SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which one of the following is true concerning bridges and their forwarding decisions?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Basic Rate Interface
TFTP (Trivial File Transfer Protocol)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
2. What is on Port 111?
Point to Point Tunneling Protocol
SUN RPC
A 2.4 GHz (Gigahertz) cordless telephone is in use.
MT-RJ (Mechanical Transfer-Registered Jack)
3. What is on Port 110?
POP3
25
Address Resolution Protocol. Has no error control.
Hypertext transfer protocol
4. MPLS
Periodically (randomly) blinking
Internet mail access protocol
MultiProtocol Label Switching
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
5. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Application
Point to Point Protocol
Simple Network Management Protocol
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
6. Disk mirroring is also known as RAID ___...
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Metropolitan Area Network
1
MT-RJ (Mechanical Transfer-Registered Jack)
7. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Put a router between the two network segments
135-139
HTTP
Verification
8. What is IPSEC? Why is it significant?
Data Link
This IP (Internet Protocol) address cannot be pinged remotely.
Internet Protocol Security. This is the defacto standard for VPN security.
Internet Service Provider
9. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Select the most probable cause
Asynchronous Transfer Mode
110
53
10. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
Local Area Network
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Telnet
Internet connection
11. What is on Port 143?
Sys Log (Unix) or Event Manager (Windows)
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
There will be no Internet access.
IMAP (Mail Client)
12. What is PAT?
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Port Address Translator
Light Emitting Diode
Domain Name Service OR Domain Name Server
13. Around noon - 802.11b wireless users near the break room have intermittent - random connections. What is the problem?
An old microwave oven is being used in the break room which causes interference with the access point.
389
Alternating Current
MT-RJ (Mechanical Transfer-Registered Jack)
14. On what Port is FTP?
Extranet
Sys Log (Unix) or Event Manager (Windows)
20 & 21
IMAP (Mail Client)
15. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
PPP (Point-to-Point Protocol)
L2TP (Layer 2 Tunneling Protocol)
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
16. What is a MAC (Media Access Control) address?
Lightweight Directory Access Protocol
6
Access Control List
It is an address assigned to a NIC (Network Interface Card).
17. Which one of the following is a purpose for subnetting?
Stores and dispenses files
Media Access Unit - Media attachment Unit
To decrease network congestion Answer: D
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
18. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
72.16.16.1
Bridge
RJ-11 (Registered Jack)
Password Authentication Protocol
19. NIC means...
Network Interface Card
The device ID (Identification)
Port Address Translator
SSH
20. List the drawbacks of a ring topology
Bayonet-Neill-Concelman or British Naval Connector
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
111
21. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
MT-RJ (Mechanical Transfer-Registered Jack)
Network Interface Card
10 GBASE-LR
POP3
22. Print Server
Manages printers on the network
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
TFTP (Trivial File Transfer Protocol)
Proxy server
23. Which protocol does a diskless workstation use to obtain a network address?
netstat
Uniform Resource Locator
BootP (Boot Protocol)
40 bit - 128 bit - 64 bit
24. LDAP means...
SMTP Server
80
Lightweight Directory Access Protocol
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
25. On what Port is SQL Server?
Verification
1433
Periodically (randomly) blinking
Application
26. What is UDP? What are some of its attributes?
ifconfig
Network Access Control
Public Switched Telephone Network
User Datagram Protocol. This protocol is connectionless and routable.
27. On what Port is Sys Log/ Event Manager?
3.1
514
100 Mbps (Megabits per second)
Access Control List
28. When one connection to a host fails in a full mesh network - it means...
All hosts can communicate.
Remote Desktop Protocol
Simple Network Management Protocol
PPTP (Point-to-Point Tunneling Protocol)
29. Describe a bus topology
Any network device with an IP address
48 bits.
Transport
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
30. ISP Means...
Windows Internet Name Service
Server Message Block OR Small-to-Midsize Business
Internet Service Provider
Media Access Control
31. POP Means...
169.254.1.1
Post Office Protocol
Network Address Translation
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
32. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
ICMP (Internet Control Message Protocol)
2
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
There will be no Internet access.
33. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
Plain Old Telephone Service
25
1433
Transport
35. List the drawbacks of a star topology
Application
143
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Telnet
36. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
PDC (Primary Domain Controller)
1000BASE-CX
10 GBASE-LR
37. Which protocol is the fastest file transfer protocol?
Global System for Mobile Communications
TFTP (Trivial File Transfer Protocol)
Proxy
Metropolitan Area Network
38. Network
Two or more connected computers that can share resources
The file has been opened by another user and is open for read only.
Asynchronous Transfer Mode
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
39. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Bluetooth enabled cell phones
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
rp
40. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
Extranet
100BASE-FX Answer: D
Check the connection from the WAP (Wireless Access Point) to the network
Dynamic Host Configuration Protocol
41. On what Port is SNMP?
Networked Basic Input/Output System Extended User Interface
1000BASE-CX
161 & 162
A 2.4 GHz (Gigahertz) cordless telephone is in use.
42. A client workstation can authenticate user names and passwords to which type of server?
Local Area Network
PDC (Primary Domain Controller)
Point-to-Point Protocol
Hypertext transfer protocol over secure sockets layer.
43. On what Port is RDP?
Network Interface Card
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
D. Switch and bridge
3389
44. Which one of the following devices connects a network segment to a public telephone network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Network Time Protocol
Manages printers on the network
192.168.96.254
45. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Network Interface Card
Media Access Control
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Basic Rate Interface
46. What is LEAP?
SSL (Secure Sockets Layer)
PDC (Primary Domain Controller)
There will be no Internet access.
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
47. PPTP Means...
802.11b
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Point-to-Point Tunneling Protocol
Wireless Fidelity
48. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
Application
Switches - bridges - and NICs (Network Interface Card)
8080
netstat and ping
49. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
Global Positioning System
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
MAC (Media Access Control) address
50. FDDI (Fiber Distributed Data Interface) operates at what speed?
The file has been opened by another user and is open for read only.
22
100 Mbps (Megabits per second)
Stores and dispenses files