Exam 10: Resource Sharing Over a Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

a group of Windows Server 2003/Server 2003 R2 and Server 2008/Server 2008 R2 users that is used to assign access privileges

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

E

Which of the following is NOT an event type that can be set up for logging using Server Admin on Mac OS X Server?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

a number that is assigned to a UNIX/Linux user account

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

H

You are explaining to a colleague how to make a shared resource available on a Linux file system. Which of the following terms best describes what you should tell him?

(Multiple Choice)
4.8/5
(36)

a user work area in which the user stores data on a server and typically has control over whether to enable other users to access his or her data

(Multiple Choice)
4.9/5
(43)

You have just successfully created a user named acoulter on your Red Hat Enterprise Linux system. You left the password blank so the user can easily log on and create her own password. The user calls you and informs you she cannot logon. She has tried several times and has used a blank password but still cannot logon. What is likely to be the problem?

(Multiple Choice)
4.8/5
(39)

a collection of computers and users where policies set for the group apply to all computers and users

(Multiple Choice)
4.8/5
(44)

Which of the following is a valid permission in the Linux file system?

(Multiple Choice)
4.9/5
(26)

It is preferable to assign permissions to individual users rather than groups because the amount of work for the administrator is reduced.

(True/False)
4.9/5
(39)

You administer a medium-size network. You want to make sure your users must change their passwords every 60 days,cannot change their password sooner than five days after the last change and must use 8 unique passwords before re-using a password. What account policies would you set and with what values?

(Essay)
4.9/5
(34)

Describe the difference between mapping a drive and mounting a volume.

(Essay)
4.9/5
(34)

Which of the following is NOT included in the Linux password (/etc/passwd)file?

(Multiple Choice)
4.9/5
(43)

Describe what happens when a shared folder is being access over the network and both sharing and NTFS permissions are set and a conflict exists.

(Short Answer)
4.9/5
(39)

Which of the following password security options enables the server to 'remember' a user's previous passwords?

(Multiple Choice)
4.7/5
(44)

A _________________ service provides a central listing of resources and the ability to access and manage resources.

(Short Answer)
4.9/5
(33)

Global groups are used to hold user accounts while domain local groups are used to hold Global groups and provide access to resources.

(True/False)
4.9/5
(43)

List three important functions provided by a directory service.

(Essay)
4.8/5
(41)

Which of the following permissions should you set on a shared printer in Windows to allow a junior administrator to configure the properties of the printer?

(Multiple Choice)
4.8/5
(35)

To protect user's passwords on a Linux system,they can be kept in a file only available to the system administrator. What is the name of that file?

(Multiple Choice)
4.8/5
(26)

NFS is used by UNIX/Linux systems to mount a shared partition as a drive letter.

(True/False)
4.7/5
(31)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)