what is quota management?
Answers were Sorted based on User's Feedback
Answer / boby k
Quota management is used to limit hard disk space of a
particular user.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
One can configure quota when a user is created and it is
possible through active directory services.when a user is
created and that user is defined with credentials like
logon locally ,user cannot change password and profiles are
also created like roaming profile and Mandatory profile in
the same manner quota management is also defined for the
user.Quota Management is defined as the HDD space
allocated to a particular user on server for saving
profiles and files and this is possible only if user is
associated with Roaming profile permissions where in
roaming profile what ever changes user makes to desktop
these changes are saved on server where ADS is configured
and these files are visible to system administrator who is
managing server or domain other than user.
| Is This Answer Correct ? | 0 Yes | 0 No |
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC
what is the diffrence betwwen telnet and ssh.this question is asked by nikhil and i am plasing the answer here insteed of his personal mail.
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
What is loop back ip in ipv6?
Which command displays the intenances using a given access list? A. show filters B. show ip interface C. show active lists D. show interface paramaters E. configure ip access lists F. show access-list interfaces
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899
Identify the 2 methods to modify the routers boot sequence? A.) Setup program B.) Boot system commands C.) RXBoot D.) Config-register
Can you explain static and dynamic tunnels?
What does the "IPX maximum-paths 2" command accomplish? A. It enables load sharing on 2 paths if the paths are equal metric paths. B. It sets up routing to go to network 2. C. It is the default for Cisco IPX load sharing. D. It enables load sharing on 2 paths if the paths are unequal metric paths.
Scenario: You created 2 access-lists for controlling telnet about a year ago, and bound one of them to Serial 0. You can't remember which access-list you used. Which command lets you see all access-lists on Serial 0 for telnet? A.) show access-list B.) show ip int s0 C.) show access-list telnet D.) show telnet access-list E.) show access-list s0 F.) show int s0
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding