Home

Which OSI model layer provides for encryption and decryption of data?

A. Data-link

B. Transport

C. Presentation

D. Application

You can do it
  1. What is the minimum information that you need to connect a computer on a TCP/IP network to the Internet?…
  2. Can we use local user and group utility in a domain controller to create local user in it?
  3. Which command is used to change a FAT32 partition to NTFS without losing any data?
  4. Which utility is used to manage disks, volumes, partitions logical drives and dynamic volumes in Windows…
  5. Which service is used for assigning IP addresses to the clients dynamically?
  6. User passwords are case sensitive
  7. The server where active directory wers can be created create is
  8. Clipper command can be used for data encryption
  9. The command to create a Win2000 boot disk is
  10. Can a global group be created in a member server?
  11. The command to create a Win2000 boot disk is
  12. Can we put computer management utility in desktop?
  13. ERD can be created using
  14. Which folder is used to store user profiles by default?
  15. Which utility is used to determine whether Windows 2000 properly recognize a newly installed modem?
  16. User account names are case-sensitive
  17. The universal groups can contain
  18. Can we use 'net use' command to share a file?
  19. Can a global group be created in a member server?
  20. User passwords are case sensitive
  21. Can we put computer management utility in desktop?
  22. Bootsect.dos file is activated by NTLDR, when we don't choose Win 2000 from the boot option in a dual…
  23. If we want to run Nwadmin from DOS prompt what is the command we use?
  24. User account names are case-sensitive
  25. Which Recovery function is used to reconfigure a service that is preventing your computer from starting…
  26. Which piece of equipment operates at both the data-link and network layers?
  27. Dcproms programs can be run only when the Win2000 is installed in FAT32 partition.
  28. ERD can be created using
  29. If you move a file from one folder to another folder between different NTFS volumes, the file will retain…
  30. Which of the following protocols are considered unreliable or connectionless?