Windows NT
The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?

Create a mandatory user profile and lock all the program groups
None of these
Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users
Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access
Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group

ANSWER DOWNLOAD EXAMIANS APP

Windows NT
There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

JohnY cannot access the printer with this configuration
Make JohnY a member of the DESIGN Domain Guests group
None of these
Make JohnY a member of the DESIGN Domain Users group
Do nothing. JohnY can access the printer now

ANSWER DOWNLOAD EXAMIANS APP

Windows NT
In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem?

incorrect subnet mask on your client computer
defective network adapter in the router
incorrect termination of the destination network
malfunctioning repeater
None of these

ANSWER DOWNLOAD EXAMIANS APP

Windows NT
With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports

None of these
The station that hold the token has the highest priority on the network
True
A token contains information that is used to route messages between rings
FALSE

ANSWER DOWNLOAD EXAMIANS APP

Windows NT
When of the following is a system default profile used?

None of these
When, after the user has logged on, the personal or mandatory profiles are missing or corrupted
When there is no user logged on at the computer
When a user has logged on using the Guest account
When the local accounts database recognizes that the user logging on has never done so from this computer

ANSWER DOWNLOAD EXAMIANS APP