中文国产日韩欧美视频,午夜精品999,色综合天天综合网国产成人网,色综合视频一区二区观看,国产高清在线精品,伊人色播,色综合久久天天综合观看

NT企業(yè)試題摘要

時(shí)間:2024-07-02 23:53:14 學(xué)人智庫 我要投稿
  • 相關(guān)推薦

NT企業(yè)試題摘要

Use this utility if you"re upgrading from an MS-DOS or Windows 95 computer to Windows NT. If you"re upgrading Windows 95 to Windows NT, then you must install Windows NT in a different directory since Windows 95 cannot be automatically upgraded to Windows NT. Winnt32.exe => Use this utility to upgrade a PREVIOUS version of Windows NT to a newer version of Windows NT. When you use the "winnt32.exe" utility to upgrade an existing Windows NT computer, then the system files are upgraded in the background. The /udf switch is used to specify the Uniqueness Database File, which along with the /u switch, is used to automate the installation process of Windows NT.

NT企業(yè)試題摘要

59.Bill Slates has just lost his original Windows NT setup disks. How can he re-create the three setup disks without running the actual installation of Windows NT?

A. By running the "winnt.exe" command with the /ox switch from the installation CD. B. By running the "winnt.exe" command from the installation CD. C. By using the Disk Administrator and selecting the Recreate Startup Disks option in the Tools menu. D. By using the Add / Remove Programs applet in the Control Panel. Select the Windows NT Setup tab and choose Recreate Startup Disks. A When you install Windows NT, you"ll have the option of creating the three setup disks for backup. Anytime you lose or damage the three setup disks, then you can use answer (a) to re-create them. However, you must do it from the installation CD.

60.What does the subnet mask do?

A. Tell how many bits represent the network address and how many bits represent the host address. B. Combines many physical networks into one logical network. C. Hides the IP address from the user. D. Provides a route to reach remote networks. A By using subnet, you can differentiate the network address from host address.

61.The World Wide Web is based on which protocol?

A. HTTP B. HTML C. FTP D. SMTP A

62.Which command is used to configure static IP route tables? A. IPCONFIG B. IPROUTE C. TRACERT D. ROUTE D TRACERT is used to determines the route packets take to a destination. IPCONFIG is used to display current TCP/IP configuration values. 63.Which of the following is not part of the TCP/IP protocol suite?

A. ARP B. NetBEUI C. UDP D. ICMP B NetBEUI is a small network protocol designed by Microsoft, which can"t route.

64.Which service is used with TCP/IP to minimize broadcast traffic by mapping NetBIOS names to IP address?

A. DHCP B. DNS C. WINS D. SERVER C DHCP is used for mapping IP address to physical address, DNS is used for mapping host name to IP address.

65.Which of the following statements is right?

A. DNS is static, WINS is dynamic. B. DNS is static, WINS is static too. C. DNS is dynamic, WINS is static. D. DNS is dynamic, WINS is dynamic too. A DNS used a static host name database which changes by manually, and WINS used a dynamic computer name database which changes by automatically sending asking frames.

66.In your network there are two segments on different subnets. There is no routing between the segments, and host names and IP addresses are assigned manually. What must be implemented to allow host name resolution?

A. WINS B. DHCP C. DNS D. DLC C DHCP is used for mapping IP address to physical address, DNS is used for mapping host name to IP address. WINS is used for mapping computer name to IP address

67.You are planning to provide connectivity from your company Intranet to the Internet. What should be used to provide security from Internet related threats?

A. SLIP B. PPP C. PPTP D. Microsoft RAS Protocol C To RAS connection, when it relates Internet, you should choice PPTP. Please remember.

68.You are trying to provide connectivity to the Internet. What transport protocol must you use?

A. AppleTalk B. TCP/IP C. NWLINK D. NETBEUI B TCP/IP is used for Internet.

69.There are two TCP/IP subnets connected with an NT’s IP router. There is only one DHCP server, how can you assign IP address across the subnet?

A. ARP B. RIP for IP C. RIP for NwLink D. DHCP relay agent D RIP for Internet protocol is mainly used for TCP/IP router service. RIP for NWLink IPX/SPX compatible Transport is used for IPX/SPX router service. The DHCP Relay Agent is used to broadcast DHCP messages between a DHCP server and a router.

70.You need to simplify a way to distribute IP addresses on a network. What service should you use?

A. DHCP B. WINS C. DNS D. ARP A DHCP can automate the process of IP distribution on the network.

71.Which file is used as an alternative to WINS?

A. LMHOSTS B. HOSTS C. DNS D. DHCP A DNS and DHCP are two services. HOSTS file is used as an alternative to DNS.

72.Which of the following protocol don"t support routing?

A. NetBEUI B. TCP/IP C. NWLINK D. IPX/SPX B,C,D NetBEUI is a small network protocol designed by Microsoft, which can"t route.

73.When you configure a computer running Windows 98 to use TCP/IP, which of the following must be configured?

A. Subnet Mask B. Default Gateway C. IP address D. DHCP server IP address A,C If your computer needn"t to route to other subnets, you needn"t configure the default gateway.

74.You have got a Single Domain in A and one branch in B. In A you have got the PDC, BDC, DHCP. In B they have got only a Member Server. User of B complains about the slow login and browsing the network. Required result: Less logon validations on the line Optional results: Less DHCP traffic Less synchronization of the PDC and BDC Solution: Install a BDC over the Member server in B; Install DHCP on that BDC. What the propose solution do?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. B You install BDC, this will decrease logon validations on the line, but increase synchronization of the PDC and BDC. You install DHCP on BDC will decrease DHCP traffic.

75.You offer WWW service for 5 Companies. Every company has one registered Domain Name. You want to establish 5 web sites for these company on 1 NT Server with IIS. How will you assign the address?

A. Assign Multiple IP to network Adapter. B. Same IP to each company Name on DNS and IIS. C. Assign separate IP to each WWW folder. D. Wins to assign IP to NetBIOS name. B By using virtual server, you can realize establishing many web sites with on IP address on one computer.

76.You want your NT server act as LAN-to-LAN IP Router. Which MultiProtocol Routing service will you use?

A. Broadcast B. DHCP Relay C. RIP for Internet Protocol D. RIP for NWLink IPX/SPX compatible Transport C RIP for Internet protocol is mainly used for TCP/IP router service. RIP for NWLink IPX/SPX compatible Transport is used for IPX/SPX router service. The DHCP Relay Agent is used to broadcast DHCP messages between a DHCP server and a router.

77.Which of the following services are considered part of the MultiProtocol Router?(Choose all that apply)

A. RIP for IP B. RIP for NWLink IPX/SPX Compatible Transport C. DHCP Relay Agent D. RIP for NetBEUI E. DNS Relay Agent A,B,C The MultiProtocol consists of three parts: RIP for IP, RIP for NWLINK and DHCP Relay Agent. Managing Resources

78.Your company uses a single master domain model with five domains. You want the ablility to easily administer your users" logon scripts. Where is the best place to store the logon script files?

A. In a directory on each user"s workstation B. On a single member server in the trusted domain C. On the PDC of the trusted domain D. In the WinntSystem32ReplImportScripts folder on the PDC of each trusting domain C With a single master domain model, all user accounts reside in the master domain and all user logons are authenticated in the master domain. To make administration of logon scripts as easy as possible, they should be stored in a single place.

79.Mike is a member of group A, B and C. Mike requires access to the database folder. The following permissions of database folder have been assigned: A--change B--Full Control C--Read What are Mike"s effective rights to this share?

A. No Access B. Read C. Change D. Full Control D Mike will receive the most permissive access in this case.

80. Mike is member of three groups: A1, A2, and A3. The rights to a directory called DUTY are shown below: A1 Read A2 Change A3 No access What are Mike"s effective rights in the DUTY directory?

A. Read B. Change C. No Access D. Full control C Because A3 has been assigned No access, Mike will have No Access regardless of the permissions he has been assign in other groups.

81. In your Windows NT network you have one hundred users, which are all using Windows NT Workstation 4.0. You would like all one hundred users to have the same system policies. What should you do?

A. Create the "ntconfig.pol" file and store it in a shared folder on each member server. B. Create the "ntconfig.pol" file and store it in the NETLOGON folder on the PDC. C. Create the "ntconfig.pol" file and store it in the NETLOGON folder on each workstation. D. Create the "ntconfig.pol" file and store it in the home directory of each user. B The "ntconfig.pol" policy file is stored on the PDC of the domain. Each time a user logs onto the domain, the NETLOGON folder is checked automatically on the PDC to see if a system policy file already exists. If the "ntconfig.pol" policy file is present in the NETLOGON folder on the PDC, then the "ntconfig.pol" file is copied onto the user"s local machine and the system policy ( "ntconfig.pol" ) overwrites the system policy that is set on the user"s local machine. To satisfy the scenario, you would use answer b.

82. All profiles for your users are located in their respective profile paths on a member server in your domain. How do mandatory user profiles differ from roaming user profiles for your users?

A. Mandatory user profiles will have their read-only attribute set, whereas roaming user profiles will not. B. The permission settings for mandatory user profiles only allow users to have read access, whereas the permission settings for roaming user profiles allow users to have full access. C. The suffix of a mandatory user profile is .man, whereas the suffix for a roaming user profile is .dat. D. The Mandatory Profile checkbox is set on the User Environment Profile screen in User Manager for Domains if the user has a mandatory profile. If the user has a roaming profile, then the checkbox is clear. C

83. When you use User manager to set location of home directories for some users. Which parameter you should use to replace the user account name?

A. %Homepath% B. %UserName% C. %homeDrive% D. %UserProfile% B This parameter will be automatically replaced by user account name.

84. Mike logons from domain A onto domain B. Domain A trust domain B. The share name of a domain A "s folder is HEAD. The Domain Users group of domain B has Change permission to the folder. The folder is stored on an NTFS partition. Mike user account only has Read permission for the HEAD share and the Domain Users group for the trusted domain has Full Control permission for the HEAD share. What will be Mike"s level of access?

A. Change B. Read C. Full Control D. No access, because the trust is not set up correctly A? The local access level is Full Control, and the network access level is Change. Altogether, the access level should be Change.

85. Mike is member of three groups: A1, A2, and A3. The rights to a directory called DUTY are shown below: A1 Read A2 Change A3 Full Control What are Mike"s effective rights in the DUTY directory?

A. Read B. Change C. No Access D. Full control D Full Control right includes Read and Change right.

86. You"ve given permission to other administrators to administer the directory service on you domain. How can you keep track of the changes being made? Choose from below:

A. Audit file and object access B. Audit use of user rights C. Audit User/Group management D. Audit file read access C? Marker on success side, not failure side.

87. Which folder does the system check by default when looking for system policies?

A. %WINNTROOT%PROFILES B. %WINNTROOT%POLICIES C. %WINNTROOT%SYSTEM32REPLIMPORTSCRIPTS D. %WINNTROOT%SYSTEM32REPLEXPORTSCRIPTS C

88. Where are user profiles stored by default?

A. %WINNTROOT%PROFILES B. %WINNTROOT%POLICIES C. %WINNTROOT%SYSTEM32REPLIMPORTSCRIPTS D. %WINNTROOT%SYSTEM32REPLEXPORTSCRIPTS A

89. What is the name of the system policy file the NT Server looks for by default?

A. CONFIG.POL B. NTCONFIG.POL C. NTUSER.DAT D. USER.DAT B

90. By default, the group EVERYONE gets which permission to newly created folders?

A. No access B. Read C. Change D. Full control D Because of this, you should pay the EVERYONE group more attention.

91. What utility do you use to manually force the BDCs to synchronize to the SAM database on the PDC?

A. User manager B. Server manager C. Performance monitor D. Network monitor B Server manager-> computer ->synchronize with primary domain controller.

92. You would like to audit five print devices in your domain so you can determine which devices are being used the most. In the User Manager for Domains, which of the following events should you audit?

A. File and Object Access events B. Use of User Rights events C. User and Group Management events D. Security Policy Changes events A To enable print device auditing, first select the File and Object Access events to audit in the User Manager for Domains. Then use the Printers folder ( or you can use the NT Explorer ) to select the specific events to audit, and the Event Viewer to view the audited events.

93.Your domain has one hundred users. After creating separate user profiles and directories for all one hundred users in your domain, what else must be done before each user can start using their new profiles?

A. In the User Manager for Domains, enter the full UNC pathname of each users" profile in the User Environment Profile dialog box. B. In the Server Manager, enter the full UNC pathname of each users" profile in the User Environment Profile dialog box. C. In the User Manager for Domains, enter the shared network drive letter and the full UNC pathname of each users" profile in the User Environment Profile dialog box. D. In the User Manager for Domains, enter the shared network drive letter and the full UNC pathname of each users" profile in the User Environment Profile dialog box. A To satisfy the scenario, use answer (a). You would enter the information in the User Profile Path letter-box in the User Environment Profile dialog box.

94. Mary is an administrator in her resource domain, and she needs to add users in the account domain. Which group membership will enable her to do this?

A. She must become a server operator in the account domain. B. She must become an account operator in the account domain. C. She must become an account operator in her resource domain. D. She must become a server operator in her resource domain. B She wants to add users in account domain, so she should surely to be an account operator in the account domain.

95. What must you do to specify the path to user profiles on a Windows NT server?(Choose all that apply)

A. Establish all the user profiles on the PDC. Windows NT will automatically add the user profile path to user accounts. B. In User Manager for Domains, open the Users properties dialog box for a user account, and click the Profiles button to add the user profile path. C. Create a batch file that modifies all users" logon scripts and attach it to a broadcast e-mail message. D. Create a Profiles folder if it does not already exist, and share the folder with everyone. B,D You must assign the path first, and copy to the directory on PDC.

96. You want to use system policy in a domain, where should store the Ntconfig.pol file?

A. Windowssystem32config.pol B. Create system Default profile that contains a shortcut to the directory that contains the policy file C. Save policy in path defined for each user"s profile directory D. Save in NetLogon in PDC D The Ntconfig.pol file for a domain must be install on the PDC "s winntrootsystem32repl ImportScripts directory whose share name is NetLogon.

97. What is the name of the file used to store user profiles?

A. CONFIG.POL B. NTCONFIG.POL C. NTUSER.DAT D. USER.DAT C

98. Which computer can global groups reside on?

A. Windows 98 B. NT workstations C. NT member servers D. NT domain controllers D The global group can only stay in the domain SAM database.

99. You wish to configure your server so that it does not participate in the browsing elections. How?

A. Set the registry setting ChangeServerList = No B. Set the registry setting MaintainServerList = No C. Set the registry setting MaintainServerList = Auto D. Set the registry setting ChangeServerList = Auto B

100. Domain A trusts Domain B. There are a global group named BUG on Domain B. there is a server inside Domain A with a shared directory named FOR. Using NTFS security, the Domain BBUG group has been assigned with read permission for FOR. But the users of BUG are denied access, why?

A. Global group cannot be assigned permissions to resources. B. Some NTFS permission is overriding share permission. C. NTFS security cannot be assigned. D. The relationship is wrong. B If a network user use a resource of network, he will have to pass both the network access and local access. The NTFS control the local access. So if the NTFS of FOR directory is assigned NO ACCESS permission, the user will be deny.

101. An NT workstation does not belong to any domain. In domain A, guest account is disabled. How can you manage users of the workstation to access needed resources in domain A? (Choose two?)

A. Enable guest account. B. Create group A in domain A, add all user groups in the workstation in group A. C. Create group A in domain A, add all users in the workstation in group A. D. Grant group A permissions to resources needed by the workstation. A,C,D? To NT workstation, you would have to establish account in domain so as to logon onto the domain. To 98 computer, this is needless.

102.Which can be applied by system policy? (choose all that apply)

A. Users B. Groups C. Computers D. Subnets A,B,C System can apply to users, groups and computers.

103. Which utility is used to manager NTFS permissions on NT workstations and Windows 98 computers that have the NT remote administration utilities installed?

A. Server manager B. User manager C. Disk administrator D. Explore D Right clicks the folder, and choice the share.

104. Mike is a member of group A, B and C. Mike requires access to the database folder. The following permissions of database folder have been assigned:

A change B Full Control C No Access What are Mike"s effective rights to this share? A. No Access B. Read C. Change D. Full Control A If a user has No Access permission through user or group membership, then it does not matter what other access permissions have been as signed.

105. When you copy a file from an NTFS partition to a FAT partition, which of the following will be happened to the file?

A. Only long filename retained. B. Only permission retained. C. Both a and b. D. Neither a nor b. A FAT partition don"t support local safety.

106. You have a printer and a security problem. Marie, Joe and Peter have to print the monthly checks for the employees. For security reasons not even the administrators are allowed to manage print jobs. Only the person who submitted the job, is able to manage it.

A. Remove all permissions from the printer, give creator owner print permission, make a group PrintCheck, assign Marie, Joe and Peter to the group, give PrintCheck Manage Documents rights. B. Remove all permissions from the printer, give creator owner manage documents, make a group PrintCheck, assign Marie, Joe and Peter to the group, give PrintCheck Print rights. C. Create group, assign Maria, Joe and Peter to group, give group print right. D. Create group, assign Maria, Joe and Peter to group, give group manage documents. B Because print rights give only the person who printed the job to manage it.

107. Mike is a manager in A domain. He and 3 other users belong to MANAGER Global group. B trusts A. The local group on B named ACC already exists. ACC has change permission to a folder PAY in B Domain. Mike needs read permission for PAY directory. Nobody else should have access to that directory. What is the best way to provide him the access?

A. Add global group MANAGER to the local group ACC B. Add Mike"s account to the ACC local group. C. Create new local group in B domain, assign read permission to that local group for PAY and add Mike"s account to that new local group. D. Remove all existing permissions for the PAY. C You should also disable the ACC local group. Connectivity

108.You want use you NT workstation computer logon NetWare server, what should be installed at your workstation to allow you access?

A. CSNW B. GSNW C. File and Print Services for NetWare D. Microsoft Services for NetWare A GSNW and CSNW are used for NT client to access files on NetWare server. FPNW is used for NetWare client to access files on NT server. To CSNW, it commonly is installed on workstation computer and makes a workstation client directly visit a NetWare server. To GSNW, it is installed on NT server computer and used to make many clients to logon NetWare server.

109. Before you can use the Migration Tool for NetWare, what must be installed on the NT server? (Choose all that apply)

A. CSNW B. GSNW C. NWLINK D. FPNW B,C

110. Your Windows NT Server computer is acting as a NetWare gateway. You"ve created a NetWare volume on the Windows NT server and assigned users the appropriate permissions to access a certain folder on the volume. However, users are complaining that they cannot save any files to the folder when they try. What is the most likely cause of the problem?

A. You did not install FPNW along with GSNW. B. You did not remind the clients to install CSNW on their workstations. C. You"ve assigned the NTGATEWAY group on the NetWare server the Read permission. D. You"ve assigned the NTGATEWAY group on the Windows NT server the Read permission. C

111. You have three NT servers and three Novell servers. You are in the process of migrating all users and data from the NetWare server to NT. There are existing user or group accounts on NT, and can be over written. What should you do?

A. Migrate all users. Delete duplicate accounts. B. Overwrite duplicated names. C. Migrate one user at a time using user manager for domain D. Use mapping file D The mapping file is used to specify how users, groups, and passwords will be used on the NT server.

112. You are using the migration tool to transfer user password to an NT server. What is a requirement in order to do this?

A. The NETBEUI protocol must be installed on both the NT server and the NetWare server B. The Microsoft TCP/IP must be installed protocol on both the NT server and the NetWare server C. The NWLink IPX/SPX Compatible transport protocol must be installed on NT server. D. The user password can"t be migrated. D User passwords, login scripts, print queues and print servers can"t be migrated from NetWare to NT server.

113. You"ve installed a client-server database on your Windows NT server and several NetWare clients. You would like the NetWare clients to be able to access the database on the Windows NT server. What should you install on the server to make this possible?

A. NWLink B. FPNW C. FPNW and NWLink D. NWLink and GSNW A

114. Your entire network is using the NWLink IPX / SPX Compatible Transport protocol. Several workstations in your network are having trouble connecting to the network. What is the most likely cause of the problem?

A. The Client Services for NetWare service has not been installed on the troubled clients. B. The incorrect frame type has been specified for the troubled clients. C. The wrong IP address and default subnet mask has been specified for the troubled clients. D. The NE 2000 compatible network card has not been installed on the troubled clients. B In an IPX / SPX environment ( Ethernet or Token Ring ), specifying the incorrect frame type is the most common problem. This is because IPX / SPX CANNOT automatically determine the network packet type.

115. Microsoft provides the ablilithy for Windows NT environments to interoperate with multiple NetWare servers. Which tool provides a single network logon for NetWare 2.x and 3.x users?

A. DSMN B. GSNW C. CSNW D. Migration Tool for NetWare A

116. Which protocol can be used to connect to NetWare servers that are using Sockets-based APIs?

A. AppleTalk B. TCP/IP C. NWLINK D. NETBEUI C NWLINK is IPX/SPX compatible transport protocol.

117. What is required for a NetWare client to print to an NT printer?

A. CSNW B. GSNW C. File and Print Services for NetWare D. Microsoft Services for NetWare C GSNW and CSNW are used for NT client to access files on NetWare server. FPNW is used for NetWare client to access files on NT server. To CSNW, it commonly is installed on workstation computer and makes a workstation client directly visit a NetWare server. To GSNW, it is installed on NT server computer and used to make many clients to logon NetWare server.

118. What do you need to add to the NetWare client computers so that they can access their files on NT?

A. FPNW B. MS client for NetWare C. CSNW D. GSNW B GSNW and CSNW are used for NT client to access files on NetWare server. FPNW is used for NetWare client to access files on NT server.

119. You have 3 NT servers and 3 NetWare servers. You"re in the process of migrating all users and data from the NetWare servers to the NT servers. However you don"t want existing user or group accounts on the NT domain to be overwritten. What is the most efficient way to accomplish this task?

A. Start the migration with the default options. B. Migrate one user at a time using user manager for domain. C. Do the migration, then delete the duplicate account with the user manager. D. Use a mapping file and enter the user, groups and password manually. D The mapping file is used to specify how users, groups, and passwords will be used on the NT server.

120. You are using the migration tool to transfer user accounts to an NT server. What is a requirement in order to do this?

A. The NETBEUI protocol must be installed on both the NT server and the NetWare server. B. The Microsoft TCP/IP must be installed protocol on both the NT server and the NetWare server. C. The NWLink IPX/SPX Compatible transport protocol must be installed on NT server. D. A Windows NT server with a NTFS partition. C

121. Which you must install on an NT server that will be used to connect to NetWare servers running client/server applications, such as an SQL server.

A. CSNW B. GSNW C. NWLINK D. FPNW C If you only want to connect to NetWare server to run client/server application, the NWLINK protocol is sufficient.

122. For the highest level of password security after migrating your NetWare user accounts to NT, which option should you choose?

A. Preserve NetWare password B. Password is C. Assign Random password D. Use the mapping file D The mapping file is used to specify how users, groups, and passwords will be used on the NT server.

123. Which versions of NetWare can be migrated with Migration Tool for NetWare?

A. NetWare 2.x B. NetWare 3.x C. NetWare 4.x D. All of above D

124. In order for GSNW to work, what group must be created?

A. NTGATEWAY on NetWare file server B. NTGATE WAY on the NT Server C. NWGATEWAY on the NetWare file server D. NWGATEWAY on the NT Se

中國(guó)教育熱線">自定短信發(fā)送 移動(dòng)股市

預(yù)定天氣預(yù)報(bào) 言語傳情

手機(jī)短信點(diǎn)播 郵件通知

相關(guān)文章

最近一小時(shí)熱門文章

在美國(guó)打工將涉及到的相關(guān)法律問題

新加坡留學(xué)誤區(qū)、留學(xué)問答和注意事項(xiàng)

雅思“保6爭(zhēng)7”多是騙 外語培訓(xùn)市場(chǎng)陷阱多

快樂地讀書 上海中小學(xué)教育將有情感指標(biāo)

廣東考生考入本省院校不用遷戶口

頻道精選

性,不能不學(xué),怎能不教?!

為做天才輟學(xué)流浪北京 李曙光會(huì)不會(huì)是現(xiàn)代傷仲永

大學(xué)生藝術(shù)貧血令人憂 “開啟藝術(shù)之門”注重啟蒙

北大法律網(wǎng)校首頁

如火如荼的雅思

花樣年華的性教育

>

1.Your company has 250 computers in one location and you want to have centralized management of all user accounts and resources. Which of the following is the best domain model for your company?

A. Single domain.

B. Single master domain.

C. Multiple master domain.

D. Complete trust.

A The single domain model is the best choice for a small network that requires centralized account management as well as centralized resource management. If the network does not need to be divided for organizational purposes, then the single domain model should be sufficient.

2.There are 300 computers on the network. Users belong to three departments, and the user of each department wants to retain full control over its departmental resources. Centralized user account administration is required. Which of the following is the best domain model for this network?

A. Single domain B. Single master domain C. Multiple master domain D. Complete trust B You want Centralized user account administration, so the (D) is wrong. The users of each department want to retain full control over its departmental resources, and the network is not too big, so (B) is better.

3.You have been hired by Harvard University to implement their new Windows NT network. There will be about 50,000 users consisting of full-time / part-time students, staff members, and support staffs. The Dean"s Office would like the administration of all accounts to be centralized. Which of the following domain models should you implement?

A. Single Domain Model B. Single Master Domain Model C. Multiple Master Domain Model D. Complete Trust Domain Model C In the given scenario, you can eliminate answers A and B since the number of users exceeds 40,000. Using the table above, the only possible answer is C

4.Your company is very decentralized and didn"t have a way to coordinate and use central planning when NT was originally installed. Your company has three departments, now, each department has a domain. Now each domain wants to share resource with the other domains. Which of the following is the best domain model for this network?

A. Single domain B. Single master domain C. Multiple master domain D. Complete trust D The domains are already created, and now you need to provide access to resources in other domains. You would set up trust relationships, which would then be the complete trust domain model.

5.You have two separate domains: Mars and Saturn. You have a local group called Techs on the Saturn domain that needs to access resources on the Mars domain. What should you do?

A. Establish a trust relationship between the Mars and Saturn domain, whereby Saturn trusts Mars. Create a NewTechs local group on the Mars domain, assign the newly created group the appropriate permissions, and put the Techs group into the NewTechs group. B. Establish a trust relationship between the Mars and Saturn domain, whereby Mars trusts Saturn. Create a NewTechs local group on the Mars domain, assign the newly created group the appropriate permissions, and put the Techs group into a the NewTechs group. C. Establish a two way trust between the Mars and Saturn domains and move the Techs group to the Mars domain. D. None of the above. D The question states that the Techs group is a local group, and local groups cannot cross trusts. Global groups are used to cross trusts.

6.You have 3 domains: HEAD, MIKE and TOM. Users of HEAD need to access to resources on the MIKE and TOM domains. Users of MIKE need to access to resources on TOM domains. What is the most efficient way to make the trust relationships?

A. Let HEAD trust MIKE and TOM, MIKE trust TOM. B. Let TOM and MIKE trust HEAD, TOM trusts MIKE. C. Let HEAD be on it"s own, make a full trust between the TOM and MIKE domain. D. Implement a full trust. B If A trust B, then A is resource domain, and B is accounting domain.

7.You network consists of two domains, EAST and WEST. There is a two-way trust relationship defined between the two domains. Corporate policy dictates that the administrators in the EAST domain should have administrative rights in the WEST domain, but administrators in the EAST domain should not be able to administer the WEST domain. How do you configure this?

A. Add the EAST domain admins group to the WEST domain admins group. B. Add the EAST domain admins group to the WEST domain administrators group. C. Add the EAST administrators group to the WEST Domain admins group. D. Add the EAST administrators group to the WEST administrators group. B You can only add global groups to local groups.

8.Domains A trust B. A user logon to domain A. What should be done for him to access resources on B?

A. Access permission to A/Domain User B. Access permission to B/Domain User C. Member of A/Domain User D. User cannot access resources on B D Because the trust relationship is wrong, it should be "B trusts A".

9.You have the following domain configuration in your company: Domain MIKE domain HEAD A user logs in from a workstation in the MIKE domain onto the HEAD domain. Which resources the user can access?

A. All resources which are given rights to the HEADDomain users group B. All resources which are given rights to the HEADDomain guests group C. All resources which are given rights to the MIKEDomain users group D. All resources which are given rights to the MIKEDomain guests group A The user logs onto HEAD domain, his account should in HEAD "s account database. When a user account is created, it is automatically added to the domain users group.

10.Your company is using the complete trust model. You are using five domains. How many one-way trust relationships must be configured?

A. 10 B. 20 C. 15 D. 8 B There should be 5*4=20 one-way trust relationships.

11.Which statements are true about local accounts in Windows NT directory services?

A. Local accounts can support interactive logon processes. B. Local accounts cannot support interactive logon processes. C. Local accounts can cross trusts. D. Local accounts cannot cross trusts. B,D

12.You are the administer of the following network: Required Results: Network lines may not be saturated with logon validations. Users from HEAD must access resources on MIKE. Users from HEAD must access resources on TOM. Optional Results: Centralize user management Administrators on the resource must be able to manage access to their own resources Proposed Solution: Use the single domain model Place a PDC and one BDC in HEAD What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. D You placing a PDC, BDC for the HEAD domain only on HEAD, then network lines will be saturated with logon validations.

13.You are the administer of the following network: Required Results: Network lines may not be saturated with logon validations. Users from HEAD domain must access resources on MIKE. Users from HEAD must access resources on TOM. Optional Results: Centralize user management Administrators on the resource domain must be able to manage access to their own resources Proposed Solution: Use the single domain model Place a PDC and one BDC in HEAD Place a BDC for the HEAD domain in each other remote site. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. D? With the single domain model, Users from HEAD can access resources on TOM, MIKE and you can centralize user management. You placing a BDC for the HEAD domain in every other remote site, network lines will not be saturated with logon validations. But the remote sites cannot manage own resources.

14.You are the administer of the following network: Required Results: Network lines may not be saturated with logon validations. Users from HEAD domain must access resources on MIKE. Users from HEAD must access resources on TOM. Optional Results: Centralize user management Administrators on the resource domains must be able to manage access to their own resources Proposed Solution: Use the master domain model Place a PDC and one BDC in HEAD Place a BDC for the HEAD domain in each other remote site. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. A? With the master domain model, Users from HEAD can access resources on TOM, MIKE and you can centralize user management. You placing a BDC for the HEAD domain in each other remote site, network lines will not be saturated with logon validations. The remote sites cannot manage own resources.

15.You have the following domain configuration in your company: Required results: A group called black should be created in HEAD domain. You want Members of the black group must be able to backup all domain controllers in both domains. Optional results: Members of the black group must be able to backup all member servers and all NT Workstations in both domains. Proposed solution: Make a global group HEADblack. Make the local groups HEADbackup, MIKEbackup on domain controllers. Assign the following special users rights to the local groups: Backup Files and Restore Files. Put the global group HEADblack in each local group. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. C The local group backup is only in domain controllers, so user of the global group black can only backup the domain controllers in both domains.

16.You have the following domain configuration in your company: Required results: A group called black should be created in HEAD domain. You want Members of the black group must be able to backup all domain controllers in both domains. Optional results: Members of the black group must be able to backup all member servers and all NT Workstations in both domains. Proposed solution: Make a global group in MIKE named black. Assign the following special users rights to the local groups: Backup Files and Restore Files. Put the global group black in each local group. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. D Will only be able to backup MIKE only, because HEAD does not trust HEAD group.

17.You have the following domain configuration in your company: Required results: A group called black should be created in HEAD domain. You want Members of the black group must be able to backup all domain controllers in both domains. Optional results: Members of the black group must be able to backup all member servers and all NT Workstations in both domains. Proposed solution: Make a global group HEADblack. Make the local groups HEADbackup, MIKEbackup on domain controllers, each member server and each workstation in all domains. Assign the following special users rights to the local groups: Backup Files and Restore Files. Put the global group HEADblack in each local group. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. A The local group backup is on all computers, so user of the global group black can backup all computers in both domains.

18.You have the following domain configuration in your company: Required results: A group called black should be created in HEAD domain. You want Members of the black group must be able to backup all domain controllers in both domains. Optional results: Members of the black group must be able to backup all member servers and all NT Workstations in both domains. Proposed solution: Make a global group on HEAD named black. Make the local groups HEADbackup, and MIKEbackup. Put the local groups in the backup operators group. Put the global group black in each local group. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. D Because you cannot put a local group into another local group(backup operators is a build-in local group). Installation and Configuration

19.Without re-installing the domain controllers, how can you change the domain"s name so that all the workstations and member servers can join the new domain? (Choose all that apply)

A. By changing the domain from Mars to Saturn on the PDC. B. By changing the domain name from Mars to Saturn on all BDCs. C. By changing the domain name from Mars to Saturn on all the workstations and member servers. D. By renaming all global groups to join the Saturn domain instead of the Mars domain. E. By renaming all local groups to join the Saturn domain instead of the Mars domain. A,B,C To change the name of a domain without re-installing Windows NT Server, follow steps a, b and c. You must also re-configure each server and workstation to join the new domain : Control Panel | Network | Identification tab.

20.You company uses the single domain model. You have a PDC and two BDCs. You are in the process of installing a server that will be used by your legal department. Serveral lawyers have stressed that extremely sensitive data will be stored on the server; therefore, only two senior lawyers should have complete access to the data. How do you configure the server?

A. Install the server as a member server, remove the administrators group from the Domain Admins group on the server, and add the two senior lawyers. B. Install the server as a member server, remove the domain Admins group from the administrators group on the server, and add the two senior lawyers. C. Install the server as a BDC, remove the administrators group from the domain admins group on the server, and add the two senior lawyers. D. Install the server as a BDC, remove the domain admins group from the administrators group on the server, and add the two senior lawyers. B Because the server is installed as a member server, it will have its own unique local SAM database. You can then remove the Domain Admins global group from the administrators local group and assign only the users you want to manage the server.

21.During a browser election, which computer would win: an NT server, an NT workstation and Windows 98 computer? A. NT server B. NT workstation C. Windows 98 D. None of above A NT server would have the highest priority in a browser election.

22.If you wanted to configure the PDC to send SAM database updates to the BDCs every three minutes, which utility would you use? A. Server Manager B. Registry Editor C. User Manager D. SQL Server B You can use Registry Editor to amend the parameter that control the SAM database updating which is stored in registry.

23.Which of the following machines would have the highest priority in a browser election? A. NT server configured as a domain controller B. NT server configured as a member server C. NT Workstation D. Windows 98 A

24.How will you do to join an NT workstation to a domain? Assuming the network hardware and software have been configured well.

A. From a domain controller in your domain, add user account and machine name to the domain. From the workstation, enter the domain name and check the create a computer account in the domain checkbox in the identification tab of the network options from control panel. Enter your admin user name and password. B. Supply the guest user account, password, and domain name for the domain to the workstation. C. From the domain controller in your domain, add the workstation machine name to the domain. From server manager on the domain controller, highlight workstation and select import from the user menu to add his local user account to the domain. Enter the domain name on the identification tab of the network option from control panel on workstation. D. The computer will automatically join the domain. A The workstation is different from 98 computer, which will automatically join. Workstation should be allowed by the PDC. Just as the (A) do.

25.Your domain is currently called Mars and you would like to change the domain name to Your Windows NT network currently has one PDC, one BDC, three member servers and 300 workstations. As the administrator of the network, you are receiving complaints from users that logging onto the domain between 09:00 - 10:00 and 13: 00 - 13: 30 is tediously slow. The hardware on all your servers is fine and you do not need to replace them. What can you do to improve user response during the rush hours?

A. Install another PDC onto the domain. B. Install additional BDCs onto the domain. C. Increase the value of the PulseConcurrency on the PDC. D. Install another PDC and additional BDCs onto the domain. B You can eliminate answers a & d because a domain can only have a single PDC. During rush hours, such as morning and after lunch, logon requests are the heaviest. To ease the logon validation between domain controllers, install more BDCs onto the domain.

26.Local groups can reside on: (Choose all that apply)

A. 98 computer B. NT workstation C. NT member servers D. NT domain controllers B,C,D 98 and 95 computer don"t support account group.

27.As a network administrator, if you want to merge two domain, WEST and EAST, into a single domain. How do you reconfigure the BDC on WEST domain to be a member server for the EAST domain?

A. Reconfigure the computer as a member server in WEST, and then join it to the EAST. B. Reinstall the BDC, then configure it as a member server in EAST. C. Update the NT server and rename the domain name from WEST to EAST. D. Directly rename toe domain from WEST to EAST. B To NT system, The domain controller installation and member server installation can"t convert to each other. When you need to convert domain controller to member server, you must reinstall it.

28.Which utility is used to manage NT disk configurations?

A. user manager B. server manager C. Disk administrator D. Presentation manager C The disk administrator lies in the manager tools.

29.What service would you use to maintain a copy of all of the logon scripts on each PDC and BDC within a domain?

A. Domain Admins B. Directory Replication C. Disk administrator D. Server manager B By the name of the service, I think you can choice the right answer.

30.You would like to install Windows NT Server 4.0 on your computer. You would like the computer to act as a member server in a domain called Technicians. Your local domain is currently the Managers domain. Your computer is not physically connected to the Technicians domain. How should you go about installing Windows NT Server 4.0 on your computer?

A. Install the computer as a member server in a workgroup called Technicians. After the installation, physically connect the computer to the Technicians domain and manually configure the computer to join the Technicians domain. B. Install the computer in the Managers domain. After the installation, physically connect the computer to the Technicians domain. The computer will automatically join the Technicians domain if a trust has already been established between the Managers and Technicians domains. C. Install the computer as a BDC in the Technicians domain. After physically connecting the computer to the Technicians domain, use the Server Manager to demote the computer to a member server. D. Install the computer as a PDC in the Technicians domain. After physically connecting the computer to the Technicians domain, use the Server Manager to demote the computer to a member server. A You can eliminate C and D right off the bat because you can never demote a BDC or PDC to a member server through the Server Manager. The only way to demote a BDC or PDC to a member server is by re-installing Windows NT Server on the computer.

31.If you want to replicate login scripts from the PDC to the BDCs in the domain. In what directory should you store the login scripts?

A. winnt_root system32 export scripts B. winnt_root system32 export logon scripts C. winnt_root system32 export netlogon scripts D. winnt_root system32 import netlogon scripts A Logon scripts that need to be replicated should be placed in : winnt_root system32 export scripts *.* , the other directories do not exist.

32. While installing NT server as a member server in HEAD domain you get the message "Could not locate Primary Domain Controller for HEAD domain." What do you do?

A. Install the member Server in a workgroup and join the domain later. B. Change to install as domain control. C. Install the server as a BDC in a workgroup and join the domain later. D. Stop installation till the PDC has been connected. A The message, "Could not locate Primary Domain Controller for HEAD", means that the PDC is now not online. You can install to join a workgroup, and join the domain later.

33.You are installing Windows NT Server 4.0 on a machine. You want the machine to be able to provide file and print resources to members in a domain called Corp, but you do not want it to authenticate user logons. How would you configure the computer?

A. as a PDC in the Corp domain B. as a BDC in the Corp domain C. as a member server in the Corp domain D. as a member server in a workgroup C

34.You want to install a Server. You do not want the server to do User account validation. You want to Allow specific user account & groups from domain to use share resources. How should you install you computer?

A. As a BDC B. As a member server that is a member of workgroup C. As a PDC D. As member server that has joined Domain D Because you don"t want the server to do User account validation, you don"t need a domain controller. So, if you want allow specific user account & group from domain to use share resources, the a member server is the best choice.

35.You have 2 domains: HEAD and MIKE. At the HEAD domain, you must install a Windows NT server as a BDC on computer A which will be used later in the MIKE domain as a member server. How should you proceed?

A. Move the server physically to the MIKE domain and promote it to a member server. B. Only move the server physically to the MIKE domain. C. Move the server physically to the MIKE domain and change the domain name. D. Move the server physically to the MIKE domain and reinstall the computer as a member server. D To NT system, The domain controller installation and member server installation can"t convert to each other. When you need to convert domain controller to member server, you must reinstall it.

36.Your Windows NT Server computer is currently part of a Workgroup called Technicians. You would like your computer to join the Technicians domain. What must be done before you can join the Technicians domain?

A. The administrator must create a new domain account for you and assign you a new domain password. B. The administrator must create a new domain account for you and a new domain name for your computer. C. The administrator must grant your user account the administrative rights for the domain and its password. D. Nothing needs to be done. Any user can join the domain as long as the user is successful when logging onto their own computer in a workgroup with the same name as the domain. C From a local computer"s point of view, only a user with administrative rights, or the Add Workstation to Domain right, can join a computer to the domain.

37.Which utility is used to configure trust relationships?

A. Server Manager B. User Manager for Domains C. Control Panel, Network D. Control Panel, Server B

38.Mike is using a stand alone NT workstation. He wants to join the central domain. He uses the network option in control panel to add the domain name, Central. The admin has already added her computer name to the central domain, which steps could take to log onto the central domain? (Choose all that apply)

A. Create a new user account for her in the central domain B. Ask one of the domain admins of the central domain to create an account for her C. Ask one of the domain admins of a trusting domain of the central domain to create an account for her D. Log onto the central domain using the guest account B You should have an account on the PDC computer.

39.Which utility is used to submit printing job from UNIX host?

A. Telnet B. Lpr C. Lpq D. Ftp B Lpr is used to submit a print job to a LPD print server.Lpq is used to query the print job list of an LPD print server.

40.Mary tries to send a print job to a Macintosh printer on network but fails. Which protocol should she configure?

A. DECnet B. NWLink C. AppleTalk D. DLC C AppleTalk is the protocol designed by APPLE company who has produced the Macintosh computer.

41.You are creating a printing pool with three print devices so that print jobs sent by users from the Exec group can be printed on any of the three print devices. Which of the following statements best describes such a print pool?

A. All print devices in the printing pool must be connected to the same print server. B. All print devices in the printing pool must use the same type of printer port. Therefore, you cannot mix parallel ports with serial or network ports. C. Different printer property settings can be applied to each print device in the printing pool. D. You can direct a particular print job to print to a specific print device in the printing pool without creating a separate printer.26.You want to increase the performance of your database A To create a printing pool, all print devices must be connected to the same print server. However, you can use different types of printer ports. All printer property settings apply to the pool, and each print device cannot have its own separate settings. With a printing pool, all print devices act as a single unit, and it is not possible to direct a print job to a particular print device.

42.You are the system manager of a company with two departments: HEAD, MIKE. The departments print all to the same pool of 2 identical printers. Users of MIKE often use heavy calculation software, which pauses and slows down the print process. Your job is to optimize the printing process. The amount of printer load for each department is shown in the following Table: Department av. pages per day HEAD 1-250 MIKE 1000 Required Results: Print jobs from the HEAD department must always be printed first. Optional Results: Print jobs from the HEAD department must be processed before any large print job from the MIKE department. Prevent the calculations of the accounting department of slowing down the print process. Proposed solution: You are setting up the printer configuration as shown in the table below: HEAD------MIKE Spooling method--print immediately--print after last page is spooled Priority------+99 +1 Rights------Everyone: removed--Everyone: removed Print device----poo one port What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. A The spooling method makes the HEAD print jobs be executed earlier. Because the priority of HEAD is higher than MIKE, Print jobs from the HEAD department will always be printed first. And because the HEAD "s print device is print pooling, it can use both the printer, but MIKE can only use one.

43.You have a system and boot partition on drive c. You want to protect them with disk fault tolerance. Which options of RAID can you use through NT Server software?

A. RAID 1 B. RAID 2 C. RAID 3 D. RAID 4 E. RAID 5 A Only disk mirror can support boot disk fault tolerance.

44.You have four drives in your stripe set with parity, each drive is 1GB in size. How much space will be available to store data?

A. 4GB B. 3.5GB C. 3GB D. 2.5GB C

45. By which do you use a redundant data channel through two disk controllers and two hard drives?

A. Disk mirror B. Disk dulexing C. Strip set D. Strip set with parity B Disk dulexing uses two disk controllers.

46. By which do you use a redundant data channel through one disk controllers and two hard drives?

A. Disk mirror B. Disk dulexing C. Strip set D. Strip set with parity A Disk mirroe uses only one disk controllers.

47.Which is considered by Disk mirroring?

A. RAID 0 B. RAID 1 C. RAID 4 D. RAID 5 B You should remember that Disk mirroring is considered RAID 1, Strip set is considered RAID 0, and Strip set with parity is considered RAID 5.

48.Which is considered by Strip set with parity?

A. RAID 0 B. RAID 1 C. RAID 4 D. RAID 5 D You should remember that Disk mirroring is considered RAID 1, Strip set is considered RAID 0, and Strip set with parity is considered RAID 5.

49.Which RAID levels are supported through NT Server software? (Choose all that apply)

A. RAID 1 B. RAID 2 C. RAID 3 D. RAID 4 E. RAID 5 A,E RAID 1 is disk mirror, RAID 5 is strip set with parity.

50.Assume that you are using five drives in a stripe set with parity. Each drive consists of 500MB. How much disk space will be used for data?

A. 1000MB B. 1500MB C. 2000MB D. 2500MB C Disk striping with parity will use the sum of one drive from the stripe set with parity to store the parity information in stripes across the stripe set.

51.You can have a minimum of ---- drives in a stripe set with parity and a maximum of ---- drives.

A. 2, unlimited B. 3, unlimited C. 2, 32 D. 3, 32 D

52.Your network uses a single master domain model, since all user accounts are stored on the PDC in your domain, you want to implement a fault tolerant system to protect the boot partition on the PDC. Which of the following could you implement?

A. Volume set B. Mirror set C. Strip set without parity D. Strip set with parity B The strip set can be used for boot partition. Volume set doesn"t support tolerance fault.

53.Which of the following hard disk management strategies support the best I/O performance?

A. Stripe set with parity B. Stripe set without parity C. Disk mirror D. Disk duplexing B Because (B) don"t support Fault Tolerance.

54.You want to increase the performance of your database using RAID with most saving disk space and fault tolerance. What should you do? using RAID with most saving disk space and fault tolerance. What should you do?

A. Use duplexing B. Use mirroring C. Use stripe set D. Use strip set with parity D Stripe set doesn"t support fault tolerance. Strip set with parity will save more disk space.

55.You have the jobs to make new custom fault tolerance standard for your company. Required results: Data integrity must be maintained when one disk fails. Optional results: The fault tolerance method must not use additional processor time. The read access time must be improved. Proposed Solution: Introduce a stripe set with parity. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. B To strip set with parity, when one disk fails, data integrity will still be maintained, and the read access time will be improved, because it can read data from several disks at one time. But because the strip set with parity need to compute parity information, this will use additional processor time.

56.You have the jobs to make new custom fault tolerance standard for your company. Required results: Data integrity must be maintained when one disk fails. Optional results: The fault tolerance method must not use additional processor time. The read access time must be improved. Proposed Solution: Introduce a stripe set. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. D The strip set can"t offer the ability of fault tolerance.

57.You have the jobs to make new custom fault tolerance standard for your company. Required results: Data integrity must be maintained when one disk fails. Optional results: The fault tolerance method must not use additional processor time. The read access time must be improved. Proposed Solution: Introduce disk duplexing. What does the proposed solution produce?

A. The required result and the optional results. B. The required result and one of the optional results. C. The required result only. D. Does not produce the required result or the optional results. A To disk duplexing, when one disk fails, data integrity will still be maintained. The read access time will be improved, because it can read data from two disks at one time. And disk duplexing will not use additional processor time.

58.All your servers are currently running Windows NT Server 3.51, and you would like to upgrade them to run Windows NT Server 4.0. You would like to accomplish the task with the least amount of administrative effort. How should you proceed?

A. By running the "winnt.exe" utility from the installation directory with the /udf switch. B. By running the "winnt32.exe" utility from the installation directory with the /udf switch. C. By running the "setup.exe" utility from the installation directory with the /udf switch. D. By running the "upgrade.exe" utility from the installation directory with the /udf switch. B Windows NT 4.0 only comes with two installation / upgrade utilities : "winnt32.exe" and "winnt.exe." From this you should be able to eliminate C and D. Winnt.exe => Use this utility if you"re upgrading from an MS-DOS or Windows 95 computer to Windows NT. If you"re upgrading Windows 95 to Windows NT, then you must install Windows NT in a different directory since Windows 95 cannot be automatically upgraded to Windows NT. Winnt32.exe => Use this utility to upgrade a PREVIOUS version of Windows NT to a newer version of Windows NT. When you use the "winnt32.exe" utility to upgrade an existing Windows NT computer, then the system files are upgraded in the background. The /udf switch is used to specify the Uniqueness Database File, which along with the /u switch, is used to automate the installation process of Windows NT.

59.Bill Slates has just lost his original Windows NT setup disks. How can he re-create the three setup disks without running the actual installation of Windows NT?

A. By running the "winnt.exe" command with the /ox switch from the installation CD. B. By running the "winnt.exe" command from the installation CD. C. By using the Disk Administrator and selecting the Recreate Startup Disks option in the Tools menu. D. By using the Add / Remove Programs applet in the Contrhttp://www.szmdbiao.com/

【NT企業(yè)試題摘要】相關(guān)文章:

企業(yè)招聘筆試試題10-12

企業(yè)筆試試題(2)09-18

知名企業(yè)筆試題目05-07

軟件測(cè)試企業(yè)面試試題09-18

企業(yè)面試性格測(cè)試題06-25

企業(yè)管理專業(yè)測(cè)試題08-05

世界500強(qiáng)企業(yè)的面試題10-11

經(jīng)典企業(yè)面試題——爬樓梯10-24

寫作論文之摘要的介紹09-23

開題報(bào)告摘要怎么寫06-13