Which directory service is used in Windows 2000 Server?

A. Active Directory



D. Bindery

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Which of the following IP addresses are used by multicast devices?
  2. This mapping of name to IP address is done by …………………………….
  3. How many layers are there in the OSI model?
  4. Class C network address class supports 65,534 hosts.
  5. The idea of sharing one network address among the multiple physical networks can be done using the following…
  6. Which of the following provides control over multimedia sessions?
  7. Class C network address class supports 65,534 hosts.
  8. Which of the following can support many concurrent B-channel links and one 64 Kbps Dchannel?
  9. Pure ALOHA has a maximum throughput of -----------
  10. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  11. ADSL uses high-speed Internet service phone lines
  12. Which of the following is defined in RFC 4366?
  13. What is the maximum distance of single-mode fiber (SMF)?
  14. Which of the following is required to communicate between two computers?
  15. What layer of the OSI protocol reference model does a bridge operate under?
  16. ARP is defined in RFC _____ and it is a current internet standard, ________
  17. What is the default port for Telnet?
  18. Telnet protocol uses ___________ representation for the function Synchronize.
  19. AppleTalk protocol configures hosts in zones on the network.
  20. In ----------------------- configuration, the switch begins to forward the packet as soon as it is received.…
  21. Which of the following transmission media suffers more from transmission impairment?
  22. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  23. How many 64-Kbps channels are used on an ISDN BRI?
  24. ………………….is a technique of conversion between the representation…
  25. 802.5 project standard defines Token Ring.
  26. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  27. Which of the following algorithms are meant for establishing the paths through the network?
  28. Identify the topology and network type that uses a central hub with cables connected to workstations.
  29. Which of the following protocols is described in RFC 793?
  30. In Secure Electronic Transaction, the description of the purchase and cost is contained in ________…