1. how do you print to a tcp/ip printer?
! H+ o; M2 d6 `6 r! X* i: n2 F 8 a6 W2 [5 r0 P' m
a. host name and printer name
- C3 h! q* W- u4 l/ _, o5 p
% y, f9 j) X! _% hb. hostname and ip address
# O0 U# L( D" P5 f
# C# t7 x! }$ `3 _) sc. printer name and ip address 3 u6 N$ Z; ?1 `1 T
% z' J0 _6 f% w+ w; U- Td. printer name and host name 5 r f0 E$ c q
& B. k; z0 S }3 |
ans. c
4 ]( {6 w& J; H( f; |: J 8 p( B( X: [/ R
2. how do you trap packets of tcp/ip? 2 Q d" M, B" ]2 h- D
/ w/ F3 C% Z) J* {, a) w# V
a. network monitor $ }# B0 U6 H3 _
& C, t- c8 K5 X) ~b. snmp
- k7 g' o/ t: r$ \- |) z
* i: q* p: o; B0 J# f" S0 @# P, gc. tcp/ip - R) f7 l- ]; ]% ~1 A# S
6 y. J$ w8 O; V3 Y4 s0 r8 Q+ kd. streams monitoring
k! I4 G% T$ s# K1 G : U8 {( @) V5 g# x6 F
ans: b & x6 r- r; d1 {
! ^& y" @2 M$ t" `
2+. what protocol/service do you need to send tcp/ip trap messages to another computer?
+ U9 o5 [/ P# t+ y$ A( f3 U + l$ l( `; e: y9 A! F. ]+ `
a snmp
, l/ _/ t7 m* F! x* W ( w+ m( | N. D% x' z
b simple tcp/ip services 7 y) d2 A9 O6 g1 R+ q: Q
+ S1 \$ s+ |0 _! _( O+ Wc nwlink . s# v7 k: Y& W( {% I
1 t" Q$ ~. x" p& S
d network monitor agent
' |4 t# n% O) c2 Q
4 F. i3 ?, V; @/ Re dhcp
3 l2 d) O" f4 R# U" n, J9 P
0 j i+ q! {8 G( F: \answer: a (may refer to 15 and 33 and 50)
* a7 b2 M" \/ h$ O; m9 c/ s
8 K5 L& _: A; j0 z3. nt workstation is member of workgroup. you want to map network driver>. connect printer queues>5. nt workstation needs access nt server and netware server>or in the application log using event viewer $ V$ ^: J! @" l* Y( V; c9 D
c. examine the connection error in the system log using event viewer , i' e+ R1 B) s4 H) W j4 g+ Y
4 ?& Z* X" R6 x8 g, `3 |6 `9 _1 Dd. view the connection status using dial-up networking monitor.
+ L- m i2 i" { $ G0 l: G5 R D( B* }
ans: d (a)
6 Y* r" `$ X, `% I) r- k9 K2 Q
! k5 ?$ \, t$ {10. you want to enable auditing for the hp printer attached to your windows nt workstation computer. which type of auditing events should you enable in user manager on your workstation?
+ s( F: U \4 B$ l) }
9 u5 S5 {; c3 J+ A5 {" ]a. file and object access $ y% z _+ |6 S7 T' Q8 }
+ P+ n8 l* w2 t, |/ \b. use and user rights / T% Q1 F v8 E6 F
* X" \! S5 t; m3 y
c. user and group management
6 H6 O4 C" x9 a# Z! s5 V( r2 p
. }1 F# a3 o. W: G0 }: P( z, }8 K% vd. process tracking 3 W- \# X9 O8 s- D5 F
, j# w6 g" C$ G+ @' Y
ans: a |