| |
[ Home ] [ Electronic Book ] [ Exams and Simulations ] [ Interactive Self Study ]
Chapter 1 Self Test
What does RISC stand for?
- Reduced Information
Source Code
- Reduced
Instruction Source Code
- Reduced Instruction Set Computing
- Reduced
Information Set Computing
- Windows NT is written in the ______________ language.
- _________
applications use conventions such as case-sensitive naming and hard links.
- What does TCP/IP stand for?
- Transport Control
Protocol/Internet Protocol
- Transmission
Controlled Protocol/Internet Protocol
- Transport
Compatible Protocol/Internet Protocol
Transmission Control
Protocol/Internet Protocol
- (True/False) DLC is the protocol used for communicating with
DEC Pathworks networks.
- What is the fastest network protocol supported by
NT?
- DLC
- NetBEUI
- TCP/IP
- NWLink
- I have one DOS application
running, and a suite of five 16-bit applications running. One of the 16-bit applications
continually crashes when I use the DOS application. What is the best way to keep this from
happening?
- Run the DOS application in its
own VDM.
- Run all of the 16-bit
applications in a separate memory space.
- Run the faulty application
with a higher priority than the other 16-bit applications.
- Run the faulty
application in a separate memory space.
- Windows NT Workstation
provides support for up to ______
processors.
- (True/False) If you share a file that is on a FAT partition over the network, the
file cannot be seen by non-NTFS-compatible operating systems.
- NT uses a process called _________ to translate the calls from one
subsystem to another.
- Which is not a component of the Windows NT
Executive?
- Process Manager
- Security
Reference Monitor
- Process Scheduler
- Object
Manager
- (True/False) Environment subsystems are run
in User Mode.
- Kernel mode is also commonly referred to as _________________.
- _____________
is the term used to describe the process of moving paging files to and from the disk as
needed.
- How many inbound client connections does NT
Workstation support?
- 1
- 5
- 10
- Unlimited
- How many
RAS connections does NT Workstation support? How many does NT
Server support?
- I have a network of 4 computers with very
inexperienced users. Which model (workgroup or domain) would be the better choice for my
network, and why?
- Workgroup
model, because you have fewer than ten users.
- Workgroup
model, because you do not have a server to act as domain controller.
- Domain model, because you have very
inexperienced users.
- Domain
model, because you can expand to include more computers in the future.
- What is the
lowest level of the Windows NT operating system architecture?
Chapter 2 Self Test
- Holden wants to upgrade his workstation to Windows NT 4.0
Workstation. What choices does he have?
- Windows 3.1
- Windows 95
- Windows NT 3.51
- OS/2
- Phoebes boss wants her to install
Windows NT 4.0 Workstation onto some legacy hardware. What choices does she have?
- 386/20, 48MB of RAM,
2.3GB hard disk
- 486/33, 16MB of RAM, 1.0GB
hard disk
- 200 Pentium Pro, 64MB of
RAM, 4.5GB hard disk
- 486 /100, 8MB
of RAM, 3.0GB hard disk
- Nuala Anne wants to verify that all
of the hardware that she is going to use for Windows NT workstation is compatible. How
should she verify the hardware?
- Call the hardware
vendor.
- Check the Hardware
Compatibility List.
- Ask her
Network Administrator.
- Doesnt
matter, Windows NT is compatible with everything.
- To partition your hard disk you
use the _________.EXE utility.
- Ken accidentally lost his three setup floppies for
installing Windows NT 4.0 Workstation. What command-line utility can he use to re-create
them?
- WINNT.EXE /NO
- WINNT.EXE /B
- WINNT.EXE /U
- WINNT.EXE /OX
- Dermot is doing top-secret work and
wants to take advantage of Windows NTs security model. He is using a Pentium II 266,
4.3GB hard disk with 64MB of RAM. What file system should he use?
- HPFS
- NFS
- NTFS
- FAT
- Danielle needs to install Windows NT
4.0 from the network from an MS-DOS workstation client and does not need to create
floppies. What setup utility should she use?
- WINNT32.EXE /B
- WINNT32.EXE
/OX
- WINNT.EXE /B
- WINNT.EXE /U
- Michael was instructed to come up with
a plan to implement unattended installations throughout his companys enterprise-wide
network. He also needs to pre-install applications and set up machine-specific parameters
such as computer names and IP addresses. What files does Michael need to use?
- Windiff.exe
- SYSDIFF.EXE
- UNATTEND.TXT
- Unique Database Files
- Your company has just purchased
four new Hewlett-Packard printers for your network. TCP/IP is already installed on your
network yet you cannot connect to the printers. What protocol must be installed to talk to
the HP printers?
- IPX/SPX
- AppleTalk
- DLC
- Point-to-Point
Tunneling Protocol
- You accidentally edited the
Registry of your computer. After you restart your computer, Windows NT will not load. What
will help you restore your system?
- Emergency Repair Disk
- RESTORE.EXE
- SYSDIFF.EXE
- Windows NT
4.0 Server CD-ROM
- While installing Windows NT
4.0 Workstation, you encounter errors during installation of your network card. You still
want to install a network device to continue the installation. What option should you
pick?
- 3COM EtherLink III
- 56k modem
- MS Loopback Adapter
- Arcnet
adapter
- What command lets you change the
boot loader on your hard disk from Windows NT to Microsoft DOS?
- ROLLBACK.EXE
- SYS.EXE
- DELTREE.EXE
- RESTORE.EXE
- Holly is upgrading a previous
installation of Windows NT Workstation 3.51 to Windows NT Workstation 4.0. She already has
the three Windows NT setup floppies. What version of the Windows NT setup utility can she
use?
- WINNT.EXE /B
- WINNT32.EXE
/OX
- WINNT32.EXE
- WINNT.EXE /U
- What are the benefits for using NTFS
partitions on your Windows NT 4.0 Workstation?
- Adapts to Windows NT
security model.
- Compatible with UNIX
workstations.
- Fault
tolerant.
- Best for hard
disks over 500MB.
Chapter 3 Self Test
- You want to change the size of the
paging file. Where do you go to do this?
- The Virtual memory
button in the Performance tab of System Properties.
- The
Performance button of the Virtual Memory tab in System Properties.
- The Change button on the
Performance tab in System Properties.
- The Set
button on the Virtual Memory tab in System Properties.
- What utility lets me search the
Registry for the value of "AutoAdminLogon"?
- REGEDT32.
- REGEDT.
- REGEDIT.
- You cannot
search for values in the Registry.
- Which file does the
Startup/Shutdown tab modify in System Properties?
- BOOTUP.INI
- BOOT.INI
- BOOT.CFG
- START.INI
- What is the recommended paging file
size for a computer with 32MB of RAM?
- 40MB
- 42MB
- 44MB
- 48MB
- Where would you place a shortcut
so that it appears on all users desktops?
- Winnt\All
users\Desktop
- Winnt\Profiles\All
users\Desktop
- Winnt\Profiles\Desktop\All
users
- Winnt\All
users\Profiles\Desktop
- The paging file is actually a
file called ____________, and is located in the
root directory of the drive you specified in the Virtual Memory dialog box.
- Which tab of the System Properties dialog box
shows how much RAM is installed in a computer?
- General
- Performance
- Memory
- Environment
- 17 is a higher priority thread than 23.
- True
- False
- On the main Services screen, which
button do you click to configure a service to start up automatically on bootup?
- Disabled
- Manual
- Startup
- Automatic
- The
_________ tab of the SCSI adapters dialog box is where you add and remove drivers for
the devices.
- Which is the only valid Registry key?
- HKEY_CLASS_ROOT
- HKEY_CLASSES_USER
- HKEY_CLASSES_ROOT
- HKEY_CLASS_USER
- The Advanced option of the Ports
icon in the Control Panel lets you adjust the baud rate, parity, and flow control.
- True
- False
- Which option is not available
from the UPS Configuration dialog box?
- Remote UPS Shutdown.
- Power
failure signal.
- Send Administrative
Alert.
- Execute
Command File.
- Low
battery signal at least two minutes before shutdown.
- Which is not a subkey of
HKEY_LOCAL_MACHINE?
- Software
- Classes
- SAM
- Hardware
- Which menu would you select
to find a key or value in REGEDIT?
- Tools
- File
- Find
- Edit
- Which subkey of
HKEY_LOCAL_MACHINE holds the CurrentControlSet key?
- Hardware
- SAM
- System
- Software
- You click the Install/Uninstall
tab to remove components of Windows NT.
- True
- False
- Location, calling cards, and
area code are examples of __________ settings.
- The
____________ adapter can be used if you want to configure network settings but do not
have an adapter in your system
- Where is the SCSI Investigator found on the
Windows NT Workstation CD-ROM?
- TOOLS\SCSI
- SUPPORT\TOOLS\SCSI
- SCSITOOL
- SUPPORT\SCSITOOL
- From which Control Panel icon do
you configure a MIDI adapter?
- Devices
- Multimedia
- Sounds
- Adapters
- The entry in the BOOT.INI file to
disable serial mouse detection on COM1 is
_______________ .
- _____________
communication uses stop and start bits appended to each byte of information.
- The
________ tab is where you change the display driver.
- Which is not an available button on the
Server Service main dialog box?
- Sessions
- Alerts
- In Use
- Users
- What is not an option in
the Advanced Ports dialog box?
- Base I/O
- COM port
- Flow Control
- FIFO
enabled
- UPS stands for ________________ .
- Which portion of the HKEY_LOCAL_MACHINE key is
grayed out to avoid tampering?
- The SAM key.
- The
Special key.
- The Security key.
- None is
grayed out.
Chapter 4 Self Test
1. (True/False)
The Administrator account can be deleted.
2. The ________ default
account must be enabled before it can be used.
3. To assign permissions to a large number of users, the
user accounts should be placed into a _______.
4. Which groups do you need to be a member of to share a
directory on your computer? Choose two.
5. Which user accounts are created
by default when Windows NT is installed?
6. The _________________ administrative tool is used to
manage all user and group accounts.
7. You want your users to be able to share their own
printers, but you don't want to grant them full access to the computer. Which built-in
group should you make your users members of?
8. Bob is retiring from your
company. Linda, a new employee, is taking over Bob's position. You want Linda's user
account to have the same rights and permissions as Bob's user account. How do you do this
with the least amount of administrative effort, while maintaining security?
9. If a user creates a file on
the computer, then that user is a member of the
____________ special group for that file.
10. (True/False)
Users that access the computer over the network are members of the Interactive special
group.
11. Members of which built-in group can take ownership of a
file or folder?
12. When you copy a user account,
what information is not transferred to the new account?
13.
(True/False) If an account is accidentally deleted, it can be restored by creating a
new account with the same name and description.
14. Which Administrative Tool can be used to view the
security log?
15. You believe that someone may be
trying to get unauthorized access to your computer. How can you verify this?
D.) Disable all accounts except the Administrator
account.
Chapter 5 Self Test
1. Which of the following is
an acceptable FAT filename?
2. What will be the FAT alias
for this long filename:
Notes from March meeting concerning X.400.txt
3. What will be the FAT alias
for this long directory name:
Current.proposal.34
4. What will be the
outcome if I move a file called FINANCE.TXT, which is not compressed, to a
compressed folder on a different partition on my only hard disk?
5. What will be the outcome
if I move the file C:\job duties\Friday.txt, which is compressed, to the C:\monthly
duties\ directory, on the same computer, which is not compressed?
6. I have a Pentium 133
with 64MB of RAM and a 2GB hard disk that is partitioned into several 200MB partitions. I
need to choose a file system that supports long filenames and has the capability to track
file updates by viewing their timestamps. Which file system should I use?
7. I am using a 486/33 with
16MB of RAM and a 540MB hard disk. The hard disk is divided into two equal partitions. I
need to restrict access to a certain directory on the computer from other users who may
log on. Which file system should I use?
8. I am upgrading an NT
3.51 computer that has the HPFS file system installed. What is the best way to convert the
file system to FAT?
9. What is the only way
to convert a partition from NTFS to FAT?
10. Fill in the blank.
NT uses the _______________ feature that
uses a transaction log to keep track of whether writes to the disk have been completed or
not.
11. What is the most effective usage of space?
12. (True/False) If you lose one of the members of a
volume set, you only lose the data that was contained on that drive.
13. What is the total size of a stripe set created from the
following free regions of space: 200MB, 450MB, 150MB, 235MB, and 180MB?
14. I want the fastest
performance from my configuration, but I do not require fault tolerance. What should I
use?
15. (True/False) When you try to format a section of
free space, you are prompted to create a partition before you format.
16. (True/False).
A drive can have as many as four extended partitions.
17. Fill in the blank.
The utility used to compress files and directories from the command line is _________.
18. What menu option would you choose in Disk Administrator
to format a volume?
19. What would be the result
if I issued this command to convert my FAT J: drive to NTFS?
J:\>CONVERT J: /fs:ntfs
20. (True/False) MFT stands for Master Format Table.
Chapter 6 Self Test
- The _______________ creates security access tokens,
authenticates users, and manages the local security policy.
A) Local Security Authority
B) SAM
C) ACL
D) ACE
- What maintains the database of
all user, group, and workstation accounts?
A) Local Security
Authority
B) SAM
C) ACL
D)
HKEY_LOCAL_MACHINE
- NT supports which of the following
logons? (Choose all that apply)
A) local
B) pass-through
authentication
C) remote
D) domain
- Why must you press
Ctrl-Alt-Del to logon to NT?
A) reboot the system to refresh the memory
B) reboot the system
to clear the security logs
C) prevent trojan horse viruses
D) erase the last
username from the logon dialog box
- Which of the following is an
object? (Choose all that apply)
A) file
B) window
C) process
D) keyboard
- A __________ is used to uniquely identify
each user account.
A) SID
B) GUID
C) Group ID
D) ACL
- If you delete a user account,
how can you get it back?
A) You
cant undelete an account. You must create a new account.
B) Choose undelete
from the file menu.
C) Run the command
ACCOUNT /UNDELETE.
D) Use the recycle
bin.
- A program always runs in the
_______________ of the user.
A) subject
B) security context
C) real mode
D) protected mode
- User JesseS belongs to the local
group Marketing. The permissions on the file DICTIONARY.DOC are as follows: JesseS has
Change(RWXD) permission and the Marketing group has No Access permissions. When user
JesseS tries to read the file, what access will he be granted?
A) Change
B) Read
C) Read and Execute
D) No Access
- Which ACE does NT process first?
A) AccessAllowed
B) ReadControl
C) WriteDenied
D) AccessDenied
- User MaryS is assigned to the local
group Sales. Mary has Read permissions for all files on your system. The group Sales has
special permissions of Write on all the files in the folder called Reports. If Mary
requests Read and Write permissions at the same time, what will happen?
A) Access will be denied,
since she doesnt have enough access in any individual group.
B) Access
cant be resolved.
C) Access will be granted.
D) Access will be
granted, but an administrator must approve it first.
- If you want to limit the
people who can access your system when they log on locally, how must your hard disk
partition be formatted?
A)
NTFS
B) FAT
C) HPFS
D) CDFS
- Why is there a special utility to
secure the boot partition of RISC computers?
A) RISC computers
cant be physically secured, so the partition requires extra protection.
B) RISC computers
are more secure than Intel-based computers, because they can access more security
subsystems.
C) RISC systems must boot on a FAT
partition.
D) Microsoft just
hasnt compiled the utility to other systems yet.
- What command allows the user to
change file permissions from a command shell?
A) NET PERMISSIONS
B) SET FILE
C) CACLS
D) ACE
- If you want to audit access
to files stored on your NTFS-formatted hard disk, what must you do first?
A) Turn Auditing on in User
Manager.
B) Turn Auditing on
for the folder by using Explorer.
C) Do nothing. NT
automatically audits all file access once NTFS is installed.
D) Use the program
Security Manager to enable Auditing.
- What does transaction logging
provide for NTFS?
A) Auditing of file access
B) Remote access to
your system
C) Network
connections made to your computer
D) Recoverability
- Who is the owner of a new
file on a FAT partition?
A) Administrator
B) System
C) Whoever created
the file
D) FAT doesnt support
Owners.
- Who is the owner of a new
file on an NTFS partition?
A) Administrator
B) System
C) Whoever created the file
D) FAT doesnt
support Owners
- (True/False) Only administrators can give someone ownership of a file.
- When moving a folder from drive C: to drive D:, what
permissions will the folder have? (Both drives are formatted with NTFS.)
A) The folder will keep
its original permissions.
B) The folder will inherit
the permissions of drive D:
C) NTFS will reset
the folder to Everyone Full Control.
D) NTFS
doesnt support permissions between drives.
- Which file systems support
share-level security?
A) FAT
B) NTFS
C) CDFS
D) All of the above
- Which one is NOT a type of
share permission on an NTFS partition?
A) Read
B) No Access
C) Full Control
D) Special Access
E) None of the
above
- How can you share a folder
on the network to allow everyone to read, write, and execute files, but not delete any
files?
A)
You cant.
B) Give everyone
group Change share permissions.
C) Give everyone
group Read, Write, and Execute share permissions.
D) Give everyone
group Change share permissions and Read, Write, Execute Special File permissions on NTFS.
- Which of the following
are negative results from auditing all file object accesses on your system? (Choose
all that apply)
A)
Slows your computers processor down
B) Creates more disk access
C) Fills your security log
up too fast
D) None of the
above
- What must be turned on to
allow you to audit writes to your NTFS directories?
A) Logon and Logoff
B) File and Object Access
C) Use of User
Rights
D) Process Tracking
- User RyanB is given share-level
access of Full Control to share SalesRPT. However, the NTFS permissions are set to Read
for the group Sales. RyanB is a member of the group Sales. When she connects to the share
SalesRPT, what type of access will she have?
A) Full Control
B) Read
C) No Access
D) None of the
above
Chapter 7 Self Test
1. Which of the following are
advantages to implementing the redirector as a file system driver? (Choose all that apply)
2. Which layer of the OSI
model does the NDIS layer of the Microsoft Networking model operate?
3. Which layer is
between the TDI and the NDIS layers?
4. What does the TDI layer
provide?
5. What is the
importance of the NDIS interface layer?
6. What does the
multiple UNC provider (MUP) do?
7. Which protocol could you
use if you had two separate physical subnets connected by a router? (Choose all that
apply)
8. Which protocol would
you choose if you had a LAN with only 5 workstations and 1 server connected on a single
physical subnet?
9. Which protocol is used
mainly as a gateway protocol?
10. You want to connect
two remote sites with a router, but don't want to waste time configuring a protocol. Which
protocol should you choose?
11. You want to create
a share on your workstation, but don't want it to be visible when users browse the
network. How can you do this?
12. Which type of IPC is used
when your computer broadcasts that it is joining a workgroup?
13. Your workstation has
NetBEUI, NWLink, and TCP/IP installed on it. You notice that every time you browse the
network, your computer takes a long time to display the available computer's list. Your
friend doesn't experience any noticeable delay when browsing the network. What should you
do to fix the problem? (Choose all that apply)
14. You have several folders
shared on the network from your workstation. How can you check to see which folders have
connections to them?
15. Which service allows
your computer to be seen on the network?
16. You are developing
a NetBIOS-compliant naming standard for your organization. You plan to use the following
format: CityName-Bldg#-Rm#-FirstName. The cities where your network is installed
are Dallas, Los Angeles, New York, and Orlando. Building numbers are all four digits and
room numbers are all three digits. No one's first name is over ten characters in length.
Will this work?
Chapter 8 Self Test
1. Which is not a layer of
the TCP/IP architecture?
2. The ___________ layer of the TCP/IP model provides
frame sequencing and error detection.
3. Which is the connection-oriented protocol that ensures
data will arrive in the correct order?
4. Which is a valid IP address?
5. What would be a correct
default gateway for your computer if your IP address is 106.23.86.211?
6. Which is not an option
under the Advanced TCP/IP Properties tab?
7. What do you need
access to if you are to resolve a name of mcsehopeful.com?
8. You are network administrator
of a small network. Even though you have a WINS server on the network for name resolution,
you still maintain the HOSTS files for each workstation. What would happen if you could
not communicate with the WINS server?
9. What does DHCP stand for?
10. (True/False)
A default gateway must always be present before you can communicate.
11. Which is not a tab on the WWW Service Properties dialog
box?
12. Which tab in the Internet
Service Manager do you use to specify what access a user has?
13. (True/False) Windows NT Challenge/Response is the
most effective way to eliminate stolen passwords.
14. Which tab of the FTP Service would you specify UNIX or
MS-DOS listing?
15. You are administrator of a
branch office for the Guitars Galore corporation. Youve been having communication
problems with headquarters, and now theres a support representative from the
corporate headquarters on the phone. He tells you to issue the IPCONFIG /ALL command. You
do so, and tell him the current settings. He tells you he knows what the problem is. Based
on this TCP/IP configuration, which line is incorrect?
Ethernet adapter El90x2:
16. (True/False) The LMHOSTS file is used to map host
names to IP addresses.
17. (True/False)
Windows NT Workstation supports Routing Information Protocol (RIP) for dynamic routing
updates.
Chapter 9 Self Test
1. (True/False)
Installing CSNW and NWLink is a difficult, time-consuming process that will require
significant training for support personnel.
2. The ___________
protocol and the ___________ network service are the two components necessary for
Windows NT to connect to NetWare servers for file and print services.
3. (True/False)
Windows NT Workstation users will not be able to use long filenames when saving files to
NetWare servers.
4. Which Windows NT command displays information regarding
the IPX frame type in use?
- IPXCFG
- NET CONFIG
- IPXROUTE CONFIG
- NET IPXCFG
5. (True/False)
CSNW is a useful component of Windows NT Workstation and a Windows NT certified
professional can reasonably expect to work with it during his or her career.
6. What frame type does Windows NT use if it cannot detect
the frame type in use on the network?
- Ethernet 802.2
- Ethernet 802.3
- Ethernet SNAP
- Ethernet II
7. NetWare uses the ______ protocol for network file sharing and the
_________ protocol for network transport.
8. (True/False)
Changing the Ethernet frame type by editing the Registry is a good idea.
9. (True/False)
With Novells NDS, it is necessary to log on to each server you wish to use.
10. When installing CSNW, when is the first opportunity to
configure the preferred server or NDS tree?
11. (True/False) NWLink cannot be removed from the
Windows NT client, even if the NetWare server to which it is connecting is using TCP/IP.
12. By default, what network and print providers does
Windows NT access first after CSNW is installed?
13.
(True/False) CSNW will allow Windows NT users to log on to NetWare 4.x servers only if
the servers are running bindery emulation.
14. (True/False)
NetWare servers are accessible through a Windows NT Server running GSNW only to Windows
3.x and Windows 95 clients. Windows NT Workstation users must have CSNW and NWLink
installed on their computers to access NetWare servers.
15. When considering protocols and frame types to use,
which guideline listed below results in the best network performance?
- Use as many protocols and frame types as possible
- Use
at least one frame type for each protocol in use
- Use only one protocol and one frame
type
- The
number of protocols and frame types in use does not affect network performance.
- (True/False) Windows NT Workstation users will find that using files and printers on
NetWare servers is very similar to using files and printers on Windows NT servers.
Chapter 10 Self Test
1. Which network protocols can Windows NT 4.0 PPP carry?
2. How many simultaneous dial-in
clients can Windows NT 4.0 Workstation handle?
3. Your remote users are
complaining that their applications run slowly over their RAS connections at home. What
feature of Windows NT 4.0 RAS would allow you to increase the users throughput?
4. You want to make sure that the
throughput for dial-up users is maximized, by enabling compression. What represents the
fastest configuration for achieving this goal?
5. (True/False)
Before network protocols can be loaded on RAS interfaces, they must first be bound to the
LAN adapter, in order for the NT 4.0 Workstation to operate as a RAS server.
6. Which of these pairs of RAS interfaces could be used in
a PPP-MP configuration to increase your bandwidth?
7. Dial-Out network protocols are
configured from the:
8. TAPI 2.0 has programming
facilities to:
9.
(True/False) NetBEUI can be used to provide connectivity from TCP/IP and IPX- based
hosts to NetBEUI-based clients that dial-up to a RAS server configured as a NetBIOS
gateway.
10. The My Locations section of the dialing properties can
keep track of which location-specific information?
11. Which of the following methods
would you use to test a dial-up connection?
12. You need to dial-up a
UNIX host, and accessing the host with PPP isnt working. What other connection
protocol might work?
13. You want to program your RAS
connection to dial-up your ISP after you load your browser. Which NT RAS feature enables
you to do this?
14. While downloading a file from
your NT network, the modem line unexpectedly drops. You dial-up back to the server and
file copy resumes once you connect. Which feature enabled this?
15. You want to make sure that your
communications are secure over the RAS link you're using. What constitutes the most secure
connection type available over RAS?
Chapter 11 Self Test
- Sally, Bob, and Ed are engineers
using computers running Windows NT Workstation. They occasionally like to share files with
each other, and the files are too big to fit on a floppy, but they dont want just
anyone to be able to access the files. What is the best solution to their problem?
- Buy another
computer, install Windows NT Server, and have them all join the domain. Then, set up a
shared directory on the new server for the files.
- Buy them all larger
removable drives, and let them swap them around the office.
- Use a software
compression program to pack the files on floppies.
- Set up accounts for all three of them
on each workstation, and set up shares for the files with these accounts.
- Tell them to use
whatever workstation has the files they need.
- A workgroup consists of a Windows
NT Server, a Windows NT Workstation, a Windows 95 system, and a Windows for Workgroups
system. The Windows NT Workstation has MaintainServerList set to Yes and Preferred Master
Browser set. Each of the others has default browser settings, and all are using the same
network protocol. Which of the following is true:
- The Windows NT Server will be the
Master Browser, and the Windows NT Workstation will be the Backup Browser.
- The Windows NT
Workstation will be the Master Browser, and the Windows NT Server will be the Backup
Browser.
- The Windows for
Workgroups system will be the Master Browser, and the other systems will be Backup
Browsers.
- Each system will
browse for itself, because theyre running different operating systems.
- None of the above,
because you cant have a Windows NT Server in a workgroup.
- A system shows up in the Network
Neighborhood, but the user is unable to connect to its resources as he has in the past.
Which of the following are good hypotheses to troubleshoot the problem:
- The user just
thought he was able to connect to the resources in the past. Ignore him.
- The system is actually down, but
hasnt been down long enough to be removed from the browse list as yet.
- It must be a problem
with user security access to the resource.
- The target system is in the same
workgroup, and the user has changed his password recently.
- The target system is
in the same domain, and the user has changed his password recently.
- A user has just changed his
password while logged into the domain on one workstation. He logs out and immediately goes
to another workstation in the domain and cant get logged in. Which of the following
might be true:
- Caps Lock might be in a different
state.
- Hes trying his old password,
thinking he hasnt changed it on this workstation yet.
- The current workstation happened
to authenticate from the Backup Domain Controller, and it hasnt been updated yet.
- Hes not allowed to log on at
that workstation.
- This workstation was
down when the password change was made.
- Ted, Jill, and Janet are users
on Windows NT Workstations belonging to a domain. They always log on to the domain at
their workstations. They have administrator access to their workstations, but arent
domain administrators. Theyd like to share files on their workstations with each
other using group access, with the ability to make changes themselves (without a domain
administrator). Which option is the best:
- Each one should set
up workstation accounts for the others, just as they would in a workgroup, and add them to
a local group.
- Each one should create a
local group on their workstation, and add the domain usernames of all of them to the
group.
- One of them should
create a global group on their workstation, letting the others use it.
- One of them should
create a global group on a member server, letting the others use it.
- What they want to do
cant be done without the aid of a domain administrator.
- Which of the following
give a computer preference in browser elections?
- Being a Backup
Domain Controller
- Being a Primary Domain Controller
- Running Windows Internet Naming
Service
- Currently the Master Browser
- MaintainServerList
is Auto
- Which of the following are true
statements about workgroup and domain membership?
- A workstation can be
a member of both a workgroup and a domain
- A user logging on to a domain has
only one username and password to remember
- A system running Windows NT Server
may be a member of a workgroup
- A system running Windows NT Server
is required for domain creation
- If you give a workstation a
workgroup name that matches an existing domain, it will browse with that domain without
being a domain member.
- David is a domain administrator
running Windows NT Workstation at his desk. Which of the following are true statements:
- David can log on to the domain
and have administrator access to his workstation.
- David can log on to the domain
and have administrator access to the domain.
- David must have a
roaming profile to log on to another workstation.
- David enjoys the
power he wields over other users, who are subject to his every whim.
- David is always the
Master Browser.
- Jane wants her Windows NT
Workstation to join the domain. She has selected Domain and typed in the correct name in
the Identification Changes window. What can she do:
- If shes a domain
administrator, she can check the box Create a Computer Account in the Domain and enter her
username and password and click OK to join.
- Even if shes
not an administrator, she could do as in answer A, as long as shes the current
logged on user.
- She can contact a domain
administrator to add her node name in Server Manager before clicking OK to join.
- She can have a domain
administrator come to her workstation and enter his own username and password as in answer
A.
- Since Windows NT
Workstations must select their workgroup or domain at installation, she can't join the
domain without reinstalling.
- Twenty-five users running
Windows NT Workstations in a workgroup wish to share resources. Whats their best
solution?
- Set up accounts for
everyone on each workstation.
- Invest in a Windows
NT Server and add it to the workgroup. Place all the resources on the server.
- Invest in a Windows NT Server
and create a domain, adding all the workstations to the domain. Any resources may be moved
to the server if desired.
- Same as answer A,
but publish and maintain a list of usernames and passwords, so that each user can keep his
own workstations account information for all users synchronized with the rest.
- Invest in a Windows
NT Server and create a domain. Have each workstation join its own individual workgroup, so
that no two are in the same group.
- The Marketing domain spans
multiple subnetworks on a routed network. The PDC server becomes unavailable due to
hardware problems, but you have a couple of BDCs. After a while, users report problems
seeing other nodes on the network. What happened, and how do you fix the problem?
- Since the PDC must
be the Master Browser for the domain, there is none now, and other nodes are unreachable.
Wait for a BDC to automatically be promoted to PDC.
- Since the PDC was the domain
Master Browser, each subnetworks Master Browser only sees computers on its
subnetwork. Promote a BDC to PDC, so that it will become a new domain Master Browser.
- Since a domain
requires a PDC to run, quickly promote your workstation to be a new PDC for the domain.
Disappearing nodes are the least of your problems!
- The problem is
temporary, and will go away once a browser election is held and a new domain Master
Browser is elected.
- Since the PDC was
both domain Master Browser and Master Browser for its subnetwork, browsing cant
continue in the domain until you replace the server with another.
- Ned and Lonnie work different
shifts at the rock quarry. They use the same Windows NT Workstation, which is a member of
a domain. Which of the following could be true for Ned to log on to the workstation:
- Ned has a local account
on the workstation.
- Ned has a domain
account in the workstations domain.
- Ned has a domain
account in a domain trusted by the workstations domain.
- Ned has a domain
account in a domain that trusts the workstations domain.
- Ned has a local
account on a workstation that this workstation trusts.
- Neds shift has
been changed, and he now works with Lonnie. There are now two Windows NT Workstations
that either may log on to, with identical software setups. Whats the best way to
preserve their desktops for both computers?
- Have an
administrator copy their last used profile over to the other workstation every day.
- Use the same
mandatory profile for everyone, so the desktop is consistent everywhere without tracking
changes.
- Set up roaming profiles for Ned
and Lonnie.
- Assign each his own
workstation, and tell them to log on only to the one to which theyre assigned.
- Tell them if they
cant agree on a desktop, theyre going back to busting rock!
- Earnest has an account in each
of the two domains, Seeming and Being. Earnest is a domain administrator in Being, but
just a normal user in Seeming. Domain Seeming trusts Being, and also has added
Being\Domain Admins to the local Administrators group on the PDC for Seeming. If
Earnest wants to log on to the PDC for Seeming to administer it, what must he do?
- He cant do
anything; hes just a user in the Seeming domain.
- He can log on to
the Seeming PDC using his Seeming account, then switch to an administrative user.
- He can log on to
the Being PDC using his Being account and set his environment to the Seeming PDC.
- He can log on to
the Seeming PDC using his Being account.
- He can log on to
the Being PDC using his Seeming account.
- Youre looking
at the Network Neighborhood for your domain. You see systems listed for which you know
you havent set up a computer account in the domain, and they dont appear in
Server Manager. Which of the following could explain the situation?
- The systems arent Windows
NT Workstations or Servers, and have been configured to participate in the domain.
- The systems used your domain
name as their workgroup name.
- Someone added the
Windows NT Workstations or Servers by checking Create a Computer Account in the Domain
instead of using Server Manager
- The Master Browser
for your domain is on the same subnetwork as the Master Browser for their domain.
- Your domain
didnt have any potential browsers after your PDC crashed, so the other systems were
added to make browsing possible.
Chapter 12 Self Test
- What are two advantages of
the EMF data type?
A) It requires less bandwidth to print over the network.
B) It returns control of
the application to the user more quickly.
C) EMF files can be
printed on any printer.
D) EMF files are in
PSCRIPT1 format.
- What are the two types of
print processors shipped with NT?
A) Windows Print Processor
(WINPRINT.DLL)
B) PostScript Print
Processor (PSCRIPT1.DLL)
C) Macintosh Print Processor
(SFMPSPRT)
D) UNIX Print
Processor (LPD)
- If you want to add an HP
JetDirect networked printer to your computer, what two things must you do?
A) Install DLC protocol on your
computer.
B) Configure the
DLC protocol address on the printer.
C) Print a test page to get the MAC
address of the JetDirect Card.
D) Install
AppleTalk on your computer.
- You shared an HP LaserJet 5 on
your system for everyone in your department to use. When users try to connect to the
printer using Windows 95, they get the following error: "The server on which the
printer resides does not have a suitable driver installed. Click OK if you wish to select
a driver to use on your local machine." What should you do to prevent users from
receiving this error message?
A) Share the
printer on an NT Server, because Workstation can't provide the correct drivers.
B) Give them the
proper access permissions.
C) Install an appropriate Windows 95
print driver on your workstation.
D) Change the
default data type to RAW.
- (True/False) A local printer must have a port on your system.
- You want to set up a printer pool using two printers.
Neither printing device can use a common driver. How can you enable both printing devices
to be in a printer pool?
A) You can set up a
printer for each printing device, then add a third printer to manage the two independent
printers.
B) Install DLC
protocol to bridge the printing drivers.
C) Add both
printing devices to the Ports Property page and check Enable Printer Pooling.
D) You can't, because they have to
share a common driver.
- Your boss needs to print to his
secretary's printer, but he doesn't want to wait for his print job behind anybody else's
print job. How can you share the printer, giving your boss a higher priority?
A) Share the printer and
give him full control of the printer
B) Set the printer
to print directly to the printer.
C) Create two printers. On
one printer give your boss permissions to print, and set the priority to 99. On the second
printer give everyone else permissions to print and set the priority to 1.
D) Create one
printer, but share it out twice. On one share give your boss permissions to print, and on
the other share give everyone permissions to print.
- User JamieS sent a print
job to an NT Workstation acting as a print server. When she went to the printer to pick up
her print job, she noticed a 200-page report was printing out. She didn't want to wait for
her print job, so she printed her document on a different printer. JamieS is
environmentally conscious, so she doesn't want to waste paper printing the first print
job. How can she delete her first print job? (Choose the best answer)
A) Double-click the Printer icon and select
her print job, then press the Delete button.
B) She should tell
the administrator to delete the print job for her.
C) There is nothing
she can do.
D) She should turn
off the printer as soon as the 200-page report finishes printing.
- To what group must a user be added
before he can manage other people's print jobs? (Choose all that apply)
A) Administrators
B) Creator Owner
C) Power Users
D) Users
- Drive C: has 10MB of available
disk space on it. Drive D: has 300MB of disk space available. Windows NT is installed on
Drive C:, which is almost out of space. Sometimes when you print, your computer locks up
and you have to restart your system. What should you do to prevent this problem in the
future?
A)
Use Disk Administrator to combine the two drives as one logical drive.
B) Use Explorer
and move your WINNT directory to the D: drive.
C) Move the printer spooler to
the D: drive.
D) Move the print
monitor to the D: drive.
Chapter 13 Self Test
- Which facility is used when
environment subsystems need to communicate?
- Process-passing
- Thread-passing
- Message-passing
- Procedure-passing
- What does CSRSS provide?
- Security for the
subsystems
- Logon
Authentication
- Translation
for the subsystems
- Error handling for the
subsystems
- What component is responsible
for keeping track of the time that threads are being processed?
- Thread Manager
- Process Manager
- The Kernel
- Object
Manager
- (True/False) The Security Reference Monitor works with the CSRSS and Object
Manager subsystem to make up the entire Security model for the system.
- Which priority class is considered IDLE?
- Priority level 4
- Priority
level 6
- Priority
level 7
- Priority
level 9
- Fill in the blanks.
Both the
_________________ and the __________________ ran in User Mode in the Win32 subsystem
in previous releases of NT, but now have been moved into the Windows NT Executive, which
runs in Kernel Mode.
- Which is not a component of the Virtual DOS Machine?
- NTDOS.SYS
- NTVDM.DLL
- REDIR.SYS
- NTIO.SYS
- (True/False). If there is no PIF associated for the application, the DEFAULT.PIF
is used.
- I have a DOS application and three Win16
applications running on the system. When I switch from the DOS application to one of the
Win16 applications, they are all unresponsive. What is the best way to remedy this
situation?
- Run each one of the
Win16 applications at the priority level of HIGH, so they do not become unresponsive.
- Run the
DOS application at the priority level of LOW, so that it does not consume too many
resources.
- Run each of the Win16
applications in its own memory space, so they do not interfere with each other.
- Increase
the priority level of the NTVDM in which all of the Win16 applications are running, so
they will appear more responsive.
- Which is the proper syntax
for loading an application in a separate memory space with a HIGH priority level?
- START MSPAINT.EXE
/SEP /HIGH
- START
/SEP /HIGH MSPAINT.EXE
- START
MSPAINT.EXE /SEPARATE /HIGH
- START
/SEPARATE /HIGH MSPAINT.EXE
- Which of the following
are ways you can start a Win16 application in a separate memory space?
- From a batch file that uses the
/SEPARATE option.
- From Task Manager by
File, then New Task, and then checking the box for Separate Memory.
- From the command prompt.
- From the Run dialog box.
- Creating a shortcut that
has the separate memory check box marked.
- Which is not a component of the
OS/2 Subsystem?
- NETAPI.DLL
- OS2SS.EXE
- OS2LIB.DLL
- OS2.EXE
- (True/False) The OS/2 Subsystem cannot run OS/2 2.x applications.
- Which is not a Kernel Mode component?
- Cache Manager
- Security Subsystem
- I/O
Manager
- Local
Procedure Call Facility
- Fill in the blank.
If you do not alter the priority of an application, it will
run at the default priority level of _______.
Chapter 14 Self Test
The following Self-Test questions will help you measure
your understanding of the material presented in this chapter. Read all the choices
carefully, as there may be more than one correct answer. Choose all correct answers for
each question.
1.Using the /HIGH switch when starting an application from
the command prompt will cause it to start at what priority?
- 24
- 13
- 7
- 4
- While using the
Processor:%Processor Time counter in Performance Monitor you see it spike to 100% when
starting an application, but then it drops to 43%. What do you need to do?
- Upgrade to a faster
processor
- Increase the size of
your pagefile
- Add more physical
memory to your system
- Nothing, the system is performing
within acceptable parameters
- Windows NT divides memory into
____ pages.
- 2KB
- 4KB
- 8KB
- 16KB
- Windows NT Workstation
supports ____ processors.
- 1
- 2
- 3
- 4
- (True/False) It is not possible to change the priority of the foreground
application so that it runs at the same priority as all background applications.
- By how many levels can Windows NT automatically adjust the
priority of an application?
- 4
- 3
- 2
- 1
- You suspect a disk drive is
creating a bottleneck within your system. You use the LogicalDisk:%Disk Time counter to
take measurements, but have a consistent reading of zero. What is the problem?
- The disk drive no
longer functions properly
- Disk drive
performance counters are enabled
- The wrong
object:counter is being used
- Disk drive performance
counters are disabled
- Multiprocessing supported
by Windows NT is ____ .
- asymmetrical
- symmetrical
- both asymmetrical
and symmetrical
- neither asymmetrical
nor symmetrical
- (True/False) Using two processors in your Windows NT system doubles
the performance capability.
- Where does Windows NT perform automatic self-tuning
optimizations?
- Thread and process prioritization
- Asymmetrical
processing
- Swapping among multiple pagefiles
- Caching disk requests
- All the above.
- The cache system used by Windows NT
is ____ .
- static
- fixed
- dynamic
- inert
- The Disk Drive Performance
Counters are enabled using what utility?
- Perfdisk
- Diskenable
- Diskperf
- Enabledisk
- (True/False) The Task Manager cannot be used to change the priority of a thread.
- Using Performance Monitor, you have determined that you have
a disk drive bottleneck. What action could alleviate this problem?
- Create a RAID 5 set
using Disk Administrator
- Add more physical memory to the
system
- Use an 8-bit disk
drive controller card
- Buy a new processor
- All the above
- Using Performance Monitor,
you have determined that you are encountering a memory bottleneck. What action will
eliminate it?
- Increase the size of pagefile.sys
- Add a new
high-speed controller card
- Unload any drivers that
arent in use
- Decrease the size
of the L2 cache
- All of the above
- (True/False) Hard page faults are more detrimental to system performance
than soft page faults.
- (True/False)
Once you have manually performance-tuned your system, you never have to do it again.
- (True/False)
Disk Drive Performance Counters should only be enabled when monitoring disk drive
performance.
- How would you change the priority of an application that is
already running?
- Use Performance
Monitor
- The Performance tab
from System Properties
- Use the /REALTIME
switch
- Task Manager
Chapter 15 Self Test
The following questions will help you measure your
understanding of the material presented in this chapter. Read all the choices carefully,
as there may be more than one correct answer. Choose all correct answers for each
question.
1. Which of the following would
be valid in a BOOT.INI file?
2. (True/False) The /SOS switch is used in the BOOT.INI file to enable the
capture of debugging information.
3. What files are required to be on a Windows NT boot disk
for a non-SCSI Intel-based machine?
4. NTDETECT.COM is used to __________ .
5. You are sent out on a
trouble call and told that the system hangs ever since the user added a new video driver.
What would you do?
6. Your system has 32MB
of physical memory and you have set the System Recovery to write debugging information
to %systemroot%\memory.dmp. What else needs to be done to ensure that the debugging
information will be saved?
7. What tool do you use to
detect the group dependencies for a service?
8. (True/False) The only way to change the default timeout is to edit the
BOOT.INI file manually.
9. Which load phase can be identified by the screen turning
blue?
10. Paul has been fired and
his replacement, Ann, needs to access the fourth-quarter report located in a folder that
belonged to Paul. How can Ann access this folder?
11. (True/False)
The Session Manager subkey of the Registry contains local
variables that are used by the Session Manager.
12. If a service has been set in the Registry for an error
control of 0x2, it reflects a level of ______ .
13. To update your
Emergency Repair Disk, you would type _________from a Command Prompt.
14. (True/False)
A Service Pack can easily be removed from your system, even
if you do not have the uninstall folder.
15. What causes the "Blue Screen of Death"?
16. (True/False)
Any ASCII editor can be used to read an Event Viewer .EVT log
file.
17. The partition(n) portion of an ARC name starts counting
with _____ .
18. Your system is set to
dual-boot between Windows 95 and Windows NT. You receive the following message as you
try to boot into Windows 95: I/O Error accessing boot sector file. What has caused this to
occur?
19. A system you
have been sent out to troubleshoot will not boot. You attempt to use the LastKnownGood
configuration and it does not correct the problem. What would you do next?
20. (True/False)
The SAM and security files are automatically updated when you
use the Repair Disk Utility.
|