Windows NT - Section 2 Multiple Questions and Answers.




11.The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?
A. Create a mandatory user profile and lock all the program groups
B. Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group
C. Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access
D. Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users

12.Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?
A. Run User Manager for Domains on any Windows NT Advanced Server in the SYCON domain. Open the Domain Admins group. In the List Names From box choose your workstation and add your workstation user account to the Domain Admins group
B. Add your user account to the local Administrators group on each workstation in the SYCON domain
C. Add your user account to the Domain Admins group on any Windows NT Advanced Server in the SYCON domain
D. Add your user account to the Administrators group on each Windows NT Advanced Server in the SYCON domain

13.As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from
A. any Windows NT Workstation computer in the LAB domain
B. any Windows NT Workstation computer in the RESEARCH domain -
C. any Windows NT Server backup domain controller in the LAB domain
D. any Windows NT Server backup domain controllers in the RESEARCH domain

14.What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?
A. Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used
B. The station that holds the token is allowed to transmit a message on the network
C. The station that hold the token has the highest priority on the network
D. A token contains information that is used to route messages between rings

15.Server Manager
A. is used to demote a PDC to a BDC
B. is used to shutdown or restart a server
C. is used to synchronize the domain
D. is used to enable auditing

«»



Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers