Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Скачиваний:
49
Добавлен:
28.06.2014
Размер:
32.58 Кб
Скачать
1. Lucy is retiring and Bill is her replacement. What is the best way to provide Bill with the same level of access to all of the network resources previously used by Lucy?

a. From Server Manager, create an account for Bill using Lucy's account as a template. Delete Lucy's account.
b. From User Manager for Domains, create an account for Bill using Lucy's account as a template. Delete Lucy's account.
c. From Server Manager, rename Lucy's account. Instruct Bill to change the password to the account when he logs on for the first time.
+d. From User Manager for Domains, rename Lucy's account. Instruct Bill to change the password to the account when he logs on for the first time.

Choice d is correct. User accounts are created, maintained, and deleted through User Manager for Domains, not Server Manager. Renaming an existing account is better than copying an existing account because the original account's description and file permissions are retained. The password is also retained and it is therefore important that the new user changes the password at the first logon. NTCP, p. 64.

2. Field engineers in your group use their own computers to log on to the RAS server on your network. No standards are in place for how field engineers establish connections to your network via RAS. What is the best way to configure your RAS server to allow the field engineers access while still maintaining the highest level of security?

+a. select Allow Any Authentication Including Clear Text
-b. select Require Encrypted Authentication
-c. select Require Microsoft Encrypted Authentication
-d. select Require Data Encryption

Choice a is correct. Since the field engineers are accessing your RAS server with their various non-standardized systems, implementing any type of authentication or data encryption could prevent some of the engineers from accessing your network. Even though security is a concern, the most secure type of authentication in this scenario is Allow Any Authentication Including Clear Text. INTS4, Chapter 14, Installing and Configuring RAS, p. 597.

3. You are an administrator of a growing network that uses TCP/IP. Broadcast traffic on your network is increasing dramatically. What is the best way to decrease the amount of broadcast traffic on your network?

a. install a DHCP server
+b. install a WINS server
c. divide your network into two physical subnets and install a bridge
d. divide your network into two logical subnets and install a gateway

Choice b is correct. If a network running TCP/IP does not contain a WINS server, then each computer on the network must send a b-node broadcast message to locate another computer on the network. WINS servers provide computer-name-to-IP address resolution that reduces the number of broadcast messages. Dividing a network into logical subnets does not reduce the number of broadcast messages. NTNS, pp. 33-36.

4. Which of the following is an advantage of the SLIP modem protocol over the PPP modem protocol?

+a. SLIP requires less system overhead than PPP.
b. SLIP supports security while PPP does not support security.
c. SLIP supports error checking while PPP does not support error checking.
d. SLIP supports flow control while PPP does not support flow control.

Choice a is correct. RAS supports three modem protocols: SLIP, PPP and RAS. SLIP (Serial-Line Internet Protocol) was originally developed for UNIX machines and is still widely accepted among Internet providers. Though it provides good performance with little system overhead needed, it does not support error checking, flow control or security. The Point-to-Point Protocol (PPP) is useful for connecting to UNIX hosts or Internet providers. Though it requires more overhead than SLIP, PPP provides error checking and recovery. INTS4, Chapter 14, RAS Communication Methods, p. 585.

5. MaryJo is the local user of a member server in your domain. Her username is MaryJo and she uses a local profile stored on the C drive of her machine. In what directory are MaryJo's desktop shortcuts stored?

a. C:\Winnt\Profiles\Desktop
+b. C:\Winnt\Profiles\MaryJo\Desktop
c. C:\Winnt\MaryJo\Profiles\Desktop
d. C:\Winnt\Profiles\Desktop\MaryJo

Choice b is correct. Each user on a workstation has a directory named after their username that is a subdirectory of the Winnt\Profiles directory. The directory called Desktop is a subdirectory of the C:\Winnt\Profiles\<username> directory, and it contains desktop items including shortcuts and files. Shortcut files have a suffix of LNK. NTCP, pp. 85-86.

6. You want to create a new partition using the free space on a SCSI hard disk. You choose Create on the Partition menu in Disk Administrator and enter the desired size in the Create Logical Drive of Size dialog box. A new logical drive now appears in Disk Administrator. What else must you do before you can format the partition?

a. choose Mark Active from the Partition menu
b. choose Mark Primary from the Partition menu
+c. choose Commit Changes Now from the Partition menu
d. assign a volume label

Choice c is correct. Partitions and drives are not actually created unless you commit the changes. To commit changes to drives and partitions, choose Commit Changes Now from the Partition menu in Disk Administrator. You will automatically be prompted to commit or cancel changes you have made when exiting Disk Administrator. NTCP, p. 229.

7. There are 40 Windows NT computers on your network that print to an HP LaserJet attached to a Windows NT print server. You have just obtained an updated printer driver. What is the best way to update the driver for all computers that print to this print server?

+a. update the driver on the print server and do nothing more
b. update the driver on all client computers; there is no need to update the server
c. create a separate printer with the updated driver on the print server, and instruct all client computers to print to the new printer
d. update the driver on the print server, and instruct all client computers to download the updated driver from the server

Choice a is correct. The best way to update a printer driver is simply to update the driver on the print server. There is no need to manually update the driver on each client computer. When a client computer attempts to print to the print server, the updated driver will be copied automatically to the client. NTCP, pp. 177-180.

8. You receive several calls from users who are trying to print to a print server. They complain that they have sent several jobs to the print server, but the jobs have not printed and cannot be deleted. What must you do to resolve the problem?

a. delete all files from the spool folder on the print server
+b. select Services in Control Panel on the print server, stop the spooler service, and then restart it
c. make sure that the Pause printing option is not checked on the print server
d. delete the stalled printer from the print server and create a new printer

Choice b is correct. The scenario described is a typical case of stalled print spooler. To fix the problem, select Services in Control Panel, stop the spooler service, and then restart it. This will generally solve the problem. If the problem persists, then you can try to delete all files from the spool folder. However, deleting all files from the spool folder alone will not solve the problem. INTS4, Chapter 6, Managing Printer Operation, pp. 269-272.

9. Your HP LaserJet IIIsi printer has its own network interface card and is connected directly to the network. You want to manage the printer from your Windows NT computer, but you cannot find the option to install a port for the printer. Which of the following is the most likely cause of the problem?

a. the DLC print driver is not installed for the printer
+b. the DLC protocol is not installed on the print server
c. the LaserJet IIIsi is not connected directly to the print server
d. there are too many LaserJet IIIsi printers connected to a single print server

Choice b is correct. Unlike most printers, HP network interface print devices do not have to be connected directly to a print server. However, to use these printers on a network you have to install the DLC protocol through the Network option in Control Panel on the print server. Other types of network interface print devices may require the installation of vendor-specific print services. NTCP, pp. 173-174.

10. Which application would you use on the PDC to view the role of all computers in the domain?

a. User Manager for Domains
+b. Server Manager
c. Windows NT Explorer
d. Network Administrator

Choice b is correct. Windows NT Server Manager is used to manage all servers and workstations. It lists all computers and their roles (Primary Domain Controller, Backup Domain Controller, Workstation or Server) in the Server Manager window. Server Manager can also be used to promote a BDC to a PDC. INTS4, Chapter 12, Server Manager, pp. 499-502.

11. Which of the following are supported by PPP clients running applications on a Windows NT Server computer using RAS?

+a. named pipes
+b. Remote Procedure Calls
+c. WinSock API applications using TCP/IP
+d. WinSock API applications using IPX

Choices a, b, c and d are correct. The Point-to-Point Protocol is a universal standard that allows any client machine using Remote Access Service to run applications using a variety of multi-platform technologies including Windows Sockets APIs, named pipes, and Remote Procedure Calls. NTNS, pp. 82-85.

12. The Vice President of your department wants some numeric statistics on how the new servers he purchased for your department are currently performing in a variety of areas including CPU usage, page caching, and handling network traffic. Which option must you choose from the View menu in Windows NT Performance Monitor to produce a ledger of current performance statistics for the Vice President?

a. Alert
b. Chart
c. Log
+d. Report

Choice d is correct. Report view presents values in a column rather than a graph. The values presented in Report view are an average of the last two data reads separated by the entered time interval. Chart view displays relationships and trends in either real time or from a log. The log file is a binary file that is used to store system activities for later analysis using Chart, Report or Alert view. Alert view is most often used to enable you to perform other tasks while insuring notification, should a selected value or set of values qualify for particular criteria that you specify. NTCP, p. 288.

13. The paging file on your Windows NT Server computer has expanded beyond its specified initial size. Which of the following are likely to occur?

a. the number of disk I/Os will increase
+b. the disk containing the paging file will become more fragmented
c. less RAM will be available for applications
+d. applications will take longer to start

Only choices b and d are correct. Allowing the paging file to grow past its initial size fragments the disk containing the paging file and increases the start time for applications. Allowing the paging file to grow past its initial size has no direct effect on the amount of RAM available to applications and the number of disk I/Os per a given time interval. NTCP, p. 281.

14. You accidentally delete a user's account on a BDC and must recreate it with the same permissions and rights. What is the best way to accomplish this?

a. assuming that the PDC has not performed synchronization yet, highlight the deleted user account in User Manager for Domains, select Undelete from the User menu
b. recreate a new user account with the same name and assign it the security identifier (SID) of the deleted account
+c. recreate a new user account with the same name and assign it all the permissions and rights of the deleted account
d. recreate a new user account with the same name; permissions and rights will be retained since they are contained in the access control lists (ACLs) for domain objects (files, directories, etc.)

Choice c is correct. User or group accounts cannot be recreated once they have been deleted regardless of whether or not synchronization has occurred. An administrator's only option is to recreate the user's account from scratch or by using a template if one is available. Permissions and rights must be manually reassigned to the account. SIDs cannot be re-used once accounts have been deleted. Since the SID, not the username, is recorded in each object's ACL, recreating a new user account with the same username as the deleted account will not re-establish the deleted account's permissions and restrictions with the new user account. INTS4, Chapter 2, Users and Groups, pp. 96-97.

15. Your network uses NetBEUI, TCP/IP, and NWLink as protocols. The binding order of these protocols on your servers and workstations is TCP/IP, NWLink, and NetBEUI. The majority of users on your network are accessing its resources using NetBEUI. Where must the binding order of the protocols be changed to speed up the network?

+a. on the workstations only
b. on the servers only
c. on the domain controllers only
d. on both the workstations and servers (including the domain controllers)

Choice a is correct. The protocol used most frequently should be bound first. This will speed up network connections. Since servers use whatever protocol is sent to them by each workstation, the binding order needs only to be changed on the workstations. Network speed is affected by the binding order on the workstations but not on the servers. NTCP, p. 281.

16. Several NetWare 3.x clients on your network need to access files on your Windows NT server. Which of the following must be installed on your Windows NT server?

-a. Client Service for NetWare
+b. File and Print Services for NetWare
-c. Gateway Service for NetWare
+d. the NWLink protocol

Only choices b and d are correct. The Windows NT server will require the NWLink protocol to communicate with NetWare clients and servers. It will also require the File and Print Services for NetWare add-on module to allow NetWare clients and servers to access its files and printers. Client Service for NetWare is designed for Windows NT workstations that require a direct link to NetWare servers. Gateway Service for NetWare is used to allow Windows NT servers to map a drive to a NetWare server thus providing access to NetWare server resources for Windows NT workstations (via a gateway). NTCP, p. 42.

17. You have created an uncompressed file called MyPaper.doc in the Documents folder on an NTFS partition. The Documents folder is not compressed. Now you move the file MyPaper.doc to a compressed folder called TermPaper on a different NTFS partition. Which of the following will occur?

a. The file will stay uncompressed.
+b. The file will inherit the compression attribute from the target folder.
c. The file will inherit the compression attribute from the target partition.
d. A dialog box will appear, asking you whether you want to compress the file in the target folder.

Choice b is correct. If you move a file between NTFS partitions, Windows NT will copy the file to the destination folder first, then delete the original file. Therefore, the file will inherit the compression attribute from the target folder. However, if you move a file within the same NTFS partition, then the file will retain its original compression attribute. NTCP, p. 117.

18. Which of the following procedures will allow you to install Windows NT Server over the network onto an MS-DOS computer?

a. booting the MS-DOS computer from the Network Installation Startup Disk and running Setup.exe from the command prompt
+b. connecting to the network directory that contains the Windows NT installation files and running Winnt.exe
c. connecting to the network directory that contains the Windows NT installation files and running Winnt32.exe
d. connecting to the network directory that contains the Windows NT installation files and running Setup.exe

Choice b is correct. You can install Windows NT Server onto an MS-DOS machine over the network by running Winnt.exe. Winnt32.exe is used to upgrade the operating system on machines already running Windows NT. Setup.exe is not the Setup program for Windows NT. INTS4, Chapter 1, Starting Installation, pp. 17-18.

19. How do you demote a BDC to a file server?

+a. by reinstalling Windows NT Server
b. by selecting the BDC in Server Manager, and choosing Demote on the Computer menu
c. by choosing the Network option in Control Panel, selecting the BDC, and clicking Demote
d. by restarting the BDC, and choosing Member Server at the startup screen

Choice a is correct. You can promote a BDC to a PDC by using Server Manager. However, you need to reinstall Windows NT Server to change the role of the server from a member server to a domain controller, or vice versa. In this case you will need to reinstall Windows NT Server and select Stand-Alone or Member Server when the system asks you to choose a role for the server. NTSHS, p. 74.

20. Scott was a member of the Quality Assurance group. Now he has been reassigned to the Application Development team. As a result, he needs access to program source files in the \Source directory on the file server. The Application Development and Administrators groups have Full Control permissions to the \Source directory. The Everyone group has Read permission and the Quality Assurance group has No Access permission. After logging on as a member of the Application Development group, Scott notices that he still cannot access the files in the \Source directory on the file server. What is the best way for Scott's domain administrator to grant him the required access to the \Source directory?

+a. remove Scott's user account from the Quality Assurance group
b. remove Scott's user account from the Quality Assurance group and the Everyone group
c. grant all permissions for the \Source directory to Scott's user account
d. add Scott's user account to the Administrators group

Choice a is correct. If a user belongs to a group that has No Access permissions for an NTFS directory, then, regardless of other permissions a user may have through their individual user account or from other groups, they will be denied access to that NTFS directory. Even if Scott was added to the Administrators group, he would still not be able to access files in the \Source directory. The only way to grant Scott full access to the \Source directory is to remove his user account from the Quality Assurance group. User accounts cannot be removed from the Everyone group. NTCP, pp. 129-130.

21. Several Windows for Workgroups 3.11 clients on your Windows NT network need access to resources located on a NetWare server in your domain. How can Windows for Workgroups 3.11 clients access the NetWare server without installing new client software?

+a. install Gateway Service for NetWare on a Windows NT server, and create a group called NTGATEWAY on the NetWare server
b. install Gateway Service for NetWare on a Windows NT server and create a user account called NTGATEWAY on the NetWare server
c. install Gateway Service for NetWare on the NetWare server
d. install NWLink on a Windows NT server

Choice a is correct. The Gateway Service provides access to NetWare servers for the computers of Microsoft network clients that are not running NetWare client software. Client Gateway Service is installed on workstations that want to access NetWare resources directly (without the use of a gateway). NTNS, p. 172.

22. Jessica configures her UPS service settings to detect a power failure signal and to wait five seconds between the detected power failure signal and the initial warning message. Her UPS is fully charged and has five minutes of battery life. It has the proper UPS cable connections to her computer and is plugged in properly to the computer and the power source. To test her UPS service settings, Jessica unplugs the UPS from its power supply. To her surprise, she does not receive a warning message after five seconds and her computer's power is terminated immediately after five minutes. What is the most likely cause of the problem?

a. the Delay Between Warning Message setting is greater than 300 seconds (five minutes)
b. the Expected Battery Life setting is greater than the actual battery life of the UPS
c. the Expected Battery Life setting is less than the actual battery life of the UPS
+d. the UPS Interface Voltage for the power failure signal is set incorrectly

Choice d is correct. If the UPS Interface Voltage for the power failure signal is not set according to the UPS manufacturer's instructions (e.g., UPS sends a positive signal and Windows NT is expecting a negative signal), then the power failure signal sent from the UPS would not be recognized by the UPS service. The Windows NT machine will lose power immediately after the battery life of the UPS is exhausted (after five minutes). A similar situation would occur had the UPS cable been missing entirely. This and other unpredictable results could occur if a standard RS-232 cable (not a UPS cable) was being used. NTCP pp. 247-250.

23. Which of the following counters should be monitored to determine if excessive paging is occurring on a machine running Windows NT 4.0?

+a. Avg. Disk Sec/Transfer
+b. Pages/Sec
c. Usage Peak (bytes)
d. % Usage

Only choices a and b are correct. The product of the Avg. Disk Sec/Transfer counter and the Pages/Sec counter equal the percentage of disk access time being devoted to paging. If this number is greater than ten percent over an extended period of time, then a paging problem exists. The Usage Peak (bytes) and % Usage counters are used to determine if the paging file size is approaching its maximum. NTCP pp. 272-273.

24. Which of the following statements are true of RAS AutoDial?

+a. it maps network addresses to RAS phonebook entries
+b. it is automatically enabled when you start your computer
+c. it requires at least one TAPI dialing location
d. it works over NetBEUI, TCP/IP or IPX/SPX connections

Only choices a, b and c are correct. RAS AutoDial maps network addresses to RAS phonebook entries. It automatically attempts to create a network connection when a network address is referenced from an application or from the command line. AutoDial is automatically enabled when you start your computer. However, it only functions with the TCP/IP or NetBEUI protocol and requires at least one TAPI dialing location. NTNS, pp. 109-111.

25. Your Windows NT Server computer contains two IDE disks on the same controller card. Each disk contains one and only one primary partition. The Windows NT Server operating system is located on the first hard disk, and the boot files are located on the second hard disk. Which of the following is the correct ARC name for the system partition?

a. multi(0)disk(1)rdisk(0)partition(1)
+b. multi(0)disk(0)rdisk(1)partition(1)
c. multi(0)disk(0)rdisk(0)partition(0)
d. multi(1)disk(1)rdisk(1)partition(1)
e. multi(1)disk(1)rdisk(0)partition(0)

Choice b is correct. A typical ARC (Advanced RISC Computing) name follows the format: multi(x)disk(y)rdisk(z)partition(a).~The two valid options are "scsi" and "multi" for the first part of the ARC name. "Scsi" is used for a SCSI disk with its BIOS disabled. "Multi" is used for disks other than SCSI or a SCSI disk with its BIOS enabled. The number after "multi" is the ordinal number of the hardware adapter card (starts from 0). The number after "disk" is the SCSI bus number and will always be 0 for a non-SCSI disk or for a SCSI disk with its BIOS enabled. The number after "rdisk" is the ordinal number of the disk (starts from 0). The number after "partition" is the ordinal number of the partition (starts from 1). Boot files are stored on the system partition, and since they are located on the second hard disk, the correct ARC name must be: multi(0)disk(0)rdisk(1)partition(1). NTCP, pp. 225, 259.

26. Your Windows NT Server computer has two SCSI hard disks, each attached to a separate controller. Which of the following fault tolerant strategies would you implement on your Windows NT Server computer?

a. disk sparing
+b. disk duplexing
c. disk striping with parity
d. disk striping without parity

Choice b is correct. Disk duplexing is a hardware enhancement to disk mirroring in which each physical disk in the mirror set has its own controller. Disk striping without parity does not provide any fault tolerance. Disk striping with parity requires three physical disks. INTS4, Chapter 10, Using Mirror Sets, p. 444.

27. Your Remote Access Server constantly drops connections. You would like to start troubleshooting your Remote Access Server by enabling the Device.log file. Which of the following is true of enabling the Device.log file?

a. The Device.log file is enabled by default.
+b. The Device.log file is enabled by editing the registry.
c. The Device.log file is enabled through the Network option in Control Panel.
d. The Device.log file is enabled through the RAS option in Control Panel.

Choice b is correct. The dialog between the system and the modem during RAS operations is captured in the Device.log file if it has been created and enabled. To create and enable the file, you must set the registry value "Logging" to 1 under \HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Services \RasMan \Parameters. INTS4, Chapter 14, Logging RAS Events, p. 622.

28. Other than Administrators, which of the following built-in groups have the right by default to log on locally to a Windows NT server?

a. Server Operators only
b. Server Operators and Account Operators only
c. Server Operators, Account Operators and Backup Operators only
+d. Server Operators, Account Operators, Backup Operators and Print Operators

Choice d is correct. Server Operators, Account Operators, Backup Operators and Print Operators all have the right by default to log on locally to a Windows NT Server. The Everyone, Users, and Guests groups do not have this right. NTCP, p. 71.

29. Nancy is installing TCP/IP on a member server in a non-routed network. She manually assigns an IP address to the server. What other parameter must she specify to install TCP/IP on the server?

a. the default gateway
b. the DHCP server IP address
+c. the subnet mask
d. the WINS server IP address

Choice c is correct. When installing TCP/IP on a non-routed network, the IP address and subnet mask parameters must be specified. The default or a specific subnet mask must be specified. The default gateway parameter only needs to be specified if the server's network has multiple subnets. INTS4, Chapter 9, Installing and Managing TCP/IP Services, pp. 372-373.

30. A tape backup drive and a SCSI controller for the tape drive must be installed on a new system. Which of the following must be done to enable these hardware devices?

+a. install the driver for the tape backup drive
+b. install the driver for the SCSI controller
+c. restart the computer
d. use the Services option to start the SCSI controller and the tape backup drive

Only choices a, b and c are correct. You must install the drivers for the SCSI adapter and the tape device before you can use them. The SCSI adapters option in Control Panel is used to detect SCSI adapters. The Tape Devices option in Control Panel is used to detect tape devices. The computer must be restarted for the SCSI adapter to start. INTS4, Chapter 11, Using Windows NT Backup, pp. 471-472.

31. Consider the following Memory settings taken from the Network option on Control Panel for a PDC:~~What task is this PDC optimized to perform?
a. managing a network of around sixty users
b. managing a small network of around ten users
c. running a SQL Server client-server application
+d. sharing an Access database

Choice d is correct. Memory settings can be tuned to increase network responsiveness. You would set a domain controller's memory setting to Minimize Memory Used if you only expect about ten network connections to be established. If you expect about sixty-four network connections to be made, then the default setting of Balance would be used. If you anticipate a large number of file sharing operations to occur, then the Maximize Throughput for File Sharing setting would be selected. Finally, if the domain controller's primary function is running distributed applications that perform their own memory caching (e.g., Microsoft SQL Server), then the Maximize Throughput for Network Applications setting would be used. NTCP, p. 282.

32. The users of your domain currently have their home directories stored on their local drives. In order to provide better administration, you create home directories for each of them on the domain's PDC. What must you do to allow each user to start using their new home directory?

a. For each user's account, specify the full UNC pathname of each user's home directory on the User Environment Profile screen in User Manager for Domains.
+b. For each user's account, specify the full UNC pathname of each user's home directory and a shared network drive letter on the User Environment Profile screen in User Manager for Domains.
c. For each user's account, specify the directory name, server name and domain name of each user's home directory on the User Environment Profile screen in User Manager for Domains.
d. For each user's account, specify the %HOMEPATH% variable on the User Environment Profile screen in User Manager for Domains.

Choice b is correct. To establish a network home directory for an existing user's account that currently has a local home directory, you must select the Connect option on the User Environment Profile screen in User Manager for Domains, select a shared drive letter, and enter the full UNC pathname of the user's new home directory. The full UNC pathname contains the server name on which the home directory resides. The domain name is not required. The variable %HOMEPATH% will contain the user's home directory UNC pathname only after the new home directory has been established. INTS4, Chapter 4, Managing User Profiles, p. 157.

33. Linda calls you requesting access to the files on a shared directory. You log on to the network remotely and add Linda to a group with full access to the shared directory. A few minutes later Linda calls you back and says she still cannot access the shared directory. What is the most likely cause of this problem?

+a. Linda did not log off and log back on.
b. Linda was not using Network Neighborhood to access the shared directory.
c. You cannot give Linda access from a remote system.
d. Linda did not use the correct password when she logged on.

Choice a is correct. If Linda is logged on and her group memberships are changed, then she must log off and log back on to be able to take advantage of the new memberships. INTS4, Chapter 4, Objects and Access Tokens, pp. 182-183.

34. Which of the following is the correct way to upgrade Windows 95 to Windows NT Server 4.0?

a. run Winnt.exe and install Windows NT in the same directory as Windows 95
b. run Winnt32.exe and install Windows NT in the same directory as Windows 95
+c. install Windows NT in a separate directory and reinstall all applications
d. install Windows NT in a separate directory and run Regedit.exe to import the Windows 95 registry settings

Choice c is correct. Windows 95 cannot be automatically upgraded to Windows NT Server 4.0. That is, registry settings and application settings cannot be shared or migrated. Therefore, you must manually upgrade Windows 95 by installing Windows NT Server 4.0 in a separate directory and reinstalling all applications. INTS4, Chapter 1, Starting Installation, p. 15.

35. You can troubleshoot RAS problems using the Device.log file. Once enabled, where is this file stored by default?

a. in the root directory of the system partition
b. in the \Winnt_root directory
c. in the \Winnt_root\System32 directory
+d. in the \Winnt_root\System32\RAS directory

Choice d is correct. The Device.log file records dialog between the RAS server and the modem. It is created and enabled by setting a flag in the system registry and contains initialization strings sent to the modem as well as modem response strings. INTS4, Chapter 14, Logging RAS Events, p. 622.
Соседние файлы в папке tests