OPS400LAB2 (2.5%) 1. CL COMMANDS You know that the command to display the library list is DSPLIBL. What should you do if you can't remember the command? A. On a command line, enter GO MAJOR and see if you can find a menu route to find and execute DSPLIBL.
G domain controller Multiple Choice 1. What is the term used to describe a read-only copy of a user profile stored on a network share? a. Mandatory profile b. Super-mandatory profile c. Roaming profile d. Search profile 2. When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups?
Your account framework can be: Choose the 2 that apply. Category: B. The login account has domain administrator privileges A. The intended GP user has been set up in SQL prior to the installation C. The ODBC connection to the SQL server is set up D. You have logged onto the workstation with local administrator privileges Answer: D Question No: 19 What should you confirm before beginning the Microsoft Dynamic GP installation on a workstation? Category: Page 6 of 17 Copyrights © 2007 Selftest Engine, all rights Reserved.
11. Click on the Save toolbar button to save your data file. 12. Click on the Check toolbar button to check your solution against the answer key. 13.
How do you access the Backup Or Restore Wizard? Ans. For Accessing the Backup Or Restore Wizard, go to Start Menu( All Programs(Accessories(System Tools and then Click on the Backup. 2. What two operations can you perform using the Backup Or Restore Wizard?
Unit 3, Assignment 1 Anthony Correll January 16, 2015 NT2580 Remote access security policy involves the policies and conditions that are in place that allow users to connect to servers when out of the network. In the case of Richman industries, they are interested in maintaining connections with their users, and sharing app data that is on a server for their day to day operations. In their case, I would have access policy that is based on Explicit Allow policies. This means that the policy grants “Permission” to access the servers remotely if the connection attempt matches the policy conditions. Some of the requirements would include strict control enforced via one-time password authentication or public keys with strong pass-phrases.
D) Secure Desktop- suppresses the operation of all controls except the UAC prompt 9. F) Authorization- grants user a specific degree of access to a resource 10. G) Domain Controller- hosts an AD DS domain Fill in the Blank 1. What is the term used to describe a read-only copy of a user profile stored on a network share? Mandatory Profile 2.
JOHN CROZIER NT1230 CLIENT-SERVER NETWORKING UNIT 3 PROBLEM SET 1 MR T. PIERCE FILL IN THE BLANK 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. Answer: Firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Answer: Network and Sharing Center 3.
c. Implement a front-end and back-end server topology. Configure a single HTTP virtual server on the front end and configure back-end servers with multiple virtual directories. 14. c. Disable support for rich-text formatting. 15. d. System Attendant 16. b. She needs to start the NNTP service manually and then configure it to start automatically 17. a.
Which of the following tools can be used to enumerate Windows systems? (Choose all that apply.) * a. OpenVAS * b. DumpSec * d. Hyena 24. Enumeration of Windows systems can be more difficult if port ____ is filtered. * d. 139/TCP 25.