Related Questions
What is the correct answer?
4
ERD can be created using
What is the correct answer?
4
Purge command is used to
A. Recover the deleted files
B. Remove deleted files permanently
What is the correct answer?
4
Clipper command can be used for data encryption
What is the correct answer?
4
Which of the following can be used to create partition
What is the correct answer?
4
What is the maximum number of characters that a password may contain?
What is the correct answer?
4
A roaming user Profile is stored on a computer's local hard disk.
What is the correct answer?
4
Which command is used to change a FAT32 partition to NTFS without losing any data?
What is the correct answer?
4
You are configuring Outlook Express to download e-mail messages from your Internet service provider. Which protocol of the following will you use?
What is the correct answer?
4
Which OSI model layer provides for encryption and decryption of data?
What is the correct answer?
4
What is the minimum information that you need to connect a computer on a TCP/IP network to the Internet? (Select three.)
D. Default gateway address
What is the correct answer?
4
User account names are case-sensitive
What is the correct answer?
4
We can limit space usage by users by applying disk quota using
D. Domain Controller Policy
What is the correct answer?
4
Can we use 'net use' command to share a file?
What is the correct answer?
4
If we want to run Nwadmin from DOS prompt what is the command we use?
What is the correct answer?
4
Which Recovery function is used to reconfigure a service that is preventing your computer from starting properly?
A. Last Known Good Configuration
What is the correct answer?
4
Domain based network allows multiple domain controller in a single domain
What is the correct answer?
4
User passwords are case sensitive
What is the correct answer?
4
10 base T network is implemented by co-axial cable
What is the correct answer?
4
Identify the topology and network type that uses a central hub with cables connected to workstations.
A. Physical star topology, Ethernet
B. Physical bus topology, Ethernet
C. Physical ring topology, token ring
D. Physical ring topology, Ethernet
What is the correct answer?
4
Can Win2000 professional become terminal service client?
What is the correct answer?
4
User passwords are case sensitive
What is the correct answer?
4
Can we use 'net use' command to share a file?
What is the correct answer?
4
he minimum processor speed requirement for a P.C. where Windows2000 server O.S. is to be installed
What is the correct answer?
4
Which of the following services are not available with the standard version of Win2k Server?
What is the correct answer?
4
TGT and TGS is related to
What is the correct answer?
4
Backup operator group is found in
What is the correct answer?
4
The universal groups can contain
What is the correct answer?
4
Which folder is used to store user profiles by default?
A. Boot partition: \winnt\user profiles
B. Boot partition:\documents and settings
C. Boot partition:\winnt\documents and settings
D. Boot partition:\ user profiles
What is the correct answer?
4
The NTFS security is not applicable in case of network access
What is the correct answer?
4
A user name cannot contain : or = character.