SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What enables a UNIX computer to access exported file systems from other UNIX computers?
Bus
TCP / IP (Transmission Control Protocol / Internet Protocol)
Provides remote users with access to the network through modems and an IP connection
NFS (Network File System)
2. On what Port is SQL Server?
1433
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
23
Transmission Control Protocol
3. IPX Means...
All workstations except Workstation 3 can communicate to each other.
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Internetwork packet exchange
4. BRI Means...
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Wireless Fidelity
Local Area Network
Basic Rate Interface
5. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
There will be no Internet access.
TFTP (Trivial File Transfer Protocol)
Wired Equivalent Privacy
Sys Log (Unix) or Event Manager (Windows)
6. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration?
Internet Protocol Security
Wired Equivalent Privacy
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
7. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
802.1x
Manages network applications
traceroute
The analyzer is functioning properly.
8. IIS Means...
Network Address Translation
Select the most probable cause
Internet Information Services
Multipurpose Internet Mail Extension
9. What is L2TP? What is significant about this protocol?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
BootP (Boot Protocol)
10. Which OSI (Open Systems Interconnect) layer converts digital data into electronic signals to beput on a wire?
Internet Protocol Security. This is the defacto standard for VPN security.
53
Proxy
Physical
11. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
WINS (Windows Internet Name Service)
TFTP (Trivial File Transfer Protocol)
Handles tasks in the place of other machines on the network
the NIC (Network Interface Card) is bad.
12. LAN Local Area Network
Basic Rate Interface
802.2
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Put a router between the two network segments
13. A client workstation can authenticate user names and passwords to which type of server?
Point-to-Point Tunneling Protocol
The Internet router is blocking port 25.
raphical User Interface
PDC (Primary Domain Controller)
14. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
All workstations except Workstation 3 can communicate to each other.
File Transfer Protocol
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Internet Control Message Protocol
15. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
Router
Network Address Translator
Internet Service Provider
Initial installation cost may be higher - One central single point of failure (the hub or other device)
16. WINS Means...
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
This IP (Internet Protocol) address cannot be pinged remotely.
Windows Internet Name Service
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
17. On what Port is DNS?
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
53
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Authentication
18. On what Port is NetBios?
Stores and dispenses files
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Manages network applications
135-139
19. What is on Port 3389?
PPP (Point-to-Point Protocol)
135-139
Internetwork Packet Exchange/Sequenced Packet Exchange
RDP/ Terminal Services
20. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
A striped set array with parity
69
1000BASE-LX and10 GBASE-LR
1000BASE-CX
21. WEP Means...
Point to Point Tunneling Protocol
Wired Equivalent Privacy
rp
Proxy server
22. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
Light Emitting Diode
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Address Resolution Protocol. Has no error control.
23. What is Broadcast Transmission?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Stores and dispenses files
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Wireless LAN
24. SSID Means...
Two or more connected computers that can share resources
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
23
Service Set Identifier
25. NIC means...
Network Interface Card
802.11
ifconfig
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
26. On what Port is IMAP?
Media Access Control
rp
143
As a way to share resources and information
27. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
Firewall
Media Access Control
MT-RJ (Mechanical Transfer-Registered Jack)
Multiple Link Interface
28. Fault Tolerance
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Access Control List
A long length of antenna extension cable
Manages printers on the network
29. FDDI (Fiber Distributed Data Interface) operates at what speed?
100 Mbps (Megabits per second)
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Network Address Translator
30. AC means...
Internet Protocol Security
143
Transport
Alternating Current
31. On what Port is POP3?
110
A striped set array with parity
1000BASE-CX
The device ID (Identification)
32. Application Server
ping
IMAP (Mail Client)
Manages network applications
netstat
33. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Media Access Unit - Media attachment Unit
Industry Standards Organization
Dynamic Host Configuration Protocol
34. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
Alternating Current
802.11a.
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Provides remote users with access to the network through modems and an IP connection
35. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
69
netstat and ping
10
143
36. When one connection to a host fails in a full mesh network - it means...
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
All hosts can communicate.
IMAP (Mail Client)
100BASE-FX Answer: D
37. What is EGP?
Exterior Gateway Protocol
The Internet router is blocking port 25.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Port Address Translator
38. ISDN means...
Internet Protocol Security
Integrated Services digital Network
161 & 162
Quality of Service
39. DC means...
The analyzer is functioning properly.
Post Office Protocol
Provides remote users with access to the network through modems and an IP connection
Direct Current
40. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Any network device with an IP address
Post Office Protocol
Central Processing unit
41. Which one of the following security protocols creates a secure connection over the Internet?
L2TP (Layer 2 Tunneling Protocol)
Internet Protocol
Any network device with an IP address
Connect Workstation 6 and Workstation 2 using a barrel connector
42. Logical Topology
A network map showing exactly how data moves through the network.
Point to Point Protocol
gateway.
Network News Transfer Protocol
43. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Internet Control Message Protocol
Challenge Handshake Authentication Protocol
Internet Control Message Protocol
Application
44. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
larger subnet masks.
WINS (Windows Internet Name Service)
25
Telnet
45. Workstations
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. What is on Ports 135-139?
NetBios
Client - protocol - and adapter
ping
DNS
47. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
SUN RPC
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
DNS
An old microwave oven is being used in the break room which causes interference with the access point.
48. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
ICMP (Internet Control Message Protocol)
Network Access Control
Secure Sockets Layer
Transmission Control Protocol
49. What is Multicast Transmission?
The amber light is flashing occasionally and the green light is lit steadily.
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Primary Rate Interface
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
50. Upon which devices can NAT (Network Address Translation) be used?
The device ID (Identification)
Firewall
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Internet Service Provider