S


scavenging

The DNS process of deleting any resource records that have timestamps on them and are found to be outdated.



scope

The full, consecutive range of possible IP addresses for a network.



secedit.exe

The command-line equivalent of the Security Configuration and Analysis snap-in.



secondary DNS server

A server that provides name resolution for a zone but cannot be used to modify the zone. It contains a read-only copy of the zone file. Also known as a secondary master.



secondary master

See secondary DNS server.



Secure template

A security template that increases the level of security configured on a computer above the default configuration, but is not expected to cause problems with the computer's ability to communicate on the network. Secure templates prevent the usage of the LAN Manager (LM) authentication protocol. Windows 9x clients need to have Active Directory Client Extensions installed to enable NTLMv2 to allow them to communicate with Windows 2000 and above clients and servers using these templates. These templates also impose additional restrictions on anonymous users, such as preventing them from enumerating account and share information.



Security Configuration and Analysis snap-in

An MMC snap-in that is used to configure, analyze, and implement security templates on a local computer. It can be used to create templates that are imported into GPOs for application to larger groups of computers.



Security Configuration Wizard

A new, advanced, security configuration and implementation wizard first available in Windows Server 2003 Service Pack 1.



security log

A log that is found in the Event Viewer and that contains auditing entries.



security template

A text file that contains settings that configure the security settings of the computer or computers that it is applied to. Several preconfigured security templates come with Windows Server 2003, and you can edit and create your own custom ones as required.



Security Templates snap-in

An MMC snap-in that can be used to safely create and modify security templates without danger of accidentally applying them to the local computer or the network.



service

An application that runs in the background of the operating system to provide specific functionality to the network.



snap-in

A tool that you can add to the MMC.



SNMP (Simple Network Management Protocol)

A Layer 7 protocol that is used to facilitate network management of computers and network devices such as routers, switches, and firewalls.



SOA (Start of Authority) record

In a DNS zone file, a record that is used to provide the zone parameters to all the DNS servers for the zone. The SOA record also provides the name of the primary server and the person in charge of the domain.



socket

The unique combination of an IP address and a TCP port number that identifies a particular process running on a particular TCP/IP computer.



SPAP (Shiva Password Authentication Protocol)

An encrypted password authentication protocol that was introduced for Shiva remote access servers.



split horizon

A mechanism that is used with RIP to prevent routing loops. Split horizon blocks information about routes from being advertised by a router out any interface from which that information originated.



split horizon with poison reverse

A mechanism that allows routes to be broadcast back to the interface from which they were received, but they are announced with a hop count of 16, which indicates that the network is unreachable.



static route

An item in a routing table that is entered manually and that doesn't change based on information received from a routing protocol.



subnet

A subdivision of a TCP/IP internetwork that communicates with other subnets through routers.



subnet mask

In TCP/IP, a mask that is used to determine what subnet an IP address belongs to. A subnet mask enables a host or a router to determine which portion of an IP address is the network ID and which is the host ID. The host can then use this information to determine whether to send a packet to a host on the local network or to a router.



success event

An audited event that has been completed successfully, such as a successful user login to a network.



suffix

A domain extension that indicates the root domain. For example, .com is a domain suffix.



supernetted network

A network that has multiple network addresses or subnets running on the same segment.



superscope

A grouping of scopes that are used to support multinetted IP subnets on the same physical network.



System Monitor

The portion of the Performance console that can be used to monitor the performance statistics of a computer in real-time.






MCSA(s)MCSE 70-291(c) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
MCSA/MCSE 70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam Prep)
ISBN: 0789736497
EAN: 2147483647
Year: 2006
Pages: 196
Authors: Will Schmied

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net