The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?

TRUE ANSWER : ?
YOUR ANSWER : ?

Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships?

TRUE ANSWER : ?
YOUR ANSWER : ?

You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose?

TRUE ANSWER : ?
YOUR ANSWER : ?

Routers are often used to implement FIREWALLS

TRUE ANSWER : ?
YOUR ANSWER : ?

You need to install network adapters in 20 ISA-bus computers. Which rule must you follow when installing the network adapters?

TRUE ANSWER : ?
YOUR ANSWER : ?

Maria needs to install software on a Windows NT Server computer which is a backup domain controller. When she attempts to log on to the server, she receives the message "Unable to log on locally". What must you do to enable Maria to log on to the server?

TRUE ANSWER : ?
YOUR ANSWER : ?

A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation?

TRUE ANSWER : ?
YOUR ANSWER : ?

Why does a high number of broadcast messages adversely affect overall network performance?

TRUE ANSWER : ?
YOUR ANSWER : ?