Home

Which OSI model layer provides for encryption and decryption of data?

A. Data-link

B. Transport

C. Presentation

D. Application

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Backup operator group is found in
  2. Can we use 'net use' command to share a file?
  3. Which of the following can be used to create partition
  4. The server where active directory wers can be created create is
  5. An Administrator account is created when you install the Windows 2000 Server.
  6. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  7. 10 base T network is implemented by co-axial cable
  8. Is advance server is the most efficient version of Win2000 Server?
  9. The minimum processor speed required for the installation of windows 2000
  10. Which of the following network topologies has the highest level of redundancy?
  11. User account names are case-sensitive
  12. Can we install multiple local printers using a single printer devise in Win2000 server?
  13. Which properties tab is used in a member server for local user to configure logon hours?
  14. The command to create a Win2000 boot disk is
  15. Which of the following files have the .NCF file extension?
  16. What is the maximum number of characters that a password may contain?
  17. Clipper command can be used for data encryption
  18. Which of the following utility can be used to create a file share
  19. Can we delete a folder, which is shared?
  20. roaming user Profile is stored on a computer's local hard disk.
  21. Can we put computer management utility in desktop?
  22. User passwords are case sensitive
  23. Bootsect.dos file is activated by NTLDR, when we don't choose Win 2000 from the boot option in a dual…
  24. Can we use 'net use' command to share a file?
  25. How many Dfs links are supported by a single Dfs root in domain based Dfs root?
  26. The Database File Name of Active Directory is:
  27. ERD can be created using
  28. If we want to run Nwadmin from DOS prompt what is the command we use?
  29. We can limit space usage by users by applying disk quota using
  30. Which OSI model layer provides for encryption and decryption of data?