NetWare 4.x Admin


1. Which security system regulates who can access the files and directories in volumes on the network and how they can access that information?

A. Login security
B. File system security
C. Console security
D. NDS security

>> !
Answer: B


2. What determines the type of access a user has to directories and files within the file system?

A. Equivalence
B. Rights
C. Access
D. Control
E. Config

>> !
Answer: B


3. Rights for directories are different from rights for files.

A. True
B. False

>> !
Answer: B


4. What right is needed to delete files and subdirectories?

A. Delete
B. Erase
C. Modify
D. Write
E. Read

>> !
Answer: B


5. By default, a User object created with the NETADMIN utility is granted [RWCEMFA] to the user's home directory.

A. True
B. False

>> !
Answer: A


6. What right grants the right to change trustee assignments and the Inherited Rights Filter?

A. Read
B. Write
C. Access Control
D. Modify

>> !
Answer: C


7. The Supervisor directory/file right cannot be blocked by an Inherited Rights Filter.

A. True
B. False

>> !
Answer: A


8. A user object not in the same container as the SYS: volume must be manually granted Read and File Scan rights to SYS:PUBLIC.

A. True
B. False

>> !
Answer: A


9. A ______ is an object that has been placed on the Access Control List of the directory or file and must be defined before access rights can be granted.

A. Rights
B. Trustee
C. User
D. Template
E. Profile

>> !
Answer: B


10. What two methods can be used to effectively block the inheritance of file system rights?

A. Create an IRF
B. Create a new trustee assignment for that user, at a higher level in the file system directory structure
C. Create a new trustee assignment for that user, at a lower level in the file system directory structure
D. Assign the user to a profile member list

>> !
Answer: A & C


11. Name four NDS container objects that are considered natural groups and can be used to assign file system rights to multiple users.

A. [Root]
B. Country
C. Organization
D. Organizational Role
E. Organizational unit

>> !
Answer: A, B, C & E


12. Since directory and file system rights are the same, all rights to a directory can be inherited by the files in the directory.

A. True
B. False

>> !
Answer: A


13. The Inheritance Rights Filter of a directory does not block rights that are assigned to a trustee of that same directory.

A. True
B. False

>> !
Answer: A


14. ______ rights are those rights a user can actually exercise on a given directory or file.

A. Inherited
B. Effective
C. Calculated
D. Assigned

>> !
Answer: B


15. What right is needed to change the Inherited Rights Filter?

A. Create
B. Write
C. Modify
D. Access Control

>> !
Answer: D


16. In what object are assigned users referred to as "occupants"?

A. User object
B. Group object
C. Parent container object
D. Profile object
E. Organizational Role object

>> !
Answer: E


17. The modularity of the NetWare operating system provides which two benefits?

A. Allows modules to be developed by third parties.
B. Allocates server RAM by specific module.
C. Reduces server workload.
D. Enhances server security.

>> !
Answer: A & C


18. Which of the following are primary services of the core operating system. (Choose all that apply)

A. NDS
B. Database
C. Routing
D. Authentication
E. Printing

>> !
Answer: A, B, D & E


19. All of the following are types of NetWare Loadable Modules except...

A. LAN drivers
B. Name Space
C. Disk drivers
D. Print drivers

>> !
Answer: D


20. Which of the following extensions refer to disk drivers? (Choose all that apply)

A. CDM
B. DSK
C. HAM
D. NLM
E. NAM

>> !
Answer: A, B & C


21. The LOAD command assumes that the path to the requested NLM is SYS:SYSTEM unless otherwise specified.

A. True
B. False

>> !
Answer: A


22. Which server file is used to automate setting up a server for direct or asynchronous connection?

A. REMOTE.NLM
B. AUTOEXEC.NCF
C. AUTOEXEC.BAT
D. STARTUP.NCF

>> !
Answer: B


23. What two NLMs are required to setup a server for a direct remote connection?

A. REMOTE.NLM
B. RS232.NLM
C. RSPX.NLM
D. ASYNC.NLM
E. RCONSOLE.NLM

>> !
Answer: A & C


24. What two NLMs are required to setup a server for an asynchronous connection?

A. ASYNC.NLM
B. REMOTE.NLM
C. RCONSOLE.NLM
D. RS232.NLM
E. RSPX.NLM

>> !
Answer: B & D


25. Which of the following tasks can be completed using RCONSOLE? (Choose all that apply)

A. Change server screens
B. Scan server directories
C. Transfer files to the server
D. Download files from the server
E. Change to DOS to view network directories

>> !
Answer: A, B, C & E


26. Which keystroke combination allows you to view the RCONSOLE menu?

A. ALT + F1
B. ALT + F2
C. ALT + F3
D. XL + F1
E. XL + Esc

>> !
Answer: A


27. Which keystroke combination in RCONSOLE allows you to move forward through server console screens?

A. ALT + F1
B. ALT + F2
C. ALT + F3
D. ALT + F4
E. ALT + F5

>> !
Answer: C


28. To help prevent unauthorized access to the server console, RCONSOLE requires a password when loading REMOTE.NLM.

A. True
B. False

>> !
Answer: A


29. What are the three major steps in setting up network printing?

A. Activate the print server
B. Connect printers to the network
C. Create and configure printing objects
D. Assign print queue users

>> !
Answer: A, B & C


30. Which of the following are critical properties of the Print Queue object? (Choose all that apply)

A. Name
B. Print server name
C. Volume
D. Printer name

>> !
Answer: A & C


31. Select the answer which lists the correct steps for the NetWare 4 server startup procedure.

A.
1. Execute SERVER.EXE,
2. load LAN driver,
3. load disk driver,
4. provide server name,
5. bind IPX to the LAN driver,
6. provide internal IPX network number.
B.
1. Load disk driver,
2. bind IPX to the LAN driver,
3. load disk driver,
4. execute SERVER.EXE,
5. provide server name,
6. provide internal IPX network number.
C.
1. Execute SERVER.EXE,
2. load disk driver,
3. provide server name,
4. provide internal IPX network number,
5. load LAN driver,
6. bind IPX to the LAN driver.
D.
1. Execute SERVER.EXE,
2. provide server name,
3. provide internal IPX network number,
4. load disk driver,
5. load LAN driver,
6. bind IPX to the LAN driver.
E.
1. Execute SERVER.EXE,
2. load LAN driver,
3. provide server name,
4. provide internal IPX network number,
5. load Disk driver,
6. bind IPX to the LAN driver.

>> !
Answer: C


32. The minimum amount of RAM required for a NetWare 4 server is ______.

A. 32 MB
B. 8 MB
C. 12 MB
D. 16 MB
E. 20 MB

>> !
Answer: E


33. Select the network number that must be common on a NetWare network backbone.

A. IPX Internal Network Number
B. Network Board Address
C. Network Address
D. TCP/IP node address
E. Dedicated server address

>> !
Answer: C


34. Assuming you have done the default installation, from which directory would you execute SERVER.EXE?

A. C:\NWCLIENT
B. SYS:\PUBLIC
C. C:\NWSERVER
D. SYS:\SYSTEM

>> !
Answer: C


35. Select each choice that acts as a configuration file for a NetWare server.

A. AUTOEXEC.NCF
B. NET.CFG
C. SERVER.EXE
D. STARTUP.NCF
E. STARTNET.BAT

>> !
Answer: A & D


36. Select the command that allows a server to be booted without a STARTUP.NCF

A. SERVER -S
B. SERVER /NS
C. SERVER -NS
D. SERVER -AN
E. SERVER -SAM

>> !
Answer: C


37. Check all choices that could be found in an AUTOEXEC.NCF file.

A. Time zone information
B. Bindery context information
C. Configuration parameters for the disk driver
D. Maximum licensed connections
E. Configuration parameters for LAN driver

>> !
Answer: A, B & E


38. The proper syntax for booting a server without an AUTOEXEC.NCF is;

A. SERVER -A
B. SERVER -NA
C. SERVER NO AUTO
D. SERVER -SA
E. SERVER -ANN

>> !
Answer: B


39. Which utilities can be used to edit the server configuration files.

A. INSTALL.NLM
B. SYSCON.EXE
C. EDIT.NLM
D. EDIT.BAT

>> !
Answer: A & C


40. From the following list, check all that are console commands.

A. REMOTE
B. REMOVE DOS
C. SECURE CONSOLE
D. MONITOR
E. SEARCH

>> !
Answer: B, C & E


41. What is the default search path for loading NLMs.

A. C:\DOS;C:\NWSERVER
B. SYS:\SYSTEM
C. SYS:;SYS:\SYSTEM
D. SYS:;SYS:\SYSTEM;SYS:\PUBLIC

>> !
Answer: B


42. What utilities can be used to change server configuration parameters.

A. MONITOR
B. SERVMAN
C. CHANGE
D. SET
E. EDIT

>> !
Answer: A, B & D


43. What two NLMs must be loaded at the server for RCONSOLE to be utilized?

A. REMOTE.NLM
B. RCONSOLE.NLM
C. RSPX.EXE
D. RSPX.NLM
E. AUTOEXEC.NCF

>> !
Answer: A & D


44. When binding IPX, you must be sure you identify the appropriate;

A. Cable segment.
B. Cable type.
C. Router port.
D. Connector pin.

>> !
Answer: A


45. What two utilities can be used to change server configuration parameters.

A. MONITOR
B. SERVMAN
C. CHANGE
D. SET
E. EDIT

>> !
Answer: B & D


46. Implementing and managing time synchronization is part of which phase of designing the network?

A. Designing the structure.
B. Completing the design.

>> !
Answer: B


47. NetWare 4.11 supports multiple network boards and allows communication to occur between networks. This function is referred to as;

A. A Gateway.
B. A Router.
C. A Communicator.
D. A Bridge.

>> !
Answer: B


48. The design of a Directory tree effects the following areas. (Choose all that apply)

A. Network administration and maintenance
B. User access of network resources
C. Network traffic
D. NDS fault tolerance
E. Users physical location

>> !
Answer: A, B, C & D


49. Which commands must be entered in a server reboot batch file, to allow rebooting a server from a remote location.

A. SECURE CONSOLE
B. REMOVE DOS
C. RSPX
D. DOWN
E. EXIT

>> !
Answer: B, D & E


50. Which 4 files normally run to boot a NetWare 4.11 server?

A. CONFIG.SYS AUTOEXEC.BAT AUTOEXEC.NCF STARTUP.NCF
B. CONFIG.SYS AUTOEXEC.NCF SERVER.EXE STARTUP.NCF
C. AUTOEXEC.BAT SERVER.EXE STARTUP.NCF AUTOEXEC.NCF
D. COMMAND.COM CONFIG.SYS AUTOEXEC.BAT STARTUP.NCF

>> !
Answer: C


51. The minimum size hard drive required for a NetWare 4.11 server is;

A. 450MB
B. 1GB
C. 90MB
D. 200MB

>> !
Answer: C


52. Select the two phases of Directory design:

A. Static design
B. Container design
C. Structural design
D. Detailed design

>> !
Answer: C & D


53. Check all choices that could be found in an AUTOEXEC.NCF file.

A. Time zone information
B. Bindery context information
C. Configuration parameters for the disk driver
D. File server name
E. User login account information

>> !
Answer: A, B & D


54. Securing NDS is part of which design phase:

A. Designing the structure
B. Completing the design
C. Container
D. System
E. Instruction

>> !
Answer: B


55. Select the sources on which the design of a Directory tree can be based. (Choose all that apply)

A. Network topology
B. Workgroup needs
C. Number of applications
D. Number of servers
E. Resource access

>> !
Answer: A, B & E


56. A naming standards document provides the following: (Choose all that apply)

A. Guidelines for entering values in the Object name field
B. Suggested value formats
C. Examples of property values
D. Examples of file and directory names

>> !
Answer: A, B & C


57. Guidelines for naming conventions include:

A. Use short but descriptive names.
B. Length does not matter as long as spaces are used for readability.

>> !
Answer: A


58. What is the maximum number of Single Reference servers that can be establish in a single Directory tree?

A. Two
B. Unlimited
C. One
D. One per container

>> !
Answer: C


59. Single Reference time servers are time ______.

A. Givers
B. Receivers

>> !
Answer: A


60. A Directory tree works well with approximately ______ layers.

A. 3 to 5
B. 5 to 8
C. 2 to 10

>> !
Answer: B


61. An object name and path cannot exceed ______ characters.

A. 32
B. 8
C. 256
D. 124

>> !
Answer: C


62. A naming standards document provides the following: (Choose all that apply)

A. Guidelines for entering values in the Object name field
B. Suggested value formats
C. Examples of property values
D. Examples of file and directory names

>> !
Answer: A & C


63. Guidelines for devising naming conventions include:

A. Use short but descriptive names.
B. Length does not matter as long as spaces are used for readability.
C. Use all capital letters.
D. Use all lower case letters.

>> !
Answer: A


64. Single Reference time servers are time ______.

A. Providers
B. Receivers
C. Passers
D. Delayed

>> !
Answer: A


65. A small network is defined as one with fewer than ______ Objects and ______ Servers.

A. "100, 5"
B. "250, 15"
C. "1000, 10"
D. "1000,5"

>> !
Answer: D


66. When drawing the network, you draw the upper layers based on:

A. The number of servers and users.
B. The time available for planning.
C. The LAN topology.
D. The WAN topology.

>> !
Answer: D


67. The depth on the Directory structure is limited by:

A. The number of characters in the distinguished name.
B. The number of letters in the alphabet.
C. The number of sub-directories in the file structure.
D. The available container types.

>> !
Answer: A


68. Reasons to alter default NDS security include: (Choose all that apply)

A. To allow a user to use a Profile login script
B. Granting a user file system rights to a server in the users default container
C. Granting a user the browse right to the users default container
D. Making use of the directory map object
E. Making use of the System Login Script

>> !
Answer: A & D


69. NetWare 4 will allow an organization to provide both centralized and/or distributed administration.

A. True
B. False

>> !
Answer: A


70. The definition of centralized administration is:

A.. A user is defined as an administration for one organizational unit of the tree, providing centralized support for that OU.
B. A group of users provides support for several (but not all) OU's in the tree.
C. The person who created the tree on installation.
D. One user or a group of users has administration rights to the entire NDS tree.

>> !
Answer: D


71. Some of the administrative tasks that can be distributed include: (Choose all that apply)

A. Installation of the first server
B. Managing time synchronization
C. Adding users to the tree
D. Assigning Container administrators
E. Creating workgroup managers

>> !
Answer: C & E


72. When creating a container administrator, it is important to use caution when using the Security Equal To property because: (Choose all that apply)

A. The IRF could remove the S right from the file system, negatively affecting the entire group.
B. Any change made to the main user would be reflected in all equivalent users.
C. The user that all others are equal to might leave the company and be deleted.
D. The user will inherit the S right to the file system.

>> !
Answer: B & C


73. If setting up a container administrator using an organizational role object, the Organizational role would receive:

A. The [S] object and property rights to the [ROOT] object.
B. The [S] object and property rights to [PUBLIC] object.
C. [BCD] to the container.
D. [S] or [BCDR] or [SBCDR] to the container depending on plans for the IRF.

>> !
Answer: D


74. An exclusive container administrator:

A. Is just like a centralized administrator.
B. Is the only administrator who can administrate a container.
C. Shares responsibility with other members of the MIS team.
D. Has full rights to the [ROOT] container.

>> !
Answer: B


75. It is possible to lose control over a section of the NDS tree.

A. True
B. False

>> !
Answer: A


76. The recommended account types for a Container administrators include: (Choose all that apply)

A. A group account.
B. An individual account.
C. A container object.
D. An organizational role.
E. An alias.

>> !
Answer: B & D


77. The Admin account should be used only for:

A. The senior MIS person on staff.
B. The daily account of the user managing the NDS tree.
C. A print queue operator to make changes to the queue.
D. Container wide administrative functions.
E. Enterprise wide administrative functions.

>> !
Answer: E


78. A Print Server Operator needs the following NDS rights assigned:

A. [SBCDR] to the container object that holds the print server.
B. [BCDR] print queue that is serviced by the print server.
C. Added to the PRINT QUEUE OPERATOR LIST of each queue serviced by the print server.
D. Added to the PRINT SERVER OPERATOR list of the appropriate print server.
E. Admin equivalent.

>> !
Answer: D


79. You have decided that your container administrator should NOT have rights to the file system of a server that resides in the container. You must make the following NDS assignment(s):

A. Create an IRF that blocks the [S] right to the Server object.
B. This cannot be done. The supervisor file system right can never be blocked.
C. This can never be done. Container administrators are given the [S] right to the container and it flows to all objects in the container.
D. Create an IRF that blocks all file system rights at the volume level.

>> !
Answer: A


80. Two examples of items that may require additional NDS rights assignments include;

A. A Profile Object.
B. A Print Server Object.
C. A Print Queue Object.
D. A Group Object.
E. A Directory Map Object.

>> !
Answer: A & E


81. When making special rights assignments to create a Mailing List Administrator, the rights should be granted:

A. To the root of the Sys: volume.
B. Using the ALL PROPERTIES option.
C. Using the SELECTED properties option.
D. To the [PUBLIC] Trustee.

>> !
Answer: C


82. When NDS is installed on a server, certain objects are given default rights. The objects are:

A. The supervisor.
B. The creator of the server.
C. [ROOT]
D. [PUBLIC]
E. The group Everyone.

>> !
Answer: B, C & D


83. The default rights given to a user upon creation include: (Choose all that apply)

A. [ R] property right to All properties.
B. [RW] to the login script property.
C. [B] to the server name property.
D. [B] to all properties.

>> !
Answer: A & B


84. Granting the [S] object right:

A. Implies the [B] property right.
B. Implies the [S] right to all properties.
C. Removes the need for an IRF.
D. Can only be done at the container level.

>> !
Answer: B


85. Partitioning is the process of:

A. moving replicas.
B. dividing the Directory.
C. creating replicas.
D. assigning user parts.
E. dividing a container.

>> !
Answer: B


86. A Partition can contain:

A. A single container only.
B. A Single container or Multiple containers.
C. Leaf Objects only.
D. The [ROOT] Object.

>> !
Answer: B


87. A parent partition:

A. Exists only at the [ROOT].
B. Contains only server objects.
C. Can never be a child partition.
D. Resides immediately above the root of another partition.

>> !
Answer: D


88. A child partition:

A. Is below the parent.
B. Is container in the parent.
C. Is above the parent.
D. Is always created at the Organization level.

>> !
Answer: A


89. NDS uses ______ types of replicas.

A. one
B. two
C. three
D. four
E. five

>> !
Answer: D


90. A master replica is created:

A. When a partition is first defined.
B. When the [ROOT] is first defined.
C. When the first server is installed into the container.
D. When the user is defined.
E. When the partition is replicated.

>> !
Answer: A


91. How many copies of a read/write replica are supported:

A. Any number, including none.
B. Any number, but a minimum on 1 is required.
C. Any number but a minimum of 3 is required.
D. There must be 3 copies.

>> !
Answer: A


92. A subordinate reference is created:

A. By the LAN administrator.
B. Whenever a partition is moved.
C. Automatically by NDS.
D. Automatically on a server which contains a replica of a child partition but not of the parent.

>> !
Answer: C


93. NDS redundancy and fault tolerance is created by:

A. Duplication of [ROOT]
B. Replication
C. Partitioning
D. Time synchronization

>> !
Answer: B


94. A replica ring includes;

A. A single server.
B. All servers with replicas of the same partition.
C. All servers that contain replicas of any partition.
D. All servers in the NDS tree.

>> !
Answer: B


95. The four types of replicas include: Master, Read/Write, Subordinate Reference and

A. Write Only
B. Read Only
C. Secondary
D. Single reference

>> !
Answer: B


96. The second and third new servers in a partition receive a ______ replica of the partition.

A. Master
B. Read/Write
C. Read Only
D. Subordinate Reference

>> !
Answer: B


97. Partitions are replicated to: (Choose all that apply)

A. Provide fault tolerance.
B. Improve network response time.
C. Allow easier directory synchronization.
D. Allow easier time synchronization.

>> !
Answer: A & B


98. The [ROOT] partition:

A. Should always be replicated.
B. Does not need to be replicated.
C. Is automatically replicated, even if you have only one server.
D. Can not be replicated.

>> !
Answer: A


99. A container object is moved by:

A. Dragging and dropping the container on its new location.
B. Starting SERVMAN with the /MC switch.
C. By using SYSCON.
D. By using NDS Manager in Windows.

>> !
Answer: D


100. Time synchronization is important because: (Choose all that apply)

A. Servers don't need to know what time it is, time synchronization is not important
B. File systems use server time to time stamp files
C. Messaging applications use time stamps
D. NDS uses time stamps to keep tract of changes

>> !
Answer: B, C & D


101. UTC stands for:

A. Universal Type Command
B. Universal Time Coordinated
C. United Time Cycles

>> !
Answer: B


102. A partition is named for:

A. It's creator.
B. It's largest container.
C. The Organizational unit it contains.
D. The container closest to [ROOT].

>> !
Answer: D


103. Which type of replica contains Object Data? (Choose all that apply)

A. Write-Only replica.
B. Read-Only replica.
C. Subordinate reference.
D. Read-Write replica.

>> !
Answer: B & D


104. To move a container you must first:

A. Change it's name to a Bindery compatible name.
B. Delete any subordinate references it contains.
C. Make it the Root of a partition.
D. Delete all containers between it and [ROOT].

>> !
Answer: C


105. Containers can be moved with which utilities? (Choose all that apply)

A. NetWare Administrator.
B. NDS Manager.
C. NETADMIN.
D. FILER.

>> !
Answer: B & C


106. When you install a new NetWare 4 server in a Directory tree, the default bindery context is:

A. [ROOT]
B. The container object that contains the server.
C. The highest level Organization object.

>> !
Answer: B

The container that the server is installed into.


107. Which login scripts are available to bindery users on a NetWare 4 server?

A. "Container only, but it must be created using NetAdmin."
B. Profile and user scripts.
C. "System login script is available, but must be created with Syscon."
D. All NetWare 4 login scripts are available regardless of login type.

>> !
Answer: C


108. "If you have objects in separate containers that have the same common name, you may have a name conflict when you use "

A. NWADMIN
B. FILER
C. Bindery Services
D. PRINTCON

>> !
Answer: C


109. Three reasons to NETSYNC NetWare 3 servers into a NetWare 4 environment include:

A. You are running NNS (NetWare Name Services)
B. You need a short-term solution to centralized administration
C. Your NetWare 3 users need access to NetWare 4 resources
D. You only have NetWare 4 servers on the network

>> !
Answer: A, B & C


110. A NetWare 4 server can be host to up to ______ NetSync'd NetWare 3 servers.

A. 8
B. 10
C. 12
D. 14
E. 16

>> !
Answer: C


111. NETSYNC4.NLM is:

A. Loaded on the NetWare 4 server.
B. Loaded on the NetWare 3 server.
C. Run from the command line.
D. Loaded on both the NetWare 3 and 4 servers.

>> !
Answer: A


112. On a NetWare 3 server, after NetSync has been run, two NLM's are run from the AUTOEXEC.NCF file. Those NLM's are:

A. NETSYNC4.NLM
B. NETSYNC3.NLM
C. REMAPID.NLM
D. NDS9.NLM
E. NDS3.NLM

>> !
Answer: B & C


113. The verify a NetWare 3.1x servers synchronization with the NDS, you can:

A. Look at the error log.
B. Check NWADMIN to make sure the NetWare 3.1x objects appear.
C. Look at the console screen for error messages.
D. Compare the bindery context to the NetWare.

>> !
Answer: B


114. NetSync (can/cannot) be used to move NetWare 3.1x print services to NetWare 4.

A. can
B. cannot

>> !
Answer: A


115. Bindery context can be set to ______ containers.

A. 8
B. 16
C. 32
D. None, bindery context is no longer used in NetWare.

>> !
Answer: B

16 containers are allowed in a server's Bindery context, but the objects in them must have bindery compatible names.


116. Which name below would be valid in NDS but not in Bindery mode?

A. JohnK.Corp.MCA
B. JOHNK.CORP.MCA
C. John K.Corp.MCA
D. John_K.Corp.MCA

>> !
Answer: C


117. A server must have a ______ of all partitions that include the server's bindery contexts.

A. Replica
B. Read only replica
C. Master or Read/write replica
D. Subordinate reference

>> !
Answer: C


118. To make a permanent change in the server's bindery context you should edit:

A. Autoexec.ncf
B. Autoexec.bat
C. Startup.ncf
D. Config.sys

>> !
Answer: A

The Autoexec.ncf file runs every time the server is booted.


119. A NetSync cluster consists of ______ NetWare 4 server(s) and ______ NetWare 3 server(s).

A. 1 NetWare 4 server and up to 16 NetWare 3 servers.
B. "Any number of NetWare 3 & 4 servers, depending on the number on Objects in the tree."
C. 4 NetWare 4 servers and 4 NetWare 3 servers.
D. 1 NetWare 4 server and up to 12 NetWare 3 servers.

>> !
Answer: D


120. NetSync requires the following NLMs: (Choose all that apply)

A. NETSYNC
B. NETSYNC3
C. REMAPID
D. NETSYNC4

>> !
Answer: B, C & D


121. Choose three ways to fine-tune a system:

A. MONITOR
B. SET PARAMETERS
C. SERVMAN
D. DSREPAIR
E. PARTMGR

>> !
Answer: A, B & C


122. What is the default Garbage Collection Interval?

A. 5 minutes
B. 10 minutes
C. 15 minutes
D. 20 minutes
E. 30 minutes

>> !
Answer: C


123. In looking at the Cache Utilization Statistics on the Monitor Available Options screen, you notice that Long Term Cache hits stands at 72%. What is the Novell recommended course of action?

A. Down the server and restart
B. Run purge to clean out all the erased files
C. Add more memory
D. Lower the amount of time between garbage collections

>> !
Answer: C

Add more memory. Novell also recommends using the REMOVE DOS command and unloading unnecessary NLMs.


124. On the Processor Utilization screen, you notice the IDLE LOOP statistic is at 97%. You should:

A. Add an application manager.
B. Do nothing, this is a good thing.
C. Upgrade the CPU.
D. Install more RAM.

>> !
Answer: B

Do nothing, this is a good thing. Idle loop is inversely proportional to CPU usage.


125. Packets are:

A. Tiny segments of data transmitted across the network.
B. Tiny segments of memory waiting to receive data transmitted across the network.
C. Large groups of information awaiting transfer.

>> !
Answer: A


126. A packet receive buffer is:

A. An area of server memory set aside to hold data packets.
B. Tiny segments of data transmitted across the network.
C. A statistic that only programmers use.

>> !
Answer: A


127. When looking at network board statistics for an NE2000 card, you notice the "No ECB" count statistic. This is:

A. An indication of the number of packets the station could not understand.
B. An indication of the number of packets the card was too busy to receive.
C. An indication that the network card is faulty.

>> !
Answer: B


128. File compression will not compress a file unless there is at least a ______ percent savings in disk space, by default.

A. 1
B. 2
C. 10
D. 15
E. 20

>> !
Answer: E

The default is 20%. The absolute minimum you can set this for is 2% savings.


129. Maximum disk savings are realized when which options are selected during install. (Choose all that apply)

A. Compression is enabled
B. Compression is disabled
C. Suballocation is enabled
D. Suballocation is disabled
E. Disk allocation blocks are large

>> !
Answer: A, C & E


130. Long Term Cache Hits should:

A. Never drop below 90%.
B. Never get above 30%.
C. Remain steady.
D. Increase as more users log in.

>> !
Answer: A

Never drop below 90%. If it does, you need to add RAM to the server.