SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NAC means...
Network Access Control
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Institute of Electrical and Electronics Engineers
Data Link
2. DHCP means...
Dynamic Host Configuration Protocol
Challenge Handshake Authentication Protocol
All workstations except Workstation 3 can communicate to each other.
53
3. What is on Port 1433?
802.11
RDP/ Terminal Services
D. Switch and bridge
SQL Server
4. On what Port is TFTP?
VPN (Virtual Private Network)
Internet Protocol Security
69
802.11b
5. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
802.1x
Windows Internet Name Service
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
The 'memo maker' that sends and receives paperless faxes over the network
6. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
169.254.1.1
T1 (T-Carrier Level 1).
Public Key Infrastructure
A long length of antenna extension cable
7. IDS means...
Dynamic Host Configuration Protocol
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Network Address Translation
Intrusion Detection System
8. A company wants to have an intranet. Where would the intranet web server be located in the network?
Proxy Server
CSU / DSU (Channel Service Unit / Data Service Unit)
In the LAN (Local Area Network)
Point to Point Tunneling Protocol
9. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
HTTPS/ SSL
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
nslookup
netstat
10. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
SSL (Secure Sockets Layer)
1000BASE-CX
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Internet Protocol
11. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. The network uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair). The cable to Workstation 3 has been severed. Which of
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Transmission Control Protocol
Routing Information Protocol
All workstations except Workstation 3 can communicate to each other.
12. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
There will be no Internet access.
22
Public Switched Telephone Network
Proxy server
13. IP means...
22
Internet Protocol
User Datagram Protocol
Packets from entering and leaving a network
14. IMAP Means...
Periodically (randomly) blinking
111
Internet mail access protocol
25
15. In which OSI (Open Systems Interconnect) layer does a bridge operate?
1000BASE-CX
The Internet router is blocking port 25.
Networked Basic Input/Output System
Data Link
16. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
nslookup
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
25
Verification
17. Name the seven most common physical topologies
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Access Control List
Electromagnetic Interference
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
18. All of the following options transmit data over a modem EXCEPT...
Check the connection from the WAP (Wireless Access Point) to the network
T1 (T-Carrier Level 1).
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
gateway.
19. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
TCP / IP (Transmission Control Protocol / Internet Protocol)
22
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Application
20. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
The users will not be affected by the change.
Direct Current
The Internet router is blocking port 25.
3.1
21. Host
1000BASE-CX
Routing Internet Protocol
Any network device with an IP address
The users will not be affected by the change.
22. Which one of the following communication protocols does a UNIX system primarily rely on?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
SQL Server
SMTP Server
23. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
A network map showing exactly how data moves through the network.
Port 161 is SNMP and Port 162 is the SNMP Manager
Light Emitting Diode
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
24. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
Post Office Protocol
Hypertext transfer protocol over secure sockets layer.
550 meters (1 -804.46 feet)
larger subnet masks.
26. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
802.11a.
Open Source Path First - this is a routing protocol
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Point to Point Tunneling Protocol
27. Describe a bus topology
SSH
Internetwork packet exchange
All hosts can communicate.
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
28. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Put a router between the two network segments
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
To decrease network congestion Answer: D
Internet Service Provider
29. What is L2TP? What is significant about this protocol?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
ifconfig
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
30. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
192.168.96.254
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
encapsulating the data payload.
1000BASE-CX
31. Which one of the following security protocols creates a secure connection over the Internet?
10
CSU / DSU (Channel Service Unit / Data Service Unit)
L2TP (Layer 2 Tunneling Protocol)
PDC (Primary Domain Controller)
32. ISO Means...
Industry Standards Organization
Put a router between the two network segments
Network Address Translator
Secure Shell
33. Why did we develop networking?
Proxy Server
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
As a way to share resources and information
WINS (Windows Internet Name Service)
34. Logical Topology
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Wireless Access Point
A network map showing exactly how data moves through the network.
bytes 1-3
35. On what Port is NetBios?
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
135-139
Lightweight Directory Access Protocol
Switches - bridges - and NICs (Network Interface Card)
36. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. What is PAT?
Internet connection
Port Address Translator
192.168.96.254
1000BASE-CX
38. BIOS Means...
CSU / DSU (Channel Service Unit / Data Service Unit)
Basic Input/Output System
Gateway
Point-to-Point Tunneling Protocol
39. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Reverse Address Resolution Protocol.
Exterior Gateway Protocol
41. SMB Means...
CSU / DSU (Channel Service Unit / Data Service Unit)
Server Message Block OR Small-to-Midsize Business
Handles tasks in the place of other machines on the network
User Datagram Protocol
42. Which one of the following devices connects a network segment to a public telephone network?
CSU / DSU (Channel Service Unit / Data Service Unit)
389
Access Control List
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
43. What is on Ports 20 and 21?
23
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Basic Rate Interface
Multipurpose Internet Mail Extension
44. TCP means...
10 GBASE-LR
Network News Transfer Protocol
Token passing
Transmission Control Protocol
45. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
bytes 1-3
2
Presentation
Proxy server
46. What is on Port 69?
143
TFTP (Trivial File Transfer Protocol)
Remote Desktop Protocol
Token passing
47. A firewall can be used to prevent which of the following?
Packets from entering and leaving a network
netstat and ping
Fully Qualified Domain Name
Domain Name Service OR Domain Name Server
48. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
SSH
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
A. 18 -000 feet (5 -486.4 meters)
49. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
Public Switched Telephone Network
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
2
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
50. POTS means...
Plain Old Telephone Service
Wireless LAN
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
All hosts can communicate.