Windows NT Bridges are ideally used in environments where there a number of well defined workgroups FALSE None of these True A complete trust mode, with each engineer's computer trusting the other engineer's computers A workgroup mode, with each engineer administering his or her own computer FALSE None of these True A complete trust mode, with each engineer's computer trusting the other engineer's computers A workgroup mode, with each engineer administering his or her own computer ANSWER DOWNLOAD EXAMIANS APP
Windows NT When of the following is a system default profile used? When a user has logged on using the Guest account None of these When the local accounts database recognizes that the user logging on has never done so from this computer When there is no user logged on at the computer When, after the user has logged on, the personal or mandatory profiles are missing or corrupted When a user has logged on using the Guest account None of these When the local accounts database recognizes that the user logging on has never done so from this computer When there is no user logged on at the computer When, after the user has logged on, the personal or mandatory profiles are missing or corrupted ANSWER DOWNLOAD EXAMIANS APP
Windows NT You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose? In the System option in Control Panel, select the setting that allows users to log on locally DLC None of these In the System option in Control Panel, set the user environment variables to allow Maria to log on locally PPP In the System option in Control Panel, select the setting that allows users to log on locally DLC None of these In the System option in Control Panel, set the user environment variables to allow Maria to log on locally PPP ANSWER DOWNLOAD EXAMIANS APP
Windows NT What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification? None of these The station that hold the token has the highest priority on the network Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used A token contains information that is used to route messages between rings The station that holds the token is allowed to transmit a message on the network None of these The station that hold the token has the highest priority on the network Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used A token contains information that is used to route messages between rings The station that holds the token is allowed to transmit a message on the network ANSWER DOWNLOAD EXAMIANS APP
Windows NT In building cabling, horizontal wiring from the telecommunications closet (TC) to the wall outlet has a distance limitation of 3 meters 300 meters 6 meters None of these 90 meters 3 meters 300 meters 6 meters None of these 90 meters ANSWER DOWNLOAD EXAMIANS APP
Windows NT You want to find out which users are currently using a specific directory on a Windows NT Server computer. How should you do this? Use Disk Administrator Use User Manager for Domains Use Windows NT Explorer Use Server Manager Use Disk Administrator Use User Manager for Domains Use Windows NT Explorer Use Server Manager ANSWER DOWNLOAD EXAMIANS APP