The Remote Desktop Protocol does not carry applicataion data between a terminal server and a client. 7. The terminal server must be a member of the domain is not a requirement for using network level authentication . 8. A client running four RemoteApp application on the desktop is utilizing one session on the terminal server.
Chapter 9 1. IP hosts in two different company TCP/IP networks send IP packets to each other through the Internet. Which of the following is true about the Internet connections that must exist so that the packets can flow between the two companies? a. The two companies must connect directly to each other.
Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):sendmail; Sendmail 5. What tasks must you complete to install SSL on an IIS server? A) Obtain and install a server certificate. B) Create an SSL binding for your Website(s). C) Configure the Website or FTP7 site to use SSL.
True or False? * True 27. To identify the NetBIOS names of systems on the 18.104.22.168 network, which of the following commands do you use? * a. nbtscan 22.214.171.124/24 28. Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?
22. What Mstsc.exe option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps? A. /admin B. /public C. /migrate D. /span Answer: B When using Mstsc.exe, the /public option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps.
Which of the following actions can you NOT perform from the Windows Firewall control panel? (choose all that apply) (C) Create firewall exceptions based on port numbers 6. Which of the following policy modifications would make it harder for intrudes to penetrate user passwords by a brute force attack? (choose all that apply) (A) Increase the value of the Reset Account Login Counter after Policy 7. Connection security rules requires that network traffic allowed through the
c. Implement a front-end and back-end server topology. Configure a single HTTP virtual server on the front end and configure back-end servers with multiple virtual directories. 14. c. Disable support for rich-text formatting. 15. d. System Attendant 16. b. She needs to start the NNTP service manually and then configure it to start automatically 17. a.
Web Browser - software controlled directly by a user that requests web pages from a web server, and after receiving a page, displays the web page in a window. 9. Web Address - Text that identifies details about one object in a network so that a client can request that object from a server. 10. Web Page - In a web browser, all the text, images, video, and sound that fill the window of the browser when the user opens a link to some web address.
Increase fault tolerance by splitting DHCP scopes. 2. Balance the load on your DHCP server by using the 80/20 rule for scopes 3. Allow remote administration of DHCP servers by comfiguring windows Firewall ports. | Question 4 | What is the name of the computer you are working from?