TGT and TGS is related to

A. Kerberos policy

B. Disk defragment

C. Dynamic volume

D. Security principle

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. If we want to run Nwadmin from DOS prompt what is the command we use?
  2. ERD can be created using
  3. A user name cannot contain : or = character.
  4. The minimum processor speed required for the installation of windows 2000
  5. DHCP is used for Dynamic address allocation for win2000 networking hosts
  6. ERD can be created using
  7. Can we use 'net use' command to share a file?
  8. Can we use 'net use' command to share a file?
  9. Purge command is used to
  10. Can we use local users and group utility to create user in a member server?
  11. Which of the following commands would you use to determine the configuration of your IP settings?
  12. Which file contains active directory database?
  13. Profile information is stored in NTprofile.Dat file.
  14. Which OSI model layer provides for encryption and decryption of data?
  15. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  16. An Administrator account is created when you install the Windows 2000 Server.
  17. Which is the port used by HTTPS?
  18. he minimum processor speed requirement for a P.C. where Windows2000 server O.S. is to be installed
  19. What is the distance limitation of Cat5 UTP?
  20. The command to create a Win2000 boot disk is
  21. Which properties tab is used in a member server for local user to configure logon hours?
  22. roaming user Profile is stored on a computer's local hard disk.
  23. What can be used in the place of DNS to resolve host names to IP addresses?
  24. What is the maximum amount of RAM recognized by Windows 2000 Server?
  25. You are configuring Outlook Express to download e-mail messages from your Internet service provider.…
  26. Bootsect.dos file is activated by NTLDR, when we don't choose Win 2000 from the boot option in a dual…
  27. We can limit space usage by users by applying disk quota using
  28. Can we put computer management utility in desktop?
  29. Which folder is used to store user profiles by default?
  30. The NTFS security is not applicable in case of network access