SY0-401 pt2

suttonjs2's version from 2016-05-05 14:14

Glossary - C pt1

Question Answer
catalogInformation describing the backup sets stored on the tape is collectively called a catalog.
CAT3 cableCAT3 is a grade of cable that enables networking, but CAT5 is the better way to go. The key thing about CAT3 is that it already exists in most office buildings and homes. CAT3 is a voice-grade cable used in phone networks. It can be used for networking up to 10 Mbps.
CAT5 cableMost UTP cable in today’s networks is CAT5. CAT5 is a standard that enables up to 100 Mbps data transmission. This is the standard UTP or STP cable type.
cellsA wireless network contains transmitters that extend a radio sphere around the transmitter—this range of coverage is called a “cell.” This cell can extend from a couple of feet to many miles.
Certificate Revocation List (CRL)A list of certificates which have been revoked, are no longer valid, and should not be used.
Certificate Signing Request (CSR)A message sent from an applicant to a certificate authority to apply for a digital identity certificate. This is also the same process that is used to renew a certificate.
Challenge Handshake Authentication Protocol (CHAP)An authentication protocol that uses an encryption algorithm to pass the authentication data to protect it from hackers. Because CHAP is so much more secure than PAP, it is used widely today on the Internet.
checksumA form of error checking that simply counts the number of bits sent and sends this count along. On the receiving end, the bits are once again counted and compared with the original count. If the two counts match, it is assumed the data was received correctly.
class A IP addressAn address in a class that supports 16 million hosts and has a first octet that ranges between 1 and 126.
class B IP addressAn address in a class that supports 65,534 hosts and has a first octet ranging between 128 and 191.
class C IP addressAn address in a class that supports 254 hosts and has a first octet ranging between 192 and 223.
class D IP addressAn address in a class used for multicasting applications. Class D addresses range between and
class E IP addressAn address in a experimental address block that is reserved for future use. Class E addresses range between and

Glossary - C pt2

Question Answer
client(1) The workstation accessing the resources in a client/server model. See also client/server model. (2) The software that enables communications for various network services. (3) A computer that accesses resources on a network.
coaxial (or coax) cableA coaxial has one strand (a solid-core wire) that runs down the middle of the cable. Around that strand is insulation. See also twisted-pair cable and fiber- optic cable.
collision domainA group of systems that can have their data collide with one another.
command lineA character-mode interface for computer applications that relies on commands instead of a graphical interface to process information.
compressionA mathematical technique that analyzes computer files in order to compress them to a smaller size. Most backup systems, and many file servers, compress files to provide increased storage capacity.
computer virusA computer program built to sabotage or destroy a computer or network.
connectionless communicationConnectionless communication is a form of communication in which the destination computer does not notify the source when the information is received. This type of communication can be unreliable because there is no notification to guarantee delivery. Connectionless communication can be faster than connection-oriented communication, because after information is sent, there is no second step to ensure proper receipt of information.
connection-oriented communicationConnection-oriented communication ensures reliable delivery of data from the sender to the receiver, without intervention required by either. Error correction and flow control are provided at various points from the source to the destination.
cookiesSmall files stored on the client computer that are automatically submitted to the web server for processing.
Cross-site Request Forgery (CSRF)A malicious exploit of a website where unauthorized commands are transmitted from a user that the website trusts. Unlike XSS, which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser. Validate both the client and the server side.
Cross-site Scripting (XSS)Enables attackers to inject client-side scripts into web pages viewed by other users. Implement input validation.
cryptographySee public key cryptography, secret key cryptography, and symmetric cryptography.
cyclical redundancy check (CRC)A form of error checking that involves running a byte or group of bytes through a mathematical algorithm to produce a single bit or byte to represent the data (a CRC). The CRC value is transmitted with the data. When the data reaches its destination, the receiver runs it through the same mathematical algorithm. The results are compared with the original CRC, and if they match, the receiving computer assumes the data is correct. If they do not match, the receiver must discard the data and try again.

Glossary - D pt1

Question Answer
daily backupA daily backup copies all selected files that have been modified the day the daily backup is performed and does not mark them as having been backed up.
data link layerThe OSI layer that handles the disassembling and the reassembling of frames on a network.
database management system (DBMS)A database environment that manages a database, including the organization, storage, security, retrieval, and integrity of data in a database.
datagramDatagrams, used by the User Datagram Protocol (UDP), are self-contained, independent pieces of data that contain enough information to be routed from the source computer to the destination computer without help from either. The network uses the self- contained information of the data to determine how to send the datagram. A datagram is just like a piece of postal mail. You drop mail in the slot, and the stamp and address are enough for the postal service to route the mail to your recipient. However, the post office might lose a piece of mail, and there is no way to track when or where the mail was lost.
default gatewayA default gateway is required when the client system needs to communicate outside its own subnet. Normally, the default gateway is a router connected to the local subnet, which enables IP packets to be passed to other network segments. If the default gateway is not configured in the DHCP server, it defaults to The default gateway is needed only for systems that are part of an internetwork. Data packets with a destination IP address not on the local subnet or elsewhere in the routing table are automatically forwarded to the default gateway.
device driversSmall programs used by the system to communicate with the various hardware components in the system.
differential backupBacks up only the files that have changed since the last full or differential backup and does not modify the archive bit. See also full backup and differential backup.
directory pathThe path to a directory on a file system, which could include the name of the server, the volume, and other pathnames leading to the directory.
directory replicationThe process of replicating the directory database from one system to another for fault-tolerance reasons.
directory serviceA directory service is responsible for maintaining the directory of objects for an environment. Active Directory and eDirectory are examples of directory services.
directory synchronizationThe process of replicating, or synchronizing, the directory database to a remote system.
directory treeThe file structure, including directory and subdirectory layout below the root directory.
discretionary accessAccess control when the person who created the file or folder is the owner and is responsible for securing those files and folders.
Disk AdministratorA program that creates and manages partitions.

Glossary - D pt2

Question Answer
disk duplexingSimilar to disk mirroring except that it uses two disk controller cards—one card for each drive in the mirror set. This provides redundancy in case one of the controllers fails. See also disk mirroring.
disk mirroringProvides redundancy by mirroring data from one hard drive to another. If a crash or other problem occurs on the active drive, the operating system automatically begins to use the backup drive and notifies you of the switch.
disk striping with paritySee Redundant Array of Inexpensive Disks.
diskless workstationThe diskless workstation is a concept that has been around for some time. Designed for use in fairly large environments, it originally had two goals. The first was to enhance security on the network by removing local storage from the end user and requiring that all data and applications be stored on servers. By managing user access to this information via server permissions, the LAN administrator can more effectively control the environment. The second goal of diskless workstations was the cost of mass storage. By removing the cost of local storage, particularly as workstation populations increased, companies could save money. This has become less an issue as the cost of mass storage has declined.
distributed applicationsApplications that split processing between computers on a network, such as a client/server application, in which processing is divided between the client computer and a more powerful server computer. Normally, the part that runs on the client computer is called the front end, and the part that runs on the server computer is called the back end.
domain controllerA system that holds the Active Directory database.
Domain Name System (DNS)A service for mapping IP addresses to fully qualified domain names. It resolves host names to IP addresses, and vice versa (with reverse lookups).
Domain Name System (DNS)zone file The database file that contains all records created in the defined zone.
dotted-decimal notationConsists of four eight-bit fields written in base 10, with dots (periods) separating the fields. Each eight-bit field is represented by a number ranging from 0 to 255.
driverA driver is a piece of the operating system that enables it to communicate with a device or coordinates the communications between hardware and the computer. There are different types of drivers for modems, sound cards, and just about any other component in a computer. For example, a driver enables a LAN adapter to work.
domainA group of computers containing domain controllers that share account information and have one centralized accounts database. (Not to be confused with Internet domains, such as <> .) domain duplexing Duplexing ensures fault tolerance—not just with your data but also with your disk controller. With traditional mirroring, there is one disk controller. If the controller fails, the server is down until that component is replaced. Duplexing gives you a second controller. Each drive is connected to its own controller. If a controller fails, you still have an intact configuration.
Due careThe normal care that a reasonable entity would exercise over that entity's property. As part of due care, an organization is responsible for implementing policies and procedures to prevent data loss or theft.
Due diligenceThe investigation of a business, person, or act prior to signing a contract or committing the act.
Dynamic Host Configuration Protocol (DHCP)A dependable, flexible alternative to manual TCP/IP configuration that provides PCs with automatic configuration of TCP/IP parameters such as IP address, subnet mask, and default gateway.
dynamic link library (DLL)A module of executable code that is loaded on demand. DLLs are used in Microsoft Windows products.
dynamic routingProtocols that advertise the routes they are familiar with and pass on the metrics, number of other routers, or hops required to get from their host to another network, either directly or indirectly through another router.


SY0-401 pt1
SY0-401 pt2
SY0-401 pt3
SY0-401 pt4
SY0-401 pt5
SY0-401 pt6
SY0-401 pt7
SY0-401 pt8