SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
802.1x
Router
Internet mail access protocol
Handles tasks in the place of other machines on the network
2. On what Port is DNS?
802.11
It is an address assigned to a NIC (Network Interface Card).
53
Wireless Access Point
3. Client-Server Networks
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Select the most probable cause
There will be no Internet access.
Transmission Control Protocol/Internet Protocol
4. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Web Server
Point to Point Tunneling Protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Secure Sockets Layer
Challenge Handshake Authentication Protocol
6. Upon which devices can NAT (Network Address Translation) be used?
New Technology File System
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
User Datagram Protocol. This protocol is connectionless and routable.
Firewall
7. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. The network uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair). The cable to Workstation 3 has been severed. Which of
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Network Interface Card
All workstations except Workstation 3 can communicate to each other.
Internetwork Packet Exchange/Sequenced Packet Exchange
8. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
NetBios
Global Positioning System
encapsulating the data payload.
In a locked room in an offsite location
9. PRI Means...
Hypertext transfer protocol
ICMP (Internet Control Message Protocol)
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Primary Rate Interface
10. TCP means...
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Transmission Control Protocol
Handles e-mail functions
Routing Information Protocol
11. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
Firewall
72.16.16.1
169.254.1.1
3389
12. Application Server
The users will not be affected by the change.
Manages network applications
bytes 1-3
Internet Control Message Protocol
13. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
PPP (Point-to-Point Protocol)
Fully Qualified Domain Name
netstat
14. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Internet mail access protocol
Trivial File Transfer Protocol
Networked Basic Input/Output System
802.11b
15. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
Presentation
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Network Interface Card
WINS (Windows Internet Name Service)
16. What is on Port 143?
File Transfer Protocol
MAC (Media Access Control) address
This IP (Internet Protocol) address cannot be pinged remotely.
IMAP (Mail Client)
17. What is on Ports 161 and 162?
Port 161 is SNMP and Port 162 is the SNMP Manager
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
172.192.4.256
18. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Proxy
Port 20 must also be unblocked.
1
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
19. What is on Port 25?
They are connected to a switch when trying to capture packets.
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Bridge
SMTP Server
20. NTFS Means...
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Internet connection
ifconfig
New Technology File System
21. On what Port is FTP?
ICMP (Internet Control Message Protocol)
20 & 21
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Time domain reflectometer
22. ISO Means...
Client - protocol - and adapter
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Industry Standards Organization
23. Which one of the following choices is the MOST secure place to store tape backups?
1000BASE-CX
Internetwork packet exchange
In a locked room in an offsite location
Network and Transport
24. Which protocol does a diskless workstation use to obtain a network address?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Secure Shell
BootP (Boot Protocol)
25
25. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
Hypertext transfer protocol over secure sockets layer.
25
The users will not be affected by the change.
Initial installation cost may be higher - One central single point of failure (the hub or other device)
26. Which one of the following devices connects a network segment to a public telephone network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Manages network applications
All hosts can communicate.
111
27. Which protocol could be used by a VPN (Virtual Private Network)?
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
IMAP (Mail Client)
PPTP (Point-to-Point Tunneling Protocol)
Proxy Server
28. URL Means...
1433
Internet Control Message Protocol
Uniform Resource Locator
Manages printers on the network
29. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
Access Control List
The analyzer is functioning properly.
802.11b
Manages printers on the network
30. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. List the benefits of a bus topology
Easy to install - Inexpensive - Less actual cable required
The Internet router is blocking port 25.
Network Time Protocol
raphical User Interface
32. ICMP means...
Dynamic Host Configuration Protocol
Provides remote users with access to the network through modems and an IP connection
110
Internet Control Message Protocol
33. What is RIP?
Direct Current
Routing Internet Protocol
192.168.96.254
Point to Point Tunneling Protocol
34. IPX/SPX means...
Telnet
Internetwork Packet Exchange/Sequenced Packet Exchange
Authentication
1000BASE-CX
35. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Transmission Control Protocol/Internet Protocol
Local Area Network
Select the most probable cause
netstat
36. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
netstat and ping
Metropolitan Area Network
bytes 1-3
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
37. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote us
514
This IP (Internet Protocol) address cannot be pinged remotely.
Telnet
Media Access Control
38. WPA Means...
File Transfer Protocol
Wireless Protected Access
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Public Switched Telephone Network
39. On what Port is TFTP?
It is an address assigned to a NIC (Network Interface Card).
Transmission Control Protocol
Access Control List
69
40. When one connection to a host fails in a full mesh network - it means...
Proxy
All hosts can communicate.
L2TP (Layer 2 Tunneling Protocol)
larger subnet masks.
41. What is ARP? What are some of its attributes?
Address Resolution Protocol. Has no error control.
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
raphical User Interface
Bus
42. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Primary Rate Interface
10 GBASE-LR
User Datagram Protocol. This protocol is connectionless and routable.
Lightweight Directory Access Protocol
43. TCP/IP Means;
Presentation
Any device on the network that can ask for access to resources
Transmission Control Protocol/Internet Protocol
CSU / DSU (Channel Service Unit / Data Service Unit)
44. What is CHAP?
Challenge Handshake Authentication Protocol
Windows Internet Name Service
Internet connection
Service Set Identifier
45. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
Alternating Current
Disk Operating System or Denial of Service
Client - protocol - and adapter
Implement VLANs (Virtual Local Area Network)
46. On what Port is IMAP?
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Secure Shell
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
143
47. On what Port is POP3?
Plain Old Telephone Service
Network News Transfer Protocol
110
Application
48. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
L2TP (Layer 2 Tunneling Protocol)
A. 18 -000 feet (5 -486.4 meters)
File Transfer Protocol
49. What is a MAC (Media Access Control) address?
A long length of antenna extension cable
It is an address assigned to a NIC (Network Interface Card).
SSL (Secure Sockets Layer)
Port 20 must also be unblocked.
50. What is RARP?
CSU / DSU (Channel Service Unit / Data Service Unit)
TFTP (Trivial File Transfer Protocol)
802.11b
Reverse Address Resolution Protocol.