发信人: bok()
整理人: reynolds(1999-10-19 00:07:32), 站内信件
|
1. You're an administrator of a growing network that use s TCP/IP.
Broadcast traffic on your network is increasing dramatic ally. What
is the best way to decrease the amount of broadcast traf fic on
your network?
a. install a WINS server
b. install a DHCP server
c. divide your network into two physical subnets and ins tall a
bridge
d. divide your network into two logical subnets and inst all a
gateway
Ans:A
A is correct. If a network running TCP/IP does not contain a
WINS server, then each computer on the network must send a b-node
broadcast message to locate another computer on the netw ork. WINS
servers provide computer-name-to-IP address resolution t hat
reduces the number of broadcast messages. Dividing a net work into
logical subnets does not reduce the number of broadcast messages.
2. Which of the following is an advantage of the SLIP mo dem
protocol over the PPP modem protocol?
a. SLIP requires less system overhead than PPP.
b. SLIP supports security while PPP does not support sec urity.
c. SLIP supports error checking while PPP does not suppo rt error
checking.
d. SLIP supports flow control while PPP does not support flow
control.
Ans:A
A is correct. RAS supports three modem protocols: SLIP, PPP and
RAS. SLIP (Serial-Line Internet Protocol) was originally developed
for UNIX machines and is still widely accepted among Int ernet
providers. Though it provides good performance with litt le system
overhead needed, it does not support error checking, flo w control
or security. The Point-to-Point Protocol (PPP) is useful for
connecting to UNIX hosts or Internet providers. Though i t requires
more overhead than SLIP, PPP provides error checking and recovery.
3. MaryJo is the local user of a member server in your d omain. Her
username is MaryJo and she uses a local profile stored o n the C
drive of her machine. In what directory are MaryJo's des ktop
shortcuts stored?
a. C:\Winnt\Profiles\Desktop
b. C:\Winnt\Profiles\MaryJo\Desktop
c. C:\Winnt\MaryJo\Profiles\Desktop
d. C:\Winnt\Profiles\Desktop\MaryJo
Ans:B
B is correct. Each user on a workstation has a directory named
after their username that is a subdirectory of the Winnt \Profiles
directory. The directory called Desktop is a subdirector y of the
C:\Winnt\Profiles\<username> directory, and it contains desktop
items including shortcuts and files. Shortcut files have a suffix
of LNK.
4. You want to create a new partition using the free spa ce on a
SCSI hard disk. You choose Create on the Partition menu in Disk
Administrator and enter the desired size in the Create L ogical
Drive of Size dialog box. A new logical drive now appear s in Disk
Administrator. What else must you do before you can form at the
partition?
a. choose Mark Active from the Partition menu
b. choose Mark Primary from the Partition menu
c. choose Commit Changes Now from the Partition menu
d. assign a volume label
Ans:C
C is correct. Partitions and drives are not actually created
unless you commit the changes. To commit changes to driv es and
partitions, choose Commit Changes Now from the Partition menu in
Disk Administrator. You will automatically be prompted t o commit
or cancel changes you have made when exiting Disk Admini strator.
5. There are 40 Windows NT computers on your network tha t print to
an HP LaserJet attached to a Windows NT print server. Yo u have
just obtained an updated printer driver. What is the bes t way to
update the driver for all computers that print to this p rint
server?
a. update the driver on the print server and do nothing more
b. update the driver on all client computers; there is n o need to
update the server
c. create a separate printer with the updated driver on the print
server, and instruct all client computers to print to th e new
printer
d. update the driver on the print server, and instruct a ll client
computers to download the updated driver from the server
Ans:A
A is correct. The best way to update a printer driver is simply
to update the driver on the print server. There is no ne ed to
manually update the driver on each client computer. When a client
computer attempts to print to the print server, the upda ted driver
will be copied automatically to the client.
6. You receive several calls from users who are trying t o print to
a print server. They complain that they have sent severa l jobs to
the print server, but the jobs have not printed and cann ot be
deleted. What must you do to resolve the problem?
a. delete all files from the spool folder on the print s erver
b. select Services in Control Panel on the print server, stop the
spooler service, and then restart it
c. make sure that the Pause printing option is not check ed on the
print server
d. delete the stalled printer from the print server and create a
new printer
Ans:B
B is correct. The scenario described is a typical case of
stalled print spooler. To fix the problem, select Servic es in
Control Panel, stop the spooler service, and then restar t it. This
will generally solve the problem. If the problem persist s, then
you can try to delete all files from the spool folder. H owever,
deleting all files from the spool folder alone will not solve the
problem.
7. Your HP LaserJet IIIsi printer has its own network in terface
card and is connected directly to the network. You want to manage
the printer from your Windows NT computer, but you canno t find the
option to install a port for the printer. Which of the f ollowing
is the most likely cause of the problem?
a. the DLC print driver is not installed for the printer
b. the DLC protocol is not installed on the print server
c. the LaserJet IIIsi is not connected directly to the p rint
server
d. there are too many LaserJet IIIsi printers connected to a
single print server
Ans:B
B is correct. Unlike most printers, HP network interface print
devices do not have to be connected directly to a print server.
However, to use these printers on a network you have to install
the DLC protocol through the Network option in Control P anel on
the print server. Other types of network interface print devices
may require the installation of vendor-specific print se rvices.
8. Which application would you use on the PDC to view th e role of
all computers in the domain?
a. User Manager for Domains
b. Server Manager
c. Windows NT Explorer
d. Network Administrator
Ans:B
B is correct. Windows NT Server Manager is used to manage all
servers and workstations. It lists all computers and the ir roles
(Primary Domain Controller, Backup Domain Controller, Wo rkstation
or Server) in the Server Manager window. Server Manager can also
be used to promote a BDC to a PDC.
9. Lucy is retiring and Bill is her replacement. What is the best
way to provide Bill with the same level of access to all of the
network resources previously used by Lucy?
a. From Server Manager, create an account for Bill using Lucy's
account as a template. Delete Lucy's account.
b. From User Manager for Domains, create an account for Bill using
Lucy's account as a template. Delete Lucy's account.
c. From Server Manager, rename Lucy's account. Instruct Bill to
change the password to the account when he logs on for t he first
time.
d. From User Manager for Domains, rename Lucy's account. Instruct
Bill to change the password to the account when he logs on for the
first time.
Ans:D
D is correct. User accounts are created, maintained, and delete d
through User Manager for Domains, not Server Manager. Re naming an
existing account is better than copying an existing acco unt
because the original account's description and file perm issions
are retained. The password is also retained and it is th erefore
important that the new user changes the password at the first
logon.
10. Field engineers in your group use their own computer s to log
on to the RAS server on your network. No standards are i n place
for how field engineers establish connections to your ne twork via
RAS. What is the best way to configure your RAS server t o allow
the field engineers access while still maintaining the h ighest
level of security?
a. select Allow Any Authentication Including Clear Text
b. select Require Encrypted Authentication
c. select Require Microsoft Encrypted Authentication
d. select Require Data Encryption
Ans:A
A is correct. Since the field engineers are accessing your RAS
server with their various non-standardized systems, impl ementing
any type of authentication or data encryption could prev ent some
of the engineers from accessing your network. Even thoug h security
is a concern, the most secure type of authentication in this
scenario is Allow Any Authentication Including Clear Tex t.
11. Which of the following are supported by PPP clients running
applications on a Windows NT Server computer using RAS?
a. named pipes
b. Remote Procedure Calls
c. WinSock API applications using TCP/IP
d. WinSock API applications using IPX
Ans:a,b,c,d
All is correct. The Point-to-Point Protocol is a universal
standard that allows any client machine using Remote Acc ess
Service to run applications using a variety of multi-pla tform
technologies including Windows Sockets APIs, named pipes , and
Remote Procedure Calls.
12. The Vice President of your department wants some num eric
statistics on how the new servers he purchased for your department
are currently performing in a variety of areas including CPU
usage, page caching, and handling network traffic. Which option
must you choose from the View menu in Windows NT Perform ance
Monitor to produce a ledger of current performance stati stics for
the Vice President?
a. Alert
b. Chart
c. Log
d. Report
Ans:D
D is correct. Report view presents values in a column rather
than a graph. The values presented in Report view are an average
of the last two data reads separated by the entered time interval.
Chart view displays relationships and trends in either r eal time
or from a log. The log file is a binary file that is use d to store
system activities for later analysis using Chart, Report or Alert
view. Alert view is most often used to enable you to per form other
tasks while insuring notification, should a selected val ue or set
of values qualify for particular criteria that you speci fy.
13. The paging file on your Windows NT Server computer h as
expanded beyond its specified initial size. Which of the following
are likely to occur?
a. the number of disk I/Os will increase
b. the disk containing the paging file will become more fragmented
c. less RAM will be available for applications
d. applications will take longer to start
Ans:B, D
B,D are correct. Allowing the paging file to grow past its
initial size fragments the disk containing the paging fi le and
increases the start time for applications. Allowing the paging
file to grow past its initial size has no direct effect on the
amount of RAM available to applications and the number o f disk
I/Os per a given time interval.
14. You accidentally delete a user's account on a BDC an d must
recreate it with the same permissions and rights. What i s the best
way to accomplish this?
a. assuming that the PDC has not performed synchronizati on yet,
highlight the deleted user account in User Manager for D omains,
select Undelete from the User menu
b. recreate a new user account with the same name and as sign it
the security identifier (SID) of the deleted account
c. recreate a new user account with the same name and as sign it
all the permissions and rights of the deleted account
d. recreate a new user account with the same name; permi ssions and
rights will be retained since they are contained in the access
control lists (ACLs) for domain objects (files, director ies, etc.)
Ans:C
C is correct. User or group accounts cannot be recreated once
they have been deleted regardless of whether or not
synchronization has occurred. An administrator's only op tion is to
recreate the user's account from scratch or by using a t emplate if
one is available. Permissions and rights must be manuall y
reassigned to the account. SIDs cannot be re-used once a ccounts
have been deleted. Since the SID, not the username, is r ecorded in
each object's ACL, recreating a new user account with th e same
username as the deleted account will not re-establish th e deleted
account's permissions and restrictions with the new user account.
15. Your network uses NetBEUI, TCP/IP, and NWLink as pro tocols.
The binding order of these protocols on your servers and
workstations is TCP/IP, NWLink, and NetBEUI. The majorit y of users
on your network are accessing its resources using NetBEU I. Where
must the binding order of the protocols be changed to sp eed up the
network?
a. on the workstations only
b. on the servers only
c. on the domain controllers only
d. on both the workstations and servers (including the d omain
controllers)
Ans:A
A is correct. The protocol used most frequently should be bound
first. This will speed up network connections. Since ser vers use
whatever protocol is sent to them by each workstation, t he binding
order needs only to be changed on the workstations. Netw ork speed
is affected by the binding order on the workstations but not on
the servers.
16. Several NetWare 3.x clients on your network need to access
files on your Windows NT server. Which of the following must be
installed on your Windows NT server?
a. Client Service for NetWare
b. File and Print Services for NetWare
c. Gateway Service for NetWare
d. the NWLink protocol
Ans:B, D
B,D are correct. The Windows NT server will require the NWLink
protocol to communicate with NetWare clients and servers . It will
also require the File and Print Services for NetWare add -on module
to allow NetWare clients and servers to access its files and
printers. Client Service for NetWare is designed for Win dows NT
workstations that require a direct link to NetWare serve rs.
Gateway Service for NetWare is used to allow Windows NT servers to
map a drive to a NetWare server thus providing access to NetWare
server resources for Windows NT workstations (via a gate way).
17. You have created an uncompressed file called MyPaper .doc in
the Documents folder on an NTFS partition. The Documents folder is
not compressed. Now you move the file MyPaper.doc to a c ompressed
folder called TermPaper on a different NTFS partition. W hich of
the following will occur?
a. The file will stay uncompressed.
b. The file will inherit the compression attribute from the target
folder.
c. The file will inherit the compression attribute from the target
partition.
d. A dialog box will appear, asking you whether you want to
compress the file in the target folder.
Ans:B
B is correct. If you move a file between NTFS partitions,
Windows NT will copy the file to the destination folder first,
then delete the original file. Therefore, the file will inherit
the compression attribute from the target folder. Howeve r, if you
move a file within the same NTFS partition, then the fil e will
retain its original compression attribute.
18. Which of the following procedures will allow you to install
Windows NT Server over the network onto an MS-DOS comput er?
a. booting the MS-DOS computer from the Network Installa tion
Startup Disk and running Setup.exe from the command prom pt
b. connecting to the network directory that contains the Windows
NT installation files and running Winnt.exe
c. connecting to the network directory that contains the Windows
NT installation files and running Winnt32.exe
d. connecting to the network directory that contains the Windows
NT installation files and running Setup.exe
Ans:B
B is correct. You can install Windows NT Server onto an MS-DOS
machine over the network by running Winnt.exe. Winnt32.e xe is used
to upgrade the operating system on machines already runn ing
Windows NT. Setup.exe is not the Setup program for Windo ws NT.
19. How do you demote a BDC to a file server?
a. by reinstalling Windows NT Server
b. by selecting the BDC in Server Manager, and choosing Demote on
the Computer menu
c. by choosing the Network option in Control Panel, sele cting the
BDC, and clicking Demote
d. by restarting the BDC, and choosing Member Server at the
startup screen
Ans:A
A is correct. You can promote a BDC to a PDC by using Server
Manager. However, you need to reinstall Windows NT Serve r to
change the role of the server from a member server to a domain
controller, or vice versa. In this case you will need to reinstall
Windows NT Server and select Stand-Alone or Member Serve r when the
system asks you to choose a role for the server.
20. Scott was a member of the Quality Assurance group. N ow he has
been reassigned to the Application Development team. As a result,
he needs access to program source files in the \Source d irectory
on the file server. The Application Development and Admi nistrators
groups have Full Control permissions to the \Source dire ctory. The
Everyone group has Read permission and the Quality Assur ance group
has No Access permission. After logging on as a member o f the
Application Development group, Scott notices that he sti ll cannot
access the files in the \Source directory on the file se rver. What
is the best way for Scott's domain administrator to gran t him the
required access to the \Source directory?
a. remove Scott's user account from the Quality Assuranc e group
b. remove Scott's user account from the Quality Assuranc e group
and the Everyone group
c. grant all permissions for the \Source directory to Sc ott's user
account
d. add Scott's user account to the Administrators group
Ans:A
A is correct. If a user belongs to a group that has No Access
permissions for an NTFS directory, then, regardless of o ther
permissions a user may have through their individual use r account
or from other groups, they will be denied access to that NTFS
directory. Even if Scott was added to the Administrators group, he
would still not be able to access files in the \Source d irectory.
The only way to grant Scott full access to the \Source d irectory
is to remove his user account from the Quality Assurance group.
User accounts cannot be removed from the Everyone group.
21. Several Windows for Workgroups 3.11 clients on your Windows NT
network need access to resources located on a NetWare se rver in
your domain. How can Windows for Workgroups 3.11 clients access
the NetWare server without installing new client softwar e?
a. install Gateway Service for NetWare on a Windows NT s erver, and
create a group called NTGATEWAY on the NetWare server
b. install Gateway Service for NetWare on a Windows NT s erver and
create a user account called NTGATEWAY on the NetWare se rver
c. install Gateway Service for NetWare on the NetWare se rver
d. install NWLink on a Windows NT server
Ans:A
A is correct. The Gateway Service provides access to NetWare
servers for the computers of Microsoft network clients t hat are
not running NetWare client software. Client Gateway Serv ice is
installed on workstations that want to access NetWare re sources
directly (without the use of a gateway).
22. Jessica configures her UPS service settings to detec t a power
failure signal and to wait five seconds between the dete cted power
failure signal and the initial warning message. Her UPS is fully
charged and has five minutes of battery life. It has the proper
UPS cable connections to her computer and is plugged in properly
to the computer and the power source. To test her UPS se rvice
settings, Jessica unplugs the UPS from its power supply. To her
surprise, she does not receive a warning message after f ive
seconds and her computer's power is terminated immediate ly after
five minutes. What is the most likely cause of the probl em?
a. the Delay Between Warning Message setting is greater than 300
seconds (five minutes)
b. the Expected Battery Life setting is greater than the actual
battery life of the UPS
c. the Expected Battery Life setting is less than the ac tual
battery life of the UPS
d. the UPS Interface Voltage for the power failure signa l is set
incorrectly
Ans:D
D is correct. If the UPS Interface Voltage for the power failur e
signal is not set according to the UPS manufacturer's in structions
(e.g., UPS sends a positive signal and Windows NT is exp ecting a
negative signal), then the power failure signal sent fro m the UPS
would not be recognized by the UPS service. The Windows NT machine
will lose power immediately after the battery life of th e UPS is
exhausted (after five minutes). A similar situation woul d occur
had the UPS cable been missing entirely. This and other
unpredictable results could occur if a standard RS-232 c able (not
a UPS cable) was being used.
23. Which of the following counters should be monitored to
determine if excessive paging is occurring on a machine running
Windows NT 4.0?
a. Avg. Disk Sec/Transfer
b. Pages/Sec
c. Usage Peak (bytes)
d. % Usage
Ans:A,B
A,B are correct. The product of the Avg. Disk Sec/Transfer
counter and the Pages/Sec counter equal the percentage o f disk
access time being devoted to paging. If this number is g reater
than ten percent over an extended period of time, then a paging
problem exists. The Usage Peak (bytes) and % Usage count ers are
used to determine if the paging file size is approaching its
maximum.
24. Which of the following statements are true of RAS Au toDial?
a. it maps network addresses to RAS phonebook entries
b. it is automatically enabled when you start your compu ter
c. it requires at least one TAPI dialing location
d. it works over NetBEUI, TCP/IP or IPX/SPX connections
Ans:A,B,C
A,B,C are correct. RAS AutoDial maps network addresses to RAS
phonebook entries. It automatically attempts to create a network
connection when a network address is referenced from an
application or from the command line. AutoDial is automa tically
enabled when you start your computer. However, it only f unctions
with the TCP/IP or NetBEUI protocol and requires at leas t one TAPI
dialing location.
25. Your Windows NT Server computer contains two IDE dis ks on the
same controller card. Each disk contains one and only on e primary
partition. The Windows NT Server operating system is loc ated on
the first hard disk, and the boot files are located on t he second
hard disk. Which of the following is the correct ARC nam e for the
system partition?
a. multi(0)disk(1)rdisk(0)partition(1)
b. multi(0)disk(0)rdisk(1)partition(1)
c. multi(0)disk(0)rdisk(0)partition(0)
d. multi(1)disk(1)rdisk(1)partition(1)
e. multi(1)disk(1)rdisk(0)partition(0)
Ans:B
B is correct. A typical ARC (Advanced RISC Computing) name
follows the format: multi(x)disk(y)rdisk(z)partition(a).
The two valid options are "scsi" and "multi" for the fir st part of
the ARC name. "Scsi" is used for a SCSI disk with its BI OS
disabled. "Multi" is used for disks other than SCSI or a SCSI disk
with its BIOS enabled. The number after "multi" is the o rdinal
number of the hardware adapter card (starts from 0). The number
after "disk" is the SCSI bus number and will always be 0 for a
non-SCSI disk or for a SCSI disk with its BIOS enabled. The number
after "rdisk" is the ordinal number of the disk (starts from 0).
The number after "partition" is the ordinal number of th e
partition
-- ※ 来源:.月光软件站 http://www.moon-soft.com.[FROM: 210.77.160.82]
|
|