Name:     ID: 
 
    Email: 

Review

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 1. 

____ networking locates administration on one or more servers.
a.
Peer-to-peer
b.
Server-based
c.
Standalone
d.
Sneakernet
 

 2. 

The TCO for Windows 2000 Professional is less than other workstation NOSs such as Windows 95 and Windows 98 because Windows 2000 Professional is able to use ____ and software features designed for it in Windows 2000 Server.
a.
Active Directory management
b.
administrative functions
c.
automated configuration
d.
hardware
 

 3. 

____ is a technique in which two or more servers are linked to equally share the server processor load, server storage, and other server resources.
a.
Clustering
b.
Network linking
c.
Server linking
d.
Server consolidating
 

 4. 

____ is targeted for large database and data manipulation services.
a.
Windows 2000 Server
b.
Windows 2000 Advanced Server
c.
Windows 2000 Datacenter
d.
Windows 2000 Professional
 

 5. 

In addition to core Transport and Internet layer protocols, TCP/IP encompasses several ____ layer protocols that work over TCP or UDP and IP, translating user requests into a format the network can read.
a.
Network
c.
Internet
b.
Application
d.
Network Interface
 

 6. 

Which is true?
a.
Socket addresses are appended to IPX addresses.
b.
In addition to the network and node addresses, processes running on IPX-enabled workstations are identified by socket addresses.
c.
Novell has reserved socket 456h for its diagnostics process.
d.
None of the above.
 

 7. 

NetBIOS was originally designed for ____.
a.
Xerox
c.
IBM
b.
Novell
d.
U.S. Department of Defense
 

 8. 

NICs belong to the ____ layer of the OSI Model.
a.
Physical
c.
Data Link
b.
Network
d.
Both A and C.
 

 9. 

Printer network adapters can provide processing and support for ____ of the OSI Model layers.
a.
2
c.
5
b.
3
d.
7
 

 10. 

Which NIC feature allows the NIC's processor to determine when to switch traffic between internal cards?
a.
Management capabilities (SNMP)
c.
Load balancing
b.
RAM buffering
d.
Dual channels
 

 11. 

Which NIC feature provides additional memory on the NIC?
a.
Management capabilities (SNMP)
c.
Load balancing
b.
RAM buffering
d.
Dual channels
 

 12. 

Which is found only on Ethernet hubs?
a.
Traffic LED
c.
Collision LED
b.
Link LED
d.
Warning LED
 

 13. 

Which is the most flexible type of hub?
a.
modular
c.
standalone
b.
stackable
d.
linkable
 

 14. 

Routers communicate with each other through ____.
a.
routable protocols
c.
routing protocols
b.
routing languages
d.
Either A or C.
 

 15. 

A WAN link is typically described as ____.
a.
hub-to-hub
c.
point-to-point
b.
switch-to-switch
d.
site-to-site
 

 16. 

SONET integrates well with ____.
a.
ATM
c.
ISDN
b.
T-carriers
d.
All of the above.
 

 17. 

____ form the basis for resource and account management for every type of network operating system.
a.
Groups
c.
Schemas
b.
Domains
d.
Objects
 

 18. 

In NetWare, UNIX, and Windows 2000 Server, the server actually performs one task at a time, which is referred to as ____.
a.
threaded multiprocessing
c.
linear multitasking
b.
preemptive multitasking
d.
organized multitasking
 

 19. 

Which was the first NOS based entirely on a GUI?
a.
NetWare 5.x
c.
Windows 98
b.
Windows NT Server
d.
None of the above.
 

 20. 

What list does Microsoft produce to assist customers in determining what kind of Windows 2000 hardware to purchase?
a.
Product List
c.
Resource List
b.
Hardware Compatibility List
d.
Hardware Specifications List
 

 21. 

The directory containing information about objects in a domain resides on computers called ____.
a.
member servers
c.
domain servers
b.
domain controllers
d.
object controllers
 

 22. 

____ determines the maximum amount of time, in hours, that a ticket can be used in one continuous session for access to a computer or domain.
a.
Maximum lifetime for a user ticket
b.
Maximum lifetime for user ticket renewal
c.
Enforce ticket lifetime
d.
Enforce user logon restrictions
 

 23. 

You can create OUs and policies that are applicable to each OU, which may be different from the policies for the ____.
a.
server
b.
domain
c.
container
d.
kernel
 

 24. 

The ____ tab provides a place to enter the account holder's title, department name, company name, and the name of the person who manages the account, if it is not the administrator.
a.
Profile
b.
Member Of
c.
Account
d.
Organization
 

 25. 

The ____ template is used for managing desktop settings that are common to Windows 95, 98, and NT.
a.
System.adm
b.
Common.adm
c.
Windows.adm
d.
Winnt.adm
 

 26. 

____ enables you to install Windows 2000 Professional on client computers in environments that use the Active directory.
a.
GUID
b.
RIS
c.
TAB
d.
UNC
 

 27. 

Managing domain resources and user accounts by ____ requires customizing security access for each user account.
a.
resource
b.
group
c.
individual user
d.
domain name
 

 28. 

You can make ____ group members of ACLs for objects in any domain, tree, or forest.
a.
universal
b.
local
c.
global
d.
domain local
 

 29. 

In the Active Directory Users and Computers tool, the ____ tab is used to add members to a group.
a.
Members
b.
General
c.
Members Of
d.
Managed By
 

 30. 

Among Windows 2000 predefined security groups, the ____ group is used to manage default access to local or domain resources.
a.
DNS Admins
b.
Enterprise Admins
c.
Everyone
d.
Domain Admins
 

 31. 

Among Windows 2000 predefined security groups, the ____ group is used to manage general user access.
a.
Users
b.
SchemaAdmins
c.
Group Policy Creator Owners
d.
Replicator
 

 32. 

Using the Archive attribute, ____ are automatically flagged to archive when they are changed.
a.
objects
b.
folders
c.
files
d.
users
 

 33. 

In ____, documents are cached without user intervention.
a.
Manual Caching for Documents
b.
Automatic Caching For Documents
c.
Automatic Caching of Programs
d.
Backup Caching of Files
 

 34. 

Information at the beginning of data in a packet is called a(n) ____.
a.
start bit
c.
datagram
b.
header
d.
token
 

 35. 

Twisted-pair cable uses a ____ connector.
a.
RJ-11
c.
BNC
b.
RJ-45
d.
Either A or B.
 

 36. 

A ____ is a device that amplifies the incoming signal.
a.
repeater
c.
router
b.
transceiver
d.
MAU
 

 37. 

Token ring cables can be ____ cables that have two twisted pairs.
a.
fiber-optic
c.
coaxial
b.
UTP
d.
All of the above.
 

 38. 

____ provides the fastest data transfer.
a.
Ethernet
c.
FDDI
b.
Token ring
d.
Fast Ethernet
 

 39. 

____ is made by Symantec.
a.
Norton Utilities
c.
PartitionMagic
b.
CheckIt Suite
d.
SANDRA Pro
 

 40. 

Which file extension typically is NOT found on an initialization file?
a.
.ini
c.
.bin
b.
.exe
d.
.dat
 



 
Submit          Reset Help