SY0-401 pt7

suttonjs2's version from 2016-04-29 19:21

Glossary - T

Question Answer
Task ManagerA tool for observing and deleting processes; also provides a more granular level of detail when looking at processes and threads, including the option of removing or setting the priority of individual processes.
TelnetA terminal emulation program used to remotely connect to an application or a server.
TracertA utility commonly used to locate failures along a TCP/IP communications path by tracing the route from origin to destination. Each router interface encountered is echoed to the screen along with some statistical information about the path timing.
Transmission Control Protocol/Internet Protocol (TCP/IP)Transmission Control Protocol/Internet Protocol (TCP/IP) is the most common protocol used today. A routable protocol, TCP/IP is the protocol on which the Internet is built. TCP/IP is very robust and is commonly associated with UNIX systems. TCP/IP was originally designed in the 1970s to be used by the Defense Advanced Research Projects Agency (DARPA) and the U.S. Department of Defense (DOD) to connect systems across the country. This design required the capability to cope with unstable network conditions. Therefore, the design of TCP/IP included the capability to reroute packets.
transport layer(1) The OSI layer that ensures reliable delivery of data to its destination. The transport layer consists of two protocols: the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). (2) The TCP/IP layer that is located at layer 3 of the TCP/IP model. The main responsibility of the transport layer is to provide communication from one application to another application.
treeA hierarchy of domains in Active Directory that share the same DNS namespace.
Trivial File Transfer Protocol (TFTP)Similar to the File Transfer Protocol, but does not require user authentication.
trust relationshipA connection between two domains. Once a trust is established, users from one domain can be given permission to access resources on another domain.
tunnelingWhen a PPP session is established, PPTP creates a control connection between the client and the remote PPTP server.
twisted-pair cableA cable type in which conductive wires are twisted to help reduce interference. There are two types of twisted-pair: shielded and unshielded. See also coaxial cable and fiber-optic cable.

Glossary - U

Question Answer
unattended backupThe backup program launches at a scheduled time, does the specified backup, and then terminates.
Universal Naming Convention (UNC)A standardized way of connecting to a shared resource on a computer. The syntax is always \\computername\sharename.
UNIXUNIX is a powerful multitasking operating system that can run many processes in the background while enabling users to work in the foreground on an application. The multiuser feature enables many users to use the same machine. UNIX has been the leader in several powerful and diverse utilities that have been ported over to other operating systems.
unshielded twisted-pair (UTP)A twisted-pair cable that does not have any shielding between the conducting strands and the outer insulation.
user accountRepresents a user who accesses the resources on a computer or network. User accounts do not have to represent individuals; they can also be accounts for services, such as a SQL Server account.
User Datagram Protocol (UDP)UDP offers a connectionless datagram service that is an unreliable “best effort” delivery. UDP does not guarantee the arrival of datagrams, nor does it promise that the delivered packets are in the correct sequence. Applications that don’t require an acknowledgment of data receipt use UDP.
User ModeAlso called nonprivileged processor mode. This is where applications and the various subsystems are run. User Mode is designed to prevent applications from bringing down the operating system.
user nameA name used by a user to log on to a computer system.
user rightEnables the user to perform specific operations on the computer. You set user rights to control which operations a user or group performs. Some vendors may use the term “system privileges.”

Glossary - V

Question Answer
virtual local area network (VLAN)A virtual local area network creates a small grouping of PCs that are required to communicate with one another only on a larger network. This can be accomplished by specifying the ports on the switch that the PCs are connected to.
virtual memoryCreated by Windows to simulate RAM on a computer when more memory is needed. It does this by using the computer’s hard disk as needed.
virtual private network (VPN)Provides tunneling through a public network with a secure communications channel. VPNs use PPTP or other protocols for secure connections to a remote network. By using PPTP or a similar tunneling protocol, you are able to tunnel through an Internet or LAN connection without compromising security.
virusMalicious code that causes harm to a system.
virus signature fileA database of known viruses that the antivirus software uses when scanning files to eliminate viruses. The virus signature file must be kept current. VLAN See virtual local area network.
volume A logical division of space on a physical drive that is treated as a single unit. A volume is a part of a hard disk used to store information.
Question Answer
volume setsThe combining of different-sized areas of free space as a single volume (drive letter) from any type of hard disk (IDE, SCSI, or ESDI). Volume sets don’t provide any fault tolerance or performance gains. They are simply used to combine multiple areas of free space as one single volume.
vulnerability testingA type of security testing that involves running a piece of software to check for weaknesses in the configuration of a system.

Glossary - W

Question Answer
WiFi Protected Access (WPA)A wireless security protocol designed to encrypt wireless communication and provide authentication services.
Wired Equivalent Privacy (WEP)WEP is an old wireless security protocol that is used to encrypt wireless communication with a symmetric key.
wireless access point (WAP)A network device that allows wireless clients to connect to the wireless network. Wireless clients connect to the access point and send data to other hosts on the network through the access point.
wireless networkingA network configured to use communication techniques such as infrared, cellular, or microwave so that cable connections are not required.
workgroupA group of computers in which each is managed individually. workstation The client machine used to access a network.


SY0-401 pt1
SY0-401 pt2
SY0-401 pt3
SY0-401 pt4
SY0-401 pt5
SY0-401 pt6
SY0-401 pt7
SY0-401 pt8