In UTP Cat 5 wiring, patch cables from the wall outlet to the PC have a distance limitation of 3 meters 1 meter 9 meters None of these 6 meters TRUE ANSWER : ? YOUR ANSWER : ?
What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification? Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used A token contains information that is used to route messages between rings The station that holds the token is allowed to transmit a message on the network The station that hold the token has the highest priority on the network None of these TRUE ANSWER : ? YOUR ANSWER : ?
You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this? None of these Rename the Administrator account Disable the Administrator account Delete the Administrator account Lock out the Administrator account TRUE ANSWER : ? YOUR ANSWER : ?
A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation? A single domain mode, with all data kept on the controller for the domain None of these A complete trust mode, with each engineer's computer trusting the other engineer's computers A master domain mode, with each engineer trusting the master domain and the data stored on the server A workgroup mode, with each engineer administering his or her own computer TRUE ANSWER : ? YOUR ANSWER : ?
Bridges operate at the MAC layer (layer 2 of the OSI model.) FALSE All network adapters in all computers on the same network must be set to the same IRQ None of these All network adapters in all computers on the same network must be set to different IRQs True TRUE ANSWER : ? YOUR ANSWER : ?
You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose? None of these In the System option in Control Panel, set the user environment variables to allow Maria to log on locally In the System option in Control Panel, select the setting that allows users to log on locally PPP DLC TRUE ANSWER : ? YOUR ANSWER : ?
Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this? None of these Use Performance Monitor to create a log of all logon attempts Use User Manager for Domains to set an Audit policy for all logon attempts Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only Use the Services option in Control Panel to start the Alerter service to audit logon attempts TRUE ANSWER : ? YOUR ANSWER : ?
You are installing a network interface card on a computer with the following configuration: a 5867133 CPU, 16MB or RAM, a 800-MB IDE hard disk, a parallel port configured as LPT1, and a serial port configured as COM1, which is currently used by a mouse. In addition to the IDE host adapter and the video card, the following devices have been installed on the computer's expansion bus: a modem on COM2, a SCSI host adapter for a CD-ROM drive, and a sound card. The SCSI hose adapter is using IRQ 5, and the sound card is using IRQ 11. The network interface card that you are installing supports the following choices for IRQ: 2, 3, 4, 5, 9,10 and 11. Which IRQ(s) could you use for the network interface card without creating an IRQ conflict with another device? None of these 5 4 2 10 TRUE ANSWER : ? YOUR ANSWER : ?
Most routers can also act as bridges Increases broadcast traffic True None of these FALSE resolves computer names to IP addresses TRUE ANSWER : ? YOUR ANSWER : ?
There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer? Make JohnY a member of the DESIGN Domain Guests group Make JohnY a member of the DESIGN Domain Users group JohnY cannot access the printer with this configuration None of these Do nothing. JohnY can access the printer now TRUE ANSWER : ? YOUR ANSWER : ?