Clipper command can be used for data encryption

A. True

B. False

You can do it
  1. Can we delete a folder, which is shared?
  2. Can we use 'net use' command to share a file?
  3. 10 base T network is implemented by co-axial cable
  4. Identify the topology and network type that uses a central hub with cables connected to workstations.
  5. Which properties tab is used in a member server for local user to configure logon hours?
  6. TCP is a connectionless protocol
  7. TCP is a connectionless protocol
  8. The default hardware profile that is created when windows 2000 is installed in a machineWinprofileProfileDefproProfile1…
  9. When we delete a file it is sent to the directory called
  10. ERD can be created using
  11. The NTFS security is not applicable in case of network access
  12. Can we use local user and group utility in a domain controller to create local user in it?
  13. What is the distance limitation of Cat5 UTP?
  14. TGT and TGS is related to
  15. Linux operating system consumes less space than Windows2000
  16. Which policy specifies the number of invalid attempts allowed before account is locked out?
  17. The command for starting installation of Win2000 server is
  18. Which of the following protocols are considered unreliable or connectionless?
  19. Which Recovery function is used to reconfigure a service that is preventing your computer from starting…
  20. Windows 2000 is based on
  21. The universal groups can contain
  22. What is the maximum amount of RAM recognized by Windows 2000 Server?
  23. An Administrator account is created when you install the Windows 2000 Server.
  24. Is advance server is the most efficient version of Win2000 Server?
  25. Profile information is stored in NTprofile.Dat file.
  26. An Administrator account is created when you install the Windows 2000 Server.
  27. Can a global group be created in a member server?
  28. What is the maximum number of characters that a password may contain?
  29. Can we put computer management utility in desktop?
  30. Which of the following commands would you use to determine the configuration of your IP settings?