Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] sags Samba 2nd Linux/Windows Server interoperability SAS (single attached stations) satellite Internet access one-way satellite systems propagation time two-way satellite systems satellite Internet connections troubleshooting satellites remote network connections scheduling (antivirus software) scopes SCP (Secure Copy Protocol) ScTP (screened twisted-pair) cable SDH (Synchronous Digital Hierarchy) SDSL (Symmetric DSL) security antivirus software characteristics of, centralized virus management characteristics of, email vetting characteristics of, live updates characteristics of, real-time protection characteristics of, scheduling characteristics of, virus scanning AppleShare IP authentication biometrics passwords 2nd passwords, policies passwords, sharing passwords, strength of 2nd smartcards broadband encryption 2nd 3rd network traffic PKI (Public Key Infrastructure) presentation layer (OSI reference model) processors supported operating systems unencrypted client requests extranets characteristics of defining firewalls application gateway firewalls circuit-level firewalls firewalling proxy servers 2nd NAT (Network Address Translation) packet-filtering firewalls 2nd 3rd 4th 5th private networks FTP (File Transfer Protocol) HTTPS (Hypertext Transfer Protocol Secure) SSL (Secure Sockets Layer) intranets characteristics of defining example of Linux files/directories remote access 2nd user authentication NetWare (Novell) directories 2nd file systems 2nd 3rd file systems, attributes 2nd file systems, permissions resource access resource access, security equivalence user authentication port blocking 2nd network users protocols 802.1x protocol 2nd IPSec (IP Security) protocol 2nd Kerberos L2TP (Layer 2 Tunneling Protocol) 2nd SSL (Secure Sockets Layer) protocol WEP (Wired Equivalent Privacy) protocol WPA (Wi-Fi Protected Access) protocol proxy servers caching proxy servers 2nd configuring firewalling proxy servers 2nd Internet access control 2nd NAT functions Telnet 2nd Windows servers 2nd file services, permissions 2nd passwords 2nd shares, permissions 2nd wireless devices wireless network communications authentication encryption security equivalence self-assessments educational background 2nd exam readiness, testing 2nd hands-on experience 2nd ideal Network+ candidates qualifications of 2nd server clustering 2nd servers fault tolerance server clustering 2nd stand-by servers 2nd heartbeats stand-by servers failover configuration serves primary server configurations session layer (OSI reference model) 2nd SFTP (Secure File Transfer Protocol) shared bandwidth shared key authentication shares (Windows servers) permissions 2nd sharing passwords signal quality (wireless networks), troubleshooting 2nd 3rd 4th simplex dialog mode single-mode fiber-optic cable SLIP (Serial Line Internet Protocol) 2nd remote network connections slipstreaming smartcards SMB (Server Message Blocks) 2nd SMB/CIFS (Server Message Blocks/Common Internet File System) protocols SMTP (Simple Mail Transfer Protocol) SNMP (Simple Network Management Protocol) SNMP management system SNMP (Simple Network Management Protocol) management system NMS (Network Management System) software (antivirus) characteristics of centralized virus management email vetting live updates real-time protection scheduling virus scanning SOHO (Small Office/Home Office) routers configuring remote connectivity, troubleshooting 2nd solution documentation (troubleshooting steps/procedures) 2nd solution results/effects identification (troubleshooting steps/procedures) SONET OC (Optical Carrier) levels 2nd source route bridges SPAP (Shiva Password Authentication Protocol) speed [See data transmission rates] spikes split horizons (routing loops) spread spectrum technology DSSS (direct sequence spread spectrum) chips FHSS (frequency hopping spread spectrum) OFDM spyware trojan horses worms; virus hoaxes [See also viruses] SSH (Secure Shell) SSID (service set identifiers) 2nd SSID (Service Set Identifiers) troubleshooting 2nd SSL (Secure Sockets Layer) HTTPS (Hypertext Transfer Protocol Secure) SSL (Secure Sockets Layer) protocol stand-by servers failover configuration standard user accounts Mac OS X server security standards IEEE 802 network standards 802.11 standards 2nd 3rd 802.11 standards, IEEE 802.11a 2nd 802.11 standards, IEEE 802.11b 2nd 3rd 802.11 standards, IEEE 802.11g 2nd 802.3 standards 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 802.5 standards 2nd 3rd 4th 5th LLC (Logical Link Control) standards star topologies troubleshooting state information heading (netstat diagnostic utility) states (LED visual indicators) static addressing static routing environments 2nd storage backups 2nd store-and-forward switching environments STP (shielded twisted-pair) cable strong passwords subnet masks 2nd IP addresses 2nd private address ranges subnetting 2nd Supervisor permission (NetWare) support application support Linux 2nd NetWare (Novell) Windows servers client support Linux NetWare (Novell) Windows servers 2nd surges 2nd switches 2nd 3rd crossover cables 2nd cut-through switching environments FragmentFree-switching environments full-duplex dialog mode MDI (Medium Dependant Interface) ports OSI (Open Systems Interconnect) reference model maps stone-and-forward switching environments troubleshooting versus hubs symptom identification (troubleshooting steps/procedures) |