Home / CSE / Windows NT :: Section 2

CSE :: Windows NT

  1. When of the following is a system default profile used?

  2. A.
    When there is no user logged on at the computer
    B.
    When a user has logged on using the Guest account
    C.
    When, after the user has logged on, the personal or mandatory profiles are missing or corrupted
    D.
    When the local accounts database recognizes that the user logging on has never done so from this computer
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. In UTP Cat 5 wiring, patch cables from the wall outlet to the PC have a distance limitation of

  4. A.
    1 meter
    B.
    3 meters
    C.
    6 meters
    D.
    9 meters
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. In which of the following cable systems are T connectors and terminators are used?

  6. A.
    FDDI
    B.
    Token Ring
    C.
    Thin Ethernet
    D.
    lOBase T
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. An ethernet switch works at the protocol layer

  8. A.
    True
    B.
    False

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this?

  10. A.
    Delete the Administrator account
    B.
    Lock out the Administrator account
    C.
    Rename the Administrator account
    D.
    Disable the Administrator account
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

  12. A.
    Make JohnY a member of the DESIGN Domain Guests group
    B.
    Make JohnY a member of the DESIGN Domain Users group
    C.
    Do nothing. JohnY can access the printer now
    D.
    JohnY cannot access the printer with this configuration
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments

  14. A.
    True
    B.
    False

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. What does the Directory Replicator service allow you to do?

  16. A.
    Copy updated user accounts from a primary domain controller to a backup domain controller
    B.
    Copy directories and files from a Windows NT Server computer to a Windows NT Workstation computer that is not a member of a domain
    C.
    Mirror the files on multiple partitions from one Windows NT Server computer to another
    D.
    Copy files from a Windows NT Workstation computer to a Windows NT Server computer
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. A route is a path between two network segments

  18. A.
    True
    B.
    False

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols

  20. A.
    True
    B.
    False.

    View Answer

    Workspace

    Discuss Discuss in Forum