SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. AC means...
Proxy Server
VPN (Virtual Private Network)
Alternating Current
6
2. What is BGMP?
ICMP (Internet Control Message Protocol)
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Wireless Fidelity
3. SMB Means...
Point-to-Point Tunneling Protocol
Server Message Block OR Small-to-Midsize Business
CSU / DSU (Channel Service Unit / Data Service Unit)
443
4. Which of the following options allows for secure communication over the Internet?
VPN (Virtual Private Network)
An old microwave oven is being used in the break room which causes interference with the access point.
Wireless Protected Access
gateway.
5. What is on Ports 135-139?
They are connected to a switch when trying to capture packets.
NetBios
Open Source Path First - this is a routing protocol
Public Switched Telephone Network
6. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Check the connection from the WAP (Wireless Access Point) to the network
In the LAN (Local Area Network)
Disk Operating System or Denial of Service
389
7. Physical Topology
Wireless Protected Access
100BASE-FX Answer: D
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
8. On what Port is Sys Log/ Event Manager?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
SSH
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
514
9. Telephony Server
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
In the LAN (Local Area Network)
Point-to-Point Protocol
10. GPS means...
550 meters (1 -804.46 feet)
Point to Point Protocol
Global Positioning System
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
11. On what Port is IMAP?
Hypertext Markup Language
143
Light Emitting Diode
161 & 162
12. LED Means...
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
2
POP3
Light Emitting Diode
13. When one connection to a host fails in a full mesh network - it means...
Routing Internet Protocol
All hosts can communicate.
A long length of antenna extension cable
passing a username and password in plaintext.
14. POP Means...
Post Office Protocol
VPN (Virtual Private Network)
Dynamic Host Configuration Protocol
Primary Rate Interface
15. What is Unicast?
traceroute
raphical User Interface
MAC (Media Access Control) address
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
16. If a destination address is not in a bridges forwarding table - what will the bridge do?
D. Switch and bridge
Plain Old Telephone Service
Forward the packets to all ports except the one that originated the request
Switches - bridges - and NICs (Network Interface Card)
17. What is on Port 22?
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Easy to install - Inexpensive - Less actual cable required
802.1x
SSH
18. Mail Server
MT-RJ (Mechanical Transfer-Registered Jack)
Handles e-mail functions
Bridge
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
19. What is Broadcast Transmission?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Transmission Control Protocol
Telnet
20. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Extranet
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Networked Basic Input/Output System
21. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
1000BASE-LX and10 GBASE-LR
10 GBASE-LR
TFTP (Trivial File Transfer Protocol)
128 bit addresses
22. Which UNIX service provides interoperability with Windows file and print sharing?
802.1x
53
Routing Information Protocol
SMB (Server Message Block)
23. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
128 bit addresses
netstat
Internet Information Services
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
24. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Wireless Access Point
RJ-11 (Registered Jack)
rp
25. What are the two main network types?
20 & 21
Transport
Peer-To-Peer and Client-Server
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
26. FTP Means
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
In a locked room in an offsite location
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
File Transfer Protocol
27. Network
Two or more connected computers that can share resources
8080
Media Access Control
The users will not be affected by the change.
28. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
Hypertext transfer protocol over secure sockets layer.
Global System for Mobile Communications
gateway.
20 & 21
29. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Any network device with an IP address
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Network and Transport
30. BNC Means...
Bayonet-Neill-Concelman or British Naval Connector
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
TCP / IP (Transmission Control Protocol / Internet Protocol)
100 Mbps (Megabits per second)
31. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
rlogin
SUN RPC
Secure Sockets Layer
33. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
Routing Information Protocol
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
SSL (Secure Sockets Layer)
100BASE-FX Answer: D
34. What is on Ports 161 and 162?
Port 161 is SNMP and Port 162 is the SNMP Manager
Sys Log (Unix) or Event Manager (Windows)
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
35. SNMP Means...
Plain Old Telephone Service
Simple Network Management Protocol
Network Interface Card
Proxy server
36. HTTPS means...
RJ-11 (Registered Jack)
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Hypertext transfer protocol over secure sockets layer.
Access Control List
37. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Telnet
Gateway
Public Key Infrastructure
L2TP (Layer 2 Tunneling Protocol)
38. Which protocol does a diskless workstation use to obtain a network address?
Network Interface Card
BootP (Boot Protocol)
Network News Transfer Protocol
RDP/ Terminal Services
39. Name the seven most common physical topologies
There will be no Internet access.
Proxy
1000BASE-LX and10 GBASE-LR
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
40. FQDN means...
Internet Protocol
Fully Qualified Domain Name
larger subnet masks.
traceroute
41. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
An old microwave oven is being used in the break room which causes interference with the access point.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
PPP (Point-to-Point Protocol)
42. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Network Interface Card
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
gateway.
CSU / DSU (Channel Service Unit / Data Service Unit)
43. In which OSI (Open Systems Interconnect) layer does a bridge operate?
40 bit - 128 bit - 64 bit
Data Link
Remote Desktop Protocol
Easy to install - Inexpensive - Less actual cable required
44. What is on Port 110?
HTTP
POP3
The users will not be affected by the change.
Application
45. Which one of the following servers provides web caching services?
Proxy
L2TP (Layer 2 Tunneling Protocol)
CSU / DSU (Channel Service Unit / Data Service Unit)
A. 18 -000 feet (5 -486.4 meters)
46. What is PPTP?
Point to Point Tunneling Protocol
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
PPTP (Point-to-Point Tunneling Protocol)
47. GUI means
169.254.1.1
raphical User Interface
Telnet
netstat
48. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Password Authentication Protocol
Initial installation cost may be higher - One central single point of failure (the hub or other device)
HTTP
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
49. Print Server
Hypertext transfer protocol
Manages printers on the network
traceroute
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
50. What is on Port 389?
Internetwork Packet Exchange/Sequenced Packet Exchange
ICMP (Internet Control Message Protocol)
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Internet Control Message Protocol