S


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

sags
Samba 2nd
     Linux/Windows Server interoperability
SAS (single attached stations)
satellite Internet access
     one-way satellite systems
     propagation time
     two-way satellite systems
satellite Internet connections
     troubleshooting
satellites
     remote network connections
scheduling (antivirus software)
scopes
SCP (Secure Copy Protocol)
ScTP (screened twisted-pair) cable
SDH (Synchronous Digital Hierarchy)
SDSL (Symmetric DSL)
security
    antivirus software
         characteristics of, centralized virus management
         characteristics of, email vetting
         characteristics of, live updates
         characteristics of, real-time protection
         characteristics of, scheduling
         characteristics of, virus scanning
     AppleShare IP
     authentication
         biometrics
         passwords 2nd
         passwords, policies
         passwords, sharing
         passwords, strength of 2nd
         smartcards
     broadband
     encryption 2nd 3rd
         network traffic
         PKI (Public Key Infrastructure)
         presentation layer (OSI reference model)
         processors
         supported operating systems
         unencrypted client requests
    extranets
         characteristics of
         defining
    firewalls
         application gateway firewalls
         circuit-level firewalls
         firewalling proxy servers 2nd
         NAT (Network Address Translation)
         packet-filtering firewalls 2nd 3rd 4th 5th
         private networks
     FTP (File Transfer Protocol)
    HTTPS (Hypertext Transfer Protocol Secure)
         SSL (Secure Sockets Layer)
    intranets
         characteristics of
         defining
         example of
    Linux
         files/directories
         remote access 2nd
         user authentication
    NetWare (Novell)
         directories 2nd
         file systems 2nd 3rd
         file systems, attributes 2nd
         file systems, permissions
         resource access
         resource access, security equivalence
         user authentication
     port blocking 2nd
         network users
    protocols
         802.1x protocol 2nd
         IPSec (IP Security) protocol 2nd
         Kerberos
         L2TP (Layer 2 Tunneling Protocol) 2nd
         SSL (Secure Sockets Layer) protocol
         WEP (Wired Equivalent Privacy) protocol
         WPA (Wi-Fi Protected Access) protocol
     proxy servers
         caching proxy servers 2nd
         configuring
         firewalling proxy servers 2nd
         Internet access control 2nd
         NAT functions
     Telnet 2nd
     Windows servers 2nd
         file services, permissions 2nd
         passwords 2nd
         shares, permissions 2nd
     wireless devices
    wireless network communications
         authentication
         encryption
security equivalence
self-assessments
     educational background 2nd
     exam readiness, testing 2nd
     hands-on experience 2nd
    ideal Network+ candidates
         qualifications of 2nd
server clustering 2nd
servers
    fault tolerance
         server clustering 2nd
         stand-by servers 2nd
     heartbeats
     stand-by servers
         failover configuration
serves
     primary server configurations
session layer (OSI reference model) 2nd
SFTP (Secure File Transfer Protocol)
shared bandwidth
shared key authentication
shares (Windows servers)
     permissions 2nd
sharing
     passwords
signal quality (wireless networks), troubleshooting 2nd 3rd 4th
simplex dialog mode
single-mode fiber-optic cable
SLIP (Serial Line Internet Protocol) 2nd
     remote network connections
slipstreaming
smartcards
SMB (Server Message Blocks) 2nd
SMB/CIFS (Server Message Blocks/Common Internet File System) protocols
SMTP (Simple Mail Transfer Protocol)
SNMP (Simple Network Management Protocol)
     SNMP management system
SNMP (Simple Network Management Protocol) management system
     NMS (Network Management System)
software (antivirus)
    characteristics of
         centralized virus management
         email vetting
         live updates
         real-time protection
         scheduling
         virus scanning
SOHO (Small Office/Home Office) routers
     configuring
     remote connectivity, troubleshooting 2nd
solution documentation (troubleshooting steps/procedures) 2nd
solution results/effects identification (troubleshooting steps/procedures)
SONET
     OC (Optical Carrier) levels 2nd
source route bridges
SPAP (Shiva Password Authentication Protocol)
speed [See data transmission rates]
spikes
split horizons (routing loops)
spread spectrum technology
    DSSS (direct sequence spread spectrum)
         chips
     FHSS (frequency hopping spread spectrum)
     OFDM
spyware
    trojan horses
         worms; virus hoaxes [See also viruses]
SSH (Secure Shell)
SSID (service set identifiers) 2nd
SSID (Service Set Identifiers)
     troubleshooting 2nd
SSL (Secure Sockets Layer)
     HTTPS (Hypertext Transfer Protocol Secure)
SSL (Secure Sockets Layer) protocol
stand-by servers
     failover configuration
standard user accounts
     Mac OS X server security
standards
     IEEE 802 network standards
         802.11 standards 2nd 3rd
         802.11 standards, IEEE 802.11a 2nd
         802.11 standards, IEEE 802.11b 2nd 3rd
         802.11 standards, IEEE 802.11g 2nd
         802.3 standards 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
         802.5 standards 2nd 3rd 4th 5th
         LLC (Logical Link Control) standards
star topologies
     troubleshooting
state information heading (netstat diagnostic utility)
states (LED visual indicators)
static addressing
static routing environments 2nd
storage
     backups 2nd
store-and-forward switching environments
STP (shielded twisted-pair) cable
strong passwords
subnet masks 2nd
     IP addresses 2nd
     private address ranges
subnetting 2nd
Supervisor permission (NetWare)
support
    application support
         Linux 2nd
         NetWare (Novell)
         Windows servers
    client support
         Linux
         NetWare (Novell)
         Windows servers 2nd
surges 2nd
switches 2nd 3rd
     crossover cables 2nd
     cut-through switching environments
     FragmentFree-switching environments
     full-duplex dialog mode
     MDI (Medium Dependant Interface) ports
     OSI (Open Systems Interconnect) reference model maps
     stone-and-forward switching environments
     troubleshooting
     versus hubs
symptom identification (troubleshooting steps/procedures)



Network+ Exam Cram 2
Network+ Exam Cram 2
ISBN: 078974905X
EAN: N/A
Year: 2003
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net