logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows 2000 Server See What Others Are Saying!
  • Question
  • Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do?


  • Options
  • A. Configure a Group policy for the Domain that blocks all unsigned drivers
  • B. Configure a Group policy for the Default Domain Controller to block all unsigned drivers
  • C. Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers
  • D. Do nothing, this is the default setting
  • E. None of above

  • Correct Answer
  • Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers 


  • More questions

    • 1. Claude Shannon described the operation of electronic switching circuits with a system of mathematical logic called:

    • Options
    • A. LISP
    • B. XLISP
    • C. Boolean algebra
    • D. neural networking
    • E. None of the above
    • Discuss
    • 2. An example of a medium-speed, switched communications service is

    • Options
    • A. Series 1000
    • B. Dataphone 50
    • C. DDD
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. A system design is said to be functionally modular if

    • Options
    • A. the system is able to handle all the function of the application
    • B. each module performs a specific function and can be developed relatively independently by programmers
    • C. the system makes extensive use of function. keys for maximum user assistance
    • D. the system is developed using structured programming through COBOL or PASCAL
    • E. None of the above
    • Discuss
    • 4. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 5. A _____ is responsible for the design and control of a company's data base

    • Options
    • A. DBA
    • B. DBM
    • C. DPMA
    • D. EDP auditor
    • E. None of the above
    • Discuss
    • 6. An audit trail

    • Options
    • A. is used to make back-up copies
    • B. is the recorded history of operations performed on a file
    • C. can be used to restore lost information
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?

    • Options
    • A. chmod go + x, u - x letter
    • B. chmod g - x, uo + r letter
    • C. chmod go + r, u + x letter
    • D. chmod u - x, go + r letter
    • E. None of the above
    • Discuss
    • 8. The speed at which the monitor accepts data is called:

    • Options
    • A. bandwidth
    • B. response time
    • C. interlacing
    • D. scanning
    • E. None of the above
    • Discuss
    • 9. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?

    • Options
    • A. Upgradability
    • B. Upward mobility
    • C. Universality
    • D. Upward compatibility
    • E. None of the above
    • Discuss
    • 10. Which of the following rules out the use of GO TO?

    • Options
    • A. Flowchart
    • B. HIPO-DIAGRAMS
    • C. Nassi-Shneiderman diagram
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment