Browse by Tags

70-298 Section 6.2 Q&A Bonus Answer
Thursday, August 07, 2008 8:18 AM
When is NTLM preferred over Kerberos, this method is used by many admins to test network connection? Answer : When IP address is used to map a network drive instead of the NetBIOS name. Example \\192.168.1.15\C$ vs \\EnhansoftDC\C$ Read More...
70-298 Section 6.2 Q&A Bonus
Wednesday, August 06, 2008 8:18 AM
When is NTLM preferred over Kerberos, this method is used by many admins to test network connection? Read More...
70-298 Section 6.2 Q&A Answer
Tuesday, August 05, 2008 8:18 AM
What does ktpass.exe do? Answer : ktpass.exe creates key pass files for UNIX workstations used to encrypt ticket requests. Read More...
70-298 Section 6.2 Q&A
Monday, August 04, 2008 8:17 AM
What does ktpass.exe do? Read More...
70-640 Week 10 Q&A
Monday, August 04, 2008 8:14 AM
Match up the IPv6 address types to their corresponding format Types: Global unicast Link-local Loopback Site-local Unspecified Format : :: ::1 All others FE80:: FEC0:: Read More...
70-298 Section 6.1 Q&A Answer
Sunday, August 03, 2008 8:19 AM
Name all six trust types. Answer : No trust **** Personally I don't think this is a trust type but I didn't write this book so... Trusts between Domain in a Forest Shortcut trust External trust External trust with a non-windows kerberos realm forest trust Read More...
Q&As
Saturday, August 02, 2008 12:14 PM
70-298 Well all questions have be pre-posted and September 22nd will be the last Q&A for 70-298 exam. 70-640 I will continue to post the weekly Q&As for 70-640 and the last Q&A will be posted on Oct 17th. Remember that the exam review session are Oct. 20th and 27th and I will be leading those sessions. 70-649 Sometime this LONG weekend, I will start... Read More...
70-298 Section 6.1 Q&A
Saturday, August 02, 2008 8:21 AM
Name all six trust types. Read More...
70-640 Week 9 Q&A Answer
Friday, August 01, 2008 8:36 AM
What are RODC and why are they more secure? Answer : RODC = Read-Only Domain Controllers RODC maintains a small number of cache user accounts and therefore if compromised the affect is limited to those account only. Read More...
70-298 Section 5.3 Q&A Answer
Wednesday, July 30, 2008 8:14 AM
What is the command line for MBSA to use the SUS server instead MS catalog? Answer : Mbsacli /SUS Http://SMSUG_SUS Read More...
70-298 Section 5.3 Q&A
Tuesday, July 29, 2008 8:16 AM
What is the command line for MBSA to use the SUS server instead MS catalog? Read More...
70-640 Week 9 Q&A
Monday, July 28, 2008 8:39 AM
What are RODC and why are they more secure? Read More...
70-298 Section 5.2 Q&A
Sunday, July 27, 2008 8:09 AM
What are the values and their meanings for the registry entry for AUOptions? Read More...
70-298 Section 5.1 Q&A Answer
Saturday, July 26, 2008 8:58 AM
Rank the software updates in order of important's Critical Important Low Moderate Answer : Critical Important Moderate Low Read More...
70-640 Week 8 Q&A Answer
Friday, July 25, 2008 8:14 AM
Which of the following can be deployed via GPSI? Batch file (.Bat) Command File (.Com) Executable (.Exe) Visual Basic Scripting Edition (.Vbs) Windows Installer (.Msi) Windows PowerShell (.Ps1) Windows Software Installation Settings file (.Zap) Answer : Windows Installer (.Msi) Windows Software Installation Settings file (.Zap) Read More...
More Posts Next page »

This Blog

Archives

Syndication