SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
Proxy server
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
A long length of antenna extension cable
Forward the packets to all ports except the one that originated the request
3. What functionality does Kerberos provide?
In a locked room in an offsite location
Authentication
PPP (Point-to-Point Protocol)
Dynamic Host Configuration Protocol
4. What is PAT?
25
169.254.1.1
Two or more connected computers that can share resources
Port Address Translator
5. FQDN means...
Networked Basic Input/Output System
Fully Qualified Domain Name
netstat and ping
Intrusion Detection System
6. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
The file has been opened by another user and is open for read only.
SSL (Secure Sockets Layer)
Quality of Service
TFTP (Trivial File Transfer Protocol)
7. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Routing Information Protocol
DNS
Router
Port 20 must also be unblocked.
8. What is on Port 1433?
nslookup
25
SQL Server
169.254.1.1
9. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
Light Emitting Diode
Manages printers on the network
169.254.1.1
PPP (Point-to-Point Protocol)
10. What is QoS?
802.11i
Server Message Block OR Small-to-Midsize Business
Quality of Service
Token passing
11. What is TCP?
Transmission Control Protocol
There will be no Internet access.
Trivial File Transfer Protocol
Switches - bridges - and NICs (Network Interface Card)
12. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
SSL (Secure Sockets Layer)
HTTPS/ SSL
Put a router between the two network segments
Networked Basic Input/Output System
13. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
Public Switched Telephone Network
encapsulating the data payload.
Proxy server
Two or more connected computers that can share resources
14. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
An exact duplicate of the infrastructure is mirrored offsite.
User Datagram Protocol
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Periodically (randomly) blinking
15. DOS means...
Network and Transport
Disk Operating System or Denial of Service
It is an address assigned to a NIC (Network Interface Card).
Wireless Protected Access
16. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Bluetooth enabled cell phones
It is an address assigned to a NIC (Network Interface Card).
They are connected to a switch when trying to capture packets.
Network Address Translator
17. Which one of the following choices is the MOST secure place to store tape backups?
Internetwork packet exchange
20 & 21
In a locked room in an offsite location
172.192.4.256
18. Client-Server Networks
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Sys Log (Unix) or Event Manager (Windows)
This IP (Internet Protocol) address cannot be pinged remotely.
1433
19. On what Port is TFTP?
In the LAN (Local Area Network)
Transport
10
69
20. MLI Means...
Multiple Link Interface
PPTP (Point-to-Point Tunneling Protocol)
Any device on the network that can ask for access to resources
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
21. NetBEUI Means...
6
Routing Information Protocol
Networked Basic Input/Output System Extended User Interface
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
22. What is on Port 111?
SUN RPC
Trivial File Transfer Protocol
As a way to share resources and information
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
23. Which one of the following options is required for a client workstation to connect to a network resource?
Client - protocol - and adapter
An old microwave oven is being used in the break room which causes interference with the access point.
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Bayonet-Neill-Concelman or British Naval Connector
24. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Internetwork packet exchange
Application
802.11b
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
25. Which of the following are classified as Layer 2 devices?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Network File System
Switches - bridges - and NICs (Network Interface Card)
TCP / IP (Transmission Control Protocol / Internet Protocol)
26. List the drawbacks of a star topology
Basic Rate Interface
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Simple Network Management Protocol
WINS (Windows Internet Name Service)
27. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Internet mail access protocol
Proxy Server
PPTP (Point-to-Point Tunneling Protocol)
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
28. A company wants to have an intranet. Where would the intranet web server be located in the network?
SMB (Server Message Block)
Transmission Control Protocol
In the LAN (Local Area Network)
VPN (Virtual Private Network)
29. What is on Port 389?
The file has been opened by another user and is open for read only.
User Datagram Protocol
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
135-139
30. On what Port is the Proxy Server?
1000BASE-CX
802.2
8080
PPP (Point-to-Point Protocol)
31. PPTP Means...
Institute of Electrical and Electronics Engineers
TFTP (Trivial File Transfer Protocol)
Point-to-Point Tunneling Protocol
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
32. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
Easy to install - Inexpensive - Less actual cable required
Uniform Resource Locator
110
An exact duplicate of the infrastructure is mirrored offsite.
33. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Domain Name Service OR Domain Name Server
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
The analyzer is functioning properly.
34. What is DHCP? What is its key attribute?
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
File Transfer Protocol
larger subnet masks.
Transmission Control Protocol
35. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
128 bit addresses
A. 18 -000 feet (5 -486.4 meters)
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
10 GBASE-LR
36. MIME means...
Electromagnetic Interference
bytes 1-3
Multipurpose Internet Mail Extension
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
37. AC means...
Dynamic Host Configuration Protocol
Bridge
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Alternating Current
38. What is OSPF?
Open Source Path First - this is a routing protocol
Packets from entering and leaving a network
An old microwave oven is being used in the break room which causes interference with the access point.
Bridge
39. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. IIS Means...
DNS
Implement VLANs (Virtual Local Area Network)
As a way to share resources and information
Internet Information Services
41. On what Port is the SMTP Server?
Networked Basic Input/Output System Extended User Interface
Metropolitan Area Network
Hypertext transfer protocol
25
42. ISDN means...
Proxy
Network Address Translation
Integrated Services digital Network
1000BASE-CX
43. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
8080
550 meters (1 -804.46 feet)
802.11
Telnet
44. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration?
Networked Basic Input/Output System
To decrease network congestion Answer: D
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
The users will not be affected by the change.
45. WINS Means...
802.11b
Windows Internet Name Service
Internet Protocol
SUN RPC
46. WPA Means...
Wireless Protected Access
10
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
23
47. MPLS
MultiProtocol Label Switching
Multiple Link Interface
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
53
48. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Sys Log (Unix) or Event Manager (Windows)
An old microwave oven is being used in the break room which causes interference with the access point.
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
49. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
72.16.16.1
Verification
Post Office Protocol
50. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
100BASE-FX Answer: D
Secure Shell
The users will not be affected by the change.
Hypertext Markup Language