1. How do you configure a printing pool?

2. In heavily overloaded networks, cross-bar switching offers better performance than cell-backplane switching

3. You want to connect 2 networks that are both lOBaseT Ethernet networks. The 2 networks are located in separate buildings so that they are approximately 1,000 meters apart. Which media should you use?

4. You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do?

5. In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem?

6. From your client computer, you are able to access several servers on your 10Base2 Ethernet network. However, you are NOT able to access a server names RED. Other client computers are able to access RED. What is the most likely cause of the problem?

7. Most routers can also act as bridges

8. Windows Naming Service (WINS)

9. What must you do to create a printer pool containing four shared printers on your Windows NT Server computer?

10. Assume, you are the administrator of the TUNA domain. You need to allow Lisa from the BASS domain to administrate the TUNA domain while you are on vacation. A one-way trust relationship has been set up so that TUNA trusts BASS. Which group assignments would accomplish your needs?

11. Which of the following statements about a local group account created by User Manager for Domains is true?

12. Peter uses a Microsoft Windows 95 computer. What should he do to be able to administer domain user accounts from his computer?

13. You are setting up a network in a school. You need to network 5 computers for the file and printer sharing. You want to use some donated cable and Ethernet adapters. You identify the donated adapters as ARCnet coaxial network adapters and 10Base2 Ethernet network adapters. You install an Ethernet adapter in each of the 5 computers and connect the donated cable. The computers are NOT able to maintain reliable communication. You suspect that you are NOT using the correct type of coaxial cable. Which type of coaxial cable should you be using?

14. The rating in bits per second for UTP Cat 5 wiring is

15. In building cabling, horizontal wiring from the telecommunications closet (TC) to the wall outlet has a distance limitation of

16. You are installing a network interface card on a computer with the following configuration: a 5867133 CPU, 16MB or RAM, a 800-MB IDE hard disk, a parallel port configured as LPT1, and a serial port configured as COM1, which is currently used by a mouse. In addition to the IDE host adapter and the video card, the following devices have been installed on the computer’s expansion bus: a modem on COM2, a SCSI host adapter for a CD-ROM drive, and a sound card. The SCSI hose adapter is using IRQ 5, and the sound card is using IRQ 11. The network interface card that you are installing supports the following choices for IRQ: 2, 3, 4, 5, 9,10 and 11. Which IRQ(s) could you use for the network interface card without creating an IRQ conflict with another device?

17. Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI?

18. What does the transport protocol do?

19. Bridges operate at the MAC layer (layer 2 of the OSI model.)

20. You need to install network adapters in 20 ISA-bus computers. Which rule must you follow when installing the network adapters?

21. Routers are often used to implement FIREWALLS

22. You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose?

23. Maria needs to install software on a Windows NT Server computer which is a backup domain controller. When she attempts to log on to the server, she receives the message “Unable to log on locally”. What must you do to enable Maria to log on to the server?

24. Why does a high number of broadcast messages adversely affect overall network performance?

25. You want to find out which users are currently using a specific directory on a Windows NT Server computer. How should you do this?

26. Dynamic Host Configuration Protocol [DHCP]

27. Bridges are ideally used in environments where there a number of well defined workgroups

28. A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation?

29. A one-way trust relationship has been established in which the RESEARCH domain trusts the TESTING domain. The Guest account is disabled in both domains. As a user belonging to a global group called Testers in the TESTING domain, you want to access a shared directory on a Windows NT Advanced Server in the RESEARCH domain. Which action would give you access?

30. Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships?

31. When of the following is a system default profile used?

32. In UTP Cat 5 wiring, patch cables from the wall outlet to the PC have a distance limitation of

33. In which of the following cable systems are T connectors and terminators are used?

34. An ethernet switch works at the protocol layer

35. You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this?

36. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

37. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments

38. What does the Directory Replicator service allow you to do?

39. A route is a path between two network segments

40. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols

41. Fibre Optic cable is often used to

42. Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port

43. You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this?

44. A cut-through switch reads the entire packet before forwarding it to the destination segment

45. A Trust Relationship

46. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?

47. User Manager for domains

48. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?

49. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?

50. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration”?

51. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from

52. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports

53. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?

54. Server Manager

55. Bridges introduce small delays into a network.

56. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

57. Your company uses both Ethernet and token-ring LAN’s in the same building. Users need access to resources and the ability to transmit data between the LAN’s. Which device would you use to enable communications between dissimilar LAN’s that use different protocols?

58. Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use?

59. Each network segment must have a unique address

60. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *