Home
You can do it
  1. Mirroring represents which RAID level?
  2. Which Recovery function is used to reconfigure a service that is preventing your computer from starting…
  3. A user name cannot contain : or = character.
  4. Which of the following is a media type that is most susceptible to interference?
  5. Which is the port used by HTTPS?
  6. Domain based network allows multiple domain controller in a single domain
  7. The Database File Name of Active Directory is:
  8. Which policy specifies the number of invalid attempts allowed before account is locked out?
  9. Which of the following network topologies has the highest level of redundancy?
  10. A user name cannot contain : or = character.
  11. User account names are case-sensitive
  12. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  13. Which of the following is not needed to configure printing in NetWare environment?
  14. Can we use local user and group utility in a domain controller to create local user in it?
  15. The Capture command is used to
  16. Bootsect.dos file is activated by NTLDR, when we don't choose Win 2000 from the boot option in a dual…
  17. What is the maximum number of characters that a password may contain?
  18. 10 base T network is implemented by co-axial cable
  19. Is advance server is the most efficient version of Win2000 Server?
  20. The command to convert a FAT partition into NTFS is
  21. Bootsect.dos file is activated by NTLDR, when we don't choose Win 2000 from the boot option in a dual…
  22. What is the distance limitation of Cat5 UTP?
  23. ERD can be created using
  24. Which of the following commands would you use to determine the configuration of your IP settings?
  25. The NTFS security is not applicable in case of network access
  26. Linux operating system consumes less space than Windows2000
  27. Which utility is used to manage disks, volumes, partitions logical drives and dynamic volumes in Windows…
  28. NTFS permissions cannot be set on individual files.
  29. We can create _____ DFS root in a single Domain Controller
  30. You are configuring Outlook Express to download e-mail messages from your Internet service provider.…