SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SSH Means...
2
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Secure Shell
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
2. Print Server
Direct Current
Manages printers on the network
23
Asynchronous Transfer Mode
3. What is on Port 69?
RJ-11 (Registered Jack)
TFTP (Trivial File Transfer Protocol)
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Provides remote users with access to the network through modems and an IP connection
4. HTTP Means...
Hypertext transfer protocol
WINS (Windows Internet Name Service)
Token passing
In a locked room in an offsite location
5. On what Port is Sys Log/ Event Manager?
To decrease network congestion Answer: D
There will be no Internet access.
Point to Point Tunneling Protocol
514
6. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Periodically (randomly) blinking
172.192.4.256
Manages network applications
nslookup
7. Which of the following are classified as Layer 2 devices?
72.16.16.1
Time domain reflectometer
Switches - bridges - and NICs (Network Interface Card)
nslookup
8. Which one of the following communication protocols does a UNIX system primarily rely on?
22
TCP / IP (Transmission Control Protocol / Internet Protocol)
80
Application
9. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Sys Log (Unix) or Event Manager (Windows)
10 GBASE-LR
Internet Control Message Protocol
The file has been opened by another user and is open for read only.
10. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
Token passing
MT-RJ (Mechanical Transfer-Registered Jack)
Proxy server
Check the connection from the WAP (Wireless Access Point) to the network
11. TDR means...
Open Source Path First - this is a routing protocol
443
48 bits.
Time domain reflectometer
12. Host
Any network device with an IP address
Bus
Network News Transfer Protocol
Wireless Access Point
13. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Firewall
802.11b
72.16.16.1
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
14. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. PSTN Means...
Internetwork Packet Exchange/Sequenced Packet Exchange
Public Switched Telephone Network
Fully Qualified Domain Name
Internet Control Message Protocol
16. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. List the drawbacks of a ring topology
New Technology File System
Network News Transfer Protocol
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Routing Internet Protocol
18. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Extranet
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Any device on the network that can ask for access to resources
19. This is not a valid IP (Internet Protocol) addresses
172.192.4.256
Point-to-Point Tunneling Protocol
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Transport
20. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
Internet Protocol
2.4 GHz (Gigahertz).
Internet Information Services
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
21. BNC Means...
Bayonet-Neill-Concelman or British Naval Connector
File Transfer Protocol
traceroute
This IP (Internet Protocol) address cannot be pinged remotely.
22. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
SSH
They are connected to a switch when trying to capture packets.
23. What is on Port 1433?
MAC (Media Access Control) address
Peer-To-Peer and Client-Server
SQL Server
HTTP
24. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
1000BASE-CX
Transmission Control Protocol
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
22
25. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
traceroute
ICMP (Internet Control Message Protocol)
26. URL Means...
There will be no Internet access.
Direct Current
Internet mail access protocol
Uniform Resource Locator
27. What is on Port 389?
SSH
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Global Positioning System
28. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Metropolitan Area Network
In the LAN (Local Area Network)
Media Access Unit - Media attachment Unit
29. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
Electromagnetic Interference
The analyzer is functioning properly.
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
30. On what Port is NetBios?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
135-139
MT-RJ (Mechanical Transfer-Registered Jack)
Implement VLANs (Virtual Local Area Network)
31. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
A. 18 -000 feet (5 -486.4 meters)
Point to Point Tunneling Protocol
Wired Equivalent Privacy
Handles tasks in the place of other machines on the network
32. BIOS Means...
Internet Protocol Security
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Basic Input/Output System
the NIC (Network Interface Card) is bad.
33. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
Gateway
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
ICMP (Internet Control Message Protocol)
135-139
34. When one connection to a host fails in a full mesh network - it means...
Internet Service Provider
MAC (Media Access Control) address
All hosts can communicate.
161 & 162
35. What is L2TP? What is significant about this protocol?
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Internet Protocol Security. This is the defacto standard for VPN security.
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
36. What functionality does Kerberos provide?
Authentication
Digital Subscriber Line
169.254.1.1
rp
37. NAT Means...
Select the most probable cause
Network Address Translation
raphical User Interface
Provides remote users with access to the network through modems and an IP connection
38. GSM means...
Global System for Mobile Communications
Remote Desktop Protocol
Client - protocol - and adapter
802.2
39. MAN Means...
Open Source Path First - this is a routing protocol
Hybrid hub
Metropolitan Area Network
NFS (Network File System)
40. ICMP means...
Bridge
Bluetooth enabled cell phones
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Internet Control Message Protocol
41. Which one of the following security protocols creates a secure connection over the Internet?
Client - protocol - and adapter
L2TP (Layer 2 Tunneling Protocol)
1433
The amber light is flashing occasionally and the green light is lit steadily.
42. Given the following output - which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1
nslookup
Any network device with an IP address
New Technology File System
Proxy Server
43. 802.11 security is defined in...
The amber light is flashing occasionally and the green light is lit steadily.
802.11i
raphical User Interface
Challenge Handshake Authentication Protocol
44. What is on Port 3389?
Challenge Handshake Authentication Protocol
Any network device with an IP address
Handles e-mail functions
RDP/ Terminal Services
45. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
D. Switch and bridge
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
User Datagram Protocol
PPP (Point-to-Point Protocol)
46. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Select the most probable cause
3.1
802.1x
Media Access Control
47. DNS means...
raphical User Interface
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Domain Name Service OR Domain Name Server
Institute of Electrical and Electronics Engineers
48. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
ping
NFS (Network File System)
3389
Transport
49. What is Broadcast Transmission?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Gateway
Point-to-Point Protocol
Network and Transport
50. Describe a star topology
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
The Internet router is blocking port 25.
Point-to-Point Tunneling Protocol
RDP/ Terminal Services
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests