Windows NT
A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation?

None of these
A master domain mode, with each engineer trusting the master domain and the data stored on the server
A complete trust mode, with each engineer's computer trusting the other engineer's computers
A single domain mode, with all data kept on the controller for the domain
A workgroup mode, with each engineer administering his or her own computer

ANSWER DOWNLOAD EXAMIANS APP

Windows NT
The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?

None of these
Create a mandatory user profile and lock all the program groups
Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access
Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group
Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users

ANSWER DOWNLOAD EXAMIANS APP

Windows NT
What must you do to create a printer pool containing four shared printers on your Windows NT Server computer?

Specify the same printer driver and settings for all printers
Set up all printers as network-interface printer devices
Set individual printer properties for each printer
None of these
Set up all the printers to share the same parallel port

ANSWER DOWNLOAD EXAMIANS APP

Windows NT
What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?

Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used
A token contains information that is used to route messages between rings
The station that hold the token has the highest priority on the network
The station that holds the token is allowed to transmit a message on the network
None of these

ANSWER DOWNLOAD EXAMIANS APP