Windows NT In which of the following cable systems are T connectors and terminators are used? Thin Ethernet None of these Token Ring lOBase T FDDI Thin Ethernet None of these Token Ring lOBase T FDDI ANSWER DOWNLOAD EXAMIANS APP
Windows NT In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem? defective network adapter in the router incorrect subnet mask on your client computer None of these incorrect termination of the destination network malfunctioning repeater defective network adapter in the router incorrect subnet mask on your client computer None of these incorrect termination of the destination network malfunctioning repeater ANSWER DOWNLOAD EXAMIANS APP
Windows NT Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships? Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts ACE Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD None of these Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts PUBS • Establish one-way trust relationships in which PUBS trusts ACE ACE trusts CAD Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts ACE Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD None of these Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts PUBS • Establish one-way trust relationships in which PUBS trusts ACE ACE trusts CAD ANSWER DOWNLOAD EXAMIANS APP
Windows NT With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports None of these The station that hold the token has the highest priority on the network True A token contains information that is used to route messages between rings FALSE None of these The station that hold the token has the highest priority on the network True A token contains information that is used to route messages between rings FALSE ANSWER DOWNLOAD EXAMIANS APP
Windows NT You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this? Delete the Administrator account None of these Rename the Administrator account Disable the Administrator account Lock out the Administrator account Delete the Administrator account None of these Rename the Administrator account Disable the Administrator account Lock out the Administrator account ANSWER DOWNLOAD EXAMIANS APP
Windows NT Bridges are ideally used in environments where there a number of well defined workgroups A complete trust mode, with each engineer's computer trusting the other engineer's computers FALSE A workgroup mode, with each engineer administering his or her own computer True None of these A complete trust mode, with each engineer's computer trusting the other engineer's computers FALSE A workgroup mode, with each engineer administering his or her own computer True None of these ANSWER DOWNLOAD EXAMIANS APP