Answer Posted / pawan
We have tools to find out that.
1.RSOP -Resultant set of policy
2.gpresult
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Give some drawbacks of implementing a ring topology?
if one server is down, whenever restart the machine we get ok prompt what is the problem?
Explain the importance of implementing a fault tolerance system? Are there limitations?
Response of switch when we send different vlan data from different port using same mac id.
I am using solaris box, I need to delete a file from path /usr/tmp/ which r older than 24 hours?
how to set kernal parameters in solaris 10&9?
respected sir., i need knowledge, i want to do R.H.E.C but problem is this i am science graduate and a new to software line, i want to develop my carrier in I.t sector. please guide. thanks
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks
Define rsa algorithm?
Unable to connect to local DB
Explain backbone network?
Do you know what is the maximum segment length of a 100base-fx network?
Explain one basic requirement for establishing vlans?
Explain the importance of encryption on a network?
How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?