SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is on Port 80?
PPTP (Point-to-Point Tunneling Protocol)
HTTP
Any network device with an IP address
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
2. What is on Port 514?
Routing Internet Protocol
Fully Qualified Domain Name
Sys Log (Unix) or Event Manager (Windows)
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
3. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
All workstations except Workstation 3 can communicate to each other.
2.4 GHz (Gigahertz).
53
100BASE-FX Answer: D
4. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
File Transfer Protocol
Windows Internet Name Service
80
A. 18 -000 feet (5 -486.4 meters)
5. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
802.1x
An eight-position connector which uses UTP (Unshielded Twisted Pair).
The analyzer is functioning properly.
6. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
As a way to share resources and information
Proxy server
A long length of antenna extension cable
7. An Ethernet MAC (Media Access Control) address consists of...
larger subnet masks.
48 bits.
Secure Sockets Layer
Router
8. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
A network map showing exactly how data moves through the network.
ping
Transmission Control Protocol
SSH
9. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Presentation
Internetwork Packet Exchange/Sequenced Packet Exchange
100 Mbps (Megabits per second)
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
10. Which one of the following communication protocols does a UNIX system primarily rely on?
Provides remote users with access to the network through modems and an IP connection
161 & 162
TCP / IP (Transmission Control Protocol / Internet Protocol)
135-139
11. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
Bridge
802.2
Password Authentication Protocol
Hypertext transfer protocol over secure sockets layer.
12. LED Means...
Application
100BASE-FX Answer: D
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Light Emitting Diode
13. Which one of the following security protocols creates a secure connection over the Internet?
110
L2TP (Layer 2 Tunneling Protocol)
Address Resolution Protocol. Has no error control.
Router
14. Which one of the following devices connects a network segment to a public telephone network?
Easy to install - Inexpensive - Less actual cable required
DNS (Domain Name Service) server settings
100BASE-FX Answer: D
CSU / DSU (Channel Service Unit / Data Service Unit)
15. What is on Ports 161 and 162?
Asynchronous Transfer Mode
encapsulating the data payload.
Internet mail access protocol
Port 161 is SNMP and Port 162 is the SNMP Manager
16. What is Unicast?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
cold site.
Put a router between the two network segments
17. NAT Means...
Network Address Translation
The Internet router is blocking port 25.
Public Key Infrastructure
Internet Protocol
18. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
A. 18 -000 feet (5 -486.4 meters)
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
HTTPS/ SSL
the NIC (Network Interface Card) is bad.
19. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Open Source Path First - this is a routing protocol
169.254.1.1
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
A network map showing exactly how data moves through the network.
20. If a destination address is not in a bridges forwarding table - what will the bridge do?
Access Control List
Forward the packets to all ports except the one that originated the request
IMAP (Mail Client)
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
21. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
DNS (Domain Name Service) server settings
40 bit - 128 bit - 64 bit
100BASE-FX Answer: D
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
22. What is LEAP?
100BASE-FX Answer: D
Port 161 is SNMP and Port 162 is the SNMP Manager
Sys Log (Unix) or Event Manager (Windows)
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
23. URL Means...
69
Uniform Resource Locator
encapsulating the data payload.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
24. ICMP means...
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
135-139
Internet Control Message Protocol
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
25. Which one of the following is a purpose for subnetting?
To decrease network congestion Answer: D
1000BASE-CX
WINS (Windows Internet Name Service)
Intrusion Detection System
26. NFS Means...
Network File System
The file has been opened by another user and is open for read only.
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Point-to-Point Tunneling Protocol
27. A valid MAC (Media Access Control) address is how many bytes long?
WINS (Windows Internet Name Service)
100BASE-FX Answer: D
6
Multiple Link Interface
28. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
gateway.
CSU / DSU (Channel Service Unit / Data Service Unit)
raphical User Interface
Network Address Translation
29. What is EGP?
gateway.
Reverse Address Resolution Protocol.
Exterior Gateway Protocol
389
30. Why did we develop networking?
Internet Protocol
As a way to share resources and information
POP3
traceroute
31. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
netstat and ping
32. Host
netstat and ping
Wireless LAN
Any network device with an IP address
IMAP (Mail Client)
33. DSL means...
Digital Subscriber Line
Fully Qualified Domain Name
Post Office Protocol
Internet Protocol Security. This is the defacto standard for VPN security.
34. SSH Means...
Bus
HTTPS/ SSL
Secure Shell
DNS
35. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed?
New Technology File System
SSL (Secure Sockets Layer)
To decrease network congestion Answer: D
In a locked room in an offsite location
36. On what Port is the SMTP Server?
72.16.16.1
53
25
They are connected to a switch when trying to capture packets.
37. MIME means...
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Simple Network Management Protocol
Multipurpose Internet Mail Extension
MT-RJ (Mechanical Transfer-Registered Jack)
38. What is TCP?
passing a username and password in plaintext.
Peer-To-Peer and Client-Server
Transmission Control Protocol
10
39. HTTP Means...
Hypertext transfer protocol
3389
Verification
ICMP (Internet Control Message Protocol)
40. On what Port is SQL Server?
Network Interface Card
Exterior Gateway Protocol
1433
443
41. TCP means...
Transmission Control Protocol
Trivial File Transfer Protocol
Internetwork packet exchange
Network News Transfer Protocol
42. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. On what Port is SUN RPC?
111
NetBios
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
169.254.1.1
44. IPSEC means...
TFTP (Trivial File Transfer Protocol)
Internet Protocol Security
Internet Control Message Protocol
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
45. On what Port is HTTP?
Handles e-mail functions
80
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
1000BASE-LX and10 GBASE-LR
46. Describe a ring topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. MAC Means...
Public Key Infrastructure
Dynamic Host Configuration Protocol
SMB (Server Message Block)
Media Access Control
48. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
File Transfer Protocol
Fully Qualified Domain Name
There will be no Internet access.
Network Address Translator
49. Examples of valid WEP (Wired Equivalent Privacy) key lengths
Bus
40 bit - 128 bit - 64 bit
Bluetooth enabled cell phones
Any network device with an IP address
50. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183