

MCQOPTIONS
Saved Bookmarks
This section includes 59 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
In heavily overloaded networks, cross¬bar switching offers better performance than cell-backplane switching |
A. | True |
B. | False |
Answer» C. | |
2. |
Your company uses both Ethernet and token-ring LAN's in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enablecommunicationsbetween dissimilar LAN's that use different protocols? |
A. | ridge |
B. | outer |
C. | ateway |
D. | epeater |
E. | one of the above |
Answer» D. epeater | |
3. |
User Manager for domains |
A. | is used to add a workstation to the domain |
B. | is used to create user profiles and system policies |
C. | is used to change file permissions |
D. | is used to assign a log on script to a user or group of users |
Answer» E. | |
4. |
Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this? |
A. | Use Performance Monitor to create a log of all logon attempts |
B. | Use User Manager for Domains to set an Audit policy for all logon attempts |
C. | Use the Services option in Control Panel to start the Alerter service to audit logon attempts |
D. | Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only |
Answer» C. Use the Services option in Control Panel to start the Alerter service to audit logon attempts | |
5. |
Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use? |
A. | repeater |
B. | T connecter |
C. | router |
D. | gateway |
Answer» B. T connecter | |
6. |
Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port |
A. | 1 |
B. | |
Answer» C. | |
7. |
Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"? |
A. | Run User Manager for Domains on any Windows NT Advanced Server in the SYCON domain. Open the Domain Admins group. In the List Names From box choose your workstation and add your workstation user account to the Domain Admins group |
B. | Add your user account to the local Administrators group on each workstation in the SYCON domain |
C. | Add your user account to the Domain Admins group on any Windows NT Advanced Server in the SYCON domain |
D. | Add your user account to the Administrators group on each Windows NT Advanced Server in the SYCON domain |
Answer» B. Add your user account to the local Administrators group on each workstation in the SYCON domain | |
8. |
A route is a path between two network segments |
A. | 1 |
B. | |
Answer» B. | |
9. |
Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments |
A. | 1 |
B. | |
Answer» B. | |
10. |
Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols |
A. | 1 |
B. | False. |
Answer» B. False. | |
11. |
Your company uses both Ethernet and token-ring LAN's in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's that use different protocols? |
A. | bridge |
B. | router |
C. | gateway |
D. | repeater |
Answer» D. repeater | |
12. |
Server Manager |
A. | is used to demote a PDC to a BDC |
B. | is used to shutdown or restart a server |
C. | is used to synchronize the domain |
D. | is used to enable auditing |
Answer» D. is used to enable auditing | |
13. |
The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this? |
A. | Create a mandatory user profile and lock all the program groups |
B. | Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group |
C. | Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access |
D. | Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users |
Answer» C. Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access | |
14. |
A cut-through switch reads the entire packet before forwarding it to the destination segment |
A. | 1 |
B. | |
Answer» C. | |
15. |
Each network segment must have a unique address |
A. | 1 |
B. | |
Answer» B. | |
16. |
With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports |
A. | 1 |
B. | |
Answer» B. | |
17. |
What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification? |
A. | Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used |
B. | The station that holds the token is allowed to transmit a message on the network |
C. | The station that hold the token has the highest priority on the network |
D. | A token contains information that is used to route messages between rings |
Answer» C. The station that hold the token has the highest priority on the network | |
18. |
A Trust Relationship |
A. | is created using server Manager for Domains |
B. | is an administrative and communication link created between two Windows NT Server domains |
C. | can be created between Windows NT W/S computers |
D. | is bi-directional [both way] |
Answer» C. can be created between Windows NT W/S computers | |
19. |
You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do? |
A. | Start the Replication service on Kim's Windows for Workgroups computer |
B. | Relocate Kim's home directory to her Windows for Workgroups computer |
C. | Map a drive on Kim's Windows for Workgroups computer to her home directory on the server |
D. | You cannot do this. Home directories can be accessed only by Windows NT computers |
Answer» D. You cannot do this. Home directories can be accessed only by Windows NT computers | |
20. |
What does the Directory Replicator service allow you to do? |
A. | Copy updated user accounts from a primary domain controller to a backup domain controller |
B. | Copy directories and files from a Windows NT Server computer to a Windows NT Workstation computer that is not a member of a domain |
C. | Mirror the files on multiple partitions from one Windows NT Server computer to another |
D. | Copy files from a Windows NT Workstation computer to a Windows NT Server computer |
Answer» C. Mirror the files on multiple partitions from one Windows NT Server computer to another | |
21. |
Bridges introduce small delays into a network. |
A. | 1 |
B. | |
Answer» B. | |
22. |
You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this? |
A. | Use Server Manager |
B. | Use Windows NT Diagnostics |
C. | Use the Devices option in Control Panel |
D. | Use the Add/Remove Programs option in Control Panel |
Answer» C. Use the Devices option in Control Panel | |
23. |
A one-way trust relationship has been established in which the RESEARCH domain trusts the TESTING domain. The Guest account is disabled in both domains. As a user belonging to a global group called Testers in the TESTING domain, you want to access a shared directory on a Windows NT Advanced Server in the RESEARCH domain. Which action would give you access? |
A. | No action is necessary, as access is already available |
B. | The Testers group must be assigned permissions to the shared directory on the Windows NT Advanced Server in the RESEARCH domain |
C. | The Testers group must be assigned permissions to the shared directory on the Windows NT Advanced Server in the RESEARCH domain, and the user must log on to the RESEARCH domain |
D. | None of the above |
Answer» C. The Testers group must be assigned permissions to the shared directory on the Windows NT Advanced Server in the RESEARCH domain, and the user must log on to the RESEARCH domain | |
24. |
You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this? |
A. | Delete the Administrator account |
B. | Lock out the Administrator account |
C. | Rename the Administrator account |
D. | Disable the Administrator account |
Answer» D. Disable the Administrator account | |
25. |
The rating in bits per second for UTP Cat 5 wiring is |
A. | 100 Mbps |
B. | 10Mbps |
C. | 4Mbps |
D. | 2Mbps |
Answer» B. 10Mbps | |
26. |
There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer? |
A. | Make JohnY a member of the DESIGN Domain Guests group |
B. | Make JohnY a member of the DESIGN Domain Users group |
C. | Do nothing. JohnY can access the printer now |
D. | JohnY cannot access the printer with this configuration |
Answer» D. JohnY cannot access the printer with this configuration | |
27. |
You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose? |
A. | PPP |
B. | DLC |
Answer» B. DLC | |
28. |
Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment |
A. | 1 |
B. | |
C. | bridge |
D. | router |
Answer» C. bridge | |
29. |
Windows Naming Service (WINS) |
A. | dynamically allocates IP addresses to client computers |
B. | runs on Windows NT W/S |
C. | resolves computer names to IP addresses |
D. | Increases broadcast traffic |
Answer» D. Increases broadcast traffic | |
30. |
In UTP Cat 5 wiring, patch cables from the wall outlet to the PC have a distance limitation of |
A. | 1 meter |
B. | 3 meters |
C. | 6 meters |
D. | 9 meters |
Answer» C. 6 meters | |
31. |
You are setting up a network in a school. You need to network 5 computers for the file and printer sharing. You want to use some donated cable and Ethernet adapters. You identify the donated adapters as ARCnet coaxial network adapters and 10Base2 Ethernet network adapters. You install an Ethernet adapter in each of the 5 computers and connect the donated cable. The computers are NOT able to maintain reliable communication. You suspect that you are NOT using the correct type of coaxial cable. Which type of coaxial cable should you be using? |
A. | RG-58 AU |
B. | RG-59 AU |
C. | RJ-11 |
D. | RJ-45 |
Answer» B. RG-59 AU | |
32. |
As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from |
A. | any Windows NT Workstation computer in the LAB domain |
B. | any Windows NT Workstation computer in the RESEARCH domain - |
C. | any Windows NT Server backup domain controller in the LAB domain |
D. | any Windows NT Server backup domain controllers in the RESEARCH domain |
Answer» E. | |
33. |
Maria needs to install software on a Windows NT Server computer which is a backup domain controller. When she attempts to log on to the server, she receives the message "Unable to log on locally". What must you do to enable Maria to log on to the server? |
A. | In User Manager for Domains, define Maria as a local account |
B. | In User Manager for Domains, assign Maria to a group that has the right to log on locally |
C. | In the System option in Control Panel, select the setting that allows users to log on locally |
D. | In the System option in Control Panel, set the user environment variables to allow Maria to log on locally |
Answer» C. In the System option in Control Panel, select the setting that allows users to log on locally | |
34. |
Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships? |
A. | Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts ACE |
B. | Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD |
C. | Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts PUBS • |
D. | Establish one-way trust relationships in which PUBS trusts ACE ACE trusts CAD |
Answer» B. Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD | |
35. |
In building cabling, horizontal wiring from the telecommunications closet (TC) to the wall outlet has a distance limitation of |
A. | 3 meters |
B. | 6 meters |
C. | 90 meters |
D. | 300 meters |
Answer» D. 300 meters | |
36. |
Peter uses a Microsoft Windows 95 computer. What should he do to be able to administer domain user accounts from his computer? |
A. | install User Manager for Domains on his computer |
B. | install the Client-based Network Administration Tools on his computer |
C. | install Windows NT Server on his computer |
D. | install Windows NT Workstation on his computer |
Answer» C. install Windows NT Server on his computer | |
37. |
You need to install network adapters in 20 ISA-bus computers. Which rule must you follow when installing the network adapters? |
A. | All adapters in a computer, including the network adapter, must be set to the same IRQ |
B. | All adapters in a computer, including the network adapter, must be set to different IRQs |
C. | All network adapters in all computers on the same network must be set to the same IRQ |
D. | All network adapters in all computers on the same network must be set to different IRQs |
Answer» C. All network adapters in all computers on the same network must be set to the same IRQ | |
38. |
Bridges are ideally used in environments where there a number of well defined workgroups |
A. | 1 |
B. | |
Answer» B. | |
39. |
You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation? |
A. | Fiber Optic |
B. | Category 1 UTP |
C. | Category 3 UTP |
D. | Thicknet Coaxial |
Answer» D. Thicknet Coaxial | |
40. |
You want to find out which users are currently using a specific directory on a Windows NT Server computer. How should you do this? |
A. | Use Windows NT Explorer |
B. | Use Disk Administrator |
C. | Use Server Manager |
D. | Use User Manager for Domains |
Answer» D. Use User Manager for Domains | |
41. |
What does the transport protocol do? |
A. | It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes the data to the application through the session layer interface. |
B. | It provides low-level access to the network adapters by providing data transmission support and some basic adapter management functions |
C. | It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services |
D. | It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session |
Answer» B. It provides low-level access to the network adapters by providing data transmission support and some basic adapter management functions | |
42. |
Bridges operate at the MAC layer (layer 2 of the OSI model.) |
A. | 1 |
B. | |
Answer» B. | |
43. |
An ethernet switch works at the protocol layer |
A. | 1 |
B. | |
Answer» C. | |
44. |
In which of the following cable systems are T connectors and terminators are used? |
A. | FDDI |
B. | Token Ring |
C. | Thin Ethernet |
D. | lOBase T |
Answer» D. lOBase T | |
45. |
Fibre Optic cable is often used to |
A. | replace UTP because it is cheaper |
B. | overcome distance limitations |
C. | connect PC's to wall outlets |
D. | link remote sites using a WAN connection |
Answer» C. connect PC's to wall outlets | |
46. |
What must you do to create a printer pool containing four shared printers on your Windows NT Server computer? |
A. | Set up all the printers to share the same parallel port |
B. | Set individual printer properties for each printer |
C. | Set up all printers as network-interface printer devices |
D. | Specify the same printer driver and settings for all printers |
Answer» E. | |
47. |
Most routers can also act as bridges |
A. | 1 |
B. | |
Answer» B. | |
48. |
Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI? |
A. | network and transport |
B. | physical and data link |
C. | transport and session |
D. | media access control and logical link control |
Answer» B. physical and data link | |
49. |
Why does a high number of broadcast messages adversely affect overall network performance? |
A. | Each broadcast message requires an acknowledgement packet from every computer on the network |
B. | No computer on the network can transmit data until each broadcast message has been acknowledged by every computer on the network |
C. | Broadcast messages are automatically routed to every segment of a LAN |
D. | Every computer on the network must process each broadcast message |
Answer» E. | |
50. |
A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation? |
A. | A master domain mode, with each engineer trusting the master domain and the data stored on the server |
B. | A single domain mode, with all data kept on the controller for the domain |
C. | A complete trust mode, with each engineer's computer trusting the other engineer's computers |
D. | A workgroup mode, with each engineer administering his or her own computer |
Answer» E. | |