what is quota management?
Answers were Sorted based on User's Feedback
Answer / boby k
Quota management is used to limit hard disk space of a
particular user.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
One can configure quota when a user is created and it is
possible through active directory services.when a user is
created and that user is defined with credentials like
logon locally ,user cannot change password and profiles are
also created like roaming profile and Mandatory profile in
the same manner quota management is also defined for the
user.Quota Management is defined as the HDD space
allocated to a particular user on server for saving
profiles and files and this is possible only if user is
associated with Roaming profile permissions where in
roaming profile what ever changes user makes to desktop
these changes are saved on server where ADS is configured
and these files are visible to system administrator who is
managing server or domain other than user.
Is This Answer Correct ? | 0 Yes | 0 No |
How many reserve ports?
What are the advantages of a layered model in the networking industry?
Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
In port based access-list which command u give instead of ip?
what is the subnet for the host ip address 172.16.210.0/22
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
What is passive topology in ccna?
what is vtp there is three question regatding vpn but i know it is not conserned with that