Related Questions

You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?
You are the administrator of a SQL Server 2000 computer. You configure SQL Server to perform C2 auditing. Audit logs are saved in the C:MSSQLAudit folder.The server functions normally for several days, but then the MSSQLServer service shuts down without warning. You cannot restart the service.You need to restart the MSSQLServer service. What should you do?
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do?
The question given below consists of a statement, followed by three arguments I, II and III. You have to decide which of the arguments is/are ‘strong’ arguments is/are ‘weak’ arguments and accordingly choose your answer from the alternatives given below each question. Statement: For users, Facebook's revelation of a data breach that gave attackers access to 50 million accounts raises an important question: What happens next? For the owners of the affected accounts, and of another 40 million that Facebook considered at risk, the first order of business may be a simple one: sign back into the app. Facebook logged everyone out of all 90 million accounts in order to reset digital keys the hackers had stolen - keys normally used to keep users logged in, but which could also give outsiders full control of the compromised accounts.  Which of the following points do not capture the negligence of Facebook in the most appropriate manner? Arguments: I. What Facebook knows so far is that hackers got access to the 50 million accounts by exploiting three distinct bugs in Facebook's code that allowed them to steal those digital keys, technically known as ‘access tokens’. The company says it has fixed the bugs.  II. The hack is the latest setback for Facebook during a tumultuous year of security problems and privacy issues . So far, though, none of these issues have significantly shaken the confidence of the company's 2 billion global users.  III. One of the bugs was more than a year old and affected how the ‘View As’ feature interacted with Facebook's video uploading feature for posting ‘happy birthday’ messages. But it wasn't until mid-September that Facebook noticed an uptick in unusual activity, and not until this week that it learned of the attack.