SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which one of the following options is a security standard for 802.11?
Network and Transport
WEP (Wired Equivalent Privacy)
NetBios
Secure Shell
2. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Network Interface Card
D. Switch and bridge
110
3. LDAP means...
Proxy Server
Lightweight Directory Access Protocol
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Reverse Address Resolution Protocol.
4. SMB Means...
Handles e-mail functions
3.1
Server Message Block OR Small-to-Midsize Business
802.11
5. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
D. Switch and bridge
Public Key Infrastructure
netstat
NetBios
6. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
rp
An old microwave oven is being used in the break room which causes interference with the access point.
bytes 1-3
802.11b
7. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
Central Processing unit
1
100BASE-FX Answer: D
128 bit addresses
8. Remote Access Server
Provides remote users with access to the network through modems and an IP connection
In the LAN (Local Area Network)
2
Network Address Translator
9. TCP means...
161 & 162
802.11a.
Transmission Control Protocol
Network Time Protocol
10. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
Implement VLANs (Virtual Local Area Network)
Metropolitan Area Network
Internet connection
802.11b
11. What is on Ports 135-139?
2.4 GHz (Gigahertz).
Proxy server
WINS (Windows Internet Name Service)
NetBios
12. List the drawbacks of a ring topology
Asynchronous Transfer Mode
A. 18 -000 feet (5 -486.4 meters)
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
MultiProtocol Label Switching
13. Wi-Fi Means...
10 GBASE-LR
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Wireless Fidelity
100BASE-FX Answer: D
14. On what Port is RDP?
Point to Point Protocol
53
NetBios
3389
15. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
1433
100BASE-FX Answer: D
ifconfig
CSU / DSU (Channel Service Unit / Data Service Unit)
16. DSL means...
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Two or more connected computers that can share resources
Digital Subscriber Line
17. A company wants to have an intranet. Where would the intranet web server be located in the network?
In the LAN (Local Area Network)
Digital Subscriber Line
DNS
Hybrid hub
18. GUI means
111
raphical User Interface
They are connected to a switch when trying to capture packets.
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
19. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Primary Rate Interface
PPP (Point-to-Point Protocol)
Any network device with an IP address
20. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
There will be no Internet access.
rp
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
443
21. What is Unicast?
Router
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
25
22. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
Two or more connected computers that can share resources
10
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Point to Point Tunneling Protocol
23. On what Port is SUN RPC?
111
Manages printers on the network
New Technology File System
Two or more connected computers that can share resources
24. Describe a star topology
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Internet connection
Internet Protocol
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
25. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
NFS (Network File System)
Client - protocol - and adapter
10 GBASE-LR
Stores and dispenses files
26. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Extranet
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Transmission Control Protocol
In the LAN (Local Area Network)
27. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
Port 161 is SNMP and Port 162 is the SNMP Manager
CSU / DSU (Channel Service Unit / Data Service Unit)
rlogin
Firewall
28. Which OSI (Open Systems Interconnect) layer converts digital data into electronic signals to beput on a wire?
Client - protocol - and adapter
Physical
The file has been opened by another user and is open for read only.
Manages network applications
29. FTP Means
53
NFS (Network File System)
The device ID (Identification)
File Transfer Protocol
30. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed?
Bridge
Address Resolution Protocol. Has no error control.
SSL (Secure Sockets Layer)
D. Switch and bridge
31. What are the two main network types?
raphical User Interface
Peer-To-Peer and Client-Server
Digital Subscriber Line
Forward the packets to all ports except the one that originated the request
32. A client workstation can authenticate user names and passwords to which type of server?
Quality of Service
PDC (Primary Domain Controller)
Hypertext Markup Language
netstat
33. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Integrated Services digital Network
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
The analyzer is functioning properly.
34. RIP Means...
Routing Information Protocol
WEP (Wired Equivalent Privacy)
Digital Subscriber Line
An old microwave oven is being used in the break room which causes interference with the access point.
35. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Port Address Translator
Connect Workstation 6 and Workstation 2 using a barrel connector
Service Set Identifier
Presentation
36. What is OSPF?
Open Source Path First - this is a routing protocol
Bridge
Electromagnetic Interference
cold site.
37. NTFS Means...
Manages network applications
New Technology File System
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Fully Qualified Domain Name
38. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
They are connected to a switch when trying to capture packets.
Networked Basic Input/Output System
Check the connection from the WAP (Wireless Access Point) to the network
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
39. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
100BASE-FX Answer: D
Internet connection
Sys Log (Unix) or Event Manager (Windows)
Network Address Translation
40. What is RIP?
bytes 1-3
Routing Internet Protocol
25
Proxy
41. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
Authentication
User Datagram Protocol. This protocol is connectionless and routable.
Fully Qualified Domain Name
larger subnet masks.
42. What is on Port 110?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
3.1
POP3
100BASE-FX Answer: D
43. Print Server
Open Source Path First - this is a routing protocol
8080
All hosts can communicate.
Manages printers on the network
44. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Point-to-Point Tunneling Protocol
Select the most probable cause
Bayonet-Neill-Concelman or British Naval Connector
Basic Rate Interface
45. Client Machine
802.11
gateway.
Any device on the network that can ask for access to resources
ICMP (Internet Control Message Protocol)
46. PRI Means...
143
Primary Rate Interface
the NIC (Network Interface Card) is bad.
CSU / DSU (Channel Service Unit / Data Service Unit)
47. Network
traceroute
Two or more connected computers that can share resources
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
A long length of antenna extension cable
48. ICMP means...
25
Bluetooth enabled cell phones
Internet Control Message Protocol
Multipurpose Internet Mail Extension
49. What is on Port 53?
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
The amber light is flashing occasionally and the green light is lit steadily.
DNS
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
50. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up - which of the following will
In the LAN (Local Area Network)
The amber light is flashing occasionally and the green light is lit steadily.
NetBios
File Transfer Protocol