Read this whole guide offline with no ads, for a very low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Network+
 9  Appendix A: Answers to Success Questions and Real World Exam Questions
      9  Chapter 1010: Real World Exam Answers

Previous Topic/Section
Answers to Questions 86-90
Previous Page
Pages in Current Topic/Section
1
Next Page
Answers to Questions 96-100
Next Topic/Section

Answers to Questions 91-95

91. What two things are commonly known to cause adverse effects during an upgrade?

A. Faulty power supplies and space heaters

B. Outdated software drivers and DOS programs run on Windows 95/98

C. Cascaded hubs that cause large collision domains, and duplicate IP addresses

D. Different versions of application software and DLL files.

Explanation: While there are many possible obstacles when performing an upgrade, software, specifically device drivers and shared DLL files account for a majority of the problems.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.


 

92. Using NT, what is the UNC path for the subdirectory DOCS in the OFFICE directory on the file server NTSERVER?

A. \\DOCS\OFFICE\NTSERVER

B. \\NTSERVER\OFFICE\DOCS

C. \\NTSERV\OFFICE/DOCS

D. \\ntserver\office\docs

E. \\docs\office\ntserver

Explanation: UNC (Universal Naming Convention) paths are always constructed with the server (source) name, followed by each recursive subdirectory. UNC's are only case sensitive if POSIX is used, otherwise this UNC would work on a normal NT network

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.

& Domain 4.4: Given specific parameters, configure a client to connect to the following servers: UNIX/Linux, NetWare, Windows, Macintosh.


 

93. Profiles and policies are useful mostly as:

A. Automation tools

B. Security tools

C. Human Resource tools

D. Administration tools

Explanation: Profiles and policies assist administration of security measures from a central location.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.

& Domain 3.2: Identify the basic capabilities of client workstations (i.e., client connectivity, local security mechanisms, and authentication).

& Domain 4.4: Given specific parameters, configure a client to connect to the following servers: UNIX/Linux, NetWare, Windows, Macintosh. 4.11 given a network to allow sharing scenario involving a client connectivity problem (e.g., incorrect Protocol/client software/authentication configuration, or insufficient rights/permission), identify the cause the problem.


 

94. Which network type offers centralized administration?

A. Peer to peer

B. Client/Server

C. Domains

D. Workgroups

E. Unix

Explanation: Only a client/server environment offers true centralized administration. The other network types require or allow end users to establish sharing of local devices

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.

& Domain 3.2: Identify the basic capabilities of client workstations (i.e., client connectivity, local security mechanisms, and authentication).


 

95. Which of the following is a valid hidden share in Windows 9x?

A. M:\Hidden

B. M:\Hidden$

C. \\Shared\$MyPrivateStuff

D. \\Shared\myprivatestuff$

E. \\Shared\myprivatestuff$\hidden

Explanation: When setting up a hidden share, the $ is placed at the end of a folder name. From there on, the files and folders are hidden.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.

& Domain 3.2: Identify the basic capabilities of client workstations (i.e., client connectivity, local security mechanisms, and authentication).

& Domain 4.3: Given a troubleshooting scenario involving a remote connectivity problem (e.g., authentication failure, Protocol configuration, physical connectivity) identify the cause a problem.

& Domain 4.4: Given specific parameters, configure a client to connect to the following servers: UNIX/Linux, NetWare, Windows, Macintosh.


Previous Topic/Section
Answers to Questions 86-90
Previous Page
Pages in Current Topic/Section
1
Next Page
Answers to Questions 96-100
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.