Home

TGT and TGS is related to

A. Kerberos policy

B. Disk defragment

C. Dynamic volume

D. Security principle

You can do it
  1. Which utility is used to manage disks, volumes, partitions logical drives and dynamic volumes in Windows…
  2. A roaming user Profile is stored on a computer's local hard disk.
  3. Mirroring represents which RAID level?
  4. Which properties tab is used in a member server for local user to configure logon hours?
  5. Can we use local user and group utility in a domain controller to create local user in it?
  6. What is the maximum amount of RAM recognized by Windows 2000 Server?
  7. TGT and TGS is related to
  8. Can we put computer management utility in desktop?
  9. To use netbios name resolution in TCP/IP environments, we use
  10. Can Win2000 professional become terminal service client?
  11. Linux operating system consumes less space than Windows2000
  12. Which is the port used by HTTPS?
  13. Which file contains active directory database?
  14. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  15. What can be used in the place of DNS to resolve host names to IP addresses?
  16. We can limit space usage by users by applying disk quota using
  17. Which of the following services are not available with the standard version of Win2k Server?
  18. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  19. DHCP is used for Dynamic address allocation for win2000 networking hosts
  20. Which utility should you use to check the IP configuration on a Windows 2000 computer?
  21. Can a global group be created in a member server?
  22. an we use local users and group utility to create user in a member server?
  23. Can Win2000 professional become terminal service client?
  24. Is advance server is the most efficient version of Win2000 Server?
  25. Windows 2000 is based on
  26. User passwords are case sensitive
  27. If you move a file from one folder to another folder between different NTFS volumes, the file will retain…
  28. The NTFS security is not applicable in case of network access
  29. Which of the following is a media type that is most susceptible to interference?
  30. NTFS permissions cannot be set on individual files.