- Items in the Control Panel are manipulated using what type of policy?
- What is a GPO? GPE?
- List 6 possible {reasonable} responsibilities of a network administrator.
- List 4 password attributes that can be set for a domain.
- What is system auditing?
- How many tcp/ip port numbers are there?
- What are the port numbers assigned to the following: ftp, http, https, smtp, rdp, telnet.
- Who is able to access files protected by EFS?
- What is malware?
.
No comments:
Post a Comment