You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this? Use the Devices option in Control Panel Use the Add/Remove Programs option in Control Panel Use Server Manager Use Windows NT Diagnostics None of these TRUE ANSWER : ? YOUR ANSWER : ?
You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do? You cannot do this. Home directories can be accessed only by Windows NT computers Start the Replication service on Kim's Windows for Workgroups computer Map a drive on Kim's Windows for Workgroups computer to her home directory on the server Relocate Kim's home directory to her Windows for Workgroups computer TRUE ANSWER : ? YOUR ANSWER : ?
A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation? None of these A single domain mode, with all data kept on the controller for the domain A complete trust mode, with each engineer's computer trusting the other engineer's computers A master domain mode, with each engineer trusting the master domain and the data stored on the server A workgroup mode, with each engineer administering his or her own computer TRUE ANSWER : ? YOUR ANSWER : ?
What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification? The station that hold the token has the highest priority on the network None of these The station that holds the token is allowed to transmit a message on the network Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used A token contains information that is used to route messages between rings TRUE ANSWER : ? YOUR ANSWER : ?
Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols True False. TRUE ANSWER : ? YOUR ANSWER : ?
Dynamic Host Configuration Protocol [DHCP] assigns IP addresses, which when allocated, cannot be reused uses static allocation of IP addresses is the same as bootp None of these helps prevent conflicts between assigned IP addresses TRUE ANSWER : ? YOUR ANSWER : ?
Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships? Establish one-way trust relationships in which PUBS trusts ACE ACE trusts CAD Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts PUBS • Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts ACE Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD None of these TRUE ANSWER : ? YOUR ANSWER : ?
There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer? Make JohnY a member of the DESIGN Domain Guests group Make JohnY a member of the DESIGN Domain Users group JohnY cannot access the printer with this configuration Do nothing. JohnY can access the printer now None of these TRUE ANSWER : ? YOUR ANSWER : ?
Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this? Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only Use the Services option in Control Panel to start the Alerter service to audit logon attempts None of these Use Performance Monitor to create a log of all logon attempts Use User Manager for Domains to set an Audit policy for all logon attempts TRUE ANSWER : ? YOUR ANSWER : ?
The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this? Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users None of these Create a mandatory user profile and lock all the program groups TRUE ANSWER : ? YOUR ANSWER : ?