Read this whole guide offline with no ads, for a very low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Network+
 9  Appendix A: Answers to Success Questions and Real World Exam Questions
      9  Chapter 1010: Real World Exam Answers

Previous Topic/Section
Answers to Questions 91-95
Previous Page
Pages in Current Topic/Section
1
Next Page
Answers to Questions 101-105
Next Topic/Section

Answers to Questions 96-100

96. What advantages does UNC naming offer?

A. Provides faster searches for applications

B. Uses a common syntax between multiple network platforms

C. Does not require a dedicated drive letter

D. Are easier to administer

E. Saves drive space over drive letter mapping

Explanation: UNC is becoming a common standard so it is likely to be used across many different NOSes. One of the reasons it is gaining acceptance is its lack of reliance on a unique drive letter for each mapping.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.

& Domain 3.2: Identify the basic capabilities of client workstations (i.e., client connectivity, local security mechanisms, and authentication).


 

97. What purposes do login scripts provide?

A. Centralized management of connected resources

B. Verifies user names and passwords

C. Aids in system administration

D. Prevents users from booting from their floppy drive

E. Helps to maintain user desktop environments

Explanation: Login scripts are useful to re-establish common network settings when a user logs in. These scripts are simple text files that replicate and automate commands that would otherwise need to be entered at the command prompt level every time a user connected to the network.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.

& Domain 3.2: Identify the basic capabilities of client workstations (i.e., client connectivity, local security mechanisms, and authentication).


 

98. Netware natively supports which protocols?

A. IPX

B. TCP/IP

C. AppleTalk

D. NetBEUI

E. XNS

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.


 

99. Which of the following security scenarios is the most restrictive?

A. Share level access

B. User level access

C. Lock and drop

D. FAT 32 security

E. None of the above

Explanation: User level offers the most security because you can designate who can access what resources, and at what level they can access those resources. Share level involves sharing data indiscriminately, and is therefore less secure. There is no such thing as Lock and drop, and FAT 32 is a file system where share level access resides.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.


 

100. You are required to create a Netware network. You have 10 Windows 95 workstations and 4 UNIX-based workstations. What should you install on the Windows 95 systems, and the Netware server, that will allow them to communicate with one another?

A. Novell Client for Microsoft Windows systems

B. Novell Client for Windows

C. Microsoft Client for Novell Netware

D. Novell Install Suite

E. File and Print Sharing for Windows

Explanation: These two programs allow the two to "talk" to each other's respective system.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh.

& Domain 3.2: Identify the basic capabilities of client workstations (i.e., client connectivity, local security mechanisms, and authentication).


Previous Topic/Section
Answers to Questions 91-95
Previous Page
Pages in Current Topic/Section
1
Next Page
Answers to Questions 101-105
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.