SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NFS Means...
Network File System
10 GBASE-LR
Provides remote users with access to the network through modems and an IP connection
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
2. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
They are connected to a switch when trying to capture packets.
Internet connection
Transport
MultiProtocol Label Switching
3. What is RIP?
Routing Internet Protocol
69
Password Authentication Protocol
Plain Old Telephone Service
4. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
69
514
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
bytes 1-3
5. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
DNS
HTTP
gateway.
Port 20 must also be unblocked.
6. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
rlogin
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
There will be no Internet access.
Global System for Mobile Communications
7. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
To decrease network congestion Answer: D
Windows Internet Name Service
25
8. SSL Means...
Port 161 is SNMP and Port 162 is the SNMP Manager
Secure Sockets Layer
POP3
A. 18 -000 feet (5 -486.4 meters)
9. UDP Means...
bytes 1-3
111
User Datagram Protocol
The users will not be affected by the change.
10. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
Internet Protocol Security
rlogin
They are connected to a switch when trying to capture packets.
CSU / DSU (Channel Service Unit / Data Service Unit)
11. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Media Access Control
A. 18 -000 feet (5 -486.4 meters)
Extranet
12. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
Physical
53
Hybrid hub
Internet Information Services
13. IP means...
VPN (Virtual Private Network)
Internet Protocol
larger subnet masks.
Manages network applications
14. On what Port is SNMP?
Global Positioning System
161 & 162
CSU / DSU (Channel Service Unit / Data Service Unit)
An eight-position connector which uses UTP (Unshielded Twisted Pair).
15. Which one of the following is a purpose for subnetting?
TFTP (Trivial File Transfer Protocol)
MT-RJ (Mechanical Transfer-Registered Jack)
To decrease network congestion Answer: D
Implement VLANs (Virtual Local Area Network)
16. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Periodically (randomly) blinking
Networked Basic Input/Output System Extended User Interface
The 'memo maker' that sends and receives paperless faxes over the network
3389
18. Client-Server Networks
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Hypertext transfer protocol
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
traceroute
19. POP3 Means...
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Post Office Protocol 3
Network Access Control
69
20. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Fully Qualified Domain Name
The analyzer is functioning properly.
Multiple Link Interface
21. Application Server
Industry Standards Organization
netstat and ping
Manages network applications
Internet mail access protocol
22. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
nslookup
Access Control List
Firewall
MT-RJ (Mechanical Transfer-Registered Jack)
23. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
Presentation
1
The device ID (Identification)
Application
24. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Alternating Current
WINS (Windows Internet Name Service)
These are the FTP ports. Port 20 handles data and Port 21 provides control.
25. What is on Ports 20 and 21?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
These are the FTP ports. Port 20 handles data and Port 21 provides control.
WINS (Windows Internet Name Service)
File Transfer Protocol
26. What is ARP? What are some of its attributes?
Service Set Identifier
Gateway
802.11
Address Resolution Protocol. Has no error control.
27. Examples of valid WEP (Wired Equivalent Privacy) key lengths
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Manages printers on the network
40 bit - 128 bit - 64 bit
Secure Sockets Layer
28. CPU means...
Central Processing unit
Wireless Protected Access
In a locked room in an offsite location
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
29. Why did we develop networking?
CSU / DSU (Channel Service Unit / Data Service Unit)
Network News Transfer Protocol
As a way to share resources and information
802.11b
30. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
8080
File Transfer Protocol
Verification
A 2.4 GHz (Gigahertz) cordless telephone is in use.
31. IPX/SPX means...
8080
Public Key Infrastructure
Internetwork Packet Exchange/Sequenced Packet Exchange
Authentication
32. Given the output: 1.pgw (129.6.80.254) * 4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above?
Post Office Protocol 3
Media Access Control
Global Positioning System
traceroute
33. LDAP means...
192.168.96.254
Hybrid hub
23
Lightweight Directory Access Protocol
34. WLAN Means...
Wireless LAN
Public Key Infrastructure
netstat
Reverse Address Resolution Protocol.
35. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Peer-To-Peer and Client-Server
An old microwave oven is being used in the break room which causes interference with the access point.
36. Around noon - 802.11b wireless users near the break room have intermittent - random connections. What is the problem?
rlogin
Public Key Infrastructure
An old microwave oven is being used in the break room which causes interference with the access point.
In a locked room in an offsite location
37. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
larger subnet masks.
Any device on the network that can ask for access to resources
Transport
38. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
Wireless Fidelity
100BASE-FX Answer: D
Token passing
Wireless Access Point
39. What is on Port 25?
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
SMTP Server
Bayonet-Neill-Concelman or British Naval Connector
25
40. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Put a router between the two network segments
Primary Rate Interface
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
41. LAN Means...
Local Area Network
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Hypertext Markup Language
Exterior Gateway Protocol
42. Network
Two or more connected computers that can share resources
Post Office Protocol 3
RDP/ Terminal Services
A 2.4 GHz (Gigahertz) cordless telephone is in use.
43. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
netstat
Bus
CSU / DSU (Channel Service Unit / Data Service Unit)
Integrated Services digital Network
44. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Network News Transfer Protocol
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Implement VLANs (Virtual Local Area Network)
45. File Server
389
As a way to share resources and information
Stores and dispenses files
Wireless Fidelity
46. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Post Office Protocol 3
20 & 21
Connect Workstation 6 and Workstation 2 using a barrel connector
47. Which of the following choices describes an RJ-45 (Registered Jack) connector?
69
Server Message Block OR Small-to-Midsize Business
DNS (Domain Name Service) server settings
An eight-position connector which uses UTP (Unshielded Twisted Pair).
48. MAU means...
Media Access Unit - Media attachment Unit
Central Processing unit
100 Mbps (Megabits per second)
ifconfig
49. What is on Port 143?
CSU / DSU (Channel Service Unit / Data Service Unit)
Handles tasks in the place of other machines on the network
IMAP (Mail Client)
Challenge Handshake Authentication Protocol
50. IPSEC means...
gateway.
SMB (Server Message Block)
Internet Protocol Security
Handles tasks in the place of other machines on the network