SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is on Port 443?
Presentation
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
HTTPS/ SSL
Port 161 is SNMP and Port 162 is the SNMP Manager
2. What are the two main network types?
10 GBASE-LR
ICMP (Internet Control Message Protocol)
Peer-To-Peer and Client-Server
Network Address Translation
3. BIOS Means...
User Datagram Protocol
Service Set Identifier
Provides remote users with access to the network through modems and an IP connection
Basic Input/Output System
4. CPU means...
Central Processing unit
Hypertext transfer protocol over secure sockets layer.
Point to Point Protocol
Port 20 must also be unblocked.
5. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
550 meters (1 -804.46 feet)
MAC (Media Access Control) address
Hypertext transfer protocol over secure sockets layer.
6. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
rlogin
Stores and dispenses files
Application
7. Which protocol could be used by a VPN (Virtual Private Network)?
MAC (Media Access Control) address
PPTP (Point-to-Point Tunneling Protocol)
NetBios
Metropolitan Area Network
8. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. The network uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair). The cable to Workstation 3 has been severed. Which of
All workstations except Workstation 3 can communicate to each other.
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Reverse Address Resolution Protocol.
9. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Proxy
MT-RJ (Mechanical Transfer-Registered Jack)
Primary Rate Interface
10. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
DNS (Domain Name Service) server settings
Authentication
L2TP (Layer 2 Tunneling Protocol)
128 bit addresses
11. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
They are connected to a switch when trying to capture packets.
To decrease network congestion Answer: D
1000BASE-CX
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
12. GSM means...
Routing Internet Protocol
Global System for Mobile Communications
CSU / DSU (Channel Service Unit / Data Service Unit)
Institute of Electrical and Electronics Engineers
13. Disk mirroring is also known as RAID ___...
1
Sys Log (Unix) or Event Manager (Windows)
Multiple Link Interface
Internet Control Message Protocol
14. NTP means...
Access Control List
bytes 1-3
Alternating Current
Network Time Protocol
15. ISO Means...
Network Address Translation
Port Address Translator
1
Industry Standards Organization
16. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
Exterior Gateway Protocol
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
2.4 GHz (Gigahertz).
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
17. What is IP?
Internet Protocol
bytes 1-3
DNS (Domain Name Service) server settings
Lightweight Directory Access Protocol
18. BNC Means...
Bayonet-Neill-Concelman or British Naval Connector
PPP (Point-to-Point Protocol)
File Transfer Protocol
Point to Point Protocol
19. GPS means...
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Global Positioning System
Network Interface Card
550 meters (1 -804.46 feet)
20. What is on Port 80?
Primary Rate Interface
DNS
SMB (Server Message Block)
HTTP
21. LDAP means...
53
Lightweight Directory Access Protocol
Any device on the network that can ask for access to resources
25
22. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
rp
netstat
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
23. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Asynchronous Transfer Mode
802.11
Industry Standards Organization
24. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Service Set Identifier
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Intrusion Detection System
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
25. An Ethernet MAC (Media Access Control) address consists of...
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
These are the FTP ports. Port 20 handles data and Port 21 provides control.
There will be no Internet access.
48 bits.
26. What is EGP?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Exterior Gateway Protocol
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
27. Which one of the following choices is the MOST secure place to store tape backups?
L2TP (Layer 2 Tunneling Protocol)
110
In a locked room in an offsite location
Internet Protocol
28. What is RARP?
Reverse Address Resolution Protocol.
802.11i
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
110
29. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
All workstations except Workstation 3 can communicate to each other.
53
ICMP (Internet Control Message Protocol)
A 2.4 GHz (Gigahertz) cordless telephone is in use.
30. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Internet Protocol Security. This is the defacto standard for VPN security.
CSU / DSU (Channel Service Unit / Data Service Unit)
Network Access Control
802.11b
31. What is on Port 25?
TCP / IP (Transmission Control Protocol / Internet Protocol)
2.4 GHz (Gigahertz).
135-139
SMTP Server
32. IIS Means...
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Internet Information Services
22
This IP (Internet Protocol) address cannot be pinged remotely.
33. NFS Means...
Bus
Network File System
Server Message Block OR Small-to-Midsize Business
Wireless LAN
34. Around noon - 802.11b wireless users near the break room have intermittent - random connections. What is the problem?
An old microwave oven is being used in the break room which causes interference with the access point.
SQL Server
Access Control List
Trivial File Transfer Protocol
35. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
Local Area Network
DNS (Domain Name Service) server settings
The device ID (Identification)
Network File System
36. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?
Media Access Unit - Media attachment Unit
TFTP (Trivial File Transfer Protocol)
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Light Emitting Diode
37. What is Multicast Transmission?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
MultiProtocol Label Switching
Forward the packets to all ports except the one that originated the request
rlogin
38. SSID Means...
Service Set Identifier
Network Address Translator
Physical
A 2.4 GHz (Gigahertz) cordless telephone is in use.
39. What is IPSEC? Why is it significant?
Physical
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Stores and dispenses files
Internet Protocol Security. This is the defacto standard for VPN security.
40. DSL means...
Routing Internet Protocol
Multiple Link Interface
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Digital Subscriber Line
41. Which one of the following security protocols creates a secure connection over the Internet?
L2TP (Layer 2 Tunneling Protocol)
ifconfig
Exterior Gateway Protocol
Time domain reflectometer
42. FQDN means...
Trivial File Transfer Protocol
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Provides remote users with access to the network through modems and an IP connection
Fully Qualified Domain Name
43. Physical Topology
Networked Basic Input/Output System
172.192.4.256
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Presentation
44. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
The file has been opened by another user and is open for read only.
Lightweight Directory Access Protocol
Select the most probable cause
Point-to-Point Protocol
45. List the drawbacks of a ring topology
WINS (Windows Internet Name Service)
443
Packets from entering and leaving a network
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
46. MIME means...
Multipurpose Internet Mail Extension
Firewall
In a locked room in an offsite location
1
47. Mail Server
Digital Subscriber Line
Gateway
Windows Internet Name Service
Handles e-mail functions
48. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
Metropolitan Area Network
User Datagram Protocol
Internet Control Message Protocol
Hybrid hub
49. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
Proxy server
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Transmission Control Protocol/Internet Protocol
53
50. In which OSI (Open Systems Interconnect) layer does a bridge operate?
Data Link
Hypertext transfer protocol over secure sockets layer.
POP3
The users will not be affected by the change.