MCSE NT Workstation 4.0 Study Guide

 

 

Home ] Electronic Book ] Exams and Simulations ] Interactive Self Study ] 

 

Chapter 1 Self Test

  1. What does RISC stand for?
  1. Reduced Information Source Code
  2. Reduced Instruction Source Code
  3. Reduced Instruction Set Computing
  4. Reduced Information Set Computing
  1. Windows NT is written in the ______________ language.

     

  2. _________ applications use conventions such as case-sensitive naming and hard links.

     

  3. What does TCP/IP stand for?
  1. Transport Control Protocol/Internet Protocol
  2. Transmission Controlled Protocol/Internet Protocol
  3. Transport Compatible Protocol/Internet Protocol
  4. Transmission Control Protocol/Internet Protocol

  1. (True/False) DLC is the protocol used for communicating with DEC Pathworks networks.

     

  2. What is the fastest network protocol supported by NT?
  1. DLC
  2. NetBEUI
  3. TCP/IP
  4. NWLink
  1. I have one DOS application running, and a suite of five 16-bit applications running. One of the 16-bit applications continually crashes when I use the DOS application. What is the best way to keep this from happening?
  1. Run the DOS application in its own VDM.
  2. Run all of the 16-bit applications in a separate memory space.
  3. Run the faulty application with a higher priority than the other 16-bit applications.
  4. Run the faulty application in a separate memory space.
  1. Windows NT Workstation provides support for up to ______ processors.

     

  2. (True/False) If you share a file that is on a FAT partition over the network, the file cannot be seen by non-NTFS-compatible operating systems.

     

  3. NT uses a process called _________ to translate the calls from one subsystem to another.

     

  4. Which is not a component of the Windows NT Executive?
  1. Process Manager
  2. Security Reference Monitor
  3. Process Scheduler
  4. Object Manager
  1. (True/False) Environment subsystems are run in User Mode.

     

  2. Kernel mode is also commonly referred to as _________________.

     

  3. _____________ is the term used to describe the process of moving paging files to and from the disk as needed.
  1. How many inbound client connections does NT Workstation support?
  1. 1
  2. 5
  3. 10
  4. Unlimited
  1. How many RAS connections does NT Workstation support? How many does NT Server support?

     

  2. I have a network of 4 computers with very inexperienced users. Which model (workgroup or domain) would be the better choice for my network, and why?
  1. Workgroup model, because you have fewer than ten users.
  2. Workgroup model, because you do not have a server to act as domain controller.
  3. Domain model, because you have very inexperienced users.
  4. Domain model, because you can expand to include more computers in the future.
  1. What is the lowest level of the Windows NT operating system architecture?

 

Chapter 2 Self Test

  1. Holden wants to upgrade his workstation to Windows NT 4.0 Workstation. What choices does he have?
  1. Windows 3.1
  2. Windows 95
  3. Windows NT 3.51
  4. OS/2
  1. Phoebe’s boss wants her to install Windows NT 4.0 Workstation onto some legacy hardware. What choices does she have?
  1. 386/20, 48MB of RAM, 2.3GB hard disk
  2. 486/33, 16MB of RAM, 1.0GB hard disk
  3. 200 Pentium Pro, 64MB of RAM, 4.5GB hard disk
  4. 486 /100, 8MB of RAM, 3.0GB hard disk
  1. Nuala Anne wants to verify that all of the hardware that she is going to use for Windows NT workstation is compatible. How should she verify the hardware?
  1. Call the hardware vendor.
  2. Check the Hardware Compatibility List.
  3. Ask her Network Administrator.
  4. Doesn’t matter, Windows NT is compatible with everything.
  1. To partition your hard disk you use the _________.EXE utility.

     

  2. Ken accidentally lost his three setup floppies for installing Windows NT 4.0 Workstation. What command-line utility can he use to re-create them?
  1. WINNT.EXE /NO
  2. WINNT.EXE /B
  3. WINNT.EXE /U
  4. WINNT.EXE /OX
  1. Dermot is doing top-secret work and wants to take advantage of Windows NT’s security model. He is using a Pentium II 266, 4.3GB hard disk with 64MB of RAM. What file system should he use?
  1. HPFS
  2. NFS
  3. NTFS
  4. FAT
  1. Danielle needs to install Windows NT 4.0 from the network from an MS-DOS workstation client and does not need to create floppies. What setup utility should she use?
  1. WINNT32.EXE /B
  2. WINNT32.EXE /OX
  3. WINNT.EXE /B
  4. WINNT.EXE /U
  1. Michael was instructed to come up with a plan to implement unattended installations throughout his company’s enterprise-wide network. He also needs to pre-install applications and set up machine-specific parameters such as computer names and IP addresses. What files does Michael need to use?
  1. Windiff.exe
  2. SYSDIFF.EXE
  3. UNATTEND.TXT
  4. Unique Database Files
  1. Your company has just purchased four new Hewlett-Packard printers for your network. TCP/IP is already installed on your network yet you cannot connect to the printers. What protocol must be installed to talk to the HP printers?
  1. IPX/SPX
  2. AppleTalk
  3. DLC
  4. Point-to-Point Tunneling Protocol
  1. You accidentally edited the Registry of your computer. After you restart your computer, Windows NT will not load. What will help you restore your system?
  1. Emergency Repair Disk
  2. RESTORE.EXE
  3. SYSDIFF.EXE
  4. Windows NT 4.0 Server CD-ROM
  1. While installing Windows NT 4.0 Workstation, you encounter errors during installation of your network card. You still want to install a network device to continue the installation. What option should you pick?
  1. 3COM EtherLink III
  2. 56k modem
  3. MS Loopback Adapter
  4. Arcnet adapter
  1. What command lets you change the boot loader on your hard disk from Windows NT to Microsoft DOS?
  1. ROLLBACK.EXE
  2. SYS.EXE
  3. DELTREE.EXE
  4. RESTORE.EXE
  1. Holly is upgrading a previous installation of Windows NT Workstation 3.51 to Windows NT Workstation 4.0. She already has the three Windows NT setup floppies. What version of the Windows NT setup utility can she use?
  1. WINNT.EXE /B
  2. WINNT32.EXE /OX
  3. WINNT32.EXE
  4. WINNT.EXE /U
  1. What are the benefits for using NTFS partitions on your Windows NT 4.0 Workstation?
  1. Adapts to Windows NT security model.
  2. Compatible with UNIX workstations.
  3. Fault tolerant.
  4. Best for hard disks over 500MB.

     

 

Chapter 3 Self Test

  1. You want to change the size of the paging file. Where do you go to do this?
  1. The Virtual memory button in the Performance tab of System Properties.
  2. The Performance button of the Virtual Memory tab in System Properties.
  3. The Change button on the Performance tab in System Properties.
  4. The Set button on the Virtual Memory tab in System Properties.
  1. What utility lets me search the Registry for the value of "AutoAdminLogon"?
  1. REGEDT32.
  2. REGEDT.
  3. REGEDIT.
  4. You cannot search for values in the Registry.
  1. Which file does the Startup/Shutdown tab modify in System Properties?
  1. BOOTUP.INI
  2. BOOT.INI
  3. BOOT.CFG
  4. START.INI
  1. What is the recommended paging file size for a computer with 32MB of RAM?
  1. 40MB
  2. 42MB
  3. 44MB
  4. 48MB
  1. Where would you place a shortcut so that it appears on all users’ desktops?
  1. Winnt\All users\Desktop
  2. Winnt\Profiles\All users\Desktop
  3. Winnt\Profiles\Desktop\All users
  4. Winnt\All users\Profiles\Desktop
  1. The paging file is actually a file called ____________, and is located in the root directory of the drive you specified in the Virtual Memory dialog box.
  1. Which tab of the System Properties dialog box shows how much RAM is installed in a computer?
  1. General
  2. Performance
  3. Memory
  4. Environment
  1. 17 is a higher priority thread than 23.
  1. True
  2. False
  1. On the main Services screen, which button do you click to configure a service to start up automatically on bootup?
  1. Disabled
  2. Manual
  3. Startup
  4. Automatic
  1. The _________ tab of the SCSI adapters dialog box is where you add and remove drivers for the devices.

 

  1. Which is the only valid Registry key?
  1. HKEY_CLASS_ROOT
  2. HKEY_CLASSES_USER
  3. HKEY_CLASSES_ROOT
  4. HKEY_CLASS_USER
  1. The Advanced option of the Ports icon in the Control Panel lets you adjust the baud rate, parity, and flow control.
  1. True
  2. False
  1. Which option is not available from the UPS Configuration dialog box?
  1. Remote UPS Shutdown.
  2. Power failure signal.
  3. Send Administrative Alert.
  4. Execute Command File.
  5. Low battery signal at least two minutes before shutdown.
  1. Which is not a subkey of HKEY_LOCAL_MACHINE?
  1. Software
  2. Classes
  3. SAM
  4. Hardware
  1. Which menu would you select to find a key or value in REGEDIT?
  1. Tools
  2. File
  3. Find
  4. Edit
  1. Which subkey of HKEY_LOCAL_MACHINE holds the CurrentControlSet key?
  1. Hardware
  2. SAM
  3. System
  4. Software
  1. You click the Install/Uninstall tab to remove components of Windows NT.
  1. True
  2. False
  1. Location, calling cards, and area code are examples of __________ settings.

 

  1. The ____________ adapter can be used if you want to configure network settings but do not have an adapter in your system

 

  1. Where is the SCSI Investigator found on the Windows NT Workstation CD-ROM?
  1. TOOLS\SCSI
  2. SUPPORT\TOOLS\SCSI
  3. SCSITOOL
  4. SUPPORT\SCSITOOL
  1. From which Control Panel icon do you configure a MIDI adapter?
  1. Devices
  2. Multimedia
  3. Sounds
  4. Adapters
  1. The entry in the BOOT.INI file to disable serial mouse detection on COM1 is _______________ .

 

  1. _____________ communication uses stop and start bits appended to each byte of information.

     

  2. The ________ tab is where you change the display driver.

     

  3. Which is not an available button on the Server Service main dialog box?
  1. Sessions
  2. Alerts
  3. In Use
  4. Users
  1. What is not an option in the Advanced Ports dialog box?
  1. Base I/O
  2. COM port
  3. Flow Control
  4. FIFO enabled
  1. UPS stands for ________________ .

     

  2. Which portion of the HKEY_LOCAL_MACHINE key is grayed out to avoid tampering?
  1. The SAM key.
  2. The Special key.
  3. The Security key.
  4. None is grayed out.

     

 

Chapter 4 Self Test

                                        D.) Disable all accounts except the Administrator account.

 

 

Chapter 5 Self Test

20. (True/False) MFT stands for Master Format Table.

       

 

Chapter 6 Self Test

  1. The _______________ creates security access tokens, authenticates users, and manages the local security policy.

    A) Local Security Authority

    B) SAM

    C) ACL

    D) ACE

     

  2. What maintains the database of all user, group, and workstation accounts?

    A) Local Security Authority

    B) SAM

    C) ACL

    D) HKEY_LOCAL_MACHINE

     

  3. NT supports which of the following logons? (Choose all that apply)

    A) local

    B) pass-through authentication

    C) remote

    D) domain

     

  4. Why must you press Ctrl-Alt-Del to logon to NT?

    A) reboot the system to refresh the memory

    B) reboot the system to clear the security logs

    C) prevent trojan horse viruses

    D) erase the last username from the logon dialog box

     

  5. Which of the following is an object? (Choose all that apply)

    A) file

    B) window

    C) process

    D) keyboard

     

  6. A __________ is used to uniquely identify each user account.

    A) SID

    B) GUID

    C) Group ID

    D) ACL

     

  7. If you delete a user account, how can you get it back?

    A) You can’t undelete an account. You must create a new account.

    B) Choose undelete from the file menu.

    C) Run the command ACCOUNT /UNDELETE.

    D) Use the recycle bin.

     

  8. A program always runs in the _______________ of the user.

    A) subject

    B) security context

    C) real mode

    D) protected mode

  9. User JesseS belongs to the local group Marketing. The permissions on the file DICTIONARY.DOC are as follows: JesseS has Change(RWXD) permission and the Marketing group has No Access permissions. When user JesseS tries to read the file, what access will he be granted?

    A) Change

    B) Read

    C) Read and Execute

    D) No Access

     

  10. Which ACE does NT process first?

    A) AccessAllowed

    B) ReadControl

    C) WriteDenied

    D) AccessDenied

     

  11. User MaryS is assigned to the local group Sales. Mary has Read permissions for all files on your system. The group Sales has special permissions of Write on all the files in the folder called Reports. If Mary requests Read and Write permissions at the same time, what will happen?

    A) Access will be denied, since she doesn’t have enough access in any individual group.

    B) Access can’t be resolved.

    C) Access will be granted.

    D) Access will be granted, but an administrator must approve it first.

     

  12. If you want to limit the people who can access your system when they log on locally, how must your hard disk partition be formatted?

    A) NTFS

    B) FAT

    C) HPFS

    D) CDFS

     

  13. Why is there a special utility to secure the boot partition of RISC computers?

    A) RISC computers can’t be physically secured, so the partition requires extra protection.

    B) RISC computers are more secure than Intel-based computers, because they can access more security subsystems.

    C) RISC systems must boot on a FAT partition.

    D) Microsoft just hasn’t compiled the utility to other systems yet.

     

  14. What command allows the user to change file permissions from a command shell?

    A) NET PERMISSIONS

    B) SET FILE

    C) CACLS

    D) ACE

     

  15. If you want to audit access to files stored on your NTFS-formatted hard disk, what must you do first?

    A) Turn Auditing on in User Manager.

    B) Turn Auditing on for the folder by using Explorer.

    C) Do nothing. NT automatically audits all file access once NTFS is installed.

    D) Use the program Security Manager to enable Auditing.

  16. What does transaction logging provide for NTFS?

    A) Auditing of file access

    B) Remote access to your system

    C) Network connections made to your computer

    D) Recoverability

     

  17. Who is the owner of a new file on a FAT partition?

    A) Administrator

    B) System

    C) Whoever created the file

    D) FAT doesn’t support Owners.

     

  18. Who is the owner of a new file on an NTFS partition?

    A) Administrator

    B) System

    C) Whoever created the file

    D) FAT doesn’t support Owners

     

  19. (True/False) Only administrators can give someone ownership of a file.

     

  20. When moving a folder from drive C: to drive D:, what permissions will the folder have? (Both drives are formatted with NTFS.)

    A) The folder will keep its original permissions.

    B) The folder will inherit the permissions of drive D:

    C) NTFS will reset the folder to Everyone Full Control.

    D) NTFS doesn’t support permissions between drives.

     

  21. Which file systems support share-level security?

    A) FAT

    B) NTFS

    C) CDFS

    D) All of the above

     

  22. Which one is NOT a type of share permission on an NTFS partition?

    A) Read

    B) No Access

    C) Full Control

    D) Special Access

    E) None of the above

     

  23. How can you share a folder on the network to allow everyone to read, write, and execute files, but not delete any files?

    A) You can’t.

    B) Give everyone group Change share permissions.

    C) Give everyone group Read, Write, and Execute share permissions.

    D) Give everyone group Change share permissions and Read, Write, Execute Special File permissions on NTFS.

     

  24. Which of the following are negative results from auditing all file object accesses on your system? (Choose all that apply)

    A) Slows your computer’s processor down

    B) Creates more disk access

    C) Fills your security log up too fast

    D) None of the above

     

  25. What must be turned on to allow you to audit writes to your NTFS directories?

    A) Logon and Logoff

    B) File and Object Access

    C) Use of User Rights

    D) Process Tracking

     

  26. User RyanB is given share-level access of Full Control to share SalesRPT. However, the NTFS permissions are set to Read for the group Sales. RyanB is a member of the group Sales. When she connects to the share SalesRPT, what type of access will she have?

    A) Full Control

    B) Read

    C) No Access

    D) None of the above

     

 

Chapter 7 Self Test

 

Chapter 8 Self Test

 

Chapter 9 Self Test

      1. (True/False) Installing CSNW and NWLink is a difficult, time-consuming process that will require significant training for support personnel.

      2. The ___________ protocol and the ___________ network service are the two components necessary for Windows NT to connect to NetWare servers for file and print services.

      3. (True/False) Windows NT Workstation users will not be able to use long filenames when saving files to NetWare servers.

      4. Which Windows NT command displays information regarding the IPX frame type in use?

  1. IPXCFG
  2. NET CONFIG
  3. IPXROUTE CONFIG
  4. NET IPXCFG

      5. (True/False) CSNW is a useful component of Windows NT Workstation and a Windows NT certified professional can reasonably expect to work with it during his or her career.

      6. What frame type does Windows NT use if it cannot detect the frame type in use on the network?

  1. Ethernet 802.2
  2. Ethernet 802.3
  3. Ethernet SNAP
  4. Ethernet II
    1.      Use as many protocols and frame types as possible
    2.     Use at least one frame type for each protocol in use
    3.   Use only one protocol and one frame type
    4.    The number of protocols and frame types in use does not affect network performance.
  1. (True/False) Windows NT Workstation users will find that using files and printers on NetWare servers is very similar to using files and printers on Windows NT servers.

 

Chapter 10 Self Test

 

Chapter 11 Self Test

  1. Sally, Bob, and Ed are engineers using computers running Windows NT Workstation. They occasionally like to share files with each other, and the files are too big to fit on a floppy, but they don’t want just anyone to be able to access the files. What is the best solution to their problem?
    1. Buy another computer, install Windows NT Server, and have them all join the domain. Then, set up a shared directory on the new server for the files.
    2. Buy them all larger removable drives, and let them swap them around the office.
    3. Use a software compression program to pack the files on floppies.
    4. Set up accounts for all three of them on each workstation, and set up shares for the files with these accounts.
    5. Tell them to use whatever workstation has the files they need.

       

  2. A workgroup consists of a Windows NT Server, a Windows NT Workstation, a Windows 95 system, and a Windows for Workgroups system. The Windows NT Workstation has MaintainServerList set to Yes and Preferred Master Browser set. Each of the others has default browser settings, and all are using the same network protocol. Which of the following is true:

     

    1. The Windows NT Server will be the Master Browser, and the Windows NT Workstation will be the Backup Browser.
    2. The Windows NT Workstation will be the Master Browser, and the Windows NT Server will be the Backup Browser.
    3. The Windows for Workgroups system will be the Master Browser, and the other systems will be Backup Browsers.
    4. Each system will browse for itself, because they’re running different operating systems.
    5. None of the above, because you can’t have a Windows NT Server in a workgroup.
  3. A system shows up in the Network Neighborhood, but the user is unable to connect to its resources as he has in the past. Which of the following are good hypotheses to troubleshoot the problem:

     

    1. The user just thought he was able to connect to the resources in the past. Ignore him.
    2. The system is actually down, but hasn’t been down long enough to be removed from the browse list as yet.
    3. It must be a problem with user security access to the resource.
    4. The target system is in the same workgroup, and the user has changed his password recently.
    5. The target system is in the same domain, and the user has changed his password recently.
  4. A user has just changed his password while logged into the domain on one workstation. He logs out and immediately goes to another workstation in the domain and can’t get logged in. Which of the following might be true:

     

    1. Caps Lock might be in a different state.
    2. He’s trying his old password, thinking he hasn’t changed it on this workstation yet.
    3. The current workstation happened to authenticate from the Backup Domain Controller, and it hasn’t been updated yet.
    4. He’s not allowed to log on at that workstation.
    5. This workstation was down when the password change was made.
  5. Ted, Jill, and Janet are users on Windows NT Workstations belonging to a domain. They always log on to the domain at their workstations. They have administrator access to their workstations, but aren’t domain administrators. They’d like to share files on their workstations with each other using group access, with the ability to make changes themselves (without a domain administrator). Which option is the best:

     

    1. Each one should set up workstation accounts for the others, just as they would in a workgroup, and add them to a local group.
    2. Each one should create a local group on their workstation, and add the domain usernames of all of them to the group.
    3. One of them should create a global group on their workstation, letting the others use it.
    4. One of them should create a global group on a member server, letting the others use it.
    5. What they want to do can’t be done without the aid of a domain administrator.
  6. Which of the following give a computer preference in browser elections?

     

    1. Being a Backup Domain Controller
    2. Being a Primary Domain Controller
    3. Running Windows Internet Naming Service
    4. Currently the Master Browser
    5. MaintainServerList is Auto
  7. Which of the following are true statements about workgroup and domain membership?

     

    1. A workstation can be a member of both a workgroup and a domain
    2. A user logging on to a domain has only one username and password to remember
    3. A system running Windows NT Server may be a member of a workgroup
    4. A system running Windows NT Server is required for domain creation
    5. If you give a workstation a workgroup name that matches an existing domain, it will browse with that domain without being a domain member.

       

  8. David is a domain administrator running Windows NT Workstation at his desk. Which of the following are true statements:

     

    1. David can log on to the domain and have administrator access to his workstation.
    2. David can log on to the domain and have administrator access to the domain.
    3. David must have a roaming profile to log on to another workstation.
    4. David enjoys the power he wields over other users, who are subject to his every whim.
    5. David is always the Master Browser.

       

  9. Jane wants her Windows NT Workstation to join the domain. She has selected Domain and typed in the correct name in the Identification Changes window. What can she do:
    1. If she’s a domain administrator, she can check the box Create a Computer Account in the Domain and enter her username and password and click OK to join.
    2. Even if she’s not an administrator, she could do as in answer A, as long as she’s the current logged on user.
    3. She can contact a domain administrator to add her node name in Server Manager before clicking OK to join.
    4. She can have a domain administrator come to her workstation and enter his own username and password as in answer A.
    5. Since Windows NT Workstations must select their workgroup or domain at installation, she can't join the domain without reinstalling.

       

  10. Twenty-five users running Windows NT Workstations in a workgroup wish to share resources. What’s their best solution?

     

    1. Set up accounts for everyone on each workstation.
    2. Invest in a Windows NT Server and add it to the workgroup. Place all the resources on the server.
    3. Invest in a Windows NT Server and create a domain, adding all the workstations to the domain. Any resources may be moved to the server if desired.
    4. Same as answer A, but publish and maintain a list of usernames and passwords, so that each user can keep his own workstation’s account information for all users synchronized with the rest.
    5. Invest in a Windows NT Server and create a domain. Have each workstation join its own individual workgroup, so that no two are in the same group.
  11. The Marketing domain spans multiple subnetworks on a routed network. The PDC server becomes unavailable due to hardware problems, but you have a couple of BDCs. After a while, users report problems seeing other nodes on the network. What happened, and how do you fix the problem?

     

    1. Since the PDC must be the Master Browser for the domain, there is none now, and other nodes are unreachable. Wait for a BDC to automatically be promoted to PDC.
    2. Since the PDC was the domain Master Browser, each subnetwork’s Master Browser only sees computers on its subnetwork. Promote a BDC to PDC, so that it will become a new domain Master Browser.
    3. Since a domain requires a PDC to run, quickly promote your workstation to be a new PDC for the domain. Disappearing nodes are the least of your problems!
    4. The problem is temporary, and will go away once a browser election is held and a new domain Master Browser is elected.
    5. Since the PDC was both domain Master Browser and Master Browser for its subnetwork, browsing can’t continue in the domain until you replace the server with another.

       

  12. Ned and Lonnie work different shifts at the rock quarry. They use the same Windows NT Workstation, which is a member of a domain. Which of the following could be true for Ned to log on to the workstation:

     

    1. Ned has a local account on the workstation.
    2. Ned has a domain account in the workstation’s domain.
    3. Ned has a domain account in a domain trusted by the workstation’s domain.
    4. Ned has a domain account in a domain that trusts the workstation’s domain.
    5. Ned has a local account on a workstation that this workstation trusts.
  13. Ned’s shift has been changed, and he now works with Lonnie. There are now two Windows NT Workstations that either may log on to, with identical software setups. What’s the best way to preserve their desktops for both computers?

     

    1. Have an administrator copy their last used profile over to the other workstation every day.
    2. Use the same mandatory profile for everyone, so the desktop is consistent everywhere without tracking changes.
    3. Set up roaming profiles for Ned and Lonnie.
    4. Assign each his own workstation, and tell them to log on only to the one to which they’re assigned.
    5. Tell them if they can’t agree on a desktop, they’re going back to busting rock!
  14. Earnest has an account in each of the two domains, Seeming and Being. Earnest is a domain administrator in Being, but just a normal user in Seeming. Domain Seeming trusts Being, and also has added Being\Domain Admins to the local Administrator’s group on the PDC for Seeming. If Earnest wants to log on to the PDC for Seeming to administer it, what must he do?

     

    1. He can’t do anything; he’s just a user in the Seeming domain.
    2. He can log on to the Seeming PDC using his Seeming account, then switch to an administrative user.
    3. He can log on to the Being PDC using his Being account and set his environment to the Seeming PDC.
    4. He can log on to the Seeming PDC using his Being account.
    5. He can log on to the Being PDC using his Seeming account.

       

  15. You’re looking at the Network Neighborhood for your domain. You see systems listed for which you know you haven’t set up a computer account in the domain, and they don’t appear in Server Manager. Which of the following could explain the situation?

     

    1. The systems aren’t Windows NT Workstations or Servers, and have been configured to participate in the domain.
    2. The systems used your domain name as their workgroup name.
    3. Someone added the Windows NT Workstations or Servers by checking Create a Computer Account in the Domain instead of using Server Manager
    4. The Master Browser for your domain is on the same subnetwork as the Master Browser for their domain.
    5. Your domain didn’t have any potential browsers after your PDC crashed, so the other systems were added to make browsing possible.

 

Chapter 12 Self Test

  1. What are two advantages of the EMF data type?

    A) It requires less bandwidth to print over the network.

    B) It returns control of the application to the user more quickly.

    C) EMF files can be printed on any printer.

    D) EMF files are in PSCRIPT1 format.

  2. What are the two types of print processors shipped with NT?

     

    A) Windows Print Processor (WINPRINT.DLL)

    B) PostScript Print Processor (PSCRIPT1.DLL)

    C) Macintosh Print Processor (SFMPSPRT)

    D) UNIX Print Processor (LPD)

  3. If you want to add an HP JetDirect networked printer to your computer, what two things must you do?

     

    A) Install DLC protocol on your computer.

    B) Configure the DLC protocol address on the printer.

    C) Print a test page to get the MAC address of the JetDirect Card.

    D) Install AppleTalk on your computer.

  4. You shared an HP LaserJet 5 on your system for everyone in your department to use. When users try to connect to the printer using Windows 95, they get the following error: "The server on which the printer resides does not have a suitable driver installed. Click OK if you wish to select a driver to use on your local machine." What should you do to prevent users from receiving this error message?

     

    A) Share the printer on an NT Server, because Workstation can't provide the correct drivers.

    B) Give them the proper access permissions.

    C) Install an appropriate Windows 95 print driver on your workstation.

    D) Change the default data type to RAW.

     

  5. (True/False) A local printer must have a port on your system.

     

  6. You want to set up a printer pool using two printers. Neither printing device can use a common driver. How can you enable both printing devices to be in a printer pool?

     

    A) You can set up a printer for each printing device, then add a third printer to manage the two independent printers.

    B) Install DLC protocol to bridge the printing drivers.

    C) Add both printing devices to the Ports Property page and check Enable Printer Pooling.

    D) You can't, because they have to share a common driver.

  7. Your boss needs to print to his secretary's printer, but he doesn't want to wait for his print job behind anybody else's print job. How can you share the printer, giving your boss a higher priority?

    A) Share the printer and give him full control of the printer

    B) Set the printer to print directly to the printer.

    C) Create two printers. On one printer give your boss permissions to print, and set the priority to 99. On the second printer give everyone else permissions to print and set the priority to 1.

    D) Create one printer, but share it out twice. On one share give your boss permissions to print, and on the other share give everyone permissions to print.

  8. User JamieS sent a print job to an NT Workstation acting as a print server. When she went to the printer to pick up her print job, she noticed a 200-page report was printing out. She didn't want to wait for her print job, so she printed her document on a different printer. JamieS is environmentally conscious, so she doesn't want to waste paper printing the first print job. How can she delete her first print job? (Choose the best answer)

    A) Double-click the Printer icon and select her print job, then press the Delete button.

    B) She should tell the administrator to delete the print job for her.

    C) There is nothing she can do.

    D) She should turn off the printer as soon as the 200-page report finishes printing.

  9. To what group must a user be added before he can manage other people's print jobs? (Choose all that apply)

    A) Administrators

    B) Creator Owner

    C) Power Users

    D) Users

  10. Drive C: has 10MB of available disk space on it. Drive D: has 300MB of disk space available. Windows NT is installed on Drive C:, which is almost out of space. Sometimes when you print, your computer locks up and you have to restart your system. What should you do to prevent this problem in the future?

    A) Use Disk Administrator to combine the two drives as one logical drive.

    B) Use Explorer and move your WINNT directory to the D: drive.

    C) Move the printer spooler to the D: drive.

    D) Move the print monitor to the D: drive.

     

 

Chapter 13 Self Test

  1. Which facility is used when environment subsystems need to communicate?
    1. Process-passing
    2. Thread-passing
    3. Message-passing
    4. Procedure-passing
  1. What does CSRSS provide?
    1. Security for the subsystems
    2. Logon Authentication
    3. Translation for the subsystems
    4. Error handling for the subsystems
  1. What component is responsible for keeping track of the time that threads are being processed?
    1. Thread Manager
    2. Process Manager
    3. The Kernel
    4. Object Manager
  1. (True/False) The Security Reference Monitor works with the CSRSS and Object Manager subsystem to make up the entire Security model for the system.
  2. Which priority class is considered IDLE?
    1. Priority level 4
    2. Priority level 6
    3. Priority level 7
    4. Priority level 9
  1. Fill in the blanks.

Both the _________________ and the __________________ ran in User Mode in the Win32 subsystem in previous releases of NT, but now have been moved into the Windows NT Executive, which runs in Kernel Mode.

  1. Which is not a component of the Virtual DOS Machine?
    1. NTDOS.SYS
    2. NTVDM.DLL
    3. REDIR.SYS
    4. NTIO.SYS
  1. (True/False). If there is no PIF associated for the application, the DEFAULT.PIF is used.
  2. I have a DOS application and three Win16 applications running on the system. When I switch from the DOS application to one of the Win16 applications, they are all unresponsive. What is the best way to remedy this situation?
    1. Run each one of the Win16 applications at the priority level of HIGH, so they do not become unresponsive.
    2. Run the DOS application at the priority level of LOW, so that it does not consume too many resources.
    3. Run each of the Win16 applications in its own memory space, so they do not interfere with each other.
    4. Increase the priority level of the NTVDM in which all of the Win16 applications are running, so they will appear more responsive.
  1. Which is the proper syntax for loading an application in a separate memory space with a HIGH priority level?
    1. START MSPAINT.EXE /SEP /HIGH
    2. START /SEP /HIGH MSPAINT.EXE
    3. START MSPAINT.EXE /SEPARATE /HIGH
    4. START /SEPARATE /HIGH MSPAINT.EXE
  1. Which of the following are ways you can start a Win16 application in a separate memory space?
    1. From a batch file that uses the /SEPARATE option.
    2. From Task Manager by File, then New Task, and then checking the box for Separate Memory.
    3. From the command prompt.
    4. From the Run dialog box.
    5. Creating a shortcut that has the separate memory check box marked.
  1. Which is not a component of the OS/2 Subsystem?
    1. NETAPI.DLL
    2. OS2SS.EXE
    3. OS2LIB.DLL
    4. OS2.EXE
  1. (True/False) The OS/2 Subsystem cannot run OS/2 2.x applications.
  2. Which is not a Kernel Mode component?
    1. Cache Manager
    2. Security Subsystem
    3. I/O Manager
    4. Local Procedure Call Facility
  1. Fill in the blank.

If you do not alter the priority of an application, it will run at the default priority level of _______.

 

Chapter 14 Self Test

The following Self-Test questions will help you measure your understanding of the material presented in this chapter. Read all the choices carefully, as there may be more than one correct answer. Choose all correct answers for each question.

1.Using the /HIGH switch when starting an application from the command prompt will cause it to start at what priority?

    1. 24
    2. 13
    3. 7
    4. 4
  1. While using the Processor:%Processor Time counter in Performance Monitor you see it spike to 100% when starting an application, but then it drops to 43%. What do you need to do?

     

    1. Upgrade to a faster processor
    2. Increase the size of your pagefile
    3. Add more physical memory to your system
    4. Nothing, the system is performing within acceptable parameters

       

  2. Windows NT divides memory into ____ pages.

     

    1. 2KB
    2. 4KB
    3. 8KB
    4. 16KB

       

  3. Windows NT Workstation supports ____ processors.

     

    1. 1
    2. 2
    3. 3
    4. 4
  4. (True/False) It is not possible to change the priority of the foreground application so that it runs at the same priority as all background applications.

     

  5. By how many levels can Windows NT automatically adjust the priority of an application?

     

    1. 4
    2. 3
    3. 2
    4. 1

       

  6. You suspect a disk drive is creating a bottleneck within your system. You use the LogicalDisk:%Disk Time counter to take measurements, but have a consistent reading of zero. What is the problem?

     

    1. The disk drive no longer functions properly
    2. Disk drive performance counters are enabled
    3. The wrong object:counter is being used
    4. Disk drive performance counters are disabled

       

  7. Multiprocessing supported by Windows NT is ____ .

     

    1. asymmetrical
    2. symmetrical
    3. both asymmetrical and symmetrical
    4. neither asymmetrical nor symmetrical

       

  8. (True/False) Using two processors in your Windows NT system doubles the performance capability.

     

  9. Where does Windows NT perform automatic self-tuning optimizations?

     

    1. Thread and process prioritization
    2. Asymmetrical processing
    3. Swapping among multiple pagefiles
    4. Caching disk requests
    5. All the above.
  10. The cache system used by Windows NT is ____ .

     

    1. static
    2. fixed
    3. dynamic
    4. inert
  11. The Disk Drive Performance Counters are enabled using what utility?

     

    1. Perfdisk
    2. Diskenable
    3. Diskperf
    4. Enabledisk

       

  12. (True/False) The Task Manager cannot be used to change the priority of a thread.

     

  13. Using Performance Monitor, you have determined that you have a disk drive bottleneck. What action could alleviate this problem?

     

    1. Create a RAID 5 set using Disk Administrator
    2. Add more physical memory to the system
    3. Use an 8-bit disk drive controller card
    4. Buy a new processor
    5. All the above

       

  14. Using Performance Monitor, you have determined that you are encountering a memory bottleneck. What action will eliminate it?

     

    1. Increase the size of pagefile.sys
    2. Add a new high-speed controller card
    3. Unload any drivers that aren’t in use
    4. Decrease the size of the L2 cache
    5. All of the above

       

  15. (True/False) Hard page faults are more detrimental to system performance than soft page faults.

     

  16. (True/False) Once you have manually performance-tuned your system, you never have to do it again.

     

  17. (True/False) Disk Drive Performance Counters should only be enabled when monitoring disk drive performance.

     

  18. How would you change the priority of an application that is already running?

     

    1. Use Performance Monitor
    2. The Performance tab from System Properties
    3. Use the /REALTIME switch
    4. Task Manager

 

Chapter 15 Self Test

The following questions will help you measure your understanding of the material presented in this chapter. Read all the choices carefully, as there may be more than one correct answer. Choose all correct answers for each question.