logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows 2000 Server See What Others Are Saying!
  • Question
  • You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?


  • Options
  • A. Apply a less restrictive custom security template to DC1
  • B. Apply a less restrictive custom policy to Windows NT domain controller
  • C. Ensure the Windows 2000 domain is configured in the mixed mode
  • D. Ensure the Windows 2000 domain is configured to run in the native mode
  • E. None of above

  • Correct Answer
  • Apply a less restrictive custom security template to DC1 


  • More questions

    • 1. In which of the storage placement strategies a program is placed in the smallest available hole in the main memory?

    • Options
    • A. best fit
    • B. first fit
    • C. worst fit
    • D. buddy
    • E. None of the above
    • Discuss
    • 2. When executed from a bootable hard drive, which command will make a formatted floppy disk bootable?

    • Options
    • A. COPY C:\DOS\COMMAND.COM A:\
    • B. ATTRIB C:\*.SYS A:\
    • C. XCOPY C:\DOS\*.* A:\
    • D. SYS C: A:
    • E. None of the above
    • Discuss
    • 3. Who invented the first junction transistor?

    • Options
    • A. Smith
    • B. Gomes
    • C. Fisher
    • D. Shockley
    • E. None of the above
    • Discuss
    • 4. Changes made periodically to a system, after its implementation, is known as system

    • Options
    • A. analysis
    • B. design
    • C. development
    • D. maintenance
    • E. none of the above
    • Discuss
    • 5. Which of the following NIS clients returns the name of the NIS server used by the NIS client?

    • Options
    • A. ypwhich
    • B. ypbind
    • C. ypcat
    • D. yppoll
    • E. None of the above
    • Discuss
    • 6. Slack is the calculated time span within which the event must occur:

    • Options
    • A. true
    • B. false
    • C. cannot be said
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. The online hotel reservation systems having database capabilities are a good example of

    • Options
    • A. database management system (DBMS)
    • B. marketing information system
    • C. manual information system
    • D. managerial information system.
    • E. None of the above
    • Discuss
    • 8. The macro processor must perform

    • Options
    • A. recognize macro definitions and macro calls
    • B. save the macro definitions
    • C. expand macro calls and substitute arguments
    • D. All of the above
    • Discuss
    • 9. The advantage of a command processor running only built-in commands is:

    • Options
    • A. flexibility to the users in running lists of commands by simply collecting them in named batch command files
    • B. the command set being common across different hardware configurations
    • C. users can create system programs and run them as commands
    • D. the processing is much faster than would other-wise be the case when user defined commands are used
    • E. None of the above
    • Discuss
    • 10. A drum timer is a good example of:

    • Options
    • A. an output actuator
    • B. an input sensor
    • C. a position sensor
    • D. a sequence controller
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment