Appendix d
Appendix d
D
Answers to Instant Assessment Questions,
Review Activities, and Hands-on Labs
Chapter 1: Overview of
W i n d o w s N T W o r k s ta t i o n
and Windows NT Server
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1029
Resources
Logon NTVDM
process
User mode
Kernel mode
Executive Services
System Services
Hardware
FIGURE D-1 Answers to Windows NT 4.0 modular architecture review activity
C h a p t e r 2 : I n s ta l l i n g W i n d o w s N T
W o r k s ta t i o n a n d W i n d o w s N T S e r v e r
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1030
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
Problem 1 Some possible causes of this problem are hardware conflicts (or
incompatibilities), a corrupt boot sector, or a boot sector virus.
Possible courses of action you could take to resolve this problem include
using the NTHQ to examine your hardware configuration, checking for two pieces
of hardware with the same settings (same I/O Port, interrupt, and so on) and
reconfiguring hardware if conflicts are found, and repairing the boot sector by
using Fdisk/mbr from MS-DOS or by using a virus detection utility.
Problem 2 Probably the most common cause of this problem is that the domain
name or the Administrator’s user account name or password has been typed incor-
rectly, or typed in the wrong case. Remember that all passwords in Windows NT
are case-sensitive. Is the Caps Lock key on? Other possible causes of this problem
are incorrect network hardware or software settings, a bad cable or connection, or
a PDC that is inaccessible.
Possible courses of action you could take to resolve this problem include:
retyping the domain name, Administrator’s user account name or password (mak-
ing sure to use the proper case and making sure the Caps Lock key is turned off);
and ensuring that all network hardware and software settings are correct. You
might also check the network cable and connections, and verify that the PDC is up
and accessible on the network.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1031
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1032
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
23. False
24. True
25. True
26. False
27. False
Problem 1 The FAT file system is probably the best choice for this scenario,
because it enables NT to access files on partitions smaller than 500MB faster than
it could by using NTFS.
Problem 2 You must use the FAT file system in this situation in order to accom-
modate both NT and MS-DOS.
Problem 3 NTFS is probably the best choice for this scenario. NTFS usually
provides faster access to files stored on a large partition that contains a large num-
ber of files than the FAT file system provides.
Problem 4 NTFS is the obvious choice for this scenario because it is the only
file system supported by Windows NT 4.0 that provides the required file and folder
security and also supports file compression.
Problem 1 Disk mirroring is the best answer because it provides the most fault
tolerance of the four disk partitioning schemes.
Problem 2 A stripe set is the best answer because it provides the fastest access
speed to files.
Problem 3 A stripe set with parity is the best choice, because it provides mod-
erate fault tolerance and a moderate price tag.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1033
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1034
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
1. B
2. F
3. J
4. I
5. N
6. N
7. N
8. V
9. U
10. X
11. X
12. X
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1035
Resources
13. Replace
14. You need a different answer file for each hardware configuration, so you
need as many answer files as you have different hardware configurations.
15. The $OEM$ subfolder
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1036
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1037
Resources
10. A continuous connection does not permit any other computer on the
network to access an HP JetDirect adapter for printing, because the
Hpmon print monitor monopolizes the HP JetDirect adapter when a
continuous connection is used.
11. Hpmon
12. You can specify that a different folder on another partition (that has more
free space) be used as your spool folder.
13. No Access
14. No Access, Print, Manage Documents, Full Control
15. You must select the Success and/or Failure check boxes for File and Object
Access.
16. By creating a printer
By taking ownership of a printer
17. A printer pool
18. The purpose of sharing a printer is to enable users of other computers on
the network to connect to and send print jobs to that printer.
19. The advantage is that the network administrator is spared the
time-consuming task of manually installing printer drivers on every
computer on the network.
20. True
21. True
22. True
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1038
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
Problem 2 The most likely cause of this problem is that the success and failure
options for auditing file and object access have not been configured in User
Manager for Domains or User Manager. Auditing of printers requires that auditing
of file and object access be configured.
To solve the problem, configure these options in User Manager for Domains
or User Manager. Print events should begin to appear in the security log in Event
Viewer.
Problem 3 The most likely cause of this problem is that the partition that con-
tains the printer’s spool folder doesn’t have enough free space.
To solve the problem, you can delete some files from this partition, or move
the spool folder to a different partition that has more free space.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1039
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1040
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
C h a p t e r 8 : M a n a g i n g A c c o u n t P o l i c y,
User Rights, and Auditing
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1041
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1042
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1043
Resources
5. A two-way trust
6. User Manager for Domains
7. Trust relationships are non-transitive — which means that they apply only
to the domains they are established between.
8. In the logon process, a user enters a user name, password, and domain
name in the Logon Information dialog box. The local NetLogon Service
determines whether the user account is located in the local computer’s
Security Accounts Manager (SAM) database. If the user account is found to
be valid by the local SAM, the NetLogon Service retrieves the user
account’s security identifier (SID), and the SIDs for each group that the
user is a member of. The NetLogon Service combines the user and group
SIDs to create an access token, and then completes the logon process for
the user.
9. Pass-through authentication
10. During the logon process, a user enters a user name, password, and
domain name in the Logon Information dialog box. The local NetLogon
Service determines whether the user account is located in the local
computer’s Security Accounts Manager (SAM) database. When a user
account can’t be validated on the local computer (as is the case in this
situation, where a user account from the domain is used), the NetLogon
Service on the local computer forwards (passes-through) the logon request
to the NetLogon Service on a Windows NT Server domain controller for
validation. The domain controller validates the user account and passes the
appropriate SIDs back to the local NetLogon Service to complete the logon
process.
11. Synchronization
12. Factors to consider when planning a Directory Services architecture
include: the number and location of users; the number, types and location
of computers and shared resources; whether centralized or decentralized
network management is desired; and the needs of various departments
within the organization.
13. Multiple master domain model
14. Single master domain model
15. Single domain model
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1044
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
Built-in local group in each domain in which you will place the two new
global groups:
Administrators — (This allows members of the PhoenixAdminA and
PhoenixAdminB global groups to fully administer users, groups, and shared
resources on the domain controllers in all six domains.)
Built-in local group on every member server in all six domains in which you
will place the two new global groups:
Administrators — (This allows members of the PhoenixAdminA and
PhoenixAdminB global groups to fully administer users, groups, and shared
resources on the member servers in all six domains.)
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1045
Resources
Answers to Lab
Lab 10.16: Planning a Directory Services architecture
Note: The answers to these exercises are suggested solutions only. There are often
many ways to design a Directory Services architecture for a given situation. What
is important is that you understand the Directory Services architecture models
and trust relationships.
Exercise 1
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1046
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
NYC
Exercise 2
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1047
Resources
LA
TOKYO TORONTO
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1048
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1049
Resources
Answers to Lab
Lab 11.17: Optimizing WAN link performance
by the appropriate placement of BDCs
Denver 3
Las Vegas 2
Salt Lake City 2
Albuquerque 1
Remember, the goal of this lab is to optimize the WAN for efficient local user
logon and authentication. To do this, you must eliminate logon and authentica-
tion traffic from the WAN links. The numbers of BDCs in the answer are based on
the fact that each BDC can accommodate up to 2,000 users.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1050
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1051
Resources
13. The standard NTFS file permissions are No Access (None), Read (RX),
Change (RWXD), and Full Control (All).
14. File permissions
15. The new file inherits the NTFS permissions of the folder that contains the
new file.
16. Destination
17. The file retains its original NTFS permissions.
18. The most restrictive permission
19. The user who created it (except that when a member of the Administrators
group creates a file or folder, the Administrators group, not the user, is the
owner of the file or folder)
20. A user might want to take ownership of a file or folder if the user wanted to
assign or change permissions on the file or folder, but wasn’t the owner of
the file or folder and didn’t have the Change Permissions NTFS permission
(or the Full Control permission, which includes the Change Permissions
NTFS permission) to the file or folder.
21. First, the audit policy is configured in User Manager or User Manager for
Domains. Then, auditing is configured for each file and folder individually
by using Windows NT Explorer.
22. You must select success and/or failure auditing of File and Object access in
order to audit files and folders.
23. Event Viewer
24. Most resource access problems are caused by incorrectly configured and/or
conflicting permissions.
25. False
26. True
27. False
28. True
29. False
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1052
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
Answers to Labs
Lab 12.18: Sharing and securing resources
Suggested answer:
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1053
Resources
Problem 1 The cause of the problem is that the Everyone group is assigned the
Read permission for the AccountingData share. When share permissions com-
bine with NTFS permissions, the most restrictive permission applies. Even though
NancyY is a member of the Accounting group and the Accounting group has the
NTFS Change permission, NancyY’s effective permission is limited to the Read
permission because of the share permission.
To resolve the problem, assign the Everyone group the Full Control share
permission for the AccountingData share. Access to this share will then be con-
trolled by NTFS permissions.
Problem 2 The cause of the problem is that JohnS is a member of the Sales group,
which has been assigned the No Access NTFS permission for the
D:\Data\Managers folder. Even though JohnS is appropriately a member of the
Managers group, which has been assigned the NTFS Change permission for the
D:\Data\Managers folder, when the NTFS No Access permission is assigned to any
group the user is a member of, the user’s effective permission is always No Access.
To resolve the problem, remove the Sales group from the Name list box in
the Directory Permissions dialog box.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1054
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
5. One
6. Computers can be non-browsers either because they are configured to not
function as a browser, or because their network software does not provide
them with the capability to maintain a browse list.
7. How a browse list is built and maintained:
; When a master browser first comes online, its browse list is empty. To
build its browse list initially, the master browser sends a broadcast to
all computers on the subnet requesting that all network servers
announce their presence. (Remember for the purpose of discussing
browsing in this chapter, network servers include all computers that
either have shared resources, or are capable of sharing their
resources.)
; All available network servers respond to this request by announcing
their presence, within thirty seconds. The master browser
incorporates this information into its initial browse list. The master
browser then distributes this browse list to the domain master
browser and to the backup browsers.
; After initial creation of the browse list, when a Windows computer
that functions as a network server is first booted, it broadcasts its
presence to the network. The master browser receives this
announcement and places the information in its browse list.
; During normal operations, a Windows computer that functions as a
network server continues to announce its presence to the network
every twelve minutes. If the master browser does not receive a
broadcast from a network server after three consecutive twelve-
minute time periods, it removes the computer from its browse list.
; (This is how the master browser maintains its browse list — it
assumes that all network servers in its initial browse list are available
until it fails to receive a broadcast announcement from a computer
for three consecutive twelve-minute periods, at which time it updates
its browse list by removing this computer from its list. Therefore, it is
possible for a network server to remain on the browse list for some
time after it is no longer available to network users.)
; During normal operations, backup browsers request an updated
browse list from the master browser every twelve minutes. If the
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1055
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1056
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1057
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1058
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1059
Resources
4. When selecting a tape drive device, you should consider both of the
following:
Be sure to select a tape drive that is on the Hardware Compatibility
List, and,
If possible, select a tape drive that has the capacity to back up your
entire server on a single tape.
5. Perform a trial restore
6. A
7. B
8. Selecting the verify option approximately doubles the time it takes to
perform a backup.
9. The Schedule service
10. Store a current normal (full) backup off-site — preferably at a location that
is secure and that has a controlled-climate environment.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1060
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
instance, the computer on the local subnet would never receive the packet
intended for it.
5. If a computer’s default gateway address does not specify a router on the
local subnet, then that computer will not be able to communicate with
computers or other network devices located on other network segments.
6. You can assign an IP address to a Windows NT computer in one of two
ways: by configuring a computer to obtain an IP address from a DHCP
server, or by manually specifying a computer’s IP address configuration.
7. IP routing is a function of the Internet Protocol (IP) that uses IP address
information to send data packets from a source computer on one network
segment across one or more routers to a destination computer on another
network segment.
8. Static and dynamic
9. RIP for Internet Protocol
10. The DHCP Relay Agent is a Windows NT Server service that forwards client
DHCP configuration requests to a DHCP server on another network
segment. The DHCP Relay Agent enables computers on one subnet to
receive IP addresses from a DHCP server that is located on a different
subnet.
11. Windows Internet Name Service (WINS) is a Windows NT Server service
that provides NetBIOS name resolution services to client computers.
12. Microsoft DNS Server provides host name resolution services to client
computers.
13. Steps you can take to increase security include:
When configuring password authentication, you can clear the check
box next to Basic (Clear Text) and select the check box next to
Windows NT Challenge/Response to prevent user names and
passwords from being transmitted in an unencrypted format over the
Internet.
You can control access by IP address.
You can ensure that directory browsing is not selected.
You can require that users supply user names and passwords by not
enabling anonymous users to access the WWW service.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1061
Resources
14. You must assign and configure an additional IP address to the network
adapter in your computer.
15. Internet Information Server and Peer Web Services
16. A router, a DSU/CSU, a network adapter, and a fractional T1 leased line
17. An ISDN adapter card with either an internal or external network
terminating unit (NT1) and an ISDN line
18. A virtual server is a pseudo WWW server that has its own unique domain
name and IP address. To the Internet user accessing the virtual server, a
virtual server appears to be a separate server; but in reality, a virtual server
is not a separate server, but more like an extra shared folder on an Internet
Information Server. A single Internet Information Server can be configured
to accommodate multiple virtual servers.
19. IP address, subnet mask, and default gateway
20. ping.exe
21. ping.exe
22. Ipconfig.exe
23. True
24. False
25. True
26. True
27. False
28. True
29. False
Answers to Lab
Lab 16.28: Identifying and resolving TCP/IP connectivity problems
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1062
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
Situation 2 The problem in this situation is that Client_A has the same IP
address as Client_C. Duplicate IP addresses are not permitted.
To resolve the problem, either Client_A’s or Client_C’s IP address should be
changed so that it is a unique IP address.
C h a p t e r 17 : C o e x i s t e n c e
With NetWare
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1063
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1064
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
C h a p t e r 1 9 : I n s ta l l i n g a n d
Configuring Remote Access
Service (RAS)
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1065
Resources
5. Standard analog telephone line and modem, ISDN, X.25, and Point to Point
Tunneling Protocol (PPTP)
6. Serial Line Internet Protocol (SLIP), Point-to-Point Protocol (PPP), Point-
to-Point Multilink Protocol, and Point-to-Point Tunneling Protocol (PPTP)
7. SLIP
8. PPP
9. Point-to-Point Multilink Protocol is an extension of PPP. Point-to-Point
Multilink Protocol combines the bandwidth from multiple physical
connections into a single logical connection. This means that multiple
modem, ISDN, or X.25 connections can be bundled together to form a
single logical connection with a much higher bandwidth than a single
connection can support.
10. Point-to-Point Tunneling Protocol (PPTP) permits a virtual private
encrypted connection between two computers over an existing TCP/IP
network connection. The existing TCP/IP network connection can be over a
local area network or over a dial-up networking TCP/IP connection
(including the Internet).
All standard transport protocols are supported within the Point-to-Point
Tunneling Protocol connection, including NWLink IPX/SPX Compatible
Transport, NetBEUI, and TCP/IP.
A primary reason for choosing to use PPTP is that it supports the RAS
encryption feature over standard, unencrypted TCP/IP networks, such as
the Internet.
11. RAS supports the following transport protocols: NetBEUI, TCP/IP, and
NWLink IPX/SPX Compatible Transport.
12. The RAS NetBIOS gateway is a function of the RAS server. The RAS
NetBIOS gateway enables client computers that use NetBEUI to access
shared resources on other servers located on the RAS server’s local
network. These other servers can use TCP/IP, NWLink IPX/SPX Compatible
Transport, or NetBEUI. In a nutshell, the RAS NetBIOS gateway performs
protocol translation for the remote NetBEUI client computer so that it can
access shared resources on the RAS server’s local network.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1066
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
13. The NetBIOS name resolution methods supported by RAS include: NetBIOS
broadcasts, WINS servers, DNS servers, LMHOSTS files, and HOSTS files.
14. Remote users must be assigned the dialin permission before they can
establish a dial-up connection with a RAS server.
15. Phonebook entries
16. Any three of the following:
; Type of dial-up server used by the ISP (SLIP or PPP connection
protocol)
; Whether the ISP’s dial-up server supports software compression
; Whether you will specify an IP address when you connect to the ISP,
or the ISP’s dial-up server will assign you an IP address
; Whether the ISP will provide the IP address of a DNS server during
the connection process
; Whether the ISP’s dial-up server uses IP header compression (IP
header compression is also referred to as Van Jacobson header
compression or VJ header compression)
; Type of modem you will be connecting to at the ISP and
recommended settings that you should use for your modem
; The phone number you should use to connect to the ISP
17. RAS call back security is configured by using Remote Access Admin. (It can
also be configured by using User Manager or User Manager for Domains.)
Call back security is configured on an individual user basis. The Preset To
configuration option offers the highest level of call back security.
Problem 1 First, determine the type of modem to which the user is attempting
to connect; then reconfigure the user’s modem settings to the most compatible
option, or as recommended by the manager of the dial-up server the user is
attempting to connect to.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1067
Resources
If the user is using an unsupported modem (i.e., one that is not on the
Hardware Compatibility List), verify that the settings in the user’s Modem.inf file
are appropriate for the modem.
Determine whether the user’s computer is configured for RAS software com-
pression — if it is, ensure that the modem is configured to not compress data.
If the user is still unable to connect, configure the modem to record a log file
of all attempted connections.
Problem 2 Because SLIP servers normally require clear text passwords, try
changing the authentication and encryption policy configuration on the Dial-Up
Networking client computer. Select the radio button next to “Accept any authenti-
cation including clear text” on the Security tab of the Edit Phonebook Entry dia-
log box (instead of the current configuration of “Accept only Microsoft-encrypted
authentication”).
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1068
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
6. You can use either Server Manager or File Manager to create a Macintosh-
accessible volume.
7. In clear text
8. A User Authentication Module (UAM)
9. As an Apple LaserWriter
10. To connect a Windows NT Server computer (that has Services for
Macintosh installed on it) to an AppleTalk print device, create a printer that
specifies the AppleTalk print device as its print destination.
11. False
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1069
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1070
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1071
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1072
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1073
Resources
C h a p t e r 2 4 : C a pa c i t y P l a n n i n g
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1074
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
11. PhysicalDisk Avg. Disk Queue Length, PhysicalDisk % Disk Time, and
LogicalDisk % Free Space
12. Network Segment % Network utilization
13. True
14. True
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1075
Resources
Answers to Labs
Lab 25.37: Finding and resolving bottlenecks
Problem 1 The statistics in this problem seem to indicate that the processor,
memory and disk all need upgrading. However, if you upgrade RAM to 64MB, the
amount of paging would be significantly reduced. Reducing paging would also
decrease the % Processor Time and % Disk Time statistics to reasonable levels.
This server should probably have all of the possible upgrades presented, but
adding memory (RAM) is the best choice if only one upgrade can be performed.
Problem 2 The statistics in this problem seem to indicate that the disk is the
biggest bottleneck to optimum system performance. If only one of the possible
upgrades can be performed, upgrading to a hardware-based RAID 5 disk subsystem
should yield the most significant increase in disk performance for this server.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1076
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
Problem 1 Add a BDC for the LONDON domain at the Paris location, and add a
BDC for the LONDON domain at the Munich location.
Additionally, move one of the WINS servers from London to Paris, and move
a second WINS server from London to Munich.
This places the servers that perform logon authentication and NetBIOS name
resolution physically close to the users that access them, thereby improving server
response time and minimizing traffic across the WAN links.
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1077
Resources
C h a p t e r 2 7 : A d va n c e d
Troubleshooting Topics
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1078
Appendix D: Answers to Instant Assessment Questions, Review Activities, and Hands-on Labs
6. View the Event Detail for the last stop error in the list (the event that
happened first chronologically during the boot process) first. Resolving this
error will often take care of most or all of the other stop errors listed.
7. Service dependencies show which services and drivers must be running
before the service in question can start. Group dependencies show which
groups of services or drivers must be running before the service in
question can start. Once you have determined what the service and group
dependencies for a particular service or driver are, you can then verify that
all of these services and drivers (that are required to be running before a
particular service or driver can start) are, in fact, running.
8. The Services tab
9. Windows NT Registry Editor (regedt32.exe) and
Windows 95 Registry Editor (regedit.exe)
10. HKEY_LOCAL_MACHINE
11. Back it up
12. /s
13. The Windows 95 Registry Editor (regedit.exe) is a better tool for
searching the Windows NT Registry because this editor can search the
Registry by key, by value, or by data contained in the value. As a Registry
search tool, this editor is more effective than the Windows NT Registry
Editor, which can only search the Registry by key. You can manually wade
your way through the various folders and subfolders in the Windows NT
Registry Editor, and you can edit any Registry value, it’s just more
cumbersome to use as a search tool than the Windows 95 Registry Editor.
14. The Windows NT Registry Editor (regedt32.exe)
15. Windows NT displays a blue screen when it encounters a STOP error that it
cannot recover from.
16. There are three primary sections in a blue screen: the STOP error
(including error code or BugCheck code) and description, a list of loaded
drivers, and a stack dump (including the operating system’s build number).
17. The System application
18. Dr. Watson for Windows NT
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1079
Resources
MCSE Windows NT® 4.0 • 3087-9 1/7 • appD.F • reprint • 6/22/98• Deirdre • 1080