logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows 2000 Server See What Others Are Saying!
  • Question
  • You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?


  • Options
  • A. Install Active Directory on the server
  • B. Select Basic Authentication check box
  • C. Clear the Allow Anonymous Connection check box
  • D. Disable the IUSE_inta user account on Intra
  • E. Clear the Allow IIS to Control Password check box

  • Correct Answer
  • Clear the Allow Anonymous Connection check box 


  • More questions

    • 1. A teleprocessing system may consist of

    • Options
    • A. user systems
    • B. communications systems
    • C. computer center systems
    • D. All of the above
    • E. None of the above
    • Discuss
    • 2. Decision tree uses

    • Options
    • A. pictorial depictation of alternate conditions
    • B. nodes and branches
    • C. consequences of various depicted alternates
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. A popular technique for forecasting is

    • Options
    • A. correlation analysis
    • B. regression analysis
    • C. linear programming
    • D. Monte Carlo
    • E. None of the above
    • Discuss
    • 4. The current gain of a transistor is defined as the ratio of the collector current to the

    • Options
    • A. base current
    • B. emitter current
    • C. supply current
    • D. collector current
    • E. None of the above
    • Discuss
    • 5. Which of the following symbols is (are) not the Data Flow Diagram (DFD):

    • Options
    • A. a square
    • B. an open rectangle
    • C. a circle
    • D. a triangle
    • E. a bubble
    • Discuss
    • 6. What command is used to remove a file?

    • Options
    • A. del
    • B. mv
    • C. rm
    • D. remove
    • E. None of the above
    • Discuss
    • 7. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be

    • Options
    • A. 5
    • B. 10
    • C. 20
    • D. 32
    • E. None of the above
    • Discuss
    • 8. A demultiplexer is also known as

    • Options
    • A. data selector
    • B. data distributor
    • C. multiplexer
    • D. encoder
    • E. None of the above
    • Discuss
    • 9. Which of the following is loaded for CD-ROM support?

    • Options
    • A. VLM.EXE
    • B. CDDEX.EXE
    • C. DOSKEY.EXE
    • D. MSCDEX.EXE
    • Discuss
    • 10. The formula for memory capacity is:

    • Options
    • A. MC = N/2
    • B. MC = 2/N
    • C. MC = N squared.
    • D. MC -2 to the Nth power
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment