SY0-401 pt3

suttonjs2's version from 2016-04-29 19:23

Glossary - E

Question Answer
encapsulationThe process of encoding data for transmission across the network.
encrypted authenticationAuthentication of a user or other object that does not involve passing credentials in clear text. With encrypted authentication, the user name and password is passed to the authentication server in an encrypted format.
encryptionUse of an algorithm that hides the contents of a message, or other file or communication, by deliberately scrambling the elements that compose the item. The item must then be decrypted to its original form before it can be read.
end-to-end communicationCommunication on networks that are concerned only with the two ends of the conversation dealing with each other directly (for example, a telephone call).
error checkingUsed when sending data across a network to ensure that the data received is identical to the data that was sent originally. See also checksum, and cyclical redundancy check.
EthernetA networking technology defined by the Institute of Electrical and Electronic Engineers (IEEE) as IEEE standard 802.3. This technology is the most popular data link– layer protocol because of its speed, low cost, and worldwide acceptance.
event logsLog files containing the system, security, and application events. Explorer The Windows shell and file system navigation tool.

Glossary - F

Question Answer
fault toleranceThe ability to ensure that data and resources remain functional in an emergency. For example, if a cable segment breaks, traffic will be rerouted. This fault tolerance means that the network going down due to a cable fault is almost impossible.
fiber-optic cableOne of three types of physical media that can be used at the physical layer to carry digital data signals in the form of modulated pulses of light. An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric layer of glass, known as the cladding. For most fiber-optic cables, the conductive element is a form of special glass fiber, rather than copper or some other conductive metal. The beauty of fiber-optic cable is that it is immune to electronic and magnetic interference and has much more bandwidth than most electrical cable types. There are two fibers per cable— one to transmit and one to receive. See also coaxial cable and twisted-pair cable.
File Allocation Table (FAT)An old file system used with DOS and early versions of Windows that did not support any security features such as permissions, encryption, or auditing.
File Allocation Table 32 (FAT32)An older file system that does not support security features such as permissions, encryption, and auditing. FAT32 is newer than FAT and was used in older Microsoft operating systems such as Windows 98.
file and print serverFile and print servers control and share printers and large amounts of data. These servers are typically high-powered computers that are built specifically for the purpose of moving files between disks and the network as quickly as possible. File and print servers also check the access control list (ACL) of each resource before enabling a user to access a file or use a printer. If the user or a group to which the user belongs is not listed in the ACL, the user is not allowed to use the resource.
file serverA network computer that runs the network operating system and services requests from the workstations.
file systemThe network operating system’s rules for handling and storing files.
File Transfer Protocol (FTP)A protocol designed primarily for transferring data across a network. FTP denotes both a protocol and a utility used for this purpose. It was created to quickly and efficiently transfer data files from one host to another without impacting the remote host’s resources.
FTPSA file transferring protocol that uses SSL for security.
firewallSoftware or hardware that prevents unauthorized traffic between two networks by examining the packets that travel on both networks. Firewalls look at the address and port information in the packet and then determine if that type of traffic is allowed.
forestThe top level of the Active Directory structure. A forest is one or more trees that are made up of domains. All domains in the forest share the same schema and global catalog.
four-octet addressThe 32-bit IP address is broken into four octets that can be represented in binary (11010100 <tel:11010100> 00001111 <tel:00001111> 10000100 <tel:10000100> 01110101 <tel:01110101> ) or decimal ( format.
fragmentation(1) Occurs when there is unused space within contiguous pages. (2) The process in which networks chop or fragment large pieces of data into more manageable units before transmission. When data is fragmented, it is important to ensure that all the pieces make it to the other end in the right sequence. If they are not in order, it is sometimes possible to resequence the data into the right order.
full backupBacks up every file on the specified volume or volumes. Full backups should be run frequently, and at least one current copy should be stored off-site.
full-duplex dialogsUsed by the OSI session layer to enable data to flow in both directions simultaneously.
fully qualified domain name (FQDN)The complete DNS namespace path to a computer is known as an FQDN.
fuzzingA security testing technique to verify how an application will react to random data being inputted into the application.

Glossary - G

Question Answer
gatewayA device or service that translates data from one format to another.
gigabit networkGigabit networks operate at 1000 Mbps, or 1 gigabit per second (Gbps). This is sometimes known as “gigabit to the desktop.”
global groupsCreated on domain controllers and used to organize the users.
guest accountUsed for limited access for remote users or users from other domains. Disabled by default, the guest account provides low-level access to the computer for users who do not have a user account of their own.
group accountsAccounts used for grouping users who perform the same function or require access to the same resources. If it were not for group accounts, you would have to grant access to resources on a per-user basis.


SY0-401 pt1
SY0-401 pt2
SY0-401 pt3
SY0-401 pt4
SY0-401 pt5
SY0-401 pt6
SY0-401 pt7
SY0-401 pt8