SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. AC means...
CSU / DSU (Channel Service Unit / Data Service Unit)
10 GBASE-LR
Alternating Current
Point to Point Protocol
2. ACL means...
Handles e-mail functions
Wireless LAN
HTTP
Access Control List
3. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
netstat
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
A long length of antenna extension cable
Transport
4. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Transport
cold site.
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
5. URL Means...
Application
Peer-To-Peer and Client-Server
The amber light is flashing occasionally and the green light is lit steadily.
Uniform Resource Locator
6. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
Wireless Fidelity
802.1x
A striped set array with parity
Electromagnetic Interference
7. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Challenge Handshake Authentication Protocol
3.1
rp
Bluetooth enabled cell phones
8. What is on Port 143?
New Technology File System
Wireless Protected Access
IMAP (Mail Client)
110
9. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
VPN (Virtual Private Network)
Easy to install - Inexpensive - Less actual cable required
Port 20 must also be unblocked.
Time domain reflectometer
10. On what Port is IMAP?
143
Internetwork packet exchange
Network and Transport
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
11. NAC means...
Network Access Control
Port 20 must also be unblocked.
25
CSU / DSU (Channel Service Unit / Data Service Unit)
12. This is not an IP (Internet Protocol) addresses.
Trivial File Transfer Protocol
72.16.16.1
Alternating Current
Point-to-Point Tunneling Protocol
13. What are the two main network types?
Internet Protocol
Peer-To-Peer and Client-Server
53
10 GBASE-LR
14. RDP means...
Remote Desktop Protocol
Public Switched Telephone Network
550 meters (1 -804.46 feet)
1000BASE-LX and10 GBASE-LR
15. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
ping
The analyzer is functioning properly.
MT-RJ (Mechanical Transfer-Registered Jack)
ICMP (Internet Control Message Protocol)
16. What is on Port 111?
SUN RPC
SSL (Secure Sockets Layer)
Stores and dispenses files
Wireless Protected Access
17. Client-Server Networks
Password Authentication Protocol
Multipurpose Internet Mail Extension
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
1000BASE-CX
18. IMAP Means...
In the LAN (Local Area Network)
Internet mail access protocol
A long length of antenna extension cable
Server Message Block OR Small-to-Midsize Business
19. SSL Means...
20 & 21
Secure Sockets Layer
Telnet
Open Source Path First - this is a routing protocol
20. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. PRI Means...
2.4 GHz (Gigahertz).
Primary Rate Interface
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Network and Transport
22. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
Transport
Sys Log (Unix) or Event Manager (Windows)
Intrusion Detection System
SQL Server
23. PKI means...
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Public Key Infrastructure
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
6
24. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Application
Port 20 must also be unblocked.
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Windows Internet Name Service
25. What functionality does Kerberos provide?
Proxy
Check the connection from the WAP (Wireless Access Point) to the network
Transmission Control Protocol/Internet Protocol
Authentication
26. NNTP Means...
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Network News Transfer Protocol
The amber light is flashing occasionally and the green light is lit steadily.
T1 (T-Carrier Level 1).
27. HTTPS means...
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
Hypertext transfer protocol over secure sockets layer.
The file has been opened by another user and is open for read only.
28. 802.11 security is defined in...
802.11i
Secure Sockets Layer
TCP / IP (Transmission Control Protocol / Internet Protocol)
Internet Protocol Security. This is the defacto standard for VPN security.
29. HTTP Means...
Hypertext transfer protocol
TFTP (Trivial File Transfer Protocol)
Integrated Services digital Network
bytes 1-3
30. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
rlogin
the NIC (Network Interface Card) is bad.
10
Port 161 is SNMP and Port 162 is the SNMP Manager
31. FDDI (Fiber Distributed Data Interface) operates at what speed?
100 Mbps (Megabits per second)
Electromagnetic Interference
Password Authentication Protocol
Hypertext transfer protocol over secure sockets layer.
32. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
As a way to share resources and information
rlogin
Manages printers on the network
Provides remote users with access to the network through modems and an IP connection
33. An Ethernet MAC (Media Access Control) address consists of...
48 bits.
Central Processing unit
Internet Protocol Security
nslookup
34. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
Point to Point Protocol
Post Office Protocol
The file has been opened by another user and is open for read only.
3389
35. IIS Means...
Lightweight Directory Access Protocol
They are connected to a switch when trying to capture packets.
All workstations except Workstation 3 can communicate to each other.
Internet Information Services
36. All of the following options transmit data over a modem EXCEPT...
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
It is an address assigned to a NIC (Network Interface Card).
T1 (T-Carrier Level 1).
37. DSL means...
Global System for Mobile Communications
Local Area Network
Digital Subscriber Line
SSH
38. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
raphical User Interface
These are the FTP ports. Port 20 handles data and Port 21 provides control.
1000BASE-CX
39. Describe a star topology
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Router
Connect Workstation 6 and Workstation 2 using a barrel connector
NFS (Network File System)
40. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Network and Transport
netstat and ping
NFS (Network File System)
rlogin
41. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Internet Protocol
CSU / DSU (Channel Service Unit / Data Service Unit)
SUN RPC
Firewall
42. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
1000BASE-CX
DNS (Domain Name Service) server settings
389
Time domain reflectometer
43. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
PPP (Point-to-Point Protocol)
nslookup
1000BASE-LX and10 GBASE-LR
44. Which one of the following options is required for a client workstation to connect to a network resource?
Point-to-Point Tunneling Protocol
Client - protocol - and adapter
111
The Internet router is blocking port 25.
45. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
Proxy server
Hybrid hub
Network Access Control
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
46. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Light Emitting Diode
There will be no Internet access.
Point-to-Point Protocol
47. Mail Server
rlogin
Handles e-mail functions
SSL (Secure Sockets Layer)
10
48. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
BootP (Boot Protocol)
Application
1000BASE-CX
Bridge
49. Describe a bus topology
Internet Control Message Protocol
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
161 & 162
Exterior Gateway Protocol
50. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
40 bit - 128 bit - 64 bit
Direct Current
802.11a.
Transmission Control Protocol