• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back
If your NT network uses NetBIOS as the primary protocol what Microsoft Service
should you implement to achieve the best resolution performance?
WINs. Used to match netbios names with ip addresses
Whats the difference between multicast and broadcast?
Broadcast packet headers dont have specific destination addresses.
What is the format for statically mapping a MAC to an IP address?
arp -s IP MAC
Which of the following uses computer names as addresses?
A. DHCP
B. NetBIOS
C. LHOSTS
D. IPX
E. All choices are accurate
B.NetBios
11. What are common items that must be configured correctly when installing a Network
Interface Card (NIC)?
A. PCI or ISA slot
B. IRQ setting
C. DMA Address
D. Driver
E. I/ O Address
11. What are common items that must be configured correctly when installing a Network
Interface Card (NIC)?
A. PCI or ISA slot
*B. IRQ setting
*C. DMA Address
*D. Driver
*E. I/ O Address
Explanation: The IRQ, DMA, and I/ O Address resources of the NIC must be configured
as to not conflict with existing devices. The driver is responsible for controlling the NIC,
and must be properly installed and configured. In these Plug and Play days, not all this
may be obvious.
12. Name two driver interfaces that allow a NIC to communicate on more than one
protocol.
A. NDIS
B. NetBEUI
C. NetBIOS
D. ODI
E. UNIX
12. Name two driver interfaces that allow a NIC to communicate on more than one
protocol.
*A. NDIS
B. NetBEUI
C. NetBIOS
*D. ODI
E. UNIX
Explanation: Network Driver Interface Specification (NDIS), developed by Microsoft
and 3Com, is the standard for Windows NT/ 2K/ XP, 95/ 98, OS/ 2, and Windows for
Workgroups.
Open Data Link Interface (ODI) was jointly developed by Apple computers and Novell,
and is the standard for all NetWare and AppleTalk systems.
What are the charactaristics of the Different RAID configurations?
beats me...
Which RAID level offers best performance?
0
Which RAID level offers best fault tolerance?
5
20. How many network segments can a single DHCP server provide services to?

Houser, Tcat. ExamWise CompTIA Network+ Certification (Exam N10-002).
Friendswood, TX, USA: TotalRecall Publications, 2002. p 284.
http://site.ebrary.com/lib/byuprovo/Doc?id=10026410&ppg=300

Copyright © 2002. TotalRecall Publications. All rights reserved.
One
25. Your customer has a number of salespeople that need access to the company
inventory files. The data is accessed through a spreadsheet program that is loaded on
each their laptops. Which is the best remote access method to deploy?
A. Remote Wizard
B. Remote Node
C. VPN

Houser, Tcat. ExamWise CompTIA Network+ Certification (Exam N10-002).
Friendswood, TX, USA: TotalRecall Publications, 2002. p 290.
http://site.ebrary.com/lib/byuprovo/Doc?id=10026410&ppg=306

Copyright © 2002. TotalRecall Publications. All rights reserved.
Explanation: Remote Node fits this situation best since the spreadsheet program is
located on each of the laptops. Also, a dial-up connection would be simple to install and
configure and would provide good transfer speeds.

Houser, Tcat. ExamWise CompTIA Network+ Certification (Exam N10-002).
Friendswood, TX, USA: TotalRecall Publications, 2002. p 290.
http://site.ebrary.com/lib/byuprovo/Doc?id=10026410&ppg=306

Copyright © 2002. TotalRecall Publications. All rights reserved.
27. How many users can share the same user name on a network?
A. Depends on the number of licensed connections are owned
B. As many as you need, as long as only one person is logged in.
C. Only one, each person must have a unique user name on the network
D. Two, as long as each one has a unique password

Houser, Tcat. ExamWise CompTIA Network+ Certification (Exam N10-002).
Friendswood, TX, USA: TotalRecall Publications, 2002. p 292.
http://site.ebrary.com/lib/byuprovo/Doc?id=10026410&ppg=308

Copyright © 2002. TotalRecall Publications. All rights reserved.
c. only one

Explanation: Each PC on a network that uses NetBIOS (which includes most Windows
based networks) requires that each one be given a unique name.
As a safe guard, the admin should always do what with user accounts?
create a super-user with admin rights.
32. You are logging into a Windows NT Server Domain from a Windows 95 system.
What security model provides the best control over shared resources?
A. User-level security
B. Share-level security
C. User names and passwords
D. Windows NT

Houser, Tcat. ExamWise CompTIA Network+ Certification (Exam N10-002).
Friendswood, TX, USA: TotalRecall Publications, 2002. p 296.
http://site.ebrary.com/lib/byuprovo/Doc?id=10026410&ppg=312

Copyright © 2002. TotalRecall Publications. All rights reserved.
A. User-level security

Explanation: User level security relies on a Security Provider, such as an NT or NetWare
server, since these devices usually deploy a more robust security structure. To provide
the most effective security, all critical resources should be shared from Windows NT
Server computers and should be granted User-level security access.

Houser, Tcat. ExamWise CompTIA Network+ Certification (Exam N10-002).
Friendswood, TX, USA: TotalRecall Publications, 2002. p 296.
http://site.ebrary.com/lib/byuprovo/Doc?id=10026410&ppg=312

Copyright © 2002. TotalRecall Publications. All rights reserved.
34. User-level security requires:
A. Administrator control for the directories to be shared
B. Share-level security to be implemented first
C. A dollar sign to be appended to each shared directory name
D. A security provider service
D. A security provider service
Access types for Share-level security consist of...
Read-only, full, depends on password
Access types for printers use Share-level security consist of...
Access or no Access
What 2 items are necessary to create new users on the network?
admin account, knowledge of company's SOP
before you make changes to a workstation, what hardware settings should you document?
The NICs IRQ, I/ O address, and software driver
before you make changes to a workstation, what DOS settings should you document?
Printer captures and Batch file settings
What is the Capture command used for?
Novell Netware to attach printers to print queues
50. Which adapter chipset is most commonly emulated by manufacturers, and drivers for
which are a good choice when supplied NIC drivers fail?
NE2000
what NOS allows trust relationships? (not including win 2k)
windows NT
what NOS allows global access through a single logon? (before win 2k)
NetWare
What does a hidden share look like in win 9x?
\\shared\myprivatestuff\hidden$
What is the format for mampping a drive in NetWare?
Map M:=SYS\Directory
77. You have sent an e-mail message to them@ somewhere. au. Your e-mail address is
myself@ mymail. com. In what order are the domain names resolved?
A. .com, .au, somewhere. au, mymail. com
B. mymail. com, .com, .au, somewhere. au
C. .com, mymail, au, somewhere. au
D. somewhere. au, mymail. com, .com, .au,
E. Domain names are not resolved. They are scheduled
b.mymail. com, .com, .au, somewhere. au

a bogus question, but might be on the exam
what types of backups clear the archive bit?
Incremental and full
how do you configure a NIC in linux? what command to you use?
IFCONFIG
What protocol is used to sign on and off some DSL connections?
PPoE (PPP over Ethernet)
study pictures of different connectors
did you do it?????
How often should tapes be replaced
6 months to a year