adplus-dvertising
frame-decoration

Question

When of the following is a system default profile used?

a.

When there is no user logged on at the computer

b.

When a user has logged on using the Guest account

c.

When, after the user has logged on, the personal or mandatory profiles are missing or corrupted

d.

When the local accounts database recognizes that the user logging on has never done so from this computer

Posted under Operating System

Answer: (a).When there is no user logged on at the computer

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When of the following is a system default profile used?

Similar Questions

Discover Related MCQs

Q. In UTP Cat 5 wiring, patch cables from the wall outlet to the PC have a distance limitation of

Q. In which of the following cable systems are T connectors and terminators are used?

Q. An ethernet switch works at the protocol layer

Q. You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this?

Q. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

Q. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments

Q. What does the Directory Replicator service allow you to do?

Q. A route is a path between two network segments

Q. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols

Q. Fibre Optic cable is often used to

Q. Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port

Q. You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this?

Q. A cut-through switch reads the entire packet before forwarding it to the destination segment

Q. A Trust Relationship

Q. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?

Q. User Manager for domains

Q. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?

Q. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?

Q. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?

Q. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from