The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this? Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users None of these Create a mandatory user profile and lock all the program groups TRUE ANSWER : ? YOUR ANSWER : ?
With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports A token contains information that is used to route messages between rings True None of these The station that hold the token has the highest priority on the network FALSE TRUE ANSWER : ? YOUR ANSWER : ?
Fibre Optic cable is often used to None of these overcome distance limitations link remote sites using a WAN connection connect PC's to wall outlets replace UTP because it is cheaper TRUE ANSWER : ? YOUR ANSWER : ?
A Trust Relationship is bi-directional [both way] is an administrative and communication link created between two Windows NT Server domains is created using server Manager for Domains can be created between Windows NT W/S computers None of these TRUE ANSWER : ? YOUR ANSWER : ?
A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation? None of these A master domain mode, with each engineer trusting the master domain and the data stored on the server A complete trust mode, with each engineer's computer trusting the other engineer's computers A single domain mode, with all data kept on the controller for the domain A workgroup mode, with each engineer administering his or her own computer TRUE ANSWER : ? YOUR ANSWER : ?
When of the following is a system default profile used? When, after the user has logged on, the personal or mandatory profiles are missing or corrupted When there is no user logged on at the computer None of these When a user has logged on using the Guest account When the local accounts database recognizes that the user logging on has never done so from this computer TRUE ANSWER : ? YOUR ANSWER : ?
Your company uses both Ethernet and token-ring LAN's in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's that use different protocols? bridge repeater router None of these gateway TRUE ANSWER : ? YOUR ANSWER : ?
In building cabling, horizontal wiring from the telecommunications closet (TC) to the wall outlet has a distance limitation of None of these 300 meters 3 meters 90 meters 6 meters TRUE ANSWER : ? YOUR ANSWER : ?
Bridges are ideally used in environments where there a number of well defined workgroups FALSE True A workgroup mode, with each engineer administering his or her own computer A complete trust mode, with each engineer's computer trusting the other engineer's computers None of these TRUE ANSWER : ? YOUR ANSWER : ?
Routers are often used to implement FIREWALLS None of these FALSE In the System option in Control Panel, select the setting that allows users to log on locally In the System option in Control Panel, set the user environment variables to allow Maria to log on locally True TRUE ANSWER : ? YOUR ANSWER : ?