Sie sind auf Seite 1von 4

25 Network+ Exam N10-003 Practice Test Questions

01. Which network topology would require the MOST cable?

(A) The star topology

(B) The ring topology

(C) The bus topology

(D) The full-mesh topology

02. Which network topology has the LEAST physical connections per host?

(A) The star topology

(B) The ring topology

(C) The bus topology

(D) The full-mesh topology

03. Which of the following supports the longest transmission distance?

(A) 1000Base-SX

(B) 10GBase-ER

(C) 10GBase-LR

(D) 10GBase-SR

04. Which permissions does Mac OS X Server 10.3 use by default for shared files and folder
permissions ?

(A) No permissions

(B) NTFS permissions

(C) MAC OS permissions

(D) Standard UNIX permissions

05. Which of the following allows Novell workstations to access files and printers hosted on a
Windows NT server ?

(A) Gateway Services for NetWare (GSNW)

(B) Client Services for NetWare (CSNW)

(C) File and Print Services for NetWare (FPNW)

(D) Client for Microsoft Networks (CMN)

06. When a file is shared on a Windows 2000 Professional computer, how many concurrent
connections can be made to the share ?

(A) 1

(B) 5

(C) 10

(D) 20

07. Which of the following allows a Windows workstation to access file and printer resources on a
Linux server ?

(A) NFS

(B) SMB

(C) DHCP
(D) LDAP

08. Which of the following statements regarding UNIX is FALSE?

(A) UNIX servers use primarily Internet standard protocols, such as TCP/IP, FTP, HTTP, and LPR

(B) UNIX can use Lightweight Directory Access Protocol (LDAP) or Kerberos for authentication

(C) In UNIX, every file has a set of permission bits that defines which users has access to the file, and the
type of access those users have

(D) DNS allows Windows workstations to access UNIX servers

09. A VLAN (Virtual Local Area Network) can be used to ______.?

(A) reduce broadcast traffic on a network

(B) protect hosts on a private network from hosts on a public network

(C) restrict network bandwidth usage

(D) reduce Internet traffic

10. Which of the following statements BEST describes an intranet?

(A) A public network that is available and accessible to the public

(B) A private network that supports Internet applications and that does not use the public
telecommunications system to connect users

(C) A private network that supports Internet applications, uses the public telecommunications system,
and has limited access to the public

(D) A network in which data packets sent over the Internet and are encapsulated in a protocol that
provides for data encapsulation and encryption of the user data

11. ______ allows data sharing with external but authorized users?

(A) The Internet

(B) An intranet

(C) An extranet

(D) All of the above

12. Which of the following would be the primary firewall to protect from e-mail viruses ?

(A) E-mail servers

(B) Antivirus software

(C) SMTP

(D) IMAP4

13. Files with which of the following file extensions CANNOT be infected by a virus?

(A) .txt

(B) .com

(C) .dll

(D) .exe

14. Which of the following fault tolerance implementations is the MOST expensive?

(A) A hot site

(B) A cold site

(C) A warm site

(D) Failover clusters


15. Which one of the following disk fault tolerance mechanisms consists of two disks and a single
controller ?

(A) Disk duplexing

(B) Disk mirroring

(C) Disk striping

(D) Disk imaging

16. Which one of the following disk fault tolerance mechanisms consists of two disks and two
controllers ?

(A) Disk duplexing

(B) Disk mirroring

(C) Disk striping

(D) Disk imaging

17. Which of the following provides the MOST protection for electrical equipment?

(A) Surge protectors

(B) Standby Power Supply (SPS)

(C) Uninterruptible Power Supply (UPS)

(D) Line Conditioner

18. Which of the following provides the LEAST protection for electrical equipment?

(A) Surge protectors

(B) Standby Power Supply (SPS)

(C) Uninterruptible Power Supply (UPS)

(D) Line Conditioner

19. What is the minimum number of disk required for RAID 10?

(A) 2

(B) 3

(C) 4

(D) 5

20. Which of the following statements BEST describes a warm site?

(A) A remote site that contains a redundant copy of every computer system and every bit of data that is
in the active network

(B) A remote site rely that has no fault tolerance but relies on back ups for data recovery

(C) A remote site that contains a redundant copy of the critical system and data that is in the active
network

(D) A redundant copy of a device that becomes active when the active device fails
21. When a break in the cable of a token ring network occurs, ______.?

(A) the network will revert to a token bus network

(B) the nodes downstream from the break will have no network connectivity

(C) the nodes upstream from the break will have no network connectivity

(D) the network will collapse


22. Which of the following workstations will be affected when a SINGLE link on a full-mesh network
fails ?
(A) The workstations directly connected to the failed link

(B) The workstations downstream from the failed link

(C) The workstations upstream from the failed link

(D) All the workstations on the network

(E) None of the workstations


23. Which of the following requires a splitter?

(A) An analogue Modem

(B) An ISDN Modem

(C) A Cable Modem

(D) A T1 line
24. Which of the following provides name resolution on the Internet?

(A) DHCP (Dynamic Host Configuration Protocol)

(B) DNS (Domain Name Service)

(C) WINS (Windows Internet Name Service)

(D) NAT (Network Address Translation)


25. SMTP is identified by which of the following well-known TCP/IP port ports?

(A) 21

(B) 23

(C) 25

(D) 110

Das könnte Ihnen auch gefallen