⟩ Explain Which is the configuration file for init? A. /etc/inittab B. /sys/inittab C. /root/inittab D. /sbin/inittab E. /boot/inittab
A:/etc/inittab
A:/etc/inittab
Explain Which firewall technology allows 2 or more hosts to exchange data over a public network using a securechannel?A. NATB. VPNC. Packet filteringD. IPX/IP gatewayE. Internet object caching
Explain The object class definitions within the schema define what?A. Object placement within the tree.B. The syntax structure of an attributeC. The synchronization rules between replicas.D. The types of objects that can exist in the tree.E. The types of replicas that can exist in the tree.
Explain When setting up NDPS, which objects must be created?A. Manager onlyB. Manager and printer onlyC. Broker and manager onlyD. Broker, manager, and printer onlyE. Broker, manager, gateway, and printer
Tell me When leaf objects can be configured to contain other leaf objects as members or occupants? (Choose two)A. AliasB. GroupC. Organizational UnitD. Security ContainerE. Organizational role
Tell me To set up iPrint, which objects must exist in your eDirectory tree? (Choose three)A. Print queueB. Print serverC. NDPS printerD. NDPS brokerE. NDPS gatewayF. NDPS manager
Suppose You are using the default configuration on your server. To access Web Manager from your workstation, youopen a browser, enter the servers IP address, and then enter which port number?A. 443B. 636C. 2200D. 8008E. 8009
What is a function of the MTA?A. To monitor disk space.B. To store email messages.C. To execute GroupWise client rules.D. To transfer email messages between post offices and other domains.
Tell me Which NetWare directory contains NetWare installation files?A. NIB. ETCC. NSND. LOGINE. SYSTEM
Tell me Which statement is true of a user objects being moved?A. All trustees assignments will have to be re-created.B. If the user is a member of a group, that membership will be retained.C. The context on the client workstation will automatically be changed to reflect the move.D. If the user is an occupant of an organizational role, that occupancy will be lost.E. If a user is security equivalent to another object, the security equivalence will need to be re-established.
Explain Which can you configure by selecting the Custom option when installing the Novell client? (Choose two)A. DHCPB. The default users login name.C. The IP address that the client will use.D. The network protocol for the client to use.E. The type of connection the client should establish NDS or bindery.