NT Server


1. RAID level ______ writes parity information across all of the disks in the array, making sure that the data and parity are on separate disks.

A. 0
B. 1
C. 2
D. 4
E. 5

>> !
Answer: E


2. When using disk RAID level ______ to provide disk striping, you are have no data redundancy and no system fault tolerance.

A. 0
B. 1
C. 2
D. 4
E. 5

>> !
Answer: A


3. Disk striping, (RAID Level 0), divides data into ______ blocks and spreads them in a fixed order among all of the disks of an array.

A. 4K
B. 16K
C. 32K
D. 64K
E. 128K

>> !
Answer: D


4. When mirroring the boot Partition of a NT server, you will need to create a fault tolerance boot disk. How would you prepare the floppy disk?

A. Format the floppy disk using NT, copy boot files to the disk, and modify the disk's BOOT.INI to point to the mirrored copy of the boot partition.
B. Format the floppy disk using DOS, copy boot files to the disk, and modify the disk's BOOT.INI to point to the mirrored copy of the boot partition.
C. Format the floppy disk using NT, copy boot files to the disk, and modify the disk's SYSTEM.INI to point to the mirrored copy of the boot partition.
D. Format the floppy disk using NT, copy boot files to the disk, and modify the disk's PROGRAM.INI to point to the mirrored copy of the boot partition.
E. Format the floppy disk using DOS, copy boot files to the disk, and modify the disk's Windows.INI to point to the floppy's boot partition.

>> !
Answer: A


5. Which of the following disk devices can use NT Server sector sparing?

A. SCSI
B. IDE
C. ESDI
D. CD-ROM devices
E. multiplexed ESDI/IDE controllers

>> !
Answer: A


6. What are two disadvantages of stripe sets with parity?

A. The system partition cannot be used.
B. Write operations are substantially slower than for a single disk.
C. Requires less system memory than a mirror set.
D. Read operations are substantially slower than for a single disk.

>> !
Answer: A & B


7. During a service pack installation, and setup of a new screen saver, your PDC has crashed. Your first action is to promote a BDC to the PDC. You have no tape backup but you do have a recent Emergency Repair Disk which you decide to use. As things go from bad to worse, however, you decide to reformat the drives and reinstall NT.

Requirement:
Get the machine that was the PDC operational and back online.

Primary Objective:
Repair and re-establish the crashed machine as a PDC when it is brought back online.

Secondary Objective:
Synchronize the domain.

Proposed Solution:
Create an Administrator user account for the unit to be re-established on the current PDC. Install NT on the crashed unit as a BDC. After installation and logon, promote the unit to the PDC.

A. The proposed solution meets both the primary and the secondary objective.
B. The proposed solution meets the primary only.
C. The proposed solution fulfills the secondary objective.
D. The proposed solution does not meet the requirement.

>> !
Answer: A

Synchronization of the domain will take place as a result of the promotion of the BDC to the PDC.


8. You have a mirror of the boot partition on your NT Server. What are your actions to prepare a fault tolerance boot disk?

A. Format a disk using NT, copy boot files to the disk and modify the disk's BOOT.INI file to point to the mirrored copy of the boot partition.
B. Format a disk using DOS, copy boot files to the disk and modify the disk's SYSTEM.INI file to point to the mirrored copy of the boot partition.
C. Format a disk using NT, copy boot files to the disk and modify the disk's SYSTEM.INI file to point to the mirrored copy of the system partition.
D. Format a disk using DOS, copy boot files to the disk and modify the disk's PROGRAM.INI file to point to the mirrored copy of the system partition.

>> !
Answer: A

You must format the floppy disk using NT because of the boot sector. Next, copy boot files and modify the disk's boot.ini file to point to the mirrored copy of the boot partition.


9. You are mirroring the boot partition of a NT Server. When creating a boot floppy in case of failure, what boot files are needed on the floppy? (Choose all that apply)

A. NTLDR
B. NTDETECT.COM
C. NTBOOTDD.SYS (for some SCSI disks)
D. BOOT.INI
E. NTOSKRNL

>> !
Answer: A, B, C & D

The NTBOOTDD.SYS file is required when using SCSI syntax in the ARC name path.


10. You have installed five Win32 applications on your NT Workstation. The second installed application crashes. What effect does this have on your Workstation and how can you get the second installed application become operational again?

A. No effect; the Workstation remains operational and will automatically restart within 15 minutes.
B. No effect; only the one application is effected. You must use Task Manager to end the effected applications operation and then restart the second application.
C. Major effect. All of the applications are effected and you use Task Mgr to shut down all application operations and then restart them one by one.
D. Major effect. You must reboot the computer.
E. Minor effect. You must use Control Panel System options to end and then restart the second application.

>> !
Answer: B

All 32Bit applications that are designed to work within the NT environment are placed into their own 2-GB address space so as not to corrupt other Win32 based applications.


11. Your NT Server:s configuration includes two processors, 64MB RAM, and a 54 GB RAID System. Your users are complaining that the three primary Win16 applications from this server are running slow. During Task Manager performance analysis you discover that only one of processors is being utilized. How would you improve application performance?

A. Place each Win16 Applications into its own NTVDM.
B. Place all Win16 Applications within one NTVDM.
C. Assign each Win16 application to a specific processor.
D. Rank each Win16 application and assign each Win16 application a high priority.
E. Move each of the Win16 applications onto their own Server.

>> !
Answer: A

By default the NT Server Operating System will place all of the Win16 applications you have installed and are running into the same NT Virtual DOS Machine (NTVDM).


12. You have received a new PowerPC based laptop computer with NT Workstation installed as the operating system. You install your PC Card, connect to the Internet and download five Win32 based applications. Three of these applications work and the other two will not function. These same two applications work on your Intel based computer at home. What is wrong with the two application that don't work?

A. The two Applications are specific to the Win32 Intel platform.
B. The two Applications are not designed to work with laptops.
C. The two Applications have been installed incorrectly on the laptop.
D. The two Applications must be activated with a special password from the vendor.

>> !
Answer: A


13. You have purchased a suite of multi-tier client/server applications to be installed on your company's new NT Server. You intend to run this suite of applications in a fully distributed, multiple-computer environment. What NT Service will you configure to allow the users access?

A. DCOM
B. NTVDM
C. WOW
D. POSIX
E. TASK MANAGER

>> !
Answer: A

The MS NT Distributed Component Object Model (DCOM) integrates Communications, Naming, and Security building blocks to provide a transport for software components to work together across a network.


14. What is the command used to edit the Distributed COM Configuration properties?

A. DCOM.EXE
B. DCOMCNFG.EXE
C. CNFGDCOM.EXE
D. DCCPCNFG.EXE
E. CNFGDCCP.EXE

>> !
Answer: B

When using DCOMCNFG.EXE to set the identity of a COM server to a user account that is a BDC, you can get an "Incorrect Function" or "Invalid Function" error and when a client attempts to launch the server, activation fails. This is caused by a bug which can be resolved using information form the Microsoft Knowledge Base.


15. Your company's programming department has developed a DCOM order entry application to use the network as a means of executing individual components of the program on specific computers at remote locations. What will the programmer use to allow the application to function while spread across a network on different computers?

A. NWLink
B. TCP/IP
C. RPC
D. LPC
E. ICMP

>> !
Answer: C

The DCOM uses Remote Procedure Calls and NT Security to enable one application to communicate across the Internet, networks and computers.


16. With the NT Server Tools installed on a Windows 3.1 or Windows for Workgroup 3.11 Workstation, what can be used to create and remove shares on NT systems?

A. Share Manager
B. Server Manager
C. Share Administrator
D. Profile Manager Share Menu
E. User Manager for Domains

>> !
Answer: B

Server Manager can be used to manage shares on listed NT computers.


17. What counters are helpful in monitoring how busy a processor is when itīs executing threads?

A. PROCESSOR: Elapsed Time
B. MEMORY: Pages/sec
C. PROCESSOR: %Processor Time
D. PHYSICAL DISK: %Disk Time
E. SYSTEM: Nonpaged Pool Failures

>> !
Answer: C

An example of a busy processor can be observed when running Microsoft Project under NT 4.0. You may have problems with screen savers. In this case, NT Performance Monitor shows all processor time being used and the percentage hovers at or near 100%. See TechNet Notes on MS Project for workarounds or updates to latest version of Project to help correct this.


18. In order to use DSMNCHK utility without manually copying to each NT Server, the files must be copied from the DSMN CD to what folder on the server?

A. \systemroot\system32
B. \systemroot\system32\repl\import\scripts
C. \systemroot\system32\repl\export\scripts\i386
D. \Program Files\DSMN

>> !
Answer: C

DSMN is a separate product.


19. You are currently running a Novell Network and a UNIX network. You are adding a NT Server to the network. How many network cards will be needed in the NT Server to handle the IPX/SPX and TCP/IP protocols currently running?

A. 1
B. 2
C. 3
D. 4
E. 8

>> !
Answer: A

An NDIS 4.0 compatible NIC can handle bindings to multiple protocols.


20. You are running a Novell Network and a UNIX network. You are adding a NT Server to the network. How many NDIS 4.0 compatible protocols can be bound to a single network card?

A. Only one at a time
B. Eight protocols maximum
C. Four protocols maximum
D. Sixteen protocols maximum
E. An unlimited number of protocols

>> !
Answer: E

NDIS 4.0 compatible NICs allow an unlimited number of protocols to be bound to one network card.


21. You have logged on to your new NT Workstation as the Administrator and shared several folders. You can access other shares on different computers across the network but others users are unable to access your shared resources. You notice in Windows Explorer that the shared folders do not appear with the shared symbol. What service has not started?

A. Computer Browser
B. Directory Replication
C. Workstation
D. Net Logon
E. Server

>> !
Answer: E

Some services affect other services but if this service is down then this situation will occur.


22. You are ordering 600 network cards for your new NT domain which will have 550 NT Workstation client computers with PCI architecture. The network is expected to grow and will add 50 more computers within the next six months. Your task is to talk with prospective vendors and obtain pricing. What are two primary specifications that you need?

A. PCI network cards.
B. NDIS 4.0 Compatible Drivers.
C. Number of protocols that can be bound to this type of NIC.
D. Number of NICs going into the NT domain server.

>> !
Answer: A & B

The NDIS 4.0 compatible network adapter cards act as the interface between the Physical cable structure and the Operating System by coordinating communications between Computer's Firmware, Software, Hardware.


23. You are writing a company standard that requires the use of the NT NDIS 4.0 Specification. What four NDIS 4.0 features would you include in the standard for the NT based computers?

A. Allow unlimited protocol bindings to a single NIC.
B. Allow unlimited NICs within a single computer.
C. Keep NIC Drivers and Protocol Drivers independent of each other.
D. Allow security restrictions to be placed on node access through NIC drivers.
E. Provide a communication between NIC and associated NIC driver.

>> !
Answer: A, B, C & E

NDIS 4.0 supports multiple protocol bindings and NICs. See the Microsoft Win32 Device Development Kit (DDK) for NT for more information on debugging NDIS 4.0 drivers. Enabling any one of many levels of DbgPrint statements in the NDIS wrapper will provide information for debugging most NDIS driver problems.


24.You are working on a NT Network Environment presentation when the boss interrupts and asks, "What are the two major divisions within the I/O Manager?" What is the answer?

A. Transport Driver Interface.
B. Workstation Service Redirector.
C. Network Driver Interface Specification.
D. NWLink IPX / SPX Compatible Transport.
E. Controlled File System Drivers.

>> !
Answer: A & C

The TDI layer provides support routines for TDI providers and clients similar to what NDIS provides to NDIS drivers, except the NDIS wrapper also handles binding, hardware abstraction and lots of other things that TDI does not handle. Although TDI does not do much now, it could in the future if it becomes an OS abstraction layer as NDIS has.


25. What four file and print sharing components are provided by NT?

A. Workstation Services.
B. Server Services.
C. Multiple Provider Router.
D. Multiple Universal Naming Convention Provider.
E. Low Level I/O Device Drivers.

>> !
Answer: A, B, C & D

The Multiple UNC (uniform naming convention) Provider (MUP) is a network resource locator that runs in kernel mode. Applications use either UNC names or the Wnet API to access resources on the network. Wnet is part of the Win32 API set that allows applications to connect to multiple networks, browse resources and transfer data between computers on other networks.


26. What two services are provided by Microsoft NT to enhance network connectivity?

A. Microsoft TCP/IP 32 for Windows for Workgroups 3.11.
B. OS/2 LAN Manager client conversion utility.
C. Remote Access Services for MS-DOS.
D. Network Administrator.
E. Network Resource Manager.

>> !
Answer: A & C

Tip: The NBSTAT -R command may not seem to work in Microsoft TCP/IP-32. If you purge and reload the NetBIOS name cache using NBSTAT -R, the remote name table can be purged without having to reload the Net-BIOS name cache from the LMHOSTS file. Workarounds are found in the Knowledge Base on TechNet.


27. What three items are supported by the MS Network Client 3.0 Full Redirector?

A. Impersonation.
B. Logon scripts and messaging.
C. Named pipes.
D. Long filename support.
E. Remote procedure calls (rpc).

>> !
Answer: B, C & E

Tip: Named pipes and Mailslots are written as Configuring Disks, unlike other IPC mechanisms. Thus, the Registry lists entries for the Named Pipes File System (NPFS) and the MSFS. They share common functions such as caching and processes on the local computer which can use these Configuring Disks to communicate without going through network components. Remote access to named pipes and Mailslots is provided through the redirector the same as with all of the Configuring Disks.


28. You are setting up a new secretary with MS-DOS Network Client 3.0 for MS-DOS. What utility will you use to add his new user account to the NT domain?

A. Network Client Administrator
B. Network User Administrator
C. Account Administrator
D. User Manager for Domains
E. Server Manager

>> !
Answer: D


29. With the NT Server Tools installed on a NT Workstation, what is used for Windows Internet Name Service administration?

A. DHCP Administrator
B. Server Manager
C. DHCP Manager
D. Remote Access Administrator
E. WINS Manager

>> !
Answer: E

WINS Manager is used to configure WINS server management of WINS client mappings by using the configuration options in the WINS Server Configuration dialog box.


30. What are three functions of the Network Client Administrator utility in the NT Server environment?

A. Can automatically add computer accounts to the domain for new clients.
B. Can create a network boot disk for installing WFW 3.11 client software across the network.
C. Create a self installing disk for repairing mirror sets.
D. Can setup install shares for installing NT Server tools on Win16 and Win32 clients.
E. Can create shares for installing Microsoft TCP/IP 32 for Windows for Workgroups 3.11.

>> !
Answer: B, D & E

The Network Client Administrator is used for administering network clients. With it, you can make a network installation startup disk or installation disk set, copy client-based network admin tools and view Remoteboot client information.


31. What file is the Windows for Workgroups 3.11 client redirector?

A. REDIR.386
B. VREDIR.386
C. VRDIR.386
D. VRDR.386
E. VREDIR.486

>> !
Answer: B

Tip: When you run WinPopup in Windows for Workgroups 3.11 you could get an error message regarding the VREDIR.386 redirector not starting. The cause of this is when the MS-DOS redirector loads before Windows for Workgroups 3.11. To avoid this, do not start the MS-DOS redirector prior to running Windows for Workgroups 3.11, or remove WinPopup from the LOAD line or Startup group.


32. What are the two types of Redirectors supplied with NT Server?

A. Basic redirector
B. Partial redirector
C. Full redirector
D. Direct redirector
E. Virtual redirector

>> !
Answer: A & C

The I/O Manager determines if an I/O request is local or for a network resource. If it is for a network resource, a redirector accepts the request and sends it to the resource. The NT Redirector (RDR) communicates with the transport protocols with the Transport Driver Interface (the boundary layer that provides a common programming interface for the Configuring Disks drivers, such as the Workstation service (Redirector) or the Server service (Server), to communicate with the transport protocols).


33. What communication method offers the fastest communication speeds?

A. Public switched telephone networks
B. Modem
C. ISDN
D. X.25 over a 9600 baud line

>> !
Answer: C

Integrated Services Digital Network works over existing copper wires and is provided in several different forms starting with BRI (Basic Rate Interface) to provide speeds up to 128 kilobits/second.


34. When is the Network Client Administrator utility installed?

A. Automatically, during installation of NT Server.
B. Automatically, for Express Setup, and if specified during Custom Setup.
C. After NT Server installation from the CLIENTS directory on the CD-ROM.
D. Automatically, during install of NT Server or Workstation.

>> !
Answer: A

The Network Client Administrator is an administrative tool to make a network installation startup disk, make an installation disk set, copy client-based Network Administration Tools and view Remoteboot client information.


35. The redirector component of a NT Server (RDR.SYS), is tasked with ______ network requests.

A. receiving
B. decoding
C. transmitting
D. decrypting
E. caching

>> !
Answer: C

Tip: When looking for specific performance issues with the redirector in transmitting network requests, a network errors/sec counter that exceeds 5 can indicate a performance problem. Other counters include: reads denied/sec, writes denied/sec, server sessions hung and current commands (Number of NICs installed plus 2).


36. You have successfully connected to the network using the Token Ring topology. What supported frame types could you have used?

A. 802.2 or 802.3
B. 802.2 or SNAP
C. 802.3 or Ethernet II
D. 802.3 or SNAP
E. SNAP or FDDI

>> !
Answer: B

NT Server support four types of media, namely Ethernet, Token ring, LocalTalk and FDDI. Token Ring is a common network media in PC networking and FDDI is based on token ring with fiber-optic cabling.


37. How much memory does the MS Network Client 3.0 Full Redirector use and how much memory does the Basic Redirector use?

A. Full uses 10K and Basic uses 10K
B. Full uses 110K and Basic uses 110K
C. Full uses 101K and Basic uses 110K
D. Full uses 110K and Basic uses 101K
E. Full uses 110K and Basic uses 10K

>> !
Answer: E

The explanation for this question must recognize that knowing the amount of k used by the Full and Basic Redirectors is a point of fact. Additional information: however, could be noting that Rdr.sys transmits requests and generates a set of statistics that appear as Performance Monitor counters. Most network resources use nonpaged memory and if a computer is paging excessively it could be because most of its RAM being used by the network and not much is left for paged activities.


38. What are three reasons that the MS Network Client 3.0 Full Redirector is recommended over the Basic Redirector?

A. It is faster.
B. It utilizes internal buffers to speed up network operations.
C. It supports domain logons.
D. It uses less upper-level memory than the Basic Redirector.
E. It requires only 10K of memory.

>> !
Answer: A, B & C


39. What is a NT requirement for network interface card devices?

A. Ethernet_802.2 compatible
B. NDIS 3.x compatible
C. NDIS 2.x compatible
D. ODI 7-layer protocol stack compliant
E. MLID compatible

>> !
Answer: B

NT operating system architecture is protocol-independent. The protocols package network requests for applications in their formats and send request to the NIC through the NDIS. NDIS allows multiple network protocols to reside on several NIC's. Note that NT Network Monitor uses a new network driver interface specification called NDIS 4.0. While NT 4.0 wants NDIS 4.0, its basic requirement for NICs calls for NDIS 3.x compatibility.


40. A subnet mask is used to distinguish the ______ ID from the ______ ID.

A. local machine, source host
B. SPX, IPX
C. IPX, NetBIOS
D. TCP/IP, NIC
E. network, host

>> !
Answer: E

A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish between the network ID portion of an IP address and the host ID.


41. You have received a new network PC and have installed NT Workstation on it. You install the NIC, make the connection to the network topology, and power up the system. An error pops up that states "one or more services failed to start". What two actions could possibly fix the problem?

A. Check the Event Viewer for error messages. If no network services have started, use the Control Panel, Network icon, and the Adapter tab to change the software settings to match the physical hardware settings on the NIC.
B. Check to see if the wrong NIC driver has been installed.
C. Check the Server Manager for Server error messages and start the Server Services.
D. Check the User Manager for Domains to see if you have been added to the network.

>> !
Answer: A & B

Tip: Check out the Address numbers, Gateway numbers, subnet Mask numbers, correct NIC Driver and hardware jumpers before replacing the NIC.


42. You configure your new computer for TCP/IP manually and check the connection with Ping. Everything is OK on your local network but you have no access to any remote hosts. What is the problem and how can you repair it?

A. Check the Server Manager for Server error messages and start the Server Services.
B. Check the User Mgr for Domains to see if you have been added to the TCP/IP network.
C. Check the Control Panel, Network icon, TCP/IP Protocol properties, and replace, or add, the correct gateway address.
D. Obtain a Remote TCP/IP driver for your NIC.

>> !
Answer: C

The ping utility uses the Internet Control Message Protocol, a maintenance protocol, to determine if an IP system on a network is working.


43. You have a new TCP/IP network environment. You would like to verify that the TCP/IP configuration has been initialized. What Microsoft NT Utility will give you this information?

A. PING /IP_Address ALL
B. IPCONFIG /ALL
C. PING /IP
D. IPCONFIG /RELEASE
E. IPCONFIG /RENEW

>> !
Answer: B

This utility is used to verify the TCP/IP configuration parameters on a host and will determine whether the TCP/IP configuration has been initialized or a duplicate IP address has been assigned to another host.


44. You have installed TCP/IP as your network protocol. You are having problems communicating across the network. What NT diagnostic utility can you use to see if a specific host is available?

A. Route
B. Packet Internet Groper
C. File Transfer Protocol
D. Remote Shell
E. Internet Explorer

>> !
Answer: B

The PING utility is a diagnostic tool that is used to test TCP/IP connection failures.


45. You are using Ping to test a connection across your TCP/IP network. What answer do you receive back if the test is successful?

A. Reply from IP _ Address
B. Reply from Default _ Address
C. Reply from Gateway _ Address
D. Reply from Subnet _ Address
E. Reply from Internal _ Address

>> !
Answer: A

The default successful response from a Ping query is this Reply message repeated four times.


46. You are manually configuring your NT Workstation IPaddress to communicate across the company's Wide Area Network. What three parameters are required for each network adapter card in a computer that will be using TCP/IP?

A. An IP Address for each NIC using TCP/IP.
B. A Ping Address.
C. A subnet Mask.
D. A default Gateway address.
E. An IPCONFIG location.

>> !
Answer: A, C & D

An IP address, a subnet mask and default gateway are required to communicate across a network. A default gateway address is not required on small, single segment networks that do not go out of their local environment. Ping and IPCONFIG are utilities that are helpful in The Troubleshooting Process.


47. How is event logging by the spooler configured?

A. NT Setup
B. Control Panel - Printing
C. Through the Registry
D. Control Panel - Devices
E. Print Manager

>> !
Answer: C


48. What protocol resolves an IP address to the system's corresponding hardware address?

A. NBT
B. Win Sockets
C. ARP
D. ICMP
E. FTP

>> !
Answer: C

Not related to data transport, the Adress Resolution Protocol (ARP) is one of the maintenance protocols that supports the TCP/IP suite. IP acquires a physical address, also called a MAC or burned-in address, by broadcasting a packet called an ARP request packet that has the IP address of the unit which is being sought after (the destination unit). The destination host then replies by sending its hardware or physical address (burned into its NIC) to the requester in an ARP reply packet. This adress is then stored in an ARP cache of the requesting system. Use the arp utility to view arp tables.


49. Which NT component allows remote administration through software packages like Sun Net Manager and HP Open View?

A. Address Resolution Protocol (ARP)
B. Remote Procedure Call (RPC)
C. File Transfer Protocol (FTP)
D. Simple Network Management Protocol (SNMP) agent
E. Internet Control Message Protocol (ICMP)

>> !
Answer: D

To use TCP/IP counters you must install SNMP. SNMP, along with TCP, IP, UDP and ARP, is a core TCP/IP protocol. It is the SNMP agent that allows a computer running NT to be monitored remotely with Sun Net Manager or HP Open View.


50. What protocol obtains hardware addresses for communication?

A. Internet Control Message Protocol.
B. Internet Protocol.
C. Address Resolution Protocol.
D. User Datagram Protocol.
E. Transmission Control Protocol.

>> !
Answer: C

For two systems to communicate on a TCP/IP network the system sending the packet must map the IP address of the other computer to its physical address (the manufactured number on the NIC). IP gets this number by using a special packet called an ARP request packet that contains the IP address of the destination computer.


51. What required TCP/IP parameter determines if a host is on a local network or a remote network?

A. Default gateway
B. IP address
C. subnet mask
D. WINS address
E. MAC address

>> !
Answer: C

Subnet masks are 32-bit values that allow the computer recipient of IP packets to distinguish the network portion of an address from the host portion. Subnet masks are created by assigning 1's to the network ID bits and 0's to the host ID bits. Since 0+1=0 when ANDing two binary numbers, the host ID is "masked" from the network ID. Default subnet masks are used when a network is not sub-netted or segmented. Then, custom Subnet masks are used.


52. What TCP/IP utility displays the current TCP/IP configuration?

A. Nbstat
B. Ftp
C. Ipconfig
D. Config
E. Ipstat

>> !
Answer: C

IPCONFIG or WinIPCFG verifies correct configuration for a client including IP, subnet mask and default gateway (the address of the router).


53. What are the methods that can be used to configure TCP/IP on a NT Server?

A. Manual and automatically with DHCP.
B. Manual and automatically with WINS.
C. Manual and automatically with SNMP.
D. Manual and automatically with TFTP.
E. Manual and automatically with Ping.

>> !
Answer: A

Actually, in a way, you can have both, i.e., when you are connecting to the internet you use DHCP and when you are using your local network you could have also have manual.


54. Which TCP/IP utility displays a cache of locally resolved IP addresses to MAC addresses?

A. rip
B. ipcache
C. rexec
D. finger
E. arp

>> !
Answer: E

Arp -a is used to see what is in the ARP cache. Arp -s is used to add an entry.


55. Name three core TCP/IP protocols that can be implemented with NT to facilitate connecting many computers and internetworks?

A. UDP (User Datagram Protocol)
B. ARP ( Address Resolution Protocol)
C. ICMP ( Internet Control Message Protocol)
D. NWLink ( Network Link Protocol)
E. NFP ( Network File Protocol)

>> !
Answer: A, B & C


56. What TCP/IP utility will run commands on a UNIX host?

A. Remote Command Protocol (RCP)
B. Remote Shell Protocol (RSH)
C. Remote Command Executor (RCE)
D. Finger
E. Address Resolution Protocol (ARP)

>> !
Answer: B

The rsh connectivity command runs commands on remote hosts running the rsh service. Parameters include -l username and -n.


57. What Simple TCP/IP Service is a character generator that sends data without regard to the input?

A. GENCHAR
B. DAYTIME
C. CHARGEN
D. QUOTE
E. DISCARD

>> !
Answer: C

CHARGEN stands for character generator and is a service that sends data to the input. Although the data may be anything, it is recommended that a pattern be used. See RFC 864 for details. Note that while the knowledge and information represented by this specific question and explanation may not be included in an actual Microsoft Examination, it is worthwhile for NT Administrators to know about.


58. What is the recommended loopback address to verify that TCP/IP is installed and loaded correctly?

A. 0.0.0.0
B. 127.0.0.1
C. 128.0.0.1
D. 193.0.0.1
E. 255.255.255.255

>> !
Answer: B

The loopback address of 127.0.0.1 is an IP address that has been specified by the IETF (Internet Engineering Task Force) as the IP address to use with a loopback driver (a network driver that allows packets to bypass the NIC) to route outgoing packets back to the source computer.


59. What Simple TCP/IP Service sends any data it receives back to the originating source?

A. Echo
B. Ping
C. Chargen
D. Quote
E. Bounce

>> !
Answer: A

The use of Ping with the parameter -n will send the number of echo packets specified by count. The default is four.


60. What does the REXEC utility that comes with NT Server provide?

A. Remote Execute client to UNIX servers.
B. Rexx Language Interpreter.
C. Ability to connect to NFS-mounted UNIX drive volumes.
D. TCP/IP general connectivity.
E. Dial-up PPP client services.

>> !
Answer: A

Another great connectivity command for people who like to type commands and use detailed syntax and parameters.. REXEC authenticates the user name on the remote host by using a password, before executing the specified command. It prompts the user for a password and authenticates the password on the remote host.


61. What file transfer utility can be used to transfer files without user authentication but requires read and write UNIX permissions?

A. TFTP
B. FTP
C. OTL
D. Telnet
E. Put

>> !
Answer: A

Yet another connectivity command. TFTP transfers files to and from a remote computer, similar to ftp, but it does not provide authentication. It can only be used forunidirectional transfer of files and the user must be logged on. Put is a TFTP parameter that transfers source on the local computer to destination on the remote computer.


62. What are three TCP/IP connectivity applications that are included with NT Server?

A. UDP
B. FTP
C. TFTP
D. Finger
E. NetDDE

>> !
Answer: B, C & D

User Datagram Protocol is a TCP complement that gives a connectionless datagram service that does not guarantee delivery or correct sequence of the packet in a similar manner to the IP.


63. Of the TCP/IP protocols provided with NT Server, which one will report messages and errors regarding packet delivery?

A. Internet Control Message Protocol
B. Internet Protocol
C. Address Resolution Protocol
D. User Datagram Protocol
E. Transmission Control Protocol

>> !
Answer: A

The diagnostic utility, tracert, determines the route taken to a destination by sending ICMP echo packets with different TTL's. Each router along the path is required to decrement the TTL. When the TTL reaches 0, the router is supposed to send an ICMP Time Exceeded message to the source.


64. Which NT protocol is small, fast and ideal for departmental networks but is not routable and does not interoperate with NetWare networks?

A. IPX/SPX
B. DLC
C. NetBEUI
D. TCP/IP
E. RPC

>> !
Answer: C

NetBEUI was introduced by IBM in 1985 and ships with Microsoft LAN Manager. NetBEUI uses IBM NetBIOS 3.0 as its interface at the top and the Network Device Interface Specification as its interface at the bottom. Frames conform to 802.2 LLC protocol.


65. What TCP/IP utility will display a list of NetBIOS computer names that have been resolved to IP addresses?

A. IPCONFIG
B. NBTSTAT
C. NETSTAT
D. ROUTE
E. HOSTNAME

>> !
Answer: B

NBTSTAT -A XXX.XXX.XXX.XXX shows the NetBIOS name cache on a remote computer. This helps track down computer names. If there is no response the computer might be a router or not have NBT (i.e., a non-Microsoft computer).


66. Which TCP /IP protocol provides NetBIOS naming services and provides a standard interface between NetBIOS based applications and the underlying TCP/IP protocol?

A. NBT (NetBIOS over TCP/IP)
B. Win Sockets interface
C. NTP (NetBIOS over TCP/IP)
D. NST (NetBIOS Services for TCP/IP)
E. NBF (NetBIOS frame format)

>> !
Answer: A

Name resolution is either NetBT or DNS. Note that NBT refers to NetBIOS over TCP/IP and is the session-layer network service that performs name-to-IP address mapping implemented under WINS and broadcast name resolution. Registration is the process used to register a name for each node. Resolution is the process used to determine the specific address for a node name.


67. Is it possible for one server to use two NetBIOS transports at once, such as NBT (NetBIOS over TCP/IP) and NWLink (NetBIOS over IPX)?

A. No, only one NetBIOS transport can be used at once.
B. Yes, both NetBIOS transports may be used at once.
C. Yes, but the registry parameter NetBIOS_Multiple must be set to 1.

>> !
Answer: B

The NT adapter card can handle multiple protocols.


68. What are the parameters used to configure NT TCP/IP in a routed network environment?

A. IP address and subnet mask.
B. SubNet mask, MAC address and default gateway.
C. IP address, default gateway and subnet mask.
D. IP address, MAC address and default router.

>> !
Answer: C


69. What TCP/IP utility provides terminal emulation functionality?

A. FTP
B. Telnet
C. Ping
D. Template
E. Terminal

>> !
Answer: B

The Telnet Server service has a TELNETD.EXE component and a Remote Session Manager component. It operates by connecting to the Remote Session Manager which is responsible for initiating, terminating and managing the service.


70. Is the Internet Control Message Protocol a mandatory part of every TCP/IP implementation?

A. Yes
B. No

>> !
Answer: A

To get the TCP, IP, ICMP and UDP counters to appear in PERFMON.EXE you must install the SNMP.EXE service using the Network icon in Control Panel.


71. The MS Network Client 3.0 for MS-DOS supports TCP/IP, DLC, NetBEUI, and IPX protocols. How many protocols can be bound to the card at the same time?

A. One
B. Two
C. Three
D. Four
E. Unlimited

>> !
Answer: C


72. What additional software is required in order to install TCP/IP on a NT Server?

A. None, TCP/IP is fully integrated with NT.
B. Any third-party TCP/IP protocol stack compatible with your network card.
C. A NIC-compatible NDIS translator for TCP/IP.
D. Some type of name-resolution software package for mapping IP addresses to machine names.
E. A TCP/IP compatible VxD from your network card vendor.

>> !
Answer: A

TCP is a connection oriented protocol that compensates for the network's lack of reliability by ensuring correct sequence of packets and end-to-end acknowledgment. IP is a connectionless protocol. Each packet has routing information but the nodes themselves do not try to understand the packet data.


73. What four protocols are shipped with NT and are included in the Microsoft Network Client 3.0?

A. IPX/SPX
B. NetBEUI
C. NCP
D. TCP/IP
E. Microsoft DLC

>> !
Answer: A, B, D & E


74. What TCP/IP utility will copy files between a NT-based computer and a UNIX host?

A. Remote Execute (REXEC)
B. Remote Shell Protocol (RSH)
C. Remote Copy Protocol (RCP)
D. Finger
E. XCopy

>> !
Answer: C

The rcp connectivity command copies files between NT and a computer running rshd, which is a service that UNIX calls a daemon (instead of a service). The rcp command is also used for transfer of files between two computers running rshd when the command is issued from NT. The rshd server service is not available on NT based computers. Remote computers must support rcp and be running rshd.


75. What TCP/IP Utility will start processes on a remote host?

A. Remote Copy Protocol (RCP)
B. Remote Executive Service (RES)
C. Remote Execution (REXEC)
D. RCP (Remote Command Processor)

>> !
Answer: C

Rexec is a connectivity command that runs commands on remote hosts that are running the rexecd service.


76. What utility supplied with NT allows you to manipulate TCP/IP network routing tables?

A. IPCONFIG
B. IPTABLE
C. TABLE
D. ROUTE
E. ICMP

>> !
Answer: D

Even a single-homed host has to make routing choices that are controlled by a route table. Route print is the command to display the route table.


77. You are installing an HP-4-si printer directly to the network using the 10-Base-T NIC internal to the printer. What is your initial action to begin the installation process for this printer?

A. Load DLC on the print server sending the data to the HP printer.
B. Load DLC on the client sending the data to the print server.
C. Load HDLC on the print server sending the data to the HP printer.
D. Load TCP/IP on the client sending the data to the print server.
E. Load DLC on the client machine and TCP/IP on the print server.

>> !
Answer: A


78. Which software is used with Win Sockets 1.1, DHCP and WINS?

A. Microsoft TCP/IP 16 for Windows for Workgroups 3.11
B. Remote Access Services 1.1a for MS-DOS
C. LAN Manager 2.2c for OS/2
D. Microsoft TCP/IP 32 for Windows for Workgroups 3.11
E. Network Client 3.0 for MS-DOS Basic Redirector

>> !
Answer: D

DHCP offers dynamic configuration for IP. DHCP provides safe, reliable and simple TCP/IP network configuration and helps conserve address allocation.


79. With the NT Server Tools installed on a NT Workstation what is used for Dynamic Host Configuration Protocol Server administration?

A. DHCP Server Manager
B. DHCP Administrator
C. DHCP Manager
D. WINS Manager
E. Server Manager

>> !
Answer: C

DHCP Manager is one of several Client-based Network Administration Tools that can be installed on a computer running NT Workstation. Note that only Event Viewer, Server Manager and User Mg for Domains can be installed on a computer running Windows 95. Along with the DHCP Manager, Remote Access Administrator, Remoteboot Manager, Services for Macintosh Manager, WINS Manager and User Profile Editor can also be put on a NT Workstation.


80. What component of NT Server allows for automatic TCP/IP configuration for clients?

A. TCP/IP Services.
B. DHCP Service - Dynamic Host Configuration Protocol Service.
C. WINS - Windows Internet Name Server.
D. FTP - File Transfer Protocol.
E. SNMP - Simple Network Management Protocol.

>> !
Answer: B

For DHCP clients on a NT network, the node type is assigned by the DHCP server. When WINS servers are in place, NetBT resolves names. When WINS servers are not in place, NetBT uses b-node broadcast messages to resolve names. NetBT can also use LMHOSTS files and DNS depending upon how TCP/IP is configured. A network administrator controls how IP addresses are assigned by specifying lease durations with the DHCP server. DHCP is implemented under RFC 1533, 1534, 1541 and 1542. A NT Server can act as a DHCP relay agent to relay DHCP and BOOTP broadcast messages between a DHCP/BOOTP server and a client across a router. This could be done, for example, on a subnet in order to forward messages and replace the router.


81. What function can be performed by DHCP servers using SNMP?

A. Configuration of Workstation
B. Monitoring
C. Loading and unloading of service
D. Accessing the internet
E. Changing a users password

>> !
Answer: B

SNMP is a network management protocol used in TCP/IP and IPX networks. It communicates between a management program run by an administrator and the network management agent running on a host.


82. Why is WINS better at dynamic name registration and resolution than DNS?

A. It allows NetBIOS namespace to be used.
B. It allows up to 48 characters for each client, compared to 24 for DNS.
C. It does not require local NT Server participation.
D. DNS often introduces security holes, while WINS provides complete protection.
E. It is the most widely accepted standard for name resolution in the Internet environment.

>> !
Answer: A

When using TCP/IP to communicate on a network, the friendly name that is used must be resolved to an IP address using such things as broadcasts, LMHOSTS or WINS. WINS eliminates the need to broadcast and resolves a computer name to an IP address. The computer name is also called a NetBIOS name.


83. What is the component of NT Server that dynamically registers computer names and maps computer names to IP addresses?

A. Simple TCP/IP Services
B. DHCP - Dynamic Host Configuration Protocol
C. WINS - Windows Internet Naming Service
D. INS - Internet Name Server
E. DNS - Domain Name Service

>> !
Answer: C

You can install a WINS server as part of the process of installing TCP/IP. The process begins by double-clicking on the Network option in Control Panel and adding the WINS. Note that you can start, stop, pause, or continue the WINS service by using net start wins, net stop wins, net pause wins, or net continue wins at the command prompt.


84. One of the major uses of the DLC protocol is connecting to SNA hosts (IBM mainframe or AS/400 computers). SNA provides functionality which is equivalent to which four layers of the OSI model?

A. Network
B. Transportation
C. Data Link
D. Session
E. Application

>> !
Answer: A, B, D & E

SNA layer of Path Control goes with the Transport and Network OSI layers. The SNA Data Flow Control and Transmission Control layers provide the equivalent functionality to the OSI Session layer.


85. You are doing a company presentation and explaining a NT 4.0 Browser Type. You state, "By default, the PDC computer will become this browser type. It will then collect and maintain the master list of available domain network servers and pass all of this information to Master Browsers within the Domain." What NT Browser type have you just presented?

A. Domain Master Browser
B. Master Browser
C. Backup Browser
D. Potential Browser
E. Non-Browser

>> !
Answer: A

The computer browser service provides browsing capabilities that allow users to find resources on a network without having to remember connection syntax and locations. The PDC is the Domain Master Browser and replicates browse lists to all Master Browsers. Master Browsers are elected on each subnet within a domain and there is one Master Browser per subnet. As nodes increase, the Master Browser will start replication to Backup Browsers. File servers announce their presence every 12 minutes. Because each locally-elected Master Browser will only hear local membership announcements, the role of the Domain Master Browser is to consolidate all of the members into a single list.


86. You are doing a company presentation and explaining a NT 4.0 Browser Type. You state, "By default the computer collects and maintains the master list of available network servers and passes all of this information to other Browser types within the Domain. This Browser type is on every subnet and workgroup within your network environment." What NT Browser type have you just presented?

A. Domain Master Browser
B. Backup Browser
C. Master Browser
D. Potential Browser
E. Non-Browser

>> !
Answer: C

Explanation; see answer 85


87. You are doing a company presentation to explain a NT 4.0 Browser type. You state, "This computer will receive a copy of the Browse List from another Browser type and distribute the Browse List to clients that are requesting it." What Browser type have you just presented?

A. Master Browser
B. Backup Browser
C. Potential Browser
D. Non-Browser
E. Domain Master Browser

>> !
Answer: B

The computer browser service provides browsing capabilities that allow users to find resources on a network without having to remember connection syntax and locations. The PDC is the Domain Master Browser and replicates browse lists to all Master Browsers. Master Browsers are elected on each subnet within a domain and there is one Master Browser per subnet. As nodes increase, the Master Browser will start replication to Backup Browsers. File servers announce their presence every 12 minutes. Because each locally-elected Master Browser will only hear local membership announcements, the role of the Domain Master Browser is to consolidate all of the members into a single list.


88. How do you setup a computer to be a Non-Browser on your network?

A. Change the Browse Type by editing the browser parameters entry in the registry.
B. Change the Browse Type in the Server Services edit the browser parameters.
C. Set the Jumper on the NIC for Non-Browser.
D. Set the Browser Type Switch Server Type during a custom installation.

>> !
Answer: A

After installing the NT 4.0 Workstation or Server you can edit this Registry Key to keep the system from becoming a network browser. HKEY_LOCAL_MACHINE\SYSTEM\ ControlSet001\Services\Browser\Parameters\Maintain ServerList "no"


89. Binding is the process of associating a software protocol with a ______ and establishing a communication channel between the two.

A. network adapter
B. session layer device
C. frame type
D. network ID number
E. MAC layer interface device driver

>> !
Answer: A

Along with frame type, binding is important to understand when working with a NetWare environment.


90. Why does NetBIOS name resolution not happen automatically across a WAN?

A. Because most routers do not forward NetBIOS name broadcast packets.
B. Because most bridges do not forward NetBIOS name broadcast packets.
C. Because WANs do not support the NDIS protocol.
D. Because NetBIOS name resolution has a geographical limitation of 15-20 miles.

>> !
Answer: A

Please review NetBios Gateway Architecture of RAS. Remote users connect using NetBEUI, and the RAS server translates packets, if necessary, to IPX or TCP/IP. This enables users to share network resources in a multi-protocol LAN but prevents them from running applications which rely on IPX or TCP/IP on the client. The NetBIOS gateway is used by default when remote clients are using NetBEUI.


91. What computers types can be elected to be a Master or Backup Browser? (Choose all that apply)

A. NT Server
B. NT Workstations
C. Windows for Workgroups
D. Windows 3.1 workstations
E. OS/2 LAN Manager Servers

>> !
Answer: A, B & C

The computer browser service provides browsing capabilities that allow users to find resources on a network without having to remember connection syntax and locations. The PDC is the Domain Master Browser and replicates browse lists to all Master Browsers. Master Browsers are elected on each subnet within a domain and there is one Master Browser per subnet. Master Browser elections are automatic and use subnet broadcasts without using WINS. The election takes into account a number of heuristics to allow the most robust computer to Windows. As nodes increase, the Master Browser will start replication to Backup Browsers. File servers announce their presence every 12 minutes. Because each locally-elected Master Browser will only hear local membership announcements, the role of the Domain Master Browser is to consolidate all of the members into a single list.


92. Do routers filter out NetBIOS name broadcasts?

A. Yes, in most cases broadcasts are filtered out as they reach routers.
B. No, NetBIOS name broadcasts will pass through routers.

>> !
Answer: A


93. What is used to route information for Macintosh networks within the NT Server environment?

A. File service for Macintosh
B. Directory service for Macintosh
C. Mail service for Macintosh
D. AppleTalk Protocol stack
E. Print service for Macintosh

>> !
Answer: D

AppleTalk uses routing table maintenance protocol (RTMP) to maintain information about network addresses and connections. Routers provide interfaces for RTMP and other protocols.


94. When configuring a client to use a WINS Server, you must supply the ______ of the WINS Server.

A. NetBIOS name
B. IP address
C. default gateway
D. MAC address
E. network name

>> !
Answer: B

WINS Clients are configured with the IP adress of one or more WINS Servers. On startup, WINS Clients communicate with a WINS Server to register their computer name and corresponding IP address. When a WINS Client needs to resolve a computer name, the WINS Client sends a request to the WINS Server for the IP address for the computer name being used.


95. When Configuring Services for Macintosh, what option is used to select the adapter driver to which the AppleTalk Protocol will be bound?

A. Enable Routing
B. Advanced Options
C. Zone
D. Network
E. Protocol

>> !
Answer: D


96. What does the LMHOSTS file contain that enables wide-area browsing?

A. NetBIOS name to IP address mapping for computers only on the local subnet.
B. NetBIOS name to IP address mapping for all computers not on the local subnet.
C. NetBIOS name to IP address mapping for all computers.
D. NetBIOS name to IP address mapping for domain controllers not on the local subnet.
E. NetBIOS name to IP address mapping for domain controllers on the local subnet.

>> !
Answer: D

The LMHOSTS file is a local text file that maps IP addresses to NetBIOS names. NT recognizes names rather than IP numbers for network requests and a name discovery process is used to route requests with TCP/IP. Since an IP router is not generally used, the LMHOSTS file allows NT to communicate using TCP/IP across a subnet.


97. What are two benefits of the Windows Internet Name Service (WINS)?

A. Reduction of broadcasts for NetBIOS name resolution.
B. Automatic assignment of TCP/IP parameters on clients.
C. Integration with non-WINS based hosts.
D. Ability to allow NetBIOS clients access to TCP/IP resources.
E. Usually results in more efficient use of Internet addresses by an organization.

>> !
Answer: A & C

WINS servers, according to Microsoft, offer several benefits for internetworks such as centralized management of the computer name database and the database replication policy, reduction of IP broadcast traffic, a scalable design and dynamic database maintenance to support computer name registration and name resolution. Although WINS provides dynamic name services it offers a NetBIOS namespace which is more flexible than DNS for name resolution.


98. Synchronizing the Master Browser is accomplished every ______.

A. 2 min
B. 1.5 min
C. 3 min
D. 10 min
E. 15 min

>> !
Answer: E

The computer browser service provides browsing capabilities that allow users to find resources on a network without having to remember connection syntax and locations. The Primary Domain Controller is the Domain Master Browser and replicates browse lists every 15 minutes to all Master Browsers. Master Browsers are elected on each subnet within a domain and there is one Master Browser per subnet. As nodes increase, the Master Browser will start replication to Backup Browsers. File servers announce their presence every 12 minutes. Because each locally-elected Master Browser will only hear local membership announcements, the role of the Domain Master Browser is to consolidate all of the members into a single list.


99. What types of Windows NT machines can be browsers? (Choose all that apply)

A. Windows NT Servers
B. Primary Domain controllers
C. Windows for Workgroups Workstations
D. Novell clients
E. Macintosh clients

>> !
Answer: A, B & C

Explanation; see answer 98


100. What are three benefits of Windows NT Server Dynamic Host Configuration Protocol (DHCP)?

A. Integration with non-WINS based hosts.
B. Automatic assignment of IPX addresses for clients.
C. Reduced chances of TCP/IP configuration problems.
D. Automatic assignment of TCP/IP parameters on clients.
E. Usually results in more efficient use of Internet addresses by an organization.

>> !
Answer: C, D & E

The DHCP client/server is a Windows Sockets program that provides automatic and dynamic configuration of TCP/IP components. Scopes of IP numbers are used to distribute an IP number to clients as they come up on the net. When a DHCP-enabled client starts for the very first time, it broadcasts a DHCP Discover request on the local subnet. Any DHCP-enabled Server that receives the request may respond with a DHCP Offer. The client then can respond with a DHCP request to accept it. Finally, the server finishes the transaction with a DHCP ACK.


101. Name three types of browsers.

A. Domain Master Browser
B. Secondary Browser
C. Preferred Master Browser
D. Potential Browser
E. Computer Browser

>> !
Answer: A, C & D

Note that the Preferred Master Browser is the same as the Backup Browser except that it is biased in elections through setting the IsDomainMasterBrowser to TRUE. The computer browser service provides browsing capabilities that allow users to find resources on a network without having to remember connection syntax and locations. The PDC is the Domain Master Browser and replicates browse lists every 15 minutes to all Master Browsers. Master Browsers are elected on each subnet within a domain and there is one Master Browser per subnet. As nodes increase, the Master Browser will start replication to Backup Browsers. File servers announce their presence every 12 minutes. Because each locally-elected Master Browser will only hear local membership announcements, the role of the Domain Master Browser is to consolidate all of the members into a single list.


102. What must be configured in order to resolve NetBIOS names of computers located on other subnets?

A. The ETC File.
B. The Dynamic Host Configuration Protocol (DHCP) service.
C. The TCP/IP File.
D. The LMHOSTS File.
E. The NBT File.

>> !
Answer: D

Before configuring a computer to use the LMHOSTS file you must create the primary file on each computer, name the file LMHOSTS and save it in the winnt\system32\drivers\etc folder. every NetBIOS name is 16 characters long. The user-definable portion is the first 15 characters.


103. Under what conditions can a NT Workstation become a Backup Browser in a domain?

A. Never, only servers can be Backup Browsers.
B. When there are less than three Servers performing Backup Browser duty.
C. When there are less than five Servers performing Backup Browser duty.
D. When there is only one Master Browser on the internetwork.
E. When the Servers in the domain are all offline.

>> !
Answer: B

There will be at least one Master Browser on a domain and one Backup Browser for every 32 systems in the domain. This is done by the Master Browser telling a Potential Browser to become a Backup Browser. The computer browser service provides browsing capabilities that allow users to find resources on a network without having to remember connection syntax and locations. The PDC the Domain Master Browser and replicates browse lists every 15 minutes to all Master Browsers. Master Browsers are elected on each subnet within a domain and there is one Master Browser per subnet. As nodes increase, the Master Browser will start replication to Backup Browsers. File servers announce their presence every 12 minutes. Because each locally-elected Master Browser will only hear local membership announcements, the role of the Domain Master Browser is to consolidate all of the members into a single list.


104. What service allows a NT Server to provide access to NetWare volumes for NetBIOS clients?

A. Client Service for NetWare (CSNW)
B. Gateway Services for NetWare (GSNW)
C. Microsoft Windows Sockets Services
D. Novell NetBIOS Service
E. Windows NT Server NetWare Link (NWLink) Service

>> !
Answer: B

The objective of GSNW is to allow Microsoft clients to access files on NetWare servers.


105. When collecting domain lists, what is the longest interval a domain can appear on the list after going down?

A. 4 times the max announcement period, or 60 minutes.
B. 3 times the max announcement period, or 45 minutes.
C. 2 times the max announcement period, or 20 minutes.
D. 3 times the max announcement period, or 60 minutes.
E. 5 times the max announcement period, or 25 minutes.

>> !
Answer: B

You may have "noticed" this phenomenon when removing a computer in Server Manager. It may take up to 45 minutes to not "see" it anymore on the Network Neighborhood or within Server Manager.


106. You are administering a domain that is on a LAN only, i.e. there are no routers between network segments. How many Domain Master Browsers and Master Browsers will you have?

A. One Domain Master Browser and one or more Master Browsers.
B. One Domain Master Browser that is also the Master Browser.
C. One Domain Master Browser and one Master Browser.
D. One or more Domain Master Browsers and one Master Browser.
E. One or more Domain Master Browsers and one or more Master Browsers.

>> !
Answer: B

The computer browser service provides browsing capabilities that allow users to find resources on a network without having to remember connection syntax and locations. The PDC is the Domain Master Browser and replicates browse lists every 15 minutes to all Master Browsers. Master Browsers are elected on each subnet within a domain and there is one Master Browser per subnet. As nodes increase, the Master Browser will start replication to Backup Browsers. File servers announce their presence every 12 minutes. Because each locally-elected Master Browser will only hear local membership announcements, the role of the Domain Master Browser is to consolidate all of the members into a single list.


107. How is the Master Browser chosen?

A. By the Administrator.
B. By the user.
C. Through an election algorithm.
D. By the hardware.
E. First-In First-Out (FIFO) algorithm.

>> !
Answer: C


108. What packets are sent between Domain Master Browsers?

A. Browser Announcement packets
B. MasterBrowserAnnouncement packets
C. MasterDomainBrowser packets
D. DomainAnnouncement packets
E. MasterDomainReceive packets

>> !
Answer: D


109. What allows you to designate a directory as a Macintosh Accessible Volume, handles permissions, and ensures Macintosh filenames are legal NTFS names?

A. Print service for Macintosh
B. File Service for Macintosh
C. Directory service for Macintosh
D. Mail service for Macintosh
E. A device "the AppleTalk Protocol"

>> !
Answer: B

All Macintosh-accessible volumes must be on an NTFS partition or a CDFS volume.


110. What utility is used to display TCP/IP Protocol session information?

A. IPCONFIG
B. NBTSTAT
C. NETSTAT
D. ROUTE
E. HOSTNAME

>> !
Answer: C

Netstat -a will display all connections and listening ports. Other parameters can also be used to show a variety of information, e.g., use netstat -r to display the contents of the routing table or netstat -p tcp to show connections for tcp (UDP can also be specified).


111. What are three security measures that are recommended for maximum security on a computer that is not physically secure?

A. Format all hard disk partitions as FAT partitions.
B. If the computer does not require network access, remove the network card.
C. Use a locked CPU case.
D. Set the Boot.ini time-out to 0 to disable the floppy drive.

>> !
Answer: B, C & D

The disk should be formatted with NTFS for security.


112. What Browser Server can be configured to have an advantage in browser elections and will become the Master Browser?

A. Domain Master Browser
B. Secondary Browser
C. Preferred Master Browser
D. Potential Browser

>> !
Answer: C

NT provides the Browser service to display a list of available resources. An administrator can configure a computer to be the Preferred Master Browser so that when this computer is started it will designate itself as the Master Browser for the domain or workgroup. If there is already a Master, the Preferred Master will force an election to ensure that there will only be one Master and that it will assume the role. A Preferred master Browser will not win an election over a PDC since a PDC always functions as the Master Browser of the domain.


113. RAS setup will automatically bind to what three protocols if they are installed on the computer?

A. NetBEUI
B. NetBIOS
C. TCP/IP
D. IPX

>> !
Answer: A, C & D


114. What ability is not provided by the RAS Client interface?

A. To connect.
B. To Disconnect.
C. To Create new phone book entries.
D. To monitor the software compression ratio.
E. To verify connection status.

>> !
Answer: D

RAS Clients cannot monitor the compression ratio. Also note that RAS can be installed with a parameter specification in the Network section of an Answer file.


115. What algorithm is designed for encrypting data designed by the National Bureau of Standards?

A. SPAP
B. PAP
C. DES
D. MS-D/RAP
E. RAS MD5-CHAP or RAS MD4

>> !
Answer: C

RAS uses DES and RSA MD5. Microsoft RAS uses DES when both the client and the server use RAS. DES was designed to protect against password discovery and playback.


116. How many NetBIOS names can be registered for RAS clients by a single RAS server?

A. Unlimited
B. 8
C. 16
D. 250
E. 4.096

>> !
Answer: D


117. The Windows NT Server default print spooler runs at what priority?

A. 1
B. 9
C. 15
D. 31

>> !
Answer: B

The default priority level for Windows NT Server is set for 9, Windows NT Workstation is set to 7.


118. Which of the following are valid ARC names? (Choose all that apply)

A. scsi(0)disk(1)rdisk(0)partition(1)\WINNT
B. scsi(0)disk(1)rdisk(2)partition(1)\WINNT
C. multi(0)disk(0)rdisk(2)partition(0)\WINNT
D. multi(0)disk(0)rdisk(1)partition(1)\WINNT

>> !
Answer: A & D

When ARC names start with SCSI(0), RDISK will be set to 0, this eliminates Answer B. Partition can never be 0, this eliminates Answer C.


119. From which of the following can BOOT.INI be edited? (Choose all that apply)

A. Control Panel / System / Startup
B. Command prompt >edit c:\boot.ini
C. Command prompt >bootedit boot.ini
D. Registry editor

>> !
Answer: A & B

There are several ways you can edit the BOOT.INI file. Go to the Control Panel / System / Startup or at a Command prompt type "edit c:\boot.ini".


120. Windows NT boots from which partition?

A. System
B. Boot
C. Data
D. Main

>> !
Answer: A

In Windows NT, the active partition, which is usually drive C, is known as the System partition. The System partition contains Boot Files and the Boot Partition contains operating system files.


121. Windows NT loads NT system files from which partition?

A. Boot
B. System
C. Main
D. Alternate

>> !
Answer: A


122. A user calls and says he is trying to connect to the network via the corporate NT RAS server using NWLink. He says he has no problem connecting to the server but is unable to access any resources on the network. What could be the problem?

A. He is trying to connect to the network with a user id which is only valid on the local machine.
B. NWLink does not support the RAS gateway.
C. The protocol he is using is configured for the local computer only and not the entire network.
D. The NIC card used on the RAS server does not support ODI.

>> !
Answer: C

The Network Configuration dialog box is used to configure protocols. When trying to access resources on the network verify that "Entire network" is selected in the RAS Server IPX Configuration dialog box.


123. A user is trying to dialin to an NT Server with RAS installed. Unfortunately, he gets disconnected immediately and receives the message "Not an authorized user". What should be checked first? (Choose all that apply)

A. User Manager for Domains - User must not be enabled.
B. User Manager for Domains - Dial in access permission for user.
C. Remote Access Admin - Dial in access permission for user.
D. Control Panel / Network / Services / RAS - Dial in access permission for user.

>> !
Answer: B&C

RAS permissions can be granted either from User Manager for Domains or the Remote Access Admin utility. Remote Access permissions must be granted before a user can connect using Dial-Up Networking.


124. You are trying to run a program on your NT Workstation from a NetWare server over your RAS connection. You have installed the NWLink compatible protocol at the remote computer, but still cannot connect to the NT Server. What is the problem? (Choose all that apply)

A. Install FSPN on the RAS server
B. Install GSNW on the RAS server
C. Install CSNW on the remote NT client
D. NetWare servers do not support NWLink over a RAS connection

>> !
Answer: B&C

To access programs on a Netware server, Client Services for NetWare (CSNW) and NWLINK must be installed on the workstation, or GSNW must be installed on the RAS server.


125. You are having problems with the RAS server, what can be done to create a log file?

A. From Control Panel, set the PPP logging option to create a PPP.log file in \system32\RAS
B. In the registry, set the PPP logging key to 1 to create a PPP.log file in \system32\RAS
C. From RAS Admin, set the PPP logging option to create a PPP.log file in \system32\RAS
D. A log file is automatically created whenever RAS is enabled

>> !
Answer: B

Change the registry value for HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Rasman\PPP\Logging to 1. This will create a PPP.log file to help troubleshoot the problem.


126. Which of the following requires a SCSI CD-ROM for installation?

A. RISC
B. Intel
C. Next

>> !
Answer: A

A CD-ROM drive is required when installing Windows NT Server on a RISC computer.


127. What is the minimum amount of RAM required to install NT Server?

A. 10
B. 12
C. 16
D. 32

>> !
Answer: C


128. What is the minimum amount of RAM required to install NT Workstation?

A. 10
B. 12
C. 16
D. 32

>> !
Answer: B


129. What advantage does the Microsoft Network Client have over the Novell NETX client? (Choose all that apply)

A. Protected Mode
B. Less expensive
C. Supports the NWLink protocol
D. Allows other clients to be loaded at the same time

>> !
Answer: A & D

The Microsoft Network Client allows multiple clients to be loaded at the same time, while running in Protected Mode. Novell NETX, is a DOS client that runs in real mode and only allows one client to be loaded at a time.


130. NT treats which of the following as it would a network card?

A. X.25
B. SCSI adapter
C. ISDN
D. Modem

>> !
Answer: D

Modems allow communication between the server and a client using Dial-Up Networking, just as if the remote client was directly connected to the network.