Shared Flashcard Set

Details

Chapter 9,10,11 Final
Network Admin
63
Computer Networking
Undergraduate 2
12/09/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
Routing and Remote Access Services (RRAS)
Definition
is a role service to configure and manage network routing in Windows Server 2008.
Term
Routing and Remote Access Services (RRAS)
Definition
provides Dynamic Host Configuration Protocol (DHCP) relay agent functionality for networks.
Term
Routers
Definition
are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes.
Term
Routing tables
Definition
are composed of routes.
Term
Dynamic protocols
Definition
route traffic based on information they discover about remote networks from other routers.
Term
RIP neighbors
Definition
RIPv2 uses ____ in determining routes it can use for forwarding packets of data.
Term
DHCP relay agent
Definition
A(n) ____ forwards DHCPDiscover messages for subnets that do not have a DHCP server and that are not connected to a router that supports passing DHCP broadcast messages.
Term
IGMP router and proxy
Definition
The ____ component of RRAS provides support for multicast network traffic by routing multicast traffice to networks that host these services.
Term
Routing and Remote Access Services (RRAS)
Definition
In situations where you do not have a RFC 1542-complaint router, you can create a DHCP relay agent using ____.
Term
(PPTP)
Definition
____ supports securing VPNs using 128-bit RC4 encryption.
Term
Layer 2 Tunneling Protocol (L2TP)
Definition
____ works by encapsulating PPP frames before they are transmitted across a network.
Term
Secure Socket Tunneling Protocol (SSTP)
Definition
____ uses PPP to encapsulate traffic for transmission across network using a secure socket layer (SSL).
Term
Network Policy Server
Definition
The ____ is a role service that provides you with a framework for creating and enforcing network access policies for client health, along with policies for authentication and authorization of connection requests.
Term
NPS console
Definition
The _____ is the central utility for managing RADIUS clients and remote RADIUS servers, network health and access policies, NAP settings for NAP scenarios, and logging settings.
Term
RADIUS
Definition
_____ is an industry-standard protocol that provides centralized authentication, authorization, and accounting for network access devices such as wireless access points and remote access servers.
Term
RADIUS client
Definition
A _____ is any device such as a remote access server, wireless access point or VPN concentrator, that accepts remote connections from remote access clients.
Term
network access server
Definition
A _____ is responsible for providing network access to remote access clients such as users needing VPN or dial-in network access.
Term
RADIUS proxy
Definition
A(n)____ is a setting used to route RADIUS messages between the access client and the appropriate RADIUS server.
Term
RADIUS servers
Definition
____ are used on networks to perform authentication, authorization, and accounting for RADIUS clients, or convey authentication requests to other centralized authenticating systems.
Term
user account database
Definition
A(n)____ is the database used by a RADIUS server to authenticate users.
Term
Authentication
Definition
_____ is the first component of the RADIUS process in which the identity of a user connecting to a resource is verified.
Term
exception
Definition
A(n)_____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.
Term
network profile
Definition
Clients us a (n)____ to determine to what type of network they are connected.
Term
Symmetric encryption
Definition
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.
Term
New Technology File System (NTFS)
Definition
Along with providing file security through Access Control Lists,_____ allows users to perform file-based encryption through the Encrypting Files Service(EFS).
Term
public key encryption
Definition
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.
Term
Cipher.exe
Definition
_____is a command-line utility that allows you to manage EFS through scripts or the command prompt.
Term
BitLocker
Definition
_____provides hard drive-based encryption of servers and Windows Vista computers.
Term
Trusted Protection Module
Definition
A_____is a microchip that performs basic security tasks with encryption keys.
Term
enhanced security mode
Definition
Using BitLocker with a TPM and a PIN or a USB flash drive is called _____.
Term
Denial of service
Definition
_____ attacks are performed by flooding a host or a network router with more traffic than it can handle.
Term
man-in-the-middle
Definition
A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.
Term
Repudiation
Definition
_____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.
Term
Network traffic sniffing
Definition
_____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.
Term
transport mode
Definition
IPSec's _____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN) solutions for remote access.
Term
tunnel mode
Definition
IPSec's ____ provides secure communications between two networks through a single node.
Term
Internet Key Exchange
Definition
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.
Term
preshared keys
Definition
The term _____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.
Term
Encapsulating Security Payload
Definition
_____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.
Term
Authentication Header
Definition
_____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.
Term
challenge-response protocol
Definition
All forms of NTLM use the _____.
Term
Network Policy Server
Definition
The _____ is responsible for managing the network health and connectivity policies on a network.
Term
Servermanagercmd.exe
Definition
_____ provides a command-line utility so that you can perform automated installations or removals of roles, role services, and features.
Term
Windows Server Update Services (WSUS)
Definition
_____ centralizes the updating tasks for client and server computers and allows you to relocate them from the WAN onto the local network.
Term
Windows Server Update Services (WSUS)
Definition
_____ provides a central administrative console for downloading the list of the latest updates from Microsoft Update servers, approving updates to be deployed to network clients, and viewing reports on the status of your network clients.
Term
WSUS Administrative console
Definition
The _____ allows you to generate reports, manage updates, and monitor the computer through the console.
Term
Microsoft Baseline Security Analyzer
Definition
_____ provides security recommendations from Microsoft and guidance for improving a computer's security posture.
Term
Reliability and Performance
Definition
The _____ console provides a suite of utilities for monitoring and capturing performance data for local and remote systems.
Term
Data Collector Sets
Definition
_____ are central repositories for gathering information for Reliability and Performance Monitor.
Term
Event trace
Definition
_____ data is collected from trace providers, which are components of the operating system or of individual applications that report actions or events.
Term
Performance Monitor
Definition
The _____ can display real-time or historical data of local or remote computers.
Term
Reliability Monitor
Definition
New in Windows Server 2008, the _____ snap-in provides an overview of system stability by listing details about event that have affected reliability.
Term
Data Collector Set
Definition
The _____ acts as a central repository for gathering information for Reliability and Performance Monitor.
Term
Data Collector Set
Definition
The _____ organizes data collection points into a single component that you can use to review or log performance in many ways.
Term
Network Monitor
Definition
_____ is a built-in utility for capturing and viewing network traffic as it arrives or leaves a server.
Term
Network Monitor
Definition
_____ helps to determine whether traffic is reaching a destination and lets you view encrypted ESP packets to verify that IPSec policies are being properly applied.
Term
Frame summary
Definition
______ displays a process name if one exists for traffic so that you can easily track data back to its source.
Term
Disk quotas
Definition
_____ allows you to track disk usage by users and enforce disk space limits on disk volumes.
Term
snapshots
Definition
The Volume Shadow Copy service (VSS) is a feature of Windows Server 2008 that allows you to set up manual or automatic backup copies, known as _____, of files or folders on a specific volume at a specific point in time.
Term
Windows Server Backup
Definition
_____ provides backup and recovery of your files, folders, volumes, and application data on Windows Server 2008.
Term
Full backup
Definition
_____ increases the amount of time necessary for performing your backup but does not affect the overall performance of your server or performance when restoring files.
Term
Incremental backup
Definition
_____ backs up only the blocks that have changed since the last backup was performed.
Term
bare-metal backup
Definition
A(n)_____ is a process where a server can be restored to a clean machine(no installed) in a single step.
Supporting users have an ad free experience!