Home

Clipper command can be used for data encryption

A. True

B. False

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Can Win2000 professional become terminal service client?
  2. 10 base T network is implemented by co-axial cable
  3. User passwords are case sensitive
  4. Identify the topology and network type that uses a central hub with cables connected to workstations.
  5. Is it possible to set net work properties from control panel?
  6. If we want to run Nwadmin from DOS prompt what is the command we use?
  7. The NTFS security is not applicable in case of network access
  8. 10 base T network is implemented by co-axial cable
  9. he minimum processor speed requirement for a P.C. where Windows2000 server O.S. is to be installed
  10. The command to create a Win2000 boot disk is
  11. DHCP is used for Dynamic address allocation for win2000 networking hosts
  12. Windows 2000 is based on
  13. Linux operating system consumes less space than Windows2000
  14. Bootsect.dos file is activated by NTLDR, when we don't choose Win 2000 from the boot option in a dual…
  15. Which of the following commands would you use to determine the configuration of your IP settings?
  16. Which policy specifies the number of invalid attempts allowed before account is locked out?
  17. Which of the following services are not available with the standard version of Win2k Server?
  18. ERD can be created using
  19. The Capture command is used to
  20. The NTFS security is not applicable in case of network access
  21. Which command is used to change a FAT32 partition to NTFS without losing any data?
  22. an we use local users and group utility to create user in a member server?
  23. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  24. Which properties tab is used in a member server for local user to configure logon hours?
  25. Which of the following network topologies has the highest level of redundancy?
  26. Can we use local user and group utility in a domain controller to create local user in it?
  27. If you move a file from one folder to another folder between different NTFS volumes, the file will retain…
  28. Which of the following is a media type that is most susceptible to interference?
  29. Which service is used for assigning IP addresses to the clients dynamically?
  30. Clipper command can be used for data encryption