Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
27 Cards in this Set
- Front
- Back
Acknowledge
|
When the DHCP server sends a final unicast to the client that includes the IP information the client will use.
|
|
authentication header (AH)
|
An IPSec component that provides connectionless integrity and the authentication of data. It also provides protection versus replay attacks.
|
|
Discovery
|
A step in DORA when a client computer broadcasts out to the network in order to find a DHCP server.
|
|
domain name system (DNS)
|
A worldwide service that resolves host names to IP addresses.
|
|
DORA
|
Short for Discovery, Offering, Request and Acknowledge, this is the four-step process used with DHCP.
|
|
Dynamic Host Configuration Protocol (DHCP)
|
A protocol that allows properly configured client computers to obtain IP addresses automatically from a DHCP server.
|
|
encapsulating security payload (ESP)
|
An IPSec component that provides the same services as AH but also provides confidentiality when sending data.
|
|
IP forwarding
|
LAN routing that bridges the gap between the two network adapters even if they are on two different IP networks.
|
|
Internet Protocol Security (IPSec)
|
A protocol within the TCP/IP suite that encrypts and authenticates IP packets.
|
|
Offering
|
When the DHCP server sends out a unicast "offering" of an IP address to the client computer.
|
|
Remote Access Service (RAS)
|
A grouping of different hardware and software platforms to allow remote access to another computer or network device.
|
|
Remote Desktop Protocol (RDP)
|
The protocol used when you use the Remote Desktop Connections program to connect to a computer.
|
|
Remote Desktop Services
|
A type of thin-client terminal server computing. It allows client computers to access and use applications loaded on the server, as well as to connect to and take control of a server. It was previously known as Terminal Services.
|
|
Request
|
In DHCP, when the client broadcasts to all servers that it has accepted the offer.
|
|
Routing and Remote Access Service (RRAS)
|
A network service in Windows Server 2008, Windows Server 2003, and Windows Server 2000. It permits an administrator to configure dial-up remote access servers, VPN servers, and IP routing, as well as NAT.
|
|
security association (SA)
|
The IPSec component that generates the encryption and authentication keys that are used by IPsec.
|
|
Terminal Services
|
A type of thin-client terminal server computing. It allows client computers to access and use applications loaded on the server, as well as to connect to and take control of a server.
|
|
Windows Internet Name Service (WINS)
|
A service that resolves NetBIOS names to IP addresses.
|
|
Ports 67 & 68
|
Proseware, Inc., wants you to scan servers for DHCP activity. Which ports should you be looking for?
|
|
The scope was not activated
|
A coworker asks for your help in analyzing a problem with a DHCP server. The server's scope has been created and the Ip range appears to be valid, yet no clients are obtaining Ip addresses. What could be the reason for this?
|
|
Terminal Services Is Running
|
You have just scanned the ports of your server and see that port 3389 is open. What can you deduce from this?
|
|
Request (DORA)
|
Your Windows client failed to broadcast to all servers that it has accepted an IP address offer. What step is this in the four-step DORA process?
|
|
Request & Acknowledge
|
When renewing a DHCP assigned IP address, usually the __________ steps of the DORA process are involved.
|
|
It cannot communicate with a DHCP server
|
You have a computer with an address of 196.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem?
|
|
Routing and Remote Access Service (RRAS)
|
You have been asked by a client to install a VPN server. Which of the following services shouldl be chosen in order to accomplish this?
|
|
Six
|
By default, wired DHCP leases last for ________ days.
|
|
Security Association (SA)
|
Security Association (SA) Which protocol generates encryption and authentication keys that are used by IPsec?
|