what is quota management?
Answers were Sorted based on User's Feedback
Answer / boby k
Quota management is used to limit hard disk space of a
particular user.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
One can configure quota when a user is created and it is
possible through active directory services.when a user is
created and that user is defined with credentials like
logon locally ,user cannot change password and profiles are
also created like roaming profile and Mandatory profile in
the same manner quota management is also defined for the
user.Quota Management is defined as the HDD space
allocated to a particular user on server for saving
profiles and files and this is possible only if user is
associated with Roaming profile permissions where in
roaming profile what ever changes user makes to desktop
these changes are saved on server where ADS is configured
and these files are visible to system administrator who is
managing server or domain other than user.
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the standard ISDN term for a non-native analog telephone? A.) TE1 B.) TA C.) LE D.) TE2 E.) ET
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
What is subnet? Why is it used?
Which of the following is true regarding standard ISDN BRI service? A.) ISDN BRI B channels are typically 64K. B.) ISDN BRI can handle only voice. C.) ISDN BRI can handle only data. D.) ISDN BRI has 2B and 1D channels. E.) ISDN BRI D channels are 16K. F.) ISDN BRI can handle voice and data.
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
what is full form of rst,smtps & http?
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
what is burst rate
Can you explain static and dynamic tunnels?
Which layer called error detection layer?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet