logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows NT Comments

  • Question
  • When of the following is a system default profile used?


  • Options
  • A. When there is no user logged on at the computer
  • B. When a user has logged on using the Guest account
  • C. When, after the user has logged on, the personal or mandatory profiles are missing or corrupted
  • D. When the local accounts database recognizes that the user logging on has never done so from this computer
  • E. None of the above

  • Correct Answer
  • When there is no user logged on at the computer 


  • Windows NT problems


    Search Results


    • 1. An ethernet switch works at the protocol layer

    • Options
    • A. True
    • B. False
    • Discuss
    • 2. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?

    • Options
    • A. Use Performance Monitor to create a log of all logon attempts
    • B. Use User Manager for Domains to set an Audit policy for all logon attempts
    • C. Use the Services option in Control Panel to start the Alerter service to audit logon attempts
    • D. Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only
    • E. None of the above
    • Discuss
    • 3. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

    • Options
    • A. Make JohnY a member of the DESIGN Domain Guests group
    • B. Make JohnY a member of the DESIGN Domain Users group
    • C. Do nothing. JohnY can access the printer now
    • D. JohnY cannot access the printer with this configuration
    • E. None of the above
    • Discuss
    • 4. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?

    • Options
    • A. Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used
    • B. The station that holds the token is allowed to transmit a message on the network
    • C. The station that hold the token has the highest priority on the network
    • D. A token contains information that is used to route messages between rings
    • E. None of the above
    • Discuss
    • 5. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 6. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports

    • Options
    • A. True
    • B. False
    • Discuss
    • 7. A cut-through switch reads the entire packet before forwarding it to the destination segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 8. A route is a path between two network segments

    • Options
    • A. True
    • B. False
    • Discuss
    • 9. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments

    • Options
    • A. True
    • B. False
    • Discuss
    • 10. User Manager for domains

    • Options
    • A. is used to add a workstation to the domain
    • B. is used to create user profiles and system policies
    • C. is used to change file permissions
    • D. is used to assign a log on script to a user or group of users
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment