Itne T

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

GROUP 3 QUIZ

C 1. One of the easiest ways to configure a network, often used for home offices and small
businesses.

A. Networking for Home Use


B. Configuring User Accounts
C. Peer-to-peer network
D. Implementing a Virtual Private Network

D 2. Some server-based networks centralize storage on a network in arrays of disk drives


that are shared by users through network servers. This arrangement is called a

A. Virtual Private Network


B. peer-to-peer network
C. Peer-to-Peer Networking for Office Use
D. Storage Area Network

A 3. It is a type of account under the Mac OS X parental controls features that can be
configure that can grants access only to shared resources (files and folders) but not applications.
A. Sharing only
B. Administrator
C. Managed with parental controls
D. Standard

D 4. In Configuring Accounts in UNIX/Linux, users who have common access needs can be
assigned to a group using the .
A. User Identification Number (UID)
B. Computer System Interface (SCI)
C. IP security (IPsec)
D. Group Identification Number (GDI)

B 5. A computer user account could be compared to a what?


A. Windows 7 account
B. Bank account
C. UNIX/Linux account
D. Payroll account
A 6. It is a private network, which is like a private tunnel through a larger network, such as
the Internet, an enterprise network or both, which is restricted to designated member clients
only.
A. Virtual Private Network
B. Peer-to-Peer Network
C. User Identification Number (UID)
D. Internet Small Computer System Interface (iSCSI)

C 7. These are the actions performed with User Accounts tool in Configuring User Accounts
in Windows 7 except one.

A. Delete an account
B. Create an account
C. Transfer an account
D. Modify an account

D 8. In Configuring Accounts in UNIX/Linux, Each UNIX/Linux user account is associated


with the .

A. Group Identification Number (GDI)


B. Computer System Interface (SCI)
C. Internet Small Computer System Interface (iSCSI)
D. User Identification Number (UID)

B 9. This is a protocol in some VPN network that is running inside IPsec for extra security.

A. Computer System Interface (SCI)


B. Layer Two Tunneling Protocol (L2TP)
C. IP security (IPsec)
D. Group Identification Number (GDI)

C 10. These are the accounts that can be created and configure in Mac OS X parental controls
except one.

A. Sharing only
B. Group
C. Modify an account
D. Standard

You might also like