Home

Can we delete a folder, which is shared?

A. Yes

B. No

You can do it
  1. The command to create a Win2000 boot disk is
  2. Which of the following is a media type that is most susceptible to interference?
  3. What is the maximum number of characters that a password may contain?
  4. How many Dfs links are supported by a single Dfs root in domain based Dfs root?
  5. A roaming user Profile is stored on a computer's local hard disk.
  6. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  7. User account names are case-sensitive
  8. To use netbios name resolution in TCP/IP environments, we use
  9. Which of the following commands would you use to determine the configuration of your IP settings?
  10. Which policy specifies the number of invalid attempts allowed before account is locked out?
  11. Domain based network allows multiple domain controller in a single domain
  12. Can we delete a folder, which is shared?
  13. The NTFS security is not applicable in case of network access
  14. Profile information is stored in NTprofile.Dat file.
  15. NTFS permissions cannot be set on individual files.
  16. User passwords are case sensitive
  17. Windows 2000 is based on
  18. What is the command to upgrade a Windows 2000 Server to domain controller?
  19. When we delete a file it is sent to the directory called
  20. Which utility should you use to check the IP configuration on a Windows 2000 computer?
  21. We can limit space usage by users by applying disk quota using
  22. What is the maximum amount of RAM recognized by Windows 2000 Server?
  23. You are configuring Outlook Express to download e-mail messages from your Internet service provider.…
  24. In a domain we can create
  25. Which of the following is the IEEE specification for wireless networks?
  26. Can we install multiple local printers using a single printer devise in Win2000 server?
  27. Which command is used to change a FAT32 partition to NTFS without losing any data?
  28. Clipper command can be used for data encryption
  29. ERD can be created using
  30. TCP is a connectionless protocol