Which of the following NTFS features is incompatible with EFS encryption? (A) Compression 4. Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files? (B) /noprofile 5. Which of the following actions can you NOT perform from the Windows Firewall control panel?
How do you access the Backup Or Restore Wizard? Ans. For Accessing the Backup Or Restore Wizard, go to Start Menu( All Programs(Accessories(System Tools and then Click on the Backup. 2. What two operations can you perform using the Backup Or Restore Wizard?
P. 641 1. What is the difference between the scp and sftp utilities? a. SCP only allows file transfers b. SFTP has more features such as directory listings, and resuming downloads. 3. How would you use scp to copy your ~/.bashrc file from bravo to the local system?
Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? D. The binary equivalent of decimal 123456789. 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? D. An actuator arm 9.
D. The binary equivalent to 123456789 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? A.An actuator arm 9. Which of the following are some of the important features supplies by files as defined by a computer OS? (Choose three answers.)A.
| Automated attendant (AA) / Interactive Voice response (IVR) | Is the system where there is an automated menu so that the calls can be directed to the correct extensions without the intervention of a person. | Call barring | Restricts certain types of outgoing and incoming calls. Examples of this would be to stop international calls being made or stop undesirable callers being received. | Call Holding | Allows you place the call on hold whilst you complete a task, for instance finding the callers details, documents to complete query or speak to another colleague about the query or who the caller wishes to speak to. | Call logging | This is deemed as a security feature.
b. Which filesystem stores your home directory? c. Assuming your answer to exercise 4a is two or more, attempt to create a hard link to a file on another filesystem. What error message do you get? What happens when you attempt to create a symbolic link to the file instead?
8. Which of the following is not a feature of a file system that might be used with a hard disk drive? ix. A: An actuator arm. 9.
For example, instead of directly calling a system I/O routine, a thread calls an application-level I/O jacket routine. Within this jacket routine is code that checks to determine if the I/O device is busy. If it is, the thread enters the Blocked state and passes control (through the threads library) to another thread. When this thread later is given control again, the jacket routine checks the I/O device
| Question 4 | What is the name of the computer you are working from? SEA-SVR2 | Question 5 | What IP addressing settings are currently configured?10.10.0.12 | Question 6 | Is the computer currently configured for DHCP? How can you tell? Yes, DHCP enabled and it received an ip address of 10.10.0.20 | Question 7 | What is the IP address of the DHCP server from which W2K8yy has obtained its IP address? DHCP Server 10.10.0.11 | Question 8 | If the answer to #7 was not the IP address of the SEA-SVR1 computer, why might this have happened?