Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use? gateway None of these T connecter router repeater TRUE ANSWER : ? YOUR ANSWER : ?
Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships? Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD None of these Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts ACE Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts PUBS • Establish one-way trust relationships in which PUBS trusts ACE ACE trusts CAD TRUE ANSWER : ? YOUR ANSWER : ?
You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do? Map a drive on Kim's Windows for Workgroups computer to her home directory on the server Relocate Kim's home directory to her Windows for Workgroups computer You cannot do this. Home directories can be accessed only by Windows NT computers Start the Replication service on Kim's Windows for Workgroups computer TRUE ANSWER : ? YOUR ANSWER : ?
In building cabling, horizontal wiring from the telecommunications closet (TC) to the wall outlet has a distance limitation of 90 meters None of these 6 meters 300 meters 3 meters TRUE ANSWER : ? YOUR ANSWER : ?
You are installing a network interface card on a computer with the following configuration: a 5867133 CPU, 16MB or RAM, a 800-MB IDE hard disk, a parallel port configured as LPT1, and a serial port configured as COM1, which is currently used by a mouse. In addition to the IDE host adapter and the video card, the following devices have been installed on the computer's expansion bus: a modem on COM2, a SCSI host adapter for a CD-ROM drive, and a sound card. The SCSI hose adapter is using IRQ 5, and the sound card is using IRQ 11. The network interface card that you are installing supports the following choices for IRQ: 2, 3, 4, 5, 9,10 and 11. Which IRQ(s) could you use for the network interface card without creating an IRQ conflict with another device? 10 None of these 2 5 4 TRUE ANSWER : ? YOUR ANSWER : ?
There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer? Make JohnY a member of the DESIGN Domain Guests group Do nothing. JohnY can access the printer now Make JohnY a member of the DESIGN Domain Users group None of these JohnY cannot access the printer with this configuration TRUE ANSWER : ? YOUR ANSWER : ?
When of the following is a system default profile used? When the local accounts database recognizes that the user logging on has never done so from this computer When there is no user logged on at the computer When a user has logged on using the Guest account None of these When, after the user has logged on, the personal or mandatory profiles are missing or corrupted TRUE ANSWER : ? YOUR ANSWER : ?
Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port Use the Devices option in Control Panel Use the Add/Remove Programs option in Control Panel None of these FALSE True TRUE ANSWER : ? YOUR ANSWER : ?
The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this? Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users Create a mandatory user profile and lock all the program groups None of these Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access TRUE ANSWER : ? YOUR ANSWER : ?