• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
Used for all access validations that occur when a user tries to open a resource. Token is used until the user logs out and then it is permanently destroyed. It maintains all of the infomration required for resource validation. The access token includes the following information: User Security Identifier, Primary Group Security Identifier, Group Security Identifier, Access Permissions.
Access Tokens
A feature of Windows operation systems that enables DHCP clients to self configure an IP address and subnet mask automatically when DHCP server is unavailable.
APIPA
Used to determine a hosts MAC address from it IP address. This utility is also used to view and make changes to IPO address to MAC address translation tables.
ARP (Address Resolution Protocol)
Can backup and restore on the primary and backup domain controllers only.
Backup Operators
Security and acount database used to default on Novell Netware 3.X servers available to Netware 4.x, 5.x and 6.x servers.
Bindery
A computer that stores the digital signatures of every user on the system
Certificate Authority
A printing system based on the internet printing protocol standard that supports any printer language, although it is most commonly associated wiht the PostScript language.
Common UNIX Printing System (CUPS)
A form of communication in which the destination computer does not notify the source when the information is received . This type of communication can be unreliable because there is no notification to guarantee delivery.
Connectionless Communication
A dependable flexible alternative to manual TCP/IP configuration that provides PC's wiht automatic configuration of the three necessary TCP/IP parameters: IP addresses, subnet mask an default gateway.
DHCP(Dynamic Host Configuration Protocol)
A protocol and system for mapping IP addresses to user friendly names. It resolves host names to IP addresses, and vice versa
DNS(Domain Naming Service)
A program running on Windows that configures the system to share its resources.
File and Print Sharing Services
A secure form of HTTP used commonly for Internet business transactions or any time where a secure conneciton is required.
HTTPS
An alternative to POP3, it retrieves email from an email server like POP3. Used TCP/IP port 143
Internet Messsage Access Protocol (IMAP)
Newer standard for IP addressing. The IP addresses consisting of 8 sets of four hexadecimal numbers, each number being a value between 0000 and FFFF, using a colon to separate the numbers.
IPv6
A network computer's unique address for it snetwork interface card(NIC). Data is transported over networks in packets that always contain the source and destination MAC address. A bridge reads this information off the packets it recieves to fill its routing table.
Media Access Control Address
A means of translating a system's IP address into antoher IP adddress before sending it out to a large network. Usually run as a program ona server or router. Internal nodes will be given a private IP. This program translates the private IP into a public IP and sends it out of the network.
Network Address Translation
Access restrictions available on hard drives formatted wiht NTFS and which are effective both locally and over the network.
NTFS Permissions
Basic component of communication over a network. Agroup of bits of fixed maximum size and well defined format that is switched and transmitted as a complete whole through a network. It contains source and destination address, data, and control information. Also called a frame.
Packet
A network where a computer can sact as a client or a server. Security and resource access restrictions are controlled locally.
Peer to Peer
The most basic form of encryption. Botht ehe sending and receiving computer use the same encryption key.
Private key Encryption
A device that retrieve sInternet resources for a client without exposing the client directly to the Internet. Can acept requests for HTTP, FTP, POP3 and SMTP resources. It will often cache a copy of the requested resource for later use.
Proxy Server
Consists of a public key and a private key. The public key is given freely to anyone who needs it, and the private key is kept secret by the key's owner and is stored in the user's security file.
Public Key Encryption
Permissions that onlly control the access of other user s on the network wiht whom you share your resources. They are not effective locally.
Share Permissions
An Internet standard for monitoring and configuring network devices. A network using this protocol is composed of management systems and agents.
SNMP(Simple Network Management Protocol)
Utility commonly used to locate failures along a TCP/IP communication path by tracing the route from origin to destination. Each router interface encountered is echoed to the screen along with some statistical information about the path timing
TraceRT