logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows 2000 Server See What Others Are Saying!
  • Question
  • You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?


  • Options
  • A. Move the intranet server to the client segment of the network
  • B. Move the proxy server to the server segment of the network
  • C. Configure each client computer to bypass the proxy server for local addresses
  • D. Configure each client computer to use port 81 for the proxy server
  • E. None of above

  • Correct Answer
  • Configure each client computer to bypass the proxy server for local addresses 


  • More questions

    • 1. A protocol is a set of rules governing a time sequence of events that must take place

    • Options
    • A. between peers
    • B. between modems
    • C. between an interface
    • D. across an interface
    • E. None of the above
    • Discuss
    • 2. The manager attempts to expedite, or speed up, the flow of

    • Options
    • A. machines
    • B. manpower
    • C. material
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. The file created yesterday is called the

    • Options
    • A. "son" file
    • B. "father" file
    • C. "mother" file
    • D. "grandfather file"
    • E. None of the above
    • Discuss
    • 4. The manager, in using the systems approach, should subdivide the firm into subsystems based on

    • Options
    • A. functional areas-marketing, finance, and manufacturing
    • B. management levels-strategic, tactical, and operational
    • C. resource flows-manpower, money, machines, and material
    • D. any of the above represent acceptable subsystem divisions.
    • E. None of the above
    • Discuss
    • 5. Which of the following is the main Apache configuration file?

    • Options
    • A. httpd.conf
    • B. apache.con
    • C. /etc/profile
    • D. system.ini
    • E. None of the above
    • Discuss
    • 6. How can you rebuild the RPM file to include the new patches?

    • Options
    • A. - - recompile
    • B. - - rebuild
    • C. - - generate
    • D. - - execute
    • E. None of the above
    • Discuss
    • 7. Producer consumer problem can be solved using

    • Options
    • A. semaphores
    • B. event counters
    • C. monitors
    • D. all of the above
    • E. None of the above
    • Discuss
    • 8. X.21 is

    • Options
    • A. a method of determining which device has access to the transmission medium at any time
    • B. a method access control technique for multiple-access transmission media
    • C. a very common bit-oriented data link protocol issued by ISO
    • D. network access standard for connecting stations to a circuit-switched network
    • E. None of the above
    • Discuss
    • 9. An ROP would be attached to a

    • Options
    • A. simplex channel
    • B. duplex channel
    • C. half duplex channel
    • D. full duplex channel
    • E. None of the above
    • Discuss
    • 10. With respect to data input, the most accurate description of batch control is

    • Options
    • A. dividing documents to be entered into batches
    • B. controlling the input of each input clerk
    • C. comparing to a pre-calculated figure the total of a data item summed across a batch records put into the system
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment