With regard to RAM and hard disks, Windows NT Workstation

requires the following minimum system requirements.

The correct answer is: 8 MB of RAM, and 80 MB of hard disk

space

see Chapter 3, Memory & Hard Disk

You answered 0 questions correctly out of an attempted 1.

Which branch of the Registry is used to contain OLE and file

association information?

The correct answer is: HKEY_CLASSES_ROOT

see Chapter 5, Navigating the Registry

The HKEY_LOCAL_MACHINE\SOFTWARE subkey mirrors

which registry key?

The correct answer is: HKEY_CLASSES_ROOT

see Chapter 5, Software

The boot process begins when your computer access the?

The correct answer is: MBR

see Chapter 12, The Boot Process

The POSIX subsystem can support up to 32 simultaneous POSIX

applications and provides all services except?

The correct answer is: Screen I/O

see Chapter 8, The POSIX Subsystem

In Windows NT itis recommended that system changes be made

from the Control Panel, however, on some occasions changes

must be made directly to the Windows NT registry using the

Registry Editor Utility.

The correct answer is: REGEDT32.EXE

see Chapter 5, How Administrators Use The Registry

Print monitors communicate this information back to the spooler?

The correct answer is: Status of the print device

see Chapter 10, Print Monitors

In the Windows NT boot process, on an Intel machine, which the

following occurs first?

The correct answer is: The kernel is loaded

see Chapter 12, The Intel boot sequence

The most common logon-related problem reported by Windows

NT users is?

The correct answer is: Attempting to login with a password in the

wrong case. Passwords are case sensitive.

see Chapter 4, Required Information

________ is the fastest protocol included in Windows NT?

The correct answer is: NetBEUI

see Chapter 9, NetBEUI

The default file location for the SAVEDUMP.EXE program to

write system crash information to is?

The correct answer is: Memory is copied to the pagefile. The

pagefile is flag and when the system reboots the data is copied to

%systemroot%\memory.dmp by default

see Chapter 5, Write debugging information to

User rights define what a user can and cannot do on a computer.

Resource permissions?

The correct answer is: Establish the scope where the users rights

can be used

see Chapter 4, The User Rights Ploicy

What is wrong with the following workstation name?

JASONS_MACHINE_FOR_NT

The correct answer is: Netbios only supports names up to 15

characters in length

see Chapter 3, Computer Names

Real-time applications have the advantage of?

The correct answer is: Always running in computer memory --

they cannot be paged out to disk

see Chapter11, Application Priorities

You can initiate the Windows NT installation process from either

the boot disks shipped with NT or?

The correct answer is: You can also start the installation from your

current Windows operating system by starting the CD and

double-clicking on Windows NT Setup

see Chapter 3, CD and Floppy Installs

The Transport Driver Interface allows Windows NT?

The correct answer is: Redirectors and services to remain

independent of theactual protocols load on the computer, Provides

a generic interface to the network for applications

see Chater 9, TDI

How do Strip sets provide greater data redundancy and fault

tolerance.

The correct answer is: Strip sets by themselves do not provide

fault tolerance

see Chapter 7, Strip Sets

The Users Sessions dialog displays the following information?

The correct answer is: Connected users, The name of the

computer from which the user connected, The length of time the

users session has been idle

see Chapter9, User Sessions

Power user accounts can perform the following types of tasks?

The correct answer is: Creating non-administrative accounts,

Setting date and time on the computer, Creating common program

groups, Sharing directories on the network

see Chapter 4, Power Users

Managing shared resources from the Control Panel Server Applet

enables you to?

The correct answer is: See the total number of active sessions,

See the total number of open files, See the total number of Opened

Named Pipes

see Chapter 9, Managing Shared Resources

The following are methods for InterProcess Communications for

Windows NT?

The correct answer is: RPC, NetDDE, Windows Sockets, Named

Pipes

see Chapter 9, Inter-Process Communications

Windows NT takes advantage of the Intel processor privilege

levels by running?

The correct answer is: Appplications in Ring 3 and The Kernel

and Executive Services in Ring 0

see Chapter 2, Reliability

Almost all the configuration settings for a printer are accessible

via three options of the printers folder File menu. Choose Three.

The correct answer is: Document Defaults, Server Properties,

Properties

see Chapter 10, Configuring Printers

If you create many users at one time you should consider creating

a template account. When an account is copied using the user

menu's copy command, you must enter?

The correct answer is: A new username, full name, and password

see Chapter 4, Copying Users

How many primary partitions can be on one physical hard disk?

The correct answer is: 4

see Chapter 7, Primary Partitions

By using the /B WINNT.EXE installation switch you can?

The correct answer is: Run the installation without the boot disk,

Create an image of the three setup disks on your system partition,

Speed up the installation process

see Chapter 3, WINNT.EXE Switches

The [boot loader] section of the BOOT.INI file contains?

The correct answer is: The definition of the operating system to

be loaded if the user does not make a selection, The length of time

before the default operating system is loaded

see Chapter 12, Boot Loader

NTFS has a lot of overhead. NTFS requires somewhere in the

range of ________ MB for the file system.

In Windows NT Ctrl+Alt+Del is the operating system's Security

Attention Sequence (SAS). Which of the following are true about

SAS.

The correct answer is: Indicates to the operating system that

someone is requesting access to the security subsystem, Pauses

all applications until the security operation is canceled or

completed, Is triggered when a user logs on or off

see Chapter 12, Winlogon Process

As administrator you are instructed to remove an account for an

employee who left the company without explaination. Rather than

immediately remove the account you should?

The correct answer is: Disable the account. The account could be

renamed and used later by someone taking the place of the

ex-employee.

see Chapter 4, Optional Information