Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? * c. Net view 29. To view eDirectory information on a NetWare 5.1 server, which of the following tools should you use? * d. Novell Client 30. The Nbtstat command is used to enumerate *nix systems.
NT1210 Research Paper From what I gathered about “Layer 2 switches” is that the Layer 2 switches use a MAC address from a host NIC card. This makes it to decide where to “forward frames”. Also Layer 2 is a hardware-based control. It uses “application-specific integrated circuits”, which provides “wire speed, high speed, low latency”. OIS layer 7 packets are called “layer 4-7 switches” these are like content switches, content service switches and web switches or application switches… Content switches are normally used for “load balancing” among server groups like on TCP/IP.
Unit 10: Troubleshooting and Networks Learning Objective Explain the client-server and peer-to-peer network models. Describe the six-step troubleshooting process. Key Concepts Using a troubleshooting process Operation of the Internet TCP/IP protocols Reading Pearson Certification Team, Chapter 10: Troubleshooting and Chapter 11: Networks Keywords Use the following keywords to search for additional materials to support your work: * Electrostatic discharge Windows recovery environment Recovery console System restore Blue screen errors Client Server Peer-to-peer Modem ISDN Broadband Internet DSL LAN TCP/IP HTTP/HTTPS SSL HTML FTP Telnet DNS Port Email UTP Fiber-optic cable IP address IPCONFIG Ping Quiz 10 1. When two bodies of different charges come together, you get a. ARC b. grounded c. ESD d. static buildup 2. What is the last step of the troubleshooting process?
4. A (n) Printer Driver is one file or set of files containing information that Windows XP Professional requires to convert print commands into a specific printer language, such as Post Script. 5. Windows XP Professional printing supports which of the following types of computers? Ans.
A client running four RemoteApp application on the desktop is utilizing one session on the terminal server. 9. For users to access a Windows Server 2008 terminal server, you must be a member of the Remote desktop Users group. 10. The Remote Desktop Protocol is based on ITU T.120.
A local application is a program such as a word processor or a spread sheet that is stored on a local computer and runs only on that local computer. A network application is one that is designed to run over a network such as the internet, or a small or large network of connected computers, it has two components one that runs on the local computer and one that runs on a network computer such as email. 4. [pic] 5. List the six common types of computers available.
Increase fault tolerance by splitting DHCP scopes. 2. Balance the load on your DHCP server by using the 80/20 rule for scopes 3. Allow remote administration of DHCP servers by comfiguring windows Firewall ports. | Question 4 | What is the name of the computer you are working from?
[a] P146 _______ 6. Use this option to configure GPO settings for a particular user based on the location in Active Directory of the user's computer. [h] P150 _______ 7. This option will allow you to configure separate local GPOs for administrators and non-administrators on a Windows Vista computer. [j] P141 _______ 8.
6. (TCO 3) What type of RAM do most motherboards use today? RIMM Rambus SAMM DIMM 7. (TCO 3) To help secure a computer, you can set a startup or “power-on” password so that the startup BIOS will ask for the password during the boot process. This password is stored in _______.
Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Locate an example of each of these types of firewalls and compare their features.