Final Questions and Answers ARC - EWC CIS 82
Please verify ALL answers, and let me know if you differ or have a better answer.
* Indicates needs your attention -- tried to find but not found or need verifying.
| # | Question | Answer | Reference/
% Certainty |
| 1 | Dr. Watson for Windows NT is a kernel debugger. | F | 600.1 100% |
| "Dr. Watson for Windows NT is an application error debugger. It detects application errors, diagnoses the error, and logs the diagnostic information." | |||
| 2 | Kernel debugging requires a connectivity mechanism between the target and host computers. | T | 588.3.2,3
100% |
| "In order to properly use Kernel Debugger to view the kernel mode drivers and services loaded during a
Windows NT computer initialization, the following requirements must be met:
"· Two Windows NT-based computers: one running Kernel Debugger (host computer), and the other to be debugged (target computer). Both computers should be running the same version of Windows NT. "· A connectivity mechanism between the two computers. For example, they can be connected by a null modem cable or modem connection for remote dial-in." | |||
| 3 | The symbol file for the target computer must be available on the host computer before kernel debugging can be successful. | T | 590.3
100% |
| "Configuring Kernel Debugger on the host computer requires the following steps:
"· Copy the Kernel Debugger files and Windows NT symbols from the Windows NT compact disc to the host computer (the computer that will be running the Kernel Debugger software). . . . "A common problem in configuring the Kernel Debugger occurs if the wrong symbol files are used. A symbol gives the debugger the information it needs to decode errors. To avoid possible errors and misinterpretation of data, use symbols from the same version of Windows NT in which the computer was booted. Also use the correct symbols for the target computer.. . .. Copy the appropriate symbol files to the host computer to enable proper debugging of the target computer. " | |||
| 4 | What is CrashDump? | A utility that can capture the memory contents at the time of the stop screen. | 587.4 + 595.1 100% |
| "CrashDump is a utility that can capture the memory contents at the time of a stop screen." | |||
| 5 | Which utility performs a validity check on a kernel mode crash dump? | dumpchk | 597.1 100% |
| 6 | Which utility examines memory.dmp and extracts information, creating a text file from the information? | dumpexam | 599.2
100% |
| 7 | What reads the Master Boot Record during the Windows NT boot process? | The system BIOS. Proof: "When the hard disk is the startup disk, the system BIOS reads the Master Boot Recordand loads it into memory." | 562.2,2.1 Ch 7 Les 4 Identifying the Steps in a Successful Boot; Master Boot Record 100% |
| 8 | Which command can be used to verify which drivers are loaded? | boot.ini /sos | 574 100% |
| 9 | Which program in the boot sequence switches the processor to the 32-bit flat memory model? | Ntldr | 565.1 Ch 7 Less 4
100% |
| "Ntldr switches the processor to the 32-bit flat memory mode" | |||
| 10 | The Clone control set is copied to the LastKnownGood control set when a user is able to successfully log on. | T | 571.3,3.2 + 561
table.4 + 610 #5
100% |
| "After a successful logon attempt, the clone control set is copied to the LastKnownGood control set" | |||
| 11 | Device Drivers are loaded and initialized in the Kernel Phase of the boot process. | T | 568.1 + 561
table.3 + 571.7.1
100% |
| 12 | The Master Boot Record is usually operating system-dependent. | F
Proof: "The MBR is generally operating system independent." |
562 Note #2
100% |
| 13 | Which key is rebuilt every time the system is restarted? | HKEY_LOCAL_MACHINE\HARDWARE | 568.5
100% |
| 14
* |
Which subkey of HKEY_ LOCAL_MACHINE contains the identifier for which version of the ControlSets that contains the Last Known Good configuration? | HKEY_LOCAL_MACHINE\SYSTEM\Select | 567.7
85% |
| "At this point, the boot loader creates the control set it will use to initialize the computer. The value in the HKEY_LOCAL_MACHINE\SYSTEM\Select subkey determines which control set in HKEY_LOCAL_MACHINE\SYSTEM to use. The loader uses the control set identified by the Default value, unless it is using the Last Known Good Configuration. In this case, the value under LastKnownGood specifies the control set. Based on this selection and the value of the corresponding Select subkey, the loader determines which ControlSet00x to use. It sets the value of Current in the Select subkey to the number of the control set it will use." 567.7 | |||
| 15 | _______ provides a secure way to remotely administer and run command-line programs. | RCMD Remote Command Service (Rcmd.exe) | 544.5
100% |
| 16 | By creating an Emergency Repair Disk, all of the registry is backed up. | F | 541.4.4 + 576
table1.1
100% |
| "Any changes to the registry hives security and SAM are lost and these files are restored as they were at system install." | |||
| 17 | Regback and Regrest can be used to back up and restore registry entries while Windows NT is running. | T | 541.4.2 or
541.5.2
100% |
| 18 | Entries changed with Windows NT Registry Editor are subject to a syntax edit before they are saved to the Registry. | F
Proof: "If entries are changed with Registry Editor, syntax errors are not recognized" |
541.2,2.2
100% |
| 19 | What is the function of an IPC in a client/server environment supporting a distributed application? | IPC (Interprocess communications) in this role is a
connection mechanism which allows data to flow in
both directions between the client and server portions
of distributed applications in order to create
interaction between programs running on various
computers. (Belant)
or Allows Developers to create distributive applications, Application running on a desktop interact with other applications that may reside on remote computers. (Duke) |
525 table.1 +
525.IPC.1 +
526.1.2
100% |
| 20 | The redirector service and the server service are dependent on the ______________. | TDI (Transpoort driver interface) in the Kernal | 520 note & graphic + 521.2 + 522.3 100% |
| 21 | What is the name of the server service file system driver? | Srv.sys (Duke, Belant)
TDI (Duke) |
522.4,4.1 + 522.3.2 100% |
| 22 | MUP fields I/O requests that are destined for a file or device that has a universal naming convention. | T | 523.1,1.1
100% |
| 23 | The redirector resides above the Transport Driver Interface level and provides a computer with access to another. | T | 520 graphic +
521.1.1-521.2
100% |
| 24
* |
NDIS 4.0-compatible device drivers are compatible with Windows NT 4.0. | T
Note: NDIS = Network device interface specification |
517 note
80% |
| 25 | What method should you use to install Windows NT if you have a supported CD-ROM? | Standard setup method = installing directly from the compact disk. Installing directly from a CD or flopyy offers the best support for alternate HAL, timing, and third party drivers. | 506.2,3-506.3 90% |
| 26
* |
Why is a change management system important to implement to help solve problems in a Windows NT system? | Because companies' networks are mission critical where problems must be resolved quickly. | 507.2
80% |
| 27 | Why is it inefficient to use a trial-and-error approach in troubleshooting a Windows NT problem? | Using a methodical approach to track possible
approaches will help you more in the long run than a
trial-and-error approach because you learn more from
your first experience with a problem. (Belant)
or "Because, like COBOL or other programming, an architectural (hierarchical) top-down approach is best. Successful troubleshooting includes (1) discovery, (2) explaining, (3) tracking, (4) executing approach ot fix. (Duke) |
504.4.3
or 508 all 100% |
| 28 | TechNet contains a complete set of Microsoft Resource Kits. | T
Proof: "It contains a complete set of online Microsoft Resource Kits." |
502.1
100% |
| 29 | Windows NT will usually install correctly on a system with viruses, but these viruses must be removed before users are allowed to use the system. | F
Proof: "Windows NT will not install on a system infected by a virus." |
506.6,6.1
100% |
| 30 | When troubleshooting a Windows NT problem, it is often a good idea to verify that the hardware in question is on the Hardware Compatibility List. | T | 505.2 + 530.1.2 +
530.3,3.1
100% |
| 31 | Name two times when a DHCP lease renewal is attempted. | !. At every startup
2. At one-half lease life |
347.1 + 481
table.1
100% |
| 32
* |
When does DNS zone replication occur? | At addition of secondary server to the zone, and periodically (every 60 minutes by default) | 477 table.2 + 483
table.2 + 476.3 +
477.4
70% |
| 33 | Modifying the ReplicationGovenor parameter in the Registry can be used to control directory replication over the WAN. | T | 113.2,4 + 116 &
610 Ch 3 Les 4 Q
#4
and see question 35 below 100% |
| 34 | In a WAN environment, if there is more logon validation traffic than directory database synchronization traffic, a BDC should be placed across the WAN from the PDC and near the clients needing to log on. | T | 492.5,6
see # 48 below 100% |
| 35 | With respect to directory replication, what two Registry parameters can be set to control how often the originating server or export server checks for updates and how often an import computer contacts the export server? | 1. Interval
2. Pulse |
472.3.1,2
See #33 100% |
| 36a
* |
How does assigning users in the trusted domain to global groups, and then putting global groups from the trusted domain into local groups in the trusting domain limit the amount of traffic generated by importing trusted accounts when a new user needs to be given the rights and permissions assigned to the local group in the trusting domain? | Global accounts consume less bytes for a SID lookup if more than one lookup is required, and the more users that require SID lookups, so much the more this is an advantage, the difference growing. | 447.2
80% |
| 36b | What happens when the domain change log file fills and starts over-writing changes? | "A full synchronization takes place." or "the BDC will initiate a full synchronization." | 111.1 + Ch 3 Les 4 Q #2 100% |
| 37 | By default, the PDC sends the change announcement to _____ BDCs at the same time. | During each pulse, only a subset of only those BDCs that need the changes. The maximum number of BDCs to be announced to is 10. | 111.2 + 431.note
+ 431.4
100% |
| 38 | The PDC is the domain master browser. | T | 57 table.1
100% |
| 39 | Pass-through authentication occurs when a user from the trusting domain logs into the trusted domain. | T | 6.4 + 129-131
100% |
| 40
* |
A secure channel must be established before domain synchronization can occur. | T | 428.1,3 + 458
50% |
| 41
* |
How does increasing the client's local cache optimize Intranet Browsing? | The more cache available for quick downloading of web pages, the less web pages are forced deleted from cache to make room for newly arrived web pages, and thus needing to be retrieved again from slower method of reloading it from over the network.. | 419.3.3 |
| Optimizing Intranet Browsing Traffic
The most effective optimization of intranet browsing traffic is during the creation of Web pages because the majority of Web traffic is caused by the size of the files being copied across the network. Because intranet browsing can generate very significant amounts of network traffic, anything that can be done to reduce the traffic generated can be beneficial in the overall scheme of network usage. . . . Increase the client's local cache. When browsing an intranet, pages are downloaded to the client, and placed in a directory called the cache. When the designated amount of disk space for the cache is used, and more files are required, the cache must be emptied (deleted). Thus, a previously loaded file must be copied over the network again, instead of loading it from the local hard disk cache. | |||
| 42 | What is an anonymous connection to a system running Internet Information Server? | When anonymous connections are alllowed, Windows NT uses user name and password configured for the service to make the anonymous connecitons instead of using username and password client request. | 212.3 |
| 43 | What happens when a DNS server receives a request to resolve microsoft.com to an IP address, and the DNS server has a record of the corresponding IP address? | It issues a response frame that includes the IP address of the host name in question. | 405.5 (last sentence on page) |
| 44 | Getting a share list from a server can occur only after the client has located a backup browser. | T | 395.2
See #45 100% |
| 45 | A client must first locate a backup browser before it can obtain a browse list. | T | 395.2
See #44 100% |
| 46 | DNS recursion begins with the local DNS server contacting its recursion partner. | T | 406.3
80% |
| 47 | In general it is recommended that there be one domain controller for every _____ user accounts. | 2000 | 39.2
100% |
| 48 | What is the disadvantage of placing a BDC across a slow WAN link to support remote NetLogon traffic? | Provides slower logon validation services, among other disadvantages. (It is not the only disadvantage mentioned in the text, contrary to what question implies.) | 383.4 + 492.6
100% |
| 49 | How does removing excess protocols optimize file session traffic? | "The browsing process operates separately on each installed and bound protocol." . . . thereby causing less traffic on the network and therefore speeding up the network. | 459.2
100% |
| 50 | How does increasing the length of time a NetBIOS name stays in NetBIOS name cache optimize WINS performance? | Would require fewer resolution attempts for frequently used names. | 361.1,2
100% |
| 51 | When is an automatic IP address renewal issued? | 1. At ½ point of lease duration period
2. At every startup |
347.1
See #31 100% |
| 52
* |
Once a logon domain controller is located, a session must be established between the client and the server before validation can take place. | T | 376 + Ch 6 Les 2
Analyzing Logon
Traffic 377-381
90% |
| 53
* |
The best performance for a server that has the single function of domain controller is obtained when the Server service is configured for Maximize Throughput for Network Applications. | T
By the way, domain controllers are not member servers. NT servers may or may not be domain controllers or member servers.. "domain server" = often "domain controller" 310.1,3 Domain servers transfer data with other servers mostly without user initiation and validate user logon requests. 310.2 There are three types of |
? See #64 +
316.3.3 + 316
Table 4 +
317.summary.1 +
see 315 note
50% |
| "To configure the server service for a particular type of server, use the Server option under Services in
the Network program in Control Panel.
· For an application server, click Maximize Throughput for Network Applications. · For a file and print server, click Maximize Throughput for File Sharing. · For a domain server, click Maximize Throughput for Network Applications. " | |||
| 54 | Establishing a file session requires establishing a TCP Session and then a NetBIOS Session. | T | 366.3 + 367.1,3 +
Chp 6 Les 2
Analyzing File
Session Traffic
100% |
| 55 | DHCP lease acquisition requires four frames, and all frames are broadcast frames. | T | 345.2,3,4 + 354 + 350-353 (Lab) + 343-345 100% |
| 56 | _________ frames are delivered to a portion of the hosts on the network. | Multicast | 324.4
100% |
| 57* | What is the difference between the Network Monitor application and the Network Monitor Agent? | Network Monitor "displays network statistics,
captures and displays data, and allows the saving of
captured date."
Network Monitor Agent captures "all network traffic, as well as provide the Network Segment object for Performance Monitor" and "also has the ability to capture network traffic on a remote subnet." |
See #85 + 329
90% |
| 58
* |
What is the disadvantage of having routers forward all broadcast traffic? | Creates additional network traffic which slows networks down. | Outline on CD Chapter 4 Lesson 2, page 75 + 66.5,6 + 181 + 324 + 2211224 + 229 100% |
| UDP Port 137 (NetBIOS Name Service Broadcasts)
Not all WANs will have problems browsing. Some routers can be configured to forward specific types of broadcasts and filter out others. All NetBIOS over TCP/IP (NetBT) broadcasts are sent to the UDP port 137, which is defined as the NetBT Name Service. This usage is defined by Request for Comment (RFC) 1001 and 1002. Routers normally filter out these frames because they are sent to the hardware and subnet broadcast addresses. However, some routers allow all frames sent to this particular UDP port which is used only by NetBT to be forwarded. As a result, the browser looks as if it is on one, big, network segment. All domains and computers within the network segments are seen by all computers, including Windows for Workgroups computers. p. 66.5,6 B. Why Use WINS? 1. Drawbacks of Existing Name Resolution Methods (a) Broadcasts 1) Using broadcasts to resolve NetBIOS names to IP addresses causes significant traffic on the network. 2) The larger the network, the more broadcasts. 3) If only broadcasts are used to resolve NetBIOS Names to IP addresses, routers must forward broadcasts, thus further increasing network traffic Outline on CD Chapter 4 Lesson 2, page 75 | |||
| 59 | Broadcasts are sent with a unique destination address of FFFFFFFFFFFF. | T | 324.3 + 345.2,3,4
100% |
| 60
* |
When the data portion of a frame contains protocol-specific information, the protocol-specific information is considered to be encapsulated. | T | 326 + Chp 6 Les
1 Examining
Network Frames
???-% |
| 61
* |
The NDIS 4.0 network adapter must be placed in promiscuous mode in order to capture network traffic using Network Monitor. | T | 329 bottom + Chap 6 Lesson 1 Installing Network Monitor + 326 80% |
| 62
* |
How much RAM memory is recommended for a server that has a Security Accounts Manager database of 20 MB? | 1. 50 MB if follow first bullet on page 384
- OR - 2. 64 MB if follow table.4 on page 384 |
384 first bullet +
384 table.4
50% |
| 63
* |
Name two types of operations that must be considered when evaluating performance of a domain controller. | 1. Validating user logon requests
2. Maintaining the user accounts database (385 note) OR 1. concurrent logons 2. invalid logon requests etc. (311 table.all) |
385 note
See #62 + #66 90% |
| "For large domain operations, do not use the domain controller for anything other than normal domain controller activities, such as validating user logon requests and maintaining the user accounts database." | |||
| 64
* |
What is the effect of setting server performance to Maximize Throughput for File Sharing? | Current response time does not proved best performance by domain controller, so the effect of this setting is to increase performance. | ? See # 53: + 315
+ 383
80% |
| 65 | Adjusting user expectations to be more in line with the performance being experienced is one way to remedy response time problems. | T | ?499-508 |
| 66
* |
The maximum size of the directory database is 40 MB. | T
(directory database = directory services database) SAM is a subset of the directory database. Therefore, how could the recommendation say that the maximum size of the directory database and also SAM is 40 MB? (See conflicting references below.) |
315.1.2 + 384.2.2
See # 63 + #62 90% |
| "The recommendation for the number of users in a domain is dependent on the following: . . . The
maximum size of the directory database is 40 MB. The SAM is the largest of the three items that make up
the directory database." p. 315.1.2
| |||
| 67 | Domain account synchronization will take, on average, 1 KB per change if multiple changes are propagated. | T | 312.5
100% |
| "Domain account synchronization will take, on average, 1 KB per change if multiple changes are propagated, and as much as 4 KB for a single change." | |||
| 68 | What can be done to improve application server performance if applications are network- intensive and the network is determined to be the bottleneck? | 1. add more servers
2. improve hardware 3. Upgrade router |
286.1.1-4
90% |
| 69a
* |
What can you do to improve applications server performance if the CPU is determined to be a bottleneck and applications are multi-threaded? | Add multiple processors | 305.4 + 307.2 +
See # 71
90% |
| 69b | Which two resources are usually the more frequently utilized resources for an applications server? | 1. Processor
2. Memory |
302.2 + 303
graphic + 304.1 +
309 Summary.2
100% |
| 70 | If an application is memory-intensive and memory is determined to be the bottleneck, adding RAM should help improve application performance. | T | 306.2,3
See #41 100% |
| 71 | If the processor is determined to be the bottleneck, and the applications are singlethreaded, adding an additional processor will have little or no effect on the bottleneck. | T | 305 table.4,5 +
307.2,3
100% |
| 72 | The processor uses secondary cache for read-ahead access to RAM. | T | 306.3
100% |
| 73 | What can be said about overall performance [of your computer] if your network card is slow? | Overall performance is affected in that the "data transfer is not effectively performed from the physical network medium to RAM." | 296.3
100% |
| 74
* |
What kind of disk controller can help alleviate an overloaded processor? | Disk controllers that do not involve the processor
-- OR -- A faster controller with more on-board cache such as an upgrade to a faster SCSI or even a PCI. |
?238 "types &
number of
controllers"
+239.1 +
284.1,1.2 +
Outline 104.2.b.2
100% |
| 2. Resource Implications in the File and Print Server Environment
A. Memory Implications 1. Having enough RAM for caching helps improve server performance. 2. More memory is usually better. B. Processor Implications 1. All network connection traffic involves the processor. 2. Busmastering network adapters and disk controllers that do not involve the processor help alleviate the load on the processor, thus allowing the processor more time for data requests. Outline, Chapter 5, Lesson 4, Page 104 | |||
| 75
* |
What is a cache hit? | A data request that's fulfilled from cache. | 296.4 See # 89
60% Webopedia cache "cache his" + Outline p. 106 |
| "Having Internet Information Server (IIS) requests fulfilled from the cache (that is, from cache hits) is the
best way to optimize for maximum performance." 296.4
A. Performance Monitor counters and the workload units they represent: 9. Cache: Copy Read Hits %--Percentage usage of cache. This number should be high. p. 303, Outline Chp 5 Lesson 4 p. 106
| |||
| 76
* |
Disk subsystem speed is the most important factor in improving performance for a file and print server. | F | 295.3 & graphic
100% |
| "Memory and processor use has the greatest impact on file and print servers. 295.3
| |||
| 77 | What is the difference between % Privileged Time and % User Time? | Get from cite:
1. %Privileged Time : measures the time the processor spends performing operating system services 2. %User Time: this measures the time the processor spends performing user services, such as running a word processor |
280.2.2,3 + 281
table.2,3
100% |
| 78 | Briefly describe what is meant by a system bottleneck. | "The part of the system that is currently restricting work flow." | 275 bullets + 276.1 |
| 79
* |
Usually, the best thing you can do to improve server performance is to increase the speed of the processor. | F
Instead, add memory, not processor power. |
277.1
99% |
| "The best thing you can do to improve server performance is to add more memory. . . . The most common
resource bottleneck within Windows NT Server is memory - specifically RAM. Typically, if only one thing
is done to improve performance in a server, it should be the addition of memory." 277.1
| |||
| 80
* |
If the pages/sec counter for memory is consistently over 15, then memory is likely a system bottleneck. | T
(T per 278.2,3,3.1, but perhaps F per 279 table.1) |
278.2,3,3.1 60%
279 table.1 |
| 81
* |
When Network Monitor agent is added through Network Services in Control Panel, the Network Segment counters are added for monitoring in Performance Monitor. | T | 285 note - read reference for yourself. Unclear. 60% |
| 82
* |
Kernel operations in the operating system use non-paged RAM. | T | 278.3.4 + 277.4
70% |
| 83 | What are the four major server resources that should be monitored when evaluating server performance? | Memory, processor, disk subsystem, network subsystem | 276.3 + 237.3 +
not 264.7
100% |
| 84
* |
What command must be entered before disk performance can be measured when the disks to be monitored are RAID disks? | Diskperf -ye | 266.2
90% |
| 85 | What tool is provided with Windows NT 4.0 to automate collection of server analysis data? | Windows NT Performance Monitor "at" command
(NOT Performance Monitor Service utilities p. 266.6 because is on Windows NT Resource Kit which is not provided with Windows NT.) |
264.1,3
100% |
| 86 | Centralized performance monitoring is effective when monitoring hundreds of servers simultaneously. | F
(because maximum 25 suggested) |
264.2 + 254 note
100% |
| 87 | When appending one log file to another, bookmarks are automatically inserted to mark the start of each appended log. | T | 266.4
100% |
| 88 | Performance Monitor log file statistics are more accurate when the performance log file is created on the system being monitored. | F | 254.1
100% |
| 89 | What is disk caching? | "The Windows NT disk cache manager uses available RAM for disk caching to improve performance." Therefore, disk caching uses RAM (memory), not disk (storage). | 624 question #2 (Chapter 5/ Lesson4: Analyzing File and Print Performance) |
| Same as memory caching except uses conventional main memory instead of high-speed SRAM. The most recently accessed data from the disk and adjacent sectors is stored in a memory buffer. Programs first check disk cache to see if data is there before resorting to getting the data from disk. | Webopedia: cache | ||
| 90 | What is a baseline? | A measurement of data collection that indicates how individual system resources, a collection of system resources, or the system as a whole, is being used. | 264.4 |
| 91 | List and briefly explain two of the four performance monitor views. | 1. A chart displays the value of the counter over time.
2. A report shows the value of the counter. 3. In the alert view, alerts are set on a counter. This causes an event to be displayed when the counter attains a specified value. 4. In the Log view, the counters are recorded on disk for future analysis. Log files are fed back into Performance Monitor to create charts, reports, or alerts. |
247.4-7 Chp 5 Lesson 1 |
| 92
* |
When you set a shorter Update Interval for Performance Monitor, you increase the overhead of Performance Monitor. | T | 266.3 |
| 93 | An instantaneous counter displays the most recent measure of a counter. | T
Proof: "Instantaneous counters display the most recent measurement" |
246.6
100% |
| 94a
* |
Alerts cannot be set on two conditions of the same counter for the same instance. | T | 251 note
100% |
| 94b | What protocol is supplied by Windows NT to provide for secure communications over the Internet using RAS? | PPTP | Midterm # 100
224.4.4 100% |
| 95 | DSMN extends Windows NT Server Directory Service features to NetWare servers. | T (Directory Service Manager for NetWare) | Midterm # 90
218.2 100% |
| 96 | For a client to use the services of a DNS server, the client must be configured with the IP address of the DNS server. | T | Midterm # 80
196.1 100% |
| 97 | DNS resolves Internet names to IP addresses. | T | Midterm # 78
195 table.2 100% |
| 98
* |
You can implement LMHOSTS files on all clients instead of DNS and it will accomplish the same thing. | F
LMHOSTS resolves computer name to IP address DNS resolves internet (host) name to IP address. |
Glossary
60% |
| host name The name of a device on a network. For a device on a Windows or Windows NT network, this
can be the same as the computer name, but it may not be. The host name must be in the host table or be
known by a DNS server for that host to be found by another computer attempting to communicate with it.
See also Domain Name System (DNS); host table.
HOSTS file A local text file in the same format as the 4.3 Berkeley Software Distribution (BSD) UNIX \etc\hosts file. This file maps host names to IP addresses. In Windows NT, this file is stored in the \systemroot\System32\Drivers\Etc directory. See also IP address. host table The HOSTS and LMHOSTS files, which contain mappings of known IP addresses mapped to host names. LMHOSTS file A local text file that maps IP addresses to the computer names of Windows NT networking computers outside the local subnet. In Windows NT, this file is stored in the \systemroot \System32\Drivers\Etc directory. See also IP address; subnet. A-type resource record A line (record) in a computer's Domain Name System database that maps a computer's domain name (host name) to an IP address in a DNS zone. broadcast name resolution A mechanism defined in RFC 1001/1002 that uses broadcasts to resolve names to IP addresses through a process of registration, resolution, and name release. See also broadcast datagram; IP address. caching In DNS name resolution, caching refers to a local cache where information about the DNS domain name space is kept. Whenever a resolver request arrives, the local name server checks both its static information and the cache for the name to IP address mapping. See also Domain Name System (DNS); IP address; mapping. Domain Name System (DNS) Sometimes referred to as the BIND service in BSD UNIX, DNS offers a static, hierarchical name service for TCP/IP hosts. The network administrator configures the DNS with a list of host names and IP addresses, allowing users of workstations configured to query the DNS to specify remote systems by host names rather than IP addresses. For example, a workstation configured to use DNS name resolution could use the command ping remotehost rather than ping 172.16.16.235 if the mapping for the system named remotehost was contained in the DNS database. DNS domains should not be confused with Windows NT networking domains. See also IP address; ping. IP address Used to identify a node on a network and to specify routing information. Each node on the network must be assigned a unique IP address, which is made up of the network ID, plus a unique host ID assigned by the network administrator. This address is typically represented in dotted-decimal notation, with the decimal value of each octet separated by a period (for example, 138.57.7.27). In Windows NT, the IP address can be configured statically on the client or configured dynamically through DHCP. See also Dynamic Host Configuration Protocol (DHCP); node; octet. | |||
| 99
* |
DNS must be updated manually. | T | ??682 Domain + 322 + 195-197 + 407 + 412-414 + Glossary Midterm #77 |
| 100 | How is a Pull Partner different from a Push Partner in WINS replication? | Pull Partner requests new WINS database entries from
push partner.
Push Partner sends copy of its new WINS database entries when requested to pull partner |
Midterm # 75
184.3.1,2 Ch4 Les2 Q#7 |