[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] Scavenge Stale Resource Records option (DNS) ScheduledInstallDay registry setting ScheduledInstallTime registry setting scopes (DHCP) creating 2nd 3rd 4th 5th 6th multicast scopes 2nd 3rd reconciling superscopes 2nd 3rd troubleshooting 2nd 3rd searching Web sites secondary servers 2nd 3rd 4th 5th 6th Secure template secure updates 2nd secure*.inf template security 2nd analyzing 2nd authentication 2nd 3rd CHAP (Challenge Handshake Authentication Protocol) EAP (Extensible Authentication Protocol) MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) PAP (Password Authentication Protocol) SPAP (Shiva Password Authentication Protocol) baseline settings 2nd development and test environment 2nd guidelines 2nd hot fixes 2nd 3rd 4th 5th principle of least privilege 2nd Security Baseline Analyzer service packs 2nd 3rd 4th 5th DNS (Domain Name System) encryption 2nd 3rd Basic encryption level MPPE (Microsoft Point-to-Point Encryption) Strong encryption level Strongest encryption level IPSec (IP Security) 2nd 3rd 4th configuring IPSec Driver ISAKMP/Oakley Key Management Service policies 2nd 3rd 4th Policy Agent rules 2nd 3rd 4th transport mode 2nd tunnel mode 2nd 3rd IPSec MMC snap-in 2nd IP Security Monitor console 2nd 3rd 4th opening 2nd Netdiag Netsh resource records Security Configuration and Analysis tool 2nd security templates 2nd applying 2nd 3rd Compatible template creating customizing 2nd 3rd default templates 2nd 3rd Highly Secure template importing 2nd 3rd Secure template Setup Security template SUS (Software Update Services) Automatic Update client 2nd 3rd 4th 5th 6th 7th configuring 2nd 3rd 4th 5th installing 2nd software requirements 2nd troubleshooting Event Viewer 2nd 3rd 4th 5th IPSec MMC snap-in 2nd Network Monitor 2nd 3rd 4th 5th 6th 7th 8th 9th Security Baseline Analyzer Security Configuration and Analysis tool 2nd Security log security templates 2nd applying 2nd 3rd Compatible template creating customizing 2nd 3rd default templates 2nd 3rd Highly Secure template importing 2nd 3rd Secure template Setup Security template Select Attribute dialog box select-and-place questions 2nd self-assessment 2nd Serial Line Internet Protocol (SLIP) servers DHCP (Dynamic Host Configuration Protocol) servers audit log file 2nd authorization 2nd 3rd 4th DNS integration 2nd 3rd 4th 5th installation 2nd 3rd management 2nd 3rd options 2nd 3rd 4th scopes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th DNS (Domain Name System) 2nd caching-only servers 2nd 3rd configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th debug logging dynamic updates 2nd 3rd 4th 5th event logging exam prep questions 2nd 3rd 4th 5th forwarders 2nd 3rd FQDNs (fully qualified domain names ) installation 2nd interfaces iterative queries 2nd management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd monitoring 2nd 3rd 4th 5th 6th 7th 8th options 2nd primary servers recursive queries resource records 2nd 3rd 4th 5th 6th 7th 8th root hints secondary servers 2nd 3rd secure updates 2nd security zone files zones 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th TCP/IP configuration Advanced TCP/IP Settings dialog box 2nd 3rd 4th DHCP IP address requirements static IP addressing 2nd troubleshooting service dependency 2nd 3rd service recovery options 2nd 3rd service dependency 2nd 3rd service packs 2nd 3rd 4th 5th services DNS (Domain Name Service) configuration 2nd DNS (Domain Name System) DHCP integration 2nd 3rd 4th 5th IAS (Internet Authentication Services) 2nd installing 2nd RADIUS servers 2nd ISAKMP/Oakley Key Management Service RRAS (Routing and Remote Access Service) 2nd 3rd 4th authentication protocols 2nd 3rd client management 2nd demand-dial connections 2nd 3rd 4th 5th 6th 7th 8th 9th 10th devices/ports DHCP (Dynamic Host Configuration Protocol) 2nd dial-up connections dynamic routing 2nd enabling 2nd 3rd encryption protocols 2nd 3rd exam prep questions 2nd 3rd 4th 5th 6th 7th inbound connections 2nd IP (Internet Protocol) routing 2nd IPSec (IP Security) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th OSPF ( Open Shortest Path First) 2nd 3rd 4th 5th packet filtering 2nd persistent connections ports 2nd PPP (Point-to-Point Protocol) 2nd remote access policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th RIP (Routing Information Protocol) 2nd 3rd 4th 5th routing tables 2nd SLIP (Serial Line Internet Protocol) static routing troubleshooting 2nd 3rd 4th 5th 6th VPNs (virtual private networks) 2nd 3rd troubleshooting service dependency 2nd 3rd service recovery options 2nd 3rd WINS (Windows Internet Naming Service) IP address configuration Session Stats pane (Network Monitor) Set Aging/Scavenging for All Zones option (DNS) Setup Security template Shiva Password Authentication Protocol (SPAP) short-form exams test-taking strategies 2nd testing format Show Answer button (PrepLogic Practice Tests) Show gateway command context (Netsh) Show ieproxy command context (Netsh) Show mail command context (Netsh) Show modem command context (Netsh) Shutdown Event Tracker simulation questions 2nd single-answer multiple-choice questions 2nd SLIP (Serial Line Internet Protocol) snap-ins IPSec MMC snap-in 2nd IP Security Monitor console 2nd 3rd 4th opening 2nd SOA (Start of Authority) software PrepLogic Practice Tests, Preview Edition requirements 2nd SUS (Software Update Services) Automatic Update client 2nd 3rd 4th 5th 6th 7th configuring 2nd 3rd 4th 5th installing 2nd software requirements 2nd update. [See updates] Software Update Services. [See SUS] SPAP (Shiva Password Authentication Protocol) standard primary zones standard secondary zones Start command (Capture menu) Start of Authority (DOA) static IP addresses configuration 2nd static routing Statistics Stats pane (Network Monitor) Stop command (Capture menu) Strong encryption level Strongest encryption level stub zones Success Audit events superscopes (DHCP) 2nd 3rd SuperSite for Windows Web site SUS (Software Update Services) Automatic Update client configuring 2nd 3rd 4th installing 2nd configuring 2nd 3rd 4th 5th installing 2nd software requirements 2nd System Information tool 2nd System log System Monitor 2nd 3rd 4th 5th 6th 7th 8th adding counters to 2nd Memory counter Packet Outbound Errors counter Packet Received Errors counter Packets Outbound Discarded counter Physical Disk counter Processor counter property settings 2nd |