Home

Which OSI model layer provides for encryption and decryption of data?

A. Data-link

B. Transport

C. Presentation

D. Application

You can do it
  1. Which utility is used to manage disks, volumes, partitions logical drives and dynamic volumes in Windows…
  2. User account names are case-sensitive
  3. Can we install multiple local printers using a single printer devise in Win2000 server?
  4. Which of the following protocols are considered unreliable or connectionless?
  5. Profile information is stored in NTprofile.Dat file.
  6. Which of the following services are not available with the standard version of Win2k Server?
  7. DCPromo is Run to
  8. Which piece of equipment operates at both the data-link and network layers?
  9. A user name cannot contain : or = character.
  10. What is the distance limitation of Cat5 UTP?
  11. When we delete a file it is sent to the directory called
  12. Which OSI model layer provides for encryption and decryption of data?
  13. Which utility is used to manage disks, volumes, partitions logical drives and dynamic volumes in Windows…
  14. The NTFS security is not applicable in case of network access
  15. The NTFS security is not applicable in case of network access
  16. Domain based network allows multiple domain controller in a single domain
  17. The minimum processor speed required for the installation of windows 2000
  18. The command to create a Win2000 boot disk is
  19. DHCP is used for Dynamic address allocation for win2000 networking hosts
  20. Which utility should you use to check the IP configuration on a Windows 2000 computer?
  21. Identify the topology and network type that uses a central hub with cables connected to workstations.
  22. In a domain we can create
  23. The server where active directory wers can be created create is
  24. Can we put computer management utility in desktop?
  25. We can create _____ DFS root in a single Domain Controller
  26. Linux operating system consumes less space than Windows2000
  27. NTFS permissions cannot be set on individual files.
  28. Which version of Win2k Server can support 64 GB of memory and up to 16 processors?
  29. We can limit space usage by users by applying disk quota using
  30. TCP is a connectionless protocol