Term
In the Domain model, centralize servers that control the network resources, users account, and security settings for the client computers and other servers on the network are called? |
|
Definition
|
|
Term
What log might be used to audit events related to resources use, such as creating,opening ,or deleting files or other users? |
|
Definition
|
|
Term
What is a collection of messages posted by individuals to a news server |
|
Definition
|
|
Term
A peer to peer network is also called a? |
|
Definition
|
|
Term
Newgroups that are managed by someone who reviews the submission prior to posting and might answer questions are called what? |
|
Definition
|
|
Term
In Microsoft Office 2003,the research task pane is accessed by clicking the ________ menu? |
|
Definition
|
|
Term
You can quickly access diaplay settings by right-clicking on the desktop and choosing what? |
|
Definition
|
|
Term
The option to "turn-on" ClearType is found on the _____________ tab of the display properties dialog box. |
|
Definition
|
|
Term
In My Documents, what menu contains the option to display the Folder Options dialog box? |
|
Definition
|
|
Term
What consists of records maintained for the user of a computer system that contains the user's personalization settings ? |
|
Definition
|
|
Term
You can see file types in Windows Explorer by selecting details from what menu? |
|
Definition
|
|
Term
When your user attempts to access resources across the network,a network login is required. In this case the___________on the user's computer wii attempt to present his or hers credentials to the __________ on the server. |
|
Definition
Local Security Authority(LSA) |
|
|
Term
What is the default control set |
|
Definition
|
|
Term
During the services load phase,the kernal starts_______________which reads the entries that are stored in the Registry key |
|
Definition
|
|
Term
Until a user successfully logs on,the boot process is not complete until the __________ control set is copied to the Last Known Good Configuration |
|
Definition
|
|
Term
What icon in the Security Update Scan results section of the MBSA report is used to identify a warning message |
|
Definition
|
|
Term
SUS works by allowing your organization to set up a virtual _____________that can be used collect and provide the updates in a timely manner |
|
Definition
|
|
Term
Prior to release,service packs undergo what kind of testing? |
|
Definition
|
|
Term
What dialog box can be used to maintain your computer's privacy and safety when sharing demographic with a website. |
|
Definition
|
|
Term
By design ,privacy settings work only what security zone? |
|
Definition
|
|
Term
In Outlook Express,the Account option is found on what menu? |
|
Definition
|
|
Term
What componets of Windows XP Professional allows a Windows XP computer to access resources on NetWare servers version 2.x,3.x,and 4.x |
|
Definition
Client Server for NetWare(CSNW) |
|
|
Term
A network object's location in the NDS tree is called what? |
|
Definition
|
|
Term
On networks where NetWare servers outnumber Windows servers ,or where clients need native NDS or NetWare aware applications support,its sensible to use the ________________? |
|
Definition
|
|
Term
All applications threads within a WOW VDM are _____________multitasked |
|
Definition
|
|
Term
A Windows Installer _____________is nothing more than a complete set of software installations and configuration instructions |
|
Definition
|
|
Term
If Windows finds potential DLL Version conflicts,it automatically makes the registry modifications necessary to point to alternate versions of DLLand other shared objects in a special directory named what? |
|
Definition
%systemroot%\WINDOWS\WinSxS |
|
|
Term
What key contains profiles for all users who have ever logged onto this system and the default user profile? |
|
Definition
|
|
Term
What is the name of the primary Registry editing tool? |
|
Definition
|
|
Term
What should be your first step when making Registry changes? |
|
Definition
Back up all important data |
|
|
Term
What is the name for NetWare datastore introduced in version1 |
|
Definition
|
|
Term
The ___________componet of Windows XP Professional allows A Windows XP computer to access resources on NetWare servers version 2.x,3.x,and 4.x |
|
Definition
Client Server for NetWare (CSNW) |
|
|
Term
What are two IPC interfaces included in Windows XP for file system access? |
|
Definition
|
|
Term
Should you need to connect a Windows XP Professional computer to a bindery-base NetWare server,you must use the________________configuration options available in the client service foe NetWare applet |
|
Definition
|
|
Term
PPP Multilink is based on IETF standard |
|
Definition
|
|
Term
What company developed L2TP? |
|
Definition
|
|
Term
What is a multipurpose management interface where both standard LAN networking links and remote access links are established and configured? |
|
Definition
|
|
Term
The primary control panel applet for managing remote access devices and operations is? |
|
Definition
|
|
Term
___________is also known as a flash drive |
|
Definition
|
|
Term
Know the difference between CD-R,CD-RW,DVD-R |
|
Definition
CD-R onlyrecordable,CD-RW is rewriteable,DVD-R only Recordable |
|
|
Term
A desktop computer that makes use of network resources is a |
|
Definition
|
|
Term
In networking a ______________ is a computer that provides network resources to other computers and their users |
|
Definition
|
|
Term
With NTFS,the maximum individual file size is what? |
|
Definition
|
|
Term
By default ,files that are stored in the My Documents folders are at what level of simple file sharing |
|
Definition
|
|
Term
The option of making personel folders private is available only when the drive is formatted with_____________ |
|
Definition
|
|
Term
Files shared at __________of simple file sharing are available both to users who log on locally and to remote users from the network? |
|
Definition
|
|
Term
For the NTFS permissions, Read, Write, and Modify combine a what permission |
|
Definition
|
|
Term
What information should you never give a NON-IT co-worker |
|
Definition
Network administrator access |
|
|
Term
What is the best way to calm an apprehensive customer? |
|
Definition
Speak in a calm tone of voice,appeearing concerned about his or her issue |
|
|
Term
Which of these pieces of information can be disposed of frequently without consideration |
|
Definition
|
|