The most common method for illustrating the operations of a networking stack is the Open Systems Interconnections Reference Model, which consists of Seven layers. 5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called Connectionless Protocols. 6. The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe.
4. A (n) Printer Driver is one file or set of files containing information that Windows XP Professional requires to convert print commands into a specific printer language, such as Post Script. 5. Windows XP Professional printing supports which of the following types of computers? Ans.
Recover Console 9. BranchCache is a client/server application that supports which of the following two operational modes? Distribute cache mode. 10. For stand-alone systems or small networks, Windows 7 includes backup tools that you can use to protect your data.
So the old data will not be sent to the web server 7. What is the result, and what does the result indicate? Internet Explorer cannot display the webpage. The firewall must still be set 8. What other test could you perform to prove that it was your computer’s firewall that was blocking the connection and not the firewall on the computer you are using as a client?
Multiple Choice 1. Which special identity group controls anonymous access to resources in Windows Server 2008? D. Anonymous Logon 2. What defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure? A.
When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? (choose all that apply) a. Administrators b. Users c. Power users d. Guests 3. When you log on to a newly installed Windows 7 computer for the first time, why can you not use the Administrator account?
I) Special Identity- placeholder for a collection of users with similar characteristics 5. C) Authentication- confirmation of a user’s identity 6. H) Elevation Prompt- displayed when an administrator requires administrative access 7. J) Mandatory User Profile- a profile that multiple users can run simultaneously 8. D) Secure Desktop- suppresses the operation of all controls except the UAC prompt 9.
domain controller 1) What is the term used to describe a read-only copy of a user profile stored on a network share? Mandatory Profile 2) When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? ((choose all that apply)) Administrators and Users 3) When you log on to a newly installed Win 7 computer for the first time, why can you not use the administrator account? It is disabled 4) What is true about The User Accounts Control Panel? It can create Local Users Only.
The extent to which the user does not notice that a file is encrypted. BitLocker – a system in window vista by which entire hard drive volumes can be encrypted Trusted Platform Module (TPM) – hardware component used to store cryptographic information, such as encryption keys, and to perform other security duties Certificate autoenrollment – feature of windows server 2003, enterprise edition that automatically uses the existing certificate to sign a renewal request for a new certificate before the existing certificate
Do not select the Use BinHex For Macintosh check box. 3. c. .NET password authentication 4. b. Increase the connection time-out value on the front-end POP3 virtual server. 5. c. The Exchange virtual server on a back-end server 6. c. Verify that moved user accounts have POP3 enabled. 7. a.