Question
a.
Make JohnY a member of the DESIGN Domain Guests group
b.
Make JohnY a member of the DESIGN Domain Users group
c.
Do nothing. JohnY can access the printer now
d.
JohnY cannot access the printer with this configuration
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the...
Similar Questions
Discover Related MCQs
Q. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments
View solution
Q. What does the Directory Replicator service allow you to do?
View solution
Q. A route is a path between two network segments
View solution
Q. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols
View solution
Q. Fibre Optic cable is often used to
View solution
Q. Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port
View solution
Q. You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this?
View solution
Q. A cut-through switch reads the entire packet before forwarding it to the destination segment
View solution
Q. A Trust Relationship
View solution
Q. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?
View solution
Q. User Manager for domains
View solution
Q. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?
View solution
Q. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?
View solution
Q. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?
View solution
Q. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from
View solution
Q. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports
View solution
Q. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?
View solution
Q. Server Manager
View solution
Q. Bridges introduce small delays into a network.
View solution
Q. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!