Exam 10: Resource Sharing Over a Network
Exam 1: Operating System Theory50 Questions
Exam 2: Popular Operating Systems50 Questions
Exam 3: Operating System Hardware Components41 Questions
Exam 4: File Systems50 Questions
Exam 5: Installing and Upgrading Operating Systems50 Questions
Exam 6: Configuring Input and Output Devices50 Questions
Exam 7: Using and Configuring Storage Devices50 Questions
Exam 8: Modem and Other Remote Communications Devices50 Questions
Exam 9: Network Connectivity50 Questions
Exam 10: Resource Sharing Over a Network50 Questions
Exam 11: Standard Operating and Maintenance Proceedures50 Questions
Select questions type
a group of Windows Server 2003/Server 2003 R2 and Server 2008/Server
2008 R2 users that is used to assign access privileges
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
E
Which of the following is NOT an event type that can be set up for logging using Server Admin on Mac OS X Server?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
a number that is assigned to a UNIX/Linux user account
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
H
You are explaining to a colleague how to make a shared resource available on a Linux file system. Which of the following terms best describes what you should tell him?
(Multiple Choice)
4.8/5
(36)
a user work area in which the user stores data on a server and typically
has control over whether to enable other users to access his or her data
(Multiple Choice)
4.9/5
(43)
You have just successfully created a user named acoulter on your Red Hat Enterprise Linux system. You left the password blank so the user can easily log on and create her own password. The user calls you and informs you she cannot logon. She has tried several times and has used a blank password but still cannot logon. What is likely to be the problem?
(Multiple Choice)
4.8/5
(39)
a collection of computers and users where policies set for the group apply to all computers and users
(Multiple Choice)
4.8/5
(44)
Which of the following is a valid permission in the Linux file system?
(Multiple Choice)
4.9/5
(26)
It is preferable to assign permissions to individual users rather than groups because the amount of work for the administrator is reduced.
(True/False)
4.9/5
(39)
You administer a medium-size network. You want to make sure your users must change their passwords every 60 days,cannot change their password sooner than five days after the last change and must use 8 unique passwords before re-using a password. What account policies would you set and with what values?
(Essay)
4.9/5
(34)
Describe the difference between mapping a drive and mounting a volume.
(Essay)
4.9/5
(34)
Which of the following is NOT included in the Linux password (/etc/passwd)file?
(Multiple Choice)
4.9/5
(43)
Describe what happens when a shared folder is being access over the network and both sharing and NTFS permissions are set and a conflict exists.
(Short Answer)
4.9/5
(39)
Which of the following password security options enables the server to 'remember' a user's previous passwords?
(Multiple Choice)
4.7/5
(44)
A _________________ service provides a central listing of resources and the ability to access and manage resources.
(Short Answer)
4.9/5
(33)
Global groups are used to hold user accounts while domain local groups are used to hold Global groups and provide access to resources.
(True/False)
4.9/5
(43)
Which of the following permissions should you set on a shared printer in Windows to allow a junior administrator to configure the properties of the printer?
(Multiple Choice)
4.8/5
(35)
To protect user's passwords on a Linux system,they can be kept in a file only available to the system administrator. What is the name of that file?
(Multiple Choice)
4.8/5
(26)
NFS is used by UNIX/Linux systems to mount a shared partition as a drive letter.
(True/False)
4.7/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)