You want to capture all LDAP traffic to and from a server between 10:00 p.m. and 11:00 a.m. Which of the following actions should you perform? D. Create a scheduled task that runs the NMCap.exe command. 2. Which of the following filters is used with Network Monitor when you want to capture all DHCP packets that pass between a client computer called PC1 (MAC address 00-20-C4-15-22-C1) and a DHCP server called Server1 (MAC address 00-18-31-C3-23-CD and IP address of 192.168.1.1)?
C:\inetpub\wwwroot 3. What device driver converts the print jobs generated by applications into an appropriate string of commands for a specific print device? Printer driver 4. What must you do before you can share a printer on a Windows Server 2008 computer? Enable network discovery 5.
Enables a database application to access specific records in a database file stored on a SAN drive array B. Identifies specific devices in a drive array C. Installed by default in Windows Server 2008 D. Provided with some SAN drive arrays E. Supports copper and fiber optic media F. Requires redundant drives and redundant host adapters G. Fibre Channel topology H. Hard drive installed inside a computer I. Maintains a database of targets and initiators J. Disk array that does not use RAID Multiple Choice: Select one or more correct answers for each of the following questions. 1. Which of the following statements are true of striped volumes?
https://www-01.ibm.com/support/knowledgecenter/ssw_ibm_i_72/rzakz/rzakzpasswordoverview.htm If you know the name of the system value you would like to check, you can display just that value. Go to a command line and enter: DSPSYSVAL QMAXSIGN. What information are you given? The page gives the information about maximum sign on attempts 3. How did the system know which library should be your current library?
Homework Week 2 2. Which layer of the TCP/IP model process request from hosts to make sure a connection is made to the appropriate port? Application Layer 3. What are well-known ports. Ports 1 to 1023 4.
Which answer lists the correct number of bits associated with each term? d.4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) Used for short-term memory; Used to process data 5.
The Properties will show the number of folders and files, etc. 2. Launch the virtual machine in VMware Player. a. From the Start button on your desktop, launch VMWare Player as shown below.
*It could be E, D, or C 20. What values are used when configuring HyperTerminal for connecting to a Cisco router’s console port? *The Serial Port 22. What is the help command in Cisco IOS? *router> help 24.
7. Create a .plan file in your home directory. Does finger display the contents of your .plan file? The which utility
What file servers are OWA clients allowed to connect to? Windows file share and Widows SharePoint Services 6. What must an OWA user select at the OWA logon screen to access file shares? Direct File access 7. What two receive connectors are configured by default on IT260Srv## and what purpose do they serve?