Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
279 Cards in this Set
- Front
- Back
6to4
|
A tunneling protocol that enables two nodes running both IPv4 and
IPv6 across an IPv4 routing infrastructure to use a special address obtained by combining the prefix 2002::/16 with the 32-bit public IPv4 address to form a 48-bit prefix of the form 2002:wwxx:yyzz::/48 in the case of a public IPv4 address w.x.y.z. These nodes use this address type when communicating with each other. |
|
802.1X authentication
|
A series of standards that determine the acceptance of
connection requests to IEEE 802.11 wireless or IEEE 802.3 wired networks. |
|
access control list (ACL)
|
A list of users and groups that can access an object,
such as a file, folder, or printer, and the type of access granted. |
|
access-based enumeration
|
A technology that enables administrators to hide
folders that users do not have permission to access so that individual users can see only those items that they are entitled to access. |
|
Active Directory-integrated zone
|
A DNS zone that is hosted on a domain controller
and stored in one or more AD DS application directory partitions. |
|
active file screen
|
A component of file screening that limits the file types that
users can save, and generates notifications when users attempt to save inappropriate files. |
|
Address Resolution Protocol (ARP)
|
A TCP/IP protocol that is used to resolve
the IP address of the destination computer to the physical or MAC address. Also, the command-line utility that displays the MAC address of a computer. |
|
administrative shares
|
A set of shared volumes or folders that are automatically
created in Windows Server 2008 and are suffixed with a dollar sign ($). These shares do not show up when a user browses the computer resources using the Computer or Network folders in Windows Explorer. |
|
alert
|
A notification provided by the Data Collector Sets feature of Performance
Monitor that informs you when the value of a counter has exceeded a preconfigured level. |
|
Alias (CNAME) record
|
A DNS resource record that defines additional (canonical)
names that point to the same host. This is useful for servers such as web and FTP servers that may need to function under additional names. |
|
Anycast IPv6 address
|
A type of IPv6 address that is only utilized for a destination
address assigned to a router. |
|
application directory partition
|
A partitioned section of Active Directory that is
replicated only to specified domain controllers. Application directory partitions are used by applications to store their application-specific data. |
|
authentication
|
A process whereby an individual or computer on a network proves
he is who he says he is. The authentication process validates the source and identity of information and includes such tasks as confirming the identity of a user, computer, or digital signature. |
|
authentication header (AH)
|
An IPSec protocol component that provides for authentication,
integrity, and anti-replay of each packet. This is done without encrypting the data; the data remains readable but is protected from modification. |
|
Automatic Private IP Addressing (APIPA)
|
The dynamic IPv4 addressing system
used when DHCP is unavailable. It uses the IP address range of 169.254.y.z. |
|
backup catalog file
|
A file that includes information such as the volumes that were
backed up and where the backups are located, and is used to locate specific files and folders during a restore operation. |
|
bare metal backup
|
A backup that includes all critical volumes so that the recovered
server is bootable. Optionally, this backup can include all the data volumes to restore these volumes when restoring to a new hard disk. |
|
bare metal recovery
|
A server recovery using a backup that contains critical volumes
and optionally data volumes that enable you to rebuild your server using new hardware. |
|
BitLocker Drive Encryption
|
A new feature of Windows Server 2008 that enables
you to encrypt the entire contents of your system partition. It is useful for protecting computers from attackers who have physical access to a computer. |
|
Bootstrap Protocol (BOOTP)
|
A UDP network protocol used by a network client to
obtain its IP address automatically. This is usually done during the bootstrap process when a computer is starting up. |
|
BranchCache
|
A new feature of Windows Server 2008 R2 and Windows 7 that enables
users at branch offices to cache shared files and folders from a remote server to a local computer for faster access. |
|
broadcast
|
A routing technology that transmits data to all possible destinations on
the local subnet. This permits the sender to send the data only once and all receivers can copy it. |
|
caching-only server
|
A DNS server that does not contain any zone information,
used to build the cache file as names are resolved. |
|
certificate
|
A digital file that contains information verifying the identity of a user or
computer. |
|
Challenge Handshake Authentication Protocol (CHAP)
|
An authentication protocol
that uses a hashed version of a user’s password so that the user’s credentials are not sent over the wire in clear text. |
|
classless inter-domain routing (CIDR)
|
A flexible method of stating IP addresses
and masks without needing to classify the addresses. An example of the CIDR format is 192.168.1.0/24. |
|
client reservation
|
A DHCP mechanism that ensures that a client always gets the
same reserved IP address. |
|
client-side targeting
|
A means of creating computer groups for WSUS that uses
Group Policy to add computers to specified computer groups. New computers are automatically added to the appropriate group when they first contact the WSUS server. |
|
collector computer
|
A computer that has been configured using the event log subscription
feature to receive event logs from one or more source computers. Use of a collector computer enables you to keep track of event logs from many computers. |
|
computer groups
|
Groups that you can configure on a WSUS server that enable
specific updates to be directed to different computers on the network. This concept is useful for deploying updates to small test groups before deployment to the network as a whole. |
|
conditional forwarding
|
The relaying of a DNS request for zone information for
specific domains from one server to another one, when the first server is unable to process the request. |
|
Connection Manager Administration Kit (CMAK)
|
A versatile client dialer and connection
software that can be used to create an executable program, which can then be installed on client computers to provide a preconfigured network connection for dial-up or VPN access to the network. |
|
connection request policy
|
A set of conditions and settings that enable you to designate
which RADIUS servers are entitled to perform the authentication and authorization of connection requests that the NPS server receives from RADIUS clients. |
|
connection security rule
|
A type of firewall rule that requires two computers to
authenticate with each other to establish a connection and secure their communications. Windows Firewall uses IPSec to enforce these rules and secure the communication channel. |
|
critical volumes
|
The volumes that are required for recovering your server, including
the system and boot volumes. On a domain controller, they include the SYSVOL volume, as well as the volumes that host the Ntds.dit database file and the AD DS log files. |
|
custom view
|
A filter in Event Viewer that has been named and saved for use with
the event log on another computer. |
|
data collector set
|
A component of Performance Monitor that records computer
performance information into log files. This feature was known as Performance Logs and Alerts in Windows 2000/XP/Server 2003. |
|
decryption
|
Unscrambling the data in an encrypted file through use of an algorithm
so that the file can be read. |
|
default gateway
|
The term applied to the router that leads to other networks.
|
|
demand-dial interface
|
A logical interface representing a point-to-point connection,
either a physical connection, such as two routers connected with an analog phone line, or a logical connection, such as two routers using a virtual private network (VPN) connection. |
|
devolution
|
A type of host name search in which an unsuccessful query is retried
with a DNS suffix based on systematic reduction of the primary suffix; for example, if the query for server1.accounting.certguide.com is unsuccessful, when devolution is enabled a search for server1.certguide.com will be performed next, and then a search for server1.com will be performed last. |
|
DFS folder
|
Any shared folder that is contained within a DFS namespace.
|
|
DFS folder target
|
The UNC path of a shared folder that is contained within a
DFS namespace and replicated using DFS Replication. |
|
DFS Namespace
|
A DFS technology that enables you to create logical groupings
of shared folders on different servers that facilitate the access to data by users on the network. Such groupings are presented to users as a virtual folder tree or namespace. |
|
DFS Replication
|
A DFS technology that provides an efficient multimaster replication
component that synchronizes data between servers with limited bandwidth network links. The contents of folders are synchronized between servers so that users receive the same version of files regardless of which folder target their computer connects to. |
|
DHCP options
|
Options that a DHCP server configures, such as the addresses of
the DNS and WINS servers. |
|
DHCP relay agent
|
A server that is configured to relay DHCP broadcast messages
from one subnet to another. In Windows Server 2008, the DHCP relay agent service is a component of RRAS. |
|
DHCP scope
|
A range of IP addresses on a DHCP server that are available for the
server to lease to client computers. A scope generally defines a single physical subnet on a network. |
|
dial-up networking
|
The technology that enables a remote access client to create a
nonpermanent, dial-up connection to a physical port on a remote access server by using the service of a telecommunications provider, such as an analog phone line or ISDN. |
|
DirectAccess
|
A new feature of Windows Server 2008 R2 and Windows 7 that enables
users to directly connect to corporate networks from any Internet connection using a seamless, bidirectional, secured tunnel without the need for a virtual private network (VPN) connection. |
|
disk quota
|
A mechanism that enables you to track and control disk usage on a peruser,
per-drive letter (partition or volume) basis. You can also set quotas on shared folders on a per-folder basis when configuring quotas from FSRM. |
|
Distributed File System (DFS)
|
A Windows Server 2008 R2 server role that enables
administrators to group a large number of shared folders from different servers together in a single tree that enables users to rapidly locate the share they need without searching numerous servers. |
|
DNS Manager
|
The Microsoft Management Console (MMC) snap-in from which
you can manage most of the activities associated with operating a DNS server. |
|
DNS Notify
|
A process in which the master DNS server for a zone notifies secondary
servers of changes, so that the secondary servers can check to determine whether they need to initiate a zone transfer. |
|
dnscmd
|
A command-line tool that can perform most of the DNS server administrative
tasks in Windows Server 2008. |
|
DNSSEC (Domain Name System Security Extensions)
|
A suite of DNS extensions
that adds security to the DNS protocol by providing origin authority, data integrity, and authenticated denial of existence. It enables DNS servers to use digital signatures to validate responses from other servers and resolvers. |
|
DnsUpdateProxy group
|
A special group that includes all DNS servers authorized
to securely update any client’s A and PTR records whenever it updates the client’s TCP/IP configuration. |
|
domain isolation policy
|
A Group Policy setting that enables you to use IPSec
authentication to require each computer that is an AD DS domain member to positively identify the other computer to which it connects. |
|
Domain Name System (DNS)
|
A hierarchical name-resolution system that resolves
host names into IP addresses, and vice versa. DNS also makes it possible for the distributed Active Directory database to function by allowing clients to query the locations of services in the forest and domain. |
|
downstream server
|
A WSUS server that synchronizes updates from another (upstream)
server that is used when you are implementing a hierarchy of WSUS servers. |
|
dynamic DNS (DDNS)
|
An extension of DNS that allows all computers running
Windows 2000 and later to automatically register their A records with DNS at the time they obtain an IP address from a DHCP server. |
|
Dynamic Host Configuration Protocol (DHCP)
|
A service that allows an administrator
to specify a range of valid IP addresses to be used on a network, as well as exclusion IP addresses that should not be assigned (for example, if they were already statically assigned elsewhere). These addresses are automatically given out to computers configured to use DHCP as they boot up on the network, thus saving the administrator from having to configure static IP addresses on each individual network device. |
|
dynamic IP address
|
An IP address that is provided to a computer by a Dynamic
Host Configuration Protocol (DHCP) server when it needs to be connected to the network. |
|
dynamic route
|
A route that is dynamically calculated and created on a RRAS
server acting as a router. |
|
Encapsulating Security Payload (ESP)
|
An IPSec protocol component that provides
everything that AH does, along with providing for the confidentiality of the packet during transit. This authentication process ensures that the packet originated from the apparent sender and ensures that it wasn’t viewed or modified during transit. |
|
Encrypting File System (EFS)
|
An advanced attribute setting of Windows Server
2003/2008/R2 and Windows 2000/XP/Vista/7 for files and folders on an NTFSformatted volume that provides certificate-based public key security for those files and folders. EFS encrypts and decrypts files in a manner that is transparent to users. |
|
encryption
|
Scrambling and rearranging data in a file through use of an algorithm
so the file cannot be read. |
|
event log subscription
|
An Event Viewer feature that enables you to collect event
logs from a number of computers in a single, convenient location that helps you keep track of events that occur on these computers. |
|
Event Viewer
|
An administrative tool that enables an administrator to view and/or
archive event logs such as the operating system, application, setup, and security logs. In Windows Server 2008, this tool also enables you to configure event log subscriptions that collect events from several monitored computers together. |
|
exclusion
|
A range of IP addresses within a scope that is configured to not be
leased by DHCP to clients. Typically, these are IP addresses of computers such as servers that are configured with static or reserved IP addresses. |
|
Extensible Authentication Protocol (EAP)
|
A general authentication protocol developed
for PPP. EAP can be used with IEEE 802, and is capable of heading other authentication protocols, so it improves interoperability between RAS systems, RADIUS servers, and RAS clients. |
|
Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
|
A strong
authentication method that combines EAP with Transport Layer Security, which is a protocol designed to allow users or applications to communicate over the Internet privately. It is intended to secure and authenticate communications through data encryption. |
|
failover cluster
|
A group of servers that is configured as a cluster for purposes of
redundancy and fault tolerance. You can configure such a cluster as a single member of a DFS replication group. |
|
file classification
|
A component of FSRM that provides information on the types of
files stored on your file server, thereby providing insight into the data patterns present in your organization. |
|
file screening
|
A component of FSRM that limits the file types that users can save,
and generates notifications when users attempt to save inappropriate files. |
|
File Server Resource Manager (FSRM)
|
A role service component of the File Server
role that enables you to perform management tasks on file serves such as setting quotas, specifying file screening, classifying files, creating various file-management reports, and creating scheduled file-management tasks. |
|
filter action
|
A configured set of actions within a firewall rule that determines
whether the firewall will permit or block traffic attempting to cross it. You can also choose an option to negotiate security based on several IPSec criteria, including whether or not encryption is used. |
|
filtering
|
The act of setting criteria for displaying events in an event log. You can
filter the event log so that events of importance are easier to find amidst the large number of routine informational events that tend to be recorded in some logs, such as the System log. |
|
firewall
|
A system designed to prevent unauthorized access to or from a private
network. This can be either a dedicated hardware device or a software program installed on a server or client computer. |
|
firewall profile
|
A means of grouping firewall rules so that they apply to the affected
computers dependent on where the computer is connected. |
|
firewall rule
|
A set of conditions used by Windows Firewall to determine whether
a particular type of communication is permitted. You can configure inbound rules, outbound rules, and connection security rules from the Windows Firewall with Advanced Security snap-in or from Group Policy. |
|
forward lookup query
|
A DNS name-resolution process by which a host name is
resolved to an IP address. |
|
forwarding
|
The relaying of a DNS request from one server to another one when
the first server is unable to process the request. |
|
full zone transfer (AXFR)
|
A zone transfer in which the master server transmits the
entire zone database to that zone’s secondary servers. |
|
fully qualified domain name (FQDN)
|
A DNS domain name that unambiguously describes
the location of the host within a domain tree. An example of an FQDN is the computer www.certguide.com. |
|
global unicast IPv6 address
|
An IPv6 address that uses a global routing prefix of 45
bits to identify a specific organization’s network, a 16-bit subnet ID, and a 64-bit interface ID. These addresses are globally routable on the Internet and are equivalent to public IPv4 addresses. |
|
GlobalNames zone
|
A special type of Active Directory-integrated zone that enables
you to resolve static, global records with single-label names without the need for a Windows Internet Name Service (WINS) server. |
|
health policies
|
Policy conditions that are used by NAP in validating the health status
of client computers attempting to connect to or communicate on the network. |
|
Health Registration Authority (HRA)
|
A Windows Server 2008 computer running
Internet Information Services (IIS) that is used in IPSec NAP enforcement. The HRA validates client health and obtains health certificates from a certification authority (CA) on behalf of compliant NAP client computers. |
|
hidden shares
|
A shared folder that does not broadcast its presence and is not
browsable in the Network folder. A hidden share is indicated by a dollar sign ($) at the end of the folder name. |
|
hop
|
The trip taken by a data packet from one router to the next router as it passes
across an internetwork. |
|
host
|
Any computing device that has been assigned an IP address.
|
|
host name
|
In DNS, the first or most specific name assigned to an individual computer.
|
|
Host (A or AAAA) record
|
A DNS resource record that defines the host name to
IPv4 (A) or IPv6 (AAAA) mapping for a computer on the network. Used to define the IP address corresponding to a given host. |
|
HOSTS file
|
A text file that maps host names to IP addresses. In modern Windows
computers, this file is stored in the %systemroot%\system32\drivers\etc folder. |
|
IEEE 802.3
|
A series of standards governing Ethernet-based wired networks using
the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications. |
|
IEEE 802.11
|
A series of standards governing wireless networks and their transmission
parameters. |
|
IGMP proxy
|
A router that connects a single-router intranet to a multicast-capable
intranet or the Internet. |
|
incremental zone transfer (IXFR)
|
A zone transfer in which the master server transmits
only the modified portion of each zone file to that zone’s secondary servers. |
|
instance
|
One of a group of performance objects that represents multiple occurrences
of the same object, such as processors in a multiple processor computer or hard disks in a computer with more than one hard disk. |
|
Internet Control Message Protocol (ICMP)
|
A TCP/IP protocol that enables hosts
on a TCP/IP network to share status and error information. The ping and tracert commands use ICMP to check connectivity to remote computers. |
|
Internet Group Management Protocol (IGMP)
|
A TCP/IP protocol that is used at
the host level to report host group memberships to local multicast routers. |
|
Internet Key Exchange version 2 (IKEv2)
|
A tunneling protocol that uses IPSec
Tunnel Mode over UDP port 500. This combination of protocols also supports strong authentication and encryption methods. |
|
Internet layer
|
The third layer of the TCP/IP layer stack, it is primarily concerned
with the routing and delivery of packets. |
|
Internet Protocol (IP)
|
A TCP/IP protocol that handles, addresses, and routes packets
between hosts on a network. It performs this service for all other protocols in the TCP/IP protocol suite. |
|
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
|
A tunneling technology
that enables unicast IPv6 connectivity between IPv6/IPv4 hosts over an IPv4 intranet. You do not need to perform any manual configuration actions on an ISATAP host. |
|
IP address
|
A logical address that is used to identify both a host and a network segment.
Each network adapter on an IP network requires a unique IP address. |
|
IP Security (IPSec)
|
A suite of protocols that provide a mechanism for data integrity,
authentication, and privacy for the Internet Protocol. IPSec can provide either message authentication and/or encryption. |
|
IP version 4 (IPv4)
|
The version of the Internet Protocol that has been in use for
many years and provides a 32-bit address space formatted as four octets separated by periods. |
|
IP version 6 (IPv6)
|
A newer version of the Internet Protocol that provides a 128-
bit address space formatted as eight 16-bit blocks, each of which is portrayed as a 4-digit hexadecimal number and is separated from other blocks by colons. |
|
Ipconfig
|
The command-line utility that provides detailed information about the
IP configuration of a Windows computer’s network adapters. |
|
IPv4-compatible address
|
An IPv6 address represented in the form
0:0:0:0:0:0:w.x.y.z, where w.x.y.z is the IPv4 address in dotted decimal. This allows communication between IPv4 and IPv6 networks. |
|
IPv4-mapped address
|
An IPv4-only node is represented as ::ffff:.w.x.y.z to an IPv6
node. Used only for internal representation. |
|
iterative query
|
A DNS query that gives the best answer it currently has back as a
response. The best answer is the address being sought or an address of a server that would have a better idea of its address. |
|
Layer 2 Tunneling Protocol (L2TP)
|
A protocol that is used to create VPN tunnels
across a public network. This protocol is used in conjunction with IPSec for security purposes. |
|
lease
|
A predefined interval of time for which an IP address obtained from a
DHCP server is valid. The lease must be renewed before this time interval expires for the client to continue using it. |
|
link local IPv6 address
|
A type of IPv6 address used for communication between
neighboring nodes on the same link. Equivalent to IPv4 addresses configured using APIPA. |
|
Link Local Multicast Name Resolution (LLMNR)
|
A mechanism that enables IPv6
hosts on a small network to resolve each other’s names without the need for a DNS server. |
|
LMHOSTS file
|
A local text file that maps NetBIOS names to IP addresses. In
modern Windows computers, this file is stored in the %systemroot%\system32\ drivers\etc folder. |
|
local printer
|
A printer that is connected directly to a computer.
|
|
location-aware printing
|
A printer setting that enables a user with a portable computer
to print to a printer physically located close to her computer; for example, to the home printer when at the home location or to the office printer when in the office. |
|
logical unit number (LUN)
|
A disk, a portion of a disk, an entire disk array, or a section
of a disk array in the subsystem included within a SAN. You can manage and work with a LUN in much the same way as you would for a disk volume stored locally on your server. |
|
Managed Address Configuration (M) flag
|
A parameter that determines when DHCPv6
is used to obtain IPv6 stateful addresses. When set to 0, DHCPv6 is not used and stateless addresses are obtained. When set to 1, DHCPv6 is used to assign stateful addresses to IPv6 clients. |
|
Management Information Base (MIB)
|
A database used by SNMP that holds the
information that a management system can request and the information returned by agents. Included within the MIB is a set of objects that represent various types of information about a network device, such as the number of active sessions or the operating system version. |
|
metric
|
A standard of measurement, such as a hop count, used by routing algorithms
to determine the optimal path to a destination. |
|
Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2)
|
A Microsoft version of CHAP that uses the same type of challenge/response mechanism
as CHAP but uses a nonreversible encrypted password. This is done by using MD5 algorithms to encrypt the challenge and the user’s password. |
|
Microsoft updates
|
Updates that are available from Microsoft to make systems
more reliable or to fix a problem or bug. |
|
multicast
|
This technology allows the sender to send a single transmission to the
multicast address, and the routers take care of making copies and sending them to all receivers that have registered their interest in data from that sender. |
|
Multicast Address Dynamic Client Allocation Protocol (MADCAP)
|
This technology
that multicast address assignment in a DHCP environment. When registered clients are dynamically assigned an IP address through MADCAP, they can participate efficiently in the data stream process, such as for real-time video or audio network transmissions. |
|
multicast IPv6 address
|
An IPv6 address that enables the delivery of packets to
each of multiple interfaces. |
|
Name Resolution Policy Table (NRPT)
|
A Group Policy setting that includes rules
for names and namespaces that require special handling in DirectAccess for specific portions of the DNS namespace; for example, intranet versus Internet web servers. |
|
Name Server (NS) record
|
A DNS resource record that defines the DNS servers
that are authoritative in the domain. This includes both the primary DNS servers and any secondary DNS servers. |
|
NetBIOS (Network Basic Input/Output System)
|
An application-programming interface
(API) that operates at the session layer of the OSI model and enables user applications to submit network I/O and control directives to underlying network protocol software. |
|
netmask ordering
|
A mechanism used by DNS servers for prioritizing local subnets
so that when a client queries for a host name mapped to multiple IP addresses, the DNS server preferentially returns an IP address located on the same subnet as the requesting client. |
|
netsh
|
A command-line tool that enables you to configure TCP/IP networking
and addressing options. netsh also enables you to configure and display the status of various networking server roles and components. |
|
Network Access Protection (NAP)
|
A Windows Server 2008 role service that is designed
to determine and enforce the health status of client computers accessing the network either locally or by remote access. NAP can prevent computers that fail to meet health requirements from accessing resources on the network; it can also direct these computers to a remediation network where they can install updates to render them properly compliant. |
|
Network Address Translation (NAT)
|
A specification in TCP/IP that maps the
range of private IPv4 addresses (192.168.0.1-192.168-0-254) to the public IP address of an Internet-facing network adapter. |
|
Network File System (NFS)
|
Technology that enables UNIX to share files and applications
across the network. |
|
network interface layer
|
The bottom layer of the TCP/IP protocol stack, it provides
an interface for the Internet layer to the network media. This layer controls the way frames are ultimately built and sent out on to the network media or received from the network media and sent to the upper layers. |
|
network location server
|
An intranet web server used by a DirectAccess client to
determine whether it is located on the corporate intranet or the Internet. |
|
Network Monitor
|
A utility that enables you to capture, view, and analyze frames
transmitted across the network to network adapter cards on your computer. It is useful for detecting incursions by unauthorized users and tracing their activity on the network. |
|
Network Policy Server (NPS)
|
Microsoft’s implementation of RADIUS that is used
in both the original and R2 versions of Windows Server 2008. It replaces the Internet Authentication Service (IAS) server used with Windows Server 2003. |
|
network printer
|
A printer that is equipped with its own network adapter card and
connected to the network. |
|
New Technology File System (NTFS)
|
The file system originally provided with
Windows NT that supports volume mounting, compression, encryption, and security. |
|
nmcap.exe
|
The command-line version of Network Monitor. nmcap.exe enables
you to script execution of Network Monitor or run Network Monitor on a machine running the Server Core version of Windows Server 2008. |
|
non-dynamic DNS
|
A type of DNS that does not update automatically; an administrator
must enter updated zone data manually. This type of DNS was used by Windows NT DNS servers. |
|
NPS template
|
A template that helps you to create configuration components such
as client lists, shared secrets, connection conditions, and so on, which you can use on a series of NPS servers. NPS makes six default templates available. |
|
nslookup
|
A TCP/IP utility used in troubleshooting DNS name-resolution
problems. |
|
NTFS permissions
|
The security feature available in NTFS that allows you to grant
or deny local access rights. |
|
offline files
|
A feature built into Windows Server 2008/Windows 7 that enables you
to cache locally stored copies of shared files and folders, so that you can work with them while offline and re-synchronize your changes when you go back online. |
|
Open Systems Interconnection (OSI) reference model
|
A seven-layer reference
model that serves to describe the work of protocols in a standardized fashion. |
|
Other Stateful Configuration (O) flag
|
A parameter that determines how additional
IPv6 configuration parameters are obtained. This includes such settings as the IPv6 addresses of DNS servers. |
|
packet filter
|
A technology that enables you to specify destinations, ports, and protocols
of network packets that are either allowed to or forbidden from being transmitted to or from your router. |
|
paging file
|
Virtual memory stored on disk that enables Windows Server 2008 to
run more applications at one time than would be allowed by the computer’s physical memory (RAM). |
|
passive file screening
|
A component of file screening that sends configured notifications
to users who save specific file types but does not prevent users from saving these files. |
|
performance counter
|
A statistical measurement associated with a performance object,
such as %disk time, queue length, and so on. |
|
performance logs
|
Collections of computer performance-monitoring data collected
by running Data Collector Sets. You can archive performance logs and view them in Performance Monitor so that you can obtain a time-trend of a server’s performance. |
|
Performance Monitor
|
A Microsoft Management Console (MMC) application that
contains several tools for monitoring your computer’s performance. |
|
performance object
|
Hardware or software components that the Performance
Monitor can use for tracking performance data. |
|
persistent route
|
A static route that has been defined so that it will remain on the
router even if the interface is deleted or the server is rebooted. |
|
Pointer (PTR) record
|
A DNS resource record that defines the IP address to host
name mappings. Used to answer reverse lookup queries, where the user is requesting the host name corresponding to a given IP address. |
|
Point-to-Point Protocol (PPP)
|
A dial-up protocol that supports TCP/IP and IPX/
SPX and others with advanced compression and encryption functions. |
|
Point-to-Point Tunneling Protocol (PPTP)
|
A protocol used to create VPN tunnels
across a public network and includes encryption and authentication. |
|
Preboot Execution Environment (PXE)
|
A bootable ROM chip contained on compatible
NICs that enables client computers without an operating system to boot and connect to the network for locating a Windows Deployment Services (WDS) server. |
|
primary DNS suffix
|
The domain or zone name stored in DNS that is appended to
any unqualified host name in order to perform a search. By default, this is the AD DS domain name for a domain member computer; on a standalone computer, you can specify a primary DNS suffix from the DNS Suffix and NetBIOS Name dialog box. |
|
primary zone
|
A master copy of DNS zone data hosted on a server that is the primary
source of information for records found in this zone. |
|
print device
|
The hardware device that produces the printed output.
|
|
print driver
|
The program that converts graphics commands into instructions a
given type of print device can understand. |
|
print driver isolation
|
In Windows 7 and Windows Server 2008 R2, this improves
the reliability of the print service by enabling print drivers to run in separate processes from the print spooler process. |
|
print pooling
|
The act of setting up two or more physical printers (print devices),
each associated with a single printer. |
|
print queue
|
The series of documents that have been scheduled to print to a specific
printer. |
|
print server
|
Any computer on which printers have been configured. This can include
a client computer such as Windows 7, as well as a Windows Server 2008 R2 or older server computer. |
|
print spooler
|
An area on a computer’s hard drive where documents to be printed
are stored while awaiting printing. The spooler software formats the documents so that the associated printer can print them properly. |
|
printer
|
The software interface between the operating system and the print device
that determines various aspects of the printing process. |
|
printer pool
|
A set of two or more identical print devices associated with a single
printer. |
|
printer priority
|
A number from 1 to 99 that determines which document is printed
first. Printers with a higher priority print their documents first. |
|
private IPv4 network
|
An IPv4 network that can be accessed only within a corporation
and cannot be accessed from the public Internet. Private IPv4 networks can be configured with one of the following network addresses: 10.0.0.0/8, 172.16.0.0/16, or 192.168.0.0/24. |
|
private key
|
A digital code that is kept confidential and is used along with the public
key to secure data. |
|
Protected Extensible Authentication Protocol (PEAP)-Transport Layer Security
(PEAP-TLS) |
A remote access authentication and security protocol that provides
an encrypted authentication channel, dynamic keying material from TLS, fast reconnect using cached session keys, and server authentication that protects against the setup of unauthorized access points. |
|
protocol analyzer
|
A hardware device or software program that enables you to
capture, store, and analyze each packet that crosses your network. Also known as a network analyzer or packet analyzer. Network Monitor is Microsoft’s version of a software-based protocol analyzer. |
|
public key
|
A digital code available to everyone that is used along with a private key
to secure data. |
|
quota template
|
A template that you can create using FSRM that simplifies quota
management by enabling you to apply similar quotas to many different shared folders and volumes on different servers in your organization. |
|
RADIUS client
|
A server or network access device that uses the RADIUS protocol
to communicate with RADIUS serves such as NPS servers. Remember that dial-up, VPN, or other client-based computers, are not considered to be RADIUS clients. |
|
RADIUS proxy
|
An NPS server that forwards RADIUS messages between RADIUS
clients and servers that perform user authentication, authorization, and accounting. |
|
recovery agent
|
A user who has been assigned permission to access and decrypt
files, folders, and volumes that have been encrypted using either EFS or BitLocker. |
|
recursion
|
The name-resolution technique wherein a DNS server queries other
DNS servers on behalf of the requesting client to obtain the required FQDN, which it returns to the client. |
|
referral
|
An ordered list of targets that a user receives when she accesses a
namespace root or folder from a namespace server or domain controller. |
|
Reliability Monitor
|
A Windows Server 2008 tool that provides a trend analysis of
your computer’s system stability with time. It shows how events such as hardware or application failures, software installations or removals, and so on affect your computer’s stability. |
|
remediation server
|
A server that computers deemed to be noncompliant with
NAP policies can access in order to obtain security updates, antivirus or antispyware signature files, or other updates required to achieve compliant status and receive unrestricted network access. |
|
remote access policy
|
The part of Routing and Remote Access Service that determines
the conditions, profile, and permissions under which users can dial in to remotely access their networks for services. |
|
Remote Access Service (RAS)
|
An integrated service that provides remote networking
access for telecommuters, mobile workers, system administrators, and so on, and provides remote access to the network for services, such as file and printer sharing, electronic mail, and database access. |
|
Remote Authentication Dial-In User Service (RADIUS)
|
The industry standard client/
server protocol that enables remote access servers to communicate with a central server and database to authenticate dial-in and VPN users and authorize their access to the requested system or service. |
|
replication group
|
In DFS Replication, a group of servers that are configured
to replicate folders among each other. The group can be configured with a huband- spoke topology, in which members of the group replicate only with a central server, or a full mesh topology, in which all members replicate with all other members. |
|
replication member
|
One server in a replication group that is configured to replicate
folders with other members of the group. |
|
replication scope
|
The subset of DNS servers or domain controllers that actively
participate in replication of the specific zone. |
|
reporting mode
|
A NAP mode setting that evaluates client computers for health
status but does not enforce restricted network access for noncompliant computers. Useful for setting up and testing the operation of a NAP implementation. |
|
reservation
|
An IP address that is configured so that DHCP always assigns it to a
specific DHCP client. |
|
Resource Monitor
|
A monitoring tool that provides a summary of CPU, disk,
network, and memory performance statistics including mini graphs of recent performance of these four components, as well as tabulated data pertaining to each of these components. |
|
Resource record
|
A standard database record type used in DNS zone database
files. Common types of resource records include Start of Authority (SOA), Address (A or AAAA), Mail Exchanger (MX), and Name Server (NS), among others. |
|
reverse lookup query
|
A DNS name-resolution process by which an IP address is
resolved to a host name. |
|
root hints
|
A list of the names and IP addresses of DNS servers that are authoritative
for the Internet root domains. Used by a DNS server to forward queries for Internet domains that it is unable to resolve from its own database. |
|
round robin
|
A load-balancing mechanism used by DNS servers to distribute name
resolution activity among all available DNS servers. |
|
router
|
A device that operates at Layer 3 of the OSI protocol stack and manages
the flow of data between network segments or subnets. RRAS in Windows Server 2008 is capable of acting as a completely functional router on small to medium-sized networks. |
|
routing algorithm
|
A mathematical algorithm that calculates optimal routes for
packets traversing an internetwork. Such algorithms take many factors into consideration, including the speed, bandwidth, availability, and cost of each link. |
|
Routing and Remote Access service (RRAS)
|
A Windows Server 2008 role service
that is part of the Network Policy and Access Services server role and enables the server to function as a network router and remote access server. |
|
Routing Information Protocol (RIP)
|
A distance-vector routing protocol that enables
the exchange of routing information within a small to medium sized network. |
|
routing table
|
A table present on every Windows computer, server or client, that
provides a complete description of all routes available from or to the computer on which it is displayed. |
|
secondary zone
|
An additional copy of DNS zone data hosted on a DNS server
that is a secondary source for this zone information. |
|
secure dynamic DNS (SDDNS)
|
An enhancement to DNS that enables you to permit
dynamic updates only from authorized client computers in an Active Directory– integrated zone. |
|
Secure Socket Tunneling Protocol (SSTP)
|
A tunneling protocol that uses Secure
Hypertext Transfer Protocol (HTTPS) over TCP port 443 to transmit traffic across firewalls and proxy servers that might block PPTP and L2TP traffic. |
|
secure zone transfer
|
A method of digitally signing zone transfers that enables secondary
DNS servers to verify that zone transfers are being received from a trusted source. |
|
server isolation policy
|
A Group Policy setting that enables you to use IPSec authentication
to isolate specific domain member servers to accept only authenticated and secured communication from other computers within the domain. |
|
server-side targeting
|
A means of creating computer groups for WSUS in which
you manually add computers to computer groups using the Update Services snap-in. |
|
service location (SRV) record
|
A DNS resource record that provides information
about where computers that provide a specific service are located on the network. |
|
service set identifier (SSID)
|
A unique configurable identification that allows clients
to communicate to the appropriate access point on an 802.11 network. |
|
shadow copies
|
Also known as volume shadow copies, backup copies of files and
folders automatically created by Windows as you work on them, enabling you to restore them should they become improperly modified, corrupted, or deleted. |
|
Share and Storage Management Console
|
A new MMC snap-in that facilitates the
configuration and administration of shared folders and volumes in Windows Server 2008 R2. |
|
shared folder permissions
|
The security feature available when sharing files and
folders across a network that allows you to grant or deny access rights to network users. |
|
shared folders
|
Folders that are made available for access by users who are working
at another computer on the network. |
|
Simple Network Management Protocol (SNMP)
|
A network management protocol
that enables you to configure remote devices, monitor network performance, detect network faults, detect inappropriate access, and audit network usage on devices such as hubs, bridges, routers, and servers. |
|
SNMP agent
|
A device such as a computer or network component on which SNMP
software has been installed. The SNMP agent gathers information in response to requests from an SNMP management system. |
|
SNMP community
|
A logical group of hosts that belong together and all run the
SNMP service. Every community includes at least one management system and multiple agents. |
|
SNMP management system
|
A computer on which you have installed SNMP management
software that sends information and update requests to devices configured as SNMP agents. |
|
SNMP trap
|
An unsolicited message sent by an SNMP agent to an SNMP management
system when the agent detects that a certain type of event has occurred locally on the managed host. |
|
source computer
|
Also called forwarding computer, a computer that has been configured
using an event log subscription to send its event logs to another computer. |
|
Start of Authority (SOA) record
|
A DNS resource record that identifies the primary
name server within the domain. It also includes other properties such as an administrator e-mail address and caching properties for the zone. This record is always the first resource record in every zone file. |
|
Startup Repair
|
A utility that provides options for repairing problems that are preventing
a computer from starting normally. |
|
stateful address configuration
|
A type of IPv6 address autoconfiguration that uses a
stateful address configuration protocol such as DHCPv6 to obtain non-link-local addresses and other IPv6 configuration parameters. |
|
stateful firewall
|
A firewall that monitors the state of active connections and uses
the information gained to determine which network packets are allowed through the firewall. Packets sent by an outside computer attempting to communicate with a computer protected by a stateful firewall are dropped unless the packet or protocol was granted access by an access control list (ACL). |
|
stateless address configuration
|
A type of IPv6 address autoconfiguration that
uses Router Advertisement messages to configure link-local addresses and additional addresses by exchanging Router Solicitation and Router Advertisement messages with neighboring routers. |
|
statement of health (SoH)
|
A declaration from a system health agent (SHA) on a
client computer that asserts the client’s health status to NAP. The SHA creates the SoH and sends it to the corresponding system health validators (SHVs) on a NAP health policy server. |
|
static IP address
|
An IP address that is permanently assigned to a computer on the
network. |
|
static route
|
An administrator-defined route that does not change and defines the
pathway from one network to another network. |
|
Storage Manager for SANs
|
A server feature that enables you to create and manage
LUNs on storage area networks, thereby assisting you in managing your network. |
|
storage reports
|
Reports generated by FSRM that provide information on the data
stored on your file server, assisting you in understanding file usage on your server. |
|
storage-area network (SAN)
|
A discrete network that is dedicated to file storage
using devices, such as disk arrays or tape libraries, that provides dedicated storage to servers in such a fashion that these devices appear to be locally attached to the servers that reference them. |
|
stub zone
|
A DNS zone that contains source information about authoritative name
servers for its zone only. |
|
subnet mask
|
A set of numbers, 32-bits in length, that begins with 1s and ends
with 0s in binary notation. The number of 1s represents the number of bits that are considered the subnet address. The bits that are 0s are the host address. Using a subnet mask, you can create more subnets with a smaller number of computers per subnet. All computers on a given subnet must have the same subnet mask. Using dotted-decimal notation, a subnet mask is written as 255.255.0.0 (which is the default mask for a Class B address). |
|
subnetting
|
A process that enables you to reconfigure which portion of the subnet
mask constitutes the network portion and which portion constitutes the computer portion. |
|
superscope
|
A group of multiple scopes (child scopes) as a single administrative
entity used on DHCP servers. |
|
synchronizing files
|
The act of copying files from a shared folder on the network
to an offline file cache on a computer, or copying the same files back to the shared folder after a user has modified them. |
|
system health agent (SHA)
|
A NAP-capable client software component that declares
a client computer’s health status to NAP in a statement of health (SoH). |
|
system health validator (SHV)
|
A NAP health policy software that validates a client
computer’s health status by verifying the client’s SoH made by its corresponding SHA. |
|
System Stability Index
|
A numerical value that provides an indication of your computer’s
reliability over time, as measured by Reliability Monitor. |
|
System State data
|
Operating system-specific data that is backed up by the Windows
Server Backup program as a unit. It contains the Registry, COM+ class registration database, and system and boot files; on domain controllers, it also includes the AD DS database and the SYSVOL folder. |
|
Teredo
|
A tunneling communication protocol that enables IPv6 connectivity between
IPv6/IPv4 nodes across Network Address Translation (NAT) interfaces, thereby improving connectivity for newer IPv6-enabled applications on IPv4 networks. |
|
Time to Live (TTL)
|
A configurable retention time interval that specifies the length
of time that the server will retain cached information for a zone. The maximum default TTL is one hour. |
|
Transmission Control Protocol (TCP)
|
A TCP/IP protocol that provides connection-
oriented, reliable communication between two hosts, typically involving large amounts of data. |
|
transport mode
|
An IPSec mode that is used for end-to-end security between a
client and a server within a local area network. In transport mode, the entire packet is not encrypted or signed; rather, only the data in the IP payload is encrypted and signed. |
|
trust anchor
|
A preconfigured public key associated with a specific zone in DNS.
Such a trust anchor is used to support the DNSKEY resource record on a Windows Server 2008 R2 DNS server. |
|
Trusted Platform Module (TPM)
|
A microchip that is built into a computer. It is
used to store cryptographic information, such as encryption keys. |
|
tunnel mode
|
An IPSec mode that encrypts the IP header and the payload during
transit. In this way, tunnel mode provides protection for the entire packet. |
|
universal naming convention (UNC)
|
A network naming scheme that uses NetBIOS
names for accessing shared resources on remote computers using the format \\servername\sharename. |
|
update classifications
|
Diverse types of updates available from Microsoft, such as
critical updates, definition updates, and security updates, which can be deployed to client computers from a WSUS server. |
|
update synchronization
|
The act of downloading updates from the Microsoft Update
website to a WSUS server for testing, approval, and distribution to client computers. |
|
upstream server
|
A WSUS server that provides update files to downstream servers
when you are implementing a WSUS server hierarchy. |
|
user class
|
An options class that is used to differentiate DHCP clients according to
their type, such as desktop, laptop, or server computer. |
|
User Datagram Protocol (UDP)
|
A TCP/IP protocol that provides fast, non-connection-
oriented communications with no guarantee of delivery and no error checking. |
|
vendor class
|
An options class that’s used to identify a client’s vendor type and
configuration when obtaining a DHCP lease. You can use the vendor class ID option (code 60) to specify vendor classes. |
|
virtual private network (VPN)
|
Using a protocol such as Point-to-Point Tunneling
Protocol or L2TP with IPSec to tunnel through a public network to connect to a private network and maintain a secure connection. |
|
volume shadow copy service (VSS)
|
Also known as volume snapshot copy, a Windows
service that automatically backs up copies of files and folders as you work on them, enabling you to revert to an earlier version should you improperly modify or delete them. |
|
VPN Reconnect
|
A new feature of Windows Server 2008 R2 and Windows 7 that
utilizes IKEv2 technology to automatically reestablish a VPN connection when a user has temporarily lost her Internet connection. |
|
vssadmin.exe
|
A utility that enables you to manage volume shadow copies from
the command line. |
|
wbadmin.exe
|
A command-line tool that enables you to perform backups and restores.
In Windows Server 2008, this is the only tool that you can use to perform system state backups and restores. |
|
Weighting records
|
The act of specifying a value used by the clients to determine
which server to contact, in cases where multiple records with the same priority exist. You can enter a weight value each time you create a new SRV resource record. |
|
Wi-Fi Protected Access (WPA and WPA2)
|
A wireless authentication protocol that
uses preshared network key encryption to ensure that only authorized users receive access to the network. |
|
Windows Firewall
|
The personal firewall software incorporated in Windows
Vista/7/Server 2008/R2 that filters incoming TCP/IP traffic. Windows Firewall was first introduced in Windows XP SP2. |
|
Windows Firewall with Advanced Security
|
A Microsoft Management Console
(MMC) snap-in that provides enhanced firewall management capabilities, including the ability to create firewall rules that are specifically configured to protect a specific type or source/destination path of network traffic. |
|
Windows Security Health Validator (WSHV)
|
A system health validator included
with Windows Server 2008 that provides default NAP health validation settings for firewall, antivirus, spyware, automatic updates, and security updates. |
|
Windows Server Backup
|
A Windows Server 2008 server feature that provides a
centralized location and wizards for performing various types of backup and restore procedures. |
|
Windows Server Update Services
|
A Windows Server 2008 R2 server role that
supplies updates, hotfixes, and other patches automatically to computers on a network. You can deploy and manage updated downloaded from the Microsoft Windows Update website to WSUS servers running on your network. Client computers simply connect to the local WSUS server to download and install updates. |
|
Windows Update
|
An application that enables you to maintain your computer in an
up-to-date condition by automatically downloading and installing critical updates as Microsoft publishes them. Also enables access to the WSUS server or Microsoft website on which these updates are published. |
|
WINS (Windows Internet Name System)
|
A Windows Server 2008 feature that
enables the dynamic resolution of NetBIOS names to the corresponding IP addresses. |
|
wired equivalent privacy (WEP)
|
A protocol that is used on 802.11-based wireless
networks to encrypt data sent between computers on a wireless network or between a computer and its access point. |
|
wireless access policy
|
A component of Group Policy that defines conditions that
wireless clients attempting to access a network through a RADIUS server must meet in order to gain access. |
|
zone
|
A discrete portion of the local or Internet-based DNS namespace, for which
a single DNS server is authoritative. |
|
zone delegation
|
The act of creating a new subdomain that exists in its own DNS
zone and has one or more DNS servers specifically delegated to it as containing the authoritative zone files. Resource records are created in other zones that point to the authoritative DNS servers for the zone being delegated. |
|
zone file
|
A file that includes all resource records needed to completely define a
zone and is kept on the DNS name server. |
|
zone transfers
|
A mechanism that replicates and synchronizes all copies of the zone
files between DNS name servers. |