• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
DNS
Domain Name System/Service
a TCP/IP application protocol that enables a DNS server to resolve (translate) domain and computer names to IP addresses, or IP addresses to domain and computer names.
DNS (Domain Name System/Service
FTP
File Transfer Protocol
a TCP/IP application protocol that transfers files in bulk data streams and that is commonly used on the Internet.
FTP (File Transfer Protocol)
IIS
Internet Information Service
a Microsoft Windows Server component that provides Internet, Web, FTP, mail, and other services to make the server into a full featured web server.
IIS (Internet Information Service)
a range of IP addresses that a DHCP server can lease to clients.
scope
DES
Data Encryption Standard
a data encryption method developed by IBM and the NSA in cooperation with the National Bureau of Standards )now the National Institute of Standards and Technology) as an encryption technique using a secret key between the communication stations.
DES (Data Encryption Standard)
IPSec
IP Security
a set of IP-based secure communications and encryption standards created through by the Internet Engineering Task Force.
IPSec (IP Security)
NAT
Network Address Translation
used by Microsoft Routing and Remote Access Services and by firewalls, translates IP addresses on an internal or local network so that the actual IP addresses cannot be determined on the Internet because the address seen on the Internet is a decoy address.
NAT (Network Address Translation)
PAP
Password Authentication Protocol
a non-encrypted plain text password authentication protocol, which is the lowest level of security for exchanging passwords via PPP or TCP/IP
PAP (Password Authentication Protocol)
PPP
Point-to-Point Protocol
a widely used remote communication sprotocol that can transport legacy protocols such as IPX and Net BEV I as well. Used for dial up connections between a client and Windows Server 2008.
PPP (Point-to-Point Protocol)
SLIP
Serial Line Internet Protocol
an older remote communications protocol that is used by some UNIX & LINUX computers. The modern compressed version used header compression to reduce communications overhead
SLIP (Serial Line Internet Protocol)
Compressed version of SLIP
CSLIP
VPN
Virtual Private Network
a private netword that is like a tunnel through a larger network, such as the Internet, and enterprise network, or both, and that is restricted to designated member clients only.
VPN (Virtual Private Network)
a security system developed by the Massachusetts Institute of Technology to enable two parties on an open network to communicate without interception from an intruder, by created a unique encryption key for each communication session.
Kerberos
user rights that are assigned to a group and that auto apply to all members of that group
inherited rights
used by Performance Monitor, a measurement technique for an object, for measuring the processor performance by percentage in use.
counter
a resource, such as a file, used by a program that has its own identification so the program is able to access it.
handle
output of information gathered via Performance Monitor objects, counters, and instances configured with a data collector set.
Performance Log or Report
SNMP
Simple Network Management Protocol
used for network management and performance monitoring on TCP/IP based networks
SNMP (Simple Network Management Protocol)
a block of program code executing within a running process.
thread
How many threads can a process launch?
One or more
contains results of monitored trace events generated by a data collector set and contains only those instances when those events occur, such as creating a traced to record each time disk input/output activity occurs or when an Active Directory Kerberos security event is triggered.
Trace log or report
prints the contents of a file
cat
changes directories
cd
copies files
cp
opens a terminal
CNTL+Alt+F1
GUI text editor for gnome
gedit
JPEG
Joint Photographic Experts Group
graphics file type
jpg
console based mail user agent
mail (command)
list of users for the system along with user account information; contects can be changed by various programs such as user add or chsh
passwd
pwd
present working directory
shows the full path of your location
pwd
largest Linux vendor in North America
Red Hat
deletes a file
rm
super-user account
root
used to add a new user account to the system; options permit the system administrator to specify the users home directory and initial group or to create the user with the default home directory and group assignments
user add
completely removes a user's acct (thereby eliminating that users home directory and all files it contains)
user del
displays who is currently on the system
who