05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

G-34 Glossary<br />

private key The secret half of a cryptographic key pair that is used with a public key<br />

algorithm. Private keys are typically used to digitally sign data and to decrypt data<br />

that has been encrypted with the corresponding public key.<br />

privilege A user right that allows the members of the group to which it is assigned<br />

to perform a specific task, usually one that affects an entire computer system<br />

rather than one object.<br />

process An operating system object that consists of an executable program, a set of<br />

virtual memory addresses, and one or more threads. When a program runs, a process<br />

is created.<br />

processor affinity A setting made in Task Manager that determines on which processors<br />

(on a multiple-processor computer) a process can run.<br />

protocol The system of rules and procedures that govern communication between<br />

two or more devices. Many varieties of protocols exist, and not all are compatible,<br />

but as long as two devices are using the same protocol, they can exchange data.<br />

Networking software usually implements multiple levels of protocols layered one<br />

on top of another. Windows XP Professional includes TCP/IP- and IPX/SPX-compatible<br />

protocols.<br />

protocol driver The driver responsible for offering four or five basic services to<br />

other layers in the network while “hiding” the details of how the services are actually<br />

implemented. Services performed include session management, datagram service,<br />

data segmentation and sequencing, acknowledgment, and possibly routing<br />

across a wide area network (WAN).<br />

protocol stack A layered set of protocols that work together to provide a set of network<br />

functions.<br />

proxy server A firewall component that manages Internet traffic to and from a local<br />

area network (LAN). The proxy server decides whether it is safe to let a particular<br />

message or file pass through to the organization’s network, provides access control<br />

to the network, and filters and discards requests as specified by the owner—<br />

including requests for unauthorized access to proprietary data. See also firewall.<br />

public data network (PDN) A commercial packet-switching or circuit-switching wide<br />

area network (WAN) service provided by local and long-distance telephone carriers.<br />

public key The nonsecret half of a cryptographic key pair that is used with a public<br />

algorithm. Public keys are typically used to verify digital signatures or decrypt data<br />

that has been encrypted with the corresponding private key.<br />

PVC See permanent virtual circuit (PVC).<br />

PXE See Preboot eXecution Environment (PXE).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!