Untitled Document


Madgopher's Cram Jam Workstation 70-073

Workstation Cram Sheet/Braindump

I Installation & Configuration

*Minimum requirements for NT Workstation 4.0:

  • 110M Free disk space
  • 12M RAM (w/ Intel processor)
  • 16M RAM (w/ RISC processor)
  • 486-DX33
  • CD-ROM (if not installing over network)
  • VGA compatible display

*WINNT & WINNT32 switches:

  • /O Creates boot floopies, begins install
  • /OX Creates boot floopies without install
  • /B Installs NT without making or using Setup boot floppies
  • /UDF, /U, and /I Used for unattended and automated installs
*UNATTEND.TXT and UDFs- used to plan for, create, and use unattended installation files.

*The SYSDIFF utility:

  • /snap [/log: log_file] snapshot_file creates an image of the base installation.
  • /diff [/log:log_file] snapshot_file difference_file creates an image of the changes.
  • /apply [/log:log_file] difference_file applies the difference file to a base installation
  • /inf [/log:log_file] sysdiff_file oem_root creates an .INF file for automating application install along with NT
  • /dump [/log:log_file] difference_file dump_file creates a document detailing the activity of the difference file
*Hardware components are installed, removed and configured using the Control panel applets.

*When upgrading an existing version of NT, this information stays intact:

  • Any edits made to the Registry using the Registry Editor
  • Custom program groups, desktop layout, setting and Control Panel preferences.
  • Local security accounts (users and groups)
  • Network adapter, protocol, service configurations and addresses (Ras included)
  • Preferences for Administrative tools and Accessories.
II Managing Resources

*There are two types of groups: Global and Local. Local groups are only available on local domains; global groups are available across domains. Local groups can contain users and global groups, global groups contain users only. You can't place groups within global groups, nor can you place local groups within other local groups.

*For group permissions, the least restrictive right takes precedence, except No Access- which always overrides all others! When combining NTFS and share permissions, the least restrictive takes precedence for each kind (except No Access), when combining resulting NTFS and share permissions, the most restrictive wins.

*In User Manager for Domains you can:

  • Produce, change, duplicate, and remove user and local group accounts.
  • Enable account policies (assign defaults for passwords, account lockouts, disconnect status, etc.)
  • Create user rights and audit policies.
*Default profiles are local. can be made roaming through system applet.

*Mandatory profiles: change NTUSER.DAT to NTUSER.MAN.

*To create directory or printer share: set sharing, define share name, set permissions.

*All new directory shares have default rights of Full Access to Everyone.

*All new printer shares have Print access to Everyone, Full Control to Administrator and Power Users, and Manage Documents to to the owner.

*Attach to printer share: New Printer, Network Printer Server.

* Attach to directory share: Map Drive or Network Neighborhood.

*Each shared logical printer can be set to different priorities and access times.

* NT Workstation is NOT FAULT TOLERANT.

*Only primary partitions can be active: Select Mark Activefrom the Partition menu in Disk Administrator.

*Rules for Permissions on NTFS Move and Copy operations:

  • if you move a file within the same NTFS partition, it retains original permissions.
  • if you copy a file anywhere in NTFS, it inherits parent folder permissions.
  • if you create, copy or move files frome one NTFS partition to another, they inherit parent folder permissions.
  • ALL NTFS permissions disappear when files are moved or copied from NTFS to FAT.

*Convert FAT to NTFS using convert.exe; HPFS is NOT supported in NT 4.

*Two Registry editors: REGEDIT.EXE (search features) and REGEDIT32.EXE (security features)

III Boot Facts

*Remember that BOOT files reside in the system partition, and SYSTEM files reside in the BOOT partition.

*The most important components of the NT boot process:

  • BOOT.INI Describes NT boot defaults, settings, OS location, & menu selections. It resides in the root directory of the system partition. This is a required file for a bootable floppy.
  • NTDETECT.COM Hardware detection: reads device and config info before NT boots. It resides in the root directory of the system partition. This is a required file for a bootable floppy.
  • NTLDR Loads NT or other designated OS; relinquishes control after loading completes. It resides in the root directory of the system partition. This is a required file for a bootable floppy
  • BOOTSECT.DOS Used if NTLDR permits booting to another MS OS [i.e.DOS, Win95]. Resides in the root directory of the system partition.
  • NTOSKRNL.EXE Includes all basic capabilities and items necessary to establish runtime environment. Resides in \Winnt_root\system32 on boot partition.
  • OSLOADER.EXE Provides info and services equal to NTDETECT.COM, bootsect.dos and NTLDR on PCs. Resides in RISC boot PROM area.
  • NTBOOTDD.SYS Used when system or boot SCSI drive has BIOS disabled. Replaces BIOS functions with software driver. resides in root directory of system partition.

IV Connectivity

*RAS only supports PPP clients (not SLIP).

*Multilink must be established at both ends.

*RAS encryption: clear text (CHAP, DES, PAP, SPAP) or MS-encrypted (MS-CHAP).

*Access methods: UNC, Network Neighborhood, Map Share.

*Using NT Workstation as a client for a NetWare server: NW Link, CSNW.

*Peer Web Services offers offers Web, FTP and Gopher info services.

V Monotoring & Optimization

*Isolate, identify and solve a performance related problem.

*Too little RAM= high rate of memory paging.

*Processor: %Processor Time should remain below a constant level of 80.

*Memory: %DiskTime should be less than 10 percent of Processor: %Processor Time.

*LogicalDisk and PhysicalDisk counters will read 0 until enabled by diskperf -y.

*Windows NT Diagostics or WINMSD can be used to view computer details not alter them.

VI Troubleshooting

*The ERD (Emergency Repair Disk) is created by rdisk /s

*The ERD and 3 setup floppies can be used to repair boot problems: reboot from setup floppies and select R from menu.

*Dr Watson saves memory dumps for failed or crashed applications. To access Dr Watson run DRWTSN32 from Start/Run.

*Starting and stopping the spooler service will often eliminate Printer spool problems.

*Last known Good Configuration returns system to state of last successful logon, accessed during bootup by pressing spacebar [and L] when prompted.


Here is Mad's best of the braindumps, a compilation of the best Q&As fromBraindump Heaven. I have actually looked up most of these, but you are highly encouraged to do your own research, as these concepts are very tricky. If you have any comments or suggestions, drop me a line...good luck!

The following is a quote from the first Workstation BD:
"...Basically, I had about five questions that dealed [sic] with Workgroups. so- KNOW ALL ABOUT WORKGROUPS."
This sounds like good advice, so here are some workgroup basics:
A workgroup is a network of computers in which no single machine has control over the operation, activity or access to the entire network. Within a workgroup each machine is a peer, and has equal administrative control. Computers running WinNT WS/Server, WW, or Win95 can be configured to participate in either a domain or a workgroup. When setting up one of these computers for networking, you specify a computer name and a workgroup name. If the workgroup name matches a domain name, the computer name appears in the browse list for that domain. Remember that workgroups have:
  • No central control
  • Share-level security
  • All user accounts must be created on each member
Workgroups are not recommended if you have more than 10 computers to tie together. NT WS can participate in a workgroup simply by defining the workgroup name in the right place. That place is the Identification tab of the network applet. Clicking the Change button on that tab causes the Identification Changes dialog box to appear. By selecting the Workgroup radio button and defining the name of the workgroup, you can transform the NT Workstation from a client in a domain to a peer in a workgroup.
You can reverse the process by simply redifining the domain in the same dialog box. Remember that for either change to take effect you'll have to reboot. Also a computer cannot be a member of both a workgroup and a domain simultaneously, but can be switched as needed...

Win16 apps and NTVDM

Q:"You want to run Win16 applications under NT Workstation. Where would these run by default?

A:In a single NT Virtual DOS Machine (NTVDM)."

Note: Tricky wording here from the MOC explanation: "By default, a single NTVDM starts when the first Win16 application is started, and then all Win16 applications run in that NTVDM"

Q:"You are running 16-bit Windows applications. The 3 applications share information. However one of these applications is faulty. How do you run the applications without effecting the other 16-bit Windows applications?
"
A: Run the 3 applications in the default configuration (which is shared memory) and the remainder in their own NTVDM’s

*NOTE: pg 302 Exam Cram "..it is possible to launch Win16 applications in their own individual instances of WOW(Windows-on-Windows)by modifying their PIFs or indicating this parameter from a Run instruction or command prompt. When multiple WOWs are in use, Clipboard data from one WOW app cannot be transferred into another WOW app because they no longer share resource space."

"Default where 16-bit applications are run.
A:In a single virtual DOS machine." [The first one, anyway!]

Q:"Three integrated 16-bit applications use shared memory blocks to communicate with each other. When one of the three integrated application halts, it stops the execution of all 16-bit, Microsoft Windows based application that are running. You want to continue using the three integrated applications but you want to prevent them from interfering with other 16-bit applications. How can you do this?

A:Run the three integrated applications in the default memory space. Run all other applications in separate memory spaces."

Mad Bonus: Here's HOW you start a Win16 app in its own NTVDM:
  • At a command prompt: Type start/separate [path] application_executable.
  • On the Start menu: ClickRun in the Open box, type [path] application_executable, and then select the Run in separate Memory Spacecheck box.
  • From a shortcut: Create a shortcut, and on the Properties Shortcut tab, click the Run in separate Memory Spacecheck box.
  • By file association: In Windows NT Explorer, on the View menu, click Options click the File Types tab, and then-click the Win16 application to be edited. Click Edit, and then double-click Open. Edit the opening line to include the /separate switch using the following syntax:
    cmd /c start /separate path\application_executable 1%

File association can also be done from the command prompt by using the ftype and assoc commands.

Q:"What happens when you run a 16-bit MS windows based application in its own memory space? (pick 2)

  • A. Application runs at higher priority;
  • B. Application uses less system memory;
  • C. Application can be preemptively multitasked;
  • D. Application cannot interfere with execution of other 16-bit windows based apps running at same time.


D is obviously correct. I researched C, it looks correct...

"The NTVDM process is multitasking: A thread in the process (in this case, a 16-bit Windows application) can run at the same time as threads of other processes if the computer has more than one processor. It is also preemptible: Threads can be interrupted and resumed to allow virtual multitasking on a single-processor computer." TechNet

Q:"How do you start the command "ntbackup /r /e" with low priority?

A: Start /low ntbackup /r /e"

*Ibid pg 288 "...[U]sers can launch applications with 4(/low) or 13(/high) priority and an administrator can launch with 24 (/realtime) priority. To launch an application with an alternate priority level, use the following syntax at a command prompt:

start [/low| /normal| /high| /realtime] application

NT offers two other priority controls...[A] slide control [that] is located on the performance tab in the System applet in the Control Panel...[And] [t]he second control is accessed via the Task Manager. By selecting any of the listed processes on the Process tab, you can change the priority to low, normal, high, or realtime via the Set Priority menu accessed through the right-click pop-up menu. ...By default, foreground apps have a priority of 10[max]. You can move the slider to set foregrounds with an additional priority level of 1 [middle tick] or 0[none]."

Elementary, my dear Watson
Let's take a close look at the good doctor, before he makes a house call. As we shall see this little application debugger is hardly documented at all in the MOC.

Q:"Which utility do you use to record memory dump following an application failure?

A: Dr. Watson"

B Windows NT System properties setting

Answer: A, B " [B looks wrong to me]

Note: Remember application crash dumps are done in Dr. Watson, system STOP errors and memory dumps are done in FAULTLOG on the startup/shutdown menu.

Ibid Pg 339 "...Dr Watson...detects application errors, diagnoses the error, and logs the diagnostic information...Data captured...is stored in the DRWTSN32.LOG file." Ibid Pg 70 "The System applet is used to alter environmental variables, pagefile parameters, and startup options... Startup/Shutdown The top portion of this tab modifies the BOOT.INI file by setting the default startup selection and timeout; the bottom portion defines the action to take when a STOP error occurs, such as create a memory dump file and/or reboot the system."

"What would you enable to record a memory dump following an application failure?
[You are supposed to place a target with crosshairs on the correct area]

Create crash dump file on Dr. Watson window"

Note: This person didn't give us any other options, but if we assume that this answer is correct remember that you gotta know where to place those crosshairs, boys and girls. Play with Dr.Watson if you can, most of it is very straightfoward. Remember that:
  • Dump Symbol Table Adds the corresponding symbol data to the dump file. This increases the size of the file substantially
  • Dump All Thread Contexts Forces a dump file to be created for all active threads, not just the ones related to the failed app.
Here's a bit of trivia: The MOC devotes exactly 112 words to Dr.Watson, underscoring the fact that that the Drwtsn32.log file is created in the form of an electronic text file. There's not much someone outside of a trained tech can do with this information.

Note: there are 3 debug setup options; local debugging, remote debugging, and Crashdump
  • Local Debugging Done on-site. Two computers, a host and a target are needed. These are connected by a null modem cable.
  • Remote Debugging Call MS Tech Support, if you can afford it.
  • CrashDump A memory dump that writes the entire memory contents to the paging file and marks this file with a special stamp.

Q:"I had question on creating an crash dump file for application error the[re] were two screens, one showing system properties -start\shutdown screen and other one was Dr.watson screen which had many check box[e]s u have to check on one [of] the box[e]s.
[My][a]nswer was to check create crash dump file which happens to be last check box in Dr.watson screen"

To review: application crash dumps are done in Dr. Watson, system STOP errors and memory dumps are done in FAULTLOG on the startup/shutdown menu.

Q:"What Control Panel applet is used to configure modems?
    a. Modem applet
    b. Devices applet
    c. Services applet.
    d. Adapter in network applet

    Answer: a"

Ibid Pg 239 "When you install a modem or the RAS components of NT, TAPI [is] automatically ...installed. It is required to control any communications device. Each time a dial-out connection is attempted, TAPI controls the modem and moderates the connection...The Dialing Properties dialog box (reached through the Modems applet in Control Panel) controls how TAPI uses your modem to place calls. You can control long-distance dialing, calling card use, prefix numbers, and tone/pulse dialing...All of the functions and features of the modem...are configured through a TAPI-controlled interface."

"Situation (Long): You are planing to reconfigure an NT Workstation with 32 MB RAM for optimum speed of access to its local (mainly graphic data) files, varying in size from 1MB to 10MB, for other computers in the same LAN. You have there a SCSI controller with 4 disks of 2 GB each, formatted with FAT.

Required result: To optimize performance for optimum speed of access to local data files.

Optional results: Reconfigure for optimum speed of access to paging file.

Optimize network access performance.

Proposed solution:

Configure the first hard disk as boot partition. Configure the other 3 disks as a Volume Set.
Use FAT on all partitions. Place data on the Volume Set. Place paging file on the boot partition. Configure binding order of protocols; move most used protocols to the bottom of binding order.

The solution produces:

    A The required result and 2 of the optional results.
    B The required result and 1 of the optional results.
    C The required result and none of the optional results.
    D None of the required results.

    Note: Volume sets DO NOT speed up disk access.

Answer: D" Mad's note: Moving the most used protocols to the bottom of the binding order will also slow you down...

386 computer with NT 3.51, how do you upgrade to 4?
Can't-must be 486

Windiff and other utilities...
There seems to be an awful lot of confusion on this utility. One braindumper even claimed that there was no such thing! Allow me to clear the air with a few quotes from TechNet: "The Windiff utility allows you to compare two text files. This is useful when you want to compare Registry settings before and after [Win95] Office installation."

"How can you compare registry entries before and after an upgrade, the installation of a new software package, or between two computers?
"...[U]se the Windows NT 3.51 or 4.0 Resource Kit utility Windiff.exe to compare the differences between the registry entries before and after an upgrade..."

Q: "U need to do an automated installation of wks & 5 applications on 200 PCs. U decide to use NT server as the source to install. Which 3 files are required?*
  • Poledit.exe
  • Setup.inf
  • Windiff.exe
  • Unattend.txt (ANS)
  • Sysdiff (ANS)
  • UDF (ANS)

*There are lots of nearly identical braindumps, all say that UDF is right, but is it? Is UDF really a text file, a file name extension, or a command line parameter? Does this make a difference? And if we assume that UDF is wrong, could any other answer be correct? Read on, McDuff, the plot thickens...

TechNet: "Uniqueness Database Files (UDFs) are an extension of the answer file functionality"
"Information that the Setup program uses during text-mode setup can only be specified in the answer file, not in the UDF."


Q: "Workstation and 5 applications need to be installed on 200 Intel computers. All will have identical hardware and applications installed. NT server will be the source of all installation files. Which files do you need? Choose 3"
  • A Poledit
  • B Unattended.txt
  • C Sysdiff
  • D Setup.inf
  • E UDF
  • F Windiff

No answers from our braindumper here, but that's ok. The Gopher just loves to dig. Let's look at Poledit [System Policy Editor]:

From Tech Net: "The System Policy Editor is a graphical tool that allows you to easily update the registry settings to implement a System Policy. The System Policy Editor is included with Windows NT Server 4.0, but you can install it on Windows NT Workstation-based machines and on Windows 95-based machines as well. Note that a policy file is valid only for the platform on which it was created. For example, if you run Poledit.exe on a Windows 95-based machine, and you save the policy file, the file will be written in a format that can be interpreted by Windows 95-based machines only. The same is true when you create policy files on Windows NT-based machines. As a result, Windows 95 and Windows NT policy files are not interchangeable."
Poledit looks wrong to me. It is dismissed from further inquiry here...


"System Difference Tool: SYSDIFF.EXE
The System Difference tool enables you to distribute and install applications automatically during or after Windows NT setup."[more above, in case you forgot] Ibid "...Workstation deployment..."
Correct-a-mundo. This one is definitely right, as we shall soon see...

From a recent braindump:
"just like to say thanks to those who submitted previous braindumps. I passed with a 921 this week - 21/9/98. One question in the scenario type which I could not find any documentation on was the Setup.inf file - I even tried Microsoft support- who only described it as a script file not associated with unattended installs. -check it out."
Mad note: the questions posed above have nothing to do with unattended installation. Automated installation seems to be the topic. But are they the same thing?

"SETUP.INF is the key file that Setup uses to install the Windows for Workgroups system and application files and to create program groups that you can use to run applications from Program Manager."
It would seem that SETUP.INF is really a Windows for Workgroups file only- can this be the trick? Nothing I found relates this file and WS, except the /I switch in WINNT.EXE/ WINNT32.EXE, and the SYSDIFF "inf" function.
"Setup.inf: "Automating Selection of Windows Accessories and Components" Each Windows NT component or accessory has an associated setup information file (.INF). Each .INF uses the value InstallType to specify whether the application is to be installed. InstallType values:
0 = Manual Only
10 = Typical or Custom
14 = Typical, Custom, or Portable". TechNet

This appears to be more of a concept than a single file named "Setup.inf". Yet the concept seems to fit the scenario. This would have to be the correct answer IF UDF is wrong, since Windiff and Poledit are obviously wrong...but if unattended and automated are one and the same, and there is every reason to believe that they are, then you could concievably use a UDF parameter. But if you have identical requirements do you really need a "Uniqueness" file to specify changes in each machine?

"An 'unattended (or automated) install' can be performed by using special script files...The first file [is] UNATTEND.TXT...You can modify this file to match your needs manually. Or you can use the SETUPMGR.EXE utility...to simplify the process of creating [this]...file. A second script file can be used in conjunction with the UNATTEND.TXT file to specify different computer-specific details...This is called a Uniqueness Database Files [UDF]" Exam Cram, Pgs 35-36.

Do you really need a Uniqueness Database File in this scenario. Or could they be trying to trick us with semantics? Consider this: the REAL file name extension for a Uniqueness Database File is .UDB, NOT .UDF! Could this be the real trick here, that UDF is NOT a "file", and therefore wrong? Or simply not needed here?
From TechNet:
"Note The Windows NT setup command line parameter is /UDF but the file name extension for the Uniqueness Database File is .UDB."
It continues:
"Configure Machine-Specific Information Using Uniqueness Database Files (.UDB) Windows NT setup includes a feature designed to enable you to create one common Windows NT 4.0 setup script for use with a number of target computers to overcome the problem of "How to specify machine-specific information?" with out creating a unique setup script for each computer by specifying the unique settings in a separate database file. This file is a Uniqueness Database File (.UDB). .UDBs are used to provide replacements for sections of setup script, or supply additional section. This file is indexed using strings called UniqueIDs. The .UDB is used to specify a set of sections that should be merged into the setup script file at the start of GUI setup. This process takes place before any affected components actually read the internal representation of the setup script file, and is transparent to the user."

let's take a more concise look at the entire process:

Steps to Automating Windows NT Deployment
Step 1 - Build the Windows NT setup script file (UNATTEND.TXT). Start by creating a basic Windows NT setup script. You can do this by using one of the examples that are included or by using the Windows NT Setup Manager. Once you have created and tested your basic script, add the more advanced options of the Windows NT setup script.
Step 2 - Build pre-installation packages using the System Difference tool (SYSDIFF.EXE). Use the System Difference tool to automate pre-installation of applications during Windows NT setup.
Step 3 - Create process to configure machine-specific information. Create a Uniqueness Database (UDB) file or create machine specific setup script files for each computer. You have several options for building a setup process that includes configuring systems with machine-specific information without requiring user interaction during setup.
Step 4 - Build process to automate your distribution method. The final step is distributing the Windows NT source files and any other files to each computer. You can use a network distribution point, hard drive duplication, software distribution tools such as Microsoft Systems Management Server or a local device such as a CD-ROM. If you are installing Windows NT on a newly formatted hard drive you will need a boot disk to either access the network or possibly access a local device.
Building the Distribution Server Before beginning the process of automating Windows NT setup you must build a distribution server. In most cases the best distribution point is a network server. Make sure you have read, write, and change privileges on the network server you use.
Copy the Windows NT Source Files To build the distribution server, copy Windows NT source files from the Windows NT retail CD to your network server. For Intel and Intel compatible-based processors copy the I386 directory and all of its contents to your network server.
Copy Custom Files Using the $OEM$ Directory Windows NT setup includes a feature that can be used to automatically copy directories, standard MS-DOS 8.3 files, and any tools needed for your automated installation process, to the local hard drive during setup. It is based on a pre-defined directory name and structure. If you include this directory and structure in the root of your distribution point, the files and directories will be copied to your local hard drive during Windows NT setup. The pre-defined directory name is $OEM$. If Windows NT setup finds the $OEM$ directory in the root of the distribution point, it will copy all of the files found in this directory to the temporary directory created during the text mode portion of Windows NT..."

Final word: I'm going to side with the popular answer here, mainly because there's no mention of an .INF file anywhere in my sources. Of course, if the question that comes up mentions a .UDF file, I know that it's wrong, since there's no such thing.
Let's look at a few other questions, before my head explodes...

Q:"Peter Smith wants to install Windows NT Workstation without user in[ter]vention. He plans to do this by running winnt.exe with the /u switch. Which additional file must he use? (Choose one)
  • A Uniqueness database file (UDF).
  • B An unattended.txt file (answer file).
  • C A customized setup.sif file.
  • D A customized setup.inf file.
Answer: B " Correct.

Ibid: "Answer files are text files that provide the answers to some or all of the prompts that the end user would otherwise need to respond to during Setup. The answer file is specified with the /u option to the winnt or winnt32 command. "

"When Windows NT Workstation or Windows NT Server is installed using the winnt /u:answer_file or winnt32 /u:answer_file command, the options specified in the answer file (Unattend.txt) are applied to the installation. If the /udf:uniqueness_database_file option is also specified on the winnt or winnt32 command line, the entries in the specified uniqueness database file (UDF) are also applied, overriding entries in the answer file."

Q: How should you use an unattended.txt file (answer file) during the automated installation of a Windows NT Workstation on 100 identical new computers? (Choose one)
  • A To provide hardware-specific configuration information and other configuration data for the computers.
  • B To provide user account information, a unique computer name, and a unique identifier specific to each computer.
  • C To automate installation of applications on the computers during the installation of
  • WinNT WS.
  • D To place application specific registry data into the registry on each computer including serialization and registration data.
Answer: A
WRONG- What do YOU think?
Printing

Q:"How do you print to a TCP/IP printer?"
  • A. Host name and printer name
  • B. Hostname and IP address
  • C. Printer name and IP address
  • D. Printer name and Host name
Ans. C

Correct. "Logical printers are created to send documents to the TCP/IP printer through the Add Printer Wizard. This is done by using the IP address...and the name of the printer, as defined by the print server."

Q:"You have sent a job to a printer and it jams. You cannot resend the job to the printer, what do you do?
  • 1. Select resume from document menu?
  • 2. Select restart from document menu?
  • 3. Select cancel from document menu and then restart?
  • 4. Select refresh from view menu and then resume?
Q:"What do you do if a document is jammed in a printer and was too damaged to reprint?
A Restart from the document menu"

Correct. After pausing the document you restart it "Pause the printer if there is a problem with the print device...Resume printing when a non-operational print device is repaired MOC#803 Pg170

Q:"You want to send a document from your Windows NT workstation computer to a printer that is located on another Windows NT WS computer. You want to do this without permanently installing drivers for that printer on your hard disk. What should you do? (Choose one)
  • A Use "net print" to send the document to the printer.
  • B Drag and drop the document file onto the printer in Windows NT explorer.
  • C Use Windows NT Explorer to temporarily capture the printer, and then send the document to the printer.
  • D Use the Add Printer Wizard to temporarily connect to the printer, and then send the document to the printer.
Ans : B"
This one I'm going to say is wrong, and this is why: I haven't found a single instance of any mention of a "drag and drop". So I'm ruling out B. Instead, MOC and Exam Cram both suggest the Add Printer wizard.
"Client computers need access to print devices, so they must add the printer via the Add Printer Wizard. [emphasis mine] ...All that is needed for printing from an NT client is that the driver be installed on the print server. That's it!" Exam Cram Pg 257
From MOC:
"Clients running Window[s]NT 4.0 and Windows 95 use the Printers folder to connect to a shared network printer. When they first connect, the appropriate printer driver is automatically installed into client memory." It continues:" To connect to a printer: 1) In the Printers folder, double-click the Add Printer icon. The Add Printer Wizard appears..." [emphasis mine] MOC#803 Pg 152
A is wrong, because the net use command is used for "LAN Manager clients running MS-DOS or OS/2..." Ibid, Pg 153
C is wrong. Capture is a NetWare comand.

Permissions

From BDHeaven: "A number of questions on both times, I did well in this area the second time...they give you a grid (it was different on each test) Across the top columns are listed Share, Directory, and file On the side they listed various groups that our hero was a member and permissions that each group had for the share, the directory and the files. Then you asked to give the effective permission for the files.
For me I just keep on[e] rule in mind. Like permission groups are cumulative and different groups are most restrictive. So I went down the share column and determined the effective permission, same for the directory and then the file. So I'm thinking in terms of single permissions for each level. [F]rom there you['re] down to a much simpler question."

Q:Meng is a member of Webusers group and Webserver group. Webusers group has Change access to XX folder. Webserver group has read only access to XX. What are Meng's access rights to xx?
  • A. Change
  • B. Read Only
  • C. Full Controll
  • D. No Access
Ans : A (Rights are cumulative with highest one rewarded except for No Access of course)
Correct. "The permissions from all groups of which a user is a member are cumulative. This applies both to shares and objects. The most restrictive set of common permission between a share and an object are used." Exam cram pg 125

Q:You are the Administrator in a NT server domain of 10 NT Workstations and 20 [Windows]95 computers. You create a new sys[t]em policy that applies to all user[s] on the network. Some of the users have roaming profiles. Which setting will take precedence when there is a conflict?].
  • A. The roaming profile
  • B. The system policy.
  • C. The most permissive of system policy and roaming profile combined
  • D. The least permissive of system policy and roaming profile combined
Ans. B (Just remember Profiles < System Policy < Individual Policy < Machine Policy - Machine Pol overides all.)

Q:"When a system policy and users profiles have a conflict, what happens?"
  • a) user profiles have priority
  • b) system policy have priority
  • c) the least restrain with system policy and profiles
  • d) the most restrain with system policy and profiles
Answer: b

Apparently these two agree, but hours of researching this question have yielded no firm answer to confirm the above. Exam Cram offers nothing on system policies, and the MOC has a few words about how to set up account policies, but no cross-reference on the roaming profile. Further research is forthcoming...

Q:"Question on setting up 50 roaming profiles, ensuring the client keep the current profile? Difficult question, the options were;
  • a) copy all profiles to the PDC
  • b) create a default profile and enable repl
  • c) user user manager for domain to set roaming profiles
  • d) use a system policy to create a roaming profile for all users
Not sure of the answer - I went for a) - but have zero confidence it is right."

Was a multiple answer required? Here are the steps to create a roaming profile:
1. Copy the user's profile from the WS to a shared network path. This means copy the [WINNT Root]\Profiles\[USERNAME] directory and all of its contents.
2. Open Control Panel and double-click System.
3. Select the user's profile entry, select Copy To, and type in the full UNC path name to the server where the profile will reside.
4. In the User Profile dialog box [accessed through a user's account's Properties via User Manager by clicking the Profile button], enter the full UNC path name for the profile in the User Profile path field.