You need to limit what a service can access.You should change the service's:
You need to limit what a service can access.You should change the service's:A . DependenciesB . StatusC . Startup typeD . Logon optionsView AnswerAnswer: D Explanation: Logon options include: * Log on as: No change Use this setting to keep the service's logon credentials as previously configured. * Log on...
Which is an advantage of 64-bit operating systems over 32-bit operating systems?
Which is an advantage of 64-bit operating systems over 32-bit operating systems?A . Larger amounts of accessible RAMB . More device driversC . More compatible applicationsD . Cheaper hardwareView AnswerAnswer: A Explanation: Can access a larger address space.
Distributed File System (DFS) is used to:
Distributed File System (DFS) is used to:A . Delegate permissions to a global distribution group.B . Implement parity.C . Group shared folders from different servers.D . Configure spanned and extended volumes.View AnswerAnswer: C Explanation: Distributed File System (DFS) is a set of client and server services that allow an organization...
Which task is executed during the Power-On Self Test (POST)?
Which task is executed during the Power-On Self Test (POST)?A . The amount of system RAM is detected.B . The Master Boot Record is created.C . The operating system is initialized.D . Disk file systems are detected.View AnswerAnswer: A Explanation: The principal duties of the main BIOS during POST are...
By default, group policies are first applied to networked computers when the:
By default, group policies are first applied to networked computers when the:A . Computer is backed up.B . Computer starts up.C . User accesses a shared drive.D . User runs gpresult.exe.View AnswerAnswer: B
Users report that they are unable to print.You verify that the print spooler service is running.What should you do next?
Users report that they are unable to print.You verify that the print spooler service is running.What should you do next?A . Purge the serviceB . Disable the serviceC . Pause the serviceD . Restart the serviceView AnswerAnswer: D
Which RAID level can consist of two disks and provides redundancy?
Which RAID level can consist of two disks and provides redundancy?A . RAID 0B . RAID 1C . RAID 5D . RAID 10View AnswerAnswer: B
Running a system in safe mode:
Running a system in safe mode:A . protects the system from viruses.B . protects the system from data loss.C . loads a minimum number of drivers.D . prevents unauthorized access.View AnswerAnswer: C
One advantage of application virtualization is:
One advantage of application virtualization is:A . Fewer operating system updates.B . Improved collaboration.C . Reduced network traffic.D . Reduced client administrative overhead.View AnswerAnswer: D Explanation: Virtualization is not just for the Fortune 500 anymore.SMBs are rapidly adopting virtualization and achieving significant benefits in a number of areas.Specifically, SMBs are...
Which file storage system can be used on a Windows Server?
Which file storage system can be used on a Windows Server?A . NFSB . NTFSC . EXT3D . FAT16View AnswerAnswer: B