SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
Server Message Block OR Small-to-Midsize Business
1
netstat and ping
A. 18 -000 feet (5 -486.4 meters)
2. A firewall can be used to prevent which of the following?
Proxy
Packets from entering and leaving a network
802.11b
All hosts can communicate.
3. IDS means...
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Intrusion Detection System
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Direct Current
4. Network
PDC (Primary Domain Controller)
Client - protocol - and adapter
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Two or more connected computers that can share resources
5. Upon which devices can NAT (Network Address Translation) be used?
Firewall
Wired Equivalent Privacy
Media Access Control
The users will not be affected by the change.
6. What is on Port 514?
72.16.16.1
Sys Log (Unix) or Event Manager (Windows)
802.11a.
Token passing
7. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Networked Basic Input/Output System
WINS (Windows Internet Name Service)
Presentation
8. Workstations
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. Proxy Server
802.11i
22
Handles tasks in the place of other machines on the network
POP3
10. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
encapsulating the data payload.
Periodically (randomly) blinking
Manages network applications
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
11. POP3 Means...
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Direct Current
The 'memo maker' that sends and receives paperless faxes over the network
Post Office Protocol 3
12. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Forward the packets to all ports except the one that originated the request
Trivial File Transfer Protocol
550 meters (1 -804.46 feet)
13. GPS means...
Implement VLANs (Virtual Local Area Network)
Global Positioning System
Select the most probable cause
Port Address Translator
14. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. LAN Means...
An exact duplicate of the infrastructure is mirrored offsite.
Local Area Network
Bluetooth enabled cell phones
IMAP (Mail Client)
16. What is UDP? What are some of its attributes?
Alternating Current
cold site.
Bridge
User Datagram Protocol. This protocol is connectionless and routable.
17. What is IPSEC? Why is it significant?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Wireless Access Point
Internet Protocol Security. This is the defacto standard for VPN security.
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
18. Given the output: 1.pgw (129.6.80.254) * 4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above?
SSH
traceroute
443
DNS (Domain Name Service) server settings
19. What is PPP?
User Datagram Protocol
Point to Point Protocol
Asynchronous Transfer Mode
48 bits.
20. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. The network uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair). The cable to Workstation 3 has been severed. Which of
TFTP (Trivial File Transfer Protocol)
All workstations except Workstation 3 can communicate to each other.
RJ-11 (Registered Jack)
Bluetooth enabled cell phones
21. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Hybrid hub
802.1x
gateway.
22. Which protocol could be used by a VPN (Virtual Private Network)?
They are connected to a switch when trying to capture packets.
User Datagram Protocol. This protocol is connectionless and routable.
Stores and dispenses files
PPTP (Point-to-Point Tunneling Protocol)
23. EMI means...
Client - protocol - and adapter
Electromagnetic Interference
111
netstat and ping
24. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
10
Fully Qualified Domain Name
The file has been opened by another user and is open for read only.
netstat and ping
25. IIS Means...
Wireless Access Point
Fully Qualified Domain Name
All hosts can communicate.
Internet Information Services
26. What is on Ports 20 and 21?
22
Provides remote users with access to the network through modems and an IP connection
Implement VLANs (Virtual Local Area Network)
These are the FTP ports. Port 20 handles data and Port 21 provides control.
27. NetBEUI Means...
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Extranet
Networked Basic Input/Output System Extended User Interface
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
28. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
Point-to-Point Tunneling Protocol
802.2
WEP (Wired Equivalent Privacy)
Forward the packets to all ports except the one that originated the request
29. On what Port is HTTPS/ SSL?
443
Port 20 must also be unblocked.
Transmission Control Protocol
SSL (Secure Sockets Layer)
30. On what Port is IMAP?
SUN RPC
RJ-11 (Registered Jack)
143
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
31. MPLS
Networked Basic Input/Output System Extended User Interface
Easy to install - Inexpensive - Less actual cable required
MultiProtocol Label Switching
1433
32. What is LEAP?
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
802.11
Manages network applications
MAC (Media Access Control) address
33. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Network and Transport
New Technology File System
110
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
34. What is on Port 53?
Handles e-mail functions
RDP/ Terminal Services
DNS
Provides remote users with access to the network through modems and an IP connection
35. List the drawbacks of a star topology
Any device on the network that can ask for access to resources
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Transport
1433
36. SMB Means...
Server Message Block OR Small-to-Midsize Business
cold site.
Fully Qualified Domain Name
8080
37. What is a MAC (Media Access Control) address?
Point-to-Point Tunneling Protocol
It is an address assigned to a NIC (Network Interface Card).
172.192.4.256
Physical
38. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
CSU / DSU (Channel Service Unit / Data Service Unit)
Client - protocol - and adapter
25
Windows Internet Name Service
39. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
550 meters (1 -804.46 feet)
Verification
Disk Operating System or Denial of Service
rlogin
40. A company wants to have an intranet. Where would the intranet web server be located in the network?
In the LAN (Local Area Network)
72.16.16.1
VPN (Virtual Private Network)
Basic Input/Output System
41. MLI Means...
Bluetooth enabled cell phones
L2TP (Layer 2 Tunneling Protocol)
New Technology File System
Multiple Link Interface
42. ICMP means...
Internetwork Packet Exchange/Sequenced Packet Exchange
53
Internet Control Message Protocol
Networked Basic Input/Output System
43. What is on Port 1433?
SQL Server
Point to Point Tunneling Protocol
Alternating Current
Intrusion Detection System
44. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Internet Service Provider
Extranet
Bluetooth enabled cell phones
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
45. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?
10 GBASE-LR
TFTP (Trivial File Transfer Protocol)
SMTP Server
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
46. MIME means...
Plain Old Telephone Service
Multipurpose Internet Mail Extension
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
47. Which physical topology is used by a 10BASE2 network?
ifconfig
MultiProtocol Label Switching
Bus
WINS (Windows Internet Name Service)
48. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Gateway
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Proxy Server
bytes 1-3
49. NetBIOS Means...
Alternating Current
Networked Basic Input/Output System
nslookup
389
50. What is on Port 3389?
RDP/ Terminal Services
Public Key Infrastructure
10
PDC (Primary Domain Controller)