Вы находитесь на странице: 1из 33

How do you display information about IPX routing update packets, if you can use "debug IP igrp transaction"

or "debug IP igrp events" to monitor IP igrp traffic? debug ipx routing activity debug ipx transaction debug routing debug ipx events Answer :A What command would you use to monitor ipx traffic on a network? debug ipx transaction display ipx traffic show ipx events show ipx traffic Answer :D What are the default settings if the "ipx delay number" command allows an administrator to change the default settings? For LAN interfaces, six ticks; for WAN interfaces, one tick For LAN interfaces, one tick; for WAN interfaces, six ticks For LAN interfaces, zero ticks; for WAN interfaces, five ticks For LAN interfaces, five ticks; for WAN interfaces, zero Ticks Answer :B The commands interface Ethernet 0.1 ipx encapsulation and interface Ethernet 0.2 ipx encapsulation, setup the sub-interfaces to allow for two types of encapsulation: Novell-ether ipx network 9e and sap ipx network 6c. What does the "IPX maximum-paths 2 commands accomplish? It sets up routing to go to network 2 It is the default for Cisco IPX load sharing It enables load sharing on 2 paths if the paths are unequal metric paths It enables load sharing on 2 paths if the paths are equal metric paths Answer :D

To find out the names of Novell servers on a network, what command would you use? show ipx hosts show ipx servers show ipx nodes show ipx sap Answer :B A sample configuration follows: ipx Ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface and Ethernet 0.2 ipx encapsulation sap ipx network 6c to assign multiple network numbers. By default, Cisco routers forward GNS SAPs to remote networks. True False None of them Both of them Answer :B NLSP (NetWare Link Services Protocol) provides link-state routing; SAP (Service Advertisement Protocol) gives information about network services and NCP i.e. NetWare Core Protocol gives client-to-server connections and applications. RIP is a distance vector routing protocol. What command should you use instead of "debug IP igrp transaction" as a system administrator in order to debug igrp? debug IP iprg event debug IP igrp events debug IP irpg events debug IP igrp summary Answer :B All SAPs can't be filtered even with 4.x since NDS and time synchronization uses SAPs. Cisco routers build SAP tables and forward the table every 60 seconds. The Novell's implementation of RIP updates routing tables every ____ seconds. 90 10 60

30 Answer :C Novell's GNS protocol is used to Get Nearest Server. The respective server then responds if there is a server on the local network. Otherwise, the Cisco router has to be configured to forward the GNS SAP. But, Cisco routers do not forward the SAPs so as to prevent the network from being flooded. How can you service the advertisements to other networks? By broadcasting the service number assigned by the router. By having a SAP table built by every router that is forwarded every 60 seconds. Cisco routers filter out all SAPs. SAPs aren't necessary with Cisco routers. Answer :B As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. The default setting is-for LAN interfaces, one tick; for WAN interfaces, six ticks. Which set of commands will accomplish this? interface Ethernet 0 ipx encapsulation Novell-ether ipx network 9e interface Ethernet 0 ipx encapsulation sap ipx network 6c interface Ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface Ethernet 0.2 ipx network 6c interface Ethernet 0.1ipx encapsulation Novell-ether ipx network 9e interface Ethernet 0.2 ipx encapsulation sap ipx network 6c interface Ethernet 0.1 ipx encapsulation Novell-ether interface Ethernet 0.2 ipx encapsulation sap Answer :C Which are the two metrics used in the Novell's use of RIP to make routing decisions? Ticks and hops Hops and loops Loops and counts Counts and hops Answer :A

Cisco IOS uses Arpa for which types of encapsulation? Ethernet 802.3 Ethernet 802.2 Ethernet II Ethernet SNAP Answer :C Name the encapsulation type used by Cisco on a serial interface? SDLC SNAP HDLC SAP Answer :C Both the Novell's IPX and Cisco's IOS use different naming conventions for their protocols. For instance, Cisco uses snap for Token-Ring SNAP, Ethernet SNAP, and FDDI_SNAP; sap for Ethernet_802.2, Token-Ring, and Novell's FDDI_802.2. For Ethernet II, Cisco uses arpa. And, the default is Novell-ether for Novell's Ethernet_802.3.15. For which encapsulation types does Cisco make use of "sap"? Ethernet_802.3 Ethernet_802.2 and FDDI_802.2 Token-Ring None of the above Answer :B & C IGRP does not halt RIP. It isolates network 10.0.0.0 and 172.68.7.0 and links independent systems 109 and 71 with IGRP. Both can be used at the same time. What do 109 signify in the command "router igrp 109? Any network number which the router is attached to An autonomous system The network socket number The allowable length of the routing table Answer :B

The "debug IP igrp events" is used to only demonstrate a review of IGRP routing information. To observe only the IGRP updates from a neighbor, you can attach an IP address onto either command. What does "router igrp 71 network 10.0.0.0" and "router igrp 109 network 172.68.7.0" commands carry out? It loads igrp for networks 109 and 71. It disables RIP. It disables all routing protocols. It isolates networks 10.0.0.0 and 172.68.7.0. Answer :D Internetwork Packet Exchange i.e. IPX is a NetWare network layer 3 protocol. With the help of this protocol you can transfer the data on LANs. State the Netware protocol which is used for providing link-state routing? RIP NLSP NCP SAP Answer :B NetWare IPX addressing uses a network number and a node number. The earlier default encapsulation on Cisco routers was 802.3. Later on the encapsulation defaulted to 802.2 and 3.11. Then it again defaulted to Novell Ethernet_802.3 and NetWare 3.12. Which of the following options are correct? The network address is administratively assigned and can be up to 16 hexadecimal digits long If the MAC address is used as the node address, then IPX does not eliminate the use of ARP The node address is not always administratively assigned The node address is usually the MAC address Answer :A If you are a system administrator on a NetWare network and you are running NetWare 4.11 and you cannot communicate with your router, then what is the probable difficulty? Hint: Ethernet 802.3 is used with NetWare versions 2 through 3.11; Ethernet 802.2 is used with NetWare 3.12 and afterward with OSI routing. Also, Ethernet II is used with TCP/IP and DEC net, and Ethernet SNAP is used with

TCP/IP and AppleTalk. Cisco routers only work with NetWare 3.11 NetWare 3.11 defaults to 802.2 encapsulation NetWare 4.11 defaults to 802.2 encapsulation NetWare 4.11 defaults to 802.3 encapsulation Answer :C To display routing timers and network information we use "show IP protocol" and to display the routing table with information about all known networks and subnetworks we make use of "show IP route". What is the time interval that the routing updates are broadcast using RIP? 50 100 60 30 Answer :D What will a Robinson Ethernet switch do with a frame when it receives a unicast frame with a destination MAC that is listed in the switch table? The switch will remove the destination MAC from the switch table The switch will forward the frame to a specific port The switch will return the copy of the frame out of the source port None of the above Answer :B

In which of the following conditions do we need to use a hardware address? To contain logical information about a device to use an end-to-end transmission To obtain a vendor code/serial number from the user To transmit a frame from one interface to another interface To transmit data from one local device to remote device across Internet Answer :C

Which of the following protocol is used to display routing timers and network information? show IP rout show IP protocol Both A & B None of the above Answer :B Whenever a new switch is created you are required to perform certain initial configuration tasks on it. State the reason for assigning an IP address to a switch? To allow remote management of the switch To allow switch to respond to ARP requests between two hosts To ensure hosts on the same LAN can communicate with each other To provide local hosts with a default gateway address Answer :A State the condition in which you will notice that the LED on a Cisco catalyst series switch, showing port status, is alternating between green and red when you are troubleshooting a connectivity problem? The port has an active link with normal traffic activity The port blocked by spanning tree The port is administratively disabled The port is experiencing errors Answer :D Name the process that the client can use to find out the available access points in order to establish a connection with a wireless access point. networking association probing authentication Answer :C

What is the name of the protocol that provides a method of sharing VLAN configuration information between the two newly configured switches? IP ISL TCP VTP Answer :D To decrease the length of routing tables and to give complete routing information in the situation when the router is unaware of the routes to all other networks we use default route/ default gateway. Also, routers can learn about destinations with the help of dynamic routing, static routes or default. Which is the protocol that a router will by default get the information from? IP IGRP TCP VTP Answer :B Which of the following statements describes the benefit of using the VTP (Virtual Trunking Protocol) in the most precise manner as stated by Robinson? VTP allows physically redundant links while preventing switching loops VTP allows switches to share VLAN configuration information VTP allow for routing between VLANs None of the above Answer :B 21.Link-State Routing protocol is responsible for which of the following functions? It uses the shortest path first algorithm Only hop counts are used by routers for making routing decisions Routers that run link-state routing protocol can establish complete topology of the network Routers in a multipoint network that run a link-state protocol can exchange routing tables

Answer :C Which is the most widely used protocol for interconnecting computers? It is also known as the protocol of the global Internet. HTTP TCP/IP UDP IGRP Answer :B

Which are the two types of file system mechanisms that Windows NT is provided with? Named pipes and mail slots NetBIOS and named pipes Both A and B None of the above Answer :A Which of the following statements are true with respect to Remote Procedure Calls (RPC)? RPC does not allow the client server portion of the application to exist on the same machine using Local Procedure Calls (LPC) The RPC runtime component passes data and parameters between local and remote computers RPC does not allow computer networks to distribute the processing load among a number of computers All of the above Answer :B Name the redirector components that take request for service from the client machine and redirect it to the most appropriate network service provider. Multiple Universal Naming Convention Provider (MUP) Multi-Provider Router (MPR)

Workstation and server components All of the above Answer :B Network Dynamic Data Exchange (NetDDE) opens data exchange pipes between two applications across the network to allow DDE to operate over a network. Similarly, Microsoft's DDE protocol opens data exchange pipes between applications on the same machine to facilitate what? Data sharing Object linking and embedding File sharing Print sharing Answer :A and B What is the name of the process that is used to link Windows NT software components together in order to control the way they communicate? Sharing Printing Redirecting Binding Answer :D Which of the following statements are true? You can increase the performance of the system and decrease the possibility for error, if you disable any protocol bindings that you will not use File and print sharing between Windows NT computers is achieved through the MUP and MRP After a workstation is installed on the network there is no need to change the configurations to attach the computer to a new or changed domain None of the above Answer :A Components communicate through interfaces known as ______________? Also __________ translates the data from a format that the sending component understands to a format that the receiving component understands. Name the

interface. Bindings Redirectors Boundary layers Protocols Answer :C Which OSI layer ensures that the packets are delivered in sequence, without errors and with no loss of data and duplication? The layer is also responsible for the division of large messages into packets and again reassembling them to messages before sending them to the destination machine. Application layer Network layer Transport layer Physical layer Answer :C 31.Which of the following programming interfaces are supported by Windows NT? NetBIOS and Remote Procedure Calls (RPC) Windows Sockets and Network Dynamic Data Exchange (NDDE) Both A and B None of the above Answer :C The design of which protocol allows each individual network to be managed separately, so that different organizations that do not wish to give complete network access to each other can still exchange information? RIP EIGRP TCP/IP UDP Answer :C

The first specifications for TCP/IP were circulated as ___________? Requests for Comments (RFCs) NetBIOS NetBEUI None of the above Answer :A Which layer is responsible for moving information from source to destination where the source and destination computers may be in different computers on different continents, and the data may have to go through several intermediate computers and networks to reach the destination? Data link layer Application layer Internet layer Network interface layer Answer :C Name the protocol that is used in a local area network (LAN), to determine destination computer's physical hardware address, when the source computer has the destination computer's Internet address? Internet protocol (IP) Address Resolution Protocol (ARP) Dynamic Host Configuration Protocol (DHCP) Internet Control Message Protocol (ICMP) Answer :B Which protocol is used instead of reverse address resolution protocol (RARP) in the TCP/IP protocol stack implemented by Microsoft? It is a newer protocol used for obtaining the IP address as well as other TCP/IP information on an IP network. Internet protocol (IP) Address Resolution Protocol (ARP) Internet Control Message Protocol (ICMP)

Dynamic Host Configuration Protocol (DHCP) Answer :D Which utility tests the connectivity between computers on the Internet and uses the Internet Control Message Protocol (ICMP) echo request and echo reply packets to determine the time duration that the information takes to get to the other computer and come back? Rlogin Domain Name Service (DNS) Windows Internet Name Service (WINS) Ping Answer :D The subnet mask 255.255.0.0 marks which part of the IP address is the network ID and which part is your station ID. A value of 255 indicates the number is a part of network ID, whereas, a value of 0 indicates your station ID. Now, consider a subnet mask of 255.255.0.0 with an IP address as 198.5.212.50. This means that, your network ID is 198.5.212; then what is your station ID? 5 212 198 50 Answer :D If the first three numbers indicated by the subnet mask, identify your network address, then your computer is a part of which type of network? Class A Class B Class C Class D Answer :C Programming APIs provide an interface to network services other than a file system interface. Name one such API that provides an interface to TCP/IP, that application programs can use to implement non file system services such as e-mail, remote terminals, audio transmission and World Wide Web browsers?

Sockets DNS (Domain Name Service) WINS (Windows Internet Name Service) None of the above Answer :A 41.When the destination computer is not on the same network as your computer, the message must be forwarded from your network to the destination network. Name the special device or the computer that handles this task of forwarding? Gateway Router Server All of the above Answer :A Name the two hard disk file systems supported by Windows NT? File Allocation Table (FAT) Windows NT File System (NTFS) Both A and B None of the above Answer :C Computers have non volatile storage to place operating system data, application data and files. Which of the following is a popular form of non-volatile or persistent storage in personal computers? Hard disks and Floppy disks Folders Files None of the above Answer :A What are the basic subdivisions of a hard disk called as; that contains one volume maintained by any file system and allows a hard disk to appear as many hard disks?

Directories Folders Partitions Cabinet Answer :c What is the name of the of the first portion of data on a hard disk which is reserved for the BIOS bootstrap routine, which contains low level code that redirects the loading of the operating system to the partition marked as active? Partition table Master Boot record Volumes Drives Answer :B Name the structure that is considered to be the index of partitions, which is used by the bootstrap routine to identify the distinct portions of the disk? Master Boot record Drives Volumes Partition table Answer :D What is the name of the structure imposed upon a partition to allow the indexing of files? It also contains a table of contents of the disk called as root directory. It is also responsible for maintaining allocation tables that shows the occupied space, thus ensuring that no file overwrites another one by being stored in the same location. Volume File Allocation Table Hard disks Directory Answer :A

Which of the following statements holds true regarding FAT file system? The root directory contains pointer to other directories and those directories contain pointers to other directories The FAT file system keeps track of files in a partition using a cluster The FAT file system is a simple file system that prevents files from becoming corrupted in abnormal shutdowns such as power failure All of the above Answer :A Which of the following statements are true with respect to FAT filename conventions? FAT name cannot contain any spaces The extension cannot have more than three characters The FAT name must either start with a letter or a number All of the above Answer :D Which of the following is one of the four DOS attribute bits, that VFAT set, which are an undefined combination in the FAT file system and thus ignored completely? System Read and write Hidden None of the above Answer :A and C Suppose you want to create a volume set; then which of the following sequence is correct? Select Programs from the start menu; select Administrative tools -> Disk Administrator Select free space from which you will make the first part of volume set. Hold down the control key and select the free space on the drive that will contain the extension to the volume set. Select Partition -> Commit Changes Now -> Select YES in the confirmation window and click OK in the window that announces that Disk Administrator has performed the operation successfully.

4)Select Create Volume Set from the Partition menu. Click OK. 1 -> 2 -> 3 -> 4 2 -> 3 ->1 -> 4 1 -> 2-> 4 -> 3 3 -> 4 -> 1 -> 2 Answer : C Windows NT servers can function with and complement NetWare servers in the same network. Clients configured for NetWare access can log in to Windows NT servers and can run many NetWare aware applications and utilities. These capabilities are provided by two Windows NT networking components. Name them.

Transport driver Interface (TDI) NetWare Link (NW Link) Both A and B NetWare loadable module (NLM) Answer :C The Windows NT servers provide which type of services to the Netware file servers for workstations that do not have NWLink or CSNW (Client Services for Netware) installed, making the network migrations very easy and connect the clients to file and print services on a Netware server? Routers Gateway Firewall All of the above Answer :B Making Netware file services visible to Windows NT, clients require two Windows NT components namely NWLink and Client Services for Netware (CNSW). The NWLink is the TDI (Transport driver Interface) compliant implementation of which transport protocol for Windows NT? TCP/IP UDP RIP IPX/SPX Answer :D

Name the Windows NT component, which serves as the NetWare redirector for Windows NT that generates NetWare protocol request for file and print services? NWLink CSNW (Client Services for Netware) IPX/SPX NetWare gateway Answer :B Which transport protocol is recommended by Microsoft as the default transport protocol for Windows NT because of its seamless Internet connectivity? TCP/IP IPX/SPX RIP UDP Answer :A Name the component that the NWLink supports, that are commonly used to communicate with NLMs, which implements the server side of client/server applications running on the NetWare servers? Routers Sockets Gateways None of the above Answer :B In order to enable the client to use NetWare utilities such as TLIST and END, what component of NT must be present on your NT Workstation? Gateway Services for NetWare (GSNW) Client Services for Netware (CSNW) NetBIOS NWLink Answer :B

You can control all the CNSW (Client Services for Netware) settings through the CNSW control panel. Select which of the following CSNW options you can set through this control panel? Default tree and context Print options Login script options All of the above Answer :D Suppose you want to change the redirector search order; then which of the following sequence is correct? Select Microsoft Windows Network and click the Move Up Button Select the services tab and click the Network access Order Button Click OK to close the Access Order dialog box. Again, click OK to close the Network Settings dialog box Right click the Network Neighborhood icon and select Properties 1->2->3->4 4->3->2->1 3->2->1->4 4->2->1->3 Answer :D Client Services for Netware (CSNW) implements a Windows NT compatible file system redirector for NetWare servers. This redirector implements which protocol requests for the file and print services? NetWare Core Protocol (NCP) Internet Protocol (IP) IPX/SPX All of the above Answer :A Windows NT local area networks (LAN) can be organized into ________ as they are small and do not need centralized network control or centralized data storage?

Workgroups Workstations Domains

None of the above Answer :A In workgroup type of organization, the users of each workstation select and mange the resources on that workstation, and are made available to other computers on the network. What does this type of network called as? Server based network Client server network Peer-to-peer network None of the above Answer :C Which of the following statements are correct with respect to the four types of domain controllers? One and only one server in the domain must be primary domain controller for that respective domain The primary domain controller maintains a database that contains the user and group account information and the account and security policies The backup domain controller maintains a copy of the primary domain controller's database All of the above Answer :D You must designate a server as a primary or backup when you install Windows NT Server on the computer. If you designate a server to be a backup domain controller, you can later promote it to primary domain controller. But, if you do not designate a server to be a primary domain controller, you cannot convert the server to a primary or backup domain controller later. What action will you have to take in such condition? Re-install the operating system Convert the primary domain controller to backup domain controller Reload the database All of the above Answer :A What is the name of the entity that listens for announcements from computers and adds

the computers and their shared resources to the browse list? Backup browser Potential browser Master browser Network browser Answer :C Who receives a copy of the brose list from the master browser and supplies the browse list to the computers requesting the list and in case if it cannot find the master browser, it forces browser elections on the network? Master browser Potential browser Backup browser Network browsers Answer :C Which type of browser is responsible for maintaining a list of currently available network resources for a workgroup or domain and reducing the amount of traffic on the network by storing a list of network resources in a central location? Master browser Potential browser Backup browser Network browsers Answer :D Which of the following sequence of browsers is the correct order in which they will be selected as a Master Browser? Preferred master->Master->Backup browser->Potential browser Master->Backup browser->Potential browser->Preferred master Potential browser->Backup browser->Preferred master->Master Backup browser->Master->Preferred browser->Potential browser Answer :A

A client computer, a backup browser, or a preferred master browser can cause an election to occur by broadcasting a special packet over the network. What is the name of this special packet? Domain announcement Election packet Request announcement Election Answer :B Which of the following systems will win the browser election when the computers have different operating systems and share the same browsing role? Windows 95 Windows NT workstation A Windows NT server that is primary domain controller Windows NT server Answer :C Which of the following services allows a client computer to communicate over a low speed dial-up telephone line to a server as if they were both on the same local area network (LAN)?

Remote Access Control Remote Access Service Both A and B Neither A nor B Answer :B _________ uses the local computer (the one you are using) as a dumb terminal for the remote computer (the one to which you are attaching)? Remote Control Remote Access Server Client

Answer :A Select the correct statements from the following options. Remote control attaches the local computer to the remote computer as a local area network (LAN) client In Remote Access all the computer operations take place on the local computer World Wide Web (www) is implemented with the remote access paradigm and not the remote control paradigm. All of the above Answer :D Remote Access Service (RAS) is capable of hosting any computer running which of the following operating systems? Serial Line Internet Protocol (SLIP) and Point-to-Point (PPP) based TCP/IP clients. LAN Manager Windows for Workgroups All of the above Answer :D RAS (Remote Access Service) supports wide area network (WAN) connections over which of the following media? Named pipes NetBEUI TCP/IP Public switched telephone network (PSTN)/regular modems Answer :D Which of the following is a Windows NT interprocess communication mechanism that is also supported by the remote access service (RAS)? Remote Procedure Calls (RPC) Leased line frame relay Integrated services digital network TCP/IP

Answer :A Which protocol allows the secure tunneling of encrypted data directly between any computers attached to a TCP/IP network? Serial Line Internet Protocol (SLIP) Point-to-Point protocol (PPP) Point-to-Point Tunneling Protocol User Datagram Protocol (UDP) Answer :C Choose the correct sequence of actions for installing remote access service on your computer. Find an available COM Port Add and configure the network components of Windows NT Workstation Install the remote access client Configure and install Dial-Up networking in a given situation 3->2->4->1 2->3>1->4 1->2->3->4 4->3->2->1 Answer :C Name the Internet Protocol specially adapted to full-duplex low-speed serial transmissions? This protocol was first developed to connect UNIX computers over low-speed telephone lines and later became the standard for dial-up access to the Internet before the World Wide Web (www). It can transmit only TCP/IP packets. Point-to-Point Tunneling Protocol Serial Line Internet Protocol (SLIP) Point-to-Point protocol (PPP) User Datagram Protocol (UDP) Answer :B _________ Functions as an IP and IPX router for clients attached through the PPP protocol, giving them full access to attached network resources, including interprocess communication interfaces like windows sockets, remote procedure calls as well as named pipes? Remote Control Router

Remote access service None of the above Answer :C Finding the resource that slows your system the most, speeding it up until something else has the highest impact on the speed, and then starting over by finding the new slowest resource is called as what? Performance tuning Performance monitoring Bottleneck None of the above Answer :A Slow memory limits the speed at which a processor can manipulate data, thus limiting the computer's processing performance to the speed at which the processor can access memory. If the memory can respond faster than the processor, then the processor is in what state? Performance tuning Bottleneck Optimization None of the above Answer :B What is term used for the hardware components that provide come quantifiable work capacity in the context of performance tuning and are loaded by the software processes? Bottlenecks Resources Monitors Processors Answer :B By what name are the software chains of execution that run concurrently to perform the functionality of a process within the address space of that process known as? They are also considered as the basic unit of division among processors in a

multiprocessing environment. Load Resources Threads Processes Answer :C What is the term used for the measures that are taken to reduce the impact of bottleneck on performance? These measures include elimination of unnecessary loading, sharing loads across devices or finding ways to increase the speed of a resource. Threads Optimization Bottleneck Multiprocessors Answer :B Which of the following is an automatic performance optimization that is implemented by Windows NT? Avoiding physical memory fragmentation Swapping across multiple disks Prioritizing threads and processes All of the above Answer :D Which of the following statements are true with respect to multiprocessing? Multiprocessing divides the processing load across several microprocessors Symmetric multiprocessing is a technique in which the total processor load is split evenly among processors Asymmetric processing is a technique which splits the processing load on the basis of some non-load based metric All of the above Answer :D

The system must have enough memory to store all the executing threads. If the amount of memory is insufficient, Windows NT uses a portion of the hard disk to simulate memory by swapping memory pages not currently in use to a special system file called as___________? Random access Memory (RAM) Threads Virtual memory swap file Pages Answer :C 91.Which of the following statements are correct? %Disk Time counter shows how much processor time is spent servicing disk requests Current Disk Queue Length shows how much data is waiting to be transferred to the disk Disk Byte/Second counter is turned on to show how fast your hard disks are transferring data All of the above Answer :D Which controllers essentially perform the same service as the stripe sets, but because they relieve the computing burden of stripe sets from the processor and add a memory cache dedicated to disk transfer, they can help relieve processor bottlenecks? RAID controllers Stripe sets Hard disk controllers Random access Memory (RAM) Answer :A User programs require an operating system in which to run. Since turning on the computer does not itself start the operating system. The computer must find and load the operating system from its disk drives. The process of finding, loading and initializing the operating system is called as __________? Customizing

Booting Troubleshooting None of the above Answer :B

Computers preserve some data from session to session. Because the random access memory (RAM) is volatile, it does not hold any valid data or programs whenever the computer is turned on. Thus, the computer stores all this data in a memory that cannot be modified during a session. This type of memory gives the processor a program to execute. What is the name of this non volatile memory? Read only Memory (ROM) Random access Memory (RAM) Basic input/output system (BIOS) Hard disk Answer :A Name the utility that contains routines for accessing the computer's hardware devices, such as the keyboard, hard disks, floppy disks and video display? Its primary function after initializing the computer's hardware is to find an operating system and load it. Read only memory (ROM) Basic input/output system (BIOS) Random access memory (RAM) None of the above Answer :B Which part of the computer can contain information that changes from one computing session to the next? It can hold only a little bit of information such as the types of hard drives, floppy drives and IRQ settings for serial ports that the BIOS needs to know in order to talk to the hardware devices attached to the computers. Basic input/output system (BIOS) Hard disk CMOS

All of the above Answer :C Hard disks and floppy disks store data. Disk drives do not interpret the data they store. The operating system imposed arrangement of data on a disk is called as ____________? Folders Files Drives File system Answer :D The BIOS does not know anything about file systems but, it can read sectors from hard disk drives. The BIOS uses this capability to load small programs that does understand the file system, that loads a larger program, which itself loads the operating system. This multistep process of loading more sophisticated programs that can then load other programs that load the operating system is called as __________? Booting/ bootstrapping Reloading Interrupting All of the above Answer :A The BIOS begins the boot process by loading a sector from the hard disk drive that is reserved for booting. That sector is usually called as what? Record Fat (file allocation table) Boot block/ master boot record BIOS (Basic input/output system) Answer :C Which of the following programs is loaded by the boot sector, which then finds and loads the Windows NT operating system? BOOTSECT.DOS

NTDETECT.COM NTLDR BOOT.INI Answer :C Which program is responsible for determining the current hardware configuration of the computer and returns the configuration information to NTLDR so that it can pass the information to the Windows NT operating system? NTBOOTDD.SYS OSLOADER.EXE NTOSKRNL.EXE NTDETECT.COM Answer :D The NTBOOTDD.sys program performs which of the following operations? This program is the kernel of the Windows NT operating system This driver is used during the boot process only if the operating system is stored on a SCSI device attached to a SCSI adapter in the computer that does not have a SCSI BIOS It is used if another operating system such as DOS or Windows 95 is selected from the boot selection menu This file is the kernel of the Windows NT operating system Answer :B The device drivers insulate the operating system from differences between peripheral devices such as printers and video cards. Which layer insulates the operating system from differences in the way the computer themselves work, such as how they service interrupts and how money caches operate?

Kernel Hardware abstraction Layer (HAL) Boot sector None of the above Answer :B

As each driver is loaded it can report an error condition to the driver. Which error condition will the device driver return to the kernel that will display a message to the user and restart the boot process using the LastKnownGood configuration if they are not being used? If the LastKnownGood configuration is being used, the error message is displayed to the user and the boot process continues. Ignore Normal Severe Critical Answer :C The process in which a computer involves changing the hardware or software configuration of different components and then testing it to see whether the configuration change has eliminated the fault is known as ____________? Booting Troubleshooting Formatting All of the above Answer :B Which of the following statements are true? If a hardware failure caused the fault, you will have to find and replace the failed component If a software configuration caused the fault, you will have to reconfigure your system in order to eliminate the fault Bugs are more likely the fault of third-party driver than of Windows NT standard components All of the above Answer :D When troubleshooting, you will refine or redefine your initial diagnosis as you work. This diagnosis will lead in the direction of failed components. For instance, if your computer boots but does not come up on the network, then in such situation what will you assume? Another piece of hardware conflicts with that network adapter

The network adapter cannot reach the network because of a cable fault The network software is configured incorrectly All of the above Answer :D As the hard disks age, they gradually lose their ability to store information. This gradual loss is referred as what? Corrupted Boot sectors Bad sectors Failed hard disk controllers Corrupted partition tables Answer :B Windows NT includes an application error debugging tool that automatically detect, diagnoses and logs application errors in binary crash dump files as they occur. It will display an error message with related details when an application violates or attempts to violate the operational parameters maintained by Windows NT. What is the name of this error debugging tool? WinMSD Task manager Dr. Watson None of them Answer :C What is the name of the Windows NT diagnostic tool that enables you to inspect everything Windows NT knows about your computer and verify that it works correctly? Dr Watson WinMSD Event viewer Task manager Answer :B Which tab is considered as the most important part of the Windows NT diagnostic screen that shows the state of all hardware in the computer that Windows NT

knows about? This tab will help you iron out hardware conflicts by showing the resource use for devices installed in Windows NT? Services Memory Network Resources Answer :D If you are having a problem with crashes ("blue screens"), you are required to make copies of the information in RAM when the computer crashed, written to your boot partition when the computer crashes. What are these copies of information called as? Memory chunks Memory dumps Files Folders Answer :B