36951. Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI?
36952. What does the transport protocol do?
36953. Bridges operate at the MAC layer (layer 2 of the OSI model.)
36954. You need to install network adapters in 20 ISA-bus computers. Which rule must you follow when installing the network adapters?
36955. Routers are often used to implement FIREWALLS
36956. You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose?
36957. Maria needs to install software on a Windows NT Server computer which is a backup domain controller. When she attempts to log on to the server, she receives the message "Unable to log on locally". What must you do to enable Maria to log on to the server?
36958. Why does a high number of broadcast messages adversely affect overall network performance?
36959. You want to find out which users are currently using a specific directory on a Windows NT Server computer. How should you do this?
36960. Dynamic Host Configuration Protocol [DHCP]
36961. Bridges are ideally used in environments where there a number of well defined workgroups
36962. A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation?
36963. A one-way trust relationship has been established in which the RESEARCH domain trusts the TESTING domain. The Guest account is disabled in both domains. As a user belonging to a global group called Testers in the TESTING domain, you want to access a shared directory on a Windows NT Advanced Server in the RESEARCH domain. Which action would give you access?
36964. Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships?
36965. When of the following is a system default profile used?
36966. In UTP Cat 5 wiring, patch cables from the wall outlet to the PC have a distance limitation of
36967. In which of the following cable systems are T connectors and terminators are used?
36968. An ethernet switch works at the protocol layer
36969. You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this?
36970. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?
36971. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments
36972. What does the Directory Replicator service allow you to do?
36973. A route is a path between two network segments
36974. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols
36975. Fibre Optic cable is often used to
36976. Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port
36977. You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this?
36978. A cut-through switch reads the entire packet before forwarding it to the destination segment
36979. A Trust Relationship
36980. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?
36981. User Manager for domains
36982. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?
36983. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?
36984. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?
36985. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from
36986. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports
36987. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?
36988. Server Manager
36989. Bridges introduce small delays into a network.
36990. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment
36991. Your company uses both Ethernet and token-ring LAN's in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's that use different protocols?
36992. Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use?
36993. Each network segment must have a unique address
36994. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?
36995. How do you configure a printing pool?
36996. In heavily overloaded networks, cross¬bar switching offers better performance than cell-backplane switching
36997. You want to connect 2 networks that are both lOBaseT Ethernet networks. The 2 networks are located in separate buildings so that they are approximately 1,000 meters apart. Which media should you use?
36998. You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do?
36999. In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem?
37000. Which of the following is a clayey soil that has never been subjected to an effective pressure greater than existing overburden pressure and which is also completely consolidated by the existing overburden pressure?