/SPX (Internetwork Packet Exchange) protocol suite functions of 2nd hostnames interoperability IPX addresses protocol comparison chart Kerberos L2TP (Layer 2 Tunneling Protocol) versus PPTP (Point-to-Point Tunneling Protocol) 2nd LDAP (Lightweight Directory Access Protocol) 2nd link state routing protocols LSA (link state advertisements) NLSP (NetWare Link State Protocol) OSPF (Open Shortest Path First) versus distance vector routing protocols LPD (Line Printer Daemon) protocol LPR (Line Printer Remote) 2nd MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) NetBEUI protocol addresses protocol comparison chart NFS (Network File System) NNTP (Network News Transport Protocol) NTP (Network Time Protocol) packet-filtering firewalls PAP (Password Authentication Protocol) POP3 (Post Office Protocol version 3) 2nd PPP (Point-to-Point Protocol) 2nd PPPoE (Point-to-Point Protocol over Ethernet) PPTP (Point-to-Point Tunneling Protocol) versus L2TP (Layer 2 Tunneling Protocol) 2nd RADIUS (Remote Authentication Dial-In User Service) protocol RARP (Reverse Address Resolution Protocol) RDP (Remote Desktop Protocol) remote connectivity configuration troubleshooting 2nd RIP (Routing Information Protocol) SCP (Secure Copy Protocol) security protocols 802.1x protocol 2nd IPSec (IP Security) 2nd Kerberos L2TP (Layer 2 Tunneling Protocol) 2nd SSL (Secure Sockets Layer) protocol WEP (Wired Equivalent Privacy) protocol WPA (Wi-Fi Protected Access) protocol SFTP (Secure File Transfer Protocol) SLIP (Serial Line Internet Protocol) 2nd SMTP (Simple Mail Transfer Protocol) SNMP (Simple Network Management Protocol) SNMP management system SPAP (Shiva Password Authentication Protocol) SSH (Secure Shell) SSL (Secure Sockets Layer) protocol TCP (Transmission Control Protocol) TCP/IP protocol suite ARP (Address Resolution Protocol) FTP (File Transfer Protocol) 2nd 3rd 4th hostnames HTTP (Hypertext Transfer Protocol) 2nd HTTPS (Hypertext Transfer Protocol Secure) ICMP (Internet Control Message Protocol) IGMP (Internet Group Management Protocol) IMAP4 (Internet Message Access Protocol version 4) 2nd interoperability IP (Internet Protocol) IP addresses 2nd 3rd 4th 5th 6th 7th IP addresses, APIPA 2nd IP addresses, dynamic addresses IP addresses, static addresses LDAP (Lightweight Directory Access Protocol) 2nd LPR (Line Printer Remote) protocol 2nd network services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th NNTP (Network News Transport Protocol) NTP (Network Time Protocol) OSPF (Open Shortest Path First) 2nd POP3 (Post Office Protocol version 3) 2nd ports 2nd 3rd protocol comparison chart protocol summary table 2nd 3rd 4th RARP (Reverse Address Resolution Protocol) RFC (Requests for Comments) RIP (Routing Information Protocol) 2nd SCP (Secure Copy Protocol) SFTP (Secure File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) SSH (Secure Shell) subnet masks TCP (Transmission Control Protocol) TCP/IP addresses 2nd Telnet 2nd TFTP (Trivial File Transfer Protocol) 2nd UDP (User Datagram Protocol) Telnet security 2nd TFTP (Trivial File Transfer Protocol) TFTP (TrivialFile Transfer Protocol) UDP (User Datagram Protocol) WEP (Wired Equivalent Privacy) protocol WEP protocol proxy servers caching proxy servers 2nd configuring firewalling proxy servers 2nd Internet access control 2nd NAT functions Proxy Settings configuration screen (Internet Explorer) PSTN (Public Switched Telephone Networks) remote network connections public key encryption 802.1x protocol 2nd SSL (Secure Sockets Layer) protocol WEP (Wired Equivalent Privacy) protocol WPA (Wi-Fi Protected Access) protocol public networks IP addresses IANA (Internet Assigned Numbers Authority) versus private networks IP addresses 2nd 3rd punchdown tools 2nd |