1.
What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?
A. 
B. 
Security management server
C. 
Network management server
D. 
Performance management server
2.
What are the three most common network management architectures?
A. 
Centralized, hierarchial, and distributed
B. 
Centralized, hierarchial, and hybrid
C. 
Hybrid, hierarchial, and distributed
D. 
Centralized, hybrid, and distributed
3.
What network management architecture has an NM platform on one computer system at a location that is responsible for all NM duties?
A. 
B. 
C. 
D. 
4.
What network management architecture uses multiple systems, with one system acting as a central server and others working as clients?
A. 
B. 
C. 
D. 
5.
At what level of network management activity are you working when you, as the network manager, are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?
A. 
B. 
C. 
D. 
6.
At what level of network management activity are you working when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at hand?
A. 
B. 
C. 
D. 
7.
Gathering information about current network device settings is a step of what functional network management area?
A. 
B. 
C. 
D. 
8.
What are the two functional categories of performance management?
A. 
B. 
C. 
D. 
9.
Which functional category of performance management tracks historical data by tracking activities on the network?
A. 
B. 
C. 
D. 
10.
What network management area is concerned with controlling access points to information?
A. 
B. 
C. 
D. 
11.
What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault?
A. 
B. 
C. 
Low-level software alarms
D. 
Low-level hardware alarms
12.
Network management protocols are designed (in most cases) to reside above what layer of the OSI model?
A. 
B. 
C. 
D. 
13.
What is a hierarchial, structured format that defines the network management information available from network devices?
A. 
B. 
C. 
D. 
Management information base
14.
Which category of simple network management protocol node is responsible for monitoring, collecting and reporting management data to the management system?
A. 
Primary domain controller
B. 
C. 
D. 
15.
What simple network management protocol operational message retrieves the value of one instance of management information?
A. 
B. 
C. 
D. 
16.
What type of simple network management protocol node is responsible to authenticate logons for clients by validating the supplied user name and password against the account in the database?
A. 
Network management controller
B. 
C. 
D. 
17.
What protocol is used primarily to obtain connectivity to the large base of Novell NetWare clients?
A. 
Data link control protocol
B. 
Network basic input/output system extended user interface (NetBEUI)
C. 
Transfer control protocol/Internet protocol (TCP/IP)
D. 
Internetwork packet exchange/sequenced packet exchange (IPX/SPX)
18.
What network protocol is used for network connection to Hewlett Packard network printers?
A. 
Data link control protocol
B. 
C. 
D. 
19.
Why are users required to change their passwords upon logging onto the network for the first time?
A. 
To ensure users don't create vulnerability by leaving the default password in place
B. 
To ensure users understand how to create a password
C. 
To ensure the integrity of each user's unique password
D. 
To ensure users remember their unique password
20.
For user accounts with elevated privileges, such as a client support administrator, what are the correct number and type of characters needed for the account password?
A. 
Minimum of nine characters consisting of at least two upper and lower case letters and numbers
B. 
Minimum of nine characters consisting of at least two upper and lowercase letterrs, numbers, and special characters
C. 
Minimum of fifteen characters consisting of at least two upper and lowercase letters and two special characters
D. 
Minimum of fifteen characters consisting of at least two upper and lowercase letters, two numbers, and two special characters
21.
Which group scope allows member permissions to be assigned in any domain or forest?
A. 
B. 
C. 
D. 
22.
What defines the rules by which operations can be performed on a particular resource?
A. 
B. 
C. 
D. 
23.
What file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system volumes?
A. 
B. 
C. 
D. 
24.
What permission always overrides all other permissions assigned to a user or group to which the user belongs?
A. 
B. 
C. 
D. 
25.
When a volume is formatted with new technology file system, what group is automatically assigned full control permissions to the volume?
A. 
B. 
C. 
D.