5. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?
Options
A. one bit or any odd number of bits inverted in a block of data during transmission
B. two bits or any even number of bits inverted in a block during transmission
C. one bit or any odd number of bits inverted in a byte during transmission
D. two bits or any even number of bits inverted in a byte during transmission
Correct Answer: two bits or any even number of bits inverted in a byte during transmission
6. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?
Options
A. Start the Replication service on Kim's Windows for Workgroups computer
B. Relocate Kim's home directory to her Windows for Workgroups computer
C. Map a drive on Kim's Windows for Workgroups computer to her home directory on the server
D. You cannot do this. Home directories can be accessed only by Windows NT computers
Correct Answer: Map a drive on Kim's Windows for Workgroups computer to her home directory on the server
7. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment
Correct Answer: The station that holds the token is allowed to transmit a message on the network
9. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?
Options
A. Make JohnY a member of the DESIGN Domain Guests group
B. Make JohnY a member of the DESIGN Domain Users group
C. Do nothing. JohnY can access the printer now
D. JohnY cannot access the printer with this configuration
Correct Answer: Do nothing. JohnY can access the printer now
10. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?
Options
A. Use Performance Monitor to create a log of all logon attempts
B. Use User Manager for Domains to set an Audit policy for all logon attempts
C. Use the Services option in Control Panel to start the Alerter service to audit logon attempts
D. Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only