Install Microsoft Dynamics GP using the Advanced Configuration and modify the account framework to 36 for the account length and six for the number of segment after installation. C. Install Microsoft Dynamics GP using the Basic Configuration and modify the account framework to 36 for the account length and six for the number of segment after the installation. Answer: B Page 7 of 17 Copyrights © 2007 Selftest Engine, all rights Reserved. A. Alert the system that synchronize has already been run Question No: 32 Updating the Dex.ini file so Synchronize TRUE initiates which task when Microsoft Dynamics GP Utilities is launched?
lab 3 Configuring and Managing the DHCP Server Role Question 1 | What is the name of the computer you are working from? SEA-SVR1 | Question 2 | What is the default lease duration of a Wired subnet type? 6 Days | Question 3 | What are three recommendations listed in Server Manager for managing the DHCP Server role? 1. Increase fault tolerance by splitting DHCP scopes.
a) 255.255.255.128 b) 255.255.255.224 c) 255.255.255.0 d) 255.255.128.0 7. What is equivalent of the decimal number 127 in hexadecimal? a) A7 b) 7F c) 9A d) F2 8. Which of the following Cisco IOS commands copies the current running configuration to a TFTP server? a) write memory b) copy tftp startup-config c) configure terminal d) copy running-config tftp 9.
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? * c. Net view 29. To view eDirectory information on a NetWare 5.1 server, which of the following tools should you use? * d. Novell Client 30. The Nbtstat command is used to enumerate *nix systems.
Do not select the Use BinHex For Macintosh check box. 3. c. .NET password authentication 4. b. Increase the connection time-out value on the front-end POP3 virtual server. 5. c. The Exchange virtual server on a back-end server 6. c. Verify that moved user accounts have POP3 enabled. 7. a.
Everyone, and Authenticated users 8. Under which of the following conditions are Win 7 local user accounts required to use complex passwords? The computer joins a domain 9. Which Win 7
When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? (choose all that apply) a. Administrators b. Users c. Power users d. Guests 3. When you log on to a newly installed Windows 7 computer for the first time, why can you not use the Administrator account?
Answer: Ping.exe 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called __________________. Answer: Nslookup.exe 8. Most networks use __________________ to dynamically assign addresses and configure computers to use them. Answer: Dynamic Host Configuration Protocol (DHCP) 9.
Lab 1 INTRODUCING WINDOWS SERVER 2008 NETWORKING |QUESTION 1 |WHAT THREE CATEGORIES OF TASKS ARE LISTED IN THE ICT INTERFACE? | |Question 2 |What is the current time zone configured for this computer? | |Question 3 |Why does a shield icon appear next to the Change date and time button? | |Question 4 |What is the current name of your computer? | |Question 5 |What name is assigned to your computer?
Matching 1) Multi-factor authentication uses : Passwords plus smartcards 2) These are potentially destructive software: Malware 3) Automated password guessing is known as : Brute force 4) What is the standard for smart card support : PIV 5) Decrypts data encrypted with a certificate: Private Key 6) Standard for fingerprint scanners and other devices: Windows Biometric Framework 7) Windows authorization mechanism: User rights 8) What firewall rule requires IPsec: Authenticated exception 9) This key is stored in a digital certificate: Public key 10) Firewall exceptions are called: Rules Multiple Choice 1) Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? Disable the Store Passwords Using Reversible Encryption policy. 2) Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? Port Numbers 3) Which of the following NTFS features is incompatible with EFS encryption? Compression 4) Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files?