Windows NT Bridges are ideally used in environments where there a number of well defined workgroups A complete trust mode, with each engineer's computer trusting the other engineer's computers FALSE A workgroup mode, with each engineer administering his or her own computer None of these True A complete trust mode, with each engineer's computer trusting the other engineer's computers FALSE A workgroup mode, with each engineer administering his or her own computer None of these True ANSWER DOWNLOAD EXAMIANS APP
Windows NT A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation? A master domain mode, with each engineer trusting the master domain and the data stored on the server A workgroup mode, with each engineer administering his or her own computer None of these A complete trust mode, with each engineer's computer trusting the other engineer's computers A single domain mode, with all data kept on the controller for the domain A master domain mode, with each engineer trusting the master domain and the data stored on the server A workgroup mode, with each engineer administering his or her own computer None of these A complete trust mode, with each engineer's computer trusting the other engineer's computers A single domain mode, with all data kept on the controller for the domain ANSWER DOWNLOAD EXAMIANS APP
Windows NT Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use? repeater T connecter router gateway None of these repeater T connecter router gateway None of these ANSWER DOWNLOAD EXAMIANS APP
Windows NT Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this? Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only Use the Services option in Control Panel to start the Alerter service to audit logon attempts Use Performance Monitor to create a log of all logon attempts None of these Use User Manager for Domains to set an Audit policy for all logon attempts Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only Use the Services option in Control Panel to start the Alerter service to audit logon attempts Use Performance Monitor to create a log of all logon attempts None of these Use User Manager for Domains to set an Audit policy for all logon attempts ANSWER DOWNLOAD EXAMIANS APP
Windows NT Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols True False. True False. ANSWER DOWNLOAD EXAMIANS APP
Windows NT In which of the following cable systems are T connectors and terminators are used? Token Ring Thin Ethernet None of these lOBase T FDDI Token Ring Thin Ethernet None of these lOBase T FDDI ANSWER DOWNLOAD EXAMIANS APP